mirror of
https://salsa.debian.org/freeipa-team/freeipa.git
synced 2024-12-23 07:33:27 -06:00
80fca8d701
Commit cfad7af35d
added a check to ensure a
system has sufficient amount of memory. The feature uses psutil to get
available memory. On import psutil opens files in /proc which can result in
an SELinux violations and Python exception.
PermissionError: [Errno 13] Permission denied: '/proc/stat'
Fixes: https://pagure.io/freeipa/issue/8512
Signed-off-by: Christian Heimes <cheimes@redhat.com>
Reviewed-By: Alexander Bokovoy <abokovoy@redhat.com>
142 lines
4.3 KiB
Python
142 lines
4.3 KiB
Python
# Authors:
|
|
# Rob Crittenden <rcritten@redhat.com>
|
|
#
|
|
# Copyright (C) 2009 Red Hat
|
|
# see file 'COPYING' for use and warranty information
|
|
#
|
|
# This program is free software; you can redistribute it and/or modify
|
|
# it under the terms of the GNU General Public License as published by
|
|
# the Free Software Foundation, either version 3 of the License, or
|
|
# (at your option) any later version.
|
|
#
|
|
# This program is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU General Public License
|
|
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
import logging
|
|
|
|
import six
|
|
|
|
from ipalib import Registry, api
|
|
from ipalib import Command, Str
|
|
from ipalib import errors
|
|
from ipalib import _
|
|
from ipalib.constants import FQDN
|
|
|
|
__doc__ = _("""
|
|
Joining an IPA domain
|
|
""")
|
|
|
|
if six.PY3:
|
|
unicode = str
|
|
|
|
logger = logging.getLogger(__name__)
|
|
|
|
register = Registry()
|
|
|
|
|
|
def validate_host(ugettext, cn):
|
|
"""
|
|
Require at least one dot in the hostname (to support localhost.localdomain)
|
|
"""
|
|
dots = len(cn.split('.'))
|
|
if dots < 2:
|
|
return 'Fully-qualified hostname required'
|
|
return None
|
|
|
|
|
|
@register()
|
|
class join(Command):
|
|
__doc__ = _('Join an IPA domain')
|
|
|
|
NO_CLI = True
|
|
|
|
takes_args = (
|
|
Str('cn',
|
|
validate_host,
|
|
cli_name='hostname',
|
|
doc=_("The hostname to register as"),
|
|
default_from=lambda: FQDN,
|
|
autofill=True,
|
|
#normalizer=lamda value: value.lower(),
|
|
),
|
|
)
|
|
|
|
takes_options = (
|
|
Str('realm',
|
|
doc=_("The IPA realm"),
|
|
default_from=lambda: api.env.realm,
|
|
autofill=True,
|
|
),
|
|
Str('nshardwareplatform?',
|
|
cli_name='platform',
|
|
doc=_('Hardware platform of the host (e.g. Lenovo T61)'),
|
|
),
|
|
Str('nsosversion?',
|
|
cli_name='os',
|
|
doc=_('Operating System and version of the host (e.g. Fedora 9)'),
|
|
),
|
|
)
|
|
|
|
has_output = tuple()
|
|
use_output_validation = False
|
|
|
|
def execute(self, hostname, **kw):
|
|
"""
|
|
Execute the machine join operation.
|
|
|
|
Returns the entry as it will be created in LDAP.
|
|
|
|
:param hostname: The name of the host joined
|
|
:param kw: Keyword arguments for the other attributes.
|
|
"""
|
|
assert 'cn' not in kw
|
|
ldap = self.api.Backend.ldap2
|
|
|
|
# realm parameter is not supported by host_{add,mod}
|
|
kw.pop('realm', None)
|
|
|
|
try:
|
|
# First see if the host exists
|
|
show_kw = {'fqdn': hostname, 'all': True}
|
|
attrs_list = api.Command['host_show'](**show_kw)['result']
|
|
dn = attrs_list['dn']
|
|
|
|
# No error raised so far means that host entry exists
|
|
logger.info('Host entry for %s already exists, '
|
|
'joining may fail on the client side '
|
|
'if not forced', hostname)
|
|
|
|
# If no principal name is set yet we need to try to add
|
|
# one.
|
|
if 'krbprincipalname' not in attrs_list:
|
|
service = "host/%s@%s" % (hostname, api.env.realm)
|
|
api.Command['host_mod'](hostname, **kw,
|
|
krbprincipalname=service)
|
|
logger.info('No principal set, setting to %s', service)
|
|
|
|
# It exists, can we write the password attributes?
|
|
allowed = ldap.can_write(dn, 'krblastpwdchange')
|
|
if not allowed:
|
|
raise errors.ACIError(info=_("Insufficient 'write' privilege "
|
|
"to the 'krbLastPwdChange' attribute of entry '%s'.") % dn)
|
|
|
|
# Reload the attrs_list and dn so that we return update values
|
|
attrs_list = api.Command['host_show'](**show_kw)['result']
|
|
dn = attrs_list['dn']
|
|
|
|
except errors.NotFound:
|
|
attrs_list = api.Command['host_add'](hostname, **kw,
|
|
force=True)['result']
|
|
dn = attrs_list['dn']
|
|
|
|
config = api.Command['config_show']()['result']
|
|
attrs_list['ipacertificatesubjectbase'] =\
|
|
config['ipacertificatesubjectbase']
|
|
|
|
return dn, attrs_list
|