# Twisted, the Framework of Your Internet
# Copyright (C) 2001 Matthew W. Lefkowitz
#
# This library is free software; you can redistribute it and/or
# modify it under the terms of version 2.1 of the GNU Lesser General Public
# License as published by the Free Software Foundation.
#
# This library is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
# Lesser General Public License for more details.
#
# You should have received a copy of the GNU Lesser General Public
# License along with this library; if not, write to the Free Software
# Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
from __future__ import nested_scopes
import os, struct, sys
from twisted.conch import checkers, avatar
from twisted.conch.error import ConchError
from twisted.conch.ssh import keys, transport, factory, userauth, connection, common, session,channel
from twisted.cred import portal
from twisted.cred.credentials import IUsernamePassword
from twisted.internet import reactor, defer, protocol, error
from twisted.python import log, failure
from twisted.trial import unittest
from Crypto.PublicKey import RSA, DSA
publicRSA_openssh = "ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAGEArzJx8OYOnJmzf4tfBEvLi8DVPrJ3/c9k2I/Az64fxjHf9imyRJbixtQhlH9lfNjUIx+4LmrJH5QNRsFporcHDKOTwTTYLh5KmRpslkYHRivcJSkbh/C+BR3utDS555mV comment"
privateRSA_openssh = """-----BEGIN RSA PRIVATE KEY-----
MIIByAIBAAJhAK8ycfDmDpyZs3+LXwRLy4vA1T6yd/3PZNiPwM+uH8Yx3/YpskSW
4sbUIZR/ZXzY1CMfuC5qyR+UDUbBaaK3Bwyjk8E02C4eSpkabJZGB0Yr3CUpG4fw
vgUd7rQ0ueeZlQIBIwJgbh+1VZfr7WftK5lu7MHtqE1S1vPWZQYE3+VUn8yJADyb
Z4fsZaCrzW9lkIqXkE3GIY+ojdhZhkO1gbG0118sIgphwSWKRxK0mvh6ERxKqIt1
xJEJO74EykXZV4oNJ8sjAjEA3J9r2ZghVhGN6V8DnQrTk24Td0E8hU8AcP0FVP+8
PQm/g/aXf2QQkQT+omdHVEJrAjEAy0pL0EBH6EVS98evDCBtQw22OZT52qXlAwZ2
gyTriKFVoqjeEjt3SZKKqXHSApP/AjBLpF99zcJJZRq2abgYlf9lv1chkrWqDHUu
DZttmYJeEfiFBBavVYIF1dOlZT0G8jMCMBc7sOSZodFnAiryP+Qg9otSBjJ3bQML
pSTqy7c3a2AScC/YyOwkDaICHnnD3XyjMwIxALRzl0tQEKMXs6hH8ToUdlLROCrP
EhQ0wahUTCk1gKA4uPD6TMTChavbh4K63OvbKg==
-----END RSA PRIVATE KEY-----"""
publicDSA_openssh = "ssh-dss AAAAB3NzaC1kc3MAAABBAIbwTOSsZ7Bl7U1KyMNqV13Tu7yRAtTr70PVI3QnfrPumf2UzCgpL1ljbKxSfAi05XvrE/1vfCFAsFYXRZLhQy0AAAAVAM965Akmo6eAi7K+k9qDR4TotFAXAAAAQADZlpTW964haQWS4vC063NGdldT6xpUGDcDRqbm90CoPEa2RmNOuOqi8lnbhYraEzypYH3K4Gzv/bxCBnKtHRUAAABAK+1osyWBS0+P90u/rAuko6chZ98thUSY2kLSHp6hLKyy2bjnT29h7haELE+XHfq2bM9fckDx2FLOSIJzy83VmQ== comment"
privateDSA_openssh = """-----BEGIN DSA PRIVATE KEY-----
MIH4AgEAAkEAhvBM5KxnsGXtTUrIw2pXXdO7vJEC1OvvQ9UjdCd+s+6Z/ZTMKCkv
WWNsrFJ8CLTle+sT/W98IUCwVhdFkuFDLQIVAM965Akmo6eAi7K+k9qDR4TotFAX
AkAA2ZaU1veuIWkFkuLwtOtzRnZXU+saVBg3A0am5vdAqDxGtkZjTrjqovJZ24WK
2hM8qWB9yuBs7/28QgZyrR0VAkAr7WizJYFLT4/3S7+sC6SjpyFn3y2FRJjaQtIe
nqEsrLLZuOdPb2HuFoQsT5cd+rZsz19yQPHYUs5IgnPLzdWZAhUAl1TqdmlAG/b4
nnVchGiO9sML8MM=
-----END DSA PRIVATE KEY-----"""
publicRSA_lsh = """{KDEwOnB1YmxpYy1rZXkoMTQ6cnNhLXBrY3MxLXNoYTEoMTpuNjU6AJidzg8akh9enh1JrIQyL8mrqfnJT3sBxhDkIFXqjlyN2OK2al2s5mRVNMrhzL7rX8hptPX597nHmfAS65yA85cpKDE6ZTQ6PTiAYykpKQ==}"""
privateRSA_lsh = """(11:private-key(9:rsa-pkcs1(1:n65:\x00\x98\x9d\xce\x0f\x1a\x92\x1f^\x9e\x1dI\xac\x842/\xc9\xab\xa9\xf9\xc9O{\x01\xc6\x10\xe4 U\xea\x8e\\\x8d\xd8\xe2\xb6j]\xac\xe6dU4\xca\xe1\xcc\xbe\xeb_\xc8i\xb4\xf5\xf9\xf7\xb9\xc7\x99\xf0\x12\xeb\x9c\x80\xf3\x97)(1:e4:=8\x80c)(1:d64:h>)i\xb7\xc3z_\x94\xd30\xbd\xdf\xf5\x9d\x8d\xd7\xb4\xb2*\xcb\xef\xae~yq\xb8\x8a\xda\xae\xdf\xa3h\x9a=6{c\xb9\xf4\xa5\xe9\xe0\xf9a\xf5\xe7$*\x83\r\x1e\xcb[\xc8\xda\n\xa1\x94+\x00\x96d\xfb)(1:p33:\x00\xfd\x92\xdf\xdb\xd6\xebU\x82\xc6\x86eq9Dv\x98B\xd6\xfd\xa7\xa8,\x99\x1e\xa3\x88>\xa4A\xb7;i)(1:q33:\x00\x9a\x13\xa3\t\xd1@u\x86\xe9\xdeZym\xa8\x9c\xba\xcb\x18\x8c\xfcwJ*\x08\x0c\xac\xee\x0bU[\xd6\xff)(1:a33:\x00\xc4\xe3w\xe4\xbc\xf1q\x16\x84%D*]\xd0\x8d\xa2\xaf\x99\xff\x11\xf5\x8f\x06\xd5\x8c\xa6FH\xfe\x8e\xea\x8b)(1:b32:qx\xbd\xa6\x88\x13p\x94W\xfd\xbff\x941\xc3\xac\xa8\xaf\xe6\xaavO+\x95\xa7\x06|\x91~\xc5\xc7\xb1)(1:c32:9z\xf1\x80\xbdLE\x8c?\x8f\xd3\xe8\x05\x12\xc2@\xedZ\xec/\xb9\x8c\xdd\x07\xccM\x88g\x05jG2)))"""
publicDSA_lsh = """{KDEwOnB1YmxpYy1rZXkoMzpkc2EoMTpwNjU6AOiMNL79iqUfSqaIHIySHKt4Jlc272yYTzAXmEg77NCgtyfDjuAcHHgwTphBA1l53i/4AAiaUBcU8qPY/Ug/MPcpKDE6cTIxOgDYKP8uLv/m6aUDAA7l5hjMq6Iy7ykoMTpnNjU6ANLKfX/CG7L9o7TQzwLa/X/hb1ZZ+++bySGQep5Ka2lCLm+gff3erqKdxwn5kjqEWq/tXtnSx3rl3TgiwO5R1GEpKDE6eTY1OgDZKD/rhxonz8sugmAcf/wIIhq4M4A+XFOzkEHj0XWHGpjycC8moBWwsIXRuRYCjbl5dA6wVv+xDrf9c6a6GMhhKSkp}"""
privateDSA_lsh = """(11:private-key(3:dsa(1:p65:\x00\xe8\x8c4\xbe\xfd\x8a\xa5\x1fJ\xa6\x88\x1c\x8c\x92\x1c\xabx&W6\xefl\x98O0\x17\x98H;\xec\xd0\xa0\xb7\'\xc3\x8e\xe0\x1c\x1cx0N\x98A\x03Yy\xde/\xf8\x00\x08\x9aP\x17\x14\xf2\xa3\xd8\xfdH?0\xf7)(1:q21:\x00\xd8(\xff..\xff\xe6\xe9\xa5\x03\x00\x0e\xe5\xe6\x18\xcc\xab\xa22\xef)(1:g65:\x00\xd2\xca}\x7f\xc2\x1b\xb2\xfd\xa3\xb4\xd0\xcf\x02\xda\xfd\x7f\xe1oVY\xfb\xef\x9b\xc9!\x90z\x9eJkiB.o\xa0}\xfd\xde\xae\xa2\x9d\xc7\t\xf9\x92:\x84Z\xaf\xed^\xd9\xd2\xc7z\xe5\xdd8"\xc0\xeeQ\xd4a)(1:y65:\x00\xd9(?\xeb\x87\x1a\'\xcf\xcb.\x82`\x1c\x7f\xfc\x08"\x1a\xb83\x80>\\S\xb3\x90A\xe3\xd1u\x87\x1a\x98\xf2p/&\xa0\x15\xb0\xb0\x85\xd1\xb9\x16\x02\x8d\xb9yt\x0e\xb0V\xff\xb1\x0e\xb7\xfds\xa6\xba\x18\xc8a)(1:x20:>\xbb\xe4D\xb9\xb8\xb5\xf8\xf2-}\xf7\x0f\x90`\x968\xd3\x98Q)))"""
class SSHKeysHandlingTestCase(unittest.TestCase):
"""
test the handling of reading/signing/verifying with RSA and DSA keys
assumed test keys are in test/
"""
def testDSA(self):
"""test DSA keys
"""
self._testKey(publicDSA_openssh, privateDSA_openssh, 'openssh')
self._testKey(publicDSA_lsh, privateDSA_lsh, 'lsh')
def testRSA(self):
"""test RSA keys
"""
self._testKey(publicRSA_openssh, privateRSA_openssh, 'openssh')
self._testKey(publicRSA_lsh, privateRSA_lsh, 'lsh')
def _testKey(self, pubData, privData, keyType):
privKey = keys.getPrivateKeyObject(data = privData)
pubStr = keys.getPublicKeyString(data = pubData)
pubKey = keys.getPublicKeyObject(pubStr)
self._testKeySignVerify(privKey, pubKey)
self._testKeyFromString(privKey, pubKey, privData, pubData)
self._testGenerateKey(privKey, pubKey, privData, pubData, keyType)
def _testKeySignVerify(self, priv, pub):
testData = 'this is the test data'
sig = keys.signData(priv, testData)
self.assert_(keys.verifySignature(priv, sig, testData),
'verifying with private %s failed' %
keys.objectType(priv))
self.assert_(keys.verifySignature(pub, sig, testData),
'verifying with public %s failed' %
keys.objectType(pub))
self.failIf(keys.verifySignature(priv, sig, 'other data'),
'verified bad data with %s' %
keys.objectType(priv))
self.failIf(keys.verifySignature(priv, 'bad sig', testData),
'verified badsign with %s' %
keys.objectType(priv))
def _testKeyFromString(self, privKey, pubKey, privData, pubData):
keyType = keys.objectType(privKey)
privFS = keys.getPrivateKeyObject(data = privData)
pubFS = keys.getPublicKeyObject(keys.getPublicKeyString(data=pubData))
for k in privFS.keydata:
if getattr(privFS, k) != getattr(privKey, k):
self.fail('getting %s private key from string failed' % keyType)
for k in pubFS.keydata:
if hasattr(pubFS, k):
if getattr(pubFS, k) != getattr(pubKey, k):
self.fail('getting %s public key from string failed' % keyType)
def _testGenerateKey(self, privKey, pubKey, privData, pubData, keyType):
self.assertEquals(keys.makePublicKeyString(pubKey, 'comment', keyType), pubData)
self.assertEquals(keys.makePublicKeyString(privKey, 'comment', keyType), pubData)
self.assertEquals(keys.makePrivateKeyString(privKey, kind=keyType), privData)
encData = keys.makePrivateKeyString(privKey, passphrase='test', kind=keyType)
self.assertEquals(
keys.getPrivateKeyObject(data = encData,
passphrase = 'test').__getstate__(),
privKey.__getstate__())
# note that theTest.fail() will not cause the reactor to stop. If it is
# called inside a DelayedCall, a Deferred callback, or a reactor doRead, then
# it will be turned into a logged error and trial will report it as an ERROR
# instead of a FAILURE.
theTest = None
class CrazySubsystem(protocol.Protocol):
def __init__(self, *args, **kw):
pass
def connectionMade(self):
"""
good ... good
"""
class FalseTransport:
def __init__(self, p):
p.makeConnection(self)
p.processEnded(failure.Failure(error.ProcessTerminated(255, None, None)))
def loseConnection(self):
pass
class EchoTransport:
def __init__(self, p):
self.proto = p
p.makeConnection(self)
self.closed = 0
def write(self, data):
self.proto.outReceived(data)
self.proto.outReceived('\r\n')
def loseConnection(self):
if self.closed: return
self.closed = 1
self.proto.inConnectionLost()
self.proto.outConnectionLost()
self.proto.errConnectionLost()
self.proto.processEnded(failure.Failure(error.ProcessTerminated(0, None, None)))
class ErrEchoTransport:
def __init__(self, p):
self.proto = p
p.makeConnection(self)
self.closed = 0
def write(self, data):
self.proto.errReceived(data)
self.proto.errReceived('\r\n')
def loseConnection(self):
if self.closed: return
self.closed = 1
self.proto.inConnectionLost()
self.proto.outConnectionLost()
self.proto.errConnectionLost()
self.proto.processEnded(failure.Failure(error.ProcessTerminated(0, None, None)))
class SuperEchoTransport:
def __init__(self, p):
self.proto = p
p.makeConnection(self)
self.closed = 0
def write(self, data):
self.proto.outReceived(data)
self.proto.outReceived('\r\n')
self.proto.errReceived(data)
self.proto.errReceived('\r\n')
def loseConnection(self):
if self.closed: return
self.closed = 1
self.proto.inConnectionLost()
self.proto.outConnectionLost()
self.proto.errConnectionLost()
self.proto.processEnded(failure.Failure(error.ProcessTerminated(0, None, None)))
class ConchTestRealm:
def requestAvatar(self, avatarID, mind, *interfaces):
theTest.assertEquals(avatarID, 'testuser')
a = ConchTestAvatar()
return interfaces[0], a, a.logout
class ConchTestAvatar(avatar.ConchUser):
loggedOut = False
def __init__(self):
avatar.ConchUser.__init__(self)
self.channelLookup.update({'session': session.SSHSession})
self.subsystemLookup.update({'crazy': CrazySubsystem})
def global_foo(self, data):
global theTest
theTest.assertEquals(data, 'bar')
return 1
def global_foo_2(self, data):
global theTest
theTest.assertEquals(data, 'bar2')
return 1, 'data'
def logout(self):
loggedOut = True
class ConchSessionForTestAvatar:
def __init__(self, avatar):
theTest.assert_(isinstance(avatar, ConchTestAvatar))
self.cmd = None
self.ptyReq = False
def getPty(self, term, windowSize, attrs):
log.msg('pty req')
theTest.assertEquals(term, 'conch-test-term')
theTest.assertEquals(windowSize, (24, 80, 0, 0))
self.ptyReq = True
def openShell(self, proto):
log.msg('openning shell')
theTest.assertEquals(self.ptyReq, True)
self.proto = proto
EchoTransport(proto)
self.cmd = 'shell'
def execCommand(self, proto, cmd):
theTest.assert_(cmd.split()[0] in ['false', 'echo', 'secho', 'eecho','jumboliah'])
if cmd == 'jumboliah':
raise ConchError('bad exec')
self.cmd = cmd
self.proto = proto
f = cmd.split()[0]
if f == 'false':
FalseTransport(proto)
elif f == 'echo':
t = EchoTransport(proto)
t.write(cmd[5:])
t.loseConnection()
elif f == 'secho':
t = SuperEchoTransport(proto)
t.write(cmd[6:])
t.loseConnection()
elif f == 'eecho':
t = ErrEchoTransport(proto)
t.write(cmd[6:])
t.loseConnection()
def closed(self):
global theTest
log.msg('closing cmd %s' % self.cmd)
if self.cmd == 'echo hello':
rwl = self.proto.session.remoteWindowLeft
theTest.assertEquals(rwl, 4)
elif self.cmd == 'eecho hello':
rwl = self.proto.session.remoteWindowLeft
theTest.assertEquals(rwl, 4)
self.proto.transport.loseConnection()
from twisted.python import components
components.registerAdapter(ConchSessionForTestAvatar, ConchTestAvatar, session.ISession)
class ConchTestPublicKeyChecker(checkers.SSHPublicKeyDatabase):
def checkKey(self, credentials):
global theTest
theTest.assertEquals(credentials.username, 'testuser', 'bad username')
theTest.assertEquals(credentials.blob, keys.getPublicKeyString('dsa_test.pub'), 'bad public key')
return 1
class ConchTestPasswordChecker:
credentialInterfaces = IUsernamePassword,
def requestAvatarId(self, credentials):
global theTest
theTest.assertEquals(credentials.username, 'testuser', 'bad username')
theTest.assertEquals(credentials.password, 'testpass', 'bad password')
return defer.succeed(credentials.username)
class ConchTestSSHChecker(checkers.SSHProtocolChecker):
def areDone(self, avatarId):
global theTest
theTest.assertEquals(avatarId, 'testuser')
if len(self.successfulCredentials[avatarId]) < 2:
return 0
else:
return 1
class SSHTestBase:
done = 0
allowedToError = 0
def connectionLost(self, reason):
if self.done:
return
global theTest
if not hasattr(self,'expectedLoseConnection'):
theTest.fail('unexpectedly lost connection %s\n%s' % (self, reason))
reactor.crash()
def receiveError(self, reasonCode, desc):
global theTest
reactor.crash()
self.expectedLoseConnection = 1
if not self.allowedToError:
theTest.fail('got disconnect for %s: reason %s, desc: %s' %
(self, reasonCode, desc))
def receiveUnimplemented(self, seqID):
global theTest
reactor.crash()
theTest.fail('got unimplemented: seqid %s' % seqID)
class SSHTestServer(SSHTestBase, transport.SSHServerTransport): pass
class SSHTestClientAuth(userauth.SSHUserAuthClient):
hasTriedNone = 0 # have we tried the 'none' auth yet?
canSucceedPublicKey = 0 # can we succed with this yet?
canSucceedPassword = 0
def ssh_USERAUTH_SUCCESS(self, packet):
if not self.canSucceedPassword and self.canSucceedPublicKey:
global theTest
reactor.crash()
theTest.fail('got USERAUTH_SUCESS before password and publickey')
userauth.SSHUserAuthClient.ssh_USERAUTH_SUCCESS(self, packet)
def getPassword(self):
self.canSucceedPassword = 1
return defer.succeed('testpass')
def getPrivateKey(self):
self.canSucceedPublicKey = 1
return defer.succeed(keys.getPrivateKeyObject('dsa_test'))
def getPublicKey(self):
return keys.getPublicKeyString('dsa_test.pub')
class SSHTestClient(SSHTestBase, transport.SSHClientTransport):
def verifyHostKey(self, key, fp):
global theTest
theTest.assertEquals(key, keys.getPublicKeyString(data = publicRSA_openssh))
theTest.assertEquals(fp,'3d:13:5f:cb:c9:79:8a:93:06:27:65:bc:3d:0b:8f:af')
return defer.succeed(1)
def connectionSecure(self):
self.requestService(SSHTestClientAuth('testuser',SSHTestClientConnection()))
class SSHTestClientFactory(protocol.ClientFactory):
noisy = 0
def buildProtocol(self, addr):
self.client = SSHTestClient()
return self.client
def clientConnectionFailed(self, connector, reason):
global theTest
theTest.fail('connection between client and server failed!')
reactor.crash()
class SSHTestClientConnection(connection.SSHConnection):
name = 'ssh-connection'
results = 0
totalResults = 8
def serviceStarted(self):
self.openChannel(SSHUnknownChannel(conn = self))
self.openChannel(SSHTestFailExecChannel(conn = self))
self.openChannel(SSHTestFalseChannel(conn = self))
self.openChannel(SSHTestEchoChannel(localWindow=4, localMaxPacket=5, conn = self))
self.openChannel(SSHTestErrChannel(localWindow=4, localMaxPacket=5, conn = self))
self.openChannel(SSHTestMaxPacketChannel(localWindow=12, localMaxPacket=1, conn = self))
self.openChannel(SSHTestShellChannel(conn = self))
self.openChannel(SSHTestSubsystemChannel(conn = self))
def addResult(self):
self.results += 1
log.msg('got %s of %s results' % (self.results, self.totalResults))
if self.results == self.totalResults:
self.transport.expectedLoseConnection = 1
theTest.fac.proto.expectedLoseConnection = 1
#self.loseConnection()
self.serviceStopped()
reactor.crash()
class SSHUnknownChannel(channel.SSHChannel):
name = 'crazy-unknown-channel'
def openFailed(self, reason):
"""
good .... good
"""
log.msg('unknown open failed')
log.flushErrors()
self.conn.addResult()
def channelOpen(self, ignored):
global theTest
theTest.fail("opened unknown channel")
reactor.crash()
class SSHTestFailExecChannel(channel.SSHChannel):
name = 'session'
def openFailed(self, reason):
global theTest
theTest.fail('fail exec open failed: %s' % reason)
reactor.crash()
def channelOpen(self, ignore):
d = self.conn.sendRequest(self, 'exec', common.NS('jumboliah'), 1)
d.addCallback(self._cbRequestWorked)
d.addErrback(lambda x,s=self:log.flushErrors() and s.conn.addResult())
log.msg('opened fail exec')
def _cbRequestWorked(self, ignored):
global theTest
theTest.fail('fail exec succeeded')
reactor.crash()
class SSHTestFalseChannel(channel.SSHChannel):
name = 'session'
def openFailed(self, reason):
global theTest
theTest.fail('false open failed: %s' % reason)
reactor.crash()
def channelOpen(self, ignored):
d = self.conn.sendRequest(self, 'exec', common.NS('false'), 1)
d.addCallback(self._cbRequestWorked)
d.addErrback(self._ebRequestFailed)
log.msg('opened false')
def _cbRequestWorked(self, ignored):
pass
def _ebRequestFailed(self, reason):
global theTest
theTest.fail('false exec failed: %s' % reason)
reactor.crash()
def dataReceived(self, data):
global theTest
theTest.fail('got data when using false')
reactor.crash()
def request_exit_status(self, status):
status = struct.unpack('>L', status)[0]
if status == 0:
global theTest
theTest.fail('false exit status was 0')
reactor.crash()
log.msg('finished false')
self.conn.addResult()
self.loseConnection()
return 1
class SSHTestEchoChannel(channel.SSHChannel):
name = 'session'
testBuf = ''
eofCalled = 0
def openFailed(self, reason):
global theTest
theTest.fail('echo open failed: %s' % reason)
reactor.crash()
def channelOpen(self, ignore):
d = self.conn.sendRequest(self, 'exec', common.NS('echo hello'), 1)
d.addErrback(self._ebRequestFailed)
log.msg('opened echo')
def _ebRequestFailed(self, reason):
global theTest
theTest.fail('echo exec failed: %s' % reason)
reactor.crash()
def dataReceived(self, data):
self.testBuf += data
def errReceived(self, dataType, data):
theTest.fail('echo channel got extended data')
reactor.crash()
def request_exit_status(self, status):
self.status = struct.unpack('>L', status)[0]
def eofReceived(self):
log.msg('eof received')
self.eofCalled = 1
def closed(self):
global theTest
if self.status != 0:
theTest.fail('echo exit status was not 0: %i' % self.status)
reactor.crash()
if self.testBuf != "hello\r\n":
theTest.fail('echo did not return hello: %s' % repr(self.testBuf))
reactor.crash()
theTest.assertEquals(self.localWindowLeft, 4)
theTest.assert_(self.eofCalled)
log.msg('finished echo')
self.conn.addResult()
self.loseConnection()
return 1
class SSHTestErrChannel(channel.SSHChannel):
name = 'session'
testBuf = ''
eofCalled = 0
def openFailed(self, reason):
global theTest
theTest.fail('err open failed: %s' % reason)
reactor.crash()
def channelOpen(self, ignore):
d = self.conn.sendRequest(self, 'exec', common.NS('eecho hello'), 1)
d.addErrback(self._ebRequestFailed)
log.msg('opened err')
def _ebRequestFailed(self, reason):
global theTest
theTest.fail('err exec failed: %s' % reason)
reactor.crash()
def dataReceived(self, data):
theTest.fail('err channel got regular data: %s' % repr(data))
reactor.crash()
def extReceived(self, dataType, data):
theTest.assertEquals(dataType, connection.EXTENDED_DATA_STDERR)
self.testBuf += data
def request_exit_status(self, status):
self.status = struct.unpack('>L', status)[0]
def eofReceived(self):
log.msg('eof received')
self.eofCalled = 1
def closed(self):
global theTest
if self.status != 0:
theTest.fail('echo exit status was not 0: %i' % self.status)
reactor.crash()
if self.testBuf != "hello\r\n":
theTest.fail('err did not return hello: %s' % repr(self.testBuf))
reactor.crash()
theTest.assertEquals(self.localWindowLeft, 4)
theTest.assert_(self.eofCalled)
log.msg('finished err')
self.conn.addResult()
self.loseConnection()
return 1
class SSHTestMaxPacketChannel(channel.SSHChannel):
name = 'session'
testBuf = ''
testExtBuf = ''
eofCalled = 0
def openFailed(self, reason):
global theTest
theTest.fail('max packet open failed: %s' % reason)
reactor.crash()
def channelOpen(self, ignore):
d = self.conn.sendRequest(self, 'exec', common.NS('secho hello'), 1)
d.addErrback(self._ebRequestFailed)
log.msg('opened max packet')
def _ebRequestFailed(self, reason):
global theTest
theTest.fail('max packet exec failed: %s' % reason)
reactor.crash()
def dataReceived(self, data):
self.testBuf += data
def extReceived(self, dataType, data):
theTest.assertEquals(dataType, connection.EXTENDED_DATA_STDERR)
self.testExtBuf += data
def request_exit_status(self, status):
self.status = struct.unpack('>L', status)[0]
def eofReceived(self):
log.msg('eof received')
self.eofCalled = 1
def closed(self):
global theTest
if self.status != 0:
theTest.fail('echo exit status was not 0: %i' % self.status)
reactor.crash()
theTest.assertEquals(self.testBuf, 'hello\r\n')
theTest.assertEquals(self.testExtBuf, 'hello\r\n')
theTest.assertEquals(self.localWindowLeft, 12)
theTest.assert_(self.eofCalled)
log.msg('finished max packet')
self.conn.addResult()
self.loseConnection()
return 1
class SSHTestShellChannel(channel.SSHChannel):
name = 'session'
testBuf = ''
eofCalled = 0
def openFailed(self, reason):
theTest.fail('shell open failed: %s' % reason)
reactor.crash()
def channelOpen(self, ignored):
data = session.packRequest_pty_req('conch-test-term', (24, 80, 0, 0), '')
d = self.conn.sendRequest(self, 'pty-req', data, 1)
d.addCallback(self._cbPtyReq)
d.addErrback(self._ebPtyReq)
log.msg('opened shell')
def _cbPtyReq(self, ignored):
d = self.conn.sendRequest(self, 'shell', '', 1)
d.addCallback(self._cbShellOpen)
d.addErrback(self._ebShellOpen)
def _ebPtyReq(self, reason):
theTest.fail('pty request failed: %s' % reason)
reactor.crash()
def _cbShellOpen(self, ignored):
self.write('testing the shell!')
self.loseConnection()
def _ebShellOpen(self, reason):
theTest.fail('shell request failed: %s' % reason)
reactor.crash()
def dataReceived(self, data):
self.testBuf += data
def request_exit_status(self, status):
self.status = struct.unpack('>L', status)[0]
def eofReceived(self):
self.eofCalled = 1
def closed(self):
log.msg('calling shell closed')
if self.status != 0:
log.msg('shell exit status was not 0: %i' % self.status)
reactor.crash()
theTest.assertEquals(self.testBuf, 'testing the shell!\r\n')
theTest.assert_(self.eofCalled)
self.conn.addResult()
self.loseConnection()
class SSHTestSubsystemChannel(channel.SSHChannel):
name = 'session'
def openFailed(self, reason):
global theTest
theTest.fail('subsystem open failed: %s' % reason)
reactor.crash()
def channelOpen(self, ignore):
d = self.conn.sendRequest(self, 'subsystem', common.NS('not-crazy'), 1)
d.addCallback(self._cbRequestWorked)
d.addErrback(self._ebRequestFailed)
def _cbRequestWorked(self, ignored):
global theTest
theTest.fail('opened non-crazy subsystem')
reactor.crash()
def _ebRequestFailed(self, ignored):
d = self.conn.sendRequest(self, 'subsystem', common.NS('crazy'), 1)
d.addCallback(self._cbRealRequestWorked)
d.addErrback(self._ebRealRequestFailed)
def _cbRealRequestWorked(self, ignored):
d1 = self.conn.sendGlobalRequest('foo', 'bar', 1)
d1.addErrback(self._ebFirstGlobal)
d2 = self.conn.sendGlobalRequest('foo-2', 'bar2', 1)
d2.addCallback(lambda x,s=self: theTest.assertEquals(x, 'data'))
d2.addErrback(self._ebSecondGlobal)
d3 = self.conn.sendGlobalRequest('bar', 'foo', 1)
d3.addCallback(self._cbThirdGlobal)
d3.addErrback(lambda x,s=self: s.conn.addResult() and s.loseConnection())
def _ebRealRequestFailed(self, reason):
global theTest
theTest.fail('opening crazy subsystem failed: %s' % reason)
reactor.crash()
def _ebFirstGlobal(self, reason):
global theTest
theTest.fail('first global request failed: %s' % reason)
reactor.crash()
def _ebSecondGlobal(self, reason):
global theTest
theTest.fail('second global request failed: %s' % reason)
reactor.crash()
def _cbThirdGlobal(self, ignored):
global theTest
theTest.fail('second global request succeeded')
reactor.crash()
class SSHTestFactory(factory.SSHFactory):
noisy = 0
services = {
'ssh-userauth':userauth.SSHUserAuthServer,
'ssh-connection':connection.SSHConnection
}
def buildProtocol(self, addr):
if hasattr(self, 'proto'):
global theTest
reactor.crash()
theTest.fail('connected twice to factory')
self.proto = SSHTestServer()
self.proto.supportedPublicKeys = self.privateKeys.keys()
self.proto.factory = self
return self.proto
def getPublicKeys(self):
return {
'ssh-rsa':keys.getPublicKeyString(data=publicRSA_openssh),
'ssh-dss':keys.getPublicKeyString(data=publicDSA_openssh)
}
def getPrivateKeys(self):
return {
'ssh-rsa':keys.getPrivateKeyObject(data=privateRSA_openssh),
'ssh-dss':keys.getPrivateKeyObject(data=privateDSA_openssh)
}
def getPrimes(self):
return {
2048:[(transport.DH_GENERATOR, transport.DH_PRIME)]
}
def getService(self, trans, name):
return factory.SSHFactory.getService(self, trans, name)
class SSHTestOpenSSHProcess(protocol.ProcessProtocol):
buf = ''
done = 0
def outReceived(self, data):
self.buf += data
theTest.fac.proto.expectedLoseConnection = 1
def errReceived(self, data):
print "ERR(ssh): '%s'" % data
def processEnded(self, reason):
global theTest
self.done = 1
theTest.assertEquals(reason.value.exitCode, 0, 'exit code was not 0: %s' % reason.value.exitCode)
self.buf = self.buf.replace('\r\n', '\n')
theTest.assertEquals(self.buf, 'goodbye\n')
class SSHTransportTestCase(unittest.TestCase):
def setUp(self):
open('rsa_test','w').write(privateRSA_openssh)
open('rsa_test.pub','w').write(publicRSA_openssh)
open('dsa_test.pub','w').write(publicDSA_openssh)
open('dsa_test','w').write(privateDSA_openssh)
os.chmod('dsa_test', 33152)
os.chmod('rsa_test', 33152)
open('kh_test','w').write('localhost '+publicRSA_openssh)
def tearDown(self):
for f in ['rsa_test','rsa_test.pub','dsa_test','dsa_test.pub', 'kh_test']:
os.remove(f)
self.server.stopListening()
def testOurServerOurClient(self):
"""test the SSH server against the SSH client
"""
if os.name != 'posix':
raise unittest.SkipTest("cannot run on non-posix") # why?
global theTest
theTest = self
realm = ConchTestRealm()
p = portal.Portal(realm)
sshpc = ConchTestSSHChecker()
sshpc.registerChecker(ConchTestPasswordChecker())
sshpc.registerChecker(ConchTestPublicKeyChecker())
p.registerChecker(sshpc)
fac = SSHTestFactory()
fac.portal = p
theTest.fac = fac
self.server = reactor.listenTCP(0, fac, interface="127.0.0.1")
port = self.server.getHost().port
cfac = SSHTestClientFactory()
def _failTest():
reactor.crash()
self.fail('test took too long') # logged but caught by reactor
timeout = reactor.callLater(10, _failTest)
reactor.connectTCP('localhost', port, cfac)
reactor.run()
# test finished.. might have passed, might have failed. Must cleanup.
fac.proto.done = 1
cfac.client.done = 1
fac.proto.transport.loseConnection()
cfac.client.transport.loseConnection()
reactor.iterate()
reactor.iterate()
reactor.iterate()
try:
timeout.cancel()
except: # really just (error.AlreadyCancelled, error.AlreadyCalled)
pass
def testOurServerOpenSSHClient(self):
"""test the SSH server against the OpenSSH client
"""
if os.name != 'posix':
raise unittest.SkipTest("cannot run on non-posix")
cmdline = ('ssh -2 -l testuser -p %i '
'-oUserKnownHostsFile=kh_test '
'-oPasswordAuthentication=no '
# Always use the RSA key, since that's the one in kh_test.
'-oHostKeyAlgorithms=ssh-rsa '
'-i dsa_test '
'localhost '
'echo goodbye')
global theTest
theTest = self
realm = ConchTestRealm()
p = portal.Portal(realm)
p.registerChecker(ConchTestPublicKeyChecker())
fac = SSHTestFactory()
fac.portal = p
theTest.fac = fac
self.server = reactor.listenTCP(0, fac, interface="127.0.0.1")
port = self.server.getHost().port
ssh_path = None
for p in ['/usr', '', '/usr/local']:
if os.path.exists(p+'/bin/ssh'):
ssh_path = p+'/bin/ssh'
break
if not ssh_path:
log.msg('skipping test, cannot find ssh')
raise unittest.SkipTest, 'skipping test, cannot find ssh'
cmds = (cmdline % port).split()
p = SSHTestOpenSSHProcess()
def _failTest():
try:
os.kill(p.transport.pid, 9)
except OSError:
pass
try:
fac.proto.transport.loseConnection()
except AttributeError:
pass
reactor.iterate(0.1)
reactor.iterate(0.1)
reactor.iterate(0.1)
p.done = 1
self.fail('test took too long')
timeout = reactor.callLater(10, _failTest)
reactor.spawnProcess(p, ssh_path, cmds)
# wait for process to finish
while not p.done:
reactor.iterate(0.1)
# cleanup
fac.proto.done = 1
fac.proto.transport.loseConnection()
reactor.iterate()
try:
timeout.cancel()
except:
pass
syntax highlighted by Code2HTML, v. 0.9.1