def main(): ansible_module = AnsibleModule( argument_spec=dict( # basic realm=dict(required=True), hostname=dict(required=False), setup_ca=dict(required=False, type='bool', default=False), ), ) ansible_module._ansible_debug = True setup_logging() ansible_log = AnsibleModuleLog(ansible_module) # set values #################################################### options.realm_name = ansible_module.params.get('realm') options.host_name = ansible_module.params.get('hostname') options.setup_ca = ansible_module.params.get('setup_ca') # init ########################################################## api_Backend_ldap2(options.host_name, options.setup_ca, connect=True) # setup ds ###################################################### otpd = otpdinstance.OtpdInstance() otpd.set_output(ansible_log) with redirect_stdout(ansible_log): otpd.create_instance('OTPD', options.host_name, ipautil.realm_to_suffix(options.realm_name)) # done ########################################################## ansible_module.exit_json(changed=True)
def main(): ansible_module = AnsibleModule( argument_spec=dict( # basic hostname=dict(required=False), setup_ca=dict(required=False, type='bool', default=False), setup_adtrust=dict(required=False, type='bool', default=False), # ad trust enable_compat=dict(required=False, type='bool', default=False), rid_base=dict(required=False, type='int'), secondary_rid_base=dict(required=False, type='int'), # additional adtrust_netbios_name=dict(required=True), adtrust_reset_netbios_name=dict(required=True, type='bool'), ), ) ansible_module._ansible_debug = True setup_logging() ansible_log = AnsibleModuleLog(ansible_module) # set values #################################################### options.host_name = ansible_module.params.get('hostname') options.setup_ca = ansible_module.params.get('setup_ca') options.setup_adtrust = ansible_module.params.get('setup_adtrust') # ad trust options.enable_compat = ansible_module.params.get('enable_compat') options.rid_base = ansible_module.params.get('rid_base') options.secondary_rid_base = ansible_module.params.get( 'secondary_rid_base') # additional adtrust.netbios_name = ansible_module.params.get('adtrust_netbios_name') adtrust.reset_netbios_name = ansible_module.params.get( 'adtrust_reset_netbios_name') # init ########################################################## fstore = sysrestore.FileStore(paths.SYSRESTORE) api_Backend_ldap2(options.host_name, options.setup_ca, connect=True) # setup ds ###################################################### with redirect_stdout(ansible_log): adtrust.install(False, options, fstore, api) # done ########################################################## ansible_module.exit_json(changed=True)
def main(): ansible_module = AnsibleModule( argument_spec=dict( # basic dm_password=dict(required=True, no_log=True), hostname=dict(required=True), setup_ca=dict(required=True, type='bool'), setup_kra=dict(required=True, type='bool'), realm=dict(required=True), pki_config_override=dict(required=False), ), ) ansible_module._ansible_debug = True setup_logging() ansible_log = AnsibleModuleLog(ansible_module) # set values #################################################### options.dm_password = ansible_module.params.get('dm_password') options.host_name = ansible_module.params.get('hostname') options.setup_ca = ansible_module.params.get('setup_ca') options.setup_kra = ansible_module.params.get('setup_kra') options.realm_name = ansible_module.params.get('realm') options.pki_config_override = ansible_module.params.get( 'pki_config_override') options.promote = False # first master, no promotion # init ########################################################## api_Backend_ldap2(options.host_name, options.setup_ca, connect=True) # setup kra ##################################################### with redirect_stdout(ansible_log): if hasattr(custodiainstance, "get_custodia_instance"): if hasattr(custodiainstance.CustodiaModes, "FIRST_MASTER"): mode = custodiainstance.CustodiaModes.FIRST_MASTER else: mode = custodiainstance.CustodiaModes.MASTER_PEER custodia = custodiainstance.get_custodia_instance(options, mode) kra.install(api, None, options, custodia=custodia) else: kra.install(api, None, options) # done ########################################################## ansible_module.exit_json(changed=True)
def main(): ansible_module = AnsibleModule( argument_spec=dict( # basic realm=dict(required=True), hostname=dict(required=False), setup_ca=dict(required=False, type='bool', default=False), ), ) ansible_module._ansible_debug = True setup_logging() ansible_log = AnsibleModuleLog(ansible_module) # set values ############################################################ options.realm_name = ansible_module.params.get('realm') options.host_name = ansible_module.params.get('hostname') options.setup_ca = ansible_module.params.get('setup_ca') options.promote = False # init ################################################################## api_Backend_ldap2(options.host_name, options.setup_ca, connect=True) # setup custodia ######################################################## if hasattr(custodiainstance, "get_custodia_instance"): if hasattr(custodiainstance.CustodiaModes, "FIRST_MASTER"): mode = custodiainstance.CustodiaModes.FIRST_MASTER else: mode = custodiainstance.CustodiaModes.MASTER_PEER custodia = custodiainstance.get_custodia_instance(options, mode) else: custodia = custodiainstance.CustodiaInstance(options.host_name, options.realm_name) custodia.set_output(ansible_log) with redirect_stdout(ansible_log): custodia.create_instance() # done ################################################################## ansible_module.exit_json(changed=True)
def main(): ansible_module = AnsibleModule( argument_spec = dict( # basic dm_password=dict(required=True, no_log=True), password=dict(required=True, no_log=True), master_password=dict(required=True, no_log=True), domain=dict(required=True), realm=dict(required=True), hostname=dict(required=False), ip_addresses=dict(required=False, type='list', default=[]), reverse_zones=dict(required=False, type='list', default=[]), http_cert_files=dict(required=False, type='list', default=[]), setup_adtrust=dict(required=False, type='bool', default=False), setup_kra=dict(required=False, type='bool', default=False), setup_dns=dict(required=False, type='bool', default=False), setup_ca=dict(required=False, type='bool', default=False), no_host_dns=dict(required=False, type='bool', default=False), no_pkinit=dict(required=False, type='bool', default=False), no_hbac_allow=dict(required=False, type='bool', default=False), no_ui_redirect=dict(required=False, type='bool', default=False), external_cert_files=dict(required=False, type='list', default=[]), subject_base=dict(required=False), _subject_base=dict(required=False), ca_subject=dict(required=False), _ca_subject=dict(required=False), idstart=dict(required=True, type='int'), idmax=dict(required=True, type='int'), domainlevel=dict(required=False, type='int'), dirsrv_config_file=dict(required=False), dirsrv_cert_files=dict(required=False, type='list', default=[]), no_reverse=dict(required=False, type='bool', default=False), auto_forwarders=dict(required=False, type='bool', default=False), #_update_hosts_file=dict(required=False, type='bool', default=False), _dirsrv_pkcs12_info=dict(required=False), _http_pkcs12_info=dict(required=False), ), ) ansible_module._ansible_debug = True ansible_log = AnsibleModuleLog(ansible_module) # set values ############################################################ options.dm_password = ansible_module.params.get('dm_password') options.admin_password = ansible_module.params.get('password') options.master_password = ansible_module.params.get('master_password') options.domain_name = ansible_module.params.get('domain') options.realm_name = ansible_module.params.get('realm') options.host_name = ansible_module.params.get('hostname') options.ip_addresses = ansible_module_get_parsed_ip_addresses( ansible_module) options.reverse_zones = ansible_module.params.get('reverse_zones') options.http_cert_files = ansible_module.params.get('http_cert_files') options.setup_adtrust = ansible_module.params.get('setup_adtrust') options.setup_kra = ansible_module.params.get('setup_kra') options.setup_dns = ansible_module.params.get('setup_dns') options.setup_ca = ansible_module.params.get('setup_ca') options.no_host_dns = ansible_module.params.get('no_host_dns') options.no_pkinit = ansible_module.params.get('no_pkinit') options.no_hbac_allow = ansible_module.params.get('no_hbac_allow') options.no_ui_redirect = ansible_module.params.get('no_ui_redirect') options.external_cert_files = ansible_module.params.get( 'external_cert_files') options.subject_base = ansible_module.params.get('subject_base') options._subject_base = ansible_module.params.get('_subject_base') options.ca_subject = ansible_module.params.get('ca_subject') options._ca_subject = ansible_module.params.get('_ca_subject') options.no_reverse = ansible_module.params.get('no_reverse') options.auto_forwarders = ansible_module.params.get('auto_forwarders') options.idstart = ansible_module.params.get('idstart') options.idmax = ansible_module.params.get('idmax') options.domainlevel = ansible_module.params.get('domainlevel') options.dirsrv_config_file = ansible_module.params.get('dirsrv_config_file') options.dirsrv_cert_files = ansible_module.params.get('dirsrv_cert_files') #options._update_hosts_file = ansible_module.params.get('_update_hosts_file') options._dirsrv_pkcs12_info = ansible_module.params.get( '_dirsrv_pkcs12_info') options._http_pkcs12_info = ansible_module.params.get( '_http_pkcs12_info') # init ################################################################## fstore = sysrestore.FileStore(paths.SYSRESTORE) api_Backend_ldap2(options.host_name, options.setup_ca, connect=True) ds = ds_init_info(ansible_log, fstore, options.domainlevel, options.dirsrv_config_file, options.realm_name, options.host_name, options.domain_name, options.dm_password, options.idstart, options.idmax, options.subject_base, options.ca_subject, options.no_hbac_allow, options._dirsrv_pkcs12_info, options.no_pkinit) # krb krb = krbinstance.KrbInstance(fstore) krb.set_output(ansible_log) with redirect_stdout(ansible_log): krb.init_info(options.realm_name, options.host_name, setup_pkinit=not options.no_pkinit, subject_base=options.subject_base) # setup HTTP ############################################################ # Create a HTTP instance http = httpinstance.HTTPInstance(fstore) http.set_output(ansible_log) with redirect_stdout(ansible_log): if options.http_cert_files: http.create_instance( options.realm_name, options.host_name, options.domain_name, options.dm_password, pkcs12_info=options._http_pkcs12_info, subject_base=options.subject_base, auto_redirect=not options.no_ui_redirect, ca_is_configured=options.setup_ca) else: http.create_instance( options.realm_name, options.host_name, options.domain_name, options.dm_password, subject_base=options.subject_base, auto_redirect=not options.no_ui_redirect, ca_is_configured=options.setup_ca) if hasattr(paths, "CACHE_IPA_SESSIONS"): tasks.restore_context(paths.CACHE_IPA_SESSIONS) ca.set_subject_base_in_config(options.subject_base) # configure PKINIT now that all required services are in place krb.enable_ssl() # Apply any LDAP updates. Needs to be done after the configuration file # is created. DS is restarted in the process. service.print_msg("Applying LDAP updates") ds.apply_updates() # Restart krb after configurations have been changed service.print_msg("Restarting the KDC") krb.restart() # done ################################################################## ansible_module.exit_json(changed=True)
def main(): ansible_module = AnsibleModule( argument_spec=dict( # basic dm_password=dict(required=True, no_log=True), password=dict(required=True, no_log=True), master_password=dict(required=True, no_log=True), domain=dict(required=True), realm=dict(required=True), hostname=dict(required=False), ip_addresses=dict(required=False, type='list', default=[]), reverse_zones=dict(required=False, type='list', default=[]), setup_adtrust=dict(required=False, type='bool', default=False), setup_kra=dict(required=False, type='bool', default=False), setup_dns=dict(required=False, type='bool', default=False), setup_ca=dict(required=False, type='bool', default=False), no_host_dns=dict(required=False, type='bool', default=False), no_pkinit=dict(required=False, type='bool', default=False), no_hbac_allow=dict(required=False, type='bool', default=False), external_cert_files=dict(required=False, type='list', default=[]), subject_base=dict(required=False), ca_subject=dict(required=False), idstart=dict(required=True, type='int'), idmax=dict(required=True, type='int'), no_reverse=dict(required=False, type='bool', default=False), auto_forwarders=dict(required=False, type='bool', default=False), _pkinit_pkcs12_info=dict(required=False, type='list'), ), ) ansible_module._ansible_debug = True setup_logging() ansible_log = AnsibleModuleLog(ansible_module) # set values ############################################################ options.dm_password = ansible_module.params.get('dm_password') options.admin_password = ansible_module.params.get('password') options.master_password = ansible_module.params.get('master_password') options.domain_name = ansible_module.params.get('domain') options.realm_name = ansible_module.params.get('realm') options.host_name = ansible_module.params.get('hostname') options.ip_addresses = ansible_module_get_parsed_ip_addresses( ansible_module) options.reverse_zones = ansible_module.params.get('reverse_zones') options.setup_adtrust = ansible_module.params.get('setup_adtrust') options.setup_kra = ansible_module.params.get('setup_kra') options.setup_dns = ansible_module.params.get('setup_dns') options.setup_ca = ansible_module.params.get('setup_ca') options.no_host_dns = ansible_module.params.get('no_host_dns') options.no_pkinit = ansible_module.params.get('no_pkinit') options.no_hbac_allow = ansible_module.params.get('no_hbac_allow') options.external_cert_files = ansible_module.params.get( 'external_cert_files') options.subject_base = ansible_module.params.get('subject_base') options.ca_subject = ansible_module.params.get('ca_subject') options.no_reverse = ansible_module.params.get('no_reverse') options.auto_forwarders = ansible_module.params.get('auto_forwarders') options.idstart = ansible_module.params.get('idstart') options.idmax = ansible_module.params.get('idmax') options._pkinit_pkcs12_info = ansible_module.params.get( '_pkinit_pkcs12_info') # options._update_hosts_file = ansible_module.params.get( # 'update_hosts_file') # init ################################################################## fstore = sysrestore.FileStore(paths.SYSRESTORE) api_Backend_ldap2(options.host_name, options.setup_ca, connect=True) # setup KRB ############################################################# krb = krbinstance.KrbInstance(fstore) krb.set_output(ansible_log) with redirect_stdout(ansible_log): if not options.external_cert_files: krb.create_instance(options.realm_name, options.host_name, options.domain_name, options.dm_password, options.master_password, setup_pkinit=not options.no_pkinit, pkcs12_info=options._pkinit_pkcs12_info, subject_base=options.subject_base) else: krb.init_info(options.realm_name, options.host_name, setup_pkinit=not options.no_pkinit, subject_base=options.subject_base) ansible_module.exit_json(changed=True)
def main(): ansible_module = AnsibleModule( argument_spec=dict( # basic dm_password=dict(required=True, no_log=True), password=dict(required=True, no_log=True), master_password=dict(required=True, no_log=True), ip_addresses=dict(required=False, type='list', default=[]), domain=dict(required=True), realm=dict(required=True), hostname=dict(required=False), no_host_dns=dict(required=False, type='bool', default=False), pki_config_override=dict(required=False), # server setup_adtrust=dict(required=False, type='bool', default=False), setup_kra=dict(required=False, type='bool', default=False), setup_dns=dict(required=False, type='bool', default=False), setup_ca=dict(required=False, type='bool', default=False), idstart=dict(required=True, type='int'), idmax=dict(required=True, type='int'), no_hbac_allow=dict(required=False, type='bool', default=False), no_pkinit=dict(required=False, type='bool', default=False), dirsrv_config_file=dict(required=False), dirsrv_cert_files=dict(required=False, type='list'), _dirsrv_pkcs12_info=dict(required=False), # certificate system external_ca=dict(required=False, type='bool', default=False), external_ca_type=dict(required=False), external_ca_profile=dict(required=False), external_cert_files=dict(required=False, type='list', default=None), subject_base=dict(required=False), _subject_base=dict(required=False), ca_subject=dict(required=False), _ca_subject=dict(required=False), ca_signing_algorithm=dict(required=False), # dns reverse_zones=dict(required=False, type='list', default=[]), no_reverse=dict(required=False, type='bool', default=False), auto_forwarders=dict(required=False, type='bool', default=False), # additional domainlevel=dict(required=False, type='int'), _http_ca_cert=dict(required=False), ), ) ansible_module._ansible_debug = True setup_logging() ansible_log = AnsibleModuleLog(ansible_module) # set values ############################################################ # basic options.dm_password = ansible_module.params.get('dm_password') options.admin_password = ansible_module.params.get('password') options.master_password = ansible_module.params.get('master_password') options.ip_addresses = ansible_module_get_parsed_ip_addresses( ansible_module) options.domain_name = ansible_module.params.get('domain') options.realm_name = ansible_module.params.get('realm') options.host_name = ansible_module.params.get('hostname') options.no_host_dns = ansible_module.params.get('no_host_dns') options.pki_config_override = ansible_module.params.get( 'pki_config_override') # server options.setup_adtrust = ansible_module.params.get('setup_adtrust') options.setup_kra = ansible_module.params.get('setup_kra') options.setup_dns = ansible_module.params.get('setup_dns') options.setup_ca = ansible_module.params.get('setup_ca') options.idstart = ansible_module.params.get('idstart') options.idmax = ansible_module.params.get('idmax') options.no_hbac_allow = ansible_module.params.get('no_hbac_allow') options.no_pkinit = ansible_module.params.get('no_pkinit') options.dirsrv_config_file = ansible_module.params.get( 'dirsrv_config_file') options.dirsrv_cert_files = ansible_module.params.get('dirsrv_cert_files') options._dirsrv_pkcs12_info = ansible_module.params.get( '_dirsrv_pkcs12_info') # certificate system options.external_ca = ansible_module.params.get('external_ca') options.external_ca_type = ansible_module.params.get('external_ca_type') options.external_ca_profile = ansible_module.params.get( 'external_ca_profile') options.external_cert_files = ansible_module.params.get( 'external_cert_files') options.subject_base = ansible_module.params.get('subject_base') options._subject_base = ansible_module.params.get('_subject_base') options.ca_subject = ansible_module.params.get('ca_subject') options._ca_subject = ansible_module.params.get('_ca_subject') options.ca_signing_algorithm = ansible_module.params.get( 'ca_signing_algorithm') # dns options.reverse_zones = ansible_module.params.get('reverse_zones') options.no_reverse = ansible_module.params.get('no_reverse') options.auto_forwarders = ansible_module.params.get('auto_forwarders') # additional options.domainlevel = ansible_module.params.get('domainlevel') options._http_ca_cert = ansible_module.params.get('_http_ca_cert') # tions._update_hosts_file = ansible_module.params.get( # 'update_hosts_file') # init ################################################################# options.promote = False # first master, no promotion # Repeat from ca.install_check # ca.external_cert_file and ca.external_ca_file need to be set if options.external_cert_files: ca.external_cert_file, ca.external_ca_file = \ installutils.load_external_cert( options.external_cert_files, options._ca_subject) fstore = sysrestore.FileStore(paths.SYSRESTORE) api_Backend_ldap2(options.host_name, options.setup_ca, connect=True) ds = ds_init_info(ansible_log, fstore, options.domainlevel, options.dirsrv_config_file, options.realm_name, options.host_name, options.domain_name, options.dm_password, options.idstart, options.idmax, options.subject_base, options.ca_subject, options.no_hbac_allow, options._dirsrv_pkcs12_info, options.no_pkinit) # setup CA ############################################################## if hasattr(custodiainstance, "get_custodia_instance"): if hasattr(custodiainstance.CustodiaModes, "FIRST_MASTER"): mode = custodiainstance.CustodiaModes.FIRST_MASTER else: mode = custodiainstance.CustodiaModes.MASTER_PEER custodia = custodiainstance.get_custodia_instance(options, mode) custodia.set_output(ansible_log) with redirect_stdout(ansible_log): custodia.create_instance() if options.setup_ca: if not options.external_cert_files and options.external_ca: # stage 1 of external CA installation cache_vars = { n: options.__dict__[n] for o, n in options.knobs() if n in options.__dict__ } write_cache(cache_vars) try: with redirect_stdout(ansible_log): if hasattr(custodiainstance, "get_custodia_instance"): ca.install_step_0(False, None, options, custodia=custodia) else: ca.install_step_0(False, None, options) except SystemExit: ansible_module.exit_json(changed=True, csr_generated=True) else: # Put the CA cert where other instances expect it x509.write_certificate(options._http_ca_cert, paths.IPA_CA_CRT) os.chmod(paths.IPA_CA_CRT, 0o444) if not options.no_pkinit: x509.write_certificate(options._http_ca_cert, paths.KDC_CA_BUNDLE_PEM) else: with open(paths.KDC_CA_BUNDLE_PEM, 'w'): pass os.chmod(paths.KDC_CA_BUNDLE_PEM, 0o444) x509.write_certificate(options._http_ca_cert, paths.CA_BUNDLE_PEM) os.chmod(paths.CA_BUNDLE_PEM, 0o444) with redirect_stdout(ansible_log): # we now need to enable ssl on the ds ds.enable_ssl() if options.setup_ca: with redirect_stdout(ansible_log): if hasattr(custodiainstance, "get_custodia_instance"): ca.install_step_1(False, None, options, custodia=custodia) else: ca.install_step_1(False, None, options) ansible_module.exit_json(changed=True, csr_generated=False)
def main(): ansible_module = AnsibleModule( argument_spec=dict( # basic dm_password=dict(required=True, no_log=True), password=dict(required=True, no_log=True), domain=dict(required=True), realm=dict(required=True), hostname=dict(required=False), # server idstart=dict(required=True, type='int'), idmax=dict(required=True, type='int'), no_hbac_allow=dict(required=False, type='bool', default=False), no_pkinit=dict(required=False, type='bool', default=False), dirsrv_config_file=dict(required=False), # ssl certificate dirsrv_cert_files=dict(required=False, type='list', default=[]), _dirsrv_pkcs12_info=dict(required=False), # certificate system external_cert_files=dict(required=False, type='list', default=[]), subject_base=dict(required=False), ca_subject=dict(required=False), # additional setup_ca=dict(required=False, type='bool', default=False), ), ) ansible_module._ansible_debug = True setup_logging() ansible_log = AnsibleModuleLog(ansible_module) # set values ############################################################ # basic options.dm_password = ansible_module.params.get('dm_password') options.domain_name = ansible_module.params.get('domain') options.realm_name = ansible_module.params.get('realm') options.host_name = ansible_module.params.get('hostname') # server options.idstart = ansible_module.params.get('idstart') options.idmax = ansible_module.params.get('idmax') options.no_pkinit = ansible_module.params.get('no_pkinit') options.no_hbac_allow = ansible_module.params.get('no_hbac_allow') options.dirsrv_config_file = ansible_module.params.get( 'dirsrv_config_file') options._dirsrv_pkcs12_info = ansible_module.params.get( '_dirsrv_pkcs12_info') # ssl certificate options.dirsrv_cert_files = ansible_module.params.get('dirsrv_cert_files') # certificate system options.external_cert_files = ansible_module.params.get( 'external_cert_files') options.subject_base = ansible_module.params.get('subject_base') options.ca_subject = ansible_module.params.get('ca_subject') # additional options.setup_ca = ansible_module.params.get('setup_ca') # init ################################################################## fstore = sysrestore.FileStore(paths.SYSRESTORE) # api Backend connect only if external_cert_files is not set api_Backend_ldap2(options.host_name, options.setup_ca, connect=False) # setup DS ############################################################## # Make sure tmpfiles dir exist before installing components if NUM_VERSION == 40504: tasks.create_tmpfiles_dirs(IPAAPI_USER) elif 40500 <= NUM_VERSION <= 40503: tasks.create_tmpfiles_dirs() # Create a directory server instance if not options.external_cert_files: ds = dsinstance.DsInstance(fstore=fstore, domainlevel=options.domainlevel, config_ldif=options.dirsrv_config_file) ds.set_output(ansible_log) if options.dirsrv_cert_files: _dirsrv_pkcs12_info = options._dirsrv_pkcs12_info else: _dirsrv_pkcs12_info = None with redirect_stdout(ansible_log): ds.create_instance(options.realm_name, options.host_name, options.domain_name, options.dm_password, _dirsrv_pkcs12_info, idstart=options.idstart, idmax=options.idmax, subject_base=options.subject_base, ca_subject=options.ca_subject, hbac_allow=not options.no_hbac_allow, setup_pkinit=not options.no_pkinit) if not options.dirsrv_cert_files and NUM_VERSION < 40690: ntpinstance.ntp_ldap_enable(options.host_name, ds.suffix, options.realm_name) else: api.Backend.ldap2.connect() ds = dsinstance.DsInstance(fstore=fstore, domainlevel=options.domainlevel) ds.set_output(ansible_log) with redirect_stdout(ansible_log): ds.init_info(options.realm_name, options.host_name, options.domain_name, options.dm_password, options.subject_base, options.ca_subject, 1101, 1100, None, setup_pkinit=not options.no_pkinit) # done ################################################################## ansible_module.exit_json(changed=True)
def main(): ansible_module = AnsibleModule( argument_spec=dict( # basic dm_password=dict(required=True, no_log=True), password=dict(required=True, no_log=True), domain=dict(required=True), realm=dict(required=True), hostname=dict(required=True), # server setup_ca=dict(required=True, type='bool'), idstart=dict(required=True, type='int'), idmax=dict(required=True, type='int'), no_hbac_allow=dict(required=False, type='bool', default=False), no_pkinit=dict(required=False, type='bool', default=False), dirsrv_config_file=dict(required=False), _dirsrv_pkcs12_info=dict(required=False), # ssl certificate dirsrv_cert_files=dict(required=False, type='list', default=[]), subject_base=dict(required=False), ca_subject=dict(required=False), # certificate system external_cert_files=dict(required=False, type='list', default=[]), # additional domainlevel=dict(required=False, type='int', default=MAX_DOMAIN_LEVEL), ), ) ansible_module._ansible_debug = True setup_logging() ansible_log = AnsibleModuleLog(ansible_module) # set values #################################################### # basic options.dm_password = ansible_module.params.get('dm_password') options.admin_password = ansible_module.params.get('password') options.domain_name = ansible_module.params.get('domain') options.realm_name = ansible_module.params.get('realm') options.host_name = ansible_module.params.get('hostname') # server options.setup_ca = ansible_module.params.get('setup_ca') options.idstart = ansible_module.params.get('idstart') options.idmax = ansible_module.params.get('idmax') options.no_hbac_allow = ansible_module.params.get('no_hbac_allow') options.no_pkinit = ansible_module.params.get('no_pkinit') options.dirsrv_config_file = ansible_module.params.get( 'dirsrv_config_file') options._dirsrv_pkcs12_info = ansible_module.params.get( '_dirsrv_pkcs12_info') # ssl certificate options.dirsrv_cert_files = ansible_module.params.get('dirsrv_cert_files') options.subject_base = ansible_module.params.get('subject_base') options.ca_subject = ansible_module.params.get('ca_subject') # certificate system options.external_cert_files = ansible_module.params.get( 'external_cert_files') # additional options.domainlevel = ansible_module.params.get('domainlevel') options.domain_level = options.domainlevel # init ########################################################## fstore = sysrestore.FileStore(paths.SYSRESTORE) api_Backend_ldap2(options.host_name, options.setup_ca, connect=True) ds = ds_init_info(ansible_log, fstore, options.domainlevel, options.dirsrv_config_file, options.realm_name, options.host_name, options.domain_name, options.dm_password, options.idstart, options.idmax, options.subject_base, options.ca_subject, options.no_hbac_allow, options._dirsrv_pkcs12_info, options.no_pkinit) # set ds password ############################################### with redirect_stdout(ansible_log): ds.change_admin_password(options.admin_password) # done ########################################################## ansible_module.exit_json(changed=True)
def main(): ansible_module = AnsibleModule( argument_spec=dict( # basic ip_addresses=dict(required=False, type='list', default=[]), domain=dict(required=True), realm=dict(required=True), hostname=dict(required=True), # server setup_dns=dict(required=True, type='bool'), setup_ca=dict(required=True, type='bool'), # dns zonemgr=dict(required=False), forwarders=dict(required=True, type='list'), forward_policy=dict(default='first', choices=['first', 'only']), no_dnssec_validation=dict(required=False, type='bool', default=False), # additional dns_ip_addresses=dict(required=True, type='list'), dns_reverse_zones=dict(required=True, type='list'), ), ) ansible_module._ansible_debug = True setup_logging() ansible_log = AnsibleModuleLog(ansible_module) # set values ############################################################ # basic options.ip_addresses = ansible_module_get_parsed_ip_addresses( ansible_module) options.domain_name = ansible_module.params.get('domain') options.realm_name = ansible_module.params.get('realm') options.host_name = ansible_module.params.get('hostname') # server options.setup_dns = ansible_module.params.get('setup_dns') options.setup_ca = ansible_module.params.get('setup_ca') # dns options.zonemgr = ansible_module.params.get('zonemgr') options.forwarders = ansible_module.params.get('forwarders') options.forward_policy = ansible_module.params.get('forward_policy') options.no_dnssec_validation = ansible_module.params.get( 'no_dnssec_validation') # additional dns.ip_addresses = ansible_module_get_parsed_ip_addresses( ansible_module, 'dns_ip_addresses') dns.reverse_zones = ansible_module.params.get('dns_reverse_zones') # init ################################################################## fstore = sysrestore.FileStore(paths.SYSRESTORE) api_Backend_ldap2(options.host_name, options.setup_ca, connect=True) # setup dns ############################################################# with redirect_stdout(ansible_log): if options.setup_dns: dns.install(False, False, options) else: # Create a BIND instance bind = bindinstance.BindInstance(fstore) bind.set_output(ansible_log) bind.setup(options.host_name, options.ip_addresses, options.realm_name, options.domain_name, (), 'first', (), zonemgr=options.zonemgr, no_dnssec_validation=options.no_dnssec_validation) bind.create_file_with_system_records() # done ################################################################## ansible_module.exit_json(changed=True)