mirror of
https://github.com/ansible-collections/community.general.git
synced 2024-09-14 20:13:21 +02:00
[PR #6109/d2094669 backport][stable-6] add xorder_discovery parameter (#6110)
add xorder_discovery parameter (#6109)
* add xorder_discovery parameter
* fix regex raw string
* use dn logic from LdapGeneric
* Update documentation.
* Update changelog fragment.
* Improve if.
---------
Co-authored-by: Felix Fontein <felix@fontein.de>
(cherry picked from commit d209466985
)
Co-authored-by: Reto Kupferschmid <kupferschmid@puzzle.ch>
This commit is contained in:
parent
e87c2c9eb4
commit
c3db6343e5
4 changed files with 26 additions and 3 deletions
2
changelogs/fragments/6045-xorder-discovery.yml
Normal file
2
changelogs/fragments/6045-xorder-discovery.yml
Normal file
|
@ -0,0 +1,2 @@
|
||||||
|
minor_changes:
|
||||||
|
- ldap modules - add ``xorder_discovery`` option (https://github.com/ansible-collections/community.general/issues/6045, https://github.com/ansible-collections/community.general/pull/6109).
|
|
@ -65,4 +65,15 @@ options:
|
||||||
choices: ['external', 'gssapi']
|
choices: ['external', 'gssapi']
|
||||||
default: external
|
default: external
|
||||||
version_added: "2.0.0"
|
version_added: "2.0.0"
|
||||||
|
xorder_discovery:
|
||||||
|
description:
|
||||||
|
- Set the behavior on how to process Xordered DNs.
|
||||||
|
- C(enable) will perform a C(ONELEVEL) search below the superior RDN to find the matching DN.
|
||||||
|
- C(disable) will always use the DN unmodified (as passed by the I(dn) parameter).
|
||||||
|
- C(auto) will only perform a search if the first RDN does not contain an index number (C({x})).
|
||||||
|
- Possible choices are C(enable), C(auto), C(disable).
|
||||||
|
type: str
|
||||||
|
choices: ['enable', 'auto', 'disable']
|
||||||
|
default: auto
|
||||||
|
version_added: "6.4.0"
|
||||||
'''
|
'''
|
||||||
|
|
|
@ -10,6 +10,7 @@
|
||||||
from __future__ import absolute_import, division, print_function
|
from __future__ import absolute_import, division, print_function
|
||||||
__metaclass__ = type
|
__metaclass__ = type
|
||||||
|
|
||||||
|
import re
|
||||||
import traceback
|
import traceback
|
||||||
from ansible.module_utils.common.text.converters import to_native
|
from ansible.module_utils.common.text.converters import to_native
|
||||||
|
|
||||||
|
@ -39,6 +40,7 @@ def gen_specs(**specs):
|
||||||
'start_tls': dict(default=False, type='bool'),
|
'start_tls': dict(default=False, type='bool'),
|
||||||
'validate_certs': dict(default=True, type='bool'),
|
'validate_certs': dict(default=True, type='bool'),
|
||||||
'sasl_class': dict(choices=['external', 'gssapi'], default='external', type='str'),
|
'sasl_class': dict(choices=['external', 'gssapi'], default='external', type='str'),
|
||||||
|
'xorder_discovery': dict(choices=['enable', 'auto', 'disable'], default='auto', type='str'),
|
||||||
})
|
})
|
||||||
|
|
||||||
return specs
|
return specs
|
||||||
|
@ -55,12 +57,16 @@ class LdapGeneric(object):
|
||||||
self.start_tls = self.module.params['start_tls']
|
self.start_tls = self.module.params['start_tls']
|
||||||
self.verify_cert = self.module.params['validate_certs']
|
self.verify_cert = self.module.params['validate_certs']
|
||||||
self.sasl_class = self.module.params['sasl_class']
|
self.sasl_class = self.module.params['sasl_class']
|
||||||
|
self.xorder_discovery = self.module.params['xorder_discovery']
|
||||||
|
|
||||||
# Establish connection
|
# Establish connection
|
||||||
self.connection = self._connect_to_ldap()
|
self.connection = self._connect_to_ldap()
|
||||||
|
|
||||||
# Try to find the X_ORDERed version of the DN
|
if self.xorder_discovery == "enable" or (self.xorder_discovery == "auto" and not self._xorder_dn()):
|
||||||
self.dn = self._find_dn()
|
# Try to find the X_ORDERed version of the DN
|
||||||
|
self.dn = self._find_dn()
|
||||||
|
else:
|
||||||
|
self.dn = self.module.params['dn']
|
||||||
|
|
||||||
def fail(self, msg, exn):
|
def fail(self, msg, exn):
|
||||||
self.module.fail_json(
|
self.module.fail_json(
|
||||||
|
@ -113,3 +119,8 @@ class LdapGeneric(object):
|
||||||
self.fail("Cannot bind to the server.", e)
|
self.fail("Cannot bind to the server.", e)
|
||||||
|
|
||||||
return connection
|
return connection
|
||||||
|
|
||||||
|
def _xorder_dn(self):
|
||||||
|
# match X_ORDERed DNs
|
||||||
|
regex = r"\w+=\{\d+\}.+"
|
||||||
|
return re.match(regex, self.module.params['dn']) is not None
|
||||||
|
|
|
@ -135,7 +135,6 @@ class LdapSearch(LdapGeneric):
|
||||||
def __init__(self, module):
|
def __init__(self, module):
|
||||||
LdapGeneric.__init__(self, module)
|
LdapGeneric.__init__(self, module)
|
||||||
|
|
||||||
self.dn = self.module.params['dn']
|
|
||||||
self.filterstr = self.module.params['filter']
|
self.filterstr = self.module.params['filter']
|
||||||
self.attrlist = []
|
self.attrlist = []
|
||||||
self._load_scope()
|
self._load_scope()
|
||||||
|
|
Loading…
Reference in a new issue