/
transport.go
65 lines (51 loc) · 1.29 KB
/
transport.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
package helpers
import (
"context"
"fmt"
"net/http"
"time"
"github.com/Azure/go-ntlmssp"
"github.com/koltyakov/gosip"
u "github.com/koltyakov/gosip/test/utils"
)
func CheckTransport(auth gosip.AuthCnfg, cnfgPath string) error {
err := auth.ReadConfig(u.ResolveCnfgPath(cnfgPath))
if err != nil {
return err
}
client := &gosip.SPClient{
AuthCnfg: auth,
Client: http.Client{
Transport: &http.Transport{TLSHandshakeTimeout: 25 * time.Second},
},
}
if _, err := gosip.GetDigest(context.Background(), client); err != nil {
return fmt.Errorf("unable to get digest: %w", err)
}
if _, _, err := client.AuthCnfg.GetAuth(); err != nil {
return err
}
if auth.GetStrategy() == "ntlm" {
n, ok := client.Transport.(ntlmssp.Negotiator)
if !ok {
return fmt.Errorf("transport configuration leak")
}
tr, ok := n.RoundTripper.(*http.Transport)
if !ok {
return fmt.Errorf("transport configuration leak")
}
if tr.TLSHandshakeTimeout != 25*time.Second {
return fmt.Errorf("transport configuration leak")
}
return nil
}
// None NTLM strategies
tr, ok := client.Transport.(*http.Transport)
if !ok {
return fmt.Errorf("transport configuration leak")
}
if tr.TLSHandshakeTimeout != 25*time.Second {
return fmt.Errorf("transport configuration leak")
}
return nil
}