0000-12-31 18:09:24 -05:50
#! /usr/bin/python -E
# Authors: Karl MacMillan <kmacmillan@mentalrootkit.com>
#
# Copyright (C) 2007 Red Hat
# see file 'COPYING' for use and warranty information
#
# This program is free software; you can redistribute it and/or
# modify it under the terms of the GNU General Public License as
2008-02-04 14:15:52 -06:00
# published by the Free Software Foundation; version 2 only
0000-12-31 18:09:24 -05:50
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
#
import sys
import logging, tempfile, shutil, os, pwd
2008-02-05 11:23:53 -06:00
import traceback
0000-12-31 18:09:24 -05:50
from ConfigParser import SafeConfigParser
import krbV
2008-02-05 11:23:53 -06:00
from optparse import OptionParser
0000-12-31 18:09:24 -05:50
2009-02-05 14:03:08 -06:00
import ipapython.config
from ipapython import ipautil
2009-07-10 15:18:16 -05:00
from ipaserver.install import dsinstance, installutils, certs, httpinstance
2009-02-04 09:53:34 -06:00
from ipaserver import ipaldap
2009-02-05 14:03:08 -06:00
from ipapython import version
2009-09-10 15:15:14 -05:00
from ipalib.constants import DEFAULT_CONFIG
from ipalib import api
2010-01-20 10:26:20 -06:00
from ipalib import util
2008-02-15 19:47:29 -06:00
import ldap
0000-12-31 18:09:24 -05:50
2008-02-05 11:23:53 -06:00
def parse_options():
2008-09-17 04:06:48 -05:00
usage = "%prog [options] FQDN (e.g. replica.example.com)"
parser = OptionParser(usage=usage, version=version.VERSION)
2008-02-05 11:23:53 -06:00
2008-07-11 10:34:29 -05:00
parser.add_option("--dirsrv_pkcs12", dest="dirsrv_pkcs12",
help="install certificate for the directory server")
parser.add_option("--http_pkcs12", dest="http_pkcs12",
help="install certificate for the http server")
parser.add_option("--dirsrv_pin", dest="dirsrv_pin",
help="PIN for the Directory Server PKCS#12 file")
parser.add_option("--http_pin", dest="http_pin",
help="PIN for the Apache Server PKCS#12 file")
2008-08-08 07:53:55 -05:00
parser.add_option("-p", "--password", dest="password",
help="Directory Manager (existing master) password")
2008-07-11 10:34:29 -05:00
2009-02-05 14:03:08 -06:00
ipapython.config.add_standard_options(parser)
2008-08-15 11:08:01 -05:00
options, args = parser.parse_args()
2008-02-05 11:23:53 -06:00
2008-07-11 10:34:29 -05:00
# If any of the PKCS#12 options are selected, all are required. Create a
# list of the options and count it to enforce that all are required without
# having a huge set of it blocks.
pkcs12 = [options.dirsrv_pkcs12, options.http_pkcs12, options.dirsrv_pin, options.http_pin]
cnt = pkcs12.count(None)
if cnt > 0 and cnt < 4:
2009-11-23 01:42:30 -06:00
parser.error("All PKCS#12 options are required if any are used.")
2008-07-11 10:34:29 -05:00
2008-08-15 11:08:01 -05:00
if len(args) != 1:
2008-02-05 11:23:53 -06:00
parser.error("must provide the fully-qualified name of the replica")
2009-02-05 14:03:08 -06:00
ipapython.config.init_config(options)
2008-08-15 11:08:01 -05:00
2008-02-05 11:23:53 -06:00
return options, args
0000-12-31 18:09:24 -05:50
def get_host_name():
hostname = installutils.get_fqdn()
try:
installutils.verify_fqdn(hostname)
except RuntimeError, e:
logging.error(str(e))
sys.exit(1)
return hostname
def get_realm_name():
2008-02-15 19:47:29 -06:00
try:
c = krbV.default_context()
return c.default_realm
except Exception, e:
return None
def get_domain_name():
try:
2009-02-05 14:03:08 -06:00
ipapython.config.init_config()
domain_name = ipapython.config.config.get_domain()
2008-02-15 19:47:29 -06:00
except Exception, e:
return None
return domain_name
0000-12-31 18:09:24 -05:50
2010-01-20 10:26:20 -06:00
def get_subject_base(host_name, dm_password, suffix):
try:
conn = ipaldap.IPAdmin(host_name)
conn.do_simple_bind(bindpw=dm_password)
except Exception, e:
logging.critical("Could not connect to the Directory Server on %s" % host_name)
raise e
entry = conn.getEntry("cn=ipaConfig, cn=etc, %s" % suffix, ldap.SCOPE_SUBTREE)
return entry.getValue('ipacertificatesubjectbase')
0000-12-31 18:09:24 -05:50
def check_ipa_configuration(realm_name):
2008-02-05 11:23:53 -06:00
config_dir = dsinstance.config_dirname(dsinstance.realm_to_serverid(realm_name))
0000-12-31 18:09:24 -05:50
if not ipautil.dir_exists(config_dir):
logging.error("could not find directory instance: %s" % config_dir)
sys.exit(1)
2010-01-20 10:26:20 -06:00
def export_certdb(realm_name, ds_dir, dir, passwd_fname, fname, hostname, subject_base=None):
2008-02-05 11:23:53 -06:00
"""realm is the kerberos realm for the IPA server.
ds_dir is the location of the master DS we are creating a replica for.
dir is the location of the files for the replica we are creating.
2008-07-11 10:34:29 -05:00
passwd_fname is the file containing the PKCS#12 password
2008-02-05 11:23:53 -06:00
fname is the filename of the PKCS#12 file for this cert (minus the .p12).
2009-07-10 15:18:16 -05:00
hostname is the FQDN of the server we're creating a cert for.
The subject is handled by certs.CertDB:create_server_cert()
2008-02-05 11:23:53 -06:00
"""
2008-02-20 15:31:32 -06:00
try:
2009-07-10 15:18:16 -05:00
self_signed = certs.ipa_self_signed()
2010-01-20 10:26:20 -06:00
db = certs.CertDB(dir, subject_base=subject_base)
2009-07-10 15:18:16 -05:00
db.create_passwd_file()
2009-09-10 15:15:14 -05:00
# if self_signed:
# ca_db = certs.CertDB(dsinstance.config_dirname(dsinstance.realm_to_serverid(realm_name)))
# db.create_from_cacert(ca_db.cacert_fname)
# else:
# ca_db = certs.CertDB(httpinstance.NSS_DIR, host_name=get_host_name())
2010-01-20 10:26:20 -06:00
ca_db = certs.CertDB(httpinstance.NSS_DIR, host_name=get_host_name(), subject_base=subject_base)
2009-09-10 15:15:14 -05:00
db.create_from_cacert(ca_db.cacert_fname)
2009-07-10 15:18:16 -05:00
db.create_server_cert("Server-Cert", hostname, ca_db)
2008-02-20 15:31:32 -06:00
except Exception, e:
raise e
2008-02-05 11:23:53 -06:00
pkcs12_fname = dir + "/" + fname + ".p12"
0000-12-31 18:09:24 -05:50
0000-12-31 18:09:24 -05:50
try:
2009-07-10 15:18:16 -05:00
db.export_pkcs12(pkcs12_fname, passwd_fname, "Server-Cert")
0000-12-31 18:09:24 -05:50
except ipautil.CalledProcessError, e:
2009-07-10 15:18:16 -05:00
print "error exporting Server certificate: " + str(e)
2009-04-28 16:05:39 -05:00
remove_file(pkcs12_fname)
remove_file(passwd_fname)
remove_file(dir + "/cert8.db")
remove_file(dir + "/key3.db")
remove_file(dir + "/secmod.db")
remove_file(dir + "/noise.txt")
2008-02-15 19:47:29 -06:00
if ipautil.file_exists(passwd_fname + ".orig"):
2009-04-28 16:05:39 -05:00
remove_file(passwd_fname + ".orig")
0000-12-31 18:09:24 -05:50
2009-07-10 15:18:16 -05:00
def export_ra_pkcs12(dir, dm_password):
"""
dir is the location of the files for the replica we are creating.
dm_password is the Directory Manager password
If this install is using dogtag/RHCS then export the RA certificate.
"""
if certs.ipa_self_signed():
return
(agent_fd, agent_name) = tempfile.mkstemp()
os.write(agent_fd, dm_password)
os.close(agent_fd)
try:
try:
db = certs.CertDB(httpinstance.NSS_DIR, host_name=get_host_name())
if db.has_nickname("ipaCert"):
pkcs12_fname = "%s/ra.p12" % dir
db.export_pkcs12(pkcs12_fname, agent_name, "ipaCert")
except Exception, e:
raise e
finally:
os.remove(agent_name)
0000-12-31 18:09:24 -05:50
def get_ds_user(ds_dir):
uid = os.stat(ds_dir).st_uid
user = pwd.getpwuid(uid)[0]
return user
2010-01-20 10:26:20 -06:00
def save_config(dir, realm_name, host_name, ds_user, domain_name, dest_host,
subject_base):
0000-12-31 18:09:24 -05:50
config = SafeConfigParser()
config.add_section("realm")
config.set("realm", "realm_name", realm_name)
config.set("realm", "master_host_name", host_name)
config.set("realm", "ds_user", ds_user)
2008-02-15 19:47:29 -06:00
config.set("realm", "domain_name", domain_name)
2008-08-08 07:53:55 -05:00
config.set("realm", "destination_host", dest_host)
2010-01-20 10:26:20 -06:00
config.set("realm", "subject_base", subject_base)
0000-12-31 18:09:24 -05:50
fd = open(dir + "/realm_info", "w")
config.write(fd)
0000-12-31 18:09:24 -05:50
2009-04-28 16:05:39 -05:00
def remove_file(fname, ignore_errors=True):
try:
os.remove(fname)
except OSError, e:
if not ignore_errors:
raise e
0000-12-31 18:09:24 -05:50
def copy_files(realm_name, dir):
2008-02-05 11:23:53 -06:00
config_dir = dsinstance.config_dirname(dsinstance.realm_to_serverid(realm_name))
2008-07-25 15:56:42 -05:00
2008-02-05 11:23:53 -06:00
try:
shutil.copy("/var/kerberos/krb5kdc/ldappwd", dir + "/ldappwd")
2008-04-09 15:57:41 -05:00
shutil.copy("/var/kerberos/krb5kdc/kpasswd.keytab", dir + "/kpasswd.keytab")
2008-12-01 14:06:20 -06:00
shutil.copy("/usr/share/ipa/html/ca.crt", dir + "/ca.crt")
2008-07-25 15:56:42 -05:00
if ipautil.file_exists("/usr/share/ipa/html/preferences.html"):
shutil.copy("/usr/share/ipa/html/preferences.html", dir + "/preferences.html")
shutil.copy("/usr/share/ipa/html/configure.jar", dir + "/configure.jar")
2008-02-05 11:23:53 -06:00
except Exception, e:
print "error copying files: " + str(e)
sys.exit(1)
0000-12-31 18:09:24 -05:50
2008-08-08 07:53:55 -05:00
def get_dirman_password():
return installutils.read_password("Directory Manager (existing master)", confirm=False, validate=False)
0000-12-31 18:09:24 -05:50
def main():
2008-02-05 11:23:53 -06:00
options, args = parse_options()
2008-08-15 11:08:01 -05:00
replica_fqdn = args[0]
2008-02-05 11:23:53 -06:00
2009-09-10 15:15:14 -05:00
# Just initialize the environment. This is so the installer can have
# access to the plugin environment
api.env._bootstrap()
api.env._finalize_core(**dict(DEFAULT_CONFIG))
if not certs.ipa_self_signed() and not ipautil.file_exists("/var/lib/pki-ca/conf/CS.cfg") and not options.dirsrv_pin:
2008-07-11 10:34:29 -05:00
sys.exit("The replica must be created on the primary IPA server.\nIf you installed IPA with your own certificates using PKCS#12 files you must provide PKCS#12 files for any replicas you create as well.")
2008-02-15 19:47:29 -06:00
print "Determining current realm name"
0000-12-31 18:09:24 -05:50
realm_name = get_realm_name()
2008-02-15 19:47:29 -06:00
if realm_name is None:
print "Unable to determine default realm"
sys.exit(1)
2008-02-05 11:23:53 -06:00
check_ipa_configuration(realm_name)
2008-02-15 19:47:29 -06:00
print "Getting domain name from LDAP"
domain_name = get_domain_name()
if domain_name is None:
print "Unable to determine LDAP default domain"
sys.exit(1)
0000-12-31 18:09:24 -05:50
host_name = get_host_name()
2008-04-22 08:50:04 -05:00
if host_name == replica_fqdn:
print "You can't create a replica on itself"
sys.exit(1)
2008-02-08 14:10:26 -06:00
ds_dir = dsinstance.config_dirname(dsinstance.realm_to_serverid(realm_name))
0000-12-31 18:09:24 -05:50
ds_user = get_ds_user(ds_dir)
2008-08-08 07:53:55 -05:00
# get the directory manager password
dirman_password = options.password
if not options.password:
try:
dirman_password = get_dirman_password()
except KeyboardInterrupt:
sys.exit(0)
# Try out the password
try:
conn = ipaldap.IPAdmin(host_name)
conn.do_simple_bind(bindpw=dirman_password)
conn.unbind()
except ldap.CONNECT_ERROR, e:
sys.exit("\nUnable to connect to LDAP server %s" % host_name)
except ldap.SERVER_DOWN, e:
sys.exit("\nUnable to connect to LDAP server %s" % host_name)
except ldap.INVALID_CREDENTIALS, e :
sys.exit("\nThe password provided is incorrect for LDAP server %s" % host_name)
2008-02-05 11:23:53 -06:00
print "Preparing replica for %s from %s" % (replica_fqdn, host_name)
0000-12-31 18:09:24 -05:50
2010-01-20 10:26:20 -06:00
subject_base = get_subject_base(host_name, dirman_password, util.realm_to_suffix(realm_name))
0000-12-31 18:09:24 -05:50
top_dir = tempfile.mkdtemp("ipa")
dir = top_dir + "/realm_info"
os.mkdir(dir, 0700)
2008-07-11 10:34:29 -05:00
if options.dirsrv_pin:
passwd = options.dirsrv_pin
else:
passwd = ""
passwd_fname = dir + "/dirsrv_pin.txt"
fd = open(passwd_fname, "w")
fd.write("%s\n" % passwd)
fd.close()
if options.dirsrv_pkcs12:
print "Copying SSL certificate for the Directory Server from %s" % options.dirsrv_pkcs12
try:
shutil.copy(options.dirsrv_pkcs12, dir + "/dscert.p12")
except IOError, e:
print "Copy failed %s" % e
sys.exit(1)
else:
2009-07-10 15:18:16 -05:00
try:
if not certs.ipa_self_signed():
# FIXME, need option for location of CA backup
if ipautil.file_exists("/root/tmp-ca.p12"):
shutil.copy("/root/tmp-ca.p12", dir + "/ca.p12")
else:
raise RuntimeError("Root CA PKCS#12 not found in /root/tmp-ca.p12")
except IOError, e:
print "Copy failed %s" % e
sys.exit(1)
2008-07-11 10:34:29 -05:00
print "Creating SSL certificate for the Directory Server"
2010-01-20 10:26:20 -06:00
export_certdb(realm_name, ds_dir, dir, passwd_fname, "dscert", replica_fqdn, subject_base)
2008-07-11 10:34:29 -05:00
if options.http_pin:
passwd = options.http_pin
else:
passwd = ""
passwd_fname = dir + "/http_pin.txt"
fd = open(passwd_fname, "w")
fd.write("%s\n" % passwd)
fd.close()
if options.http_pkcs12:
print "Copying SSL certificate for the Web Server from %s" % options.http_pkcs12
try:
shutil.copy(options.http_pkcs12, dir + "/httpcert.p12")
except IOError, e:
print "Copy failed %s" % e
sys.exit(1)
else:
print "Creating SSL certificate for the Web Server"
2010-01-20 10:26:20 -06:00
export_certdb(realm_name, ds_dir, dir, passwd_fname, "httpcert", replica_fqdn, subject_base)
2009-07-10 15:18:16 -05:00
print "Exporting RA certificate"
export_ra_pkcs12(dir, dirman_password)
2010-01-20 10:26:20 -06:00
2008-02-05 11:23:53 -06:00
print "Copying additional files"
0000-12-31 18:09:24 -05:50
copy_files(realm_name, dir)
2010-01-20 10:26:20 -06:00
2008-02-05 11:23:53 -06:00
print "Finalizing configuration"
2010-01-20 10:26:20 -06:00
save_config(dir, realm_name, host_name, ds_user, domain_name, replica_fqdn, subject_base)
2008-08-08 07:53:55 -05:00
replicafile = "/var/lib/ipa/replica-info-" + replica_fqdn
encfile = replicafile+".gpg"
0000-12-31 18:09:24 -05:50
2008-08-08 07:53:55 -05:00
print "Packaging replica information into %s" % encfile
ipautil.run(["/bin/tar", "cf", replicafile, "-C", top_dir, "realm_info"])
ipautil.encrypt_file(replicafile, encfile, dirman_password, top_dir);
0000-12-31 18:09:24 -05:50
2009-04-28 16:05:39 -05:00
remove_file(replicafile)
0000-12-31 18:09:24 -05:50
shutil.rmtree(dir)
2008-02-05 11:23:53 -06:00
try:
if not os.geteuid()==0:
sys.exit("\nYou must be root to run this script.\n")
main()
2008-02-08 14:10:26 -06:00
except SystemExit, e:
sys.exit(e)
2008-02-05 11:23:53 -06:00
except Exception, e:
print "preparation of replica failed: %s" % str(e)
message = str(e)
for str in traceback.format_tb(sys.exc_info()[2]):
message = message + "\n" + str
logging.debug(message)
print message
sys.exit(1)