2022-01-04 20:30:44 +01:00
|
|
|
#!/usr/bin/python
|
|
|
|
# -*- coding: utf-8 -*-
|
|
|
|
|
|
|
|
|
|
|
|
# Copyright: (c) 2019, Jon Ellis (@JonEllis) <ellis.jp@gmail.com>
|
|
|
|
# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt)
|
|
|
|
|
|
|
|
from __future__ import absolute_import, division, print_function
|
|
|
|
__metaclass__ = type
|
|
|
|
|
|
|
|
|
|
|
|
DOCUMENTATION = '''
|
|
|
|
---
|
|
|
|
module: sudoers
|
|
|
|
short_description: Manage sudoers files
|
|
|
|
version_added: "4.3.0"
|
|
|
|
description:
|
|
|
|
- This module allows for the manipulation of sudoers files.
|
|
|
|
author:
|
2022-01-05 22:54:21 +01:00
|
|
|
- "Jon Ellis (@JonEllis) <ellis.jp@gmail.com>"
|
2022-01-04 20:30:44 +01:00
|
|
|
options:
|
|
|
|
commands:
|
|
|
|
description:
|
|
|
|
- The commands allowed by the sudoers rule.
|
|
|
|
- Multiple can be added by passing a list of commands.
|
2022-04-10 05:39:09 +02:00
|
|
|
- Use C(ALL) for all commands.
|
2022-01-04 20:30:44 +01:00
|
|
|
type: list
|
|
|
|
elements: str
|
|
|
|
group:
|
|
|
|
description:
|
|
|
|
- The name of the group for the sudoers rule.
|
|
|
|
- This option cannot be used in conjunction with I(user).
|
|
|
|
type: str
|
|
|
|
name:
|
|
|
|
required: true
|
|
|
|
description:
|
|
|
|
- The name of the sudoers rule.
|
|
|
|
- This will be used for the filename for the sudoers file managed by this rule.
|
|
|
|
type: str
|
|
|
|
nopassword:
|
|
|
|
description:
|
|
|
|
- Whether a password will be required to run the sudo'd command.
|
|
|
|
default: true
|
|
|
|
type: bool
|
2022-03-24 07:07:07 +01:00
|
|
|
runas:
|
|
|
|
description:
|
|
|
|
- Specify the target user the command(s) will run as.
|
|
|
|
type: str
|
|
|
|
version_added: 4.7.0
|
2022-01-04 20:30:44 +01:00
|
|
|
sudoers_path:
|
|
|
|
description:
|
|
|
|
- The path which sudoers config files will be managed in.
|
|
|
|
default: /etc/sudoers.d
|
|
|
|
type: str
|
|
|
|
state:
|
|
|
|
default: "present"
|
|
|
|
choices:
|
|
|
|
- present
|
|
|
|
- absent
|
|
|
|
description:
|
|
|
|
- Whether the rule should exist or not.
|
|
|
|
type: str
|
|
|
|
user:
|
|
|
|
description:
|
|
|
|
- The name of the user for the sudoers rule.
|
|
|
|
- This option cannot be used in conjunction with I(group).
|
|
|
|
type: str
|
2022-06-21 12:52:21 +02:00
|
|
|
validation:
|
|
|
|
description:
|
|
|
|
- If C(absent), the sudoers rule will be added without validation.
|
|
|
|
- If C(detect) and visudo is available, then the sudoers rule will be validated by visudo.
|
|
|
|
- If C(required), visudo must be available to validate the sudoers rule.
|
|
|
|
type: str
|
|
|
|
default: detect
|
|
|
|
choices: [ absent, detect, required ]
|
|
|
|
version_added: 5.2.0
|
2022-01-04 20:30:44 +01:00
|
|
|
'''
|
|
|
|
|
|
|
|
EXAMPLES = '''
|
|
|
|
- name: Allow the backup user to sudo /usr/local/bin/backup
|
|
|
|
community.general.sudoers:
|
|
|
|
name: allow-backup
|
|
|
|
state: present
|
|
|
|
user: backup
|
|
|
|
commands: /usr/local/bin/backup
|
|
|
|
|
2022-03-24 07:07:07 +01:00
|
|
|
- name: Allow the bob user to run any commands as alice with sudo -u alice
|
|
|
|
community.general.sudoers:
|
|
|
|
name: bob-do-as-alice
|
|
|
|
state: present
|
|
|
|
user: bob
|
|
|
|
runas: alice
|
2022-04-10 05:39:09 +02:00
|
|
|
commands: ALL
|
2022-03-24 07:07:07 +01:00
|
|
|
|
2022-01-04 20:30:44 +01:00
|
|
|
- name: >-
|
|
|
|
Allow the monitoring group to run sudo /usr/local/bin/gather-app-metrics
|
|
|
|
without requiring a password
|
|
|
|
community.general.sudoers:
|
|
|
|
name: monitor-app
|
|
|
|
group: monitoring
|
|
|
|
commands: /usr/local/bin/gather-app-metrics
|
|
|
|
|
|
|
|
- name: >-
|
|
|
|
Allow the alice user to run sudo /bin/systemctl restart my-service or
|
|
|
|
sudo /bin/systemctl reload my-service, but a password is required
|
|
|
|
community.general.sudoers:
|
|
|
|
name: alice-service
|
|
|
|
user: alice
|
|
|
|
commands:
|
|
|
|
- /bin/systemctl restart my-service
|
|
|
|
- /bin/systemctl reload my-service
|
|
|
|
nopassword: false
|
|
|
|
|
|
|
|
- name: Revoke the previous sudo grants given to the alice user
|
|
|
|
community.general.sudoers:
|
|
|
|
name: alice-service
|
|
|
|
state: absent
|
|
|
|
'''
|
|
|
|
|
|
|
|
import os
|
|
|
|
from ansible.module_utils.basic import AnsibleModule
|
|
|
|
from ansible.module_utils.common.text.converters import to_native
|
|
|
|
|
|
|
|
|
|
|
|
class Sudoers(object):
|
|
|
|
|
2022-06-12 08:59:53 +02:00
|
|
|
FILE_MODE = 0o440
|
|
|
|
|
2022-01-04 20:30:44 +01:00
|
|
|
def __init__(self, module):
|
2022-06-21 12:52:21 +02:00
|
|
|
self.module = module
|
|
|
|
|
2022-01-04 20:30:44 +01:00
|
|
|
self.check_mode = module.check_mode
|
|
|
|
self.name = module.params['name']
|
|
|
|
self.user = module.params['user']
|
|
|
|
self.group = module.params['group']
|
|
|
|
self.state = module.params['state']
|
|
|
|
self.nopassword = module.params['nopassword']
|
2022-03-24 07:07:07 +01:00
|
|
|
self.runas = module.params['runas']
|
2022-01-04 20:30:44 +01:00
|
|
|
self.sudoers_path = module.params['sudoers_path']
|
|
|
|
self.file = os.path.join(self.sudoers_path, self.name)
|
|
|
|
self.commands = module.params['commands']
|
2022-06-21 12:52:21 +02:00
|
|
|
self.validation = module.params['validation']
|
2022-01-04 20:30:44 +01:00
|
|
|
|
|
|
|
def write(self):
|
|
|
|
if self.check_mode:
|
|
|
|
return
|
|
|
|
|
|
|
|
with open(self.file, 'w') as f:
|
|
|
|
f.write(self.content())
|
|
|
|
|
2022-06-12 08:59:53 +02:00
|
|
|
os.chmod(self.file, self.FILE_MODE)
|
|
|
|
|
2022-01-04 20:30:44 +01:00
|
|
|
def delete(self):
|
|
|
|
if self.check_mode:
|
|
|
|
return
|
|
|
|
|
|
|
|
os.remove(self.file)
|
|
|
|
|
|
|
|
def exists(self):
|
|
|
|
return os.path.exists(self.file)
|
|
|
|
|
|
|
|
def matches(self):
|
|
|
|
with open(self.file, 'r') as f:
|
2022-06-12 08:59:53 +02:00
|
|
|
content_matches = f.read() == self.content()
|
|
|
|
|
|
|
|
current_mode = os.stat(self.file).st_mode & 0o777
|
|
|
|
mode_matches = current_mode == self.FILE_MODE
|
|
|
|
|
|
|
|
return content_matches and mode_matches
|
2022-01-04 20:30:44 +01:00
|
|
|
|
|
|
|
def content(self):
|
|
|
|
if self.user:
|
|
|
|
owner = self.user
|
|
|
|
elif self.group:
|
|
|
|
owner = '%{group}'.format(group=self.group)
|
|
|
|
|
|
|
|
commands_str = ', '.join(self.commands)
|
|
|
|
nopasswd_str = 'NOPASSWD:' if self.nopassword else ''
|
2022-03-24 07:07:07 +01:00
|
|
|
runas_str = '({runas})'.format(runas=self.runas) if self.runas is not None else ''
|
|
|
|
return "{owner} ALL={runas}{nopasswd} {commands}\n".format(owner=owner, runas=runas_str, nopasswd=nopasswd_str, commands=commands_str)
|
2022-01-04 20:30:44 +01:00
|
|
|
|
2022-06-21 12:52:21 +02:00
|
|
|
def validate(self):
|
|
|
|
if self.validation == 'absent':
|
|
|
|
return
|
|
|
|
|
|
|
|
visudo_path = self.module.get_bin_path('visudo', required=self.validation == 'required')
|
|
|
|
if visudo_path is None:
|
|
|
|
return
|
|
|
|
|
|
|
|
check_command = [visudo_path, '-c', '-f', '-']
|
|
|
|
rc, stdout, stderr = self.module.run_command(check_command, data=self.content())
|
|
|
|
|
|
|
|
if rc != 0:
|
|
|
|
raise Exception('Failed to validate sudoers rule:\n{stdout}'.format(stdout=stdout))
|
|
|
|
|
2022-01-04 20:30:44 +01:00
|
|
|
def run(self):
|
2022-06-19 15:48:50 +02:00
|
|
|
if self.state == 'absent':
|
|
|
|
if self.exists():
|
|
|
|
self.delete()
|
|
|
|
return True
|
|
|
|
else:
|
|
|
|
return False
|
2022-01-04 20:30:44 +01:00
|
|
|
|
2022-06-21 12:52:21 +02:00
|
|
|
self.validate()
|
|
|
|
|
2022-01-04 20:30:44 +01:00
|
|
|
if self.exists() and self.matches():
|
|
|
|
return False
|
|
|
|
|
|
|
|
self.write()
|
|
|
|
return True
|
|
|
|
|
|
|
|
|
|
|
|
def main():
|
|
|
|
argument_spec = {
|
|
|
|
'commands': {
|
|
|
|
'type': 'list',
|
|
|
|
'elements': 'str',
|
|
|
|
},
|
|
|
|
'group': {},
|
|
|
|
'name': {
|
|
|
|
'required': True,
|
|
|
|
},
|
|
|
|
'nopassword': {
|
|
|
|
'type': 'bool',
|
|
|
|
'default': True,
|
|
|
|
},
|
2022-03-24 07:07:07 +01:00
|
|
|
'runas': {
|
|
|
|
'type': 'str',
|
|
|
|
'default': None,
|
|
|
|
},
|
2022-01-04 20:30:44 +01:00
|
|
|
'sudoers_path': {
|
|
|
|
'type': 'str',
|
|
|
|
'default': '/etc/sudoers.d',
|
|
|
|
},
|
|
|
|
'state': {
|
|
|
|
'default': 'present',
|
|
|
|
'choices': ['present', 'absent'],
|
|
|
|
},
|
|
|
|
'user': {},
|
2022-06-21 12:52:21 +02:00
|
|
|
'validation': {
|
|
|
|
'default': 'detect',
|
|
|
|
'choices': ['absent', 'detect', 'required']
|
|
|
|
},
|
2022-01-04 20:30:44 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
module = AnsibleModule(
|
|
|
|
argument_spec=argument_spec,
|
|
|
|
mutually_exclusive=[['user', 'group']],
|
|
|
|
supports_check_mode=True,
|
|
|
|
required_if=[('state', 'present', ['commands'])],
|
|
|
|
)
|
|
|
|
|
|
|
|
sudoers = Sudoers(module)
|
|
|
|
|
|
|
|
try:
|
|
|
|
changed = sudoers.run()
|
|
|
|
module.exit_json(changed=changed)
|
|
|
|
except Exception as e:
|
|
|
|
module.fail_json(msg=to_native(e))
|
|
|
|
|
|
|
|
|
|
|
|
if __name__ == '__main__':
|
|
|
|
main()
|