Compare commits
7 Commits
33926386ed
...
transcaffe
Author | SHA1 | Date | |
---|---|---|---|
fb13bd55bf
|
|||
c31e13a975
|
|||
1e0f4a0dbf
|
|||
682307c35d
|
|||
27f05a1a34
|
|||
669a97adcb
|
|||
8315d822ee
|
15
roles/git/defaults/main.yml
Normal file
15
roles/git/defaults/main.yml
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
---
|
||||||
|
|
||||||
|
git_config_file: ~/.gitconfig
|
||||||
|
|
||||||
|
git_config_gpg_program: gpg2
|
||||||
|
git_config_commit_gpgsign: false
|
||||||
|
git_config_pull_rebase: true
|
||||||
|
git_config_pull_ff: only
|
||||||
|
git_config_rebase_autostash: true
|
||||||
|
git_config_merge_autostash: true
|
||||||
|
git_config_init_default_branch: main
|
||||||
|
git_config_core_editor: vim
|
||||||
|
|
||||||
|
git_config_user: []
|
||||||
|
git_config_credentials: []
|
45
roles/git/tasks/main.yml
Normal file
45
roles/git/tasks/main.yml
Normal file
@ -0,0 +1,45 @@
|
|||||||
|
---
|
||||||
|
|
||||||
|
- name: Ensure git configuration is persisted in git configs file
|
||||||
|
blockinfile:
|
||||||
|
dest: "{{ git_config_file }}"
|
||||||
|
mode: "0660"
|
||||||
|
create: yes
|
||||||
|
state: present
|
||||||
|
marker: "#{mark} ANSIBLE MANAGED BLOCK by finallycoffee.base.git"
|
||||||
|
block: |+2
|
||||||
|
{% if git_config_user_name|default(false, true) and git_config_user_email|default(false, true) %}
|
||||||
|
[user]
|
||||||
|
name = {{ git_config_user_name }}
|
||||||
|
email = {{ git_config_user_email }}
|
||||||
|
{% if git_config_user_signingkey %}
|
||||||
|
signingkey = {{ git_config_user_signingkey }}
|
||||||
|
{% endif %}
|
||||||
|
{% endif %}
|
||||||
|
[gpg]
|
||||||
|
program = {{ git_config_gpg_program }}
|
||||||
|
[core]
|
||||||
|
editor = {{ git_config_core_editor }}
|
||||||
|
[commit]
|
||||||
|
gpgsign = {{ git_config_commit_gpgsign }}
|
||||||
|
[pull]
|
||||||
|
rebase = {{ git_config_pull_rebase }}
|
||||||
|
ff = {{ git_config_pull_ff }}
|
||||||
|
[rebase]
|
||||||
|
autostash = {{ git_config_rebase_autostash }}
|
||||||
|
[merge]
|
||||||
|
autostash = {{ git_config_merge_autostash }}
|
||||||
|
[init]
|
||||||
|
defaultBranch = {{ git_config_init_default_branch }}
|
||||||
|
[alias]
|
||||||
|
{% for alias in git_config_alias %}
|
||||||
|
{{ alias.name }} = {{ alias.command }}
|
||||||
|
{% endfor %}
|
||||||
|
|
||||||
|
{% for credentialset in git_config_credentials %}
|
||||||
|
[credential "{{ credentialset.remote_url }}"]
|
||||||
|
{% for entry in credentialset.config | dict2items %}
|
||||||
|
{{ entry.key }} = {{ entry.value }}
|
||||||
|
{% endfor %}
|
||||||
|
|
||||||
|
{% endfor %}
|
32
roles/gnupg/defaults/main.yml
Normal file
32
roles/gnupg/defaults/main.yml
Normal file
@ -0,0 +1,32 @@
|
|||||||
|
---
|
||||||
|
|
||||||
|
gpg_config_folder: ~/.gnupg
|
||||||
|
gpg_config_file: "{{ gpg_config_folder }}/gpg.conf"
|
||||||
|
gpg_agent_config_file: "{{ gpg_config_folder }}/gpg-agent.conf"
|
||||||
|
gpg_scdaemon_config_file: "{{ gpg_config_folder }}/scdaemon.conf"
|
||||||
|
gpg_agent_sshcontrol_file: "{{ gpg_config_folder }}/sshcontrol"
|
||||||
|
gpg_configure_agent_script: "{{ gpg_config_folder }}/gpg-configure-as-ssh-agent.sh"
|
||||||
|
|
||||||
|
gpg_keygrips_for_ssh: []
|
||||||
|
|
||||||
|
gpg_config_cert_digest_algo: SHA256
|
||||||
|
gpg_config_emit_version: false
|
||||||
|
gpg_config_comments: false
|
||||||
|
gpg_config_ignore_time_conflict: false
|
||||||
|
gpg_config_allow_freeform_uid: true
|
||||||
|
gpg_config_keyid_format: 0xlong
|
||||||
|
gpg_config_with_fingerprint: true
|
||||||
|
|
||||||
|
gpg_config_keyserver: hkps://keys.openpgp.org
|
||||||
|
gpg_config_keyserver_options: []
|
||||||
|
|
||||||
|
gpg_agent_config_cache_ttl: 300
|
||||||
|
gpg_agent_config_cache_ttl_ssh: 300
|
||||||
|
gpg_agent_config_enable_ssh_support: false
|
||||||
|
gpg_agent_config_ignore_cache_for_signing: true
|
||||||
|
gpg_agent_config_allow_external_cache: false
|
||||||
|
|
||||||
|
gpg_scdaemon_config_driver: ~
|
||||||
|
gpg_scdaemon_config_card_timeout: ~
|
||||||
|
gpg_scdaemon_config_disable_ccid: false
|
||||||
|
gpg_scdaemon_config_pcsc_shared: true
|
14
roles/gnupg/files/gpg-configure-ssh-auth-socket.sh
Normal file
14
roles/gnupg/files/gpg-configure-ssh-auth-socket.sh
Normal file
@ -0,0 +1,14 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
|
||||||
|
rc=$(pgrep gpg-agent)
|
||||||
|
if [ "$rc" != 0 ]; then
|
||||||
|
export GPG_AGENT_INFO
|
||||||
|
export SSH_AUTH_SOCK
|
||||||
|
export SSH_AGENT_PID
|
||||||
|
else
|
||||||
|
eval $(gpg-agent --daemon)
|
||||||
|
fi
|
||||||
|
|
||||||
|
gpg-connect-agent /bye
|
||||||
|
export SSH_AUTH_SOCK=$(gpgconf --list-dirs agent-ssh-socket)
|
||||||
|
gpgconf --launch gpg-agent
|
56
roles/gnupg/tasks/main.yml
Normal file
56
roles/gnupg/tasks/main.yml
Normal file
@ -0,0 +1,56 @@
|
|||||||
|
---
|
||||||
|
|
||||||
|
- name: Ensure gnupg is installed (RedHat*)
|
||||||
|
package:
|
||||||
|
name: gnupg2
|
||||||
|
state: latest
|
||||||
|
become: true
|
||||||
|
when: ansible_os_family == "RedHat"
|
||||||
|
|
||||||
|
- name: Ensure gnupg is installed (Arch)
|
||||||
|
package:
|
||||||
|
name: gnupg
|
||||||
|
state: latest
|
||||||
|
become: true
|
||||||
|
when: ansible_os_family == "Archlinux"
|
||||||
|
|
||||||
|
- name: Ensure ~/.gnupg folder exists with correct permissions
|
||||||
|
file:
|
||||||
|
path: "{{ gpg_config_folder }}"
|
||||||
|
state: directory
|
||||||
|
mode: 0700
|
||||||
|
|
||||||
|
- name: Ensure gpg.conf is templated
|
||||||
|
template:
|
||||||
|
src: gpg.conf.j2
|
||||||
|
dest: "{{ gpg_config_file }}"
|
||||||
|
|
||||||
|
- name: Configure gpg-agent.conf (agent configuration)
|
||||||
|
template:
|
||||||
|
src: gpg-agent.conf.j2
|
||||||
|
dest: "{{ gpg_agent_config_file }}"
|
||||||
|
|
||||||
|
- name: Configure scdaemon.conf (smartcard daemon)
|
||||||
|
template:
|
||||||
|
src: scdaemon.conf.j2
|
||||||
|
dest: "{{ gpg_scdaemon_config_file }}"
|
||||||
|
|
||||||
|
- name: Configure sshcontrol (in order for gpg-agent to act as ssh-agent)
|
||||||
|
template:
|
||||||
|
src: sshcontrol.j2
|
||||||
|
dest: "{{ gpg_agent_sshcontrol_file }}"
|
||||||
|
when: gpg_agent_config_enable_ssh_support
|
||||||
|
|
||||||
|
- name: Copy gnupg_agent script, which makes gpg-agent responsible for ssh-auth
|
||||||
|
copy:
|
||||||
|
src: gpg-configure-ssh-auth-socket.sh
|
||||||
|
dest: "{{ gpg_configure_agent_script }}"
|
||||||
|
mode: 0700
|
||||||
|
when: gpg_agent_config_enable_ssh_support
|
||||||
|
|
||||||
|
- name: Ensure gnupg_agent script is included in bashrc
|
||||||
|
lineinfile:
|
||||||
|
path: "~/.bashrc"
|
||||||
|
line: "source {{ gpg_configure_agent_script }}"
|
||||||
|
state: present
|
||||||
|
when: gpg_agent_config_enable_ssh_support
|
13
roles/gnupg/templates/gpg-agent.conf.j2
Normal file
13
roles/gnupg/templates/gpg-agent.conf.j2
Normal file
@ -0,0 +1,13 @@
|
|||||||
|
default-cache-ttl {{ gpg_agent_config_cache_ttl }}
|
||||||
|
default-cache-ttl-ssh {{ gpg_agent_config_cache_ttl_ssh }}
|
||||||
|
max-cache-ttl {{ gpg_agent_config_cache_ttl }}
|
||||||
|
max-cache-ttl-ssh {{ gpg_agent_config_cache_ttl_ssh }}
|
||||||
|
{% if not gpg_agent_config_allow_external_cache %}
|
||||||
|
no-allow-external-cache
|
||||||
|
{% endif %}
|
||||||
|
{% if gpg_agent_config_enable_ssh_support %}
|
||||||
|
enable-ssh-support
|
||||||
|
{% endif %}
|
||||||
|
{% if gpg_agent_config_ignore_cache_for_signing %}
|
||||||
|
ignore-cache-for-signing
|
||||||
|
{% endif %}
|
32
roles/gnupg/templates/gpg.conf.j2
Normal file
32
roles/gnupg/templates/gpg.conf.j2
Normal file
@ -0,0 +1,32 @@
|
|||||||
|
{% if not gpg_config_emit_version %}
|
||||||
|
no-emit-version
|
||||||
|
{% endif %}
|
||||||
|
{% if not gpg_config_comments %}
|
||||||
|
no-comments
|
||||||
|
{% endif %}
|
||||||
|
cert-digest-algo {{ gpg_config_cert_digest_algo }}
|
||||||
|
personal-cipher-preferences AES AES256 AES192 CAST5
|
||||||
|
personal-digest-preferences SHA256 SHA512 SHA384 SHA224
|
||||||
|
{% if gpg_config_ignore_time_conflict %}
|
||||||
|
ignore-time-conflict
|
||||||
|
{% endif %}
|
||||||
|
{% if gpg_config_trusted_key %}
|
||||||
|
trusted-key {{ gpg_config_trusted_key }}
|
||||||
|
{% endif %}
|
||||||
|
|
||||||
|
# How to render keys
|
||||||
|
keyid-format {{ gpg_config_keyid_format }}
|
||||||
|
{% if gpg_config_with_fingerprint %}
|
||||||
|
with-fingerprint
|
||||||
|
{% endif %}
|
||||||
|
{% if gpg_config_allow_freeform_uid %}
|
||||||
|
allow-freeform-uid
|
||||||
|
{% endif %}
|
||||||
|
|
||||||
|
# Keyserver settings
|
||||||
|
{% if gpg_config_keyserver %}
|
||||||
|
keyserver {{ gpg_config_keyserver }}
|
||||||
|
{% endif %}
|
||||||
|
{% if gpg_config_keyserver_options %}
|
||||||
|
keyserver-options {{ gpg_config_keyserver_options | join(' ') }}
|
||||||
|
{% endif%}
|
12
roles/gnupg/templates/scdaemon.conf.j2
Normal file
12
roles/gnupg/templates/scdaemon.conf.j2
Normal file
@ -0,0 +1,12 @@
|
|||||||
|
{% if gpg_scdaemon_config_disable_ccid | default(false) %}
|
||||||
|
disable-ccid
|
||||||
|
{% endif %}
|
||||||
|
{% if gpg_scdaemon_config_card_timeout | default(false) %}
|
||||||
|
card-timeout {{ gpg_scdaemon_config_card_timeout }}
|
||||||
|
{% endif %}
|
||||||
|
{% if gpg_scdaemon_config_driver | default(false) %}
|
||||||
|
pcsc-driver {{ gpg_scdaemon_config_driver }}
|
||||||
|
{% endif %}
|
||||||
|
{% if gpg_scdaemon_config_pcsc_shared | default(true) %}
|
||||||
|
pcsc-shared
|
||||||
|
{% endif %}
|
14
roles/gnupg/templates/sshcontrol.j2
Normal file
14
roles/gnupg/templates/sshcontrol.j2
Normal file
@ -0,0 +1,14 @@
|
|||||||
|
# List of allowed ssh keys. Only keys present in this file are used
|
||||||
|
# in the SSH protocol. The ssh-add tool may add new entries to this
|
||||||
|
# file to enable them; you may also add them manually. Comment
|
||||||
|
# lines, like this one, as well as empty lines are ignored. Lines do
|
||||||
|
# have a certain length limit but this is not serious limitation as
|
||||||
|
# the format of the entries is fixed and checked by gpg-agent. A
|
||||||
|
# non-comment line starts with optional white spaces, followed by the
|
||||||
|
# keygrip of the key given as 40 hex digits, optionally followed by a
|
||||||
|
# caching TTL in seconds, and another optional field for arbitrary
|
||||||
|
# flags. Prepend the keygrip with an '!' mark to disable it.
|
||||||
|
|
||||||
|
{% for keygrip in gpg_keygrips_for_ssh %}
|
||||||
|
{{ keygrip }}
|
||||||
|
{% endfor %}
|
41
roles/nscd/defaults/main.yml
Normal file
41
roles/nscd/defaults/main.yml
Normal file
@ -0,0 +1,41 @@
|
|||||||
|
---
|
||||||
|
|
||||||
|
nscd_config_file: /etc/nscd.conf
|
||||||
|
|
||||||
|
nscd_config_password_enable_cache: true
|
||||||
|
nscd_config_password_positive_ttl_seconds: 300
|
||||||
|
nscd_config_password_negative_ttl_seconds: 10
|
||||||
|
nscd_config_password_suggested_size: 221
|
||||||
|
nscd_config_password_check_files: true
|
||||||
|
nscd_config_password_persistent: true
|
||||||
|
nscd_config_password_shared: true
|
||||||
|
nscd_config_password_max_db_size_bytes: 33554432
|
||||||
|
nscd_config_password_auto_propagate: yes
|
||||||
|
|
||||||
|
nscd_config_group_enable_cache: true
|
||||||
|
nscd_config_group_positive_ttl_seconds: 900
|
||||||
|
nscd_config_group_negative_ttl_seconds: 30
|
||||||
|
nscd_config_group_suggested_size: 221
|
||||||
|
nscd_config_group_check_files: true
|
||||||
|
nscd_config_group_persistent: true
|
||||||
|
nscd_config_group_shared: true
|
||||||
|
nscd_config_group_max_db_size_bytes: 33554432
|
||||||
|
nscd_config_group_auto_propagate: yes
|
||||||
|
|
||||||
|
nscd_config_hosts_enable_cache: true
|
||||||
|
nscd_config_hosts_positive_ttl_seconds: 1800
|
||||||
|
nscd_config_hosts_negative_ttl_seconds: 60
|
||||||
|
nscd_config_hosts_suggested_size: 221
|
||||||
|
nscd_config_hosts_check_files: true
|
||||||
|
nscd_config_hosts_persistent: true
|
||||||
|
nscd_config_hosts_shared: true
|
||||||
|
nscd_config_hosts_max_db_size_bytes: 33554432
|
||||||
|
|
||||||
|
nscd_config_services_enable_cache: true
|
||||||
|
nscd_config_services_positive_ttl_seconds: 28800
|
||||||
|
nscd_config_services_negative_ttl_seconds: 20
|
||||||
|
nscd_config_services_suggested_size: 221
|
||||||
|
nscd_config_services_check_files: true
|
||||||
|
nscd_config_services_persistent: true
|
||||||
|
nscd_config_services_shared: true
|
||||||
|
nscd_config_services_max_db_size_bytes: 33554432
|
27
roles/nscd/tasks/main.yml
Normal file
27
roles/nscd/tasks/main.yml
Normal file
@ -0,0 +1,27 @@
|
|||||||
|
---
|
||||||
|
|
||||||
|
- name: Make sure nscd is installed
|
||||||
|
apt:
|
||||||
|
name: "{{ nscd_apt_package_name }}"
|
||||||
|
state: present
|
||||||
|
when: ansible_facts['pkg_mgr'] == 'apt'
|
||||||
|
|
||||||
|
- name: Ensure nscd is configured
|
||||||
|
template:
|
||||||
|
src: nscd.conf.j2
|
||||||
|
dest: "{{ nscd_config_file }}"
|
||||||
|
owner: root
|
||||||
|
group: root
|
||||||
|
mode: "0640"
|
||||||
|
|
||||||
|
- name: Ensure systemd service is enabled
|
||||||
|
systemd:
|
||||||
|
service: "{{ nscd_systemd_service_name }}"
|
||||||
|
enabled: true
|
||||||
|
when: ansible_facts['service_mgr'] == 'systemd'
|
||||||
|
|
||||||
|
- name: Ensure systemd service is started
|
||||||
|
systemd:
|
||||||
|
service: "{{ nscd_systemd_service_name }}"
|
||||||
|
state: started
|
||||||
|
when: ansible_facts['service_mgr'] == 'systemd'
|
41
roles/nscd/templates/nscd.conf.j2
Normal file
41
roles/nscd/templates/nscd.conf.j2
Normal file
@ -0,0 +1,41 @@
|
|||||||
|
#logfile /var/log/nscd.log
|
||||||
|
#threads 4
|
||||||
|
#max-threads 32
|
||||||
|
|
||||||
|
enable-cache passwd {{ nscd_config_passwd_auto_propagate | ternary('yes', 'no') }}
|
||||||
|
positive-time-to-live passwd {{ nscd_config_passwd_positive_ttl_seconds }}
|
||||||
|
negative-time-to-live passwd {{ nscd_config_passwd_negative_ttl_seconds }}
|
||||||
|
suggested-size passwd {{ nscd_config_passwd_suggested_size }}
|
||||||
|
check-files passwd {{ nscd_config_passwd_check_files | ternary('yes', 'no') }}
|
||||||
|
persistent passwd {{ nscd_config_passwd_persistent | ternary('yes', 'no') }}
|
||||||
|
shared passwd {{ nscd_config_passwd_shared | ternary('yes', 'no') }}
|
||||||
|
max-db-size passwd {{ nscd_config_passwd_max_db_size_bytes }}
|
||||||
|
auto-propagate passwd {{ nscd_config_passwd_auto_propagate | ternary('yes', 'no') }}
|
||||||
|
|
||||||
|
enable-cache group {{ nscd_config_group_auto_propagate | ternary('yes', 'no') }}
|
||||||
|
positive-time-to-live group {{ nscd_config_group_positive_ttl_seconds }}
|
||||||
|
negative-time-to-live group {{ nscd_config_group_negative_ttl_seconds }}
|
||||||
|
suggested-size group {{ nscd_config_group_suggested_size }}
|
||||||
|
check-files group {{ nscd_config_group_check_files | ternary('yes', 'no') }}
|
||||||
|
persistent group {{ nscd_config_group_persistent | ternary('yes', 'no') }}
|
||||||
|
shared group {{ nscd_config_group_shared | ternary('yes', 'no') }}
|
||||||
|
max-db-size group {{ nscd_config_group_max_db_size_bytes }}
|
||||||
|
auto-propagate group {{ nscd_config_group_auto_propagate | ternary('yes', 'no') }}
|
||||||
|
|
||||||
|
enable-cache hosts {{ nscd_config_hosts_auto_propagate | ternary('yes', 'no') }}
|
||||||
|
positive-time-to-live hosts {{ nscd_config_hosts_positive_ttl_seconds }}
|
||||||
|
negative-time-to-live hosts {{ nscd_config_hosts_negative_ttl_seconds }}
|
||||||
|
suggested-size hosts {{ nscd_config_hosts_suggested_size }}
|
||||||
|
check-files hosts {{ nscd_config_hosts_check_files | ternary('yes', 'no') }}
|
||||||
|
persistent hosts {{ nscd_config_hosts_persistent | ternary('yes', 'no') }}
|
||||||
|
shared hosts {{ nscd_config_hosts_shared | ternary('yes', 'no') }}
|
||||||
|
max-db-size hosts {{ nscd_config_hosts_max_db_size_bytes }}
|
||||||
|
|
||||||
|
enable-cache services {{ nscd_config_services_auto_propagate | ternary('yes', 'no') }}
|
||||||
|
positive-time-to-live services {{ nscd_config_services_positive_ttl_seconds }}
|
||||||
|
negative-time-to-live services {{ nscd_config_services_negative_ttl_seconds }}
|
||||||
|
suggested-size services {{ nscd_config_services_suggested_size }}
|
||||||
|
check-files services {{ nscd_config_services_check_files | ternary('yes', 'no') }}
|
||||||
|
persistent services {{ nscd_config_services_persistent | ternary('yes', 'no') }}
|
||||||
|
shared services {{ nscd_config_services_shared | ternary('yes', 'no') }}
|
||||||
|
max-db-size services {{ nscd_config_services_max_db_size_bytes }}
|
4
roles/nscd/vars/main.yml
Normal file
4
roles/nscd/vars/main.yml
Normal file
@ -0,0 +1,4 @@
|
|||||||
|
---
|
||||||
|
|
||||||
|
nscd_apt_package_name: nscd
|
||||||
|
nscd_systemd_service_name: nscd.service
|
20
roles/nslcd/defaults/main.yml
Normal file
20
roles/nslcd/defaults/main.yml
Normal file
@ -0,0 +1,20 @@
|
|||||||
|
---
|
||||||
|
|
||||||
|
nslcd_config_uid: nslcd
|
||||||
|
nslcd_config_gid: nslcd
|
||||||
|
|
||||||
|
nslcd_config_ldap_uri: ldaps://127.0.0.1
|
||||||
|
nslcd_config_ldap_base: ~
|
||||||
|
nslcd_config_ldap_scope: sub
|
||||||
|
nslcd_config_ldap_version: 3
|
||||||
|
nslcd_config_ldap_bind_dn: ~
|
||||||
|
nslcd_config_ldap_bind_pw: ~
|
||||||
|
nslcd_config_ldap_root_pw_mod_dn: ~
|
||||||
|
nslcd_config_ldap_ssl: on
|
||||||
|
nslcd_config_ldap_tls_reqcert: always
|
||||||
|
nslcd_config_ldap_tls_cacertfile: /etc/ssl/certs/ca-certificates.crt
|
||||||
|
|
||||||
|
nslcd_config_pam_authz_search: >-2
|
||||||
|
(&(objectClass=posixAccount)(uid=$username)(|
|
||||||
|
(host=$hostname)(host=$fqdn)
|
||||||
|
))
|
27
roles/nslcd/tasks/main.yml
Normal file
27
roles/nslcd/tasks/main.yml
Normal file
@ -0,0 +1,27 @@
|
|||||||
|
---
|
||||||
|
|
||||||
|
- name: Ensure nslcd is installed
|
||||||
|
apt:
|
||||||
|
name: "{{ nslcd_apt_package_name }}"
|
||||||
|
state: present
|
||||||
|
when: ansible_facts['pkg_mgr'] == 'apt'
|
||||||
|
|
||||||
|
- name: Ensure config is templated
|
||||||
|
template:
|
||||||
|
src: nslcd.conf.j2
|
||||||
|
dest: /etc/nslcd.conf
|
||||||
|
owner: root
|
||||||
|
group: root
|
||||||
|
mode: "0640"
|
||||||
|
|
||||||
|
- name: Ensure systemd service is enabled
|
||||||
|
systemd:
|
||||||
|
service: "{{ nslcd_systemd_service_name }}"
|
||||||
|
enabled: true
|
||||||
|
when: ansible_facts['service_mgr'] == 'systemd'
|
||||||
|
|
||||||
|
- name: Ensure systemd service is running
|
||||||
|
systemd:
|
||||||
|
service: "{{ nslcd_systemd_service_name }}"
|
||||||
|
state: started
|
||||||
|
when: ansible_facts['service_mgr'] == 'systemd'
|
17
roles/nslcd/templates/nslcd.conf.j2
Normal file
17
roles/nslcd/templates/nslcd.conf.j2
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
uid {{ nslcd_config_uid }}
|
||||||
|
gid {{ nslcd_config_gid }}
|
||||||
|
|
||||||
|
uri {{ nslcd_config_ldap_uri }}
|
||||||
|
base {{ nslcd_config_ldap_base }}
|
||||||
|
binddn {{ nslcd_config_ldap_bind_dn }}
|
||||||
|
bindpw {{ nslcd_config_ldap_bind_pw }}
|
||||||
|
ldap_version {{ nslcd_config_ldap_version }}
|
||||||
|
|
||||||
|
rootpwmoddn {{ nslcd_config_ldap_root_pw_mod_dn }}
|
||||||
|
|
||||||
|
ssl {{ nslcd_config_ldap_ssl }}
|
||||||
|
tls_reqcert {{ nslcd_config_ldap_tls_reqcert }}
|
||||||
|
tls_cacertfile {{ nslcd_config_ldap_tls_cacertfile }}
|
||||||
|
|
||||||
|
scope {{ nslcd_config_ldap_scope }}
|
||||||
|
pam_authz_search {{ nslcd_config_ldap_pam_authz_search }}
|
0
roles/nslcd/vars/main.yml
Normal file
0
roles/nslcd/vars/main.yml
Normal file
Reference in New Issue
Block a user