remove radius_client.py, move contents to radius_util.py

This commit is contained in:
John Dennis
2007-11-26 11:12:58 -05:00
parent 2c2069d3ec
commit 4f33d67418
7 changed files with 155 additions and 178 deletions

View File

@@ -23,7 +23,6 @@ import os
from optparse import OptionParser from optparse import OptionParser
import copy import copy
from ipa.radius_client import *
import ipa.ipaclient as ipaclient import ipa.ipaclient as ipaclient
import ipa.ipautil as ipautil import ipa.ipautil as ipautil
import ipa.config import ipa.config
@@ -121,7 +120,7 @@ def main():
pass pass
c = ipautil.AttributeValueCompleter(radius_attrs, pairs) c = ipautil.AttributeValueCompleter(radius_attrs, pairs)
c.open() c.open()
av = c.get_pairs("Enter: ", interactive_mandatory_attrs, validate) av = c.get_pairs("Enter: ", interactive_mandatory_attrs, radius_util.validate)
pairs.update(av) pairs.update(av)
c.close() c.close()
@@ -156,7 +155,7 @@ def main():
# Makse sure each value is valid # Makse sure each value is valid
valid = True valid = True
for attr,value in pairs.items(): for attr,value in pairs.items():
if not validate(attr, value): if not radius_util.validate(attr, value):
valid = False valid = False
if not valid: if not valid:
return 1 return 1
@@ -167,7 +166,7 @@ def main():
for attr,value in pairs.items(): for attr,value in pairs.items():
print "\t%s = %s" % (attr, value) print "\t%s = %s" % (attr, value)
radius_client = ipa.radius_client.RadiusClient() radius_client = radius_util.RadiusClient()
for attr,value in pairs.items(): for attr,value in pairs.items():
radius_client.setValue(radius_util.radius_client_attr_to_ldap_attr[attr], value) radius_client.setValue(radius_util.radius_client_attr_to_ldap_attr[attr], value)

View File

@@ -22,7 +22,6 @@ import os
import sys import sys
from optparse import OptionParser from optparse import OptionParser
import ipa import ipa
from ipa.radius_client import *
import ipa.ipaclient as ipaclient import ipa.ipaclient as ipaclient
import ipa.ipavalidate as ipavalidate import ipa.ipavalidate as ipavalidate
import ipa.config import ipa.config

View File

@@ -22,7 +22,6 @@ import os
import sys import sys
from optparse import OptionParser from optparse import OptionParser
import ipa import ipa
from ipa.radius_client import *
from ipa import radius_util from ipa import radius_util
import ipa.ipaclient as ipaclient import ipa.ipaclient as ipaclient
import ipa.ipavalidate as ipavalidate import ipa.ipavalidate as ipavalidate

View File

@@ -23,7 +23,6 @@ import os
from optparse import OptionParser from optparse import OptionParser
import copy import copy
from ipa.radius_client import *
import ipa.ipaclient as ipaclient import ipa.ipaclient as ipaclient
import ipa.ipautil as ipautil import ipa.ipautil as ipautil
import ipa.config import ipa.config
@@ -90,7 +89,7 @@ def main():
pairs['Client-IP-Address'] = ip_addr pairs['Client-IP-Address'] = ip_addr
# Verify client previously exists and get current values # Verify client previously exists and get current values
radius_client = ipa.radius_client.RadiusClient() radius_client = radius_util.RadiusClient()
ipa_client = ipaclient.IPAClient() ipa_client = ipaclient.IPAClient()
try: try:
radius_client = ipa_client.get_radius_client_by_ip_addr(ip_addr) radius_client = ipa_client.get_radius_client_by_ip_addr(ip_addr)
@@ -141,7 +140,7 @@ def main():
pass pass
c = ipautil.AttributeValueCompleter(radius_attrs, pairs) c = ipautil.AttributeValueCompleter(radius_attrs, pairs)
c.open() c.open()
av = c.get_pairs("Enter: ", interactive_mandatory_attrs, validate) av = c.get_pairs("Enter: ", interactive_mandatory_attrs, radius_util.validate)
pairs.update(av) pairs.update(av)
c.close() c.close()
@@ -176,7 +175,7 @@ def main():
# Makse sure each value is valid # Makse sure each value is valid
valid = True valid = True
for attr,value in pairs.items(): for attr,value in pairs.items():
if not validate(attr, value): if not radius_util.validate(attr, value):
valid = False valid = False
if not valid: if not valid:
return 1 return 1

View File

@@ -27,7 +27,7 @@ import user
import group import group
import ipa import ipa
import config import config
import radius_client import radius_util
class IPAClient: class IPAClient:
@@ -336,7 +336,7 @@ class IPAClient:
# radius support # radius support
def get_radius_client_by_ip_addr(self, ip_addr, container=None, sattrs=None): def get_radius_client_by_ip_addr(self, ip_addr, container=None, sattrs=None):
result = self.transport.get_radius_client_by_ip_addr(ip_addr, container, sattrs) result = self.transport.get_radius_client_by_ip_addr(ip_addr, container, sattrs)
return radius_client.RadiusClient(result) return radius_util.RadiusClient(result)
def add_radius_client(self,client, container=None): def add_radius_client(self,client, container=None):
client_dict = client.toDict() client_dict = client.toDict()

View File

@@ -1,165 +0,0 @@
# Authors: John Dennis <jdennis@redhat.com>
#
# Copyright (C) 2007 Red Hat
# see file 'COPYING' for use and warranty information
#
# This program is free software; you can redistribute it and/or
# modify it under the terms of the GNU General Public License as
# published by the Free Software Foundation; version 2 only
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
#
import getpass
import re
from ipa.entity import Entity
import ipa.ipavalidate as ipavalidate
__all__ = ['RadiusClient',
'get_secret',
'validate_ip_addr',
'validate_secret',
'validate_name',
'validate_nastype',
'validate_desc',
'validate',
]
#------------------------------------------------------------------------------
dotted_octet_re = re.compile(r"^(\d+)\.(\d+)\.(\d+)\.(\d+)(/(\d+))?$")
dns_re = re.compile(r"^[a-zA-Z][a-zA-Z0-9.-]+$")
# secret, name, nastype all have 31 char max in freeRADIUS, max ip address len is 255
valid_secret_len = (1,31)
valid_name_len = (1,31)
valid_nastype_len = (1,31)
valid_ip_addr_len = (1,255)
valid_ip_addr_msg = '''\
IP address must be either a DNS name (letters,digits,dot,hyphen, beginning with
a letter),or a dotted octet followed by an optional mask (e.g 192.168.1.0/24)'''
valid_desc_msg = "Description must text string"
#------------------------------------------------------------------------------
class RadiusClient(Entity):
def __init2__(self):
pass
#------------------------------------------------------------------------------
def get_secret():
valid = False
while (not valid):
secret = getpass.getpass("Enter Secret: ")
confirm = getpass.getpass("Confirm Secret: ")
if (secret != confirm):
print "Secrets do not match"
continue
valid = True
return secret
#------------------------------------------------------------------------------
def valid_ip_addr(text):
# is it a dotted octet? If so there should be 4 integers seperated
# by a dot and each integer should be between 0 and 255
# there may be an optional mask preceded by a slash (e.g. 1.2.3.4/24)
match = dotted_octet_re.search(text)
if match:
# dotted octet notation
i = 1
while i <= 4:
octet = int(match.group(i))
if octet > 255: return False
i += 1
if match.group(5):
mask = int(match.group(6))
if mask <= 32:
return True
else:
return False
return True
else:
# DNS name, can contain letters, numbers, dot and hypen, must start with a letter
if dns_re.search(text): return True
return False
def validate_length(value, limits):
length = len(value)
if length < limits[0] or length > limits[1]:
return False
return True
def valid_length_msg(name, limits):
return "%s length must be at least %d and not more than %d" % (name, limits[0], limits[1])
def err_msg(variable, variable_name=None):
if variable_name is None: variable_name = 'value'
print "ERROR: %s = %s" % (variable_name, variable)
#------------------------------------------------------------------------------
def validate_ip_addr(ip_addr, variable_name=None):
if not validate_length(ip_addr, valid_ip_addr_len):
err_msg(ip_addr, variable_name)
print valid_length_msg('ip address', valid_ip_addr_len)
return False
if not valid_ip_addr(ip_addr):
err_msg(ip_addr, variable_name)
print valid_ip_addr_msg
return False
return True
def validate_secret(secret, variable_name=None):
if not validate_length(secret, valid_secret_len):
err_msg(secret, variable_name)
print valid_length_msg('secret', valid_secret_len)
return False
return True
def validate_name(name, variable_name=None):
if not validate_length(name, valid_name_len):
err_msg(name, variable_name)
print valid_length_msg('name', valid_name_len)
return False
return True
def validate_nastype(nastype, variable_name=None):
if not validate_length(nastype, valid_nastype_len):
err_msg(nastype, variable_name)
print valid_length_msg('NAS Type', valid_nastype_len)
return False
return True
def validate_desc(desc, variable_name=None):
if ipavalidate.plain(desc, notEmpty=True) != 0:
print valid_desc_msg
return False
return True
def validate(attribute, value):
if attribute == 'Client-IP-Address':
return validate_ip_addr(value, attribute)
if attribute == 'Secret':
return validate_secret(value, attribute)
if attribute == 'NAS-Type':
return validate_nastype(value, attribute)
if attribute == 'Name':
return validate_name(value, attribute)
if attribute == 'Description':
return validate_desc(value, attribute)
return True

View File

@@ -21,9 +21,12 @@ import sys
import os import os
import re import re
import ldap import ldap
import getpass
import ldap.filter import ldap.filter
from ipa import ipautil from ipa import ipautil
from ipa.entity import Entity
import ipa.ipavalidate as ipavalidate
__all__ = [ __all__ = [
@@ -37,6 +40,9 @@ __all__ = [
'RADIUSD_CONF_TEMPLATE_FILEPATH', 'RADIUSD_CONF_TEMPLATE_FILEPATH',
'RADIUSD', 'RADIUSD',
'RadiusClient',
'RadiusProfile',
'clients_container', 'clients_container',
'radius_clients_basedn', 'radius_clients_basedn',
'radius_client_filter', 'radius_client_filter',
@@ -54,7 +60,15 @@ __all__ = [
'radius_profile_attr_to_ldap_attr', 'radius_profile_attr_to_ldap_attr',
'read_pairs_file', 'read_pairs_file',
]
'get_secret',
'validate_ip_addr',
'validate_secret',
'validate_name',
'validate_nastype',
'validate_desc',
'validate',
]
#------------------------------------------------------------------------------ #------------------------------------------------------------------------------
@@ -71,6 +85,35 @@ RADIUSD_CONF_TEMPLATE_FILEPATH = os.path.join(ipautil.SHARE_DIR, 'radius.rad
RADIUSD = '/usr/sbin/radiusd' RADIUSD = '/usr/sbin/radiusd'
#------------------------------------------------------------------------------
dotted_octet_re = re.compile(r"^(\d+)\.(\d+)\.(\d+)\.(\d+)(/(\d+))?$")
dns_re = re.compile(r"^[a-zA-Z][a-zA-Z0-9.-]+$")
# secret, name, nastype all have 31 char max in freeRADIUS, max ip address len is 255
valid_secret_len = (1,31)
valid_name_len = (1,31)
valid_nastype_len = (1,31)
valid_ip_addr_len = (1,255)
valid_ip_addr_msg = '''\
IP address must be either a DNS name (letters,digits,dot,hyphen, beginning with
a letter),or a dotted octet followed by an optional mask (e.g 192.168.1.0/24)'''
valid_desc_msg = "Description must text string"
#------------------------------------------------------------------------------
class RadiusClient(Entity):
def __init2__(self):
pass
class RadiusProfile(Entity):
def __init2__(self):
pass
#------------------------------------------------------------------------------ #------------------------------------------------------------------------------
def reverse_map_dict(src_dict): def reverse_map_dict(src_dict):
@@ -232,3 +275,106 @@ def get_ldap_attr_translations():
#for k,v in ldap_attr_to_radius_attr.items(): #for k,v in ldap_attr_to_radius_attr.items():
# print '%s --> %s' % (k,v) # print '%s --> %s' % (k,v)
def get_secret():
valid = False
while (not valid):
secret = getpass.getpass("Enter Secret: ")
confirm = getpass.getpass("Confirm Secret: ")
if (secret != confirm):
print "Secrets do not match"
continue
valid = True
return secret
#------------------------------------------------------------------------------
def valid_ip_addr(text):
# is it a dotted octet? If so there should be 4 integers seperated
# by a dot and each integer should be between 0 and 255
# there may be an optional mask preceded by a slash (e.g. 1.2.3.4/24)
match = dotted_octet_re.search(text)
if match:
# dotted octet notation
i = 1
while i <= 4:
octet = int(match.group(i))
if octet > 255: return False
i += 1
if match.group(5):
mask = int(match.group(6))
if mask <= 32:
return True
else:
return False
return True
else:
# DNS name, can contain letters, numbers, dot and hypen, must start with a letter
if dns_re.search(text): return True
return False
def validate_length(value, limits):
length = len(value)
if length < limits[0] or length > limits[1]:
return False
return True
def valid_length_msg(name, limits):
return "%s length must be at least %d and not more than %d" % (name, limits[0], limits[1])
def err_msg(variable, variable_name=None):
if variable_name is None: variable_name = 'value'
print "ERROR: %s = %s" % (variable_name, variable)
#------------------------------------------------------------------------------
def validate_ip_addr(ip_addr, variable_name=None):
if not validate_length(ip_addr, valid_ip_addr_len):
err_msg(ip_addr, variable_name)
print valid_length_msg('ip address', valid_ip_addr_len)
return False
if not valid_ip_addr(ip_addr):
err_msg(ip_addr, variable_name)
print valid_ip_addr_msg
return False
return True
def validate_secret(secret, variable_name=None):
if not validate_length(secret, valid_secret_len):
err_msg(secret, variable_name)
print valid_length_msg('secret', valid_secret_len)
return False
return True
def validate_name(name, variable_name=None):
if not validate_length(name, valid_name_len):
err_msg(name, variable_name)
print valid_length_msg('name', valid_name_len)
return False
return True
def validate_nastype(nastype, variable_name=None):
if not validate_length(nastype, valid_nastype_len):
err_msg(nastype, variable_name)
print valid_length_msg('NAS Type', valid_nastype_len)
return False
return True
def validate_desc(desc, variable_name=None):
if ipavalidate.plain(desc, notEmpty=True) != 0:
print valid_desc_msg
return False
return True
def validate(attribute, value):
if attribute == 'Client-IP-Address':
return validate_ip_addr(value, attribute)
if attribute == 'Secret':
return validate_secret(value, attribute)
if attribute == 'NAS-Type':
return validate_nastype(value, attribute)
if attribute == 'Name':
return validate_name(value, attribute)
if attribute == 'Description':
return validate_desc(value, attribute)
return True