mirror of
https://salsa.debian.org/freeipa-team/freeipa.git
synced 2025-02-25 18:55:28 -06:00
183 lines
7.0 KiB
Diff
183 lines
7.0 KiB
Diff
Author: Timo Aaltonen <tjaalton@ubuntu.com>
|
|
Date: Fri Oct 28 15:57:04 2011 +0300
|
|
|
|
Add add_debian.py.patch, platform support code.
|
|
|
|
--- /dev/null
|
|
+++ b/ipapython/platform/debian.py
|
|
@@ -0,0 +1,174 @@
|
|
+# Authors: Simo Sorce <ssorce redhat com>
|
|
+# Alexander Bokovoy <abokovoy redhat com>
|
|
+# Marko Myllynen <myllynen redhat com>
|
|
+#
|
|
+# Copyright (C) 2007-2011 Red Hat
|
|
+# see file 'COPYING' for use and warranty information
|
|
+#
|
|
+# This program is free software; you can redistribute it and/or modify
|
|
+# it under the terms of the GNU General Public License as published by
|
|
+# the Free Software Foundation, either version 3 of the License, or
|
|
+# (at your option) any later version.
|
|
+#
|
|
+# This program is distributed in the hope that it will be useful,
|
|
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
+# GNU General Public License for more details.
|
|
+#
|
|
+# You should have received a copy of the GNU General Public License
|
|
+# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
+#
|
|
+
|
|
+import os
|
|
+import sys
|
|
+from ipapython import ipautil
|
|
+from ipapython.platform import base
|
|
+
|
|
+# All what we allow exporting directly from this module
|
|
+# Everything else is made available through these symbols when they directly imported into ipapython.services:
|
|
+# authconfig -- class reference for platform-specific implementation of authconfig(8)
|
|
+# service -- class reference for platform-specific implementation of a PlatformService class
|
|
+# knownservices -- factory instance to access named services IPA cares about, names are ipapython.services.wellknownservices
|
|
+# backup_and_replace_hostname -- platform-specific way to set hostname and make it persistent over reboots
|
|
+# restore_context -- platform-sepcific way to restore security context, if applicable
|
|
+__all__ = ['authconfig', 'service', 'knownservices', 'backup_and_replace_hostname', 'restore_context']
|
|
+
|
|
+class DebianService(base.PlatformService):
|
|
+ def stop(self, instance_name="", capture_output=True):
|
|
+ ipautil.run(["/usr/sbin/service", self.service_name, "stop", instance_name], capture_output=capture_output)
|
|
+
|
|
+ def start(self, instance_name="", capture_output=True):
|
|
+ ipautil.run(["/usr/sbin/service", self.service_name, "start", instance_name], capture_output=capture_output)
|
|
+
|
|
+ def restart(self, instance_name="", capture_output=True):
|
|
+ ipautil.run(["/usr/sbin/service", self.service_name, "restart", instance_name], capture_output=capture_output)
|
|
+
|
|
+ def is_running(self, instance_name=""):
|
|
+ ret = True
|
|
+ try:
|
|
+ (sout,serr,rcode) = ipautil.run(["/usr/sbin/service", self.service_name, "status", instance_name])
|
|
+ if sout.find("NOT running") >= 0:
|
|
+ ret = False
|
|
+ if sout.find("stop") >= 0:
|
|
+ ret = False
|
|
+ except ipautil.CalledProcessError:
|
|
+ ret = False
|
|
+ return ret
|
|
+
|
|
+ def is_installed(self):
|
|
+ installed = True
|
|
+ try:
|
|
+ ipautil.run(["/usr/sbin/service", self.service_name, "status"])
|
|
+ except ipautil.CalledProcessError, e:
|
|
+ if e.returncode == 1:
|
|
+ # service is not installed or there is other serious issue
|
|
+ installed = False
|
|
+ return installed
|
|
+
|
|
+ def is_enabled(self):
|
|
+ ret = True
|
|
+ try:
|
|
+ (sout,serr,rcode) = ipautil.run(["/sbin/chkconfig", self.service_name])
|
|
+ if sout.find("off") >= 0:
|
|
+ ret = False
|
|
+ if sout.find("unknown service") >= 0:
|
|
+ ret = False
|
|
+ except ipautil.CalledProcessError:
|
|
+ ret = False
|
|
+ return ret
|
|
+
|
|
+ def enable(self):
|
|
+ ipautil.run(["/sbin/chkconfig", self.service_name, "on"])
|
|
+
|
|
+ def disable(self):
|
|
+ ipautil.run(["/sbin/chkconfig", self.service_name, "off"])
|
|
+
|
|
+ def install(self):
|
|
+ ipautil.run(["/sbin/chkconfig", "--add", self.service_name])
|
|
+
|
|
+ def remove(self):
|
|
+ ipautil.run(["/sbin/chkconfig", "--del", self.service_name])
|
|
+
|
|
+class DebianAuthConfig(base.AuthConfig):
|
|
+ """
|
|
+ AuthConfig class implements system-independent interface to configure
|
|
+ system authentication resources. In Red Hat-produced systems this is done with
|
|
+ authconfig(8) utility.
|
|
+ """
|
|
+ def __build_args(self):
|
|
+ args = []
|
|
+ for (option, value) in self.parameters.items():
|
|
+ if type(value) is bool:
|
|
+ if value:
|
|
+ args.append("--enable%s" % (option))
|
|
+ else:
|
|
+ args.append("--disable%s" % (option))
|
|
+ elif type(value) in (tuple, list):
|
|
+ args.append("--%s" % (option))
|
|
+ args.append("%s" % (value[0]))
|
|
+ elif value is None:
|
|
+ args.append("--%s" % (option))
|
|
+ else:
|
|
+ args.append("--%s%s" % (option,value))
|
|
+ return args
|
|
+
|
|
+ def execute(self):
|
|
+ args = self.__build_args()
|
|
+ print "Would run on a Red Hat platform: /usr/sbin/authconfig " + " ".join(args)
|
|
+ ipautil.user_input("Please do the corresponding changes manually and press Enter")
|
|
+ #ipautil.run(["/usr/sbin/authconfig"]+args)
|
|
+
|
|
+class DebianServices(base.KnownServices):
|
|
+ def __init__(self):
|
|
+ services = dict()
|
|
+ for s in base.wellknownservices:
|
|
+ if s == "certmonger":
|
|
+ services[s] = DebianService("certmonger")
|
|
+ elif s == "messagebus":
|
|
+ services[s] = DebianService("dbus")
|
|
+ elif s == "ntpd":
|
|
+ services[s] = DebianService("ntp")
|
|
+ else:
|
|
+ services[s] = DebianService(s)
|
|
+ # Call base class constructor. This will lock services to read-only
|
|
+ super(DebianServices, self).__init__(services)
|
|
+
|
|
+authconfig = DebianAuthConfig
|
|
+service = DebianService
|
|
+knownservices = DebianServices()
|
|
+
|
|
+def restore_context(filepath):
|
|
+ """
|
|
+ restore security context on the file path
|
|
+ SELinux equivalent is /sbin/restorecon <filepath>
|
|
+
|
|
+ restorecon's return values are not reliable so we have to
|
|
+ ignore them (BZ #739604).
|
|
+
|
|
+ ipautil.run() will do the logging.
|
|
+ """
|
|
+ if os.path.exists("/sbin/restorecon"):
|
|
+ ipautil.run(["/sbin/restorecon", filepath], raiseonerr=False)
|
|
+
|
|
+def backup_and_replace_hostname(fstore, statestore, hostname):
|
|
+ network_filename = "/etc/hostname"
|
|
+ # Backup original /etc/hostname
|
|
+ fstore.backup_file(network_filename)
|
|
+
|
|
+ # Write new configuration
|
|
+ f = open(network_filename, 'w')
|
|
+ f.write(hostname + "\n")
|
|
+ f.close()
|
|
+
|
|
+ try:
|
|
+ ipautil.run(['/bin/hostname', hostname])
|
|
+ except ipautil.CalledProcessError, e:
|
|
+ print >>sys.stderr, "Failed to set this machine hostname to %s (%s)." % (hostname, str(e))
|
|
+
|
|
+ # For SE Linux environments it is important to reset SE labels to the expected ones
|
|
+ try:
|
|
+ restore_context(network_filename)
|
|
+ except ipautil.CalledProcessError, e:
|
|
+ print >>sys.stderr, "Failed to set permissions for %s (%s)." % (network_filename, str(e))
|
|
+
|
|
+
|