2023-07-12 19:27:23 +02:00
|
|
|
#!/usr/bin/python
|
|
|
|
# -*- coding: utf-8 -*-
|
|
|
|
|
|
|
|
# Copyright (c) 2022, Håkon Lerring
|
|
|
|
# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt)
|
|
|
|
# SPDX-License-Identifier: GPL-3.0-or-later
|
|
|
|
|
|
|
|
from __future__ import absolute_import, division, print_function
|
2024-01-27 10:22:44 +01:00
|
|
|
|
2023-07-12 19:27:23 +02:00
|
|
|
__metaclass__ = type
|
|
|
|
|
2024-01-27 10:22:44 +01:00
|
|
|
DOCUMENTATION = """
|
2023-07-12 19:27:23 +02:00
|
|
|
module: consul_policy
|
|
|
|
short_description: Manipulate Consul policies
|
|
|
|
version_added: 7.2.0
|
|
|
|
description:
|
|
|
|
- Allows the addition, modification and deletion of policies in a consul
|
|
|
|
cluster via the agent. For more details on using and configuring ACLs,
|
|
|
|
see U(https://www.consul.io/docs/guides/acl.html).
|
|
|
|
author:
|
|
|
|
- Håkon Lerring (@Hakon)
|
|
|
|
extends_documentation_fragment:
|
2024-01-21 18:29:29 +01:00
|
|
|
- community.general.consul
|
2024-01-27 10:58:41 +01:00
|
|
|
- community.general.consul.actiongroup_consul
|
2024-01-27 10:22:44 +01:00
|
|
|
- community.general.consul.token
|
2023-07-12 19:27:23 +02:00
|
|
|
- community.general.attributes
|
|
|
|
attributes:
|
|
|
|
check_mode:
|
2024-01-27 10:22:44 +01:00
|
|
|
support: full
|
|
|
|
version_added: 8.3.0
|
2023-07-12 19:27:23 +02:00
|
|
|
diff_mode:
|
2024-01-27 10:22:44 +01:00
|
|
|
support: partial
|
|
|
|
version_added: 8.3.0
|
|
|
|
details:
|
|
|
|
- In check mode the diff will miss operational attributes.
|
2024-05-12 10:02:06 +02:00
|
|
|
action_group:
|
|
|
|
version_added: 8.3.0
|
2023-07-12 19:27:23 +02:00
|
|
|
options:
|
|
|
|
state:
|
|
|
|
description:
|
|
|
|
- Whether the policy should be present or absent.
|
|
|
|
choices: ['present', 'absent']
|
|
|
|
default: present
|
|
|
|
type: str
|
|
|
|
valid_datacenters:
|
|
|
|
description:
|
|
|
|
- Valid datacenters for the policy. All if list is empty.
|
|
|
|
type: list
|
|
|
|
elements: str
|
|
|
|
name:
|
|
|
|
description:
|
|
|
|
- The name that should be associated with the policy, this is opaque
|
|
|
|
to Consul.
|
|
|
|
required: true
|
|
|
|
type: str
|
|
|
|
description:
|
|
|
|
description:
|
|
|
|
- Description of the policy.
|
|
|
|
type: str
|
|
|
|
rules:
|
|
|
|
type: str
|
|
|
|
description:
|
|
|
|
- Rule document that should be associated with the current policy.
|
2024-01-27 10:22:44 +01:00
|
|
|
"""
|
2023-07-12 19:27:23 +02:00
|
|
|
|
|
|
|
EXAMPLES = """
|
|
|
|
- name: Create a policy with rules
|
|
|
|
community.general.consul_policy:
|
|
|
|
host: consul1.example.com
|
|
|
|
token: some_management_acl
|
|
|
|
name: foo-access
|
|
|
|
rules: |
|
|
|
|
key "foo" {
|
|
|
|
policy = "read"
|
|
|
|
}
|
|
|
|
key "private/foo" {
|
|
|
|
policy = "deny"
|
|
|
|
}
|
|
|
|
|
|
|
|
- name: Update the rules associated to a policy
|
|
|
|
community.general.consul_policy:
|
|
|
|
host: consul1.example.com
|
|
|
|
token: some_management_acl
|
|
|
|
name: foo-access
|
|
|
|
rules: |
|
|
|
|
key "foo" {
|
|
|
|
policy = "read"
|
|
|
|
}
|
|
|
|
key "private/foo" {
|
|
|
|
policy = "deny"
|
|
|
|
}
|
|
|
|
event "bbq" {
|
|
|
|
policy = "write"
|
|
|
|
}
|
|
|
|
|
|
|
|
- name: Remove a policy
|
|
|
|
community.general.consul_policy:
|
|
|
|
host: consul1.example.com
|
|
|
|
token: some_management_acl
|
|
|
|
name: foo-access
|
|
|
|
state: absent
|
|
|
|
"""
|
|
|
|
|
|
|
|
RETURN = """
|
2024-01-27 10:22:44 +01:00
|
|
|
policy:
|
|
|
|
description: The policy as returned by the consul HTTP API.
|
|
|
|
returned: always
|
|
|
|
type: dict
|
|
|
|
sample:
|
|
|
|
CreateIndex: 632
|
|
|
|
Description: Testing
|
|
|
|
Hash: rj5PeDHddHslkpW7Ij4OD6N4bbSXiecXFmiw2SYXg2A=
|
|
|
|
Name: foo-access
|
|
|
|
Rules: |-
|
|
|
|
key "foo" {
|
|
|
|
policy = "read"
|
|
|
|
}
|
|
|
|
key "private/foo" {
|
|
|
|
policy = "deny"
|
|
|
|
}
|
2023-07-12 19:27:23 +02:00
|
|
|
operation:
|
2024-01-27 10:22:44 +01:00
|
|
|
description: The operation performed.
|
2023-07-12 19:27:23 +02:00
|
|
|
returned: changed
|
|
|
|
type: str
|
|
|
|
sample: update
|
|
|
|
"""
|
|
|
|
|
|
|
|
from ansible.module_utils.basic import AnsibleModule
|
2024-01-21 18:29:29 +01:00
|
|
|
from ansible_collections.community.general.plugins.module_utils.consul import (
|
2024-01-27 10:22:44 +01:00
|
|
|
AUTH_ARGUMENTS_SPEC,
|
|
|
|
OPERATION_READ,
|
|
|
|
_ConsulModule,
|
|
|
|
)
|
2023-07-12 19:27:23 +02:00
|
|
|
|
|
|
|
_ARGUMENT_SPEC = {
|
2024-01-27 10:22:44 +01:00
|
|
|
"name": dict(required=True),
|
|
|
|
"description": dict(required=False, type="str"),
|
|
|
|
"rules": dict(type="str"),
|
|
|
|
"valid_datacenters": dict(type="list", elements="str"),
|
|
|
|
"state": dict(default="present", choices=["present", "absent"]),
|
2023-07-12 19:27:23 +02:00
|
|
|
}
|
2024-01-27 10:22:44 +01:00
|
|
|
_ARGUMENT_SPEC.update(AUTH_ARGUMENTS_SPEC)
|
2023-07-12 19:27:23 +02:00
|
|
|
|
|
|
|
|
2024-01-27 10:22:44 +01:00
|
|
|
class ConsulPolicyModule(_ConsulModule):
|
|
|
|
api_endpoint = "acl/policy"
|
|
|
|
result_key = "policy"
|
2024-06-16 10:10:45 +02:00
|
|
|
unique_identifiers = ["id"]
|
2023-07-12 19:27:23 +02:00
|
|
|
|
2024-01-27 10:22:44 +01:00
|
|
|
def endpoint_url(self, operation, identifier=None):
|
|
|
|
if operation == OPERATION_READ:
|
|
|
|
return [self.api_endpoint, "name", self.params["name"]]
|
|
|
|
return super(ConsulPolicyModule, self).endpoint_url(operation, identifier)
|
2023-07-12 19:27:23 +02:00
|
|
|
|
|
|
|
|
|
|
|
def main():
|
2024-01-27 10:22:44 +01:00
|
|
|
module = AnsibleModule(
|
|
|
|
_ARGUMENT_SPEC,
|
|
|
|
supports_check_mode=True,
|
2023-07-12 19:27:23 +02:00
|
|
|
)
|
2024-01-27 10:22:44 +01:00
|
|
|
consul_module = ConsulPolicyModule(module)
|
|
|
|
consul_module.execute()
|
2023-07-12 19:27:23 +02:00
|
|
|
|
|
|
|
|
|
|
|
if __name__ == "__main__":
|
|
|
|
main()
|