mirror of
https://github.com/tailscale/tailscale.git
synced 2024-11-29 04:55:31 +00:00
ipn/ipnlocal: save prefs to disk on UpdatePrefs
Regression from6d10655dc3
, which added UpdatePrefs but didn't write it out to disk. I'd planned on adding tests to state_test.go which is why I'd earlier added46896a9311
to prepare for making such persistence tests easier to write, but turns out state_test.go didn't even test UpdatePrefs, so I'm staying out of there. Instead, this is tested using integration tests. Fixes #2321 Signed-off-by: Brad Fitzpatrick <bradfitz@tailscale.com>
This commit is contained in:
parent
fb06ad19e7
commit
01e159b610
@ -757,6 +757,12 @@ func (b *LocalBackend) Start(opts ipn.Options) error {
|
|||||||
newPrefs := opts.UpdatePrefs
|
newPrefs := opts.UpdatePrefs
|
||||||
newPrefs.Persist = b.prefs.Persist
|
newPrefs.Persist = b.prefs.Persist
|
||||||
b.prefs = newPrefs
|
b.prefs = newPrefs
|
||||||
|
|
||||||
|
if opts.StateKey != "" {
|
||||||
|
if err := b.store.WriteState(opts.StateKey, b.prefs.ToBytes()); err != nil {
|
||||||
|
b.logf("failed to save UpdatePrefs state: %v", err)
|
||||||
|
}
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
wantRunning := b.prefs.WantRunning
|
wantRunning := b.prefs.WantRunning
|
||||||
|
@ -31,6 +31,7 @@
|
|||||||
|
|
||||||
"go4.org/mem"
|
"go4.org/mem"
|
||||||
"inet.af/netaddr"
|
"inet.af/netaddr"
|
||||||
|
"tailscale.com/ipn"
|
||||||
"tailscale.com/ipn/ipnstate"
|
"tailscale.com/ipn/ipnstate"
|
||||||
"tailscale.com/safesocket"
|
"tailscale.com/safesocket"
|
||||||
"tailscale.com/tailcfg"
|
"tailscale.com/tailcfg"
|
||||||
@ -100,6 +101,63 @@ func TestOneNodeUp_NoAuth(t *testing.T) {
|
|||||||
t.Logf("number of HTTP logcatcher requests: %v", env.LogCatcher.numRequests())
|
t.Logf("number of HTTP logcatcher requests: %v", env.LogCatcher.numRequests())
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// test Issue 2321: Start with UpdatePrefs should save prefs to disk
|
||||||
|
func TestStateSavedOnStart(t *testing.T) {
|
||||||
|
t.Parallel()
|
||||||
|
bins := BuildTestBinaries(t)
|
||||||
|
|
||||||
|
env := newTestEnv(t, bins)
|
||||||
|
defer env.Close()
|
||||||
|
|
||||||
|
n1 := newTestNode(t, env)
|
||||||
|
|
||||||
|
d1 := n1.StartDaemon(t)
|
||||||
|
defer d1.Kill()
|
||||||
|
|
||||||
|
n1.AwaitListening(t)
|
||||||
|
|
||||||
|
st := n1.MustStatus(t)
|
||||||
|
t.Logf("Status: %s", st.BackendState)
|
||||||
|
|
||||||
|
if err := tstest.WaitFor(20*time.Second, func() error {
|
||||||
|
const sub = `Program starting: `
|
||||||
|
if !env.LogCatcher.logsContains(mem.S(sub)) {
|
||||||
|
return fmt.Errorf("log catcher didn't see %#q; got %s", sub, env.LogCatcher.logsString())
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}); err != nil {
|
||||||
|
t.Error(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
n1.MustUp()
|
||||||
|
|
||||||
|
t.Logf("Got IP: %v", n1.AwaitIP(t))
|
||||||
|
n1.AwaitRunning(t)
|
||||||
|
|
||||||
|
p1 := n1.diskPrefs(t)
|
||||||
|
t.Logf("Prefs1: %v", p1.Pretty())
|
||||||
|
|
||||||
|
// Bring it down, to prevent an EditPrefs call in the
|
||||||
|
// subsequent "up", as we want to test the bug when
|
||||||
|
// cmd/tailscale implements "up" via LocalBackend.Start.
|
||||||
|
n1.MustDown()
|
||||||
|
|
||||||
|
// And change the hostname to something:
|
||||||
|
if err := n1.Tailscale("up", "--login-server="+n1.env.ControlServer.URL, "--hostname=foo").Run(); err != nil {
|
||||||
|
t.Fatalf("up: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
p2 := n1.diskPrefs(t)
|
||||||
|
if pretty := p1.Pretty(); pretty == p2.Pretty() {
|
||||||
|
t.Errorf("Prefs didn't change on disk after 'up', still: %s", pretty)
|
||||||
|
}
|
||||||
|
if p2.Hostname != "foo" {
|
||||||
|
t.Errorf("Prefs.Hostname = %q; want foo", p2.Hostname)
|
||||||
|
}
|
||||||
|
|
||||||
|
d1.MustCleanShutdown(t)
|
||||||
|
}
|
||||||
|
|
||||||
func TestOneNodeUp_Auth(t *testing.T) {
|
func TestOneNodeUp_Auth(t *testing.T) {
|
||||||
t.Parallel()
|
t.Parallel()
|
||||||
bins := BuildTestBinaries(t)
|
bins := BuildTestBinaries(t)
|
||||||
@ -382,6 +440,26 @@ func newTestNode(t *testing.T, env *testEnv) *testNode {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (n *testNode) diskPrefs(t testing.TB) *ipn.Prefs {
|
||||||
|
t.Helper()
|
||||||
|
if _, err := ioutil.ReadFile(n.stateFile); err != nil {
|
||||||
|
t.Fatalf("reading prefs: %v", err)
|
||||||
|
}
|
||||||
|
fs, err := ipn.NewFileStore(n.stateFile)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("reading prefs, NewFileStore: %v", err)
|
||||||
|
}
|
||||||
|
prefBytes, err := fs.ReadState(ipn.GlobalDaemonStateKey)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("reading prefs, ReadState: %v", err)
|
||||||
|
}
|
||||||
|
p := new(ipn.Prefs)
|
||||||
|
if err := json.Unmarshal(prefBytes, p); err != nil {
|
||||||
|
t.Fatalf("reading prefs, JSON unmarshal: %v", err)
|
||||||
|
}
|
||||||
|
return p
|
||||||
|
}
|
||||||
|
|
||||||
// addLogLineHook registers a hook f to be called on each tailscaled
|
// addLogLineHook registers a hook f to be called on each tailscaled
|
||||||
// log line output.
|
// log line output.
|
||||||
func (n *testNode) addLogLineHook(f func([]byte)) {
|
func (n *testNode) addLogLineHook(f func([]byte)) {
|
||||||
@ -515,6 +593,14 @@ func (n *testNode) MustUp() {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (n *testNode) MustDown() {
|
||||||
|
t := n.env.t
|
||||||
|
t.Logf("Running down ...")
|
||||||
|
if err := n.Tailscale("down").Run(); err != nil {
|
||||||
|
t.Fatalf("down: %v", err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
// AwaitListening waits for the tailscaled to be serving local clients
|
// AwaitListening waits for the tailscaled to be serving local clients
|
||||||
// over its localhost IPC mechanism. (Unix socket, etc)
|
// over its localhost IPC mechanism. (Unix socket, etc)
|
||||||
func (n *testNode) AwaitListening(t testing.TB) {
|
func (n *testNode) AwaitListening(t testing.TB) {
|
||||||
|
Loading…
Reference in New Issue
Block a user