client_test.go 9.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380
  1. package ircclient
  2. import (
  3. "bufio"
  4. "crypto/ecdsa"
  5. "crypto/elliptic"
  6. "crypto/rand"
  7. "crypto/tls"
  8. "crypto/x509"
  9. "crypto/x509/pkix"
  10. "encoding/base64"
  11. "encoding/pem"
  12. "fmt"
  13. "math/big"
  14. rnd "math/rand"
  15. "net"
  16. "strconv"
  17. "strings"
  18. "testing"
  19. "time"
  20. )
  21. func setupSocket() (listen net.Listener, addr string) {
  22. // establish network socket connection to set Comm_handle
  23. var err error
  24. var listener net.Listener
  25. var address string
  26. listener, err = net.Listen("tcp", "127.0.0.1:0")
  27. if err != nil {
  28. panic(err)
  29. }
  30. // I only need address for making the connection.
  31. // Get address of listening socket
  32. address = listener.Addr().String()
  33. return listener, address
  34. }
  35. func generateKeyPair() (keypair tls.Certificate) {
  36. // generate test certificate
  37. priv, _ := ecdsa.GenerateKey(elliptic.P521(), rand.Reader)
  38. durationBefore, _ := time.ParseDuration("-1h")
  39. notBefore := time.Now().Add(durationBefore)
  40. durationAfter, _ := time.ParseDuration("1h")
  41. notAfter := time.Now().Add(durationAfter)
  42. serialNumberLimit := new(big.Int).Lsh(big.NewInt(1), 64)
  43. serialNumber, _ := rand.Int(rand.Reader, serialNumberLimit)
  44. template := x509.Certificate{
  45. SerialNumber: serialNumber,
  46. Subject: pkix.Name{
  47. Organization: []string{"Test Certificate"},
  48. },
  49. NotBefore: notBefore,
  50. NotAfter: notAfter,
  51. KeyUsage: x509.KeyUsageKeyEncipherment | x509.KeyUsageDigitalSignature | x509.KeyUsageCertSign,
  52. ExtKeyUsage: []x509.ExtKeyUsage{x509.ExtKeyUsageServerAuth},
  53. BasicConstraintsValid: true,
  54. IsCA: true,
  55. }
  56. template.IPAddresses = append(template.IPAddresses, net.ParseIP("127.0.0.1"))
  57. template.IPAddresses = append(template.IPAddresses, net.ParseIP("::"))
  58. derBytes, _ := x509.CreateCertificate(rand.Reader, &template, &template, &priv.PublicKey, priv)
  59. c := pem.EncodeToMemory(&pem.Block{Type: "CERTIFICATE", Bytes: derBytes})
  60. b, _ := x509.MarshalECPrivateKey(priv)
  61. k := pem.EncodeToMemory(&pem.Block{Type: "EC PRIVATE KEY", Bytes: b})
  62. listenerKeyPair, _ := tls.X509KeyPair(c, k)
  63. return listenerKeyPair
  64. }
  65. func setupTLSSocket() (listen net.Listener, addr string) {
  66. // establish network socket connection to set Comm_handle
  67. var err error
  68. var listener net.Listener
  69. var address string
  70. var tlsconfig tls.Config
  71. var keypair tls.Certificate = generateKeyPair()
  72. tlsconfig.Certificates = make([]tls.Certificate, 0)
  73. tlsconfig.Certificates = append(tlsconfig.Certificates, keypair)
  74. listener, err = tls.Listen("tcp", "127.0.0.1:0", &tlsconfig)
  75. if err != nil {
  76. panic(err)
  77. }
  78. // I only need address for making the connection.
  79. // Get address of listening socket
  80. address = listener.Addr().String()
  81. return listener, address
  82. }
  83. func ircWrite(server net.Conn, output string, t *testing.T) {
  84. t.Logf(">> %s\n", output)
  85. server.Write([]byte(output + "\r\n"))
  86. }
  87. func ircServer(listener net.Listener, t *testing.T, config *IRCConfig) {
  88. var server net.Conn
  89. var err error
  90. server, err = listener.Accept()
  91. if err != nil {
  92. t.Error("Failed to accept connection.")
  93. return
  94. }
  95. listener.Close()
  96. var reader *bufio.Reader = bufio.NewReader(server)
  97. var output, line, expect string
  98. var ping int64 = rnd.Int63()
  99. output = fmt.Sprintf("PING :%X", ping)
  100. ircWrite(server, output, t)
  101. var parts []string
  102. var hasNick, hasUser, hasPing, hasPass bool
  103. var capSASL bool
  104. var part1 bool
  105. for !part1 {
  106. line, err = reader.ReadString('\n')
  107. if err == nil {
  108. line = strings.Trim(line, "\r\n")
  109. // process the received line here
  110. parts = strings.Split(line, " ")
  111. t.Logf("<< %s", line)
  112. switch parts[0] {
  113. case "CAP":
  114. if config.UseTLS && config.UseSASL {
  115. if line == "CAP REQ :sasl" {
  116. // Acknowledge we support SASL
  117. ircWrite(server, ":irc.red-green.com CAP * ACK :sasl", t)
  118. capSASL = true
  119. }
  120. if line == "CAP END" {
  121. capSASL = true
  122. }
  123. }
  124. case "AUTHENTICATE":
  125. if capSASL {
  126. if line == "AUTHENTICATE PLAIN" {
  127. ircWrite(server, "AUTHENTICATE +", t)
  128. } else {
  129. // Process SASL auth message
  130. var auth64 string = parts[1]
  131. byteauth, _ := base64.StdEncoding.DecodeString(auth64)
  132. var auth string = string(byteauth)
  133. auth = strings.ReplaceAll(auth, "\x00", " ")
  134. t.Log(auth)
  135. }
  136. }
  137. case "PASS":
  138. expect = fmt.Sprintf("PASS %s", config.ServerPassword)
  139. if expect != line {
  140. t.Errorf("Got %s, Expected %s", line, expect)
  141. } else {
  142. hasPass = true
  143. }
  144. case "NICK":
  145. expect = fmt.Sprintf("NICK %s", config.Nick)
  146. if expect != line {
  147. t.Errorf("Got %s, Expected %s", line, expect)
  148. } else {
  149. hasNick = true
  150. }
  151. case "USER":
  152. // USER meow-bot 0 * :Meooow! bugz is my owner.
  153. expect = fmt.Sprintf("USER %s 0 * :%s", config.Username, config.Realname)
  154. if expect != line {
  155. t.Errorf("Got %s, Expected %s", line, expect)
  156. } else {
  157. hasUser = true
  158. }
  159. case "PONG":
  160. expect = fmt.Sprintf("PONG %X", ping)
  161. if expect != line {
  162. t.Errorf("Got %s, Expected %s", line, expect)
  163. } else {
  164. hasPing = true
  165. }
  166. }
  167. if !part1 {
  168. if !capSASL && hasNick && hasUser && hasPing && ((config.ServerPassword == "") || hasPass) {
  169. part1 = true
  170. // part 2:
  171. var line string
  172. for _, line = range []string{":irc.red-green.com 001 %s :Welcome to the RedGreen IRC Network",
  173. ":irc.red-green.com 002 %s :Your host is irc.red-green.com, running version UnrealIRCd-5.2.0.1",
  174. ":irc.red-green.com 375 %s :- irc.red-green.com Message of the Day -",
  175. ":irc.red-green.com 372 %s :- ",
  176. ":irc.red-green.com 376 %s :End of /MOTD command.",
  177. } {
  178. output = fmt.Sprintf(line, config.Nick)
  179. ircWrite(server, output, t)
  180. }
  181. }
  182. }
  183. } else {
  184. t.Error("Read Error:", err)
  185. server.Close()
  186. return
  187. }
  188. }
  189. if !part1 {
  190. t.Error("Expected to pass part1 (user/nick/pong)")
  191. }
  192. // part 2: nickserv/register
  193. var part2 bool
  194. for _, line = range []string{":[email protected] NOTICE %s :This nickname is registered and protected. If it is your",
  195. ":[email protected] NOTICE %s :nick, type \x02/msg NickServ IDENTIFY \x1fpassword\x1f\x02. Otherwise,"} {
  196. output = fmt.Sprintf(line, config.Nick)
  197. ircWrite(server, output, t)
  198. }
  199. for !part2 {
  200. line, err = reader.ReadString('\n')
  201. if err == nil {
  202. line = strings.Trim(line, "\r\n")
  203. // process the received line here
  204. parts = strings.Split(line, " ")
  205. t.Logf("<< %s", line)
  206. switch parts[0] {
  207. case "NS":
  208. expect = fmt.Sprintf("NS IDENTIFY %s", config.Password)
  209. if expect != line {
  210. t.Errorf("Got %s, Expected %s", line, expect)
  211. }
  212. // ok, mark the user as registered
  213. output = fmt.Sprintf(":[email protected] NOTICE %s :Password accepted - you are now recognized.",
  214. config.Nick)
  215. ircWrite(server, output, t)
  216. output = fmt.Sprintf(":NickServ MODE %s :+r", config.Nick)
  217. ircWrite(server, output, t)
  218. part2 = true
  219. }
  220. } else {
  221. t.Error("Read Error:", err)
  222. server.Close()
  223. return
  224. }
  225. }
  226. if !part2 {
  227. t.Error("Expected to pass part2 (ns identify/+r)")
  228. }
  229. time.AfterFunc(time.Millisecond*time.Duration(50), func() { server.Close() })
  230. t.Log("Ok, Identified...")
  231. for {
  232. line, err = reader.ReadString('\n')
  233. if err == nil {
  234. line = strings.Trim(line, "\r\n")
  235. // process the received line here
  236. parts = strings.Split(line, " ")
  237. t.Logf("<< %s", line)
  238. } else {
  239. t.Log("Read Error:", err)
  240. return
  241. }
  242. }
  243. }
  244. func TestConnect(t *testing.T) {
  245. var config IRCConfig = IRCConfig{Nick: "test",
  246. Username: "test",
  247. Realname: "testing",
  248. Password: "12345",
  249. ServerPassword: "allow"}
  250. var listen net.Listener
  251. var address string
  252. listen, address = setupSocket()
  253. var parts []string = strings.Split(address, ":")
  254. config.Hostname = parts[0]
  255. config.Port, _ = strconv.Atoi(parts[1])
  256. go ircServer(listen, t, &config)
  257. var FromIRC chan IRCMsg
  258. FromIRC = make(chan IRCMsg)
  259. config.ReadChannel = FromIRC
  260. config.Connect()
  261. defer config.Close()
  262. var Msg IRCMsg
  263. var motd, identify bool
  264. for Msg = range FromIRC {
  265. if Msg.Cmd == "EndMOTD" {
  266. t.Log("Got EndMOTD")
  267. motd = true
  268. }
  269. if Msg.Cmd == "Identified" {
  270. t.Log("Identified")
  271. identify = true
  272. }
  273. }
  274. if !motd {
  275. t.Error("Missing EndMOTD")
  276. }
  277. if !identify {
  278. t.Error("Missing Identified")
  279. }
  280. if config.MyNick != config.Nick {
  281. t.Errorf("Got %s, Expected %s", config.MyNick, config.Nick)
  282. }
  283. }
  284. func TestConnectTLS(t *testing.T) {
  285. var config IRCConfig = IRCConfig{Nick: "test",
  286. Username: "test",
  287. Realname: "testing",
  288. Password: "12345",
  289. UseTLS: true,
  290. UseSASL: true,
  291. Insecure: true,
  292. ServerPassword: "allow"}
  293. var listen net.Listener
  294. var address string
  295. listen, address = setupTLSSocket()
  296. var parts []string = strings.Split(address, ":")
  297. config.Hostname = parts[0]
  298. config.Port, _ = strconv.Atoi(parts[1])
  299. go ircServer(listen, t, &config)
  300. var FromIRC chan IRCMsg
  301. FromIRC = make(chan IRCMsg)
  302. config.ReadChannel = FromIRC
  303. config.Connect()
  304. defer config.Close()
  305. var Msg IRCMsg
  306. var motd, identify bool
  307. for Msg = range FromIRC {
  308. if Msg.Cmd == "EndMOTD" {
  309. t.Log("Got EndMOTD")
  310. motd = true
  311. }
  312. if Msg.Cmd == "Identified" {
  313. t.Log("Identified")
  314. identify = true
  315. }
  316. }
  317. if !motd {
  318. t.Error("Missing EndMOTD")
  319. }
  320. if !identify {
  321. t.Error("Missing Identified")
  322. }
  323. if config.MyNick != config.Nick {
  324. t.Errorf("Got %s, Expected %s", config.MyNick, config.Nick)
  325. }
  326. }