diff options
author | Cy Schubert <cy@FreeBSD.org> | 2017-07-07 17:03:42 +0000 |
---|---|---|
committer | Cy Schubert <cy@FreeBSD.org> | 2017-07-07 17:03:42 +0000 |
commit | 33a9b234e7087f573ef08cd7318c6497ba08b439 (patch) | |
tree | d0ea40ad3bf5463a3c55795977c71bcb7d781b4b /src/tests/t_audit.py |
Notes
Diffstat (limited to 'src/tests/t_audit.py')
-rwxr-xr-x | src/tests/t_audit.py | 31 |
1 files changed, 31 insertions, 0 deletions
diff --git a/src/tests/t_audit.py b/src/tests/t_audit.py new file mode 100755 index 000000000000..69c9251e0428 --- /dev/null +++ b/src/tests/t_audit.py @@ -0,0 +1,31 @@ +#!/usr/bin/python +from k5test import * + +conf = {'plugins': {'audit': { + 'module': 'test:$plugins/audit/test/k5audit_test.so'}}} + +realm = K5Realm(krb5_conf=conf, get_creds=False) +realm.addprinc('target') +realm.run([kadminl, 'modprinc', '+ok_to_auth_as_delegate', realm.host_princ]) + +# Make normal AS and TGS requests so they will be audited. +realm.kinit(realm.host_princ, flags=['-k', '-f']) +realm.run([kvno, 'target']) + +# Make S4U2Self and S4U2Proxy requests so they will be audited. The +# S4U2Proxy request is expected to fail. +out = realm.run([kvno, '-k', realm.keytab, '-U', 'user', '-P', 'target'], + expected_code=1) +if 'NOT_ALLOWED_TO_DELEGATE' not in out: + fail('Unexpected error for S4U2Proxy') + +# Make a U2U request so it will be audited. +uuserver = os.path.join(buildtop, 'appl', 'user_user', 'uuserver') +uuclient = os.path.join(buildtop, 'appl', 'user_user', 'uuclient') +port_arg = str(realm.server_port()) +realm.start_server([uuserver, port_arg], 'Server started') +output = realm.run([uuclient, hostname, 'testing message', port_arg]) +if 'Hello' not in output: + fail('U2U request failed unexpectedly') + +success('Audit tests') |