mirror of
https://salsa.debian.org/freeipa-team/freeipa.git
synced 2024-12-23 15:40:01 -06:00
Make sure the CA is running when starting services
- Provide a function for determinig the CA status using Dogtag 10's new getStatus endpoint. This must be done over HTTPS, but since our client certificate may not be set up yet, we need HTTPS without client authentication. Rather than copying from the existing http_request and https_request function, shared code is factored out to a common helper. - Call the new function when restarting the CA service. Since our Service can only be extended in platform-specific code, do this for Fedora only. Also, the status is only checked with Dogtag 10+. - When a restart call in cainstance failed, users were refered to the installation log, but no info was actually logged. Log the exception. https://fedorahosted.org/freeipa/ticket/3084
This commit is contained in:
parent
e4853ebc59
commit
d6fbbd530e
@ -130,6 +130,15 @@ def configured_constants(api=None):
|
|||||||
return Dogtag9Constants
|
return Dogtag9Constants
|
||||||
|
|
||||||
|
|
||||||
|
def error_from_xml(doc, message_template):
|
||||||
|
try:
|
||||||
|
item_node = doc.getElementsByTagName("Error")
|
||||||
|
reason = item_node[0].childNodes[0].data
|
||||||
|
return errors.RemoteRetrieveError(reason=reason)
|
||||||
|
except Exception, e:
|
||||||
|
return errors.RemoteRetrieveError(reason=message_template % e)
|
||||||
|
|
||||||
|
|
||||||
def get_ca_certchain(ca_host=None):
|
def get_ca_certchain(ca_host=None):
|
||||||
"""
|
"""
|
||||||
Retrieve the CA Certificate chain from the configured Dogtag server.
|
Retrieve the CA Certificate chain from the configured Dogtag server.
|
||||||
@ -151,13 +160,8 @@ def get_ca_certchain(ca_host=None):
|
|||||||
item_node = doc.getElementsByTagName("ChainBase64")
|
item_node = doc.getElementsByTagName("ChainBase64")
|
||||||
chain = item_node[0].childNodes[0].data
|
chain = item_node[0].childNodes[0].data
|
||||||
except IndexError:
|
except IndexError:
|
||||||
try:
|
raise error_from_xml(
|
||||||
item_node = doc.getElementsByTagName("Error")
|
doc, _("Retrieving CA cert chain failed: %s"))
|
||||||
reason = item_node[0].childNodes[0].data
|
|
||||||
raise errors.RemoteRetrieveError(reason=reason)
|
|
||||||
except Exception, e:
|
|
||||||
raise errors.RemoteRetrieveError(
|
|
||||||
reason=_("Retrieving CA cert chain failed: %s") % e)
|
|
||||||
finally:
|
finally:
|
||||||
if doc:
|
if doc:
|
||||||
doc.unlink()
|
doc.unlink()
|
||||||
@ -167,32 +171,107 @@ def get_ca_certchain(ca_host=None):
|
|||||||
|
|
||||||
return chain
|
return chain
|
||||||
|
|
||||||
|
|
||||||
|
def ca_status(ca_host=None):
|
||||||
|
"""Return the status of the CA, and the httpd proxy in front of it
|
||||||
|
|
||||||
|
The returned status can be:
|
||||||
|
- running
|
||||||
|
- starting
|
||||||
|
- Service Temporarily Unavailable
|
||||||
|
"""
|
||||||
|
if ca_host is None:
|
||||||
|
ca_host = api.env.ca_host
|
||||||
|
# Use port 443 to test the proxy as well
|
||||||
|
status, reason, headers, body = unauthenticated_https_request(
|
||||||
|
ca_host, 443, '/ca/admin/ca/getStatus')
|
||||||
|
if status == 503:
|
||||||
|
# Service temporarily unavailable
|
||||||
|
return reason
|
||||||
|
elif status != 200:
|
||||||
|
raise errors.RemoteRetrieveError(
|
||||||
|
reason=_("Retrieving CA status failed: %s") % reason)
|
||||||
|
doc = xml.dom.minidom.parseString(body)
|
||||||
|
try:
|
||||||
|
item_node = doc.getElementsByTagName("XMLResponse")[0]
|
||||||
|
item_node = item_node.getElementsByTagName("Status")[0]
|
||||||
|
return item_node.childNodes[0].data
|
||||||
|
except IndexError:
|
||||||
|
raise error_from_xml(doc, _("Retrieving CA status failed: %s"))
|
||||||
|
|
||||||
|
|
||||||
def https_request(host, port, url, secdir, password, nickname, **kw):
|
def https_request(host, port, url, secdir, password, nickname, **kw):
|
||||||
"""
|
"""
|
||||||
:param url: The URL to post to.
|
:param url: The path (not complete URL!) to post to.
|
||||||
:param kw: Keyword arguments to encode into POST body.
|
:param kw: Keyword arguments to encode into POST body.
|
||||||
:return: (http_status, http_reason_phrase, http_headers, http_body)
|
:return: (http_status, http_reason_phrase, http_headers, http_body)
|
||||||
as (integer, unicode, dict, str)
|
as (integer, unicode, dict, str)
|
||||||
|
|
||||||
Perform a client authenticated HTTPS request
|
Perform a client authenticated HTTPS request
|
||||||
"""
|
"""
|
||||||
if isinstance(host, unicode):
|
|
||||||
host = host.encode('utf-8')
|
def connection_factory(host, port):
|
||||||
uri = 'https://%s%s' % (ipautil.format_netloc(host, port), url)
|
|
||||||
post = urlencode(kw)
|
|
||||||
root_logger.debug('https_request %r', uri)
|
|
||||||
root_logger.debug('https_request post %r', post)
|
|
||||||
request_headers = {"Content-type": "application/x-www-form-urlencoded",
|
|
||||||
"Accept": "text/plain"}
|
|
||||||
try:
|
|
||||||
conn = nsslib.NSSConnection(host, port, dbdir=secdir)
|
conn = nsslib.NSSConnection(host, port, dbdir=secdir)
|
||||||
conn.set_debuglevel(0)
|
conn.set_debuglevel(0)
|
||||||
conn.connect()
|
conn.connect()
|
||||||
conn.sock.set_client_auth_data_callback(nsslib.client_auth_data_callback,
|
conn.sock.set_client_auth_data_callback(
|
||||||
nickname,
|
nsslib.client_auth_data_callback,
|
||||||
password, nss.get_default_certdb())
|
nickname, password, nss.get_default_certdb())
|
||||||
conn.request("POST", url, post, request_headers)
|
return conn
|
||||||
|
|
||||||
|
body = urlencode(kw)
|
||||||
|
return _httplib_request(
|
||||||
|
'https', host, port, url, connection_factory, body)
|
||||||
|
|
||||||
|
|
||||||
|
def http_request(host, port, url, **kw):
|
||||||
|
"""
|
||||||
|
:param url: The path (not complete URL!) to post to.
|
||||||
|
:param kw: Keyword arguments to encode into POST body.
|
||||||
|
:return: (http_status, http_reason_phrase, http_headers, http_body)
|
||||||
|
as (integer, unicode, dict, str)
|
||||||
|
|
||||||
|
Perform an HTTP request.
|
||||||
|
"""
|
||||||
|
body = urlencode(kw)
|
||||||
|
return _httplib_request(
|
||||||
|
'http', host, port, url, httplib.HTTPConnection, body)
|
||||||
|
|
||||||
|
|
||||||
|
def unauthenticated_https_request(host, port, url, **kw):
|
||||||
|
"""
|
||||||
|
:param url: The path (not complete URL!) to post to.
|
||||||
|
:param kw: Keyword arguments to encode into POST body.
|
||||||
|
:return: (http_status, http_reason_phrase, http_headers, http_body)
|
||||||
|
as (integer, unicode, dict, str)
|
||||||
|
|
||||||
|
Perform an unauthenticated HTTPS request.
|
||||||
|
"""
|
||||||
|
body = urlencode(kw)
|
||||||
|
return _httplib_request(
|
||||||
|
'https', host, port, url, httplib.HTTPSConnection, body)
|
||||||
|
|
||||||
|
|
||||||
|
def _httplib_request(
|
||||||
|
protocol, host, port, path, connection_factory, request_body):
|
||||||
|
"""
|
||||||
|
:param request_body: Request body
|
||||||
|
:param connection_factory: Connection class to use. Will be called
|
||||||
|
with the host and port arguments.
|
||||||
|
|
||||||
|
Perform a HTTP(s) request.
|
||||||
|
"""
|
||||||
|
if isinstance(host, unicode):
|
||||||
|
host = host.encode('utf-8')
|
||||||
|
uri = '%s://%s%s' % (protocol, ipautil.format_netloc(host, port), path)
|
||||||
|
root_logger.info('request %r', uri)
|
||||||
|
root_logger.debug('request body %r', request_body)
|
||||||
|
try:
|
||||||
|
conn = connection_factory(host, port)
|
||||||
|
conn.request('POST', uri,
|
||||||
|
body=request_body,
|
||||||
|
headers={'Content-type': 'application/x-www-form-urlencoded'},
|
||||||
|
)
|
||||||
res = conn.getresponse()
|
res = conn.getresponse()
|
||||||
|
|
||||||
http_status = res.status
|
http_status = res.status
|
||||||
@ -203,39 +282,6 @@ def https_request(host, port, url, secdir, password, nickname, **kw):
|
|||||||
except Exception, e:
|
except Exception, e:
|
||||||
raise NetworkError(uri=uri, error=str(e))
|
raise NetworkError(uri=uri, error=str(e))
|
||||||
|
|
||||||
return http_status, http_reason_phrase, http_headers, http_body
|
|
||||||
|
|
||||||
def http_request(host, port, url, **kw):
|
|
||||||
"""
|
|
||||||
:param url: The URL to post to.
|
|
||||||
:param kw: Keyword arguments to encode into POST body.
|
|
||||||
:return: (http_status, http_reason_phrase, http_headers, http_body)
|
|
||||||
as (integer, unicode, dict, str)
|
|
||||||
|
|
||||||
Perform an HTTP request.
|
|
||||||
"""
|
|
||||||
if isinstance(host, unicode):
|
|
||||||
host = host.encode('utf-8')
|
|
||||||
uri = 'http://%s%s' % (ipautil.format_netloc(host, port), url)
|
|
||||||
post = urlencode(kw)
|
|
||||||
root_logger.info('request %r', uri)
|
|
||||||
root_logger.debug('request post %r', post)
|
|
||||||
conn = httplib.HTTPConnection(host, port)
|
|
||||||
try:
|
|
||||||
conn.request('POST', url,
|
|
||||||
body=post,
|
|
||||||
headers={'Content-type': 'application/x-www-form-urlencoded'},
|
|
||||||
)
|
|
||||||
res = conn.getresponse()
|
|
||||||
|
|
||||||
http_status = res.status
|
|
||||||
http_reason_phrase = unicode(res.reason, 'utf-8')
|
|
||||||
http_headers = res.msg.dict
|
|
||||||
http_body = res.read()
|
|
||||||
conn.close()
|
|
||||||
except NSPRError, e:
|
|
||||||
raise NetworkError(uri=uri, error=str(e))
|
|
||||||
|
|
||||||
root_logger.debug('request status %d', http_status)
|
root_logger.debug('request status %d', http_status)
|
||||||
root_logger.debug('request reason_phrase %r', http_reason_phrase)
|
root_logger.debug('request reason_phrase %r', http_reason_phrase)
|
||||||
root_logger.debug('request headers %s', http_headers)
|
root_logger.debug('request headers %s', http_headers)
|
||||||
|
@ -17,9 +17,13 @@
|
|||||||
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||||
#
|
#
|
||||||
|
|
||||||
from ipapython import ipautil
|
|
||||||
from ipapython.platform import base, redhat, systemd
|
|
||||||
import os
|
import os
|
||||||
|
import time
|
||||||
|
|
||||||
|
from ipapython import ipautil, dogtag
|
||||||
|
from ipapython.platform import base, redhat, systemd
|
||||||
|
from ipapython.ipa_log_manager import root_logger
|
||||||
|
from ipalib import api
|
||||||
|
|
||||||
# All what we allow exporting directly from this module
|
# All what we allow exporting directly from this module
|
||||||
# Everything else is made available through these symbols when they are
|
# Everything else is made available through these symbols when they are
|
||||||
@ -128,6 +132,47 @@ class Fedora16SSHService(Fedora16Service):
|
|||||||
def get_config_dir(self, instance_name=""):
|
def get_config_dir(self, instance_name=""):
|
||||||
return '/etc/ssh'
|
return '/etc/ssh'
|
||||||
|
|
||||||
|
|
||||||
|
class Fedora16CAService(Fedora16Service):
|
||||||
|
def __wait_until_running(self):
|
||||||
|
# We must not wait for the httpd proxy if httpd is not set up yet.
|
||||||
|
# Unfortunately, knownservices.httpd.is_installed() can return
|
||||||
|
# false positives, so check for existence of our configuration file.
|
||||||
|
# TODO: Use a cleaner solution
|
||||||
|
if not os.path.exists('/etc/httpd/conf.d/ipa.conf'):
|
||||||
|
root_logger.debug(
|
||||||
|
'The httpd proxy is not installed, skipping wait for CA')
|
||||||
|
return
|
||||||
|
if dogtag.install_constants.DOGTAG_VERSION < 10:
|
||||||
|
# The server status information isn't available on DT 9
|
||||||
|
root_logger.debug('Using Dogtag 9, skipping wait for CA')
|
||||||
|
return
|
||||||
|
root_logger.debug('Waiting until the CA is running')
|
||||||
|
timeout = api.env.startup_timeout
|
||||||
|
op_timeout = time.time() + timeout
|
||||||
|
while time.time() < op_timeout:
|
||||||
|
status = dogtag.ca_status()
|
||||||
|
root_logger.debug('The CA status is: %s' % status)
|
||||||
|
if status == 'running':
|
||||||
|
break
|
||||||
|
root_logger.debug('Waiting for CA to start...')
|
||||||
|
time.sleep(1)
|
||||||
|
else:
|
||||||
|
raise RuntimeError('CA did not start in %ss' % timeout)
|
||||||
|
|
||||||
|
def start(self, instance_name="", capture_output=True, wait=True):
|
||||||
|
super(Fedora16CAService, self).start(
|
||||||
|
instance_name, capture_output=capture_output, wait=wait)
|
||||||
|
if wait:
|
||||||
|
self.__wait_until_running()
|
||||||
|
|
||||||
|
def restart(self, instance_name="", capture_output=True, wait=True):
|
||||||
|
super(Fedora16CAService, self).restart(
|
||||||
|
instance_name, capture_output=capture_output, wait=wait)
|
||||||
|
if wait:
|
||||||
|
self.__wait_until_running()
|
||||||
|
|
||||||
|
|
||||||
# Redirect directory server service through special sub-class due to its
|
# Redirect directory server service through special sub-class due to its
|
||||||
# special handling of instances
|
# special handling of instances
|
||||||
def f16_service(name):
|
def f16_service(name):
|
||||||
@ -137,6 +182,8 @@ def f16_service(name):
|
|||||||
return Fedora16IPAService(name)
|
return Fedora16IPAService(name)
|
||||||
if name == 'sshd':
|
if name == 'sshd':
|
||||||
return Fedora16SSHService(name)
|
return Fedora16SSHService(name)
|
||||||
|
if name in ('pki-cad', 'pki_cad', 'pki-tomcatd', 'pki_tomcatd'):
|
||||||
|
return Fedora16CAService(name)
|
||||||
return Fedora16Service(name)
|
return Fedora16Service(name)
|
||||||
|
|
||||||
class Fedora16Services(base.KnownServices):
|
class Fedora16Services(base.KnownServices):
|
||||||
|
@ -41,6 +41,7 @@ from ipapython import certmonger
|
|||||||
from ipalib import pkcs10, x509
|
from ipalib import pkcs10, x509
|
||||||
from ipapython.dn import DN
|
from ipapython.dn import DN
|
||||||
import subprocess
|
import subprocess
|
||||||
|
import traceback
|
||||||
|
|
||||||
from nss.error import NSPRError
|
from nss.error import NSPRError
|
||||||
import nss.nss as nss
|
import nss.nss as nss
|
||||||
@ -395,6 +396,7 @@ class CADSInstance(service.Service):
|
|||||||
sys.exit(1)
|
sys.exit(1)
|
||||||
except Exception:
|
except Exception:
|
||||||
# TODO: roll back here?
|
# TODO: roll back here?
|
||||||
|
root_logger.debug(traceback.format_exc())
|
||||||
root_logger.critical("Failed to restart the directory server. See the installation log for details.")
|
root_logger.critical("Failed to restart the directory server. See the installation log for details.")
|
||||||
|
|
||||||
def uninstall(self):
|
def uninstall(self):
|
||||||
@ -867,6 +869,7 @@ class CAInstance(service.Service):
|
|||||||
self.restart(self.dogtag_constants.PKI_INSTANCE_NAME)
|
self.restart(self.dogtag_constants.PKI_INSTANCE_NAME)
|
||||||
except Exception:
|
except Exception:
|
||||||
# TODO: roll back here?
|
# TODO: roll back here?
|
||||||
|
root_logger.debug(traceback.format_exc())
|
||||||
root_logger.critical("Failed to restart the certificate server. See the installation log for details.")
|
root_logger.critical("Failed to restart the certificate server. See the installation log for details.")
|
||||||
|
|
||||||
def __disable_nonce(self):
|
def __disable_nonce(self):
|
||||||
@ -1551,6 +1554,11 @@ def install_replica_ca(config, postinstall=False):
|
|||||||
master_host=config.master_host_name,
|
master_host=config.master_host_name,
|
||||||
subject_base=config.subject_base)
|
subject_base=config.subject_base)
|
||||||
|
|
||||||
|
if postinstall:
|
||||||
|
# Restart httpd since we changed its config
|
||||||
|
ipaservices.knownservices.httpd.restart()
|
||||||
|
|
||||||
|
|
||||||
# The dogtag DS instance needs to be restarted after installation.
|
# The dogtag DS instance needs to be restarted after installation.
|
||||||
# The procedure for this is: stop dogtag, stop DS, start DS, start
|
# The procedure for this is: stop dogtag, stop DS, start DS, start
|
||||||
# dogtag
|
# dogtag
|
||||||
|
Loading…
Reference in New Issue
Block a user