mirror of
https://github.com/ansible-collections/community.general.git
synced 2024-09-14 20:13:21 +02:00
5d226f86b6
* Remove ANSIBLE_METADATA * remove from other modules * remove from plugins and scripts
744 lines
26 KiB
Python
744 lines
26 KiB
Python
#!/usr/bin/python
|
|
# -*- coding: utf-8 -*-
|
|
# Copyright: (c) 2019, Sebastiaan Mannem (@sebasmannem) <sebastiaan.mannem@enterprisedb.com>
|
|
# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt)
|
|
|
|
from __future__ import absolute_import, division, print_function
|
|
|
|
'''
|
|
This module is used to manage postgres pg_hba files with Ansible.
|
|
'''
|
|
|
|
__metaclass__ = type
|
|
|
|
DOCUMENTATION = r'''
|
|
---
|
|
module: postgresql_pg_hba
|
|
short_description: Add, remove or modify a rule in a pg_hba file
|
|
description:
|
|
- The fundamental function of the module is to create, or delete lines in pg_hba files.
|
|
- The lines in the file should be in a typical pg_hba form and lines should be unique per key (type, databases, users, source).
|
|
If they are not unique and the SID is 'the one to change', only one for C(state=present) or none for C(state=absent) of the SID's will remain.
|
|
extends_documentation_fragment: files
|
|
options:
|
|
address:
|
|
description:
|
|
- The source address/net where the connections could come from.
|
|
- Will not be used for entries of I(type)=C(local).
|
|
- You can also use keywords C(all), C(samehost), and C(samenet).
|
|
default: samehost
|
|
type: str
|
|
aliases: [ source, src ]
|
|
backup:
|
|
description:
|
|
- If set, create a backup of the C(pg_hba) file before it is modified.
|
|
The location of the backup is returned in the (backup) variable by this module.
|
|
default: false
|
|
type: bool
|
|
backup_file:
|
|
description:
|
|
- Write backup to a specific backupfile rather than a temp file.
|
|
type: str
|
|
create:
|
|
description:
|
|
- Create an C(pg_hba) file if none exists.
|
|
- When set to false, an error is raised when the C(pg_hba) file doesn't exist.
|
|
default: false
|
|
type: bool
|
|
contype:
|
|
description:
|
|
- Type of the rule. If not set, C(postgresql_pg_hba) will only return contents.
|
|
type: str
|
|
choices: [ local, host, hostnossl, hostssl ]
|
|
databases:
|
|
description:
|
|
- Databases this line applies to.
|
|
default: all
|
|
type: str
|
|
dest:
|
|
description:
|
|
- Path to C(pg_hba) file to modify.
|
|
type: path
|
|
required: true
|
|
method:
|
|
description:
|
|
- Authentication method to be used.
|
|
type: str
|
|
choices: [ cert, gss, ident, krb5, ldap, md5, pam, password, peer, radius, reject, scram-sha-256 , sspi, trust ]
|
|
default: md5
|
|
netmask:
|
|
description:
|
|
- The netmask of the source address.
|
|
type: str
|
|
options:
|
|
description:
|
|
- Additional options for the authentication I(method).
|
|
type: str
|
|
order:
|
|
description:
|
|
- The entries will be written out in a specific order.
|
|
With this option you can control by which field they are ordered first, second and last.
|
|
s=source, d=databases, u=users.
|
|
This option is deprecated since 2.9 and will be removed in 2.11.
|
|
Sortorder is now hardcoded to sdu.
|
|
type: str
|
|
default: sdu
|
|
choices: [ sdu, sud, dsu, dus, usd, uds ]
|
|
state:
|
|
description:
|
|
- The lines will be added/modified when C(state=present) and removed when C(state=absent).
|
|
type: str
|
|
default: present
|
|
choices: [ absent, present ]
|
|
users:
|
|
description:
|
|
- Users this line applies to.
|
|
type: str
|
|
default: all
|
|
|
|
notes:
|
|
- The default authentication assumes that on the host, you are either logging in as or
|
|
sudo'ing to an account with appropriate permissions to read and modify the file.
|
|
- This module also returns the pg_hba info. You can use this module to only retrieve it by only specifying I(dest).
|
|
The info can be found in the returned data under key pg_hba, being a list, containing a dict per rule.
|
|
- This module will sort resulting C(pg_hba) files if a rule change is required.
|
|
This could give unexpected results with manual created hba files, if it was improperly sorted.
|
|
For example a rule was created for a net first and for a ip in that net range next.
|
|
In that situation, the 'ip specific rule' will never hit, it is in the C(pg_hba) file obsolete.
|
|
After the C(pg_hba) file is rewritten by the M(postgresql_pg_hba) module, the ip specific rule will be sorted above the range rule.
|
|
And then it will hit, which will give unexpected results.
|
|
- With the 'order' parameter you can control which field is used to sort first, next and last.
|
|
- The module supports a check mode and a diff mode.
|
|
|
|
seealso:
|
|
- name: PostgreSQL pg_hba.conf file reference
|
|
description: Complete reference of the PostgreSQL pg_hba.conf file documentation.
|
|
link: https://www.postgresql.org/docs/current/auth-pg-hba-conf.html
|
|
|
|
requirements:
|
|
- ipaddress
|
|
|
|
author: Sebastiaan Mannem (@sebasmannem)
|
|
'''
|
|
|
|
EXAMPLES = '''
|
|
- name: Grant users joe and simon access to databases sales and logistics from ipv6 localhost ::1/128 using peer authentication.
|
|
postgresql_pg_hba:
|
|
dest: /var/lib/postgres/data/pg_hba.conf
|
|
contype: host
|
|
users: joe,simon
|
|
source: ::1
|
|
databases: sales,logistics
|
|
method: peer
|
|
create: true
|
|
|
|
- name: Grant user replication from network 192.168.0.100/24 access for replication with client cert authentication.
|
|
postgresql_pg_hba:
|
|
dest: /var/lib/postgres/data/pg_hba.conf
|
|
contype: host
|
|
users: replication
|
|
source: 192.168.0.100/24
|
|
databases: replication
|
|
method: cert
|
|
|
|
- name: Revoke access from local user mary on database mydb.
|
|
postgresql_pg_hba:
|
|
dest: /var/lib/postgres/data/pg_hba.conf
|
|
contype: local
|
|
users: mary
|
|
databases: mydb
|
|
state: absent
|
|
'''
|
|
|
|
RETURN = r'''
|
|
msgs:
|
|
description: List of textual messages what was done
|
|
returned: always
|
|
type: list
|
|
sample:
|
|
"msgs": [
|
|
"Removing",
|
|
"Changed",
|
|
"Writing"
|
|
]
|
|
backup_file:
|
|
description: File that the original pg_hba file was backed up to
|
|
returned: changed
|
|
type: str
|
|
sample: /tmp/pg_hba_jxobj_p
|
|
pg_hba:
|
|
description: List of the pg_hba rules as they are configured in the specified hba file
|
|
returned: always
|
|
type: list
|
|
sample:
|
|
"pg_hba": [
|
|
{
|
|
"db": "all",
|
|
"method": "md5",
|
|
"src": "samehost",
|
|
"type": "host",
|
|
"usr": "all"
|
|
}
|
|
]
|
|
'''
|
|
|
|
import os
|
|
import re
|
|
import traceback
|
|
|
|
IPADDRESS_IMP_ERR = None
|
|
try:
|
|
import ipaddress
|
|
except ImportError:
|
|
IPADDRESS_IMP_ERR = traceback.format_exc()
|
|
|
|
import tempfile
|
|
import shutil
|
|
from ansible.module_utils.basic import AnsibleModule, missing_required_lib
|
|
# from ansible.module_utils.postgres import postgres_common_argument_spec
|
|
|
|
PG_HBA_METHODS = ["trust", "reject", "md5", "password", "gss", "sspi", "krb5", "ident", "peer",
|
|
"ldap", "radius", "cert", "pam", "scram-sha-256"]
|
|
PG_HBA_TYPES = ["local", "host", "hostssl", "hostnossl"]
|
|
PG_HBA_ORDERS = ["sdu", "sud", "dsu", "dus", "usd", "uds"]
|
|
PG_HBA_HDR = ['type', 'db', 'usr', 'src', 'mask', 'method', 'options']
|
|
|
|
WHITESPACES_RE = re.compile(r'\s+')
|
|
|
|
|
|
class PgHbaError(Exception):
|
|
'''
|
|
This exception is raised when parsing the pg_hba file ends in an error.
|
|
'''
|
|
|
|
|
|
class PgHbaRuleError(PgHbaError):
|
|
'''
|
|
This exception is raised when parsing the pg_hba file ends in an error.
|
|
'''
|
|
|
|
|
|
class PgHbaRuleChanged(PgHbaRuleError):
|
|
'''
|
|
This exception is raised when a new parsed rule is a changed version of an existing rule.
|
|
'''
|
|
|
|
|
|
class PgHbaValueError(PgHbaError):
|
|
'''
|
|
This exception is raised when a new parsed rule is a changed version of an existing rule.
|
|
'''
|
|
|
|
|
|
class PgHbaRuleValueError(PgHbaRuleError):
|
|
'''
|
|
This exception is raised when a new parsed rule is a changed version of an existing rule.
|
|
'''
|
|
|
|
|
|
class PgHba(object):
|
|
"""
|
|
PgHba object to read/write entries to/from.
|
|
pg_hba_file - the pg_hba file almost always /etc/pg_hba
|
|
"""
|
|
def __init__(self, pg_hba_file=None, order="sdu", backup=False, create=False):
|
|
if order not in PG_HBA_ORDERS:
|
|
msg = "invalid order setting {0} (should be one of '{1}')."
|
|
raise PgHbaError(msg.format(order, "', '".join(PG_HBA_ORDERS)))
|
|
self.pg_hba_file = pg_hba_file
|
|
self.rules = None
|
|
self.comment = None
|
|
self.order = order
|
|
self.backup = backup
|
|
self.last_backup = None
|
|
self.create = create
|
|
self.unchanged()
|
|
# self.databases will be update by add_rule and gives some idea of the number of databases
|
|
# (at least that are handled by this pg_hba)
|
|
self.databases = set(['postgres', 'template0', 'template1'])
|
|
|
|
# self.databases will be update by add_rule and gives some idea of the number of users
|
|
# (at least that are handled by this pg_hba) since this might also be groups with multiple
|
|
# users, this might be totally off, but at least it is some info...
|
|
self.users = set(['postgres'])
|
|
|
|
self.read()
|
|
|
|
def unchanged(self):
|
|
'''
|
|
This method resets self.diff to a empty default
|
|
'''
|
|
self.diff = {'before': {'file': self.pg_hba_file, 'pg_hba': []},
|
|
'after': {'file': self.pg_hba_file, 'pg_hba': []}}
|
|
|
|
def read(self):
|
|
'''
|
|
Read in the pg_hba from the system
|
|
'''
|
|
self.rules = {}
|
|
self.comment = []
|
|
# read the pg_hbafile
|
|
try:
|
|
with open(self.pg_hba_file, 'r') as file:
|
|
for line in file:
|
|
line = line.strip()
|
|
# uncomment
|
|
if '#' in line:
|
|
line, comment = line.split('#', 1)
|
|
self.comment.append('#' + comment)
|
|
try:
|
|
self.add_rule(PgHbaRule(line=line))
|
|
except PgHbaRuleError:
|
|
pass
|
|
self.unchanged()
|
|
except IOError:
|
|
pass
|
|
|
|
def write(self, backup_file=''):
|
|
'''
|
|
This method writes the PgHba rules (back) to a file.
|
|
'''
|
|
if not self.changed():
|
|
return False
|
|
|
|
contents = self.render()
|
|
if self.pg_hba_file:
|
|
if not (os.path.isfile(self.pg_hba_file) or self.create):
|
|
raise PgHbaError("pg_hba file '{0}' doesn't exist. "
|
|
"Use create option to autocreate.".format(self.pg_hba_file))
|
|
if self.backup and os.path.isfile(self.pg_hba_file):
|
|
if backup_file:
|
|
self.last_backup = backup_file
|
|
else:
|
|
__backup_file_h, self.last_backup = tempfile.mkstemp(prefix='pg_hba')
|
|
shutil.copy(self.pg_hba_file, self.last_backup)
|
|
fileh = open(self.pg_hba_file, 'w')
|
|
else:
|
|
filed, __path = tempfile.mkstemp(prefix='pg_hba')
|
|
fileh = os.fdopen(filed, 'w')
|
|
|
|
fileh.write(contents)
|
|
self.unchanged()
|
|
fileh.close()
|
|
return True
|
|
|
|
def add_rule(self, rule):
|
|
'''
|
|
This method can be used to add a rule to the list of rules in this PgHba object
|
|
'''
|
|
key = rule.key()
|
|
try:
|
|
try:
|
|
oldrule = self.rules[key]
|
|
except KeyError:
|
|
raise PgHbaRuleChanged
|
|
ekeys = set(list(oldrule.keys()) + list(rule.keys()))
|
|
ekeys.remove('line')
|
|
for k in ekeys:
|
|
if oldrule[k] != rule[k]:
|
|
raise PgHbaRuleChanged('{0} changes {1}'.format(rule, oldrule))
|
|
except PgHbaRuleChanged:
|
|
self.rules[key] = rule
|
|
self.diff['after']['pg_hba'].append(rule.line())
|
|
if rule['db'] not in ['all', 'samerole', 'samegroup', 'replication']:
|
|
databases = set(rule['db'].split(','))
|
|
self.databases.update(databases)
|
|
if rule['usr'] != 'all':
|
|
user = rule['usr']
|
|
if user[0] == '+':
|
|
user = user[1:]
|
|
self.users.add(user)
|
|
|
|
def remove_rule(self, rule):
|
|
'''
|
|
This method can be used to find and remove a rule. It doesn't look for the exact rule, only
|
|
the rule with the same key.
|
|
'''
|
|
keys = rule.key()
|
|
try:
|
|
del self.rules[keys]
|
|
self.diff['before']['pg_hba'].append(rule.line())
|
|
except KeyError:
|
|
pass
|
|
|
|
def get_rules(self, with_lines=False):
|
|
'''
|
|
This method returns all the rules of the PgHba object
|
|
'''
|
|
rules = sorted(self.rules.values())
|
|
for rule in rules:
|
|
ret = {}
|
|
for key, value in rule.items():
|
|
ret[key] = value
|
|
if not with_lines:
|
|
if 'line' in ret:
|
|
del ret['line']
|
|
else:
|
|
ret['line'] = rule.line()
|
|
|
|
yield ret
|
|
|
|
def render(self):
|
|
'''
|
|
This method renders the content of the PgHba rules and comments.
|
|
The returning value can be used directly to write to a new file.
|
|
'''
|
|
comment = '\n'.join(self.comment)
|
|
rule_lines = '\n'.join([rule['line'] for rule in self.get_rules(with_lines=True)])
|
|
result = comment + '\n' + rule_lines
|
|
# End it properly with a linefeed (if not already).
|
|
if result and result[-1] not in ['\n', '\r']:
|
|
result += '\n'
|
|
return result
|
|
|
|
def changed(self):
|
|
'''
|
|
This method can be called to detect if the PgHba file has been changed.
|
|
'''
|
|
return bool(self.diff['before']['pg_hba'] or self.diff['after']['pg_hba'])
|
|
|
|
|
|
class PgHbaRule(dict):
|
|
'''
|
|
This class represents one rule as defined in a line in a PgHbaFile.
|
|
'''
|
|
|
|
def __init__(self, contype=None, databases=None, users=None, source=None, netmask=None,
|
|
method=None, options=None, line=None):
|
|
'''
|
|
This function can be called with a comma seperated list of databases and a comma seperated
|
|
list of users and it will act as a generator that returns a expanded list of rules one by
|
|
one.
|
|
'''
|
|
|
|
super(PgHbaRule, self).__init__()
|
|
|
|
if line:
|
|
# Read values from line if parsed
|
|
self.fromline(line)
|
|
|
|
# read rule cols from parsed items
|
|
rule = dict(zip(PG_HBA_HDR, [contype, databases, users, source, netmask, method, options]))
|
|
for key, value in rule.items():
|
|
if value:
|
|
self[key] = value
|
|
|
|
# Some sanity checks
|
|
for key in ['method', 'type']:
|
|
if key not in self:
|
|
raise PgHbaRuleError('Missing {0} in rule {1}'.format(key, self))
|
|
|
|
if self['method'] not in PG_HBA_METHODS:
|
|
msg = "invalid method {0} (should be one of '{1}')."
|
|
raise PgHbaRuleValueError(msg.format(self['method'], "', '".join(PG_HBA_METHODS)))
|
|
|
|
if self['type'] not in PG_HBA_TYPES:
|
|
msg = "invalid connection type {0} (should be one of '{1}')."
|
|
raise PgHbaRuleValueError(msg.format(self['type'], "', '".join(PG_HBA_TYPES)))
|
|
|
|
if self['type'] == 'local':
|
|
self.unset('src')
|
|
self.unset('mask')
|
|
elif 'src' not in self:
|
|
raise PgHbaRuleError('Missing src in rule {1}'.format(self))
|
|
elif '/' in self['src']:
|
|
self.unset('mask')
|
|
else:
|
|
self['src'] = str(self.source())
|
|
self.unset('mask')
|
|
|
|
def unset(self, key):
|
|
'''
|
|
This method is used to unset certain columns if they exist
|
|
'''
|
|
if key in self:
|
|
del self[key]
|
|
|
|
def line(self):
|
|
'''
|
|
This method can be used to return (or generate) the line
|
|
'''
|
|
try:
|
|
return self['line']
|
|
except KeyError:
|
|
self['line'] = "\t".join([self[k] for k in PG_HBA_HDR if k in self.keys()])
|
|
return self['line']
|
|
|
|
def fromline(self, line):
|
|
'''
|
|
split into 'type', 'db', 'usr', 'src', 'mask', 'method', 'options' cols
|
|
'''
|
|
if WHITESPACES_RE.sub('', line) == '':
|
|
# empty line. skip this one...
|
|
return
|
|
cols = WHITESPACES_RE.split(line)
|
|
if len(cols) < 4:
|
|
msg = "Rule {0} has too few columns."
|
|
raise PgHbaValueError(msg.format(line))
|
|
if cols[0] not in PG_HBA_TYPES:
|
|
msg = "Rule {0} has unknown type: {1}."
|
|
raise PgHbaValueError(msg.format(line, cols[0]))
|
|
if cols[0] == 'local':
|
|
cols.insert(3, None) # No address
|
|
cols.insert(3, None) # No IP-mask
|
|
if len(cols) < 6:
|
|
cols.insert(4, None) # No IP-mask
|
|
elif cols[5] not in PG_HBA_METHODS:
|
|
cols.insert(4, None) # No IP-mask
|
|
if cols[5] not in PG_HBA_METHODS:
|
|
raise PgHbaValueError("Rule {0} of '{1}' type has invalid auth-method '{2}'".format(line, cols[0], cols[5]))
|
|
|
|
if len(cols) < 7:
|
|
cols.insert(6, None) # No auth-options
|
|
else:
|
|
cols[6] = " ".join(cols[6:]) # combine all auth-options
|
|
rule = dict(zip(PG_HBA_HDR, cols[:7]))
|
|
for key, value in rule.items():
|
|
if value:
|
|
self[key] = value
|
|
|
|
def key(self):
|
|
'''
|
|
This method can be used to get the key from a rule.
|
|
'''
|
|
if self['type'] == 'local':
|
|
source = 'local'
|
|
else:
|
|
source = str(self.source())
|
|
return (source, self['db'], self['usr'])
|
|
|
|
def source(self):
|
|
'''
|
|
This method is used to get the source of a rule as an ipaddress object if possible.
|
|
'''
|
|
if 'mask' in self.keys():
|
|
try:
|
|
ipaddress.ip_address(u'{0}'.format(self['src']))
|
|
except ValueError:
|
|
raise PgHbaValueError('Mask was specified, but source "{0}" '
|
|
'is no valid ip'.format(self['src']))
|
|
# ipaddress module cannot work with ipv6 netmask, so lets convert it to prefixlen
|
|
# furthermore ipv4 with bad netmask throws 'Rule {} doesn't seem to be an ip, but has a
|
|
# mask error that doesn't seem to describe what is going on.
|
|
try:
|
|
mask_as_ip = ipaddress.ip_address(u'{0}'.format(self['mask']))
|
|
except ValueError:
|
|
raise PgHbaValueError('Mask {0} seems to be invalid'.format(self['mask']))
|
|
binvalue = "{0:b}".format(int(mask_as_ip))
|
|
if '01' in binvalue:
|
|
raise PgHbaValueError('IP mask {0} seems invalid '
|
|
'(binary value has 1 after 0)'.format(self['mask']))
|
|
prefixlen = binvalue.count('1')
|
|
sourcenw = '{0}/{1}'.format(self['src'], prefixlen)
|
|
try:
|
|
return ipaddress.ip_network(u'{0}'.format(sourcenw), strict=False)
|
|
except ValueError:
|
|
raise PgHbaValueError('{0} is no valid address range'.format(sourcenw))
|
|
|
|
try:
|
|
return ipaddress.ip_network(u'{0}'.format(self['src']), strict=False)
|
|
except ValueError:
|
|
return self['src']
|
|
|
|
def __lt__(self, other):
|
|
"""This function helps sorted to decide how to sort.
|
|
|
|
It just checks itself against the other and decides on some key values
|
|
if it should be sorted higher or lower in the list.
|
|
The way it works:
|
|
For networks, every 1 in 'netmask in binary' makes the subnet more specific.
|
|
Therefore I chose to use prefix as the weight.
|
|
So a single IP (/32) should have twice the weight of a /16 network.
|
|
To keep everything in the same weight scale,
|
|
- for ipv6, we use a weight scale of 0 (all possible ipv6 addresses) to 128 (single ip)
|
|
- for ipv4, we use a weight scale of 0 (all possible ipv4 addresses) to 128 (single ip)
|
|
Therefore for ipv4, we use prefixlen (0-32) * 4 for weight,
|
|
which corresponds to ipv6 (0-128).
|
|
"""
|
|
myweight = self.source_weight()
|
|
hisweight = other.source_weight()
|
|
if myweight != hisweight:
|
|
return myweight > hisweight
|
|
|
|
myweight = self.db_weight()
|
|
hisweight = other.db_weight()
|
|
if myweight != hisweight:
|
|
return myweight < hisweight
|
|
|
|
myweight = self.user_weight()
|
|
hisweight = other.user_weight()
|
|
if myweight != hisweight:
|
|
return myweight < hisweight
|
|
try:
|
|
return self['src'] < other['src']
|
|
except TypeError:
|
|
return self.source_type_weight() < other.source_type_weight()
|
|
except Exception:
|
|
# When all else fails, just compare the exact line.
|
|
return self.line() < other.line()
|
|
|
|
def source_weight(self):
|
|
"""Report the weight of this source net.
|
|
|
|
Basically this is the netmask, where IPv4 is normalized to IPv6
|
|
(IPv4/32 has the same weight as IPv6/128).
|
|
"""
|
|
if self['type'] == 'local':
|
|
return 130
|
|
|
|
sourceobj = self.source()
|
|
if isinstance(sourceobj, ipaddress.IPv4Network):
|
|
return sourceobj.prefixlen * 4
|
|
if isinstance(sourceobj, ipaddress.IPv6Network):
|
|
return sourceobj.prefixlen
|
|
if isinstance(sourceobj, str):
|
|
# You can also write all to match any IP address,
|
|
# samehost to match any of the server's own IP addresses,
|
|
# or samenet to match any address in any subnet that the server is connected to.
|
|
if sourceobj == 'all':
|
|
# (all is considered the full range of all ips, which has a weight of 0)
|
|
return 0
|
|
if sourceobj == 'samehost':
|
|
# (sort samehost second after local)
|
|
return 129
|
|
if sourceobj == 'samenet':
|
|
# Might write some fancy code to determine all prefix's
|
|
# from all interfaces and find a sane value for this one.
|
|
# For now, let's assume IPv4/24 or IPv6/96 (both have weight 96).
|
|
return 96
|
|
if sourceobj[0] == '.':
|
|
# suffix matching (domain name), let's assume a very large scale
|
|
# and therefore a very low weight IPv4/16 or IPv6/64 (both have weight 64).
|
|
return 64
|
|
# hostname, let's assume only one host matches, which is
|
|
# IPv4/32 or IPv6/128 (both have weight 128)
|
|
return 128
|
|
raise PgHbaValueError('Cannot deduct the source weight of this source {1}'.format(sourceobj))
|
|
|
|
def source_type_weight(self):
|
|
"""Give a weight on the type of this source.
|
|
|
|
Basically make sure that IPv6Networks are sorted higher than IPv4Networks.
|
|
This is a 'when all else fails' solution in __lt__.
|
|
"""
|
|
if self['type'] == 'local':
|
|
return 3
|
|
|
|
sourceobj = self.source()
|
|
if isinstance(sourceobj, ipaddress.IPv4Network):
|
|
return 2
|
|
if isinstance(sourceobj, ipaddress.IPv6Network):
|
|
return 1
|
|
if isinstance(sourceobj, str):
|
|
return 0
|
|
raise PgHbaValueError('This source {0} is of an unknown type...'.format(sourceobj))
|
|
|
|
def db_weight(self):
|
|
"""Report the weight of the database.
|
|
|
|
Normally, just 1, but for replication this is 0, and for 'all', this is more than 2.
|
|
"""
|
|
if self['db'] == 'all':
|
|
return 100000
|
|
if self['db'] == 'replication':
|
|
return 0
|
|
if self['db'] in ['samerole', 'samegroup']:
|
|
return 1
|
|
return 1 + self['db'].count(',')
|
|
|
|
def user_weight(self):
|
|
"""Report weight when comparing users."""
|
|
if self['usr'] == 'all':
|
|
return 1000000
|
|
return 1
|
|
|
|
|
|
def main():
|
|
'''
|
|
This function is the main function of this module
|
|
'''
|
|
# argument_spec = postgres_common_argument_spec()
|
|
argument_spec = dict()
|
|
argument_spec.update(
|
|
address=dict(type='str', default='samehost', aliases=['source', 'src']),
|
|
backup=dict(type='bool', default=False),
|
|
backup_file=dict(type='str'),
|
|
contype=dict(type='str', default=None, choices=PG_HBA_TYPES),
|
|
create=dict(type='bool', default=False),
|
|
databases=dict(type='str', default='all'),
|
|
dest=dict(type='path', required=True),
|
|
method=dict(type='str', default='md5', choices=PG_HBA_METHODS),
|
|
netmask=dict(type='str'),
|
|
options=dict(type='str'),
|
|
order=dict(type='str', default="sdu", choices=PG_HBA_ORDERS),
|
|
state=dict(type='str', default="present", choices=["absent", "present"]),
|
|
users=dict(type='str', default='all')
|
|
)
|
|
module = AnsibleModule(
|
|
argument_spec=argument_spec,
|
|
add_file_common_args=True,
|
|
supports_check_mode=True
|
|
)
|
|
if IPADDRESS_IMP_ERR is not None:
|
|
module.fail_json(msg=missing_required_lib('ipaddress'), exception=IPADDRESS_IMP_ERR)
|
|
|
|
contype = module.params["contype"]
|
|
create = bool(module.params["create"] or module.check_mode)
|
|
if module.check_mode:
|
|
backup = False
|
|
else:
|
|
backup = module.params['backup']
|
|
backup_file = module.params['backup_file']
|
|
databases = module.params["databases"]
|
|
dest = module.params["dest"]
|
|
|
|
method = module.params["method"]
|
|
netmask = module.params["netmask"]
|
|
options = module.params["options"]
|
|
order = module.params["order"]
|
|
source = module.params["address"]
|
|
state = module.params["state"]
|
|
users = module.params["users"]
|
|
|
|
ret = {'msgs': []}
|
|
try:
|
|
pg_hba = PgHba(dest, order, backup=backup, create=create)
|
|
except PgHbaError as error:
|
|
module.fail_json(msg='Error reading file:\n{0}'.format(error))
|
|
|
|
if contype:
|
|
try:
|
|
for database in databases.split(','):
|
|
for user in users.split(','):
|
|
rule = PgHbaRule(contype, database, user, source, netmask, method, options)
|
|
if state == "present":
|
|
ret['msgs'].append('Adding')
|
|
pg_hba.add_rule(rule)
|
|
else:
|
|
ret['msgs'].append('Removing')
|
|
pg_hba.remove_rule(rule)
|
|
except PgHbaError as error:
|
|
module.fail_json(msg='Error modifying rules:\n{0}'.format(error))
|
|
file_args = module.load_file_common_arguments(module.params)
|
|
ret['changed'] = changed = pg_hba.changed()
|
|
if changed:
|
|
ret['msgs'].append('Changed')
|
|
ret['diff'] = pg_hba.diff
|
|
|
|
if not module.check_mode:
|
|
ret['msgs'].append('Writing')
|
|
try:
|
|
if pg_hba.write(backup_file):
|
|
module.set_fs_attributes_if_different(file_args, True, pg_hba.diff,
|
|
expand=False)
|
|
except PgHbaError as error:
|
|
module.fail_json(msg='Error writing file:\n{0}'.format(error))
|
|
if pg_hba.last_backup:
|
|
ret['backup_file'] = pg_hba.last_backup
|
|
|
|
ret['pg_hba'] = list(pg_hba.get_rules())
|
|
module.exit_json(**ret)
|
|
|
|
|
|
if __name__ == '__main__':
|
|
main()
|