summaryrefslogtreecommitdiffstats
path: root/ipa-client/ipa-install/ipa-client-install
diff options
context:
space:
mode:
authorRob Crittenden <rcritten@redhat.com>2011-08-29 17:44:02 -0400
committerRob Crittenden <rcritten@redhat.com>2011-08-29 17:18:42 -0400
commit4cd65a1d6e432945ae3c86a49ebc236d845d9cbd (patch)
tree21607f8c5ca688daa65ddf97ad2a85eb61b873a0 /ipa-client/ipa-install/ipa-client-install
parentdcc3ceb9cba1e747e18f12bcc2a511acf0c4d671 (diff)
downloadfreeipa-4cd65a1d6e432945ae3c86a49ebc236d845d9cbd.zip
freeipa-4cd65a1d6e432945ae3c86a49ebc236d845d9cbd.tar.gz
freeipa-4cd65a1d6e432945ae3c86a49ebc236d845d9cbd.tar.xz
Roll back changes if client installation fails.
If the client installer fails for some reason and --force was not used then roll back the configuration. This is needed because we touch /etc/sysconfig/network early in the configuration and if it fails due to any number of issues (mostly related to authentication) it will not be reset. We may as well run through the entire uninstall process to be sure the system has been reset. https://fedorahosted.org/freeipa/ticket/1704
Diffstat (limited to 'ipa-client/ipa-install/ipa-client-install')
-rwxr-xr-xipa-client/ipa-install/ipa-client-install195
1 files changed, 115 insertions, 80 deletions
diff --git a/ipa-client/ipa-install/ipa-client-install b/ipa-client/ipa-install/ipa-client-install
index 64c5bf2..fe520be 100755
--- a/ipa-client/ipa-install/ipa-client-install
+++ b/ipa-client/ipa-install/ipa-client-install
@@ -52,6 +52,11 @@ error was:
""" % sys.exc_value
sys.exit(1)
+CLIENT_INSTALL_ERROR = 1
+CLIENT_NOT_CONFIGURED = 2
+CLIENT_ALREADY_CONFIGURED = 3
+CLIENT_UNINSTALL_ERROR = 4 # error after restoring files/state
+
client_nss_nickname_format = 'IPA Machine Certificate - %s'
def parse_options():
@@ -139,17 +144,21 @@ def nickname_exists(nickname):
else:
return False
-def uninstall(options, env):
+def emit_quiet(quiet, message):
+ if not quiet:
+ print message
+
+def uninstall(options, env, quiet=False):
if not fstore.has_files():
print "IPA client is not configured on this system."
- return 2
+ return CLIENT_NOT_CONFIGURED
server_fstore = sysrestore.FileStore('/var/lib/ipa/sysrestore')
if server_fstore.has_files() and not options.on_master:
print "IPA client is configured as a part of IPA server on this system."
print "Refer to ipa-server-install for uninstallation."
- return 2
+ return CLIENT_NOT_CONFIGURED
sssdconfig = SSSDConfig.SSSDConfig()
sssdconfig.import_config()
@@ -178,7 +187,7 @@ def uninstall(options, env):
try:
run(["/usr/bin/certutil", "-D", "-d", "/etc/pki/nssdb", "-n", "IPA CA"])
except Exception, e:
- print "Failed to remove IPA CA from /etc/pki/nssdb: %s" % str(e)
+ emit_quiet(quiet, "Failed to remove IPA CA from /etc/pki/nssdb: %s" % str(e))
# Always start certmonger. We can't untrack something if it isn't
# running
@@ -201,7 +210,7 @@ def uninstall(options, env):
try:
run(["/usr/bin/certutil", "-D", "-d", "/etc/pki/nssdb", "-n", client_nss_nickname])
except Exception, e:
- print "Failed to remove %s from /etc/pki/nssdb: %s" % (client_nss_nickname, str(e))
+ emit_quiet(quiet, "Failed to remove %s from /etc/pki/nssdb: %s" % (client_nss_nickname, str(e)))
try:
ipautil.service_stop('certmonger')
@@ -214,37 +223,40 @@ def uninstall(options, env):
try:
ipautil.chkconfig_off('certmonger')
except Exception, e:
- print "Failed to disable automatic startup of the certmonger daemon"
+ emit_quiet(quiet, "Failed to disable automatic startup of the certmonger daemon")
logging.error("Failed to disable automatic startup of the certmonger daemon: %s" % str(e))
- if not options.on_master:
- print "Unenrolling client from IPA server"
+ if not options.on_master and os.path.exists('/etc/ipa/default.conf'):
+ emit_quiet(quiet, "Unenrolling client from IPA server")
join_args = ["/usr/sbin/ipa-join", "--unenroll", "-h", hostname]
(stdout, stderr, returncode) = run(join_args, raiseonerr=False, env=env)
if returncode != 0:
- print "Unenrolling host failed: %s" % stderr
+ emit_quiet(quiet, "Unenrolling host failed: %s" % stderr)
- print "Removing Kerberos service principals from /etc/krb5.keytab"
- try:
- parser = RawConfigParser()
- fp = open('/etc/ipa/default.conf', 'r')
- parser.readfp(fp)
- fp.close()
- realm = parser.get('global', 'realm')
- run(["/usr/sbin/ipa-rmkeytab", "-k", "/etc/krb5.keytab", "-r", realm])
- except Exception, e:
- print "Failed to clean up /etc/krb5.keytab"
- logging.error("Failed to remove Kerberos service principals: %s" % str(e))
+ if os.path.exists('/etc/ipa/default.conf'):
+ emit_quiet(quiet, "Removing Kerberos service principals from /etc/krb5.keytab")
+ try:
+ parser = RawConfigParser()
+ fp = open('/etc/ipa/default.conf', 'r')
+ parser.readfp(fp)
+ fp.close()
+ realm = parser.get('global', 'realm')
+ run(["/usr/sbin/ipa-rmkeytab", "-k", "/etc/krb5.keytab", "-r", realm])
+ except Exception, e:
+ emit_quiet(quiet, "Failed to clean up /etc/krb5.keytab")
+ logging.debug("Failed to remove Kerberos service principals: %s" % str(e))
- print "Disabling client Kerberos and LDAP configurations"
+ emit_quiet(quiet, "Disabling client Kerberos and LDAP configurations")
try:
run(["/usr/sbin/authconfig", "--disableldap", "--disablekrb5", "--disablesssd", "--disablesssdauth", "--disablemkhomedir", "--update"])
except Exception, e:
- print "Failed to remove krb5/LDAP configuration. " +str(e)
- sys.exit(1)
+ emit_quiet(quiet, "Failed to remove krb5/LDAP configuration. " +str(e))
+ return CLIENT_INSTALL_ERROR
+
+ if fstore.has_files():
+ emit_quiet(quiet, "Restoring client configuration files")
+ fstore.restore_all_files()
- print "Restoring client configuration files"
- fstore.restore_all_files()
old_hostname = statestore.restore_state('network','hostname')
if old_hostname is not None and old_hostname != hostname:
try:
@@ -256,12 +268,12 @@ def uninstall(options, env):
try:
ipautil.service_restart('nscd')
except:
- print "Failed to restart start the NSCD daemon"
+ emit_quiet(quiet, "Failed to restart start the NSCD daemon")
try:
ipautil.chkconfig_on('nscd')
except:
- print "Failed to configure automatic startup of the NSCD daemon"
+ emit_quiet(quiet, "Failed to configure automatic startup of the NSCD daemon")
else:
# this is optional service, just log
logging.info("NSCD daemon is not installed, skip configuration")
@@ -270,26 +282,26 @@ def uninstall(options, env):
try:
ipautil.service_stop('nslcd')
except:
- print "Failed to stop the NSLCD daemon"
+ emit_quiet(quiet, "Failed to stop the NSLCD daemon")
try:
ipautil.chkconfig_off('nslcd')
except:
- print "Failed to disable automatic startup of the NSLCD daemon"
+ emit_quiet(quiet, "Failed to disable automatic startup of the NSLCD daemon")
else:
# this is optional service, just log
logging.info("NSLCD daemon is not installed, skip configuration")
if not options.unattended:
- print "The original nsswitch.conf configuration has been restored."
- print "You may need to restart services or reboot the machine."
+ emit_quiet(quiet, "The original nsswitch.conf configuration has been restored.")
+ emit_quiet(quiet, "You may need to restart services or reboot the machine.")
if not options.on_master:
if user_input("Do you want to reboot the machine?", False):
try:
run(["/usr/bin/reboot"])
except Exception, e:
- print "Reboot command failed to exceute. " + str(e)
- sys.exit(1)
+ emit_quiet(quiet, "Reboot command failed to exceute. " + str(e))
+ return CLIENT_UNINSTALL_ERROR
# Remove the IPA configuration file
try:
@@ -297,6 +309,8 @@ def uninstall(options, env):
except:
pass
+ return 0
+
def configure_ipa_conf(fstore, cli_basedn, cli_realm, cli_domain, cli_server):
ipaconf = ipaclient.ipachangeconf.IPAChangeConf("IPA Installer")
ipaconf.setOptionAssignment(" = ")
@@ -544,7 +558,7 @@ def configure_certmonger(fstore, subject_base, cli_realm, hostname, options):
except:
print "certmonger request for host certificate failed"
-def backup_and_replace_hostname(fstore, hostname):
+def backup_and_replace_hostname(fstore, statestore, hostname):
# TODO: this code is for Red Hat-based systems
# it need to be rewritten for cross-paltform support
# so that different configuration backends would be possible
@@ -742,26 +756,8 @@ def client_dns(server, hostname, dns_updates=False):
if dns_updates or not dns_ok:
update_dns(server, hostname)
-def main():
- safe_options, options = parse_options()
- logging_setup(options)
- logging.debug('%s was invoked with options: %s' % (sys.argv[0], safe_options))
- logging.debug("missing options might be asked for interactively later\n")
+def install(options, env, fstore, statestore):
dnsok = False
- env={"PATH":"/bin:/sbin:/usr/kerberos/bin:/usr/kerberos/sbin:/usr/bin:/usr/sbin"}
-
- global fstore
- fstore = sysrestore.FileStore('/var/lib/ipa-client/sysrestore')
-
- global statestore
- statestore = sysrestore.StateFile('/var/lib/ipa-client/sysrestore')
-
- if options.uninstall:
- return uninstall(options, env)
-
- if fstore.has_files():
- sys.exit("IPA client is already configured on this system.\n"
- + "If you want to reinstall the IPA client, uninstall it first.")
cli_domain = None
cli_server = None
@@ -770,14 +766,16 @@ def main():
subject_base = None
if options.unattended and (options.password is None and options.principal is None and options.prompt_password is False) and not options.on_master:
- sys.exit("One of password and principal are required.")
+ print "One of password and principal are required."
+ return CLIENT_INSTALL_ERROR
if options.hostname:
hostname = options.hostname
else:
hostname = socket.getfqdn()
if hostname != hostname.lower():
- sys.exit('Invalid hostname \'%s\', must be lower-case.' % hostname)
+ print 'Invalid hostname \'%s\', must be lower-case.' % hostname
+ return CLIENT_INSTALL_ERROR
# Create the discovery instance
ds = ipadiscovery.IPADiscovery()
@@ -787,17 +785,17 @@ def main():
if ret == ipadiscovery.BAD_HOST_CONFIG:
print >>sys.stderr, "Can't get the fully qualified name of this host"
print >>sys.stderr, "Check that the client is properly configured"
- return ret
+ return CLIENT_INSTALL_ERROR
if ret == ipadiscovery.NOT_FQDN:
print >>sys.stderr, "%s is not a fully-qualified hostname" % hostname
- return ret
+ return CLIENT_INSTALL_ERROR
if ret == ipadiscovery.NO_LDAP_SERVER or not ds.getDomainName():
logging.debug("Domain not found")
if options.domain:
cli_domain = options.domain
elif options.unattended:
print >>sys.stderr, "Unable to discover domain, not provided on command line"
- return ret
+ return CLIENT_INSTALL_ERROR
else:
print "DNS discovery failed to determine your DNS domain"
cli_domain = user_input("Provide the domain name of your IPA server (ex: example.com)", allow_empty = False)
@@ -815,7 +813,7 @@ def main():
cli_server = options.server
elif options.unattended:
print >>sys.stderr, "Unable to find IPA Server to join"
- return ret
+ return CLIENT_INSTALL_ERROR
else:
print "DNS discovery failed to find the IPA Server"
cli_server = user_input("Provide your IPA server name (ex: ipa.example.com)", allow_empty = False)
@@ -830,12 +828,12 @@ def main():
if ret == ipadiscovery.NOT_IPA_SERVER:
print >>sys.stderr, "%s is not an IPA v2 Server." % cli_server
- return ret
+ return CLIENT_INSTALL_ERROR
if ret != 0:
print >>sys.stderr, "Failed to verify that "+cli_server+" is an IPA Server."
print >>sys.stderr, "This may mean that the remote server is not up or is not reachable"
print >>sys.stderr, "due to network or firewall settings."
- return ret
+ return CLIENT_INSTALL_ERROR
cli_kdc = ds.getKDCName()
if dnsok and not cli_kdc:
@@ -852,12 +850,12 @@ def main():
print "access the discovered server for all operation and will not fail over to"
print "other servers in case of failure.\n"
if not user_input("Proceed with fixed values and no DNS discovery?", False):
- return ret
+ return CLIENT_INSTALL_ERROR
if options.realm_name and options.realm_name != ds.getRealmName():
if not options.unattended:
print >>sys.stderr, "ERROR: The provided realm name: ["+options.realm_name+"] does not match with the discovered one: ["+ds.getRealmName()+"]\n"
- return -3
+ return CLIENT_INSTALL_ERROR
cli_realm = ds.getRealmName()
logging.debug("will use cli_realm: %s\n", cli_realm)
@@ -873,11 +871,11 @@ def main():
print "\n"
if not options.unattended and not user_input("Continue to configure the system with these values?", False):
- return 1
+ return CLIENT_INSTALL_ERROR
if options.hostname:
# configure /etc/sysconfig/network to contain the hostname we set.
- backup_and_replace_hostname(fstore, options.hostname)
+ backup_and_replace_hostname(fstore, statestore, options.hostname)
if not options.unattended:
if options.principal is None and options.password is None and options.prompt_password is False:
@@ -895,7 +893,8 @@ def main():
try:
run(["/usr/bin/wget", "-O", "/etc/ipa/ca.crt", "http://%s/ipa/config/ca.crt" % cli_server])
except CalledProcessError, e:
- sys.exit('Retrieving CA from %s failed.\n%s' % (cli_server, str(e)))
+ print 'Retrieving CA from %s failed.\n%s' % (cli_server, str(e))
+ return CLIENT_INSTALL_ERROR
if not options.on_master:
# First test out the kerberos configuration
@@ -903,7 +902,8 @@ def main():
(krb_fd, krb_name) = tempfile.mkstemp()
os.close(krb_fd)
if configure_krb5_conf(fstore, cli_basedn, cli_realm, cli_domain, cli_server, cli_kdc, dnsok, options, krb_name):
- sys.exit("Test kerberos configuration failed")
+ print "Test kerberos configuration failed"
+ return CLIENT_INSTALL_ERROR
env['KRB5_CONFIG'] = krb_name
join_args = ["/usr/sbin/ipa-join", "-s", cli_server]
if options.debug:
@@ -922,24 +922,28 @@ def main():
if not options.unattended:
stdin = getpass.getpass("Password for %s: " % principal)
if not stdin:
- sys.exit("Password must be provided for %s. " %
- principal)
+ print "Password must be provided for %s. " % \
+ principal
+ return CLIENT_INSTALL_ERROR
else:
if sys.stdin.isatty():
- sys.exit("Password must be provided in non-interactive mode.\nThis can be done via echo password | ipa-client-install ... or\nwith the -w option.")
+ print "Password must be provided in non-interactive mode.\nThis can be done via echo password | ipa-client-install ... or\nwith the -w option."
+ return CLIENT_INSTALL_ERROR
else:
stdin = sys.stdin.readline()
(stderr, stdout, returncode) = run(["kinit", principal], raiseonerr=False, stdin=stdin, env=env)
print ""
if returncode != 0:
- sys.exit(stdout)
+ print stdout
+ return CLIENT_INSTALL_ERROR
elif options.password:
join_args.append("-w")
join_args.append(options.password)
elif options.prompt_password:
if options.unattended:
- sys.exit("Password must be provided in non-interactive mode")
+ print "Password must be provided in non-interactive mode"
+ return CLIENT_INSTALL_ERROR
password = getpass.getpass("Password: ")
join_args.append("-w")
join_args.append(password)
@@ -950,7 +954,7 @@ def main():
if returncode != 0:
print >>sys.stderr, "Joining realm failed: %s" % stderr,
if not options.force:
- return 1
+ return CLIENT_INSTALL_ERROR
print " Use ipa-getkeytab to obtain a host principal for this server."
else:
print "Enrolled in IPA realm %s" % cli_realm
@@ -976,7 +980,7 @@ def main():
fstore.backup_file("/etc/sssd/sssd.conf")
if options.sssd:
if configure_sssd_conf(fstore, cli_realm, cli_domain, cli_server, options):
- return 1
+ return CLIENT_INSTALL_ERROR
print "Configured /etc/sssd/sssd.conf"
# Add the CA to the default NSS database and trust it
@@ -987,7 +991,7 @@ def main():
# Configure krb5.conf
fstore.backup_file("/etc/krb5.conf")
if configure_krb5_conf(fstore, cli_basedn, cli_realm, cli_domain, cli_server, cli_kdc, dnsok, options, "/etc/krb5.conf"):
- return 1
+ return CLIENT_INSTALL_ERROR
print "Configured /etc/krb5.conf for IPA realm " + cli_realm
@@ -1054,7 +1058,7 @@ def main():
for configurer in [configure_ldap_conf, configure_nslcd_conf]:
(retcode, conf, filename) = configurer(fstore, cli_basedn, cli_realm, cli_domain, cli_server, dnsok, options)
if retcode:
- return 1
+ return CLIENT_INSTALL_ERROR
if conf:
print "%s configured using configuration file %s" % (conf, filename)
@@ -1083,7 +1087,7 @@ def main():
try:
hardcode_ldap_server(cli_server)
except Exception, e:
- sys.exit("Adding hardcoded server name to /etc/ldap.conf failed: " + str(e))
+ print "Adding hardcoded server name to /etc/ldap.conf failed: " + str(e)
if options.conf_ntp and not options.on_master:
if options.ntp_server:
@@ -1097,11 +1101,42 @@ def main():
return 0
+def main():
+ safe_options, options = parse_options()
+
+ logging_setup(options)
+ logging.debug('%s was invoked with options: %s' % (sys.argv[0], safe_options))
+ logging.debug("missing options might be asked for interactively later\n")
+ if not os.getegid() == 0:
+ sys.exit("\nYou must be root to run ipa-client-install.\n")
+
+ env={"PATH":"/bin:/sbin:/usr/kerberos/bin:/usr/kerberos/sbin:/usr/bin:/usr/sbin"}
+
+ global fstore
+ fstore = sysrestore.FileStore('/var/lib/ipa-client/sysrestore')
+
+ global statestore
+ statestore = sysrestore.StateFile('/var/lib/ipa-client/sysrestore')
+
+ if options.uninstall:
+ return uninstall(options, env)
+
+ if fstore.has_files():
+ print "IPA client is already configured on this system.\n" \
+ "If you want to reinstall the IPA client, uninstall it first."
+ return CLIENT_ALREADY_CONFIGURED
+
+ rval = install(options, env, fstore, statestore)
+ if rval == CLIENT_INSTALL_ERROR:
+ if options.force:
+ print "Installation failed. Force set so not rolling back changes."
+ else:
+ print "Installation failed. Rolling back changes."
+ options.unattended = True
+ uninstall(options, env, quiet=True)
+
try:
if __name__ == "__main__":
- if not os.getegid() == 0:
- sys.exit("\nYou must be root to run ipa-client-install.\n")
-
sys.exit(main())
except SystemExit, e:
sys.exit(e)