|
Packit |
8cb997 |
#!/usr/bin/python
|
|
Packit |
8cb997 |
# -*- coding: utf-8 -*-
|
|
Packit |
8cb997 |
|
|
Packit |
8cb997 |
# Authors:
|
|
Packit |
8cb997 |
# Thomas Woerner <twoerner@redhat.com>
|
|
Packit |
8cb997 |
#
|
|
Packit |
8cb997 |
# Based on ipa-client-install code
|
|
Packit |
8cb997 |
#
|
|
Packit |
8cb997 |
# Copyright (C) 2017 Red Hat
|
|
Packit |
8cb997 |
# see file 'COPYING' for use and warranty information
|
|
Packit |
8cb997 |
#
|
|
Packit |
8cb997 |
# This program is free software; you can redistribute it and/or modify
|
|
Packit |
8cb997 |
# it under the terms of the GNU General Public License as published by
|
|
Packit |
8cb997 |
# the Free Software Foundation, either version 3 of the License, or
|
|
Packit |
8cb997 |
# (at your option) any later version.
|
|
Packit |
8cb997 |
#
|
|
Packit |
8cb997 |
# This program is distributed in the hope that it will be useful,
|
|
Packit |
8cb997 |
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
Packit |
8cb997 |
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
Packit |
8cb997 |
# GNU General Public License for more details.
|
|
Packit |
8cb997 |
#
|
|
Packit |
8cb997 |
# You should have received a copy of the GNU General Public License
|
|
Packit |
8cb997 |
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
Packit |
8cb997 |
|
|
Packit |
8cb997 |
ANSIBLE_METADATA = {
|
|
Packit |
8cb997 |
'metadata_version': '1.0',
|
|
Packit |
8cb997 |
'supported_by': 'community',
|
|
Packit |
8cb997 |
'status': ['preview'],
|
|
Packit |
8cb997 |
}
|
|
Packit |
8cb997 |
|
|
Packit |
8cb997 |
DOCUMENTATION = '''
|
|
Packit |
8cb997 |
---
|
|
Packit |
8cb997 |
module: ipaclient_join
|
|
Packit |
8cb997 |
short description:
|
|
Packit |
8cb997 |
Join a machine to an IPA realm and get a keytab for the host service
|
|
Packit |
8cb997 |
principal
|
|
Packit |
8cb997 |
description:
|
|
Packit |
8cb997 |
Join a machine to an IPA realm and get a keytab for the host service
|
|
Packit |
8cb997 |
principal
|
|
Packit |
8cb997 |
options:
|
|
Packit |
8cb997 |
servers:
|
|
Packit |
8cb997 |
description: Fully qualified name of IPA servers to enroll to
|
|
Packit |
8cb997 |
required: no
|
|
Packit |
8cb997 |
domain:
|
|
Packit |
8cb997 |
description: Primary DNS domain of the IPA deployment
|
|
Packit |
8cb997 |
required: no
|
|
Packit |
8cb997 |
realm:
|
|
Packit |
8cb997 |
description: Kerberos realm name of the IPA deployment
|
|
Packit |
8cb997 |
required: no
|
|
Packit |
8cb997 |
hostname:
|
|
Packit |
8cb997 |
description: Fully qualified name of this host
|
|
Packit |
8cb997 |
required: no
|
|
Packit |
8cb997 |
kdc:
|
|
Packit |
8cb997 |
description: The name or address of the host running the KDC
|
|
Packit |
8cb997 |
required: no
|
|
Packit |
8cb997 |
basedn:
|
|
Packit |
8cb997 |
description: The basedn of the IPA server (of the form dc=example,dc=com)
|
|
Packit |
8cb997 |
required: no
|
|
Packit |
8cb997 |
principal:
|
|
Packit |
8cb997 |
description:
|
|
Packit |
8cb997 |
User Principal allowed to promote replicas and join IPA realm
|
|
Packit |
8cb997 |
required: yes
|
|
Packit |
8cb997 |
password:
|
|
Packit |
8cb997 |
description: Admin user kerberos password
|
|
Packit |
8cb997 |
required: yes
|
|
Packit |
8cb997 |
keytab:
|
|
Packit |
8cb997 |
description: Path to backed up keytab from previous enrollment
|
|
Packit |
8cb997 |
required: yes
|
|
Packit |
8cb997 |
admin_keytab:
|
|
Packit |
8cb997 |
description: The path to a local admin keytab
|
|
Packit |
8cb997 |
required: yes
|
|
Packit |
8cb997 |
ca_cert_file:
|
|
Packit |
8cb997 |
description:
|
|
Packit |
8cb997 |
A CA certificate to use. Do not acquire the IPA CA certificate via
|
|
Packit |
8cb997 |
automated means
|
|
Packit |
8cb997 |
required: yes
|
|
Packit |
8cb997 |
force_join:
|
|
Packit |
8cb997 |
description: Force client enrollment even if already enrolled
|
|
Packit |
8cb997 |
required: yes
|
|
Packit |
8cb997 |
kinit_attempts:
|
|
Packit |
8cb997 |
description: Repeat the request for host Kerberos ticket X times
|
|
Packit |
8cb997 |
required: yes
|
|
Packit |
8cb997 |
debug:
|
|
Packit |
8cb997 |
description: Turn on extra debugging
|
|
Packit |
8cb997 |
required: yes
|
|
Packit |
8cb997 |
author:
|
|
Packit |
8cb997 |
- Thomas Woerner
|
|
Packit |
8cb997 |
'''
|
|
Packit |
8cb997 |
|
|
Packit |
8cb997 |
EXAMPLES = '''
|
|
Packit |
8cb997 |
# Join IPA to get the keytab
|
|
Packit |
8cb997 |
- name: Join IPA in force mode with maximum 5 kinit attempts
|
|
Packit |
8cb997 |
ipaclient_join:
|
|
Packit |
8cb997 |
servers: ["server1.example.com","server2.example.com"]
|
|
Packit |
8cb997 |
domain: example.com
|
|
Packit |
8cb997 |
realm: EXAMPLE.COM
|
|
Packit |
8cb997 |
kdc: server1.example.com
|
|
Packit |
8cb997 |
basedn: dc=example,dc=com
|
|
Packit |
8cb997 |
hostname: client1.example.com
|
|
Packit |
8cb997 |
principal: admin
|
|
Packit |
8cb997 |
password: MySecretPassword
|
|
Packit |
8cb997 |
force_join: yes
|
|
Packit |
8cb997 |
kinit_attempts: 5
|
|
Packit |
8cb997 |
|
|
Packit |
8cb997 |
# Join IPA to get the keytab using ipadiscovery return values
|
|
Packit |
8cb997 |
- name: Join IPA
|
|
Packit |
8cb997 |
ipaclient_join:
|
|
Packit |
8cb997 |
servers: "{{ ipadiscovery.servers }}"
|
|
Packit |
8cb997 |
domain: "{{ ipadiscovery.domain }}"
|
|
Packit |
8cb997 |
realm: "{{ ipadiscovery.realm }}"
|
|
Packit |
8cb997 |
kdc: "{{ ipadiscovery.kdc }}"
|
|
Packit |
8cb997 |
basedn: "{{ ipadiscovery.basedn }}"
|
|
Packit |
8cb997 |
hostname: "{{ ipadiscovery.hostname }}"
|
|
Packit |
8cb997 |
principal: admin
|
|
Packit |
8cb997 |
password: MySecretPassword
|
|
Packit |
8cb997 |
'''
|
|
Packit |
8cb997 |
|
|
Packit |
8cb997 |
RETURN = '''
|
|
Packit |
8cb997 |
already_joined:
|
|
Packit |
8cb997 |
description: The flag describes if the host is arelady joined.
|
|
Packit |
8cb997 |
returned: always
|
|
Packit |
8cb997 |
type: bool
|
|
Packit |
8cb997 |
'''
|
|
Packit |
8cb997 |
|
|
Packit |
8cb997 |
import os
|
|
Packit |
8cb997 |
import tempfile
|
|
Packit |
8cb997 |
|
|
Packit |
8cb997 |
from ansible.module_utils.basic import AnsibleModule
|
|
Packit |
8cb997 |
from ansible.module_utils.ansible_ipa_client import (
|
|
Packit |
8cb997 |
SECURE_PATH, sysrestore, paths, options, configure_krb5_conf,
|
|
Packit |
8cb997 |
realm_to_suffix, kinit_keytab, GSSError, kinit_password, NUM_VERSION,
|
|
Packit |
8cb997 |
get_ca_cert, get_ca_certs, errors, run
|
|
Packit |
8cb997 |
)
|
|
Packit |
8cb997 |
|
|
Packit |
8cb997 |
|
|
Packit |
8cb997 |
def main():
|
|
Packit |
8cb997 |
module = AnsibleModule(
|
|
Packit |
8cb997 |
argument_spec=dict(
|
|
Packit |
8cb997 |
servers=dict(required=True, type='list'),
|
|
Packit |
8cb997 |
domain=dict(required=True),
|
|
Packit |
8cb997 |
realm=dict(required=True),
|
|
Packit |
8cb997 |
hostname=dict(required=True),
|
|
Packit |
8cb997 |
kdc=dict(required=True),
|
|
Packit |
8cb997 |
basedn=dict(required=True),
|
|
Packit |
8cb997 |
principal=dict(required=False),
|
|
Packit |
8cb997 |
password=dict(required=False, no_log=True),
|
|
Packit |
8cb997 |
keytab=dict(required=False),
|
|
Packit |
8cb997 |
admin_keytab=dict(required=False),
|
|
Packit |
8cb997 |
ca_cert_file=dict(required=False),
|
|
Packit |
8cb997 |
force_join=dict(required=False, type='bool'),
|
|
Packit |
8cb997 |
kinit_attempts=dict(required=False, type='int', default=5),
|
|
Packit |
8cb997 |
debug=dict(required=False, type='bool'),
|
|
Packit |
8cb997 |
),
|
|
Packit |
8cb997 |
supports_check_mode=True,
|
|
Packit |
8cb997 |
)
|
|
Packit |
8cb997 |
|
|
Packit |
8cb997 |
module._ansible_debug = True
|
|
Packit |
8cb997 |
servers = module.params.get('servers')
|
|
Packit |
8cb997 |
domain = module.params.get('domain')
|
|
Packit |
8cb997 |
realm = module.params.get('realm')
|
|
Packit |
8cb997 |
hostname = module.params.get('hostname')
|
|
Packit |
8cb997 |
basedn = module.params.get('basedn')
|
|
Packit |
8cb997 |
kdc = module.params.get('kdc')
|
|
Packit |
8cb997 |
force_join = module.params.get('force_join')
|
|
Packit |
8cb997 |
principal = module.params.get('principal')
|
|
Packit |
8cb997 |
password = module.params.get('password')
|
|
Packit |
8cb997 |
keytab = module.params.get('keytab')
|
|
Packit |
8cb997 |
admin_keytab = module.params.get('admin_keytab')
|
|
Packit |
8cb997 |
ca_cert_file = module.params.get('ca_cert_file')
|
|
Packit |
8cb997 |
kinit_attempts = module.params.get('kinit_attempts')
|
|
Packit |
8cb997 |
debug = module.params.get('debug')
|
|
Packit |
8cb997 |
|
|
Packit |
8cb997 |
if password is not None and keytab is not None:
|
|
Packit |
8cb997 |
module.fail_json(msg="Password and keytab cannot be used together")
|
|
Packit |
8cb997 |
|
|
Packit |
8cb997 |
if password is None and admin_keytab is None:
|
|
Packit |
8cb997 |
module.fail_json(msg="Password or admin_keytab is needed")
|
|
Packit |
8cb997 |
|
|
Packit |
8cb997 |
client_domain = hostname[hostname.find(".")+1:]
|
|
Packit |
8cb997 |
nolog = tuple()
|
|
Packit |
8cb997 |
env = {'PATH': SECURE_PATH}
|
|
Packit |
8cb997 |
fstore = sysrestore.FileStore(paths.IPA_CLIENT_SYSRESTORE)
|
|
Packit |
8cb997 |
host_principal = 'host/%s@%s' % (hostname, realm)
|
|
Packit |
8cb997 |
sssd = True
|
|
Packit |
8cb997 |
|
|
Packit |
8cb997 |
options.ca_cert_file = ca_cert_file
|
|
Packit |
8cb997 |
options.principal = principal
|
|
Packit |
8cb997 |
options.force = False
|
|
Packit |
8cb997 |
options.password = password
|
|
Packit |
8cb997 |
|
|
Packit |
8cb997 |
ccache_dir = None
|
|
Packit |
8cb997 |
changed = False
|
|
Packit |
8cb997 |
already_joined = False
|
|
Packit |
8cb997 |
try:
|
|
Packit |
8cb997 |
(krb_fd, krb_name) = tempfile.mkstemp()
|
|
Packit |
8cb997 |
os.close(krb_fd)
|
|
Packit |
8cb997 |
configure_krb5_conf(
|
|
Packit |
8cb997 |
cli_realm=realm,
|
|
Packit |
8cb997 |
cli_domain=domain,
|
|
Packit |
8cb997 |
cli_server=servers,
|
|
Packit |
8cb997 |
cli_kdc=kdc,
|
|
Packit |
8cb997 |
dnsok=False,
|
|
Packit |
8cb997 |
filename=krb_name,
|
|
Packit |
8cb997 |
client_domain=client_domain,
|
|
Packit |
8cb997 |
client_hostname=hostname,
|
|
Packit |
8cb997 |
configure_sssd=sssd,
|
|
Packit |
8cb997 |
force=False)
|
|
Packit |
8cb997 |
env['KRB5_CONFIG'] = krb_name
|
|
Packit |
8cb997 |
ccache_dir = tempfile.mkdtemp(prefix='krbcc')
|
|
Packit |
8cb997 |
ccache_name = os.path.join(ccache_dir, 'ccache')
|
|
Packit |
8cb997 |
join_args = [paths.SBIN_IPA_JOIN,
|
|
Packit |
8cb997 |
"-s", servers[0],
|
|
Packit |
8cb997 |
"-b", str(realm_to_suffix(realm)),
|
|
Packit |
8cb997 |
"-h", hostname]
|
|
Packit |
8cb997 |
if debug:
|
|
Packit |
8cb997 |
join_args.append("-d")
|
|
Packit |
8cb997 |
env['XMLRPC_TRACE_CURL'] = 'yes'
|
|
Packit |
8cb997 |
if force_join:
|
|
Packit |
8cb997 |
join_args.append("-f")
|
|
Packit |
8cb997 |
if principal is not None:
|
|
Packit |
8cb997 |
if principal.find('@') == -1:
|
|
Packit |
8cb997 |
principal = '%s@%s' % (principal, realm)
|
|
Packit |
8cb997 |
if admin_keytab:
|
|
Packit |
8cb997 |
join_args.append("-f")
|
|
Packit |
8cb997 |
if not os.path.exists(admin_keytab):
|
|
Packit |
8cb997 |
module.fail_json(
|
|
Packit |
8cb997 |
msg="Keytab file could not be found: %s" %
|
|
Packit |
8cb997 |
admin_keytab)
|
|
Packit |
8cb997 |
try:
|
|
Packit |
8cb997 |
kinit_keytab(principal,
|
|
Packit |
8cb997 |
admin_keytab,
|
|
Packit |
8cb997 |
ccache_name,
|
|
Packit |
8cb997 |
config=krb_name,
|
|
Packit |
8cb997 |
attempts=kinit_attempts)
|
|
Packit |
8cb997 |
except GSSError as e:
|
|
Packit |
8cb997 |
module.fail_json(
|
|
Packit |
8cb997 |
msg="Kerberos authentication failed: %s" % str(e))
|
|
Packit |
8cb997 |
else:
|
|
Packit |
8cb997 |
try:
|
|
Packit |
8cb997 |
kinit_password(principal, password, ccache_name,
|
|
Packit |
8cb997 |
config=krb_name)
|
|
Packit |
8cb997 |
except RuntimeError as e:
|
|
Packit |
8cb997 |
module.fail_json(
|
|
Packit |
8cb997 |
msg="Kerberos authentication failed: {}".format(e))
|
|
Packit |
8cb997 |
|
|
Packit |
8cb997 |
elif keytab:
|
|
Packit |
8cb997 |
join_args.append("-f")
|
|
Packit |
8cb997 |
if os.path.exists(keytab):
|
|
Packit |
8cb997 |
try:
|
|
Packit |
8cb997 |
kinit_keytab(host_principal,
|
|
Packit |
8cb997 |
keytab,
|
|
Packit |
8cb997 |
ccache_name,
|
|
Packit |
8cb997 |
config=krb_name,
|
|
Packit |
8cb997 |
attempts=kinit_attempts)
|
|
Packit |
8cb997 |
except GSSError as e:
|
|
Packit |
8cb997 |
module.fail_json(
|
|
Packit |
8cb997 |
msg="Kerberos authentication failed: {}".format(e))
|
|
Packit |
8cb997 |
else:
|
|
Packit |
8cb997 |
module.fail_json(
|
|
Packit |
8cb997 |
msg="Keytab file could not be found: {}".format(keytab))
|
|
Packit |
8cb997 |
|
|
Packit |
8cb997 |
elif password:
|
|
Packit |
8cb997 |
join_args.append("-w")
|
|
Packit |
8cb997 |
join_args.append(password)
|
|
Packit |
8cb997 |
nolog = (password,)
|
|
Packit |
8cb997 |
|
|
Packit |
8cb997 |
env['KRB5CCNAME'] = os.environ['KRB5CCNAME'] = ccache_name
|
|
Packit |
8cb997 |
# Get the CA certificate
|
|
Packit |
8cb997 |
try:
|
|
Packit |
8cb997 |
os.environ['KRB5_CONFIG'] = env['KRB5_CONFIG']
|
|
Packit |
8cb997 |
if NUM_VERSION < 40100:
|
|
Packit |
8cb997 |
get_ca_cert(fstore, options, servers[0], basedn)
|
|
Packit |
8cb997 |
else:
|
|
Packit |
8cb997 |
get_ca_certs(fstore, options, servers[0], basedn, realm)
|
|
Packit |
8cb997 |
del os.environ['KRB5_CONFIG']
|
|
Packit |
8cb997 |
except errors.FileError as e:
|
|
Packit |
8cb997 |
module.fail_json(msg='%s' % e)
|
|
Packit |
8cb997 |
except Exception as e:
|
|
Packit |
8cb997 |
module.fail_json(msg="Cannot obtain CA certificate\n%s" % e)
|
|
Packit |
8cb997 |
|
|
Packit |
8cb997 |
# Now join the domain
|
|
Packit |
8cb997 |
result = run(
|
|
Packit |
8cb997 |
join_args, raiseonerr=False, env=env, nolog=nolog,
|
|
Packit |
8cb997 |
capture_error=True)
|
|
Packit |
8cb997 |
stderr = result.error_output
|
|
Packit |
8cb997 |
|
|
Packit |
8cb997 |
if result.returncode != 0:
|
|
Packit |
8cb997 |
if result.returncode == 13:
|
|
Packit |
8cb997 |
already_joined = True
|
|
Packit |
8cb997 |
module.log("Host is already joined")
|
|
Packit |
8cb997 |
else:
|
|
Packit |
8cb997 |
if principal:
|
|
Packit |
8cb997 |
run([paths.KDESTROY], raiseonerr=False, env=env)
|
|
Packit |
8cb997 |
module.fail_json(msg="Joining realm failed: %s" % stderr)
|
|
Packit |
8cb997 |
else:
|
|
Packit |
8cb997 |
changed = True
|
|
Packit |
8cb997 |
module.log("Enrolled in IPA realm %s" % realm)
|
|
Packit |
8cb997 |
|
|
Packit |
8cb997 |
# Fail for missing krb5.keytab on already joined host
|
|
Packit |
8cb997 |
if already_joined and not os.path.exists(paths.KRB5_KEYTAB):
|
|
Packit |
8cb997 |
module.fail_json(msg="krb5.keytab missing! Retry with "
|
|
Packit |
8cb997 |
"ipaclient_force_join=yes to generate a new one.")
|
|
Packit |
8cb997 |
|
|
Packit |
8cb997 |
if principal:
|
|
Packit |
8cb997 |
run([paths.KDESTROY], raiseonerr=False, env=env)
|
|
Packit |
8cb997 |
|
|
Packit |
8cb997 |
# Obtain the TGT. We do it with the temporary krb5.conf, sot
|
|
Packit |
8cb997 |
# tha only the KDC we're installing under is contacted.
|
|
Packit |
8cb997 |
# Other KDCs might not have replicated the principal yet.
|
|
Packit |
8cb997 |
# Once we have the TGT, it's usable on any server.
|
|
Packit |
8cb997 |
try:
|
|
Packit |
8cb997 |
kinit_keytab(host_principal, paths.KRB5_KEYTAB,
|
|
Packit |
8cb997 |
paths.IPA_DNS_CCACHE,
|
|
Packit |
8cb997 |
config=krb_name,
|
|
Packit |
8cb997 |
attempts=kinit_attempts)
|
|
Packit |
8cb997 |
env['KRB5CCNAME'] = os.environ['KRB5CCNAME'] = paths.IPA_DNS_CCACHE
|
|
Packit |
8cb997 |
except GSSError as e:
|
|
Packit |
8cb997 |
# failure to get ticket makes it impossible to login and
|
|
Packit |
8cb997 |
# bind from sssd to LDAP, abort installation
|
|
Packit |
8cb997 |
module.fail_json(msg="Failed to obtain host TGT: %s" % e)
|
|
Packit |
8cb997 |
|
|
Packit |
8cb997 |
finally:
|
|
Packit |
8cb997 |
try:
|
|
Packit |
8cb997 |
os.remove(krb_name)
|
|
Packit |
8cb997 |
except OSError:
|
|
Packit |
8cb997 |
module.fail_json(msg="Could not remove %s" % krb_name)
|
|
Packit |
8cb997 |
if ccache_dir is not None:
|
|
Packit |
8cb997 |
try:
|
|
Packit |
8cb997 |
os.rmdir(ccache_dir)
|
|
Packit |
8cb997 |
except OSError:
|
|
Packit |
8cb997 |
pass
|
|
Packit |
8cb997 |
if os.path.exists(krb_name + ".ipabkp"):
|
|
Packit |
8cb997 |
try:
|
|
Packit |
8cb997 |
os.remove(krb_name + ".ipabkp")
|
|
Packit |
8cb997 |
except OSError:
|
|
Packit |
8cb997 |
module.fail_json(msg="Could not remove %s.ipabkp" % krb_name)
|
|
Packit |
8cb997 |
|
|
Packit |
8cb997 |
module.exit_json(changed=changed,
|
|
Packit |
8cb997 |
already_joined=already_joined)
|
|
Packit |
8cb997 |
|
|
Packit |
8cb997 |
|
|
Packit |
8cb997 |
if __name__ == '__main__':
|
|
Packit |
8cb997 |
main()
|