client_test.go 16 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631
  1. package ircclient
  2. import (
  3. "bufio"
  4. "crypto/ecdsa"
  5. "crypto/elliptic"
  6. "crypto/rand"
  7. "crypto/tls"
  8. "crypto/x509"
  9. "crypto/x509/pkix"
  10. "encoding/base64"
  11. "encoding/pem"
  12. "fmt"
  13. "log"
  14. "math/big"
  15. rnd "math/rand"
  16. "net"
  17. "strconv"
  18. "strings"
  19. "testing"
  20. "time"
  21. )
  22. func setupSocket() (listen net.Listener, addr string) {
  23. // establish network socket connection to set Comm_handle
  24. var err error
  25. var listener net.Listener
  26. var address string
  27. listener, err = net.Listen("tcp", "127.0.0.1:0")
  28. if err != nil {
  29. panic(err)
  30. }
  31. // I only need address for making the connection.
  32. // Get address of listening socket
  33. address = listener.Addr().String()
  34. return listener, address
  35. }
  36. func generateKeyPair() (keypair tls.Certificate) {
  37. // generate test certificate
  38. priv, _ := ecdsa.GenerateKey(elliptic.P521(), rand.Reader)
  39. durationBefore, _ := time.ParseDuration("-1h")
  40. notBefore := time.Now().Add(durationBefore)
  41. durationAfter, _ := time.ParseDuration("1h")
  42. notAfter := time.Now().Add(durationAfter)
  43. serialNumberLimit := new(big.Int).Lsh(big.NewInt(1), 64)
  44. serialNumber, _ := rand.Int(rand.Reader, serialNumberLimit)
  45. template := x509.Certificate{
  46. SerialNumber: serialNumber,
  47. Subject: pkix.Name{
  48. Organization: []string{"Test Certificate"},
  49. },
  50. NotBefore: notBefore,
  51. NotAfter: notAfter,
  52. KeyUsage: x509.KeyUsageKeyEncipherment | x509.KeyUsageDigitalSignature | x509.KeyUsageCertSign,
  53. ExtKeyUsage: []x509.ExtKeyUsage{x509.ExtKeyUsageServerAuth},
  54. BasicConstraintsValid: true,
  55. IsCA: true,
  56. }
  57. template.IPAddresses = append(template.IPAddresses, net.ParseIP("127.0.0.1"))
  58. template.IPAddresses = append(template.IPAddresses, net.ParseIP("::"))
  59. derBytes, _ := x509.CreateCertificate(rand.Reader, &template, &template, &priv.PublicKey, priv)
  60. c := pem.EncodeToMemory(&pem.Block{Type: "CERTIFICATE", Bytes: derBytes})
  61. b, _ := x509.MarshalECPrivateKey(priv)
  62. k := pem.EncodeToMemory(&pem.Block{Type: "EC PRIVATE KEY", Bytes: b})
  63. listenerKeyPair, _ := tls.X509KeyPair(c, k)
  64. return listenerKeyPair
  65. }
  66. func setupTLSSocket() (listen net.Listener, addr string) {
  67. // establish network socket connection to set Comm_handle
  68. var err error
  69. var listener net.Listener
  70. var address string
  71. var tlsconfig tls.Config
  72. var keypair tls.Certificate = generateKeyPair()
  73. tlsconfig.Certificates = make([]tls.Certificate, 0)
  74. tlsconfig.Certificates = append(tlsconfig.Certificates, keypair)
  75. listener, err = tls.Listen("tcp", "127.0.0.1:0", &tlsconfig)
  76. if err != nil {
  77. panic(err)
  78. }
  79. // I only need address for making the connection.
  80. // Get address of listening socket
  81. address = listener.Addr().String()
  82. return listener, address
  83. }
  84. func ircWrite(server net.Conn, output string, t *testing.T) {
  85. t.Logf(">> %s\n", output)
  86. server.Write([]byte(output + "\r\n"))
  87. }
  88. var abortAfter int = 150 // Milliseconds to abort part 3
  89. // mock up an irc server
  90. func ircServer(listener net.Listener, t *testing.T, config *IRCConfig) {
  91. var server net.Conn
  92. var err error
  93. server, err = listener.Accept()
  94. if err != nil {
  95. t.Error("Failed to accept connection.")
  96. return
  97. }
  98. listener.Close()
  99. var reader *bufio.Reader = bufio.NewReader(server)
  100. var output, line, expect string
  101. var ping int64 = rnd.Int63()
  102. output = fmt.Sprintf("PING :%X", ping)
  103. ircWrite(server, output, t)
  104. var parts []string
  105. var hasNick, hasUser, hasPing, hasPass bool
  106. var capSASL, successSASL bool
  107. var part1 bool
  108. // part 1 : User, Nick, ServerPass and Ping reply
  109. for !part1 {
  110. line, err = reader.ReadString('\n')
  111. if err == nil {
  112. line = strings.Trim(line, "\r\n")
  113. // process the received line here
  114. parts = strings.Split(line, " ")
  115. t.Logf("<< %s", line)
  116. switch parts[0] {
  117. case "CAP":
  118. if config.UseTLS && config.UseSASL {
  119. if line == "CAP REQ :sasl" {
  120. // Acknowledge we support SASL
  121. ircWrite(server, ":irc.red-green.com CAP * ACK :sasl", t)
  122. capSASL = true
  123. }
  124. if line == "CAP END" {
  125. capSASL = true
  126. if successSASL {
  127. part1 = true
  128. }
  129. }
  130. }
  131. case "AUTHENTICATE":
  132. if capSASL {
  133. if line == "AUTHENTICATE PLAIN" {
  134. ircWrite(server, "AUTHENTICATE +", t)
  135. } else {
  136. // Process SASL auth message
  137. var auth64 string = parts[1]
  138. byteauth, _ := base64.StdEncoding.DecodeString(auth64)
  139. var auth string = string(byteauth)
  140. auth = strings.ReplaceAll(auth, "\x00", " ")
  141. t.Log(auth)
  142. expect = fmt.Sprintf(" %s %s", config.Nick, config.Password)
  143. if expect != auth {
  144. t.Errorf("Got %s, Expected %s", auth, expect)
  145. ircWrite(server, fmt.Sprintf(":irc.red-green.com 904 %s :SASL authentication failed",
  146. config.Nick), t)
  147. } else {
  148. // Success!
  149. ircWrite(server, fmt.Sprintf(":irc.red-green.com 900 %s %s!%[email protected] %s :You are now logged in as %s.",
  150. config.Nick, config.Nick, config.Username, config.Nick, config.Nick), t)
  151. ircWrite(server, fmt.Sprintf(":irc.red-green.com 903 %s :SASL authentication successful",
  152. config.Nick), t)
  153. successSASL = true
  154. }
  155. }
  156. }
  157. case "PASS":
  158. expect = fmt.Sprintf("PASS %s", config.ServerPassword)
  159. if expect != line {
  160. t.Errorf("Got %s, Expected %s", line, expect)
  161. } else {
  162. hasPass = true
  163. }
  164. case "NICK":
  165. expect = fmt.Sprintf("NICK %s", config.MyNick)
  166. if expect != line {
  167. t.Errorf("Got %s, Expected %s", line, expect)
  168. } else {
  169. if config.MyNick == "bad" {
  170. // throw bad nick here
  171. ircWrite(server, fmt.Sprintf(":irc.red-green.com 433 :Nick already in use."), t)
  172. }
  173. hasNick = true
  174. }
  175. case "USER":
  176. // USER meow-bot 0 * :Meooow! bugz is my owner.
  177. expect = fmt.Sprintf("USER %s 0 * :%s", config.Username, config.Realname)
  178. if expect != line {
  179. t.Errorf("Got %s, Expected %s", line, expect)
  180. } else {
  181. hasUser = true
  182. }
  183. case "PONG":
  184. expect = fmt.Sprintf("PONG %X", ping)
  185. if expect != line {
  186. t.Errorf("Got %s, Expected %s", line, expect)
  187. } else {
  188. hasPing = true
  189. }
  190. }
  191. if !part1 {
  192. if !capSASL && hasNick && hasUser && hasPing && ((config.ServerPassword == "") || hasPass) {
  193. part1 = true
  194. }
  195. }
  196. } else {
  197. t.Error("Read Error:", err)
  198. server.Close()
  199. return
  200. }
  201. }
  202. if !part1 {
  203. t.Error("Expected to pass part1 (user/nick/pong)")
  204. }
  205. // Display MOTD
  206. for _, line = range []string{":irc.red-green.com 001 %s :Welcome to the RedGreen IRC Network",
  207. ":irc.red-green.com 002 %s :Your host is irc.red-green.com, running version UnrealIRCd-5.2.0.1",
  208. ":irc.red-green.com 375 %s :- irc.red-green.com Message of the Day -",
  209. ":irc.red-green.com 372 %s :- ",
  210. ":irc.red-green.com 376 %s :End of /MOTD command.",
  211. } {
  212. output = fmt.Sprintf(line, config.Nick)
  213. ircWrite(server, output, t)
  214. }
  215. if config.UseSASL {
  216. if !successSASL {
  217. log.Println("Failed SASL Authentication.")
  218. }
  219. }
  220. // part 2: nickserv/register (if not already registered with SASL)
  221. var part2 bool
  222. if successSASL {
  223. ircWrite(server, fmt.Sprintf(":NickServ MODE %s :+r", config.Nick), t)
  224. part2 = true
  225. } else {
  226. if config.Password != "" {
  227. for _, line = range []string{":[email protected] NOTICE %s :This nickname is registered and protected. If it is your",
  228. ":[email protected] NOTICE %s :nick, type \x02/msg NickServ IDENTIFY \x1fpassword\x1f\x02. Otherwise,"} {
  229. output = fmt.Sprintf(line, config.Nick)
  230. ircWrite(server, output, t)
  231. }
  232. } else {
  233. // No password, so we can't register. Skip this part.
  234. part2 = true
  235. }
  236. }
  237. for !part2 {
  238. line, err = reader.ReadString('\n')
  239. if err == nil {
  240. line = strings.Trim(line, "\r\n")
  241. // process the received line here
  242. parts = strings.Split(line, " ")
  243. t.Logf("<< %s", line)
  244. switch parts[0] {
  245. case "NS":
  246. expect = fmt.Sprintf("NS IDENTIFY %s", config.Password)
  247. if expect != line {
  248. t.Errorf("Got %s, Expected %s", line, expect)
  249. }
  250. // ok, mark the user as registered
  251. output = fmt.Sprintf(":[email protected] NOTICE %s :Password accepted - you are now recognized.",
  252. config.Nick)
  253. ircWrite(server, output, t)
  254. output = fmt.Sprintf(":NickServ MODE %s :+r", config.Nick)
  255. ircWrite(server, output, t)
  256. part2 = true
  257. }
  258. } else {
  259. t.Error("Read Error:", err)
  260. server.Close()
  261. return
  262. }
  263. }
  264. if !part2 {
  265. t.Error("Expected to pass part2 (ns identify/+r)")
  266. }
  267. time.AfterFunc(time.Millisecond*time.Duration(abortAfter), func() { server.Close() })
  268. t.Log("Ok, Identified...")
  269. for {
  270. line, err = reader.ReadString('\n')
  271. if err == nil {
  272. line = strings.Trim(line, "\r\n")
  273. // process the received line here
  274. parts = strings.Split(line, " ")
  275. t.Logf("<< %s", line)
  276. switch parts[0] {
  277. case "JOIN":
  278. for _, channel := range strings.Split(parts[1], ",") {
  279. output = fmt.Sprintf(":%s JOIN :%s", config.MyNick, channel)
  280. ircWrite(server, output, t)
  281. output = fmt.Sprintf(":irc.server 332 %s %s :Topic for (%s)", config.MyNick, channel, channel)
  282. ircWrite(server, output, t)
  283. output = fmt.Sprintf(":irc.server 333 %s %s user %d", config.MyNick, channel, time.Now().Unix())
  284. ircWrite(server, output, t)
  285. }
  286. }
  287. switch parts[0] {
  288. case "PRIVMSG", "NOTICE":
  289. if parts[1] == "echo" {
  290. parts[2] = parts[2][1:]
  291. // echo user, return whatever was sent back to them.
  292. output = fmt.Sprintf(":%s %s %s :%s", "echo", parts[0], config.MyNick, strings.Join(parts[2:], " "))
  293. ircWrite(server, output, t)
  294. }
  295. if strings.Contains(parts[1], "missing") {
  296. // Sending to missing user or channel.
  297. var number int
  298. if strings.Contains(parts[1], "#") {
  299. number = 404
  300. } else {
  301. number = 401
  302. }
  303. output = fmt.Sprintf(":irc.red-green.com %d %s %s :No such nick/channel", number, config.MyNick, parts[1])
  304. ircWrite(server, output, t)
  305. }
  306. }
  307. } else {
  308. t.Log("Read Error:", err)
  309. return
  310. }
  311. }
  312. }
  313. func TestConnect(t *testing.T) {
  314. var config IRCConfig = IRCConfig{Nick: "test",
  315. Username: "test",
  316. Realname: "testing",
  317. Password: "12345",
  318. ServerPassword: "allow"}
  319. var listen net.Listener
  320. var address string
  321. listen, address = setupSocket()
  322. var parts []string = strings.Split(address, ":")
  323. config.Hostname = parts[0]
  324. config.Port, _ = strconv.Atoi(parts[1])
  325. go ircServer(listen, t, &config)
  326. var FromIRC chan IRCMsg
  327. FromIRC = make(chan IRCMsg)
  328. config.ReadChannel = FromIRC
  329. config.Connect()
  330. defer config.Close()
  331. var Msg IRCMsg
  332. var motd, identify bool
  333. for Msg = range FromIRC {
  334. if Msg.Cmd == "EndMOTD" {
  335. t.Log("Got EndMOTD")
  336. motd = true
  337. }
  338. if Msg.Cmd == "Identified" {
  339. t.Log("Identified")
  340. identify = true
  341. }
  342. }
  343. if !motd {
  344. t.Error("Missing EndMOTD")
  345. }
  346. if !identify {
  347. t.Error("Missing Identified")
  348. }
  349. if config.MyNick != config.Nick {
  350. t.Errorf("Got %s, Expected %s", config.MyNick, config.Nick)
  351. }
  352. }
  353. func TestConnectNickInUse(t *testing.T) {
  354. var config IRCConfig = IRCConfig{Nick: "bad",
  355. Username: "test",
  356. Realname: "testing",
  357. Flood_Num: 1,
  358. Flood_Delay: 20,
  359. }
  360. var listen net.Listener
  361. var address string
  362. listen, address = setupSocket()
  363. var parts []string = strings.Split(address, ":")
  364. config.Hostname = parts[0]
  365. config.Port, _ = strconv.Atoi(parts[1])
  366. go ircServer(listen, t, &config)
  367. var FromIRC chan IRCMsg
  368. FromIRC = make(chan IRCMsg)
  369. config.ReadChannel = FromIRC
  370. config.Connect()
  371. defer config.Close()
  372. var Msg IRCMsg
  373. var motd, identify bool
  374. var missing int
  375. for Msg = range FromIRC {
  376. if Msg.Cmd == "EndMOTD" {
  377. t.Log("Got EndMOTD")
  378. motd = true
  379. config.WriteTo("missing", "PRIVMSG missing :Missing user")
  380. config.WriteTo("missing", "PRIVMSG missing :Missing user")
  381. config.WriteTo("missing", "PRIVMSG missing :Missing user")
  382. config.WriteTo("#missing", "PRIVMSG #missing :Missing channel")
  383. }
  384. if Msg.Cmd == "Identified" {
  385. t.Log("Identified")
  386. identify = true
  387. }
  388. if Msg.Cmd == "404" || Msg.Cmd == "401" {
  389. missing++
  390. }
  391. }
  392. if !motd {
  393. t.Error("Missing EndMOTD")
  394. }
  395. if identify {
  396. t.Error("Should not have been Identified")
  397. }
  398. if missing < 2 {
  399. t.Errorf("Missing should have been 2, was %d", missing)
  400. }
  401. if config.MyNick == config.Nick {
  402. t.Errorf("Nick should be different: Got %s, Didn't Expect %s", config.MyNick, config.Nick)
  403. }
  404. }
  405. func TestConnectTLS(t *testing.T) {
  406. var config IRCConfig = IRCConfig{Nick: "test",
  407. Username: "test",
  408. Realname: "testing",
  409. Password: "12345",
  410. UseTLS: true,
  411. UseSASL: true,
  412. Insecure: true,
  413. ServerPassword: "allow"}
  414. var listen net.Listener
  415. var address string
  416. listen, address = setupTLSSocket()
  417. var parts []string = strings.Split(address, ":")
  418. config.Hostname = parts[0]
  419. config.Port, _ = strconv.Atoi(parts[1])
  420. go ircServer(listen, t, &config)
  421. var FromIRC chan IRCMsg
  422. FromIRC = make(chan IRCMsg)
  423. config.ReadChannel = FromIRC
  424. config.Connect()
  425. defer config.Close()
  426. var Msg IRCMsg
  427. var motd, identify bool
  428. for Msg = range FromIRC {
  429. if Msg.Cmd == "EndMOTD" {
  430. t.Log("Got EndMOTD")
  431. motd = true
  432. }
  433. if Msg.Cmd == "Identified" {
  434. t.Log("Identified")
  435. identify = true
  436. }
  437. }
  438. if !motd {
  439. t.Error("Missing EndMOTD")
  440. }
  441. if !identify {
  442. t.Error("Missing Identified")
  443. }
  444. if config.MyNick != config.Nick {
  445. t.Errorf("Got %s, Expected %s", config.MyNick, config.Nick)
  446. }
  447. }
  448. func TestConnectAutojoin(t *testing.T) {
  449. var config IRCConfig = IRCConfig{Nick: "test",
  450. Username: "test",
  451. Realname: "testing",
  452. Password: "12345",
  453. UseTLS: true,
  454. UseSASL: true,
  455. Insecure: true,
  456. AutoJoin: []string{"#chat", "#test"},
  457. Flood_Num: 2,
  458. Flood_Delay: 10,
  459. }
  460. var listen net.Listener
  461. var address string
  462. listen, address = setupTLSSocket()
  463. var parts []string = strings.Split(address, ":")
  464. config.Hostname = parts[0]
  465. config.Port, _ = strconv.Atoi(parts[1])
  466. go ircServer(listen, t, &config)
  467. var FromIRC chan IRCMsg
  468. FromIRC = make(chan IRCMsg)
  469. config.ReadChannel = FromIRC
  470. config.Connect()
  471. defer config.Close()
  472. var Msg IRCMsg
  473. var motd, identify bool
  474. var joins int
  475. var expect string
  476. var ctcpExpect []string = []string{"VERSION",
  477. "TIME",
  478. "PING 12345",
  479. }
  480. var noticeExpect []string = []string{"Testing",
  481. "VERSION red-green.com/irc-client",
  482. "TIME ",
  483. "PING 12345",
  484. }
  485. for Msg = range FromIRC {
  486. /*
  487. if (Msg.Cmd == "ACTION") || (Msg.Cmd == "NOTICE") {
  488. t.Log(Msg)
  489. }
  490. */
  491. if Msg.Cmd == "EndMOTD" {
  492. t.Log("Got EndMOTD")
  493. motd = true
  494. }
  495. if Msg.Cmd == "Identified" {
  496. t.Log("Identified")
  497. identify = true
  498. }
  499. if Msg.Cmd == "JOIN" {
  500. joins++
  501. if joins == 2 {
  502. // messages set to echo are returned to us
  503. config.WriteTo("echo", "PRIVMSG echo :\x01VERSION\x01")
  504. config.WriteTo("echo", "PRIVMSG echo :\x01TIME\x01")
  505. config.WriteTo("echo", "PRIVMSG echo :\x01PING 12345\x01")
  506. config.Action("echo", "dances.")
  507. config.Notice("echo", "Testing")
  508. config.Msg("#test", "Message 1")
  509. config.Msg("#test", "Message 2")
  510. }
  511. }
  512. if Msg.Cmd == "CTCP" {
  513. expect = ctcpExpect[0]
  514. ctcpExpect = ctcpExpect[1:]
  515. if Msg.Msg != expect {
  516. t.Errorf("CTCP Got %s, Expected %s", Msg.Msg, expect)
  517. }
  518. }
  519. if Msg.Cmd == "NOTICE" {
  520. expect = noticeExpect[0]
  521. if expect != "Testing" {
  522. expect = "\x01" + expect
  523. }
  524. noticeExpect = noticeExpect[1:]
  525. if !strings.HasPrefix(Msg.Msg, expect) {
  526. t.Errorf("NOTICE Got [%s], Expected [%s]", Msg.Msg, expect)
  527. }
  528. }
  529. if Msg.Cmd == "ACTION" {
  530. expect = "dances."
  531. if Msg.Msg != expect {
  532. t.Errorf("ACTION Got %s, Expected %s", Msg.Msg, expect)
  533. }
  534. }
  535. }
  536. if joins != 2 {
  537. t.Errorf("Expected to autojoin 2 channels, got %d", joins)
  538. }
  539. if !motd {
  540. t.Error("Missing EndMOTD")
  541. }
  542. if !identify {
  543. t.Error("Missing Identified")
  544. }
  545. if len(noticeExpect) != 0 {
  546. t.Errorf("Expected more NOTICEs (%d)", len(noticeExpect))
  547. }
  548. if len(ctcpExpect) != 0 {
  549. t.Errorf("Expected more CTCPs (%d)", len(ctcpExpect))
  550. }
  551. if config.MyNick != config.Nick {
  552. t.Errorf("Got %s, Expected %s", config.MyNick, config.Nick)
  553. }
  554. }