mirror of
https://github.com/warp-tech/warpgate.git
synced 2024-11-10 09:12:56 +08:00
169 lines
5.3 KiB
Python
169 lines
5.3 KiB
Python
from pathlib import Path
|
|
from uuid import uuid4
|
|
|
|
from .api_client import (
|
|
api_add_role_to_target,
|
|
api_add_role_to_user,
|
|
api_admin_session,
|
|
api_create_role,
|
|
api_create_target,
|
|
api_create_user,
|
|
)
|
|
from .conftest import ProcessManager, WarpgateProcess
|
|
from .util import wait_port
|
|
|
|
|
|
class Test:
|
|
def test_ed25519(
|
|
self,
|
|
processes: ProcessManager,
|
|
wg_c_ed25519_pubkey: Path,
|
|
timeout,
|
|
shared_wg: WarpgateProcess,
|
|
):
|
|
ssh_port = processes.start_ssh_server(
|
|
trusted_keys=[wg_c_ed25519_pubkey.read_text()]
|
|
)
|
|
|
|
wait_port(ssh_port)
|
|
|
|
url = f"https://localhost:{shared_wg.http_port}"
|
|
with api_admin_session(url) as session:
|
|
role = api_create_role(url, session, {"name": f"role-{uuid4()}"})
|
|
user = api_create_user(
|
|
url,
|
|
session,
|
|
{
|
|
"username": f"user-{uuid4()}",
|
|
"credentials": [
|
|
{
|
|
"kind": "PublicKey",
|
|
"key": open("ssh-keys/id_ed25519.pub").read().strip(),
|
|
},
|
|
],
|
|
},
|
|
)
|
|
api_add_role_to_user(url, session, user["id"], role["id"])
|
|
ssh_target = api_create_target(
|
|
url,
|
|
session,
|
|
{
|
|
"name": f"ssh-{uuid4()}",
|
|
"options": {
|
|
"kind": "Ssh",
|
|
"host": "localhost",
|
|
"port": ssh_port,
|
|
"username": "root",
|
|
"auth": {"kind": "PublicKey"},
|
|
},
|
|
},
|
|
)
|
|
api_add_role_to_target(url, session, ssh_target["id"], role["id"])
|
|
|
|
ssh_client = processes.start_ssh_client(
|
|
f'{user["username"]}:{ssh_target["name"]}@localhost',
|
|
"-p",
|
|
str(shared_wg.ssh_port),
|
|
"-o",
|
|
"IdentityFile=ssh-keys/id_ed25519",
|
|
"-o",
|
|
"PreferredAuthentications=publickey",
|
|
# 'sh', '-c', '"ls /bin/sh;sleep 1"',
|
|
"ls",
|
|
"/bin/sh",
|
|
)
|
|
assert ssh_client.communicate(timeout=timeout)[0] == b"/bin/sh\n"
|
|
assert ssh_client.returncode == 0
|
|
|
|
ssh_client = processes.start_ssh_client(
|
|
f'{user["username"]}:{ssh_target["name"]}@localhost',
|
|
"-p",
|
|
str(shared_wg.ssh_port),
|
|
"-o",
|
|
"IdentityFile=ssh-keys/id_rsa",
|
|
"-o",
|
|
"PreferredAuthentications=publickey",
|
|
"ls",
|
|
"/bin/sh",
|
|
)
|
|
assert ssh_client.communicate(timeout=timeout)[0] == b""
|
|
assert ssh_client.returncode != 0
|
|
|
|
def test_rsa(
|
|
self,
|
|
processes: ProcessManager,
|
|
wg_c_ed25519_pubkey: Path,
|
|
timeout,
|
|
shared_wg: WarpgateProcess,
|
|
):
|
|
ssh_port = processes.start_ssh_server(
|
|
trusted_keys=[wg_c_ed25519_pubkey.read_text()]
|
|
)
|
|
|
|
wait_port(ssh_port)
|
|
|
|
url = f"https://localhost:{shared_wg.http_port}"
|
|
with api_admin_session(url) as session:
|
|
role = api_create_role(url, session, {"name": f"role-{uuid4()}"})
|
|
user = api_create_user(
|
|
url,
|
|
session,
|
|
{
|
|
"username": f"user-{uuid4()}",
|
|
"credentials": [
|
|
{
|
|
"kind": "PublicKey",
|
|
"key": open("ssh-keys/id_rsa.pub").read().strip(),
|
|
},
|
|
],
|
|
},
|
|
)
|
|
api_add_role_to_user(url, session, user["id"], role["id"])
|
|
ssh_target = api_create_target(
|
|
url,
|
|
session,
|
|
{
|
|
"name": f"ssh-{uuid4()}",
|
|
"options": {
|
|
"kind": "Ssh",
|
|
"host": "localhost",
|
|
"port": ssh_port,
|
|
"username": "root",
|
|
"auth": {"kind": "PublicKey"},
|
|
},
|
|
},
|
|
)
|
|
api_add_role_to_target(url, session, ssh_target["id"], role["id"])
|
|
|
|
ssh_client = processes.start_ssh_client(
|
|
f'{user["username"]}:{ssh_target["name"]}@localhost',
|
|
"-v",
|
|
"-p",
|
|
str(shared_wg.ssh_port),
|
|
"-o",
|
|
"IdentityFile=ssh-keys/id_rsa",
|
|
"-o",
|
|
"PreferredAuthentications=publickey",
|
|
"-o",
|
|
"PubkeyAcceptedKeyTypes=+ssh-rsa",
|
|
"ls",
|
|
"/bin/sh",
|
|
)
|
|
assert ssh_client.communicate(timeout=timeout)[0] == b"/bin/sh\n"
|
|
assert ssh_client.returncode == 0
|
|
|
|
ssh_client = processes.start_ssh_client(
|
|
f'{user["username"]}:{ssh_target["name"]}@localhost',
|
|
"-p",
|
|
str(shared_wg.ssh_port),
|
|
"-o",
|
|
"IdentityFile=ssh-keys/id_ed25519",
|
|
"-o",
|
|
"PreferredAuthentications=publickey",
|
|
"-o",
|
|
"PubkeyAcceptedKeyTypes=+ssh-rsa",
|
|
"ls",
|
|
"/bin/sh",
|
|
)
|
|
assert ssh_client.communicate(timeout=timeout)[0] == b""
|
|
assert ssh_client.returncode != 0
|