Merge lp:~pedronis/ubuntu-push/automatic-land-to-vivid into lp:ubuntu-push
- automatic-land-to-vivid
- Merge into trunk
Status: | Merged |
---|---|
Approved by: | Roberto Alsina |
Approved revision: | 145 |
Merged at revision: | 144 |
Proposed branch: | lp:~pedronis/ubuntu-push/automatic-land-to-vivid |
Merge into: | lp:ubuntu-push |
Diff against target: |
3221 lines (+1310/-514) 15 files modified
bus/networkmanager/networkmanager.go (+65/-12) bus/networkmanager/networkmanager_test.go (+109/-1) bus/urfkill/urfkill.go (+94/-0) bus/urfkill/urfkill.go_test.go (+121/-0) client/client.go (+23/-61) client/client_test.go (+57/-140) client/session/session.go (+208/-82) client/session/session_test.go (+358/-173) debian/changelog (+23/-0) debian/config.json (+2/-1) launch_helper/kindpool_test.go (+1/-1) poller/poller.go (+164/-32) poller/poller_test.go (+71/-11) scripts/click-hook (+2/-0) server/tlsconfig.go (+12/-0) |
To merge this branch: | bzr merge lp:~pedronis/ubuntu-push/automatic-land-to-vivid |
Related bugs: |
Reviewer | Review Type | Date Requested | Status |
---|---|---|---|
Roberto Alsina (community) | Approve | ||
Review via email:
|
Commit message
[Roberto Alsina]
* click-hook: report failure if hooks_path doesn't exist. [client]
[Bret Barker]
* add a hacky busy sleep loop to workaround go's sleep not
accounting for suspended time, more logging (lp:1435109). [client]
[John R. Lenton]
* Refactor code maintaining session (better fix for lp:1390663) [client]
[Samuele Pedroni]
* just delegate whether there's a update-worthy image to the
system-settings helper and system-image. [client]
* stop waking up for polling if in flight-mode and wireless not
enabled (lp:1437135). [client]
* don't hold a lock for a long time on handleErrConn, trigger
autoRedial on Error more actively (lp:1435109). [client]
* disallow RC4 and SSLv3. [server]
Description of the change
[Roberto Alsina]
* click-hook: report failure if hooks_path doesn't exist. [client]
[Bret Barker]
* add a hacky busy sleep loop to workaround go's sleep not
accounting for suspended time, more logging (lp:1435109). [client]
[John R. Lenton]
* Refactor code maintaining session (better fix for lp:1390663) [client]
[Samuele Pedroni]
* just delegate whether there's a update-worthy image to the
system-settings helper and system-image. [client]
* stop waking up for polling if in flight-mode and wireless not
enabled (lp:1437135). [client]
* don't hold a lock for a long time on handleErrConn, trigger
autoRedial on Error more actively (lp:1435109). [client]
* disallow RC4 and SSLv3. [server]
![](/+icing/build/overlay/assets/skins/sam/images/close.gif)
Roberto Alsina (ralsina) : | # |
Preview Diff
1 | === modified file 'bus/networkmanager/networkmanager.go' |
2 | --- bus/networkmanager/networkmanager.go 2015-02-26 19:36:57 +0000 |
3 | +++ bus/networkmanager/networkmanager.go 2015-04-02 09:52:21 +0000 |
4 | @@ -1,5 +1,5 @@ |
5 | /* |
6 | - Copyright 2013-2014 Canonical Ltd. |
7 | + Copyright 2013-2015 Canonical Ltd. |
8 | |
9 | This program is free software: you can redistribute it and/or modify it |
10 | under the terms of the GNU General Public License version 3, as published |
11 | @@ -14,9 +14,10 @@ |
12 | with this program. If not, see <http://www.gnu.org/licenses/>. |
13 | */ |
14 | |
15 | -// Package networkmanager wraps a couple of NetworkManager's DBus API points: |
16 | -// the org.freedesktop.NetworkManager.state call, and listening for the |
17 | -// StateChange signal. |
18 | +// Package networkmanager wraps a couple of NetworkManager's DBus API |
19 | +// points: the org.freedesktop.NetworkManager.state call, and |
20 | +// listening for the StateChange signal, similarly for the primary |
21 | +// connection and wireless enabled state. |
22 | package networkmanager |
23 | |
24 | import ( |
25 | @@ -47,8 +48,14 @@ |
26 | // primary connection. |
27 | GetPrimaryConnection() string |
28 | // WatchPrimaryConnection listens for changes of NetworkManager's |
29 | - // Primary Connection, and sends it out over the channel returned. |
30 | + // Primary Connection, and sends them out over the channel returned. |
31 | WatchPrimaryConnection() (<-chan string, bus.Cancellable, error) |
32 | + // GetWirelessEnabled fetches and returns NetworkManager's |
33 | + // wireless state. |
34 | + GetWirelessEnabled() bool |
35 | + // WatchWirelessEnabled listens for changes of NetworkManager's |
36 | + // wireless state, and sends them out over the channel returned. |
37 | + WatchWirelessEnabled() (<-chan bool, bus.Cancellable, error) |
38 | } |
39 | |
40 | type networkManager struct { |
41 | @@ -71,7 +78,7 @@ |
42 | func (nm *networkManager) GetState() State { |
43 | s, err := nm.bus.GetProperty("state") |
44 | if err != nil { |
45 | - nm.log.Errorf("failed gettting current state: %s", err) |
46 | + nm.log.Errorf("failed getting current state: %s", err) |
47 | nm.log.Debugf("defaulting state to Unknown") |
48 | return Unknown |
49 | } |
50 | @@ -108,16 +115,16 @@ |
51 | } |
52 | |
53 | func (nm *networkManager) GetPrimaryConnection() string { |
54 | - s, err := nm.bus.GetProperty("PrimaryConnection") |
55 | + got, err := nm.bus.GetProperty("PrimaryConnection") |
56 | if err != nil { |
57 | - nm.log.Errorf("failed gettting current primary connection: %s", err) |
58 | - nm.log.Debugf("defaulting primary connection to empty") |
59 | + nm.log.Errorf("failed getting current PrimaryConnection: %s", err) |
60 | + nm.log.Debugf("defaulting PrimaryConnection to empty") |
61 | return "" |
62 | } |
63 | |
64 | - v, ok := s.(dbus.ObjectPath) |
65 | + v, ok := got.(dbus.ObjectPath) |
66 | if !ok { |
67 | - nm.log.Errorf("got weird PrimaryConnection: %#v", s) |
68 | + nm.log.Errorf("got weird PrimaryConnection: %#v", got) |
69 | return "" |
70 | } |
71 | |
72 | @@ -142,7 +149,7 @@ |
73 | nm.log.Errorf("got weird PrimaryConnection via PropertiesChanged: %#v", v) |
74 | return |
75 | } |
76 | - nm.log.Debugf("got primary connection: %s", con) |
77 | + nm.log.Debugf("got PrimaryConnection change: %s", con) |
78 | ch <- string(con) |
79 | }, func() { close(ch) }) |
80 | if err != nil { |
81 | @@ -152,3 +159,49 @@ |
82 | |
83 | return ch, w, nil |
84 | } |
85 | + |
86 | +func (nm *networkManager) GetWirelessEnabled() bool { |
87 | + got, err := nm.bus.GetProperty("WirelessEnabled") |
88 | + if err != nil { |
89 | + nm.log.Errorf("failed getting WirelessEnabled: %s", err) |
90 | + nm.log.Debugf("defaulting WirelessEnabled to true") |
91 | + return true |
92 | + } |
93 | + |
94 | + v, ok := got.(bool) |
95 | + if !ok { |
96 | + nm.log.Errorf("got weird WirelessEnabled: %#v", got) |
97 | + return true |
98 | + } |
99 | + |
100 | + return v |
101 | +} |
102 | + |
103 | +func (nm *networkManager) WatchWirelessEnabled() (<-chan bool, bus.Cancellable, error) { |
104 | + ch := make(chan bool) |
105 | + w, err := nm.bus.WatchSignal("PropertiesChanged", |
106 | + func(ppsi ...interface{}) { |
107 | + pps, ok := ppsi[0].(map[string]dbus.Variant) |
108 | + if !ok { |
109 | + nm.log.Errorf("got weird PropertiesChanged: %#v", ppsi[0]) |
110 | + return |
111 | + } |
112 | + v, ok := pps["WirelessEnabled"] |
113 | + if !ok { |
114 | + return |
115 | + } |
116 | + en, ok := v.Value.(bool) |
117 | + if !ok { |
118 | + nm.log.Errorf("got weird WirelessEnabled via PropertiesChanged: %#v", v) |
119 | + return |
120 | + } |
121 | + nm.log.Debugf("got WirelessEnabled change: %v", en) |
122 | + ch <- en |
123 | + }, func() { close(ch) }) |
124 | + if err != nil { |
125 | + nm.log.Debugf("failed to set up the watch: %s", err) |
126 | + return nil, nil, err |
127 | + } |
128 | + |
129 | + return ch, w, nil |
130 | +} |
131 | |
132 | === modified file 'bus/networkmanager/networkmanager_test.go' |
133 | --- bus/networkmanager/networkmanager_test.go 2015-02-26 19:36:57 +0000 |
134 | +++ bus/networkmanager/networkmanager_test.go 2015-04-02 09:52:21 +0000 |
135 | @@ -1,5 +1,5 @@ |
136 | /* |
137 | - Copyright 2013-2014 Canonical Ltd. |
138 | + Copyright 2013-2015 Canonical Ltd. |
139 | |
140 | This program is free software: you can redistribute it and/or modify it |
141 | under the terms of the GNU General Public License version 3, as published |
142 | @@ -232,3 +232,111 @@ |
143 | c.Check(ok, Equals, true) |
144 | c.Check(v, Equals, "42") |
145 | } |
146 | + |
147 | +// GetWirelessEnabled returns the right state when everything works |
148 | +func (s *NMSuite) TestGetWirelessEnabled(c *C) { |
149 | + nm := New(testingbus.NewTestingEndpoint(nil, condition.Work(true), false), s.log) |
150 | + en := nm.GetWirelessEnabled() |
151 | + c.Check(en, Equals, false) |
152 | +} |
153 | + |
154 | +// GetWirelessEnabled returns the right state when dbus fails |
155 | +func (s *NMSuite) TestGetWirelessEnabledFail(c *C) { |
156 | + nm := New(testingbus.NewTestingEndpoint(nil, condition.Work(false)), s.log) |
157 | + en := nm.GetWirelessEnabled() |
158 | + c.Check(en, Equals, true) |
159 | +} |
160 | + |
161 | +// GetWirelessEnabled returns the right state when dbus works but delivers rubbish values |
162 | +func (s *NMSuite) TestGetWirelessEnabledRubbishValues(c *C) { |
163 | + nm := New(testingbus.NewTestingEndpoint(nil, condition.Work(true), "broken"), s.log) |
164 | + en := nm.GetWirelessEnabled() |
165 | + c.Check(en, Equals, true) |
166 | +} |
167 | + |
168 | +// GetWirelessEnabled returns the right state when dbus works but delivers a rubbish structure |
169 | +func (s *NMSuite) TestGetWirelessEnabledRubbishStructure(c *C) { |
170 | + nm := New(testingbus.NewMultiValuedTestingEndpoint(nil, condition.Work(true), []interface{}{}), s.log) |
171 | + en := nm.GetWirelessEnabled() |
172 | + c.Check(en, Equals, true) |
173 | +} |
174 | + |
175 | +func mkWirelessEnMap(en bool) map[string]dbus.Variant { |
176 | + m := make(map[string]dbus.Variant) |
177 | + m["WirelessEnabled"] = dbus.Variant{en} |
178 | + return m |
179 | +} |
180 | + |
181 | +// WatchWirelessEnabled sends a stream of wireless enabled states over the channel |
182 | +func (s *NMSuite) TestWatchWirelessEnabled(c *C) { |
183 | + tc := testingbus.NewTestingEndpoint(nil, condition.Work(true), |
184 | + mkWirelessEnMap(true), |
185 | + mkWirelessEnMap(false), |
186 | + mkWirelessEnMap(true), |
187 | + ) |
188 | + nm := New(tc, s.log) |
189 | + ch, w, err := nm.WatchWirelessEnabled() |
190 | + c.Assert(err, IsNil) |
191 | + defer w.Cancel() |
192 | + l := []bool{<-ch, <-ch, <-ch} |
193 | + c.Check(l, DeepEquals, []bool{true, false, true}) |
194 | +} |
195 | + |
196 | +// WatchWirelessEnabled returns on error if the dbus call fails |
197 | +func (s *NMSuite) TestWatchWirelessEnabledFails(c *C) { |
198 | + nm := New(testingbus.NewTestingEndpoint(nil, condition.Work(false)), s.log) |
199 | + _, _, err := nm.WatchWirelessEnabled() |
200 | + c.Check(err, NotNil) |
201 | +} |
202 | + |
203 | +// WatchWirelessEnabled calls close on its channel when the watch bails |
204 | +func (s *NMSuite) TestWatchWirelessEnabledClosesOnWatchBail(c *C) { |
205 | + tc := testingbus.NewTestingEndpoint(nil, condition.Work(true)) |
206 | + nm := New(tc, s.log) |
207 | + ch, w, err := nm.WatchWirelessEnabled() |
208 | + c.Assert(err, IsNil) |
209 | + defer w.Cancel() |
210 | + _, ok := <-ch |
211 | + c.Check(ok, Equals, false) |
212 | +} |
213 | + |
214 | +// WatchWirelessEnabled survives rubbish values |
215 | +func (s *NMSuite) TestWatchWirelessEnabledSurvivesRubbishValues(c *C) { |
216 | + tc := testingbus.NewTestingEndpoint(nil, condition.Work(true), "gorp") |
217 | + nm := New(tc, s.log) |
218 | + ch, w, err := nm.WatchWirelessEnabled() |
219 | + c.Assert(err, IsNil) |
220 | + defer w.Cancel() |
221 | + _, ok := <-ch |
222 | + c.Check(ok, Equals, false) |
223 | +} |
224 | + |
225 | +// WatchWirelessEnabled ignores non-WirelessEnabled PropertyChanged |
226 | +func (s *NMSuite) TestWatchWirelessEnabledIgnoresIrrelephant(c *C) { |
227 | + tc := testingbus.NewTestingEndpoint(nil, condition.Work(true), |
228 | + map[string]dbus.Variant{"foo": dbus.Variant{}}, |
229 | + map[string]dbus.Variant{"WirelessEnabled": dbus.Variant{true}}, |
230 | + ) |
231 | + nm := New(tc, s.log) |
232 | + ch, w, err := nm.WatchWirelessEnabled() |
233 | + c.Assert(err, IsNil) |
234 | + defer w.Cancel() |
235 | + v, ok := <-ch |
236 | + c.Check(ok, Equals, true) |
237 | + c.Check(v, Equals, true) |
238 | +} |
239 | + |
240 | +// WatchWirelessEnabled ignores rubbish WirelessEnabled |
241 | +func (s *NMSuite) TestWatchWirelessEnabledIgnoresRubbishValues(c *C) { |
242 | + tc := testingbus.NewTestingEndpoint(nil, condition.Work(true), |
243 | + map[string]dbus.Variant{"WirelessEnabled": dbus.Variant{-12}}, |
244 | + map[string]dbus.Variant{"WirelessEnabled": dbus.Variant{false}}, |
245 | + ) |
246 | + nm := New(tc, s.log) |
247 | + ch, w, err := nm.WatchWirelessEnabled() |
248 | + c.Assert(err, IsNil) |
249 | + defer w.Cancel() |
250 | + v, ok := <-ch |
251 | + c.Check(ok, Equals, true) |
252 | + c.Check(v, Equals, false) |
253 | +} |
254 | |
255 | === added directory 'bus/urfkill' |
256 | === added file 'bus/urfkill/urfkill.go' |
257 | --- bus/urfkill/urfkill.go 1970-01-01 00:00:00 +0000 |
258 | +++ bus/urfkill/urfkill.go 2015-04-02 09:52:21 +0000 |
259 | @@ -0,0 +1,94 @@ |
260 | +/* |
261 | + Copyright 2015 Canonical Ltd. |
262 | + |
263 | + This program is free software: you can redistribute it and/or modify it |
264 | + under the terms of the GNU General Public License version 3, as published |
265 | + by the Free Software Foundation. |
266 | + |
267 | + This program is distributed in the hope that it will be useful, but |
268 | + WITHOUT ANY WARRANTY; without even the implied warranties of |
269 | + MERCHANTABILITY, SATISFACTORY QUALITY, or FITNESS FOR A PARTICULAR |
270 | + PURPOSE. See the GNU General Public License for more details. |
271 | + |
272 | + You should have received a copy of the GNU General Public License along |
273 | + with this program. If not, see <http://www.gnu.org/licenses/>. |
274 | +*/ |
275 | + |
276 | +// Package urfkill wraps a couple of URfkill's DBus API points to |
277 | +// watch for flight mode state changes. |
278 | +package urfkill |
279 | + |
280 | +import ( |
281 | + //"launchpad.net/go-dbus/v1" |
282 | + |
283 | + "launchpad.net/ubuntu-push/bus" |
284 | + "launchpad.net/ubuntu-push/logger" |
285 | +) |
286 | + |
287 | +// URfkill lives on a well-knwon bus.Address |
288 | +var BusAddress bus.Address = bus.Address{ |
289 | + Interface: "org.freedesktop.URfkill", |
290 | + Path: "/org/freedesktop/URfkill", |
291 | + Name: "org.freedesktop.URfkill", |
292 | +} |
293 | + |
294 | +/***************************************************************** |
295 | + * URfkill (and its implementation) |
296 | + */ |
297 | + |
298 | +type URfkill interface { |
299 | + // IsFlightMode returns flight mode state. |
300 | + IsFlightMode() bool |
301 | + // WatchFlightMode listens for changes to URfkill's flight |
302 | + // mode state, and sends them out over the channel returned. |
303 | + WatchFlightMode() (<-chan bool, bus.Cancellable, error) |
304 | +} |
305 | + |
306 | +type uRfkill struct { |
307 | + bus bus.Endpoint |
308 | + log logger.Logger |
309 | +} |
310 | + |
311 | +// New returns a new URfkill that'll use the provided bus.Endpoint |
312 | +func New(endp bus.Endpoint, log logger.Logger) URfkill { |
313 | + return &uRfkill{endp, log} |
314 | +} |
315 | + |
316 | +// ensure uRfkill implements URfkill |
317 | +var _ URfkill = &uRfkill{} |
318 | + |
319 | +/* |
320 | + public methods |
321 | +*/ |
322 | + |
323 | +func (ur *uRfkill) IsFlightMode() bool { |
324 | + var res bool |
325 | + err := ur.bus.Call("IsFlightMode", bus.Args(), &res) |
326 | + if err != nil { |
327 | + ur.log.Errorf("failed getting flight-mode state: %s", err) |
328 | + ur.log.Debugf("defaulting flight-mode state to false") |
329 | + return false |
330 | + } |
331 | + return res |
332 | +} |
333 | + |
334 | +func (ur *uRfkill) WatchFlightMode() (<-chan bool, bus.Cancellable, error) { |
335 | + ch := make(chan bool) |
336 | + w, err := ur.bus.WatchSignal("FlightModeChanged", |
337 | + func(ns ...interface{}) { |
338 | + stbool, ok := ns[0].(bool) |
339 | + if !ok { |
340 | + ur.log.Errorf("got weird flight-mode state: %#v", ns[0]) |
341 | + return |
342 | + } |
343 | + ur.log.Debugf("got flight-mode change: %v", stbool) |
344 | + ch <- stbool |
345 | + }, |
346 | + func() { close(ch) }) |
347 | + if err != nil { |
348 | + ur.log.Debugf("Failed to set up the watch: %s", err) |
349 | + return nil, nil, err |
350 | + } |
351 | + |
352 | + return ch, w, nil |
353 | +} |
354 | |
355 | === added file 'bus/urfkill/urfkill.go_test.go' |
356 | --- bus/urfkill/urfkill.go_test.go 1970-01-01 00:00:00 +0000 |
357 | +++ bus/urfkill/urfkill.go_test.go 2015-04-02 09:52:21 +0000 |
358 | @@ -0,0 +1,121 @@ |
359 | +/* |
360 | + Copyright 2015 Canonical Ltd. |
361 | + |
362 | + This program is free software: you can redistribute it and/or modify it |
363 | + under the terms of the GNU General Public License version 3, as published |
364 | + by the Free Software Foundation. |
365 | + |
366 | + This program is distributed in the hope that it will be useful, but |
367 | + WITHOUT ANY WARRANTY; without even the implied warranties of |
368 | + MERCHANTABILITY, SATISFACTORY QUALITY, or FITNESS FOR A PARTICULAR |
369 | + PURPOSE. See the GNU General Public License for more details. |
370 | + |
371 | + You should have received a copy of the GNU General Public License along |
372 | + with this program. If not, see <http://www.gnu.org/licenses/>. |
373 | +*/ |
374 | + |
375 | +package urfkill |
376 | + |
377 | +import ( |
378 | + "testing" |
379 | + |
380 | + //"launchpad.net/go-dbus/v1" |
381 | + . "launchpad.net/gocheck" |
382 | + |
383 | + testingbus "launchpad.net/ubuntu-push/bus/testing" |
384 | + "launchpad.net/ubuntu-push/logger" |
385 | + helpers "launchpad.net/ubuntu-push/testing" |
386 | + "launchpad.net/ubuntu-push/testing/condition" |
387 | +) |
388 | + |
389 | +// hook up gocheck |
390 | +func Test(t *testing.T) { TestingT(t) } |
391 | + |
392 | +type URSuite struct { |
393 | + log logger.Logger |
394 | +} |
395 | + |
396 | +var _ = Suite(&URSuite{}) |
397 | + |
398 | +func (s *URSuite) SetUpTest(c *C) { |
399 | + s.log = helpers.NewTestLogger(c, "debug") |
400 | +} |
401 | + |
402 | +func (s *URSuite) TestNew(c *C) { |
403 | + ur := New(testingbus.NewTestingEndpoint(nil, condition.Work(true)), s.log) |
404 | + c.Check(ur, NotNil) |
405 | +} |
406 | + |
407 | +// IsFlightMode returns the right state when everything works |
408 | +func (s *URSuite) TestIsFlightMode(c *C) { |
409 | + endp := testingbus.NewTestingEndpoint(nil, condition.Work(true), true) |
410 | + ur := New(endp, s.log) |
411 | + state := ur.IsFlightMode() |
412 | + c.Check(state, Equals, true) |
413 | + callArgs := testingbus.GetCallArgs(endp) |
414 | + c.Assert(callArgs, HasLen, 1) |
415 | + c.Assert(callArgs[0].Member, Equals, "IsFlightMode") |
416 | + c.Assert(callArgs[0].Args, HasLen, 0) |
417 | +} |
418 | + |
419 | +// IsFlightMode returns the right state when dbus fails |
420 | +func (s *URSuite) TestIsFlightModeFail(c *C) { |
421 | + ur := New(testingbus.NewTestingEndpoint(nil, condition.Work(false)), s.log) |
422 | + state := ur.IsFlightMode() |
423 | + c.Check(state, Equals, false) |
424 | +} |
425 | + |
426 | +// IsFlightMode returns the right state when dbus works but delivers |
427 | +// rubbish values |
428 | +func (s *URSuite) TestIsFlightModeRubbishValues(c *C) { |
429 | + ur := New(testingbus.NewTestingEndpoint(nil, condition.Work(true), "broken"), s.log) |
430 | + state := ur.IsFlightMode() |
431 | + c.Check(state, Equals, false) |
432 | +} |
433 | + |
434 | +// IsFlightMode returns the right state when dbus works but delivers a rubbish structure |
435 | +func (s *URSuite) TestIsFlightModeRubbishStructure(c *C) { |
436 | + ur := New(testingbus.NewMultiValuedTestingEndpoint(nil, condition.Work(true), []interface{}{}), s.log) |
437 | + state := ur.IsFlightMode() |
438 | + c.Check(state, Equals, false) |
439 | +} |
440 | + |
441 | +// WatchFightMode sends a stream of states over the channel |
442 | +func (s *URSuite) TestWatchFlightMode(c *C) { |
443 | + tc := testingbus.NewTestingEndpoint(nil, condition.Work(true), false, true, false) |
444 | + ur := New(tc, s.log) |
445 | + ch, w, err := ur.WatchFlightMode() |
446 | + c.Assert(err, IsNil) |
447 | + defer w.Cancel() |
448 | + l := []bool{<-ch, <-ch, <-ch} |
449 | + c.Check(l, DeepEquals, []bool{false, true, false}) |
450 | +} |
451 | + |
452 | +// WatchFlightMode returns on error if the dbus call fails |
453 | +func (s *URSuite) TestWatchFlightModeFails(c *C) { |
454 | + ur := New(testingbus.NewTestingEndpoint(nil, condition.Work(false)), s.log) |
455 | + _, _, err := ur.WatchFlightMode() |
456 | + c.Check(err, NotNil) |
457 | +} |
458 | + |
459 | +// WatchFlightMode calls close on its channel when the watch bails |
460 | +func (s *URSuite) TestWatchFlightModeClosesOnWatchBail(c *C) { |
461 | + tc := testingbus.NewTestingEndpoint(nil, condition.Work(true)) |
462 | + ur := New(tc, s.log) |
463 | + ch, w, err := ur.WatchFlightMode() |
464 | + c.Assert(err, IsNil) |
465 | + defer w.Cancel() |
466 | + _, ok := <-ch |
467 | + c.Check(ok, Equals, false) |
468 | +} |
469 | + |
470 | +// WatchFlightMode survives rubbish values |
471 | +func (s *URSuite) TestWatchFlightModeSurvivesRubbishValues(c *C) { |
472 | + tc := testingbus.NewTestingEndpoint(nil, condition.Work(true), "gorp") |
473 | + ur := New(tc, s.log) |
474 | + ch, w, err := ur.WatchFlightMode() |
475 | + c.Assert(err, IsNil) |
476 | + defer w.Cancel() |
477 | + _, ok := <-ch |
478 | + c.Check(ok, Equals, false) |
479 | +} |
480 | |
481 | === modified file 'client/client.go' |
482 | --- client/client.go 2015-02-27 10:47:17 +0000 |
483 | +++ client/client.go 2015-04-02 09:52:21 +0000 |
484 | @@ -79,6 +79,7 @@ |
485 | PollNetworkWait config.ConfigTimeDuration `json:"poll_net_wait"` |
486 | PollPolldWait config.ConfigTimeDuration `json:"poll_polld_wait"` |
487 | PollDoneWait config.ConfigTimeDuration `json:"poll_done_wait"` |
488 | + PollBusyWait config.ConfigTimeDuration `json:"poll_busy_wait"` |
489 | } |
490 | |
491 | // PushService is the interface we use of service.PushService. |
492 | @@ -115,8 +116,7 @@ |
493 | systemImageEndp bus.Endpoint |
494 | systemImageInfo *systemimage.InfoResult |
495 | connCh chan bool |
496 | - hasConnectivity bool |
497 | - session *session.ClientSession |
498 | + session session.ClientSession |
499 | sessionConnectedCh chan uint32 |
500 | pushService PushService |
501 | postalService PostalService |
502 | @@ -125,16 +125,20 @@ |
503 | installedChecker click.InstalledChecker |
504 | poller poller.Poller |
505 | accountsCh <-chan accounts.Changed |
506 | + // session-side channels |
507 | + broadcastCh chan *session.BroadcastNotification |
508 | + notificationsCh chan session.AddressedNotification |
509 | } |
510 | |
511 | // Creates a new Ubuntu Push Notifications client-side daemon that will use |
512 | // the given configuration file. |
513 | func NewPushClient(configPath string, leveldbPath string) *PushClient { |
514 | - client := new(PushClient) |
515 | - client.configPath = configPath |
516 | - client.leveldbPath = leveldbPath |
517 | - |
518 | - return client |
519 | + return &PushClient{ |
520 | + configPath: configPath, |
521 | + leveldbPath: leveldbPath, |
522 | + broadcastCh: make(chan *session.BroadcastNotification), |
523 | + notificationsCh: make(chan session.AddressedNotification), |
524 | + } |
525 | } |
526 | |
527 | var newIdentifier = identifier.New |
528 | @@ -206,6 +210,8 @@ |
529 | AuthGetter: client.getAuthorization, |
530 | AuthURL: client.config.SessionURL, |
531 | AddresseeChecker: client, |
532 | + BroadcastCh: client.broadcastCh, |
533 | + NotificationsCh: client.notificationsCh, |
534 | } |
535 | } |
536 | |
537 | @@ -241,6 +247,7 @@ |
538 | NetworkWait: client.config.PollNetworkWait.TimeDuration(), |
539 | PolldWait: client.config.PollPolldWait.TimeDuration(), |
540 | DoneWait: client.config.PollDoneWait.TimeDuration(), |
541 | + BusyWait: client.config.PollBusyWait.TimeDuration(), |
542 | }, |
543 | Log: client.log, |
544 | SessionStateGetter: client.session, |
545 | @@ -280,7 +287,6 @@ |
546 | |
547 | // takeTheBus starts the connection(s) to D-Bus and sets up associated event channels |
548 | func (client *PushClient) takeTheBus() error { |
549 | - fmt.Println("FOO") |
550 | cs := connectivity.New(client.connectivityEndp, |
551 | client.config.ConnectivityConfig, client.log) |
552 | go cs.Track(client.connCh) |
553 | @@ -308,6 +314,7 @@ |
554 | return err |
555 | } |
556 | client.session = sess |
557 | + sess.KeepConnection() |
558 | client.poller = poller.New(client.derivePollerSetup()) |
559 | return nil |
560 | } |
561 | @@ -376,29 +383,6 @@ |
562 | } |
563 | } |
564 | |
565 | -// handleConnState deals with connectivity events |
566 | -func (client *PushClient) handleConnState(hasConnectivity bool) { |
567 | - client.log.Debugf("handleConnState: %v", hasConnectivity) |
568 | - if client.hasConnectivity == hasConnectivity { |
569 | - // nothing to do! |
570 | - return |
571 | - } |
572 | - client.hasConnectivity = hasConnectivity |
573 | - client.session.Close() |
574 | - if hasConnectivity { |
575 | - client.session.AutoRedial(client.sessionConnectedCh) |
576 | - } |
577 | -} |
578 | - |
579 | -// handleErr deals with the session erroring out of its loop |
580 | -func (client *PushClient) handleErr(err error) { |
581 | - // if we're not connected, we don't really care |
582 | - client.log.Errorf("session exited: %s", err) |
583 | - if client.hasConnectivity { |
584 | - client.session.AutoRedial(client.sessionConnectedCh) |
585 | - } |
586 | -} |
587 | - |
588 | // filterBroadcastNotification finds out if the notification is about an actual |
589 | // upgrade for the device. It expects msg.Decoded entries to look |
590 | // like: |
591 | @@ -426,20 +410,9 @@ |
592 | if len(pair) < 1 { |
593 | return false |
594 | } |
595 | - buildNumber, ok := pair[0].(float64) |
596 | - if !ok { |
597 | - return false |
598 | - } |
599 | - curBuildNumber := float64(client.systemImageInfo.BuildNumber) |
600 | - if buildNumber > curBuildNumber { |
601 | - return true |
602 | - } |
603 | - // xxx we should really compare channel_target and alias here |
604 | - // going backward by a margin, assume switch of target |
605 | - if buildNumber < curBuildNumber && (curBuildNumber-buildNumber) > 10 { |
606 | - return true |
607 | - } |
608 | - return false |
609 | + _, ok = pair[0].(float64) |
610 | + // ok means it sanity checks, let the helper check for build number etc |
611 | + return ok |
612 | } |
613 | |
614 | // handleBroadcastNotification deals with receiving a broadcast notification |
615 | @@ -469,28 +442,18 @@ |
616 | return nil |
617 | } |
618 | |
619 | -// handleAccountsChange deals with the user adding or removing (or |
620 | -// changing) the u1 account used to auth |
621 | -func (client *PushClient) handleAccountsChange() { |
622 | - client.log.Infof("U1 account changed; restarting session") |
623 | - client.session.ClearCookie() |
624 | - client.session.Close() |
625 | -} |
626 | - |
627 | // doLoop connects events with their handlers |
628 | -func (client *PushClient) doLoop(connhandler func(bool), bcasthandler func(*session.BroadcastNotification) error, ucasthandler func(session.AddressedNotification) error, errhandler func(error), unregisterhandler func(*click.AppId), accountshandler func()) { |
629 | +func (client *PushClient) doLoop(connhandler func(bool), bcasthandler func(*session.BroadcastNotification) error, ucasthandler func(session.AddressedNotification) error, unregisterhandler func(*click.AppId), accountshandler func()) { |
630 | for { |
631 | select { |
632 | case <-client.accountsCh: |
633 | accountshandler() |
634 | case state := <-client.connCh: |
635 | connhandler(state) |
636 | - case bcast := <-client.session.BroadcastCh: |
637 | + case bcast := <-client.broadcastCh: |
638 | bcasthandler(bcast) |
639 | - case aucast := <-client.session.NotificationsCh: |
640 | + case aucast := <-client.notificationsCh: |
641 | ucasthandler(aucast) |
642 | - case err := <-client.session.ErrCh: |
643 | - errhandler(err) |
644 | case count := <-client.sessionConnectedCh: |
645 | client.log.Debugf("session connected after %d attempts", count) |
646 | case app := <-client.unregisterCh: |
647 | @@ -512,12 +475,11 @@ |
648 | |
649 | // Loop calls doLoop with the "real" handlers |
650 | func (client *PushClient) Loop() { |
651 | - client.doLoop(client.handleConnState, |
652 | + client.doLoop(client.session.HasConnectivity, |
653 | client.handleBroadcastNotification, |
654 | client.handleUnicastNotification, |
655 | - client.handleErr, |
656 | client.handleUnregister, |
657 | - client.handleAccountsChange, |
658 | + client.session.ResetCookie, |
659 | ) |
660 | } |
661 | |
662 | |
663 | === modified file 'client/client_test.go' |
664 | --- client/client_test.go 2015-02-27 10:47:17 +0000 |
665 | +++ client/client_test.go 2015-04-02 09:52:21 +0000 |
666 | @@ -43,7 +43,6 @@ |
667 | clickhelp "launchpad.net/ubuntu-push/click/testing" |
668 | "launchpad.net/ubuntu-push/client/service" |
669 | "launchpad.net/ubuntu-push/client/session" |
670 | - "launchpad.net/ubuntu-push/client/session/seenstate" |
671 | "launchpad.net/ubuntu-push/config" |
672 | "launchpad.net/ubuntu-push/identifier" |
673 | idtesting "launchpad.net/ubuntu-push/identifier/testing" |
674 | @@ -186,6 +185,7 @@ |
675 | "poll_net_wait": "1m", |
676 | "poll_polld_wait": "3m", |
677 | "poll_done_wait": "5s", |
678 | + "poll_busy_wait": "0s", |
679 | } |
680 | for k, v := range overrides { |
681 | cfgMap[k] = v |
682 | @@ -427,6 +427,8 @@ |
683 | AuthGetter: func(string) string { return "" }, |
684 | AuthURL: "xyzzy://", |
685 | AddresseeChecker: cli, |
686 | + BroadcastCh: make(chan *session.BroadcastNotification), |
687 | + NotificationsCh: make(chan session.AddressedNotification), |
688 | } |
689 | // sanity check that we are looking at all fields |
690 | vExpected := reflect.ValueOf(expected) |
691 | @@ -440,6 +442,11 @@ |
692 | conf := cli.deriveSessionConfig(info) |
693 | // compare authGetter by string |
694 | c.Check(fmt.Sprintf("%#v", conf.AuthGetter), Equals, fmt.Sprintf("%#v", cli.getAuthorization)) |
695 | + // channels are ok as long as non-nil |
696 | + conf.BroadcastCh = nil |
697 | + conf.NotificationsCh = nil |
698 | + expected.BroadcastCh = nil |
699 | + expected.NotificationsCh = nil |
700 | // and set it to nil |
701 | conf.AuthGetter = nil |
702 | expected.AuthGetter = nil |
703 | @@ -521,10 +528,18 @@ |
704 | /***************************************************************** |
705 | derivePollerSetup tests |
706 | ******************************************************************/ |
707 | +type derivePollerSession struct{} |
708 | + |
709 | +func (s *derivePollerSession) ResetCookie() {} |
710 | +func (s *derivePollerSession) State() session.ClientSessionState { return session.Unknown } |
711 | +func (s *derivePollerSession) HasConnectivity(bool) {} |
712 | +func (s *derivePollerSession) KeepConnection() error { return nil } |
713 | +func (s *derivePollerSession) StopKeepConnection() {} |
714 | + |
715 | func (cs *clientSuite) TestDerivePollerSetup(c *C) { |
716 | cs.writeTestConfig(map[string]interface{}{}) |
717 | cli := NewPushClient(cs.configPath, cs.leveldbPath) |
718 | - cli.session = new(session.ClientSession) |
719 | + cli.session = new(derivePollerSession) |
720 | err := cli.configure() |
721 | c.Assert(err, IsNil) |
722 | expected := &poller.PollerSetup{ |
723 | @@ -705,22 +720,6 @@ |
724 | } |
725 | |
726 | /***************************************************************** |
727 | - handleErr tests |
728 | -******************************************************************/ |
729 | - |
730 | -func (cs *clientSuite) TestHandleErr(c *C) { |
731 | - cli := NewPushClient(cs.configPath, cs.leveldbPath) |
732 | - cli.log = cs.log |
733 | - cli.systemImageInfo = siInfoRes |
734 | - c.Assert(cli.initSessionAndPoller(), IsNil) |
735 | - cs.log.ResetCapture() |
736 | - cli.hasConnectivity = true |
737 | - defer cli.session.Close() |
738 | - cli.handleErr(errors.New("bananas")) |
739 | - c.Check(cs.log.Captured(), Matches, ".*session exited.*bananas\n") |
740 | -} |
741 | - |
742 | -/***************************************************************** |
743 | seenStateFactory tests |
744 | ******************************************************************/ |
745 | |
746 | @@ -741,60 +740,6 @@ |
747 | } |
748 | |
749 | /***************************************************************** |
750 | - handleConnState tests |
751 | -******************************************************************/ |
752 | - |
753 | -func (cs *clientSuite) TestHandleConnStateD2C(c *C) { |
754 | - cli := NewPushClient(cs.configPath, cs.leveldbPath) |
755 | - cli.log = cs.log |
756 | - cli.systemImageInfo = siInfoRes |
757 | - c.Assert(cli.initSessionAndPoller(), IsNil) |
758 | - |
759 | - c.Assert(cli.hasConnectivity, Equals, false) |
760 | - defer cli.session.Close() |
761 | - cli.handleConnState(true) |
762 | - c.Check(cli.hasConnectivity, Equals, true) |
763 | - c.Assert(cli.session, NotNil) |
764 | -} |
765 | - |
766 | -func (cs *clientSuite) TestHandleConnStateSame(c *C) { |
767 | - cli := NewPushClient(cs.configPath, cs.leveldbPath) |
768 | - cli.log = cs.log |
769 | - // here we want to check that we don't do anything |
770 | - c.Assert(cli.session, IsNil) |
771 | - c.Assert(cli.hasConnectivity, Equals, false) |
772 | - cli.handleConnState(false) |
773 | - c.Check(cli.session, IsNil) |
774 | - |
775 | - cli.hasConnectivity = true |
776 | - cli.handleConnState(true) |
777 | - c.Check(cli.session, IsNil) |
778 | -} |
779 | - |
780 | -func (cs *clientSuite) TestHandleConnStateC2D(c *C) { |
781 | - cli := NewPushClient(cs.configPath, cs.leveldbPath) |
782 | - cli.log = cs.log |
783 | - cli.session, _ = session.NewSession(cli.config.Addr, cli.deriveSessionConfig(nil), cli.deviceId, seenstate.NewSeenState, cs.log) |
784 | - cli.session.Dial() |
785 | - cli.hasConnectivity = true |
786 | - |
787 | - // cli.session.State() will be "Error" here, for now at least |
788 | - c.Check(cli.session.State(), Not(Equals), session.Disconnected) |
789 | - cli.handleConnState(false) |
790 | - c.Check(cli.session.State(), Equals, session.Disconnected) |
791 | -} |
792 | - |
793 | -func (cs *clientSuite) TestHandleConnStateC2DPending(c *C) { |
794 | - cli := NewPushClient(cs.configPath, cs.leveldbPath) |
795 | - cli.log = cs.log |
796 | - cli.session, _ = session.NewSession(cli.config.Addr, cli.deriveSessionConfig(nil), cli.deviceId, seenstate.NewSeenState, cs.log) |
797 | - cli.hasConnectivity = true |
798 | - |
799 | - cli.handleConnState(false) |
800 | - c.Check(cli.session.State(), Equals, session.Disconnected) |
801 | -} |
802 | - |
803 | -/***************************************************************** |
804 | filterBroadcastNotification tests |
805 | ******************************************************************/ |
806 | |
807 | @@ -811,35 +756,11 @@ |
808 | // empty |
809 | msg := &session.BroadcastNotification{} |
810 | c.Check(cli.filterBroadcastNotification(msg), Equals, false) |
811 | - // same build number |
812 | - msg = &session.BroadcastNotification{ |
813 | - Decoded: []map[string]interface{}{ |
814 | - map[string]interface{}{ |
815 | - "daily/mako": []interface{}{float64(102), "tubular"}, |
816 | - }, |
817 | - }, |
818 | - } |
819 | - c.Check(cli.filterBroadcastNotification(msg), Equals, false) |
820 | - // higher build number and pick last |
821 | - msg = &session.BroadcastNotification{ |
822 | - Decoded: []map[string]interface{}{ |
823 | - map[string]interface{}{ |
824 | - "daily/mako": []interface{}{float64(102), "tubular"}, |
825 | - }, |
826 | - map[string]interface{}{ |
827 | - "daily/mako": []interface{}{float64(103), "tubular"}, |
828 | - }, |
829 | - }, |
830 | - } |
831 | - c.Check(cli.filterBroadcastNotification(msg), Equals, true) |
832 | - // going backward by a margin, assume switch of alias |
833 | - msg = &session.BroadcastNotification{ |
834 | - Decoded: []map[string]interface{}{ |
835 | - map[string]interface{}{ |
836 | - "daily/mako": []interface{}{float64(102), "tubular"}, |
837 | - }, |
838 | - map[string]interface{}{ |
839 | - "daily/mako": []interface{}{float64(2), "urban"}, |
840 | + // same build number, we let the helper deal |
841 | + msg = &session.BroadcastNotification{ |
842 | + Decoded: []map[string]interface{}{ |
843 | + map[string]interface{}{ |
844 | + "daily/mako": []interface{}{float64(102), "tubular"}, |
845 | }, |
846 | }, |
847 | } |
848 | @@ -888,9 +809,7 @@ |
849 | } |
850 | negativeBroadcastNotification = &session.BroadcastNotification{ |
851 | Decoded: []map[string]interface{}{ |
852 | - map[string]interface{}{ |
853 | - "daily/mako": []interface{}{float64(102), "tubular"}, |
854 | - }, |
855 | + map[string]interface{}{}, |
856 | }, |
857 | } |
858 | ) |
859 | @@ -1012,7 +931,6 @@ |
860 | var nopConn = func(bool) {} |
861 | var nopBcast = func(*session.BroadcastNotification) error { return nil } |
862 | var nopUcast = func(session.AddressedNotification) error { return nil } |
863 | -var nopError = func(error) {} |
864 | var nopUnregister = func(*click.AppId) {} |
865 | var nopAcct = func() {} |
866 | |
867 | @@ -1025,7 +943,7 @@ |
868 | c.Assert(cli.initSessionAndPoller(), IsNil) |
869 | |
870 | ch := make(chan bool, 1) |
871 | - go cli.doLoop(func(bool) { ch <- true }, nopBcast, nopUcast, nopError, nopUnregister, nopAcct) |
872 | + go cli.doLoop(func(bool) { ch <- true }, nopBcast, nopUcast, nopUnregister, nopAcct) |
873 | c.Check(takeNextBool(ch), Equals, true) |
874 | } |
875 | |
876 | @@ -1034,11 +952,11 @@ |
877 | cli.log = cs.log |
878 | cli.systemImageInfo = siInfoRes |
879 | c.Assert(cli.initSessionAndPoller(), IsNil) |
880 | - cli.session.BroadcastCh = make(chan *session.BroadcastNotification, 1) |
881 | - cli.session.BroadcastCh <- &session.BroadcastNotification{} |
882 | + cli.broadcastCh = make(chan *session.BroadcastNotification, 1) |
883 | + cli.broadcastCh <- &session.BroadcastNotification{} |
884 | |
885 | ch := make(chan bool, 1) |
886 | - go cli.doLoop(nopConn, func(_ *session.BroadcastNotification) error { ch <- true; return nil }, nopUcast, nopError, nopUnregister, nopAcct) |
887 | + go cli.doLoop(nopConn, func(_ *session.BroadcastNotification) error { ch <- true; return nil }, nopUcast, nopUnregister, nopAcct) |
888 | c.Check(takeNextBool(ch), Equals, true) |
889 | } |
890 | |
891 | @@ -1047,24 +965,11 @@ |
892 | cli.log = cs.log |
893 | cli.systemImageInfo = siInfoRes |
894 | c.Assert(cli.initSessionAndPoller(), IsNil) |
895 | - cli.session.NotificationsCh = make(chan session.AddressedNotification, 1) |
896 | - cli.session.NotificationsCh <- session.AddressedNotification{} |
897 | - |
898 | - ch := make(chan bool, 1) |
899 | - go cli.doLoop(nopConn, nopBcast, func(session.AddressedNotification) error { ch <- true; return nil }, nopError, nopUnregister, nopAcct) |
900 | - c.Check(takeNextBool(ch), Equals, true) |
901 | -} |
902 | - |
903 | -func (cs *clientSuite) TestDoLoopErr(c *C) { |
904 | - cli := NewPushClient(cs.configPath, cs.leveldbPath) |
905 | - cli.log = cs.log |
906 | - cli.systemImageInfo = siInfoRes |
907 | - c.Assert(cli.initSessionAndPoller(), IsNil) |
908 | - cli.session.ErrCh = make(chan error, 1) |
909 | - cli.session.ErrCh <- nil |
910 | - |
911 | - ch := make(chan bool, 1) |
912 | - go cli.doLoop(nopConn, nopBcast, nopUcast, func(error) { ch <- true }, nopUnregister, nopAcct) |
913 | + cli.notificationsCh = make(chan session.AddressedNotification, 1) |
914 | + cli.notificationsCh <- session.AddressedNotification{} |
915 | + |
916 | + ch := make(chan bool, 1) |
917 | + go cli.doLoop(nopConn, nopBcast, func(session.AddressedNotification) error { ch <- true; return nil }, nopUnregister, nopAcct) |
918 | c.Check(takeNextBool(ch), Equals, true) |
919 | } |
920 | |
921 | @@ -1077,7 +982,7 @@ |
922 | cli.unregisterCh <- app1 |
923 | |
924 | ch := make(chan bool, 1) |
925 | - go cli.doLoop(nopConn, nopBcast, nopUcast, nopError, func(app *click.AppId) { c.Check(app.Original(), Equals, appId1); ch <- true }, nopAcct) |
926 | + go cli.doLoop(nopConn, nopBcast, nopUcast, func(app *click.AppId) { c.Check(app.Original(), Equals, appId1); ch <- true }, nopAcct) |
927 | c.Check(takeNextBool(ch), Equals, true) |
928 | } |
929 | |
930 | @@ -1091,7 +996,7 @@ |
931 | cli.accountsCh = acctCh |
932 | |
933 | ch := make(chan bool, 1) |
934 | - go cli.doLoop(nopConn, nopBcast, nopUcast, nopError, nopUnregister, func() { ch <- true }) |
935 | + go cli.doLoop(nopConn, nopBcast, nopUcast, nopUnregister, func() { ch <- true }) |
936 | c.Check(takeNextBool(ch), Equals, true) |
937 | } |
938 | |
939 | @@ -1126,6 +1031,20 @@ |
940 | Loop() tests |
941 | ******************************************************************/ |
942 | |
943 | +type loopSession struct{ hasConn bool } |
944 | + |
945 | +func (s *loopSession) ResetCookie() {} |
946 | +func (s *loopSession) State() session.ClientSessionState { |
947 | + if s.hasConn { |
948 | + return session.Connected |
949 | + } else { |
950 | + return session.Disconnected |
951 | + } |
952 | +} |
953 | +func (s *loopSession) HasConnectivity(hasConn bool) { s.hasConn = hasConn } |
954 | +func (s *loopSession) KeepConnection() error { return nil } |
955 | +func (s *loopSession) StopKeepConnection() {} |
956 | + |
957 | func (cs *clientSuite) TestLoop(c *C) { |
958 | cli := NewPushClient(cs.configPath, cs.leveldbPath) |
959 | cli.connCh = make(chan bool) |
960 | @@ -1140,8 +1059,7 @@ |
961 | |
962 | c.Assert(cli.initSessionAndPoller(), IsNil) |
963 | |
964 | - cli.session.BroadcastCh = make(chan *session.BroadcastNotification) |
965 | - cli.session.ErrCh = make(chan error) |
966 | + cli.broadcastCh = make(chan *session.BroadcastNotification) |
967 | |
968 | // we use tick() to make sure things have been through the |
969 | // event loop at least once before looking at things; |
970 | @@ -1149,6 +1067,10 @@ |
971 | // at and the loop itself. |
972 | tick := func() { cli.sessionConnectedCh <- 42 } |
973 | |
974 | + c.Assert(cli.session, NotNil) |
975 | + cli.session.StopKeepConnection() |
976 | + cli.session = &loopSession{} |
977 | + |
978 | go cli.Loop() |
979 | |
980 | // sessionConnectedCh to nothing in particular, but it'll help sync this test |
981 | @@ -1158,24 +1080,19 @@ |
982 | |
983 | // loop() should have connected: |
984 | // * connCh to the connectivity checker |
985 | - c.Check(cli.hasConnectivity, Equals, false) |
986 | + c.Check(cli.session.State(), Equals, session.Disconnected) |
987 | cli.connCh <- true |
988 | tick() |
989 | - c.Check(cli.hasConnectivity, Equals, true) |
990 | + c.Check(cli.session.State(), Equals, session.Connected) |
991 | cli.connCh <- false |
992 | tick() |
993 | - c.Check(cli.hasConnectivity, Equals, false) |
994 | + c.Check(cli.session.State(), Equals, session.Disconnected) |
995 | |
996 | // * session.BroadcastCh to the notifications handler |
997 | c.Check(d.bcastCount, Equals, 0) |
998 | - cli.session.BroadcastCh <- positiveBroadcastNotification |
999 | + cli.broadcastCh <- positiveBroadcastNotification |
1000 | tick() |
1001 | c.Check(d.bcastCount, Equals, 1) |
1002 | - |
1003 | - // * session.ErrCh to the error handler |
1004 | - cli.session.ErrCh <- nil |
1005 | - tick() |
1006 | - c.Check(cs.log.Captured(), Matches, "(?ms).*session exited.*") |
1007 | } |
1008 | |
1009 | /***************************************************************** |
1010 | |
1011 | === modified file 'client/session/session.go' |
1012 | --- client/session/session.go 2015-01-22 11:05:37 +0000 |
1013 | +++ client/session/session.go 2015-04-02 09:52:21 +0000 |
1014 | @@ -39,6 +39,14 @@ |
1015 | "launchpad.net/ubuntu-push/util" |
1016 | ) |
1017 | |
1018 | +type sessCmd uint8 |
1019 | + |
1020 | +const ( |
1021 | + cmdDisconnect sessCmd = iota |
1022 | + cmdConnect |
1023 | + cmdResetCookie |
1024 | +) |
1025 | + |
1026 | var ( |
1027 | wireVersionBytes = []byte{protocol.ProtocolWireVersion} |
1028 | ) |
1029 | @@ -70,10 +78,12 @@ |
1030 | |
1031 | const ( |
1032 | Error ClientSessionState = iota |
1033 | + Pristine |
1034 | Disconnected |
1035 | Connected |
1036 | Started |
1037 | Running |
1038 | + Shutdown |
1039 | Unknown |
1040 | ) |
1041 | |
1042 | @@ -83,10 +93,12 @@ |
1043 | } |
1044 | return [Unknown]string{ |
1045 | "Error", |
1046 | + "Pristine", |
1047 | "Disconnected", |
1048 | "Connected", |
1049 | "Started", |
1050 | "Running", |
1051 | + "Shutdown", |
1052 | }[s] |
1053 | } |
1054 | |
1055 | @@ -118,10 +130,20 @@ |
1056 | AuthGetter func(string) string |
1057 | AuthURL string |
1058 | AddresseeChecker AddresseeChecking |
1059 | + BroadcastCh chan *BroadcastNotification |
1060 | + NotificationsCh chan AddressedNotification |
1061 | } |
1062 | |
1063 | // ClientSession holds a client<->server session and its configuration. |
1064 | -type ClientSession struct { |
1065 | +type ClientSession interface { |
1066 | + ResetCookie() |
1067 | + State() ClientSessionState |
1068 | + HasConnectivity(bool) |
1069 | + KeepConnection() error |
1070 | + StopKeepConnection() |
1071 | +} |
1072 | + |
1073 | +type clientSession struct { |
1074 | // configuration |
1075 | DeviceId string |
1076 | ClientSessionConfig |
1077 | @@ -145,25 +167,36 @@ |
1078 | proto protocol.Protocol |
1079 | pingInterval time.Duration |
1080 | retrier util.AutoRedialer |
1081 | - retrierLock sync.Mutex |
1082 | cookie string |
1083 | // status |
1084 | - stateP *uint32 |
1085 | - ErrCh chan error |
1086 | - BroadcastCh chan *BroadcastNotification |
1087 | - NotificationsCh chan AddressedNotification |
1088 | + stateLock sync.RWMutex |
1089 | + state ClientSessionState |
1090 | // authorization |
1091 | auth string |
1092 | // autoredial knobs |
1093 | shouldDelayP *uint32 |
1094 | lastAutoRedial time.Time |
1095 | - redialDelay func(*ClientSession) time.Duration |
1096 | + redialDelay func(*clientSession) time.Duration |
1097 | redialJitter func(time.Duration) time.Duration |
1098 | redialDelays []time.Duration |
1099 | redialDelaysIdx int |
1100 | + // connection events, and cookie reset requests, come in over here |
1101 | + cmdCh chan sessCmd |
1102 | + // last seen connection event is here |
1103 | + lastConn bool |
1104 | + // connection events are handled by this |
1105 | + connHandler func(bool) |
1106 | + // autoredial goes over here (xxx spurious goroutine involved) |
1107 | + doneCh chan uint32 |
1108 | + // main loop errors out through here (possibly another spurious goroutine) |
1109 | + errCh chan error |
1110 | + // main loop errors are handled by this |
1111 | + errHandler func(error) |
1112 | + // look, a stopper! |
1113 | + stopCh chan struct{} |
1114 | } |
1115 | |
1116 | -func redialDelay(sess *ClientSession) time.Duration { |
1117 | +func redialDelay(sess *clientSession) time.Duration { |
1118 | if sess.ShouldDelay() { |
1119 | t := sess.redialDelays[sess.redialDelaysIdx] |
1120 | if len(sess.redialDelays) > sess.redialDelaysIdx+1 { |
1121 | @@ -178,8 +211,7 @@ |
1122 | |
1123 | func NewSession(serverAddrSpec string, conf ClientSessionConfig, |
1124 | deviceId string, seenStateFactory func() (seenstate.SeenState, error), |
1125 | - log logger.Logger) (*ClientSession, error) { |
1126 | - state := uint32(Disconnected) |
1127 | + log logger.Logger) (*clientSession, error) { |
1128 | seenState, err := seenStateFactory() |
1129 | if err != nil { |
1130 | return nil, err |
1131 | @@ -191,7 +223,7 @@ |
1132 | getHost = gethosts.New(deviceId, hostsEndpoint, conf.ExchangeTimeout) |
1133 | } |
1134 | var shouldDelay uint32 = 0 |
1135 | - sess := &ClientSession{ |
1136 | + sess := &clientSession{ |
1137 | ClientSessionConfig: conf, |
1138 | getHost: getHost, |
1139 | fallbackHosts: fallbackHosts, |
1140 | @@ -200,10 +232,10 @@ |
1141 | Protocolator: protocol.NewProtocol0, |
1142 | SeenState: seenState, |
1143 | TLS: &tls.Config{}, |
1144 | - stateP: &state, |
1145 | + state: Pristine, |
1146 | timeSince: time.Since, |
1147 | shouldDelayP: &shouldDelay, |
1148 | - redialDelay: redialDelay, |
1149 | + redialDelay: redialDelay, // NOTE there are tests that use calling sess.redialDelay as an indication of calling autoRedial! |
1150 | redialDelays: util.Timeouts(), |
1151 | } |
1152 | sess.redialJitter = sess.Jitter |
1153 | @@ -215,62 +247,78 @@ |
1154 | } |
1155 | sess.TLS.RootCAs = cp |
1156 | } |
1157 | + sess.doneCh = make(chan uint32, 1) |
1158 | + sess.stopCh = make(chan struct{}) |
1159 | + sess.cmdCh = make(chan sessCmd) |
1160 | + sess.errCh = make(chan error, 1) |
1161 | + |
1162 | + // to be overridden by tests |
1163 | + sess.connHandler = sess.handleConn |
1164 | + sess.errHandler = sess.handleErr |
1165 | + |
1166 | return sess, nil |
1167 | } |
1168 | |
1169 | -func (sess *ClientSession) ShouldDelay() bool { |
1170 | +func (sess *clientSession) ShouldDelay() bool { |
1171 | return atomic.LoadUint32(sess.shouldDelayP) != 0 |
1172 | } |
1173 | |
1174 | -func (sess *ClientSession) setShouldDelay() { |
1175 | +func (sess *clientSession) setShouldDelay() { |
1176 | atomic.StoreUint32(sess.shouldDelayP, uint32(1)) |
1177 | } |
1178 | |
1179 | -func (sess *ClientSession) clearShouldDelay() { |
1180 | +func (sess *clientSession) clearShouldDelay() { |
1181 | atomic.StoreUint32(sess.shouldDelayP, uint32(0)) |
1182 | } |
1183 | |
1184 | -func (sess *ClientSession) State() ClientSessionState { |
1185 | - return ClientSessionState(atomic.LoadUint32(sess.stateP)) |
1186 | -} |
1187 | - |
1188 | -func (sess *ClientSession) setState(state ClientSessionState) { |
1189 | - sess.Log.Debugf("session.setState: %s -> %s", ClientSessionState(atomic.LoadUint32(sess.stateP)), state) |
1190 | - atomic.StoreUint32(sess.stateP, uint32(state)) |
1191 | -} |
1192 | - |
1193 | -func (sess *ClientSession) setConnection(conn net.Conn) { |
1194 | +func (sess *clientSession) State() ClientSessionState { |
1195 | + sess.stateLock.RLock() |
1196 | + defer sess.stateLock.RUnlock() |
1197 | + return sess.state |
1198 | +} |
1199 | + |
1200 | +func (sess *clientSession) setState(state ClientSessionState) { |
1201 | + sess.stateLock.Lock() |
1202 | + defer sess.stateLock.Unlock() |
1203 | + sess.Log.Debugf("session.setState: %s -> %s", sess.state, state) |
1204 | + sess.state = state |
1205 | +} |
1206 | + |
1207 | +func (sess *clientSession) setConnection(conn net.Conn) { |
1208 | sess.connLock.Lock() |
1209 | defer sess.connLock.Unlock() |
1210 | sess.Connection = conn |
1211 | } |
1212 | |
1213 | -func (sess *ClientSession) getConnection() net.Conn { |
1214 | +func (sess *clientSession) getConnection() net.Conn { |
1215 | sess.connLock.RLock() |
1216 | defer sess.connLock.RUnlock() |
1217 | return sess.Connection |
1218 | } |
1219 | |
1220 | -func (sess *ClientSession) setCookie(cookie string) { |
1221 | +func (sess *clientSession) setCookie(cookie string) { |
1222 | sess.connLock.Lock() |
1223 | defer sess.connLock.Unlock() |
1224 | sess.cookie = cookie |
1225 | } |
1226 | |
1227 | -func (sess *ClientSession) getCookie() string { |
1228 | +func (sess *clientSession) getCookie() string { |
1229 | sess.connLock.RLock() |
1230 | defer sess.connLock.RUnlock() |
1231 | return sess.cookie |
1232 | } |
1233 | |
1234 | -func (sess *ClientSession) ClearCookie() { |
1235 | - sess.connLock.Lock() |
1236 | - defer sess.connLock.Unlock() |
1237 | - sess.cookie = "" |
1238 | +func (sess *clientSession) ResetCookie() { |
1239 | + sess.cmdCh <- cmdResetCookie |
1240 | +} |
1241 | + |
1242 | +func (sess *clientSession) resetCookie() { |
1243 | + sess.stopRedial() |
1244 | + sess.doClose(true) |
1245 | } |
1246 | |
1247 | // getHosts sets deliveryHosts possibly querying a remote endpoint |
1248 | -func (sess *ClientSession) getHosts() error { |
1249 | +func (sess *clientSession) getHosts() error { |
1250 | if sess.getHost != nil { |
1251 | if sess.deliveryHosts != nil && sess.timeSince(sess.deliveryHostsTimestamp) < sess.HostsCachingExpiryTime { |
1252 | return nil |
1253 | @@ -294,7 +342,7 @@ |
1254 | |
1255 | // addAuthorization gets the authorization blob to send to the server |
1256 | // and adds it to the session. |
1257 | -func (sess *ClientSession) addAuthorization() error { |
1258 | +func (sess *clientSession) addAuthorization() error { |
1259 | if sess.AuthGetter != nil { |
1260 | sess.Log.Debugf("adding authorization") |
1261 | sess.auth = sess.AuthGetter(sess.AuthURL) |
1262 | @@ -302,13 +350,13 @@ |
1263 | return nil |
1264 | } |
1265 | |
1266 | -func (sess *ClientSession) resetHosts() { |
1267 | +func (sess *clientSession) resetHosts() { |
1268 | sess.deliveryHosts = nil |
1269 | } |
1270 | |
1271 | // startConnectionAttempt/nextHostToTry help connect iterating over candidate hosts |
1272 | |
1273 | -func (sess *ClientSession) startConnectionAttempt() { |
1274 | +func (sess *clientSession) startConnectionAttempt() { |
1275 | if sess.timeSince(sess.lastAttemptTimestamp) > sess.ExpectAllRepairedTime { |
1276 | sess.tryHost = 0 |
1277 | } |
1278 | @@ -319,7 +367,7 @@ |
1279 | sess.lastAttemptTimestamp = time.Now() |
1280 | } |
1281 | |
1282 | -func (sess *ClientSession) nextHostToTry() string { |
1283 | +func (sess *clientSession) nextHostToTry() string { |
1284 | if sess.leftToTry == 0 { |
1285 | return "" |
1286 | } |
1287 | @@ -331,7 +379,7 @@ |
1288 | |
1289 | // we reached the Started state, we can retry with the same host if we |
1290 | // have to retry again |
1291 | -func (sess *ClientSession) started() { |
1292 | +func (sess *clientSession) started() { |
1293 | sess.tryHost-- |
1294 | if sess.tryHost == -1 { |
1295 | sess.tryHost = len(sess.deliveryHosts) - 1 |
1296 | @@ -341,7 +389,7 @@ |
1297 | |
1298 | // connect to a server using the configuration in the ClientSession |
1299 | // and set up the connection. |
1300 | -func (sess *ClientSession) connect() error { |
1301 | +func (sess *clientSession) connect() error { |
1302 | sess.setShouldDelay() |
1303 | sess.startConnectionAttempt() |
1304 | var err error |
1305 | @@ -363,49 +411,47 @@ |
1306 | return nil |
1307 | } |
1308 | |
1309 | -func (sess *ClientSession) stopRedial() { |
1310 | - sess.retrierLock.Lock() |
1311 | - defer sess.retrierLock.Unlock() |
1312 | +func (sess *clientSession) stopRedial() { |
1313 | if sess.retrier != nil { |
1314 | sess.retrier.Stop() |
1315 | sess.retrier = nil |
1316 | } |
1317 | } |
1318 | |
1319 | -func (sess *ClientSession) AutoRedial(doneCh chan uint32) { |
1320 | +func (sess *clientSession) autoRedial() { |
1321 | sess.stopRedial() |
1322 | if time.Since(sess.lastAutoRedial) < 2*time.Second { |
1323 | sess.setShouldDelay() |
1324 | } |
1325 | - time.Sleep(sess.redialDelay(sess)) |
1326 | - sess.retrierLock.Lock() |
1327 | - defer sess.retrierLock.Unlock() |
1328 | + // xxx should we really wait on the caller goroutine? |
1329 | + delay := sess.redialDelay(sess) |
1330 | + sess.Log.Debugf("session redial delay: %v, wait", delay) |
1331 | + time.Sleep(delay) |
1332 | + sess.Log.Debugf("session redial delay: %v, cont", delay) |
1333 | if sess.retrier != nil { |
1334 | panic("session AutoRedial: unexpected non-nil retrier.") |
1335 | } |
1336 | sess.retrier = util.NewAutoRedialer(sess) |
1337 | sess.lastAutoRedial = time.Now() |
1338 | - go func() { |
1339 | - sess.retrierLock.Lock() |
1340 | - retrier := sess.retrier |
1341 | - sess.retrierLock.Unlock() |
1342 | - if retrier == nil { |
1343 | - sess.Log.Debugf("session autoredialer skipping retry: retrier has been set to nil.") |
1344 | - return |
1345 | - } |
1346 | + go func(retrier util.AutoRedialer) { |
1347 | sess.Log.Debugf("session autoredialier launching Redial goroutine") |
1348 | - doneCh <- retrier.Redial() |
1349 | - }() |
1350 | -} |
1351 | - |
1352 | -func (sess *ClientSession) Close() { |
1353 | - sess.stopRedial() |
1354 | - sess.doClose() |
1355 | -} |
1356 | - |
1357 | -func (sess *ClientSession) doClose() { |
1358 | + // if the redialer has been stopped before calling Redial(), it'll return 0. |
1359 | + sess.doneCh <- retrier.Redial() |
1360 | + }(sess.retrier) |
1361 | +} |
1362 | + |
1363 | +func (sess *clientSession) doClose(resetCookie bool) { |
1364 | sess.connLock.Lock() |
1365 | defer sess.connLock.Unlock() |
1366 | + if resetCookie { |
1367 | + sess.cookie = "" |
1368 | + } |
1369 | + sess.closeConnection() |
1370 | + sess.setState(Disconnected) |
1371 | +} |
1372 | + |
1373 | +func (sess *clientSession) closeConnection() { |
1374 | + // *must be called with connLock held* |
1375 | if sess.Connection != nil { |
1376 | sess.Connection.Close() |
1377 | // we ignore Close errors, on purpose (the thinking being that |
1378 | @@ -413,11 +459,10 @@ |
1379 | // you could do to recover at this stage). |
1380 | sess.Connection = nil |
1381 | } |
1382 | - sess.setState(Disconnected) |
1383 | } |
1384 | |
1385 | // handle "ping" messages |
1386 | -func (sess *ClientSession) handlePing() error { |
1387 | +func (sess *clientSession) handlePing() error { |
1388 | err := sess.proto.WriteMessage(protocol.PingPongMsg{Type: "pong"}) |
1389 | if err == nil { |
1390 | sess.Log.Debugf("ping.") |
1391 | @@ -429,7 +474,7 @@ |
1392 | return err |
1393 | } |
1394 | |
1395 | -func (sess *ClientSession) decodeBroadcast(bcast *serverMsg) *BroadcastNotification { |
1396 | +func (sess *clientSession) decodeBroadcast(bcast *serverMsg) *BroadcastNotification { |
1397 | decoded := make([]map[string]interface{}, 0) |
1398 | for _, p := range bcast.Payloads { |
1399 | var v map[string]interface{} |
1400 | @@ -447,7 +492,7 @@ |
1401 | } |
1402 | |
1403 | // handle "broadcast" messages |
1404 | -func (sess *ClientSession) handleBroadcast(bcast *serverMsg) error { |
1405 | +func (sess *clientSession) handleBroadcast(bcast *serverMsg) error { |
1406 | err := sess.SeenState.SetLevel(bcast.ChanId, bcast.TopLevel) |
1407 | if err != nil { |
1408 | sess.setState(Error) |
1409 | @@ -478,7 +523,7 @@ |
1410 | } |
1411 | |
1412 | // handle "notifications" messages |
1413 | -func (sess *ClientSession) handleNotifications(ucast *serverMsg) error { |
1414 | +func (sess *clientSession) handleNotifications(ucast *serverMsg) error { |
1415 | notifs, err := sess.SeenState.FilterBySeen(ucast.Notifications) |
1416 | if err != nil { |
1417 | sess.setState(Error) |
1418 | @@ -512,7 +557,7 @@ |
1419 | } |
1420 | |
1421 | // handle "connbroken" messages |
1422 | -func (sess *ClientSession) handleConnBroken(connBroken *serverMsg) error { |
1423 | +func (sess *clientSession) handleConnBroken(connBroken *serverMsg) error { |
1424 | sess.setState(Error) |
1425 | reason := connBroken.Reason |
1426 | err := fmt.Errorf("server broke connection: %s", reason) |
1427 | @@ -525,7 +570,7 @@ |
1428 | } |
1429 | |
1430 | // handle "setparams" messages |
1431 | -func (sess *ClientSession) handleSetParams(setParams *serverMsg) error { |
1432 | +func (sess *clientSession) handleSetParams(setParams *serverMsg) error { |
1433 | if setParams.SetCookie != "" { |
1434 | sess.setCookie(setParams.SetCookie) |
1435 | } |
1436 | @@ -533,7 +578,7 @@ |
1437 | } |
1438 | |
1439 | // loop runs the session with the server, emits a stream of events. |
1440 | -func (sess *ClientSession) loop() error { |
1441 | +func (sess *clientSession) loop() error { |
1442 | var err error |
1443 | var recv serverMsg |
1444 | sess.setState(Running) |
1445 | @@ -571,7 +616,7 @@ |
1446 | } |
1447 | |
1448 | // Call this when you've connected and want to start looping. |
1449 | -func (sess *ClientSession) start() error { |
1450 | +func (sess *clientSession) start() error { |
1451 | conn := sess.getConnection() |
1452 | err := conn.SetDeadline(time.Now().Add(sess.ExchangeTimeout)) |
1453 | if err != nil { |
1454 | @@ -634,8 +679,8 @@ |
1455 | |
1456 | // run calls connect, and if it works it calls start, and if it works |
1457 | // it runs loop in a goroutine, and ships its return value over ErrCh. |
1458 | -func (sess *ClientSession) run(closer func(), authChecker, hostGetter, connecter, starter, looper func() error) error { |
1459 | - closer() |
1460 | +func (sess *clientSession) run(closer func(bool), authChecker, hostGetter, connecter, starter, looper func() error) error { |
1461 | + closer(false) |
1462 | if err := authChecker(); err != nil { |
1463 | return err |
1464 | } |
1465 | @@ -646,17 +691,14 @@ |
1466 | if err == nil { |
1467 | err = starter() |
1468 | if err == nil { |
1469 | - sess.ErrCh = make(chan error, 1) |
1470 | - sess.BroadcastCh = make(chan *BroadcastNotification) |
1471 | - sess.NotificationsCh = make(chan AddressedNotification) |
1472 | - go func() { sess.ErrCh <- looper() }() |
1473 | + go func() { sess.errCh <- looper() }() |
1474 | } |
1475 | } |
1476 | return err |
1477 | } |
1478 | |
1479 | // This Jitter returns a random time.Duration somewhere in [-spread, spread]. |
1480 | -func (sess *ClientSession) Jitter(spread time.Duration) time.Duration { |
1481 | +func (sess *clientSession) Jitter(spread time.Duration) time.Duration { |
1482 | if spread < 0 { |
1483 | panic("spread must be non-negative") |
1484 | } |
1485 | @@ -666,7 +708,7 @@ |
1486 | |
1487 | // Dial takes the session from newly created (or newly disconnected) |
1488 | // to running the main loop. |
1489 | -func (sess *ClientSession) Dial() error { |
1490 | +func (sess *clientSession) Dial() error { |
1491 | if sess.Protocolator == nil { |
1492 | // a missing protocolator means you've willfully overridden |
1493 | // it; returning an error here would prompt AutoRedial to just |
1494 | @@ -676,6 +718,90 @@ |
1495 | return sess.run(sess.doClose, sess.addAuthorization, sess.getHosts, sess.connect, sess.start, sess.loop) |
1496 | } |
1497 | |
1498 | +func (sess *clientSession) shutdown() { |
1499 | + sess.Log.Infof("session shutting down.") |
1500 | + sess.connLock.Lock() |
1501 | + defer sess.connLock.Unlock() |
1502 | + sess.stopRedial() |
1503 | + sess.closeConnection() |
1504 | +} |
1505 | + |
1506 | +func (sess *clientSession) doKeepConnection() { |
1507 | + for { |
1508 | + select { |
1509 | + case cmd := <-sess.cmdCh: |
1510 | + switch cmd { |
1511 | + case cmdConnect: |
1512 | + sess.connHandler(true) |
1513 | + case cmdDisconnect: |
1514 | + sess.connHandler(false) |
1515 | + case cmdResetCookie: |
1516 | + sess.resetCookie() |
1517 | + } |
1518 | + case <-sess.stopCh: |
1519 | + sess.shutdown() |
1520 | + return |
1521 | + case n := <-sess.doneCh: |
1522 | + // if n == 0, the redialer aborted. If you do |
1523 | + // anything other than log it, keep that in mind. |
1524 | + sess.Log.Debugf("connected after %d attempts.", n) |
1525 | + case err := <-sess.errCh: |
1526 | + sess.errHandler(err) |
1527 | + } |
1528 | + } |
1529 | +} |
1530 | + |
1531 | +func (sess *clientSession) handleConn(hasConn bool) { |
1532 | + sess.lastConn = hasConn |
1533 | + |
1534 | + // Note this does not depend on the current state! That's because Dial |
1535 | + // starts with doClose, which gets you to Disconnected even if you're |
1536 | + // connected, and you can call Close when Disconnected without it |
1537 | + // losing its stuff. |
1538 | + if hasConn { |
1539 | + sess.autoRedial() |
1540 | + } else { |
1541 | + sess.stopRedial() |
1542 | + sess.doClose(false) |
1543 | + } |
1544 | +} |
1545 | + |
1546 | +func (sess *clientSession) handleErr(err error) { |
1547 | + sess.Log.Errorf("session error'ed out with %v", err) |
1548 | + // State() == Error mostly defends interrupting an ongoing |
1549 | + // autoRedial if we went quickly already through hasConn = |
1550 | + // false => hasConn = true |
1551 | + if sess.State() == Error && sess.lastConn { |
1552 | + sess.autoRedial() |
1553 | + } |
1554 | +} |
1555 | + |
1556 | +func (sess *clientSession) KeepConnection() error { |
1557 | + sess.stateLock.Lock() |
1558 | + defer sess.stateLock.Unlock() |
1559 | + if sess.state != Pristine { |
1560 | + return errors.New("don't call KeepConnection() on a non-pristine session.") |
1561 | + } |
1562 | + sess.state = Disconnected |
1563 | + |
1564 | + go sess.doKeepConnection() |
1565 | + |
1566 | + return nil |
1567 | +} |
1568 | + |
1569 | +func (sess *clientSession) StopKeepConnection() { |
1570 | + sess.setState(Shutdown) |
1571 | + close(sess.stopCh) |
1572 | +} |
1573 | + |
1574 | +func (sess *clientSession) HasConnectivity(hasConn bool) { |
1575 | + if hasConn { |
1576 | + sess.cmdCh <- cmdConnect |
1577 | + } else { |
1578 | + sess.cmdCh <- cmdDisconnect |
1579 | + } |
1580 | +} |
1581 | + |
1582 | func init() { |
1583 | rand.Seed(time.Now().Unix()) // good enough for us (we're not using it for crypto) |
1584 | } |
1585 | |
1586 | === modified file 'client/session/session_test.go' |
1587 | --- client/session/session_test.go 2015-02-02 16:49:46 +0000 |
1588 | +++ client/session/session_test.go 2015-04-02 09:52:21 +0000 |
1589 | @@ -190,6 +190,24 @@ |
1590 | cs.lvls = func() (seenstate.SeenState, error) { return seenstate.NewSqliteSeenState(":memory:") } |
1591 | } |
1592 | |
1593 | +func (cs *clientSessionSuite) TestStateString(c *C) { |
1594 | + for _, i := range []struct { |
1595 | + v ClientSessionState |
1596 | + s string |
1597 | + }{ |
1598 | + {Error, "Error"}, |
1599 | + {Pristine, "Pristine"}, |
1600 | + {Disconnected, "Disconnected"}, |
1601 | + {Connected, "Connected"}, |
1602 | + {Started, "Started"}, |
1603 | + {Running, "Running"}, |
1604 | + {Shutdown, "Shutdown"}, |
1605 | + {Unknown, fmt.Sprintf("??? (%d)", Unknown)}, |
1606 | + } { |
1607 | + c.Check(i.v.String(), Equals, i.s) |
1608 | + } |
1609 | +} |
1610 | + |
1611 | /**************************************************************** |
1612 | parseServerAddrSpec() tests |
1613 | ****************************************************************/ |
1614 | @@ -212,10 +230,15 @@ |
1615 | NewSession() tests |
1616 | ****************************************************************/ |
1617 | |
1618 | -var dummyConf = ClientSessionConfig{} |
1619 | +func dummyConf() ClientSessionConfig { |
1620 | + return ClientSessionConfig{ |
1621 | + BroadcastCh: make(chan *BroadcastNotification, 5), |
1622 | + NotificationsCh: make(chan AddressedNotification, 5), |
1623 | + } |
1624 | +} |
1625 | |
1626 | func (cs *clientSessionSuite) TestNewSessionPlainWorks(c *C) { |
1627 | - sess, err := NewSession("foo:443", dummyConf, "", cs.lvls, cs.log) |
1628 | + sess, err := NewSession("foo:443", dummyConf(), "", cs.lvls, cs.log) |
1629 | c.Check(sess, NotNil) |
1630 | c.Check(err, IsNil) |
1631 | c.Check(sess.fallbackHosts, DeepEquals, []string{"foo:443"}) |
1632 | @@ -225,11 +248,13 @@ |
1633 | c.Check(sess.redialDelays, DeepEquals, util.Timeouts()) |
1634 | // but no root CAs set |
1635 | c.Check(sess.TLS.RootCAs, IsNil) |
1636 | - c.Check(sess.State(), Equals, Disconnected) |
1637 | + c.Check(sess.State(), Equals, Pristine) |
1638 | + c.Check(sess.stopCh, NotNil) |
1639 | + c.Check(sess.cmdCh, NotNil) |
1640 | } |
1641 | |
1642 | func (cs *clientSessionSuite) TestNewSessionHostEndpointWorks(c *C) { |
1643 | - sess, err := NewSession("http://foo/hosts", dummyConf, "wah", cs.lvls, cs.log) |
1644 | + sess, err := NewSession("http://foo/hosts", dummyConf(), "wah", cs.lvls, cs.log) |
1645 | c.Assert(err, IsNil) |
1646 | c.Check(sess.getHost, NotNil) |
1647 | } |
1648 | @@ -255,7 +280,7 @@ |
1649 | |
1650 | func (cs *clientSessionSuite) TestNewSessionBadSeenStateFails(c *C) { |
1651 | ferr := func() (seenstate.SeenState, error) { return nil, errors.New("Busted.") } |
1652 | - sess, err := NewSession("", dummyConf, "wah", ferr, cs.log) |
1653 | + sess, err := NewSession("", dummyConf(), "wah", ferr, cs.log) |
1654 | c.Check(sess, IsNil) |
1655 | c.Assert(err, NotNil) |
1656 | } |
1657 | @@ -266,7 +291,7 @@ |
1658 | |
1659 | func (cs *clientSessionSuite) TestGetHostsFallback(c *C) { |
1660 | fallback := []string{"foo:443", "bar:443"} |
1661 | - sess := &ClientSession{fallbackHosts: fallback} |
1662 | + sess := &clientSession{fallbackHosts: fallback} |
1663 | err := sess.getHosts() |
1664 | c.Assert(err, IsNil) |
1665 | c.Check(sess.deliveryHosts, DeepEquals, fallback) |
1666 | @@ -284,14 +309,14 @@ |
1667 | |
1668 | func (cs *clientSessionSuite) TestGetHostsRemote(c *C) { |
1669 | hostGetter := &testHostGetter{"example.com", []string{"foo:443", "bar:443"}, nil} |
1670 | - sess := &ClientSession{getHost: hostGetter, timeSince: time.Since} |
1671 | + sess := &clientSession{getHost: hostGetter, timeSince: time.Since} |
1672 | err := sess.getHosts() |
1673 | c.Assert(err, IsNil) |
1674 | c.Check(sess.deliveryHosts, DeepEquals, []string{"foo:443", "bar:443"}) |
1675 | } |
1676 | |
1677 | func (cs *clientSessionSuite) TestGetHostsRemoteError(c *C) { |
1678 | - sess, err := NewSession("", dummyConf, "", cs.lvls, cs.log) |
1679 | + sess, err := NewSession("", dummyConf(), "", cs.lvls, cs.log) |
1680 | c.Assert(err, IsNil) |
1681 | hostsErr := errors.New("failed") |
1682 | hostGetter := &testHostGetter{"", nil, hostsErr} |
1683 | @@ -304,7 +329,7 @@ |
1684 | |
1685 | func (cs *clientSessionSuite) TestGetHostsRemoteCaching(c *C) { |
1686 | hostGetter := &testHostGetter{"example.com", []string{"foo:443", "bar:443"}, nil} |
1687 | - sess := &ClientSession{ |
1688 | + sess := &clientSession{ |
1689 | getHost: hostGetter, |
1690 | ClientSessionConfig: ClientSessionConfig{ |
1691 | HostsCachingExpiryTime: 2 * time.Hour, |
1692 | @@ -329,7 +354,7 @@ |
1693 | |
1694 | func (cs *clientSessionSuite) TestGetHostsRemoteCachingReset(c *C) { |
1695 | hostGetter := &testHostGetter{"example.com", []string{"foo:443", "bar:443"}, nil} |
1696 | - sess := &ClientSession{ |
1697 | + sess := &clientSession{ |
1698 | getHost: hostGetter, |
1699 | ClientSessionConfig: ClientSessionConfig{ |
1700 | HostsCachingExpiryTime: 2 * time.Hour, |
1701 | @@ -356,7 +381,7 @@ |
1702 | |
1703 | func (cs *clientSessionSuite) TestAddAuthorizationAddsAuthorization(c *C) { |
1704 | url := "xyzzy://" |
1705 | - sess := &ClientSession{Log: cs.log} |
1706 | + sess := &clientSession{Log: cs.log} |
1707 | sess.AuthGetter = func(url string) string { return url + " auth'ed" } |
1708 | sess.AuthURL = url |
1709 | c.Assert(sess.auth, Equals, "") |
1710 | @@ -366,7 +391,7 @@ |
1711 | } |
1712 | |
1713 | func (cs *clientSessionSuite) TestAddAuthorizationSkipsIfUnset(c *C) { |
1714 | - sess := &ClientSession{Log: cs.log} |
1715 | + sess := &clientSession{Log: cs.log} |
1716 | sess.AuthGetter = nil |
1717 | c.Assert(sess.auth, Equals, "") |
1718 | err := sess.addAuthorization() |
1719 | @@ -380,7 +405,7 @@ |
1720 | |
1721 | func (cs *clientSessionSuite) TestStartConnectionAttempt(c *C) { |
1722 | since := time.Since(time.Time{}) |
1723 | - sess := &ClientSession{ |
1724 | + sess := &clientSession{ |
1725 | ClientSessionConfig: ClientSessionConfig{ |
1726 | ExpectAllRepairedTime: 10 * time.Second, |
1727 | }, |
1728 | @@ -404,7 +429,7 @@ |
1729 | |
1730 | func (cs *clientSessionSuite) TestStartConnectionAttemptNoHostsPanic(c *C) { |
1731 | since := time.Since(time.Time{}) |
1732 | - sess := &ClientSession{ |
1733 | + sess := &clientSession{ |
1734 | ClientSessionConfig: ClientSessionConfig{ |
1735 | ExpectAllRepairedTime: 10 * time.Second, |
1736 | }, |
1737 | @@ -416,7 +441,7 @@ |
1738 | } |
1739 | |
1740 | func (cs *clientSessionSuite) TestNextHostToTry(c *C) { |
1741 | - sess := &ClientSession{ |
1742 | + sess := &clientSession{ |
1743 | deliveryHosts: []string{"foo:443", "bar:443", "baz:443"}, |
1744 | tryHost: 0, |
1745 | leftToTry: 3, |
1746 | @@ -439,7 +464,7 @@ |
1747 | } |
1748 | |
1749 | func (cs *clientSessionSuite) TestStarted(c *C) { |
1750 | - sess, err := NewSession("", dummyConf, "", cs.lvls, cs.log) |
1751 | + sess, err := NewSession("", dummyConf(), "", cs.lvls, cs.log) |
1752 | c.Assert(err, IsNil) |
1753 | |
1754 | sess.deliveryHosts = []string{"foo:443", "bar:443", "baz:443"} |
1755 | @@ -458,7 +483,7 @@ |
1756 | ****************************************************************/ |
1757 | |
1758 | func (cs *clientSessionSuite) TestConnectFailsWithNoAddress(c *C) { |
1759 | - sess, err := NewSession("", dummyConf, "wah", cs.lvls, cs.log) |
1760 | + sess, err := NewSession("", dummyConf(), "wah", cs.lvls, cs.log) |
1761 | c.Assert(err, IsNil) |
1762 | sess.deliveryHosts = []string{"nowhere"} |
1763 | sess.clearShouldDelay() |
1764 | @@ -472,7 +497,7 @@ |
1765 | srv, err := net.Listen("tcp", "localhost:0") |
1766 | c.Assert(err, IsNil) |
1767 | defer srv.Close() |
1768 | - sess, err := NewSession("", dummyConf, "wah", cs.lvls, cs.log) |
1769 | + sess, err := NewSession("", dummyConf(), "wah", cs.lvls, cs.log) |
1770 | c.Assert(err, IsNil) |
1771 | sess.deliveryHosts = []string{srv.Addr().String()} |
1772 | sess.clearShouldDelay() |
1773 | @@ -487,7 +512,7 @@ |
1774 | srv, err := net.Listen("tcp", "localhost:0") |
1775 | c.Assert(err, IsNil) |
1776 | defer srv.Close() |
1777 | - sess, err := NewSession("", dummyConf, "wah", cs.lvls, cs.log) |
1778 | + sess, err := NewSession("", dummyConf(), "wah", cs.lvls, cs.log) |
1779 | c.Assert(err, IsNil) |
1780 | sess.deliveryHosts = []string{"nowhere", srv.Addr().String()} |
1781 | sess.clearShouldDelay() |
1782 | @@ -502,7 +527,7 @@ |
1783 | func (cs *clientSessionSuite) TestConnectConnectFail(c *C) { |
1784 | srv, err := net.Listen("tcp", "localhost:0") |
1785 | c.Assert(err, IsNil) |
1786 | - sess, err := NewSession(srv.Addr().String(), dummyConf, "wah", cs.lvls, cs.log) |
1787 | + sess, err := NewSession(srv.Addr().String(), dummyConf(), "wah", cs.lvls, cs.log) |
1788 | srv.Close() |
1789 | c.Assert(err, IsNil) |
1790 | sess.deliveryHosts = []string{srv.Addr().String()} |
1791 | @@ -513,101 +538,58 @@ |
1792 | c.Check(sess.State(), Equals, Error) |
1793 | } |
1794 | |
1795 | -/**************************************************************** |
1796 | - Close() tests |
1797 | -****************************************************************/ |
1798 | - |
1799 | -func (cs *clientSessionSuite) TestClose(c *C) { |
1800 | - sess, err := NewSession("", dummyConf, "wah", cs.lvls, cs.log) |
1801 | - c.Assert(err, IsNil) |
1802 | - sess.Connection = &testConn{Name: "TestClose"} |
1803 | - sess.Close() |
1804 | - c.Check(sess.Connection, IsNil) |
1805 | - c.Check(sess.State(), Equals, Disconnected) |
1806 | -} |
1807 | - |
1808 | -func (cs *clientSessionSuite) TestCloseTwice(c *C) { |
1809 | - sess, err := NewSession("", dummyConf, "wah", cs.lvls, cs.log) |
1810 | - c.Assert(err, IsNil) |
1811 | - sess.Connection = &testConn{Name: "TestCloseTwice"} |
1812 | - sess.Close() |
1813 | - c.Check(sess.Connection, IsNil) |
1814 | - sess.Close() |
1815 | - c.Check(sess.Connection, IsNil) |
1816 | - c.Check(sess.State(), Equals, Disconnected) |
1817 | -} |
1818 | - |
1819 | -func (cs *clientSessionSuite) TestCloseFails(c *C) { |
1820 | - sess, err := NewSession("", dummyConf, "wah", cs.lvls, cs.log) |
1821 | - c.Assert(err, IsNil) |
1822 | - sess.Connection = &testConn{Name: "TestCloseFails", CloseCondition: condition.Work(false)} |
1823 | - sess.Close() |
1824 | - c.Check(sess.Connection, IsNil) // nothing you can do to clean up anyway |
1825 | - c.Check(sess.State(), Equals, Disconnected) |
1826 | -} |
1827 | - |
1828 | -type derp struct{ stopped bool } |
1829 | - |
1830 | -func (*derp) Redial() uint32 { return 0 } |
1831 | -func (d *derp) Stop() { d.stopped = true } |
1832 | - |
1833 | -func (cs *clientSessionSuite) TestCloseStopsRetrier(c *C) { |
1834 | - sess, err := NewSession("", dummyConf, "wah", cs.lvls, cs.log) |
1835 | - c.Assert(err, IsNil) |
1836 | - ar := new(derp) |
1837 | - sess.retrier = ar |
1838 | - c.Check(ar.stopped, Equals, false) |
1839 | - sess.Close() |
1840 | - c.Check(ar.stopped, Equals, true) |
1841 | - sess.Close() // double close check |
1842 | - c.Check(ar.stopped, Equals, true) |
1843 | -} |
1844 | - |
1845 | -/**************************************************************** |
1846 | - AutoRedial() tests |
1847 | -****************************************************************/ |
1848 | +type dumbRetrier struct{ stopped bool } |
1849 | + |
1850 | +func (*dumbRetrier) Redial() uint32 { return 0 } |
1851 | +func (d *dumbRetrier) Stop() { d.stopped = true } |
1852 | + |
1853 | +// /**************************************************************** |
1854 | +// AutoRedial() tests |
1855 | +// ****************************************************************/ |
1856 | |
1857 | func (cs *clientSessionSuite) TestAutoRedialWorks(c *C) { |
1858 | // checks that AutoRedial sets up a retrier and tries redialing it |
1859 | - sess, err := NewSession("", dummyConf, "wah", cs.lvls, cs.log) |
1860 | + sess, err := NewSession("", dummyConf(), "wah", cs.lvls, cs.log) |
1861 | c.Assert(err, IsNil) |
1862 | - ar := new(derp) |
1863 | + ar := new(dumbRetrier) |
1864 | sess.retrier = ar |
1865 | c.Check(ar.stopped, Equals, false) |
1866 | - sess.AutoRedial(nil) |
1867 | + sess.autoRedial() |
1868 | + defer sess.stopRedial() |
1869 | c.Check(ar.stopped, Equals, true) |
1870 | } |
1871 | |
1872 | func (cs *clientSessionSuite) TestAutoRedialStopsRetrier(c *C) { |
1873 | // checks that AutoRedial stops the previous retrier |
1874 | - sess, err := NewSession("", dummyConf, "wah", cs.lvls, cs.log) |
1875 | + sess, err := NewSession("", dummyConf(), "wah", cs.lvls, cs.log) |
1876 | c.Assert(err, IsNil) |
1877 | - ch := make(chan uint32) |
1878 | + sess.doneCh = make(chan uint32) |
1879 | c.Check(sess.retrier, IsNil) |
1880 | - sess.AutoRedial(ch) |
1881 | + sess.autoRedial() |
1882 | c.Assert(sess.retrier, NotNil) |
1883 | sess.retrier.Stop() |
1884 | - c.Check(<-ch, Not(Equals), 0) |
1885 | + c.Check(<-sess.doneCh, Not(Equals), 0) |
1886 | } |
1887 | |
1888 | func (cs *clientSessionSuite) TestAutoRedialCallsRedialDelay(c *C) { |
1889 | - sess, err := NewSession("", dummyConf, "wah", cs.lvls, cs.log) |
1890 | + // NOTE there are tests that use calling redialDelay as an indication of calling autoRedial! |
1891 | + sess, err := NewSession("", dummyConf(), "wah", cs.lvls, cs.log) |
1892 | c.Assert(err, IsNil) |
1893 | flag := false |
1894 | - sess.redialDelay = func(sess *ClientSession) time.Duration { flag = true; return 0 } |
1895 | - sess.AutoRedial(nil) |
1896 | + sess.redialDelay = func(sess *clientSession) time.Duration { flag = true; return 0 } |
1897 | + sess.autoRedial() |
1898 | c.Check(flag, Equals, true) |
1899 | } |
1900 | |
1901 | func (cs *clientSessionSuite) TestAutoRedialSetsRedialDelayIfTooQuick(c *C) { |
1902 | - sess, err := NewSession("", dummyConf, "wah", cs.lvls, cs.log) |
1903 | + sess, err := NewSession("", dummyConf(), "wah", cs.lvls, cs.log) |
1904 | c.Assert(err, IsNil) |
1905 | - sess.redialDelay = func(sess *ClientSession) time.Duration { return 0 } |
1906 | - sess.AutoRedial(nil) |
1907 | + sess.redialDelay = func(sess *clientSession) time.Duration { return 0 } |
1908 | + sess.autoRedial() |
1909 | c.Check(sess.ShouldDelay(), Equals, false) |
1910 | sess.stopRedial() |
1911 | sess.clearShouldDelay() |
1912 | - sess.AutoRedial(nil) |
1913 | + sess.autoRedial() |
1914 | c.Check(sess.ShouldDelay(), Equals, true) |
1915 | } |
1916 | |
1917 | @@ -616,29 +598,23 @@ |
1918 | ****************************************************************/ |
1919 | |
1920 | type msgSuite struct { |
1921 | - sess *ClientSession |
1922 | + sess *clientSession |
1923 | upCh chan interface{} |
1924 | downCh chan interface{} |
1925 | - errCh chan error |
1926 | } |
1927 | |
1928 | var _ = Suite(&msgSuite{}) |
1929 | |
1930 | func (s *msgSuite) SetUpTest(c *C) { |
1931 | var err error |
1932 | - conf := ClientSessionConfig{ |
1933 | - ExchangeTimeout: time.Millisecond, |
1934 | - } |
1935 | + conf := dummyConf() |
1936 | + conf.ExchangeTimeout = time.Millisecond |
1937 | s.sess, err = NewSession("", conf, "wah", seenstate.NewSeenState, helpers.NewTestLogger(c, "debug")) |
1938 | c.Assert(err, IsNil) |
1939 | s.sess.Connection = &testConn{Name: "TestHandle*"} |
1940 | - s.errCh = make(chan error, 1) |
1941 | s.upCh = make(chan interface{}, 5) |
1942 | s.downCh = make(chan interface{}, 5) |
1943 | s.sess.proto = &testProtocol{up: s.upCh, down: s.downCh} |
1944 | - // make the message channel buffered |
1945 | - s.sess.BroadcastCh = make(chan *BroadcastNotification, 5) |
1946 | - s.sess.NotificationsCh = make(chan AddressedNotification, 5) |
1947 | } |
1948 | |
1949 | func (s *msgSuite) TestHandlePingWorks(c *C) { |
1950 | @@ -694,10 +670,10 @@ |
1951 | json.RawMessage(`{"img1/m1":[102,"tubular"]}`), |
1952 | }, |
1953 | } |
1954 | - go func() { s.errCh <- s.sess.handleBroadcast(msg) }() |
1955 | + go func() { s.sess.errCh <- s.sess.handleBroadcast(msg) }() |
1956 | c.Check(takeNext(s.downCh), Equals, protocol.AckMsg{"ack"}) |
1957 | s.upCh <- nil // ack ok |
1958 | - c.Check(<-s.errCh, Equals, nil) |
1959 | + c.Check(<-s.sess.errCh, Equals, nil) |
1960 | c.Assert(len(s.sess.BroadcastCh), Equals, 1) |
1961 | c.Check(<-s.sess.BroadcastCh, DeepEquals, &BroadcastNotification{ |
1962 | TopLevel: 2, |
1963 | @@ -726,11 +702,11 @@ |
1964 | TopLevel: 2, |
1965 | Payloads: []json.RawMessage{json.RawMessage(`{"b":1}`)}, |
1966 | } |
1967 | - go func() { s.errCh <- s.sess.handleBroadcast(msg) }() |
1968 | + go func() { s.sess.errCh <- s.sess.handleBroadcast(msg) }() |
1969 | c.Check(takeNext(s.downCh), Equals, protocol.AckMsg{"ack"}) |
1970 | failure := errors.New("ACK ACK ACK") |
1971 | s.upCh <- failure |
1972 | - c.Assert(<-s.errCh, Equals, failure) |
1973 | + c.Assert(<-s.sess.errCh, Equals, failure) |
1974 | c.Check(s.sess.State(), Equals, Error) |
1975 | } |
1976 | |
1977 | @@ -744,10 +720,10 @@ |
1978 | TopLevel: 2, |
1979 | Payloads: []json.RawMessage{json.RawMessage(`{"b":1}`)}, |
1980 | } |
1981 | - go func() { s.errCh <- s.sess.handleBroadcast(msg) }() |
1982 | + go func() { s.sess.errCh <- s.sess.handleBroadcast(msg) }() |
1983 | c.Check(takeNext(s.downCh), Equals, protocol.AckMsg{"ack"}) |
1984 | s.upCh <- nil // ack ok |
1985 | - c.Check(<-s.errCh, IsNil) |
1986 | + c.Check(<-s.sess.errCh, IsNil) |
1987 | c.Check(len(s.sess.BroadcastCh), Equals, 0) |
1988 | } |
1989 | |
1990 | @@ -762,10 +738,10 @@ |
1991 | TopLevel: 2, |
1992 | Payloads: []json.RawMessage{json.RawMessage(`{"b":1}`)}, |
1993 | } |
1994 | - go func() { s.errCh <- s.sess.handleBroadcast(msg) }() |
1995 | + go func() { s.sess.errCh <- s.sess.handleBroadcast(msg) }() |
1996 | s.upCh <- nil // ack ok |
1997 | // start returns with error |
1998 | - c.Check(<-s.errCh, Not(Equals), nil) |
1999 | + c.Check(<-s.sess.errCh, Not(Equals), nil) |
2000 | c.Check(s.sess.State(), Equals, Error) |
2001 | // no message sent out |
2002 | c.Check(len(s.sess.BroadcastCh), Equals, 0) |
2003 | @@ -778,10 +754,10 @@ |
2004 | s.sess.setShouldDelay() |
2005 | |
2006 | msg := &serverMsg{Type: "broadcast"} |
2007 | - go func() { s.errCh <- s.sess.handleBroadcast(msg) }() |
2008 | + go func() { s.sess.errCh <- s.sess.handleBroadcast(msg) }() |
2009 | c.Check(takeNext(s.downCh), Equals, protocol.AckMsg{"ack"}) |
2010 | s.upCh <- nil // ack ok |
2011 | - c.Check(<-s.errCh, IsNil) |
2012 | + c.Check(<-s.sess.errCh, IsNil) |
2013 | |
2014 | c.Check(s.sess.ShouldDelay(), Equals, false) |
2015 | } |
2016 | @@ -790,10 +766,10 @@ |
2017 | s.sess.setShouldDelay() |
2018 | |
2019 | msg := &serverMsg{Type: "broadcast"} |
2020 | - go func() { s.errCh <- s.sess.handleBroadcast(msg) }() |
2021 | + go func() { s.sess.errCh <- s.sess.handleBroadcast(msg) }() |
2022 | c.Check(takeNext(s.downCh), Equals, protocol.AckMsg{"ack"}) |
2023 | s.upCh <- errors.New("bcast") |
2024 | - c.Check(<-s.errCh, NotNil) |
2025 | + c.Check(<-s.sess.errCh, NotNil) |
2026 | |
2027 | c.Check(s.sess.ShouldDelay(), Equals, true) |
2028 | } |
2029 | @@ -843,10 +819,10 @@ |
2030 | msg.NotificationsMsg = protocol.NotificationsMsg{ |
2031 | Notifications: []protocol.Notification{n1, n2}, |
2032 | } |
2033 | - go func() { s.errCh <- s.sess.handleNotifications(msg) }() |
2034 | + go func() { s.sess.errCh <- s.sess.handleNotifications(msg) }() |
2035 | c.Check(takeNext(s.downCh), Equals, protocol.AckMsg{"ack"}) |
2036 | s.upCh <- nil // ack ok |
2037 | - c.Check(<-s.errCh, Equals, nil) |
2038 | + c.Check(<-s.sess.errCh, Equals, nil) |
2039 | c.Check(s.sess.ShouldDelay(), Equals, false) |
2040 | c.Assert(s.sess.NotificationsCh, HasLen, 2) |
2041 | app1, err := click.ParseAppId("com.example.app1_app1") |
2042 | @@ -889,10 +865,10 @@ |
2043 | msg.NotificationsMsg = protocol.NotificationsMsg{ |
2044 | Notifications: []protocol.Notification{n1, n2}, |
2045 | } |
2046 | - go func() { s.errCh <- s.sess.handleNotifications(msg) }() |
2047 | + go func() { s.sess.errCh <- s.sess.handleNotifications(msg) }() |
2048 | c.Check(takeNext(s.downCh), Equals, protocol.AckMsg{"ack"}) |
2049 | s.upCh <- nil // ack ok |
2050 | - c.Check(<-s.errCh, Equals, nil) |
2051 | + c.Check(<-s.sess.errCh, Equals, nil) |
2052 | c.Check(s.sess.ShouldDelay(), Equals, false) |
2053 | c.Assert(s.sess.NotificationsCh, HasLen, 1) |
2054 | app2, err := click.ParseAppId("com.example.app2_app2") |
2055 | @@ -924,10 +900,10 @@ |
2056 | msg.NotificationsMsg = protocol.NotificationsMsg{ |
2057 | Notifications: []protocol.Notification{n1, n2}, |
2058 | } |
2059 | - go func() { s.errCh <- s.sess.handleNotifications(msg) }() |
2060 | + go func() { s.sess.errCh <- s.sess.handleNotifications(msg) }() |
2061 | c.Check(takeNext(s.downCh), Equals, protocol.AckMsg{"ack"}) |
2062 | s.upCh <- nil // ack ok |
2063 | - c.Check(<-s.errCh, Equals, nil) |
2064 | + c.Check(<-s.sess.errCh, Equals, nil) |
2065 | c.Assert(s.sess.NotificationsCh, HasLen, 2) |
2066 | app1, err := click.ParseAppId("com.example.app1_app1") |
2067 | c.Assert(err, IsNil) |
2068 | @@ -944,10 +920,10 @@ |
2069 | c.Check(ac.ops, HasLen, 3) |
2070 | |
2071 | // second time they get ignored |
2072 | - go func() { s.errCh <- s.sess.handleNotifications(msg) }() |
2073 | + go func() { s.sess.errCh <- s.sess.handleNotifications(msg) }() |
2074 | c.Check(takeNext(s.downCh), Equals, protocol.AckMsg{"ack"}) |
2075 | s.upCh <- nil // ack ok |
2076 | - c.Check(<-s.errCh, Equals, nil) |
2077 | + c.Check(<-s.sess.errCh, Equals, nil) |
2078 | c.Assert(s.sess.NotificationsCh, HasLen, 0) |
2079 | c.Check(ac.ops, HasLen, 4) |
2080 | } |
2081 | @@ -964,11 +940,11 @@ |
2082 | msg.NotificationsMsg = protocol.NotificationsMsg{ |
2083 | Notifications: []protocol.Notification{n1}, |
2084 | } |
2085 | - go func() { s.errCh <- s.sess.handleNotifications(msg) }() |
2086 | + go func() { s.sess.errCh <- s.sess.handleNotifications(msg) }() |
2087 | c.Check(takeNext(s.downCh), Equals, protocol.AckMsg{"ack"}) |
2088 | failure := errors.New("ACK ACK ACK") |
2089 | s.upCh <- failure |
2090 | - c.Assert(<-s.errCh, Equals, failure) |
2091 | + c.Assert(<-s.sess.errCh, Equals, failure) |
2092 | c.Check(s.sess.State(), Equals, Error) |
2093 | // didn't get to clear |
2094 | c.Check(s.sess.ShouldDelay(), Equals, true) |
2095 | @@ -987,10 +963,10 @@ |
2096 | msg.NotificationsMsg = protocol.NotificationsMsg{ |
2097 | Notifications: []protocol.Notification{n1}, |
2098 | } |
2099 | - go func() { s.errCh <- s.sess.handleNotifications(msg) }() |
2100 | + go func() { s.sess.errCh <- s.sess.handleNotifications(msg) }() |
2101 | s.upCh <- nil // ack ok |
2102 | // start returns with error |
2103 | - c.Check(<-s.errCh, Not(Equals), nil) |
2104 | + c.Check(<-s.sess.errCh, Not(Equals), nil) |
2105 | c.Check(s.sess.State(), Equals, Error) |
2106 | // no message sent out |
2107 | c.Check(len(s.sess.NotificationsCh), Equals, 0) |
2108 | @@ -1011,8 +987,8 @@ |
2109 | msg.ConnBrokenMsg = protocol.ConnBrokenMsg{ |
2110 | Reason: "REASON", |
2111 | } |
2112 | - go func() { s.errCh <- s.sess.handleConnBroken(msg) }() |
2113 | - c.Check(<-s.errCh, ErrorMatches, "server broke connection: REASON") |
2114 | + go func() { s.sess.errCh <- s.sess.handleConnBroken(msg) }() |
2115 | + c.Check(<-s.sess.errCh, ErrorMatches, "server broke connection: REASON") |
2116 | c.Check(s.sess.State(), Equals, Error) |
2117 | } |
2118 | |
2119 | @@ -1023,8 +999,8 @@ |
2120 | Reason: protocol.BrokenHostMismatch, |
2121 | } |
2122 | s.sess.deliveryHosts = []string{"foo:443", "bar:443"} |
2123 | - go func() { s.errCh <- s.sess.handleConnBroken(msg) }() |
2124 | - c.Check(<-s.errCh, ErrorMatches, "server broke connection: host-mismatch") |
2125 | + go func() { s.sess.errCh <- s.sess.handleConnBroken(msg) }() |
2126 | + c.Check(<-s.sess.errCh, ErrorMatches, "server broke connection: host-mismatch") |
2127 | c.Check(s.sess.State(), Equals, Error) |
2128 | // hosts were reset |
2129 | c.Check(s.sess.deliveryHosts, IsNil) |
2130 | @@ -1042,14 +1018,14 @@ |
2131 | (*msgSuite)(s).SetUpTest(c) |
2132 | s.sess.Connection.(*testConn).Name = "TestLoop*" |
2133 | go func() { |
2134 | - s.errCh <- s.sess.loop() |
2135 | + s.sess.errCh <- s.sess.loop() |
2136 | }() |
2137 | } |
2138 | |
2139 | func (s *loopSuite) TestLoopReadError(c *C) { |
2140 | c.Check(s.sess.State(), Equals, Running) |
2141 | s.upCh <- errors.New("Read") |
2142 | - err := <-s.errCh |
2143 | + err := <-s.sess.errCh |
2144 | c.Check(err, ErrorMatches, "Read") |
2145 | c.Check(s.sess.State(), Equals, Error) |
2146 | } |
2147 | @@ -1061,7 +1037,7 @@ |
2148 | c.Check(takeNext(s.downCh), Equals, protocol.PingPongMsg{Type: "pong"}) |
2149 | failure := errors.New("pong") |
2150 | s.upCh <- failure |
2151 | - c.Check(<-s.errCh, Equals, failure) |
2152 | + c.Check(<-s.sess.errCh, Equals, failure) |
2153 | } |
2154 | |
2155 | func (s *loopSuite) TestLoopLoopsDaLoop(c *C) { |
2156 | @@ -1074,7 +1050,7 @@ |
2157 | } |
2158 | failure := errors.New("pong") |
2159 | s.upCh <- failure |
2160 | - c.Check(<-s.errCh, Equals, failure) |
2161 | + c.Check(<-s.sess.errCh, Equals, failure) |
2162 | } |
2163 | |
2164 | func (s *loopSuite) TestLoopBroadcast(c *C) { |
2165 | @@ -1091,7 +1067,7 @@ |
2166 | c.Check(takeNext(s.downCh), Equals, protocol.AckMsg{"ack"}) |
2167 | failure := errors.New("ack") |
2168 | s.upCh <- failure |
2169 | - c.Check(<-s.errCh, Equals, failure) |
2170 | + c.Check(<-s.sess.errCh, Equals, failure) |
2171 | } |
2172 | |
2173 | func (s *loopSuite) TestLoopNotifications(c *C) { |
2174 | @@ -1111,7 +1087,7 @@ |
2175 | c.Check(takeNext(s.downCh), Equals, protocol.AckMsg{"ack"}) |
2176 | failure := errors.New("ack") |
2177 | s.upCh <- failure |
2178 | - c.Check(<-s.errCh, Equals, failure) |
2179 | + c.Check(<-s.sess.errCh, Equals, failure) |
2180 | } |
2181 | |
2182 | func (s *loopSuite) TestLoopSetParams(c *C) { |
2183 | @@ -1124,7 +1100,7 @@ |
2184 | s.upCh <- setParams |
2185 | failure := errors.New("fail") |
2186 | s.upCh <- failure |
2187 | - c.Assert(<-s.errCh, Equals, failure) |
2188 | + c.Assert(<-s.sess.errCh, Equals, failure) |
2189 | c.Check(s.sess.getCookie(), Equals, "COOKIE") |
2190 | } |
2191 | |
2192 | @@ -1136,7 +1112,7 @@ |
2193 | } |
2194 | c.Check(takeNext(s.downCh), Equals, "deadline 1ms") |
2195 | s.upCh <- broken |
2196 | - c.Check(<-s.errCh, NotNil) |
2197 | + c.Check(<-s.sess.errCh, NotNil) |
2198 | } |
2199 | |
2200 | func (s *loopSuite) TestLoopConnWarn(c *C) { |
2201 | @@ -1157,7 +1133,7 @@ |
2202 | s.upCh <- warn |
2203 | s.upCh <- connwarn |
2204 | s.upCh <- failure |
2205 | - c.Check(<-s.errCh, Equals, failure) |
2206 | + c.Check(<-s.sess.errCh, Equals, failure) |
2207 | c.Check(log.Captured(), |
2208 | Matches, `(?ms).* warning: XXX$.*`) |
2209 | c.Check(log.Captured(), |
2210 | @@ -1168,7 +1144,7 @@ |
2211 | start() tests |
2212 | ****************************************************************/ |
2213 | func (cs *clientSessionSuite) TestStartFailsIfSetDeadlineFails(c *C) { |
2214 | - sess, err := NewSession("", dummyConf, "wah", cs.lvls, cs.log) |
2215 | + sess, err := NewSession("", dummyConf(), "wah", cs.lvls, cs.log) |
2216 | c.Assert(err, IsNil) |
2217 | sess.Connection = &testConn{Name: "TestStartFailsIfSetDeadlineFails", |
2218 | DeadlineCondition: condition.Work(false)} // setdeadline will fail |
2219 | @@ -1178,7 +1154,7 @@ |
2220 | } |
2221 | |
2222 | func (cs *clientSessionSuite) TestStartFailsIfWriteFails(c *C) { |
2223 | - sess, err := NewSession("", dummyConf, "wah", cs.lvls, cs.log) |
2224 | + sess, err := NewSession("", dummyConf(), "wah", cs.lvls, cs.log) |
2225 | c.Assert(err, IsNil) |
2226 | sess.Connection = &testConn{Name: "TestStartFailsIfWriteFails", |
2227 | WriteCondition: condition.Work(false)} // write will fail |
2228 | @@ -1188,7 +1164,7 @@ |
2229 | } |
2230 | |
2231 | func (cs *clientSessionSuite) TestStartFailsIfGetLevelsFails(c *C) { |
2232 | - sess, err := NewSession("", dummyConf, "wah", cs.lvls, cs.log) |
2233 | + sess, err := NewSession("", dummyConf(), "wah", cs.lvls, cs.log) |
2234 | c.Assert(err, IsNil) |
2235 | sess.SeenState = &brokenSeenState{} |
2236 | sess.Connection = &testConn{Name: "TestStartConnectMessageFails"} |
2237 | @@ -1208,7 +1184,7 @@ |
2238 | } |
2239 | |
2240 | func (cs *clientSessionSuite) TestStartConnectMessageFails(c *C) { |
2241 | - sess, err := NewSession("", dummyConf, "wah", cs.lvls, cs.log) |
2242 | + sess, err := NewSession("", dummyConf(), "wah", cs.lvls, cs.log) |
2243 | c.Assert(err, IsNil) |
2244 | sess.Connection = &testConn{Name: "TestStartConnectMessageFails"} |
2245 | errCh := make(chan error, 1) |
2246 | @@ -1235,7 +1211,7 @@ |
2247 | } |
2248 | |
2249 | func (cs *clientSessionSuite) TestStartConnackReadError(c *C) { |
2250 | - sess, err := NewSession("", dummyConf, "wah", cs.lvls, cs.log) |
2251 | + sess, err := NewSession("", dummyConf(), "wah", cs.lvls, cs.log) |
2252 | c.Assert(err, IsNil) |
2253 | sess.Connection = &testConn{Name: "TestStartConnackReadError"} |
2254 | errCh := make(chan error, 1) |
2255 | @@ -1259,7 +1235,7 @@ |
2256 | } |
2257 | |
2258 | func (cs *clientSessionSuite) TestStartBadConnack(c *C) { |
2259 | - sess, err := NewSession("", dummyConf, "wah", cs.lvls, cs.log) |
2260 | + sess, err := NewSession("", dummyConf(), "wah", cs.lvls, cs.log) |
2261 | c.Assert(err, IsNil) |
2262 | sess.Connection = &testConn{Name: "TestStartBadConnack"} |
2263 | errCh := make(chan error, 1) |
2264 | @@ -1283,7 +1259,7 @@ |
2265 | } |
2266 | |
2267 | func (cs *clientSessionSuite) TestStartNotConnack(c *C) { |
2268 | - sess, err := NewSession("", dummyConf, "wah", cs.lvls, cs.log) |
2269 | + sess, err := NewSession("", dummyConf(), "wah", cs.lvls, cs.log) |
2270 | c.Assert(err, IsNil) |
2271 | sess.Connection = &testConn{Name: "TestStartBadConnack"} |
2272 | errCh := make(chan error, 1) |
2273 | @@ -1350,13 +1326,31 @@ |
2274 | run() tests |
2275 | ****************************************************************/ |
2276 | |
2277 | +func (cs *clientSessionSuite) TestRunCallsCloserWithFalse(c *C) { |
2278 | + sess, err := NewSession("", dummyConf(), "wah", cs.lvls, cs.log) |
2279 | + c.Assert(err, IsNil) |
2280 | + failure := errors.New("bail") |
2281 | + has_closed := false |
2282 | + with_false := false |
2283 | + err = sess.run( |
2284 | + func(b bool) { has_closed = true; with_false = !b }, |
2285 | + func() error { return failure }, |
2286 | + nil, |
2287 | + nil, |
2288 | + nil, |
2289 | + nil) |
2290 | + c.Check(err, Equals, failure) |
2291 | + c.Check(has_closed, Equals, true) |
2292 | + c.Check(with_false, Equals, true) |
2293 | +} |
2294 | + |
2295 | func (cs *clientSessionSuite) TestRunBailsIfAuthCheckFails(c *C) { |
2296 | - sess, err := NewSession("", dummyConf, "wah", cs.lvls, cs.log) |
2297 | + sess, err := NewSession("", dummyConf(), "wah", cs.lvls, cs.log) |
2298 | c.Assert(err, IsNil) |
2299 | failure := errors.New("TestRunBailsIfAuthCheckFails") |
2300 | has_closed := false |
2301 | err = sess.run( |
2302 | - func() { has_closed = true }, |
2303 | + func(bool) { has_closed = true }, |
2304 | func() error { return failure }, |
2305 | nil, |
2306 | nil, |
2307 | @@ -1367,12 +1361,12 @@ |
2308 | } |
2309 | |
2310 | func (cs *clientSessionSuite) TestRunBailsIfHostGetterFails(c *C) { |
2311 | - sess, err := NewSession("", dummyConf, "wah", cs.lvls, cs.log) |
2312 | + sess, err := NewSession("", dummyConf(), "wah", cs.lvls, cs.log) |
2313 | c.Assert(err, IsNil) |
2314 | failure := errors.New("TestRunBailsIfHostGetterFails") |
2315 | has_closed := false |
2316 | err = sess.run( |
2317 | - func() { has_closed = true }, |
2318 | + func(bool) { has_closed = true }, |
2319 | func() error { return nil }, |
2320 | func() error { return failure }, |
2321 | nil, |
2322 | @@ -1383,11 +1377,11 @@ |
2323 | } |
2324 | |
2325 | func (cs *clientSessionSuite) TestRunBailsIfConnectFails(c *C) { |
2326 | - sess, err := NewSession("", dummyConf, "wah", cs.lvls, cs.log) |
2327 | + sess, err := NewSession("", dummyConf(), "wah", cs.lvls, cs.log) |
2328 | c.Assert(err, IsNil) |
2329 | failure := errors.New("TestRunBailsIfConnectFails") |
2330 | err = sess.run( |
2331 | - func() {}, |
2332 | + func(bool) {}, |
2333 | func() error { return nil }, |
2334 | func() error { return nil }, |
2335 | func() error { return failure }, |
2336 | @@ -1397,11 +1391,11 @@ |
2337 | } |
2338 | |
2339 | func (cs *clientSessionSuite) TestRunBailsIfStartFails(c *C) { |
2340 | - sess, err := NewSession("", dummyConf, "wah", cs.lvls, cs.log) |
2341 | + sess, err := NewSession("", dummyConf(), "wah", cs.lvls, cs.log) |
2342 | c.Assert(err, IsNil) |
2343 | failure := errors.New("TestRunBailsIfStartFails") |
2344 | err = sess.run( |
2345 | - func() {}, |
2346 | + func(bool) {}, |
2347 | func() error { return nil }, |
2348 | func() error { return nil }, |
2349 | func() error { return nil }, |
2350 | @@ -1411,16 +1405,12 @@ |
2351 | } |
2352 | |
2353 | func (cs *clientSessionSuite) TestRunRunsEvenIfLoopFails(c *C) { |
2354 | - sess, err := NewSession("", dummyConf, "wah", cs.lvls, cs.log) |
2355 | + sess, err := NewSession("", dummyConf(), "wah", cs.lvls, cs.log) |
2356 | c.Assert(err, IsNil) |
2357 | - // just to make a point: until here we haven't set ErrCh & BroadcastCh (no |
2358 | - // biggie if this stops being true) |
2359 | - c.Check(sess.ErrCh, IsNil) |
2360 | - c.Check(sess.BroadcastCh, IsNil) |
2361 | failureCh := make(chan error) // must be unbuffered |
2362 | notf := &BroadcastNotification{} |
2363 | err = sess.run( |
2364 | - func() {}, |
2365 | + func(bool) {}, |
2366 | func() error { return nil }, |
2367 | func() error { return nil }, |
2368 | func() error { return nil }, |
2369 | @@ -1428,12 +1418,12 @@ |
2370 | func() error { sess.BroadcastCh <- notf; return <-failureCh }) |
2371 | c.Check(err, Equals, nil) |
2372 | // if run doesn't error it sets up the channels |
2373 | - c.Assert(sess.ErrCh, NotNil) |
2374 | + c.Assert(sess.errCh, NotNil) |
2375 | c.Assert(sess.BroadcastCh, NotNil) |
2376 | c.Check(<-sess.BroadcastCh, Equals, notf) |
2377 | failure := errors.New("TestRunRunsEvenIfLoopFails") |
2378 | failureCh <- failure |
2379 | - c.Check(<-sess.ErrCh, Equals, failure) |
2380 | + c.Check(<-sess.errCh, Equals, failure) |
2381 | // so now you know it was running in a goroutine :) |
2382 | } |
2383 | |
2384 | @@ -1442,7 +1432,7 @@ |
2385 | ****************************************************************/ |
2386 | |
2387 | func (cs *clientSessionSuite) TestJitter(c *C) { |
2388 | - sess, err := NewSession("", dummyConf, "wah", cs.lvls, cs.log) |
2389 | + sess, err := NewSession("", dummyConf(), "wah", cs.lvls, cs.log) |
2390 | c.Assert(err, IsNil) |
2391 | num_tries := 20 // should do the math |
2392 | spread := time.Second // |
2393 | @@ -1474,7 +1464,7 @@ |
2394 | |
2395 | func (cs *clientSessionSuite) TestDialPanics(c *C) { |
2396 | // one last unhappy test |
2397 | - sess, err := NewSession("", dummyConf, "wah", cs.lvls, cs.log) |
2398 | + sess, err := NewSession("", dummyConf(), "wah", cs.lvls, cs.log) |
2399 | c.Assert(err, IsNil) |
2400 | sess.Protocolator = nil |
2401 | c.Check(sess.Dial, PanicMatches, ".*protocol constructor.") |
2402 | @@ -1482,12 +1472,15 @@ |
2403 | |
2404 | var ( |
2405 | dialTestTimeout = 300 * time.Millisecond |
2406 | - dialTestConf = ClientSessionConfig{ |
2407 | - ExchangeTimeout: dialTestTimeout, |
2408 | - PEM: helpers.TestCertPEMBlock, |
2409 | - } |
2410 | ) |
2411 | |
2412 | +func dialTestConf() ClientSessionConfig { |
2413 | + conf := dummyConf() |
2414 | + conf.ExchangeTimeout = dialTestTimeout |
2415 | + conf.PEM = helpers.TestCertPEMBlock |
2416 | + return conf |
2417 | +} |
2418 | + |
2419 | func (cs *clientSessionSuite) TestDialBadServerName(c *C) { |
2420 | // a borked server name |
2421 | lst, err := tls.Listen("tcp", "localhost:0", helpers.TestTLSServerConfig) |
2422 | @@ -1506,7 +1499,7 @@ |
2423 | })) |
2424 | defer ts.Close() |
2425 | |
2426 | - sess, err := NewSession(ts.URL, dialTestConf, "wah", cs.lvls, cs.log) |
2427 | + sess, err := NewSession(ts.URL, dialTestConf(), "wah", cs.lvls, cs.log) |
2428 | c.Assert(err, IsNil) |
2429 | tconn := &testConn{} |
2430 | sess.Connection = tconn |
2431 | @@ -1551,7 +1544,7 @@ |
2432 | })) |
2433 | defer ts.Close() |
2434 | |
2435 | - sess, err := NewSession(ts.URL, dialTestConf, "wah", cs.lvls, cs.log) |
2436 | + sess, err := NewSession(ts.URL, dialTestConf(), "wah", cs.lvls, cs.log) |
2437 | c.Assert(err, IsNil) |
2438 | tconn := &testConn{CloseCondition: condition.Fail2Work(10)} |
2439 | sess.Connection = tconn |
2440 | @@ -1631,16 +1624,16 @@ |
2441 | c.Check(takeNext(downCh), Equals, protocol.PingPongMsg{Type: "pong"}) |
2442 | failure := errors.New("pongs") |
2443 | upCh <- failure |
2444 | - c.Check(<-sess.ErrCh, Equals, failure) |
2445 | + c.Check(<-sess.errCh, Equals, failure) |
2446 | } |
2447 | |
2448 | func (cs *clientSessionSuite) TestDialWorksDirect(c *C) { |
2449 | // happy path thoughts |
2450 | lst, err := tls.Listen("tcp", "localhost:0", helpers.TestTLSServerConfig) |
2451 | c.Assert(err, IsNil) |
2452 | - sess, err := NewSession(lst.Addr().String(), dialTestConf, "wah", cs.lvls, cs.log) |
2453 | + sess, err := NewSession(lst.Addr().String(), dialTestConf(), "wah", cs.lvls, cs.log) |
2454 | c.Assert(err, IsNil) |
2455 | - defer sess.Close() |
2456 | + defer sess.StopKeepConnection() |
2457 | |
2458 | upCh := make(chan interface{}, 5) |
2459 | downCh := make(chan interface{}, 5) |
2460 | @@ -1659,7 +1652,7 @@ |
2461 | ****************************************************************/ |
2462 | |
2463 | func (cs *clientSessionSuite) TestShouldDelay(c *C) { |
2464 | - sess, err := NewSession("foo:443", dummyConf, "", cs.lvls, cs.log) |
2465 | + sess, err := NewSession("foo:443", dummyConf(), "", cs.lvls, cs.log) |
2466 | c.Assert(err, IsNil) |
2467 | c.Check(sess.ShouldDelay(), Equals, false) |
2468 | sess.setShouldDelay() |
2469 | @@ -1669,7 +1662,7 @@ |
2470 | } |
2471 | |
2472 | func (cs *clientSessionSuite) TestRedialDelay(c *C) { |
2473 | - sess, err := NewSession("foo:443", dummyConf, "", cs.lvls, cs.log) |
2474 | + sess, err := NewSession("foo:443", dummyConf(), "", cs.lvls, cs.log) |
2475 | c.Assert(err, IsNil) |
2476 | sess.redialDelays = []time.Duration{17, 42} |
2477 | n := 0 |
2478 | @@ -1690,15 +1683,207 @@ |
2479 | } |
2480 | |
2481 | /**************************************************************** |
2482 | - ClearCookie() tests |
2483 | + ResetCookie() tests |
2484 | ****************************************************************/ |
2485 | |
2486 | -func (cs *clientSessionSuite) TestClearCookie(c *C) { |
2487 | - sess, err := NewSession("foo:443", dummyConf, "", cs.lvls, cs.log) |
2488 | +func (cs *clientSessionSuite) TestResetCookie(c *C) { |
2489 | + sess, err := NewSession("foo:443", dummyConf(), "", cs.lvls, cs.log) |
2490 | c.Assert(err, IsNil) |
2491 | + c.Assert(sess.KeepConnection(), IsNil) |
2492 | + defer sess.StopKeepConnection() |
2493 | c.Check(sess.getCookie(), Equals, "") |
2494 | sess.setCookie("COOKIE") |
2495 | c.Check(sess.getCookie(), Equals, "COOKIE") |
2496 | - sess.ClearCookie() |
2497 | + sess.ResetCookie() |
2498 | c.Check(sess.getCookie(), Equals, "") |
2499 | } |
2500 | + |
2501 | +/**************************************************************** |
2502 | + KeepConnection() (and related) tests |
2503 | +****************************************************************/ |
2504 | + |
2505 | +func (cs *clientSessionSuite) TestKeepConnectionDoesNothingIfNotConnected(c *C) { |
2506 | + // how do you test "does nothing?" |
2507 | + sess, err := NewSession("foo:443", dummyConf(), "", cs.lvls, cs.log) |
2508 | + c.Assert(err, IsNil) |
2509 | + c.Assert(sess, NotNil) |
2510 | + c.Assert(sess.State(), Equals, Pristine) |
2511 | + c.Assert(sess.KeepConnection(), IsNil) |
2512 | + defer sess.StopKeepConnection() |
2513 | + // stopCh is meant to be used just for closing it, but abusing |
2514 | + // it for testing seems the right thing to do: this ensures |
2515 | + // the thing is ticking along before we check the state of |
2516 | + // stuff. |
2517 | + sess.stopCh <- struct{}{} |
2518 | + c.Check(sess.State(), Equals, Disconnected) |
2519 | +} |
2520 | + |
2521 | +func (cs *clientSessionSuite) TestYouCantCallKeepConnectionTwice(c *C) { |
2522 | + sess, err := NewSession("foo:443", dummyConf(), "", cs.lvls, cs.log) |
2523 | + c.Assert(err, IsNil) |
2524 | + c.Assert(sess, NotNil) |
2525 | + c.Assert(sess.State(), Equals, Pristine) |
2526 | + c.Assert(sess.KeepConnection(), IsNil) |
2527 | + defer sess.StopKeepConnection() |
2528 | + c.Check(sess.KeepConnection(), NotNil) |
2529 | +} |
2530 | + |
2531 | +func (cs *clientSessionSuite) TestStopKeepConnectionShutsdown(c *C) { |
2532 | + sess, err := NewSession("foo:443", dummyConf(), "", cs.lvls, cs.log) |
2533 | + c.Assert(err, IsNil) |
2534 | + c.Assert(sess, NotNil) |
2535 | + sess.StopKeepConnection() |
2536 | + c.Check(sess.State(), Equals, Shutdown) |
2537 | +} |
2538 | + |
2539 | +func (cs *clientSessionSuite) TestHasConnectivityTriggersConnectivityHandler(c *C) { |
2540 | + sess, err := NewSession("foo:443", dummyConf(), "", cs.lvls, cs.log) |
2541 | + c.Assert(err, IsNil) |
2542 | + c.Assert(sess, NotNil) |
2543 | + testCh := make(chan bool) |
2544 | + sess.connHandler = func(p bool) { testCh <- p } |
2545 | + go sess.doKeepConnection() |
2546 | + defer sess.StopKeepConnection() |
2547 | + sess.HasConnectivity(true) |
2548 | + c.Check(<-testCh, Equals, true) |
2549 | + sess.HasConnectivity(false) |
2550 | + c.Check(<-testCh, Equals, false) |
2551 | +} |
2552 | + |
2553 | +func (cs *clientSessionSuite) TestDoneChIsEmptiedAndLogged(c *C) { |
2554 | + sess, err := NewSession("", dummyConf(), "wah", cs.lvls, cs.log) |
2555 | + c.Assert(err, IsNil) |
2556 | + sess.doneCh = make(chan uint32) // unbuffered |
2557 | + |
2558 | + sess.KeepConnection() |
2559 | + defer sess.StopKeepConnection() |
2560 | + |
2561 | + sess.doneCh <- 23 |
2562 | + sess.doneCh <- 24 // makes sure the first one has been processed before checking |
2563 | + |
2564 | + c.Check(cs.log.Captured(), |
2565 | + Matches, `(?ms).* connected after 23 attempts\.`) |
2566 | +} |
2567 | + |
2568 | +func (cs *clientSessionSuite) TestErrChIsEmptiedAndLoggedAndAutoRedial(c *C) { |
2569 | + sess, err := NewSession("", dummyConf(), "wah", cs.lvls, cs.log) |
2570 | + c.Assert(err, IsNil) |
2571 | + ch := make(chan struct{}, 1) |
2572 | + sess.errCh = make(chan error) // unbuffered |
2573 | + sess.redialDelay = func(sess *clientSession) time.Duration { ch <- struct{}{}; return 0 } |
2574 | + sess.lastConn = true // -> autoRedial, if the session is in Disconnected |
2575 | + |
2576 | + sess.KeepConnection() |
2577 | + defer sess.StopKeepConnection() |
2578 | + |
2579 | + sess.setState(Error) |
2580 | + sess.errCh <- errors.New("potato") |
2581 | + select { |
2582 | + case <-ch: |
2583 | + // all ok |
2584 | + case <-time.After(100 * time.Millisecond): |
2585 | + c.Fatalf("redialDelay not called (-> autoRedial not called)?") |
2586 | + } |
2587 | + |
2588 | + c.Check(cs.log.Captured(), |
2589 | + Matches, `(?ms).* session error.*potato`) |
2590 | +} |
2591 | + |
2592 | +func (cs *clientSessionSuite) TestErrChIsEmptiedAndLoggedNoAutoRedial(c *C) { |
2593 | + sess, err := NewSession("", dummyConf(), "wah", cs.lvls, cs.log) |
2594 | + c.Assert(err, IsNil) |
2595 | + ch := make(chan struct{}, 1) |
2596 | + sess.errCh = make(chan error) // unbuffered |
2597 | + sess.redialDelay = func(sess *clientSession) time.Duration { ch <- struct{}{}; return 0 } |
2598 | + sess.connHandler = func(bool) {} |
2599 | + sess.lastConn = false // so, no autoredial |
2600 | + |
2601 | + sess.KeepConnection() |
2602 | + defer sess.StopKeepConnection() |
2603 | + |
2604 | + sess.errCh <- errors.New("potato") |
2605 | + c.Assert(sess.State(), Equals, Disconnected) |
2606 | + select { |
2607 | + case <-ch: |
2608 | + c.Fatalf("redialDelay called (-> autoRedial called) when disconnected?") |
2609 | + case <-time.After(100 * time.Millisecond): |
2610 | + // all ok |
2611 | + } |
2612 | + |
2613 | + c.Check(cs.log.Captured(), |
2614 | + Matches, `(?ms).* session error.*potato`) |
2615 | +} |
2616 | + |
2617 | +func (cs *clientSessionSuite) TestHandleConnConnFromConnected(c *C) { |
2618 | + sess, err := NewSession("", dummyConf(), "wah", cs.lvls, cs.log) |
2619 | + c.Assert(err, IsNil) |
2620 | + ch := make(chan struct{}, 1) |
2621 | + sess.redialDelay = func(sess *clientSession) time.Duration { ch <- struct{}{}; return 0 } |
2622 | + sess.state = Connected |
2623 | + sess.lastConn = true |
2624 | + sess.handleConn(true) |
2625 | + c.Check(sess.lastConn, Equals, true) |
2626 | + |
2627 | + select { |
2628 | + case <-ch: |
2629 | + // all ok |
2630 | + case <-time.After(100 * time.Millisecond): |
2631 | + c.Fatalf("redialDelay not called (-> autoRedial not called)?") |
2632 | + } |
2633 | +} |
2634 | + |
2635 | +func (cs *clientSessionSuite) TestHandleConnConnFromDisconnected(c *C) { |
2636 | + sess, err := NewSession("", dummyConf(), "wah", cs.lvls, cs.log) |
2637 | + c.Assert(err, IsNil) |
2638 | + ch := make(chan struct{}, 1) |
2639 | + sess.redialDelay = func(sess *clientSession) time.Duration { ch <- struct{}{}; return 0 } |
2640 | + sess.state = Disconnected |
2641 | + sess.lastConn = false |
2642 | + sess.handleConn(true) |
2643 | + c.Check(sess.lastConn, Equals, true) |
2644 | + |
2645 | + select { |
2646 | + case <-ch: |
2647 | + // all ok |
2648 | + case <-time.After(100 * time.Millisecond): |
2649 | + c.Fatalf("redialDelay not called (-> autoRedial not called)?") |
2650 | + } |
2651 | +} |
2652 | + |
2653 | +func (cs *clientSessionSuite) TestHandleConnNotConnFromDisconnected(c *C) { |
2654 | + sess, err := NewSession("", dummyConf(), "wah", cs.lvls, cs.log) |
2655 | + c.Assert(err, IsNil) |
2656 | + ch := make(chan struct{}, 1) |
2657 | + sess.redialDelay = func(sess *clientSession) time.Duration { ch <- struct{}{}; return 0 } |
2658 | + sess.state = Disconnected |
2659 | + sess.lastConn = false |
2660 | + sess.handleConn(false) |
2661 | + c.Check(sess.lastConn, Equals, false) |
2662 | + |
2663 | + select { |
2664 | + case <-ch: |
2665 | + c.Fatalf("redialDelay called (-> autoRedial called)?") |
2666 | + case <-time.After(100 * time.Millisecond): |
2667 | + // all ok |
2668 | + } |
2669 | + c.Check(cs.log.Captured(), Matches, `(?ms).*-> Disconnected`) |
2670 | +} |
2671 | + |
2672 | +func (cs *clientSessionSuite) TestHandleConnNotConnFromConnected(c *C) { |
2673 | + sess, err := NewSession("", dummyConf(), "wah", cs.lvls, cs.log) |
2674 | + c.Assert(err, IsNil) |
2675 | + ch := make(chan struct{}, 1) |
2676 | + sess.redialDelay = func(sess *clientSession) time.Duration { ch <- struct{}{}; return 0 } |
2677 | + sess.state = Connected |
2678 | + sess.lastConn = true |
2679 | + sess.handleConn(false) |
2680 | + c.Check(sess.lastConn, Equals, false) |
2681 | + |
2682 | + select { |
2683 | + case <-ch: |
2684 | + c.Fatalf("redialDelay called (-> autoRedial called)?") |
2685 | + case <-time.After(100 * time.Millisecond): |
2686 | + // all ok |
2687 | + } |
2688 | + c.Check(cs.log.Captured(), Matches, `(?ms).*-> Disconnected`) |
2689 | +} |
2690 | |
2691 | === modified file 'debian/changelog' |
2692 | --- debian/changelog 2015-03-06 13:27:06 +0000 |
2693 | +++ debian/changelog 2015-04-02 09:52:21 +0000 |
2694 | @@ -1,3 +1,26 @@ |
2695 | +ubuntu-push (0.68+15.04.20150306.2-0ubuntu2) UNRELEASED; urgency=medium |
2696 | + |
2697 | + [Roberto Alsina] |
2698 | + * click-hook: report failure if hooks_path doesn't exist. [client] |
2699 | + |
2700 | + [Bret Barker] |
2701 | + * add a hacky busy sleep loop to workaround go's sleep not |
2702 | + accounting for suspended time, more logging (lp:1435109). [client] |
2703 | + |
2704 | + [John R. Lenton] |
2705 | + * Refactor code maintaining session (better fix for lp:1390663) [client] |
2706 | + |
2707 | + [Samuele Pedroni] |
2708 | + * just delegate whether there's a update-worthy image to the |
2709 | + system-settings helper and system-image. [client] |
2710 | + * stop waking up for polling if in flight-mode and wireless not |
2711 | + enabled (lp:1437135). [client] |
2712 | + * don't hold a lock for a long time on handleErrConn, trigger |
2713 | + autoRedial on Error more actively (lp:1435109). [client] |
2714 | + * disallow RC4 and SSLv3. [server] |
2715 | + |
2716 | + -- Samuele Pedroni <pedronis@ubuntu-64> Thu, 02 Apr 2015 11:38:19 +0200 |
2717 | + |
2718 | ubuntu-push (0.68+15.04.20150306.2-0ubuntu1) vivid; urgency=medium |
2719 | |
2720 | [ John R. Lenton ] |
2721 | |
2722 | === modified file 'debian/config.json' |
2723 | --- debian/config.json 2015-01-26 21:00:27 +0000 |
2724 | +++ debian/config.json 2015-04-02 09:52:21 +0000 |
2725 | @@ -19,5 +19,6 @@ |
2726 | "poll_settle": "20ms", |
2727 | "poll_net_wait": "1m", |
2728 | "poll_polld_wait": "3m", |
2729 | - "poll_done_wait": "5s" |
2730 | + "poll_done_wait": "5s", |
2731 | + "poll_busy_wait": "1s" |
2732 | } |
2733 | |
2734 | === modified file 'launch_helper/kindpool_test.go' |
2735 | --- launch_helper/kindpool_test.go 2014-08-22 14:54:41 +0000 |
2736 | +++ launch_helper/kindpool_test.go 2015-04-02 09:52:21 +0000 |
2737 | @@ -45,7 +45,7 @@ |
2738 | select { |
2739 | case res := <-ch: |
2740 | return res |
2741 | - case <-time.After(100 * time.Millisecond): |
2742 | + case <-time.After(time.Second): |
2743 | c.Fatal("timeout waiting for result") |
2744 | } |
2745 | return nil |
2746 | |
2747 | === modified file 'poller/poller.go' |
2748 | --- poller/poller.go 2015-01-21 17:21:42 +0000 |
2749 | +++ poller/poller.go 2015-04-02 09:52:21 +0000 |
2750 | @@ -1,5 +1,5 @@ |
2751 | /* |
2752 | - Copyright 2014 Canonical Ltd. |
2753 | + Copyright 2014-2015 Canonical Ltd. |
2754 | |
2755 | This program is free software: you can redistribute it and/or modify it |
2756 | under the terms of the GNU General Public License version 3, as published |
2757 | @@ -25,8 +25,10 @@ |
2758 | "time" |
2759 | |
2760 | "launchpad.net/ubuntu-push/bus" |
2761 | + "launchpad.net/ubuntu-push/bus/networkmanager" |
2762 | "launchpad.net/ubuntu-push/bus/polld" |
2763 | "launchpad.net/ubuntu-push/bus/powerd" |
2764 | + "launchpad.net/ubuntu-push/bus/urfkill" |
2765 | "launchpad.net/ubuntu-push/client/session" |
2766 | "launchpad.net/ubuntu-push/logger" |
2767 | "launchpad.net/ubuntu-push/util" |
2768 | @@ -48,6 +50,7 @@ |
2769 | NetworkWait time.Duration |
2770 | PolldWait time.Duration |
2771 | DoneWait time.Duration |
2772 | + BusyWait time.Duration |
2773 | } |
2774 | |
2775 | type Poller interface { |
2776 | @@ -63,21 +66,29 @@ |
2777 | } |
2778 | |
2779 | type poller struct { |
2780 | - times Times |
2781 | - log logger.Logger |
2782 | - powerd powerd.Powerd |
2783 | - polld polld.Polld |
2784 | - cookie string |
2785 | - sessionState stater |
2786 | + times Times |
2787 | + log logger.Logger |
2788 | + nm networkmanager.NetworkManager |
2789 | + powerd powerd.Powerd |
2790 | + polld polld.Polld |
2791 | + urfkill urfkill.URfkill |
2792 | + cookie string |
2793 | + sessionState stater |
2794 | + requestWakeupCh chan struct{} |
2795 | + requestedWakeupErrCh chan error |
2796 | + holdsWakeLockCh chan bool |
2797 | } |
2798 | |
2799 | func New(setup *PollerSetup) Poller { |
2800 | return &poller{ |
2801 | - times: setup.Times, |
2802 | - log: setup.Log, |
2803 | - powerd: nil, |
2804 | - polld: nil, |
2805 | - sessionState: setup.SessionStateGetter, |
2806 | + times: setup.Times, |
2807 | + log: setup.Log, |
2808 | + powerd: nil, |
2809 | + polld: nil, |
2810 | + sessionState: setup.SessionStateGetter, |
2811 | + requestWakeupCh: make(chan struct{}), |
2812 | + requestedWakeupErrCh: make(chan error), |
2813 | + holdsWakeLockCh: make(chan bool), |
2814 | } |
2815 | } |
2816 | |
2817 | @@ -92,10 +103,17 @@ |
2818 | if p.powerd != nil || p.polld != nil { |
2819 | return ErrAlreadyStarted |
2820 | } |
2821 | + nmEndp := bus.SystemBus.Endpoint(networkmanager.BusAddress, p.log) |
2822 | powerdEndp := bus.SystemBus.Endpoint(powerd.BusAddress, p.log) |
2823 | polldEndp := bus.SessionBus.Endpoint(polld.BusAddress, p.log) |
2824 | + urEndp := bus.SystemBus.Endpoint(urfkill.BusAddress, p.log) |
2825 | var wg sync.WaitGroup |
2826 | - wg.Add(2) |
2827 | + wg.Add(4) |
2828 | + go func() { |
2829 | + n := util.NewAutoRedialer(nmEndp).Redial() |
2830 | + p.log.Debugf("NetworkManager dialed on try %d", n) |
2831 | + wg.Done() |
2832 | + }() |
2833 | go func() { |
2834 | n := util.NewAutoRedialer(powerdEndp).Redial() |
2835 | p.log.Debugf("powerd dialed on try %d", n) |
2836 | @@ -106,10 +124,31 @@ |
2837 | p.log.Debugf("polld dialed in on try %d", n) |
2838 | wg.Done() |
2839 | }() |
2840 | + go func() { |
2841 | + n := util.NewAutoRedialer(urEndp).Redial() |
2842 | + p.log.Debugf("URfkill dialed on try %d", n) |
2843 | + wg.Done() |
2844 | + }() |
2845 | wg.Wait() |
2846 | |
2847 | + p.nm = networkmanager.New(nmEndp, p.log) |
2848 | p.powerd = powerd.New(powerdEndp, p.log) |
2849 | p.polld = polld.New(polldEndp, p.log) |
2850 | + p.urfkill = urfkill.New(urEndp, p.log) |
2851 | + |
2852 | + // busy sleep loop to workaround go's timer/sleep |
2853 | + // not accounting for time when the system is suspended |
2854 | + // see https://bugs.launchpad.net/ubuntu/+source/ubuntu-push/+bug/1435109 |
2855 | + if p.times.BusyWait > 0 { |
2856 | + p.log.Debugf("starting busy loop with %s interval", p.times.BusyWait) |
2857 | + go func() { |
2858 | + for { |
2859 | + time.Sleep(p.times.BusyWait) |
2860 | + } |
2861 | + }() |
2862 | + } else { |
2863 | + p.log.Debugf("skipping busy loop") |
2864 | + } |
2865 | |
2866 | return nil |
2867 | } |
2868 | @@ -118,7 +157,7 @@ |
2869 | if p.log == nil { |
2870 | return ErrUnconfigured |
2871 | } |
2872 | - if p.powerd == nil || p.polld == nil { |
2873 | + if p.nm == nil || p.powerd == nil || p.polld == nil || p.urfkill == nil { |
2874 | return ErrNotStarted |
2875 | } |
2876 | wakeupCh, err := p.powerd.WatchWakeups() |
2877 | @@ -129,10 +168,110 @@ |
2878 | if err != nil { |
2879 | return err |
2880 | } |
2881 | - go p.run(wakeupCh, doneCh) |
2882 | + flightMode := p.urfkill.IsFlightMode() |
2883 | + wirelessEnabled := p.nm.GetWirelessEnabled() |
2884 | + flightModeCh, _, err := p.urfkill.WatchFlightMode() |
2885 | + if err != nil { |
2886 | + return err |
2887 | + } |
2888 | + wirelessEnabledCh, _, err := p.nm.WatchWirelessEnabled() |
2889 | + if err != nil { |
2890 | + return err |
2891 | + } |
2892 | + |
2893 | + filteredWakeUpCh := make(chan bool) |
2894 | + go p.control(wakeupCh, filteredWakeUpCh, flightMode, flightModeCh, wirelessEnabled, wirelessEnabledCh) |
2895 | + go p.run(filteredWakeUpCh, doneCh) |
2896 | return nil |
2897 | } |
2898 | |
2899 | +func (p *poller) doRequestWakeup(delta time.Duration) (time.Time, string, error) { |
2900 | + t := time.Now().Add(delta).Truncate(time.Second) |
2901 | + cookie, err := p.powerd.RequestWakeup("ubuntu push client", t) |
2902 | + if err == nil { |
2903 | + p.log.Debugf("requested wakeup at %s", t) |
2904 | + } else { |
2905 | + p.log.Errorf("RequestWakeup got %v", err) |
2906 | + t = time.Time{} |
2907 | + cookie = "" |
2908 | + } |
2909 | + return t, cookie, err |
2910 | +} |
2911 | + |
2912 | +func (p *poller) control(wakeupCh <-chan bool, filteredWakeUpCh chan<- bool, flightMode bool, flightModeCh <-chan bool, wirelessEnabled bool, wirelessEnabledCh <-chan bool) { |
2913 | + dontPoll := flightMode && !wirelessEnabled |
2914 | + var t time.Time |
2915 | + cookie := "" |
2916 | + holdsWakeLock := false |
2917 | + for { |
2918 | + select { |
2919 | + case holdsWakeLock = <-p.holdsWakeLockCh: |
2920 | + case <-p.requestWakeupCh: |
2921 | + if !t.IsZero() || dontPoll { |
2922 | + // earlier wakeup or we shouldn't be polling |
2923 | + // => don't request wakeup |
2924 | + if dontPoll { |
2925 | + p.log.Debugf("skip requesting wakeup") |
2926 | + } |
2927 | + p.requestedWakeupErrCh <- nil |
2928 | + break |
2929 | + } |
2930 | + var err error |
2931 | + t, cookie, err = p.doRequestWakeup(p.times.AlarmInterval) |
2932 | + p.requestedWakeupErrCh <- err |
2933 | + case b := <-wakeupCh: |
2934 | + // seems we get here also on clear wakeup, oh well |
2935 | + if !b { |
2936 | + panic("WatchWakeups channel produced a false value (??)") |
2937 | + } |
2938 | + // the channel will produce a true for every |
2939 | + // wakeup, not only the one we asked for |
2940 | + now := time.Now() |
2941 | + if t.IsZero() { |
2942 | + p.log.Debugf("got woken up; time is %s", now) |
2943 | + } else { |
2944 | + p.log.Debugf("got woken up; time is %s (𝛥: %s)", now, now.Sub(t)) |
2945 | + if !now.Before(t) { |
2946 | + t = time.Time{} |
2947 | + filteredWakeUpCh <- true |
2948 | + } |
2949 | + } |
2950 | + case flightMode = <-flightModeCh: |
2951 | + case wirelessEnabled = <-wirelessEnabledCh: |
2952 | + } |
2953 | + newDontPoll := flightMode && !wirelessEnabled |
2954 | + p.log.Debugf("control: flightMode:%v wirelessEnabled:%v prevDontPoll:%v dontPoll:%v wakeupReq:%v holdsWakeLock:%v", flightMode, wirelessEnabled, dontPoll, newDontPoll, !t.IsZero(), holdsWakeLock) |
2955 | + if newDontPoll != dontPoll { |
2956 | + if dontPoll = newDontPoll; dontPoll { |
2957 | + if !t.IsZero() { |
2958 | + err := p.powerd.ClearWakeup(cookie) |
2959 | + if err == nil { |
2960 | + // cleared |
2961 | + t = time.Time{} |
2962 | + p.log.Debugf("cleared wakeup") |
2963 | + } else { |
2964 | + p.log.Errorf("ClearWakeup got %v", err) |
2965 | + } |
2966 | + } |
2967 | + } else { |
2968 | + if t.IsZero() && !holdsWakeLock { |
2969 | + // reschedule soon |
2970 | + t, cookie, _ = p.doRequestWakeup(p.times.NetworkWait / 20) |
2971 | + } |
2972 | + } |
2973 | + } |
2974 | + } |
2975 | +} |
2976 | + |
2977 | +func (p *poller) requestWakeup() error { |
2978 | + p.requestWakeupCh <- struct{}{} |
2979 | + return <-p.requestedWakeupErrCh |
2980 | +} |
2981 | + |
2982 | +func (p *poller) holdsWakeLock(has bool) { |
2983 | + p.holdsWakeLockCh <- has |
2984 | +} |
2985 | + |
2986 | func (p *poller) run(wakeupCh <-chan bool, doneCh <-chan bool) { |
2987 | var lockCookie string |
2988 | |
2989 | @@ -143,15 +282,13 @@ |
2990 | |
2991 | func (p *poller) step(wakeupCh <-chan bool, doneCh <-chan bool, lockCookie string) string { |
2992 | |
2993 | - t := time.Now().Add(p.times.AlarmInterval).Truncate(time.Second) |
2994 | - _, err := p.powerd.RequestWakeup("ubuntu push client", t) |
2995 | + err := p.requestWakeup() |
2996 | if err != nil { |
2997 | - p.log.Errorf("RequestWakeup got %v", err) |
2998 | // Don't do this too quickly. Pretend we are just skipping one wakeup |
2999 | time.Sleep(p.times.AlarmInterval) |
3000 | return lockCookie |
3001 | } |
3002 | - p.log.Debugf("requested wakeup at %s", t) |
3003 | + p.holdsWakeLock(false) |
3004 | if lockCookie != "" { |
3005 | if err := p.powerd.ClearWakelock(lockCookie); err != nil { |
3006 | p.log.Errorf("ClearWakelock(%#v) got %v", lockCookie, err) |
3007 | @@ -160,30 +297,23 @@ |
3008 | } |
3009 | lockCookie = "" |
3010 | } |
3011 | - for b := range wakeupCh { |
3012 | - if !b { |
3013 | - panic("WatchWakeups channel produced a false value (??)") |
3014 | - } |
3015 | - // the channel will produce a true for every |
3016 | - // wakeup, not only the one we asked for |
3017 | - now := time.Now() |
3018 | - p.log.Debugf("got woken up; time is %s (𝛥: %s)", now, now.Sub(t)) |
3019 | - if !now.Before(t) { |
3020 | - break |
3021 | - } |
3022 | - } |
3023 | + <-wakeupCh |
3024 | lockCookie, err = p.powerd.RequestWakelock("ubuntu push client") |
3025 | if err != nil { |
3026 | p.log.Errorf("RequestWakelock got %v", err) |
3027 | return lockCookie |
3028 | } |
3029 | - p.log.Debugf("got wakelock cookie of %s", lockCookie) |
3030 | + p.holdsWakeLock(true) |
3031 | + p.log.Debugf("got wakelock cookie of %s, checking conn state", lockCookie) |
3032 | time.Sleep(p.times.SessionStateSettle) |
3033 | for i := 0; i < 20; i++ { |
3034 | if p.IsConnected() { |
3035 | + p.log.Debugf("iter %02d: connected", i) |
3036 | break |
3037 | } |
3038 | + p.log.Debugf("iter %02d: not connected, sleeping for %s", i, p.times.NetworkWait/20) |
3039 | time.Sleep(p.times.NetworkWait / 20) |
3040 | + p.log.Debugf("iter %02d: slept", i) |
3041 | } |
3042 | if !p.IsConnected() { |
3043 | p.log.Errorf("not connected after %s; giving up", p.times.NetworkWait) |
3044 | @@ -215,7 +345,9 @@ |
3045 | } |
3046 | |
3047 | // XXX check whether something was actually done before waiting |
3048 | + p.log.Debugf("sleeping for DoneWait %s", p.times.DoneWait) |
3049 | time.Sleep(p.times.DoneWait) |
3050 | + p.log.Debugf("slept") |
3051 | } |
3052 | |
3053 | return lockCookie |
3054 | |
3055 | === modified file 'poller/poller_test.go' |
3056 | --- poller/poller_test.go 2014-08-21 10:56:12 +0000 |
3057 | +++ poller/poller_test.go 2015-04-02 09:52:21 +0000 |
3058 | @@ -1,5 +1,5 @@ |
3059 | /* |
3060 | - Copyright 2014 Canonical Ltd. |
3061 | + Copyright 2014-2015 Canonical Ltd. |
3062 | |
3063 | This program is free software: you can redistribute it and/or modify it |
3064 | under the terms of the GNU General Public License version 3, as published |
3065 | @@ -42,7 +42,7 @@ |
3066 | reqWakeCookie string |
3067 | reqWakeErr error |
3068 | // WatchWakeups |
3069 | - watchWakeCh <-chan bool |
3070 | + watchWakeCh chan bool |
3071 | watchWakeErr error |
3072 | // RequestWakelock |
3073 | reqLockName string |
3074 | @@ -63,6 +63,9 @@ |
3075 | func (m *myD) RequestWakeup(name string, wakeupTime time.Time) (string, error) { |
3076 | m.reqWakeName = name |
3077 | m.reqWakeTime = wakeupTime |
3078 | + time.AfterFunc(100*time.Millisecond, func() { |
3079 | + m.watchWakeCh <- true |
3080 | + }) |
3081 | return m.reqWakeCookie, m.reqWakeErr |
3082 | } |
3083 | func (m *myD) RequestWakelock(name string) (string, error) { |
3084 | @@ -73,7 +76,10 @@ |
3085 | m.clearLockCookie = cookie |
3086 | return m.clearLockErr |
3087 | } |
3088 | -func (m *myD) ClearWakeup(cookie string) error { panic("clearwakeup called??") } |
3089 | +func (m *myD) ClearWakeup(cookie string) error { |
3090 | + m.watchWakeCh <- false |
3091 | + return nil |
3092 | +} |
3093 | func (m *myD) WatchWakeups() (<-chan bool, error) { return m.watchWakeCh, m.watchWakeErr } |
3094 | func (m *myD) Poll() error { return m.pollErr } |
3095 | func (m *myD) WatchDones() (<-chan bool, error) { return m.watchDonesCh, m.watchDonesErr } |
3096 | @@ -86,23 +92,27 @@ |
3097 | |
3098 | func (s *PrSuite) TestStep(c *C) { |
3099 | p := &poller{ |
3100 | - times: Times{}, |
3101 | - log: s.log, |
3102 | - powerd: s.myd, |
3103 | - polld: s.myd, |
3104 | - sessionState: s.myd, |
3105 | + times: Times{}, |
3106 | + log: s.log, |
3107 | + powerd: s.myd, |
3108 | + polld: s.myd, |
3109 | + sessionState: s.myd, |
3110 | + requestWakeupCh: make(chan struct{}), |
3111 | + requestedWakeupErrCh: make(chan error), |
3112 | + holdsWakeLockCh: make(chan bool), |
3113 | } |
3114 | s.myd.reqLockCookie = "wakelock cookie" |
3115 | s.myd.stateState = session.Running |
3116 | - // we'll get the wakeup right away |
3117 | wakeupCh := make(chan bool, 1) |
3118 | - wakeupCh <- true |
3119 | + s.myd.watchWakeCh = wakeupCh |
3120 | // we won't get the "done" signal in time ;) |
3121 | doneCh := make(chan bool) |
3122 | // and a channel to get the return value from a goroutine |
3123 | ch := make(chan string) |
3124 | // now, run |
3125 | - go func() { ch <- p.step(wakeupCh, doneCh, "old cookie") }() |
3126 | + filteredWakeUpCh := make(chan bool) |
3127 | + go p.control(wakeupCh, filteredWakeUpCh, false, nil, true, nil) |
3128 | + go func() { ch <- p.step(filteredWakeUpCh, doneCh, "old cookie") }() |
3129 | select { |
3130 | case s := <-ch: |
3131 | c.Check(s, Equals, "wakelock cookie") |
3132 | @@ -112,3 +122,53 @@ |
3133 | // check we cleared the old cookie |
3134 | c.Check(s.myd.clearLockCookie, Equals, "old cookie") |
3135 | } |
3136 | + |
3137 | +func (s *PrSuite) TestControl(c *C) { |
3138 | + p := &poller{ |
3139 | + times: Times{}, |
3140 | + log: s.log, |
3141 | + powerd: s.myd, |
3142 | + polld: s.myd, |
3143 | + sessionState: s.myd, |
3144 | + requestWakeupCh: make(chan struct{}), |
3145 | + requestedWakeupErrCh: make(chan error), |
3146 | + holdsWakeLockCh: make(chan bool), |
3147 | + } |
3148 | + wakeUpCh := make(chan bool) |
3149 | + filteredWakeUpCh := make(chan bool) |
3150 | + s.myd.watchWakeCh = make(chan bool, 1) |
3151 | + flightModeCh := make(chan bool) |
3152 | + wirelessModeCh := make(chan bool) |
3153 | + go p.control(wakeUpCh, filteredWakeUpCh, false, flightModeCh, true, wirelessModeCh) |
3154 | + |
3155 | + // works |
3156 | + err := p.requestWakeup() |
3157 | + c.Assert(err, IsNil) |
3158 | + c.Check(<-s.myd.watchWakeCh, Equals, true) |
3159 | + |
3160 | + // there's a wakeup already |
3161 | + err = p.requestWakeup() |
3162 | + c.Assert(err, IsNil) |
3163 | + c.Check(s.myd.watchWakeCh, HasLen, 0) |
3164 | + |
3165 | + // wakeup happens |
3166 | + wakeUpCh <- true |
3167 | + <-filteredWakeUpCh |
3168 | + |
3169 | + // flight mode |
3170 | + flightModeCh <- true |
3171 | + wirelessModeCh <- false |
3172 | + err = p.requestWakeup() |
3173 | + c.Assert(err, IsNil) |
3174 | + c.Check(s.myd.watchWakeCh, HasLen, 0) |
3175 | + |
3176 | + // wireless on |
3177 | + wirelessModeCh <- true |
3178 | + c.Check(<-s.myd.watchWakeCh, Equals, true) |
3179 | + |
3180 | + // wireless off |
3181 | + wirelessModeCh <- false |
3182 | + // pending wakeup was cleared |
3183 | + c.Check(<-s.myd.watchWakeCh, Equals, false) |
3184 | + |
3185 | +} |
3186 | |
3187 | === modified file 'scripts/click-hook' |
3188 | --- scripts/click-hook 2014-10-15 11:56:43 +0000 |
3189 | +++ scripts/click-hook 2015-04-02 09:52:21 +0000 |
3190 | @@ -53,6 +53,8 @@ |
3191 | |
3192 | def collect_helpers(helpers_data_path, helpers_data_path_tmp, hooks_path): |
3193 | helpers_data = {} |
3194 | + if not os.path.isdir(hooks_path): |
3195 | + return True |
3196 | for hook_fname in os.listdir(hooks_path): |
3197 | if not hook_fname.endswith(hook_ext): |
3198 | continue |
3199 | |
3200 | === modified file 'server/tlsconfig.go' |
3201 | --- server/tlsconfig.go 2014-09-04 12:51:08 +0000 |
3202 | +++ server/tlsconfig.go 2015-04-02 09:52:21 +0000 |
3203 | @@ -48,6 +48,18 @@ |
3204 | tlsCfg := &tls.Config{ |
3205 | Certificates: []tls.Certificate{cfg.cert}, |
3206 | SessionTicketsDisabled: true, |
3207 | + // order from crypto/tls/cipher_suites.go, no RC4 |
3208 | + CipherSuites: []uint16{ |
3209 | + tls.TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, |
3210 | + tls.TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, |
3211 | + tls.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, |
3212 | + tls.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, |
3213 | + tls.TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, |
3214 | + tls.TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, |
3215 | + tls.TLS_RSA_WITH_AES_128_CBC_SHA, |
3216 | + tls.TLS_RSA_WITH_AES_256_CBC_SHA, |
3217 | + }, |
3218 | + MinVersion: tls.VersionTLS10, |
3219 | } |
3220 | return tlsCfg |
3221 | } |