2023-01-27 21:37:20 +00:00
|
|
|
// Copyright (c) Tailscale Inc & AUTHORS
|
|
|
|
// SPDX-License-Identifier: BSD-3-Clause
|
2020-02-05 22:16:58 +00:00
|
|
|
|
|
|
|
package ipn
|
|
|
|
|
|
|
|
import (
|
2021-04-01 04:35:21 +00:00
|
|
|
"encoding/json"
|
2020-11-02 16:33:34 +00:00
|
|
|
"errors"
|
|
|
|
"fmt"
|
2022-07-26 03:55:44 +00:00
|
|
|
"net/netip"
|
2020-11-02 16:33:34 +00:00
|
|
|
"os"
|
2020-02-17 23:01:23 +00:00
|
|
|
"reflect"
|
2021-04-01 04:35:21 +00:00
|
|
|
"strings"
|
2020-02-05 22:16:58 +00:00
|
|
|
"testing"
|
2020-11-02 16:33:34 +00:00
|
|
|
"time"
|
2020-02-05 22:16:58 +00:00
|
|
|
|
2021-10-28 16:50:58 +00:00
|
|
|
"go4.org/mem"
|
2022-02-25 23:36:05 +00:00
|
|
|
"tailscale.com/ipn/ipnstate"
|
2022-07-25 03:08:42 +00:00
|
|
|
"tailscale.com/net/netaddr"
|
2021-02-25 05:18:08 +00:00
|
|
|
"tailscale.com/tailcfg"
|
Add tstest.PanicOnLog(), and fix various problems detected by this.
If a test calls log.Printf, 'go test' horrifyingly rearranges the
output to no longer be in chronological order, which makes debugging
virtually impossible. Let's stop that from happening by making
log.Printf panic if called from any module, no matter how deep, during
tests.
This required us to change the default error handler in at least one
http.Server, as well as plumbing a bunch of logf functions around,
especially in magicsock and wgengine, but also in logtail and backoff.
To add insult to injury, 'go test' also rearranges the output when a
parent test has multiple sub-tests (all the sub-test's t.Logf is always
printed after all the parent tests t.Logf), so we need to screw around
with a special Logf that can point at the "current" t (current_t.Logf)
in some places. Probably our entire way of using subtests is wrong,
since 'go test' would probably like to run them all in parallel if you
called t.Parallel(), but it definitely can't because the're all
manipulating the shared state created by the parent test. They should
probably all be separate toplevel tests instead, with common
setup/teardown logic. But that's a job for another time.
Signed-off-by: Avery Pennarun <apenwarr@tailscale.com>
2020-05-14 02:59:54 +00:00
|
|
|
"tailscale.com/tstest"
|
2021-10-28 16:50:58 +00:00
|
|
|
"tailscale.com/types/key"
|
2021-02-05 23:23:01 +00:00
|
|
|
"tailscale.com/types/persist"
|
2021-02-04 21:12:42 +00:00
|
|
|
"tailscale.com/types/preftype"
|
2020-02-05 22:16:58 +00:00
|
|
|
)
|
|
|
|
|
2020-02-17 23:01:23 +00:00
|
|
|
func fieldsOf(t reflect.Type) (fields []string) {
|
|
|
|
for i := 0; i < t.NumField(); i++ {
|
|
|
|
fields = append(fields, t.Field(i).Name)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestPrefsEqual(t *testing.T) {
|
Add tstest.PanicOnLog(), and fix various problems detected by this.
If a test calls log.Printf, 'go test' horrifyingly rearranges the
output to no longer be in chronological order, which makes debugging
virtually impossible. Let's stop that from happening by making
log.Printf panic if called from any module, no matter how deep, during
tests.
This required us to change the default error handler in at least one
http.Server, as well as plumbing a bunch of logf functions around,
especially in magicsock and wgengine, but also in logtail and backoff.
To add insult to injury, 'go test' also rearranges the output when a
parent test has multiple sub-tests (all the sub-test's t.Logf is always
printed after all the parent tests t.Logf), so we need to screw around
with a special Logf that can point at the "current" t (current_t.Logf)
in some places. Probably our entire way of using subtests is wrong,
since 'go test' would probably like to run them all in parallel if you
called t.Parallel(), but it definitely can't because the're all
manipulating the shared state created by the parent test. They should
probably all be separate toplevel tests instead, with common
setup/teardown logic. But that's a job for another time.
Signed-off-by: Avery Pennarun <apenwarr@tailscale.com>
2020-05-14 02:59:54 +00:00
|
|
|
tstest.PanicOnLog()
|
|
|
|
|
2021-04-17 04:01:29 +00:00
|
|
|
prefsHandles := []string{
|
|
|
|
"ControlURL",
|
|
|
|
"RouteAll",
|
|
|
|
"AllowSingleHosts",
|
|
|
|
"ExitNodeID",
|
|
|
|
"ExitNodeIP",
|
|
|
|
"ExitNodeAllowLANAccess",
|
|
|
|
"CorpDNS",
|
2021-08-26 21:50:55 +00:00
|
|
|
"RunSSH",
|
2023-10-26 18:35:41 +00:00
|
|
|
"RunWebClient",
|
2021-04-17 04:01:29 +00:00
|
|
|
"WantRunning",
|
2021-04-30 07:56:11 +00:00
|
|
|
"LoggedOut",
|
2021-04-17 04:01:29 +00:00
|
|
|
"ShieldsUp",
|
|
|
|
"AdvertiseTags",
|
|
|
|
"Hostname",
|
|
|
|
"NotepadURLs",
|
|
|
|
"ForceDaemon",
|
2022-09-01 16:27:06 +00:00
|
|
|
"Egg",
|
2021-04-17 04:01:29 +00:00
|
|
|
"AdvertiseRoutes",
|
|
|
|
"NoSNAT",
|
|
|
|
"NetfilterMode",
|
|
|
|
"OperatorUser",
|
2022-11-18 09:42:32 +00:00
|
|
|
"ProfileName",
|
2023-09-01 20:45:12 +00:00
|
|
|
"AutoUpdate",
|
2023-10-26 22:55:32 +00:00
|
|
|
"AppConnector",
|
2023-10-03 09:46:24 +00:00
|
|
|
"PostureChecking",
|
2023-12-04 17:08:56 +00:00
|
|
|
"NetfilterKind",
|
2021-04-17 04:01:29 +00:00
|
|
|
"Persist",
|
|
|
|
}
|
2020-02-17 23:01:23 +00:00
|
|
|
if have := fieldsOf(reflect.TypeOf(Prefs{})); !reflect.DeepEqual(have, prefsHandles) {
|
|
|
|
t.Errorf("Prefs.Equal check might be out of sync\nfields: %q\nhandled: %q\n",
|
|
|
|
have, prefsHandles)
|
|
|
|
}
|
|
|
|
|
all: convert more code to use net/netip directly
perl -i -npe 's,netaddr.IPPrefixFrom,netip.PrefixFrom,' $(git grep -l -F netaddr.)
perl -i -npe 's,netaddr.IPPortFrom,netip.AddrPortFrom,' $(git grep -l -F netaddr. )
perl -i -npe 's,netaddr.IPPrefix,netip.Prefix,g' $(git grep -l -F netaddr. )
perl -i -npe 's,netaddr.IPPort,netip.AddrPort,g' $(git grep -l -F netaddr. )
perl -i -npe 's,netaddr.IP\b,netip.Addr,g' $(git grep -l -F netaddr. )
perl -i -npe 's,netaddr.IPv6Raw\b,netip.AddrFrom16,g' $(git grep -l -F netaddr. )
goimports -w .
Then delete some stuff from the net/netaddr shim package which is no
longer neeed.
Updates #5162
Change-Id: Ia7a86893fe21c7e3ee1ec823e8aba288d4566cd8
Signed-off-by: Brad Fitzpatrick <bradfitz@tailscale.com>
2022-07-26 04:14:09 +00:00
|
|
|
nets := func(strs ...string) (ns []netip.Prefix) {
|
2020-02-17 23:01:23 +00:00
|
|
|
for _, s := range strs {
|
2022-07-26 03:55:44 +00:00
|
|
|
n, err := netip.ParsePrefix(s)
|
2020-02-17 23:01:23 +00:00
|
|
|
if err != nil {
|
|
|
|
panic(err)
|
|
|
|
}
|
2020-03-17 03:27:00 +00:00
|
|
|
ns = append(ns, n)
|
2020-02-17 23:01:23 +00:00
|
|
|
}
|
|
|
|
return ns
|
|
|
|
}
|
|
|
|
tests := []struct {
|
|
|
|
a, b *Prefs
|
|
|
|
want bool
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
&Prefs{},
|
|
|
|
nil,
|
|
|
|
false,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
nil,
|
|
|
|
&Prefs{},
|
|
|
|
false,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
&Prefs{},
|
|
|
|
&Prefs{},
|
|
|
|
true,
|
|
|
|
},
|
|
|
|
|
2020-02-19 05:03:22 +00:00
|
|
|
{
|
2021-06-25 14:05:46 +00:00
|
|
|
&Prefs{ControlURL: "https://controlplane.tailscale.com"},
|
2020-02-19 05:03:22 +00:00
|
|
|
&Prefs{ControlURL: "https://login.private.co"},
|
|
|
|
false,
|
|
|
|
},
|
|
|
|
{
|
2021-06-25 14:05:46 +00:00
|
|
|
&Prefs{ControlURL: "https://controlplane.tailscale.com"},
|
|
|
|
&Prefs{ControlURL: "https://controlplane.tailscale.com"},
|
2020-02-19 05:03:22 +00:00
|
|
|
true,
|
|
|
|
},
|
|
|
|
|
2020-02-17 23:01:23 +00:00
|
|
|
{
|
|
|
|
&Prefs{RouteAll: true},
|
|
|
|
&Prefs{RouteAll: false},
|
|
|
|
false,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
&Prefs{RouteAll: true},
|
|
|
|
&Prefs{RouteAll: true},
|
|
|
|
true,
|
|
|
|
},
|
|
|
|
|
|
|
|
{
|
|
|
|
&Prefs{AllowSingleHosts: true},
|
|
|
|
&Prefs{AllowSingleHosts: false},
|
|
|
|
false,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
&Prefs{AllowSingleHosts: true},
|
|
|
|
&Prefs{AllowSingleHosts: true},
|
|
|
|
true,
|
|
|
|
},
|
|
|
|
|
2021-01-21 01:24:16 +00:00
|
|
|
{
|
|
|
|
&Prefs{ExitNodeID: "n1234"},
|
|
|
|
&Prefs{},
|
|
|
|
false,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
&Prefs{ExitNodeID: "n1234"},
|
|
|
|
&Prefs{ExitNodeID: "n1234"},
|
|
|
|
true,
|
|
|
|
},
|
|
|
|
|
|
|
|
{
|
2022-07-26 03:55:44 +00:00
|
|
|
&Prefs{ExitNodeIP: netip.MustParseAddr("1.2.3.4")},
|
2021-01-21 01:24:16 +00:00
|
|
|
&Prefs{},
|
|
|
|
false,
|
|
|
|
},
|
|
|
|
{
|
2022-07-26 03:55:44 +00:00
|
|
|
&Prefs{ExitNodeIP: netip.MustParseAddr("1.2.3.4")},
|
|
|
|
&Prefs{ExitNodeIP: netip.MustParseAddr("1.2.3.4")},
|
2021-01-21 01:24:16 +00:00
|
|
|
true,
|
|
|
|
},
|
|
|
|
|
2021-04-08 22:56:51 +00:00
|
|
|
{
|
|
|
|
&Prefs{},
|
|
|
|
&Prefs{ExitNodeAllowLANAccess: true},
|
|
|
|
false,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
&Prefs{ExitNodeAllowLANAccess: true},
|
|
|
|
&Prefs{ExitNodeAllowLANAccess: true},
|
|
|
|
true,
|
|
|
|
},
|
|
|
|
|
2020-02-17 23:01:23 +00:00
|
|
|
{
|
|
|
|
&Prefs{CorpDNS: true},
|
|
|
|
&Prefs{CorpDNS: false},
|
|
|
|
false,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
&Prefs{CorpDNS: true},
|
|
|
|
&Prefs{CorpDNS: true},
|
|
|
|
true,
|
|
|
|
},
|
|
|
|
|
|
|
|
{
|
|
|
|
&Prefs{WantRunning: true},
|
|
|
|
&Prefs{WantRunning: false},
|
|
|
|
false,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
&Prefs{WantRunning: true},
|
|
|
|
&Prefs{WantRunning: true},
|
|
|
|
true,
|
|
|
|
},
|
|
|
|
|
2020-05-11 20:16:52 +00:00
|
|
|
{
|
|
|
|
&Prefs{NoSNAT: true},
|
|
|
|
&Prefs{NoSNAT: false},
|
|
|
|
false,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
&Prefs{NoSNAT: true},
|
|
|
|
&Prefs{NoSNAT: true},
|
|
|
|
true,
|
|
|
|
},
|
|
|
|
|
2020-06-02 16:12:05 +00:00
|
|
|
{
|
|
|
|
&Prefs{Hostname: "android-host01"},
|
|
|
|
&Prefs{Hostname: "android-host02"},
|
|
|
|
false,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
&Prefs{Hostname: ""},
|
|
|
|
&Prefs{Hostname: ""},
|
|
|
|
true,
|
|
|
|
},
|
|
|
|
|
2020-02-17 23:01:23 +00:00
|
|
|
{
|
|
|
|
&Prefs{NotepadURLs: true},
|
|
|
|
&Prefs{NotepadURLs: false},
|
|
|
|
false,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
&Prefs{NotepadURLs: true},
|
|
|
|
&Prefs{NotepadURLs: true},
|
|
|
|
true,
|
|
|
|
},
|
|
|
|
|
|
|
|
{
|
2020-04-29 06:37:35 +00:00
|
|
|
&Prefs{ShieldsUp: true},
|
|
|
|
&Prefs{ShieldsUp: false},
|
2020-02-17 23:01:23 +00:00
|
|
|
false,
|
|
|
|
},
|
|
|
|
{
|
2020-04-29 06:37:35 +00:00
|
|
|
&Prefs{ShieldsUp: true},
|
|
|
|
&Prefs{ShieldsUp: true},
|
2020-02-17 23:01:23 +00:00
|
|
|
true,
|
|
|
|
},
|
|
|
|
|
|
|
|
{
|
|
|
|
&Prefs{AdvertiseRoutes: nil},
|
all: convert more code to use net/netip directly
perl -i -npe 's,netaddr.IPPrefixFrom,netip.PrefixFrom,' $(git grep -l -F netaddr.)
perl -i -npe 's,netaddr.IPPortFrom,netip.AddrPortFrom,' $(git grep -l -F netaddr. )
perl -i -npe 's,netaddr.IPPrefix,netip.Prefix,g' $(git grep -l -F netaddr. )
perl -i -npe 's,netaddr.IPPort,netip.AddrPort,g' $(git grep -l -F netaddr. )
perl -i -npe 's,netaddr.IP\b,netip.Addr,g' $(git grep -l -F netaddr. )
perl -i -npe 's,netaddr.IPv6Raw\b,netip.AddrFrom16,g' $(git grep -l -F netaddr. )
goimports -w .
Then delete some stuff from the net/netaddr shim package which is no
longer neeed.
Updates #5162
Change-Id: Ia7a86893fe21c7e3ee1ec823e8aba288d4566cd8
Signed-off-by: Brad Fitzpatrick <bradfitz@tailscale.com>
2022-07-26 04:14:09 +00:00
|
|
|
&Prefs{AdvertiseRoutes: []netip.Prefix{}},
|
2020-02-17 23:01:23 +00:00
|
|
|
true,
|
|
|
|
},
|
|
|
|
{
|
all: convert more code to use net/netip directly
perl -i -npe 's,netaddr.IPPrefixFrom,netip.PrefixFrom,' $(git grep -l -F netaddr.)
perl -i -npe 's,netaddr.IPPortFrom,netip.AddrPortFrom,' $(git grep -l -F netaddr. )
perl -i -npe 's,netaddr.IPPrefix,netip.Prefix,g' $(git grep -l -F netaddr. )
perl -i -npe 's,netaddr.IPPort,netip.AddrPort,g' $(git grep -l -F netaddr. )
perl -i -npe 's,netaddr.IP\b,netip.Addr,g' $(git grep -l -F netaddr. )
perl -i -npe 's,netaddr.IPv6Raw\b,netip.AddrFrom16,g' $(git grep -l -F netaddr. )
goimports -w .
Then delete some stuff from the net/netaddr shim package which is no
longer neeed.
Updates #5162
Change-Id: Ia7a86893fe21c7e3ee1ec823e8aba288d4566cd8
Signed-off-by: Brad Fitzpatrick <bradfitz@tailscale.com>
2022-07-26 04:14:09 +00:00
|
|
|
&Prefs{AdvertiseRoutes: []netip.Prefix{}},
|
|
|
|
&Prefs{AdvertiseRoutes: []netip.Prefix{}},
|
2020-02-17 23:01:23 +00:00
|
|
|
true,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
&Prefs{AdvertiseRoutes: nets("192.168.0.0/24", "10.1.0.0/16")},
|
|
|
|
&Prefs{AdvertiseRoutes: nets("192.168.1.0/24", "10.2.0.0/16")},
|
|
|
|
false,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
&Prefs{AdvertiseRoutes: nets("192.168.0.0/24", "10.1.0.0/16")},
|
|
|
|
&Prefs{AdvertiseRoutes: nets("192.168.0.0/24", "10.2.0.0/16")},
|
|
|
|
false,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
&Prefs{AdvertiseRoutes: nets("192.168.0.0/24", "10.1.0.0/16")},
|
|
|
|
&Prefs{AdvertiseRoutes: nets("192.168.0.0/24", "10.1.0.0/16")},
|
|
|
|
true,
|
|
|
|
},
|
|
|
|
|
2020-05-13 22:35:22 +00:00
|
|
|
{
|
2021-02-04 21:12:42 +00:00
|
|
|
&Prefs{NetfilterMode: preftype.NetfilterOff},
|
|
|
|
&Prefs{NetfilterMode: preftype.NetfilterOn},
|
2020-05-13 22:35:22 +00:00
|
|
|
false,
|
|
|
|
},
|
|
|
|
{
|
2021-02-04 21:12:42 +00:00
|
|
|
&Prefs{NetfilterMode: preftype.NetfilterOn},
|
|
|
|
&Prefs{NetfilterMode: preftype.NetfilterOn},
|
2020-05-13 22:35:22 +00:00
|
|
|
true,
|
|
|
|
},
|
|
|
|
|
2020-02-17 23:01:23 +00:00
|
|
|
{
|
2021-02-05 23:23:01 +00:00
|
|
|
&Prefs{Persist: &persist.Persist{}},
|
2023-08-04 00:38:28 +00:00
|
|
|
&Prefs{Persist: &persist.Persist{
|
|
|
|
UserProfile: tailcfg.UserProfile{LoginName: "dave"},
|
|
|
|
}},
|
2020-02-17 23:01:23 +00:00
|
|
|
false,
|
|
|
|
},
|
|
|
|
{
|
2023-08-04 00:38:28 +00:00
|
|
|
&Prefs{Persist: &persist.Persist{
|
|
|
|
UserProfile: tailcfg.UserProfile{LoginName: "dave"},
|
|
|
|
}},
|
|
|
|
&Prefs{Persist: &persist.Persist{
|
|
|
|
UserProfile: tailcfg.UserProfile{LoginName: "dave"},
|
|
|
|
}},
|
2020-02-17 23:01:23 +00:00
|
|
|
true,
|
|
|
|
},
|
2022-11-18 09:42:32 +00:00
|
|
|
{
|
|
|
|
&Prefs{ProfileName: "work"},
|
|
|
|
&Prefs{ProfileName: "work"},
|
|
|
|
true,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
&Prefs{ProfileName: "work"},
|
|
|
|
&Prefs{ProfileName: "home"},
|
|
|
|
false,
|
|
|
|
},
|
2023-09-01 20:45:12 +00:00
|
|
|
{
|
|
|
|
&Prefs{AutoUpdate: AutoUpdatePrefs{Check: true, Apply: false}},
|
|
|
|
&Prefs{AutoUpdate: AutoUpdatePrefs{Check: false, Apply: false}},
|
|
|
|
false,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
&Prefs{AutoUpdate: AutoUpdatePrefs{Check: true, Apply: true}},
|
|
|
|
&Prefs{AutoUpdate: AutoUpdatePrefs{Check: true, Apply: false}},
|
|
|
|
false,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
&Prefs{AutoUpdate: AutoUpdatePrefs{Check: true, Apply: false}},
|
|
|
|
&Prefs{AutoUpdate: AutoUpdatePrefs{Check: true, Apply: false}},
|
|
|
|
true,
|
|
|
|
},
|
2023-10-26 22:55:32 +00:00
|
|
|
{
|
|
|
|
&Prefs{AppConnector: AppConnectorPrefs{Advertise: true}},
|
|
|
|
&Prefs{AppConnector: AppConnectorPrefs{Advertise: true}},
|
|
|
|
true,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
&Prefs{AppConnector: AppConnectorPrefs{Advertise: true}},
|
|
|
|
&Prefs{AppConnector: AppConnectorPrefs{Advertise: false}},
|
|
|
|
false,
|
|
|
|
},
|
2023-10-03 09:46:24 +00:00
|
|
|
{
|
|
|
|
&Prefs{PostureChecking: true},
|
|
|
|
&Prefs{PostureChecking: true},
|
|
|
|
true,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
&Prefs{PostureChecking: true},
|
|
|
|
&Prefs{PostureChecking: false},
|
|
|
|
false,
|
|
|
|
},
|
2023-12-04 17:08:56 +00:00
|
|
|
{
|
|
|
|
&Prefs{NetfilterKind: "iptables"},
|
|
|
|
&Prefs{NetfilterKind: "iptables"},
|
|
|
|
true,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
&Prefs{NetfilterKind: "nftables"},
|
|
|
|
&Prefs{NetfilterKind: ""},
|
|
|
|
false,
|
|
|
|
},
|
2020-02-17 23:01:23 +00:00
|
|
|
}
|
|
|
|
for i, tt := range tests {
|
|
|
|
got := tt.a.Equals(tt.b)
|
|
|
|
if got != tt.want {
|
|
|
|
t.Errorf("%d. Equal = %v; want %v", i, got, tt.want)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-02-05 22:16:58 +00:00
|
|
|
func checkPrefs(t *testing.T, p Prefs) {
|
|
|
|
var err error
|
2020-02-20 19:07:00 +00:00
|
|
|
var p2, p2c *Prefs
|
|
|
|
var p2b *Prefs
|
2020-02-05 22:16:58 +00:00
|
|
|
|
|
|
|
pp := p.Pretty()
|
|
|
|
if pp == "" {
|
|
|
|
t.Fatalf("default p.Pretty() failed\n")
|
|
|
|
}
|
|
|
|
t.Logf("\npp: %#v\n", pp)
|
|
|
|
b := p.ToBytes()
|
|
|
|
if len(b) == 0 {
|
|
|
|
t.Fatalf("default p.ToBytes() failed\n")
|
|
|
|
}
|
2020-02-11 07:28:44 +00:00
|
|
|
if !p.Equals(&p) {
|
2020-02-05 22:16:58 +00:00
|
|
|
t.Fatalf("p != p\n")
|
|
|
|
}
|
2020-02-27 20:20:29 +00:00
|
|
|
p2 = p.Clone()
|
2020-02-05 22:16:58 +00:00
|
|
|
p2.RouteAll = true
|
2020-02-20 19:07:00 +00:00
|
|
|
if p.Equals(p2) {
|
2020-02-05 22:16:58 +00:00
|
|
|
t.Fatalf("p == p2\n")
|
|
|
|
}
|
2022-04-29 21:08:26 +00:00
|
|
|
p2b, err = PrefsFromBytes(p2.ToBytes())
|
2020-02-05 22:16:58 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("PrefsFromBytes(p2) failed\n")
|
|
|
|
}
|
|
|
|
p2p := p2.Pretty()
|
|
|
|
p2bp := p2b.Pretty()
|
|
|
|
t.Logf("\np2p: %#v\np2bp: %#v\n", p2p, p2bp)
|
|
|
|
if p2p != p2bp {
|
|
|
|
t.Fatalf("p2p != p2bp\n%#v\n%#v\n", p2p, p2bp)
|
|
|
|
}
|
2020-02-20 19:07:00 +00:00
|
|
|
if !p2.Equals(p2b) {
|
2020-02-05 22:16:58 +00:00
|
|
|
t.Fatalf("p2 != p2b\n%#v\n%#v\n", p2, p2b)
|
|
|
|
}
|
2020-02-27 20:20:29 +00:00
|
|
|
p2c = p2.Clone()
|
2020-02-20 19:07:00 +00:00
|
|
|
if !p2b.Equals(p2c) {
|
2020-02-05 22:16:58 +00:00
|
|
|
t.Fatalf("p2b != p2c\n")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestBasicPrefs(t *testing.T) {
|
Add tstest.PanicOnLog(), and fix various problems detected by this.
If a test calls log.Printf, 'go test' horrifyingly rearranges the
output to no longer be in chronological order, which makes debugging
virtually impossible. Let's stop that from happening by making
log.Printf panic if called from any module, no matter how deep, during
tests.
This required us to change the default error handler in at least one
http.Server, as well as plumbing a bunch of logf functions around,
especially in magicsock and wgengine, but also in logtail and backoff.
To add insult to injury, 'go test' also rearranges the output when a
parent test has multiple sub-tests (all the sub-test's t.Logf is always
printed after all the parent tests t.Logf), so we need to screw around
with a special Logf that can point at the "current" t (current_t.Logf)
in some places. Probably our entire way of using subtests is wrong,
since 'go test' would probably like to run them all in parallel if you
called t.Parallel(), but it definitely can't because the're all
manipulating the shared state created by the parent test. They should
probably all be separate toplevel tests instead, with common
setup/teardown logic. But that's a job for another time.
Signed-off-by: Avery Pennarun <apenwarr@tailscale.com>
2020-05-14 02:59:54 +00:00
|
|
|
tstest.PanicOnLog()
|
|
|
|
|
2020-02-19 05:03:22 +00:00
|
|
|
p := Prefs{
|
2021-06-25 14:05:46 +00:00
|
|
|
ControlURL: "https://controlplane.tailscale.com",
|
2020-02-19 05:03:22 +00:00
|
|
|
}
|
2020-02-05 22:16:58 +00:00
|
|
|
checkPrefs(t, p)
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestPrefsPersist(t *testing.T) {
|
Add tstest.PanicOnLog(), and fix various problems detected by this.
If a test calls log.Printf, 'go test' horrifyingly rearranges the
output to no longer be in chronological order, which makes debugging
virtually impossible. Let's stop that from happening by making
log.Printf panic if called from any module, no matter how deep, during
tests.
This required us to change the default error handler in at least one
http.Server, as well as plumbing a bunch of logf functions around,
especially in magicsock and wgengine, but also in logtail and backoff.
To add insult to injury, 'go test' also rearranges the output when a
parent test has multiple sub-tests (all the sub-test's t.Logf is always
printed after all the parent tests t.Logf), so we need to screw around
with a special Logf that can point at the "current" t (current_t.Logf)
in some places. Probably our entire way of using subtests is wrong,
since 'go test' would probably like to run them all in parallel if you
called t.Parallel(), but it definitely can't because the're all
manipulating the shared state created by the parent test. They should
probably all be separate toplevel tests instead, with common
setup/teardown logic. But that's a job for another time.
Signed-off-by: Avery Pennarun <apenwarr@tailscale.com>
2020-05-14 02:59:54 +00:00
|
|
|
tstest.PanicOnLog()
|
|
|
|
|
2021-02-05 23:23:01 +00:00
|
|
|
c := persist.Persist{
|
2023-08-04 00:38:28 +00:00
|
|
|
UserProfile: tailcfg.UserProfile{
|
|
|
|
LoginName: "test@example.com",
|
|
|
|
},
|
2020-02-05 22:16:58 +00:00
|
|
|
}
|
|
|
|
p := Prefs{
|
2021-06-25 14:05:46 +00:00
|
|
|
ControlURL: "https://controlplane.tailscale.com",
|
2020-02-19 05:03:22 +00:00
|
|
|
CorpDNS: true,
|
|
|
|
Persist: &c,
|
2020-02-05 22:16:58 +00:00
|
|
|
}
|
|
|
|
checkPrefs(t, p)
|
|
|
|
}
|
ipn, ipnserver, cmd/tailscale: add "server mode" support on Windows
This partially (but not yet fully) migrates Windows to tailscaled's
StateStore storage system.
This adds a new bool Pref, ForceDaemon, defined as:
// ForceDaemon specifies whether a platform that normally
// operates in "client mode" (that is, requires an active user
// logged in with the GUI app running) should keep running after the
// GUI ends and/or the user logs out.
//
// The only current applicable platform is Windows. This
// forced Windows to go into "server mode" where Tailscale is
// running even with no users logged in. This might also be
// used for macOS in the future. This setting has no effect
// for Linux/etc, which always operate in daemon mode.
Then, when ForceDaemon becomes true, we now write use the StateStore
to track which user started it in server mode, and store their prefs
under that key.
The ipnserver validates the connections/identities and informs that
LocalBackend which userid is currently in charge.
The GUI can then enable/disable server mode at runtime, without using
the CLI.
But the "tailscale up" CLI was also fixed, so Windows users can use
authkeys or ACL tags, etc.
Updates #275
2020-10-12 21:28:21 +00:00
|
|
|
|
|
|
|
func TestPrefsPretty(t *testing.T) {
|
|
|
|
tests := []struct {
|
|
|
|
p Prefs
|
|
|
|
os string
|
|
|
|
want string
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
Prefs{},
|
|
|
|
"linux",
|
2023-09-01 20:45:12 +00:00
|
|
|
"Prefs{ra=false mesh=false dns=false want=false routes=[] nf=off update=off Persist=nil}",
|
ipn, ipnserver, cmd/tailscale: add "server mode" support on Windows
This partially (but not yet fully) migrates Windows to tailscaled's
StateStore storage system.
This adds a new bool Pref, ForceDaemon, defined as:
// ForceDaemon specifies whether a platform that normally
// operates in "client mode" (that is, requires an active user
// logged in with the GUI app running) should keep running after the
// GUI ends and/or the user logs out.
//
// The only current applicable platform is Windows. This
// forced Windows to go into "server mode" where Tailscale is
// running even with no users logged in. This might also be
// used for macOS in the future. This setting has no effect
// for Linux/etc, which always operate in daemon mode.
Then, when ForceDaemon becomes true, we now write use the StateStore
to track which user started it in server mode, and store their prefs
under that key.
The ipnserver validates the connections/identities and informs that
LocalBackend which userid is currently in charge.
The GUI can then enable/disable server mode at runtime, without using
the CLI.
But the "tailscale up" CLI was also fixed, so Windows users can use
authkeys or ACL tags, etc.
Updates #275
2020-10-12 21:28:21 +00:00
|
|
|
},
|
|
|
|
{
|
|
|
|
Prefs{},
|
|
|
|
"windows",
|
2023-09-01 20:45:12 +00:00
|
|
|
"Prefs{ra=false mesh=false dns=false want=false update=off Persist=nil}",
|
ipn, ipnserver, cmd/tailscale: add "server mode" support on Windows
This partially (but not yet fully) migrates Windows to tailscaled's
StateStore storage system.
This adds a new bool Pref, ForceDaemon, defined as:
// ForceDaemon specifies whether a platform that normally
// operates in "client mode" (that is, requires an active user
// logged in with the GUI app running) should keep running after the
// GUI ends and/or the user logs out.
//
// The only current applicable platform is Windows. This
// forced Windows to go into "server mode" where Tailscale is
// running even with no users logged in. This might also be
// used for macOS in the future. This setting has no effect
// for Linux/etc, which always operate in daemon mode.
Then, when ForceDaemon becomes true, we now write use the StateStore
to track which user started it in server mode, and store their prefs
under that key.
The ipnserver validates the connections/identities and informs that
LocalBackend which userid is currently in charge.
The GUI can then enable/disable server mode at runtime, without using
the CLI.
But the "tailscale up" CLI was also fixed, so Windows users can use
authkeys or ACL tags, etc.
Updates #275
2020-10-12 21:28:21 +00:00
|
|
|
},
|
|
|
|
{
|
|
|
|
Prefs{ShieldsUp: true},
|
|
|
|
"windows",
|
2023-09-01 20:45:12 +00:00
|
|
|
"Prefs{ra=false mesh=false dns=false want=false shields=true update=off Persist=nil}",
|
ipn, ipnserver, cmd/tailscale: add "server mode" support on Windows
This partially (but not yet fully) migrates Windows to tailscaled's
StateStore storage system.
This adds a new bool Pref, ForceDaemon, defined as:
// ForceDaemon specifies whether a platform that normally
// operates in "client mode" (that is, requires an active user
// logged in with the GUI app running) should keep running after the
// GUI ends and/or the user logs out.
//
// The only current applicable platform is Windows. This
// forced Windows to go into "server mode" where Tailscale is
// running even with no users logged in. This might also be
// used for macOS in the future. This setting has no effect
// for Linux/etc, which always operate in daemon mode.
Then, when ForceDaemon becomes true, we now write use the StateStore
to track which user started it in server mode, and store their prefs
under that key.
The ipnserver validates the connections/identities and informs that
LocalBackend which userid is currently in charge.
The GUI can then enable/disable server mode at runtime, without using
the CLI.
But the "tailscale up" CLI was also fixed, so Windows users can use
authkeys or ACL tags, etc.
Updates #275
2020-10-12 21:28:21 +00:00
|
|
|
},
|
|
|
|
{
|
|
|
|
Prefs{AllowSingleHosts: true},
|
|
|
|
"windows",
|
2023-09-01 20:45:12 +00:00
|
|
|
"Prefs{ra=false dns=false want=false update=off Persist=nil}",
|
ipn, ipnserver, cmd/tailscale: add "server mode" support on Windows
This partially (but not yet fully) migrates Windows to tailscaled's
StateStore storage system.
This adds a new bool Pref, ForceDaemon, defined as:
// ForceDaemon specifies whether a platform that normally
// operates in "client mode" (that is, requires an active user
// logged in with the GUI app running) should keep running after the
// GUI ends and/or the user logs out.
//
// The only current applicable platform is Windows. This
// forced Windows to go into "server mode" where Tailscale is
// running even with no users logged in. This might also be
// used for macOS in the future. This setting has no effect
// for Linux/etc, which always operate in daemon mode.
Then, when ForceDaemon becomes true, we now write use the StateStore
to track which user started it in server mode, and store their prefs
under that key.
The ipnserver validates the connections/identities and informs that
LocalBackend which userid is currently in charge.
The GUI can then enable/disable server mode at runtime, without using
the CLI.
But the "tailscale up" CLI was also fixed, so Windows users can use
authkeys or ACL tags, etc.
Updates #275
2020-10-12 21:28:21 +00:00
|
|
|
},
|
|
|
|
{
|
|
|
|
Prefs{
|
|
|
|
NotepadURLs: true,
|
|
|
|
AllowSingleHosts: true,
|
|
|
|
},
|
|
|
|
"windows",
|
2023-09-01 20:45:12 +00:00
|
|
|
"Prefs{ra=false dns=false want=false notepad=true update=off Persist=nil}",
|
ipn, ipnserver, cmd/tailscale: add "server mode" support on Windows
This partially (but not yet fully) migrates Windows to tailscaled's
StateStore storage system.
This adds a new bool Pref, ForceDaemon, defined as:
// ForceDaemon specifies whether a platform that normally
// operates in "client mode" (that is, requires an active user
// logged in with the GUI app running) should keep running after the
// GUI ends and/or the user logs out.
//
// The only current applicable platform is Windows. This
// forced Windows to go into "server mode" where Tailscale is
// running even with no users logged in. This might also be
// used for macOS in the future. This setting has no effect
// for Linux/etc, which always operate in daemon mode.
Then, when ForceDaemon becomes true, we now write use the StateStore
to track which user started it in server mode, and store their prefs
under that key.
The ipnserver validates the connections/identities and informs that
LocalBackend which userid is currently in charge.
The GUI can then enable/disable server mode at runtime, without using
the CLI.
But the "tailscale up" CLI was also fixed, so Windows users can use
authkeys or ACL tags, etc.
Updates #275
2020-10-12 21:28:21 +00:00
|
|
|
},
|
|
|
|
{
|
|
|
|
Prefs{
|
|
|
|
AllowSingleHosts: true,
|
|
|
|
WantRunning: true,
|
|
|
|
ForceDaemon: true, // server mode
|
|
|
|
},
|
|
|
|
"windows",
|
2023-09-01 20:45:12 +00:00
|
|
|
"Prefs{ra=false dns=false want=true server=true update=off Persist=nil}",
|
ipn, ipnserver, cmd/tailscale: add "server mode" support on Windows
This partially (but not yet fully) migrates Windows to tailscaled's
StateStore storage system.
This adds a new bool Pref, ForceDaemon, defined as:
// ForceDaemon specifies whether a platform that normally
// operates in "client mode" (that is, requires an active user
// logged in with the GUI app running) should keep running after the
// GUI ends and/or the user logs out.
//
// The only current applicable platform is Windows. This
// forced Windows to go into "server mode" where Tailscale is
// running even with no users logged in. This might also be
// used for macOS in the future. This setting has no effect
// for Linux/etc, which always operate in daemon mode.
Then, when ForceDaemon becomes true, we now write use the StateStore
to track which user started it in server mode, and store their prefs
under that key.
The ipnserver validates the connections/identities and informs that
LocalBackend which userid is currently in charge.
The GUI can then enable/disable server mode at runtime, without using
the CLI.
But the "tailscale up" CLI was also fixed, so Windows users can use
authkeys or ACL tags, etc.
Updates #275
2020-10-12 21:28:21 +00:00
|
|
|
},
|
2020-11-04 18:24:33 +00:00
|
|
|
{
|
|
|
|
Prefs{
|
|
|
|
AllowSingleHosts: true,
|
|
|
|
WantRunning: true,
|
|
|
|
ControlURL: "http://localhost:1234",
|
|
|
|
AdvertiseTags: []string{"tag:foo", "tag:bar"},
|
|
|
|
},
|
|
|
|
"darwin",
|
2023-09-01 20:45:12 +00:00
|
|
|
`Prefs{ra=false dns=false want=true tags=tag:foo,tag:bar url="http://localhost:1234" update=off Persist=nil}`,
|
2020-11-04 18:24:33 +00:00
|
|
|
},
|
|
|
|
{
|
|
|
|
Prefs{
|
2021-02-05 23:23:01 +00:00
|
|
|
Persist: &persist.Persist{},
|
2020-11-04 18:24:33 +00:00
|
|
|
},
|
|
|
|
"linux",
|
2023-09-01 20:45:12 +00:00
|
|
|
`Prefs{ra=false mesh=false dns=false want=false routes=[] nf=off update=off Persist{lm=, o=, n= u=""}}`,
|
2020-11-04 18:24:33 +00:00
|
|
|
},
|
|
|
|
{
|
|
|
|
Prefs{
|
2021-02-05 23:23:01 +00:00
|
|
|
Persist: &persist.Persist{
|
2021-10-28 16:50:58 +00:00
|
|
|
PrivateNodeKey: key.NodePrivateFromRaw32(mem.B([]byte{1: 1, 31: 0})),
|
2020-11-04 18:24:33 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
"linux",
|
2023-09-01 20:45:12 +00:00
|
|
|
`Prefs{ra=false mesh=false dns=false want=false routes=[] nf=off update=off Persist{lm=, o=, n=[B1VKl] u=""}}`,
|
2020-11-04 18:24:33 +00:00
|
|
|
},
|
2021-02-25 05:18:08 +00:00
|
|
|
{
|
|
|
|
Prefs{
|
2022-07-26 03:55:44 +00:00
|
|
|
ExitNodeIP: netip.MustParseAddr("1.2.3.4"),
|
2021-02-25 05:18:08 +00:00
|
|
|
},
|
|
|
|
"linux",
|
2023-09-01 20:45:12 +00:00
|
|
|
`Prefs{ra=false mesh=false dns=false want=false exit=1.2.3.4 lan=false routes=[] nf=off update=off Persist=nil}`,
|
2021-02-25 05:18:08 +00:00
|
|
|
},
|
|
|
|
{
|
|
|
|
Prefs{
|
|
|
|
ExitNodeID: tailcfg.StableNodeID("myNodeABC"),
|
|
|
|
},
|
|
|
|
"linux",
|
2023-09-01 20:45:12 +00:00
|
|
|
`Prefs{ra=false mesh=false dns=false want=false exit=myNodeABC lan=false routes=[] nf=off update=off Persist=nil}`,
|
2021-04-08 22:56:51 +00:00
|
|
|
},
|
|
|
|
{
|
|
|
|
Prefs{
|
|
|
|
ExitNodeID: tailcfg.StableNodeID("myNodeABC"),
|
|
|
|
ExitNodeAllowLANAccess: true,
|
|
|
|
},
|
|
|
|
"linux",
|
2023-09-01 20:45:12 +00:00
|
|
|
`Prefs{ra=false mesh=false dns=false want=false exit=myNodeABC lan=true routes=[] nf=off update=off Persist=nil}`,
|
2021-04-08 22:56:51 +00:00
|
|
|
},
|
|
|
|
{
|
|
|
|
Prefs{
|
|
|
|
ExitNodeAllowLANAccess: true,
|
|
|
|
},
|
|
|
|
"linux",
|
2023-09-01 20:45:12 +00:00
|
|
|
`Prefs{ra=false mesh=false dns=false want=false routes=[] nf=off update=off Persist=nil}`,
|
2021-02-25 05:18:08 +00:00
|
|
|
},
|
2021-04-12 17:45:33 +00:00
|
|
|
{
|
|
|
|
Prefs{
|
|
|
|
Hostname: "foo",
|
|
|
|
},
|
|
|
|
"linux",
|
2023-09-01 20:45:12 +00:00
|
|
|
`Prefs{ra=false mesh=false dns=false want=false routes=[] nf=off host="foo" update=off Persist=nil}`,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
Prefs{
|
|
|
|
AutoUpdate: AutoUpdatePrefs{
|
|
|
|
Check: true,
|
|
|
|
Apply: false,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
"linux",
|
|
|
|
`Prefs{ra=false mesh=false dns=false want=false routes=[] nf=off update=check Persist=nil}`,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
Prefs{
|
|
|
|
AutoUpdate: AutoUpdatePrefs{
|
|
|
|
Check: true,
|
|
|
|
Apply: true,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
"linux",
|
|
|
|
`Prefs{ra=false mesh=false dns=false want=false routes=[] nf=off update=on Persist=nil}`,
|
2021-04-12 17:45:33 +00:00
|
|
|
},
|
2023-10-26 22:55:32 +00:00
|
|
|
{
|
|
|
|
Prefs{
|
|
|
|
AppConnector: AppConnectorPrefs{
|
|
|
|
Advertise: true,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
"linux",
|
|
|
|
`Prefs{ra=false mesh=false dns=false want=false routes=[] nf=off update=off appconnector=advertise Persist=nil}`,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
Prefs{
|
|
|
|
AppConnector: AppConnectorPrefs{
|
|
|
|
Advertise: false,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
"linux",
|
|
|
|
`Prefs{ra=false mesh=false dns=false want=false routes=[] nf=off update=off Persist=nil}`,
|
|
|
|
},
|
2023-12-04 17:08:56 +00:00
|
|
|
{
|
|
|
|
Prefs{
|
|
|
|
NetfilterKind: "iptables",
|
|
|
|
},
|
|
|
|
"linux",
|
|
|
|
`Prefs{ra=false mesh=false dns=false want=false routes=[] nf=off netfilterKind=iptables update=off Persist=nil}`,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
Prefs{
|
|
|
|
NetfilterKind: "",
|
|
|
|
},
|
|
|
|
"linux",
|
|
|
|
`Prefs{ra=false mesh=false dns=false want=false routes=[] nf=off update=off Persist=nil}`,
|
|
|
|
},
|
ipn, ipnserver, cmd/tailscale: add "server mode" support on Windows
This partially (but not yet fully) migrates Windows to tailscaled's
StateStore storage system.
This adds a new bool Pref, ForceDaemon, defined as:
// ForceDaemon specifies whether a platform that normally
// operates in "client mode" (that is, requires an active user
// logged in with the GUI app running) should keep running after the
// GUI ends and/or the user logs out.
//
// The only current applicable platform is Windows. This
// forced Windows to go into "server mode" where Tailscale is
// running even with no users logged in. This might also be
// used for macOS in the future. This setting has no effect
// for Linux/etc, which always operate in daemon mode.
Then, when ForceDaemon becomes true, we now write use the StateStore
to track which user started it in server mode, and store their prefs
under that key.
The ipnserver validates the connections/identities and informs that
LocalBackend which userid is currently in charge.
The GUI can then enable/disable server mode at runtime, without using
the CLI.
But the "tailscale up" CLI was also fixed, so Windows users can use
authkeys or ACL tags, etc.
Updates #275
2020-10-12 21:28:21 +00:00
|
|
|
}
|
|
|
|
for i, tt := range tests {
|
|
|
|
got := tt.p.pretty(tt.os)
|
|
|
|
if got != tt.want {
|
|
|
|
t.Errorf("%d. wrong String:\n got: %s\nwant: %s\n", i, got, tt.want)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2020-11-02 16:33:34 +00:00
|
|
|
|
|
|
|
func TestLoadPrefsNotExist(t *testing.T) {
|
|
|
|
bogusFile := fmt.Sprintf("/tmp/not-exist-%d", time.Now().UnixNano())
|
|
|
|
|
|
|
|
p, err := LoadPrefs(bogusFile)
|
|
|
|
if errors.Is(err, os.ErrNotExist) {
|
|
|
|
// expected.
|
|
|
|
return
|
|
|
|
}
|
|
|
|
t.Fatalf("unexpected prefs=%#v, err=%v", p, err)
|
|
|
|
}
|
2020-11-22 00:34:26 +00:00
|
|
|
|
2022-09-25 18:29:55 +00:00
|
|
|
// TestLoadPrefsFileWithZeroInIt verifies that LoadPrefs handles corrupted input files.
|
2020-11-22 00:34:26 +00:00
|
|
|
// See issue #954 for details.
|
|
|
|
func TestLoadPrefsFileWithZeroInIt(t *testing.T) {
|
2022-09-15 12:06:59 +00:00
|
|
|
f, err := os.CreateTemp("", "TestLoadPrefsFileWithZeroInIt")
|
2020-11-22 00:34:26 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
path := f.Name()
|
|
|
|
if _, err := f.Write(jsonEscapedZero); err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
f.Close()
|
|
|
|
defer os.Remove(path)
|
|
|
|
|
|
|
|
p, err := LoadPrefs(path)
|
|
|
|
if errors.Is(err, os.ErrNotExist) {
|
|
|
|
// expected.
|
|
|
|
return
|
|
|
|
}
|
|
|
|
t.Fatalf("unexpected prefs=%#v, err=%v", p, err)
|
|
|
|
}
|
2021-04-01 04:35:21 +00:00
|
|
|
|
|
|
|
func TestMaskedPrefsFields(t *testing.T) {
|
|
|
|
have := map[string]bool{}
|
|
|
|
for _, f := range fieldsOf(reflect.TypeOf(Prefs{})) {
|
|
|
|
if f == "Persist" {
|
|
|
|
// This one can't be edited.
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
have[f] = true
|
|
|
|
}
|
|
|
|
for _, f := range fieldsOf(reflect.TypeOf(MaskedPrefs{})) {
|
|
|
|
if f == "Prefs" {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
if !strings.HasSuffix(f, "Set") {
|
|
|
|
t.Errorf("unexpected non-/Set$/ field %q", f)
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
bare := strings.TrimSuffix(f, "Set")
|
|
|
|
_, ok := have[bare]
|
|
|
|
if !ok {
|
|
|
|
t.Errorf("no corresponding Prefs.%s field for MaskedPrefs.%s", bare, f)
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
delete(have, bare)
|
|
|
|
}
|
|
|
|
for f := range have {
|
|
|
|
t.Errorf("missing MaskedPrefs.%sSet for Prefs.%s", f, f)
|
|
|
|
}
|
|
|
|
|
|
|
|
// And also make sure they line up in the right order, which
|
|
|
|
// ApplyEdits assumes.
|
|
|
|
pt := reflect.TypeOf(Prefs{})
|
|
|
|
mt := reflect.TypeOf(MaskedPrefs{})
|
|
|
|
for i := 0; i < mt.NumField(); i++ {
|
|
|
|
name := mt.Field(i).Name
|
|
|
|
if i == 0 {
|
|
|
|
if name != "Prefs" {
|
|
|
|
t.Errorf("first field of MaskedPrefs should be Prefs")
|
|
|
|
}
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
prefName := pt.Field(i - 1).Name
|
|
|
|
if prefName+"Set" != name {
|
|
|
|
t.Errorf("MaskedField[%d] = %s; want %sSet", i-1, name, prefName)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestPrefsApplyEdits(t *testing.T) {
|
|
|
|
tests := []struct {
|
|
|
|
name string
|
|
|
|
prefs *Prefs
|
|
|
|
edit *MaskedPrefs
|
|
|
|
want *Prefs
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
name: "no_change",
|
|
|
|
prefs: &Prefs{
|
|
|
|
Hostname: "foo",
|
|
|
|
},
|
|
|
|
edit: &MaskedPrefs{},
|
|
|
|
want: &Prefs{
|
|
|
|
Hostname: "foo",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "set1_decoy1",
|
|
|
|
prefs: &Prefs{
|
|
|
|
Hostname: "foo",
|
|
|
|
},
|
|
|
|
edit: &MaskedPrefs{
|
|
|
|
Prefs: Prefs{
|
2021-10-05 22:12:53 +00:00
|
|
|
Hostname: "bar",
|
|
|
|
OperatorUser: "ignore-this", // not set
|
2021-04-01 04:35:21 +00:00
|
|
|
},
|
|
|
|
HostnameSet: true,
|
|
|
|
},
|
|
|
|
want: &Prefs{
|
|
|
|
Hostname: "bar",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "set_several",
|
|
|
|
prefs: &Prefs{},
|
|
|
|
edit: &MaskedPrefs{
|
|
|
|
Prefs: Prefs{
|
2021-10-05 22:12:53 +00:00
|
|
|
Hostname: "bar",
|
|
|
|
OperatorUser: "galaxybrain",
|
2021-04-01 04:35:21 +00:00
|
|
|
},
|
2021-10-05 22:12:53 +00:00
|
|
|
HostnameSet: true,
|
|
|
|
OperatorUserSet: true,
|
2021-04-01 04:35:21 +00:00
|
|
|
},
|
|
|
|
want: &Prefs{
|
2021-10-05 22:12:53 +00:00
|
|
|
Hostname: "bar",
|
|
|
|
OperatorUser: "galaxybrain",
|
2021-04-01 04:35:21 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
for _, tt := range tests {
|
|
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
|
|
got := tt.prefs.Clone()
|
|
|
|
got.ApplyEdits(tt.edit)
|
|
|
|
if !got.Equals(tt.want) {
|
|
|
|
gotj, _ := json.Marshal(got)
|
|
|
|
wantj, _ := json.Marshal(tt.want)
|
|
|
|
t.Errorf("fail.\n got: %s\nwant: %s\n", gotj, wantj)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestMaskedPrefsPretty(t *testing.T) {
|
|
|
|
tests := []struct {
|
|
|
|
m *MaskedPrefs
|
|
|
|
want string
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
m: &MaskedPrefs{},
|
|
|
|
want: "MaskedPrefs{}",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
m: &MaskedPrefs{
|
|
|
|
Prefs: Prefs{
|
|
|
|
Hostname: "bar",
|
2021-10-05 22:12:53 +00:00
|
|
|
OperatorUser: "galaxybrain",
|
2021-04-01 04:35:21 +00:00
|
|
|
AllowSingleHosts: true,
|
|
|
|
RouteAll: false,
|
2021-10-13 21:48:47 +00:00
|
|
|
ExitNodeID: "foo",
|
|
|
|
AdvertiseTags: []string{"tag:foo", "tag:bar"},
|
|
|
|
NetfilterMode: preftype.NetfilterNoDivert,
|
2021-04-01 04:35:21 +00:00
|
|
|
},
|
2021-10-13 21:48:47 +00:00
|
|
|
RouteAllSet: true,
|
|
|
|
HostnameSet: true,
|
|
|
|
OperatorUserSet: true,
|
|
|
|
ExitNodeIDSet: true,
|
|
|
|
AdvertiseTagsSet: true,
|
|
|
|
NetfilterModeSet: true,
|
|
|
|
},
|
|
|
|
want: `MaskedPrefs{RouteAll=false ExitNodeID="foo" AdvertiseTags=["tag:foo" "tag:bar"] Hostname="bar" NetfilterMode=nodivert OperatorUser="galaxybrain"}`,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
m: &MaskedPrefs{
|
|
|
|
Prefs: Prefs{
|
|
|
|
ExitNodeIP: netaddr.IPv4(100, 102, 104, 105),
|
|
|
|
},
|
|
|
|
ExitNodeIPSet: true,
|
2021-04-01 04:35:21 +00:00
|
|
|
},
|
2021-10-13 21:48:47 +00:00
|
|
|
want: `MaskedPrefs{ExitNodeIP=100.102.104.105}`,
|
2021-04-01 04:35:21 +00:00
|
|
|
},
|
2023-12-08 18:19:25 +00:00
|
|
|
{
|
|
|
|
m: &MaskedPrefs{
|
|
|
|
Prefs: Prefs{
|
|
|
|
AutoUpdate: AutoUpdatePrefs{Check: true, Apply: false},
|
|
|
|
},
|
|
|
|
AutoUpdateSet: AutoUpdatePrefsMask{CheckSet: true, ApplySet: false},
|
|
|
|
},
|
|
|
|
want: `MaskedPrefs{AutoUpdate={Check=true}}`,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
m: &MaskedPrefs{
|
|
|
|
Prefs: Prefs{
|
|
|
|
AutoUpdate: AutoUpdatePrefs{Check: true, Apply: true},
|
|
|
|
},
|
|
|
|
AutoUpdateSet: AutoUpdatePrefsMask{CheckSet: true, ApplySet: true},
|
|
|
|
},
|
|
|
|
want: `MaskedPrefs{AutoUpdate={Check=true Apply=true}}`,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
m: &MaskedPrefs{
|
|
|
|
Prefs: Prefs{
|
|
|
|
AutoUpdate: AutoUpdatePrefs{Check: true, Apply: false},
|
|
|
|
},
|
|
|
|
AutoUpdateSet: AutoUpdatePrefsMask{CheckSet: false, ApplySet: true},
|
|
|
|
},
|
|
|
|
want: `MaskedPrefs{AutoUpdate={Apply=false}}`,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
m: &MaskedPrefs{
|
|
|
|
Prefs: Prefs{
|
|
|
|
AutoUpdate: AutoUpdatePrefs{Check: true, Apply: true},
|
|
|
|
},
|
|
|
|
AutoUpdateSet: AutoUpdatePrefsMask{CheckSet: false, ApplySet: false},
|
|
|
|
},
|
|
|
|
want: `MaskedPrefs{}`,
|
|
|
|
},
|
2021-04-01 04:35:21 +00:00
|
|
|
}
|
|
|
|
for i, tt := range tests {
|
|
|
|
got := tt.m.Pretty()
|
|
|
|
if got != tt.want {
|
|
|
|
t.Errorf("%d.\n got: %#q\nwant: %#q\n", i, got, tt.want)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2022-01-06 22:56:38 +00:00
|
|
|
|
|
|
|
func TestPrefsExitNode(t *testing.T) {
|
|
|
|
var p *Prefs
|
|
|
|
if p.AdvertisesExitNode() {
|
|
|
|
t.Errorf("nil shouldn't advertise exit node")
|
|
|
|
}
|
|
|
|
p = NewPrefs()
|
|
|
|
if p.AdvertisesExitNode() {
|
|
|
|
t.Errorf("default shouldn't advertise exit node")
|
|
|
|
}
|
all: convert more code to use net/netip directly
perl -i -npe 's,netaddr.IPPrefixFrom,netip.PrefixFrom,' $(git grep -l -F netaddr.)
perl -i -npe 's,netaddr.IPPortFrom,netip.AddrPortFrom,' $(git grep -l -F netaddr. )
perl -i -npe 's,netaddr.IPPrefix,netip.Prefix,g' $(git grep -l -F netaddr. )
perl -i -npe 's,netaddr.IPPort,netip.AddrPort,g' $(git grep -l -F netaddr. )
perl -i -npe 's,netaddr.IP\b,netip.Addr,g' $(git grep -l -F netaddr. )
perl -i -npe 's,netaddr.IPv6Raw\b,netip.AddrFrom16,g' $(git grep -l -F netaddr. )
goimports -w .
Then delete some stuff from the net/netaddr shim package which is no
longer neeed.
Updates #5162
Change-Id: Ia7a86893fe21c7e3ee1ec823e8aba288d4566cd8
Signed-off-by: Brad Fitzpatrick <bradfitz@tailscale.com>
2022-07-26 04:14:09 +00:00
|
|
|
p.AdvertiseRoutes = []netip.Prefix{
|
2022-07-26 03:55:44 +00:00
|
|
|
netip.MustParsePrefix("10.0.0.0/16"),
|
2022-01-06 22:56:38 +00:00
|
|
|
}
|
2022-01-07 00:17:00 +00:00
|
|
|
p.SetAdvertiseExitNode(true)
|
2022-01-06 22:56:38 +00:00
|
|
|
if got, want := len(p.AdvertiseRoutes), 3; got != want {
|
|
|
|
t.Errorf("routes = %d; want %d", got, want)
|
|
|
|
}
|
2022-01-07 00:17:00 +00:00
|
|
|
p.SetAdvertiseExitNode(true)
|
2022-01-06 22:56:38 +00:00
|
|
|
if got, want := len(p.AdvertiseRoutes), 3; got != want {
|
|
|
|
t.Errorf("routes = %d; want %d", got, want)
|
|
|
|
}
|
|
|
|
if !p.AdvertisesExitNode() {
|
|
|
|
t.Errorf("not advertising after enable")
|
|
|
|
}
|
2022-01-07 00:17:00 +00:00
|
|
|
p.SetAdvertiseExitNode(false)
|
2022-01-06 22:56:38 +00:00
|
|
|
if p.AdvertisesExitNode() {
|
|
|
|
t.Errorf("advertising after disable")
|
|
|
|
}
|
|
|
|
if got, want := len(p.AdvertiseRoutes), 1; got != want {
|
|
|
|
t.Errorf("routes = %d; want %d", got, want)
|
|
|
|
}
|
|
|
|
}
|
2022-02-25 23:36:05 +00:00
|
|
|
|
|
|
|
func TestExitNodeIPOfArg(t *testing.T) {
|
2022-07-26 03:55:44 +00:00
|
|
|
mustIP := netip.MustParseAddr
|
2022-02-25 23:36:05 +00:00
|
|
|
tests := []struct {
|
|
|
|
name string
|
|
|
|
arg string
|
|
|
|
st *ipnstate.Status
|
all: convert more code to use net/netip directly
perl -i -npe 's,netaddr.IPPrefixFrom,netip.PrefixFrom,' $(git grep -l -F netaddr.)
perl -i -npe 's,netaddr.IPPortFrom,netip.AddrPortFrom,' $(git grep -l -F netaddr. )
perl -i -npe 's,netaddr.IPPrefix,netip.Prefix,g' $(git grep -l -F netaddr. )
perl -i -npe 's,netaddr.IPPort,netip.AddrPort,g' $(git grep -l -F netaddr. )
perl -i -npe 's,netaddr.IP\b,netip.Addr,g' $(git grep -l -F netaddr. )
perl -i -npe 's,netaddr.IPv6Raw\b,netip.AddrFrom16,g' $(git grep -l -F netaddr. )
goimports -w .
Then delete some stuff from the net/netaddr shim package which is no
longer neeed.
Updates #5162
Change-Id: Ia7a86893fe21c7e3ee1ec823e8aba288d4566cd8
Signed-off-by: Brad Fitzpatrick <bradfitz@tailscale.com>
2022-07-26 04:14:09 +00:00
|
|
|
want netip.Addr
|
2022-02-25 23:36:05 +00:00
|
|
|
wantErr string
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
name: "ip_while_stopped_okay",
|
|
|
|
arg: "1.2.3.4",
|
|
|
|
st: &ipnstate.Status{
|
|
|
|
BackendState: "Stopped",
|
|
|
|
},
|
|
|
|
want: mustIP("1.2.3.4"),
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "ip_not_found",
|
|
|
|
arg: "1.2.3.4",
|
|
|
|
st: &ipnstate.Status{
|
|
|
|
BackendState: "Running",
|
|
|
|
},
|
|
|
|
wantErr: `no node found in netmap with IP 1.2.3.4`,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "ip_not_exit",
|
|
|
|
arg: "1.2.3.4",
|
|
|
|
st: &ipnstate.Status{
|
|
|
|
BackendState: "Running",
|
|
|
|
Peer: map[key.NodePublic]*ipnstate.PeerStatus{
|
|
|
|
key.NewNode().Public(): {
|
all: convert more code to use net/netip directly
perl -i -npe 's,netaddr.IPPrefixFrom,netip.PrefixFrom,' $(git grep -l -F netaddr.)
perl -i -npe 's,netaddr.IPPortFrom,netip.AddrPortFrom,' $(git grep -l -F netaddr. )
perl -i -npe 's,netaddr.IPPrefix,netip.Prefix,g' $(git grep -l -F netaddr. )
perl -i -npe 's,netaddr.IPPort,netip.AddrPort,g' $(git grep -l -F netaddr. )
perl -i -npe 's,netaddr.IP\b,netip.Addr,g' $(git grep -l -F netaddr. )
perl -i -npe 's,netaddr.IPv6Raw\b,netip.AddrFrom16,g' $(git grep -l -F netaddr. )
goimports -w .
Then delete some stuff from the net/netaddr shim package which is no
longer neeed.
Updates #5162
Change-Id: Ia7a86893fe21c7e3ee1ec823e8aba288d4566cd8
Signed-off-by: Brad Fitzpatrick <bradfitz@tailscale.com>
2022-07-26 04:14:09 +00:00
|
|
|
TailscaleIPs: []netip.Addr{mustIP("1.2.3.4")},
|
2022-02-25 23:36:05 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
wantErr: `node 1.2.3.4 is not advertising an exit node`,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "ip",
|
|
|
|
arg: "1.2.3.4",
|
|
|
|
st: &ipnstate.Status{
|
|
|
|
BackendState: "Running",
|
|
|
|
Peer: map[key.NodePublic]*ipnstate.PeerStatus{
|
|
|
|
key.NewNode().Public(): {
|
all: convert more code to use net/netip directly
perl -i -npe 's,netaddr.IPPrefixFrom,netip.PrefixFrom,' $(git grep -l -F netaddr.)
perl -i -npe 's,netaddr.IPPortFrom,netip.AddrPortFrom,' $(git grep -l -F netaddr. )
perl -i -npe 's,netaddr.IPPrefix,netip.Prefix,g' $(git grep -l -F netaddr. )
perl -i -npe 's,netaddr.IPPort,netip.AddrPort,g' $(git grep -l -F netaddr. )
perl -i -npe 's,netaddr.IP\b,netip.Addr,g' $(git grep -l -F netaddr. )
perl -i -npe 's,netaddr.IPv6Raw\b,netip.AddrFrom16,g' $(git grep -l -F netaddr. )
goimports -w .
Then delete some stuff from the net/netaddr shim package which is no
longer neeed.
Updates #5162
Change-Id: Ia7a86893fe21c7e3ee1ec823e8aba288d4566cd8
Signed-off-by: Brad Fitzpatrick <bradfitz@tailscale.com>
2022-07-26 04:14:09 +00:00
|
|
|
TailscaleIPs: []netip.Addr{mustIP("1.2.3.4")},
|
2022-02-25 23:36:05 +00:00
|
|
|
ExitNodeOption: true,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
want: mustIP("1.2.3.4"),
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "no_match",
|
|
|
|
arg: "unknown",
|
|
|
|
st: &ipnstate.Status{MagicDNSSuffix: ".foo"},
|
|
|
|
wantErr: `invalid value "unknown" for --exit-node; must be IP or unique node name`,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "name",
|
|
|
|
arg: "skippy",
|
|
|
|
st: &ipnstate.Status{
|
|
|
|
MagicDNSSuffix: ".foo",
|
|
|
|
Peer: map[key.NodePublic]*ipnstate.PeerStatus{
|
|
|
|
key.NewNode().Public(): {
|
|
|
|
DNSName: "skippy.foo.",
|
all: convert more code to use net/netip directly
perl -i -npe 's,netaddr.IPPrefixFrom,netip.PrefixFrom,' $(git grep -l -F netaddr.)
perl -i -npe 's,netaddr.IPPortFrom,netip.AddrPortFrom,' $(git grep -l -F netaddr. )
perl -i -npe 's,netaddr.IPPrefix,netip.Prefix,g' $(git grep -l -F netaddr. )
perl -i -npe 's,netaddr.IPPort,netip.AddrPort,g' $(git grep -l -F netaddr. )
perl -i -npe 's,netaddr.IP\b,netip.Addr,g' $(git grep -l -F netaddr. )
perl -i -npe 's,netaddr.IPv6Raw\b,netip.AddrFrom16,g' $(git grep -l -F netaddr. )
goimports -w .
Then delete some stuff from the net/netaddr shim package which is no
longer neeed.
Updates #5162
Change-Id: Ia7a86893fe21c7e3ee1ec823e8aba288d4566cd8
Signed-off-by: Brad Fitzpatrick <bradfitz@tailscale.com>
2022-07-26 04:14:09 +00:00
|
|
|
TailscaleIPs: []netip.Addr{mustIP("1.0.0.2")},
|
2022-02-25 23:36:05 +00:00
|
|
|
ExitNodeOption: true,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
want: mustIP("1.0.0.2"),
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "name_not_exit",
|
|
|
|
arg: "skippy",
|
|
|
|
st: &ipnstate.Status{
|
|
|
|
MagicDNSSuffix: ".foo",
|
|
|
|
Peer: map[key.NodePublic]*ipnstate.PeerStatus{
|
|
|
|
key.NewNode().Public(): {
|
|
|
|
DNSName: "skippy.foo.",
|
all: convert more code to use net/netip directly
perl -i -npe 's,netaddr.IPPrefixFrom,netip.PrefixFrom,' $(git grep -l -F netaddr.)
perl -i -npe 's,netaddr.IPPortFrom,netip.AddrPortFrom,' $(git grep -l -F netaddr. )
perl -i -npe 's,netaddr.IPPrefix,netip.Prefix,g' $(git grep -l -F netaddr. )
perl -i -npe 's,netaddr.IPPort,netip.AddrPort,g' $(git grep -l -F netaddr. )
perl -i -npe 's,netaddr.IP\b,netip.Addr,g' $(git grep -l -F netaddr. )
perl -i -npe 's,netaddr.IPv6Raw\b,netip.AddrFrom16,g' $(git grep -l -F netaddr. )
goimports -w .
Then delete some stuff from the net/netaddr shim package which is no
longer neeed.
Updates #5162
Change-Id: Ia7a86893fe21c7e3ee1ec823e8aba288d4566cd8
Signed-off-by: Brad Fitzpatrick <bradfitz@tailscale.com>
2022-07-26 04:14:09 +00:00
|
|
|
TailscaleIPs: []netip.Addr{mustIP("1.0.0.2")},
|
2022-02-25 23:36:05 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
wantErr: `node "skippy" is not advertising an exit node`,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "ambiguous",
|
|
|
|
arg: "skippy",
|
|
|
|
st: &ipnstate.Status{
|
|
|
|
MagicDNSSuffix: ".foo",
|
|
|
|
Peer: map[key.NodePublic]*ipnstate.PeerStatus{
|
|
|
|
key.NewNode().Public(): {
|
|
|
|
DNSName: "skippy.foo.",
|
all: convert more code to use net/netip directly
perl -i -npe 's,netaddr.IPPrefixFrom,netip.PrefixFrom,' $(git grep -l -F netaddr.)
perl -i -npe 's,netaddr.IPPortFrom,netip.AddrPortFrom,' $(git grep -l -F netaddr. )
perl -i -npe 's,netaddr.IPPrefix,netip.Prefix,g' $(git grep -l -F netaddr. )
perl -i -npe 's,netaddr.IPPort,netip.AddrPort,g' $(git grep -l -F netaddr. )
perl -i -npe 's,netaddr.IP\b,netip.Addr,g' $(git grep -l -F netaddr. )
perl -i -npe 's,netaddr.IPv6Raw\b,netip.AddrFrom16,g' $(git grep -l -F netaddr. )
goimports -w .
Then delete some stuff from the net/netaddr shim package which is no
longer neeed.
Updates #5162
Change-Id: Ia7a86893fe21c7e3ee1ec823e8aba288d4566cd8
Signed-off-by: Brad Fitzpatrick <bradfitz@tailscale.com>
2022-07-26 04:14:09 +00:00
|
|
|
TailscaleIPs: []netip.Addr{mustIP("1.0.0.2")},
|
2022-02-25 23:36:05 +00:00
|
|
|
ExitNodeOption: true,
|
|
|
|
},
|
|
|
|
key.NewNode().Public(): {
|
|
|
|
DNSName: "SKIPPY.foo.",
|
all: convert more code to use net/netip directly
perl -i -npe 's,netaddr.IPPrefixFrom,netip.PrefixFrom,' $(git grep -l -F netaddr.)
perl -i -npe 's,netaddr.IPPortFrom,netip.AddrPortFrom,' $(git grep -l -F netaddr. )
perl -i -npe 's,netaddr.IPPrefix,netip.Prefix,g' $(git grep -l -F netaddr. )
perl -i -npe 's,netaddr.IPPort,netip.AddrPort,g' $(git grep -l -F netaddr. )
perl -i -npe 's,netaddr.IP\b,netip.Addr,g' $(git grep -l -F netaddr. )
perl -i -npe 's,netaddr.IPv6Raw\b,netip.AddrFrom16,g' $(git grep -l -F netaddr. )
goimports -w .
Then delete some stuff from the net/netaddr shim package which is no
longer neeed.
Updates #5162
Change-Id: Ia7a86893fe21c7e3ee1ec823e8aba288d4566cd8
Signed-off-by: Brad Fitzpatrick <bradfitz@tailscale.com>
2022-07-26 04:14:09 +00:00
|
|
|
TailscaleIPs: []netip.Addr{mustIP("1.0.0.2")},
|
2022-02-25 23:36:05 +00:00
|
|
|
ExitNodeOption: true,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
wantErr: `ambiguous exit node name "skippy"`,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
for _, tt := range tests {
|
|
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
|
|
got, err := exitNodeIPOfArg(tt.arg, tt.st)
|
|
|
|
if err != nil {
|
|
|
|
if err.Error() == tt.wantErr {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if tt.wantErr == "" {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
t.Fatalf("error = %#q; want %#q", err, tt.wantErr)
|
|
|
|
}
|
|
|
|
if tt.wantErr != "" {
|
|
|
|
t.Fatalf("got %v; want error %#q", got, tt.wantErr)
|
|
|
|
}
|
|
|
|
if got != tt.want {
|
|
|
|
t.Fatalf("got %v; want %v", got, tt.want)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
2022-04-26 21:57:55 +00:00
|
|
|
|
|
|
|
func TestControlURLOrDefault(t *testing.T) {
|
|
|
|
var p Prefs
|
|
|
|
if got, want := p.ControlURLOrDefault(), DefaultControlURL; got != want {
|
|
|
|
t.Errorf("got %q; want %q", got, want)
|
|
|
|
}
|
|
|
|
p.ControlURL = "http://foo.bar"
|
|
|
|
if got, want := p.ControlURLOrDefault(), "http://foo.bar"; got != want {
|
|
|
|
t.Errorf("got %q; want %q", got, want)
|
|
|
|
}
|
|
|
|
p.ControlURL = "https://login.tailscale.com"
|
|
|
|
if got, want := p.ControlURLOrDefault(), DefaultControlURL; got != want {
|
|
|
|
t.Errorf("got %q; want %q", got, want)
|
|
|
|
}
|
|
|
|
}
|
2022-10-26 01:02:58 +00:00
|
|
|
|
|
|
|
func TestMaskedPrefsIsEmpty(t *testing.T) {
|
|
|
|
tests := []struct {
|
|
|
|
name string
|
|
|
|
mp *MaskedPrefs
|
|
|
|
wantEmpty bool
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
name: "nil",
|
|
|
|
wantEmpty: true,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "empty",
|
|
|
|
wantEmpty: true,
|
|
|
|
mp: &MaskedPrefs{},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "no-masks",
|
|
|
|
wantEmpty: true,
|
|
|
|
mp: &MaskedPrefs{
|
|
|
|
Prefs: Prefs{
|
|
|
|
WantRunning: true,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "with-mask",
|
|
|
|
wantEmpty: false,
|
|
|
|
mp: &MaskedPrefs{
|
|
|
|
Prefs: Prefs{
|
|
|
|
WantRunning: true,
|
|
|
|
},
|
|
|
|
WantRunningSet: true,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
for _, tc := range tests {
|
|
|
|
t.Run(tc.name, func(t *testing.T) {
|
|
|
|
got := tc.mp.IsEmpty()
|
|
|
|
if got != tc.wantEmpty {
|
|
|
|
t.Fatalf("mp.IsEmpty = %t; want %t", got, tc.wantEmpty)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
2022-11-03 22:46:17 +00:00
|
|
|
|
|
|
|
func TestNotifyPrefsJSONRoundtrip(t *testing.T) {
|
|
|
|
var n Notify
|
|
|
|
if n.Prefs != nil && n.Prefs.Valid() {
|
|
|
|
t.Fatal("Prefs should not be valid at start")
|
|
|
|
}
|
|
|
|
b, err := json.Marshal(n)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
var n2 Notify
|
|
|
|
if err := json.Unmarshal(b, &n2); err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
if n2.Prefs != nil && n2.Prefs.Valid() {
|
|
|
|
t.Fatal("Prefs should not be valid after deserialization")
|
|
|
|
}
|
|
|
|
}
|