summaryrefslogtreecommitdiffstats
path: root/install/tools
diff options
context:
space:
mode:
authorJan Cholasta <jcholast@redhat.com>2015-05-28 06:06:05 +0200
committerJan Cholasta <jcholast@redhat.com>2015-05-29 08:00:33 +0000
commit3cb42e33c06fb66702ecfd34ddcad9b548f23132 (patch)
treebdc8ae9b86392d1597568541257885d877914c79 /install/tools
parent6dabe6ebb28c9972cedc3fb7cc1e59ddd8e5e5b6 (diff)
downloadfreeipa-3cb42e33c06fb66702ecfd34ddcad9b548f23132.tar.gz
freeipa-3cb42e33c06fb66702ecfd34ddcad9b548f23132.tar.xz
freeipa-3cb42e33c06fb66702ecfd34ddcad9b548f23132.zip
install: Move ipa-replica-install code into a module
https://fedorahosted.org/freeipa/ticket/4468 Reviewed-By: Martin Basti <mbasti@redhat.com>
Diffstat (limited to 'install/tools')
-rwxr-xr-xinstall/tools/ipa-replica-install606
1 files changed, 10 insertions, 596 deletions
diff --git a/install/tools/ipa-replica-install b/install/tools/ipa-replica-install
index 1df782b73..775312b87 100755
--- a/install/tools/ipa-replica-install
+++ b/install/tools/ipa-replica-install
@@ -19,46 +19,23 @@
#
import sys
-import socket
-
-import os, pwd, shutil
+import os
from optparse import OptionGroup
-from contextlib import contextmanager
-
-import dns.resolver
-import dns.reversename
-import dns.exception
from ipapython import ipautil
-
-from ipaserver.install import dsinstance, installutils, krbinstance, service
-from ipaserver.install import bindinstance, httpinstance, ntpinstance
-from ipaserver.install import memcacheinstance, dnskeysyncinstance
-from ipaserver.install import otpdinstance
-from ipaserver.install.replication import replica_conn_check, ReplicationManager
-from ipaserver.install.installutils import (
- create_replica_config, private_ccache)
-from ipaserver.plugins.ldap2 import ldap2
-from ipaserver.install import cainstance
-from ipaserver.install import kra
-from ipaserver.install import dns as dns_installer
-from ipalib import api, create_api, errors, util, certstore, x509
-from ipalib import constants
+from ipaserver.install import installutils
+from ipaserver.install import server
from ipapython import version
from ipapython.config import IPAOptionParser
-from ipapython import sysrestore
-from ipapython.ipa_log_manager import *
-from ipapython import dogtag
+from ipapython.ipa_log_manager import root_logger, standard_logging_setup
from ipapython.dn import DN
-import ipaclient.ntpconf
-from ipaplatform.tasks import tasks
-from ipaplatform import services
from ipaplatform.paths import paths
log_file_name = paths.IPAREPLICA_INSTALL_LOG
DIRMAN_DN = DN(('cn', 'directory manager'))
REPLICA_INFO_TOP_DIR = None
+
def parse_options():
usage = "%prog [options] REPLICA_FILE"
parser = IPAOptionParser(usage=usage, version=version.VERSION)
@@ -156,256 +133,8 @@ def parse_options():
return safe_options, options, args[0]
-def get_dirman_password():
- return installutils.read_password("Directory Manager (existing master)", confirm=False, validate=False)
-
-def set_owner(config, dir):
- pw = pwd.getpwnam(dsinstance.DS_USER)
- os.chown(dir, pw.pw_uid, pw.pw_gid)
-
-
-def make_pkcs12_info(directory, cert_name, password_name):
- """Make pkcs12_info
-
- :param directory: Base directory (config.dir)
- :param cert_name: Cert filename (e.g. "dscert.p12")
- :param password_name: Cert filename (e.g. "dirsrv_pin.txt")
- :return: a (full cert path, password) tuple, or None if cert is not found
- """
- cert_path = os.path.join(directory, cert_name)
- if ipautil.file_exists(cert_path):
- password_file = os.path.join(directory, password_name)
- password = open(password_file).read().strip()
- return cert_path, password
- else:
- return None
-
-
-def install_replica_ds(config):
- dsinstance.check_ports()
-
- # if we have a pkcs12 file, create the cert db from
- # that. Otherwise the ds setup will create the CA
- # cert
- pkcs12_info = make_pkcs12_info(config.dir, "dscert.p12", "dirsrv_pin.txt")
-
- ds = dsinstance.DsInstance()
- ds.create_replica(
- realm_name=config.realm_name,
- master_fqdn=config.master_host_name,
- fqdn=config.host_name,
- domain_name=config.domain_name,
- dm_password=config.dirman_password,
- subject_base=config.subject_base,
- pkcs12_info=pkcs12_info,
- ca_is_configured=ipautil.file_exists(config.dir + "/cacert.p12"),
- ca_file=config.dir + "/ca.crt",
- )
-
- return ds
-
-def install_krb(config, setup_pkinit=False):
- krb = krbinstance.KrbInstance()
-
- #pkinit files
- pkcs12_info = make_pkcs12_info(config.dir, "pkinitcert.p12",
- "pkinit_pin.txt")
-
- krb.create_replica(config.realm_name,
- config.master_host_name, config.host_name,
- config.domain_name, config.dirman_password,
- setup_pkinit, pkcs12_info)
-
- return krb
-
-
-def install_ca_cert(ldap, base_dn, realm, cafile):
- try:
- try:
- certs = certstore.get_ca_certs(ldap, base_dn, realm, False)
- except errors.NotFound:
- shutil.copy(cafile, constants.CACERT)
- else:
- certs = [c[0] for c in certs if c[2] is not False]
- x509.write_certificate_list(certs, constants.CACERT)
-
- os.chmod(constants.CACERT, 0444)
- except Exception, e:
- print "error copying files: " + str(e)
- sys.exit(1)
-
-def install_http(config, auto_redirect):
- # if we have a pkcs12 file, create the cert db from
- # that. Otherwise the ds setup will create the CA
- # cert
- pkcs12_info = make_pkcs12_info(config.dir, "httpcert.p12", "http_pin.txt")
-
- memcache = memcacheinstance.MemcacheInstance()
- memcache.create_instance('MEMCACHE', config.host_name, config.dirman_password, ipautil.realm_to_suffix(config.realm_name))
-
- http = httpinstance.HTTPInstance()
- http.create_instance(
- config.realm_name, config.host_name, config.domain_name,
- config.dirman_password, False, pkcs12_info,
- auto_redirect=auto_redirect, ca_file = config.dir + "/ca.crt",
- ca_is_configured=ipautil.file_exists(config.dir + "/cacert.p12"))
-
- # Now copy the autoconfiguration files
- try:
- if ipautil.file_exists(config.dir + "/preferences.html"):
- shutil.copy(config.dir + "/preferences.html",
- paths.PREFERENCES_HTML)
- if ipautil.file_exists(config.dir + "/configure.jar"):
- shutil.copy(config.dir + "/configure.jar",
- paths.CONFIGURE_JAR)
- except Exception, e:
- print "error copying files: " + str(e)
- sys.exit(1)
-
- http.setup_firefox_extension(config.realm_name, config.domain_name)
-
- return http
-
-def install_dns_records(config, options, remote_api):
-
- if not bindinstance.dns_container_exists(config.master_host_name,
- ipautil.realm_to_suffix(config.realm_name),
- dm_password=config.dirman_password):
- return
-
- try:
- bind = bindinstance.BindInstance(dm_password=config.dirman_password,
- api=remote_api)
- for ip in config.ips:
- reverse_zone = bindinstance.find_reverse_zone(ip, remote_api)
-
- bind.add_master_dns_records(config.host_name,
- str(ip),
- config.realm_name,
- config.domain_name,
- reverse_zone,
- options.conf_ntp,
- options.setup_ca)
- except errors.NotFound, e:
- root_logger.debug('Replica DNS records could not be added '
- 'on master: %s', str(e))
-
- # we should not fail here no matter what
- except Exception, e:
- root_logger.info('Replica DNS records could not be added '
- 'on master: %s', str(e))
-
-
-def check_dirsrv():
- (ds_unsecure, ds_secure) = dsinstance.check_ports()
- if not ds_unsecure or not ds_secure:
- print "IPA requires ports 389 and 636 for the Directory Server."
- print "These are currently in use:"
- if not ds_unsecure:
- print "\t389"
- if not ds_secure:
- print "\t636"
- sys.exit(1)
-
-def check_bind():
- if not (bindinstance.check_inst(unattended=True) and
- dnskeysyncinstance.check_inst()):
- print "Aborting installation"
- sys.exit(1)
-
-
-def check_dns_resolution(host_name, dns_servers):
- """Check forward and reverse resolution of host_name using dns_servers
- """
- # Point the resolver at specified DNS server
- server_ips = []
- for dns_server in dns_servers:
- try:
- server_ips = list(
- a[4][0] for a in socket.getaddrinfo(dns_server, None))
- except socket.error:
- pass
- else:
- break
- if not server_ips:
- root_logger.error(
- 'Could not resolve any DNS server hostname: %s', dns_servers)
- return False
- resolver = dns.resolver.Resolver()
- resolver.nameservers = server_ips
-
- root_logger.debug('Search DNS server %s (%s) for %s',
- dns_server, server_ips, host_name)
-
- # Get IP addresses of host_name
- addresses = set()
- for rtype in 'A', 'AAAA':
- try:
- result = resolver.query(host_name, rtype)
- except dns.exception.DNSException:
- rrset = []
- else:
- rrset = result.rrset
- if rrset:
- addresses.update(r.address for r in result.rrset)
-
- if not addresses:
- root_logger.error(
- 'Could not resolve hostname %s using DNS. '
- 'Clients may not function properly. '
- 'Please check your DNS setup. '
- '(Note that this check queries IPA DNS directly and '
- 'ignores /etc/hosts.)',
- host_name)
- return False
-
- no_errors = True
-
- # Check each of the IP addresses
- checked = set()
- for address in addresses:
- if address in checked:
- continue
- checked.add(address)
- try:
- root_logger.debug('Check reverse address %s (%s)',
- address, host_name)
- revname = dns.reversename.from_address(address)
- rrset = resolver.query(revname, 'PTR').rrset
- except Exception, e:
- root_logger.debug('Check failed: %s %s', type(e).__name__, e)
- root_logger.error(
- 'Reverse DNS resolution of address %s (%s) failed. '
- 'Clients may not function properly. '
- 'Please check your DNS setup. '
- '(Note that this check queries IPA DNS directly and '
- 'ignores /etc/hosts.)',
- address, host_name)
- no_errors = False
- else:
- host_name_obj = dns.name.from_text(host_name)
- if rrset:
- names = [r.target.to_text() for r in rrset]
- else:
- names = []
- root_logger.debug(
- 'Address %s resolves to: %s. ', address, ', '.join(names))
- if not rrset or not any(
- r.target == host_name_obj for r in rrset):
- root_logger.error(
- 'The IP address %s of host %s resolves to: %s. '
- 'Clients may not function properly. '
- 'Please check your DNS setup. '
- '(Note that this check queries IPA DNS directly and '
- 'ignores /etc/hosts.)',
- address, host_name, ', '.join(names))
- no_errors = False
-
- return no_errors
-
def main():
- tasks.check_selinux_status()
safe_options, options, filename = parse_options()
if os.geteuid() != 0:
@@ -418,315 +147,9 @@ def main():
if not ipautil.file_exists(filename):
sys.exit("Replica file %s does not exist" % filename)
- client_fstore = sysrestore.FileStore(paths.IPA_CLIENT_SYSRESTORE)
- if client_fstore.has_files():
- sys.exit("IPA client is already configured on this system.\n" +
- "Please uninstall it first before configuring the replica, " +
- "using 'ipa-client-install --uninstall'.")
-
- global sstore
- sstore = sysrestore.StateFile(paths.SYSRESTORE)
-
- global fstore
- fstore = sysrestore.FileStore(paths.SYSRESTORE)
-
- # Check to see if httpd is already configured to listen on 443
- if httpinstance.httpd_443_configured():
- sys.exit("Aborting installation")
-
- check_dirsrv()
-
- if options.setup_ca:
- if not cainstance.check_port():
- print "IPA requires port 8443 for PKI but it is currently in use."
- sys.exit("Aborting installation")
-
- if options.conf_ntp:
- try:
- ipaclient.ntpconf.check_timedate_services()
- except ipaclient.ntpconf.NTPConflictingService, e:
- print "WARNING: conflicting time&date synchronization service '%s'" \
- " will" % e.conflicting_service
- print "be disabled in favor of ntpd"
- print ""
- except ipaclient.ntpconf.NTPConfigurationError:
- pass
-
- # get the directory manager password
- dirman_password = options.password
- if not dirman_password:
- try:
- dirman_password = get_dirman_password()
- except KeyboardInterrupt:
- sys.exit(0)
- if dirman_password is None:
- sys.exit("Directory Manager password required")
-
- config = create_replica_config(dirman_password, filename, options)
- global REPLICA_INFO_TOP_DIR
- REPLICA_INFO_TOP_DIR = config.top_dir
- config.setup_ca = options.setup_ca
-
- if config.setup_ca and not ipautil.file_exists(config.dir + "/cacert.p12"):
- print 'CA cannot be installed in CA-less setup.'
- sys.exit(1)
-
- config.setup_kra = options.setup_kra
- if config.setup_kra:
- try:
- kra.install_check(config, options, False,
- dogtag.install_constants.DOGTAG_VERSION)
- except RuntimeError as e:
- print str(e)
- exit(1)
-
- installutils.verify_fqdn(config.master_host_name, options.no_host_dns)
-
- if options.setup_dns:
- dns_installer.install_check(False, True, options, config.host_name)
- else:
- installutils.get_server_ip_address(config.host_name, fstore,
- options.unattended, False,
- options.ip_addresses)
-
- # check connection
- if not options.skip_conncheck:
- replica_conn_check(
- config.master_host_name, config.host_name, config.realm_name,
- options.setup_ca, config.ca_ds_port, options.admin_password)
-
-
- # Create the management framework config file
- # Note: We must do this before bootstraping and finalizing ipalib.api
- old_umask = os.umask(022) # must be readable for httpd
- try:
- fd = open(paths.IPA_DEFAULT_CONF, "w")
- fd.write("[global]\n")
- fd.write("host=%s\n" % config.host_name)
- fd.write("basedn=%s\n" % str(ipautil.realm_to_suffix(config.realm_name)))
- fd.write("realm=%s\n" % config.realm_name)
- fd.write("domain=%s\n" % config.domain_name)
- fd.write("xmlrpc_uri=https://%s/ipa/xml\n" % ipautil.format_netloc(config.host_name))
- fd.write("ldap_uri=ldapi://%%2fvar%%2frun%%2fslapd-%s.socket\n" %
- installutils.realm_to_serverid(config.realm_name))
- if ipautil.file_exists(config.dir + "/cacert.p12"):
- fd.write("enable_ra=True\n")
- fd.write("ra_plugin=dogtag\n")
- fd.write("dogtag_version=%s\n" %
- dogtag.install_constants.DOGTAG_VERSION)
- else:
- fd.write("enable_ra=False\n")
- fd.write("ra_plugin=none\n")
-
- fd.write("enable_kra=%s\n" % config.setup_kra)
-
- fd.write("mode=production\n")
- fd.close()
- finally:
- os.umask(old_umask)
-
- api.bootstrap(in_server=True, context='installer')
- api.finalize()
-
- # Create DS user/group if it doesn't exist yet
- dsinstance.create_ds_user()
-
- #Automatically disable pkinit w/ dogtag until that is supported
- options.setup_pkinit = False
-
- cafile = config.dir + "/ca.crt"
- if not ipautil.file_exists(cafile):
- raise RuntimeError("CA cert file is not available. Please run "
- "ipa-replica-prepare to create a new replica file.")
-
- ldapuri = 'ldaps://%s' % ipautil.format_netloc(config.master_host_name)
- remote_api = create_api(mode=None)
- remote_api.bootstrap(in_server=True, context='installer',
- ldap_uri=ldapuri, basedn=DN())
- remote_api.finalize()
- conn = remote_api.Backend.ldap2
- replman = None
- try:
- try:
- # Try out the password
- conn.connect(bind_dn=DIRMAN_DN, bind_pw=config.dirman_password,
- tls_cacertfile=cafile)
- replman = ReplicationManager(config.realm_name, config.master_host_name,
- config.dirman_password)
-
- # Check that we don't already have a replication agreement
- try:
- (agreement_cn, agreement_dn) = replman.agreement_dn(config.host_name)
- entry = conn.get_entry(agreement_dn, ['*'])
- except errors.NotFound:
- pass
- else:
- root_logger.info('Error: A replication agreement for this host '
- 'already exists.')
- print ('A replication agreement for this host already exists. '
- 'It needs to be removed.')
- print "Run this on the master that generated the info file:"
- print " %% ipa-replica-manage del %s --force" % config.host_name
- exit(3)
-
- # Detect the current domain level
- try:
- current = remote_api.Command['domainlevel_get']()['result']
- except errors.NotFound:
- # If we're joining an older master, domain entry is not
- # available
- current = 0
-
- # Detect if current level is out of supported range
- # for this IPA version
- under_lower_bound = current < constants.MIN_DOMAIN_LEVEL
- above_upper_bound = current > constants.MAX_DOMAIN_LEVEL
-
- if under_lower_bound or above_upper_bound:
- message = ("This version of FreeIPA does not support "
- "the Domain Level which is currently set for "
- "this domain. The Domain Level needs to be "
- "raised before installing a replica with "
- "this version is allowed to be installed "
- "within this domain.")
- root_logger.error(message)
- print(message)
- exit(3)
-
- # Check pre-existing host entry
- try:
- entry = conn.find_entries(u'fqdn=%s' % config.host_name, ['fqdn'], DN(api.env.container_host, api.env.basedn))
- except errors.NotFound:
- pass
- else:
- root_logger.info(
- 'Error: Host %s already exists on the master server.' % config.host_name)
- print 'The host %s already exists on the master server.' % config.host_name
- print "You should remove it before proceeding:"
- print " %% ipa host-del %s" % config.host_name
- exit(3)
-
- # Install CA cert so that we can do SSL connections with ldap
- install_ca_cert(conn, api.env.basedn, api.env.realm, cafile)
-
- dns_masters = remote_api.Object['dnsrecord'].get_dns_masters()
- if dns_masters:
- if not options.no_host_dns:
- master = config.master_host_name
- root_logger.debug('Check forward/reverse DNS resolution')
- resolution_ok = (
- check_dns_resolution(master, dns_masters) and
- check_dns_resolution(config.host_name, dns_masters))
- if not resolution_ok and not options.unattended:
- if not ipautil.user_input("Continue?", False):
- sys.exit(0)
- else:
- root_logger.debug('No IPA DNS servers, '
- 'skipping forward/reverse resolution check')
-
- except errors.ACIError:
- sys.exit("\nThe password provided is incorrect for LDAP server %s" % config.master_host_name)
- except errors.LDAPError:
- sys.exit("\nUnable to connect to LDAP server %s" % config.master_host_name)
- finally:
- if replman and replman.conn:
- replman.conn.unbind()
-
- if options.skip_schema_check:
- root_logger.info("Skipping CA DS schema check")
- else:
- cainstance.replica_ca_install_check(config)
-
- # Configure ntpd
- if options.conf_ntp:
- ipaclient.ntpconf.force_ntpd(sstore)
- ntp = ntpinstance.NTPInstance()
- ntp.create_instance()
-
- # Configure dirsrv
- ds = install_replica_ds(config)
-
- # Configure the CA if necessary
- CA = cainstance.install_replica_ca(config)
-
- # Always try to install DNS records
- install_dns_records(config, options, remote_api)
- finally:
- if conn.isconnected():
- conn.disconnect()
-
- # We need to ldap_enable the CA now that DS is up and running
- if CA and config.setup_ca:
- CA.ldap_enable('CA', config.host_name, config.dirman_password,
- ipautil.realm_to_suffix(config.realm_name))
-
- # This is done within stopped_service context, which restarts CA
- CA.enable_client_auth_to_db(CA.dogtag_constants.CS_CFG_PATH)
-
- krb = install_krb(config, setup_pkinit=options.setup_pkinit)
- http = install_http(config, auto_redirect=options.ui_redirect)
-
- otpd = otpdinstance.OtpdInstance()
- otpd.create_instance('OTPD', config.host_name, config.dirman_password,
- ipautil.realm_to_suffix(config.realm_name))
-
- if CA:
- CA.configure_certmonger_renewal()
- CA.import_ra_cert(config.dir + "/ra.p12")
- CA.fix_ra_perms()
-
- # The DS instance is created before the keytab, add the SSL cert we
- # generated
- ds.add_cert_to_service()
-
- # Apply any LDAP updates. Needs to be done after the replica is synced-up
- service.print_msg("Applying LDAP updates")
- ds.apply_updates()
-
- if options.setup_kra:
- kra.install(config, options, dirman_password)
- else:
- service.print_msg("Restarting the directory server")
- ds.restart()
-
- service.print_msg("Restarting the KDC")
- krb.restart()
-
- if CA and config.setup_ca:
- service.print_msg("Restarting the certificate server")
- CA.restart(dogtag.configured_constants().PKI_INSTANCE_NAME)
-
- if options.setup_dns:
- api.Backend.ldap2.connect(autobind=True)
- dns_installer.install(False, True, options)
-
- # Restart httpd to pick up the new IPA configuration
- service.print_msg("Restarting the web server")
- http.restart()
-
- # Call client install script
- try:
- args = [paths.IPA_CLIENT_INSTALL, "--on-master", "--unattended", "--domain", config.domain_name, "--server", config.host_name, "--realm", config.realm_name]
- if not options.create_sshfp:
- args.append("--no-dns-sshfp")
- if options.trust_sshfp:
- args.append("--ssh-trust-dns")
- if not options.conf_ssh:
- args.append("--no-ssh")
- if not options.conf_sshd:
- args.append("--no-sshd")
- if options.mkhomedir:
- args.append("--mkhomedir")
- ipautil.run(args)
- except Exception, e:
- print "Configuration of client side components failed!"
- print "ipa-client-install returned: " + str(e)
- raise RuntimeError("Failed to configure the client")
-
- ds.replica_populate()
+ server.replica_install_check(filename, options)
+ server.replica_install(filename, options)
- #Everything installed properly, activate ipa service.
- services.knownservices.ipa.enable()
fail_message = '''
Your system may be partly configured.
@@ -734,15 +157,6 @@ Run /usr/sbin/ipa-server-install --uninstall to clean up.
'''
if __name__ == '__main__':
- try:
- with private_ccache():
- installutils.run_script(main, log_file_name=log_file_name,
- operation_name='ipa-replica-install',
- fail_message=fail_message)
- finally:
- # always try to remove decrypted replica file
- try:
- if REPLICA_INFO_TOP_DIR:
- shutil.rmtree(REPLICA_INFO_TOP_DIR)
- except OSError:
- pass
+ installutils.run_script(main, log_file_name=log_file_name,
+ operation_name='ipa-replica-install',
+ fail_message=fail_message)