mirror of
https://github.com/tailscale/tailscale.git
synced 2024-11-30 05:25:35 +00:00
3672f29a4e
The goal is to move more network state accessors to netmon.Monitor where they can be cheaper/cached. But first (this change and others) we need to make sure the one netmon.Monitor is plumbed everywhere. Some notable bits: * tsdial.NewDialer is added, taking a now-required netmon * because a tsdial.Dialer always has a netmon, anything taking both a Dialer and a NetMon is now redundant; take only the Dialer and get the NetMon from that if/when needed. * netmon.NewStatic is added, primarily for tests Updates tailscale/corp#10910 Updates tailscale/corp#18960 Updates #7967 Updates #3299 Change-Id: I877f9cb87618c4eb037cee098241d18da9c01691 Signed-off-by: Brad Fitzpatrick <bradfitz@tailscale.com>
213 lines
5.5 KiB
Go
213 lines
5.5 KiB
Go
// Copyright (c) Tailscale Inc & AUTHORS
|
|
// SPDX-License-Identifier: BSD-3-Clause
|
|
|
|
package prober
|
|
|
|
import (
|
|
"context"
|
|
"crypto/sha256"
|
|
"crypto/tls"
|
|
"encoding/json"
|
|
"net"
|
|
"net/http"
|
|
"net/http/httptest"
|
|
"testing"
|
|
"time"
|
|
|
|
"tailscale.com/derp"
|
|
"tailscale.com/derp/derphttp"
|
|
"tailscale.com/net/netmon"
|
|
"tailscale.com/tailcfg"
|
|
"tailscale.com/types/key"
|
|
)
|
|
|
|
func TestDerpProber(t *testing.T) {
|
|
dm := &tailcfg.DERPMap{
|
|
Regions: map[int]*tailcfg.DERPRegion{
|
|
0: {
|
|
RegionID: 0,
|
|
RegionCode: "zero",
|
|
Nodes: []*tailcfg.DERPNode{
|
|
{
|
|
Name: "n1",
|
|
RegionID: 0,
|
|
HostName: "derpn1.tailscale.test",
|
|
IPv4: "1.1.1.1",
|
|
IPv6: "::1",
|
|
},
|
|
{
|
|
Name: "n2",
|
|
RegionID: 0,
|
|
HostName: "derpn2.tailscale.test",
|
|
IPv4: "1.1.1.1",
|
|
IPv6: "::1",
|
|
},
|
|
},
|
|
},
|
|
},
|
|
}
|
|
srv := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
resp, err := json.Marshal(dm)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
w.Write(resp)
|
|
}))
|
|
defer srv.Close()
|
|
|
|
clk := newFakeTime()
|
|
p := newForTest(clk.Now, clk.NewTicker)
|
|
dp := &derpProber{
|
|
p: p,
|
|
derpMapURL: srv.URL,
|
|
tlsInterval: time.Second,
|
|
tlsProbeFn: func(_ string) ProbeClass { return FuncProbe(func(context.Context) error { return nil }) },
|
|
udpInterval: time.Second,
|
|
udpProbeFn: func(_ string, _ int) ProbeClass { return FuncProbe(func(context.Context) error { return nil }) },
|
|
meshInterval: time.Second,
|
|
meshProbeFn: func(_, _ string) ProbeClass { return FuncProbe(func(context.Context) error { return nil }) },
|
|
nodes: make(map[string]*tailcfg.DERPNode),
|
|
probes: make(map[string]*Probe),
|
|
}
|
|
if err := dp.probeMapFn(context.Background()); err != nil {
|
|
t.Errorf("unexpected probeMapFn() error: %s", err)
|
|
}
|
|
if len(dp.nodes) != 2 || dp.nodes["n1"] == nil || dp.nodes["n2"] == nil {
|
|
t.Errorf("unexpected nodes: %+v", dp.nodes)
|
|
}
|
|
// Probes expected for two nodes:
|
|
// - 3 regular probes per node (TLS, UDPv4, UDPv6)
|
|
// - 4 mesh probes (N1->N2, N1->N1, N2->N1, N2->N2)
|
|
if len(dp.probes) != 10 {
|
|
t.Errorf("unexpected probes: %+v", dp.probes)
|
|
}
|
|
|
|
// Add one more node and check that probes got created.
|
|
dm.Regions[0].Nodes = append(dm.Regions[0].Nodes, &tailcfg.DERPNode{
|
|
Name: "n3",
|
|
RegionID: 0,
|
|
HostName: "derpn3.tailscale.test",
|
|
IPv4: "1.1.1.1",
|
|
IPv6: "::1",
|
|
})
|
|
if err := dp.probeMapFn(context.Background()); err != nil {
|
|
t.Errorf("unexpected probeMapFn() error: %s", err)
|
|
}
|
|
if len(dp.nodes) != 3 {
|
|
t.Errorf("unexpected nodes: %+v", dp.nodes)
|
|
}
|
|
// 9 regular probes + 9 mesh probes
|
|
if len(dp.probes) != 18 {
|
|
t.Errorf("unexpected probes: %+v", dp.probes)
|
|
}
|
|
|
|
// Remove 2 nodes and check that probes have been destroyed.
|
|
dm.Regions[0].Nodes = dm.Regions[0].Nodes[:1]
|
|
if err := dp.probeMapFn(context.Background()); err != nil {
|
|
t.Errorf("unexpected probeMapFn() error: %s", err)
|
|
}
|
|
if len(dp.nodes) != 1 {
|
|
t.Errorf("unexpected nodes: %+v", dp.nodes)
|
|
}
|
|
// 3 regular probes + 1 mesh probe
|
|
if len(dp.probes) != 4 {
|
|
t.Errorf("unexpected probes: %+v", dp.probes)
|
|
}
|
|
}
|
|
|
|
func TestRunDerpProbeNodePair(t *testing.T) {
|
|
// os.Setenv("DERP_DEBUG_LOGS", "true")
|
|
serverPrivateKey := key.NewNode()
|
|
s := derp.NewServer(serverPrivateKey, t.Logf)
|
|
defer s.Close()
|
|
|
|
httpsrv := &http.Server{
|
|
TLSNextProto: make(map[string]func(*http.Server, *tls.Conn, http.Handler)),
|
|
Handler: derphttp.Handler(s),
|
|
}
|
|
ln, err := net.Listen("tcp4", "localhost:0")
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
serverURL := "http://" + ln.Addr().String()
|
|
t.Logf("server URL: %s", serverURL)
|
|
|
|
go func() {
|
|
if err := httpsrv.Serve(ln); err != nil {
|
|
if err == http.ErrServerClosed {
|
|
return
|
|
}
|
|
panic(err)
|
|
}
|
|
}()
|
|
newClient := func() *derphttp.Client {
|
|
c, err := derphttp.NewClient(key.NewNode(), serverURL, t.Logf, netmon.NewStatic())
|
|
if err != nil {
|
|
t.Fatalf("NewClient: %v", err)
|
|
}
|
|
m, err := c.Recv()
|
|
if err != nil {
|
|
t.Fatalf("Recv: %v", err)
|
|
}
|
|
switch m.(type) {
|
|
case derp.ServerInfoMessage:
|
|
default:
|
|
t.Fatalf("unexpected first message type %T", m)
|
|
}
|
|
return c
|
|
}
|
|
|
|
c1 := newClient()
|
|
defer c1.Close()
|
|
c2 := newClient()
|
|
defer c2.Close()
|
|
|
|
ctx, cancel := context.WithTimeout(context.Background(), 15*time.Second)
|
|
defer cancel()
|
|
|
|
err = runDerpProbeNodePair(ctx, &tailcfg.DERPNode{Name: "c1"}, &tailcfg.DERPNode{Name: "c2"}, c1, c2, 100_000_000)
|
|
if err != nil {
|
|
t.Error(err)
|
|
}
|
|
}
|
|
|
|
func Test_packetsForSize(t *testing.T) {
|
|
tests := []struct {
|
|
name string
|
|
size int
|
|
wantPackets int
|
|
wantUnique bool
|
|
}{
|
|
{"small_unqiue", 8, 1, true},
|
|
{"8k_unique", 8192, 1, true},
|
|
{"full_size_packet", derp.MaxPacketSize, 1, true},
|
|
{"larger_than_one", derp.MaxPacketSize + 1, 2, false},
|
|
{"large", 500000, 8, false},
|
|
}
|
|
for _, tt := range tests {
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
hashes := make(map[string]int)
|
|
for range 5 {
|
|
pkts := packetsForSize(int64(tt.size))
|
|
if len(pkts) != tt.wantPackets {
|
|
t.Errorf("packetsForSize(%d) got %d packets, want %d", tt.size, len(pkts), tt.wantPackets)
|
|
}
|
|
var total int
|
|
hash := sha256.New()
|
|
for _, p := range pkts {
|
|
hash.Write(p)
|
|
total += len(p)
|
|
}
|
|
hashes[string(hash.Sum(nil))]++
|
|
if total != tt.size {
|
|
t.Errorf("packetsForSize(%d) returned %d bytes total", tt.size, total)
|
|
}
|
|
}
|
|
unique := len(hashes) > 1
|
|
if unique != tt.wantUnique {
|
|
t.Errorf("packetsForSize(%d) is unique=%v (returned %d different answers); want unique=%v", tt.size, unique, len(hashes), unique)
|
|
}
|
|
})
|
|
}
|
|
}
|