Skip to content
Snippets Groups Projects
Commit e65ba14e authored by Thomas Woerner's avatar Thomas Woerner
Browse files

roles/sssd: Fixed several small defects, added libselinux-python to sssd_packages

parent a484e5b2
Branches
Tags
No related merge requests found
--- ---
sssd_conf: /etc/sssd/sssd.conf sssd_conf: /etc/sssd/sssd.conf
sssd_packages: sssd sssd_packages: sssd, libselinux-python
sssd_on_master: "false"
sssd_domains: sssd_domains:
sssd_id_provider: sssd_id_provider:
sssd_auth_provider: sssd_auth_provider:
sssd_access_provider: sssd_access_provider:
sssd_chpass_provider: sssd_chpass_provider:
sssd_cache_credentials: False sssd_cache_credentials: False
sssd_krb5_store_password_if_offline: False sssd_krb5_offline_passwords: False
sssd_ipa_servers: sssd_ipa_servers:
sssd_services: sssd_services:
...@@ -13,14 +13,15 @@ ...@@ -13,14 +13,15 @@
- name: Template sssd.conf - name: Template sssd.conf
template: template:
src: sssd.conf.j2 src: sssd.conf.j2
dest: /etc/sssd/sssd.conf dest: "{{ sssd_conf }}"
backup: yes backup: no
owner: root owner: root
group: root group: root
mode: 0600 mode: 0600
force: yes
- name: Enable and start sssd #- name: Enable and start sssd
service: # service:
name: sssd # name: sssd
state: restarted # state: restarted
enabled: yes # enabled: yes
[domain/{{ sssd_domains }}] [domain/{{ sssd_domains }}]
cache_credentials = {{ sssd_cache_credentials }} cache_credentials = {{ sssd_cache_credentials }}
krb5_store_password_if_offline = {{ sssd_krb5_store_password_if_offline }} krb5_store_password_if_offline = {{ sssd_krb5_offline_passwords }}
ipa_domain = {{ sssd_domains }} ipa_domain = {{ sssd_domains }}
id_provider = {{ sssd_id_provider }} id_provider = {{ sssd_id_provider }}
auth_provider = {{ sssd_auth_provider }} auth_provider = {{ sssd_auth_provider }}
access_provider = {{ sssd_access_provider }} access_provider = {{ sssd_access_provider }}
ipa_hostname = {{ ansible_host }} ipa_hostname = {{ ansible_host }}
chpass_provider = {{ sssd_chpass_provider }} chpass_provider = {{ sssd_chpass_provider }}
{% if sssd_on_master %} {% if sssd_on_master | bool %}
ipa_server = {{ sssd_ipa_servers | join(", ") }} ipa_server = {{ sssd_ipa_servers | join(", ") }}
ipa_server_mode = True ipa_server_mode = True
{% else %} {% else %}
...@@ -18,7 +18,7 @@ ipa_server = _srv_, {{ sssd_ipa_servers | join(", ")}} ...@@ -18,7 +18,7 @@ ipa_server = _srv_, {{ sssd_ipa_servers | join(", ")}}
{% endif %} {% endif %}
ldap_tls_cacert = /etc/ipa/ca.crt ldap_tls_cacert = /etc/ipa/ca.crt
{% if sssd_on_master %} {% if sssd_on_master | bool %}
{% set sssd_services = sssd_services + ", ifp" %} {% set sssd_services = sssd_services + ", ifp" %}
{% endif %} {% endif %}
[sssd] [sssd]
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment