heimdal Extend the 'hdb as a keytab' code [HEIMDAL-600]
[heimdal.git] / tests / kdc / check-referral.in
blob10753f32a52e4ce8bbbb7af91030cf8e2b756c62
1 #!/bin/sh
3 # Copyright (c) 2006 - 2007 Kungliga Tekniska Högskolan
4 # (Royal Institute of Technology, Stockholm, Sweden).
5 # All rights reserved.
7 # Redistribution and use in source and binary forms, with or without
8 # modification, are permitted provided that the following conditions
9 # are met:
11 # 1. Redistributions of source code must retain the above copyright
12 # notice, this list of conditions and the following disclaimer.
14 # 2. Redistributions in binary form must reproduce the above copyright
15 # notice, this list of conditions and the following disclaimer in the
16 # documentation and/or other materials provided with the distribution.
18 # 3. Neither the name of the Institute nor the names of its contributors
19 # may be used to endorse or promote products derived from this software
20 # without specific prior written permission.
22 # THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
23 # ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
24 # IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
25 # ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
26 # FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
27 # DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
28 # OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
29 # HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
30 # LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
31 # OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
32 # SUCH DAMAGE.
34 # $Id$
37 srcdir="@srcdir@"
38 objdir="@objdir@"
39 EGREP="@EGREP@"
41 testfailed="echo test failed; cat messages.log; exit 1"
43 # If there is no useful db support compile in, disable test
44 ../db/have-db || exit 77
46 R=TEST.H5L.SE
47 R2=SUB.TEST.H5L.SE
49 service=ldap/host.sub.test.h5l.se
51 port=@port@
53 kadmin="${TESTS_ENVIRONMENT} ../../kadmin/kadmin -l -r $R"
54 kdc="${TESTS_ENVIRONMENT} ../../kdc/kdc --addresses=localhost -P $port"
56 cache="FILE:${objdir}/cache.krb5"
58 kinit="${TESTS_ENVIRONMENT} ../../kuser/kinit -c $cache --no-afslog"
59 klist="${TESTS_ENVIRONMENT} ../../kuser/klist -c $cache"
60 kgetcred="${TESTS_ENVIRONMENT} ../../kuser/kgetcred -c $cache"
61 kdestroy="${TESTS_ENVIRONMENT} ../../kuser/kdestroy -c $cache --no-unlog"
64 KRB5_CONFIG="${objdir}/krb5.conf"
65 export KRB5_CONFIG
67 rm -f current-db*
68 rm -f out-*
69 rm -f mkey.file*
71 > messages.log
73 echo Creating database
74 ${kadmin} \
75 init \
76 --realm-max-ticket-life=1day \
77 --realm-max-renewable-life=1month \
78 ${R} || exit 1
80 ${kadmin} \
81 init \
82 --realm-max-ticket-life=1day \
83 --realm-max-renewable-life=1month \
84 ${R2} || exit 1
86 ${kadmin} add -p foo --use-defaults foo@${R} || exit 1
87 ${kadmin} modify --alias=alias1 --alias=alias2 foo@${R} || exit 1
88 ${kadmin} get foo@${R} | grep alias1@${R} >/dev/null || exit 1
90 ${kadmin} add -p foo --use-defaults ${service}@${R2} || exit 1
92 ${kadmin} add -p cross1 --use-defaults krbtgt/${R2}@${R} || exit 1
93 ${kadmin} add -p cross2 --use-defaults krbtgt/${R}@${R2} || exit 1
95 echo "Doing database check"
96 ${kadmin} check ${R} || exit 1
97 ${kadmin} check ${R2} || exit 1
99 echo foo > ${objdir}/foopassword
101 echo Starting kdc
102 ${kdc} &
103 kdcpid=$!
105 sh ${srcdir}/wait-kdc.sh
106 if [ "$?" != 0 ] ; then
107 kill -9 ${kdcpid}
108 exit 1
111 trap "kill -9 ${kdcpid}; echo signal killing kdc; exit 1;" EXIT
113 ec=0
115 echo "Test AS-REQ"
117 echo "Getting client (no canon)"; > messages.log
118 ${kinit} --password-file=${objdir}/foopassword foo@${R} || \
119 { ec=1 ; eval "${testfailed}"; }
120 echo "checking that we got back right principal"
121 ${klist} | grep "Principal: foo@${R}" > /dev/null || \
122 { ec=1 ; eval "${testfailed}"; }
123 ${kdestroy}
125 echo "Getting client client tickets (default realm, enterprisename)"; > messages.log
126 ${kinit} --canonicalize \
127 --password-file=${objdir}/foopassword foo@${R} || \
128 { ec=1 ; eval "${testfailed}"; }
129 echo "checking that we got back right principal"
130 ${klist} | grep "Principal: foo@${R}" > /dev/null || \
131 { ec=1 ; eval "${testfailed}"; }
132 ${kdestroy}
134 echo "Getting client alias1 tickets"; > messages.log
135 ${kinit} --canonicalize \
136 --password-file=${objdir}/foopassword foo@${R} || \
137 { ec=1 ; eval "${testfailed}"; }
138 echo "checking that we got back right principal"
139 ${klist} | grep "Principal: foo@${R}" > /dev/null || \
140 { ec=1 ; eval "${testfailed}"; }
141 ${kdestroy}
144 echo "Getting client alias2 tickets"; > messages.log
145 ${kinit} --canonicalize \
146 --password-file=${objdir}/foopassword alias2@${R}@${R} || \
147 { ec=1 ; eval "${testfailed}"; }
148 echo "checking that we got back right principal"
149 ${klist} | grep "Principal: foo@${R}" > /dev/null || \
150 { ec=1 ; eval "${testfailed}"; }
151 ${kdestroy}
153 echo "Getting client alias1 tickets (non canon case)"; > messages.log
154 ${kinit} --password-file=${objdir}/foopassword \
155 alias1@${R}@${R} > /dev/null 2>/dev/null && \
156 { ec=1 ; eval "${testfailed}"; }
158 echo "Getting client alias2 tickets (removed)"; > messages.log
159 ${kadmin} modify --alias=alias1 foo@${R} || { ec=1 ; eval "${testfailed}"; }
160 ${kinit} --canonicalize \
161 --password-file=${objdir}/foopassword \
162 alias2@${R}@${R} > /dev/null 2>/dev/null && \
163 { ec=1 ; eval "${testfailed}"; }
165 echo "Remove alias"
166 ${kadmin} modify --alias= foo@${R} || { ec=1 ; eval "${testfailed}"; }
168 echo "Test server referrals"
170 echo "Getting client for ${service}@${R} (tgs kdc referral)"
171 > messages.log
172 ${kinit} --password-file=${objdir}/foopassword foo@${R} || \
173 { ec=1 ; eval "${testfailed}"; }
174 ${kgetcred} --canonicalize ${service}@${R} ||
175 { ec=1 ; eval "${testfailed}"; }
176 echo "checking that we got back right principal"
177 ${klist} | grep "${service}@${R2}" > /dev/null || \
178 { ec=1 ; eval "${testfailed}"; }
179 ${kdestroy}
181 echo "Getting client for ${service}@${R2} (tgs client side guessing)"
182 > messages.log
183 ${kinit} --password-file=${objdir}/foopassword foo@${R} || \
184 { ec=1 ; eval "${testfailed}"; }
185 ${kgetcred} ${service}@${R2} ||
186 { ec=1 ; eval "${testfailed}"; }
187 echo "checking that we got back right principal"
188 ${klist} | grep "${service}@${R2}" > /dev/null || \
189 { ec=1 ; eval "${testfailed}"; }
190 ${kdestroy}
193 echo "killing kdc (${kdcpid})"
194 sh ${srcdir}/leaks-kill.sh kdc $kdcpid || exit 1
196 trap "" EXIT
198 exit $ec