#!/usr/bin/python # -*- coding: utf-8 -*- # Authors: # Thomas Woerner # # Based on ipa-client-install code # # Copyright (C) 2017 Red Hat # see file 'COPYING' for use and warranty information # # This program is free software; you can redistribute it and/or modify # it under the terms of the GNU General Public License as published by # the Free Software Foundation, either version 3 of the License, or # (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program. If not, see . from __future__ import print_function ANSIBLE_METADATA = { 'metadata_version': '1.0', 'supported_by': 'community', 'status': ['preview'], } DOCUMENTATION = ''' --- module: ipaserver_setup_http short description: Setup HTTP description: Setup HTTP options: dm_password: description: Directory Manager password required: no password: description: Admin user kerberos password required: no master_password: description: kerberos master password (normally autogenerated) required: no domain: description: Primary DNS domain of the IPA deployment required: no realm: description: Kerberos realm name of the IPA deployment required: no hostname: description: Fully qualified name of this host required: yes ip_addresses: description: List of Master Server IP Addresses required: yes reverse_zones: description: The reverse DNS zones to use required: yes http_cert_files: description: File containing the Apache Server SSL certificate and private key required: yes setup_adtrust: description: Configure AD trust capability required: yes setup_kra: description: Configure a dogtag KRA required: yes setup_dns: description: Configure bind with our zone required: yes setup_ca: description: Configure a dogtag CA required: yes no_host_dns: description: Do not use DNS for hostname lookup during installation required: yes no_pkinit: description: Disable pkinit setup steps required: yes no_hbac_allow: description: Don't install allow_all HBAC rule required: yes no_ui_redirect: description: Do not automatically redirect to the Web UI required: yes external_cert_files: description: File containing the IPA CA certificate and the external CA certificate chain required: yes subject_base: description: The certificate subject base (default O=). RDNs are in LDAP order (most specific RDN first). required: yes _subject_base: description: The installer _subject_base setting required: yes ca_subject: description: The installer ca_subject setting required: yes _ca_subject: description: The installer _ca_subject setting required: yes idstart: description: The starting value for the IDs range (default random) required: no idmax: description: The max value for the IDs range (default: idstart+199999) required: no domainlevel: description: The domain level required: yes dirsrv_config_file: description: The path to LDIF file that will be used to modify configuration of dse.ldif during installation of the directory server instance required: yes dirsrv_cert_files: description: Files containing the Directory Server SSL certificate and private key required: yes no_reverse: description: Do not create new reverse DNS zone required: yes auto_forwarders: description: Use DNS forwarders configured in /etc/resolv.conf required: yes _dirsrv_pkcs12_info: description: The installer _dirsrv_pkcs12_info setting required: yes _http_pkcs12_info: description: The installer _http_pkcs12_info setting required: yes author: - Thomas Woerner ''' EXAMPLES = ''' ''' RETURN = ''' ''' from ansible.module_utils.basic import AnsibleModule from ansible.module_utils.ansible_ipa_server import ( AnsibleModuleLog, options, sysrestore, paths, ansible_module_get_parsed_ip_addresses, api_Backend_ldap2, redirect_stdout, ds_init_info, krbinstance, httpinstance, ca, service, tasks ) def main(): ansible_module = AnsibleModule( argument_spec=dict( # basic dm_password=dict(required=True, no_log=True), password=dict(required=True, no_log=True), master_password=dict(required=True, no_log=True), domain=dict(required=True), realm=dict(required=True), hostname=dict(required=False), ip_addresses=dict(required=False, type='list', default=[]), reverse_zones=dict(required=False, type='list', default=[]), http_cert_files=dict(required=False, type='list', default=[]), setup_adtrust=dict(required=False, type='bool', default=False), setup_kra=dict(required=False, type='bool', default=False), setup_dns=dict(required=False, type='bool', default=False), setup_ca=dict(required=False, type='bool', default=False), no_host_dns=dict(required=False, type='bool', default=False), no_pkinit=dict(required=False, type='bool', default=False), no_hbac_allow=dict(required=False, type='bool', default=False), no_ui_redirect=dict(required=False, type='bool', default=False), external_cert_files=dict(required=False, type='list', default=[]), subject_base=dict(required=False), _subject_base=dict(required=False), ca_subject=dict(required=False), _ca_subject=dict(required=False), idstart=dict(required=True, type='int'), idmax=dict(required=True, type='int'), domainlevel=dict(required=False, type='int'), dirsrv_config_file=dict(required=False), dirsrv_cert_files=dict(required=False, type='list', default=[]), no_reverse=dict(required=False, type='bool', default=False), auto_forwarders=dict(required=False, type='bool', default=False), # _update_hosts_file=dict(required=False, type='bool', # default=False), _dirsrv_pkcs12_info=dict(required=False), _http_pkcs12_info=dict(required=False), ), ) ansible_module._ansible_debug = True ansible_log = AnsibleModuleLog(ansible_module) # set values ############################################################ options.dm_password = ansible_module.params.get('dm_password') options.admin_password = ansible_module.params.get('password') options.master_password = ansible_module.params.get('master_password') options.domain_name = ansible_module.params.get('domain') options.realm_name = ansible_module.params.get('realm') options.host_name = ansible_module.params.get('hostname') options.ip_addresses = ansible_module_get_parsed_ip_addresses( ansible_module) options.reverse_zones = ansible_module.params.get('reverse_zones') options.http_cert_files = ansible_module.params.get('http_cert_files') options.setup_adtrust = ansible_module.params.get('setup_adtrust') options.setup_kra = ansible_module.params.get('setup_kra') options.setup_dns = ansible_module.params.get('setup_dns') options.setup_ca = ansible_module.params.get('setup_ca') options.no_host_dns = ansible_module.params.get('no_host_dns') options.no_pkinit = ansible_module.params.get('no_pkinit') options.no_hbac_allow = ansible_module.params.get('no_hbac_allow') options.no_ui_redirect = ansible_module.params.get('no_ui_redirect') options.external_cert_files = ansible_module.params.get( 'external_cert_files') options.subject_base = ansible_module.params.get('subject_base') options._subject_base = ansible_module.params.get('_subject_base') options.ca_subject = ansible_module.params.get('ca_subject') options._ca_subject = ansible_module.params.get('_ca_subject') options.no_reverse = ansible_module.params.get('no_reverse') options.auto_forwarders = ansible_module.params.get('auto_forwarders') options.idstart = ansible_module.params.get('idstart') options.idmax = ansible_module.params.get('idmax') options.domainlevel = ansible_module.params.get('domainlevel') options.dirsrv_config_file = ansible_module.params.get( 'dirsrv_config_file') options.dirsrv_cert_files = ansible_module.params.get('dirsrv_cert_files') # options._update_hosts_file = ansible_module.params.get( # '_update_hosts_file') options._dirsrv_pkcs12_info = ansible_module.params.get( '_dirsrv_pkcs12_info') options._http_pkcs12_info = ansible_module.params.get( '_http_pkcs12_info') # init ################################################################## fstore = sysrestore.FileStore(paths.SYSRESTORE) api_Backend_ldap2(options.host_name, options.setup_ca, connect=True) ds = ds_init_info(ansible_log, fstore, options.domainlevel, options.dirsrv_config_file, options.realm_name, options.host_name, options.domain_name, options.dm_password, options.idstart, options.idmax, options.subject_base, options.ca_subject, options.no_hbac_allow, options._dirsrv_pkcs12_info, options.no_pkinit) # krb krb = krbinstance.KrbInstance(fstore) krb.set_output(ansible_log) with redirect_stdout(ansible_log): krb.init_info(options.realm_name, options.host_name, setup_pkinit=not options.no_pkinit, subject_base=options.subject_base) # setup HTTP ############################################################ # Create a HTTP instance http = httpinstance.HTTPInstance(fstore) http.set_output(ansible_log) with redirect_stdout(ansible_log): if options.http_cert_files: http.create_instance( options.realm_name, options.host_name, options.domain_name, options.dm_password, pkcs12_info=options._http_pkcs12_info, subject_base=options.subject_base, auto_redirect=not options.no_ui_redirect, ca_is_configured=options.setup_ca) else: http.create_instance( options.realm_name, options.host_name, options.domain_name, options.dm_password, subject_base=options.subject_base, auto_redirect=not options.no_ui_redirect, ca_is_configured=options.setup_ca) if hasattr(paths, "CACHE_IPA_SESSIONS"): tasks.restore_context(paths.CACHE_IPA_SESSIONS) ca.set_subject_base_in_config(options.subject_base) # configure PKINIT now that all required services are in place krb.enable_ssl() # Apply any LDAP updates. Needs to be done after the configuration file # is created. DS is restarted in the process. service.print_msg("Applying LDAP updates") ds.apply_updates() # Restart krb after configurations have been changed service.print_msg("Restarting the KDC") krb.restart() # done ################################################################## ansible_module.exit_json(changed=True) if __name__ == '__main__': main()