the validate_legacy function is marked for deprecation in v9.0.0 from puppetlabs-stdlib. This also adds validations about the parameters used for file resources and ensures the given values are absolute paths. Depends-on: https://review.opendev.org/885996 Change-Id: Ic49abcccffab5a3504e3a3060c0fac7a01bef69b
		
			
				
	
	
		
			388 lines
		
	
	
		
			17 KiB
		
	
	
	
		
			Puppet
		
	
	
	
	
	
			
		
		
	
	
			388 lines
		
	
	
		
			17 KiB
		
	
	
	
		
			Puppet
		
	
	
	
	
	
# == define: keystone::ldap_backend
 | 
						|
#
 | 
						|
# Implements ldap configuration for keystone.
 | 
						|
#
 | 
						|
# === parameters:
 | 
						|
# [*name*]
 | 
						|
#   The ldap backend domain's name. (string value)
 | 
						|
#   No default.
 | 
						|
#
 | 
						|
# [*url*]
 | 
						|
#   URL for connecting to the LDAP server. (string value)
 | 
						|
#   Defaults to $facts['os_service_default']
 | 
						|
#
 | 
						|
# [*user*]
 | 
						|
#   User BindDN to query the LDAP server. (string value)
 | 
						|
#   Defaults to $facts['os_service_default']
 | 
						|
#
 | 
						|
# [*password*]
 | 
						|
#   Password for the BindDN to query the LDAP server. (string value)
 | 
						|
#   Defaults to $facts['os_service_default']
 | 
						|
#
 | 
						|
# [*suffix*]
 | 
						|
#   LDAP server suffix (string value)
 | 
						|
#   Defaults to $facts['os_service_default']
 | 
						|
#
 | 
						|
# [*query_scope*]
 | 
						|
#   The LDAP scope for queries, this can be either "one"
 | 
						|
#   (onelevel/singleLevel) or "sub" (subtree/wholeSubtree). (string value)
 | 
						|
#   Defaults to $facts['os_service_default']
 | 
						|
#
 | 
						|
# [*page_size*]
 | 
						|
#   Maximum results per page; a value of zero ("0") disables paging. (integer value)
 | 
						|
#   Defaults to $facts['os_service_default']
 | 
						|
#
 | 
						|
# [*user_tree_dn*]
 | 
						|
#   Search base for users. (string value)
 | 
						|
#   Defaults to $facts['os_service_default']
 | 
						|
#
 | 
						|
# [*user_filter*]
 | 
						|
#   LDAP search filter for users. (string value)
 | 
						|
#   Defaults to $facts['os_service_default']
 | 
						|
#
 | 
						|
# [*user_objectclass*]
 | 
						|
#   LDAP objectclass for users. (string value)
 | 
						|
#   Defaults to $facts['os_service_default']
 | 
						|
#
 | 
						|
# [*user_id_attribute*]
 | 
						|
#   LDAP attribute mapped to user id. WARNING: must not be a multivalued attribute. (string value)
 | 
						|
#   Defaults to $facts['os_service_default']
 | 
						|
#
 | 
						|
# [*user_name_attribute*]
 | 
						|
#   LDAP attribute mapped to user name. (string value)
 | 
						|
#   Defaults to $facts['os_service_default']
 | 
						|
#
 | 
						|
# [*user_description_attribute*]
 | 
						|
#   LDAP attribute mapped to user description. (string value)
 | 
						|
#   Defaults to $facts['os_service_default']
 | 
						|
#
 | 
						|
# [*user_mail_attribute*]
 | 
						|
#   LDAP attribute mapped to user email. (string value)
 | 
						|
#
 | 
						|
# [*user_enabled_attribute*]
 | 
						|
#   LDAP attribute mapped to user enabled flag. (string value)
 | 
						|
#   Defaults to $facts['os_service_default']
 | 
						|
#
 | 
						|
# [*user_enabled_mask*]
 | 
						|
#   Bitmask integer to indicate the bit that the enabled value is stored in if
 | 
						|
#   the LDAP server represents "enabled" as a bit on an integer rather than a
 | 
						|
#   boolean. A value of "0" indicates the mask is not used. If this is not set
 | 
						|
#   to "0" the typical value is "2". This is typically used when
 | 
						|
#   "user_enabled_attribute = userAccountControl". (integer value)
 | 
						|
#   Defaults to $facts['os_service_default']
 | 
						|
#
 | 
						|
# [*user_enabled_default*]
 | 
						|
#   Default value to enable users. This should match an appropriate int value
 | 
						|
#   if the LDAP server uses non-boolean (bitmask) values to indicate if a user
 | 
						|
#   is enabled or disabled. If this is not set to "True" the typical value is
 | 
						|
#   "512". This is typically used when "user_enabled_attribute =
 | 
						|
#   userAccountControl". (string value)
 | 
						|
#   Defaults to $facts['os_service_default']
 | 
						|
#
 | 
						|
# [*user_enabled_invert*]
 | 
						|
#   Invert the meaning of the boolean enabled values. Some LDAP servers use a
 | 
						|
#   boolean lock attribute where "true" means an account is disabled. Setting
 | 
						|
#   "user_enabled_invert = true" will allow these lock attributes to be used.
 | 
						|
#   This setting will have no effect if "user_enabled_mask" or
 | 
						|
#   "user_enabled_emulation" settings are in use. (boolean value)
 | 
						|
#   Defaults to $facts['os_service_default']
 | 
						|
#
 | 
						|
# [*user_attribute_ignore*]
 | 
						|
#   List of attributes stripped off the user on update. (list value)
 | 
						|
#   Defaults to $facts['os_service_default']
 | 
						|
#
 | 
						|
# [*user_default_project_id_attribute*]
 | 
						|
#   LDAP attribute mapped to default_project_id for users. (string value)
 | 
						|
#   Defaults to $facts['os_service_default']
 | 
						|
#
 | 
						|
# [*user_pass_attribute*]
 | 
						|
#   LDAP attribute mapped to password. (string value)
 | 
						|
#   Defaults to $facts['os_service_default']
 | 
						|
#
 | 
						|
# [*user_enabled_emulation*]
 | 
						|
#   If true, Keystone uses an alternative method to determine if
 | 
						|
#   a user is enabled or not by checking if they are a member of
 | 
						|
#   the "user_enabled_emulation_dn" group. (boolean value)
 | 
						|
#   Defaults to $facts['os_service_default']
 | 
						|
#
 | 
						|
# [*user_enabled_emulation_dn*]
 | 
						|
#   DN of the group entry to hold enabled users when using enabled emulation.
 | 
						|
#   (string value)
 | 
						|
#   Defaults to $facts['os_service_default']
 | 
						|
#
 | 
						|
# [*user_additional_attribute_mapping*]
 | 
						|
#   List of additional LDAP attributes used for mapping
 | 
						|
#   additional attribute mappings for users. Attribute mapping
 | 
						|
#   format is <ldap_attr>:<user_attr>, where ldap_attr is the
 | 
						|
#   attribute in the LDAP entry and user_attr is the Identity
 | 
						|
#   API attribute. (list value)
 | 
						|
#   Defaults to $facts['os_service_default']
 | 
						|
#
 | 
						|
# [*group_tree_dn*]
 | 
						|
#   Search base for groups. (string value)
 | 
						|
#   Defaults to $facts['os_service_default']
 | 
						|
#
 | 
						|
# [*group_filter*]
 | 
						|
#   LDAP search filter for groups. (string value)
 | 
						|
#   Defaults to $facts['os_service_default']
 | 
						|
#
 | 
						|
# [*group_objectclass*]
 | 
						|
#   LDAP objectclass for groups. (string value)
 | 
						|
#   Defaults to $facts['os_service_default']
 | 
						|
#
 | 
						|
# [*group_id_attribute*]
 | 
						|
#   LDAP attribute mapped to group id. (string value)
 | 
						|
#   Defaults to $facts['os_service_default']
 | 
						|
#
 | 
						|
# [*group_name_attribute*]
 | 
						|
#   LDAP attribute mapped to group name. (string value)
 | 
						|
#   Defaults to $facts['os_service_default']
 | 
						|
#
 | 
						|
# [*group_member_attribute*]
 | 
						|
#   LDAP attribute mapped to show group membership. (string value)
 | 
						|
#   Defaults to $facts['os_service_default']
 | 
						|
#
 | 
						|
# [*group_members_are_ids*]
 | 
						|
#   LDAP attribute when members of the group object class are keystone user IDs. (boolean value)
 | 
						|
#   Defaults to $facts['os_service_default']
 | 
						|
#
 | 
						|
# [*group_desc_attribute*]
 | 
						|
#   LDAP attribute mapped to group description. (string value)
 | 
						|
#   Defaults to $facts['os_service_default']
 | 
						|
#
 | 
						|
# [*group_attribute_ignore*]
 | 
						|
#   List of attributes stripped off the group on update. (list value)
 | 
						|
#   Defaults to $facts['os_service_default']
 | 
						|
#
 | 
						|
# [*group_additional_attribute_mapping*]
 | 
						|
#   Additional attribute mappings for groups. Attribute mapping
 | 
						|
#   format is <ldap_attr>:<user_attr>, where ldap_attr is the
 | 
						|
#   attribute in the LDAP entry and user_attr is the Identity
 | 
						|
#   API attribute. (list value)
 | 
						|
#   Defaults to $facts['os_service_default']
 | 
						|
#
 | 
						|
# [*group_ad_nesting*]
 | 
						|
#   If enabled, group queries will use Active Directory specific
 | 
						|
#   filters for nested groups. (boolean value)
 | 
						|
#   Defaults to $facts['os_service_default']
 | 
						|
#
 | 
						|
# [*chase_referrals*]
 | 
						|
#   Whether or not to chase returned referrals. (boolean value)
 | 
						|
#   Defaults to $facts['os_service_default']
 | 
						|
#
 | 
						|
# [*use_tls*]
 | 
						|
#   Enable TLS for communicating with LDAP servers. (boolean value)
 | 
						|
#   Defaults to $facts['os_service_default']
 | 
						|
#
 | 
						|
# [*tls_cacertfile*]
 | 
						|
#   CA certificate file path for communicating with LDAP servers. (string value)
 | 
						|
#   Defaults to $facts['os_service_default']
 | 
						|
#
 | 
						|
# [*tls_cacertdir*]
 | 
						|
#   CA certificate directory path for communicating with LDAP servers. (string value)
 | 
						|
#   Defaults to $facts['os_service_default']
 | 
						|
#
 | 
						|
# [*tls_req_cert*]
 | 
						|
#   Valid options for tls_req_cert are demand, never, and allow. (string value)
 | 
						|
#   Defaults to $facts['os_service_default']
 | 
						|
#
 | 
						|
# [*identity_driver*]
 | 
						|
#   Identity backend driver. (string value)
 | 
						|
#   Defaults to 'ldap'
 | 
						|
#
 | 
						|
# [*use_pool*]
 | 
						|
#   Enable LDAP connection pooling. (boolean value)
 | 
						|
#   Defaults to $facts['os_service_default']
 | 
						|
#
 | 
						|
# [*pool_size*]
 | 
						|
#   Connection pool size. (integer value)
 | 
						|
#   Defaults to $facts['os_service_default']
 | 
						|
#
 | 
						|
# [*pool_retry_max*]
 | 
						|
#   Maximum count of reconnect trials. (integer value)
 | 
						|
#   Defaults to $facts['os_service_default']
 | 
						|
#
 | 
						|
# [*pool_retry_delay*]
 | 
						|
#   Time span in seconds to wait between two reconnect trials. (floating point value)
 | 
						|
#   Defaults to $facts['os_service_default']
 | 
						|
#
 | 
						|
# [*pool_connection_timeout*]
 | 
						|
#   Connector timeout in seconds. Value -1 indicates indefinite wait for response. (integer value)
 | 
						|
#   Defaults to $facts['os_service_default']
 | 
						|
#
 | 
						|
# [*pool_connection_lifetime*]
 | 
						|
#   Connection lifetime in seconds. (integer value)
 | 
						|
#   Defaults to $facts['os_service_default']
 | 
						|
#
 | 
						|
# [*use_auth_pool*]
 | 
						|
#   Enable LDAP connection pooling for end user authentication.
 | 
						|
#   If use_pool is disabled, then this setting is meaningless and is not used at all. (boolean value)
 | 
						|
#   Defaults to $facts['os_service_default']
 | 
						|
#
 | 
						|
# [*auth_pool_size*]
 | 
						|
#   End user auth connection pool size. (integer value)
 | 
						|
#   Defaults to $facts['os_service_default']
 | 
						|
#
 | 
						|
# [*auth_pool_connection_lifetime*]
 | 
						|
#   End user auth connection lifetime in seconds. (integer value)
 | 
						|
#   Defaults to $facts['os_service_default']
 | 
						|
#
 | 
						|
# [*package_ensure*]
 | 
						|
#   (optional) Desired ensure state of packages.
 | 
						|
#   accepts latest or specific versions.
 | 
						|
#   Defaults to present.
 | 
						|
#
 | 
						|
# [*manage_packages*]
 | 
						|
#   (optional) Whether or not this module should manage
 | 
						|
#   LDAP support packages.
 | 
						|
#   Defaults to true.
 | 
						|
#
 | 
						|
# [*create_domain_entry*]
 | 
						|
#   (optional) Creates the domain in keystone via a keystone_domain resource
 | 
						|
#   and attempts to refresh the keystone service.
 | 
						|
#   Defaults to false.
 | 
						|
#
 | 
						|
# == Dependencies
 | 
						|
# == Examples
 | 
						|
define keystone::ldap_backend(
 | 
						|
  $url                                  = $facts['os_service_default'],
 | 
						|
  $user                                 = $facts['os_service_default'],
 | 
						|
  $password                             = $facts['os_service_default'],
 | 
						|
  $suffix                               = $facts['os_service_default'],
 | 
						|
  $query_scope                          = $facts['os_service_default'],
 | 
						|
  $page_size                            = $facts['os_service_default'],
 | 
						|
  $user_tree_dn                         = $facts['os_service_default'],
 | 
						|
  $user_filter                          = $facts['os_service_default'],
 | 
						|
  $user_objectclass                     = $facts['os_service_default'],
 | 
						|
  $user_id_attribute                    = $facts['os_service_default'],
 | 
						|
  $user_name_attribute                  = $facts['os_service_default'],
 | 
						|
  $user_description_attribute           = $facts['os_service_default'],
 | 
						|
  $user_mail_attribute                  = $facts['os_service_default'],
 | 
						|
  $user_enabled_attribute               = $facts['os_service_default'],
 | 
						|
  $user_enabled_mask                    = $facts['os_service_default'],
 | 
						|
  $user_enabled_default                 = $facts['os_service_default'],
 | 
						|
  $user_enabled_invert                  = $facts['os_service_default'],
 | 
						|
  $user_attribute_ignore                = $facts['os_service_default'],
 | 
						|
  $user_default_project_id_attribute    = $facts['os_service_default'],
 | 
						|
  $user_pass_attribute                  = $facts['os_service_default'],
 | 
						|
  $user_enabled_emulation               = $facts['os_service_default'],
 | 
						|
  $user_enabled_emulation_dn            = $facts['os_service_default'],
 | 
						|
  $user_additional_attribute_mapping    = $facts['os_service_default'],
 | 
						|
  $group_tree_dn                        = $facts['os_service_default'],
 | 
						|
  $group_filter                         = $facts['os_service_default'],
 | 
						|
  $group_objectclass                    = $facts['os_service_default'],
 | 
						|
  $group_id_attribute                   = $facts['os_service_default'],
 | 
						|
  $group_name_attribute                 = $facts['os_service_default'],
 | 
						|
  $group_member_attribute               = $facts['os_service_default'],
 | 
						|
  $group_members_are_ids                = $facts['os_service_default'],
 | 
						|
  $group_desc_attribute                 = $facts['os_service_default'],
 | 
						|
  $group_attribute_ignore               = $facts['os_service_default'],
 | 
						|
  $group_additional_attribute_mapping   = $facts['os_service_default'],
 | 
						|
  $group_ad_nesting                     = $facts['os_service_default'],
 | 
						|
  $chase_referrals                      = $facts['os_service_default'],
 | 
						|
  $use_tls                              = $facts['os_service_default'],
 | 
						|
  $tls_cacertdir                        = $facts['os_service_default'],
 | 
						|
  $tls_cacertfile                       = $facts['os_service_default'],
 | 
						|
  $tls_req_cert                         = $facts['os_service_default'],
 | 
						|
  $identity_driver                      = 'ldap',
 | 
						|
  $use_pool                             = $facts['os_service_default'],
 | 
						|
  $pool_size                            = $facts['os_service_default'],
 | 
						|
  $pool_retry_max                       = $facts['os_service_default'],
 | 
						|
  $pool_retry_delay                     = $facts['os_service_default'],
 | 
						|
  $pool_connection_timeout              = $facts['os_service_default'],
 | 
						|
  $pool_connection_lifetime             = $facts['os_service_default'],
 | 
						|
  $use_auth_pool                        = $facts['os_service_default'],
 | 
						|
  $auth_pool_size                       = $facts['os_service_default'],
 | 
						|
  $auth_pool_connection_lifetime        = $facts['os_service_default'],
 | 
						|
  $package_ensure                       = present,
 | 
						|
  Boolean $manage_packages              = true,
 | 
						|
  Boolean $create_domain_entry          = false,
 | 
						|
) {
 | 
						|
 | 
						|
  include keystone::deps
 | 
						|
  include keystone::params
 | 
						|
 | 
						|
  if !defined(Class[keystone]) {
 | 
						|
    fail('The keystone class should be included before this class')
 | 
						|
  }
 | 
						|
 | 
						|
  if ! $::keystone::using_domain_config {
 | 
						|
    fail('Domain specific drivers are not enabled. Set keystone::using_domain_config to true.')
 | 
						|
  }
 | 
						|
 | 
						|
  $domain = $name
 | 
						|
 | 
						|
  if $manage_packages {
 | 
						|
    ensure_resource('package', 'python-ldappool', {
 | 
						|
      ensure => $package_ensure,
 | 
						|
      name   => $keystone::params::python_ldappool_package_name,
 | 
						|
      tag    => ['openstack', 'keystone-package'],
 | 
						|
    })
 | 
						|
  }
 | 
						|
 | 
						|
  if (!is_service_default($tls_cacertdir)) {
 | 
						|
    ensure_resource('file', $tls_cacertdir, { ensure => directory })
 | 
						|
  }
 | 
						|
 | 
						|
  keystone_domain_config {
 | 
						|
    "${domain}::ldap/url":                                  value => $url;
 | 
						|
    "${domain}::ldap/user":                                 value => $user;
 | 
						|
    "${domain}::ldap/password":                             value => $password, secret => true;
 | 
						|
    "${domain}::ldap/suffix":                               value => $suffix;
 | 
						|
    "${domain}::ldap/query_scope":                          value => $query_scope;
 | 
						|
    "${domain}::ldap/page_size":                            value => $page_size;
 | 
						|
    "${domain}::ldap/user_tree_dn":                         value => $user_tree_dn;
 | 
						|
    "${domain}::ldap/user_filter":                          value => $user_filter;
 | 
						|
    "${domain}::ldap/user_objectclass":                     value => $user_objectclass;
 | 
						|
    "${domain}::ldap/user_id_attribute":                    value => $user_id_attribute;
 | 
						|
    "${domain}::ldap/user_name_attribute":                  value => $user_name_attribute;
 | 
						|
    "${domain}::ldap/user_description_attribute":           value => $user_description_attribute;
 | 
						|
    "${domain}::ldap/user_mail_attribute":                  value => $user_mail_attribute;
 | 
						|
    "${domain}::ldap/user_enabled_attribute":               value => $user_enabled_attribute;
 | 
						|
    "${domain}::ldap/user_enabled_mask":                    value => $user_enabled_mask;
 | 
						|
    "${domain}::ldap/user_enabled_default":                 value => $user_enabled_default;
 | 
						|
    "${domain}::ldap/user_enabled_invert":                  value => $user_enabled_invert;
 | 
						|
    "${domain}::ldap/user_attribute_ignore":                value => $user_attribute_ignore;
 | 
						|
    "${domain}::ldap/user_default_project_id_attribute":    value => $user_default_project_id_attribute;
 | 
						|
    "${domain}::ldap/user_pass_attribute":                  value => $user_pass_attribute;
 | 
						|
    "${domain}::ldap/user_enabled_emulation":               value => $user_enabled_emulation;
 | 
						|
    "${domain}::ldap/user_enabled_emulation_dn":            value => $user_enabled_emulation_dn;
 | 
						|
    "${domain}::ldap/user_additional_attribute_mapping":    value => $user_additional_attribute_mapping;
 | 
						|
    "${domain}::ldap/group_tree_dn":                        value => $group_tree_dn;
 | 
						|
    "${domain}::ldap/group_filter":                         value => $group_filter;
 | 
						|
    "${domain}::ldap/group_objectclass":                    value => $group_objectclass;
 | 
						|
    "${domain}::ldap/group_id_attribute":                   value => $group_id_attribute;
 | 
						|
    "${domain}::ldap/group_name_attribute":                 value => $group_name_attribute;
 | 
						|
    "${domain}::ldap/group_member_attribute":               value => $group_member_attribute;
 | 
						|
    "${domain}::ldap/group_members_are_ids":                value => $group_members_are_ids;
 | 
						|
    "${domain}::ldap/group_desc_attribute":                 value => $group_desc_attribute;
 | 
						|
    "${domain}::ldap/group_attribute_ignore":               value => $group_attribute_ignore;
 | 
						|
    "${domain}::ldap/group_additional_attribute_mapping":   value => $group_additional_attribute_mapping;
 | 
						|
    "${domain}::ldap/group_ad_nesting":                     value => $group_ad_nesting;
 | 
						|
    "${domain}::ldap/chase_referrals":                      value => $chase_referrals;
 | 
						|
    "${domain}::ldap/use_tls":                              value => $use_tls;
 | 
						|
    "${domain}::ldap/tls_cacertdir":                        value => $tls_cacertdir;
 | 
						|
    "${domain}::ldap/tls_cacertfile":                       value => $tls_cacertfile;
 | 
						|
    "${domain}::ldap/tls_req_cert":                         value => $tls_req_cert;
 | 
						|
    "${domain}::ldap/use_pool":                             value => $use_pool;
 | 
						|
    "${domain}::ldap/pool_size":                            value => $pool_size;
 | 
						|
    "${domain}::ldap/pool_retry_max":                       value => $pool_retry_max;
 | 
						|
    "${domain}::ldap/pool_retry_delay":                     value => $pool_retry_delay;
 | 
						|
    "${domain}::ldap/pool_connection_timeout":              value => $pool_connection_timeout;
 | 
						|
    "${domain}::ldap/pool_connection_lifetime":             value => $pool_connection_lifetime;
 | 
						|
    "${domain}::ldap/use_auth_pool":                        value => $use_auth_pool;
 | 
						|
    "${domain}::ldap/auth_pool_size":                       value => $auth_pool_size;
 | 
						|
    "${domain}::ldap/auth_pool_connection_lifetime":        value => $auth_pool_connection_lifetime;
 | 
						|
    "${domain}::identity/driver":                           value => $identity_driver;
 | 
						|
  }
 | 
						|
 | 
						|
  if $create_domain_entry {
 | 
						|
    keystone_domain { $domain :
 | 
						|
      ensure  => 'present',
 | 
						|
      enabled => true,
 | 
						|
      tag     => 'domain-specific-ldap'
 | 
						|
    }
 | 
						|
    Keystone_domain[$domain] ~> Exec<| title == 'restart_keystone' |>
 | 
						|
  }
 | 
						|
}
 |