mirror of
https://github.com/tailscale/tailscale.git
synced 2024-11-25 19:15:34 +00:00
cmd/tailscale: pull out, parameterize up FlagSet creation for tests
Signed-off-by: Brad Fitzpatrick <bradfitz@tailscale.com>
This commit is contained in:
parent
98d7c28faa
commit
fb67d8311c
@ -145,7 +145,7 @@ func TestCheckForAccidentalSettingReverts(t *testing.T) {
|
|||||||
flagSet: f("authkey"),
|
flagSet: f("authkey"),
|
||||||
curPrefs: ipn.NewPrefs(),
|
curPrefs: ipn.NewPrefs(),
|
||||||
mp: &ipn.MaskedPrefs{
|
mp: &ipn.MaskedPrefs{
|
||||||
Prefs: *defaultPrefsFromUpArgs(t),
|
Prefs: *defaultPrefsFromUpArgs(t, "linux"),
|
||||||
WantRunningSet: true,
|
WantRunningSet: true,
|
||||||
},
|
},
|
||||||
want: "",
|
want: "",
|
||||||
@ -382,13 +382,8 @@ func TestCheckForAccidentalSettingReverts(t *testing.T) {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func defaultPrefsFromUpArgs(t testing.TB) *ipn.Prefs {
|
func defaultPrefsFromUpArgs(t testing.TB, goos string) *ipn.Prefs {
|
||||||
upFlagSet.Parse(nil) // populates upArgs
|
upArgs := defaultUpArgsByGOOS(goos)
|
||||||
if upFlagSet.Lookup("netfilter-mode") == nil && upArgs.netfilterMode == "" {
|
|
||||||
// This flag is not compiled on on-Linux platforms,
|
|
||||||
// but prefsFromUpArgs requires it be populated.
|
|
||||||
upArgs.netfilterMode = defaultNetfilterMode()
|
|
||||||
}
|
|
||||||
prefs, err := prefsFromUpArgs(upArgs, logger.Discard, new(ipnstate.Status), "linux")
|
prefs, err := prefsFromUpArgs(upArgs, logger.Discard, new(ipnstate.Status), "linux")
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatalf("defaultPrefsFromUpArgs: %v", err)
|
t.Fatalf("defaultPrefsFromUpArgs: %v", err)
|
||||||
@ -397,6 +392,12 @@ func defaultPrefsFromUpArgs(t testing.TB) *ipn.Prefs {
|
|||||||
return prefs
|
return prefs
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func defaultUpArgsByGOOS(goos string) (args upArgsT) {
|
||||||
|
fs := newUpFlagSet(goos, &args)
|
||||||
|
fs.Parse(nil) // populates args
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
func TestPrefsFromUpArgs(t *testing.T) {
|
func TestPrefsFromUpArgs(t *testing.T) {
|
||||||
tests := []struct {
|
tests := []struct {
|
||||||
name string
|
name string
|
||||||
@ -408,13 +409,29 @@ func TestPrefsFromUpArgs(t *testing.T) {
|
|||||||
wantWarn string
|
wantWarn string
|
||||||
}{
|
}{
|
||||||
{
|
{
|
||||||
name: "zero",
|
name: "default_linux",
|
||||||
goos: "windows",
|
goos: "linux",
|
||||||
args: upArgsT{},
|
args: defaultUpArgsByGOOS("linux"),
|
||||||
want: &ipn.Prefs{
|
want: &ipn.Prefs{
|
||||||
WantRunning: true,
|
ControlURL: ipn.DefaultControlURL,
|
||||||
NoSNAT: true,
|
WantRunning: true,
|
||||||
NetfilterMode: preftype.NetfilterOn, // silly, but default from ipn.NewPref currently
|
NoSNAT: false,
|
||||||
|
NetfilterMode: preftype.NetfilterOn,
|
||||||
|
CorpDNS: true,
|
||||||
|
AllowSingleHosts: true,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "default_windows",
|
||||||
|
goos: "windows",
|
||||||
|
args: defaultUpArgsByGOOS("windows"),
|
||||||
|
want: &ipn.Prefs{
|
||||||
|
ControlURL: ipn.DefaultControlURL,
|
||||||
|
WantRunning: true,
|
||||||
|
CorpDNS: true,
|
||||||
|
AllowSingleHosts: true,
|
||||||
|
NetfilterMode: preftype.NetfilterOn,
|
||||||
|
NoSNAT: true,
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -52,7 +52,9 @@
|
|||||||
Exec: runUp,
|
Exec: runUp,
|
||||||
}
|
}
|
||||||
|
|
||||||
var upFlagSet = (func() *flag.FlagSet {
|
var upFlagSet = newUpFlagSet(runtime.GOOS, &upArgs)
|
||||||
|
|
||||||
|
func newUpFlagSet(goos string, upArgs *upArgsT) *flag.FlagSet {
|
||||||
upf := flag.NewFlagSet("up", flag.ExitOnError)
|
upf := flag.NewFlagSet("up", flag.ExitOnError)
|
||||||
|
|
||||||
upf.BoolVar(&upArgs.forceReauth, "force-reauth", false, "force reauthentication")
|
upf.BoolVar(&upArgs.forceReauth, "force-reauth", false, "force reauthentication")
|
||||||
@ -70,18 +72,18 @@
|
|||||||
upf.StringVar(&upArgs.hostname, "hostname", "", "hostname to use instead of the one provided by the OS")
|
upf.StringVar(&upArgs.hostname, "hostname", "", "hostname to use instead of the one provided by the OS")
|
||||||
upf.StringVar(&upArgs.advertiseRoutes, "advertise-routes", "", "routes to advertise to other nodes (comma-separated, e.g. \"10.0.0.0/8,192.168.0.0/24\")")
|
upf.StringVar(&upArgs.advertiseRoutes, "advertise-routes", "", "routes to advertise to other nodes (comma-separated, e.g. \"10.0.0.0/8,192.168.0.0/24\")")
|
||||||
upf.BoolVar(&upArgs.advertiseDefaultRoute, "advertise-exit-node", false, "offer to be an exit node for internet traffic for the tailnet")
|
upf.BoolVar(&upArgs.advertiseDefaultRoute, "advertise-exit-node", false, "offer to be an exit node for internet traffic for the tailnet")
|
||||||
if safesocket.PlatformUsesPeerCreds() {
|
if safesocket.GOOSUsesPeerCreds(goos) {
|
||||||
upf.StringVar(&upArgs.opUser, "operator", "", "Unix username to allow to operate on tailscaled without sudo")
|
upf.StringVar(&upArgs.opUser, "operator", "", "Unix username to allow to operate on tailscaled without sudo")
|
||||||
}
|
}
|
||||||
if runtime.GOOS == "linux" {
|
switch goos {
|
||||||
|
case "linux":
|
||||||
upf.BoolVar(&upArgs.snat, "snat-subnet-routes", true, "source NAT traffic to local routes advertised with --advertise-routes")
|
upf.BoolVar(&upArgs.snat, "snat-subnet-routes", true, "source NAT traffic to local routes advertised with --advertise-routes")
|
||||||
upf.StringVar(&upArgs.netfilterMode, "netfilter-mode", defaultNetfilterMode(), "netfilter mode (one of on, nodivert, off)")
|
upf.StringVar(&upArgs.netfilterMode, "netfilter-mode", defaultNetfilterMode(), "netfilter mode (one of on, nodivert, off)")
|
||||||
}
|
case "windows":
|
||||||
if runtime.GOOS == "windows" {
|
|
||||||
upf.BoolVar(&upArgs.forceDaemon, "unattended", false, "run in \"Unattended Mode\" where Tailscale keeps running even after the current GUI user logs out (Windows-only)")
|
upf.BoolVar(&upArgs.forceDaemon, "unattended", false, "run in \"Unattended Mode\" where Tailscale keeps running even after the current GUI user logs out (Windows-only)")
|
||||||
}
|
}
|
||||||
return upf
|
return upf
|
||||||
})()
|
}
|
||||||
|
|
||||||
func defaultNetfilterMode() string {
|
func defaultNetfilterMode() string {
|
||||||
if distro.Get() == distro.Synology {
|
if distro.Get() == distro.Synology {
|
||||||
|
@ -61,8 +61,12 @@ func LocalTCPPortAndToken() (port int, token string, err error) {
|
|||||||
|
|
||||||
// PlatformUsesPeerCreds reports whether the current platform uses peer credentials
|
// PlatformUsesPeerCreds reports whether the current platform uses peer credentials
|
||||||
// to authenticate connections.
|
// to authenticate connections.
|
||||||
func PlatformUsesPeerCreds() bool {
|
func PlatformUsesPeerCreds() bool { return GOOSUsesPeerCreds(runtime.GOOS) }
|
||||||
switch runtime.GOOS {
|
|
||||||
|
// GOOSUsesPeerCreds is like PlatformUsesPeerCreds but takes a
|
||||||
|
// runtime.GOOS value instead of using the current one.
|
||||||
|
func GOOSUsesPeerCreds(goos string) bool {
|
||||||
|
switch goos {
|
||||||
case "linux", "darwin", "freebsd":
|
case "linux", "darwin", "freebsd":
|
||||||
return true
|
return true
|
||||||
}
|
}
|
||||||
|
Loading…
Reference in New Issue
Block a user