Init directory client configurations
Signed-off-by: Georg <georg@lysergic.dev>
This commit is contained in:
parent
8f34173c6d
commit
5f1c378aa6
35
dirsrv/ldif/sudoers-389.ldif
Normal file
35
dirsrv/ldif/sudoers-389.ldif
Normal file
@ -0,0 +1,35 @@
|
||||
dn: cn=defaults,ou=SUDOers,ou=syscid-system,dc=syscid,dc=com
|
||||
objectClass: top
|
||||
objectClass: sudoRole
|
||||
cn: defaults
|
||||
description: Default sudoOption's go here
|
||||
sudoOption: always_set_home
|
||||
sudoOption: secure_path="/usr/sbin:/usr/bin:/sbin:/bin"
|
||||
sudoOption: env_reset
|
||||
sudoOption: env_keep = "LANG LC_ADDRESS LC_CTYPE LC_COLLATE LC_IDENTIFICATION LC_MEASUREMENT LC_MESSAGES LC_MONETARY LC_NAME LC_NUMERIC LC_PAPER LC_TELEPHONE LC_ATIME LC_ALL LANGUAGE LINGUAS XDG_SESSION_COOKIE"
|
||||
sudoOption: insults
|
||||
sudoOption: mail_badpass
|
||||
sudoOption: log_output
|
||||
sudoOption: timestamp_timeout=15
|
||||
sudoOrder: 1
|
||||
|
||||
dn: cn=root,ou=SUDOers,ou=syscid-system,dc=syscid,dc=com
|
||||
objectClass: top
|
||||
objectClass: sudoRole
|
||||
cn: root
|
||||
sudoUser: root
|
||||
sudoHost: ALL
|
||||
sudoRunAsUser: ALL
|
||||
sudoCommand: ALL
|
||||
sudoOrder: 2
|
||||
|
||||
dn: cn=%wheel,ou=SUDOers,ou=syscid-system,dc=syscid,dc=com
|
||||
objectClass: top
|
||||
objectClass: sudoRole
|
||||
cn: %wheel
|
||||
sudoUser: %wheel
|
||||
sudoHost: ALL
|
||||
sudoRunAsUser: ALL
|
||||
sudoCommand: ALL
|
||||
sudoOrder: 3
|
||||
|
153
dirsrv/misc/sudoers2ldif.pl
Normal file
153
dirsrv/misc/sudoers2ldif.pl
Normal file
@ -0,0 +1,153 @@
|
||||
#!/usr/bin/env perl
|
||||
#
|
||||
# Copyright (c) 2007, 2010-2011, 2013 Todd C. Miller <Todd.Miller@courtesan.com>
|
||||
#
|
||||
# Permission to use, copy, modify, and distribute this software for any
|
||||
# purpose with or without fee is hereby granted, provided that the above
|
||||
# copyright notice and this permission notice appear in all copies.
|
||||
#
|
||||
# THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
|
||||
# WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
|
||||
# MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
|
||||
# ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
|
||||
# WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
|
||||
# ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
|
||||
# OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
|
||||
#
|
||||
|
||||
use strict;
|
||||
|
||||
#
|
||||
# Converts a sudoers file to LDIF format in prepration for loading into
|
||||
# the LDAP server.
|
||||
#
|
||||
|
||||
# BUGS:
|
||||
# Does not yet handle multiple lines with : in them
|
||||
# Does not yet remove quotation marks from options
|
||||
# Does not yet escape + at the beginning of a dn
|
||||
# Does not yet handle line wraps correctly
|
||||
# Does not yet handle multiple roles with same name (needs tiebreaker)
|
||||
#
|
||||
# CAVEATS:
|
||||
# Sudoers entries can have multiple RunAs entries that override former ones,
|
||||
# with LDAP sudoRunAs{Group,User} applies to all commands in a sudoRole
|
||||
|
||||
my %RA;
|
||||
my %UA;
|
||||
my %HA;
|
||||
my %CA;
|
||||
my $base=$ENV{SUDOERS_BASE} or die "$0: Container SUDOERS_BASE undefined\n";
|
||||
my @options=();
|
||||
|
||||
my $did_defaults=0;
|
||||
my $order = 0;
|
||||
|
||||
# parse sudoers one line at a time
|
||||
while (<>){
|
||||
|
||||
# remove comment
|
||||
s/#.*//;
|
||||
|
||||
# line continuation
|
||||
$_.=<> while s/\\\s*$//s;
|
||||
|
||||
# cleanup newline
|
||||
chomp;
|
||||
|
||||
# ignore blank lines
|
||||
next if /^\s*$/;
|
||||
|
||||
if (/^Defaults\s+/i) {
|
||||
my $opt=$';
|
||||
$opt=~s/\s+$//; # remove trailing whitespace
|
||||
push @options,$opt;
|
||||
} elsif (/^(\S+)\s+([^=]+)=\s*(.*)/) {
|
||||
|
||||
# Aliases or Definitions
|
||||
my ($p1,$p2,$p3)=($1,$2,$3);
|
||||
$p2=~s/\s+$//; # remove trailing whitespace
|
||||
$p3=~s/\s+$//; # remove trailing whitespace
|
||||
|
||||
if ($p1 eq "User_Alias") {
|
||||
$UA{$p2}=$p3;
|
||||
} elsif ($p1 eq "Runas_Alias") {
|
||||
$RA{$p2}=$p3;
|
||||
} elsif ($p1 eq "Host_Alias") {
|
||||
$HA{$p2}=$p3;
|
||||
} elsif ($p1 eq "Cmnd_Alias") {
|
||||
$CA{$p2}=$p3;
|
||||
} else {
|
||||
if (!$did_defaults++){
|
||||
# do this once
|
||||
print "dn: cn=defaults,$base\n";
|
||||
print "objectClass: top\n";
|
||||
print "objectClass: sudoRole\n";
|
||||
print "cn: defaults\n";
|
||||
print "description: Default sudoOption's go here\n";
|
||||
print "sudoOption: $_\n" foreach @options;
|
||||
printf "sudoOrder: %d\n", ++$order;
|
||||
print "\n";
|
||||
}
|
||||
# Definition
|
||||
my @users=split /\s*,\s*/,$p1;
|
||||
my @hosts=split /\s*,\s*/,$p2;
|
||||
my @cmds= split /\s*,\s*/,$p3;
|
||||
@options=();
|
||||
print "dn: cn=$users[0],$base\n";
|
||||
print "objectClass: top\n";
|
||||
print "objectClass: sudoRole\n";
|
||||
print "cn: $users[0]\n";
|
||||
# will clobber options
|
||||
print "sudoUser: $_\n" foreach expand(\%UA,@users);
|
||||
print "sudoHost: $_\n" foreach expand(\%HA,@hosts);
|
||||
foreach (@cmds) {
|
||||
if (s/^\(([^\)]+)\)\s*//) {
|
||||
my @runas = split(/:\s*/, $1);
|
||||
if (defined($runas[0])) {
|
||||
print "sudoRunAsUser: $_\n" foreach expand(\%RA, split(/,\s*/, $runas[0]));
|
||||
}
|
||||
if (defined($runas[1])) {
|
||||
print "sudoRunAsGroup: $_\n" foreach expand(\%RA, split(/,\s*/, $runas[1]));
|
||||
}
|
||||
}
|
||||
}
|
||||
print "sudoCommand: $_\n" foreach expand(\%CA,@cmds);
|
||||
print "sudoOption: $_\n" foreach @options;
|
||||
printf "sudoOrder: %d\n", ++$order;
|
||||
print "\n";
|
||||
}
|
||||
|
||||
} else {
|
||||
print "parse error: $_\n";
|
||||
}
|
||||
|
||||
}
|
||||
|
||||
#
|
||||
# recursively expand hash elements
|
||||
sub expand{
|
||||
my $ref=shift;
|
||||
my @a=();
|
||||
|
||||
# preen the line a little
|
||||
foreach (@_){
|
||||
# if NOPASSWD: directive found, mark entire entry as not requiring
|
||||
s/NOPASSWD:\s*// && push @options,"!authenticate";
|
||||
s/PASSWD:\s*// && push @options,"authenticate";
|
||||
s/NOEXEC:\s*// && push @options,"noexec";
|
||||
s/EXEC:\s*// && push @options,"!noexec";
|
||||
s/SETENV:\s*// && push @options,"setenv";
|
||||
s/NOSETENV:\s*// && push @options,"!setenv";
|
||||
s/LOG_INPUT:\s*// && push @options,"log_input";
|
||||
s/NOLOG_INPUT:\s*// && push @options,"!log_input";
|
||||
s/LOG_OUTPUT:\s*// && push @options,"log_output";
|
||||
s/NOLOG_OUTPUT:\s*// && push @options,"!log_output";
|
||||
s/[[:upper:]]+://; # silently remove other tags
|
||||
s/\s+$//; # right trim
|
||||
}
|
||||
|
||||
# do the expanding
|
||||
push @a,$ref->{$_} ? expand($ref,split /\s*,\s*/,$ref->{$_}):$_ foreach @_;
|
||||
@a;
|
||||
}
|
32
generic/nsswitch.conf
Normal file
32
generic/nsswitch.conf
Normal file
@ -0,0 +1,32 @@
|
||||
###
|
||||
##
|
||||
## Prototype Name Service Switch configuration for GNU/Linux systems in the namespaces lysergic.dev / syscid.com / liberta.casa
|
||||
#ä
|
||||
## Unless otherwise stated, system/scripts/sh/deploy_directory_client.sh should be run instead of manually setting this file.
|
||||
## georg@lysergic.dev
|
||||
##
|
||||
###
|
||||
|
||||
passwd: sss files
|
||||
group: sss files
|
||||
shadow: sss compat
|
||||
# initgroups: compat
|
||||
|
||||
hosts: files dns
|
||||
networks: files dns
|
||||
|
||||
aliases: files usrfiles
|
||||
ethers: files usrfiles
|
||||
gshadow: files usrfiles
|
||||
netgroup: files nis
|
||||
protocols: files usrfiles
|
||||
publickey: files
|
||||
rpc: files usrfiles
|
||||
services: files usrfiles
|
||||
|
||||
automount: files nis
|
||||
bootparams: files
|
||||
netmasks: files
|
||||
|
||||
sudoers: sss
|
||||
|
72
sssd/client_sssd.generated.conf
Normal file
72
sssd/client_sssd.generated.conf
Normal file
@ -0,0 +1,72 @@
|
||||
WARNING: ldap_uri starts with ldapi:// - you should review this parameter in the sssd configuration
|
||||
|
||||
#
|
||||
# sssd.conf
|
||||
# Generated by 389 Directory Server - dsidm
|
||||
#
|
||||
# For more details see man sssd.conf and man sssd-ldap
|
||||
# Be sure to review the content of this file to ensure it is secure and correct
|
||||
# in your environment.
|
||||
|
||||
[domain/ldap]
|
||||
# Uncomment this for more verbose logging.
|
||||
# debug_level=3
|
||||
|
||||
# Cache hashes of user authentication for offline auth.
|
||||
cache_credentials = True
|
||||
id_provider = ldap
|
||||
auth_provider = ldap
|
||||
access_provider = ldap
|
||||
chpass_provider = ldap
|
||||
ldap_schema = rfc2307bis
|
||||
ldap_search_base = dc=syscid,dc=com
|
||||
ldap_uri = ldapi://%2fvar%2frun%2fslapd-syscid.socket
|
||||
# If you have DNS SRV records, you can use the following instead. This derives
|
||||
# from your ldap_search_base.
|
||||
# ldap_uri = _srv_
|
||||
|
||||
ldap_tls_reqcert = demand
|
||||
# To use cacert dir, place *.crt files in this path then run:
|
||||
# /usr/bin/openssl rehash /etc/openldap/certs
|
||||
# or (for older versions of openssl)
|
||||
# /usr/bin/c_rehash /etc/openldap/certs
|
||||
ldap_tls_cacertdir = /etc/openldap/certs
|
||||
|
||||
# Path to the cacert
|
||||
# ldap_tls_cacert = /etc/openldap/certs/ca.crt
|
||||
|
||||
# Only users who match this filter can login and authorise to this machine. Note
|
||||
# that users who do NOT match, will still have their uid/gid resolve, but they
|
||||
# can't login.
|
||||
# ldap_access_filter = (memberOf=<dn>)
|
||||
|
||||
enumerate = false
|
||||
access_provider = ldap
|
||||
ldap_user_member_of = memberof
|
||||
ldap_user_gecos = cn
|
||||
ldap_user_uuid = nsUniqueId
|
||||
ldap_group_uuid = nsUniqueId
|
||||
# This is really important as it allows SSSD to respect nsAccountLock
|
||||
ldap_account_expire_policy = rhds
|
||||
ldap_access_order = filter, expire
|
||||
# Setup for ssh keys
|
||||
# Inside /etc/ssh/sshd_config add the lines:
|
||||
# AuthorizedKeysCommand /usr/bin/sss_ssh_authorizedkeys
|
||||
# AuthorizedKeysCommandUser nobody
|
||||
# You can test with the command: sss_ssh_authorizedkeys <username>
|
||||
ldap_user_ssh_public_key = nsSshPublicKey
|
||||
|
||||
# This prevents an issue where the Directory is recursively walked on group
|
||||
# and user look ups. It makes the client faster and more responsive in almost
|
||||
# every scenario.
|
||||
ignore_group_members = False
|
||||
|
||||
[sssd]
|
||||
services = nss, pam, ssh, sudo
|
||||
config_file_version = 2
|
||||
|
||||
domains = ldap
|
||||
[nss]
|
||||
homedir_substring = /home
|
||||
|
||||
|
58
sssd/sssd.conf
Normal file
58
sssd/sssd.conf
Normal file
@ -0,0 +1,58 @@
|
||||
###
|
||||
##
|
||||
## Prototype System Security Services Daemon configuration for GNU/Linux based systems in the namespaces lysergic.dev / syscid.com /liberta.casa
|
||||
##
|
||||
## Unless otherwise stated, system/scripts/sh/deploy_directory_client.sh should be run instead of manually setting this file.
|
||||
##
|
||||
## georg@lysergic.dev
|
||||
##
|
||||
###
|
||||
|
||||
[sssd]
|
||||
debug_level = 10
|
||||
config_file_version = 2
|
||||
services = nss, pam, ssh, sudo
|
||||
domains = SYSCID
|
||||
|
||||
[nss]
|
||||
homedir_substring = /home
|
||||
debug_level = 10
|
||||
|
||||
[pam]
|
||||
debug_level = 10
|
||||
pam_verbosity = 3
|
||||
pam_account_expired_message = Permission denied - Your SYSCID or LibertaCasa Account EXPIRED.
|
||||
pam_account_locked_message = Permission denied - Your SYSCID or LibertaCasa Account is LOCKED.
|
||||
|
||||
[ssh]
|
||||
debug_level = 10
|
||||
|
||||
[sudo]
|
||||
debug_level = 10
|
||||
|
||||
[domain/SYSCID]
|
||||
ignore_group_members = False
|
||||
debug_level = 10
|
||||
cache_credentials= False
|
||||
id_provider = ldap
|
||||
auth_provider = ldap
|
||||
access_provider = ldap
|
||||
chpass_provider = ldap
|
||||
ldap_schema = rfc2307bis
|
||||
ldap_search_base = dc=syscid,dc=com
|
||||
ldap_uri = ldaps://ldap.syscid.com
|
||||
ldap_access_filter = (memberOf=cn=syscid_shell_users,ou=syscid-groups,dc=syscid,dc=com)
|
||||
access_provider = ldap
|
||||
ldap_user_member_of = memberof
|
||||
#ldap_group_member = memberUid
|
||||
#ldap_group_member = member
|
||||
ldap_user_gecos = cn
|
||||
ldap_user_uuid = nsUniqueId
|
||||
ldap_group_uuid = nsUniqueId
|
||||
#ldap_pwd_policy = shadow
|
||||
ldap_account_expire_policy = rhds
|
||||
ldap_access_order = filter, expire, pwd_expire_policy_renew
|
||||
ldap_user_ssh_public_key = sshPublicKey
|
||||
sudo_provider = ldap
|
||||
ldap_sudo_search_base = ou=SUDOers,ou=syscid-system,dc=syscid,dc=com
|
||||
|
Loading…
Reference in New Issue
Block a user