puppet/ldap/manifests/init.pp

275 lines
7.6 KiB
Puppet

# Install and configure ldap authentication
#
# === Global variables
#
# $ldap_server:
# Array containing LDAP server URI's.
#
# $ldap_basedn:
# LDAP base DN.
#
# $ldap_login_umask:
# Default umask for LDAP users in OpenBSD, defaults to 077.
#
class ldap::auth inherits ldap::client {
$ldap_uri = inline_template('<%= ldap_server.join(" ") -%>')
case $operatingsystem {
CentOS: {
package { "nss_ldap":
ensure => installed,
}
exec { "authconfig --enableldap --enableldapauth --enableldapssl --ldapserver='${ldap_uri}' --ldapbasedn='${ldap_basedn}' --update":
path => "/bin:/usr/bin:/sbin:/usr/sbin",
unless => 'cat /etc/sysconfig/authconfig | egrep "^USELDAPAUTH=yes$|^USELDAP=yes$" | wc -l | egrep "^2$"',
before => [ Augeas["enable-ldap-ssl"],
File["/etc/openldap/ldap.conf"], ],
require => Package["nss_ldap"],
}
augeas { "pam-ldap-conf":
context => "/files/etc/ldap.conf",
changes => [ "set nss_paged_results yes",
"set pam_password exop",
"set ssl on", ],
onlyif => [ "get nss_paged_results != yes",
"get pam_password != exop",
"get ssl != on", ],
}
}
Ubuntu: {
package { "ldap-auth-client":
ensure => installed,
}
exec { "auth-client-config -t nss -p lac_ldap":
path => "/bin:/usr/bin:/sbin:/usr/sbin",
unless => "auth-client-config -t nss -p lac_ldap -s",
require => Package["ldap-auth-client"],
before => Augeas["pam-ldap-conf"],
notify => Exec["nssldap-update-ignoreusers"],
}
exec { "nssldap-update-ignoreusers":
path => "/bin:/usr/bin:/sbin:/usr/sbin",
refreshonly => true,
}
augeas { "pam-ldap-conf":
context => "/files/etc/ldap.conf",
changes => [ "set uri '${ldap_uri}'",
"set base ${ldap_basedn}",
"set nss_paged_results yes",
"set pam_password exop",
"set ssl on", ],
onlyif => [ "get uri != '${ldap_uri}'",
"get base != ${ldap_basedn}",
"get nss_paged_results != yes",
"get pam_password != exop",
"get ssl != on", ],
}
}
OpenBSD: {
if ! $ldap_login_umask {
$ldap_login_umask = "077"
}
package { "login_ldap":
ensure => installed,
}
file { "/etc/login.conf":
ensure => present,
content => template("ldap/login.conf.erb"),
mode => 0644,
owner => root,
group => wheel,
require => [ File["/etc/openldap/ldap.conf"],
Package["login_ldap"], ]
}
}
default: {
fail("ldap::auth not supported on ${operatingsystem}")
}
}
}
# Install and configure ldap client
#
# === Global variables
#
# $ldap_server:
# Array containing LDAP server URI's.
#
# $ldap_basedn:
# LDAP base DN.
#
class ldap::client {
package { "openldap-client":
name => $operatingsystem ? {
debian => "ldap-utils",
ubuntu => "ldap-utils",
openbsd => "openldap-client",
default => "openldap-clients",
},
ensure => $operatingsystem ? {
darwin => absent,
default => installed,
},
}
file { "/etc/openldap/ldap.conf":
ensure => present,
content => template("ldap/ldap.conf.erb"),
path => $operatingsystem ? {
debian => "/etc/ldap/ldap.conf",
ubuntu => "/etc/ldap/ldap.conf",
default => "/etc/openldap/ldap.conf",
},
mode => 0644,
owner => root,
group => $operatingsystem ? {
darwin => wheel,
openbsd => wheel,
default => root,
},
require => Package["openldap-client"],
}
}
# Install python ldap bindings.
#
class ldap::client::python {
package { "python-ldap":
name => $operatingsystem ? {
openbsd => "py-ldap",
default => "python-ldap",
},
ensure => installed,
}
}
# Install Ruby ldap bindings.
#
class ldap::client::ruby {
case $operatingsystem {
ubuntu,debian: {
$pkgname = regsubst($rubyversion, '^([0-9]+\.[0-9]+)\..*', 'libldap-ruby\1')
}
default: {
$pkgname = "ruby-ldap"
}
}
package { "ruby-ldap":
name => $pkgname,
ensure => installed,
}
}
# Install OpenLDAP server.
#
# $ldap_datadir:
# Directory for LDAP databases. Defaults to /srv/ldap.
#
class ldap::server {
if $ldap_datadir {
file { "${ldap_datadir}":
ensure => directory,
mode => 0700,
owner => ldap,
group => ldap,
require => Package["openldap-servers"],
}
file { "/srv/ldap":
ensure => link,
target => "${ldap_datadir}",
require => File["${ldap_datadir}"],
}
} else {
file { "/srv/ldap":
ensure => directory,
mode => 0700,
owner => ldap,
group => ldap,
require => Package["openldap-servers"],
}
}
package { [ "openldap-servers", "openldap-servers-overlays", ]:
ensure => installed,
}
service { "ldap":
ensure => running,
enable => true,
require => Package["openldap-servers"],
}
file { "/etc/openldap/slapd.conf":
ensure => present,
source => [ "puppet:///files/ldap/slapd.conf.${fqdn}",
"puppet:///files/ldap/slapd.conf", ],
mode => 0640,
owner => root,
group => ldap,
notify => Service["ldap"],
require => Package["openldap-servers"],
}
file { "/srv/ldap/DB_CONFIG":
ensure => present,
source => [ "puppet:///files/ldap/DB_CONFIG.${fqdn}",
"puppet:///files/ldap/DB_CONFIG",
"puppet:///modules/ldap/DB_CONFIG", ],
mode => 0644,
owner => root,
group => root,
require => Package["openldap-servers"],
}
ldap::server::schema { "apple-auth": }
ldap::server::schema { "apple": }
ldap::server::schema { "autofs": }
ldap::server::schema { "dnszone": }
ldap::server::schema { "hdb": }
ldap::server::schema { "openssh-lpk": }
ldap::server::schema { "rfc2307bis": }
ldap::server::schema { "samba": }
}
# Install custom schema to OpenLDAP.
#
# === Parameters
#
# $name:
# Schema name.
#
# === Sample usage
#
# ldap::server::schema { "samba": }
#
define ldap::server::schema() {
include ldap::server
file { "/etc/openldap/schema/${name}.schema":
ensure => present,
source => [ "puppet:///files/ldap/${name}.schema",
"puppet:///modules/ldap/${name}.schema", ],
mode => 0644,
owner => root,
group => root,
require => Package["openldap-servers"],
}
}