net-ssh-net-ssh 2.0.12
Sign up to get free protection for your applications and to get access to all the features.
- data/CHANGELOG.rdoc +137 -0
- data/Manifest +104 -0
- data/README.rdoc +110 -0
- data/Rakefile +79 -0
- data/THANKS.rdoc +16 -0
- data/lib/net/ssh.rb +215 -0
- data/lib/net/ssh/authentication/agent.rb +176 -0
- data/lib/net/ssh/authentication/constants.rb +18 -0
- data/lib/net/ssh/authentication/key_manager.rb +193 -0
- data/lib/net/ssh/authentication/methods/abstract.rb +60 -0
- data/lib/net/ssh/authentication/methods/hostbased.rb +71 -0
- data/lib/net/ssh/authentication/methods/keyboard_interactive.rb +66 -0
- data/lib/net/ssh/authentication/methods/password.rb +39 -0
- data/lib/net/ssh/authentication/methods/publickey.rb +92 -0
- data/lib/net/ssh/authentication/pageant.rb +183 -0
- data/lib/net/ssh/authentication/session.rb +134 -0
- data/lib/net/ssh/buffer.rb +340 -0
- data/lib/net/ssh/buffered_io.rb +149 -0
- data/lib/net/ssh/config.rb +181 -0
- data/lib/net/ssh/connection/channel.rb +625 -0
- data/lib/net/ssh/connection/constants.rb +33 -0
- data/lib/net/ssh/connection/session.rb +596 -0
- data/lib/net/ssh/connection/term.rb +178 -0
- data/lib/net/ssh/errors.rb +85 -0
- data/lib/net/ssh/key_factory.rb +102 -0
- data/lib/net/ssh/known_hosts.rb +129 -0
- data/lib/net/ssh/loggable.rb +61 -0
- data/lib/net/ssh/packet.rb +102 -0
- data/lib/net/ssh/prompt.rb +93 -0
- data/lib/net/ssh/proxy/errors.rb +14 -0
- data/lib/net/ssh/proxy/http.rb +94 -0
- data/lib/net/ssh/proxy/socks4.rb +70 -0
- data/lib/net/ssh/proxy/socks5.rb +129 -0
- data/lib/net/ssh/ruby_compat.rb +7 -0
- data/lib/net/ssh/service/forward.rb +267 -0
- data/lib/net/ssh/test.rb +89 -0
- data/lib/net/ssh/test/channel.rb +129 -0
- data/lib/net/ssh/test/extensions.rb +152 -0
- data/lib/net/ssh/test/kex.rb +44 -0
- data/lib/net/ssh/test/local_packet.rb +51 -0
- data/lib/net/ssh/test/packet.rb +81 -0
- data/lib/net/ssh/test/remote_packet.rb +38 -0
- data/lib/net/ssh/test/script.rb +157 -0
- data/lib/net/ssh/test/socket.rb +59 -0
- data/lib/net/ssh/transport/algorithms.rb +384 -0
- data/lib/net/ssh/transport/cipher_factory.rb +84 -0
- data/lib/net/ssh/transport/constants.rb +30 -0
- data/lib/net/ssh/transport/hmac.rb +31 -0
- data/lib/net/ssh/transport/hmac/abstract.rb +78 -0
- data/lib/net/ssh/transport/hmac/md5.rb +12 -0
- data/lib/net/ssh/transport/hmac/md5_96.rb +11 -0
- data/lib/net/ssh/transport/hmac/none.rb +15 -0
- data/lib/net/ssh/transport/hmac/sha1.rb +13 -0
- data/lib/net/ssh/transport/hmac/sha1_96.rb +11 -0
- data/lib/net/ssh/transport/identity_cipher.rb +55 -0
- data/lib/net/ssh/transport/kex.rb +13 -0
- data/lib/net/ssh/transport/kex/diffie_hellman_group1_sha1.rb +208 -0
- data/lib/net/ssh/transport/kex/diffie_hellman_group_exchange_sha1.rb +77 -0
- data/lib/net/ssh/transport/openssl.rb +128 -0
- data/lib/net/ssh/transport/packet_stream.rb +230 -0
- data/lib/net/ssh/transport/server_version.rb +69 -0
- data/lib/net/ssh/transport/session.rb +276 -0
- data/lib/net/ssh/transport/state.rb +206 -0
- data/lib/net/ssh/verifiers/lenient.rb +30 -0
- data/lib/net/ssh/verifiers/null.rb +12 -0
- data/lib/net/ssh/verifiers/strict.rb +53 -0
- data/lib/net/ssh/version.rb +62 -0
- data/net-ssh.gemspec +128 -0
- data/setup.rb +1585 -0
- data/test/authentication/methods/common.rb +28 -0
- data/test/authentication/methods/test_abstract.rb +51 -0
- data/test/authentication/methods/test_hostbased.rb +114 -0
- data/test/authentication/methods/test_keyboard_interactive.rb +98 -0
- data/test/authentication/methods/test_password.rb +50 -0
- data/test/authentication/methods/test_publickey.rb +127 -0
- data/test/authentication/test_agent.rb +205 -0
- data/test/authentication/test_key_manager.rb +105 -0
- data/test/authentication/test_session.rb +93 -0
- data/test/common.rb +106 -0
- data/test/configs/eqsign +3 -0
- data/test/configs/exact_match +8 -0
- data/test/configs/wild_cards +14 -0
- data/test/connection/test_channel.rb +452 -0
- data/test/connection/test_session.rb +488 -0
- data/test/test_all.rb +6 -0
- data/test/test_buffer.rb +336 -0
- data/test/test_buffered_io.rb +63 -0
- data/test/test_config.rb +84 -0
- data/test/test_key_factory.rb +67 -0
- data/test/transport/hmac/test_md5.rb +39 -0
- data/test/transport/hmac/test_md5_96.rb +25 -0
- data/test/transport/hmac/test_none.rb +34 -0
- data/test/transport/hmac/test_sha1.rb +34 -0
- data/test/transport/hmac/test_sha1_96.rb +25 -0
- data/test/transport/kex/test_diffie_hellman_group1_sha1.rb +146 -0
- data/test/transport/kex/test_diffie_hellman_group_exchange_sha1.rb +92 -0
- data/test/transport/test_algorithms.rb +302 -0
- data/test/transport/test_cipher_factory.rb +171 -0
- data/test/transport/test_hmac.rb +34 -0
- data/test/transport/test_identity_cipher.rb +40 -0
- data/test/transport/test_packet_stream.rb +435 -0
- data/test/transport/test_server_version.rb +68 -0
- data/test/transport/test_session.rb +315 -0
- data/test/transport/test_state.rb +173 -0
- metadata +162 -0
@@ -0,0 +1,488 @@
|
|
1
|
+
require 'common'
|
2
|
+
require 'net/ssh/connection/session'
|
3
|
+
|
4
|
+
module Connection
|
5
|
+
|
6
|
+
class TestSession < Test::Unit::TestCase
|
7
|
+
include Net::SSH::Connection::Constants
|
8
|
+
|
9
|
+
def test_constructor_should_set_defaults
|
10
|
+
assert session.channels.empty?
|
11
|
+
assert session.pending_requests.empty?
|
12
|
+
assert_equal({ socket => nil }, session.listeners)
|
13
|
+
end
|
14
|
+
|
15
|
+
def test_on_open_channel_should_register_block_with_given_channel_type
|
16
|
+
flag = false
|
17
|
+
session.on_open_channel("testing") { flag = true }
|
18
|
+
assert_not_nil session.channel_open_handlers["testing"]
|
19
|
+
session.channel_open_handlers["testing"].call
|
20
|
+
assert flag, "callback should have been invoked"
|
21
|
+
end
|
22
|
+
|
23
|
+
def test_forward_should_create_and_cache_instance_of_forward_service
|
24
|
+
assert_instance_of Net::SSH::Service::Forward, session.forward
|
25
|
+
assert_equal session.forward.object_id, session.forward.object_id
|
26
|
+
end
|
27
|
+
|
28
|
+
def test_listen_to_without_callback_should_add_argument_as_listener
|
29
|
+
io = stub("io")
|
30
|
+
session.listen_to(io)
|
31
|
+
assert session.listeners.key?(io)
|
32
|
+
assert_nil session.listeners[io]
|
33
|
+
end
|
34
|
+
|
35
|
+
def test_listen_to_should_add_argument_to_listeners_list_if_block_is_given
|
36
|
+
io = stub("io", :pending_write? => true)
|
37
|
+
flag = false
|
38
|
+
session.listen_to(io) { flag = true }
|
39
|
+
assert !flag, "callback should not be invoked immediately"
|
40
|
+
assert session.listeners.key?(io)
|
41
|
+
session.listeners[io].call
|
42
|
+
assert flag, "callback should have been invoked"
|
43
|
+
end
|
44
|
+
|
45
|
+
def test_stop_listening_to_should_remove_argument_from_listeners
|
46
|
+
io = stub("io", :pending_write? => true)
|
47
|
+
|
48
|
+
session.listen_to(io)
|
49
|
+
assert session.listeners.key?(io)
|
50
|
+
|
51
|
+
session.stop_listening_to(io)
|
52
|
+
assert !session.listeners.key?(io)
|
53
|
+
end
|
54
|
+
|
55
|
+
def test_send_message_should_enqueue_message_at_transport_layer
|
56
|
+
packet = P(:byte, REQUEST_SUCCESS)
|
57
|
+
session.send_message(packet)
|
58
|
+
assert_equal packet.to_s, socket.write_buffer
|
59
|
+
end
|
60
|
+
|
61
|
+
def test_open_channel_defaults_should_use_session_channel
|
62
|
+
flag = false
|
63
|
+
channel = session.open_channel { flag = true }
|
64
|
+
assert !flag, "callback should not be invoked immediately"
|
65
|
+
channel.do_open_confirmation(1,2,3)
|
66
|
+
assert flag, "callback should have been invoked"
|
67
|
+
assert_equal "session", channel.type
|
68
|
+
assert_equal 0, channel.local_id
|
69
|
+
assert_equal channel, session.channels[channel.local_id]
|
70
|
+
|
71
|
+
packet = P(:byte, CHANNEL_OPEN, :string, "session", :long, channel.local_id,
|
72
|
+
:long, channel.local_maximum_window_size, :long, channel.local_maximum_packet_size)
|
73
|
+
assert_equal packet.to_s, socket.write_buffer
|
74
|
+
end
|
75
|
+
|
76
|
+
def test_open_channel_with_type_should_use_type
|
77
|
+
channel = session.open_channel("direct-tcpip")
|
78
|
+
assert_equal "direct-tcpip", channel.type
|
79
|
+
packet = P(:byte, CHANNEL_OPEN, :string, "direct-tcpip", :long, channel.local_id,
|
80
|
+
:long, channel.local_maximum_window_size, :long, channel.local_maximum_packet_size)
|
81
|
+
assert_equal packet.to_s, socket.write_buffer
|
82
|
+
end
|
83
|
+
|
84
|
+
def test_open_channel_with_extras_should_append_extras_to_packet
|
85
|
+
channel = session.open_channel("direct-tcpip", :string, "other.host", :long, 1234)
|
86
|
+
packet = P(:byte, CHANNEL_OPEN, :string, "direct-tcpip", :long, channel.local_id,
|
87
|
+
:long, channel.local_maximum_window_size, :long, channel.local_maximum_packet_size,
|
88
|
+
:string, "other.host", :long, 1234)
|
89
|
+
assert_equal packet.to_s, socket.write_buffer
|
90
|
+
end
|
91
|
+
|
92
|
+
def test_send_global_request_without_callback_should_not_expect_reply
|
93
|
+
packet = P(:byte, GLOBAL_REQUEST, :string, "testing", :bool, false)
|
94
|
+
session.send_global_request("testing")
|
95
|
+
assert_equal packet.to_s, socket.write_buffer
|
96
|
+
assert session.pending_requests.empty?
|
97
|
+
end
|
98
|
+
|
99
|
+
def test_send_global_request_with_callback_should_expect_reply
|
100
|
+
packet = P(:byte, GLOBAL_REQUEST, :string, "testing", :bool, true)
|
101
|
+
proc = Proc.new {}
|
102
|
+
session.send_global_request("testing", &proc)
|
103
|
+
assert_equal packet.to_s, socket.write_buffer
|
104
|
+
assert_equal [proc], session.pending_requests
|
105
|
+
end
|
106
|
+
|
107
|
+
def test_send_global_request_with_extras_should_append_extras_to_packet
|
108
|
+
packet = P(:byte, GLOBAL_REQUEST, :string, "testing", :bool, false, :string, "other.host", :long, 1234)
|
109
|
+
session.send_global_request("testing", :string, "other.host", :long, 1234)
|
110
|
+
assert_equal packet.to_s, socket.write_buffer
|
111
|
+
end
|
112
|
+
|
113
|
+
def test_process_should_exit_immediately_if_block_is_false
|
114
|
+
session.channels[0] = stub("channel", :closing? => false)
|
115
|
+
session.channels[0].expects(:process).never
|
116
|
+
process_times(0)
|
117
|
+
end
|
118
|
+
|
119
|
+
def test_process_should_exit_after_processing_if_block_is_true_then_false
|
120
|
+
session.channels[0] = stub("channel", :closing? => false)
|
121
|
+
session.channels[0].expects(:process)
|
122
|
+
IO.expects(:select).never
|
123
|
+
process_times(2)
|
124
|
+
end
|
125
|
+
|
126
|
+
def test_process_should_not_process_channels_that_are_closing
|
127
|
+
session.channels[0] = stub("channel", :closing? => true)
|
128
|
+
session.channels[0].expects(:process).never
|
129
|
+
IO.expects(:select).never
|
130
|
+
process_times(2)
|
131
|
+
end
|
132
|
+
|
133
|
+
def test_global_request_packets_should_be_silently_handled_if_no_handler_exists_for_them
|
134
|
+
transport.return(GLOBAL_REQUEST, :string, "testing", :bool, false)
|
135
|
+
process_times(2)
|
136
|
+
assert transport.queue.empty?
|
137
|
+
assert !socket.pending_write?
|
138
|
+
end
|
139
|
+
|
140
|
+
def test_global_request_packets_should_be_auto_replied_to_even_if_no_handler_exists
|
141
|
+
transport.return(GLOBAL_REQUEST, :string, "testing", :bool, true)
|
142
|
+
process_times(2)
|
143
|
+
assert_equal P(:byte, REQUEST_FAILURE).to_s, socket.write_buffer
|
144
|
+
end
|
145
|
+
|
146
|
+
def test_global_request_handler_should_not_trigger_auto_reply_if_no_reply_is_wanted
|
147
|
+
flag = false
|
148
|
+
session.on_global_request("testing") { flag = true }
|
149
|
+
assert !flag, "callback should not be invoked yet"
|
150
|
+
transport.return(GLOBAL_REQUEST, :string, "testing", :bool, false)
|
151
|
+
process_times(2)
|
152
|
+
assert transport.queue.empty?
|
153
|
+
assert !socket.pending_write?
|
154
|
+
assert flag, "callback should have been invoked"
|
155
|
+
end
|
156
|
+
|
157
|
+
def test_global_request_handler_returning_true_should_trigger_success_auto_reply
|
158
|
+
flag = false
|
159
|
+
session.on_global_request("testing") { flag = true }
|
160
|
+
transport.return(GLOBAL_REQUEST, :string, "testing", :bool, true)
|
161
|
+
process_times(2)
|
162
|
+
assert_equal P(:byte, REQUEST_SUCCESS).to_s, socket.write_buffer
|
163
|
+
assert flag
|
164
|
+
end
|
165
|
+
|
166
|
+
def test_global_request_handler_returning_false_should_trigger_failure_auto_reply
|
167
|
+
flag = false
|
168
|
+
session.on_global_request("testing") { flag = true; false }
|
169
|
+
transport.return(GLOBAL_REQUEST, :string, "testing", :bool, true)
|
170
|
+
process_times(2)
|
171
|
+
assert_equal P(:byte, REQUEST_FAILURE).to_s, socket.write_buffer
|
172
|
+
assert flag
|
173
|
+
end
|
174
|
+
|
175
|
+
def test_global_request_handler_returning_sent_should_not_trigger_auto_reply
|
176
|
+
flag = false
|
177
|
+
session.on_global_request("testing") { flag = true; :sent }
|
178
|
+
transport.return(GLOBAL_REQUEST, :string, "testing", :bool, true)
|
179
|
+
process_times(2)
|
180
|
+
assert !socket.pending_write?
|
181
|
+
assert flag
|
182
|
+
end
|
183
|
+
|
184
|
+
def test_global_request_handler_returning_other_value_should_raise_error
|
185
|
+
session.on_global_request("testing") { "bug" }
|
186
|
+
transport.return(GLOBAL_REQUEST, :string, "testing", :bool, true)
|
187
|
+
assert_raises(RuntimeError) { process_times(2) }
|
188
|
+
end
|
189
|
+
|
190
|
+
def test_request_success_packets_should_invoke_next_pending_request_with_true
|
191
|
+
result = nil
|
192
|
+
session.pending_requests << Proc.new { |*args| result = args }
|
193
|
+
transport.return(REQUEST_SUCCESS)
|
194
|
+
process_times(2)
|
195
|
+
assert_equal [true, P(:byte, REQUEST_SUCCESS)], result
|
196
|
+
assert session.pending_requests.empty?
|
197
|
+
end
|
198
|
+
|
199
|
+
def test_request_failure_packets_should_invoke_next_pending_request_with_false
|
200
|
+
result = nil
|
201
|
+
session.pending_requests << Proc.new { |*args| result = args }
|
202
|
+
transport.return(REQUEST_FAILURE)
|
203
|
+
process_times(2)
|
204
|
+
assert_equal [false, P(:byte, REQUEST_FAILURE)], result
|
205
|
+
assert session.pending_requests.empty?
|
206
|
+
end
|
207
|
+
|
208
|
+
def test_channel_open_packet_without_corresponding_channel_open_handler_should_result_in_channel_open_failure
|
209
|
+
transport.return(CHANNEL_OPEN, :string, "auth-agent", :long, 14, :long, 0x20000, :long, 0x10000)
|
210
|
+
process_times(2)
|
211
|
+
assert_equal P(:byte, CHANNEL_OPEN_FAILURE, :long, 14, :long, 3, :string, "unknown channel type auth-agent", :string, "").to_s, socket.write_buffer
|
212
|
+
end
|
213
|
+
|
214
|
+
def test_channel_open_packet_with_corresponding_handler_should_result_in_channel_open_failure_when_handler_returns_an_error
|
215
|
+
transport.return(CHANNEL_OPEN, :string, "auth-agent", :long, 14, :long, 0x20000, :long, 0x10000)
|
216
|
+
session.on_open_channel "auth-agent" do |s, ch, p|
|
217
|
+
raise Net::SSH::ChannelOpenFailed.new(1234, "we iz in ur channelz!")
|
218
|
+
end
|
219
|
+
process_times(2)
|
220
|
+
assert_equal P(:byte, CHANNEL_OPEN_FAILURE, :long, 14, :long, 1234, :string, "we iz in ur channelz!", :string, "").to_s, socket.write_buffer
|
221
|
+
end
|
222
|
+
|
223
|
+
def test_channel_open_packet_with_corresponding_handler_should_result_in_channel_open_confirmation_when_handler_succeeds
|
224
|
+
transport.return(CHANNEL_OPEN, :string, "auth-agent", :long, 14, :long, 0x20001, :long, 0x10001)
|
225
|
+
result = nil
|
226
|
+
session.on_open_channel("auth-agent") { |*args| result = args }
|
227
|
+
process_times(2)
|
228
|
+
assert_equal P(:byte, CHANNEL_OPEN_CONFIRMATION, :long, 14, :long, 0, :long, 0x20000, :long, 0x10000).to_s, socket.write_buffer
|
229
|
+
assert_not_nil(ch = session.channels[0])
|
230
|
+
assert_equal [session, ch, P(:byte, CHANNEL_OPEN, :string, "auth-agent", :long, 14, :long, 0x20001, :long, 0x10001)], result
|
231
|
+
assert_equal 0, ch.local_id
|
232
|
+
assert_equal 14, ch.remote_id
|
233
|
+
assert_equal 0x20001, ch.remote_maximum_window_size
|
234
|
+
assert_equal 0x10001, ch.remote_maximum_packet_size
|
235
|
+
assert_equal 0x20000, ch.local_maximum_window_size
|
236
|
+
assert_equal 0x10000, ch.local_maximum_packet_size
|
237
|
+
assert_equal "auth-agent", ch.type
|
238
|
+
end
|
239
|
+
|
240
|
+
def test_channel_open_failure_should_remove_channel_and_tell_channel_that_open_failed
|
241
|
+
session.channels[1] = stub("channel")
|
242
|
+
session.channels[1].expects(:do_open_failed).with(1234, "some reason")
|
243
|
+
transport.return(CHANNEL_OPEN_FAILURE, :long, 1, :long, 1234, :string, "some reason", :string, "lang tag")
|
244
|
+
process_times(2)
|
245
|
+
assert session.channels.empty?
|
246
|
+
end
|
247
|
+
|
248
|
+
def test_channel_open_confirmation_packet_should_be_routed_to_corresponding_channel
|
249
|
+
channel_at(14).expects(:do_open_confirmation).with(1234, 0x20001, 0x10001)
|
250
|
+
transport.return(CHANNEL_OPEN_CONFIRMATION, :long, 14, :long, 1234, :long, 0x20001, :long, 0x10001)
|
251
|
+
process_times(2)
|
252
|
+
end
|
253
|
+
|
254
|
+
def test_channel_window_adjust_packet_should_be_routed_to_corresponding_channel
|
255
|
+
channel_at(14).expects(:do_window_adjust).with(5000)
|
256
|
+
transport.return(CHANNEL_WINDOW_ADJUST, :long, 14, :long, 5000)
|
257
|
+
process_times(2)
|
258
|
+
end
|
259
|
+
|
260
|
+
def test_channel_request_for_nonexistant_channel_should_be_ignored
|
261
|
+
transport.return(CHANNEL_REQUEST, :long, 14, :string, "testing", :bool, false)
|
262
|
+
assert_nothing_raised { process_times(2) }
|
263
|
+
end
|
264
|
+
|
265
|
+
def test_channel_request_packet_should_be_routed_to_corresponding_channel
|
266
|
+
channel_at(14).expects(:do_request).with("testing", false, Net::SSH::Buffer.new)
|
267
|
+
transport.return(CHANNEL_REQUEST, :long, 14, :string, "testing", :bool, false)
|
268
|
+
process_times(2)
|
269
|
+
end
|
270
|
+
|
271
|
+
def test_channel_data_packet_should_be_routed_to_corresponding_channel
|
272
|
+
channel_at(14).expects(:do_data).with("bring it on down")
|
273
|
+
transport.return(CHANNEL_DATA, :long, 14, :string, "bring it on down")
|
274
|
+
process_times(2)
|
275
|
+
end
|
276
|
+
|
277
|
+
def test_channel_extended_data_packet_should_be_routed_to_corresponding_channel
|
278
|
+
channel_at(14).expects(:do_extended_data).with(1, "bring it on down")
|
279
|
+
transport.return(CHANNEL_EXTENDED_DATA, :long, 14, :long, 1, :string, "bring it on down")
|
280
|
+
process_times(2)
|
281
|
+
end
|
282
|
+
|
283
|
+
def test_channel_eof_packet_should_be_routed_to_corresponding_channel
|
284
|
+
channel_at(14).expects(:do_eof).with()
|
285
|
+
transport.return(CHANNEL_EOF, :long, 14)
|
286
|
+
process_times(2)
|
287
|
+
end
|
288
|
+
|
289
|
+
def test_channel_success_packet_should_be_routed_to_corresponding_channel
|
290
|
+
channel_at(14).expects(:do_success).with()
|
291
|
+
transport.return(CHANNEL_SUCCESS, :long, 14)
|
292
|
+
process_times(2)
|
293
|
+
end
|
294
|
+
|
295
|
+
def test_channel_failure_packet_should_be_routed_to_corresponding_channel
|
296
|
+
channel_at(14).expects(:do_failure).with()
|
297
|
+
transport.return(CHANNEL_FAILURE, :long, 14)
|
298
|
+
process_times(2)
|
299
|
+
end
|
300
|
+
|
301
|
+
def test_channel_close_packet_should_be_routed_to_corresponding_channel_and_channel_should_be_closed_and_removed
|
302
|
+
channel_at(14).expects(:do_close).with()
|
303
|
+
session.channels[14].expects(:close).with()
|
304
|
+
transport.return(CHANNEL_CLOSE, :long, 14)
|
305
|
+
process_times(2)
|
306
|
+
assert session.channels.empty?
|
307
|
+
end
|
308
|
+
|
309
|
+
def test_multiple_pending_dispatches_should_be_dispatched_together
|
310
|
+
channel_at(14).expects(:do_eof).with()
|
311
|
+
session.channels[14].expects(:do_success).with()
|
312
|
+
transport.return(CHANNEL_SUCCESS, :long, 14)
|
313
|
+
transport.return(CHANNEL_EOF, :long, 14)
|
314
|
+
process_times(2)
|
315
|
+
end
|
316
|
+
|
317
|
+
def test_writers_without_pending_writes_should_not_be_considered_for_select
|
318
|
+
IO.expects(:select).with([socket],[],nil,nil).returns([[],[],[]])
|
319
|
+
session.process
|
320
|
+
end
|
321
|
+
|
322
|
+
def test_writers_with_pending_writes_should_be_considered_for_select
|
323
|
+
socket.enqueue("laksdjflasdkf")
|
324
|
+
IO.expects(:select).with([socket],[socket],nil,nil).returns([[],[],[]])
|
325
|
+
session.process
|
326
|
+
end
|
327
|
+
|
328
|
+
def test_ready_readers_should_be_filled
|
329
|
+
socket.expects(:recv).returns("this is some data")
|
330
|
+
IO.expects(:select).with([socket],[],nil,nil).returns([[socket],[],[]])
|
331
|
+
session.process
|
332
|
+
assert_equal [socket], session.listeners.keys
|
333
|
+
end
|
334
|
+
|
335
|
+
def test_ready_readers_that_cant_be_filled_should_be_removed
|
336
|
+
socket.expects(:recv).returns("")
|
337
|
+
socket.expects(:close)
|
338
|
+
IO.expects(:select).with([socket],[],nil,nil).returns([[socket],[],[]])
|
339
|
+
session.process
|
340
|
+
assert session.listeners.empty?
|
341
|
+
end
|
342
|
+
|
343
|
+
def test_ready_readers_that_are_registered_with_a_block_should_call_block_instead_of_fill
|
344
|
+
io = stub("io", :pending_write? => false)
|
345
|
+
flag = false
|
346
|
+
session.stop_listening_to(socket) # so that we only have to test the presence of a single IO object
|
347
|
+
session.listen_to(io) { flag = true }
|
348
|
+
IO.expects(:select).with([io],[],nil,nil).returns([[io],[],[]])
|
349
|
+
session.process
|
350
|
+
assert flag, "callback should have been invoked"
|
351
|
+
end
|
352
|
+
|
353
|
+
def test_ready_writers_should_call_send_pending
|
354
|
+
socket.enqueue("laksdjflasdkf")
|
355
|
+
socket.expects(:send).with("laksdjflasdkf", 0).returns(13)
|
356
|
+
IO.expects(:select).with([socket],[socket],nil,nil).returns([[],[socket],[]])
|
357
|
+
session.process
|
358
|
+
end
|
359
|
+
|
360
|
+
def test_process_should_call_rekey_as_needed
|
361
|
+
transport.expects(:rekey_as_needed)
|
362
|
+
IO.expects(:select).with([socket],[],nil,nil).returns([[],[],[]])
|
363
|
+
session.process
|
364
|
+
end
|
365
|
+
|
366
|
+
def test_loop_should_call_process_until_process_returns_false
|
367
|
+
IO.stubs(:select).with([socket],[],nil,nil).returns([[],[],[]])
|
368
|
+
session.expects(:process).with(nil).times(4).returns(true,true,true,false).yields
|
369
|
+
n = 0
|
370
|
+
session.loop { n += 1 }
|
371
|
+
assert_equal 4, n
|
372
|
+
end
|
373
|
+
|
374
|
+
def test_exec_should_open_channel_and_configure_default_callbacks
|
375
|
+
prep_exec("ls", :stdout, "data packet", :stderr, "extended data packet")
|
376
|
+
|
377
|
+
call = :first
|
378
|
+
session.exec "ls" do |channel, type, data|
|
379
|
+
if call == :first
|
380
|
+
assert_equal :stdout, type
|
381
|
+
assert_equal "data packet", data
|
382
|
+
call = :second
|
383
|
+
elsif call == :second
|
384
|
+
assert_equal :stderr, type
|
385
|
+
assert_equal "extended data packet", data
|
386
|
+
call = :third
|
387
|
+
else
|
388
|
+
flunk "should never get here, call == #{call.inspect}"
|
389
|
+
end
|
390
|
+
end
|
391
|
+
|
392
|
+
session.loop
|
393
|
+
assert_equal :third, call
|
394
|
+
end
|
395
|
+
|
396
|
+
def test_exec_without_block_should_use_print_to_display_result
|
397
|
+
prep_exec("ls", :stdout, "data packet", :stderr, "extended data packet")
|
398
|
+
$stdout.expects(:print).with("data packet")
|
399
|
+
$stderr.expects(:print).with("extended data packet")
|
400
|
+
|
401
|
+
session.exec "ls"
|
402
|
+
session.loop
|
403
|
+
end
|
404
|
+
|
405
|
+
def test_exec_bang_should_block_until_command_finishes
|
406
|
+
prep_exec("ls", :stdout, "some data")
|
407
|
+
called = false
|
408
|
+
session.exec! "ls" do |channel, type, data|
|
409
|
+
called = true
|
410
|
+
assert_equal :stdout, type
|
411
|
+
assert_equal "some data", data
|
412
|
+
end
|
413
|
+
assert called
|
414
|
+
end
|
415
|
+
|
416
|
+
def test_exec_bang_without_block_should_return_data_as_string
|
417
|
+
prep_exec("ls", :stdout, "some data")
|
418
|
+
assert_equal "some data", session.exec!("ls")
|
419
|
+
end
|
420
|
+
|
421
|
+
private
|
422
|
+
|
423
|
+
def prep_exec(command, *data)
|
424
|
+
transport.mock_enqueue = true
|
425
|
+
transport.expect do |t, p|
|
426
|
+
assert_equal CHANNEL_OPEN, p.type
|
427
|
+
t.return(CHANNEL_OPEN_CONFIRMATION, :long, p[:remote_id], :long, 0, :long, 0x20000, :long, 0x10000)
|
428
|
+
t.expect do |t2, p2|
|
429
|
+
assert_equal CHANNEL_REQUEST, p2.type
|
430
|
+
assert_equal "exec", p2[:request]
|
431
|
+
assert_equal true, p2[:want_reply]
|
432
|
+
assert_equal "ls", p2.read_string
|
433
|
+
|
434
|
+
t2.return(CHANNEL_SUCCESS, :long, p[:remote_id])
|
435
|
+
|
436
|
+
0.step(data.length-1, 2) do |index|
|
437
|
+
type = data[index]
|
438
|
+
datum = data[index+1]
|
439
|
+
|
440
|
+
if type == :stdout
|
441
|
+
t2.return(CHANNEL_DATA, :long, p[:remote_id], :string, datum)
|
442
|
+
else
|
443
|
+
t2.return(CHANNEL_EXTENDED_DATA, :long, p[:remote_id], :long, 1, :string, datum)
|
444
|
+
end
|
445
|
+
end
|
446
|
+
|
447
|
+
t2.return(CHANNEL_CLOSE, :long, p[:remote_id])
|
448
|
+
t2.expect { |t3,p3| assert_equal CHANNEL_CLOSE, p3.type }
|
449
|
+
end
|
450
|
+
end
|
451
|
+
end
|
452
|
+
|
453
|
+
module MockSocket
|
454
|
+
# so that we can easily test the contents that were enqueued, without
|
455
|
+
# worrying about all the packet stream overhead
|
456
|
+
def enqueue_packet(message)
|
457
|
+
enqueue(message.to_s)
|
458
|
+
end
|
459
|
+
end
|
460
|
+
|
461
|
+
def socket
|
462
|
+
@socket ||= begin
|
463
|
+
socket ||= Object.new
|
464
|
+
socket.extend(Net::SSH::Transport::PacketStream)
|
465
|
+
socket.extend(MockSocket)
|
466
|
+
socket
|
467
|
+
end
|
468
|
+
end
|
469
|
+
|
470
|
+
def channel_at(local_id)
|
471
|
+
session.channels[local_id] = stub("channel", :process => true, :closing? => false)
|
472
|
+
end
|
473
|
+
|
474
|
+
def transport(options={})
|
475
|
+
@transport ||= MockTransport.new(options.merge(:socket => socket))
|
476
|
+
end
|
477
|
+
|
478
|
+
def session(options={})
|
479
|
+
@session ||= Net::SSH::Connection::Session.new(transport, options)
|
480
|
+
end
|
481
|
+
|
482
|
+
def process_times(n)
|
483
|
+
i = 0
|
484
|
+
session.process { (i += 1) < n }
|
485
|
+
end
|
486
|
+
end
|
487
|
+
|
488
|
+
end
|