1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317
|
# Copyright (C) 2015, Red Hat, Inc.
# All rights reserved.
#
# Permission is hereby granted, free of charge, to any person obtaining a copy
# of this software and associated documentation files (the "Software"), to deal
# in the Software without restriction, including without limitation the rights
# to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
# copies of the Software, and to permit persons to whom the Software is
# furnished to do so, subject to the following conditions:
#
# The above copyright notice and this permission notice shall be included in
# all copies or substantial portions of the Software.
#
# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
# IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
# FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
# AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
# LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
# OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
# THE SOFTWARE.
import os
import unittest
from base64 import b64decode
try:
from unittest import mock
except ImportError: # pragma: no cover
import mock
from dns.rdataclass import IN as RDCLASS_IN
from dns.rdatatype import SRV as RDTYPE_SRV
from dns.rdtypes.IN.SRV import SRV
try:
from webtest import TestApp as WebTestApp
except ImportError:
print("webtest not installed! Tests will be skipped")
WebTestApp = "skip"
import kdcproxy
from kdcproxy import codec
from kdcproxy import config
from kdcproxy.config import mit
HERE = os.path.dirname(os.path.abspath(__file__))
KRB5_CONFIG = os.path.join(HERE, 'tests.krb5.conf')
@unittest.skipIf(WebTestApp == "skip", "webtest not installed")
class KDCProxyWSGITests(unittest.TestCase):
addrinfo = [
(2, 1, 6, '', ('128.66.0.2', 88)),
(2, 2, 17, '', ('128.66.0.2', 88)),
(2, 3, 0, '', ('128.66.0.2', 88))
]
def setUp(self): # noqa
self.app = kdcproxy.Application()
self.await_reply = self.app._Application__await_reply = mock.Mock()
self.await_reply.return_value = b'RESPONSE'
self.resolver = self.app._Application__resolver = mock.Mock()
self.resolver.lookup.return_value = ["kerberos://k1.kdcproxy.test.:88"]
self.tapp = WebTestApp(self.app)
def post(self, body, expect_errors=False):
return self.tapp.post(
'/', body, [("Content-Type", "application/kerberos")],
expect_errors=expect_errors
)
def assert_response(self, response):
self.assertEqual(response.status_code, 200)
self.assertEqual(response.content_type, 'application/kerberos')
self.assertEqual(response.body, b'0\x0c\xa0\n\x04\x08RESPONSE')
def test_get(self):
r = self.tapp.get('/', expect_errors=True)
self.assertEqual(r.status_code, 405)
self.assertEqual(r.status, '405 Method Not Allowed')
self.assertEqual(r.text, 'Method not allowed (GET).')
@mock.patch('socket.getaddrinfo', return_value=addrinfo)
@mock.patch('socket.socket')
def test_post_asreq(self, m_socket, m_getaddrinfo):
response = self.post(KDCProxyCodecTests.asreq1)
self.assert_response(response)
self.resolver.lookup.assert_called_once_with('FREEIPA.LOCAL',
kpasswd=False)
m_getaddrinfo.assert_called_once_with('k1.kdcproxy.test.', 88)
m_socket.assert_called_once_with(2, 1, 6)
m_socket.return_value.connect.assert_called_once_with(
('128.66.0.2', 88)
)
@mock.patch('socket.getaddrinfo', return_value=addrinfo)
@mock.patch('socket.socket')
def test_post_kpasswd(self, m_socket, m_getaddrinfo):
response = self.post(KDCProxyCodecTests.kpasswdreq)
self.assert_response(response)
self.resolver.lookup.assert_called_once_with('FREEIPA.LOCAL',
kpasswd=True)
m_getaddrinfo.assert_called_once_with('k1.kdcproxy.test.', 88)
m_socket.assert_called_once_with(2, 1, 6)
m_socket.return_value.connect.assert_called_once_with(
('128.66.0.2', 88)
)
def test_no_server(self):
self.resolver.lookup.reset_mock()
self.resolver.lookup.return_value = []
response = self.post(KDCProxyCodecTests.asreq1, True)
self.resolver.lookup.assert_called_once_with('FREEIPA.LOCAL',
kpasswd=False)
self.assertEqual(response.status_code, 503)
self.resolver.lookup.reset_mock()
self.resolver.lookup.return_value = []
response = self.post(KDCProxyCodecTests.kpasswdreq, True)
self.resolver.lookup.assert_called_once_with('FREEIPA.LOCAL',
kpasswd=True)
self.assertEqual(response.status_code, 503)
def decode(data):
data = data.replace(b'\\n', b'')
data = data.replace(b' ', b'')
return b64decode(data)
class KDCProxyCodecTests(unittest.TestCase):
realm = 'FREEIPA.LOCAL'
asreq1 = decode(b"""
MIHEoIGwBIGtAAAAqWqBpjCBo6EDAgEFogMCAQqjDjAMMAqhBAICAJWiAgQApIGGMIGDo
AcDBQBAAAAQoRIwEKADAgEBoQkwBxsFYWRtaW6iDxsNRlJFRUlQQS5MT0NBTKMiMCCgAw
IBAqEZMBcbBmtyYnRndBsNRlJFRUlQQS5MT0NBTKURGA8yMDE1MDUxNDEwNDIzOFqnBgI
EEchjtagUMBICARICARECARACARcCARkCARqhDxsNRlJFRUlQQS5MT0NBTA==
""")
asreq2 = decode(b"""
MIIBJaCCARAEggEMAAABCGqCAQQwggEAoQMCAQWiAwIBCqNrMGkwDaEEAgIAhaIFBANNS
VQwTKEDAgECokUEQzBBoAMCARKiOgQ48A25MkXWM1ZrTvaYMJcbFX7Hp7JW11omIwqOQd
SSGKVZ9mzYLuL19RRhX9xrXbQS0klXRVgRWHMwCqEEAgIAlaICBACkgYYwgYOgBwMFAEA
AABChEjAQoAMCAQGhCTAHGwVhZG1pbqIPGw1GUkVFSVBBLkxPQ0FMoyIwIKADAgECoRkw
FxsGa3JidGd0Gw1GUkVFSVBBLkxPQ0FMpREYDzIwMTUwNTE0MTA0MjM4WqcGAgRXSy38q
BQwEgIBEgIBEQIBEAIBFwIBGQIBGqEPGw1GUkVFSVBBLkxPQ0FM
""")
tgsreq = decode(b"""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""")
kpasswdreq = decode(b"""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""")
def assert_decode(self, data, cls):
# manual decode
request, realm, _ = codec.asn1mod.decode_proxymessage(data)
self.assertEqual(realm, self.realm)
inst = cls.parse_request(realm, request)
self.assertIsInstance(inst, cls)
self.assertEqual(inst.realm, self.realm)
self.assertEqual(inst.request, request)
if cls is codec.KPASSWDProxyRequest:
self.assertEqual(inst.version, 1)
# codec decode
outer = codec.decode(data)
self.assertEqual(outer.realm, self.realm)
self.assertIsInstance(outer, cls)
# re-decode
der = codec.encode(outer.request)
self.assertIsInstance(der, bytes)
decoded = codec.decode(der)
self.assertIsInstance(decoded, cls)
return outer
def test_asreq(self):
outer = self.assert_decode(self.asreq1, codec.ASProxyRequest)
self.assertEqual(str(outer), 'FREEIPA.LOCAL AS-REQ (169 bytes)')
outer = self.assert_decode(self.asreq2, codec.ASProxyRequest)
self.assertEqual(str(outer), 'FREEIPA.LOCAL AS-REQ (264 bytes)')
def test_tgsreq(self):
outer = self.assert_decode(self.tgsreq, codec.TGSProxyRequest)
self.assertEqual(str(outer), 'FREEIPA.LOCAL TGS-REQ (936 bytes)')
def test_kpasswdreq(self):
outer = self.assert_decode(self.kpasswdreq,
codec.KPASSWDProxyRequest)
self.assertEqual(
str(outer),
'FREEIPA.LOCAL KPASSWD-REQ (603 bytes) (version 0x0001)'
)
class KDCProxyConfigTests(unittest.TestCase):
def test_mit_config(self):
with mock.patch.dict('os.environ', {'KRB5_CONFIG': KRB5_CONFIG}):
cfg = mit.MITConfig()
self.assertIs(cfg.use_dns(), False)
self.assertEqual(
cfg.lookup('KDCPROXY.TEST'),
(
'kerberos://k1.kdcproxy.test.:88',
'kerberos://k2.kdcproxy.test.:1088'
)
)
# wrong? man page says port 464 on admin server
self.assertEqual(
cfg.lookup('KDCPROXY.TEST', kpasswd=True),
(
'kpasswd://adm.kdcproxy.test.:1749',
'kpasswd://adm.kdcproxy.test.'
)
)
self.assertEqual(
cfg.lookup('KDCPROXY.TEST', kpasswd=True),
cfg.lookup('KDCPROXY.TEST', True)
)
self.assertEqual(cfg.lookup('KDCPROXY.MISSING'), ())
self.assertEqual(cfg.lookup('KDCPROXY.MISSING', True), ())
def mksrv(self, txt):
priority, weight, port, target = txt.split(' ')
return SRV(
rdclass=RDCLASS_IN, # Internet
rdtype=RDTYPE_SRV, # Server Selector
priority=int(priority),
weight=int(weight),
port=int(port),
target=target
)
@mock.patch('dns.resolver.query')
def test_dns_config(self, m_query):
cfg = config.DNSResolver()
tcp = [
self.mksrv('30 100 88 k1_tcp.kdcproxy.test.'),
self.mksrv('10 100 1088 k2_tcp.kdcproxy.test.'),
]
udp = [
self.mksrv('0 100 88 k1_udp.kdcproxy.test.'),
self.mksrv('10 100 1088 k2_udp.kdcproxy.test.'),
self.mksrv('0 100 88 k3_udp.kdcproxy.test.'),
]
m_query.side_effect = [tcp, udp]
self.assertEqual(
tuple(cfg.lookup('KDCPROXY.TEST')),
(
'kerberos://k2_tcp.kdcproxy.test:1088',
'kerberos://k1_tcp.kdcproxy.test:88',
'kerberos://k1_udp.kdcproxy.test:88',
'kerberos://k3_udp.kdcproxy.test:88',
'kerberos://k2_udp.kdcproxy.test:1088'
)
)
self.assertEqual(m_query.call_count, 2)
m_query.assert_any_call('_kerberos._tcp.KDCPROXY.TEST', RDTYPE_SRV)
m_query.assert_any_call('_kerberos._udp.KDCPROXY.TEST', RDTYPE_SRV)
m_query.reset_mock()
adm = [
self.mksrv('0 0 749 adm.kdcproxy.test.'),
]
empty = []
m_query.side_effect = (empty, adm, empty, empty)
self.assertEqual(
tuple(cfg.lookup('KDCPROXY.TEST', kpasswd=True)),
(
'kpasswd://adm.kdcproxy.test:749',
)
)
self.assertEqual(m_query.call_count, 4)
m_query.assert_any_call('_kpasswd._tcp.KDCPROXY.TEST', RDTYPE_SRV)
m_query.assert_any_call('_kerberos-adm._tcp.KDCPROXY.TEST', RDTYPE_SRV)
m_query.assert_any_call('_kpasswd._udp.KDCPROXY.TEST', RDTYPE_SRV)
m_query.assert_any_call('_kerberos-adm._udp.KDCPROXY.TEST', RDTYPE_SRV)
if __name__ == "__main__":
unittest.main()
|