Upgrade to Go 1.17
This includes the addition of the new "//go:build" comment form in addition
to the legacy "// +build" notation, as produced by gofmt to ensure
consistent behavior between Go versions. The new directives are all
equivalent to what was present before, so there's no change in behavior.
Go 1.17 continues to use the Unicode 13 tables as in Go 1.16, so this
upgrade does not require also upgrading our Unicode-related dependencies.
This upgrade includes the following breaking changes which will also
appear as breaking changes for Terraform users, but that are consistent
with the Terraform v1.0 compatibility promises.
- On MacOS, Terraform now requires macOS 10.13 High Sierra or later.
This upgrade also includes the following breaking changes which will
appear as breaking changes for Terraform users that are inconsistent with
our compatibility promises, but have justified exceptions as follows:
- cidrsubnet, cidrhost, and cidrnetmask will now reject IPv4 CIDR
addresses whose decimal components have leading zeros, where previously
they would just silently ignore those leading zeros.
This is a security-motivated exception to our compatibility promises,
because some external systems interpret zero-prefixed octets as octal
numbers rather than decimal, and thus the previous lenient parsing could
lead to a different interpretation of the address between systems, and
thus potentially allow bypassing policy when configuring firewall rules
etc.
This upgrade also includes the following breaking changes which could
_potentially_ appear as breaking changes for Terraform users, but that do
not in practice for the reasons given:
- The Go net/url package no longer allows query strings with pairs
separated by semicolons instead of ampersands. This primarily affects
HTTP servers written in Go, and Terraform includes a special temporary
HTTP server as part of its implementation of OAuth for "terraform login",
but that server only needs to accept URLs created by Terraform itself
and Terraform does not generate any URLs that would be rejected.
2021-08-17 02:19:17 +02:00
|
|
|
//go:build !race
|
2014-07-10 23:52:43 +02:00
|
|
|
// +build !race
|
|
|
|
|
|
|
|
package ssh
|
|
|
|
|
|
|
|
import (
|
2017-02-10 15:12:42 +01:00
|
|
|
"bufio"
|
2014-07-10 23:52:43 +02:00
|
|
|
"bytes"
|
2018-02-14 20:02:30 +01:00
|
|
|
"encoding/base64"
|
2014-07-10 23:52:43 +02:00
|
|
|
"fmt"
|
2017-02-10 15:12:42 +01:00
|
|
|
"io"
|
|
|
|
"io/ioutil"
|
|
|
|
"math/rand"
|
2014-07-10 23:52:43 +02:00
|
|
|
"net"
|
2017-02-10 15:12:42 +01:00
|
|
|
"os"
|
|
|
|
"path/filepath"
|
2015-04-30 18:02:33 +02:00
|
|
|
"regexp"
|
2018-02-14 20:02:30 +01:00
|
|
|
"strconv"
|
2015-04-09 21:58:00 +02:00
|
|
|
"strings"
|
2014-07-10 23:52:43 +02:00
|
|
|
"testing"
|
2018-03-15 15:50:17 +01:00
|
|
|
"time"
|
2015-04-09 23:40:40 +02:00
|
|
|
|
2021-05-17 19:00:12 +02:00
|
|
|
"github.com/hashicorp/terraform/internal/communicator/remote"
|
2020-11-25 18:40:42 +01:00
|
|
|
"github.com/zclconf/go-cty/cty"
|
2015-04-09 23:40:40 +02:00
|
|
|
"golang.org/x/crypto/ssh"
|
2014-07-10 23:52:43 +02:00
|
|
|
)
|
|
|
|
|
|
|
|
// private key for mock server
|
|
|
|
const testServerPrivateKey = `-----BEGIN RSA PRIVATE KEY-----
|
|
|
|
MIIEpAIBAAKCAQEA19lGVsTqIT5iiNYRgnoY1CwkbETW5cq+Rzk5v/kTlf31XpSU
|
|
|
|
70HVWkbTERECjaYdXM2gGcbb+sxpq6GtXf1M3kVomycqhxwhPv4Cr6Xp4WT/jkFx
|
|
|
|
9z+FFzpeodGJWjOH6L2H5uX1Cvr9EDdQp9t9/J32/qBFntY8GwoUI/y/1MSTmMiF
|
|
|
|
tupdMODN064vd3gyMKTwrlQ8tZM6aYuyOPsutLlUY7M5x5FwMDYvnPDSeyT/Iw0z
|
|
|
|
s3B+NCyqeeMd2T7YzQFnRATj0M7rM5LoSs7DVqVriOEABssFyLj31PboaoLhOKgc
|
|
|
|
qoM9khkNzr7FHVvi+DhYM2jD0DwvqZLN6NmnLwIDAQABAoIBAQCGVj+kuSFOV1lT
|
|
|
|
+IclQYA6bM6uY5mroqcSBNegVxCNhWU03BxlW//BE9tA/+kq53vWylMeN9mpGZea
|
|
|
|
riEMIh25KFGWXqXlOOioH8bkMsqA8S7sBmc7jljyv+0toQ9vCCtJ+sueNPhxQQxH
|
|
|
|
D2YvUjfzBQ04I9+wn30BByDJ1QA/FoPsunxIOUCcRBE/7jxuLYcpR+JvEF68yYIh
|
|
|
|
atXRld4W4in7T65YDR8jK1Uj9XAcNeDYNpT/M6oFLx1aPIlkG86aCWRO19S1jLPT
|
|
|
|
b1ZAKHHxPMCVkSYW0RqvIgLXQOR62D0Zne6/2wtzJkk5UCjkSQ2z7ZzJpMkWgDgN
|
|
|
|
ifCULFPBAoGBAPoMZ5q1w+zB+knXUD33n1J+niN6TZHJulpf2w5zsW+m2K6Zn62M
|
|
|
|
MXndXlVAHtk6p02q9kxHdgov34Uo8VpuNjbS1+abGFTI8NZgFo+bsDxJdItemwC4
|
|
|
|
KJ7L1iz39hRN/ZylMRLz5uTYRGddCkeIHhiG2h7zohH/MaYzUacXEEy3AoGBANz8
|
|
|
|
e/msleB+iXC0cXKwds26N4hyMdAFE5qAqJXvV3S2W8JZnmU+sS7vPAWMYPlERPk1
|
|
|
|
D8Q2eXqdPIkAWBhrx4RxD7rNc5qFNcQWEhCIxC9fccluH1y5g2M+4jpMX2CT8Uv+
|
|
|
|
3z+NoJ5uDTXZTnLCfoZzgZ4nCZVZ+6iU5U1+YXFJAoGBANLPpIV920n/nJmmquMj
|
|
|
|
orI1R/QXR9Cy56cMC65agezlGOfTYxk5Cfl5Ve+/2IJCfgzwJyjWUsFx7RviEeGw
|
|
|
|
64o7JoUom1HX+5xxdHPsyZ96OoTJ5RqtKKoApnhRMamau0fWydH1yeOEJd+TRHhc
|
|
|
|
XStGfhz8QNa1dVFvENczja1vAoGABGWhsd4VPVpHMc7lUvrf4kgKQtTC2PjA4xoc
|
|
|
|
QJ96hf/642sVE76jl+N6tkGMzGjnVm4P2j+bOy1VvwQavKGoXqJBRd5Apppv727g
|
|
|
|
/SM7hBXKFc/zH80xKBBgP/i1DR7kdjakCoeu4ngeGywvu2jTS6mQsqzkK+yWbUxJ
|
|
|
|
I7mYBsECgYB/KNXlTEpXtz/kwWCHFSYA8U74l7zZbVD8ul0e56JDK+lLcJ0tJffk
|
|
|
|
gqnBycHj6AhEycjda75cs+0zybZvN4x65KZHOGW/O/7OAWEcZP5TPb3zf9ned3Hl
|
|
|
|
NsZoFj52ponUM6+99A2CmezFCN16c4mbA//luWF+k3VVqR6BpkrhKw==
|
|
|
|
-----END RSA PRIVATE KEY-----`
|
|
|
|
|
2018-02-14 21:23:07 +01:00
|
|
|
// this cert was signed by the key from testCAPublicKey
|
|
|
|
const testServerHostCert = `ssh-rsa-cert-v01@openssh.com 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`
|
2014-07-10 23:52:43 +02:00
|
|
|
|
2018-02-14 21:23:07 +01:00
|
|
|
const testCAPublicKey = `ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCrozyZIhdEvalCn+eSzHH94cO9ykiywA13ntWI7mJcHBwYTeCYWG8E9zGXyp2iDOjCGudM0Tdt8o0OofKChk9Z/qiUN0G8y1kmaXBlBM3qA5R9NPpvMYMNkYLfX6ivtZCnqrsbzaoqN2Oc/7H2StHzJWh/XCGu9otQZA6vdv1oSmAsZOjw/xIGaGQqDUaLq21J280PP1qSbdJHf76iSHE+TWe3YpqV946JWM5tCh0DykZ10VznvxYpUjzhr07IN3tVKxOXbPnnU7lX6IaLIWgfzLqwSyheeux05c3JLF9iF4sFu8ou4hwQz1iuUTU1jxgwZP0w/bkXgFFs0949lW81`
|
|
|
|
|
2018-09-19 02:36:39 +02:00
|
|
|
func newMockLineServer(t *testing.T, signer ssh.Signer, pubKey string) string {
|
2018-02-14 21:23:07 +01:00
|
|
|
serverConfig := &ssh.ServerConfig{
|
|
|
|
PasswordCallback: acceptUserPass("user", "pass"),
|
2018-09-19 02:36:39 +02:00
|
|
|
PublicKeyCallback: acceptPublicKey(pubKey),
|
2018-02-14 21:23:07 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
var err error
|
|
|
|
if signer == nil {
|
|
|
|
signer, err = ssh.ParsePrivateKey([]byte(testServerPrivateKey))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("unable to parse private key: %s", err)
|
|
|
|
}
|
2014-07-10 23:52:43 +02:00
|
|
|
}
|
|
|
|
serverConfig.AddHostKey(signer)
|
|
|
|
|
|
|
|
l, err := net.Listen("tcp", "127.0.0.1:0")
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Unable to listen for connection: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
go func() {
|
|
|
|
defer l.Close()
|
|
|
|
c, err := l.Accept()
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("Unable to accept incoming connection: %s", err)
|
|
|
|
}
|
|
|
|
defer c.Close()
|
|
|
|
conn, chans, _, err := ssh.NewServerConn(c, serverConfig)
|
|
|
|
if err != nil {
|
|
|
|
t.Logf("Handshaking error: %v", err)
|
|
|
|
}
|
|
|
|
t.Log("Accepted SSH connection")
|
2015-04-09 23:40:40 +02:00
|
|
|
|
2014-07-10 23:52:43 +02:00
|
|
|
for newChannel := range chans {
|
2015-04-09 23:40:40 +02:00
|
|
|
channel, requests, err := newChannel.Accept()
|
2014-07-10 23:52:43 +02:00
|
|
|
if err != nil {
|
|
|
|
t.Errorf("Unable to accept channel.")
|
|
|
|
}
|
|
|
|
t.Log("Accepted channel")
|
|
|
|
|
2015-04-09 23:40:40 +02:00
|
|
|
go func(in <-chan *ssh.Request) {
|
2020-12-01 22:52:56 +01:00
|
|
|
defer channel.Close()
|
2015-04-09 23:40:40 +02:00
|
|
|
for req := range in {
|
2019-07-11 03:28:58 +02:00
|
|
|
// since this channel's requests are serviced serially,
|
|
|
|
// this will block keepalive probes, and can simulate a
|
|
|
|
// hung connection.
|
|
|
|
if bytes.Contains(req.Payload, []byte("sleep")) {
|
|
|
|
time.Sleep(time.Second)
|
|
|
|
}
|
|
|
|
|
2015-04-09 23:40:40 +02:00
|
|
|
if req.WantReply {
|
|
|
|
req.Reply(true, nil)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}(requests)
|
2014-07-10 23:52:43 +02:00
|
|
|
}
|
|
|
|
conn.Close()
|
|
|
|
}()
|
|
|
|
|
|
|
|
return l.Addr().String()
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestNew_Invalid(t *testing.T) {
|
2018-09-19 02:36:39 +02:00
|
|
|
address := newMockLineServer(t, nil, testClientPublicKey)
|
2015-04-09 21:58:00 +02:00
|
|
|
parts := strings.Split(address, ":")
|
|
|
|
|
2020-11-25 18:40:42 +01:00
|
|
|
v := cty.ObjectVal(map[string]cty.Value{
|
|
|
|
"type": cty.StringVal("ssh"),
|
|
|
|
"user": cty.StringVal("user"),
|
|
|
|
"password": cty.StringVal("i-am-invalid"),
|
|
|
|
"host": cty.StringVal(parts[0]),
|
|
|
|
"port": cty.StringVal(parts[1]),
|
|
|
|
"timeout": cty.StringVal("30s"),
|
|
|
|
})
|
2014-07-10 23:52:43 +02:00
|
|
|
|
2020-11-25 18:40:42 +01:00
|
|
|
c, err := New(v)
|
2015-04-09 21:58:00 +02:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("error creating communicator: %s", err)
|
2014-07-10 23:52:43 +02:00
|
|
|
}
|
|
|
|
|
2015-04-09 21:58:00 +02:00
|
|
|
err = c.Connect(nil)
|
2014-07-10 23:52:43 +02:00
|
|
|
if err == nil {
|
|
|
|
t.Fatal("should have had an error connecting")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-02-12 11:07:17 +01:00
|
|
|
func TestNew_InvalidHost(t *testing.T) {
|
2020-11-25 18:40:42 +01:00
|
|
|
v := cty.ObjectVal(map[string]cty.Value{
|
|
|
|
"type": cty.StringVal("ssh"),
|
|
|
|
"user": cty.StringVal("user"),
|
|
|
|
"password": cty.StringVal("i-am-invalid"),
|
|
|
|
"port": cty.StringVal("22"),
|
|
|
|
"timeout": cty.StringVal("30s"),
|
|
|
|
})
|
2020-02-12 11:07:17 +01:00
|
|
|
|
2020-11-25 18:40:42 +01:00
|
|
|
_, err := New(v)
|
2020-02-12 11:07:17 +01:00
|
|
|
if err == nil {
|
|
|
|
t.Fatal("should have had an error creating communicator")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-07-10 23:52:43 +02:00
|
|
|
func TestStart(t *testing.T) {
|
2018-09-19 02:36:39 +02:00
|
|
|
address := newMockLineServer(t, nil, testClientPublicKey)
|
2015-04-09 21:58:00 +02:00
|
|
|
parts := strings.Split(address, ":")
|
|
|
|
|
2020-11-25 18:40:42 +01:00
|
|
|
v := cty.ObjectVal(map[string]cty.Value{
|
|
|
|
"type": cty.StringVal("ssh"),
|
|
|
|
"user": cty.StringVal("user"),
|
|
|
|
"password": cty.StringVal("pass"),
|
|
|
|
"host": cty.StringVal(parts[0]),
|
|
|
|
"port": cty.StringVal(parts[1]),
|
|
|
|
"timeout": cty.StringVal("30s"),
|
|
|
|
})
|
2014-07-10 23:52:43 +02:00
|
|
|
|
2020-11-25 18:40:42 +01:00
|
|
|
c, err := New(v)
|
2014-07-10 23:52:43 +02:00
|
|
|
if err != nil {
|
2015-04-09 21:58:00 +02:00
|
|
|
t.Fatalf("error creating communicator: %s", err)
|
2014-07-10 23:52:43 +02:00
|
|
|
}
|
|
|
|
|
2015-04-09 21:58:00 +02:00
|
|
|
var cmd remote.Cmd
|
2014-07-10 23:52:43 +02:00
|
|
|
stdout := new(bytes.Buffer)
|
|
|
|
cmd.Command = "echo foo"
|
|
|
|
cmd.Stdout = stdout
|
|
|
|
|
2015-07-02 22:41:23 +02:00
|
|
|
err = c.Start(&cmd)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("error executing remote command: %s", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-02-22 19:58:07 +01:00
|
|
|
// TestKeepAlives verifies that the keepalive messages don't interfere with
|
|
|
|
// normal operation of the client.
|
|
|
|
func TestKeepAlives(t *testing.T) {
|
2019-07-11 03:28:58 +02:00
|
|
|
ivl := keepAliveInterval
|
|
|
|
keepAliveInterval = 250 * time.Millisecond
|
|
|
|
defer func() { keepAliveInterval = ivl }()
|
|
|
|
|
2019-02-23 02:41:37 +01:00
|
|
|
address := newMockLineServer(t, nil, testClientPublicKey)
|
2019-02-22 19:58:07 +01:00
|
|
|
parts := strings.Split(address, ":")
|
|
|
|
|
2020-11-25 18:40:42 +01:00
|
|
|
v := cty.ObjectVal(map[string]cty.Value{
|
|
|
|
"type": cty.StringVal("ssh"),
|
|
|
|
"user": cty.StringVal("user"),
|
|
|
|
"password": cty.StringVal("pass"),
|
|
|
|
"host": cty.StringVal(parts[0]),
|
|
|
|
"port": cty.StringVal(parts[1]),
|
|
|
|
})
|
2019-02-22 19:58:07 +01:00
|
|
|
|
2020-11-25 18:40:42 +01:00
|
|
|
c, err := New(v)
|
2019-02-22 19:58:07 +01:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("error creating communicator: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := c.Connect(nil); err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
var cmd remote.Cmd
|
|
|
|
stdout := new(bytes.Buffer)
|
2019-07-11 03:28:58 +02:00
|
|
|
cmd.Command = "sleep"
|
2019-02-22 19:58:07 +01:00
|
|
|
cmd.Stdout = stdout
|
|
|
|
|
|
|
|
// wait a bit before executing the command, so that at least 1 keepalive is sent
|
2019-07-11 03:28:58 +02:00
|
|
|
time.Sleep(500 * time.Millisecond)
|
2019-02-22 19:58:07 +01:00
|
|
|
|
|
|
|
err = c.Start(&cmd)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("error executing remote command: %s", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-07-11 03:28:58 +02:00
|
|
|
// TestDeadConnection verifies that failed keepalive messages will eventually
|
|
|
|
// kill the connection.
|
|
|
|
func TestFailedKeepAlives(t *testing.T) {
|
|
|
|
ivl := keepAliveInterval
|
|
|
|
del := maxKeepAliveDelay
|
|
|
|
maxKeepAliveDelay = 500 * time.Millisecond
|
|
|
|
keepAliveInterval = 250 * time.Millisecond
|
|
|
|
defer func() {
|
|
|
|
keepAliveInterval = ivl
|
|
|
|
maxKeepAliveDelay = del
|
|
|
|
}()
|
|
|
|
|
|
|
|
address := newMockLineServer(t, nil, testClientPublicKey)
|
|
|
|
parts := strings.Split(address, ":")
|
|
|
|
|
2020-11-25 18:40:42 +01:00
|
|
|
v := cty.ObjectVal(map[string]cty.Value{
|
|
|
|
"type": cty.StringVal("ssh"),
|
|
|
|
"user": cty.StringVal("user"),
|
|
|
|
"password": cty.StringVal("pass"),
|
|
|
|
"host": cty.StringVal(parts[0]),
|
|
|
|
"port": cty.StringVal(parts[1]),
|
|
|
|
"timeout": cty.StringVal("30s"),
|
|
|
|
})
|
2019-07-11 03:28:58 +02:00
|
|
|
|
2020-11-25 18:40:42 +01:00
|
|
|
c, err := New(v)
|
2019-07-11 03:28:58 +02:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("error creating communicator: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := c.Connect(nil); err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
var cmd remote.Cmd
|
|
|
|
stdout := new(bytes.Buffer)
|
|
|
|
cmd.Command = "sleep"
|
|
|
|
cmd.Stdout = stdout
|
|
|
|
|
|
|
|
err = c.Start(&cmd)
|
|
|
|
if err == nil {
|
|
|
|
t.Fatal("expected connection error")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-03-15 15:50:17 +01:00
|
|
|
func TestLostConnection(t *testing.T) {
|
2018-09-19 02:36:39 +02:00
|
|
|
address := newMockLineServer(t, nil, testClientPublicKey)
|
2018-03-15 15:50:17 +01:00
|
|
|
parts := strings.Split(address, ":")
|
|
|
|
|
2020-11-25 18:40:42 +01:00
|
|
|
v := cty.ObjectVal(map[string]cty.Value{
|
|
|
|
"type": cty.StringVal("ssh"),
|
|
|
|
"user": cty.StringVal("user"),
|
|
|
|
"password": cty.StringVal("pass"),
|
|
|
|
"host": cty.StringVal(parts[0]),
|
|
|
|
"port": cty.StringVal(parts[1]),
|
|
|
|
"timeout": cty.StringVal("30s"),
|
|
|
|
})
|
2018-03-15 15:50:17 +01:00
|
|
|
|
2020-11-25 18:40:42 +01:00
|
|
|
c, err := New(v)
|
2018-03-15 15:50:17 +01:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("error creating communicator: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
var cmd remote.Cmd
|
|
|
|
stdout := new(bytes.Buffer)
|
|
|
|
cmd.Command = "echo foo"
|
|
|
|
cmd.Stdout = stdout
|
|
|
|
|
|
|
|
err = c.Start(&cmd)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("error executing remote command: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// The test server can't execute anything, so Wait will block, unless
|
|
|
|
// there's an error. Disconnect the communicator transport, to cause the
|
|
|
|
// command to fail.
|
|
|
|
go func() {
|
|
|
|
time.Sleep(100 * time.Millisecond)
|
|
|
|
c.Disconnect()
|
|
|
|
}()
|
|
|
|
|
2018-03-16 15:54:53 +01:00
|
|
|
err = cmd.Wait()
|
|
|
|
if err == nil {
|
2018-03-15 15:50:17 +01:00
|
|
|
t.Fatal("expected communicator error")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-02-14 20:02:30 +01:00
|
|
|
func TestHostKey(t *testing.T) {
|
|
|
|
// get the server's public key
|
|
|
|
signer, err := ssh.ParsePrivateKey([]byte(testServerPrivateKey))
|
|
|
|
if err != nil {
|
2018-09-19 02:36:39 +02:00
|
|
|
t.Fatalf("unable to parse private key: %v", err)
|
2018-02-14 20:02:30 +01:00
|
|
|
}
|
|
|
|
pubKey := fmt.Sprintf("ssh-rsa %s", base64.StdEncoding.EncodeToString(signer.PublicKey().Marshal()))
|
|
|
|
|
2018-09-19 02:36:39 +02:00
|
|
|
address := newMockLineServer(t, nil, testClientPublicKey)
|
2018-02-14 20:02:30 +01:00
|
|
|
host, p, _ := net.SplitHostPort(address)
|
|
|
|
port, _ := strconv.Atoi(p)
|
|
|
|
|
|
|
|
connInfo := &connectionInfo{
|
|
|
|
User: "user",
|
|
|
|
Password: "pass",
|
|
|
|
Host: host,
|
|
|
|
HostKey: pubKey,
|
2021-05-10 19:57:11 +02:00
|
|
|
Port: uint16(port),
|
2018-02-14 20:02:30 +01:00
|
|
|
Timeout: "30s",
|
|
|
|
}
|
|
|
|
|
|
|
|
cfg, err := prepareSSHConfig(connInfo)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
c := &Communicator{
|
|
|
|
connInfo: connInfo,
|
|
|
|
config: cfg,
|
|
|
|
}
|
|
|
|
|
|
|
|
var cmd remote.Cmd
|
|
|
|
stdout := new(bytes.Buffer)
|
|
|
|
cmd.Command = "echo foo"
|
|
|
|
cmd.Stdout = stdout
|
|
|
|
|
|
|
|
if err := c.Start(&cmd); err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
if err := c.Disconnect(); err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// now check with the wrong HostKey
|
2018-09-19 02:36:39 +02:00
|
|
|
address = newMockLineServer(t, nil, testClientPublicKey)
|
2018-02-14 20:02:30 +01:00
|
|
|
_, p, _ = net.SplitHostPort(address)
|
|
|
|
port, _ = strconv.Atoi(p)
|
|
|
|
|
|
|
|
connInfo.HostKey = testClientPublicKey
|
2021-05-10 19:57:11 +02:00
|
|
|
connInfo.Port = uint16(port)
|
2018-02-14 20:02:30 +01:00
|
|
|
|
|
|
|
cfg, err = prepareSSHConfig(connInfo)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
c = &Communicator{
|
|
|
|
connInfo: connInfo,
|
|
|
|
config: cfg,
|
|
|
|
}
|
|
|
|
|
|
|
|
err = c.Start(&cmd)
|
|
|
|
if err == nil || !strings.Contains(err.Error(), "mismatch") {
|
|
|
|
t.Fatalf("expected host key mismatch, got error:%v", err)
|
|
|
|
}
|
2018-02-14 21:23:07 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
func TestHostCert(t *testing.T) {
|
|
|
|
pk, _, _, _, err := ssh.ParseAuthorizedKey([]byte(testServerHostCert))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
signer, err := ssh.ParsePrivateKey([]byte(testServerPrivateKey))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
2018-02-14 20:02:30 +01:00
|
|
|
|
2018-02-14 21:23:07 +01:00
|
|
|
signer, err = ssh.NewCertSigner(pk.(*ssh.Certificate), signer)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
2018-09-19 02:36:39 +02:00
|
|
|
address := newMockLineServer(t, signer, testClientPublicKey)
|
2018-02-14 21:23:07 +01:00
|
|
|
host, p, _ := net.SplitHostPort(address)
|
|
|
|
port, _ := strconv.Atoi(p)
|
|
|
|
|
|
|
|
connInfo := &connectionInfo{
|
|
|
|
User: "user",
|
|
|
|
Password: "pass",
|
|
|
|
Host: host,
|
|
|
|
HostKey: testCAPublicKey,
|
2021-05-10 19:57:11 +02:00
|
|
|
Port: uint16(port),
|
2018-02-14 21:23:07 +01:00
|
|
|
Timeout: "30s",
|
|
|
|
}
|
|
|
|
|
|
|
|
cfg, err := prepareSSHConfig(connInfo)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
c := &Communicator{
|
|
|
|
connInfo: connInfo,
|
|
|
|
config: cfg,
|
|
|
|
}
|
|
|
|
|
|
|
|
var cmd remote.Cmd
|
|
|
|
stdout := new(bytes.Buffer)
|
|
|
|
cmd.Command = "echo foo"
|
|
|
|
cmd.Stdout = stdout
|
|
|
|
|
|
|
|
if err := c.Start(&cmd); err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
if err := c.Disconnect(); err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// now check with the wrong HostKey
|
2018-09-19 02:36:39 +02:00
|
|
|
address = newMockLineServer(t, signer, testClientPublicKey)
|
2018-02-14 21:23:07 +01:00
|
|
|
_, p, _ = net.SplitHostPort(address)
|
|
|
|
port, _ = strconv.Atoi(p)
|
|
|
|
|
|
|
|
connInfo.HostKey = testClientPublicKey
|
2021-05-10 19:57:11 +02:00
|
|
|
connInfo.Port = uint16(port)
|
2018-02-14 21:23:07 +01:00
|
|
|
|
|
|
|
cfg, err = prepareSSHConfig(connInfo)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
c = &Communicator{
|
|
|
|
connInfo: connInfo,
|
|
|
|
config: cfg,
|
|
|
|
}
|
|
|
|
|
|
|
|
err = c.Start(&cmd)
|
|
|
|
if err == nil || !strings.Contains(err.Error(), "authorities") {
|
|
|
|
t.Fatalf("expected host key mismatch, got error:%v", err)
|
|
|
|
}
|
2018-02-14 20:02:30 +01:00
|
|
|
}
|
|
|
|
|
2018-09-19 02:36:39 +02:00
|
|
|
const SERVER_PEM = `-----BEGIN RSA PRIVATE KEY-----
|
|
|
|
MIIEpAIBAAKCAQEA8CkDr7uxCFt6lQUVwS8NyPO+fQNxORoGnMnN/XhVJZvpqyKR
|
|
|
|
Uji9R0d8D66bYxUUsabXjP2y4HTVzbZtnvXFZZshk0cOtJjjekpYJaLK2esPR/iX
|
|
|
|
wvSltNkrDQDPN/RmgEEMIevW8AgrPsqrnybFHxTpd7rEUHXBOe4nMNRIg3XHykB6
|
|
|
|
jZk8q5bBPUe3I/f0DK5TJEBpTc6dO3P/j93u55VUqr39/SPRHnld2mCw+c8v6UOh
|
|
|
|
sssO/DIZFPScD3DYqsk2N+/nz9zXfcOTdWGhawgxuIo1DTokrNQbG3pDrLqcWgqj
|
|
|
|
13vqJFCmRA0O2CQIwJePd6+Np/XO3Uh/KL6FlQIDAQABAoIBAQCmvQMXNmvCDqk7
|
|
|
|
30zsVDvw4fHGH+azK3Od1aqTqcEMHISOUbCtckFPxLzIsoSltRQqB1kuRVG07skm
|
|
|
|
Stsu+xny4lLcSwBVuLRuykEK2EyYIc/5Owo6y9pkhkaSf5ZfFes4bnD6+B/BhRpp
|
|
|
|
PRMMq0E+xCkX/G6iIi9mhgdlqm0x/vKtjzQeeshw9+gRcRLUpX+UeKFKXMXcDayx
|
|
|
|
qekr1bAaQKNBhTK+CbZjcqzG4f+BXVGRTZ9nsPAV+yTnWUCU0TghwPmtthHbebqa
|
|
|
|
9hlkum7qik/bQj/tjJ8/b0vTfHQSVxhtPG/ZV2Tn9ZuL/vrkYqeyMU8XkJ/uaEvH
|
|
|
|
WPyOcB4BAoGBAP5o5JSEtPog+U3JFrLNSRjz5ofZNVkJzice+0XyqlzJDHhX5tF8
|
|
|
|
mriYQZLLXYhckBm4IdkhTn/dVbXNQTzyy2WVuO5nU8bkCMvGL9CGpW4YGqwGf7NX
|
|
|
|
e4H3emtRjLv8VZpUHe/RUUDhmYvMSt1qmXuskfpROuGfLhQBUd6A4J+BAoGBAPGp
|
|
|
|
UcMKjrxZ5qjYU6DLgS+xeca4Eu70HgdbSQbRo45WubXjyXvTRFij36DrpxJWf1D7
|
|
|
|
lIsyBifoTra/lAuC1NQXGYWjTCdk2ey8Ll5qOgiXvE6lINHABr+U/Z90/g6LuML2
|
|
|
|
VzaZbq/QLcT3yVsdyTogKckzCaKsCpusyHE1CXAVAoGAd6kMglKc8N0bhZukgnsN
|
|
|
|
+5+UeacPcY6sGTh4RWErAjNKGzx1A2lROKvcg9gFaULoQECcIw2IZ5nKW5VsLueg
|
|
|
|
BWrTrcaJ4A2XmYjhKnp6SvspaGoyHD90hx/Iw7t6r1yzQsB3yDmytwqldtyjBdvC
|
|
|
|
zynPC2azhDWjraMlR7tka4ECgYAxwvLiHa9sm3qCtCDsUFtmrb3srITBjaUNUL/F
|
|
|
|
1q8+JR+Sk7gudj9xnTT0VvINNaB71YIt83wPBagHu4VJpYQbtDH+MbUBu6OgOtO1
|
|
|
|
f1w53rzY2OncJxV8p7pd9mJGLoE6LC2jQY7oRw7Vq0xcJdME1BCmrIrEY3a/vaF8
|
|
|
|
pjYuTQKBgQCIOH23Xita8KmhH0NdlWxZfcQt1j3AnOcKe6UyN4BsF8hqS7eTA52s
|
|
|
|
WjG5X2IBl7gs1eMM1qkqR8npS9nwfO/pBmZPwjiZoilypXxWj+c+P3vwre2yija4
|
|
|
|
bXgFVj4KFBwhr1+8KcobxC0SAPEouMvSkxzjjw+gnebozUtPlud9jA==
|
|
|
|
-----END RSA PRIVATE KEY-----
|
|
|
|
`
|
|
|
|
const CLIENT_CERT_SIGNED_BY_SERVER = `ssh-rsa-cert-v01@openssh.com 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 itbitloaner@MacBook-Pro-4.fios-router.home`
|
|
|
|
const CLIENT_PEM = `-----BEGIN RSA PRIVATE KEY-----
|
|
|
|
MIIEpAIBAAKCAQEAsruexO8yFkchFrmojoopDkmShY28C5KRPX26BXyy7DVCY+M8
|
|
|
|
PuW2VCbc1ivK6D44C/LNaD53K6OcLk7SNjbuH5KXhStB2996OhMpLLo+DpuPulHp
|
|
|
|
p9UBHG9G2aivGcoPQ4PXXj+y3hNL+/G+f42WnxYMMb/v7DITND0Q9+DQg2HGJpJB
|
|
|
|
5b0LUFhQHWz1woIITm3nWcmHaKmVboU7IjzFrUEv3HPTOLb+pjzrkJYWbd0fzof5
|
|
|
|
MFMruOaBkW+W4TuCYnKMxUt6HgpaVPlDG4LJZMwKSasWQVje/jwxUmYSpNhrJcns
|
|
|
|
j+LB9xN9GdNMlYv5UGIJkLAfh4OgpXpjUDDbvwIDAQABAoIBAEu2ctFVyk/pnbi0
|
|
|
|
uRR4rl+hBvKQUeJNGj2ELvL4Ggs5nIAX2IOEZ7JKLC6FqpSrFq7pEd5g57aSvixX
|
|
|
|
s3DH4CN7w7fj1ShBCNPlHgIWewdRGpeA74vrDWdwNAEsFdDE6aZeCTOhpDGy1vNJ
|
|
|
|
OrtpzS5i9pN0jTvvEneEjtWSZIHiiVlN+0hsFaiwZ6KXON+sDccZPmnP6Fzwj5Rc
|
|
|
|
WS0dKSwnxnx0otWgwWFs8nr306nSeMsNmQkHsS9lz4DEVpp9owdzrX1JmbQvNYAV
|
|
|
|
ohmB3ET4JYFgerqPXJfed9poueGuWCP6MYhsjNeHN35QhofxdO5/0i3JlZfqwZei
|
|
|
|
tNq/0oECgYEA6SqjRqDiIp3ajwyB7Wf0cIQG/P6JZDyN1jl//htgniliIH5UP1Tm
|
|
|
|
uAMG5MincV6X9lOyXyh6Yofu5+NR0yt9SqbDZVJ3ZCxKTun7pxJvQFd7wl5bMkiJ
|
|
|
|
qVfS08k6gQHHDoO+eel+DtpIfWc+e3tvX0aihSU0GZEMqDXYkkphLGECgYEAxDxb
|
|
|
|
+JwJ3N5UEjjkuvFBpuJnmjIaN9HvQkTv3inlx1gLE4iWBZXXsu4aWF8MCUeAAZyP
|
|
|
|
42hQDSkCYX/A22tYCEn/jfrU6A+6rkWBTjdUlYLvlSkhosSnO+117WEItb5cUE95
|
|
|
|
hF4UY7LNs1AsDkV4WE87f/EjpxSwUAjB2Lfd/B8CgYAJ/JiHsuZcozQ0Qk3iVDyF
|
|
|
|
ATKnbWOHFozgqw/PW27U92LLj32eRM2o/gAylmGNmoaZt1YBe2NaiwXxiqv7hnZU
|
|
|
|
VzYxRcn1UWxRWvY7Xq/DKrwTRCVVzwOObEOMbKcD1YaoGX50DEso6bKHJH/pnAzW
|
|
|
|
INlfKIvFuI+5OK0w/tyQoQKBgQCf/jpaOxaLfrV62eobRQJrByLDBGB97GsvU7di
|
|
|
|
IjTWz8DQH0d5rE7d8uWF8ZCFrEcAiV6DYZQK9smbJqbd/uoacAKtBro5rkFdPwwK
|
|
|
|
8m/DKqsdqRhkdgOHh7bjYH7Sdy8ax4Fi27WyB6FQtmgFBrz0+zyetsODwQlzZ4Bs
|
|
|
|
qpSRrwKBgQC0vWHrY5aGIdF+b8EpP0/SSLLALpMySHyWhDyxYcPqdhszYbjDcavv
|
|
|
|
xrrLXNUD2duBHKPVYE+7uVoDkpZXLUQ4x8argo/IwQM6Kh2ma1y83TYMT6XhL1+B
|
|
|
|
5UPcl6RXZBCkiU7nFIG6/0XKFqVWc3fU8e09X+iJwXIJ5Jatywtg+g==
|
|
|
|
-----END RSA PRIVATE KEY-----
|
|
|
|
`
|
|
|
|
|
|
|
|
func TestCertificateBasedAuth(t *testing.T) {
|
|
|
|
signer, err := ssh.ParsePrivateKey([]byte(SERVER_PEM))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("unable to parse private key: %v", err)
|
|
|
|
}
|
|
|
|
address := newMockLineServer(t, signer, CLIENT_CERT_SIGNED_BY_SERVER)
|
|
|
|
host, p, _ := net.SplitHostPort(address)
|
|
|
|
port, _ := strconv.Atoi(p)
|
|
|
|
|
|
|
|
connInfo := &connectionInfo{
|
|
|
|
User: "user",
|
|
|
|
Host: host,
|
|
|
|
PrivateKey: CLIENT_PEM,
|
|
|
|
Certificate: CLIENT_CERT_SIGNED_BY_SERVER,
|
2021-05-10 19:57:11 +02:00
|
|
|
Port: uint16(port),
|
2018-09-19 02:36:39 +02:00
|
|
|
Timeout: "30s",
|
|
|
|
}
|
|
|
|
|
|
|
|
cfg, err := prepareSSHConfig(connInfo)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
c := &Communicator{
|
|
|
|
connInfo: connInfo,
|
|
|
|
config: cfg,
|
|
|
|
}
|
|
|
|
|
|
|
|
var cmd remote.Cmd
|
|
|
|
stdout := new(bytes.Buffer)
|
|
|
|
cmd.Command = "echo foo"
|
|
|
|
cmd.Stdout = stdout
|
|
|
|
|
|
|
|
if err := c.Start(&cmd); err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
if err := c.Disconnect(); err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-02-10 15:12:42 +01:00
|
|
|
func TestAccUploadFile(t *testing.T) {
|
|
|
|
// use the local ssh server and scp binary to check uploads
|
|
|
|
if ok := os.Getenv("SSH_UPLOAD_TEST"); ok == "" {
|
|
|
|
t.Log("Skipping Upload Acceptance without SSH_UPLOAD_TEST set")
|
|
|
|
t.Skip()
|
|
|
|
}
|
|
|
|
|
2020-11-25 18:40:42 +01:00
|
|
|
v := cty.ObjectVal(map[string]cty.Value{
|
|
|
|
"type": cty.StringVal("ssh"),
|
|
|
|
"user": cty.StringVal(os.Getenv("USER")),
|
|
|
|
"host": cty.StringVal("127.0.0.1"),
|
|
|
|
"port": cty.StringVal("22"),
|
|
|
|
"timeout": cty.StringVal("30s"),
|
|
|
|
})
|
2017-02-10 15:12:42 +01:00
|
|
|
|
2020-11-25 18:40:42 +01:00
|
|
|
c, err := New(v)
|
2017-02-10 15:12:42 +01:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("error creating communicator: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
tmpDir, err := ioutil.TempDir("", "communicator")
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
defer os.RemoveAll(tmpDir)
|
|
|
|
|
|
|
|
content := []byte("this is the file content")
|
|
|
|
source := bytes.NewReader(content)
|
|
|
|
tmpFile := filepath.Join(tmpDir, "tempFile.out")
|
|
|
|
err = c.Upload(tmpFile, source)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("error uploading file: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
data, err := ioutil.ReadFile(tmpFile)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if !bytes.Equal(data, content) {
|
|
|
|
t.Fatalf("bad: %s", data)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestAccHugeUploadFile(t *testing.T) {
|
|
|
|
// use the local ssh server and scp binary to check uploads
|
|
|
|
if ok := os.Getenv("SSH_UPLOAD_TEST"); ok == "" {
|
|
|
|
t.Log("Skipping Upload Acceptance without SSH_UPLOAD_TEST set")
|
|
|
|
t.Skip()
|
|
|
|
}
|
|
|
|
|
2020-11-25 18:40:42 +01:00
|
|
|
v := cty.ObjectVal(map[string]cty.Value{
|
|
|
|
"type": cty.StringVal("ssh"),
|
|
|
|
"host": cty.StringVal("127.0.0.1"),
|
|
|
|
"user": cty.StringVal(os.Getenv("USER")),
|
|
|
|
"port": cty.StringVal("22"),
|
|
|
|
"timeout": cty.StringVal("30s"),
|
|
|
|
})
|
2017-02-10 15:12:42 +01:00
|
|
|
|
2020-11-25 18:40:42 +01:00
|
|
|
c, err := New(v)
|
2017-02-10 15:12:42 +01:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("error creating communicator: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// copy 4GB of data, random to prevent compression.
|
|
|
|
size := int64(1 << 32)
|
|
|
|
source := io.LimitReader(rand.New(rand.NewSource(0)), size)
|
|
|
|
|
|
|
|
dest, err := ioutil.TempFile("", "communicator")
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
destName := dest.Name()
|
|
|
|
dest.Close()
|
|
|
|
defer os.Remove(destName)
|
|
|
|
|
|
|
|
t.Log("Uploading to", destName)
|
|
|
|
|
|
|
|
// bypass the Upload method so we can directly supply the file size
|
|
|
|
// preventing the extra copy of the huge file.
|
|
|
|
targetDir := filepath.Dir(destName)
|
|
|
|
targetFile := filepath.Base(destName)
|
|
|
|
|
|
|
|
scpFunc := func(w io.Writer, stdoutR *bufio.Reader) error {
|
|
|
|
return scpUploadFile(targetFile, source, w, stdoutR, size)
|
|
|
|
}
|
|
|
|
|
2021-06-15 19:04:01 +02:00
|
|
|
cmd, err := quoteShell([]string{"scp", "-vt", targetDir}, c.connInfo.TargetPlatform)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
err = c.scpSession(cmd, scpFunc)
|
2017-02-10 15:12:42 +01:00
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// check the final file size
|
|
|
|
fs, err := os.Stat(destName)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if fs.Size() != size {
|
|
|
|
t.Fatalf("expected file size of %d, got %d", size, fs.Size())
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-04-30 18:02:33 +02:00
|
|
|
func TestScriptPath(t *testing.T) {
|
|
|
|
cases := []struct {
|
|
|
|
Input string
|
|
|
|
Pattern string
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
"/tmp/script.sh",
|
|
|
|
`^/tmp/script\.sh$`,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"/tmp/script_%RAND%.sh",
|
|
|
|
`^/tmp/script_(\d+)\.sh$`,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, tc := range cases {
|
2020-11-25 18:40:42 +01:00
|
|
|
v := cty.ObjectVal(map[string]cty.Value{
|
|
|
|
"type": cty.StringVal("ssh"),
|
|
|
|
"host": cty.StringVal("127.0.0.1"),
|
|
|
|
"script_path": cty.StringVal(tc.Input),
|
|
|
|
})
|
|
|
|
|
|
|
|
comm, err := New(v)
|
2016-06-29 15:58:33 +02:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
2015-04-30 18:02:33 +02:00
|
|
|
output := comm.ScriptPath()
|
|
|
|
|
|
|
|
match, err := regexp.Match(tc.Pattern, []byte(output))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("bad: %s\n\nerr: %s", tc.Input, err)
|
|
|
|
}
|
|
|
|
if !match {
|
|
|
|
t.Fatalf("bad: %s\n\n%s", tc.Input, output)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2015-07-02 22:41:23 +02:00
|
|
|
|
2016-06-29 15:58:33 +02:00
|
|
|
func TestScriptPath_randSeed(t *testing.T) {
|
|
|
|
// Pre GH-4186 fix, this value was the deterministic start the pseudorandom
|
|
|
|
// chain of unseeded math/rand values for Int31().
|
|
|
|
staticSeedPath := "/tmp/terraform_1298498081.sh"
|
2020-11-25 18:40:42 +01:00
|
|
|
c, err := New(cty.ObjectVal(map[string]cty.Value{
|
|
|
|
"type": cty.StringVal("ssh"),
|
|
|
|
"host": cty.StringVal("127.0.0.1"),
|
|
|
|
}))
|
2016-06-29 15:58:33 +02:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
path := c.ScriptPath()
|
|
|
|
if path == staticSeedPath {
|
|
|
|
t.Fatalf("rand not seeded! got: %s", path)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-07-02 22:41:23 +02:00
|
|
|
var testClientPublicKey = `ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDE6A1c4n+OtEPEFlNKTZf2i03L3NylSYmvmJ8OLmzLuPZmJBJt4G3VZ/60s1aKzwLKrTq20S+ONG4zvnK5zIPoauoNNdUJKbg944hB4OE+HDbrBhk7SH+YWCsCILBoSXwAVdUEic6FWf/SeqBSmTBySHvpuNOw16J+SK6Ardx8k64F2tRkZuC6AmOZijgKa/sQKjWAIVPk34ECM6OLfPc3kKUEfkdpYLvuMfuRMfSTlxn5lFC0b0SovK9aWfNMBH9iXLQkieQ5rXoyzUC7mwgnASgl8cqw1UrToiUuhvneduXBhbQfmC/Upv+tL6dSSk+0DlgVKEHuJmc8s8+/qpdL`
|
|
|
|
|
|
|
|
func acceptUserPass(goodUser, goodPass string) func(ssh.ConnMetadata, []byte) (*ssh.Permissions, error) {
|
|
|
|
return func(c ssh.ConnMetadata, pass []byte) (*ssh.Permissions, error) {
|
|
|
|
if c.User() == goodUser && string(pass) == goodPass {
|
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
return nil, fmt.Errorf("password rejected for %q", c.User())
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func acceptPublicKey(keystr string) func(ssh.ConnMetadata, ssh.PublicKey) (*ssh.Permissions, error) {
|
|
|
|
return func(_ ssh.ConnMetadata, inkey ssh.PublicKey) (*ssh.Permissions, error) {
|
2018-09-19 02:36:39 +02:00
|
|
|
goodkey, _, _, _, err := ssh.ParseAuthorizedKey([]byte(keystr))
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("error parsing key: %v", err)
|
|
|
|
}
|
|
|
|
|
2017-09-13 14:58:14 +02:00
|
|
|
if bytes.Equal(inkey.Marshal(), goodkey.Marshal()) {
|
2015-07-02 22:41:23 +02:00
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil, fmt.Errorf("public key rejected")
|
|
|
|
}
|
|
|
|
}
|