mirror of
https://github.com/ansible-collections/community.general.git
synced 2024-09-14 20:13:21 +02:00
tss lookup plugin - Fetch secret by path (#6881)
* Added support to fetch secret by path * Fixed linting issue * Fixed PR comments * Chnaged description of secret path
This commit is contained in:
parent
4b382ed1df
commit
3e56da5371
2 changed files with 58 additions and 18 deletions
2
changelogs/fragments/get-secret-by-path.yml
Normal file
2
changelogs/fragments/get-secret-by-path.yml
Normal file
|
@ -0,0 +1,2 @@
|
||||||
|
minor_changes:
|
||||||
|
- tss lookup plugin - allow to fetch secret by path. Previously, we could not fetch secret by path but now use ``secret_path`` option to indicate to fetch secret by secret path (https://github.com/ansible-collections/community.general/pull/6881).
|
|
@ -26,6 +26,11 @@ options:
|
||||||
description: The integer ID of the secret.
|
description: The integer ID of the secret.
|
||||||
required: true
|
required: true
|
||||||
type: int
|
type: int
|
||||||
|
secret_path:
|
||||||
|
description: Indicate a full path of secret including folder and secret name when the secret ID is set to 0.
|
||||||
|
required: false
|
||||||
|
type: str
|
||||||
|
version_added: 7.2.0
|
||||||
fetch_secret_ids_from_folder:
|
fetch_secret_ids_from_folder:
|
||||||
description:
|
description:
|
||||||
- Boolean flag which indicates whether secret ids are in a folder is fetched by folder ID or not.
|
- Boolean flag which indicates whether secret ids are in a folder is fetched by folder ID or not.
|
||||||
|
@ -221,6 +226,29 @@ EXAMPLES = r"""
|
||||||
the secret id's are {{
|
the secret id's are {{
|
||||||
secret
|
secret
|
||||||
}}
|
}}
|
||||||
|
|
||||||
|
# If secret ID is 0 and secret_path has value then secret is fetched by secret path
|
||||||
|
- hosts: localhost
|
||||||
|
vars:
|
||||||
|
secret: >-
|
||||||
|
{{
|
||||||
|
lookup(
|
||||||
|
'community.general.tss',
|
||||||
|
0,
|
||||||
|
secret_path='\folderName\secretName'
|
||||||
|
base_url='https://secretserver.domain.com/SecretServer/',
|
||||||
|
username='user.name',
|
||||||
|
password='password'
|
||||||
|
)
|
||||||
|
}}
|
||||||
|
tasks:
|
||||||
|
- ansible.builtin.debug:
|
||||||
|
msg: >
|
||||||
|
the password is {{
|
||||||
|
(secret['items']
|
||||||
|
| items2dict(key_name='slug',
|
||||||
|
value_name='itemValue'))['password']
|
||||||
|
}}
|
||||||
"""
|
"""
|
||||||
|
|
||||||
import abc
|
import abc
|
||||||
|
@ -231,32 +259,23 @@ from ansible.plugins.lookup import LookupBase
|
||||||
from ansible.utils.display import Display
|
from ansible.utils.display import Display
|
||||||
|
|
||||||
try:
|
try:
|
||||||
from delinea.secrets.server import SecretServer, SecretServerError
|
from delinea.secrets.server import SecretServer, SecretServerError, PasswordGrantAuthorizer, DomainPasswordGrantAuthorizer, AccessTokenAuthorizer
|
||||||
|
|
||||||
HAS_TSS_SDK = True
|
HAS_TSS_SDK = True
|
||||||
HAS_DELINEA_SS_SDK = True
|
HAS_DELINEA_SS_SDK = True
|
||||||
|
HAS_TSS_AUTHORIZER = True
|
||||||
except ImportError:
|
except ImportError:
|
||||||
try:
|
try:
|
||||||
from thycotic.secrets.server import SecretServer, SecretServerError
|
from thycotic.secrets.server import SecretServer, SecretServerError, PasswordGrantAuthorizer, DomainPasswordGrantAuthorizer, AccessTokenAuthorizer
|
||||||
|
|
||||||
HAS_TSS_SDK = True
|
HAS_TSS_SDK = True
|
||||||
HAS_DELINEA_SS_SDK = False
|
HAS_DELINEA_SS_SDK = False
|
||||||
|
HAS_TSS_AUTHORIZER = True
|
||||||
except ImportError:
|
except ImportError:
|
||||||
SecretServer = None
|
SecretServer = None
|
||||||
SecretServerError = None
|
SecretServerError = None
|
||||||
HAS_TSS_SDK = False
|
HAS_TSS_SDK = False
|
||||||
HAS_DELINEA_SS_SDK = False
|
HAS_DELINEA_SS_SDK = False
|
||||||
|
|
||||||
try:
|
|
||||||
from thycotic.secrets.server import PasswordGrantAuthorizer, DomainPasswordGrantAuthorizer, AccessTokenAuthorizer
|
|
||||||
|
|
||||||
HAS_TSS_AUTHORIZER = True
|
|
||||||
except ImportError:
|
|
||||||
try:
|
|
||||||
from delinea.secrets.server import PasswordGrantAuthorizer, DomainPasswordGrantAuthorizer, AccessTokenAuthorizer
|
|
||||||
|
|
||||||
HAS_TSS_AUTHORIZER = True
|
|
||||||
except ImportError:
|
|
||||||
PasswordGrantAuthorizer = None
|
PasswordGrantAuthorizer = None
|
||||||
DomainPasswordGrantAuthorizer = None
|
DomainPasswordGrantAuthorizer = None
|
||||||
AccessTokenAuthorizer = None
|
AccessTokenAuthorizer = None
|
||||||
|
@ -278,12 +297,20 @@ class TSSClient(object):
|
||||||
else:
|
else:
|
||||||
return TSSClientV0(**server_parameters)
|
return TSSClientV0(**server_parameters)
|
||||||
|
|
||||||
def get_secret(self, term, fetch_file_attachments, file_download_path):
|
def get_secret(self, term, secret_path, fetch_file_attachments, file_download_path):
|
||||||
display.debug("tss_lookup term: %s" % term)
|
display.debug("tss_lookup term: %s" % term)
|
||||||
secret_id = self._term_to_secret_id(term)
|
secret_id = self._term_to_secret_id(term)
|
||||||
|
if secret_id == 0 and secret_path:
|
||||||
|
fetch_secret_by_path = True
|
||||||
|
display.vvv(u"Secret Server lookup of Secret with path %s" % secret_path)
|
||||||
|
else:
|
||||||
|
fetch_secret_by_path = False
|
||||||
display.vvv(u"Secret Server lookup of Secret with ID %d" % secret_id)
|
display.vvv(u"Secret Server lookup of Secret with ID %d" % secret_id)
|
||||||
|
|
||||||
if fetch_file_attachments:
|
if fetch_file_attachments:
|
||||||
|
if fetch_secret_by_path:
|
||||||
|
obj = self._client.get_secret_by_path(secret_path, fetch_file_attachments)
|
||||||
|
else:
|
||||||
obj = self._client.get_secret(secret_id, fetch_file_attachments)
|
obj = self._client.get_secret(secret_id, fetch_file_attachments)
|
||||||
for i in obj['items']:
|
for i in obj['items']:
|
||||||
if file_download_path and os.path.isdir(file_download_path):
|
if file_download_path and os.path.isdir(file_download_path):
|
||||||
|
@ -301,6 +328,9 @@ class TSSClient(object):
|
||||||
else:
|
else:
|
||||||
raise AnsibleOptionsError("File download path does not exist")
|
raise AnsibleOptionsError("File download path does not exist")
|
||||||
return obj
|
return obj
|
||||||
|
else:
|
||||||
|
if fetch_secret_by_path:
|
||||||
|
return self._client.get_secret_by_path(secret_path, False)
|
||||||
else:
|
else:
|
||||||
return self._client.get_secret_json(secret_id)
|
return self._client.get_secret_json(secret_id)
|
||||||
|
|
||||||
|
@ -399,6 +429,14 @@ class LookupModule(LookupBase):
|
||||||
else:
|
else:
|
||||||
raise AnsibleError("latest python-tss-sdk must be installed to use this plugin")
|
raise AnsibleError("latest python-tss-sdk must be installed to use this plugin")
|
||||||
else:
|
else:
|
||||||
return [tss.get_secret(term, self.get_option("fetch_attachments"), self.get_option("file_download_path")) for term in terms]
|
return [
|
||||||
|
tss.get_secret(
|
||||||
|
term,
|
||||||
|
self.get_option("secret_path"),
|
||||||
|
self.get_option("fetch_attachments"),
|
||||||
|
self.get_option("file_download_path"),
|
||||||
|
)
|
||||||
|
for term in terms
|
||||||
|
]
|
||||||
except SecretServerError as error:
|
except SecretServerError as error:
|
||||||
raise AnsibleError("Secret Server lookup failure: %s" % error.message)
|
raise AnsibleError("Secret Server lookup failure: %s" % error.message)
|
||||||
|
|
Loading…
Reference in a new issue