/** * @file test_authkeys.c * @author Roman Janota * @brief libnetconf2 SSH authentication using mocked system authorized_keys * * @copyright * Copyright (c) 2023 CESNET, z.s.p.o. * * This source code is licensed under BSD 3-Clause License (the "License"). * You may not use this file except in compliance with the License. * You may obtain a copy of the License at * * https://opensource.org/licenses/BSD-3-Clause */ #define _GNU_SOURCE #include #include #include #include #include #include #include #include #include "ln2_test.h" struct test_authkey_data { const char *pubkey_path; const char *privkey_path; int expect_ok; }; int TEST_PORT = 10050; const char *TEST_PORT_STR = "10050"; static void * server_thread(void *arg) { int ret; NC_MSG_TYPE msgtype; struct nc_session *session; struct nc_pollsession *ps; struct ln2_test_ctx *test_ctx = arg; struct test_authkey_data *test_data = test_ctx->test_data; ps = nc_ps_new(); assert_non_null(ps); /* accept a session and add it to the poll session structure */ pthread_barrier_wait(&test_ctx->barrier); msgtype = nc_accept(NC_ACCEPT_TIMEOUT, test_ctx->ctx, &session); /* only continue if we expect to authenticate successfully */ if (test_data->expect_ok) { assert_int_equal(msgtype, NC_MSG_HELLO); } else { assert_int_equal(msgtype, NC_MSG_ERROR); nc_ps_free(ps); return NULL; } ret = nc_ps_add_session(ps, session); assert_int_equal(ret, 0); do { ret = nc_ps_poll(ps, NC_PS_POLL_TIMEOUT, NULL); assert_int_equal(ret & NC_PSPOLL_RPC, NC_PSPOLL_RPC); } while (!(ret & NC_PSPOLL_SESSION_TERM)); nc_ps_clear(ps, 1, NULL); nc_ps_free(ps); return NULL; } static void * client_thread(void *arg) { int ret; struct nc_session *session = NULL; struct ln2_test_ctx *test_ctx = arg; struct test_authkey_data *test_data = test_ctx->test_data; /* skip all hostkey and known_hosts checks */ nc_client_ssh_set_knownhosts_mode(NC_SSH_KNOWNHOSTS_SKIP); /* set directory where to search for modules */ ret = nc_client_set_schema_searchpath(MODULES_DIR); assert_int_equal(ret, 0); /* add client's key pair */ ret = nc_client_ssh_add_keypair(test_data->pubkey_path, test_data->privkey_path); assert_int_equal(ret, 0); /* set ssh username */ ret = nc_client_ssh_set_username("test"); assert_int_equal(ret, 0); pthread_barrier_wait(&test_ctx->barrier); /* connect */ session = nc_connect_ssh("127.0.0.1", TEST_PORT, NULL); if (test_data->expect_ok) { assert_non_null(session); } else { assert_null(session); } nc_session_free(session, NULL); return NULL; } static void test_nc_authkey_ok(void **arg) { int ret, i; pthread_t tids[2]; struct test_authkey_data *test_data; test_data = (*(struct ln2_test_ctx **)arg)->test_data; /* set the path to the test's authorized_keys file */ ret = nc_server_ssh_set_authkey_path_format(TESTS_DIR "/data/authorized_keys"); assert_int_equal(ret, 0); /* set pubkey and privkey path, the pubkey matches the one in authorized keys */ test_data->pubkey_path = TESTS_DIR "/data/id_ed25519.pub"; test_data->privkey_path = TESTS_DIR "/data/id_ed25519"; /* expect ok result */ test_data->expect_ok = 1; /* client */ ret = pthread_create(&tids[0], NULL, client_thread, *arg); assert_int_equal(ret, 0); /* server */ ret = pthread_create(&tids[1], NULL, server_thread, *arg); assert_int_equal(ret, 0); for (i = 0; i < 2; i++) { pthread_join(tids[i], NULL); } } static void test_nc_authkey_bad_key(void **arg) { int ret, i; pthread_t tids[2]; struct test_authkey_data *test_data; test_data = (*(struct ln2_test_ctx **)arg)->test_data; /* set the path to the test's authorized_keys file */ ret = nc_server_ssh_set_authkey_path_format(TESTS_DIR "/data/authorized_keys"); assert_int_equal(ret, 0); /* set pubkey and privkey path, the pubkey doesn't match the one in authorized keys */ test_data->pubkey_path = TESTS_DIR "/data/id_ecdsa521.pub"; test_data->privkey_path = TESTS_DIR "/data/id_ecdsa521"; /* expect fail */ test_data->expect_ok = 0; /* client */ ret = pthread_create(&tids[0], NULL, client_thread, *arg); assert_int_equal(ret, 0); /* server */ ret = pthread_create(&tids[1], NULL, server_thread, *arg); assert_int_equal(ret, 0); for (i = 0; i < 2; i++) { pthread_join(tids[i], NULL); } } static void test_nc_authkey_bad_path(void **arg) { int ret, i; pthread_t tids[2]; struct ln2_test_ctx *test_ctx; struct test_authkey_data *test_data; assert_non_null(arg); test_ctx = *arg; test_data = test_ctx->test_data; /* set the path to the test's authorized_keys file */ ret = nc_server_ssh_set_authkey_path_format(TESTS_DIR "/some/bad/path"); assert_int_equal(ret, 0); /* set pubkey and privkey path, the pubkey doesn't match the one in authorized keys */ test_data->pubkey_path = TESTS_DIR "/data/id_ed25519.pub"; test_data->privkey_path = TESTS_DIR "/data/id_ed25519"; /* expect fail */ test_data->expect_ok = 0; /* client */ ret = pthread_create(&tids[0], NULL, client_thread, test_ctx); assert_int_equal(ret, 0); /* server */ ret = pthread_create(&tids[1], NULL, server_thread, test_ctx); assert_int_equal(ret, 0); for (i = 0; i < 2; i++) { pthread_join(tids[i], NULL); } } static int setup_f(void **state) { int ret; struct lyd_node *tree = NULL; struct ln2_test_ctx *test_ctx; struct test_authkey_data *test_data; ret = ln2_glob_test_setup(&test_ctx); assert_int_equal(ret, 0); test_data = calloc(1, sizeof *test_data); assert_non_null(test_data); test_ctx->test_data = test_data; test_ctx->free_test_data = ln2_glob_test_free_test_data; *state = test_ctx; ret = nc_server_config_add_ssh_hostkey(test_ctx->ctx, "endpt", "hostkey", TESTS_DIR "/data/server.key", NULL, &tree); assert_int_equal(ret, 0); ret = nc_server_config_add_address_port(test_ctx->ctx, "endpt", NC_TI_SSH, "127.0.0.1", TEST_PORT, &tree); assert_int_equal(ret, 0); ret = nc_server_config_add_ssh_user_authkey(test_ctx->ctx, "endpt", "test", &tree); assert_int_equal(ret, 0); /* configure the server based on the data */ ret = nc_server_config_setup_data(tree); assert_int_equal(ret, 0); lyd_free_all(tree); return 0; } int main(void) { const struct CMUnitTest tests[] = { cmocka_unit_test_setup_teardown(test_nc_authkey_ok, setup_f, ln2_glob_test_teardown), cmocka_unit_test_setup_teardown(test_nc_authkey_bad_key, setup_f, ln2_glob_test_teardown), cmocka_unit_test_setup_teardown(test_nc_authkey_bad_path, setup_f, ln2_glob_test_teardown), }; /* try to get ports from the environment, otherwise use the default */ if (ln2_glob_test_get_ports(1, &TEST_PORT, &TEST_PORT_STR)) { return 1; } setenv("CMOCKA_TEST_ABORT", "1", 1); return cmocka_run_group_tests(tests, NULL, NULL); }