Blame roles/ipaserver/library/ipaserver_prepare.py

Packit Service 0a38ef
# -*- coding: utf-8 -*-
Packit Service 0a38ef
Packit Service 0a38ef
# Authors:
Packit Service 0a38ef
#   Thomas Woerner <twoerner@redhat.com>
Packit Service 0a38ef
#
Packit Service 0a38ef
# Based on ipa-client-install code
Packit Service 0a38ef
#
Packit Service 0a38ef
# Copyright (C) 2017  Red Hat
Packit Service 0a38ef
# see file 'COPYING' for use and warranty information
Packit Service 0a38ef
#
Packit Service 0a38ef
# This program is free software; you can redistribute it and/or modify
Packit Service 0a38ef
# it under the terms of the GNU General Public License as published by
Packit Service 0a38ef
# the Free Software Foundation, either version 3 of the License, or
Packit Service 0a38ef
# (at your option) any later version.
Packit Service 0a38ef
#
Packit Service 0a38ef
# This program is distributed in the hope that it will be useful,
Packit Service 0a38ef
# but WITHOUT ANY WARRANTY; without even the implied warranty of
Packit Service 0a38ef
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
Packit Service 0a38ef
# GNU General Public License for more details.
Packit Service 0a38ef
#
Packit Service 0a38ef
# You should have received a copy of the GNU General Public License
Packit Service 0a38ef
# along with this program.  If not, see <http://www.gnu.org/licenses/>.
Packit Service 0a38ef
Packit Service 0a38ef
from __future__ import print_function
Packit Service 0a38ef
Packit Service 0a38ef
ANSIBLE_METADATA = {
Packit Service 0a38ef
    'metadata_version': '1.0',
Packit Service 0a38ef
    'supported_by': 'community',
Packit Service 0a38ef
    'status': ['preview'],
Packit Service 0a38ef
}
Packit Service 0a38ef
Packit Service 0a38ef
DOCUMENTATION = '''
Packit Service 0a38ef
---
Packit Service 0a38ef
module: ipaserver_prepare
Packit Service 0a38ef
short description: Prepare IPA server deployment
Packit Service 0a38ef
description: Prepare IPA server deployment
Packit Service 0a38ef
options:
Packit Service 0a38ef
  force:
Packit Service 0a38ef
    description: Installer force parameter
Packit Service 0a38ef
    required: yes
Packit Service 0a38ef
  dm_password:
Packit Service 0a38ef
    description: Directory Manager password
Packit Service 0a38ef
    required: no
Packit Service 0a38ef
  password:
Packit Service 0a38ef
    description: Admin user kerberos password
Packit Service 0a38ef
    required: no
Packit Service 0a38ef
  ip_addresses:
Packit Service 0a38ef
    description: List of Master Server IP Addresses
Packit Service 0a38ef
    required: yes
Packit Service 0a38ef
  domain:
Packit Service 0a38ef
    description: Primary DNS domain of the IPA deployment
Packit Service 0a38ef
    required: no
Packit Service 0a38ef
  realm:
Packit Service 0a38ef
    description: Kerberos realm name of the IPA deployment
Packit Service 0a38ef
    required: no
Packit Service 0a38ef
  hostname:
Packit Service 0a38ef
    description: Fully qualified name of this host
Packit Service 0a38ef
    required: yes
Packit Service 0a38ef
  ca_cert_files:
Packit Service 0a38ef
    description:
Packit Service 0a38ef
      List of files containing CA certificates for the service certificate
Packit Service 0a38ef
      files
Packit Service 0a38ef
    required: yes
Packit Service 0a38ef
  no_host_dns:
Packit Service 0a38ef
    description: Do not use DNS for hostname lookup during installation
Packit Service 0a38ef
    required: yes
Packit Service 0a38ef
  setup_adtrust:
Packit Service 0a38ef
    description: Configure AD trust capability
Packit Service 0a38ef
    required: yes
Packit Service 0a38ef
  setup_kra:
Packit Service 0a38ef
    description: Configure a dogtag KRA
Packit Service 0a38ef
    required: yes
Packit Service 0a38ef
  setup_dns:
Packit Service 0a38ef
    description: Configure bind with our zone
Packit Service 0a38ef
    required: yes
Packit Service 0a38ef
  external_ca:
Packit Service 0a38ef
    description: External ca setting
Packit Service 0a38ef
    required: yes
Packit Service 0a38ef
  external_ca_type:
Packit Service 0a38ef
    description: Type of the external CA
Packit Service 0a38ef
    required: yes
Packit Service 0a38ef
  external_ca_profile:
Packit Service 0a38ef
    description:
Packit Service 0a38ef
      Specify the certificate profile/template to use at the external CA
Packit Service 0a38ef
    required: yes
Packit Service 0a38ef
  external_cert_files:
Packit Service 0a38ef
    description:
Packit Service 0a38ef
      File containing the IPA CA certificate and the external CA certificate
Packit Service 0a38ef
      chain
Packit Service 0a38ef
    required: yes
Packit Service 0a38ef
  subject_base:
Packit Service 0a38ef
    description:
Packit Service 0a38ef
      The certificate subject base (default O=<realm-name>).
Packit Service 0a38ef
      RDNs are in LDAP order (most specific RDN first).
Packit Service 0a38ef
    required: yes
Packit Service 0a38ef
  ca_subject:
Packit Service 0a38ef
    description: The installer ca_subject setting
Packit Service 0a38ef
    required: yes
Packit Service 0a38ef
  allow_zone_overlap:
Packit Service 0a38ef
    description: Create DNS zone even if it already exists
Packit Service 0a38ef
    required: yes
Packit Service 0a38ef
  reverse_zones:
Packit Service 0a38ef
    description: The reverse DNS zones to use
Packit Service 0a38ef
    required: yes
Packit Service 0a38ef
  no_reverse:
Packit Service 0a38ef
    description: Do not create new reverse DNS zone
Packit Service 0a38ef
    required: yes
Packit Service 0a38ef
  auto_reverse:
Packit Service 0a38ef
    description: Create necessary reverse zones
Packit Service 0a38ef
    required: yes
Packit Service 0a38ef
  forwarders:
Packit Service 0a38ef
    description: Add DNS forwarders
Packit Service 0a38ef
    required: yes
Packit Service 0a38ef
  no_forwarders:
Packit Service 0a38ef
    description: Do not add any DNS forwarders, use root servers instead
Packit Service 0a38ef
    required: yes
Packit Service 0a38ef
  auto_forwarders:
Packit Service 0a38ef
    description: Use DNS forwarders configured in /etc/resolv.conf
Packit Service 0a38ef
    required: yes
Packit Service 0a38ef
  forward_policy:
Packit Service 0a38ef
    description: DNS forwarding policy for global forwarders
Packit Service 0a38ef
    required: yes
Packit Service 0a38ef
  no_dnssec_validation:
Packit Service 0a38ef
    description: Disable DNSSEC validation
Packit Service 0a38ef
    required: yes
Packit Service 0a38ef
  enable_compat:
Packit Service 0a38ef
    description: Enable support for trusted domains for old clients
Packit Service 0a38ef
    required: yes
Packit Service 0a38ef
  netbios_name:
Packit Service 0a38ef
    description: NetBIOS name of the IPA domain
Packit Service 0a38ef
    required: yes
Packit Service 0a38ef
  rid_base:
Packit Service 0a38ef
    description: Start value for mapping UIDs and GIDs to RIDs
Packit Service 0a38ef
    required: yes
Packit Service 0a38ef
  secondary_rid_base:
Packit Service 0a38ef
    description:
Packit Service 0a38ef
      Start value of the secondary range for mapping UIDs and GIDs to RIDs
Packit Service 0a38ef
    required: yes
Packit Service 0a38ef
  setup_ca:
Packit Service 0a38ef
    description: Configure a dogtag CA
Packit Service 0a38ef
    required: yes
Packit Service 0a38ef
  _hostname_overridden:
Packit Service 0a38ef
    description: The installer _hostname_overridden setting
Packit Service 0a38ef
    required: yes
Packit Service 0a38ef
author:
Packit Service 0a38ef
    - Thomas Woerner
Packit Service 0a38ef
'''
Packit Service 0a38ef
Packit Service 0a38ef
EXAMPLES = '''
Packit Service 0a38ef
'''
Packit Service 0a38ef
Packit Service 0a38ef
RETURN = '''
Packit Service 0a38ef
'''
Packit Service 0a38ef
Packit Service 0a38ef
import os
Packit Service 0a38ef
Packit Service 0a38ef
from ansible.module_utils.basic import AnsibleModule
Packit Service 0a38ef
from ansible.module_utils.ansible_ipa_server import (
Packit Service 0a38ef
    AnsibleModuleLog, setup_logging, options, sysrestore, paths,
Packit Service 0a38ef
    ansible_module_get_parsed_ip_addresses,
Packit Service 0a38ef
    redirect_stdout, adtrust, api, default_subject_base,
Packit Service 0a38ef
    default_ca_subject_dn, ipautil, installutils, ca, kra, dns,
Packit Service 0a38ef
    get_server_ip_address, no_matching_interface_for_ip_address_warning,
Packit Service 0a38ef
    services, logger, tasks, update_hosts_file, ScriptError
Packit Service 0a38ef
)
Packit Service 0a38ef
Packit Service 0a38ef
Packit Service 0a38ef
def main():
Packit Service 0a38ef
    ansible_module = AnsibleModule(
Packit Service 0a38ef
        argument_spec=dict(
Packit Service 0a38ef
            # basic
Packit Service 0a38ef
            force=dict(required=False, type='bool', default=False),
Packit Service 0a38ef
            dm_password=dict(required=True, no_log=True),
Packit Service 0a38ef
            password=dict(required=True, no_log=True),
Packit Service 0a38ef
            ip_addresses=dict(required=False, type='list', default=[]),
Packit Service 0a38ef
            domain=dict(required=True),
Packit Service 0a38ef
            realm=dict(required=True),
Packit Service 0a38ef
            hostname=dict(required=False),
Packit Service 0a38ef
            ca_cert_files=dict(required=False, type='list', default=[]),
Packit Service 0a38ef
            no_host_dns=dict(required=False, type='bool', default=False),
Packit Service 0a38ef
            # server
Packit Service 0a38ef
            setup_adtrust=dict(required=False, type='bool', default=False),
Packit Service 0a38ef
            setup_kra=dict(required=False, type='bool', default=False),
Packit Service 0a38ef
            setup_dns=dict(required=False, type='bool', default=False),
Packit Service 0a38ef
            # ssl certificate
Packit Service 0a38ef
            # client
Packit Service 0a38ef
            # certificate system
Packit Service 0a38ef
            external_ca=dict(required=False, type='bool'),
Packit Service 0a38ef
            external_ca_type=dict(required=False),
Packit Service 0a38ef
            external_ca_profile=dict(required=False),
Packit Service 0a38ef
            external_cert_files=dict(required=False, type='list', default=[]),
Packit Service 0a38ef
            subject_base=dict(required=False),
Packit Service 0a38ef
            ca_subject=dict(required=False),
Packit Service 0a38ef
            # dns
Packit Service 0a38ef
            allow_zone_overlap=dict(required=False, type='bool',
Packit Service 0a38ef
                                    default=False),
Packit Service 0a38ef
            reverse_zones=dict(required=False, type='list', default=[]),
Packit Service 0a38ef
            no_reverse=dict(required=False, type='bool', default=False),
Packit Service 0a38ef
            auto_reverse=dict(required=False, type='bool', default=False),
Packit Service 0a38ef
            forwarders=dict(required=False, type='list', default=[]),
Packit Service 0a38ef
            no_forwarders=dict(required=False, type='bool', default=False),
Packit Service 0a38ef
            auto_forwarders=dict(required=False, type='bool', default=False),
Packit Service 0a38ef
            forward_policy=dict(default=None, choices=['first', 'only']),
Packit Service 0a38ef
            no_dnssec_validation=dict(required=False, type='bool',
Packit Service 0a38ef
                                      default=False),
Packit Service 0a38ef
            # ad trust
Packit Service 0a38ef
            enable_compat=dict(required=False, type='bool', default=False),
Packit Service 0a38ef
            netbios_name=dict(required=False),
Packit Service 0a38ef
            rid_base=dict(required=False, type='int'),
Packit Service 0a38ef
            secondary_rid_base=dict(required=False, type='int'),
Packit Service 0a38ef
Packit Service 0a38ef
            # additional
Packit Service 0a38ef
            setup_ca=dict(required=False, type='bool', default=False),
Packit Service 0a38ef
            _hostname_overridden=dict(required=False, type='bool',
Packit Service 0a38ef
                                      default=False),
Packit Service 0a38ef
        ),
Packit Service 0a38ef
        supports_check_mode=True,
Packit Service 0a38ef
    )
Packit Service 0a38ef
Packit Service 0a38ef
    ansible_module._ansible_debug = True
Packit Service 0a38ef
    setup_logging()
Packit Service 0a38ef
    ansible_log = AnsibleModuleLog(ansible_module)
Packit Service 0a38ef
Packit Service 0a38ef
    # initialize return values for flake ############################
Packit Service 0a38ef
Packit Service 0a38ef
    # These are set by ca.install_check
Packit Service 0a38ef
    options._subject_base = None
Packit Service 0a38ef
    options._ca_subject = None
Packit Service 0a38ef
Packit Service 0a38ef
    # set values ####################################################
Packit Service 0a38ef
Packit Service 0a38ef
    options.force = ansible_module.params.get('force')
Packit Service 0a38ef
    options.dm_password = ansible_module.params.get('dm_password')
Packit Service 0a38ef
    options.admin_password = ansible_module.params.get('password')
Packit Service 0a38ef
    options.ip_addresses = ansible_module_get_parsed_ip_addresses(
Packit Service 0a38ef
        ansible_module)
Packit Service 0a38ef
    options.domain_name = ansible_module.params.get('domain')
Packit Service 0a38ef
    options.realm_name = ansible_module.params.get('realm')
Packit Service 0a38ef
    options.host_name = ansible_module.params.get('hostname')
Packit Service 0a38ef
    options.ca_cert_files = ansible_module.params.get('ca_cert_files')
Packit Service 0a38ef
    options.no_host_dns = ansible_module.params.get('no_host_dns')
Packit Service 0a38ef
    # server
Packit Service 0a38ef
    options.setup_adtrust = ansible_module.params.get('setup_adtrust')
Packit Service 0a38ef
    options.setup_kra = ansible_module.params.get('setup_kra')
Packit Service 0a38ef
    options.setup_dns = ansible_module.params.get('setup_dns')
Packit Service 0a38ef
    # options.no_pkinit = ansible_module.params.get('no_pkinit')
Packit Service 0a38ef
    # ssl certificate
Packit Service 0a38ef
    # options.dirsrv_cert_files = ansible_module.params.get(
Packit Service 0a38ef
    #     'dirsrv_cert_files')
Packit Service 0a38ef
    # client
Packit Service 0a38ef
    # options.no_ntp = ansible_module.params.get('no_ntp')
Packit Service 0a38ef
    # certificate system
Packit Service 0a38ef
    options.external_ca = ansible_module.params.get('external_ca')
Packit Service 0a38ef
    options.external_ca_type = ansible_module.params.get('external_ca_type')
Packit Service 0a38ef
    options.external_ca_profile = ansible_module.params.get(
Packit Service 0a38ef
        'external_ca_profile')
Packit Service 0a38ef
    options.external_cert_files = ansible_module.params.get(
Packit Service 0a38ef
        'external_cert_files')
Packit Service 0a38ef
    options.subject_base = ansible_module.params.get('subject_base')
Packit Service 0a38ef
    options.ca_subject = ansible_module.params.get('ca_subject')
Packit Service 0a38ef
    # dns
Packit Service 0a38ef
    options.allow_zone_overlap = ansible_module.params.get(
Packit Service 0a38ef
        'allow_zone_overlap')
Packit Service 0a38ef
    options.reverse_zones = ansible_module.params.get('reverse_zones')
Packit Service 0a38ef
    options.no_reverse = ansible_module.params.get('no_reverse')
Packit Service 0a38ef
    options.auto_reverse = ansible_module.params.get('auto_reverse')
Packit Service 0a38ef
    options.forwarders = ansible_module.params.get('forwarders')
Packit Service 0a38ef
    options.no_forwarders = ansible_module.params.get('no_forwarders')
Packit Service 0a38ef
    options.auto_forwarders = ansible_module.params.get('auto_forwarders')
Packit Service 0a38ef
    options.forward_policy = ansible_module.params.get('forward_policy')
Packit Service 0a38ef
    options.no_dnssec_validation = ansible_module.params.get(
Packit Service 0a38ef
        'no_dnssec_validation')
Packit Service 0a38ef
    # ad trust
Packit Service 0a38ef
    options.enable_compat = ansible_module.params.get('enable_compat')
Packit Service 0a38ef
    options.netbios_name = ansible_module.params.get('netbios_name')
Packit Service 0a38ef
    # additional
Packit Service 0a38ef
    options.setup_ca = ansible_module.params.get('setup_ca')
Packit Service 0a38ef
    options._host_name_overridden = ansible_module.params.get(
Packit Service 0a38ef
        '_hostname_overridden')
Packit Service 0a38ef
    options.kasp_db_file = None
Packit Service 0a38ef
Packit Service 0a38ef
    # init ##################################################################
Packit Service 0a38ef
Packit Service 0a38ef
    fstore = sysrestore.FileStore(paths.SYSRESTORE)
Packit Service 0a38ef
    sstore = sysrestore.StateFile(paths.SYSRESTORE)
Packit Service 0a38ef
Packit Service 0a38ef
    # subject_base
Packit Service 0a38ef
    if not options.subject_base:
Packit Service 0a38ef
        options.subject_base = str(default_subject_base(options.realm_name))
Packit Service 0a38ef
        # set options.subject for old ipa releases
Packit Service 0a38ef
        options.subject = options.subject_base
Packit Service 0a38ef
Packit Service 0a38ef
    if not options.ca_subject:
Packit Service 0a38ef
        options.ca_subject = str(default_ca_subject_dn(options.subject_base))
Packit Service 0a38ef
Packit Service 0a38ef
    try:
Packit Service 0a38ef
Packit Service 0a38ef
        # Configuration for ipalib, we will bootstrap and finalize later, after
Packit Service 0a38ef
        # we are sure we have the configuration file ready.
Packit Service 0a38ef
        cfg = dict(
Packit Service 0a38ef
            context='installer',
Packit Service 0a38ef
            confdir=paths.ETC_IPA,
Packit Service 0a38ef
            in_server=True,
Packit Service 0a38ef
            # make sure host name specified by user is used instead of default
Packit Service 0a38ef
            host=options.host_name,
Packit Service 0a38ef
        )
Packit Service 0a38ef
        if options.setup_ca:
Packit Service 0a38ef
            # we have an IPA-integrated CA
Packit Service 0a38ef
            cfg['ca_host'] = options.host_name
Packit Service 0a38ef
Packit Service 0a38ef
        # Create the management framework config file and finalize api
Packit Service 0a38ef
        target_fname = paths.IPA_DEFAULT_CONF
Packit Service 0a38ef
        fd = open(target_fname, "w")
Packit Service 0a38ef
        fd.write("[global]\n")
Packit Service 0a38ef
        fd.write("host=%s\n" % options.host_name)
Packit Service 0a38ef
        fd.write("basedn=%s\n" % ipautil.realm_to_suffix(options.realm_name))
Packit Service 0a38ef
        fd.write("realm=%s\n" % options.realm_name)
Packit Service 0a38ef
        fd.write("domain=%s\n" % options.domain_name)
Packit Service 0a38ef
        fd.write("xmlrpc_uri=https://%s/ipa/xml\n" %
Packit Service 0a38ef
                 ipautil.format_netloc(options.host_name))
Packit Service 0a38ef
        fd.write("ldap_uri=ldapi://%%2fvar%%2frun%%2fslapd-%s.socket\n" %
Packit Service 0a38ef
                 installutils.realm_to_serverid(options.realm_name))
Packit Service 0a38ef
        if options.setup_ca:
Packit Service 0a38ef
            fd.write("enable_ra=True\n")
Packit Service 0a38ef
            fd.write("ra_plugin=dogtag\n")
Packit Service 0a38ef
            fd.write("dogtag_version=10\n")
Packit Service 0a38ef
        else:
Packit Service 0a38ef
            fd.write("enable_ra=False\n")
Packit Service 0a38ef
            fd.write("ra_plugin=none\n")
Packit Service 0a38ef
        fd.write("mode=production\n")
Packit Service 0a38ef
        fd.close()
Packit Service 0a38ef
Packit Service 0a38ef
        # Must be readable for everyone
Packit Service 0a38ef
        os.chmod(target_fname, 0o644)
Packit Service 0a38ef
Packit Service 0a38ef
        api.bootstrap(**cfg)
Packit Service 0a38ef
        api.finalize()
Packit Service 0a38ef
Packit Service 0a38ef
        if options.setup_ca:
Packit Service 0a38ef
            with redirect_stdout(ansible_log):
Packit Service 0a38ef
                ca.install_check(False, None, options)
Packit Service 0a38ef
        if options.setup_kra:
Packit Service 0a38ef
            with redirect_stdout(ansible_log):
Packit Service 0a38ef
                kra.install_check(api, None, options)
Packit Service 0a38ef
Packit Service 0a38ef
        if options.setup_dns:
Packit Service 0a38ef
            with redirect_stdout(ansible_log):
Packit Service 0a38ef
                dns.install_check(False, api, False, options,
Packit Service 0a38ef
                                  options.host_name)
Packit Service 0a38ef
            ip_addresses = dns.ip_addresses
Packit Service 0a38ef
        else:
Packit Service 0a38ef
            ip_addresses = get_server_ip_address(options.host_name,
Packit Service 0a38ef
                                                 not options.interactive,
Packit Service 0a38ef
                                                 False,
Packit Service 0a38ef
                                                 options.ip_addresses)
Packit Service 0a38ef
Packit Service 0a38ef
            # check addresses here, dns module is doing own check
Packit Service 0a38ef
            no_matching_interface_for_ip_address_warning(ip_addresses)
Packit Service 0a38ef
        options.ip_addresses = ip_addresses
Packit Service 0a38ef
        options.reverse_zones = dns.reverse_zones
Packit Service 0a38ef
Packit Service 0a38ef
        instance_name = "-".join(options.realm_name.split("."))
Packit Service 0a38ef
        dirsrv = services.knownservices.dirsrv
Packit Service 0a38ef
        if options.external_cert_files \
Packit Service 0a38ef
           and dirsrv.is_installed(instance_name) \
Packit Service 0a38ef
           and not dirsrv.is_running(instance_name):
Packit Service 0a38ef
            logger.debug('Starting Directory Server')
Packit Service 0a38ef
            services.knownservices.dirsrv.start(instance_name)
Packit Service 0a38ef
Packit Service 0a38ef
        if options.setup_adtrust:
Packit Service 0a38ef
            with redirect_stdout(ansible_log):
Packit Service 0a38ef
                adtrust.install_check(False, options, api)
Packit Service 0a38ef
Packit Service 0a38ef
        _update_hosts_file = False
Packit Service 0a38ef
        # options needs to update hosts file when DNS subsystem will be
Packit Service 0a38ef
        # installed or custom addresses are used
Packit Service 0a38ef
        if options.ip_addresses or options.setup_dns:
Packit Service 0a38ef
            _update_hosts_file = True
Packit Service 0a38ef
Packit Service 0a38ef
        if options._host_name_overridden:
Packit Service 0a38ef
            tasks.backup_hostname(fstore, sstore)
Packit Service 0a38ef
            tasks.set_hostname(options.host_name)
Packit Service 0a38ef
Packit Service 0a38ef
        if _update_hosts_file:
Packit Service 0a38ef
            update_hosts_file(ip_addresses, options.host_name, fstore)
Packit Service 0a38ef
Packit Service 0a38ef
        if hasattr(tasks, "configure_pkcs11_modules"):
Packit Service 0a38ef
            if tasks.configure_pkcs11_modules(fstore):
Packit Service 0a38ef
                ansible_log.info("Disabled p11-kit-proxy")
Packit Service 0a38ef
Packit Service 0a38ef
    except (RuntimeError, ValueError, ScriptError,
Packit Service 0a38ef
            ipautil.CalledProcessError) as e:
Packit Service 0a38ef
        ansible_module.fail_json(msg=str(e))
Packit Service 0a38ef
Packit Service 0a38ef
    ansible_module.exit_json(
Packit Service 0a38ef
        changed=True,
Packit Service 0a38ef
        # basic
Packit Service 0a38ef
        ip_addresses=[str(ip) for ip in ip_addresses],
Packit Service 0a38ef
        # certificate system
Packit Service 0a38ef
        subject_base=options.subject_base,
Packit Service 0a38ef
        _subject_base=options._subject_base,
Packit Service 0a38ef
        ca_subject=options.ca_subject,
Packit Service 0a38ef
        _ca_subject=options._ca_subject,
Packit Service 0a38ef
        # dns
Packit Service 0a38ef
        reverse_zones=options.reverse_zones,
Packit Service 0a38ef
        forward_policy=options.forward_policy,
Packit Service 0a38ef
        forwarders=options.forwarders,
Packit Service 0a38ef
        no_dnssec_validation=options.no_dnssec_validation,
Packit Service 0a38ef
        # additional
Packit Service 0a38ef
        dns_ip_addresses=[str(ip) for ip
Packit Service 0a38ef
                          in dns.ip_addresses],
Packit Service 0a38ef
        dns_reverse_zones=dns.reverse_zones,
Packit Service 0a38ef
        adtrust_netbios_name=adtrust.netbios_name,
Packit Service 0a38ef
        adtrust_reset_netbios_name=adtrust.reset_netbios_name)
Packit Service 0a38ef
Packit Service 0a38ef
Packit Service 0a38ef
if __name__ == '__main__':
Packit Service 0a38ef
    main()