|
|
|
|
@ -40,6 +40,19 @@ import (
|
|
|
|
|
"tailscale.com/wgengine"
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
func handlerForTest(t testing.TB, h *Handler) *Handler {
|
|
|
|
|
if h.Actor == nil {
|
|
|
|
|
h.Actor = &ipnauth.TestActor{}
|
|
|
|
|
}
|
|
|
|
|
if h.b == nil {
|
|
|
|
|
h.b = &ipnlocal.LocalBackend{}
|
|
|
|
|
}
|
|
|
|
|
if h.logf == nil {
|
|
|
|
|
h.logf = logger.TestLogger(t)
|
|
|
|
|
}
|
|
|
|
|
return h
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func TestValidHost(t *testing.T) {
|
|
|
|
|
tests := []struct {
|
|
|
|
|
host string
|
|
|
|
|
@ -57,7 +70,7 @@ func TestValidHost(t *testing.T) {
|
|
|
|
|
|
|
|
|
|
for _, test := range tests {
|
|
|
|
|
t.Run(test.host, func(t *testing.T) {
|
|
|
|
|
h := &Handler{}
|
|
|
|
|
h := handlerForTest(t, &Handler{})
|
|
|
|
|
if got := h.validHost(test.host); got != test.valid {
|
|
|
|
|
t.Errorf("validHost(%q)=%v, want %v", test.host, got, test.valid)
|
|
|
|
|
}
|
|
|
|
|
@ -68,10 +81,9 @@ func TestValidHost(t *testing.T) {
|
|
|
|
|
func TestSetPushDeviceToken(t *testing.T) {
|
|
|
|
|
tstest.Replace(t, &validLocalHostForTesting, true)
|
|
|
|
|
|
|
|
|
|
h := &Handler{
|
|
|
|
|
h := handlerForTest(t, &Handler{
|
|
|
|
|
PermitWrite: true,
|
|
|
|
|
b: &ipnlocal.LocalBackend{},
|
|
|
|
|
}
|
|
|
|
|
})
|
|
|
|
|
s := httptest.NewServer(h)
|
|
|
|
|
defer s.Close()
|
|
|
|
|
c := s.Client()
|
|
|
|
|
@ -125,9 +137,9 @@ func (b whoIsBackend) PeerCaps(ip netip.Addr) tailcfg.PeerCapMap {
|
|
|
|
|
//
|
|
|
|
|
// And https://github.com/tailscale/tailscale/issues/12465
|
|
|
|
|
func TestWhoIsArgTypes(t *testing.T) {
|
|
|
|
|
h := &Handler{
|
|
|
|
|
h := handlerForTest(t, &Handler{
|
|
|
|
|
PermitRead: true,
|
|
|
|
|
}
|
|
|
|
|
})
|
|
|
|
|
|
|
|
|
|
match := func() (n tailcfg.NodeView, u tailcfg.UserProfile, ok bool) {
|
|
|
|
|
return (&tailcfg.Node{
|
|
|
|
|
@ -190,7 +202,10 @@ func TestWhoIsArgTypes(t *testing.T) {
|
|
|
|
|
|
|
|
|
|
func TestShouldDenyServeConfigForGOOSAndUserContext(t *testing.T) {
|
|
|
|
|
newHandler := func(connIsLocalAdmin bool) *Handler {
|
|
|
|
|
return &Handler{Actor: &ipnauth.TestActor{LocalAdmin: connIsLocalAdmin}, b: newTestLocalBackend(t)}
|
|
|
|
|
return handlerForTest(t, &Handler{
|
|
|
|
|
Actor: &ipnauth.TestActor{LocalAdmin: connIsLocalAdmin},
|
|
|
|
|
b: newTestLocalBackend(t),
|
|
|
|
|
})
|
|
|
|
|
}
|
|
|
|
|
tests := []struct {
|
|
|
|
|
name string
|
|
|
|
|
@ -298,11 +313,11 @@ func TestServeWatchIPNBus(t *testing.T) {
|
|
|
|
|
|
|
|
|
|
for _, tt := range tests {
|
|
|
|
|
t.Run(tt.desc, func(t *testing.T) {
|
|
|
|
|
h := &Handler{
|
|
|
|
|
h := handlerForTest(t, &Handler{
|
|
|
|
|
PermitRead: tt.permitRead,
|
|
|
|
|
PermitWrite: tt.permitWrite,
|
|
|
|
|
b: newTestLocalBackend(t),
|
|
|
|
|
}
|
|
|
|
|
})
|
|
|
|
|
s := httptest.NewServer(h)
|
|
|
|
|
defer s.Close()
|
|
|
|
|
c := s.Client()
|
|
|
|
|
|