mirror of
https://github.com/coder/coder.git
synced 2025-07-03 16:13:58 +00:00
* fix: Add coder user to docker group on installation This makes for a simpler setup, and reduces the likelihood a user runs into a strange issue. * Add wgnet * Add ping * Add listening * Finish refactor to make this work * Add interface for swapping * Fix conncache with interface * chore: update gvisor * fix tailscale types * linting * more linting * Add coordinator * Add coordinator tests * Fix coordination * It compiles! * Move all connection negotiation in-memory * Migrate coordinator to use net.conn * Add closed func * Fix close listener func * Make reconnecting PTY work * Fix reconnecting PTY * Update CI to Go 1.19 * Add CLI flags for DERP mapping * Fix Tailnet test * Rename ConnCoordinator to TailnetCoordinator * Remove print statement from workspace agent test * Refactor wsconncache to use tailnet * Remove STUN from unit tests * Add migrate back to dump * chore: Upgrade to Go 1.19 This is required as part of #3505. * Fix reconnecting PTY tests * fix: update wireguard-go to fix devtunnel * fix migration numbers * linting * Return early for status if endpoints are empty * Update cli/server.go Co-authored-by: Colin Adler <colin1adler@gmail.com> * Update cli/server.go Co-authored-by: Colin Adler <colin1adler@gmail.com> * Fix frontend entites * Fix agent bicopy * Fix race condition for the last node * Fix down migration * Fix connection RBAC * Fix migration numbers * Fix forwarding TCP to a local port * Implement ping for tailnet * Rename to ForceHTTP * Add external derpmapping * Expose DERP region names to the API * Add global option to enable Tailscale networking for web * Mark DERP flags hidden while testing * Update DERP map on reconnect * Add close func to workspace agents * Fix race condition in upstream dependency * Fix feature columns race condition Co-authored-by: Colin Adler <colin1adler@gmail.com>
187 lines
5.0 KiB
Go
187 lines
5.0 KiB
Go
package wsconncache_test
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"net"
|
|
"net/http"
|
|
"net/http/httptest"
|
|
"net/http/httputil"
|
|
"net/netip"
|
|
"net/url"
|
|
"sync"
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/google/uuid"
|
|
"github.com/stretchr/testify/assert"
|
|
"github.com/stretchr/testify/require"
|
|
"go.uber.org/atomic"
|
|
"go.uber.org/goleak"
|
|
|
|
"cdr.dev/slog"
|
|
"cdr.dev/slog/sloggers/slogtest"
|
|
"github.com/coder/coder/agent"
|
|
"github.com/coder/coder/coderd/wsconncache"
|
|
"github.com/coder/coder/tailnet"
|
|
"github.com/coder/coder/tailnet/tailnettest"
|
|
)
|
|
|
|
func TestMain(m *testing.M) {
|
|
goleak.VerifyTestMain(m)
|
|
}
|
|
|
|
func TestCache(t *testing.T) {
|
|
t.Parallel()
|
|
t.Run("Same", func(t *testing.T) {
|
|
t.Parallel()
|
|
cache := wsconncache.New(func(r *http.Request, id uuid.UUID) (agent.Conn, error) {
|
|
return setupAgent(t, agent.Metadata{}, 0), nil
|
|
}, 0)
|
|
defer func() {
|
|
_ = cache.Close()
|
|
}()
|
|
conn1, _, err := cache.Acquire(httptest.NewRequest(http.MethodGet, "/", nil), uuid.Nil)
|
|
require.NoError(t, err)
|
|
conn2, _, err := cache.Acquire(httptest.NewRequest(http.MethodGet, "/", nil), uuid.Nil)
|
|
require.NoError(t, err)
|
|
require.True(t, conn1 == conn2)
|
|
})
|
|
t.Run("Expire", func(t *testing.T) {
|
|
t.Parallel()
|
|
called := atomic.NewInt32(0)
|
|
cache := wsconncache.New(func(r *http.Request, id uuid.UUID) (agent.Conn, error) {
|
|
called.Add(1)
|
|
return setupAgent(t, agent.Metadata{}, 0), nil
|
|
}, time.Microsecond)
|
|
defer func() {
|
|
_ = cache.Close()
|
|
}()
|
|
conn, release, err := cache.Acquire(httptest.NewRequest(http.MethodGet, "/", nil), uuid.Nil)
|
|
require.NoError(t, err)
|
|
release()
|
|
<-conn.Closed()
|
|
conn, release, err = cache.Acquire(httptest.NewRequest(http.MethodGet, "/", nil), uuid.Nil)
|
|
require.NoError(t, err)
|
|
release()
|
|
<-conn.Closed()
|
|
require.Equal(t, int32(2), called.Load())
|
|
})
|
|
t.Run("NoExpireWhenLocked", func(t *testing.T) {
|
|
t.Parallel()
|
|
cache := wsconncache.New(func(r *http.Request, id uuid.UUID) (agent.Conn, error) {
|
|
return setupAgent(t, agent.Metadata{}, 0), nil
|
|
}, time.Microsecond)
|
|
defer func() {
|
|
_ = cache.Close()
|
|
}()
|
|
conn, release, err := cache.Acquire(httptest.NewRequest(http.MethodGet, "/", nil), uuid.Nil)
|
|
require.NoError(t, err)
|
|
time.Sleep(time.Millisecond)
|
|
release()
|
|
<-conn.Closed()
|
|
})
|
|
t.Run("HTTPTransport", func(t *testing.T) {
|
|
t.Parallel()
|
|
random, err := net.Listen("tcp", "127.0.0.1:0")
|
|
require.NoError(t, err)
|
|
defer func() {
|
|
_ = random.Close()
|
|
}()
|
|
tcpAddr, valid := random.Addr().(*net.TCPAddr)
|
|
require.True(t, valid)
|
|
|
|
server := &http.Server{
|
|
ReadHeaderTimeout: time.Minute,
|
|
Handler: http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
w.WriteHeader(http.StatusOK)
|
|
}),
|
|
}
|
|
defer func() {
|
|
_ = server.Close()
|
|
}()
|
|
go server.Serve(random)
|
|
|
|
cache := wsconncache.New(func(r *http.Request, id uuid.UUID) (agent.Conn, error) {
|
|
return setupAgent(t, agent.Metadata{}, 0), nil
|
|
}, time.Microsecond)
|
|
defer func() {
|
|
_ = cache.Close()
|
|
}()
|
|
|
|
var wg sync.WaitGroup
|
|
// Perform many requests in parallel to simulate
|
|
// simultaneous HTTP requests.
|
|
for i := 0; i < 50; i++ {
|
|
wg.Add(1)
|
|
go func() {
|
|
defer wg.Done()
|
|
proxy := httputil.NewSingleHostReverseProxy(&url.URL{
|
|
Scheme: "http",
|
|
Host: fmt.Sprintf("127.0.0.1:%d", tcpAddr.Port),
|
|
Path: "/",
|
|
})
|
|
req := httptest.NewRequest(http.MethodGet, "/", nil)
|
|
conn, release, err := cache.Acquire(req, uuid.Nil)
|
|
if !assert.NoError(t, err) {
|
|
return
|
|
}
|
|
defer release()
|
|
proxy.Transport = conn.HTTPTransport()
|
|
res := httptest.NewRecorder()
|
|
proxy.ServeHTTP(res, req)
|
|
resp := res.Result()
|
|
defer resp.Body.Close()
|
|
assert.Equal(t, http.StatusOK, resp.StatusCode)
|
|
}()
|
|
}
|
|
wg.Wait()
|
|
})
|
|
}
|
|
|
|
func setupAgent(t *testing.T, metadata agent.Metadata, ptyTimeout time.Duration) agent.Conn {
|
|
metadata.DERPMap = tailnettest.RunDERPAndSTUN(t)
|
|
|
|
coordinator := tailnet.NewCoordinator()
|
|
agentID := uuid.New()
|
|
closer := agent.New(agent.Options{
|
|
FetchMetadata: func(ctx context.Context) (agent.Metadata, error) {
|
|
return metadata, nil
|
|
},
|
|
CoordinatorDialer: func(ctx context.Context) (net.Conn, error) {
|
|
clientConn, serverConn := net.Pipe()
|
|
t.Cleanup(func() {
|
|
_ = serverConn.Close()
|
|
_ = clientConn.Close()
|
|
})
|
|
go coordinator.ServeAgent(serverConn, agentID)
|
|
return clientConn, nil
|
|
},
|
|
Logger: slogtest.Make(t, nil).Named("agent").Leveled(slog.LevelInfo),
|
|
ReconnectingPTYTimeout: ptyTimeout,
|
|
})
|
|
t.Cleanup(func() {
|
|
_ = closer.Close()
|
|
})
|
|
conn, err := tailnet.NewConn(&tailnet.Options{
|
|
Addresses: []netip.Prefix{netip.PrefixFrom(tailnet.IP(), 128)},
|
|
DERPMap: metadata.DERPMap,
|
|
Logger: slogtest.Make(t, nil).Named("tailnet").Leveled(slog.LevelDebug),
|
|
})
|
|
require.NoError(t, err)
|
|
clientConn, serverConn := net.Pipe()
|
|
t.Cleanup(func() {
|
|
_ = clientConn.Close()
|
|
_ = serverConn.Close()
|
|
_ = conn.Close()
|
|
})
|
|
go coordinator.ServeClient(serverConn, uuid.New(), agentID)
|
|
sendNode, _ := tailnet.ServeCoordinator(clientConn, func(node []*tailnet.Node) error {
|
|
return conn.UpdateNodes(node)
|
|
})
|
|
conn.SetNodeCallback(sendNode)
|
|
return &agent.TailnetConn{
|
|
Conn: conn,
|
|
}
|
|
}
|