summaryrefslogtreecommitdiffstats
path: root/install/restart_scripts/renew_ra_cert
blob: 1f359062b49eed400aaa7b6aeea4742253707b00 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
#!/usr/bin/python -E
#
# Authors:
#   Rob Crittenden <rcritten@redhat.com>
#
# Copyright (C) 2012  Red Hat
# see file 'COPYING' for use and warranty information
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program.  If not, see <http://www.gnu.org/licenses/>.

import sys
import shutil
import tempfile
import syslog
import time
from ipapython import services as ipaservices
from ipapython.certmonger import get_pin
from ipapython import ipautil
from ipaserver.install import certs
from ipaserver.install.cainstance import DEFAULT_DSPORT
from ipalib import api
from ipapython.dn import DN
from ipalib import x509
from ipalib import errors
from ipaserver.plugins.ldap2 import ldap2
import ldap as _ldap

api.bootstrap(context='restart')
api.finalize()

# Fetch the new certificate
db = certs.CertDB(api.env.realm)
cert = db.get_cert_from_db('ipaCert', pem=False)
serial_number = x509.get_serial_number(cert, datatype=x509.DER)
subject = x509.get_subject(cert, datatype=x509.DER)
issuer = x509.get_issuer(cert, datatype=x509.DER)

# Load it into dogtag
dn = DN(('uid','ipara'),('ou','People'),('o','ipaca'))

try:
    dm_password = get_pin('internaldb')
except IOError, e:
    syslog.syslog(syslog.LOG_ERR, 'Unable to determine PIN for CA instance: %s' % e)
    sys.exit(1)

attempts = 0
dogtag_uri='ldap://localhost:%d' % DEFAULT_DSPORT
updated = False

while attempts < 10:
    conn = None
    try:
        conn = ldap2(shared_instance=False, ldap_uri=dogtag_uri)
        conn.connect(bind_dn=DN(('cn', 'directory manager')), bind_pw=dm_password)
        (entry_dn, entry_attrs) = conn.get_entry(dn, ['usercertificate'], normalize=False)
        entry_attrs['usercertificate'].append(cert)
        entry_attrs['description'] = '2;%d;%s;%s' % (serial_number, issuer, subject)
        conn.update_entry(dn, entry_attrs, normalize=False)
        updated = True
        break
    except errors.NetworkError:
        syslog.syslog(syslog.LOG_ERR, 'Connection to %s failed, sleeping 30s' % dogtag_uri)
        time.sleep(30)
        attempts += 1
    except errors.EmptyModlist:
        updated = True
        break
    except Exception, e:
        syslog.syslog(syslog.LOG_ERR, 'Updating agent entry failed: %s' % e)
        break
    finally:
        if conn.isconnected():
            conn.disconnect()

if not updated:
    syslog.syslog(syslog.LOG_ERR, '%s: Giving up. This script may be safely re-executed.' % sys.argv[0])
    sys.exit(1)

attempts = 0
updated = False

# Store it in the IPA LDAP server
while attempts < 10:
    conn = None
    tmpdir = None
    try:
        tmpdir = tempfile.mkdtemp(prefix="tmp-")
        dn = DN(('cn','ipaCert'), ('cn', 'ca_renewal'), ('cn', 'ipa'), ('cn', 'etc'), api.env.basedn)
        principal = str('host/%s@%s' % (api.env.host, api.env.realm))
        ccache = ipautil.kinit_hostprincipal('/etc/krb5.keytab', tmpdir, principal)
        conn = ldap2(shared_instance=False, ldap_uri=api.env.ldap_uri)
        conn.connect(ccache=ccache)
        try:
            (entry_dn, entry_attrs) = conn.get_entry(dn, ['usercertificate'])
            entry_attrs['usercertificate'] = cert
            conn.update_entry(dn, entry_attrs, normalize=False)
        except errors.NotFound:
            entry_attrs = dict(objectclass=['top', 'pkiuser', 'nscontainer'],
                                            usercertificate=cert)
            conn.add_entry(dn, entry_attrs, normalize=False)
        except errors.EmptyModlist:
            pass
        updated = True
        break
    except Exception, e:
        syslog.syslog(syslog.LOG_ERR, 'Updating renewal certificate failed: %s. Sleeping 30s' % e)
        time.sleep(30)
        attempts += 1
    finally:
        if conn is not None and conn.isconnected():
            conn.disconnect()
        if tmpdir is not None:
            shutil.rmtree(tmpdir)

if not updated:
    syslog.syslog(syslog.LOG_ERR, '%s: Giving up. This script may be safely re-executed.' % sys.argv[0])
    sys.exit(1)

# Now restart Apache so the new certificate is available
try:
    ipaservices.knownservices.httpd.restart()
except Exception, e:
    syslog.syslog(syslog.LOG_ERR, "Cannot restart httpd: %s" % str(e))