Skip to content
Snippets Groups Projects
Commit 06bde23f authored by Chris Hines's avatar Chris Hines
Browse files

Merge pull request #120 from CVL-GitHub/hpcidbranch7

code ldapserver final localtion ldap keys and certs; fix explict copi…
parents 87261907 b59782bf
No related branches found
No related tags found
No related merge requests found
...@@ -2,6 +2,7 @@ ...@@ -2,6 +2,7 @@
- include_vars: "{{ ansible_distribution }}_{{ ansible_distribution_version }}_{{ ansible_architecture }}.yml" - include_vars: "{{ ansible_distribution }}_{{ ansible_distribution_version }}_{{ ansible_architecture }}.yml"
- include_vars: "{{ ansible_distribution }}.yml" - include_vars: "{{ ansible_distribution }}.yml"
- name: install system packages apt - name: install system packages apt
apt: name={{ item }} state=installed update_cache=true apt: name={{ item }} state=installed update_cache=true
sudo: true sudo: true
...@@ -23,10 +24,6 @@ ...@@ -23,10 +24,6 @@
command: /usr/sbin/slappasswd -h {SSHA} -s {{ ldapManagerPassword }} command: /usr/sbin/slappasswd -h {SSHA} -s {{ ldapManagerPassword }}
register: ldapManagerHash register: ldapManagerHash
- name: template root.ldif - name: template root.ldif
template: src=root_ldif.j2 dest=/tmp/root.ldif template: src=root_ldif.j2 dest=/tmp/root.ldif
...@@ -39,7 +36,6 @@ ...@@ -39,7 +36,6 @@
- name: template groups.ldif - name: template groups.ldif
template: src=groups_ldif.j2 dest=/tmp/groups.ldif template: src=groups_ldif.j2 dest=/tmp/groups.ldif
- name: template load_modules.ldif - name: template load_modules.ldif
template: src=load_modules_ldif.j2 dest=/tmp/load_modules.ldif template: src=load_modules_ldif.j2 dest=/tmp/load_modules.ldif
...@@ -65,45 +61,25 @@ ...@@ -65,45 +61,25 @@
template: src=manager_ldif3.j2 dest=/tmp/manager3.ldif mode=600 template: src=manager_ldif3.j2 dest=/tmp/manager3.ldif mode=600
sudo: true sudo: true
- name: make cert dir
file: path={{ ldapcert | dirname }} state=directory owner={{ ldapuser }} group={{ ldapgroup }}
sudo: true
- name: make key dir
file: path={{ ldapkey | dirname }} state=directory owner={{ ldapuser }} group={{ ldapgroup }} mode=700
sudo: true
- name: make ca dir
file: path={{ cacert | dirname }} state=directory owner={{ ldapuser }} group={{ ldapgroup }}
sudo: true
- name: make ldap certs dir - name: make ldap certs dir
file: path={{ ldapCertDir }} state=directory owner={{ ldapuser }} group={{ ldapgroup }} file: path={{ ldapCertDest | dirname }} state=directory owner={{ ldapuser }} group={{ ldapgroup }}
sudo: true sudo: true
when: ldapCertDir is defined
- name: make ldap private dir - name: make ldap private dir
file: path={{ ldapPrivateDir }} state=directory owner={{ ldapuser }} group={{ ldapgroup }} file: path={{ ldapKeyDest | dirname }} state=directory owner={{ ldapuser }} group={{ ldapgroup }} mode=700
sudo: true sudo: true
when: ldapPrivateDir is defined
# Change to remove easy-rsa and to use fixed key and certs
- name: copy fixed keys and certs from files directory
template: src=files/{{ item.src }} dest="{{ item.dest }}" mode={{ item.mode }} owner=root group=root
with_items: ldapCertFiles
sudo: true
- name: copy cert - name: copy cert
copy: src="files/{{ ldap_TLSCert }}" dest="{{ ldapcert }}" copy: src="files/{{ ldapCert }}" dest="{{ ldapCertDest }}"
sudo: true sudo: true
- name: copy cacert - name: copy ca cert
copy: src="files/{{ ldap_TLSCAChain }}" dest="{{ cacert }}" copy: src="files/{{ ldapCAChain }}" dest="{{ ldapCAChainDest }}"
sudo: true sudo: true
- name: copy key - name: copy key
copy: src="files/{{ ldap_TLSKey }}" dest="{{ ldapkey }}" mode=600 owner={{ ldapuser }} group={{ ldapgroup }} copy: src="files/{{ ldapKey }}" dest="{{ ldapKeyDest }}" mode=600 owner={{ ldapuser }} group={{ ldapgroup }}
sudo: true sudo: true
- name: enable ssl centos - name: enable ssl centos
...@@ -117,12 +93,11 @@ ...@@ -117,12 +93,11 @@
when: ansible_os_family == 'RedHat' and ansible_distribution_major_version >= '7' when: ansible_os_family == 'RedHat' and ansible_distribution_major_version >= '7'
- name: check TLS config - name: check TLS config
shell: "slapcat -b cn=config | grep 'olcTLSCertificateKeyFile: {{ ldapkey }}'" shell: "slapcat -b cn=config | grep 'olcTLSCertificateKeyFile: {{ ldapKeyDest }}'"
ignore_errors: true ignore_errors: true
sudo: true sudo: true
register: tlsConfigured register: tlsConfigured
- name: start ldap - name: start ldap
service: name=slapd state=restarted service: name=slapd state=restarted
sudo: true sudo: true
...@@ -133,7 +108,7 @@ ...@@ -133,7 +108,7 @@
when: tlsConfigured|failed when: tlsConfigured|failed
- name: Initialise cosine and ppolicy - name: Initialise cosine and ppolicy
shell: ldapadd -Y EXTERNAL -H ldapi:/// -f /etc/openldap/schema/{{ item }}.ldif -D cn=config shell: ldapadd -Y EXTERNAL -H ldapi:/// -f {{ ldapDir }}/schema/{{ item }}.ldif -D cn=config
with_items: with_items:
- ppolicy - ppolicy
- cosine - cosine
...@@ -141,7 +116,6 @@ ...@@ -141,7 +116,6 @@
- inetorgperson - inetorgperson
ignore_errors: true ignore_errors: true
sudo: true sudo: true
when: ansible_os_family == 'RedHat' and ansible_distribution_major_version >= '7'
- name: check ppolicy module loaded - name: check ppolicy module loaded
shell: slapcat -b cn=config | grep "olcModuleLoad. {.*}ppolicy" shell: slapcat -b cn=config | grep "olcModuleLoad. {.*}ppolicy"
...@@ -165,7 +139,6 @@ ...@@ -165,7 +139,6 @@
sudo: true sudo: true
when: ppolicyOverlayConfigured|failed when: ppolicyOverlayConfigured|failed
- name: check Manager config - name: check Manager config
shell: "slapcat -b cn=config | grep 'olcRootDN: {{ ldapManager }}'" shell: "slapcat -b cn=config | grep 'olcRootDN: {{ ldapManager }}'"
ignore_errors: true ignore_errors: true
...@@ -201,8 +174,6 @@ ...@@ -201,8 +174,6 @@
sudo: true sudo: true
when: aclConfigured|failed when: aclConfigured|failed
- name: check DIT config - name: check DIT config
shell: "ldapsearch -D {{ ldapManager }} -w {{ ldapManagerPassword }} -b {{ ldapBase }} -x -H ldap://localhost objectClass=dcObject" shell: "ldapsearch -D {{ ldapManager }} -w {{ ldapManagerPassword }} -b {{ ldapBase }} -x -H ldap://localhost objectClass=dcObject"
ignore_errors: true ignore_errors: true
...@@ -212,7 +183,6 @@ ...@@ -212,7 +183,6 @@
shell: ldapadd -x -D {{ ldapManager }} -w {{ ldapManagerPassword }} -x -H ldap://localhost -f /tmp/root.ldif shell: ldapadd -x -D {{ ldapManager }} -w {{ ldapManagerPassword }} -x -H ldap://localhost -f /tmp/root.ldif
when: ditConfigured|failed when: ditConfigured|failed
- name: check real Accounts config - name: check real Accounts config
shell: "ldapsearch -D {{ ldapManager }} -w {{ ldapManagerPassword }} -b {{ ldapAccountBase }} -x -H ldap://localhost objectClass=*" shell: "ldapsearch -D {{ ldapManager }} -w {{ ldapManagerPassword }} -b {{ ldapAccountBase }} -x -H ldap://localhost objectClass=*"
ignore_errors: true ignore_errors: true
...@@ -259,7 +229,6 @@ ...@@ -259,7 +229,6 @@
sudo: true sudo: true
when: binddnConfigured|failed when: binddnConfigured|failed
- name: check pwpolicies config - name: check pwpolicies config
shell: ldapsearch -D {{ ldapBindDN }} -w {{ ldapBindDNPassword }} -b ou=pwpolicies,{{ ldapDomain }} objectClass=* shell: ldapsearch -D {{ ldapBindDN }} -w {{ ldapBindDNPassword }} -b ou=pwpolicies,{{ ldapDomain }} objectClass=*
ignore_errors: true ignore_errors: true
......
dn: cn=config dn: cn=config
replace: olcTLSCACertificateFile replace: olcTLSCACertificateFile
olcTLSCACertificateFile: {{ cacert }} olcTLSCACertificateFile: {{ ldapCAChainDest }}
- -
replace: olcTLSCertificateFile replace: olcTLSCertificateFile
olcTLSCertificateFile: {{ ldapcert }} olcTLSCertificateFile: {{ ldapCertDest }}
- -
replace: olcTLSCertificateKeyFile replace: olcTLSCertificateKeyFile
olcTLSCertificateKeyFile: {{ ldapkey }} olcTLSCertificateKeyFile: {{ ldapKeyDest }}
--- ---
ldapcert: /etc/openldap/certs/ldapcert.pem ldapDir: "/etc/openldap"
ldapkey: /etc/openldap/certs/ldapkey.pem
cacert: /etc/openldap/certs/cacert.pem
module_path: "/usr/lib64/openldap/" module_path: "/usr/lib64/openldap/"
--- ---
ldapcert: /etc/ldap/certs/ldapcert.pem ldapDir: "/etc/ldap"
ldapkey: /etc/ldap/certs/ldapkey.pem
cacert: /etc/ldap/certs/cacert.pem
module_path: "/usr/lib/ldap" module_path: "/usr/lib/ldap"
---
ldapCertDest: "{{ ldapDir }}/ssl/certs/ldapcert.pem"
ldapKeyDest: "{{ ldapDir }}/ssl/private/ldapkey.pem"
ldapCAChainDest: "{{ ldapDir }}/ssl/certs/cacert.pem"
---
packager: yum
apache: httpd
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment