summaryrefslogtreecommitdiffstats
path: root/ipaserver
diff options
context:
space:
mode:
Diffstat (limited to 'ipaserver')
-rw-r--r--ipaserver/install/installutils.py1
-rw-r--r--ipaserver/install/ldapupdate.py51
-rw-r--r--ipaserver/install/upgradeinstance.py117
-rw-r--r--ipaserver/ipaldap.py14
4 files changed, 167 insertions, 16 deletions
diff --git a/ipaserver/install/installutils.py b/ipaserver/install/installutils.py
index 5049962b..0767f0c8 100644
--- a/ipaserver/install/installutils.py
+++ b/ipaserver/install/installutils.py
@@ -306,6 +306,7 @@ def get_directive(filename, directive, separator=' '):
line = line.strip()
result = line.split(separator, 1)[1]
result = result.strip('"')
+ result = result.strip(' ')
fd.close()
return result
fd.close()
diff --git a/ipaserver/install/ldapupdate.py b/ipaserver/install/ldapupdate.py
index dff94783..91ff80f5 100644
--- a/ipaserver/install/ldapupdate.py
+++ b/ipaserver/install/ldapupdate.py
@@ -38,6 +38,7 @@ import platform
import time
import random
import os
+import pwd
import fnmatch
import csv
@@ -48,16 +49,23 @@ class BadSyntax(Exception):
return repr(self.value)
class LDAPUpdate:
- def __init__(self, dm_password, sub_dict={}, live_run=True):
+ def __init__(self, dm_password, sub_dict={}, live_run=True,
+ online=True, ldapi=False):
"""dm_password = Directory Manager password
sub_dict = substitution dictionary
live_run = Apply the changes or just test
+ online = do an online LDAP update or use an experimental LDIF updater
+ ldapi = bind using ldapi. This assumes autobind is enabled.
"""
self.sub_dict = sub_dict
self.live_run = live_run
self.dm_password = dm_password
self.conn = None
self.modified = False
+ self.online = online
+ self.ldapi = ldapi
+
+ self.pw_name = pwd.getpwuid(os.geteuid()).pw_name
krbctx = krbV.default_context()
@@ -68,6 +76,7 @@ class LDAPUpdate:
domain = ipautil.get_domain_name()
libarch = self.__identify_arch()
suffix = util.realm_to_suffix(krbctx.default_realm)
+ self.realm = krbctx.default_realm
if not self.sub_dict.get("REALM"):
self.sub_dict["REALM"] = krbctx.default_realm
@@ -84,17 +93,24 @@ class LDAPUpdate:
if not self.sub_dict.get("TIME"):
self.sub_dict["TIME"] = int(time.time())
- # Try out the password
- try:
- conn = ipaldap.IPAdmin(fqdn)
- conn.do_simple_bind(bindpw=self.dm_password)
- conn.unbind()
- except ldap.CONNECT_ERROR:
- raise RuntimeError("Unable to connect to LDAP server %s" % fqdn)
- except ldap.SERVER_DOWN:
- raise RuntimeError("Unable to connect to LDAP server %s" % fqdn)
- except ldap.INVALID_CREDENTIALS:
- raise RuntimeError("The password provided is incorrect for LDAP server %s" % fqdn)
+ if online:
+ # Try out the password
+ if not self.ldapi:
+ try:
+ conn = ipaldap.IPAdmin(fqdn)
+ conn.do_simple_bind(bindpw=self.dm_password)
+ conn.unbind()
+ except ldap.CONNECT_ERROR:
+ raise RuntimeError("Unable to connect to LDAP server %s" % fqdn)
+ except ldap.SERVER_DOWN:
+ raise RuntimeError("Unable to connect to LDAP server %s" % fqdn)
+ except ldap.INVALID_CREDENTIALS:
+ raise RuntimeError("The password provided is incorrect for LDAP server %s" % fqdn)
+ else:
+ conn = ipaldap.IPAdmin(ldapi=True, realm=self.realm)
+ conn.do_external_bind(self.pw_name)
+ else:
+ raise RuntimeError("Offline updates are not supported.")
# The following 2 functions were taken from the Python
# documentation at http://docs.python.org/library/csv.html
@@ -595,8 +611,15 @@ class LDAPUpdate:
"""
try:
- self.conn = ipaldap.IPAdmin(self.sub_dict['FQDN'])
- self.conn.do_simple_bind(bindpw=self.dm_password)
+ if self.online:
+ if self.ldapi:
+ self.conn = ipaldap.IPAdmin(ldapi=True, realm=self.realm)
+ self.conn.do_external_bind(self.pw_name)
+ else:
+ self.conn = ipaldap.IPAdmin(self.sub_dict['FQDN'])
+ self.conn.do_simple_bind(bindpw=self.dm_password)
+ else:
+ raise RuntimeError("Offline updates are not supported.")
all_updates = {}
dn_list = {}
for f in files:
diff --git a/ipaserver/install/upgradeinstance.py b/ipaserver/install/upgradeinstance.py
new file mode 100644
index 00000000..79a7f954
--- /dev/null
+++ b/ipaserver/install/upgradeinstance.py
@@ -0,0 +1,117 @@
+# Authors: Rob Crittenden <rcritten@redhat.com>
+#
+# Copyright (C) 2010 Red Hat
+# see file 'COPYING' for use and warranty information
+#
+# This program is free software; you can redistribute it and/or
+# modify it under the terms of the GNU General Public License as
+# published by the Free Software Foundation; version 2 only
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
+#
+
+import os
+import sys
+
+from ipaserver.install import installutils
+from ipaserver.install import dsinstance
+from ipaserver.install import ldapupdate
+from ipaserver.install import service
+
+DSBASE = '/etc/dirsrv/slapd-'
+DSE = 'dse.ldif'
+
+class IPAUpgrade(service.Service):
+ """
+ Update the LDAP data in an instance by turning off all network
+ listeners and updating over ldapi. This way we know the server is
+ quiet.
+ """
+ def __init__(self, realm_name, files=[], live_run=True):
+ """
+ realm_name: kerberos realm name, used to determine DS instance dir
+ files: list of update files to process. If none use UPDATEDIR
+ live_run: boolean that defines if we are in test or live mode.
+ """
+
+ service.Service.__init__(self, "dirsrv")
+ serverid = dsinstance.realm_to_serverid(realm_name)
+ self.filename = '%s%s/%s' % (DSBASE, serverid, DSE)
+ self.live_run = live_run
+ self.files = files
+ self.modified = False
+
+ def create_instance(self):
+ self.step("stopping directory server", self.stop)
+ self.step("saving configuration", self.__save_config)
+ self.step("disabling listeners", self.__disable_listeners)
+ self.step("starting directory server", self.start)
+ self.step("upgrading server", self.__upgrade)
+ self.step("stopping directory server", self.stop)
+ self.step("restoring configuration", self.__restore_config)
+ self.step("starting directory server", self.start)
+
+ self.start_creation("Upgrading IPA:")
+
+ def __save_config(self):
+ port = installutils.get_directive(self.filename, 'nsslapd-port',
+ separator=':')
+ security = installutils.get_directive(self.filename, 'nsslapd-security',
+ separator=':')
+ autobind = installutils.get_directive(self.filename,
+ 'nsslapd-ldapiautobind', separator=':')
+
+ self.backup_state('nsslapd-port', port)
+ self.backup_state('nsslapd-security', security)
+ self.backup_state('nsslapd-ldapiautobind', autobind)
+
+ def __restore_config(self):
+ port = self.restore_state('nsslapd-port')
+ security = self.restore_state('nsslapd-security')
+ autobind = self.restore_state('nsslapd-ldapiautobind')
+
+ installutils.set_directive(self.filename, 'nsslapd-port',
+ port, quotes=False, separator=':')
+ installutils.set_directive(self.filename, 'nsslapd-security',
+ security, quotes=False, separator=':')
+ installutils.set_directive(self.filename, 'nsslapd-ldapiautobind',
+ autobind, quotes=False, separator=':')
+
+ def __disable_listeners(self):
+ installutils.set_directive(self.filename, 'nsslapd-port',
+ 0, quotes=False, separator=':')
+ installutils.set_directive(self.filename, 'nsslapd-security',
+ 'off', quotes=False, separator=':')
+ installutils.set_directive(self.filename, 'nsslapd-ldapiautobind',
+ 'on', quotes=False, separator=':')
+
+ def __upgrade(self):
+ ld = ldapupdate.LDAPUpdate(dm_password='', ldapi=True, live_run=self.live_run)
+ if len(self.files) == 0:
+ self.files = ld.get_all_files(ldapupdate.UPDATES_DIR)
+ self.modified = ld.update(self.files)
+
+def main():
+ if os.getegid() != 0:
+ print "Must be root to set up server"
+ return 1
+
+ update = IPAUpgrade('EXAMPLE.COM')
+ update.create_instance()
+
+ return 0
+
+try:
+ if __name__ == "__main__":
+ sys.exit(main())
+except SystemExit, e:
+ sys.exit(e)
+except KeyboardInterrupt, e:
+ sys.exit(1)
diff --git a/ipaserver/ipaldap.py b/ipaserver/ipaldap.py
index 3d0b321e..578894ab 100644
--- a/ipaserver/ipaldap.py
+++ b/ipaserver/ipaldap.py
@@ -217,9 +217,12 @@ class IPAdmin(SimpleLDAPObject):
if self.cacert is not None:
SimpleLDAPObject.__init__(self,'ldaps://%s:%d' % (self.host,self.port))
else:
- SimpleLDAPObject.__init__(self,'ldap://%s:%d' % (self.host,self.port))
+ if self.ldapi:
+ SimpleLDAPObject.__init__(self,'ldapi://%%2fvar%%2frun%%2fslapd-%s.socket' % "-".join(self.realm.split(".")))
+ else:
+ SimpleLDAPObject.__init__(self,'ldap://%s:%d' % (self.host,self.port))
- def __init__(self,host,port=389,cacert=None,bindcert=None,bindkey=None,proxydn=None,debug=None):
+ def __init__(self,host='',port=389,cacert=None,bindcert=None,bindkey=None,proxydn=None,debug=None,ldapi=False,realm=None):
"""We just set our instance variables and wrap the methods - the real
work is done in __localinit. This is separated out this way so
that we can call it from places other than instance creation
@@ -241,6 +244,8 @@ class IPAdmin(SimpleLDAPObject):
self.bindcert = bindcert
self.bindkey = bindkey
self.proxydn = proxydn
+ self.ldapi = ldapi
+ self.realm = realm
self.suffixes = {}
self.__localinit()
@@ -345,6 +350,11 @@ class IPAdmin(SimpleLDAPObject):
self.simple_bind_s(binddn, bindpw)
self.__lateinit()
+ def do_external_bind(self, user_name=None):
+ auth_tokens = ldap.sasl.external(user_name)
+ self.sasl_interactive_bind_s("", auth_tokens)
+ self.__lateinit()
+
def getEntry(self,*args):
"""This wraps the search function. It is common to just get one entry"""