summaryrefslogtreecommitdiffstats
path: root/ipalib/plugins
diff options
context:
space:
mode:
Diffstat (limited to 'ipalib/plugins')
-rw-r--r--ipalib/plugins/baseldap.py14
-rw-r--r--ipalib/plugins/host.py1
-rw-r--r--ipalib/plugins/service.py10
3 files changed, 25 insertions, 0 deletions
diff --git a/ipalib/plugins/baseldap.py b/ipalib/plugins/baseldap.py
index d619f14e..725704ee 100644
--- a/ipalib/plugins/baseldap.py
+++ b/ipalib/plugins/baseldap.py
@@ -387,6 +387,20 @@ def remove_external_post_callback(memberattr, membertype, externalattr, ldap, co
return (completed + completed_external, dn)
+def host_is_master(ldap, fqdn):
+ """
+ Check to see if this host is a master.
+
+ Raises an exception if a master, otherwise returns nothing.
+ """
+ master_dn = str(DN('cn=%s' % fqdn, 'cn=masters,cn=ipa,cn=etc', api.env.basedn))
+ try:
+ (dn, entry_attrs) = ldap.get_entry(master_dn, ['objectclass'])
+ raise errors.ValidationError(name='hostname', error=_('An IPA master host cannot be deleted'))
+ except errors.NotFound:
+ # Good, not a master
+ return
+
class LDAPObject(Object):
"""
diff --git a/ipalib/plugins/host.py b/ipalib/plugins/host.py
index 682b8142..012817e6 100644
--- a/ipalib/plugins/host.py
+++ b/ipalib/plugins/host.py
@@ -560,6 +560,7 @@ class host_del(LDAPDelete):
fqdn = hostentry['fqdn'][0]
else:
fqdn = keys[-1]
+ host_is_master(ldap, fqdn)
# Remove all service records for this host
truncated = True
while truncated:
diff --git a/ipalib/plugins/service.py b/ipalib/plugins/service.py
index dad3ded4..71e4ac46 100644
--- a/ipalib/plugins/service.py
+++ b/ipalib/plugins/service.py
@@ -288,6 +288,16 @@ class service_del(LDAPDelete):
msg_summary = _('Deleted service "%(value)s"')
member_attributes = ['managedby']
def pre_callback(self, ldap, dn, *keys, **options):
+ # In the case of services we don't want IPA master services to be
+ # deleted. This is a limited few though. If the user has their own
+ # custom services allow them to manage them.
+ (service, hostname, realm) = split_principal(keys[-1])
+ try:
+ host_is_master(ldap, hostname)
+ except errors.ValidationError, e:
+ service_types = ['HTTP', 'ldap', 'DNS' 'dogtagldap']
+ if service in service_types:
+ raise errors.ValidationError(name='principal', error=_('This principal is required by the IPA master'))
if self.api.env.enable_ra:
(dn, entry_attrs) = ldap.get_entry(dn, ['usercertificate'])
cert = entry_attrs.get('usercertificate')