1 | /* |
2 | Copyright (c) 2007-2017 Contributors as noted in the AUTHORS file |
3 | |
4 | This file is part of libzmq, the ZeroMQ core engine in C++. |
5 | |
6 | libzmq is free software; you can redistribute it and/or modify it under |
7 | the terms of the GNU Lesser General Public License (LGPL) as published |
8 | by the Free Software Foundation; either version 3 of the License, or |
9 | (at your option) any later version. |
10 | |
11 | As a special exception, the Contributors give you permission to link |
12 | this library with independent modules to produce an executable, |
13 | regardless of the license terms of these independent modules, and to |
14 | copy and distribute the resulting executable under terms of your choice, |
15 | provided that you also meet, for each linked independent module, the |
16 | terms and conditions of the license of that module. An independent |
17 | module is a module which is not derived from or based on this library. |
18 | If you modify this library, you must extend this exception to your |
19 | version of the library. |
20 | |
21 | libzmq is distributed in the hope that it will be useful, but WITHOUT |
22 | ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or |
23 | FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public |
24 | License for more details. |
25 | |
26 | You should have received a copy of the GNU Lesser General Public License |
27 | along with this program. If not, see <http://www.gnu.org/licenses/>. |
28 | */ |
29 | |
30 | #include "testutil.hpp" |
31 | #include "testutil_unity.hpp" |
32 | |
33 | #if defined(ZMQ_HAVE_WINDOWS) |
34 | #include <winsock2.h> |
35 | #include <ws2tcpip.h> |
36 | #include <stdexcept> |
37 | #define close closesocket |
38 | #else |
39 | #include <sys/socket.h> |
40 | #include <netinet/in.h> |
41 | #include <arpa/inet.h> |
42 | #include <unistd.h> |
43 | #endif |
44 | |
45 | #include <stdlib.h> |
46 | #include <string.h> |
47 | |
48 | static void zap_handler (void *zap_) |
49 | { |
50 | // Process ZAP requests forever |
51 | while (true) { |
52 | char *version = s_recv (zap_); |
53 | if (!version) |
54 | break; // Terminating |
55 | char *sequence = s_recv (zap_); |
56 | char *domain = s_recv (zap_); |
57 | char *address = s_recv (zap_); |
58 | char *routing_id = s_recv (zap_); |
59 | char *mechanism = s_recv (zap_); |
60 | char *username = s_recv (zap_); |
61 | char *password = s_recv (zap_); |
62 | |
63 | TEST_ASSERT_EQUAL_STRING ("1.0" , version); |
64 | TEST_ASSERT_EQUAL_STRING ("PLAIN" , mechanism); |
65 | TEST_ASSERT_EQUAL_STRING ("IDENT" , routing_id); |
66 | |
67 | send_string_expect_success (zap_, version, ZMQ_SNDMORE); |
68 | send_string_expect_success (zap_, sequence, ZMQ_SNDMORE); |
69 | if (streq (username, "admin" ) && streq (password, "password" )) { |
70 | send_string_expect_success (zap_, "200" , ZMQ_SNDMORE); |
71 | send_string_expect_success (zap_, "OK" , ZMQ_SNDMORE); |
72 | send_string_expect_success (zap_, "anonymous" , ZMQ_SNDMORE); |
73 | send_string_expect_success (zap_, "" , 0); |
74 | } else { |
75 | send_string_expect_success (zap_, "400" , ZMQ_SNDMORE); |
76 | send_string_expect_success (zap_, "Invalid username or password" , |
77 | ZMQ_SNDMORE); |
78 | send_string_expect_success (zap_, "" , ZMQ_SNDMORE); |
79 | send_string_expect_success (zap_, "" , 0); |
80 | } |
81 | free (version); |
82 | free (sequence); |
83 | free (domain); |
84 | free (address); |
85 | free (routing_id); |
86 | free (mechanism); |
87 | free (username); |
88 | free (password); |
89 | } |
90 | TEST_ASSERT_SUCCESS_ERRNO (zmq_close (zap_)); |
91 | } |
92 | |
93 | void *zap_thread; |
94 | |
95 | char my_endpoint[MAX_SOCKET_STRING]; |
96 | |
97 | static void setup_zap_handler () |
98 | { |
99 | // Spawn ZAP handler |
100 | // We create and bind ZAP socket in main thread to avoid case |
101 | // where child thread does not start up fast enough. |
102 | void *handler = zmq_socket (get_test_context (), ZMQ_REP); |
103 | TEST_ASSERT_SUCCESS_ERRNO (zmq_bind (handler, "inproc://zeromq.zap.01" )); |
104 | zap_thread = zmq_threadstart (&zap_handler, handler); |
105 | } |
106 | |
107 | static void teardown_zap_handler () |
108 | { |
109 | // Wait until ZAP handler terminates |
110 | zmq_threadclose (zap_thread); |
111 | } |
112 | |
113 | const char domain[] = "test" ; |
114 | |
115 | void *server; |
116 | |
117 | static void setup_server () |
118 | { |
119 | // Server socket will accept connections |
120 | server = test_context_socket (ZMQ_DEALER); |
121 | TEST_ASSERT_SUCCESS_ERRNO ( |
122 | zmq_setsockopt (server, ZMQ_ROUTING_ID, "IDENT" , 6)); |
123 | TEST_ASSERT_SUCCESS_ERRNO ( |
124 | zmq_setsockopt (server, ZMQ_ZAP_DOMAIN, domain, strlen (domain))); |
125 | const int as_server = 1; |
126 | TEST_ASSERT_SUCCESS_ERRNO ( |
127 | zmq_setsockopt (server, ZMQ_PLAIN_SERVER, &as_server, sizeof (int))); |
128 | bind_loopback_ipv4 (server, my_endpoint, sizeof my_endpoint); |
129 | } |
130 | |
131 | static void teardown_server () |
132 | { |
133 | test_context_socket_close (server); |
134 | } |
135 | |
136 | void setUp () |
137 | { |
138 | setup_test_context (); |
139 | setup_zap_handler (); |
140 | setup_server (); |
141 | } |
142 | |
143 | void tearDown () |
144 | { |
145 | teardown_server (); |
146 | teardown_test_context (); |
147 | teardown_zap_handler (); |
148 | } |
149 | |
150 | void test_plain_success () |
151 | { |
152 | // Check PLAIN security with correct username/password |
153 | void *client = test_context_socket (ZMQ_DEALER); |
154 | const char username[] = "admin" ; |
155 | TEST_ASSERT_SUCCESS_ERRNO ( |
156 | zmq_setsockopt (client, ZMQ_PLAIN_USERNAME, username, strlen (username))); |
157 | const char password[] = "password" ; |
158 | TEST_ASSERT_SUCCESS_ERRNO ( |
159 | zmq_setsockopt (client, ZMQ_PLAIN_PASSWORD, password, strlen (password))); |
160 | TEST_ASSERT_SUCCESS_ERRNO (zmq_connect (client, my_endpoint)); |
161 | bounce (server, client); |
162 | test_context_socket_close (client); |
163 | } |
164 | |
165 | void test_plain_client_as_server_fails () |
166 | { |
167 | // Check PLAIN security with badly configured client (as_server) |
168 | // This will be caught by the plain_server class, not passed to ZAP |
169 | void *client = test_context_socket (ZMQ_DEALER); |
170 | TEST_ASSERT_SUCCESS_ERRNO ( |
171 | zmq_setsockopt (client, ZMQ_ZAP_DOMAIN, domain, strlen (domain))); |
172 | const int as_server = 1; |
173 | TEST_ASSERT_SUCCESS_ERRNO ( |
174 | zmq_setsockopt (client, ZMQ_PLAIN_SERVER, &as_server, sizeof (int))); |
175 | TEST_ASSERT_SUCCESS_ERRNO (zmq_connect (client, my_endpoint)); |
176 | expect_bounce_fail (server, client); |
177 | test_context_socket_close_zero_linger (client); |
178 | } |
179 | |
180 | void test_plain_wrong_credentials_fails () |
181 | { |
182 | // Check PLAIN security -- failed authentication |
183 | void *client = test_context_socket (ZMQ_DEALER); |
184 | const char username[] = "wronguser" ; |
185 | const char password[] = "wrongpass" ; |
186 | TEST_ASSERT_SUCCESS_ERRNO ( |
187 | zmq_setsockopt (client, ZMQ_PLAIN_USERNAME, username, strlen (username))); |
188 | TEST_ASSERT_SUCCESS_ERRNO ( |
189 | zmq_setsockopt (client, ZMQ_PLAIN_PASSWORD, password, strlen (password))); |
190 | TEST_ASSERT_SUCCESS_ERRNO (zmq_connect (client, my_endpoint)); |
191 | expect_bounce_fail (server, client); |
192 | test_context_socket_close_zero_linger (client); |
193 | } |
194 | |
195 | void test_plain_vanilla_socket () |
196 | { |
197 | // Unauthenticated messages from a vanilla socket shouldn't be received |
198 | struct sockaddr_in ip4addr; |
199 | fd_t s; |
200 | |
201 | unsigned short int port; |
202 | int rc = sscanf (my_endpoint, "tcp://127.0.0.1:%hu" , &port); |
203 | TEST_ASSERT_EQUAL_INT (1, rc); |
204 | |
205 | ip4addr.sin_family = AF_INET; |
206 | ip4addr.sin_port = htons (port); |
207 | #if defined(ZMQ_HAVE_WINDOWS) && (_WIN32_WINNT < 0x0600) |
208 | ip4addr.sin_addr.s_addr = inet_addr ("127.0.0.1" ); |
209 | #else |
210 | inet_pton (AF_INET, "127.0.0.1" , &ip4addr.sin_addr); |
211 | #endif |
212 | |
213 | s = socket (AF_INET, SOCK_STREAM, IPPROTO_TCP); |
214 | rc = connect (s, reinterpret_cast<struct sockaddr *> (&ip4addr), |
215 | sizeof (ip4addr)); |
216 | TEST_ASSERT_GREATER_THAN_INT (-1, rc); |
217 | // send anonymous ZMTP/1.0 greeting |
218 | send (s, "\x01\x00" , 2, 0); |
219 | // send sneaky message that shouldn't be received |
220 | send (s, "\x08\x00sneaky\0" , 9, 0); |
221 | int timeout = 250; |
222 | zmq_setsockopt (server, ZMQ_RCVTIMEO, &timeout, sizeof (timeout)); |
223 | char *buf = s_recv (server); |
224 | if (buf != NULL) { |
225 | printf ("Received unauthenticated message: %s\n" , buf); |
226 | TEST_ASSERT_NULL (buf); |
227 | } |
228 | close (s); |
229 | } |
230 | |
231 | int main (void) |
232 | { |
233 | setup_test_environment (); |
234 | |
235 | UNITY_BEGIN (); |
236 | RUN_TEST (test_plain_success); |
237 | RUN_TEST (test_plain_client_as_server_fails); |
238 | RUN_TEST (test_plain_wrong_credentials_fails); |
239 | RUN_TEST (test_plain_vanilla_socket); |
240 | return UNITY_END (); |
241 | } |
242 | |