2019-12-04 17:22:08 +00:00
|
|
|
package origin
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"errors"
|
|
|
|
"fmt"
|
|
|
|
"testing"
|
|
|
|
"time"
|
|
|
|
|
|
|
|
"github.com/stretchr/testify/assert"
|
|
|
|
|
|
|
|
tunnelpogs "github.com/cloudflare/cloudflared/tunnelrpc/pogs"
|
|
|
|
)
|
|
|
|
|
|
|
|
func TestRefreshAuthBackoff(t *testing.T) {
|
2020-08-18 10:14:14 +00:00
|
|
|
rcm := newReconnectCredentialManager(t.Name(), t.Name(), 4)
|
2019-12-04 17:22:08 +00:00
|
|
|
|
|
|
|
var wait time.Duration
|
|
|
|
timeAfter = func(d time.Duration) <-chan time.Time {
|
|
|
|
wait = d
|
|
|
|
return time.After(d)
|
|
|
|
}
|
|
|
|
backoff := &BackoffHandler{MaxRetries: 3}
|
|
|
|
auth := func(ctx context.Context, n int) (tunnelpogs.AuthOutcome, error) {
|
|
|
|
return nil, fmt.Errorf("authentication failure")
|
|
|
|
}
|
|
|
|
|
|
|
|
// authentication failures should consume the backoff
|
|
|
|
for i := uint(0); i < backoff.MaxRetries; i++ {
|
2020-08-18 10:14:14 +00:00
|
|
|
retryChan, err := rcm.RefreshAuth(context.Background(), backoff, auth)
|
2019-12-04 17:22:08 +00:00
|
|
|
assert.NoError(t, err)
|
|
|
|
assert.NotNil(t, retryChan)
|
|
|
|
assert.Equal(t, (1<<i)*time.Second, wait)
|
|
|
|
}
|
2020-08-18 10:14:14 +00:00
|
|
|
retryChan, err := rcm.RefreshAuth(context.Background(), backoff, auth)
|
2019-12-04 17:22:08 +00:00
|
|
|
assert.Error(t, err)
|
|
|
|
assert.Nil(t, retryChan)
|
|
|
|
|
|
|
|
// now we actually make contact with the remote server
|
2020-08-18 10:14:14 +00:00
|
|
|
_, _ = rcm.RefreshAuth(context.Background(), backoff, func(ctx context.Context, n int) (tunnelpogs.AuthOutcome, error) {
|
2019-12-04 17:22:08 +00:00
|
|
|
return tunnelpogs.NewAuthUnknown(errors.New("auth unknown"), 19), nil
|
|
|
|
})
|
|
|
|
|
|
|
|
// The backoff timer should have been reset. To confirm this, make timeNow
|
|
|
|
// return a value after the backoff timer's grace period
|
|
|
|
timeNow = func() time.Time {
|
|
|
|
expectedGracePeriod := time.Duration(time.Second * 2 << backoff.MaxRetries)
|
|
|
|
return time.Now().Add(expectedGracePeriod * 2)
|
|
|
|
}
|
|
|
|
_, ok := backoff.GetBackoffDuration(context.Background())
|
|
|
|
assert.True(t, ok)
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestRefreshAuthSuccess(t *testing.T) {
|
2020-08-18 10:14:14 +00:00
|
|
|
rcm := newReconnectCredentialManager(t.Name(), t.Name(), 4)
|
2019-12-04 17:22:08 +00:00
|
|
|
|
|
|
|
var wait time.Duration
|
|
|
|
timeAfter = func(d time.Duration) <-chan time.Time {
|
|
|
|
wait = d
|
|
|
|
return time.After(d)
|
|
|
|
}
|
|
|
|
|
|
|
|
backoff := &BackoffHandler{MaxRetries: 3}
|
|
|
|
auth := func(ctx context.Context, n int) (tunnelpogs.AuthOutcome, error) {
|
|
|
|
return tunnelpogs.NewAuthSuccess([]byte("jwt"), 19), nil
|
|
|
|
}
|
|
|
|
|
2020-08-18 10:14:14 +00:00
|
|
|
retryChan, err := rcm.RefreshAuth(context.Background(), backoff, auth)
|
2019-12-04 17:22:08 +00:00
|
|
|
assert.NoError(t, err)
|
|
|
|
assert.NotNil(t, retryChan)
|
|
|
|
assert.Equal(t, 19*time.Hour, wait)
|
|
|
|
|
2020-08-18 10:14:14 +00:00
|
|
|
token, err := rcm.ReconnectToken()
|
2019-12-04 17:22:08 +00:00
|
|
|
assert.NoError(t, err)
|
|
|
|
assert.Equal(t, []byte("jwt"), token)
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestRefreshAuthUnknown(t *testing.T) {
|
2020-08-18 10:14:14 +00:00
|
|
|
rcm := newReconnectCredentialManager(t.Name(), t.Name(), 4)
|
2019-12-04 17:22:08 +00:00
|
|
|
|
|
|
|
var wait time.Duration
|
|
|
|
timeAfter = func(d time.Duration) <-chan time.Time {
|
|
|
|
wait = d
|
|
|
|
return time.After(d)
|
|
|
|
}
|
|
|
|
|
|
|
|
backoff := &BackoffHandler{MaxRetries: 3}
|
|
|
|
auth := func(ctx context.Context, n int) (tunnelpogs.AuthOutcome, error) {
|
|
|
|
return tunnelpogs.NewAuthUnknown(errors.New("auth unknown"), 19), nil
|
|
|
|
}
|
|
|
|
|
2020-08-18 10:14:14 +00:00
|
|
|
retryChan, err := rcm.RefreshAuth(context.Background(), backoff, auth)
|
2019-12-04 17:22:08 +00:00
|
|
|
assert.NoError(t, err)
|
|
|
|
assert.NotNil(t, retryChan)
|
|
|
|
assert.Equal(t, 19*time.Hour, wait)
|
|
|
|
|
2020-08-18 10:14:14 +00:00
|
|
|
token, err := rcm.ReconnectToken()
|
2019-12-04 17:22:08 +00:00
|
|
|
assert.Equal(t, errJWTUnset, err)
|
|
|
|
assert.Nil(t, token)
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestRefreshAuthFail(t *testing.T) {
|
2020-08-18 10:14:14 +00:00
|
|
|
rcm := newReconnectCredentialManager(t.Name(), t.Name(), 4)
|
2019-12-04 17:22:08 +00:00
|
|
|
|
|
|
|
backoff := &BackoffHandler{MaxRetries: 3}
|
|
|
|
auth := func(ctx context.Context, n int) (tunnelpogs.AuthOutcome, error) {
|
|
|
|
return tunnelpogs.NewAuthFail(errors.New("auth fail")), nil
|
|
|
|
}
|
|
|
|
|
2020-08-18 10:14:14 +00:00
|
|
|
retryChan, err := rcm.RefreshAuth(context.Background(), backoff, auth)
|
2019-12-04 17:22:08 +00:00
|
|
|
assert.Error(t, err)
|
|
|
|
assert.Nil(t, retryChan)
|
|
|
|
|
2020-08-18 10:14:14 +00:00
|
|
|
token, err := rcm.ReconnectToken()
|
2019-12-04 17:22:08 +00:00
|
|
|
assert.Equal(t, errJWTUnset, err)
|
|
|
|
assert.Nil(t, token)
|
|
|
|
}
|