session_test.go 4.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183
  1. // Copyright 2012 The Go Authors. All rights reserved.
  2. // Use of this source code is governed by a BSD-style
  3. // license that can be found in the LICENSE file.
  4. // +build !windows
  5. package test
  6. // Session functional tests.
  7. import (
  8. "bytes"
  9. "code.google.com/p/go.crypto/ssh"
  10. "io"
  11. "strings"
  12. "testing"
  13. )
  14. func TestRunCommandSuccess(t *testing.T) {
  15. server := newServer(t)
  16. defer server.Shutdown()
  17. conn := server.Dial(clientConfig())
  18. defer conn.Close()
  19. session, err := conn.NewSession()
  20. if err != nil {
  21. t.Fatalf("session failed: %v", err)
  22. }
  23. defer session.Close()
  24. err = session.Run("true")
  25. if err != nil {
  26. t.Fatalf("session failed: %v", err)
  27. }
  28. }
  29. func TestHostKeyCheck(t *testing.T) {
  30. server := newServer(t)
  31. defer server.Shutdown()
  32. conf := clientConfig()
  33. k := conf.HostKeyChecker.(*storedHostKey)
  34. // change the key.
  35. k.keys["ssh-rsa"][25]++
  36. conn, err := server.TryDial(conf)
  37. if err == nil {
  38. conn.Close()
  39. t.Fatalf("dial should have failed.")
  40. } else if !strings.Contains(err.Error(), "host key mismatch") {
  41. t.Fatalf("'host key mismatch' not found in %v", err)
  42. }
  43. }
  44. func TestRunCommandFailed(t *testing.T) {
  45. server := newServer(t)
  46. defer server.Shutdown()
  47. conn := server.Dial(clientConfig())
  48. defer conn.Close()
  49. session, err := conn.NewSession()
  50. if err != nil {
  51. t.Fatalf("session failed: %v", err)
  52. }
  53. defer session.Close()
  54. err = session.Run(`bash -c "kill -9 $$"`)
  55. if err == nil {
  56. t.Fatalf("session succeeded: %v", err)
  57. }
  58. }
  59. func TestRunCommandWeClosed(t *testing.T) {
  60. server := newServer(t)
  61. defer server.Shutdown()
  62. conn := server.Dial(clientConfig())
  63. defer conn.Close()
  64. session, err := conn.NewSession()
  65. if err != nil {
  66. t.Fatalf("session failed: %v", err)
  67. }
  68. err = session.Shell()
  69. if err != nil {
  70. t.Fatalf("shell failed: %v", err)
  71. }
  72. err = session.Close()
  73. if err != nil {
  74. t.Fatalf("shell failed: %v", err)
  75. }
  76. }
  77. func TestFuncLargeRead(t *testing.T) {
  78. server := newServer(t)
  79. defer server.Shutdown()
  80. conn := server.Dial(clientConfig())
  81. defer conn.Close()
  82. session, err := conn.NewSession()
  83. if err != nil {
  84. t.Fatalf("unable to create new session: %s", err)
  85. }
  86. stdout, err := session.StdoutPipe()
  87. if err != nil {
  88. t.Fatalf("unable to acquire stdout pipe: %s", err)
  89. }
  90. err = session.Start("dd if=/dev/urandom bs=2048 count=1")
  91. if err != nil {
  92. t.Fatalf("unable to execute remote command: %s", err)
  93. }
  94. buf := new(bytes.Buffer)
  95. n, err := io.Copy(buf, stdout)
  96. if err != nil {
  97. t.Fatalf("error reading from remote stdout: %s", err)
  98. }
  99. if n != 2048 {
  100. t.Fatalf("Expected %d bytes but read only %d from remote command", 2048, n)
  101. }
  102. }
  103. func TestInvalidTerminalMode(t *testing.T) {
  104. server := newServer(t)
  105. defer server.Shutdown()
  106. conn := server.Dial(clientConfig())
  107. defer conn.Close()
  108. session, err := conn.NewSession()
  109. if err != nil {
  110. t.Fatalf("session failed: %v", err)
  111. }
  112. defer session.Close()
  113. if err = session.RequestPty("vt100", 80, 40, ssh.TerminalModes{255: 1984}); err == nil {
  114. t.Fatalf("req-pty failed: successful request with invalid mode")
  115. }
  116. }
  117. func TestValidTerminalMode(t *testing.T) {
  118. server := newServer(t)
  119. defer server.Shutdown()
  120. conn := server.Dial(clientConfig())
  121. defer conn.Close()
  122. session, err := conn.NewSession()
  123. if err != nil {
  124. t.Fatalf("session failed: %v", err)
  125. }
  126. defer session.Close()
  127. stdout, err := session.StdoutPipe()
  128. if err != nil {
  129. t.Fatalf("unable to acquire stdout pipe: %s", err)
  130. }
  131. stdin, err := session.StdinPipe()
  132. if err != nil {
  133. t.Fatalf("unable to acquire stdin pipe: %s", err)
  134. }
  135. tm := ssh.TerminalModes{ssh.ECHO: 0}
  136. if err = session.RequestPty("xterm", 80, 40, tm); err != nil {
  137. t.Fatalf("req-pty failed: %s", err)
  138. }
  139. err = session.Shell()
  140. if err != nil {
  141. t.Fatalf("session failed: %s", err)
  142. }
  143. stdin.Write([]byte("stty -a && exit\n"))
  144. var buf bytes.Buffer
  145. if _, err := io.Copy(&buf, stdout); err != nil {
  146. t.Fatalf("reading failed: %s", err)
  147. }
  148. if sttyOutput := buf.String(); !strings.Contains(sttyOutput, "-echo ") {
  149. t.Fatalf("terminal mode failure: expected -echo in stty output, got %s", sttyOutput)
  150. }
  151. }