Blame roles/ipaclient/library/ipaclient_join.py

Packit Service 0a38ef
# -*- coding: utf-8 -*-
Packit Service 0a38ef
Packit Service 0a38ef
# Authors:
Packit Service 0a38ef
#   Thomas Woerner <twoerner@redhat.com>
Packit Service 0a38ef
#
Packit Service 0a38ef
# Based on ipa-client-install code
Packit Service 0a38ef
#
Packit Service 0a38ef
# Copyright (C) 2017  Red Hat
Packit Service 0a38ef
# see file 'COPYING' for use and warranty information
Packit Service 0a38ef
#
Packit Service 0a38ef
# This program is free software; you can redistribute it and/or modify
Packit Service 0a38ef
# it under the terms of the GNU General Public License as published by
Packit Service 0a38ef
# the Free Software Foundation, either version 3 of the License, or
Packit Service 0a38ef
# (at your option) any later version.
Packit Service 0a38ef
#
Packit Service 0a38ef
# This program is distributed in the hope that it will be useful,
Packit Service 0a38ef
# but WITHOUT ANY WARRANTY; without even the implied warranty of
Packit Service 0a38ef
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
Packit Service 0a38ef
# GNU General Public License for more details.
Packit Service 0a38ef
#
Packit Service 0a38ef
# You should have received a copy of the GNU General Public License
Packit Service 0a38ef
# along with this program.  If not, see <http://www.gnu.org/licenses/>.
Packit Service 0a38ef
Packit Service 0a38ef
ANSIBLE_METADATA = {
Packit Service 0a38ef
    'metadata_version': '1.0',
Packit Service 0a38ef
    'supported_by': 'community',
Packit Service 0a38ef
    'status': ['preview'],
Packit Service 0a38ef
}
Packit Service 0a38ef
Packit Service 0a38ef
DOCUMENTATION = '''
Packit Service 0a38ef
---
Packit Service 0a38ef
module: ipaclient_join
Packit Service 0a38ef
short description:
Packit Service 0a38ef
  Join a machine to an IPA realm and get a keytab for the host service
Packit Service 0a38ef
  principal
Packit Service 0a38ef
description:
Packit Service 0a38ef
  Join a machine to an IPA realm and get a keytab for the host service
Packit Service 0a38ef
  principal
Packit Service 0a38ef
options:
Packit Service 0a38ef
  servers:
Packit Service 0a38ef
    description: Fully qualified name of IPA servers to enroll to
Packit Service 0a38ef
    required: no
Packit Service 0a38ef
  domain:
Packit Service 0a38ef
    description: Primary DNS domain of the IPA deployment
Packit Service 0a38ef
    required: no
Packit Service 0a38ef
  realm:
Packit Service 0a38ef
    description: Kerberos realm name of the IPA deployment
Packit Service 0a38ef
    required: no
Packit Service 0a38ef
  hostname:
Packit Service 0a38ef
    description: Fully qualified name of this host
Packit Service 0a38ef
    required: no
Packit Service 0a38ef
  kdc:
Packit Service 0a38ef
    description: The name or address of the host running the KDC
Packit Service 0a38ef
    required: no
Packit Service 0a38ef
  basedn:
Packit Service 0a38ef
    description: The basedn of the IPA server (of the form dc=example,dc=com)
Packit Service 0a38ef
    required: no
Packit Service 0a38ef
  principal:
Packit Service 0a38ef
    description:
Packit Service 0a38ef
      User Principal allowed to promote replicas and join IPA realm
Packit Service 0a38ef
    required: yes
Packit Service 0a38ef
  password:
Packit Service 0a38ef
    description: Admin user kerberos password
Packit Service 0a38ef
    required: yes
Packit Service 0a38ef
  keytab:
Packit Service 0a38ef
    description: Path to backed up keytab from previous enrollment
Packit Service 0a38ef
    required: yes
Packit Service 0a38ef
  admin_keytab:
Packit Service 0a38ef
    description: The path to a local admin keytab
Packit Service 0a38ef
    required: yes
Packit Service 0a38ef
  ca_cert_file:
Packit Service 0a38ef
    description:
Packit Service 0a38ef
      A CA certificate to use. Do not acquire the IPA CA certificate via
Packit Service 0a38ef
      automated means
Packit Service 0a38ef
    required: yes
Packit Service 0a38ef
  force_join:
Packit Service 0a38ef
    description: Force client enrollment even if already enrolled
Packit Service 0a38ef
    required: yes
Packit Service 0a38ef
  kinit_attempts:
Packit Service 0a38ef
    description: Repeat the request for host Kerberos ticket X times
Packit Service 0a38ef
    required: yes
Packit Service 0a38ef
  debug:
Packit Service 0a38ef
    description: Turn on extra debugging
Packit Service 0a38ef
    required: yes
Packit Service 0a38ef
author:
Packit Service 0a38ef
    - Thomas Woerner
Packit Service 0a38ef
'''
Packit Service 0a38ef
Packit Service 0a38ef
EXAMPLES = '''
Packit Service 0a38ef
# Join IPA to get the keytab
Packit Service 0a38ef
- name: Join IPA in force mode with maximum 5 kinit attempts
Packit Service 0a38ef
  ipaclient_join:
Packit Service 0a38ef
    servers: ["server1.example.com","server2.example.com"]
Packit Service 0a38ef
    domain: example.com
Packit Service 0a38ef
    realm: EXAMPLE.COM
Packit Service 0a38ef
    kdc: server1.example.com
Packit Service 0a38ef
    basedn: dc=example,dc=com
Packit Service 0a38ef
    hostname: client1.example.com
Packit Service 0a38ef
    principal: admin
Packit Service 0a38ef
    password: MySecretPassword
Packit Service 0a38ef
    force_join: yes
Packit Service 0a38ef
    kinit_attempts: 5
Packit Service 0a38ef
Packit Service 0a38ef
# Join IPA to get the keytab using ipadiscovery return values
Packit Service 0a38ef
- name: Join IPA
Packit Service 0a38ef
  ipaclient_join:
Packit Service 0a38ef
    servers: "{{ ipadiscovery.servers }}"
Packit Service 0a38ef
    domain: "{{ ipadiscovery.domain }}"
Packit Service 0a38ef
    realm: "{{ ipadiscovery.realm }}"
Packit Service 0a38ef
    kdc: "{{ ipadiscovery.kdc }}"
Packit Service 0a38ef
    basedn: "{{ ipadiscovery.basedn }}"
Packit Service 0a38ef
    hostname: "{{ ipadiscovery.hostname }}"
Packit Service 0a38ef
    principal: admin
Packit Service 0a38ef
    password: MySecretPassword
Packit Service 0a38ef
'''
Packit Service 0a38ef
Packit Service 0a38ef
RETURN = '''
Packit Service 0a38ef
already_joined:
Packit Service 0a38ef
  description: The flag describes if the host is arelady joined.
Packit Service 0a38ef
  returned: always
Packit Service 0a38ef
  type: bool
Packit Service 0a38ef
'''
Packit Service 0a38ef
Packit Service 0a38ef
import os
Packit Service 0a38ef
import tempfile
Packit Service 0a38ef
Packit Service 0a38ef
from ansible.module_utils.basic import AnsibleModule
Packit Service 0a38ef
from ansible.module_utils.ansible_ipa_client import (
Packit Service 0a38ef
    setup_logging,
Packit Service 0a38ef
    SECURE_PATH, sysrestore, paths, options, configure_krb5_conf,
Packit Service 0a38ef
    realm_to_suffix, kinit_keytab, GSSError, kinit_password, NUM_VERSION,
Packit Service 0a38ef
    get_ca_cert, get_ca_certs, errors, run
Packit Service 0a38ef
)
Packit Service 0a38ef
Packit Service 0a38ef
Packit Service 0a38ef
def main():
Packit Service 0a38ef
    module = AnsibleModule(
Packit Service 0a38ef
        argument_spec=dict(
Packit Service 0a38ef
            servers=dict(required=True, type='list'),
Packit Service 0a38ef
            domain=dict(required=True),
Packit Service 0a38ef
            realm=dict(required=True),
Packit Service 0a38ef
            hostname=dict(required=True),
Packit Service 0a38ef
            kdc=dict(required=True),
Packit Service 0a38ef
            basedn=dict(required=True),
Packit Service 0a38ef
            principal=dict(required=False),
Packit Service 0a38ef
            password=dict(required=False, no_log=True),
Packit Service 0a38ef
            keytab=dict(required=False),
Packit Service 0a38ef
            admin_keytab=dict(required=False),
Packit Service 0a38ef
            ca_cert_file=dict(required=False),
Packit Service 0a38ef
            force_join=dict(required=False, type='bool'),
Packit Service 0a38ef
            kinit_attempts=dict(required=False, type='int', default=5),
Packit Service 0a38ef
            debug=dict(required=False, type='bool'),
Packit Service 0a38ef
        ),
Packit Service 0a38ef
        supports_check_mode=True,
Packit Service 0a38ef
    )
Packit Service 0a38ef
Packit Service 0a38ef
    module._ansible_debug = True
Packit Service 0a38ef
    setup_logging()
Packit Service 0a38ef
Packit Service 0a38ef
    servers = module.params.get('servers')
Packit Service 0a38ef
    domain = module.params.get('domain')
Packit Service 0a38ef
    realm = module.params.get('realm')
Packit Service 0a38ef
    hostname = module.params.get('hostname')
Packit Service 0a38ef
    basedn = module.params.get('basedn')
Packit Service 0a38ef
    kdc = module.params.get('kdc')
Packit Service 0a38ef
    force_join = module.params.get('force_join')
Packit Service 0a38ef
    principal = module.params.get('principal')
Packit Service 0a38ef
    password = module.params.get('password')
Packit Service 0a38ef
    keytab = module.params.get('keytab')
Packit Service 0a38ef
    admin_keytab = module.params.get('admin_keytab')
Packit Service 0a38ef
    ca_cert_file = module.params.get('ca_cert_file')
Packit Service 0a38ef
    kinit_attempts = module.params.get('kinit_attempts')
Packit Service 0a38ef
    debug = module.params.get('debug')
Packit Service 0a38ef
Packit Service 0a38ef
    if password is not None and keytab is not None:
Packit Service 0a38ef
        module.fail_json(msg="Password and keytab cannot be used together")
Packit Service 0a38ef
Packit Service 0a38ef
    if password is None and admin_keytab is None:
Packit Service 0a38ef
        module.fail_json(msg="Password or admin_keytab is needed")
Packit Service 0a38ef
Packit Service 0a38ef
    client_domain = hostname[hostname.find(".")+1:]
Packit Service 0a38ef
    nolog = tuple()
Packit Service 0a38ef
    env = {'PATH': SECURE_PATH}
Packit Service 0a38ef
    fstore = sysrestore.FileStore(paths.IPA_CLIENT_SYSRESTORE)
Packit Service 0a38ef
    host_principal = 'host/%s@%s' % (hostname, realm)
Packit Service 0a38ef
    sssd = True
Packit Service 0a38ef
Packit Service 0a38ef
    options.ca_cert_file = ca_cert_file
Packit Service 0a38ef
    options.principal = principal
Packit Service 0a38ef
    options.force = False
Packit Service 0a38ef
    options.password = password
Packit Service 0a38ef
Packit Service 0a38ef
    ccache_dir = None
Packit Service 0a38ef
    changed = False
Packit Service 0a38ef
    already_joined = False
Packit Service 0a38ef
    try:
Packit Service 0a38ef
        (krb_fd, krb_name) = tempfile.mkstemp()
Packit Service 0a38ef
        os.close(krb_fd)
Packit Service 0a38ef
        configure_krb5_conf(
Packit Service 0a38ef
            cli_realm=realm,
Packit Service 0a38ef
            cli_domain=domain,
Packit Service 0a38ef
            cli_server=servers,
Packit Service 0a38ef
            cli_kdc=kdc,
Packit Service 0a38ef
            dnsok=False,
Packit Service 0a38ef
            filename=krb_name,
Packit Service 0a38ef
            client_domain=client_domain,
Packit Service 0a38ef
            client_hostname=hostname,
Packit Service 0a38ef
            configure_sssd=sssd,
Packit Service 0a38ef
            force=False)
Packit Service 0a38ef
        env['KRB5_CONFIG'] = krb_name
Packit Service 0a38ef
        ccache_dir = tempfile.mkdtemp(prefix='krbcc')
Packit Service 0a38ef
        ccache_name = os.path.join(ccache_dir, 'ccache')
Packit Service 0a38ef
        join_args = [paths.SBIN_IPA_JOIN,
Packit Service 0a38ef
                     "-s", servers[0],
Packit Service 0a38ef
                     "-b", str(realm_to_suffix(realm)),
Packit Service 0a38ef
                     "-h", hostname]
Packit Service 0a38ef
        if debug:
Packit Service 0a38ef
            join_args.append("-d")
Packit Service 0a38ef
            env['XMLRPC_TRACE_CURL'] = 'yes'
Packit Service 0a38ef
        if force_join:
Packit Service 0a38ef
            join_args.append("-f")
Packit Service 0a38ef
        if principal is not None:
Packit Service 0a38ef
            if principal.find('@') == -1:
Packit Service 0a38ef
                principal = '%s@%s' % (principal, realm)
Packit Service 0a38ef
            if admin_keytab:
Packit Service 0a38ef
                join_args.append("-f")
Packit Service 0a38ef
                if not os.path.exists(admin_keytab):
Packit Service 0a38ef
                    module.fail_json(
Packit Service 0a38ef
                        msg="Keytab file could not be found: %s" %
Packit Service 0a38ef
                        admin_keytab)
Packit Service 0a38ef
                try:
Packit Service 0a38ef
                    kinit_keytab(principal,
Packit Service 0a38ef
                                 admin_keytab,
Packit Service 0a38ef
                                 ccache_name,
Packit Service 0a38ef
                                 config=krb_name,
Packit Service 0a38ef
                                 attempts=kinit_attempts)
Packit Service 0a38ef
                except GSSError as e:
Packit Service 0a38ef
                    module.fail_json(
Packit Service 0a38ef
                        msg="Kerberos authentication failed: %s" % str(e))
Packit Service 0a38ef
            else:
Packit Service 0a38ef
                try:
Packit Service 0a38ef
                    kinit_password(principal, password, ccache_name,
Packit Service 0a38ef
                                   config=krb_name)
Packit Service 0a38ef
                except RuntimeError as e:
Packit Service 0a38ef
                    module.fail_json(
Packit Service 0a38ef
                        msg="Kerberos authentication failed: {}".format(e))
Packit Service 0a38ef
Packit Service 0a38ef
        elif keytab:
Packit Service 0a38ef
            join_args.append("-f")
Packit Service 0a38ef
            if os.path.exists(keytab):
Packit Service 0a38ef
                try:
Packit Service 0a38ef
                    kinit_keytab(host_principal,
Packit Service 0a38ef
                                 keytab,
Packit Service 0a38ef
                                 ccache_name,
Packit Service 0a38ef
                                 config=krb_name,
Packit Service 0a38ef
                                 attempts=kinit_attempts)
Packit Service 0a38ef
                except GSSError as e:
Packit Service 0a38ef
                    module.fail_json(
Packit Service 0a38ef
                        msg="Kerberos authentication failed: {}".format(e))
Packit Service 0a38ef
            else:
Packit Service 0a38ef
                module.fail_json(
Packit Service 0a38ef
                    msg="Keytab file could not be found: {}".format(keytab))
Packit Service 0a38ef
Packit Service 0a38ef
        elif password:
Packit Service 0a38ef
            join_args.append("-w")
Packit Service 0a38ef
            join_args.append(password)
Packit Service 0a38ef
            nolog = (password,)
Packit Service 0a38ef
Packit Service 0a38ef
        env['KRB5CCNAME'] = os.environ['KRB5CCNAME'] = ccache_name
Packit Service 0a38ef
        # Get the CA certificate
Packit Service 0a38ef
        try:
Packit Service 0a38ef
            os.environ['KRB5_CONFIG'] = env['KRB5_CONFIG']
Packit Service 0a38ef
            if NUM_VERSION < 40100:
Packit Service 0a38ef
                get_ca_cert(fstore, options, servers[0], basedn)
Packit Service 0a38ef
            else:
Packit Service 0a38ef
                get_ca_certs(fstore, options, servers[0], basedn, realm)
Packit Service 0a38ef
            del os.environ['KRB5_CONFIG']
Packit Service 0a38ef
        except errors.FileError as e:
Packit Service 0a38ef
            module.fail_json(msg='%s' % e)
Packit Service 0a38ef
        except Exception as e:
Packit Service 0a38ef
            module.fail_json(msg="Cannot obtain CA certificate\n%s" % e)
Packit Service 0a38ef
Packit Service 0a38ef
        # Now join the domain
Packit Service 0a38ef
        result = run(
Packit Service 0a38ef
            join_args, raiseonerr=False, env=env, nolog=nolog,
Packit Service 0a38ef
            capture_error=True)
Packit Service 0a38ef
        stderr = result.error_output
Packit Service 0a38ef
Packit Service 0a38ef
        if result.returncode != 0:
Packit Service 0a38ef
            if result.returncode == 13:
Packit Service 0a38ef
                already_joined = True
Packit Service 0a38ef
                module.log("Host is already joined")
Packit Service 0a38ef
            else:
Packit Service 0a38ef
                if principal:
Packit Service 0a38ef
                    run([paths.KDESTROY], raiseonerr=False, env=env)
Packit Service 0a38ef
                module.fail_json(msg="Joining realm failed: %s" % stderr)
Packit Service 0a38ef
        else:
Packit Service 0a38ef
            changed = True
Packit Service 0a38ef
            module.log("Enrolled in IPA realm %s" % realm)
Packit Service 0a38ef
Packit Service 0a38ef
        # Fail for missing krb5.keytab on already joined host
Packit Service 0a38ef
        if already_joined and not os.path.exists(paths.KRB5_KEYTAB):
Packit Service 0a38ef
            module.fail_json(msg="krb5.keytab missing! Retry with "
Packit Service 0a38ef
                             "ipaclient_force_join=yes to generate a new one.")
Packit Service 0a38ef
Packit Service 0a38ef
        if principal:
Packit Service 0a38ef
            run([paths.KDESTROY], raiseonerr=False, env=env)
Packit Service 0a38ef
Packit Service 0a38ef
        # Obtain the TGT. We do it with the temporary krb5.conf, sot
Packit Service 0a38ef
        # tha only the KDC we're installing under is contacted.
Packit Service 0a38ef
        # Other KDCs might not have replicated the principal yet.
Packit Service 0a38ef
        # Once we have the TGT, it's usable on any server.
Packit Service 0a38ef
        try:
Packit Service 0a38ef
            kinit_keytab(host_principal, paths.KRB5_KEYTAB,
Packit Service 0a38ef
                         paths.IPA_DNS_CCACHE,
Packit Service 0a38ef
                         config=krb_name,
Packit Service 0a38ef
                         attempts=kinit_attempts)
Packit Service 0a38ef
            env['KRB5CCNAME'] = os.environ['KRB5CCNAME'] = paths.IPA_DNS_CCACHE
Packit Service 0a38ef
        except GSSError as e:
Packit Service 0a38ef
            # failure to get ticket makes it impossible to login and
Packit Service 0a38ef
            # bind from sssd to LDAP, abort installation
Packit Service 0a38ef
            module.fail_json(msg="Failed to obtain host TGT: %s" % e)
Packit Service 0a38ef
Packit Service 0a38ef
    finally:
Packit Service 0a38ef
        try:
Packit Service 0a38ef
            os.remove(krb_name)
Packit Service 0a38ef
        except OSError:
Packit Service 0a38ef
            module.fail_json(msg="Could not remove %s" % krb_name)
Packit Service 0a38ef
        if ccache_dir is not None:
Packit Service 0a38ef
            try:
Packit Service 0a38ef
                os.rmdir(ccache_dir)
Packit Service 0a38ef
            except OSError:
Packit Service 0a38ef
                pass
Packit Service 0a38ef
        if os.path.exists(krb_name + ".ipabkp"):
Packit Service 0a38ef
            try:
Packit Service 0a38ef
                os.remove(krb_name + ".ipabkp")
Packit Service 0a38ef
            except OSError:
Packit Service 0a38ef
                module.fail_json(msg="Could not remove %s.ipabkp" % krb_name)
Packit Service 0a38ef
Packit Service 0a38ef
    module.exit_json(changed=changed,
Packit Service 0a38ef
                     already_joined=already_joined)
Packit Service 0a38ef
Packit Service 0a38ef
Packit Service 0a38ef
if __name__ == '__main__':
Packit Service 0a38ef
    main()