diff options
author | Guilhem Moulin <guilhem@fripost.org> | 2014-07-07 20:12:28 +0200 |
---|---|---|
committer | Guilhem Moulin <guilhem@fripost.org> | 2015-06-07 02:52:40 +0200 |
commit | 3e38718677b10faca8970d9b1cc8edc215cce798 (patch) | |
tree | bf923310388e57fb2f591ad621bc5b1240aa42ce /roles/common-LDAP/tasks/main.yml | |
parent | 2dfe29dfcd35fae7160178e329fb0647cc896e3b (diff) |
Fix race condition when generating cerificates for slapd.
The SyncProv won't start if the file olcTLSCACertificateFile points to
doesn't exist.
Diffstat (limited to 'roles/common-LDAP/tasks/main.yml')
-rw-r--r-- | roles/common-LDAP/tasks/main.yml | 26 |
1 files changed, 19 insertions, 7 deletions
diff --git a/roles/common-LDAP/tasks/main.yml b/roles/common-LDAP/tasks/main.yml index 3b8b36c..85ad831 100644 --- a/roles/common-LDAP/tasks/main.yml +++ b/roles/common-LDAP/tasks/main.yml @@ -15,40 +15,42 @@ owner=root group=root mode=0644 register: r1 notify: - Restart slapd - name: Copy DB_CONFIG copy: src=var/lib/ldap/DB_CONFIG dest=/var/lib/ldap/DB_CONFIG owner=openldap group=openldap mode=0644 - name: Create directory /etc/ldap/ssl file: path=/etc/ldap/ssl state=directory owner=root group=root mode=0755 tags: - genkey +# XXX: It's ugly to list all roles here, and to prunes them with a +# conditional... - name: Generate a private key and a X.509 certificate for slapd # XXX: GnuTLS (libgnutls26 2.12.20-8+deb7u2, found in Wheezy) doesn't # support ECDSA; and slapd doesn't seem to support DHE (!?) so # we're stuck with "plain RSA" Key-Exchange. Also, there is a bug with # SHA-512. command: genkeypair.sh x509 --pubkey=/etc/ldap/ssl/{{ item.name }}.pem --privkey=/etc/ldap/ssl/{{ item.name }}.key --ou=LDAP {{ item.ou }} --cn={{ item.name }} --usage=digitalSignature,keyEncipherment -t rsa -b 4096 -h sha256 --chown="root:openldap" --chmod=0640 register: r2 changed_when: r2.rc == 0 failed_when: r2.rc > 1 with_items: - { group: 'LDAP-provider', name: ldap.fripost.org, ou: } - { group: 'MX', name: mx, ou: --ou=SyncRepl } - { group: 'lists', name: lists, ou: --ou=SyncRepl } when: "item.group in group_names" @@ -58,59 +60,69 @@ - name: Fetch slapd's X.509 certificate # Ensure we don't fetch private data sudo: False fetch: src=/etc/ldap/ssl/{{ item.name }}.pem dest=certs/ldap/ fail_on_missing=yes flat=yes with_items: - { group: 'LDAP-provider', name: ldap.fripost.org } - { group: 'MX', name: mx } - { group: 'lists', name: lists } when: "item.group in group_names" tags: - genkey - name: Copy the SyncProv's server certificate copy: src=certs/ldap/ldap.fripost.org.pem dest=/etc/ldap/ssl/ldap.fripost.org.pem owner=root group=root mode=0644 + when: "'LDAP-provider' not in group_names" + tags: + - genkey + +- name: Copy the SyncRepls's client certificates + assemble: src=certs/ldap + remote_src=no + dest=/etc/ldap/ssl/clients.pem + owner=root group=root + mode=0644 + when: "'LDAP-provider' in group_names" tags: - genkey - when: "'LDAP-provider' not in group_names" + +- name: Start slapd + service: name=slapd state=started + when: not (r1.changed or r2.changed) + +- meta: flush_handlers - name: Copy fripost & amavis' schema copy: src=etc/ldap/schema/{{ item }} dest=/etc/ldap/schema/{{ item }} owner=root group=root mode=0644 # It'd certainly be nicer if we didn't have to deploy amavis' schema # everywhere, but we need the 'objectClass' in our replicates, hence # they need to be aware of the 'amavisAccount' class. with_items: - fripost.ldif - amavis.schema tags: - amavis - name: Load amavis' schema openldap: target=/etc/ldap/schema/amavis.schema state=present format=slapd.conf name=amavis tags: - ldap - name: Load Fripost' schema openldap: target=/etc/ldap/schema/fripost.ldif state=present tags: - ldap # We assume a clean (=stock) cn=config - name: Configure the LDAP database openldap: target=etc/ldap/database.ldif.j2 local=template state=present - -- name: Start slapd - service: name=slapd state=started - when: not (r1.changed or r2.changed) - -- meta: flush_handlers |