App-DocKnot
view release on metacpan or search on metacpan
t/data/update/remctl/docknot.yaml view on Meta::CPAN
A Java client and Java server are available in the java subdirectory, but
they are not integrated into the normal build or built by default. There
is a basic Makefile in that directory that may require some tweaking. It
currently requires the Sun Java JDK (1.4.2, 5, or 6) or OpenJDK 6 or
later. A considerably better Java client implementation is available on
the `java` branch in the Git repository but has not yet been merged.
sections:
- body: |
(These instructions are not tested by the author and are now dated.
Updated instructions via a pull request, issue, or email are very
welcome.)
First, install the Microsoft Windows SDK for Windows Vista if you have not
already. This is a free download from Microsoft for users of "Genuine
Microsoft Windows." The `vcvars32.bat` environment provided by Visual
Studio may work as an alternative, but has not been tested.
Next, install the [MIT Kerberos for Windows
SDK](https://web.mit.edu/kerberos/www/dist/index.html). remctl has been
tested with version 3.2.1 but should hopefully work with later versions.
Then, follow these steps:
1. Run the `InitEnv.cmd` script included with the Windows SDK with
parameters `"/xp /release"`.
2. Run the `configure.bat` script, giving it as an argument the location
of the Kerberos for Windows SDK. For example, if you installed the KfW
SDK in `"c:\KfW SDK"`, you should run:
```
configure "c:\KfW SDK"
```
3. Run `nmake` to start compiling. You can ignore the warnings.
If all goes well, you will have `remctl.exe` and `remctl.dll`. The latter
is a shared library used by the client program. It exports the same
interface as the UNIX libremctl library.
title: Building on Windows
support:
email: eagle@eyrie.org
github: rra/remctl
web: https://www.eyrie.org/~eagle/software/remctl/
synopsis: remote authenticated command execution with ACLs
test:
lancaster: true
prefix: |
remctl comes with a comprehensive test suite, but it requires some
configuration in order to test anything other than low-level utility
functions. For the full test suite, you will need to have a keytab that
can authenticate to a running KDC. Using a test KDC environment, if you
have one, is recommended.
Follow the instructions in `tests/config/README` to configure the test
suite.
Now, you can run the test suite with:
suffix: |
On particularly slow or loaded systems, you may see intermittent failures
from the `server/streaming` test because it's timing-sensitive.
The test suite will also need to be able to bind to 127.0.0.1 on port
11119 and 14373 to run test network server programs.
To test anonymous authentication, the KDC configured in the test suite
needs to support service tickets for the anonymous identity (not a
standard configuration). This test will be skipped if the KDC does not
support this.
To test user handling in remctld, you will need the `fakeroot` command
(available in the `fakeroot` package in Debian and Ubuntu). This test
will be skipped if `fakeroot` isn't available.
The following additional Perl modules will be used by the test suite for
the main package and the Perl bindings if installed:
* Test::MinimumVersion
* Test::Perl::Critic
* Test::Pod
* Test::Spelling
* Test::Strict
* Test::Synopsis
All are available on CPAN. Those tests will be skipped if the modules are
not available.
vcs:
browse: https://git.eyrie.org/?p=kerberos/remctl.git
github: rra/remctl
openhub: https://www.openhub.net/p/remctl
status:
travis: rra/remctl
type: Git
url: https://git.eyrie.org/git/kerberos/remctl.git
version: '3.15'
( run in 0.469 second using v1.01-cache-2.11-cpan-39bf76dae61 )