summaryrefslogtreecommitdiffstats
path: root/ipaserver/install
diff options
context:
space:
mode:
authorPetr Viktorin <pviktori@redhat.com>2013-03-26 15:31:07 +0100
committerMartin Kosek <mkosek@redhat.com>2013-04-02 15:28:50 +0200
commit1bc892c02daf5e6295ac2e59f17499f6f168b899 (patch)
treedb06dde803df94c98995194d6f77d8aec68031d0 /ipaserver/install
parent03a2c66eda695ad2d4bfe675fa2902035e6b37f0 (diff)
downloadfreeipa.git-1bc892c02daf5e6295ac2e59f17499f6f168b899.tar.gz
freeipa.git-1bc892c02daf5e6295ac2e59f17499f6f168b899.tar.xz
freeipa.git-1bc892c02daf5e6295ac2e59f17499f6f168b899.zip
Load the CA cert into server NSS databases
The CA cert was not loaded, so if it was missing from the PKCS#12 file, installation would fail. Pass the cert filename to the server installers and include it in the NSS DB. Part of the work for: https://fedorahosted.org/freeipa/ticket/3363
Diffstat (limited to 'ipaserver/install')
-rw-r--r--ipaserver/install/certs.py11
-rw-r--r--ipaserver/install/dsinstance.py16
-rw-r--r--ipaserver/install/httpinstance.py6
-rw-r--r--ipaserver/install/ipa_replica_prepare.py2
4 files changed, 24 insertions, 11 deletions
diff --git a/ipaserver/install/certs.py b/ipaserver/install/certs.py
index 81f403df..4f16e4d0 100644
--- a/ipaserver/install/certs.py
+++ b/ipaserver/install/certs.py
@@ -375,7 +375,8 @@ class NSSDatabase(object):
except RuntimeError:
pass
else:
- raise ValueError('%s contains more than one certificate')
+ raise ValueError('%s contains more than one certificate' %
+ location)
def add_single_pem_cert(self, nick, flags, cert):
"""Import a cert in PEM format"""
@@ -1127,7 +1128,8 @@ class CertDB(object):
self.create_certdbs()
self.load_cacert(cacert_fname)
- def create_from_pkcs12(self, pkcs12_fname, pkcs12_pwd_fname, passwd=None):
+ def create_from_pkcs12(self, pkcs12_fname, pkcs12_pwd_fname, passwd=None,
+ ca_file=None):
"""Create a new NSS database using the certificates in a PKCS#12 file.
pkcs12_fname: the filename of the PKCS#12 file
@@ -1137,6 +1139,8 @@ class CertDB(object):
The global CA may be added as well in case it wasn't included in the
PKCS#12 file. Extra certs won't hurt in any case.
+
+ The global CA may be specified in ca_file, as a PEM filename.
"""
self.create_noise_file()
self.create_passwd_file(passwd)
@@ -1146,6 +1150,9 @@ class CertDB(object):
if len(server_certs) == 0:
raise RuntimeError("Could not find a suitable server cert in import in %s" % pkcs12_fname)
+ if ca_file:
+ self.nssdb.import_pem_cert('CA', 'CT,CT,', ca_file)
+
# We only handle one server cert
nickname = server_certs[0][0]
diff --git a/ipaserver/install/dsinstance.py b/ipaserver/install/dsinstance.py
index 38dc94e4..93a226ca 100644
--- a/ipaserver/install/dsinstance.py
+++ b/ipaserver/install/dsinstance.py
@@ -228,7 +228,8 @@ class DsInstance(service.Service):
self.step("configuring directory to start on boot", self.__enable)
def init_info(self, realm_name, fqdn, domain_name, dm_password,
- self_signed_ca, subject_base, idstart, idmax, pkcs12_info):
+ self_signed_ca, subject_base, idstart, idmax, pkcs12_info,
+ ca_file=None):
self.realm_name = realm_name.upper()
self.serverid = realm_to_serverid(self.realm_name)
self.suffix = ipautil.realm_to_suffix(self.realm_name)
@@ -241,16 +242,17 @@ class DsInstance(service.Service):
self.idstart = idstart
self.idmax = idmax
self.pkcs12_info = pkcs12_info
+ self.ca_file = ca_file
self.__setup_sub_dict()
def create_instance(self, realm_name, fqdn, domain_name,
dm_password, pkcs12_info=None, self_signed_ca=False,
idstart=1100, idmax=999999, subject_base=None,
- hbac_allow=True):
+ hbac_allow=True, ca_file=None):
self.init_info(
realm_name, fqdn, domain_name, dm_password, self_signed_ca,
- subject_base, idstart, idmax, pkcs12_info)
+ subject_base, idstart, idmax, pkcs12_info, ca_file=ca_file)
self.__common_setup()
@@ -270,7 +272,8 @@ class DsInstance(service.Service):
self.start_creation(runtime=60)
def create_replica(self, realm_name, master_fqdn, fqdn,
- domain_name, dm_password, pkcs12_info=None):
+ domain_name, dm_password, pkcs12_info=None,
+ ca_file=None):
# idstart and idmax are configured so that the range is seen as
# depleted by the DNA plugin and the replica will go and get a
# new range from the master.
@@ -280,7 +283,7 @@ class DsInstance(service.Service):
self.init_info(
realm_name, fqdn, domain_name, dm_password, None, None,
- idstart, idmax, pkcs12_info)
+ idstart, idmax, pkcs12_info, ca_file=ca_file)
self.master_fqdn = master_fqdn
self.__common_setup(True)
@@ -533,7 +536,8 @@ class DsInstance(service.Service):
dirname = config_dirname(self.serverid)
dsdb = certs.CertDB(self.realm_name, nssdir=dirname, subject_base=self.subject_base)
if self.pkcs12_info:
- dsdb.create_from_pkcs12(self.pkcs12_info[0], self.pkcs12_info[1])
+ dsdb.create_from_pkcs12(self.pkcs12_info[0], self.pkcs12_info[1],
+ ca_file=self.ca_file)
server_certs = dsdb.find_server_certs()
if len(server_certs) == 0:
raise RuntimeError("Could not find a suitable server cert in import in %s" % self.pkcs12_info[0])
diff --git a/ipaserver/install/httpinstance.py b/ipaserver/install/httpinstance.py
index 458112fa..c3407354 100644
--- a/ipaserver/install/httpinstance.py
+++ b/ipaserver/install/httpinstance.py
@@ -64,7 +64,7 @@ class HTTPInstance(service.Service):
def create_instance(self, realm, fqdn, domain_name, dm_password=None,
autoconfig=True, pkcs12_info=None,
self_signed_ca=False, subject_base=None,
- auto_redirect=True):
+ auto_redirect=True, ca_file=None):
self.fqdn = fqdn
self.realm = realm
self.domain = domain_name
@@ -82,6 +82,7 @@ class HTTPInstance(service.Service):
AUTOREDIR='' if auto_redirect else '#',
CRL_PUBLISH_PATH=dogtag.install_constants.CRL_PUBLISH_PATH,
)
+ self.ca_file = ca_file
# get a connection to the DS
self.ldap_connect()
@@ -244,7 +245,8 @@ class HTTPInstance(service.Service):
db = certs.CertDB(self.realm, subject_base=self.subject_base)
if self.pkcs12_info:
- db.create_from_pkcs12(self.pkcs12_info[0], self.pkcs12_info[1], passwd=None)
+ db.create_from_pkcs12(self.pkcs12_info[0], self.pkcs12_info[1],
+ passwd=None, ca_file=self.ca_file)
server_certs = db.find_server_certs()
if len(server_certs) == 0:
raise RuntimeError("Could not find a suitable server cert in import in %s" % self.pkcs12_info[0])
diff --git a/ipaserver/install/ipa_replica_prepare.py b/ipaserver/install/ipa_replica_prepare.py
index e7a92266..d047890b 100644
--- a/ipaserver/install/ipa_replica_prepare.py
+++ b/ipaserver/install/ipa_replica_prepare.py
@@ -340,7 +340,7 @@ class ReplicaPrepare(admintool.AdminTool):
def copy_misc_files(self):
self.log.info("Copying additional files")
- self.copy_info_file("/usr/share/ipa/html/ca.crt", "ca.crt")
+ self.copy_info_file("/etc/ipa/ca.crt", "ca.crt")
preferences_filename = "/usr/share/ipa/html/preferences.html"
if ipautil.file_exists(preferences_filename):
self.copy_info_file(preferences_filename, "preferences.html")