mirror of
https://github.com/freeipa/ansible-freeipa.git
synced 2026-03-27 05:43:05 +00:00
Most of ipapwpolicy parameters can be set to an empty string ("") so
that the policy is not applied to pwpolicy. This was not refelected on
the documentation.
This change adds 'or ""' to all the fields that can be disabled by
setting it to an empty string. Also, `data types were reviewed and fixed.
436 lines
14 KiB
Python
436 lines
14 KiB
Python
# -*- coding: utf-8 -*-
|
|
|
|
# Authors:
|
|
# Thomas Woerner <twoerner@redhat.com>
|
|
# Rafael Guterres Jeffman <rjeffman@redhat.com>
|
|
#
|
|
# Copyright (C) 2019-2022 Red Hat
|
|
# see file 'COPYING' for use and warranty information
|
|
#
|
|
# This program is free software; you can redistribute it and/or modify
|
|
# it under the terms of the GNU General Public License as published by
|
|
# the Free Software Foundation, either version 3 of the License, or
|
|
# (at your option) any later version.
|
|
#
|
|
# This program is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU General Public License
|
|
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
from __future__ import (absolute_import, division, print_function)
|
|
|
|
__metaclass__ = type
|
|
|
|
ANSIBLE_METADATA = {
|
|
"metadata_version": "1.0",
|
|
"supported_by": "community",
|
|
"status": ["preview"],
|
|
}
|
|
|
|
DOCUMENTATION = """
|
|
---
|
|
module: ipapwpolicy
|
|
short_description: Manage FreeIPA pwpolicies
|
|
description: Manage FreeIPA pwpolicies
|
|
extends_documentation_fragment:
|
|
- ipamodule_base_docs
|
|
options:
|
|
name:
|
|
description: The group name
|
|
type: list
|
|
elements: str
|
|
required: false
|
|
aliases: ["cn"]
|
|
maxlife:
|
|
description: Maximum password lifetime (in days). (int or "")
|
|
type: str
|
|
required: false
|
|
aliases: ["krbmaxpwdlife"]
|
|
minlife:
|
|
description: Minimum password lifetime (in hours). (int or "")
|
|
type: str
|
|
required: false
|
|
aliases: ["krbminpwdlife"]
|
|
history:
|
|
description: Password history size. (int or "")
|
|
type: str
|
|
required: false
|
|
aliases: ["krbpwdhistorylength"]
|
|
minclasses:
|
|
description: Minimum number of character classes. (int or "")
|
|
type: str
|
|
required: false
|
|
aliases: ["krbpwdmindiffchars"]
|
|
minlength:
|
|
description: Minimum length of password. (int or "")
|
|
type: str
|
|
required: false
|
|
aliases: ["krbpwdminlength"]
|
|
priority:
|
|
description: >
|
|
Priority of the policy (higher number means lower priority). (int or "")
|
|
type: str
|
|
required: false
|
|
aliases: ["cospriority"]
|
|
maxfail:
|
|
description: Consecutive failures before lockout. (int or "")
|
|
type: str
|
|
required: false
|
|
aliases: ["krbpwdmaxfailure"]
|
|
failinterval:
|
|
description: >
|
|
Period after which failure count will be reset (seconds). (int or "")
|
|
type: str
|
|
required: false
|
|
aliases: ["krbpwdfailurecountinterval"]
|
|
lockouttime:
|
|
description: Period for which lockout is enforced (seconds). (int or "")
|
|
type: str
|
|
required: false
|
|
aliases: ["krbpwdlockoutduration"]
|
|
maxrepeat:
|
|
description: >
|
|
Maximum number of same consecutive characters.
|
|
Requires IPA 4.9+. (int or "")
|
|
type: str
|
|
required: false
|
|
aliases: ["ipapwdmaxrepeat"]
|
|
maxsequence:
|
|
description: >
|
|
The maximum length of monotonic character sequences (abcd).
|
|
Requires IPA 4.9+. (int or "")
|
|
type: str
|
|
required: false
|
|
aliases: ["ipapwdmaxsequence"]
|
|
dictcheck:
|
|
description: >
|
|
Check if the password is a dictionary word.
|
|
Requires IPA 4.9+. (bool or "")
|
|
type: str
|
|
required: false
|
|
aliases: ["ipapwdictcheck"]
|
|
usercheck:
|
|
description: >
|
|
Check if the password contains the username.
|
|
Requires IPA 4.9+. (bool or "")
|
|
type: str
|
|
required: false
|
|
aliases: ["ipapwdusercheck"]
|
|
gracelimit:
|
|
description: >
|
|
Number of LDAP authentications allowed after expiration.
|
|
Requires IPA 4.10.1+. (int or "")
|
|
type: str
|
|
required: false
|
|
aliases: ["passwordgracelimit"]
|
|
state:
|
|
description: State to ensure
|
|
type: str
|
|
default: present
|
|
choices: ["present", "absent"]
|
|
author:
|
|
- Thomas Woerner (@t-woerner)
|
|
- Rafael Guterres Jeffman (@rjeffman)
|
|
"""
|
|
|
|
EXAMPLES = """
|
|
# Ensure pwpolicy is set for ops
|
|
- ipapwpolicy:
|
|
ipaadmin_password: SomeADMINpassword
|
|
name: ops
|
|
minlife: 7
|
|
maxlife: 49
|
|
history: 5
|
|
priority: 1
|
|
lockouttime: 300
|
|
minlength: 8
|
|
"""
|
|
|
|
RETURN = """
|
|
"""
|
|
|
|
from ansible.module_utils.ansible_freeipa_module import \
|
|
IPAAnsibleModule, compare_args_ipa, boolean
|
|
|
|
|
|
def find_pwpolicy(module, name):
|
|
_args = {
|
|
"all": True,
|
|
"cn": name,
|
|
}
|
|
|
|
_result = module.ipa_command("pwpolicy_find", name, _args)
|
|
|
|
if len(_result["result"]) > 1:
|
|
module.fail_json(
|
|
msg="There is more than one pwpolicy '%s'" % (name))
|
|
elif len(_result["result"]) == 1:
|
|
return _result["result"][0]
|
|
|
|
return None
|
|
|
|
|
|
def gen_args(module,
|
|
maxlife, minlife, history, minclasses, minlength, priority,
|
|
maxfail, failinterval, lockouttime, maxrepeat, maxsequence,
|
|
dictcheck, usercheck, gracelimit):
|
|
_args = {}
|
|
if maxlife is not None:
|
|
_args["krbmaxpwdlife"] = maxlife
|
|
if minlife is not None:
|
|
_args["krbminpwdlife"] = minlife
|
|
if history is not None:
|
|
_args["krbpwdhistorylength"] = history
|
|
if minclasses is not None:
|
|
_args["krbpwdmindiffchars"] = minclasses
|
|
if minlength is not None:
|
|
_args["krbpwdminlength"] = minlength
|
|
if priority is not None:
|
|
_args["cospriority"] = priority
|
|
if maxfail is not None:
|
|
_args["krbpwdmaxfailure"] = maxfail
|
|
if failinterval is not None:
|
|
_args["krbpwdfailurecountinterval"] = failinterval
|
|
if lockouttime is not None:
|
|
_args["krbpwdlockoutduration"] = lockouttime
|
|
if maxrepeat is not None:
|
|
_args["ipapwdmaxrepeat"] = maxrepeat
|
|
if maxsequence is not None:
|
|
_args["ipapwdmaxsequence"] = maxsequence
|
|
if dictcheck is not None:
|
|
if module.ipa_check_version("<", "4.9.10"):
|
|
# Allowed values: "TRUE", "FALSE", ""
|
|
_args["ipapwddictcheck"] = "TRUE" if dictcheck is True else \
|
|
"FALSE" if dictcheck is False else dictcheck
|
|
else:
|
|
_args["ipapwddictcheck"] = dictcheck
|
|
if usercheck is not None:
|
|
if module.ipa_check_version("<", "4.9.10"):
|
|
# Allowed values: "TRUE", "FALSE", ""
|
|
_args["ipapwdusercheck"] = "TRUE" if usercheck is True else \
|
|
"FALSE" if usercheck is False else usercheck
|
|
else:
|
|
_args["ipapwdusercheck"] = usercheck
|
|
if gracelimit is not None:
|
|
_args["passwordgracelimit"] = gracelimit
|
|
|
|
return _args
|
|
|
|
|
|
def check_supported_params(
|
|
module, maxrepeat, maxsequence, dictcheck, usercheck, gracelimit
|
|
):
|
|
# All password checking parameters were added by the same commit,
|
|
# so we only need to test one of them.
|
|
has_password_check = module.ipa_command_param_exists(
|
|
"pwpolicy_add", "ipapwdmaxrepeat")
|
|
# check if gracelimit is supported
|
|
has_gracelimit = module.ipa_command_param_exists(
|
|
"pwpolicy_add", "passwordgracelimit")
|
|
|
|
# If needed, report unsupported password checking paramteres
|
|
if (
|
|
not has_password_check
|
|
and any([maxrepeat, maxsequence, dictcheck, usercheck])
|
|
):
|
|
module.fail_json(
|
|
msg="Your IPA version does not support arguments: "
|
|
"maxrepeat, maxsequence, dictcheck, usercheck.")
|
|
|
|
if not has_gracelimit and gracelimit is not None:
|
|
module.fail_json(
|
|
msg="Your IPA version does not support 'gracelimit'.")
|
|
|
|
|
|
def main():
|
|
ansible_module = IPAAnsibleModule(
|
|
argument_spec=dict(
|
|
# general
|
|
name=dict(type="list", elements="str", aliases=["cn"],
|
|
default=None, required=False),
|
|
# present
|
|
|
|
maxlife=dict(type="str", aliases=["krbmaxpwdlife"], default=None),
|
|
minlife=dict(type="str", aliases=["krbminpwdlife"], default=None),
|
|
history=dict(type="str", aliases=["krbpwdhistorylength"],
|
|
default=None),
|
|
minclasses=dict(type="str", aliases=["krbpwdmindiffchars"],
|
|
default=None),
|
|
minlength=dict(type="str", aliases=["krbpwdminlength"],
|
|
default=None),
|
|
priority=dict(type="str", aliases=["cospriority"], default=None),
|
|
maxfail=dict(type="str", aliases=["krbpwdmaxfailure"],
|
|
default=None),
|
|
failinterval=dict(type="str",
|
|
aliases=["krbpwdfailurecountinterval"],
|
|
default=None),
|
|
lockouttime=dict(type="str", aliases=["krbpwdlockoutduration"],
|
|
default=None),
|
|
maxrepeat=dict(type="str", aliases=["ipapwdmaxrepeat"],
|
|
default=None),
|
|
maxsequence=dict(type="str", aliases=["ipapwdmaxsequence"],
|
|
default=None),
|
|
dictcheck=dict(type="str", aliases=["ipapwdictcheck"],
|
|
default=None),
|
|
usercheck=dict(type="str", aliases=["ipapwdusercheck"],
|
|
default=None),
|
|
gracelimit=dict(type="str", aliases=["passwordgracelimit"],
|
|
default=None),
|
|
# state
|
|
state=dict(type="str", default="present",
|
|
choices=["present", "absent"]),
|
|
),
|
|
supports_check_mode=True,
|
|
)
|
|
|
|
ansible_module._ansible_debug = True
|
|
|
|
# Get parameters
|
|
|
|
# general
|
|
names = ansible_module.params_get("name")
|
|
|
|
# present
|
|
maxlife = ansible_module.params_get("maxlife")
|
|
minlife = ansible_module.params_get("minlife")
|
|
history = ansible_module.params_get("history")
|
|
minclasses = ansible_module.params_get("minclasses")
|
|
minlength = ansible_module.params_get("minlength")
|
|
priority = ansible_module.params_get("priority")
|
|
maxfail = ansible_module.params_get("maxfail")
|
|
failinterval = ansible_module.params_get("failinterval")
|
|
lockouttime = ansible_module.params_get("lockouttime")
|
|
maxrepeat = ansible_module.params_get("maxrepeat")
|
|
maxsequence = ansible_module.params_get("maxsequence")
|
|
dictcheck = ansible_module.params_get("dictcheck")
|
|
usercheck = ansible_module.params_get("usercheck")
|
|
gracelimit = ansible_module.params_get("gracelimit")
|
|
|
|
# state
|
|
state = ansible_module.params_get("state")
|
|
|
|
# Check parameters
|
|
invalid = []
|
|
|
|
if names is None:
|
|
names = [u"global_policy"]
|
|
|
|
if state == "present":
|
|
if len(names) != 1:
|
|
ansible_module.fail_json(
|
|
msg="Only one pwpolicy can be set at a time.")
|
|
|
|
if state == "absent":
|
|
if len(names) < 1:
|
|
ansible_module.fail_json(msg="No name given.")
|
|
if "global_policy" in names:
|
|
ansible_module.fail_json(
|
|
msg="'global_policy' can not be made absent.")
|
|
invalid = ["maxlife", "minlife", "history", "minclasses",
|
|
"minlength", "priority", "maxfail", "failinterval",
|
|
"lockouttime", "maxrepeat", "maxsequence", "dictcheck",
|
|
"usercheck", "gracelimit"]
|
|
|
|
ansible_module.params_fail_used_invalid(invalid, state)
|
|
|
|
# Ensure parameter values are valid and have proper type.
|
|
def int_or_empty_param(value, param):
|
|
if value is not None and value != "":
|
|
try:
|
|
value = int(value)
|
|
except ValueError:
|
|
ansible_module.fail_json(
|
|
msg="Invalid value '%s' for argument '%s'" % (value, param)
|
|
)
|
|
return value
|
|
|
|
maxlife = int_or_empty_param(maxlife, "maxlife")
|
|
minlife = int_or_empty_param(minlife, "minlife")
|
|
history = int_or_empty_param(history, "history")
|
|
minclasses = int_or_empty_param(minclasses, "minclasses")
|
|
minlength = int_or_empty_param(minlength, "minlength")
|
|
priority = int_or_empty_param(priority, "priority")
|
|
maxfail = int_or_empty_param(maxfail, "maxfail")
|
|
failinterval = int_or_empty_param(failinterval, "failinterval")
|
|
lockouttime = int_or_empty_param(lockouttime, "lockouttime")
|
|
maxrepeat = int_or_empty_param(maxrepeat, "maxrepeat")
|
|
maxsequence = int_or_empty_param(maxsequence, "maxsequence")
|
|
gracelimit = int_or_empty_param(gracelimit, "gracelimit")
|
|
|
|
def bool_or_empty_param(value, param): # pylint: disable=R1710
|
|
if value is None or value == "":
|
|
return value
|
|
try:
|
|
return boolean(value)
|
|
except TypeError as terr:
|
|
ansible_module.fail_json(msg="Param '%s': %s" % (param, str(terr)))
|
|
|
|
dictcheck = bool_or_empty_param(dictcheck, "dictcheck")
|
|
usercheck = bool_or_empty_param(usercheck, "usercheck")
|
|
|
|
# Ensure gracelimit has proper limit.
|
|
if gracelimit:
|
|
if gracelimit < -1:
|
|
ansible_module.fail_json(
|
|
msg="'gracelimit' must be no less than -1")
|
|
|
|
# Init
|
|
|
|
changed = False
|
|
exit_args = {}
|
|
|
|
with ansible_module.ipa_connect():
|
|
|
|
check_supported_params(
|
|
ansible_module, maxrepeat, maxsequence, dictcheck, usercheck,
|
|
gracelimit
|
|
)
|
|
|
|
commands = []
|
|
|
|
for name in names:
|
|
# Try to find pwpolicy
|
|
res_find = find_pwpolicy(ansible_module, name)
|
|
|
|
# Create command
|
|
if state == "present":
|
|
# Generate args
|
|
args = gen_args(ansible_module,
|
|
maxlife, minlife, history, minclasses,
|
|
minlength, priority, maxfail, failinterval,
|
|
lockouttime, maxrepeat, maxsequence, dictcheck,
|
|
usercheck, gracelimit)
|
|
|
|
# Found the pwpolicy
|
|
if res_find is not None:
|
|
# For all settings is args, check if there are
|
|
# different settings in the find result.
|
|
# If yes: modify
|
|
if not compare_args_ipa(ansible_module, args,
|
|
res_find):
|
|
commands.append([name, "pwpolicy_mod", args])
|
|
else:
|
|
commands.append([name, "pwpolicy_add", args])
|
|
|
|
elif state == "absent":
|
|
if res_find is not None:
|
|
commands.append([name, "pwpolicy_del", {}])
|
|
|
|
else:
|
|
ansible_module.fail_json(msg="Unkown state '%s'" % state)
|
|
|
|
# Execute commands
|
|
|
|
changed = ansible_module.execute_ipa_commands(commands)
|
|
|
|
# Done
|
|
|
|
ansible_module.exit_json(changed=changed, **exit_args)
|
|
|
|
|
|
if __name__ == "__main__":
|
|
main()
|