mirror of
https://github.com/freeipa/ansible-freeipa.git
synced 2026-03-26 21:33:05 +00:00
This change adds support for DNS over TLS to the ipareplica role.
New variables
ipareplica_dot_forwarders
List of DNS over TLS forwarders. Required if ipareplica_dns_over_tls
is enabled. (list of strings)
required: false
ipareplica_dns_over_tls | ipaclient_dns_over_tls
Configure DNS over TLS. Requires FreeIPA version 4.12.5 or later.
(bool, default: false)
required: false
ipareplica_dns_over_tls_cert
Certificate to use for DNS over TLS. If empty, a new certificate will
be requested from IPA CA. (string)
required: false
ipareplica_dns_over_tls_key
Key for certificate specified in ipareplica_dns_over_tls_cert. (string)
required: false
ipareplica_dns_policy
Encrypted DNS policy. Only usable if `ipareplica_dns_over_tls` is
enabled. (choice: relaxed, enforced, default: relaxed)
required: false
New distribution specific variable
ipareplica_packages_dot
List of IPA packages needed for DNS over TLS.
258 lines
8.1 KiB
Python
258 lines
8.1 KiB
Python
# -*- coding: utf-8 -*-
|
|
|
|
# Authors:
|
|
# Thomas Woerner <twoerner@redhat.com>
|
|
#
|
|
# Based on ipa-replica-install code
|
|
#
|
|
# Copyright (C) 2018-2022 Red Hat
|
|
# see file 'COPYING' for use and warranty information
|
|
#
|
|
# This program is free software; you can redistribute it and/or modify
|
|
# it under the terms of the GNU General Public License as published by
|
|
# the Free Software Foundation, either version 3 of the License, or
|
|
# (at your option) any later version.
|
|
#
|
|
# This program is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU General Public License
|
|
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
from __future__ import (absolute_import, division, print_function)
|
|
|
|
__metaclass__ = type
|
|
|
|
ANSIBLE_METADATA = {
|
|
'metadata_version': '1.0',
|
|
'supported_by': 'community',
|
|
'status': ['preview'],
|
|
}
|
|
|
|
DOCUMENTATION = '''
|
|
---
|
|
module: ipareplica_setup_dns
|
|
short_description: Setup DNS
|
|
description:
|
|
Setup DNS
|
|
options:
|
|
setup_kra:
|
|
description: Configure a dogtag KRA
|
|
type: bool
|
|
required: no
|
|
setup_dns:
|
|
description: Configure bind with our zone
|
|
type: bool
|
|
required: no
|
|
subject_base:
|
|
description:
|
|
The certificate subject base (default O=<realm-name>).
|
|
RDNs are in LDAP order (most specific RDN first).
|
|
type: str
|
|
required: yes
|
|
zonemgr:
|
|
description: DNS zone manager e-mail address. Defaults to hostmaster@DOMAIN
|
|
type: str
|
|
required: no
|
|
forwarders:
|
|
description: Add DNS forwarders
|
|
type: list
|
|
elements: str
|
|
required: no
|
|
default: []
|
|
forward_policy:
|
|
description: DNS forwarding policy for global forwarders
|
|
type: str
|
|
choices: ['first', 'only']
|
|
required: no
|
|
no_dnssec_validation:
|
|
description: Disable DNSSEC validation
|
|
type: bool
|
|
default: no
|
|
required: no
|
|
dot_forwarders:
|
|
description: List of DNS over TLS forwarders
|
|
type: list
|
|
elements: str
|
|
default: []
|
|
required: no
|
|
dns_over_tls:
|
|
description: Configure DNS over TLS
|
|
type: bool
|
|
default: no
|
|
required: no
|
|
dns_over_tls_cert:
|
|
description:
|
|
Certificate to use for DNS over TLS. If empty, a new
|
|
certificate will be requested from IPA CA
|
|
type: str
|
|
required: no
|
|
dns_over_tls_key:
|
|
description: Key for certificate specified in dns_over_tls_cert
|
|
type: str
|
|
required: no
|
|
dns_policy:
|
|
description: Encrypted DNS policy
|
|
type: str
|
|
choices: ['relaxed', 'enforced']
|
|
default: 'relaxed'
|
|
dns_ip_addresses:
|
|
description: The dns ip_addresses setting
|
|
type: list
|
|
elements: str
|
|
required: yes
|
|
dns_reverse_zones:
|
|
description: The dns reverse_zones setting
|
|
type: list
|
|
elements: str
|
|
required: yes
|
|
ccache:
|
|
description: The local ccache
|
|
type: str
|
|
required: yes
|
|
_top_dir:
|
|
description: The installer _top_dir setting
|
|
type: str
|
|
required: yes
|
|
setup_ca:
|
|
description: Configure a dogtag CA
|
|
type: bool
|
|
required: yes
|
|
config_master_host_name:
|
|
description: The config master_host_name setting
|
|
type: str
|
|
required: yes
|
|
author:
|
|
- Thomas Woerner (@t-woerner)
|
|
'''
|
|
|
|
EXAMPLES = '''
|
|
'''
|
|
|
|
RETURN = '''
|
|
'''
|
|
|
|
import os
|
|
|
|
from ansible.module_utils.basic import AnsibleModule
|
|
from ansible.module_utils.ansible_ipa_replica import (
|
|
check_imports, AnsibleModuleLog, setup_logging, installer, DN, paths,
|
|
gen_env_boostrap_finalize_core, constants, api_bootstrap_finalize,
|
|
gen_ReplicaConfig, gen_remote_api, api, redirect_stdout, dns,
|
|
ansible_module_get_parsed_ip_addresses
|
|
)
|
|
# pylint: disable=unused-import
|
|
from ansible.module_utils.ansible_ipa_replica import bindinstance # noqa: F401
|
|
# pylint: enable=unused-import
|
|
|
|
|
|
def main():
|
|
ansible_module = AnsibleModule(
|
|
argument_spec=dict(
|
|
# server
|
|
setup_kra=dict(required=False, type='bool'),
|
|
setup_dns=dict(required=False, type='bool'),
|
|
# certificate system
|
|
subject_base=dict(required=True, type='str'),
|
|
# dns
|
|
zonemgr=dict(required=False, type='str'),
|
|
forwarders=dict(required=False, type='list', elements='str',
|
|
default=[]),
|
|
forward_policy=dict(required=False, type='str',
|
|
choices=['first', 'only'], default=None),
|
|
no_dnssec_validation=dict(required=False, type='bool',
|
|
default=False),
|
|
dot_forwarders=dict(required=False, type='list', elements='str',
|
|
default=[]),
|
|
dns_over_tls=dict(required=False, type='bool', default=False),
|
|
dns_over_tls_cert=dict(required=False, type='str'),
|
|
dns_over_tls_key=dict(required=False, type='str'),
|
|
dns_policy=dict(required=False, type='str',
|
|
choices=['relaxed', 'enforced'],
|
|
default='relaxed'),
|
|
# additional
|
|
dns_ip_addresses=dict(required=True, type='list', elements='str'),
|
|
dns_reverse_zones=dict(required=True, type='list', elements='str'),
|
|
ccache=dict(required=True, type='str'),
|
|
_top_dir=dict(required=True, type='str'),
|
|
setup_ca=dict(required=True, type='bool'),
|
|
config_master_host_name=dict(required=True, type='str'),
|
|
),
|
|
supports_check_mode=False,
|
|
)
|
|
|
|
ansible_module._ansible_debug = True
|
|
check_imports(ansible_module)
|
|
setup_logging()
|
|
ansible_log = AnsibleModuleLog(ansible_module)
|
|
|
|
# get parameters #
|
|
|
|
options = installer
|
|
# server
|
|
options.setup_kra = ansible_module.params.get('setup_kra')
|
|
options.setup_dns = ansible_module.params.get('setup_dns')
|
|
# certificate system
|
|
options.subject_base = ansible_module.params.get('subject_base')
|
|
if options.subject_base is not None:
|
|
options.subject_base = DN(options.subject_base)
|
|
# dns
|
|
options.zonemgr = ansible_module.params.get('zonemgr')
|
|
options.forwarders = ansible_module.params.get('forwarders')
|
|
options.forward_policy = ansible_module.params.get('forward_policy')
|
|
options.no_dnssec_validation = ansible_module.params.get(
|
|
'no_dnssec_validation')
|
|
options.dot_forwarders = ansible_module.params.get('dot_forwarders')
|
|
options.dns_over_tls = ansible_module.params.get('dns_over_tls')
|
|
options.dns_over_tls_cert = ansible_module.params.get('dns_over_tls_cert')
|
|
options.dns_over_tls_key = ansible_module.params.get('dns_over_tls_key')
|
|
options.dns_policy = ansible_module.params.get('dns_policy')
|
|
# additional
|
|
dns.ip_addresses = ansible_module_get_parsed_ip_addresses(
|
|
ansible_module, 'dns_ip_addresses')
|
|
dns.reverse_zones = ansible_module.params.get('dns_reverse_zones')
|
|
ccache = ansible_module.params.get('ccache')
|
|
os.environ['KRB5CCNAME'] = ccache
|
|
options._top_dir = ansible_module.params.get('_top_dir')
|
|
options.setup_ca = ansible_module.params.get('setup_ca')
|
|
config_master_host_name = ansible_module.params.get(
|
|
'config_master_host_name')
|
|
|
|
# init #
|
|
|
|
ansible_log.debug("== INSTALL ==")
|
|
|
|
env = gen_env_boostrap_finalize_core(paths.ETC_IPA,
|
|
constants.DEFAULT_CONFIG)
|
|
api_bootstrap_finalize(env)
|
|
config = gen_ReplicaConfig()
|
|
config.subject_base = options.subject_base
|
|
config.master_host_name = config_master_host_name
|
|
|
|
remote_api = gen_remote_api(config.master_host_name, paths.ETC_IPA)
|
|
installer._remote_api = remote_api
|
|
|
|
ccache = os.environ['KRB5CCNAME']
|
|
|
|
# There is a api.Backend.ldap2.connect call somewhere in ca, ds, dns or
|
|
# ntpinstance
|
|
api.Backend.ldap2.connect()
|
|
|
|
with redirect_stdout(ansible_log):
|
|
if options.setup_dns:
|
|
ansible_log.debug("-- INSTALL DNS --")
|
|
dns.install(False, True, options, api)
|
|
else:
|
|
ansible_log.debug("-- DNS UPDATE_SYSTEM_RECORDS --")
|
|
api.Command.dns_update_system_records()
|
|
|
|
# done #
|
|
|
|
ansible_module.exit_json(changed=True)
|
|
|
|
|
|
if __name__ == '__main__':
|
|
main()
|