ipn/ipnlocal: delete redundant TestStatusWithoutPeers

We have tstest/integration nowadays.

And this test was one of the lone holdouts using the to-be-nuked
SetControlClientGetterForTesting.

Updates #11649

Change-Id: Icf8a6a2e9b8ae1ac534754afa898c00dc0b7623b
Signed-off-by: Brad Fitzpatrick <bradfitz@tailscale.com>
This commit is contained in:
Brad Fitzpatrick 2024-04-13 16:22:15 -07:00 committed by Brad Fitzpatrick
parent 68043a17c2
commit 8186cd0349
2 changed files with 5 additions and 28 deletions

View File

@ -763,34 +763,6 @@ func TestPacketFilterPermitsUnlockedNodes(t *testing.T) {
} }
} }
func TestStatusWithoutPeers(t *testing.T) {
b := newTestLocalBackend(t)
var cc *mockControl
b.SetControlClientGetterForTesting(func(opts controlclient.Options) (controlclient.Client, error) {
cc = newClient(t, opts)
t.Logf("ccGen: new mockControl.")
cc.called("New")
return cc, nil
})
b.Start(ipn.Options{})
b.StartLoginInteractive()
cc.send(nil, "", false, &netmap.NetworkMap{
SelfNode: (&tailcfg.Node{
MachineAuthorized: true,
Addresses: ipps("100.101.101.101"),
}).View(),
})
got := b.StatusWithoutPeers()
if got.TailscaleIPs == nil {
t.Errorf("got nil, expected TailscaleIPs value to not be nil")
}
if !reflect.DeepEqual(got.TailscaleIPs, got.Self.TailscaleIPs) {
t.Errorf("got %v, expected %v", got.TailscaleIPs, got.Self.TailscaleIPs)
}
}
func TestStatusPeerCapabilities(t *testing.T) { func TestStatusPeerCapabilities(t *testing.T) {
tests := []struct { tests := []struct {
name string name string

View File

@ -382,6 +382,11 @@ func TestTwoNodes(t *testing.T) {
if peer.ID == st.Self.ID { if peer.ID == st.Self.ID {
return errors.New("peer is self") return errors.New("peer is self")
} }
if len(st.TailscaleIPs) == 0 {
return errors.New("no Tailscale IPs")
}
return nil return nil
}); err != nil { }); err != nil {
t.Error(err) t.Error(err)