2012-05-13 17:00:02 +02:00
Module Development
==================
2012-03-14 17:50:40 +01:00
2013-03-19 19:46:30 +01:00
.. image :: http://ansible.cc/docs/_static/ansible_fest_2013.png
:alt: ansiblefest 2013
:target: http://www.eventbrite.com/event/5593981750
2012-10-12 21:17:00 +02:00
Ansible modules are reusable units of magic that can be used by the Ansible API,
2012-03-14 17:50:40 +01:00
or by the `ansible` or `ansible-playbook` programs.
2012-10-12 21:17:00 +02:00
Modules can be written in any language and are found in the path specified
2013-03-15 19:55:53 +01:00
by `ANSIBLE_LIBRARY` or the `` --module-path `` command line option.
2012-08-01 05:08:04 +02:00
2012-08-28 21:41:10 +02:00
.. contents ::
:depth: 2
:backlinks: top
2012-10-12 21:17:00 +02:00
Tutorial
2012-03-14 17:50:40 +01:00
`` ` ` ` ` ``
Let's build a module to get and set the system time. For starters, let's build
2012-10-12 21:17:00 +02:00
a module that just outputs the current time.
2012-03-14 17:50:40 +01:00
We are going to use Python here but any language is possible. Only File I/O and outputing to standard
out are required. So, bash, C++, clojure, Python, Ruby, whatever you want
2012-10-12 21:17:00 +02:00
is fine.
2012-04-27 07:39:15 +02:00
2012-08-01 05:08:04 +02:00
Now Python Ansible modules contain some extremely powerful shortcuts (that all the core modules use)
but first we are going to build a module the very hard way. The reason we do this is because modules
written in any language OTHER than Python are going to have to do exactly this. We'll show the easy
2012-10-12 21:17:00 +02:00
way later.
2012-08-01 05:08:04 +02:00
2012-04-27 07:39:15 +02:00
So, here's an example. You would never really need to build a module to set the system time,
the 'command' module could already be used to do this. Though we're going to make one.
2012-03-14 17:50:40 +01:00
Reading the modules that come with ansible (linked above) is a great way to learn how to write
modules. Keep in mind, though, that some modules in ansible's source tree are internalisms,
so look at `service` or `yum` , and don't stare too close into things like `async_wrapper` or
you'll turn to stone. Nobody ever executes async_wrapper directly.
Ok, let's get going with an example. We'll use Python. For starters, save this as a file named `time` ::
#!/usr/bin/python
import datetime
import json
date = str(datetime.datetime.now())
print json.dumps({
"time" : date
})
Testing Modules
`` ` ` ` ` ` ` ` ` ` ` ` ``
There's a useful test script in the source checkout for ansible::
git clone git@github.com:ansible/ansible.git
chmod +x ansible/hacking/test-module
Let's run the script you just wrote with that::
2012-08-01 05:08:04 +02:00
ansible/hacking/test-module -m ./time
2012-03-14 17:50:40 +01:00
You should see output that looks something like this::
{u'time': u'2012-03-14 22:13:48.539183'}
2012-05-02 07:35:02 +02:00
If you did not, you might have a typo in your module, so recheck it and try again.
2012-03-14 17:50:40 +01:00
Reading Input
`` ` ` ` ` ` ` ` ` ` ``
Let's modify the module to allow setting the current time. We'll do this by seeing
if a key value pair in the form `time=<string>` is passed in to the module.
2012-04-13 00:20:52 +02:00
Ansible internally saves arguments to an arguments file. So we must read the file
2012-03-14 17:50:40 +01:00
and parse it. The arguments file is just a string, so any form of arguments are legal.
Here we'll do some basic parsing to treat the input as key=value.
The example usage we are trying to achieve to set the time is::
time time="March 14 22:10"
If no time parameter is set, we'll just leave the time as is and return the current time.
.. note:
This is obviously an unrealistic idea for a module. You'd most likely just
use the shell module. However, it probably makes a decent tutorial.
Let's look at the code. Read the comments as we'll explain as we go. Note that this
2012-05-02 07:35:02 +02:00
is highly verbose because it's intended as an educational example. You can write modules
2012-03-14 17:50:40 +01:00
a lot shorter than this::
#!/usr/bin/python
# import some python modules that we'll use. These are all
# available in Python's core
import datetime
import sys
import json
import os
import shlex
# read the argument string from the arguments file
args_file = sys.argv[1]
args_data = file(args_file).read()
# for this module, we're going to do key=value style arguments
# this is up to each module to decide what it wants, but all
# core modules besides 'command' and 'shell' take key=value
# so this is highly recommended
2012-10-12 21:17:00 +02:00
2012-03-14 17:50:40 +01:00
arguments = shlex.split(args_data)
for arg in arguments:
# ignore any arguments without an equals in it
if arg.find("=") != -1:
2012-10-12 21:17:00 +02:00
2012-03-14 17:50:40 +01:00
(key, value) = arg.split("=")
# if setting the time, the key 'time'
# will contain the value we want to set the time to
if key == "time":
# now we'll affect the change. Many modules
# will strive to be 'idempotent', meaning they
# will only make changes when the desired state
# expressed to the module does not match
# the current state. Look at 'service'
# or 'yum' in the main git tree for an example
# of how that might look.
rc = os.system("date -s \"%s\"" % value)
# always handle all possible errors
#
# when returning a failure, include 'failed'
# in the return data, and explain the failure
# in 'msg'. Both of these conventions are
# required however additional keys and values
# can be added.
if rc != 0:
print json.dumps({
"failed" : True,
"msg" : "failed setting the time"
})
sys.exit(1)
# when things do not fail, we do not
# have any restrictions on what kinds of
2012-10-12 21:17:00 +02:00
# data are returned, but it's always a
2012-03-14 17:50:40 +01:00
# good idea to include whether or not
# a change was made, as that will allow
2012-10-12 21:17:00 +02:00
# notifiers to be used in playbooks.
2012-03-14 17:50:40 +01:00
date = str(datetime.datetime.now())
print json.dumps({
"time" : date,
"changed" : True
})
sys.exit(0)
2012-10-12 21:17:00 +02:00
# if no parameters are sent, the module may or
2012-03-14 17:50:40 +01:00
# may not error out, this one will just
# return the time
date = str(datetime.datetime.now())
print json.dumps({
"time" : date
})
Let's test that module::
2012-08-07 22:36:03 +02:00
ansible/hacking/test-module -m ./time -a time=\"March 14 12:23\"
2012-03-14 17:50:40 +01:00
This should return something like::
2012-05-10 07:33:19 +02:00
{"changed": True, "time": "2012-03-14 12:23:00.000307"}
Module Provided 'Facts'
`` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ``
The 'setup' module that ships with Ansible provides many variables about a system that can be used in playbooks
and templates. However, it's possible to also add your own facts without modifying the system module. To do
2012-08-01 04:19:04 +02:00
this, just have the module return a `ansible_facts` key, like so, along with other return data::
2012-05-10 07:33:19 +02:00
{
"changed" : True,
"rc" : 5,
"ansible_facts" : {
"leptons" : 5000
"colors" : {
"red" : "FF0000",
"white" : "FFFFFF"
}
}
}
These 'facts' will be available to all statements called after that module (but not before) in the playbook.
A good idea might be make a module called 'site_facts' and always call it at the top of each playbook, though
we're always open to improving the selection of core facts in Ansible as well.
2012-03-14 17:50:40 +01:00
2012-08-01 05:08:04 +02:00
Common Module Boilerplate
`` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ``
As mentioned, if you are writing a module in Python, there are some very powerful shortcuts you can use.
Modules are still transferred as one file, but an arguments file is no longer needed, so these are not
only shorter in terms of code, they are actually FASTER in terms of execution time.
2012-10-12 21:17:00 +02:00
Rather than mention these here, the best way to learn is to read some of the `source of the modules <https://github.com/ansible/ansible/tree/devel/library> `_ that come with Ansible.
2012-08-01 05:08:04 +02:00
The 'group' and 'user' modules are reasonably non-trival and showcase what this looks like.
Key parts include always ending the module file with::
# include magic from lib/ansible/module_common.py
#<<INCLUDE_ANSIBLE_MODULE_COMMON>>
main()
And instantiating the module class like::
module = AnsibleModule(
argument_spec = dict(
state = dict(default='present', choices=['present', 'absent']),
name = dict(required=True),
enabled = dict(required=True, choices=BOOLEANS),
something = dict(aliases=['whatever'])
)
)
2012-03-14 17:50:40 +01:00
2012-08-01 05:08:04 +02:00
The AnsibleModule provides lots of common code for handling returns, parses your arguments
for you, and allows you to check inputs.
2012-03-14 17:50:40 +01:00
2012-08-01 05:08:04 +02:00
Successful returns are made like this::
module.exit_json(changed=True, something_else=12345)
And failures are just as simple (where 'msg' is a required parameter to explain the error)::
2012-10-04 05:27:43 +02:00
module.fail_json(msg="Something fatal happened")
2012-08-01 05:08:04 +02:00
2012-10-12 21:17:00 +02:00
There are also other useful functions in the module class, such as module.md5(path). See
2012-08-01 05:08:04 +02:00
lib/ansible/module_common.py in the source checkout for implementation details.
Again, modules developed this way are best tested with the hacking/test-module script in the git
source checkout. Because of the magic involved, this is really the only way the scripts
can function outside of Ansible.
If submitting a module to ansible's core code, which we encourage, use of the AnsibleModule
class is required.
2013-03-17 02:43:05 +01:00
Check Mode
`` ` ` ` ` ` ` ``
.. versionadded :: 1.1
Modules may optionally support check mode. If the user runs Ansible in check
mode, the module should try to predict whether changes will occur.
For your module to support check mode, you must pass `` supports_check_mode=True ``
when instantiating the AnsibleModule object. The AnsibleModule.check_mode attribute
will evaluate to True when check mode is enabled. For example::
module = AnsibleModule(
argument_spec = dict(...),
supports_check_mode=True
)
if module.check_mode:
# Check if any changes would be made by don't actually make those changes
module.exit_json(changed=check_if_system_state_would_be_changed())
Remember that, as module developer, you are responsible for ensuring that no
system state is altered when the user enables check mode.
If your module does not support check mode, when the user runs Ansible in check
mode, your module will simply be skipped.
2012-08-01 05:08:04 +02:00
Common Pitfalls
`` ` ` ` ` ` ` ` ` ` ` ` ``
2012-03-14 17:50:40 +01:00
You should also never do this in a module::
print "some status message"
2012-10-12 21:17:00 +02:00
2012-03-14 17:50:40 +01:00
Because the output is supposed to be valid JSON. Except that's not quite true,
but we'll get to that later.
2012-05-02 15:53:29 +02:00
Modules must not output anything on standard error, because the system will merge
standard out with standard error and prevent the JSON from parsing. Capturing standard
error and returning it as a variable in the JSON on standard out is fine, and is, in fact,
how the command module is implemented.
2012-04-27 07:39:15 +02:00
If a module returns stderr or otherwise fails to produce valid JSON, the actual output
2012-05-02 15:53:29 +02:00
will still be shown in Ansible, but the command will not succeed.
2012-04-27 07:39:15 +02:00
Always use the hacking/test-module script when developing modules and it will warn
you about these kind of things.
2012-11-24 22:55:56 +01:00
Conventions/Recommendations
`` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ``
2012-03-14 17:50:40 +01:00
As a reminder from the example code above, here are some basic conventions
and guidelines:
2012-08-01 05:08:04 +02:00
* If the module is addressing an object, the parameter for that object should be called 'name' whenever possible, or accept 'name' as an alias.
2012-03-14 17:50:40 +01:00
2012-10-12 21:17:00 +02:00
* If you have a company module that returns facts specific to your installations, a good name for this module is `site_facts` .
2012-03-14 17:50:40 +01:00
2012-08-01 05:08:04 +02:00
* Modules accepting boolean status should generally accept 'yes', 'no', 'true', 'false', or anything else a user may likely throw at them. The AnsibleModule common code supports this with "choices=BOOLEANS" and a module.boolean(value) casting function.
2012-03-14 17:50:40 +01:00
2012-08-01 05:08:04 +02:00
* Include a minimum of dependencies if possible. If there are dependencies, document them at the top of the module file, and have the module raise JSON error messages when the import fails.
2012-03-14 17:50:40 +01:00
2012-08-01 05:08:04 +02:00
* Modules must be self contained in one file to be auto-transferred by ansible.
2012-03-14 17:50:40 +01:00
2012-08-01 05:08:04 +02:00
* If packaging modules in an RPM, they only need to be installed on the control machine and should be dropped into /usr/share/ansible. This is entirely optional and up to you.
2012-03-14 17:50:40 +01:00
2012-08-01 05:08:04 +02:00
* Modules should return JSON or key=value results all on one line. JSON is best if you can do JSON. All return types must be hashes (dictionaries) although they can be nested. Lists or simple scalar values are not supported, though they can be trivially contained inside a dictionary.
* In the event of failure, a key of 'failed' should be included, along with a string explanation in 'msg'. Modules that raise tracebacks (stacktraces) are generally considered 'poor' modules, though Ansible can deal with these returns and will automatically convert anything unparseable into a failed result. If you are using the AnsibleModule common Python code, the 'failed' element will be included for you automatically when you call 'fail_json'.
2012-03-14 17:50:40 +01:00
2012-10-12 21:17:00 +02:00
* Return codes from modules are not actually not signficant, but continue on with 0=success and non-zero=failure for reasons of future proofing.
2012-08-01 05:08:04 +02:00
* As results from many hosts will be aggregrated at once, modules should return only relevant output. Returning the entire contents of a log file is generally bad form.
2012-03-14 17:50:40 +01:00
Shorthand Vs JSON
2012-03-15 04:45:02 +01:00
`` ` ` ` ` ` ` ` ` ` ` ` ` ` ``
2012-03-14 17:50:40 +01:00
To make it easier to write modules in bash and in cases where a JSON
module might not be available, it is acceptable for a module to return
key=value output all on one line, like this. The Ansible parser
2012-03-14 18:13:32 +01:00
will know what to do::
2012-03-14 17:50:40 +01:00
2012-03-14 18:13:32 +01:00
somekey=1 somevalue=2 rc=3 favcolor=red
2012-03-14 17:50:40 +01:00
If you're writing a module in Python or Ruby or whatever, though, returning
JSON is probably the simplest way to go.
2012-10-12 21:17:00 +02:00
Documenting Your Module
`` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ``
All modules included in the CORE distribution must have a
`` DOCUMENTATION `` string. This string MUST be a valid YAML document
which conforms to the schema defined below. You may find it easier to
start writing your `` DOCUMENTATION `` string in an editor with YAML
syntax highlighting before you include it in your Python file.
Example
+++++++
Here's a correctly formatted YAML document we could use for a
`` DOCUMENTATION `` string:
2013-02-25 15:36:50 +01:00
.. literalinclude :: ../../examples/DOCUMENTATION.yaml
2012-10-12 21:17:00 +02:00
This is available in the 'examples/' directory of the of the Ansible
2012-10-16 16:06:00 +02:00
github repository, and you can have that generated with
`` ./hacking/module_formatter.py -G `` . You can copy it into your module and use
it as a starting point when writing your own docs.
2012-10-12 21:17:00 +02:00
Include it in your module file like this::
#!/usr/bin/env python
# Copyright header....
DOCUMENTATION = '''
---
module: modulename
short_description: This is a sentence describing the module
# ... snip ...
examples:
- code: modulename opt1=arg1 opt2=arg2
description: Optional words describing this example
'''
2012-11-21 18:49:30 +01:00
The `` description `` , `` notes `` and `` description `` within `` examples ``
support formatting in some of the output formats (e.g. `` rst `` , `` man `` ).
These formatting functions are `` U() `` , `` M() `` , `` I() `` , and `` C() ``
for URL, module, italic, and constant-width respectively. It is suggested
to use `` C() `` for file and option names, and `` I() `` when referencing
parameters; module names should be specifies as `` M(module) `` .
2013-02-18 15:31:38 +01:00
Examples (which typically contain colons, quotes, etc.) are difficult
to format with YAML, so these can (alternatively, or additionally) be
written in plain text in an `` EXAMPLES `` string within the module
like this::
EXAMPLES = '''
- action: modulename opt1=arg1 opt2=arg2
'''
The `` module_formatter.py `` script and `` ansible-doc(1) `` append the
`` EXAMPLES `` blob after any existing `` examples `` you may have in the
YAML `` DOCUMENTATION `` string.
2012-10-12 21:17:00 +02:00
Building & Testing
++++++++++++++++++
Put your completed module file into the 'library' directory and then
run the command: `` make webdocs `` . The new 'modules.html' file will be
built and appear in the 'docsite/' directory.
You can also test-build your docs one-by-one using the
`` module_formatter.py `` script:
.. code-block :: bash
$ ./hacking/module_formatter.py -t man -M library/ -m git > ansible-git.1
$ man ./ansible-git.1
This will build a manpage for the git module, and look in the
'library/' directory for the module source. To see all the other
output formats available:
.. code-block :: bash
$ ./hacking/module_formatter.py -t --help
.. tip ::
If you're having a problem with the syntax of your YAML you can
validate it on the `YAML Lint <http://www.yamllint.com/> `_ website.
2013-03-02 01:13:37 +01:00
.. tip ::
You can use ANSIBLE_KEEP_REMOTE_FILES=1 to prevent ansible from
deleting the remote files so you can debug your module.
2012-10-12 21:17:00 +02:00
2012-03-14 17:50:40 +01:00
Getting Your Module Into Core
`` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ``
2012-10-12 21:17:00 +02:00
High-quality modules with minimal dependencies
2012-03-14 17:50:40 +01:00
can be included in the core, but core modules (just due to the programming
2012-08-01 05:08:04 +02:00
preferences of the developers) will need to be implemented in Python and use
the AnsibleModule common code, and should generally use consistent arguments with the rest of
the program. Stop by the mailing list to inquire about requirements.
2012-03-14 17:50:40 +01:00
2012-03-31 15:29:31 +02:00
.. seealso ::
:doc: `modules`
Learn about available modules
2012-10-08 14:23:11 +02:00
`Ansible Resources <https://github.com/ansible/ansible/tree/devel/contrib> `_
2012-08-08 00:49:10 +02:00
User contributed playbooks, modules, and articles
2012-08-07 04:00:50 +02:00
`Github modules directory <https://github.com/ansible/ansible/tree/devel/library> `_
2012-03-31 15:29:31 +02:00
Browse source of core modules
2012-03-31 15:55:37 +02:00
`Mailing List <http://groups.google.com/group/ansible-project> `_
Questions? Help? Ideas? Stop by the list on Google Groups
`irc.freenode.net <http://irc.freenode.net> `_
#ansible IRC chat channel