summaryrefslogtreecommitdiffstats
path: root/ipapython/platform/redhat.py
diff options
context:
space:
mode:
authorTimo Aaltonen <tjaalton@ubuntu.com>2012-12-05 14:58:06 +0200
committerMartin Kosek <mkosek@redhat.com>2013-01-14 14:39:54 +0100
commited849639272acf0aed44935591ba525ec1348d59 (patch)
treedce45b15575c4c9561a260a898d358575b45c610 /ipapython/platform/redhat.py
parent38dded7db6529be096b92c9d63182a980e0b3a93 (diff)
downloadfreeipa.git-ed849639272acf0aed44935591ba525ec1348d59.tar.gz
freeipa.git-ed849639272acf0aed44935591ba525ec1348d59.tar.xz
freeipa.git-ed849639272acf0aed44935591ba525ec1348d59.zip
convert the base platform modules into packages
Diffstat (limited to 'ipapython/platform/redhat.py')
-rw-r--r--ipapython/platform/redhat.py261
1 files changed, 0 insertions, 261 deletions
diff --git a/ipapython/platform/redhat.py b/ipapython/platform/redhat.py
deleted file mode 100644
index 274062e4..00000000
--- a/ipapython/platform/redhat.py
+++ /dev/null
@@ -1,261 +0,0 @@
-# Authors: Simo Sorce <ssorce@redhat.com>
-# Alexander Bokovoy <abokovoy@redhat.com>
-#
-# Copyright (C) 2007-2011 Red Hat
-# see file 'COPYING' for use and warranty information
-#
-# This program is free software; you can redistribute it and/or modify
-# it under the terms of the GNU General Public License as published by
-# the Free Software Foundation, either version 3 of the License, or
-# (at your option) any later version.
-#
-# This program is distributed in the hope that it will be useful,
-# but WITHOUT ANY WARRANTY; without even the implied warranty of
-# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
-# GNU General Public License for more details.
-#
-# You should have received a copy of the GNU General Public License
-# along with this program. If not, see <http://www.gnu.org/licenses/>.
-#
-
-import tempfile
-import re
-import os
-import stat
-import sys
-import socket
-import stat
-import time
-
-from ipapython import ipautil
-from ipapython.platform import base
-from ipapython.ipa_log_manager import root_logger
-from ipalib import api
-
-# All what we allow exporting directly from this module
-# Everything else is made available through these symbols when they are
-# directly imported into ipapython.services:
-#
-# authconfig -- class reference for platform-specific implementation of
-# authconfig(8)
-# service -- class reference for platform-specific implementation of a
-# PlatformService class
-# knownservices -- factory instance to access named services IPA cares about,
-# names are ipapython.services.wellknownservices
-# backup_and_replace_hostname -- platform-specific way to set hostname and
-# make it persistent over reboots
-# restore_network_configuration -- platform-specific way of restoring network
-# configuration (e.g. static hostname)
-# restore_context -- platform-sepcific way to restore security context, if
-# applicable
-# check_selinux_status -- platform-specific way to see if SELinux is enabled
-# and restorecon is installed.
-__all__ = ['authconfig', 'service', 'knownservices',
- 'backup_and_replace_hostname', 'restore_context', 'check_selinux_status',
- 'restore_network_configuration', 'timedate_services']
-
-# Just copy a referential list of timedate services
-timedate_services = list(base.timedate_services)
-
-class RedHatService(base.PlatformService):
- def __wait_for_open_ports(self, instance_name=""):
- """
- If this is a service we need to wait for do so.
- """
- ports = None
- if instance_name in base.wellknownports:
- ports = base.wellknownports[instance_name]
- else:
- if self.service_name in base.wellknownports:
- ports = base.wellknownports[self.service_name]
- if ports:
- ipautil.wait_for_open_ports('localhost', ports, api.env.startup_timeout)
-
- def stop(self, instance_name="", capture_output=True):
- ipautil.run(["/sbin/service", self.service_name, "stop", instance_name], capture_output=capture_output)
- super(RedHatService, self).stop(instance_name)
-
- def start(self, instance_name="", capture_output=True, wait=True):
- ipautil.run(["/sbin/service", self.service_name, "start", instance_name], capture_output=capture_output)
- if wait and self.is_running(instance_name):
- self.__wait_for_open_ports(instance_name)
- super(RedHatService, self).start(instance_name)
-
- def restart(self, instance_name="", capture_output=True, wait=True):
- ipautil.run(["/sbin/service", self.service_name, "restart", instance_name], capture_output=capture_output)
- if wait and self.is_running(instance_name):
- self.__wait_for_open_ports(instance_name)
-
- def is_running(self, instance_name=""):
- ret = True
- try:
- (sout,serr,rcode) = ipautil.run(["/sbin/service", self.service_name, "status", instance_name])
- if sout.find("is stopped") >= 0:
- ret = False
- except ipautil.CalledProcessError:
- ret = False
- return ret
-
- def is_installed(self):
- installed = True
- try:
- ipautil.run(["/sbin/service", self.service_name, "status"])
- except ipautil.CalledProcessError, e:
- if e.returncode == 1:
- # service is not installed or there is other serious issue
- installed = False
- return installed
-
- def is_enabled(self, instance_name=""):
- (stdout, stderr, returncode) = ipautil.run(["/sbin/chkconfig", self.service_name],raiseonerr=False)
- return (returncode == 0)
-
- def enable(self, instance_name=""):
- ipautil.run(["/sbin/chkconfig", self.service_name, "on"])
-
- def disable(self, instance_name=""):
- ipautil.run(["/sbin/chkconfig", self.service_name, "off"])
-
- def install(self, instance_name=""):
- ipautil.run(["/sbin/chkconfig", "--add", self.service_name])
-
- def remove(self, instance_name=""):
- ipautil.run(["/sbin/chkconfig", "--del", self.service_name])
-
-class RedHatSSHService(RedHatService):
- def get_config_dir(self, instance_name=""):
- return '/etc/ssh'
-
-class RedHatHTTPDService(RedHatService):
- def restart(self, instance_name="", capture_output=True, wait=True):
- try:
- super(RedHatHTTPDService, self).restart(instance_name, capture_output, wait)
- except ipautil.CalledProcessError:
- # http may have issues with binding to ports, try to fallback
- # https://bugzilla.redhat.com/show_bug.cgi?id=845405
- root_logger.debug("%s restart failed, try to stop&start again", self.service_name)
- time.sleep(5)
- self.stop(instance_name, capture_output)
- time.sleep(5)
- self.start(instance_name, capture_output, wait)
-
-class RedHatAuthConfig(base.AuthConfig):
- """
- AuthConfig class implements system-independent interface to configure
- system authentication resources. In Red Hat-produced systems this is done with
- authconfig(8) utility.
- """
- def __build_args(self):
- args = []
- for (option, value) in self.parameters.items():
- if type(value) is bool:
- if value:
- args.append("--enable%s" % (option))
- else:
- args.append("--disable%s" % (option))
- elif type(value) in (tuple, list):
- args.append("--%s" % (option))
- args.append("%s" % (value[0]))
- elif value is None:
- args.append("--%s" % (option))
- else:
- args.append("--%s%s" % (option,value))
- return args
-
- def execute(self):
- args = self.__build_args()
- ipautil.run(["/usr/sbin/authconfig"]+args)
-
-def redhat_service(name):
- if name == 'sshd':
- return RedHatSSHService(name)
- elif name == 'httpd':
- return RedHatHTTPDService(name)
- return RedHatService(name)
-
-class RedHatServices(base.KnownServices):
- def __init__(self):
- services = dict()
- for s in base.wellknownservices:
- services[s] = redhat_service(s)
- # Call base class constructor. This will lock services to read-only
- super(RedHatServices, self).__init__(services)
-
-authconfig = RedHatAuthConfig
-service = redhat_service
-knownservices = RedHatServices()
-
-def restore_context(filepath, restorecon='/sbin/restorecon'):
- """
- restore security context on the file path
- SELinux equivalent is /path/to/restorecon <filepath>
-
- restorecon's return values are not reliable so we have to
- ignore them (BZ #739604).
-
- ipautil.run() will do the logging.
- """
- try:
- if (os.path.exists('/usr/sbin/selinuxenabled')):
- ipautil.run(["/usr/sbin/selinuxenabled"])
- else:
- # No selinuxenabled, no SELinux
- return
- except ipautil.CalledProcessError:
- # selinuxenabled returns 1 if not enabled
- return
-
- if (os.path.exists(restorecon)):
- ipautil.run([restorecon, filepath], raiseonerr=False)
-
-def backup_and_replace_hostname(fstore, statestore, hostname):
- old_hostname = socket.gethostname()
- try:
- ipautil.run(['/bin/hostname', hostname])
- except ipautil.CalledProcessError, e:
- print >>sys.stderr, "Failed to set this machine hostname to %s (%s)." % (hostname, str(e))
- replacevars = {'HOSTNAME':hostname}
-
- filepath = '/etc/sysconfig/network'
- if not os.path.exists(filepath):
- # file doesn't exist; create it with correct ownership & mode
- open(filepath, 'a').close()
- os.chmod(filepath,
- stat.S_IRUSR | stat.S_IWUSR | stat.S_IRGRP | stat.S_IROTH)
- os.chown(filepath, 0, 0)
- old_values = ipautil.backup_config_and_replace_variables(
- fstore, filepath, replacevars=replacevars)
- restore_context("/etc/sysconfig/network")
-
- if 'HOSTNAME' in old_values:
- statestore.backup_state('network', 'hostname', old_values['HOSTNAME'])
- else:
- statestore.backup_state('network', 'hostname', old_hostname)
-
-def restore_network_configuration(fstore, statestore):
- filepath = '/etc/sysconfig/network'
- if fstore.has_file(filepath):
- fstore.restore_file(filepath)
-
-def check_selinux_status(restorecon='/sbin/restorecon'):
- """
- We don't have a specific package requirement for policycoreutils
- which provides restorecon. This is because we don't require
- SELinux on client installs. However if SELinux is enabled then
- this package is required.
-
- This function returns nothing but may raise a Runtime exception
- if SELinux is enabled but restorecon is not available.
- """
- try:
- if (os.path.exists('/usr/sbin/selinuxenabled')):
- ipautil.run(["/usr/sbin/selinuxenabled"])
- else:
- # No selinuxenabled, no SELinux
- return
- except ipautil.CalledProcessError:
- # selinuxenabled returns 1 if not enabled
- return
-
- if not os.path.exists(restorecon):
- raise RuntimeError('SELinux is enabled but %s does not exist.\nInstall the policycoreutils package and start the installation again.' % restorecon)