diff --git a/group_vars/all/main.yml b/group_vars/all/main.yml index 97a257f5b2b903074e427343821fb9972963c8b7..01a719cb4f577be2bf1265ddce3c0b7277d50d6a 100644 --- a/group_vars/all/main.yml +++ b/group_vars/all/main.yml @@ -1,10 +1,10 @@ --- -soctools_netname: "dslnifinet" +soctools_netname: "soctoolsnet" repo: gn43-dsl version: 7 -suffix: a20200520 +suffix: a20200528 temp_root: "/tmp/centosbuild" @@ -18,7 +18,7 @@ nifi_img: "{{repo}}/nifi:{{version}}{{suffix}}" nginx_name: "dsoclab-nginx" nginx_img: "{{repo}}/nginx:{{version}}{{suffix}}" -dslproxy: "dsldev.gn4-3-wp8-soc.sunet.se" +dslproxy: "dsoclab.gn4-3-wp8-soc.sunet.se" kspass: "Testing003" tspass: "Testing003" @@ -30,7 +30,7 @@ sysctlconfig: javamem: "384m" -ca_cn: "dsldev test ca" +ca_cn: "SOCTOOLS-CA" #nifiadmin: # - [ "Bozidar Proevski", "Pass001" ] @@ -38,13 +38,6 @@ ca_cn: "dsldev test ca" # - [ "NifiELKuser", "Pass003" ] soctools_users: - - firstname: "Arne" - lastname: "Oslebo" - username: "arne.oslebo" - email: "arne.oslebo@uninett.no" - DN: "CN=Arne Oslebo" - CN: "Arne Oslebo" - password: "Pass002" - firstname: "Bozidar" lastname: "Proevski" username: "bozidar.proevski" @@ -52,6 +45,13 @@ soctools_users: DN: "CN=Bozidar Proevski" CN: "Bozidar Proevski" password: "Pass001" + - firstname: "Arne" + lastname: "Oslebo" + username: "arne.oslebo" + email: "arne.oslebo@uninett.no" + DN: "CN=Arne Oslebo" + CN: "Arne Oslebo" + password: "Pass002" odfees_img: "{{repo}}/odfees:{{version}}{{suffix}}" @@ -62,7 +62,7 @@ odfees_adminpass: "Pass004" elk_version: "oss-7.4.2" odfeplugin_version: "1.4.0.0" -openid_realm: "GN43WP8T31SOC1" +openid_realm: "SOCTOOLS1" openid_scope: profile openid_subjkey: preferred_username diff --git a/roles/ca/tasks/main.yml b/roles/ca/tasks/main.yml index c10b3acaf7ba309548967371108ca71c78165398..b721654d3516717d249fe7a9bfc4ebfec88469b5 100644 --- a/roles/ca/tasks/main.yml +++ b/roles/ca/tasks/main.yml @@ -197,3 +197,17 @@ EASYRSA_BATCH: 1 EASYRSA_PKI: roles/ca/files/CA +- name: Copy user certs to odfees + copy: + src: "roles/ca/files/CA/private/{{ item.CN }}.p12" + dest: "roles/odfees/files/{{ item.CN }}.p12" + with_items: + - "{{soctools_users}}" + +- name: Copy user certs to odfekibana + copy: + src: "roles/ca/files/CA/private/{{ item.CN }}.p12" + dest: "roles/odfekibana/files/{{ item.CN }}.p12" + with_items: + - "{{soctools_users}}" + diff --git a/roles/keycloak/tasks/main.yml b/roles/keycloak/tasks/main.yml index 49ee1459c8375814d56f9dba4264bbebfa8c2831..1de65c9d200e08c60c2f26c6967a1509bd42c82b 100644 --- a/roles/keycloak/tasks/main.yml +++ b/roles/keycloak/tasks/main.yml @@ -23,9 +23,6 @@ - local: "files/{{ ca_cn }}.crt" remote: /etc/x509/ca/ca.crt mode: '0644' - - local: "files/gn43wp8t31ca.crt" - remote: /etc/x509/ca/gn43wp8t31ca.crt - mode: '0644' - local: "files/cacerts.jks" remote: /opt/jboss/keycloak/cacerts.jks mode: '0644' @@ -35,7 +32,7 @@ - name: Generate Keycloak secure config command: "/opt/jboss/tools/x509.sh" environment: - X509_CA_BUNDLE: "/etc/x509/ca/ca.crt /etc/x509/ca/gn43wp8t31ca.crt" + X509_CA_BUNDLE: "/etc/x509/ca/ca.crt" tags: - start diff --git a/roles/odfekibana/templates/kibana.yml.j2 b/roles/odfekibana/templates/kibana.yml.j2 index 41a9b66d5b7684aeb8755035722d582512445828..a5280f7def850c21db8b93d87f7cf7e9b5ddfbb3 100644 --- a/roles/odfekibana/templates/kibana.yml.j2 +++ b/roles/odfekibana/templates/kibana.yml.j2 @@ -33,9 +33,10 @@ opendistro_security.multitenancy.enabled: true opendistro_security.multitenancy.tenants.preferred: ["Private", "Global"] opendistro_security.readonly_mode.roles: ["kibana_read_only"] -newsfeed.enabled: false -telemetry.optIn: false -telemetry.enabled: false +#new in 7.6 +#newsfeed.enabled: false +#telemetry.optIn: false +#telemetry.enabled: false opendistro_security.auth.type: "openid" opendistro_security.openid.connect_url: "https://{{dslproxy}}:12443/auth/realms/{{openid_realm}}/.well-known/openid-configuration" @@ -49,17 +50,17 @@ opendistro_security.cookie.secure: true opendistro_security.cookie.password: "{{lookup('password', '/dev/null length=32 chars=ascii_letters,digits,hexdigits')}}" server.ssl.enabled: true -#server.ssl.key: /usr/share/kibana/config/{{inventory_hostname}}.key -#server.ssl.certificate: /usr/share/kibana/config/{{inventory_hostname}}.crt -server.ssl.keystore.path: /usr/share/kibana/config/{{inventory_hostname}}.p12 -server.ssl.keystore.password: {{kspass}} +server.ssl.key: /usr/share/kibana/config/{{inventory_hostname}}.key +server.ssl.certificate: /usr/share/kibana/config/{{inventory_hostname}}.crt +#server.ssl.keystore.path: /usr/share/kibana/config/{{inventory_hostname}}.p12 +#server.ssl.keystore.password: {{kspass}} #server.ssl.certificateAuthorities: #server.ssl.truststore.path: jks (p12?) #server.ssl.truststore.password: -#elasticsearch.ssl.certificate: /usr/share/kibana/config/odfe-kibana.crt -#elasticsearch.ssl.key: /usr/share/kibana/config/odfe-kibana.key -#elasticsearch.ssl.certificateAuthorities: /usr/share/kibana/config/dslca.crt +#elasticsearch.ssl.certificate: /usr/share/kibana/config/{{inventory_hostname}}.crt +#elasticsearch.ssl.key: /usr/share/kibana/config/{{inventory_hostname}}.key +#elasticsearch.ssl.certificateAuthorities: /usr/share/kibana/config/{{ca_cn}}.crt opendistro_security.allow_client_certificates: true