client_integration_test.go 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489
  1. // +build integration
  2. // To turn on this test use -tags=integration in go test command
  3. package client
  4. import (
  5. "encoding/hex"
  6. "net/http"
  7. "os"
  8. "testing"
  9. "errors"
  10. "fmt"
  11. "github.com/stretchr/testify/assert"
  12. "gopkg.in/jcmturner/gokrb5.v4/config"
  13. "gopkg.in/jcmturner/gokrb5.v4/credentials"
  14. "gopkg.in/jcmturner/gokrb5.v4/iana/etypeID"
  15. "gopkg.in/jcmturner/gokrb5.v4/keytab"
  16. "gopkg.in/jcmturner/gokrb5.v4/testdata"
  17. "strings"
  18. "sync"
  19. )
  20. func TestClient_SuccessfulLogin_Keytab(t *testing.T) {
  21. addr := os.Getenv("TEST_KDC_ADDR")
  22. if addr == "" {
  23. addr = testdata.TEST_KDC_ADDR
  24. }
  25. b, err := hex.DecodeString(testdata.TESTUSER1_KEYTAB)
  26. kt, _ := keytab.Parse(b)
  27. c, _ := config.NewConfigFromString(testdata.TEST_KRB5CONF)
  28. var tests = []string{
  29. testdata.TEST_KDC,
  30. testdata.TEST_KDC_OLD,
  31. testdata.TEST_KDC_LASTEST,
  32. }
  33. for _, test := range tests {
  34. c.Realms[0].KDC = []string{addr + ":" + test}
  35. cl := NewClientWithKeytab("testuser1", "TEST.GOKRB5", kt)
  36. cl.WithConfig(c)
  37. err = cl.Login()
  38. if err != nil {
  39. t.Errorf("Error on logging in with KDC %s: %v\n", test, err)
  40. }
  41. }
  42. }
  43. func TestClient_SuccessfulLogin_Password(t *testing.T) {
  44. addr := os.Getenv("TEST_KDC_ADDR")
  45. if addr == "" {
  46. addr = testdata.TEST_KDC_ADDR
  47. }
  48. c, _ := config.NewConfigFromString(testdata.TEST_KRB5CONF)
  49. var tests = []string{
  50. testdata.TEST_KDC,
  51. testdata.TEST_KDC_OLD,
  52. testdata.TEST_KDC_LASTEST,
  53. }
  54. for _, test := range tests {
  55. c.Realms[0].KDC = []string{addr + ":" + test}
  56. cl := NewClientWithPassword("testuser1", "TEST.GOKRB5", "passwordvalue")
  57. cl.WithConfig(c)
  58. err := cl.Login()
  59. if err != nil {
  60. t.Errorf("Error on logging in with KDC %s: %v\n", test, err)
  61. }
  62. }
  63. }
  64. func TestClient_SuccessfulLogin_TCPOnly(t *testing.T) {
  65. b, err := hex.DecodeString(testdata.TESTUSER1_KEYTAB)
  66. kt, _ := keytab.Parse(b)
  67. c, _ := config.NewConfigFromString(testdata.TEST_KRB5CONF)
  68. addr := os.Getenv("TEST_KDC_ADDR")
  69. if addr == "" {
  70. addr = testdata.TEST_KDC_ADDR
  71. }
  72. c.Realms[0].KDC = []string{addr + ":" + testdata.TEST_KDC}
  73. c.LibDefaults.UDPPreferenceLimit = 1
  74. cl := NewClientWithKeytab("testuser1", "TEST.GOKRB5", kt)
  75. cl.WithConfig(c)
  76. err = cl.Login()
  77. if err != nil {
  78. t.Fatalf("Error on login: %v\n", err)
  79. }
  80. }
  81. func TestClient_ASExchange_TGSExchange_EncTypes_Keytab(t *testing.T) {
  82. b, err := hex.DecodeString(testdata.TESTUSER1_KEYTAB)
  83. kt, _ := keytab.Parse(b)
  84. c, _ := config.NewConfigFromString(testdata.TEST_KRB5CONF)
  85. addr := os.Getenv("TEST_KDC_ADDR")
  86. if addr == "" {
  87. addr = testdata.TEST_KDC_ADDR
  88. }
  89. c.Realms[0].KDC = []string{addr + ":" + testdata.TEST_KDC_LASTEST}
  90. var tests = []string{
  91. "des3-cbc-sha1-kd",
  92. "aes128-cts-hmac-sha1-96",
  93. "aes256-cts-hmac-sha1-96",
  94. "aes128-cts-hmac-sha256-128",
  95. "aes256-cts-hmac-sha384-192",
  96. "rc4-hmac",
  97. }
  98. for _, test := range tests {
  99. c.LibDefaults.DefaultTktEnctypes = []string{test}
  100. c.LibDefaults.DefaultTktEnctypeIDs = []int32{etypeID.ETypesByName[test]}
  101. c.LibDefaults.DefaultTGSEnctypes = []string{test}
  102. c.LibDefaults.DefaultTGSEnctypeIDs = []int32{etypeID.ETypesByName[test]}
  103. cl := NewClientWithKeytab("testuser1", "TEST.GOKRB5", kt)
  104. cl.WithConfig(c)
  105. err = cl.Login()
  106. if err != nil {
  107. t.Errorf("Error on login using enctype %s: %v\n", test, err)
  108. }
  109. tkt, key, err := cl.GetServiceTicket("HTTP/host.test.gokrb5")
  110. if err != nil {
  111. t.Errorf("Error in TGS exchange using enctype %s: %v", test, err)
  112. }
  113. assert.Equal(t, "TEST.GOKRB5", tkt.Realm, "Realm in ticket not as expected for %s test", test)
  114. assert.Equal(t, etypeID.ETypesByName[test], key.KeyType, "Key is not for enctype %s", test)
  115. }
  116. }
  117. func TestClient_ASExchange_TGSExchange_EncTypes_Password(t *testing.T) {
  118. c, _ := config.NewConfigFromString(testdata.TEST_KRB5CONF)
  119. addr := os.Getenv("TEST_KDC_ADDR")
  120. if addr == "" {
  121. addr = testdata.TEST_KDC_ADDR
  122. }
  123. c.Realms[0].KDC = []string{addr + ":" + testdata.TEST_KDC_LASTEST}
  124. var tests = []string{
  125. "des3-cbc-sha1-kd",
  126. "aes128-cts-hmac-sha1-96",
  127. "aes256-cts-hmac-sha1-96",
  128. "aes128-cts-hmac-sha256-128",
  129. "aes256-cts-hmac-sha384-192",
  130. "rc4-hmac",
  131. }
  132. for _, test := range tests {
  133. c.LibDefaults.DefaultTktEnctypes = []string{test}
  134. c.LibDefaults.DefaultTktEnctypeIDs = []int32{etypeID.ETypesByName[test]}
  135. c.LibDefaults.DefaultTGSEnctypes = []string{test}
  136. c.LibDefaults.DefaultTGSEnctypeIDs = []int32{etypeID.ETypesByName[test]}
  137. cl := NewClientWithPassword("testuser1", "TEST.GOKRB5", "passwordvalue")
  138. cl.WithConfig(c)
  139. err := cl.Login()
  140. if err != nil {
  141. t.Errorf("Error on login using enctype %s: %v\n", test, err)
  142. }
  143. tkt, key, err := cl.GetServiceTicket("HTTP/host.test.gokrb5")
  144. if err != nil {
  145. t.Errorf("Error in TGS exchange using enctype %s: %v", test, err)
  146. }
  147. assert.Equal(t, "TEST.GOKRB5", tkt.Realm, "Realm in ticket not as expected for %s test", test)
  148. assert.Equal(t, etypeID.ETypesByName[test], key.KeyType, "Key is not for enctype %s", test)
  149. }
  150. }
  151. func TestClient_FailedLogin(t *testing.T) {
  152. b, err := hex.DecodeString(testdata.TESTUSER1_WRONGPASSWD)
  153. kt, _ := keytab.Parse(b)
  154. c, _ := config.NewConfigFromString(testdata.TEST_KRB5CONF)
  155. addr := os.Getenv("TEST_KDC_ADDR")
  156. if addr == "" {
  157. addr = testdata.TEST_KDC_ADDR
  158. }
  159. c.Realms[0].KDC = []string{addr + ":" + testdata.TEST_KDC}
  160. cl := NewClientWithKeytab("testuser1", "TEST.GOKRB5", kt)
  161. cl.WithConfig(c)
  162. err = cl.Login()
  163. if err == nil {
  164. t.Fatal("Login with incorrect password did not error")
  165. }
  166. }
  167. func TestClient_SuccessfulLogin_UserRequiringPreAuth(t *testing.T) {
  168. b, err := hex.DecodeString(testdata.TESTUSER2_KEYTAB)
  169. kt, _ := keytab.Parse(b)
  170. c, _ := config.NewConfigFromString(testdata.TEST_KRB5CONF)
  171. addr := os.Getenv("TEST_KDC_ADDR")
  172. if addr == "" {
  173. addr = testdata.TEST_KDC_ADDR
  174. }
  175. c.Realms[0].KDC = []string{addr + ":" + testdata.TEST_KDC}
  176. cl := NewClientWithKeytab("testuser2", "TEST.GOKRB5", kt)
  177. cl.WithConfig(c)
  178. err = cl.Login()
  179. if err != nil {
  180. t.Fatalf("Error on login: %v\n", err)
  181. }
  182. }
  183. func TestClient_SuccessfulLogin_UserRequiringPreAuth_TCPOnly(t *testing.T) {
  184. b, err := hex.DecodeString(testdata.TESTUSER2_KEYTAB)
  185. kt, _ := keytab.Parse(b)
  186. c, _ := config.NewConfigFromString(testdata.TEST_KRB5CONF)
  187. addr := os.Getenv("TEST_KDC_ADDR")
  188. if addr == "" {
  189. addr = testdata.TEST_KDC_ADDR
  190. }
  191. c.Realms[0].KDC = []string{addr + ":" + testdata.TEST_KDC}
  192. c.LibDefaults.UDPPreferenceLimit = 1
  193. cl := NewClientWithKeytab("testuser2", "TEST.GOKRB5", kt)
  194. cl.WithConfig(c)
  195. err = cl.Login()
  196. if err != nil {
  197. t.Fatalf("Error on login: %v\n", err)
  198. }
  199. }
  200. func TestClient_NetworkTimeout(t *testing.T) {
  201. b, err := hex.DecodeString(testdata.TESTUSER1_KEYTAB)
  202. kt, _ := keytab.Parse(b)
  203. c, _ := config.NewConfigFromString(testdata.TEST_KRB5CONF)
  204. c.Realms[0].KDC = []string{testdata.TEST_KDC_BADADDR + ":88"}
  205. cl := NewClientWithKeytab("testuser1", "TEST.GOKRB5", kt)
  206. cl.WithConfig(c)
  207. err = cl.Login()
  208. if err == nil {
  209. t.Fatal("Login with incorrect KDC address did not error")
  210. }
  211. }
  212. func TestClient_GetServiceTicket(t *testing.T) {
  213. b, err := hex.DecodeString(testdata.TESTUSER1_KEYTAB)
  214. kt, _ := keytab.Parse(b)
  215. c, _ := config.NewConfigFromString(testdata.TEST_KRB5CONF)
  216. addr := os.Getenv("TEST_KDC_ADDR")
  217. if addr == "" {
  218. addr = testdata.TEST_KDC_ADDR
  219. }
  220. c.Realms[0].KDC = []string{addr + ":" + testdata.TEST_KDC}
  221. cl := NewClientWithKeytab("testuser1", "TEST.GOKRB5", kt)
  222. cl.WithConfig(c)
  223. err = cl.Login()
  224. if err != nil {
  225. t.Fatalf("Error on login: %v\n", err)
  226. }
  227. spn := "HTTP/host.test.gokrb5"
  228. tkt, key, err := cl.GetServiceTicket(spn)
  229. if err != nil {
  230. t.Fatalf("Error getting service ticket: %v\n", err)
  231. }
  232. assert.Equal(t, spn, tkt.SName.GetPrincipalNameString())
  233. assert.Equal(t, int32(18), key.KeyType)
  234. //Check cache use - should get the same values back again
  235. tkt2, key2, err := cl.GetServiceTicket(spn)
  236. if err != nil {
  237. t.Fatalf("Error getting service ticket: %v\n", err)
  238. }
  239. assert.Equal(t, tkt.EncPart.Cipher, tkt2.EncPart.Cipher)
  240. assert.Equal(t, key.KeyValue, key2.KeyValue)
  241. }
  242. func TestClient_GetServiceTicket_InvalidSPN(t *testing.T) {
  243. b, err := hex.DecodeString(testdata.TESTUSER1_KEYTAB)
  244. kt, _ := keytab.Parse(b)
  245. c, _ := config.NewConfigFromString(testdata.TEST_KRB5CONF)
  246. addr := os.Getenv("TEST_KDC_ADDR")
  247. if addr == "" {
  248. addr = testdata.TEST_KDC_ADDR
  249. }
  250. c.Realms[0].KDC = []string{addr + ":" + testdata.TEST_KDC}
  251. cl := NewClientWithKeytab("testuser1", "TEST.GOKRB5", kt)
  252. cl.WithConfig(c)
  253. err = cl.Login()
  254. if err != nil {
  255. t.Fatalf("Error on login: %v\n", err)
  256. }
  257. spn := "host.test.gokrb5"
  258. _, _, err = cl.GetServiceTicket(spn)
  259. assert.NotNil(t, err, "Expected unknown principal error")
  260. assert.True(t, strings.Contains(err.Error(), "KDC_ERR_S_PRINCIPAL_UNKNOWN"), "Error text not as expected")
  261. }
  262. func TestClient_GetServiceTicket_OlderKDC(t *testing.T) {
  263. b, err := hex.DecodeString(testdata.TESTUSER1_KEYTAB)
  264. kt, _ := keytab.Parse(b)
  265. c, _ := config.NewConfigFromString(testdata.TEST_KRB5CONF)
  266. addr := os.Getenv("TEST_KDC_ADDR")
  267. if addr == "" {
  268. addr = testdata.TEST_KDC_ADDR
  269. }
  270. c.Realms[0].KDC = []string{addr + ":" + testdata.TEST_KDC_OLD}
  271. cl := NewClientWithKeytab("testuser1", "TEST.GOKRB5", kt)
  272. cl.WithConfig(c)
  273. err = cl.Login()
  274. if err != nil {
  275. t.Fatalf("Error on login: %v\n", err)
  276. }
  277. spn := "HTTP/host.test.gokrb5"
  278. tkt, key, err := cl.GetServiceTicket(spn)
  279. if err != nil {
  280. t.Fatalf("Error getting service ticket: %v\n", err)
  281. }
  282. assert.Equal(t, spn, tkt.SName.GetPrincipalNameString())
  283. assert.Equal(t, int32(18), key.KeyType)
  284. }
  285. func TestClient_SetSPNEGOHeader(t *testing.T) {
  286. b, _ := hex.DecodeString(testdata.TESTUSER1_KEYTAB)
  287. kt, _ := keytab.Parse(b)
  288. c, _ := config.NewConfigFromString(testdata.TEST_KRB5CONF)
  289. addr := os.Getenv("TEST_KDC_ADDR")
  290. if addr == "" {
  291. addr = testdata.TEST_KDC_ADDR
  292. }
  293. c.Realms[0].KDC = []string{addr + ":" + testdata.TEST_KDC}
  294. cl := NewClientWithKeytab("testuser1", "TEST.GOKRB5", kt)
  295. cl.WithConfig(c)
  296. err := cl.Login()
  297. if err != nil {
  298. t.Fatalf("Error on AS_REQ: %v\n", err)
  299. }
  300. url := os.Getenv("TEST_HTTP_URL")
  301. if url == "" {
  302. url = testdata.TEST_HTTP_URL
  303. }
  304. r, _ := http.NewRequest("GET", url, nil)
  305. httpResp, err := http.DefaultClient.Do(r)
  306. if err != nil {
  307. t.Fatalf("Request error: %v\n", err)
  308. }
  309. assert.Equal(t, http.StatusUnauthorized, httpResp.StatusCode, "Status code in response to client with no SPNEGO not as expected")
  310. err = cl.SetSPNEGOHeader(r, "HTTP/host.test.gokrb5")
  311. if err != nil {
  312. t.Fatalf("Error setting client SPNEGO header: %v", err)
  313. }
  314. httpResp, err = http.DefaultClient.Do(r)
  315. if err != nil {
  316. t.Fatalf("Request error: %v\n", err)
  317. }
  318. assert.Equal(t, http.StatusOK, httpResp.StatusCode, "Status code in response to client SPNEGO request not as expected")
  319. }
  320. func TestMultiThreadedClientUse(t *testing.T) {
  321. b, _ := hex.DecodeString(testdata.TESTUSER1_KEYTAB)
  322. kt, _ := keytab.Parse(b)
  323. c, _ := config.NewConfigFromString(testdata.TEST_KRB5CONF)
  324. addr := os.Getenv("TEST_KDC_ADDR")
  325. if addr == "" {
  326. addr = testdata.TEST_KDC_ADDR
  327. }
  328. c.Realms[0].KDC = []string{addr + ":" + testdata.TEST_KDC}
  329. cl := NewClientWithKeytab("testuser1", "TEST.GOKRB5", kt)
  330. cl.WithConfig(c)
  331. var wg sync.WaitGroup
  332. wg.Add(5)
  333. for i := 0; i < 5; i++ {
  334. go func() {
  335. defer wg.Done()
  336. err := cl.Login()
  337. if err != nil {
  338. panic(err)
  339. }
  340. }()
  341. }
  342. wg.Wait()
  343. var wg2 sync.WaitGroup
  344. wg2.Add(5)
  345. for i := 0; i < 5; i++ {
  346. go func() {
  347. defer wg2.Done()
  348. err := spnegoGet(&cl)
  349. if err != nil {
  350. panic(err)
  351. }
  352. }()
  353. }
  354. wg2.Wait()
  355. }
  356. func spnegoGet(cl *Client) error {
  357. url := os.Getenv("TEST_HTTP_URL")
  358. if url == "" {
  359. url = testdata.TEST_HTTP_URL
  360. }
  361. r, _ := http.NewRequest("GET", url, nil)
  362. httpResp, err := http.DefaultClient.Do(r)
  363. if err != nil {
  364. return fmt.Errorf("Request error: %v\n", err)
  365. }
  366. if httpResp.StatusCode != http.StatusUnauthorized {
  367. return errors.New("did not get unauthorized code when no SPNEGO header set")
  368. }
  369. err = cl.SetSPNEGOHeader(r, "HTTP/host.test.gokrb5")
  370. if err != nil {
  371. return fmt.Errorf("Error setting client SPNEGO header: %v", err)
  372. }
  373. httpResp, err = http.DefaultClient.Do(r)
  374. if err != nil {
  375. return fmt.Errorf("Request error: %v\n", err)
  376. }
  377. if httpResp.StatusCode != http.StatusOK {
  378. return errors.New("did not get OK code when SPNEGO header set")
  379. }
  380. return nil
  381. }
  382. func TestNewClientFromCCache(t *testing.T) {
  383. b, err := hex.DecodeString(testdata.CCACHE_TEST)
  384. if err != nil {
  385. t.Fatalf("Error decoding test data")
  386. }
  387. cc, err := credentials.ParseCCache(b)
  388. if err != nil {
  389. t.Fatal("Error getting test CCache")
  390. }
  391. cl, err := NewClientFromCCache(cc)
  392. if err != nil {
  393. t.Fatalf("Error creating client from CCache: %v", err)
  394. }
  395. c, _ := config.NewConfigFromString(testdata.TEST_KRB5CONF)
  396. addr := os.Getenv("TEST_KDC_ADDR")
  397. if addr == "" {
  398. addr = testdata.TEST_KDC_ADDR
  399. }
  400. c.Realms[0].KDC = []string{addr + ":" + testdata.TEST_KDC}
  401. cl.WithConfig(c)
  402. if ok, err := cl.IsConfigured(); !ok {
  403. t.Fatalf("Client was not configured from CCache: %v", err)
  404. }
  405. }
  406. // Login to the TEST.GOKRB5 domain and request service ticket for resource in the RESDOM.GOKRB5 domain.
  407. // There is a trust between the two domains.
  408. func TestClient_GetServiceTicket_Trusted_Resource_Domain(t *testing.T) {
  409. b, _ := hex.DecodeString(testdata.TESTUSER1_KEYTAB)
  410. kt, _ := keytab.Parse(b)
  411. c, _ := config.NewConfigFromString(testdata.TEST_KRB5CONF)
  412. addr := os.Getenv("TEST_KDC_ADDR")
  413. if addr == "" {
  414. addr = testdata.TEST_KDC_ADDR
  415. }
  416. for i, r := range c.Realms {
  417. if r.Realm == "TEST.GOKRB5" {
  418. c.Realms[i].KDC = []string{addr + ":" + testdata.TEST_KDC}
  419. }
  420. if r.Realm == "RESDOM.GOKRB5" {
  421. c.Realms[i].KDC = []string{addr + ":" + testdata.TEST_KDC_RESDOM}
  422. }
  423. }
  424. c.LibDefaults.DefaultRealm = "TEST.GOKRB5"
  425. cl := NewClientWithKeytab("testuser1", "TEST.GOKRB5", kt)
  426. c.LibDefaults.DefaultTktEnctypes = []string{"aes256-cts-hmac-sha1-96"}
  427. c.LibDefaults.DefaultTktEnctypeIDs = []int32{etypeID.ETypesByName["aes256-cts-hmac-sha1-96"]}
  428. c.LibDefaults.DefaultTGSEnctypes = []string{"aes256-cts-hmac-sha1-96"}
  429. c.LibDefaults.DefaultTGSEnctypeIDs = []int32{etypeID.ETypesByName["aes256-cts-hmac-sha1-96"]}
  430. cl.WithConfig(c)
  431. err := cl.Login()
  432. if err != nil {
  433. t.Fatalf("Error on login: %v\n", err)
  434. }
  435. spn := "HTTP/host.resdom.gokrb5"
  436. tkt, key, err := cl.GetServiceTicket(spn)
  437. if err != nil {
  438. t.Fatalf("Error getting service ticket: %v\n", err)
  439. }
  440. assert.Equal(t, spn, tkt.SName.GetPrincipalNameString())
  441. assert.Equal(t, etypeID.ETypesByName["aes256-cts-hmac-sha1-96"], key.KeyType)
  442. b, _ = hex.DecodeString(testdata.SYSHTTP_RESDOM_KEYTAB)
  443. skt, _ := keytab.Parse(b)
  444. err = tkt.DecryptEncPart(skt, "")
  445. if err != nil {
  446. t.Errorf("Error decrypting ticket with service keytab: %v", err)
  447. }
  448. }