pgreco / rpms / ipa

Forked from forks/areguera/rpms/ipa 4 years ago
Clone
ad1545
From bbe70ea811007cf8426ac14565e7da47b3ae1ced Mon Sep 17 00:00:00 2001
483b06
From: Jan Cholasta <jcholast@redhat.com>
483b06
Date: Thu, 16 Mar 2017 09:44:21 +0000
483b06
Subject: [PATCH] Remove csrgen
483b06
483b06
This reverts commits:
483b06
* 72de679eb445c975ec70cd265d37d4927823ce5b
483b06
* 177f07e163d6d591a1e609d35e0a6f6f5347551e
483b06
* 80be18162921268be9c8981495c9e8a4de0c85cd
483b06
* 83e2c2b65eeb5a3aa4a59c0535e9177aac5e4637
483b06
* ada91c20588046bb147fc701718d3da4d2c080ca
483b06
* 4350dcdea22fd2284836315d0ae7d38733a7620e
483b06
* 39a5d9c5aae77687f67d9be02457733bdfb99ead
483b06
* a26cf0d7910dd4c0a4da08682b4be8d3d94ba520
483b06
* afd7c05d11432304bfdf183832a21d419f363689
483b06
* f1a1c6eca1b294f24174d7b0e1f78de46d9d5b05
483b06
* fc58eff6a3d7fe805e612b8b002304d8b9cd4ba9
483b06
* 10ef5947860f5098182b1f95c08c1158e2da15f9
483b06
483b06
https://bugzilla.redhat.com/show_bug.cgi?id=1432630
483b06
---
ad1545
 freeipa.spec.in                               | 18 ----
ad1545
 .../csrgen/profiles/caIPAserviceCert.json     | 15 ----
ad1545
 ipaclient/csrgen/profiles/userCert.json       | 15 ----
ad1545
 .../csrgen/templates/openssl_macros.tmpl      | 29 -------
ad1545
 ipaclient/plugins/cert.py                     | 82 +------------------
ad1545
 ipaclient/setup.py                            |  7 --
ad1545
 ipalib/errors.py                              | 28 -------
ad1545
 ipatests/setup.py                             |  2 -
ad1545
 ipatests/test_ipaclient/__init__.py           |  7 --
ad1545
 .../data/test_csrgen/profiles/profile.json    |  8 --
ad1545
 .../test_csrgen/templates/identity_base.tmpl  |  1 -
f65af0
 11 files changed, 1 insertion(+), 211 deletions(-)
483b06
 delete mode 100644 ipaclient/csrgen/profiles/caIPAserviceCert.json
483b06
 delete mode 100644 ipaclient/csrgen/profiles/userCert.json
483b06
 delete mode 100644 ipaclient/csrgen/templates/openssl_macros.tmpl
483b06
 delete mode 100644 ipatests/test_ipaclient/__init__.py
483b06
 delete mode 100644 ipatests/test_ipaclient/data/test_csrgen/profiles/profile.json
483b06
 delete mode 100644 ipatests/test_ipaclient/data/test_csrgen/templates/identity_base.tmpl
483b06
483b06
diff --git a/freeipa.spec.in b/freeipa.spec.in
f65af0
index 70482ceb65639465d60b0c48fd2ccd6eaa34e097..8d76217fc5a735f36d344b1b783d061b3b0f6271 100644
483b06
--- a/freeipa.spec.in
483b06
+++ b/freeipa.spec.in
f65af0
@@ -245,7 +245,6 @@ BuildRequires:  python2-sssdconfig
f65af0
 BuildRequires:  python2-nose
f65af0
 BuildRequires:  python2-paste
f65af0
 BuildRequires:  python2-systemd
483b06
-BuildRequires:  python2-jinja2
f65af0
 BuildRequires:  python2-augeas
483b06
 
483b06
 %if 0%{?with_python3}
f65af0
@@ -284,7 +283,6 @@ BuildRequires:  python3-libsss_nss_idmap
483b06
 BuildRequires:  python3-nose
483b06
 BuildRequires:  python3-paste
483b06
 BuildRequires:  python3-systemd
483b06
-BuildRequires:  python3-jinja2
483b06
 BuildRequires:  python3-augeas
f65af0
 BuildRequires:  python3-netaddr
f65af0
 BuildRequires:  python3-pyasn1
f65af0
@@ -640,7 +638,6 @@ Requires: %{name}-client-common = %{version}-%{release}
483b06
 Requires: %{name}-common = %{version}-%{release}
483b06
 Requires: python2-ipalib = %{version}-%{release}
f65af0
 Requires: python2-dns >= 1.15
483b06
-Requires: python2-jinja2
483b06
 
483b06
 %description -n python2-ipaclient
483b06
 IPA is an integrated solution to provide centrally managed Identity (users,
f65af0
@@ -663,7 +660,6 @@ Requires: %{name}-client-common = %{version}-%{release}
483b06
 Requires: %{name}-common = %{version}-%{release}
483b06
 Requires: python3-ipalib = %{version}-%{release}
483b06
 Requires: python3-dns >= 1.15
483b06
-Requires: python3-jinja2
483b06
 
483b06
 %description -n python3-ipaclient
483b06
 IPA is an integrated solution to provide centrally managed Identity (users,
f65af0
@@ -1609,13 +1605,6 @@ fi
483b06
 %{python_sitelib}/ipaclient/remote_plugins/*.py*
c58629
 %dir %{python_sitelib}/ipaclient/remote_plugins/2_*
483b06
 %{python_sitelib}/ipaclient/remote_plugins/2_*/*.py*
483b06
-%dir %{python_sitelib}/ipaclient/csrgen
483b06
-%dir %{python_sitelib}/ipaclient/csrgen/profiles
483b06
-%{python_sitelib}/ipaclient/csrgen/profiles/*.json
483b06
-%dir %{python_sitelib}/ipaclient/csrgen/rules
483b06
-%{python_sitelib}/ipaclient/csrgen/rules/*.json
483b06
-%dir %{python_sitelib}/ipaclient/csrgen/templates
483b06
-%{python_sitelib}/ipaclient/csrgen/templates/*.tmpl
483b06
 %{python_sitelib}/ipaclient-*.egg-info
483b06
 
483b06
 
f65af0
@@ -1640,13 +1629,6 @@ fi
c58629
 %dir %{python3_sitelib}/ipaclient/remote_plugins/2_*
483b06
 %{python3_sitelib}/ipaclient/remote_plugins/2_*/*.py
483b06
 %{python3_sitelib}/ipaclient/remote_plugins/2_*/__pycache__/*.py*
483b06
-%dir %{python3_sitelib}/ipaclient/csrgen
483b06
-%dir %{python3_sitelib}/ipaclient/csrgen/profiles
483b06
-%{python3_sitelib}/ipaclient/csrgen/profiles/*.json
483b06
-%dir %{python3_sitelib}/ipaclient/csrgen/rules
483b06
-%{python3_sitelib}/ipaclient/csrgen/rules/*.json
483b06
-%dir %{python3_sitelib}/ipaclient/csrgen/templates
483b06
-%{python3_sitelib}/ipaclient/csrgen/templates/*.tmpl
483b06
 %{python3_sitelib}/ipaclient-*.egg-info
483b06
 
483b06
 %endif # with_python3
483b06
diff --git a/ipaclient/csrgen/profiles/caIPAserviceCert.json b/ipaclient/csrgen/profiles/caIPAserviceCert.json
483b06
deleted file mode 100644
483b06
index 114d2ffd4e0d8eae833eaa594f6a17a79da909be..0000000000000000000000000000000000000000
483b06
--- a/ipaclient/csrgen/profiles/caIPAserviceCert.json
483b06
+++ /dev/null
483b06
@@ -1,15 +0,0 @@
483b06
-[
483b06
-    {
483b06
-        "syntax": "syntaxSubject",
483b06
-        "data": [
483b06
-            "dataHostCN",
483b06
-            "dataSubjectBase"
483b06
-        ]
483b06
-    },
483b06
-    {
483b06
-        "syntax": "syntaxSAN",
483b06
-        "data": [
483b06
-            "dataDNS"
483b06
-        ]
483b06
-    }
483b06
-]
483b06
diff --git a/ipaclient/csrgen/profiles/userCert.json b/ipaclient/csrgen/profiles/userCert.json
483b06
deleted file mode 100644
483b06
index d6cf5cfffcfadd604fc3e8283d1be15767278c7a..0000000000000000000000000000000000000000
483b06
--- a/ipaclient/csrgen/profiles/userCert.json
483b06
+++ /dev/null
483b06
@@ -1,15 +0,0 @@
483b06
-[
483b06
-    {
483b06
-        "syntax": "syntaxSubject",
483b06
-        "data": [
483b06
-            "dataUsernameCN",
483b06
-            "dataSubjectBase"
483b06
-        ]
483b06
-    },
483b06
-    {
483b06
-        "syntax": "syntaxSAN",
483b06
-        "data": [
483b06
-            "dataEmail"
483b06
-        ]
483b06
-    }
483b06
-]
483b06
diff --git a/ipaclient/csrgen/templates/openssl_macros.tmpl b/ipaclient/csrgen/templates/openssl_macros.tmpl
483b06
deleted file mode 100644
483b06
index d31b8fef5f2d85e1b3d5ecf425f00ec9c22ac301..0000000000000000000000000000000000000000
483b06
--- a/ipaclient/csrgen/templates/openssl_macros.tmpl
483b06
+++ /dev/null
483b06
@@ -1,29 +0,0 @@
483b06
-{# List containing rendered sections to be included at end #}
483b06
-{% set openssl_sections = [] %}
483b06
-
483b06
-{#
483b06
-List containing one entry for each section name allocated. Because of
483b06
-scoping rules, we need to use a list so that it can be a "per-render global"
483b06
-that gets updated in place. Real globals are shared by all templates with the
483b06
-same environment, and variables defined in the macro don't persist after the
483b06
-macro invocation ends.
483b06
-#}
483b06
-{% set openssl_section_num = [] %}
483b06
-
483b06
-{% macro section() -%}
483b06
-{% set name -%}
483b06
-sec{{ openssl_section_num|length -}}
483b06
-{% endset -%}
483b06
-{% do openssl_section_num.append('') -%}
483b06
-{% set contents %}{{ caller() }}{% endset -%}
483b06
-{% if contents -%}
483b06
-{% set sectiondata = formatsection(name, contents) -%}
483b06
-{% do openssl_sections.append(sectiondata) -%}
483b06
-{% endif -%}
483b06
-{{ name -}}
483b06
-{% endmacro %}
483b06
-
483b06
-{% macro formatsection(name, contents) -%}
483b06
-[ {{ name }} ]
483b06
-{{ contents -}}
483b06
-{% endmacro %}
483b06
diff --git a/ipaclient/plugins/cert.py b/ipaclient/plugins/cert.py
f65af0
index 6d453d0d6ead9ac7d594bbb27da81de6de2b6862..b3619f30c1ca1f4e921b106d07fb5cb2219a7df0 100644
483b06
--- a/ipaclient/plugins/cert.py
483b06
+++ b/ipaclient/plugins/cert.py
f65af0
@@ -21,8 +21,6 @@
483b06
 
483b06
 import base64
483b06
 
f65af0
-import six
f65af0
-
483b06
 from ipaclient.frontend import MethodOverride
483b06
 from ipalib import errors
f65af0
 from ipalib import x509
f65af0
@@ -31,9 +29,6 @@ from ipalib.parameters import BinaryFile, File, Flag, Str
483b06
 from ipalib.plugable import Registry
483b06
 from ipalib.text import _
483b06
 
483b06
-if six.PY3:
483b06
-    unicode = str
483b06
-
483b06
 register = Registry()
483b06
 
483b06
 
f65af0
@@ -74,87 +69,12 @@ class CertRetrieveOverride(MethodOverride):
483b06
 
483b06
 @register(override=True, no_fail=True)
483b06
 class cert_request(CertRetrieveOverride):
483b06
-    takes_options = CertRetrieveOverride.takes_options + (
483b06
-        Str(
483b06
-            'database?',
483b06
-            label=_('Path to NSS database'),
483b06
-            doc=_('Path to NSS database to use for private key'),
483b06
-        ),
483b06
-        Str(
483b06
-            'private_key?',
483b06
-            label=_('Path to private key file'),
483b06
-            doc=_('Path to PEM file containing a private key'),
483b06
-        ),
483b06
-        Str(
483b06
-            'password_file?',
483b06
-            label=_(
483b06
-                'File containing a password for the private key or database'),
483b06
-        ),
483b06
-        Str(
483b06
-            'csr_profile_id?',
483b06
-            label=_('Name of CSR generation profile (if not the same as'
483b06
-                    ' profile_id)'),
483b06
-        ),
483b06
-    )
483b06
-
483b06
     def get_args(self):
483b06
         for arg in super(cert_request, self).get_args():
483b06
             if arg.name == 'csr':
483b06
-                arg = arg.clone_retype(arg.name, File, required=False)
483b06
+                arg = arg.clone_retype(arg.name, File)
483b06
             yield arg
483b06
 
483b06
-    def forward(self, csr=None, **options):
483b06
-        database = options.pop('database', None)
483b06
-        private_key = options.pop('private_key', None)
483b06
-        csr_profile_id = options.pop('csr_profile_id', None)
483b06
-        password_file = options.pop('password_file', None)
483b06
-
483b06
-        if csr is None:
f65af0
-            # Deferred import, ipaclient.csrgen is expensive to load.
f65af0
-            # see https://pagure.io/freeipa/issue/7484
f65af0
-            from ipaclient import csrgen
f65af0
-
483b06
-            if database:
f65af0
-                adaptor = csrgen.NSSAdaptor(database, password_file)
483b06
-            elif private_key:
f65af0
-                adaptor = csrgen.OpenSSLAdaptor(
f65af0
-                    key_filename=private_key, password_filename=password_file)
483b06
-            else:
483b06
-                raise errors.InvocationError(
483b06
-                    message=u"One of 'database' or 'private_key' is required")
483b06
-
f65af0
-            pubkey_info = adaptor.get_subject_public_key_info()
f65af0
-            pubkey_info_b64 = base64.b64encode(pubkey_info)
f65af0
-
f65af0
-            # If csr_profile_id is passed, that takes precedence.
f65af0
-            # Otherwise, use profile_id. If neither are passed, the default
f65af0
-            # in cert_get_requestdata will be used.
f65af0
-            profile_id = csr_profile_id
f65af0
-            if profile_id is None:
f65af0
-                profile_id = options.get('profile_id')
483b06
-
f65af0
-            response = self.api.Command.cert_get_requestdata(
f65af0
-                profile_id=profile_id,
f65af0
-                principal=options.get('principal'),
f65af0
-                public_key_info=pubkey_info_b64)
483b06
-
f65af0
-            req_info_b64 = response['result']['request_info']
f65af0
-            req_info = base64.b64decode(req_info_b64)
483b06
-
f65af0
-            csr = adaptor.sign_csr(req_info)
f65af0
-
f65af0
-            if not csr:
f65af0
-                raise errors.CertificateOperationError(
f65af0
-                    error=(_('Generated CSR was empty')))
483b06
-
483b06
-        else:
483b06
-            if database is not None or private_key is not None:
483b06
-                raise errors.MutuallyExclusiveError(reason=_(
483b06
-                    "Options 'database' and 'private_key' are not compatible"
483b06
-                    " with 'csr'"))
483b06
-
483b06
-        return super(cert_request, self).forward(csr, **options)
483b06
-
483b06
 
483b06
 @register(override=True, no_fail=True)
483b06
 class cert_show(CertRetrieveOverride):
483b06
diff --git a/ipaclient/setup.py b/ipaclient/setup.py
f65af0
index ac947e772e014051ff5f231c73651bfa2fe8b061..8faa17dd1850fefd127aff83913e052e8900e5d4 100644
483b06
--- a/ipaclient/setup.py
483b06
+++ b/ipaclient/setup.py
c58629
@@ -42,13 +42,6 @@ if __name__ == '__main__':
483b06
             "ipaclient.remote_plugins.2_156",
483b06
             "ipaclient.remote_plugins.2_164",
483b06
         ],
483b06
-        package_data={
483b06
-            'ipaclient': [
483b06
-                'csrgen/profiles/*.json',
483b06
-                'csrgen/rules/*.json',
483b06
-                'csrgen/templates/*.tmpl',
483b06
-            ],
483b06
-        },
483b06
         install_requires=[
483b06
             "cryptography",
483b06
             "ipalib",
483b06
diff --git a/ipalib/errors.py b/ipalib/errors.py
f65af0
index 3a40fa28dc4b7748b2c570943f4a27a22c152353..6356d523e8c0ac63e8892292dd9991c9ee8211aa 100644
483b06
--- a/ipalib/errors.py
483b06
+++ b/ipalib/errors.py
f65af0
@@ -1434,34 +1434,6 @@ class HTTPRequestError(RemoteRetrieveError):
483b06
     format = _('Request failed with status %(status)s: %(reason)s')
483b06
 
483b06
 
483b06
-class RedundantMappingRule(SingleMatchExpected):
483b06
-    """
483b06
-    **4036** Raised when more than one rule in a CSR generation ruleset matches
483b06
-    a particular helper.
483b06
-
483b06
-    For example:
483b06
-
483b06
-    >>> raise RedundantMappingRule(ruleset='syntaxSubject', helper='certutil')
483b06
-    Traceback (most recent call last):
483b06
-      ...
483b06
-    RedundantMappingRule: Mapping ruleset "syntaxSubject" has more than one
483b06
-    rule for the certutil helper.
483b06
-    """
483b06
-
483b06
-    errno = 4036
483b06
-    format = _('Mapping ruleset "%(ruleset)s" has more than one rule for the'
483b06
-               ' %(helper)s helper')
483b06
-
483b06
-
483b06
-class CSRTemplateError(ExecutionError):
483b06
-    """
483b06
-    **4037** Raised when evaluation of a CSR generation template fails
483b06
-    """
483b06
-
483b06
-    errno = 4037
483b06
-    format = _('%(reason)s')
483b06
-
483b06
-
483b06
 class BuiltinError(ExecutionError):
483b06
     """
483b06
     **4100** Base class for builtin execution errors (*4100 - 4199*).
483b06
diff --git a/ipatests/setup.py b/ipatests/setup.py
f65af0
index 68a67da5f9590e068ad0ed3e30116264d70e5bce..2464822960a389a8c489babf7b034461396f55e2 100644
483b06
--- a/ipatests/setup.py
483b06
+++ b/ipatests/setup.py
c58629
@@ -39,7 +39,6 @@ if __name__ == '__main__':
483b06
             "ipatests.test_cmdline",
483b06
             "ipatests.test_install",
483b06
             "ipatests.test_integration",
483b06
-            "ipatests.test_ipaclient",
483b06
             "ipatests.test_ipalib",
f65af0
             "ipatests.test_ipaplatform",
483b06
             "ipatests.test_ipapython",
c58629
@@ -53,7 +52,6 @@ if __name__ == '__main__':
483b06
         package_data={
483b06
             'ipatests.test_install': ['*.update'],
483b06
             'ipatests.test_integration': ['scripts/*'],
483b06
-            'ipatests.test_ipaclient': ['data/*/*/*'],
483b06
             'ipatests.test_ipalib': ['data/*'],
f65af0
             'ipatests.test_ipaplatform': ['data/*'],
483b06
             "ipatests.test_ipaserver": ['data/*'],
483b06
diff --git a/ipatests/test_ipaclient/__init__.py b/ipatests/test_ipaclient/__init__.py
483b06
deleted file mode 100644
483b06
index 0c428910cabe103af3ac9bfe4cdde6678acd1585..0000000000000000000000000000000000000000
483b06
--- a/ipatests/test_ipaclient/__init__.py
483b06
+++ /dev/null
483b06
@@ -1,7 +0,0 @@
483b06
-#
483b06
-# Copyright (C) 2016  FreeIPA Contributors see COPYING for license
483b06
-#
483b06
-
483b06
-"""
483b06
-Sub-package containing unit tests for `ipaclient` package.
483b06
-"""
483b06
diff --git a/ipatests/test_ipaclient/data/test_csrgen/profiles/profile.json b/ipatests/test_ipaclient/data/test_csrgen/profiles/profile.json
483b06
deleted file mode 100644
483b06
index 676f91bef696109976826e6e61be091718172798..0000000000000000000000000000000000000000
483b06
--- a/ipatests/test_ipaclient/data/test_csrgen/profiles/profile.json
483b06
+++ /dev/null
483b06
@@ -1,8 +0,0 @@
483b06
-[
483b06
-    {
483b06
-        "syntax": "basic",
483b06
-        "data": [
483b06
-            "options"
483b06
-        ]
483b06
-    }
483b06
-]
483b06
diff --git a/ipatests/test_ipaclient/data/test_csrgen/templates/identity_base.tmpl b/ipatests/test_ipaclient/data/test_csrgen/templates/identity_base.tmpl
483b06
deleted file mode 100644
483b06
index 79111ab686b4fe25227796509b3cd3fcb54af728..0000000000000000000000000000000000000000
483b06
--- a/ipatests/test_ipaclient/data/test_csrgen/templates/identity_base.tmpl
483b06
+++ /dev/null
483b06
@@ -1 +0,0 @@
483b06
-{{ options|join(";") }}
483b06
-- 
ad1545
2.17.2
483b06