2
0
mirror of https://github.com/xcat2/confluent.git synced 2024-11-22 01:22:00 +00:00

Begin work on a sanity checker

Check various facets that are frequently not quite right, making
recommendations on how to correct.
This commit is contained in:
Jarrod Johnson 2022-08-30 16:59:40 -04:00
parent 908e51221c
commit 99a5c454ba

114
misc/checkconfluent Normal file
View File

@ -0,0 +1,114 @@
#!/usr/bin/python3
# frequent problems to check/repair
# confluent_uuid mismatch from /var/lib/confluent/public/site
# repair would be to set the uuid global to match filesystem for least disruptive change
# local certificate is missing some addresses
# repair is osdeploy initialize -t
# automation and/or ca certificates are somehow not viable
# This may be simple as file not exist or exist but can't be decrypted, or something about the ssh-agent in confluent isn't working
# avoid regenerating ssh ca when not needed, people tend to repeat initialize and this needs to be made harmless. Instruct user to delete the file if they truly
#want to start over.
#
#
import os
import socket
import glob
import ssl
import sys
import confluent.certutil as certutil
import confluent.config.configmanager as configmanager
def emprint(txt):
if sys.stdout.isatty():
print('\x1b[1m\x1b[4m' + txt + '\x1b[0m')
else:
print(txt)
def deployment_configured():
return os.path.exists('/var/lib/confluent/public/site/confluent_uuid')
def webserver_listening():
try:
conn = socket.create_connection(('localhost', 443))
return conn
except Exception:
return False
def certificates_missing_ips(conn):
# check if the tls can verify by the right CAs, then further
# check if all ip addresses are in the certificate offered
ctx = ssl.SSLContext(ssl.PROTOCOL_TLS_CLIENT)
ctx.check_hostname = False
for cacert in glob.glob('/var/lib/confluent/public/site/tls/*.pem'):
ctx.load_verify_locations(cacert)
sock = ctx.wrap_socket(conn)
crt = sock.getpeercert()
sans = crt.get('subjectAltName', [])
ips = certutil.get_ip_addresses()
missing_ips = []
for ip in ips:
for san in sans:
field, val = san
if val[-1] == '\n':
val = val[:-1]
if ':' in val:
# must normalize ipv6 to a sane value
val = socket.getaddrinfo(val, 443, type=socket.SOCK_STREAM)[0][-1][0]
if ip == 'val':
break
else:
missing_ips.append(ip)
return missing_ips
def is_ipv6_enabled():
# check for ability to create AF_INET6, for kernel disabled ipv6
pass
# for every interface with an ipv4 address, check if there's an fe80 as well
# warn that os deployment and discovery services may be impacted for afflicted
# interface
# check ssh sanity, are there automation keys and ca keys? can the configmanager
# keys unlock them?
# check for pxe support, tftp transfer of ipxe file
# check for http access to confluent-public, use site.cpio as file to check?
# check for deployment.useinsecureprotocols=firmware
def uuid_matches():
with open('/var/lib/confluent/public/site/confluent_uuid', 'r') as uuidf:
fsuuid = uuidf.read()
dbuuid = configmanger.get_global('confluent_uuid')
return dbuuid == fsuuid:
#TODO: osdeploy initialize needs to resync from filesystem at some point,
#if not confluentuuid:
# confluentuuid = str(uuid.uuid4())
# configmanager.set_global('confluent_uuid', confluentuuid)
if __name__ == '__main__':
if deployment_configured():
print("OS Deployment: Initialized")
if not uuid_matches():
#TODO: need a resolution to suggest
emprint('UUID inconsistent between confluent database and /var/lib/confluent')
conn = webserver_listening()
if conn:
cert = certificates_missing_ips(conn)
if cert:
for addr in cert:
emprint('Address missing from certificate: {0}'.format(addr))
emprint('Example resolution: osdeploy initialize -t')
else:
emprint("Web Server: Not Running")
emprint("Example resolution: systemctl enable httpd --now")
else:
print("OS Deployment: Uninitialized")
print()