[vault] Changing cranspasswords to pass crans
parent
fc76317aec
commit
59bc91dc9d
|
@ -4,3 +4,4 @@ __pycache__
|
||||||
env/
|
env/
|
||||||
# ignore dummy_playbook
|
# ignore dummy_playbook
|
||||||
debug.yml
|
debug.yml
|
||||||
|
group_vars/all/vault.yml
|
||||||
|
|
|
@ -5,7 +5,6 @@
|
||||||
# Explicitely redefined some defaults to make play execution work
|
# Explicitely redefined some defaults to make play execution work
|
||||||
roles_path = ./roles
|
roles_path = ./roles
|
||||||
action_plugins = ./action_plugins
|
action_plugins = ./action_plugins
|
||||||
vars_plugins = ./vars_plugins
|
|
||||||
lookup_plugins = ./lookup_plugins
|
lookup_plugins = ./lookup_plugins
|
||||||
|
|
||||||
# Do not create .retry files
|
# Do not create .retry files
|
||||||
|
|
|
@ -40,8 +40,8 @@ adm_subnet: 10.231.136.0/24
|
||||||
#
|
#
|
||||||
# re2o:
|
# re2o:
|
||||||
# server: re2o.adm.crans.org
|
# server: re2o.adm.crans.org
|
||||||
# service_user: "{{ vault_re2o_service_user }}"
|
# service_user: "{{ vault.re2o_service_user }}"
|
||||||
# service_password: "{{ vault_re2o_service_password }}"
|
# service_password: "{{ vault.re2o_service_password }}"
|
||||||
#
|
#
|
||||||
#
|
#
|
||||||
# # global server definitions
|
# # global server definitions
|
||||||
|
|
|
@ -0,0 +1 @@
|
||||||
|
vault: "{{ lookup('pipe', 'pass show crans/ansible_vault') | from_yaml }}"
|
|
@ -2,7 +2,7 @@
|
||||||
glob_certbot:
|
glob_certbot:
|
||||||
- dns_rfc2136_server: '172.16.10.147'
|
- dns_rfc2136_server: '172.16.10.147'
|
||||||
dns_rfc2136_name: certbot_challenge.
|
dns_rfc2136_name: certbot_challenge.
|
||||||
dns_rfc2136_secret: "{{ vault_certbot_dns_secret }}"
|
dns_rfc2136_secret: "{{ vault.certbot_dns_secret }}"
|
||||||
mail: root@crans.org
|
mail: root@crans.org
|
||||||
certname: crans.org
|
certname: crans.org
|
||||||
domains: "crans.org"
|
domains: "crans.org"
|
||||||
|
|
|
@ -67,7 +67,7 @@ glob_re2o_services:
|
||||||
server: re2o.adm.crans.org
|
server: re2o.adm.crans.org
|
||||||
service:
|
service:
|
||||||
user: services
|
user: services
|
||||||
password: "{{ vault_re2o_service_password }}"
|
password: "{{ vault.re2o_service_password }}"
|
||||||
mail_server: "{{ glob_smtp }}"
|
mail_server: "{{ glob_smtp }}"
|
||||||
|
|
||||||
glob_re2o_dhcp:
|
glob_re2o_dhcp:
|
||||||
|
|
|
@ -11,13 +11,13 @@ glob_django_cas:
|
||||||
- auth.adm.crans.org
|
- auth.adm.crans.org
|
||||||
ldap:
|
ldap:
|
||||||
dn: 'cn=Utilisateurs,dc=crans,dc=org'
|
dn: 'cn=Utilisateurs,dc=crans,dc=org'
|
||||||
password: "{{ vault_cas_ldap_password }}"
|
password: "{{ vault.cas_ldap_password }}"
|
||||||
user: 'cn=cas,ou=service-users,dc=crans,dc=org'
|
user: 'cn=cas,ou=service-users,dc=crans,dc=org'
|
||||||
server: 172.16.10.157
|
server: 172.16.10.157
|
||||||
db:
|
db:
|
||||||
host: tealc.adm.crans.org
|
host: tealc.adm.crans.org
|
||||||
password: "{{ vault_cas_database_password }}"
|
password: "{{ vault.cas_database_password }}"
|
||||||
secret_key: "{{ vault_cas_secret_key }}"
|
secret_key: "{{ vault.cas_secret_key }}"
|
||||||
reverse_proxy:
|
reverse_proxy:
|
||||||
- '10.231.136.0/24'
|
- '10.231.136.0/24'
|
||||||
- '2a0c:700:0:2::/64'
|
- '2a0c:700:0:2::/64'
|
||||||
|
|
|
@ -6,6 +6,6 @@ glob_framadate:
|
||||||
repo: https://framagit.org/framasoft/framadate/framadate.git
|
repo: https://framagit.org/framasoft/framadate/framadate.git
|
||||||
version: "1.1.11"
|
version: "1.1.11"
|
||||||
admin_username: framadate
|
admin_username: framadate
|
||||||
admin_password: "{{ vault_framadate_password }}"
|
admin_password: "{{ vault.framadate_password }}"
|
||||||
db_password: "{{ vault_framadate_password_db }}"
|
db_password: "{{ vault.framadate_password_db }}"
|
||||||
|
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
glob_horde:
|
glob_horde:
|
||||||
secret: '{{ vault_horde_secret }}'
|
secret: '{{ vault.horde_secret }}'
|
||||||
imap: imap.adm.crans.org
|
imap: imap.adm.crans.org
|
||||||
smtp: smtp.adm.crans.org
|
smtp: smtp.adm.crans.org
|
||||||
maildomain: crans.org
|
maildomain: crans.org
|
||||||
|
|
|
@ -1,7 +1,7 @@
|
||||||
---
|
---
|
||||||
glob_re2o:
|
glob_re2o:
|
||||||
django_secret_key: "{{ vault_re2o_django_secret_key }}"
|
django_secret_key: "{{ vault.re2o_django_secret_key }}"
|
||||||
aes_key: "{{ vault_re2o_aes_key }}"
|
aes_key: "{{ vault.re2o_aes_key }}"
|
||||||
admins:
|
admins:
|
||||||
- ('Root', 'root@crans.org')
|
- ('Root', 'root@crans.org')
|
||||||
allowed_hosts:
|
allowed_hosts:
|
||||||
|
@ -9,9 +9,9 @@ glob_re2o:
|
||||||
- 'intranet.adm.crans.org'
|
- 'intranet.adm.crans.org'
|
||||||
from_email: "root@crans.org"
|
from_email: "root@crans.org"
|
||||||
ldap:
|
ldap:
|
||||||
master_password: "{{ vault_ldap_master_password }}"
|
master_password: "{{ vault.ldap_master_password }}"
|
||||||
uri: "ldap://re2o-ldap.adm.crans.org/"
|
uri: "ldap://re2o-ldap.adm.crans.org/"
|
||||||
dn: "cn=admin,dc=crans,dc=org"
|
dn: "cn=admin,dc=crans,dc=org"
|
||||||
database:
|
database:
|
||||||
password: "{{ vault_re2o_db_password }}"
|
password: "{{ vault.re2o_db_password }}"
|
||||||
uri: "tealc.adm.crans.org"
|
uri: "tealc.adm.crans.org"
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
certbot:
|
certbot:
|
||||||
dns_rfc2136_name: certbot_challenge.
|
dns_rfc2136_name: certbot_challenge.
|
||||||
dns_rfc2136_secret: "{{ vault_certbot_dns_secret }}"
|
dns_rfc2136_secret: "{{ vault.certbot_dns_secret }}"
|
||||||
mail: root@crans.org
|
mail: root@crans.org
|
||||||
certname: crans.org
|
certname: crans.org
|
||||||
domains: "crans.org, *.crans.org, crans.fr, *.crans.fr, crans.eu, *.crans.eu"
|
domains: "crans.org, *.crans.org, crans.fr, *.crans.fr, crans.eu, *.crans.eu"
|
||||||
|
|
|
@ -4,7 +4,7 @@ roundcube_glob:
|
||||||
smtp_server: smtp.adm.crans.org
|
smtp_server: smtp.adm.crans.org
|
||||||
pgsql_server: pgsql.adm.crans.org
|
pgsql_server: pgsql.adm.crans.org
|
||||||
mail_domain: crans.org
|
mail_domain: crans.org
|
||||||
des_key: "{{ vault_roundcube_des_key }}"
|
des_key: "{{ vault.roundcube_des_key }}"
|
||||||
plugins:
|
plugins:
|
||||||
- repo: 'https://gitlab.crans.org/nounous/roundcube-intranet.git'
|
- repo: 'https://gitlab.crans.org/nounous/roundcube-intranet.git'
|
||||||
name: intranet
|
name: intranet
|
||||||
|
|
|
@ -2,6 +2,6 @@
|
||||||
glob_slapd:
|
glob_slapd:
|
||||||
master_ip: "{{ query('ldap', 'ip', 'tealc', 'adm') | ipv4 | first }}"
|
master_ip: "{{ query('ldap', 'ip', 'tealc', 'adm') | ipv4 | first }}"
|
||||||
regex: "^(role:(dhcp|dns|dns-primary|dns-secondary|ftp|gitlab|miroir|ntp|pve|radius|backup)|ecdsa-sha2-nistp256:.*|ssh-(ed25519|dss|rsa):.*)$"
|
regex: "^(role:(dhcp|dns|dns-primary|dns-secondary|ftp|gitlab|miroir|ntp|pve|radius|backup)|ecdsa-sha2-nistp256:.*|ssh-(ed25519|dss|rsa):.*)$"
|
||||||
replication_credentials: "{{ vault_ldap_replication_credentials }}"
|
replication_credentials: "{{ vault.ldap_replication_credentials }}"
|
||||||
private_key: "{{ vault_ldap_private_key }}"
|
private_key: "{{ vault.ldap_private_key }}"
|
||||||
certificate: "{{ vault_ldap_certificate }}"
|
certificate: "{{ vault.ldap_certificate }}"
|
||||||
|
|
|
@ -6,14 +6,14 @@ interfaces:
|
||||||
loc_certbot:
|
loc_certbot:
|
||||||
- dns_rfc2136_server: '172.16.10.147'
|
- dns_rfc2136_server: '172.16.10.147'
|
||||||
dns_rfc2136_name: certbot_challenge.
|
dns_rfc2136_name: certbot_challenge.
|
||||||
dns_rfc2136_secret: "{{ vault_certbot_dns_secret }}"
|
dns_rfc2136_secret: "{{ vault.certbot_dns_secret }}"
|
||||||
mail: root@crans.org
|
mail: root@crans.org
|
||||||
certname: crans.org
|
certname: crans.org
|
||||||
domains: "*.crans.org"
|
domains: "*.crans.org"
|
||||||
|
|
||||||
- dns_rfc2136_server: '172.16.10.147'
|
- dns_rfc2136_server: '172.16.10.147'
|
||||||
dns_rfc2136_name: certbot_adm_challenge.
|
dns_rfc2136_name: certbot_adm_challenge.
|
||||||
dns_rfc2136_secret: "{{ vault_certbot_adm_dns_secret }}"
|
dns_rfc2136_secret: "{{ vault.certbot_adm_dns_secret }}"
|
||||||
mail: root@crans.org
|
mail: root@crans.org
|
||||||
certname: adm.crans.org
|
certname: adm.crans.org
|
||||||
domains: "*.adm.crans.org"
|
domains: "*.adm.crans.org"
|
||||||
|
|
|
@ -6,7 +6,7 @@ interfaces:
|
||||||
loc_certbot:
|
loc_certbot:
|
||||||
- dns_rfc2136_server: '172.16.10.147'
|
- dns_rfc2136_server: '172.16.10.147'
|
||||||
dns_rfc2136_name: certbot_challenge.
|
dns_rfc2136_name: certbot_challenge.
|
||||||
dns_rfc2136_secret: "{{ vault_certbot_dns_secret }}"
|
dns_rfc2136_secret: "{{ vault.certbot_dns_secret }}"
|
||||||
mail: root@crans.org
|
mail: root@crans.org
|
||||||
certname: crans.org
|
certname: crans.org
|
||||||
domains: "crans.org, *.crans.org, crans.fr, *.crans.fr, crans.eu, *.crans.eu"
|
domains: "crans.org, *.crans.org, crans.fr, *.crans.fr, crans.eu, *.crans.eu"
|
||||||
|
|
|
@ -6,6 +6,6 @@ interfaces:
|
||||||
|
|
||||||
loc_ldap:
|
loc_ldap:
|
||||||
base_dn: "cn=admin,dc=crans,dc=org"
|
base_dn: "cn=admin,dc=crans,dc=org"
|
||||||
password: "{{ vault_ldap_master_password }}"
|
password: "{{ vault.ldap_master_password }}"
|
||||||
uri: "ldap://172.16.10.157"
|
uri: "ldap://172.16.10.157"
|
||||||
|
|
||||||
|
|
|
@ -6,4 +6,4 @@ loc_borg:
|
||||||
- type: mysql_databases
|
- type: mysql_databases
|
||||||
params:
|
params:
|
||||||
- "- name: all"
|
- "- name: all"
|
||||||
- " password: {{ vault_mysql_zamok_password }}"
|
- " password: {{ vault.mysql_zamok_password }}"
|
||||||
|
|
|
@ -8,8 +8,8 @@
|
||||||
# Deploy authoritative DNS server
|
# Deploy authoritative DNS server
|
||||||
- hosts: dns_authoritative
|
- hosts: dns_authoritative
|
||||||
vars:
|
vars:
|
||||||
certbot_dns_secret: "{{ vault_certbot_dns_secret }}"
|
certbot_dns_secret: "{{ vault.certbot_dns_secret }}"
|
||||||
certbot_adm_dns_secret: "{{ vault_certbot_adm_dns_secret }}"
|
certbot_adm_dns_secret: "{{ vault.certbot_adm_dns_secret }}"
|
||||||
bind:
|
bind:
|
||||||
masters: "{{ query('ldap', 'role', 'dns-primary') }}"
|
masters: "{{ query('ldap', 'role', 'dns-primary') }}"
|
||||||
slaves: "{{ query('ldap', 'role', 'dns-secondary') }}"
|
slaves: "{{ query('ldap', 'role', 'dns-secondary') }}"
|
||||||
|
@ -22,7 +22,7 @@
|
||||||
vars:
|
vars:
|
||||||
re2o:
|
re2o:
|
||||||
server: re2o.adm.crans.org
|
server: re2o.adm.crans.org
|
||||||
service_user: "{{ vault_re2o_service_user }}"
|
service_user: "{{ vault.re2o_service_user }}"
|
||||||
service_password: "{{ vault_re2o_service_password }}"
|
service_password: "{{ vault.re2o_service_password }}"
|
||||||
roles:
|
roles:
|
||||||
- dns
|
- dns
|
||||||
|
|
|
@ -33,8 +33,8 @@
|
||||||
vars:
|
vars:
|
||||||
re2o:
|
re2o:
|
||||||
server: re2o.adm.crans.org
|
server: re2o.adm.crans.org
|
||||||
service_user: "{{ vault_re2o_service_user }}"
|
service_user: "{{ vault.re2o_service_user }}"
|
||||||
service_password: "{{ vault_re2o_service_password }}"
|
service_password: "{{ vault.re2o_service_password }}"
|
||||||
roles:
|
roles:
|
||||||
- firewall
|
- firewall
|
||||||
|
|
||||||
|
|
|
@ -3,8 +3,8 @@
|
||||||
# Document servers
|
# Document servers
|
||||||
- hosts: server
|
- hosts: server
|
||||||
vars:
|
vars:
|
||||||
moinmoin_user: "{{ vault_moinmoin_user }}"
|
moinmoin_user: "{{ vault.moinmoin_user }}"
|
||||||
moinmoin_password: "{{ vault_moinmoin_password }}"
|
moinmoin_password: "{{ vault.moinmoin_password }}"
|
||||||
moinmoin_base_url: https://wiki.crans.org/CransTechnique/LesServeurs
|
moinmoin_base_url: https://wiki.crans.org/CransTechnique/LesServeurs
|
||||||
roles:
|
roles:
|
||||||
- moinmoin-gendoc
|
- moinmoin-gendoc
|
||||||
|
|
|
@ -4,7 +4,7 @@
|
||||||
vars:
|
vars:
|
||||||
home:
|
home:
|
||||||
ldap_server: ldap://re2o-ldap.adm.crans.org
|
ldap_server: ldap://re2o-ldap.adm.crans.org
|
||||||
ldap_password: "{{ vault_ldap_home_password }}"
|
ldap_password: "{{ vault.ldap_home_password }}"
|
||||||
binddn: cn=home,ou=service-users,dc=crans,dc=org
|
binddn: cn=home,ou=service-users,dc=crans,dc=org
|
||||||
rootdn: cn=Utilisateurs,dc=crans,dc=org
|
rootdn: cn=Utilisateurs,dc=crans,dc=org
|
||||||
roles:
|
roles:
|
||||||
|
|
|
@ -31,11 +31,11 @@
|
||||||
vars:
|
vars:
|
||||||
mailman3:
|
mailman3:
|
||||||
site_owner: root@crans.org
|
site_owner: root@crans.org
|
||||||
database_pass: "{{ vault_mailman3_database_pass }}"
|
database_pass: "{{ vault.mailman3_database_pass }}"
|
||||||
restadmin_pass: "{{ vault_mailman3_restadmin_pass }}"
|
restadmin_pass: "{{ vault.mailman3_restadmin_pass }}"
|
||||||
archiver_key: "{{ vault_mailman3_archiver_key }}"
|
archiver_key: "{{ vault.mailman3_archiver_key }}"
|
||||||
web_secret_key: "{{ vault_mailman3_web_secret_key }}"
|
web_secret_key: "{{ vault.mailman3_web_secret_key }}"
|
||||||
web_database_pass: "{{ vault_mailman3_web_database_pass }}"
|
web_database_pass: "{{ vault.mailman3_web_database_pass }}"
|
||||||
web_domain: "mailman.crans.org"
|
web_domain: "mailman.crans.org"
|
||||||
roles:
|
roles:
|
||||||
- mailman3
|
- mailman3
|
||||||
|
|
|
@ -42,8 +42,8 @@
|
||||||
bird_targets:
|
bird_targets:
|
||||||
- routeur-sam.adm.crans.org
|
- routeur-sam.adm.crans.org
|
||||||
|
|
||||||
snmp_procurve_password: "{{ vault_snmp_procurve_password }}"
|
snmp_procurve_password: "{{ vault.snmp_procurve_password }}"
|
||||||
snmp_unifi_password: "{{ vault_snmp_unifi_password }}"
|
snmp_unifi_password: "{{ vault.snmp_unifi_password }}"
|
||||||
|
|
||||||
grafana:
|
grafana:
|
||||||
root_url: https://grafana.crans.org
|
root_url: https://grafana.crans.org
|
||||||
|
|
|
@ -6,14 +6,14 @@
|
||||||
certbot:
|
certbot:
|
||||||
- dns_rfc2136_server: '172.16.10.147'
|
- dns_rfc2136_server: '172.16.10.147'
|
||||||
dns_rfc2136_name: certbot_challenge.
|
dns_rfc2136_name: certbot_challenge.
|
||||||
dns_rfc2136_secret: "{{ vault_certbot_dns_secret }}"
|
dns_rfc2136_secret: "{{ vault.certbot_dns_secret }}"
|
||||||
mail: root@crans.org
|
mail: root@crans.org
|
||||||
certname: crans.org
|
certname: crans.org
|
||||||
domains: "*.crans.org"
|
domains: "*.crans.org"
|
||||||
bind:
|
bind:
|
||||||
masters: "{{ lookup('re2oapi', 'get_role', 'dns-authoritary-master')[0] }}"
|
masters: "{{ lookup('re2oapi', 'get_role', 'dns-authoritary-master')[0] }}"
|
||||||
opendkim:
|
opendkim:
|
||||||
private_key: "{{ vault_opendkim_private_key }}"
|
private_key: "{{ vault.opendkim_private_key }}"
|
||||||
policyd:
|
policyd:
|
||||||
mail: root@crans.org
|
mail: root@crans.org
|
||||||
exemptions: "{{ lookup('re2oapi', 'get_role', 'user-server')[0] }}"
|
exemptions: "{{ lookup('re2oapi', 'get_role', 'user-server')[0] }}"
|
||||||
|
|
|
@ -6,8 +6,8 @@
|
||||||
debian_mirror: http://mirror.crans.org/debian
|
debian_mirror: http://mirror.crans.org/debian
|
||||||
wireguard:
|
wireguard:
|
||||||
sputnik: true
|
sputnik: true
|
||||||
private_key: "{{ vault_wireguard_sputnik_private_key }}"
|
private_key: "{{ vault.wireguard_sputnik_private_key }}"
|
||||||
peer_public_key: "{{ vault_wireguard_boeing_public_key }}"
|
peer_public_key: "{{ vault.wireguard_boeing_public_key }}"
|
||||||
roles:
|
roles:
|
||||||
- wireguard
|
- wireguard
|
||||||
|
|
||||||
|
@ -18,7 +18,7 @@
|
||||||
wireguard:
|
wireguard:
|
||||||
sputnik: false
|
sputnik: false
|
||||||
if: ens18
|
if: ens18
|
||||||
private_key: "{{ vault_wireguard_boeing_private_key }}"
|
private_key: "{{ vault.wireguard_boeing_private_key }}"
|
||||||
peer_public_key: "{{ vault_wireguard_sputnik_public_key }}"
|
peer_public_key: "{{ vault.wireguard_sputnik_public_key }}"
|
||||||
roles:
|
roles:
|
||||||
- wireguard
|
- wireguard
|
||||||
|
|
4
re2o.yml
4
re2o.yml
|
@ -7,8 +7,8 @@
|
||||||
vars:
|
vars:
|
||||||
re2o:
|
re2o:
|
||||||
server: re2o.adm.crans.org
|
server: re2o.adm.crans.org
|
||||||
service_user: "{{ vault_re2o_service_user }}"
|
service_user: "{{ vault.re2o_service_user }}"
|
||||||
service_password: "{{ vault_re2o_service_password }}"
|
service_password: "{{ vault.re2o_service_password }}"
|
||||||
mail_server: smtp.adm.crans.org
|
mail_server: smtp.adm.crans.org
|
||||||
roles:
|
roles:
|
||||||
- re2o-services
|
- re2o-services
|
||||||
|
|
|
@ -27,7 +27,7 @@ location:
|
||||||
borgmatic_source_directory: /tmp/borgmatic
|
borgmatic_source_directory: /tmp/borgmatic
|
||||||
|
|
||||||
storage:
|
storage:
|
||||||
encryption_passphrase: {{ vault_borgbackup_passwd }}
|
encryption_passphrase: {{ vault.borgbackup_passwd }}
|
||||||
ssh_command: ssh -i /etc/borgmatic/id_ed25519_borg
|
ssh_command: ssh -i /etc/borgmatic/id_ed25519_borg
|
||||||
borg_base_directory: /etc/borgmatic
|
borg_base_directory: /etc/borgmatic
|
||||||
borg_config_directory: /etc/borgmatic/config/
|
borg_config_directory: /etc/borgmatic/config/
|
||||||
|
|
|
@ -1 +1 @@
|
||||||
{{ vault_borgbackup_ssh_privkey }}
|
{{ vault.borgbackup_ssh_privkey }}
|
||||||
|
|
|
@ -1,3 +1,3 @@
|
||||||
{{ ansible_header | comment }}
|
{{ ansible_header | comment }}
|
||||||
|
|
||||||
command="borg serve --restrict-to-path {{ borg.path }}",no-agent-forwarding,no-port-forwarding,no-pty,no-user-rc,no-X11-forwarding {{ vault_borgbackup_ssh_pubkey }}
|
command="borg serve --restrict-to-path {{ borg.path }}",no-agent-forwarding,no-port-forwarding,no-pty,no-user-rc,no-X11-forwarding {{ vault.borgbackup_ssh_pubkey }}
|
||||||
|
|
|
@ -25,7 +25,7 @@ uris = {{ ldap.uri }}
|
||||||
dn = {{ dovecot.ldap_dn }}
|
dn = {{ dovecot.ldap_dn }}
|
||||||
|
|
||||||
# Password for LDAP server, if dn is specified.
|
# Password for LDAP server, if dn is specified.
|
||||||
dnpass = {{ vault_dovecot_dnpass }}
|
dnpass = {{ vault.dovecot_dnpass }}
|
||||||
|
|
||||||
# Use SASL binding instead of the simple binding. Note that this changes
|
# Use SASL binding instead of the simple binding. Note that this changes
|
||||||
# ldap_version automatically to be 3 if it's lower. Also note that SASL binds
|
# ldap_version automatically to be 3 if it's lower. Also note that SASL binds
|
||||||
|
|
|
@ -1,6 +0,0 @@
|
||||||
# Ansible Vault CransPasswords settings
|
|
||||||
#
|
|
||||||
|
|
||||||
[cranspasswords]
|
|
||||||
#: Commande exécutée sur le client pour appeler le script sur le serveur distant.
|
|
||||||
server_cmd=/usr/bin/env ssh tealc.adm.crans.org sudo -n /usr/local/bin/cpasswords-server
|
|
|
@ -1,139 +0,0 @@
|
||||||
#!/usr/bin/env python
|
|
||||||
|
|
||||||
# (c) 2019 Cr@ns <roots@crans.org>
|
|
||||||
# Authors : Alexandre IOOSS <erdnaxe@crans.org>
|
|
||||||
# Based on cranspasswords by : Daniel Stan <daniel.stan@crans.org>
|
|
||||||
# Vincent Le Gallic <legallic@crans.org>
|
|
||||||
#
|
|
||||||
# This file is part of Cr@ns ansible deployment
|
|
||||||
|
|
||||||
"""
|
|
||||||
Ansible Vault CransPasswords script.
|
|
||||||
========================================
|
|
||||||
|
|
||||||
Returns Ansible variables gpg encrypted and stored within cranspasswords.
|
|
||||||
See https://gitlab.crans.org/nounous/cranspasswords
|
|
||||||
|
|
||||||
Configuration is read from `vault_cranspasswords.ini`.
|
|
||||||
"""
|
|
||||||
|
|
||||||
import json
|
|
||||||
import os
|
|
||||||
import subprocess
|
|
||||||
import sys
|
|
||||||
|
|
||||||
from ansible.errors import AnsibleError, AnsibleParserError
|
|
||||||
from ansible.module_utils._text import to_native
|
|
||||||
from ansible.module_utils.six.moves import configparser
|
|
||||||
from ansible.plugins.vars import BaseVarsPlugin
|
|
||||||
|
|
||||||
DOCUMENTATION = '''
|
|
||||||
module: vault_cranspasswords
|
|
||||||
vars: vault_cranspasswords
|
|
||||||
version_added: "2.7"
|
|
||||||
short_description: In charge of loading variables stored within cranspasswords
|
|
||||||
description:
|
|
||||||
- Works exactly as a vault, loading variables from cranspasswords.
|
|
||||||
- Decrypts the YAML file `ansible_vault` from cranspasswords.
|
|
||||||
- Loads the secret variables.
|
|
||||||
- Makes use of data caching in order to avoid calling cranspasswords multiple times.
|
|
||||||
- Uses the local gpg key from the user running ansible on the Control node.
|
|
||||||
options: {}
|
|
||||||
'''
|
|
||||||
|
|
||||||
|
|
||||||
class VarsModule(BaseVarsPlugin):
|
|
||||||
@staticmethod
|
|
||||||
def gpg_decrypt(crypt_text):
|
|
||||||
"""
|
|
||||||
Decrypt the text in argument using gpg.
|
|
||||||
"""
|
|
||||||
full_command = ['gpg', '-d']
|
|
||||||
proc = subprocess.Popen(full_command,
|
|
||||||
stdin=subprocess.PIPE,
|
|
||||||
stdout=subprocess.PIPE,
|
|
||||||
stderr=sys.stderr,
|
|
||||||
close_fds=True)
|
|
||||||
proc.stdin.write(crypt_text.encode())
|
|
||||||
proc.stdin.close()
|
|
||||||
clear_text = proc.stdout.read().decode()
|
|
||||||
return clear_text
|
|
||||||
|
|
||||||
def getfile_command(self, filename):
|
|
||||||
"""
|
|
||||||
Run the command on the remote cranspasswords server, and return the output.
|
|
||||||
"""
|
|
||||||
# Get full command from settings file
|
|
||||||
try:
|
|
||||||
command = self.config.get('cranspasswords', 'server_cmd').split(" ")
|
|
||||||
except configparser.NoSectionError as e:
|
|
||||||
raise AnsibleParserError(to_native(e))
|
|
||||||
command.append("getfiles")
|
|
||||||
proc = subprocess.Popen(
|
|
||||||
command,
|
|
||||||
stdin=subprocess.PIPE,
|
|
||||||
stdout=subprocess.PIPE,
|
|
||||||
stderr=sys.stderr,
|
|
||||||
close_fds=True
|
|
||||||
)
|
|
||||||
proc.stdin.write(json.dumps([filename]).encode())
|
|
||||||
proc.stdin.flush()
|
|
||||||
|
|
||||||
raw_out, raw_err = proc.communicate()
|
|
||||||
ret = proc.returncode
|
|
||||||
|
|
||||||
if ret != 0:
|
|
||||||
raise AnsibleError("Bad return code on the serveur side")
|
|
||||||
try:
|
|
||||||
answer = json.loads(raw_out.strip())
|
|
||||||
return answer[0]
|
|
||||||
except ValueError:
|
|
||||||
raise AnsibleError("Unable to parse the result")
|
|
||||||
|
|
||||||
def get_encrypted(self, filename):
|
|
||||||
"""
|
|
||||||
Get encrypted content of a cranspasswords file
|
|
||||||
"""
|
|
||||||
gotit, value = self.getfile_command(filename) # if not gotit, value contains the error message
|
|
||||||
if not gotit:
|
|
||||||
raise AnsibleError("Unable to get the file : {}".format(to_native(value)))
|
|
||||||
else:
|
|
||||||
crypt_text = value['contents']
|
|
||||||
return crypt_text
|
|
||||||
|
|
||||||
def __init__(self):
|
|
||||||
super().__init__()
|
|
||||||
|
|
||||||
# Load config
|
|
||||||
self.config = configparser.ConfigParser()
|
|
||||||
self.config.read(os.path.dirname(os.path.realpath(__file__))
|
|
||||||
+ '/vault_cranspasswords.ini')
|
|
||||||
|
|
||||||
def get_vars(self, loader, path, entities):
|
|
||||||
"""
|
|
||||||
Get all vars for entities, called by Ansible.
|
|
||||||
|
|
||||||
loader: Ansible's DataLoader.
|
|
||||||
path: Current play's playbook directory.
|
|
||||||
entities: Host or group names pertinent to the variables needed.
|
|
||||||
"""
|
|
||||||
# VarsModule objects are called every time you need host vars, per host,
|
|
||||||
# and per group the host is part of.
|
|
||||||
# It is about 6 times per host per task in current state
|
|
||||||
# of Ansible Crans configuration.
|
|
||||||
|
|
||||||
# It is way to much.
|
|
||||||
# So we cache the data into the DataLoader (see parsing/DataLoader).
|
|
||||||
|
|
||||||
super().get_vars(loader, path, entities)
|
|
||||||
|
|
||||||
if 'cranspasswords' not in loader._FILE_CACHE:
|
|
||||||
# Get text then decrypt and return
|
|
||||||
crypt_text = self.get_encrypted('ansible_vault')
|
|
||||||
clear_text = self.gpg_decrypt(crypt_text)
|
|
||||||
data = loader.load(clear_text)
|
|
||||||
loader._FILE_CACHE['cranspasswords'] = data
|
|
||||||
else:
|
|
||||||
data = loader._FILE_CACHE['cranspasswords']
|
|
||||||
|
|
||||||
return data
|
|
Loading…
Reference in New Issue