mirror of
https://github.com/ansible-collections/community.general.git
synced 2024-09-14 20:13:21 +02:00
e238ae999b
Make pyca/cryptography the preferred backend for cryptographic needs (mainly vault) falling back to pycrypto pyca/cryptography is already implicitly a dependency in many cases through paramiko (2.0+) as well as the new openssl_publickey module, which requires pyOpenSSL 16.0+. Additionally, pyca/cryptography is an optional dep for better performance with vault already. This commit leverages cryptography's padding, constant time comparisons, and CBC/CTR modes to reduce the amount of code ansible needs to maintain. * Handle wrong password given for VaultAES format * Do not display deprecation warning for cryptography on python-2.6 * Namespace all of the pycrypto imports and always import them Makes unittests better and the code less likely to get stupid mistakes (like using HMAC from cryptogrpahy when the one from pycrypto is needed) * Add back in atfork since we need pycrypto to reinitialize its RNG just in case we're being used with old paramiko * contrib/inventory/gce: Remove spurious require on pycrypto (cherry picked from commit 9e16b9db275263b3ea8d1b124966fdebfc9ab271) * Add cryptography to ec2_win_password module requirements * Fix python3 bug which would pass text strings to a function which requires byte strings. * Attempt to add pycrypto version to setup deps * Change hacking README for dual pycrypto/cryptography * update dependencies for various CI scripts * additional CI dockerfile/script updates * add paramiko to the windows and sanity requirement set This is needed because ansible lists it as a requirement. Previously the missing dep wasn't enforced, but cryptography imports pkg_resources so you can't ignore a requirement any more * Add integration test cases for old vault and for wrong passwords * helper script for manual testing of pycrypto/cryptography * Skip the pycrypto tests so that users without it installed can still run the unittests * Run unittests for vault with both cryptography and pycrypto backend
191 lines
5.8 KiB
Python
191 lines
5.8 KiB
Python
#!/usr/bin/python
|
|
#
|
|
# This is a free software: you can redistribute it and/or modify
|
|
# it under the terms of the GNU General Public License as published by
|
|
# the Free Software Foundation, either version 3 of the License, or
|
|
# (at your option) any later version.
|
|
#
|
|
# This Ansible library is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU General Public License
|
|
# along with this library. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
ANSIBLE_METADATA = {'metadata_version': '1.0',
|
|
'status': ['preview'],
|
|
'supported_by': 'community'}
|
|
|
|
|
|
DOCUMENTATION = '''
|
|
---
|
|
module: ec2_win_password
|
|
short_description: gets the default administrator password for ec2 windows instances
|
|
description:
|
|
- Gets the default administrator password from any EC2 Windows instance. The instance is referenced by its id (e.g. i-XXXXXXX). This module
|
|
has a dependency on python-boto.
|
|
version_added: "2.0"
|
|
author: "Rick Mendes (@rickmendes)"
|
|
options:
|
|
instance_id:
|
|
description:
|
|
- The instance id to get the password data from.
|
|
required: true
|
|
key_file:
|
|
description:
|
|
- Path to the file containing the key pair used on the instance.
|
|
required: true
|
|
key_passphrase:
|
|
version_added: "2.0"
|
|
description:
|
|
- The passphrase for the instance key pair. The key must use DES or 3DES encryption for this module to decrypt it. You can use openssl to
|
|
convert your password protected keys if they do not use DES or 3DES. ex) openssl rsa -in current_key -out new_key -des3.
|
|
required: false
|
|
default: null
|
|
wait:
|
|
version_added: "2.0"
|
|
description:
|
|
- Whether or not to wait for the password to be available before returning.
|
|
required: false
|
|
default: "no"
|
|
choices: [ "yes", "no" ]
|
|
wait_timeout:
|
|
version_added: "2.0"
|
|
description:
|
|
- Number of seconds to wait before giving up.
|
|
required: false
|
|
default: 120
|
|
|
|
extends_documentation_fragment:
|
|
- aws
|
|
- ec2
|
|
|
|
requirements:
|
|
- cryptography
|
|
|
|
notes:
|
|
- As of Ansible 2.4, this module requires the python cryptography module rather than the
|
|
older pycrypto module.
|
|
'''
|
|
|
|
EXAMPLES = '''
|
|
# Example of getting a password
|
|
tasks:
|
|
- name: get the Administrator password
|
|
ec2_win_password:
|
|
profile: my-boto-profile
|
|
instance_id: i-XXXXXX
|
|
region: us-east-1
|
|
key_file: "~/aws-creds/my_test_key.pem"
|
|
|
|
# Example of getting a password with a password protected key
|
|
tasks:
|
|
- name: get the Administrator password
|
|
ec2_win_password:
|
|
profile: my-boto-profile
|
|
instance_id: i-XXXXXX
|
|
region: us-east-1
|
|
key_file: "~/aws-creds/my_protected_test_key.pem"
|
|
key_passphrase: "secret"
|
|
|
|
# Example of waiting for a password
|
|
tasks:
|
|
- name: get the Administrator password
|
|
ec2_win_password:
|
|
profile: my-boto-profile
|
|
instance_id: i-XXXXXX
|
|
region: us-east-1
|
|
key_file: "~/aws-creds/my_test_key.pem"
|
|
wait: yes
|
|
wait_timeout: 45
|
|
'''
|
|
|
|
from base64 import b64decode
|
|
from os.path import expanduser
|
|
import datetime
|
|
from cryptography.hazmat.backends import default_backend
|
|
from cryptography.hazmat.primitives.asymmetric.padding import PKCS1v15
|
|
from cryptography.hazmat.primitives.serialization import load_pem_private_key
|
|
|
|
try:
|
|
import boto.ec2
|
|
HAS_BOTO = True
|
|
except ImportError:
|
|
HAS_BOTO = False
|
|
|
|
BACKEND = default_backend()
|
|
|
|
|
|
def main():
|
|
argument_spec = ec2_argument_spec()
|
|
argument_spec.update(dict(
|
|
instance_id = dict(required=True),
|
|
key_file = dict(required=True, type='path'),
|
|
key_passphrase = dict(no_log=True, default=None, required=False),
|
|
wait = dict(type='bool', default=False, required=False),
|
|
wait_timeout = dict(default=120, required=False),
|
|
)
|
|
)
|
|
module = AnsibleModule(argument_spec=argument_spec)
|
|
|
|
if not HAS_BOTO:
|
|
module.fail_json(msg='Boto required for this module.')
|
|
|
|
instance_id = module.params.get('instance_id')
|
|
key_file = module.params.get('key_file')
|
|
b_key_passphrase = to_bytes(module.params.get('key_passphrase'), errors='surrogate_or_strict')
|
|
wait = module.params.get('wait')
|
|
wait_timeout = int(module.params.get('wait_timeout'))
|
|
|
|
ec2 = ec2_connect(module)
|
|
|
|
if wait:
|
|
start = datetime.datetime.now()
|
|
end = start + datetime.timedelta(seconds=wait_timeout)
|
|
|
|
while datetime.datetime.now() < end:
|
|
data = ec2.get_password_data(instance_id)
|
|
decoded = b64decode(data)
|
|
if wait and not decoded:
|
|
time.sleep(5)
|
|
else:
|
|
break
|
|
else:
|
|
data = ec2.get_password_data(instance_id)
|
|
decoded = b64decode(data)
|
|
|
|
if wait and datetime.datetime.now() >= end:
|
|
module.fail_json(msg = "wait for password timeout after %d seconds" % wait_timeout)
|
|
|
|
try:
|
|
f = open(key_file, 'rb')
|
|
except IOError as e:
|
|
module.fail_json(msg = "I/O error (%d) opening key file: %s" % (e.errno, e.strerror))
|
|
else:
|
|
try:
|
|
with f:
|
|
key = load_pem_private_key(f.read(), b_key_passphrase, BACKEND)
|
|
except (ValueError, TypeError) as e:
|
|
module.fail_json(msg = "unable to parse key file")
|
|
|
|
try:
|
|
decrypted = key.decrypt(decoded, PKCS1v15())
|
|
except ValueError as e:
|
|
decrypted = None
|
|
|
|
if decrypted is None:
|
|
module.exit_json(win_password='', changed=False)
|
|
else:
|
|
if wait:
|
|
elapsed = datetime.datetime.now() - start
|
|
module.exit_json(win_password=decrypted, changed=True, elapsed=elapsed.seconds)
|
|
else:
|
|
module.exit_json(win_password=decrypted, changed=True)
|
|
|
|
# import module snippets
|
|
from ansible.module_utils.basic import *
|
|
from ansible.module_utils.ec2 import *
|
|
|
|
if __name__ == '__main__':
|
|
main()
|