distant/distant-plugin-ssh/tests/sshd/mod.rs

731 lines
22 KiB
Rust
Raw Normal View History

use std::collections::HashMap;
use std::net::{IpAddr, Ipv4Addr, Ipv6Addr};
#[cfg(unix)]
use std::os::unix::fs::PermissionsExt;
use std::path::{Path, PathBuf};
use std::process::{Child, Command};
use std::sync::atomic::{AtomicU16, Ordering};
use std::sync::Mutex;
use std::time::{Duration, Instant};
use std::{fmt, io, thread};
2022-08-08 06:10:32 +00:00
use anyhow::Context;
use assert_fs::prelude::*;
use assert_fs::TempDir;
2022-08-08 06:10:32 +00:00
use async_trait::async_trait;
use derive_more::{Deref, DerefMut, Display};
2022-08-08 06:10:32 +00:00
use distant_core::DistantClient;
use distant_plugin_ssh::{Ssh, SshAuthEvent, SshAuthHandler, SshOpts};
2022-12-11 10:15:26 +00:00
use log::*;
use once_cell::sync::Lazy;
2022-08-08 06:10:32 +00:00
use rstest::*;
use crate::utils::ci_path_to_string;
2022-08-08 06:10:32 +00:00
#[derive(Deref, DerefMut)]
pub struct Ctx<T> {
#[deref]
#[deref_mut]
pub value: T,
2022-12-11 10:15:26 +00:00
pub sshd: Sshd,
2022-08-08 06:10:32 +00:00
}
// NOTE: Should find path
//
// Unix should be something like /usr/sbin/sshd
// Windows should be something like C:\Windows\System32\OpenSSH\sshd.exe
static BIN_PATH: Lazy<PathBuf> =
Lazy::new(|| which::which(if cfg!(windows) { "sshd.exe" } else { "sshd" }).unwrap());
/// Port range to use when finding a port to bind to (using IANA guidance)
const PORT_RANGE: (u16, u16) = (49152, 65535);
static USERNAME: Lazy<String> = Lazy::new(whoami::username);
2022-08-28 06:52:36 +00:00
/// Time to wait after spawning sshd before continuing. Will check if still alive
const WAIT_AFTER_SPAWN: Duration = Duration::from_millis(300);
/// Maximum times to retry spawning sshd when it fails
const SPAWN_RETRY_CNT: usize = 3;
2022-12-11 10:15:26 +00:00
const MAX_DROP_WAIT_TIME: Duration = Duration::from_millis(500);
2022-08-08 06:10:32 +00:00
pub struct SshKeygen;
impl SshKeygen {
// ssh-keygen -t ed25519 -f $ROOT/id_ed25519 -N "" -q
pub fn generate_ed25519(
path: impl AsRef<Path>,
passphrase: impl AsRef<str>,
) -> anyhow::Result<bool> {
let res = Command::new("ssh-keygen")
.args(["-m", "PEM"])
.args(["-t", "ed25519"])
2022-08-08 06:10:32 +00:00
.arg("-f")
.arg(path.as_ref())
.arg("-N")
.arg(passphrase.as_ref())
.arg("-q")
.status()
.map(|status| status.success())
.context("Failed to generate ed25519 key")?;
#[cfg(unix)]
if res {
// chmod 600 id_ed25519* -> ida_ed25519 + ida_ed25519.pub
std::fs::metadata(path.as_ref().with_extension("pub"))
.context("Failed to load metadata of ed25519 pub key")?
.permissions()
.set_mode(0o600);
std::fs::metadata(path)
.context("Failed to load metadata of ed25519 key")?
.permissions()
.set_mode(0o600);
}
Ok(res)
}
}
pub struct SshAgent;
impl SshAgent {
pub fn generate_shell_env() -> anyhow::Result<HashMap<String, String>> {
let output = Command::new("ssh-agent")
.arg("-s")
.output()
.context("Failed to generate Bourne shell commands from ssh-agent")?;
let stdout =
String::from_utf8(output.stdout).context("Failed to parse stdout as utf8 string")?;
Ok(stdout
.split(';')
.map(str::trim)
.filter(|s| s.contains('='))
.map(|s| {
let mut tokens = s.split('=');
let key = tokens.next().unwrap().trim().to_string();
let rest = tokens
.map(str::trim)
.map(ToString::to_string)
.collect::<Vec<String>>()
.join("=");
(key, rest)
})
.collect::<HashMap<String, String>>())
}
pub fn update_tests_with_shell_env() -> anyhow::Result<()> {
let env_map =
Self::generate_shell_env().context("Failed to generate ssh agent shell env")?;
for (key, value) in env_map {
std::env::set_var(key, value);
}
Ok(())
}
}
/// Log level for sshd config
#[allow(dead_code)]
#[derive(Copy, Clone, Debug, Display, PartialEq, Eq, Hash)]
pub enum SshdLogLevel {
#[display(fmt = "QUIET")]
Quiet,
#[display(fmt = "FATAL")]
Fatal,
#[display(fmt = "ERROR")]
Error,
#[display(fmt = "INFO")]
Info,
#[display(fmt = "VERBOSE")]
Verbose,
#[display(fmt = "DEBUG")]
Debug,
#[display(fmt = "DEBUG1")]
Debug1,
#[display(fmt = "DEBUG2")]
Debug2,
#[display(fmt = "DEBUG3")]
Debug3,
}
#[derive(Debug)]
pub struct SshdConfig(HashMap<String, Vec<String>>);
impl Default for SshdConfig {
fn default() -> Self {
let mut config = Self::new();
config.set_authentication_methods(vec!["publickey".to_string()]);
config.set_use_privilege_separation(false);
config.set_subsystem(true, true);
config.set_use_pam(false);
config.set_x11_forwarding(true);
config.set_print_motd(true);
config.set_permit_tunnel(true);
config.set_kbd_interactive_authentication(true);
config.set_allow_tcp_forwarding(true);
config.set_max_startups(500, None);
config.set_strict_modes(false);
config.set_log_level(SshdLogLevel::Debug3);
config
}
}
impl SshdConfig {
pub fn new() -> Self {
Self(HashMap::new())
}
pub fn set_authentication_methods(&mut self, methods: Vec<String>) {
self.0.insert("AuthenticationMethods".to_string(), methods);
}
pub fn set_authorized_keys_file(&mut self, path: impl AsRef<Path>) {
let path = ci_path_to_string(path.as_ref());
self.0.insert("AuthorizedKeysFile".to_string(), vec![path]);
}
pub fn set_host_key(&mut self, path: impl AsRef<Path>) {
let path = ci_path_to_string(path.as_ref());
self.0.insert("HostKey".to_string(), vec![path]);
}
pub fn set_pid_file(&mut self, path: impl AsRef<Path>) {
let path = ci_path_to_string(path.as_ref());
self.0.insert("PidFile".to_string(), vec![path]);
}
pub fn set_subsystem(&mut self, sftp: bool, internal_sftp: bool) {
let mut values = Vec::new();
if sftp {
values.push("sftp".to_string());
}
if internal_sftp {
values.push("internal-sftp".to_string());
}
self.0.insert("Subsystem".to_string(), values);
}
pub fn set_use_pam(&mut self, yes: bool) {
self.0.insert("UsePAM".to_string(), Self::yes_value(yes));
}
pub fn set_x11_forwarding(&mut self, yes: bool) {
self.0
.insert("X11Forwarding".to_string(), Self::yes_value(yes));
}
pub fn set_use_privilege_separation(&mut self, yes: bool) {
self.0
.insert("UsePrivilegeSeparation".to_string(), Self::yes_value(yes));
}
pub fn set_print_motd(&mut self, yes: bool) {
self.0.insert("PrintMotd".to_string(), Self::yes_value(yes));
}
pub fn set_permit_tunnel(&mut self, yes: bool) {
self.0
.insert("PermitTunnel".to_string(), Self::yes_value(yes));
}
pub fn set_kbd_interactive_authentication(&mut self, yes: bool) {
self.0.insert(
"KbdInteractiveAuthentication".to_string(),
Self::yes_value(yes),
);
}
pub fn set_allow_tcp_forwarding(&mut self, yes: bool) {
self.0
.insert("AllowTcpForwarding".to_string(), Self::yes_value(yes));
}
pub fn set_max_startups(&mut self, start: u16, rate_full: Option<(u16, u16)>) {
let value = format!(
"{}{}",
start,
rate_full
.map(|(r, f)| format!(":{}:{}", r, f))
.unwrap_or_default(),
);
self.0.insert("MaxStartups".to_string(), vec![value]);
}
pub fn set_strict_modes(&mut self, yes: bool) {
self.0
.insert("StrictModes".to_string(), Self::yes_value(yes));
}
pub fn set_log_level(&mut self, log_level: SshdLogLevel) {
self.0
.insert("LogLevel".to_string(), vec![log_level.to_string()]);
}
fn yes_value(yes: bool) -> Vec<String> {
vec![Self::yes_string(yes)]
}
fn yes_string(yes: bool) -> String {
Self::yes_str(yes).to_string()
}
const fn yes_str(yes: bool) -> &'static str {
if yes {
"yes"
} else {
"no"
}
}
}
impl fmt::Display for SshdConfig {
fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
for (keyword, values) in self.0.iter() {
writeln!(
f,
"{} {}",
keyword,
values
.iter()
.map(|v| {
let v = v.trim();
if v.contains(|c: char| c.is_whitespace()) {
format!("\"{}\"", v)
} else {
v.to_string()
}
})
.collect::<Vec<String>>()
.join(" ")
)?;
}
Ok(())
}
}
/// Context for some sshd instance
pub struct Sshd {
child: Mutex<Option<Child>>,
/// Port that sshd is listening on
pub port: u16,
/// Temporary directory used to hold resources for sshd such as its config, keys, and log
pub tmp: TempDir,
/// Path to config file to print out when failures happen
pub config_file: PathBuf,
/// Path to log file to print out when failures happen
pub log_file: PathBuf,
}
impl Sshd {
/// Cached check if dead, does not actually do the check itself
pub fn is_dead(&self) -> bool {
self.child.lock().unwrap().is_none()
}
pub fn spawn(mut config: SshdConfig) -> anyhow::Result<Self> {
let tmp = TempDir::new().context("Failed to create temporary directory")?;
// Ensure that everything needed for interacting with ssh-agent is set
SshAgent::update_tests_with_shell_env()
.context("Failed to update tests with ssh agent shell env")?;
// ssh-keygen -t ed25519 -f $ROOT/id_ed25519 -N "" -q
let id_ed25519_file = tmp.child("id_ed25519");
assert!(
SshKeygen::generate_ed25519(id_ed25519_file.path(), "")
.context("Failed to generate ed25519 key for self")?,
"Failed to ssh-keygen id_ed25519"
);
// cp $ROOT/id_ed25519.pub $ROOT/authorized_keys
let authorized_keys_file = tmp.child("authorized_keys");
std::fs::copy(
id_ed25519_file.path().with_extension("pub"),
authorized_keys_file.path(),
)
.context("Failed to copy ed25519 pub key to authorized keys file")?;
// ssh-keygen -t ed25519 -f $ROOT/ssh_host_ed25519_key -N "" -q
let ssh_host_ed25519_key_file = tmp.child("ssh_host_ed25519_key");
assert!(
SshKeygen::generate_ed25519(ssh_host_ed25519_key_file.path(), "")
.context("Failed to generate ed25519 key for host")?,
"Failed to ssh-keygen ssh_host_ed25519_key"
);
config.set_authorized_keys_file(id_ed25519_file.path().with_extension("pub"));
config.set_host_key(ssh_host_ed25519_key_file.path());
let sshd_pid_file = tmp.child("sshd.pid");
config.set_pid_file(sshd_pid_file.path());
// Generate $ROOT/sshd_config based on config
let sshd_config_file = tmp.child("sshd_config");
sshd_config_file
.write_str(&config.to_string())
.context("Failed to write sshd config to file")?;
let sshd_log_file = tmp.child("sshd.log");
let (child, port) = Self::try_spawn_next(sshd_config_file.path(), sshd_log_file.path())
.context("Failed to find open port for sshd")?;
Ok(Self {
child: Mutex::new(Some(child)),
port,
tmp,
config_file: sshd_config_file.to_path_buf(),
log_file: sshd_log_file.to_path_buf(),
})
}
fn try_spawn_next(
config_path: impl AsRef<Path>,
log_path: impl AsRef<Path>,
) -> anyhow::Result<(Child, u16)> {
static PORT: AtomicU16 = AtomicU16::new(PORT_RANGE.0);
loop {
let port = PORT.fetch_add(1, Ordering::Relaxed);
match Self::try_spawn(port, config_path.as_ref(), log_path.as_ref()) {
// If successful, return our spawned server child process
Ok(Ok(child)) => return Ok((child, port)),
// If the server died when spawned and we reached the final port, we want to exit
Ok(Err((code, msg))) if port == PORT_RANGE.1 => {
anyhow::bail!(
"{BIN_PATH:?} failed [{}]: {}",
code.map(|x| x.to_string())
.unwrap_or_else(|| String::from("???")),
msg
)
}
// If we've reached the final port in our range to try, we want to exit
Err(x) if port == PORT_RANGE.1 => anyhow::bail!(x),
// Otherwise, try next port
2022-08-28 06:52:36 +00:00
Err(_) | Ok(Err(_)) => {
2022-12-11 10:15:26 +00:00
error!("sshd could not spawn on port {port}, so trying next port");
2022-08-28 06:52:36 +00:00
continue;
}
2022-08-08 06:10:32 +00:00
}
}
}
fn try_spawn(
port: u16,
config_path: impl AsRef<Path>,
log_path: impl AsRef<Path>,
) -> anyhow::Result<Result<Child, (Option<i32>, String)>> {
2022-08-28 06:52:36 +00:00
// Sshd doesn't reliably fail when binding to a taken port, so we do a TCP check first
// to try to ensure it is available
drop(
std::net::TcpListener::bind((IpAddr::V4(Ipv4Addr::LOCALHOST), port))
.with_context(|| format!("Port {port} already taken"))?,
);
2022-08-08 06:10:32 +00:00
let child = Command::new(BIN_PATH.as_path())
.arg("-D")
.arg("-p")
.arg(port.to_string())
.arg("-f")
.arg(config_path.as_ref())
.arg("-E")
.arg(log_path.as_ref())
.spawn()
.with_context(|| format!("Failed to spawn {:?}", BIN_PATH.as_path()))?;
// Pause for a little bit to make sure that the server didn't die due to an error
thread::sleep(Duration::from_millis(100));
let child = match check(child).context("Sshd encountered problems (after 100ms)")? {
Ok(child) => child,
Err(x) => return Ok(Err(x)),
};
// Pause for a little bit to make sure that the server didn't die due to an error
thread::sleep(Duration::from_millis(100));
let result = check(child).context("Sshd encountered problems (after 200ms)")?;
Ok(result)
}
2022-08-28 06:52:36 +00:00
/// Checks if still alive
fn check_is_alive(&self) -> bool {
// Check if our sshd process is still running, or if it died and we can report about it
let mut child_lock = self.child.lock().unwrap();
if let Some(child) = child_lock.take() {
match check(child) {
Ok(Ok(child)) => {
child_lock.replace(child);
true
}
Ok(Err((code, msg))) => {
2022-12-11 10:15:26 +00:00
error!(
2022-08-28 06:52:36 +00:00
"sshd died w/ exit code {}: {msg}",
if let Some(code) = code {
code.to_string()
} else {
"[missing]".to_string()
}
);
false
}
Err(x) => {
2022-12-11 10:15:26 +00:00
error!("Failed to check status of sshd: {x}");
2022-08-28 06:52:36 +00:00
false
}
}
} else {
2022-12-11 10:15:26 +00:00
error!("sshd is dead!");
2022-08-28 06:52:36 +00:00
false
}
}
fn print_log_file(&self) {
if let Ok(log) = std::fs::read_to_string(&self.log_file) {
2022-12-11 10:15:26 +00:00
let mut out = String::new();
out.push('\n');
out.push_str("====================\n");
out.push_str("= SSHD LOG FILE \n");
out.push_str("====================\n");
out.push('\n');
out.push_str(&log);
out.push('\n');
out.push('\n');
out.push_str("====================\n");
out.push('\n');
error!("{out}");
2022-08-28 06:52:36 +00:00
}
}
fn print_config_file(&self) {
if let Ok(contents) = std::fs::read_to_string(&self.config_file) {
2022-12-11 10:15:26 +00:00
let mut out = String::new();
out.push('\n');
out.push_str("====================\n");
out.push_str("= SSHD CONFIG FILE \n");
out.push_str("====================\n");
out.push('\n');
out.push_str(&contents);
out.push('\n');
out.push('\n');
out.push_str("====================\n");
out.push('\n');
error!("{out}");
2022-08-28 06:52:36 +00:00
}
}
2022-08-08 06:10:32 +00:00
}
impl Drop for Sshd {
/// Kills server upon drop
fn drop(&mut self) {
2022-12-11 10:15:26 +00:00
debug!("Dropping sshd");
2022-08-08 06:10:32 +00:00
if let Some(mut child) = self.child.lock().unwrap().take() {
let _ = child.kill();
2022-12-11 10:15:26 +00:00
// Wait for a maximum period of time
let start = Instant::now();
while start.elapsed() < MAX_DROP_WAIT_TIME {
match child.try_wait() {
Ok(Some(_)) => {
debug!("Sshd finished");
return;
}
Err(x) => {
error!("Failed to wait for sshd to quit: {x}");
return;
}
_ => thread::sleep(MAX_DROP_WAIT_TIME / 10),
}
}
error!("Timed out waiting for sshd to quit");
2022-08-08 06:10:32 +00:00
}
}
}
/// Mocked version of [`SshAuthHandler`]
pub struct MockSshAuthHandler;
#[async_trait]
impl SshAuthHandler for MockSshAuthHandler {
async fn on_authenticate(&self, event: SshAuthEvent) -> io::Result<Vec<String>> {
2022-12-11 10:15:26 +00:00
debug!("on_authenticate: {:?}", event);
2022-08-08 06:10:32 +00:00
Ok(vec![String::new(); event.prompts.len()])
}
async fn on_verify_host(&self, host: &str) -> io::Result<bool> {
2022-12-11 10:15:26 +00:00
debug!("on_host_verify: {}", host);
2022-08-08 06:10:32 +00:00
Ok(true)
}
async fn on_banner(&self, text: &str) {
2022-12-11 10:15:26 +00:00
debug!("on_banner: {:?}", text);
}
2022-08-08 06:10:32 +00:00
async fn on_error(&self, text: &str) {
2022-12-11 10:15:26 +00:00
debug!("on_error: {:?}", text);
}
2022-08-08 06:10:32 +00:00
}
#[fixture]
pub fn sshd() -> Sshd {
2022-08-28 06:52:36 +00:00
let mut i = 0;
loop {
if i == SPAWN_RETRY_CNT {
panic!("Exceeded retry count!");
}
match Sshd::spawn(Default::default()) {
// Succeeded, so wait a bit, check that is still alive, and then continue
Ok(sshd) => {
std::thread::sleep(WAIT_AFTER_SPAWN);
if !sshd.check_is_alive() {
// We want to print out the log file from sshd in case it sheds clues on problem
sshd.print_log_file();
// We want to print out the config file from sshd in case it sheds clues on problem
sshd.print_config_file();
// Skip this spawn and try again
continue;
}
return sshd;
}
// Last attempt failed, so panic with the error encountered
Err(x) if i + 1 == SPAWN_RETRY_CNT => panic!("{x}"),
// Not last attempt, so sleep and then try again
Err(_) => std::thread::sleep(WAIT_AFTER_SPAWN),
}
i += 1;
}
2022-08-08 06:10:32 +00:00
}
/// Fixture to establish a client to an SSH server
#[fixture]
pub async fn client(sshd: Sshd) -> Ctx<DistantClient> {
2022-08-08 06:10:32 +00:00
let ssh_client = load_ssh_client(&sshd).await;
2022-12-11 10:15:26 +00:00
let mut client = ssh_client
2022-08-08 06:10:32 +00:00
.into_distant_client()
.await
.context("Failed to convert into distant client")
.unwrap();
2022-12-11 10:15:26 +00:00
client.shutdown_on_drop(true);
2022-08-08 06:10:32 +00:00
Ctx {
sshd,
value: client,
}
}
/// Access to raw [`Ssh`] client
#[fixture]
pub async fn ssh(sshd: Sshd) -> Ctx<Ssh> {
let ssh = load_ssh_client(&sshd).await;
Ctx { sshd, value: ssh }
}
async fn load_ssh_client(sshd: &Sshd) -> Ssh {
if sshd.is_dead() {
panic!("sshd is dead!");
}
let port = sshd.port;
let opts = SshOpts {
port: Some(port),
identity_files: vec![sshd.tmp.child("id_ed25519").path().to_path_buf()],
identities_only: Some(true),
user: Some(USERNAME.to_string()),
user_known_hosts_files: vec![sshd.tmp.child("known_hosts").path().to_path_buf()],
// verbose: true,
..Default::default()
};
let addrs = vec![
IpAddr::V4(Ipv4Addr::LOCALHOST),
IpAddr::V6(Ipv6Addr::LOCALHOST),
];
let mut errors = Vec::new();
let msg = format!("Failed to connect to any of these hosts: {addrs:?}");
for addr in addrs {
let addr_string = addr.to_string();
match Ssh::connect(&addr_string, opts.clone()) {
Ok(mut ssh_client) => {
let res = ssh_client.authenticate(MockSshAuthHandler).await;
match res {
Ok(_) => return ssh_client,
Err(x) => {
errors.push(
anyhow::Error::new(x).context(format!(
"Failed to authenticate with sshd @ {addr_string}"
)),
);
}
}
}
Err(x) => {
errors.push(
anyhow::Error::new(x)
.context(format!("Failed to connect to sshd @ {addr_string}")),
);
}
}
}
2022-08-28 06:52:36 +00:00
// Check if still alive, which will print out messages
if sshd.check_is_alive() {
2022-12-11 10:15:26 +00:00
warn!("sshd is still alive, so something else is going on");
2022-08-08 06:10:32 +00:00
}
2022-08-28 06:52:36 +00:00
// We want to print out the log file from sshd in case it sheds clues on problem
sshd.print_log_file();
2022-08-08 06:10:32 +00:00
// We want to print out the config file from sshd in case it sheds clues on problem
2022-08-28 06:52:36 +00:00
sshd.print_config_file();
2022-08-08 06:10:32 +00:00
let error = match errors.into_iter().reduce(|x, y| x.context(y)) {
Some(x) => x.context(msg),
None => anyhow::anyhow!(msg),
};
panic!("{error:?}");
}
fn check(mut child: Child) -> anyhow::Result<Result<Child, (Option<i32>, String)>> {
if let Some(exit_status) = child.try_wait().context("Failed to check status of sshd")? {
let output = child.wait_with_output().context("Failed to wait on sshd")?;
Ok(Err((
exit_status.code(),
format!(
"{}\n{}",
String::from_utf8(output.stdout).unwrap(),
String::from_utf8(output.stderr).unwrap(),
),
)))
} else {
Ok(Ok(child))
}
}