open-vault/command/ssh_test.go

199 lines
5.5 KiB
Go
Raw Normal View History

2015-07-10 15:56:14 +00:00
package command
import (
"bytes"
"fmt"
2015-07-10 22:18:02 +00:00
"io"
"os"
2015-07-10 15:56:14 +00:00
"strings"
"testing"
logicalssh "github.com/hashicorp/vault/builtin/logical/ssh"
"github.com/hashicorp/vault/http"
"github.com/hashicorp/vault/vault"
"github.com/mitchellh/cli"
)
const (
2015-07-10 22:18:02 +00:00
testCidr = "127.0.0.1/32"
testRoleName = "testRoleName"
testKey = "testKey"
testSharedPrivateKey = `
2015-07-10 15:56:14 +00:00
-----BEGIN RSA PRIVATE KEY-----
2015-07-10 22:18:02 +00:00
MIIEogIBAAKCAQEAvYvoRcWRxqOim5VZnuM6wHCbLUeiND0yaM1tvOl+Fsrz55DG
A0OZp4RGAu1Fgr46E1mzxFz1+zY4UbcEExg+u21fpa8YH8sytSWW1FyuD8ICib0A
/l8slmDMw4BkkGOtSlEqgscpkpv/TWZD1NxJWkPcULk8z6c7TOETn2/H9mL+v2RE
mbE6NDEwJKfD3MvlpIqCP7idR+86rNBAODjGOGgyUbtFLT+K01XmDRALkV3V/nh+
GltyjL4c6RU4zG2iRyV5RHlJtkml+UzUMkzr4IQnkCC32CC/wmtoo/IsAprpcHVe
nkBn3eFQ7uND70p5n6GhN/KOh2j519JFHJyokwIDAQABAoIBAHX7VOvBC3kCN9/x
+aPdup84OE7Z7MvpX6w+WlUhXVugnmsAAVDczhKoUc/WktLLx2huCGhsmKvyVuH+
MioUiE+vx75gm3qGx5xbtmOfALVMRLopjCnJYf6EaFA0ZeQ+NwowNW7Lu0PHmAU8
Z3JiX8IwxTz14DU82buDyewO7v+cEr97AnERe3PUcSTDoUXNaoNxjNpEJkKREY6h
4hAY676RT/GsRcQ8tqe/rnCqPHNd7JGqL+207FK4tJw7daoBjQyijWuB7K5chSal
oPInylM6b13ASXuOAOT/2uSUBWmFVCZPDCmnZxy2SdnJGbsJAMl7Ma3MUlaGvVI+
Tfh1aQkCgYEA4JlNOabTb3z42wz6mz+Nz3JRwbawD+PJXOk5JsSnV7DtPtfgkK9y
6FTQdhnozGWShAvJvc+C4QAihs9AlHXoaBY5bEU7R/8UK/pSqwzam+MmxmhVDV7G
IMQPV0FteoXTaJSikhZ88mETTegI2mik+zleBpVxvfdhE5TR+lq8Br0CgYEA2AwJ
CUD5CYUSj09PluR0HHqamWOrJkKPFPwa+5eiTTCzfBBxImYZh7nXnWuoviXC0sg2
AuvCW+uZ48ygv/D8gcz3j1JfbErKZJuV+TotK9rRtNIF5Ub7qysP7UjyI7zCssVM
kuDd9LfRXaB/qGAHNkcDA8NxmHW3gpln4CFdSY8CgYANs4xwfercHEWaJ1qKagAe
rZyrMpffAEhicJ/Z65lB0jtG4CiE6w8ZeUMWUVJQVcnwYD+4YpZbX4S7sJ0B8Ydy
AhkSr86D/92dKTIt2STk6aCN7gNyQ1vW198PtaAWH1/cO2UHgHOy3ZUt5X/Uwxl9
cex4flln+1Viumts2GgsCQKBgCJH7psgSyPekK5auFdKEr5+Gc/jB8I/Z3K9+g4X
5nH3G1PBTCJYLw7hRzw8W/8oALzvddqKzEFHphiGXK94Lqjt/A4q1OdbCrhiE68D
My21P/dAKB1UYRSs9Y8CNyHCjuZM9jSMJ8vv6vG/SOJPsnVDWVAckAbQDvlTHC9t
O98zAoGAcbW6uFDkrv0XMCpB9Su3KaNXOR0wzag+WIFQRXCcoTvxVi9iYfUReQPi
oOyBJU/HMVvBfv4g+OVFLVgSwwm6owwsouZ0+D/LasbuHqYyqYqdyPJQYzWA2Y+F
+B6f4RoPdSXj24JHPg/ioRxjaj094UXJxua2yfkcecGNEuBQHSs=
2015-07-10 15:56:14 +00:00
-----END RSA PRIVATE KEY-----
`
)
var testIP string
var testPort string
var testUserName string
var testAdminUser string
2015-07-10 23:27:21 +00:00
// Starts the server and initializes the servers IP address,
// port and usernames to be used by the test cases.
func initTest() {
2015-08-18 23:48:50 +00:00
addr, err := vault.StartSSHHostTestServer()
2015-07-10 15:56:14 +00:00
if err != nil {
panic(fmt.Sprintf("Error starting mock server:%s", err))
}
input := strings.Split(addr, ":")
testIP = input[0]
testPort = input[1]
testUserName := os.Getenv("VAULT_SSHTEST_USER")
if len(testUserName) == 0 {
panic("VAULT_SSHTEST_USER must be set to the desired user")
2015-07-10 15:56:14 +00:00
}
testAdminUser = testUserName
2015-07-10 15:56:14 +00:00
}
2015-07-27 17:02:31 +00:00
// This test is broken. Hence temporarily disabling it.
2015-07-24 16:13:26 +00:00
func testSSH(t *testing.T) {
initTest()
2015-07-10 23:27:21 +00:00
// Add the SSH backend to the unsealed test core.
// This should be done before the unsealed core is created.
2015-07-10 15:56:14 +00:00
err := vault.AddTestLogicalBackend("ssh", logicalssh.Factory)
if err != nil {
t.Fatalf("err: %s", err)
}
core, _, token := vault.TestCoreUnsealed(t)
ln, addr := http.TestServer(t, core)
defer ln.Close()
ui := new(cli.MockUi)
mountCmd := &MountCommand{
Meta: Meta{
ClientToken: token,
Ui: ui,
},
}
args := []string{"-address", addr, "ssh"}
2015-07-10 22:59:32 +00:00
// Mount the SSH backend
2015-07-10 15:56:14 +00:00
if code := mountCmd.Run(args); code != 0 {
t.Fatalf("bad: %d\n\n%s", code, ui.ErrorWriter.String())
}
client, err := mountCmd.Client()
if err != nil {
t.Fatalf("err: %s", err)
}
mounts, err := client.Sys().ListMounts()
if err != nil {
t.Fatalf("err: %s", err)
}
2015-07-10 22:59:32 +00:00
// Check if SSH backend is mounted or not
2015-07-10 15:56:14 +00:00
mount, ok := mounts["ssh/"]
if !ok {
t.Fatal("should have ssh mount")
}
if mount.Type != "ssh" {
t.Fatal("should have ssh type")
}
2015-07-10 22:59:32 +00:00
2015-07-10 15:56:14 +00:00
writeCmd := &WriteCommand{
Meta: Meta{
ClientToken: token,
Ui: ui,
},
}
2015-07-10 22:59:32 +00:00
// Create a 'named' key in vault
2015-07-10 15:56:14 +00:00
args = []string{
"-address", addr,
"ssh/keys/" + testKey,
2015-07-10 22:18:02 +00:00
"key=" + testSharedPrivateKey,
2015-07-10 15:56:14 +00:00
}
if code := writeCmd.Run(args); code != 0 {
t.Fatalf("bad: %d\n\n%s", code, ui.ErrorWriter.String())
}
2015-07-10 23:27:21 +00:00
// Create a role using the named key along with cidr, username and port
2015-07-10 15:56:14 +00:00
args = []string{
"-address", addr,
"ssh/roles/" + testRoleName,
"key=" + testKey,
"admin_user=" + testUserName,
"cidr=" + testCidr,
"port=" + testPort,
}
if code := writeCmd.Run(args); code != 0 {
t.Fatalf("bad: %d\n\n%s", code, ui.ErrorWriter.String())
}
sshCmd := &SSHCommand{
Meta: Meta{
ClientToken: token,
Ui: ui,
},
}
2015-07-10 22:59:32 +00:00
// Get the dynamic key and establish an SSH connection with target.
2015-07-10 23:27:21 +00:00
// Inline command when supplied, runs on target and terminates the
// connection. Use whoami as the inline command in target and get
// the result. Compare the result with the username used to connect
// to target. Test succeeds if they match.
2015-07-10 15:56:14 +00:00
args = []string{
"-address", addr,
"-role=" + testRoleName,
testUserName + "@" + testIP,
"/usr/bin/whoami",
}
2015-07-10 22:59:32 +00:00
2015-07-10 23:27:21 +00:00
// Creating pipe to get the result of the inline command run in target machine.
2015-07-10 22:18:02 +00:00
stdout := os.Stdout
r, w, err := os.Pipe()
if err != nil {
t.Fatalf("err: %s", err)
}
os.Stdout = w
2015-07-10 15:56:14 +00:00
if code := sshCmd.Run(args); code != 0 {
t.Fatalf("bad: %d\n\n%s", code, ui.ErrorWriter.String())
}
2015-07-10 22:18:02 +00:00
bufChan := make(chan string)
2015-07-10 15:56:14 +00:00
go func() {
2015-07-10 22:18:02 +00:00
var buf bytes.Buffer
io.Copy(&buf, r)
bufChan <- buf.String()
2015-07-10 15:56:14 +00:00
}()
2015-07-10 22:18:02 +00:00
w.Close()
os.Stdout = stdout
userName := <-bufChan
userName = strings.TrimSpace(userName)
2015-07-10 23:27:21 +00:00
2015-07-10 22:59:32 +00:00
// Comparing the username used to connect to target and
// the username on the target, thereby verifying successful
// execution
2015-07-10 22:18:02 +00:00
if userName != testUserName {
t.Fatalf("err: username mismatch")
2015-07-10 15:56:14 +00:00
}
}