ipaplatform: Remove legacy redhat platform module

https://fedorahosted.org/freeipa/ticket/4052

Reviewed-By: Petr Viktorin <pviktori@redhat.com>
This commit is contained in:
Tomas Babej 2014-05-27 12:36:14 +02:00 committed by Petr Viktorin
parent 5f31f2d35f
commit 3edfabb4c4
2 changed files with 0 additions and 282 deletions

View File

@ -1,95 +0,0 @@
# Authors: Simo Sorce <ssorce@redhat.com>
# Alexander Bokovoy <abokovoy@redhat.com>
#
# Copyright (C) 2007-2011 Red Hat
# see file 'COPYING' for use and warranty information
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
#
import os
import socket
import stat
import sys
from ipapython import ipautil
from ipapython.platform import base
from ipapython.platform.redhat.auth import RedHatAuthConfig
from ipapython.platform.redhat.service import redhat_service, RedHatServices
# All what we allow exporting directly from this module
# Everything else is made available through these symbols when they are
# directly imported into ipapython.services:
#
# authconfig -- class reference for platform-specific implementation of
# authconfig(8)
# service -- class reference for platform-specific implementation of a
# PlatformService class
# knownservices -- factory instance to access named services IPA cares about,
# names are ipapython.services.wellknownservices
# backup_and_replace_hostname -- platform-specific way to set hostname and
# make it persistent over reboots
# restore_network_configuration -- platform-specific way of restoring network
# configuration (e.g. static hostname)
# restore_context -- platform-sepcific way to restore security context, if
# applicable
# check_selinux_status -- platform-specific way to see if SELinux is enabled
# and restorecon is installed.
__all__ = ['authconfig', 'service', 'knownservices',
'backup_and_replace_hostname', 'restore_context', 'check_selinux_status',
'restore_network_configuration', 'timedate_services', 'FIREFOX_EXEC',
'FIREFOX_INSTALL_DIRS', 'FIREFOX_PREFERENCES_REL_PATH']
# Just copy a referential list of timedate services
timedate_services = list(base.timedate_services)
authconfig = RedHatAuthConfig
service = redhat_service
knownservices = RedHatServices()
def backup_and_replace_hostname(fstore, statestore, hostname):
old_hostname = socket.gethostname()
try:
ipautil.run(['/bin/hostname', hostname])
except ipautil.CalledProcessError, e:
print >>sys.stderr, "Failed to set this machine hostname to %s (%s)." % (hostname, str(e))
replacevars = {'HOSTNAME':hostname}
filepath = '/etc/sysconfig/network'
if not os.path.exists(filepath):
# file doesn't exist; create it with correct ownership & mode
open(filepath, 'a').close()
os.chmod(filepath,
stat.S_IRUSR | stat.S_IWUSR | stat.S_IRGRP | stat.S_IROTH)
os.chown(filepath, 0, 0)
old_values = ipautil.backup_config_and_replace_variables(
fstore, filepath, replacevars=replacevars)
restore_context("/etc/sysconfig/network")
if 'HOSTNAME' in old_values:
statestore.backup_state('network', 'hostname', old_values['HOSTNAME'])
else:
statestore.backup_state('network', 'hostname', old_hostname)
def restore_network_configuration(fstore, statestore):
filepath = '/etc/sysconfig/network'
if fstore.has_file(filepath):
fstore.restore_file(filepath)
# Firefox paths
FIREFOX_EXEC = base.FIREFOX_EXEC
FIREFOX_INSTALL_DIRS = base.FIREFOX_INSTALL_DIRS
FIREFOX_PREFERENCES_REL_PATH = base.FIREFOX_PREFERENCES_REL_PATH

View File

@ -1,187 +0,0 @@
# Authors: Simo Sorce <ssorce@redhat.com>
# Alexander Bokovoy <abokovoy@redhat.com>
#
# Copyright (C) 2007-2011 Red Hat
# see file 'COPYING' for use and warranty information
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
#
import time
from ipapython import ipautil
from ipapython.ipa_log_manager import root_logger
from ipapython.platform import base
from ipalib import api
class RedHatService(base.PlatformService):
def __wait_for_open_ports(self, instance_name=""):
"""
If this is a service we need to wait for do so.
"""
ports = None
if instance_name in base.wellknownports:
ports = base.wellknownports[instance_name]
else:
if self.service_name in base.wellknownports:
ports = base.wellknownports[self.service_name]
if ports:
ipautil.wait_for_open_ports('localhost', ports, api.env.startup_timeout)
def stop(self, instance_name="", capture_output=True):
ipautil.run(["/sbin/service", self.service_name, "stop", instance_name], capture_output=capture_output)
super(RedHatService, self).stop(instance_name)
def start(self, instance_name="", capture_output=True, wait=True):
ipautil.run(["/sbin/service", self.service_name, "start", instance_name], capture_output=capture_output)
if wait and self.is_running(instance_name):
self.__wait_for_open_ports(instance_name)
super(RedHatService, self).start(instance_name)
def restart(self, instance_name="", capture_output=True, wait=True):
ipautil.run(["/sbin/service", self.service_name, "restart", instance_name], capture_output=capture_output)
if wait and self.is_running(instance_name):
self.__wait_for_open_ports(instance_name)
def is_running(self, instance_name=""):
ret = True
try:
(sout,serr,rcode) = ipautil.run(["/sbin/service", self.service_name, "status", instance_name])
if sout.find("is stopped") >= 0:
ret = False
except ipautil.CalledProcessError:
ret = False
return ret
def is_installed(self):
installed = True
try:
ipautil.run(["/sbin/service", self.service_name, "status"])
except ipautil.CalledProcessError, e:
if e.returncode == 1:
# service is not installed or there is other serious issue
installed = False
return installed
def is_enabled(self, instance_name=""):
(stdout, stderr, returncode) = ipautil.run(["/sbin/chkconfig", self.service_name],raiseonerr=False)
return (returncode == 0)
def enable(self, instance_name=""):
ipautil.run(["/sbin/chkconfig", self.service_name, "on"])
def disable(self, instance_name=""):
ipautil.run(["/sbin/chkconfig", self.service_name, "off"])
def install(self, instance_name=""):
ipautil.run(["/sbin/chkconfig", "--add", self.service_name])
def remove(self, instance_name=""):
ipautil.run(["/sbin/chkconfig", "--del", self.service_name])
class RedHatSSHService(RedHatService):
def get_config_dir(self, instance_name=""):
return '/etc/ssh'
class RedHatHTTPDService(RedHatService):
def restart(self, instance_name="", capture_output=True, wait=True):
try:
super(RedHatHTTPDService, self).restart(instance_name, capture_output, wait)
except ipautil.CalledProcessError:
# http may have issues with binding to ports, try to fallback
# https://bugzilla.redhat.com/show_bug.cgi?id=845405
root_logger.debug("%s restart failed, try to stop&start again", self.service_name)
time.sleep(5)
self.stop(instance_name, capture_output)
time.sleep(5)
self.start(instance_name, capture_output, wait)
class RedHatDirectoryService(RedHatService):
# This has been moved from dsinstance.py here to platform-level
# to continue support sysV services
def tune_nofile_platform(self, num=8192, fstore=None):
"""
Increase the number of files descriptors available to directory server
from the default 1024 to 8192. This will allow to support a greater
number of clients out of the box.
This is a part of the implementation that is sysV-specific.
Returns False if the setting of the nofile limit needs to be skipped.
"""
DS_USER = 'dirsrv'
# check limits.conf
need_limits = True
with open("/etc/security/limits.conf", "r") as f:
for line in f:
sline = line.strip()
if not sline.startswith(DS_USER) or sline.find('nofile') == -1:
continue
# ok we already have an explicit entry for user/nofile
need_limits = False
# check sysconfig/dirsrv
need_sysconf = True
with open("/etc/sysconfig/dirsrv", "r") as f:
for line in f:
sline = line.strip()
if not sline.startswith('ulimit') or sline.find('-n') == -1:
continue
# ok we already have an explicit entry for file limits
need_sysconf = False
#if sysconf or limits are set avoid messing up and defer to the admin
if need_sysconf and need_limits:
if fstore:
fstore.backup_file("/etc/security/limits.conf")
with open("/etc/security/limits.conf", "a+") as f:
f.write('%s\t\t-\tnofile\t\t%s\n' % (DS_USER, str(num)))
with open("/etc/sysconfig/dirsrv", "a+") as f:
f.write('ulimit -n %s\n' % str(num))
else:
root_logger.info("Custom file limits are already set! Skipping\n")
return False
return True
def redhat_service(name):
if name == 'sshd':
return RedHatSSHService(name)
elif name == 'httpd':
return RedHatHTTPDService(name)
elif name == 'dirsrv':
return RedHatDirectoryService(name)
return RedHatService(name)
class RedHatServices(base.KnownServices):
def __init__(self):
services = dict()
for s in base.wellknownservices:
services[s] = redhat_service(s)
# Call base class constructor. This will lock services to read-only
super(RedHatServices, self).__init__(services)