summaryrefslogtreecommitdiffstats
path: root/base/deploy/src/scriptlets/security_databases.py
blob: f32b7e497368e9c3e73d0849da6d74bb826fbe92 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
#!/usr/bin/python -t
# Authors:
#     Matthew Harmsen <mharmsen@redhat.com>
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation; version 2 of the License.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License along
# with this program; if not, write to the Free Software Foundation, Inc.,
# 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
#
# Copyright (C) 2012 Red Hat, Inc.
# All rights reserved.
#

# PKI Deployment Imports
import pkiconfig as config
from pkiconfig import pki_master_dict as master
import pkihelper as util
import pkimessages as log
import pkiscriptlet


# PKI Deployment Security Database Classes
class PkiScriptlet(pkiscriptlet.AbstractBasePkiScriptlet):
    rv = 0

    def spawn(self):
        config.pki_log.info(log.SECURITY_DATABASES_SPAWN_1, __name__,
                            extra=config.PKI_INDENTATION_LEVEL_1)
        if not config.pki_dry_run_flag:
            util.password.create_password_conf(
                master['pki_shared_password_conf'])
            util.file.modify(master['pki_shared_password_conf'])
            util.certutil.create_security_databases(
                master['pki_database_path'],
                master['pki_shared_password_conf'])
            util.file.modify(master['pki_cert_database'], perms=\
                config.PKI_DEPLOYMENT_DEFAULT_SECURITY_DATABASE_PERMISSIONS)
            util.file.modify(master['pki_key_database'], perms=\
                config.PKI_DEPLOYMENT_DEFAULT_SECURITY_DATABASE_PERMISSIONS)
            util.file.modify(master['pki_secmod_database'], perms=\
                config.PKI_DEPLOYMENT_DEFAULT_SECURITY_DATABASE_PERMISSIONS)
            rv = util.certutil.verify_certificate_exists(
                     master['pki_database_path'],
                     master['pki_self_signed_token'],
                     master['pki_self_signed_nickname'],
                     password_file=master['pki_shared_password_conf'])
            if not rv:
                util.file.generate_noise_file(
                    master['pki_self_signed_noise_file'],
                    master['pki_self_signed_noise_bytes'])
                util.certutil.generate_self_signed_certificate(
                    master['pki_database_path'],
                    master['pki_self_signed_token'],
                    master['pki_self_signed_nickname'],
                    master['pki_self_signed_subject'],
                    master['pki_self_signed_serial_number'],
                    master['pki_self_signed_validity_period'],
                    master['pki_self_signed_issuer_name'],
                    master['pki_self_signed_trustargs'],
                    master['pki_self_signed_noise_file'],
                    password_file=master['pki_shared_password_conf'])
                util.file.delete(master['pki_self_signed_noise_file'])
        else:
            util.password.create_password_conf(
                master['pki_shared_password_conf'])
            util.certutil.create_security_databases(
                master['pki_database_path'],
                master['pki_shared_password_conf'])
            rv = util.certutil.verify_certificate_exists(
                     master['pki_database_path'],
                     master['pki_self_signed_token'],
                     master['pki_self_signed_nickname'],
                     password_file=master['pki_shared_password_conf'])
            if not rv:
                util.file.generate_noise_file(
                    master['pki_self_signed_noise_file'],
                    master['pki_self_signed_noise_bytes'])
                util.certutil.generate_self_signed_certificate(
                    master['pki_database_path'],
                    master['pki_self_signed_token'],
                    master['pki_self_signed_nickname'],
                    master['pki_self_signed_subject'],
                    master['pki_self_signed_serial_number'],
                    master['pki_self_signed_validity_period'],
                    master['pki_self_signed_issuer_name'],
                    master['pki_self_signed_trustargs'],
                    master['pki_self_signed_noise_file'],
                    password_file=master['pki_shared_password_conf'])
        return self.rv

    def respawn(self):
        config.pki_log.info(log.SECURITY_DATABASES_RESPAWN_1, __name__,
                            extra=config.PKI_INDENTATION_LEVEL_1)
        util.file.modify(master['pki_shared_password_conf'])
        util.file.modify(master['pki_cert_database'],
            perms=config.PKI_DEPLOYMENT_DEFAULT_SECURITY_DATABASE_PERMISSIONS)
        util.file.modify(master['pki_key_database'],
            perms=config.PKI_DEPLOYMENT_DEFAULT_SECURITY_DATABASE_PERMISSIONS)
        util.file.modify(master['pki_secmod_database'],
            perms=config.PKI_DEPLOYMENT_DEFAULT_SECURITY_DATABASE_PERMISSIONS)
        return self.rv

    def destroy(self):
        config.pki_log.info(log.SECURITY_DATABASES_DESTROY_1, __name__,
                            extra=config.PKI_INDENTATION_LEVEL_1)
        if not config.pki_dry_run_flag:
            if master['pki_subsystem'] in config.PKI_SUBSYSTEMS and\
               util.instance.pki_subsystem_instances() == 0:
                util.file.delete(master['pki_cert_database'])
                util.file.delete(master['pki_key_database'])
                util.file.delete(master['pki_secmod_database'])
                util.file.delete(master['pki_shared_password_conf'])
        else:
            # ALWAYS display correct information (even during dry_run)
            if master['pki_subsystem'] in config.PKI_SUBSYSTEMS and\
               util.instance.pki_subsystem_instances() == 1:
                util.file.delete(master['pki_cert_database'])
                util.file.delete(master['pki_key_database'])
                util.file.delete(master['pki_secmod_database'])
                util.file.delete(master['pki_shared_password_conf'])
        return self.rv