2007-06-28 18:09:54 -05:00
|
|
|
# Authors: Simo Sorce <ssorce@redhat.com>
|
|
|
|
#
|
|
|
|
# Copyright (C) 2007 Red Hat
|
|
|
|
# see file 'COPYING' for use and warranty information
|
|
|
|
#
|
2010-12-09 06:59:11 -06:00
|
|
|
# This program is free software; you can redistribute it and/or modify
|
|
|
|
# it under the terms of the GNU General Public License as published by
|
|
|
|
# the Free Software Foundation, either version 3 of the License, or
|
|
|
|
# (at your option) any later version.
|
2007-06-28 18:09:54 -05:00
|
|
|
#
|
|
|
|
# This program is distributed in the hope that it will be useful,
|
|
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
# GNU General Public License for more details.
|
|
|
|
#
|
|
|
|
# You should have received a copy of the GNU General Public License
|
2010-12-09 06:59:11 -06:00
|
|
|
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
2007-06-28 18:09:54 -05:00
|
|
|
#
|
|
|
|
|
|
|
|
import shutil
|
|
|
|
import logging
|
On 10/4/07, Rob Crittenden <rcritten@redhat.com> wrote:
> William Jon McCann wrote:
> > Hi,
> >
> > After playing with the install (repeatedly) I ended up with a lot of
> > duplicate values in:
> > /etc/sysconfig/dirsrv
> > /etc/sysconfig/ipa-kpasswd
> >
> > Here is a patch that should fix this. It modifies the file "in-place"
> > and removes lines that matching the key (or commented key) and then
> > appends the new key=value.
> >
> > Jon
>
> Cool, I've wanted to fix this for a while (and recently aborted a switch
> from open with "a" to "w").
>
> What happens if the file doesn't exist yet? Do we need to wrap the
> fileinput loop in either a try/except or just look to see if the file
> exists first (my vote)?
>
> Something like:
>
> def update_key_val_in_file(filename, key, val):
> if os.path.exists(filename):
> pattern = "^[\s#]*%s\s*=" % re.escape(key)
> p = re.compile(pattern)
> for line in fileinput.input(filename, inplace=1):
> if not p.search(line):
> sys.stdout.write(line)
> fileinput.close()
> f = open(filename, "a")
> f.write("%s=%s\n" % (key, val))
> f.close()
Good point. In genera,l I prefer doing a try because it is a little
less racy but in this case it doesn't make a difference.
Updated patch attached.
Thanks,
Jon
0000-12-31 18:09:24 -05:50
|
|
|
import fileinput
|
|
|
|
import re
|
|
|
|
import sys
|
2007-08-01 14:06:45 -05:00
|
|
|
import os
|
|
|
|
import pwd
|
|
|
|
import socket
|
0000-12-31 18:09:24 -05:50
|
|
|
|
|
|
|
import service
|
2007-12-18 12:03:34 -06:00
|
|
|
import installutils
|
2009-02-05 14:03:08 -06:00
|
|
|
from ipapython import sysrestore
|
|
|
|
from ipapython import ipautil
|
2009-02-04 09:53:34 -06:00
|
|
|
from ipalib import util
|
2009-04-23 07:51:59 -05:00
|
|
|
from ipalib import errors
|
0000-12-31 18:09:24 -05:50
|
|
|
|
2009-02-04 09:53:34 -06:00
|
|
|
from ipaserver import ipaldap
|
2011-01-11 09:27:48 -06:00
|
|
|
from ipaserver.install import replication
|
2011-01-28 14:45:19 -06:00
|
|
|
from ipaserver.install import dsinstance
|
2007-11-19 18:34:10 -06:00
|
|
|
|
|
|
|
import ldap
|
|
|
|
from ldap import LDAPError
|
|
|
|
from ldap import ldapobject
|
|
|
|
|
0000-12-31 18:09:24 -05:50
|
|
|
from pyasn1.type import univ, namedtype
|
2007-11-16 19:16:11 -06:00
|
|
|
import pyasn1.codec.ber.encoder
|
0000-12-31 18:09:24 -05:50
|
|
|
import pyasn1.codec.ber.decoder
|
2007-11-16 19:16:11 -06:00
|
|
|
import struct
|
2007-06-28 18:09:54 -05:00
|
|
|
|
2010-10-29 15:23:21 -05:00
|
|
|
import certs
|
2010-11-15 16:06:32 -06:00
|
|
|
from distutils import version
|
2010-10-29 15:23:21 -05:00
|
|
|
|
2009-10-02 08:27:08 -05:00
|
|
|
KRBMKEY_DENY_ACI = '(targetattr = "krbMKey")(version 3.0; acl "No external access"; deny (read,write,search,compare) userdn != "ldap:///uid=kdc,cn=sysaccounts,cn=etc,$SUFFIX";)'
|
2008-09-18 15:49:35 -05:00
|
|
|
|
On 10/4/07, Rob Crittenden <rcritten@redhat.com> wrote:
> William Jon McCann wrote:
> > Hi,
> >
> > After playing with the install (repeatedly) I ended up with a lot of
> > duplicate values in:
> > /etc/sysconfig/dirsrv
> > /etc/sysconfig/ipa-kpasswd
> >
> > Here is a patch that should fix this. It modifies the file "in-place"
> > and removes lines that matching the key (or commented key) and then
> > appends the new key=value.
> >
> > Jon
>
> Cool, I've wanted to fix this for a while (and recently aborted a switch
> from open with "a" to "w").
>
> What happens if the file doesn't exist yet? Do we need to wrap the
> fileinput loop in either a try/except or just look to see if the file
> exists first (my vote)?
>
> Something like:
>
> def update_key_val_in_file(filename, key, val):
> if os.path.exists(filename):
> pattern = "^[\s#]*%s\s*=" % re.escape(key)
> p = re.compile(pattern)
> for line in fileinput.input(filename, inplace=1):
> if not p.search(line):
> sys.stdout.write(line)
> fileinput.close()
> f = open(filename, "a")
> f.write("%s=%s\n" % (key, val))
> f.close()
Good point. In genera,l I prefer doing a try because it is a little
less racy but in this case it doesn't make a difference.
Updated patch attached.
Thanks,
Jon
0000-12-31 18:09:24 -05:50
|
|
|
def update_key_val_in_file(filename, key, val):
|
|
|
|
if os.path.exists(filename):
|
2007-12-13 03:31:28 -06:00
|
|
|
pattern = "^[\s#]*%s\s*=\s*%s\s*" % (re.escape(key), re.escape(val))
|
|
|
|
p = re.compile(pattern)
|
|
|
|
for line in fileinput.input(filename):
|
|
|
|
if p.search(line):
|
|
|
|
fileinput.close()
|
|
|
|
return
|
|
|
|
fileinput.close()
|
|
|
|
|
On 10/4/07, Rob Crittenden <rcritten@redhat.com> wrote:
> William Jon McCann wrote:
> > Hi,
> >
> > After playing with the install (repeatedly) I ended up with a lot of
> > duplicate values in:
> > /etc/sysconfig/dirsrv
> > /etc/sysconfig/ipa-kpasswd
> >
> > Here is a patch that should fix this. It modifies the file "in-place"
> > and removes lines that matching the key (or commented key) and then
> > appends the new key=value.
> >
> > Jon
>
> Cool, I've wanted to fix this for a while (and recently aborted a switch
> from open with "a" to "w").
>
> What happens if the file doesn't exist yet? Do we need to wrap the
> fileinput loop in either a try/except or just look to see if the file
> exists first (my vote)?
>
> Something like:
>
> def update_key_val_in_file(filename, key, val):
> if os.path.exists(filename):
> pattern = "^[\s#]*%s\s*=" % re.escape(key)
> p = re.compile(pattern)
> for line in fileinput.input(filename, inplace=1):
> if not p.search(line):
> sys.stdout.write(line)
> fileinput.close()
> f = open(filename, "a")
> f.write("%s=%s\n" % (key, val))
> f.close()
Good point. In genera,l I prefer doing a try because it is a little
less racy but in this case it doesn't make a difference.
Updated patch attached.
Thanks,
Jon
0000-12-31 18:09:24 -05:50
|
|
|
pattern = "^[\s#]*%s\s*=" % re.escape(key)
|
|
|
|
p = re.compile(pattern)
|
|
|
|
for line in fileinput.input(filename, inplace=1):
|
|
|
|
if not p.search(line):
|
|
|
|
sys.stdout.write(line)
|
|
|
|
fileinput.close()
|
|
|
|
f = open(filename, "a")
|
|
|
|
f.write("%s=%s\n" % (key, val))
|
|
|
|
f.close()
|
2008-01-22 05:58:06 -06:00
|
|
|
|
|
|
|
class KpasswdInstance(service.SimpleServiceInstance):
|
|
|
|
def __init__(self):
|
|
|
|
service.SimpleServiceInstance.__init__(self, "ipa_kpasswd")
|
2008-03-27 18:01:38 -05:00
|
|
|
|
0000-12-31 18:09:24 -05:50
|
|
|
class KrbInstance(service.Service):
|
2008-03-27 18:01:38 -05:00
|
|
|
def __init__(self, fstore=None):
|
0000-12-31 18:09:24 -05:50
|
|
|
service.Service.__init__(self, "krb5kdc")
|
2007-08-01 14:06:45 -05:00
|
|
|
self.fqdn = None
|
|
|
|
self.realm = None
|
2009-05-12 05:51:46 -05:00
|
|
|
self.domain = None
|
2007-08-01 14:06:45 -05:00
|
|
|
self.host = None
|
2007-06-28 18:09:54 -05:00
|
|
|
self.admin_password = None
|
|
|
|
self.master_password = None
|
|
|
|
self.suffix = None
|
|
|
|
self.kdc_password = None
|
|
|
|
self.sub_dict = None
|
2010-10-29 15:23:21 -05:00
|
|
|
self.pkcs12_info = None
|
|
|
|
self.self_signed_ca = None
|
2007-06-28 18:09:54 -05:00
|
|
|
|
2008-03-27 18:01:38 -05:00
|
|
|
if fstore:
|
|
|
|
self.fstore = fstore
|
|
|
|
else:
|
|
|
|
self.fstore = sysrestore.FileStore('/var/lib/ipa/sysrestore')
|
|
|
|
|
2011-06-09 11:42:03 -05:00
|
|
|
def get_realm_suffix(self):
|
|
|
|
return "cn=%s,cn=kerberos,%s" % (self.realm, self.suffix)
|
|
|
|
|
2009-12-07 22:17:00 -06:00
|
|
|
def move_service_to_host(self, principal):
|
|
|
|
"""
|
|
|
|
Used to move a host/ service principal created by kadmin.local from
|
|
|
|
cn=kerberos to reside under the host entry.
|
|
|
|
"""
|
|
|
|
|
2011-06-09 11:42:03 -05:00
|
|
|
service_dn = "krbprincipalname=%s,%s" % (principal, self.get_realm_suffix())
|
2011-01-05 06:46:30 -06:00
|
|
|
service_entry = self.admin_conn.getEntry(service_dn, ldap.SCOPE_BASE)
|
|
|
|
self.admin_conn.deleteEntry(service_dn)
|
2009-12-07 22:17:00 -06:00
|
|
|
|
|
|
|
# Create a host entry for this master
|
|
|
|
host_dn = "fqdn=%s,cn=computers,cn=accounts,%s" % (self.fqdn, self.suffix)
|
|
|
|
host_entry = ipaldap.Entry(host_dn)
|
2009-12-16 15:04:53 -06:00
|
|
|
host_entry.setValues('objectclass', ['top', 'ipaobject', 'nshost', 'ipahost', 'ipaservice', 'pkiuser', 'krbprincipalaux', 'krbprincipal', 'krbticketpolicyaux'])
|
2010-08-31 15:59:27 -05:00
|
|
|
host_entry.setValues('krbextradata', service_entry.getValues('krbextradata'))
|
2009-12-07 22:17:00 -06:00
|
|
|
host_entry.setValue('krblastpwdchange', service_entry.getValue('krblastpwdchange'))
|
2011-06-08 16:21:23 -05:00
|
|
|
if 'krbpasswordexpiration' in service_entry.toDict():
|
|
|
|
host_entry.setValue('krbpasswordexpiration', service_entry.getValue('krbpasswordexpiration'))
|
2009-12-07 22:17:00 -06:00
|
|
|
host_entry.setValue('krbprincipalname', service_entry.getValue('krbprincipalname'))
|
2010-08-31 15:59:27 -05:00
|
|
|
if 'krbticketflags' in service_entry.toDict():
|
|
|
|
host_entry.setValue('krbticketflags', service_entry.getValue('krbticketflags'))
|
2009-12-07 22:17:00 -06:00
|
|
|
host_entry.setValue('krbprincipalkey', service_entry.getValue('krbprincipalkey'))
|
|
|
|
host_entry.setValue('serverhostname', self.fqdn.split('.',1)[0])
|
|
|
|
host_entry.setValue('cn', self.fqdn)
|
|
|
|
host_entry.setValue('fqdn', self.fqdn)
|
2010-10-26 09:26:06 -05:00
|
|
|
host_entry.setValue('ipauniqueid', 'autogenerate')
|
2009-12-16 15:04:53 -06:00
|
|
|
host_entry.setValue('managedby', host_dn)
|
2011-01-05 06:46:30 -06:00
|
|
|
self.admin_conn.addEntry(host_entry)
|
2009-12-07 22:17:00 -06:00
|
|
|
|
2011-01-28 14:45:19 -06:00
|
|
|
def __common_setup(self, realm_name, host_name, domain_name, admin_password):
|
2008-03-27 18:01:38 -05:00
|
|
|
self.fqdn = host_name
|
2007-08-01 14:06:45 -05:00
|
|
|
self.realm = realm_name.upper()
|
|
|
|
self.host = host_name.split(".")[0]
|
2010-12-01 10:22:56 -06:00
|
|
|
self.ip = socket.getaddrinfo(host_name, None, socket.AF_UNSPEC, socket.SOCK_STREAM)[0][4][0]
|
2008-02-15 19:47:29 -06:00
|
|
|
self.domain = domain_name
|
2009-02-04 09:53:34 -06:00
|
|
|
self.suffix = util.realm_to_suffix(self.realm)
|
2007-12-12 12:15:56 -06:00
|
|
|
self.kdc_password = ipautil.ipa_generate_password()
|
0000-12-31 18:09:24 -05:50
|
|
|
self.admin_password = admin_password
|
2009-05-12 05:51:46 -05:00
|
|
|
self.dm_password = admin_password
|
0000-12-31 18:09:24 -05:50
|
|
|
|
|
|
|
self.__setup_sub_dict()
|
|
|
|
|
|
|
|
# get a connection to the DS
|
2011-01-05 06:46:30 -06:00
|
|
|
self.ldap_connect()
|
2007-09-20 14:10:21 -05:00
|
|
|
|
2008-01-14 11:43:26 -06:00
|
|
|
self.backup_state("running", self.is_running())
|
2007-10-03 16:37:13 -05:00
|
|
|
try:
|
|
|
|
self.stop()
|
|
|
|
except:
|
|
|
|
# It could have been not running
|
|
|
|
pass
|
2007-09-20 14:10:21 -05:00
|
|
|
|
0000-12-31 18:09:24 -05:50
|
|
|
def __common_post_setup(self):
|
2007-12-13 03:31:28 -06:00
|
|
|
self.step("starting the KDC", self.__start_instance)
|
2008-01-14 11:43:26 -06:00
|
|
|
self.step("configuring KDC to start on boot", self.__enable)
|
0000-12-31 18:09:24 -05:50
|
|
|
|
2011-01-28 14:45:19 -06:00
|
|
|
def create_instance(self, realm_name, host_name, domain_name, admin_password, master_password, setup_pkinit=False, pkcs12_info=None, self_signed_ca=False, subject_base=None):
|
0000-12-31 18:09:24 -05:50
|
|
|
self.master_password = master_password
|
2010-10-29 15:23:21 -05:00
|
|
|
self.pkcs12_info = pkcs12_info
|
|
|
|
self.self_signed_ca = self_signed_ca
|
|
|
|
self.subject_base = subject_base
|
0000-12-31 18:09:24 -05:50
|
|
|
|
2011-01-28 14:45:19 -06:00
|
|
|
self.__common_setup(realm_name, host_name, domain_name, admin_password)
|
0000-12-31 18:09:24 -05:50
|
|
|
|
2007-12-13 03:31:28 -06:00
|
|
|
self.step("setting KDC account password", self.__configure_kdc_account_password)
|
|
|
|
self.step("adding sasl mappings to the directory", self.__configure_sasl_mappings)
|
2011-06-08 16:21:23 -05:00
|
|
|
self.step("adding kerberos container to the directory", self.__add_krb_container)
|
|
|
|
self.step("configuring KDC", self.__configure_instance)
|
|
|
|
self.step("initialize kerberos container", self.__init_ipa_kdb)
|
2008-02-05 15:50:12 -06:00
|
|
|
self.step("adding default ACIs", self.__add_default_acis)
|
2007-12-13 03:31:28 -06:00
|
|
|
self.step("creating a keytab for the directory", self.__create_ds_keytab)
|
2007-12-13 15:44:57 -06:00
|
|
|
self.step("creating a keytab for the machine", self.__create_host_keytab)
|
2007-12-13 03:31:28 -06:00
|
|
|
self.step("exporting the kadmin keytab", self.__export_kadmin_changepw_keytab)
|
2008-04-14 16:12:40 -05:00
|
|
|
self.step("adding the password extension to the directory", self.__add_pwd_extop_module)
|
2010-10-29 15:23:21 -05:00
|
|
|
if setup_pkinit:
|
|
|
|
self.step("creating X509 Certificate for PKINIT", self.__setup_pkinit)
|
2010-11-02 17:02:59 -05:00
|
|
|
self.step("creating principal for anonymous PKINIT", self.__add_anonymous_pkinit_principal)
|
0000-12-31 18:09:24 -05:50
|
|
|
|
|
|
|
self.__common_post_setup()
|
|
|
|
|
2010-09-29 12:55:54 -05:00
|
|
|
self.start_creation("Configuring Kerberos KDC", 30)
|
0000-12-31 18:09:24 -05:50
|
|
|
|
2010-05-03 14:21:51 -05:00
|
|
|
self.kpasswd = KpasswdInstance()
|
2010-12-04 14:42:14 -06:00
|
|
|
self.kpasswd.create_instance('KPASSWD', self.fqdn, self.admin_password, self.suffix)
|
2008-01-22 05:58:06 -06:00
|
|
|
|
2011-01-28 14:45:19 -06:00
|
|
|
def create_replica(self, realm_name,
|
2011-01-11 09:27:48 -06:00
|
|
|
master_fqdn, host_name,
|
2010-11-03 17:17:36 -05:00
|
|
|
domain_name, admin_password,
|
|
|
|
ldap_passwd_filename, kpasswd_filename,
|
|
|
|
setup_pkinit=False, pkcs12_info=None,
|
|
|
|
self_signed_ca=False, subject_base=None):
|
|
|
|
self.pkcs12_info = pkcs12_info
|
|
|
|
self.self_signed_ca = self_signed_ca
|
|
|
|
self.subject_base = subject_base
|
2007-12-13 03:31:28 -06:00
|
|
|
self.__copy_ldap_passwd(ldap_passwd_filename)
|
2008-04-09 15:57:41 -05:00
|
|
|
self.__copy_kpasswd_keytab(kpasswd_filename)
|
2011-01-11 09:27:48 -06:00
|
|
|
self.master_fqdn = master_fqdn
|
2007-12-13 03:31:28 -06:00
|
|
|
|
2011-01-28 14:45:19 -06:00
|
|
|
self.__common_setup(realm_name, host_name, domain_name, admin_password)
|
0000-12-31 18:09:24 -05:50
|
|
|
|
2007-12-13 03:31:28 -06:00
|
|
|
self.step("adding sasl mappings to the directory", self.__configure_sasl_mappings)
|
|
|
|
self.step("writing stash file from DS", self.__write_stash_from_ds)
|
2011-06-08 16:21:23 -05:00
|
|
|
self.step("configuring KDC", self.__configure_instance)
|
2007-12-13 03:31:28 -06:00
|
|
|
self.step("creating a keytab for the directory", self.__create_ds_keytab)
|
2007-12-13 15:44:57 -06:00
|
|
|
self.step("creating a keytab for the machine", self.__create_host_keytab)
|
2008-04-14 16:12:40 -05:00
|
|
|
self.step("adding the password extension to the directory", self.__add_pwd_extop_module)
|
2010-11-03 17:17:36 -05:00
|
|
|
if setup_pkinit:
|
|
|
|
self.step("installing X509 Certificate for PKINIT", self.__setup_pkinit)
|
2011-02-02 09:24:30 -06:00
|
|
|
self.step("enable GSSAPI for replication", self.__convert_to_gssapi_replication)
|
0000-12-31 18:09:24 -05:50
|
|
|
|
|
|
|
self.__common_post_setup()
|
|
|
|
|
2010-09-29 12:55:54 -05:00
|
|
|
self.start_creation("Configuring Kerberos KDC", 30)
|
0000-12-31 18:09:24 -05:50
|
|
|
|
2010-05-03 14:21:51 -05:00
|
|
|
self.kpasswd = KpasswdInstance()
|
2010-12-04 14:42:14 -06:00
|
|
|
self.kpasswd.create_instance('KPASSWD', self.fqdn, self.admin_password, self.suffix)
|
2008-01-22 05:58:06 -06:00
|
|
|
|
0000-12-31 18:09:24 -05:50
|
|
|
def __copy_ldap_passwd(self, filename):
|
2008-03-27 18:01:38 -05:00
|
|
|
self.fstore.backup_file("/var/kerberos/krb5kdc/ldappwd")
|
0000-12-31 18:09:24 -05:50
|
|
|
shutil.copy(filename, "/var/kerberos/krb5kdc/ldappwd")
|
0000-12-31 18:09:24 -05:50
|
|
|
os.chmod("/var/kerberos/krb5kdc/ldappwd", 0600)
|
2008-03-27 18:01:38 -05:00
|
|
|
|
2008-04-09 15:57:41 -05:00
|
|
|
def __copy_kpasswd_keytab(self, filename):
|
|
|
|
self.fstore.backup_file("/var/kerberos/krb5kdc/kpasswd.keytab")
|
|
|
|
shutil.copy(filename, "/var/kerberos/krb5kdc/kpasswd.keytab")
|
|
|
|
os.chmod("/var/kerberos/krb5kdc/kpasswd.keytab", 0600)
|
|
|
|
|
2008-03-27 18:01:38 -05:00
|
|
|
|
2007-06-28 18:09:54 -05:00
|
|
|
def __configure_kdc_account_password(self):
|
|
|
|
hexpwd = ''
|
|
|
|
for x in self.kdc_password:
|
|
|
|
hexpwd += (hex(ord(x))[2:])
|
2008-03-27 18:01:38 -05:00
|
|
|
self.fstore.backup_file("/var/kerberos/krb5kdc/ldappwd")
|
0000-12-31 18:09:24 -05:50
|
|
|
pwd_fd = open("/var/kerberos/krb5kdc/ldappwd", "w")
|
2007-08-31 17:40:01 -05:00
|
|
|
pwd_fd.write("uid=kdc,cn=sysaccounts,cn=etc,"+self.suffix+"#{HEX}"+hexpwd+"\n")
|
2007-06-28 18:09:54 -05:00
|
|
|
pwd_fd.close()
|
0000-12-31 18:09:24 -05:50
|
|
|
os.chmod("/var/kerberos/krb5kdc/ldappwd", 0600)
|
2007-06-28 18:09:54 -05:00
|
|
|
|
2008-01-14 11:43:26 -06:00
|
|
|
def __enable(self):
|
|
|
|
self.backup_state("enabled", self.is_enabled())
|
2010-12-04 14:42:14 -06:00
|
|
|
# We do not let the system start IPA components on its own,
|
|
|
|
# Instead we reply on the IPA init script to start only enabled
|
|
|
|
# components as found in our LDAP configuration tree
|
|
|
|
self.ldap_enable('KDC', self.fqdn, self.admin_password, self.suffix)
|
2008-01-14 11:43:26 -06:00
|
|
|
|
2007-12-13 03:31:28 -06:00
|
|
|
def __start_instance(self):
|
|
|
|
try:
|
|
|
|
self.start()
|
|
|
|
except:
|
|
|
|
logging.critical("krb5kdc service failed to start")
|
|
|
|
|
2007-06-28 18:09:54 -05:00
|
|
|
def __setup_sub_dict(self):
|
2007-08-01 14:06:45 -05:00
|
|
|
self.sub_dict = dict(FQDN=self.fqdn,
|
|
|
|
IP=self.ip,
|
2007-06-28 18:09:54 -05:00
|
|
|
PASSWORD=self.kdc_password,
|
|
|
|
SUFFIX=self.suffix,
|
2007-08-01 14:06:45 -05:00
|
|
|
DOMAIN=self.domain,
|
|
|
|
HOST=self.host,
|
2011-01-28 14:45:19 -06:00
|
|
|
SERVER_ID=dsinstance.realm_to_serverid(self.realm),
|
2007-08-01 14:06:45 -05:00
|
|
|
REALM=self.realm)
|
2007-06-28 18:09:54 -05:00
|
|
|
|
0000-12-31 18:09:24 -05:50
|
|
|
def __configure_sasl_mappings(self):
|
2007-11-19 18:34:10 -06:00
|
|
|
# we need to remove any existing SASL mappings in the directory as otherwise they
|
2010-12-20 20:19:36 -06:00
|
|
|
# they may conflict.
|
0000-12-31 18:09:24 -05:50
|
|
|
|
2007-11-19 18:34:10 -06:00
|
|
|
try:
|
2011-01-05 06:46:30 -06:00
|
|
|
res = self.admin_conn.search_s("cn=mapping,cn=sasl,cn=config",
|
2010-12-20 20:19:36 -06:00
|
|
|
ldap.SCOPE_ONELEVEL,
|
|
|
|
"(objectclass=nsSaslMapping)")
|
|
|
|
for r in res:
|
|
|
|
try:
|
2011-01-05 06:46:30 -06:00
|
|
|
self.admin_conn.delete_s(r.dn)
|
2010-12-20 20:19:36 -06:00
|
|
|
except LDAPError, e:
|
|
|
|
logging.critical("Error during SASL mapping removal: %s" % str(e))
|
|
|
|
raise e
|
|
|
|
except LDAPError, e:
|
|
|
|
logging.critical("Error while enumerating SASL mappings %s" % str(e))
|
2008-06-05 13:41:15 -05:00
|
|
|
raise e
|
0000-12-31 18:09:24 -05:50
|
|
|
|
|
|
|
entry = ipaldap.Entry("cn=Full Principal,cn=mapping,cn=sasl,cn=config")
|
|
|
|
entry.setValues("objectclass", "top", "nsSaslMapping")
|
|
|
|
entry.setValues("cn", "Full Principal")
|
|
|
|
entry.setValues("nsSaslMapRegexString", '\(.*\)@\(.*\)')
|
|
|
|
entry.setValues("nsSaslMapBaseDNTemplate", self.suffix)
|
|
|
|
entry.setValues("nsSaslMapFilterTemplate", '(krbPrincipalName=\\1@\\2)')
|
|
|
|
|
|
|
|
try:
|
2011-01-05 06:46:30 -06:00
|
|
|
self.admin_conn.add_s(entry)
|
0000-12-31 18:09:24 -05:50
|
|
|
except ldap.ALREADY_EXISTS:
|
|
|
|
logging.critical("failed to add Full Principal Sasl mapping")
|
|
|
|
raise e
|
|
|
|
|
|
|
|
entry = ipaldap.Entry("cn=Name Only,cn=mapping,cn=sasl,cn=config")
|
|
|
|
entry.setValues("objectclass", "top", "nsSaslMapping")
|
|
|
|
entry.setValues("cn", "Name Only")
|
2009-09-29 11:41:20 -05:00
|
|
|
entry.setValues("nsSaslMapRegexString", '^[^:@]+$')
|
0000-12-31 18:09:24 -05:50
|
|
|
entry.setValues("nsSaslMapBaseDNTemplate", self.suffix)
|
2009-09-29 11:41:20 -05:00
|
|
|
entry.setValues("nsSaslMapFilterTemplate", '(krbPrincipalName=&@%s)' % self.realm)
|
0000-12-31 18:09:24 -05:50
|
|
|
|
|
|
|
try:
|
2011-01-05 06:46:30 -06:00
|
|
|
self.admin_conn.add_s(entry)
|
0000-12-31 18:09:24 -05:50
|
|
|
except ldap.ALREADY_EXISTS:
|
|
|
|
logging.critical("failed to add Name Only Sasl mapping")
|
|
|
|
raise e
|
|
|
|
|
2011-06-08 16:21:23 -05:00
|
|
|
def __add_krb_container(self):
|
2009-05-12 05:51:46 -05:00
|
|
|
self._ldap_mod("kerberos.ldif", self.sub_dict)
|
2007-06-28 18:09:54 -05:00
|
|
|
|
2007-12-13 03:31:28 -06:00
|
|
|
def __add_default_acis(self):
|
2009-05-12 05:51:46 -05:00
|
|
|
self._ldap_mod("default-aci.ldif", self.sub_dict)
|
2007-12-13 03:31:28 -06:00
|
|
|
|
2008-01-11 04:36:25 -06:00
|
|
|
def __template_file(self, path):
|
|
|
|
template = os.path.join(ipautil.SHARE_DIR, os.path.basename(path) + ".template")
|
|
|
|
conf = ipautil.template_file(template, self.sub_dict)
|
2008-03-27 18:01:38 -05:00
|
|
|
self.fstore.backup_file(path)
|
2008-01-11 04:36:25 -06:00
|
|
|
fd = open(path, "w+")
|
|
|
|
fd.write(conf)
|
|
|
|
fd.close()
|
|
|
|
|
2011-06-08 16:21:23 -05:00
|
|
|
def __init_ipa_kdb(self):
|
|
|
|
#populate the directory with the realm structure
|
|
|
|
args = ["kdb5_util", "create", "-s", "-P", self.master_password,
|
|
|
|
"-r", self.realm,
|
|
|
|
"-x", "ipa-setup-override-restrictions"]
|
|
|
|
try:
|
|
|
|
ipautil.run(args, nolog=(self.master_password))
|
|
|
|
except ipautil.CalledProcessError, e:
|
|
|
|
print "Failed to initialize the realm container"
|
|
|
|
|
|
|
|
def __configure_instance(self):
|
2008-01-11 04:36:25 -06:00
|
|
|
self.__template_file("/var/kerberos/krb5kdc/kdc.conf")
|
|
|
|
self.__template_file("/etc/krb5.conf")
|
|
|
|
self.__template_file("/usr/share/ipa/html/krb5.ini")
|
|
|
|
self.__template_file("/usr/share/ipa/html/krb.con")
|
|
|
|
self.__template_file("/usr/share/ipa/html/krbrealm.con")
|
2007-10-29 11:00:48 -05:00
|
|
|
|
2010-11-15 16:06:32 -06:00
|
|
|
MIN_KRB5KDC_WITH_WORKERS = "1.9"
|
|
|
|
cpus = os.sysconf('SC_NPROCESSORS_ONLN')
|
|
|
|
workers = False
|
2010-11-22 13:52:09 -06:00
|
|
|
(stdout, stderr, rc) = ipautil.run(['klist', '-V'], raiseonerr=False)
|
2010-11-15 16:06:32 -06:00
|
|
|
if rc == 0:
|
|
|
|
verstr = stdout.split()[-1]
|
|
|
|
ver = version.LooseVersion(verstr)
|
|
|
|
min = version.LooseVersion(MIN_KRB5KDC_WITH_WORKERS)
|
|
|
|
if ver >= min:
|
|
|
|
workers = True
|
|
|
|
if workers and cpus > 1:
|
|
|
|
#read in memory, find KRB5KDC_ARGS, check/change it, then overwrite file
|
|
|
|
self.fstore.backup_file("/etc/sysconfig/krb5kdc")
|
|
|
|
|
|
|
|
need_w = True
|
|
|
|
fd = open("/etc/sysconfig/krb5kdc", "r")
|
|
|
|
lines = fd.readlines()
|
|
|
|
fd.close()
|
|
|
|
for line in lines:
|
|
|
|
sline = line.strip()
|
|
|
|
if not sline.startswith('KRB5KDC_ARGS'):
|
|
|
|
continue
|
|
|
|
sline = sline.replace('"', '')
|
|
|
|
if sline.find("-w") != -1:
|
|
|
|
need_w = False
|
|
|
|
|
|
|
|
if need_w:
|
|
|
|
fd = open("/etc/sysconfig/krb5kdc", "w")
|
|
|
|
for line in lines:
|
|
|
|
fd.write(line)
|
|
|
|
fd.write('KRB5KDC_ARGS="${KRB5KDC_ARGS} -w %s"\n' % str(cpus))
|
|
|
|
fd.close()
|
|
|
|
|
0000-12-31 18:09:24 -05:50
|
|
|
def __write_stash_from_ds(self):
|
2007-10-03 16:37:13 -05:00
|
|
|
try:
|
2011-06-09 11:42:03 -05:00
|
|
|
entry = self.admin_conn.getEntry(self.get_realm_suffix(),
|
|
|
|
ldap.SCOPE_SUBTREE)
|
2009-08-11 16:08:09 -05:00
|
|
|
except errors.NotFound, e:
|
0000-12-31 18:09:24 -05:50
|
|
|
logging.critical("Could not find master key in DS")
|
|
|
|
raise e
|
|
|
|
|
|
|
|
krbMKey = pyasn1.codec.ber.decoder.decode(entry.krbmkey)
|
|
|
|
keytype = int(krbMKey[0][1][0])
|
|
|
|
keydata = str(krbMKey[0][1][1])
|
|
|
|
|
|
|
|
format = '=hi%ss' % len(keydata)
|
|
|
|
s = struct.pack(format, keytype, len(keydata), keydata)
|
|
|
|
try:
|
|
|
|
fd = open("/var/kerberos/krb5kdc/.k5."+self.realm, "w")
|
|
|
|
fd.write(s)
|
2008-08-19 15:39:33 -05:00
|
|
|
fd.close()
|
0000-12-31 18:09:24 -05:50
|
|
|
except os.error, e:
|
|
|
|
logging.critical("failed to write stash file")
|
|
|
|
raise e
|
2007-07-02 14:51:04 -05:00
|
|
|
|
2007-08-15 20:35:35 -05:00
|
|
|
#add the password extop module
|
2007-07-02 14:51:04 -05:00
|
|
|
def __add_pwd_extop_module(self):
|
2009-05-12 05:51:46 -05:00
|
|
|
self._ldap_mod("pwd-extop-conf.ldif", self.sub_dict)
|
2007-08-01 14:58:52 -05:00
|
|
|
|
2007-08-01 14:06:45 -05:00
|
|
|
def __create_ds_keytab(self):
|
2007-12-18 12:03:34 -06:00
|
|
|
ldap_principal = "ldap/" + self.fqdn + "@" + self.realm
|
|
|
|
installutils.kadmin_addprinc(ldap_principal)
|
2009-12-07 22:17:00 -06:00
|
|
|
self.move_service(ldap_principal)
|
2008-01-14 11:43:26 -06:00
|
|
|
|
2008-03-27 18:01:38 -05:00
|
|
|
self.fstore.backup_file("/etc/dirsrv/ds.keytab")
|
2007-12-18 12:03:34 -06:00
|
|
|
installutils.create_keytab("/etc/dirsrv/ds.keytab", ldap_principal)
|
2007-08-31 17:40:01 -05:00
|
|
|
|
On 10/4/07, Rob Crittenden <rcritten@redhat.com> wrote:
> William Jon McCann wrote:
> > Hi,
> >
> > After playing with the install (repeatedly) I ended up with a lot of
> > duplicate values in:
> > /etc/sysconfig/dirsrv
> > /etc/sysconfig/ipa-kpasswd
> >
> > Here is a patch that should fix this. It modifies the file "in-place"
> > and removes lines that matching the key (or commented key) and then
> > appends the new key=value.
> >
> > Jon
>
> Cool, I've wanted to fix this for a while (and recently aborted a switch
> from open with "a" to "w").
>
> What happens if the file doesn't exist yet? Do we need to wrap the
> fileinput loop in either a try/except or just look to see if the file
> exists first (my vote)?
>
> Something like:
>
> def update_key_val_in_file(filename, key, val):
> if os.path.exists(filename):
> pattern = "^[\s#]*%s\s*=" % re.escape(key)
> p = re.compile(pattern)
> for line in fileinput.input(filename, inplace=1):
> if not p.search(line):
> sys.stdout.write(line)
> fileinput.close()
> f = open(filename, "a")
> f.write("%s=%s\n" % (key, val))
> f.close()
Good point. In genera,l I prefer doing a try because it is a little
less racy but in this case it doesn't make a difference.
Updated patch attached.
Thanks,
Jon
0000-12-31 18:09:24 -05:50
|
|
|
update_key_val_in_file("/etc/sysconfig/dirsrv", "export KRB5_KTNAME", "/etc/dirsrv/ds.keytab")
|
2011-01-28 14:45:19 -06:00
|
|
|
pent = pwd.getpwnam(dsinstance.DS_USER)
|
2007-08-30 14:31:27 -05:00
|
|
|
os.chown("/etc/dirsrv/ds.keytab", pent.pw_uid, pent.pw_gid)
|
2007-08-08 21:19:03 -05:00
|
|
|
|
2007-12-13 15:44:57 -06:00
|
|
|
def __create_host_keytab(self):
|
2007-12-18 12:03:34 -06:00
|
|
|
host_principal = "host/" + self.fqdn + "@" + self.realm
|
|
|
|
installutils.kadmin_addprinc(host_principal)
|
2008-01-14 11:43:26 -06:00
|
|
|
|
2008-03-27 18:01:38 -05:00
|
|
|
self.fstore.backup_file("/etc/krb5.keytab")
|
2007-12-18 12:03:34 -06:00
|
|
|
installutils.create_keytab("/etc/krb5.keytab", host_principal)
|
2007-12-13 15:44:57 -06:00
|
|
|
|
|
|
|
# Make sure access is strictly reserved to root only for now
|
|
|
|
os.chown("/etc/krb5.keytab", 0, 0)
|
|
|
|
os.chmod("/etc/krb5.keytab", 0600)
|
|
|
|
|
2009-12-07 22:17:00 -06:00
|
|
|
self.move_service_to_host(host_principal)
|
|
|
|
|
2007-08-15 17:30:15 -05:00
|
|
|
def __export_kadmin_changepw_keytab(self):
|
2007-12-18 12:03:34 -06:00
|
|
|
installutils.kadmin_modprinc("kadmin/changepw", "+requires_preauth")
|
2008-01-14 11:43:26 -06:00
|
|
|
|
2008-03-27 18:01:38 -05:00
|
|
|
self.fstore.backup_file("/var/kerberos/krb5kdc/kpasswd.keytab")
|
2007-12-18 12:03:34 -06:00
|
|
|
installutils.create_keytab("/var/kerberos/krb5kdc/kpasswd.keytab", "kadmin/changepw")
|
2007-08-31 17:40:01 -05:00
|
|
|
|
2010-10-29 15:23:21 -05:00
|
|
|
def __setup_pkinit(self):
|
|
|
|
if self.self_signed_ca:
|
2010-12-08 15:35:12 -06:00
|
|
|
ca_db = certs.CertDB(self.realm,
|
2010-10-29 15:23:21 -05:00
|
|
|
subject_base=self.subject_base)
|
|
|
|
else:
|
2010-12-08 15:35:12 -06:00
|
|
|
ca_db = certs.CertDB(self.realm, host_name=self.fqdn,
|
2010-10-29 15:23:21 -05:00
|
|
|
subject_base=self.subject_base)
|
|
|
|
|
2010-11-03 17:17:36 -05:00
|
|
|
if self.pkcs12_info:
|
|
|
|
ca_db.install_pem_from_p12(self.pkcs12_info[0],
|
|
|
|
self.pkcs12_info[1],
|
|
|
|
"/var/kerberos/krb5kdc/kdc.pem")
|
2010-10-29 15:23:21 -05:00
|
|
|
else:
|
|
|
|
if self.self_signed_ca:
|
|
|
|
ca_db.create_kdc_cert("KDC-Cert", self.fqdn,
|
|
|
|
"/var/kerberos/krb5kdc")
|
|
|
|
else:
|
2010-11-03 17:17:36 -05:00
|
|
|
raise RuntimeError("PKI not supported yet\n")
|
2010-10-29 15:23:21 -05:00
|
|
|
|
|
|
|
# Finally copy the cacert in the krb directory so we don't
|
|
|
|
# have any selinux issues with the file context
|
2010-12-08 15:35:12 -06:00
|
|
|
shutil.copyfile("/etc/ipa/ca.crt", "/var/kerberos/krb5kdc/cacert.pem")
|
2010-10-29 15:23:21 -05:00
|
|
|
|
2010-11-02 17:02:59 -05:00
|
|
|
def __add_anonymous_pkinit_principal(self):
|
|
|
|
princ = "WELLKNOWN/ANONYMOUS"
|
|
|
|
princ_realm = "%s@%s" % (princ, self.realm)
|
|
|
|
|
|
|
|
# Create the special anonymous principal
|
|
|
|
installutils.kadmin_addprinc(princ_realm)
|
2011-06-09 11:42:03 -05:00
|
|
|
dn = "krbprincipalname=%s,%s" % (princ_realm, self.get_realm_suffix())
|
2011-01-05 06:46:30 -06:00
|
|
|
self.admin_conn.inactivateEntry(dn, False)
|
2010-11-02 17:02:59 -05:00
|
|
|
|
2011-01-11 09:27:48 -06:00
|
|
|
def __convert_to_gssapi_replication(self):
|
|
|
|
repl = replication.ReplicationManager(self.realm,
|
|
|
|
self.fqdn,
|
|
|
|
self.dm_password)
|
|
|
|
repl.convert_to_gssapi_replication(self.master_fqdn,
|
|
|
|
r_binddn="cn=Directory Manager",
|
|
|
|
r_bindpw=self.dm_password)
|
|
|
|
|
2008-01-11 05:57:36 -06:00
|
|
|
def uninstall(self):
|
2010-05-03 14:21:51 -05:00
|
|
|
if self.is_configured():
|
|
|
|
self.print_msg("Unconfiguring %s" % self.service_name)
|
2008-01-22 05:58:06 -06:00
|
|
|
|
2008-01-11 05:57:36 -06:00
|
|
|
running = self.restore_state("running")
|
|
|
|
enabled = self.restore_state("enabled")
|
2007-08-06 09:51:23 -05:00
|
|
|
|
2008-05-13 15:29:01 -05:00
|
|
|
try:
|
2008-01-11 05:57:36 -06:00
|
|
|
self.stop()
|
2008-05-13 15:29:01 -05:00
|
|
|
except:
|
|
|
|
pass
|
2008-01-11 05:57:36 -06:00
|
|
|
|
2008-03-27 18:01:38 -05:00
|
|
|
for f in ["/var/kerberos/krb5kdc/ldappwd", "/var/kerberos/krb5kdc/kdc.conf", "/etc/krb5.conf"]:
|
|
|
|
try:
|
|
|
|
self.fstore.restore_file(f)
|
|
|
|
except ValueError, error:
|
|
|
|
logging.debug(error)
|
|
|
|
pass
|
|
|
|
|
2008-01-11 05:57:36 -06:00
|
|
|
if not enabled is None and not enabled:
|
|
|
|
self.chkconfig_off()
|
|
|
|
|
|
|
|
if not running is None and running:
|
|
|
|
self.start()
|
2010-05-03 14:21:51 -05:00
|
|
|
|
|
|
|
self.kpasswd = KpasswdInstance()
|
|
|
|
self.kpasswd.uninstall()
|