Hot-keys on this page

r m x p   toggle line displays

j k   next/prev highlighted chunk

0   (zero) top of page

1   (one) first highlighted chunk

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

18

19

20

21

22

23

24

25

26

27

28

29

30

31

32

33

34

35

36

37

38

39

40

41

42

43

44

45

46

47

48

49

50

51

52

53

54

55

56

57

58

59

60

61

62

63

64

65

66

67

68

69

70

71

72

73

74

75

76

77

78

79

80

81

82

83

84

85

86

87

88

89

90

91

92

93

94

95

96

97

98

99

100

101

102

103

104

105

106

107

108

109

110

111

112

113

114

115

116

117

118

119

120

121

122

123

124

125

126

127

128

129

130

131

132

133

134

135

136

137

138

139

140

141

142

143

144

145

146

147

148

149

150

151

152

153

154

155

156

157

158

159

160

161

162

163

164

165

166

167

168

169

170

171

172

173

174

175

176

177

178

179

180

181

182

183

184

185

186

187

188

189

190

191

192

193

194

195

196

197

198

199

200

201

202

203

204

205

206

207

208

209

210

211

212

213

214

215

216

217

218

219

220

221

222

223

224

225

226

227

228

229

230

# Authors: Simo Sorce <ssorce@redhat.com> 

#          Alexander Bokovoy <abokovoy@redhat.com> 

# 

# Copyright (C) 2007-2011   Red Hat 

# see file 'COPYING' for use and warranty information 

# 

# This program is free software; you can redistribute it and/or modify 

# it under the terms of the GNU General Public License as published by 

# the Free Software Foundation, either version 3 of the License, or 

# (at your option) any later version. 

# 

# This program is distributed in the hope that it will be useful, 

# but WITHOUT ANY WARRANTY; without even the implied warranty of 

# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.    See the 

# GNU General Public License for more details. 

# 

# You should have received a copy of the GNU General Public License 

# along with this program.  If not, see <http://www.gnu.org/licenses/>. 

# 

 

import tempfile 

import re 

import os 

import stat 

import sys 

import socket 

import stat 

 

from ipapython import ipautil 

from ipapython.platform import base 

from ipalib import api 

 

# All what we allow exporting directly from this module 

# Everything else is made available through these symbols when they are 

# directly imported into ipapython.services: 

# 

# authconfig -- class reference for platform-specific implementation of 

#               authconfig(8) 

# service    -- class reference for platform-specific implementation of a 

#               PlatformService class 

# knownservices -- factory instance to access named services IPA cares about, 

#                  names are ipapython.services.wellknownservices 

# backup_and_replace_hostname -- platform-specific way to set hostname and 

#                                make it persistent over reboots 

# restore_context -- platform-sepcific way to restore security context, if 

#                    applicable 

# check_selinux_status -- platform-specific way to see if SELinux is enabled 

#                         and restorecon is installed. 

__all__ = ['authconfig', 'service', 'knownservices', 'backup_and_replace_hostname', 'restore_context', 'check_selinux_status'] 

 

class RedHatService(base.PlatformService): 

    def __wait_for_open_ports(self, instance_name=""): 

        """ 

        If this is a service we need to wait for do so. 

        """ 

        ports = None 

        if instance_name in base.wellknownports: 

            ports = base.wellknownports[instance_name] 

        else: 

            if self.service_name in base.wellknownports: 

                ports = base.wellknownports[self.service_name] 

        if ports: 

            ipautil.wait_for_open_ports('localhost', ports, api.env.startup_timeout) 

 

    def stop(self, instance_name="", capture_output=True): 

        ipautil.run(["/sbin/service", self.service_name, "stop", instance_name], capture_output=capture_output) 

 

    def start(self, instance_name="", capture_output=True, wait=True): 

        ipautil.run(["/sbin/service", self.service_name, "start", instance_name], capture_output=capture_output) 

        if wait and self.is_running(instance_name): 

            self.__wait_for_open_ports(instance_name) 

 

    def restart(self, instance_name="", capture_output=True, wait=True): 

        ipautil.run(["/sbin/service", self.service_name, "restart", instance_name], capture_output=capture_output) 

        if wait and self.is_running(instance_name): 

            self.__wait_for_open_ports(instance_name) 

 

    def is_running(self, instance_name=""): 

        ret = True 

        try: 

            (sout,serr,rcode) = ipautil.run(["/sbin/service", self.service_name, "status", instance_name]) 

            if sout.find("is stopped") >= 0: 

                ret = False 

        except ipautil.CalledProcessError: 

                ret = False 

        return ret 

 

    def is_installed(self): 

        installed = True 

        try: 

            ipautil.run(["/sbin/service", self.service_name, "status"]) 

        except ipautil.CalledProcessError, e: 

            if e.returncode == 1: 

                # service is not installed or there is other serious issue 

                installed = False 

        return installed 

 

    def is_enabled(self, instance_name=""): 

        (stdout, stderr, returncode) = ipautil.run(["/sbin/chkconfig", self.service_name],raiseonerr=False) 

        return (returncode == 0) 

 

    def enable(self, instance_name=""): 

        ipautil.run(["/sbin/chkconfig", self.service_name, "on"]) 

 

    def disable(self, instance_name=""): 

        ipautil.run(["/sbin/chkconfig", self.service_name, "off"]) 

 

    def install(self, instance_name=""): 

        ipautil.run(["/sbin/chkconfig", "--add", self.service_name]) 

 

    def remove(self, instance_name=""): 

        ipautil.run(["/sbin/chkconfig", "--del", self.service_name]) 

 

class RedHatSSHService(RedHatService): 

    def get_config_dir(self, instance_name=""): 

        return '/etc/ssh' 

 

class RedHatAuthConfig(base.AuthConfig): 

    """ 

    AuthConfig class implements system-independent interface to configure 

    system authentication resources. In Red Hat-produced systems this is done with 

    authconfig(8) utility. 

    """ 

    def __build_args(self): 

        args = [] 

        for (option, value) in self.parameters.items(): 

            if type(value) is bool: 

                if value: 

                    args.append("--enable%s" % (option)) 

                else: 

                    args.append("--disable%s" % (option)) 

            elif type(value) in (tuple, list): 

                args.append("--%s" % (option)) 

                args.append("%s" % (value[0])) 

            elif value is None: 

                args.append("--%s" % (option)) 

            else: 

                args.append("--%s%s" % (option,value)) 

        return args 

 

    def execute(self): 

        args = self.__build_args() 

        ipautil.run(["/usr/sbin/authconfig"]+args) 

 

def redhat_service(name): 

    if name == 'sshd': 

        return RedHatSSHService(name) 

    return RedHatService(name) 

 

class RedHatServices(base.KnownServices): 

    def __init__(self): 

        services = dict() 

        for s in base.wellknownservices: 

            services[s] = redhat_service(s) 

        # Call base class constructor. This will lock services to read-only 

        super(RedHatServices, self).__init__(services) 

 

authconfig = RedHatAuthConfig 

service = redhat_service 

knownservices = RedHatServices() 

 

def restore_context(filepath, restorecon='/sbin/restorecon'): 

    """ 

    restore security context on the file path 

    SELinux equivalent is /path/to/restorecon <filepath> 

 

    restorecon's return values are not reliable so we have to 

    ignore them (BZ #739604). 

 

    ipautil.run() will do the logging. 

    """ 

    try: 

        if (os.path.exists('/usr/sbin/selinuxenabled')): 

            ipautil.run(["/usr/sbin/selinuxenabled"]) 

        else: 

            # No selinuxenabled, no SELinux 

            return 

    except ipautil.CalledProcessError: 

        # selinuxenabled returns 1 if not enabled 

        return 

 

    if (os.path.exists(restorecon)): 

        ipautil.run([restorecon, filepath], raiseonerr=False) 

 

def backup_and_replace_hostname(fstore, statestore, hostname): 

    old_hostname = socket.gethostname() 

    try: 

        ipautil.run(['/bin/hostname', hostname]) 

    except ipautil.CalledProcessError, e: 

        print >>sys.stderr, "Failed to set this machine hostname to %s (%s)." % (hostname, str(e)) 

    replacevars = {'HOSTNAME':hostname} 

 

    filepath = '/etc/sysconfig/network' 

    if not os.path.exists(filepath): 

        # file doesn't exist; create it with correct ownership & mode 

        open(filepath, 'a').close() 

        os.chmod(filepath, 

            stat.S_IRUSR | stat.S_IWUSR | stat.S_IRGRP | stat.S_IROTH) 

        os.chown(filepath, 0, 0) 

    old_values = ipautil.backup_config_and_replace_variables( 

        fstore, filepath, replacevars=replacevars) 

    restore_context("/etc/sysconfig/network") 

 

    if 'HOSTNAME' in old_values: 

        statestore.backup_state('network', 'hostname', old_values['HOSTNAME']) 

    else: 

        statestore.backup_state('network', 'hostname', old_hostname) 

 

def check_selinux_status(restorecon='/sbin/restorecon'): 

    """ 

    We don't have a specific package requirement for policycoreutils 

    which provides restorecon. This is because we don't require 

    SELinux on client installs. However if SELinux is enabled then 

    this package is required. 

 

    This function returns nothing but may raise a Runtime exception 

    if SELinux is enabled but restorecon is not available. 

    """ 

    try: 

        if (os.path.exists('/usr/sbin/selinuxenabled')): 

            ipautil.run(["/usr/sbin/selinuxenabled"]) 

        else: 

            # No selinuxenabled, no SELinux 

            return 

    except ipautil.CalledProcessError: 

        # selinuxenabled returns 1 if not enabled 

        return 

 

    if not os.path.exists(restorecon): 

        raise RuntimeError('SELinux is enabled but %s does not exist.\nInstall the policycoreutils package and start the installation again.' % restorecon)