def main(): ansible_module = AnsibleModule( argument_spec = dict( ), supports_check_mode = True, ) ansible_module._ansible_debug = True ansible_log = AnsibleModuleLog(ansible_module) # get parameters # with redirect_stdout(ansible_log): ansible_log.debug("-- CONFIGURE_CERTMONGER --") # FIXME: allow to use passed in certs instead configure_certmonger() # done # ansible_module.exit_json(changed=True)
def main(): ansible_module = AnsibleModule( argument_spec=dict( hostname=dict(required=False), hidden_replica=dict(required=False, type='bool', default=False), # server # certificate system subject_base=dict(required=True), # additional ccache=dict(required=True), _top_dir=dict(required=True), setup_ca=dict(required=True, type='bool'), setup_kra=dict(required=True, type='bool'), config_master_host_name=dict(required=True), ), supports_check_mode=True, ) ansible_module._ansible_debug = True ansible_log = AnsibleModuleLog(ansible_module) # get parameters # options = installer options.host_name = ansible_module.params.get('hostname') options.hidden_replica = ansible_module.params.get('hidden_replica') # server # certificate system options.subject_base = ansible_module.params.get('subject_base') if options.subject_base is not None: options.subject_base = DN(options.subject_base) # additional ccache = ansible_module.params.get('ccache') os.environ['KRB5CCNAME'] = ccache options._top_dir = ansible_module.params.get('_top_dir') options.setup_ca = ansible_module.params.get('setup_ca') options.setup_kra = ansible_module.params.get('setup_kra') config_master_host_name = ansible_module.params.get( 'config_master_host_name') # init # ansible_log.debug("== INSTALL ==") env = gen_env_boostrap_finalize_core(paths.ETC_IPA, constants.DEFAULT_CONFIG) api_bootstrap_finalize(env) config = gen_ReplicaConfig() remote_api = gen_remote_api(config_master_host_name, paths.ETC_IPA) installer._remote_api = remote_api ccache = os.environ['KRB5CCNAME'] api.Backend.ldap2.connect() with redirect_stdout(ansible_log): if options.hidden_replica: # Set services to hidden service.hide_services(config.host_name) else: # Enable configured services service.enable_services(config.host_name) # update DNS SRV records. Although it's only really necessary in # enabled-service case, also perform update in hidden replica case. api.Command.dns_update_system_records() ca_servers = find_providing_servers('CA', api.Backend.ldap2, api=api) api.Backend.ldap2.disconnect() # Everything installed properly, activate ipa service. services.knownservices.ipa.enable() # Print a warning if CA role is only installed on one server if len(ca_servers) == 1: msg = u''' WARNING: The CA service is only installed on one server ({}). It is strongly recommended to install it on another server. Run ipa-ca-install(1) on another master to accomplish this. '''.format(ca_servers[0]) ansible_module.debug(msg) # done # ansible_module.exit_json(changed=True)
def main(): ansible_module = AnsibleModule( argument_spec=dict( # server setup_kra=dict(required=False, type='bool'), setup_dns=dict(required=False, type='bool'), # certificate system subject_base=dict(required=True), # dns zonemgr=dict(required=False), forwarders=dict(required=False, type='list', default=[]), forward_policy=dict(default=None, choices=['first', 'only']), no_dnssec_validation=dict(required=False, type='bool', default=False), # additional dns_ip_addresses=dict(required=True, type='list'), dns_reverse_zones=dict(required=True, type='list'), ccache=dict(required=True), _top_dir=dict(required=True), setup_ca=dict(required=True, type='bool'), config_master_host_name=dict(required=True), ), supports_check_mode=True, ) ansible_module._ansible_debug = True setup_logging() ansible_log = AnsibleModuleLog(ansible_module) # get parameters # options = installer # server options.setup_kra = ansible_module.params.get('setup_kra') options.setup_dns = ansible_module.params.get('setup_dns') # certificate system options.subject_base = ansible_module.params.get('subject_base') if options.subject_base is not None: options.subject_base = DN(options.subject_base) # dns options.zonemgr = ansible_module.params.get('zonemgr') options.forwarders = ansible_module.params.get('forwarders') options.forward_policy = ansible_module.params.get('forward_policy') options.no_dnssec_validation = ansible_module.params.get( 'no_dnssec_validationdnssec_validation') # additional dns.ip_addresses = ansible_module_get_parsed_ip_addresses( ansible_module, 'dns_ip_addresses') dns.reverse_zones = ansible_module.params.get('dns_reverse_zones') ccache = ansible_module.params.get('ccache') os.environ['KRB5CCNAME'] = ccache options._top_dir = ansible_module.params.get('_top_dir') options.setup_ca = ansible_module.params.get('setup_ca') config_master_host_name = ansible_module.params.get( 'config_master_host_name') # init # ansible_log.debug("== INSTALL ==") env = gen_env_boostrap_finalize_core(paths.ETC_IPA, constants.DEFAULT_CONFIG) api_bootstrap_finalize(env) config = gen_ReplicaConfig() config.subject_base = options.subject_base config.master_host_name = config_master_host_name remote_api = gen_remote_api(config.master_host_name, paths.ETC_IPA) installer._remote_api = remote_api ccache = os.environ['KRB5CCNAME'] # There is a api.Backend.ldap2.connect call somewhere in ca, ds, dns or # ntpinstance api.Backend.ldap2.connect() with redirect_stdout(ansible_log): if options.setup_dns: ansible_log.debug("-- INSTALL DNS --") dns.install(False, True, options, api) else: ansible_log.debug("-- DNS UPDATE_SYSTEM_RECORDS --") api.Command.dns_update_system_records() # done # ansible_module.exit_json(changed=True)
def main(): ansible_module = AnsibleModule( argument_spec=dict( # basic dm_password=dict(required=False, no_log=True), password=dict(required=False, no_log=True), ip_addresses=dict(required=False, type='list', default=[]), domain=dict(required=False), realm=dict(required=False), hostname=dict(required=False), ca_cert_files=dict(required=False, type='list', default=[]), no_host_dns=dict(required=False, type='bool', default=False), # server setup_adtrust=dict(required=False, type='bool'), setup_ca=dict(required=False, type='bool'), setup_kra=dict(required=False, type='bool'), setup_dns=dict(required=False, type='bool'), # ssl certificate dirsrv_cert_files=dict(required=False, type='list', default=[]), # client force_join=dict(required=False, type='bool'), # certificate system subject_base=dict(required=True), # additional server=dict(required=True), config_master_host_name=dict(required=True), config_ca_host_name=dict(required=True), ccache=dict(required=True), installer_ccache=dict(required=True), _ca_enabled=dict(required=False, type='bool'), _top_dir=dict(required=True), _add_to_ipaservers=dict(required=True, type='bool'), _ca_subject=dict(required=True), _subject_base=dict(required=True), master=dict(required=False, default=None), dirman_password=dict(required=True, no_log=True), ), supports_check_mode=True, ) ansible_module._ansible_debug = True setup_logging() ansible_log = AnsibleModuleLog(ansible_module) # get parameters # options = installer options.dm_password = ansible_module.params.get('dm_password') options.password = options.dm_password options.admin_password = ansible_module.params.get('password') options.ip_addresses = ansible_module_get_parsed_ip_addresses( ansible_module) options.domain_name = ansible_module.params.get('domain') options.realm_name = ansible_module.params.get('realm') options.host_name = ansible_module.params.get('hostname') options.ca_cert_files = ansible_module.params.get('ca_cert_files') options.no_host_dns = ansible_module.params.get('no_host_dns') # server options.setup_adtrust = ansible_module.params.get('setup_adtrust') options.setup_ca = ansible_module.params.get('setup_ca') options.setup_kra = ansible_module.params.get('setup_kra') options.setup_dns = ansible_module.params.get('setup_dns') # ssl certificate options.dirsrv_cert_files = ansible_module.params.get('dirsrv_cert_files') # client options.force_join = ansible_module.params.get('force_join') # certificate system options.external_ca = ansible_module.params.get('external_ca') options.external_cert_files = ansible_module.params.get( 'external_cert_files') options.subject_base = ansible_module.params.get('subject_base') if options.subject_base is not None: options.subject_base = DN(options.subject_base) options.ca_subject = ansible_module.params.get('ca_subject') # additional # options._host_name_overridden = ansible_module.params.get( # '_hostname_overridden') options.server = ansible_module.params.get('server') master_host_name = ansible_module.params.get('config_master_host_name') ca_host_name = ansible_module.params.get('config_ca_host_name') ccache = ansible_module.params.get('ccache') os.environ['KRB5CCNAME'] = ccache # os.environ['KRB5CCNAME'] = ansible_module.params.get('installer_ccache') installer._ccache = ansible_module.params.get('installer_ccache') ca_enabled = ansible_module.params.get('_ca_enabled') options.subject_base = ansible_module.params.get('subject_base') if options.subject_base is not None: options.subject_base = DN(options.subject_base) options._top_dir = ansible_module.params.get('_top_dir') options._add_to_ipaservers = ansible_module.params.get( '_add_to_ipaservers') options._ca_subject = ansible_module.params.get('_ca_subject') options._subject_base = ansible_module.params.get('_subject_base') master = ansible_module.params.get('master') dirman_password = ansible_module.params.get('dirman_password') # init # fstore = sysrestore.FileStore(paths.SYSRESTORE) # prepare (install prepare, install checks) # ansible_log.debug("== INSTALL ==") options = installer promote = installer.promote env = gen_env_boostrap_finalize_core(paths.ETC_IPA, constants.DEFAULT_CONFIG) api_bootstrap_finalize(env) config = gen_ReplicaConfig() config.subject_base = options.subject_base config.dirman_password = dirman_password config.ca_host_name = ca_host_name remote_api = gen_remote_api(master_host_name, paths.ETC_IPA) installer._remote_api = remote_api ccache = os.environ['KRB5CCNAME'] if promote: ansible_log.debug("-- CREATE_IPA_CONF --") # Create the management framework config file. Do this irregardless # of the state of DS installation. Even if it fails, # we need to have master-like configuration in order to perform a # successful uninstallation # The configuration creation has to be here otherwise previous call # To config certmonger would try to connect to local server create_ipa_conf(fstore, config, ca_enabled, master) # done # ansible_module.exit_json(changed=True)
def main(): ansible_module = AnsibleModule( argument_spec=dict( # server setup_ca=dict(required=False, type='bool'), setup_kra=dict(required=False, type='bool'), no_pkinit=dict(required=False, type='bool'), no_ui_redirect=dict(required=False, type='bool'), # certificate system subject_base=dict(required=True), config_master_host_name=dict(required=True), config_ca_host_name=dict(required=True), ccache=dict(required=True), _ca_enabled=dict(required=False, type='bool'), _ca_file=dict(required=False), _http_pkcs12_info=dict(required=False), _top_dir=dict(required=True), dirman_password=dict(required=True, no_log=True), ), supports_check_mode=True, ) ansible_module._ansible_debug = True ansible_log = AnsibleModuleLog(ansible_module) # get parameters # options = installer options.setup_ca = ansible_module.params.get('setup_ca') options.setup_kra = ansible_module.params.get('setup_kra') options.no_pkinit = ansible_module.params.get('no_pkinit') options.no_ui_redirect = ansible_module.params.get('no_ui_redirect') # certificate system options.subject_base = ansible_module.params.get('subject_base') if options.subject_base is not None: options.subject_base = DN(options.subject_base) # additional master_host_name = ansible_module.params.get('config_master_host_name') ca_host_name = ansible_module.params.get('config_master_host_name') ccache = ansible_module.params.get('ccache') os.environ['KRB5CCNAME'] = ccache # os.environ['KRB5CCNAME'] = ansible_module.params.get('installer_ccache') # installer._ccache = ansible_module.params.get('installer_ccache') ca_enabled = ansible_module.params.get('_ca_enabled') http_pkcs12_info = ansible_module.params.get('_http_pkcs12_info') options._top_dir = ansible_module.params.get('_top_dir') dirman_password = ansible_module.params.get('dirman_password') # init # fstore = sysrestore.FileStore(paths.SYSRESTORE) ansible_log.debug("== INSTALL ==") promote = installer.promote env = gen_env_boostrap_finalize_core(paths.ETC_IPA, constants.DEFAULT_CONFIG) api_bootstrap_finalize(env) config = gen_ReplicaConfig() config.subject_base = options.subject_base config.dirman_password = dirman_password config.setup_ca = options.setup_ca # config.master_host_name = master_host_name config.ca_host_name = ca_host_name config.promote = installer.promote remote_api = gen_remote_api(master_host_name, paths.ETC_IPA) # installer._remote_api = remote_api conn = remote_api.Backend.ldap2 ccache = os.environ['KRB5CCNAME'] # There is a api.Backend.ldap2.connect call somewhere in ca, ds, dns or # ntpinstance api.Backend.ldap2.connect() conn.connect(ccache=ccache) cafile = paths.IPA_CA_CRT with redirect_stdout(ansible_log): ansible_log.debug("-- INSTALL_HTTP --") # We need to point to the master when certmonger asks for # HTTP certificate. # During http installation, the HTTP/hostname principal is created # locally then the installer waits for the entry to appear on the # master selected for the installation. # In a later step, the installer requests a SSL certificate through # Certmonger (and the op adds the principal if it does not exist yet). # If xmlrpc_uri points to the soon-to-be replica, # the httpd service is not ready yet to handle certmonger requests # and certmonger tries to find another master. The master can be # different from the one selected for the installation, and it is # possible that the principal has not been replicated yet. This # may lead to a replication conflict. # This is why we need to force the use of the same master by # setting xmlrpc_uri create_ipa_conf(fstore, config, ca_enabled, master=config.master_host_name) argspec = inspect.getargspec(install_http) if "promote" in argspec.args: install_http(config, auto_redirect=not options.no_ui_redirect, promote=promote, pkcs12_info=http_pkcs12_info, ca_is_configured=ca_enabled, ca_file=cafile) else: if "fstore" not in argspec.args: install_http(config, auto_redirect=not options.no_ui_redirect, pkcs12_info=http_pkcs12_info, ca_is_configured=ca_enabled, ca_file=cafile) else: install_http(config, auto_redirect=not options.no_ui_redirect, pkcs12_info=http_pkcs12_info, ca_is_configured=ca_enabled, ca_file=cafile, fstore=fstore) # Need to point back to ourself after the cert for HTTP is obtained create_ipa_conf(fstore, config, ca_enabled) # done # ansible_module.exit_json(changed=True)
def main(): ansible_module = AnsibleModule( argument_spec=dict( # server setup_ca=dict(required=False, type='bool'), setup_kra=dict(required=False, type='bool'), no_pkinit=dict(required=False, type='bool'), no_ui_redirect=dict(required=False, type='bool'), # certificate system subject_base=dict(required=True), # additional ccache=dict(required=True), _ca_enabled=dict(required=False, type='bool'), _ca_file=dict(required=False), _kra_enabled=dict(required=False, type='bool'), _kra_host_name=dict(required=False), _top_dir=dict(required=True), dirman_password=dict(required=True, no_log=True), config_setup_ca=dict(required=True, type='bool'), config_master_host_name=dict(required=True), config_ca_host_name=dict(required=True), ), supports_check_mode=True, ) ansible_module._ansible_debug = True setup_logging() ansible_log = AnsibleModuleLog(ansible_module) # get parameters # options = installer # server options.setup_ca = ansible_module.params.get('setup_ca') options.setup_kra = ansible_module.params.get('setup_kra') options.no_pkinit = ansible_module.params.get('no_pkinit') # certificate system options.subject_base = ansible_module.params.get('subject_base') if options.subject_base is not None: options.subject_base = DN(options.subject_base) # additional master_host_name = ansible_module.params.get('config_master_host_name') ccache = ansible_module.params.get('ccache') os.environ['KRB5CCNAME'] = ccache # os.environ['KRB5CCNAME'] = ansible_module.params.get('installer_ccache') # installer._ccache = ansible_module.params.get('installer_ccache') ca_enabled = ansible_module.params.get('_ca_enabled') kra_enabled = ansible_module.params.get('_kra_enabled') kra_host_name = ansible_module.params.get('_kra_host_name') options._top_dir = ansible_module.params.get('_top_dir') dirman_password = ansible_module.params.get('dirman_password') config_setup_ca = ansible_module.params.get('config_setup_ca') config_ca_host_name = ansible_module.params.get('config_ca_host_name') # init # ansible_log.debug("== INSTALL ==") options = installer env = gen_env_boostrap_finalize_core(paths.ETC_IPA, constants.DEFAULT_CONFIG) api_bootstrap_finalize(env) config = gen_ReplicaConfig() config.dirman_password = dirman_password config.setup_ca = config_setup_ca config.master_host_name = master_host_name config.ca_host_name = config_ca_host_name config.subject_base = options.subject_base config.promote = installer.promote config.kra_enabled = kra_enabled config.kra_host_name = kra_host_name remote_api = gen_remote_api(config.master_host_name, paths.ETC_IPA) installer._remote_api = remote_api ccache = os.environ['KRB5CCNAME'] # do the work # with redirect_stdout(ansible_log): if not hasattr(custodiainstance, "get_custodia_instance"): custodia = custodiainstance.CustodiaInstance( config.host_name, config.realm_name) else: if ca_enabled: mode = custodiainstance.CustodiaModes.CA_PEER else: mode = custodiainstance.CustodiaModes.MASTER_PEER custodia = custodiainstance.get_custodia_instance(config, mode) ansible_log.debug("-- CUSTODIA IMPORT DM PASSWORD --") argspec = inspect.getargspec(custodia.import_dm_password) if "master_host_name" in argspec.args: custodia.import_dm_password(config.master_host_name) else: custodia.import_dm_password() # done # ansible_module.exit_json(changed=True)
def main(): ansible_module = AnsibleModule( argument_spec=dict( ### basic ### dm_password=dict(required=False, no_log=True), password=dict(required=False, no_log=True), ip_addresses=dict(required=False, type='list', default=[]), domain=dict(required=False), realm=dict(required=False), hostname=dict(required=False), ca_cert_files=dict(required=False, type='list', default=[]), no_host_dns=dict(required=False, type='bool', default=False), ### server ### setup_adtrust=dict(required=False, type='bool'), setup_ca=dict(required=False, type='bool'), setup_kra=dict(required=False, type='bool'), setup_dns=dict(required=False, type='bool'), no_pkinit=dict(required=False, type='bool', default=False), dirsrv_config_file=dict(required=False), ### ssl certificate ### dirsrv_cert_files=dict(required=False, type='list', default=[]), ### client ### force_join=dict(required=False, type='bool'), ### certificate system ### subject_base=dict(required=True), ### additional ### server=dict(required=True), ccache=dict(required=True), installer_ccache=dict(required=True), _ca_enabled=dict(required=False, type='bool'), _dirsrv_pkcs12_info=dict(required=False), _top_dir=dict(required=True), _add_to_ipaservers=dict(required=True, type='bool'), _ca_subject=dict(required=True), _subject_base=dict(required=True), dirman_password=dict(required=True, no_log=True), config_setup_ca=dict(required=True, type='bool'), config_master_host_name=dict(required=True), config_ca_host_name=dict(required=True), config_ips=dict(required=False, type='list', default=[]), ), supports_check_mode=True, ) ansible_module._ansible_debug = True ansible_log = AnsibleModuleLog(ansible_module) # get parameters # options = installer options.dm_password = ansible_module.params.get('dm_password') options.password = options.dm_password options.admin_password = ansible_module.params.get('password') options.ip_addresses = ansible_module_get_parsed_ip_addresses( ansible_module) options.domain_name = ansible_module.params.get('domain') options.realm_name = ansible_module.params.get('realm') options.host_name = ansible_module.params.get('hostname') options.ca_cert_files = ansible_module.params.get('ca_cert_files') options.no_host_dns = ansible_module.params.get('no_host_dns') ### server ### options.setup_adtrust = ansible_module.params.get('setup_adtrust') options.setup_ca = ansible_module.params.get('setup_ca') options.setup_kra = ansible_module.params.get('setup_kra') options.setup_dns = ansible_module.params.get('setup_dns') options.no_pkinit = ansible_module.params.get('no_pkinit') options.dirsrv_config_file = ansible_module.params.get( 'dirsrv_config_file') ### ssl certificate ### options.dirsrv_cert_files = ansible_module.params.get('dirsrv_cert_files') ### client ### options.force_join = ansible_module.params.get('force_join') ### certificate system ### options.external_ca = ansible_module.params.get('external_ca') options.external_cert_files = ansible_module.params.get( 'external_cert_files') options.subject_base = ansible_module.params.get('subject_base') if options.subject_base is not None: options.subject_base = DN(options.subject_base) options.ca_subject = ansible_module.params.get('ca_subject') ### additional ### #options._host_name_overridden = ansible_module.params.get( # '_hostname_overridden') options.server = ansible_module.params.get('server') master_host_name = ansible_module.params.get('config_master_host_name') ccache = ansible_module.params.get('ccache') os.environ['KRB5CCNAME'] = ccache #os.environ['KRB5CCNAME'] = ansible_module.params.get('installer_ccache') installer._ccache = ansible_module.params.get('installer_ccache') ca_enabled = ansible_module.params.get('_ca_enabled') dirsrv_pkcs12_info = ansible_module.params.get('_dirsrv_pkcs12_info') options.subject_base = ansible_module.params.get('subject_base') if options.subject_base is not None: options.subject_base = DN(options.subject_base) options._top_dir = ansible_module.params.get('_top_dir') options._add_to_ipaservers = ansible_module.params.get( '_add_to_ipaservers') options._ca_subject = ansible_module.params.get('_ca_subject') options._subject_base = ansible_module.params.get('_subject_base') dirman_password = ansible_module.params.get('dirman_password') config_setup_ca = ansible_module.params.get('config_setup_ca') config_master_host_name = ansible_module.params.get( 'config_master_host_name') config_ca_host_name = ansible_module.params.get('config_ca_host_name') config_ips = ansible_module_get_parsed_ip_addresses( ansible_module, "config_ips") # init # fstore = sysrestore.FileStore(paths.SYSRESTORE) ansible_log.debug("== INSTALL ==") options = installer promote = installer.promote env = gen_env_boostrap_finalize_core(paths.ETC_IPA, constants.DEFAULT_CONFIG) api_bootstrap_finalize(env) config = gen_ReplicaConfig() config.subject_base = options.subject_base config.dirman_password = dirman_password config.setup_ca = config_setup_ca config.master_host_name = config_master_host_name config.ca_host_name = config_ca_host_name config.ips = config_ips config.promote = installer.promote remote_api = gen_remote_api(master_host_name, paths.ETC_IPA) installer._remote_api = remote_api conn = remote_api.Backend.ldap2 ccache = os.environ['KRB5CCNAME'] cafile = paths.IPA_CA_CRT try: ansible_log.debug("-- CONNECT --") if promote: conn.connect(ccache=ccache) else: # dmlvl 0 replica install should always use DM credentials # to create remote LDAP connection. Since ACIs permitting hosts # to manage their own services were added in 4.2 release, # the master denies this operations. conn.connect(bind_dn=ipaldap.DIRMAN_DN, cacert=cafile, bind_pw=dirman_password) ansible_log.debug("-- CONFIGURE DIRSRV --") # Configure dirsrv with redirect_stdout(ansible_log): argspec = inspect.getargspec(install_replica_ds) if "promote" in argspec.args: ds = install_replica_ds(config, options, ca_enabled, remote_api, ca_file=cafile, promote=promote, pkcs12_info=dirsrv_pkcs12_info) else: if "fstore" in argspec.args: ds = install_replica_ds(config, options, ca_enabled, remote_api, ca_file=cafile, pkcs12_info=dirsrv_pkcs12_info, fstore=fstore) else: ds = install_replica_ds(config, options, ca_enabled, remote_api, ca_file=cafile, pkcs12_info=dirsrv_pkcs12_info) ansible_log.debug("-- INSTALL DNS RECORDS --") # Always try to install DNS records argspec = inspect.getargspec(install_dns_records) if "fstore" not in argspec.args: install_dns_records(config, options, remote_api) else: install_dns_records(config, options, remote_api, fstore=fstore) # TODO: check if ntp needs to be enabled later on ansible_log.debug("-- NTP LDAP ENABLE --") if ntpinstance is not None: ntpinstance.ntp_ldap_enable(config.host_name, ds.suffix, remote_api.env.realm) except (ScriptError, RuntimeError) as e: ansible_module.fail_json(msg=str(e)) finally: if conn.isconnected(): ansible_log.debug("-- DISCONNECT --") conn.disconnect() # done # ansible_module.exit_json(changed=True, ds_suffix=str(ds.suffix), ds_ca_subject=str(ds.ca_subject))
def main(): ansible_module = AnsibleModule( argument_spec=dict( # server setup_ca=dict(required=False, type='bool'), setup_kra=dict(required=False, type='bool'), no_pkinit=dict(required=False, type='bool'), # certificate system subject_base=dict(required=True), # additional config_master_host_name=dict(required=True), ccache=dict(required=True), _pkinit_pkcs12_info=dict(required=False), _top_dir=dict(required=True), ), supports_check_mode=True, ) ansible_module._ansible_debug = True ansible_log = AnsibleModuleLog(ansible_module) # get parameters # options = installer # server options.setup_ca = ansible_module.params.get('setup_ca') options.setup_kra = ansible_module.params.get('setup_kra') options.no_pkinit = ansible_module.params.get('no_pkinit') # certificate system options.subject_base = ansible_module.params.get('subject_base') if options.subject_base is not None: options.subject_base = DN(options.subject_base) # additional config_master_host_name = ansible_module.params.get( 'config_master_host_name') ccache = ansible_module.params.get('ccache') os.environ['KRB5CCNAME'] = ccache installer._pkinit_pkcs12_info = ansible_module.params.get( '_pkinit_pkcs12_info') options._top_dir = ansible_module.params.get('_top_dir') # init # fstore = sysrestore.FileStore(paths.SYSRESTORE) ansible_log.debug("== INSTALL ==") options = installer promote = installer.promote pkinit_pkcs12_info = installer._pkinit_pkcs12_info env = gen_env_boostrap_finalize_core(paths.ETC_IPA, constants.DEFAULT_CONFIG) api_bootstrap_finalize(env) config = gen_ReplicaConfig() config.master_host_name = config_master_host_name config.subject_base = options.subject_base ccache = os.environ['KRB5CCNAME'] # There is a api.Backend.ldap2.connect call somewhere in ca, ds, dns or # ntpinstance api.Backend.ldap2.connect() ansible_log.debug("-- INSTALL_KRB --") with redirect_stdout(ansible_log): argspec = inspect.getargspec(install_krb) if "promote" in argspec.args: krb = install_krb(config, setup_pkinit=not options.no_pkinit, pkcs12_info=pkinit_pkcs12_info, promote=promote) else: if "fstore" not in argspec.args: krb = install_krb(config, setup_pkinit=not options.no_pkinit, pkcs12_info=pkinit_pkcs12_info) else: krb = install_krb(config, setup_pkinit=not options.no_pkinit, pkcs12_info=pkinit_pkcs12_info, fstore=fstore) # done # ansible_module.exit_json(changed=True, config_master_host_name=config.master_host_name)
def main(): ansible_module = AnsibleModule( argument_spec=dict( # server setup_kra=dict(required=False, type='bool'), # certificate system subject_base=dict(required=True), # ad trust enable_compat=dict(required=False, type='bool', default=False), rid_base=dict(required=False, type='int'), secondary_rid_base=dict(required=False, type='int'), # additional adtrust_netbios_name=dict(required=True), adtrust_reset_netbios_name=dict(required=True, type='bool'), # additional ccache=dict(required=True), _top_dir=dict(required=True), setup_ca=dict(required=True), config_master_host_name=dict(required=True), ), supports_check_mode=True, ) ansible_module._ansible_debug = True ansible_log = AnsibleModuleLog(ansible_module) # get parameters # options = installer # server options.setup_kra = ansible_module.params.get('setup_kra') # certificate system options.subject_base = ansible_module.params.get('subject_base') if options.subject_base is not None: options.subject_base = DN(options.subject_base) # ad trust options.enable_compat = ansible_module.params.get('enable_compat') options.rid_base = ansible_module.params.get('rid_base') options.secondary_rid_base = ansible_module.params.get( 'secondary_rid_base') # additional ccache = ansible_module.params.get('ccache') os.environ['KRB5CCNAME'] = ccache options._top_dir = ansible_module.params.get('_top_dir') options.setup_ca = ansible_module.params.get('setup_ca') config_master_host_name = ansible_module.params.get( 'config_master_host_name') adtrust.netbios_name = ansible_module.params.get('adtrust_netbios_name') adtrust.reset_netbios_name = ansible_module.params.get( 'adtrust_reset_netbios_name') # init # fstore = sysrestore.FileStore(paths.SYSRESTORE) ansible_log.debug("== INSTALL ==") env = gen_env_boostrap_finalize_core(paths.ETC_IPA, constants.DEFAULT_CONFIG) api_bootstrap_finalize(env) config = gen_ReplicaConfig() config.subject_base = options.subject_base config.master_host_name = config_master_host_name remote_api = gen_remote_api(config.master_host_name, paths.ETC_IPA) installer._remote_api = remote_api ccache = os.environ['KRB5CCNAME'] api.Backend.ldap2.connect() with redirect_stdout(ansible_log): ansible_log.debug("-- INSTALL ADTRUST --") adtrust.install(False, options, fstore, api) # done # ansible_module.exit_json(changed=True)
def main(): ansible_module = AnsibleModule( argument_spec=dict( # server setup_ca=dict(required=False, type='bool'), setup_kra=dict(required=False, type='bool'), no_pkinit=dict(required=False, type='bool'), no_ui_redirect=dict(required=False, type='bool'), # certificate system subject_base=dict(required=True), # additional config_master_host_name=dict(required=True), ccache=dict(required=True), _ca_file=dict(required=False), _top_dir=dict(required=True), dirman_password=dict(required=True, no_log=True), ), supports_check_mode=True, ) ansible_module._ansible_debug = True setup_logging() ansible_log = AnsibleModuleLog(ansible_module) # get parameters # options = installer # server options.setup_ca = ansible_module.params.get('setup_ca') options.setup_kra = ansible_module.params.get('setup_kra') options.no_pkinit = ansible_module.params.get('no_pkinit') # certificate system options.subject_base = ansible_module.params.get('subject_base') if options.subject_base is not None: options.subject_base = DN(options.subject_base) # additional master_host_name = ansible_module.params.get('config_master_host_name') ccache = ansible_module.params.get('ccache') os.environ['KRB5CCNAME'] = ccache options._top_dir = ansible_module.params.get('_top_dir') dirman_password = ansible_module.params.get('dirman_password') # init # fstore = sysrestore.FileStore(paths.SYSRESTORE) ansible_log.debug("== INSTALL ==") options = installer env = gen_env_boostrap_finalize_core(paths.ETC_IPA, constants.DEFAULT_CONFIG) api_bootstrap_finalize(env) config = gen_ReplicaConfig() config.dirman_password = dirman_password remote_api = gen_remote_api(master_host_name, paths.ETC_IPA) conn = remote_api.Backend.ldap2 ccache = os.environ['KRB5CCNAME'] # There is a api.Backend.ldap2.connect call somewhere in ca, ds, dns or # ntpinstance api.Backend.ldap2.connect() conn.connect(ccache=ccache) # krb krb = krbinstance.KrbInstance(fstore) krb.set_output(ansible_log) with redirect_stdout(ansible_log): krb.init_info(api.env.realm, api.env.host, setup_pkinit=not options.no_pkinit, subject_base=options.subject_base) ansible_log.debug("-- RESTART KDC --") service.print_msg("Restarting the KDC") krb.restart() # done # ansible_module.exit_json(changed=True)
def main(): ansible_module = AnsibleModule( argument_spec=dict( # server setup_ca=dict(required=False, type='bool'), setup_kra=dict(required=False, type='bool'), no_pkinit=dict(required=False, type='bool'), dirsrv_config_file=dict(required=False), # certificate system subject_base=dict(required=True), # additional config_master_host_name=dict(required=True), ccache=dict(required=True), _ca_enabled=dict(required=False, type='bool'), _ca_file=dict(required=False), _dirsrv_pkcs12_info=dict(required=False), _pkinit_pkcs12_info=dict(required=False), _top_dir=dict(required=True), dirman_password=dict(required=True, no_log=True), ds_ca_subject=dict(required=True), ), supports_check_mode=True, ) ansible_module._ansible_debug = True setup_logging() ansible_log = AnsibleModuleLog(ansible_module) # get parameters # options = installer # server options.setup_ca = ansible_module.params.get('setup_ca') options.setup_kra = ansible_module.params.get('setup_kra') options.no_pkinit = ansible_module.params.get('no_pkinit') options.dirsrv_config_file = ansible_module.params.get( 'dirsrv_config_file') # certificate system options.subject_base = ansible_module.params.get('subject_base') if options.subject_base is not None: options.subject_base = DN(options.subject_base) # additional master_host_name = ansible_module.params.get('config_master_host_name') ccache = ansible_module.params.get('ccache') os.environ['KRB5CCNAME'] = ccache # os.environ['KRB5CCNAME'] = ansible_module.params.get('installer_ccache') # installer._ccache = ansible_module.params.get('installer_ccache') ca_enabled = ansible_module.params.get('_ca_enabled') options._dirsrv_pkcs12_info = ansible_module.params.get( '_dirsrv_pkcs12_info') options._pkinit_pkcs12_info = ansible_module.params.get( '_pkinit_pkcs12_info') options._top_dir = ansible_module.params.get('_top_dir') dirman_password = ansible_module.params.get('dirman_password') ds_ca_subject = ansible_module.params.get('ds_ca_subject') # init # ansible_log.debug("== INSTALL ==") options = installer promote = installer.promote env = gen_env_boostrap_finalize_core(paths.ETC_IPA, constants.DEFAULT_CONFIG) api_bootstrap_finalize(env) config = gen_ReplicaConfig() config.dirman_password = dirman_password config.subject_base = options.subject_base remote_api = gen_remote_api(master_host_name, paths.ETC_IPA) # installer._remote_api = remote_api conn = remote_api.Backend.ldap2 ccache = os.environ['KRB5CCNAME'] # There is a api.Backend.ldap2.connect call somewhere in ca, ds, dns or # ntpinstance api.Backend.ldap2.connect() conn.connect(ccache=ccache) with redirect_stdout(ansible_log): ds = replica_ds_init_info(ansible_log, config, options, ca_enabled, remote_api, ds_ca_subject, ca_file=paths.IPA_CA_CRT, promote=promote, pkcs12_info=installer._dirsrv_pkcs12_info) ansible_log.debug("-- DS.ENABLE_SSL --") # we now need to enable ssl on the ds ds.enable_ssl() # done # ansible_module.exit_json(changed=True)
def main(): ansible_module = AnsibleModule( argument_spec=dict( # basic pki_config_override=dict(required=False), # server setup_ca=dict(required=False, type='bool'), setup_kra=dict(required=False, type='bool'), no_pkinit=dict(required=False, type='bool'), # certificate system subject_base=dict(required=True), # additional ccache=dict(required=True), _ca_enabled=dict(required=False, type='bool'), _ca_file=dict(required=False), _kra_enabled=dict(required=False, type='bool'), _kra_host_name=dict(required=False), _dirsrv_pkcs12_info=dict(required=False), _pkinit_pkcs12_info=dict(required=False), _top_dir=dict(required=True), _ca_subject=dict(required=True), _subject_base=dict(required=True), dirman_password=dict(required=True, no_log=True), config_setup_ca=dict(required=True, type='bool'), config_master_host_name=dict(required=True), config_ca_host_name=dict(required=True), config_ips=dict(required=False, type='list', default=[]), ), supports_check_mode=True, ) ansible_module._ansible_debug = True ansible_log = AnsibleModuleLog(ansible_module) # get parameters # options = installer # basic options.pki_config_override = ansible_module.params.get( 'pki_config_override') # server options.setup_ca = ansible_module.params.get('setup_ca') options.setup_kra = ansible_module.params.get('setup_kra') options.no_pkinit = ansible_module.params.get('no_pkinit') # certificate system options.subject_base = ansible_module.params.get('subject_base') if options.subject_base is not None: options.subject_base = DN(options.subject_base) # additional ccache = ansible_module.params.get('ccache') os.environ['KRB5CCNAME'] = ccache # os.environ['KRB5CCNAME'] = ansible_module.params.get('installer_ccache') # installer._ccache = ansible_module.params.get('installer_ccache') ca_enabled = ansible_module.params.get('_ca_enabled') kra_enabled = ansible_module.params.get('_kra_enabled') kra_host_name = ansible_module.params.get('_kra_host_name') installer._dirsrv_pkcs12_info = ansible_module.params.get( '_dirsrv_pkcs12_info') installer._pkinit_pkcs12_info = ansible_module.params.get( '_pkinit_pkcs12_info') options._top_dir = ansible_module.params.get('_top_dir') options._ca_subject = ansible_module.params.get('_ca_subject') if options._ca_subject is not None: options._ca_subject = DN(options._ca_subject) options._subject_base = ansible_module.params.get('_subject_base') if options._subject_base is not None: options._subject_base = DN(options._subject_base) dirman_password = ansible_module.params.get('dirman_password') config_setup_ca = ansible_module.params.get('config_setup_ca') config_master_host_name = ansible_module.params.get( 'config_master_host_name') config_ca_host_name = ansible_module.params.get('config_ca_host_name') config_ips = ansible_module_get_parsed_ip_addresses( ansible_module, "config_ips") # init # ansible_log.debug("== INSTALL ==") options = installer env = gen_env_boostrap_finalize_core(paths.ETC_IPA, constants.DEFAULT_CONFIG) api_bootstrap_finalize(env) config = gen_ReplicaConfig() config.dirman_password = dirman_password config.setup_ca = config_setup_ca config.master_host_name = config_master_host_name config.ca_host_name = config_ca_host_name config.ips = config_ips config.promote = options.promote config.kra_enabled = kra_enabled config.kra_host_name = kra_host_name remote_api = gen_remote_api(config.master_host_name, paths.ETC_IPA) options._remote_api = remote_api ccache = os.environ['KRB5CCNAME'] # There is a api.Backend.ldap2.connect call somewhere in ca, ds, dns or # ntpinstance api.Backend.ldap2.connect() # conn.connect(ccache=ccache) ansible_log.debug("-- INSTALL CA --") with redirect_stdout(ansible_log): options.realm_name = config.realm_name options.domain_name = config.domain_name options.host_name = config.host_name options.dm_password = config.dirman_password if not hasattr(custodiainstance, "get_custodia_instance"): ca.install(False, config, options) else: if kra_enabled: # A KRA peer always provides a CA, too. mode = custodiainstance.CustodiaModes.KRA_PEER elif ca_enabled: mode = custodiainstance.CustodiaModes.CA_PEER else: mode = custodiainstance.CustodiaModes.MASTER_PEER custodia = custodiainstance.get_custodia_instance(config, mode) ca.install(False, config, options, custodia=custodia) # done # ansible_module.exit_json(changed=True)
def main(): ansible_module = AnsibleModule( argument_spec=dict( # basic dm_password=dict(required=False, no_log=True), password=dict(required=False, no_log=True), ip_addresses=dict(required=False, type='list', default=[]), domain=dict(required=False), realm=dict(required=False), hostname=dict(required=False), ca_cert_files=dict(required=False, type='list', default=[]), no_host_dns=dict(required=False, type='bool', default=False), # server setup_adtrust=dict(required=False, type='bool'), setup_ca=dict(required=False, type='bool'), setup_kra=dict(required=False, type='bool'), setup_dns=dict(required=False, type='bool'), # ssl certificate dirsrv_cert_files=dict(required=False, type='list', default=[]), # client force_join=dict(required=False, type='bool'), # certificate system subject_base=dict(required=True), # additional server=dict(required=True), ccache=dict(required=True), installer_ccache=dict(required=True), _top_dir=dict(required=True), _add_to_ipaservers=dict(required=True, type='bool'), _ca_subject=dict(required=True), _subject_base=dict(required=True), dirman_password=dict(required=True, no_log=True), config_setup_ca=dict(required=True, type='bool'), config_master_host_name=dict(required=True), config_ca_host_name=dict(required=True), config_ips=dict(required=False, type='list', default=[]), ), supports_check_mode=True, ) ansible_module._ansible_debug = True setup_logging() ansible_log = AnsibleModuleLog(ansible_module) # get parameters # options = installer # basic options.dm_password = ansible_module.params.get('dm_password') options.password = options.dm_password options.admin_password = ansible_module.params.get('password') options.ip_addresses = ansible_module_get_parsed_ip_addresses( ansible_module) options.domain_name = ansible_module.params.get('domain') options.realm_name = ansible_module.params.get('realm') options.host_name = ansible_module.params.get('hostname') options.ca_cert_files = ansible_module.params.get('ca_cert_files') options.no_host_dns = ansible_module.params.get('no_host_dns') # server options.setup_adtrust = ansible_module.params.get('setup_adtrust') options.setup_ca = ansible_module.params.get('setup_ca') options.setup_kra = ansible_module.params.get('setup_kra') options.setup_dns = ansible_module.params.get('setup_dns') # ssl certificate options.dirsrv_cert_files = ansible_module.params.get('dirsrv_cert_files') # client options.force_join = ansible_module.params.get('force_join') # certificate system options.external_ca = ansible_module.params.get('external_ca') options.external_cert_files = ansible_module.params.get( 'external_cert_files') options.subject_base = ansible_module.params.get('subject_base') if options.subject_base is not None: options.subject_base = DN(options.subject_base) options.ca_subject = ansible_module.params.get('ca_subject') # additional options.server = ansible_module.params.get('server') ccache = ansible_module.params.get('ccache') os.environ['KRB5CCNAME'] = ccache # os.environ['KRB5CCNAME'] = ansible_module.params.get('installer_ccache') installer._ccache = ansible_module.params.get('installer_ccache') options.subject_base = ansible_module.params.get('subject_base') if options.subject_base is not None: options.subject_base = DN(options.subject_base) options._top_dir = ansible_module.params.get('_top_dir') options._add_to_ipaservers = ansible_module.params.get( '_add_to_ipaservers') options._ca_subject = ansible_module.params.get('_ca_subject') options._subject_base = ansible_module.params.get('_subject_base') dirman_password = ansible_module.params.get('dirman_password') config_setup_ca = ansible_module.params.get('config_setup_ca') config_master_host_name = ansible_module.params.get( 'config_master_host_name') config_ca_host_name = ansible_module.params.get('config_ca_host_name') config_ips = ansible_module_get_parsed_ip_addresses( ansible_module, "config_ips") # init # ansible_log.debug("== INSTALLER ==") options = installer promote = installer.promote env = gen_env_boostrap_finalize_core(paths.ETC_IPA, constants.DEFAULT_CONFIG) api_bootstrap_finalize(env) config = gen_ReplicaConfig() config.dirman_password = dirman_password config.setup_ca = config_setup_ca config.master_host_name = config_master_host_name config.ca_host_name = config_ca_host_name config.ips = config_ips remote_api = gen_remote_api(config.master_host_name, paths.ETC_IPA) installer._remote_api = remote_api conn = remote_api.Backend.ldap2 ccache = os.environ['KRB5CCNAME'] cafile = paths.IPA_CA_CRT with redirect_stdout(ansible_log): try: ansible_log.debug("-- CONNECT --") if promote: conn.connect(ccache=ccache) else: # dmlvl 0 replica install should always use DM credentials # to create remote LDAP connection. Since ACIs permitting hosts # to manage their own services were added in 4.2 release, # the master denies this operations. conn.connect(bind_dn=ipaldap.DIRMAN_DN, cacert=cafile, bind_pw=dirman_password) ansible_log.debug("-- INSTALL_CA_CERT --") # Update and istall updated CA file cafile = install_ca_cert(conn, api.env.basedn, api.env.realm, cafile) install_ca_cert(conn, api.env.basedn, api.env.realm, cafile, destfile=paths.KDC_CA_BUNDLE_PEM) install_ca_cert(conn, api.env.basedn, api.env.realm, cafile, destfile=paths.CA_BUNDLE_PEM) finally: if conn.isconnected(): ansible_log.debug("-- DISCONNECT --") conn.disconnect() # done # ansible_module.exit_json(changed=True, config_master_host_name=config.master_host_name, config_ca_host_name=config.ca_host_name)
def main(): ansible_module = AnsibleModule( argument_spec=dict( # basic # dm_password=dict(required=False, no_log=True), # password=dict(required=False, no_log=True), ip_addresses=dict(required=False, type='list', default=[]), domain=dict(required=False), servers=dict(required=False, type='list', default=[]), realm=dict(required=False), hostname=dict(required=False), ca_cert_files=dict(required=False, type='list', default=[]), hidden_replica=dict(required=False, type='bool', default=False), skip_mem_check=dict(required=False, type='bool', default=False), # server setup_adtrust=dict(required=False, type='bool', default=False), setup_ca=dict(required=False, type='bool'), setup_kra=dict(required=False, type='bool', default=False), setup_dns=dict(required=False, type='bool', default=False), no_pkinit=dict(required=False, type='bool', default=False), dirsrv_config_file=dict(required=False), # ssl certificate dirsrv_cert_files=dict(required=False, type='list', default=[]), http_cert_files=dict(required=False, type='list', default=[]), pkinit_cert_files=dict(required=False, type='list', default=[]), # client no_ntp=dict(required=False, type='bool', default=False), ntp_servers=dict(required=False, type='list', default=[]), ntp_pool=dict(required=False), # dns no_reverse=dict(required=False, type='bool', default=False), auto_reverse=dict(required=False, type='bool', default=False), forwarders=dict(required=False, type='list', default=[]), no_forwarders=dict(required=False, type='bool', default=False), auto_forwarders=dict(required=False, type='bool', default=False), forward_policy=dict(default=None, choices=['first', 'only']), no_dnssec_validation=dict(required=False, type='bool', default=False), ), ) ansible_module._ansible_debug = True setup_logging() ansible_log = AnsibleModuleLog(ansible_module) # get parameters # # basic # options.dm_password = ansible_module.params.get('dm_password') # # options.password = ansible_module.params.get('password') # options.password = options.dm_password options.ip_addresses = ansible_module_get_parsed_ip_addresses( ansible_module) options.domain_name = ansible_module.params.get('domain') options.servers = ansible_module.params.get('servers') options.realm_name = ansible_module.params.get('realm') options.host_name = ansible_module.params.get('hostname') options.ca_cert_files = ansible_module.params.get('ca_cert_files') options.hidden_replica = ansible_module.params.get('hidden_replica') options.skip_mem_check = ansible_module.params.get('skip_mem_check') # server options.setup_adtrust = ansible_module.params.get('setup_adtrust') options.setup_ca = ansible_module.params.get('setup_ca') options.setup_kra = ansible_module.params.get('setup_kra') options.setup_dns = ansible_module.params.get('setup_dns') options.no_pkinit = ansible_module.params.get('no_pkinit') options.dirsrv_config_file = ansible_module.params.get( 'dirsrv_config_file') # ssl certificate options.dirsrv_cert_files = ansible_module.params.get('dirsrv_cert_files') options.http_cert_files = ansible_module.params.get('http_cert_files') options.pkinit_cert_files = ansible_module.params.get('pkinit_cert_files') # client options.no_ntp = ansible_module.params.get('no_ntp') options.ntp_servers = ansible_module.params.get('ntp_servers') options.ntp_pool = ansible_module.params.get('ntp_pool') # dns options.no_reverse = ansible_module.params.get('no_reverse') options.auto_reverse = ansible_module.params.get('auto_reverse') options.forwarders = ansible_module.params.get('forwarders') options.no_forwarders = ansible_module.params.get('no_forwarders') options.auto_forwarders = ansible_module.params.get('auto_forwarders') options.forward_policy = ansible_module.params.get('forward_policy') options.no_dnssec_validation = ansible_module.params.get( 'no_dnssec_validation') ########################################################################## # replica init ########################################################### ########################################################################## if installer.servers: installer.server = installer.servers[0] else: installer.server = None # TODO: Kills ipa-client-install # if installer.replica_file is None: # installer.password = installer.admin_password # else: # installer.password = installer.dm_password # installer._ccache = os.environ.get('KRB5CCNAME') # If not defined, set domain from server name if installer.domain_name is None and installer.server is not None: installer.domain_name = installer.server[installer.server.find(".") + 1:] # If not defined, set realm from domain name if installer.realm_name is None and installer.domain_name is not None: installer.realm_name = installer.domain_name.upper() ########################################################################## # other checks ########################################################### ########################################################################## # version specific tests # # if options.setup_adtrust and not adtrust_imported: # # if "adtrust" not in options._allow_missing: # ansible_module.fail_json(msg="adtrust can not be imported") # # else: # # options.setup_adtrust = False # # ansible_module.warn(msg="adtrust is not supported, disabling") # if options.setup_kra and not kra_imported: # # if "kra" not in options._allow_missing: # ansible_module.fail_json(msg="kra can not be imported") # # else: # # options.setup_kra = False # # ansible_module.warn(msg="kra is not supported, disabling") if options.hidden_replica and not hasattr(service, "hide_services"): ansible_module.fail_json( msg="Hidden replica is not supported in this version.") # We need to point to the master in ipa default conf when certmonger # asks for HTTP certificate in newer ipa versions. In these versions # create_ipa_conf has the additional master argument. change_master_for_certmonger = False argspec = inspect.getargspec(create_ipa_conf) if "master" in argspec.args: change_master_for_certmonger = True # From ipa installer classes # pkinit is not supported on DL0, don't allow related options if installer.replica_file is not None: ansible_module.fail_json( msg="Replica installation using a replica file is not supported") # If any of the key file options are selected, all are required. cert_file_req = (installer.dirsrv_cert_files, installer.http_cert_files) cert_file_opt = (installer.pkinit_cert_files, ) if not installer.no_pkinit: cert_file_req += cert_file_opt if installer.no_pkinit and installer.pkinit_cert_files: ansible_module.fail_json( msg="--no-pkinit and --pkinit-cert-file cannot be specified " "together") if any(cert_file_req + cert_file_opt) and not all(cert_file_req): ansible_module.fail_json( msg="--dirsrv-cert-file, --http-cert-file, and --pkinit-cert-file " "or --no-pkinit are required if any key file options are used.") if not installer.setup_dns: if installer.forwarders: ansible_module.fail_json( msg="You cannot specify a --forwarder option without the " "--setup-dns option") if installer.auto_forwarders: ansible_module.fail_json( msg="You cannot specify a --auto-forwarders option without " "the --setup-dns option") if installer.no_forwarders: ansible_module.fail_json( msg="You cannot specify a --no-forwarders option without the " "--setup-dns option") if installer.forward_policy: ansible_module.fail_json( msg="You cannot specify a --forward-policy option without the " "--setup-dns option") if installer.reverse_zones: ansible_module.fail_json( msg="You cannot specify a --reverse-zone option without the " "--setup-dns option") if installer.auto_reverse: ansible_module.fail_json( msg="You cannot specify a --auto-reverse option without the " "--setup-dns option") if installer.no_reverse: ansible_module.fail_json( msg="You cannot specify a --no-reverse option without the " "--setup-dns option") if installer.no_dnssec_validation: ansible_module.fail_json( msg="You cannot specify a --no-dnssec-validation option " "without the --setup-dns option") elif installer.forwarders and installer.no_forwarders: ansible_module.fail_json( msg="You cannot specify a --forwarder option together with " "--no-forwarders") elif installer.auto_forwarders and installer.no_forwarders: ansible_module.fail_json( msg="You cannot specify a --auto-forwarders option together with " "--no-forwarders") elif installer.reverse_zones and installer.no_reverse: ansible_module.fail_json( msg="You cannot specify a --reverse-zone option together with " "--no-reverse") elif installer.auto_reverse and installer.no_reverse: ansible_module.fail_json( msg="You cannot specify a --auto-reverse option together with " "--no-reverse") # replica installers if installer.servers and not installer.domain_name: ansible_module.fail_json( msg="The --server option cannot be used without providing " "domain via the --domain option") if installer.setup_dns: if (not installer.forwarders and not installer.no_forwarders and not installer.auto_forwarders): ansible_module.fail_json( msg="You must specify at least one of --forwarder, " "--auto-forwarders, or --no-forwarders options") if installer.dirsrv_config_file is not None and \ not os.path.exists(installer.dirsrv_config_file): ansible_module.fail_json(msg="File %s does not exist." % installer.dirsrv_config_file) if installer.ca_cert_files is not None: if not isinstance(installer.ca_cert_files, list): ansible_module.fail_json( msg="Expected list, got {!r}".format(installer.ca_cert_files)) for cert in installer.ca_cert_files: if not os.path.exists(cert): ansible_module.fail_json(msg="'%s' does not exist" % cert) if not os.path.isfile(cert): ansible_module.fail_json(msg="'%s' is not a file" % cert) if not os.path.isabs(cert): ansible_module.fail_json( msg="'%s' is not an absolute file path" % cert) try: x509.load_certificate_from_file(cert) except Exception: ansible_module.fail_json( msg="'%s' is not a valid certificate file" % cert) if installer.ip_addresses is not None: for value in installer.ip_addresses: try: ipautil.CheckedIPAddress(value) except Exception as e: ansible_module.fail_json( msg="invalid IP address {0}: {1}".format(value, e)) if installer.domain_name is not None: validate_domain_name(installer.domain_name) ########################################################################## # replica promote_check excerpts ######################################### ########################################################################## # check selinux status, http and DS ports, NTP conflicting services try: with redirect_stdout(ansible_log): argspec = inspect.getargspec(common_check) if "skip_mem_check" in argspec.args: common_check(options.no_ntp, options.skip_mem_check, options.setup_ca) else: common_check(options.no_ntp) except Exception as msg: # ScriptError as msg: _msg = str(msg) if "server is already configured" in _msg: ansible_module.exit_json(changed=False, server_already_configured=True) else: ansible_module.fail_json(msg=_msg) # TODO: Check ntp_servers and ntp_pool # client enrolled? client_fstore = sysrestore.FileStore(paths.IPA_CLIENT_SYSRESTORE) client_enrolled = client_fstore.has_files() if not client_enrolled: # # One-step replica installation # if options.dm_password and options.password: # ansible_module.fail_json( # msg="--password and --admin-password options are " # "mutually exclusive") pass else: # The NTP configuration can not be touched on pre-installed client: if options.no_ntp or options.ntp_servers or options.ntp_pool: ansible_module.fail_json( msg="NTP configuration cannot be updated during promotion") # done # ansible_module.exit_json( changed=False, ipa_python_version=IPA_PYTHON_VERSION, # basic domain=options.domain_name, realm=options.realm_name, hostname=options.host_name, # server setup_adtrust=options.setup_adtrust, setup_kra=options.setup_kra, server=options.server, # additional client_enrolled=client_enrolled, change_master_for_certmonger=change_master_for_certmonger, )
def main(): ansible_module = AnsibleModule( argument_spec=dict( # server setup_ca=dict(required=False, type='bool'), setup_kra=dict(required=False, type='bool'), no_pkinit=dict(required=False, type='bool'), no_ui_redirect=dict(required=False, type='bool'), # certificate system subject_base=dict(required=True), # additional config_master_host_name=dict(required=True), ccache=dict(required=True), _ca_file=dict(required=False), _top_dir=dict(required=True), dirman_password=dict(required=True, no_log=True), ), supports_check_mode=True, ) ansible_module._ansible_debug = True ansible_log = AnsibleModuleLog(ansible_module) # get parameters # options = installer options.setup_ca = ansible_module.params.get('setup_ca') options.setup_kra = ansible_module.params.get('setup_kra') options.no_pkinit = ansible_module.params.get('no_pkinit') # certificate system options.subject_base = ansible_module.params.get('subject_base') if options.subject_base is not None: options.subject_base = DN(options.subject_base) # additional master_host_name = ansible_module.params.get('config_master_host_name') ccache = ansible_module.params.get('ccache') os.environ['KRB5CCNAME'] = ccache # os.environ['KRB5CCNAME'] = ansible_module.params.get('installer_ccache') # installer._ccache = ansible_module.params.get('installer_ccache') options._top_dir = ansible_module.params.get('_top_dir') dirman_password = ansible_module.params.get('dirman_password') # init # ansible_log.debug("== INSTALL ==") options = installer env = gen_env_boostrap_finalize_core(paths.ETC_IPA, constants.DEFAULT_CONFIG) api_bootstrap_finalize(env) config = gen_ReplicaConfig() config.dirman_password = dirman_password remote_api = gen_remote_api(master_host_name, paths.ETC_IPA) conn = remote_api.Backend.ldap2 ccache = os.environ['KRB5CCNAME'] # There is a api.Backend.ldap2.connect call somewhere in ca, ds, dns or # ntpinstance api.Backend.ldap2.connect() conn.connect(ccache=ccache) with redirect_stdout(ansible_log): ansible_log.debug("-- INSTALL_OTPD --") otpd = otpdinstance.OtpdInstance() otpd.set_output(ansible_log) otpd.create_instance('OTPD', config.host_name, ipautil.realm_to_suffix(config.realm_name)) # done # ansible_module.exit_json(changed=True)
def main(): ansible_module = AnsibleModule( argument_spec=dict( # server setup_kra=dict(required=False, type='bool'), # certificate system subject_base=dict(required=True), # additional ccache=dict(required=True), _top_dir=dict(required=True), config_setup_ca=dict(required=True, type='bool'), config_master_host_name=dict(required=True), ), supports_check_mode=True, ) ansible_module._ansible_debug = True ansible_log = AnsibleModuleLog(ansible_module) # get parameters # options = installer # server options.setup_kra = ansible_module.params.get('setup_kra') # certificate system options.subject_base = ansible_module.params.get('subject_base') if options.subject_base is not None: options.subject_base = DN(options.subject_base) # additional ccache = ansible_module.params.get('ccache') os.environ['KRB5CCNAME'] = ccache options._top_dir = ansible_module.params.get('_top_dir') config_setup_ca = ansible_module.params.get('config_setup_ca') installer.setup_ca = config_setup_ca config_master_host_name = ansible_module.params.get( 'config_master_host_name') # init # ansible_log.debug("== INSTALL ==") env = gen_env_boostrap_finalize_core(paths.ETC_IPA, constants.DEFAULT_CONFIG) api_bootstrap_finalize(env) config = gen_ReplicaConfig() config.subject_base = options.subject_base config.setup_ca = config_setup_ca config.master_host_name = config_master_host_name remote_api = gen_remote_api(config.master_host_name, paths.ETC_IPA) installer._remote_api = remote_api ccache = os.environ['KRB5CCNAME'] with redirect_stdout(ansible_log): ansible_log.debug("-- PROMOTE SSSD --") promote_sssd(config.host_name) # done # ansible_module.exit_json(changed=True)
def main(): ansible_module = AnsibleModule( argument_spec=dict( # basic dm_password=dict(required=False, no_log=True), password=dict(required=False, no_log=True), ip_addresses=dict(required=False, type='list', default=[]), domain=dict(required=False), realm=dict(required=False), hostname=dict(required=False), ca_cert_files=dict(required=False, type='list', default=[]), no_host_dns=dict(required=False, type='bool', default=False), pki_config_override=dict(required=False), # server setup_adtrust=dict(required=False, type='bool'), setup_ca=dict(required=False, type='bool'), setup_kra=dict(required=False, type='bool'), setup_dns=dict(required=False, type='bool'), # ssl certificate dirsrv_cert_files=dict(required=False, type='list', default=[]), # client force_join=dict(required=False, type='bool'), # certificate system subject_base=dict(required=True), # additional server=dict(required=True), config_master_host_name=dict(required=True), ccache=dict(required=True), installer_ccache=dict(required=True), _ca_enabled=dict(required=False, type='bool'), _kra_enabled=dict(required=False, type='bool'), _kra_host_name=dict(required=False), _top_dir=dict(required=True), _add_to_ipaservers=dict(required=True, type='bool'), _ca_subject=dict(required=True), _subject_base=dict(required=True), ), supports_check_mode=True, ) ansible_module._ansible_debug = True ansible_log = AnsibleModuleLog(ansible_module) # get parameters # options = installer options.dm_password = ansible_module.params.get('dm_password') options.password = options.dm_password options.admin_password = ansible_module.params.get('password') options.ip_addresses = ansible_module_get_parsed_ip_addresses( ansible_module) options.domain_name = ansible_module.params.get('domain') options.realm_name = ansible_module.params.get('realm') options.host_name = ansible_module.params.get('hostname') options.ca_cert_files = ansible_module.params.get('ca_cert_files') options.no_host_dns = ansible_module.params.get('no_host_dns') options.pki_config_override = ansible_module.params.get( 'pki_config_override') # server options.setup_adtrust = ansible_module.params.get('setup_adtrust') options.setup_ca = ansible_module.params.get('setup_ca') options.setup_kra = ansible_module.params.get('setup_kra') options.setup_dns = ansible_module.params.get('setup_dns') # ssl certificate options.dirsrv_cert_files = ansible_module.params.get('dirsrv_cert_files') # client options.force_join = ansible_module.params.get('force_join') # certificate system options.external_ca = ansible_module.params.get('external_ca') options.external_cert_files = ansible_module.params.get( 'external_cert_files') options.subject_base = ansible_module.params.get('subject_base') if options.subject_base is not None: options.subject_base = DN(options.subject_base) options.ca_subject = ansible_module.params.get('ca_subject') # dns options.reverse_zones = ansible_module.params.get('reverse_zones') options.no_reverse = ansible_module.params.get('no_reverse') options.auto_reverse = ansible_module.params.get('auto_reverse') options.forwarders = ansible_module.params.get('forwarders') options.no_forwarders = ansible_module.params.get('no_forwarders') options.auto_forwarders = ansible_module.params.get('auto_forwarders') options.forward_policy = ansible_module.params.get('forward_policy') # additional options.server = ansible_module.params.get('server') master_host_name = ansible_module.params.get('config_master_host_name') ccache = ansible_module.params.get('ccache') # os.environ['KRB5CCNAME'] = ccache os.environ['KRB5CCNAME'] = ansible_module.params.get('installer_ccache') installer._ccache = ansible_module.params.get('installer_ccache') ca_enabled = ansible_module.params.get('_ca_enabled') kra_enabled = ansible_module.params.get('_kra_enabled') kra_host_name = ansible_module.params.get('_kra_host_name') options.subject_base = ansible_module.params.get('subject_base') if options.subject_base is not None: options.subject_base = DN(options.subject_base) options._top_dir = ansible_module.params.get('_top_dir') options._add_to_ipaservers = ansible_module.params.get( '_add_to_ipaservers') options._ca_subject = ansible_module.params.get('_ca_subject') options._subject_base = ansible_module.params.get('_subject_base') # init # ansible_log.debug("== INSTALL ==") options = installer env = gen_env_boostrap_finalize_core(paths.ETC_IPA, constants.DEFAULT_CONFIG) api_bootstrap_finalize(env) config = gen_ReplicaConfig() config.subject_base = options.subject_base config.promote = installer.promote config.kra_enabled = kra_enabled config.kra_host_name = kra_host_name remote_api = gen_remote_api(master_host_name, paths.ETC_IPA) installer._remote_api = remote_api # ccache = os.environ['KRB5CCNAME'] with redirect_stdout(ansible_log): ansible_log.debug("-- INSTALL KRA --") if not hasattr(custodiainstance, "get_custodia_instance"): kra.install(api, config, options) else: if ca_enabled: mode = custodiainstance.CustodiaModes.CA_PEER else: mode = custodiainstance.CustodiaModes.MASTER_PEER custodia = custodiainstance.get_custodia_instance(config, mode) kra.install(api, config, options, custodia=custodia) # done # ansible_module.exit_json(changed=True)
def main(): ansible_module = AnsibleModule( argument_spec=dict( # server setup_kra=dict(required=True, type='bool'), # additional config_master_host_name=dict(required=True), ccache=dict(required=True), installer_ccache=dict(required=True), _top_dir=dict(required=True), ), supports_check_mode=True, ) ansible_module._ansible_debug = True setup_logging() ansible_log = AnsibleModuleLog(ansible_module) # get parameters # options = installer # server options.setup_kra = ansible_module.params.get('setup_kra') # additional config_master_host_name = ansible_module.params.get( 'config_master_host_name') ccache = ansible_module.params.get('ccache') os.environ['KRB5CCNAME'] = ccache options._ccache = ansible_module.params.get('installer_ccache') # os.environ['KRB5CCNAME'] = ansible_module.params.get('installer_ccache') options._top_dir = ansible_module.params.get('_top_dir') # init # ansible_log.debug("== INSTALLER ==") options = installer env = gen_env_boostrap_finalize_core(paths.ETC_IPA, constants.DEFAULT_CONFIG) api_bootstrap_finalize(env) # config = gen_ReplicaConfig() remote_api = gen_remote_api(config_master_host_name, paths.ETC_IPA) # installer._remote_api = remote_api conn = remote_api.Backend.ldap2 ccache = os.environ['KRB5CCNAME'] ansible_log.debug("-- HOSTGROUP_ADD_MEMBER --") try: ansible_log.debug("-- CONNECT --") conn.connect(ccache=installer._ccache) remote_api.Command['hostgroup_add_member']( u'ipaservers', host=[unicode(api.env.host)], ) finally: if conn.isconnected(): ansible_log.debug("-- DISCONNECT --") conn.disconnect() os.environ['KRB5CCNAME'] = ccache # done # ansible_module.exit_json(changed=True)
def main(): ansible_module = AnsibleModule( argument_spec=dict( # basic dm_password=dict(required=False, no_log=True), password=dict(required=False, no_log=True), ip_addresses=dict(required=False, type='list', default=[]), domain=dict(required=False), realm=dict(required=False), hostname=dict(required=False), principal=dict(required=True), ca_cert_files=dict(required=False, type='list', default=[]), no_host_dns=dict(required=False, type='bool', default=False), # server setup_adtrust=dict(required=False, type='bool'), setup_ca=dict(required=False, type='bool'), setup_kra=dict(required=False, type='bool'), setup_dns=dict(required=False, type='bool'), # ssl certificate dirsrv_cert_files=dict(required=False, type='list', default=[]), dirsrv_cert_name=dict(required=False), dirsrv_pin=dict(required=False), http_cert_files=dict(required=False, type='list', default=[]), http_cert_name=dict(required=False), http_pin=dict(required=False), pkinit_cert_files=dict(required=False, type='list', default=[]), pkinit_cert_name=dict(required=False), pkinit_pin=dict(required=False), # client keytab=dict(required=False), mkhomedir=dict(required=False, type='bool'), force_join=dict(required=False, type='bool'), no_ntp=dict(required=False, type='bool'), ssh_trust_dns=dict(required=False, type='bool'), no_ssh=dict(required=False, type='bool'), no_sshd=dict(required=False, type='bool'), no_dns_sshfp=dict(required=False, type='bool'), # certificate system # subject_base=dict(required=False), # dns allow_zone_overlap=dict(required=False, type='bool', default=False), reverse_zones=dict(required=False, type='list', default=[]), no_reverse=dict(required=False, type='bool', default=False), auto_reverse=dict(required=False, type='bool', default=False), forwarders=dict(required=False, type='list', default=[]), no_forwarders=dict(required=False, type='bool', default=False), auto_forwarders=dict(required=False, type='bool', default=False), forward_policy=dict(default=None, choices=['first', 'only']), no_dnssec_validation=dict(required=False, type='bool', default=False), # ad trust enable_compat=dict(required=False, type='bool', default=False), netbios_name=dict(required=False), rid_base=dict(required=False, type='int', default=1000), secondary_rid_base=dict(required=False, type='int', default=100000000), # additional server=dict(required=True), skip_conncheck=dict(required=False, type='bool'), ), supports_check_mode=True, ) ansible_module._ansible_debug = True setup_logging() ansible_log = AnsibleModuleLog(ansible_module) # get parameters # options.dm_password = ansible_module.params.get('dm_password') options.password = options.dm_password options.admin_password = ansible_module.params.get('password') options.ip_addresses = ansible_module_get_parsed_ip_addresses( ansible_module) options.domain_name = ansible_module.params.get('domain') options.realm_name = ansible_module.params.get('realm') options.host_name = ansible_module.params.get('hostname') options.principal = ansible_module.params.get('principal') options.ca_cert_files = ansible_module.params.get('ca_cert_files') options.no_host_dns = ansible_module.params.get('no_host_dns') # server options.setup_adtrust = ansible_module.params.get('setup_adtrust') options.setup_ca = ansible_module.params.get('setup_ca') options.setup_kra = ansible_module.params.get('setup_kra') options.setup_dns = ansible_module.params.get('setup_dns') # ssl certificate options.dirsrv_cert_files = ansible_module.params.get('dirsrv_cert_files') options.dirsrv_cert_name = ansible_module.params.get('dirsrv_cert_name') options.dirsrv_pin = ansible_module.params.get('dirsrv_pin') options.http_cert_files = ansible_module.params.get('http_cert_files') options.http_cert_name = ansible_module.params.get('http_cert_name') options.http_pin = ansible_module.params.get('http_pin') options.pkinit_cert_files = ansible_module.params.get('pkinit_cert_files') options.pkinit_cert_name = ansible_module.params.get('pkinit_cert_name') options.pkinit_pin = ansible_module.params.get('pkinit_pin') # client options.keytab = ansible_module.params.get('keytab') options.mkhomedir = ansible_module.params.get('mkhomedir') options.force_join = ansible_module.params.get('force_join') options.no_ntp = ansible_module.params.get('no_ntp') options.ssh_trust_dns = ansible_module.params.get('ssh_trust_dns') options.no_ssh = ansible_module.params.get('no_ssh') options.no_sshd = ansible_module.params.get('no_sshd') options.no_dns_sshfp = ansible_module.params.get('no_dns_sshfp') # certificate system options.external_ca = ansible_module.params.get('external_ca') options.external_cert_files = ansible_module.params.get( 'external_cert_files') # options.subject_base = ansible_module.params.get('subject_base') # options.ca_subject = ansible_module.params.get('ca_subject') # dns options.allow_zone_overlap = ansible_module.params.get( 'allow_zone_overlap') options.reverse_zones = ansible_module.params.get('reverse_zones') options.no_reverse = ansible_module.params.get('no_reverse') options.auto_reverse = ansible_module.params.get('auto_reverse') options.forwarders = ansible_module.params.get('forwarders') options.no_forwarders = ansible_module.params.get('no_forwarders') options.auto_forwarders = ansible_module.params.get('auto_forwarders') options.forward_policy = ansible_module.params.get('forward_policy') options.no_dnssec_validation = ansible_module.params.get( 'no_dnssec_validation') # ad trust options.enable_compat = ansible_module.params.get('enable_compat') options.netbios_name = ansible_module.params.get('netbios_name') options.rid_base = ansible_module.params.get('rid_base') options.secondary_rid_base = ansible_module.params.get( 'secondary_rid_base') # additional # options._host_name_overridden = ansible_module.params.get( # '_hostname_overridden') options.server = ansible_module.params.get('server') options.skip_conncheck = ansible_module.params.get('skip_conncheck') # init # fstore = sysrestore.FileStore(paths.SYSRESTORE) sstore = sysrestore.StateFile(paths.SYSRESTORE) # prepare (install prepare, install checks) # ########################################################################## # replica promote_check ################################################## ########################################################################## ansible_log.debug("== PROMOTE CHECK ==") # ansible_log.debug("-- NO_NTP --") # already done in test # check selinux status, http and DS ports, NTP conflicting services # common_check(options.no_ntp) installer._enrollment_performed = False installer._top_dir = tempfile.mkdtemp("ipa") # with ipautil.private_ccache(): dir_path = tempfile.mkdtemp(prefix='krbcc') os.environ['KRB5CCNAME'] = os.path.join(dir_path, 'ccache') ansible_log.debug("-- API --") env = Env() env._bootstrap(context='installer', confdir=paths.ETC_IPA, log=None) env._finalize_core(**dict(constants.DEFAULT_CONFIG)) # pylint: disable=no-member xmlrpc_uri = 'https://{}/ipa/xml'.format(ipautil.format_netloc(env.host)) if hasattr(ipaldap, "realm_to_ldapi_uri"): realm_to_ldapi_uri = ipaldap.realm_to_ldapi_uri else: realm_to_ldapi_uri = installutils.realm_to_ldapi_uri api.bootstrap(in_server=True, context='installer', confdir=paths.ETC_IPA, ldap_uri=realm_to_ldapi_uri(env.realm), xmlrpc_uri=xmlrpc_uri) # pylint: enable=no-member api.finalize() ansible_log.debug("-- REPLICA_CONFIG --") config = ReplicaConfig() config.realm_name = api.env.realm config.host_name = api.env.host config.domain_name = api.env.domain config.master_host_name = api.env.server if not api.env.ca_host or api.env.ca_host == api.env.host: # ca_host has not been configured explicitly, prefer source master config.ca_host_name = api.env.server else: # default to ca_host from IPA config config.ca_host_name = api.env.ca_host config.kra_host_name = config.ca_host_name config.ca_ds_port = 389 config.setup_ca = options.setup_ca config.setup_kra = options.setup_kra config.dir = installer._top_dir config.basedn = api.env.basedn # config.hidden_replica = options.hidden_replica # load and check certificates # ansible_log.debug("-- CERT_FILES --") http_pkcs12_file = None http_pkcs12_info = None http_ca_cert = None dirsrv_pkcs12_file = None dirsrv_pkcs12_info = None dirsrv_ca_cert = None pkinit_pkcs12_file = None pkinit_pkcs12_info = None pkinit_ca_cert = None if options.http_cert_files: ansible_log.debug("-- HTTP_CERT_FILES --") if options.http_pin is None: ansible_module.fail_json( msg="Apache Server private key unlock password required") http_pkcs12_file, http_pin, http_ca_cert = load_pkcs12( cert_files=options.http_cert_files, key_password=options.http_pin, key_nickname=options.http_cert_name, ca_cert_files=options.ca_cert_files, host_name=config.host_name) http_pkcs12_info = (http_pkcs12_file.name, http_pin) if options.dirsrv_cert_files: ansible_log.debug("-- DIRSRV_CERT_FILES --") if options.dirsrv_pin is None: ansible_module.fail_json( msg="Directory Server private key unlock password required") dirsrv_pkcs12_file, dirsrv_pin, dirsrv_ca_cert = load_pkcs12( cert_files=options.dirsrv_cert_files, key_password=options.dirsrv_pin, key_nickname=options.dirsrv_cert_name, ca_cert_files=options.ca_cert_files, host_name=config.host_name) dirsrv_pkcs12_info = (dirsrv_pkcs12_file.name, dirsrv_pin) if options.pkinit_cert_files: ansible_log.debug("-- PKINIT_CERT_FILES --") if options.pkinit_pin is None: ansible_module.fail_json( msg="Kerberos KDC private key unlock password required") pkinit_pkcs12_file, pkinit_pin, pkinit_ca_cert = load_pkcs12( cert_files=options.pkinit_cert_files, key_password=options.pkinit_pin, key_nickname=options.pkinit_cert_name, ca_cert_files=options.ca_cert_files, realm_name=config.realm_name) pkinit_pkcs12_info = (pkinit_pkcs12_file.name, pkinit_pin) if (options.http_cert_files and options.dirsrv_cert_files and http_ca_cert != dirsrv_ca_cert): ansible_module.fail_json( msg="Apache Server SSL certificate and Directory " "Server SSL certificate are not signed by the same" " CA certificate") if (options.http_cert_files and options.pkinit_cert_files and http_ca_cert != pkinit_ca_cert): ansible_module.fail_json( msg="Apache Server SSL certificate and PKINIT KDC " "certificate are not signed by the same CA " "certificate") # Copy pkcs12_files to make them persistent till deployment is done # and encode certificates for ansible compatibility if http_pkcs12_info is not None: copyfile(http_pkcs12_file.name, "/etc/ipa/.tmp_pkcs12_http") http_pkcs12_info = ("/etc/ipa/.tmp_pkcs12_http", http_pin) http_ca_cert = "" if dirsrv_pkcs12_info is not None: copyfile(dirsrv_pkcs12_file.name, "/etc/ipa/.tmp_pkcs12_dirsrv") dirsrv_pkcs12_info = ("/etc/ipa/.tmp_pkcs12_dirsrv", dirsrv_pin) dirsrv_ca_cert = "" if pkinit_pkcs12_info is not None: copyfile(pkinit_pkcs12_file.name, "/etc/ipa/.tmp_pkcs12_pkinit") pkinit_pkcs12_info = ("/etc/ipa/.tmp_pkcs12_pkinit", pkinit_pin) pkinit_ca_cert = "" ansible_log.debug("-- FQDN --") installutils.verify_fqdn(config.host_name, options.no_host_dns) installutils.verify_fqdn(config.master_host_name, options.no_host_dns) ansible_log.debug("-- KINIT_KEYTAB --") ccache = os.environ['KRB5CCNAME'] kinit_keytab('host/{env.host}@{env.realm}'.format(env=api.env), paths.KRB5_KEYTAB, ccache) ansible_log.debug("-- CA_CRT --") cafile = paths.IPA_CA_CRT if not os.path.isfile(cafile): ansible_module.fail_json( msg="CA cert file is not available! Please reinstall" "the client and try again.") ansible_log.debug("-- REMOTE_API --") ldapuri = 'ldaps://%s' % ipautil.format_netloc(config.master_host_name) xmlrpc_uri = 'https://{}/ipa/xml'.format( ipautil.format_netloc(config.master_host_name)) remote_api = create_api(mode=None) remote_api.bootstrap(in_server=True, context='installer', confdir=paths.ETC_IPA, ldap_uri=ldapuri, xmlrpc_uri=xmlrpc_uri) remote_api.finalize() installer._remote_api = remote_api ansible_log.debug("-- RPC_CLIENT --") with rpc_client(remote_api) as client: check_remote_version(client, parse_version(api.env.version)) check_remote_fips_mode(client, api.env.fips_mode) conn = remote_api.Backend.ldap2 replman = None try: ansible_log.debug("-- CONNECT --") # Try out authentication conn.connect(ccache=ccache) replman = ReplicationManager(config.realm_name, config.master_host_name, None) ansible_log.debug("-- CHECK IPA_DOMAIN --") promotion_check_ipa_domain(conn, remote_api.env.basedn) ansible_log.debug("-- CHECK DOMAIN_LEVEL --") # Make sure that domain fulfills minimal domain level # requirement domain_level = current_domain_level(remote_api) check_domain_level_is_supported(domain_level) if domain_level < constants.MIN_DOMAIN_LEVEL: ansible_module.fail_json( msg="Cannot promote this client to a replica. The domain " "level " "must be raised to {mindomainlevel} before the replica can be " "installed".format(mindomainlevel=constants.MIN_DOMAIN_LEVEL)) ansible_log.debug("-- CHECK AUTHORIZATION --") # Check authorization result = remote_api.Command['hostgroup_find']( cn=u'ipaservers', host=[unicode(api.env.host)])['result'] add_to_ipaservers = not result ansible_log.debug("-- ADD_TO_IPASERVERS --") if add_to_ipaservers: if options.password and not options.admin_password: raise errors.ACIError(info="Not authorized") if installer._ccache is None: del os.environ['KRB5CCNAME'] else: os.environ['KRB5CCNAME'] = installer._ccache try: installutils.check_creds(options, config.realm_name) installer._ccache = os.environ.get('KRB5CCNAME') finally: os.environ['KRB5CCNAME'] = ccache conn.disconnect() conn.connect(ccache=installer._ccache) try: result = remote_api.Command['hostgroup_show']( u'ipaservers', all=True, rights=True)['result'] if 'w' not in result['attributelevelrights']['member']: raise errors.ACIError(info="Not authorized") finally: ansible_log.debug("-- RECONNECT --") conn.disconnect() conn.connect(ccache=ccache) ansible_log.debug("-- CHECK FOR REPLICATION AGREEMENT --") # Check that we don't already have a replication agreement if replman.get_replication_agreement(config.host_name): msg = ("A replication agreement for this host already exists. " "It needs to be removed.\n" "Run this command:\n" " %% ipa-replica-manage del {host} --force".format( host=config.host_name)) raise ScriptError(msg, rval=3) ansible_log.debug("-- DETECT REPLICATION MANAGER GROUP --") # Detect if the other master can handle replication managers # cn=replication managers,cn=sysaccounts,cn=etc,$SUFFIX dn = DN(('cn', 'replication managers'), ('cn', 'sysaccounts'), ('cn', 'etc'), ipautil.realm_to_suffix(config.realm_name)) try: conn.get_entry(dn) except errors.NotFound: msg = ("The Replication Managers group is not available in " "the domain. Replica promotion requires the use of " "Replication Managers to be able to replicate data. " "Upgrade the peer master or use the ipa-replica-prepare " "command on the master and use a prep file to install " "this replica.") logger.error("%s", msg) raise ScriptError(msg, rval=3) ansible_log.debug("-- CHECK DNS_MASTERS --") dns_masters = remote_api.Object['dnsrecord'].get_dns_masters() if dns_masters: if not options.no_host_dns: logger.debug('Check forward/reverse DNS resolution') resolution_ok = ( check_dns_resolution(config.master_host_name, dns_masters) and check_dns_resolution(config.host_name, dns_masters)) if not resolution_ok and installer.interactive: if not ipautil.user_input("Continue?", False): raise ScriptError(rval=0) else: logger.debug('No IPA DNS servers, ' 'skipping forward/reverse resolution check') ansible_log.debug("-- GET_IPA_CONFIG --") entry_attrs = conn.get_ipa_config() subject_base = entry_attrs.get('ipacertificatesubjectbase', [None])[0] if subject_base is not None: config.subject_base = DN(subject_base) ansible_log.debug("-- SEARCH FOR CA --") # Find if any server has a CA if not hasattr(service, "find_providing_server"): _host = [config.ca_host_name] else: _host = config.ca_host_name ca_host = find_providing_server('CA', conn, _host) if ca_host is not None: config.ca_host_name = ca_host ca_enabled = True if options.dirsrv_cert_files: msg = ("Certificates could not be provided when " "CA is present on some master.") logger.error(msg) raise ScriptError(msg, rval=3) else: if options.setup_ca: msg = ("The remote master does not have a CA " "installed, can't set up CA") logger.error(msg) raise ScriptError(msg, rval=3) ca_enabled = False if not options.dirsrv_cert_files: msg = ("Cannot issue certificates: a CA is not " "installed. Use the --http-cert-file, " "--dirsrv-cert-file options to provide " "custom certificates.") logger.error(msg) raise ScriptError(msg, rval=3) ansible_log.debug("-- SEARCH FOR KRA --") if not hasattr(service, "find_providing_server"): _host = [config.kra_host_name] else: _host = config.kra_host_name kra_host = find_providing_server('KRA', conn, _host) if kra_host is not None: config.kra_host_name = kra_host kra_enabled = True else: if options.setup_kra: msg = ("There is no active KRA server in the domain, " "can't setup a KRA clone") logger.error(msg) raise ScriptError(msg, rval=3) kra_enabled = False ansible_log.debug("-- CHECK CA --") if ca_enabled: options.realm_name = config.realm_name options.host_name = config.host_name ca.install_check(False, config, options) ansible_log.debug(" ca.external_cert_file=%s" % repr(ca.external_cert_file)) ansible_log.debug(" ca.external_ca_file=%s" % repr(ca.external_ca_file)) # TODO # TODO # Save global vars external_cert_file, external_ca_file for # later use # TODO # TODO ansible_log.debug("-- CHECK KRA --") if kra_enabled: try: kra.install_check(remote_api, config, options) except RuntimeError as e: raise ScriptError(e) ansible_log.debug("-- CHECK DNS --") if options.setup_dns: dns.install_check(False, remote_api, True, options, config.host_name) config.ips = dns.ip_addresses else: config.ips = installutils.get_server_ip_address( config.host_name, not installer.interactive, False, options.ip_addresses) # check addresses here, dns module is doing own check no_matching_interface_for_ip_address_warning(config.ips) ansible_log.debug("-- CHECK ADTRUST --") if options.setup_adtrust: adtrust.install_check(False, options, remote_api) except errors.ACIError: logger.debug("%s", traceback.format_exc()) ansible_module.fail_json( msg=("\nInsufficient privileges to promote the server." "\nPossible issues:" "\n- A user has insufficient privileges" "\n- This client has insufficient privileges " "to become an IPA replica")) except errors.LDAPError: logger.debug("%s", traceback.format_exc()) ansible_module.fail_json(msg="\nUnable to connect to LDAP server %s" % config.master_host_name) except ScriptError as e: ansible_module.fail_json(msg=str(e)) finally: if replman and replman.conn: ansible_log.debug("-- UNBIND REPLMAN--") replman.conn.unbind() if conn.isconnected(): ansible_log.debug("-- DISCONNECT --") conn.disconnect() ansible_log.debug("-- CHECK CONNECTION --") # check connection if not options.skip_conncheck: if add_to_ipaservers: # use user's credentials when the server host is not ipaservers if installer._ccache is None: del os.environ['KRB5CCNAME'] else: os.environ['KRB5CCNAME'] = installer._ccache try: with redirect_stdout(ansible_log): replica_conn_check(config.master_host_name, config.host_name, config.realm_name, options.setup_ca, 389, options.admin_password, principal=options.principal, ca_cert_file=cafile) except ScriptError as e: ansible_module.fail_json(msg=str(e)) finally: if add_to_ipaservers: os.environ['KRB5CCNAME'] = ccache if hasattr(tasks, "configure_pkcs11_modules"): if tasks.configure_pkcs11_modules(fstore): ansible_log.info("Disabled p11-kit-proxy") installer._ca_enabled = ca_enabled installer._kra_enabled = kra_enabled installer._ca_file = cafile installer._fstore = fstore installer._sstore = sstore installer._config = config installer._add_to_ipaservers = add_to_ipaservers # done # ansible_module.exit_json( changed=True, ccache=ccache, installer_ccache=installer._ccache, subject_base=str(config.subject_base), forward_policy=options.forward_policy, _ca_enabled=ca_enabled, _ca_subject=str(options._ca_subject), _subject_base=str(options._subject_base) if options._subject_base is not None else None, _kra_enabled=kra_enabled, _ca_file=cafile, _top_dir=installer._top_dir, _add_to_ipaservers=add_to_ipaservers, _dirsrv_pkcs12_info=dirsrv_pkcs12_info, _dirsrv_ca_cert=dirsrv_ca_cert, _http_pkcs12_info=http_pkcs12_info, _http_ca_cert=http_ca_cert, _pkinit_pkcs12_info=pkinit_pkcs12_info, _pkinit_ca_cert=pkinit_ca_cert, no_dnssec_validation=options.no_dnssec_validation, config_setup_ca=config.setup_ca, config_master_host_name=config.master_host_name, config_ca_host_name=config.ca_host_name, config_kra_host_name=config.kra_host_name, config_ips=[str(ip) for ip in config.ips], # ad trust dns_ip_addresses=[str(ip) for ip in dns.ip_addresses], dns_reverse_zones=dns.reverse_zones, rid_base=options.rid_base, secondary_rid_base=options.secondary_rid_base, adtrust_netbios_name=adtrust.netbios_name, adtrust_reset_netbios_name=adtrust.reset_netbios_name)
def main(): ansible_module = AnsibleModule( argument_spec=dict( # server setup_ca=dict(required=False, type='bool'), setup_kra=dict(required=False, type='bool'), no_pkinit=dict(required=False, type='bool'), no_ui_redirect=dict(required=False, type='bool'), # certificate system subject_base=dict(required=True), # additional config_master_host_name=dict(required=True), ccache=dict(required=True), _ca_enabled=dict(required=False, type='bool'), _ca_file=dict(required=False), _kra_enabled=dict(required=False, type='bool'), _kra_host_name=dict(required=False), _pkinit_pkcs12_info=dict(required=False, type='list'), _top_dir=dict(required=True), dirman_password=dict(required=True, no_log=True), ), supports_check_mode=True, ) ansible_module._ansible_debug = True setup_logging() ansible_log = AnsibleModuleLog(ansible_module) # get parameters # options = installer # server options.setup_ca = ansible_module.params.get('setup_ca') options.setup_kra = ansible_module.params.get('setup_kra') options.no_pkinit = ansible_module.params.get('no_pkinit') # certificate system options.subject_base = ansible_module.params.get('subject_base') if options.subject_base is not None: options.subject_base = DN(options.subject_base) # additional master_host_name = ansible_module.params.get('config_master_host_name') ccache = ansible_module.params.get('ccache') os.environ['KRB5CCNAME'] = ccache # os.environ['KRB5CCNAME'] = ansible_module.params.get('installer_ccache') # installer._ccache = ansible_module.params.get('installer_ccache') ca_enabled = ansible_module.params.get('_ca_enabled') kra_enabled = ansible_module.params.get('_kra_enabled') kra_host_name = ansible_module.params.get('_kra_host_name') options._pkinit_pkcs12_info = ansible_module.params.get( '_pkinit_pkcs12_info') options._top_dir = ansible_module.params.get('_top_dir') dirman_password = ansible_module.params.get('dirman_password') # init # ansible_log.debug("== INSTALL ==") options = installer promote = installer.promote env = gen_env_boostrap_finalize_core(paths.ETC_IPA, constants.DEFAULT_CONFIG) api_bootstrap_finalize(env) config = gen_ReplicaConfig() config.dirman_password = dirman_password config.promote = installer.promote config.kra_enabled = kra_enabled config.kra_host_name = kra_host_name remote_api = gen_remote_api(master_host_name, paths.ETC_IPA) conn = remote_api.Backend.ldap2 ccache = os.environ['KRB5CCNAME'] # There is a api.Backend.ldap2.connect call somewhere in ca, ds, dns or # ntpinstance api.Backend.ldap2.connect() conn.connect(ccache=ccache) with redirect_stdout(ansible_log): ansible_log.debug("-- INSTALL_CUSTODIA --") if not hasattr(custodiainstance, "get_custodia_instance"): custodia = custodiainstance.CustodiaInstance( config.host_name, config.realm_name) if promote and \ hasattr(custodiainstance.CustodiaInstance, "create_replica"): ansible_log.debug("-- CUSTODIA CREATE_REPLICA --") custodia.create_replica(config.master_host_name) else: ansible_log.debug("-- CUSTODIA CREATE_INSTANCE --") custodia.create_instance() else: if kra_enabled: # A KRA peer always provides a CA, too. mode = custodiainstance.CustodiaModes.KRA_PEER elif ca_enabled: mode = custodiainstance.CustodiaModes.CA_PEER else: mode = custodiainstance.CustodiaModes.MASTER_PEER custodia = custodiainstance.get_custodia_instance(config, mode) custodia.create_instance() # done # ansible_module.exit_json(changed=True)
def main(): ansible_module = AnsibleModule( argument_spec=dict( # server setup_ca=dict(required=False, type='bool'), setup_kra=dict(required=False, type='bool'), no_pkinit=dict(required=False, type='bool'), no_ui_redirect=dict(required=False, type='bool'), dirsrv_config_file=dict(required=False), # certificate system subject_base=dict(required=True), # additional config_master_host_name=dict(required=True), ccache=dict(required=True), _ca_enabled=dict(required=False, type='bool'), _ca_file=dict(required=False), _dirsrv_pkcs12_info=dict(required=False), _pkinit_pkcs12_info=dict(required=False), _top_dir=dict(required=True), dirman_password=dict(required=True, no_log=True), ds_ca_subject=dict(required=True), ), supports_check_mode=True, ) ansible_module._ansible_debug = True setup_logging() ansible_log = AnsibleModuleLog(ansible_module) # get parameters # options = installer # server options.setup_ca = ansible_module.params.get('setup_ca') options.setup_kra = ansible_module.params.get('setup_kra') options.no_pkinit = ansible_module.params.get('no_pkinit') options.dirsrv_config_file = ansible_module.params.get( 'dirsrv_config_file') # certificate system options.subject_base = ansible_module.params.get('subject_base') if options.subject_base is not None: options.subject_base = DN(options.subject_base) # additional master_host_name = ansible_module.params.get('config_master_host_name') ccache = ansible_module.params.get('ccache') os.environ['KRB5CCNAME'] = ccache # os.environ['KRB5CCNAME'] = ansible_module.params.get('installer_ccache') # installer._ccache = ansible_module.params.get('installer_ccache') ca_enabled = ansible_module.params.get('_ca_enabled') installer._dirsrv_pkcs12_info = ansible_module.params.get( '_dirsrv_pkcs12_info') installer._pkinit_pkcs12_info = ansible_module.params.get( '_pkinit_pkcs12_info') options._top_dir = ansible_module.params.get('_top_dir') dirman_password = ansible_module.params.get('dirman_password') ds_ca_subject = ansible_module.params.get('ds_ca_subject') # init # ansible_log.debug("== INSTALL ==") options = installer promote = installer.promote env = gen_env_boostrap_finalize_core(paths.ETC_IPA, constants.DEFAULT_CONFIG) api_bootstrap_finalize(env) config = gen_ReplicaConfig() config.dirman_password = dirman_password config.subject_base = options.subject_base remote_api = gen_remote_api(master_host_name, paths.ETC_IPA) conn = remote_api.Backend.ldap2 ccache = os.environ['KRB5CCNAME'] # There is a api.Backend.ldap2.connect call somewhere in ca, ds, dns or # ntpinstance api.Backend.ldap2.connect() conn.connect(ccache=ccache) with redirect_stdout(ansible_log): ds = replica_ds_init_info(ansible_log, config, options, ca_enabled, remote_api, ds_ca_subject, ca_file=paths.IPA_CA_CRT, promote=promote, pkcs12_info=installer._dirsrv_pkcs12_info) ansible_log.debug("-- DS APPLY_UPDATES --") # Apply any LDAP updates. Needs to be done after the replica is # synced-up # service.print_msg("Applying LDAP updates") # ds.apply_updates() schema_files = dsinstance.get_all_external_schema_files( paths.EXTERNAL_SCHEMA_DIR) data_upgrade = upgradeinstance.IPAUpgrade(ds.realm, schema_files=schema_files) data_upgrade.set_output(ansible_log) try: data_upgrade.create_instance() except Exception as e: # very fatal errors only will raise exception raise RuntimeError("Update failed: %s" % e) installutils.store_version() # done # ansible_module.exit_json(changed=True)
def main(): ansible_module = AnsibleModule( argument_spec = dict( #### server ### setup_ca=dict(required=False, type='bool'), setup_kra=dict(required=False, type='bool'), no_pkinit=dict(required=False, type='bool'), #### certificate system ### subject_base=dict(required=True), #### additional ### config_master_host_name=dict(required=True), ccache=dict(required=True), _ca_enabled=dict(required=False, type='bool'), _ca_file=dict(required=False), _pkinit_pkcs12_info = dict(required=False), _top_dir = dict(required=True), dirman_password=dict(required=True, no_log=True), ), supports_check_mode = True, ) ansible_module._ansible_debug = True ansible_log = AnsibleModuleLog(ansible_module) # get parameters # options = installer ### server ### options.setup_ca = ansible_module.params.get('setup_ca') options.setup_kra = ansible_module.params.get('setup_kra') options.no_pkinit = ansible_module.params.get('no_pkinit') ### certificate system ### options.subject_base = ansible_module.params.get('subject_base') if options.subject_base is not None: options.subject_base = DN(options.subject_base) ### additional ### master_host_name = ansible_module.params.get('config_master_host_name') ccache = ansible_module.params.get('ccache') os.environ['KRB5CCNAME'] = ccache #os.environ['KRB5CCNAME'] = ansible_module.params.get('installer_ccache') #installer._ccache = ansible_module.params.get('installer_ccache') options._pkinit_pkcs12_info = ansible_module.params.get('_pkinit_pkcs12_info') options._top_dir = ansible_module.params.get('_top_dir') dirman_password = ansible_module.params.get('dirman_password') # init # fstore = sysrestore.FileStore(paths.SYSRESTORE) ansible_log.debug("== INSTALL ==") options = installer env = gen_env_boostrap_finalize_core(paths.ETC_IPA, constants.DEFAULT_CONFIG) api_bootstrap_finalize(env) config = gen_ReplicaConfig() config.dirman_password = dirman_password remote_api = gen_remote_api(master_host_name, paths.ETC_IPA) #installer._remote_api = remote_api conn = remote_api.Backend.ldap2 ccache = os.environ['KRB5CCNAME'] # There is a api.Backend.ldap2.connect call somewhere in ca, ds, dns or # ntpinstance api.Backend.ldap2.connect() conn.connect(ccache=ccache) # krb krb = krbinstance.KrbInstance(fstore) krb.set_output(ansible_log) with redirect_stdout(ansible_log): krb.init_info(api.env.realm, api.env.host, setup_pkinit=not options.no_pkinit, subject_base=options.subject_base) krb.pkcs12_info = options._pkinit_pkcs12_info krb.master_fqdn = master_host_name ansible_log.debug("-- KRB ENABLE_SSL --") # configure PKINIT now that all required services are in place krb.enable_ssl() # done # ansible_module.exit_json(changed=True)