summaryrefslogtreecommitdiffstats
path: root/ipa-server/ipaserver/krbinstance.py
Commit message (Collapse)AuthorAgeFilesLines
* Big changeset that includes the work around keytab management.Simo Sorce2007-12-211-1/+4
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Following the changelog history from my dev tree, some comments are useful imo ------------------------------------------------------ user: Simo Sorce <ssorce@redhat.com> date: Fri Dec 21 03:05:36 2007 -0500 files: ipa-server/ipa-slapi-plugins/ipa-pwd-extop/test-get-keytab.c description: Remove remnants of the initial test tool changeset: 563:4fe574b7bdf1 user: Simo Sorce <ssorce@redhat.com> date: Fri Dec 21 02:58:37 2007 -0500 files: ipa-server/ipa-slapi-plugins/ipa-pwd-extop/ipa_pwd_extop.c description: Maybe actually encrypting the keys will help :-) changeset: 562:488ded41242a user: Simo Sorce <ssorce@redhat.com> date: Thu Dec 20 23:53:50 2007 -0500 files: ipa-server/ipa-install/share/Makefile.am ipa-server/ipa-install/share/default-aci.ldif description: Fixes changeset: 561:4518f6f5ecaf user: Simo Sorce <ssorce@redhat.com> date: Thu Dec 20 23:53:32 2007 -0500 files: ipa-admintools/Makefile ipa-admintools/ipa-addservice description: transform the old ipa-getkeytab in a tool to add services as the new ipa-getkeytab won't do it (and IMO it makes more sense to keep the two functions separate anyway). changeset: 559:25a7f8ee973d user: Simo Sorce <ssorce@redhat.com> date: Thu Dec 20 23:48:59 2007 -0500 files: ipa-server/ipa-slapi-plugins/ipa-pwd-extop/ipa_pwd_extop.c description: Bugfixes changeset: 558:28fcabe4aeba user: Simo Sorce <ssorce@redhat.com> date: Thu Dec 20 23:48:29 2007 -0500 files: ipa-client/configure.ac ipa-client/ipa-client.spec ipa-client/ipa-client.spec.in ipa-client/ipa-getkeytab.c description: Configure fixes Add ipa-getkeytab to spec Client fixes changeset: 557:e92a4ffdcda4 user: Simo Sorce <ssorce@redhat.com> date: Thu Dec 20 20:57:10 2007 -0500 files: ipa-client/Makefile.am ipa-client/configure.ac description: Try to make ipa-getkeytab build via autotools changeset: 556:224894175d6b user: Simo Sorce <ssorce@redhat.com> date: Thu Dec 20 20:35:56 2007 -0500 files: ipa-admintools/ipa-getkeytab ipa-client/ipa-getkeytab.c description: Messed a bit with hg commands. To make it short: - Remove the python ipa-getkeytab program - Rename the keytab plugin test program to ipa-getkeytab - Put the program in ipa-client as it should be distributed with the client tools changeset: 555:5e1a068f2e90 user: Simo Sorce <ssorce@redhat.com> date: Thu Dec 20 20:20:40 2007 -0500 files: ipa-server/ipa-slapi-plugins/ipa-pwd-extop/test-get-keytab.c description: Polish the client program changeset: 554:0a5b19a167cf user: Simo Sorce <ssorce@redhat.com> date: Thu Dec 20 18:53:49 2007 -0500 files: ipa-server/ipa-install/share/default-aci.ldif ipa-server/ipa-install/share/default-keytypes.ldif ipa-server/ipa-install/share/kdc.conf.template ipa-server/ipa-install/share/kerberos.ldif ipa-server/ipa-slapi-plugins/ipa-pwd-extop/ipa_pwd_extop.c ipa-server/ipa-slapi-plugins/ipa-pwd-extop/test-get-keytab.c ipa-server/ipaserver/krbinstance.py description: Support retrieving enctypes from LDAP Filter enctypes Update test program changeset: 553:f75d7886cb91 user: Simo Sorce <ssorce@redhat.com> date: Thu Dec 20 00:17:40 2007 -0500 files: ipa-server/ipa-slapi-plugins/ipa-pwd-extop/test-get-keytab.c description: Fix ber generation and remove redundant keys changeset: 552:0769cafe6dcd user: Simo Sorce <ssorce@redhat.com> date: Wed Dec 19 19:31:37 2007 -0500 files: ipa-server/ipa-slapi-plugins/ipa-pwd-extop/test-get-keytab.c description: Avoid stupid segfault changeset: 551:1acd5fdb5788 user: Simo Sorce <ssorce@redhat.com> date: Wed Dec 19 18:39:12 2007 -0500 files: ipa-server/ipa-slapi-plugins/ipa-pwd-extop/ipa_pwd_extop.c description: If ber_peek_tag() returns LBER_ERROR it may just be that we are at the end of the buffer. Unfortunately ber_scanf is broken in the sense that it doesn't actually really consider sequence endings (due probably to the fact they are just representation and do not reflect in the underlieing DER encoding.) changeset: 550:e974fb2726a4 user: Simo Sorce <ssorce@redhat.com> date: Wed Dec 19 18:35:07 2007 -0500 files: ipa-server/ipa-slapi-plugins/ipa-pwd-extop/ipa_pwd_extop.c ipa-server/ipa-slapi-plugins/ipa-pwd-extop/test-get-keytab.c description: First shot at the new method
* Convert replication to use the new cert infrastructure andKarl MacMillan2007-12-201-1/+1
| | | | | | correctly issue certs from the same authority. Also remove support for read-only replicas since that work will not be finished and tested for 1.0.
* Refactor keytab creationMark McLoughlin2007-12-181-72/+9
| | | | | | | | | There's a few places where we spawn of kadmin to add/modify principals and create keytabs. Refactor all that code into installutils. Signed-off-by: Mark McLoughlin <markmc@redhat.com>
* Fix error caused by creation steps patch mergeMark McLoughlin2007-12-171-1/+0
| | | | | | | Merging the "host keytab" and "creation steps" patchs left a stray old-style call to Service.step() Signed-off-by: Mark McLoughlin <markmc@redhat.com>
* Add host keytab creation for mastersSimo Sorce2007-12-131-0/+31
|
* Refactor krbinstance and dsinstance creation stepsMark McLoughlin2007-12-131-48/+38
| | | | | | | | | | | | | | | | | | | | Creation steps are currently done with: self.start_creation(2, "Create foo") self.step("do foo") self.foo() self.step("do bar") self.bar() self.done_creation() This patch refactors that into the much more straightforward: self.step("do foo", self.foo) self.step("do bar", self.bar) self.start_creation("Create foo") Signed-off-by: Mark McLoughlin <markmc@redhat.com>
* Refactor dsinstance ldap modify codeMark McLoughlin2007-12-131-30/+20
| | | | | | | | | | | | | | Just a patch to refactor lots of similar code in dsinstance and krbinstance using a simple helper method. Note, there are some differences: - Some code used to call ldapmodify without -h 127.0.0.1 - Some of the code used to just print an error rather than using logging.critical() - Some code used to log some extra debug Signed-off-by: Mark McLoughlin <markmc@redhat.com>
* Only update key/value files if necessaryMark McLoughlin2007-12-131-0/+8
| | | | | | | | | | | | | update_key_val_in_file() shouldn't try and write to a file if the key is already set to the given value in the file Rationale here is that if we write these files out while building a system image, ipa-server-install shouldn't need to re-write them and, therefore, they don't need to be writable. Signed-off-by: Mark McLoughlin <markmc@redhat.com>
* from ipa.ipautil import * --> from ipa import ipautilSimo Sorce2007-12-121-24/+24
|
* - Better access control, make sure not even admins can read out passwordsSimo Sorce2007-12-111-4/+4
| | | | | - Insure admins can't locked out by mistake by inclusion in disabled groups - Fix also minor error in krbinstance.py
* Make sure we don't keep around old keys.Simo Sorce2007-12-111-0/+5
| | | | | Fixes problem changing passwords seen only on servers where re-installations where performed (and old secrets piled up)
* minor typosSimo Sorce2007-11-301-2/+2
|
* Compatibility changes to work on RHEL 5 with python 2.4rcritten@redhat.com2007-11-301-5/+5
|
* Add xml-rpc interface for getting keytabs.Karl MacMillan2007-11-211-0/+2
| | | | Warning: this lacks any sort of authorization.
* Generate master password from Simo.Karl MacMillan2007-11-211-12/+1
|
* Initial replication setup.Karl MacMillan2007-11-211-53/+146
| | | | | | | | | | | | | | | | | | | This add replication setup through two new commands: ipa-replica-prepare and ipa-replica-install. The procedure is to run ipa-replica-prepare on an existing master. This will collect information about the realm and the current master and create a file storing all of the information. After copying that file to the new replica, ipa-replica-install is run (with -r to create a read-only replica). This version of the patch also includes fixes for the sasl mappings on the replicas. Remaining features: - ssl for replication. - automatic configuration of mesh topology for master (or a simpler way to replicate multiple masters. - tool for view / configuring current replication.
* Remove default SASL mappings if any to avoid conflicts with IPA SASL mappingsSimo Sorce2007-11-191-0/+19
|
* - Store Master Key in Ldap (Makes it easier to set up replicas)Simo Sorce2007-11-161-4/+31
| | | | | | | | | | | | | | - Does not require dirsrv access to stash file - Finalize password history support - Fix strict password length default in pwd_extop (fix install sctript too) - fix plugin configuration - Introduce 3 kind of password change: normal, admin, and ds manager - normal require adherence to policies - admin does not but password is immediately expired - ds manager can just change the password any way he likes. Initial code to read the Kerberos Master Key from the Directory
* Introduce service base class and clean up ipa-server-installKarl MacMillan2007-11-051-51/+29
| | | | | | | | | | | | 1) Add a base class for all of the instance objects. 2) Normalize usage of logging. 3) General cleanups of ipa-server-install. 4) Make better use of httpinstance. 5) Add webguiinstance. 6) Improve progress reporting during installation. Works Here (TM), but it would be nice to get someone else to test since this moves code around a bit.
* Fix ticket #70Simo Sorce2007-11-011-3/+3
|
* Create configuration for MIT Windows kerberos client and install intoRob Crittenden2007-10-291-0/+16
| | | | | http://hostname/config so users can point their MIT client at the IPA server and automatically fetch the configuration.
* Don't print error on fresh installSimo Sorce2007-10-121-3/+5
|
* Karl MacMillan wrote:Karl MacMillan2007-10-091-2/+2
| | | | | | | | | | | | | > > This largish patch makes the build and installation work on 64bit > > machines. The only catch here is that to get a 64bit build you need to > > set LIBDIR on make: > > > > make install LIBDIR=/usr/lib64 > > > > The spec file does this correctly. I couldn't find any reliable way to > > guess this that works both on real systems and in the almost entirely > > empty rpm build root (you can't, for example, check for the existence > > of /usr/lib64).
* On 10/4/07, Rob Crittenden <rcritten@redhat.com> wrote:Karl MacMillan2007-10-081-6/+17
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | > William Jon McCann wrote: > > Hi, > > > > After playing with the install (repeatedly) I ended up with a lot of > > duplicate values in: > > /etc/sysconfig/dirsrv > > /etc/sysconfig/ipa-kpasswd > > > > Here is a patch that should fix this. It modifies the file "in-place" > > and removes lines that matching the key (or commented key) and then > > appends the new key=value. > > > > Jon > > Cool, I've wanted to fix this for a while (and recently aborted a switch > from open with "a" to "w"). > > What happens if the file doesn't exist yet? Do we need to wrap the > fileinput loop in either a try/except or just look to see if the file > exists first (my vote)? > > Something like: > > def update_key_val_in_file(filename, key, val): > if os.path.exists(filename): > pattern = "^[\s#]*%s\s*=" % re.escape(key) > p = re.compile(pattern) > for line in fileinput.input(filename, inplace=1): > if not p.search(line): > sys.stdout.write(line) > fileinput.close() > f = open(filename, "a") > f.write("%s=%s\n" % (key, val)) > f.close() Good point. In genera,l I prefer doing a try because it is a little less racy but in this case it doesn't make a difference. Updated patch attached. Thanks, Jon
* Try to catch more error conditions during installationrcritten@redhat.com2007-10-031-7/+37
| | | | | | Modify the way we detect SELinux to use selinuxenabled instead of using a try/except. Handle SASL/GSSAPI authentication failures when getting a connection
* Initial support for confiuguring a DNS Server during installation.Simo Sorce2007-09-201-9/+3
| | | | It's not perfect yet but good enough to include it.
* Overwrite ldappwd file to fix bug when reinstalling IPA.Karl MacMillan2007-09-111-1/+1
|
* Fix dsinstance.py and krbinstance.py importsKevin McCarthy2007-09-061-1/+1
|
* Add password request for admin userSimo Sorce2007-08-311-2/+27
| | | | | | | | | Set password for admin user using the Directory Mangaer account and the mozldapldappaswd binary to get and SSL connection Fix some timeout problems with deploying keytabs Fix ipa_pwd_extop to actuallt correctly detect an SSL connection Do not ask for the user to use for the directory unless 'dirsrv' is an existing user which may clash, create it silently
* Fix copy&paste error, its not the conf files we need access to,Simo Sorce2007-08-301-2/+2
| | | | we need to access the generated keytabs
* General fixes.Simo Sorce2007-08-151-2/+1
| | | | Do not start ipa_kpasswd by default yet
* in F7 all directory names have changed from fedora-ds to dirsrvSimo Sorce2007-08-151-7/+7
| | | | which should also be the name used in DS 8.0, change all occurences
* Use relative .so names for plugin so that lib/lib64 does not get in the waySimo Sorce2007-08-151-1/+1
| | | | change the pwd-extop conf ldif to a more sensible name
* Activate the passwd extop plugin and ipa-kpasswd daemonSimo Sorce2007-08-151-5/+10
|
* export kpasswd keytab during installation processSimo Sorce2007-08-091-0/+10
|
* typoSimo Sorce2007-08-091-1/+1
|
* merge in changes from upstreamSimo Sorce2007-08-091-0/+28
|\
| * Generate /etc/httpd/conf.d/ipa.conf from a template so the realm canrcritten@redhat.com2007-08-061-0/+8
| | | | | | | | be set during installation
| * - Abstracted client class to work directly or over RPCrcritten@redhat.com2007-08-061-0/+18
| | | | | | | | | | | | | | | | | | | | | | - Add mod_auth_kerb and cyrus-sasl-gssapi to Requires - Remove references to admin server in ipa-server-setupssl - Generate a client certificate for the XML-RPC server to connect to LDAP with - Create a keytab for Apache - Create an ldif with a test user - Provide a certmap.conf for doing SSL client authentication - Update tools to use kerberos - Add User class
* | set preauth on kadmin/changepw otherwise the kpasswd can't acquire a ticketSimo Sorce2007-08-081-0/+8
| |
* | Try to fix dir layout and recover missing filesSimo Sorce2007-08-011-16/+10
| |
* | Merge from upstreamSimo Sorce2007-08-011-2/+8
|/
* More reorgnization.Karl MacMillan2007-07-271-0/+177