|
|
|
|
@ -12,6 +12,8 @@ import ( |
|
|
|
|
"time" |
|
|
|
|
|
|
|
|
|
"tailscale.com/tailcfg" |
|
|
|
|
"tailscale.com/types/netmap" |
|
|
|
|
"tailscale.com/types/wgkey" |
|
|
|
|
) |
|
|
|
|
|
|
|
|
|
func TestUndeltaPeers(t *testing.T) { |
|
|
|
|
@ -165,3 +167,93 @@ func formatNodes(nodes []*tailcfg.Node) string { |
|
|
|
|
} |
|
|
|
|
return sb.String() |
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
func newTestMapSession(t *testing.T) *mapSession { |
|
|
|
|
k, err := wgkey.NewPrivate() |
|
|
|
|
if err != nil { |
|
|
|
|
t.Fatal(err) |
|
|
|
|
} |
|
|
|
|
return newMapSession(k) |
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
func TestNetmapForResponse(t *testing.T) { |
|
|
|
|
t.Run("implicit_packetfilter", func(t *testing.T) { |
|
|
|
|
somePacketFilter := []tailcfg.FilterRule{ |
|
|
|
|
{ |
|
|
|
|
SrcIPs: []string{"*"}, |
|
|
|
|
DstPorts: []tailcfg.NetPortRange{ |
|
|
|
|
{IP: "10.2.3.4", Ports: tailcfg.PortRange{First: 22, Last: 22}}, |
|
|
|
|
}, |
|
|
|
|
}, |
|
|
|
|
} |
|
|
|
|
ms := newTestMapSession(t) |
|
|
|
|
nm1 := ms.netmapForResponse(&tailcfg.MapResponse{ |
|
|
|
|
Node: new(tailcfg.Node), |
|
|
|
|
PacketFilter: somePacketFilter, |
|
|
|
|
}) |
|
|
|
|
if len(nm1.PacketFilter) == 0 { |
|
|
|
|
t.Fatalf("zero length PacketFilter") |
|
|
|
|
} |
|
|
|
|
nm2 := ms.netmapForResponse(&tailcfg.MapResponse{ |
|
|
|
|
Node: new(tailcfg.Node), |
|
|
|
|
PacketFilter: nil, // testing that the server can omit this.
|
|
|
|
|
}) |
|
|
|
|
if len(nm1.PacketFilter) == 0 { |
|
|
|
|
t.Fatalf("zero length PacketFilter in 2nd netmap") |
|
|
|
|
} |
|
|
|
|
if !reflect.DeepEqual(nm1.PacketFilter, nm2.PacketFilter) { |
|
|
|
|
t.Error("packet filters differ") |
|
|
|
|
} |
|
|
|
|
}) |
|
|
|
|
t.Run("implicit_dnsconfig", func(t *testing.T) { |
|
|
|
|
someDNSConfig := &tailcfg.DNSConfig{Domains: []string{"foo", "bar"}} |
|
|
|
|
ms := newTestMapSession(t) |
|
|
|
|
nm1 := ms.netmapForResponse(&tailcfg.MapResponse{ |
|
|
|
|
Node: new(tailcfg.Node), |
|
|
|
|
DNSConfig: someDNSConfig, |
|
|
|
|
}) |
|
|
|
|
if !reflect.DeepEqual(nm1.DNS, *someDNSConfig) { |
|
|
|
|
t.Fatalf("1st DNS wrong") |
|
|
|
|
} |
|
|
|
|
nm2 := ms.netmapForResponse(&tailcfg.MapResponse{ |
|
|
|
|
Node: new(tailcfg.Node), |
|
|
|
|
DNSConfig: nil, // implict
|
|
|
|
|
}) |
|
|
|
|
if !reflect.DeepEqual(nm2.DNS, *someDNSConfig) { |
|
|
|
|
t.Fatalf("2nd DNS wrong") |
|
|
|
|
} |
|
|
|
|
}) |
|
|
|
|
t.Run("collect_services", func(t *testing.T) { |
|
|
|
|
ms := newTestMapSession(t) |
|
|
|
|
var nm *netmap.NetworkMap |
|
|
|
|
wantCollect := func(v bool) { |
|
|
|
|
t.Helper() |
|
|
|
|
if nm.CollectServices != v { |
|
|
|
|
t.Errorf("netmap.CollectServices = %v; want %v", nm.CollectServices, v) |
|
|
|
|
} |
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
nm = ms.netmapForResponse(&tailcfg.MapResponse{ |
|
|
|
|
Node: new(tailcfg.Node), |
|
|
|
|
}) |
|
|
|
|
wantCollect(false) |
|
|
|
|
|
|
|
|
|
nm = ms.netmapForResponse(&tailcfg.MapResponse{ |
|
|
|
|
Node: new(tailcfg.Node), |
|
|
|
|
CollectServices: "false", |
|
|
|
|
}) |
|
|
|
|
wantCollect(false) |
|
|
|
|
|
|
|
|
|
nm = ms.netmapForResponse(&tailcfg.MapResponse{ |
|
|
|
|
Node: new(tailcfg.Node), |
|
|
|
|
CollectServices: "true", |
|
|
|
|
}) |
|
|
|
|
wantCollect(true) |
|
|
|
|
|
|
|
|
|
nm = ms.netmapForResponse(&tailcfg.MapResponse{ |
|
|
|
|
Node: new(tailcfg.Node), |
|
|
|
|
CollectServices: "", |
|
|
|
|
}) |
|
|
|
|
wantCollect(true) |
|
|
|
|
}) |
|
|
|
|
} |
|
|
|
|
|