ircd_test.go 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401
  1. package ircclient
  2. import (
  3. "bufio"
  4. "crypto/ecdsa"
  5. "crypto/elliptic"
  6. "crypto/rand"
  7. "crypto/tls"
  8. "crypto/x509"
  9. "crypto/x509/pkix"
  10. "encoding/base64"
  11. "encoding/pem"
  12. "fmt"
  13. "log"
  14. "math/big"
  15. rnd "math/rand"
  16. "net"
  17. "strings"
  18. "testing"
  19. "time"
  20. )
  21. // Reuse the KeyPair tls.Certificate, it is valid for 1h
  22. var KeyPair tls.Certificate
  23. var HasKeyPair bool
  24. func GenerateKeyPair() (keypair tls.Certificate) {
  25. if !HasKeyPair {
  26. KeyPair = generateKeyPair()
  27. HasKeyPair = true
  28. }
  29. return KeyPair
  30. }
  31. func generateKeyPair() (keypair tls.Certificate) {
  32. // generate test certificate
  33. priv, _ := ecdsa.GenerateKey(elliptic.P521(), rand.Reader)
  34. durationBefore, _ := time.ParseDuration("-1h")
  35. notBefore := time.Now().Add(durationBefore)
  36. durationAfter, _ := time.ParseDuration("1h")
  37. notAfter := time.Now().Add(durationAfter)
  38. serialNumberLimit := new(big.Int).Lsh(big.NewInt(1), 64)
  39. serialNumber, _ := rand.Int(rand.Reader, serialNumberLimit)
  40. template := x509.Certificate{
  41. SerialNumber: serialNumber,
  42. Subject: pkix.Name{
  43. Organization: []string{"Test Certificate"},
  44. },
  45. NotBefore: notBefore,
  46. NotAfter: notAfter,
  47. KeyUsage: x509.KeyUsageKeyEncipherment | x509.KeyUsageDigitalSignature | x509.KeyUsageCertSign,
  48. ExtKeyUsage: []x509.ExtKeyUsage{x509.ExtKeyUsageServerAuth},
  49. BasicConstraintsValid: true,
  50. IsCA: true,
  51. }
  52. template.IPAddresses = append(template.IPAddresses, net.ParseIP("127.0.0.1"))
  53. template.IPAddresses = append(template.IPAddresses, net.ParseIP("::"))
  54. derBytes, _ := x509.CreateCertificate(rand.Reader, &template, &template, &priv.PublicKey, priv)
  55. c := pem.EncodeToMemory(&pem.Block{Type: "CERTIFICATE", Bytes: derBytes})
  56. b, _ := x509.MarshalECPrivateKey(priv)
  57. k := pem.EncodeToMemory(&pem.Block{Type: "EC PRIVATE KEY", Bytes: b})
  58. listenerKeyPair, _ := tls.X509KeyPair(c, k)
  59. return listenerKeyPair
  60. }
  61. func setupTLSSocket() (listen net.Listener, addr string) {
  62. // establish network socket connection to set Comm_handle
  63. var err error
  64. var listener net.Listener
  65. var address string
  66. var tlsconfig tls.Config
  67. var keypair tls.Certificate = GenerateKeyPair()
  68. tlsconfig.Certificates = make([]tls.Certificate, 0)
  69. tlsconfig.Certificates = append(tlsconfig.Certificates, keypair)
  70. listener, err = tls.Listen("tcp", "127.0.0.1:0", &tlsconfig)
  71. if err != nil {
  72. panic(err)
  73. }
  74. // I only need address for making the connection.
  75. // Get address of listening socket
  76. address = listener.Addr().String()
  77. return listener, address
  78. }
  79. func setupSocket() (listen net.Listener, addr string) {
  80. // establish network socket connection to set Comm_handle
  81. var err error
  82. var listener net.Listener
  83. var address string
  84. listener, err = net.Listen("tcp", "127.0.0.1:0")
  85. if err != nil {
  86. panic(err)
  87. }
  88. // I only need address for making the connection.
  89. // Get address of listening socket
  90. address = listener.Addr().String()
  91. return listener, address
  92. }
  93. func ircWrite(server net.Conn, output string, t *testing.T) {
  94. t.Logf(">> %s\n", output)
  95. server.Write([]byte(output + "\r\n"))
  96. }
  97. var abortAfter int = 150 // Milliseconds to abort part 3
  98. /*
  99. mock up an irc server
  100. part 1 : nick, user
  101. part 2 : identify to services (if not SASL/SASL failed)
  102. part 3 : quit after abortAfter ms
  103. Features:
  104. if nick == "bad", return 443 Nick already in use.
  105. JOIN #kick, kicks once from the channel.
  106. SASL authentication testing.
  107. TLS support, we make our own certificates. See generateKeyPair()
  108. Any messages sent to "echo" are reflected back to the client.
  109. Any messages to missing/#missing are returned 404/401.
  110. After abortAfter milliseconds, we close the connection.
  111. */
  112. func ircServer(listener net.Listener, t *testing.T, config *IRCConfig) {
  113. var server net.Conn
  114. var err error
  115. server, err = listener.Accept()
  116. if err != nil {
  117. t.Error("Failed to accept connection.")
  118. return
  119. }
  120. listener.Close()
  121. var reader *bufio.Reader = bufio.NewReader(server)
  122. var output, line, expect string
  123. var ping int64 = rnd.Int63()
  124. output = fmt.Sprintf("PING :%X", ping)
  125. ircWrite(server, output, t)
  126. var parts []string
  127. var hasNick, hasUser, hasPing, hasPass bool
  128. var capSASL, successSASL bool
  129. var part1 bool
  130. // part 1 : User, Nick, ServerPass and Ping reply
  131. for !part1 {
  132. line, err = reader.ReadString('\n')
  133. if err == nil {
  134. line = strings.Trim(line, "\r\n")
  135. // process the received line here
  136. parts = strings.Split(line, " ")
  137. t.Logf("<< %s", line)
  138. switch parts[0] {
  139. case "CAP":
  140. if config.UseTLS && config.UseSASL {
  141. if line == "CAP REQ :sasl" {
  142. // Acknowledge we support SASL
  143. ircWrite(server, ":irc.red-green.com CAP * ACK :sasl", t)
  144. capSASL = true
  145. }
  146. if line == "CAP END" {
  147. capSASL = true
  148. if successSASL {
  149. part1 = true
  150. }
  151. }
  152. }
  153. case "AUTHENTICATE":
  154. if capSASL {
  155. if line == "AUTHENTICATE PLAIN" {
  156. ircWrite(server, "AUTHENTICATE +", t)
  157. } else {
  158. // Process SASL auth message
  159. var auth64 string = parts[1]
  160. byteauth, _ := base64.StdEncoding.DecodeString(auth64)
  161. var auth string = string(byteauth)
  162. auth = strings.ReplaceAll(auth, "\x00", " ")
  163. t.Log(auth)
  164. expect = fmt.Sprintf(" %s %s", config.Nick, config.Password)
  165. if expect != auth {
  166. t.Errorf("Got %s, Expected %s", auth, expect)
  167. ircWrite(server, fmt.Sprintf(":irc.red-green.com 904 %s :SASL authentication failed",
  168. config.Nick), t)
  169. } else {
  170. // Success!
  171. ircWrite(server, fmt.Sprintf(":irc.red-green.com 900 %s %s!%[email protected] %s :You are now logged in as %s.",
  172. config.Nick, config.Nick, config.Username, config.Nick, config.Nick), t)
  173. ircWrite(server, fmt.Sprintf(":irc.red-green.com 903 %s :SASL authentication successful",
  174. config.Nick), t)
  175. successSASL = true
  176. }
  177. }
  178. }
  179. case "PASS":
  180. expect = fmt.Sprintf("PASS %s", config.ServerPassword)
  181. if expect != line {
  182. t.Errorf("Got %s, Expected %s", line, expect)
  183. } else {
  184. hasPass = true
  185. }
  186. case "NICK":
  187. expect = fmt.Sprintf("NICK %s", config.MyNick)
  188. if expect != line {
  189. t.Errorf("Got %s, Expected %s", line, expect)
  190. } else {
  191. if config.MyNick == "bad" {
  192. // throw bad nick here
  193. // ircWrite(server, fmt.Sprintf(":irc.red-green.com 433 :Nick already in use."), t)
  194. ircWrite(server, ":irc.red-green.com 433 :Nick already in use.", t)
  195. }
  196. hasNick = true
  197. }
  198. case "USER":
  199. // USER meow-bot 0 * :Meooow! bugz is my owner.
  200. expect = fmt.Sprintf("USER %s 0 * :%s", config.Username, config.Realname)
  201. if expect != line {
  202. t.Errorf("Got %s, Expected %s", line, expect)
  203. } else {
  204. hasUser = true
  205. }
  206. case "PONG":
  207. expect = fmt.Sprintf("PONG %X", ping)
  208. if expect != line {
  209. t.Errorf("Got %s, Expected %s", line, expect)
  210. } else {
  211. hasPing = true
  212. }
  213. }
  214. if !part1 {
  215. if !capSASL && hasNick && hasUser && hasPing && ((config.ServerPassword == "") || hasPass) {
  216. part1 = true
  217. }
  218. }
  219. } else {
  220. t.Error("Read Error:", err)
  221. server.Close()
  222. return
  223. }
  224. }
  225. if !part1 {
  226. t.Error("Expected to pass part1 (user/nick/pong)")
  227. }
  228. // Display MOTD
  229. for _, line = range []string{
  230. ":irc.red-green.com 001 %s :Welcome to the RedGreen IRC Network",
  231. ":irc.red-green.com 002 %s :Your host is irc.red-green.com, running version UnrealIRCd-5.2.0.1",
  232. ":irc.red-green.com 005 %s AWAYLEN=307 BOT=B CASEMAPPING=ascii CHANLIMIT=#:10 CHANMODES=beI,kLf,lH,psmntirzMQNRTOVKDdGPZSCc CHANNELLEN=32 CHANTYPES=# CLIENTTAGDENY=*,-draft/typing,-typing DEAF=d ELIST=MNUCT EXCEPTS EXTBAN=~,GptmTSOcarnqjf :are supported by this server",
  233. ":irc.red-green.com 005 %s HCN INVEX KICKLEN=307 KNOCK MAP MAXCHANNELS=10 MAXLIST=b:60,e:60,I:60 MAXNICKLEN=30 MINNICKLEN=0 MODES=12 NAMESX NETWORK=RedGreen :are supported by this server",
  234. ":irc.red-green.com 005 %s NICKLEN=30 PREFIX=(qaohv)~&@%%+ QUITLEN=307 SAFELIST SILENCE=15 STATUSMSG=~&@%%+ TARGMAX=DCCALLOW:,ISON:,JOIN:,KICK:4,KILL:,LIST:,NAMES:1,NOTICE:1,PART:,PRIVMSG:4,SAJOIN:,SAPART:,TAGMSG:1,USERHOST:,USERIP:,WATCH:,WHOIS:1,WHOWAS:1 TOPICLEN=360 UHNAMES USERIP WALLCHOPS WATCH=128 :are supported by this server",
  235. ":irc.red-green.com 005 %s WATCHOPTS=A WHOX :are supported by this server",
  236. ":irc.red-green.com 375 %s :- irc.red-green.com Message of the Day -",
  237. ":irc.red-green.com 372 %s :- ",
  238. ":irc.red-green.com 376 %s :End of /MOTD command.",
  239. } {
  240. output = fmt.Sprintf(line, config.Nick)
  241. ircWrite(server, output, t)
  242. }
  243. if config.UseSASL {
  244. if !successSASL {
  245. log.Println("Failed SASL Authentication.")
  246. }
  247. }
  248. // part 2: nickserv/register (if not already registered with SASL)
  249. var part2 bool
  250. if successSASL {
  251. ircWrite(server, fmt.Sprintf(":NickServ MODE %s :+r", config.Nick), t)
  252. part2 = true
  253. } else {
  254. if config.Password != "" {
  255. for _, line = range []string{":[email protected] NOTICE %s :This nickname is registered and protected. If it is your",
  256. ":[email protected] NOTICE %s :nick, type \x02/msg NickServ IDENTIFY \x1fpassword\x1f\x02. Otherwise,"} {
  257. output = fmt.Sprintf(line, config.Nick)
  258. ircWrite(server, output, t)
  259. }
  260. } else {
  261. // No password, so we can't register. Skip this part.
  262. part2 = true
  263. }
  264. }
  265. for !part2 {
  266. line, err = reader.ReadString('\n')
  267. if err == nil {
  268. line = strings.Trim(line, "\r\n")
  269. // process the received line here
  270. parts = strings.Split(line, " ")
  271. t.Logf("<< %s", line)
  272. switch parts[0] {
  273. case "NS":
  274. expect = fmt.Sprintf("NS IDENTIFY %s", config.Password)
  275. if expect != line {
  276. t.Errorf("Got %s, Expected %s", line, expect)
  277. }
  278. // ok, mark the user as registered
  279. output = fmt.Sprintf(":[email protected] NOTICE %s :Password accepted - you are now recognized.",
  280. config.Nick)
  281. ircWrite(server, output, t)
  282. output = fmt.Sprintf(":NickServ MODE %s :+r", config.Nick)
  283. ircWrite(server, output, t)
  284. part2 = true
  285. }
  286. } else {
  287. t.Error("Read Error:", err)
  288. server.Close()
  289. return
  290. }
  291. }
  292. if !part2 {
  293. t.Error("Expected to pass part2 (ns identify/+r)")
  294. }
  295. time.AfterFunc(time.Millisecond*time.Duration(abortAfter), func() { server.Close() })
  296. t.Log("Ok, Identified...")
  297. var Kicked bool
  298. for {
  299. line, err = reader.ReadString('\n')
  300. if err == nil {
  301. line = strings.Trim(line, "\r\n")
  302. // process the received line here
  303. parts = strings.Split(line, " ")
  304. t.Logf("<< %s", line)
  305. switch parts[0] {
  306. case "JOIN":
  307. for _, channel := range strings.Split(parts[1], ",") {
  308. output = fmt.Sprintf(":%s JOIN :%s", config.MyNick, channel)
  309. ircWrite(server, output, t)
  310. output = fmt.Sprintf(":irc.server 332 %s %s :Topic for (%s)", config.MyNick, channel, channel)
  311. ircWrite(server, output, t)
  312. output = fmt.Sprintf(":irc.server 333 %s %s user %d", config.MyNick, channel, time.Now().Unix())
  313. ircWrite(server, output, t)
  314. if strings.Contains(channel, "kick") {
  315. if !Kicked {
  316. Kicked = true
  317. output = fmt.Sprintf("user KICK %s %s :Get out", channel, config.MyNick)
  318. ircWrite(server, output, t)
  319. }
  320. }
  321. }
  322. }
  323. switch parts[0] {
  324. case "PRIVMSG", "NOTICE":
  325. if parts[1] == "echo" {
  326. parts[2] = parts[2][1:]
  327. // echo user, return whatever was sent back to them.
  328. output = fmt.Sprintf(":%s %s %s :%s", "echo", parts[0], config.MyNick, strings.Join(parts[2:], " "))
  329. ircWrite(server, output, t)
  330. }
  331. if strings.Contains(parts[1], "missing") {
  332. // Sending to missing user or channel.
  333. var number int
  334. if strings.Contains(parts[1], "#") {
  335. number = 404
  336. } else {
  337. number = 401
  338. }
  339. output = fmt.Sprintf(":irc.red-green.com %d %s %s :No such nick/channel", number, config.GetNick(), parts[1])
  340. ircWrite(server, output, t)
  341. }
  342. case "NICK":
  343. output = fmt.Sprintf(":%s NICK :%s", config.MyNick, parts[1])
  344. ircWrite(server, output, t)
  345. case "QUIT":
  346. output = fmt.Sprintf("ERROR: Closing link:%s", config.MyNick)
  347. ircWrite(server, output, t)
  348. server.Close()
  349. }
  350. } else {
  351. t.Log("Read Error:", err)
  352. return
  353. }
  354. }
  355. }