0000-12-31 18:09:24 -05:50
|
|
|
#! /usr/bin/python -E
|
|
|
|
# Authors: Karl MacMillan <kmacmillan@mentalrootkit.com>
|
|
|
|
#
|
|
|
|
# Copyright (C) 2007 Red Hat
|
|
|
|
# see file 'COPYING' for use and warranty information
|
|
|
|
#
|
|
|
|
# This program is free software; you can redistribute it and/or
|
|
|
|
# modify it under the terms of the GNU General Public License as
|
2008-02-04 14:15:52 -06:00
|
|
|
# published by the Free Software Foundation; version 2 only
|
0000-12-31 18:09:24 -05:50
|
|
|
#
|
|
|
|
# This program is distributed in the hope that it will be useful,
|
|
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
# GNU General Public License for more details.
|
|
|
|
#
|
|
|
|
# You should have received a copy of the GNU General Public License
|
|
|
|
# along with this program; if not, write to the Free Software
|
|
|
|
# Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
|
|
|
|
#
|
|
|
|
|
|
|
|
import sys
|
2009-06-26 12:37:49 -05:00
|
|
|
import socket
|
0000-12-31 18:09:24 -05:50
|
|
|
|
2008-02-05 11:23:53 -06:00
|
|
|
import tempfile, os, pwd, traceback, logging, shutil
|
0000-12-31 18:09:24 -05:50
|
|
|
from ConfigParser import SafeConfigParser
|
2008-02-19 09:20:13 -06:00
|
|
|
import ldap
|
0000-12-31 18:09:24 -05:50
|
|
|
|
2009-02-05 14:03:08 -06:00
|
|
|
from ipapython import ipautil
|
0000-12-31 18:09:24 -05:50
|
|
|
|
2009-02-04 09:53:34 -06:00
|
|
|
from ipaserver.install import dsinstance, replication, installutils, krbinstance, service
|
2009-06-26 12:37:49 -05:00
|
|
|
from ipaserver.install import bindinstance, httpinstance, ntpinstance, certs
|
2009-02-04 09:53:34 -06:00
|
|
|
from ipaserver import ipaldap
|
2009-02-05 14:03:08 -06:00
|
|
|
from ipapython import version
|
2009-09-02 09:22:50 -05:00
|
|
|
from ipalib import api, util
|
0000-12-31 18:09:24 -05:50
|
|
|
|
2008-08-11 15:15:30 -05:00
|
|
|
CACERT="/usr/share/ipa/html/ca.crt"
|
|
|
|
|
2009-06-26 12:37:49 -05:00
|
|
|
class HostnameLocalhost(Exception):
|
|
|
|
pass
|
|
|
|
|
0000-12-31 18:09:24 -05:50
|
|
|
class ReplicaConfig:
|
|
|
|
def __init__(self):
|
|
|
|
self.realm_name = ""
|
2008-05-23 13:51:50 -05:00
|
|
|
self.domain_name = ""
|
0000-12-31 18:09:24 -05:50
|
|
|
self.master_host_name = ""
|
|
|
|
self.dirman_password = ""
|
|
|
|
self.ds_user = ""
|
|
|
|
self.host_name = ""
|
|
|
|
self.repl_password = ""
|
|
|
|
self.dir = ""
|
|
|
|
|
|
|
|
def parse_options():
|
|
|
|
from optparse import OptionParser
|
2008-05-08 10:45:38 -05:00
|
|
|
parser = OptionParser(version=version.VERSION)
|
2008-02-20 10:03:46 -06:00
|
|
|
parser.add_option("-N", "--no-ntp", dest="conf_ntp", action="store_false",
|
|
|
|
help="do not configure ntp", default=True)
|
0000-12-31 18:09:24 -05:50
|
|
|
parser.add_option("-d", "--debug", dest="debug", action="store_true",
|
|
|
|
default=False, help="gather extra debugging information")
|
2008-06-04 14:37:12 -05:00
|
|
|
parser.add_option("-p", "--password", dest="password",
|
|
|
|
help="Directory Manager (existing master) password")
|
2009-06-26 12:37:49 -05:00
|
|
|
parser.add_option("--setup-dns", dest="setup_dns", action="store_true",
|
|
|
|
default=False, help="configure bind with our zone")
|
0000-12-31 18:09:24 -05:50
|
|
|
|
|
|
|
options, args = parser.parse_args()
|
|
|
|
|
|
|
|
if len(args) != 1:
|
|
|
|
parser.error("you must provide a file generated by ipa-replica-prepare")
|
|
|
|
|
|
|
|
return options, args[0]
|
|
|
|
|
2008-05-08 14:17:59 -05:00
|
|
|
def get_dirman_password():
|
2008-04-29 13:12:00 -05:00
|
|
|
return installutils.read_password("Directory Manager (existing master)", confirm=False, validate=False)
|
0000-12-31 18:09:24 -05:50
|
|
|
|
2008-08-08 07:53:55 -05:00
|
|
|
def expand_info(filename, password):
|
0000-12-31 18:09:24 -05:50
|
|
|
top_dir = tempfile.mkdtemp("ipa")
|
2008-08-08 07:53:55 -05:00
|
|
|
tarfile = top_dir+"/files.tar"
|
0000-12-31 18:09:24 -05:50
|
|
|
dir = top_dir + "/realm_info"
|
2008-08-08 07:53:55 -05:00
|
|
|
ipautil.decrypt_file(filename, tarfile, password, top_dir)
|
|
|
|
ipautil.run(["tar", "xf", tarfile, "-C", top_dir])
|
|
|
|
os.remove(tarfile)
|
0000-12-31 18:09:24 -05:50
|
|
|
|
|
|
|
return top_dir, dir
|
|
|
|
|
|
|
|
def read_info(dir, rconfig):
|
|
|
|
filename = dir + "/realm_info"
|
|
|
|
fd = open(filename)
|
|
|
|
config = SafeConfigParser()
|
|
|
|
config.readfp(fd)
|
|
|
|
|
|
|
|
rconfig.realm_name = config.get("realm", "realm_name")
|
|
|
|
rconfig.master_host_name = config.get("realm", "master_host_name")
|
|
|
|
rconfig.ds_user = config.get("realm", "ds_user")
|
2008-02-15 19:47:29 -06:00
|
|
|
rconfig.domain_name = config.get("realm", "domain_name")
|
2008-08-08 07:53:55 -05:00
|
|
|
rconfig.host_name = config.get("realm", "destination_host")
|
0000-12-31 18:09:24 -05:50
|
|
|
|
|
|
|
def get_host_name():
|
|
|
|
hostname = installutils.get_fqdn()
|
|
|
|
try:
|
|
|
|
installutils.verify_fqdn(hostname)
|
|
|
|
except RuntimeError, e:
|
|
|
|
logging.error(str(e))
|
|
|
|
sys.exit(1)
|
|
|
|
|
|
|
|
return hostname
|
|
|
|
|
2009-06-26 12:37:49 -05:00
|
|
|
def resolve_host(host_name):
|
|
|
|
ip = socket.gethostbyname(host_name)
|
|
|
|
|
|
|
|
if ip == "127.0.0.1" or ip == "::1":
|
|
|
|
raise HostnameLocalhost
|
|
|
|
|
|
|
|
return ip
|
|
|
|
|
0000-12-31 18:09:24 -05:50
|
|
|
def set_owner(config, dir):
|
|
|
|
pw = pwd.getpwnam(config.ds_user)
|
|
|
|
os.chown(dir, pw.pw_uid, pw.pw_gid)
|
|
|
|
|
2009-07-10 15:18:16 -05:00
|
|
|
def install_ca(config):
|
|
|
|
cafile = config.dir + "/ca.p12"
|
|
|
|
if not ipautil.file_exists(cafile):
|
|
|
|
return None
|
|
|
|
|
|
|
|
try:
|
|
|
|
from ipaserver.install import cainstance
|
|
|
|
except ImportError:
|
|
|
|
print >> sys.stderr, "Import failed: %s" % sys.exc_value
|
|
|
|
sys.exit(1)
|
|
|
|
|
|
|
|
cs = cainstance.CADSInstance()
|
|
|
|
cs.create_instance(config.ds_user, config.realm_name, config.host_name, config.domain_name, config.dirman_password)
|
|
|
|
|
|
|
|
ca = cainstance.CAInstance()
|
|
|
|
ca.configure_instance("pkiuser", config.host_name, config.dirman_password, config.dirman_password, pkcs12_info=(cafile,), master_host=config.master_host_name)
|
|
|
|
|
|
|
|
return ca
|
|
|
|
|
0000-12-31 18:09:24 -05:50
|
|
|
def install_ds(config):
|
|
|
|
dsinstance.check_existing_installation()
|
|
|
|
dsinstance.check_ports()
|
|
|
|
|
0000-12-31 18:09:24 -05:50
|
|
|
# if we have a pkcs12 file, create the cert db from
|
|
|
|
# that. Otherwise the ds setup will create the CA
|
|
|
|
# cert
|
|
|
|
pkcs12_info = None
|
2008-02-05 11:23:53 -06:00
|
|
|
if ipautil.file_exists(config.dir + "/dscert.p12"):
|
|
|
|
pkcs12_info = (config.dir + "/dscert.p12",
|
2008-07-11 10:34:29 -05:00
|
|
|
config.dir + "/dirsrv_pin.txt")
|
0000-12-31 18:09:24 -05:50
|
|
|
|
0000-12-31 18:09:24 -05:50
|
|
|
ds = dsinstance.DsInstance()
|
2008-02-15 19:47:29 -06:00
|
|
|
ds.create_instance(config.ds_user, config.realm_name, config.host_name, config.domain_name, config.dirman_password, pkcs12_info)
|
0000-12-31 18:09:24 -05:50
|
|
|
|
2008-03-27 08:33:01 -05:00
|
|
|
return ds
|
|
|
|
|
0000-12-31 18:09:24 -05:50
|
|
|
def install_krb(config):
|
|
|
|
krb = krbinstance.KrbInstance()
|
|
|
|
ldappwd_filename = config.dir + "/ldappwd"
|
2008-04-09 15:57:41 -05:00
|
|
|
kpasswd_filename = config.dir + "/kpasswd.keytab"
|
0000-12-31 18:09:24 -05:50
|
|
|
krb.create_replica(config.ds_user, config.realm_name, config.host_name,
|
2008-04-09 15:57:41 -05:00
|
|
|
config.domain_name, config.dirman_password,
|
|
|
|
ldappwd_filename, kpasswd_filename)
|
0000-12-31 18:09:24 -05:50
|
|
|
|
2008-08-11 15:15:30 -05:00
|
|
|
def install_ca_cert(config):
|
|
|
|
if ipautil.file_exists(config.dir + "/ca.crt"):
|
|
|
|
try:
|
|
|
|
shutil.copy(config.dir + "/ca.crt", CACERT)
|
|
|
|
os.chmod(CACERT, 0444)
|
|
|
|
except Exception, e:
|
|
|
|
print "error copying files: " + str(e)
|
|
|
|
sys.exit(1)
|
|
|
|
|
0000-12-31 18:09:24 -05:50
|
|
|
def install_http(config):
|
2008-02-05 11:23:53 -06:00
|
|
|
# if we have a pkcs12 file, create the cert db from
|
|
|
|
# that. Otherwise the ds setup will create the CA
|
|
|
|
# cert
|
|
|
|
pkcs12_info = None
|
|
|
|
if ipautil.file_exists(config.dir + "/httpcert.p12"):
|
|
|
|
pkcs12_info = (config.dir + "/httpcert.p12",
|
2008-07-11 10:34:29 -05:00
|
|
|
config.dir + "/http_pin.txt")
|
2008-02-05 11:23:53 -06:00
|
|
|
|
0000-12-31 18:09:24 -05:50
|
|
|
http = httpinstance.HTTPInstance()
|
2009-04-28 16:05:39 -05:00
|
|
|
http.create_instance(config.realm_name, config.host_name, config.domain_name, False, pkcs12_info, self_signed_ca=True)
|
2008-02-05 11:23:53 -06:00
|
|
|
|
|
|
|
# Now copy the autoconfiguration files
|
2008-07-25 15:56:42 -05:00
|
|
|
if ipautil.file_exists(config.dir + "/preferences.html"):
|
|
|
|
try:
|
|
|
|
shutil.copy(config.dir + "/preferences.html", "/usr/share/ipa/html/preferences.html")
|
|
|
|
shutil.copy(config.dir + "/configure.jar", "/usr/share/ipa/html/configure.jar")
|
|
|
|
except Exception, e:
|
|
|
|
print "error copying files: " + str(e)
|
|
|
|
sys.exit(1)
|
0000-12-31 18:09:24 -05:50
|
|
|
|
2009-06-26 12:37:49 -05:00
|
|
|
def install_bind(config):
|
|
|
|
bind = bindinstance.BindInstance(dm_password=config.dirman_password)
|
|
|
|
ip_address = resolve_host(config.host_name)
|
|
|
|
bind.setup(config.host_name, ip_address, config.realm_name, config.domain_name)
|
|
|
|
bind.create_instance()
|
|
|
|
|
2008-04-14 18:04:43 -05:00
|
|
|
def check_dirsrv():
|
|
|
|
serverids = dsinstance.check_existing_installation()
|
|
|
|
if serverids:
|
|
|
|
print ""
|
|
|
|
print "An existing Directory Server has been detected."
|
2008-08-06 12:17:13 -05:00
|
|
|
if not ipautil.user_input("Do you wish to remove it and create a new one?", False):
|
2008-04-14 18:04:43 -05:00
|
|
|
print ""
|
|
|
|
print "Only a single Directory Server instance is allowed on an IPA"
|
|
|
|
print "server, the one used by IPA itself."
|
|
|
|
sys.exit(1)
|
|
|
|
|
|
|
|
try:
|
|
|
|
service.stop("dirsrv")
|
|
|
|
except:
|
|
|
|
pass
|
|
|
|
|
|
|
|
for serverid in serverids:
|
|
|
|
dsinstance.erase_ds_instance_data(serverid)
|
|
|
|
|
|
|
|
(ds_unsecure, ds_secure) = dsinstance.check_ports()
|
|
|
|
if not ds_unsecure or not ds_secure:
|
|
|
|
print "IPA requires ports 389 and 636 for the Directory Server."
|
|
|
|
print "These are currently in use:"
|
|
|
|
if not ds_unsecure:
|
|
|
|
print "\t389"
|
|
|
|
if not ds_secure:
|
|
|
|
print "\t636"
|
|
|
|
sys.exit(1)
|
|
|
|
|
2009-06-26 12:37:49 -05:00
|
|
|
def check_bind():
|
|
|
|
if not bindinstance.check_inst():
|
|
|
|
print "--setup-dns was specified but bind or the BIND LDAP plug-in"
|
|
|
|
print "is not installed on the system"
|
|
|
|
print "Please install bind and the LDAP plug-in and restart the setup program"
|
|
|
|
sys.exit(1)
|
|
|
|
|
0000-12-31 18:09:24 -05:50
|
|
|
def main():
|
|
|
|
options, filename = parse_options()
|
2008-03-27 08:33:01 -05:00
|
|
|
installutils.standard_logging_setup("/var/log/ipareplica-install.log", options.debug)
|
0000-12-31 18:09:24 -05:50
|
|
|
|
2008-07-11 10:34:29 -05:00
|
|
|
if not ipautil.file_exists(filename):
|
|
|
|
sys.exit("Replica file %s does not exist" % filename)
|
|
|
|
|
2009-06-26 12:37:49 -05:00
|
|
|
if options.setup_dns:
|
|
|
|
check_bind()
|
2008-04-14 18:04:43 -05:00
|
|
|
check_dirsrv()
|
|
|
|
|
2008-08-08 07:53:55 -05:00
|
|
|
# get the directory manager password
|
|
|
|
dirman_password = options.password
|
|
|
|
if not dirman_password:
|
|
|
|
try:
|
|
|
|
dirman_password = get_dirman_password()
|
|
|
|
except KeyboardInterrupt:
|
|
|
|
sys.exit(0)
|
|
|
|
|
|
|
|
try:
|
|
|
|
top_dir, dir = expand_info(filename, dirman_password)
|
|
|
|
except Exception, e:
|
|
|
|
print "ERROR: Failed to decrypt or open the replica file."
|
|
|
|
print "Verify you entered the correct Directory Manager password."
|
|
|
|
sys.exit(1)
|
2008-02-20 09:16:19 -06:00
|
|
|
|
0000-12-31 18:09:24 -05:50
|
|
|
config = ReplicaConfig()
|
|
|
|
read_info(dir, config)
|
2008-08-08 07:53:55 -05:00
|
|
|
config.dirman_password = dirman_password
|
|
|
|
host = get_host_name()
|
|
|
|
if config.host_name != host:
|
2008-02-19 09:46:22 -06:00
|
|
|
try:
|
2008-08-08 07:53:55 -05:00
|
|
|
print "This replica was created for '%s' but this machine is named '%s'" % (config.host_name, host)
|
2008-08-06 12:17:13 -05:00
|
|
|
if not ipautil.user_input("This may cause problems. Continue?", True):
|
2008-02-19 09:46:22 -06:00
|
|
|
sys.exit(0)
|
2008-08-08 07:53:55 -05:00
|
|
|
config.host_name = host
|
2008-07-21 05:25:37 -05:00
|
|
|
print ""
|
2008-02-19 09:46:22 -06:00
|
|
|
except KeyboardInterrupt:
|
|
|
|
sys.exit(0)
|
0000-12-31 18:09:24 -05:50
|
|
|
config.repl_password = ipautil.ipa_generate_password()
|
0000-12-31 18:09:24 -05:50
|
|
|
config.dir = dir
|
|
|
|
|
2008-02-19 09:20:13 -06:00
|
|
|
# Try out the password
|
|
|
|
try:
|
|
|
|
conn = ipaldap.IPAdmin(config.master_host_name)
|
|
|
|
conn.do_simple_bind(bindpw=config.dirman_password)
|
|
|
|
conn.unbind()
|
|
|
|
except ldap.CONNECT_ERROR, e:
|
|
|
|
sys.exit("\nUnable to connect to LDAP server %s" % config.master_host_name)
|
|
|
|
except ldap.SERVER_DOWN, e:
|
|
|
|
sys.exit("\nUnable to connect to LDAP server %s" % config.master_host_name)
|
|
|
|
except ldap.INVALID_CREDENTIALS, e :
|
|
|
|
sys.exit("\nThe password provided is incorrect for LDAP server %s" % config.master_host_name)
|
0000-12-31 18:09:24 -05:50
|
|
|
|
2009-07-10 15:18:16 -05:00
|
|
|
# Install CA cert so that we can do SSL connections with ldap
|
|
|
|
install_ca_cert(config)
|
|
|
|
|
2008-02-20 10:03:46 -06:00
|
|
|
# Configure ntpd
|
|
|
|
if options.conf_ntp:
|
|
|
|
ntp = ntpinstance.NTPInstance()
|
|
|
|
ntp.create_instance()
|
|
|
|
|
2009-07-10 15:18:16 -05:00
|
|
|
# Configure the CA if necessary
|
|
|
|
CA = install_ca(config)
|
|
|
|
|
2008-02-20 10:03:46 -06:00
|
|
|
# Configure dirsrv
|
2008-03-27 08:33:01 -05:00
|
|
|
ds = install_ds(config)
|
2008-02-20 09:16:19 -06:00
|
|
|
|
2008-08-11 15:15:30 -05:00
|
|
|
try:
|
|
|
|
repl = replication.ReplicationManager(config.host_name, config.dirman_password)
|
|
|
|
ret = repl.setup_replication(config.master_host_name, config.realm_name)
|
2008-10-29 12:37:15 -05:00
|
|
|
except Exception, e:
|
|
|
|
logging.debug("Connection error: %s" % e)
|
2008-02-19 09:20:13 -06:00
|
|
|
raise RuntimeError("Unable to connect to LDAP server %s." % config.host_name)
|
0000-12-31 18:09:24 -05:50
|
|
|
if ret != 0:
|
2008-02-19 09:20:13 -06:00
|
|
|
raise RuntimeError("Failed to start replication")
|
0000-12-31 18:09:24 -05:50
|
|
|
|
|
|
|
install_krb(config)
|
|
|
|
install_http(config)
|
2009-07-10 15:18:16 -05:00
|
|
|
if CA:
|
|
|
|
CA.import_ra_cert(dir + "/ra.p12")
|
|
|
|
CA.fix_ra_perms()
|
|
|
|
service.restart("httpd")
|
2008-02-20 09:16:19 -06:00
|
|
|
|
2008-05-23 13:51:50 -05:00
|
|
|
# Create the config file
|
|
|
|
fd = open("/etc/ipa/ipa.conf", "w")
|
|
|
|
fd.write("[defaults]\n")
|
|
|
|
fd.write("server=" + config.host_name + "\n")
|
|
|
|
fd.write("realm=" + config.realm_name + "\n")
|
|
|
|
fd.write("domain=" + config.domain_name + "\n")
|
|
|
|
fd.close()
|
|
|
|
|
2009-04-28 16:05:39 -05:00
|
|
|
# Create the management framework config file
|
|
|
|
fd = open("/etc/ipa/default.conf", "w")
|
|
|
|
fd.write("[global]\n")
|
|
|
|
fd.write("basedn=" + util.realm_to_suffix(config.realm_name) + "\n")
|
|
|
|
fd.write("realm=" + config.realm_name + "\n")
|
|
|
|
fd.write("domain=" + config.domain_name + "\n")
|
|
|
|
fd.write("xmlrpc_uri=https://%s/ipa/xml\n" % config.host_name)
|
2009-08-26 13:09:36 -05:00
|
|
|
fd.write("ldap_uri=ldapi://%%2fvar%%2frun%%2fslapd-%s.socket\n" % dsinstance.realm_to_serverid(realm_name))
|
2009-07-10 15:18:16 -05:00
|
|
|
if ipautil.file_exists(config.dir + "/ca.p12"):
|
2009-04-28 16:05:39 -05:00
|
|
|
fd.write("enable_ra=True\n")
|
|
|
|
fd.close()
|
|
|
|
|
2008-12-01 14:33:15 -06:00
|
|
|
# Apply any LDAP updates. Needs to be done after the replica is synced-up
|
|
|
|
service.print_msg("Applying LDAP updates")
|
|
|
|
ds.apply_updates()
|
|
|
|
|
0000-12-31 18:09:24 -05:50
|
|
|
service.restart("dirsrv")
|
|
|
|
service.restart("krb5kdc")
|
2008-02-20 09:16:19 -06:00
|
|
|
|
2009-09-02 05:24:17 -05:00
|
|
|
if options.setup_dns:
|
2009-09-02 09:22:50 -05:00
|
|
|
# First bootstrap the plug-in framework
|
|
|
|
api.bootstrap(in_server=True)
|
|
|
|
api.finalize()
|
|
|
|
api.Backend.ldap2.connect(bind_dn="cn=Directory Manager",
|
|
|
|
bind_pw=config.dirman_password)
|
|
|
|
|
2009-09-02 05:24:17 -05:00
|
|
|
install_bind(config, options)
|
|
|
|
|
2008-02-20 09:16:19 -06:00
|
|
|
# Call client install script
|
|
|
|
try:
|
2008-02-28 17:24:10 -06:00
|
|
|
ipautil.run(["/usr/sbin/ipa-client-install", "--on-master", "--unattended", "--domain", config.domain_name, "--server", config.host_name, "--realm", config.realm_name])
|
2008-02-20 09:16:19 -06:00
|
|
|
except Exception, e:
|
|
|
|
print "Configuration of client side components failed!"
|
|
|
|
print "ipa-client-install returned: " + str(e)
|
|
|
|
raise RuntimeError("Failed to configure the client")
|
2008-03-27 08:33:01 -05:00
|
|
|
|
|
|
|
ds.init_memberof()
|
|
|
|
|
0000-12-31 18:09:24 -05:50
|
|
|
try:
|
2008-02-05 11:23:53 -06:00
|
|
|
if not os.geteuid()==0:
|
|
|
|
sys.exit("\nYou must be root to run this script.\n")
|
|
|
|
|
0000-12-31 18:09:24 -05:50
|
|
|
main()
|
2008-05-08 14:21:20 -05:00
|
|
|
sys.exit(0)
|
|
|
|
except SystemExit, e:
|
|
|
|
sys.exit(e)
|
2009-06-26 12:37:49 -05:00
|
|
|
except socket.error, (errno, errstr):
|
|
|
|
print errstr
|
|
|
|
except HostnameLocalhost:
|
|
|
|
print "The hostname resolves to the localhost address (127.0.0.1/::1)"
|
|
|
|
print "Please change your /etc/hosts file so that the hostname"
|
|
|
|
print "resolves to the ip address of your network interface."
|
|
|
|
print ""
|
|
|
|
print "Please fix your /etc/hosts file and restart the setup program"
|
0000-12-31 18:09:24 -05:50
|
|
|
except Exception, e:
|
|
|
|
print "creation of replica failed: %s" % str(e)
|
|
|
|
message = str(e)
|
|
|
|
for str in traceback.format_tb(sys.exc_info()[2]):
|
|
|
|
message = message + "\n" + str
|
|
|
|
logging.debug(message)
|
2008-04-29 13:12:00 -05:00
|
|
|
except KeyboardInterrupt:
|
|
|
|
print "Installation cancelled."
|
2008-05-08 14:21:20 -05:00
|
|
|
|
|
|
|
print ""
|
|
|
|
print "Your system may be partly configured."
|
|
|
|
print "Run /usr/sbin/ipa-server-install --uninstall to clean up."
|
|
|
|
|
|
|
|
# the only way to get here is on error or ^C
|
|
|
|
sys.exit(1)
|