Files
freeipa/debian/patches/add_debian.py.patch
Timo Aaltonen e5e16bfd09 refresh patches
2012-06-29 20:36:09 +03:00

183 lines
7.0 KiB
Diff

Author: Timo Aaltonen <tjaalton@ubuntu.com>
Date: Fri Oct 28 15:57:04 2011 +0300
Add add_debian.py.patch, platform support code.
--- /dev/null
+++ b/ipapython/platform/debian.py
@@ -0,0 +1,174 @@
+# Authors: Simo Sorce <ssorce redhat com>
+# Alexander Bokovoy <abokovoy redhat com>
+# Marko Myllynen <myllynen redhat com>
+#
+# Copyright (C) 2007-2011 Red Hat
+# see file 'COPYING' for use and warranty information
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License as published by
+# the Free Software Foundation, either version 3 of the License, or
+# (at your option) any later version.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program. If not, see <http://www.gnu.org/licenses/>.
+#
+
+import os
+import sys
+from ipapython import ipautil
+from ipapython.platform import base
+
+# All what we allow exporting directly from this module
+# Everything else is made available through these symbols when they directly imported into ipapython.services:
+# authconfig -- class reference for platform-specific implementation of authconfig(8)
+# service -- class reference for platform-specific implementation of a PlatformService class
+# knownservices -- factory instance to access named services IPA cares about, names are ipapython.services.wellknownservices
+# backup_and_replace_hostname -- platform-specific way to set hostname and make it persistent over reboots
+# restore_context -- platform-sepcific way to restore security context, if applicable
+__all__ = ['authconfig', 'service', 'knownservices', 'backup_and_replace_hostname', 'restore_context']
+
+class DebianService(base.PlatformService):
+ def stop(self, instance_name="", capture_output=True):
+ ipautil.run(["/usr/sbin/service", self.service_name, "stop", instance_name], capture_output=capture_output)
+
+ def start(self, instance_name="", capture_output=True):
+ ipautil.run(["/usr/sbin/service", self.service_name, "start", instance_name], capture_output=capture_output)
+
+ def restart(self, instance_name="", capture_output=True):
+ ipautil.run(["/usr/sbin/service", self.service_name, "restart", instance_name], capture_output=capture_output)
+
+ def is_running(self, instance_name=""):
+ ret = True
+ try:
+ (sout,serr,rcode) = ipautil.run(["/usr/sbin/service", self.service_name, "status", instance_name])
+ if sout.find("NOT running") >= 0:
+ ret = False
+ if sout.find("stop") >= 0:
+ ret = False
+ except ipautil.CalledProcessError:
+ ret = False
+ return ret
+
+ def is_installed(self):
+ installed = True
+ try:
+ ipautil.run(["/usr/sbin/service", self.service_name, "status"])
+ except ipautil.CalledProcessError, e:
+ if e.returncode == 1:
+ # service is not installed or there is other serious issue
+ installed = False
+ return installed
+
+ def is_enabled(self):
+ ret = True
+ try:
+ (sout,serr,rcode) = ipautil.run(["/sbin/chkconfig", self.service_name])
+ if sout.find("off") >= 0:
+ ret = False
+ if sout.find("unknown service") >= 0:
+ ret = False
+ except ipautil.CalledProcessError:
+ ret = False
+ return ret
+
+ def enable(self):
+ ipautil.run(["/sbin/chkconfig", self.service_name, "on"])
+
+ def disable(self):
+ ipautil.run(["/sbin/chkconfig", self.service_name, "off"])
+
+ def install(self):
+ ipautil.run(["/sbin/chkconfig", "--add", self.service_name])
+
+ def remove(self):
+ ipautil.run(["/sbin/chkconfig", "--del", self.service_name])
+
+class DebianAuthConfig(base.AuthConfig):
+ """
+ AuthConfig class implements system-independent interface to configure
+ system authentication resources. In Red Hat-produced systems this is done with
+ authconfig(8) utility.
+ """
+ def __build_args(self):
+ args = []
+ for (option, value) in self.parameters.items():
+ if type(value) is bool:
+ if value:
+ args.append("--enable%s" % (option))
+ else:
+ args.append("--disable%s" % (option))
+ elif type(value) in (tuple, list):
+ args.append("--%s" % (option))
+ args.append("%s" % (value[0]))
+ elif value is None:
+ args.append("--%s" % (option))
+ else:
+ args.append("--%s%s" % (option,value))
+ return args
+
+ def execute(self):
+ args = self.__build_args()
+ print "Would run on a Red Hat platform: /usr/sbin/authconfig " + " ".join(args)
+ ipautil.user_input("Please do the corresponding changes manually and press Enter")
+ #ipautil.run(["/usr/sbin/authconfig"]+args)
+
+class DebianServices(base.KnownServices):
+ def __init__(self):
+ services = dict()
+ for s in base.wellknownservices:
+ if s == "certmonger":
+ services[s] = DebianService("certmonger")
+ elif s == "messagebus":
+ services[s] = DebianService("dbus")
+ elif s == "ntpd":
+ services[s] = DebianService("ntp")
+ else:
+ services[s] = DebianService(s)
+ # Call base class constructor. This will lock services to read-only
+ super(DebianServices, self).__init__(services)
+
+authconfig = DebianAuthConfig
+service = DebianService
+knownservices = DebianServices()
+
+def restore_context(filepath):
+ """
+ restore security context on the file path
+ SELinux equivalent is /sbin/restorecon <filepath>
+
+ restorecon's return values are not reliable so we have to
+ ignore them (BZ #739604).
+
+ ipautil.run() will do the logging.
+ """
+ if os.path.exists("/sbin/restorecon"):
+ ipautil.run(["/sbin/restorecon", filepath], raiseonerr=False)
+
+def backup_and_replace_hostname(fstore, statestore, hostname):
+ network_filename = "/etc/hostname"
+ # Backup original /etc/hostname
+ fstore.backup_file(network_filename)
+
+ # Write new configuration
+ f = open(network_filename, 'w')
+ f.write(hostname + "\n")
+ f.close()
+
+ try:
+ ipautil.run(['/bin/hostname', hostname])
+ except ipautil.CalledProcessError, e:
+ print >>sys.stderr, "Failed to set this machine hostname to %s (%s)." % (hostname, str(e))
+
+ # For SE Linux environments it is important to reset SE labels to the expected ones
+ try:
+ restore_context(network_filename)
+ except ipautil.CalledProcessError, e:
+ print >>sys.stderr, "Failed to set permissions for %s (%s)." % (network_filename, str(e))
+
+