mirror of
https://github.com/tailscale/tailscale.git
synced 2025-10-24 09:39:39 +00:00
cmd/tailscale,controlclient,ipnlocal: fix 'up', deflake tests more
The CLI's "up" is kinda chaotic and LocalBackend.Start is kinda chaotic and they both need to be redone/deleted (respectively), but this fixes some buggy behavior meanwhile. We were previously calling StartLoginInteractive (to start the controlclient's RegisterRequest) redundantly in some cases, causing test flakes depending on timing and up's weird state machine. We only need to call StartLoginInteractive in the client if Start itself doesn't. But Start doesn't tell us that. So cheat a bit and a put the information about whether there's a current NodeKey in the ipn.Status. It used to be accessible over LocalAPI via GetPrefs as a private key but we removed that for security. But a bool is fine. So then only call StartLoginInteractive if that bool is false and don't do it in the WatchIPNBus loop. Fixes #12028 Updates #12042 Change-Id: I0923c3f704a9d6afd825a858eb9a63ca7c1df294 Signed-off-by: Brad Fitzpatrick <bradfitz@tailscale.com>
This commit is contained in:
committed by
Brad Fitzpatrick
parent
e5ef35857f
commit
e968b0ecd7
@@ -259,7 +259,7 @@ func TestStateSavedOnStart(t *testing.T) {
|
||||
n1.MustDown()
|
||||
|
||||
// And change the hostname to something:
|
||||
if err := n1.Tailscale("up", "--login-server="+n1.env.ControlServer.URL, "--hostname=foo").Run(); err != nil {
|
||||
if err := n1.Tailscale("up", "--login-server="+n1.env.controlURL(), "--hostname=foo").Run(); err != nil {
|
||||
t.Fatalf("up: %v", err)
|
||||
}
|
||||
|
||||
@@ -289,9 +289,9 @@ func TestOneNodeUpAuth(t *testing.T) {
|
||||
st := n1.MustStatus()
|
||||
t.Logf("Status: %s", st.BackendState)
|
||||
|
||||
t.Logf("Running up --login-server=%s ...", env.ControlServer.URL)
|
||||
t.Logf("Running up --login-server=%s ...", env.controlURL())
|
||||
|
||||
cmd := n1.Tailscale("up", "--login-server="+env.ControlServer.URL)
|
||||
cmd := n1.Tailscale("up", "--login-server="+env.controlURL())
|
||||
var authCountAtomic int32
|
||||
cmd.Stdout = &authURLParserWriter{fn: func(urlStr string) error {
|
||||
if env.Control.CompleteAuth(urlStr) {
|
||||
@@ -1069,7 +1069,7 @@ func TestAutoUpdateDefaults(t *testing.T) {
|
||||
// Should not be changed even if sent "true" later.
|
||||
sendAndCheckDefault(t, n, true, false)
|
||||
// But can be changed explicitly by the user.
|
||||
if out, err := n.Tailscale("set", "--auto-update").CombinedOutput(); err != nil {
|
||||
if out, err := n.TailscaleForOutput("set", "--auto-update").CombinedOutput(); err != nil {
|
||||
t.Fatalf("failed to enable auto-update on node: %v\noutput: %s", err, out)
|
||||
}
|
||||
sendAndCheckDefault(t, n, false, true)
|
||||
@@ -1083,7 +1083,7 @@ func TestAutoUpdateDefaults(t *testing.T) {
|
||||
// Should not be changed even if sent "false" later.
|
||||
sendAndCheckDefault(t, n, false, true)
|
||||
// But can be changed explicitly by the user.
|
||||
if out, err := n.Tailscale("set", "--auto-update=false").CombinedOutput(); err != nil {
|
||||
if out, err := n.TailscaleForOutput("set", "--auto-update=false").CombinedOutput(); err != nil {
|
||||
t.Fatalf("failed to disable auto-update on node: %v\noutput: %s", err, out)
|
||||
}
|
||||
sendAndCheckDefault(t, n, true, false)
|
||||
@@ -1093,7 +1093,7 @@ func TestAutoUpdateDefaults(t *testing.T) {
|
||||
desc: "user-sets-first",
|
||||
run: func(t *testing.T, n *testNode) {
|
||||
// User sets auto-update first, before receiving defaults.
|
||||
if out, err := n.Tailscale("set", "--auto-update=false").CombinedOutput(); err != nil {
|
||||
if out, err := n.TailscaleForOutput("set", "--auto-update=false").CombinedOutput(); err != nil {
|
||||
t.Fatalf("failed to disable auto-update on node: %v\noutput: %s", err, out)
|
||||
}
|
||||
// Defaults sent from control should be ignored.
|
||||
@@ -1135,6 +1135,16 @@ type testEnv struct {
|
||||
TrafficTrapServer *httptest.Server
|
||||
}
|
||||
|
||||
// controlURL returns e.ControlServer.URL, panicking if it's the empty string,
|
||||
// which it should never be in tests.
|
||||
func (e *testEnv) controlURL() string {
|
||||
s := e.ControlServer.URL
|
||||
if s == "" {
|
||||
panic("control server not set")
|
||||
}
|
||||
return s
|
||||
}
|
||||
|
||||
type testEnvOpt interface {
|
||||
modifyTestEnv(*testEnv)
|
||||
}
|
||||
@@ -1183,6 +1193,7 @@ func newTestEnv(t testing.TB, opts ...testEnvOpt) *testEnv {
|
||||
e.TrafficTrapServer.Close()
|
||||
e.ControlServer.Close()
|
||||
})
|
||||
t.Logf("control URL: %v", e.controlURL())
|
||||
return e
|
||||
}
|
||||
|
||||
@@ -1445,7 +1456,7 @@ func (n *testNode) MustUp(extraArgs ...string) {
|
||||
t.Helper()
|
||||
args := []string{
|
||||
"up",
|
||||
"--login-server=" + n.env.ControlServer.URL,
|
||||
"--login-server=" + n.env.controlURL(),
|
||||
"--reset",
|
||||
}
|
||||
args = append(args, extraArgs...)
|
||||
@@ -1585,6 +1596,13 @@ func (n *testNode) AwaitNeedsLogin() {
|
||||
}
|
||||
}
|
||||
|
||||
func (n *testNode) TailscaleForOutput(arg ...string) *exec.Cmd {
|
||||
cmd := n.Tailscale(arg...)
|
||||
cmd.Stdout = nil
|
||||
cmd.Stderr = nil
|
||||
return cmd
|
||||
}
|
||||
|
||||
// Tailscale returns a command that runs the tailscale CLI with the provided arguments.
|
||||
// It does not start the process.
|
||||
func (n *testNode) Tailscale(arg ...string) *exec.Cmd {
|
||||
|
||||
Reference in New Issue
Block a user