Examples of KerberosName


Examples of org.apache.hadoop.security.authentication.util.KerberosName

          + name);
    }
    if (name == null) { //name is optional, null is okay
      return;
    }
    KerberosName u = new KerberosName(name);
    String shortName = u.getShortName();
    if (!shortName.equals(expected)) {
      throw new IOException("Usernames not matched: name=" + shortName
          + " != expected=" + expected);
    }
  }
View Full Code Here

Examples of org.apache.hadoop.security.authentication.util.KerberosName

              if (!gssContext.isEstablished()) {
                response.setStatus(HttpServletResponse.SC_UNAUTHORIZED);
                LOG.trace("SPNEGO in progress");
              } else {
                String clientPrincipal = gssContext.getSrcName().toString();
                KerberosName kerberosName = new KerberosName(clientPrincipal);
                String userName = kerberosName.getShortName();
                token = new AuthenticationToken(userName, clientPrincipal, TYPE);
                response.setStatus(HttpServletResponse.SC_OK);
                LOG.trace("SPNEGO completed for principal [{}]", clientPrincipal);
              }
            } finally {
View Full Code Here

Examples of org.apache.hadoop.security.authentication.util.KerberosName

    }
    super.tearDown();
  }

  public void testNameRules() throws Exception {
    KerberosName kn = new KerberosName(KerberosTestUtils.getServerPrincipal());
    assertEquals(KerberosTestUtils.getRealm(), kn.getRealm());

    //destroy handler created in setUp()
    handler.destroy();

    KerberosName.setRules("RULE:[1:$1@$0](.*@FOO)s/@.*//\nDEFAULT");
   
    handler = new KerberosAuthenticationHandler();
    Properties props = new Properties();
    props.setProperty(KerberosAuthenticationHandler.PRINCIPAL, KerberosTestUtils.getServerPrincipal());
    props.setProperty(KerberosAuthenticationHandler.KEYTAB, KerberosTestUtils.getKeytabFile());
    props.setProperty(KerberosAuthenticationHandler.NAME_RULES, "RULE:[1:$1@$0](.*@BAR)s/@.*//\nDEFAULT");
    try {
      handler.init(props);
    } catch (Exception ex) {
    }
    kn = new KerberosName("bar@BAR");
    assertEquals("bar", kn.getShortName());
    kn = new KerberosName("bar@FOO");
    try {
      kn.getShortName();
      fail();
    }
    catch (Exception ex) {     
    }
  }
View Full Code Here

Examples of org.apache.hadoop.security.authentication.util.KerberosName

              if (!gssContext.isEstablished()) {
                response.setStatus(HttpServletResponse.SC_UNAUTHORIZED);
                LOG.trace("SPNEGO in progress");
              } else {
                String clientPrincipal = gssContext.getSrcName().toString();
                KerberosName kerberosName = new KerberosName(clientPrincipal);
                String userName = kerberosName.getShortName();
                token = new AuthenticationToken(userName, clientPrincipal, getType());
                response.setStatus(HttpServletResponse.SC_OK);
                LOG.trace("SPNEGO completed for principal [{}]", clientPrincipal);
              }
            } finally {
View Full Code Here

Examples of org.apache.hadoop.security.authentication.util.KerberosName

      case KERBEROS: {
        if (serverPrincipal == null || serverPrincipal.isEmpty()) {
          throw new IOException(
              "Failed to specify server's Kerberos principal name");
        }
        KerberosName name = new KerberosName(serverPrincipal);
        saslProtocol = name.getServiceName();
        saslServerName = name.getHostName();
        if (saslServerName == null) {
          throw new IOException(
              "Kerberos principal name does NOT have the expected hostname part: "
                  + serverPrincipal);
        }
View Full Code Here

Examples of org.apache.harmony.auth.jgss.kerberos.KerberosName

public class KerberosNameTest extends TestCase {

 
  public void testExport() throws Exception {
    KerberosName kerberosName = new KerberosName("service@localhost", GSSName.NT_HOSTBASED_SERVICE);
    byte[] exported = kerberosName.export();
    byte[] expected = new byte[] { 4,1,0,11,6,9,42,-122,72,-122,-9,18,1,2,2,0,0,0,17,115,101,114,118,105,99,101,47,108,111,99,97,108,104,111,115,116 };
    assertTrue(Arrays.equals(expected, exported));   
  }
View Full Code Here

Examples of org.apache.harmony.auth.jgss.kerberos.KerberosName

    byte[] expected = new byte[] { 4,1,0,11,6,9,42,-122,72,-122,-9,18,1,2,2,0,0,0,17,115,101,114,118,105,99,101,47,108,111,99,97,108,104,111,115,116 };
    assertTrue(Arrays.equals(expected, exported));   
  }
 
  public void testEquals() throws Exception{
    KerberosName one = new KerberosName("service@localhost", GSSName.NT_HOSTBASED_SERVICE);
    KerberosName another = new KerberosName("service@localhost", GSSName.NT_HOSTBASED_SERVICE);
    assertEquals(one, another);
   
    one = new KerberosName("service@localhost", GSSName.NT_HOSTBASED_SERVICE);
    another = new KerberosName("service/localhost", GSSName.NT_HOSTBASED_SERVICE);
    assertEquals(one, another);
   
    one = new KerberosName("service@localhost", GSSName.NT_USER_NAME);
    another = new KerberosName("service@localhost", GSSName.NT_USER_NAME);
    assertEquals(one, another);
   
    one = new KerberosName("service@localhost", GSSName.NT_USER_NAME);
    another = new KerberosName("service/localhost", GSSName.NT_USER_NAME);
    assertFalse(one.equals(another));
   
    final Oid KRB5_PRINCIPAL_NAMETYPE = new Oid("1.2.840.113554.1.2.2.1");
    one = new KerberosName("service@localhost", KRB5_PRINCIPAL_NAMETYPE);
    another = new KerberosName("service@localhost", KRB5_PRINCIPAL_NAMETYPE);
    assertEquals(one, another);
   
    one = new KerberosName("service@localhost", KRB5_PRINCIPAL_NAMETYPE);
    another = new KerberosName("service/localhost",KRB5_PRINCIPAL_NAMETYPE);
    assertFalse(one.equals(another));
   
    one = new KerberosName("service@localhost", KRB5_PRINCIPAL_NAMETYPE);
    another = new KerberosName("service@localhost", GSSName.NT_USER_NAME);
    assertEquals(one,another);
   
    one = new KerberosName("service@localhost", KRB5_PRINCIPAL_NAMETYPE);
    another = new KerberosName("service@localhost", GSSName.NT_HOSTBASED_SERVICE);
    assertFalse(one.equals(another));
   
    one = new KerberosName("service/localhost", KRB5_PRINCIPAL_NAMETYPE);
    another = new KerberosName("service@localhost", GSSName.NT_HOSTBASED_SERVICE);
    assertEquals(one,another);
   
    one = new KerberosName("service@localhost", GSSName.NT_USER_NAME);
    another = new KerberosName("service@localhost", GSSName.NT_HOSTBASED_SERVICE);
    assertFalse(one.equals(another));
   
    one = new KerberosName("service/localhost", GSSName.NT_USER_NAME);
    another = new KerberosName("service@localhost", GSSName.NT_HOSTBASED_SERVICE);
    assertFalse(one.equals(another));
  }
View Full Code Here

Examples of org.apache.zookeeper.server.auth.KerberosName

            }
            else { // GSSAPI.
                final Object[] principals = subject.getPrincipals().toArray();
                // determine client principal from subject.
                final Principal clientPrincipal = (Principal)principals[0];
                final KerberosName clientKerberosName = new KerberosName(clientPrincipal.getName());
                // assume that server and client are in the same realm (by default; unless the system property
                // "zookeeper.server.realm" is set).
                String serverRealm = System.getProperty("zookeeper.server.realm",clientKerberosName.getRealm());
                KerberosName serviceKerberosName = new KerberosName(servicePrincipal+"@"+serverRealm);
                final String serviceName = serviceKerberosName.getServiceName();
                final String serviceHostname = serviceKerberosName.getHostName();
                final String clientPrincipalName = clientKerberosName.toString();
                try {
                    saslClient = Subject.doAs(subject,new PrivilegedExceptionAction<SaslClient>() {
                        public SaslClient run() throws SaslException {
                            LOG.info("Client will use GSSAPI as SASL mechanism.");
View Full Code Here

Examples of org.apache.zookeeper.server.auth.KerberosName

            }
            else { // GSSAPI.
                final Object[] principals = subject.getPrincipals().toArray();
                // determine client principal from subject.
                final Principal clientPrincipal = (Principal)principals[0];
                final KerberosName clientKerberosName = new KerberosName(clientPrincipal.getName());
                // assume that server and client are in the same realm (by default; unless the system property
                // "zookeeper.server.realm" is set).
                String serverRealm = System.getProperty("zookeeper.server.realm",clientKerberosName.getRealm());
                KerberosName serviceKerberosName = new KerberosName(servicePrincipal+"@"+serverRealm);
                final String serviceName = serviceKerberosName.getServiceName();
                final String serviceHostname = serviceKerberosName.getHostName();
                final String clientPrincipalName = clientKerberosName.toString();
                try {
                    saslClient = Subject.doAs(subject,new PrivilegedExceptionAction<SaslClient>() {
                        public SaslClient run() throws SaslException {
                            LOG.info("Client will use GSSAPI as SASL mechanism.");
View Full Code Here

Examples of org.apache.zookeeper.server.auth.KerberosName

            }
            else { // GSSAPI.
                final Object[] principals = subject.getPrincipals().toArray();
                // determine client principal from subject.
                final Principal clientPrincipal = (Principal)principals[0];
                final KerberosName clientKerberosName = new KerberosName(clientPrincipal.getName());
                // assume that server and client are in the same realm (by default; unless the system property
                // "zookeeper.server.realm" is set).
                String serverRealm = System.getProperty("zookeeper.server.realm",clientKerberosName.getRealm());
                KerberosName serviceKerberosName = new KerberosName(servicePrincipal+"@"+serverRealm);
                final String serviceName = serviceKerberosName.getServiceName();
                final String serviceHostname = serviceKerberosName.getHostName();
                final String clientPrincipalName = clientKerberosName.toString();
                try {
                    saslClient = Subject.doAs(subject,new PrivilegedExceptionAction<SaslClient>() {
                        public SaslClient run() throws SaslException {
                            LOG.info("Client will use GSSAPI as SASL mechanism.");
View Full Code Here
TOP
Copyright © 2018 www.massapi.com. All rights reserved.
All source code are property of their respective owners. Java is a trademark of Sun Microsystems, Inc and owned by ORACLE Inc. Contact coftware#gmail.com.