2014-07-10 23:52:43 +02:00
|
|
|
// +build !race
|
|
|
|
|
|
|
|
package ssh
|
|
|
|
|
|
|
|
import (
|
|
|
|
"bytes"
|
|
|
|
"fmt"
|
|
|
|
"net"
|
2015-04-30 18:02:33 +02:00
|
|
|
"regexp"
|
2015-04-09 21:58:00 +02:00
|
|
|
"strings"
|
2014-07-10 23:52:43 +02:00
|
|
|
"testing"
|
2015-04-09 23:40:40 +02:00
|
|
|
|
2015-04-09 21:58:00 +02:00
|
|
|
"github.com/hashicorp/terraform/communicator/remote"
|
|
|
|
"github.com/hashicorp/terraform/terraform"
|
2015-04-09 23:40:40 +02:00
|
|
|
"golang.org/x/crypto/ssh"
|
2014-07-10 23:52:43 +02:00
|
|
|
)
|
|
|
|
|
|
|
|
// private key for mock server
|
|
|
|
const testServerPrivateKey = `-----BEGIN RSA PRIVATE KEY-----
|
|
|
|
MIIEpAIBAAKCAQEA19lGVsTqIT5iiNYRgnoY1CwkbETW5cq+Rzk5v/kTlf31XpSU
|
|
|
|
70HVWkbTERECjaYdXM2gGcbb+sxpq6GtXf1M3kVomycqhxwhPv4Cr6Xp4WT/jkFx
|
|
|
|
9z+FFzpeodGJWjOH6L2H5uX1Cvr9EDdQp9t9/J32/qBFntY8GwoUI/y/1MSTmMiF
|
|
|
|
tupdMODN064vd3gyMKTwrlQ8tZM6aYuyOPsutLlUY7M5x5FwMDYvnPDSeyT/Iw0z
|
|
|
|
s3B+NCyqeeMd2T7YzQFnRATj0M7rM5LoSs7DVqVriOEABssFyLj31PboaoLhOKgc
|
|
|
|
qoM9khkNzr7FHVvi+DhYM2jD0DwvqZLN6NmnLwIDAQABAoIBAQCGVj+kuSFOV1lT
|
|
|
|
+IclQYA6bM6uY5mroqcSBNegVxCNhWU03BxlW//BE9tA/+kq53vWylMeN9mpGZea
|
|
|
|
riEMIh25KFGWXqXlOOioH8bkMsqA8S7sBmc7jljyv+0toQ9vCCtJ+sueNPhxQQxH
|
|
|
|
D2YvUjfzBQ04I9+wn30BByDJ1QA/FoPsunxIOUCcRBE/7jxuLYcpR+JvEF68yYIh
|
|
|
|
atXRld4W4in7T65YDR8jK1Uj9XAcNeDYNpT/M6oFLx1aPIlkG86aCWRO19S1jLPT
|
|
|
|
b1ZAKHHxPMCVkSYW0RqvIgLXQOR62D0Zne6/2wtzJkk5UCjkSQ2z7ZzJpMkWgDgN
|
|
|
|
ifCULFPBAoGBAPoMZ5q1w+zB+knXUD33n1J+niN6TZHJulpf2w5zsW+m2K6Zn62M
|
|
|
|
MXndXlVAHtk6p02q9kxHdgov34Uo8VpuNjbS1+abGFTI8NZgFo+bsDxJdItemwC4
|
|
|
|
KJ7L1iz39hRN/ZylMRLz5uTYRGddCkeIHhiG2h7zohH/MaYzUacXEEy3AoGBANz8
|
|
|
|
e/msleB+iXC0cXKwds26N4hyMdAFE5qAqJXvV3S2W8JZnmU+sS7vPAWMYPlERPk1
|
|
|
|
D8Q2eXqdPIkAWBhrx4RxD7rNc5qFNcQWEhCIxC9fccluH1y5g2M+4jpMX2CT8Uv+
|
|
|
|
3z+NoJ5uDTXZTnLCfoZzgZ4nCZVZ+6iU5U1+YXFJAoGBANLPpIV920n/nJmmquMj
|
|
|
|
orI1R/QXR9Cy56cMC65agezlGOfTYxk5Cfl5Ve+/2IJCfgzwJyjWUsFx7RviEeGw
|
|
|
|
64o7JoUom1HX+5xxdHPsyZ96OoTJ5RqtKKoApnhRMamau0fWydH1yeOEJd+TRHhc
|
|
|
|
XStGfhz8QNa1dVFvENczja1vAoGABGWhsd4VPVpHMc7lUvrf4kgKQtTC2PjA4xoc
|
|
|
|
QJ96hf/642sVE76jl+N6tkGMzGjnVm4P2j+bOy1VvwQavKGoXqJBRd5Apppv727g
|
|
|
|
/SM7hBXKFc/zH80xKBBgP/i1DR7kdjakCoeu4ngeGywvu2jTS6mQsqzkK+yWbUxJ
|
|
|
|
I7mYBsECgYB/KNXlTEpXtz/kwWCHFSYA8U74l7zZbVD8ul0e56JDK+lLcJ0tJffk
|
|
|
|
gqnBycHj6AhEycjda75cs+0zybZvN4x65KZHOGW/O/7OAWEcZP5TPb3zf9ned3Hl
|
|
|
|
NsZoFj52ponUM6+99A2CmezFCN16c4mbA//luWF+k3VVqR6BpkrhKw==
|
|
|
|
-----END RSA PRIVATE KEY-----`
|
|
|
|
|
|
|
|
var serverConfig = &ssh.ServerConfig{
|
|
|
|
PasswordCallback: func(c ssh.ConnMetadata, pass []byte) (*ssh.Permissions, error) {
|
|
|
|
if c.User() == "user" && string(pass) == "pass" {
|
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
return nil, fmt.Errorf("password rejected for %q", c.User())
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
func init() {
|
|
|
|
// Parse and set the private key of the server, required to accept connections
|
|
|
|
signer, err := ssh.ParsePrivateKey([]byte(testServerPrivateKey))
|
|
|
|
if err != nil {
|
|
|
|
panic("unable to parse private key: " + err.Error())
|
|
|
|
}
|
|
|
|
serverConfig.AddHostKey(signer)
|
|
|
|
}
|
|
|
|
|
|
|
|
func newMockLineServer(t *testing.T) string {
|
|
|
|
l, err := net.Listen("tcp", "127.0.0.1:0")
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Unable to listen for connection: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
go func() {
|
|
|
|
defer l.Close()
|
|
|
|
c, err := l.Accept()
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("Unable to accept incoming connection: %s", err)
|
|
|
|
}
|
|
|
|
defer c.Close()
|
|
|
|
conn, chans, _, err := ssh.NewServerConn(c, serverConfig)
|
|
|
|
if err != nil {
|
|
|
|
t.Logf("Handshaking error: %v", err)
|
|
|
|
}
|
|
|
|
t.Log("Accepted SSH connection")
|
2015-04-09 23:40:40 +02:00
|
|
|
|
2014-07-10 23:52:43 +02:00
|
|
|
for newChannel := range chans {
|
2015-04-09 23:40:40 +02:00
|
|
|
channel, requests, err := newChannel.Accept()
|
2014-07-10 23:52:43 +02:00
|
|
|
if err != nil {
|
|
|
|
t.Errorf("Unable to accept channel.")
|
|
|
|
}
|
|
|
|
t.Log("Accepted channel")
|
|
|
|
|
2015-04-09 23:40:40 +02:00
|
|
|
go func(in <-chan *ssh.Request) {
|
|
|
|
for req := range in {
|
|
|
|
if req.WantReply {
|
|
|
|
req.Reply(true, nil)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}(requests)
|
|
|
|
|
2014-08-25 06:50:35 +02:00
|
|
|
go func(newChannel ssh.NewChannel) {
|
2014-07-10 23:52:43 +02:00
|
|
|
conn.OpenChannel(newChannel.ChannelType(), nil)
|
2014-08-25 06:50:35 +02:00
|
|
|
}(newChannel)
|
2015-04-09 23:40:40 +02:00
|
|
|
|
|
|
|
defer channel.Close()
|
2014-07-10 23:52:43 +02:00
|
|
|
}
|
|
|
|
conn.Close()
|
|
|
|
}()
|
|
|
|
|
|
|
|
return l.Addr().String()
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestNew_Invalid(t *testing.T) {
|
|
|
|
address := newMockLineServer(t)
|
2015-04-09 21:58:00 +02:00
|
|
|
parts := strings.Split(address, ":")
|
|
|
|
|
|
|
|
r := &terraform.InstanceState{
|
|
|
|
Ephemeral: terraform.EphemeralState{
|
|
|
|
ConnInfo: map[string]string{
|
|
|
|
"type": "ssh",
|
|
|
|
"user": "user",
|
|
|
|
"password": "i-am-invalid",
|
|
|
|
"host": parts[0],
|
|
|
|
"port": parts[1],
|
|
|
|
"timeout": "30s",
|
|
|
|
},
|
|
|
|
},
|
2014-07-10 23:52:43 +02:00
|
|
|
}
|
|
|
|
|
2015-04-09 21:58:00 +02:00
|
|
|
c, err := New(r)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("error creating communicator: %s", err)
|
2014-07-10 23:52:43 +02:00
|
|
|
}
|
|
|
|
|
2015-04-09 21:58:00 +02:00
|
|
|
err = c.Connect(nil)
|
2014-07-10 23:52:43 +02:00
|
|
|
if err == nil {
|
|
|
|
t.Fatal("should have had an error connecting")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestStart(t *testing.T) {
|
|
|
|
address := newMockLineServer(t)
|
2015-04-09 21:58:00 +02:00
|
|
|
parts := strings.Split(address, ":")
|
|
|
|
|
|
|
|
r := &terraform.InstanceState{
|
|
|
|
Ephemeral: terraform.EphemeralState{
|
|
|
|
ConnInfo: map[string]string{
|
|
|
|
"type": "ssh",
|
|
|
|
"user": "user",
|
|
|
|
"password": "pass",
|
|
|
|
"host": parts[0],
|
|
|
|
"port": parts[1],
|
|
|
|
"timeout": "30s",
|
|
|
|
},
|
|
|
|
},
|
2014-07-10 23:52:43 +02:00
|
|
|
}
|
|
|
|
|
2015-04-09 21:58:00 +02:00
|
|
|
c, err := New(r)
|
2014-07-10 23:52:43 +02:00
|
|
|
if err != nil {
|
2015-04-09 21:58:00 +02:00
|
|
|
t.Fatalf("error creating communicator: %s", err)
|
2014-07-10 23:52:43 +02:00
|
|
|
}
|
|
|
|
|
2015-04-09 21:58:00 +02:00
|
|
|
var cmd remote.Cmd
|
2014-07-10 23:52:43 +02:00
|
|
|
stdout := new(bytes.Buffer)
|
|
|
|
cmd.Command = "echo foo"
|
|
|
|
cmd.Stdout = stdout
|
|
|
|
|
2015-04-09 21:58:00 +02:00
|
|
|
err = c.Start(&cmd)
|
2015-04-09 23:40:40 +02:00
|
|
|
if err != nil {
|
2015-04-09 21:58:00 +02:00
|
|
|
t.Fatalf("error executing remote command: %s", err)
|
2015-04-09 23:40:40 +02:00
|
|
|
}
|
2014-07-10 23:52:43 +02:00
|
|
|
}
|
2015-04-30 18:02:33 +02:00
|
|
|
|
|
|
|
func TestScriptPath(t *testing.T) {
|
|
|
|
cases := []struct {
|
|
|
|
Input string
|
|
|
|
Pattern string
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
"/tmp/script.sh",
|
|
|
|
`^/tmp/script\.sh$`,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"/tmp/script_%RAND%.sh",
|
|
|
|
`^/tmp/script_(\d+)\.sh$`,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, tc := range cases {
|
|
|
|
comm := &Communicator{connInfo: &connectionInfo{ScriptPath: tc.Input}}
|
|
|
|
output := comm.ScriptPath()
|
|
|
|
|
|
|
|
match, err := regexp.Match(tc.Pattern, []byte(output))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("bad: %s\n\nerr: %s", tc.Input, err)
|
|
|
|
}
|
|
|
|
if !match {
|
|
|
|
t.Fatalf("bad: %s\n\n%s", tc.Input, output)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|