mirror of
https://salsa.debian.org/freeipa-team/freeipa.git
synced 2024-12-29 10:21:18 -06:00
2cbc6fd6a2
Remove redundant ipa-client-install error message when optional nscd daemon was not installed. Additionally, use standard IPA functions for service manipulation and improve logging. https://fedorahosted.org/freeipa/ticket/1207
366 lines
12 KiB
Python
366 lines
12 KiB
Python
# Authors: Karl MacMillan <kmacmillan@mentalrootkit.com>
|
|
#
|
|
# Copyright (C) 2007 Red Hat
|
|
# see file 'COPYING' for use and warranty information
|
|
#
|
|
# This program is free software; you can redistribute it and/or modify
|
|
# it under the terms of the GNU General Public License as published by
|
|
# the Free Software Foundation, either version 3 of the License, or
|
|
# (at your option) any later version.
|
|
#
|
|
# This program is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU General Public License
|
|
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
#
|
|
|
|
import logging, sys
|
|
import os, socket
|
|
import tempfile
|
|
from ipapython import sysrestore
|
|
from ipapython import ipautil
|
|
from ipalib import errors
|
|
import ldap
|
|
from ipaserver import ipaldap
|
|
import base64
|
|
import time
|
|
import datetime
|
|
from ipaserver.install import installutils
|
|
|
|
CACERT = "/etc/ipa/ca.crt"
|
|
|
|
SERVICE_LIST = {
|
|
'KDC':('krb5kdc', 10),
|
|
'KPASSWD':('ipa_kpasswd', 20),
|
|
'DNS':('named', 30),
|
|
'HTTP':('httpd', 40),
|
|
'CA':('pki-cad', 50)
|
|
}
|
|
|
|
def stop(service_name, instance_name="", capture_output=True):
|
|
ipautil.service_stop(service_name, instance_name, capture_output)
|
|
|
|
def start(service_name, instance_name="", capture_output=True):
|
|
ipautil.service_start(service_name, instance_name, capture_output)
|
|
|
|
def restart(service_name, instance_name="", capture_output=True):
|
|
ipautil.service_restart(service_name, instance_name, capture_output)
|
|
|
|
def is_running(service_name, instance_name=""):
|
|
return ipautil.service_is_running(service_name, instance_name)
|
|
|
|
def is_installed(service_name):
|
|
return ipautil.service_is_installed(service_name)
|
|
|
|
def chkconfig_on(service_name):
|
|
ipautil.chkconfig_on(service_name)
|
|
|
|
def chkconfig_off(service_name):
|
|
ipautil.chkconfig_on(service_name)
|
|
|
|
def chkconfig_add(service_name):
|
|
ipautil.chkconfig_on(service_name)
|
|
|
|
def chkconfig_del(service_name):
|
|
ipautil.chkconfig_on(service_name)
|
|
|
|
def is_enabled(service_name):
|
|
return ipautil.service_is_enabled(service_name)
|
|
|
|
def print_msg(message, output_fd=sys.stdout):
|
|
logging.debug(message)
|
|
output_fd.write(message)
|
|
output_fd.write("\n")
|
|
|
|
|
|
class Service(object):
|
|
def __init__(self, service_name, sstore=None, dm_password=None):
|
|
self.service_name = service_name
|
|
self.steps = []
|
|
self.output_fd = sys.stdout
|
|
self.dm_password = dm_password
|
|
|
|
self.fqdn = socket.gethostname()
|
|
self.admin_conn = None
|
|
|
|
if sstore:
|
|
self.sstore = sstore
|
|
else:
|
|
self.sstore = sysrestore.StateFile('/var/lib/ipa/sysrestore')
|
|
|
|
self.realm = None
|
|
self.suffix = None
|
|
self.principal = None
|
|
|
|
def ldap_connect(self):
|
|
self.admin_conn = self.__get_conn(self.fqdn, self.dm_password)
|
|
|
|
def ldap_disconnect(self):
|
|
self.admin_conn.unbind()
|
|
self.admin_conn = None
|
|
|
|
def _ldap_mod(self, ldif, sub_dict = None):
|
|
|
|
pw_name = None
|
|
fd = None
|
|
path = ipautil.SHARE_DIR + ldif
|
|
hostname = installutils.get_fqdn()
|
|
nologlist=[]
|
|
|
|
if sub_dict is not None:
|
|
txt = ipautil.template_file(path, sub_dict)
|
|
fd = ipautil.write_tmp_file(txt)
|
|
path = fd.name
|
|
|
|
# do not log passwords
|
|
if sub_dict.has_key('PASSWORD'):
|
|
nologlist.append(sub_dict['PASSWORD'])
|
|
if sub_dict.has_key('RANDOM_PASSWORD'):
|
|
nologlist.append(sub_dict['RANDOM_PASSWORD'])
|
|
|
|
if self.dm_password:
|
|
[pw_fd, pw_name] = tempfile.mkstemp()
|
|
os.write(pw_fd, self.dm_password)
|
|
os.close(pw_fd)
|
|
auth_parms = ["-x", "-D", "cn=Directory Manager", "-y", pw_name]
|
|
else:
|
|
auth_parms = ["-Y", "GSSAPI"]
|
|
|
|
args = ["/usr/bin/ldapmodify", "-h", hostname, "-v", "-f", path]
|
|
args += auth_parms
|
|
|
|
try:
|
|
try:
|
|
ipautil.run(args, nolog=nologlist)
|
|
except ipautil.CalledProcessError, e:
|
|
logging.critical("Failed to load %s: %s" % (ldif, str(e)))
|
|
finally:
|
|
if pw_name:
|
|
os.remove(pw_name)
|
|
|
|
if fd is not None:
|
|
fd.close()
|
|
|
|
def move_service(self, principal):
|
|
"""
|
|
Used to move a principal entry created by kadmin.local from
|
|
cn=kerberos to cn=services
|
|
"""
|
|
|
|
dn = "krbprincipalname=%s,cn=%s,cn=kerberos,%s" % (principal, self.realm, self.suffix)
|
|
try:
|
|
entry = self.admin_conn.getEntry(dn, ldap.SCOPE_BASE)
|
|
except errors.NotFound:
|
|
# There is no service in the wrong location, nothing to do.
|
|
# This can happen when installing a replica
|
|
return
|
|
newdn = "krbprincipalname=%s,cn=services,cn=accounts,%s" % (principal, self.suffix)
|
|
hostdn = "fqdn=%s,cn=computers,cn=accounts,%s" % (self.fqdn, self.suffix)
|
|
self.admin_conn.deleteEntry(dn)
|
|
entry.dn = newdn
|
|
classes = entry.getValues("objectclass")
|
|
classes = classes + ["ipaobject", "ipaservice", "pkiuser"]
|
|
entry.setValues("objectclass", list(set(classes)))
|
|
entry.setValue("ipauniqueid", 'autogenerate')
|
|
entry.setValue("managedby", hostdn)
|
|
self.admin_conn.addEntry(entry)
|
|
return newdn
|
|
|
|
def add_simple_service(self, principal):
|
|
"""
|
|
Add a very basic IPA service.
|
|
|
|
The principal needs to be fully-formed: service/host@REALM
|
|
"""
|
|
if not self.admin_conn:
|
|
self.ldap_connect()
|
|
|
|
dn = "krbprincipalname=%s,cn=services,cn=accounts,%s" % (principal, self.suffix)
|
|
hostdn = "fqdn=%s,cn=computers,cn=accounts,%s" % (self.fqdn, self.suffix)
|
|
entry = ipaldap.Entry(dn)
|
|
entry.setValues("objectclass", ["krbprincipal", "krbprincipalaux", "krbticketpolicyaux", "ipaobject", "ipaservice", "pkiuser"])
|
|
entry.setValue("krbprincipalname", principal)
|
|
entry.setValue("ipauniqueid", 'autogenerate')
|
|
entry.setValue("managedby", hostdn)
|
|
self.admin_conn.addEntry(entry)
|
|
return dn
|
|
|
|
def add_cert_to_service(self):
|
|
"""
|
|
Add a certificate to a service
|
|
|
|
This should be passed in DER format but we'll be nice and convert
|
|
a base64-encoded cert if needed (like when we add certs that come
|
|
from PKCS#12 files.)
|
|
"""
|
|
|
|
if not self.admin_conn:
|
|
self.ldap_connect()
|
|
|
|
try:
|
|
s = self.dercert.find('-----BEGIN CERTIFICATE-----')
|
|
if s > -1:
|
|
e = self.dercert.find('-----END CERTIFICATE-----')
|
|
s = s + 27
|
|
self.dercert = self.dercert[s:e]
|
|
self.dercert = base64.b64decode(self.dercert)
|
|
except Exception:
|
|
pass
|
|
dn = "krbprincipalname=%s,cn=services,cn=accounts,%s" % (self.principal, self.suffix)
|
|
mod = [(ldap.MOD_ADD, 'userCertificate', self.dercert)]
|
|
try:
|
|
self.admin_conn.modify_s(dn, mod)
|
|
except Exception, e:
|
|
logging.critical("Could not add certificate to service %s entry: %s" % (self.principal, str(e)))
|
|
|
|
def is_configured(self):
|
|
return self.sstore.has_state(self.service_name)
|
|
|
|
def set_output(self, fd):
|
|
self.output_fd = fd
|
|
|
|
def stop(self, instance_name="", capture_output=True):
|
|
stop(self.service_name, instance_name, capture_output=capture_output)
|
|
|
|
def start(self, instance_name="", capture_output=True):
|
|
start(self.service_name, instance_name, capture_output=capture_output)
|
|
|
|
def restart(self, instance_name="", capture_output=True):
|
|
restart(self.service_name, instance_name, capture_output=capture_output)
|
|
|
|
def is_running(self):
|
|
return is_running(self.service_name)
|
|
|
|
def chkconfig_add(self):
|
|
chkconfig_add(self.service_name)
|
|
|
|
def chkconfig_del(self):
|
|
chkconfig_del(self.service_name)
|
|
|
|
def chkconfig_on(self):
|
|
chkconfig_on(self.service_name)
|
|
|
|
def chkconfig_off(self):
|
|
chkconfig_off(self.service_name)
|
|
|
|
def is_enabled(self):
|
|
return is_enabled(self.service_name)
|
|
|
|
def backup_state(self, key, value):
|
|
self.sstore.backup_state(self.service_name, key, value)
|
|
|
|
def restore_state(self, key):
|
|
return self.sstore.restore_state(self.service_name, key)
|
|
|
|
def print_msg(self, message):
|
|
print_msg(message, self.output_fd)
|
|
|
|
def step(self, message, method):
|
|
self.steps.append((message, method))
|
|
|
|
def start_creation(self, message, runtime=-1):
|
|
if runtime > 0:
|
|
plural=''
|
|
est = time.localtime(runtime)
|
|
if est.tm_min > 0:
|
|
if est.tm_min > 1:
|
|
plural = 's'
|
|
self.print_msg('%s: Estimated time %d minute%s' % (message, est.tm_min, plural))
|
|
else:
|
|
if est.tm_sec > 1:
|
|
plural = 's'
|
|
self.print_msg('%s: Estimated time %d second%s' % (message, est.tm_sec, plural))
|
|
else:
|
|
self.print_msg(message)
|
|
|
|
step = 0
|
|
for (message, method) in self.steps:
|
|
self.print_msg(" [%d/%d]: %s" % (step+1, len(self.steps), message))
|
|
s = datetime.datetime.now()
|
|
method()
|
|
e = datetime.datetime.now()
|
|
d = e - s
|
|
logging.debug(" duration: %d seconds" % d.seconds)
|
|
step += 1
|
|
|
|
self.print_msg("done configuring %s." % self.service_name)
|
|
|
|
self.steps = []
|
|
|
|
def __get_conn(self, fqdn, dm_password):
|
|
# If we are passed a password we'll use it as the DM password
|
|
# otherwise we'll do a GSSAPI bind.
|
|
try:
|
|
# conn = ipaldap.IPAdmin(fqdn, port=636, cacert=CACERT)
|
|
conn = ipaldap.IPAdmin(fqdn, port=389)
|
|
if dm_password:
|
|
conn.do_simple_bind(bindpw=dm_password)
|
|
else:
|
|
conn.do_sasl_gssapi_bind()
|
|
except Exception, e:
|
|
logging.debug("Could not connect to the Directory Server on %s: %s" % (fqdn, str(e)))
|
|
raise e
|
|
|
|
return conn
|
|
|
|
def ldap_enable(self, name, fqdn, dm_password, ldap_suffix):
|
|
self.chkconfig_off()
|
|
conn = self.__get_conn(fqdn, dm_password)
|
|
|
|
entry_name = "cn=%s,cn=%s,%s,%s" % (name, fqdn,
|
|
"cn=masters,cn=ipa,cn=etc",
|
|
ldap_suffix)
|
|
order = SERVICE_LIST[name][1]
|
|
entry = ipaldap.Entry(entry_name)
|
|
entry.setValues("objectclass",
|
|
"nsContainer", "ipaConfigObject")
|
|
entry.setValues("cn", name)
|
|
entry.setValues("ipaconfigstring",
|
|
"enabledService", "startOrder " + str(order))
|
|
|
|
try:
|
|
conn.add_s(entry)
|
|
except ldap.ALREADY_EXISTS, e:
|
|
logging.critical("failed to add %s Service startup entry" % name)
|
|
raise e
|
|
|
|
class SimpleServiceInstance(Service):
|
|
def create_instance(self, gensvc_name=None, fqdn=None, dm_password=None, ldap_suffix=None):
|
|
self.gensvc_name = gensvc_name
|
|
self.fqdn = fqdn
|
|
self.dm_password = dm_password
|
|
self.suffix = ldap_suffix
|
|
|
|
self.step("starting %s " % self.service_name, self.__start)
|
|
self.step("configuring %s to start on boot" % self.service_name, self.__enable)
|
|
self.start_creation("Configuring %s" % self.service_name)
|
|
|
|
def __start(self):
|
|
self.backup_state("running", self.is_running())
|
|
self.restart()
|
|
|
|
def __enable(self):
|
|
self.chkconfig_add()
|
|
self.backup_state("enabled", self.is_enabled())
|
|
if self.gensvc_name == None:
|
|
self.chkconfig_on()
|
|
else:
|
|
self.ldap_enable(self.gensvc_name, self.fqdn,
|
|
self.dm_password, self.suffix)
|
|
|
|
def uninstall(self):
|
|
if self.is_configured():
|
|
self.print_msg("Unconfiguring %s" % self.service_name)
|
|
|
|
running = self.restore_state("running")
|
|
enabled = not self.restore_state("enabled")
|
|
|
|
if not running is None and not running:
|
|
self.stop()
|
|
if not enabled is None and not enabled:
|
|
self.chkconfig_off()
|
|
self.chkconfig_del()
|