diff --git a/group_vars/all/vars.yml b/group_vars/all/vars.yml index 7a84123..90615a1 100644 --- a/group_vars/all/vars.yml +++ b/group_vars/all/vars.yml @@ -5,7 +5,7 @@ ansible_python_interpreter: /usr/bin/python3 # LDAP binding # You can hash LDAP passwords with `slappasswd` tool ldap_base: 'dc=auro,dc=re' -ldap_master_ipv4: '10.128.0.11' +ldap_master_ipv4: '10.128.0.21' ldap_master_uri: "ldap://re2o-ldap.adm.auro.re" ldap_user_tree: "cn=Utilisateurs,{{ ldap_base }}" ldap_nslcd_bind_dn: "cn=nslcd,ou=service-users,{{ ldap_base }}" diff --git a/roles/radius/tasks/main.yml b/roles/radius/tasks/main.yml index 1d419a2..672bc6d 100644 --- a/roles/radius/tasks/main.yml +++ b/roles/radius/tasks/main.yml @@ -179,7 +179,7 @@ state: dump target: /tmp/re2o-schema.sql target_opts: '-s' - login_host: 10.128.0.12 + login_host: 10.128.0.22 login_user: replication login_password: "{{ radius_pg_replication_password }}" diff --git a/roles/radius/templates/settings_local.py.j2 b/roles/radius/templates/settings_local.py.j2 index 0e47e36..fb1ac29 100644 --- a/roles/radius/templates/settings_local.py.j2 +++ b/roles/radius/templates/settings_local.py.j2 @@ -75,7 +75,7 @@ DATABASES = { }, 'ldap': { 'ENGINE': 'ldapdb.backends.ldap', - 'NAME': 'ldap://10.128.0.11/', + 'NAME': 'ldap://10.128.0.21/', 'USER': 'cn=admin,dc=auro,dc=re', 'TLS': False, 'PASSWORD': '{{ ldap_admin_password }}',