mirror of
https://salsa.debian.org/freeipa-team/freeipa.git
synced 2024-12-25 08:21:05 -06:00
893064f613
Some parts of install scripts used only ccache name as returned by krbV.CCache.name attribute. However, when this name is used again to initialize krbV.CCache object or when it is used in KRB5CCNAME environmental variable, it fails for new DIR type of CCACHE. We should always use both CCACHE type and name when referring to them to avoid these crashes. ldap2 backend was also updated to accept directly krbV.CCache object which contains everything we need to authenticate with ccache. https://fedorahosted.org/freeipa/ticket/3381
263 lines
11 KiB
Python
Executable File
263 lines
11 KiB
Python
Executable File
#! /usr/bin/python -E
|
|
# Authors: Martin Nagy <mnagy@redhat.com>
|
|
# Based on ipa-server-install by Karl MacMillan <kmacmillan@mentalrootkit.com>
|
|
#
|
|
# Copyright (C) 2007 - 2009 Red Hat
|
|
# see file 'COPYING' for use and warranty information
|
|
#
|
|
# This program is free software; you can redistribute it and/or modify
|
|
# it under the terms of the GNU General Public License as published by
|
|
# the Free Software Foundation, either version 3 of the License, or
|
|
# (at your option) any later version.
|
|
#
|
|
# This program is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU General Public License
|
|
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
#
|
|
|
|
from ipaserver.plugins.ldap2 import ldap2
|
|
from ipaserver.install import service, bindinstance, ntpinstance, httpinstance
|
|
from ipaserver.install.installutils import *
|
|
from ipaserver.install import installutils
|
|
from ipapython import version
|
|
from ipapython import ipautil, sysrestore
|
|
from ipalib import api, errors, util
|
|
from ipapython.config import IPAOptionParser
|
|
from optparse import OptionGroup, SUPPRESS_HELP
|
|
import krbV
|
|
import ldap
|
|
from ipapython.ipa_log_manager import *
|
|
|
|
log_file_name = "/var/log/ipaserver-install.log"
|
|
|
|
def parse_options():
|
|
parser = IPAOptionParser(version=version.VERSION)
|
|
parser.add_option("-p", "--ds-password", dest="dm_password",
|
|
sensitive=True, help="admin password")
|
|
parser.add_option("-d", "--debug", dest="debug", action="store_true",
|
|
default=False, help="print debugging information")
|
|
parser.add_option("--ip-address", dest="ip_address",
|
|
type="ip", ip_local=True, help="Master Server IP Address")
|
|
parser.add_option("--forwarder", dest="forwarders", action="append",
|
|
type="ip", help="Add a DNS forwarder")
|
|
parser.add_option("--no-forwarders", dest="no_forwarders", action="store_true",
|
|
default=False, help="Do not add any DNS forwarders, use root servers instead")
|
|
parser.add_option("--reverse-zone", dest="reverse_zone", help="The reverse DNS zone to use")
|
|
parser.add_option("--no-reverse", dest="no_reverse", action="store_true",
|
|
default=False, help="Do not create new reverse DNS zone")
|
|
parser.add_option("--zonemgr", action="callback", callback=bindinstance.zonemgr_callback,
|
|
type="string",
|
|
help="DNS zone manager e-mail address. Defaults to hostmaster@DOMAIN")
|
|
# this option name has been deprecated, persistent search has been enabled by default
|
|
parser.add_option("--zone-notif", dest="zone_notif",
|
|
action="store_true", default=False, help=SUPPRESS_HELP)
|
|
parser.add_option("--no-persistent-search", dest="persistent_search",
|
|
default=True, action="store_false",
|
|
help="Do not enable persistent search feature in the name server")
|
|
parser.add_option("--zone-refresh", dest="zone_refresh",
|
|
default=0, type="int",
|
|
help="When set to non-zero the name server will use DNS zone "
|
|
"detection based on polling instead of a persistent search")
|
|
parser.add_option("--no-serial-autoincrement", dest="serial_autoincrement",
|
|
default=True, action="store_false",
|
|
help="Do not enable SOA serial autoincrement")
|
|
parser.add_option("-U", "--unattended", dest="unattended", action="store_true",
|
|
default=False, help="unattended installation never prompts the user")
|
|
|
|
options, args = parser.parse_args()
|
|
safe_options = parser.get_safe_opts(options)
|
|
|
|
if options.forwarders and options.no_forwarders:
|
|
parser.error("You cannot specify a --forwarder option together with --no-forwarders")
|
|
elif options.reverse_zone and options.no_reverse:
|
|
parser.error("You cannot specify a --reverse-zone option together with --no-reverse")
|
|
|
|
if options.unattended:
|
|
if not options.forwarders and not options.no_forwarders:
|
|
parser.error("You must specify at least one --forwarder option or --no-forwarders option")
|
|
|
|
if options.zone_refresh < 0:
|
|
parser.error("negative numbers not allowed for --zone-refresh")
|
|
elif options.zone_refresh > 0:
|
|
options.persistent_search = False # mutually exclusive features
|
|
|
|
if options.zone_notif:
|
|
print >>sys.stderr, "WARNING: --zone-notif option is deprecated and has no effect"
|
|
|
|
if options.serial_autoincrement and not options.persistent_search:
|
|
parser.error('persistent search feature is required for '
|
|
'DNS SOA serial autoincrement')
|
|
|
|
return safe_options, options
|
|
|
|
def main():
|
|
safe_options, options = parse_options()
|
|
|
|
if os.getegid() != 0:
|
|
sys.exit("Must be root to setup server")
|
|
|
|
standard_logging_setup(log_file_name, debug=options.debug, filemode='a')
|
|
print "\nThe log file for this installation can be found in %s" % log_file_name
|
|
|
|
root_logger.debug('%s was invoked with options: %s' % (sys.argv[0], safe_options))
|
|
root_logger.debug("missing options might be asked for interactively later\n")
|
|
|
|
installutils.check_server_configuration()
|
|
|
|
global fstore
|
|
fstore = sysrestore.FileStore('/var/lib/ipa/sysrestore')
|
|
|
|
print "=============================================================================="
|
|
print "This program will setup DNS for the FreeIPA Server."
|
|
print ""
|
|
print "This includes:"
|
|
print " * Configure DNS (bind)"
|
|
print ""
|
|
print "To accept the default shown in brackets, press the Enter key."
|
|
print ""
|
|
|
|
# Check bind packages are installed
|
|
if not bindinstance.check_inst(options.unattended):
|
|
sys.exit("Aborting installation.")
|
|
|
|
# Initialize the ipalib api
|
|
cfg = dict(
|
|
in_server=True,
|
|
debug=options.debug,
|
|
)
|
|
api.bootstrap(**cfg)
|
|
api.finalize()
|
|
|
|
if bindinstance.named_conf_exists():
|
|
sys.exit("\nDNS is already configured in this IPA server.")
|
|
|
|
# Create a BIND instance
|
|
if options.unattended and not options.dm_password:
|
|
sys.exit("\nIn unattended mode you need to provide at least the -p option")
|
|
|
|
dm_password = options.dm_password or read_password("Directory Manager",
|
|
confirm=False, validate=False)
|
|
if dm_password is None:
|
|
sys.exit("\nDirectory Manager password required")
|
|
bind = bindinstance.BindInstance(fstore, dm_password)
|
|
|
|
# try the connection
|
|
try:
|
|
bind.ldap_connect()
|
|
bind.ldap_disconnect()
|
|
except ldap.INVALID_CREDENTIALS, e:
|
|
sys.exit("Password is not valid!")
|
|
|
|
# Check we have a public IP that is associated with the hostname
|
|
if options.ip_address:
|
|
ip = options.ip_address
|
|
else:
|
|
hostaddr = resolve_host(api.env.host)
|
|
try:
|
|
if len(hostaddr) > 1:
|
|
print >> sys.stderr, "The server hostname resolves to more than one address:"
|
|
for addr in hostaddr:
|
|
print >> sys.stderr, " %s" % addr
|
|
|
|
if options.ip_address:
|
|
if str(options.ip_address) not in hostaddr:
|
|
print >> sys.stderr, "Address passed in --ip-address did not match any resolved"
|
|
print >> sys.stderr, "address!"
|
|
sys.exit(1)
|
|
print "Selected IP address:", str(options.ip_address)
|
|
ip = options.ip_address
|
|
else:
|
|
if options.unattended:
|
|
print >> sys.stderr, "Please use --ip-address option to specify the address"
|
|
sys.exit(1)
|
|
else:
|
|
ip = read_ip_address(api.env.host, fstore)
|
|
else:
|
|
ip = hostaddr and ipautil.CheckedIPAddress(hostaddr[0], match_local=True)
|
|
except Exception, e:
|
|
print "Error: Invalid IP Address %s: %s" % (ip, e)
|
|
ip = None
|
|
|
|
if not ip:
|
|
if options.unattended:
|
|
sys.exit("Unable to resolve IP address for host name")
|
|
else:
|
|
ip = read_ip_address(api.env.host, fstore)
|
|
ip_address = str(ip)
|
|
root_logger.debug("will use ip_address: %s\n", ip_address)
|
|
|
|
if options.reverse_zone and not bindinstance.verify_reverse_zone(options.reverse_zone, ip):
|
|
sys.exit(1)
|
|
|
|
if options.no_forwarders:
|
|
dns_forwarders = ()
|
|
elif options.forwarders:
|
|
dns_forwarders = options.forwarders
|
|
else:
|
|
dns_forwarders = read_dns_forwarders()
|
|
root_logger.debug("will use dns_forwarders: %s\n", str(dns_forwarders))
|
|
|
|
if bind.dm_password:
|
|
api.Backend.ldap2.connect(bind_dn=DN(('cn', 'Directory Manager')), bind_pw=bind.dm_password)
|
|
else:
|
|
# See if our LDAP server is up and we can talk to it over GSSAPI
|
|
ccache = krbV.default_context().default_ccache()
|
|
api.Backend.ldap2.connect(ccache)
|
|
|
|
if options.reverse_zone:
|
|
reverse_zone = bindinstance.normalize_zone(options.reverse_zone)
|
|
else:
|
|
reverse_zone = bindinstance.find_reverse_zone(ip)
|
|
if reverse_zone is None and not options.no_reverse:
|
|
if options.unattended:
|
|
reverse_zone = util.get_reverse_zone_default(ip)
|
|
elif bindinstance.create_reverse():
|
|
reverse_zone = util.get_reverse_zone_default(ip)
|
|
reverse_zone = bindinstance.read_reverse_zone(reverse_zone, ip)
|
|
|
|
if reverse_zone is not None:
|
|
print "Using reverse zone %s" % reverse_zone
|
|
|
|
conf_ntp = ntpinstance.NTPInstance(fstore).is_enabled()
|
|
|
|
if not options.unattended:
|
|
print ""
|
|
print "The following operations may take some minutes to complete."
|
|
print "Please wait until the prompt is returned."
|
|
print ""
|
|
|
|
bind.setup(api.env.host, ip_address, api.env.realm, api.env.domain,
|
|
dns_forwarders, conf_ntp, reverse_zone, zonemgr=options.zonemgr,
|
|
zone_refresh=options.zone_refresh,
|
|
persistent_search=options.persistent_search,
|
|
serial_autoincrement=options.serial_autoincrement)
|
|
bind.create_instance()
|
|
|
|
# Restart http instance to make sure that python-dns has the right resolver
|
|
# https://bugzilla.redhat.com/show_bug.cgi?id=800368
|
|
http = httpinstance.HTTPInstance(fstore)
|
|
service.print_msg("Restarting the web server")
|
|
http.restart()
|
|
|
|
print "=============================================================================="
|
|
print "Setup complete"
|
|
print ""
|
|
bind.check_global_configuration()
|
|
print ""
|
|
print ""
|
|
print "\tYou must make sure these network ports are open:"
|
|
print "\t\tTCP Ports:"
|
|
print "\t\t * 53: bind"
|
|
print "\t\tUDP Ports:"
|
|
print "\t\t * 53: bind"
|
|
|
|
return 0
|
|
|
|
if __name__ == '__main__':
|
|
installutils.run_script(main, log_file_name=log_file_name,
|
|
operation_name='ipa-dns-install')
|