forked from ungleich-public/cdist
[new-type] __openldap_server
Originally developed at ungleich and improved for Open Sourcing by Evilham.
This commit is contained in:
parent
553cfc28e7
commit
bee95efa43
6 changed files with 395 additions and 0 deletions
148
cdist/conf/type/__openldap_server/man.rst
Normal file
148
cdist/conf/type/__openldap_server/man.rst
Normal file
|
@ -0,0 +1,148 @@
|
||||||
|
cdist-type__openldap_server(7)
|
||||||
|
==============================
|
||||||
|
|
||||||
|
NAME
|
||||||
|
----
|
||||||
|
cdist-type__openldap_server - Setup an openldap(4) server instance
|
||||||
|
|
||||||
|
|
||||||
|
DESCRIPTION
|
||||||
|
-----------
|
||||||
|
This type can be used to bootstrap an LDAP environment using openldap as slapd.
|
||||||
|
|
||||||
|
|
||||||
|
REQUIRED PARAMETERS
|
||||||
|
-------------------
|
||||||
|
manager-dn
|
||||||
|
The rootdn to set up in the directory.
|
||||||
|
E.g. `cn=manager,dc=ungleich,dc=ch`. See `slapd.conf(5)`.
|
||||||
|
|
||||||
|
manager-password-hash
|
||||||
|
The password for `manager-dn` in the directory.
|
||||||
|
This should be valid for `slapd.conf` like `{SSHA}qV+mCs3u8Q2sCmUXT4Ybw7MebHTASMyr`.
|
||||||
|
Generate e.g. with: `slappasswd -s weneedgoodsecurity`.
|
||||||
|
See `slappasswd(8C)`, `slapd.conf(5)`.
|
||||||
|
TODO: implement this: http://blog.adamsbros.org/2015/06/09/openldap-ssha-salted-hashes-by-hand/
|
||||||
|
to allow for a manager-password parameter and ensure idempotency (care with salts).
|
||||||
|
Such manager-password parameter should be mutually exclusive with this one.
|
||||||
|
|
||||||
|
serverid
|
||||||
|
The server for the directory.
|
||||||
|
E.g. `dc=ungleich,dc=ch`. See `slapd.conf(5)`.
|
||||||
|
|
||||||
|
suffix
|
||||||
|
The suffix for the directory.
|
||||||
|
E.g. `dc=ungleich,dc=ch`. See `slapd.conf(5)`.
|
||||||
|
|
||||||
|
|
||||||
|
OPTIONAL PARAMETERS
|
||||||
|
-------------------
|
||||||
|
syncrepl-credentials
|
||||||
|
Only has an effect if `replicate` is set; required in that case.
|
||||||
|
This secret is shared amongst the hosts that will replicate the directory.
|
||||||
|
Note that each replication server needs this secret and it is saved in
|
||||||
|
plain text in the directory.
|
||||||
|
|
||||||
|
syncrepl-searchbase
|
||||||
|
Only has an effect if `replicate` is set; required in that case.
|
||||||
|
The searchbase to use for replication.
|
||||||
|
E.g. `dc=ungleich,dc=ch`. See `slapd.conf(5)`.
|
||||||
|
|
||||||
|
tls-cert
|
||||||
|
If defined, `__letsencrypt_cert` is not used and this must be the path in
|
||||||
|
the remote hosts to the PEM-encoded TLS certificate.
|
||||||
|
Requires: `tls-privkey` and `tls-ca`.
|
||||||
|
Permissions, existence and renewal of these files are left up to the
|
||||||
|
type's user.
|
||||||
|
|
||||||
|
tls-privkey
|
||||||
|
Required if `tls-cert` is defined.
|
||||||
|
Path in the remote hosts to the PEM-encoded private key file.
|
||||||
|
|
||||||
|
tls-ca
|
||||||
|
Required if `tls-cert` is defined.
|
||||||
|
Path in the remote hosts to the PEM-encoded CA certificate file.
|
||||||
|
|
||||||
|
|
||||||
|
OPTIONAL MULTIPLE PARAMETERS
|
||||||
|
----------------------------
|
||||||
|
syncrepl-host
|
||||||
|
Only has an effect if `replicate` is set; required in that case.
|
||||||
|
Set once per host that will replicate the directory.
|
||||||
|
|
||||||
|
module
|
||||||
|
LDAP module to load. See `slapd.conf(5)`.
|
||||||
|
Default value is OS-dependent, see manifest.
|
||||||
|
|
||||||
|
|
||||||
|
BOOLEAN PARAMETERS
|
||||||
|
------------------
|
||||||
|
staging
|
||||||
|
Passed to `cdist-type__letsencrypt_cert`; has otherwise no use.
|
||||||
|
Obtain a test certificate from a staging server.
|
||||||
|
|
||||||
|
replicate
|
||||||
|
Whether to setup replication or not.
|
||||||
|
If present `syncrepl-credentials` and `syncrepl-host` are also required.
|
||||||
|
|
||||||
|
EXAMPLES
|
||||||
|
--------
|
||||||
|
|
||||||
|
.. code-block:: sh
|
||||||
|
|
||||||
|
# Modify the ruleset on $__target_host:
|
||||||
|
__pf_ruleset --state present --source /my/pf/ruleset.conf
|
||||||
|
require="__pf_ruleset" \
|
||||||
|
__pf_apply
|
||||||
|
|
||||||
|
# Remove the ruleset on $__target_host (implies disabling pf(4):
|
||||||
|
__pf_ruleset --state absent
|
||||||
|
require="__pf_ruleset" \
|
||||||
|
__pf_apply
|
||||||
|
|
||||||
|
root@ldap-for-guacamole:~# cat ldapbase.ldif
|
||||||
|
dn: dc=guaca-test,dc=ungleich,dc=ch
|
||||||
|
objectClass: top
|
||||||
|
objectClass: dcObject
|
||||||
|
objectClass: organization
|
||||||
|
o: Some description
|
||||||
|
dc: guaca-test
|
||||||
|
|
||||||
|
|
||||||
|
# Sample usage:
|
||||||
|
#
|
||||||
|
# id=1
|
||||||
|
# for host in ldap-test1.ungleich.ch ldap-test2.ungleich.ch; do
|
||||||
|
# echo "__ungleich_ldap ${host} \
|
||||||
|
# --manager-dn 'cn=manager,dc=ungleich,dc=ch' \
|
||||||
|
# --manager-password '{SSHA}fooo' \
|
||||||
|
# --serverid '${id}' \
|
||||||
|
# --staging \
|
||||||
|
# --suffix 'dc=ungleich,dc=ch' \
|
||||||
|
# --searchbase 'dc=ungleich,dc=ch' \
|
||||||
|
# --syncrepl-credentials 'fooo' \
|
||||||
|
# --syncrepl-host 'ldap-test1.ungleich.ch' \
|
||||||
|
# --syncrepl-host 'ldap-test2.ungleich.ch' \
|
||||||
|
# --descriptiont 'Ungleich LDAP server'" \
|
||||||
|
# | cdist config -i - -v ${host}
|
||||||
|
# id=$((id + 1))
|
||||||
|
# done
|
||||||
|
|
||||||
|
|
||||||
|
SEE ALSO
|
||||||
|
--------
|
||||||
|
:strong:`cdist-type__letsencrypt_cert`\ (7)
|
||||||
|
|
||||||
|
|
||||||
|
AUTHORS
|
||||||
|
-------
|
||||||
|
ungleich <foss--@--ungleich.ch>
|
||||||
|
Evilham <contact--@--evilham.com>
|
||||||
|
|
||||||
|
|
||||||
|
COPYING
|
||||||
|
-------
|
||||||
|
Copyright \(C) 2020 ungleich glarus ag. You can redistribute it
|
||||||
|
and/or modify it under the terms of the GNU General Public License as
|
||||||
|
published by the Free Software Foundation, either version 3 of the
|
||||||
|
License, or (at your option) any later version.
|
235
cdist/conf/type/__openldap_server/manifest
Normal file
235
cdist/conf/type/__openldap_server/manifest
Normal file
|
@ -0,0 +1,235 @@
|
||||||
|
#!/bin/sh
|
||||||
|
|
||||||
|
name="${__target_host}"
|
||||||
|
manager_dn=$(cat "${__object}/parameter/manager-dn")
|
||||||
|
manager_password_hash=$(cat "${__object}/parameter/manager-password-hash")
|
||||||
|
serverid=$(cat "${__object}/parameter/serverid")
|
||||||
|
suffix=$(cat "${__object}/parameter/suffix")
|
||||||
|
slapd_modules=$(cat "${__object}/parameter/module" || true)
|
||||||
|
|
||||||
|
|
||||||
|
OS="$(cat "${__global}/explorer/os")"
|
||||||
|
|
||||||
|
# Setup OS-dependent vars
|
||||||
|
# TODO: treat other OS better, defaulting to Debian-like
|
||||||
|
case "${OS}" in
|
||||||
|
freebsd)
|
||||||
|
PKGS="openldap-server"
|
||||||
|
ETC="/usr/local/etc"
|
||||||
|
SLAPD_DIR="/usr/local/etc/openldap"
|
||||||
|
SLAPD_DATA_DIR="/var/db/openldap-data"
|
||||||
|
SLAPD_RUN_DIR="/var/run/openldap"
|
||||||
|
SLAPD_MODULE_PATH="/usr/local/libexec/openldap"
|
||||||
|
if [ -z "${slapd_modules}" ]; then
|
||||||
|
# It looks like ppolicy and syncprov must be compiled
|
||||||
|
slapd_modules="back_mdb back_monitor"
|
||||||
|
fi
|
||||||
|
;;
|
||||||
|
*)
|
||||||
|
PKGS="slapd ldap-utils"
|
||||||
|
ETC="/etc"
|
||||||
|
SLAPD_DIR="/etc/ldap"
|
||||||
|
SLAPD_DATA_DIR="/var/lib/ldap"
|
||||||
|
SLAPD_RUN_DIR="/var/run/slapd"
|
||||||
|
SLAPD_MODULE_PATH="/usr/lib/ldap"
|
||||||
|
if [ -z "${slapd_modules}" ]; then
|
||||||
|
slapd_modules="back_mdb ppolicy syncprov back_monitor"
|
||||||
|
fi
|
||||||
|
;;
|
||||||
|
esac
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
# Determine if __letsencrypt_cert is to be used and setup vars accordingly
|
||||||
|
if [ -f "${__object}/parameter/tls-cert" ]; then
|
||||||
|
tls_cert=$(cat "${__object}/parameter/tls-cert")
|
||||||
|
|
||||||
|
if [ ! -f "${__object}/parameter/tls-privkey" ]; then
|
||||||
|
echo "When tls-cert is defined, tls-privkey is also required." >&2
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
tls_privkey=$(cat "${__object}/parameter/tls-privkey")
|
||||||
|
|
||||||
|
if [ ! -f "${__object}/parameter/tls-ca" ]; then
|
||||||
|
echo "When tls-cert is defined, tls-ca is also required." >&2
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
tls_ca=$(cat "${__object}/parameter/tls-ca")
|
||||||
|
|
||||||
|
_skip_letsencrypt_cert="YES"
|
||||||
|
else
|
||||||
|
tls_cert="${SLAPD_DIR}/sasl2/cert.pem"
|
||||||
|
tls_privkey="${SLAPD_DIR}/sasl2/privkey.pem"
|
||||||
|
tls_ca="${SLAPD_DIR}/sasl2/chain.pem"
|
||||||
|
fi
|
||||||
|
|
||||||
|
mkdir "${__object}/files"
|
||||||
|
ldapconf="${__object}/files/ldapconf"
|
||||||
|
|
||||||
|
replication=""
|
||||||
|
if [ -f "${__object}/parameter/replicate" ]; then
|
||||||
|
replication=yes
|
||||||
|
|
||||||
|
if [ ! -f "${__object}/parameter/syncrepl-searchbase" ]; then
|
||||||
|
echo "Requiring the searchbase for replication" >&2
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
syncrepl_searchbase=$(cat "${__object}/parameter/syncrepl-searchbase")
|
||||||
|
|
||||||
|
if [ ! -f "${__object}/parameter/syncrepl-credentials" ]; then
|
||||||
|
echo "Requiring credentials for replication" >&2
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
syncrepl_credentials=$(cat "${__object}/parameter/syncrepl-credentials")
|
||||||
|
|
||||||
|
if [ ! -f "${__object}/parameter/syncrepl-host" ]; then
|
||||||
|
echo "Requiring host(s) for replication" >&2
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
syncrepl_hosts=$(cat "${__object}/parameter/syncrepl-host")
|
||||||
|
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Install required packages
|
||||||
|
for pkg in ${PKGS}; do
|
||||||
|
__package ${pkg}
|
||||||
|
done
|
||||||
|
|
||||||
|
|
||||||
|
# TODO: Implement __start_on_boot for BSD
|
||||||
|
require="__package/slapd" __start_on_boot slapd
|
||||||
|
|
||||||
|
# TODO: treat other OS better. Defaulting to Debian-like.
|
||||||
|
if [ "${OS}" != "freebsd" ]; then
|
||||||
|
require="__package/slapd" __line rm_slapd_conf \
|
||||||
|
--file ${ETC}/default/slapd \
|
||||||
|
--regex 'SLAPD_CONF=.*' \
|
||||||
|
--state absent
|
||||||
|
|
||||||
|
require="__package/slapd" __line rm_slapd_services \
|
||||||
|
--file ${ETC}/default/slapd \
|
||||||
|
--regex 'SLAPD_SERVICES=.*' \
|
||||||
|
--state absent
|
||||||
|
|
||||||
|
require="__line/rm_slapd_conf" __line add_slapd_conf \
|
||||||
|
--file ${ETC}/default/slapd \
|
||||||
|
--line 'SLAPD_CONF=${SLAPD_DIR}/slapd.conf' \
|
||||||
|
--state present
|
||||||
|
|
||||||
|
require="__line/rm_slapd_services" __line add_slapd_services \
|
||||||
|
--file ${ETC}/default/slapd \
|
||||||
|
--line "SLAPD_SERVICES=\"ldap://localhost/ ldap://${name}/\"" \
|
||||||
|
--state present
|
||||||
|
fi
|
||||||
|
|
||||||
|
|
||||||
|
if [ -z "${_skip_letsencrypt_cert}" ]; then
|
||||||
|
if [ -f "${__object}/parameter/staging" ]; then
|
||||||
|
staging="--staging"
|
||||||
|
else
|
||||||
|
staging=""
|
||||||
|
fi
|
||||||
|
|
||||||
|
__letsencrypt_cert "${name}" --admin-email technik@ungleich.ch \
|
||||||
|
--renew-hook "cp ${ETC}/letsencrypt/live/${name}/*.pem ${SLAPD_DIR}/sasl2 && chown -R openldap:openldap ${SLAPD_DIR}/sasl2 && service slapd restart" \
|
||||||
|
--automatic-renewal ${staging}
|
||||||
|
fi
|
||||||
|
|
||||||
|
require="__package/slapd" __directory ${SLAPD_DIR}/slapd.d --state absent
|
||||||
|
|
||||||
|
if [ -z "${_skip_letsencrypt_cert}" ]; then
|
||||||
|
require="__package/slapd __letsencrypt_cert/${name}" \
|
||||||
|
__file ${SLAPD_DIR}/slapd.conf --owner root --group root --mode 644 \
|
||||||
|
--source "${ldapconf}"
|
||||||
|
else
|
||||||
|
require="__package/slapd" \
|
||||||
|
__file ${SLAPD_DIR}/slapd.conf --owner root --group root --mode 644 \
|
||||||
|
--source "${ldapconf}"
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Start slapd.conf
|
||||||
|
cat << EOF > "${ldapconf}"
|
||||||
|
pidfile ${SLAPD_RUN_DIR}/slapd.pid
|
||||||
|
argsfile ${SLAPD_RUN_DIR}/slapd.args
|
||||||
|
|
||||||
|
TLSCipherSuite NORMAL
|
||||||
|
TLSCertificateFile ${tls_cert}
|
||||||
|
TLSCertificateKeyFile ${tls_privkey}
|
||||||
|
TLSCACertificateFile ${tls_ca}
|
||||||
|
|
||||||
|
disallow bind_anon
|
||||||
|
require bind
|
||||||
|
security tls=1
|
||||||
|
|
||||||
|
include ${SLAPD_DIR}/schema/corba.schema
|
||||||
|
include ${SLAPD_DIR}/schema/core.schema
|
||||||
|
include ${SLAPD_DIR}/schema/cosine.schema
|
||||||
|
include ${SLAPD_DIR}/schema/duaconf.schema
|
||||||
|
include ${SLAPD_DIR}/schema/dyngroup.schema
|
||||||
|
include ${SLAPD_DIR}/schema/inetorgperson.schema
|
||||||
|
include ${SLAPD_DIR}/schema/java.schema
|
||||||
|
include ${SLAPD_DIR}/schema/misc.schema
|
||||||
|
include ${SLAPD_DIR}/schema/nis.schema
|
||||||
|
include ${SLAPD_DIR}/schema/openldap.schema
|
||||||
|
include ${SLAPD_DIR}/schema/ppolicy.schema
|
||||||
|
include ${SLAPD_DIR}/schema/collective.schema
|
||||||
|
|
||||||
|
modulepath ${SLAPD_MODULE_PATH}
|
||||||
|
EOF
|
||||||
|
|
||||||
|
# Add specified modules
|
||||||
|
for module in ${slapd_modules}; do
|
||||||
|
echo "moduleload ${module}.la" >> "${ldapconf}"
|
||||||
|
done
|
||||||
|
|
||||||
|
# Rest of the config
|
||||||
|
cat << EOF >> "${ldapconf}"
|
||||||
|
loglevel 1024
|
||||||
|
|
||||||
|
database mdb
|
||||||
|
maxsize 1073741824
|
||||||
|
|
||||||
|
suffix "${suffix}"
|
||||||
|
directory ${SLAPD_DATA_DIR}
|
||||||
|
rootdn "${manager_dn}"
|
||||||
|
rootpw "${manager_password_hash}"
|
||||||
|
|
||||||
|
index objectClass eq,pres
|
||||||
|
index ou,cn,mail,surname,givenname eq,pres,sub
|
||||||
|
index uidNumber,gidNumber,loginShell eq,pres
|
||||||
|
index uid,memberUid eq,pres,sub
|
||||||
|
index nisMapName,nisMapEntry eq,pres,sub
|
||||||
|
index entryCSN,entryUUID eq
|
||||||
|
|
||||||
|
serverid ${serverid}
|
||||||
|
EOF
|
||||||
|
|
||||||
|
# Setup replication
|
||||||
|
if [ "${replication}" ]; then
|
||||||
|
rid=1;
|
||||||
|
for syncrepl in ${syncrepl_hosts}; do
|
||||||
|
cat <<EOF >> "${ldapconf}"
|
||||||
|
syncrepl rid=${rid}
|
||||||
|
provider=ldap://${syncrepl}
|
||||||
|
bindmethod=simple
|
||||||
|
starttls=yes
|
||||||
|
binddn="${manager_dn}"
|
||||||
|
credentials=${syncrepl_credentials}
|
||||||
|
searchbase="${syncrepl_searchbase}"
|
||||||
|
type=refreshAndPersist
|
||||||
|
retry="5 + 5 +"
|
||||||
|
interval=00:00:00:05
|
||||||
|
EOF
|
||||||
|
rid=$((rid + 1))
|
||||||
|
done
|
||||||
|
cat <<EOF >> "${ldapconf}"
|
||||||
|
mirrormode true
|
||||||
|
overlay syncprov
|
||||||
|
syncprov-checkpoint 100 5
|
||||||
|
syncprov-sessionlog 100
|
||||||
|
|
||||||
|
database monitor
|
||||||
|
limits dn.exact="${manager_dn}" time=unlimited size=unlimited
|
||||||
|
EOF
|
||||||
|
fi
|
2
cdist/conf/type/__openldap_server/parameter/boolean
Normal file
2
cdist/conf/type/__openldap_server/parameter/boolean
Normal file
|
@ -0,0 +1,2 @@
|
||||||
|
staging
|
||||||
|
replicate
|
4
cdist/conf/type/__openldap_server/parameter/optional
Normal file
4
cdist/conf/type/__openldap_server/parameter/optional
Normal file
|
@ -0,0 +1,4 @@
|
||||||
|
description
|
||||||
|
syncrepl-credentials
|
||||||
|
syncrepl-searchbase
|
||||||
|
tls-cert
|
|
@ -0,0 +1,2 @@
|
||||||
|
syncrepl-host
|
||||||
|
module
|
4
cdist/conf/type/__openldap_server/parameter/required
Normal file
4
cdist/conf/type/__openldap_server/parameter/required
Normal file
|
@ -0,0 +1,4 @@
|
||||||
|
manager-dn
|
||||||
|
manager-password-hash
|
||||||
|
serverid
|
||||||
|
suffix
|
Loading…
Reference in a new issue