mirror of
https://github.com/tailscale/tailscale.git
synced 2025-04-03 06:45:49 +00:00
ipn/ipnserver: use ipnauth.Actor instead of *ipnserver.actor whenever possible
In preparation for adding test coverage for ipn/ipnserver.Server, we update it to use ipnauth.Actor instead of its concrete implementation where possible. Updates tailscale/corp#25804 Signed-off-by: Nick Khyl <nickk@tailscale.com>
This commit is contained in:
parent
d818a58a77
commit
d0ba91bdb2
@ -112,11 +112,11 @@ func (a *actor) Username() (string, error) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
type actorOrError struct {
|
type actorOrError struct {
|
||||||
actor *actor
|
actor ipnauth.Actor
|
||||||
err error
|
err error
|
||||||
}
|
}
|
||||||
|
|
||||||
func (a actorOrError) unwrap() (*actor, error) {
|
func (a actorOrError) unwrap() (ipnauth.Actor, error) {
|
||||||
return a.actor, a.err
|
return a.actor, a.err
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -131,9 +131,9 @@ func contextWithActor(ctx context.Context, logf logger.Logf, c net.Conn) context
|
|||||||
return actorKey.WithValue(ctx, actorOrError{actor: actor, err: err})
|
return actorKey.WithValue(ctx, actorOrError{actor: actor, err: err})
|
||||||
}
|
}
|
||||||
|
|
||||||
// actorFromContext returns an [actor] associated with ctx,
|
// actorFromContext returns an [ipnauth.Actor] associated with ctx,
|
||||||
// or an error if the context does not carry an actor's identity.
|
// or an error if the context does not carry an actor's identity.
|
||||||
func actorFromContext(ctx context.Context) (*actor, error) {
|
func actorFromContext(ctx context.Context) (ipnauth.Actor, error) {
|
||||||
return actorKey.Value(ctx).unwrap()
|
return actorKey.Value(ctx).unwrap()
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -22,6 +22,7 @@ import (
|
|||||||
|
|
||||||
"tailscale.com/envknob"
|
"tailscale.com/envknob"
|
||||||
"tailscale.com/ipn"
|
"tailscale.com/ipn"
|
||||||
|
"tailscale.com/ipn/ipnauth"
|
||||||
"tailscale.com/ipn/ipnlocal"
|
"tailscale.com/ipn/ipnlocal"
|
||||||
"tailscale.com/ipn/localapi"
|
"tailscale.com/ipn/localapi"
|
||||||
"tailscale.com/net/netmon"
|
"tailscale.com/net/netmon"
|
||||||
@ -30,6 +31,7 @@ import (
|
|||||||
"tailscale.com/util/mak"
|
"tailscale.com/util/mak"
|
||||||
"tailscale.com/util/set"
|
"tailscale.com/util/set"
|
||||||
"tailscale.com/util/systemd"
|
"tailscale.com/util/systemd"
|
||||||
|
"tailscale.com/util/testenv"
|
||||||
)
|
)
|
||||||
|
|
||||||
// Server is an IPN backend and its set of 0 or more active localhost
|
// Server is an IPN backend and its set of 0 or more active localhost
|
||||||
@ -50,7 +52,7 @@ type Server struct {
|
|||||||
// lock order: mu, then LocalBackend.mu
|
// lock order: mu, then LocalBackend.mu
|
||||||
mu sync.Mutex
|
mu sync.Mutex
|
||||||
lastUserID ipn.WindowsUserID // tracks last userid; on change, Reset state for paranoia
|
lastUserID ipn.WindowsUserID // tracks last userid; on change, Reset state for paranoia
|
||||||
activeReqs map[*http.Request]*actor
|
activeReqs map[*http.Request]ipnauth.Actor
|
||||||
backendWaiter waiterSet // of LocalBackend waiters
|
backendWaiter waiterSet // of LocalBackend waiters
|
||||||
zeroReqWaiter waiterSet // of blockUntilZeroConnections waiters
|
zeroReqWaiter waiterSet // of blockUntilZeroConnections waiters
|
||||||
}
|
}
|
||||||
@ -195,8 +197,12 @@ func (s *Server) serveHTTP(w http.ResponseWriter, r *http.Request) {
|
|||||||
|
|
||||||
if strings.HasPrefix(r.URL.Path, "/localapi/") {
|
if strings.HasPrefix(r.URL.Path, "/localapi/") {
|
||||||
lah := localapi.NewHandler(lb, s.logf, s.backendLogID)
|
lah := localapi.NewHandler(lb, s.logf, s.backendLogID)
|
||||||
lah.PermitRead, lah.PermitWrite = ci.Permissions(lb.OperatorUserID())
|
if actor, ok := ci.(*actor); ok {
|
||||||
lah.PermitCert = ci.CanFetchCerts()
|
lah.PermitRead, lah.PermitWrite = actor.Permissions(lb.OperatorUserID())
|
||||||
|
lah.PermitCert = actor.CanFetchCerts()
|
||||||
|
} else if testenv.InTest() {
|
||||||
|
lah.PermitRead, lah.PermitWrite = true, true
|
||||||
|
}
|
||||||
lah.Actor = ci
|
lah.Actor = ci
|
||||||
lah.ServeHTTP(w, r)
|
lah.ServeHTTP(w, r)
|
||||||
return
|
return
|
||||||
@ -230,11 +236,11 @@ func (e inUseOtherUserError) Unwrap() error { return e.error }
|
|||||||
// The returned error, when non-nil, will be of type inUseOtherUserError.
|
// The returned error, when non-nil, will be of type inUseOtherUserError.
|
||||||
//
|
//
|
||||||
// s.mu must be held.
|
// s.mu must be held.
|
||||||
func (s *Server) checkConnIdentityLocked(ci *actor) error {
|
func (s *Server) checkConnIdentityLocked(ci ipnauth.Actor) error {
|
||||||
// If clients are already connected, verify they're the same user.
|
// If clients are already connected, verify they're the same user.
|
||||||
// This mostly matters on Windows at the moment.
|
// This mostly matters on Windows at the moment.
|
||||||
if len(s.activeReqs) > 0 {
|
if len(s.activeReqs) > 0 {
|
||||||
var active *actor
|
var active ipnauth.Actor
|
||||||
for _, active = range s.activeReqs {
|
for _, active = range s.activeReqs {
|
||||||
break
|
break
|
||||||
}
|
}
|
||||||
@ -251,7 +257,9 @@ func (s *Server) checkConnIdentityLocked(ci *actor) error {
|
|||||||
if username, err := active.Username(); err == nil {
|
if username, err := active.Username(); err == nil {
|
||||||
fmt.Fprintf(&b, " by %s", username)
|
fmt.Fprintf(&b, " by %s", username)
|
||||||
}
|
}
|
||||||
fmt.Fprintf(&b, ", pid %d", active.pid())
|
if active, ok := active.(*actor); ok {
|
||||||
|
fmt.Fprintf(&b, ", pid %d", active.pid())
|
||||||
|
}
|
||||||
return inUseOtherUserError{errors.New(b.String())}
|
return inUseOtherUserError{errors.New(b.String())}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -267,7 +275,7 @@ func (s *Server) checkConnIdentityLocked(ci *actor) error {
|
|||||||
//
|
//
|
||||||
// This is primarily used for the Windows GUI, to block until one user's done
|
// This is primarily used for the Windows GUI, to block until one user's done
|
||||||
// controlling the tailscaled process.
|
// controlling the tailscaled process.
|
||||||
func (s *Server) blockWhileIdentityInUse(ctx context.Context, actor *actor) error {
|
func (s *Server) blockWhileIdentityInUse(ctx context.Context, actor ipnauth.Actor) error {
|
||||||
inUse := func() bool {
|
inUse := func() bool {
|
||||||
s.mu.Lock()
|
s.mu.Lock()
|
||||||
defer s.mu.Unlock()
|
defer s.mu.Unlock()
|
||||||
@ -361,7 +369,7 @@ func (a *actor) CanFetchCerts() bool {
|
|||||||
// The returned error may be of type [inUseOtherUserError].
|
// The returned error may be of type [inUseOtherUserError].
|
||||||
//
|
//
|
||||||
// onDone must be called when the HTTP request is done.
|
// onDone must be called when the HTTP request is done.
|
||||||
func (s *Server) addActiveHTTPRequest(req *http.Request, actor *actor) (onDone func(), err error) {
|
func (s *Server) addActiveHTTPRequest(req *http.Request, actor ipnauth.Actor) (onDone func(), err error) {
|
||||||
if actor == nil {
|
if actor == nil {
|
||||||
return nil, errors.New("internal error: nil actor")
|
return nil, errors.New("internal error: nil actor")
|
||||||
}
|
}
|
||||||
|
Loading…
x
Reference in New Issue
Block a user