1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77
|
#!/bin/sh
#
# Build a Kerberos test realm for Heimdal.
#
# This script automates the process of setting up a Kerberos test realm from
# scratch suitable for testing pam-krb5. It is primarily intended to be run
# from inside CI in a VM or container from the top of the wallet source tree,
# and must be run as root. It expects to be operating on the Debian Heimdal
# package.
#
# Copyright 2014, 2020 Russ Allbery <eagle@eyrie.org>
#
# SPDX-License-Identifier: MIT
set -eux
# Install the KDC.
apt-get install heimdal-kdc
# Install its configuration files.
cp ci/files/heimdal/heimdal-kdc /etc/default/heimdal-kdc
cp ci/files/heimdal/kadmind.acl /etc/heimdal-kdc/kadmind.acl
cp ci/files/heimdal/kdc.conf /etc/heimdal-kdc/kdc.conf
cp ci/files/heimdal/krb5.conf /etc/krb5.conf
# Some versions of heimdal-kdc require this.
ln -s /etc/heimdal-kdc/kadmind.acl /var/lib/heimdal-kdc/kadmind.acl
# Add domain-realm mappings for the local host, since otherwise Heimdal and
# MIT Kerberos may attempt to discover the realm of the local domain, and the
# DNS server for GitHub Actions has a habit of just not responding and causing
# the test to hang.
cat <<EOF >>/etc/krb5.conf
[domain_realm]
$(hostname -f) = HEIMDAL.TEST
EOF
cat <<EOF >>/etc/heimdal-kdc/kdc.conf
[domain_realm]
$(hostname -f) = HEIMDAL.TEST
EOF
# Create the basic KDC.
kstash --random-key
kadmin -l init --realm-max-ticket-life='1 day 1 hour' \
--realm-max-renewable-life='1 week' HEIMDAL.TEST
# Set default principal policies.
kadmin -l modify --attributes=requires-pre-auth,disallow-svr \
default@HEIMDAL.TEST
# Create and store the keytab.
kadmin -l add -r --use-defaults --attributes=requires-pre-auth \
test/keytab@HEIMDAL.TEST
kadmin -l ext_keytab -k tests/config/keytab test/keytab@HEIMDAL.TEST
echo 'test/keytab@HEIMDAL.TEST' >tests/config/principal
# Create the root CA for PKINIT.
mkdir -p /etc/heimdal-kdc/ca
hxtool issue-certificate --self-signed --issue-ca --generate-key=rsa \
--subject=CN=CA,DC=HEIMDAL,DC=TEST --lifetime=10years \
--certificate=FILE:/etc/heimdal-kdc/ca/ca.pem
chmod 644 /etc/heimdal-kdc/ca/ca.pem
# Create the certificate for the Heimdal Kerberos KDC.
hxtool issue-certificate --ca-certificate=FILE:/etc/heimdal-kdc/ca/ca.pem \
--generate-key=rsa --type=pkinit-kdc \
--pk-init-principal=krbtgt/HEIMDAL.TEST@HEIMDAL.TEST \
--subject=uid=kdc,DC=HEIMDAL,DC=TEST \
--certificate=FILE:/etc/heimdal-kdc/kdc.pem
chmod 644 /etc/heimdal-kdc/kdc.pem
# Fix permissions on all the newly-created files.
chmod 644 tests/config/*
# Restart the Heimdal KDC and services.
systemctl stop heimdal-kdc
systemctl start heimdal-kdc
|