Ansible role which installs and configures LTB-Project's OpenLDAP on Debian and RHEL like targets.
- ansible
- ssh
- git if you get this role from the git repository
- HTTP connection to the LTB-project's repository
Targets OS supported : Debian and RHEL like from version 7.
You'll need to store the hash value for your admin passwords. You'll get it like this:
/usr/local/openldap/sbin/slappasswd -o module-path="/usr/local/openldap/libexec/openldap" -o module-load="argon2" -h "{ARGON2}" -s "password"
Store the passwords in the vault file in: tests/credentials-vault.yml
You should:
- either deploy your role
- or use a configuration file for setting the role path, for example:
ansible.cfg
[defaults]
roles_path=../
See tests/standalone.yml
Run playbook with:
ansible-playbook tests/standalone.yml -i tests/inventory --ask-vault-pass
or:
ansible-playbook tests/standalone.yml -i tests/inventory --vault-password-file .vault_pass
If you need a two-nodes multimaster example, give a look at tests/multimaster1.yml
and tests/multimaster2.yml
Give a look to tests/monitoring.yml
for an example of playbook that deploys LTB monitoring and statistics tools
Run the corresponding task with:
ansible-playbook tests/monitoring.yml -i tests/inventory
If you want to install openldap on RHEL-like OS with certificates, you can define them in tests/standalone.yml
:
ldaptoolbox_openldap_olcTLSCACertificateFile=/etc/pki/ca-trust/source/anchors/ca-cert.pem
ldaptoolbox_openldap_olcTLSCertificateFile=/etc/pki/tls/certs/ldaps-cert.pem
ldaptoolbox_openldap_olcTLSCertificateKeyFile=/etc/pki/tls/private/ldaps.key
You can also overload these variables in the command line:
ansible-playbook tests/standalone.yml -i tests/inventory --ask-vault-pass --extra-vars "ldaptoolbox_openldap_olcTLSCACertificateFile=/etc/pki/ca-trust/source/anchors/ca-cert.pem ldaptoolbox_openldap_olcTLSCertificateFile=/etc/pki/tls/certs/ldaps-cert.pem ldaptoolbox_openldap_olcTLSCertificateKeyFile=/etc/pki/tls/private/ldaps.key"
GPLv3
- Mathieu Jourdan
- David Coutadeur