Skip to content
  1. Oct 22, 2019
    • Thomas Woerner's avatar
      New pwpolicy management module · b3fd3a51
      Thomas Woerner authored
      There is a new pwpolicy management module placed in the plugins folder:
      
        plugins/modules/ipapwpolicy.py
      
      The pwpolicy module allows to ensure presence and absence of pwpolicies for
      groups.
      
      Here is the documentation for the module:
      
        README-pwpolicy.md
      
      New example playbooks have been added:
      
        playbooks/pwpolicy/pwpolicy_absent.yml
        playbooks/pwpolicy/pwpolicy_present.yml
      
      New tests added for pwpolicy:
      
        tests/pwpolicy/test_pwpolicy.yml
      b3fd3a51
    • Thomas Woerner's avatar
      ansible_freeipa_module: Convert int to string in compare_args_ipa · 5d435c37
      Thomas Woerner authored
      With IPA 4.5 integers for examle in pwpolicy_find are returned as
      integer values. The internally generated value will be converted from
      integer to string (using to_text) if the value from find call result
      is a string (or unicode for Python2).
      5d435c37
    • Thomas Woerner's avatar
      Merge pull request #133 from rjeffman/sudocmdgrp · ccc001ad
      Thomas Woerner authored
      New sudocmdgroup management module.
      ccc001ad
    • Rafael Guterres Jeffman's avatar
      New sudocmdgroup management module. · fce3935d
      Rafael Guterres Jeffman authored
      
      
      There is a new sudocmdgroup management module placed in the plugins folder:
      
      plugins/modules/ipasudocmdgroup.py
      
      The sudocmdgroup module allows to add or remove sudo command groups..
      
      The sudocmdgroup module is as compatible as possible to the Ansible upstream
      ipa_sudocmdgroup module, and additionally offers to ensure member presence
      and absence.
      
      Here is the documentation for the module:
      
        README-sudocmdgroup.md
      
      New example playbooks have been added:
      
        playbooks/sudocmd/ensure-sudocmdgroup-is-absent.yml
        playbooks/sudocmd/ensure-sudocmdgroup-is-present.yml
        playbooks/sudocmd/ensure-sudocmd-is-absent-in-sudocmdgroup.yml
        playbooks/sudocmd/ensure-sudocmd-is-present-in-sudocmdgroup.yml
      
      A test playbook is provided in:
      
        tests/sudocmdgroup/test_sudocmdgroup.yml
      
      Signed-off-by: default avatarRafael Guterres Jeffman <rjeffman@redhat.com>
      fce3935d
    • Thomas Woerner's avatar
      Merge pull request #130 from rjeffman/sudocmd · 12c42273
      Thomas Woerner authored
      New sudocmd management module.
      12c42273
    • Rafael Guterres Jeffman's avatar
      New sudocmd management module. · 5d962c06
      Rafael Guterres Jeffman authored
      
      
      There is a new sudocmd management module placed in the plugins folder:
      
        plugins/modules/ipasudocmd.py
      
      The sudocmd module allows to add or remove sudo commands.
      
      The sudocmd module is as compatible as possible to the Ansible upstream
      ipa_sudocmd module.
      
      Here is the documentation for the module:
      
        README-sudocmd.md
      
      New example playbooks have been added:
      
        playbooks/sudocmd/ensure-sudocmd-is-absent.yml
        playbooks/sudocmd/ensure-sudocmd-is-present.yml
      
      Signed-off-by: default avatarRafael Guterres Jeffman <rjeffman@redhat.com>
      5d962c06
    • Thomas Woerner's avatar
      Merge pull request #131 from t-woerner/ipauser-rework · bf664f68
      Thomas Woerner authored
      Ipauser rework
      bf664f68
  2. Oct 21, 2019
    • Thomas Woerner's avatar
      ipauser: User module extension · 40713e71
      Thomas Woerner authored
      The ipauser module now supports all user settings and additionally to ensure
      the presence of several users with the new users setting. The users setting
      can also be used with other states, but it has to be limited to only contain
      the name of the users.
      
      There updated user management module is placed in the plugins folder:
      
        plugins/modules/ipauser.py
      
      The user module now additionally allows to handle these user settings:
      
        initials
        principalexpiration
        random
        city
        userstate
        postalcode
        mobile
        pager
        fax
        orgunit
        manager
        carlicense
        sshpubkey
        userauthtype
        userclass
        radius
        radiususer
        departmentnumber
        employeenumber
        employeetype
        preferredlanguage
        certificate
        certmapdata
        noprivate
        nomembers
      
      Here is the updated documentation for the module:
      
        README-user.md
      
      New example playbooks have been added:
      
        playbooks/user/user_certificate_absent.yml
        playbooks/user/user_certificate_present.yml
        playbooks/user/user_present.yml
        playbooks/user/users_absent.yml
        playbooks/user/users_certificate_absent.yml
        playbooks/user/users_certificate_present.yml
        playbooks/user/users_present.yml
        plugins/modules/ipauser.py
      
      New tests added for ipauser:
      
        tests/user/certificate/cert1.der
        tests/user/certificate/cert1.pem
        tests/user/certificate/cert2.der
        tests/user/certificate/cert2.pem
        tests/user/certificate/cert3.der
        tests/user/certificate/cert3.pem
        tests/user/certificate/private1.key
        tests/user/certificate/private2.key
        tests/user/certificate/private3.key
        tests/user/certificate/test_user_certificate.yml
        tests/user/certificate/test_users_certificate.yml
        tests/user/certmapdata/test_user_certmapdata.yml
        tests/user/certmapdata/test_user_certmapdata_issuer_subject.yml
        tests/user/certmapdata/test_users_certmapdata.yml
        tests/user/test_user.yml
        tests/user/test_users.yml
        tests/user/test_users_absent.yml
        tests/user/test_users_invalid_cert.yml
        tests/user/test_users_present.yml
        tests/user/test_users_present_slice.yml
        tests/user/users_absent.json
        tests/user/users_absent.sh
        tests/user/users_present.json
        tests/user/users_present.sh
      40713e71
    • Thomas Woerner's avatar
      ansible_freeipa_module: New function api_get_realm · 1428143d
      Thomas Woerner authored
      The function api_get_realm is returning the realm of a connected FreeIPA
      api. This is needed for proper principal checks in the extended ipauser
      module that supports principals now.
      1428143d
    • Thomas Woerner's avatar
      ansible_freeipa_module: Convert tuple to list in compare_args_ipa · 89328422
      Thomas Woerner authored
      The conversion is needed because older FreeIPA versions are returning
      tuples in some cases instead of lists. To be able to compare them the
      conversion to a list is needed.
      89328422
  3. Oct 18, 2019
  4. Oct 09, 2019
  5. Oct 07, 2019
  6. Oct 02, 2019
  7. Oct 01, 2019
    • Thomas Woerner's avatar
      ipagroup: Rework to use same mechanisms as ipahostgroup module · c5e0b1b4
      Thomas Woerner authored
      The ipagroup module was not using the failed and completed items in the dict
      that is returned with api_command. But it was creating add and remove
      lists for users, groups and services. This is not needed if the failures
      "already a member" and "not a member" in the result failures are ignored.
      Only other failures are reported.
      c5e0b1b4
  8. Sep 27, 2019
    • Varun Mylaraiah's avatar
      Merge pull request #122 from t-woerner/external-ca-tests · 00066d2c
      Varun Mylaraiah authored
      tests/external-signed-ca tests: Fix external-ca.sh to use proper serials
      00066d2c
    • Thomas Woerner's avatar
      tests/external-signed-ca tests: Fix external-ca.sh to use proper serials · 2a197cc7
      Thomas Woerner authored
      The serial numbers have not been set for the creation of the CA and also
      to sign the request. Because of this the local time has been used, which
      resulted sometimes in the use of the same time stamp for the CA and the
      signing reuqest. The import failed then with same issuer and serial number
      error.
      
      The cat to generate the chain.crt has been replaces with openssl x509 calls.
      
      Some comments have also been added.
      
      The script in external-signed-ca-with-manual-copy has been replaced with a
      link to the external-signed-ca-with-automatic-copy directory.
      2a197cc7
  9. Sep 26, 2019
  10. Sep 25, 2019
  11. Sep 24, 2019
  12. Sep 23, 2019
    • Thomas Woerner's avatar
      New hostgroup management module · 2abebc68
      Thomas Woerner authored
      There is a new hostgroup management module placed in the plugins folder:
      
        plugins/modules/ipahostgroup.py
      
      The hostgroup module allows to add, remove and disable hosts.
      
      The hostgroup module is as compatible as possible to the Ansible upstream
      ipa_hostgroup module, but addtionally offers to ensure member presence and
      absence.
      
      Here is the documentation for the module:
      
        README-hostgroup.md
      
      New example playbooks have been added:
      
        playbooks/hostgroup/ensure-hostgroup-is-absent.yml
        playbooks/hostgroup/ensure-hostgroup-is-present.yml
        playbooks/hostgroup/ensure-hosts-and-hostgroups-are-absent-in-hostgroup.yml
        playbooks/hostgroup/ensure-hosts-and-hostgroups-are-present-in-hostgroup.yml
      2abebc68
    • Thomas Woerner's avatar
      New hostgroup management module · 74ea40f6
      Thomas Woerner authored
      There is a new hostgroup management module placed in the plugins folder:
      
        plugins/modules/ipahostgroup.py
      
      The hostgroup module allows to add, remove and disable hosts.
      
      The hostgroup module is as compatible as possible to the Ansible upstream
      ipa_hostgroup module, but addtionally offers to ensure member presence and
      absence.
      
      Here is the documentation for the module:
      
        README-hostgroup.md
      
      New example playbooks have been added:
      
        playbooks/hostgroup/ensure-hostgroup-is-absent.yml
        playbooks/hostgroup/ensure-hostgroup-is-present.yml
        playbooks/hostgroup/ensure-hosts-and-hostgroups-are-absent-in-hostgroup.yml
        playbooks/hostgroup/ensure-hosts-and-hostgroups-are-present-in-hostgroup.yml
      74ea40f6
  13. Sep 10, 2019
    • Thomas Woerner's avatar
      Update README files for proper description of states · 8a56962c
      Thomas Woerner authored
      With Ansible there is no add or remove user, there is only ensure presence
      or absence of users. The descriptions have been adapted to make sure that
      the description is correct now.
      8a56962c
    • Thomas Woerner's avatar
      New host management module · 4fc722f7
      Thomas Woerner authored
      There is a new user management module placed in the plugins folder:
      
        plugins/modules/ipauser.py
      
      The host module allows to add, remove and disable hosts.
      
      The host module is as compatible as possible to the Ansible upstream
      ipa_host` module, but addtionally offers to disable hosts.
      
      Here is the documentation for the module:
      
        README-host.md
      
      New example playbooks have been added:
      
        playbooks/host/add-host.yml
        playbooks/host/delete-host.yml
        playbooks/host/disable-host.yml
      4fc722f7
  14. Sep 04, 2019
  15. Aug 15, 2019
  16. Aug 12, 2019
    • Thomas Woerner's avatar
      ansible_freeipa_module: Add support for GSSAPI · 09ab29b4
      Thomas Woerner authored
      The GSSAPI can be enabled in the management modules with either the
      KRB5CCNAME or the KRB5_CLIENT_KTNAME environment variable.
      
      For KRB5CCNAME it is needed to create a ccache file
      
        kinit admin@TEST.LOCAL -c /root/admin.ccache
      
      that is transferred to the nodes (here into /root) and activated in the
      playbook with
      
        environment:
          KRB5CCNAME: /root/admin.ccache
      
      For KRB5_CLIENT_KTNAME a admin keytab has to be generated
      
        ipa-getkeytab -s ipaserver.test.local -p admin@TEST.LOCAL -k \
        /root/admin.keytab
      
      that is transferred to the nodes (here into /root) and activated in the
      playbook with
      
        environment:
          KRB5_CLIENT_KTNAME: /root/admin.keytab
      
      It will be needed to set ipaadmin_principal if the admin principal is not
      admin.
      
      The management modules can be used without a password in this case.
      09ab29b4
    • Thomas Woerner's avatar
      ansible_freeipa_module: Add ansible module argument to valid_creds function · c69d0bc5
      Thomas Woerner authored
      For debug and error reporting it is needed to have the ansible module also
      in the valid_creds function.
      c69d0bc5
    • Thomas Woerner's avatar
  17. Aug 06, 2019
  18. Jul 30, 2019