mirror of
https://github.com/rocky-linux/infrastructure
synced 2024-11-22 05:01:27 +00:00
Ansible 2.7+ Best Practices and GetKeyTab Fixes
-> Changed specific pieces that are recommended to be changed in Ansible 2.7 and higher (such as using fail_msg and success_msg, not just msg for assertions -> Improved the getkeytab adhoc playbook for flexibility and delegations against a IPA server, as well as forcing the choice of the user with permissions that can perform the action rather than the default "admin" user in FreeIPA as a security fix.
This commit is contained in:
parent
17b7ef186e
commit
8e2f81c415
@ -91,7 +91,8 @@ At a minimum, there should be `pre_tasks` and `post_tasks` that can judge whethe
|
||||
assert:
|
||||
that:
|
||||
- "not no_ansible.stat.exists"
|
||||
msg: "/etc/no-ansible exists - skipping run on this node"
|
||||
success_msg: "We are able to run on this node"
|
||||
fail_msg: "/etc/no-ansible exists - skipping run on this node"
|
||||
|
||||
# Import roles/tasks here
|
||||
|
||||
|
@ -1,15 +1,21 @@
|
||||
---
|
||||
# This playbook is meant to be used with callable variables, like adhoc or AWX.
|
||||
# Special thanks to @remyabel for assisting in improving this playbook with
|
||||
# extended security posture
|
||||
# What: Pulls keytabs for a kerberos service
|
||||
# What is expected:
|
||||
# -> ipa_service, using this format: SVC/hostname.rockylinux.org@ROCKYLINUX.ORG
|
||||
# -> host: The host in the inventory, this MUST be FQDN.
|
||||
# -> ipa_service: using this format: SVC/hostname.rockylinux.org@ROCKYLINUX.ORG
|
||||
# Note: This service MUST exist
|
||||
# -> ipa_keytab_fullpath: The full path to the keytab. Example: /etc/gitlab/gitlab.keytab
|
||||
# -> ipa_server: This needs to be one of the IPA servers
|
||||
# -> ipa_owner: If applicable, the local account that will own this keytab (eg for Apache)
|
||||
# -> ipa_owner: If applicable, the local account that can read this keytab (eg apache)
|
||||
# -> ipa_admin: The admin user that has kerberos management capabilities (default is admin)
|
||||
# -> ipaadmin_password: This should be the password of the admin user
|
||||
|
||||
- name: Pull keytab from IPA
|
||||
hosts: "{{ host }}"
|
||||
become: false
|
||||
become: true
|
||||
gather_facts: false
|
||||
vars_files:
|
||||
- vars/encpass.yml
|
||||
@ -25,21 +31,106 @@
|
||||
success_msg: "Required variables provided"
|
||||
fail_msg: "We are missing required information"
|
||||
|
||||
- name: "Pulling keytab"
|
||||
command: "ipa-getkeytab -s {{ ipa_server }} -p {{ ipa_service }} -k {{ ipa_keytab_fullpath }}"
|
||||
register: ipakeytab_result
|
||||
changed_when:
|
||||
- ipakeytab_result.rc == 0
|
||||
tags:
|
||||
- keytab
|
||||
- name: "Check that a keytab doesn't already exist"
|
||||
stat:
|
||||
path: "{{ ipa_keytab_fullpath }}"
|
||||
register: keytab_status
|
||||
check_mode: false
|
||||
changed_when: "1 != 1"
|
||||
|
||||
- name: "Set ownership if applicable"
|
||||
- name: "Verify keytab existence"
|
||||
assert:
|
||||
that:
|
||||
- "not keytab_status.stat.exists"
|
||||
success_msg: "Keytab doesn't exist, moving on..."
|
||||
fail_msg: "Keytab with that name already exists, skipping."
|
||||
|
||||
- name: "Grant {{ host }} and {{ ipa_admin }} access to the service keytab"
|
||||
delegate_to: "{{ ipa_server }}"
|
||||
freeipa.ansible_freeipa.ipaservice:
|
||||
ipaadmin_principal: "{{ ipa_admin }}"
|
||||
ipaadmin_password: "{{ ipaadmin_password }}"
|
||||
name: "{{ ipa_service }}"
|
||||
allow_retrieve_keytab_user:
|
||||
- "{{ ipa_admin }}"
|
||||
allow_retrieve_keytab_host:
|
||||
- "{{ host }}"
|
||||
action: member
|
||||
|
||||
- name: "Grant {{ host }} and {{ ipa_admin }} access to the host keytab"
|
||||
delegate_to: "{{ ipa_server }}"
|
||||
freeipa.ansible_freeipa.ipahost:
|
||||
ipaadmin_principal: "{{ ipa_admin }}"
|
||||
ipaadmin_password: "{{ ipaadmin_password }}"
|
||||
name: "{{ host }}"
|
||||
state: present
|
||||
allow_retrieve_keytab_user:
|
||||
- "{{ ipa_admin }}"
|
||||
managedby_host: "{{ host }}"
|
||||
action: member
|
||||
|
||||
- name: "Get kerberos ticket"
|
||||
delegate_to: "{{ ipa_server }}"
|
||||
shell: "set -o pipefail && echo \"{{ ipaadmin_password }}\" | kinit {{ ipa_admin }}"
|
||||
check_mode: false
|
||||
changed_when: "1 != 1"
|
||||
when: not keytab_status.stat.exists
|
||||
|
||||
- name: "Attempt to retrieve keytab"
|
||||
delegate_to: "{{ ipa_server }}"
|
||||
command: "ipa-getkeytab -r -s {{ ipa_server }} -p {{ ipa_service }} -k /tmp/{{ host }}.kt"
|
||||
register: ret_result
|
||||
check_mode: false
|
||||
changed_when: "1 != 1"
|
||||
failed_when: "not ('Keytab successfully retrieved' in ret_result.stderr or 'krbPrincipalKey not found' in ret_result.stderr)"
|
||||
|
||||
- name: "Create keytab if it didn't exist, based on the last task"
|
||||
delegate_to: "{{ ipa_server }}"
|
||||
command: "ipa-getkeytab -s {{ ipa_server }} -p {{ ipa_service }} -k /tmp/{{ host }}.kt"
|
||||
when: "'krbPrincipalKey not found' in ret_result.stderr"
|
||||
|
||||
- name: "Destroy admin ticket"
|
||||
delegate_to: "{{ ipa_server }}"
|
||||
command: "kdestroy -A"
|
||||
register: kdestroy_result
|
||||
changed_when: "kdestroy_result.rc == 0"
|
||||
|
||||
- name: "Put the keytab into a register"
|
||||
delegate_to: "{{ ipa_server }}"
|
||||
command: "base64 /tmp/{{ host }}.kt"
|
||||
register: keytab
|
||||
check_mode: false
|
||||
changed_when: "keytab.rc == 0"
|
||||
|
||||
- name: "Destroy local keytab"
|
||||
delegate_to: "{{ ipa_server }}"
|
||||
file:
|
||||
path: "/tmp/{{ host }}.kt"
|
||||
state: absent
|
||||
|
||||
- name: "Deploy keytab to {{ host }} from register"
|
||||
copy:
|
||||
dest: "{{ ipa_keytab_fullpath }}.b64"
|
||||
content: "{{ keytab.stdout }}"
|
||||
owner: "{{ ipa_owner|default('root') }}"
|
||||
group: "{{ ipa_owner|default('root') }}"
|
||||
mode: '0600'
|
||||
|
||||
- name: "Decode keytab"
|
||||
shell: "umask 077 && base64 -d {{ ipa_keytab_fullpath }}.b64 > {{ ipa_keytab_fullpath }}"
|
||||
changed_when: "1 != 1"
|
||||
|
||||
- name: "Destroy encoded keytab"
|
||||
file:
|
||||
path: "{{ ipa_keytab_fullpath }}.b64"
|
||||
state: absent
|
||||
|
||||
- name: "Set ownership if applicable, otherwise it's root owned"
|
||||
file:
|
||||
path: "{{ ipa_keytab_fullpath }}"
|
||||
owner: "{{ ipa_owner }}"
|
||||
group: "{{ ipa_owner }}"
|
||||
owner: "{{ ipa_owner|default('root') }}"
|
||||
group: "{{ ipa_owner|default('root') }}"
|
||||
mode: '0600'
|
||||
state: file
|
||||
when: ipa_owner
|
||||
tags:
|
||||
- keytab
|
||||
|
@ -23,7 +23,8 @@
|
||||
assert:
|
||||
that:
|
||||
- "not no_ansible.stat.exists"
|
||||
msg: "/etc/no-ansible exists - skipping run on this node"
|
||||
success_msg: "We are able to run on this node"
|
||||
fail_msg: "/etc/no-ansible exists - skipping run on this node"
|
||||
|
||||
tasks:
|
||||
- name: Configure Chrony
|
||||
|
@ -16,7 +16,8 @@
|
||||
assert:
|
||||
that:
|
||||
- "not no_ansible.stat.exists"
|
||||
msg: "/etc/no-ansible exists - skipping run on this node"
|
||||
success_msg: "We are able to run on this node"
|
||||
fail_msg: "/etc/no-ansible exists - skipping run on this node"
|
||||
|
||||
tasks:
|
||||
- name: Check for CPU Virtualization
|
||||
|
@ -18,7 +18,8 @@
|
||||
assert:
|
||||
that:
|
||||
- "not no_ansible.stat.exists"
|
||||
msg: "/etc/no-ansible exists - skipping run on this node"
|
||||
success_msg: "We are able to run on this node"
|
||||
fail_msg: "/etc/no-ansible exists - skipping run on this node"
|
||||
|
||||
tasks:
|
||||
- name: Loading Variables from OS Common
|
||||
|
@ -21,7 +21,8 @@
|
||||
assert:
|
||||
that:
|
||||
- "not no_ansible.stat.exists"
|
||||
msg: "/etc/no-ansible exists - skipping un on this node"
|
||||
success_msg: "We are able to run on this node"
|
||||
fail_msg: "/etc/no-ansible exists - skipping un on this node"
|
||||
|
||||
- name: Install SELinux packages
|
||||
package:
|
||||
|
@ -18,9 +18,10 @@
|
||||
assert:
|
||||
that:
|
||||
- "not no_ansible.stat.exists"
|
||||
msg: "/etc/no-ansible exists - skipping run on this node"
|
||||
success_msg: "We are able to run on this node"
|
||||
fail_msg: "/etc/no-ansible exists - skipping run on this node"
|
||||
|
||||
# - name: Check if we can see LDAP srv records
|
||||
# - name: Check if we can see LDAP srv records
|
||||
|
||||
|
||||
roles:
|
||||
|
@ -21,7 +21,8 @@
|
||||
assert:
|
||||
that:
|
||||
- "not no_ansible.stat.exists"
|
||||
msg: "/etc/no-ansible exists - skipping run on this node"
|
||||
success_msg: "We are able to run on this node"
|
||||
fail_msg: "/etc/no-ansible exists - skipping run on this node"
|
||||
|
||||
- name: Ensure 'dns=none' is set for Network Manager
|
||||
ini_file:
|
||||
|
@ -25,7 +25,8 @@
|
||||
assert:
|
||||
that:
|
||||
- "not no_ansible.stat.exists"
|
||||
msg: "/etc/no-ansible exists - skipping run on this node"
|
||||
success_msg: "We are able to run on this node"
|
||||
fail_msg: "/etc/no-ansible exists - skipping run on this node"
|
||||
|
||||
- name: Ensure 'dns=none' is set for Network Manager to avoid change
|
||||
ini_file:
|
||||
|
@ -21,7 +21,8 @@
|
||||
assert:
|
||||
that:
|
||||
- "not no_ansible.stat.exists"
|
||||
msg: "/etc/no-ansible exists - skipping run on this node"
|
||||
success_msg: "We are able to run on this node"
|
||||
fail_msg: "/etc/no-ansible exists - skipping run on this node"
|
||||
|
||||
# EPEL and PowerTools are required for ipsilon to function
|
||||
# I also couldn't find an ansible built-in to do this
|
||||
|
@ -21,7 +21,8 @@
|
||||
assert:
|
||||
that:
|
||||
- "not no_ansible.stat.exists"
|
||||
msg: "/etc/no-ansible exists - skipping run on this node"
|
||||
success_msg: "We are able to run on this node"
|
||||
fail_msg: "/etc/no-ansible exists - skipping run on this node"
|
||||
|
||||
# EPEL and PowerTools are required for ipsilon to function
|
||||
# I also couldn't find an ansible built-in to do this
|
||||
|
@ -13,7 +13,9 @@
|
||||
assert:
|
||||
that:
|
||||
- "not no_ansible.stat.exists"
|
||||
msg: "/etc/no-ansible exists - skipping run on this node"
|
||||
success_msg: "We are able to run on this node"
|
||||
fail_msg: "/etc/no-ansible exists - skipping run on this node"
|
||||
|
||||
- name: Install SELinux packages
|
||||
package:
|
||||
name: python3-policycoreutils.noarch
|
||||
@ -50,5 +52,5 @@
|
||||
- name: Open firewall for node-exporter
|
||||
ansible.posix.firewalld:
|
||||
port: 9100/tcp
|
||||
permanent: yes
|
||||
permanent: true
|
||||
state: enabled
|
||||
|
@ -21,7 +21,8 @@
|
||||
assert:
|
||||
that:
|
||||
- "not no_ansible.stat.exists"
|
||||
msg: "/etc/no-ansible exists - skipping run on this node"
|
||||
success_msg: "We are able to run on this node"
|
||||
fail_msg: "/etc/no-ansible exists - skipping run on this node"
|
||||
|
||||
# EPEL and PowerTools are required for ipsilon to function
|
||||
# I also couldn't find an ansible built-in to do this
|
||||
|
@ -22,7 +22,8 @@
|
||||
assert:
|
||||
that:
|
||||
- "not no_ansible.stat.exists"
|
||||
msg: "/etc/no-ansible exists - skipping run on this node"
|
||||
success_msg: "We are able to run on this node"
|
||||
fail_msg: "/etc/no-ansible exists - skipping run on this node"
|
||||
|
||||
# We have separate passwords per rabbitmq env
|
||||
- name: Import rabbitmq passwords
|
||||
|
Loading…
Reference in New Issue
Block a user