Skip to content
Snippets Groups Projects
Select Git revision
  • 42b24616acc85958575ffbbe3a333d110da4c8c8
  • master default protected
  • v2.28.0
  • v2.27.0
  • v2.25.1
  • v2.24.3
  • v2.26.0
  • v2.24.2
  • v2.25.0
  • v2.24.1
  • v2.22.2
  • v2.23.3
  • v2.24.0
  • v2.23.2
  • v2.23.1
  • v2.23.0
  • v2.22.1
  • v2.22.0
  • v2.21.0
  • v2.20.0
  • v2.19.1
  • v2.18.2
22 results

setup.py

Blame
  • ipahbacrule.py 21.50 KiB
    # -*- coding: utf-8 -*-
    
    # Authors:
    #   Thomas Woerner <twoerner@redhat.com>
    #
    # Copyright (C) 2019-2022 Red Hat
    # see file 'COPYING' for use and warranty information
    #
    # This program is free software; you can redistribute it and/or modify
    # it under the terms of the GNU General Public License as published by
    # the Free Software Foundation, either version 3 of the License, or
    # (at your option) any later version.
    #
    # This program is distributed in the hope that it will be useful,
    # but WITHOUT ANY WARRANTY; without even the implied warranty of
    # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
    # GNU General Public License for more details.
    #
    # You should have received a copy of the GNU General Public License
    # along with this program.  If not, see <http://www.gnu.org/licenses/>.
    
    from __future__ import (absolute_import, division, print_function)
    
    __metaclass__ = type
    
    ANSIBLE_METADATA = {
        "metadata_version": "1.0",
        "supported_by": "community",
        "status": ["preview"],
    }
    
    DOCUMENTATION = """
    ---
    module: ipahbacrule
    short_description: Manage FreeIPA HBAC rules
    description: Manage FreeIPA HBAC rules
    extends_documentation_fragment:
      - ipamodule_base_docs
    options:
      name:
        description: The hbacrule name
        type: list
        elements: str
        required: true
        aliases: ["cn"]
      description:
        description: The hbacrule description
        type: str
        required: false
      usercategory:
        description: User category the rule applies to
        type: str
        required: false
        aliases: ["usercat"]
        choices: ["all", ""]
      hostcategory:
        description: Host category the rule applies to
        type: str
        required: false
        aliases: ["hostcat"]
        choices: ["all", ""]
      servicecategory:
        description: Service category the rule applies to
        type: str
        required: false
        aliases: ["servicecat"]
        choices: ["all", ""]
      nomembers:
        description: Suppress processing of membership attributes
        required: false
        type: bool
      host:
        description: List of host names assigned to this hbacrule.
        required: false
        type: list
        elements: str
      hostgroup:
        description: List of host groups assigned to this hbacrule.
        required: false
        type: list
        elements: str
      hbacsvc:
        description: List of HBAC service names assigned to this hbacrule.
        required: false
        type: list
        elements: str
      hbacsvcgroup:
        description: List of HBAC service names assigned to this hbacrule.
        required: false
        type: list
        elements: str
      user:
        description: List of user names assigned to this hbacrule.
        required: false
        type: list
        elements: str
      group:
        description: List of user groups assigned to this hbacrule.
        required: false
        type: list
        elements: str
      action:
        description: Work on hbacrule or member level
        type: str
        default: hbacrule
        choices: ["member", "hbacrule"]
      state:
        description: State to ensure
        type: str
        default: present
        choices: ["present", "absent", "enabled", "disabled"]
    author:
      - Thomas Woerner (@t-woerner)
    """
    
    EXAMPLES = """
    # Ensure HBAC Rule allhosts is present
    - ipahbacrule:
        ipaadmin_password: SomeADMINpassword
        name: allhosts
        usercategory: all
    
    # Ensure host server is present in HBAC Rule allhosts
    - ipahbacrule:
        ipaadmin_password: SomeADMINpassword
        name: allhosts
        host: server
        action: member
    
    # Ensure HBAC Rule sshd-pinky is present
    - ipahbacrule:
        ipaadmin_password: SomeADMINpassword
        name: sshd-pinky
        hostcategory: all
    
    # Ensure user pinky is present in HBAC Rule sshd-pinky
    - ipahbacrule:
        ipaadmin_password: SomeADMINpassword
        name: sshd-pinky
        user: pinky
        action: member
    
    # Ensure HBAC service sshd is present in HBAC Rule sshd-pinky
    - ipahbacrule:
        ipaadmin_password: SomeADMINpassword
        name: sshd-pinky
        hbacsvc: sshd
        action: member
    
    # Ensure HBAC Rule sshd-pinky is disabled
    - ipahbacrule:
        ipaadmin_password: SomeADMINpassword
        name: sshd-pinky
        state: disabled
    
    # Ensure HBAC Rule sshd-pinky is enabled
    - ipahbacrule:
        ipaadmin_password: SomeADMINpassword
        name: sshd-pinky
        state: enabled
    
    # Ensure HBAC Rule sshd-pinky is absent
    - ipahbacrule:
        ipaadmin_password: SomeADMINpassword
        name: sshd-pinky
        state: absent
    """
    
    RETURN = """
    """
    
    from ansible.module_utils.ansible_freeipa_module import \
        IPAAnsibleModule, compare_args_ipa, gen_add_del_lists, gen_add_list, \
        gen_intersection_list, ensure_fqdn
    
    
    def find_hbacrule(module, name):
        _args = {
            "all": True,
            "cn": name,
        }
    
        _result = module.ipa_command("hbacrule_find", name, _args)
    
        if len(_result["result"]) > 1:
            module.fail_json(
                msg="There is more than one hbacrule '%s'" % (name))
        elif len(_result["result"]) == 1:
            return _result["result"][0]
    
        return None
    
    
    def gen_args(description, usercategory, hostcategory, servicecategory,
                 nomembers):
        _args = {}
        if description is not None:
            _args["description"] = description
        if usercategory is not None:
            _args["usercategory"] = usercategory
        if hostcategory is not None:
            _args["hostcategory"] = hostcategory
        if servicecategory is not None:
            _args["servicecategory"] = servicecategory
        if nomembers is not None:
            _args["nomembers"] = nomembers
    
        return _args
    
    
    def main():
        ansible_module = IPAAnsibleModule(
            argument_spec=dict(
                # general
                name=dict(type="list", elements="str", aliases=["cn"],
                          required=True),
                # present
                description=dict(type="str", default=None),
                usercategory=dict(type="str", default=None,
                                  aliases=["usercat"], choices=["all", ""]),
                hostcategory=dict(type="str", default=None,
                                  aliases=["hostcat"], choices=["all", ""]),
                servicecategory=dict(type="str", default=None,
                                     aliases=["servicecat"], choices=["all", ""]),
                nomembers=dict(required=False, type='bool', default=None),
                host=dict(required=False, type='list', elements="str",
                          default=None),
                hostgroup=dict(required=False, type='list', elements="str",
                               default=None),
                hbacsvc=dict(required=False, type='list', elements="str",
                             default=None),
                hbacsvcgroup=dict(required=False, type='list', elements="str",
                                  default=None),
                user=dict(required=False, type='list', elements="str",
                          default=None),
                group=dict(required=False, type='list', elements="str",
                           default=None),
                action=dict(type="str", default="hbacrule",
                            choices=["member", "hbacrule"]),
                # state
                state=dict(type="str", default="present",
                           choices=["present", "absent",
                                    "enabled", "disabled"]),
            ),
            supports_check_mode=True,
        )
    
        ansible_module._ansible_debug = True
    
        # Get parameters
    
        # general
        names = ansible_module.params_get("name")
    
        # present
        description = ansible_module.params_get("description")
        usercategory = ansible_module.params_get("usercategory")
        hostcategory = ansible_module.params_get("hostcategory")
        servicecategory = ansible_module.params_get("servicecategory")
        nomembers = ansible_module.params_get("nomembers")
        host = ansible_module.params_get_lowercase("host")
        hostgroup = ansible_module.params_get_lowercase("hostgroup")
        hbacsvc = ansible_module.params_get_lowercase("hbacsvc")
        hbacsvcgroup = ansible_module.params_get_lowercase("hbacsvcgroup")
        user = ansible_module.params_get_lowercase("user")
        group = ansible_module.params_get_lowercase("group")
        action = ansible_module.params_get("action")
        # state
        state = ansible_module.params_get("state")
    
        # Check parameters
    
        invalid = []
    
        if state == "present":
            if len(names) != 1:
                ansible_module.fail_json(
                    msg="Only one hbacrule can be added at a time.")
            if action == "member":
                invalid = ["description", "usercategory", "hostcategory",
                           "servicecategory", "nomembers"]
            else:
                if hostcategory == 'all' and any([host, hostgroup]):
                    ansible_module.fail_json(
                        msg="Hosts cannot be added when host category='all'")
                if usercategory == 'all' and any([user, group]):
                    ansible_module.fail_json(
                        msg="Users cannot be added when user category='all'")
                if servicecategory == 'all' and any([hbacsvc, hbacsvcgroup]):
                    ansible_module.fail_json(
                        msg="Services cannot be added when service category='all'")
    
        elif state == "absent":
            if len(names) < 1:
                ansible_module.fail_json(msg="No name given.")
            invalid = ["description", "usercategory", "hostcategory",
                       "servicecategory", "nomembers"]
            if action == "hbacrule":
                invalid.extend(["host", "hostgroup", "hbacsvc", "hbacsvcgroup",
                                "user", "group"])
    
        elif state in ["enabled", "disabled"]:
            if len(names) < 1:
                ansible_module.fail_json(msg="No name given.")
            if action == "member":
                ansible_module.fail_json(
                    msg="Action member can not be used with states enabled and "
                    "disabled")
            invalid = ["description", "usercategory", "hostcategory",
                       "servicecategory", "nomembers", "host", "hostgroup",
                       "hbacsvc", "hbacsvcgroup", "user", "group"]
        else:
            ansible_module.fail_json(msg="Invalid state '%s'" % state)
    
        ansible_module.params_fail_used_invalid(invalid, state, action)
    
        # Init
    
        changed = False
        exit_args = {}
    
        # Connect to IPA API
        with ansible_module.ipa_connect():
    
            # Get default domain
            default_domain = ansible_module.ipa_get_domain()
    
            # Ensure fqdn host names, use default domain for simple names
            if host is not None:
                _host = [ensure_fqdn(x, default_domain).lower() for x in host]
                host = _host
    
            commands = []
    
            for name in names:
                # Make sure hbacrule exists
                res_find = find_hbacrule(ansible_module, name)
    
                host_add, host_del = [], []
                hostgroup_add, hostgroup_del = [], []
                hbacsvc_add, hbacsvc_del = [], []
                hbacsvcgroup_add, hbacsvcgroup_del = [], []
                user_add, user_del = [], []
                group_add, group_del = [], []
    
                # Create command
                if state == "present":
                    # Generate args
                    args = gen_args(description, usercategory, hostcategory,
                                    servicecategory, nomembers)
    
                    if action == "hbacrule":
                        # Found the hbacrule
                        if res_find is not None:
                            # Remove usercategory, hostcategory and
                            # servicecategory from args if "" and category
                            # not in res_find (needed for idempotency)
                            if "usercategory" in args and \
                               args["usercategory"] == "" and \
                               "usercategory" not in res_find:
                                del args["usercategory"]
                            if "hostcategory" in args and \
                               args["hostcategory"] == "" and \
                               "hostcategory" not in res_find:
                                del args["hostcategory"]
                            if "servicecategory" in args and \
                               args["servicecategory"] == "" and \
                               "servicecategory" not in res_find:
                                del args["servicecategory"]
    
                            # For all settings is args, check if there are
                            # different settings in the find result.
                            # If yes: modify
                            if not compare_args_ipa(ansible_module, args,
                                                    res_find):
                                commands.append([name, "hbacrule_mod", args])
                        else:
                            commands.append([name, "hbacrule_add", args])
                            # Set res_find to empty dict for next step
                            res_find = {}
    
                        # Generate addition and removal lists
                        if host is not None:
                            host_add, host_del = gen_add_del_lists(
                                host, res_find.get("memberhost_host"))
    
                        if hostgroup is not None:
                            hostgroup_add, hostgroup_del = gen_add_del_lists(
                                hostgroup, res_find.get("memberhost_hostgroup"))
    
                        if hbacsvc is not None:
                            hbacsvc_add, hbacsvc_del = gen_add_del_lists(
                                hbacsvc, res_find.get("memberservice_hbacsvc"))
    
                        if hbacsvcgroup is not None:
                            hbacsvcgroup_add, hbacsvcgroup_del = gen_add_del_lists(
                                hbacsvcgroup,
                                res_find.get("memberservice_hbacsvcgroup"))
    
                        if user is not None:
                            user_add, user_del = gen_add_del_lists(
                                user, res_find.get("memberuser_user"))
    
                        if group is not None:
                            group_add, group_del = gen_add_del_lists(
                                group, res_find.get("memberuser_group"))
    
                    elif action == "member":
                        if res_find is None:
                            ansible_module.fail_json(msg="No hbacrule '%s'" % name)
    
                        # Generate add lists for host, hostgroup and
                        # res_find to only try to add hosts and hostgroups
                        # that not in hbacrule already
                        if host:
                            host_add = gen_add_list(
                                host, res_find.get("memberhost_host"))
                        if hostgroup:
                            hostgroup_add = gen_add_list(
                                hostgroup, res_find.get("memberhost_hostgroup"))
    
                        # Generate add lists for hbacsvc, hbacsvcgroup and
                        # res_find to only try to add hbacsvcs and hbacsvcgroups
                        # that not in hbacrule already
                        if hbacsvc:
                            hbacsvc_add = gen_add_list(
                                hbacsvc, res_find.get("memberservice_hbacsvc"))
                        if hbacsvcgroup:
                            hbacsvcgroup_add = gen_add_list(
                                hbacsvcgroup,
                                res_find.get("memberservice_hbacsvcgroup"))
    
                        # Generate add lists for user, group and
                        # res_find to only try to add users and groups
                        # that not in hbacrule already
                        if user:
                            user_add = gen_add_list(
                                user, res_find.get("memberuser_user"))
                        if group:
                            group_add = gen_add_list(
                                group, res_find.get("memberuser_group"))
    
                elif state == "absent":
                    if action == "hbacrule":
                        if res_find is not None:
                            commands.append([name, "hbacrule_del", {}])
    
                    elif action == "member":
                        if res_find is None:
                            ansible_module.fail_json(msg="No hbacrule '%s'" % name)
    
                        # Generate intersection lists for host, hostgroup and
                        # res_find to only try to remove hosts and hostgroups
                        # that are in hbacrule
                        if host:
                            if "memberhost_host" in res_find:
                                host_del = gen_intersection_list(
                                    host, res_find["memberhost_host"])
                        if hostgroup:
                            if "memberhost_hostgroup" in res_find:
                                hostgroup_del = gen_intersection_list(
                                    hostgroup, res_find["memberhost_hostgroup"])
    
                        # Generate intersection lists for hbacsvc, hbacsvcgroup
                        # and res_find to only try to remove hbacsvcs and
                        # hbacsvcgroups that are in hbacrule
                        if hbacsvc:
                            if "memberservice_hbacsvc" in res_find:
                                hbacsvc_del = gen_intersection_list(
                                    hbacsvc, res_find["memberservice_hbacsvc"])
                        if hbacsvcgroup:
                            if "memberservice_hbacsvcgroup" in res_find:
                                hbacsvcgroup_del = gen_intersection_list(
                                    hbacsvcgroup,
                                    res_find["memberservice_hbacsvcgroup"])
    
                        # Generate intersection lists for user, group and
                        # res_find to only try to remove users and groups
                        # that are in hbacrule
                        if user:
                            if "memberuser_user" in res_find:
                                user_del = gen_intersection_list(
                                    user, res_find["memberuser_user"])
                        if group:
                            if "memberuser_group" in res_find:
                                group_del = gen_intersection_list(
                                    group, res_find["memberuser_group"])
    
                elif state == "enabled":
                    if res_find is None:
                        ansible_module.fail_json(msg="No hbacrule '%s'" % name)
                    # hbacrule_enable is not failing on an enabled hbacrule
                    # Therefore it is needed to have a look at the ipaenabledflag
                    # in res_find.
                    # FreeIPA 4.9.10+ and 4.10 use proper mapping for
                    # boolean values, so we need to convert it to str
                    # for comparison.
                    # See: https://github.com/freeipa/freeipa/pull/6294
                    enabled_flag = str(res_find.get("ipaenabledflag", [False])[0])
                    if enabled_flag.upper() != "TRUE":
                        commands.append([name, "hbacrule_enable", {}])
    
                elif state == "disabled":
                    if res_find is None:
                        ansible_module.fail_json(msg="No hbacrule '%s'" % name)
                    # hbacrule_disable is not failing on an enabled hbacrule
                    # Therefore it is needed to have a look at the ipaenabledflag
                    # in res_find.
                    # FreeIPA 4.9.10+ and 4.10 use proper mapping for
                    # boolean values, so we need to convert it to str
                    # for comparison.
                    # See: https://github.com/freeipa/freeipa/pull/6294
                    enabled_flag = str(res_find.get("ipaenabledflag", [False])[0])
                    if enabled_flag.upper() != "FALSE":
                        commands.append([name, "hbacrule_disable", {}])
    
                else:
                    ansible_module.fail_json(msg="Unkown state '%s'" % state)
    
                # Manage HBAC rule members.
    
                # Add hosts and hostgroups
                if len(host_add) > 0 or len(hostgroup_add) > 0:
                    commands.append([name, "hbacrule_add_host",
                                     {
                                         "host": host_add,
                                         "hostgroup": hostgroup_add,
                                     }])
                # Remove hosts and hostgroups
                if len(host_del) > 0 or len(hostgroup_del) > 0:
                    commands.append([name, "hbacrule_remove_host",
                                     {
                                         "host": host_del,
                                         "hostgroup": hostgroup_del,
                                     }])
    
                # Add hbacsvcs and hbacsvcgroups
                if len(hbacsvc_add) > 0 or len(hbacsvcgroup_add) > 0:
                    commands.append([name, "hbacrule_add_service",
                                     {
                                         "hbacsvc": hbacsvc_add,
                                         "hbacsvcgroup": hbacsvcgroup_add,
                                     }])
                # Remove hbacsvcs and hbacsvcgroups
                if len(hbacsvc_del) > 0 or len(hbacsvcgroup_del) > 0:
                    commands.append([name, "hbacrule_remove_service",
                                     {
                                         "hbacsvc": hbacsvc_del,
                                         "hbacsvcgroup": hbacsvcgroup_del,
                                     }])
    
                # Add users and groups
                if len(user_add) > 0 or len(group_add) > 0:
                    commands.append([name, "hbacrule_add_user",
                                     {
                                         "user": user_add,
                                         "group": group_add,
                                     }])
                # Remove users and groups
                if len(user_del) > 0 or len(group_del) > 0:
                    commands.append([name, "hbacrule_remove_user",
                                     {
                                         "user": user_del,
                                         "group": group_del,
                                     }])
    
            # Execute commands
    
            changed = ansible_module.execute_ipa_commands(
                commands, fail_on_member_errors=True)
    
        # Done
    
        ansible_module.exit_json(changed=changed, **exit_args)
    
    
    if __name__ == "__main__":
        main()