%%-------------------------------------------------------------------- %% %CopyrightBegin% %% %% Copyright Ericsson AB 2012. All Rights Reserved. %% %% The contents of this file are subject to the Erlang Public License, %% Version 1.1, (the "License"); you may not use this file except in %% compliance with the License. You should have received a copy of the %% Erlang Public License along with this software. If not, it can be %% retrieved online at http://www.erlang.org/. %% %% Software distributed under the License is distributed on an "AS IS" %% basis, WITHOUT WARRANTY OF ANY KIND, either express or implied. See %% the License for the specific language governing rights and limitations %% under the License. %% %% %CopyrightEnd% %% %%---------------------------------------------------------------------- %% File: ct_netconfc_SUITE.erl %% %% Description: %% This file contains the test cases for the ct_netconfc API. %% %% @author Support %% @doc Netconf Client Interface. %% @end %%---------------------------------------------------------------------- %%---------------------------------------------------------------------- -module(netconfc1_SUITE). -include_lib("common_test/include/ct.hrl"). -include_lib("common_test/src/ct_netconfc.hrl"). -include_lib("public_key/include/public_key.hrl"). -compile(export_all). %% Default timetrap timeout (set in init_per_testcase). -define(default_timeout, ?t:minutes(1)). -define(NS,ns). -define(LOCALHOST, "127.0.0.1"). -define(SSH_PORT, 2060). -define(DEFAULT_SSH_OPTS,[{ssh,?LOCALHOST}, {port,?SSH_PORT}, {user,"xxx"}, {password,"xxx"}]). -define(DEFAULT_SSH_OPTS(Dir), ?DEFAULT_SSH_OPTS++[{user_dir,Dir}]). -define(ok,ok). suite() -> [{ct_hooks, [{cth_conn_log, [{ct_netconfc,[{log_type,html}, %will be overwritten by config {hosts,[my_named_connection,netconf1]}] }] }] }]. all() -> case os:find_executable("ssh") of false -> {skip, "SSH not installed on host"}; _ -> [hello, hello_from_server_first, hello_named, hello_configured, hello_configured_extraopts, hello_required, hello_required_exists, hello_global_pwd, hello_no_session_id, hello_incomp_base_vsn, hello_no_base_cap, hello_no_caps, no_server_hello, no_client_hello, get_session_id, get_capabilities, faulty_user, faulty_passwd, faulty_port, no_host, no_port, invalid_opt, get, get_xpath, get_config, get_config_xpath, edit_config, copy_config, delete_config, lock, unlock, kill_session, get_no_such_client, action, send_any_rpc, send_any, hide_password, not_proper_xml, prefixed_namespace, receive_chunked_data, timeout_receive_chunked_data, close_while_waiting_for_chunked_data, connection_crash, get_event_streams, create_subscription, receive_event ] end. groups() -> []. init_per_group(_GroupName, Config) -> Config. end_per_group(_GroupName, Config) -> Config. init_per_testcase(_Case, Config) -> ets:delete_all_objects(ns_tab), Dog = test_server:timetrap(?default_timeout), [{watchdog, Dog}|Config]. end_per_testcase(_Case, Config) -> Dog=?config(watchdog, Config), test_server:timetrap_cancel(Dog), ok. init_per_suite(Config) -> case catch {crypto:start(), ssh:start()} of {ok, ok} -> {ok, _} = get_id_keys(Config), make_dsa_files(Config), Server = ?NS:start(?config(data_dir,Config)), [{server,Server}|Config]; _ -> {skip, "Crypto and/or SSH could not be started!"} end. end_per_suite(Config) -> PrivDir = ?config(priv_dir, Config), ?NS:stop(?config(server,Config)), ssh:stop(), crypto:stop(), remove_id_keys(PrivDir), Config. hello(Config) -> DataDir = ?config(data_dir,Config), {ok,Client} = open_success(DataDir), ?NS:expect_do_reply('close-session',close,ok), ?ok = ct_netconfc:close_session(Client), ok. hello_from_server_first(Config) -> DataDir = ?config(data_dir,Config), ?NS:hello(1), {ok,Client} = ct_netconfc:only_open(?DEFAULT_SSH_OPTS(DataDir)), ct:sleep(500), ?NS:expect(hello), ?ok = ct_netconfc:hello(Client), ?NS:expect_do_reply('close-session',close,ok), ?ok = ct_netconfc:close_session(Client), ok. hello_named(Config) -> DataDir = ?config(data_dir,Config), {ok,Client} = open_success(any_name,DataDir), ?NS:expect_do_reply('close-session',close,ok), ?ok = ct_netconfc:close_session(Client), ok. hello_configured() -> [{require, netconf1}]. hello_configured(Config) -> DataDir = ?config(data_dir,Config), {ok,Client} = open_configured_success(netconf1,DataDir), ?NS:expect_do_reply('close-session',close,ok), {error, {no_such_name,netconf1}} = ct_netconfc:close_session(netconf1), ?ok = ct_netconfc:close_session(Client), ok. hello_configured_extraopts() -> [{require, netconf1}]. hello_configured_extraopts(Config) -> DataDir = ?config(data_dir,Config), %% Test that the cofiguration overwrites the ExtraOpts parameter %% to ct_netconfc:open/2. {ok,Client} = open_configured_success(netconf1,DataDir,[{password,"faulty"}]), ?NS:expect_do_reply('close-session',close,ok), ?ok = ct_netconfc:close_session(Client), ok. hello_required() -> [{require, my_named_connection, netconf1}]. hello_required(Config) -> DataDir = ?config(data_dir,Config), {ok,_Client} = open_configured_success(my_named_connection,DataDir), ?NS:expect_do_reply('close-session',close,ok), ?ok = ct_netconfc:close_session(my_named_connection), ok. hello_required_exists() -> [{require, my_named_connection, netconf1}]. hello_required_exists(Config) -> DataDir = ?config(data_dir,Config), {ok,_Client1} = open_configured_success(my_named_connection,DataDir), %% Check that same name can not be used twice {error,{connection_exists,_Client1}} = ct_netconfc:open(my_named_connection,[{user_dir,DataDir}]), ?NS:expect_do_reply('close-session',close,ok), ?ok = ct_netconfc:close_session(my_named_connection), timer:sleep(500), %% Then check that it can be used again after the first is closed {ok,_Client2} = open_configured_success(my_named_connection,DataDir), ?NS:expect_do_reply('close-session',close,ok), ?ok = ct_netconfc:close_session(my_named_connection), ok. hello_global_pwd(Config) -> DataDir = ?config(data_dir,Config), {ok,Client} = open_success(DataDir,[{user,"any-user"}, {password,"global-xxx"}]), ?NS:expect_do_reply('close-session',close,ok), ?ok = ct_netconfc:close_session(Client), ok. hello_no_session_id(Config) -> DataDir = ?config(data_dir,Config), ?NS:hello(no_session_id), ?NS:expect(no_session_id,hello), {error,{incorrect_hello,no_session_id_found}} = open(DataDir), ok. hello_incomp_base_vsn(Config) -> DataDir = ?config(data_dir,Config), ?NS:hello(1,{base,"1.1"}), ?NS:expect(hello), {error,{incompatible_base_capability_vsn,"1.1"}} = open(DataDir), ok. hello_no_base_cap(Config) -> DataDir = ?config(data_dir,Config), ?NS:hello(1,no_base), ?NS:expect(hello), {error,{incorrect_hello,no_base_capability_found}} = open(DataDir), ok. hello_no_caps(Config) -> DataDir = ?config(data_dir,Config), ?NS:hello(1,no_caps), ?NS:expect(hello), {error,{incorrect_hello,capabilities_not_found}} = open(DataDir), ok. no_server_hello(Config) -> DataDir = ?config(data_dir,Config), ?NS:expect(undefined,hello), {error,{hello_session_failed,timeout}} = open(DataDir,[{timeout,2000}]), ok. no_client_hello(Config) -> DataDir = ?config(data_dir,Config), ?NS:hello(1), {ok,Client} = ct_netconfc:only_open(?DEFAULT_SSH_OPTS(DataDir)), %% Allow server hello to arrive ct:sleep(500), %% Tell server to receive a get request and then die without %% replying since no hello has been received. (is this correct %% behavoiur??) ?NS:expect_do(get,close), {error,closed} = ct_netconfc:get(Client,whatever), ok. get_session_id(Config) -> DataDir = ?config(data_dir,Config), {ok,Client} = open_success(DataDir), 1 = ct_netconfc:get_session_id(Client), ?NS:expect_do_reply('close-session',close,ok), ?ok = ct_netconfc:close_session(Client), ok. get_capabilities(Config) -> DataDir = ?config(data_dir,Config), {ok,Client} = open_success(DataDir), Caps = ct_netconfc:get_capabilities(Client), BaseCap = ?NETCONF_BASE_CAP ++ ?NETCONF_BASE_CAP_VSN, [BaseCap,"urn:ietf:params:netconf:capability:writable-running:1.0" |_] = Caps, ?NS:expect_do_reply('close-session',close,ok), ?ok = ct_netconfc:close_session(Client), ok. faulty_user(Config) -> DataDir = ?config(data_dir,Config), {error,{ssh,could_not_connect_to_server, "Unable to connect using the available authentication methods"}} = open(DataDir,[{user,"yyy"}]), ok. faulty_passwd(Config) -> DataDir = ?config(data_dir,Config), {error,{ssh,could_not_connect_to_server, "Unable to connect using the available authentication methods"}} = open(DataDir,[{password,"yyy"}]), ok. faulty_port(Config) -> DataDir = ?config(data_dir,Config), {error,{ssh,could_not_connect_to_server,econnrefused}} = open(DataDir,[{port,2062}]), ok. no_host(Config) -> DataDir = ?config(data_dir,Config), Opts = lists:keydelete(ssh,1,?DEFAULT_SSH_OPTS(DataDir)), {error,no_host_address} = ct_netconfc:open(Opts), ok. no_port(Config) -> DataDir = ?config(data_dir,Config), Opts = lists:keydelete(port,1,?DEFAULT_SSH_OPTS(DataDir)), {error,no_port} = ct_netconfc:open(Opts), ok. invalid_opt(Config) -> DataDir = ?config(data_dir,Config), Opts1 = ?DEFAULT_SSH_OPTS(DataDir) ++ [{timeout,invalidvalue}], {error,{invalid_option,{timeout,invalidvalue}}} = ct_netconfc:open(Opts1), Opts2 = ?DEFAULT_SSH_OPTS(DataDir) ++ [{some_other_opt,true}], {error,{invalid_option,{some_other_opt,true}}} = ct_netconfc:open(Opts2), ok. get(Config) -> DataDir = ?config(data_dir,Config), {ok,Client} = open_success(DataDir), Data = [{server,[{xmlns,"myns"}],[{name,[],["myserver"]}]}], ?NS:expect_reply('get',{data,Data}), {ok,Data} = ct_netconfc:get(Client,{server,[{xmlns,"myns"}],[]}), ?NS:expect_do_reply('close-session',close,ok), ?ok = ct_netconfc:close_session(Client), ok. get_xpath(Config) -> DataDir = ?config(data_dir,Config), {ok,Client} = open_success(DataDir), Data = [{server,[{xmlns,"myns"}],[{name,[],["myserver"]}]}], ?NS:expect_reply({'get',xpath},{data,Data}), {ok,Data} = ct_netconfc:get(Client,{xpath,"/server"}), ?NS:expect_do_reply('close-session',close,ok), ?ok = ct_netconfc:close_session(Client), ok. get_config(Config) -> DataDir = ?config(data_dir,Config), {ok,Client} = open_success(DataDir), Data = [{server,[{xmlns,"myns"}],[{name,[],["myserver"]}]}], ?NS:expect_reply('get-config',{data,Data}), {ok,Data} = ct_netconfc:get_config(Client,running, {server,[{xmlns,"myns"}],[]}), ?NS:expect_do_reply('close-session',close,ok), ?ok = ct_netconfc:close_session(Client), ok. get_config_xpath(Config) -> DataDir = ?config(data_dir,Config), {ok,Client} = open_success(DataDir), Data = [{server,[{xmlns,"myns"}],[{name,[],["myserver"]}]}], ?NS:expect_reply({'get-config',xpath},{data,Data}), {ok,Data} = ct_netconfc:get_config(Client,running,{xpath,"/server"}), ?NS:expect_do_reply('close-session',close,ok), ?ok = ct_netconfc:close_session(Client), ok. edit_config(Config) -> DataDir = ?config(data_dir,Config), {ok,Client} = open_success(DataDir), ?NS:expect_reply('edit-config',ok), ?ok = ct_netconfc:edit_config(Client,running, {server,[{xmlns,"myns"}], [{name,["myserver"]}]}), ?NS:expect_do_reply('close-session',close,ok), ?ok = ct_netconfc:close_session(Client), ok. copy_config(Config) -> DataDir = ?config(data_dir,Config), {ok,Client} = open_success(DataDir), ?NS:expect_reply('copy-config',ok), ?ok = ct_netconfc:copy_config(Client,startup,running), ?NS:expect_do_reply('close-session',close,ok), ?ok = ct_netconfc:close_session(Client), ok. delete_config(Config) -> DataDir = ?config(data_dir,Config), {ok,Client} = open_success(DataDir), ?NS:expect_reply('delete-config',ok), ?ok = ct_netconfc:delete_config(Client,startup), ?NS:expect_do_reply('close-session',close,ok), ?ok = ct_netconfc:close_session(Client), ok. lock(Config) -> DataDir = ?config(data_dir,Config), {ok,Client} = open_success(DataDir), ?NS:expect_reply('lock',ok), ?ok = ct_netconfc:lock(Client,running), ?NS:expect_do_reply('close-session',close,ok), ?ok = ct_netconfc:close_session(Client), ok. unlock(Config) -> DataDir = ?config(data_dir,Config), {ok,Client} = open_success(DataDir), ?NS:expect_reply('unlock',ok), ?ok = ct_netconfc:unlock(Client,running), ?NS:expect_do_reply('close-session',close,ok), ?ok = ct_netconfc:close_session(Client), ok. kill_session(Config) -> DataDir = ?config(data_dir,Config), {ok,Client} = open_success(DataDir), ?NS:hello(2), ?NS:expect(2,hello), {ok,_OtherClient} = open(DataDir), ?NS:expect_do_reply('kill-session',{kill,2},ok), ?ok = ct_netconfc:kill_session(Client,2), ?NS:expect_do_reply('close-session',close,ok), ?ok = ct_netconfc:close_session(Client), ok. get_no_such_client(Config) -> DataDir = ?config(data_dir,Config), {ok,Client} = open_success(DataDir), ?NS:expect_do_reply('close-session',close,ok), ?ok = ct_netconfc:close_session(Client), case ct_netconfc:get(Client,{server,[{xmlns,"myns"}],[]}) of {error,no_such_client} -> ok; {error,closed} -> %% Means that the Client process was not terminated before the call. %% Give it one more go. {error,no_such_client} = ct_netconfc:get(Client,{server,[{xmlns,"myns"}],[]}) end, ok. action(Config) -> DataDir = ?config(data_dir,Config), {ok,Client} = open_success(DataDir), Data = [{myactionreturn,[{xmlns,"myns"}],["value"]}], ?NS:expect_reply(action,{data,Data}), {ok,Data} = ct_netconfc:action(Client,{myaction,[{xmlns,"myns"}],[]}), ?NS:expect_do_reply('close-session',close,ok), ?ok = ct_netconfc:close_session(Client), ok. send_any_rpc(Config) -> DataDir = ?config(data_dir,Config), {ok,Client} = open_success(DataDir), Data = [{server,[{xmlns,"myns"}],[{name,[],["myserver"]}]}], GetConf = {'get-config', [{source,["running"]}, {filter,[{type,"subtree"}], [{server,[{xmlns,"myns"}],[]}]}]}, ?NS:expect_reply('get-config',{data,Data}), [{data,?NETCONF_NAMESPACE_ATTR,Data}] = ct_netconfc:send_rpc(Client,GetConf), EditConf = {'edit-config', [{target,["running"]}, {config,[{server,[{xmlns,"myns"}], [{name,["myserver"]}]}]}]}, ?NS:expect_reply('edit-config',ok), [{ok,?NETCONF_NAMESPACE_ATTR,[]}] = ct_netconfc:send_rpc(Client,EditConf), ?NS:expect_do_reply('close-session',close,ok), ?ok = ct_netconfc:close_session(Client), ok. send_any(Config) -> DataDir = ?config(data_dir,Config), {ok,Client} = open_success(DataDir), %% Correct get-config rpc Data = [{server,[{xmlns,"myns"}],[{name,[],["myserver"]}]}], RpcAttr1 = ?NETCONF_NAMESPACE_ATTR ++ [{'message-id',"1"}], RpcGetConf = {rpc,RpcAttr1, [{'get-config', [{source,["running"]}, {filter,[{type,"subtree"}], [{server,[{xmlns,"myns"}],[]}]}]}]}, ?NS:expect_reply('get-config',{data,Data}), {'rpc-reply',RpcAttr1,[{data,_,Data}]} = ct_netconfc:send(Client,RpcGetConf), %% Correct edit-config rpc RpcAttr2 = ?NETCONF_NAMESPACE_ATTR ++ [{'message-id',"2"}], RpcEditConf = {rpc,RpcAttr2, [{'edit-config', [{target,["running"]}, {config,[{server,[{xmlns,"myns"}], [{name,["myserver"]}]}]}]}]}, ?NS:expect_reply('edit-config',ok), {'rpc-reply',RpcAttr2,[{ok,_,[]}]} = ct_netconfc:send(Client,RpcEditConf), %% Send any data ?NS:expect_reply(any,{ok,[],[]}), {ok,_,[]} = ct_netconfc:send(Client,{any,[],[]}), ?NS:expect_do_reply('close-session',close,ok), ?ok = ct_netconfc:close_session(Client), ok. hide_password(Config) -> DataDir = ?config(data_dir,Config), {ok,Client} = open_success(DataDir), Password = "my_very_secret_password", Data = [{passwords,[{xmlns,"myns"}], [{password,[{xmlns,"pwdns"}],[Password]}, {password,[],[Password]}]}], ?NS:expect_reply('get',{data,Data}), ct:capture_start(), % in case of html logging {ok,Data} = ct_netconfc:get(Client,{passwords,[{xmlns,"myns"}],[]}), ct:capture_stop(), ?NS:expect_do_reply('close-session',close,ok), ?ok = ct_netconfc:close_session(Client), Log = filename:join(?config(priv_dir,Config),"hide_password-netconf.txt"), Text = case file:read_file(Log) of {ok,Bin} -> Bin; _NoLog -> %% Assume html logging list_to_binary(ct:capture_get()) end, nomatch = binary:match(Text,list_to_binary(Password)), ok. not_proper_xml(Config) -> DataDir = ?config(data_dir,Config), {ok,Client} = open_success(DataDir), NS = list_to_binary(?NETCONF_NAMESPACE), NotProper = <<"">>, ?NS:expect_reply('get',NotProper), {error,{failed_to_parse_received_data,_}} = ct_netconfc:get(Client,{server,[{xmlns,"myns"}],[]}), ?NS:expect_do_reply('close-session',close,ok), ?ok = ct_netconfc:close_session(Client), ok. prefixed_namespace(Config) -> DataDir = ?config(data_dir,Config), {ok,Client} = open_success(DataDir), NS = list_to_binary(?NETCONF_NAMESPACE), %% Test that data element can be properly decoded and that %% prefixed namespace attributes (exepct the netconf namespace) %% are forwarded to the content of the data element - i.e. that %% the xmlns:my is forwarded from the rpc-reply element to the %% server element below. Data = <<"", "myserver" "">>, ?NS:expect_reply('get',Data), {ok,[{'my:server',[{'xmlns:my',"myns"}], [{'my:name',[{'my:lang',"en"}],["myserver"]}]}]} = ct_netconfc:get(Client,{server,[{xmlns,"myns"}],[]}), Ok = <<"">>, ?NS:expect_reply('edit-config',Ok), ?ok = ct_netconfc:edit_config(Client,running, {server,[{xmlns,"myns"}], [{name,["myserver"]}]}), ?NS:expect_do_reply('close-session',close,ok), ?ok = ct_netconfc:close_session(Client), ok. %% Test that the client can parse data which is received in chunks, %% i.e. when the complete rpc-reply is not contained in one single ssh %% data message. receive_chunked_data(Config) -> DataDir = ?config(data_dir,Config), {ok,Client} = open_success(DataDir), %% Construct the data to return from netconf server Data = [{servers,[{xmlns,"myns"}], [{server,[],[{name,[],["server0"]}]}, {server,[],[{name,[],["server1"]}]}, {server,[],[{name,[],["server2"]}]}, {server,[],[{name,[],["server3"]}]}, {server,[],[{name,[],["server4"]}]}, {server,[],[{name,[],["server5"]}]}, {server,[],[{name,[],["server6"]}]}, {server,[],[{name,[],["server7"]}]}, {server,[],[{name,[],["server8"]}]}, {server,[],[{name,[],["server9"]}]}] }], Rpc = {'rpc-reply',?NETCONF_NAMESPACE_ATTR ++ [{'message-id',"1"}], [{data,Data}]}, Xml = list_to_binary(xmerl:export_simple_element(Rpc,xmerl_xml)), Netconf = <<"\n", Xml/binary,"\n",?END_TAG/binary>>, %% Split the data in some chunks PartLength = size(Netconf) div 3, <> = Netconf, %% Spawn a process which will wait a bit for the client to send %% the request (below), then order the server to the chunks of the %% rpc-reply one by one. spawn(fun() -> timer:sleep(500),?NS:hupp(send,Part1), timer:sleep(100),?NS:hupp(send,Part2), timer:sleep(100),?NS:hupp(send,Part3), timer:sleep(100),?NS:hupp(send,Part4) end), %% Order server to expect a get - then the process above will make %% sure the rpc-reply is sent. ?NS:expect('get'), {ok,Data} = ct_netconfc:get(Client,{server,[{xmlns,"myns"}],[]}), ?NS:expect_do_reply('close-session',close,ok), ?ok = ct_netconfc:close_session(Client), ok. %% Same as receive_chunked_data, but timeout waiting for last part. timeout_receive_chunked_data(Config) -> DataDir = ?config(data_dir,Config), {ok,Client} = open_success(DataDir), %% Construct the data to return from netconf server Data = [{servers,[{xmlns,"myns"}], [{server,[],[{name,[],["server0"]}]}, {server,[],[{name,[],["server1"]}]}, {server,[],[{name,[],["server2"]}]}, {server,[],[{name,[],["server3"]}]}, {server,[],[{name,[],["server4"]}]}, {server,[],[{name,[],["server5"]}]}, {server,[],[{name,[],["server6"]}]}, {server,[],[{name,[],["server7"]}]}, {server,[],[{name,[],["server8"]}]}, {server,[],[{name,[],["server9"]}]}] }], Rpc = {'rpc-reply',?NETCONF_NAMESPACE_ATTR ++ [{'message-id',"1"}], [{data,Data}]}, Xml = list_to_binary(xmerl:export_simple_element(Rpc,xmerl_xml)), Netconf = <<"\n", Xml/binary,"\n",?END_TAG/binary>>, %% Split the data in some chunks PartLength = size(Netconf) div 3, <> = Netconf, %% Spawn a process which will wait a bit for the client to send %% the request (below), then order the server to the chunks of the %% rpc-reply one by one. spawn(fun() -> timer:sleep(500),?NS:hupp(send,Part1), timer:sleep(100),?NS:hupp(send,Part2) end), %% Order server to expect a get - then the process above will make %% sure the rpc-reply is sent - but only a part of it - then timeout. ?NS:expect('get'), {error,timeout} = ct_netconfc:get(Client,{server,[{xmlns,"myns"}],[]},2000), ?NS:expect_do_reply('close-session',close,ok), ?ok = ct_netconfc:close_session(Client), ok. %% Same as receive_chunked_data, but timeout waiting for last part. close_while_waiting_for_chunked_data(Config) -> DataDir = ?config(data_dir,Config), {ok,Client} = open_success(DataDir), %% Construct the data to return from netconf server Data = [{servers,[{xmlns,"myns"}], [{server,[],[{name,[],["server0"]}]}, {server,[],[{name,[],["server1"]}]}, {server,[],[{name,[],["server2"]}]}, {server,[],[{name,[],["server3"]}]}, {server,[],[{name,[],["server4"]}]}, {server,[],[{name,[],["server5"]}]}, {server,[],[{name,[],["server6"]}]}, {server,[],[{name,[],["server7"]}]}, {server,[],[{name,[],["server8"]}]}, {server,[],[{name,[],["server9"]}]}] }], Rpc = {'rpc-reply',?NETCONF_NAMESPACE_ATTR ++ [{'message-id',"1"}], [{data,Data}]}, Xml = list_to_binary(xmerl:export_simple_element(Rpc,xmerl_xml)), Netconf = <<"\n", Xml/binary,"\n",?END_TAG/binary>>, %% Split the data in some chunks PartLength = size(Netconf) div 3, <> = Netconf, %% Spawn a process which will wait a bit for the client to send %% the request (below), then order the server to the chunks of the %% rpc-reply one by one. spawn(fun() -> timer:sleep(500),?NS:hupp(send,Part1), timer:sleep(100),?NS:hupp(send,Part2), timer:sleep(100),?NS:hupp(kill) end), %% Order server to expect a get - then the process above will make %% sure the rpc-reply is sent - but only a part of it - then close. ?NS:expect('get'), {error,closed} = ct_netconfc:get(Client,{server,[{xmlns,"myns"}],[]},2000), ok. connection_crash(Config) -> DataDir = ?config(data_dir,Config), {ok,Client} = open_success(DataDir), %% Test that if the test survives killing the connection %% process. Earlier this caused ct_util_server to terminate, and %% this aborting the complete test run. spawn(fun() -> timer:sleep(500),exit(Client,kill) end), ?NS:expect(get), {error,{closed,killed}}=ct_netconfc:get(Client,{server,[{xmlns,"myns"}],[]}), ok. get_event_streams(Config) -> DataDir = ?config(data_dir,Config), {ok,Client} = open_success(DataDir), StreamNames = ["NETCONF","stream1","stream2"], Streams = [{N,[{description,"descr of " ++ N}]} || N <- StreamNames], StreamsXml = [{stream,[{name,[N]}|[{Tag,[Value]} || {Tag,Value} <- Data]]} || {N,Data} <- Streams], ReplyData = [{netconf,?NETMOD_NOTIF_NAMESPACE_ATTR,[{streams,StreamsXml}]}], ?NS:expect_reply('get',{data,ReplyData}), {ok,Streams} = ct_netconfc:get_event_streams(Client,StreamNames), ?NS:expect_reply('get',{data,ReplyData}), {ok,Streams} = ct_netconfc:get_event_streams(Client,StreamNames,5000), ?NS:expect('get'), {error,timeout} = ct_netconfc:get_event_streams(Client,100), ?NS:expect_do_reply('close-session',close,ok), ?ok = ct_netconfc:close_session(Client), ok. create_subscription(Config) -> DataDir = ?config(data_dir,Config), %% All defaults {ok,Client1} = open_success(DataDir), ?NS:expect_reply({'create-subscription',[stream]},ok), ?ok = ct_netconfc:create_subscription(Client1), ?NS:expect_do_reply('close-session',close,ok), ?ok = ct_netconfc:close_session(Client1), %% All defaults with timeout {ok,Client1a} = open_success(DataDir), ?NS:expect_reply({'create-subscription',[stream]},ok), ?ok = ct_netconfc:create_subscription(Client1a,5000), ?NS:expect_do_reply('close-session',close,ok), ?ok = ct_netconfc:close_session(Client1a), %% All defaults timing out {ok,Client1b} = open_success(DataDir), ?NS:expect({'create-subscription',[stream]}), {error,timeout} = ct_netconfc:create_subscription(Client1b,100), ?NS:expect_do_reply('close-session',close,ok), ?ok = ct_netconfc:close_session(Client1b), %% Stream {ok,Client2} = open_success(DataDir), ?NS:expect_reply({'create-subscription',[stream]},ok), Stream = "some_stream", ?ok = ct_netconfc:create_subscription(Client2,Stream), ?NS:expect_do_reply('close-session',close,ok), ?ok = ct_netconfc:close_session(Client2), %% Filter {ok,Client3} = open_success(DataDir), ?NS:expect_reply({'create-subscription',[stream,filter]},ok), Filter = {notification,?NETMOD_NOTIF_NAMESPACE_ATTR, [eventTime]}, ?ok = ct_netconfc:create_subscription(Client3,Filter), ?NS:expect_do_reply('close-session',close,ok), ?ok = ct_netconfc:close_session(Client3), %% Filter with timeout {ok,Client3a} = open_success(DataDir), ?NS:expect_reply({'create-subscription',[stream,filter]},ok), ?ok = ct_netconfc:create_subscription(Client3a,Filter,5000), ?NS:expect_do_reply('close-session',close,ok), ?ok = ct_netconfc:close_session(Client3a), %% Filter timing out {ok,Client3b} = open_success(DataDir), ?NS:expect({'create-subscription',[stream,filter]}), {error,timeout}=ct_netconfc:create_subscription(Client3b,Filter,100), ?NS:expect_do_reply('close-session',close,ok), ?ok = ct_netconfc:close_session(Client3b), %% Stream and filter {ok,Client4} = open_success(DataDir), ?NS:expect_reply({'create-subscription',[stream,filter]},ok), ?ok = ct_netconfc:create_subscription(Client4,Stream,Filter), ?NS:expect_do_reply('close-session',close,ok), ?ok = ct_netconfc:close_session(Client4), %% Start/stop time {ok,Client5} = open_success(DataDir), ?NS:expect_reply({'create-subscription',[stream,startTime,stopTime]},ok), StartTime = xs_datetime({D,{H,M,S}}= calendar:local_time()), StopTime = xs_datetime({D,{H+2,M,S}}), ?ok = ct_netconfc:create_subscription(Client5,StartTime,StopTime), ?NS:expect_do_reply('close-session',close,ok), ?ok = ct_netconfc:close_session(Client5), %% Start/stop time with timeout {ok,Client5a} = open_success(DataDir), ?NS:expect_reply({'create-subscription',[stream,startTime,stopTime]},ok), ?ok = ct_netconfc:create_subscription(Client5a,StartTime,StopTime,5000), ?NS:expect_do_reply('close-session',close,ok), ?ok = ct_netconfc:close_session(Client5a), %% Start/stop time timing out {ok,Client5b} = open_success(DataDir), ?NS:expect({'create-subscription',[stream,startTime,stopTime]}), {error,timeout} = ct_netconfc:create_subscription(Client5b,StartTime,StopTime,100), ?NS:expect_do_reply('close-session',close,ok), ?ok = ct_netconfc:close_session(Client5b), %% Stream and start/stop time {ok,Client6} = open_success(DataDir), ?NS:expect_reply({'create-subscription',[stream,startTime,stopTime]},ok), ?ok = ct_netconfc:create_subscription(Client6,Stream,StartTime,StopTime), ?NS:expect_do_reply('close-session',close,ok), ?ok = ct_netconfc:close_session(Client6), %% Filter and start/stop time {ok,Client7} = open_success(DataDir), ?NS:expect_reply({'create-subscription',[stream,filter,startTime,stopTime]}, ok), ?ok = ct_netconfc:create_subscription(Client7,Filter, StartTime,StopTime), ?NS:expect_do_reply('close-session',close,ok), ?ok = ct_netconfc:close_session(Client7), %% Stream, filter and start/stop time {ok,Client8} = open_success(DataDir), ?NS:expect_reply({'create-subscription',[stream,filter,startTime,stopTime]}, ok), ?ok = ct_netconfc:create_subscription(Client8,Stream,Filter, StartTime,StopTime), ?NS:expect_do_reply('close-session',close,ok), ?ok = ct_netconfc:close_session(Client8), ok. receive_event(Config) -> DataDir = ?config(data_dir,Config), {ok,Client} = open_success(DataDir), ?NS:expect_reply({'create-subscription',[stream]},ok), ?ok = ct_netconfc:create_subscription(Client), ?NS:hupp(send_event), receive %% Matching ?NS:make_msg(event) {notification,?NETCONF_NOTIF_NAMESPACE_ATTR, [{eventTime,[],[_Time]}, {event,[{xmlns,"http://my.namespaces.com/event"}], [{severity,_,_}, {description,_,_}]}]} -> ok; Other -> ct:fail({got_unexpected_while_waiting_for_event, Other}) after 3000 -> ct:fail(timeout_waiting_for_event) end, ?NS:expect_do_reply('close-session',close,ok), ?ok = ct_netconfc:close_session(Client), ok. %%%----------------------------------------------------------------- break(_Config) -> test_server:break("break test case"). br() -> test_server:break(""). %%%----------------------------------------------------------------- %% Open a netconf session which is not specified in a config file open_success(Dir) -> open_success(Dir,[]). %% Open a netconf session which is not specified in a config file, and %% give som extra options in addition to the test defaults. open_success(Dir,ExtraOpts) when is_list(Dir), is_list(ExtraOpts) -> ?NS:hello(1), % tell server to send hello with session id 1 ?NS:expect(hello), % tell server to expect a hello message from client open(Dir,ExtraOpts); %% Open a named netconf session which is not specified in a config file open_success(KeyOrName,Dir) when is_atom(KeyOrName), is_list(Dir) -> ?NS:hello(1), ?NS:expect(hello), ct_netconfc:open(KeyOrName,?DEFAULT_SSH_OPTS(Dir)). open(Dir) -> open(Dir,[]). open(Dir,ExtraOpts) -> Opts = lists:ukeymerge(1,lists:keysort(1,ExtraOpts), lists:keysort(1,?DEFAULT_SSH_OPTS(Dir))), ct_netconfc:open(Opts). %%%----------------------------------------------------------------- %%% Open a netconf session which is specified in a config file %%% KeyOrName is the config key (server_id()) or name given in a %%% require statement (target_name()). open_configured_success(KeyOrName,Dir) when is_atom(KeyOrName) -> open_configured_success(KeyOrName,Dir,[]). open_configured_success(KeyOrName,Dir,ExtraOpts) when is_atom(KeyOrName) -> ?NS:hello(1), ?NS:expect(hello), ct_netconfc:open(KeyOrName,[{user_dir,Dir}|ExtraOpts]). %%%----------------------------------------------------------------- %%% Convert erlang datetime to the simplest variant of XML dateTime xs_datetime({{Y,M,D},{H,Mi,S}}) -> lists:flatten( io_lib:format("~p-~s-~sT~s:~s:~s",[Y,pad(M),pad(D),pad(H),pad(Mi),pad(S)])). pad(I) when I<10 -> "0"++integer_to_list(I); pad(I) -> integer_to_list(I). %%%----------------------------------------------------------------- %%% BEGIN SSH key management %% copy private keys to given dir from ~/.ssh get_id_keys(Config) -> DstDir = ?config(priv_dir, Config), SrcDir = filename:join(os:getenv("HOME"), ".ssh"), RsaOk = copyfile(SrcDir, DstDir, "id_rsa"), DsaOk = copyfile(SrcDir, DstDir, "id_dsa"), case {RsaOk, DsaOk} of {{ok, _}, {ok, _}} -> {ok, both}; {{ok, _}, _} -> {ok, rsa}; {_, {ok, _}} -> {ok, dsa}; {Error, _} -> Error end. %% Remove later on. Use make_dsa_files instead. remove_id_keys(Config) -> Dir = ?config(priv_dir, Config), file:delete(filename:join(Dir, "id_rsa")), file:delete(filename:join(Dir, "id_dsa")). make_dsa_files(Config) -> make_dsa_files(Config, rfc4716_public_key). make_dsa_files(Config, Type) -> {DSA, EncodedKey} = gen_dsa(128, 20), PKey = DSA#'DSAPrivateKey'.y, P = DSA#'DSAPrivateKey'.p, Q = DSA#'DSAPrivateKey'.q, G = DSA#'DSAPrivateKey'.g, Dss = #'Dss-Parms'{p=P, q=Q, g=G}, {ok, Hostname} = inet:gethostname(), {ok, {A, B, C, D}} = inet:getaddr(Hostname, inet), IP = lists:concat([A, ".", B, ".", C, ".", D]), Attributes = [], % Could be [{comment,"user@" ++ Hostname}], HostNames = [{hostnames,[IP, IP]}], PublicKey = [{{PKey, Dss}, Attributes}], KnownHosts = [{{PKey, Dss}, HostNames}], KnownHostsEnc = public_key:ssh_encode(KnownHosts, known_hosts), KnownHosts = public_key:ssh_decode(KnownHostsEnc, known_hosts), PublicKeyEnc = public_key:ssh_encode(PublicKey, Type), SystemTmpDir = ?config(data_dir, Config), filelib:ensure_dir(SystemTmpDir), file:make_dir(SystemTmpDir), DSAFile = filename:join(SystemTmpDir, "ssh_host_dsa_key.pub"), file:delete(DSAFile), DSAPrivateFile = filename:join(SystemTmpDir, "ssh_host_dsa_key"), file:delete(DSAPrivateFile), KHFile = filename:join(SystemTmpDir, "known_hosts"), file:delete(KHFile), PemBin = public_key:pem_encode([EncodedKey]), file:write_file(DSAFile, PublicKeyEnc), file:write_file(KHFile, KnownHostsEnc), file:write_file(DSAPrivateFile, PemBin), ok. %%-------------------------------------------------------------------- %% Creates a dsa key (OBS: for testing only) %% the sizes are in bytes %% gen_dsa(::integer()) -> {::atom(), ::binary(), ::opaque()} %%-------------------------------------------------------------------- gen_dsa(LSize,NSize) when is_integer(LSize), is_integer(NSize) -> Key = gen_dsa2(LSize, NSize), {Key, encode_key(Key)}. encode_key(Key = #'RSAPrivateKey'{}) -> {ok, Der} = 'OTP-PUB-KEY':encode('RSAPrivateKey', Key), {'RSAPrivateKey', list_to_binary(Der), not_encrypted}; encode_key(Key = #'DSAPrivateKey'{}) -> {ok, Der} = 'OTP-PUB-KEY':encode('DSAPrivateKey', Key), {'DSAPrivateKey', list_to_binary(Der), not_encrypted}. %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% %% DSA key generation (OBS: for testing only) %% See http://en.wikipedia.org/wiki/Digital_Signature_Algorithm %% and the fips_186-3.pdf %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% gen_dsa2(LSize, NSize) -> Q = prime(NSize), %% Choose N-bit prime Q X0 = prime(LSize), P0 = prime((LSize div 2) +1), %% Choose L-bit prime modulus P such that p-1 is a multiple of q. case dsa_search(X0 div (2*Q*P0), P0, Q, 1000) of error -> gen_dsa2(LSize, NSize); P -> G = crypto:mod_exp(2, (P-1) div Q, P), % Choose G a number whose multiplicative order modulo p is q. %% such that This may be done by setting g = h^(p-1)/q mod p, commonly h=2 is used. X = prime(20), %% Choose x by some random method, where 0 < x < q. Y = crypto:mod_exp(G, X, P), %% Calculate y = g^x mod p. #'DSAPrivateKey'{version=0, p=P, q=Q, g=G, y=Y, x=X} end. %% See fips_186-3.pdf dsa_search(T, P0, Q, Iter) when Iter > 0 -> P = 2*T*Q*P0 + 1, case is_prime(crypto:mpint(P), 50) of true -> P; false -> dsa_search(T+1, P0, Q, Iter-1) end; dsa_search(_,_,_,_) -> error. %%%%%%% Crypto Math %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% prime(ByteSize) -> Rand = odd_rand(ByteSize), crypto:erlint(prime_odd(Rand, 0)). prime_odd(Rand, N) -> case is_prime(Rand, 50) of true -> Rand; false -> NotPrime = crypto:erlint(Rand), prime_odd(crypto:mpint(NotPrime+2), N+1) end. %% see http://en.wikipedia.org/wiki/Fermat_primality_test is_prime(_, 0) -> true; is_prime(Candidate, Test) -> CoPrime = odd_rand(<<0,0,0,4, 10000:32>>, Candidate), case crypto:mod_exp(CoPrime, Candidate, Candidate) of CoPrime -> is_prime(Candidate, Test-1); _ -> false end. odd_rand(Size) -> Min = 1 bsl (Size*8-1), Max = (1 bsl (Size*8))-1, odd_rand(crypto:mpint(Min), crypto:mpint(Max)). odd_rand(Min,Max) -> Rand = <> = crypto:rand_uniform(Min,Max), BitSkip = (Sz+4)*8-1, case Rand of Odd = <<_:BitSkip, 1:1>> -> Odd; Even = <<_:BitSkip, 0:1>> -> crypto:mpint(crypto:erlint(Even)+1) end. copyfile(SrcDir, DstDir, Fn) -> file:copy(filename:join(SrcDir, Fn), filename:join(DstDir, Fn)). %%% END SSH key management %%%-----------------------------------------------------------------