Skip to content
Snippets Groups Projects
Commit 2c2ae77b authored by Thomas Woerner's avatar Thomas Woerner
Browse files

library/ipaapi.py: Compatibilty to ipa 4.4 and later, new version check

parent 0b4aec7b
No related branches found
No related tags found
No related merge requests found
...@@ -66,17 +66,57 @@ ca_enabled: ...@@ -66,17 +66,57 @@ ca_enabled:
''' '''
import os import os
import sys
import time import time
import gssapi import gssapi
import tempfile
import inspect
from ansible.module_utils.basic import AnsibleModule from ansible.module_utils.basic import AnsibleModule
from ipapython.version import NUM_VERSION, VERSION
if NUM_VERSION < 40400:
raise Exception, "freeipa version '%s' is too old" % VERSION
from ipaplatform.paths import paths
if NUM_VERSION >= 40500 and NUM_VERSION < 40590:
from cryptography.hazmat.primitives import serialization
from ipalib import api, errors, x509 from ipalib import api, errors, x509
try:
from ipalib.install import sysrestore from ipalib.install import sysrestore
except ImportError:
from ipapython import sysrestore
from ipalib.rpc import delete_persistent_client_session_data from ipalib.rpc import delete_persistent_client_session_data
from ipaplatform.paths import paths
from ipapython import certdb from ipapython import certdb
from ipapython.ipautil import CalledProcessError from ipapython.ipautil import CalledProcessError, write_tmp_file, \
from ipaclient.install.client import SECURE_PATH, CCACHE_FILE, disable_ra ipa_generate_password
ipa_client_install = None
try:
from ipaclient.install.client import SECURE_PATH, disable_ra
except ImportError:
# Create temporary copy of ipa-client-install script (as
# ipa_client_install.py) to be able to import the script easily and also
# to remove the global finally clause in which the generated ccache file
# gets removed. The ccache file will be needed in the next step.
# This is done in a temporary directory that gets removed right after
# ipa_client_install has been imported.
import shutil
temp_dir = tempfile.mkdtemp(dir="/tmp")
sys.path.append(temp_dir)
temp_file = "%s/ipa_client_install.py" % temp_dir
with open("/usr/sbin/ipa-client-install", "r") as f_in:
with open(temp_file, "w") as f_out:
for line in f_in:
if line.startswith("finally:"):
break
f_out.write(line)
import ipa_client_install
shutil.rmtree(temp_dir, ignore_errors=True)
sys.path.remove(temp_dir)
SECURE_PATH = ("/bin:/sbin:/usr/kerberos/bin:/usr/kerberos/sbin:/usr/bin:/usr/sbin")
disable_ra = ipa_client_install.disable_ra
def main(): def main():
module = AnsibleModule( module = AnsibleModule(
...@@ -99,7 +139,14 @@ def main(): ...@@ -99,7 +139,14 @@ def main():
fstore = sysrestore.FileStore(paths.IPA_CLIENT_SYSRESTORE) fstore = sysrestore.FileStore(paths.IPA_CLIENT_SYSRESTORE)
statestore = sysrestore.StateFile(paths.IPA_CLIENT_SYSRESTORE) statestore = sysrestore.StateFile(paths.IPA_CLIENT_SYSRESTORE)
host_principal = 'host/%s@%s' % (hostname, realm) host_principal = 'host/%s@%s' % (hostname, realm)
os.environ['KRB5CCNAME'] = CCACHE_FILE os.environ['KRB5CCNAME'] = paths.IPA_DNS_CCACHE
ca_certs = x509.load_certificate_list_from_file(paths.IPA_CA_CRT)
if NUM_VERSION >= 40500 and NUM_VERSION < 40590:
ca_certs = [ cert.public_bytes(serialization.Encoding.DER)
for cert in ca_certs ]
elif NUM_VERSION < 40500:
ca_certs = [ cert.der_data for cert in ca_certs ]
with certdb.NSSDatabase() as tmp_db: with certdb.NSSDatabase() as tmp_db:
api.bootstrap(context='cli_installer', api.bootstrap(context='cli_installer',
...@@ -107,6 +154,7 @@ def main(): ...@@ -107,6 +154,7 @@ def main():
debug=debug, debug=debug,
delegate=False, delegate=False,
nss_dir=tmp_db.secdir) nss_dir=tmp_db.secdir)
if 'config_loaded' not in api.env: if 'config_loaded' not in api.env:
module.fail_json(msg="Failed to initialize IPA API.") module.fail_json(msg="Failed to initialize IPA API.")
...@@ -117,15 +165,22 @@ def main(): ...@@ -117,15 +165,22 @@ def main():
pass pass
# Add CA certs to a temporary NSS database # Add CA certs to a temporary NSS database
ca_certs = x509.load_certificate_list_from_file(paths.IPA_CA_CRT) argspec = inspect.getargspec(tmp_db.create_db)
try: try:
if NUM_VERSION > 40400:
tmp_db.create_db() tmp_db.create_db()
for i, cert in enumerate(ca_certs): for i, cert in enumerate(ca_certs):
tmp_db.add_cert(cert, tmp_db.add_cert(cert,
'CA certificate %d' % (i + 1), 'CA certificate %d' % (i + 1),
certdb.EXTERNAL_CA_TRUST_FLAGS) certdb.EXTERNAL_CA_TRUST_FLAGS)
except CalledProcessError: else:
pwd_file = write_tmp_file(ipa_generate_password())
tmp_db.create_db(pwd_file.name)
for i, cert in enumerate(ca_certs):
tmp_db.add_cert(cert, 'CA certificate %d' % (i + 1), 'C,,')
except CalledProcessError as e:
module.fail_json(msg="Failed to add CA to temporary NSS database.") module.fail_json(msg="Failed to add CA to temporary NSS database.")
api.finalize() api.finalize()
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment