ircd_test.go 10 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373
  1. package ircclient
  2. import (
  3. "bufio"
  4. "crypto/ecdsa"
  5. "crypto/elliptic"
  6. "crypto/rand"
  7. "crypto/tls"
  8. "crypto/x509"
  9. "crypto/x509/pkix"
  10. "encoding/base64"
  11. "encoding/pem"
  12. "fmt"
  13. "log"
  14. "math/big"
  15. rnd "math/rand"
  16. "net"
  17. "strings"
  18. "testing"
  19. "time"
  20. )
  21. func setupSocket() (listen net.Listener, addr string) {
  22. // establish network socket connection to set Comm_handle
  23. var err error
  24. var listener net.Listener
  25. var address string
  26. listener, err = net.Listen("tcp", "127.0.0.1:0")
  27. if err != nil {
  28. panic(err)
  29. }
  30. // I only need address for making the connection.
  31. // Get address of listening socket
  32. address = listener.Addr().String()
  33. return listener, address
  34. }
  35. func generateKeyPair() (keypair tls.Certificate) {
  36. // generate test certificate
  37. priv, _ := ecdsa.GenerateKey(elliptic.P521(), rand.Reader)
  38. durationBefore, _ := time.ParseDuration("-1h")
  39. notBefore := time.Now().Add(durationBefore)
  40. durationAfter, _ := time.ParseDuration("1h")
  41. notAfter := time.Now().Add(durationAfter)
  42. serialNumberLimit := new(big.Int).Lsh(big.NewInt(1), 64)
  43. serialNumber, _ := rand.Int(rand.Reader, serialNumberLimit)
  44. template := x509.Certificate{
  45. SerialNumber: serialNumber,
  46. Subject: pkix.Name{
  47. Organization: []string{"Test Certificate"},
  48. },
  49. NotBefore: notBefore,
  50. NotAfter: notAfter,
  51. KeyUsage: x509.KeyUsageKeyEncipherment | x509.KeyUsageDigitalSignature | x509.KeyUsageCertSign,
  52. ExtKeyUsage: []x509.ExtKeyUsage{x509.ExtKeyUsageServerAuth},
  53. BasicConstraintsValid: true,
  54. IsCA: true,
  55. }
  56. template.IPAddresses = append(template.IPAddresses, net.ParseIP("127.0.0.1"))
  57. template.IPAddresses = append(template.IPAddresses, net.ParseIP("::"))
  58. derBytes, _ := x509.CreateCertificate(rand.Reader, &template, &template, &priv.PublicKey, priv)
  59. c := pem.EncodeToMemory(&pem.Block{Type: "CERTIFICATE", Bytes: derBytes})
  60. b, _ := x509.MarshalECPrivateKey(priv)
  61. k := pem.EncodeToMemory(&pem.Block{Type: "EC PRIVATE KEY", Bytes: b})
  62. listenerKeyPair, _ := tls.X509KeyPair(c, k)
  63. return listenerKeyPair
  64. }
  65. func setupTLSSocket() (listen net.Listener, addr string) {
  66. // establish network socket connection to set Comm_handle
  67. var err error
  68. var listener net.Listener
  69. var address string
  70. var tlsconfig tls.Config
  71. var keypair tls.Certificate = generateKeyPair()
  72. tlsconfig.Certificates = make([]tls.Certificate, 0)
  73. tlsconfig.Certificates = append(tlsconfig.Certificates, keypair)
  74. listener, err = tls.Listen("tcp", "127.0.0.1:0", &tlsconfig)
  75. if err != nil {
  76. panic(err)
  77. }
  78. // I only need address for making the connection.
  79. // Get address of listening socket
  80. address = listener.Addr().String()
  81. return listener, address
  82. }
  83. func ircWrite(server net.Conn, output string, t *testing.T) {
  84. t.Logf(">> %s\n", output)
  85. server.Write([]byte(output + "\r\n"))
  86. }
  87. var abortAfter int = 150 // Milliseconds to abort part 3
  88. /*
  89. mock up an irc server
  90. part 1 : nick, user
  91. part 2 : identify to services (if not SASL/SASL failed)
  92. part 3 : quit after abortAfter ms
  93. Features:
  94. if nick == "bad", return 443 Nick already in use.
  95. JOIN #kick, kicks once from the channel.
  96. SASL authentication testing.
  97. TLS support, we make our own certificates.
  98. Any messages sent to "echo" are reflected back to the client.
  99. */
  100. func ircServer(listener net.Listener, t *testing.T, config *IRCConfig) {
  101. var server net.Conn
  102. var err error
  103. server, err = listener.Accept()
  104. if err != nil {
  105. t.Error("Failed to accept connection.")
  106. return
  107. }
  108. listener.Close()
  109. var reader *bufio.Reader = bufio.NewReader(server)
  110. var output, line, expect string
  111. var ping int64 = rnd.Int63()
  112. output = fmt.Sprintf("PING :%X", ping)
  113. ircWrite(server, output, t)
  114. var parts []string
  115. var hasNick, hasUser, hasPing, hasPass bool
  116. var capSASL, successSASL bool
  117. var part1 bool
  118. // part 1 : User, Nick, ServerPass and Ping reply
  119. for !part1 {
  120. line, err = reader.ReadString('\n')
  121. if err == nil {
  122. line = strings.Trim(line, "\r\n")
  123. // process the received line here
  124. parts = strings.Split(line, " ")
  125. t.Logf("<< %s", line)
  126. switch parts[0] {
  127. case "CAP":
  128. if config.UseTLS && config.UseSASL {
  129. if line == "CAP REQ :sasl" {
  130. // Acknowledge we support SASL
  131. ircWrite(server, ":irc.red-green.com CAP * ACK :sasl", t)
  132. capSASL = true
  133. }
  134. if line == "CAP END" {
  135. capSASL = true
  136. if successSASL {
  137. part1 = true
  138. }
  139. }
  140. }
  141. case "AUTHENTICATE":
  142. if capSASL {
  143. if line == "AUTHENTICATE PLAIN" {
  144. ircWrite(server, "AUTHENTICATE +", t)
  145. } else {
  146. // Process SASL auth message
  147. var auth64 string = parts[1]
  148. byteauth, _ := base64.StdEncoding.DecodeString(auth64)
  149. var auth string = string(byteauth)
  150. auth = strings.ReplaceAll(auth, "\x00", " ")
  151. t.Log(auth)
  152. expect = fmt.Sprintf(" %s %s", config.Nick, config.Password)
  153. if expect != auth {
  154. t.Errorf("Got %s, Expected %s", auth, expect)
  155. ircWrite(server, fmt.Sprintf(":irc.red-green.com 904 %s :SASL authentication failed",
  156. config.Nick), t)
  157. } else {
  158. // Success!
  159. ircWrite(server, fmt.Sprintf(":irc.red-green.com 900 %s %s!%[email protected] %s :You are now logged in as %s.",
  160. config.Nick, config.Nick, config.Username, config.Nick, config.Nick), t)
  161. ircWrite(server, fmt.Sprintf(":irc.red-green.com 903 %s :SASL authentication successful",
  162. config.Nick), t)
  163. successSASL = true
  164. }
  165. }
  166. }
  167. case "PASS":
  168. expect = fmt.Sprintf("PASS %s", config.ServerPassword)
  169. if expect != line {
  170. t.Errorf("Got %s, Expected %s", line, expect)
  171. } else {
  172. hasPass = true
  173. }
  174. case "NICK":
  175. expect = fmt.Sprintf("NICK %s", config.MyNick)
  176. if expect != line {
  177. t.Errorf("Got %s, Expected %s", line, expect)
  178. } else {
  179. if config.MyNick == "bad" {
  180. // throw bad nick here
  181. ircWrite(server, fmt.Sprintf(":irc.red-green.com 433 :Nick already in use."), t)
  182. }
  183. hasNick = true
  184. }
  185. case "USER":
  186. // USER meow-bot 0 * :Meooow! bugz is my owner.
  187. expect = fmt.Sprintf("USER %s 0 * :%s", config.Username, config.Realname)
  188. if expect != line {
  189. t.Errorf("Got %s, Expected %s", line, expect)
  190. } else {
  191. hasUser = true
  192. }
  193. case "PONG":
  194. expect = fmt.Sprintf("PONG %X", ping)
  195. if expect != line {
  196. t.Errorf("Got %s, Expected %s", line, expect)
  197. } else {
  198. hasPing = true
  199. }
  200. }
  201. if !part1 {
  202. if !capSASL && hasNick && hasUser && hasPing && ((config.ServerPassword == "") || hasPass) {
  203. part1 = true
  204. }
  205. }
  206. } else {
  207. t.Error("Read Error:", err)
  208. server.Close()
  209. return
  210. }
  211. }
  212. if !part1 {
  213. t.Error("Expected to pass part1 (user/nick/pong)")
  214. }
  215. // Display MOTD
  216. for _, line = range []string{":irc.red-green.com 001 %s :Welcome to the RedGreen IRC Network",
  217. ":irc.red-green.com 002 %s :Your host is irc.red-green.com, running version UnrealIRCd-5.2.0.1",
  218. ":irc.red-green.com 375 %s :- irc.red-green.com Message of the Day -",
  219. ":irc.red-green.com 372 %s :- ",
  220. ":irc.red-green.com 376 %s :End of /MOTD command.",
  221. } {
  222. output = fmt.Sprintf(line, config.Nick)
  223. ircWrite(server, output, t)
  224. }
  225. if config.UseSASL {
  226. if !successSASL {
  227. log.Println("Failed SASL Authentication.")
  228. }
  229. }
  230. // part 2: nickserv/register (if not already registered with SASL)
  231. var part2 bool
  232. if successSASL {
  233. ircWrite(server, fmt.Sprintf(":NickServ MODE %s :+r", config.Nick), t)
  234. part2 = true
  235. } else {
  236. if config.Password != "" {
  237. for _, line = range []string{":[email protected] NOTICE %s :This nickname is registered and protected. If it is your",
  238. ":[email protected] NOTICE %s :nick, type \x02/msg NickServ IDENTIFY \x1fpassword\x1f\x02. Otherwise,"} {
  239. output = fmt.Sprintf(line, config.Nick)
  240. ircWrite(server, output, t)
  241. }
  242. } else {
  243. // No password, so we can't register. Skip this part.
  244. part2 = true
  245. }
  246. }
  247. for !part2 {
  248. line, err = reader.ReadString('\n')
  249. if err == nil {
  250. line = strings.Trim(line, "\r\n")
  251. // process the received line here
  252. parts = strings.Split(line, " ")
  253. t.Logf("<< %s", line)
  254. switch parts[0] {
  255. case "NS":
  256. expect = fmt.Sprintf("NS IDENTIFY %s", config.Password)
  257. if expect != line {
  258. t.Errorf("Got %s, Expected %s", line, expect)
  259. }
  260. // ok, mark the user as registered
  261. output = fmt.Sprintf(":[email protected] NOTICE %s :Password accepted - you are now recognized.",
  262. config.Nick)
  263. ircWrite(server, output, t)
  264. output = fmt.Sprintf(":NickServ MODE %s :+r", config.Nick)
  265. ircWrite(server, output, t)
  266. part2 = true
  267. }
  268. } else {
  269. t.Error("Read Error:", err)
  270. server.Close()
  271. return
  272. }
  273. }
  274. if !part2 {
  275. t.Error("Expected to pass part2 (ns identify/+r)")
  276. }
  277. time.AfterFunc(time.Millisecond*time.Duration(abortAfter), func() { server.Close() })
  278. t.Log("Ok, Identified...")
  279. var Kicked bool
  280. for {
  281. line, err = reader.ReadString('\n')
  282. if err == nil {
  283. line = strings.Trim(line, "\r\n")
  284. // process the received line here
  285. parts = strings.Split(line, " ")
  286. t.Logf("<< %s", line)
  287. switch parts[0] {
  288. case "JOIN":
  289. for _, channel := range strings.Split(parts[1], ",") {
  290. output = fmt.Sprintf(":%s JOIN :%s", config.MyNick, channel)
  291. ircWrite(server, output, t)
  292. output = fmt.Sprintf(":irc.server 332 %s %s :Topic for (%s)", config.MyNick, channel, channel)
  293. ircWrite(server, output, t)
  294. output = fmt.Sprintf(":irc.server 333 %s %s user %d", config.MyNick, channel, time.Now().Unix())
  295. ircWrite(server, output, t)
  296. if strings.Contains(channel, "kick") {
  297. if !Kicked {
  298. Kicked = true
  299. output = fmt.Sprintf("user KICK %s %s :Get out", channel, config.MyNick)
  300. ircWrite(server, output, t)
  301. }
  302. }
  303. }
  304. }
  305. switch parts[0] {
  306. case "PRIVMSG", "NOTICE":
  307. if parts[1] == "echo" {
  308. parts[2] = parts[2][1:]
  309. // echo user, return whatever was sent back to them.
  310. output = fmt.Sprintf(":%s %s %s :%s", "echo", parts[0], config.MyNick, strings.Join(parts[2:], " "))
  311. ircWrite(server, output, t)
  312. }
  313. if strings.Contains(parts[1], "missing") {
  314. // Sending to missing user or channel.
  315. var number int
  316. if strings.Contains(parts[1], "#") {
  317. number = 404
  318. } else {
  319. number = 401
  320. }
  321. output = fmt.Sprintf(":irc.red-green.com %d %s %s :No such nick/channel", number, config.MyNick, parts[1])
  322. ircWrite(server, output, t)
  323. }
  324. }
  325. } else {
  326. t.Log("Read Error:", err)
  327. return
  328. }
  329. }
  330. }