mirror of
https://salsa.debian.org/freeipa-team/freeipa.git
synced 2025-02-25 18:55:28 -06:00
adtrustinstance: Properly handle uninstall of AD trust instance
The uninstall method of the AD trust instance was not called upon at all in the ipa-server-install --uninstall phase. This patch makes sure that AD trust instance is unconfigured when the server is uninstalled. The following steps are undertaken: * Remove /var/run/samba/krb5cc_samba * Remove our keys from /etc/samba/samba.keytab using ipa-rmkeytab * Remove /var/lib/samba/*.tdb files Additionally, we make sure winbind service is stopped from within the stop() method. Part of: https://fedorahosted.org/freeipa/ticket/3479
This commit is contained in:
committed by
Martin Kosek
parent
45e310ecc4
commit
d769b124b0
@@ -276,8 +276,9 @@ def main():
|
||||
sys.exit("Aborting installation.")
|
||||
|
||||
elif os.path.exists('/etc/samba/smb.conf'):
|
||||
print("WARNING: The smb.conf already exists. Running ipa-adtrust-install
|
||||
"will break your existing samba configuration.\n\n")
|
||||
print("WARNING: The smb.conf already exists. Running "
|
||||
"ipa-adtrust-install will break your existing samba "
|
||||
"configuration.\n\n")
|
||||
if not options.unattended:
|
||||
if not ipautil.user_input("Do you wish to continue?",
|
||||
default = False,
|
||||
|
||||
@@ -40,6 +40,7 @@ import pwd
|
||||
import textwrap
|
||||
from optparse import OptionGroup, OptionValueError
|
||||
|
||||
from ipaserver.install import adtrustinstance
|
||||
from ipaserver.install import dsinstance
|
||||
from ipaserver.install import krbinstance
|
||||
from ipaserver.install import bindinstance
|
||||
@@ -492,6 +493,7 @@ def uninstall():
|
||||
httpinstance.HTTPInstance(fstore).uninstall()
|
||||
krbinstance.KrbInstance(fstore).uninstall()
|
||||
dsinstance.DsInstance(fstore=fstore).uninstall()
|
||||
adtrustinstance.ADTRUSTInstance(fstore).uninstall()
|
||||
memcacheinstance.MemcacheInstance().uninstall()
|
||||
otpdinstance.OtpdInstance().uninstall()
|
||||
ipaservices.restore_network_configuration(fstore, sstore)
|
||||
|
||||
@@ -27,6 +27,7 @@ import struct
|
||||
import re
|
||||
|
||||
from ipaserver.install import service
|
||||
from ipaserver.install import installutils
|
||||
from ipaserver.install.dsinstance import realm_to_serverid
|
||||
from ipaserver.install.bindinstance import get_rr, add_rr, del_rr, \
|
||||
dns_zone_exists
|
||||
@@ -473,26 +474,31 @@ class ADTRUSTInstance(service.Service):
|
||||
member=[self.cifs_agent],
|
||||
)
|
||||
self.admin_conn.add_entry(entry)
|
||||
except Exception, e:
|
||||
# CIFS principal already exists, it is not the first time adtrustinstance is managed
|
||||
except Exception:
|
||||
# CIFS principal already exists, it is not the first time
|
||||
# adtrustinstance is managed
|
||||
# That's fine, we we'll re-extract the key again.
|
||||
pass
|
||||
|
||||
samba_keytab = "/etc/samba/samba.keytab"
|
||||
if os.path.exists(samba_keytab):
|
||||
try:
|
||||
ipautil.run(["ipa-rmkeytab", "--principal", self.cifs_principal,
|
||||
"-k", samba_keytab])
|
||||
except ipautil.CalledProcessError, e:
|
||||
if e.returncode != 5:
|
||||
root_logger.critical("Failed to remove old key for %s" % self.cifs_principal)
|
||||
self.clean_samba_keytab()
|
||||
|
||||
try:
|
||||
ipautil.run(["ipa-getkeytab", "--server", self.fqdn,
|
||||
"--principal", self.cifs_principal,
|
||||
"-k", samba_keytab])
|
||||
except ipautil.CalledProcessError, e:
|
||||
root_logger.critical("Failed to add key for %s" % self.cifs_principal)
|
||||
"-k", self.samba_keytab])
|
||||
except ipautil.CalledProcessError:
|
||||
root_logger.critical("Failed to add key for %s"
|
||||
% self.cifs_principal)
|
||||
|
||||
def clean_samba_keytab(self):
|
||||
if os.path.exists(self.samba_keytab):
|
||||
try:
|
||||
ipautil.run(["ipa-rmkeytab", "--principal", self.cifs_principal,
|
||||
"-k", self.samba_keytab])
|
||||
except ipautil.CalledProcessError, e:
|
||||
if e.returncode != 5:
|
||||
root_logger.critical("Failed to remove old key for %s"
|
||||
% self.cifs_principal)
|
||||
|
||||
def srv_rec(self, host, port, prio):
|
||||
return "%(prio)d 100 %(port)d %(host)s" % dict(host=host,prio=prio,port=port)
|
||||
@@ -693,6 +699,7 @@ class ADTRUSTInstance(service.Service):
|
||||
def __stop(self):
|
||||
self.backup_state("running", self.is_running())
|
||||
try:
|
||||
ipaservices.service('winbind').stop()
|
||||
self.stop()
|
||||
except:
|
||||
pass
|
||||
@@ -750,6 +757,7 @@ class ADTRUSTInstance(service.Service):
|
||||
realm_to_serverid(self.realm)
|
||||
|
||||
self.smb_conf = "/etc/samba/smb.conf"
|
||||
self.samba_keytab = "/etc/samba/samba.keytab"
|
||||
|
||||
self.smb_dn = DN(('cn', 'adtrust agents'), ('cn', 'sysaccounts'),
|
||||
('cn', 'etc'), self.suffix)
|
||||
@@ -865,7 +873,6 @@ class ADTRUSTInstance(service.Service):
|
||||
# we should not restore smb.conf
|
||||
|
||||
# Restore the state of affected selinux booleans
|
||||
|
||||
for var in self.selinux_booleans:
|
||||
sebool_state = self.restore_state(var)
|
||||
if not sebool_state is None:
|
||||
@@ -875,6 +882,22 @@ class ADTRUSTInstance(service.Service):
|
||||
except:
|
||||
self.print_msg(SELINUX_WARNING % dict(var=var))
|
||||
|
||||
# Remove samba's credentials cache
|
||||
krb5cc_samba = '/var/run/samba/krb5cc_samba'
|
||||
installutils.remove_file(krb5cc_samba)
|
||||
|
||||
# Remove samba's configuration file
|
||||
installutils.remove_file(self.smb_conf)
|
||||
|
||||
# Remove samba's persistent and temporary tdb files
|
||||
tdb_files = [tdb_file for tdb_file in os.listdir("/var/lib/samba/")
|
||||
if tdb_file.endswith(".tdb")]
|
||||
for tdb_file in tdb_files:
|
||||
installutils.remove_file(tdb_file)
|
||||
|
||||
# Remove our keys from samba's keytab
|
||||
self.clean_samba_keytab()
|
||||
|
||||
if not enabled is None and not enabled:
|
||||
self.disable()
|
||||
|
||||
|
||||
Reference in New Issue
Block a user