2015-07-10 15:56:14 +00:00
|
|
|
package ssh
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
|
|
|
"os/user"
|
|
|
|
"strings"
|
|
|
|
"testing"
|
|
|
|
|
|
|
|
"golang.org/x/crypto/ssh"
|
|
|
|
|
|
|
|
"github.com/hashicorp/vault/logical"
|
|
|
|
logicaltest "github.com/hashicorp/vault/logical/testing"
|
2015-07-10 22:18:02 +00:00
|
|
|
"github.com/hashicorp/vault/vault"
|
2015-07-10 15:56:14 +00:00
|
|
|
"github.com/mitchellh/mapstructure"
|
|
|
|
)
|
|
|
|
|
|
|
|
const (
|
2015-07-31 17:24:23 +00:00
|
|
|
testOTPKeyType = "otp"
|
|
|
|
testDynamicKeyType = "dynamic"
|
2015-07-10 22:18:02 +00:00
|
|
|
testCidr = "127.0.0.1/32"
|
2015-07-31 17:24:23 +00:00
|
|
|
testDynamicRoleName = "testDynamicRoleName"
|
|
|
|
testOTPRoleName = "testOTPRoleName"
|
2015-07-31 19:17:40 +00:00
|
|
|
testKeyName = "testKeyName"
|
2015-07-10 22:18:02 +00:00
|
|
|
testSharedPrivateKey = `
|
2015-07-10 15:56:14 +00:00
|
|
|
-----BEGIN RSA PRIVATE KEY-----
|
2015-07-10 22:18:02 +00:00
|
|
|
MIIEogIBAAKCAQEAvYvoRcWRxqOim5VZnuM6wHCbLUeiND0yaM1tvOl+Fsrz55DG
|
|
|
|
A0OZp4RGAu1Fgr46E1mzxFz1+zY4UbcEExg+u21fpa8YH8sytSWW1FyuD8ICib0A
|
|
|
|
/l8slmDMw4BkkGOtSlEqgscpkpv/TWZD1NxJWkPcULk8z6c7TOETn2/H9mL+v2RE
|
|
|
|
mbE6NDEwJKfD3MvlpIqCP7idR+86rNBAODjGOGgyUbtFLT+K01XmDRALkV3V/nh+
|
|
|
|
GltyjL4c6RU4zG2iRyV5RHlJtkml+UzUMkzr4IQnkCC32CC/wmtoo/IsAprpcHVe
|
|
|
|
nkBn3eFQ7uND70p5n6GhN/KOh2j519JFHJyokwIDAQABAoIBAHX7VOvBC3kCN9/x
|
|
|
|
+aPdup84OE7Z7MvpX6w+WlUhXVugnmsAAVDczhKoUc/WktLLx2huCGhsmKvyVuH+
|
|
|
|
MioUiE+vx75gm3qGx5xbtmOfALVMRLopjCnJYf6EaFA0ZeQ+NwowNW7Lu0PHmAU8
|
|
|
|
Z3JiX8IwxTz14DU82buDyewO7v+cEr97AnERe3PUcSTDoUXNaoNxjNpEJkKREY6h
|
|
|
|
4hAY676RT/GsRcQ8tqe/rnCqPHNd7JGqL+207FK4tJw7daoBjQyijWuB7K5chSal
|
|
|
|
oPInylM6b13ASXuOAOT/2uSUBWmFVCZPDCmnZxy2SdnJGbsJAMl7Ma3MUlaGvVI+
|
|
|
|
Tfh1aQkCgYEA4JlNOabTb3z42wz6mz+Nz3JRwbawD+PJXOk5JsSnV7DtPtfgkK9y
|
|
|
|
6FTQdhnozGWShAvJvc+C4QAihs9AlHXoaBY5bEU7R/8UK/pSqwzam+MmxmhVDV7G
|
|
|
|
IMQPV0FteoXTaJSikhZ88mETTegI2mik+zleBpVxvfdhE5TR+lq8Br0CgYEA2AwJ
|
|
|
|
CUD5CYUSj09PluR0HHqamWOrJkKPFPwa+5eiTTCzfBBxImYZh7nXnWuoviXC0sg2
|
|
|
|
AuvCW+uZ48ygv/D8gcz3j1JfbErKZJuV+TotK9rRtNIF5Ub7qysP7UjyI7zCssVM
|
|
|
|
kuDd9LfRXaB/qGAHNkcDA8NxmHW3gpln4CFdSY8CgYANs4xwfercHEWaJ1qKagAe
|
|
|
|
rZyrMpffAEhicJ/Z65lB0jtG4CiE6w8ZeUMWUVJQVcnwYD+4YpZbX4S7sJ0B8Ydy
|
|
|
|
AhkSr86D/92dKTIt2STk6aCN7gNyQ1vW198PtaAWH1/cO2UHgHOy3ZUt5X/Uwxl9
|
|
|
|
cex4flln+1Viumts2GgsCQKBgCJH7psgSyPekK5auFdKEr5+Gc/jB8I/Z3K9+g4X
|
|
|
|
5nH3G1PBTCJYLw7hRzw8W/8oALzvddqKzEFHphiGXK94Lqjt/A4q1OdbCrhiE68D
|
|
|
|
My21P/dAKB1UYRSs9Y8CNyHCjuZM9jSMJ8vv6vG/SOJPsnVDWVAckAbQDvlTHC9t
|
|
|
|
O98zAoGAcbW6uFDkrv0XMCpB9Su3KaNXOR0wzag+WIFQRXCcoTvxVi9iYfUReQPi
|
|
|
|
oOyBJU/HMVvBfv4g+OVFLVgSwwm6owwsouZ0+D/LasbuHqYyqYqdyPJQYzWA2Y+F
|
|
|
|
+B6f4RoPdSXj24JHPg/ioRxjaj094UXJxua2yfkcecGNEuBQHSs=
|
2015-07-10 15:56:14 +00:00
|
|
|
-----END RSA PRIVATE KEY-----
|
|
|
|
`
|
|
|
|
)
|
|
|
|
|
|
|
|
var testIP string
|
|
|
|
var testPort string
|
|
|
|
var testUserName string
|
|
|
|
var testAdminUser string
|
|
|
|
|
2015-07-10 23:27:21 +00:00
|
|
|
// Starts the server and initializes the servers IP address,
|
|
|
|
// port and usernames to be used by the test cases.
|
2015-07-10 15:56:14 +00:00
|
|
|
func init() {
|
2015-07-10 22:18:02 +00:00
|
|
|
addr, err := vault.StartTestServer()
|
2015-07-10 15:56:14 +00:00
|
|
|
if err != nil {
|
|
|
|
panic(fmt.Sprintf("Error starting mock server:%s", err))
|
|
|
|
}
|
|
|
|
input := strings.Split(addr, ":")
|
|
|
|
testIP = input[0]
|
|
|
|
testPort = input[1]
|
|
|
|
|
|
|
|
u, err := user.Current()
|
|
|
|
if err != nil {
|
|
|
|
panic(fmt.Sprintf("Error getting current username: '%s'", err))
|
|
|
|
}
|
|
|
|
testUserName = u.Username
|
|
|
|
testAdminUser = u.Username
|
|
|
|
}
|
|
|
|
|
2015-07-24 16:13:26 +00:00
|
|
|
func TestSSHDynamicKeyBackend(t *testing.T) {
|
2015-07-10 15:56:14 +00:00
|
|
|
logicaltest.Test(t, logicaltest.TestCase{
|
2015-07-24 16:13:26 +00:00
|
|
|
Factory: Factory,
|
2015-07-10 15:56:14 +00:00
|
|
|
Steps: []logicaltest.TestStep{
|
|
|
|
testNamedKeys(t),
|
2015-07-24 16:13:26 +00:00
|
|
|
testNewDynamicKeyRole(t),
|
|
|
|
testDynamicKeyCredsCreate(t),
|
2015-07-10 15:56:14 +00:00
|
|
|
},
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2015-07-31 17:24:23 +00:00
|
|
|
func TestSSHBackend_OTPRoleCrud(t *testing.T) {
|
|
|
|
data := map[string]interface{}{
|
|
|
|
"key_type": testOTPKeyType,
|
|
|
|
"default_user": testUserName,
|
2015-07-31 19:17:40 +00:00
|
|
|
"cidr": testCidr,
|
|
|
|
}
|
|
|
|
logicaltest.Test(t, logicaltest.TestCase{
|
|
|
|
Factory: Factory,
|
|
|
|
Steps: []logicaltest.TestStep{
|
|
|
|
testRoleWrite(t, testOTPRoleName, data),
|
|
|
|
testRoleRead(t, testOTPRoleName, data),
|
|
|
|
testRoleDelete(t, testOTPRoleName),
|
|
|
|
testRoleRead(t, testOTPRoleName, nil),
|
|
|
|
},
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestSSHBackend_DynamicRoleCrud(t *testing.T) {
|
|
|
|
data := map[string]interface{}{
|
|
|
|
"key_type": testDynamicKeyType,
|
|
|
|
"key": testKeyName,
|
|
|
|
"admin_user": testAdminUser,
|
|
|
|
"cidr": testCidr,
|
2015-07-31 17:24:23 +00:00
|
|
|
}
|
|
|
|
logicaltest.Test(t, logicaltest.TestCase{
|
|
|
|
Factory: Factory,
|
|
|
|
Steps: []logicaltest.TestStep{
|
2015-07-31 19:17:40 +00:00
|
|
|
testNamedKeys(t),
|
|
|
|
testRoleWrite(t, testDynamicRoleName, data),
|
|
|
|
testRoleRead(t, testDynamicRoleName, data),
|
|
|
|
testRoleDelete(t, testDynamicRoleName),
|
|
|
|
testRoleRead(t, testDynamicRoleName, nil),
|
2015-07-31 17:24:23 +00:00
|
|
|
},
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2015-07-31 19:17:40 +00:00
|
|
|
func testRoleWrite(t *testing.T, name string, data map[string]interface{}) logicaltest.TestStep {
|
2015-07-31 17:24:23 +00:00
|
|
|
return logicaltest.TestStep{
|
|
|
|
Operation: logical.WriteOperation,
|
2015-07-31 19:17:40 +00:00
|
|
|
Path: "roles/" + name,
|
2015-07-31 17:24:23 +00:00
|
|
|
Data: data,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-07-31 19:17:40 +00:00
|
|
|
func testRoleRead(t *testing.T, name string, data map[string]interface{}) logicaltest.TestStep {
|
2015-07-31 17:24:23 +00:00
|
|
|
return logicaltest.TestStep{
|
|
|
|
Operation: logical.ReadOperation,
|
2015-07-31 19:17:40 +00:00
|
|
|
Path: "roles/" + name,
|
2015-07-31 17:24:23 +00:00
|
|
|
Check: func(resp *logical.Response) error {
|
|
|
|
if resp == nil {
|
|
|
|
if data == nil {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
return fmt.Errorf("bad: %#v", resp)
|
|
|
|
}
|
2015-07-31 19:17:40 +00:00
|
|
|
var d sshRole
|
2015-07-31 17:24:23 +00:00
|
|
|
if err := mapstructure.Decode(resp.Data, &d); err != nil {
|
2015-07-31 19:17:40 +00:00
|
|
|
return fmt.Errorf("error decoding response:%s", err)
|
2015-07-31 17:24:23 +00:00
|
|
|
}
|
2015-07-31 19:17:40 +00:00
|
|
|
if name == testOTPRoleName {
|
|
|
|
if d.KeyType != data["key_type"] || d.DefaultUser != data["default_user"] || d.CIDR != data["cidr"] {
|
|
|
|
return fmt.Errorf("data mismatch. bad: %#v", resp)
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
if d.AdminUser != data["admin_user"] || d.CIDR != data["cidr"] || d.KeyName != data["key"] || d.KeyType != data["key_type"] {
|
|
|
|
return fmt.Errorf("data mismatch. bad: %#v", resp)
|
|
|
|
}
|
2015-07-31 17:24:23 +00:00
|
|
|
}
|
|
|
|
return nil
|
|
|
|
},
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-07-31 19:17:40 +00:00
|
|
|
func testRoleDelete(t *testing.T, name string) logicaltest.TestStep {
|
2015-07-31 17:24:23 +00:00
|
|
|
return logicaltest.TestStep{
|
|
|
|
Operation: logical.DeleteOperation,
|
2015-07-31 19:17:40 +00:00
|
|
|
Path: "roles/" + name,
|
2015-07-31 17:24:23 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-07-10 23:27:21 +00:00
|
|
|
func testNamedKeys(t *testing.T) logicaltest.TestStep {
|
|
|
|
return logicaltest.TestStep{
|
|
|
|
Operation: logical.WriteOperation,
|
2015-07-31 19:17:40 +00:00
|
|
|
Path: fmt.Sprintf("keys/%s", testKeyName),
|
2015-07-10 23:27:21 +00:00
|
|
|
Data: map[string]interface{}{
|
|
|
|
"key": testSharedPrivateKey,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-07-24 16:13:26 +00:00
|
|
|
func testNewDynamicKeyRole(t *testing.T) logicaltest.TestStep {
|
2015-07-10 23:27:21 +00:00
|
|
|
return logicaltest.TestStep{
|
|
|
|
Operation: logical.WriteOperation,
|
2015-07-31 17:24:23 +00:00
|
|
|
Path: fmt.Sprintf("roles/%s", testDynamicRoleName),
|
2015-07-10 23:27:21 +00:00
|
|
|
Data: map[string]interface{}{
|
2015-07-24 16:13:26 +00:00
|
|
|
"key_type": "dynamic",
|
2015-07-31 19:17:40 +00:00
|
|
|
"key": testKeyName,
|
2015-07-10 23:27:21 +00:00
|
|
|
"admin_user": testAdminUser,
|
|
|
|
"cidr": testCidr,
|
|
|
|
"port": testPort,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-07-24 16:13:26 +00:00
|
|
|
func testDynamicKeyCredsCreate(t *testing.T) logicaltest.TestStep {
|
2015-07-10 15:56:14 +00:00
|
|
|
return logicaltest.TestStep{
|
|
|
|
Operation: logical.WriteOperation,
|
2015-07-31 17:24:23 +00:00
|
|
|
Path: fmt.Sprintf("creds/%s", testDynamicRoleName),
|
2015-07-10 15:56:14 +00:00
|
|
|
Data: map[string]interface{}{
|
|
|
|
"username": testUserName,
|
|
|
|
"ip": testIP,
|
|
|
|
},
|
|
|
|
Check: func(resp *logical.Response) error {
|
|
|
|
var d struct {
|
|
|
|
Key string `mapstructure:"key"`
|
|
|
|
}
|
|
|
|
if err := mapstructure.Decode(resp.Data, &d); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if d.Key == "" {
|
|
|
|
return fmt.Errorf("Generated key is an empty string")
|
|
|
|
}
|
|
|
|
_, err := ssh.ParsePrivateKey([]byte(d.Key))
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("Generated key is invalid")
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
},
|
|
|
|
}
|
|
|
|
}
|