2021-04-30 03:18:50 +00:00
|
|
|
// Copyright (c) 2021 Tailscale Inc & AUTHORS All rights reserved.
|
|
|
|
// Use of this source code is governed by a BSD-style
|
|
|
|
// license that can be found in the LICENSE file.
|
|
|
|
|
|
|
|
package ipnlocal
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"sync"
|
|
|
|
"testing"
|
|
|
|
"time"
|
|
|
|
|
2021-04-30 21:47:16 +00:00
|
|
|
qt "github.com/frankban/quicktest"
|
2021-04-30 03:18:50 +00:00
|
|
|
|
|
|
|
"tailscale.com/control/controlclient"
|
|
|
|
"tailscale.com/ipn"
|
2021-07-12 03:10:02 +00:00
|
|
|
"tailscale.com/syncs"
|
2021-04-30 03:18:50 +00:00
|
|
|
"tailscale.com/tailcfg"
|
|
|
|
"tailscale.com/types/empty"
|
|
|
|
"tailscale.com/types/logger"
|
|
|
|
"tailscale.com/types/netmap"
|
2021-04-30 07:47:21 +00:00
|
|
|
"tailscale.com/types/persist"
|
|
|
|
"tailscale.com/types/wgkey"
|
2021-04-30 03:18:50 +00:00
|
|
|
"tailscale.com/wgengine"
|
|
|
|
)
|
|
|
|
|
|
|
|
// notifyThrottler receives notifications from an ipn.Backend, blocking
|
|
|
|
// (with eventual timeout and t.Fatal) if there are too many and complaining
|
|
|
|
// (also with t.Fatal) if they are too few.
|
|
|
|
type notifyThrottler struct {
|
|
|
|
t *testing.T
|
|
|
|
|
|
|
|
// ch gets replaced frequently. Lock the mutex before getting or
|
|
|
|
// setting it, but not while waiting on it.
|
|
|
|
mu sync.Mutex
|
|
|
|
ch chan ipn.Notify
|
|
|
|
}
|
|
|
|
|
|
|
|
// expect tells the throttler to expect count upcoming notifications.
|
|
|
|
func (nt *notifyThrottler) expect(count int) {
|
|
|
|
nt.mu.Lock()
|
|
|
|
nt.ch = make(chan ipn.Notify, count)
|
|
|
|
nt.mu.Unlock()
|
|
|
|
}
|
|
|
|
|
|
|
|
// put adds one notification into the throttler's queue.
|
|
|
|
func (nt *notifyThrottler) put(n ipn.Notify) {
|
|
|
|
nt.mu.Lock()
|
|
|
|
ch := nt.ch
|
|
|
|
nt.mu.Unlock()
|
|
|
|
|
|
|
|
select {
|
|
|
|
case ch <- n:
|
|
|
|
return
|
|
|
|
default:
|
|
|
|
nt.t.Fatalf("put: channel full: %v", n)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// drain pulls the notifications out of the queue, asserting that there are
|
|
|
|
// exactly count notifications that have been put so far.
|
|
|
|
func (nt *notifyThrottler) drain(count int) []ipn.Notify {
|
|
|
|
nt.mu.Lock()
|
|
|
|
ch := nt.ch
|
|
|
|
nt.mu.Unlock()
|
|
|
|
|
|
|
|
nn := []ipn.Notify{}
|
|
|
|
for i := 0; i < count; i++ {
|
|
|
|
select {
|
|
|
|
case n := <-ch:
|
|
|
|
nn = append(nn, n)
|
|
|
|
case <-time.After(6 * time.Second):
|
|
|
|
nt.t.Fatalf("drain: channel empty after %d/%d", i, count)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// no more notifications expected
|
|
|
|
close(ch)
|
|
|
|
|
|
|
|
return nn
|
|
|
|
}
|
|
|
|
|
|
|
|
// mockControl is a mock implementation of controlclient.Client.
|
|
|
|
// Much of the backend state machine depends on callbacks and state
|
|
|
|
// in the controlclient.Client, so by controlling it, we can check that
|
|
|
|
// the state machine works as expected.
|
|
|
|
type mockControl struct {
|
|
|
|
opts controlclient.Options
|
|
|
|
logf logger.Logf
|
|
|
|
statusFunc func(controlclient.Status)
|
|
|
|
|
|
|
|
mu sync.Mutex
|
|
|
|
calls []string
|
|
|
|
authBlocked bool
|
2021-04-30 07:47:21 +00:00
|
|
|
persist persist.Persist
|
|
|
|
machineKey wgkey.Private
|
2021-04-30 03:18:50 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func newMockControl() *mockControl {
|
|
|
|
return &mockControl{
|
|
|
|
calls: []string{},
|
|
|
|
authBlocked: true,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (cc *mockControl) SetStatusFunc(fn func(controlclient.Status)) {
|
|
|
|
cc.statusFunc = fn
|
|
|
|
}
|
|
|
|
|
2021-04-30 08:29:22 +00:00
|
|
|
func (cc *mockControl) populateKeys() (newKeys bool) {
|
2021-04-30 07:47:21 +00:00
|
|
|
cc.mu.Lock()
|
|
|
|
defer cc.mu.Unlock()
|
|
|
|
|
|
|
|
if cc.machineKey.IsZero() {
|
|
|
|
cc.logf("Copying machineKey.")
|
|
|
|
cc.machineKey, _ = cc.opts.GetMachinePrivateKey()
|
2021-04-30 08:29:22 +00:00
|
|
|
newKeys = true
|
2021-04-30 07:47:21 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if cc.persist.PrivateNodeKey.IsZero() {
|
|
|
|
cc.logf("Generating a new nodekey.")
|
|
|
|
cc.persist.OldPrivateNodeKey = cc.persist.PrivateNodeKey
|
|
|
|
cc.persist.PrivateNodeKey, _ = wgkey.NewPrivate()
|
2021-04-30 08:29:22 +00:00
|
|
|
newKeys = true
|
2021-04-30 07:47:21 +00:00
|
|
|
}
|
2021-04-30 08:29:22 +00:00
|
|
|
|
|
|
|
return newKeys
|
2021-04-30 07:47:21 +00:00
|
|
|
}
|
|
|
|
|
2021-04-30 03:18:50 +00:00
|
|
|
// send publishes a controlclient.Status notification upstream.
|
|
|
|
// (In our tests here, upstream is the ipnlocal.Local instance.)
|
|
|
|
func (cc *mockControl) send(err error, url string, loginFinished bool, nm *netmap.NetworkMap) {
|
|
|
|
if cc.statusFunc != nil {
|
|
|
|
s := controlclient.Status{
|
2021-04-30 07:47:21 +00:00
|
|
|
URL: url,
|
|
|
|
NetMap: nm,
|
|
|
|
Persist: &cc.persist,
|
2021-04-30 03:18:50 +00:00
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
s.Err = err.Error()
|
|
|
|
}
|
|
|
|
if loginFinished {
|
|
|
|
s.LoginFinished = &empty.Message{}
|
ipnlocal: don't assume NeedsLogin immediately after StartLogout().
Previously, there was no server round trip required to log out, so when
you asked ipnlocal to Logout(), it could clear the netmap immediately
and switch to NeedsLogin state.
In v1.8, we added a true Logout operation. ipn.Logout() would trigger
an async cc.StartLogout() and *also* immediately switch to NeedsLogin.
Unfortunately, some frontends would see NeedsLogin and immediately
trigger a new StartInteractiveLogin() operation, before the
controlclient auth state machine actually acted on the Logout command,
thus accidentally invalidating the entire logout operation, retaining
the netmap, and violating the user's expectations.
Instead, add a new LogoutFinished signal from controlclient
(paralleling LoginFinished) and, upon starting a logout, don't update
the ipn state machine until it's received.
Updates: #1918 (BUG-2)
Signed-off-by: Avery Pennarun <apenwarr@tailscale.com>
2021-05-20 06:46:57 +00:00
|
|
|
} else if url == "" && err == nil && nm == nil {
|
|
|
|
s.LogoutFinished = &empty.Message{}
|
2021-04-30 03:18:50 +00:00
|
|
|
}
|
|
|
|
cc.statusFunc(s)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// called records that a particular function name was called.
|
|
|
|
func (cc *mockControl) called(s string) {
|
|
|
|
cc.mu.Lock()
|
|
|
|
defer cc.mu.Unlock()
|
|
|
|
|
|
|
|
cc.calls = append(cc.calls, s)
|
|
|
|
}
|
|
|
|
|
|
|
|
// getCalls returns the list of functions that have been called since the
|
|
|
|
// last time getCalls was run.
|
|
|
|
func (cc *mockControl) getCalls() []string {
|
|
|
|
cc.mu.Lock()
|
|
|
|
defer cc.mu.Unlock()
|
|
|
|
|
|
|
|
r := cc.calls
|
|
|
|
cc.calls = []string{}
|
|
|
|
return r
|
|
|
|
}
|
|
|
|
|
|
|
|
// setAuthBlocked changes the return value of AuthCantContinue.
|
|
|
|
// Auth is blocked if you haven't called Login, the control server hasn't
|
|
|
|
// provided an auth URL, or it has provided an auth URL and you haven't
|
|
|
|
// visited it yet.
|
|
|
|
func (cc *mockControl) setAuthBlocked(blocked bool) {
|
|
|
|
cc.mu.Lock()
|
|
|
|
defer cc.mu.Unlock()
|
|
|
|
|
|
|
|
cc.authBlocked = blocked
|
|
|
|
}
|
|
|
|
|
|
|
|
// Shutdown disconnects the client.
|
|
|
|
//
|
|
|
|
// Note that in a normal controlclient, Shutdown would be the last thing you
|
|
|
|
// do before discarding the object. In this mock, we don't actually discard
|
|
|
|
// the object, but if you see a call to Shutdown, you should always see a
|
|
|
|
// call to New right after it, if the object continues to be used.
|
|
|
|
// (Note that "New" is the ccGen function here; it means ipn.Backend wanted
|
|
|
|
// to create an entirely new controlclient.)
|
|
|
|
func (cc *mockControl) Shutdown() {
|
|
|
|
cc.logf("Shutdown")
|
|
|
|
cc.called("Shutdown")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Login starts a login process.
|
|
|
|
// Note that in this mock, we don't automatically generate notifications
|
|
|
|
// about the progress of the login operation. You have to call setAuthBlocked()
|
|
|
|
// and send() as required by the test.
|
|
|
|
func (cc *mockControl) Login(t *tailcfg.Oauth2Token, flags controlclient.LoginFlags) {
|
|
|
|
cc.logf("Login token=%v flags=%v", t, flags)
|
|
|
|
cc.called("Login")
|
2021-04-30 08:29:22 +00:00
|
|
|
newKeys := cc.populateKeys()
|
|
|
|
|
|
|
|
interact := (flags & controlclient.LoginInteractive) != 0
|
|
|
|
cc.logf("Login: interact=%v newKeys=%v", interact, newKeys)
|
|
|
|
cc.setAuthBlocked(interact || newKeys)
|
2021-04-30 03:18:50 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (cc *mockControl) StartLogout() {
|
|
|
|
cc.logf("StartLogout")
|
|
|
|
cc.called("StartLogout")
|
|
|
|
}
|
|
|
|
|
|
|
|
func (cc *mockControl) Logout(ctx context.Context) error {
|
|
|
|
cc.logf("Logout")
|
|
|
|
cc.called("Logout")
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (cc *mockControl) SetPaused(paused bool) {
|
|
|
|
cc.logf("SetPaused=%v", paused)
|
|
|
|
if paused {
|
|
|
|
cc.called("pause")
|
|
|
|
} else {
|
|
|
|
cc.called("unpause")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (cc *mockControl) AuthCantContinue() bool {
|
|
|
|
cc.mu.Lock()
|
|
|
|
defer cc.mu.Unlock()
|
|
|
|
|
|
|
|
return cc.authBlocked
|
|
|
|
}
|
|
|
|
|
|
|
|
func (cc *mockControl) SetHostinfo(hi *tailcfg.Hostinfo) {
|
|
|
|
cc.logf("SetHostinfo: %v", *hi)
|
|
|
|
cc.called("SetHostinfo")
|
|
|
|
}
|
|
|
|
|
|
|
|
func (cc *mockControl) SetNetInfo(ni *tailcfg.NetInfo) {
|
|
|
|
cc.called("SetNetinfo")
|
|
|
|
cc.logf("SetNetInfo: %v", *ni)
|
|
|
|
cc.called("SetNetInfo")
|
|
|
|
}
|
|
|
|
|
|
|
|
func (cc *mockControl) UpdateEndpoints(localPort uint16, endpoints []tailcfg.Endpoint) {
|
|
|
|
// validate endpoint information here?
|
|
|
|
cc.logf("UpdateEndpoints: lp=%v ep=%v", localPort, endpoints)
|
|
|
|
cc.called("UpdateEndpoints")
|
|
|
|
}
|
|
|
|
|
2021-06-07 23:03:16 +00:00
|
|
|
func (*mockControl) SetDNS(context.Context, *tailcfg.SetDNSRequest) error {
|
|
|
|
panic("unexpected SetDNS call")
|
|
|
|
}
|
|
|
|
|
2021-04-30 03:18:50 +00:00
|
|
|
// A very precise test of the sequence of function calls generated by
|
|
|
|
// ipnlocal.Local into its controlclient instance, and the events it
|
|
|
|
// produces upstream into the UI.
|
|
|
|
//
|
|
|
|
// [apenwarr] Normally I'm not a fan of "mock" style tests, but the precise
|
|
|
|
// sequence of this state machine is so important for writing our multiple
|
|
|
|
// frontends, that it's worth validating it all in one place.
|
|
|
|
//
|
|
|
|
// Any changes that affect this test will most likely require carefully
|
|
|
|
// re-testing all our GUIs (and the CLI) to make sure we didn't break
|
|
|
|
// anything.
|
|
|
|
//
|
|
|
|
// Note also that this test doesn't have any timers, goroutines, or duplicate
|
|
|
|
// detection. It expects messages to be produced in exactly the right order,
|
|
|
|
// with no duplicates, without doing network activity (other than through
|
|
|
|
// controlclient, which we fake, so there's no network activity there either).
|
|
|
|
//
|
|
|
|
// TODO: A few messages that depend on magicsock (which actually might have
|
|
|
|
// network delays) are just ignored for now, which makes the test
|
|
|
|
// predictable, but maybe a bit less thorough. This is more of an overall
|
|
|
|
// state machine test than a test of the wgengine+magicsock integration.
|
|
|
|
func TestStateMachine(t *testing.T) {
|
2021-04-30 21:47:16 +00:00
|
|
|
c := qt.New(t)
|
2021-04-30 03:18:50 +00:00
|
|
|
|
|
|
|
logf := t.Logf
|
2021-07-12 03:10:02 +00:00
|
|
|
store := new(testStateStorage)
|
2021-04-30 03:18:50 +00:00
|
|
|
e, err := wgengine.NewFakeUserspaceEngine(logf, 0)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("NewFakeUserspaceEngine: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
cc := newMockControl()
|
2021-04-30 14:23:22 +00:00
|
|
|
b, err := NewLocalBackend(logf, "logid", store, e)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("NewLocalBackend: %v", err)
|
|
|
|
}
|
|
|
|
b.SetControlClientGetterForTesting(func(opts controlclient.Options) (controlclient.Client, error) {
|
2021-04-30 03:18:50 +00:00
|
|
|
cc.mu.Lock()
|
|
|
|
cc.opts = opts
|
|
|
|
cc.logf = opts.Logf
|
|
|
|
cc.authBlocked = true
|
2021-04-30 09:27:37 +00:00
|
|
|
cc.persist = cc.opts.Persist
|
2021-04-30 03:18:50 +00:00
|
|
|
cc.mu.Unlock()
|
|
|
|
|
2021-04-30 09:27:37 +00:00
|
|
|
cc.logf("ccGen: new mockControl.")
|
2021-04-30 03:18:50 +00:00
|
|
|
cc.called("New")
|
|
|
|
return cc, nil
|
2021-04-30 14:23:22 +00:00
|
|
|
})
|
2021-04-30 03:18:50 +00:00
|
|
|
|
|
|
|
notifies := ¬ifyThrottler{t: t}
|
|
|
|
notifies.expect(0)
|
|
|
|
|
|
|
|
b.SetNotifyCallback(func(n ipn.Notify) {
|
|
|
|
if n.State != nil ||
|
|
|
|
n.Prefs != nil ||
|
|
|
|
n.BrowseToURL != nil ||
|
|
|
|
n.LoginFinished != nil {
|
|
|
|
logf("\n%v\n\n", n)
|
|
|
|
notifies.put(n)
|
|
|
|
} else {
|
|
|
|
logf("\n(ignored) %v\n\n", n)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
|
|
|
|
// Check that it hasn't called us right away.
|
|
|
|
// The state machine should be idle until we call Start().
|
2021-04-30 21:47:16 +00:00
|
|
|
c.Assert(cc.getCalls(), qt.HasLen, 0)
|
2021-04-30 03:18:50 +00:00
|
|
|
|
|
|
|
// Start the state machine.
|
|
|
|
// Since !WantRunning by default, it'll create a controlclient,
|
|
|
|
// but not ask it to do anything yet.
|
2021-04-30 07:47:21 +00:00
|
|
|
t.Logf("\n\nStart")
|
2021-04-30 03:18:50 +00:00
|
|
|
notifies.expect(2)
|
2021-04-30 21:47:16 +00:00
|
|
|
c.Assert(b.Start(ipn.Options{StateKey: ipn.GlobalDaemonStateKey}), qt.IsNil)
|
2021-04-30 03:18:50 +00:00
|
|
|
{
|
|
|
|
// BUG: strictly, it should pause, not unpause, here, since !WantRunning.
|
2021-04-30 21:47:16 +00:00
|
|
|
c.Assert([]string{"New", "unpause"}, qt.DeepEquals, cc.getCalls())
|
2021-04-30 03:18:50 +00:00
|
|
|
|
|
|
|
nn := notifies.drain(2)
|
2021-04-30 21:47:16 +00:00
|
|
|
c.Assert(cc.getCalls(), qt.HasLen, 0)
|
|
|
|
c.Assert(nn[0].Prefs, qt.Not(qt.IsNil))
|
|
|
|
c.Assert(nn[1].State, qt.Not(qt.IsNil))
|
2021-04-30 03:18:50 +00:00
|
|
|
prefs := *nn[0].Prefs
|
2021-04-30 07:56:11 +00:00
|
|
|
// Note: a totally fresh system has Prefs.LoggedOut=false by
|
|
|
|
// default. We are logged out, but not because the user asked
|
|
|
|
// for it, so it doesn't count as Prefs.LoggedOut==true.
|
2021-04-30 21:47:16 +00:00
|
|
|
c.Assert(nn[0].Prefs.LoggedOut, qt.IsFalse)
|
|
|
|
c.Assert(prefs.WantRunning, qt.IsFalse)
|
|
|
|
c.Assert(ipn.NeedsLogin, qt.Equals, *nn[1].State)
|
|
|
|
c.Assert(ipn.NeedsLogin, qt.Equals, b.State())
|
2021-04-30 03:18:50 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Restart the state machine.
|
|
|
|
// It's designed to handle frontends coming and going sporadically.
|
|
|
|
// Make the sure the restart not only works, but generates the same
|
|
|
|
// events as the first time, so UIs always know what to expect.
|
|
|
|
t.Logf("\n\nStart2")
|
|
|
|
notifies.expect(2)
|
2021-04-30 21:47:16 +00:00
|
|
|
c.Assert(b.Start(ipn.Options{StateKey: ipn.GlobalDaemonStateKey}), qt.IsNil)
|
2021-04-30 03:18:50 +00:00
|
|
|
{
|
|
|
|
// BUG: strictly, it should pause, not unpause, here, since !WantRunning.
|
2021-04-30 21:47:16 +00:00
|
|
|
c.Assert([]string{"Shutdown", "New", "unpause"}, qt.DeepEquals, cc.getCalls())
|
2021-04-30 03:18:50 +00:00
|
|
|
|
|
|
|
nn := notifies.drain(2)
|
2021-04-30 21:47:16 +00:00
|
|
|
c.Assert(cc.getCalls(), qt.HasLen, 0)
|
|
|
|
c.Assert(nn[0].Prefs, qt.Not(qt.IsNil))
|
|
|
|
c.Assert(nn[1].State, qt.Not(qt.IsNil))
|
|
|
|
c.Assert(nn[0].Prefs.LoggedOut, qt.IsFalse)
|
|
|
|
c.Assert(nn[0].Prefs.WantRunning, qt.IsFalse)
|
|
|
|
c.Assert(ipn.NeedsLogin, qt.Equals, *nn[1].State)
|
|
|
|
c.Assert(ipn.NeedsLogin, qt.Equals, b.State())
|
2021-04-30 03:18:50 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Start non-interactive login with no token.
|
|
|
|
// This will ask controlclient to start its own Login() process,
|
|
|
|
// then wait for us to respond.
|
|
|
|
t.Logf("\n\nLogin (noninteractive)")
|
|
|
|
notifies.expect(0)
|
|
|
|
b.Login(nil)
|
|
|
|
{
|
2021-04-30 21:47:16 +00:00
|
|
|
c.Assert(cc.getCalls(), qt.DeepEquals, []string{"Login"})
|
2021-04-30 03:18:50 +00:00
|
|
|
notifies.drain(0)
|
2021-05-06 03:28:29 +00:00
|
|
|
// Note: WantRunning isn't true yet. It'll switch to true
|
|
|
|
// after a successful login finishes.
|
|
|
|
// (This behaviour is needed so that b.Login() won't
|
|
|
|
// start connecting to an old account right away, if one
|
|
|
|
// exists when you launch another login.)
|
2021-04-30 03:18:50 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Attempted non-interactive login with no key; indicate that
|
|
|
|
// the user needs to visit a login URL.
|
|
|
|
t.Logf("\n\nLogin (url response)")
|
|
|
|
notifies.expect(1)
|
|
|
|
url1 := "http://localhost:1/1"
|
|
|
|
cc.send(nil, url1, false, nil)
|
|
|
|
{
|
2021-05-06 03:28:29 +00:00
|
|
|
c.Assert(cc.getCalls(), qt.DeepEquals, []string{})
|
2021-04-30 03:18:50 +00:00
|
|
|
|
|
|
|
// ...but backend eats that notification, because the user
|
|
|
|
// didn't explicitly request interactive login yet, and
|
|
|
|
// we're already in NeedsLogin state.
|
|
|
|
nn := notifies.drain(1)
|
|
|
|
|
2021-04-30 21:47:16 +00:00
|
|
|
c.Assert(nn[0].Prefs, qt.Not(qt.IsNil))
|
|
|
|
c.Assert(nn[0].Prefs.LoggedOut, qt.IsFalse)
|
2021-05-06 03:28:29 +00:00
|
|
|
c.Assert(nn[0].Prefs.WantRunning, qt.IsFalse)
|
2021-04-30 03:18:50 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Now we'll try an interactive login.
|
|
|
|
// Since we provided an interactive URL earlier, this shouldn't
|
|
|
|
// ask control to do anything. Instead backend will emit an event
|
|
|
|
// indicating that the UI should browse to the given URL.
|
|
|
|
t.Logf("\n\nLogin (interactive)")
|
|
|
|
notifies.expect(1)
|
|
|
|
b.StartLoginInteractive()
|
|
|
|
{
|
|
|
|
nn := notifies.drain(1)
|
|
|
|
// BUG: UpdateEndpoints shouldn't be called yet.
|
|
|
|
// We're still not logged in so there's nothing we can do
|
|
|
|
// with it. (And empirically, it's providing an empty list
|
|
|
|
// of endpoints.)
|
2021-04-30 21:47:16 +00:00
|
|
|
c.Assert([]string{"UpdateEndpoints"}, qt.DeepEquals, cc.getCalls())
|
|
|
|
c.Assert(nn[0].BrowseToURL, qt.Not(qt.IsNil))
|
|
|
|
c.Assert(url1, qt.Equals, *nn[0].BrowseToURL)
|
2021-04-30 03:18:50 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Sometimes users press the Login button again, in the middle of
|
|
|
|
// a login sequence. For example, they might have closed their
|
|
|
|
// browser window without logging in, or they waited too long and
|
|
|
|
// the login URL expired. If they start another interactive login,
|
|
|
|
// we must always get a *new* login URL first.
|
|
|
|
t.Logf("\n\nLogin2 (interactive)")
|
|
|
|
notifies.expect(0)
|
|
|
|
b.StartLoginInteractive()
|
|
|
|
{
|
|
|
|
notifies.drain(0)
|
|
|
|
// backend asks control for another login sequence
|
2021-04-30 21:47:16 +00:00
|
|
|
c.Assert([]string{"Login"}, qt.DeepEquals, cc.getCalls())
|
2021-04-30 03:18:50 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Provide a new interactive login URL.
|
|
|
|
t.Logf("\n\nLogin2 (url response)")
|
|
|
|
notifies.expect(1)
|
|
|
|
url2 := "http://localhost:1/2"
|
|
|
|
cc.send(nil, url2, false, nil)
|
|
|
|
{
|
|
|
|
// BUG: UpdateEndpoints again, this is getting silly.
|
2021-04-30 21:47:16 +00:00
|
|
|
c.Assert([]string{"UpdateEndpoints"}, qt.DeepEquals, cc.getCalls())
|
2021-04-30 03:18:50 +00:00
|
|
|
|
|
|
|
// This time, backend should emit it to the UI right away,
|
|
|
|
// because the UI is anxiously awaiting a new URL to visit.
|
|
|
|
nn := notifies.drain(1)
|
2021-04-30 21:47:16 +00:00
|
|
|
c.Assert(nn[0].BrowseToURL, qt.Not(qt.IsNil))
|
|
|
|
c.Assert(url2, qt.Equals, *nn[0].BrowseToURL)
|
2021-04-30 03:18:50 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Pretend that the interactive login actually happened.
|
|
|
|
// Controlclient always sends the netmap and LoginFinished at the
|
|
|
|
// same time.
|
|
|
|
// The backend should propagate this upward for the UI.
|
|
|
|
t.Logf("\n\nLoginFinished")
|
2021-05-06 03:28:29 +00:00
|
|
|
notifies.expect(3)
|
2021-04-30 03:18:50 +00:00
|
|
|
cc.setAuthBlocked(false)
|
2021-05-06 03:28:29 +00:00
|
|
|
cc.persist.LoginName = "user1"
|
2021-04-30 03:18:50 +00:00
|
|
|
cc.send(nil, "", true, &netmap.NetworkMap{})
|
|
|
|
{
|
2021-05-06 03:28:29 +00:00
|
|
|
nn := notifies.drain(3)
|
2021-04-30 03:18:50 +00:00
|
|
|
// BUG: still too soon for UpdateEndpoints.
|
|
|
|
//
|
|
|
|
// Arguably it makes sense to unpause now, since the machine
|
|
|
|
// authorization status is part of the netmap.
|
|
|
|
//
|
|
|
|
// BUG: backend unblocks wgengine at this point, even though
|
|
|
|
// our machine key is not authorized. It probably should
|
|
|
|
// wait until it gets into Starting.
|
|
|
|
// TODO: (Currently this test doesn't detect that bug, but
|
|
|
|
// it's visible in the logs)
|
2021-04-30 21:47:16 +00:00
|
|
|
c.Assert([]string{"unpause", "UpdateEndpoints"}, qt.DeepEquals, cc.getCalls())
|
|
|
|
c.Assert(nn[0].LoginFinished, qt.Not(qt.IsNil))
|
2021-05-06 03:28:29 +00:00
|
|
|
c.Assert(nn[1].Prefs, qt.Not(qt.IsNil))
|
|
|
|
c.Assert(nn[2].State, qt.Not(qt.IsNil))
|
|
|
|
c.Assert(nn[1].Prefs.Persist.LoginName, qt.Equals, "user1")
|
|
|
|
c.Assert(ipn.NeedsMachineAuth, qt.Equals, *nn[2].State)
|
2021-04-30 03:18:50 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Pretend that the administrator has authorized our machine.
|
|
|
|
t.Logf("\n\nMachineAuthorized")
|
|
|
|
notifies.expect(1)
|
|
|
|
// BUG: the real controlclient sends LoginFinished with every
|
|
|
|
// notification while it's in StateAuthenticated, but not StateSynced.
|
|
|
|
// We should send it exactly once, or every time we're authenticated,
|
|
|
|
// but the current code is brittle.
|
|
|
|
// (ie. I suspect it would be better to change false->true in send()
|
|
|
|
// below, and do the same in the real controlclient.)
|
|
|
|
cc.send(nil, "", false, &netmap.NetworkMap{
|
|
|
|
MachineStatus: tailcfg.MachineAuthorized,
|
|
|
|
})
|
|
|
|
{
|
|
|
|
nn := notifies.drain(1)
|
2021-04-30 21:47:16 +00:00
|
|
|
c.Assert([]string{"unpause", "UpdateEndpoints"}, qt.DeepEquals, cc.getCalls())
|
|
|
|
c.Assert(nn[0].State, qt.Not(qt.IsNil))
|
|
|
|
c.Assert(ipn.Starting, qt.Equals, *nn[0].State)
|
2021-04-30 03:18:50 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// TODO: add a fake DERP server to our fake netmap, so we can
|
|
|
|
// transition to the Running state here.
|
|
|
|
|
|
|
|
// TODO: test what happens when the admin forcibly deletes our key.
|
|
|
|
// (ie. unsolicited logout)
|
|
|
|
|
|
|
|
// TODO: test what happens when our key expires, client side.
|
|
|
|
// (and when it gets close to expiring)
|
|
|
|
|
|
|
|
// The user changes their preference to !WantRunning.
|
|
|
|
t.Logf("\n\nWantRunning -> false")
|
|
|
|
notifies.expect(2)
|
|
|
|
b.EditPrefs(&ipn.MaskedPrefs{
|
|
|
|
WantRunningSet: true,
|
|
|
|
Prefs: ipn.Prefs{WantRunning: false},
|
|
|
|
})
|
|
|
|
{
|
|
|
|
nn := notifies.drain(2)
|
2021-04-30 21:47:16 +00:00
|
|
|
c.Assert([]string{"pause"}, qt.DeepEquals, cc.getCalls())
|
2021-04-30 03:18:50 +00:00
|
|
|
// BUG: I would expect Prefs to change first, and state after.
|
2021-04-30 21:47:16 +00:00
|
|
|
c.Assert(nn[0].State, qt.Not(qt.IsNil))
|
|
|
|
c.Assert(nn[1].Prefs, qt.Not(qt.IsNil))
|
|
|
|
c.Assert(ipn.Stopped, qt.Equals, *nn[0].State)
|
2021-04-30 03:18:50 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// The user changes their preference to WantRunning after all.
|
|
|
|
t.Logf("\n\nWantRunning -> true")
|
2021-07-12 03:10:02 +00:00
|
|
|
store.awaitWrite()
|
2021-04-30 03:18:50 +00:00
|
|
|
notifies.expect(2)
|
|
|
|
b.EditPrefs(&ipn.MaskedPrefs{
|
|
|
|
WantRunningSet: true,
|
|
|
|
Prefs: ipn.Prefs{WantRunning: true},
|
|
|
|
})
|
|
|
|
{
|
|
|
|
nn := notifies.drain(2)
|
|
|
|
// BUG: UpdateEndpoints isn't needed here.
|
|
|
|
// BUG: Login isn't needed here. We never logged out.
|
2021-04-30 21:47:16 +00:00
|
|
|
c.Assert([]string{"Login", "unpause", "UpdateEndpoints"}, qt.DeepEquals, cc.getCalls())
|
2021-04-30 03:18:50 +00:00
|
|
|
// BUG: I would expect Prefs to change first, and state after.
|
2021-04-30 21:47:16 +00:00
|
|
|
c.Assert(nn[0].State, qt.Not(qt.IsNil))
|
|
|
|
c.Assert(nn[1].Prefs, qt.Not(qt.IsNil))
|
|
|
|
c.Assert(ipn.Starting, qt.Equals, *nn[0].State)
|
2021-07-12 03:10:02 +00:00
|
|
|
c.Assert(store.sawWrite(), qt.IsTrue)
|
2021-04-30 03:18:50 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Test the fast-path frontend reconnection.
|
|
|
|
// This one is very finicky, so we have to force State==Running.
|
|
|
|
// TODO: actually get to State==Running, rather than cheating.
|
2021-04-30 07:47:21 +00:00
|
|
|
// That'll require spinning up a fake DERP server and putting it in
|
|
|
|
// the netmap.
|
2021-04-30 03:18:50 +00:00
|
|
|
t.Logf("\n\nFastpath Start()")
|
|
|
|
notifies.expect(1)
|
|
|
|
b.state = ipn.Running
|
2021-04-30 21:47:16 +00:00
|
|
|
c.Assert(b.Start(ipn.Options{StateKey: ipn.GlobalDaemonStateKey}), qt.IsNil)
|
2021-04-30 03:18:50 +00:00
|
|
|
{
|
|
|
|
nn := notifies.drain(1)
|
2021-04-30 21:47:16 +00:00
|
|
|
c.Assert(cc.getCalls(), qt.HasLen, 0)
|
|
|
|
c.Assert(nn[0].State, qt.Not(qt.IsNil))
|
|
|
|
c.Assert(nn[0].LoginFinished, qt.Not(qt.IsNil))
|
|
|
|
c.Assert(nn[0].NetMap, qt.Not(qt.IsNil))
|
2021-05-20 07:10:55 +00:00
|
|
|
c.Assert(nn[0].Prefs, qt.Not(qt.IsNil))
|
2021-04-30 03:18:50 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// undo the state hack above.
|
|
|
|
b.state = ipn.Starting
|
|
|
|
|
|
|
|
// User wants to logout.
|
2021-07-12 03:10:02 +00:00
|
|
|
store.awaitWrite()
|
2021-04-30 03:18:50 +00:00
|
|
|
t.Logf("\n\nLogout (async)")
|
2021-04-30 07:56:11 +00:00
|
|
|
notifies.expect(2)
|
2021-04-30 03:18:50 +00:00
|
|
|
b.Logout()
|
|
|
|
{
|
2021-04-30 07:56:11 +00:00
|
|
|
nn := notifies.drain(2)
|
ipnlocal: don't assume NeedsLogin immediately after StartLogout().
Previously, there was no server round trip required to log out, so when
you asked ipnlocal to Logout(), it could clear the netmap immediately
and switch to NeedsLogin state.
In v1.8, we added a true Logout operation. ipn.Logout() would trigger
an async cc.StartLogout() and *also* immediately switch to NeedsLogin.
Unfortunately, some frontends would see NeedsLogin and immediately
trigger a new StartInteractiveLogin() operation, before the
controlclient auth state machine actually acted on the Logout command,
thus accidentally invalidating the entire logout operation, retaining
the netmap, and violating the user's expectations.
Instead, add a new LogoutFinished signal from controlclient
(paralleling LoginFinished) and, upon starting a logout, don't update
the ipn state machine until it's received.
Updates: #1918 (BUG-2)
Signed-off-by: Avery Pennarun <apenwarr@tailscale.com>
2021-05-20 06:46:57 +00:00
|
|
|
c.Assert([]string{"pause", "StartLogout"}, qt.DeepEquals, cc.getCalls())
|
2021-04-30 21:47:16 +00:00
|
|
|
c.Assert(nn[0].State, qt.Not(qt.IsNil))
|
|
|
|
c.Assert(nn[1].Prefs, qt.Not(qt.IsNil))
|
ipnlocal: don't assume NeedsLogin immediately after StartLogout().
Previously, there was no server round trip required to log out, so when
you asked ipnlocal to Logout(), it could clear the netmap immediately
and switch to NeedsLogin state.
In v1.8, we added a true Logout operation. ipn.Logout() would trigger
an async cc.StartLogout() and *also* immediately switch to NeedsLogin.
Unfortunately, some frontends would see NeedsLogin and immediately
trigger a new StartInteractiveLogin() operation, before the
controlclient auth state machine actually acted on the Logout command,
thus accidentally invalidating the entire logout operation, retaining
the netmap, and violating the user's expectations.
Instead, add a new LogoutFinished signal from controlclient
(paralleling LoginFinished) and, upon starting a logout, don't update
the ipn state machine until it's received.
Updates: #1918 (BUG-2)
Signed-off-by: Avery Pennarun <apenwarr@tailscale.com>
2021-05-20 06:46:57 +00:00
|
|
|
c.Assert(ipn.Stopped, qt.Equals, *nn[0].State)
|
2021-04-30 21:47:16 +00:00
|
|
|
c.Assert(nn[1].Prefs.LoggedOut, qt.IsTrue)
|
|
|
|
c.Assert(nn[1].Prefs.WantRunning, qt.IsFalse)
|
ipnlocal: don't assume NeedsLogin immediately after StartLogout().
Previously, there was no server round trip required to log out, so when
you asked ipnlocal to Logout(), it could clear the netmap immediately
and switch to NeedsLogin state.
In v1.8, we added a true Logout operation. ipn.Logout() would trigger
an async cc.StartLogout() and *also* immediately switch to NeedsLogin.
Unfortunately, some frontends would see NeedsLogin and immediately
trigger a new StartInteractiveLogin() operation, before the
controlclient auth state machine actually acted on the Logout command,
thus accidentally invalidating the entire logout operation, retaining
the netmap, and violating the user's expectations.
Instead, add a new LogoutFinished signal from controlclient
(paralleling LoginFinished) and, upon starting a logout, don't update
the ipn state machine until it's received.
Updates: #1918 (BUG-2)
Signed-off-by: Avery Pennarun <apenwarr@tailscale.com>
2021-05-20 06:46:57 +00:00
|
|
|
c.Assert(ipn.Stopped, qt.Equals, b.State())
|
2021-07-12 03:10:02 +00:00
|
|
|
c.Assert(store.sawWrite(), qt.IsTrue)
|
2021-04-30 03:18:50 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Let's make the logout succeed.
|
2021-04-30 07:47:21 +00:00
|
|
|
t.Logf("\n\nLogout (async) - succeed")
|
ipnlocal: don't assume NeedsLogin immediately after StartLogout().
Previously, there was no server round trip required to log out, so when
you asked ipnlocal to Logout(), it could clear the netmap immediately
and switch to NeedsLogin state.
In v1.8, we added a true Logout operation. ipn.Logout() would trigger
an async cc.StartLogout() and *also* immediately switch to NeedsLogin.
Unfortunately, some frontends would see NeedsLogin and immediately
trigger a new StartInteractiveLogin() operation, before the
controlclient auth state machine actually acted on the Logout command,
thus accidentally invalidating the entire logout operation, retaining
the netmap, and violating the user's expectations.
Instead, add a new LogoutFinished signal from controlclient
(paralleling LoginFinished) and, upon starting a logout, don't update
the ipn state machine until it's received.
Updates: #1918 (BUG-2)
Signed-off-by: Avery Pennarun <apenwarr@tailscale.com>
2021-05-20 06:46:57 +00:00
|
|
|
notifies.expect(1)
|
2021-04-30 03:18:50 +00:00
|
|
|
cc.setAuthBlocked(true)
|
|
|
|
cc.send(nil, "", false, nil)
|
|
|
|
{
|
ipnlocal: don't assume NeedsLogin immediately after StartLogout().
Previously, there was no server round trip required to log out, so when
you asked ipnlocal to Logout(), it could clear the netmap immediately
and switch to NeedsLogin state.
In v1.8, we added a true Logout operation. ipn.Logout() would trigger
an async cc.StartLogout() and *also* immediately switch to NeedsLogin.
Unfortunately, some frontends would see NeedsLogin and immediately
trigger a new StartInteractiveLogin() operation, before the
controlclient auth state machine actually acted on the Logout command,
thus accidentally invalidating the entire logout operation, retaining
the netmap, and violating the user's expectations.
Instead, add a new LogoutFinished signal from controlclient
(paralleling LoginFinished) and, upon starting a logout, don't update
the ipn state machine until it's received.
Updates: #1918 (BUG-2)
Signed-off-by: Avery Pennarun <apenwarr@tailscale.com>
2021-05-20 06:46:57 +00:00
|
|
|
nn := notifies.drain(1)
|
|
|
|
c.Assert([]string{"unpause"}, qt.DeepEquals, cc.getCalls())
|
|
|
|
c.Assert(nn[0].State, qt.Not(qt.IsNil))
|
|
|
|
c.Assert(ipn.NeedsLogin, qt.Equals, *nn[0].State)
|
2021-05-06 03:28:29 +00:00
|
|
|
c.Assert(b.Prefs().LoggedOut, qt.IsTrue)
|
|
|
|
c.Assert(b.Prefs().WantRunning, qt.IsFalse)
|
2021-04-30 21:47:16 +00:00
|
|
|
c.Assert(ipn.NeedsLogin, qt.Equals, b.State())
|
2021-04-30 03:18:50 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// A second logout should do nothing, since the prefs haven't changed.
|
|
|
|
t.Logf("\n\nLogout2 (async)")
|
2021-05-06 03:28:29 +00:00
|
|
|
notifies.expect(0)
|
2021-04-30 03:18:50 +00:00
|
|
|
b.Logout()
|
|
|
|
{
|
2021-05-06 03:28:29 +00:00
|
|
|
notifies.drain(0)
|
2021-04-30 03:18:50 +00:00
|
|
|
// BUG: the backend has already called StartLogout, and we're
|
|
|
|
// still logged out. So it shouldn't call it again.
|
2021-04-30 21:47:16 +00:00
|
|
|
c.Assert([]string{"StartLogout"}, qt.DeepEquals, cc.getCalls())
|
2021-05-06 03:28:29 +00:00
|
|
|
c.Assert(cc.getCalls(), qt.HasLen, 0)
|
|
|
|
c.Assert(b.Prefs().LoggedOut, qt.IsTrue)
|
|
|
|
c.Assert(b.Prefs().WantRunning, qt.IsFalse)
|
2021-04-30 21:47:16 +00:00
|
|
|
c.Assert(ipn.NeedsLogin, qt.Equals, b.State())
|
2021-04-30 03:18:50 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Let's acknowledge the second logout too.
|
2021-04-30 07:47:21 +00:00
|
|
|
t.Logf("\n\nLogout2 (async) - succeed")
|
2021-05-06 03:28:29 +00:00
|
|
|
notifies.expect(0)
|
2021-04-30 03:18:50 +00:00
|
|
|
cc.setAuthBlocked(true)
|
|
|
|
cc.send(nil, "", false, nil)
|
|
|
|
{
|
2021-05-06 03:28:29 +00:00
|
|
|
notifies.drain(0)
|
2021-04-30 21:47:16 +00:00
|
|
|
c.Assert(cc.getCalls(), qt.HasLen, 0)
|
2021-05-06 03:28:29 +00:00
|
|
|
c.Assert(cc.getCalls(), qt.HasLen, 0)
|
|
|
|
c.Assert(b.Prefs().LoggedOut, qt.IsTrue)
|
|
|
|
c.Assert(b.Prefs().WantRunning, qt.IsFalse)
|
2021-04-30 21:47:16 +00:00
|
|
|
c.Assert(ipn.NeedsLogin, qt.Equals, b.State())
|
2021-04-30 03:18:50 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Try the synchronous logout feature.
|
|
|
|
t.Logf("\n\nLogout3 (sync)")
|
2021-05-06 03:28:29 +00:00
|
|
|
notifies.expect(0)
|
2021-04-30 03:18:50 +00:00
|
|
|
b.LogoutSync(context.Background())
|
|
|
|
// NOTE: This returns as soon as cc.Logout() returns, which is okay
|
|
|
|
// I guess, since that's supposed to be synchronous.
|
|
|
|
{
|
2021-05-06 03:28:29 +00:00
|
|
|
notifies.drain(0)
|
2021-04-30 21:47:16 +00:00
|
|
|
c.Assert([]string{"Logout"}, qt.DeepEquals, cc.getCalls())
|
2021-05-06 03:28:29 +00:00
|
|
|
c.Assert(cc.getCalls(), qt.HasLen, 0)
|
|
|
|
c.Assert(b.Prefs().LoggedOut, qt.IsTrue)
|
|
|
|
c.Assert(b.Prefs().WantRunning, qt.IsFalse)
|
2021-04-30 21:47:16 +00:00
|
|
|
c.Assert(ipn.NeedsLogin, qt.Equals, b.State())
|
2021-04-30 03:18:50 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Generate the third logout event.
|
2021-04-30 07:47:21 +00:00
|
|
|
t.Logf("\n\nLogout3 (sync) - succeed")
|
2021-05-06 03:28:29 +00:00
|
|
|
notifies.expect(0)
|
2021-04-30 03:18:50 +00:00
|
|
|
cc.setAuthBlocked(true)
|
|
|
|
cc.send(nil, "", false, nil)
|
|
|
|
{
|
2021-05-06 03:28:29 +00:00
|
|
|
notifies.drain(0)
|
2021-04-30 21:47:16 +00:00
|
|
|
c.Assert(cc.getCalls(), qt.HasLen, 0)
|
2021-05-06 03:28:29 +00:00
|
|
|
c.Assert(cc.getCalls(), qt.HasLen, 0)
|
|
|
|
c.Assert(b.Prefs().LoggedOut, qt.IsTrue)
|
|
|
|
c.Assert(b.Prefs().WantRunning, qt.IsFalse)
|
2021-04-30 21:47:16 +00:00
|
|
|
c.Assert(ipn.NeedsLogin, qt.Equals, b.State())
|
2021-04-30 03:18:50 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Shut down the backend.
|
|
|
|
t.Logf("\n\nShutdown")
|
|
|
|
notifies.expect(0)
|
|
|
|
b.Shutdown()
|
|
|
|
{
|
|
|
|
notifies.drain(0)
|
|
|
|
// BUG: I expect a transition to ipn.NoState here.
|
2021-04-30 21:47:16 +00:00
|
|
|
c.Assert(cc.getCalls(), qt.DeepEquals, []string{"Shutdown"})
|
2021-04-30 03:18:50 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Oh, you thought we were done? Ha! Now we have to test what
|
|
|
|
// happens if the user exits and restarts while logged out.
|
|
|
|
// Note that it's explicitly okay to call b.Start() over and over
|
|
|
|
// again, every time the frontend reconnects.
|
|
|
|
|
|
|
|
// TODO: test user switching between statekeys.
|
|
|
|
|
|
|
|
// The frontend restarts!
|
|
|
|
t.Logf("\n\nStart3")
|
|
|
|
notifies.expect(2)
|
2021-04-30 21:47:16 +00:00
|
|
|
c.Assert(b.Start(ipn.Options{StateKey: ipn.GlobalDaemonStateKey}), qt.IsNil)
|
2021-04-30 03:18:50 +00:00
|
|
|
{
|
|
|
|
// BUG: We already called Shutdown(), no need to do it again.
|
|
|
|
// BUG: Way too soon for UpdateEndpoints.
|
2021-04-30 07:56:11 +00:00
|
|
|
// BUG: don't unpause because we're not logged in.
|
2021-04-30 21:47:16 +00:00
|
|
|
c.Assert([]string{"Shutdown", "New", "UpdateEndpoints", "unpause"}, qt.DeepEquals, cc.getCalls())
|
2021-04-30 03:18:50 +00:00
|
|
|
|
|
|
|
nn := notifies.drain(2)
|
2021-04-30 21:47:16 +00:00
|
|
|
c.Assert(cc.getCalls(), qt.HasLen, 0)
|
|
|
|
c.Assert(nn[0].Prefs, qt.Not(qt.IsNil))
|
|
|
|
c.Assert(nn[1].State, qt.Not(qt.IsNil))
|
|
|
|
c.Assert(nn[0].Prefs.LoggedOut, qt.IsTrue)
|
2021-05-06 03:28:29 +00:00
|
|
|
c.Assert(nn[0].Prefs.WantRunning, qt.IsFalse)
|
2021-04-30 21:47:16 +00:00
|
|
|
c.Assert(ipn.NeedsLogin, qt.Equals, *nn[1].State)
|
|
|
|
c.Assert(ipn.NeedsLogin, qt.Equals, b.State())
|
2021-04-30 03:18:50 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Let's break the rules a little. Our control server accepts
|
|
|
|
// your invalid login attempt, with no need for an interactive login.
|
|
|
|
// (This simulates an admin reviving a key that you previously
|
|
|
|
// disabled.)
|
|
|
|
t.Logf("\n\nLoginFinished3")
|
2021-04-30 07:56:11 +00:00
|
|
|
notifies.expect(3)
|
2021-04-30 03:18:50 +00:00
|
|
|
cc.setAuthBlocked(false)
|
2021-05-06 03:28:29 +00:00
|
|
|
cc.persist.LoginName = "user2"
|
2021-04-30 03:18:50 +00:00
|
|
|
cc.send(nil, "", true, &netmap.NetworkMap{
|
|
|
|
MachineStatus: tailcfg.MachineAuthorized,
|
|
|
|
})
|
|
|
|
{
|
2021-04-30 07:56:11 +00:00
|
|
|
nn := notifies.drain(3)
|
2021-04-30 21:47:16 +00:00
|
|
|
c.Assert([]string{"unpause"}, qt.DeepEquals, cc.getCalls())
|
2021-05-06 03:28:29 +00:00
|
|
|
c.Assert(nn[0].LoginFinished, qt.Not(qt.IsNil))
|
|
|
|
c.Assert(nn[1].Prefs, qt.Not(qt.IsNil))
|
2021-04-30 21:47:16 +00:00
|
|
|
c.Assert(nn[2].State, qt.Not(qt.IsNil))
|
2021-05-06 03:28:29 +00:00
|
|
|
// Prefs after finishing the login, so LoginName updated.
|
|
|
|
c.Assert(nn[1].Prefs.Persist.LoginName, qt.Equals, "user2")
|
|
|
|
c.Assert(nn[1].Prefs.LoggedOut, qt.IsFalse)
|
|
|
|
c.Assert(nn[1].Prefs.WantRunning, qt.IsTrue)
|
2021-04-30 21:47:16 +00:00
|
|
|
c.Assert(ipn.Starting, qt.Equals, *nn[2].State)
|
2021-04-30 03:18:50 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Now we've logged in successfully. Let's disconnect.
|
|
|
|
t.Logf("\n\nWantRunning -> false")
|
|
|
|
notifies.expect(2)
|
|
|
|
b.EditPrefs(&ipn.MaskedPrefs{
|
|
|
|
WantRunningSet: true,
|
|
|
|
Prefs: ipn.Prefs{WantRunning: false},
|
|
|
|
})
|
|
|
|
{
|
|
|
|
nn := notifies.drain(2)
|
2021-04-30 21:47:16 +00:00
|
|
|
c.Assert([]string{"pause"}, qt.DeepEquals, cc.getCalls())
|
2021-04-30 03:18:50 +00:00
|
|
|
// BUG: I would expect Prefs to change first, and state after.
|
2021-04-30 21:47:16 +00:00
|
|
|
c.Assert(nn[0].State, qt.Not(qt.IsNil))
|
|
|
|
c.Assert(nn[1].Prefs, qt.Not(qt.IsNil))
|
|
|
|
c.Assert(ipn.Stopped, qt.Equals, *nn[0].State)
|
|
|
|
c.Assert(nn[1].Prefs.LoggedOut, qt.IsFalse)
|
2021-04-30 03:18:50 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// One more restart, this time with a valid key, but WantRunning=false.
|
|
|
|
t.Logf("\n\nStart4")
|
|
|
|
notifies.expect(2)
|
2021-04-30 21:47:16 +00:00
|
|
|
c.Assert(b.Start(ipn.Options{StateKey: ipn.GlobalDaemonStateKey}), qt.IsNil)
|
2021-04-30 03:18:50 +00:00
|
|
|
{
|
|
|
|
// NOTE: cc.Shutdown() is correct here, since we didn't call
|
|
|
|
// b.Shutdown() explicitly ourselves.
|
2021-04-30 07:56:11 +00:00
|
|
|
// BUG: UpdateEndpoints should be called here since we're not WantRunning.
|
2021-04-30 10:08:26 +00:00
|
|
|
// Note: unpause happens because ipn needs to get at least one netmap
|
|
|
|
// on startup, otherwise UIs can't show the node list, login
|
|
|
|
// name, etc when in state ipn.Stopped.
|
|
|
|
// Arguably they shouldn't try. But they currently do.
|
2021-04-30 21:47:16 +00:00
|
|
|
c.Assert([]string{"Shutdown", "New", "UpdateEndpoints", "Login", "unpause"}, qt.DeepEquals, cc.getCalls())
|
2021-04-30 03:18:50 +00:00
|
|
|
|
|
|
|
nn := notifies.drain(2)
|
2021-04-30 21:47:16 +00:00
|
|
|
c.Assert(cc.getCalls(), qt.HasLen, 0)
|
|
|
|
c.Assert(nn[0].Prefs, qt.Not(qt.IsNil))
|
|
|
|
c.Assert(nn[1].State, qt.Not(qt.IsNil))
|
|
|
|
c.Assert(nn[0].Prefs.WantRunning, qt.IsFalse)
|
|
|
|
c.Assert(nn[0].Prefs.LoggedOut, qt.IsFalse)
|
|
|
|
c.Assert(ipn.Stopped, qt.Equals, *nn[1].State)
|
2021-04-30 03:18:50 +00:00
|
|
|
}
|
|
|
|
|
2021-04-30 07:56:11 +00:00
|
|
|
// Request connection.
|
|
|
|
// The state machine didn't call Login() earlier, so now it needs to.
|
|
|
|
t.Logf("\n\nWantRunning4 -> true")
|
|
|
|
notifies.expect(2)
|
|
|
|
b.EditPrefs(&ipn.MaskedPrefs{
|
|
|
|
WantRunningSet: true,
|
|
|
|
Prefs: ipn.Prefs{WantRunning: true},
|
|
|
|
})
|
|
|
|
{
|
|
|
|
nn := notifies.drain(2)
|
2021-04-30 21:47:16 +00:00
|
|
|
c.Assert([]string{"Login", "unpause"}, qt.DeepEquals, cc.getCalls())
|
2021-04-30 07:56:11 +00:00
|
|
|
// BUG: I would expect Prefs to change first, and state after.
|
2021-04-30 21:47:16 +00:00
|
|
|
c.Assert(nn[0].State, qt.Not(qt.IsNil))
|
|
|
|
c.Assert(nn[1].Prefs, qt.Not(qt.IsNil))
|
|
|
|
c.Assert(ipn.Starting, qt.Equals, *nn[0].State)
|
2021-04-30 03:18:50 +00:00
|
|
|
}
|
|
|
|
|
2021-05-06 03:28:29 +00:00
|
|
|
// Disconnect.
|
|
|
|
t.Logf("\n\nStop")
|
|
|
|
notifies.expect(2)
|
|
|
|
b.EditPrefs(&ipn.MaskedPrefs{
|
|
|
|
WantRunningSet: true,
|
|
|
|
Prefs: ipn.Prefs{WantRunning: false},
|
|
|
|
})
|
|
|
|
{
|
|
|
|
nn := notifies.drain(2)
|
|
|
|
c.Assert([]string{"unpause"}, qt.DeepEquals, cc.getCalls())
|
|
|
|
// BUG: I would expect Prefs to change first, and state after.
|
|
|
|
c.Assert(nn[0].State, qt.Not(qt.IsNil))
|
|
|
|
c.Assert(nn[1].Prefs, qt.Not(qt.IsNil))
|
|
|
|
c.Assert(ipn.Stopped, qt.Equals, *nn[0].State)
|
|
|
|
}
|
|
|
|
|
|
|
|
// We want to try logging in as a different user, while Stopped.
|
|
|
|
// First, start the login process (without logging out first).
|
|
|
|
t.Logf("\n\nLoginDifferent")
|
|
|
|
notifies.expect(2)
|
|
|
|
b.StartLoginInteractive()
|
|
|
|
url3 := "http://localhost:1/3"
|
|
|
|
cc.send(nil, url3, false, nil)
|
|
|
|
{
|
|
|
|
nn := notifies.drain(2)
|
|
|
|
// It might seem like WantRunning should switch to true here,
|
|
|
|
// but that would be risky since we already have a valid
|
|
|
|
// user account. It might try to reconnect to the old account
|
|
|
|
// before the new one is ready. So no change yet.
|
|
|
|
c.Assert([]string{"Login", "unpause"}, qt.DeepEquals, cc.getCalls())
|
|
|
|
c.Assert(nn[0].BrowseToURL, qt.Not(qt.IsNil))
|
|
|
|
c.Assert(nn[1].State, qt.Not(qt.IsNil))
|
|
|
|
c.Assert(*nn[0].BrowseToURL, qt.Equals, url3)
|
|
|
|
c.Assert(ipn.NeedsLogin, qt.Equals, *nn[1].State)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Now, let's say the interactive login completed, using a different
|
|
|
|
// user account than before.
|
|
|
|
t.Logf("\n\nLoginDifferent URL visited")
|
|
|
|
notifies.expect(3)
|
|
|
|
cc.persist.LoginName = "user3"
|
|
|
|
cc.send(nil, "", true, &netmap.NetworkMap{
|
|
|
|
MachineStatus: tailcfg.MachineAuthorized,
|
|
|
|
})
|
|
|
|
{
|
|
|
|
nn := notifies.drain(3)
|
|
|
|
c.Assert([]string{"unpause"}, qt.DeepEquals, cc.getCalls())
|
|
|
|
c.Assert(nn[0].LoginFinished, qt.Not(qt.IsNil))
|
|
|
|
c.Assert(nn[1].Prefs, qt.Not(qt.IsNil))
|
|
|
|
c.Assert(nn[2].State, qt.Not(qt.IsNil))
|
|
|
|
// Prefs after finishing the login, so LoginName updated.
|
|
|
|
c.Assert(nn[1].Prefs.Persist.LoginName, qt.Equals, "user3")
|
|
|
|
c.Assert(nn[1].Prefs.LoggedOut, qt.IsFalse)
|
|
|
|
c.Assert(nn[1].Prefs.WantRunning, qt.IsTrue)
|
|
|
|
c.Assert(ipn.Starting, qt.Equals, *nn[2].State)
|
|
|
|
}
|
|
|
|
|
2021-04-30 03:18:50 +00:00
|
|
|
// The last test case is the most common one: restarting when both
|
|
|
|
// logged in and WantRunning.
|
|
|
|
t.Logf("\n\nStart5")
|
2021-04-30 09:27:37 +00:00
|
|
|
notifies.expect(1)
|
2021-04-30 21:47:16 +00:00
|
|
|
c.Assert(b.Start(ipn.Options{StateKey: ipn.GlobalDaemonStateKey}), qt.IsNil)
|
2021-04-30 03:18:50 +00:00
|
|
|
{
|
|
|
|
// NOTE: cc.Shutdown() is correct here, since we didn't call
|
|
|
|
// b.Shutdown() ourselves.
|
2021-04-30 21:47:16 +00:00
|
|
|
c.Assert([]string{"Shutdown", "New", "UpdateEndpoints", "Login"}, qt.DeepEquals, cc.getCalls())
|
2021-04-30 03:18:50 +00:00
|
|
|
|
2021-04-30 09:27:37 +00:00
|
|
|
nn := notifies.drain(1)
|
2021-04-30 21:47:16 +00:00
|
|
|
c.Assert(cc.getCalls(), qt.HasLen, 0)
|
|
|
|
c.Assert(nn[0].Prefs, qt.Not(qt.IsNil))
|
|
|
|
c.Assert(nn[0].Prefs.LoggedOut, qt.IsFalse)
|
|
|
|
c.Assert(nn[0].Prefs.WantRunning, qt.IsTrue)
|
|
|
|
c.Assert(ipn.NoState, qt.Equals, b.State())
|
2021-04-30 03:18:50 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Control server accepts our valid key from before.
|
|
|
|
t.Logf("\n\nLoginFinished5")
|
2021-05-06 03:28:29 +00:00
|
|
|
notifies.expect(1)
|
2021-04-30 03:18:50 +00:00
|
|
|
cc.setAuthBlocked(false)
|
|
|
|
cc.send(nil, "", true, &netmap.NetworkMap{
|
|
|
|
MachineStatus: tailcfg.MachineAuthorized,
|
|
|
|
})
|
|
|
|
{
|
2021-05-06 03:28:29 +00:00
|
|
|
nn := notifies.drain(1)
|
2021-04-30 21:47:16 +00:00
|
|
|
c.Assert([]string{"unpause"}, qt.DeepEquals, cc.getCalls())
|
2021-05-06 03:28:29 +00:00
|
|
|
// NOTE: No LoginFinished message since no interactive
|
|
|
|
// login was needed.
|
|
|
|
c.Assert(nn[0].State, qt.Not(qt.IsNil))
|
|
|
|
c.Assert(ipn.Starting, qt.Equals, *nn[0].State)
|
2021-04-30 03:18:50 +00:00
|
|
|
// NOTE: No prefs change this time. WantRunning stays true.
|
2021-04-30 07:56:11 +00:00
|
|
|
// We were in Starting in the first place, so that doesn't
|
|
|
|
// change either.
|
2021-04-30 21:47:16 +00:00
|
|
|
c.Assert(ipn.Starting, qt.Equals, b.State())
|
2021-04-30 03:18:50 +00:00
|
|
|
}
|
|
|
|
}
|
2021-07-12 03:10:02 +00:00
|
|
|
|
|
|
|
type testStateStorage struct {
|
|
|
|
mem ipn.MemoryStore
|
|
|
|
written syncs.AtomicBool
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *testStateStorage) ReadState(id ipn.StateKey) ([]byte, error) {
|
|
|
|
return s.mem.ReadState(id)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *testStateStorage) WriteState(id ipn.StateKey, bs []byte) error {
|
|
|
|
s.written.Set(true)
|
|
|
|
return s.mem.WriteState(id, bs)
|
|
|
|
}
|
|
|
|
|
|
|
|
// awaitWrite clears the "I've seen writes" bit, in prep for a future
|
|
|
|
// call to sawWrite to see if a write arrived.
|
|
|
|
func (s *testStateStorage) awaitWrite() { s.written.Set(false) }
|
|
|
|
|
|
|
|
// sawWrite reports whether there's been a WriteState call since the most
|
|
|
|
// recent awaitWrite call.
|
|
|
|
func (s *testStateStorage) sawWrite() bool {
|
|
|
|
v := s.written.Get()
|
|
|
|
s.awaitWrite()
|
|
|
|
return v
|
|
|
|
}
|