mirror of
https://github.com/tailscale/tailscale.git
synced 2024-11-29 04:55:31 +00:00
25a7204bb4
This adds the capability to pad disco ping message payloads to reach a specified size. It also plumbs it through to the tailscale ping -size flag. Disco pings used for actual endpoint discovery do not use this yet. Updates #311. Signed-off-by: salman <salman@tailscale.com> Co-authored-by: Val <valerie@tailscale.com>
119 lines
3.0 KiB
Go
119 lines
3.0 KiB
Go
// Copyright (c) Tailscale Inc & AUTHORS
|
|
// SPDX-License-Identifier: BSD-3-Clause
|
|
|
|
package disco
|
|
|
|
import (
|
|
"fmt"
|
|
"net/netip"
|
|
"reflect"
|
|
"strings"
|
|
"testing"
|
|
|
|
"go4.org/mem"
|
|
"tailscale.com/types/key"
|
|
)
|
|
|
|
func TestMarshalAndParse(t *testing.T) {
|
|
tests := []struct {
|
|
name string
|
|
want string
|
|
m Message
|
|
}{
|
|
{
|
|
name: "ping",
|
|
m: &Ping{
|
|
TxID: [12]byte{1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12},
|
|
},
|
|
want: "01 00 01 02 03 04 05 06 07 08 09 0a 0b 0c",
|
|
},
|
|
{
|
|
name: "ping_with_nodekey_src",
|
|
m: &Ping{
|
|
TxID: [12]byte{1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12},
|
|
NodeKey: key.NodePublicFromRaw32(mem.B([]byte{1: 1, 2: 2, 30: 30, 31: 31})),
|
|
},
|
|
want: "01 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 00 01 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1e 1f",
|
|
},
|
|
{
|
|
name: "ping_with_padding",
|
|
m: &Ping{
|
|
TxID: [12]byte{1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12},
|
|
Padding: 3,
|
|
},
|
|
want: "01 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 00 00 00",
|
|
},
|
|
{
|
|
name: "ping_with_padding_and_nodekey_src",
|
|
m: &Ping{
|
|
TxID: [12]byte{1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12},
|
|
NodeKey: key.NodePublicFromRaw32(mem.B([]byte{1: 1, 2: 2, 30: 30, 31: 31})),
|
|
Padding: 3,
|
|
},
|
|
want: "01 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 00 01 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1e 1f 00 00 00",
|
|
},
|
|
{
|
|
name: "pong",
|
|
m: &Pong{
|
|
TxID: [12]byte{1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12},
|
|
Src: mustIPPort("2.3.4.5:1234"),
|
|
},
|
|
want: "02 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 00 00 00 00 00 00 00 00 00 00 ff ff 02 03 04 05 04 d2",
|
|
},
|
|
{
|
|
name: "pongv6",
|
|
m: &Pong{
|
|
TxID: [12]byte{1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12},
|
|
Src: mustIPPort("[fed0::12]:6666"),
|
|
},
|
|
want: "02 00 01 02 03 04 05 06 07 08 09 0a 0b 0c fe d0 00 00 00 00 00 00 00 00 00 00 00 00 00 12 1a 0a",
|
|
},
|
|
{
|
|
name: "call_me_maybe",
|
|
m: &CallMeMaybe{},
|
|
want: "03 00",
|
|
},
|
|
{
|
|
name: "call_me_maybe_endpoints",
|
|
m: &CallMeMaybe{
|
|
MyNumber: []netip.AddrPort{
|
|
netip.MustParseAddrPort("1.2.3.4:567"),
|
|
netip.MustParseAddrPort("[2001::3456]:789"),
|
|
},
|
|
},
|
|
want: "03 00 00 00 00 00 00 00 00 00 00 00 ff ff 01 02 03 04 02 37 20 01 00 00 00 00 00 00 00 00 00 00 00 00 34 56 03 15",
|
|
},
|
|
}
|
|
for _, tt := range tests {
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
foo := []byte("foo")
|
|
got := string(tt.m.AppendMarshal(foo))
|
|
got, ok := strings.CutPrefix(got, "foo")
|
|
if !ok {
|
|
t.Fatalf("didn't start with foo: got %q", got)
|
|
}
|
|
|
|
gotHex := fmt.Sprintf("% x", got)
|
|
if gotHex != tt.want {
|
|
t.Fatalf("wrong marshal\n got: %s\nwant: %s\n", gotHex, tt.want)
|
|
}
|
|
|
|
back, err := Parse([]byte(got))
|
|
if err != nil {
|
|
t.Fatalf("parse back: %v", err)
|
|
}
|
|
if !reflect.DeepEqual(back, tt.m) {
|
|
t.Errorf("message in %+v doesn't match Parse back result %+v", tt.m, back)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func mustIPPort(s string) netip.AddrPort {
|
|
ipp, err := netip.ParseAddrPort(s)
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
return ipp
|
|
}
|