2020-08-06 22:57:03 +01:00
|
|
|
// Copyright (c) 2020 Tailscale Inc & AUTHORS All rights reserved.
|
|
|
|
// Use of this source code is governed by a BSD-style
|
|
|
|
// license that can be found in the LICENSE file.
|
|
|
|
|
|
|
|
package wgengine
|
|
|
|
|
|
|
|
import (
|
|
|
|
"bytes"
|
|
|
|
"fmt"
|
2020-10-13 20:04:52 +01:00
|
|
|
"reflect"
|
2020-08-06 22:57:03 +01:00
|
|
|
"testing"
|
|
|
|
"time"
|
|
|
|
|
2020-10-13 20:04:52 +01:00
|
|
|
"github.com/tailscale/wireguard-go/wgcfg"
|
|
|
|
"go4.org/mem"
|
2020-12-24 20:33:55 +00:00
|
|
|
"inet.af/netaddr"
|
2020-08-06 22:57:03 +01:00
|
|
|
"tailscale.com/tailcfg"
|
|
|
|
"tailscale.com/types/key"
|
2020-10-13 20:04:52 +01:00
|
|
|
"tailscale.com/wgengine/router"
|
2020-08-06 22:57:03 +01:00
|
|
|
"tailscale.com/wgengine/tstun"
|
|
|
|
)
|
|
|
|
|
|
|
|
func TestNoteReceiveActivity(t *testing.T) {
|
|
|
|
now := time.Unix(1, 0)
|
|
|
|
var logBuf bytes.Buffer
|
|
|
|
|
|
|
|
confc := make(chan bool, 1)
|
|
|
|
gotConf := func() bool {
|
|
|
|
select {
|
|
|
|
case <-confc:
|
|
|
|
return true
|
|
|
|
default:
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
}
|
|
|
|
e := &userspaceEngine{
|
|
|
|
timeNow: func() time.Time { return now },
|
|
|
|
recvActivityAt: map[tailcfg.DiscoKey]time.Time{},
|
|
|
|
logf: func(format string, a ...interface{}) {
|
|
|
|
fmt.Fprintf(&logBuf, format, a...)
|
|
|
|
},
|
|
|
|
tundev: new(tstun.TUN),
|
|
|
|
testMaybeReconfigHook: func() { confc <- true },
|
2020-08-26 20:20:09 +01:00
|
|
|
trimmedDisco: map[tailcfg.DiscoKey]bool{},
|
2020-08-06 22:57:03 +01:00
|
|
|
}
|
|
|
|
ra := e.recvActivityAt
|
|
|
|
|
|
|
|
dk := tailcfg.DiscoKey(key.NewPrivate().Public())
|
|
|
|
|
|
|
|
// Activity on an untracked key should do nothing.
|
|
|
|
e.noteReceiveActivity(dk)
|
|
|
|
if len(ra) != 0 {
|
|
|
|
t.Fatalf("unexpected growth in map: now has %d keys; want 0", len(ra))
|
|
|
|
}
|
|
|
|
if logBuf.Len() != 0 {
|
|
|
|
t.Fatalf("unexpected log write (and thus activity): %s", logBuf.Bytes())
|
|
|
|
}
|
|
|
|
|
2020-08-26 20:20:09 +01:00
|
|
|
// Now track it, but don't mark it trimmed, so shouldn't update.
|
2020-08-06 22:57:03 +01:00
|
|
|
ra[dk] = time.Time{}
|
|
|
|
e.noteReceiveActivity(dk)
|
|
|
|
if len(ra) != 1 {
|
|
|
|
t.Fatalf("unexpected growth in map: now has %d keys; want 1", len(ra))
|
|
|
|
}
|
|
|
|
if got := ra[dk]; got != now {
|
|
|
|
t.Fatalf("time in map = %v; want %v", got, now)
|
|
|
|
}
|
2020-08-26 20:20:09 +01:00
|
|
|
if gotConf() {
|
|
|
|
t.Fatalf("unexpected reconfig")
|
2020-08-06 22:57:03 +01:00
|
|
|
}
|
|
|
|
|
2020-08-26 20:20:09 +01:00
|
|
|
// Now mark it trimmed and expect an update.
|
|
|
|
e.trimmedDisco[dk] = true
|
2020-08-06 22:57:03 +01:00
|
|
|
e.noteReceiveActivity(dk)
|
2020-08-26 20:20:09 +01:00
|
|
|
if len(ra) != 1 {
|
|
|
|
t.Fatalf("unexpected growth in map: now has %d keys; want 1", len(ra))
|
|
|
|
}
|
|
|
|
if got := ra[dk]; got != now {
|
|
|
|
t.Fatalf("time in map = %v; want %v", got, now)
|
|
|
|
}
|
2020-08-06 22:57:03 +01:00
|
|
|
if !gotConf() {
|
2020-08-26 20:20:09 +01:00
|
|
|
t.Fatalf("didn't get expected reconfig")
|
2020-08-06 22:57:03 +01:00
|
|
|
}
|
|
|
|
}
|
2020-10-13 20:04:52 +01:00
|
|
|
|
|
|
|
func TestUserspaceEngineReconfig(t *testing.T) {
|
2020-09-03 23:45:41 +01:00
|
|
|
e, err := NewFakeUserspaceEngine(t.Logf, 0, nil)
|
2020-10-13 20:04:52 +01:00
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
defer e.Close()
|
|
|
|
ue := e.(*userspaceEngine)
|
|
|
|
|
|
|
|
routerCfg := &router.Config{}
|
|
|
|
|
|
|
|
for _, discoHex := range []string{
|
|
|
|
"aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa",
|
|
|
|
"bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbb",
|
|
|
|
} {
|
|
|
|
cfg := &wgcfg.Config{
|
|
|
|
Peers: []wgcfg.Peer{
|
|
|
|
{
|
2020-12-24 20:33:55 +00:00
|
|
|
AllowedIPs: []netaddr.IPPrefix{
|
|
|
|
{IP: netaddr.IPv4(100, 100, 99, 1), Bits: 32},
|
2020-10-13 20:04:52 +01:00
|
|
|
},
|
2021-01-14 01:10:41 +00:00
|
|
|
Endpoints: discoHex + ".disco.tailscale:12345",
|
2020-10-13 20:04:52 +01:00
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
err = e.Reconfig(cfg, routerCfg)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
wantRecvAt := map[tailcfg.DiscoKey]time.Time{
|
|
|
|
dkFromHex(discoHex): time.Time{},
|
|
|
|
}
|
|
|
|
if got := ue.recvActivityAt; !reflect.DeepEqual(got, wantRecvAt) {
|
|
|
|
t.Errorf("wrong recvActivityAt\n got: %v\nwant: %v\n", got, wantRecvAt)
|
|
|
|
}
|
|
|
|
|
|
|
|
wantTrimmedDisco := map[tailcfg.DiscoKey]bool{
|
|
|
|
dkFromHex(discoHex): true,
|
|
|
|
}
|
|
|
|
if got := ue.trimmedDisco; !reflect.DeepEqual(got, wantTrimmedDisco) {
|
|
|
|
t.Errorf("wrong wantTrimmedDisco\n got: %v\nwant: %v\n", got, wantTrimmedDisco)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func dkFromHex(hex string) tailcfg.DiscoKey {
|
|
|
|
if len(hex) != 64 {
|
|
|
|
panic(fmt.Sprintf("%q is len %d; want 64", hex, len(hex)))
|
|
|
|
}
|
|
|
|
k, err := key.NewPublicFromHexMem(mem.S(hex[:64]))
|
|
|
|
if err != nil {
|
|
|
|
panic(fmt.Sprintf("%q is not hex: %v", hex, err))
|
|
|
|
}
|
|
|
|
return tailcfg.DiscoKey(k)
|
|
|
|
}
|