123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657 |
- package sarama
- import (
- krb5client "github.com/jcmturner/gokrb5/v8/client"
- krb5config "github.com/jcmturner/gokrb5/v8/config"
- "github.com/jcmturner/gokrb5/v8/credentials"
- "github.com/jcmturner/gokrb5/v8/keytab"
- "github.com/jcmturner/gokrb5/v8/types"
- )
- type KerberosGoKrb5Client struct {
- krb5client.Client
- }
- func (c *KerberosGoKrb5Client) Domain() string {
- return c.Credentials.Domain()
- }
- func (c *KerberosGoKrb5Client) CName() types.PrincipalName {
- return c.Credentials.CName()
- }
- // NewKerberosClient creates kerberos client used to obtain TGT and TGS tokens.
- // It uses pure go Kerberos 5 solution (RFC-4121 and RFC-4120).
- // uses gokrb5 library underlying which is a pure go kerberos client with some GSS-API capabilities.
- func NewKerberosClient(config *GSSAPIConfig) (KerberosClient, error) {
- cfg, err := krb5config.Load(config.KerberosConfigPath)
- if err != nil {
- return nil, err
- }
- return createClient(config, cfg)
- }
- func createClient(config *GSSAPIConfig, cfg *krb5config.Config) (KerberosClient, error) {
- var client *krb5client.Client
- switch config.AuthType {
- case KRB5_KEYTAB_AUTH:
- kt, err := keytab.Load(config.KeyTabPath)
- if err != nil {
- return nil, err
- }
- client = krb5client.NewWithKeytab(config.Username, config.Realm, kt, cfg, krb5client.DisablePAFXFAST(config.DisablePAFXFAST))
- case KRB5_CCACHE_AUTH:
- cc, err := credentials.LoadCCache(config.CCachePath)
- if err != nil {
- return nil, err
- }
- client, err = krb5client.NewFromCCache(cc, cfg, krb5client.DisablePAFXFAST(config.DisablePAFXFAST))
- if err != nil {
- return nil, err
- }
- default:
- client = krb5client.NewWithPassword(config.Username,
- config.Realm, config.Password, cfg, krb5client.DisablePAFXFAST(config.DisablePAFXFAST))
- }
- return &KerberosGoKrb5Client{*client}, nil
- }
|