tests and linter fix

This commit is contained in:
crn4
2025-09-03 14:22:08 +02:00
parent fd7b3ae21c
commit bc6c5ece6e
6 changed files with 47 additions and 62 deletions

View File

@@ -849,6 +849,10 @@ func (a *Account) initNetworkMapBuilder(validatedPeers map[string]struct{}) {
a.NetworkMapCache = NewNetworkMapBuilder(a, validatedPeers)
}
func (a *Account) InitNetworkMapBuilderIfNeeded(validatedPeers map[string]struct{}) {
a.initNetworkMapBuilder(validatedPeers)
}
func (a *Account) GetPeerNetworkMapExp(
ctx context.Context,
peerID string,

View File

@@ -3,7 +3,6 @@ package types_test
import (
"context"
"encoding/json"
"flag"
"fmt"
"net"
"net/netip"
@@ -28,7 +27,7 @@ import (
// update flag is used to update the golden file.
// example: go test ./... -v -update
var update = flag.Bool("update", false, "update golden files")
// var update = flag.Bool("update", false, "update golden files")
const (
numPeers = 100
@@ -943,8 +942,8 @@ func createTestAccountWithEntities() *types.Account {
if peerID == expiredPeerID {
p.LoginExpirationEnabled = true
pastTime := time.Now().Add(-2 * time.Hour)
p.LastLogin = &pastTime
pastime = time.Now().Add(-2 * time.Hour)
p.LastLogin = &pastime
}
peers[peerID] = p

View File

@@ -301,9 +301,9 @@ func (b *NetworkMapBuilder) GetPeerNetworkMap(
return &NetworkMap{Network: account.Network.Copy()}
}
if !maps.Equal(b.validatedPeers, validatedPeers) {
// b.updateValidatedPeers(validatedPeers)
}
// if !maps.Equal(b.validatedPeers, validatedPeers) {
// b.updateValidatedPeers(validatedPeers)
// }
b.cache.mu.RLock()
defer b.cache.mu.RUnlock()
@@ -312,10 +312,10 @@ func (b *NetworkMapBuilder) GetPeerNetworkMap(
routesView := b.cache.peerRoutes[peerID]
dnsConfig := b.cache.peerDNS[peerID]
if aclView == nil || routesView == nil || dnsConfig == nil {
// log.Warnf("NetworkMapBuilder: Cache miss for peer %s, falling back to original method", peerID)
// return account.GetPeerNetworkMap(ctx, peerID, peersCustomZone, validatedPeers, resourcePolicies, routers, metrics)
}
// if aclView == nil || routesView == nil || dnsConfig == nil {
// // log.Warnf("NetworkMapBuilder: Cache miss for peer %s, falling back to original method", peerID)
// // return account.GetPeerNetworkMap(ctx, peerID, peersCustomZone, validatedPeers, resourcePolicies, routers, metrics)
// }
nm := b.assembleNetworkMap(account, aclView, routesView, dnsConfig, peersCustomZone, validatedPeers)
@@ -403,8 +403,7 @@ func (b *NetworkMapBuilder) assembleNetworkMap(
}
func (b *NetworkMapBuilder) generateFirewallRuleID(rule *FirewallRule) string {
portRange := ""
portRange = fmt.Sprintf("%d-%d", rule.PortRange.Start, rule.PortRange.End)
portRange := fmt.Sprintf("%d-%d", rule.PortRange.Start, rule.PortRange.End)
return fmt.Sprintf("fw:%s:%s:%d:%s:%s:%s:%s",
rule.PolicyID, rule.PeerIP, rule.Direction, rule.Protocol, rule.Action, rule.Port, portRange)
}
@@ -414,45 +413,6 @@ func (b *NetworkMapBuilder) generateRouteFirewallRuleID(rule *RouteFirewallRule)
rule.RouteID, rule.Destination, rule.Action, strings.Join(rule.SourceRanges, ","), rule.Protocol, rule.Port)
}
// func (b *NetworkMapBuilder) estimateMemoryUsage() int64 {
// b.cache.mu.RLock()
// defer b.cache.mu.RUnlock()
// var estimate int64
// const (
// peerSize = 1000
// routeSize = 500
// firewallRuleSize = 200
// routeRuleSize = 300
// stringSize = 50
// viewOverhead = 100
// )
// estimate += int64(len(b.cache.globalPeers)) * peerSize
// estimate += int64(len(b.cache.globalRoutes)) * routeSize
// estimate += int64(len(b.cache.globalRules)) * firewallRuleSize
// estimate += int64(len(b.cache.globalRouteRules)) * routeRuleSize
// for _, view := range b.cache.peerACLs {
// estimate += viewOverhead
// estimate += int64(len(view.ConnectedPeerIDs)) * stringSize
// estimate += int64(len(view.FirewallRuleIDs)) * stringSize
// }
// for _, view := range b.cache.peerRoutes {
// estimate += viewOverhead
// estimate += int64(len(view.OwnRouteIDs)) * stringSize
// estimate += int64(len(view.InheritedRouteIDs)) * stringSize
// estimate += int64(len(view.NetworkResourceIDs)) * stringSize
// estimate += int64(len(view.RouteFirewallRuleIDs)) * stringSize
// }
// estimate += int64(len(b.cache.peerDNS)) * 200
// return estimate
// }
func (b *NetworkMapBuilder) isPeerInGroups(groupIDs []string, peerGroups []string) bool {
for _, groupID := range groupIDs {
for _, peerGroupID := range peerGroups {
@@ -937,9 +897,9 @@ func (b *NetworkMapBuilder) updateRouteFirewallRules(
sourceIP := update.AddSourceIP
if strings.Contains(sourceIP, ":") {
sourceIP = sourceIP + "/128" // IPv6
sourceIP += "/128" // IPv6
} else {
sourceIP = sourceIP + "/32" // IPv4
sourceIP += "/32" // IPv4
}
if !slices.Contains(rule.SourceRanges, sourceIP) {