summaryrefslogtreecommitdiffstats
path: root/ipaserver
diff options
context:
space:
mode:
authorMartin Basti <mbasti@redhat.com>2015-05-13 18:49:25 +0200
committerJan Cholasta <jcholast@redhat.com>2015-05-19 14:21:31 +0000
commitae9c3e2dce000ed185b28e2e6e85043ad8d001ed (patch)
tree118b9992fdf1bfa34fd96cdaeaaed65b4e73f8d3 /ipaserver
parent5a741b614f39a148d849877e743200de5a7302db (diff)
downloadfreeipa-ae9c3e2dce000ed185b28e2e6e85043ad8d001ed.tar.gz
freeipa-ae9c3e2dce000ed185b28e2e6e85043ad8d001ed.tar.xz
freeipa-ae9c3e2dce000ed185b28e2e6e85043ad8d001ed.zip
DNS install: extract DNS installer into one module
This is required modification to be able move to new installers. DNS subsystem will be installed by functions in this module in each of ipa-server-install, ipa-dns-install, ipa-replica-install install scripts. https://fedorahosted.org/freeipa/ticket/4468 Reviewed-By: Jan Cholasta <jcholast@redhat.com>
Diffstat (limited to 'ipaserver')
-rw-r--r--ipaserver/install/dns.py210
-rw-r--r--ipaserver/install/installutils.py2
-rw-r--r--ipaserver/install/ipa_replica_prepare.py2
-rw-r--r--ipaserver/install/krbinstance.py8
4 files changed, 219 insertions, 3 deletions
diff --git a/ipaserver/install/dns.py b/ipaserver/install/dns.py
new file mode 100644
index 000000000..8d9570d68
--- /dev/null
+++ b/ipaserver/install/dns.py
@@ -0,0 +1,210 @@
+#
+# Copyright (C) 2015 FreeIPA Contributors see COPYING for license
+#
+
+import sys
+
+from ipalib import api
+from ipaplatform.paths import paths
+from ipapython import ipautil
+from ipapython import sysrestore
+from ipapython.ipa_log_manager import root_logger
+from ipapython.ipaldap import AUTOBIND_ENABLED
+from ipapython.ipautil import user_input
+from ipaserver.install.installutils import get_server_ip_address
+from ipaserver.install.installutils import read_dns_forwarders
+from ipaserver.install import bindinstance
+from ipaserver.install import dnskeysyncinstance
+from ipaserver.install import ntpinstance
+from ipaserver.install import odsexporterinstance
+from ipaserver.install import opendnssecinstance
+
+ip_addresses = []
+dns_forwarders = []
+reverse_zones = []
+
+
+def install_check(standalone, replica, options, hostname):
+ global ip_addresses
+ global dns_forwarders
+ global reverse_zones
+
+ if standalone:
+ print "=============================================================================="
+ print "This program will setup DNS for the FreeIPA Server."
+ print ""
+ print "This includes:"
+ print " * Configure DNS (bind)"
+ print " * Configure SoftHSM (required by DNSSEC)"
+ print " * Configure ipa-dnskeysyncd (required by DNSSEC)"
+ if options.dnssec_master:
+ print " * Configure ipa-ods-exporter (required by DNSSEC key master)"
+ print " * Configure OpenDNSSEC (required by DNSSEC key master)"
+ print " * Generate DNSSEC master key (required by DNSSEC key master)"
+ print ""
+ print "NOTE: DNSSEC zone signing is not enabled by default"
+ print ""
+ if options.dnssec_master:
+ print "DNSSEC support is experimental!"
+ print ""
+ print "Plan carefully, current version doesn't allow you to move DNSSEC"
+ print "key master to different server and master cannot be uninstalled"
+ print ""
+ print ""
+ print "To accept the default shown in brackets, press the Enter key."
+ print ""
+
+ if (options.dnssec_master and not options.unattended and not
+ ipautil.user_input(
+ "Do you want to setup this IPA server as DNSSEC key master?",
+ False)):
+ sys.exit("Aborted")
+
+ # Check bind packages are installed
+ if not (bindinstance.check_inst(options.unattended) and
+ dnskeysyncinstance.check_inst()):
+ sys.exit("Aborting installation.")
+
+ if options.dnssec_master:
+ # check opendnssec packages are installed
+ if not opendnssecinstance.check_inst():
+ sys.exit("Aborting installation")
+
+ fstore = sysrestore.FileStore(paths.SYSRESTORE)
+
+ if options.dnssec_master:
+ ods = opendnssecinstance.OpenDNSSECInstance(
+ fstore, ldapi=True, autobind=AUTOBIND_ENABLED)
+ ods.realm = api.env.realm
+ dnssec_masters = ods.get_masters()
+ # we can reinstall current server if it is dnssec master
+ if api.env.host not in dnssec_masters and dnssec_masters:
+ print "DNSSEC key master(s):", u','.join(dnssec_masters)
+ sys.exit("Only one DNSSEC key master is supported in current "
+ "version.")
+
+ ip_addresses = get_server_ip_address(
+ hostname, fstore, options.unattended, True, options.ip_addresses)
+
+ if options.no_forwarders:
+ dns_forwarders = ()
+ elif options.forwarders:
+ dns_forwarders = options.forwarders
+ elif standalone or not replica:
+ dns_forwarders = read_dns_forwarders()
+
+ # test DNSSEC forwarders
+ if dns_forwarders:
+ if (not bindinstance.check_forwarders(dns_forwarders, root_logger) and
+ not options.no_dnssec_validation):
+ options.no_dnssec_validation = True
+ print "WARNING: DNSSEC validation will be disabled"
+
+ root_logger.debug("will use dns_forwarders: %s\n", dns_forwarders)
+
+ if not standalone:
+ search_reverse_zones = False
+ else:
+ search_reverse_zones = True
+
+ if not standalone and replica:
+ reverse_zones_unattended_check = True
+ else:
+ reverse_zones_unattended_check = options.unattended
+
+ reverse_zones = bindinstance.check_reverse_zones(
+ ip_addresses, options.reverse_zones, options,
+ reverse_zones_unattended_check, search_reverse_zones
+ )
+
+ if reverse_zones:
+ print "Using reverse zone(s) %s" % ', '.join(reverse_zones)
+
+
+def install(standalone, replica, options):
+ global ip_addresses
+ global dns_forwarders
+ global reverse_zones
+
+ fstore = sysrestore.FileStore(paths.SYSRESTORE)
+
+ conf_ntp = ntpinstance.NTPInstance(fstore).is_enabled()
+
+ bind = bindinstance.BindInstance(fstore, ldapi=True,
+ autobind=AUTOBIND_ENABLED)
+ bind.setup(api.env.host, ip_addresses, api.env.realm, api.env.domain,
+ dns_forwarders, conf_ntp, reverse_zones, zonemgr=options.zonemgr,
+ no_dnssec_validation=options.no_dnssec_validation,
+ ca_configured=options.setup_ca)
+
+ if standalone and not options.unattended:
+ print ""
+ print "The following operations may take some minutes to complete."
+ print "Please wait until the prompt is returned."
+ print ""
+
+ bind.create_instance()
+
+ # on dnssec master this must be installed last
+ dnskeysyncd = dnskeysyncinstance.DNSKeySyncInstance(fstore, ldapi=True)
+ dnskeysyncd.create_instance(api.env.host, api.env.realm)
+ if options.dnssec_master:
+ ods = opendnssecinstance.OpenDNSSECInstance(fstore, ldapi=True,
+ autobind=AUTOBIND_ENABLED)
+ ods_exporter = odsexporterinstance.ODSExporterInstance(
+ fstore, ldapi=True, autobind=AUTOBIND_ENABLED)
+
+ ods_exporter.create_instance(api.env.host, api.env.realm)
+ ods.create_instance(api.env.host, api.env.realm)
+
+ dnskeysyncd.start_dnskeysyncd()
+ bind.start_named()
+
+ if standalone:
+ print "=============================================================================="
+ print "Setup complete"
+ print ""
+ bind.check_global_configuration()
+ print ""
+ print ""
+ print "\tYou must make sure these network ports are open:"
+ print "\t\tTCP Ports:"
+ print "\t\t * 53: bind"
+ print "\t\tUDP Ports:"
+ print "\t\t * 53: bind"
+ elif not standalone and replica:
+ print ""
+ bind.check_global_configuration()
+ print ""
+
+
+def uninstall_check(options):
+ # test if server is DNSSEC key master
+ masters = opendnssecinstance.get_dnssec_key_masters(api.Backend.ldap2)
+ if api.env.host in masters:
+ print "This server is active DNSSEC key master. Uninstall could break your DNS system."
+ if not (options.unattended or user_input(
+ "Are you sure you want to continue with the uninstall "
+ "procedure?", False)):
+ print ""
+ print "Aborting uninstall operation."
+ sys.exit(1)
+
+
+def uninstall():
+ fstore = sysrestore.FileStore(paths.SYSRESTORE)
+ ods = opendnssecinstance.OpenDNSSECInstance(fstore)
+ if ods.is_configured():
+ ods.uninstall()
+
+ ods_exporter = odsexporterinstance.ODSExporterInstance(fstore)
+ if ods_exporter.is_configured():
+ ods_exporter.uninstall()
+
+ bind = bindinstance.BindInstance(fstore)
+ if bind.is_configured():
+ bind.uninstall()
+
+ dnskeysync = dnskeysyncinstance.DNSKeySyncInstance(fstore)
+ if dnskeysync.is_configured():
+ dnskeysync.uninstall()
diff --git a/ipaserver/install/installutils.py b/ipaserver/install/installutils.py
index dc41c0f87..817c27e69 100644
--- a/ipaserver/install/installutils.py
+++ b/ipaserver/install/installutils.py
@@ -17,6 +17,8 @@
# along with this program. If not, see <http://www.gnu.org/licenses/>.
#
+from __future__ import absolute_import
+
import socket
import getpass
import os
diff --git a/ipaserver/install/ipa_replica_prepare.py b/ipaserver/install/ipa_replica_prepare.py
index a66b39d6f..da492a96b 100644
--- a/ipaserver/install/ipa_replica_prepare.py
+++ b/ipaserver/install/ipa_replica_prepare.py
@@ -18,6 +18,8 @@
# along with this program. If not, see <http://www.gnu.org/licenses/>.
#
+from __future__ import absolute_import
+
import os
import shutil
import tempfile
diff --git a/ipaserver/install/krbinstance.py b/ipaserver/install/krbinstance.py
index 154dbea72..648fc7601 100644
--- a/ipaserver/install/krbinstance.py
+++ b/ipaserver/install/krbinstance.py
@@ -17,6 +17,8 @@
# along with this program. If not, see <http://www.gnu.org/licenses/>.
#
+from __future__ import absolute_import
+
import shutil
import fileinput
import re
@@ -26,8 +28,8 @@ import pwd
import socket
import dns.name
-import service
-import installutils
+from ipaserver.install import service
+from ipaserver.install import installutils
from ipapython import sysrestore
from ipapython import ipautil
from ipapython import kernel_keyring
@@ -42,7 +44,7 @@ from ipaserver.install import dsinstance
import pyasn1.codec.ber.decoder
import struct
-import certs
+from ipaserver.install import certs
from distutils import version
from ipaplatform.tasks import tasks
from ipaplatform.paths import paths