Skip to content
  1. Dec 02, 2019
    • Rafael Guterres Jeffman's avatar
      Merge pull request #155 from t-woerner/ipahost-extension · 1dd2b54e
      Rafael Guterres Jeffman authored
      ipahost: Extension to be able handle several hosts and all settings
      v0.1.7
      1dd2b54e
    • Thomas Woerner's avatar
      Merge pull request #157 from t-woerner/centos8 · a62e355f
      Thomas Woerner authored
      ipa[server,replica,client]: Add support for CentOS-8
      a62e355f
    • Thomas Woerner's avatar
      Merge pull request #156 from t-woerner/env_krb5ccname · fbe28804
      Thomas Woerner authored
      ansible_freeipa_module: Better support for KRB5CCNAME environment variable
      fbe28804
    • Thomas Woerner's avatar
      ipahost: Extension to be able handle several hosts and all settings · 94b1f25b
      Thomas Woerner authored
      The ipahost management module was not able to add several hosts at once.
      Addtionally there have been settings missing.
      
      ansible_freeipa_module has been extended to provide two additional functions
      that are needed to simplify the extension of the ipahost module:
      
          gen_add_del_lists(user_list, res_list)
          encode_certificate(cert)
      
      gen_add_del_lists will generate the lists for the addition and removal of
      members using the provided user and ipa settings.
      
      encode_certificate will encode a certificate using base64 with also taking
      FreeIPA and Python versions into account.
      
      The missing settings in ipahost have been:
      
          certificate
          managedby_host
          principal
          create_keytab_[user,group,host,hostgroup]
          retrieve_keytab_[user,group,host,hostgroup]
          sshpubkey
          userclass
          auth_ind
          requires_pre_auth
          ok_as_delegate
          ok_to_auth_as_delegate
      
      The README-host.md file has been updated to provide information about the
      new settings and also the members. Also examples for the new things have
      been added.
      
      New example playbooks have been added:
      
          playbooks/host/add-host.yml
          playbooks/host/host-member-allow_create_keytab-absent.yml
          playbooks/host/host-member-allow_create_keytab-present.yml
          playbooks/host/host-member-allow_retrieve_keytab-absent.yml
          playbooks/host/host-member-allow_retrieve_keytab-present.yml
          playbooks/host/host-member-certificate-absent.yml
          playbooks/host/host-member-certificate-present.yml
          playbooks/host/host-member-managedby_host-absent.yml
          playbooks/host/host-member-managedby_host-present.yml
          playbooks/host/host-member-principal-absent.yml
          playbooks/host/host-member-principal-present.yml
          playbooks/host/host-present-with-allow_create_keytab.yml
          playbooks/host/host-present-with-allow_retrieve_keytab.yml
          playbooks/host/host-present-with-certificate.yml
          playbooks/host/host-present-with-managedby_host.yml
          playbooks/host/host-present-with-principal.yml
          playbooks/host/host-present-with-randompassword.yml
          playbooks/host/host-present.yml
          playbooks/host/hosts-member-certificate-absent.yml
          playbooks/host/hosts-member-certificate-present.yml
          playbooks/host/hosts-member-managedby_host-absent.yml
          playbooks/host/hosts-member-managedby_host-present.yml
          playbooks/host/hosts-member-principal-absent.yml
          playbooks/host/hosts-member-principal-present.yml
          playbooks/host/hosts-present-with-certificate.yml
          playbooks/host/hosts-present-with-managedby_host.yml
          playbooks/host/hosts-present-with-randompasswords.yml
      
      New tests have been added for the module:
      
          tests/host/certificate/cert1.der
          tests/host/certificate/cert1.pem
          tests/host/certificate/cert2.der
          tests/host/certificate/cert2.pem
          tests/host/certificate/cert3.der
          tests/host/certificate/cert3.pem
          tests/host/certificate/private1.key
          tests/host/certificate/private2.key
          tests/host/certificate/private3.key
          tests/host/certificate/test_host_certificate.yml
          tests/host/certificate/test_hosts_certificate.yml
          tests/host/test_host.yml
          tests/host/test_host_allow_create_keytab.yml
          tests/host/test_host_allow_retrieve_keytab.yml
          tests/host/test_host_managedby_host.yml
          tests/host/test_host_principal.yml
          tests/host/test_host_random.yml
          tests/host/test_hosts.yml
          tests/host/test_hosts_managedby_host.yml
          tests/host/test_hosts_principal.yml
      94b1f25b
    • Thomas Woerner's avatar
      ipa[server,replica,client]: Add support for CentOS-8 · 5d7f2788
      Thomas Woerner authored
      The files for RHEL-8 (RedHat-8.yml) have simply been linked to CentOS-8.yml
      for the ipaserver, ipareplica and ipaclient roles.
      
      Fixes issue #121 (roles/*/vars needs CentOS-8.yml files)
      5d7f2788
    • Thomas Woerner's avatar
      ansible_freeipa_module: Better support for KRB5CCNAME environment variable · e77f4daa
      Thomas Woerner authored
      The use of gssapi.creds.Credentials is not good if krb5 ticket forwarding
      is used. It will fail. gssapi.Credentials with usage and store is the proper
      way to do this.
      e77f4daa
  2. Nov 29, 2019
  3. Nov 21, 2019
  4. Nov 20, 2019
    • Thomas Woerner's avatar
      ipahost: Return generated random password · c36cb954
      Thomas Woerner authored
      The random password is only returned if random is yes and the host did
      not exist or update_password is yes.
      
      If only one host is handled by the module, the returned dict is containing
      this dict:
      
        { "randompassword": "<the host random password>" }
      
      If several hosts are handled by the module (future feature):
      
        { "<host>": { "randompassword": "<the host random password>" } }
      
      Fixes issue #134 (ipahost does not return the random password)
      c36cb954
    • Thomas Woerner's avatar
      ipauser: Return generated random password · b5f20922
      Thomas Woerner authored
      The random password is only returned if random is yes and user did not exist
      or update_password is yes.
      
      If only one user is handled by the module, the returned dict is containing
      this dict:
      
        { "randompassword": "<the user random password>" }
      
      If several users are handled by the module:
      
        { "<user>": { "randompassword": "<the user random password>" } }
      
      This is related to issue #134 (ipahost does not return the random password)
      b5f20922
    • Thomas Woerner's avatar
      ipaclient: Fix misspelled sssd options · 6ad82e6b
      Thomas Woerner authored
      The sssd options in the ipaclient role missed a 's' in the role. The readme
      of the role used the proper names with 3 's'. The names in the role have
      been fixed and if the old setting are used, they will be used in the first
      place.
      
      Also utils/ansible-ipa-client-install has been adaped to use the proper
      option names now.
      
      This fixes issue #145 (The ipaclient role misspells sssd)
      6ad82e6b
  5. Nov 19, 2019
  6. Nov 15, 2019
  7. Nov 12, 2019
  8. Nov 09, 2019
  9. Nov 08, 2019
  10. Nov 07, 2019
    • Rafael Guterres Jeffman's avatar
      Merge pull request #142 from t-woerner/ipahostgroup_tests · b06ef3fc
      Rafael Guterres Jeffman authored
      ipahostgroup: Fix changed flag, support IPA 4.6 on RHEL-7, new test cases
      b06ef3fc
    • Thomas Woerner's avatar
      Merge pull request #141 from rjeffman/sudorule · dba8c204
      Thomas Woerner authored
      New sudorule (Sudo Rule) management module
      dba8c204
    • Rafael Guterres Jeffman's avatar
      New sudorule (Sudo Rule) management module · 2f621608
      Rafael Guterres Jeffman authored
      There is a new sudorule (Sudo Rule) management module placed in the plugins
      folder:
      
        plugins/modules/ipasudorule.py
      
      The sudorule module allows to ensure presence and absence of Sudo Rules.
      
      Here is the documentation for the module:
      
        README-sudorule.md
      
      New example playbooks have been added:
      
          playbooks/sudorule/ensure-sudorule-host-member-is-absent.yml
          playbooks/sudorule/ensure-sudorule-host-member-is-present.yml
          playbooks/sudorule/ensure-sudorule-hostgroup-member-is-absent.yml
          playbooks/sudorule/ensure-sudorule-hostgroup-member-is-present.yml
          playbooks/sudorule/ensure-sudorule-is-absent.yml
          playbooks/sudorule/ensure-sudorule-is-disabled.yml
          playbooks/sudorule/ensure-sudorule-is-enabled.yml
          playbooks/sudorule/ensure-sudorule-is-present.yml
          playbooks/sudorule/ensure-sudorule-sudocmd-is-absent.yml
          playbooks/sudorule/ensure-sudorule-sudocmd-is-present.yml
      
      New tests added for the module:
      
        tests/hbacrule/test_sudorule.yml
      2f621608
    • Thomas Woerner's avatar
      Merge pull request #102 from Uumas/preotp · 209e4715
      Thomas Woerner authored
      Added support for predefining client OTP using ipaclient_otp
      209e4715
    • Thomas Woerner's avatar
      ipahostgroup: Fix changed flag, support IPA 4.6 on RHEL-7, new test cases · 0e64c80c
      Thomas Woerner authored
      The changed flag returned by ipahostgroup calls have not always been correct.
      The use of the module with IPA version 4.6 on RHEL-7 resulted in encoding
      errors. All this has been fixed.
      
      Addtitionally new test cases have been added to make sure that the issues
      are solved.
      0e64c80c
  11. Nov 05, 2019
    • Thomas Woerner's avatar
      Merge pull request #140 from t-woerner/ipahbacrule · 0c30020a
      Thomas Woerner authored
      New hbacrule (HBAC Rule) management module
      0c30020a
    • Thomas Woerner's avatar
      New hbacrule (HBAC Rule) management module · d36d25d6
      Thomas Woerner authored
      There is a new hbacrule (HBAC Rule) management module placed in the plugins
      folder:
      
        plugins/modules/ipahbacrule.py
      
      The hbacrule module allows to ensure presence and absence of HBAC Rules.
      
      Here is the documentation for the module:
      
        README-hbacrule.md
      
      New example playbooks have been added:
      
        playbooks/hbacrule/ensure-hbarule-allhosts-absent.yml
        playbooks/hbacrule/ensure-hbarule-allhosts-disabled.yml
        playbooks/hbacrule/ensure-hbarule-allhosts-enabled.yml
        playbooks/hbacrule/ensure-hbarule-allhosts-present.yml
        playbooks/hbacrule/ensure-hbarule-allhosts-server-member-absent.yml
        playbooks/hbacrule/ensure-hbarule-allhosts-server-member-present.yml
      
      New tests added for the module:
      
        tests/hbacrule/test_hbacrule.yml
      d36d25d6
  12. Oct 31, 2019
  13. Oct 30, 2019
    • Thomas Woerner's avatar
      ipagroup: Fix changed flag, new test cases · ff9ce6b8
      Thomas Woerner authored
      The changed flag returned by ipagroup calls have not been correct. This
      change fixes this. Addtitionally new test cases have been added to make
      sure that the changed flag is correct.
      ff9ce6b8
    • Thomas Woerner's avatar
      ipagroup: Properly support IPA versions 4.6 and RHEL-7 · a4a15def
      Thomas Woerner authored
      group_add_member is only supporting services in more recent IPA versions.
      This is 4.7+. Code has been added to detect if services are supported by
      the used IPA version and used in the parameters of the module. In this case
      an error is printed.
      
      Additionally all parameters will be get from the module using
      module_params_get provided by ansible_freeipa_module. Additional to_text
      conversions have been removed as they are not needed anymore with this.
      a4a15def
  14. Oct 25, 2019
    • Varun Mylaraiah's avatar
      Merge pull request #136 from t-woerner/ipahbacsvcgroup · 6e6e193a
      Varun Mylaraiah authored
      New hbacsvcgroup (HBAC Service Group) management module
      6e6e193a
    • Thomas Woerner's avatar
      New hbacsvcgroup (HBAC Service Group) management module · 4b9860e1
      Thomas Woerner authored
      There is a new hbacsvcgroup (HBAC Service Group) management module placed
      in the plugins folder:
      
        plugins/modules/ipahbacsvcgroup.py
      
      The hbacsvc module allows to ensure presence and absence of HBAC Service
      Groups.
      
      Here is the documentation for the module:
      
        README-hbacsvcgroup.md
      
      New example playbooks have been added:
      
        playbooks/hbacsvcgroup/ensure-hbacsvcgroup-absent.yml
        playbooks/hbacsvcgroup/ensure-hbacsvcgroup-member-absent.yml
        playbooks/hbacsvcgroup/ensure-hbacsvcgroup-member-present.yml
        playbooks/hbacsvcgroup/ensure-hbacsvcgroup-present.yml
      
      New tests added for the module:
      
         tests/hbacsvcgroup/test_hbacsvcgroup.yml
      4b9860e1
    • Thomas Woerner's avatar
      Update README.md · 5a462ece
      Thomas Woerner authored
      Updated requirements for python3-gssapi
      5a462ece
  15. Oct 24, 2019
    • Varun Mylaraiah's avatar
      Merge pull request #135 from t-woerner/ipahbacsvc · a9cf33f3
      Varun Mylaraiah authored
      New hbacsvc (HBAC Service) management module
      a9cf33f3
    • Thomas Woerner's avatar
      New hbacsvc (HBAC Service) management module · 42eaadfb
      Thomas Woerner authored
      There is a new hbacsvc (HBAC Service) management module placed in the plugins
      folder:
      
        plugins/modules/ipahbacsvc.py
      
      The hbacsvc module allows to ensure presence and absence of HBAC Services.
      
      Here is the documentation for the module:
      
        README-hbacsvc.md
      
      New example playbooks have been added:
      
        playbooks/hbacsvc/ensure-hbacsvc-absent.yml
        playbooks/hbacsvc/ensure-hbacsvc-present.yml
      
      New tests added for pwpolicy:
      
        tests/hbacsvc/test_hbacsvc.yml
      42eaadfb