| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287 | // Copyright 2012 The Go Authors. All rights reserved.// Use of this source code is governed by a BSD-style// license that can be found in the LICENSE file.package agentimport (	"bytes"	"crypto/rand"	"errors"	"net"	"os"	"os/exec"	"path/filepath"	"strconv"	"testing"	"github.com/gogits/gogs/modules/crypto/ssh")// startAgent executes ssh-agent, and returns a Agent interface to it.func startAgent(t *testing.T) (client Agent, socket string, cleanup func()) {	if testing.Short() {		// ssh-agent is not always available, and the key		// types supported vary by platform.		t.Skip("skipping test due to -short")	}	bin, err := exec.LookPath("ssh-agent")	if err != nil {		t.Skip("could not find ssh-agent")	}	cmd := exec.Command(bin, "-s")	out, err := cmd.Output()	if err != nil {		t.Fatalf("cmd.Output: %v", err)	}	/* Output looks like:		   SSH_AUTH_SOCK=/tmp/ssh-P65gpcqArqvH/agent.15541; export SSH_AUTH_SOCK;	           SSH_AGENT_PID=15542; export SSH_AGENT_PID;	           echo Agent pid 15542;	*/	fields := bytes.Split(out, []byte(";"))	line := bytes.SplitN(fields[0], []byte("="), 2)	line[0] = bytes.TrimLeft(line[0], "\n")	if string(line[0]) != "SSH_AUTH_SOCK" {		t.Fatalf("could not find key SSH_AUTH_SOCK in %q", fields[0])	}	socket = string(line[1])	line = bytes.SplitN(fields[2], []byte("="), 2)	line[0] = bytes.TrimLeft(line[0], "\n")	if string(line[0]) != "SSH_AGENT_PID" {		t.Fatalf("could not find key SSH_AGENT_PID in %q", fields[2])	}	pidStr := line[1]	pid, err := strconv.Atoi(string(pidStr))	if err != nil {		t.Fatalf("Atoi(%q): %v", pidStr, err)	}	conn, err := net.Dial("unix", string(socket))	if err != nil {		t.Fatalf("net.Dial: %v", err)	}	ac := NewClient(conn)	return ac, socket, func() {		proc, _ := os.FindProcess(pid)		if proc != nil {			proc.Kill()		}		conn.Close()		os.RemoveAll(filepath.Dir(socket))	}}func testAgent(t *testing.T, key interface{}, cert *ssh.Certificate, lifetimeSecs uint32) {	agent, _, cleanup := startAgent(t)	defer cleanup()	testAgentInterface(t, agent, key, cert, lifetimeSecs)}func testAgentInterface(t *testing.T, agent Agent, key interface{}, cert *ssh.Certificate, lifetimeSecs uint32) {	signer, err := ssh.NewSignerFromKey(key)	if err != nil {		t.Fatalf("NewSignerFromKey(%T): %v", key, err)	}	// The agent should start up empty.	if keys, err := agent.List(); err != nil {		t.Fatalf("RequestIdentities: %v", err)	} else if len(keys) > 0 {		t.Fatalf("got %d keys, want 0: %v", len(keys), keys)	}	// Attempt to insert the key, with certificate if specified.	var pubKey ssh.PublicKey	if cert != nil {		err = agent.Add(AddedKey{			PrivateKey:   key,			Certificate:  cert,			Comment:      "comment",			LifetimeSecs: lifetimeSecs,		})		pubKey = cert	} else {		err = agent.Add(AddedKey{PrivateKey: key, Comment: "comment", LifetimeSecs: lifetimeSecs})		pubKey = signer.PublicKey()	}	if err != nil {		t.Fatalf("insert(%T): %v", key, err)	}	// Did the key get inserted successfully?	if keys, err := agent.List(); err != nil {		t.Fatalf("List: %v", err)	} else if len(keys) != 1 {		t.Fatalf("got %v, want 1 key", keys)	} else if keys[0].Comment != "comment" {		t.Fatalf("key comment: got %v, want %v", keys[0].Comment, "comment")	} else if !bytes.Equal(keys[0].Blob, pubKey.Marshal()) {		t.Fatalf("key mismatch")	}	// Can the agent make a valid signature?	data := []byte("hello")	sig, err := agent.Sign(pubKey, data)	if err != nil {		t.Fatalf("Sign(%s): %v", pubKey.Type(), err)	}	if err := pubKey.Verify(data, sig); err != nil {		t.Fatalf("Verify(%s): %v", pubKey.Type(), err)	}}func TestAgent(t *testing.T) {	for _, keyType := range []string{"rsa", "dsa", "ecdsa"} {		testAgent(t, testPrivateKeys[keyType], nil, 0)	}}func TestCert(t *testing.T) {	cert := &ssh.Certificate{		Key:         testPublicKeys["rsa"],		ValidBefore: ssh.CertTimeInfinity,		CertType:    ssh.UserCert,	}	cert.SignCert(rand.Reader, testSigners["ecdsa"])	testAgent(t, testPrivateKeys["rsa"], cert, 0)}func TestConstraints(t *testing.T) {	testAgent(t, testPrivateKeys["rsa"], nil, 3600 /* lifetime in seconds */)}// netPipe is analogous to net.Pipe, but it uses a real net.Conn, and// therefore is buffered (net.Pipe deadlocks if both sides start with// a write.)func netPipe() (net.Conn, net.Conn, error) {	listener, err := net.Listen("tcp", "127.0.0.1:0")	if err != nil {		return nil, nil, err	}	defer listener.Close()	c1, err := net.Dial("tcp", listener.Addr().String())	if err != nil {		return nil, nil, err	}	c2, err := listener.Accept()	if err != nil {		c1.Close()		return nil, nil, err	}	return c1, c2, nil}func TestAuth(t *testing.T) {	a, b, err := netPipe()	if err != nil {		t.Fatalf("netPipe: %v", err)	}	defer a.Close()	defer b.Close()	agent, _, cleanup := startAgent(t)	defer cleanup()	if err := agent.Add(AddedKey{PrivateKey: testPrivateKeys["rsa"], Comment: "comment"}); err != nil {		t.Errorf("Add: %v", err)	}	serverConf := ssh.ServerConfig{}	serverConf.AddHostKey(testSigners["rsa"])	serverConf.PublicKeyCallback = func(c ssh.ConnMetadata, key ssh.PublicKey) (*ssh.Permissions, error) {		if bytes.Equal(key.Marshal(), testPublicKeys["rsa"].Marshal()) {			return nil, nil		}		return nil, errors.New("pubkey rejected")	}	go func() {		conn, _, _, err := ssh.NewServerConn(a, &serverConf)		if err != nil {			t.Fatalf("Server: %v", err)		}		conn.Close()	}()	conf := ssh.ClientConfig{}	conf.Auth = append(conf.Auth, ssh.PublicKeysCallback(agent.Signers))	conn, _, _, err := ssh.NewClientConn(b, "", &conf)	if err != nil {		t.Fatalf("NewClientConn: %v", err)	}	conn.Close()}func TestLockClient(t *testing.T) {	agent, _, cleanup := startAgent(t)	defer cleanup()	testLockAgent(agent, t)}func testLockAgent(agent Agent, t *testing.T) {	if err := agent.Add(AddedKey{PrivateKey: testPrivateKeys["rsa"], Comment: "comment 1"}); err != nil {		t.Errorf("Add: %v", err)	}	if err := agent.Add(AddedKey{PrivateKey: testPrivateKeys["dsa"], Comment: "comment dsa"}); err != nil {		t.Errorf("Add: %v", err)	}	if keys, err := agent.List(); err != nil {		t.Errorf("List: %v", err)	} else if len(keys) != 2 {		t.Errorf("Want 2 keys, got %v", keys)	}	passphrase := []byte("secret")	if err := agent.Lock(passphrase); err != nil {		t.Errorf("Lock: %v", err)	}	if keys, err := agent.List(); err != nil {		t.Errorf("List: %v", err)	} else if len(keys) != 0 {		t.Errorf("Want 0 keys, got %v", keys)	}	signer, _ := ssh.NewSignerFromKey(testPrivateKeys["rsa"])	if _, err := agent.Sign(signer.PublicKey(), []byte("hello")); err == nil {		t.Fatalf("Sign did not fail")	}	if err := agent.Remove(signer.PublicKey()); err == nil {		t.Fatalf("Remove did not fail")	}	if err := agent.RemoveAll(); err == nil {		t.Fatalf("RemoveAll did not fail")	}	if err := agent.Unlock(nil); err == nil {		t.Errorf("Unlock with wrong passphrase succeeded")	}	if err := agent.Unlock(passphrase); err != nil {		t.Errorf("Unlock: %v", err)	}	if err := agent.Remove(signer.PublicKey()); err != nil {		t.Fatalf("Remove: %v", err)	}	if keys, err := agent.List(); err != nil {		t.Errorf("List: %v", err)	} else if len(keys) != 1 {		t.Errorf("Want 1 keys, got %v", keys)	}}
 |