ircd_test.go 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382
  1. package ircclient
  2. import (
  3. "bufio"
  4. "crypto/ecdsa"
  5. "crypto/elliptic"
  6. "crypto/rand"
  7. "crypto/tls"
  8. "crypto/x509"
  9. "crypto/x509/pkix"
  10. "encoding/base64"
  11. "encoding/pem"
  12. "fmt"
  13. "log"
  14. "math/big"
  15. rnd "math/rand"
  16. "net"
  17. "strings"
  18. "testing"
  19. "time"
  20. )
  21. func setupSocket() (listen net.Listener, addr string) {
  22. // establish network socket connection to set Comm_handle
  23. var err error
  24. var listener net.Listener
  25. var address string
  26. listener, err = net.Listen("tcp", "127.0.0.1:0")
  27. if err != nil {
  28. panic(err)
  29. }
  30. // I only need address for making the connection.
  31. // Get address of listening socket
  32. address = listener.Addr().String()
  33. return listener, address
  34. }
  35. func generateKeyPair() (keypair tls.Certificate) {
  36. // generate test certificate
  37. priv, _ := ecdsa.GenerateKey(elliptic.P521(), rand.Reader)
  38. durationBefore, _ := time.ParseDuration("-1h")
  39. notBefore := time.Now().Add(durationBefore)
  40. durationAfter, _ := time.ParseDuration("1h")
  41. notAfter := time.Now().Add(durationAfter)
  42. serialNumberLimit := new(big.Int).Lsh(big.NewInt(1), 64)
  43. serialNumber, _ := rand.Int(rand.Reader, serialNumberLimit)
  44. template := x509.Certificate{
  45. SerialNumber: serialNumber,
  46. Subject: pkix.Name{
  47. Organization: []string{"Test Certificate"},
  48. },
  49. NotBefore: notBefore,
  50. NotAfter: notAfter,
  51. KeyUsage: x509.KeyUsageKeyEncipherment | x509.KeyUsageDigitalSignature | x509.KeyUsageCertSign,
  52. ExtKeyUsage: []x509.ExtKeyUsage{x509.ExtKeyUsageServerAuth},
  53. BasicConstraintsValid: true,
  54. IsCA: true,
  55. }
  56. template.IPAddresses = append(template.IPAddresses, net.ParseIP("127.0.0.1"))
  57. template.IPAddresses = append(template.IPAddresses, net.ParseIP("::"))
  58. derBytes, _ := x509.CreateCertificate(rand.Reader, &template, &template, &priv.PublicKey, priv)
  59. c := pem.EncodeToMemory(&pem.Block{Type: "CERTIFICATE", Bytes: derBytes})
  60. b, _ := x509.MarshalECPrivateKey(priv)
  61. k := pem.EncodeToMemory(&pem.Block{Type: "EC PRIVATE KEY", Bytes: b})
  62. listenerKeyPair, _ := tls.X509KeyPair(c, k)
  63. return listenerKeyPair
  64. }
  65. func setupTLSSocket() (listen net.Listener, addr string) {
  66. // establish network socket connection to set Comm_handle
  67. var err error
  68. var listener net.Listener
  69. var address string
  70. var tlsconfig tls.Config
  71. var keypair tls.Certificate = generateKeyPair()
  72. tlsconfig.Certificates = make([]tls.Certificate, 0)
  73. tlsconfig.Certificates = append(tlsconfig.Certificates, keypair)
  74. listener, err = tls.Listen("tcp", "127.0.0.1:0", &tlsconfig)
  75. if err != nil {
  76. panic(err)
  77. }
  78. // I only need address for making the connection.
  79. // Get address of listening socket
  80. address = listener.Addr().String()
  81. return listener, address
  82. }
  83. func ircWrite(server net.Conn, output string, t *testing.T) {
  84. t.Logf(">> %s\n", output)
  85. server.Write([]byte(output + "\r\n"))
  86. }
  87. var abortAfter int = 150 // Milliseconds to abort part 3
  88. /*
  89. mock up an irc server
  90. part 1 : nick, user
  91. part 2 : identify to services (if not SASL/SASL failed)
  92. part 3 : quit after abortAfter ms
  93. Features:
  94. if nick == "bad", return 443 Nick already in use.
  95. JOIN #kick, kicks once from the channel.
  96. SASL authentication testing.
  97. TLS support, we make our own certificates.
  98. Any messages sent to "echo" are reflected back to the client.
  99. Any messages to missing/#missing are returned 404/401.
  100. */
  101. func ircServer(listener net.Listener, t *testing.T, config *IRCConfig) {
  102. var server net.Conn
  103. var err error
  104. server, err = listener.Accept()
  105. if err != nil {
  106. t.Error("Failed to accept connection.")
  107. return
  108. }
  109. listener.Close()
  110. var reader *bufio.Reader = bufio.NewReader(server)
  111. var output, line, expect string
  112. var ping int64 = rnd.Int63()
  113. output = fmt.Sprintf("PING :%X", ping)
  114. ircWrite(server, output, t)
  115. var parts []string
  116. var hasNick, hasUser, hasPing, hasPass bool
  117. var capSASL, successSASL bool
  118. var part1 bool
  119. // part 1 : User, Nick, ServerPass and Ping reply
  120. for !part1 {
  121. line, err = reader.ReadString('\n')
  122. if err == nil {
  123. line = strings.Trim(line, "\r\n")
  124. // process the received line here
  125. parts = strings.Split(line, " ")
  126. t.Logf("<< %s", line)
  127. switch parts[0] {
  128. case "CAP":
  129. if config.UseTLS && config.UseSASL {
  130. if line == "CAP REQ :sasl" {
  131. // Acknowledge we support SASL
  132. ircWrite(server, ":irc.red-green.com CAP * ACK :sasl", t)
  133. capSASL = true
  134. }
  135. if line == "CAP END" {
  136. capSASL = true
  137. if successSASL {
  138. part1 = true
  139. }
  140. }
  141. }
  142. case "AUTHENTICATE":
  143. if capSASL {
  144. if line == "AUTHENTICATE PLAIN" {
  145. ircWrite(server, "AUTHENTICATE +", t)
  146. } else {
  147. // Process SASL auth message
  148. var auth64 string = parts[1]
  149. byteauth, _ := base64.StdEncoding.DecodeString(auth64)
  150. var auth string = string(byteauth)
  151. auth = strings.ReplaceAll(auth, "\x00", " ")
  152. t.Log(auth)
  153. expect = fmt.Sprintf(" %s %s", config.Nick, config.Password)
  154. if expect != auth {
  155. t.Errorf("Got %s, Expected %s", auth, expect)
  156. ircWrite(server, fmt.Sprintf(":irc.red-green.com 904 %s :SASL authentication failed",
  157. config.Nick), t)
  158. } else {
  159. // Success!
  160. ircWrite(server, fmt.Sprintf(":irc.red-green.com 900 %s %s!%[email protected] %s :You are now logged in as %s.",
  161. config.Nick, config.Nick, config.Username, config.Nick, config.Nick), t)
  162. ircWrite(server, fmt.Sprintf(":irc.red-green.com 903 %s :SASL authentication successful",
  163. config.Nick), t)
  164. successSASL = true
  165. }
  166. }
  167. }
  168. case "PASS":
  169. expect = fmt.Sprintf("PASS %s", config.ServerPassword)
  170. if expect != line {
  171. t.Errorf("Got %s, Expected %s", line, expect)
  172. } else {
  173. hasPass = true
  174. }
  175. case "NICK":
  176. expect = fmt.Sprintf("NICK %s", config.MyNick)
  177. if expect != line {
  178. t.Errorf("Got %s, Expected %s", line, expect)
  179. } else {
  180. if config.MyNick == "bad" {
  181. // throw bad nick here
  182. ircWrite(server, fmt.Sprintf(":irc.red-green.com 433 :Nick already in use."), t)
  183. }
  184. hasNick = true
  185. }
  186. case "USER":
  187. // USER meow-bot 0 * :Meooow! bugz is my owner.
  188. expect = fmt.Sprintf("USER %s 0 * :%s", config.Username, config.Realname)
  189. if expect != line {
  190. t.Errorf("Got %s, Expected %s", line, expect)
  191. } else {
  192. hasUser = true
  193. }
  194. case "PONG":
  195. expect = fmt.Sprintf("PONG %X", ping)
  196. if expect != line {
  197. t.Errorf("Got %s, Expected %s", line, expect)
  198. } else {
  199. hasPing = true
  200. }
  201. }
  202. if !part1 {
  203. if !capSASL && hasNick && hasUser && hasPing && ((config.ServerPassword == "") || hasPass) {
  204. part1 = true
  205. }
  206. }
  207. } else {
  208. t.Error("Read Error:", err)
  209. server.Close()
  210. return
  211. }
  212. }
  213. if !part1 {
  214. t.Error("Expected to pass part1 (user/nick/pong)")
  215. }
  216. // Display MOTD
  217. for _, line = range []string{":irc.red-green.com 001 %s :Welcome to the RedGreen IRC Network",
  218. ":irc.red-green.com 002 %s :Your host is irc.red-green.com, running version UnrealIRCd-5.2.0.1",
  219. ":irc.red-green.com 375 %s :- irc.red-green.com Message of the Day -",
  220. ":irc.red-green.com 372 %s :- ",
  221. ":irc.red-green.com 376 %s :End of /MOTD command.",
  222. } {
  223. output = fmt.Sprintf(line, config.Nick)
  224. ircWrite(server, output, t)
  225. }
  226. if config.UseSASL {
  227. if !successSASL {
  228. log.Println("Failed SASL Authentication.")
  229. }
  230. }
  231. // part 2: nickserv/register (if not already registered with SASL)
  232. var part2 bool
  233. if successSASL {
  234. ircWrite(server, fmt.Sprintf(":NickServ MODE %s :+r", config.Nick), t)
  235. part2 = true
  236. } else {
  237. if config.Password != "" {
  238. for _, line = range []string{":[email protected] NOTICE %s :This nickname is registered and protected. If it is your",
  239. ":[email protected] NOTICE %s :nick, type \x02/msg NickServ IDENTIFY \x1fpassword\x1f\x02. Otherwise,"} {
  240. output = fmt.Sprintf(line, config.Nick)
  241. ircWrite(server, output, t)
  242. }
  243. } else {
  244. // No password, so we can't register. Skip this part.
  245. part2 = true
  246. }
  247. }
  248. for !part2 {
  249. line, err = reader.ReadString('\n')
  250. if err == nil {
  251. line = strings.Trim(line, "\r\n")
  252. // process the received line here
  253. parts = strings.Split(line, " ")
  254. t.Logf("<< %s", line)
  255. switch parts[0] {
  256. case "NS":
  257. expect = fmt.Sprintf("NS IDENTIFY %s", config.Password)
  258. if expect != line {
  259. t.Errorf("Got %s, Expected %s", line, expect)
  260. }
  261. // ok, mark the user as registered
  262. output = fmt.Sprintf(":[email protected] NOTICE %s :Password accepted - you are now recognized.",
  263. config.Nick)
  264. ircWrite(server, output, t)
  265. output = fmt.Sprintf(":NickServ MODE %s :+r", config.Nick)
  266. ircWrite(server, output, t)
  267. part2 = true
  268. }
  269. } else {
  270. t.Error("Read Error:", err)
  271. server.Close()
  272. return
  273. }
  274. }
  275. if !part2 {
  276. t.Error("Expected to pass part2 (ns identify/+r)")
  277. }
  278. time.AfterFunc(time.Millisecond*time.Duration(abortAfter), func() { server.Close() })
  279. t.Log("Ok, Identified...")
  280. var Kicked bool
  281. for {
  282. line, err = reader.ReadString('\n')
  283. if err == nil {
  284. line = strings.Trim(line, "\r\n")
  285. // process the received line here
  286. parts = strings.Split(line, " ")
  287. t.Logf("<< %s", line)
  288. switch parts[0] {
  289. case "JOIN":
  290. for _, channel := range strings.Split(parts[1], ",") {
  291. output = fmt.Sprintf(":%s JOIN :%s", config.MyNick, channel)
  292. ircWrite(server, output, t)
  293. output = fmt.Sprintf(":irc.server 332 %s %s :Topic for (%s)", config.MyNick, channel, channel)
  294. ircWrite(server, output, t)
  295. output = fmt.Sprintf(":irc.server 333 %s %s user %d", config.MyNick, channel, time.Now().Unix())
  296. ircWrite(server, output, t)
  297. if strings.Contains(channel, "kick") {
  298. if !Kicked {
  299. Kicked = true
  300. output = fmt.Sprintf("user KICK %s %s :Get out", channel, config.MyNick)
  301. ircWrite(server, output, t)
  302. }
  303. }
  304. }
  305. }
  306. switch parts[0] {
  307. case "PRIVMSG", "NOTICE":
  308. if parts[1] == "echo" {
  309. parts[2] = parts[2][1:]
  310. // echo user, return whatever was sent back to them.
  311. output = fmt.Sprintf(":%s %s %s :%s", "echo", parts[0], config.MyNick, strings.Join(parts[2:], " "))
  312. ircWrite(server, output, t)
  313. }
  314. if strings.Contains(parts[1], "missing") {
  315. // Sending to missing user or channel.
  316. var number int
  317. if strings.Contains(parts[1], "#") {
  318. number = 404
  319. } else {
  320. number = 401
  321. }
  322. output = fmt.Sprintf(":irc.red-green.com %d %s %s :No such nick/channel", number, config.MyNick, parts[1])
  323. ircWrite(server, output, t)
  324. }
  325. case "NICK":
  326. output = fmt.Sprintf(":%s NICK :%s", config.MyNick, parts[1])
  327. ircWrite(server, output, t)
  328. case "QUIT":
  329. output = fmt.Sprintf("ERROR: Closing link:%s", config.MyNick)
  330. ircWrite(server, output, t)
  331. server.Close()
  332. }
  333. } else {
  334. t.Log("Read Error:", err)
  335. return
  336. }
  337. }
  338. }