test_paramiko_vendor.py 8.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222
  1. # test_paramiko_vendor.py
  2. #
  3. # Dulwich is dual-licensed under the Apache License, Version 2.0 and the GNU
  4. # General Public License as public by the Free Software Foundation; version 2.0
  5. # or (at your option) any later version. You can redistribute it and/or
  6. # modify it under the terms of either of these two licenses.
  7. #
  8. # Unless required by applicable law or agreed to in writing, software
  9. # distributed under the License is distributed on an "AS IS" BASIS,
  10. # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  11. # See the License for the specific language governing permissions and
  12. # limitations under the License.
  13. #
  14. # You should have received a copy of the licenses; if not, see
  15. # <http://www.gnu.org/licenses/> for a copy of the GNU General Public License
  16. # and <http://www.apache.org/licenses/LICENSE-2.0> for a copy of the Apache
  17. # License, Version 2.0.
  18. #
  19. """Tests for paramiko_vendor."""
  20. import socket
  21. import threading
  22. from io import StringIO
  23. from typing import Optional
  24. from unittest import skipIf
  25. from .. import TestCase
  26. try:
  27. import paramiko
  28. except ImportError:
  29. has_paramiko = False
  30. else:
  31. has_paramiko = True
  32. from dulwich.contrib.paramiko_vendor import ParamikoSSHVendor
  33. class Server(paramiko.ServerInterface):
  34. """http://docs.paramiko.org/en/2.4/api/server.html."""
  35. def __init__(self, commands, *args, **kwargs) -> None:
  36. super().__init__(*args, **kwargs)
  37. self.commands = commands
  38. def check_channel_exec_request(self, channel, command) -> bool:
  39. self.commands.append(command)
  40. return True
  41. def check_auth_password(self, username, password):
  42. if username == USER and password == PASSWORD:
  43. return paramiko.AUTH_SUCCESSFUL
  44. return paramiko.AUTH_FAILED
  45. def check_auth_publickey(self, username, key):
  46. pubkey = paramiko.RSAKey.from_private_key(StringIO(CLIENT_KEY))
  47. if username == USER and key == pubkey:
  48. return paramiko.AUTH_SUCCESSFUL
  49. return paramiko.AUTH_FAILED
  50. def check_channel_request(self, kind, chanid):
  51. if kind == "session":
  52. return paramiko.OPEN_SUCCEEDED
  53. return paramiko.OPEN_FAILED_ADMINISTRATIVELY_PROHIBITED
  54. def get_allowed_auths(self, username) -> str:
  55. return "password,publickey"
  56. USER = "testuser"
  57. PASSWORD = "test"
  58. SERVER_KEY = """\
  59. -----BEGIN RSA PRIVATE KEY-----
  60. MIIEpAIBAAKCAQEAy/L1sSYAzxsMprtNXW4u/1jGXXkQmQ2xtmKVlR+RlIL3a1BH
  61. bzTpPlZyjltAAwzIP8XRh0iJFKz5y3zSQChhX47ZGN0NvQsVct8R+YwsUonwfAJ+
  62. JN0KBKKvC8fPHlzqBr3gX+ZxqsFH934tQ6wdQPH5eQWtdM8L826lMsH1737uyTGk
  63. +mCSDjL3c6EzY83g7qhkJU2R4qbi6ne01FaWADzG8sOzXnHT+xpxtk8TTT8yCVUY
  64. MmBNsSoA/ka3iWz70ghB+6Xb0WpFJZXWq1oYovviPAfZGZSrxBZMxsWMye70SdLl
  65. TqsBEt0+miIcm9s0fvjWvQuhaHX6mZs5VO4r5QIDAQABAoIBAGYqeYWaYgFdrYLA
  66. hUrubUCg+g3NHdFuGL4iuIgRXl4lFUh+2KoOuWDu8Uf60iA1AQNhV0sLvQ/Mbv3O
  67. s4xMLisuZfaclctDiCUZNenqnDFkxEF7BjH1QJV94W5nU4wEQ3/JEmM4D2zYkfKb
  68. FJW33JeyH6TOgUvohDYYEU1R+J9V8qA243p+ui1uVtNI6Pb0TXJnG5y9Ny4vkSWH
  69. Fi0QoMPR1r9xJ4SEearGzA/crb4SmmDTKhGSoMsT3d5ATieLmwcS66xWz8w4oFGJ
  70. yzDq24s4Fp9ccNjMf/xR8XRiekJv835gjEqwF9IXyvgOaq6XJ1iCqGPFDKa25nui
  71. JnEstOkCgYEA/ZXk7aIanvdeJlTqpX578sJfCnrXLydzE8emk1b7+5mrzGxQ4/pM
  72. PBQs2f8glT3t0O0mRX9NoRqnwrid88/b+cY4NCOICFZeasX336/gYQxyVeRLJS6Z
  73. hnGEQqry8qS7PdKAyeHMNmZFrUh4EiHiObymEfQS+mkRUObn0cGBTw8CgYEAzeQU
  74. D2baec1DawjppKaRynAvWjp+9ry1lZx9unryKVRwjRjkEpw+b3/+hdaF1IvsVSce
  75. cNj+6W2guZ2tyHuPhZ64/4SJVyE2hKDSKD4xTb2nVjsMeN0bLD2UWXC9mwbx8nWa
  76. 2tmtUZ7a/okQb2cSdosJinRewLNqXIsBXamT1csCgYEA0cXb2RCOQQ6U3dTFPx4A
  77. 3vMXuA2iUKmrsqMoEx6T2LBow/Sefdkik1iFOdipVYwjXP+w9zC2QR1Rxez/DR/X
  78. 8ymceNUjxPHdrSoTQQG29dFcC92MpDeGXQcuyA+uZjcLhbrLOzYEvsOfxBb87NMG
  79. 14hNQPDNekTMREafYo9WrtUCgYAREK54+FVzcwf7fymedA/xb4r9N4v+d3W1iNsC
  80. 8d3Qfyc1CrMct8aVB07ZWQaOr2pPRIbJY7L9NhD0UZVt4I/sy1MaGqonhqE2LP4+
  81. R6legDG2e/50ph7yc8gwAaA1kUXMiuLi8Nfkw/3yyvmJwklNegi4aRzRbA2Mzhi2
  82. 4q9WMQKBgQCb0JNyxHG4pvLWCF/j0Sm1FfvrpnqSv5678n1j4GX7Ka/TubOK1Y4K
  83. U+Oib7dKa/zQMWehVFNTayrsq6bKVZ6q7zG+IHiRLw4wjeAxREFH6WUjDrn9vl2l
  84. D48DKbBuBwuVOJWyq3qbfgJXojscgNQklrsPdXVhDwOF0dYxP89HnA==
  85. -----END RSA PRIVATE KEY-----"""
  86. CLIENT_KEY = """\
  87. -----BEGIN RSA PRIVATE KEY-----
  88. MIIEpAIBAAKCAQEAxvREKSElPOm/0z/nPO+j5rk2tjdgGcGc7We1QZ6TRXYLu7nN
  89. GeEFIL4p8N1i6dmB+Eydt7xqCU79MWD6Yy4prFe1+/K1wCDUxIbFMxqQcX5zjJzd
  90. i8j8PbcaUlVhP/OkjtkSxrXaGDO1BzfdV4iEBtTV/2l3zmLKJlt3jnOHLczP24CB
  91. DTQKp3rKshbRefzot9Y+wnaK692RsYgsyo9YEP0GyWKG9topCHk13r46J6vGLeuj
  92. ryUKqmbLJkzbJbIcEqwTDo5iHaCVqaMr5Hrb8BdMucSseqZQJsXSd+9tdRcIblUQ
  93. 38kZjmFMm4SFbruJcpZCNM2wNSZPIRX+3eiwNwIDAQABAoIBAHSacOBSJsr+jIi5
  94. KUOTh9IPtzswVUiDKwARCjB9Sf8p4lKR4N1L/n9kNJyQhApeikgGT2GCMftmqgoo
  95. tlculQoHFgemBlOmak0MV8NNzF5YKEy/GzF0CDH7gJfEpoyetVFrdA+2QS5yD6U9
  96. XqKQxiBi2VEqdScmyyeT8AwzNYTnPeH/DOEcnbdRjqiy/CD79F49CQ1lX1Fuqm0K
  97. I7BivBH1xo/rVnUP4F+IzocDqoga+Pjdj0LTXIgJlHQDSbhsQqWujWQDDuKb+MAw
  98. sNK4Zf8ErV3j1PyA7f/M5LLq6zgstkW4qikDHo4SpZX8kFOO8tjqb7kujj7XqeaB
  99. CxqrOTECgYEA73uWkrohcmDJ4KqbuL3tbExSCOUiaIV+sT1eGPNi7GCmXD4eW5Z4
  100. 75v2IHymW83lORSu/DrQ6sKr1nkuRpqr2iBzRmQpl/H+wahIhBXlnJ25uUjDsuPO
  101. 1Pq2LcmyD+jTxVnmbSe/q7O09gZQw3I6H4+BMHmpbf8tC97lqimzpJ0CgYEA1K0W
  102. ZL70Xtn9quyHvbtae/BW07NZnxvUg4UaVIAL9Zu34JyplJzyzbIjrmlDbv6aRogH
  103. /KtuG9tfbf55K/jjqNORiuRtzt1hUN1ye4dyW7tHx2/7lXdlqtyK40rQl8P0kqf8
  104. zaS6BqjnobgSdSpg32rWoL/pcBHPdJCJEgQ8zeMCgYEA0/PK8TOhNIzrP1dgGSKn
  105. hkkJ9etuB5nW5mEM7gJDFDf6JPupfJ/xiwe6z0fjKK9S57EhqgUYMB55XYnE5iIw
  106. ZQ6BV9SAZ4V7VsRs4dJLdNC3tn/rDGHJBgCaym2PlbsX6rvFT+h1IC8dwv0V79Ui
  107. Ehq9WTzkMoE8yhvNokvkPZUCgYEAgBAFxv5xGdh79ftdtXLmhnDvZ6S8l6Fjcxqo
  108. Ay/jg66Tp43OU226iv/0mmZKM8Dd1xC8dnon4GBVc19jSYYiWBulrRPlx0Xo/o+K
  109. CzZBN1lrXH1i6dqufpc0jq8TMf/N+q1q/c1uMupsKCY1/xVYpc+ok71b7J7c49zQ
  110. nOeuUW8CgYA9Infooy65FTgbzca0c9kbCUBmcAPQ2ItH3JcPKWPQTDuV62HcT00o
  111. fZdIV47Nez1W5Clk191RMy8TXuqI54kocciUWpThc6j44hz49oUueb8U4bLcEHzA
  112. WxtWBWHwxfSmqgTXilEA3ALJp0kNolLnEttnhENwJpZHlqtes0ZA4w==
  113. -----END RSA PRIVATE KEY-----"""
  114. @skipIf(not has_paramiko, "paramiko is not installed")
  115. class ParamikoSSHVendorTests(TestCase):
  116. def setUp(self) -> None:
  117. import paramiko.transport
  118. # re-enable server functionality for tests
  119. if hasattr(paramiko.transport, "SERVER_DISABLED_BY_GENTOO"):
  120. paramiko.transport.SERVER_DISABLED_BY_GENTOO = False
  121. self.commands = []
  122. socket.setdefaulttimeout(10)
  123. self.addCleanup(socket.setdefaulttimeout, None)
  124. self.socket = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
  125. self.socket.bind(("127.0.0.1", 0))
  126. self.socket.listen(5)
  127. self.addCleanup(self.socket.close)
  128. self.port = self.socket.getsockname()[1]
  129. self.thread = threading.Thread(target=self._run)
  130. self.thread.start()
  131. def tearDown(self) -> None:
  132. self.thread.join()
  133. def _run(self) -> Optional[bool]:
  134. try:
  135. conn, addr = self.socket.accept()
  136. except OSError:
  137. return False
  138. self.transport = paramiko.Transport(conn)
  139. self.addCleanup(self.transport.close)
  140. host_key = paramiko.RSAKey.from_private_key(StringIO(SERVER_KEY))
  141. self.transport.add_server_key(host_key)
  142. server = Server(self.commands)
  143. self.transport.start_server(server=server)
  144. def test_run_command_password(self) -> None:
  145. vendor = ParamikoSSHVendor(
  146. allow_agent=False,
  147. look_for_keys=False,
  148. )
  149. vendor.run_command(
  150. "127.0.0.1",
  151. "test_run_command_password",
  152. username=USER,
  153. port=self.port,
  154. password=PASSWORD,
  155. )
  156. self.assertIn(b"test_run_command_password", self.commands)
  157. def test_run_command_with_privkey(self) -> None:
  158. key = paramiko.RSAKey.from_private_key(StringIO(CLIENT_KEY))
  159. vendor = ParamikoSSHVendor(
  160. allow_agent=False,
  161. look_for_keys=False,
  162. )
  163. vendor.run_command(
  164. "127.0.0.1",
  165. "test_run_command_with_privkey",
  166. username=USER,
  167. port=self.port,
  168. pkey=key,
  169. )
  170. self.assertIn(b"test_run_command_with_privkey", self.commands)
  171. def test_run_command_data_transfer(self) -> None:
  172. vendor = ParamikoSSHVendor(
  173. allow_agent=False,
  174. look_for_keys=False,
  175. )
  176. con = vendor.run_command(
  177. "127.0.0.1",
  178. "test_run_command_data_transfer",
  179. username=USER,
  180. port=self.port,
  181. password=PASSWORD,
  182. )
  183. self.assertIn(b"test_run_command_data_transfer", self.commands)
  184. channel = self.transport.accept(5)
  185. channel.send(b"stdout\n")
  186. channel.send_stderr(b"stderr\n")
  187. channel.close()
  188. # Fixme: it's return false
  189. # self.assertTrue(con.can_read())
  190. self.assertEqual(b"stdout\n", con.read(4096))
  191. # Fixme: it's return empty string
  192. # self.assertEqual(b'stderr\n', con.read_stderr(4096))