Imported Upstream version 4.6.2
This commit is contained in:
152
ipaserver/install/kra.py
Normal file
152
ipaserver/install/kra.py
Normal file
@@ -0,0 +1,152 @@
|
||||
#
|
||||
# Copyright (C) 2015 FreeIPA Contributors see COPYING for license
|
||||
#
|
||||
|
||||
"""
|
||||
KRA installer module
|
||||
"""
|
||||
|
||||
import os
|
||||
import shutil
|
||||
|
||||
from ipalib import api
|
||||
from ipalib.install.kinit import kinit_keytab
|
||||
from ipaplatform import services
|
||||
from ipaplatform.paths import paths
|
||||
from ipapython import certdb
|
||||
from ipapython import ipautil
|
||||
from ipapython.install.core import group
|
||||
from ipaserver.install import custodiainstance
|
||||
from ipaserver.install import cainstance
|
||||
from ipaserver.install import krainstance
|
||||
from ipaserver.install import dsinstance
|
||||
from ipaserver.install import service as _service
|
||||
|
||||
from . import dogtag
|
||||
|
||||
|
||||
def install_check(api, replica_config, options):
|
||||
if replica_config is not None and not replica_config.setup_kra:
|
||||
return
|
||||
|
||||
kra = krainstance.KRAInstance(api.env.realm)
|
||||
if kra.is_installed():
|
||||
raise RuntimeError("KRA is already installed.")
|
||||
|
||||
if not options.setup_ca:
|
||||
if cainstance.is_ca_installed_locally():
|
||||
if api.env.dogtag_version >= 10:
|
||||
# correct dogtag version of CA installed
|
||||
pass
|
||||
else:
|
||||
raise RuntimeError(
|
||||
"Dogtag must be version 10.2 or above to install KRA")
|
||||
else:
|
||||
raise RuntimeError(
|
||||
"Dogtag CA is not installed. Please install the CA first")
|
||||
|
||||
if replica_config is not None:
|
||||
if not api.Command.kra_is_enabled()['result']:
|
||||
raise RuntimeError(
|
||||
"KRA is not installed on the master system. Please use "
|
||||
"'ipa-kra-install' command to install the first instance.")
|
||||
|
||||
if options.promote:
|
||||
return
|
||||
|
||||
with certdb.NSSDatabase() as tmpdb:
|
||||
tmpdb.create_db()
|
||||
tmpdb.import_pkcs12(replica_config.dir + "/cacert.p12",
|
||||
replica_config.dirman_password)
|
||||
kra_cert_nicknames = [
|
||||
"storageCert cert-pki-kra", "transportCert cert-pki-kra",
|
||||
"auditSigningCert cert-pki-kra"
|
||||
]
|
||||
if not all(tmpdb.has_nickname(nickname)
|
||||
for nickname in kra_cert_nicknames):
|
||||
raise RuntimeError("Missing KRA certificates, please create a "
|
||||
"new replica file.")
|
||||
|
||||
|
||||
def install(api, replica_config, options):
|
||||
if replica_config is None:
|
||||
if not options.setup_kra:
|
||||
return
|
||||
realm_name = api.env.realm
|
||||
dm_password = options.dm_password
|
||||
host_name = api.env.host
|
||||
subject_base = dsinstance.DsInstance().find_subject_base()
|
||||
|
||||
pkcs12_info = None
|
||||
master_host = None
|
||||
promote = False
|
||||
else:
|
||||
if not replica_config.setup_kra:
|
||||
return
|
||||
krafile = os.path.join(replica_config.dir, 'kracert.p12')
|
||||
if options.promote:
|
||||
with ipautil.private_ccache():
|
||||
ccache = os.environ['KRB5CCNAME']
|
||||
kinit_keytab(
|
||||
'host/{env.host}@{env.realm}'.format(env=api.env),
|
||||
paths.KRB5_KEYTAB,
|
||||
ccache)
|
||||
custodia = custodiainstance.CustodiaInstance(
|
||||
replica_config.host_name,
|
||||
replica_config.realm_name)
|
||||
custodia.get_kra_keys(
|
||||
replica_config.kra_host_name,
|
||||
krafile,
|
||||
replica_config.dirman_password)
|
||||
else:
|
||||
cafile = os.path.join(replica_config.dir, 'cacert.p12')
|
||||
if not os.path.isfile(cafile):
|
||||
raise RuntimeError(
|
||||
"Unable to clone KRA."
|
||||
" cacert.p12 file not found in replica file")
|
||||
shutil.copy(cafile, krafile)
|
||||
|
||||
realm_name = replica_config.realm_name
|
||||
dm_password = replica_config.dirman_password
|
||||
host_name = replica_config.host_name
|
||||
subject_base = replica_config.subject_base
|
||||
|
||||
pkcs12_info = (krafile,)
|
||||
master_host = replica_config.kra_host_name
|
||||
promote = options.promote
|
||||
|
||||
kra = krainstance.KRAInstance(realm_name)
|
||||
kra.configure_instance(realm_name, host_name, dm_password, dm_password,
|
||||
subject_base=subject_base,
|
||||
pkcs12_info=pkcs12_info,
|
||||
master_host=master_host,
|
||||
promote=promote)
|
||||
|
||||
_service.print_msg("Restarting the directory server")
|
||||
ds = dsinstance.DsInstance()
|
||||
ds.restart()
|
||||
kra.enable_client_auth_to_db(paths.KRA_CS_CFG_PATH)
|
||||
|
||||
# Restart apache for new proxy config file
|
||||
services.knownservices.httpd.restart(capture_output=True)
|
||||
|
||||
|
||||
def uninstall():
|
||||
kra = krainstance.KRAInstance(api.env.realm)
|
||||
kra.stop_tracking_certificates()
|
||||
if kra.is_installed():
|
||||
kra.uninstall()
|
||||
|
||||
|
||||
@group
|
||||
class KRAInstallInterface(dogtag.DogtagInstallInterface):
|
||||
"""
|
||||
Interface of the KRA installer
|
||||
|
||||
Knobs defined here will be available in:
|
||||
* ipa-server-install
|
||||
* ipa-replica-prepare
|
||||
* ipa-replica-install
|
||||
* ipa-kra-install
|
||||
"""
|
||||
description = "KRA"
|
||||
Reference in New Issue
Block a user