Skip to content

Commit 5588a8c

Browse files
committed
tests, change name
1 parent e7d1d20 commit 5588a8c

File tree

2 files changed

+6
-1
lines changed

2 files changed

+6
-1
lines changed

tailnet/controllers.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1266,7 +1266,7 @@ func (t *tunnelUpdater) updateDNSNamesLocked() map[dnsname.FQDN][]netip.Addr {
12661266
}
12671267
}
12681268
}
1269-
fqdn, err := dnsname.ToFQDN("is.coder.connect.enabled.right.now--.coder.")
1269+
fqdn, err := dnsname.ToFQDN("is--coder--connect--enabled--right--now.coder.")
12701270
if err != nil {
12711271
panic(fmt.Sprintf("failed to create static FQDN: %v", err))
12721272
}

tailnet/controllers_test.go

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,7 @@ import (
2222
"google.golang.org/protobuf/types/known/timestamppb"
2323
"storj.io/drpc"
2424
"storj.io/drpc/drpcerr"
25+
"tailscale.com/net/tsaddr"
2526
"tailscale.com/tailcfg"
2627
"tailscale.com/types/key"
2728
"tailscale.com/util/dnsname"
@@ -1570,6 +1571,7 @@ func TestTunnelAllWorkspaceUpdatesController_Initial(t *testing.T) {
15701571
"w2a1.w2.testy.coder.": {w2a1IP},
15711572
"w2a2.w2.testy.coder.": {w2a2IP},
15721573
"w1.coder.": {ws1a1IP},
1574+
"is--coder--connect--enabled--right--now.coder.": {tsaddr.CoderServiceIPv6()},
15731575
}
15741576
dnsCall := testutil.RequireRecvCtx(ctx, t, fDNS.calls)
15751577
require.Equal(t, expectedDNS, dnsCall.hosts)
@@ -1664,6 +1666,7 @@ func TestTunnelAllWorkspaceUpdatesController_DeleteAgent(t *testing.T) {
16641666
"w1a1.w1.testy.coder.": {ws1a1IP},
16651667
"w1a1.w1.me.coder.": {ws1a1IP},
16661668
"w1.coder.": {ws1a1IP},
1669+
"is--coder--connect--enabled--right--now.coder.": {tsaddr.CoderServiceIPv6()},
16671670
}
16681671
dnsCall := testutil.RequireRecvCtx(ctx, t, fDNS.calls)
16691672
require.Equal(t, expectedDNS, dnsCall.hosts)
@@ -1719,6 +1722,7 @@ func TestTunnelAllWorkspaceUpdatesController_DeleteAgent(t *testing.T) {
17191722
"w1a2.w1.testy.coder.": {ws1a2IP},
17201723
"w1a2.w1.me.coder.": {ws1a2IP},
17211724
"w1.coder.": {ws1a2IP},
1725+
"is--coder--connect--enabled--right--now.coder.": {tsaddr.CoderServiceIPv6()},
17221726
}
17231727
dnsCall = testutil.RequireRecvCtx(ctx, t, fDNS.calls)
17241728
require.Equal(t, expectedDNS, dnsCall.hosts)
@@ -1801,6 +1805,7 @@ func TestTunnelAllWorkspaceUpdatesController_DNSError(t *testing.T) {
18011805
"w1a1.w1.me.coder.": {ws1a1IP},
18021806
"w1a1.w1.testy.coder.": {ws1a1IP},
18031807
"w1.coder.": {ws1a1IP},
1808+
"is--coder--connect--enabled--right--now.coder.": {tsaddr.CoderServiceIPv6()},
18041809
}
18051810
dnsCall := testutil.RequireRecvCtx(ctx, t, fDNS.calls)
18061811
require.Equal(t, expectedDNS, dnsCall.hosts)

0 commit comments

Comments
 (0)
pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy