From 70a6b787b2216603e788dc00c49aed63d5b20ad8 Mon Sep 17 00:00:00 2001 From: Ansgar Burchardt Date: Sun, 21 Jul 2013 22:05:09 +0200 Subject: [PATCH] Remove dak/import_ldap_fingerprints.py Importing fingerprints from LDAP is now handled by import-keyring. --- dak/dak.py | 2 - dak/import_ldap_fingerprints.py | 236 -------------------------------- daklib/regexes.py | 4 - 3 files changed, 242 deletions(-) delete mode 100755 dak/import_ldap_fingerprints.py diff --git a/dak/dak.py b/dak/dak.py index 55f9c37a..1463d5d2 100755 --- a/dak/dak.py +++ b/dak/dak.py @@ -123,8 +123,6 @@ def init(): "Import existing source and binary packages"), ("import-keyring", "Populate fingerprint/uid table based on a new/updated keyring"), - ("import-ldap-fingerprints", - "Syncs fingerprint and uid tables with Debian LDAP db"), ("import-users-from-passwd", "Sync PostgreSQL users with passwd file"), ("acl", diff --git a/dak/import_ldap_fingerprints.py b/dak/import_ldap_fingerprints.py deleted file mode 100755 index 0c2a7bd8..00000000 --- a/dak/import_ldap_fingerprints.py +++ /dev/null @@ -1,236 +0,0 @@ -#!/usr/bin/env python - -""" Sync fingerprint and uid tables with a debian.org LDAP DB """ -# Copyright (C) 2003, 2004, 2006 James Troup - -# This program is free software; you can redistribute it and/or modify -# it under the terms of the GNU General Public License as published by -# the Free Software Foundation; either version 2 of the License, or -# (at your option) any later version. - -# This program is distributed in the hope that it will be useful, -# but WITHOUT ANY WARRANTY; without even the implied warranty of -# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the -# GNU General Public License for more details. - -# You should have received a copy of the GNU General Public License -# along with this program; if not, write to the Free Software -# Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA - -################################################################################ - -# ping@debian.org ? -# missing@ ? wtfru@ ? -# giggle -# I like wtfru -# all you have to do is retrofit wtfru into an acronym and no one -# could possibly be offended! -# aj: worried terriers for russian unity ? -# uhhh -# ooookkkaaaaay -# wthru is a little less offensive maybe? but myabe that's -# just because I read h as heck, not hell -# ho hum -# (surely the "f" stands for "freedom" though...) -# where the freedom are you? -# 'xactly -# or worried terriers freed (of) russian unilateralism ? -# freedom -- it's the "foo" of the 21st century -# oo, how about "wat@" as in wherefore art thou? -# or worried attack terriers -# Waning Trysts Feared - Return? Unavailable? -# (i find all these terriers more worrying, than worried) -# worrying attack terriers, then - -################################################################################ - -import commands, ldap, sys -import apt_pkg - -from daklib.config import Config -from daklib.dbconn import * -from daklib import utils -from daklib.regexes import re_gpg_fingerprint, re_debian_address - -################################################################################ - -def usage(exit_code=0): - print """Usage: dak import-ldap-fingerprints -Syncs fingerprint and uid tables with a debian.org LDAP DB - - -h, --help show this help and exit.""" - sys.exit(exit_code) - -################################################################################ - -def get_ldap_value(entry, value): - ret = entry.get(value) - if not ret or ret[0] == "" or ret[0] == "-": - return "" - else: - # FIXME: what about > 0 ? - return ret[0] + " " - -def get_ldap_name(entry): - name = get_ldap_value(entry, "cn") - name += get_ldap_value(entry, "mn") - name += get_ldap_value(entry, "sn") - return name.rstrip() - -def main(): - cnf = Config() - Arguments = [('h',"help","Import-LDAP-Fingerprints::Options::Help")] - for i in [ "help" ]: - if not cnf.has_key("Import-LDAP-Fingerprints::Options::%s" % (i)): - cnf["Import-LDAP-Fingerprints::Options::%s" % (i)] = "" - - apt_pkg.parse_commandline(cnf.Cnf, Arguments, sys.argv) - - Options = cnf.subtree("Import-LDAP-Fingerprints::Options") - if Options["Help"]: - usage() - - session = DBConn().session() - - LDAPDn = cnf["Import-LDAP-Fingerprints::LDAPDn"] - LDAPServer = cnf["Import-LDAP-Fingerprints::LDAPServer"] - l = ldap.open(LDAPServer) - l.simple_bind_s("","") - Attrs = l.search_s(LDAPDn, ldap.SCOPE_ONELEVEL, - "(&(keyfingerprint=*)(gidnumber=%s))" % (cnf["Import-Users-From-Passwd::ValidGID"]), - ["uid", "keyfingerprint", "cn", "mn", "sn"]) - - - # Our database session is already in a transaction - - # Sync LDAP with DB - db_fin_uid = {} - db_uid_name = {} - ldap_fin_uid_id = {} - q = session.execute(""" -SELECT f.fingerprint, f.id, u.uid FROM fingerprint f, uid u WHERE f.uid = u.id - UNION SELECT f.fingerprint, f.id, null FROM fingerprint f where f.uid is null""") - for i in q.fetchall(): - (fingerprint, fingerprint_id, uid) = i - db_fin_uid[fingerprint] = (uid, fingerprint_id) - - q = session.execute("SELECT id, name FROM uid") - for i in q.fetchall(): - (uid, name) = i - db_uid_name[uid] = name - - for i in Attrs: - entry = i[1] - fingerprints = entry["keyFingerPrint"] - uid_name = entry["uid"][0] - name = get_ldap_name(entry) - uid = get_or_set_uid(uid_name, session) - uid_id = uid.uid_id - - if not db_uid_name.has_key(uid_id) or db_uid_name[uid_id] != name: - session.execute("UPDATE uid SET name = :name WHERE id = :uidid", {'name': name, 'uidid': uid_id}) - print "Assigning name of %s as %s" % (uid_name, name) - - for fingerprint in fingerprints: - ldap_fin_uid_id[fingerprint] = (uid_name, uid_id) - if db_fin_uid.has_key(fingerprint): - (existing_uid, fingerprint_id) = db_fin_uid[fingerprint] - if not existing_uid: - session.execute("UPDATE fingerprint SET uid = :uidid WHERE id = :fprid", - {'uidid': uid_id, 'fprid': fingerprint_id}) - print "Assigning %s to 0x%s." % (uid_name, fingerprint) - elif existing_uid == uid_name: - pass - elif '@' not in existing_uid: - session.execute("UPDATE fingerprint SET uid = :uidid WHERE id = :fprid", - {'uidid': uid_id, 'fprid': fingerprint_id}) - print "Promoting DM %s to DD %s with keyid 0x%s." % (existing_uid, uid_name, fingerprint) - else: - utils.warn("%s has %s in LDAP, but database says it should be %s." % \ - (uid_name, fingerprint, existing_uid)) - - # Try to update people who sign with non-primary key - q = session.execute("SELECT fingerprint, id FROM fingerprint WHERE uid is null") - for i in q.fetchall(): - (fingerprint, fingerprint_id) = i - cmd = "gpg --no-default-keyring %s --fingerprint %s" \ - % (utils.gpg_keyring_args(), fingerprint) - (result, output) = commands.getstatusoutput(cmd) - if result == 0: - m = re_gpg_fingerprint.search(output) - if not m: - print output - utils.fubar("0x%s: No fingerprint found in gpg output but it returned 0?\n%s" % \ - (fingerprint, utils.prefix_multi_line_string(output, " [GPG output:] "))) - primary_key = m.group(1) - primary_key = primary_key.replace(" ","") - if not ldap_fin_uid_id.has_key(primary_key): - utils.warn("0x%s (from 0x%s): no UID found in LDAP" % (primary_key, fingerprint)) - else: - (uid, uid_id) = ldap_fin_uid_id[primary_key] - session.execute("UPDATE fingerprint SET uid = :uid WHERE id = :fprid", - {'uid': uid_id, 'fprid': fingerprint_id}) - print "Assigning %s to 0x%s." % (uid, fingerprint) - else: - extra_keyrings = "" - for keyring in cnf.value_list("Import-LDAP-Fingerprints::ExtraKeyrings"): - extra_keyrings += " --keyring=%s" % (keyring) - cmd = "gpg %s %s --list-key %s" \ - % (utils.gpg_keyring_args(), extra_keyrings, fingerprint) - (result, output) = commands.getstatusoutput(cmd) - if result != 0: - cmd = "gpg --keyserver=%s --allow-non-selfsigned-uid --recv-key %s" % (cnf["Import-LDAP-Fingerprints::KeyServer"], fingerprint) - (result, output) = commands.getstatusoutput(cmd) - if result != 0: - print "0x%s: NOT found on keyserver." % (fingerprint) - print cmd - print result - print output - continue - else: - cmd = "gpg --list-key %s" % (fingerprint) - (result, output) = commands.getstatusoutput(cmd) - if result != 0: - print "0x%s: --list-key returned error after --recv-key didn't." % (fingerprint) - print cmd - print result - print output - continue - m = re_debian_address.search(output) - if m: - guess_uid = m.group(1) - else: - guess_uid = "???" - name = " ".join(output.split('\n')[0].split()[3:]) - print "0x%s -> %s -> %s" % (fingerprint, name, guess_uid) - - # FIXME: make me optionally non-interactive - # FIXME: default to the guessed ID - uid = None - while not uid: - uid = utils.our_raw_input("Map to which UID ? ") - Attrs = l.search_s(LDAPDn,ldap.SCOPE_ONELEVEL,"(uid=%s)" % (uid), ["cn","mn","sn"]) - if not Attrs: - print "That UID doesn't exist in LDAP!" - uid = None - else: - entry = Attrs[0][1] - name = get_ldap_name(entry) - prompt = "Map to %s - %s (y/N) ? " % (uid, name.replace(" "," ")) - yn = utils.our_raw_input(prompt).lower() - if yn == "y": - uid_o = get_or_set_uid(uid, session=session) - uid_id = uid_o.uid_id - session.execute("UPDATE fingerprint SET uid = :uidid WHERE id = :fprid", - {'uidid': uid_id, 'fprid': fingerprint_id}) - print "Assigning %s to 0x%s." % (uid, fingerprint) - else: - uid = None - - # Commit it all - session.commit() - -############################################################ - -if __name__ == '__main__': - main() diff --git a/daklib/regexes.py b/daklib/regexes.py index a8107113..95cf3523 100644 --- a/daklib/regexes.py +++ b/daklib/regexes.py @@ -90,10 +90,6 @@ re_spacestrip = re.compile('(\s)') # From import_archive.py re_arch_from_filename = re.compile(r"binary-[^/]+") -# From import_ldap_fingerprints.py -re_gpg_fingerprint = re.compile(r"^\s+Key fingerprint = (.*)$", re.MULTILINE) -re_debian_address = re.compile(r"^.*<(.*)@debian\.org>$", re.MULTILINE) - # From new_security_install.py re_taint_free = re.compile(r"^['/;\-\+\.~\s\w]+$") -- 2.39.2