Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

manage sssd config on ipa clients #244

Merged
merged 4 commits into from
Nov 5, 2020
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
36 changes: 33 additions & 3 deletions hieradata/org/lsst.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -27,6 +27,9 @@ lookup_options:
profile::core::ipset::set:
merge:
strategy: "deep"
sssd::domains:
merge:
strategy: "deep"

timezone::timezone: "UTC"
chrony::leapsectz: "right/UTC"
Expand Down Expand Up @@ -78,11 +81,12 @@ easy_ipa::ipa_master_fqdn: "ipa1.tuc.lsst.cloud"
# easy_ipa client options
easy_ipa::ipa_role: "client"
easy_ipa::configure_ntp: false
easy_ipa::install_epel: false
easy_ipa::configure_sshd: false
easy_ipa::install_autofs: false
easy_ipa::install_sssdtools: false
easy_ipa::install_epel: false
easy_ipa::install_kstart: false
easy_ipa::configure_sshd: false
easy_ipa::install_sssd: false
easy_ipa::install_sssdtools: false
ssh::client_options:
GlobalKnownHostsFile: "/var/lib/sss/pubconf/known_hosts"
PubkeyAuthentication: "yes"
Expand Down Expand Up @@ -211,3 +215,29 @@ profile::core::ipset::set:
- "139.229.0.0/16"
- "198.19.0.0/16"
- "10.0.0.0/8"

# sssd ipa client setup -- do not use on ipa servers
sssd::domains:
"%{lookup('easy_ipa::domain')}":
cache_credentials: true
krb5_store_password_if_offline: true
ipa_domain: "%{lookup('easy_ipa::domain')}"
id_provider: "ipa"
auth_provider: "ipa"
access_provider: "ipa"
ldap_tls_cacert: "/etc/ipa/ca.crt"
ipa_hostname: "%{facts.fqdn}"
chpass_provider: "ipa"
ipa_server:
- "_srv_"
- "%{lookup('easy_ipa::ipa_master_fqdn')}"
dns_discovery_domain: "%{lookup('easy_ipa::domain')}"
sssd::services:
nss:
homedir_substring: "/home"
sudo: {}
pam: {}
ssh: {}
sssd::package_name:
- "sssd"
- "sssd-tools" # not installed by default
6 changes: 6 additions & 0 deletions hieradata/org/lsst/role/ipamaster.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -3,6 +3,7 @@ classes:
- "profile::core::common"
- "easy_ipa"

profile::core::common::manage_sssd: false
profile::icinga::agent::host_template: "IpaTemplate"
easy_ipa::ipa_role: "master"
easy_ipa::install_ipa_server: true
Expand All @@ -13,3 +14,8 @@ easy_ipa::webui_force_https: true
easy_ipa::configure_dns_server: false
easy_ipa::ipa_server_fqdn: "%{facts.fqdn}"
easy_ipa::ip_address: "%{facts.networking.ip}"

# enable easy_ipa management of sssd packages on servers
easy_ipa::install_sssd: true
easy_ipa::install_sssdtools: true
easy_ipa::sssdtools: true
6 changes: 6 additions & 0 deletions hieradata/org/lsst/role/ipareplica.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -3,6 +3,7 @@ classes:
- "profile::core::common"
- "easy_ipa"

profile::core::common::manage_sssd: false
profile::icinga::agent::host_template: "IpaTemplate"
easy_ipa::ipa_role: "replica"
easy_ipa::configure_replica_ca: true
Expand All @@ -14,3 +15,8 @@ easy_ipa::webui_force_https: true
easy_ipa::configure_dns_server: false
easy_ipa::ipa_server_fqdn: "%{facts.fqdn}"
easy_ipa::ip_address: "%{facts.networking.ip}"

# enable easy_ipa management of sssd packages on servers
easy_ipa::install_sssd: true
easy_ipa::install_sssdtools: true
easy_ipa::sssdtools: true
6 changes: 6 additions & 0 deletions hieradata/site/cp.yaml
Original file line number Diff line number Diff line change
@@ -1,5 +1,11 @@
---
easy_ipa::ipa_master_fqdn: "ipa1.cp.lsst.org"
# sssd ipa client setup -- do not use on ipa servers
sssd::domains:
"lsst.cloud":
ipa_server:
- "_srv_"
- "%{lookup('easy_ipa::ipa_master_fqdn')}"

rsyslog::config::actions:
#Send copy to logs to GKE Graylog instance
Expand Down
8 changes: 7 additions & 1 deletion hieradata/site/dev.yaml
Original file line number Diff line number Diff line change
@@ -1,6 +1,12 @@
---
easy_ipa::ipa_master_fqdn: "ipa1.dev.lsst.org"
#
# sssd ipa client setup -- do not use on ipa servers
sssd::domains:
"lsst.cloud":
ipa_server:
- "_srv_"
- "%{lookup('easy_ipa::ipa_master_fqdn')}"

rsyslog::config::actions:
#Send copy to logs to Ruka Cluster
graylogCloud:
Expand Down
8 changes: 7 additions & 1 deletion hieradata/site/ls.yaml
Original file line number Diff line number Diff line change
@@ -1,6 +1,12 @@
---
easy_ipa::ipa_master_fqdn: "ipa1.ls.lsst.org"
#
# sssd ipa client setup -- do not use on ipa servers
sssd::domains:
"lsst.cloud":
ipa_server:
- "_srv_"
- "%{lookup('easy_ipa::ipa_master_fqdn')}"

rsyslog::config::actions:
#Send copy to logs to GKE Graylog instance
graylogCloud:
Expand Down
7 changes: 7 additions & 0 deletions site/profile/manifests/core/common.pp
Original file line number Diff line number Diff line change
Expand Up @@ -16,6 +16,7 @@
Boolean $deploy_icinga_agent = false,
Boolean $manage_puppet_agent = true,
Boolean $manage_chrony = true,
Boolean $manage_sssd = true,
){
include accounts
include augeas
Expand Down Expand Up @@ -49,4 +50,10 @@
if $manage_chrony {
include chrony
}

if $manage_sssd {
include sssd
# run ipa-install-* script before trying to managing sssd.conf
Class[easy_ipa] -> Class[sssd]
}
}