forked from rpms/openssh
155 lines
5.8 KiB
Bash
Executable File
155 lines
5.8 KiB
Bash
Executable File
#!/bin/bash
|
|
# vim: dict+=/usr/share/beakerlib/dictionary.vim cpt=.,w,b,u,t,i,k
|
|
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
#
|
|
# runtest.sh of /CoreOS/openssh/Sanity/port-forwarding
|
|
# Description: Testing port forwarding (ideally all possibilities: -L, -R, -D)
|
|
# Author: Stanislav Zidek <szidek@redhat.com>
|
|
#
|
|
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
#
|
|
# Copyright (c) 2015 Red Hat, Inc.
|
|
#
|
|
# This program is free software: you can redistribute it and/or
|
|
# modify it under the terms of the GNU General Public License as
|
|
# published by the Free Software Foundation, either version 2 of
|
|
# the License, or (at your option) any later version.
|
|
#
|
|
# This program is distributed in the hope that it will be
|
|
# useful, but WITHOUT ANY WARRANTY; without even the implied
|
|
# warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR
|
|
# PURPOSE. See the GNU General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU General Public License
|
|
# along with this program. If not, see http://www.gnu.org/licenses/.
|
|
#
|
|
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
|
|
# Include Beaker environment
|
|
. /usr/share/beakerlib/beakerlib.sh || exit 1
|
|
|
|
PACKAGE="openssh"
|
|
USER="user$RANDOM"
|
|
FORWARDED=$((RANDOM % 100 + 6800))
|
|
LISTEN=$((RANDOM % 100 + 6900))
|
|
TIMEOUT=5
|
|
MESSAGE="HUGE_SUCCESS"
|
|
SSH_OPTIONS="-o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no"
|
|
|
|
rlJournalStart
|
|
rlPhaseStartSetup
|
|
rlAssertRpm $PACKAGE
|
|
rlFileBackup /etc/ssh/sshd_config /var/log/secure
|
|
rlRun "useradd -m $USER"
|
|
rlRun "su - $USER -c \"mkdir .ssh; chmod 700 .ssh; cd .ssh; ssh-keygen -N '' -f id_rsa; cat id_rsa.pub >authorized_keys; chmod 600 authorized_keys\""
|
|
rlRun "echo 'LogLevel DEBUG' >>/etc/ssh/sshd_config"
|
|
rlRun "echo '' >/var/log/secure"
|
|
rlServiceStart sshd
|
|
rlRun "IP=\$( ip a |grep 'scope global' |grep -w inet |cut -d'/' -f1 |awk '{ print \$2 }' |tail -1 )"
|
|
rlRun "echo 'IP=$IP'"
|
|
rlRun "TmpDir=\$(mktemp -d)" 0 "Creating tmp directory"
|
|
rlRun "pushd $TmpDir"
|
|
rlPhaseEnd
|
|
|
|
forwarding_test() {
|
|
EXP_RESULT=$1
|
|
FORWARDED=$2
|
|
HOST=$3
|
|
LISTEN=$4
|
|
|
|
rlRun "nc -l $LISTEN &>listen.log &"
|
|
LISTEN_PID=$!
|
|
rlWaitForSocket $LISTEN -t $TIMEOUT
|
|
rlRun "ps -fp $LISTEN_PID"
|
|
rlRun "su - $USER -c \"ssh $SSH_OPTIONS -N -L $FORWARDED:$HOST:$LISTEN $USER@localhost &\" &>tunnel.log"
|
|
rlRun "ps -fC ssh"
|
|
rlRun "SSH_PID=\$( pgrep -n -u $USER ssh )"
|
|
rlRun "echo SSH_PID is '$SSH_PID'"
|
|
rlWaitForSocket $FORWARDED -t $TIMEOUT
|
|
rlRun "[[ -n '$SSH_PID' ]] && ps -fp $SSH_PID"
|
|
rlRun "echo '$MESSAGE'|nc localhost $FORWARDED" 0,1
|
|
|
|
if [[ $EXP_RESULT == "success" ]]; then
|
|
rlAssertGrep "$MESSAGE" listen.log
|
|
else # failure expected
|
|
rlAssertGrep "open failed" tunnel.log -i
|
|
rlAssertGrep "administratively prohibited" tunnel.log -i
|
|
rlAssertNotGrep "$MESSAGE" listen.log
|
|
fi
|
|
|
|
rlRun "kill -9 $LISTEN_PID $SSH_PID" 0,1 "Killing cleanup"
|
|
rlWaitForSocket $LISTEN -t $TIMEOUT --close
|
|
rlWaitForSocket $FORWARDED -t $TIMEOUT --close
|
|
if ! rlGetPhaseState; then
|
|
rlRun "cat listen.log"
|
|
rlRun "cat tunnel.log"
|
|
rlRun "cat /var/log/secure"
|
|
fi
|
|
rlFileSubmit listen.log tunnel.log /var/log/secure
|
|
rlRun "rm -f *.log; echo '' >/var/log/secure"
|
|
}
|
|
|
|
rlPhaseStartTest "Local forwarding"
|
|
forwarding_test "success" $FORWARDED localhost $LISTEN
|
|
((FORWARDED+=1))
|
|
((LISTEN+=1))
|
|
rlPhaseEnd
|
|
|
|
rlPhaseStartTest "PermitOpen with 'any'"
|
|
rlFileBackup --namespace permitopen_any /etc/ssh/sshd_config /etc/hosts
|
|
rlRun "echo 'PermitOpen any' >>/etc/ssh/sshd_config"
|
|
rlRun "echo '$IP anyhost1 anyhost2' >>/etc/hosts"
|
|
rlRun "service sshd restart"
|
|
for i in `seq 3`; do
|
|
forwarding_test "success" $FORWARDED anyhost1 $LISTEN
|
|
forwarding_test "success" $FORWARDED anyhost2 $LISTEN
|
|
((FORWARDED+=1))
|
|
((LISTEN+=1))
|
|
done
|
|
rlFileRestore --namespace permitopen_any
|
|
rlPhaseEnd
|
|
|
|
if ! rlIsRHEL '<6.7'; then
|
|
# PermitOpen with wildcards is new feature in RHEL-6.7
|
|
rlPhaseStartTest "PermitOpen with port wildcard"
|
|
rlFileBackup --namespace port_wildcard /etc/ssh/sshd_config /etc/hosts
|
|
rlRun "echo 'PermitOpen wildportallow:*' >>/etc/ssh/sshd_config"
|
|
rlRun "echo '$IP wildportallow wildportdeny' >>/etc/hosts"
|
|
rlRun "service sshd restart"
|
|
forwarding_test "success" $FORWARDED wildportallow $LISTEN
|
|
((FORWARDED+=1))
|
|
((LISTEN+=1))
|
|
forwarding_test "failure" $FORWARDED wildportdeny $LISTEN
|
|
((FORWARDED+=1))
|
|
((LISTEN+=1))
|
|
rlFileRestore --namespace port_wildcard
|
|
rlRun "service sshd restart"
|
|
rlPhaseEnd
|
|
fi
|
|
|
|
if ! rlIsRHEL '<7.3'; then
|
|
rlPhaseStartTest "PermitOpen with host wildcard and specific port"
|
|
rlFileBackup --namespace host_wildcard /etc/ssh/sshd_config /etc/hosts
|
|
rlRun "echo 'PermitOpen *:$LISTEN' >>/etc/ssh/sshd_config"
|
|
rlRun "echo '$IP wildhost1 wildhost2' >>/etc/hosts"
|
|
rlRun "service sshd restart"
|
|
forwarding_test "success" $FORWARDED wildhost1 $LISTEN
|
|
((FORWARDED+=1))
|
|
forwarding_test "success" $FORWARDED wildhost2 $LISTEN
|
|
((FORWARDED+=1))
|
|
((LISTEN+=1)) # different listen port, should fail
|
|
forwarding_test "failure" $FORWARDED wildhost2 $LISTEN
|
|
rlFileRestore --namespace host_wildcard
|
|
rlPhaseEnd
|
|
fi
|
|
|
|
rlPhaseStartCleanup
|
|
rlRun "userdel -r $USER"
|
|
rlRun "popd"
|
|
rlFileRestore
|
|
rlServiceRestore sshd
|
|
rlRun "rm -r $TmpDir" 0 "Removing tmp directory"
|
|
rlPhaseEnd
|
|
rlJournalPrintText
|
|
rlJournalEnd
|