summaryrefslogtreecommitdiffstats
path: root/install/certmonger/dogtag-ipa-retrieve-agent-submit
blob: 1422494cc2f3861f4037fd04d64cd138d2272663 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
#!/usr/bin/python2 -E
#
# Authors:
#   Rob Crittenden <rcritten@redhat.com>
#
# Copyright (C) 2012  Red Hat
# see file 'COPYING' for use and warranty information
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program.  If not, see <http://www.gnu.org/licenses/>.

# The certificate rewewal is done on only one dogtag CA. The others
# retrieve the updated certificate from IPA.

import os
# Prevent garbage from readline on standard output
# (see https://fedorahosted.org/freeipa/ticket/4064)
if not os.isatty(1):
    os.environ['TERM'] = 'dumb'
import sys
import shutil
import tempfile
import syslog
import base64
import traceback
from ipalib import api
from ipapython.dn import DN
from ipalib import errors
from ipalib import x509
from ipapython import services as ipaservices
from ipapython import ipautil
from ipaserver.install import certs
from ipaserver.plugins.ldap2 import ldap2

def main():
    # We cheat and pass in the nickname as the CA profile to execute against.
    # Some way is needed to determine which entry to retrieve from LDAP
    operation = os.environ.get('CERTMONGER_OPERATION')
    nickname = os.environ.get('CERTMONGER_CA_PROFILE')

    if operation not in ['SUBMIT', 'POLL']:
        sys.exit(6) # unsupported operation

    api.bootstrap(context='renew')
    api.finalize()

    # Update or add it
    tmpdir = tempfile.mkdtemp(prefix = "tmp-")
    try:
        dn = DN(('cn', nickname), ('cn', 'ca_renewal'), ('cn', 'ipa'), ('cn', 'etc'), api.env.basedn)
        principal = str('host/%s@%s' % (api.env.host, api.env.realm))
        ccache = ipautil.kinit_hostprincipal('/etc/krb5.keytab', tmpdir, principal)
        conn = ldap2(shared_instance=False, ldap_uri=api.env.ldap_uri)
        conn.connect(ccache=ccache)
        try:
            syslog.syslog(syslog.LOG_NOTICE, "Updating certificate for %s" % nickname)
            entry_attrs = conn.get_entry(dn, ['usercertificate'])
            cert = entry_attrs['usercertificate'][0]
            cert = base64.b64encode(cert)
            print x509.make_pem(cert)
        except errors.NotFound:
            syslog.syslog(syslog.LOG_INFO, "Updated certificate for %s not available" % nickname)
            # No cert available yet, tell certmonger to wait another 8 hours
            print 8 * 60 * 60
            sys.exit(5)
        finally:
            conn.disconnect()
    except Exception, e:
        syslog.syslog(syslog.LOG_ERR, "Exception trying to retrieve %s: %s" % (nickname, e))
        # Unhandled error
        sys.exit(3)
    finally:
        shutil.rmtree(tmpdir)

    sys.exit(0)

try:
    main()
except Exception:
    syslog.syslog(syslog.LOG_ERR, traceback.format_exc())
    print "Internal error"
    sys.exit(3)