pgreco / rpms / ipa

Forked from forks/areguera/rpms/ipa 4 years ago
Clone

Blame SOURCES/0140-installutils-add-DM-password-validator.patch

483b06
From fe7778b52ac9bacbedceec641ccb41d5f79f131c Mon Sep 17 00:00:00 2001
483b06
From: Tomas Krizek <tkrizek@redhat.com>
483b06
Date: Wed, 3 May 2017 10:01:09 +0200
483b06
Subject: [PATCH] installutils: add DM password validator
483b06
483b06
Add a validator that checks whether provided Directory Manager
483b06
is valid by attempting to connect to LDAP.
483b06
483b06
Related https://pagure.io/freeipa/issue/6892
483b06
483b06
Signed-off-by: Tomas Krizek <tkrizek@redhat.com>
483b06
Reviewed-By: Martin Basti <mbasti@redhat.com>
483b06
Reviewed-By: Christian Heimes <cheimes@redhat.com>
483b06
Reviewed-By: Stanislav Laznicka <slaznick@redhat.com>
483b06
---
483b06
 ipaserver/install/installutils.py | 16 ++++++++++++++++
483b06
 1 file changed, 16 insertions(+)
483b06
483b06
diff --git a/ipaserver/install/installutils.py b/ipaserver/install/installutils.py
483b06
index 9230e70056b1a773246a0d95e6ecb943cada953c..b6f01489ccc65dcbc360929e0a7b315b074df8ce 100644
483b06
--- a/ipaserver/install/installutils.py
483b06
+++ b/ipaserver/install/installutils.py
483b06
@@ -50,6 +50,7 @@ import ipaplatform
483b06
 from ipapython import ipautil, admintool, version
483b06
 from ipapython.admintool import ScriptError
483b06
 from ipapython.ipa_log_manager import root_logger
483b06
+from ipapython.ipaldap import DIRMAN_DN, LDAPClient
483b06
 from ipalib.util import validate_hostname
483b06
 from ipalib import api, errors, x509
483b06
 from ipapython.dn import DN
483b06
@@ -329,6 +330,21 @@ def _read_password_default_validator(password):
483b06
     if len(password) < 8:
483b06
         raise ValueError("Password must be at least 8 characters long")
483b06
 
483b06
+
483b06
+def validate_dm_password_ldap(password):
483b06
+    """
483b06
+    Validate DM password by attempting to connect to LDAP. api.env has to
483b06
+    contain valid ldap_uri.
483b06
+    """
483b06
+    client = LDAPClient(api.env.ldap_uri, cacert=paths.IPA_CA_CRT)
483b06
+    try:
483b06
+        client.simple_bind(DIRMAN_DN, password)
483b06
+    except errors.ACIError:
483b06
+        raise ValueError("Invalid Directory Manager password")
483b06
+    else:
483b06
+        client.unbind()
483b06
+
483b06
+
483b06
 def read_password(user, confirm=True, validate=True, retry=True, validator=_read_password_default_validator):
483b06
     correct = False
483b06
     pwd = None
483b06
-- 
483b06
2.9.4
483b06