ipn/ipnserver: use ipnauth.Actor instead of *ipnserver.actor whenever possible

In preparation for adding test coverage for ipn/ipnserver.Server, we update it
to use ipnauth.Actor instead of its concrete implementation where possible.

Updates tailscale/corp#25804

Signed-off-by: Nick Khyl <nickk@tailscale.com>
This commit is contained in:
Nick Khyl 2025-01-11 17:58:27 -06:00 committed by Nick Khyl
parent d818a58a77
commit d0ba91bdb2
2 changed files with 20 additions and 12 deletions

View File

@ -112,11 +112,11 @@ func (a *actor) Username() (string, error) {
} }
type actorOrError struct { type actorOrError struct {
actor *actor actor ipnauth.Actor
err error err error
} }
func (a actorOrError) unwrap() (*actor, error) { func (a actorOrError) unwrap() (ipnauth.Actor, error) {
return a.actor, a.err return a.actor, a.err
} }
@ -131,9 +131,9 @@ func contextWithActor(ctx context.Context, logf logger.Logf, c net.Conn) context
return actorKey.WithValue(ctx, actorOrError{actor: actor, err: err}) return actorKey.WithValue(ctx, actorOrError{actor: actor, err: err})
} }
// actorFromContext returns an [actor] associated with ctx, // actorFromContext returns an [ipnauth.Actor] associated with ctx,
// or an error if the context does not carry an actor's identity. // or an error if the context does not carry an actor's identity.
func actorFromContext(ctx context.Context) (*actor, error) { func actorFromContext(ctx context.Context) (ipnauth.Actor, error) {
return actorKey.Value(ctx).unwrap() return actorKey.Value(ctx).unwrap()
} }

View File

@ -22,6 +22,7 @@ import (
"tailscale.com/envknob" "tailscale.com/envknob"
"tailscale.com/ipn" "tailscale.com/ipn"
"tailscale.com/ipn/ipnauth"
"tailscale.com/ipn/ipnlocal" "tailscale.com/ipn/ipnlocal"
"tailscale.com/ipn/localapi" "tailscale.com/ipn/localapi"
"tailscale.com/net/netmon" "tailscale.com/net/netmon"
@ -30,6 +31,7 @@ import (
"tailscale.com/util/mak" "tailscale.com/util/mak"
"tailscale.com/util/set" "tailscale.com/util/set"
"tailscale.com/util/systemd" "tailscale.com/util/systemd"
"tailscale.com/util/testenv"
) )
// Server is an IPN backend and its set of 0 or more active localhost // Server is an IPN backend and its set of 0 or more active localhost
@ -50,7 +52,7 @@ type Server struct {
// lock order: mu, then LocalBackend.mu // lock order: mu, then LocalBackend.mu
mu sync.Mutex mu sync.Mutex
lastUserID ipn.WindowsUserID // tracks last userid; on change, Reset state for paranoia lastUserID ipn.WindowsUserID // tracks last userid; on change, Reset state for paranoia
activeReqs map[*http.Request]*actor activeReqs map[*http.Request]ipnauth.Actor
backendWaiter waiterSet // of LocalBackend waiters backendWaiter waiterSet // of LocalBackend waiters
zeroReqWaiter waiterSet // of blockUntilZeroConnections waiters zeroReqWaiter waiterSet // of blockUntilZeroConnections waiters
} }
@ -195,8 +197,12 @@ func (s *Server) serveHTTP(w http.ResponseWriter, r *http.Request) {
if strings.HasPrefix(r.URL.Path, "/localapi/") { if strings.HasPrefix(r.URL.Path, "/localapi/") {
lah := localapi.NewHandler(lb, s.logf, s.backendLogID) lah := localapi.NewHandler(lb, s.logf, s.backendLogID)
lah.PermitRead, lah.PermitWrite = ci.Permissions(lb.OperatorUserID()) if actor, ok := ci.(*actor); ok {
lah.PermitCert = ci.CanFetchCerts() lah.PermitRead, lah.PermitWrite = actor.Permissions(lb.OperatorUserID())
lah.PermitCert = actor.CanFetchCerts()
} else if testenv.InTest() {
lah.PermitRead, lah.PermitWrite = true, true
}
lah.Actor = ci lah.Actor = ci
lah.ServeHTTP(w, r) lah.ServeHTTP(w, r)
return return
@ -230,11 +236,11 @@ func (e inUseOtherUserError) Unwrap() error { return e.error }
// The returned error, when non-nil, will be of type inUseOtherUserError. // The returned error, when non-nil, will be of type inUseOtherUserError.
// //
// s.mu must be held. // s.mu must be held.
func (s *Server) checkConnIdentityLocked(ci *actor) error { func (s *Server) checkConnIdentityLocked(ci ipnauth.Actor) error {
// If clients are already connected, verify they're the same user. // If clients are already connected, verify they're the same user.
// This mostly matters on Windows at the moment. // This mostly matters on Windows at the moment.
if len(s.activeReqs) > 0 { if len(s.activeReqs) > 0 {
var active *actor var active ipnauth.Actor
for _, active = range s.activeReqs { for _, active = range s.activeReqs {
break break
} }
@ -251,7 +257,9 @@ func (s *Server) checkConnIdentityLocked(ci *actor) error {
if username, err := active.Username(); err == nil { if username, err := active.Username(); err == nil {
fmt.Fprintf(&b, " by %s", username) fmt.Fprintf(&b, " by %s", username)
} }
fmt.Fprintf(&b, ", pid %d", active.pid()) if active, ok := active.(*actor); ok {
fmt.Fprintf(&b, ", pid %d", active.pid())
}
return inUseOtherUserError{errors.New(b.String())} return inUseOtherUserError{errors.New(b.String())}
} }
} }
@ -267,7 +275,7 @@ func (s *Server) checkConnIdentityLocked(ci *actor) error {
// //
// This is primarily used for the Windows GUI, to block until one user's done // This is primarily used for the Windows GUI, to block until one user's done
// controlling the tailscaled process. // controlling the tailscaled process.
func (s *Server) blockWhileIdentityInUse(ctx context.Context, actor *actor) error { func (s *Server) blockWhileIdentityInUse(ctx context.Context, actor ipnauth.Actor) error {
inUse := func() bool { inUse := func() bool {
s.mu.Lock() s.mu.Lock()
defer s.mu.Unlock() defer s.mu.Unlock()
@ -361,7 +369,7 @@ func (a *actor) CanFetchCerts() bool {
// The returned error may be of type [inUseOtherUserError]. // The returned error may be of type [inUseOtherUserError].
// //
// onDone must be called when the HTTP request is done. // onDone must be called when the HTTP request is done.
func (s *Server) addActiveHTTPRequest(req *http.Request, actor *actor) (onDone func(), err error) { func (s *Server) addActiveHTTPRequest(req *http.Request, actor ipnauth.Actor) (onDone func(), err error) {
if actor == nil { if actor == nil {
return nil, errors.New("internal error: nil actor") return nil, errors.New("internal error: nil actor")
} }