|
Packit Service |
0a38ef |
# -*- coding: utf-8 -*-
|
|
Packit Service |
0a38ef |
|
|
Packit Service |
0a38ef |
# Authors:
|
|
Packit Service |
0a38ef |
# Thomas Woerner <twoerner@redhat.com>
|
|
Packit Service |
0a38ef |
#
|
|
Packit Service |
0a38ef |
# Based on ipa-client-install code
|
|
Packit Service |
0a38ef |
#
|
|
Packit Service |
0a38ef |
# Copyright (C) 2017 Red Hat
|
|
Packit Service |
0a38ef |
# see file 'COPYING' for use and warranty information
|
|
Packit Service |
0a38ef |
#
|
|
Packit Service |
0a38ef |
# This program is free software; you can redistribute it and/or modify
|
|
Packit Service |
0a38ef |
# it under the terms of the GNU General Public License as published by
|
|
Packit Service |
0a38ef |
# the Free Software Foundation, either version 3 of the License, or
|
|
Packit Service |
0a38ef |
# (at your option) any later version.
|
|
Packit Service |
0a38ef |
#
|
|
Packit Service |
0a38ef |
# This program is distributed in the hope that it will be useful,
|
|
Packit Service |
0a38ef |
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
Packit Service |
0a38ef |
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
Packit Service |
0a38ef |
# GNU General Public License for more details.
|
|
Packit Service |
0a38ef |
#
|
|
Packit Service |
0a38ef |
# You should have received a copy of the GNU General Public License
|
|
Packit Service |
0a38ef |
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
Packit Service |
0a38ef |
|
|
Packit Service |
0a38ef |
from __future__ import print_function
|
|
Packit Service |
0a38ef |
|
|
Packit Service |
0a38ef |
ANSIBLE_METADATA = {
|
|
Packit Service |
0a38ef |
'metadata_version': '1.0',
|
|
Packit Service |
0a38ef |
'supported_by': 'community',
|
|
Packit Service |
0a38ef |
'status': ['preview'],
|
|
Packit Service |
0a38ef |
}
|
|
Packit Service |
0a38ef |
|
|
Packit Service |
0a38ef |
DOCUMENTATION = '''
|
|
Packit Service |
0a38ef |
---
|
|
Packit Service |
0a38ef |
module: ipaserver_prepare
|
|
Packit Service |
0a38ef |
short description: Prepare IPA server deployment
|
|
Packit Service |
0a38ef |
description: Prepare IPA server deployment
|
|
Packit Service |
0a38ef |
options:
|
|
Packit Service |
0a38ef |
force:
|
|
Packit Service |
0a38ef |
description: Installer force parameter
|
|
Packit Service |
0a38ef |
required: yes
|
|
Packit Service |
0a38ef |
dm_password:
|
|
Packit Service |
0a38ef |
description: Directory Manager password
|
|
Packit Service |
0a38ef |
required: no
|
|
Packit Service |
0a38ef |
password:
|
|
Packit Service |
0a38ef |
description: Admin user kerberos password
|
|
Packit Service |
0a38ef |
required: no
|
|
Packit Service |
0a38ef |
ip_addresses:
|
|
Packit Service |
0a38ef |
description: List of Master Server IP Addresses
|
|
Packit Service |
0a38ef |
required: yes
|
|
Packit Service |
0a38ef |
domain:
|
|
Packit Service |
0a38ef |
description: Primary DNS domain of the IPA deployment
|
|
Packit Service |
0a38ef |
required: no
|
|
Packit Service |
0a38ef |
realm:
|
|
Packit Service |
0a38ef |
description: Kerberos realm name of the IPA deployment
|
|
Packit Service |
0a38ef |
required: no
|
|
Packit Service |
0a38ef |
hostname:
|
|
Packit Service |
0a38ef |
description: Fully qualified name of this host
|
|
Packit Service |
0a38ef |
required: yes
|
|
Packit Service |
0a38ef |
ca_cert_files:
|
|
Packit Service |
0a38ef |
description:
|
|
Packit Service |
0a38ef |
List of files containing CA certificates for the service certificate
|
|
Packit Service |
0a38ef |
files
|
|
Packit Service |
0a38ef |
required: yes
|
|
Packit Service |
0a38ef |
no_host_dns:
|
|
Packit Service |
0a38ef |
description: Do not use DNS for hostname lookup during installation
|
|
Packit Service |
0a38ef |
required: yes
|
|
Packit Service |
0a38ef |
setup_adtrust:
|
|
Packit Service |
0a38ef |
description: Configure AD trust capability
|
|
Packit Service |
0a38ef |
required: yes
|
|
Packit Service |
0a38ef |
setup_kra:
|
|
Packit Service |
0a38ef |
description: Configure a dogtag KRA
|
|
Packit Service |
0a38ef |
required: yes
|
|
Packit Service |
0a38ef |
setup_dns:
|
|
Packit Service |
0a38ef |
description: Configure bind with our zone
|
|
Packit Service |
0a38ef |
required: yes
|
|
Packit Service |
0a38ef |
external_ca:
|
|
Packit Service |
0a38ef |
description: External ca setting
|
|
Packit Service |
0a38ef |
required: yes
|
|
Packit Service |
0a38ef |
external_ca_type:
|
|
Packit Service |
0a38ef |
description: Type of the external CA
|
|
Packit Service |
0a38ef |
required: yes
|
|
Packit Service |
0a38ef |
external_ca_profile:
|
|
Packit Service |
0a38ef |
description:
|
|
Packit Service |
0a38ef |
Specify the certificate profile/template to use at the external CA
|
|
Packit Service |
0a38ef |
required: yes
|
|
Packit Service |
0a38ef |
external_cert_files:
|
|
Packit Service |
0a38ef |
description:
|
|
Packit Service |
0a38ef |
File containing the IPA CA certificate and the external CA certificate
|
|
Packit Service |
0a38ef |
chain
|
|
Packit Service |
0a38ef |
required: yes
|
|
Packit Service |
0a38ef |
subject_base:
|
|
Packit Service |
0a38ef |
description:
|
|
Packit Service |
0a38ef |
The certificate subject base (default O=<realm-name>).
|
|
Packit Service |
0a38ef |
RDNs are in LDAP order (most specific RDN first).
|
|
Packit Service |
0a38ef |
required: yes
|
|
Packit Service |
0a38ef |
ca_subject:
|
|
Packit Service |
0a38ef |
description: The installer ca_subject setting
|
|
Packit Service |
0a38ef |
required: yes
|
|
Packit Service |
0a38ef |
allow_zone_overlap:
|
|
Packit Service |
0a38ef |
description: Create DNS zone even if it already exists
|
|
Packit Service |
0a38ef |
required: yes
|
|
Packit Service |
0a38ef |
reverse_zones:
|
|
Packit Service |
0a38ef |
description: The reverse DNS zones to use
|
|
Packit Service |
0a38ef |
required: yes
|
|
Packit Service |
0a38ef |
no_reverse:
|
|
Packit Service |
0a38ef |
description: Do not create new reverse DNS zone
|
|
Packit Service |
0a38ef |
required: yes
|
|
Packit Service |
0a38ef |
auto_reverse:
|
|
Packit Service |
0a38ef |
description: Create necessary reverse zones
|
|
Packit Service |
0a38ef |
required: yes
|
|
Packit Service |
0a38ef |
forwarders:
|
|
Packit Service |
0a38ef |
description: Add DNS forwarders
|
|
Packit Service |
0a38ef |
required: yes
|
|
Packit Service |
0a38ef |
no_forwarders:
|
|
Packit Service |
0a38ef |
description: Do not add any DNS forwarders, use root servers instead
|
|
Packit Service |
0a38ef |
required: yes
|
|
Packit Service |
0a38ef |
auto_forwarders:
|
|
Packit Service |
0a38ef |
description: Use DNS forwarders configured in /etc/resolv.conf
|
|
Packit Service |
0a38ef |
required: yes
|
|
Packit Service |
0a38ef |
forward_policy:
|
|
Packit Service |
0a38ef |
description: DNS forwarding policy for global forwarders
|
|
Packit Service |
0a38ef |
required: yes
|
|
Packit Service |
0a38ef |
no_dnssec_validation:
|
|
Packit Service |
0a38ef |
description: Disable DNSSEC validation
|
|
Packit Service |
0a38ef |
required: yes
|
|
Packit Service |
0a38ef |
enable_compat:
|
|
Packit Service |
0a38ef |
description: Enable support for trusted domains for old clients
|
|
Packit Service |
0a38ef |
required: yes
|
|
Packit Service |
0a38ef |
netbios_name:
|
|
Packit Service |
0a38ef |
description: NetBIOS name of the IPA domain
|
|
Packit Service |
0a38ef |
required: yes
|
|
Packit Service |
0a38ef |
rid_base:
|
|
Packit Service |
0a38ef |
description: Start value for mapping UIDs and GIDs to RIDs
|
|
Packit Service |
0a38ef |
required: yes
|
|
Packit Service |
0a38ef |
secondary_rid_base:
|
|
Packit Service |
0a38ef |
description:
|
|
Packit Service |
0a38ef |
Start value of the secondary range for mapping UIDs and GIDs to RIDs
|
|
Packit Service |
0a38ef |
required: yes
|
|
Packit Service |
0a38ef |
setup_ca:
|
|
Packit Service |
0a38ef |
description: Configure a dogtag CA
|
|
Packit Service |
0a38ef |
required: yes
|
|
Packit Service |
0a38ef |
_hostname_overridden:
|
|
Packit Service |
0a38ef |
description: The installer _hostname_overridden setting
|
|
Packit Service |
0a38ef |
required: yes
|
|
Packit Service |
0a38ef |
author:
|
|
Packit Service |
0a38ef |
- Thomas Woerner
|
|
Packit Service |
0a38ef |
'''
|
|
Packit Service |
0a38ef |
|
|
Packit Service |
0a38ef |
EXAMPLES = '''
|
|
Packit Service |
0a38ef |
'''
|
|
Packit Service |
0a38ef |
|
|
Packit Service |
0a38ef |
RETURN = '''
|
|
Packit Service |
0a38ef |
'''
|
|
Packit Service |
0a38ef |
|
|
Packit Service |
0a38ef |
import os
|
|
Packit Service |
0a38ef |
|
|
Packit Service |
0a38ef |
from ansible.module_utils.basic import AnsibleModule
|
|
Packit Service |
0a38ef |
from ansible.module_utils.ansible_ipa_server import (
|
|
Packit Service |
0a38ef |
AnsibleModuleLog, setup_logging, options, sysrestore, paths,
|
|
Packit Service |
0a38ef |
ansible_module_get_parsed_ip_addresses,
|
|
Packit Service |
0a38ef |
redirect_stdout, adtrust, api, default_subject_base,
|
|
Packit Service |
0a38ef |
default_ca_subject_dn, ipautil, installutils, ca, kra, dns,
|
|
Packit Service |
0a38ef |
get_server_ip_address, no_matching_interface_for_ip_address_warning,
|
|
Packit Service |
0a38ef |
services, logger, tasks, update_hosts_file, ScriptError
|
|
Packit Service |
0a38ef |
)
|
|
Packit Service |
0a38ef |
|
|
Packit Service |
0a38ef |
|
|
Packit Service |
0a38ef |
def main():
|
|
Packit Service |
0a38ef |
ansible_module = AnsibleModule(
|
|
Packit Service |
0a38ef |
argument_spec=dict(
|
|
Packit Service |
0a38ef |
# basic
|
|
Packit Service |
0a38ef |
force=dict(required=False, type='bool', default=False),
|
|
Packit Service |
0a38ef |
dm_password=dict(required=True, no_log=True),
|
|
Packit Service |
0a38ef |
password=dict(required=True, no_log=True),
|
|
Packit Service |
0a38ef |
ip_addresses=dict(required=False, type='list', default=[]),
|
|
Packit Service |
0a38ef |
domain=dict(required=True),
|
|
Packit Service |
0a38ef |
realm=dict(required=True),
|
|
Packit Service |
0a38ef |
hostname=dict(required=False),
|
|
Packit Service |
0a38ef |
ca_cert_files=dict(required=False, type='list', default=[]),
|
|
Packit Service |
0a38ef |
no_host_dns=dict(required=False, type='bool', default=False),
|
|
Packit Service |
0a38ef |
# server
|
|
Packit Service |
0a38ef |
setup_adtrust=dict(required=False, type='bool', default=False),
|
|
Packit Service |
0a38ef |
setup_kra=dict(required=False, type='bool', default=False),
|
|
Packit Service |
0a38ef |
setup_dns=dict(required=False, type='bool', default=False),
|
|
Packit Service |
0a38ef |
# ssl certificate
|
|
Packit Service |
0a38ef |
# client
|
|
Packit Service |
0a38ef |
# certificate system
|
|
Packit Service |
0a38ef |
external_ca=dict(required=False, type='bool'),
|
|
Packit Service |
0a38ef |
external_ca_type=dict(required=False),
|
|
Packit Service |
0a38ef |
external_ca_profile=dict(required=False),
|
|
Packit Service |
0a38ef |
external_cert_files=dict(required=False, type='list', default=[]),
|
|
Packit Service |
0a38ef |
subject_base=dict(required=False),
|
|
Packit Service |
0a38ef |
ca_subject=dict(required=False),
|
|
Packit Service |
0a38ef |
# dns
|
|
Packit Service |
0a38ef |
allow_zone_overlap=dict(required=False, type='bool',
|
|
Packit Service |
0a38ef |
default=False),
|
|
Packit Service |
0a38ef |
reverse_zones=dict(required=False, type='list', default=[]),
|
|
Packit Service |
0a38ef |
no_reverse=dict(required=False, type='bool', default=False),
|
|
Packit Service |
0a38ef |
auto_reverse=dict(required=False, type='bool', default=False),
|
|
Packit Service |
0a38ef |
forwarders=dict(required=False, type='list', default=[]),
|
|
Packit Service |
0a38ef |
no_forwarders=dict(required=False, type='bool', default=False),
|
|
Packit Service |
0a38ef |
auto_forwarders=dict(required=False, type='bool', default=False),
|
|
Packit Service |
0a38ef |
forward_policy=dict(default=None, choices=['first', 'only']),
|
|
Packit Service |
0a38ef |
no_dnssec_validation=dict(required=False, type='bool',
|
|
Packit Service |
0a38ef |
default=False),
|
|
Packit Service |
0a38ef |
# ad trust
|
|
Packit Service |
0a38ef |
enable_compat=dict(required=False, type='bool', default=False),
|
|
Packit Service |
0a38ef |
netbios_name=dict(required=False),
|
|
Packit Service |
0a38ef |
rid_base=dict(required=False, type='int'),
|
|
Packit Service |
0a38ef |
secondary_rid_base=dict(required=False, type='int'),
|
|
Packit Service |
0a38ef |
|
|
Packit Service |
0a38ef |
# additional
|
|
Packit Service |
0a38ef |
setup_ca=dict(required=False, type='bool', default=False),
|
|
Packit Service |
0a38ef |
_hostname_overridden=dict(required=False, type='bool',
|
|
Packit Service |
0a38ef |
default=False),
|
|
Packit Service |
0a38ef |
),
|
|
Packit Service |
0a38ef |
supports_check_mode=True,
|
|
Packit Service |
0a38ef |
)
|
|
Packit Service |
0a38ef |
|
|
Packit Service |
0a38ef |
ansible_module._ansible_debug = True
|
|
Packit Service |
0a38ef |
setup_logging()
|
|
Packit Service |
0a38ef |
ansible_log = AnsibleModuleLog(ansible_module)
|
|
Packit Service |
0a38ef |
|
|
Packit Service |
0a38ef |
# initialize return values for flake ############################
|
|
Packit Service |
0a38ef |
|
|
Packit Service |
0a38ef |
# These are set by ca.install_check
|
|
Packit Service |
0a38ef |
options._subject_base = None
|
|
Packit Service |
0a38ef |
options._ca_subject = None
|
|
Packit Service |
0a38ef |
|
|
Packit Service |
0a38ef |
# set values ####################################################
|
|
Packit Service |
0a38ef |
|
|
Packit Service |
0a38ef |
options.force = ansible_module.params.get('force')
|
|
Packit Service |
0a38ef |
options.dm_password = ansible_module.params.get('dm_password')
|
|
Packit Service |
0a38ef |
options.admin_password = ansible_module.params.get('password')
|
|
Packit Service |
0a38ef |
options.ip_addresses = ansible_module_get_parsed_ip_addresses(
|
|
Packit Service |
0a38ef |
ansible_module)
|
|
Packit Service |
0a38ef |
options.domain_name = ansible_module.params.get('domain')
|
|
Packit Service |
0a38ef |
options.realm_name = ansible_module.params.get('realm')
|
|
Packit Service |
0a38ef |
options.host_name = ansible_module.params.get('hostname')
|
|
Packit Service |
0a38ef |
options.ca_cert_files = ansible_module.params.get('ca_cert_files')
|
|
Packit Service |
0a38ef |
options.no_host_dns = ansible_module.params.get('no_host_dns')
|
|
Packit Service |
0a38ef |
# server
|
|
Packit Service |
0a38ef |
options.setup_adtrust = ansible_module.params.get('setup_adtrust')
|
|
Packit Service |
0a38ef |
options.setup_kra = ansible_module.params.get('setup_kra')
|
|
Packit Service |
0a38ef |
options.setup_dns = ansible_module.params.get('setup_dns')
|
|
Packit Service |
0a38ef |
# options.no_pkinit = ansible_module.params.get('no_pkinit')
|
|
Packit Service |
0a38ef |
# ssl certificate
|
|
Packit Service |
0a38ef |
# options.dirsrv_cert_files = ansible_module.params.get(
|
|
Packit Service |
0a38ef |
# 'dirsrv_cert_files')
|
|
Packit Service |
0a38ef |
# client
|
|
Packit Service |
0a38ef |
# options.no_ntp = ansible_module.params.get('no_ntp')
|
|
Packit Service |
0a38ef |
# certificate system
|
|
Packit Service |
0a38ef |
options.external_ca = ansible_module.params.get('external_ca')
|
|
Packit Service |
0a38ef |
options.external_ca_type = ansible_module.params.get('external_ca_type')
|
|
Packit Service |
0a38ef |
options.external_ca_profile = ansible_module.params.get(
|
|
Packit Service |
0a38ef |
'external_ca_profile')
|
|
Packit Service |
0a38ef |
options.external_cert_files = ansible_module.params.get(
|
|
Packit Service |
0a38ef |
'external_cert_files')
|
|
Packit Service |
0a38ef |
options.subject_base = ansible_module.params.get('subject_base')
|
|
Packit Service |
0a38ef |
options.ca_subject = ansible_module.params.get('ca_subject')
|
|
Packit Service |
0a38ef |
# dns
|
|
Packit Service |
0a38ef |
options.allow_zone_overlap = ansible_module.params.get(
|
|
Packit Service |
0a38ef |
'allow_zone_overlap')
|
|
Packit Service |
0a38ef |
options.reverse_zones = ansible_module.params.get('reverse_zones')
|
|
Packit Service |
0a38ef |
options.no_reverse = ansible_module.params.get('no_reverse')
|
|
Packit Service |
0a38ef |
options.auto_reverse = ansible_module.params.get('auto_reverse')
|
|
Packit Service |
0a38ef |
options.forwarders = ansible_module.params.get('forwarders')
|
|
Packit Service |
0a38ef |
options.no_forwarders = ansible_module.params.get('no_forwarders')
|
|
Packit Service |
0a38ef |
options.auto_forwarders = ansible_module.params.get('auto_forwarders')
|
|
Packit Service |
0a38ef |
options.forward_policy = ansible_module.params.get('forward_policy')
|
|
Packit Service |
0a38ef |
options.no_dnssec_validation = ansible_module.params.get(
|
|
Packit Service |
0a38ef |
'no_dnssec_validation')
|
|
Packit Service |
0a38ef |
# ad trust
|
|
Packit Service |
0a38ef |
options.enable_compat = ansible_module.params.get('enable_compat')
|
|
Packit Service |
0a38ef |
options.netbios_name = ansible_module.params.get('netbios_name')
|
|
Packit Service |
0a38ef |
# additional
|
|
Packit Service |
0a38ef |
options.setup_ca = ansible_module.params.get('setup_ca')
|
|
Packit Service |
0a38ef |
options._host_name_overridden = ansible_module.params.get(
|
|
Packit Service |
0a38ef |
'_hostname_overridden')
|
|
Packit Service |
0a38ef |
options.kasp_db_file = None
|
|
Packit Service |
0a38ef |
|
|
Packit Service |
0a38ef |
# init ##################################################################
|
|
Packit Service |
0a38ef |
|
|
Packit Service |
0a38ef |
fstore = sysrestore.FileStore(paths.SYSRESTORE)
|
|
Packit Service |
0a38ef |
sstore = sysrestore.StateFile(paths.SYSRESTORE)
|
|
Packit Service |
0a38ef |
|
|
Packit Service |
0a38ef |
# subject_base
|
|
Packit Service |
0a38ef |
if not options.subject_base:
|
|
Packit Service |
0a38ef |
options.subject_base = str(default_subject_base(options.realm_name))
|
|
Packit Service |
0a38ef |
# set options.subject for old ipa releases
|
|
Packit Service |
0a38ef |
options.subject = options.subject_base
|
|
Packit Service |
0a38ef |
|
|
Packit Service |
0a38ef |
if not options.ca_subject:
|
|
Packit Service |
0a38ef |
options.ca_subject = str(default_ca_subject_dn(options.subject_base))
|
|
Packit Service |
0a38ef |
|
|
Packit Service |
0a38ef |
try:
|
|
Packit Service |
0a38ef |
|
|
Packit Service |
0a38ef |
# Configuration for ipalib, we will bootstrap and finalize later, after
|
|
Packit Service |
0a38ef |
# we are sure we have the configuration file ready.
|
|
Packit Service |
0a38ef |
cfg = dict(
|
|
Packit Service |
0a38ef |
context='installer',
|
|
Packit Service |
0a38ef |
confdir=paths.ETC_IPA,
|
|
Packit Service |
0a38ef |
in_server=True,
|
|
Packit Service |
0a38ef |
# make sure host name specified by user is used instead of default
|
|
Packit Service |
0a38ef |
host=options.host_name,
|
|
Packit Service |
0a38ef |
)
|
|
Packit Service |
0a38ef |
if options.setup_ca:
|
|
Packit Service |
0a38ef |
# we have an IPA-integrated CA
|
|
Packit Service |
0a38ef |
cfg['ca_host'] = options.host_name
|
|
Packit Service |
0a38ef |
|
|
Packit Service |
0a38ef |
# Create the management framework config file and finalize api
|
|
Packit Service |
0a38ef |
target_fname = paths.IPA_DEFAULT_CONF
|
|
Packit Service |
0a38ef |
fd = open(target_fname, "w")
|
|
Packit Service |
0a38ef |
fd.write("[global]\n")
|
|
Packit Service |
0a38ef |
fd.write("host=%s\n" % options.host_name)
|
|
Packit Service |
0a38ef |
fd.write("basedn=%s\n" % ipautil.realm_to_suffix(options.realm_name))
|
|
Packit Service |
0a38ef |
fd.write("realm=%s\n" % options.realm_name)
|
|
Packit Service |
0a38ef |
fd.write("domain=%s\n" % options.domain_name)
|
|
Packit Service |
0a38ef |
fd.write("xmlrpc_uri=https://%s/ipa/xml\n" %
|
|
Packit Service |
0a38ef |
ipautil.format_netloc(options.host_name))
|
|
Packit Service |
0a38ef |
fd.write("ldap_uri=ldapi://%%2fvar%%2frun%%2fslapd-%s.socket\n" %
|
|
Packit Service |
0a38ef |
installutils.realm_to_serverid(options.realm_name))
|
|
Packit Service |
0a38ef |
if options.setup_ca:
|
|
Packit Service |
0a38ef |
fd.write("enable_ra=True\n")
|
|
Packit Service |
0a38ef |
fd.write("ra_plugin=dogtag\n")
|
|
Packit Service |
0a38ef |
fd.write("dogtag_version=10\n")
|
|
Packit Service |
0a38ef |
else:
|
|
Packit Service |
0a38ef |
fd.write("enable_ra=False\n")
|
|
Packit Service |
0a38ef |
fd.write("ra_plugin=none\n")
|
|
Packit Service |
0a38ef |
fd.write("mode=production\n")
|
|
Packit Service |
0a38ef |
fd.close()
|
|
Packit Service |
0a38ef |
|
|
Packit Service |
0a38ef |
# Must be readable for everyone
|
|
Packit Service |
0a38ef |
os.chmod(target_fname, 0o644)
|
|
Packit Service |
0a38ef |
|
|
Packit Service |
0a38ef |
api.bootstrap(**cfg)
|
|
Packit Service |
0a38ef |
api.finalize()
|
|
Packit Service |
0a38ef |
|
|
Packit Service |
0a38ef |
if options.setup_ca:
|
|
Packit Service |
0a38ef |
with redirect_stdout(ansible_log):
|
|
Packit Service |
0a38ef |
ca.install_check(False, None, options)
|
|
Packit Service |
0a38ef |
if options.setup_kra:
|
|
Packit Service |
0a38ef |
with redirect_stdout(ansible_log):
|
|
Packit Service |
0a38ef |
kra.install_check(api, None, options)
|
|
Packit Service |
0a38ef |
|
|
Packit Service |
0a38ef |
if options.setup_dns:
|
|
Packit Service |
0a38ef |
with redirect_stdout(ansible_log):
|
|
Packit Service |
0a38ef |
dns.install_check(False, api, False, options,
|
|
Packit Service |
0a38ef |
options.host_name)
|
|
Packit Service |
0a38ef |
ip_addresses = dns.ip_addresses
|
|
Packit Service |
0a38ef |
else:
|
|
Packit Service |
0a38ef |
ip_addresses = get_server_ip_address(options.host_name,
|
|
Packit Service |
0a38ef |
not options.interactive,
|
|
Packit Service |
0a38ef |
False,
|
|
Packit Service |
0a38ef |
options.ip_addresses)
|
|
Packit Service |
0a38ef |
|
|
Packit Service |
0a38ef |
# check addresses here, dns module is doing own check
|
|
Packit Service |
0a38ef |
no_matching_interface_for_ip_address_warning(ip_addresses)
|
|
Packit Service |
0a38ef |
options.ip_addresses = ip_addresses
|
|
Packit Service |
0a38ef |
options.reverse_zones = dns.reverse_zones
|
|
Packit Service |
0a38ef |
|
|
Packit Service |
0a38ef |
instance_name = "-".join(options.realm_name.split("."))
|
|
Packit Service |
0a38ef |
dirsrv = services.knownservices.dirsrv
|
|
Packit Service |
0a38ef |
if options.external_cert_files \
|
|
Packit Service |
0a38ef |
and dirsrv.is_installed(instance_name) \
|
|
Packit Service |
0a38ef |
and not dirsrv.is_running(instance_name):
|
|
Packit Service |
0a38ef |
logger.debug('Starting Directory Server')
|
|
Packit Service |
0a38ef |
services.knownservices.dirsrv.start(instance_name)
|
|
Packit Service |
0a38ef |
|
|
Packit Service |
0a38ef |
if options.setup_adtrust:
|
|
Packit Service |
0a38ef |
with redirect_stdout(ansible_log):
|
|
Packit Service |
0a38ef |
adtrust.install_check(False, options, api)
|
|
Packit Service |
0a38ef |
|
|
Packit Service |
0a38ef |
_update_hosts_file = False
|
|
Packit Service |
0a38ef |
# options needs to update hosts file when DNS subsystem will be
|
|
Packit Service |
0a38ef |
# installed or custom addresses are used
|
|
Packit Service |
0a38ef |
if options.ip_addresses or options.setup_dns:
|
|
Packit Service |
0a38ef |
_update_hosts_file = True
|
|
Packit Service |
0a38ef |
|
|
Packit Service |
0a38ef |
if options._host_name_overridden:
|
|
Packit Service |
0a38ef |
tasks.backup_hostname(fstore, sstore)
|
|
Packit Service |
0a38ef |
tasks.set_hostname(options.host_name)
|
|
Packit Service |
0a38ef |
|
|
Packit Service |
0a38ef |
if _update_hosts_file:
|
|
Packit Service |
0a38ef |
update_hosts_file(ip_addresses, options.host_name, fstore)
|
|
Packit Service |
0a38ef |
|
|
Packit Service |
0a38ef |
if hasattr(tasks, "configure_pkcs11_modules"):
|
|
Packit Service |
0a38ef |
if tasks.configure_pkcs11_modules(fstore):
|
|
Packit Service |
0a38ef |
ansible_log.info("Disabled p11-kit-proxy")
|
|
Packit Service |
0a38ef |
|
|
Packit Service |
0a38ef |
except (RuntimeError, ValueError, ScriptError,
|
|
Packit Service |
0a38ef |
ipautil.CalledProcessError) as e:
|
|
Packit Service |
0a38ef |
ansible_module.fail_json(msg=str(e))
|
|
Packit Service |
0a38ef |
|
|
Packit Service |
0a38ef |
ansible_module.exit_json(
|
|
Packit Service |
0a38ef |
changed=True,
|
|
Packit Service |
0a38ef |
# basic
|
|
Packit Service |
0a38ef |
ip_addresses=[str(ip) for ip in ip_addresses],
|
|
Packit Service |
0a38ef |
# certificate system
|
|
Packit Service |
0a38ef |
subject_base=options.subject_base,
|
|
Packit Service |
0a38ef |
_subject_base=options._subject_base,
|
|
Packit Service |
0a38ef |
ca_subject=options.ca_subject,
|
|
Packit Service |
0a38ef |
_ca_subject=options._ca_subject,
|
|
Packit Service |
0a38ef |
# dns
|
|
Packit Service |
0a38ef |
reverse_zones=options.reverse_zones,
|
|
Packit Service |
0a38ef |
forward_policy=options.forward_policy,
|
|
Packit Service |
0a38ef |
forwarders=options.forwarders,
|
|
Packit Service |
0a38ef |
no_dnssec_validation=options.no_dnssec_validation,
|
|
Packit Service |
0a38ef |
# additional
|
|
Packit Service |
0a38ef |
dns_ip_addresses=[str(ip) for ip
|
|
Packit Service |
0a38ef |
in dns.ip_addresses],
|
|
Packit Service |
0a38ef |
dns_reverse_zones=dns.reverse_zones,
|
|
Packit Service |
0a38ef |
adtrust_netbios_name=adtrust.netbios_name,
|
|
Packit Service |
0a38ef |
adtrust_reset_netbios_name=adtrust.reset_netbios_name)
|
|
Packit Service |
0a38ef |
|
|
Packit Service |
0a38ef |
|
|
Packit Service |
0a38ef |
if __name__ == '__main__':
|
|
Packit Service |
0a38ef |
main()
|