選択できるのは25トピックまでです。 トピックは、先頭が英数字で、英数字とダッシュ('-')を使用した35文字以内のものにしてください。
 
 
 

444 行
9.7 KiB

  1. // Copyright 2012 The Go Authors. All rights reserved.
  2. // Use of this source code is governed by a BSD-style
  3. // license that can be found in the LICENSE file.
  4. // +build !windows
  5. package test
  6. // Session functional tests.
  7. import (
  8. "bytes"
  9. "errors"
  10. "fmt"
  11. "io"
  12. "strings"
  13. "testing"
  14. "golang.org/x/crypto/ssh"
  15. )
  16. func TestRunCommandSuccess(t *testing.T) {
  17. server := newServer(t)
  18. defer server.Shutdown()
  19. conn := server.Dial(clientConfig())
  20. defer conn.Close()
  21. session, err := conn.NewSession()
  22. if err != nil {
  23. t.Fatalf("session failed: %v", err)
  24. }
  25. defer session.Close()
  26. err = session.Run("true")
  27. if err != nil {
  28. t.Fatalf("session failed: %v", err)
  29. }
  30. }
  31. func TestHostKeyCheck(t *testing.T) {
  32. server := newServer(t)
  33. defer server.Shutdown()
  34. conf := clientConfig()
  35. hostDB := hostKeyDB()
  36. conf.HostKeyCallback = hostDB.Check
  37. // change the keys.
  38. hostDB.keys[ssh.KeyAlgoRSA][25]++
  39. hostDB.keys[ssh.KeyAlgoDSA][25]++
  40. hostDB.keys[ssh.KeyAlgoECDSA256][25]++
  41. conn, err := server.TryDial(conf)
  42. if err == nil {
  43. conn.Close()
  44. t.Fatalf("dial should have failed.")
  45. } else if !strings.Contains(err.Error(), "host key mismatch") {
  46. t.Fatalf("'host key mismatch' not found in %v", err)
  47. }
  48. }
  49. func TestRunCommandStdin(t *testing.T) {
  50. server := newServer(t)
  51. defer server.Shutdown()
  52. conn := server.Dial(clientConfig())
  53. defer conn.Close()
  54. session, err := conn.NewSession()
  55. if err != nil {
  56. t.Fatalf("session failed: %v", err)
  57. }
  58. defer session.Close()
  59. r, w := io.Pipe()
  60. defer r.Close()
  61. defer w.Close()
  62. session.Stdin = r
  63. err = session.Run("true")
  64. if err != nil {
  65. t.Fatalf("session failed: %v", err)
  66. }
  67. }
  68. func TestRunCommandStdinError(t *testing.T) {
  69. server := newServer(t)
  70. defer server.Shutdown()
  71. conn := server.Dial(clientConfig())
  72. defer conn.Close()
  73. session, err := conn.NewSession()
  74. if err != nil {
  75. t.Fatalf("session failed: %v", err)
  76. }
  77. defer session.Close()
  78. r, w := io.Pipe()
  79. defer r.Close()
  80. session.Stdin = r
  81. pipeErr := errors.New("closing write end of pipe")
  82. w.CloseWithError(pipeErr)
  83. err = session.Run("true")
  84. if err != pipeErr {
  85. t.Fatalf("expected %v, found %v", pipeErr, err)
  86. }
  87. }
  88. func TestRunCommandFailed(t *testing.T) {
  89. server := newServer(t)
  90. defer server.Shutdown()
  91. conn := server.Dial(clientConfig())
  92. defer conn.Close()
  93. session, err := conn.NewSession()
  94. if err != nil {
  95. t.Fatalf("session failed: %v", err)
  96. }
  97. defer session.Close()
  98. err = session.Run(`bash -c "kill -9 $$"`)
  99. if err == nil {
  100. t.Fatalf("session succeeded: %v", err)
  101. }
  102. }
  103. func TestRunCommandWeClosed(t *testing.T) {
  104. server := newServer(t)
  105. defer server.Shutdown()
  106. conn := server.Dial(clientConfig())
  107. defer conn.Close()
  108. session, err := conn.NewSession()
  109. if err != nil {
  110. t.Fatalf("session failed: %v", err)
  111. }
  112. err = session.Shell()
  113. if err != nil {
  114. t.Fatalf("shell failed: %v", err)
  115. }
  116. err = session.Close()
  117. if err != nil {
  118. t.Fatalf("shell failed: %v", err)
  119. }
  120. }
  121. func TestFuncLargeRead(t *testing.T) {
  122. server := newServer(t)
  123. defer server.Shutdown()
  124. conn := server.Dial(clientConfig())
  125. defer conn.Close()
  126. session, err := conn.NewSession()
  127. if err != nil {
  128. t.Fatalf("unable to create new session: %s", err)
  129. }
  130. stdout, err := session.StdoutPipe()
  131. if err != nil {
  132. t.Fatalf("unable to acquire stdout pipe: %s", err)
  133. }
  134. err = session.Start("dd if=/dev/urandom bs=2048 count=1024")
  135. if err != nil {
  136. t.Fatalf("unable to execute remote command: %s", err)
  137. }
  138. buf := new(bytes.Buffer)
  139. n, err := io.Copy(buf, stdout)
  140. if err != nil {
  141. t.Fatalf("error reading from remote stdout: %s", err)
  142. }
  143. if n != 2048*1024 {
  144. t.Fatalf("Expected %d bytes but read only %d from remote command", 2048, n)
  145. }
  146. }
  147. func TestKeyChange(t *testing.T) {
  148. server := newServer(t)
  149. defer server.Shutdown()
  150. conf := clientConfig()
  151. hostDB := hostKeyDB()
  152. conf.HostKeyCallback = hostDB.Check
  153. conf.RekeyThreshold = 1024
  154. conn := server.Dial(conf)
  155. defer conn.Close()
  156. for i := 0; i < 4; i++ {
  157. session, err := conn.NewSession()
  158. if err != nil {
  159. t.Fatalf("unable to create new session: %s", err)
  160. }
  161. stdout, err := session.StdoutPipe()
  162. if err != nil {
  163. t.Fatalf("unable to acquire stdout pipe: %s", err)
  164. }
  165. err = session.Start("dd if=/dev/urandom bs=1024 count=1")
  166. if err != nil {
  167. t.Fatalf("unable to execute remote command: %s", err)
  168. }
  169. buf := new(bytes.Buffer)
  170. n, err := io.Copy(buf, stdout)
  171. if err != nil {
  172. t.Fatalf("error reading from remote stdout: %s", err)
  173. }
  174. want := int64(1024)
  175. if n != want {
  176. t.Fatalf("Expected %d bytes but read only %d from remote command", want, n)
  177. }
  178. }
  179. if changes := hostDB.checkCount; changes < 4 {
  180. t.Errorf("got %d key changes, want 4", changes)
  181. }
  182. }
  183. func TestInvalidTerminalMode(t *testing.T) {
  184. server := newServer(t)
  185. defer server.Shutdown()
  186. conn := server.Dial(clientConfig())
  187. defer conn.Close()
  188. session, err := conn.NewSession()
  189. if err != nil {
  190. t.Fatalf("session failed: %v", err)
  191. }
  192. defer session.Close()
  193. if err = session.RequestPty("vt100", 80, 40, ssh.TerminalModes{255: 1984}); err == nil {
  194. t.Fatalf("req-pty failed: successful request with invalid mode")
  195. }
  196. }
  197. func TestValidTerminalMode(t *testing.T) {
  198. server := newServer(t)
  199. defer server.Shutdown()
  200. conn := server.Dial(clientConfig())
  201. defer conn.Close()
  202. session, err := conn.NewSession()
  203. if err != nil {
  204. t.Fatalf("session failed: %v", err)
  205. }
  206. defer session.Close()
  207. stdout, err := session.StdoutPipe()
  208. if err != nil {
  209. t.Fatalf("unable to acquire stdout pipe: %s", err)
  210. }
  211. stdin, err := session.StdinPipe()
  212. if err != nil {
  213. t.Fatalf("unable to acquire stdin pipe: %s", err)
  214. }
  215. tm := ssh.TerminalModes{ssh.ECHO: 0}
  216. if err = session.RequestPty("xterm", 80, 40, tm); err != nil {
  217. t.Fatalf("req-pty failed: %s", err)
  218. }
  219. err = session.Shell()
  220. if err != nil {
  221. t.Fatalf("session failed: %s", err)
  222. }
  223. stdin.Write([]byte("stty -a && exit\n"))
  224. var buf bytes.Buffer
  225. if _, err := io.Copy(&buf, stdout); err != nil {
  226. t.Fatalf("reading failed: %s", err)
  227. }
  228. if sttyOutput := buf.String(); !strings.Contains(sttyOutput, "-echo ") {
  229. t.Fatalf("terminal mode failure: expected -echo in stty output, got %s", sttyOutput)
  230. }
  231. }
  232. func TestWindowChange(t *testing.T) {
  233. server := newServer(t)
  234. defer server.Shutdown()
  235. conn := server.Dial(clientConfig())
  236. defer conn.Close()
  237. session, err := conn.NewSession()
  238. if err != nil {
  239. t.Fatalf("session failed: %v", err)
  240. }
  241. defer session.Close()
  242. stdout, err := session.StdoutPipe()
  243. if err != nil {
  244. t.Fatalf("unable to acquire stdout pipe: %s", err)
  245. }
  246. stdin, err := session.StdinPipe()
  247. if err != nil {
  248. t.Fatalf("unable to acquire stdin pipe: %s", err)
  249. }
  250. tm := ssh.TerminalModes{ssh.ECHO: 0}
  251. if err = session.RequestPty("xterm", 80, 40, tm); err != nil {
  252. t.Fatalf("req-pty failed: %s", err)
  253. }
  254. if err := session.WindowChange(100, 100); err != nil {
  255. t.Fatalf("window-change failed: %s", err)
  256. }
  257. err = session.Shell()
  258. if err != nil {
  259. t.Fatalf("session failed: %s", err)
  260. }
  261. stdin.Write([]byte("stty size && exit\n"))
  262. var buf bytes.Buffer
  263. if _, err := io.Copy(&buf, stdout); err != nil {
  264. t.Fatalf("reading failed: %s", err)
  265. }
  266. if sttyOutput := buf.String(); !strings.Contains(sttyOutput, "100 100") {
  267. t.Fatalf("terminal WindowChange failure: expected \"100 100\" stty output, got %s", sttyOutput)
  268. }
  269. }
  270. func testOneCipher(t *testing.T, cipher string, cipherOrder []string) {
  271. server := newServer(t)
  272. defer server.Shutdown()
  273. conf := clientConfig()
  274. conf.Ciphers = []string{cipher}
  275. // Don't fail if sshd doesn't have the cipher.
  276. conf.Ciphers = append(conf.Ciphers, cipherOrder...)
  277. conn, err := server.TryDial(conf)
  278. if err != nil {
  279. t.Fatalf("TryDial: %v", err)
  280. }
  281. defer conn.Close()
  282. numBytes := 4096
  283. // Exercise sending data to the server
  284. if _, _, err := conn.Conn.SendRequest("drop-me", false, make([]byte, numBytes)); err != nil {
  285. t.Fatalf("SendRequest: %v", err)
  286. }
  287. // Exercise receiving data from the server
  288. session, err := conn.NewSession()
  289. if err != nil {
  290. t.Fatalf("NewSession: %v", err)
  291. }
  292. out, err := session.Output(fmt.Sprintf("dd if=/dev/zero of=/dev/stdout bs=%d count=1", numBytes))
  293. if err != nil {
  294. t.Fatalf("Output: %v", err)
  295. }
  296. if len(out) != numBytes {
  297. t.Fatalf("got %d bytes, want %d bytes", len(out), numBytes)
  298. }
  299. }
  300. var deprecatedCiphers = []string{
  301. "aes128-cbc", "3des-cbc",
  302. "arcfour128", "arcfour256",
  303. }
  304. func TestCiphers(t *testing.T) {
  305. var config ssh.Config
  306. config.SetDefaults()
  307. cipherOrder := append(config.Ciphers, deprecatedCiphers...)
  308. for _, ciph := range cipherOrder {
  309. t.Run(ciph, func(t *testing.T) {
  310. testOneCipher(t, ciph, cipherOrder)
  311. })
  312. }
  313. }
  314. func TestMACs(t *testing.T) {
  315. var config ssh.Config
  316. config.SetDefaults()
  317. macOrder := config.MACs
  318. for _, mac := range macOrder {
  319. server := newServer(t)
  320. defer server.Shutdown()
  321. conf := clientConfig()
  322. conf.MACs = []string{mac}
  323. // Don't fail if sshd doesn't have the MAC.
  324. conf.MACs = append(conf.MACs, macOrder...)
  325. if conn, err := server.TryDial(conf); err == nil {
  326. conn.Close()
  327. } else {
  328. t.Fatalf("failed for MAC %q", mac)
  329. }
  330. }
  331. }
  332. func TestKeyExchanges(t *testing.T) {
  333. var config ssh.Config
  334. config.SetDefaults()
  335. kexOrder := config.KeyExchanges
  336. for _, kex := range kexOrder {
  337. server := newServer(t)
  338. defer server.Shutdown()
  339. conf := clientConfig()
  340. // Don't fail if sshd doesn't have the kex.
  341. conf.KeyExchanges = append([]string{kex}, kexOrder...)
  342. conn, err := server.TryDial(conf)
  343. if err == nil {
  344. conn.Close()
  345. } else {
  346. t.Errorf("failed for kex %q", kex)
  347. }
  348. }
  349. }
  350. func TestClientAuthAlgorithms(t *testing.T) {
  351. for _, key := range []string{
  352. "rsa",
  353. "dsa",
  354. "ecdsa",
  355. "ed25519",
  356. } {
  357. server := newServer(t)
  358. conf := clientConfig()
  359. conf.SetDefaults()
  360. conf.Auth = []ssh.AuthMethod{
  361. ssh.PublicKeys(testSigners[key]),
  362. }
  363. conn, err := server.TryDial(conf)
  364. if err == nil {
  365. conn.Close()
  366. } else {
  367. t.Errorf("failed for key %q", key)
  368. }
  369. server.Shutdown()
  370. }
  371. }