Originally developed at ungleich and improved for Open Sourcing by Evilham.remotes/origin/6.3
parent
553cfc28e7
commit
bee95efa43
@ -0,0 +1,148 @@ |
||||
cdist-type__openldap_server(7) |
||||
============================== |
||||
|
||||
NAME |
||||
---- |
||||
cdist-type__openldap_server - Setup an openldap(4) server instance |
||||
|
||||
|
||||
DESCRIPTION |
||||
----------- |
||||
This type can be used to bootstrap an LDAP environment using openldap as slapd. |
||||
|
||||
|
||||
REQUIRED PARAMETERS |
||||
------------------- |
||||
manager-dn |
||||
The rootdn to set up in the directory. |
||||
E.g. `cn=manager,dc=ungleich,dc=ch`. See `slapd.conf(5)`. |
||||
|
||||
manager-password-hash |
||||
The password for `manager-dn` in the directory. |
||||
This should be valid for `slapd.conf` like `{SSHA}qV+mCs3u8Q2sCmUXT4Ybw7MebHTASMyr`. |
||||
Generate e.g. with: `slappasswd -s weneedgoodsecurity`. |
||||
See `slappasswd(8C)`, `slapd.conf(5)`. |
||||
TODO: implement this: http://blog.adamsbros.org/2015/06/09/openldap-ssha-salted-hashes-by-hand/ |
||||
to allow for a manager-password parameter and ensure idempotency (care with salts). |
||||
Such manager-password parameter should be mutually exclusive with this one. |
||||
|
||||
serverid |
||||
The server for the directory. |
||||
E.g. `dc=ungleich,dc=ch`. See `slapd.conf(5)`. |
||||
|
||||
suffix |
||||
The suffix for the directory. |
||||
E.g. `dc=ungleich,dc=ch`. See `slapd.conf(5)`. |
||||
|
||||
|
||||
OPTIONAL PARAMETERS |
||||
------------------- |
||||
syncrepl-credentials |
||||
Only has an effect if `replicate` is set; required in that case. |
||||
This secret is shared amongst the hosts that will replicate the directory. |
||||
Note that each replication server needs this secret and it is saved in |
||||
plain text in the directory. |
||||
|
||||
syncrepl-searchbase |
||||
Only has an effect if `replicate` is set; required in that case. |
||||
The searchbase to use for replication. |
||||
E.g. `dc=ungleich,dc=ch`. See `slapd.conf(5)`. |
||||
|
||||
tls-cert |
||||
If defined, `__letsencrypt_cert` is not used and this must be the path in |
||||
the remote hosts to the PEM-encoded TLS certificate. |
||||
Requires: `tls-privkey` and `tls-ca`. |
||||
Permissions, existence and renewal of these files are left up to the |
||||
type's user. |
||||
|
||||
tls-privkey |
||||
Required if `tls-cert` is defined. |
||||
Path in the remote hosts to the PEM-encoded private key file. |
||||
|
||||
tls-ca |
||||
Required if `tls-cert` is defined. |
||||
Path in the remote hosts to the PEM-encoded CA certificate file. |
||||
|
||||
|
||||
OPTIONAL MULTIPLE PARAMETERS |
||||
---------------------------- |
||||
syncrepl-host |
||||
Only has an effect if `replicate` is set; required in that case. |
||||
Set once per host that will replicate the directory. |
||||
|
||||
module |
||||
LDAP module to load. See `slapd.conf(5)`. |
||||
Default value is OS-dependent, see manifest. |
||||
|
||||
|
||||
BOOLEAN PARAMETERS |
||||
------------------ |
||||
staging |
||||
Passed to `cdist-type__letsencrypt_cert`; has otherwise no use. |
||||
Obtain a test certificate from a staging server. |
||||
|
||||
replicate |
||||
Whether to setup replication or not. |
||||
If present `syncrepl-credentials` and `syncrepl-host` are also required. |
||||
|
||||
EXAMPLES |
||||
-------- |
||||
|
||||
.. code-block:: sh |
||||
|
||||
# Modify the ruleset on $__target_host: |
||||
__pf_ruleset --state present --source /my/pf/ruleset.conf |
||||
require="__pf_ruleset" \ |
||||
__pf_apply |
||||
|
||||
# Remove the ruleset on $__target_host (implies disabling pf(4): |
||||
__pf_ruleset --state absent |
||||
require="__pf_ruleset" \ |
||||
__pf_apply |
||||
|
||||
root@ldap-for-guacamole:~# cat ldapbase.ldif |
||||
dn: dc=guaca-test,dc=ungleich,dc=ch |
||||
objectClass: top |
||||
objectClass: dcObject |
||||
objectClass: organization |
||||
o: Some description |
||||
dc: guaca-test |
||||
|
||||
|
||||
# Sample usage: |
||||
# |
||||
# id=1 |
||||
# for host in ldap-test1.ungleich.ch ldap-test2.ungleich.ch; do |
||||
# echo "__ungleich_ldap ${host} \ |
||||
# --manager-dn 'cn=manager,dc=ungleich,dc=ch' \ |
||||
# --manager-password '{SSHA}fooo' \ |
||||
# --serverid '${id}' \ |
||||
# --staging \ |
||||
# --suffix 'dc=ungleich,dc=ch' \ |
||||
# --searchbase 'dc=ungleich,dc=ch' \ |
||||
# --syncrepl-credentials 'fooo' \ |
||||
# --syncrepl-host 'ldap-test1.ungleich.ch' \ |
||||
# --syncrepl-host 'ldap-test2.ungleich.ch' \ |
||||
# --descriptiont 'Ungleich LDAP server'" \ |
||||
# | cdist config -i - -v ${host} |
||||
# id=$((id + 1)) |
||||
# done |
||||
|
||||
|
||||
SEE ALSO |
||||
-------- |
||||
:strong:`cdist-type__letsencrypt_cert`\ (7) |
||||
|
||||
|
||||
AUTHORS |
||||
------- |
||||
ungleich <foss--@--ungleich.ch> |
||||
Evilham <contact--@--evilham.com> |
||||
|
||||
|
||||
COPYING |
||||
------- |
||||
Copyright \(C) 2020 ungleich glarus ag. You can redistribute it |
||||
and/or modify it under the terms of the GNU General Public License as |
||||
published by the Free Software Foundation, either version 3 of the |
||||
License, or (at your option) any later version. |
@ -0,0 +1,235 @@ |
||||
#!/bin/sh |
||||
|
||||
name="${__target_host}" |
||||
manager_dn=$(cat "${__object}/parameter/manager-dn") |
||||
manager_password_hash=$(cat "${__object}/parameter/manager-password-hash") |
||||
serverid=$(cat "${__object}/parameter/serverid") |
||||
suffix=$(cat "${__object}/parameter/suffix") |
||||
slapd_modules=$(cat "${__object}/parameter/module" || true) |
||||
|
||||
|
||||
OS="$(cat "${__global}/explorer/os")" |
||||
|
||||
# Setup OS-dependent vars |
||||
# TODO: treat other OS better, defaulting to Debian-like |
||||
case "${OS}" in |
||||
freebsd) |
||||
PKGS="openldap-server" |
||||
ETC="/usr/local/etc" |
||||
SLAPD_DIR="/usr/local/etc/openldap" |
||||
SLAPD_DATA_DIR="/var/db/openldap-data" |
||||
SLAPD_RUN_DIR="/var/run/openldap" |
||||
SLAPD_MODULE_PATH="/usr/local/libexec/openldap" |
||||
if [ -z "${slapd_modules}" ]; then |
||||
# It looks like ppolicy and syncprov must be compiled |
||||
slapd_modules="back_mdb back_monitor" |
||||
fi |
||||
;; |
||||
*) |
||||
PKGS="slapd ldap-utils" |
||||
ETC="/etc" |
||||
SLAPD_DIR="/etc/ldap" |
||||
SLAPD_DATA_DIR="/var/lib/ldap" |
||||
SLAPD_RUN_DIR="/var/run/slapd" |
||||
SLAPD_MODULE_PATH="/usr/lib/ldap" |
||||
if [ -z "${slapd_modules}" ]; then |
||||
slapd_modules="back_mdb ppolicy syncprov back_monitor" |
||||
fi |
||||
;; |
||||
esac |
||||
|
||||
|
||||
|
||||
# Determine if __letsencrypt_cert is to be used and setup vars accordingly |
||||
if [ -f "${__object}/parameter/tls-cert" ]; then |
||||
tls_cert=$(cat "${__object}/parameter/tls-cert") |
||||
|
||||
if [ ! -f "${__object}/parameter/tls-privkey" ]; then |
||||
echo "When tls-cert is defined, tls-privkey is also required." >&2 |
||||
exit 1 |
||||
fi |
||||
tls_privkey=$(cat "${__object}/parameter/tls-privkey") |
||||
|
||||
if [ ! -f "${__object}/parameter/tls-ca" ]; then |
||||
echo "When tls-cert is defined, tls-ca is also required." >&2 |
||||
exit 1 |
||||
fi |
||||
tls_ca=$(cat "${__object}/parameter/tls-ca") |
||||
|
||||
_skip_letsencrypt_cert="YES" |
||||
else |
||||
tls_cert="${SLAPD_DIR}/sasl2/cert.pem" |
||||
tls_privkey="${SLAPD_DIR}/sasl2/privkey.pem" |
||||
tls_ca="${SLAPD_DIR}/sasl2/chain.pem" |
||||
fi |
||||
|
||||
mkdir "${__object}/files" |
||||
ldapconf="${__object}/files/ldapconf" |
||||
|
||||
replication="" |
||||
if [ -f "${__object}/parameter/replicate" ]; then |
||||
replication=yes |
||||
|
||||
if [ ! -f "${__object}/parameter/syncrepl-searchbase" ]; then |
||||
echo "Requiring the searchbase for replication" >&2 |
||||
exit 1 |
||||
fi |
||||
syncrepl_searchbase=$(cat "${__object}/parameter/syncrepl-searchbase") |
||||
|
||||
if [ ! -f "${__object}/parameter/syncrepl-credentials" ]; then |
||||
echo "Requiring credentials for replication" >&2 |
||||
exit 1 |
||||
fi |
||||
|
||||
syncrepl_credentials=$(cat "${__object}/parameter/syncrepl-credentials") |
||||
|
||||
if [ ! -f "${__object}/parameter/syncrepl-host" ]; then |
||||
echo "Requiring host(s) for replication" >&2 |
||||
exit 1 |
||||
fi |
||||
syncrepl_hosts=$(cat "${__object}/parameter/syncrepl-host") |
||||
|
||||
fi |
||||
|
||||
# Install required packages |
||||
for pkg in ${PKGS}; do |
||||
__package ${pkg} |
||||
done |
||||
|
||||
|
||||
# TODO: Implement __start_on_boot for BSD |
||||
require="__package/slapd" __start_on_boot slapd |
||||
|
||||
# TODO: treat other OS better. Defaulting to Debian-like. |
||||
if [ "${OS}" != "freebsd" ]; then |
||||
require="__package/slapd" __line rm_slapd_conf \ |
||||
--file ${ETC}/default/slapd \ |
||||
--regex 'SLAPD_CONF=.*' \ |
||||
--state absent |
||||
|
||||
require="__package/slapd" __line rm_slapd_services \ |
||||
--file ${ETC}/default/slapd \ |
||||
--regex 'SLAPD_SERVICES=.*' \ |
||||
--state absent |
||||
|
||||
require="__line/rm_slapd_conf" __line add_slapd_conf \ |
||||
--file ${ETC}/default/slapd \ |
||||
--line 'SLAPD_CONF=${SLAPD_DIR}/slapd.conf' \ |
||||
--state present |
||||
|
||||
require="__line/rm_slapd_services" __line add_slapd_services \ |
||||
--file ${ETC}/default/slapd \ |
||||
--line "SLAPD_SERVICES=\"ldap://localhost/ ldap://${name}/\"" \ |
||||
--state present |
||||
fi |
||||
|
||||
|
||||
if [ -z "${_skip_letsencrypt_cert}" ]; then |
||||
if [ -f "${__object}/parameter/staging" ]; then |
||||
staging="--staging" |
||||
else |
||||
staging="" |
||||
fi |
||||
|
||||
__letsencrypt_cert "${name}" --admin-email technik@ungleich.ch \ |
||||
--renew-hook "cp ${ETC}/letsencrypt/live/${name}/*.pem ${SLAPD_DIR}/sasl2 && chown -R openldap:openldap ${SLAPD_DIR}/sasl2 && service slapd restart" \ |
||||
--automatic-renewal ${staging} |
||||
fi |
||||
|
||||
require="__package/slapd" __directory ${SLAPD_DIR}/slapd.d --state absent |
||||
|
||||
if [ -z "${_skip_letsencrypt_cert}" ]; then |
||||
require="__package/slapd __letsencrypt_cert/${name}" \ |
||||
__file ${SLAPD_DIR}/slapd.conf --owner root --group root --mode 644 \ |
||||
--source "${ldapconf}" |
||||
else |
||||
require="__package/slapd" \ |
||||
__file ${SLAPD_DIR}/slapd.conf --owner root --group root --mode 644 \ |
||||
--source "${ldapconf}" |
||||
fi |
||||
|
||||
# Start slapd.conf |
||||
cat << EOF > "${ldapconf}" |
||||
pidfile ${SLAPD_RUN_DIR}/slapd.pid |
||||
argsfile ${SLAPD_RUN_DIR}/slapd.args |
||||
|
||||
TLSCipherSuite NORMAL |
||||
TLSCertificateFile ${tls_cert} |
||||
TLSCertificateKeyFile ${tls_privkey} |
||||
TLSCACertificateFile ${tls_ca} |
||||
|
||||
disallow bind_anon |
||||
require bind |
||||
security tls=1 |
||||
|
||||
include ${SLAPD_DIR}/schema/corba.schema |
||||
include ${SLAPD_DIR}/schema/core.schema |
||||
include ${SLAPD_DIR}/schema/cosine.schema |
||||
include ${SLAPD_DIR}/schema/duaconf.schema |
||||
include ${SLAPD_DIR}/schema/dyngroup.schema |
||||
include ${SLAPD_DIR}/schema/inetorgperson.schema |
||||
include ${SLAPD_DIR}/schema/java.schema |
||||
include ${SLAPD_DIR}/schema/misc.schema |
||||
include ${SLAPD_DIR}/schema/nis.schema |
||||
include ${SLAPD_DIR}/schema/openldap.schema |
||||
include ${SLAPD_DIR}/schema/ppolicy.schema |
||||
include ${SLAPD_DIR}/schema/collective.schema |
||||
|
||||
modulepath ${SLAPD_MODULE_PATH} |
||||
EOF |
||||
|
||||
# Add specified modules |
||||
for module in ${slapd_modules}; do |
||||
echo "moduleload ${module}.la" >> "${ldapconf}" |
||||
done |
||||
|
||||
# Rest of the config |
||||
cat << EOF >> "${ldapconf}" |
||||
loglevel 1024 |
||||
|
||||
database mdb |
||||
maxsize 1073741824 |
||||
|
||||
suffix "${suffix}" |
||||
directory ${SLAPD_DATA_DIR} |
||||
rootdn "${manager_dn}" |
||||
rootpw "${manager_password_hash}" |
||||
|
||||
index objectClass eq,pres |
||||
index ou,cn,mail,surname,givenname eq,pres,sub |
||||
index uidNumber,gidNumber,loginShell eq,pres |
||||
index uid,memberUid eq,pres,sub |
||||
index nisMapName,nisMapEntry eq,pres,sub |
||||
index entryCSN,entryUUID eq |
||||
|
||||
serverid ${serverid} |
||||
EOF |
||||
|
||||
# Setup replication |
||||
if [ "${replication}" ]; then |
||||
rid=1; |
||||
for syncrepl in ${syncrepl_hosts}; do |
||||
cat <<EOF >> "${ldapconf}" |
||||
syncrepl rid=${rid} |
||||
provider=ldap://${syncrepl} |
||||
bindmethod=simple |
||||
starttls=yes |
||||
binddn="${manager_dn}" |
||||
credentials=${syncrepl_credentials} |
||||
searchbase="${syncrepl_searchbase}" |
||||
type=refreshAndPersist |
||||
retry="5 + 5 +" |
||||
interval=00:00:00:05 |
||||
EOF |
||||
rid=$((rid + 1)) |
||||
done |
||||
cat <<EOF >> "${ldapconf}" |
||||
mirrormode true |
||||
overlay syncprov |
||||
syncprov-checkpoint 100 5 |
||||
syncprov-sessionlog 100 |
||||
|
||||
database monitor |
||||
limits dn.exact="${manager_dn}" time=unlimited size=unlimited |
||||
EOF |
||||
fi |
@ -0,0 +1,2 @@ |
||||
staging |
||||
replicate |
@ -0,0 +1,4 @@ |
||||
description |
||||
syncrepl-credentials |
||||
syncrepl-searchbase |
||||
tls-cert |
@ -0,0 +1,2 @@ |
||||
syncrepl-host |
||||
module |
@ -0,0 +1,4 @@ |
||||
manager-dn |
||||
manager-password-hash |
||||
serverid |
||||
suffix |
Loading…
Reference in new issue