def main(): ansible_module = AnsibleModule( argument_spec=dict( hostname=dict(required=False), hidden_replica=dict(required=False, type='bool', default=False), # server # certificate system subject_base=dict(required=True), # additional ccache=dict(required=True), _top_dir=dict(required=True), setup_ca=dict(required=True, type='bool'), setup_kra=dict(required=True, type='bool'), config_master_host_name=dict(required=True), ), supports_check_mode=True, ) ansible_module._ansible_debug = True ansible_log = AnsibleModuleLog(ansible_module) # get parameters # options = installer options.host_name = ansible_module.params.get('hostname') options.hidden_replica = ansible_module.params.get('hidden_replica') # server # certificate system options.subject_base = ansible_module.params.get('subject_base') if options.subject_base is not None: options.subject_base = DN(options.subject_base) # additional ccache = ansible_module.params.get('ccache') os.environ['KRB5CCNAME'] = ccache options._top_dir = ansible_module.params.get('_top_dir') options.setup_ca = ansible_module.params.get('setup_ca') options.setup_kra = ansible_module.params.get('setup_kra') config_master_host_name = ansible_module.params.get( 'config_master_host_name') # init # ansible_log.debug("== INSTALL ==") env = gen_env_boostrap_finalize_core(paths.ETC_IPA, constants.DEFAULT_CONFIG) api_bootstrap_finalize(env) config = gen_ReplicaConfig() remote_api = gen_remote_api(config_master_host_name, paths.ETC_IPA) installer._remote_api = remote_api ccache = os.environ['KRB5CCNAME'] api.Backend.ldap2.connect() with redirect_stdout(ansible_log): if options.hidden_replica: # Set services to hidden service.hide_services(config.host_name) else: # Enable configured services service.enable_services(config.host_name) # update DNS SRV records. Although it's only really necessary in # enabled-service case, also perform update in hidden replica case. api.Command.dns_update_system_records() ca_servers = find_providing_servers('CA', api.Backend.ldap2, api=api) api.Backend.ldap2.disconnect() # Everything installed properly, activate ipa service. services.knownservices.ipa.enable() # Print a warning if CA role is only installed on one server if len(ca_servers) == 1: msg = u''' WARNING: The CA service is only installed on one server ({}). It is strongly recommended to install it on another server. Run ipa-ca-install(1) on another master to accomplish this. '''.format(ca_servers[0]) ansible_module.debug(msg) # done # ansible_module.exit_json(changed=True)
def main(): ansible_module = AnsibleModule( argument_spec=dict( # server setup_kra=dict(required=False, type='bool'), # certificate system subject_base=dict(required=True), # additional ccache=dict(required=True), _top_dir=dict(required=True), config_setup_ca=dict(required=True, type='bool'), config_master_host_name=dict(required=True), ), supports_check_mode=True, ) ansible_module._ansible_debug = True ansible_log = AnsibleModuleLog(ansible_module) # get parameters # options = installer # server options.setup_kra = ansible_module.params.get('setup_kra') # certificate system options.subject_base = ansible_module.params.get('subject_base') if options.subject_base is not None: options.subject_base = DN(options.subject_base) # additional ccache = ansible_module.params.get('ccache') os.environ['KRB5CCNAME'] = ccache options._top_dir = ansible_module.params.get('_top_dir') config_setup_ca = ansible_module.params.get('config_setup_ca') installer.setup_ca = config_setup_ca config_master_host_name = ansible_module.params.get( 'config_master_host_name') # init # ansible_log.debug("== INSTALL ==") env = gen_env_boostrap_finalize_core(paths.ETC_IPA, constants.DEFAULT_CONFIG) api_bootstrap_finalize(env) config = gen_ReplicaConfig() config.subject_base = options.subject_base config.setup_ca = config_setup_ca config.master_host_name = config_master_host_name remote_api = gen_remote_api(config.master_host_name, paths.ETC_IPA) installer._remote_api = remote_api ccache = os.environ['KRB5CCNAME'] with redirect_stdout(ansible_log): ansible_log.debug("-- PROMOTE SSSD --") promote_sssd(config.host_name) # done # ansible_module.exit_json(changed=True)
def main(): ansible_module = AnsibleModule( argument_spec=dict( # basic dm_password=dict(required=False, no_log=True), password=dict(required=False, no_log=True), ip_addresses=dict(required=False, type='list', default=[]), domain=dict(required=False), realm=dict(required=False), hostname=dict(required=False), ca_cert_files=dict(required=False, type='list', default=[]), no_host_dns=dict(required=False, type='bool', default=False), # server setup_adtrust=dict(required=False, type='bool'), setup_ca=dict(required=False, type='bool'), setup_kra=dict(required=False, type='bool'), setup_dns=dict(required=False, type='bool'), # ssl certificate dirsrv_cert_files=dict(required=False, type='list', default=[]), # client force_join=dict(required=False, type='bool'), # certificate system subject_base=dict(required=True), # additional server=dict(required=True), config_master_host_name=dict(required=True), config_ca_host_name=dict(required=True), ccache=dict(required=True), installer_ccache=dict(required=True), _ca_enabled=dict(required=False, type='bool'), _top_dir=dict(required=True), _add_to_ipaservers=dict(required=True, type='bool'), _ca_subject=dict(required=True), _subject_base=dict(required=True), master=dict(required=False, default=None), dirman_password=dict(required=True, no_log=True), ), supports_check_mode=True, ) ansible_module._ansible_debug = True setup_logging() ansible_log = AnsibleModuleLog(ansible_module) # get parameters # options = installer options.dm_password = ansible_module.params.get('dm_password') options.password = options.dm_password options.admin_password = ansible_module.params.get('password') options.ip_addresses = ansible_module_get_parsed_ip_addresses( ansible_module) options.domain_name = ansible_module.params.get('domain') options.realm_name = ansible_module.params.get('realm') options.host_name = ansible_module.params.get('hostname') options.ca_cert_files = ansible_module.params.get('ca_cert_files') options.no_host_dns = ansible_module.params.get('no_host_dns') # server options.setup_adtrust = ansible_module.params.get('setup_adtrust') options.setup_ca = ansible_module.params.get('setup_ca') options.setup_kra = ansible_module.params.get('setup_kra') options.setup_dns = ansible_module.params.get('setup_dns') # ssl certificate options.dirsrv_cert_files = ansible_module.params.get('dirsrv_cert_files') # client options.force_join = ansible_module.params.get('force_join') # certificate system options.external_ca = ansible_module.params.get('external_ca') options.external_cert_files = ansible_module.params.get( 'external_cert_files') options.subject_base = ansible_module.params.get('subject_base') if options.subject_base is not None: options.subject_base = DN(options.subject_base) options.ca_subject = ansible_module.params.get('ca_subject') # additional # options._host_name_overridden = ansible_module.params.get( # '_hostname_overridden') options.server = ansible_module.params.get('server') master_host_name = ansible_module.params.get('config_master_host_name') ca_host_name = ansible_module.params.get('config_ca_host_name') ccache = ansible_module.params.get('ccache') os.environ['KRB5CCNAME'] = ccache # os.environ['KRB5CCNAME'] = ansible_module.params.get('installer_ccache') installer._ccache = ansible_module.params.get('installer_ccache') ca_enabled = ansible_module.params.get('_ca_enabled') options.subject_base = ansible_module.params.get('subject_base') if options.subject_base is not None: options.subject_base = DN(options.subject_base) options._top_dir = ansible_module.params.get('_top_dir') options._add_to_ipaservers = ansible_module.params.get( '_add_to_ipaservers') options._ca_subject = ansible_module.params.get('_ca_subject') options._subject_base = ansible_module.params.get('_subject_base') master = ansible_module.params.get('master') dirman_password = ansible_module.params.get('dirman_password') # init # fstore = sysrestore.FileStore(paths.SYSRESTORE) # prepare (install prepare, install checks) # ansible_log.debug("== INSTALL ==") options = installer promote = installer.promote env = gen_env_boostrap_finalize_core(paths.ETC_IPA, constants.DEFAULT_CONFIG) api_bootstrap_finalize(env) config = gen_ReplicaConfig() config.subject_base = options.subject_base config.dirman_password = dirman_password config.ca_host_name = ca_host_name remote_api = gen_remote_api(master_host_name, paths.ETC_IPA) installer._remote_api = remote_api ccache = os.environ['KRB5CCNAME'] if promote: ansible_log.debug("-- CREATE_IPA_CONF --") # Create the management framework config file. Do this irregardless # of the state of DS installation. Even if it fails, # we need to have master-like configuration in order to perform a # successful uninstallation # The configuration creation has to be here otherwise previous call # To config certmonger would try to connect to local server create_ipa_conf(fstore, config, ca_enabled, master) # done # ansible_module.exit_json(changed=True)
def main(): ansible_module = AnsibleModule( argument_spec=dict( # server setup_kra=dict(required=False, type='bool'), setup_dns=dict(required=False, type='bool'), # certificate system subject_base=dict(required=True), # dns zonemgr=dict(required=False), forwarders=dict(required=False, type='list', default=[]), forward_policy=dict(default=None, choices=['first', 'only']), no_dnssec_validation=dict(required=False, type='bool', default=False), # additional dns_ip_addresses=dict(required=True, type='list'), dns_reverse_zones=dict(required=True, type='list'), ccache=dict(required=True), _top_dir=dict(required=True), setup_ca=dict(required=True, type='bool'), config_master_host_name=dict(required=True), ), supports_check_mode=True, ) ansible_module._ansible_debug = True setup_logging() ansible_log = AnsibleModuleLog(ansible_module) # get parameters # options = installer # server options.setup_kra = ansible_module.params.get('setup_kra') options.setup_dns = ansible_module.params.get('setup_dns') # certificate system options.subject_base = ansible_module.params.get('subject_base') if options.subject_base is not None: options.subject_base = DN(options.subject_base) # dns options.zonemgr = ansible_module.params.get('zonemgr') options.forwarders = ansible_module.params.get('forwarders') options.forward_policy = ansible_module.params.get('forward_policy') options.no_dnssec_validation = ansible_module.params.get( 'no_dnssec_validationdnssec_validation') # additional dns.ip_addresses = ansible_module_get_parsed_ip_addresses( ansible_module, 'dns_ip_addresses') dns.reverse_zones = ansible_module.params.get('dns_reverse_zones') ccache = ansible_module.params.get('ccache') os.environ['KRB5CCNAME'] = ccache options._top_dir = ansible_module.params.get('_top_dir') options.setup_ca = ansible_module.params.get('setup_ca') config_master_host_name = ansible_module.params.get( 'config_master_host_name') # init # ansible_log.debug("== INSTALL ==") env = gen_env_boostrap_finalize_core(paths.ETC_IPA, constants.DEFAULT_CONFIG) api_bootstrap_finalize(env) config = gen_ReplicaConfig() config.subject_base = options.subject_base config.master_host_name = config_master_host_name remote_api = gen_remote_api(config.master_host_name, paths.ETC_IPA) installer._remote_api = remote_api ccache = os.environ['KRB5CCNAME'] # There is a api.Backend.ldap2.connect call somewhere in ca, ds, dns or # ntpinstance api.Backend.ldap2.connect() with redirect_stdout(ansible_log): if options.setup_dns: ansible_log.debug("-- INSTALL DNS --") dns.install(False, True, options, api) else: ansible_log.debug("-- DNS UPDATE_SYSTEM_RECORDS --") api.Command.dns_update_system_records() # done # ansible_module.exit_json(changed=True)
def main(): ansible_module = AnsibleModule( argument_spec=dict( # server setup_ca=dict(required=False, type='bool'), setup_kra=dict(required=False, type='bool'), no_pkinit=dict(required=False, type='bool'), no_ui_redirect=dict(required=False, type='bool'), # certificate system subject_base=dict(required=True), # additional config_master_host_name=dict(required=True), ccache=dict(required=True), _ca_enabled=dict(required=False, type='bool'), _ca_file=dict(required=False), _kra_enabled=dict(required=False, type='bool'), _kra_host_name=dict(required=False), _pkinit_pkcs12_info=dict(required=False, type='list'), _top_dir=dict(required=True), dirman_password=dict(required=True, no_log=True), ), supports_check_mode=True, ) ansible_module._ansible_debug = True setup_logging() ansible_log = AnsibleModuleLog(ansible_module) # get parameters # options = installer # server options.setup_ca = ansible_module.params.get('setup_ca') options.setup_kra = ansible_module.params.get('setup_kra') options.no_pkinit = ansible_module.params.get('no_pkinit') # certificate system options.subject_base = ansible_module.params.get('subject_base') if options.subject_base is not None: options.subject_base = DN(options.subject_base) # additional master_host_name = ansible_module.params.get('config_master_host_name') ccache = ansible_module.params.get('ccache') os.environ['KRB5CCNAME'] = ccache # os.environ['KRB5CCNAME'] = ansible_module.params.get('installer_ccache') # installer._ccache = ansible_module.params.get('installer_ccache') ca_enabled = ansible_module.params.get('_ca_enabled') kra_enabled = ansible_module.params.get('_kra_enabled') kra_host_name = ansible_module.params.get('_kra_host_name') options._pkinit_pkcs12_info = ansible_module.params.get( '_pkinit_pkcs12_info') options._top_dir = ansible_module.params.get('_top_dir') dirman_password = ansible_module.params.get('dirman_password') # init # ansible_log.debug("== INSTALL ==") options = installer promote = installer.promote env = gen_env_boostrap_finalize_core(paths.ETC_IPA, constants.DEFAULT_CONFIG) api_bootstrap_finalize(env) config = gen_ReplicaConfig() config.dirman_password = dirman_password config.promote = installer.promote config.kra_enabled = kra_enabled config.kra_host_name = kra_host_name remote_api = gen_remote_api(master_host_name, paths.ETC_IPA) conn = remote_api.Backend.ldap2 ccache = os.environ['KRB5CCNAME'] # There is a api.Backend.ldap2.connect call somewhere in ca, ds, dns or # ntpinstance api.Backend.ldap2.connect() conn.connect(ccache=ccache) with redirect_stdout(ansible_log): ansible_log.debug("-- INSTALL_CUSTODIA --") if not hasattr(custodiainstance, "get_custodia_instance"): custodia = custodiainstance.CustodiaInstance( config.host_name, config.realm_name) if promote and \ hasattr(custodiainstance.CustodiaInstance, "create_replica"): ansible_log.debug("-- CUSTODIA CREATE_REPLICA --") custodia.create_replica(config.master_host_name) else: ansible_log.debug("-- CUSTODIA CREATE_INSTANCE --") custodia.create_instance() else: if kra_enabled: # A KRA peer always provides a CA, too. mode = custodiainstance.CustodiaModes.KRA_PEER elif ca_enabled: mode = custodiainstance.CustodiaModes.CA_PEER else: mode = custodiainstance.CustodiaModes.MASTER_PEER custodia = custodiainstance.get_custodia_instance(config, mode) custodia.create_instance() # done # ansible_module.exit_json(changed=True)
def main(): ansible_module = AnsibleModule( argument_spec=dict( # server setup_ca=dict(required=False, type='bool'), setup_kra=dict(required=False, type='bool'), no_pkinit=dict(required=False, type='bool'), no_ui_redirect=dict(required=False, type='bool'), # certificate system subject_base=dict(required=True), config_master_host_name=dict(required=True), config_ca_host_name=dict(required=True), ccache=dict(required=True), _ca_enabled=dict(required=False, type='bool'), _ca_file=dict(required=False), _http_pkcs12_info=dict(required=False), _top_dir=dict(required=True), dirman_password=dict(required=True, no_log=True), ), supports_check_mode=True, ) ansible_module._ansible_debug = True ansible_log = AnsibleModuleLog(ansible_module) # get parameters # options = installer options.setup_ca = ansible_module.params.get('setup_ca') options.setup_kra = ansible_module.params.get('setup_kra') options.no_pkinit = ansible_module.params.get('no_pkinit') options.no_ui_redirect = ansible_module.params.get('no_ui_redirect') # certificate system options.subject_base = ansible_module.params.get('subject_base') if options.subject_base is not None: options.subject_base = DN(options.subject_base) # additional master_host_name = ansible_module.params.get('config_master_host_name') ca_host_name = ansible_module.params.get('config_master_host_name') ccache = ansible_module.params.get('ccache') os.environ['KRB5CCNAME'] = ccache # os.environ['KRB5CCNAME'] = ansible_module.params.get('installer_ccache') # installer._ccache = ansible_module.params.get('installer_ccache') ca_enabled = ansible_module.params.get('_ca_enabled') http_pkcs12_info = ansible_module.params.get('_http_pkcs12_info') options._top_dir = ansible_module.params.get('_top_dir') dirman_password = ansible_module.params.get('dirman_password') # init # fstore = sysrestore.FileStore(paths.SYSRESTORE) ansible_log.debug("== INSTALL ==") promote = installer.promote env = gen_env_boostrap_finalize_core(paths.ETC_IPA, constants.DEFAULT_CONFIG) api_bootstrap_finalize(env) config = gen_ReplicaConfig() config.subject_base = options.subject_base config.dirman_password = dirman_password config.setup_ca = options.setup_ca # config.master_host_name = master_host_name config.ca_host_name = ca_host_name config.promote = installer.promote remote_api = gen_remote_api(master_host_name, paths.ETC_IPA) # installer._remote_api = remote_api conn = remote_api.Backend.ldap2 ccache = os.environ['KRB5CCNAME'] # There is a api.Backend.ldap2.connect call somewhere in ca, ds, dns or # ntpinstance api.Backend.ldap2.connect() conn.connect(ccache=ccache) cafile = paths.IPA_CA_CRT with redirect_stdout(ansible_log): ansible_log.debug("-- INSTALL_HTTP --") # We need to point to the master when certmonger asks for # HTTP certificate. # During http installation, the HTTP/hostname principal is created # locally then the installer waits for the entry to appear on the # master selected for the installation. # In a later step, the installer requests a SSL certificate through # Certmonger (and the op adds the principal if it does not exist yet). # If xmlrpc_uri points to the soon-to-be replica, # the httpd service is not ready yet to handle certmonger requests # and certmonger tries to find another master. The master can be # different from the one selected for the installation, and it is # possible that the principal has not been replicated yet. This # may lead to a replication conflict. # This is why we need to force the use of the same master by # setting xmlrpc_uri create_ipa_conf(fstore, config, ca_enabled, master=config.master_host_name) argspec = inspect.getargspec(install_http) if "promote" in argspec.args: install_http(config, auto_redirect=not options.no_ui_redirect, promote=promote, pkcs12_info=http_pkcs12_info, ca_is_configured=ca_enabled, ca_file=cafile) else: if "fstore" not in argspec.args: install_http(config, auto_redirect=not options.no_ui_redirect, pkcs12_info=http_pkcs12_info, ca_is_configured=ca_enabled, ca_file=cafile) else: install_http(config, auto_redirect=not options.no_ui_redirect, pkcs12_info=http_pkcs12_info, ca_is_configured=ca_enabled, ca_file=cafile, fstore=fstore) # Need to point back to ourself after the cert for HTTP is obtained create_ipa_conf(fstore, config, ca_enabled) # done # ansible_module.exit_json(changed=True)
def main(): ansible_module = AnsibleModule( argument_spec=dict( # server setup_kra=dict(required=False, type='bool'), # certificate system subject_base=dict(required=True), # ad trust enable_compat=dict(required=False, type='bool', default=False), rid_base=dict(required=False, type='int'), secondary_rid_base=dict(required=False, type='int'), # additional adtrust_netbios_name=dict(required=True), adtrust_reset_netbios_name=dict(required=True, type='bool'), # additional ccache=dict(required=True), _top_dir=dict(required=True), setup_ca=dict(required=True), config_master_host_name=dict(required=True), ), supports_check_mode=True, ) ansible_module._ansible_debug = True ansible_log = AnsibleModuleLog(ansible_module) # get parameters # options = installer # server options.setup_kra = ansible_module.params.get('setup_kra') # certificate system options.subject_base = ansible_module.params.get('subject_base') if options.subject_base is not None: options.subject_base = DN(options.subject_base) # ad trust options.enable_compat = ansible_module.params.get('enable_compat') options.rid_base = ansible_module.params.get('rid_base') options.secondary_rid_base = ansible_module.params.get( 'secondary_rid_base') # additional ccache = ansible_module.params.get('ccache') os.environ['KRB5CCNAME'] = ccache options._top_dir = ansible_module.params.get('_top_dir') options.setup_ca = ansible_module.params.get('setup_ca') config_master_host_name = ansible_module.params.get( 'config_master_host_name') adtrust.netbios_name = ansible_module.params.get('adtrust_netbios_name') adtrust.reset_netbios_name = ansible_module.params.get( 'adtrust_reset_netbios_name') # init # fstore = sysrestore.FileStore(paths.SYSRESTORE) ansible_log.debug("== INSTALL ==") env = gen_env_boostrap_finalize_core(paths.ETC_IPA, constants.DEFAULT_CONFIG) api_bootstrap_finalize(env) config = gen_ReplicaConfig() config.subject_base = options.subject_base config.master_host_name = config_master_host_name remote_api = gen_remote_api(config.master_host_name, paths.ETC_IPA) installer._remote_api = remote_api ccache = os.environ['KRB5CCNAME'] api.Backend.ldap2.connect() with redirect_stdout(ansible_log): ansible_log.debug("-- INSTALL ADTRUST --") adtrust.install(False, options, fstore, api) # done # ansible_module.exit_json(changed=True)
def main(): ansible_module = AnsibleModule( argument_spec=dict( # server setup_ca=dict(required=False, type='bool'), setup_kra=dict(required=False, type='bool'), no_pkinit=dict(required=False, type='bool'), no_ui_redirect=dict(required=False, type='bool'), # certificate system subject_base=dict(required=True), # additional ccache=dict(required=True), _ca_enabled=dict(required=False, type='bool'), _ca_file=dict(required=False), _kra_enabled=dict(required=False, type='bool'), _kra_host_name=dict(required=False), _top_dir=dict(required=True), dirman_password=dict(required=True, no_log=True), config_setup_ca=dict(required=True, type='bool'), config_master_host_name=dict(required=True), config_ca_host_name=dict(required=True), ), supports_check_mode=True, ) ansible_module._ansible_debug = True setup_logging() ansible_log = AnsibleModuleLog(ansible_module) # get parameters # options = installer # server options.setup_ca = ansible_module.params.get('setup_ca') options.setup_kra = ansible_module.params.get('setup_kra') options.no_pkinit = ansible_module.params.get('no_pkinit') # certificate system options.subject_base = ansible_module.params.get('subject_base') if options.subject_base is not None: options.subject_base = DN(options.subject_base) # additional master_host_name = ansible_module.params.get('config_master_host_name') ccache = ansible_module.params.get('ccache') os.environ['KRB5CCNAME'] = ccache # os.environ['KRB5CCNAME'] = ansible_module.params.get('installer_ccache') # installer._ccache = ansible_module.params.get('installer_ccache') ca_enabled = ansible_module.params.get('_ca_enabled') kra_enabled = ansible_module.params.get('_kra_enabled') kra_host_name = ansible_module.params.get('_kra_host_name') options._top_dir = ansible_module.params.get('_top_dir') dirman_password = ansible_module.params.get('dirman_password') config_setup_ca = ansible_module.params.get('config_setup_ca') config_ca_host_name = ansible_module.params.get('config_ca_host_name') # init # ansible_log.debug("== INSTALL ==") options = installer env = gen_env_boostrap_finalize_core(paths.ETC_IPA, constants.DEFAULT_CONFIG) api_bootstrap_finalize(env) config = gen_ReplicaConfig() config.dirman_password = dirman_password config.setup_ca = config_setup_ca config.master_host_name = master_host_name config.ca_host_name = config_ca_host_name config.subject_base = options.subject_base config.promote = installer.promote config.kra_enabled = kra_enabled config.kra_host_name = kra_host_name remote_api = gen_remote_api(config.master_host_name, paths.ETC_IPA) installer._remote_api = remote_api ccache = os.environ['KRB5CCNAME'] # do the work # with redirect_stdout(ansible_log): if not hasattr(custodiainstance, "get_custodia_instance"): custodia = custodiainstance.CustodiaInstance( config.host_name, config.realm_name) else: if ca_enabled: mode = custodiainstance.CustodiaModes.CA_PEER else: mode = custodiainstance.CustodiaModes.MASTER_PEER custodia = custodiainstance.get_custodia_instance(config, mode) ansible_log.debug("-- CUSTODIA IMPORT DM PASSWORD --") argspec = inspect.getargspec(custodia.import_dm_password) if "master_host_name" in argspec.args: custodia.import_dm_password(config.master_host_name) else: custodia.import_dm_password() # done # ansible_module.exit_json(changed=True)
def main(): ansible_module = AnsibleModule( argument_spec=dict( # server setup_ca=dict(required=False, type='bool'), setup_kra=dict(required=False, type='bool'), no_pkinit=dict(required=False, type='bool'), dirsrv_config_file=dict(required=False), # certificate system subject_base=dict(required=True), # additional config_master_host_name=dict(required=True), ccache=dict(required=True), _ca_enabled=dict(required=False, type='bool'), _ca_file=dict(required=False), _dirsrv_pkcs12_info=dict(required=False), _pkinit_pkcs12_info=dict(required=False), _top_dir=dict(required=True), dirman_password=dict(required=True, no_log=True), ds_ca_subject=dict(required=True), ), supports_check_mode=True, ) ansible_module._ansible_debug = True setup_logging() ansible_log = AnsibleModuleLog(ansible_module) # get parameters # options = installer # server options.setup_ca = ansible_module.params.get('setup_ca') options.setup_kra = ansible_module.params.get('setup_kra') options.no_pkinit = ansible_module.params.get('no_pkinit') options.dirsrv_config_file = ansible_module.params.get( 'dirsrv_config_file') # certificate system options.subject_base = ansible_module.params.get('subject_base') if options.subject_base is not None: options.subject_base = DN(options.subject_base) # additional master_host_name = ansible_module.params.get('config_master_host_name') ccache = ansible_module.params.get('ccache') os.environ['KRB5CCNAME'] = ccache # os.environ['KRB5CCNAME'] = ansible_module.params.get('installer_ccache') # installer._ccache = ansible_module.params.get('installer_ccache') ca_enabled = ansible_module.params.get('_ca_enabled') options._dirsrv_pkcs12_info = ansible_module.params.get( '_dirsrv_pkcs12_info') options._pkinit_pkcs12_info = ansible_module.params.get( '_pkinit_pkcs12_info') options._top_dir = ansible_module.params.get('_top_dir') dirman_password = ansible_module.params.get('dirman_password') ds_ca_subject = ansible_module.params.get('ds_ca_subject') # init # ansible_log.debug("== INSTALL ==") options = installer promote = installer.promote env = gen_env_boostrap_finalize_core(paths.ETC_IPA, constants.DEFAULT_CONFIG) api_bootstrap_finalize(env) config = gen_ReplicaConfig() config.dirman_password = dirman_password config.subject_base = options.subject_base remote_api = gen_remote_api(master_host_name, paths.ETC_IPA) # installer._remote_api = remote_api conn = remote_api.Backend.ldap2 ccache = os.environ['KRB5CCNAME'] # There is a api.Backend.ldap2.connect call somewhere in ca, ds, dns or # ntpinstance api.Backend.ldap2.connect() conn.connect(ccache=ccache) with redirect_stdout(ansible_log): ds = replica_ds_init_info(ansible_log, config, options, ca_enabled, remote_api, ds_ca_subject, ca_file=paths.IPA_CA_CRT, promote=promote, pkcs12_info=installer._dirsrv_pkcs12_info) ansible_log.debug("-- DS.ENABLE_SSL --") # we now need to enable ssl on the ds ds.enable_ssl() # done # ansible_module.exit_json(changed=True)
def main(): ansible_module = AnsibleModule( argument_spec=dict( # server setup_ca=dict(required=False, type='bool'), setup_kra=dict(required=False, type='bool'), no_pkinit=dict(required=False, type='bool'), no_ui_redirect=dict(required=False, type='bool'), # certificate system subject_base=dict(required=True), # additional config_master_host_name=dict(required=True), ccache=dict(required=True), _ca_file=dict(required=False), _top_dir=dict(required=True), dirman_password=dict(required=True, no_log=True), ), supports_check_mode=True, ) ansible_module._ansible_debug = True setup_logging() ansible_log = AnsibleModuleLog(ansible_module) # get parameters # options = installer # server options.setup_ca = ansible_module.params.get('setup_ca') options.setup_kra = ansible_module.params.get('setup_kra') options.no_pkinit = ansible_module.params.get('no_pkinit') # certificate system options.subject_base = ansible_module.params.get('subject_base') if options.subject_base is not None: options.subject_base = DN(options.subject_base) # additional master_host_name = ansible_module.params.get('config_master_host_name') ccache = ansible_module.params.get('ccache') os.environ['KRB5CCNAME'] = ccache options._top_dir = ansible_module.params.get('_top_dir') dirman_password = ansible_module.params.get('dirman_password') # init # fstore = sysrestore.FileStore(paths.SYSRESTORE) ansible_log.debug("== INSTALL ==") options = installer env = gen_env_boostrap_finalize_core(paths.ETC_IPA, constants.DEFAULT_CONFIG) api_bootstrap_finalize(env) config = gen_ReplicaConfig() config.dirman_password = dirman_password remote_api = gen_remote_api(master_host_name, paths.ETC_IPA) conn = remote_api.Backend.ldap2 ccache = os.environ['KRB5CCNAME'] # There is a api.Backend.ldap2.connect call somewhere in ca, ds, dns or # ntpinstance api.Backend.ldap2.connect() conn.connect(ccache=ccache) # krb krb = krbinstance.KrbInstance(fstore) krb.set_output(ansible_log) with redirect_stdout(ansible_log): krb.init_info(api.env.realm, api.env.host, setup_pkinit=not options.no_pkinit, subject_base=options.subject_base) ansible_log.debug("-- RESTART KDC --") service.print_msg("Restarting the KDC") krb.restart() # done # ansible_module.exit_json(changed=True)
def main(): ansible_module = AnsibleModule( argument_spec=dict( # basic pki_config_override=dict(required=False), # server setup_ca=dict(required=False, type='bool'), setup_kra=dict(required=False, type='bool'), no_pkinit=dict(required=False, type='bool'), # certificate system subject_base=dict(required=True), # additional ccache=dict(required=True), _ca_enabled=dict(required=False, type='bool'), _ca_file=dict(required=False), _kra_enabled=dict(required=False, type='bool'), _kra_host_name=dict(required=False), _dirsrv_pkcs12_info=dict(required=False), _pkinit_pkcs12_info=dict(required=False), _top_dir=dict(required=True), _ca_subject=dict(required=True), _subject_base=dict(required=True), dirman_password=dict(required=True, no_log=True), config_setup_ca=dict(required=True, type='bool'), config_master_host_name=dict(required=True), config_ca_host_name=dict(required=True), config_ips=dict(required=False, type='list', default=[]), ), supports_check_mode=True, ) ansible_module._ansible_debug = True ansible_log = AnsibleModuleLog(ansible_module) # get parameters # options = installer # basic options.pki_config_override = ansible_module.params.get( 'pki_config_override') # server options.setup_ca = ansible_module.params.get('setup_ca') options.setup_kra = ansible_module.params.get('setup_kra') options.no_pkinit = ansible_module.params.get('no_pkinit') # certificate system options.subject_base = ansible_module.params.get('subject_base') if options.subject_base is not None: options.subject_base = DN(options.subject_base) # additional ccache = ansible_module.params.get('ccache') os.environ['KRB5CCNAME'] = ccache # os.environ['KRB5CCNAME'] = ansible_module.params.get('installer_ccache') # installer._ccache = ansible_module.params.get('installer_ccache') ca_enabled = ansible_module.params.get('_ca_enabled') kra_enabled = ansible_module.params.get('_kra_enabled') kra_host_name = ansible_module.params.get('_kra_host_name') installer._dirsrv_pkcs12_info = ansible_module.params.get( '_dirsrv_pkcs12_info') installer._pkinit_pkcs12_info = ansible_module.params.get( '_pkinit_pkcs12_info') options._top_dir = ansible_module.params.get('_top_dir') options._ca_subject = ansible_module.params.get('_ca_subject') if options._ca_subject is not None: options._ca_subject = DN(options._ca_subject) options._subject_base = ansible_module.params.get('_subject_base') if options._subject_base is not None: options._subject_base = DN(options._subject_base) dirman_password = ansible_module.params.get('dirman_password') config_setup_ca = ansible_module.params.get('config_setup_ca') config_master_host_name = ansible_module.params.get( 'config_master_host_name') config_ca_host_name = ansible_module.params.get('config_ca_host_name') config_ips = ansible_module_get_parsed_ip_addresses( ansible_module, "config_ips") # init # ansible_log.debug("== INSTALL ==") options = installer env = gen_env_boostrap_finalize_core(paths.ETC_IPA, constants.DEFAULT_CONFIG) api_bootstrap_finalize(env) config = gen_ReplicaConfig() config.dirman_password = dirman_password config.setup_ca = config_setup_ca config.master_host_name = config_master_host_name config.ca_host_name = config_ca_host_name config.ips = config_ips config.promote = options.promote config.kra_enabled = kra_enabled config.kra_host_name = kra_host_name remote_api = gen_remote_api(config.master_host_name, paths.ETC_IPA) options._remote_api = remote_api ccache = os.environ['KRB5CCNAME'] # There is a api.Backend.ldap2.connect call somewhere in ca, ds, dns or # ntpinstance api.Backend.ldap2.connect() # conn.connect(ccache=ccache) ansible_log.debug("-- INSTALL CA --") with redirect_stdout(ansible_log): options.realm_name = config.realm_name options.domain_name = config.domain_name options.host_name = config.host_name options.dm_password = config.dirman_password if not hasattr(custodiainstance, "get_custodia_instance"): ca.install(False, config, options) else: if kra_enabled: # A KRA peer always provides a CA, too. mode = custodiainstance.CustodiaModes.KRA_PEER elif ca_enabled: mode = custodiainstance.CustodiaModes.CA_PEER else: mode = custodiainstance.CustodiaModes.MASTER_PEER custodia = custodiainstance.get_custodia_instance(config, mode) ca.install(False, config, options, custodia=custodia) # done # ansible_module.exit_json(changed=True)
def main(): ansible_module = AnsibleModule( argument_spec=dict( # basic dm_password=dict(required=False, no_log=True), password=dict(required=False, no_log=True), ip_addresses=dict(required=False, type='list', default=[]), domain=dict(required=False), realm=dict(required=False), hostname=dict(required=False), ca_cert_files=dict(required=False, type='list', default=[]), no_host_dns=dict(required=False, type='bool', default=False), # server setup_adtrust=dict(required=False, type='bool'), setup_ca=dict(required=False, type='bool'), setup_kra=dict(required=False, type='bool'), setup_dns=dict(required=False, type='bool'), # ssl certificate dirsrv_cert_files=dict(required=False, type='list', default=[]), # client force_join=dict(required=False, type='bool'), # certificate system subject_base=dict(required=True), # additional server=dict(required=True), ccache=dict(required=True), installer_ccache=dict(required=True), _top_dir=dict(required=True), _add_to_ipaservers=dict(required=True, type='bool'), _ca_subject=dict(required=True), _subject_base=dict(required=True), dirman_password=dict(required=True, no_log=True), config_setup_ca=dict(required=True, type='bool'), config_master_host_name=dict(required=True), config_ca_host_name=dict(required=True), config_ips=dict(required=False, type='list', default=[]), ), supports_check_mode=True, ) ansible_module._ansible_debug = True setup_logging() ansible_log = AnsibleModuleLog(ansible_module) # get parameters # options = installer # basic options.dm_password = ansible_module.params.get('dm_password') options.password = options.dm_password options.admin_password = ansible_module.params.get('password') options.ip_addresses = ansible_module_get_parsed_ip_addresses( ansible_module) options.domain_name = ansible_module.params.get('domain') options.realm_name = ansible_module.params.get('realm') options.host_name = ansible_module.params.get('hostname') options.ca_cert_files = ansible_module.params.get('ca_cert_files') options.no_host_dns = ansible_module.params.get('no_host_dns') # server options.setup_adtrust = ansible_module.params.get('setup_adtrust') options.setup_ca = ansible_module.params.get('setup_ca') options.setup_kra = ansible_module.params.get('setup_kra') options.setup_dns = ansible_module.params.get('setup_dns') # ssl certificate options.dirsrv_cert_files = ansible_module.params.get('dirsrv_cert_files') # client options.force_join = ansible_module.params.get('force_join') # certificate system options.external_ca = ansible_module.params.get('external_ca') options.external_cert_files = ansible_module.params.get( 'external_cert_files') options.subject_base = ansible_module.params.get('subject_base') if options.subject_base is not None: options.subject_base = DN(options.subject_base) options.ca_subject = ansible_module.params.get('ca_subject') # additional options.server = ansible_module.params.get('server') ccache = ansible_module.params.get('ccache') os.environ['KRB5CCNAME'] = ccache # os.environ['KRB5CCNAME'] = ansible_module.params.get('installer_ccache') installer._ccache = ansible_module.params.get('installer_ccache') options.subject_base = ansible_module.params.get('subject_base') if options.subject_base is not None: options.subject_base = DN(options.subject_base) options._top_dir = ansible_module.params.get('_top_dir') options._add_to_ipaservers = ansible_module.params.get( '_add_to_ipaservers') options._ca_subject = ansible_module.params.get('_ca_subject') options._subject_base = ansible_module.params.get('_subject_base') dirman_password = ansible_module.params.get('dirman_password') config_setup_ca = ansible_module.params.get('config_setup_ca') config_master_host_name = ansible_module.params.get( 'config_master_host_name') config_ca_host_name = ansible_module.params.get('config_ca_host_name') config_ips = ansible_module_get_parsed_ip_addresses( ansible_module, "config_ips") # init # ansible_log.debug("== INSTALLER ==") options = installer promote = installer.promote env = gen_env_boostrap_finalize_core(paths.ETC_IPA, constants.DEFAULT_CONFIG) api_bootstrap_finalize(env) config = gen_ReplicaConfig() config.dirman_password = dirman_password config.setup_ca = config_setup_ca config.master_host_name = config_master_host_name config.ca_host_name = config_ca_host_name config.ips = config_ips remote_api = gen_remote_api(config.master_host_name, paths.ETC_IPA) installer._remote_api = remote_api conn = remote_api.Backend.ldap2 ccache = os.environ['KRB5CCNAME'] cafile = paths.IPA_CA_CRT with redirect_stdout(ansible_log): try: ansible_log.debug("-- CONNECT --") if promote: conn.connect(ccache=ccache) else: # dmlvl 0 replica install should always use DM credentials # to create remote LDAP connection. Since ACIs permitting hosts # to manage their own services were added in 4.2 release, # the master denies this operations. conn.connect(bind_dn=ipaldap.DIRMAN_DN, cacert=cafile, bind_pw=dirman_password) ansible_log.debug("-- INSTALL_CA_CERT --") # Update and istall updated CA file cafile = install_ca_cert(conn, api.env.basedn, api.env.realm, cafile) install_ca_cert(conn, api.env.basedn, api.env.realm, cafile, destfile=paths.KDC_CA_BUNDLE_PEM) install_ca_cert(conn, api.env.basedn, api.env.realm, cafile, destfile=paths.CA_BUNDLE_PEM) finally: if conn.isconnected(): ansible_log.debug("-- DISCONNECT --") conn.disconnect() # done # ansible_module.exit_json(changed=True, config_master_host_name=config.master_host_name, config_ca_host_name=config.ca_host_name)
def main(): ansible_module = AnsibleModule( argument_spec=dict( # server setup_ca=dict(required=False, type='bool'), setup_kra=dict(required=False, type='bool'), no_pkinit=dict(required=False, type='bool'), no_ui_redirect=dict(required=False, type='bool'), # certificate system subject_base=dict(required=True), # additional config_master_host_name=dict(required=True), ccache=dict(required=True), _ca_file=dict(required=False), _top_dir=dict(required=True), dirman_password=dict(required=True, no_log=True), ), supports_check_mode=True, ) ansible_module._ansible_debug = True ansible_log = AnsibleModuleLog(ansible_module) # get parameters # options = installer options.setup_ca = ansible_module.params.get('setup_ca') options.setup_kra = ansible_module.params.get('setup_kra') options.no_pkinit = ansible_module.params.get('no_pkinit') # certificate system options.subject_base = ansible_module.params.get('subject_base') if options.subject_base is not None: options.subject_base = DN(options.subject_base) # additional master_host_name = ansible_module.params.get('config_master_host_name') ccache = ansible_module.params.get('ccache') os.environ['KRB5CCNAME'] = ccache # os.environ['KRB5CCNAME'] = ansible_module.params.get('installer_ccache') # installer._ccache = ansible_module.params.get('installer_ccache') options._top_dir = ansible_module.params.get('_top_dir') dirman_password = ansible_module.params.get('dirman_password') # init # ansible_log.debug("== INSTALL ==") options = installer env = gen_env_boostrap_finalize_core(paths.ETC_IPA, constants.DEFAULT_CONFIG) api_bootstrap_finalize(env) config = gen_ReplicaConfig() config.dirman_password = dirman_password remote_api = gen_remote_api(master_host_name, paths.ETC_IPA) conn = remote_api.Backend.ldap2 ccache = os.environ['KRB5CCNAME'] # There is a api.Backend.ldap2.connect call somewhere in ca, ds, dns or # ntpinstance api.Backend.ldap2.connect() conn.connect(ccache=ccache) with redirect_stdout(ansible_log): ansible_log.debug("-- INSTALL_OTPD --") otpd = otpdinstance.OtpdInstance() otpd.set_output(ansible_log) otpd.create_instance('OTPD', config.host_name, ipautil.realm_to_suffix(config.realm_name)) # done # ansible_module.exit_json(changed=True)
def main(): ansible_module = AnsibleModule( argument_spec=dict( # server setup_ca=dict(required=False, type='bool'), setup_kra=dict(required=False, type='bool'), no_pkinit=dict(required=False, type='bool'), # certificate system subject_base=dict(required=True), # additional config_master_host_name=dict(required=True), ccache=dict(required=True), _pkinit_pkcs12_info=dict(required=False), _top_dir=dict(required=True), ), supports_check_mode=True, ) ansible_module._ansible_debug = True ansible_log = AnsibleModuleLog(ansible_module) # get parameters # options = installer # server options.setup_ca = ansible_module.params.get('setup_ca') options.setup_kra = ansible_module.params.get('setup_kra') options.no_pkinit = ansible_module.params.get('no_pkinit') # certificate system options.subject_base = ansible_module.params.get('subject_base') if options.subject_base is not None: options.subject_base = DN(options.subject_base) # additional config_master_host_name = ansible_module.params.get( 'config_master_host_name') ccache = ansible_module.params.get('ccache') os.environ['KRB5CCNAME'] = ccache installer._pkinit_pkcs12_info = ansible_module.params.get( '_pkinit_pkcs12_info') options._top_dir = ansible_module.params.get('_top_dir') # init # fstore = sysrestore.FileStore(paths.SYSRESTORE) ansible_log.debug("== INSTALL ==") options = installer promote = installer.promote pkinit_pkcs12_info = installer._pkinit_pkcs12_info env = gen_env_boostrap_finalize_core(paths.ETC_IPA, constants.DEFAULT_CONFIG) api_bootstrap_finalize(env) config = gen_ReplicaConfig() config.master_host_name = config_master_host_name config.subject_base = options.subject_base ccache = os.environ['KRB5CCNAME'] # There is a api.Backend.ldap2.connect call somewhere in ca, ds, dns or # ntpinstance api.Backend.ldap2.connect() ansible_log.debug("-- INSTALL_KRB --") with redirect_stdout(ansible_log): argspec = inspect.getargspec(install_krb) if "promote" in argspec.args: krb = install_krb(config, setup_pkinit=not options.no_pkinit, pkcs12_info=pkinit_pkcs12_info, promote=promote) else: if "fstore" not in argspec.args: krb = install_krb(config, setup_pkinit=not options.no_pkinit, pkcs12_info=pkinit_pkcs12_info) else: krb = install_krb(config, setup_pkinit=not options.no_pkinit, pkcs12_info=pkinit_pkcs12_info, fstore=fstore) # done # ansible_module.exit_json(changed=True, config_master_host_name=config.master_host_name)
def main(): ansible_module = AnsibleModule( argument_spec=dict( # basic dm_password=dict(required=False, no_log=True), password=dict(required=False, no_log=True), ip_addresses=dict(required=False, type='list', default=[]), domain=dict(required=False), realm=dict(required=False), hostname=dict(required=False), ca_cert_files=dict(required=False, type='list', default=[]), no_host_dns=dict(required=False, type='bool', default=False), pki_config_override=dict(required=False), # server setup_adtrust=dict(required=False, type='bool'), setup_ca=dict(required=False, type='bool'), setup_kra=dict(required=False, type='bool'), setup_dns=dict(required=False, type='bool'), # ssl certificate dirsrv_cert_files=dict(required=False, type='list', default=[]), # client force_join=dict(required=False, type='bool'), # certificate system subject_base=dict(required=True), # additional server=dict(required=True), config_master_host_name=dict(required=True), ccache=dict(required=True), installer_ccache=dict(required=True), _ca_enabled=dict(required=False, type='bool'), _kra_enabled=dict(required=False, type='bool'), _kra_host_name=dict(required=False), _top_dir=dict(required=True), _add_to_ipaservers=dict(required=True, type='bool'), _ca_subject=dict(required=True), _subject_base=dict(required=True), ), supports_check_mode=True, ) ansible_module._ansible_debug = True ansible_log = AnsibleModuleLog(ansible_module) # get parameters # options = installer options.dm_password = ansible_module.params.get('dm_password') options.password = options.dm_password options.admin_password = ansible_module.params.get('password') options.ip_addresses = ansible_module_get_parsed_ip_addresses( ansible_module) options.domain_name = ansible_module.params.get('domain') options.realm_name = ansible_module.params.get('realm') options.host_name = ansible_module.params.get('hostname') options.ca_cert_files = ansible_module.params.get('ca_cert_files') options.no_host_dns = ansible_module.params.get('no_host_dns') options.pki_config_override = ansible_module.params.get( 'pki_config_override') # server options.setup_adtrust = ansible_module.params.get('setup_adtrust') options.setup_ca = ansible_module.params.get('setup_ca') options.setup_kra = ansible_module.params.get('setup_kra') options.setup_dns = ansible_module.params.get('setup_dns') # ssl certificate options.dirsrv_cert_files = ansible_module.params.get('dirsrv_cert_files') # client options.force_join = ansible_module.params.get('force_join') # certificate system options.external_ca = ansible_module.params.get('external_ca') options.external_cert_files = ansible_module.params.get( 'external_cert_files') options.subject_base = ansible_module.params.get('subject_base') if options.subject_base is not None: options.subject_base = DN(options.subject_base) options.ca_subject = ansible_module.params.get('ca_subject') # dns options.reverse_zones = ansible_module.params.get('reverse_zones') options.no_reverse = ansible_module.params.get('no_reverse') options.auto_reverse = ansible_module.params.get('auto_reverse') options.forwarders = ansible_module.params.get('forwarders') options.no_forwarders = ansible_module.params.get('no_forwarders') options.auto_forwarders = ansible_module.params.get('auto_forwarders') options.forward_policy = ansible_module.params.get('forward_policy') # additional options.server = ansible_module.params.get('server') master_host_name = ansible_module.params.get('config_master_host_name') ccache = ansible_module.params.get('ccache') # os.environ['KRB5CCNAME'] = ccache os.environ['KRB5CCNAME'] = ansible_module.params.get('installer_ccache') installer._ccache = ansible_module.params.get('installer_ccache') ca_enabled = ansible_module.params.get('_ca_enabled') kra_enabled = ansible_module.params.get('_kra_enabled') kra_host_name = ansible_module.params.get('_kra_host_name') options.subject_base = ansible_module.params.get('subject_base') if options.subject_base is not None: options.subject_base = DN(options.subject_base) options._top_dir = ansible_module.params.get('_top_dir') options._add_to_ipaservers = ansible_module.params.get( '_add_to_ipaservers') options._ca_subject = ansible_module.params.get('_ca_subject') options._subject_base = ansible_module.params.get('_subject_base') # init # ansible_log.debug("== INSTALL ==") options = installer env = gen_env_boostrap_finalize_core(paths.ETC_IPA, constants.DEFAULT_CONFIG) api_bootstrap_finalize(env) config = gen_ReplicaConfig() config.subject_base = options.subject_base config.promote = installer.promote config.kra_enabled = kra_enabled config.kra_host_name = kra_host_name remote_api = gen_remote_api(master_host_name, paths.ETC_IPA) installer._remote_api = remote_api # ccache = os.environ['KRB5CCNAME'] with redirect_stdout(ansible_log): ansible_log.debug("-- INSTALL KRA --") if not hasattr(custodiainstance, "get_custodia_instance"): kra.install(api, config, options) else: if ca_enabled: mode = custodiainstance.CustodiaModes.CA_PEER else: mode = custodiainstance.CustodiaModes.MASTER_PEER custodia = custodiainstance.get_custodia_instance(config, mode) kra.install(api, config, options, custodia=custodia) # done # ansible_module.exit_json(changed=True)
def main(): ansible_module = AnsibleModule( argument_spec=dict( ### basic ### dm_password=dict(required=False, no_log=True), password=dict(required=False, no_log=True), ip_addresses=dict(required=False, type='list', default=[]), domain=dict(required=False), realm=dict(required=False), hostname=dict(required=False), ca_cert_files=dict(required=False, type='list', default=[]), no_host_dns=dict(required=False, type='bool', default=False), ### server ### setup_adtrust=dict(required=False, type='bool'), setup_ca=dict(required=False, type='bool'), setup_kra=dict(required=False, type='bool'), setup_dns=dict(required=False, type='bool'), no_pkinit=dict(required=False, type='bool', default=False), dirsrv_config_file=dict(required=False), ### ssl certificate ### dirsrv_cert_files=dict(required=False, type='list', default=[]), ### client ### force_join=dict(required=False, type='bool'), ### certificate system ### subject_base=dict(required=True), ### additional ### server=dict(required=True), ccache=dict(required=True), installer_ccache=dict(required=True), _ca_enabled=dict(required=False, type='bool'), _dirsrv_pkcs12_info=dict(required=False), _top_dir=dict(required=True), _add_to_ipaservers=dict(required=True, type='bool'), _ca_subject=dict(required=True), _subject_base=dict(required=True), dirman_password=dict(required=True, no_log=True), config_setup_ca=dict(required=True, type='bool'), config_master_host_name=dict(required=True), config_ca_host_name=dict(required=True), config_ips=dict(required=False, type='list', default=[]), ), supports_check_mode=True, ) ansible_module._ansible_debug = True ansible_log = AnsibleModuleLog(ansible_module) # get parameters # options = installer options.dm_password = ansible_module.params.get('dm_password') options.password = options.dm_password options.admin_password = ansible_module.params.get('password') options.ip_addresses = ansible_module_get_parsed_ip_addresses( ansible_module) options.domain_name = ansible_module.params.get('domain') options.realm_name = ansible_module.params.get('realm') options.host_name = ansible_module.params.get('hostname') options.ca_cert_files = ansible_module.params.get('ca_cert_files') options.no_host_dns = ansible_module.params.get('no_host_dns') ### server ### options.setup_adtrust = ansible_module.params.get('setup_adtrust') options.setup_ca = ansible_module.params.get('setup_ca') options.setup_kra = ansible_module.params.get('setup_kra') options.setup_dns = ansible_module.params.get('setup_dns') options.no_pkinit = ansible_module.params.get('no_pkinit') options.dirsrv_config_file = ansible_module.params.get( 'dirsrv_config_file') ### ssl certificate ### options.dirsrv_cert_files = ansible_module.params.get('dirsrv_cert_files') ### client ### options.force_join = ansible_module.params.get('force_join') ### certificate system ### options.external_ca = ansible_module.params.get('external_ca') options.external_cert_files = ansible_module.params.get( 'external_cert_files') options.subject_base = ansible_module.params.get('subject_base') if options.subject_base is not None: options.subject_base = DN(options.subject_base) options.ca_subject = ansible_module.params.get('ca_subject') ### additional ### #options._host_name_overridden = ansible_module.params.get( # '_hostname_overridden') options.server = ansible_module.params.get('server') master_host_name = ansible_module.params.get('config_master_host_name') ccache = ansible_module.params.get('ccache') os.environ['KRB5CCNAME'] = ccache #os.environ['KRB5CCNAME'] = ansible_module.params.get('installer_ccache') installer._ccache = ansible_module.params.get('installer_ccache') ca_enabled = ansible_module.params.get('_ca_enabled') dirsrv_pkcs12_info = ansible_module.params.get('_dirsrv_pkcs12_info') options.subject_base = ansible_module.params.get('subject_base') if options.subject_base is not None: options.subject_base = DN(options.subject_base) options._top_dir = ansible_module.params.get('_top_dir') options._add_to_ipaservers = ansible_module.params.get( '_add_to_ipaservers') options._ca_subject = ansible_module.params.get('_ca_subject') options._subject_base = ansible_module.params.get('_subject_base') dirman_password = ansible_module.params.get('dirman_password') config_setup_ca = ansible_module.params.get('config_setup_ca') config_master_host_name = ansible_module.params.get( 'config_master_host_name') config_ca_host_name = ansible_module.params.get('config_ca_host_name') config_ips = ansible_module_get_parsed_ip_addresses( ansible_module, "config_ips") # init # fstore = sysrestore.FileStore(paths.SYSRESTORE) ansible_log.debug("== INSTALL ==") options = installer promote = installer.promote env = gen_env_boostrap_finalize_core(paths.ETC_IPA, constants.DEFAULT_CONFIG) api_bootstrap_finalize(env) config = gen_ReplicaConfig() config.subject_base = options.subject_base config.dirman_password = dirman_password config.setup_ca = config_setup_ca config.master_host_name = config_master_host_name config.ca_host_name = config_ca_host_name config.ips = config_ips config.promote = installer.promote remote_api = gen_remote_api(master_host_name, paths.ETC_IPA) installer._remote_api = remote_api conn = remote_api.Backend.ldap2 ccache = os.environ['KRB5CCNAME'] cafile = paths.IPA_CA_CRT try: ansible_log.debug("-- CONNECT --") if promote: conn.connect(ccache=ccache) else: # dmlvl 0 replica install should always use DM credentials # to create remote LDAP connection. Since ACIs permitting hosts # to manage their own services were added in 4.2 release, # the master denies this operations. conn.connect(bind_dn=ipaldap.DIRMAN_DN, cacert=cafile, bind_pw=dirman_password) ansible_log.debug("-- CONFIGURE DIRSRV --") # Configure dirsrv with redirect_stdout(ansible_log): argspec = inspect.getargspec(install_replica_ds) if "promote" in argspec.args: ds = install_replica_ds(config, options, ca_enabled, remote_api, ca_file=cafile, promote=promote, pkcs12_info=dirsrv_pkcs12_info) else: if "fstore" in argspec.args: ds = install_replica_ds(config, options, ca_enabled, remote_api, ca_file=cafile, pkcs12_info=dirsrv_pkcs12_info, fstore=fstore) else: ds = install_replica_ds(config, options, ca_enabled, remote_api, ca_file=cafile, pkcs12_info=dirsrv_pkcs12_info) ansible_log.debug("-- INSTALL DNS RECORDS --") # Always try to install DNS records argspec = inspect.getargspec(install_dns_records) if "fstore" not in argspec.args: install_dns_records(config, options, remote_api) else: install_dns_records(config, options, remote_api, fstore=fstore) # TODO: check if ntp needs to be enabled later on ansible_log.debug("-- NTP LDAP ENABLE --") if ntpinstance is not None: ntpinstance.ntp_ldap_enable(config.host_name, ds.suffix, remote_api.env.realm) except (ScriptError, RuntimeError) as e: ansible_module.fail_json(msg=str(e)) finally: if conn.isconnected(): ansible_log.debug("-- DISCONNECT --") conn.disconnect() # done # ansible_module.exit_json(changed=True, ds_suffix=str(ds.suffix), ds_ca_subject=str(ds.ca_subject))
def main(): ansible_module = AnsibleModule( argument_spec = dict( #### server ### setup_ca=dict(required=False, type='bool'), setup_kra=dict(required=False, type='bool'), no_pkinit=dict(required=False, type='bool'), #### certificate system ### subject_base=dict(required=True), #### additional ### config_master_host_name=dict(required=True), ccache=dict(required=True), _ca_enabled=dict(required=False, type='bool'), _ca_file=dict(required=False), _pkinit_pkcs12_info = dict(required=False), _top_dir = dict(required=True), dirman_password=dict(required=True, no_log=True), ), supports_check_mode = True, ) ansible_module._ansible_debug = True ansible_log = AnsibleModuleLog(ansible_module) # get parameters # options = installer ### server ### options.setup_ca = ansible_module.params.get('setup_ca') options.setup_kra = ansible_module.params.get('setup_kra') options.no_pkinit = ansible_module.params.get('no_pkinit') ### certificate system ### options.subject_base = ansible_module.params.get('subject_base') if options.subject_base is not None: options.subject_base = DN(options.subject_base) ### additional ### master_host_name = ansible_module.params.get('config_master_host_name') ccache = ansible_module.params.get('ccache') os.environ['KRB5CCNAME'] = ccache #os.environ['KRB5CCNAME'] = ansible_module.params.get('installer_ccache') #installer._ccache = ansible_module.params.get('installer_ccache') options._pkinit_pkcs12_info = ansible_module.params.get('_pkinit_pkcs12_info') options._top_dir = ansible_module.params.get('_top_dir') dirman_password = ansible_module.params.get('dirman_password') # init # fstore = sysrestore.FileStore(paths.SYSRESTORE) ansible_log.debug("== INSTALL ==") options = installer env = gen_env_boostrap_finalize_core(paths.ETC_IPA, constants.DEFAULT_CONFIG) api_bootstrap_finalize(env) config = gen_ReplicaConfig() config.dirman_password = dirman_password remote_api = gen_remote_api(master_host_name, paths.ETC_IPA) #installer._remote_api = remote_api conn = remote_api.Backend.ldap2 ccache = os.environ['KRB5CCNAME'] # There is a api.Backend.ldap2.connect call somewhere in ca, ds, dns or # ntpinstance api.Backend.ldap2.connect() conn.connect(ccache=ccache) # krb krb = krbinstance.KrbInstance(fstore) krb.set_output(ansible_log) with redirect_stdout(ansible_log): krb.init_info(api.env.realm, api.env.host, setup_pkinit=not options.no_pkinit, subject_base=options.subject_base) krb.pkcs12_info = options._pkinit_pkcs12_info krb.master_fqdn = master_host_name ansible_log.debug("-- KRB ENABLE_SSL --") # configure PKINIT now that all required services are in place krb.enable_ssl() # done # ansible_module.exit_json(changed=True)