mirror of
https://github.com/ansible-collections/community.mysql.git
synced 2025-04-05 10:10:32 -07:00
* add option subtract_privs to mysql_role and mysql_user see https://github.com/ansible-collections/community.mysql/issues/331 * add integration tests for subtract_privs for mysql_role and mysql_user * add changelog fragment for PR #333 * mysql_role, mysql_user: when subtract_privileges, don't grant unwanted privileges and don't revoke USAGE implicitly * fix integration tests * mysql_role, mysql_user: invalid privileges are ignored when subtract_privs is true -> document that and fix integration tests * fix mysql_role integration tests * fix mysql_role, mysql_user integration tests * formatting make the PEP8 check happy * mysql_user and mysql_role: fix granting privileges when only the GRANT OPTION needs to be added * mysql_user and mysql_role: log some updated privileges; explain integration test blind spot * mysql_user and mysql_role: don't grant too much privileges If only the grant option needs to be granted, at least one privilege needs to be granted to get valid syntax. USAGE is better for that than the existing privileges, because unwanted privileges would be re-added after revokation. * mysql_user and mysql_role: fix type error * Update changelogs/fragments/333-mysql_user-mysql_role-add-subtract_privileges-argument.yml Co-authored-by: Andrew Klychkov <aaklychkov@mail.ru> * Update plugins/modules/mysql_role.py Co-authored-by: Andrew Klychkov <aaklychkov@mail.ru> * Update plugins/modules/mysql_user.py Co-authored-by: Andrew Klychkov <aaklychkov@mail.ru> Co-authored-by: Felix Hamme <felix.hamme@ionos.com> Co-authored-by: Andrew Klychkov <aaklychkov@mail.ru>
205 lines
6.9 KiB
YAML
205 lines
6.9 KiB
YAML
# test code for privileges for mysql_user module
|
|
# (c) 2014, Wayne Rosario <wrosario@ansible.com>
|
|
|
|
# This file is part of Ansible
|
|
#
|
|
# Ansible is free software: you can redistribute it and/or modify
|
|
# it under the terms of the GNU General Public License as published by
|
|
# the Free Software Foundation, either version 3 of the License, or
|
|
# (at your option) any later version.
|
|
#
|
|
# Ansible is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU General Public License
|
|
# along with Ansible. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
- vars:
|
|
mysql_parameters: &mysql_params
|
|
login_user: '{{ mysql_user }}'
|
|
login_password: '{{ mysql_password }}'
|
|
login_host: 127.0.0.1
|
|
login_port: '{{ mysql_primary_port }}'
|
|
|
|
block:
|
|
|
|
# ============================================================
|
|
- name: create user with basic select privileges
|
|
mysql_user:
|
|
<<: *mysql_params
|
|
name: '{{ user_name_2 }}'
|
|
password: '{{ user_password_2 }}'
|
|
priv: '*.*:SELECT'
|
|
state: present
|
|
when: current_append_privs == "yes"
|
|
|
|
- include: assert_user.yml user_name={{user_name_2}} priv='SELECT'
|
|
when: current_append_privs == "yes"
|
|
|
|
- name: create user with current privileges (expect changed=true)
|
|
mysql_user:
|
|
<<: *mysql_params
|
|
name: '{{ user_name_2 }}'
|
|
password: '{{ user_password_2 }}'
|
|
priv: '*.*:{{current_privilege}}'
|
|
append_privs: '{{current_append_privs}}'
|
|
state: present
|
|
register: result
|
|
|
|
- name: assert output message for current privileges
|
|
assert:
|
|
that:
|
|
- "result.changed == true"
|
|
|
|
- name: run command to show privileges for user (expect privileges in stdout)
|
|
command: "{{ mysql_command }} -e \"SHOW GRANTS FOR '{{user_name_2}}'@'localhost'\""
|
|
register: result
|
|
|
|
- name: assert user has correct privileges
|
|
assert:
|
|
that:
|
|
- "'GRANT {{current_privilege | replace(',', ', ')}} ON *.*' in result.stdout"
|
|
when: current_append_privs == "no"
|
|
|
|
- name: assert user has correct privileges
|
|
assert:
|
|
that:
|
|
- "'GRANT SELECT, {{current_privilege | replace(',', ', ')}} ON *.*' in result.stdout"
|
|
when: current_append_privs == "yes"
|
|
|
|
- name: create database using user current privileges
|
|
mysql_db:
|
|
login_user: '{{ user_name_2 }}'
|
|
login_password: '{{ user_password_2 }}'
|
|
login_host: '{{ mysql_host }}'
|
|
login_port: '{{ mysql_primary_port }}'
|
|
name: '{{ db_name }}'
|
|
state: present
|
|
ignore_errors: true
|
|
|
|
- name: run command to test that database was not created
|
|
command: "{{ mysql_command }} -e \"show databases like '{{ db_name }}'\""
|
|
register: result
|
|
|
|
- name: assert database was not created
|
|
assert:
|
|
that:
|
|
- "'{{ db_name }}' not in result.stdout"
|
|
|
|
# ============================================================
|
|
- name: Add privs to a specific table (expect changed)
|
|
mysql_user:
|
|
<<: *mysql_params
|
|
name: '{{ user_name_2 }}'
|
|
password: '{{ user_password_2 }}'
|
|
priv: 'jmainguy.jmainguy:ALL'
|
|
state: present
|
|
register: result
|
|
|
|
- name: Assert that priv changed
|
|
assert:
|
|
that:
|
|
- "result.changed == true"
|
|
|
|
- name: Add privs to a specific table (expect ok)
|
|
mysql_user:
|
|
<<: *mysql_params
|
|
name: '{{ user_name_2 }}'
|
|
password: '{{ user_password_2 }}'
|
|
priv: 'jmainguy.jmainguy:ALL'
|
|
state: present
|
|
register: result
|
|
|
|
- name: Assert that priv did not change
|
|
assert:
|
|
that:
|
|
- "result.changed == false"
|
|
|
|
# ============================================================
|
|
- name: update user with all privileges
|
|
mysql_user:
|
|
<<: *mysql_params
|
|
name: '{{ user_name_2 }}'
|
|
password: '{{ user_password_2 }}'
|
|
priv: '*.*:ALL'
|
|
state: present
|
|
|
|
# - include: assert_user.yml user_name={{user_name_2}} priv='ALL PRIVILEGES'
|
|
|
|
- name: create database using user
|
|
mysql_db:
|
|
login_user: '{{ user_name_2 }}'
|
|
login_password: '{{ user_password_2 }}'
|
|
login_host: '{{ mysql_host }}'
|
|
login_port: '{{ mysql_primary_port }}'
|
|
name: '{{ db_name }}'
|
|
state: present
|
|
|
|
- name: run command to test database was created using user new privileges
|
|
command: "{{ mysql_command }} -e \"SHOW CREATE DATABASE {{ db_name }}\""
|
|
|
|
- name: drop database using user
|
|
mysql_db:
|
|
login_user: '{{ user_name_2 }}'
|
|
login_password: '{{ user_password_2 }}'
|
|
login_host: '{{ mysql_host }}'
|
|
login_port: '{{ mysql_primary_port }}'
|
|
name: '{{ db_name }}'
|
|
state: absent
|
|
|
|
# ============================================================
|
|
- name: update user with a long privileges list (mysql has a special multiline grant output)
|
|
mysql_user:
|
|
<<: *mysql_params
|
|
name: '{{ user_name_2 }}'
|
|
password: '{{ user_password_2 }}'
|
|
priv: '*.*:CREATE USER,FILE,PROCESS,RELOAD,REPLICATION CLIENT,REPLICATION SLAVE,SHOW DATABASES,SHUTDOWN,SUPER,CREATE,DROP,EVENT,LOCK TABLES,INSERT,UPDATE,DELETE,SELECT,SHOW VIEW,GRANT'
|
|
state: present
|
|
register: result
|
|
|
|
- name: Assert that priv changed
|
|
assert:
|
|
that:
|
|
- "result.changed == true"
|
|
|
|
- name: Test idempotency (expect ok)
|
|
mysql_user:
|
|
<<: *mysql_params
|
|
name: '{{ user_name_2 }}'
|
|
password: '{{ user_password_2 }}'
|
|
priv: '*.*:CREATE USER,FILE,PROCESS,RELOAD,REPLICATION CLIENT,REPLICATION SLAVE,SHOW DATABASES,SHUTDOWN,SUPER,CREATE,DROP,EVENT,LOCK TABLES,INSERT,UPDATE,DELETE,SELECT,SHOW VIEW,GRANT'
|
|
state: present
|
|
register: result
|
|
|
|
# FIXME: on mariadb >=10.5.2 there's always a change because the REPLICATION CLIENT privilege was renamed to BINLOG MONITOR
|
|
- name: Assert that priv did not change
|
|
assert:
|
|
that:
|
|
- "result.changed == false"
|
|
when: install_type == 'mysql' or (install_type == 'mariadb' and mariadb_version is version('10.2', '=='))
|
|
|
|
# ============================================================
|
|
- name: update user with invalid privileges
|
|
mysql_user:
|
|
<<: *mysql_params
|
|
name: '{{ user_name_2 }}'
|
|
password: '{{ user_password_2 }}'
|
|
priv: '*.*:INVALID'
|
|
state: present
|
|
register: result
|
|
ignore_errors: yes
|
|
|
|
- name: Assert that priv did not change
|
|
assert:
|
|
that:
|
|
- result is failed
|
|
- "'Error granting privileges' in result.msg"
|
|
|
|
- name: remove username
|
|
mysql_user:
|
|
<<: *mysql_params
|
|
name: '{{ user_name_2 }}'
|
|
password: '{{ user_password_2 }}'
|
|
state: absent
|