mirror of
https://github.com/ansible-collections/community.general.git
synced 2025-10-12 03:14:24 -07:00
Changes to the metadata format were approved here: https://github.com/ansible/proposals/issues/54 * Update documentation to the new metadata format * Changes to metadata-tool to account for new metadata * Add GPL license header * Add upgrade subcommand to upgrade metadata version * Change default metadata to the new format * Fix exclusion of non-modules from the metadata report * Fix ansible-doc for new module metadata * Exclude metadata version from ansible-doc output * Fix website docs generation for the new metadata * Update metadata schema in valiate-modules test * Update the metadata in all modules to the new version
180 lines
5.5 KiB
Python
180 lines
5.5 KiB
Python
#!/usr/bin/python
|
|
#
|
|
# This is a free software: you can redistribute it and/or modify
|
|
# it under the terms of the GNU General Public License as published by
|
|
# the Free Software Foundation, either version 3 of the License, or
|
|
# (at your option) any later version.
|
|
#
|
|
# This Ansible library is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU General Public License
|
|
# along with this library. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
ANSIBLE_METADATA = {'metadata_version': '1.0',
|
|
'status': ['preview'],
|
|
'supported_by': 'community'}
|
|
|
|
|
|
DOCUMENTATION = '''
|
|
---
|
|
module: ec2_win_password
|
|
short_description: gets the default administrator password for ec2 windows instances
|
|
description:
|
|
- Gets the default administrator password from any EC2 Windows instance. The instance is referenced by its id (e.g. i-XXXXXXX). This module has a dependency on python-boto.
|
|
version_added: "2.0"
|
|
author: "Rick Mendes (@rickmendes)"
|
|
options:
|
|
instance_id:
|
|
description:
|
|
- The instance id to get the password data from.
|
|
required: true
|
|
key_file:
|
|
description:
|
|
- Path to the file containing the key pair used on the instance.
|
|
required: true
|
|
key_passphrase:
|
|
version_added: "2.0"
|
|
description:
|
|
- The passphrase for the instance key pair. The key must use DES or 3DES encryption for this module to decrypt it. You can use openssl to convert your password protected keys if they do not use DES or 3DES. ex) openssl rsa -in current_key -out new_key -des3.
|
|
required: false
|
|
default: null
|
|
wait:
|
|
version_added: "2.0"
|
|
description:
|
|
- Whether or not to wait for the password to be available before returning.
|
|
required: false
|
|
default: "no"
|
|
choices: [ "yes", "no" ]
|
|
wait_timeout:
|
|
version_added: "2.0"
|
|
description:
|
|
- Number of seconds to wait before giving up.
|
|
required: false
|
|
default: 120
|
|
|
|
extends_documentation_fragment:
|
|
- aws
|
|
- ec2
|
|
'''
|
|
|
|
EXAMPLES = '''
|
|
# Example of getting a password
|
|
tasks:
|
|
- name: get the Administrator password
|
|
ec2_win_password:
|
|
profile: my-boto-profile
|
|
instance_id: i-XXXXXX
|
|
region: us-east-1
|
|
key_file: "~/aws-creds/my_test_key.pem"
|
|
|
|
# Example of getting a password with a password protected key
|
|
tasks:
|
|
- name: get the Administrator password
|
|
ec2_win_password:
|
|
profile: my-boto-profile
|
|
instance_id: i-XXXXXX
|
|
region: us-east-1
|
|
key_file: "~/aws-creds/my_protected_test_key.pem"
|
|
key_passphrase: "secret"
|
|
|
|
# Example of waiting for a password
|
|
tasks:
|
|
- name: get the Administrator password
|
|
ec2_win_password:
|
|
profile: my-boto-profile
|
|
instance_id: i-XXXXXX
|
|
region: us-east-1
|
|
key_file: "~/aws-creds/my_test_key.pem"
|
|
wait: yes
|
|
wait_timeout: 45
|
|
'''
|
|
|
|
from base64 import b64decode
|
|
from Crypto.Cipher import PKCS1_v1_5
|
|
from Crypto.PublicKey import RSA
|
|
import datetime
|
|
|
|
try:
|
|
import boto.ec2
|
|
HAS_BOTO = True
|
|
except ImportError:
|
|
HAS_BOTO = False
|
|
|
|
def main():
|
|
argument_spec = ec2_argument_spec()
|
|
argument_spec.update(dict(
|
|
instance_id = dict(required=True),
|
|
key_file = dict(required=True, type='path'),
|
|
key_passphrase = dict(no_log=True, default=None, required=False),
|
|
wait = dict(type='bool', default=False, required=False),
|
|
wait_timeout = dict(default=120, required=False),
|
|
)
|
|
)
|
|
module = AnsibleModule(argument_spec=argument_spec)
|
|
|
|
if not HAS_BOTO:
|
|
module.fail_json(msg='Boto required for this module.')
|
|
|
|
instance_id = module.params.get('instance_id')
|
|
key_file = module.params.get('key_file')
|
|
key_passphrase = module.params.get('key_passphrase')
|
|
wait = module.params.get('wait')
|
|
wait_timeout = int(module.params.get('wait_timeout'))
|
|
|
|
ec2 = ec2_connect(module)
|
|
|
|
if wait:
|
|
start = datetime.datetime.now()
|
|
end = start + datetime.timedelta(seconds=wait_timeout)
|
|
|
|
while datetime.datetime.now() < end:
|
|
data = ec2.get_password_data(instance_id)
|
|
decoded = b64decode(data)
|
|
if wait and not decoded:
|
|
time.sleep(5)
|
|
else:
|
|
break
|
|
else:
|
|
data = ec2.get_password_data(instance_id)
|
|
decoded = b64decode(data)
|
|
|
|
if wait and datetime.datetime.now() >= end:
|
|
module.fail_json(msg = "wait for password timeout after %d seconds" % wait_timeout)
|
|
|
|
try:
|
|
f = open(key_file, 'r')
|
|
except IOError as e:
|
|
module.fail_json(msg = "I/O error (%d) opening key file: %s" % (e.errno, e.strerror))
|
|
else:
|
|
try:
|
|
with f:
|
|
key = RSA.importKey(f.read(), key_passphrase)
|
|
except (ValueError, IndexError, TypeError) as e:
|
|
module.fail_json(msg = "unable to parse key file")
|
|
|
|
cipher = PKCS1_v1_5.new(key)
|
|
sentinel = 'password decryption failed!!!'
|
|
|
|
try:
|
|
decrypted = cipher.decrypt(decoded, sentinel)
|
|
except ValueError as e:
|
|
decrypted = None
|
|
|
|
if decrypted is None:
|
|
module.exit_json(win_password='', changed=False)
|
|
else:
|
|
if wait:
|
|
elapsed = datetime.datetime.now() - start
|
|
module.exit_json(win_password=decrypted, changed=True, elapsed=elapsed.seconds)
|
|
else:
|
|
module.exit_json(win_password=decrypted, changed=True)
|
|
|
|
# import module snippets
|
|
from ansible.module_utils.basic import *
|
|
from ansible.module_utils.ec2 import *
|
|
|
|
if __name__ == '__main__':
|
|
main()
|