mirror of
https://github.com/ansible-collections/community.general.git
synced 2024-09-14 20:13:21 +02:00
make policy only be required if state is not disabled
This commit is contained in:
parent
cde377bddb
commit
99180e7da3
1 changed files with 23 additions and 11 deletions
|
@ -28,8 +28,8 @@ version_added: "0.7"
|
|||
options:
|
||||
policy:
|
||||
description:
|
||||
- "name of the SELinux policy to use (example: 'targeted')"
|
||||
required: true
|
||||
- "name of the SELinux policy to use (example: 'targeted') will be required if state is not 'disabled'"
|
||||
required: false
|
||||
default: null
|
||||
state:
|
||||
description:
|
||||
|
@ -44,11 +44,12 @@ options:
|
|||
default: "/etc/selinux/config"
|
||||
examples:
|
||||
- code: selinux policy=targeted state=enforcing
|
||||
- code: selinux policy=targeted state=disabled
|
||||
- code: selinux policy=targeted state=permissive
|
||||
- code: selinux state=disabled
|
||||
notes:
|
||||
- Not tested on any debian based system
|
||||
requirements: [ ]
|
||||
author: Derek Carter
|
||||
requirements: [ libselinux-python ]
|
||||
author: Derek Carter <goozbach@friocorte.com>
|
||||
'''
|
||||
|
||||
import os
|
||||
|
@ -101,7 +102,7 @@ def set_state(state):
|
|||
pass
|
||||
else:
|
||||
msg = 'trying to set invalid runtime state %s' % state
|
||||
fail_json(msg=msg)
|
||||
module.fail_json(msg=msg)
|
||||
|
||||
def set_config_policy(policy, configfile):
|
||||
# edit config file with state value
|
||||
|
@ -117,11 +118,11 @@ def set_config_policy(policy, configfile):
|
|||
|
||||
def main():
|
||||
if (not HAVE_SELINUX):
|
||||
fail_json(msg='python-selinux required for this module')
|
||||
module.fail_json(msg='python-selinux required for this module')
|
||||
|
||||
module = AnsibleModule(
|
||||
argument_spec = dict(
|
||||
policy=dict(required=True),
|
||||
policy=dict(required=False),
|
||||
state=dict(choices=['enforcing', 'permissive', 'disabled'], required=True),
|
||||
configfile=dict(aliases=['conf','file'], default='/etc/selinux/config')
|
||||
)
|
||||
|
@ -145,6 +146,14 @@ def main():
|
|||
config_policy = get_config_policy(configfile)
|
||||
config_state = get_config_state(configfile)
|
||||
|
||||
# check to see if policy is set if state is not 'disabled'
|
||||
if (state != 'disabled'):
|
||||
if (policy == '' or policy == None):
|
||||
module.fail_json(msg='policy is required if state is not \'disabled\'')
|
||||
else:
|
||||
if (policy == '' or policy == None):
|
||||
policy = config_policy
|
||||
|
||||
# check changed values and run changes
|
||||
if (policy != runtime_policy):
|
||||
# cannot change runtime policy
|
||||
|
@ -158,10 +167,13 @@ def main():
|
|||
|
||||
if (state != runtime_state):
|
||||
if (state == 'disabled'):
|
||||
msgs.append('disabled state will take effect next reboot')
|
||||
msgs.append('state change will take effect next reboot')
|
||||
else:
|
||||
msgs.append('runtime state changed from \'%s\' to \'%s\'' % (runtime_state, state))
|
||||
set_state(state)
|
||||
if (runtime_enabled):
|
||||
set_state(state)
|
||||
msgs.append('runtime state changed from \'%s\' to \'%s\'' % (runtime_state, state))
|
||||
else:
|
||||
msgs.append('state change will take effect next reboot')
|
||||
changed=True
|
||||
|
||||
if (state != config_state):
|
||||
|
|
Loading…
Reference in a new issue