# -*- coding: utf-8 -*- # Authors: # Thomas Woerner <twoerner@redhat.com> # # Based on ipa-client-install code # # Copyright (C) 2017-2022 Red Hat # see file 'COPYING' for use and warranty information # # This program is free software; you can redistribute it and/or modify # it under the terms of the GNU General Public License as published by # the Free Software Foundation, either version 3 of the License, or # (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program. If not, see <http://www.gnu.org/licenses/>. from __future__ import (absolute_import, division, print_function) __metaclass__ = type ANSIBLE_METADATA = { 'metadata_version': '1.0', 'supported_by': 'community', 'status': ['preview'], } DOCUMENTATION = ''' --- module: ipaserver_setup_ca short_description: Setup CA description: Setup CA options: dm_password: description: Directory Manager password type: str required: yes password: description: Admin user kerberos password type: str required: yes master_password: description: kerberos master password (normally autogenerated) type: str required: yes ip_addresses: description: List of Master Server IP Addresses type: list elements: str required: no domain: description: Primary DNS domain of the IPA deployment type: str required: yes realm: description: Kerberos realm name of the IPA deployment type: str required: yes hostname: description: Fully qualified name of this host type: str required: no no_host_dns: description: Do not use DNS for hostname lookup during installation type: bool default: no required: no pki_config_override: description: Path to ini file with config overrides type: str required: no setup_adtrust: description: Configure AD trust capability type: bool default: no required: no setup_kra: description: Configure a dogtag KRA type: bool default: no required: no setup_dns: description: Configure bind with our zone type: bool default: no required: no setup_ca: description: Configure a dogtag CA type: bool default: no required: no idstart: description: The starting value for the IDs range (default random) type: int required: yes idmax: description: The max value for the IDs range (default idstart+199999) type: int required: yes no_hbac_allow: description: Don't install allow_all HBAC rule type: bool default: no required: no no_pkinit: description: Disable pkinit setup steps type: bool default: no required: no dirsrv_config_file: description: The path to LDIF file that will be used to modify configuration of dse.ldif during installation of the directory server instance type: str required: no dirsrv_cert_files: description: Files containing the Directory Server SSL certificate and private key type: list elements: str required: no _dirsrv_pkcs12_info: description: The installer _dirsrv_pkcs12_info setting type: list elements: str required: no external_ca: description: External ca setting type: bool default: no required: no external_ca_type: description: Type of the external CA type: str required: no external_ca_profile: description: Specify the certificate profile/template to use at the external CA type: str required: no external_cert_files: description: File containing the IPA CA certificate and the external CA certificate chain type: list elements: str required: no subject_base: description: The certificate subject base (default O=<realm-name>). RDNs are in LDAP order (most specific RDN first). type: str required: no _subject_base: description: The installer _subject_base setting type: str required: no ca_subject: description: The installer ca_subject setting type: str required: no _ca_subject: description: The installer _ca_subject setting type: str required: no ca_signing_algorithm: description: Signing algorithm of the IPA CA certificate type: str required: no _random_serial_numbers: description: The installer _random_serial_numbers setting type: bool required: yes reverse_zones: description: The reverse DNS zones to use type: list elements: str required: no no_reverse: description: Do not create new reverse DNS zone type: bool default: no required: no auto_forwarders: description: Use DNS forwarders configured in /etc/resolv.conf type: bool default: no required: no domainlevel: description: The domain level type: int required: no _http_ca_cert: description: The installer _http_ca_cert setting type: str required: no author: - Thomas Woerner (@t-woerner) ''' EXAMPLES = ''' ''' RETURN = ''' ''' import os from ansible.module_utils.basic import AnsibleModule from ansible.module_utils.ansible_ipa_server import ( check_imports, AnsibleModuleLog, setup_logging, options, sysrestore, paths, ansible_module_get_parsed_ip_addresses, api_Backend_ldap2, redirect_stdout, ca, installutils, ds_init_info, custodiainstance, write_cache, x509, decode_certificate ) def main(): ansible_module = AnsibleModule( argument_spec=dict( # basic dm_password=dict(required=True, type='str', no_log=True), password=dict(required=True, type='str', no_log=True), master_password=dict(required=True, type='str', no_log=True), ip_addresses=dict(required=False, type='list', elements='str', default=[]), domain=dict(required=True, type='str'), realm=dict(required=True, type='str'), hostname=dict(required=False, type='str'), no_host_dns=dict(required=False, type='bool', default=False), pki_config_override=dict(required=False, type='str'), # server setup_adtrust=dict(required=False, type='bool', default=False), setup_kra=dict(required=False, type='bool', default=False), setup_dns=dict(required=False, type='bool', default=False), setup_ca=dict(required=False, type='bool', default=False), idstart=dict(required=True, type='int'), idmax=dict(required=True, type='int'), no_hbac_allow=dict(required=False, type='bool', default=False), no_pkinit=dict(required=False, type='bool', default=False), dirsrv_config_file=dict(required=False, type='str'), dirsrv_cert_files=dict(required=False, type='list', elements='str'), _dirsrv_pkcs12_info=dict(required=False, type='list', elements='str'), # certificate system external_ca=dict(required=False, type='bool', default=False), external_ca_type=dict(required=False, type='str'), external_ca_profile=dict(required=False, type='str'), external_cert_files=dict(required=False, type='list', elements='str', default=None), subject_base=dict(required=False, type='str'), _subject_base=dict(required=False, type='str'), ca_subject=dict(required=False, type='str'), _ca_subject=dict(required=False, type='str'), ca_signing_algorithm=dict(required=False, type='str'), _random_serial_numbers=dict(required=True, type='bool'), # dns reverse_zones=dict(required=False, type='list', elements='str', default=[]), no_reverse=dict(required=False, type='bool', default=False), auto_forwarders=dict(required=False, type='bool', default=False), # additional domainlevel=dict(required=False, type='int'), _http_ca_cert=dict(required=False, type='str'), ), ) ansible_module._ansible_debug = True check_imports(ansible_module) setup_logging() ansible_log = AnsibleModuleLog(ansible_module) # set values ############################################################ # basic options.dm_password = ansible_module.params.get('dm_password') options.admin_password = ansible_module.params.get('password') options.master_password = ansible_module.params.get('master_password') options.ip_addresses = ansible_module_get_parsed_ip_addresses( ansible_module) options.domain_name = ansible_module.params.get('domain') options.realm_name = ansible_module.params.get('realm') options.host_name = ansible_module.params.get('hostname') options.no_host_dns = ansible_module.params.get('no_host_dns') options.pki_config_override = ansible_module.params.get( 'pki_config_override') # server options.setup_adtrust = ansible_module.params.get('setup_adtrust') options.setup_kra = ansible_module.params.get('setup_kra') options.setup_dns = ansible_module.params.get('setup_dns') options.setup_ca = ansible_module.params.get('setup_ca') options.idstart = ansible_module.params.get('idstart') options.idmax = ansible_module.params.get('idmax') options.no_hbac_allow = ansible_module.params.get('no_hbac_allow') options.no_pkinit = ansible_module.params.get('no_pkinit') options.dirsrv_config_file = ansible_module.params.get( 'dirsrv_config_file') options.dirsrv_cert_files = ansible_module.params.get('dirsrv_cert_files') options._dirsrv_pkcs12_info = ansible_module.params.get( '_dirsrv_pkcs12_info') # hsm if hasattr(ca, "hsm_version"): options.token_name = None options.token_library_path = None options.token_password = None options.token_password_file = None # certificate system options.external_ca = ansible_module.params.get('external_ca') options.external_ca_type = ansible_module.params.get('external_ca_type') options.external_ca_profile = ansible_module.params.get( 'external_ca_profile') options.external_cert_files = ansible_module.params.get( 'external_cert_files') options.subject_base = ansible_module.params.get('subject_base') options._subject_base = ansible_module.params.get('_subject_base') options.ca_subject = ansible_module.params.get('ca_subject') options._ca_subject = ansible_module.params.get('_ca_subject') options.ca_signing_algorithm = ansible_module.params.get( 'ca_signing_algorithm') options._random_serial_numbers = ansible_module.params.get( '_random_serial_numbers') # dns options.reverse_zones = ansible_module.params.get('reverse_zones') options.no_reverse = ansible_module.params.get('no_reverse') options.auto_forwarders = ansible_module.params.get('auto_forwarders') # additional options.domainlevel = ansible_module.params.get('domainlevel') options._http_ca_cert = ansible_module.params.get('_http_ca_cert') if options._http_ca_cert: options._http_ca_cert = decode_certificate(options._http_ca_cert) # init ################################################################# options.promote = False # first master, no promotion # Repeat from ca.install_check # ca.external_cert_file and ca.external_ca_file need to be set if options.external_cert_files: ca.external_cert_file, ca.external_ca_file = \ installutils.load_external_cert( options.external_cert_files, options._ca_subject) fstore = sysrestore.FileStore(paths.SYSRESTORE) api_Backend_ldap2(options.host_name, options.setup_ca, connect=True) ds = ds_init_info(ansible_log, fstore, options.domainlevel, options.dirsrv_config_file, options.realm_name, options.host_name, options.domain_name, options.dm_password, options.idstart, options.idmax, options.subject_base, options.ca_subject, options.no_hbac_allow, options._dirsrv_pkcs12_info, options.no_pkinit) # setup custodia ######################################################## if hasattr(custodiainstance, "get_custodia_instance"): if hasattr(custodiainstance.CustodiaModes, "FIRST_MASTER"): mode = custodiainstance.CustodiaModes.FIRST_MASTER else: mode = custodiainstance.CustodiaModes.MASTER_PEER custodia = custodiainstance.get_custodia_instance(options, mode) else: custodia = custodiainstance.CustodiaInstance(options.host_name, options.realm_name) custodia.set_output(ansible_log) with redirect_stdout(ansible_log): custodia.create_instance() # setup CA ############################################################## if options.setup_ca: if not options.external_cert_files and options.external_ca: # stage 1 of external CA installation cache_vars = {n: options.__dict__[n] for o, n in options.knobs() if n in options.__dict__} write_cache(cache_vars) try: with redirect_stdout(ansible_log): if hasattr(custodiainstance, "get_custodia_instance"): ca.install_step_0(False, None, options, custodia=custodia) else: ca.install_step_0(False, None, options) except SystemExit: ansible_module.exit_json(changed=True, csr_generated=True) else: # Put the CA cert where other instances expect it x509.write_certificate(options._http_ca_cert, paths.IPA_CA_CRT) os.chmod(paths.IPA_CA_CRT, 0o444) if not options.no_pkinit: x509.write_certificate(options._http_ca_cert, paths.KDC_CA_BUNDLE_PEM) else: with open(paths.KDC_CA_BUNDLE_PEM, 'w'): pass os.chmod(paths.KDC_CA_BUNDLE_PEM, 0o444) x509.write_certificate(options._http_ca_cert, paths.CA_BUNDLE_PEM) os.chmod(paths.CA_BUNDLE_PEM, 0o444) with redirect_stdout(ansible_log): # we now need to enable ssl on the ds ds.enable_ssl() if options.setup_ca: with redirect_stdout(ansible_log): if hasattr(custodiainstance, "get_custodia_instance"): ca.install_step_1(False, None, options, custodia=custodia) else: ca.install_step_1(False, None, options) ansible_module.exit_json(changed=True, csr_generated=False) if __name__ == '__main__': main()