184 lines
		
	
	
		
			6.4 KiB
		
	
	
	
		
			Ruby
		
	
	
	
	
	
			
		
		
	
	
			184 lines
		
	
	
		
			6.4 KiB
		
	
	
	
		
			Ruby
		
	
	
	
	
	
| resource_name :dirsrv_instance
 | |
| 
 | |
| property :instance_name,  String,  name_property: true
 | |
| property :hostname,       String,  required: true
 | |
| property :admin_password, String,  required: true
 | |
| property :suffix,         String,  required: true
 | |
| property :admin_username, String,  default: 'admin'
 | |
| property :bind_dn,        String,  default: 'cn=Directory Manager'
 | |
| property :port,           Integer, default: 389
 | |
| 
 | |
| action :create do
 | |
|   include_recipe "apt"
 | |
|   package "389-ds-base"
 | |
|   package "python3-lib389"
 | |
| 
 | |
|   include_recipe "ulimit"
 | |
|   user_ulimit "dirsrv" do
 | |
|     filehandle_limit 40960
 | |
|   end
 | |
| 
 | |
|   config = {
 | |
|     instance_name:  new_resource.instance_name,
 | |
|     hostname:       new_resource.hostname,
 | |
|     suffix:         new_resource.suffix,
 | |
|     port:           new_resource.port,
 | |
|     bind_dn:        new_resource.bind_dn,
 | |
|     admin_username: new_resource.admin_username,
 | |
|     admin_password: new_resource.admin_password,
 | |
|     base_dir:       "/var/lib/dirsrv",
 | |
|     conf_dir:       "/etc/dirsrv"
 | |
|   }
 | |
| 
 | |
|   inst_dir = "/etc/dirsrv/slapd-#{new_resource.instance_name}"
 | |
|   service_name = "dirsrv@#{new_resource.instance_name}"
 | |
| 
 | |
|   unless ::Dir.exists?(inst_dir)
 | |
|     setup_config = "#{config[:conf_dir]}/setup-#{new_resource.instance_name}.inf"
 | |
|     template setup_config do
 | |
|       source "setup.inf.erb"
 | |
|       mode "0600"
 | |
|       owner "root"
 | |
|       group "root"
 | |
|       sensitive true
 | |
|       variables config
 | |
|     end
 | |
| 
 | |
|     execute "setup-#{new_resource.instance_name}" do
 | |
|       command "setup-ds --silent --file #{setup_config}"
 | |
|       creates ::File.join inst_dir, 'dse.ldif'
 | |
|       action :nothing
 | |
|       subscribes :run, "template[#{setup_config}]", :immediately
 | |
|       notifies :restart, "service[#{service_name}]", :immediately
 | |
|       notifies :delete, "template[#{setup_config}]", :immediately
 | |
|       notifies :run, "execute[set base acis]", :delayed
 | |
|       notifies :run, "execute[add users group]", :delayed
 | |
|       notifies :run, "execute[disable anonymous access]", :delayed
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   service service_name do
 | |
|     action [:start]
 | |
|   end
 | |
| 
 | |
|   # :enable on the dirsrv@master service creates the wrong file
 | |
|   # (/etc/systemd/system/dirsrv.target.wants/dirsrv@master.service), seems to
 | |
|   # be a Chef bug. Let's do it manually
 | |
|   link "/etc/systemd/system/multi-user.target.wants/dirsrv@master.service" do
 | |
|     to "/lib/systemd/system/dirsrv@.service"
 | |
|   end
 | |
| 
 | |
|   cookbook_file "#{Chef::Config[:file_cache_path]}/acis.ldif" do
 | |
|     source "acis.ldif"
 | |
|     owner "root"
 | |
|     group "root"
 | |
|   end
 | |
| 
 | |
|   execute "set base acis" do
 | |
|     command "ldapmodify -x -w #{new_resource.admin_password} -D '#{new_resource.bind_dn}' -f '#{Chef::Config[:file_cache_path]}/acis.ldif' -p #{new_resource.port} -h localhost"
 | |
|     sensitive true
 | |
|     action :nothing
 | |
|   end
 | |
| 
 | |
|   cookbook_file "#{Chef::Config[:file_cache_path]}/users.ldif" do
 | |
|     source "users.ldif"
 | |
|     owner "root"
 | |
|     group "root"
 | |
|   end
 | |
| 
 | |
|   execute "add users group" do
 | |
|     command "ldapadd -x -w #{new_resource.admin_password} -D '#{new_resource.bind_dn}' -f '#{Chef::Config[:file_cache_path]}/users.ldif' -p #{new_resource.port} -h localhost"
 | |
|     sensitive true
 | |
|     action :nothing
 | |
|   end
 | |
| 
 | |
|   file "#{Chef::Config[:file_cache_path]}/disable_anonymous_access.ldif" do
 | |
|     content <<-EOF
 | |
| dn: cn=config
 | |
| changetype: modify
 | |
| replace: nsslapd-allow-anonymous-access
 | |
| nsslapd-allow-anonymous-access: off
 | |
|     EOF
 | |
|     owner "root"
 | |
|     group "root"
 | |
|   end
 | |
| 
 | |
|   execute "disable anonymous access" do
 | |
|     command "ldapmodify -x -w #{new_resource.admin_password} -D '#{new_resource.bind_dn}' -f '#{Chef::Config[:file_cache_path]}/disable_anonymous_access.ldif' -p #{new_resource.port} -h localhost"
 | |
|     sensitive true
 | |
|     action :nothing
 | |
|   end
 | |
| 
 | |
|   unless node.chef_environment == "development"
 | |
|     package "libnss3-tools" # provides pk12util
 | |
| 
 | |
|     cookbook_file "#{Chef::Config[:file_cache_path]}/tls.ldif" do
 | |
|       source "tls.ldif"
 | |
|       owner "root"
 | |
|       group "root"
 | |
|     end
 | |
| 
 | |
|     include_recipe "kosmos-nginx"
 | |
|     include_recipe "kosmos-base::letsencrypt"
 | |
| 
 | |
|     dirsrv_hook = <<-EOF
 | |
| #!/usr/bin/env bash
 | |
| 
 | |
| set -e
 | |
| 
 | |
| # Copy the dirsrv certificate and restart the server if it has been renewed
 | |
| # This is necessary because dirsrv uses a different format for the certificates
 | |
| for domain in $RENEWED_DOMAINS; do
 | |
|   case $domain in
 | |
|   #{new_resource.hostname})
 | |
|     openssl pkcs12 -export -in "${RENEWED_LINEAGE}/fullchain.pem" -inkey "${RENEWED_LINEAGE}/privkey.pem" -out #{Chef::Config[:file_cache_path]}/#{new_resource.hostname}.p12 -name 'Server-Cert' -passout pass:
 | |
|     pk12util -i #{Chef::Config[:file_cache_path]}/#{new_resource.hostname}.p12 -d #{inst_dir} -W ''
 | |
|     # Remove the encryption key entries from the current database.
 | |
|     # They will be recreated on restart for the new certificate
 | |
|     awk '! /^dn: cn=3D|AES,cn=encrypted attribute keys,cn=userRoot/ {print; printf "\\n" ; }' RS="" #{inst_dir}/dse.ldif > #{inst_dir}/dse_new.ldif
 | |
|     mv #{inst_dir}/dse_new.ldif #{inst_dir}/dse.ldif
 | |
|     systemctl restart #{service_name}
 | |
|     ;;
 | |
|   esac
 | |
| done
 | |
|     EOF
 | |
| 
 | |
|     file "/etc/letsencrypt/renewal-hooks/deploy/dirsrv" do
 | |
|       content dirsrv_hook
 | |
|       mode 0755
 | |
|       owner "root"
 | |
|       group "root"
 | |
|     end
 | |
| 
 | |
|     template "#{node['nginx']['dir']}/sites-available/#{new_resource.hostname}" do
 | |
|       source 'nginx_conf_empty.erb'
 | |
|       owner node["nginx"]["user"]
 | |
|       mode 0640
 | |
|       notifies :reload, 'service[nginx]', :delayed
 | |
|     end
 | |
| 
 | |
|     nginx_certbot_site new_resource.hostname do
 | |
|       notifies :run, "execute[letsencrypt cert for #{new_resource.hostname}]", :delayed
 | |
|     end
 | |
| 
 | |
|     # Generate a Let's Encrypt cert (only if the nginx vhost exists and no cert
 | |
|     # has been generated before. The renew cron will take care of renewing
 | |
|     execute "letsencrypt cert for #{new_resource.hostname}" do
 | |
|       root_directory = "/var/www/#{new_resource.hostname}"
 | |
|       command "certbot certonly --webroot --agree-tos --email ops@kosmos.org --webroot-path #{root_directory} --deploy-hook /etc/letsencrypt/renewal-hooks/deploy/dirsrv -d #{new_resource.hostname} -n"
 | |
|       only_if do
 | |
|         ::File.exist?("#{node['nginx']['dir']}/sites-enabled/#{new_resource.hostname}_certbot") &&
 | |
|           !::File.exist?("/etc/letsencrypt/live/#{new_resource.hostname}/fullchain.pem")
 | |
|       end
 | |
|       notifies :run, "execute[add tls config]", :immediately
 | |
|     end
 | |
| 
 | |
|     execute "add tls config" do
 | |
|       command "ldapadd -x -w #{new_resource.admin_password} -D '#{new_resource.bind_dn}' -f '#{Chef::Config[:file_cache_path]}/tls.ldif' -p #{new_resource.port} -h localhost"
 | |
|       sensitive true
 | |
|       action :nothing
 | |
|       notifies :restart, "service[#{service_name}]", :immediately
 | |
|     end
 | |
|   end
 | |
| end
 |