mirror of
https://github.com/ansible-collections/community.general.git
synced 2025-04-24 11:21:25 -07:00
* openstack: standardize tls params * tower: tower_verify_ssl->validate_certs * docker: use standard tls config params - cacert_path -> ca_cert - cert_path -> client_cert - key_path -> client_key - tls_verify -> validate_certs * k8s: standardize tls connection params - verify_ssl -> validate_certs - ssl_ca_cert -> ca_cert - cert_file -> client_cert - key_file -> client_key * ingate: verify_ssl -> validate_certs * manageiq: standardize tls params - verify_ssl -> validate_certs - ca_bundle_path -> ca_cert * mysql: standardize tls params - ssl_ca -> ca_cert - ssl_cert -> client_cert - ssl_key -> client_key * nios: ssl_verify -> validate_certs * postgresql: ssl_rootcert -> ca_cert * rabbitmq: standardize tls params - cacert -> ca_cert - cert -> client_cert - key -> client_key * rackspace: verify_ssl -> validate_certs * vca: verify_certs -> validate_certs * kubevirt_cdi_upload: upload_host_verify_ssl -> upload_host_validate_certs * lxd: standardize tls params - key_file -> client_key - cert_file -> client_cert * get_certificate: ca_certs -> ca_cert * get_certificate.py: clarify one or more certs in a file Co-Authored-By: jamescassell <code@james.cassell.me> * zabbix: tls_issuer -> ca_cert * bigip_device_auth_ldap: standardize tls params - ssl_check_peer -> validate_certs - ssl_client_cert -> client_cert - ssl_client_key -> client_key - ssl_ca_cert -> ca_cert * vdirect: vdirect_validate_certs -> validate_certs * mqtt: standardize tls params - ca_certs -> ca_cert - certfile -> client_cert - keyfile -> client_key * pulp_repo: standardize tls params remove `importer_ssl` prefix * rhn_register: sslcacert -> ca_cert * yum_repository: standardize tls params The fix for yum_repository is not straightforward since this module is only a thin wrapper for the underlying commands and config. In this case, we add the new values as aliases, keeping the old as primary, only due to the internal structure of the module. Aliases added: - sslcacert -> ca_cert - sslclientcert -> client_cert - sslclientkey -> client_key - sslverify -> validate_certs * gitlab_hook: enable_ssl_verification -> hook_validate_certs * Adjust arguments for docker_swarm inventory plugin. * foreman callback: standardize tls params - ssl_cert -> client_cert - ssl_key -> client_key * grafana_annotations: validate_grafana_certs -> validate_certs * nrdp callback: validate_nrdp_certs -> validate_certs * kubectl connection: standardize tls params - kubectl_cert_file -> client_cert - kubectl_key_file -> client_key - kubectl_ssl_ca_cert -> ca_cert - kubectl_verify_ssl -> validate_certs * oc connection: standardize tls params - oc_cert_file -> client_cert - oc_key_file -> client_key - oc_ssl_ca_cert -> ca_cert - oc_verify_ssl -> validate_certs * psrp connection: cert_trust_path -> ca_cert TODO: cert_validation -> validate_certs (multi-valued vs bool) * k8s inventory: standardize tls params - cert_file -> client_cert - key_file -> client_key - ca_cert -> ca_cert - verify_ssl -> validate_certs * openshift inventory: standardize tls params - cert_file -> client_cert - key_file -> client_key - ca_cert -> ca_cert - verify_ssl -> validate_certs * tower inventory: verify_ssl -> validate_certs * hashi_vault lookup: cacert -> ca_cert * k8s lookup: standardize tls params - cert_file -> client_cert - key_file -> client_key - ca_cert -> ca_cert - verify_ssl -> validate_certs * laps_passord lookup: cacert_file -> ca_cert * changelog for TLS parameter standardization
358 lines
11 KiB
Python
358 lines
11 KiB
Python
#!/usr/bin/python
|
|
# -*- coding: utf-8 -*-
|
|
|
|
# Copyright: (c) 2016, Ansible Project
|
|
# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt)
|
|
|
|
from __future__ import absolute_import, division, print_function
|
|
__metaclass__ = type
|
|
|
|
ANSIBLE_METADATA = {'metadata_version': '1.1',
|
|
'status': ['preview'],
|
|
'supported_by': 'community'}
|
|
|
|
DOCUMENTATION = r'''
|
|
---
|
|
module: postgresql_schema
|
|
short_description: Add or remove PostgreSQL schema
|
|
description:
|
|
- Add or remove PostgreSQL schema.
|
|
version_added: '2.3'
|
|
options:
|
|
name:
|
|
description:
|
|
- Name of the schema to add or remove.
|
|
required: true
|
|
type: str
|
|
database:
|
|
description:
|
|
- Name of the database to connect to and add or remove the schema.
|
|
type: str
|
|
default: postgres
|
|
aliases:
|
|
- db
|
|
- login_db
|
|
login_user:
|
|
description:
|
|
- The username used to authenticate with.
|
|
type: str
|
|
login_password:
|
|
description:
|
|
- The password used to authenticate with.
|
|
type: str
|
|
login_host:
|
|
description:
|
|
- Host running the database.
|
|
type: str
|
|
default: localhost
|
|
login_unix_socket:
|
|
description:
|
|
- Path to a Unix domain socket for local connections.
|
|
type: str
|
|
owner:
|
|
description:
|
|
- Name of the role to set as owner of the schema.
|
|
type: str
|
|
port:
|
|
description:
|
|
- Database port to connect to.
|
|
type: int
|
|
default: 5432
|
|
aliases:
|
|
- login_port
|
|
session_role:
|
|
version_added: '2.8'
|
|
description:
|
|
- Switch to session_role after connecting.
|
|
- The specified session_role must be a role that the current login_user is a member of.
|
|
- Permissions checking for SQL commands is carried out as though the session_role
|
|
were the one that had logged in originally.
|
|
type: str
|
|
state:
|
|
description:
|
|
- The schema state.
|
|
type: str
|
|
default: present
|
|
choices: [ absent, present ]
|
|
cascade_drop:
|
|
description:
|
|
- Drop schema with CASCADE to remove child objects.
|
|
type: bool
|
|
default: false
|
|
version_added: '2.8'
|
|
ssl_mode:
|
|
description:
|
|
- Determines whether or with what priority a secure SSL TCP/IP connection
|
|
will be negotiated with the server.
|
|
- See U(https://www.postgresql.org/docs/current/static/libpq-ssl.html) for
|
|
more information on the modes.
|
|
- Default of C(prefer) matches libpq default.
|
|
type: str
|
|
default: prefer
|
|
choices: [ allow, disable, prefer, require, verify-ca, verify-full ]
|
|
version_added: '2.8'
|
|
ca_cert:
|
|
description:
|
|
- Specifies the name of a file containing SSL certificate authority (CA) certificate(s).
|
|
- If the file exists, the server's certificate will be verified to be signed by one of these authorities.
|
|
type: str
|
|
version_added: '2.8'
|
|
aliases: [ ssl_rootcert ]
|
|
notes:
|
|
- This module uses I(psycopg2), a Python PostgreSQL database adapter.
|
|
- You must ensure that psycopg2 is installed on the host before using this module.
|
|
- If the remote host is the PostgreSQL server (which is the default case),
|
|
then PostgreSQL must also be installed on the remote host.
|
|
- For Ubuntu-based systems, install the C(postgresql), C(libpq-dev),
|
|
and C(python-psycopg2) packages on the remote host before using this module.
|
|
requirements: [ psycopg2 ]
|
|
author:
|
|
- Flavien Chantelot (@Dorn-) <contact@flavien.io>
|
|
- Thomas O'Donnell (@andytom)
|
|
'''
|
|
|
|
EXAMPLES = r'''
|
|
- name: Create a new schema with name acme in test database
|
|
postgresql_schema:
|
|
db: test
|
|
name: acme
|
|
|
|
- name: Create a new schema acme with a user bob who will own it
|
|
postgresql_schema:
|
|
name: acme
|
|
owner: bob
|
|
|
|
- name: Drop schema "acme" with cascade
|
|
postgresql_schema:
|
|
name: acme
|
|
ensure: absent
|
|
cascade_drop: yes
|
|
'''
|
|
|
|
RETURN = r'''
|
|
schema:
|
|
description: Name of the schema.
|
|
returned: success, changed
|
|
type: str
|
|
sample: "acme"
|
|
queries:
|
|
description: List of executed queries.
|
|
returned: always
|
|
type: list
|
|
sample: ["CREATE SCHEMA \"acme\""]
|
|
'''
|
|
|
|
import traceback
|
|
|
|
PSYCOPG2_IMP_ERR = None
|
|
try:
|
|
import psycopg2
|
|
import psycopg2.extras
|
|
HAS_PSYCOPG2 = True
|
|
except ImportError:
|
|
PSYCOPG2_IMP_ERR = traceback.format_exc()
|
|
HAS_PSYCOPG2 = False
|
|
|
|
from ansible.module_utils.basic import AnsibleModule, missing_required_lib
|
|
from ansible.module_utils.postgres import postgres_common_argument_spec
|
|
from ansible.module_utils.database import SQLParseError, pg_quote_identifier
|
|
from ansible.module_utils.six import iteritems
|
|
from ansible.module_utils._text import to_native
|
|
|
|
executed_queries = []
|
|
|
|
|
|
class NotSupportedError(Exception):
|
|
pass
|
|
|
|
|
|
# ===========================================
|
|
# PostgreSQL module specific support methods.
|
|
#
|
|
|
|
def set_owner(cursor, schema, owner):
|
|
query = "ALTER SCHEMA %s OWNER TO %s" % (
|
|
pg_quote_identifier(schema, 'schema'),
|
|
pg_quote_identifier(owner, 'role'))
|
|
cursor.execute(query)
|
|
executed_queries.append(query)
|
|
return True
|
|
|
|
|
|
def get_schema_info(cursor, schema):
|
|
query = ("SELECT schema_owner AS owner "
|
|
"FROM information_schema.schemata "
|
|
"WHERE schema_name = '%s'" % schema)
|
|
cursor.execute(query)
|
|
return cursor.fetchone()
|
|
|
|
|
|
def schema_exists(cursor, schema):
|
|
query = ("SELECT schema_name FROM information_schema.schemata "
|
|
"WHERE schema_name = '%s'" % schema)
|
|
cursor.execute(query)
|
|
return cursor.rowcount == 1
|
|
|
|
|
|
def schema_delete(cursor, schema, cascade):
|
|
if schema_exists(cursor, schema):
|
|
query = "DROP SCHEMA %s" % pg_quote_identifier(schema, 'schema')
|
|
if cascade:
|
|
query += " CASCADE"
|
|
cursor.execute(query)
|
|
executed_queries.append(query)
|
|
return True
|
|
else:
|
|
return False
|
|
|
|
|
|
def schema_create(cursor, schema, owner):
|
|
if not schema_exists(cursor, schema):
|
|
query_fragments = ['CREATE SCHEMA %s' % pg_quote_identifier(schema, 'schema')]
|
|
if owner:
|
|
query_fragments.append('AUTHORIZATION %s' % pg_quote_identifier(owner, 'role'))
|
|
query = ' '.join(query_fragments)
|
|
cursor.execute(query)
|
|
executed_queries.append(query)
|
|
return True
|
|
else:
|
|
schema_info = get_schema_info(cursor, schema)
|
|
if owner and owner != schema_info['owner']:
|
|
return set_owner(cursor, schema, owner)
|
|
else:
|
|
return False
|
|
|
|
|
|
def schema_matches(cursor, schema, owner):
|
|
if not schema_exists(cursor, schema):
|
|
return False
|
|
else:
|
|
schema_info = get_schema_info(cursor, schema)
|
|
if owner and owner != schema_info['owner']:
|
|
return False
|
|
else:
|
|
return True
|
|
|
|
# ===========================================
|
|
# Module execution.
|
|
#
|
|
|
|
|
|
def main():
|
|
argument_spec = postgres_common_argument_spec()
|
|
argument_spec.update(
|
|
login_user=dict(type="str", default="postgres"),
|
|
login_password=dict(type="str", default="", no_log=True),
|
|
login_host=dict(type="str", default=""),
|
|
login_unix_socket=dict(type="str", default=""),
|
|
port=dict(type="int", default=5432, aliases=["login_port"]),
|
|
schema=dict(type="str", required=True, aliases=['name']),
|
|
owner=dict(type="str", default=""),
|
|
database=dict(type="str", default="postgres", aliases=["db", "login_db"]),
|
|
cascade_drop=dict(type="bool", default=False),
|
|
state=dict(type="str", default="present", choices=["absent", "present"]),
|
|
ssl_mode=dict(type="str", default='prefer', choices=[
|
|
'disable', 'allow', 'prefer', 'require', 'verify-ca', 'verify-full']),
|
|
ca_cert=dict(type="str", default=None, aliases=['ssl_rootcert']),
|
|
session_role=dict(type="str"),
|
|
)
|
|
|
|
module = AnsibleModule(
|
|
argument_spec=argument_spec,
|
|
supports_check_mode=True,
|
|
)
|
|
|
|
if not HAS_PSYCOPG2:
|
|
module.fail_json(msg=missing_required_lib('psycopg2'), exception=PSYCOPG2_IMP_ERR)
|
|
|
|
schema = module.params["schema"]
|
|
owner = module.params["owner"]
|
|
state = module.params["state"]
|
|
sslrootcert = module.params["ca_cert"]
|
|
cascade_drop = module.params["cascade_drop"]
|
|
session_role = module.params["session_role"]
|
|
changed = False
|
|
|
|
# To use defaults values, keyword arguments must be absent, so
|
|
# check which values are empty and don't include in the **kw
|
|
# dictionary
|
|
params_map = {
|
|
"login_host": "host",
|
|
"login_user": "user",
|
|
"login_password": "password",
|
|
"port": "port",
|
|
"database": "database",
|
|
"ssl_mode": "sslmode",
|
|
"ca_cert": "sslrootcert"
|
|
}
|
|
kw = dict((params_map[k], v) for (k, v) in iteritems(module.params)
|
|
if k in params_map and v != "" and v is not None)
|
|
|
|
# If a login_unix_socket is specified, incorporate it here.
|
|
is_localhost = "host" not in kw or kw["host"] == "" or kw["host"] == "localhost"
|
|
if is_localhost and module.params["login_unix_socket"] != "":
|
|
kw["host"] = module.params["login_unix_socket"]
|
|
|
|
if psycopg2.__version__ < '2.4.3' and sslrootcert is not None:
|
|
module.fail_json(
|
|
msg='psycopg2 must be at least 2.4.3 in order to user the ca_cert parameter')
|
|
|
|
try:
|
|
db_connection = psycopg2.connect(**kw)
|
|
# Enable autocommit so we can create databases
|
|
if psycopg2.__version__ >= '2.4.2':
|
|
db_connection.autocommit = True
|
|
else:
|
|
db_connection.set_isolation_level(psycopg2
|
|
.extensions
|
|
.ISOLATION_LEVEL_AUTOCOMMIT)
|
|
cursor = db_connection.cursor(
|
|
cursor_factory=psycopg2.extras.DictCursor)
|
|
|
|
except TypeError as e:
|
|
if 'sslrootcert' in e.args[0]:
|
|
module.fail_json(
|
|
msg='Postgresql server must be at least version 8.4 to support sslrootcert')
|
|
module.fail_json(msg="unable to connect to database: %s" % to_native(e), exception=traceback.format_exc())
|
|
|
|
except Exception as e:
|
|
module.fail_json(msg="unable to connect to database: %s" % to_native(e), exception=traceback.format_exc())
|
|
|
|
if session_role:
|
|
try:
|
|
cursor.execute('SET ROLE %s' % pg_quote_identifier(session_role, 'role'))
|
|
except Exception as e:
|
|
module.fail_json(msg="Could not switch role: %s" % to_native(e), exception=traceback.format_exc())
|
|
|
|
try:
|
|
if module.check_mode:
|
|
if state == "absent":
|
|
changed = not schema_exists(cursor, schema)
|
|
elif state == "present":
|
|
changed = not schema_matches(cursor, schema, owner)
|
|
module.exit_json(changed=changed, schema=schema)
|
|
|
|
if state == "absent":
|
|
try:
|
|
changed = schema_delete(cursor, schema, cascade_drop)
|
|
except SQLParseError as e:
|
|
module.fail_json(msg=to_native(e), exception=traceback.format_exc())
|
|
|
|
elif state == "present":
|
|
try:
|
|
changed = schema_create(cursor, schema, owner)
|
|
except SQLParseError as e:
|
|
module.fail_json(msg=to_native(e), exception=traceback.format_exc())
|
|
except NotSupportedError as e:
|
|
module.fail_json(msg=to_native(e), exception=traceback.format_exc())
|
|
except SystemExit:
|
|
# Avoid catching this on Python 2.4
|
|
raise
|
|
except Exception as e:
|
|
module.fail_json(msg="Database query failed: %s" % to_native(e), exception=traceback.format_exc())
|
|
|
|
module.exit_json(changed=changed, schema=schema, queries=executed_queries)
|
|
|
|
|
|
if __name__ == '__main__':
|
|
main()
|