Add tstest.PanicOnLog(), and fix various problems detected by this.
If a test calls log.Printf, 'go test' horrifyingly rearranges the output to no longer be in chronological order, which makes debugging virtually impossible. Let's stop that from happening by making log.Printf panic if called from any module, no matter how deep, during tests. This required us to change the default error handler in at least one http.Server, as well as plumbing a bunch of logf functions around, especially in magicsock and wgengine, but also in logtail and backoff. To add insult to injury, 'go test' also rearranges the output when a parent test has multiple sub-tests (all the sub-test's t.Logf is always printed after all the parent tests t.Logf), so we need to screw around with a special Logf that can point at the "current" t (current_t.Logf) in some places. Probably our entire way of using subtests is wrong, since 'go test' would probably like to run them all in parallel if you called t.Parallel(), but it definitely can't because the're all manipulating the shared state created by the parent test. They should probably all be separate toplevel tests instead, with common setup/teardown logic. But that's a job for another time. Signed-off-by: Avery Pennarun <apenwarr@tailscale.com>
This commit is contained in:
@ -7,12 +7,12 @@ package filter
|
||||
|
||||
import (
|
||||
"fmt"
|
||||
"log"
|
||||
"sync"
|
||||
"time"
|
||||
|
||||
"github.com/golang/groupcache/lru"
|
||||
"golang.org/x/time/rate"
|
||||
"tailscale.com/types/logger"
|
||||
"tailscale.com/wgengine/packet"
|
||||
)
|
||||
|
||||
@ -23,6 +23,7 @@ type filterState struct {
|
||||
|
||||
// Filter is a stateful packet filter.
|
||||
type Filter struct {
|
||||
logf logger.Logf
|
||||
matches Matches
|
||||
state *filterState
|
||||
}
|
||||
@ -75,20 +76,20 @@ var MatchAllowAll = Matches{
|
||||
}
|
||||
|
||||
// NewAllowAll returns a packet filter that accepts everything.
|
||||
func NewAllowAll() *Filter {
|
||||
return New(MatchAllowAll, nil)
|
||||
func NewAllowAll(logf logger.Logf) *Filter {
|
||||
return New(MatchAllowAll, nil, logf)
|
||||
}
|
||||
|
||||
// NewAllowNone returns a packet filter that rejects everything.
|
||||
func NewAllowNone() *Filter {
|
||||
return New(nil, nil)
|
||||
func NewAllowNone(logf logger.Logf) *Filter {
|
||||
return New(nil, nil, logf)
|
||||
}
|
||||
|
||||
// New creates a new packet Filter with the given Matches rules.
|
||||
// If shareStateWith is non-nil, the returned filter shares state
|
||||
// with the previous one, to enable rules to be changed at runtime
|
||||
// without breaking existing flows.
|
||||
func New(matches Matches, shareStateWith *Filter) *Filter {
|
||||
func New(matches Matches, shareStateWith *Filter, logf logger.Logf) *Filter {
|
||||
var state *filterState
|
||||
if shareStateWith != nil {
|
||||
state = shareStateWith.state
|
||||
@ -98,6 +99,7 @@ func New(matches Matches, shareStateWith *Filter) *Filter {
|
||||
}
|
||||
}
|
||||
f := &Filter{
|
||||
logf: logf,
|
||||
matches: matches,
|
||||
state: state,
|
||||
}
|
||||
@ -119,7 +121,7 @@ func maybeHexdump(flag RunFlags, b []byte) string {
|
||||
var acceptBucket = rate.NewLimiter(rate.Every(10*time.Second), 3)
|
||||
var dropBucket = rate.NewLimiter(rate.Every(5*time.Second), 10)
|
||||
|
||||
func logRateLimit(runflags RunFlags, b []byte, q *packet.QDecode, r Response, why string) {
|
||||
func (f *Filter) logRateLimit(runflags RunFlags, b []byte, q *packet.QDecode, r Response, why string) {
|
||||
if r == Drop && (runflags&LogDrops) != 0 && dropBucket.Allow() {
|
||||
var qs string
|
||||
if q == nil {
|
||||
@ -127,32 +129,32 @@ func logRateLimit(runflags RunFlags, b []byte, q *packet.QDecode, r Response, wh
|
||||
} else {
|
||||
qs = q.String()
|
||||
}
|
||||
log.Printf("Drop: %v %v %s\n%s", qs, len(b), why, maybeHexdump(runflags&HexdumpDrops, b))
|
||||
f.logf("Drop: %v %v %s\n%s", qs, len(b), why, maybeHexdump(runflags&HexdumpDrops, b))
|
||||
} else if r == Accept && (runflags&LogAccepts) != 0 && acceptBucket.Allow() {
|
||||
log.Printf("Accept: %v %v %s\n%s", q, len(b), why, maybeHexdump(runflags&HexdumpAccepts, b))
|
||||
f.logf("Accept: %v %v %s\n%s", q, len(b), why, maybeHexdump(runflags&HexdumpAccepts, b))
|
||||
}
|
||||
}
|
||||
|
||||
func (f *Filter) RunIn(b []byte, q *packet.QDecode, rf RunFlags) Response {
|
||||
r := pre(b, q, rf)
|
||||
r := f.pre(b, q, rf)
|
||||
if r == Accept || r == Drop {
|
||||
// already logged
|
||||
return r
|
||||
}
|
||||
|
||||
r, why := f.runIn(q)
|
||||
logRateLimit(rf, b, q, r, why)
|
||||
f.logRateLimit(rf, b, q, r, why)
|
||||
return r
|
||||
}
|
||||
|
||||
func (f *Filter) RunOut(b []byte, q *packet.QDecode, rf RunFlags) Response {
|
||||
r := pre(b, q, rf)
|
||||
r := f.pre(b, q, rf)
|
||||
if r == Drop || r == Accept {
|
||||
// already logged
|
||||
return r
|
||||
}
|
||||
r, why := f.runOut(q)
|
||||
logRateLimit(rf, b, q, r, why)
|
||||
f.logRateLimit(rf, b, q, r, why)
|
||||
return r
|
||||
}
|
||||
|
||||
@ -216,25 +218,25 @@ func (f *Filter) runOut(q *packet.QDecode) (r Response, why string) {
|
||||
return Accept, "ok out"
|
||||
}
|
||||
|
||||
func pre(b []byte, q *packet.QDecode, rf RunFlags) Response {
|
||||
func (f *Filter) pre(b []byte, q *packet.QDecode, rf RunFlags) Response {
|
||||
if len(b) == 0 {
|
||||
// wireguard keepalive packet, always permit.
|
||||
return Accept
|
||||
}
|
||||
if len(b) < 20 {
|
||||
logRateLimit(rf, b, nil, Drop, "too short")
|
||||
f.logRateLimit(rf, b, nil, Drop, "too short")
|
||||
return Drop
|
||||
}
|
||||
q.Decode(b)
|
||||
|
||||
if q.IPProto == packet.Junk {
|
||||
// Junk packets are dangerous; always drop them.
|
||||
logRateLimit(rf, b, q, Drop, "junk!")
|
||||
f.logRateLimit(rf, b, q, Drop, "junk!")
|
||||
return Drop
|
||||
} else if q.IPProto == packet.Fragment {
|
||||
// Fragments after the first always need to be passed through.
|
||||
// Very small fragments are considered Junk by QDecode.
|
||||
logRateLimit(rf, b, q, Accept, "fragment")
|
||||
f.logRateLimit(rf, b, q, Accept, "fragment")
|
||||
return Accept
|
||||
}
|
||||
|
||||
|
@ -55,7 +55,7 @@ func TestFilter(t *testing.T) {
|
||||
{Srcs: []Net{NetAny}, Dsts: netpr(0, 0, 443, 443)},
|
||||
{Srcs: nets([]IP{0x99010101, 0x99010102, 0x99030303}), Dsts: ippr(0x01020304, 999, 999)},
|
||||
}
|
||||
acl := New(mm, nil)
|
||||
acl := New(mm, nil, t.Logf)
|
||||
|
||||
for _, ent := range []Matches{Matches{mm[0]}, mm} {
|
||||
b, err := json.Marshal(ent)
|
||||
@ -119,8 +119,9 @@ func TestPreFilter(t *testing.T) {
|
||||
{"udp", noVerdict, rawpacket(UDP, 200)},
|
||||
{"icmp", noVerdict, rawpacket(ICMP, 200)},
|
||||
}
|
||||
f := NewAllowNone(t.Logf)
|
||||
for _, testPacket := range packets {
|
||||
got := pre([]byte(testPacket.b), &QDecode{}, LogDrops|LogAccepts)
|
||||
got := f.pre([]byte(testPacket.b), &QDecode{}, LogDrops|LogAccepts)
|
||||
if got != testPacket.want {
|
||||
t.Errorf("%q got=%v want=%v packet:\n%s", testPacket.desc, got, testPacket.want, packet.Hexdump(testPacket.b))
|
||||
}
|
||||
|
@ -14,7 +14,6 @@ import (
|
||||
"errors"
|
||||
"fmt"
|
||||
"hash/fnv"
|
||||
"log"
|
||||
"math/rand"
|
||||
"net"
|
||||
"os"
|
||||
@ -189,7 +188,7 @@ var DisableSTUNForTesting bool
|
||||
// Options contains options for Listen.
|
||||
type Options struct {
|
||||
// Logf optionally provides a log function to use.
|
||||
// If nil, log.Printf is used.
|
||||
// Must not be nil.
|
||||
Logf logger.Logf
|
||||
|
||||
// Port is the port to listen on.
|
||||
@ -207,10 +206,10 @@ type Options struct {
|
||||
}
|
||||
|
||||
func (o *Options) logf() logger.Logf {
|
||||
if o.Logf != nil {
|
||||
return o.Logf
|
||||
if o.Logf == nil {
|
||||
panic("must provide magicsock.Options.logf")
|
||||
}
|
||||
return log.Printf
|
||||
return o.Logf
|
||||
}
|
||||
|
||||
func (o *Options) endpointsFunc() func([]string) {
|
||||
@ -652,7 +651,7 @@ func (as *AddrSet) appendDests(dsts []*net.UDPAddr, b []byte) (_ []*net.UDPAddr,
|
||||
dsts = append(dsts, as.roamAddr)
|
||||
case as.curAddr != -1:
|
||||
if as.curAddr >= len(as.addrs) {
|
||||
log.Printf("[unexpected] magicsock bug: as.curAddr >= len(as.addrs): %d >= %d", as.curAddr, len(as.addrs))
|
||||
as.Logf("[unexpected] magicsock bug: as.curAddr >= len(as.addrs): %d >= %d", as.curAddr, len(as.addrs))
|
||||
break
|
||||
}
|
||||
// No roaming addr, but we've seen packets from a known peer
|
||||
@ -668,7 +667,7 @@ func (as *AddrSet) appendDests(dsts []*net.UDPAddr, b []byte) (_ []*net.UDPAddr,
|
||||
}
|
||||
|
||||
if logPacketDests {
|
||||
log.Printf("spray=%v; roam=%v; dests=%v", spray, as.roamAddr, dsts)
|
||||
as.Logf("spray=%v; roam=%v; dests=%v", spray, as.roamAddr, dsts)
|
||||
}
|
||||
return dsts, as.roamAddr
|
||||
}
|
||||
@ -1581,7 +1580,7 @@ type AddrSet struct {
|
||||
|
||||
// clock, if non-nil, is used in tests instead of time.Now.
|
||||
clock func() time.Time
|
||||
Logf logger.Logf // Logf, if non-nil, is used instead of log.Printf
|
||||
Logf logger.Logf // must not be nil
|
||||
|
||||
mu sync.Mutex // guards following fields
|
||||
|
||||
@ -1622,14 +1621,6 @@ func (as *AddrSet) timeNow() time.Time {
|
||||
return time.Now()
|
||||
}
|
||||
|
||||
func (as *AddrSet) logf(format string, args ...interface{}) {
|
||||
if as.Logf != nil {
|
||||
as.Logf(format, args...)
|
||||
} else {
|
||||
log.Printf(format, args...)
|
||||
}
|
||||
}
|
||||
|
||||
var noAddr = &net.UDPAddr{
|
||||
IP: net.ParseIP("127.127.127.127"),
|
||||
Port: 127,
|
||||
@ -1720,26 +1711,26 @@ func (a *AddrSet) UpdateDst(new *net.UDPAddr) error {
|
||||
switch {
|
||||
case index == -1:
|
||||
if a.roamAddr == nil {
|
||||
a.logf("magicsock: rx %s from roaming address %s, set as new priority", pk, new)
|
||||
a.Logf("magicsock: rx %s from roaming address %s, set as new priority", pk, new)
|
||||
} else {
|
||||
a.logf("magicsock: rx %s from roaming address %s, replaces roaming address %s", pk, new, a.roamAddr)
|
||||
a.Logf("magicsock: rx %s from roaming address %s, replaces roaming address %s", pk, new, a.roamAddr)
|
||||
}
|
||||
a.roamAddr = new
|
||||
|
||||
case a.roamAddr != nil:
|
||||
a.logf("magicsock: rx %s from known %s (%d), replaces roaming address %s", pk, new, index, a.roamAddr)
|
||||
a.Logf("magicsock: rx %s from known %s (%d), replaces roaming address %s", pk, new, index, a.roamAddr)
|
||||
a.roamAddr = nil
|
||||
a.curAddr = index
|
||||
|
||||
case a.curAddr == -1:
|
||||
a.logf("magicsock: rx %s from %s (%d/%d), set as new priority", pk, new, index, len(a.addrs))
|
||||
a.Logf("magicsock: rx %s from %s (%d/%d), set as new priority", pk, new, index, len(a.addrs))
|
||||
a.curAddr = index
|
||||
|
||||
case index < a.curAddr:
|
||||
a.logf("magicsock: rx %s from low-pri %s (%d), keeping current %s (%d)", pk, new, index, old, a.curAddr)
|
||||
a.Logf("magicsock: rx %s from low-pri %s (%d), keeping current %s (%d)", pk, new, index, old, a.curAddr)
|
||||
|
||||
default: // index > a.curAddr
|
||||
a.logf("magicsock: rx %s from %s (%d/%d), replaces old priority %s", pk, new, index, len(a.addrs), old)
|
||||
a.Logf("magicsock: rx %s from %s (%d/%d), replaces old priority %s", pk, new, index, len(a.addrs), old)
|
||||
a.curAddr = index
|
||||
}
|
||||
|
||||
@ -1806,6 +1797,7 @@ func (c *Conn) CreateEndpoint(pubKey [32]byte, addrs string) (conn.Endpoint, err
|
||||
pk := key.Public(pubKey)
|
||||
c.logf("magicsock: CreateEndpoint: key=%s: %s", pk.ShortString(), strings.ReplaceAll(addrs, "127.3.3.40:", "derp-"))
|
||||
a := &AddrSet{
|
||||
Logf: c.logf,
|
||||
publicKey: pk,
|
||||
curAddr: -1,
|
||||
}
|
||||
|
@ -26,6 +26,7 @@ import (
|
||||
"tailscale.com/derp/derphttp"
|
||||
"tailscale.com/derp/derpmap"
|
||||
"tailscale.com/stun/stuntest"
|
||||
"tailscale.com/tstest"
|
||||
"tailscale.com/types/key"
|
||||
"tailscale.com/types/logger"
|
||||
"tailscale.com/wgengine/filter"
|
||||
@ -33,6 +34,7 @@ import (
|
||||
)
|
||||
|
||||
func TestListen(t *testing.T) {
|
||||
tstest.PanicOnLog()
|
||||
|
||||
epCh := make(chan string, 16)
|
||||
epFunc := func(endpoints []string) {
|
||||
@ -94,6 +96,8 @@ func pickPort(t *testing.T) uint16 {
|
||||
}
|
||||
|
||||
func TestDerpIPConstant(t *testing.T) {
|
||||
tstest.PanicOnLog()
|
||||
|
||||
if DerpMagicIP != derpMagicIP.String() {
|
||||
t.Errorf("str %q != IP %v", DerpMagicIP, derpMagicIP)
|
||||
}
|
||||
@ -103,6 +107,8 @@ func TestDerpIPConstant(t *testing.T) {
|
||||
}
|
||||
|
||||
func TestPickDERPFallback(t *testing.T) {
|
||||
tstest.PanicOnLog()
|
||||
|
||||
c := &Conn{
|
||||
derps: derpmap.Prod(),
|
||||
}
|
||||
@ -203,18 +209,19 @@ func parseCIDR(t *testing.T, addr string) wgcfg.CIDR {
|
||||
return cidr
|
||||
}
|
||||
|
||||
func runDERP(t *testing.T) (s *derp.Server, addr string, cleanupFn func()) {
|
||||
func runDERP(t *testing.T, logf logger.Logf) (s *derp.Server, addr string, cleanupFn func()) {
|
||||
var serverPrivateKey key.Private
|
||||
if _, err := crand.Read(serverPrivateKey[:]); err != nil {
|
||||
t.Fatal(err)
|
||||
}
|
||||
|
||||
s = derp.NewServer(serverPrivateKey, t.Logf)
|
||||
s = derp.NewServer(serverPrivateKey, logf)
|
||||
|
||||
httpsrv := httptest.NewUnstartedServer(derphttp.Handler(s))
|
||||
httpsrv.Config.ErrorLog = logger.StdLogger(logf)
|
||||
httpsrv.Config.TLSNextProto = make(map[string]func(*http.Server, *tls.Conn, http.Handler))
|
||||
httpsrv.StartTLS()
|
||||
t.Logf("DERP server URL: %s", httpsrv.URL)
|
||||
logf("DERP server URL: %s", httpsrv.URL)
|
||||
|
||||
addr = strings.TrimPrefix(httpsrv.URL, "https://")
|
||||
cleanupFn = func() {
|
||||
@ -228,11 +235,11 @@ func runDERP(t *testing.T) (s *derp.Server, addr string, cleanupFn func()) {
|
||||
|
||||
// devLogger returns a wireguard-go device.Logger that writes
|
||||
// wireguard logs to the test logger.
|
||||
func devLogger(t *testing.T, prefix string) *device.Logger {
|
||||
func devLogger(t *testing.T, prefix string, logfx logger.Logf) *device.Logger {
|
||||
pfx := []interface{}{prefix}
|
||||
logf := func(format string, args ...interface{}) {
|
||||
t.Helper()
|
||||
t.Logf("%s: "+format, append(pfx, args...)...)
|
||||
logfx("%s: "+format, append(pfx, args...)...)
|
||||
}
|
||||
return &device.Logger{
|
||||
Debug: logger.StdLogger(logf),
|
||||
@ -248,6 +255,8 @@ func devLogger(t *testing.T, prefix string) *device.Logger {
|
||||
// or shutdown. It may be an infrequent flake, so run with
|
||||
// -count=10000 to be sure.
|
||||
func TestDeviceStartStop(t *testing.T) {
|
||||
tstest.PanicOnLog()
|
||||
|
||||
conn, err := Listen(Options{
|
||||
EndpointsFunc: func(eps []string) {},
|
||||
Logf: t.Logf,
|
||||
@ -259,7 +268,7 @@ func TestDeviceStartStop(t *testing.T) {
|
||||
|
||||
tun := tuntest.NewChannelTUN()
|
||||
dev := device.NewDevice(tun.TUN(), &device.DeviceOptions{
|
||||
Logger: devLogger(t, "dev"),
|
||||
Logger: devLogger(t, "dev", t.Logf),
|
||||
CreateEndpoint: conn.CreateEndpoint,
|
||||
CreateBind: conn.CreateBind,
|
||||
SkipBindUpdate: true,
|
||||
@ -269,9 +278,19 @@ func TestDeviceStartStop(t *testing.T) {
|
||||
}
|
||||
|
||||
func TestTwoDevicePing(t *testing.T) {
|
||||
tstest.PanicOnLog()
|
||||
|
||||
// This gets reassigned inside every test, so that the connections
|
||||
// all log using the "current" t.Logf function. Sigh.
|
||||
current_t := t
|
||||
logf := func(s string, args ...interface{}) {
|
||||
current_t.Helper()
|
||||
current_t.Logf(s, args...)
|
||||
}
|
||||
|
||||
// Wipe default DERP list, add local server.
|
||||
// (Do it now, or derpHost will try to connect to derp1.tailscale.com.)
|
||||
derpServer, derpAddr, derpCleanupFn := runDERP(t)
|
||||
derpServer, derpAddr, derpCleanupFn := runDERP(t, logf)
|
||||
defer derpCleanupFn()
|
||||
|
||||
stunAddr, stunCleanupFn := stuntest.Serve(t)
|
||||
@ -286,7 +305,7 @@ func TestTwoDevicePing(t *testing.T) {
|
||||
|
||||
epCh1 := make(chan []string, 16)
|
||||
conn1, err := Listen(Options{
|
||||
Logf: logger.WithPrefix(t.Logf, "conn1: "),
|
||||
Logf: logger.WithPrefix(logf, "conn1: "),
|
||||
DERPs: derps,
|
||||
EndpointsFunc: func(eps []string) {
|
||||
epCh1 <- eps
|
||||
@ -300,7 +319,7 @@ func TestTwoDevicePing(t *testing.T) {
|
||||
|
||||
epCh2 := make(chan []string, 16)
|
||||
conn2, err := Listen(Options{
|
||||
Logf: logger.WithPrefix(t.Logf, "conn2: "),
|
||||
Logf: logger.WithPrefix(logf, "conn2: "),
|
||||
DERPs: derps,
|
||||
EndpointsFunc: func(eps []string) {
|
||||
epCh2 <- eps
|
||||
@ -323,15 +342,15 @@ func TestTwoDevicePing(t *testing.T) {
|
||||
}
|
||||
|
||||
//uapi1, _ := cfgs[0].ToUAPI()
|
||||
//t.Logf("cfg0: %v", uapi1)
|
||||
//logf("cfg0: %v", uapi1)
|
||||
//uapi2, _ := cfgs[1].ToUAPI()
|
||||
//t.Logf("cfg1: %v", uapi2)
|
||||
//logf("cfg1: %v", uapi2)
|
||||
|
||||
tun1 := tuntest.NewChannelTUN()
|
||||
tstun1 := tstun.WrapTUN(t.Logf, tun1.TUN())
|
||||
tstun1.SetFilter(filter.NewAllowAll())
|
||||
tstun1 := tstun.WrapTUN(logf, tun1.TUN())
|
||||
tstun1.SetFilter(filter.NewAllowAll(logf))
|
||||
dev1 := device.NewDevice(tstun1, &device.DeviceOptions{
|
||||
Logger: devLogger(t, "dev1"),
|
||||
Logger: devLogger(t, "dev1", logf),
|
||||
CreateEndpoint: conn1.CreateEndpoint,
|
||||
CreateBind: conn1.CreateBind,
|
||||
SkipBindUpdate: true,
|
||||
@ -343,10 +362,10 @@ func TestTwoDevicePing(t *testing.T) {
|
||||
defer dev1.Close()
|
||||
|
||||
tun2 := tuntest.NewChannelTUN()
|
||||
tstun2 := tstun.WrapTUN(t.Logf, tun2.TUN())
|
||||
tstun2.SetFilter(filter.NewAllowAll())
|
||||
tstun2 := tstun.WrapTUN(logf, tun2.TUN())
|
||||
tstun2.SetFilter(filter.NewAllowAll(logf))
|
||||
dev2 := device.NewDevice(tstun2, &device.DeviceOptions{
|
||||
Logger: devLogger(t, "dev2"),
|
||||
Logger: devLogger(t, "dev2", logf),
|
||||
CreateEndpoint: conn2.CreateEndpoint,
|
||||
CreateBind: conn2.CreateBind,
|
||||
SkipBindUpdate: true,
|
||||
@ -387,9 +406,19 @@ func TestTwoDevicePing(t *testing.T) {
|
||||
}
|
||||
}
|
||||
|
||||
t.Run("ping 1.0.0.1", func(t *testing.T) { ping1(t) })
|
||||
t.Run("ping 1.0.0.2", func(t *testing.T) { ping2(t) })
|
||||
t.Run("ping 1.0.0.1", func(t *testing.T) {
|
||||
current_t = t
|
||||
ping1(t)
|
||||
})
|
||||
current_t = t
|
||||
|
||||
t.Run("ping 1.0.0.2", func(t *testing.T) {
|
||||
ping2(t)
|
||||
})
|
||||
current_t = t
|
||||
|
||||
t.Run("ping 1.0.0.2 via SendPacket", func(t *testing.T) {
|
||||
current_t = t
|
||||
msg1to2 := tuntest.Ping(net.ParseIP("1.0.0.2"), net.ParseIP("1.0.0.1"))
|
||||
if err := tstun1.InjectOutbound(msg1to2); err != nil {
|
||||
t.Fatal(err)
|
||||
@ -403,14 +432,17 @@ func TestTwoDevicePing(t *testing.T) {
|
||||
t.Error("return ping did not transit")
|
||||
}
|
||||
})
|
||||
current_t = t
|
||||
|
||||
t.Run("no-op dev1 reconfig", func(t *testing.T) {
|
||||
current_t = t
|
||||
if err := dev1.Reconfig(&cfgs[0]); err != nil {
|
||||
t.Fatal(err)
|
||||
}
|
||||
ping1(t)
|
||||
ping2(t)
|
||||
})
|
||||
current_t = t
|
||||
|
||||
if os.Getenv("RUN_CURSED_TESTS") == "" {
|
||||
t.Skip("test is very broken, don't run in CI until it's reliable.")
|
||||
@ -469,8 +501,10 @@ func TestTwoDevicePing(t *testing.T) {
|
||||
}
|
||||
|
||||
t.Run("ping 1.0.0.1 x50", func(t *testing.T) {
|
||||
current_t = t
|
||||
pingSeq(t, 50, 0, true)
|
||||
})
|
||||
current_t = t
|
||||
|
||||
// Add DERP relay.
|
||||
derpEp := wgcfg.Endpoint{Host: "127.3.3.40", Port: 1}
|
||||
@ -488,11 +522,13 @@ func TestTwoDevicePing(t *testing.T) {
|
||||
}
|
||||
|
||||
t.Run("add DERP", func(t *testing.T) {
|
||||
current_t = t
|
||||
defer func() {
|
||||
t.Logf("DERP vars: %s", derpServer.ExpVar().String())
|
||||
logf("DERP vars: %s", derpServer.ExpVar().String())
|
||||
}()
|
||||
pingSeq(t, 20, 0, true)
|
||||
})
|
||||
current_t = t
|
||||
|
||||
// Disable real route.
|
||||
cfgs[0].Peers[0].Endpoints = []wgcfg.Endpoint{derpEp}
|
||||
@ -506,17 +542,19 @@ func TestTwoDevicePing(t *testing.T) {
|
||||
time.Sleep(250 * time.Millisecond) // TODO remove
|
||||
|
||||
t.Run("all traffic over DERP", func(t *testing.T) {
|
||||
current_t = t
|
||||
defer func() {
|
||||
t.Logf("DERP vars: %s", derpServer.ExpVar().String())
|
||||
logf("DERP vars: %s", derpServer.ExpVar().String())
|
||||
if t.Failed() || true {
|
||||
uapi1, _ := cfgs[0].ToUAPI()
|
||||
t.Logf("cfg0: %v", uapi1)
|
||||
logf("cfg0: %v", uapi1)
|
||||
uapi2, _ := cfgs[1].ToUAPI()
|
||||
t.Logf("cfg1: %v", uapi2)
|
||||
logf("cfg1: %v", uapi2)
|
||||
}
|
||||
}()
|
||||
pingSeq(t, 20, 0, true)
|
||||
})
|
||||
current_t = t
|
||||
|
||||
dev1.RemoveAllPeers()
|
||||
dev2.RemoveAllPeers()
|
||||
@ -540,6 +578,7 @@ func TestTwoDevicePing(t *testing.T) {
|
||||
//
|
||||
// TODO(danderson): finish root-causing and de-flake this test.
|
||||
t.Run("one real route is enough thanks to spray", func(t *testing.T) {
|
||||
current_t = t
|
||||
pingSeq(t, 50, 700*time.Millisecond, false)
|
||||
|
||||
ep2 := dev2.Config().Peers[0].Endpoints
|
||||
@ -547,10 +586,21 @@ func TestTwoDevicePing(t *testing.T) {
|
||||
t.Error("handshake spray failed to find real route")
|
||||
}
|
||||
})
|
||||
current_t = t
|
||||
}
|
||||
|
||||
// TestAddrSet tests AddrSet appendDests and UpdateDst.
|
||||
func TestAddrSet(t *testing.T) {
|
||||
tstest.PanicOnLog()
|
||||
|
||||
// This gets reassigned inside every test, so that the connections
|
||||
// all log using the "current" t.Logf function. Sigh.
|
||||
current_t := t
|
||||
logf := func(s string, args ...interface{}) {
|
||||
current_t.Helper()
|
||||
current_t.Logf(s, args...)
|
||||
}
|
||||
|
||||
mustUDPAddr := func(s string) *net.UDPAddr {
|
||||
t.Helper()
|
||||
ua, err := net.ResolveUDPAddr("udp", s)
|
||||
@ -674,8 +724,9 @@ func TestAddrSet(t *testing.T) {
|
||||
}
|
||||
for _, tt := range tests {
|
||||
t.Run(tt.name, func(t *testing.T) {
|
||||
current_t = t
|
||||
faket := time.Unix(0, 0)
|
||||
tt.as.Logf = t.Logf
|
||||
tt.as.Logf = logf
|
||||
tt.as.clock = func() time.Time { return faket }
|
||||
for i, st := range tt.steps {
|
||||
faket = faket.Add(st.advance)
|
||||
@ -692,5 +743,6 @@ func TestAddrSet(t *testing.T) {
|
||||
}
|
||||
}
|
||||
})
|
||||
current_t = t
|
||||
}
|
||||
}
|
||||
|
@ -145,6 +145,7 @@ func newUserspaceEngineAdvanced(logf logger.Logf, tundev *tstun.TUN, routerGen R
|
||||
e.RequestStatus()
|
||||
}
|
||||
magicsockOpts := magicsock.Options{
|
||||
Logf: logf,
|
||||
Port: listenPort,
|
||||
EndpointsFunc: endpointsFn,
|
||||
}
|
||||
|
Reference in New Issue
Block a user