2010-09-27 15:51:28 -05:00
|
|
|
# Authors:
|
|
|
|
# Jr Aquino <jr.aquino@citrixonline.com>
|
|
|
|
#
|
|
|
|
# Copyright (C) 2010 Red Hat
|
|
|
|
# see file 'COPYING' for use and warranty information
|
|
|
|
#
|
2010-12-09 06:59:11 -06:00
|
|
|
# This program is free software; you can redistribute it and/or modify
|
|
|
|
# it under the terms of the GNU General Public License as published by
|
|
|
|
# the Free Software Foundation, either version 3 of the License, or
|
|
|
|
# (at your option) any later version.
|
2010-09-27 15:51:28 -05:00
|
|
|
#
|
|
|
|
# This program is distributed in the hope that it will be useful,
|
|
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
# GNU General Public License for more details.
|
|
|
|
#
|
|
|
|
# You should have received a copy of the GNU General Public License
|
2010-12-09 06:59:11 -06:00
|
|
|
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
2010-09-27 15:51:28 -05:00
|
|
|
"""
|
2011-02-23 13:37:07 -06:00
|
|
|
Sudo (su "do") allows a system administrator to delegate authority to
|
|
|
|
give certain users (or groups of users) the ability to run some (or all)
|
|
|
|
commands as root or another user while providing an audit trail of the
|
|
|
|
commands and their arguments.
|
|
|
|
|
2011-02-28 10:44:27 -06:00
|
|
|
FreeIPA provides a designated binddn to use with Sudo located at:
|
2011-02-23 13:37:07 -06:00
|
|
|
uid=sudo,cn=sysaccounts,cn=etc,dc=example,dc=com
|
|
|
|
|
|
|
|
To enable the binddn run the following command to set the password:
|
|
|
|
LDAPTLS_CACERT=/etc/ipa/ca.crt /usr/bin/ldappasswd -S -W \
|
|
|
|
-h ipa.example.com -ZZ -D "cn=Directory Manager" \
|
|
|
|
uid=sudo,cn=sysaccounts,cn=etc,dc=example,dc=com
|
|
|
|
|
|
|
|
For more information, see the FreeIPA Documentation to Sudo.
|
2010-09-27 15:51:28 -05:00
|
|
|
"""
|
|
|
|
|
|
|
|
from ipalib import api, errors
|
|
|
|
from ipalib import Str, StrEnum
|
|
|
|
from ipalib.plugins.baseldap import *
|
|
|
|
from ipalib import _, ngettext
|
|
|
|
|
2011-03-04 10:08:54 -06:00
|
|
|
topic = ('sudo', 'Commands for controlling sudo configuration')
|
2010-12-17 10:29:33 -06:00
|
|
|
|
2010-09-27 15:51:28 -05:00
|
|
|
class sudorule(LDAPObject):
|
|
|
|
"""
|
2011-03-04 10:08:54 -06:00
|
|
|
Sudo Rule management
|
2010-09-27 15:51:28 -05:00
|
|
|
"""
|
|
|
|
container_dn = api.env.container_sudorule
|
2011-07-05 09:34:21 -05:00
|
|
|
object_name = 'sudo rule'
|
|
|
|
object_name_plural = 'sudo rules'
|
2010-09-27 15:51:28 -05:00
|
|
|
object_class = ['ipaassociation', 'ipasudorule']
|
|
|
|
default_attributes = [
|
2010-12-08 09:58:13 -06:00
|
|
|
'cn', 'ipaenabledflag',
|
|
|
|
'description', 'usercategory', 'hostcategory',
|
|
|
|
'cmdcategory', 'memberuser', 'memberhost',
|
2011-06-16 13:57:13 -05:00
|
|
|
'memberallowcmd', 'memberdenycmd', 'ipasudoopt',
|
2010-09-27 15:51:28 -05:00
|
|
|
]
|
|
|
|
uuid_attribute = 'ipauniqueid'
|
2010-10-27 12:04:06 -05:00
|
|
|
rdn_attribute = 'ipauniqueid'
|
2010-09-27 15:51:28 -05:00
|
|
|
attribute_members = {
|
|
|
|
'memberuser': ['user', 'group'],
|
|
|
|
'memberhost': ['host', 'hostgroup'],
|
2010-10-04 17:56:40 -05:00
|
|
|
'memberallowcmd': ['sudocmd', 'sudocmdgroup'],
|
|
|
|
'memberdenycmd': ['sudocmd', 'sudocmdgroup'],
|
2011-01-07 17:29:00 -06:00
|
|
|
'ipasudorunas': ['user', 'group'],
|
2010-12-13 09:38:09 -06:00
|
|
|
'ipasudorunasgroup': ['group'],
|
2010-09-27 15:51:28 -05:00
|
|
|
}
|
|
|
|
|
2011-06-24 11:39:48 -05:00
|
|
|
label = _('Sudo Rules')
|
2011-06-23 19:48:50 -05:00
|
|
|
label_singular = _('sudo rule')
|
2010-09-27 15:51:28 -05:00
|
|
|
|
|
|
|
takes_params = (
|
|
|
|
Str('cn',
|
2010-12-02 15:29:26 -06:00
|
|
|
cli_name='sudorule_name',
|
2010-09-27 15:51:28 -05:00
|
|
|
label=_('Rule name'),
|
|
|
|
primary_key=True,
|
|
|
|
),
|
|
|
|
Str('description?',
|
|
|
|
cli_name='desc',
|
|
|
|
label=_('Description'),
|
2010-11-02 11:00:40 -05:00
|
|
|
),
|
2010-12-07 18:09:28 -06:00
|
|
|
Flag('ipaenabledflag?',
|
|
|
|
label=_('Enabled'),
|
|
|
|
flags=['no_create', 'no_update', 'no_search'],
|
|
|
|
),
|
|
|
|
StrEnum('usercategory?',
|
|
|
|
cli_name='usercat',
|
|
|
|
label=_('User category'),
|
|
|
|
doc=_('User category the rule applies to'),
|
|
|
|
values=(u'all', ),
|
|
|
|
),
|
|
|
|
StrEnum('hostcategory?',
|
|
|
|
cli_name='hostcat',
|
|
|
|
label=_('Host category'),
|
|
|
|
doc=_('Host category the rule applies to'),
|
|
|
|
values=(u'all', ),
|
|
|
|
),
|
2010-11-02 11:00:40 -05:00
|
|
|
StrEnum('cmdcategory?',
|
|
|
|
cli_name='cmdcat',
|
|
|
|
label=_('Command category'),
|
|
|
|
doc=_('Command category the rule applies to'),
|
|
|
|
values=(u'all', ),
|
2010-12-13 09:38:09 -06:00
|
|
|
),
|
|
|
|
StrEnum('ipasudorunasusercategory?',
|
|
|
|
cli_name='runasusercat',
|
|
|
|
label=_('Run As User category'),
|
|
|
|
doc=_('Run As User category the rule applies to'),
|
|
|
|
values=(u'all', ),
|
|
|
|
),
|
|
|
|
StrEnum('ipasudorunasgroupcategory?',
|
|
|
|
cli_name='runasgroupcat',
|
|
|
|
label=_('Run As Group category'),
|
|
|
|
doc=_('Run As Group category the rule applies to'),
|
|
|
|
values=(u'all', ),
|
2010-09-27 15:51:28 -05:00
|
|
|
),
|
2010-12-17 10:29:33 -06:00
|
|
|
Str('memberuser_user?',
|
2010-09-27 15:51:28 -05:00
|
|
|
label=_('Users'),
|
|
|
|
flags=['no_create', 'no_update', 'no_search'],
|
|
|
|
),
|
2011-02-15 04:03:41 -06:00
|
|
|
Str('memberuser_group?',
|
|
|
|
label=_('Groups'),
|
|
|
|
flags=['no_create', 'no_update', 'no_search'],
|
|
|
|
),
|
2010-09-27 15:51:28 -05:00
|
|
|
Str('memberhost_host?',
|
|
|
|
label=_('Hosts'),
|
|
|
|
flags=['no_create', 'no_update', 'no_search'],
|
|
|
|
),
|
|
|
|
Str('memberhost_hostgroup?',
|
|
|
|
label=_('Host Groups'),
|
|
|
|
flags=['no_create', 'no_update', 'no_search'],
|
|
|
|
),
|
2010-10-04 17:56:40 -05:00
|
|
|
Str('memberallowcmd_sudocmd?',
|
|
|
|
label=_('Sudo Allow Commands'),
|
|
|
|
flags=['no_create', 'no_update', 'no_search'],
|
|
|
|
),
|
|
|
|
Str('memberdenycmd_sudocmd?',
|
|
|
|
label=_('Sudo Deny Commands'),
|
|
|
|
flags=['no_create', 'no_update', 'no_search'],
|
|
|
|
),
|
|
|
|
Str('memberallowcmd_sudocmdgroup?',
|
|
|
|
label=_('Sudo Command Groups'),
|
2010-09-27 15:51:28 -05:00
|
|
|
flags=['no_create', 'no_update', 'no_search'],
|
|
|
|
),
|
2010-10-04 17:56:40 -05:00
|
|
|
Str('memberdenycmd_sudocmdgroup?',
|
2010-09-27 15:51:28 -05:00
|
|
|
label=_('Sudo Command Groups'),
|
|
|
|
flags=['no_create', 'no_update', 'no_search'],
|
|
|
|
),
|
2010-12-17 10:29:33 -06:00
|
|
|
Str('ipasudorunas_user?',
|
2010-12-13 09:38:09 -06:00
|
|
|
label=_('Run As User'),
|
|
|
|
flags=['no_create', 'no_update', 'no_search'],
|
|
|
|
),
|
2011-06-16 16:25:00 -05:00
|
|
|
Str('ipasudorunas_group?',
|
2010-12-13 09:38:09 -06:00
|
|
|
label=_('Run As Group'),
|
|
|
|
flags=['no_create', 'no_update', 'no_search'],
|
|
|
|
),
|
2010-12-17 10:29:33 -06:00
|
|
|
Str('externaluser?',
|
|
|
|
cli_name='externaluser',
|
|
|
|
label=_('External User'),
|
|
|
|
doc=_('External User the rule applies to'),
|
|
|
|
),
|
2011-01-07 17:29:00 -06:00
|
|
|
Str('ipasudorunasextuser?',
|
|
|
|
cli_name='runasexternaluser',
|
|
|
|
label=_('RunAs External User'),
|
|
|
|
doc=_('External User the commands can run as'),
|
|
|
|
),
|
|
|
|
Str('ipasudorunasextgroup?',
|
|
|
|
cli_name='runasexternalgroup',
|
|
|
|
label=_('RunAs External Group'),
|
|
|
|
doc=_('External Group the commands can run as'),
|
|
|
|
),
|
2010-09-27 15:51:28 -05:00
|
|
|
)
|
|
|
|
|
|
|
|
api.register(sudorule)
|
|
|
|
|
|
|
|
|
|
|
|
class sudorule_add(LDAPCreate):
|
|
|
|
"""
|
|
|
|
Create new Sudo Rule.
|
|
|
|
"""
|
2010-12-08 09:58:13 -06:00
|
|
|
def pre_callback(self, ldap, dn, entry_attrs, attrs_list, *keys, **options):
|
|
|
|
# Sudo rules are enabled by default
|
|
|
|
entry_attrs['ipaenabledflag'] = 'TRUE'
|
|
|
|
return dn
|
2010-09-27 15:51:28 -05:00
|
|
|
|
|
|
|
msg_summary = _('Added sudo rule "%(value)s"')
|
|
|
|
|
|
|
|
api.register(sudorule_add)
|
|
|
|
|
|
|
|
|
|
|
|
class sudorule_del(LDAPDelete):
|
|
|
|
"""
|
|
|
|
Delete Sudo Rule.
|
|
|
|
"""
|
2011-06-14 20:35:02 -05:00
|
|
|
msg_summary = _('Deleted sudo rule "%(value)s"')
|
2010-09-27 15:51:28 -05:00
|
|
|
|
|
|
|
api.register(sudorule_del)
|
|
|
|
|
|
|
|
|
|
|
|
class sudorule_mod(LDAPUpdate):
|
|
|
|
"""
|
|
|
|
Modify Sudo Rule.
|
|
|
|
"""
|
2011-06-14 20:35:02 -05:00
|
|
|
msg_summary = _('Modified sudo rule "%(value)s"')
|
2010-09-27 15:51:28 -05:00
|
|
|
|
|
|
|
api.register(sudorule_mod)
|
|
|
|
|
|
|
|
|
|
|
|
class sudorule_find(LDAPSearch):
|
|
|
|
"""
|
|
|
|
Search for Sudo Rule.
|
|
|
|
"""
|
2011-06-14 20:35:02 -05:00
|
|
|
msg_summary = ngettext(
|
|
|
|
'%(count)d sudo rule matched', '%(count)d sudo rules matched', 0
|
|
|
|
)
|
2010-09-27 15:51:28 -05:00
|
|
|
|
|
|
|
api.register(sudorule_find)
|
|
|
|
|
|
|
|
|
|
|
|
class sudorule_show(LDAPRetrieve):
|
|
|
|
"""
|
2011-05-04 03:26:18 -05:00
|
|
|
Display Sudo Rule.
|
2010-09-27 15:51:28 -05:00
|
|
|
"""
|
|
|
|
|
|
|
|
api.register(sudorule_show)
|
|
|
|
|
|
|
|
|
2010-12-08 09:58:13 -06:00
|
|
|
class sudorule_enable(LDAPQuery):
|
|
|
|
"""
|
|
|
|
Enable a Sudo rule.
|
|
|
|
"""
|
|
|
|
def execute(self, cn):
|
|
|
|
ldap = self.obj.backend
|
|
|
|
|
|
|
|
dn = self.obj.get_dn(cn)
|
|
|
|
entry_attrs = {'ipaenabledflag': 'TRUE'}
|
|
|
|
|
|
|
|
try:
|
|
|
|
ldap.update_entry(dn, entry_attrs)
|
|
|
|
except errors.EmptyModlist:
|
|
|
|
pass
|
|
|
|
except errors.NotFound:
|
|
|
|
self.obj.handle_not_found(cn)
|
|
|
|
|
|
|
|
return dict(result=True)
|
|
|
|
|
|
|
|
def output_for_cli(self, textui, result, cn):
|
|
|
|
textui.print_name(self.name)
|
|
|
|
textui.print_dashed('Enabled Sudo rule "%s".' % cn)
|
|
|
|
|
|
|
|
api.register(sudorule_enable)
|
|
|
|
|
|
|
|
|
|
|
|
class sudorule_disable(LDAPQuery):
|
|
|
|
"""
|
|
|
|
Disable a Sudo rule.
|
|
|
|
"""
|
|
|
|
def execute(self, cn):
|
|
|
|
ldap = self.obj.backend
|
|
|
|
|
|
|
|
dn = self.obj.get_dn(cn)
|
|
|
|
entry_attrs = {'ipaenabledflag': 'FALSE'}
|
|
|
|
|
|
|
|
try:
|
|
|
|
ldap.update_entry(dn, entry_attrs)
|
|
|
|
except errors.EmptyModlist:
|
|
|
|
pass
|
|
|
|
except errors.NotFound:
|
|
|
|
self.obj.handle_not_found(cn)
|
|
|
|
|
|
|
|
return dict(result=True)
|
|
|
|
|
|
|
|
def output_for_cli(self, textui, result, cn):
|
|
|
|
textui.print_name(self.name)
|
|
|
|
textui.print_dashed('Disabled Sudo rule "%s".' % cn)
|
|
|
|
|
|
|
|
api.register(sudorule_disable)
|
|
|
|
|
|
|
|
|
2010-10-04 17:56:40 -05:00
|
|
|
class sudorule_add_allow_command(LDAPAddMember):
|
|
|
|
"""
|
|
|
|
Add commands and sudo command groups affected by Sudo Rule.
|
|
|
|
"""
|
|
|
|
member_attributes = ['memberallowcmd']
|
|
|
|
member_count_out = ('%i object added.', '%i objects added.')
|
|
|
|
|
|
|
|
api.register(sudorule_add_allow_command)
|
|
|
|
|
|
|
|
|
|
|
|
class sudorule_remove_allow_command(LDAPRemoveMember):
|
|
|
|
"""
|
|
|
|
Remove commands and sudo command groups affected by Sudo Rule.
|
|
|
|
"""
|
|
|
|
member_attributes = ['memberallowcmd']
|
|
|
|
member_count_out = ('%i object removed.', '%i objects removed.')
|
|
|
|
|
|
|
|
api.register(sudorule_remove_allow_command)
|
|
|
|
|
|
|
|
|
|
|
|
class sudorule_add_deny_command(LDAPAddMember):
|
2010-09-27 15:51:28 -05:00
|
|
|
"""
|
|
|
|
Add commands and sudo command groups affected by Sudo Rule.
|
|
|
|
"""
|
2010-10-04 17:56:40 -05:00
|
|
|
member_attributes = ['memberdenycmd']
|
2010-09-27 15:51:28 -05:00
|
|
|
member_count_out = ('%i object added.', '%i objects added.')
|
|
|
|
|
2010-10-04 17:56:40 -05:00
|
|
|
api.register(sudorule_add_deny_command)
|
2010-09-27 15:51:28 -05:00
|
|
|
|
|
|
|
|
2010-10-04 17:56:40 -05:00
|
|
|
class sudorule_remove_deny_command(LDAPRemoveMember):
|
2010-09-27 15:51:28 -05:00
|
|
|
"""
|
|
|
|
Remove commands and sudo command groups affected by Sudo Rule.
|
|
|
|
"""
|
2010-10-04 17:56:40 -05:00
|
|
|
member_attributes = ['memberdenycmd']
|
2010-09-27 15:51:28 -05:00
|
|
|
member_count_out = ('%i object removed.', '%i objects removed.')
|
|
|
|
|
2010-10-04 17:56:40 -05:00
|
|
|
api.register(sudorule_remove_deny_command)
|
2010-09-27 15:51:28 -05:00
|
|
|
|
|
|
|
|
|
|
|
class sudorule_add_user(LDAPAddMember):
|
|
|
|
"""
|
|
|
|
Add users and groups affected by Sudo Rule.
|
|
|
|
"""
|
|
|
|
member_attributes = ['memberuser']
|
|
|
|
member_count_out = ('%i object added.', '%i objects added.')
|
|
|
|
|
2010-12-17 10:29:33 -06:00
|
|
|
def post_callback(self, ldap, completed, failed, dn, entry_attrs, *keys, **options):
|
|
|
|
completed_external = 0
|
|
|
|
# Sift through the user failures. We assume that these are all
|
|
|
|
# users that aren't stored in IPA, aka external users.
|
|
|
|
if 'memberuser' in failed and 'user' in failed['memberuser']:
|
|
|
|
(dn, entry_attrs_) = ldap.get_entry(dn, ['externaluser'])
|
|
|
|
members = entry_attrs.get('memberuser', [])
|
|
|
|
external_users = entry_attrs_.get('externaluser', [])
|
|
|
|
failed_users = []
|
|
|
|
for user in failed['memberuser']['user']:
|
|
|
|
username = user[0].lower()
|
|
|
|
user_dn = self.api.Object['user'].get_dn(username)
|
|
|
|
if username not in external_users and user_dn not in members:
|
|
|
|
external_users.append(username)
|
|
|
|
completed_external += 1
|
|
|
|
else:
|
|
|
|
failed_users.append(username)
|
|
|
|
if completed_external:
|
|
|
|
try:
|
|
|
|
ldap.update_entry(dn, {'externaluser': external_users})
|
|
|
|
except errors.EmptyModlist:
|
|
|
|
pass
|
|
|
|
failed['memberuser']['user'] = failed_users
|
|
|
|
entry_attrs['externaluser'] = external_users
|
|
|
|
return (completed + completed_external, dn)
|
|
|
|
|
2010-09-27 15:51:28 -05:00
|
|
|
api.register(sudorule_add_user)
|
|
|
|
|
|
|
|
|
|
|
|
class sudorule_remove_user(LDAPRemoveMember):
|
|
|
|
"""
|
|
|
|
Remove users and groups affected by Sudo Rule.
|
|
|
|
"""
|
|
|
|
member_attributes = ['memberuser']
|
|
|
|
member_count_out = ('%i object removed.', '%i objects removed.')
|
|
|
|
|
2010-12-17 10:29:33 -06:00
|
|
|
def post_callback(self, ldap, completed, failed, dn, entry_attrs, *keys, **options):
|
|
|
|
# Run through the user failures and gracefully remove any defined as
|
|
|
|
# as an externaluser.
|
|
|
|
if 'memberuser' in failed and 'user' in failed['memberuser']:
|
|
|
|
(dn, entry_attrs) = ldap.get_entry(dn, ['externaluser'])
|
|
|
|
external_users = entry_attrs.get('externaluser', [])
|
|
|
|
failed_users = []
|
|
|
|
completed_external = 0
|
|
|
|
for user in failed['memberuser']['user']:
|
|
|
|
username = user[0].lower()
|
|
|
|
if username in external_users:
|
|
|
|
external_users.remove(username)
|
|
|
|
completed_external += 1
|
|
|
|
else:
|
|
|
|
failed_users.append(username)
|
|
|
|
if completed_external:
|
|
|
|
try:
|
|
|
|
ldap.update_entry(dn, {'externaluser': external_users})
|
|
|
|
except errors.EmptyModlist:
|
|
|
|
pass
|
|
|
|
failed['memberuser']['user'] = failed_users
|
|
|
|
entry_attrs['externaluser'] = external_users
|
|
|
|
return (completed + completed_external, dn)
|
|
|
|
|
2010-09-27 15:51:28 -05:00
|
|
|
api.register(sudorule_remove_user)
|
|
|
|
|
|
|
|
|
|
|
|
class sudorule_add_host(LDAPAddMember):
|
|
|
|
"""
|
|
|
|
Add hosts and hostgroups affected by Sudo Rule.
|
|
|
|
"""
|
|
|
|
member_attributes = ['memberhost']
|
|
|
|
member_count_out = ('%i object added.', '%i objects added.')
|
|
|
|
|
2010-12-17 10:29:33 -06:00
|
|
|
def post_callback(self, ldap, completed, failed, dn, entry_attrs, *keys, **options):
|
|
|
|
completed_external = 0
|
|
|
|
# Sift through the host failures. We assume that these are all
|
|
|
|
# hosts that aren't stored in IPA, aka external hosts.
|
|
|
|
if 'memberhost' in failed and 'host' in failed['memberhost']:
|
|
|
|
(dn, entry_attrs_) = ldap.get_entry(dn, ['externalhost'])
|
|
|
|
members = entry_attrs.get('memberhost', [])
|
|
|
|
external_hosts = entry_attrs_.get('externalhost', [])
|
|
|
|
failed_hosts = []
|
|
|
|
for host in failed['memberhost']['host']:
|
|
|
|
hostname = host[0].lower()
|
|
|
|
host_dn = self.api.Object['host'].get_dn(hostname)
|
|
|
|
if hostname not in external_hosts and host_dn not in members:
|
|
|
|
external_hosts.append(hostname)
|
|
|
|
completed_external += 1
|
|
|
|
else:
|
|
|
|
failed_hosts.append(hostname)
|
|
|
|
if completed_external:
|
|
|
|
try:
|
|
|
|
ldap.update_entry(dn, {'externalhost': external_hosts})
|
|
|
|
except errors.EmptyModlist:
|
|
|
|
pass
|
|
|
|
failed['memberhost']['host'] = failed_hosts
|
|
|
|
entry_attrs['externalhost'] = external_hosts
|
|
|
|
return (completed + completed_external, dn)
|
|
|
|
|
2010-09-27 15:51:28 -05:00
|
|
|
api.register(sudorule_add_host)
|
|
|
|
|
|
|
|
|
|
|
|
class sudorule_remove_host(LDAPRemoveMember):
|
|
|
|
"""
|
|
|
|
Remove hosts and hostgroups affected by Sudo Rule.
|
|
|
|
"""
|
|
|
|
member_attributes = ['memberhost']
|
|
|
|
member_count_out = ('%i object removed.', '%i objects removed.')
|
|
|
|
|
2010-12-17 10:29:33 -06:00
|
|
|
def post_callback(self, ldap, completed, failed, dn, entry_attrs, *keys, **options):
|
|
|
|
# Run through the host failures and gracefully remove any defined as
|
|
|
|
# as an externalhost.
|
|
|
|
if 'memberhost' in failed and 'host' in failed['memberhost']:
|
2011-06-13 13:35:45 -05:00
|
|
|
(dn, entry_attrs_) = ldap.get_entry(dn, ['externalhost'])
|
|
|
|
external_hosts = entry_attrs_.get('externalhost', [])
|
2010-12-17 10:29:33 -06:00
|
|
|
failed_hosts = []
|
|
|
|
completed_external = 0
|
|
|
|
for host in failed['memberhost']['host']:
|
|
|
|
hostname = host[0].lower()
|
|
|
|
if hostname in external_hosts:
|
|
|
|
external_hosts.remove(hostname)
|
|
|
|
completed_external += 1
|
|
|
|
else:
|
|
|
|
failed_hosts.append(hostname)
|
|
|
|
if completed_external:
|
|
|
|
try:
|
|
|
|
ldap.update_entry(dn, {'externalhost': external_hosts})
|
|
|
|
except errors.EmptyModlist:
|
|
|
|
pass
|
|
|
|
failed['memberhost']['host'] = failed_hosts
|
2011-06-16 14:18:16 -05:00
|
|
|
if external_hosts:
|
|
|
|
entry_attrs['externalhost'] = external_hosts
|
2010-12-17 10:29:33 -06:00
|
|
|
return (completed + completed_external, dn)
|
|
|
|
|
2010-09-27 15:51:28 -05:00
|
|
|
api.register(sudorule_remove_host)
|
2010-12-13 09:38:09 -06:00
|
|
|
|
|
|
|
|
|
|
|
class sudorule_add_runasuser(LDAPAddMember):
|
|
|
|
"""
|
2011-06-17 05:48:38 -05:00
|
|
|
Add users and groups for Sudo to execute as.
|
2010-12-13 09:38:09 -06:00
|
|
|
"""
|
|
|
|
member_attributes = ['ipasudorunas']
|
|
|
|
member_count_out = ('%i object added.', '%i objects added.')
|
|
|
|
|
2011-01-07 17:29:00 -06:00
|
|
|
def post_callback(self, ldap, completed, failed, dn, entry_attrs, *keys, **options):
|
|
|
|
completed_external = 0
|
|
|
|
# Sift through the user failures. We assume that these are all
|
|
|
|
# users that aren't stored in IPA, aka external users.
|
|
|
|
if 'ipasudorunas' in failed and 'user' in failed['ipasudorunas']:
|
|
|
|
(dn, entry_attrs_) = ldap.get_entry(dn, ['ipasudorunasextuser'])
|
|
|
|
members = entry_attrs.get('ipasudorunas', [])
|
|
|
|
external_users = entry_attrs_.get('ipasudorunasextuser', [])
|
|
|
|
failed_users = []
|
|
|
|
for user in failed['ipasudorunas']['user']:
|
|
|
|
username = user[0].lower()
|
|
|
|
user_dn = self.api.Object['user'].get_dn(username)
|
|
|
|
if username not in external_users and user_dn not in members:
|
|
|
|
external_users.append(username)
|
|
|
|
completed_external += 1
|
|
|
|
else:
|
|
|
|
failed_users.append(username)
|
|
|
|
if completed_external:
|
|
|
|
try:
|
|
|
|
ldap.update_entry(dn, {'ipasudorunasextuser': external_users})
|
|
|
|
except errors.EmptyModlist:
|
|
|
|
pass
|
|
|
|
failed['ipasudorunas']['user'] = failed_users
|
|
|
|
entry_attrs['ipasudorunasextuser'] = external_users
|
|
|
|
return (completed + completed_external, dn)
|
|
|
|
|
2010-12-13 09:38:09 -06:00
|
|
|
api.register(sudorule_add_runasuser)
|
|
|
|
|
|
|
|
|
|
|
|
class sudorule_remove_runasuser(LDAPRemoveMember):
|
|
|
|
"""
|
2011-06-17 05:48:38 -05:00
|
|
|
Remove users and groups for Sudo to execute as.
|
2010-12-13 09:38:09 -06:00
|
|
|
"""
|
|
|
|
member_attributes = ['ipasudorunas']
|
|
|
|
member_count_out = ('%i object removed.', '%i objects removed.')
|
|
|
|
|
2011-01-07 17:29:00 -06:00
|
|
|
def post_callback(self, ldap, completed, failed, dn, entry_attrs, *keys, **options):
|
|
|
|
# Run through the user failures and gracefully remove any defined as
|
|
|
|
# as an externaluser.
|
|
|
|
if 'ipasudorunas' in failed and 'user' in failed['ipasudorunas']:
|
|
|
|
(dn, entry_attrs) = ldap.get_entry(dn, ['ipasudorunasextuser'])
|
|
|
|
external_users = entry_attrs.get('ipasudorunasextuser', [])
|
|
|
|
failed_users = []
|
|
|
|
completed_external = 0
|
|
|
|
for user in failed['ipasudorunas']['user']:
|
|
|
|
username = user[0].lower()
|
|
|
|
if username in external_users:
|
|
|
|
external_users.remove(username)
|
|
|
|
completed_external += 1
|
|
|
|
else:
|
|
|
|
failed_users.append(username)
|
|
|
|
if completed_external:
|
|
|
|
try:
|
|
|
|
ldap.update_entry(dn, {'ipasudorunasextuser': external_users})
|
|
|
|
except errors.EmptyModlist:
|
|
|
|
pass
|
|
|
|
failed['ipasudorunas']['user'] = failed_users
|
|
|
|
entry_attrs['ipasudorunasextuser'] = external_users
|
|
|
|
return (completed + completed_external, dn)
|
|
|
|
|
2010-12-13 09:38:09 -06:00
|
|
|
api.register(sudorule_remove_runasuser)
|
|
|
|
|
|
|
|
|
|
|
|
class sudorule_add_runasgroup(LDAPAddMember):
|
|
|
|
"""
|
|
|
|
Add group for Sudo to execute as.
|
|
|
|
"""
|
|
|
|
member_attributes = ['ipasudorunasgroup']
|
|
|
|
member_count_out = ('%i object added.', '%i objects added.')
|
|
|
|
|
2011-01-07 17:29:00 -06:00
|
|
|
def post_callback(self, ldap, completed, failed, dn, entry_attrs, *keys, **options):
|
|
|
|
completed_external = 0
|
|
|
|
# Sift through the group failures. We assume that these are all
|
|
|
|
# groups that aren't stored in IPA, aka external groups.
|
|
|
|
if 'ipasudorunasgroup' in failed and 'group' in failed['ipasudorunasgroup']:
|
|
|
|
(dn, entry_attrs_) = ldap.get_entry(dn, ['ipasudorunasextgroup'])
|
|
|
|
members = entry_attrs.get('ipasudorunasgroup', [])
|
|
|
|
external_groups = entry_attrs_.get('ipasudorunasextgroup', [])
|
|
|
|
failed_groups = []
|
|
|
|
for group in failed['ipasudorunasgroup']['group']:
|
|
|
|
groupname = group[0].lower()
|
|
|
|
group_dn = self.api.Object['group'].get_dn(groupname)
|
|
|
|
if groupname not in external_groups and group_dn not in members:
|
|
|
|
external_groups.append(groupname)
|
|
|
|
completed_external += 1
|
|
|
|
else:
|
|
|
|
failed_groups.append(groupname)
|
|
|
|
if completed_external:
|
|
|
|
try:
|
|
|
|
ldap.update_entry(dn, {'ipasudorunasextgroup': external_groups})
|
|
|
|
except errors.EmptyModlist:
|
|
|
|
pass
|
|
|
|
failed['ipasudorunasgroup']['group'] = failed_groups
|
|
|
|
entry_attrs['ipasudorunasextgroup'] = external_groups
|
|
|
|
return (completed + completed_external, dn)
|
|
|
|
|
2010-12-13 09:38:09 -06:00
|
|
|
api.register(sudorule_add_runasgroup)
|
|
|
|
|
|
|
|
|
|
|
|
class sudorule_remove_runasgroup(LDAPRemoveMember):
|
|
|
|
"""
|
|
|
|
Remove group for Sudo to execute as.
|
|
|
|
"""
|
|
|
|
member_attributes = ['ipasudorunasgroup']
|
|
|
|
member_count_out = ('%i object removed.', '%i objects removed.')
|
|
|
|
|
2011-01-07 17:29:00 -06:00
|
|
|
def post_callback(self, ldap, completed, failed, dn, entry_attrs, *keys, **options):
|
|
|
|
# Run through the group failures and gracefully remove any defined as
|
|
|
|
# as an external group.
|
|
|
|
if 'ipasudorunasgroup' in failed and 'group' in failed['ipasudorunasgroup']:
|
|
|
|
(dn, entry_attrs) = ldap.get_entry(dn, ['ipasudorunasextgroup'])
|
|
|
|
external_groups = entry_attrs.get('ipasudorunasextgroup', [])
|
|
|
|
failed_groups = []
|
|
|
|
completed_external = 0
|
|
|
|
for group in failed['ipasudorunasgroup']['group']:
|
|
|
|
groupname = group[0].lower()
|
|
|
|
if groupname in external_groups:
|
|
|
|
external_groups.remove(groupname)
|
|
|
|
completed_external += 1
|
|
|
|
else:
|
|
|
|
failed_groups.append(groupname)
|
|
|
|
if completed_external:
|
|
|
|
try:
|
|
|
|
ldap.update_entry(dn, {'ipasudorunasextgroup': external_groups})
|
|
|
|
except errors.EmptyModlist:
|
|
|
|
pass
|
|
|
|
failed['ipasudorunasgroup']['group'] = failed_groups
|
|
|
|
entry_attrs['ipasudorunasextgroup'] = external_groups
|
|
|
|
return (completed + completed_external, dn)
|
|
|
|
|
2010-12-13 09:38:09 -06:00
|
|
|
api.register(sudorule_remove_runasgroup)
|
2010-12-17 10:29:33 -06:00
|
|
|
|
|
|
|
|
|
|
|
class sudorule_add_option(LDAPQuery):
|
|
|
|
"""
|
|
|
|
Add an option to the Sudo rule.
|
|
|
|
"""
|
|
|
|
|
|
|
|
takes_options = (
|
|
|
|
Str('ipasudoopt',
|
|
|
|
cli_name='sudooption',
|
|
|
|
label=_('Sudo Option'),
|
|
|
|
),
|
|
|
|
)
|
|
|
|
|
|
|
|
def execute(self, cn, **options):
|
|
|
|
ldap = self.obj.backend
|
|
|
|
|
|
|
|
dn = self.obj.get_dn(cn)
|
|
|
|
|
2011-06-16 13:57:13 -05:00
|
|
|
if not options['ipasudoopt'].strip():
|
|
|
|
raise errors.EmptyModlist()
|
2010-12-17 10:29:33 -06:00
|
|
|
(dn, entry_attrs) = ldap.get_entry(dn, ['ipasudoopt'])
|
2011-02-28 10:44:27 -06:00
|
|
|
|
2011-06-16 13:57:13 -05:00
|
|
|
try:
|
|
|
|
if options['ipasudoopt'] not in entry_attrs['ipasudoopt']:
|
|
|
|
entry_attrs.setdefault('ipasudoopt', []).append(
|
|
|
|
options['ipasudoopt'])
|
|
|
|
else:
|
|
|
|
raise errors.DuplicateEntry
|
|
|
|
except KeyError:
|
|
|
|
entry_attrs.setdefault('ipasudoopt', []).append(
|
|
|
|
options['ipasudoopt'])
|
2010-12-17 10:29:33 -06:00
|
|
|
try:
|
|
|
|
ldap.update_entry(dn, entry_attrs)
|
|
|
|
except errors.EmptyModlist:
|
|
|
|
pass
|
|
|
|
except errors.NotFound:
|
|
|
|
self.obj.handle_not_found(cn)
|
|
|
|
|
2011-06-16 13:57:13 -05:00
|
|
|
attrs_list = self.obj.default_attributes
|
|
|
|
(dn, entry_attrs) = ldap.get_entry(
|
|
|
|
dn, attrs_list, normalize=self.obj.normalize_dn
|
2010-12-17 10:29:33 -06:00
|
|
|
)
|
2011-06-16 13:57:13 -05:00
|
|
|
|
|
|
|
return dict(result=entry_attrs)
|
2010-12-17 10:29:33 -06:00
|
|
|
|
|
|
|
api.register(sudorule_add_option)
|
|
|
|
|
|
|
|
|
|
|
|
class sudorule_remove_option(LDAPQuery):
|
|
|
|
"""
|
|
|
|
Remove an option from Sudo rule.
|
|
|
|
"""
|
|
|
|
takes_options = (
|
2011-06-16 13:57:13 -05:00
|
|
|
Str('ipasudoopt',
|
2010-12-17 10:29:33 -06:00
|
|
|
cli_name='sudooption',
|
|
|
|
label=_('Sudo Option'),
|
|
|
|
),
|
|
|
|
)
|
|
|
|
|
|
|
|
def execute(self, cn, **options):
|
|
|
|
ldap = self.obj.backend
|
|
|
|
|
|
|
|
dn = self.obj.get_dn(cn)
|
|
|
|
|
2011-06-16 13:57:13 -05:00
|
|
|
if not options['ipasudoopt'].strip():
|
|
|
|
raise errors.EmptyModlist()
|
2010-12-17 10:29:33 -06:00
|
|
|
(dn, entry_attrs) = ldap.get_entry(dn, ['ipasudoopt'])
|
|
|
|
try:
|
2011-06-16 13:57:13 -05:00
|
|
|
if options['ipasudoopt'] in entry_attrs['ipasudoopt']:
|
|
|
|
entry_attrs.setdefault('ipasudoopt', []).remove(
|
|
|
|
options['ipasudoopt'])
|
|
|
|
ldap.update_entry(dn, entry_attrs)
|
|
|
|
else:
|
|
|
|
raise errors.AttrValueNotFound(
|
|
|
|
attr='ipasudoopt',
|
|
|
|
value=options['ipasudoopt']
|
|
|
|
)
|
|
|
|
except ValueError, e:
|
2010-12-17 10:29:33 -06:00
|
|
|
pass
|
2011-06-16 13:57:13 -05:00
|
|
|
except KeyError:
|
|
|
|
raise errors.AttrValueNotFound(
|
|
|
|
attr='ipasudoopt',
|
|
|
|
value=options['ipasudoopt']
|
|
|
|
)
|
2010-12-17 10:29:33 -06:00
|
|
|
except errors.NotFound:
|
|
|
|
self.obj.handle_not_found(cn)
|
|
|
|
|
2011-06-16 13:57:13 -05:00
|
|
|
attrs_list = self.obj.default_attributes
|
|
|
|
(dn, entry_attrs) = ldap.get_entry(
|
|
|
|
dn, attrs_list, normalize=self.obj.normalize_dn
|
2010-12-17 10:29:33 -06:00
|
|
|
)
|
2011-06-16 13:57:13 -05:00
|
|
|
|
|
|
|
return dict(result=entry_attrs)
|
2010-12-17 10:29:33 -06:00
|
|
|
|
|
|
|
api.register(sudorule_remove_option)
|