2020-08-21 13:16:59 +02:00
|
|
|
# -*- coding: utf-8 -*-
|
|
|
|
# Copyright (C) 2016 Guido Günther <agx@sigxcpu.org>, Daniel Lobato Garcia <dlobatog@redhat.com>
|
|
|
|
# Copyright (c) 2018 Ansible Project
|
2022-08-05 12:28:29 +02:00
|
|
|
# GNU General Public License v3.0+ (see LICENSES/GPL-3.0-or-later.txt or https://www.gnu.org/licenses/gpl-3.0.txt)
|
|
|
|
# SPDX-License-Identifier: GPL-3.0-or-later
|
2020-08-21 13:16:59 +02:00
|
|
|
from __future__ import (absolute_import, division, print_function)
|
2022-04-25 22:21:36 +02:00
|
|
|
|
2020-08-21 13:16:59 +02:00
|
|
|
__metaclass__ = type
|
|
|
|
|
|
|
|
DOCUMENTATION = '''
|
|
|
|
name: proxmox
|
|
|
|
short_description: Proxmox inventory source
|
|
|
|
version_added: "1.2.0"
|
|
|
|
author:
|
|
|
|
- Jeffrey van Pelt (@Thulium-Drake) <jeff@vanpelt.one>
|
|
|
|
requirements:
|
|
|
|
- requests >= 1.1
|
|
|
|
description:
|
|
|
|
- Get inventory hosts from a Proxmox PVE cluster.
|
|
|
|
- "Uses a configuration file as an inventory source, it must end in C(.proxmox.yml) or C(.proxmox.yaml)"
|
|
|
|
- Will retrieve the first network interface with an IP for Proxmox nodes.
|
|
|
|
- Can retrieve LXC/QEMU configuration as facts.
|
|
|
|
extends_documentation_fragment:
|
2021-04-08 22:32:18 +02:00
|
|
|
- constructed
|
2020-08-21 13:16:59 +02:00
|
|
|
- inventory_cache
|
|
|
|
options:
|
|
|
|
plugin:
|
|
|
|
description: The name of this plugin, it should always be set to C(community.general.proxmox) for this plugin to recognize it as it's own.
|
2022-08-24 20:00:39 +02:00
|
|
|
required: true
|
2020-08-21 13:16:59 +02:00
|
|
|
choices: ['community.general.proxmox']
|
|
|
|
type: str
|
|
|
|
url:
|
2021-01-20 22:45:04 +01:00
|
|
|
description:
|
|
|
|
- URL to Proxmox cluster.
|
|
|
|
- If the value is not specified in the inventory configuration, the value of environment variable C(PROXMOX_URL) will be used instead.
|
2022-04-01 22:51:36 +02:00
|
|
|
- Since community.general 4.7.0 you can also use templating to specify the value of the I(url).
|
2020-08-21 13:16:59 +02:00
|
|
|
default: 'http://localhost:8006'
|
|
|
|
type: str
|
2021-01-20 22:45:04 +01:00
|
|
|
env:
|
|
|
|
- name: PROXMOX_URL
|
|
|
|
version_added: 2.0.0
|
2020-08-21 13:16:59 +02:00
|
|
|
user:
|
2021-01-20 22:45:04 +01:00
|
|
|
description:
|
|
|
|
- Proxmox authentication user.
|
|
|
|
- If the value is not specified in the inventory configuration, the value of environment variable C(PROXMOX_USER) will be used instead.
|
2022-04-01 22:51:36 +02:00
|
|
|
- Since community.general 4.7.0 you can also use templating to specify the value of the I(user).
|
2022-08-24 20:00:39 +02:00
|
|
|
required: true
|
2020-08-21 13:16:59 +02:00
|
|
|
type: str
|
2021-01-20 22:45:04 +01:00
|
|
|
env:
|
|
|
|
- name: PROXMOX_USER
|
|
|
|
version_added: 2.0.0
|
2020-08-21 13:16:59 +02:00
|
|
|
password:
|
2021-01-20 22:45:04 +01:00
|
|
|
description:
|
|
|
|
- Proxmox authentication password.
|
|
|
|
- If the value is not specified in the inventory configuration, the value of environment variable C(PROXMOX_PASSWORD) will be used instead.
|
2022-04-01 22:51:36 +02:00
|
|
|
- Since community.general 4.7.0 you can also use templating to specify the value of the I(password).
|
2022-04-24 12:55:47 +02:00
|
|
|
- If you do not specify a password, you must set I(token_id) and I(token_secret) instead.
|
2020-08-21 13:16:59 +02:00
|
|
|
type: str
|
2021-01-20 22:45:04 +01:00
|
|
|
env:
|
|
|
|
- name: PROXMOX_PASSWORD
|
|
|
|
version_added: 2.0.0
|
2022-04-24 12:55:47 +02:00
|
|
|
token_id:
|
|
|
|
description:
|
|
|
|
- Proxmox authentication token ID.
|
|
|
|
- If the value is not specified in the inventory configuration, the value of environment variable C(PROXMOX_TOKEN_ID) will be used instead.
|
|
|
|
- To use token authentication, you must also specify I(token_secret). If you do not specify I(token_id) and I(token_secret),
|
|
|
|
you must set a password instead.
|
|
|
|
- Make sure to grant explicit pve permissions to the token or disable 'privilege separation' to use the users' privileges instead.
|
|
|
|
version_added: 4.8.0
|
|
|
|
type: str
|
|
|
|
env:
|
|
|
|
- name: PROXMOX_TOKEN_ID
|
|
|
|
token_secret:
|
|
|
|
description:
|
|
|
|
- Proxmox authentication token secret.
|
|
|
|
- If the value is not specified in the inventory configuration, the value of environment variable C(PROXMOX_TOKEN_SECRET) will be used instead.
|
|
|
|
- To use token authentication, you must also specify I(token_id). If you do not specify I(token_id) and I(token_secret),
|
|
|
|
you must set a password instead.
|
|
|
|
version_added: 4.8.0
|
|
|
|
type: str
|
|
|
|
env:
|
|
|
|
- name: PROXMOX_TOKEN_SECRET
|
2020-08-21 13:16:59 +02:00
|
|
|
validate_certs:
|
|
|
|
description: Verify SSL certificate if using HTTPS.
|
|
|
|
type: boolean
|
2022-08-24 20:00:39 +02:00
|
|
|
default: true
|
2020-08-21 13:16:59 +02:00
|
|
|
group_prefix:
|
|
|
|
description: Prefix to apply to Proxmox groups.
|
|
|
|
default: proxmox_
|
|
|
|
type: str
|
|
|
|
facts_prefix:
|
|
|
|
description: Prefix to apply to LXC/QEMU config facts.
|
|
|
|
default: proxmox_
|
|
|
|
type: str
|
|
|
|
want_facts:
|
2022-06-04 09:15:02 +02:00
|
|
|
description:
|
|
|
|
- Gather LXC/QEMU configuration facts.
|
|
|
|
- When I(want_facts) is set to C(true) more details about QEMU VM status are possible, besides the running and stopped states.
|
|
|
|
Currently if the VM is running and it is suspended, the status will be running and the machine will be in C(running) group,
|
|
|
|
but its actual state will be paused. See I(qemu_extended_statuses) for how to retrieve the real status.
|
2022-08-24 20:00:39 +02:00
|
|
|
default: false
|
2020-08-21 13:16:59 +02:00
|
|
|
type: bool
|
2022-06-04 09:15:02 +02:00
|
|
|
qemu_extended_statuses:
|
|
|
|
description:
|
|
|
|
- Requires I(want_facts) to be set to C(true) to function. This will allow you to differentiate betweend C(paused) and C(prelaunch)
|
|
|
|
statuses of the QEMU VMs.
|
|
|
|
- This introduces multiple groups [prefixed with I(group_prefix)] C(prelaunch) and C(paused).
|
2022-08-24 20:00:39 +02:00
|
|
|
default: false
|
2022-06-04 09:15:02 +02:00
|
|
|
type: bool
|
|
|
|
version_added: 5.1.0
|
2021-04-21 19:52:45 +02:00
|
|
|
want_proxmox_nodes_ansible_host:
|
|
|
|
version_added: 3.0.0
|
|
|
|
description:
|
|
|
|
- Whether to set C(ansbile_host) for proxmox nodes.
|
|
|
|
- When set to C(true) (default), will use the first available interface. This can be different from what you expect.
|
2022-10-25 08:07:21 +02:00
|
|
|
- The default of this option changed from C(true) to C(false) in community.general 6.0.0.
|
2021-04-21 19:52:45 +02:00
|
|
|
type: bool
|
2022-10-25 08:07:21 +02:00
|
|
|
default: false
|
2022-03-15 12:22:43 +01:00
|
|
|
filters:
|
|
|
|
version_added: 4.6.0
|
|
|
|
description: A list of Jinja templates that allow filtering hosts.
|
|
|
|
type: list
|
|
|
|
elements: str
|
|
|
|
default: []
|
2021-04-08 22:32:18 +02:00
|
|
|
strict:
|
|
|
|
version_added: 2.5.0
|
|
|
|
compose:
|
|
|
|
version_added: 2.5.0
|
|
|
|
groups:
|
|
|
|
version_added: 2.5.0
|
|
|
|
keyed_groups:
|
|
|
|
version_added: 2.5.0
|
2020-08-21 13:16:59 +02:00
|
|
|
'''
|
|
|
|
|
|
|
|
EXAMPLES = '''
|
2021-08-31 10:21:53 +02:00
|
|
|
# Minimal example which will not gather additional facts for QEMU/LXC guests
|
|
|
|
# By not specifying a URL the plugin will attempt to connect to the controller host on port 8006
|
2020-08-21 13:16:59 +02:00
|
|
|
# my.proxmox.yml
|
|
|
|
plugin: community.general.proxmox
|
|
|
|
user: ansible@pve
|
|
|
|
password: secure
|
2022-04-10 08:46:49 +02:00
|
|
|
# Note that this can easily give you wrong values as ansible_host. See further below for
|
|
|
|
# an example where this is set to `false` and where ansible_host is set with `compose`.
|
|
|
|
want_proxmox_nodes_ansible_host: true
|
2021-08-31 10:21:53 +02:00
|
|
|
|
2022-04-24 12:55:47 +02:00
|
|
|
# Instead of login with password, proxmox supports api token authentication since release 6.2.
|
|
|
|
plugin: community.general.proxmox
|
|
|
|
user: ci@pve
|
|
|
|
token_id: gitlab-1
|
|
|
|
token_secret: fa256e9c-26ab-41ec-82da-707a2c079829
|
|
|
|
|
|
|
|
# The secret can also be a vault string or passed via the environment variable TOKEN_SECRET.
|
|
|
|
token_secret: !vault |
|
|
|
|
$ANSIBLE_VAULT;1.1;AES256
|
|
|
|
62353634333163633336343265623632626339313032653563653165313262343931643431656138
|
|
|
|
6134333736323265656466646539663134306166666237630a653363623262636663333762316136
|
|
|
|
34616361326263383766366663393837626437316462313332663736623066656237386531663731
|
|
|
|
3037646432383064630a663165303564623338666131353366373630656661333437393937343331
|
|
|
|
32643131386134396336623736393634373936356332623632306561356361323737313663633633
|
|
|
|
6231313333666361656537343562333337323030623732323833
|
|
|
|
|
2021-08-31 10:21:53 +02:00
|
|
|
# More complete example demonstrating the use of 'want_facts' and the constructed options
|
|
|
|
# Note that using facts returned by 'want_facts' in constructed options requires 'want_facts=true'
|
|
|
|
# my.proxmox.yml
|
|
|
|
plugin: community.general.proxmox
|
|
|
|
url: http://pve.domain.com:8006
|
|
|
|
user: ansible@pve
|
|
|
|
password: secure
|
|
|
|
validate_certs: false
|
|
|
|
want_facts: true
|
2021-04-08 22:32:18 +02:00
|
|
|
keyed_groups:
|
2021-08-31 10:21:53 +02:00
|
|
|
# proxmox_tags_parsed is an example of a fact only returned when 'want_facts=true'
|
2021-04-08 22:32:18 +02:00
|
|
|
- key: proxmox_tags_parsed
|
|
|
|
separator: ""
|
|
|
|
prefix: group
|
|
|
|
groups:
|
|
|
|
webservers: "'web' in (proxmox_tags_parsed|list)"
|
|
|
|
mailservers: "'mail' in (proxmox_tags_parsed|list)"
|
|
|
|
compose:
|
|
|
|
ansible_port: 2222
|
2022-04-10 08:46:49 +02:00
|
|
|
# Note that this can easily give you wrong values as ansible_host. See further below for
|
|
|
|
# an example where this is set to `false` and where ansible_host is set with `compose`.
|
|
|
|
want_proxmox_nodes_ansible_host: true
|
2022-02-05 21:16:07 +01:00
|
|
|
|
|
|
|
# Using the inventory to allow ansible to connect via the first IP address of the VM / Container
|
|
|
|
# (Default is connection by name of QEMU/LXC guests)
|
|
|
|
# Note: my_inv_var demonstrates how to add a string variable to every host used by the inventory.
|
|
|
|
# my.proxmox.yml
|
|
|
|
plugin: community.general.proxmox
|
|
|
|
url: http://pve.domain.com:8006
|
|
|
|
user: ansible@pve
|
|
|
|
password: secure
|
|
|
|
validate_certs: false
|
|
|
|
want_facts: true
|
2022-04-10 08:46:49 +02:00
|
|
|
want_proxmox_nodes_ansible_host: false
|
2022-02-05 21:16:07 +01:00
|
|
|
compose:
|
|
|
|
ansible_host: proxmox_ipconfig0.ip | default(proxmox_net0.ip) | ipaddr('address')
|
|
|
|
my_inv_var_1: "'my_var1_value'"
|
|
|
|
my_inv_var_2: >
|
|
|
|
"my_var_2_value"
|
2022-04-01 22:51:36 +02:00
|
|
|
|
|
|
|
# Specify the url, user and password using templating
|
|
|
|
# my.proxmox.yml
|
|
|
|
plugin: community.general.proxmox
|
|
|
|
url: "{{ lookup('ansible.builtin.ini', 'url', section='proxmox', file='file.ini') }}"
|
|
|
|
user: "{{ lookup('ansible.builtin.env','PM_USER') | default('ansible@pve') }}"
|
|
|
|
password: "{{ lookup('community.general.random_string', base64=True) }}"
|
2022-04-10 08:46:49 +02:00
|
|
|
# Note that this can easily give you wrong values as ansible_host. See further up for
|
|
|
|
# an example where this is set to `false` and where ansible_host is set with `compose`.
|
|
|
|
want_proxmox_nodes_ansible_host: true
|
2022-04-01 22:51:36 +02:00
|
|
|
|
2020-08-21 13:16:59 +02:00
|
|
|
'''
|
|
|
|
|
2022-03-15 12:22:43 +01:00
|
|
|
import itertools
|
2020-08-21 13:16:59 +02:00
|
|
|
import re
|
|
|
|
|
|
|
|
from ansible.module_utils.common._collections_compat import MutableMapping
|
|
|
|
|
|
|
|
from ansible.errors import AnsibleError
|
2021-04-08 22:32:18 +02:00
|
|
|
from ansible.plugins.inventory import BaseInventoryPlugin, Constructable, Cacheable
|
2022-03-15 12:22:43 +01:00
|
|
|
from ansible.module_utils.common.text.converters import to_native
|
2022-04-25 22:21:36 +02:00
|
|
|
from ansible.module_utils.six import string_types
|
2020-08-21 13:16:59 +02:00
|
|
|
from ansible.module_utils.six.moves.urllib.parse import urlencode
|
2022-03-15 12:22:43 +01:00
|
|
|
from ansible.utils.display import Display
|
2020-08-21 13:16:59 +02:00
|
|
|
|
2021-12-24 18:34:48 +01:00
|
|
|
from ansible_collections.community.general.plugins.module_utils.version import LooseVersion
|
|
|
|
|
2020-08-21 13:16:59 +02:00
|
|
|
# 3rd party imports
|
|
|
|
try:
|
|
|
|
import requests
|
|
|
|
if LooseVersion(requests.__version__) < LooseVersion('1.1.0'):
|
|
|
|
raise ImportError
|
|
|
|
HAS_REQUESTS = True
|
|
|
|
except ImportError:
|
|
|
|
HAS_REQUESTS = False
|
|
|
|
|
2022-03-15 12:22:43 +01:00
|
|
|
display = Display()
|
|
|
|
|
2020-08-21 13:16:59 +02:00
|
|
|
|
2021-04-08 22:32:18 +02:00
|
|
|
class InventoryModule(BaseInventoryPlugin, Constructable, Cacheable):
|
2020-08-21 13:16:59 +02:00
|
|
|
''' Host inventory parser for ansible using Proxmox as source. '''
|
|
|
|
|
|
|
|
NAME = 'community.general.proxmox'
|
|
|
|
|
|
|
|
def __init__(self):
|
|
|
|
|
|
|
|
super(InventoryModule, self).__init__()
|
|
|
|
|
|
|
|
# from config
|
|
|
|
self.proxmox_url = None
|
|
|
|
|
|
|
|
self.session = None
|
|
|
|
self.cache_key = None
|
|
|
|
self.use_cache = None
|
|
|
|
|
|
|
|
def verify_file(self, path):
|
|
|
|
|
|
|
|
valid = False
|
|
|
|
if super(InventoryModule, self).verify_file(path):
|
|
|
|
if path.endswith(('proxmox.yaml', 'proxmox.yml')):
|
|
|
|
valid = True
|
|
|
|
else:
|
|
|
|
self.display.vvv('Skipping due to inventory source not ending in "proxmox.yaml" nor "proxmox.yml"')
|
|
|
|
return valid
|
|
|
|
|
|
|
|
def _get_session(self):
|
|
|
|
if not self.session:
|
|
|
|
self.session = requests.session()
|
|
|
|
self.session.verify = self.get_option('validate_certs')
|
|
|
|
return self.session
|
|
|
|
|
|
|
|
def _get_auth(self):
|
|
|
|
credentials = urlencode({'username': self.proxmox_user, 'password': self.proxmox_password, })
|
|
|
|
|
2022-04-24 12:55:47 +02:00
|
|
|
if self.proxmox_password:
|
|
|
|
|
|
|
|
credentials = urlencode({'username': self.proxmox_user, 'password': self.proxmox_password, })
|
|
|
|
|
|
|
|
a = self._get_session()
|
|
|
|
ret = a.post('%s/api2/json/access/ticket' % self.proxmox_url, data=credentials)
|
|
|
|
|
|
|
|
json = ret.json()
|
2020-08-21 13:16:59 +02:00
|
|
|
|
2022-04-24 12:55:47 +02:00
|
|
|
self.headers = {
|
|
|
|
# only required for POST/PUT/DELETE methods, which we are not using currently
|
|
|
|
# 'CSRFPreventionToken': json['data']['CSRFPreventionToken'],
|
|
|
|
'Cookie': 'PVEAuthCookie={0}'.format(json['data']['ticket'])
|
|
|
|
}
|
2020-08-21 13:16:59 +02:00
|
|
|
|
2022-04-24 12:55:47 +02:00
|
|
|
else:
|
|
|
|
|
|
|
|
self.headers = {'Authorization': 'PVEAPIToken={0}!{1}={2}'.format(self.proxmox_user, self.proxmox_token_id, self.proxmox_token_secret)}
|
2020-08-21 13:16:59 +02:00
|
|
|
|
|
|
|
def _get_json(self, url, ignore_errors=None):
|
|
|
|
|
|
|
|
if not self.use_cache or url not in self._cache.get(self.cache_key, {}):
|
|
|
|
|
|
|
|
if self.cache_key not in self._cache:
|
|
|
|
self._cache[self.cache_key] = {'url': ''}
|
|
|
|
|
|
|
|
data = []
|
|
|
|
s = self._get_session()
|
|
|
|
while True:
|
2022-04-24 12:55:47 +02:00
|
|
|
ret = s.get(url, headers=self.headers)
|
2020-08-21 13:16:59 +02:00
|
|
|
if ignore_errors and ret.status_code in ignore_errors:
|
|
|
|
break
|
|
|
|
ret.raise_for_status()
|
|
|
|
json = ret.json()
|
|
|
|
|
|
|
|
# process results
|
|
|
|
# FIXME: This assumes 'return type' matches a specific query,
|
|
|
|
# it will break if we expand the queries and they dont have different types
|
|
|
|
if 'data' not in json:
|
|
|
|
# /hosts/:id does not have a 'data' key
|
|
|
|
data = json
|
|
|
|
break
|
|
|
|
elif isinstance(json['data'], MutableMapping):
|
|
|
|
# /facts are returned as dict in 'data'
|
|
|
|
data = json['data']
|
|
|
|
break
|
|
|
|
else:
|
|
|
|
# /hosts 's 'results' is a list of all hosts, returned is paginated
|
|
|
|
data = data + json['data']
|
|
|
|
break
|
|
|
|
|
|
|
|
self._cache[self.cache_key][url] = data
|
|
|
|
|
|
|
|
return self._cache[self.cache_key][url]
|
|
|
|
|
|
|
|
def _get_nodes(self):
|
|
|
|
return self._get_json("%s/api2/json/nodes" % self.proxmox_url)
|
|
|
|
|
|
|
|
def _get_pools(self):
|
|
|
|
return self._get_json("%s/api2/json/pools" % self.proxmox_url)
|
|
|
|
|
|
|
|
def _get_lxc_per_node(self, node):
|
|
|
|
return self._get_json("%s/api2/json/nodes/%s/lxc" % (self.proxmox_url, node))
|
|
|
|
|
|
|
|
def _get_qemu_per_node(self, node):
|
|
|
|
return self._get_json("%s/api2/json/nodes/%s/qemu" % (self.proxmox_url, node))
|
|
|
|
|
|
|
|
def _get_members_per_pool(self, pool):
|
|
|
|
ret = self._get_json("%s/api2/json/pools/%s" % (self.proxmox_url, pool))
|
|
|
|
return ret['members']
|
|
|
|
|
|
|
|
def _get_node_ip(self, node):
|
|
|
|
ret = self._get_json("%s/api2/json/nodes/%s/network" % (self.proxmox_url, node))
|
|
|
|
|
|
|
|
for iface in ret:
|
|
|
|
try:
|
|
|
|
return iface['address']
|
|
|
|
except Exception:
|
|
|
|
return None
|
|
|
|
|
2021-04-12 22:24:33 +02:00
|
|
|
def _get_agent_network_interfaces(self, node, vmid, vmtype):
|
|
|
|
result = []
|
|
|
|
|
|
|
|
try:
|
|
|
|
ifaces = self._get_json(
|
|
|
|
"%s/api2/json/nodes/%s/%s/%s/agent/network-get-interfaces" % (
|
|
|
|
self.proxmox_url, node, vmtype, vmid
|
|
|
|
)
|
|
|
|
)['result']
|
|
|
|
|
2021-04-21 19:52:45 +02:00
|
|
|
if "error" in ifaces:
|
|
|
|
if "class" in ifaces["error"]:
|
|
|
|
# This happens on Windows, even though qemu agent is running, the IP address
|
|
|
|
# cannot be fetched, as it's unsupported, also a command disabled can happen.
|
|
|
|
errorClass = ifaces["error"]["class"]
|
|
|
|
if errorClass in ["Unsupported"]:
|
|
|
|
self.display.v("Retrieving network interfaces from guest agents on windows with older qemu-guest-agents is not supported")
|
|
|
|
elif errorClass in ["CommandDisabled"]:
|
|
|
|
self.display.v("Retrieving network interfaces from guest agents has been disabled")
|
|
|
|
return result
|
|
|
|
|
2021-04-12 22:24:33 +02:00
|
|
|
for iface in ifaces:
|
|
|
|
result.append({
|
|
|
|
'name': iface['name'],
|
2021-04-21 19:52:45 +02:00
|
|
|
'mac-address': iface['hardware-address'] if 'hardware-address' in iface else '',
|
|
|
|
'ip-addresses': ["%s/%s" % (ip['ip-address'], ip['prefix']) for ip in iface['ip-addresses']] if 'ip-addresses' in iface else []
|
2021-04-12 22:24:33 +02:00
|
|
|
})
|
|
|
|
except requests.HTTPError:
|
|
|
|
pass
|
|
|
|
|
|
|
|
return result
|
|
|
|
|
2022-03-15 12:22:43 +01:00
|
|
|
def _get_vm_config(self, properties, node, vmid, vmtype, name):
|
2020-08-21 13:16:59 +02:00
|
|
|
ret = self._get_json("%s/api2/json/nodes/%s/%s/%s/config" % (self.proxmox_url, node, vmtype, vmid))
|
|
|
|
|
2022-03-15 12:22:43 +01:00
|
|
|
properties[self._fact('node')] = node
|
|
|
|
properties[self._fact('vmid')] = vmid
|
|
|
|
properties[self._fact('vmtype')] = vmtype
|
2020-08-21 13:16:59 +02:00
|
|
|
|
2021-03-11 22:08:11 +01:00
|
|
|
plaintext_configs = [
|
2022-03-15 12:25:14 +01:00
|
|
|
'description',
|
2021-03-11 22:08:11 +01:00
|
|
|
]
|
|
|
|
|
2020-08-21 13:16:59 +02:00
|
|
|
for config in ret:
|
2022-03-15 12:22:43 +01:00
|
|
|
key = self._fact(config)
|
2020-08-21 13:16:59 +02:00
|
|
|
value = ret[config]
|
|
|
|
try:
|
|
|
|
# fixup disk images as they have no key
|
|
|
|
if config == 'rootfs' or config.startswith(('virtio', 'sata', 'ide', 'scsi')):
|
|
|
|
value = ('disk_image=' + value)
|
|
|
|
|
2021-03-11 22:08:11 +01:00
|
|
|
# Additional field containing parsed tags as list
|
|
|
|
if config == 'tags':
|
2022-03-24 07:09:25 +01:00
|
|
|
stripped_value = value.strip()
|
|
|
|
if stripped_value:
|
|
|
|
parsed_key = key + "_parsed"
|
2022-12-04 12:42:46 +01:00
|
|
|
properties[parsed_key] = [tag.strip() for tag in stripped_value.replace(',', ';').split(";")]
|
2021-03-11 22:08:11 +01:00
|
|
|
|
2021-04-17 10:08:41 +02:00
|
|
|
# The first field in the agent string tells you whether the agent is enabled
|
2022-07-12 11:03:13 +02:00
|
|
|
# the rest of the comma separated string is extra config for the agent.
|
|
|
|
# In some (newer versions of proxmox) instances it can be 'enabled=1'.
|
|
|
|
if config == 'agent':
|
|
|
|
agent_enabled = 0
|
|
|
|
try:
|
|
|
|
agent_enabled = int(value.split(',')[0])
|
|
|
|
except ValueError:
|
|
|
|
if value.split(',')[0] == "enabled=1":
|
|
|
|
agent_enabled = 1
|
|
|
|
if agent_enabled:
|
|
|
|
agent_iface_value = self._get_agent_network_interfaces(node, vmid, vmtype)
|
|
|
|
if agent_iface_value:
|
|
|
|
agent_iface_key = self.to_safe('%s%s' % (key, "_interfaces"))
|
|
|
|
properties[agent_iface_key] = agent_iface_value
|
2021-04-12 22:24:33 +02:00
|
|
|
|
2022-04-25 22:21:36 +02:00
|
|
|
if config == 'lxc':
|
|
|
|
out_val = {}
|
|
|
|
for k, v in value:
|
|
|
|
if k.startswith('lxc.'):
|
|
|
|
k = k[len('lxc.'):]
|
|
|
|
out_val[k] = v
|
|
|
|
value = out_val
|
|
|
|
|
|
|
|
if config not in plaintext_configs and isinstance(value, string_types) \
|
|
|
|
and all("=" in v for v in value.split(",")):
|
2021-02-11 10:24:58 +01:00
|
|
|
# split off strings with commas to a dict
|
2020-08-21 13:16:59 +02:00
|
|
|
# skip over any keys that cannot be processed
|
|
|
|
try:
|
2022-03-15 12:25:14 +01:00
|
|
|
value = dict(key.split("=", 1) for key in value.split(","))
|
2020-08-21 13:16:59 +02:00
|
|
|
except Exception:
|
|
|
|
continue
|
|
|
|
|
2022-03-15 12:22:43 +01:00
|
|
|
properties[key] = value
|
2020-08-21 13:16:59 +02:00
|
|
|
except NameError:
|
|
|
|
return None
|
|
|
|
|
2022-03-15 12:22:43 +01:00
|
|
|
def _get_vm_status(self, properties, node, vmid, vmtype, name):
|
2020-08-21 13:16:59 +02:00
|
|
|
ret = self._get_json("%s/api2/json/nodes/%s/%s/%s/status/current" % (self.proxmox_url, node, vmtype, vmid))
|
2022-03-15 12:22:43 +01:00
|
|
|
properties[self._fact('status')] = ret['status']
|
2022-06-11 13:46:17 +02:00
|
|
|
if vmtype == 'qemu':
|
|
|
|
properties[self._fact('qmpstatus')] = ret['qmpstatus']
|
2020-08-21 13:16:59 +02:00
|
|
|
|
2022-03-15 12:22:43 +01:00
|
|
|
def _get_vm_snapshots(self, properties, node, vmid, vmtype, name):
|
2021-07-22 22:55:07 +02:00
|
|
|
ret = self._get_json("%s/api2/json/nodes/%s/%s/%s/snapshot" % (self.proxmox_url, node, vmtype, vmid))
|
|
|
|
snapshots = [snapshot['name'] for snapshot in ret if snapshot['name'] != 'current']
|
2022-03-15 12:22:43 +01:00
|
|
|
properties[self._fact('snapshots')] = snapshots
|
2021-07-22 22:55:07 +02:00
|
|
|
|
2020-08-21 13:16:59 +02:00
|
|
|
def to_safe(self, word):
|
|
|
|
'''Converts 'bad' characters in a string to underscores so they can be used as Ansible groups
|
|
|
|
#> ProxmoxInventory.to_safe("foo-bar baz")
|
|
|
|
'foo_barbaz'
|
|
|
|
'''
|
|
|
|
regex = r"[^A-Za-z0-9\_]"
|
|
|
|
return re.sub(regex, "_", word.replace(" ", ""))
|
|
|
|
|
2022-03-15 12:22:43 +01:00
|
|
|
def _fact(self, name):
|
|
|
|
'''Generate a fact's full name from the common prefix and a name.'''
|
|
|
|
return self.to_safe('%s%s' % (self.facts_prefix, name.lower()))
|
2021-04-08 22:32:18 +02:00
|
|
|
|
2022-03-15 12:22:43 +01:00
|
|
|
def _group(self, name):
|
|
|
|
'''Generate a group's full name from the common prefix and a name.'''
|
|
|
|
return self.to_safe('%s%s' % (self.group_prefix, name.lower()))
|
2020-08-21 13:16:59 +02:00
|
|
|
|
2022-03-15 12:22:43 +01:00
|
|
|
def _can_add_host(self, name, properties):
|
|
|
|
'''Ensure that a host satisfies all defined hosts filters. If strict mode is
|
|
|
|
enabled, any error during host filter compositing will lead to an AnsibleError
|
|
|
|
being raised, otherwise the filter will be ignored.
|
|
|
|
'''
|
|
|
|
for host_filter in self.host_filters:
|
|
|
|
try:
|
|
|
|
if not self._compose(host_filter, properties):
|
|
|
|
return False
|
|
|
|
except Exception as e: # pylint: disable=broad-except
|
|
|
|
message = "Could not evaluate host filter %s for host %s - %s" % (host_filter, name, to_native(e))
|
|
|
|
if self.strict:
|
|
|
|
raise AnsibleError(message)
|
|
|
|
display.warning(message)
|
|
|
|
return True
|
|
|
|
|
|
|
|
def _add_host(self, name, variables):
|
|
|
|
self.inventory.add_host(name)
|
|
|
|
for k, v in variables.items():
|
|
|
|
self.inventory.set_variable(name, k, v)
|
|
|
|
variables = self.inventory.get_host(name).get_vars()
|
|
|
|
self._set_composite_vars(self.get_option('compose'), variables, name, strict=self.strict)
|
|
|
|
self._add_host_to_composed_groups(self.get_option('groups'), variables, name, strict=self.strict)
|
|
|
|
self._add_host_to_keyed_groups(self.get_option('keyed_groups'), variables, name, strict=self.strict)
|
|
|
|
|
|
|
|
def _handle_item(self, node, ittype, item):
|
|
|
|
'''Handle an item from the list of LXC containers and Qemu VM. The
|
|
|
|
return value will be either None if the item was skipped or the name of
|
|
|
|
the item if it was added to the inventory.'''
|
|
|
|
if item.get('template'):
|
|
|
|
return None
|
|
|
|
|
|
|
|
properties = dict()
|
|
|
|
name, vmid = item['name'], item['vmid']
|
|
|
|
|
|
|
|
# get status, config and snapshots if want_facts == True
|
2022-06-04 09:15:02 +02:00
|
|
|
want_facts = self.get_option('want_facts')
|
|
|
|
if want_facts:
|
2022-03-15 12:22:43 +01:00
|
|
|
self._get_vm_status(properties, node, vmid, ittype, name)
|
|
|
|
self._get_vm_config(properties, node, vmid, ittype, name)
|
|
|
|
self._get_vm_snapshots(properties, node, vmid, ittype, name)
|
|
|
|
|
|
|
|
# ensure the host satisfies filters
|
|
|
|
if not self._can_add_host(name, properties):
|
|
|
|
return None
|
|
|
|
|
|
|
|
# add the host to the inventory
|
|
|
|
self._add_host(name, properties)
|
|
|
|
node_type_group = self._group('%s_%s' % (node, ittype))
|
|
|
|
self.inventory.add_child(self._group('all_' + ittype), name)
|
|
|
|
self.inventory.add_child(node_type_group, name)
|
2022-06-04 09:15:02 +02:00
|
|
|
|
|
|
|
item_status = item['status']
|
|
|
|
if item_status == 'running':
|
|
|
|
if want_facts and ittype == 'qemu' and self.get_option('qemu_extended_statuses'):
|
|
|
|
# get more details about the status of the qemu VM
|
|
|
|
item_status = properties.get(self._fact('qmpstatus'), item_status)
|
|
|
|
self.inventory.add_child(self._group('all_%s' % (item_status, )), name)
|
2022-03-15 12:22:43 +01:00
|
|
|
|
|
|
|
return name
|
|
|
|
|
|
|
|
def _populate_pool_groups(self, added_hosts):
|
|
|
|
'''Generate groups from Proxmox resource pools, ignoring VMs and
|
|
|
|
containers that were skipped.'''
|
|
|
|
for pool in self._get_pools():
|
|
|
|
poolid = pool.get('poolid')
|
|
|
|
if not poolid:
|
|
|
|
continue
|
|
|
|
pool_group = self._group('pool_' + poolid)
|
|
|
|
self.inventory.add_group(pool_group)
|
2020-10-30 19:51:49 +01:00
|
|
|
|
2022-03-15 12:22:43 +01:00
|
|
|
for member in self._get_members_per_pool(poolid):
|
|
|
|
name = member.get('name')
|
|
|
|
if name and name in added_hosts:
|
|
|
|
self.inventory.add_child(pool_group, name)
|
2020-08-21 13:16:59 +02:00
|
|
|
|
2022-03-15 12:22:43 +01:00
|
|
|
def _populate(self):
|
2020-08-21 13:16:59 +02:00
|
|
|
|
2022-03-15 12:22:43 +01:00
|
|
|
# create common groups
|
2022-06-04 09:15:02 +02:00
|
|
|
default_groups = ['lxc', 'qemu', 'running', 'stopped']
|
|
|
|
|
|
|
|
if self.get_option('qemu_extended_statuses'):
|
|
|
|
default_groups.extend(['prelaunch', 'paused'])
|
|
|
|
|
|
|
|
for group in default_groups:
|
|
|
|
self.inventory.add_group(self._group('all_%s' % (group)))
|
|
|
|
|
2022-03-15 12:22:43 +01:00
|
|
|
nodes_group = self._group('nodes')
|
|
|
|
self.inventory.add_group(nodes_group)
|
2020-08-21 13:16:59 +02:00
|
|
|
|
2022-04-10 08:46:49 +02:00
|
|
|
want_proxmox_nodes_ansible_host = self.get_option("want_proxmox_nodes_ansible_host")
|
|
|
|
|
2022-03-15 12:22:43 +01:00
|
|
|
# gather vm's on nodes
|
|
|
|
self._get_auth()
|
|
|
|
hosts = []
|
|
|
|
for node in self._get_nodes():
|
|
|
|
if not node.get('node'):
|
|
|
|
continue
|
|
|
|
|
|
|
|
self.inventory.add_host(node['node'])
|
|
|
|
if node['type'] == 'node':
|
|
|
|
self.inventory.add_child(nodes_group, node['node'])
|
|
|
|
|
|
|
|
if node['status'] == 'offline':
|
|
|
|
continue
|
|
|
|
|
|
|
|
# get node IP address
|
2022-04-10 08:46:49 +02:00
|
|
|
if want_proxmox_nodes_ansible_host:
|
2022-03-15 12:22:43 +01:00
|
|
|
ip = self._get_node_ip(node['node'])
|
|
|
|
self.inventory.set_variable(node['node'], 'ansible_host', ip)
|
|
|
|
|
|
|
|
# add LXC/Qemu groups for the node
|
|
|
|
for ittype in ('lxc', 'qemu'):
|
|
|
|
node_type_group = self._group('%s_%s' % (node['node'], ittype))
|
|
|
|
self.inventory.add_group(node_type_group)
|
|
|
|
|
|
|
|
# get LXC containers and Qemu VMs for this node
|
|
|
|
lxc_objects = zip(itertools.repeat('lxc'), self._get_lxc_per_node(node['node']))
|
|
|
|
qemu_objects = zip(itertools.repeat('qemu'), self._get_qemu_per_node(node['node']))
|
|
|
|
for ittype, item in itertools.chain(lxc_objects, qemu_objects):
|
|
|
|
name = self._handle_item(node['node'], ittype, item)
|
|
|
|
if name is not None:
|
|
|
|
hosts.append(name)
|
2021-04-08 22:32:18 +02:00
|
|
|
|
2020-08-21 13:16:59 +02:00
|
|
|
# gather vm's in pools
|
2022-03-15 12:22:43 +01:00
|
|
|
self._populate_pool_groups(hosts)
|
2020-08-21 13:16:59 +02:00
|
|
|
|
|
|
|
def parse(self, inventory, loader, path, cache=True):
|
|
|
|
if not HAS_REQUESTS:
|
|
|
|
raise AnsibleError('This module requires Python Requests 1.1.0 or higher: '
|
|
|
|
'https://github.com/psf/requests.')
|
|
|
|
|
|
|
|
super(InventoryModule, self).parse(inventory, loader, path)
|
|
|
|
|
|
|
|
# read config from file, this sets 'options'
|
|
|
|
self._read_config_data(path)
|
|
|
|
|
2022-11-01 07:33:54 +01:00
|
|
|
# read and template auth options
|
|
|
|
for o in ('url', 'user', 'password', 'token_id', 'token_secret'):
|
|
|
|
v = self.get_option(o)
|
|
|
|
if self.templar.is_template(v):
|
2022-12-02 06:43:22 +01:00
|
|
|
v = self.templar.template(v, disable_lookups=False)
|
2022-11-01 07:33:54 +01:00
|
|
|
setattr(self, 'proxmox_%s' % o, v)
|
2022-04-01 22:51:36 +02:00
|
|
|
|
2022-11-01 07:33:54 +01:00
|
|
|
# some more cleanup and validation
|
|
|
|
self.proxmox_url = self.proxmox_url.rstrip('/')
|
2022-04-01 22:51:36 +02:00
|
|
|
|
2022-11-01 07:33:54 +01:00
|
|
|
if self.proxmox_password is None and (self.proxmox_token_id is None or self.proxmox_token_secret is None):
|
2022-04-24 12:55:47 +02:00
|
|
|
raise AnsibleError('You must specify either a password or both token_id and token_secret.')
|
|
|
|
|
2022-06-04 09:15:02 +02:00
|
|
|
if self.get_option('qemu_extended_statuses') and not self.get_option('want_facts'):
|
|
|
|
raise AnsibleError('You must set want_facts to True if you want to use qemu_extended_statuses.')
|
|
|
|
|
2022-11-01 07:33:54 +01:00
|
|
|
# read rest of options
|
2020-08-21 13:16:59 +02:00
|
|
|
self.cache_key = self.get_cache_key(path)
|
|
|
|
self.use_cache = cache and self.get_option('cache')
|
2022-03-15 12:22:43 +01:00
|
|
|
self.host_filters = self.get_option('filters')
|
|
|
|
self.group_prefix = self.get_option('group_prefix')
|
|
|
|
self.facts_prefix = self.get_option('facts_prefix')
|
|
|
|
self.strict = self.get_option('strict')
|
2020-08-21 13:16:59 +02:00
|
|
|
|
|
|
|
# actually populate inventory
|
|
|
|
self._populate()
|