phpseclib/tests/Unit/Net/SSH2UnitTest.php

433 lines
14 KiB
PHP
Raw Normal View History

2013-12-16 18:45:37 +00:00
<?php
2013-12-16 18:45:37 +00:00
/**
* @author Marc Scholten <marc@pedigital.de>
* @copyright 2013 Marc Scholten
* @license http://www.opensource.org/licenses/mit-license.html MIT License
2013-12-16 18:45:37 +00:00
*/
2022-06-04 15:31:21 +00:00
declare(strict_types=1);
namespace phpseclib3\Tests\Unit\Net;
use phpseclib3\Common\Functions\Strings;
use phpseclib3\Exception\InsufficientSetupException;
use phpseclib3\Exception\TimeoutException;
use phpseclib3\Net\SSH2;
use phpseclib3\Tests\PhpseclibTestCase;
class SSH2UnitTest extends PhpseclibTestCase
2013-12-16 18:45:37 +00:00
{
2024-02-08 03:17:27 +00:00
public static function formatLogDataProvider(): array
2013-12-16 18:45:37 +00:00
{
2017-11-27 08:30:14 +00:00
return [
[
['hello world'],
['<--'],
"<--\r\n00000000 68:65:6c:6c:6f:20:77:6f:72:6c:64 hello world\r\n\r\n",
2017-11-27 08:30:14 +00:00
],
[
['hello', 'world'],
['<--', '<--'],
2013-12-16 18:45:37 +00:00
"<--\r\n00000000 68:65:6c:6c:6f hello\r\n\r\n" .
"<--\r\n00000000 77:6f:72:6c:64 world\r\n\r\n",
2017-11-27 08:30:14 +00:00
],
];
2013-12-16 18:45:37 +00:00
}
/**
* @requires PHPUnit < 10
* Verify that MASK_* constants remain distinct
*/
2024-08-19 12:00:10 +00:00
public function testBitmapMasks(): void
{
$reflection = new \ReflectionClass(SSH2::class);
2024-11-22 23:58:43 +00:00
$masks = array_filter($reflection->getConstants(), fn ($k) => str_starts_with($k, 'MASK_'), ARRAY_FILTER_USE_KEY);
$bitmap = 0;
foreach ($masks as $mask => $bit) {
$this->assertEquals(0, $bitmap & $bit, "Got unexpected mask {$mask}");
$bitmap |= $bit;
$this->assertEquals($bit, $bitmap & $bit, "Absent expected mask {$mask}");
}
}
2013-12-16 18:45:37 +00:00
/**
* @dataProvider formatLogDataProvider
2023-02-05 23:33:16 +00:00
* @requires PHPUnit < 10
2013-12-16 18:45:37 +00:00
*/
2022-06-04 15:31:21 +00:00
public function testFormatLog(array $message_log, array $message_number_log, $expected): void
2013-12-16 18:45:37 +00:00
{
$ssh = $this->createSSHMock();
2013-12-16 18:45:37 +00:00
2017-11-27 08:30:14 +00:00
$result = self::callFunc($ssh, 'format_log', [$message_log, $message_number_log]);
2013-12-16 18:45:37 +00:00
$this->assertEquals($expected, $result);
}
2014-01-18 17:29:25 +00:00
2023-02-05 23:33:16 +00:00
/**
* @requires PHPUnit < 10
*/
2022-06-04 15:31:21 +00:00
public function testGenerateIdentifier(): void
{
2017-01-08 01:51:56 +00:00
$identifier = self::callFunc($this->createSSHMock(), 'generate_identifier');
2020-03-08 03:19:00 +00:00
$this->assertStringStartsWith('SSH-2.0-phpseclib_3.0', $identifier);
2020-12-13 01:22:36 +00:00
if (function_exists('sodium_crypto_sign_keypair')) {
2020-12-13 02:13:42 +00:00
$this->assertStringContainsString('libsodium', $identifier);
}
if (extension_loaded('openssl')) {
$this->assertStringContainsString('openssl', $identifier);
} else {
$this->assertStringNotContainsString('openssl', $identifier);
}
if (extension_loaded('gmp')) {
$this->assertStringContainsString('gmp', $identifier);
$this->assertStringNotContainsString('bcmath', $identifier);
2015-07-15 01:52:31 +00:00
} elseif (extension_loaded('bcmath')) {
$this->assertStringNotContainsString('gmp', $identifier);
$this->assertStringContainsString('bcmath', $identifier);
} else {
$this->assertStringNotContainsString('gmp', $identifier);
$this->assertStringNotContainsString('bcmath', $identifier);
}
}
2023-02-05 23:33:16 +00:00
/**
* @requires PHPUnit < 10
*/
2022-06-04 15:31:21 +00:00
public function testGetExitStatusIfNotConnected(): void
{
$ssh = $this->createSSHMock();
$this->assertFalse($ssh->getExitStatus());
}
2023-02-05 23:33:16 +00:00
/**
* @requires PHPUnit < 10
*/
2022-06-04 15:31:21 +00:00
public function testPTYIDefaultValue(): void
{
$ssh = $this->createSSHMock();
$this->assertFalse($ssh->isPTYEnabled());
}
2023-02-05 23:33:16 +00:00
/**
* @requires PHPUnit < 10
*/
2022-06-04 15:31:21 +00:00
public function testEnablePTY(): void
{
$ssh = $this->createSSHMock();
$ssh->enablePTY();
$this->assertTrue($ssh->isPTYEnabled());
$ssh->disablePTY();
$this->assertFalse($ssh->isPTYEnabled());
}
2023-02-05 23:33:16 +00:00
/**
* @requires PHPUnit < 10
*/
2022-06-04 15:31:21 +00:00
public function testQuietModeDefaultValue(): void
{
$ssh = $this->createSSHMock();
$this->assertFalse($ssh->isQuietModeEnabled());
}
2023-02-05 23:33:16 +00:00
/**
* @requires PHPUnit < 10
*/
2022-06-04 15:31:21 +00:00
public function testEnableQuietMode(): void
{
$ssh = $this->createSSHMock();
$ssh->enableQuietMode();
$this->assertTrue($ssh->isQuietModeEnabled());
$ssh->disableQuietMode();
$this->assertFalse($ssh->isQuietModeEnabled());
}
2022-06-04 15:31:21 +00:00
public function testGetConnectionByResourceId(): void
{
$ssh = new SSH2('localhost');
$this->assertSame($ssh, SSH2::getConnectionByResourceId($ssh->getResourceId()));
}
2022-06-04 15:31:21 +00:00
public function testGetResourceId(): void
{
$ssh = new SSH2('localhost');
$this->assertSame('{' . spl_object_hash($ssh) . '}', $ssh->getResourceId());
}
/**
* @requires PHPUnit < 10
*/
2023-03-16 16:01:21 +00:00
public function testReadUnauthenticated(): void
{
$this->expectException(InsufficientSetupException::class);
$this->expectExceptionMessage('Operation disallowed prior to login()');
$ssh = $this->createSSHMock();
$ssh->read();
}
/**
* @requires PHPUnit < 10
*/
2023-03-16 16:01:21 +00:00
public function testWriteUnauthenticated(): void
{
$this->expectException(InsufficientSetupException::class);
$this->expectExceptionMessage('Operation disallowed prior to login()');
$ssh = $this->createSSHMock();
$ssh->write('');
}
/**
* @requires PHPUnit < 10
*/
2023-03-16 16:01:21 +00:00
public function testWriteOpensShell(): void
{
$ssh = $this->getMockBuilder(SSH2::class)
->disableOriginalConstructor()
->setMethods(['__destruct', 'isAuthenticated', 'openShell', 'send_channel_packet'])
->getMock();
$ssh->expects($this->once())
->method('isAuthenticated')
->willReturn(true);
$ssh->expects($this->once())
->method('openShell')
->willReturn(true);
$ssh->expects($this->once())
->method('send_channel_packet')
->with(SSH2::CHANNEL_SHELL, 'hello');
$ssh->write('hello');
}
/**
* @requires PHPUnit < 10
*/
2023-03-16 16:01:21 +00:00
public function testOpenShellWhenOpen(): void
{
$ssh = $this->getMockBuilder(SSH2::class)
->disableOriginalConstructor()
->setMethods(['__destruct'])
->getMock();
$this->expectException(InsufficientSetupException::class);
$this->expectExceptionMessage('Operation disallowed prior to login()');
$this->assertFalse($ssh->openShell());
}
2023-02-28 18:52:01 +00:00
public function testGetTimeout(): void
{
$ssh = new SSH2('localhost');
$this->assertEquals(10, $ssh->getTimeout());
$ssh->setTimeout(0);
$this->assertEquals(0, $ssh->getTimeout());
$ssh->setTimeout(20);
$this->assertEquals(20, $ssh->getTimeout());
}
/**
2024-06-28 14:25:07 +00:00
* @requires PHPUnit < 10
*/
2024-07-25 05:27:03 +00:00
public function testGetStreamTimeout(): void
{
$default = ini_get('default_socket_timeout');
// no curTimeout, no keepAlive
$ssh = $this->createSSHMock();
$this->assertEquals([$default, 0], self::callFunc($ssh, 'get_stream_timeout'));
// curTimeout, no keepAlive
$ssh = $this->createSSHMock();
$ssh->setTimeout(1);
$this->assertEquals([1, 0], self::callFunc($ssh, 'get_stream_timeout'));
// no curTimeout, keepAlive
$ssh = $this->createSSHMock();
$ssh->setKeepAlive(2);
self::setVar($ssh, 'last_packet', microtime(true));
2024-07-25 05:27:03 +00:00
[$sec, $usec] = self::callFunc($ssh, 'get_stream_timeout');
$this->assertGreaterThanOrEqual(1, $sec);
$this->assertLessThanOrEqual(2, $sec);
// smaller curTimeout, keepAlive
$ssh = $this->createSSHMock();
$ssh->setTimeout(1);
$ssh->setKeepAlive(2);
self::setVar($ssh, 'last_packet', microtime(true));
$this->assertEquals([1, 0], self::callFunc($ssh, 'get_stream_timeout'));
// curTimeout, smaller keepAlive
$ssh = $this->createSSHMock();
$ssh->setTimeout(5);
$ssh->setKeepAlive(2);
self::setVar($ssh, 'last_packet', microtime(true));
2024-07-25 05:27:03 +00:00
[$sec, $usec] = self::callFunc($ssh, 'get_stream_timeout');
$this->assertGreaterThanOrEqual(1, $sec);
$this->assertLessThanOrEqual(2, $sec);
// no curTimeout, keepAlive, no last_packet
$ssh = $this->createSSHMock();
$ssh->setKeepAlive(2);
$this->assertEquals([0, 0], self::callFunc($ssh, 'get_stream_timeout'));
// no curTimeout, keepAlive, last_packet exceeds keepAlive
$ssh = $this->createSSHMock();
$ssh->setKeepAlive(2);
self::setVar($ssh, 'last_packet', microtime(true) - 2);
$this->assertEquals([0, 0], self::callFunc($ssh, 'get_stream_timeout'));
}
/**
* @requires PHPUnit < 10
*/
2024-07-25 05:27:03 +00:00
public function testSendChannelPacketNoBufferedData(): void
{
$ssh = $this->getMockBuilder('phpseclib3\Net\SSH2')
->disableOriginalConstructor()
->setMethods(['get_channel_packet', 'send_binary_packet'])
->getMock();
$ssh->expects($this->once())
->method('get_channel_packet')
->with(-1)
2024-07-25 05:27:03 +00:00
->willReturnCallback(function () use ($ssh): void {
self::setVar($ssh, 'window_size_client_to_server', [1 => 0x7FFFFFFF]);
});
$ssh->expects($this->once())
->method('send_binary_packet')
2024-07-25 04:57:54 +00:00
->with(Strings::packSSH2('CNs', SSH2\MessageType::CHANNEL_DATA, 1, 'hello world'));
self::setVar($ssh, 'server_channels', [1 => 1]);
self::setVar($ssh, 'packet_size_client_to_server', [1 => 0x7FFFFFFF]);
self::setVar($ssh, 'window_size_client_to_server', [1 => 0]);
self::setVar($ssh, 'window_size_server_to_client', [1 => 0x7FFFFFFF]);
self::callFunc($ssh, 'send_channel_packet', [1, 'hello world']);
$this->assertEmpty(self::getVar($ssh, 'channel_buffers_write'));
}
/**
* @requires PHPUnit < 10
*/
2024-07-25 05:27:03 +00:00
public function testSendChannelPacketBufferedData(): void
{
$ssh = $this->getMockBuilder('phpseclib3\Net\SSH2')
->disableOriginalConstructor()
->setMethods(['get_channel_packet', 'send_binary_packet'])
->getMock();
$ssh->expects($this->once())
->method('get_channel_packet')
->with(-1)
2024-07-25 05:27:03 +00:00
->willReturnCallback(function () use ($ssh): void {
self::setVar($ssh, 'window_size_client_to_server', [1 => 0x7FFFFFFF]);
});
$ssh->expects($this->once())
->method('send_binary_packet')
2024-07-25 04:57:54 +00:00
->with(Strings::packSSH2('CNs', SSH2\MessageType::CHANNEL_DATA, 1, ' world'));
self::setVar($ssh, 'channel_buffers_write', [1 => 'hello']);
self::setVar($ssh, 'server_channels', [1 => 1]);
self::setVar($ssh, 'packet_size_client_to_server', [1 => 0x7FFFFFFF]);
self::setVar($ssh, 'window_size_client_to_server', [1 => 0]);
self::setVar($ssh, 'window_size_server_to_client', [1 => 0x7FFFFFFF]);
self::callFunc($ssh, 'send_channel_packet', [1, 'hello world']);
$this->assertEmpty(self::getVar($ssh, 'channel_buffers_write'));
}
/**
* @requires PHPUnit < 10
*/
2024-07-25 05:27:03 +00:00
public function testSendChannelPacketTimeout(): void
{
$this->expectException(TimeoutException::class);
$this->expectExceptionMessage('Timed out waiting for server');
$ssh = $this->getMockBuilder('phpseclib3\Net\SSH2')
->disableOriginalConstructor()
->setMethods(['get_channel_packet', 'send_binary_packet'])
->getMock();
$ssh->expects($this->once())
->method('get_channel_packet')
->with(-1)
2024-07-25 05:27:03 +00:00
->willReturnCallback(function () use ($ssh): void {
self::setVar($ssh, 'is_timeout', true);
});
$ssh->expects($this->once())
->method('send_binary_packet')
2024-07-25 04:57:54 +00:00
->with(Strings::packSSH2('CNs', SSH2\MessageType::CHANNEL_DATA, 1, 'hello'));
self::setVar($ssh, 'server_channels', [1 => 1]);
self::setVar($ssh, 'packet_size_client_to_server', [1 => 0x7FFFFFFF]);
self::setVar($ssh, 'window_size_client_to_server', [1 => 5]);
self::setVar($ssh, 'window_size_server_to_client', [1 => 0x7FFFFFFF]);
self::callFunc($ssh, 'send_channel_packet', [1, 'hello world']);
$this->assertEquals([1 => 'hello'], self::getVar($ssh, 'channel_buffers_write'));
}
/**
* @requires PHPUnit < 10
*/
2024-07-25 05:27:03 +00:00
public function testSendChannelPacketNoWindowAdjustment(): void
{
$this->expectException(\RuntimeException::class);
$this->expectExceptionMessage('Data window was not adjusted');
$ssh = $this->getMockBuilder('phpseclib3\Net\SSH2')
->disableOriginalConstructor()
->setMethods(['get_channel_packet', 'send_binary_packet'])
->getMock();
$ssh->expects($this->once())
->method('get_channel_packet')
->with(-1);
$ssh->expects($this->never())
->method('send_binary_packet');
self::setVar($ssh, 'server_channels', [1 => 1]);
self::setVar($ssh, 'packet_size_client_to_server', [1 => 0x7FFFFFFF]);
self::setVar($ssh, 'window_size_client_to_server', [1 => 0]);
self::setVar($ssh, 'window_size_server_to_client', [1 => 0x7FFFFFFF]);
self::callFunc($ssh, 'send_channel_packet', [1, 'hello world']);
}
/**
* @requires PHPUnit < 10
*/
2024-08-19 12:00:10 +00:00
public function testDisconnectHelper(): void
{
$ssh = $this->getMockBuilder('phpseclib3\Net\SSH2')
->disableOriginalConstructor()
->setMethods(['__destruct', 'isConnected', 'send_binary_packet'])
->getMock();
$ssh->expects($this->once())
->method('isConnected')
->willReturn(true);
$ssh->expects($this->once())
->method('send_binary_packet')
->with($this->isType('string'))
2024-08-19 12:00:10 +00:00
->willReturnCallback(function () use ($ssh): void {
self::callFunc($ssh, 'disconnect_helper', [1]);
throw new \Exception('catch me');
});
$this->assertEquals(0, self::getVar($ssh, 'bitmap'));
self::callFunc($ssh, 'disconnect_helper', [1]);
$this->assertEquals(0, self::getVar($ssh, 'bitmap'));
}
protected function createSSHMock(): SSH2
{
return $this->getMockBuilder('phpseclib3\Net\SSH2')
->disableOriginalConstructor()
2017-11-27 08:30:14 +00:00
->setMethods(['__destruct'])
->getMock();
}
2013-12-16 18:45:37 +00:00
}