summaryrefslogtreecommitdiffstats
path: root/ipaserver
diff options
context:
space:
mode:
authorRob Crittenden <rcritten@redhat.com>2010-05-27 11:58:31 -0400
committerRob Crittenden <rcritten@redhat.com>2010-06-01 09:52:10 -0400
commitb29de6bf27a51904adfdfb6cf918903f80e4c20b (patch)
tree598108c244e671a55ece5ba77e0ea8c0945fe262 /ipaserver
parentc67b47f9f693d0209572b34a6cf7927dcbf22200 (diff)
downloadfreeipa-b29de6bf27a51904adfdfb6cf918903f80e4c20b.tar.gz
freeipa-b29de6bf27a51904adfdfb6cf918903f80e4c20b.tar.xz
freeipa-b29de6bf27a51904adfdfb6cf918903f80e4c20b.zip
Add LDAP upgrade over ldapi support.
This disables all but the ldapi listener in DS so it will be quiet when we perform our upgrades. It is expected that any other clients that also use ldapi will be shut down by other already (krb5 and dns). Add ldapi as an option in ipaldap and add the beginning of pure offline support (e.g. direct editing of LDIF files).
Diffstat (limited to 'ipaserver')
-rw-r--r--ipaserver/install/installutils.py1
-rw-r--r--ipaserver/install/ldapupdate.py51
-rw-r--r--ipaserver/install/upgradeinstance.py117
-rw-r--r--ipaserver/ipaldap.py14
4 files changed, 167 insertions, 16 deletions
diff --git a/ipaserver/install/installutils.py b/ipaserver/install/installutils.py
index 5049962b..0767f0c8 100644
--- a/ipaserver/install/installutils.py
+++ b/ipaserver/install/installutils.py
@@ -306,6 +306,7 @@ def get_directive(filename, directive, separator=' '):
line = line.strip()
result = line.split(separator, 1)[1]
result = result.strip('"')
+ result = result.strip(' ')
fd.close()
return result
fd.close()
diff --git a/ipaserver/install/ldapupdate.py b/ipaserver/install/ldapupdate.py
index dff94783..91ff80f5 100644
--- a/ipaserver/install/ldapupdate.py
+++ b/ipaserver/install/ldapupdate.py
@@ -38,6 +38,7 @@ import platform
import time
import random
import os
+import pwd
import fnmatch
import csv
@@ -48,16 +49,23 @@ class BadSyntax(Exception):
return repr(self.value)
class LDAPUpdate:
- def __init__(self, dm_password, sub_dict={}, live_run=True):
+ def __init__(self, dm_password, sub_dict={}, live_run=True,
+ online=True, ldapi=False):
"""dm_password = Directory Manager password
sub_dict = substitution dictionary
live_run = Apply the changes or just test
+ online = do an online LDAP update or use an experimental LDIF updater
+ ldapi = bind using ldapi. This assumes autobind is enabled.
"""
self.sub_dict = sub_dict
self.live_run = live_run
self.dm_password = dm_password
self.conn = None
self.modified = False
+ self.online = online
+ self.ldapi = ldapi
+
+ self.pw_name = pwd.getpwuid(os.geteuid()).pw_name
krbctx = krbV.default_context()
@@ -68,6 +76,7 @@ class LDAPUpdate:
domain = ipautil.get_domain_name()
libarch = self.__identify_arch()
suffix = util.realm_to_suffix(krbctx.default_realm)
+ self.realm = krbctx.default_realm
if not self.sub_dict.get("REALM"):
self.sub_dict["REALM"] = krbctx.default_realm
@@ -84,17 +93,24 @@ class LDAPUpdate:
if not self.sub_dict.get("TIME"):
self.sub_dict["TIME"] = int(time.time())
- # Try out the password
- try:
- conn = ipaldap.IPAdmin(fqdn)
- conn.do_simple_bind(bindpw=self.dm_password)
- conn.unbind()
- except ldap.CONNECT_ERROR:
- raise RuntimeError("Unable to connect to LDAP server %s" % fqdn)
- except ldap.SERVER_DOWN:
- raise RuntimeError("Unable to connect to LDAP server %s" % fqdn)
- except ldap.INVALID_CREDENTIALS:
- raise RuntimeError("The password provided is incorrect for LDAP server %s" % fqdn)
+ if online:
+ # Try out the password
+ if not self.ldapi:
+ try:
+ conn = ipaldap.IPAdmin(fqdn)
+ conn.do_simple_bind(bindpw=self.dm_password)
+ conn.unbind()
+ except ldap.CONNECT_ERROR:
+ raise RuntimeError("Unable to connect to LDAP server %s" % fqdn)
+ except ldap.SERVER_DOWN:
+ raise RuntimeError("Unable to connect to LDAP server %s" % fqdn)
+ except ldap.INVALID_CREDENTIALS:
+ raise RuntimeError("The password provided is incorrect for LDAP server %s" % fqdn)
+ else:
+ conn = ipaldap.IPAdmin(ldapi=True, realm=self.realm)
+ conn.do_external_bind(self.pw_name)
+ else:
+ raise RuntimeError("Offline updates are not supported.")
# The following 2 functions were taken from the Python
# documentation at http://docs.python.org/library/csv.html
@@ -595,8 +611,15 @@ class LDAPUpdate:
"""
try:
- self.conn = ipaldap.IPAdmin(self.sub_dict['FQDN'])
- self.conn.do_simple_bind(bindpw=self.dm_password)
+ if self.online:
+ if self.ldapi:
+ self.conn = ipaldap.IPAdmin(ldapi=True, realm=self.realm)
+ self.conn.do_external_bind(self.pw_name)
+ else:
+ self.conn = ipaldap.IPAdmin(self.sub_dict['FQDN'])
+ self.conn.do_simple_bind(bindpw=self.dm_password)
+ else:
+ raise RuntimeError("Offline updates are not supported.")
all_updates = {}
dn_list = {}
for f in files:
diff --git a/ipaserver/install/upgradeinstance.py b/ipaserver/install/upgradeinstance.py
new file mode 100644
index 00000000..79a7f954
--- /dev/null
+++ b/ipaserver/install/upgradeinstance.py
@@ -0,0 +1,117 @@
+# Authors: Rob Crittenden <rcritten@redhat.com>
+#
+# Copyright (C) 2010 Red Hat
+# see file 'COPYING' for use and warranty information
+#
+# This program is free software; you can redistribute it and/or
+# modify it under the terms of the GNU General Public License as
+# published by the Free Software Foundation; version 2 only
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
+#
+
+import os
+import sys
+
+from ipaserver.install import installutils
+from ipaserver.install import dsinstance
+from ipaserver.install import ldapupdate
+from ipaserver.install import service
+
+DSBASE = '/etc/dirsrv/slapd-'
+DSE = 'dse.ldif'
+
+class IPAUpgrade(service.Service):
+ """
+ Update the LDAP data in an instance by turning off all network
+ listeners and updating over ldapi. This way we know the server is
+ quiet.
+ """
+ def __init__(self, realm_name, files=[], live_run=True):
+ """
+ realm_name: kerberos realm name, used to determine DS instance dir
+ files: list of update files to process. If none use UPDATEDIR
+ live_run: boolean that defines if we are in test or live mode.
+ """
+
+ service.Service.__init__(self, "dirsrv")
+ serverid = dsinstance.realm_to_serverid(realm_name)
+ self.filename = '%s%s/%s' % (DSBASE, serverid, DSE)
+ self.live_run = live_run
+ self.files = files
+ self.modified = False
+
+ def create_instance(self):
+ self.step("stopping directory server", self.stop)
+ self.step("saving configuration", self.__save_config)
+ self.step("disabling listeners", self.__disable_listeners)
+ self.step("starting directory server", self.start)
+ self.step("upgrading server", self.__upgrade)
+ self.step("stopping directory server", self.stop)
+ self.step("restoring configuration", self.__restore_config)
+ self.step("starting directory server", self.start)
+
+ self.start_creation("Upgrading IPA:")
+
+ def __save_config(self):
+ port = installutils.get_directive(self.filename, 'nsslapd-port',
+ separator=':')
+ security = installutils.get_directive(self.filename, 'nsslapd-security',
+ separator=':')
+ autobind = installutils.get_directive(self.filename,
+ 'nsslapd-ldapiautobind', separator=':')
+
+ self.backup_state('nsslapd-port', port)
+ self.backup_state('nsslapd-security', security)
+ self.backup_state('nsslapd-ldapiautobind', autobind)
+
+ def __restore_config(self):
+ port = self.restore_state('nsslapd-port')
+ security = self.restore_state('nsslapd-security')
+ autobind = self.restore_state('nsslapd-ldapiautobind')
+
+ installutils.set_directive(self.filename, 'nsslapd-port',
+ port, quotes=False, separator=':')
+ installutils.set_directive(self.filename, 'nsslapd-security',
+ security, quotes=False, separator=':')
+ installutils.set_directive(self.filename, 'nsslapd-ldapiautobind',
+ autobind, quotes=False, separator=':')
+
+ def __disable_listeners(self):
+ installutils.set_directive(self.filename, 'nsslapd-port',
+ 0, quotes=False, separator=':')
+ installutils.set_directive(self.filename, 'nsslapd-security',
+ 'off', quotes=False, separator=':')
+ installutils.set_directive(self.filename, 'nsslapd-ldapiautobind',
+ 'on', quotes=False, separator=':')
+
+ def __upgrade(self):
+ ld = ldapupdate.LDAPUpdate(dm_password='', ldapi=True, live_run=self.live_run)
+ if len(self.files) == 0:
+ self.files = ld.get_all_files(ldapupdate.UPDATES_DIR)
+ self.modified = ld.update(self.files)
+
+def main():
+ if os.getegid() != 0:
+ print "Must be root to set up server"
+ return 1
+
+ update = IPAUpgrade('EXAMPLE.COM')
+ update.create_instance()
+
+ return 0
+
+try:
+ if __name__ == "__main__":
+ sys.exit(main())
+except SystemExit, e:
+ sys.exit(e)
+except KeyboardInterrupt, e:
+ sys.exit(1)
diff --git a/ipaserver/ipaldap.py b/ipaserver/ipaldap.py
index 3d0b321e..578894ab 100644
--- a/ipaserver/ipaldap.py
+++ b/ipaserver/ipaldap.py
@@ -217,9 +217,12 @@ class IPAdmin(SimpleLDAPObject):
if self.cacert is not None:
SimpleLDAPObject.__init__(self,'ldaps://%s:%d' % (self.host,self.port))
else:
- SimpleLDAPObject.__init__(self,'ldap://%s:%d' % (self.host,self.port))
+ if self.ldapi:
+ SimpleLDAPObject.__init__(self,'ldapi://%%2fvar%%2frun%%2fslapd-%s.socket' % "-".join(self.realm.split(".")))
+ else:
+ SimpleLDAPObject.__init__(self,'ldap://%s:%d' % (self.host,self.port))
- def __init__(self,host,port=389,cacert=None,bindcert=None,bindkey=None,proxydn=None,debug=None):
+ def __init__(self,host='',port=389,cacert=None,bindcert=None,bindkey=None,proxydn=None,debug=None,ldapi=False,realm=None):
"""We just set our instance variables and wrap the methods - the real
work is done in __localinit. This is separated out this way so
that we can call it from places other than instance creation
@@ -241,6 +244,8 @@ class IPAdmin(SimpleLDAPObject):
self.bindcert = bindcert
self.bindkey = bindkey
self.proxydn = proxydn
+ self.ldapi = ldapi
+ self.realm = realm
self.suffixes = {}
self.__localinit()
@@ -345,6 +350,11 @@ class IPAdmin(SimpleLDAPObject):
self.simple_bind_s(binddn, bindpw)
self.__lateinit()
+ def do_external_bind(self, user_name=None):
+ auth_tokens = ldap.sasl.external(user_name)
+ self.sasl_interactive_bind_s("", auth_tokens)
+ self.__lateinit()
+
def getEntry(self,*args):
"""This wraps the search function. It is common to just get one entry"""