session_test.go 4.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185
  1. // Copyright 2012 The Go Authors. All rights reserved.
  2. // Use of this source code is governed by a BSD-style
  3. // license that can be found in the LICENSE file.
  4. // +build !windows
  5. package test
  6. // Session functional tests.
  7. import (
  8. "bytes"
  9. "code.google.com/p/go.crypto/ssh"
  10. "io"
  11. "strings"
  12. "testing"
  13. )
  14. func TestRunCommandSuccess(t *testing.T) {
  15. server := newServer(t)
  16. defer server.Shutdown()
  17. conn := server.Dial(clientConfig())
  18. defer conn.Close()
  19. session, err := conn.NewSession()
  20. if err != nil {
  21. t.Fatalf("session failed: %v", err)
  22. }
  23. defer session.Close()
  24. err = session.Run("true")
  25. if err != nil {
  26. t.Fatalf("session failed: %v", err)
  27. }
  28. }
  29. func TestHostKeyCheck(t *testing.T) {
  30. server := newServer(t)
  31. defer server.Shutdown()
  32. conf := clientConfig()
  33. k := conf.HostKeyChecker.(*storedHostKey)
  34. // change the keys.
  35. k.keys[ssh.KeyAlgoRSA][25]++
  36. k.keys[ssh.KeyAlgoDSA][25]++
  37. k.keys[ssh.KeyAlgoECDSA256][25]++
  38. conn, err := server.TryDial(conf)
  39. if err == nil {
  40. conn.Close()
  41. t.Fatalf("dial should have failed.")
  42. } else if !strings.Contains(err.Error(), "host key mismatch") {
  43. t.Fatalf("'host key mismatch' not found in %v", err)
  44. }
  45. }
  46. func TestRunCommandFailed(t *testing.T) {
  47. server := newServer(t)
  48. defer server.Shutdown()
  49. conn := server.Dial(clientConfig())
  50. defer conn.Close()
  51. session, err := conn.NewSession()
  52. if err != nil {
  53. t.Fatalf("session failed: %v", err)
  54. }
  55. defer session.Close()
  56. err = session.Run(`bash -c "kill -9 $$"`)
  57. if err == nil {
  58. t.Fatalf("session succeeded: %v", err)
  59. }
  60. }
  61. func TestRunCommandWeClosed(t *testing.T) {
  62. server := newServer(t)
  63. defer server.Shutdown()
  64. conn := server.Dial(clientConfig())
  65. defer conn.Close()
  66. session, err := conn.NewSession()
  67. if err != nil {
  68. t.Fatalf("session failed: %v", err)
  69. }
  70. err = session.Shell()
  71. if err != nil {
  72. t.Fatalf("shell failed: %v", err)
  73. }
  74. err = session.Close()
  75. if err != nil {
  76. t.Fatalf("shell failed: %v", err)
  77. }
  78. }
  79. func TestFuncLargeRead(t *testing.T) {
  80. server := newServer(t)
  81. defer server.Shutdown()
  82. conn := server.Dial(clientConfig())
  83. defer conn.Close()
  84. session, err := conn.NewSession()
  85. if err != nil {
  86. t.Fatalf("unable to create new session: %s", err)
  87. }
  88. stdout, err := session.StdoutPipe()
  89. if err != nil {
  90. t.Fatalf("unable to acquire stdout pipe: %s", err)
  91. }
  92. err = session.Start("dd if=/dev/urandom bs=2048 count=1")
  93. if err != nil {
  94. t.Fatalf("unable to execute remote command: %s", err)
  95. }
  96. buf := new(bytes.Buffer)
  97. n, err := io.Copy(buf, stdout)
  98. if err != nil {
  99. t.Fatalf("error reading from remote stdout: %s", err)
  100. }
  101. if n != 2048 {
  102. t.Fatalf("Expected %d bytes but read only %d from remote command", 2048, n)
  103. }
  104. }
  105. func TestInvalidTerminalMode(t *testing.T) {
  106. server := newServer(t)
  107. defer server.Shutdown()
  108. conn := server.Dial(clientConfig())
  109. defer conn.Close()
  110. session, err := conn.NewSession()
  111. if err != nil {
  112. t.Fatalf("session failed: %v", err)
  113. }
  114. defer session.Close()
  115. if err = session.RequestPty("vt100", 80, 40, ssh.TerminalModes{255: 1984}); err == nil {
  116. t.Fatalf("req-pty failed: successful request with invalid mode")
  117. }
  118. }
  119. func TestValidTerminalMode(t *testing.T) {
  120. server := newServer(t)
  121. defer server.Shutdown()
  122. conn := server.Dial(clientConfig())
  123. defer conn.Close()
  124. session, err := conn.NewSession()
  125. if err != nil {
  126. t.Fatalf("session failed: %v", err)
  127. }
  128. defer session.Close()
  129. stdout, err := session.StdoutPipe()
  130. if err != nil {
  131. t.Fatalf("unable to acquire stdout pipe: %s", err)
  132. }
  133. stdin, err := session.StdinPipe()
  134. if err != nil {
  135. t.Fatalf("unable to acquire stdin pipe: %s", err)
  136. }
  137. tm := ssh.TerminalModes{ssh.ECHO: 0}
  138. if err = session.RequestPty("xterm", 80, 40, tm); err != nil {
  139. t.Fatalf("req-pty failed: %s", err)
  140. }
  141. err = session.Shell()
  142. if err != nil {
  143. t.Fatalf("session failed: %s", err)
  144. }
  145. stdin.Write([]byte("stty -a && exit\n"))
  146. var buf bytes.Buffer
  147. if _, err := io.Copy(&buf, stdout); err != nil {
  148. t.Fatalf("reading failed: %s", err)
  149. }
  150. if sttyOutput := buf.String(); !strings.Contains(sttyOutput, "-echo ") {
  151. t.Fatalf("terminal mode failure: expected -echo in stty output, got %s", sttyOutput)
  152. }
  153. }