2009-04-22 13:35:27 -05:00
|
|
|
# Authors: Rob Crittenden <rcritten@redhat.com>
|
|
|
|
#
|
|
|
|
# Copyright (C) 2009 Red Hat
|
|
|
|
# see file 'COPYING' for use and warranty information
|
|
|
|
#
|
2010-12-09 06:59:11 -06:00
|
|
|
# This program is free software; you can redistribute it and/or modify
|
|
|
|
# it under the terms of the GNU General Public License as published by
|
|
|
|
# the Free Software Foundation, either version 3 of the License, or
|
|
|
|
# (at your option) any later version.
|
2009-04-22 13:35:27 -05:00
|
|
|
#
|
|
|
|
# This program is distributed in the hope that it will be useful,
|
|
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
# GNU General Public License for more details.
|
|
|
|
#
|
|
|
|
# You should have received a copy of the GNU General Public License
|
2010-12-09 06:59:11 -06:00
|
|
|
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
2009-04-22 13:35:27 -05:00
|
|
|
#
|
|
|
|
|
2012-08-23 11:38:45 -05:00
|
|
|
import os
|
2009-04-22 13:35:27 -05:00
|
|
|
import httplib
|
|
|
|
import xml.dom.minidom
|
2012-08-23 11:38:45 -05:00
|
|
|
import ConfigParser
|
|
|
|
from urllib import urlencode
|
|
|
|
|
2010-02-02 21:52:11 -06:00
|
|
|
import nss.nss as nss
|
2010-05-31 06:40:17 -05:00
|
|
|
from nss.error import NSPRError
|
2012-07-04 07:52:47 -05:00
|
|
|
|
|
|
|
from ipalib import api, errors
|
|
|
|
from ipalib.errors import NetworkError, CertificateOperationError
|
|
|
|
from ipalib.text import _
|
2012-08-23 11:38:45 -05:00
|
|
|
from ipapython import nsslib, ipautil
|
|
|
|
from ipapython.ipa_log_manager import *
|
|
|
|
|
|
|
|
# IPA can use either Dogtag version 9 or 10.
|
|
|
|
#
|
|
|
|
# Install tools should use the constants from install_constants, so that they
|
|
|
|
# install with version 10 if it is available, and with 9 if not.
|
|
|
|
# After IPA installation, the Dogtag version used is stored in the
|
|
|
|
# "dogtag_version" config option. (If that is missing, version 9 is assumed.)
|
|
|
|
# The configured_constants() function below provides constants relevant to
|
|
|
|
# the configured version.
|
|
|
|
|
|
|
|
class Dogtag10Constants(object):
|
|
|
|
DOGTAG_VERSION = 10
|
|
|
|
UNSECURE_PORT = 8080
|
|
|
|
AGENT_SECURE_PORT = 8443
|
|
|
|
EE_SECURE_PORT = 8443
|
|
|
|
AJP_PORT = 8009
|
2012-09-19 22:35:42 -05:00
|
|
|
DS_PORT = 389
|
|
|
|
DS_SECURE_PORT = 636
|
2012-08-23 11:38:45 -05:00
|
|
|
|
|
|
|
SPAWN_BINARY = '/usr/sbin/pkispawn'
|
|
|
|
DESTROY_BINARY = '/usr/sbin/pkidestroy'
|
|
|
|
|
|
|
|
SERVER_ROOT = '/var/lib/pki'
|
|
|
|
PKI_INSTANCE_NAME = 'pki-tomcat'
|
|
|
|
PKI_ROOT = '%s/%s' % (SERVER_ROOT, PKI_INSTANCE_NAME)
|
2012-10-10 05:37:24 -05:00
|
|
|
CRL_PUBLISH_PATH = '/var/lib/ipa/pki-ca/publish'
|
2012-08-23 11:38:45 -05:00
|
|
|
CS_CFG_PATH = '%s/conf/ca/CS.cfg' % PKI_ROOT
|
|
|
|
PASSWORD_CONF_PATH = '%s/conf/password.conf' % PKI_ROOT
|
|
|
|
SERVICE_PROFILE_DIR = '%s/ca/profiles/ca' % PKI_ROOT
|
|
|
|
ALIAS_DIR = '/etc/pki/pki-tomcat/alias'
|
|
|
|
|
|
|
|
RACERT_LINE_SEP = '\n'
|
|
|
|
|
|
|
|
IPA_SERVICE_PROFILE = '%s/caIPAserviceCert.cfg' % SERVICE_PROFILE_DIR
|
|
|
|
SIGN_PROFILE = '%s/caJarSigningCert.cfg' % SERVICE_PROFILE_DIR
|
2012-09-19 22:35:42 -05:00
|
|
|
SHARED_DB = True
|
|
|
|
DS_USER = "dirsrv"
|
|
|
|
DS_NAME = "dirsrv"
|
|
|
|
|
2012-08-23 11:38:45 -05:00
|
|
|
|
|
|
|
class Dogtag9Constants(object):
|
|
|
|
DOGTAG_VERSION = 9
|
|
|
|
UNSECURE_PORT = 9180
|
|
|
|
AGENT_SECURE_PORT = 9443
|
|
|
|
EE_SECURE_PORT = 9444
|
|
|
|
AJP_PORT = 9447
|
2012-09-19 22:35:42 -05:00
|
|
|
DS_PORT = 7389
|
|
|
|
DS_SECURE_PORT = 7636
|
2012-08-23 11:38:45 -05:00
|
|
|
|
|
|
|
SPAWN_BINARY = '/bin/pkicreate'
|
|
|
|
DESTROY_BINARY = '/bin/pkisilent'
|
|
|
|
|
|
|
|
SERVER_ROOT = '/var/lib'
|
|
|
|
PKI_INSTANCE_NAME = 'pki-ca'
|
|
|
|
PKI_ROOT = '%s/%s' % (SERVER_ROOT, PKI_INSTANCE_NAME)
|
2012-10-10 05:37:24 -05:00
|
|
|
CRL_PUBLISH_PATH = '/var/lib/ipa/pki-ca/publish'
|
2012-08-23 11:38:45 -05:00
|
|
|
CS_CFG_PATH = '%s/conf/CS.cfg' % PKI_ROOT
|
|
|
|
PASSWORD_CONF_PATH = '%s/conf/password.conf' % PKI_ROOT
|
|
|
|
SERVICE_PROFILE_DIR = '%s/profiles/ca' % PKI_ROOT
|
|
|
|
ALIAS_DIR = '%s/alias' % PKI_ROOT
|
|
|
|
|
|
|
|
RACERT_LINE_SEP = '\r\n'
|
|
|
|
|
|
|
|
ADMIN_SECURE_PORT = 9445
|
|
|
|
EE_CLIENT_AUTH_PORT = 9446
|
|
|
|
TOMCAT_SERVER_PORT = 9701
|
|
|
|
|
|
|
|
IPA_SERVICE_PROFILE = '%s/caIPAserviceCert.cfg' % SERVICE_PROFILE_DIR
|
|
|
|
SIGN_PROFILE = '%s/caJarSigningCert.cfg' % SERVICE_PROFILE_DIR
|
2012-09-19 22:35:42 -05:00
|
|
|
SHARED_DB = False
|
|
|
|
DS_USER = "pkisrv"
|
|
|
|
DS_NAME = "PKI-IPA"
|
2012-08-23 11:38:45 -05:00
|
|
|
|
|
|
|
if os.path.exists('/usr/sbin/pkispawn'):
|
|
|
|
install_constants = Dogtag10Constants
|
|
|
|
else:
|
|
|
|
install_constants = Dogtag9Constants
|
|
|
|
|
|
|
|
|
|
|
|
def _get_configured_version(api):
|
|
|
|
"""Get the version of Dogtag IPA is configured to use
|
|
|
|
|
|
|
|
If an API is given, use information in its environment.
|
|
|
|
Otherwise, use information from the global config file.
|
|
|
|
"""
|
|
|
|
if api:
|
|
|
|
return int(api.env.dogtag_version)
|
|
|
|
else:
|
|
|
|
p = ConfigParser.SafeConfigParser()
|
|
|
|
p.read("/etc/ipa/default.conf")
|
|
|
|
try:
|
|
|
|
version = p.get('global', 'dogtag_version')
|
|
|
|
except (ConfigParser.NoOptionError, ConfigParser.NoSectionError):
|
|
|
|
return 9
|
|
|
|
else:
|
|
|
|
return int(version)
|
|
|
|
|
|
|
|
|
|
|
|
def configured_constants(api=None):
|
|
|
|
"""Get the name of the Dogtag CA instance
|
|
|
|
|
|
|
|
See get_configured_version
|
|
|
|
"""
|
|
|
|
if _get_configured_version(api) >= 10:
|
|
|
|
return Dogtag10Constants
|
|
|
|
else:
|
|
|
|
return Dogtag9Constants
|
|
|
|
|
2009-04-22 13:35:27 -05:00
|
|
|
|
2012-09-25 08:57:03 -05:00
|
|
|
def error_from_xml(doc, message_template):
|
|
|
|
try:
|
|
|
|
item_node = doc.getElementsByTagName("Error")
|
|
|
|
reason = item_node[0].childNodes[0].data
|
|
|
|
return errors.RemoteRetrieveError(reason=reason)
|
|
|
|
except Exception, e:
|
|
|
|
return errors.RemoteRetrieveError(reason=message_template % e)
|
|
|
|
|
|
|
|
|
2012-10-31 09:37:33 -05:00
|
|
|
def get_ca_certchain(ca_host=None, dogtag_constants=None):
|
2009-04-22 13:35:27 -05:00
|
|
|
"""
|
|
|
|
Retrieve the CA Certificate chain from the configured Dogtag server.
|
|
|
|
"""
|
2009-07-10 15:18:16 -05:00
|
|
|
if ca_host is None:
|
|
|
|
ca_host = api.env.ca_host
|
2012-10-31 09:37:33 -05:00
|
|
|
if dogtag_constants is None:
|
|
|
|
dogtag_constants = configured_constants()
|
2009-04-22 13:35:27 -05:00
|
|
|
chain = None
|
2012-08-23 11:38:45 -05:00
|
|
|
conn = httplib.HTTPConnection(ca_host,
|
2012-10-31 09:37:33 -05:00
|
|
|
api.env.ca_install_port or dogtag_constants.UNSECURE_PORT)
|
2009-04-22 13:35:27 -05:00
|
|
|
conn.request("GET", "/ca/ee/ca/getCertChain")
|
|
|
|
res = conn.getresponse()
|
2010-11-22 09:27:34 -06:00
|
|
|
doc = None
|
2009-04-22 13:35:27 -05:00
|
|
|
if res.status == 200:
|
|
|
|
data = res.read()
|
|
|
|
conn.close()
|
2009-05-21 16:34:00 -05:00
|
|
|
try:
|
|
|
|
doc = xml.dom.minidom.parseString(data)
|
|
|
|
try:
|
|
|
|
item_node = doc.getElementsByTagName("ChainBase64")
|
|
|
|
chain = item_node[0].childNodes[0].data
|
|
|
|
except IndexError:
|
2012-09-25 08:57:03 -05:00
|
|
|
raise error_from_xml(
|
|
|
|
doc, _("Retrieving CA cert chain failed: %s"))
|
2009-05-21 16:34:00 -05:00
|
|
|
finally:
|
2010-11-22 09:27:34 -06:00
|
|
|
if doc:
|
|
|
|
doc.unlink()
|
|
|
|
else:
|
2012-07-04 07:52:47 -05:00
|
|
|
raise errors.RemoteRetrieveError(
|
|
|
|
reason=_("request failed with HTTP status %d") % res.status)
|
2009-04-22 13:35:27 -05:00
|
|
|
|
|
|
|
return chain
|
2010-02-02 21:52:11 -06:00
|
|
|
|
2012-09-25 08:57:03 -05:00
|
|
|
|
|
|
|
def ca_status(ca_host=None):
|
|
|
|
"""Return the status of the CA, and the httpd proxy in front of it
|
|
|
|
|
|
|
|
The returned status can be:
|
|
|
|
- running
|
|
|
|
- starting
|
|
|
|
- Service Temporarily Unavailable
|
|
|
|
"""
|
|
|
|
if ca_host is None:
|
|
|
|
ca_host = api.env.ca_host
|
|
|
|
# Use port 443 to test the proxy as well
|
|
|
|
status, reason, headers, body = unauthenticated_https_request(
|
|
|
|
ca_host, 443, '/ca/admin/ca/getStatus')
|
|
|
|
if status == 503:
|
|
|
|
# Service temporarily unavailable
|
|
|
|
return reason
|
|
|
|
elif status != 200:
|
|
|
|
raise errors.RemoteRetrieveError(
|
|
|
|
reason=_("Retrieving CA status failed: %s") % reason)
|
|
|
|
doc = xml.dom.minidom.parseString(body)
|
|
|
|
try:
|
|
|
|
item_node = doc.getElementsByTagName("XMLResponse")[0]
|
|
|
|
item_node = item_node.getElementsByTagName("Status")[0]
|
|
|
|
return item_node.childNodes[0].data
|
|
|
|
except IndexError:
|
|
|
|
raise error_from_xml(doc, _("Retrieving CA status failed: %s"))
|
|
|
|
|
|
|
|
|
2010-02-02 21:52:11 -06:00
|
|
|
def https_request(host, port, url, secdir, password, nickname, **kw):
|
|
|
|
"""
|
2012-09-25 08:57:03 -05:00
|
|
|
:param url: The path (not complete URL!) to post to.
|
2010-02-02 21:52:11 -06:00
|
|
|
:param kw: Keyword arguments to encode into POST body.
|
|
|
|
:return: (http_status, http_reason_phrase, http_headers, http_body)
|
|
|
|
as (integer, unicode, dict, str)
|
|
|
|
|
|
|
|
Perform a client authenticated HTTPS request
|
|
|
|
"""
|
2012-09-25 08:57:03 -05:00
|
|
|
|
|
|
|
def connection_factory(host, port):
|
2010-02-02 21:52:11 -06:00
|
|
|
conn = nsslib.NSSConnection(host, port, dbdir=secdir)
|
2011-06-29 14:01:18 -05:00
|
|
|
conn.set_debuglevel(0)
|
|
|
|
conn.connect()
|
2012-09-25 08:57:03 -05:00
|
|
|
conn.sock.set_client_auth_data_callback(
|
|
|
|
nsslib.client_auth_data_callback,
|
|
|
|
nickname, password, nss.get_default_certdb())
|
|
|
|
return conn
|
|
|
|
|
|
|
|
body = urlencode(kw)
|
|
|
|
return _httplib_request(
|
|
|
|
'https', host, port, url, connection_factory, body)
|
|
|
|
|
|
|
|
|
|
|
|
def http_request(host, port, url, **kw):
|
|
|
|
"""
|
|
|
|
:param url: The path (not complete URL!) to post to.
|
|
|
|
:param kw: Keyword arguments to encode into POST body.
|
|
|
|
:return: (http_status, http_reason_phrase, http_headers, http_body)
|
|
|
|
as (integer, unicode, dict, str)
|
|
|
|
|
|
|
|
Perform an HTTP request.
|
|
|
|
"""
|
|
|
|
body = urlencode(kw)
|
|
|
|
return _httplib_request(
|
|
|
|
'http', host, port, url, httplib.HTTPConnection, body)
|
|
|
|
|
|
|
|
|
|
|
|
def unauthenticated_https_request(host, port, url, **kw):
|
|
|
|
"""
|
|
|
|
:param url: The path (not complete URL!) to post to.
|
|
|
|
:param kw: Keyword arguments to encode into POST body.
|
|
|
|
:return: (http_status, http_reason_phrase, http_headers, http_body)
|
|
|
|
as (integer, unicode, dict, str)
|
|
|
|
|
|
|
|
Perform an unauthenticated HTTPS request.
|
|
|
|
"""
|
|
|
|
body = urlencode(kw)
|
|
|
|
return _httplib_request(
|
|
|
|
'https', host, port, url, httplib.HTTPSConnection, body)
|
|
|
|
|
2010-02-02 21:52:11 -06:00
|
|
|
|
2012-09-25 08:57:03 -05:00
|
|
|
def _httplib_request(
|
|
|
|
protocol, host, port, path, connection_factory, request_body):
|
|
|
|
"""
|
|
|
|
:param request_body: Request body
|
|
|
|
:param connection_factory: Connection class to use. Will be called
|
|
|
|
with the host and port arguments.
|
|
|
|
|
|
|
|
Perform a HTTP(s) request.
|
|
|
|
"""
|
|
|
|
if isinstance(host, unicode):
|
|
|
|
host = host.encode('utf-8')
|
|
|
|
uri = '%s://%s%s' % (protocol, ipautil.format_netloc(host, port), path)
|
2013-02-01 09:39:16 -06:00
|
|
|
root_logger.debug('request %r', uri)
|
2012-09-25 08:57:03 -05:00
|
|
|
root_logger.debug('request body %r', request_body)
|
|
|
|
try:
|
|
|
|
conn = connection_factory(host, port)
|
|
|
|
conn.request('POST', uri,
|
|
|
|
body=request_body,
|
|
|
|
headers={'Content-type': 'application/x-www-form-urlencoded'},
|
|
|
|
)
|
2010-02-02 21:52:11 -06:00
|
|
|
res = conn.getresponse()
|
|
|
|
|
|
|
|
http_status = res.status
|
|
|
|
http_reason_phrase = unicode(res.reason, 'utf-8')
|
|
|
|
http_headers = res.msg.dict
|
|
|
|
http_body = res.read()
|
|
|
|
conn.close()
|
|
|
|
except Exception, e:
|
|
|
|
raise NetworkError(uri=uri, error=str(e))
|
|
|
|
|
2012-09-25 08:57:03 -05:00
|
|
|
root_logger.debug('request status %d', http_status)
|
|
|
|
root_logger.debug('request reason_phrase %r', http_reason_phrase)
|
|
|
|
root_logger.debug('request headers %s', http_headers)
|
|
|
|
root_logger.debug('request body %r', http_body)
|
2010-02-02 21:52:11 -06:00
|
|
|
|
2012-09-25 08:57:03 -05:00
|
|
|
return http_status, http_reason_phrase, http_headers, http_body
|