[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[dak/master] Remove dak/import_ldap_fingerprints.py



Importing fingerprints from LDAP is now handled by import-keyring.
---
 dak/dak.py                      |    2 -
 dak/import_ldap_fingerprints.py |  236 ---------------------------------------
 daklib/regexes.py               |    4 -
 3 files changed, 242 deletions(-)
 delete mode 100755 dak/import_ldap_fingerprints.py

diff --git a/dak/dak.py b/dak/dak.py
index 55f9c37..1463d5d 100755
--- a/dak/dak.py
+++ b/dak/dak.py
@@ -123,8 +123,6 @@ def init():
          "Import existing source and binary packages"),
         ("import-keyring",
          "Populate fingerprint/uid table based on a new/updated keyring"),
-        ("import-ldap-fingerprints",
-         "Syncs fingerprint and uid tables with Debian LDAP db"),
         ("import-users-from-passwd",
          "Sync PostgreSQL users with passwd file"),
         ("acl",
diff --git a/dak/import_ldap_fingerprints.py b/dak/import_ldap_fingerprints.py
deleted file mode 100755
index 0c2a7bd..0000000
--- a/dak/import_ldap_fingerprints.py
+++ /dev/null
@@ -1,236 +0,0 @@
-#!/usr/bin/env python
-
-""" Sync fingerprint and uid tables with a debian.org LDAP DB """
-# Copyright (C) 2003, 2004, 2006  James Troup <james@nocrew.org>
-
-# This program is free software; you can redistribute it and/or modify
-# it under the terms of the GNU General Public License as published by
-# the Free Software Foundation; either version 2 of the License, or
-# (at your option) any later version.
-
-# This program is distributed in the hope that it will be useful,
-# but WITHOUT ANY WARRANTY; without even the implied warranty of
-# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
-# GNU General Public License for more details.
-
-# You should have received a copy of the GNU General Public License
-# along with this program; if not, write to the Free Software
-# Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA  02111-1307  USA
-
-################################################################################
-
-# <elmo>  ping@debian.org ?
-# <aj>    missing@ ? wtfru@ ?
-# <elmo>  giggle
-# <elmo>  I like wtfru
-# <aj>    all you have to do is retrofit wtfru into an acronym and no one
-#         could possibly be offended!
-# <elmo>  aj: worried terriers for russian unity ?
-# <aj>    uhhh
-# <aj>    ooookkkaaaaay
-# <elmo>  wthru is a little less offensive maybe?  but myabe that's
-#         just because I read h as heck, not hell
-# <elmo>  ho hum
-# <aj>    (surely the "f" stands for "freedom" though...)
-# <elmo>  where the freedom are you?
-# <aj>    'xactly
-# <elmo>  or worried terriers freed (of) russian unilateralism ?
-# <aj>    freedom -- it's the "foo" of the 21st century
-# <aj>    oo, how about "wat@" as in wherefore art thou?
-# <neuro> or worried attack terriers
-# <aj>    Waning Trysts Feared - Return? Unavailable?
-# <aj>    (i find all these terriers more worrying, than worried)
-# <neuro> worrying attack terriers, then
-
-################################################################################
-
-import commands, ldap, sys
-import apt_pkg
-
-from daklib.config import Config
-from daklib.dbconn import *
-from daklib import utils
-from daklib.regexes import re_gpg_fingerprint, re_debian_address
-
-################################################################################
-
-def usage(exit_code=0):
-    print """Usage: dak import-ldap-fingerprints
-Syncs fingerprint and uid tables with a debian.org LDAP DB
-
-  -h, --help                show this help and exit."""
-    sys.exit(exit_code)
-
-################################################################################
-
-def get_ldap_value(entry, value):
-    ret = entry.get(value)
-    if not ret or ret[0] == "" or ret[0] == "-":
-        return ""
-    else:
-        # FIXME: what about > 0 ?
-        return ret[0] + " "
-
-def get_ldap_name(entry):
-    name = get_ldap_value(entry, "cn")
-    name += get_ldap_value(entry, "mn")
-    name += get_ldap_value(entry, "sn")
-    return name.rstrip()
-
-def main():
-    cnf = Config()
-    Arguments = [('h',"help","Import-LDAP-Fingerprints::Options::Help")]
-    for i in [ "help" ]:
-        if not cnf.has_key("Import-LDAP-Fingerprints::Options::%s" % (i)):
-            cnf["Import-LDAP-Fingerprints::Options::%s" % (i)] = ""
-
-    apt_pkg.parse_commandline(cnf.Cnf, Arguments, sys.argv)
-
-    Options = cnf.subtree("Import-LDAP-Fingerprints::Options")
-    if Options["Help"]:
-        usage()
-
-    session = DBConn().session()
-
-    LDAPDn = cnf["Import-LDAP-Fingerprints::LDAPDn"]
-    LDAPServer = cnf["Import-LDAP-Fingerprints::LDAPServer"]
-    l = ldap.open(LDAPServer)
-    l.simple_bind_s("","")
-    Attrs = l.search_s(LDAPDn, ldap.SCOPE_ONELEVEL,
-                       "(&(keyfingerprint=*)(gidnumber=%s))" % (cnf["Import-Users-From-Passwd::ValidGID"]),
-                       ["uid", "keyfingerprint", "cn", "mn", "sn"])
-
-
-    # Our database session is already in a transaction
-
-    # Sync LDAP with DB
-    db_fin_uid = {}
-    db_uid_name = {}
-    ldap_fin_uid_id = {}
-    q = session.execute("""
-SELECT f.fingerprint, f.id, u.uid FROM fingerprint f, uid u WHERE f.uid = u.id
- UNION SELECT f.fingerprint, f.id, null FROM fingerprint f where f.uid is null""")
-    for i in q.fetchall():
-        (fingerprint, fingerprint_id, uid) = i
-        db_fin_uid[fingerprint] = (uid, fingerprint_id)
-
-    q = session.execute("SELECT id, name FROM uid")
-    for i in q.fetchall():
-        (uid, name) = i
-        db_uid_name[uid] = name
-
-    for i in Attrs:
-        entry = i[1]
-        fingerprints = entry["keyFingerPrint"]
-        uid_name = entry["uid"][0]
-        name = get_ldap_name(entry)
-        uid = get_or_set_uid(uid_name, session)
-        uid_id = uid.uid_id
-
-        if not db_uid_name.has_key(uid_id) or db_uid_name[uid_id] != name:
-            session.execute("UPDATE uid SET name = :name WHERE id = :uidid", {'name': name, 'uidid': uid_id})
-            print "Assigning name of %s as %s" % (uid_name, name)
-
-        for fingerprint in fingerprints:
-            ldap_fin_uid_id[fingerprint] = (uid_name, uid_id)
-            if db_fin_uid.has_key(fingerprint):
-                (existing_uid, fingerprint_id) = db_fin_uid[fingerprint]
-                if not existing_uid:
-                    session.execute("UPDATE fingerprint SET uid = :uidid WHERE id = :fprid",
-                                    {'uidid': uid_id, 'fprid': fingerprint_id})
-                    print "Assigning %s to 0x%s." % (uid_name, fingerprint)
-                elif existing_uid == uid_name:
-                    pass
-                elif '@' not in existing_uid:
-                    session.execute("UPDATE fingerprint SET uid = :uidid WHERE id = :fprid",
-                                    {'uidid': uid_id, 'fprid': fingerprint_id})
-                    print "Promoting DM %s to DD %s with keyid 0x%s." % (existing_uid, uid_name, fingerprint)
-                else:
-                    utils.warn("%s has %s in LDAP, but database says it should be %s." % \
-                               (uid_name, fingerprint, existing_uid))
-
-    # Try to update people who sign with non-primary key
-    q = session.execute("SELECT fingerprint, id FROM fingerprint WHERE uid is null")
-    for i in q.fetchall():
-        (fingerprint, fingerprint_id) = i
-        cmd = "gpg --no-default-keyring %s --fingerprint %s" \
-              % (utils.gpg_keyring_args(), fingerprint)
-        (result, output) = commands.getstatusoutput(cmd)
-        if result == 0:
-            m = re_gpg_fingerprint.search(output)
-            if not m:
-                print output
-                utils.fubar("0x%s: No fingerprint found in gpg output but it returned 0?\n%s" % \
-                            (fingerprint, utils.prefix_multi_line_string(output, " [GPG output:] ")))
-            primary_key = m.group(1)
-            primary_key = primary_key.replace(" ","")
-            if not ldap_fin_uid_id.has_key(primary_key):
-                utils.warn("0x%s (from 0x%s): no UID found in LDAP" % (primary_key, fingerprint))
-            else:
-                (uid, uid_id) = ldap_fin_uid_id[primary_key]
-                session.execute("UPDATE fingerprint SET uid = :uid WHERE id = :fprid",
-                                {'uid': uid_id, 'fprid': fingerprint_id})
-                print "Assigning %s to 0x%s." % (uid, fingerprint)
-        else:
-            extra_keyrings = ""
-            for keyring in cnf.value_list("Import-LDAP-Fingerprints::ExtraKeyrings"):
-                extra_keyrings += " --keyring=%s" % (keyring)
-            cmd = "gpg %s %s --list-key %s" \
-                  % (utils.gpg_keyring_args(), extra_keyrings, fingerprint)
-            (result, output) = commands.getstatusoutput(cmd)
-            if result != 0:
-                cmd = "gpg --keyserver=%s --allow-non-selfsigned-uid --recv-key %s" % (cnf["Import-LDAP-Fingerprints::KeyServer"], fingerprint)
-                (result, output) = commands.getstatusoutput(cmd)
-                if result != 0:
-                    print "0x%s: NOT found on keyserver." % (fingerprint)
-                    print cmd
-                    print result
-                    print output
-                    continue
-                else:
-                    cmd = "gpg --list-key %s" % (fingerprint)
-                    (result, output) = commands.getstatusoutput(cmd)
-                    if result != 0:
-                        print "0x%s: --list-key returned error after --recv-key didn't." % (fingerprint)
-                        print cmd
-                        print result
-                        print output
-                        continue
-            m = re_debian_address.search(output)
-            if m:
-                guess_uid = m.group(1)
-            else:
-                guess_uid = "???"
-            name = " ".join(output.split('\n')[0].split()[3:])
-            print "0x%s -> %s -> %s" % (fingerprint, name, guess_uid)
-
-            # FIXME: make me optionally non-interactive
-            # FIXME: default to the guessed ID
-            uid = None
-            while not uid:
-                uid = utils.our_raw_input("Map to which UID ? ")
-                Attrs = l.search_s(LDAPDn,ldap.SCOPE_ONELEVEL,"(uid=%s)" % (uid), ["cn","mn","sn"])
-                if not Attrs:
-                    print "That UID doesn't exist in LDAP!"
-                    uid = None
-                else:
-                    entry = Attrs[0][1]
-                    name = get_ldap_name(entry)
-                    prompt = "Map to %s - %s (y/N) ? " % (uid, name.replace("  "," "))
-                    yn = utils.our_raw_input(prompt).lower()
-                    if yn == "y":
-                        uid_o = get_or_set_uid(uid, session=session)
-                        uid_id = uid_o.uid_id
-                        session.execute("UPDATE fingerprint SET uid = :uidid WHERE id = :fprid",
-                                        {'uidid': uid_id, 'fprid': fingerprint_id})
-                        print "Assigning %s to 0x%s." % (uid, fingerprint)
-                    else:
-                        uid = None
-
-    # Commit it all
-    session.commit()
-
-############################################################
-
-if __name__ == '__main__':
-    main()
diff --git a/daklib/regexes.py b/daklib/regexes.py
index a810711..95cf352 100644
--- a/daklib/regexes.py
+++ b/daklib/regexes.py
@@ -90,10 +90,6 @@ re_spacestrip = re.compile('(\s)')
 # From import_archive.py
 re_arch_from_filename = re.compile(r"binary-[^/]+")
 
-# From import_ldap_fingerprints.py
-re_gpg_fingerprint = re.compile(r"^\s+Key fingerprint = (.*)$", re.MULTILINE)
-re_debian_address = re.compile(r"^.*<(.*)@debian\.org>$", re.MULTILINE)
-
 # From new_security_install.py
 re_taint_free = re.compile(r"^['/;\-\+\.~\s\w]+$")
 
-- 
1.7.10.4


Reply to: