Pino Toscano
2020-May-04 13:22 UTC
[Libguestfs] [PATCH 0/4] sysprep: add FreeIPA offline unenrollment (RHBZ#1789592)
This patch series adds a new virt-sysprep operation to offline unenroll a guest from FreeIPA. It does so by removing some configuration files and certificates. It requires a change in libguestfs-common before the series is applied. Pino Toscano (4): customize: port do_run to run_in_guest_command sysprep: add a update_system_ca_store side effect sysprep: ca-certificates: request system CA store update sysprep: add FreeIPA offline unenrollment (RHBZ#1789592) customize/customize_run.ml | 48 ++------------ sysprep/Makefile.am | 1 + sysprep/main.ml | 5 ++ sysprep/sysprep_operation.ml | 3 + sysprep/sysprep_operation.mli | 2 + sysprep/sysprep_operation_ca_certificates.ml | 8 ++- sysprep/sysprep_operation_unenroll_freeipa.ml | 65 +++++++++++++++++++ sysprep/utils.ml | 32 +++++++++ sysprep/utils.mli | 4 ++ 9 files changed, 126 insertions(+), 42 deletions(-) create mode 100644 sysprep/sysprep_operation_unenroll_freeipa.ml -- 2.25.4
Pino Toscano
2020-May-04 13:22 UTC
[Libguestfs] [PATCH 1/4] customize: port do_run to run_in_guest_command
Make use of the new helper function in Tools_utils to run commands in the guest. --- customize/customize_run.ml | 48 ++++++-------------------------------- 1 file changed, 7 insertions(+), 41 deletions(-) diff --git a/customize/customize_run.ml b/customize/customize_run.ml index 3eacdaca0..f2ee20413 100644 --- a/customize/customize_run.ml +++ b/customize/customize_run.ml @@ -30,12 +30,6 @@ open Append_line module G = Guestfs let run (g : G.guestfs) root (ops : ops) - (* Is the host_cpu compatible with the guest arch? ie. Can we - * run commands in this guest? - *) - let guest_arch = g#inspect_get_arch root in - let guest_arch_compatible = guest_arch_compatible guest_arch in - (* Based on the guest type, choose a log file location. *) let logfile match g#inspect_get_type root with @@ -54,42 +48,14 @@ let run (g : G.guestfs) root (ops : ops) (* Useful wrapper for scripts. *) let do_run ~display ?(warn_failed_no_network = false) cmd - if not guest_arch_compatible then + let incompatible_fn () + let guest_arch = g#inspect_get_arch root in error (f_"host cpu (%s) and guest arch (%s) are not compatible, so you cannot use command line options that involve running commands in the guest. Use --firstboot scripts instead.") - Guestfs_config.host_cpu guest_arch; - - (* Add a prologue to the scripts: - * - Pass environment variables through from the host. - * - Send stdout and stderr to a log file so we capture all output - * in error messages. - * - Use setarch when running x86_64 host + i686 guest. - * Also catch errors and dump the log file completely on error. - *) - let env_vars - List.filter_map ( - fun name -> - try Some (sprintf "export %s=%s" name (quote (Sys.getenv name))) - with Not_found -> None - ) [ "http_proxy"; "https_proxy"; "ftp_proxy"; "no_proxy" ] in - let env_vars = String.concat "\n" env_vars ^ "\n" in - - let cmd - match Guestfs_config.host_cpu, guest_arch with - | "x86_64", ("i386"|"i486"|"i586"|"i686") -> - sprintf "setarch i686 <<\"__EOCMD\" -%s -__EOCMD -" cmd - | _ -> cmd in - - let cmd = sprintf "\ -exec >>%s 2>&1 -%s -%s -" (quote logfile) env_vars cmd in - - debug "running command:\n%s" cmd; - try ignore (g#sh cmd) + Guestfs_config.host_cpu guest_arch + in + + try + run_in_guest_command g root ~logfile ~incompatible_fn cmd with G.Error msg -> debug_logfile (); -- 2.25.4
Pino Toscano
2020-May-04 13:22 UTC
[Libguestfs] [PATCH 2/4] sysprep: add a update_system_ca_store side effect
Add a simple side effect to make operation flag that a regeneration of the system CA store is needed. In case it is flagged, regenerate the system CA store directly, or using a firstboot script in case of incompatible architectures. This change is almost a no-op, since no operation requires the regeneration of the system CA store yet. --- sysprep/main.ml | 5 +++++ sysprep/sysprep_operation.ml | 3 +++ sysprep/sysprep_operation.mli | 2 ++ sysprep/utils.ml | 32 ++++++++++++++++++++++++++++++++ sysprep/utils.mli | 4 ++++ 5 files changed, 46 insertions(+) diff --git a/sysprep/main.ml b/sysprep/main.ml index db2388cfa..087d1a17f 100644 --- a/sysprep/main.ml +++ b/sysprep/main.ml @@ -25,6 +25,7 @@ open Common_gettext.Gettext open Getopt.OptionName open Sysprep_operation +open Utils module G = Guestfs @@ -236,6 +237,10 @@ read the man page virt-sysprep(1). Sysprep_operation.perform_operations_on_filesystems ?operations g root side_effects; + (* Do we need to update the system CA store? *) + if side_effects#get_update_system_ca_store then + update_system_ca_store g root; + (* Unmount everything in this guest. *) g#umount_all (); diff --git a/sysprep/sysprep_operation.ml b/sysprep/sysprep_operation.ml index 0013ff504..53f042402 100644 --- a/sysprep/sysprep_operation.ml +++ b/sysprep/sysprep_operation.ml @@ -27,10 +27,13 @@ class filesystem_side_effects object val mutable m_created_file = false val mutable m_changed_file = false + val mutable m_update_system_ca_store = false method created_file () = m_created_file <- true method get_created_file = m_created_file method changed_file () = m_changed_file <- true method get_changed_file = m_changed_file + method update_system_ca_store () = m_update_system_ca_store <- true + method get_update_system_ca_store = m_update_system_ca_store end class device_side_effects = object end diff --git a/sysprep/sysprep_operation.mli b/sysprep/sysprep_operation.mli index 3d9f12550..2a02d5e79 100644 --- a/sysprep/sysprep_operation.mli +++ b/sysprep/sysprep_operation.mli @@ -23,6 +23,8 @@ class filesystem_side_effects : object method get_created_file : bool method changed_file : unit -> unit method get_changed_file : bool + method update_system_ca_store : unit -> unit + method get_update_system_ca_store : bool end (** The callback should indicate if it has side effects by calling methods in this class. *) diff --git a/sysprep/utils.ml b/sysprep/utils.ml index 4c45d42de..29460b3c0 100644 --- a/sysprep/utils.ml +++ b/sysprep/utils.ml @@ -20,6 +20,9 @@ open Printf +open Tools_utils +open Common_gettext.Gettext + let rec pod_of_list ?(style = `Dot) xs match style with | `Verbatim -> String.concat "\n" (List.map ((^) " ") xs) @@ -31,3 +34,32 @@ and _pod_of_list delim xs "=over 4\n\n" ^ String.concat "" (List.map (sprintf "=item %s\n\n%s\n\n" delim) xs) ^ "=back" + +let rec update_system_ca_store g root + let cmd = update_system_ca_store_command g root in + match cmd with + | None -> () + | Some cmd -> + (* Try to run the command directly if possible, adding it as + * firstboot script in case of incompatible architectures. + *) + let cmd = String.concat " " cmd in + let incompatible_fn () + Firstboot.add_firstboot_script g root cmd cmd + in + + run_in_guest_command g root ~incompatible_fn cmd + +and update_system_ca_store_command g root + let typ = g#inspect_get_type root in + let distro = g#inspect_get_distro root in + match typ, distro with + | "linux", ("fedora"|"rhel"|"centos"|"scientificlinux"|"oraclelinux"|"redhat-based") -> + Some [ "update-ca-trust"; "extract" ] + + | "linux", ("debian"|"ubuntu"|"kalilinux") -> + Some [ "update-ca-certificates" ] + + | _, _ -> + warning (f_"updating the system CA store on this guest %s/%s is not supported") typ distro; + None diff --git a/sysprep/utils.mli b/sysprep/utils.mli index a57a0d876..82779620e 100644 --- a/sysprep/utils.mli +++ b/sysprep/utils.mli @@ -26,3 +26,7 @@ val pod_of_list : ?style:[`Verbatim|`Star|`Dash|`Dot] -> string list -> string use a space-indented (verbatim) block. [`Star], [`Dash] or [`Dot] meaning use a real list with [*], [-] or [·]. The default style is [·] ([`Dot]). *) + +val update_system_ca_store : Guestfs.guestfs -> string -> unit +(** Update the system CA store on the guest for the specified root + (which is fully mounted). *) -- 2.25.4
Pino Toscano
2020-May-04 13:22 UTC
[Libguestfs] [PATCH 3/4] sysprep: ca-certificates: request system CA store update
In case any certificate is removed from the guest, regenerate the system CA store. --- sysprep/sysprep_operation_ca_certificates.ml | 8 +++++++- 1 file changed, 7 insertions(+), 1 deletion(-) diff --git a/sysprep/sysprep_operation_ca_certificates.ml b/sysprep/sysprep_operation_ca_certificates.ml index e481cebf8..a2b7986c1 100644 --- a/sysprep/sysprep_operation_ca_certificates.ml +++ b/sysprep/sysprep_operation_ca_certificates.ml @@ -39,7 +39,11 @@ let ca_certificates_perform (g : Guestfs.guestfs) root side_effects let set = StringSet.diff set excepts in StringSet.iter ( fun filename -> - try g#rm filename with G.Error _ -> () + try + g#rm filename; + side_effects#update_system_ca_store () + with + G.Error _ -> () ) set ) @@ -48,6 +52,8 @@ let op = { name = "ca-certificates"; enabled_by_default = false; heading = s_"Remove CA certificates in the guest"; + pod_description = Some (s_"\ +In case any certificate is removed, the system CA store is updated."); perform_on_filesystems = Some ca_certificates_perform; } -- 2.25.4
Pino Toscano
2020-May-04 13:22 UTC
[Libguestfs] [PATCH 4/4] sysprep: add FreeIPA offline unenrollment (RHBZ#1789592)
This new operation unenrolls the guest from a FreeIPA server offline, by removing the configuration files and certificates. Thanks to Christian Heimes for the hints. --- sysprep/Makefile.am | 1 + sysprep/sysprep_operation_unenroll_freeipa.ml | 65 +++++++++++++++++++ 2 files changed, 66 insertions(+) create mode 100644 sysprep/sysprep_operation_unenroll_freeipa.ml diff --git a/sysprep/Makefile.am b/sysprep/Makefile.am index 451a3478f..30254c717 100644 --- a/sysprep/Makefile.am +++ b/sysprep/Makefile.am @@ -66,6 +66,7 @@ operations = \ sssd_db_log \ tmp_files \ udev_persistent_net \ + unenroll_freeipa \ user_account \ utmp yum_uuid diff --git a/sysprep/sysprep_operation_unenroll_freeipa.ml b/sysprep/sysprep_operation_unenroll_freeipa.ml new file mode 100644 index 000000000..5dd2bcc61 --- /dev/null +++ b/sysprep/sysprep_operation_unenroll_freeipa.ml @@ -0,0 +1,65 @@ +(* virt-sysprep + * Copyright (C) 2020 Red Hat Inc. + * + * This program is free software; you can redistribute it and/or modify + * it under the terms of the GNU General Public License as published by + * the Free Software Foundation; either version 2 of the License, or + * (at your option) any later version. + * + * This program is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * GNU General Public License for more details. + * + * You should have received a copy of the GNU General Public License along + * with this program; if not, write to the Free Software Foundation, Inc., + * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. + *) + +open Sysprep_operation +open Common_gettext.Gettext + +module G = Guestfs + +let unenroll_freeipa_perform (g : Guestfs.guestfs) root side_effects + let typ = g#inspect_get_type root in + if typ = "linux" then ( + (* Simple paths with no side effects. *) + let paths = [ "/etc/ipa/ca.crt"; + "/etc/ipa/default.conf"; + "/var/lib/ipa-client/sysrestore/*"; + "/var/lib/ipa-client/pki/*" ] in + let paths = List.concat (List.map Array.to_list (List.map g#glob_expand paths)) in + List.iter ( + fun filename -> + try g#rm filename with G.Error _ -> () + ) paths; + + (* Certificates in the system CA store. *) + let certs = [ "/etc/pki/ca-trust/source/anchors/ipa-ca.crt"; + "/usr/local/share/ca-certificates/ipa-ca.crt"; + "/etc/pki/ca-trust/source/ipa.p11-kit" ] in + List.iter ( + fun filename -> + try + g#rm filename; + side_effects#update_system_ca_store () + with + G.Error _ -> () + ) certs + ) + +let op = { + defaults with + name = "unenroll-freeipa"; + enabled_by_default = true; + heading = s_"Offline unenroll the guest from FreeIPA"; + pod_description = Some (s_"\ +Unenroll the guest from FreeIPA, reverting and cleaning up the local +server settings only, without interacting with the FreeIPA server. + +This operation does not run C<ipa-client>."); + perform_on_filesystems = Some unenroll_freeipa_perform; +} + +let () = register_operation op -- 2.25.4
Pino Toscano
2020-May-04 13:41 UTC
Re: [Libguestfs] [PATCH 0/4] sysprep: add FreeIPA offline unenrollment (RHBZ#1789592)
On Monday, 4 May 2020 15:22:10 CEST Pino Toscano wrote:> It requires a change in libguestfs-common before the series is applied.https://www.redhat.com/archives/libguestfs/2020-May/msg00016.html which I failed to group in the same thread... -- Pino Toscano
Richard W.M. Jones
2020-May-04 15:34 UTC
Re: [Libguestfs] [PATCH 4/4] sysprep: add FreeIPA offline unenrollment (RHBZ#1789592)
So with the proviso that I don't know much about freeipa, this code still all looks sensible to me, and therefore: ACK Thanks, Rich. -- Richard Jones, Virtualization Group, Red Hat http://people.redhat.com/~rjones Read my programming and virtualization blog: http://rwmj.wordpress.com virt-builder quickly builds VMs from scratch http://libguestfs.org/virt-builder.1.html
Pino Toscano
2020-May-26 09:05 UTC
Re: [Libguestfs] [PATCH 4/4] sysprep: add FreeIPA offline unenrollment (RHBZ#1789592)
On Monday, 4 May 2020 15:22:14 CEST Pino Toscano wrote:> This new operation unenrolls the guest from a FreeIPA server offline, by > removing the configuration files and certificates. > > Thanks to Christian Heimes for the hints. > --- > sysprep/Makefile.am | 1 + > sysprep/sysprep_operation_unenroll_freeipa.ml | 65 +++++++++++++++++++ > 2 files changed, 66 insertions(+) > create mode 100644 sysprep/sysprep_operation_unenroll_freeipa.mlFollowing the feedback of Christian and François, this operation was renamed to "ipa-client", and pushed. -- Pino Toscano
Possibly Parallel Threads
- [PATCH v2 0/2] add FreeIPA offline unenrollment (RHBZ#1789592)
- [PATCH 4/4] sysprep: add FreeIPA offline unenrollment (RHBZ#1789592)
- [PATCH 1/2] sysprep: remove ca certificates in the guest
- [common PATCH] mltools: add run_in_guest_command helper
- [PATCH 1/2] sysprep: Update comments.