Difference between revisions of "Manual Testing"
(New page: This page describes manual testing procedures. There are two reasons these exist: # Manual testing is sometimes simpler than running an automated test and instrumenting it. # In some cas...) |
(→Basic Testing KDC setup) |
||
Line 9: | Line 9: | ||
1. Pick a name for your test KDC; this example will assume EXAMPLE.COM. |
1. Pick a name for your test KDC; this example will assume EXAMPLE.COM. |
||
+ | |||
2. Do a build and install of the krb5 sources into some prefix; this example will assume /usr/local, but anywhere is fine. Put the prefix's bin and sbin directories in your path, or use full pathnames for the commands below. |
2. Do a build and install of the krb5 sources into some prefix; this example will assume /usr/local, but anywhere is fine. Put the prefix's bin and sbin directories in your path, or use full pathnames for the commands below. |
||
+ | |||
3. Pick two port numbers, for the KDC and admin server. This example will assume 50000 and 50001. |
3. Pick two port numbers, for the KDC and admin server. This example will assume 50000 and 50001. |
||
+ | |||
4. Set up a krb5.conf file somewhere; this example will assume /usr/local/etc/krb5.conf. Make it look something like: |
4. Set up a krb5.conf file somewhere; this example will assume /usr/local/etc/krb5.conf. Make it look something like: |
||
[libdefaults] |
[libdefaults] |
||
Line 36: | Line 39: | ||
# .your.domain = EXAMPLE.COM |
# .your.domain = EXAMPLE.COM |
||
Set the environment variable KRB5_CONFIG to the pathname of this krb5.conf file. |
Set the environment variable KRB5_CONFIG to the pathname of this krb5.conf file. |
||
+ | |||
5. Run: |
5. Run: |
||
kdb5_util create -s |
kdb5_util create -s |
||
Enter a master password; it can be something insecure like "master". The DB will be created in /usr/local/var/krb5kdc/principal and a few other similarly-named files. The master key stash will be created in /usr/local/var/krb5kdc/.k5.EXAMPLE.COM. |
Enter a master password; it can be something insecure like "master". The DB will be created in /usr/local/var/krb5kdc/principal and a few other similarly-named files. The master key stash will be created in /usr/local/var/krb5kdc/.k5.EXAMPLE.COM. |
||
+ | |||
6. Run: |
6. Run: |
||
kadmin.local |
kadmin.local |
||
Line 44: | Line 49: | ||
quit |
quit |
||
Enter a user password; it can be something insecure like "user". |
Enter a user password; it can be something insecure like "user". |
||
+ | |||
7. Start the KDC by running: |
7. Start the KDC by running: |
||
krb5kdc |
krb5kdc |
||
Check the log file specified in krb5.conf if the KDC has any trouble starting. You should be able to "kinit user" at this point. |
Check the log file specified in krb5.conf if the KDC has any trouble starting. You should be able to "kinit user" at this point. |
||
+ | |||
8. If you need kadmind, add another principle user/admin (using kadmin.local as described above), and create the file /usr/local/var/krb5kdc/kadm5.acl containing: |
8. If you need kadmind, add another principle user/admin (using kadmin.local as described above), and create the file /usr/local/var/krb5kdc/kadm5.acl containing: |
||
user/admin * |
user/admin * |
Revision as of 23:16, 16 June 2009
This page describes manual testing procedures. There are two reasons these exist:
- Manual testing is sometimes simpler than running an automated test and instrumenting it.
- In some cases we have a manual testing procedure for part of the code, but not an automated test.
Basic Testing KDC setup
Being able to set up a test KDC is a crucial building block of testing. You can do so as follows:
1. Pick a name for your test KDC; this example will assume EXAMPLE.COM.
2. Do a build and install of the krb5 sources into some prefix; this example will assume /usr/local, but anywhere is fine. Put the prefix's bin and sbin directories in your path, or use full pathnames for the commands below.
3. Pick two port numbers, for the KDC and admin server. This example will assume 50000 and 50001.
4. Set up a krb5.conf file somewhere; this example will assume /usr/local/etc/krb5.conf. Make it look something like:
[libdefaults] default_realm = EXAMPLE.COM # Depending on what you are testing, you may want something like: # default_keytab_name = FILE:/usr/local/var/keytab [realms] EXAMPLE.COM = { admin_server = 127.0.0.1:50001 kdc = 127.0.0.1:50000 database_module = DB2 kdc_ports = 50000 kadmind_port = 50001 } [dbmodules] DB2 = { db_library = db2 } [logging] # Use any pathnames you want here. kdc = FILE:/usr/local/var/krb5kdc/kdc.log admin_server = FILE:/usr/local/var/krb5kdc/kadmin.log # Depending on what you are testing, you may want: # [domain_realm] # .your.domain = EXAMPLE.COM
Set the environment variable KRB5_CONFIG to the pathname of this krb5.conf file.
5. Run:
kdb5_util create -s
Enter a master password; it can be something insecure like "master". The DB will be created in /usr/local/var/krb5kdc/principal and a few other similarly-named files. The master key stash will be created in /usr/local/var/krb5kdc/.k5.EXAMPLE.COM.
6. Run:
kadmin.local addprinc user quit
Enter a user password; it can be something insecure like "user".
7. Start the KDC by running:
krb5kdc
Check the log file specified in krb5.conf if the KDC has any trouble starting. You should be able to "kinit user" at this point.
8. If you need kadmind, add another principle user/admin (using kadmin.local as described above), and create the file /usr/local/var/krb5kdc/kadm5.acl containing:
user/admin *
Then start the kadmind server with:
kadmind
If it has trouble starting, check the log file specified in krb5.conf.