[Freeipa-devel] [PATCH 0018] Make service naming in ipa-server-install consistent
Tomas Babej
tbabej at redhat.com
Thu Oct 11 10:26:12 UTC 2012
Hi,
This patch forces more consistency into ipa-server-install output. All
descriptions of services that are not instances of
SimpleServiceInstance are now in the following format:
<Description> (<Service Name>)
Furthermore, start_creation method has been modified to support
custom start and end messages.
Sample output produced by this patch attached.
https://fedorahosted.org/freeipa/ticket/3059
Tomas
-------------- next part --------------
A non-text attachment was scrubbed...
Name: freeipa-tbabej-0018-Make-service-naming-in-ipa-server-install-consistent.patch
Type: text/x-patch
Size: 9920 bytes
Desc: not available
URL: <http://listman.redhat.com/archives/freeipa-devel/attachments/20121011/45e1f22b/attachment.bin>
-------------- next part --------------
The log file for this installation can be found in /var/log/ipaserver-install.log
==============================================================================
This program will set up the FreeIPA Server.
This includes:
* Configure a stand-alone CA (dogtag) for certificate management
* Configure the Network Time Daemon (ntpd)
* Create and configure an instance of Directory Server
* Create and configure a Kerberos Key Distribution Center (KDC)
* Configure Apache (httpd)
* Configure DNS (bind)
To accept the default shown in brackets, press the Enter key.
Warning: skipping DNS resolution of host vm-116.idm.lab.bos.redhat.com
The domain name has been determined based on the host name.
Using reverse zone 78.16.10.in-addr.arpa.
The IPA Master Server will be configured with:
Hostname: vm-116.idm.lab.bos.redhat.com
IP address: 10.16.78.116
Domain name: idm.lab.bos.redhat.com
Realm name: IDM.LAB.BOS.REDHAT.COM
BIND DNS server will be configured to serve IPA domain with:
Forwarders: 10.16.255.2
Reverse zone: 78.16.10.in-addr.arpa.
Configuring NTP daemon (ntpd)
[1/4]: stopping ntpd
[2/4]: writing configuration
[3/4]: configuring ntpd to start on boot
[4/4]: starting ntpd
Done configuring NTP daemon (ntpd).
Configuring directory server for the CA (pkids): Estimated time 30 seconds
[1/3]: creating directory server user
[2/3]: creating directory server instance
[3/3]: restarting directory server
Done configuring directory server for the CA (pkids).
Configuring directory server for the CA (pki-cad): Estimated time 3 minutes 30 seconds
[1/21]: creating certificate server user
[2/21]: creating pki-ca instance
[3/21]: configuring certificate server instance
[4/21]: disabling nonces
[5/21]: creating CA agent PKCS#12 file in /root
[6/21]: creating RA agent certificate database
[7/21]: importing CA chain to RA certificate database
[8/21]: fixing RA database permissions
[9/21]: setting up signing cert profile
[10/21]: set up CRL publishing
[11/21]: set certificate subject base
[12/21]: enabling Subject Key Identifier
[13/21]: setting audit signing renewal to 2 years
[14/21]: configuring certificate server to start on boot
[15/21]: restarting certificate server
[16/21]: requesting RA certificate from CA
[17/21]: issuing RA agent certificate
[18/21]: adding RA agent as a trusted user
[19/21]: configure certificate renewals
[20/21]: configure Server-Cert certificate renewal
[21/21]: Configure HTTP to proxy connections
Done configuring directory server for the CA (pki-cad).
Configuring directory server (dirsrv): Estimated time 1 minute
[1/36]: creating directory server user
[2/36]: creating directory server instance
[3/36]: adding default schema
[4/36]: enabling memberof plugin
[5/36]: enabling winsync plugin
[6/36]: configuring replication version plugin
[7/36]: enabling IPA enrollment plugin
[8/36]: enabling ldapi
[9/36]: configuring uniqueness plugin
[10/36]: configuring uuid plugin
[11/36]: configuring modrdn plugin
[12/36]: enabling entryUSN plugin
[13/36]: configuring lockout plugin
[14/36]: creating indices
[15/36]: enabling referential integrity plugin
[16/36]: configuring ssl for ds instance
[17/36]: configuring certmap.conf
[18/36]: configure autobind for root
[19/36]: configure new location for managed entries
[20/36]: restarting directory server
[21/36]: adding default layout
[22/36]: adding delegation layout
[23/36]: adding replication acis
[24/36]: creating container for managed entries
[25/36]: configuring user private groups
[26/36]: configuring netgroups from hostgroups
[27/36]: creating default Sudo bind user
[28/36]: creating default Auto Member layout
[29/36]: adding range check plugin
[30/36]: creating default HBAC rule allow_all
[31/36]: initializing group membership
[32/36]: adding master entry
[33/36]: configuring Posix uid/gid generation
[34/36]: enabling compatibility plugin
[35/36]: tuning directory server
[36/36]: configuring directory to start on boot
Done configuring directory server (dirsrv).
Configuring Kerberos KDC (krb5kdc): Estimated time 30 seconds
[1/10]: adding sasl mappings to the directory
[2/10]: adding kerberos container to the directory
[3/10]: configuring KDC
[4/10]: initialize kerberos container
[5/10]: adding default ACIs
[6/10]: creating a keytab for the directory
[7/10]: creating a keytab for the machine
[8/10]: adding the password extension to the directory
[9/10]: starting the KDC
[10/10]: configuring KDC to start on boot
Done configuring Kerberos KDC (krb5kdc).
Configuring kadmin
[1/2]: starting kadmin
[2/2]: configuring kadmin to start on boot
Done.
Configuring ipa_memcached
[1/2]: starting ipa_memcached
[2/2]: configuring ipa_memcached to start on boot
Done.
Configuring the web interface (httpd): Estimated time 1 minute
[1/14]: disabling mod_ssl in httpd
[2/14]: setting mod_nss port to 443
[3/14]: setting mod_nss password file
[4/14]: enabling mod_nss renegotiate
[5/14]: adding URL rewriting rules
[6/14]: configuring httpd
[7/14]: setting up ssl
[8/14]: setting up browser autoconfig
[9/14]: publish CA cert
[10/14]: creating a keytab for httpd
[11/14]: clean up any existing httpd ccache
[12/14]: configuring SELinux for httpd
[13/14]: restarting httpd
[14/14]: configuring httpd to start on boot
Done configuring the web interface (httpd).
Applying LDAP updates
Restarting the directory server
Restarting the KDC
Configuring DNS (named)
[1/9]: adding DNS container
[2/9]: setting up our zone
[3/9]: setting up reverse zone
[4/9]: setting up our own record
[5/9]: setting up kerberos principal
[6/9]: setting up named.conf
[7/9]: restarting named
[8/9]: configuring named to start on boot
[9/9]: changing resolv.conf to point to ourselves
Done configuring DNS (named).
Global DNS configuration in LDAP server is empty
You can use 'dnsconfig-mod' command to set global DNS options that
would override settings in local named.conf files
Restarting the web server
==============================================================================
Setup complete
Next steps:
1. You must make sure these network ports are open:
TCP Ports:
* 80, 443: HTTP/HTTPS
* 389, 636: LDAP/LDAPS
* 88, 464: kerberos
* 53: bind
UDP Ports:
* 88, 464: kerberos
* 53: bind
* 123: ntp
2. You can now obtain a kerberos ticket using the command: 'kinit admin'
This ticket will allow you to use the IPA tools (e.g., ipa user-add)
and the web user interface.
Be sure to back up the CA certificate stored in /root/cacert.p12
This file is required to create replicas. The password for this
file is the Directory Manager password
Password for admin at IDM.LAB.BOS.REDHAT.COM:
More information about the Freeipa-devel
mailing list