OXIESEC PANEL
- Current Dir:
/
/
usr
/
lib
/
python3
/
dist-packages
/
twisted
/
conch
/
test
Server IP: 139.59.38.164
Upload:
Create Dir:
Name
Size
Modified
Perms
📁
..
-
03/31/2022 06:22:38 AM
rwxr-xr-x
📄
__init__.py
14 bytes
09/08/2017 10:38:36 AM
rw-r--r--
📁
__pycache__
-
03/31/2022 06:22:39 AM
rwxr-xr-x
📄
keydata.py
17.06 KB
09/08/2017 10:38:36 AM
rw-r--r--
📄
loopback.py
757 bytes
09/08/2017 10:38:35 AM
rw-r--r--
📄
test_address.py
1.59 KB
09/08/2017 10:38:36 AM
rw-r--r--
📄
test_agent.py
12.78 KB
09/08/2017 10:38:36 AM
rw-r--r--
📄
test_cftp.py
49.7 KB
03/22/2022 11:03:56 AM
rw-r--r--
📄
test_channel.py
11.82 KB
09/08/2017 10:38:36 AM
rw-r--r--
📄
test_checkers.py
30.76 KB
09/08/2017 10:38:36 AM
rw-r--r--
📄
test_ckeygen.py
19.8 KB
03/22/2022 11:03:56 AM
rw-r--r--
📄
test_conch.py
24.55 KB
09/08/2017 10:38:36 AM
rw-r--r--
📄
test_connection.py
27.49 KB
09/08/2017 10:38:36 AM
rw-r--r--
📄
test_default.py
11.31 KB
09/08/2017 10:38:35 AM
rw-r--r--
📄
test_endpoints.py
51.96 KB
09/08/2017 10:38:36 AM
rw-r--r--
📄
test_filetransfer.py
26.65 KB
09/08/2017 10:38:36 AM
rw-r--r--
📄
test_forwarding.py
2.16 KB
09/08/2017 10:38:36 AM
rw-r--r--
📄
test_helper.py
20.01 KB
09/08/2017 10:38:36 AM
rw-r--r--
📄
test_insults.py
32.79 KB
09/08/2017 10:38:35 AM
rw-r--r--
📄
test_keys.py
53.57 KB
09/08/2017 10:38:35 AM
rw-r--r--
📄
test_knownhosts.py
48.26 KB
09/08/2017 10:38:36 AM
rw-r--r--
📄
test_manhole.py
12.52 KB
09/08/2017 10:38:35 AM
rw-r--r--
📄
test_manhole_tap.py
4.14 KB
09/08/2017 10:38:35 AM
rw-r--r--
📄
test_mixin.py
1.03 KB
09/08/2017 10:38:36 AM
rw-r--r--
📄
test_openssh_compat.py
4.52 KB
09/08/2017 10:38:36 AM
rw-r--r--
📄
test_recvline.py
24.81 KB
09/08/2017 10:38:36 AM
rw-r--r--
📄
test_scripts.py
1.84 KB
09/08/2017 10:38:36 AM
rw-r--r--
📄
test_session.py
38.54 KB
09/08/2017 10:38:36 AM
rw-r--r--
📄
test_ssh.py
31.62 KB
09/08/2017 10:38:36 AM
rw-r--r--
📄
test_tap.py
4.83 KB
09/08/2017 10:38:36 AM
rw-r--r--
📄
test_telnet.py
25.9 KB
09/08/2017 10:38:36 AM
rw-r--r--
📄
test_text.py
3.85 KB
09/08/2017 10:38:36 AM
rw-r--r--
📄
test_transport.py
89.71 KB
03/22/2022 11:03:56 AM
rw-r--r--
📄
test_unix.py
2.47 KB
09/08/2017 10:38:36 AM
rw-r--r--
📄
test_userauth.py
31.84 KB
09/08/2017 10:38:36 AM
rw-r--r--
📄
test_window.py
2.07 KB
09/08/2017 10:38:36 AM
rw-r--r--
Editing: test_tap.py
Close
# Copyright (c) Twisted Matrix Laboratories. # See LICENSE for details. """ Tests for L{twisted.conch.tap}. """ try: import cryptography except ImportError: cryptography = None try: import pyasn1 except ImportError: pyasn1 = None try: from twisted.conch import unix except ImportError: unix = None if cryptography and pyasn1 and unix: from twisted.conch import tap from twisted.conch.openssh_compat.factory import OpenSSHFactory from twisted.application.internet import StreamServerEndpointService from twisted.cred import error from twisted.cred.credentials import ISSHPrivateKey from twisted.cred.credentials import IUsernamePassword, UsernamePassword from twisted.trial.unittest import TestCase class MakeServiceTests(TestCase): """ Tests for L{tap.makeService}. """ if not cryptography: skip = "can't run without cryptography" if not pyasn1: skip = "Cannot run without PyASN1" if not unix: skip = "can't run on non-posix computers" usernamePassword = (b'iamuser', b'thisispassword') def setUp(self): """ Create a file with two users. """ self.filename = self.mktemp() with open(self.filename, 'wb+') as f: f.write(b':'.join(self.usernamePassword)) self.options = tap.Options() def test_basic(self): """ L{tap.makeService} returns a L{StreamServerEndpointService} instance running on TCP port 22, and the linked protocol factory is an instance of L{OpenSSHFactory}. """ config = tap.Options() service = tap.makeService(config) self.assertIsInstance(service, StreamServerEndpointService) self.assertEqual(service.endpoint._port, 22) self.assertIsInstance(service.factory, OpenSSHFactory) def test_defaultAuths(self): """ Make sure that if the C{--auth} command-line option is not passed, the default checkers are (for backwards compatibility): SSH and UNIX """ numCheckers = 2 self.assertIn(ISSHPrivateKey, self.options['credInterfaces'], "SSH should be one of the default checkers") self.assertIn(IUsernamePassword, self.options['credInterfaces'], "UNIX should be one of the default checkers") self.assertEqual(numCheckers, len(self.options['credCheckers']), "There should be %d checkers by default" % (numCheckers,)) def test_authAdded(self): """ The C{--auth} command-line option will add a checker to the list of checkers, and it should be the only auth checker """ self.options.parseOptions(['--auth', 'file:' + self.filename]) self.assertEqual(len(self.options['credCheckers']), 1) def test_multipleAuthAdded(self): """ Multiple C{--auth} command-line options will add all checkers specified to the list ofcheckers, and there should only be the specified auth checkers (no default checkers). """ self.options.parseOptions(['--auth', 'file:' + self.filename, '--auth', 'memory:testuser:testpassword']) self.assertEqual(len(self.options['credCheckers']), 2) def test_authFailure(self): """ The checker created by the C{--auth} command-line option returns a L{Deferred} that fails with L{UnauthorizedLogin} when presented with credentials that are unknown to that checker. """ self.options.parseOptions(['--auth', 'file:' + self.filename]) checker = self.options['credCheckers'][-1] invalid = UsernamePassword(self.usernamePassword[0], 'fake') # Wrong password should raise error return self.assertFailure( checker.requestAvatarId(invalid), error.UnauthorizedLogin) def test_authSuccess(self): """ The checker created by the C{--auth} command-line option returns a L{Deferred} that returns the avatar id when presented with credentials that are known to that checker. """ self.options.parseOptions(['--auth', 'file:' + self.filename]) checker = self.options['credCheckers'][-1] correct = UsernamePassword(*self.usernamePassword) d = checker.requestAvatarId(correct) def checkSuccess(username): self.assertEqual(username, correct.username) return d.addCallback(checkSuccess) def test_checkers(self): """ The L{OpenSSHFactory} built by L{tap.makeService} has a portal with L{ISSHPrivateKey} and L{IUsernamePassword} interfaces registered as checkers. """ config = tap.Options() service = tap.makeService(config) portal = service.factory.portal self.assertEqual( set(portal.checkers.keys()), set([ISSHPrivateKey, IUsernamePassword]))