2020-03-09 10:11:07 +01:00
|
|
|
#!/usr/bin/python
|
|
|
|
# -*- coding: utf-8 -*-
|
|
|
|
|
2022-08-05 12:28:29 +02:00
|
|
|
# Copyright (c) 2021, Lennert Mertens (lennert@nubera.be)
|
|
|
|
# Copyright (c) 2019, Guillaume Martinez (lunik@tiwabbit.fr)
|
|
|
|
# Copyright (c) 2015, Werner Dijkerman (ikben@werner-dijkerman.nl)
|
|
|
|
# GNU General Public License v3.0+ (see LICENSES/GPL-3.0-or-later.txt or https://www.gnu.org/licenses/gpl-3.0.txt)
|
|
|
|
# SPDX-License-Identifier: GPL-3.0-or-later
|
2020-03-09 10:11:07 +01:00
|
|
|
|
|
|
|
from __future__ import absolute_import, division, print_function
|
|
|
|
__metaclass__ = type
|
|
|
|
|
|
|
|
DOCUMENTATION = '''
|
|
|
|
---
|
|
|
|
module: gitlab_user
|
2020-04-16 08:20:39 +02:00
|
|
|
short_description: Creates/updates/deletes/blocks/unblocks GitLab Users
|
2020-03-09 10:11:07 +01:00
|
|
|
description:
|
|
|
|
- When the user does not exist in GitLab, it will be created.
|
2020-04-16 14:48:33 +02:00
|
|
|
- When the user exists and state=absent, the user will be deleted.
|
|
|
|
- When the user exists and state=blocked, the user will be blocked.
|
2020-03-09 10:11:07 +01:00
|
|
|
- When changes are made to user, the user will be updated.
|
|
|
|
notes:
|
2020-06-16 21:24:42 +02:00
|
|
|
- From community.general 0.2.0 and onwards, name, email and password are optional while deleting the user.
|
2020-03-09 10:11:07 +01:00
|
|
|
author:
|
|
|
|
- Werner Dijkerman (@dj-wasabi)
|
|
|
|
- Guillaume Martinez (@Lunik)
|
2021-06-21 21:32:07 +02:00
|
|
|
- Lennert Mertens (@LennertMertens)
|
|
|
|
- Stef Graces (@stgrace)
|
2020-03-09 10:11:07 +01:00
|
|
|
requirements:
|
|
|
|
- python >= 2.7
|
|
|
|
- python-gitlab python module
|
|
|
|
- administrator rights on the GitLab server
|
|
|
|
extends_documentation_fragment:
|
2021-12-20 21:59:12 +01:00
|
|
|
- community.general.auth_basic
|
|
|
|
- community.general.gitlab
|
2020-03-09 10:11:07 +01:00
|
|
|
|
|
|
|
options:
|
|
|
|
name:
|
|
|
|
description:
|
|
|
|
- Name of the user you want to create.
|
|
|
|
- Required only if C(state) is set to C(present).
|
|
|
|
type: str
|
|
|
|
username:
|
|
|
|
description:
|
|
|
|
- The username of the user.
|
|
|
|
required: true
|
|
|
|
type: str
|
|
|
|
password:
|
|
|
|
description:
|
|
|
|
- The password of the user.
|
|
|
|
- GitLab server enforces minimum password length to 8, set this value with 8 or more characters.
|
|
|
|
type: str
|
2021-06-21 21:32:07 +02:00
|
|
|
reset_password:
|
|
|
|
description:
|
|
|
|
- Whether the user can change its password or not.
|
|
|
|
default: false
|
|
|
|
type: bool
|
|
|
|
version_added: 3.3.0
|
2020-03-09 10:11:07 +01:00
|
|
|
email:
|
|
|
|
description:
|
|
|
|
- The email that belongs to the user.
|
|
|
|
- Required only if C(state) is set to C(present).
|
|
|
|
type: str
|
|
|
|
sshkey_name:
|
|
|
|
description:
|
2021-05-14 10:00:59 +02:00
|
|
|
- The name of the SSH public key.
|
2020-03-09 10:11:07 +01:00
|
|
|
type: str
|
|
|
|
sshkey_file:
|
|
|
|
description:
|
2021-05-14 10:00:59 +02:00
|
|
|
- The SSH public key itself.
|
2020-03-09 10:11:07 +01:00
|
|
|
type: str
|
2021-05-14 10:00:59 +02:00
|
|
|
sshkey_expires_at:
|
|
|
|
description:
|
|
|
|
- The expiration date of the SSH public key in ISO 8601 format C(YYYY-MM-DDTHH:MM:SSZ).
|
|
|
|
- This is only used when adding new SSH public keys.
|
|
|
|
type: str
|
|
|
|
version_added: 3.1.0
|
2020-03-09 10:11:07 +01:00
|
|
|
group:
|
|
|
|
description:
|
|
|
|
- Id or Full path of parent group in the form of group/name.
|
2021-05-14 10:00:59 +02:00
|
|
|
- Add user as a member to this group.
|
2020-03-09 10:11:07 +01:00
|
|
|
type: str
|
|
|
|
access_level:
|
|
|
|
description:
|
|
|
|
- The access level to the group. One of the following can be used.
|
|
|
|
- guest
|
|
|
|
- reporter
|
|
|
|
- developer
|
|
|
|
- master (alias for maintainer)
|
|
|
|
- maintainer
|
|
|
|
- owner
|
|
|
|
default: guest
|
|
|
|
type: str
|
|
|
|
choices: ["guest", "reporter", "developer", "master", "maintainer", "owner"]
|
|
|
|
state:
|
|
|
|
description:
|
2020-04-16 14:48:33 +02:00
|
|
|
- Create, delete or block a user.
|
2020-03-09 10:11:07 +01:00
|
|
|
default: present
|
|
|
|
type: str
|
2020-04-16 08:20:39 +02:00
|
|
|
choices: ["present", "absent", "blocked", "unblocked"]
|
2020-03-09 10:11:07 +01:00
|
|
|
confirm:
|
|
|
|
description:
|
|
|
|
- Require confirmation.
|
|
|
|
type: bool
|
2022-08-24 19:59:56 +02:00
|
|
|
default: true
|
2020-03-09 10:11:07 +01:00
|
|
|
isadmin:
|
|
|
|
description:
|
|
|
|
- Grant admin privileges to the user.
|
|
|
|
type: bool
|
2022-08-24 19:59:56 +02:00
|
|
|
default: false
|
2020-03-09 10:11:07 +01:00
|
|
|
external:
|
|
|
|
description:
|
|
|
|
- Define external parameter for this user.
|
|
|
|
type: bool
|
2022-08-24 19:59:56 +02:00
|
|
|
default: false
|
2021-06-21 21:32:07 +02:00
|
|
|
identities:
|
|
|
|
description:
|
|
|
|
- List of identities to be added/updated for this user.
|
|
|
|
- To remove all other identities from this user, set I(overwrite_identities=true).
|
|
|
|
type: list
|
|
|
|
elements: dict
|
|
|
|
suboptions:
|
|
|
|
provider:
|
|
|
|
description:
|
|
|
|
- The name of the external identity provider
|
|
|
|
type: str
|
|
|
|
extern_uid:
|
|
|
|
description:
|
|
|
|
- User ID for external identity.
|
|
|
|
type: str
|
|
|
|
version_added: 3.3.0
|
|
|
|
overwrite_identities:
|
|
|
|
description:
|
|
|
|
- Overwrite identities with identities added in this module.
|
|
|
|
- This means that all identities that the user has and that are not listed in I(identities) are removed from the user.
|
|
|
|
- This is only done if a list is provided for I(identities). To remove all identities, provide an empty list.
|
|
|
|
type: bool
|
|
|
|
default: false
|
|
|
|
version_added: 3.3.0
|
2020-03-09 10:11:07 +01:00
|
|
|
'''
|
|
|
|
|
|
|
|
EXAMPLES = '''
|
|
|
|
- name: "Delete GitLab User"
|
2020-07-13 21:50:31 +02:00
|
|
|
community.general.gitlab_user:
|
2020-03-09 10:11:07 +01:00
|
|
|
api_url: https://gitlab.example.com/
|
|
|
|
api_token: "{{ access_token }}"
|
2022-09-06 20:42:17 +02:00
|
|
|
validate_certs: false
|
2020-03-09 10:11:07 +01:00
|
|
|
username: myusername
|
|
|
|
state: absent
|
|
|
|
|
|
|
|
- name: "Create GitLab User"
|
2020-07-13 21:50:31 +02:00
|
|
|
community.general.gitlab_user:
|
2020-03-09 10:11:07 +01:00
|
|
|
api_url: https://gitlab.example.com/
|
2022-09-06 20:42:17 +02:00
|
|
|
validate_certs: true
|
2020-03-09 10:11:07 +01:00
|
|
|
api_username: dj-wasabi
|
|
|
|
api_password: "MySecretPassword"
|
|
|
|
name: My Name
|
|
|
|
username: myusername
|
|
|
|
password: mysecretpassword
|
|
|
|
email: me@example.com
|
|
|
|
sshkey_name: MySSH
|
|
|
|
sshkey_file: ssh-rsa AAAAB3NzaC1yc...
|
|
|
|
state: present
|
|
|
|
group: super_group/mon_group
|
|
|
|
access_level: owner
|
2020-04-16 08:20:39 +02:00
|
|
|
|
2021-06-21 21:32:07 +02:00
|
|
|
- name: "Create GitLab User using external identity provider"
|
|
|
|
community.general.gitlab_user:
|
|
|
|
api_url: https://gitlab.example.com/
|
2022-09-06 20:42:17 +02:00
|
|
|
validate_certs: true
|
2021-06-21 21:32:07 +02:00
|
|
|
api_token: "{{ access_token }}"
|
|
|
|
name: My Name
|
|
|
|
username: myusername
|
|
|
|
password: mysecretpassword
|
|
|
|
email: me@example.com
|
|
|
|
identities:
|
|
|
|
- provider: Keycloak
|
|
|
|
extern_uid: f278f95c-12c7-4d51-996f-758cc2eb11bc
|
|
|
|
state: present
|
|
|
|
group: super_group/mon_group
|
|
|
|
access_level: owner
|
|
|
|
|
2020-04-16 08:20:39 +02:00
|
|
|
- name: "Block GitLab User"
|
2020-07-13 21:50:31 +02:00
|
|
|
community.general.gitlab_user:
|
2020-04-16 08:20:39 +02:00
|
|
|
api_url: https://gitlab.example.com/
|
|
|
|
api_token: "{{ access_token }}"
|
2022-09-06 20:42:17 +02:00
|
|
|
validate_certs: false
|
2020-04-16 08:20:39 +02:00
|
|
|
username: myusername
|
|
|
|
state: blocked
|
|
|
|
|
|
|
|
- name: "Unblock GitLab User"
|
2020-07-13 21:50:31 +02:00
|
|
|
community.general.gitlab_user:
|
2020-04-16 08:20:39 +02:00
|
|
|
api_url: https://gitlab.example.com/
|
|
|
|
api_token: "{{ access_token }}"
|
2022-09-06 20:42:17 +02:00
|
|
|
validate_certs: false
|
2020-04-16 08:20:39 +02:00
|
|
|
username: myusername
|
|
|
|
state: unblocked
|
2020-03-09 10:11:07 +01:00
|
|
|
'''
|
|
|
|
|
|
|
|
RETURN = '''
|
|
|
|
msg:
|
|
|
|
description: Success or failure message
|
|
|
|
returned: always
|
|
|
|
type: str
|
|
|
|
sample: "Success"
|
|
|
|
|
|
|
|
result:
|
|
|
|
description: json parsed response from the server
|
|
|
|
returned: always
|
|
|
|
type: dict
|
|
|
|
|
|
|
|
error:
|
|
|
|
description: the error message returned by the GitLab API
|
|
|
|
returned: failed
|
|
|
|
type: str
|
|
|
|
sample: "400: path is already in use"
|
|
|
|
|
|
|
|
user:
|
|
|
|
description: API object
|
|
|
|
returned: always
|
|
|
|
type: dict
|
|
|
|
'''
|
|
|
|
|
|
|
|
import traceback
|
|
|
|
|
|
|
|
GITLAB_IMP_ERR = None
|
|
|
|
try:
|
|
|
|
import gitlab
|
|
|
|
HAS_GITLAB_PACKAGE = True
|
|
|
|
except Exception:
|
|
|
|
GITLAB_IMP_ERR = traceback.format_exc()
|
|
|
|
HAS_GITLAB_PACKAGE = False
|
|
|
|
|
|
|
|
from ansible.module_utils.api import basic_auth_argument_spec
|
|
|
|
from ansible.module_utils.basic import AnsibleModule, missing_required_lib
|
2021-06-26 23:59:11 +02:00
|
|
|
from ansible.module_utils.common.text.converters import to_native
|
2020-03-09 10:11:07 +01:00
|
|
|
|
2021-12-20 21:59:12 +01:00
|
|
|
from ansible_collections.community.general.plugins.module_utils.gitlab import auth_argument_spec, find_group, gitlab_authentication
|
2020-03-09 10:11:07 +01:00
|
|
|
|
|
|
|
|
|
|
|
class GitLabUser(object):
|
|
|
|
def __init__(self, module, gitlab_instance):
|
|
|
|
self._module = module
|
|
|
|
self._gitlab = gitlab_instance
|
2021-11-16 13:01:32 +01:00
|
|
|
self.user_object = None
|
2020-03-09 10:11:07 +01:00
|
|
|
self.ACCESS_LEVEL = {
|
|
|
|
'guest': gitlab.GUEST_ACCESS,
|
|
|
|
'reporter': gitlab.REPORTER_ACCESS,
|
|
|
|
'developer': gitlab.DEVELOPER_ACCESS,
|
|
|
|
'master': gitlab.MAINTAINER_ACCESS,
|
|
|
|
'maintainer': gitlab.MAINTAINER_ACCESS,
|
2021-11-16 13:01:32 +01:00
|
|
|
'owner': gitlab.OWNER_ACCESS,
|
|
|
|
}
|
2020-03-09 10:11:07 +01:00
|
|
|
|
|
|
|
'''
|
|
|
|
@param username Username of the user
|
|
|
|
@param options User options
|
|
|
|
'''
|
2021-11-16 13:01:32 +01:00
|
|
|
def create_or_update_user(self, username, options):
|
2020-03-09 10:11:07 +01:00
|
|
|
changed = False
|
2021-02-09 10:29:13 +01:00
|
|
|
potentionally_changed = False
|
2020-03-09 10:11:07 +01:00
|
|
|
|
|
|
|
# Because we have already call userExists in main()
|
2021-11-16 13:01:32 +01:00
|
|
|
if self.user_object is None:
|
|
|
|
user = self.create_user({
|
2020-03-09 10:11:07 +01:00
|
|
|
'name': options['name'],
|
|
|
|
'username': username,
|
|
|
|
'password': options['password'],
|
2021-06-21 21:32:07 +02:00
|
|
|
'reset_password': options['reset_password'],
|
2020-03-09 10:11:07 +01:00
|
|
|
'email': options['email'],
|
|
|
|
'skip_confirmation': not options['confirm'],
|
|
|
|
'admin': options['isadmin'],
|
2021-06-21 21:32:07 +02:00
|
|
|
'external': options['external'],
|
|
|
|
'identities': options['identities'],
|
|
|
|
})
|
2020-03-09 10:11:07 +01:00
|
|
|
changed = True
|
|
|
|
else:
|
2021-11-16 13:01:32 +01:00
|
|
|
changed, user = self.update_user(
|
|
|
|
self.user_object, {
|
2021-02-09 10:29:13 +01:00
|
|
|
# add "normal" parameters here, put uncheckable
|
|
|
|
# params in the dict below
|
|
|
|
'name': {'value': options['name']},
|
|
|
|
'email': {'value': options['email']},
|
|
|
|
|
|
|
|
# note: for some attributes like this one the key
|
|
|
|
# from reading back from server is unfortunately
|
|
|
|
# different to the one needed for pushing/writing,
|
|
|
|
# in that case use the optional setter key
|
|
|
|
'is_admin': {
|
|
|
|
'value': options['isadmin'], 'setter': 'admin'
|
|
|
|
},
|
|
|
|
'external': {'value': options['external']},
|
2021-06-21 21:32:07 +02:00
|
|
|
'identities': {'value': options['identities']},
|
2021-02-09 10:29:13 +01:00
|
|
|
},
|
|
|
|
{
|
|
|
|
# put "uncheckable" params here, this means params
|
|
|
|
# which the gitlab does accept for setting but does
|
|
|
|
# not return any information about it
|
|
|
|
'skip_reconfirmation': {'value': not options['confirm']},
|
|
|
|
'password': {'value': options['password']},
|
2021-06-21 21:32:07 +02:00
|
|
|
'reset_password': {'value': options['reset_password']},
|
|
|
|
'overwrite_identities': {'value': options['overwrite_identities']},
|
2021-02-09 10:29:13 +01:00
|
|
|
}
|
|
|
|
)
|
|
|
|
|
|
|
|
# note: as we unfortunately have some uncheckable parameters
|
|
|
|
# where it is not possible to determine if the update
|
|
|
|
# changed something or not, we must assume here that a
|
2022-07-08 23:11:57 +02:00
|
|
|
# changed happened and that an user object update is needed
|
2021-02-09 10:29:13 +01:00
|
|
|
potentionally_changed = True
|
2020-03-09 10:11:07 +01:00
|
|
|
|
|
|
|
# Assign ssh keys
|
|
|
|
if options['sshkey_name'] and options['sshkey_file']:
|
2021-11-16 13:01:32 +01:00
|
|
|
key_changed = self.add_ssh_key_to_user(user, {
|
2020-03-09 10:11:07 +01:00
|
|
|
'name': options['sshkey_name'],
|
2021-05-14 10:00:59 +02:00
|
|
|
'file': options['sshkey_file'],
|
|
|
|
'expires_at': options['sshkey_expires_at']})
|
2020-03-09 10:11:07 +01:00
|
|
|
changed = changed or key_changed
|
|
|
|
|
|
|
|
# Assign group
|
|
|
|
if options['group_path']:
|
2021-11-16 13:01:32 +01:00
|
|
|
group_changed = self.assign_user_to_group(user, options['group_path'], options['access_level'])
|
2020-03-09 10:11:07 +01:00
|
|
|
changed = changed or group_changed
|
|
|
|
|
2021-11-16 13:01:32 +01:00
|
|
|
self.user_object = user
|
2021-02-09 10:29:13 +01:00
|
|
|
if (changed or potentionally_changed) and not self._module.check_mode:
|
2020-03-09 10:11:07 +01:00
|
|
|
try:
|
|
|
|
user.save()
|
|
|
|
except Exception as e:
|
|
|
|
self._module.fail_json(msg="Failed to update user: %s " % to_native(e))
|
2021-02-09 10:29:13 +01:00
|
|
|
|
|
|
|
if changed:
|
|
|
|
if self._module.check_mode:
|
|
|
|
self._module.exit_json(changed=True, msg="Successfully created or updated the user %s" % username)
|
2020-03-09 10:11:07 +01:00
|
|
|
return True
|
|
|
|
else:
|
|
|
|
return False
|
|
|
|
|
|
|
|
'''
|
|
|
|
@param group User object
|
|
|
|
'''
|
2021-11-16 13:01:32 +01:00
|
|
|
def get_user_id(self, user):
|
2020-03-09 10:11:07 +01:00
|
|
|
if user is not None:
|
|
|
|
return user.id
|
|
|
|
return None
|
|
|
|
|
|
|
|
'''
|
|
|
|
@param user User object
|
|
|
|
@param sshkey_name Name of the ssh key
|
|
|
|
'''
|
2021-11-16 13:01:32 +01:00
|
|
|
def ssh_key_exists(self, user, sshkey_name):
|
2022-04-13 13:32:25 +02:00
|
|
|
keyList = map(lambda k: k.title, user.keys.list(all=True))
|
2020-03-09 10:11:07 +01:00
|
|
|
|
|
|
|
return sshkey_name in keyList
|
|
|
|
|
|
|
|
'''
|
|
|
|
@param user User object
|
2021-05-14 10:00:59 +02:00
|
|
|
@param sshkey Dict containing sshkey infos {"name": "", "file": "", "expires_at": ""}
|
2020-03-09 10:11:07 +01:00
|
|
|
'''
|
2021-11-16 13:01:32 +01:00
|
|
|
def add_ssh_key_to_user(self, user, sshkey):
|
|
|
|
if not self.ssh_key_exists(user, sshkey['name']):
|
2020-03-09 10:11:07 +01:00
|
|
|
if self._module.check_mode:
|
|
|
|
return True
|
|
|
|
|
|
|
|
try:
|
2021-05-14 10:00:59 +02:00
|
|
|
parameter = {
|
2020-03-09 10:11:07 +01:00
|
|
|
'title': sshkey['name'],
|
2021-05-14 10:00:59 +02:00
|
|
|
'key': sshkey['file'],
|
|
|
|
}
|
|
|
|
if sshkey['expires_at'] is not None:
|
|
|
|
parameter['expires_at'] = sshkey['expires_at']
|
|
|
|
user.keys.create(parameter)
|
2020-03-09 10:11:07 +01:00
|
|
|
except gitlab.exceptions.GitlabCreateError as e:
|
|
|
|
self._module.fail_json(msg="Failed to assign sshkey to user: %s" % to_native(e))
|
|
|
|
return True
|
|
|
|
return False
|
|
|
|
|
|
|
|
'''
|
|
|
|
@param group Group object
|
|
|
|
@param user_id Id of the user to find
|
|
|
|
'''
|
2021-11-16 13:01:32 +01:00
|
|
|
def find_member(self, group, user_id):
|
2020-03-09 10:11:07 +01:00
|
|
|
try:
|
|
|
|
member = group.members.get(user_id)
|
|
|
|
except gitlab.exceptions.GitlabGetError:
|
|
|
|
return None
|
|
|
|
return member
|
|
|
|
|
|
|
|
'''
|
|
|
|
@param group Group object
|
|
|
|
@param user_id Id of the user to check
|
|
|
|
'''
|
2021-11-16 13:01:32 +01:00
|
|
|
def member_exists(self, group, user_id):
|
|
|
|
member = self.find_member(group, user_id)
|
2020-03-09 10:11:07 +01:00
|
|
|
|
|
|
|
return member is not None
|
|
|
|
|
|
|
|
'''
|
|
|
|
@param group Group object
|
|
|
|
@param user_id Id of the user to check
|
|
|
|
@param access_level GitLab access_level to check
|
|
|
|
'''
|
2021-11-16 13:01:32 +01:00
|
|
|
def member_as_good_access_level(self, group, user_id, access_level):
|
|
|
|
member = self.find_member(group, user_id)
|
2020-03-09 10:11:07 +01:00
|
|
|
|
|
|
|
return member.access_level == access_level
|
|
|
|
|
|
|
|
'''
|
|
|
|
@param user User object
|
|
|
|
@param group_path Complete path of the Group including parent group path. <parent_path>/<group_path>
|
|
|
|
@param access_level GitLab access_level to assign
|
|
|
|
'''
|
2021-11-16 13:01:32 +01:00
|
|
|
def assign_user_to_group(self, user, group_identifier, access_level):
|
|
|
|
group = find_group(self._gitlab, group_identifier)
|
2020-03-09 10:11:07 +01:00
|
|
|
|
|
|
|
if self._module.check_mode:
|
|
|
|
return True
|
|
|
|
|
|
|
|
if group is None:
|
|
|
|
return False
|
|
|
|
|
2021-11-16 13:01:32 +01:00
|
|
|
if self.member_exists(group, self.get_user_id(user)):
|
|
|
|
member = self.find_member(group, self.get_user_id(user))
|
|
|
|
if not self.member_as_good_access_level(group, member.id, self.ACCESS_LEVEL[access_level]):
|
2020-03-09 10:11:07 +01:00
|
|
|
member.access_level = self.ACCESS_LEVEL[access_level]
|
|
|
|
member.save()
|
|
|
|
return True
|
|
|
|
else:
|
|
|
|
try:
|
|
|
|
group.members.create({
|
2021-11-16 13:01:32 +01:00
|
|
|
'user_id': self.get_user_id(user),
|
2020-03-09 10:11:07 +01:00
|
|
|
'access_level': self.ACCESS_LEVEL[access_level]})
|
|
|
|
except gitlab.exceptions.GitlabCreateError as e:
|
|
|
|
self._module.fail_json(msg="Failed to assign user to group: %s" % to_native(e))
|
|
|
|
return True
|
|
|
|
return False
|
|
|
|
|
|
|
|
'''
|
|
|
|
@param user User object
|
|
|
|
@param arguments User attributes
|
|
|
|
'''
|
2021-11-16 13:01:32 +01:00
|
|
|
def update_user(self, user, arguments, uncheckable_args):
|
2020-03-09 10:11:07 +01:00
|
|
|
changed = False
|
|
|
|
|
|
|
|
for arg_key, arg_value in arguments.items():
|
2021-02-09 10:29:13 +01:00
|
|
|
av = arg_value['value']
|
|
|
|
|
|
|
|
if av is not None:
|
2021-06-21 21:32:07 +02:00
|
|
|
if arg_key == "identities":
|
2021-11-16 13:01:32 +01:00
|
|
|
changed = self.add_identities(user, av, uncheckable_args['overwrite_identities']['value'])
|
2021-06-21 21:32:07 +02:00
|
|
|
|
|
|
|
elif getattr(user, arg_key) != av:
|
2021-02-09 10:29:13 +01:00
|
|
|
setattr(user, arg_value.get('setter', arg_key), av)
|
2020-03-09 10:11:07 +01:00
|
|
|
changed = True
|
|
|
|
|
2021-02-09 10:29:13 +01:00
|
|
|
for arg_key, arg_value in uncheckable_args.items():
|
|
|
|
av = arg_value['value']
|
|
|
|
|
|
|
|
if av is not None:
|
|
|
|
setattr(user, arg_value.get('setter', arg_key), av)
|
|
|
|
|
2020-03-09 10:11:07 +01:00
|
|
|
return (changed, user)
|
|
|
|
|
|
|
|
'''
|
|
|
|
@param arguments User attributes
|
|
|
|
'''
|
2021-11-16 13:01:32 +01:00
|
|
|
def create_user(self, arguments):
|
2020-03-09 10:11:07 +01:00
|
|
|
if self._module.check_mode:
|
|
|
|
return True
|
|
|
|
|
2021-06-21 21:32:07 +02:00
|
|
|
identities = None
|
|
|
|
if 'identities' in arguments:
|
|
|
|
identities = arguments['identities']
|
|
|
|
del arguments['identities']
|
|
|
|
|
2020-03-09 10:11:07 +01:00
|
|
|
try:
|
|
|
|
user = self._gitlab.users.create(arguments)
|
2021-06-21 21:32:07 +02:00
|
|
|
if identities:
|
2021-11-16 13:01:32 +01:00
|
|
|
self.add_identities(user, identities)
|
2021-06-21 21:32:07 +02:00
|
|
|
|
2020-03-09 10:11:07 +01:00
|
|
|
except (gitlab.exceptions.GitlabCreateError) as e:
|
|
|
|
self._module.fail_json(msg="Failed to create user: %s " % to_native(e))
|
|
|
|
|
|
|
|
return user
|
|
|
|
|
2021-06-21 21:32:07 +02:00
|
|
|
'''
|
|
|
|
@param user User object
|
|
|
|
@param identites List of identities to be added/updated
|
|
|
|
@param overwrite_identities Overwrite user identities with identities passed to this module
|
|
|
|
'''
|
2021-11-16 13:01:32 +01:00
|
|
|
def add_identities(self, user, identities, overwrite_identities=False):
|
2021-06-21 21:32:07 +02:00
|
|
|
changed = False
|
|
|
|
if overwrite_identities:
|
2021-11-16 13:01:32 +01:00
|
|
|
changed = self.delete_identities(user, identities)
|
2021-06-21 21:32:07 +02:00
|
|
|
|
|
|
|
for identity in identities:
|
|
|
|
if identity not in user.identities:
|
|
|
|
setattr(user, 'provider', identity['provider'])
|
|
|
|
setattr(user, 'extern_uid', identity['extern_uid'])
|
|
|
|
if not self._module.check_mode:
|
|
|
|
user.save()
|
|
|
|
changed = True
|
|
|
|
return changed
|
|
|
|
|
|
|
|
'''
|
|
|
|
@param user User object
|
|
|
|
@param identites List of identities to be added/updated
|
|
|
|
'''
|
2021-11-16 13:01:32 +01:00
|
|
|
def delete_identities(self, user, identities):
|
2021-06-21 21:32:07 +02:00
|
|
|
changed = False
|
|
|
|
for identity in user.identities:
|
|
|
|
if identity not in identities:
|
|
|
|
if not self._module.check_mode:
|
|
|
|
user.identityproviders.delete(identity['provider'])
|
|
|
|
changed = True
|
|
|
|
return changed
|
|
|
|
|
2020-03-09 10:11:07 +01:00
|
|
|
'''
|
|
|
|
@param username Username of the user
|
|
|
|
'''
|
2021-11-16 13:01:32 +01:00
|
|
|
def find_user(self, username):
|
2022-04-13 13:32:25 +02:00
|
|
|
users = self._gitlab.users.list(search=username, all=True)
|
2020-03-09 10:11:07 +01:00
|
|
|
for user in users:
|
|
|
|
if (user.username == username):
|
|
|
|
return user
|
|
|
|
|
|
|
|
'''
|
|
|
|
@param username Username of the user
|
|
|
|
'''
|
2021-11-16 13:01:32 +01:00
|
|
|
def exists_user(self, username):
|
|
|
|
# When user exists, object will be stored in self.user_object.
|
|
|
|
user = self.find_user(username)
|
2020-03-09 10:11:07 +01:00
|
|
|
if user:
|
2021-11-16 13:01:32 +01:00
|
|
|
self.user_object = user
|
2020-03-09 10:11:07 +01:00
|
|
|
return True
|
|
|
|
return False
|
|
|
|
|
2020-04-16 08:20:39 +02:00
|
|
|
'''
|
|
|
|
@param username Username of the user
|
|
|
|
'''
|
2021-11-16 13:01:32 +01:00
|
|
|
def is_active(self, username):
|
|
|
|
user = self.find_user(username)
|
2020-04-16 08:20:39 +02:00
|
|
|
return user.attributes['state'] == 'active'
|
|
|
|
|
2021-11-16 13:01:32 +01:00
|
|
|
def delete_user(self):
|
2020-03-09 10:11:07 +01:00
|
|
|
if self._module.check_mode:
|
|
|
|
return True
|
|
|
|
|
2021-11-16 13:01:32 +01:00
|
|
|
user = self.user_object
|
2020-03-09 10:11:07 +01:00
|
|
|
|
|
|
|
return user.delete()
|
|
|
|
|
2021-11-16 13:01:32 +01:00
|
|
|
def block_user(self):
|
2020-04-16 08:20:39 +02:00
|
|
|
if self._module.check_mode:
|
|
|
|
return True
|
|
|
|
|
2021-11-16 13:01:32 +01:00
|
|
|
user = self.user_object
|
2020-04-16 08:20:39 +02:00
|
|
|
|
|
|
|
return user.block()
|
|
|
|
|
2021-11-16 13:01:32 +01:00
|
|
|
def unblock_user(self):
|
2020-04-16 08:20:39 +02:00
|
|
|
if self._module.check_mode:
|
|
|
|
return True
|
|
|
|
|
2021-11-16 13:01:32 +01:00
|
|
|
user = self.user_object
|
2020-04-16 08:20:39 +02:00
|
|
|
|
|
|
|
return user.unblock()
|
|
|
|
|
2020-03-09 10:11:07 +01:00
|
|
|
|
2021-06-21 21:32:07 +02:00
|
|
|
def sanitize_arguments(arguments):
|
|
|
|
for key, value in list(arguments.items()):
|
|
|
|
if value is None:
|
|
|
|
del arguments[key]
|
|
|
|
return arguments
|
|
|
|
|
|
|
|
|
2020-03-09 10:11:07 +01:00
|
|
|
def main():
|
|
|
|
argument_spec = basic_auth_argument_spec()
|
2021-12-20 21:59:12 +01:00
|
|
|
argument_spec.update(auth_argument_spec())
|
2020-03-09 10:11:07 +01:00
|
|
|
argument_spec.update(dict(
|
|
|
|
name=dict(type='str'),
|
2020-04-16 08:20:39 +02:00
|
|
|
state=dict(type='str', default="present", choices=["absent", "present", "blocked", "unblocked"]),
|
2020-03-09 10:11:07 +01:00
|
|
|
username=dict(type='str', required=True),
|
|
|
|
password=dict(type='str', no_log=True),
|
2021-06-21 21:32:07 +02:00
|
|
|
reset_password=dict(type='bool', default=False, no_log=False),
|
2020-03-09 10:11:07 +01:00
|
|
|
email=dict(type='str'),
|
|
|
|
sshkey_name=dict(type='str'),
|
2021-03-13 13:24:26 +01:00
|
|
|
sshkey_file=dict(type='str', no_log=False),
|
2021-05-14 10:00:59 +02:00
|
|
|
sshkey_expires_at=dict(type='str', no_log=False),
|
2020-03-09 10:11:07 +01:00
|
|
|
group=dict(type='str'),
|
|
|
|
access_level=dict(type='str', default="guest", choices=["developer", "guest", "maintainer", "master", "owner", "reporter"]),
|
|
|
|
confirm=dict(type='bool', default=True),
|
|
|
|
isadmin=dict(type='bool', default=False),
|
|
|
|
external=dict(type='bool', default=False),
|
2021-06-21 21:32:07 +02:00
|
|
|
identities=dict(type='list', elements='dict'),
|
|
|
|
overwrite_identities=dict(type='bool', default=False),
|
2020-03-09 10:11:07 +01:00
|
|
|
))
|
|
|
|
|
|
|
|
module = AnsibleModule(
|
|
|
|
argument_spec=argument_spec,
|
|
|
|
mutually_exclusive=[
|
|
|
|
['api_username', 'api_token'],
|
2021-12-20 21:59:12 +01:00
|
|
|
['api_username', 'api_oauth_token'],
|
|
|
|
['api_username', 'api_job_token'],
|
|
|
|
['api_token', 'api_oauth_token'],
|
|
|
|
['api_token', 'api_job_token'],
|
2020-03-09 10:11:07 +01:00
|
|
|
],
|
|
|
|
required_together=[
|
|
|
|
['api_username', 'api_password'],
|
|
|
|
],
|
|
|
|
required_one_of=[
|
2021-12-20 21:59:12 +01:00
|
|
|
['api_username', 'api_token', 'api_oauth_token', 'api_job_token']
|
2020-03-09 10:11:07 +01:00
|
|
|
],
|
|
|
|
supports_check_mode=True,
|
|
|
|
required_if=(
|
2021-06-21 21:32:07 +02:00
|
|
|
('state', 'present', ['name', 'email']),
|
2020-03-09 10:11:07 +01:00
|
|
|
)
|
|
|
|
)
|
|
|
|
|
|
|
|
user_name = module.params['name']
|
|
|
|
state = module.params['state']
|
|
|
|
user_username = module.params['username'].lower()
|
|
|
|
user_password = module.params['password']
|
2021-06-21 21:32:07 +02:00
|
|
|
user_reset_password = module.params['reset_password']
|
2020-03-09 10:11:07 +01:00
|
|
|
user_email = module.params['email']
|
|
|
|
user_sshkey_name = module.params['sshkey_name']
|
|
|
|
user_sshkey_file = module.params['sshkey_file']
|
2021-05-14 10:00:59 +02:00
|
|
|
user_sshkey_expires_at = module.params['sshkey_expires_at']
|
2020-03-09 10:11:07 +01:00
|
|
|
group_path = module.params['group']
|
|
|
|
access_level = module.params['access_level']
|
|
|
|
confirm = module.params['confirm']
|
|
|
|
user_isadmin = module.params['isadmin']
|
|
|
|
user_external = module.params['external']
|
2021-06-21 21:32:07 +02:00
|
|
|
user_identities = module.params['identities']
|
|
|
|
overwrite_identities = module.params['overwrite_identities']
|
2020-03-09 10:11:07 +01:00
|
|
|
|
|
|
|
if not HAS_GITLAB_PACKAGE:
|
|
|
|
module.fail_json(msg=missing_required_lib("python-gitlab"), exception=GITLAB_IMP_ERR)
|
|
|
|
|
2021-11-16 13:01:32 +01:00
|
|
|
gitlab_instance = gitlab_authentication(module)
|
2020-03-09 10:11:07 +01:00
|
|
|
|
|
|
|
gitlab_user = GitLabUser(module, gitlab_instance)
|
2021-11-16 13:01:32 +01:00
|
|
|
user_exists = gitlab_user.exists_user(user_username)
|
2020-04-16 14:48:33 +02:00
|
|
|
if user_exists:
|
2021-11-16 13:01:32 +01:00
|
|
|
user_is_active = gitlab_user.is_active(user_username)
|
2020-04-16 14:48:33 +02:00
|
|
|
else:
|
|
|
|
user_is_active = False
|
2020-03-09 10:11:07 +01:00
|
|
|
|
|
|
|
if state == 'absent':
|
|
|
|
if user_exists:
|
2021-11-16 13:01:32 +01:00
|
|
|
gitlab_user.delete_user()
|
2020-03-09 10:11:07 +01:00
|
|
|
module.exit_json(changed=True, msg="Successfully deleted user %s" % user_username)
|
|
|
|
else:
|
|
|
|
module.exit_json(changed=False, msg="User deleted or does not exists")
|
|
|
|
|
2020-04-16 08:20:39 +02:00
|
|
|
if state == 'blocked':
|
|
|
|
if user_exists and user_is_active:
|
2021-11-16 13:01:32 +01:00
|
|
|
gitlab_user.block_user()
|
2020-04-16 08:20:39 +02:00
|
|
|
module.exit_json(changed=True, msg="Successfully blocked user %s" % user_username)
|
|
|
|
else:
|
|
|
|
module.exit_json(changed=False, msg="User already blocked or does not exists")
|
|
|
|
|
|
|
|
if state == 'unblocked':
|
|
|
|
if user_exists and not user_is_active:
|
2021-11-16 13:01:32 +01:00
|
|
|
gitlab_user.unblock_user()
|
2020-04-16 08:20:39 +02:00
|
|
|
module.exit_json(changed=True, msg="Successfully unblocked user %s" % user_username)
|
|
|
|
else:
|
|
|
|
module.exit_json(changed=False, msg="User is not blocked or does not exists")
|
|
|
|
|
2020-03-09 10:11:07 +01:00
|
|
|
if state == 'present':
|
2021-11-16 13:01:32 +01:00
|
|
|
if gitlab_user.create_or_update_user(user_username, {
|
|
|
|
"name": user_name,
|
|
|
|
"password": user_password,
|
|
|
|
"reset_password": user_reset_password,
|
|
|
|
"email": user_email,
|
|
|
|
"sshkey_name": user_sshkey_name,
|
|
|
|
"sshkey_file": user_sshkey_file,
|
|
|
|
"sshkey_expires_at": user_sshkey_expires_at,
|
|
|
|
"group_path": group_path,
|
|
|
|
"access_level": access_level,
|
|
|
|
"confirm": confirm,
|
|
|
|
"isadmin": user_isadmin,
|
|
|
|
"external": user_external,
|
|
|
|
"identities": user_identities,
|
|
|
|
"overwrite_identities": overwrite_identities,
|
|
|
|
}):
|
|
|
|
module.exit_json(changed=True, msg="Successfully created or updated the user %s" % user_username, user=gitlab_user.user_object._attrs)
|
2020-03-09 10:11:07 +01:00
|
|
|
else:
|
2021-11-16 13:01:32 +01:00
|
|
|
module.exit_json(changed=False, msg="No need to update the user %s" % user_username, user=gitlab_user.user_object._attrs)
|
2020-03-09 10:11:07 +01:00
|
|
|
|
|
|
|
|
|
|
|
if __name__ == '__main__':
|
|
|
|
main()
|