Use a custom resource to create a 389 Directory Server instance

This replaces the default recipe and will make it much easier to create
other types of instances, for example for replication
This commit is contained in:
Greg 2019-11-29 14:34:52 +01:00
parent 65eca52b75
commit dc91128eca
6 changed files with 146 additions and 143 deletions

View File

@ -1,24 +0,0 @@
{
"id": "389",
"bind_dn": {
"encrypted_data": "PAe/xCFVzL7pwIfoIppewvx6k9rwYWNZKT9ZcZOm9Et0EcV0yrDo\n",
"iv": "rfIdXDbcfzBn98ld\n",
"auth_tag": "2YVDjVV9MCM1Mj8bylm2Ew==\n",
"version": 3,
"cipher": "aes-256-gcm"
},
"password": {
"encrypted_data": "OWt9gh5k+N/Vn1ko6FAcd0GECdozzsSkv44oxBAqVY/obHc=\n",
"iv": "PkFuXiB5y++4qE7k\n",
"auth_tag": "/1QXYOb8rhkX1qTIYVSipg==\n",
"version": 3,
"cipher": "aes-256-gcm"
},
"username": {
"encrypted_data": "ZdwTaB+T8qe2F9vJ5KssZVs/elnTnU1K\n",
"iv": "BoBhvqkz/2aEvFsh\n",
"auth_tag": "fSOwmozRZCI7958VzikMbg==\n",
"version": 3,
"cipher": "aes-256-gcm"
}
}

View File

@ -0,0 +1,10 @@
{
"id": "dirsrv",
"admin_password": {
"encrypted_data": "i71l5E129mXCcDAyME8sNMUkYUlQMgt7Eh6noyFcLNgbaMo=\n",
"iv": "KNW2B8tpX7ywZwbg\n",
"auth_tag": "GawQ+FSlA5v5YVyryeUxng==\n",
"version": 3,
"cipher": "aes-256-gcm"
}
}

View File

@ -1 +0,0 @@
node.default["kosmos-dirsrv"]["nginx"]["domain"] = "ldap.kosmos.org"

View File

@ -24,110 +24,10 @@
# OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
# THE SOFTWARE.
include_recipe "apt"
package "389-ds-base"
credentials = data_bag_item("credentials", "dirsrv")
include_recipe "ulimit"
user_ulimit "dirsrv" do
filehandle_limit 40960
end
credentials = data_bag_item("credentials", "389")
config = {
instance: node[:hostname],
suffix: "dc=kosmos,dc=org",
port: 389,
credentials: credentials,
base_dir: "/var/lib/dirsrv",
conf_dir: "/etc/dirsrv"
}
inst_dir = "/etc/dirsrv/slapd-#{config[:instance]}"
service_name = "dirsrv@#{config[:instance]}"
unless ::Dir.exists?(inst_dir)
setup_config = "#{config[:conf_dir]}/setup-#{config[:instance]}.inf"
template setup_config do
source "setup.inf.erb"
mode "0600"
owner "root"
group "root"
sensitive true
variables config
end
execute "setup-#{config[:instance]}" do
command "setup-ds --silent --file #{setup_config}"
creates ::File.join inst_dir, 'dse.ldif'
action :nothing
subscribes :run, "template[#{setup_config}]", :immediately
notifies :restart, "service[#{service_name}]", :immediately
notifies :delete, "template[#{setup_config}]", :immediately
notifies :run, "execute[add users group]", :delayed
end
end
service service_name do
action [:enable, :start]
end
cookbook_file "#{Chef::Config[:file_cache_path]}/users.ldif" do
source "users.ldif"
owner "root"
group "root"
end
execute "add users group" do
command "ldapadd -x -w #{credentials['password']} -D 'cn=Directory Manager' -f '#{Chef::Config[:file_cache_path]}/users.ldif'"
sensitive true
action :nothing
end
unless node.chef_environment == "development"
cookbook_file "#{Chef::Config[:file_cache_path]}/tls.ldif" do
source "tls.ldif"
owner "root"
group "root"
end
include_recipe "kosmos-nginx"
domain = node["kosmos-dirsrv"]["nginx"]["domain"]
nginx_certbot_site domain do
notifies :run, "execute[generate p12 cert]", :immediately
end
# Merge the full chain and private key into one cert, to import into the
# dirsrv dir
execute "generate p12 cert" do
command "openssl pkcs12 -export -in /etc/letsencrypt/live/#{domain}/fullchain.pem -inkey /etc/letsencrypt/live/#{domain}/privkey.pem -out #{Chef::Config[:file_cache_path]}/#{domain}.p12 -name 'Server-Cert'"
action :nothing
notifies :run, "execute[import p12 cert]", :immediately
end
execute "import p12 cert" do
command "pk12util -i #{Chef::Config[:file_cache_path]}/#{domain}.p12 -d #{inst_dir}"
action :nothing
notifies :run, "execute[add tls config]", :immediately
end
execute "add tls config" do
command "ldapadd -x -w #{credentials['password']} -D 'cn=Directory Manager' -f '#{Chef::Config[:file_cache_path]}/tls.ldif'"
sensitive true
action :nothing
end
include_recipe "firewall"
firewall_rule "ldap" do
port [config[:port], 636]
protocol :tcp
command :allow
end
# backup the data dir and the config files
node.override["backup"]["archives"]["dirsrv"] = ["/etc/dirsrv", "/var/lib/dirsrv"]
include_recipe "backup"
dirsrv_instance "master" do
hostname "ldap.kosmos.org"
admin_password credentials['admin_password']
suffix "dc=kosmos,dc=org"
end

View File

@ -0,0 +1,118 @@
resource_name :dirsrv_instance
property :instance_name, String, name_property: true
property :hostname, String, required: true
property :admin_password, String, required: true
property :suffix, String, required: true
property :admin_username, String, default: 'admin'
property :bind_dn, String, default: 'cn=Directory Manager'
property :port, Integer, default: 389
action :create do
include_recipe "apt"
package "389-ds-base"
include_recipe "ulimit"
user_ulimit "dirsrv" do
filehandle_limit 40960
end
config = {
instance_name: new_resource.instance_name,
hostname: new_resource.hostname,
suffix: new_resource.suffix,
port: new_resource.port,
bind_dn: new_resource.bind_dn,
admin_username: new_resource.admin_username,
admin_password: new_resource.admin_password,
base_dir: "/var/lib/dirsrv",
conf_dir: "/etc/dirsrv"
}
inst_dir = "/etc/dirsrv/slapd-#{new_resource.instance_name}"
service_name = "dirsrv@#{new_resource.instance_name}"
unless ::Dir.exists?(inst_dir)
setup_config = "#{config[:conf_dir]}/setup-#{new_resource.instance_name}.inf"
template setup_config do
source "setup.inf.erb"
mode "0600"
owner "root"
group "root"
sensitive true
variables config
end
execute "setup-#{new_resource.instance_name}" do
command "setup-ds --silent --file #{setup_config}"
creates ::File.join inst_dir, 'dse.ldif'
action :nothing
subscribes :run, "template[#{setup_config}]", :immediately
notifies :restart, "service[#{service_name}]", :immediately
notifies :delete, "template[#{setup_config}]", :immediately
notifies :run, "execute[add users group]", :delayed
end
end
service service_name do
action [:enable, :start]
end
cookbook_file "#{Chef::Config[:file_cache_path]}/users.ldif" do
source "users.ldif"
owner "root"
group "root"
end
execute "add users group" do
command "ldapadd -x -w #{new_resource.admin_password} -D '#{new_resource.bind_dn}' -f '#{Chef::Config[:file_cache_path]}/users.ldif' -p #{new_resource.port} -h localhost"
sensitive true
action :nothing
end
unless node.chef_environment == "development"
cookbook_file "#{Chef::Config[:file_cache_path]}/tls.ldif" do
source "tls.ldif"
owner "root"
group "root"
end
include_recipe "kosmos-nginx"
nginx_certbot_site new_resource.hostname do
notifies :run, "execute[generate p12 cert]", :immediately
end
# Merge the full chain and private key into one cert, to import into the
# dirsrv dir
execute "generate p12 cert" do
command "openssl pkcs12 -export -in /etc/letsencrypt/live/#{new_resource.hostname}/fullchain.pem -inkey /etc/letsencrypt/live/#{new_resource.hostname}/privkey.pem -out #{Chef::Config[:file_cache_path]}/#{new_resource.hostname}.p12 -name 'Server-Cert'"
action :nothing
notifies :run, "execute[import p12 cert]", :immediately
end
execute "import p12 cert" do
command "pk12util -i #{Chef::Config[:file_cache_path]}/#{new_resource.hostname}.p12 -d #{inst_dir}"
action :nothing
notifies :run, "execute[add tls config]", :immediately
end
execute "add tls config" do
command "ldapadd -x -w #{new_resource.admin_password} -D '#{new_resource.bind_dn}' -f '#{Chef::Config[:file_cache_path]}/tls.ldif' -p #{new_resource.port} -h localhost"
sensitive true
action :nothing
end
include_recipe "firewall"
firewall_rule "ldap" do
port [config[:port], 636]
protocol :tcp
command :allow
end
# backup the data dir and the config files
node.override["backup"]["archives"]["dirsrv"] = ["/etc/dirsrv", "/var/lib/dirsrv"]
include_recipe "backup"
end
end

View File

@ -6,16 +6,16 @@ SuiteSpotUserID = dirsrv
<% if @cfgdir_domain %>
AdminDomain = <%= @cfgdir_domain %>
<% end -%>
ConfigDirectoryAdminID = <%= @cfgdir_credentials['username'] %>
ConfigDirectoryAdminPwd = <%= @cfgdir_credentials['password'] %>
ConfigDirectoryAdminID = <%= @admin_username %>
ConfigDirectoryAdminPwd = <%= @admin_password %>
ConfigDirectoryLdapURL = ldap://<%= @cfgdir_addr %>:<%= @cfgdir_ldap_port %>/o=NetscapeRoot
<% end -%>
<% if @is_cfgdir -%>
[admin]
Port = <%= @cfgdir_http_port %>
ServerAdminID = <%= @cfgdir_credentials['username'] %>
ServerAdminPwd = <%= @cfgdir_credentials['password'] %>
ServerAdminID = <%= @admin_username %>
ServerAdminPwd = <%= @admin_password %>
ServerIpAddress = <%= @cfgdir_addr %>
SysUser = dirsrv
<% end -%>
@ -24,14 +24,14 @@ SysUser = dirsrv
AddOrgEntries = <%= @add_org_entries %>
AddSampleEntries = <%= @add_sample_entries %>
InstallLdifFile = <%= @preseed_ldif %>
RootDN = <%= @credentials['bind_dn'] %>
RootDNPwd = <%= @credentials['password'] %>
ServerIdentifier = <%= @instance %>
RootDN = <%= @bind_dn %>
RootDNPwd = <%= @admin_password %>
ServerIdentifier = <%= @instance_name %>
ServerPort = <%= @port %>
Suffix = <%= @suffix %>
cert_dir = <%= @conf_dir %>/slapd-<%= @instance %>
config_dir = <%= @conf_dir %>/slapd-<%= @instance %>
bak_dir = <%= @base_dir %>/slapd-<%= @instance %>/bak
db_dir = <%= @base_dir %>/slapd-<%= @instance %>/db
ldif_dir = <%= @base_dir %>/slapd-<%= @instance %>/ldif
schema_dir = <%= @conf_dir %>/slapd-<%= @instance %>/schema
cert_dir = <%= @conf_dir %>/slapd-<%= @instance_name %>
config_dir = <%= @conf_dir %>/slapd-<%= @instance_name %>
bak_dir = <%= @base_dir %>/slapd-<%= @instance_name %>/bak
db_dir = <%= @base_dir %>/slapd-<%= @instance_name %>/db
ldif_dir = <%= @base_dir %>/slapd-<%= @instance_name %>/ldif
schema_dir = <%= @conf_dir %>/slapd-<%= @instance_name %>/schema