Skip to content

Releases: jcmturner/gokrb5

Version 8

31 Jan 20:23
0b0d9d7
Compare
Choose a tag to compare
  • Introduce v8 using Go modules for dependencies
  • Client.Key function takes a kvno for which key to return
  • Removed stutter on creating client functions
  • Removed stutter on creating config functions
  • Removed stutter from krberror New func
  • Credentials now has method to get AD additional details
  • Credentials can now be marshalled/unmarshalled to support sessions
  • Store marshalled credentials bytes in http request context
  • Support for server side sessions in SPNEGO
  • Return kvno from keytab GetEncryptionKey method
  • APREQ verify takes point so calling code can access decrypted parts if needs be

Client uses cached TGT

31 Jan 20:21
0b0d9d7
Compare
Choose a tag to compare
v7.5.0

respect keytab principal given

Small enhancement, mainly fixes

14 Jan 21:38
8a3a3d7
Compare
Choose a tag to compare

Resolves the following issues:

  • Work around windows based clients not strictly obeying the SPNEGO RFC - #278
  • Improved checks on keytab parsing to avoid panics and out of bounds errors.
  • Fixed issue with configuration preference of explicit defined KDCs over those discovered by DNS.
  • Fixed client's assume pre-authentication configuration not taking effect.
  • Fixed bug with referrals - #321

Enhancements:

  • Exported a ValidUntil() method on client's credentials

Other changes:

  • Moved from Travis to GitHub actions for integration tests.

Thanks to all those that have contributed to updates in this release!

Minor enhancements

21 Jun 12:56
Compare
Choose a tag to compare
  • Improved network timeout behaviour on client
  • krb5.conf parsing supports trailing comments
  • Return quicker from SPNEGOAuthenticate on auth failure
  • Typo fixes

Fix HTTP SPNEGO client upload

18 May 06:41
bae8ea1
Compare
Choose a tag to compare
  • Resolved issue of empty body for SPNEGO client POST/PUT

Fix overwrite of HTTP context

13 Apr 13:32
Compare
Choose a tag to compare

Client credentials are added to the existing context rather than replacing any existing one.

Fix nil pointer dereference bug

22 Mar 17:18
8bb39e3
Compare
Choose a tag to compare

Fix nil pointer dereference bug (#276)

Canonical name for derived SPN

10 Mar 22:29
50a61c6
Compare
Choose a tag to compare
  • Canonical name is used by the SPNEGO client to derive the SPN
  • Integration testing updated to test against G0 1.12

Client logging

11 Feb 21:06
Compare
Choose a tag to compare

Added client side log messages

New SPNEGO client

08 Feb 20:44
Compare
Choose a tag to compare
  • New spnego.Client that acts like the http.Client but will negotiate authentication using kerberos