*** Wartungsfenster jeden ersten Mittwoch vormittag im Monat ***

Skip to content
Snippets Groups Projects
Verified Commit 8e91e5b4 authored by Weise, Martin's avatar Weise, Martin
Browse files

Added block and always exception handling

parent fbc4359b
No related branches found
No related tags found
1 merge request!11Allow for the sysadmin to access the provider network, added the ui support...
...@@ -11,11 +11,7 @@ ...@@ -11,11 +11,7 @@
### ARGS: ### ARGS:
### username The user common name, cannot contain spaces, ### username The user common name, cannot contain spaces,
### is only lowercase alphanumeric (e.g. client1, foobar). ### is only lowercase alphanumeric (e.g. client1, foobar).
### fullname The full name, e.g. Foo Bar
### email The e-mail address of the user.
### phone The telephone number of the user.
### role_type The role type of the user, must be one of sysadmin, dbadmin, owner, analyst, provider ### role_type The role type of the user, must be one of sysadmin, dbadmin, owner, analyst, provider
### pubkey The path to the public key.
### ###
### SIDE EFFECTS: ### SIDE EFFECTS:
### - Creates new credentials on the identity node. ### - Creates new credentials on the identity node.
......
...@@ -28,18 +28,16 @@ packages: ...@@ -28,18 +28,16 @@ packages:
runcmd: runcmd:
- /root/rsyslog-init && logger "Configured rsyslog" - /root/rsyslog-init && logger "Configured rsyslog"
- /root/firewall-init && logger "Configured firewalld" - /root/firewall-init && logger "Configured firewalld"
- /root/idp-init && logger "Configured identity provider" - /root/idm-init && logger "Configured identity provider"
write_files: write_files:
- path: /root/firewall-init - path: /root/firewall-init
permissions: '0744' permissions: '0744'
content: | content: |
#!/bin/bash #!/bin/bash
logger "Configuring firewalld ..." logger "Configuring firewalld ..."
/bin/firewall-offline-cmd --add-service=http /bin/firewall-offline-cmd --add-service=ntp
/bin/firewall-offline-cmd --add-service=https /bin/firewall-offline-cmd --add-service=dns
/bin/firewall-offline-cmd --add-service=ldap /bin/firewall-offline-cmd --add-service=freeipa-4
/bin/firewall-offline-cmd --add-service=ldaps
/bin/firewall-offline-cmd --add-service=kerberos
/bin/firewall-offline-cmd --add-service=syslog /bin/firewall-offline-cmd --add-service=syslog
/bin/firewall-offline-cmd --add-port=53/tcp /bin/firewall-offline-cmd --add-port=53/tcp
/bin/firewall-offline-cmd --add-port=53/udp /bin/firewall-offline-cmd --add-port=53/udp
...@@ -56,15 +54,15 @@ write_files: ...@@ -56,15 +54,15 @@ write_files:
/bin/systemctl enable rsyslog /bin/systemctl enable rsyslog
/bin/systemctl start rsyslog /bin/systemctl start rsyslog
- path: /root/idp-init - path: /root/idm-init
permissions: '0744' permissions: '0744'
content: | content: |
#!/bin/bash #!/bin/bash
logger "Configuring FreeIPA ..." logger "Configuring FreeIPA ..."
/usr/bin/hostnamectl set-hostname idp.ossdip.at /usr/bin/hostnamectl set-hostname idm.ossdip.at
echo "172.27.48.8 idp.ossdip.at idp" | tee -a /etc/hosts echo "172.27.48.8 idm.ossdip.at idm" | tee -a /etc/hosts
logger "Installing Identity Management server with integrated DNS" logger "Installing Identity Management server with integrated DNS"
dnf module install -y idm:DL1/dns dnf module install -y idm:DL1/dns
ipa-server-install --realm idp.ossdip.at --domain idp.ossdip.at --ds-password {{ idp_dm_passwd }} \ ipa-server-install --realm idm.ossdip.at --domain idm.ossdip.at --ds-password {{ idp_dm_passwd }} \
--admin-password {{ idp_adm_passwd }} --no-forwarders --no-ntp --setup-dns --no-ui-redirect \ --admin-password {{ idp_adm_passwd }} --no-forwarders --no-ntp --setup-dns --no-ui-redirect \
--unattended --unattended
...@@ -31,6 +31,8 @@ vms: ...@@ -31,6 +31,8 @@ vms:
name: vnc name: vnc
- ip: 172.27.49.142 - ip: 172.27.49.142
name: owner name: owner
- ip: 172.27.48.9
name: provider
gate: gate:
networks: networks:
- ip: 172.27.48.141 # is deactivated after install - ip: 172.27.48.141 # is deactivated after install
......
...@@ -10,26 +10,28 @@ ...@@ -10,26 +10,28 @@
locked: true locked: true
register: vm_locked register: vm_locked
- name: Unlock node - name: Port
openstack.cloud.server_action: block:
server: "OSSDIP {{ instance }}" - name: Unlock node
action: unlock openstack.cloud.server_action:
when: vm_locked.openstack_servers | length > 0 server: "OSSDIP {{ instance }}"
action: unlock
- name: Delete port when: vm_locked.openstack_servers | length > 0
openstack.cloud.port:
name: "ossdip-{{ type }}-{{ node }}-{{ network }}"
state: absent
when: type is defined
- name: Delete port - name: Delete port
openstack.cloud.port: openstack.cloud.port:
name: "ossdip-{{ node }}-{{ network }}" name: "ossdip-{{ type }}-{{ node }}-{{ network }}"
state: absent state: absent
when: type is undefined when: type is defined
- name: Lock node - name: Delete port
openstack.cloud.server_action: openstack.cloud.port:
server: "OSSDIP {{ instance }}" name: "ossdip-{{ node }}-{{ network }}"
action: lock state: absent
when: vm_locked.openstack_servers | length > 0 when: type is undefined
\ No newline at end of file always:
- name: Lock node
openstack.cloud.server_action:
server: "OSSDIP {{ instance }}"
action: lock
when: vm_locked.openstack_servers | length > 0
\ No newline at end of file
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment