1
0
Fork 0
mirror of https://github.com/ansible-collections/community.general.git synced 2024-09-14 20:13:21 +02:00

[PR #7826/44679e71 backport][stable-8] Refactor of consul modules (#7877)

Refactor of consul modules (#7826)

* Extract common functionality.

* Refactor duplicated code into module_utils.

* Fixed ansible-test issues.

* Address review comments.

* Revert changes to consul_acl.

It uses deprecated APIs disabled since Consul 1.11 (which is EOL), don't
bother updating the module anymore.

* Remove unused code.

* Merge token into default doc fragment.

* JSON all the way down.

* extract validation tests into custom file and prep for requests removal.

* Removed dependency on requests.

* Initial test for consul_kv.

* fixup license headers.

* Revert changes to consul.py since it utilizes python-consul.

* Disable the lookup test for now.

* Fix python 2.7 support.

* Address review comments.

* Address review comments.

* Addec changelog fragment.

* Mark ConsulModule as private.

(cherry picked from commit 44679e71a2)

Co-authored-by: Florian Apolloner <florian@apolloner.eu>
This commit is contained in:
patchback[bot] 2024-01-21 17:51:45 +00:00 committed by GitHub
parent 13c25154b5
commit 1ab1f8f62b
No known key found for this signature in database
GPG key ID: B5690EEEBB952194
10 changed files with 365 additions and 476 deletions

View file

@ -0,0 +1,2 @@
minor_changes:
- 'consul_policy, consul_role, consul_session - removed dependency on ``requests`` and factored out common parts (https://github.com/ansible-collections/community.general/pull/7826).'

View file

@ -0,0 +1,44 @@
# -*- coding: utf-8 -*-
# Copyright (c) Ansible project
# GNU General Public License v3.0+ (see LICENSES/GPL-3.0-or-later.txt or https://www.gnu.org/licenses/gpl-3.0.txt)
# SPDX-License-Identifier: GPL-3.0-or-later
from __future__ import absolute_import, division, print_function
__metaclass__ = type
class ModuleDocFragment:
# Common parameters for Consul modules
DOCUMENTATION = r"""
options:
host:
description:
- Host of the consul agent, defaults to V(localhost).
default: localhost
type: str
port:
type: int
description:
- The port on which the consul agent is running.
default: 8500
scheme:
description:
- The protocol scheme on which the consul agent is running.
Defaults to V(http) and can be set to V(https) for secure connections.
default: http
type: str
validate_certs:
type: bool
description:
- Whether to verify the TLS certificate of the consul agent.
default: true
token:
description:
- The token to use for authorization.
type: str
ca_path:
description:
- The CA bundle to use for https connections
type: str
"""

View file

@ -7,6 +7,12 @@
from __future__ import absolute_import, division, print_function from __future__ import absolute_import, division, print_function
__metaclass__ = type __metaclass__ = type
import json
from ansible.module_utils.six.moves.urllib import error as urllib_error
from ansible.module_utils.six.moves.urllib.parse import urlencode
from ansible.module_utils.urls import open_url
def get_consul_url(configuration): def get_consul_url(configuration):
return '%s://%s:%s/v1' % (configuration.scheme, return '%s://%s:%s/v1' % (configuration.scheme,
@ -27,3 +33,85 @@ class RequestError(Exception):
def handle_consul_response_error(response): def handle_consul_response_error(response):
if 400 <= response.status_code < 600: if 400 <= response.status_code < 600:
raise RequestError('%d %s' % (response.status_code, response.content)) raise RequestError('%d %s' % (response.status_code, response.content))
def auth_argument_spec():
return dict(
host=dict(default="localhost"),
port=dict(type="int", default=8500),
scheme=dict(default="http"),
validate_certs=dict(type="bool", default=True),
token=dict(no_log=True),
ca_path=dict(),
)
class _ConsulModule:
"""Base class for Consul modules.
This class is considered private, till the API is fully fleshed out.
As such backwards incompatible changes can occur even in bugfix releases.
"""
def __init__(self, module):
self.module = module
def _request(self, method, url_parts, data=None, params=None):
module_params = self.module.params
if isinstance(url_parts, str):
url_parts = [url_parts]
if params:
# Remove values that are None
params = {k: v for k, v in params.items() if v is not None}
ca_path = module_params.get("ca_path")
base_url = "%s://%s:%s/v1" % (
module_params["scheme"],
module_params["host"],
module_params["port"],
)
url = "/".join([base_url] + list(url_parts))
headers = {}
token = self.module.params.get("token")
if token:
headers["X-Consul-Token"] = token
try:
if data:
data = json.dumps(data)
headers["Content-Type"] = "application/json"
if params:
url = "%s?%s" % (url, urlencode(params))
response = open_url(
url,
method=method,
data=data,
headers=headers,
validate_certs=module_params["validate_certs"],
ca_path=ca_path,
)
response_data = response.read()
except urllib_error.URLError as e:
self.module.fail_json(
msg="Could not connect to consul agent at %s:%s, error was %s"
% (module_params["host"], module_params["port"], str(e))
)
else:
status = (
response.status if hasattr(response, "status") else response.getcode()
)
if 400 <= status < 600:
raise RequestError("%d %s" % (status, response_data))
return json.loads(response_data)
def get(self, url_parts, **kwargs):
return self._request("GET", url_parts, **kwargs)
def put(self, url_parts, **kwargs):
return self._request("PUT", url_parts, **kwargs)
def delete(self, url_parts, **kwargs):
return self._request("DELETE", url_parts, **kwargs)

View file

@ -19,6 +19,7 @@ description:
author: author:
- Håkon Lerring (@Hakon) - Håkon Lerring (@Hakon)
extends_documentation_fragment: extends_documentation_fragment:
- community.general.consul
- community.general.attributes - community.general.attributes
attributes: attributes:
check_mode: check_mode:
@ -29,7 +30,6 @@ options:
state: state:
description: description:
- Whether the policy should be present or absent. - Whether the policy should be present or absent.
required: false
choices: ['present', 'absent'] choices: ['present', 'absent']
default: present default: present
type: str type: str
@ -48,44 +48,12 @@ options:
description: description:
description: description:
- Description of the policy. - Description of the policy.
required: false
type: str type: str
default: '' default: ''
rules: rules:
type: str type: str
description: description:
- Rule document that should be associated with the current policy. - Rule document that should be associated with the current policy.
required: false
host:
description:
- Host of the consul agent, defaults to localhost.
required: false
default: localhost
type: str
port:
type: int
description:
- The port on which the consul agent is running.
required: false
default: 8500
scheme:
description:
- The protocol scheme on which the consul agent is running.
required: false
default: http
type: str
token:
description:
- A management token is required to manipulate the policies.
type: str
validate_certs:
type: bool
description:
- Whether to verify the TLS certificate of the consul agent or not.
required: false
default: true
requirements:
- requests
''' '''
EXAMPLES = """ EXAMPLES = """
@ -135,22 +103,11 @@ operation:
""" """
from ansible.module_utils.basic import AnsibleModule from ansible.module_utils.basic import AnsibleModule
from ansible_collections.community.general.plugins.module_utils.consul import (
_ConsulModule, auth_argument_spec)
try:
from requests.exceptions import ConnectionError
import requests
has_requests = True
except ImportError:
has_requests = False
TOKEN_PARAMETER_NAME = "token"
HOST_PARAMETER_NAME = "host"
SCHEME_PARAMETER_NAME = "scheme"
VALIDATE_CERTS_PARAMETER_NAME = "validate_certs"
NAME_PARAMETER_NAME = "name" NAME_PARAMETER_NAME = "name"
DESCRIPTION_PARAMETER_NAME = "description" DESCRIPTION_PARAMETER_NAME = "description"
PORT_PARAMETER_NAME = "port"
RULES_PARAMETER_NAME = "rules" RULES_PARAMETER_NAME = "rules"
VALID_DATACENTERS_PARAMETER_NAME = "valid_datacenters" VALID_DATACENTERS_PARAMETER_NAME = "valid_datacenters"
STATE_PARAMETER_NAME = "state" STATE_PARAMETER_NAME = "state"
@ -166,50 +123,20 @@ CREATE_OPERATION = "create"
_ARGUMENT_SPEC = { _ARGUMENT_SPEC = {
NAME_PARAMETER_NAME: dict(required=True), NAME_PARAMETER_NAME: dict(required=True),
DESCRIPTION_PARAMETER_NAME: dict(required=False, type='str', default=''), DESCRIPTION_PARAMETER_NAME: dict(required=False, type='str', default=''),
PORT_PARAMETER_NAME: dict(default=8500, type='int'),
RULES_PARAMETER_NAME: dict(type='str'), RULES_PARAMETER_NAME: dict(type='str'),
VALID_DATACENTERS_PARAMETER_NAME: dict(type='list', elements='str', default=[]), VALID_DATACENTERS_PARAMETER_NAME: dict(type='list', elements='str', default=[]),
HOST_PARAMETER_NAME: dict(default='localhost'), STATE_PARAMETER_NAME: dict(default=PRESENT_STATE_VALUE, choices=[PRESENT_STATE_VALUE, ABSENT_STATE_VALUE])
SCHEME_PARAMETER_NAME: dict(default='http'),
TOKEN_PARAMETER_NAME: dict(no_log=True),
VALIDATE_CERTS_PARAMETER_NAME: dict(type='bool', default=True),
STATE_PARAMETER_NAME: dict(default=PRESENT_STATE_VALUE, choices=[PRESENT_STATE_VALUE, ABSENT_STATE_VALUE]),
} }
_ARGUMENT_SPEC.update(auth_argument_spec())
def get_consul_url(configuration): def update_policy(policy, configuration, consul_module):
return '%s://%s:%s/v1' % (configuration.scheme, updated_policy = consul_module.put(('acl', 'policy', policy['ID']), data={
configuration.host, configuration.port)
def get_auth_headers(configuration):
if configuration.token is None:
return {}
else:
return {'X-Consul-Token': configuration.token}
class RequestError(Exception):
pass
def handle_consul_response_error(response):
if 400 <= response.status_code < 600:
raise RequestError('%d %s' % (response.status_code, response.content))
def update_policy(policy, configuration):
url = '%s/acl/policy/%s' % (get_consul_url(configuration), policy['ID'])
headers = get_auth_headers(configuration)
response = requests.put(url, headers=headers, json={
'Name': configuration.name, # should be equal at this point. 'Name': configuration.name, # should be equal at this point.
'Description': configuration.description, 'Description': configuration.description,
'Rules': configuration.rules, 'Rules': configuration.rules,
'Datacenters': configuration.valid_datacenters 'Datacenters': configuration.valid_datacenters
}, verify=configuration.validate_certs) })
handle_consul_response_error(response)
updated_policy = response.json()
changed = ( changed = (
policy.get('Rules', "") != updated_policy.get('Rules', "") or policy.get('Rules', "") != updated_policy.get('Rules', "") or
@ -220,35 +147,24 @@ def update_policy(policy, configuration):
return Output(changed=changed, operation=UPDATE_OPERATION, policy=updated_policy) return Output(changed=changed, operation=UPDATE_OPERATION, policy=updated_policy)
def create_policy(configuration): def create_policy(configuration, consul_module):
url = '%s/acl/policy' % get_consul_url(configuration) created_policy = consul_module.put('acl/policy', data={
headers = get_auth_headers(configuration)
response = requests.put(url, headers=headers, json={
'Name': configuration.name, 'Name': configuration.name,
'Description': configuration.description, 'Description': configuration.description,
'Rules': configuration.rules, 'Rules': configuration.rules,
'Datacenters': configuration.valid_datacenters 'Datacenters': configuration.valid_datacenters
}, verify=configuration.validate_certs) })
handle_consul_response_error(response)
created_policy = response.json()
return Output(changed=True, operation=CREATE_OPERATION, policy=created_policy) return Output(changed=True, operation=CREATE_OPERATION, policy=created_policy)
def remove_policy(configuration): def remove_policy(configuration, consul_module):
policies = get_policies(configuration) policies = get_policies(consul_module)
if configuration.name in policies: if configuration.name in policies:
policy_id = policies[configuration.name]['ID'] policy_id = policies[configuration.name]['ID']
policy = get_policy(policy_id, configuration) policy = get_policy(policy_id, consul_module)
consul_module.delete(('acl', 'policy', policy['ID']))
url = '%s/acl/policy/%s' % (get_consul_url(configuration),
policy['ID'])
headers = get_auth_headers(configuration)
response = requests.delete(url, headers=headers, verify=configuration.validate_certs)
handle_consul_response_error(response)
changed = True changed = True
else: else:
@ -256,38 +172,30 @@ def remove_policy(configuration):
return Output(changed=changed, operation=REMOVE_OPERATION) return Output(changed=changed, operation=REMOVE_OPERATION)
def get_policies(configuration): def get_policies(consul_module):
url = '%s/acl/policies' % get_consul_url(configuration) policies = consul_module.get('acl/policies')
headers = get_auth_headers(configuration)
response = requests.get(url, headers=headers, verify=configuration.validate_certs)
handle_consul_response_error(response)
policies = response.json()
existing_policies_mapped_by_name = dict( existing_policies_mapped_by_name = dict(
(policy['Name'], policy) for policy in policies if policy['Name'] is not None) (policy['Name'], policy) for policy in policies if policy['Name'] is not None)
return existing_policies_mapped_by_name return existing_policies_mapped_by_name
def get_policy(id, configuration): def get_policy(id, consul_module):
url = '%s/acl/policy/%s' % (get_consul_url(configuration), id) return consul_module.get(('acl', 'policy', id))
headers = get_auth_headers(configuration)
response = requests.get(url, headers=headers, verify=configuration.validate_certs)
handle_consul_response_error(response)
return response.json()
def set_policy(configuration): def set_policy(configuration, consul_module):
policies = get_policies(configuration) policies = get_policies(consul_module)
if configuration.name in policies: if configuration.name in policies:
index_policy_object = policies[configuration.name] index_policy_object = policies[configuration.name]
policy_id = policies[configuration.name]['ID'] policy_id = policies[configuration.name]['ID']
rest_policy_object = get_policy(policy_id, configuration) rest_policy_object = get_policy(policy_id, consul_module)
# merge dicts as some keys are only available in the partial policy # merge dicts as some keys are only available in the partial policy
policy = index_policy_object.copy() policy = index_policy_object.copy()
policy.update(rest_policy_object) policy.update(rest_policy_object)
return update_policy(policy, configuration) return update_policy(policy, configuration, consul_module)
else: else:
return create_policy(configuration) return create_policy(configuration, consul_module)
class Configuration: class Configuration:
@ -295,15 +203,9 @@ class Configuration:
Configuration for this module. Configuration for this module.
""" """
def __init__(self, token=None, host=None, scheme=None, validate_certs=None, name=None, description=None, port=None, def __init__(self, name=None, description=None, rules=None, valid_datacenters=None, state=None):
rules=None, valid_datacenters=None, state=None):
self.token = token # type: str
self.host = host # type: str
self.scheme = scheme # type: str
self.validate_certs = validate_certs # type: bool
self.name = name # type: str self.name = name # type: str
self.description = description # type: str self.description = description # type: str
self.port = port # type: int
self.rules = rules # type: str self.rules = rules # type: str
self.valid_datacenters = valid_datacenters # type: str self.valid_datacenters = valid_datacenters # type: str
self.state = state # type: str self.state = state # type: str
@ -320,50 +222,25 @@ class Output:
self.policy = policy # type: dict self.policy = policy # type: dict
def check_dependencies():
"""
Checks that the required dependencies have been imported.
:exception ImportError: if it is detected that any of the required dependencies have not been imported
"""
if not has_requests:
raise ImportError(
"requests required for this module. See https://pypi.org/project/requests/")
def main(): def main():
""" """
Main method. Main method.
""" """
module = AnsibleModule(_ARGUMENT_SPEC, supports_check_mode=False) module = AnsibleModule(_ARGUMENT_SPEC, supports_check_mode=False)
consul_module = _ConsulModule(module)
try:
check_dependencies()
except ImportError as e:
module.fail_json(msg=str(e))
configuration = Configuration( configuration = Configuration(
token=module.params.get(TOKEN_PARAMETER_NAME),
host=module.params.get(HOST_PARAMETER_NAME),
scheme=module.params.get(SCHEME_PARAMETER_NAME),
validate_certs=module.params.get(VALIDATE_CERTS_PARAMETER_NAME),
name=module.params.get(NAME_PARAMETER_NAME), name=module.params.get(NAME_PARAMETER_NAME),
description=module.params.get(DESCRIPTION_PARAMETER_NAME), description=module.params.get(DESCRIPTION_PARAMETER_NAME),
port=module.params.get(PORT_PARAMETER_NAME),
rules=module.params.get(RULES_PARAMETER_NAME), rules=module.params.get(RULES_PARAMETER_NAME),
valid_datacenters=module.params.get(VALID_DATACENTERS_PARAMETER_NAME), valid_datacenters=module.params.get(VALID_DATACENTERS_PARAMETER_NAME),
state=module.params.get(STATE_PARAMETER_NAME), state=module.params.get(STATE_PARAMETER_NAME),
) )
try: if configuration.state == PRESENT_STATE_VALUE:
if configuration.state == PRESENT_STATE_VALUE: output = set_policy(configuration, consul_module)
output = set_policy(configuration) else:
else: output = remove_policy(configuration, consul_module)
output = remove_policy(configuration)
except ConnectionError as e:
module.fail_json(msg='Could not connect to consul agent at %s:%s, error was %s' % (
configuration.host, configuration.port, str(e)))
raise
return_values = dict(changed=output.changed, operation=output.operation, policy=output.policy) return_values = dict(changed=output.changed, operation=output.operation, policy=output.policy)
module.exit_json(**return_values) module.exit_json(**return_values)

View file

@ -19,6 +19,7 @@ description:
author: author:
- Håkon Lerring (@Hakon) - Håkon Lerring (@Hakon)
extends_documentation_fragment: extends_documentation_fragment:
- community.general.consul
- community.general.attributes - community.general.attributes
attributes: attributes:
check_mode: check_mode:
@ -34,7 +35,6 @@ options:
state: state:
description: description:
- whether the role should be present or absent. - whether the role should be present or absent.
required: false
choices: ['present', 'absent'] choices: ['present', 'absent']
default: present default: present
type: str type: str
@ -42,7 +42,6 @@ options:
description: description:
- Description of the role. - Description of the role.
- If not specified, the assigned description will not be changed. - If not specified, the assigned description will not be changed.
required: false
type: str type: str
policies: policies:
type: list type: list
@ -51,7 +50,6 @@ options:
- List of policies to attach to the role. Each policy is a dict. - List of policies to attach to the role. Each policy is a dict.
- If the parameter is left blank, any policies currently assigned will not be changed. - If the parameter is left blank, any policies currently assigned will not be changed.
- Any empty array (V([])) will clear any policies previously set. - Any empty array (V([])) will clear any policies previously set.
required: false
suboptions: suboptions:
name: name:
description: description:
@ -70,7 +68,6 @@ options:
- List of service identities to attach to the role. - List of service identities to attach to the role.
- If not specified, any service identities currently assigned will not be changed. - If not specified, any service identities currently assigned will not be changed.
- If the parameter is an empty array (V([])), any node identities assigned will be unassigned. - If the parameter is an empty array (V([])), any node identities assigned will be unassigned.
required: false
suboptions: suboptions:
name: name:
description: description:
@ -95,7 +92,6 @@ options:
- List of node identities to attach to the role. - List of node identities to attach to the role.
- If not specified, any node identities currently assigned will not be changed. - If not specified, any node identities currently assigned will not be changed.
- If the parameter is an empty array (V([])), any node identities assigned will be unassigned. - If the parameter is an empty array (V([])), any node identities assigned will be unassigned.
required: false
suboptions: suboptions:
name: name:
description: description:
@ -110,36 +106,6 @@ options:
- This will result in effective policy only being valid in this datacenter. - This will result in effective policy only being valid in this datacenter.
type: str type: str
required: true required: true
host:
description:
- Host of the consul agent, defaults to V(localhost).
required: false
default: localhost
type: str
port:
type: int
description:
- The port on which the consul agent is running.
required: false
default: 8500
scheme:
description:
- The protocol scheme on which the consul agent is running.
required: false
default: http
type: str
token:
description:
- A management token is required to manipulate the roles.
type: str
validate_certs:
type: bool
description:
- Whether to verify the TLS certificate of the consul agent.
required: false
default: true
requirements:
- requests
''' '''
EXAMPLES = """ EXAMPLES = """
@ -204,28 +170,11 @@ operation:
""" """
from ansible.module_utils.basic import AnsibleModule from ansible.module_utils.basic import AnsibleModule
from ansible.module_utils.basic import missing_required_lib
from ansible_collections.community.general.plugins.module_utils.consul import ( from ansible_collections.community.general.plugins.module_utils.consul import (
get_consul_url, get_auth_headers, handle_consul_response_error) _ConsulModule, auth_argument_spec)
import traceback
REQUESTS_IMP_ERR = None
try:
from requests.exceptions import ConnectionError
import requests
HAS_REQUESTS = True
except ImportError:
HAS_REQUESTS = False
REQUESTS_IMP_ERR = traceback.format_exc()
TOKEN_PARAMETER_NAME = "token"
HOST_PARAMETER_NAME = "host"
SCHEME_PARAMETER_NAME = "scheme"
VALIDATE_CERTS_PARAMETER_NAME = "validate_certs"
NAME_PARAMETER_NAME = "name" NAME_PARAMETER_NAME = "name"
DESCRIPTION_PARAMETER_NAME = "description" DESCRIPTION_PARAMETER_NAME = "description"
PORT_PARAMETER_NAME = "port"
POLICIES_PARAMETER_NAME = "policies" POLICIES_PARAMETER_NAME = "policies"
SERVICE_IDENTITIES_PARAMETER_NAME = "service_identities" SERVICE_IDENTITIES_PARAMETER_NAME = "service_identities"
NODE_IDENTITIES_PARAMETER_NAME = "node_identities" NODE_IDENTITIES_PARAMETER_NAME = "node_identities"
@ -254,19 +203,15 @@ SERVICE_ID_RULE_SPEC = dict(
) )
_ARGUMENT_SPEC = { _ARGUMENT_SPEC = {
TOKEN_PARAMETER_NAME: dict(no_log=True),
PORT_PARAMETER_NAME: dict(default=8500, type='int'),
HOST_PARAMETER_NAME: dict(default='localhost'),
SCHEME_PARAMETER_NAME: dict(default='http'),
VALIDATE_CERTS_PARAMETER_NAME: dict(type='bool', default=True),
NAME_PARAMETER_NAME: dict(required=True), NAME_PARAMETER_NAME: dict(required=True),
DESCRIPTION_PARAMETER_NAME: dict(required=False, type='str', default=None), DESCRIPTION_PARAMETER_NAME: dict(required=False, type='str', default=None),
POLICIES_PARAMETER_NAME: dict(type='list', elements='dict', options=POLICY_RULE_SPEC, POLICIES_PARAMETER_NAME: dict(type='list', elements='dict', options=POLICY_RULE_SPEC,
mutually_exclusive=[('name', 'id')], required_one_of=[('name', 'id')], default=None), mutually_exclusive=[('name', 'id')], required_one_of=[('name', 'id')], default=None),
SERVICE_IDENTITIES_PARAMETER_NAME: dict(type='list', elements='dict', options=SERVICE_ID_RULE_SPEC, default=None), SERVICE_IDENTITIES_PARAMETER_NAME: dict(type='list', elements='dict', options=SERVICE_ID_RULE_SPEC, default=None),
NODE_IDENTITIES_PARAMETER_NAME: dict(type='list', elements='dict', options=NODE_ID_RULE_SPEC, default=None), NODE_IDENTITIES_PARAMETER_NAME: dict(type='list', elements='dict', options=NODE_ID_RULE_SPEC, default=None),
STATE_PARAMETER_NAME: dict(default=PRESENT_STATE_VALUE, choices=[PRESENT_STATE_VALUE, ABSENT_STATE_VALUE]), STATE_PARAMETER_NAME: dict(default=PRESENT_STATE_VALUE, choices=[PRESENT_STATE_VALUE, ABSENT_STATE_VALUE])
} }
_ARGUMENT_SPEC.update(auth_argument_spec())
def compare_consul_api_role_policy_objects(first, second): def compare_consul_api_role_policy_objects(first, second):
@ -280,11 +225,7 @@ def compare_consul_api_role_policy_objects(first, second):
return first == second return first == second
def update_role(role, configuration): def update_role(role, configuration, consul_module):
url = '%s/acl/role/%s' % (get_consul_url(configuration),
role['ID'])
headers = get_auth_headers(configuration)
update_role_data = { update_role_data = {
'Name': configuration.name, 'Name': configuration.name,
'Description': configuration.description, 'Description': configuration.description,
@ -370,10 +311,7 @@ def update_role(role, configuration):
if not node_id_specified and role.get('NodeIdentities') is not None: if not node_id_specified and role.get('NodeIdentities') is not None:
update_role_data["NodeIdentities"] = role.get('NodeIdentities') update_role_data["NodeIdentities"] = role.get('NodeIdentities')
response = requests.put(url, headers=headers, json=update_role_data, verify=configuration.validate_certs) resulting_role = consul_module.put(('acl', 'role', role['ID']), data=update_role_data)
handle_consul_response_error(response)
resulting_role = response.json()
changed = ( changed = (
role['Description'] != resulting_role['Description'] or role['Description'] != resulting_role['Description'] or
role.get('Policies', None) != resulting_role.get('Policies', None) or role.get('Policies', None) != resulting_role.get('Policies', None) or
@ -384,10 +322,7 @@ def update_role(role, configuration):
return Output(changed=changed, operation=UPDATE_OPERATION, role=resulting_role) return Output(changed=changed, operation=UPDATE_OPERATION, role=resulting_role)
def create_role(configuration): def create_role(configuration, consul_module):
url = '%s/acl/role' % get_consul_url(configuration)
headers = get_auth_headers(configuration)
# check if the user omitted policies, service identities, or node identities # check if the user omitted policies, service identities, or node identities
policy_specified = True policy_specified = True
if len(configuration.policies) == 1 and configuration.policies[0] is None: if len(configuration.policies) == 1 and configuration.policies[0] is None:
@ -423,28 +358,21 @@ def create_role(configuration):
create_role_data["NodeIdentities"] = [x.to_dict() for x in configuration.node_identities] create_role_data["NodeIdentities"] = [x.to_dict() for x in configuration.node_identities]
if not configuration.check_mode: if not configuration.check_mode:
response = requests.put(url, headers=headers, json=create_role_data, verify=configuration.validate_certs) resulting_role = consul_module.put('acl/role', data=create_role_data)
handle_consul_response_error(response)
resulting_role = response.json()
return Output(changed=True, operation=CREATE_OPERATION, role=resulting_role) return Output(changed=True, operation=CREATE_OPERATION, role=resulting_role)
else: else:
return Output(changed=True, operation=CREATE_OPERATION) return Output(changed=True, operation=CREATE_OPERATION)
def remove_role(configuration): def remove_role(configuration, consul_module):
roles = get_roles(configuration) roles = get_roles(consul_module)
if configuration.name in roles: if configuration.name in roles:
role_id = roles[configuration.name]['ID'] role_id = roles[configuration.name]['ID']
if not configuration.check_mode: if not configuration.check_mode:
url = '%s/acl/role/%s' % (get_consul_url(configuration), role_id) consul_module.delete(('acl', 'role', role_id))
headers = get_auth_headers(configuration)
response = requests.delete(url, headers=headers, verify=configuration.validate_certs)
handle_consul_response_error(response)
changed = True changed = True
else: else:
@ -452,33 +380,25 @@ def remove_role(configuration):
return Output(changed=changed, operation=REMOVE_OPERATION) return Output(changed=changed, operation=REMOVE_OPERATION)
def get_roles(configuration): def get_roles(consul_module):
url = '%s/acl/roles' % get_consul_url(configuration) roles = consul_module.get('acl/roles')
headers = get_auth_headers(configuration)
response = requests.get(url, headers=headers, verify=configuration.validate_certs)
handle_consul_response_error(response)
roles = response.json()
existing_roles_mapped_by_id = dict((role['Name'], role) for role in roles if role['Name'] is not None) existing_roles_mapped_by_id = dict((role['Name'], role) for role in roles if role['Name'] is not None)
return existing_roles_mapped_by_id return existing_roles_mapped_by_id
def get_consul_version(configuration): def get_consul_version(consul_module):
url = '%s/agent/self' % get_consul_url(configuration) config = consul_module.get('agent/self')["Config"]
headers = get_auth_headers(configuration)
response = requests.get(url, headers=headers, verify=configuration.validate_certs)
handle_consul_response_error(response)
config = response.json()["Config"]
return ConsulVersion(config["Version"]) return ConsulVersion(config["Version"])
def set_role(configuration): def set_role(configuration, consul_module):
roles = get_roles(configuration) roles = get_roles(consul_module)
if configuration.name in roles: if configuration.name in roles:
role = roles[configuration.name] role = roles[configuration.name]
return update_role(role, configuration) return update_role(role, configuration, consul_module)
else: else:
return create_role(configuration) return create_role(configuration, consul_module)
class ConsulVersion: class ConsulVersion:
@ -556,13 +476,8 @@ class Configuration:
Configuration for this module. Configuration for this module.
""" """
def __init__(self, token=None, host=None, scheme=None, validate_certs=None, name=None, description=None, port=None, def __init__(self, name=None, description=None, policies=None, service_identities=None,
policies=None, service_identities=None, node_identities=None, state=None, check_mode=None): node_identities=None, state=None, check_mode=None):
self.token = token # type: str
self.host = host # type: str
self.port = port # type: int
self.scheme = scheme # type: str
self.validate_certs = validate_certs # type: bool
self.name = name # type: str self.name = name # type: str
self.description = description # type: str self.description = description # type: str
if policies is not None: if policies is not None:
@ -597,44 +512,29 @@ def main():
Main method. Main method.
""" """
module = AnsibleModule(_ARGUMENT_SPEC, supports_check_mode=True) module = AnsibleModule(_ARGUMENT_SPEC, supports_check_mode=True)
consul_module = _ConsulModule(module)
if not HAS_REQUESTS:
module.fail_json(msg=missing_required_lib("requests"),
exception=REQUESTS_IMP_ERR)
try: try:
configuration = Configuration( configuration = Configuration(
token=module.params.get(TOKEN_PARAMETER_NAME),
host=module.params.get(HOST_PARAMETER_NAME),
port=module.params.get(PORT_PARAMETER_NAME),
scheme=module.params.get(SCHEME_PARAMETER_NAME),
validate_certs=module.params.get(VALIDATE_CERTS_PARAMETER_NAME),
name=module.params.get(NAME_PARAMETER_NAME), name=module.params.get(NAME_PARAMETER_NAME),
description=module.params.get(DESCRIPTION_PARAMETER_NAME), description=module.params.get(DESCRIPTION_PARAMETER_NAME),
policies=module.params.get(POLICIES_PARAMETER_NAME), policies=module.params.get(POLICIES_PARAMETER_NAME),
service_identities=module.params.get(SERVICE_IDENTITIES_PARAMETER_NAME), service_identities=module.params.get(SERVICE_IDENTITIES_PARAMETER_NAME),
node_identities=module.params.get(NODE_IDENTITIES_PARAMETER_NAME), node_identities=module.params.get(NODE_IDENTITIES_PARAMETER_NAME),
state=module.params.get(STATE_PARAMETER_NAME), state=module.params.get(STATE_PARAMETER_NAME),
check_mode=module.check_mode check_mode=module.check_mode,
) )
except ValueError as err: except ValueError as err:
module.fail_json(msg='Configuration error: %s' % str(err)) module.fail_json(msg='Configuration error: %s' % str(err))
return return
try: version = get_consul_version(consul_module)
configuration.version = version
version = get_consul_version(configuration) if configuration.state == PRESENT_STATE_VALUE:
configuration.version = version output = set_role(configuration, consul_module)
else:
if configuration.state == PRESENT_STATE_VALUE: output = remove_role(configuration, consul_module)
output = set_role(configuration)
else:
output = remove_role(configuration)
except ConnectionError as e:
module.fail_json(msg='Could not connect to consul agent at %s:%s, error was %s' % (
configuration.host, configuration.port, str(e)))
raise
return_values = dict(changed=output.changed, operation=output.operation, role=output.role) return_values = dict(changed=output.changed, operation=output.operation, role=output.role)
module.exit_json(**return_values) module.exit_json(**return_values)

View file

@ -16,12 +16,11 @@ description:
cluster. These sessions can then be used in conjunction with key value pairs cluster. These sessions can then be used in conjunction with key value pairs
to implement distributed locks. In depth documentation for working with to implement distributed locks. In depth documentation for working with
sessions can be found at http://www.consul.io/docs/internals/sessions.html sessions can be found at http://www.consul.io/docs/internals/sessions.html
requirements:
- requests
author: author:
- Steve Gargan (@sgargan) - Steve Gargan (@sgargan)
- Håkon Lerring (@Hakon) - Håkon Lerring (@Hakon)
extends_documentation_fragment: extends_documentation_fragment:
- community.general.consul
- community.general.attributes - community.general.attributes
attributes: attributes:
check_mode: check_mode:
@ -76,26 +75,6 @@ options:
the associated lock delay has expired. the associated lock delay has expired.
type: list type: list
elements: str elements: str
host:
description:
- The host of the consul agent defaults to localhost.
type: str
default: localhost
port:
description:
- The port on which the consul agent is running.
type: int
default: 8500
scheme:
description:
- The protocol scheme on which the consul agent is running.
type: str
default: http
validate_certs:
description:
- Whether to verify the TLS certificate of the consul agent.
type: bool
default: true
behavior: behavior:
description: description:
- The optional behavior that can be attached to the session when it - The optional behavior that can be attached to the session when it
@ -109,10 +88,6 @@ options:
type: int type: int
version_added: 5.4.0 version_added: 5.4.0
token: token:
description:
- The token key identifying an ACL rule set that controls access to
the key value pair.
type: str
version_added: 5.6.0 version_added: 5.6.0
''' '''
@ -148,95 +123,49 @@ EXAMPLES = '''
''' '''
from ansible.module_utils.basic import AnsibleModule from ansible.module_utils.basic import AnsibleModule
from ansible_collections.community.general.plugins.module_utils.consul import (
try: auth_argument_spec, _ConsulModule
import requests )
from requests.exceptions import ConnectionError
has_requests = True
except ImportError:
has_requests = False
def execute(module): def execute(module, consul_module):
state = module.params.get('state') state = module.params.get('state')
if state in ['info', 'list', 'node']: if state in ['info', 'list', 'node']:
lookup_sessions(module) lookup_sessions(module, consul_module)
elif state == 'present': elif state == 'present':
update_session(module) update_session(module, consul_module)
else: else:
remove_session(module) remove_session(module, consul_module)
class RequestError(Exception): def list_sessions(consul_module, datacenter):
pass return consul_module.get(
'session/list',
params={'dc': datacenter})
def handle_consul_response_error(response): def list_sessions_for_node(consul_module, node, datacenter):
if 400 <= response.status_code < 600: return consul_module.get(
raise RequestError('%d %s' % (response.status_code, response.content)) ('session', 'node', node),
params={'dc': datacenter})
def get_consul_url(module): def get_session_info(consul_module, session_id, datacenter):
return '%s://%s:%s/v1' % (module.params.get('scheme'), return consul_module.get(
module.params.get('host'), module.params.get('port')) ('session', 'info', session_id),
params={'dc': datacenter})
def get_auth_headers(module): def lookup_sessions(module, consul_module):
if 'token' in module.params and module.params.get('token') is not None:
return {'X-Consul-Token': module.params.get('token')}
else:
return {}
def list_sessions(module, datacenter):
url = '%s/session/list' % get_consul_url(module)
headers = get_auth_headers(module)
response = requests.get(
url,
headers=headers,
params={
'dc': datacenter},
verify=module.params.get('validate_certs'))
handle_consul_response_error(response)
return response.json()
def list_sessions_for_node(module, node, datacenter):
url = '%s/session/node/%s' % (get_consul_url(module), node)
headers = get_auth_headers(module)
response = requests.get(
url,
headers=headers,
params={
'dc': datacenter},
verify=module.params.get('validate_certs'))
handle_consul_response_error(response)
return response.json()
def get_session_info(module, session_id, datacenter):
url = '%s/session/info/%s' % (get_consul_url(module), session_id)
headers = get_auth_headers(module)
response = requests.get(
url,
headers=headers,
params={
'dc': datacenter},
verify=module.params.get('validate_certs'))
handle_consul_response_error(response)
return response.json()
def lookup_sessions(module):
datacenter = module.params.get('datacenter') datacenter = module.params.get('datacenter')
state = module.params.get('state') state = module.params.get('state')
try: try:
if state == 'list': if state == 'list':
sessions_list = list_sessions(module, datacenter) sessions_list = list_sessions(consul_module, datacenter)
# Ditch the index, this can be grabbed from the results # Ditch the index, this can be grabbed from the results
if sessions_list and len(sessions_list) >= 2: if sessions_list and len(sessions_list) >= 2:
sessions_list = sessions_list[1] sessions_list = sessions_list[1]
@ -244,14 +173,14 @@ def lookup_sessions(module):
sessions=sessions_list) sessions=sessions_list)
elif state == 'node': elif state == 'node':
node = module.params.get('node') node = module.params.get('node')
sessions = list_sessions_for_node(module, node, datacenter) sessions = list_sessions_for_node(consul_module, node, datacenter)
module.exit_json(changed=True, module.exit_json(changed=True,
node=node, node=node,
sessions=sessions) sessions=sessions)
elif state == 'info': elif state == 'info':
session_id = module.params.get('id') session_id = module.params.get('id')
session_by_id = get_session_info(module, session_id, datacenter) session_by_id = get_session_info(consul_module, session_id, datacenter)
module.exit_json(changed=True, module.exit_json(changed=True,
session_id=session_id, session_id=session_id,
sessions=session_by_id) sessions=session_by_id)
@ -260,10 +189,8 @@ def lookup_sessions(module):
module.fail_json(msg="Could not retrieve session info %s" % e) module.fail_json(msg="Could not retrieve session info %s" % e)
def create_session(module, name, behavior, ttl, node, def create_session(consul_module, name, behavior, ttl, node,
lock_delay, datacenter, checks): lock_delay, datacenter, checks):
url = '%s/session/create' % get_consul_url(module)
headers = get_auth_headers(module)
create_data = { create_data = {
"LockDelay": lock_delay, "LockDelay": lock_delay,
"Node": node, "Node": node,
@ -273,19 +200,15 @@ def create_session(module, name, behavior, ttl, node,
} }
if ttl is not None: if ttl is not None:
create_data["TTL"] = "%ss" % str(ttl) # TTL is in seconds create_data["TTL"] = "%ss" % str(ttl) # TTL is in seconds
response = requests.put( create_session_response_dict = consul_module.put(
url, 'session/create',
headers=headers,
params={ params={
'dc': datacenter}, 'dc': datacenter},
json=create_data, data=create_data)
verify=module.params.get('validate_certs'))
handle_consul_response_error(response)
create_session_response_dict = response.json()
return create_session_response_dict["ID"] return create_session_response_dict["ID"]
def update_session(module): def update_session(module, consul_module):
name = module.params.get('name') name = module.params.get('name')
delay = module.params.get('delay') delay = module.params.get('delay')
@ -296,7 +219,7 @@ def update_session(module):
ttl = module.params.get('ttl') ttl = module.params.get('ttl')
try: try:
session = create_session(module, session = create_session(consul_module,
name=name, name=name,
behavior=behavior, behavior=behavior,
ttl=ttl, ttl=ttl,
@ -317,22 +240,15 @@ def update_session(module):
module.fail_json(msg="Could not create/update session %s" % e) module.fail_json(msg="Could not create/update session %s" % e)
def destroy_session(module, session_id): def destroy_session(consul_module, session_id):
url = '%s/session/destroy/%s' % (get_consul_url(module), session_id) return consul_module.put(('session', 'destroy', session_id))
headers = get_auth_headers(module)
response = requests.put(
url,
headers=headers,
verify=module.params.get('validate_certs'))
handle_consul_response_error(response)
return response.content == "true"
def remove_session(module): def remove_session(module, consul_module):
session_id = module.params.get('id') session_id = module.params.get('id')
try: try:
destroy_session(module, session_id) destroy_session(consul_module, session_id)
module.exit_json(changed=True, module.exit_json(changed=True,
session_id=session_id) session_id=session_id)
@ -341,12 +257,6 @@ def remove_session(module):
session_id, e)) session_id, e))
def test_dependencies(module):
if not has_requests:
raise ImportError(
"requests required for this module. See https://pypi.org/project/requests/")
def main(): def main():
argument_spec = dict( argument_spec = dict(
checks=dict(type='list', elements='str'), checks=dict(type='list', elements='str'),
@ -358,10 +268,6 @@ def main():
'release', 'release',
'delete']), 'delete']),
ttl=dict(type='int'), ttl=dict(type='int'),
host=dict(type='str', default='localhost'),
port=dict(type='int', default=8500),
scheme=dict(type='str', default='http'),
validate_certs=dict(type='bool', default=True),
id=dict(type='str'), id=dict(type='str'),
name=dict(type='str'), name=dict(type='str'),
node=dict(type='str'), node=dict(type='str'),
@ -375,7 +281,7 @@ def main():
'node', 'node',
'present']), 'present']),
datacenter=dict(type='str'), datacenter=dict(type='str'),
token=dict(type='str', no_log=True), **auth_argument_spec()
) )
module = AnsibleModule( module = AnsibleModule(
@ -387,14 +293,10 @@ def main():
], ],
supports_check_mode=False supports_check_mode=False
) )
consul_module = _ConsulModule(module)
test_dependencies(module)
try: try:
execute(module) execute(module, consul_module)
except ConnectionError as e:
module.fail_json(msg='Could not connect to consul agent at %s:%s, error was %s' % (
module.params.get('host'), module.params.get('port'), e))
except Exception as e: except Exception as e:
module.fail_json(msg=str(e)) module.fail_json(msg=str(e))

View file

@ -0,0 +1,76 @@
---
# Copyright (c) Ansible Project
# GNU General Public License v3.0+ (see LICENSES/GPL-3.0-or-later.txt or https://www.gnu.org/licenses/gpl-3.0.txt)
# SPDX-License-Identifier: GPL-3.0-or-later
- name: ensure unknown scheme fails
consul_session:
state: info
id: dummy
scheme: non_existent
token: "{{ consul_management_token }}"
register: result
ignore_errors: true
- assert:
that:
- result is failed
- name: ensure SSL certificate is checked
consul_session:
state: info
id: dummy
port: 8501
scheme: https
token: "{{ consul_management_token }}"
register: result
ignore_errors: true
- name: previous task should fail since certificate is not known
assert:
that:
- result is failed
- "'certificate verify failed' in result.msg"
- name: ensure SSL certificate isn't checked when validate_certs is disabled
consul_session:
state: info
id: dummy
port: 8501
scheme: https
token: "{{ consul_management_token }}"
validate_certs: false
register: result
- name: previous task should succeed since certificate isn't checked
assert:
that:
- result is changed
- name: ensure a secure connection is possible
consul_session:
state: info
id: dummy
port: 8501
scheme: https
token: "{{ consul_management_token }}"
ca_path: '{{ remote_dir }}/cert.pem'
register: result
- assert:
that:
- result is changed
- name: ensure connection errors are handled properly
consul_session:
state: info
id: dummy
token: "{{ consul_management_token }}"
port: 1234
register: result
ignore_errors: true
- assert:
that:
- result is failed
- result.msg.startswith('Could not connect to consul agent at localhost:1234, error was')

View file

@ -0,0 +1,57 @@
---
# Copyright (c) 2024, Florian Apolloner (@apollo13)
# GNU General Public License v3.0+ (see LICENSES/GPL-3.0-or-later.txt or https://www.gnu.org/licenses/gpl-3.0.txt)
# SPDX-License-Identifier: GPL-3.0-or-later
- name: Create a key
consul_kv:
key: somekey
value: somevalue
token: "{{ consul_management_token }}"
register: result
- assert:
that:
- result is changed
- result.data.Value == 'somevalue'
#- name: Test the lookup
# assert:
# that:
# - lookup('community.general.consul_kv', 'somekey', token=consul_management_token) == 'somevalue'
- name: Update a key with the same data
consul_kv:
key: somekey
value: somevalue
token: "{{ consul_management_token }}"
register: result
- assert:
that:
- result is not changed
- result.data.Value == 'somevalue'
- name: Remove a key from the store
consul_kv:
key: somekey
state: absent
token: "{{ consul_management_token }}"
register: result
- assert:
that:
- result is changed
- result.data.Value == 'somevalue'
- name: Remove a non-existant key from the store
consul_kv:
key: somekey
state: absent
token: "{{ consul_management_token }}"
register: result
- assert:
that:
- result is not changed
- not result.data

View file

@ -80,65 +80,6 @@
that: that:
- result is failed - result is failed
- name: ensure unknown scheme fails
consul_session:
state: info
id: '{{ session_id }}'
scheme: non_existent
token: "{{ consul_management_token }}"
register: result
ignore_errors: true
- assert:
that:
- result is failed
- name: ensure SSL certificate is checked
consul_session:
state: info
id: '{{ session_id }}'
port: 8501
scheme: https
token: "{{ consul_management_token }}"
register: result
ignore_errors: true
- name: previous task should fail since certificate is not known
assert:
that:
- result is failed
- "'certificate verify failed' in result.msg"
- name: ensure SSL certificate isn't checked when validate_certs is disabled
consul_session:
state: info
id: '{{ session_id }}'
port: 8501
scheme: https
token: "{{ consul_management_token }}"
validate_certs: false
register: result
- name: previous task should succeed since certificate isn't checked
assert:
that:
- result is changed
- name: ensure a secure connection is possible
consul_session:
state: info
id: '{{ session_id }}'
port: 8501
scheme: https
token: "{{ consul_management_token }}"
environment:
REQUESTS_CA_BUNDLE: '{{ remote_dir }}/cert.pem'
register: result
- assert:
that:
- result is changed
- name: delete a session - name: delete a session
consul_session: consul_session:
state: absent state: absent

View file

@ -89,6 +89,8 @@
- 1 - 1
- 2 - 2
- 3 - 3
- import_tasks: consul_general.yml
- import_tasks: consul_kv.yml
- import_tasks: consul_session.yml - import_tasks: consul_session.yml
- import_tasks: consul_policy.yml - import_tasks: consul_policy.yml
- import_tasks: consul_role.yml - import_tasks: consul_role.yml