mirror of
https://salsa.debian.org/freeipa-team/freeipa.git
synced 2024-12-23 23:50:03 -06:00
b9dc975777
Use proper filter that is caught up by the ACI for 'permission:System: Read Domain Level' to allow any authenticated user to see the domain level. If the server doesn't have domain level set, callers in replica installer expect errors.NotFound but never get it. Return the right exception here and change the other caller to follow the same convention. Inability to retrieve ipaDomainLevel attribute due to a filter mismatch casues ipa-replica-install to fail if run as a replica host principal. Use DOMAIN_LEVEL_0 constant instead of 0 as used by the rest of the code. Fixes: https://pagure.io/freeipa/issue/7876 Reviewed-By: Christian Heimes <cheimes@redhat.com>
175 lines
4.8 KiB
Python
175 lines
4.8 KiB
Python
#
|
|
# Copyright (C) 2015 FreeIPA Contributors see COPYING for license
|
|
#
|
|
|
|
from collections import namedtuple
|
|
|
|
from ipalib import _
|
|
from ipalib import Command
|
|
from ipalib import errors
|
|
from ipalib import output
|
|
from ipalib.parameters import Int
|
|
from ipalib.plugable import Registry
|
|
from ipalib.constants import DOMAIN_LEVEL_0, MIN_DOMAIN_LEVEL
|
|
|
|
from ipapython.dn import DN
|
|
|
|
|
|
__doc__ = _("""
|
|
Raise the IPA Domain Level.
|
|
""")
|
|
|
|
register = Registry()
|
|
|
|
DomainLevelRange = namedtuple('DomainLevelRange', ['min', 'max'])
|
|
|
|
domainlevel_output = (
|
|
output.Output('result', int, _('Current domain level:')),
|
|
)
|
|
|
|
|
|
def get_domainlevel_dn(api):
|
|
domainlevel_dn = DN(
|
|
('cn', 'Domain Level'),
|
|
('cn', 'ipa'),
|
|
('cn', 'etc'),
|
|
api.env.basedn
|
|
)
|
|
|
|
return domainlevel_dn
|
|
|
|
|
|
def get_domainlevel_range(master_entry):
|
|
try:
|
|
return DomainLevelRange(
|
|
int(master_entry['ipaMinDomainLevel'][0]),
|
|
int(master_entry['ipaMaxDomainLevel'][0])
|
|
)
|
|
except KeyError:
|
|
return DomainLevelRange(DOMAIN_LEVEL_0, DOMAIN_LEVEL_0)
|
|
|
|
|
|
def check_conflict_entries(ldap, api, desired_value):
|
|
"""
|
|
Check if conflict entries exist in topology subtree
|
|
"""
|
|
|
|
container_dn = DN(
|
|
('cn', 'ipa'),
|
|
('cn', 'etc'),
|
|
api.env.basedn
|
|
)
|
|
conflict = "(nsds5replconflict=*)"
|
|
subentry = "(|(objectclass=ldapsubentry)(objectclass=*))"
|
|
try:
|
|
ldap.get_entries(
|
|
filter="(& %s %s)" % (conflict, subentry),
|
|
base_dn=container_dn,
|
|
scope=ldap.SCOPE_SUBTREE)
|
|
message = _("Domain Level cannot be raised to {0}, "
|
|
"existing replication conflicts have to be resolved."
|
|
).format(desired_value)
|
|
raise errors.InvalidDomainLevelError(reason=message)
|
|
except errors.NotFound:
|
|
pass
|
|
|
|
def get_master_entries(ldap, api):
|
|
"""
|
|
Returns list of LDAPEntries representing IPA masters.
|
|
"""
|
|
|
|
container_masters = DN(
|
|
('cn', 'masters'),
|
|
('cn', 'ipa'),
|
|
('cn', 'etc'),
|
|
api.env.basedn
|
|
)
|
|
|
|
masters, _dummy = ldap.find_entries(
|
|
filter="(cn=*)",
|
|
base_dn=container_masters,
|
|
scope=ldap.SCOPE_ONELEVEL,
|
|
paged_search=True, # we need to make sure to get all of them
|
|
)
|
|
|
|
return masters
|
|
|
|
|
|
@register()
|
|
class domainlevel_get(Command):
|
|
__doc__ = _('Query current Domain Level.')
|
|
|
|
has_output = domainlevel_output
|
|
|
|
def execute(self, *args, **options):
|
|
ldap = self.api.Backend.ldap2
|
|
entry = ldap.get_entries(
|
|
get_domainlevel_dn(self.api),
|
|
scope=ldap.SCOPE_BASE,
|
|
filter='(objectclass=ipadomainlevelconfig)',
|
|
attrs_list=['ipaDomainLevel']
|
|
)[0]
|
|
|
|
try:
|
|
value = int(entry.single_value['ipaDomainLevel'])
|
|
return {'result': value}
|
|
except KeyError:
|
|
raise errors.NotFound(
|
|
reason=_(
|
|
'Server does not support domain level functionality'))
|
|
|
|
|
|
@register()
|
|
class domainlevel_set(Command):
|
|
__doc__ = _('Change current Domain Level.')
|
|
|
|
has_output = domainlevel_output
|
|
|
|
takes_args = (
|
|
Int('ipadomainlevel',
|
|
cli_name='level',
|
|
label=_('Domain Level'),
|
|
minvalue=MIN_DOMAIN_LEVEL,
|
|
),
|
|
)
|
|
|
|
def execute(self, *args, **options):
|
|
"""
|
|
Checks all the IPA masters for supported domain level ranges.
|
|
|
|
If the desired domain level is within the supported range of all
|
|
masters, it will be raised.
|
|
|
|
Domain level cannot be lowered.
|
|
"""
|
|
|
|
ldap = self.api.Backend.ldap2
|
|
|
|
current_entry = ldap.get_entry(get_domainlevel_dn(self.api))
|
|
current_value = int(current_entry.single_value['ipadomainlevel'])
|
|
desired_value = int(args[0])
|
|
|
|
# Domain level cannot be lowered
|
|
if int(desired_value) < int(current_value):
|
|
message = _("Domain Level cannot be lowered.")
|
|
raise errors.InvalidDomainLevelError(reason=message)
|
|
|
|
# Check if every master supports the desired level
|
|
for master in get_master_entries(ldap, self.api):
|
|
supported = get_domainlevel_range(master)
|
|
|
|
if supported.min > desired_value or supported.max < desired_value:
|
|
message = _("Domain Level cannot be raised to {0}, server {1} "
|
|
"does not support it."
|
|
).format(desired_value, master['cn'][0])
|
|
raise errors.InvalidDomainLevelError(reason=message)
|
|
|
|
# Check if conflict entries exist in topology subtree
|
|
# should be resolved first
|
|
check_conflict_entries(ldap, self.api, desired_value)
|
|
|
|
current_entry.single_value['ipaDomainLevel'] = desired_value
|
|
ldap.update_entry(current_entry)
|
|
|
|
return {'result': int(current_entry.single_value['ipaDomainLevel'])}
|