diff options
Diffstat (limited to 'tests/server-tests/helpers')
| -rw-r--r-- | tests/server-tests/helpers/bonafide_helper.rb | 235 | ||||
| -rw-r--r-- | tests/server-tests/helpers/client_side_db.py | 167 | ||||
| -rw-r--r-- | tests/server-tests/helpers/couchdb_helper.rb | 143 | ||||
| -rw-r--r-- | tests/server-tests/helpers/files_helper.rb | 54 | ||||
| -rw-r--r-- | tests/server-tests/helpers/http_helper.rb | 157 | ||||
| -rw-r--r-- | tests/server-tests/helpers/network_helper.rb | 79 | ||||
| -rw-r--r-- | tests/server-tests/helpers/os_helper.rb | 41 | ||||
| -rw-r--r-- | tests/server-tests/helpers/smtp_helper.rb | 45 | ||||
| -rwxr-xr-x | tests/server-tests/helpers/soledad_sync.py | 89 | ||||
| -rw-r--r-- | tests/server-tests/helpers/srp_helper.rb | 171 | 
10 files changed, 1181 insertions, 0 deletions
| diff --git a/tests/server-tests/helpers/bonafide_helper.rb b/tests/server-tests/helpers/bonafide_helper.rb new file mode 100644 index 00000000..5b886228 --- /dev/null +++ b/tests/server-tests/helpers/bonafide_helper.rb @@ -0,0 +1,235 @@ +# +# helper for the communication with the provider API for creating, authenticating, and deleting accounts. +# + +class LeapTest + +  def assert_tmp_user +    user = assert_create_user +    assert_authenticate_user(user) +    yield user if block_given? +    assert_delete_user(user) +  rescue StandardError, MiniTest::Assertion => exc +    begin +      assert_delete_user(user) +    rescue +    end +    raise exc +  end + +  # +  # attempts to create a user account via the API, +  # returning the user object if successful. +  # +  def assert_create_user(username=nil, auth=nil) +    user = SRP::User.new(username) +    url = api_url("/users.json") +    params = user.to_params +    if auth +      options = api_options(:auth => auth) +    else +      options = api_options +      if property('webapp.invite_required') +        @invite_code = generate_invite_code +        params['user[invite_code]'] = @invite_code +      end +    end + +    assert_post(url, params, options) do |body| +      assert response = JSON.parse(body), 'response should be JSON' +      assert response['ok'], "Creating a user should be successful, got #{response.inspect} instead." +      user.ok = true +      user.id = response['id'] +    end +    return user +  end + +  # TODO: use the api for this instead. +  def generate_invite_code +    `cd /srv/leap/webapp/ && sudo -u leap-webapp RAILS_ENV=production bundle exec rake generate_invites[1]`.gsub(/\n/, "") +  end + +  # +  # attempts to authenticate user. if successful, +  # user object is updated with id and session token. +  # +  def assert_authenticate_user(user) +    url = api_url("/sessions.json") +    session = SRP::Session.new(user) +    params = {'login' => user.username, 'A' => session.aa} +    assert_post(url, params, api_options) do |body, response| +      cookie = response['Set-Cookie'].split(';').first +      assert(response = JSON.parse(body), 'response should be JSON') +      assert(session.bb = response["B"], 'response should include "B"') +      url = api_url("/sessions/login.json") +      params = {'client_auth' => session.m, 'A' => session.aa} +      assert_put(url, params, api_options('Cookie' => cookie)) do |body| +        assert(response = JSON.parse(body), 'response should be JSON') +        assert(response['M2'], 'response should include M2') +        user.session_token = response['token'] +        user.id = response['id'] +        assert(user.session_token, 'response should include token') +        assert(user.id, 'response should include user id') +      end +    end +  end + +  # +  # attempts to destroy a user account via the API. +  # +  def assert_delete_user(user) +    if user.is_a? String +      assert_delete_user_by_login(user) +    elsif user.is_a? SRP::User +      assert_delete_srp_user(user) +    end +  end + +  # +  # returns true if the identity exists, uses monitor token auth +  # +  def identity_exists?(address) +    url = api_url("/identities/#{URI.encode(address)}.json") +    options = {:ok_codes => [200, 404]}.merge( +      api_options(:auth => :monitor) +    ) +    assert_get(url, nil, options) do |body, response| +      return response.code == "200" +    end +  end + +  def upload_public_key(user_id, public_key) +    url = api_url("/users/#{user_id}.json") +    params = {"user[public_key]" => public_key} +    assert_put(url, params, api_options(:auth => :monitor)) +  end + +  # +  # return user document as a Hash. uses monitor token auth +  # +  def find_user_by_id(user_id) +    url = api_url("/users/#{user_id}.json") +    assert_get(url, nil, api_options(:auth => :monitor)) do |body| +      return JSON.parse(body) +    end +  end + +  # +  # return user document as a Hash. uses monitor token auth +  # NOTE: this relies on deprecated behavior of the API +  # and will not work when multi-domain support is added. +  # +  def find_user_by_login(login) +    url = api_url("/users/0.json?login=#{login}") +    options = {:ok_codes => [200, 404]}.merge( +      api_options(:auth => :monitor) +    ) +    assert_get(url, nil, options) do |body, response| +      if response.code == "200" +        return JSON.parse(body) +      else +        return nil +      end +    end +  end + +  private + +  def api_url(path) +    unless path =~ /^\// +      path = '/' + path +    end +    if property('testing.api_uri') +      return property('testing.api_uri') + path +    elsif property('api') +      api = property('api') +      return "https://%{domain}:%{port}/%{version}#{path}" % { +        :domain   => api['domain'], +        :port     => api['port'], +        :version  => api['version'] || 1 +      } +    else +      fail 'This node needs to have either testing.api_url or api.{domain,port} configured.' +    end +  end + +  # +  # produces an options hash used for api http requests. +  # +  # argument options hash gets added to "headers" +  # of the http request. +  # +  # special :auth key in argument will expand to +  # add api_token_auth header. +  # +  # if you want to try manually: +  # +  #   export API_URI=`grep api_uri /etc/leap/hiera.yaml | cut -d\" -f2` +  #   export TOKEN=`grep monitor_auth_token /etc/leap/hiera.yaml | awk '{print $2}'` +  #   curl -H "Accept: application/json" -H "Token: $TOKEN" $API_URI +  # +  def api_options(options={}) +    # note: must be :headers, not "headers" +    hsh = { +      :headers => { +        "Accept" => "application/json" +      } +    } +    if options[:auth] +      hsh[:headers].merge!(api_token_auth(options.delete(:auth))) +    end +    hsh[:headers].merge!(options) +    return hsh +  end + +  # +  # add token authentication to a http request. +  # +  # returns a hash suitable for adding to the 'headers' option +  # of an http function. +  # +  def api_token_auth(token) +    if token.is_a?(Symbol) && property('testing') +      if token == :monitor +        token_str = property('testing.monitor_auth_token') +      else +        raise ArgumentError.new 'no such token' +      end +    else +      token_str = token +    end +    {"Authorization" => "Token token=\"#{token_str}\""} +  end + +  # +  # not actually used in any test, but useful when +  # writing new tests. +  # +  def assert_delete_user_by_login(login_name) +    user = find_user_by_login(login_name) +    url = api_url("/users/#{user['id']}.json") +    params =  {:identities => 'destroy'} +    delete(url, params, api_options(:auth => :monitor)) do |body, response, error| +      assert error.nil?, "Error deleting user: #{error}" +      assert response.code.to_i == 200, "Unable to delete user: HTTP response from API should have code 200, was #{response.code} #{error} #{body}" +      assert(response = JSON.parse(body), 'Delete response should be JSON') +      assert(response["success"], 'Deleting user should be a success') +    end +  end + +  def assert_delete_srp_user(user) +    if user && user.ok && user.id && user.session_token && !user.deleted +      url = api_url("users/#{user.id}.json") +      params = {:identities => 'destroy'} +      user.deleted = true +      delete(url, params, api_options(:auth => user.session_token)) do |body, response, error| +        assert error.nil?, "Error deleting user: #{error}" +        assert response.code.to_i == 200, "Unable to delete user: HTTP response from API should have code 200, was #{response.code} #{error} #{body}" +        assert(response = JSON.parse(body), 'Delete response should be JSON') +        assert(response["success"], 'Deleting user should be a success') +      end +    end +  end + + +end diff --git a/tests/server-tests/helpers/client_side_db.py b/tests/server-tests/helpers/client_side_db.py new file mode 100644 index 00000000..2f8c220f --- /dev/null +++ b/tests/server-tests/helpers/client_side_db.py @@ -0,0 +1,167 @@ +import logging +import os +import tempfile +import getpass +import binascii +import json + +try: +    import requests +    import srp._pysrp as srp +except ImportError: +    pass + +from twisted.internet.defer import inlineCallbacks + +from leap.soledad.client import Soledad + + +""" +Helper functions to give access to client-side Soledad database. +Copied over from soledad/scripts folder. +""" + +# create a logger +logger = logging.getLogger(__name__) + +# DEBUG: enable debug logs +# LOG_FORMAT = '%(asctime)s %(message)s' +# logging.basicConfig(format=LOG_FORMAT, level=logging.DEBUG) + + +safe_unhexlify = lambda x: binascii.unhexlify(x) if ( +    len(x) % 2 == 0) else binascii.unhexlify('0' + x) + + +def _fail(reason): +    logger.error('Fail: ' + reason) +    exit(2) + + +def get_soledad_instance(uuid, passphrase, basedir, server_url, cert_file, +                         token): +    # setup soledad info +    logger.info('UUID is %s' % uuid) +    logger.info('Server URL is %s' % server_url) +    secrets_path = os.path.join( +        basedir, '%s.secret' % uuid) +    local_db_path = os.path.join( +        basedir, '%s.db' % uuid) +    # instantiate soledad +    return Soledad( +        uuid, +        unicode(passphrase), +        secrets_path=secrets_path, +        local_db_path=local_db_path, +        server_url=server_url, +        cert_file=cert_file, +        auth_token=token, +        defer_encryption=True) + + +def _get_api_info(provider): +    info = requests.get( +        'https://'+provider+'/provider.json', verify=False).json() +    return info['api_uri'], info['api_version'] + + +def _login(username, passphrase, provider, api_uri, api_version): +    usr = srp.User(username, passphrase, srp.SHA256, srp.NG_1024) +    auth = None +    try: +        auth = _authenticate(api_uri, api_version, usr).json() +    except requests.exceptions.ConnectionError: +        _fail('Could not connect to server.') +    if 'errors' in auth: +        _fail(str(auth['errors'])) +    return api_uri, api_version, auth + + +def _authenticate(api_uri, api_version, usr): +    api_url = "%s/%s" % (api_uri, api_version) +    session = requests.session() +    uname, A = usr.start_authentication() +    params = {'login': uname, 'A': binascii.hexlify(A)} +    init = session.post( +        api_url + '/sessions', data=params, verify=False).json() +    if 'errors' in init: +        _fail('test user not found') +    M = usr.process_challenge( +        safe_unhexlify(init['salt']), safe_unhexlify(init['B'])) +    return session.put(api_url + '/sessions/' + uname, verify=False, +                       data={'client_auth': binascii.hexlify(M)}) + + +def _get_soledad_info(username, provider, passphrase, basedir): +    api_uri, api_version = _get_api_info(provider) +    auth = _login(username, passphrase, provider, api_uri, api_version) +    # get soledad server url +    service_url = '%s/%s/config/soledad-service.json' % \ +                  (api_uri, api_version) +    soledad_hosts = requests.get(service_url, verify=False).json()['hosts'] +    hostnames = soledad_hosts.keys() +    # allow for choosing the host +    host = hostnames[0] +    if len(hostnames) > 1: +        i = 1 +        print "There are many available hosts:" +        for h in hostnames: +            print "  (%d) %s.%s" % (i, h, provider) +            i += 1 +        choice = raw_input("Choose a host to use (default: 1): ") +        if choice != '': +            host = hostnames[int(choice) - 1] +    server_url = 'https://%s:%d/user-%s' % \ +        (soledad_hosts[host]['hostname'], soledad_hosts[host]['port'], +         auth[2]['id']) +    # get provider ca certificate +    ca_cert = requests.get('https://%s/ca.crt' % provider, verify=False).text +    cert_file = os.path.join(basedir, 'ca.crt') +    with open(cert_file, 'w') as f: +        f.write(ca_cert) +    return auth[2]['id'], server_url, cert_file, auth[2]['token'] + + +def _get_passphrase(args): +    passphrase = args.passphrase +    if passphrase is None: +        passphrase = getpass.getpass( +            'Password for %s@%s: ' % (args.username, args.provider)) +    return passphrase + + +def _get_basedir(args): +    basedir = args.basedir +    if basedir is None: +        basedir = tempfile.mkdtemp() +    elif not os.path.isdir(basedir): +        os.mkdir(basedir) +    logger.info('Using %s as base directory.' % basedir) +    return basedir + + +@inlineCallbacks +def _export_key(args, km, fname, private=False): +    address = args.username + "@" + args.provider +    pkey = yield km.get_key( +        address, OpenPGPKey, private=private, fetch_remote=False) +    with open(args.export_private_key, "w") as f: +        f.write(pkey.key_data) + + +@inlineCallbacks +def _export_incoming_messages(soledad, directory): +    yield soledad.create_index("by-incoming", "bool(incoming)") +    docs = yield soledad.get_from_index("by-incoming", '1') +    i = 1 +    for doc in docs: +        with open(os.path.join(directory, "message_%d.gpg" % i), "w") as f: +            f.write(doc.content["_enc_json"]) +        i += 1 + + +@inlineCallbacks +def _get_all_docs(soledad): +    _, docs = yield soledad.get_all_docs() +    for doc in docs: +        print json.dumps(doc.content, indent=4) diff --git a/tests/server-tests/helpers/couchdb_helper.rb b/tests/server-tests/helpers/couchdb_helper.rb new file mode 100644 index 00000000..efb2c2bf --- /dev/null +++ b/tests/server-tests/helpers/couchdb_helper.rb @@ -0,0 +1,143 @@ +class LeapTest + +  # +  # generates a couchdb url for when couchdb is running +  # remotely and is available via stunnel. +  # +  # example properties: +  # +  # stunnel: +  #   clients: +  #     couch_client: +  #       couch1_5984: +  #         accept_port: 4000 +  #         connect: couch1.bitmask.i +  #         connect_port: 15984 +  # +  def couchdb_urls_via_stunnel(path="", options=nil) +    path = path.gsub('"', '%22') +    if options && options[:username] && options[:password] +      userpart = "%{username}:%{password}@" % options +    else +      userpart = "" +    end +    assert_property('stunnel.clients.couch_client').values.collect do |stunnel_conf| +      assert port = stunnel_conf['accept_port'], 'Field `accept_port` must be present in `stunnel` property.' +      URLString.new("http://#{userpart}localhost:#{port}#{path}").tap {|url| +        remote_ip_address = TCPSocket.gethostbyname(stunnel_conf['connect']).last +        url.memo = "(via stunnel to %s:%s, aka %s)" % [stunnel_conf['connect'], stunnel_conf['connect_port'], remote_ip_address] +      } +    end +  end + +  # +  # generates a couchdb url for accessing couchdb via haproxy +  # +  # example properties: +  # +  # haproxy: +  #   couch: +  #     listen_port: 4096 +  #     servers: +  #       panda: +  #         backup: false +  #         host: localhost +  #         port: 4000 +  #         weight: 100 +  #         writable: true +  # +  def couchdb_url_via_haproxy(path="", options=nil) +    path = path.gsub('"', '%22') +    if options && options[:username] && options[:password] +      userpart = "%{username}:%{password}@" % options +    else +      userpart = "" +    end +    port = assert_property('haproxy.couch.listen_port') +    return URLString.new("http://#{userpart}localhost:#{port}#{path}").tap { |url| +      url.memo = '(via haproxy)' +    } +  end + +  # +  # generates a couchdb url for when couchdb is running locally. +  # +  # example properties: +  # +  # couch: +  #   port: 5984 +  # +  def couchdb_url_via_localhost(path="", options=nil) +    path = path.gsub('"', '%22') +    port = (options && options[:port]) || assert_property('couch.port') +    if options && options[:username] +      password = property("couch.users.%{username}.password" % options) +      userpart = "%s:%s@" % [options[:username], password] +    else +      userpart = "" +    end +    return URLString.new("http://#{userpart}localhost:#{port}#{path}").tap { |url| +      url.memo = '(via direct localhost connection)' +    } +  end + +  # +  # returns a single url for accessing couchdb +  # +  def couchdb_url(path="", options=nil) +    if property('couch.port') +      couchdb_url_via_localhost(path, options) +    elsif property('stunnel.clients.couch_client') +      couchdb_urls_via_stunnel(path, options).first +    end +  end + +  # +  # returns an array of urls for accessing couchdb +  # +  def couchdb_urls(path="", options=nil) +    if property('couch.port') +      [couchdb_url_via_localhost(path, options)] +    elsif property('stunnel.clients.couch_client') +      couchdb_urls_via_stunnel(path, options) +    end +  end + +  def assert_destroy_user_db(user_id, options=nil) +    db_name = "user-#{user_id}" +    url = couchdb_url("/#{db_name}", options) +    http_options = {:ok_codes => [200, 404]} # ignore missing dbs +    assert_delete(url, nil, http_options) +  end + +  def assert_create_user_db(user_id, options=nil) +    db_name = "user-#{user_id}" +    url = couchdb_url("/#{db_name}", options) +    http_options = {:ok_codes => [200, 404]} # ignore missing dbs +    assert_put(url, nil, :format => :json) do |body| +      assert response = JSON.parse(body), "PUT response should be JSON" +      assert response["ok"], "PUT response should be OK" +    end +  end + +  # +  # returns true if the per-user db created by soledad-server exists. +  # +  def user_db_exists?(user_id, options=nil) +    options = {:username => 'admin'}.merge(options || {}) +    db_name = "user-#{user_id}" +    url = couchdb_url("/#{db_name}", options) +    get(url) do |body, response, error| +      if response.nil? +        fail "could not query couchdb #{url}: #{error}\n#{body}" +      elsif response.code.to_i == 200 +        return true +      elsif response.code.to_i == 404 +        return false +      else +        fail ["could not query couchdb #{url}: expected response code 200 or 404, but got #{response.code}.", error, body].compact.join("\n") +      end +    end +  end + +end
\ No newline at end of file diff --git a/tests/server-tests/helpers/files_helper.rb b/tests/server-tests/helpers/files_helper.rb new file mode 100644 index 00000000..d6795889 --- /dev/null +++ b/tests/server-tests/helpers/files_helper.rb @@ -0,0 +1,54 @@ +class LeapTest + +  # +  # Matches the regexp in the file, and returns the first matched string (or fails if no match). +  # +  def file_match(filename, regexp) +    if match = File.read(filename).match(regexp) +      match.captures.first +    else +      fail "Regexp #{regexp.inspect} not found in file #{filename.inspect}." +    end +  end + +  # +  # Matches the regexp in the file, and returns array of matched strings (or fails if no match). +  # +  def file_matches(filename, regexp) +    if match = File.read(filename).match(regexp) +      match.captures +    else +      fail "Regexp #{regexp.inspect} not found in file #{filename.inspect}." +    end +  end + +  # +  # checks to make sure the given property path exists in $node (e.g. hiera.yaml) +  # and returns the value +  # +  def assert_property(property) +    latest = $node +    property.split('.').each do |segment| +      latest = latest[segment] +      fail "Required node property `#{property}` is missing." if latest.nil? +    end +    return latest +  end + +  # +  # a handy function to get the value of a long property path +  # without needing to test the existance individually of each part +  # in the tree. +  # +  # e.g. property("stunnel.clients.couch_client") +  # +  def property(property) +    latest = $node +    property.split('.').each do |segment| +      latest = latest[segment] +      return nil if latest.nil? +    end +    return latest +  end + +end
\ No newline at end of file diff --git a/tests/server-tests/helpers/http_helper.rb b/tests/server-tests/helpers/http_helper.rb new file mode 100644 index 00000000..0d0bb7d5 --- /dev/null +++ b/tests/server-tests/helpers/http_helper.rb @@ -0,0 +1,157 @@ +require 'net/http' + +class LeapTest + +  # +  # In order to easily provide detailed error messages, it is useful +  # to append a memo to a url string that details what this url is for +  # (e.g. stunnel, haproxy, etc). +  # +  # So, the url happens to be a UrlString, the memo field is used +  # if there is an error in assert_get. +  # +  class URLString < String +    attr_accessor :memo +  end + +  # +  # aliases for http_send() +  # +  def get(url, params=nil, options=nil, &block) +    http_send("GET", url, params, options, &block) +  end +  def delete(url, params=nil, options=nil, &block) +    http_send("DELETE", url, params, options, &block) +  end +  def post(url, params=nil, options=nil, &block) +    http_send("POST", url, params, options, &block) +  end +  def put(url, params=nil, options=nil, &block) +    http_send("PUT", url, params, options, &block) +  end + +  # +  # send a GET, DELETE, POST, or PUT +  # yields |body, response, error| +  # +  def http_send(method, url, params=nil, options=nil) +    options ||= {} +    response = nil + +    # build uri +    uri = URI(url) +    if params && (method == 'GET' || method == 'DELETE') +      uri.query = URI.encode_www_form(params) +    end + +    # build http +    http = Net::HTTP.new uri.host, uri.port +    if uri.scheme == 'https' +      http.verify_mode = OpenSSL::SSL::VERIFY_NONE +      http.use_ssl = true +    end + +    # build request +    request = build_request(method, uri, params, options) + +    # make http request +    http.start do |agent| +      response = agent.request(request) +      yield response.body, response, nil +    end +  rescue => exc +    yield nil, response, exc +  end + +  # +  # Aliases for assert_http_send() +  # +  def assert_get(url, params=nil, options=nil, &block) +    assert_http_send("GET", url, params, options, &block) +  end +  def assert_delete(url, params=nil, options=nil, &block) +    assert_http_send("DELETE", url, params, options, &block) +  end +  def assert_post(url, params=nil, options=nil, &block) +    assert_http_send("POST", url, params, options, &block) +  end +  def assert_put(url, params=nil, options=nil, &block) +    assert_http_send("PUT", url, params, options, &block) +  end + +  # +  # calls http_send, yielding results if successful or failing with +  # descriptive info otherwise. +  # +  # options: +  # - error_msg: custom error message to display. +  # - ok_codes: in addition to 2xx, codes in this array will not produce an error. +  # +  def assert_http_send(method, url, params=nil, options=nil, &block) +    options ||= {} +    error_msg = options[:error_msg] || (url.respond_to?(:memo) ? url.memo : nil) +    http_send(method, url, params, options) do |body, response, error| +      if response +        code = response.code.to_i +        ok = code >= 200 && code < 300 +        if options[:ok_codes] +          ok ||= options[:ok_codes].include?(code) +        end +        if ok +          if block +            yield(body) if block.arity == 1 +            yield(body, response) if block.arity == 2 +            yield(body, response, error) if block.arity == 3 +          end +        else +          fail ["Expected success code from #{method} #{url}, but got #{response.code} instead.", error_msg, body].compact.join("\n") +        end +      else +        fail ["Expected a response from #{method} #{url}, but got \"#{error}\" instead.", error_msg, body].compact.join("\n"), error +      end +    end +  end + +  # +  # only a warning for now, should be a failure in the future +  # +  def assert_auth_fail(url, params) +    uri = URI(url) +    get(url, params) do |body, response, error| +      unless response.code.to_s == "401" +        warn "Expected a '401 Unauthorized' response, but got #{response.code} instead (GET #{uri.request_uri} with username '#{uri.user}')." +        return false +      end +    end +    true +  end + +  private + +  def build_request(method, uri, params, options) +    request = case method +      when "GET"    then Net::HTTP::Get.new(uri.request_uri) +      when "DELETE" then Net::HTTP::Delete.new(uri.request_uri) +      when "POST"   then Net::HTTP::Post.new(uri.request_uri) +      when "PUT"    then Net::HTTP::Put.new(uri.request_uri) +    end +    if uri.user +      request.basic_auth uri.user, uri.password +    end +    if params && (method == 'POST' || method == 'PUT') +      if options[:format] == :json || options[:format] == 'json' +        request["Content-Type"] = "application/json" +        request.body = params.to_json +      else +        request.set_form_data(params) if params +      end +    end +    if options[:headers] +      options[:headers].each do |key, value| +        request[key] = value +      end +    end +    request +  end + +end
\ No newline at end of file diff --git a/tests/server-tests/helpers/network_helper.rb b/tests/server-tests/helpers/network_helper.rb new file mode 100644 index 00000000..713d57aa --- /dev/null +++ b/tests/server-tests/helpers/network_helper.rb @@ -0,0 +1,79 @@ +class LeapTest + +  # +  # tcp connection helper with timeout +  # +  def try_tcp_connect(host, port, timeout = 5) +    addr     = Socket.getaddrinfo(host, nil) +    sockaddr = Socket.pack_sockaddr_in(port, addr[0][3]) + +    Socket.new(Socket.const_get(addr[0][0]), Socket::SOCK_STREAM, 0).tap do |socket| +      socket.setsockopt(Socket::IPPROTO_TCP, Socket::TCP_NODELAY, 1) +      begin +        socket.connect_nonblock(sockaddr) +      rescue IO::WaitReadable +        if IO.select([socket], nil, nil, timeout) == nil +          raise "Connection timeout" +        else +          socket.connect_nonblock(sockaddr) +        end +      rescue IO::WaitWritable +        if IO.select(nil, [socket], nil, timeout) == nil +          raise "Connection timeout" +        else +          socket.connect_nonblock(sockaddr) +        end +      end +      return socket +    end +  end + +  def try_tcp_write(socket, timeout = 5) +    begin +      socket.write_nonblock("\0") +    rescue IO::WaitReadable +      if IO.select([socket], nil, nil, timeout) == nil +        raise "Write timeout" +      else +        retry +      end +    rescue IO::WaitWritable +      if IO.select(nil, [socket], nil, timeout) == nil +        raise "Write timeout" +      else +        retry +      end +    end +  end + +  def try_tcp_read(socket, timeout = 5) +    begin +      socket.read_nonblock(1) +    rescue IO::WaitReadable +      if IO.select([socket], nil, nil, timeout) == nil +        raise "Read timeout" +      else +        retry +      end +    rescue IO::WaitWritable +      if IO.select(nil, [socket], nil, timeout) == nil +        raise "Read timeout" +      else +        retry +      end +    end +  end + +  def assert_tcp_socket(host, port, msg=nil) +    begin +      socket = try_tcp_connect(host, port, 1) +      #try_tcp_write(socket,1) +      #try_tcp_read(socket,1) +    rescue StandardError => exc +      fail ["Failed to open socket #{host}:#{port}", exc, msg].compact.join("\n") +    ensure +      socket.close if socket +    end +  end + +end
\ No newline at end of file diff --git a/tests/server-tests/helpers/os_helper.rb b/tests/server-tests/helpers/os_helper.rb new file mode 100644 index 00000000..9923d5b1 --- /dev/null +++ b/tests/server-tests/helpers/os_helper.rb @@ -0,0 +1,41 @@ +class LeapTest + +  # +  # works like pgrep command line +  # return an array of hashes like so [{:pid => "1234", :process => "ls"}] +  # +  def pgrep(match) +    output = `pgrep --full --list-name '#{match}'` +    output.each_line.map{|line| +      pid = line.split(' ')[0] +      process = line.gsub(/(#{pid} |\n)/, '') +      # filter out pgrep cmd itself +      # on wheezy hosts, the "process" var contains the whole cmd including all parameters +      # on jessie hosts, it only contains the first cmd (which is the default sheel invoked by 'sh') +      if process =~ /^sh/ +        nil +      else +        {:pid => pid, :process => process} +      end +    }.compact +  end + +  def assert_running(process, options={}) +    processes = pgrep(process) +    assert processes.any?, "No running process for #{process}" +    if options[:single] +      assert processes.length == 1, "More than one process for #{process}" +    end +  end + +  # +  # runs the specified command, failing on a non-zero exit status. +  # +  def assert_run(command) +    output = `#{command} 2>&1` +    if $?.exitstatus != 0 +      fail "Error running `#{command}`:\n#{output}" +    end +  end + +end
\ No newline at end of file diff --git a/tests/server-tests/helpers/smtp_helper.rb b/tests/server-tests/helpers/smtp_helper.rb new file mode 100644 index 00000000..ea7fb9fa --- /dev/null +++ b/tests/server-tests/helpers/smtp_helper.rb @@ -0,0 +1,45 @@ +require 'net/smtp' + +class LeapTest + +  TEST_EMAIL_USER = "test_user_email" +  TEST_BAD_USER = "test_user_bad" + +  MSG_BODY = %(Since it seems that any heart which beats for freedom has the right only to a +lump of lead, I too claim my share. If you let me live, I shall never stop +crying for revenge and I shall avenge my brothers. I have finished. If you are +not cowards, kill me! + +--Louise Michel) + +  def send_email(recipient, options={}) +    sender = options[:sender] || recipient +    helo_domain = property('domain.full_suffix') +    headers = { +      "Date" => Time.now.utc, +      "From" => sender, +      "To" => recipient, +      "Subject" => "Test Message", +      "X-LEAP-TEST" => "true" +    }.merge(options[:headers]||{}) +    message = [] +    headers.each do |key, value| +      message << "#{key}: #{value}" +    end +    message << "" +    message << MSG_BODY +    Net::SMTP.start('localhost', 25, helo_domain) do |smtp| +      smtp.send_message message.join("\n"), recipient, sender +    end +  end + +  def assert_send_email(recipient, options={}) +    begin +      send_email(recipient, options) +    rescue IOError, Net::OpenTimeout, +           Net::ReadTimeout, Net::SMTPError => e +      fail "Could not send mail to #{recipient} (#{e})" +    end +  end + +end
\ No newline at end of file diff --git a/tests/server-tests/helpers/soledad_sync.py b/tests/server-tests/helpers/soledad_sync.py new file mode 100755 index 00000000..f4fc81ae --- /dev/null +++ b/tests/server-tests/helpers/soledad_sync.py @@ -0,0 +1,89 @@ +#!/usr/bin/env python +""" +soledad_sync.py + +This script exercises soledad synchronization. +Its exit code is 0 if the sync took place correctly, 1 otherwise. + +It takes 5 arguments: + +  uuid: uuid of the user to sync +  token: a valid session token +  server: the url of the soledad server we should connect to +  cert_file: the file containing the certificate for the CA that signed the +             cert for the soledad server. +  password: the password for the user to sync + +__author__: kali@leap.se +""" +import os +import shutil +import sys +import tempfile + +# This is needed because the twisted shipped with wheezy is too old +# to do proper ssl verification. +os.environ['SKIP_TWISTED_SSL_CHECK'] = '1' + +from twisted.internet import defer, reactor +from twisted.python import log + +from client_side_db import get_soledad_instance +from leap.common.events import flags + +flags.set_events_enabled(False) + +NUMDOCS = 1 +USAGE = "Usage: %s uuid token server cert_file password" % sys.argv[0] + + +def bail(msg, exitcode): +    print "[!] %s" % msg +    sys.exit(exitcode) + + +def create_docs(soledad): +    """ +    Populates the soledad database with dummy messages, so we can exercise +    sending payloads during the sync. +    """ +    deferreds = [] +    for index in xrange(NUMDOCS): +        deferreds.append(soledad.create_doc({'payload': 'dummy'})) +    return defer.gatherResults(deferreds) + +# main program + +if __name__ == '__main__': + +    tempdir = tempfile.mkdtemp() + +    def rm_tempdir(): +        shutil.rmtree(tempdir) + +    if len(sys.argv) < 6: +        bail(USAGE, 2) + +    uuid, token, server, cert_file, passphrase = sys.argv[1:] +    s = get_soledad_instance( +        uuid, passphrase, tempdir, server, cert_file, token) + +    def onSyncDone(sync_result): +        print "SYNC_RESULT:", sync_result +        s.close() +        rm_tempdir() +        reactor.stop() + +    def log_and_exit(f): +        log.err(f) +        rm_tempdir() +        reactor.stop() + +    def start_sync(): +        d = create_docs(s) +        d.addCallback(lambda _: s.sync()) +        d.addCallback(onSyncDone) +        d.addErrback(log_and_exit) + +    reactor.callWhenRunning(start_sync) +    reactor.run() diff --git a/tests/server-tests/helpers/srp_helper.rb b/tests/server-tests/helpers/srp_helper.rb new file mode 100644 index 00000000..b30fa768 --- /dev/null +++ b/tests/server-tests/helpers/srp_helper.rb @@ -0,0 +1,171 @@ +# +# Here are some very stripped down helper methods for SRP, useful only for +# testing the client side. +# + +require 'digest' +require 'openssl' +require 'securerandom' +require 'base64' + +module SRP + +  ## +  ## UTIL +  ## + +  module Util +    PRIME_N = <<-EOS.split.join.hex +115b8b692e0e045692cf280b436735c77a5a9e8a9e7ed56c965f87db5b2a2ece3 +    EOS +    BIG_PRIME_N = <<-EOS.split.join.hex # 1024 bits modulus (N) +eeaf0ab9adb38dd69c33f80afa8fc5e86072618775ff3c0b9ea2314c9c25657 +6d674df7496ea81d3383b4813d692c6e0e0d5d8e250b98be48e495c1d6089da +d15dc7d7b46154d6b6ce8ef4ad69b15d4982559b297bcf1885c529f566660e5 +7ec68edbc3c05726cc02fd4cbf4976eaa9afd5138fe8376435b9fc61d2fc0eb +06e3 +    EOS +    GENERATOR = 2 # g + +    def hn_xor_hg +      byte_xor_hex(sha256_int(BIG_PRIME_N), sha256_int(GENERATOR)) +    end + +    # a^n (mod m) +    def modpow(a, n, m = BIG_PRIME_N) +      r = 1 +      while true +        r = r * a % m if n[0] == 1 +        n >>= 1 +        return r if n == 0 +        a = a * a % m +      end +    end + +    #  Hashes the (long) int args +    def sha256_int(*args) +      sha256_hex(*args.map{|a| "%02x" % a}) +    end + +    #  Hashes the hex args +    def sha256_hex(*args) +      h = args.map{|a| a.length.odd? ? "0#{a}" : a }.join('') +      sha256_str([h].pack('H*')) +    end + +    def sha256_str(s) +      Digest::SHA2.hexdigest(s) +    end + +    def bigrand(bytes) +      OpenSSL::Random.random_bytes(bytes).unpack("H*")[0] +    end + +    def multiplier +      @muliplier ||= calculate_multiplier +    end + +    protected + +    def calculate_multiplier +      sha256_int(BIG_PRIME_N, GENERATOR).hex +    end + +    def byte_xor_hex(a, b) +      a = [a].pack('H*') +      b = [b].pack('H*') +      a.bytes.each_with_index.map do |a_byte, i| +        (a_byte ^ (b[i].ord || 0)).chr +      end.join +    end +  end + +  ## +  ## SESSION +  ## + +  class Session +    include SRP::Util +    attr_accessor :user +    attr_accessor :bb + +    def initialize(user, aa=nil) +      @user = user +      @a = bigrand(32).hex +    end + +    def m +      @m ||= sha256_hex(n_xor_g_long, login_hash, @user.salt.to_s(16), aa, bb, k) +    end + +    def aa +      @aa ||= modpow(GENERATOR, @a).to_s(16) # A = g^a (mod N) +    end + +    protected + +    # client: K = H( (B - kg^x) ^ (a + ux) ) +    def client_secret +      base = bb.hex +      base -= modpow(GENERATOR, @user.private_key) * multiplier +      base = base % BIG_PRIME_N +      modpow(base, @user.private_key * u.hex + @a) +    end + +    def k +      @k ||= sha256_int(client_secret) +    end + +    def n_xor_g_long +      @n_xor_g_long ||= hn_xor_hg.bytes.map{|b| "%02x" % b.ord}.join +    end + +    def login_hash +      @login_hash ||= sha256_str(@user.username) +    end + +    def u +      @u ||= sha256_hex(aa, bb) +    end +  end + +  ## +  ## Dummy USER +  ## + +  class User +    include SRP::Util + +    attr_accessor :username, :password, :salt, :verifier, :id, :session_token, :ok, :deleted + +    def initialize(username=nil) +      @username = username || "tmp_user_" + SecureRandom.urlsafe_base64(10).downcase.gsub(/[_-]/, '') +      @password = "password_" + SecureRandom.urlsafe_base64(10) +      @salt     = bigrand(4).hex +      @verifier = modpow(GENERATOR, private_key) +      @ok       = false +      @deleted  = false +    end + +    def private_key +      @private_key ||= calculate_private_key +    end + +    def to_params +      { +        'user[login]' => @username, +        'user[password_verifier]' => @verifier.to_s(16), +        'user[password_salt]' => @salt.to_s(16) +      } +    end + +    private + +    def calculate_private_key +      shex = '%x' % [@salt] +      inner = sha256_str([@username, @password].join(':')) +      sha256_hex(shex, inner).hex +    end +  end + +end | 
