@@ -288,50 +288,69 @@ pub async fn test_automatic_wireguard_rotation(
288
288
. device
289
289
. pubkey ;
290
290
291
- // Stop daemon
291
+ log:: info!( "Old wireguard key: {old_key}" ) ;
292
+
293
+ log:: info!( "Stopping daemon" ) ;
292
294
rpc. stop_mullvad_daemon ( )
293
295
. await
294
296
. expect ( "Could not stop system service" ) ;
295
297
296
- // Open device.json and change created field to more than 7 days ago
298
+ log :: info! ( "Changing created field of ` device.json` to more than 7 days ago" ) ;
297
299
rpc. make_device_json_old ( )
298
300
. await
299
301
. expect ( "Could not change device.json to have an old created timestamp" ) ;
300
302
301
- // Start daemon
303
+ log :: info! ( "Starting daemon" ) ;
302
304
rpc. start_mullvad_daemon ( )
303
305
. await
304
306
. expect ( "Could not start system service" ) ;
305
307
306
308
// NOTE: Need to create a new `mullvad_client` here after the restart otherwise we can't
307
309
// communicate with the daemon
310
+ log:: info!( "Reconnecting to daemon" ) ;
308
311
drop ( mullvad_client) ;
309
312
let mut mullvad_client = ctx. rpc_provider . new_client ( ) . await ;
310
313
311
- // Verify rotation has happened after a minute
312
- const KEY_ROTATION_TIMEOUT : Duration = Duration :: from_secs ( 100 ) ;
314
+ log:: info!( "Verifying that wireguard key has change" ) ;
315
+
316
+ // Check if the key rotation has already occurred when connected to the daemon, otherwise
317
+ // listen for device daemon events until we observe the change. We have to register the event
318
+ // listener before polling the current key to be sure we don't miss the change.
319
+ let event_listener = mullvad_client. events_listen ( ) . await . unwrap ( ) ;
320
+ let new_key = mullvad_client
321
+ . get_device ( )
322
+ . await
323
+ . unwrap ( )
324
+ . into_device ( )
325
+ . expect ( "Could not get device" )
326
+ . device
327
+ . pubkey ;
313
328
314
- let new_key = tokio:: time:: timeout (
315
- KEY_ROTATION_TIMEOUT ,
316
- helpers:: find_daemon_event (
317
- mullvad_client. events_listen ( ) . await . unwrap ( ) ,
318
- |daemon_event| match daemon_event {
329
+ // If key has not yet been updated, listen for changes to it
330
+ if new_key == old_key {
331
+ log:: info!( "Listening for device daemon event" ) ;
332
+ // Verify rotation has happened within 100 seconds - if the key hasn't been rotated after
333
+ // that, the rotation probably won't happen anytime soon.
334
+ let device_event = tokio:: task:: spawn ( tokio:: time:: timeout (
335
+ Duration :: from_secs ( 100 ) ,
336
+ helpers:: find_daemon_event ( event_listener, |daemon_event| match daemon_event {
319
337
DaemonEvent :: Device ( device_event) => Some ( device_event) ,
320
338
_ => None ,
321
- } ,
322
- ) ,
323
- )
324
- . await
325
- . map_err ( |_error| Error :: Daemon ( String :: from ( "Tunnel event listener timed out" ) ) ) ?
326
- . map ( |device_event| {
327
- device_event
339
+ } ) ,
340
+ ) )
341
+ . await
342
+ . unwrap ( )
343
+ . map_err ( |_error| Error :: Daemon ( String :: from ( "Tunnel event listener timed out" ) ) ) ?? ;
344
+
345
+ let new_key = device_event
328
346
. new_state
329
347
. into_device ( )
330
348
. expect ( "Could not get device" )
331
349
. device
332
- . pubkey
333
- } ) ?;
350
+ . pubkey ;
351
+
352
+ assert_ne ! ( old_key, new_key) ;
353
+ }
334
354
335
- assert_ne ! ( old_key, new_key) ;
336
355
Ok ( ( ) )
337
356
}
0 commit comments