ircd_test.go 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393
  1. package ircclient
  2. import (
  3. "bufio"
  4. "crypto/ecdsa"
  5. "crypto/elliptic"
  6. "crypto/rand"
  7. "crypto/tls"
  8. "crypto/x509"
  9. "crypto/x509/pkix"
  10. "encoding/base64"
  11. "encoding/pem"
  12. "fmt"
  13. "log"
  14. "math/big"
  15. rnd "math/rand"
  16. "net"
  17. "strings"
  18. "testing"
  19. "time"
  20. )
  21. func setupSocket() (listen net.Listener, addr string) {
  22. // establish network socket connection to set Comm_handle
  23. var err error
  24. var listener net.Listener
  25. var address string
  26. listener, err = net.Listen("tcp", "127.0.0.1:0")
  27. if err != nil {
  28. panic(err)
  29. }
  30. // I only need address for making the connection.
  31. // Get address of listening socket
  32. address = listener.Addr().String()
  33. return listener, address
  34. }
  35. var KeyPair tls.Certificate
  36. var HasKeyPair bool
  37. func GenerateKeyPair() (keypair tls.Certificate) {
  38. if !HasKeyPair {
  39. KeyPair = generateKeyPair()
  40. HasKeyPair = true
  41. }
  42. return KeyPair
  43. }
  44. func generateKeyPair() (keypair tls.Certificate) {
  45. // generate test certificate
  46. priv, _ := ecdsa.GenerateKey(elliptic.P521(), rand.Reader)
  47. durationBefore, _ := time.ParseDuration("-1h")
  48. notBefore := time.Now().Add(durationBefore)
  49. durationAfter, _ := time.ParseDuration("1h")
  50. notAfter := time.Now().Add(durationAfter)
  51. serialNumberLimit := new(big.Int).Lsh(big.NewInt(1), 64)
  52. serialNumber, _ := rand.Int(rand.Reader, serialNumberLimit)
  53. template := x509.Certificate{
  54. SerialNumber: serialNumber,
  55. Subject: pkix.Name{
  56. Organization: []string{"Test Certificate"},
  57. },
  58. NotBefore: notBefore,
  59. NotAfter: notAfter,
  60. KeyUsage: x509.KeyUsageKeyEncipherment | x509.KeyUsageDigitalSignature | x509.KeyUsageCertSign,
  61. ExtKeyUsage: []x509.ExtKeyUsage{x509.ExtKeyUsageServerAuth},
  62. BasicConstraintsValid: true,
  63. IsCA: true,
  64. }
  65. template.IPAddresses = append(template.IPAddresses, net.ParseIP("127.0.0.1"))
  66. template.IPAddresses = append(template.IPAddresses, net.ParseIP("::"))
  67. derBytes, _ := x509.CreateCertificate(rand.Reader, &template, &template, &priv.PublicKey, priv)
  68. c := pem.EncodeToMemory(&pem.Block{Type: "CERTIFICATE", Bytes: derBytes})
  69. b, _ := x509.MarshalECPrivateKey(priv)
  70. k := pem.EncodeToMemory(&pem.Block{Type: "EC PRIVATE KEY", Bytes: b})
  71. listenerKeyPair, _ := tls.X509KeyPair(c, k)
  72. return listenerKeyPair
  73. }
  74. func setupTLSSocket() (listen net.Listener, addr string) {
  75. // establish network socket connection to set Comm_handle
  76. var err error
  77. var listener net.Listener
  78. var address string
  79. var tlsconfig tls.Config
  80. var keypair tls.Certificate = GenerateKeyPair()
  81. tlsconfig.Certificates = make([]tls.Certificate, 0)
  82. tlsconfig.Certificates = append(tlsconfig.Certificates, keypair)
  83. listener, err = tls.Listen("tcp", "127.0.0.1:0", &tlsconfig)
  84. if err != nil {
  85. panic(err)
  86. }
  87. // I only need address for making the connection.
  88. // Get address of listening socket
  89. address = listener.Addr().String()
  90. return listener, address
  91. }
  92. func ircWrite(server net.Conn, output string, t *testing.T) {
  93. t.Logf(">> %s\n", output)
  94. server.Write([]byte(output + "\r\n"))
  95. }
  96. var abortAfter int = 150 // Milliseconds to abort part 3
  97. /*
  98. mock up an irc server
  99. part 1 : nick, user
  100. part 2 : identify to services (if not SASL/SASL failed)
  101. part 3 : quit after abortAfter ms
  102. Features:
  103. if nick == "bad", return 443 Nick already in use.
  104. JOIN #kick, kicks once from the channel.
  105. SASL authentication testing.
  106. TLS support, we make our own certificates.
  107. Any messages sent to "echo" are reflected back to the client.
  108. Any messages to missing/#missing are returned 404/401.
  109. */
  110. func ircServer(listener net.Listener, t *testing.T, config *IRCConfig) {
  111. var server net.Conn
  112. var err error
  113. server, err = listener.Accept()
  114. if err != nil {
  115. t.Error("Failed to accept connection.")
  116. return
  117. }
  118. listener.Close()
  119. var reader *bufio.Reader = bufio.NewReader(server)
  120. var output, line, expect string
  121. var ping int64 = rnd.Int63()
  122. output = fmt.Sprintf("PING :%X", ping)
  123. ircWrite(server, output, t)
  124. var parts []string
  125. var hasNick, hasUser, hasPing, hasPass bool
  126. var capSASL, successSASL bool
  127. var part1 bool
  128. // part 1 : User, Nick, ServerPass and Ping reply
  129. for !part1 {
  130. line, err = reader.ReadString('\n')
  131. if err == nil {
  132. line = strings.Trim(line, "\r\n")
  133. // process the received line here
  134. parts = strings.Split(line, " ")
  135. t.Logf("<< %s", line)
  136. switch parts[0] {
  137. case "CAP":
  138. if config.UseTLS && config.UseSASL {
  139. if line == "CAP REQ :sasl" {
  140. // Acknowledge we support SASL
  141. ircWrite(server, ":irc.red-green.com CAP * ACK :sasl", t)
  142. capSASL = true
  143. }
  144. if line == "CAP END" {
  145. capSASL = true
  146. if successSASL {
  147. part1 = true
  148. }
  149. }
  150. }
  151. case "AUTHENTICATE":
  152. if capSASL {
  153. if line == "AUTHENTICATE PLAIN" {
  154. ircWrite(server, "AUTHENTICATE +", t)
  155. } else {
  156. // Process SASL auth message
  157. var auth64 string = parts[1]
  158. byteauth, _ := base64.StdEncoding.DecodeString(auth64)
  159. var auth string = string(byteauth)
  160. auth = strings.ReplaceAll(auth, "\x00", " ")
  161. t.Log(auth)
  162. expect = fmt.Sprintf(" %s %s", config.Nick, config.Password)
  163. if expect != auth {
  164. t.Errorf("Got %s, Expected %s", auth, expect)
  165. ircWrite(server, fmt.Sprintf(":irc.red-green.com 904 %s :SASL authentication failed",
  166. config.Nick), t)
  167. } else {
  168. // Success!
  169. ircWrite(server, fmt.Sprintf(":irc.red-green.com 900 %s %s!%[email protected] %s :You are now logged in as %s.",
  170. config.Nick, config.Nick, config.Username, config.Nick, config.Nick), t)
  171. ircWrite(server, fmt.Sprintf(":irc.red-green.com 903 %s :SASL authentication successful",
  172. config.Nick), t)
  173. successSASL = true
  174. }
  175. }
  176. }
  177. case "PASS":
  178. expect = fmt.Sprintf("PASS %s", config.ServerPassword)
  179. if expect != line {
  180. t.Errorf("Got %s, Expected %s", line, expect)
  181. } else {
  182. hasPass = true
  183. }
  184. case "NICK":
  185. expect = fmt.Sprintf("NICK %s", config.MyNick)
  186. if expect != line {
  187. t.Errorf("Got %s, Expected %s", line, expect)
  188. } else {
  189. if config.MyNick == "bad" {
  190. // throw bad nick here
  191. ircWrite(server, fmt.Sprintf(":irc.red-green.com 433 :Nick already in use."), t)
  192. }
  193. hasNick = true
  194. }
  195. case "USER":
  196. // USER meow-bot 0 * :Meooow! bugz is my owner.
  197. expect = fmt.Sprintf("USER %s 0 * :%s", config.Username, config.Realname)
  198. if expect != line {
  199. t.Errorf("Got %s, Expected %s", line, expect)
  200. } else {
  201. hasUser = true
  202. }
  203. case "PONG":
  204. expect = fmt.Sprintf("PONG %X", ping)
  205. if expect != line {
  206. t.Errorf("Got %s, Expected %s", line, expect)
  207. } else {
  208. hasPing = true
  209. }
  210. }
  211. if !part1 {
  212. if !capSASL && hasNick && hasUser && hasPing && ((config.ServerPassword == "") || hasPass) {
  213. part1 = true
  214. }
  215. }
  216. } else {
  217. t.Error("Read Error:", err)
  218. server.Close()
  219. return
  220. }
  221. }
  222. if !part1 {
  223. t.Error("Expected to pass part1 (user/nick/pong)")
  224. }
  225. // Display MOTD
  226. for _, line = range []string{":irc.red-green.com 001 %s :Welcome to the RedGreen IRC Network",
  227. ":irc.red-green.com 002 %s :Your host is irc.red-green.com, running version UnrealIRCd-5.2.0.1",
  228. ":irc.red-green.com 375 %s :- irc.red-green.com Message of the Day -",
  229. ":irc.red-green.com 372 %s :- ",
  230. ":irc.red-green.com 376 %s :End of /MOTD command.",
  231. } {
  232. output = fmt.Sprintf(line, config.Nick)
  233. ircWrite(server, output, t)
  234. }
  235. if config.UseSASL {
  236. if !successSASL {
  237. log.Println("Failed SASL Authentication.")
  238. }
  239. }
  240. // part 2: nickserv/register (if not already registered with SASL)
  241. var part2 bool
  242. if successSASL {
  243. ircWrite(server, fmt.Sprintf(":NickServ MODE %s :+r", config.Nick), t)
  244. part2 = true
  245. } else {
  246. if config.Password != "" {
  247. for _, line = range []string{":[email protected] NOTICE %s :This nickname is registered and protected. If it is your",
  248. ":[email protected] NOTICE %s :nick, type \x02/msg NickServ IDENTIFY \x1fpassword\x1f\x02. Otherwise,"} {
  249. output = fmt.Sprintf(line, config.Nick)
  250. ircWrite(server, output, t)
  251. }
  252. } else {
  253. // No password, so we can't register. Skip this part.
  254. part2 = true
  255. }
  256. }
  257. for !part2 {
  258. line, err = reader.ReadString('\n')
  259. if err == nil {
  260. line = strings.Trim(line, "\r\n")
  261. // process the received line here
  262. parts = strings.Split(line, " ")
  263. t.Logf("<< %s", line)
  264. switch parts[0] {
  265. case "NS":
  266. expect = fmt.Sprintf("NS IDENTIFY %s", config.Password)
  267. if expect != line {
  268. t.Errorf("Got %s, Expected %s", line, expect)
  269. }
  270. // ok, mark the user as registered
  271. output = fmt.Sprintf(":[email protected] NOTICE %s :Password accepted - you are now recognized.",
  272. config.Nick)
  273. ircWrite(server, output, t)
  274. output = fmt.Sprintf(":NickServ MODE %s :+r", config.Nick)
  275. ircWrite(server, output, t)
  276. part2 = true
  277. }
  278. } else {
  279. t.Error("Read Error:", err)
  280. server.Close()
  281. return
  282. }
  283. }
  284. if !part2 {
  285. t.Error("Expected to pass part2 (ns identify/+r)")
  286. }
  287. time.AfterFunc(time.Millisecond*time.Duration(abortAfter), func() { server.Close() })
  288. t.Log("Ok, Identified...")
  289. var Kicked bool
  290. for {
  291. line, err = reader.ReadString('\n')
  292. if err == nil {
  293. line = strings.Trim(line, "\r\n")
  294. // process the received line here
  295. parts = strings.Split(line, " ")
  296. t.Logf("<< %s", line)
  297. switch parts[0] {
  298. case "JOIN":
  299. for _, channel := range strings.Split(parts[1], ",") {
  300. output = fmt.Sprintf(":%s JOIN :%s", config.MyNick, channel)
  301. ircWrite(server, output, t)
  302. output = fmt.Sprintf(":irc.server 332 %s %s :Topic for (%s)", config.MyNick, channel, channel)
  303. ircWrite(server, output, t)
  304. output = fmt.Sprintf(":irc.server 333 %s %s user %d", config.MyNick, channel, time.Now().Unix())
  305. ircWrite(server, output, t)
  306. if strings.Contains(channel, "kick") {
  307. if !Kicked {
  308. Kicked = true
  309. output = fmt.Sprintf("user KICK %s %s :Get out", channel, config.MyNick)
  310. ircWrite(server, output, t)
  311. }
  312. }
  313. }
  314. }
  315. switch parts[0] {
  316. case "PRIVMSG", "NOTICE":
  317. if parts[1] == "echo" {
  318. parts[2] = parts[2][1:]
  319. // echo user, return whatever was sent back to them.
  320. output = fmt.Sprintf(":%s %s %s :%s", "echo", parts[0], config.MyNick, strings.Join(parts[2:], " "))
  321. ircWrite(server, output, t)
  322. }
  323. if strings.Contains(parts[1], "missing") {
  324. // Sending to missing user or channel.
  325. var number int
  326. if strings.Contains(parts[1], "#") {
  327. number = 404
  328. } else {
  329. number = 401
  330. }
  331. output = fmt.Sprintf(":irc.red-green.com %d %s %s :No such nick/channel", number, config.MyNick, parts[1])
  332. ircWrite(server, output, t)
  333. }
  334. case "NICK":
  335. output = fmt.Sprintf(":%s NICK :%s", config.MyNick, parts[1])
  336. ircWrite(server, output, t)
  337. case "QUIT":
  338. output = fmt.Sprintf("ERROR: Closing link:%s", config.MyNick)
  339. ircWrite(server, output, t)
  340. server.Close()
  341. }
  342. } else {
  343. t.Log("Read Error:", err)
  344. return
  345. }
  346. }
  347. }