Skip to content

Commit 7e6fbd8

Browse files
paxangopherbot
authored andcommitted
ssh: wrap errors from client handshake
When an error is returned by a user defined host key callback, it is now possible to handle it using standard Go mechanisms such as errors.Is or errors.As. Fixes golang/go#61309 Change-Id: I4269c5f8eacd8e7e8d85070ad249f0e27777b15f GitHub-Last-Rev: d2a34d5 GitHub-Pull-Request: #266 Reviewed-on: https://go-review.googlesource.com/c/crypto/+/508876 Run-TryBot: Nicola Murino <nicola.murino@gmail.com> Auto-Submit: Dmitri Shuralyov <dmitshur@golang.org> Reviewed-by: Muhammad Shulhan <m.shulhan@gmail.com> Reviewed-by: Michael Knyszek <mknyszek@google.com> Reviewed-by: Dmitri Shuralyov <dmitshur@google.com> Reviewed-by: Nicola Murino <nicola.murino@gmail.com> TryBot-Result: Gopher Robot <gobot@golang.org>
1 parent bda2f3f commit 7e6fbd8

File tree

2 files changed

+24
-3
lines changed

2 files changed

+24
-3
lines changed

ssh/client.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -82,7 +82,7 @@ func NewClientConn(c net.Conn, addr string, config *ClientConfig) (Conn, <-chan
8282

8383
if err := conn.clientHandshake(addr, &fullConf); err != nil {
8484
c.Close()
85-
return nil, nil, nil, fmt.Errorf("ssh: handshake failed: %v", err)
85+
return nil, nil, nil, fmt.Errorf("ssh: handshake failed: %w", err)
8686
}
8787
conn.mux = newMux(conn.transport)
8888
return conn, conn.mux.incomingChannels, conn.mux.incomingRequests, nil

ssh/client_test.go

+23-2
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,9 @@ package ssh
77
import (
88
"bytes"
99
"crypto/rand"
10+
"errors"
11+
"fmt"
12+
"net"
1013
"strings"
1114
"testing"
1215
)
@@ -207,9 +210,12 @@ func TestBannerCallback(t *testing.T) {
207210
}
208211

209212
func TestNewClientConn(t *testing.T) {
213+
errHostKeyMismatch := errors.New("host key mismatch")
214+
210215
for _, tt := range []struct {
211-
name string
212-
user string
216+
name string
217+
user string
218+
simulateHostKeyMismatch HostKeyCallback
213219
}{
214220
{
215221
name: "good user field for ConnMetadata",
@@ -219,6 +225,13 @@ func TestNewClientConn(t *testing.T) {
219225
name: "empty user field for ConnMetadata",
220226
user: "",
221227
},
228+
{
229+
name: "host key mismatch",
230+
user: "testuser",
231+
simulateHostKeyMismatch: func(hostname string, remote net.Addr, key PublicKey) error {
232+
return fmt.Errorf("%w: %s", errHostKeyMismatch, bytes.TrimSpace(MarshalAuthorizedKey(key)))
233+
},
234+
},
222235
} {
223236
t.Run(tt.name, func(t *testing.T) {
224237
c1, c2, err := netPipe()
@@ -243,8 +256,16 @@ func TestNewClientConn(t *testing.T) {
243256
},
244257
HostKeyCallback: InsecureIgnoreHostKey(),
245258
}
259+
260+
if tt.simulateHostKeyMismatch != nil {
261+
clientConf.HostKeyCallback = tt.simulateHostKeyMismatch
262+
}
263+
246264
clientConn, _, _, err := NewClientConn(c2, "", clientConf)
247265
if err != nil {
266+
if tt.simulateHostKeyMismatch != nil && errors.Is(err, errHostKeyMismatch) {
267+
return
268+
}
248269
t.Fatal(err)
249270
}
250271

0 commit comments

Comments
 (0)