#!/usr/bin/python # -*- coding: utf-8 -*- # Copyright (c) Ansible project # GNU General Public License v3.0+ (see LICENSES/GPL-3.0-or-later.txt or https://www.gnu.org/licenses/gpl-3.0.txt) # SPDX-License-Identifier: GPL-3.0-or-later from __future__ import absolute_import, division, print_function __metaclass__ = type DOCUMENTATION = ''' --- module: keycloak_realm_rolemapping short_description: Allows administration of Keycloak realm role mappings into groups with the Keycloak API version_added: 8.2.0 description: - This module allows you to add, remove or modify Keycloak realm role mappings into groups with the Keycloak REST API. It requires access to the REST API via OpenID Connect; the user connecting and the client being used must have the requisite access rights. In a default Keycloak installation, admin-cli and an admin user would work, as would a separate client definition with the scope tailored to your needs and a user having the expected roles. - The names of module options are snake_cased versions of the camelCase ones found in the Keycloak API and its documentation at U(https://www.keycloak.org/docs-api/18.0/rest-api/index.html). - Attributes are multi-valued in the Keycloak API. All attributes are lists of individual values and will be returned that way by this module. You may pass single values for attributes when calling the module, and this will be translated into a list suitable for the API. - When updating a group_rolemapping, where possible provide the role ID to the module. This removes a lookup to the API to translate the name into the role ID. attributes: check_mode: support: full diff_mode: support: full options: state: description: - State of the realm_rolemapping. - On C(present), the realm_rolemapping will be created if it does not yet exist, or updated with the parameters you provide. - On C(absent), the realm_rolemapping will be removed if it exists. default: 'present' type: str choices: - present - absent realm: type: str description: - They Keycloak realm under which this role_representation resides. default: 'master' group_name: type: str description: - Name of the group to be mapped. - This parameter is required (can be replaced by gid for less API call). parents: type: list description: - List of parent groups for the group to handle sorted top to bottom. - >- Set this if your group is a subgroup and you do not provide the GID in O(gid). elements: dict suboptions: id: type: str description: - Identify parent by ID. - Needs less API calls than using O(parents[].name). - A deep parent chain can be started at any point when first given parent is given as ID. - Note that in principle both ID and name can be specified at the same time but current implementation only always use just one of them, with ID being preferred. name: type: str description: - Identify parent by name. - Needs more internal API calls than using O(parents[].id) to map names to ID's under the hood. - When giving a parent chain with only names it must be complete up to the top. - Note that in principle both ID and name can be specified at the same time but current implementation only always use just one of them, with ID being preferred. gid: type: str description: - ID of the group to be mapped. - This parameter is not required for updating or deleting the rolemapping but providing it will reduce the number of API calls required. roles: description: - Roles to be mapped to the group. type: list elements: dict suboptions: name: type: str description: - Name of the role_representation. - This parameter is required only when creating or updating the role_representation. id: type: str description: - The unique identifier for this role_representation. - This parameter is not required for updating or deleting a role_representation but providing it will reduce the number of API calls required. extends_documentation_fragment: - community.general.keycloak - community.general.attributes author: - Gaëtan Daubresse (@Gaetan2907) - Marius Huysamen (@mhuysamen) - Alexander Groß (@agross) ''' EXAMPLES = ''' - name: Map a client role to a group, authentication with credentials community.general.keycloak_realm_rolemapping: realm: MyCustomRealm auth_client_id: admin-cli auth_keycloak_url: https://auth.example.com/auth auth_realm: master auth_username: USERNAME auth_password: PASSWORD state: present group_name: group1 roles: - name: role_name1 id: role_id1 - name: role_name2 id: role_id2 delegate_to: localhost - name: Map a client role to a group, authentication with token community.general.keycloak_realm_rolemapping: realm: MyCustomRealm auth_client_id: admin-cli auth_keycloak_url: https://auth.example.com/auth token: TOKEN state: present group_name: group1 roles: - name: role_name1 id: role_id1 - name: role_name2 id: role_id2 delegate_to: localhost - name: Map a client role to a subgroup, authentication with token community.general.keycloak_realm_rolemapping: realm: MyCustomRealm auth_client_id: admin-cli auth_keycloak_url: https://auth.example.com/auth token: TOKEN state: present group_name: subgroup1 parents: - name: parent-group roles: - name: role_name1 id: role_id1 - name: role_name2 id: role_id2 delegate_to: localhost - name: Unmap realm role from a group community.general.keycloak_realm_rolemapping: realm: MyCustomRealm auth_client_id: admin-cli auth_keycloak_url: https://auth.example.com/auth auth_realm: master auth_username: USERNAME auth_password: PASSWORD state: absent group_name: group1 roles: - name: role_name1 id: role_id1 - name: role_name2 id: role_id2 delegate_to: localhost ''' RETURN = ''' msg: description: Message as to what action was taken. returned: always type: str sample: "Role role1 assigned to group group1." proposed: description: Representation of proposed client role mapping. returned: always type: dict sample: { clientId: "test" } existing: description: - Representation of existing client role mapping. - The sample is truncated. returned: always type: dict sample: { "adminUrl": "http://www.example.com/admin_url", "attributes": { "request.object.signature.alg": "RS256", } } end_state: description: - Representation of client role mapping after module execution. - The sample is truncated. returned: on success type: dict sample: { "adminUrl": "http://www.example.com/admin_url", "attributes": { "request.object.signature.alg": "RS256", } } ''' from ansible_collections.community.general.plugins.module_utils.identity.keycloak.keycloak import ( KeycloakAPI, keycloak_argument_spec, get_token, KeycloakError, ) from ansible.module_utils.basic import AnsibleModule def main(): """ Module execution :return: """ argument_spec = keycloak_argument_spec() roles_spec = dict( name=dict(type='str'), id=dict(type='str'), ) meta_args = dict( state=dict(default='present', choices=['present', 'absent']), realm=dict(default='master'), gid=dict(type='str'), group_name=dict(type='str'), parents=dict( type='list', elements='dict', options=dict( id=dict(type='str'), name=dict(type='str') ), ), roles=dict(type='list', elements='dict', options=roles_spec), ) argument_spec.update(meta_args) module = AnsibleModule(argument_spec=argument_spec, supports_check_mode=True, required_one_of=([['token', 'auth_realm', 'auth_username', 'auth_password']]), required_together=([['auth_realm', 'auth_username', 'auth_password']])) result = dict(changed=False, msg='', diff={}, proposed={}, existing={}, end_state={}) # Obtain access token, initialize API try: connection_header = get_token(module.params) except KeycloakError as e: module.fail_json(msg=str(e)) kc = KeycloakAPI(module, connection_header) realm = module.params.get('realm') state = module.params.get('state') gid = module.params.get('gid') group_name = module.params.get('group_name') roles = module.params.get('roles') parents = module.params.get('parents') # Check the parameters if gid is None and group_name is None: module.fail_json(msg='Either the `group_name` or `gid` has to be specified.') # Get the potential missing parameters if gid is None: group_rep = kc.get_group_by_name(group_name, realm=realm, parents=parents) if group_rep is not None: gid = group_rep['id'] else: module.fail_json(msg='Could not fetch group %s:' % group_name) else: group_rep = kc.get_group_by_groupid(gid, realm=realm) if roles is None: module.exit_json(msg="Nothing to do (no roles specified).") else: for role_index, role in enumerate(roles, start=0): if role['name'] is None and role['id'] is None: module.fail_json(msg='Either the `name` or `id` has to be specified on each role.') # Fetch missing role_id if role['id'] is None: role_rep = kc.get_realm_role(role['name'], realm=realm) if role_rep is not None: role['id'] = role_rep['id'] else: module.fail_json(msg='Could not fetch realm role %s by name:' % (role['name'])) # Fetch missing role_name else: for realm_role in kc.get_realm_roles(realm=realm): if realm_role['id'] == role['id']: role['name'] = realm_role['name'] break if role['name'] is None: module.fail_json(msg='Could not fetch realm role %s by ID' % (role['id'])) assigned_roles_before = group_rep.get('realmRoles', []) result['existing'] = assigned_roles_before result['proposed'] = list(assigned_roles_before) if assigned_roles_before else [] update_roles = [] for role_index, role in enumerate(roles, start=0): # Fetch roles to assign if state present if state == 'present': if any(assigned == role['name'] for assigned in assigned_roles_before): pass else: update_roles.append({ 'id': role['id'], 'name': role['name'], }) result['proposed'].append(role['name']) # Fetch roles to remove if state absent else: if any(assigned == role['name'] for assigned in assigned_roles_before): update_roles.append({ 'id': role['id'], 'name': role['name'], }) if role['name'] in result['proposed']: # Handle double removal result['proposed'].remove(role['name']) if len(update_roles): result['changed'] = True if module._diff: result['diff'] = dict(before=assigned_roles_before, after=result['proposed']) if module.check_mode: module.exit_json(**result) if state == 'present': # Assign roles kc.add_group_realm_rolemapping(gid=gid, role_rep=update_roles, realm=realm) result['msg'] = 'Realm roles %s assigned to groupId %s.' % (update_roles, gid) else: # Remove mapping of role kc.delete_group_realm_rolemapping(gid=gid, role_rep=update_roles, realm=realm) result['msg'] = 'Realm roles %s removed from groupId %s.' % (update_roles, gid) if gid is None: assigned_roles_after = kc.get_group_by_name(group_name, realm=realm, parents=parents).get('realmRoles', []) else: assigned_roles_after = kc.get_group_by_groupid(gid, realm=realm).get('realmRoles', []) result['end_state'] = assigned_roles_after module.exit_json(**result) # Do nothing else: result['changed'] = False result['msg'] = 'Nothing to do, roles %s are %s with group %s.' % (roles, 'mapped' if state == 'present' else 'not mapped', group_name) module.exit_json(**result) if __name__ == '__main__': main()