broker_test.go 30 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003
  1. package sarama
  2. import (
  3. "bytes"
  4. "errors"
  5. "fmt"
  6. "net"
  7. "reflect"
  8. "testing"
  9. "time"
  10. "github.com/rcrowley/go-metrics"
  11. "gopkg.in/jcmturner/gokrb5.v7/krberror"
  12. )
  13. func ExampleBroker() {
  14. broker := NewBroker("localhost:9092")
  15. err := broker.Open(nil)
  16. if err != nil {
  17. panic(err)
  18. }
  19. request := MetadataRequest{Topics: []string{"myTopic"}}
  20. response, err := broker.GetMetadata(&request)
  21. if err != nil {
  22. _ = broker.Close()
  23. panic(err)
  24. }
  25. fmt.Println("There are", len(response.Topics), "topics active in the cluster.")
  26. if err = broker.Close(); err != nil {
  27. panic(err)
  28. }
  29. }
  30. type mockEncoder struct {
  31. bytes []byte
  32. }
  33. func (m mockEncoder) encode(pe packetEncoder) error {
  34. return pe.putRawBytes(m.bytes)
  35. }
  36. type brokerMetrics struct {
  37. bytesRead int
  38. bytesWritten int
  39. }
  40. func TestBrokerAccessors(t *testing.T) {
  41. broker := NewBroker("abc:123")
  42. if broker.ID() != -1 {
  43. t.Error("New broker didn't have an ID of -1.")
  44. }
  45. if broker.Addr() != "abc:123" {
  46. t.Error("New broker didn't have the correct address")
  47. }
  48. if broker.Rack() != "" {
  49. t.Error("New broker didn't have an unknown rack.")
  50. }
  51. broker.id = 34
  52. if broker.ID() != 34 {
  53. t.Error("Manually setting broker ID did not take effect.")
  54. }
  55. rack := "dc1"
  56. broker.rack = &rack
  57. if broker.Rack() != rack {
  58. t.Error("Manually setting broker rack did not take effect.")
  59. }
  60. }
  61. func TestSimpleBrokerCommunication(t *testing.T) {
  62. for _, tt := range brokerTestTable {
  63. Logger.Printf("Testing broker communication for %s", tt.name)
  64. mb := NewMockBroker(t, 0)
  65. mb.Returns(&mockEncoder{tt.response})
  66. pendingNotify := make(chan brokerMetrics)
  67. // Register a callback to be notified about successful requests
  68. mb.SetNotifier(func(bytesRead, bytesWritten int) {
  69. pendingNotify <- brokerMetrics{bytesRead, bytesWritten}
  70. })
  71. broker := NewBroker(mb.Addr())
  72. // Set the broker id in order to validate local broker metrics
  73. broker.id = 0
  74. conf := NewConfig()
  75. conf.Version = tt.version
  76. err := broker.Open(conf)
  77. if err != nil {
  78. t.Fatal(err)
  79. }
  80. tt.runner(t, broker)
  81. // Wait up to 500 ms for the remote broker to process the request and
  82. // notify us about the metrics
  83. timeout := 500 * time.Millisecond
  84. select {
  85. case mockBrokerMetrics := <-pendingNotify:
  86. validateBrokerMetrics(t, broker, mockBrokerMetrics)
  87. case <-time.After(timeout):
  88. t.Errorf("No request received for: %s after waiting for %v", tt.name, timeout)
  89. }
  90. mb.Close()
  91. err = broker.Close()
  92. if err != nil {
  93. t.Error(err)
  94. }
  95. }
  96. }
  97. var ErrTokenFailure = errors.New("Failure generating token")
  98. type TokenProvider struct {
  99. accessToken *AccessToken
  100. err error
  101. }
  102. func (t *TokenProvider) Token() (*AccessToken, error) {
  103. return t.accessToken, t.err
  104. }
  105. func newTokenProvider(token *AccessToken, err error) *TokenProvider {
  106. return &TokenProvider{
  107. accessToken: token,
  108. err: err,
  109. }
  110. }
  111. func TestSASLOAuthBearer(t *testing.T) {
  112. testTable := []struct {
  113. name string
  114. authidentity string
  115. mockSASLHandshakeResponse MockResponse // Mock SaslHandshakeRequest response from broker
  116. mockSASLAuthResponse MockResponse // Mock SaslAuthenticateRequest response from broker
  117. expectClientErr bool // Expect an internal client-side error
  118. expectedBrokerError KError // Expected Kafka error returned by client
  119. tokProvider *TokenProvider
  120. }{
  121. {
  122. name: "SASL/OAUTHBEARER OK server response",
  123. mockSASLHandshakeResponse: NewMockSaslHandshakeResponse(t).
  124. SetEnabledMechanisms([]string{SASLTypeOAuth}),
  125. mockSASLAuthResponse: NewMockSaslAuthenticateResponse(t),
  126. expectClientErr: false,
  127. expectedBrokerError: ErrNoError,
  128. tokProvider: newTokenProvider(&AccessToken{Token: "access-token-123"}, nil),
  129. },
  130. {
  131. name: "SASL/OAUTHBEARER authentication failure response",
  132. mockSASLHandshakeResponse: NewMockSaslHandshakeResponse(t).
  133. SetEnabledMechanisms([]string{SASLTypeOAuth}),
  134. mockSASLAuthResponse: NewMockSequence(
  135. // First, the broker response with a challenge
  136. NewMockSaslAuthenticateResponse(t).
  137. SetAuthBytes([]byte(`{"status":"invalid_request1"}`)),
  138. // Next, the client terminates the token exchange. Finally, the
  139. // broker responds with an error message.
  140. NewMockSaslAuthenticateResponse(t).
  141. SetAuthBytes([]byte(`{"status":"invalid_request2"}`)).
  142. SetError(ErrSASLAuthenticationFailed),
  143. ),
  144. expectClientErr: true,
  145. expectedBrokerError: ErrSASLAuthenticationFailed,
  146. tokProvider: newTokenProvider(&AccessToken{Token: "access-token-123"}, nil),
  147. },
  148. {
  149. name: "SASL/OAUTHBEARER handshake failure response",
  150. mockSASLHandshakeResponse: NewMockSaslHandshakeResponse(t).
  151. SetEnabledMechanisms([]string{SASLTypeOAuth}).
  152. SetError(ErrSASLAuthenticationFailed),
  153. mockSASLAuthResponse: NewMockSaslAuthenticateResponse(t),
  154. expectClientErr: true,
  155. expectedBrokerError: ErrSASLAuthenticationFailed,
  156. tokProvider: newTokenProvider(&AccessToken{Token: "access-token-123"}, nil),
  157. },
  158. {
  159. name: "SASL/OAUTHBEARER token generation error",
  160. mockSASLHandshakeResponse: NewMockSaslHandshakeResponse(t).
  161. SetEnabledMechanisms([]string{SASLTypeOAuth}),
  162. mockSASLAuthResponse: NewMockSaslAuthenticateResponse(t),
  163. expectClientErr: true,
  164. expectedBrokerError: ErrNoError,
  165. tokProvider: newTokenProvider(&AccessToken{Token: "access-token-123"}, ErrTokenFailure),
  166. },
  167. {
  168. name: "SASL/OAUTHBEARER invalid extension",
  169. mockSASLHandshakeResponse: NewMockSaslHandshakeResponse(t).
  170. SetEnabledMechanisms([]string{SASLTypeOAuth}),
  171. mockSASLAuthResponse: NewMockSaslAuthenticateResponse(t),
  172. expectClientErr: true,
  173. expectedBrokerError: ErrNoError,
  174. tokProvider: newTokenProvider(&AccessToken{
  175. Token: "access-token-123",
  176. Extensions: map[string]string{"auth": "auth-value"},
  177. }, nil),
  178. },
  179. }
  180. for i, test := range testTable {
  181. // mockBroker mocks underlying network logic and broker responses
  182. mockBroker := NewMockBroker(t, 0)
  183. mockBroker.SetHandlerByMap(map[string]MockResponse{
  184. "SaslAuthenticateRequest": test.mockSASLAuthResponse,
  185. "SaslHandshakeRequest": test.mockSASLHandshakeResponse,
  186. })
  187. // broker executes SASL requests against mockBroker
  188. broker := NewBroker(mockBroker.Addr())
  189. broker.requestRate = metrics.NilMeter{}
  190. broker.outgoingByteRate = metrics.NilMeter{}
  191. broker.incomingByteRate = metrics.NilMeter{}
  192. broker.requestSize = metrics.NilHistogram{}
  193. broker.responseSize = metrics.NilHistogram{}
  194. broker.responseRate = metrics.NilMeter{}
  195. broker.requestLatency = metrics.NilHistogram{}
  196. broker.requestsInFlight = metrics.NilCounter{}
  197. conf := NewConfig()
  198. conf.Net.SASL.Mechanism = SASLTypeOAuth
  199. conf.Net.SASL.TokenProvider = test.tokProvider
  200. broker.conf = conf
  201. dialer := net.Dialer{
  202. Timeout: conf.Net.DialTimeout,
  203. KeepAlive: conf.Net.KeepAlive,
  204. LocalAddr: conf.Net.LocalAddr,
  205. }
  206. conn, err := dialer.Dial("tcp", mockBroker.listener.Addr().String())
  207. if err != nil {
  208. t.Fatal(err)
  209. }
  210. broker.conn = conn
  211. err = broker.authenticateViaSASL()
  212. if test.expectedBrokerError != ErrNoError {
  213. if test.expectedBrokerError != err {
  214. t.Errorf("[%d]:[%s] Expected %s auth error, got %s\n", i, test.name, test.expectedBrokerError, err)
  215. }
  216. } else if test.expectedBrokerError != ErrNoError {
  217. if test.expectedBrokerError != err {
  218. t.Errorf("[%d]:[%s] Expected %s handshake error, got %s\n", i, test.name, test.expectedBrokerError, err)
  219. }
  220. } else if test.expectClientErr && err == nil {
  221. t.Errorf("[%d]:[%s] Expected a client error and got none\n", i, test.name)
  222. } else if !test.expectClientErr && err != nil {
  223. t.Errorf("[%d]:[%s] Unexpected error, got %s\n", i, test.name, err)
  224. }
  225. mockBroker.Close()
  226. }
  227. }
  228. // A mock scram client.
  229. type MockSCRAMClient struct {
  230. done bool
  231. }
  232. func (m *MockSCRAMClient) Begin(userName, password, authzID string) (err error) {
  233. return nil
  234. }
  235. func (m *MockSCRAMClient) Step(challenge string) (response string, err error) {
  236. if challenge == "" {
  237. return "ping", nil
  238. }
  239. if challenge == "pong" {
  240. m.done = true
  241. return "", nil
  242. }
  243. return "", errors.New("failed to authenticate :(")
  244. }
  245. func (m *MockSCRAMClient) Done() bool {
  246. return m.done
  247. }
  248. var _ SCRAMClient = &MockSCRAMClient{}
  249. func TestSASLSCRAMSHAXXX(t *testing.T) {
  250. testTable := []struct {
  251. name string
  252. mockHandshakeErr KError
  253. mockSASLAuthErr KError
  254. expectClientErr bool
  255. scramClient *MockSCRAMClient
  256. scramChallengeResp string
  257. }{
  258. {
  259. name: "SASL/SCRAMSHAXXX successfull authentication",
  260. mockHandshakeErr: ErrNoError,
  261. scramClient: &MockSCRAMClient{},
  262. scramChallengeResp: "pong",
  263. },
  264. {
  265. name: "SASL/SCRAMSHAXXX SCRAM client step error client",
  266. mockHandshakeErr: ErrNoError,
  267. mockSASLAuthErr: ErrNoError,
  268. scramClient: &MockSCRAMClient{},
  269. scramChallengeResp: "gong",
  270. expectClientErr: true,
  271. },
  272. {
  273. name: "SASL/SCRAMSHAXXX server authentication error",
  274. mockHandshakeErr: ErrNoError,
  275. mockSASLAuthErr: ErrSASLAuthenticationFailed,
  276. scramClient: &MockSCRAMClient{},
  277. scramChallengeResp: "pong",
  278. },
  279. {
  280. name: "SASL/SCRAMSHAXXX unsupported SCRAM mechanism",
  281. mockHandshakeErr: ErrUnsupportedSASLMechanism,
  282. mockSASLAuthErr: ErrNoError,
  283. scramClient: &MockSCRAMClient{},
  284. scramChallengeResp: "pong",
  285. },
  286. }
  287. for i, test := range testTable {
  288. // mockBroker mocks underlying network logic and broker responses
  289. mockBroker := NewMockBroker(t, 0)
  290. broker := NewBroker(mockBroker.Addr())
  291. // broker executes SASL requests against mockBroker
  292. broker.requestRate = metrics.NilMeter{}
  293. broker.outgoingByteRate = metrics.NilMeter{}
  294. broker.incomingByteRate = metrics.NilMeter{}
  295. broker.requestSize = metrics.NilHistogram{}
  296. broker.responseSize = metrics.NilHistogram{}
  297. broker.responseRate = metrics.NilMeter{}
  298. broker.requestLatency = metrics.NilHistogram{}
  299. broker.requestsInFlight = metrics.NilCounter{}
  300. mockSASLAuthResponse := NewMockSaslAuthenticateResponse(t).SetAuthBytes([]byte(test.scramChallengeResp))
  301. mockSASLHandshakeResponse := NewMockSaslHandshakeResponse(t).SetEnabledMechanisms([]string{SASLTypeSCRAMSHA256, SASLTypeSCRAMSHA512})
  302. if test.mockSASLAuthErr != ErrNoError {
  303. mockSASLAuthResponse = mockSASLAuthResponse.SetError(test.mockSASLAuthErr)
  304. }
  305. if test.mockHandshakeErr != ErrNoError {
  306. mockSASLHandshakeResponse = mockSASLHandshakeResponse.SetError(test.mockHandshakeErr)
  307. }
  308. mockBroker.SetHandlerByMap(map[string]MockResponse{
  309. "SaslAuthenticateRequest": mockSASLAuthResponse,
  310. "SaslHandshakeRequest": mockSASLHandshakeResponse,
  311. })
  312. conf := NewConfig()
  313. conf.Net.SASL.Mechanism = SASLTypeSCRAMSHA512
  314. conf.Net.SASL.SCRAMClientGeneratorFunc = func() SCRAMClient { return test.scramClient }
  315. broker.conf = conf
  316. dialer := net.Dialer{
  317. Timeout: conf.Net.DialTimeout,
  318. KeepAlive: conf.Net.KeepAlive,
  319. LocalAddr: conf.Net.LocalAddr,
  320. }
  321. conn, err := dialer.Dial("tcp", mockBroker.listener.Addr().String())
  322. if err != nil {
  323. t.Fatal(err)
  324. }
  325. broker.conn = conn
  326. err = broker.authenticateViaSASL()
  327. if test.mockSASLAuthErr != ErrNoError {
  328. if test.mockSASLAuthErr != err {
  329. t.Errorf("[%d]:[%s] Expected %s SASL authentication error, got %s\n", i, test.name, test.mockHandshakeErr, err)
  330. }
  331. } else if test.mockHandshakeErr != ErrNoError {
  332. if test.mockHandshakeErr != err {
  333. t.Errorf("[%d]:[%s] Expected %s handshake error, got %s\n", i, test.name, test.mockHandshakeErr, err)
  334. }
  335. } else if test.expectClientErr && err == nil {
  336. t.Errorf("[%d]:[%s] Expected a client error and got none\n", i, test.name)
  337. } else if !test.expectClientErr && err != nil {
  338. t.Errorf("[%d]:[%s] Unexpected error, got %s\n", i, test.name, err)
  339. }
  340. mockBroker.Close()
  341. }
  342. }
  343. func TestSASLPlainAuth(t *testing.T) {
  344. testTable := []struct {
  345. name string
  346. authidentity string
  347. mockAuthErr KError // Mock and expect error returned from SaslAuthenticateRequest
  348. mockHandshakeErr KError // Mock and expect error returned from SaslHandshakeRequest
  349. expectClientErr bool // Expect an internal client-side error
  350. }{
  351. {
  352. name: "SASL Plain OK server response",
  353. mockAuthErr: ErrNoError,
  354. mockHandshakeErr: ErrNoError,
  355. },
  356. {
  357. name: "SASL Plain OK server response with authidentity",
  358. authidentity: "authid",
  359. mockAuthErr: ErrNoError,
  360. mockHandshakeErr: ErrNoError,
  361. },
  362. {
  363. name: "SASL Plain authentication failure response",
  364. mockAuthErr: ErrSASLAuthenticationFailed,
  365. mockHandshakeErr: ErrNoError,
  366. },
  367. {
  368. name: "SASL Plain handshake failure response",
  369. mockAuthErr: ErrNoError,
  370. mockHandshakeErr: ErrSASLAuthenticationFailed,
  371. },
  372. }
  373. for i, test := range testTable {
  374. // mockBroker mocks underlying network logic and broker responses
  375. mockBroker := NewMockBroker(t, 0)
  376. mockSASLAuthResponse := NewMockSaslAuthenticateResponse(t).
  377. SetAuthBytes([]byte(`response_payload`))
  378. if test.mockAuthErr != ErrNoError {
  379. mockSASLAuthResponse = mockSASLAuthResponse.SetError(test.mockAuthErr)
  380. }
  381. mockSASLHandshakeResponse := NewMockSaslHandshakeResponse(t).
  382. SetEnabledMechanisms([]string{SASLTypePlaintext})
  383. if test.mockHandshakeErr != ErrNoError {
  384. mockSASLHandshakeResponse = mockSASLHandshakeResponse.SetError(test.mockHandshakeErr)
  385. }
  386. mockBroker.SetHandlerByMap(map[string]MockResponse{
  387. "SaslAuthenticateRequest": mockSASLAuthResponse,
  388. "SaslHandshakeRequest": mockSASLHandshakeResponse,
  389. })
  390. // broker executes SASL requests against mockBroker
  391. broker := NewBroker(mockBroker.Addr())
  392. broker.requestRate = metrics.NilMeter{}
  393. broker.outgoingByteRate = metrics.NilMeter{}
  394. broker.incomingByteRate = metrics.NilMeter{}
  395. broker.requestSize = metrics.NilHistogram{}
  396. broker.responseSize = metrics.NilHistogram{}
  397. broker.responseRate = metrics.NilMeter{}
  398. broker.requestLatency = metrics.NilHistogram{}
  399. broker.requestsInFlight = metrics.NilCounter{}
  400. conf := NewConfig()
  401. conf.Net.SASL.Mechanism = SASLTypePlaintext
  402. conf.Net.SASL.AuthIdentity = test.authidentity
  403. conf.Net.SASL.User = "token"
  404. conf.Net.SASL.Password = "password"
  405. conf.Net.SASL.Version = SASLHandshakeV1
  406. broker.conf = conf
  407. broker.conf.Version = V1_0_0_0
  408. dialer := net.Dialer{
  409. Timeout: conf.Net.DialTimeout,
  410. KeepAlive: conf.Net.KeepAlive,
  411. LocalAddr: conf.Net.LocalAddr,
  412. }
  413. conn, err := dialer.Dial("tcp", mockBroker.listener.Addr().String())
  414. if err != nil {
  415. t.Fatal(err)
  416. }
  417. broker.conn = conn
  418. err = broker.authenticateViaSASL()
  419. if err == nil {
  420. for _, rr := range mockBroker.History() {
  421. switch r := rr.Request.(type) {
  422. case *SaslAuthenticateRequest:
  423. x := bytes.SplitN(r.SaslAuthBytes, []byte("\x00"), 3)
  424. if string(x[0]) != conf.Net.SASL.AuthIdentity {
  425. t.Errorf("[%d]:[%s] expected %s auth identity, got %s\n", i, test.name, conf.Net.SASL.AuthIdentity, x[0])
  426. }
  427. if string(x[1]) != conf.Net.SASL.User {
  428. t.Errorf("[%d]:[%s] expected %s user, got %s\n", i, test.name, conf.Net.SASL.User, x[1])
  429. }
  430. if string(x[2]) != conf.Net.SASL.Password {
  431. t.Errorf("[%d]:[%s] expected %s password, got %s\n", i, test.name, conf.Net.SASL.Password, x[2])
  432. }
  433. }
  434. }
  435. }
  436. if test.mockAuthErr != ErrNoError {
  437. if test.mockAuthErr != err {
  438. t.Errorf("[%d]:[%s] Expected %s auth error, got %s\n", i, test.name, test.mockAuthErr, err)
  439. }
  440. } else if test.mockHandshakeErr != ErrNoError {
  441. if test.mockHandshakeErr != err {
  442. t.Errorf("[%d]:[%s] Expected %s handshake error, got %s\n", i, test.name, test.mockHandshakeErr, err)
  443. }
  444. } else if test.expectClientErr && err == nil {
  445. t.Errorf("[%d]:[%s] Expected a client error and got none\n", i, test.name)
  446. } else if !test.expectClientErr && err != nil {
  447. t.Errorf("[%d]:[%s] Unexpected error, got %s\n", i, test.name, err)
  448. }
  449. mockBroker.Close()
  450. }
  451. }
  452. // TestSASLReadTimeout ensures that the broker connection won't block forever
  453. // if the remote end never responds after the handshake
  454. func TestSASLReadTimeout(t *testing.T) {
  455. mockBroker := NewMockBroker(t, 0)
  456. defer mockBroker.Close()
  457. mockSASLAuthResponse := NewMockSaslAuthenticateResponse(t).
  458. SetAuthBytes([]byte(`response_payload`))
  459. mockBroker.SetHandlerByMap(map[string]MockResponse{
  460. "SaslAuthenticateRequest": mockSASLAuthResponse,
  461. })
  462. broker := NewBroker(mockBroker.Addr())
  463. {
  464. broker.requestRate = metrics.NilMeter{}
  465. broker.outgoingByteRate = metrics.NilMeter{}
  466. broker.incomingByteRate = metrics.NilMeter{}
  467. broker.requestSize = metrics.NilHistogram{}
  468. broker.responseSize = metrics.NilHistogram{}
  469. broker.responseRate = metrics.NilMeter{}
  470. broker.requestLatency = metrics.NilHistogram{}
  471. broker.requestsInFlight = metrics.NilCounter{}
  472. }
  473. conf := NewConfig()
  474. {
  475. conf.Net.ReadTimeout = time.Millisecond
  476. conf.Net.SASL.Mechanism = SASLTypePlaintext
  477. conf.Net.SASL.User = "token"
  478. conf.Net.SASL.Password = "password"
  479. conf.Net.SASL.Version = SASLHandshakeV1
  480. }
  481. broker.conf = conf
  482. broker.conf.Version = V1_0_0_0
  483. dialer := net.Dialer{}
  484. conn, err := dialer.Dial("tcp", mockBroker.listener.Addr().String())
  485. if err != nil {
  486. t.Fatal(err)
  487. }
  488. broker.conn = conn
  489. err = broker.authenticateViaSASL()
  490. if err == nil {
  491. t.Errorf("should never happen - expected read timeout")
  492. }
  493. }
  494. func TestGSSAPIKerberosAuth_Authorize(t *testing.T) {
  495. testTable := []struct {
  496. name string
  497. error error
  498. mockKerberosClient bool
  499. errorStage string
  500. badResponse bool
  501. badKeyChecksum bool
  502. }{
  503. {
  504. name: "Kerberos authentication success",
  505. error: nil,
  506. mockKerberosClient: true,
  507. },
  508. {
  509. name: "Kerberos login fails",
  510. error: krberror.NewErrorf(krberror.KDCError, "KDC_Error: AS Exchange Error: "+
  511. "kerberos error response from KDC: KRB Error: (24) KDC_ERR_PREAUTH_FAILED Pre-authenti"+
  512. "cation information was invalid - PREAUTH_FAILED"),
  513. mockKerberosClient: true,
  514. errorStage: "login",
  515. },
  516. {
  517. name: "Kerberos service ticket fails",
  518. error: krberror.NewErrorf(krberror.KDCError, "KDC_Error: AS Exchange Error: "+
  519. "kerberos error response from KDC: KRB Error: (24) KDC_ERR_PREAUTH_FAILED Pre-authenti"+
  520. "cation information was invalid - PREAUTH_FAILED"),
  521. mockKerberosClient: true,
  522. errorStage: "service_ticket",
  523. },
  524. {
  525. name: "Kerberos client creation fails",
  526. error: errors.New("configuration file could not be opened: krb5.conf open krb5.conf: no such file or directory"),
  527. },
  528. {
  529. name: "Bad server response, unmarshall key error",
  530. error: errors.New("bytes shorter than header length"),
  531. badResponse: true,
  532. mockKerberosClient: true,
  533. },
  534. {
  535. name: "Bad token checksum",
  536. error: errors.New("checksum mismatch. Computed: 39feb88ac2459f2b77738493, Contained in token: ffffffffffffffff00000000"),
  537. badResponse: false,
  538. badKeyChecksum: true,
  539. mockKerberosClient: true,
  540. },
  541. }
  542. for i, test := range testTable {
  543. mockBroker := NewMockBroker(t, 0)
  544. // broker executes SASL requests against mockBroker
  545. mockBroker.SetGSSAPIHandler(func(bytes []byte) []byte {
  546. return nil
  547. })
  548. broker := NewBroker(mockBroker.Addr())
  549. broker.requestRate = metrics.NilMeter{}
  550. broker.outgoingByteRate = metrics.NilMeter{}
  551. broker.incomingByteRate = metrics.NilMeter{}
  552. broker.requestSize = metrics.NilHistogram{}
  553. broker.responseSize = metrics.NilHistogram{}
  554. broker.responseRate = metrics.NilMeter{}
  555. broker.requestLatency = metrics.NilHistogram{}
  556. broker.requestsInFlight = metrics.NilCounter{}
  557. conf := NewConfig()
  558. conf.Net.SASL.Mechanism = SASLTypeGSSAPI
  559. conf.Net.SASL.GSSAPI.ServiceName = "kafka"
  560. conf.Net.SASL.GSSAPI.KerberosConfigPath = "krb5.conf"
  561. conf.Net.SASL.GSSAPI.Realm = "EXAMPLE.COM"
  562. conf.Net.SASL.GSSAPI.Username = "kafka"
  563. conf.Net.SASL.GSSAPI.Password = "kafka"
  564. conf.Net.SASL.GSSAPI.KeyTabPath = "kafka.keytab"
  565. conf.Net.SASL.GSSAPI.AuthType = KRB5_USER_AUTH
  566. broker.conf = conf
  567. broker.conf.Version = V1_0_0_0
  568. dialer := net.Dialer{
  569. Timeout: conf.Net.DialTimeout,
  570. KeepAlive: conf.Net.KeepAlive,
  571. LocalAddr: conf.Net.LocalAddr,
  572. }
  573. conn, err := dialer.Dial("tcp", mockBroker.listener.Addr().String())
  574. if err != nil {
  575. t.Fatal(err)
  576. }
  577. gssapiHandler := KafkaGSSAPIHandler{
  578. client: &MockKerberosClient{},
  579. badResponse: test.badResponse,
  580. badKeyChecksum: test.badKeyChecksum,
  581. }
  582. mockBroker.SetGSSAPIHandler(gssapiHandler.MockKafkaGSSAPI)
  583. broker.conn = conn
  584. if test.mockKerberosClient {
  585. broker.kerberosAuthenticator.NewKerberosClientFunc = func(config *GSSAPIConfig) (KerberosClient, error) {
  586. return &MockKerberosClient{
  587. mockError: test.error,
  588. errorStage: test.errorStage,
  589. }, nil
  590. }
  591. } else {
  592. broker.kerberosAuthenticator.NewKerberosClientFunc = nil
  593. }
  594. err = broker.authenticateViaSASL()
  595. if err != nil && test.error != nil {
  596. if test.error.Error() != err.Error() {
  597. t.Errorf("[%d] Expected error:%s, got:%s.", i, test.error, err)
  598. }
  599. } else if (err == nil && test.error != nil) || (err != nil && test.error == nil) {
  600. t.Errorf("[%d] Expected error:%s, got:%s.", i, test.error, err)
  601. }
  602. mockBroker.Close()
  603. }
  604. }
  605. func TestBuildClientFirstMessage(t *testing.T) {
  606. testTable := []struct {
  607. name string
  608. token *AccessToken
  609. expected []byte
  610. expectError bool
  611. }{
  612. {
  613. name: "Build SASL client initial response with two extensions",
  614. token: &AccessToken{
  615. Token: "the-token",
  616. Extensions: map[string]string{
  617. "x": "1",
  618. "y": "2",
  619. },
  620. },
  621. expected: []byte("n,,\x01auth=Bearer the-token\x01x=1\x01y=2\x01\x01"),
  622. },
  623. {
  624. name: "Build SASL client initial response with no extensions",
  625. token: &AccessToken{Token: "the-token"},
  626. expected: []byte("n,,\x01auth=Bearer the-token\x01\x01"),
  627. },
  628. {
  629. name: "Build SASL client initial response using reserved extension",
  630. token: &AccessToken{
  631. Token: "the-token",
  632. Extensions: map[string]string{
  633. "auth": "auth-value",
  634. },
  635. },
  636. expected: []byte(""),
  637. expectError: true,
  638. },
  639. }
  640. for i, test := range testTable {
  641. actual, err := buildClientFirstMessage(test.token)
  642. if !reflect.DeepEqual(test.expected, actual) {
  643. t.Errorf("Expected %s, got %s\n", test.expected, actual)
  644. }
  645. if test.expectError && err == nil {
  646. t.Errorf("[%d]:[%s] Expected an error but did not get one", i, test.name)
  647. }
  648. if !test.expectError && err != nil {
  649. t.Errorf("[%d]:[%s] Expected no error but got %s\n", i, test.name, err)
  650. }
  651. }
  652. }
  653. // We're not testing encoding/decoding here, so most of the requests/responses will be empty for simplicity's sake
  654. var brokerTestTable = []struct {
  655. version KafkaVersion
  656. name string
  657. response []byte
  658. runner func(*testing.T, *Broker)
  659. }{
  660. {V0_10_0_0,
  661. "MetadataRequest",
  662. []byte{0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00},
  663. func(t *testing.T, broker *Broker) {
  664. request := MetadataRequest{}
  665. response, err := broker.GetMetadata(&request)
  666. if err != nil {
  667. t.Error(err)
  668. }
  669. if response == nil {
  670. t.Error("Metadata request got no response!")
  671. }
  672. }},
  673. {V0_10_0_0,
  674. "ConsumerMetadataRequest",
  675. []byte{0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 't', 0x00, 0x00, 0x00, 0x00},
  676. func(t *testing.T, broker *Broker) {
  677. request := ConsumerMetadataRequest{}
  678. response, err := broker.GetConsumerMetadata(&request)
  679. if err != nil {
  680. t.Error(err)
  681. }
  682. if response == nil {
  683. t.Error("Consumer Metadata request got no response!")
  684. }
  685. }},
  686. {V0_10_0_0,
  687. "ProduceRequest (NoResponse)",
  688. []byte{},
  689. func(t *testing.T, broker *Broker) {
  690. request := ProduceRequest{}
  691. request.RequiredAcks = NoResponse
  692. response, err := broker.Produce(&request)
  693. if err != nil {
  694. t.Error(err)
  695. }
  696. if response != nil {
  697. t.Error("Produce request with NoResponse got a response!")
  698. }
  699. }},
  700. {V0_10_0_0,
  701. "ProduceRequest (WaitForLocal)",
  702. []byte{0x00, 0x00, 0x00, 0x00},
  703. func(t *testing.T, broker *Broker) {
  704. request := ProduceRequest{}
  705. request.RequiredAcks = WaitForLocal
  706. response, err := broker.Produce(&request)
  707. if err != nil {
  708. t.Error(err)
  709. }
  710. if response == nil {
  711. t.Error("Produce request without NoResponse got no response!")
  712. }
  713. }},
  714. {V0_10_0_0,
  715. "FetchRequest",
  716. []byte{0x00, 0x00, 0x00, 0x00},
  717. func(t *testing.T, broker *Broker) {
  718. request := FetchRequest{}
  719. response, err := broker.Fetch(&request)
  720. if err != nil {
  721. t.Error(err)
  722. }
  723. if response == nil {
  724. t.Error("Fetch request got no response!")
  725. }
  726. }},
  727. {V0_10_0_0,
  728. "OffsetFetchRequest",
  729. []byte{0x00, 0x00, 0x00, 0x00},
  730. func(t *testing.T, broker *Broker) {
  731. request := OffsetFetchRequest{}
  732. response, err := broker.FetchOffset(&request)
  733. if err != nil {
  734. t.Error(err)
  735. }
  736. if response == nil {
  737. t.Error("OffsetFetch request got no response!")
  738. }
  739. }},
  740. {V0_10_0_0,
  741. "OffsetCommitRequest",
  742. []byte{0x00, 0x00, 0x00, 0x00},
  743. func(t *testing.T, broker *Broker) {
  744. request := OffsetCommitRequest{}
  745. response, err := broker.CommitOffset(&request)
  746. if err != nil {
  747. t.Error(err)
  748. }
  749. if response == nil {
  750. t.Error("OffsetCommit request got no response!")
  751. }
  752. }},
  753. {V0_10_0_0,
  754. "OffsetRequest",
  755. []byte{0x00, 0x00, 0x00, 0x00},
  756. func(t *testing.T, broker *Broker) {
  757. request := OffsetRequest{}
  758. response, err := broker.GetAvailableOffsets(&request)
  759. if err != nil {
  760. t.Error(err)
  761. }
  762. if response == nil {
  763. t.Error("Offset request got no response!")
  764. }
  765. }},
  766. {V0_10_0_0,
  767. "JoinGroupRequest",
  768. []byte{0x00, 0x17, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00},
  769. func(t *testing.T, broker *Broker) {
  770. request := JoinGroupRequest{}
  771. response, err := broker.JoinGroup(&request)
  772. if err != nil {
  773. t.Error(err)
  774. }
  775. if response == nil {
  776. t.Error("JoinGroup request got no response!")
  777. }
  778. }},
  779. {V0_10_0_0,
  780. "SyncGroupRequest",
  781. []byte{0x00, 0x00, 0x00, 0x00, 0x00, 0x00},
  782. func(t *testing.T, broker *Broker) {
  783. request := SyncGroupRequest{}
  784. response, err := broker.SyncGroup(&request)
  785. if err != nil {
  786. t.Error(err)
  787. }
  788. if response == nil {
  789. t.Error("SyncGroup request got no response!")
  790. }
  791. }},
  792. {V0_10_0_0,
  793. "LeaveGroupRequest",
  794. []byte{0x00, 0x00},
  795. func(t *testing.T, broker *Broker) {
  796. request := LeaveGroupRequest{}
  797. response, err := broker.LeaveGroup(&request)
  798. if err != nil {
  799. t.Error(err)
  800. }
  801. if response == nil {
  802. t.Error("LeaveGroup request got no response!")
  803. }
  804. }},
  805. {V0_10_0_0,
  806. "HeartbeatRequest",
  807. []byte{0x00, 0x00},
  808. func(t *testing.T, broker *Broker) {
  809. request := HeartbeatRequest{}
  810. response, err := broker.Heartbeat(&request)
  811. if err != nil {
  812. t.Error(err)
  813. }
  814. if response == nil {
  815. t.Error("Heartbeat request got no response!")
  816. }
  817. }},
  818. {V0_10_0_0,
  819. "ListGroupsRequest",
  820. []byte{0x00, 0x00, 0x00, 0x00, 0x00, 0x00},
  821. func(t *testing.T, broker *Broker) {
  822. request := ListGroupsRequest{}
  823. response, err := broker.ListGroups(&request)
  824. if err != nil {
  825. t.Error(err)
  826. }
  827. if response == nil {
  828. t.Error("ListGroups request got no response!")
  829. }
  830. }},
  831. {V0_10_0_0,
  832. "DescribeGroupsRequest",
  833. []byte{0x00, 0x00, 0x00, 0x00},
  834. func(t *testing.T, broker *Broker) {
  835. request := DescribeGroupsRequest{}
  836. response, err := broker.DescribeGroups(&request)
  837. if err != nil {
  838. t.Error(err)
  839. }
  840. if response == nil {
  841. t.Error("DescribeGroups request got no response!")
  842. }
  843. }},
  844. {V0_10_0_0,
  845. "ApiVersionsRequest",
  846. []byte{0x00, 0x00, 0x00, 0x00, 0x00, 0x00},
  847. func(t *testing.T, broker *Broker) {
  848. request := ApiVersionsRequest{}
  849. response, err := broker.ApiVersions(&request)
  850. if err != nil {
  851. t.Error(err)
  852. }
  853. if response == nil {
  854. t.Error("ApiVersions request got no response!")
  855. }
  856. }},
  857. {V1_1_0_0,
  858. "DeleteGroupsRequest",
  859. []byte{0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00},
  860. func(t *testing.T, broker *Broker) {
  861. request := DeleteGroupsRequest{}
  862. response, err := broker.DeleteGroups(&request)
  863. if err != nil {
  864. t.Error(err)
  865. }
  866. if response == nil {
  867. t.Error("DeleteGroups request got no response!")
  868. }
  869. }},
  870. }
  871. func validateBrokerMetrics(t *testing.T, broker *Broker, mockBrokerMetrics brokerMetrics) {
  872. metricValidators := newMetricValidators()
  873. mockBrokerBytesRead := mockBrokerMetrics.bytesRead
  874. mockBrokerBytesWritten := mockBrokerMetrics.bytesWritten
  875. // Check that the number of bytes sent corresponds to what the mock broker received
  876. metricValidators.registerForAllBrokers(broker, countMeterValidator("incoming-byte-rate", mockBrokerBytesWritten))
  877. if mockBrokerBytesWritten == 0 {
  878. // This a ProduceRequest with NoResponse
  879. metricValidators.registerForAllBrokers(broker, countMeterValidator("response-rate", 0))
  880. metricValidators.registerForAllBrokers(broker, countHistogramValidator("response-size", 0))
  881. metricValidators.registerForAllBrokers(broker, minMaxHistogramValidator("response-size", 0, 0))
  882. } else {
  883. metricValidators.registerForAllBrokers(broker, countMeterValidator("response-rate", 1))
  884. metricValidators.registerForAllBrokers(broker, countHistogramValidator("response-size", 1))
  885. metricValidators.registerForAllBrokers(broker, minMaxHistogramValidator("response-size", mockBrokerBytesWritten, mockBrokerBytesWritten))
  886. }
  887. // Check that the number of bytes received corresponds to what the mock broker sent
  888. metricValidators.registerForAllBrokers(broker, countMeterValidator("outgoing-byte-rate", mockBrokerBytesRead))
  889. metricValidators.registerForAllBrokers(broker, countMeterValidator("request-rate", 1))
  890. metricValidators.registerForAllBrokers(broker, countHistogramValidator("request-size", 1))
  891. metricValidators.registerForAllBrokers(broker, minMaxHistogramValidator("request-size", mockBrokerBytesRead, mockBrokerBytesRead))
  892. // Check that there is no more requests in flight
  893. metricValidators.registerForAllBrokers(broker, counterValidator("requests-in-flight", 0))
  894. // Run the validators
  895. metricValidators.run(t, broker.conf.MetricRegistry)
  896. }