From fab033b94973e1270a27be9d271d729d313e6ce0 Mon Sep 17 00:00:00 2001 From: Martin Kosek Date: Tue, 28 Feb 2012 09:13:13 +0100 Subject: Improve FQDN handling in DNS and host plugins DNS and host plugin does not work well with domain names ending with dot. host plugin creates a record with two fqdn attributes when such hostname is created which then has to be manually fixed. DNS plugin handled zones with and without trailing dot as two distinct zones, which may lead to issues when both zones are created. This patch sanitizes approach to FQDNs in both DNS and host plugin. Hostnames are now always normalized to the form without trailing dot as this form did not work before and it would keep hostname form consistent without changes in our server/client enrollment process. As DNS zones always worked in both forms this patch rather makes sure that the plugin works with both forms of one zone and prevents creating 2 identical zones with just different format. https://fedorahosted.org/freeipa/ticket/2420 --- ipalib/plugins/dns.py | 31 +++++++++++++++++++++++-------- 1 file changed, 23 insertions(+), 8 deletions(-) (limited to 'ipalib/plugins/dns.py') diff --git a/ipalib/plugins/dns.py b/ipalib/plugins/dns.py index 44fced64..2b054c67 100644 --- a/ipalib/plugins/dns.py +++ b/ipalib/plugins/dns.py @@ -401,13 +401,9 @@ def get_reverse_zone(ipaddr, prefixlen=None): return revzone, revname def add_records_for_host_validation(option_name, host, domain, ip_addresses, check_forward=True, check_reverse=True): - result = api.Command['dnszone_find']()['result'] - match = False - for zone in result: - if domain == zone['idnsname'][0]: - match = True - break - if not match: + try: + api.Command['dnszone_show'](domain)['result'] + except errors.NotFound: raise errors.NotFound( reason=_('DNS zone %(zone)s not found') % dict(zone=domain) ) @@ -1578,6 +1574,25 @@ class dnszone(LDAPObject): ), ) + def get_dn(self, *keys, **options): + zone = keys[-1] + dn = super(dnszone, self).get_dn(zone, **options) + try: + self.backend.get_entry(dn, ['']) + except errors.NotFound: + if zone.endswith(u'.'): + zone = zone[:-1] + else: + zone = zone + u'.' + test_dn = super(dnszone, self).get_dn(zone, **options) + + try: + (dn, entry_attrs) = self.backend.get_entry(test_dn, ['']) + except errors.NotFound: + pass + + return dn + api.register(dnszone) @@ -1601,7 +1616,7 @@ class dnszone_add(LDAPCreate): self.obj.params['name_from_ip'](unicode(options['name_from_ip'])) return super(dnszone_add, self).args_options_2_params(*args, **options) - def pre_callback(self, ldap, dn, entry_attrs, *keys, **options): + def pre_callback(self, ldap, dn, entry_attrs, attrs_list, *keys, **options): if not dns_container_exists(self.api.Backend.ldap2): raise errors.NotFound(reason=_('DNS is not configured')) -- cgit