2020-02-18 05:17:11 +00:00
|
|
|
package xs
|
|
|
|
|
|
|
|
import (
|
|
|
|
"errors"
|
2020-02-18 07:14:37 +00:00
|
|
|
"fmt"
|
|
|
|
"os/user"
|
|
|
|
"strings"
|
2020-02-18 05:17:11 +00:00
|
|
|
"testing"
|
|
|
|
)
|
|
|
|
|
|
|
|
type userVerifs struct {
|
|
|
|
user string
|
|
|
|
passwd string
|
|
|
|
good bool
|
|
|
|
}
|
|
|
|
|
|
|
|
var (
|
|
|
|
dummyShadowA = `johndoe:$6$EeQlTtn/KXdSh6CW$UHbFuEw3UA0Jg9/GoPHxgWk6Ws31x3IjqsP22a9pVMOte0yQwX1.K34oI4FACu8GRg9DArJ5RyWUE9m98qwzZ1:18310:0:99999:7:::
|
|
|
|
joebloggs:$6$F.0IXOrb0w0VJHG1$3O4PYyng7F3hlh42mbroEdQZvslybY5etPPiLMQJ1xosjABY.Q4xqAfyIfe03Du61ZjGQIt3nL0j12P9k1fsK/:18310:0:99999:7:::
|
|
|
|
disableduser:!:18310::::::`
|
|
|
|
|
2020-02-18 07:14:37 +00:00
|
|
|
dummyAuthTokenFile = "hostA:abcdefg\nhostB:wxyz\n"
|
|
|
|
|
2020-02-18 05:17:11 +00:00
|
|
|
testGoodUsers = []userVerifs{
|
|
|
|
{"johndoe", "testpass", true},
|
|
|
|
{"joebloggs", "testpass2", true},
|
|
|
|
{"johndoe", "badpass", false},
|
|
|
|
}
|
2020-02-18 07:14:37 +00:00
|
|
|
|
|
|
|
userlookup_arg_u string
|
|
|
|
readfile_arg_f string
|
2020-02-18 05:17:11 +00:00
|
|
|
)
|
|
|
|
|
2020-02-18 18:53:04 +00:00
|
|
|
func newMockAuthCtx(reader func(string) ([]byte, error), userlookup func(string) (*user.User, error)) (ret *AuthCtx) {
|
|
|
|
ret = &AuthCtx{reader, userlookup}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2020-02-18 07:14:37 +00:00
|
|
|
func _mock_user_Lookup(username string) (*user.User, error) {
|
|
|
|
username = userlookup_arg_u
|
|
|
|
if username == "baduser" {
|
|
|
|
return &user.User{}, errors.New("bad user")
|
|
|
|
}
|
|
|
|
urec := &user.User{Uid: "1000", Gid: "1000", Username: username, Name: "Full Name", HomeDir: "/home/user"}
|
|
|
|
fmt.Printf(" [mock user rec:%v]\n", urec)
|
|
|
|
return urec, nil
|
|
|
|
}
|
|
|
|
|
2020-02-18 05:17:11 +00:00
|
|
|
func _mock_ioutil_ReadFile(f string) ([]byte, error) {
|
2020-02-18 07:14:37 +00:00
|
|
|
f = readfile_arg_f
|
|
|
|
if f == "/etc/shadow" {
|
|
|
|
fmt.Println(" [mocking ReadFile(\"/etc/shadow\")]")
|
|
|
|
return []byte(dummyShadowA), nil
|
|
|
|
}
|
|
|
|
if strings.Contains(f, "/.xs_id") {
|
|
|
|
fmt.Println(" [mocking ReadFile(\".xs_id\")]")
|
|
|
|
return []byte(dummyAuthTokenFile), nil
|
|
|
|
}
|
|
|
|
return []byte{}, errors.New("no readfile_arg_f supplied")
|
2020-02-18 05:17:11 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func _mock_ioutil_ReadFileEmpty(f string) ([]byte, error) {
|
|
|
|
return []byte{}, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func _mock_ioutil_ReadFileHasError(f string) ([]byte, error) {
|
|
|
|
return []byte{}, errors.New("IO Error")
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestVerifyPass(t *testing.T) {
|
2020-02-18 07:14:37 +00:00
|
|
|
readfile_arg_f = "/etc/shadow"
|
2020-02-18 18:53:04 +00:00
|
|
|
ctx := newMockAuthCtx(_mock_ioutil_ReadFile, nil)
|
2020-02-18 05:17:11 +00:00
|
|
|
for idx, rec := range testGoodUsers {
|
2020-02-18 18:53:04 +00:00
|
|
|
stat, e := VerifyPass(ctx, rec.user, rec.passwd)
|
2020-02-18 05:17:11 +00:00
|
|
|
if rec.good && (!stat || e != nil) {
|
|
|
|
t.Fatalf("failed %d\n", idx)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestVerifyPassFailsOnEmptyFile(t *testing.T) {
|
2020-02-18 18:53:04 +00:00
|
|
|
ctx := newMockAuthCtx(_mock_ioutil_ReadFileEmpty, nil)
|
|
|
|
stat, e := VerifyPass(ctx, "johndoe", "somepass")
|
2020-02-18 05:17:11 +00:00
|
|
|
if stat || (e == nil) {
|
|
|
|
t.Fatal("failed to fail w/empty file")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestVerifyPassFailsOnFileError(t *testing.T) {
|
2020-02-18 18:53:04 +00:00
|
|
|
ctx := newMockAuthCtx(_mock_ioutil_ReadFileEmpty, nil)
|
|
|
|
stat, e := VerifyPass(ctx, "johndoe", "somepass")
|
2020-02-18 05:17:11 +00:00
|
|
|
if stat || (e == nil) {
|
|
|
|
t.Fatal("failed to fail on ioutil.ReadFile error")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestVerifyPassFailsOnDisabledEntry(t *testing.T) {
|
2020-02-18 18:53:04 +00:00
|
|
|
ctx := newMockAuthCtx(_mock_ioutil_ReadFileEmpty, nil)
|
|
|
|
stat, e := VerifyPass(ctx, "disableduser", "!")
|
2020-02-18 05:17:11 +00:00
|
|
|
if stat || (e == nil) {
|
|
|
|
t.Fatal("failed to fail on disabled user entry")
|
|
|
|
}
|
|
|
|
}
|
2020-02-18 07:14:37 +00:00
|
|
|
|
|
|
|
////
|
|
|
|
|
|
|
|
func TestAuthUserByTokenFailsOnMissingEntryForHost(t *testing.T) {
|
2020-02-18 18:53:04 +00:00
|
|
|
ctx := newMockAuthCtx(_mock_ioutil_ReadFile, _mock_user_Lookup)
|
|
|
|
stat := AuthUserByToken(ctx, "johndoe", "hostZ", "abcdefg")
|
2020-02-18 07:14:37 +00:00
|
|
|
if stat {
|
|
|
|
t.Fatal("failed to fail on missing/mismatched host entry")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestAuthUserByTokenFailsOnMissingEntryForUser(t *testing.T) {
|
2020-02-18 18:53:04 +00:00
|
|
|
ctx := newMockAuthCtx(_mock_ioutil_ReadFile, _mock_user_Lookup)
|
|
|
|
stat := AuthUserByToken(ctx, "unkuser", "hostA", "abcdefg")
|
2020-02-18 07:14:37 +00:00
|
|
|
if stat {
|
|
|
|
t.Fatal("failed to fail on wrong user")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestAuthUserByTokenFailsOnUserLookupFailure(t *testing.T) {
|
2020-02-18 18:53:04 +00:00
|
|
|
ctx := newMockAuthCtx(_mock_ioutil_ReadFile, _mock_user_Lookup)
|
2020-02-18 07:14:37 +00:00
|
|
|
userlookup_arg_u = "baduser"
|
2020-02-18 18:53:04 +00:00
|
|
|
stat := AuthUserByToken(ctx, "johndoe", "hostA", "abcdefg")
|
2020-02-18 07:14:37 +00:00
|
|
|
if stat {
|
|
|
|
t.Fatal("failed to fail with bad return from user.Lookup()")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestAuthUserByTokenFailsOnMismatchedTokenForUser(t *testing.T) {
|
2020-02-18 18:53:04 +00:00
|
|
|
ctx := newMockAuthCtx(_mock_ioutil_ReadFile, _mock_user_Lookup)
|
|
|
|
stat := AuthUserByToken(ctx, "johndoe", "hostA", "badtoken")
|
2020-02-18 07:14:37 +00:00
|
|
|
if stat {
|
|
|
|
t.Fatal("failed to fail with valid user, bad token")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestAuthUserByTokenSucceedsWithMatchedUserAndToken(t *testing.T) {
|
2020-02-18 18:53:04 +00:00
|
|
|
ctx := newMockAuthCtx(_mock_ioutil_ReadFile, _mock_user_Lookup)
|
2020-02-18 07:14:37 +00:00
|
|
|
userlookup_arg_u = "johndoe"
|
|
|
|
readfile_arg_f = "/.xs_id"
|
2020-02-18 18:53:04 +00:00
|
|
|
stat := AuthUserByToken(ctx, userlookup_arg_u, "hostA", "hostA:abcdefg")
|
2020-02-18 07:14:37 +00:00
|
|
|
if !stat {
|
|
|
|
t.Fatal("failed with valid user and token")
|
|
|
|
}
|
|
|
|
}
|