ircd_test.go 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404
  1. package ircclient
  2. import (
  3. "bufio"
  4. "crypto/ecdsa"
  5. "crypto/elliptic"
  6. "crypto/rand"
  7. "crypto/tls"
  8. "crypto/x509"
  9. "crypto/x509/pkix"
  10. "encoding/base64"
  11. "encoding/pem"
  12. "fmt"
  13. "log"
  14. "math/big"
  15. rnd "math/rand"
  16. "net"
  17. "strings"
  18. "testing"
  19. "time"
  20. )
  21. // Reuse the KeyPair tls.Certificate, it is valid for 1h
  22. var KeyPair tls.Certificate
  23. var HasKeyPair bool
  24. func GenerateKeyPair() (keypair tls.Certificate) {
  25. if !HasKeyPair {
  26. KeyPair = generateKeyPair()
  27. HasKeyPair = true
  28. }
  29. return KeyPair
  30. }
  31. func generateKeyPair() (keypair tls.Certificate) {
  32. // generate test certificate
  33. priv, _ := ecdsa.GenerateKey(elliptic.P521(), rand.Reader)
  34. durationBefore, _ := time.ParseDuration("-1h")
  35. notBefore := time.Now().Add(durationBefore)
  36. durationAfter, _ := time.ParseDuration("1h")
  37. notAfter := time.Now().Add(durationAfter)
  38. serialNumberLimit := new(big.Int).Lsh(big.NewInt(1), 64)
  39. serialNumber, _ := rand.Int(rand.Reader, serialNumberLimit)
  40. template := x509.Certificate{
  41. SerialNumber: serialNumber,
  42. Subject: pkix.Name{
  43. Organization: []string{"Test Certificate"},
  44. },
  45. NotBefore: notBefore,
  46. NotAfter: notAfter,
  47. KeyUsage: x509.KeyUsageKeyEncipherment | x509.KeyUsageDigitalSignature | x509.KeyUsageCertSign,
  48. ExtKeyUsage: []x509.ExtKeyUsage{x509.ExtKeyUsageServerAuth},
  49. BasicConstraintsValid: true,
  50. IsCA: true,
  51. }
  52. template.IPAddresses = append(template.IPAddresses, net.ParseIP("127.0.0.1"))
  53. template.IPAddresses = append(template.IPAddresses, net.ParseIP("::"))
  54. derBytes, _ := x509.CreateCertificate(rand.Reader, &template, &template, &priv.PublicKey, priv)
  55. c := pem.EncodeToMemory(&pem.Block{Type: "CERTIFICATE", Bytes: derBytes})
  56. b, _ := x509.MarshalECPrivateKey(priv)
  57. k := pem.EncodeToMemory(&pem.Block{Type: "EC PRIVATE KEY", Bytes: b})
  58. listenerKeyPair, _ := tls.X509KeyPair(c, k)
  59. return listenerKeyPair
  60. }
  61. func setupTLSSocket() (listen net.Listener, addr string) {
  62. // establish network socket connection to set Comm_handle
  63. var err error
  64. var listener net.Listener
  65. var address string
  66. var tlsconfig tls.Config
  67. var keypair tls.Certificate = GenerateKeyPair()
  68. tlsconfig.Certificates = make([]tls.Certificate, 0)
  69. tlsconfig.Certificates = append(tlsconfig.Certificates, keypair)
  70. listener, err = tls.Listen("tcp", "127.0.0.1:0", &tlsconfig)
  71. if err != nil {
  72. panic(err)
  73. }
  74. // I only need address for making the connection.
  75. // Get address of listening socket
  76. address = listener.Addr().String()
  77. return listener, address
  78. }
  79. func setupSocket() (listen net.Listener, addr string) {
  80. // establish network socket connection to set Comm_handle
  81. var err error
  82. var listener net.Listener
  83. var address string
  84. listener, err = net.Listen("tcp", "127.0.0.1:0")
  85. if err != nil {
  86. panic(err)
  87. }
  88. // I only need address for making the connection.
  89. // Get address of listening socket
  90. address = listener.Addr().String()
  91. return listener, address
  92. }
  93. func ircWrite(server net.Conn, output string, t *testing.T) {
  94. t.Logf(">> %s\n", output)
  95. _, err := server.Write([]byte(output + "\r\n"))
  96. if err != nil {
  97. t.Error("server.Write:", err)
  98. }
  99. }
  100. var abortAfter int = 150 // Milliseconds to abort part 3
  101. /*
  102. mock up an irc server
  103. part 1 : nick, user
  104. part 2 : identify to services (if not SASL/SASL failed)
  105. part 3 : quit after abortAfter ms
  106. Features:
  107. if nick == "bad", return 443 Nick already in use.
  108. JOIN #kick, kicks once from the channel.
  109. SASL authentication testing.
  110. TLS support, we make our own certificates. See generateKeyPair()
  111. Any messages sent to "echo" are reflected back to the client.
  112. Any messages to missing/#missing are returned 404/401.
  113. After abortAfter milliseconds, we close the connection.
  114. */
  115. func ircServer(listener net.Listener, t *testing.T, config *IRCClient) {
  116. var server net.Conn
  117. var err error
  118. server, err = listener.Accept()
  119. if err != nil {
  120. t.Error("Failed to accept connection.")
  121. return
  122. }
  123. listener.Close()
  124. var reader *bufio.Reader = bufio.NewReader(server)
  125. var output, line, expect string
  126. var ping int64 = rnd.Int63()
  127. output = fmt.Sprintf("PING :%X", ping)
  128. ircWrite(server, output, t)
  129. var parts []string
  130. var hasNick, hasUser, hasPing, hasPass bool
  131. var capSASL, successSASL bool
  132. var part1 bool
  133. // part 1 : User, Nick, ServerPass and Ping reply
  134. for !part1 {
  135. line, err = reader.ReadString('\n')
  136. if err == nil {
  137. line = strings.Trim(line, "\r\n")
  138. // process the received line here
  139. parts = strings.Split(line, " ")
  140. t.Logf("<< %s", line)
  141. switch parts[0] {
  142. case "CAP":
  143. if config.UseTLS && config.UseSASL {
  144. if line == "CAP REQ :sasl" {
  145. // Acknowledge we support SASL
  146. ircWrite(server, ":irc.red-green.com CAP * ACK :sasl", t)
  147. capSASL = true
  148. }
  149. if line == "CAP END" {
  150. capSASL = true
  151. if successSASL {
  152. part1 = true
  153. }
  154. }
  155. }
  156. case "AUTHENTICATE":
  157. if capSASL {
  158. if line == "AUTHENTICATE PLAIN" {
  159. ircWrite(server, "AUTHENTICATE +", t)
  160. } else {
  161. // Process SASL auth message
  162. var auth64 string = parts[1]
  163. byteauth, _ := base64.StdEncoding.DecodeString(auth64)
  164. var auth string = string(byteauth)
  165. auth = strings.ReplaceAll(auth, "\x00", " ")
  166. t.Log(auth)
  167. expect = fmt.Sprintf(" %s %s", config.Nick, config.Password)
  168. if expect != auth {
  169. t.Errorf("Got %s, Expected %s", auth, expect)
  170. ircWrite(server, fmt.Sprintf(":irc.red-green.com 904 %s :SASL authentication failed",
  171. config.Nick), t)
  172. } else {
  173. // Success!
  174. ircWrite(server, fmt.Sprintf(":irc.red-green.com 900 %s %s!%[email protected] %s :You are now logged in as %s.",
  175. config.Nick, config.Nick, config.Username, config.Nick, config.Nick), t)
  176. ircWrite(server, fmt.Sprintf(":irc.red-green.com 903 %s :SASL authentication successful",
  177. config.Nick), t)
  178. successSASL = true
  179. }
  180. }
  181. }
  182. case "PASS":
  183. expect = fmt.Sprintf("PASS %s", config.ServerPassword)
  184. if expect != line {
  185. t.Errorf("Got %s, Expected %s", line, expect)
  186. } else {
  187. hasPass = true
  188. }
  189. case "NICK":
  190. expect = fmt.Sprintf("NICK %s", config.MyNick)
  191. if expect != line {
  192. t.Errorf("Got %s, Expected %s", line, expect)
  193. } else {
  194. if config.MyNick == "bad" {
  195. // throw bad nick here
  196. // ircWrite(server, fmt.Sprintf(":irc.red-green.com 433 :Nick already in use."), t)
  197. ircWrite(server, ":irc.red-green.com 433 :Nick already in use.", t)
  198. }
  199. hasNick = true
  200. }
  201. case "USER":
  202. // USER meow-bot 0 * :Meooow! bugz is my owner.
  203. expect = fmt.Sprintf("USER %s 0 * :%s", config.Username, config.Realname)
  204. if expect != line {
  205. t.Errorf("Got %s, Expected %s", line, expect)
  206. } else {
  207. hasUser = true
  208. }
  209. case "PONG":
  210. expect = fmt.Sprintf("PONG %X", ping)
  211. if expect != line {
  212. t.Errorf("Got %s, Expected %s", line, expect)
  213. } else {
  214. hasPing = true
  215. }
  216. }
  217. if !part1 {
  218. if !capSASL && hasNick && hasUser && hasPing && ((config.ServerPassword == "") || hasPass) {
  219. part1 = true
  220. }
  221. }
  222. } else {
  223. t.Error("Read Error:", err)
  224. server.Close()
  225. return
  226. }
  227. }
  228. if !part1 {
  229. t.Error("Expected to pass part1 (user/nick/pong)")
  230. }
  231. // Display MOTD
  232. for _, line = range []string{
  233. ":irc.red-green.com 001 %s :Welcome to the RedGreen IRC Network",
  234. ":irc.red-green.com 002 %s :Your host is irc.red-green.com, running version UnrealIRCd-5.2.0.1",
  235. ":irc.red-green.com 005 %s AWAYLEN=307 BOT=B CASEMAPPING=ascii CHANLIMIT=#:10 CHANMODES=beI,kLf,lH,psmntirzMQNRTOVKDdGPZSCc CHANNELLEN=32 CHANTYPES=# CLIENTTAGDENY=*,-draft/typing,-typing DEAF=d ELIST=MNUCT EXCEPTS EXTBAN=~,GptmTSOcarnqjf :are supported by this server",
  236. ":irc.red-green.com 005 %s HCN INVEX KICKLEN=307 KNOCK MAP MAXCHANNELS=10 MAXLIST=b:60,e:60,I:60 MAXNICKLEN=30 MINNICKLEN=0 MODES=12 NAMESX NETWORK=RedGreen :are supported by this server",
  237. ":irc.red-green.com 005 %s NICKLEN=30 PREFIX=(qaohv)~&@%%+ QUITLEN=307 SAFELIST SILENCE=15 STATUSMSG=~&@%%+ TARGMAX=DCCALLOW:,ISON:,JOIN:,KICK:4,KILL:,LIST:,NAMES:1,NOTICE:1,PART:,PRIVMSG:4,SAJOIN:,SAPART:,TAGMSG:1,USERHOST:,USERIP:,WATCH:,WHOIS:1,WHOWAS:1 TOPICLEN=360 UHNAMES USERIP WALLCHOPS WATCH=128 :are supported by this server",
  238. ":irc.red-green.com 005 %s WATCHOPTS=A WHOX :are supported by this server",
  239. ":irc.red-green.com 375 %s :- irc.red-green.com Message of the Day -",
  240. ":irc.red-green.com 372 %s :- ",
  241. ":irc.red-green.com 376 %s :End of /MOTD command.",
  242. } {
  243. output = fmt.Sprintf(line, config.Nick)
  244. ircWrite(server, output, t)
  245. }
  246. if config.UseSASL {
  247. if !successSASL {
  248. log.Println("Failed SASL Authentication.")
  249. }
  250. }
  251. // part 2: nickserv/register (if not already registered with SASL)
  252. var part2 bool
  253. if successSASL {
  254. ircWrite(server, fmt.Sprintf(":NickServ MODE %s :+r", config.Nick), t)
  255. part2 = true
  256. } else {
  257. if config.Password != "" {
  258. for _, line = range []string{":[email protected] NOTICE %s :This nickname is registered and protected. If it is your",
  259. ":[email protected] NOTICE %s :nick, type \x02/msg NickServ IDENTIFY \x1fpassword\x1f\x02. Otherwise,"} {
  260. output = fmt.Sprintf(line, config.Nick)
  261. ircWrite(server, output, t)
  262. }
  263. } else {
  264. // No password, so we can't register. Skip this part.
  265. part2 = true
  266. }
  267. }
  268. for !part2 {
  269. line, err = reader.ReadString('\n')
  270. if err == nil {
  271. line = strings.Trim(line, "\r\n")
  272. // process the received line here
  273. parts = strings.Split(line, " ")
  274. t.Logf("<< %s", line)
  275. switch parts[0] {
  276. case "NS":
  277. expect = fmt.Sprintf("NS IDENTIFY %s", config.Password)
  278. if expect != line {
  279. t.Errorf("Got %s, Expected %s", line, expect)
  280. }
  281. // ok, mark the user as registered
  282. output = fmt.Sprintf(":[email protected] NOTICE %s :Password accepted - you are now recognized.",
  283. config.Nick)
  284. ircWrite(server, output, t)
  285. output = fmt.Sprintf(":NickServ MODE %s :+r", config.Nick)
  286. ircWrite(server, output, t)
  287. part2 = true
  288. }
  289. } else {
  290. t.Error("Read Error:", err)
  291. server.Close()
  292. return
  293. }
  294. }
  295. if !part2 {
  296. t.Error("Expected to pass part2 (ns identify/+r)")
  297. }
  298. time.AfterFunc(time.Millisecond*time.Duration(abortAfter), func() { server.Close() })
  299. t.Log("Ok, Identified...")
  300. var Kicked bool
  301. for {
  302. line, err = reader.ReadString('\n')
  303. if err == nil {
  304. line = strings.Trim(line, "\r\n")
  305. // process the received line here
  306. parts = strings.Split(line, " ")
  307. t.Logf("<< %s", line)
  308. switch parts[0] {
  309. case "JOIN":
  310. for _, channel := range strings.Split(parts[1], ",") {
  311. output = fmt.Sprintf(":%s JOIN :%s", config.MyNick, channel)
  312. ircWrite(server, output, t)
  313. output = fmt.Sprintf(":irc.server 332 %s %s :Topic for (%s)", config.MyNick, channel, channel)
  314. ircWrite(server, output, t)
  315. output = fmt.Sprintf(":irc.server 333 %s %s user %d", config.MyNick, channel, time.Now().Unix())
  316. ircWrite(server, output, t)
  317. if strings.Contains(channel, "kick") {
  318. if !Kicked {
  319. Kicked = true
  320. output = fmt.Sprintf("user KICK %s %s :Get out", channel, config.MyNick)
  321. ircWrite(server, output, t)
  322. }
  323. }
  324. }
  325. }
  326. switch parts[0] {
  327. case "PRIVMSG", "NOTICE":
  328. if parts[1] == "echo" {
  329. parts[2] = parts[2][1:]
  330. // echo user, return whatever was sent back to them.
  331. output = fmt.Sprintf(":%s %s %s :%s", "echo", parts[0], config.MyNick, strings.Join(parts[2:], " "))
  332. ircWrite(server, output, t)
  333. }
  334. if strings.Contains(parts[1], "missing") {
  335. // Sending to missing user or channel.
  336. var number int
  337. if strings.Contains(parts[1], "#") {
  338. number = 404
  339. } else {
  340. number = 401
  341. }
  342. output = fmt.Sprintf(":irc.red-green.com %d %s %s :No such nick/channel", number, config.GetNick(), parts[1])
  343. ircWrite(server, output, t)
  344. }
  345. case "NICK":
  346. output = fmt.Sprintf(":%s NICK :%s", config.MyNick, parts[1])
  347. ircWrite(server, output, t)
  348. case "QUIT":
  349. output = fmt.Sprintf("ERROR: Closing link:%s", config.MyNick)
  350. ircWrite(server, output, t)
  351. server.Close()
  352. }
  353. } else {
  354. t.Log("Read Error:", err)
  355. return
  356. }
  357. }
  358. }