summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorAlexander Bokovoy <abokovoy@redhat.com>2019-03-31 10:39:05 +0300
committerChristian Heimes <cheimes@redhat.com>2019-04-01 13:27:41 +0200
commitde4a9875d410c68ae4f9602b70c753a11034b31b (patch)
tree45df13fcf9e6805c547020839f2db2fc7927389b
parent23ae171d97198de0c959201871eb81ad8b83405b (diff)
downloadfreeipa-de4a9875d410c68ae4f9602b70c753a11034b31b.tar.gz
freeipa-de4a9875d410c68ae4f9602b70c753a11034b31b.tar.xz
freeipa-de4a9875d410c68ae4f9602b70c753a11034b31b.zip
oddjob: allow to pass options to trust-fetch-domains
Refactor com.redhat.idm.trust-fetch.domains oddjob helper to allow passing administrative credentials and a domain controller to talk to. This approach allows to avoid rediscovering a domain controller in case a user actually specified the domain controller when establishing trust. It also allows to pass through admin credentials if user decides to do so. The latter will be used later to allow updating trust topology in a similar oddjob helper. Resolves: https://pagure.io/freeipa/issue/7895 Reviewed-By: Christian Heimes <cheimes@redhat.com>
-rw-r--r--API.txt4
-rw-r--r--VERSION.m44
-rw-r--r--install/oddjob/com.redhat.idm.trust-fetch-domains.in91
-rw-r--r--install/oddjob/etc/oddjobd.conf.d/oddjobd-ipa-trust.conf2
-rw-r--r--ipaserver/plugins/trust.py31
5 files changed, 83 insertions, 49 deletions
diff --git a/API.txt b/API.txt
index c7fb8f012..dd559d932 100644
--- a/API.txt
+++ b/API.txt
@@ -5770,10 +5770,12 @@ output: Output('result', type=[<type 'dict'>])
output: Output('summary', type=[<type 'unicode'>, <type 'NoneType'>])
output: ListOfPrimaryKeys('value')
command: trust_fetch_domains/1
-args: 1,5,4
+args: 1,7,4
arg: Str('cn', cli_name='realm')
option: Flag('all', autofill=True, cli_name='all', default=False)
option: Flag('raw', autofill=True, cli_name='raw', default=False)
+option: Str('realm_admin?', cli_name='admin')
+option: Password('realm_passwd?', cli_name='password', confirm=False)
option: Str('realm_server?', cli_name='server')
option: Flag('rights', autofill=True, default=False)
option: Str('version?')
diff --git a/VERSION.m4 b/VERSION.m4
index 7e3d6ddfa..7b4682a3a 100644
--- a/VERSION.m4
+++ b/VERSION.m4
@@ -83,8 +83,8 @@ define(IPA_DATA_VERSION, 20100614120000)
# #
########################################################
define(IPA_API_VERSION_MAJOR, 2)
-define(IPA_API_VERSION_MINOR, 230)
-# Last change: Added `automember-find-orphans' command
+define(IPA_API_VERSION_MINOR, 231)
+# Last change: Added admin creds to trust-fetch-domains
########################################################
diff --git a/install/oddjob/com.redhat.idm.trust-fetch-domains.in b/install/oddjob/com.redhat.idm.trust-fetch-domains.in
index 50830bdeb..fbb1ed978 100644
--- a/install/oddjob/com.redhat.idm.trust-fetch-domains.in
+++ b/install/oddjob/com.redhat.idm.trust-fetch-domains.in
@@ -14,11 +14,31 @@ import pwd
import six
import gssapi
-from ipalib.install.kinit import kinit_keytab
+from ipalib.install.kinit import kinit_keytab, kinit_password
if six.PY3:
unicode = str
+
+def parse_options():
+ usage = "%prog <trusted domain name>\n"
+ parser = config.IPAOptionParser(usage=usage,
+ formatter=config.IPAFormatter())
+
+ parser.add_option("-d", "--debug", action="store_true", dest="debug",
+ help="Display debugging information")
+ parser.add_option("-s", "--server", action="store", dest="server",
+ help="Domain controller for the Active Directory domain (optional)")
+ parser.add_option("-a", "--admin", action="store", dest="admin",
+ help="Active Directory administrator (optional)")
+ parser.add_option("-p", "--password", action="store", dest="password",
+ help="Display debugging information")
+
+ options, args = parser.parse_args()
+ safe_options = parser.get_safe_opts(options)
+
+ return safe_options, options, args
+
def retrieve_keytab(api, ccache_name, oneway_keytab_name, oneway_principal):
getkeytab_args = ["/usr/sbin/ipa-getkeytab",
"-s", api.env.host,
@@ -40,7 +60,7 @@ def retrieve_keytab(api, ccache_name, oneway_keytab_name, oneway_principal):
pass
-def get_forest_root_domain(api_instance, trusted_domain):
+def get_forest_root_domain(api_instance, trusted_domain, server=None):
"""
retrieve trusted forest root domain for given domain name
@@ -53,25 +73,11 @@ def get_forest_root_domain(api_instance, trusted_domain):
flatname = trustconfig_show()['result']['ipantflatname'][0]
remote_domain = dcerpc.retrieve_remote_domain(
- api_instance.env.host, flatname, trusted_domain)
+ api_instance.env.host, flatname, trusted_domain,
+ realm_server=server)
return remote_domain.info['dns_forest']
-
-def parse_options():
- usage = "%prog <trusted domain name>\n"
- parser = config.IPAOptionParser(usage=usage,
- formatter=config.IPAFormatter())
-
- parser.add_option("-d", "--debug", action="store_true", dest="debug",
- help="Display debugging information")
-
- options, args = parser.parse_args()
- safe_options = parser.get_safe_opts(options)
-
- return safe_options, options, args
-
-
if not is_ipa_configured():
# LSB status code 6: program is not configured
raise ScriptError("IPA is not configured " +
@@ -153,32 +159,37 @@ trusted_domain = trusted_domain_entry.single_value.get('cn').lower()
# At this point if we didn't find trusted forest name, an exception will be raised
# and script will quit. This is actually intended.
-oneway_keytab_name = '/var/lib/sss/keytabs/' + trusted_domain + '.keytab'
-oneway_principal = str('%s$@%s' % (own_trust_flatname, trusted_domain.upper()))
+if not (options.admin and options.password):
+ oneway_keytab_name = '/var/lib/sss/keytabs/' + trusted_domain + '.keytab'
+ oneway_principal = str('%s$@%s' % (own_trust_flatname, trusted_domain.upper()))
-# If keytab does not exist, retrieve it
-if not os.path.isfile(oneway_keytab_name):
- retrieve_keytab(api, ccache_name, oneway_keytab_name, oneway_principal)
+ # If keytab does not exist, retrieve it
+ if not os.path.isfile(oneway_keytab_name):
+ retrieve_keytab(api, ccache_name, oneway_keytab_name, oneway_principal)
-try:
- have_ccache = False
try:
- # The keytab may have stale key material (from older trust-add run)
- cred = kinit_keytab(oneway_principal, oneway_keytab_name, oneway_ccache_name)
- if cred.lifetime > 0:
- have_ccache = True
- except gssapi.exceptions.ExpiredCredentialsError:
- pass
- if not have_ccache:
+ have_ccache = False
+ try:
+ # The keytab may have stale key material (from older trust-add run)
+ cred = kinit_keytab(oneway_principal, oneway_keytab_name, oneway_ccache_name)
+ if cred.lifetime > 0:
+ have_ccache = True
+ except gssapi.exceptions.ExpiredCredentialsError:
+ pass
+ if not have_ccache:
+ if os.path.exists(oneway_ccache_name):
+ os.unlink(oneway_ccache_name)
+ kinit_keytab(oneway_principal, oneway_keytab_name, oneway_ccache_name)
+ except gssapi.exceptions.GSSError:
+ # If there was failure on using keytab, assume it is stale and retrieve again
+ retrieve_keytab(api, ccache_name, oneway_keytab_name, oneway_principal)
if os.path.exists(oneway_ccache_name):
os.unlink(oneway_ccache_name)
kinit_keytab(oneway_principal, oneway_keytab_name, oneway_ccache_name)
-except gssapi.exceptions.GSSError:
- # If there was failure on using keytab, assume it is stale and retrieve again
- retrieve_keytab(api, ccache_name, oneway_keytab_name, oneway_principal)
- if os.path.exists(oneway_ccache_name):
- os.unlink(oneway_ccache_name)
- kinit_keytab(oneway_principal, oneway_keytab_name, oneway_ccache_name)
+else:
+ cred = kinit_password(options.admin, options.password,
+ oneway_ccache_name,
+ canonicalize=True, enterprise=True)
# We are done: we have ccache with TDO credentials and can fetch domains
ipa_domain = api.env.domain
@@ -186,9 +197,9 @@ os.environ['KRB5CCNAME'] = oneway_ccache_name
# retrieve the forest root domain name and contact it to retrieve trust
# topology info
-forest_root = get_forest_root_domain(api, trusted_domain)
+forest_root = get_forest_root_domain(api, trusted_domain, server=options.server)
-domains = dcerpc.fetch_domains(api, ipa_domain, forest_root, creds=True)
+domains = dcerpc.fetch_domains(api, ipa_domain, forest_root, creds=True, server=options.server)
trust_domain_object = api.Command.trust_show(trusted_domain, raw=True)['result']
trust.add_new_domains_from_trust(api, None, trust_domain_object, domains)
diff --git a/install/oddjob/etc/oddjobd.conf.d/oddjobd-ipa-trust.conf b/install/oddjob/etc/oddjobd.conf.d/oddjobd-ipa-trust.conf
index 630a4e6cd..9f3f168a5 100644
--- a/install/oddjob/etc/oddjobd.conf.d/oddjobd-ipa-trust.conf
+++ b/install/oddjob/etc/oddjobd.conf.d/oddjobd-ipa-trust.conf
@@ -11,7 +11,7 @@
<interface name="com.redhat.idm.trust">
<method name="fetch_domains">
<helper exec="/usr/libexec/ipa/oddjob/com.redhat.idm.trust-fetch-domains"
- arguments="1"
+ arguments="30"
argument_passing_method="cmdline"
prepend_user_name="no"/>
</method>
diff --git a/ipaserver/plugins/trust.py b/ipaserver/plugins/trust.py
index 5084b2246..8eb9a3442 100644
--- a/ipaserver/plugins/trust.py
+++ b/ipaserver/plugins/trust.py
@@ -418,9 +418,19 @@ def add_range(myapi, trustinstance, range_name, dom_sid, *keys, **options):
return range_type, range_size, base_id
-def fetch_trusted_domains_over_dbus(myapi, forest_name):
+def fetch_trusted_domains_over_dbus(myapi, *keys, **options):
if not _bindings_installed:
return
+
+ forest_name = keys[0]
+ method_options = []
+ if 'realm_server' in options:
+ method_options.extend(['--server', options['realm_server']])
+ if 'realm_admin' in options:
+ method_options.extend(['--admin', options['realm_admin']])
+ if 'realm_passwd' in options:
+ method_options.extend(['--password', options['realm_passwd']])
+
# Calling oddjobd-activated service via DBus has some quirks:
# - Oddjobd registers multiple canonical names on the same address
# - python-dbus only follows name owner changes when mainloop is in use
@@ -436,7 +446,8 @@ def fetch_trusted_domains_over_dbus(myapi, forest_name):
fetch_domains_method = intf.get_dbus_method(
'fetch_domains',
dbus_interface=DBUS_IFACE_TRUST)
- (_ret, _stdout, _stderr) = fetch_domains_method(forest_name)
+ (_ret, _stdout, _stderr) = fetch_domains_method(
+ [forest_name] + method_options)
except dbus.DBusException as e:
logger.error('Failed to call %s.fetch_domains helper.'
'DBus exception is %s.', DBUS_IFACE_TRUST, str(e))
@@ -1760,10 +1771,20 @@ class trust_fetch_domains(LDAPRetrieve):
has_output = output.standard_list_of_entries
takes_options = LDAPRetrieve.takes_options + (
+ Str('realm_admin?',
+ cli_name='admin',
+ label=_("Active Directory domain administrator"),
+ ),
+ Password('realm_passwd?',
+ cli_name='password',
+ label=_("Active Directory domain administrator's password"),
+ confirm=False,
+ ),
Str('realm_server?',
cli_name='server',
- label=_('Domain controller for the Active Directory domain (optional)'),
- ),
+ label=_('Domain controller for the Active Directory domain '
+ '(optional)'),
+ ),
)
def execute(self, *keys, **options):
@@ -1784,7 +1805,7 @@ class trust_fetch_domains(LDAPRetrieve):
# With privilege separation we also cannot authenticate as
# HTTP/ principal because we have no access to its key material.
# Thus, we'll use DBus call out to oddjobd helper in all cases
- fetch_trusted_domains_over_dbus(self.api, keys[0])
+ fetch_trusted_domains_over_dbus(self.api, *keys, **options)
result['summary'] = unicode(_('List of trust domains successfully '
'refreshed. Use trustdomain-find '
'command to list them.'))