1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465 |
- #!/usr/bin/env python3
- # Test for CVE-2018-xxxxx
- from mosq_test_helper import *
- import signal
- def write_config(filename, port, per_listener):
- with open(filename, 'w') as f:
- f.write("per_listener_settings %s\n" % (per_listener))
- f.write("port %d\n" % (port))
- f.write("allow_anonymous true\n")
- f.write("acl_file %s\n" % (filename.replace('.conf', '.acl')))
- def write_acl(filename):
- with open(filename, 'w') as f:
- f.write('#comment\n')
- f.write('\n')
- def do_test(port, per_listener):
- conf_file = os.path.basename(__file__).replace('.py', '.conf')
- write_config(conf_file, port, per_listener)
- acl_file = os.path.basename(__file__).replace('.py', '.acl')
- write_acl(acl_file)
- rc = 1
- keepalive = 60
- connect_packet = mosq_test.gen_connect("acl-check", keepalive=keepalive)
- connack_packet = mosq_test.gen_connack(rc=0)
- mid = 1
- publish_packet = mosq_test.gen_publish("test/topic", qos=0, payload="message")
- subscribe_packet = mosq_test.gen_subscribe(mid, "test/topic", 0)
- suback_packet = mosq_test.gen_suback(mid, 0)
- broker = mosq_test.start_broker(filename=os.path.basename(__file__), use_conf=True, port=port)
- try:
- sock = mosq_test.do_client_connect(connect_packet, connack_packet, port=port)
- mosq_test.do_send_receive(sock, subscribe_packet, suback_packet, "suback")
- sock.send(publish_packet)
- # If we receive the message, this will fail.
- mosq_test.do_ping(sock)
- rc = 0
- sock.close()
- except mosq_test.TestError:
- pass
- finally:
- os.remove(conf_file)
- os.remove(acl_file)
- broker.terminate()
- broker.wait()
- (stdo, stde) = broker.communicate()
- if rc:
- print(stde.decode('utf-8'))
- exit(rc)
- port = mosq_test.get_port()
- do_test(port, "false")
- do_test(port, "true")
|