From 37199834acaeee96136b096030198b2e9c8f16c8 Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Tibor=20Dudl=C3=A1k?= <tdudlak@redhat.com>
Date: Thu, 26 Jul 2018 11:46:55 +0200
Subject: [PATCH] Do not set ca_host when --setup-ca is used
Setting ca_host caused replication failures on DL0
because it was trying to connect to wrong CA host.
Trying to avoid corner-case in ipaserver/plugins/dogtag.py
when api.env.host nor api.env.ca_host had not CA configured
and there was ca_host set to api.env.ca_host variable.
See: https://pagure.io/freeipa/issue/7566
Resolves: https://pagure.io/freeipa/issue/7629
Reviewed-By: Florence Blanc-Renaud <frenaud@redhat.com>
Reviewed-By: Alexander Bokovoy <abokovoy@redhat.com>
Reviewed-By: Christian Heimes <cheimes@redhat.com>
Reviewed-By: Rob Crittenden <rcritten@redhat.com>
---
ipaserver/install/cainstance.py | 24 ++++++++++++++++++++++
ipaserver/install/server/replicainstall.py | 7 +++++--
2 files changed, 29 insertions(+), 2 deletions(-)
diff --git a/ipaserver/install/cainstance.py b/ipaserver/install/cainstance.py
index e207911814e3553c5aa5310694170d3575337c55..cb8dc43096b8851d7554447f28c4537a35b47852 100644
--- a/ipaserver/install/cainstance.py
+++ b/ipaserver/install/cainstance.py
@@ -435,6 +435,11 @@ class CAInstance(DogtagInstance):
self.step("updating IPA configuration", update_ipa_conf)
self.step("enabling CA instance", self.__enable_instance)
if not promote:
+ if self.clone:
+ # DL0 workaround; see docstring of __expose_ca_in_ldap
+ self.step("exposing CA instance on LDAP",
+ self.__expose_ca_in_ldap)
+
self.step("migrating certificate profiles to LDAP",
migrate_profiles_to_ldap)
self.step("importing IPA certificate profiles",
@@ -1222,6 +1227,25 @@ class CAInstance(DogtagInstance):
config = []
self.ldap_configure('CA', self.fqdn, None, basedn, config)
+ def __expose_ca_in_ldap(self):
+ """
+ In a case when replica is created on DL0 we need to make
+ sure that query for CA service record of this replica in
+ ldap will succeed in time of installation.
+ This method is needed for sucessfull replica installation
+ on DL0 and should be removed alongside with code for DL0.
+
+ To suppress deprecation warning message this method is
+ not invoking ldap_enable() but _ldap_enable() method.
+ """
+
+ basedn = ipautil.realm_to_suffix(self.realm)
+ if not self.clone:
+ config = ['caRenewalMaster']
+ else:
+ config = []
+ self._ldap_enable(u'enabledService', "CA", self.fqdn, basedn, config)
+
def setup_lightweight_ca_key_retrieval(self):
if sysupgrade.get_upgrade_state('dogtag', 'setup_lwca_key_retrieval'):
return
diff --git a/ipaserver/install/server/replicainstall.py b/ipaserver/install/server/replicainstall.py
index d8c55370d33d59efdf838f7ba01efedae7857406..8a659a0fc2675df0a8fba1d3d7d8a629b376c93e 100644
--- a/ipaserver/install/server/replicainstall.py
+++ b/ipaserver/install/server/replicainstall.py
@@ -236,9 +236,12 @@ def create_ipa_conf(fstore, config, ca_enabled, master=None):
gopts.extend([
ipaconf.setOption('enable_ra', 'True'),
ipaconf.setOption('ra_plugin', 'dogtag'),
- ipaconf.setOption('dogtag_version', '10'),
- ipaconf.setOption('ca_host', config.ca_host_name)
+ ipaconf.setOption('dogtag_version', '10')
])
+
+ if not config.setup_ca:
+ gopts.append(ipaconf.setOption('ca_host', config.ca_host_name))
+
else:
gopts.extend([
ipaconf.setOption('enable_ra', 'False'),
--
2.17.1