mirror of
https://github.com/tailscale/tailscale.git
synced 2024-12-01 14:05:39 +00:00
8f44ba1cd6
Add logic to set environment variables that match the SSH rule's `acceptEnv` settings in the SSH session's environment. Updates https://github.com/tailscale/corp/issues/22775 Signed-off-by: Mario Minardi <mario@tailscale.com>
157 lines
5.3 KiB
Go
157 lines
5.3 KiB
Go
// Copyright (c) Tailscale Inc & AUTHORS
|
|
// SPDX-License-Identifier: BSD-3-Clause
|
|
|
|
package tailssh
|
|
|
|
import (
|
|
"fmt"
|
|
"testing"
|
|
|
|
"github.com/google/go-cmp/cmp"
|
|
)
|
|
|
|
func TestMatchAcceptEnvPattern(t *testing.T) {
|
|
testCases := []struct {
|
|
pattern string
|
|
target string
|
|
match bool
|
|
}{
|
|
{pattern: "*", target: "EXAMPLE_ENV", match: true},
|
|
{pattern: "***", target: "123456", match: true},
|
|
|
|
{pattern: "?", target: "A", match: true},
|
|
{pattern: "?", target: "123", match: false},
|
|
|
|
{pattern: "?*", target: "EXAMPLE_2", match: true},
|
|
{pattern: "?*", target: "", match: false},
|
|
|
|
{pattern: "*?", target: "A", match: true},
|
|
{pattern: "*?", target: "", match: false},
|
|
|
|
{pattern: "??", target: "CC", match: true},
|
|
{pattern: "??", target: "123", match: false},
|
|
|
|
{pattern: "*?*", target: "ABCDEFG", match: true},
|
|
{pattern: "*?*", target: "C", match: true},
|
|
{pattern: "*?*", target: "", match: false},
|
|
|
|
{pattern: "?*?", target: "ABCDEFG", match: true},
|
|
{pattern: "?*?", target: "A", match: false},
|
|
|
|
{pattern: "**?TEST", target: "_TEST", match: true},
|
|
{pattern: "**?TEST", target: "_TESTING", match: false},
|
|
|
|
{pattern: "TEST**?", target: "TEST_", match: true},
|
|
{pattern: "TEST**?", target: "A_TEST_", match: false},
|
|
|
|
{pattern: "TEST_*", target: "TEST_A", match: true},
|
|
{pattern: "TEST_*", target: "TEST_A_LONG_ENVIRONMENT_VARIABLE_NAME", match: true},
|
|
{pattern: "TEST_*", target: "TEST", match: false},
|
|
|
|
{pattern: "EXAMPLE_?_ENV", target: "EXAMPLE_A_ENV", match: true},
|
|
{pattern: "EXAMPLE_?_ENV", target: "EXAMPLE_ENV", match: false},
|
|
|
|
{pattern: "EXAMPLE_*_ENV", target: "EXAMPLE_aBcd2231---_ENV", match: true},
|
|
{pattern: "EXAMPLE_*_ENV", target: "EXAMPLEENV", match: false},
|
|
|
|
{pattern: "COMPLICA?ED_PATTERN*", target: "COMPLICATED_PATTERN_REST", match: true},
|
|
{pattern: "COMPLICA?ED_PATTERN*", target: "COMPLICATED_PATT", match: false},
|
|
|
|
{pattern: "COMPLICAT???ED_PATT??ERN", target: "COMPLICAT123ED_PATTggERN", match: true},
|
|
{pattern: "COMPLICAT???ED_PATT??ERN", target: "COMPLICATED_PATTERN", match: false},
|
|
|
|
{pattern: "DIRECT_MATCH", target: "DIRECT_MATCH", match: true},
|
|
{pattern: "DIRECT_MATCH", target: "MISS", match: false},
|
|
|
|
// OpenSSH compatibility cases
|
|
// See https://github.com/openssh/openssh-portable/blob/master/regress/unittests/match/tests.c
|
|
{pattern: "", target: "", match: true},
|
|
{pattern: "aaa", target: "", match: false},
|
|
{pattern: "", target: "aaa", match: false},
|
|
{pattern: "aaaa", target: "aaa", match: false},
|
|
{pattern: "aaa", target: "aaaa", match: false},
|
|
{pattern: "*", target: "", match: true},
|
|
{pattern: "?", target: "a", match: true},
|
|
{pattern: "a?", target: "aa", match: true},
|
|
{pattern: "*", target: "a", match: true},
|
|
{pattern: "a*", target: "aa", match: true},
|
|
{pattern: "?*", target: "aa", match: true},
|
|
{pattern: "**", target: "aa", match: true},
|
|
{pattern: "?a", target: "aa", match: true},
|
|
{pattern: "*a", target: "aa", match: true},
|
|
{pattern: "a?", target: "ba", match: false},
|
|
{pattern: "a*", target: "ba", match: false},
|
|
{pattern: "?a", target: "ab", match: false},
|
|
{pattern: "*a", target: "ab", match: false},
|
|
}
|
|
|
|
for _, tc := range testCases {
|
|
name := fmt.Sprintf("pattern_%s_target_%s", tc.pattern, tc.target)
|
|
if tc.match {
|
|
name += "_should_match"
|
|
} else {
|
|
name += "_should_not_match"
|
|
}
|
|
|
|
t.Run(name, func(t *testing.T) {
|
|
match := matchAcceptEnvPattern(tc.pattern, tc.target)
|
|
if match != tc.match {
|
|
t.Errorf("got %v, want %v", match, tc.match)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestFilterEnv(t *testing.T) {
|
|
testCases := []struct {
|
|
name string
|
|
acceptEnv []string
|
|
environ []string
|
|
expectedFiltered []string
|
|
wantErrMessage string
|
|
}{
|
|
{
|
|
name: "simple direct matches",
|
|
acceptEnv: []string{"FOO", "FOO2", "FOO_3"},
|
|
environ: []string{"FOO=BAR", "FOO2=BAZ", "FOO_3=123", "FOOOO4-2=AbCdEfG"},
|
|
expectedFiltered: []string{"FOO=BAR", "FOO2=BAZ", "FOO_3=123"},
|
|
},
|
|
{
|
|
name: "bare wildcard",
|
|
acceptEnv: []string{"*"},
|
|
environ: []string{"FOO=BAR", "FOO2=BAZ", "FOO_3=123", "FOOOO4-2=AbCdEfG"},
|
|
expectedFiltered: []string{"FOO=BAR", "FOO2=BAZ", "FOO_3=123", "FOOOO4-2=AbCdEfG"},
|
|
},
|
|
{
|
|
name: "complex matches",
|
|
acceptEnv: []string{"FO?", "FOOO*", "FO*5?7"},
|
|
environ: []string{"FOO=BAR", "FOO2=BAZ", "FOO_3=123", "FOOOO4-2=AbCdEfG", "FO1-kmndGamc79567=ABC", "FO57=BAR2"},
|
|
expectedFiltered: []string{"FOO=BAR", "FOOOO4-2=AbCdEfG", "FO1-kmndGamc79567=ABC"},
|
|
},
|
|
{
|
|
name: "environ format invalid",
|
|
acceptEnv: []string{"FO?", "FOOO*", "FO*5?7"},
|
|
environ: []string{"FOOBAR"},
|
|
expectedFiltered: nil,
|
|
wantErrMessage: `invalid environment variable: "FOOBAR". Variables must be in "KEY=VALUE" format`,
|
|
},
|
|
}
|
|
|
|
for _, tc := range testCases {
|
|
t.Run(tc.name, func(t *testing.T) {
|
|
filtered, err := filterEnv(tc.acceptEnv, tc.environ)
|
|
if err == nil && tc.wantErrMessage != "" {
|
|
t.Errorf("wanted error with message %q but error was nil", tc.wantErrMessage)
|
|
}
|
|
|
|
if err != nil && err.Error() != tc.wantErrMessage {
|
|
t.Errorf("err = %v; want %v", err, tc.wantErrMessage)
|
|
}
|
|
|
|
if diff := cmp.Diff(tc.expectedFiltered, filtered); diff != "" {
|
|
t.Errorf("unexpected filter result (-got,+want): \n%s", diff)
|
|
}
|
|
})
|
|
}
|
|
}
|