mirror of
https://github.com/freeipa/ansible-freeipa.git
synced 2026-03-27 05:43:05 +00:00
FreeIPA provides a default hbacsvcgroup named "Sudo", with capital 'S', that is different from every other hbacsvcgroup, which are all represented by lower case letters. As data from IPA API was not modified, this causes an idempotence error when using different capitalization with the 'hbacsvcgroup' parameter. This patch fixes the issue by using the CaseInsensitive comparator to create the hbacsvcgroup list. Tests were update to make sure a regression is not included in the future.
589 lines
22 KiB
Python
589 lines
22 KiB
Python
# -*- coding: utf-8 -*-
|
|
|
|
# Authors:
|
|
# Thomas Woerner <twoerner@redhat.com>
|
|
#
|
|
# Copyright (C) 2019-2022 Red Hat
|
|
# see file 'COPYING' for use and warranty information
|
|
#
|
|
# This program is free software; you can redistribute it and/or modify
|
|
# it under the terms of the GNU General Public License as published by
|
|
# the Free Software Foundation, either version 3 of the License, or
|
|
# (at your option) any later version.
|
|
#
|
|
# This program is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU General Public License
|
|
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
from __future__ import (absolute_import, division, print_function)
|
|
|
|
__metaclass__ = type
|
|
|
|
ANSIBLE_METADATA = {
|
|
"metadata_version": "1.0",
|
|
"supported_by": "community",
|
|
"status": ["preview"],
|
|
}
|
|
|
|
DOCUMENTATION = """
|
|
---
|
|
module: ipahbacrule
|
|
short_description: Manage FreeIPA HBAC rules
|
|
description: Manage FreeIPA HBAC rules
|
|
extends_documentation_fragment:
|
|
- ipamodule_base_docs
|
|
options:
|
|
name:
|
|
description: The hbacrule name
|
|
type: list
|
|
elements: str
|
|
required: true
|
|
aliases: ["cn"]
|
|
description:
|
|
description: The hbacrule description
|
|
type: str
|
|
required: false
|
|
usercategory:
|
|
description: User category the rule applies to
|
|
type: str
|
|
required: false
|
|
aliases: ["usercat"]
|
|
choices: ["all", ""]
|
|
hostcategory:
|
|
description: Host category the rule applies to
|
|
type: str
|
|
required: false
|
|
aliases: ["hostcat"]
|
|
choices: ["all", ""]
|
|
servicecategory:
|
|
description: Service category the rule applies to
|
|
type: str
|
|
required: false
|
|
aliases: ["servicecat"]
|
|
choices: ["all", ""]
|
|
nomembers:
|
|
description: Suppress processing of membership attributes
|
|
required: false
|
|
type: bool
|
|
host:
|
|
description: List of host names assigned to this hbacrule.
|
|
required: false
|
|
type: list
|
|
elements: str
|
|
hostgroup:
|
|
description: List of host groups assigned to this hbacrule.
|
|
required: false
|
|
type: list
|
|
elements: str
|
|
hbacsvc:
|
|
description: List of HBAC service names assigned to this hbacrule.
|
|
required: false
|
|
type: list
|
|
elements: str
|
|
hbacsvcgroup:
|
|
description: List of HBAC service names assigned to this hbacrule.
|
|
required: false
|
|
type: list
|
|
elements: str
|
|
user:
|
|
description: List of user names assigned to this hbacrule.
|
|
required: false
|
|
type: list
|
|
elements: str
|
|
group:
|
|
description: List of user groups assigned to this hbacrule.
|
|
required: false
|
|
type: list
|
|
elements: str
|
|
action:
|
|
description: Work on hbacrule or member level
|
|
type: str
|
|
default: hbacrule
|
|
choices: ["member", "hbacrule"]
|
|
state:
|
|
description: State to ensure
|
|
type: str
|
|
default: present
|
|
choices: ["present", "absent", "enabled", "disabled"]
|
|
author:
|
|
- Thomas Woerner (@t-woerner)
|
|
"""
|
|
|
|
EXAMPLES = """
|
|
# Ensure HBAC Rule allhosts is present
|
|
- ipahbacrule:
|
|
ipaadmin_password: SomeADMINpassword
|
|
name: allhosts
|
|
usercategory: all
|
|
|
|
# Ensure host server is present in HBAC Rule allhosts
|
|
- ipahbacrule:
|
|
ipaadmin_password: SomeADMINpassword
|
|
name: allhosts
|
|
host: server
|
|
action: member
|
|
|
|
# Ensure HBAC Rule sshd-pinky is present
|
|
- ipahbacrule:
|
|
ipaadmin_password: SomeADMINpassword
|
|
name: sshd-pinky
|
|
hostcategory: all
|
|
|
|
# Ensure user pinky is present in HBAC Rule sshd-pinky
|
|
- ipahbacrule:
|
|
ipaadmin_password: SomeADMINpassword
|
|
name: sshd-pinky
|
|
user: pinky
|
|
action: member
|
|
|
|
# Ensure HBAC service sshd is present in HBAC Rule sshd-pinky
|
|
- ipahbacrule:
|
|
ipaadmin_password: SomeADMINpassword
|
|
name: sshd-pinky
|
|
hbacsvc: sshd
|
|
action: member
|
|
|
|
# Ensure HBAC Rule sshd-pinky is disabled
|
|
- ipahbacrule:
|
|
ipaadmin_password: SomeADMINpassword
|
|
name: sshd-pinky
|
|
state: disabled
|
|
|
|
# Ensure HBAC Rule sshd-pinky is enabled
|
|
- ipahbacrule:
|
|
ipaadmin_password: SomeADMINpassword
|
|
name: sshd-pinky
|
|
state: enabled
|
|
|
|
# Ensure HBAC Rule sshd-pinky is absent
|
|
- ipahbacrule:
|
|
ipaadmin_password: SomeADMINpassword
|
|
name: sshd-pinky
|
|
state: absent
|
|
"""
|
|
|
|
RETURN = """
|
|
"""
|
|
|
|
from ansible.module_utils.ansible_freeipa_module import \
|
|
IPAAnsibleModule, compare_args_ipa, gen_add_del_lists, gen_add_list, \
|
|
gen_intersection_list, ensure_fqdn
|
|
|
|
|
|
def find_hbacrule(module, name):
|
|
_args = {
|
|
"all": True,
|
|
"cn": name,
|
|
}
|
|
|
|
_result = module.ipa_command("hbacrule_find", name, _args)
|
|
|
|
if len(_result["result"]) > 1:
|
|
module.fail_json(
|
|
msg="There is more than one hbacrule '%s'" % (name))
|
|
elif len(_result["result"]) == 1:
|
|
res = _result["result"][0]
|
|
# hbacsvcgroup names are converted to lower case while creation with
|
|
# hbacsvcgroup_add, but builtin names may have mixed case as "Sudo",
|
|
# breaking the lower case comparison. Therefore all
|
|
# memberservice_hbacsvcgroup items are converted to lower case.
|
|
# (See: https://pagure.io/freeipa/issue/9464).
|
|
_member = "memberservice_hbacsvcgroup"
|
|
if _member in res:
|
|
res[_member] = [item.lower() for item in res[_member]]
|
|
return res
|
|
|
|
return None
|
|
|
|
|
|
def gen_args(description, usercategory, hostcategory, servicecategory,
|
|
nomembers):
|
|
_args = {}
|
|
if description is not None:
|
|
_args["description"] = description
|
|
if usercategory is not None:
|
|
_args["usercategory"] = usercategory
|
|
if hostcategory is not None:
|
|
_args["hostcategory"] = hostcategory
|
|
if servicecategory is not None:
|
|
_args["servicecategory"] = servicecategory
|
|
if nomembers is not None:
|
|
_args["nomembers"] = nomembers
|
|
|
|
return _args
|
|
|
|
|
|
def main():
|
|
ansible_module = IPAAnsibleModule(
|
|
argument_spec=dict(
|
|
# general
|
|
name=dict(type="list", elements="str", aliases=["cn"],
|
|
required=True),
|
|
# present
|
|
description=dict(type="str", default=None),
|
|
usercategory=dict(type="str", default=None,
|
|
aliases=["usercat"], choices=["all", ""]),
|
|
hostcategory=dict(type="str", default=None,
|
|
aliases=["hostcat"], choices=["all", ""]),
|
|
servicecategory=dict(type="str", default=None,
|
|
aliases=["servicecat"], choices=["all", ""]),
|
|
nomembers=dict(required=False, type='bool', default=None),
|
|
host=dict(required=False, type='list', elements="str",
|
|
default=None),
|
|
hostgroup=dict(required=False, type='list', elements="str",
|
|
default=None),
|
|
hbacsvc=dict(required=False, type='list', elements="str",
|
|
default=None),
|
|
hbacsvcgroup=dict(required=False, type='list', elements="str",
|
|
default=None),
|
|
user=dict(required=False, type='list', elements="str",
|
|
default=None),
|
|
group=dict(required=False, type='list', elements="str",
|
|
default=None),
|
|
action=dict(type="str", default="hbacrule",
|
|
choices=["member", "hbacrule"]),
|
|
# state
|
|
state=dict(type="str", default="present",
|
|
choices=["present", "absent",
|
|
"enabled", "disabled"]),
|
|
),
|
|
supports_check_mode=True,
|
|
)
|
|
|
|
ansible_module._ansible_debug = True
|
|
|
|
# Get parameters
|
|
|
|
# general
|
|
names = ansible_module.params_get("name")
|
|
|
|
# present
|
|
description = ansible_module.params_get("description")
|
|
usercategory = ansible_module.params_get("usercategory")
|
|
hostcategory = ansible_module.params_get("hostcategory")
|
|
servicecategory = ansible_module.params_get("servicecategory")
|
|
nomembers = ansible_module.params_get("nomembers")
|
|
host = ansible_module.params_get_lowercase("host")
|
|
hostgroup = ansible_module.params_get_lowercase("hostgroup")
|
|
hbacsvc = ansible_module.params_get_lowercase("hbacsvc")
|
|
hbacsvcgroup = ansible_module.params_get_lowercase("hbacsvcgroup")
|
|
user = ansible_module.params_get_lowercase("user")
|
|
group = ansible_module.params_get_lowercase("group")
|
|
action = ansible_module.params_get("action")
|
|
# state
|
|
state = ansible_module.params_get("state")
|
|
|
|
# Check parameters
|
|
|
|
invalid = []
|
|
|
|
if state == "present":
|
|
if len(names) != 1:
|
|
ansible_module.fail_json(
|
|
msg="Only one hbacrule can be added at a time.")
|
|
if action == "member":
|
|
invalid = ["description", "usercategory", "hostcategory",
|
|
"servicecategory", "nomembers"]
|
|
else:
|
|
if hostcategory == 'all' and any([host, hostgroup]):
|
|
ansible_module.fail_json(
|
|
msg="Hosts cannot be added when host category='all'")
|
|
if usercategory == 'all' and any([user, group]):
|
|
ansible_module.fail_json(
|
|
msg="Users cannot be added when user category='all'")
|
|
if servicecategory == 'all' and any([hbacsvc, hbacsvcgroup]):
|
|
ansible_module.fail_json(
|
|
msg="Services cannot be added when service category='all'")
|
|
|
|
elif state == "absent":
|
|
if len(names) < 1:
|
|
ansible_module.fail_json(msg="No name given.")
|
|
invalid = ["description", "usercategory", "hostcategory",
|
|
"servicecategory", "nomembers"]
|
|
if action == "hbacrule":
|
|
invalid.extend(["host", "hostgroup", "hbacsvc", "hbacsvcgroup",
|
|
"user", "group"])
|
|
|
|
elif state in ["enabled", "disabled"]:
|
|
if len(names) < 1:
|
|
ansible_module.fail_json(msg="No name given.")
|
|
if action == "member":
|
|
ansible_module.fail_json(
|
|
msg="Action member can not be used with states enabled and "
|
|
"disabled")
|
|
invalid = ["description", "usercategory", "hostcategory",
|
|
"servicecategory", "nomembers", "host", "hostgroup",
|
|
"hbacsvc", "hbacsvcgroup", "user", "group"]
|
|
else:
|
|
ansible_module.fail_json(msg="Invalid state '%s'" % state)
|
|
|
|
ansible_module.params_fail_used_invalid(invalid, state, action)
|
|
|
|
# Init
|
|
|
|
changed = False
|
|
exit_args = {}
|
|
|
|
# Connect to IPA API
|
|
with ansible_module.ipa_connect():
|
|
|
|
# Get default domain
|
|
default_domain = ansible_module.ipa_get_domain()
|
|
|
|
# Ensure fqdn host names, use default domain for simple names
|
|
if host is not None:
|
|
_host = [ensure_fqdn(x, default_domain).lower() for x in host]
|
|
host = _host
|
|
|
|
commands = []
|
|
|
|
for name in names:
|
|
# Make sure hbacrule exists
|
|
res_find = find_hbacrule(ansible_module, name)
|
|
|
|
host_add, host_del = [], []
|
|
hostgroup_add, hostgroup_del = [], []
|
|
hbacsvc_add, hbacsvc_del = [], []
|
|
hbacsvcgroup_add, hbacsvcgroup_del = [], []
|
|
user_add, user_del = [], []
|
|
group_add, group_del = [], []
|
|
|
|
# Create command
|
|
if state == "present":
|
|
# Generate args
|
|
args = gen_args(description, usercategory, hostcategory,
|
|
servicecategory, nomembers)
|
|
|
|
if action == "hbacrule":
|
|
# Found the hbacrule
|
|
if res_find is not None:
|
|
# Remove usercategory, hostcategory and
|
|
# servicecategory from args if "" and category
|
|
# not in res_find (needed for idempotency)
|
|
if "usercategory" in args and \
|
|
args["usercategory"] == "" and \
|
|
"usercategory" not in res_find:
|
|
del args["usercategory"]
|
|
if "hostcategory" in args and \
|
|
args["hostcategory"] == "" and \
|
|
"hostcategory" not in res_find:
|
|
del args["hostcategory"]
|
|
if "servicecategory" in args and \
|
|
args["servicecategory"] == "" and \
|
|
"servicecategory" not in res_find:
|
|
del args["servicecategory"]
|
|
|
|
# For all settings is args, check if there are
|
|
# different settings in the find result.
|
|
# If yes: modify
|
|
if not compare_args_ipa(ansible_module, args,
|
|
res_find):
|
|
commands.append([name, "hbacrule_mod", args])
|
|
else:
|
|
commands.append([name, "hbacrule_add", args])
|
|
# Set res_find to empty dict for next step
|
|
res_find = {}
|
|
|
|
# Generate addition and removal lists
|
|
if host is not None:
|
|
host_add, host_del = gen_add_del_lists(
|
|
host, res_find.get("memberhost_host"))
|
|
|
|
if hostgroup is not None:
|
|
hostgroup_add, hostgroup_del = gen_add_del_lists(
|
|
hostgroup, res_find.get("memberhost_hostgroup"))
|
|
|
|
if hbacsvc is not None:
|
|
hbacsvc_add, hbacsvc_del = gen_add_del_lists(
|
|
hbacsvc, res_find.get("memberservice_hbacsvc"),
|
|
)
|
|
|
|
if hbacsvcgroup is not None:
|
|
hbacsvcgroup_add, hbacsvcgroup_del = gen_add_del_lists(
|
|
hbacsvcgroup,
|
|
res_find.get("memberservice_hbacsvcgroup"))
|
|
|
|
if user is not None:
|
|
user_add, user_del = gen_add_del_lists(
|
|
user, res_find.get("memberuser_user"))
|
|
|
|
if group is not None:
|
|
group_add, group_del = gen_add_del_lists(
|
|
group, res_find.get("memberuser_group"))
|
|
|
|
elif action == "member":
|
|
if res_find is None:
|
|
ansible_module.fail_json(msg="No hbacrule '%s'" % name)
|
|
|
|
# Generate add lists for host, hostgroup and
|
|
# res_find to only try to add hosts and hostgroups
|
|
# that not in hbacrule already
|
|
if host:
|
|
host_add = gen_add_list(
|
|
host, res_find.get("memberhost_host"))
|
|
if hostgroup:
|
|
hostgroup_add = gen_add_list(
|
|
hostgroup, res_find.get("memberhost_hostgroup"))
|
|
|
|
# Generate add lists for hbacsvc, hbacsvcgroup and
|
|
# res_find to only try to add hbacsvcs and hbacsvcgroups
|
|
# that not in hbacrule already
|
|
if hbacsvc:
|
|
hbacsvc_add = gen_add_list(
|
|
hbacsvc, res_find.get("memberservice_hbacsvc"))
|
|
if hbacsvcgroup:
|
|
hbacsvcgroup_add = gen_add_list(
|
|
hbacsvcgroup,
|
|
res_find.get("memberservice_hbacsvcgroup"))
|
|
|
|
# Generate add lists for user, group and
|
|
# res_find to only try to add users and groups
|
|
# that not in hbacrule already
|
|
if user:
|
|
user_add = gen_add_list(
|
|
user, res_find.get("memberuser_user"))
|
|
if group:
|
|
group_add = gen_add_list(
|
|
group, res_find.get("memberuser_group"))
|
|
|
|
elif state == "absent":
|
|
if action == "hbacrule":
|
|
if res_find is not None:
|
|
commands.append([name, "hbacrule_del", {}])
|
|
|
|
elif action == "member":
|
|
if res_find is None:
|
|
ansible_module.fail_json(msg="No hbacrule '%s'" % name)
|
|
|
|
# Generate intersection lists for host, hostgroup and
|
|
# res_find to only try to remove hosts and hostgroups
|
|
# that are in hbacrule
|
|
if host:
|
|
if "memberhost_host" in res_find:
|
|
host_del = gen_intersection_list(
|
|
host, res_find["memberhost_host"])
|
|
if hostgroup:
|
|
if "memberhost_hostgroup" in res_find:
|
|
hostgroup_del = gen_intersection_list(
|
|
hostgroup, res_find["memberhost_hostgroup"])
|
|
|
|
# Generate intersection lists for hbacsvc, hbacsvcgroup
|
|
# and res_find to only try to remove hbacsvcs and
|
|
# hbacsvcgroups that are in hbacrule
|
|
if hbacsvc:
|
|
if "memberservice_hbacsvc" in res_find:
|
|
hbacsvc_del = gen_intersection_list(
|
|
hbacsvc, res_find["memberservice_hbacsvc"])
|
|
if hbacsvcgroup:
|
|
if "memberservice_hbacsvcgroup" in res_find:
|
|
hbacsvcgroup_del = gen_intersection_list(
|
|
hbacsvcgroup,
|
|
res_find["memberservice_hbacsvcgroup"])
|
|
|
|
# Generate intersection lists for user, group and
|
|
# res_find to only try to remove users and groups
|
|
# that are in hbacrule
|
|
if user:
|
|
if "memberuser_user" in res_find:
|
|
user_del = gen_intersection_list(
|
|
user, res_find["memberuser_user"])
|
|
if group:
|
|
if "memberuser_group" in res_find:
|
|
group_del = gen_intersection_list(
|
|
group, res_find["memberuser_group"])
|
|
|
|
elif state == "enabled":
|
|
if res_find is None:
|
|
ansible_module.fail_json(msg="No hbacrule '%s'" % name)
|
|
# hbacrule_enable is not failing on an enabled hbacrule
|
|
# Therefore it is needed to have a look at the ipaenabledflag
|
|
# in res_find.
|
|
# FreeIPA 4.9.10+ and 4.10 use proper mapping for
|
|
# boolean values, so we need to convert it to str
|
|
# for comparison.
|
|
# See: https://github.com/freeipa/freeipa/pull/6294
|
|
enabled_flag = str(res_find.get("ipaenabledflag", [False])[0])
|
|
if enabled_flag.upper() != "TRUE":
|
|
commands.append([name, "hbacrule_enable", {}])
|
|
|
|
elif state == "disabled":
|
|
if res_find is None:
|
|
ansible_module.fail_json(msg="No hbacrule '%s'" % name)
|
|
# hbacrule_disable is not failing on an enabled hbacrule
|
|
# Therefore it is needed to have a look at the ipaenabledflag
|
|
# in res_find.
|
|
# FreeIPA 4.9.10+ and 4.10 use proper mapping for
|
|
# boolean values, so we need to convert it to str
|
|
# for comparison.
|
|
# See: https://github.com/freeipa/freeipa/pull/6294
|
|
enabled_flag = str(res_find.get("ipaenabledflag", [False])[0])
|
|
if enabled_flag.upper() != "FALSE":
|
|
commands.append([name, "hbacrule_disable", {}])
|
|
|
|
else:
|
|
ansible_module.fail_json(msg="Unkown state '%s'" % state)
|
|
|
|
# Manage HBAC rule members.
|
|
|
|
# Add hosts and hostgroups
|
|
if len(host_add) > 0 or len(hostgroup_add) > 0:
|
|
commands.append([name, "hbacrule_add_host",
|
|
{
|
|
"host": host_add,
|
|
"hostgroup": hostgroup_add,
|
|
}])
|
|
# Remove hosts and hostgroups
|
|
if len(host_del) > 0 or len(hostgroup_del) > 0:
|
|
commands.append([name, "hbacrule_remove_host",
|
|
{
|
|
"host": host_del,
|
|
"hostgroup": hostgroup_del,
|
|
}])
|
|
|
|
# Add hbacsvcs and hbacsvcgroups
|
|
if len(hbacsvc_add) > 0 or len(hbacsvcgroup_add) > 0:
|
|
commands.append([name, "hbacrule_add_service",
|
|
{
|
|
"hbacsvc": hbacsvc_add,
|
|
"hbacsvcgroup": hbacsvcgroup_add,
|
|
}])
|
|
# Remove hbacsvcs and hbacsvcgroups
|
|
if len(hbacsvc_del) > 0 or len(hbacsvcgroup_del) > 0:
|
|
commands.append([name, "hbacrule_remove_service",
|
|
{
|
|
"hbacsvc": hbacsvc_del,
|
|
"hbacsvcgroup": hbacsvcgroup_del,
|
|
}])
|
|
|
|
# Add users and groups
|
|
if len(user_add) > 0 or len(group_add) > 0:
|
|
commands.append([name, "hbacrule_add_user",
|
|
{
|
|
"user": user_add,
|
|
"group": group_add,
|
|
}])
|
|
# Remove users and groups
|
|
if len(user_del) > 0 or len(group_del) > 0:
|
|
commands.append([name, "hbacrule_remove_user",
|
|
{
|
|
"user": user_del,
|
|
"group": group_del,
|
|
}])
|
|
|
|
# Execute commands
|
|
|
|
changed = ansible_module.execute_ipa_commands(
|
|
commands, fail_on_member_errors=True)
|
|
|
|
# Done
|
|
|
|
ansible_module.exit_json(changed=changed, **exit_args)
|
|
|
|
|
|
if __name__ == "__main__":
|
|
main()
|