|
10 | 10 | : ${KAFKA_USER:=kafka}
|
11 | 11 | : ${KAFKA_HOST:=kafka}
|
12 | 12 | : ${KAFKA_CLIENT_USER:=client}
|
| 13 | +: ${KDC_ADDRESS:=$(hostname -f)} |
| 14 | +: ${KEYTABS_SHARED_DIR:=/keytabs} |
13 | 15 |
|
14 |
| -fix_nameserver() { |
15 |
| - cat>/etc/resolv.conf<<EOF |
16 |
| -nameserver $NAMESERVER_IP |
17 |
| -search $SEARCH_DOMAINS |
18 |
| -EOF |
19 |
| -} |
20 | 16 |
|
21 |
| -fix_hostname() { |
22 |
| - sed -i "/^hosts:/ s/ *files dns/ dns files/" /etc/nsswitch.conf |
23 |
| -} |
24 | 17 |
|
25 | 18 | create_config() {
|
26 |
| - : ${KDC_ADDRESS:=$(hostname -f)} |
27 |
| - |
28 | 19 | cat>/etc/krb5.conf<<EOF
|
29 |
| -[logging] |
30 |
| - default = FILE:/var/log/kerberos/krb5libs.log |
31 |
| - kdc = FILE:/var/log/kerberos/krb5kdc.log |
32 |
| - admin_server = FILE:/var/log/kerberos/kadmind.log |
33 |
| -
|
34 | 20 | [libdefaults]
|
35 |
| - default_realm = $REALM |
| 21 | + default_realm = KERBEROS |
36 | 22 | dns_lookup_realm = false
|
37 | 23 | dns_lookup_kdc = false
|
38 | 24 | ticket_lifetime = 24h
|
39 | 25 | renew_lifetime = 7d
|
40 | 26 | forwardable = true
|
| 27 | + rdns = false |
| 28 | + ignore_acceptor_hostname = true |
41 | 29 |
|
42 | 30 | [realms]
|
43 |
| - $REALM = { |
44 |
| - kdc = $KDC_ADDRESS |
45 |
| - admin_server = $KDC_ADDRESS |
| 31 | + KERBEROS = { |
| 32 | + kdc = kerberos:1088 |
| 33 | + admin_server = kerberos |
46 | 34 | }
|
47 | 35 |
|
48 | 36 | [domain_realm]
|
49 |
| - .$DOMAIN_REALM = $REALM |
50 |
| - $DOMAIN_REALM = $REALM |
| 37 | + .kerberos = KERBEROS |
| 38 | + kerberos = KERBEROS |
51 | 39 | EOF
|
| 40 | +echo "Created config: /etc/krb5.conf" |
| 41 | +cat /etc/krb5.conf |
| 42 | +} |
| 43 | + |
| 44 | + |
| 45 | +create_service_config() { |
| 46 | + cat>/etc/krb5kdc/kdc.conf<<EOF |
| 47 | +[logging] |
| 48 | + default = FILE:/var/log/kerberos/krb5libs.log |
| 49 | + kdc = FILE:/var/log/kerberos/krb5kdc.log |
| 50 | + admin_server = FILE:/var/log/kerberos/kadmind.log |
| 51 | +
|
| 52 | +[kdcdefaults] |
| 53 | + kdc_ports = 1750,1088 |
| 54 | +
|
| 55 | +[realms] |
| 56 | + KERBEROS = { |
| 57 | + database_name = /var/lib/krb5kdc/principal |
| 58 | + admin_keytab = FILE:/etc/krb5kdc/kadm5.keytab |
| 59 | + acl_file = /etc/krb5kdc/kadm5.acl |
| 60 | + key_stash_file = /etc/krb5kdc/stash |
| 61 | + kdc_ports = 1750,1088 |
| 62 | + max_life = 10h 0m 0s |
| 63 | + max_renewable_life = 7d 0h 0m 0s |
| 64 | + #master_key_type = aes256-cts |
| 65 | + #supported_enctypes = aes256-cts:normal aes128-cts:normal |
| 66 | + #default_principal_flags = +preauth |
| 67 | + } |
| 68 | +EOF |
| 69 | +echo "Created service config: /etc/krb5kdc/kdc.conf" |
| 70 | +cat /etc/krb5kdc/kdc.conf |
52 | 71 | }
|
53 | 72 |
|
54 | 73 | create_db() {
|
55 | 74 | kdb5_util -P $KERB_MASTER_KEY -r $REALM create -s
|
| 75 | + echo "Created db" |
56 | 76 | }
|
57 | 77 |
|
58 | 78 | start_kdc() {
|
59 | 79 | service krb5-kdc start
|
60 | 80 | service krb5-admin-server start
|
61 | 81 | }
|
62 | 82 |
|
63 |
| -restart_kdc() { |
64 |
| - service krb5-kdc restart |
65 |
| - service krb5-admin-server restart |
66 |
| -} |
67 |
| - |
68 | 83 | create_admin_user() {
|
69 | 84 | kadmin.local -q "addprinc -pw $KERB_ADMIN_PASS $KERB_ADMIN_USER/admin"
|
70 | 85 | echo "*/admin@$REALM *" > /etc/krb5kdc/kadm5.acl
|
| 86 | + echo "Created admin user in /etc/krb5kdc/kadm5.acl" |
71 | 87 | }
|
72 | 88 |
|
73 | 89 | create_kafka_user() {
|
74 | 90 | kadmin.local -q "addprinc -randkey $KAFKA_HOST/$KAFKA_USER@$REALM"
|
75 |
| - kadmin.local -q "ktadd -k /keytabs/kafka_broker.keytab $KAFKA_HOST/$KAFKA_USER@$REALM" |
| 91 | + kadmin.local -q "ktadd -k /etc/krb5/kafka_broker.keytab $KAFKA_HOST/$KAFKA_USER@$REALM" |
76 | 92 | kadmin.local -q "addprinc -randkey $KAFKA_HOST/$KAFKA_CLIENT_USER@$REALM"
|
77 |
| - kadmin.local -q "ktadd -k /keytabs/kafka_client.keytab $KAFKA_HOST/$KAFKA_CLIENT_USER@$REALM" |
78 |
| - chmod 666 /keytabs/kafka_broker.keytab |
79 |
| - chmod 666 /keytabs/kafka_client.keytab |
| 93 | + kadmin.local -q "ktadd -k /etc/krb5/kafka_client.keytab $KAFKA_HOST/$KAFKA_CLIENT_USER@$REALM" |
| 94 | + echo "Created keytab files for kafka user and kafka client:" |
| 95 | + ls -la /etc/krb5 |
| 96 | + chmod 666 /etc/krb5/kafka_broker.keytab |
| 97 | + chmod 666 /etc/krb5/kafka_client.keytab |
80 | 98 | }
|
81 | 99 |
|
82 |
| - |
| 100 | +copy_keytab_files() { |
| 101 | + cp -r /etc/krb5/* $KEYTABS_SHARED_DIR |
| 102 | +} |
83 | 103 |
|
84 | 104 | if [ ! -f /kerberos_initialized ]; then
|
85 | 105 | mkdir -p /var/log/kerberos
|
| 106 | + mkdir /etc/krb5 |
| 107 | + echo "Created directories:" |
| 108 | + ls -la /var/log/kerberos |
| 109 | + ls -la /etc/krb5 |
| 110 | + |
| 111 | + create_service_config |
86 | 112 | create_config
|
87 | 113 | create_db
|
88 | 114 | create_admin_user
|
89 | 115 | create_kafka_user
|
| 116 | + copy_keytab_files |
90 | 117 | start_kdc
|
91 | 118 |
|
92 | 119 | touch /kerberos_initialized
|
93 | 120 | else
|
94 | 121 | start_kdc
|
95 | 122 | fi
|
96 | 123 |
|
| 124 | +# Startup condition is based on the output of the log file |
| 125 | +# See MockOAuthTests.java |
97 | 126 | tail -F /var/log/kerberos/krb5kdc.log
|
0 commit comments