mirror of
https://github.com/warp-tech/warpgate.git
synced 2024-11-14 11:57:36 +08:00
328 lines
9.2 KiB
Python
328 lines
9.2 KiB
Python
from uuid import uuid4
|
|
import requests
|
|
import subprocess
|
|
import tempfile
|
|
import time
|
|
import pytest
|
|
from textwrap import dedent
|
|
|
|
from tests.api_client import (
|
|
api_add_role_to_target,
|
|
api_add_role_to_user,
|
|
api_admin_session,
|
|
api_create_role,
|
|
api_create_target,
|
|
api_create_user,
|
|
)
|
|
|
|
from .conftest import ProcessManager, WarpgateProcess
|
|
from .util import wait_port, alloc_port
|
|
|
|
|
|
@pytest.fixture(scope="session")
|
|
def ssh_port(processes, wg_c_ed25519_pubkey):
|
|
yield processes.start_ssh_server(trusted_keys=[wg_c_ed25519_pubkey.read_text()])
|
|
|
|
|
|
common_args = [
|
|
"-i",
|
|
"/dev/null",
|
|
"-o",
|
|
"PreferredAuthentications=password",
|
|
]
|
|
|
|
|
|
def setup_user_and_target(
|
|
processes: ProcessManager, wg: WarpgateProcess, wg_c_ed25519_pubkey
|
|
):
|
|
ssh_port = processes.start_ssh_server(
|
|
trusted_keys=[wg_c_ed25519_pubkey.read_text()]
|
|
)
|
|
wait_port(ssh_port)
|
|
|
|
url = f"https://localhost:{wg.http_port}"
|
|
with api_admin_session(url) as session:
|
|
role = api_create_role(url, session, {"name": f"role-{uuid4()}"})
|
|
user = api_create_user(
|
|
url,
|
|
session,
|
|
{
|
|
"username": f"user-{uuid4()}",
|
|
"credentials": [
|
|
{
|
|
"kind": "Password",
|
|
"hash": "123",
|
|
},
|
|
{
|
|
"kind": "PublicKey",
|
|
"key": open("ssh-keys/id_ed25519.pub").read().strip(),
|
|
},
|
|
],
|
|
},
|
|
)
|
|
api_add_role_to_user(url, session, user["id"], role["id"])
|
|
ssh_target = api_create_target(
|
|
url,
|
|
session,
|
|
{
|
|
"name": f"ssh-{uuid4()}",
|
|
"options": {
|
|
"kind": "Ssh",
|
|
"host": "localhost",
|
|
"port": ssh_port,
|
|
"username": "root",
|
|
"auth": {"kind": "PublicKey"},
|
|
},
|
|
},
|
|
)
|
|
api_add_role_to_target(url, session, ssh_target["id"], role["id"])
|
|
return user, ssh_target
|
|
|
|
|
|
class Test:
|
|
def test_stdout_stderr(
|
|
self,
|
|
processes: ProcessManager,
|
|
timeout,
|
|
wg_c_ed25519_pubkey,
|
|
shared_wg: WarpgateProcess,
|
|
):
|
|
user, ssh_target = setup_user_and_target(
|
|
processes, shared_wg, wg_c_ed25519_pubkey
|
|
)
|
|
ssh_client = processes.start_ssh_client(
|
|
f"{user['username']}:{ssh_target['name']}@localhost",
|
|
"-p",
|
|
str(shared_wg.ssh_port),
|
|
*common_args,
|
|
"sh",
|
|
"-c",
|
|
'"echo -n stdout; echo -n stderr >&2"',
|
|
password="123",
|
|
stderr=subprocess.PIPE,
|
|
)
|
|
|
|
stdout, stderr = ssh_client.communicate(timeout=timeout)
|
|
assert b"stdout" == stdout
|
|
assert stderr.endswith(b"stderr")
|
|
|
|
def test_pty(
|
|
self,
|
|
processes: ProcessManager,
|
|
timeout,
|
|
wg_c_ed25519_pubkey,
|
|
shared_wg: WarpgateProcess,
|
|
):
|
|
user, ssh_target = setup_user_and_target(
|
|
processes, shared_wg, wg_c_ed25519_pubkey
|
|
)
|
|
ssh_client = processes.start_ssh_client(
|
|
f"{user['username']}:{ssh_target['name']}@localhost",
|
|
"-p",
|
|
str(shared_wg.ssh_port),
|
|
"-tt",
|
|
*common_args,
|
|
"echo",
|
|
"hello",
|
|
password="123",
|
|
)
|
|
|
|
output = ssh_client.communicate(timeout=timeout)[0]
|
|
assert b"Warpgate" in output
|
|
assert b"Selected target:" in output
|
|
assert b"hello\r\n" in output
|
|
|
|
def test_signals(
|
|
self,
|
|
processes: ProcessManager,
|
|
wg_c_ed25519_pubkey,
|
|
shared_wg: WarpgateProcess,
|
|
):
|
|
user, ssh_target = setup_user_and_target(
|
|
processes, shared_wg, wg_c_ed25519_pubkey
|
|
)
|
|
ssh_client = processes.start_ssh_client(
|
|
f"{user['username']}:{ssh_target['name']}@localhost",
|
|
"-p",
|
|
str(shared_wg.ssh_port),
|
|
"-v",
|
|
*common_args,
|
|
"sh",
|
|
"-c",
|
|
'"pkill -9 sh"',
|
|
password="123",
|
|
)
|
|
|
|
assert ssh_client.returncode != 0
|
|
|
|
def test_direct_tcpip(
|
|
self,
|
|
processes: ProcessManager,
|
|
wg_c_ed25519_pubkey,
|
|
shared_wg: WarpgateProcess,
|
|
timeout,
|
|
):
|
|
user, ssh_target = setup_user_and_target(
|
|
processes, shared_wg, wg_c_ed25519_pubkey
|
|
)
|
|
local_port = alloc_port()
|
|
ssh_client = processes.start_ssh_client(
|
|
f"{user['username']}:{ssh_target['name']}@localhost",
|
|
"-p",
|
|
str(shared_wg.ssh_port),
|
|
"-v",
|
|
*common_args,
|
|
"-L",
|
|
f"{local_port}:neverssl.com:80",
|
|
"-N",
|
|
password="123",
|
|
)
|
|
|
|
time.sleep(10)
|
|
|
|
wait_port(local_port, recv=False)
|
|
|
|
s = requests.Session()
|
|
retries = requests.adapters.Retry(total=5, backoff_factor=1)
|
|
s.mount("http://", requests.adapters.HTTPAdapter(max_retries=retries))
|
|
response = s.get(f"http://localhost:{local_port}", timeout=timeout)
|
|
assert response.status_code == 200
|
|
ssh_client.kill()
|
|
|
|
def test_tcpip_forward(
|
|
self,
|
|
processes: ProcessManager,
|
|
wg_c_ed25519_pubkey,
|
|
shared_wg: WarpgateProcess,
|
|
timeout,
|
|
):
|
|
user, ssh_target = setup_user_and_target(
|
|
processes, shared_wg, wg_c_ed25519_pubkey
|
|
)
|
|
pf_client = processes.start_ssh_client(
|
|
f"{user['username']}:{ssh_target['name']}@localhost",
|
|
"-p",
|
|
str(shared_wg.ssh_port),
|
|
"-v",
|
|
*common_args,
|
|
"-R",
|
|
"1234:neverssl.com:80",
|
|
"-N",
|
|
password="123",
|
|
)
|
|
time.sleep(5)
|
|
ssh_client = processes.start_ssh_client(
|
|
f"{user['username']}:{ssh_target['name']}@localhost",
|
|
"-p",
|
|
str(shared_wg.ssh_port),
|
|
"-v",
|
|
*common_args,
|
|
"curl",
|
|
"-v",
|
|
"http://localhost:1234",
|
|
password="123",
|
|
)
|
|
output = ssh_client.communicate(timeout=timeout)[0]
|
|
assert ssh_client.returncode == 0
|
|
assert b"<html>" in output
|
|
pf_client.kill()
|
|
|
|
def test_shell(
|
|
self,
|
|
processes: ProcessManager,
|
|
wg_c_ed25519_pubkey,
|
|
shared_wg: WarpgateProcess,
|
|
timeout,
|
|
):
|
|
user, ssh_target = setup_user_and_target(
|
|
processes, shared_wg, wg_c_ed25519_pubkey
|
|
)
|
|
script = dedent(
|
|
f"""
|
|
set timeout {timeout - 5}
|
|
|
|
spawn ssh -tt {user['username']}:{ssh_target['name']}@localhost -p {shared_wg.ssh_port} -o StrictHostKeychecking=no -o UserKnownHostsFile=/dev/null -o PreferredAuthentications=password
|
|
|
|
expect "password:"
|
|
sleep 0.5
|
|
send "123\\r"
|
|
|
|
expect "#"
|
|
sleep 0.5
|
|
send "ls /bin/sh\\r"
|
|
send "exit\\r"
|
|
|
|
expect {{
|
|
"/bin/sh" {{ exit 0; }}
|
|
eof {{ exit 1; }}
|
|
}}
|
|
|
|
exit 1
|
|
"""
|
|
)
|
|
|
|
ssh_client = processes.start(
|
|
["expect", "-d"], stdin=subprocess.PIPE, stdout=subprocess.PIPE
|
|
)
|
|
|
|
output = ssh_client.communicate(script.encode(), timeout=timeout)[0]
|
|
assert ssh_client.returncode == 0, output
|
|
|
|
def test_connection_error(
|
|
self,
|
|
processes: ProcessManager,
|
|
wg_c_ed25519_pubkey,
|
|
shared_wg: WarpgateProcess,
|
|
):
|
|
user, ssh_target = setup_user_and_target(
|
|
processes, shared_wg, wg_c_ed25519_pubkey
|
|
)
|
|
ssh_client = processes.start_ssh_client(
|
|
f"{user['username']}:{ssh_target['name']}@localhost",
|
|
"-p",
|
|
str(shared_wg.ssh_port),
|
|
"-tt",
|
|
"user:ssh-bad-domain@localhost",
|
|
"-i",
|
|
"/dev/null",
|
|
"-o",
|
|
"PreferredAuthentications=password",
|
|
password="123",
|
|
)
|
|
|
|
assert ssh_client.returncode != 0
|
|
|
|
def test_sftp(
|
|
self,
|
|
processes: ProcessManager,
|
|
wg_c_ed25519_pubkey,
|
|
shared_wg: WarpgateProcess,
|
|
):
|
|
user, ssh_target = setup_user_and_target(
|
|
processes, shared_wg, wg_c_ed25519_pubkey
|
|
)
|
|
with tempfile.TemporaryDirectory() as f:
|
|
subprocess.check_call(
|
|
[
|
|
"sftp",
|
|
"-P",
|
|
str(shared_wg.ssh_port),
|
|
"-o",
|
|
f"User={user['username']}:{ssh_target['name']}",
|
|
"-o",
|
|
"IdentitiesOnly=yes",
|
|
"-o",
|
|
"IdentityFile=ssh-keys/id_ed25519",
|
|
"-o",
|
|
"PreferredAuthentications=publickey",
|
|
"-o",
|
|
"StrictHostKeychecking=no",
|
|
"-o",
|
|
"UserKnownHostsFile=/dev/null",
|
|
"localhost:/etc/passwd",
|
|
f,
|
|
],
|
|
stdout=subprocess.PIPE,
|
|
)
|
|
|
|
assert "root:x:0:0:root" in open(f + "/passwd").read()
|