ansible/library/cloud/rax_keypair

207 lines
5.8 KiB
Text
Raw Normal View History

2013-11-19 17:52:54 +01:00
#!/usr/bin/python -tt
# This file is part of Ansible
#
# Ansible is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# Ansible is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with Ansible. If not, see <http://www.gnu.org/licenses/>.
DOCUMENTATION = '''
---
module: rax_keypair
short_description: Create a keypair for use with Rackspace Cloud Servers
description:
- Create a keypair for use with Rackspace Cloud Servers
version_added: 1.5
options:
api_key:
description:
- Rackspace API key (overrides I(credentials))
aliases:
- password
auth_endpoint:
description:
- The URI of the authentication service
default: https://identity.api.rackspacecloud.com/v2.0/
version_added: 1.5
2013-11-19 17:52:54 +01:00
credentials:
description:
- File to find the Rackspace credentials in (ignored if I(api_key) and
I(username) are provided)
2013-11-19 17:52:54 +01:00
default: null
aliases:
- creds_file
env:
description:
- Environment as configured in ~/.pyrax.cfg,
see https://github.com/rackspace/pyrax/blob/master/docs/getting_started.md#pyrax-configuration
version_added: 1.5
identity_type:
description:
- Authentication machanism to use, such as rackspace or keystone
default: rackspace
version_added: 1.5
region:
description:
- Region to create an instance in
default: DFW
tenant_id:
description:
- The tenant ID used for authentication
version_added: 1.5
tenant_name:
description:
- The tenant name used for authentication
version_added: 1.5
username:
description:
- Rackspace username (overrides I(credentials))
verify_ssl:
description:
- Whether or not to require SSL validation of API endpoints
version_added: 1.5
2013-11-19 17:52:54 +01:00
name:
description:
- Name of keypair
required: true
public_key:
description:
- Public Key string to upload
default: null
state:
description:
- Indicate desired state of the resource
choices: ['present', 'absent']
default: present
requirements: [ "pyrax" ]
author: Matt Martz
notes:
- The following environment variables can be used, C(RAX_USERNAME),
C(RAX_API_KEY), C(RAX_CREDS_FILE), C(RAX_CREDENTIALS), C(RAX_REGION).
- C(RAX_CREDENTIALS) and C(RAX_CREDS_FILE) points to a credentials file
appropriate for pyrax. See U(https://github.com/rackspace/pyrax/blob/master/docs/getting_started.md#authenticating)
- C(RAX_USERNAME) and C(RAX_API_KEY) obviate the use of a credentials file
- C(RAX_REGION) defines a Rackspace Public Cloud region (DFW, ORD, LON, ...)
- Keypairs cannot be manipulated, only created and deleted. To "update" a
keypair you must first delete and then recreate.
'''
EXAMPLES = '''
- name: Create a keypair
hosts: local
gather_facts: False
tasks:
- name: keypair request
local_action:
module: rax_keypair
credentials: ~/.raxpub
name: my_keypair
region: DFW
register: keypair
- name: Create local public key
local_action:
module: copy
content: "{{ keypair.keypair.public_key }}"
dest: "{{ inventory_dir }}/{{ keypair.keypair.name }}.pub"
- name: Create local private key
local_action:
module: copy
content: "{{ keypair.keypair.private_key }}"
dest: "{{ inventory_dir }}/{{ keypair.keypair.name }}"
'''
import sys
from types import NoneType
try:
import pyrax
except ImportError:
print("failed=True msg='pyrax required for this module'")
sys.exit(1)
NON_CALLABLES = (basestring, bool, dict, int, list, NoneType)
def to_dict(obj):
instance = {}
for key in dir(obj):
value = getattr(obj, key)
if (isinstance(value, NON_CALLABLES) and not key.startswith('_')):
instance[key] = value
return instance
def rax_keypair(module, name, public_key, state):
changed = False
cs = pyrax.cloudservers
keypair = {}
if state == 'present':
try:
keypair = cs.keypairs.find(name=name)
except cs.exceptions.NotFound:
2013-11-19 17:52:54 +01:00
try:
keypair = cs.keypairs.create(name, public_key)
changed = True
except Exception, e:
module.fail_json(msg='%s' % e.message)
except Exception, e:
module.fail_json(msg='%s' % e.message)
elif state == 'absent':
try:
keypair = cs.keypairs.find(name=name)
except:
pass
if keypair:
try:
keypair.delete()
changed = True
except Exception, e:
module.fail_json(msg='%s' % e.message)
module.exit_json(changed=changed, keypair=to_dict(keypair))
def main():
2013-12-02 21:03:10 +01:00
argument_spec = rax_argument_spec()
argument_spec.update(
dict(
2013-11-19 17:52:54 +01:00
name=dict(),
public_key=dict(),
state=dict(default='present', choices=['absent', 'present']),
2013-12-02 21:03:10 +01:00
)
)
module = AnsibleModule(
argument_spec=argument_spec,
required_together=rax_required_together(),
2013-11-19 17:52:54 +01:00
)
name = module.params.get('name')
public_key = module.params.get('public_key')
state = module.params.get('state')
2013-12-02 21:03:10 +01:00
setup_rax_module(module, pyrax)
2013-11-19 17:52:54 +01:00
rax_keypair(module, name, public_key, state)
2013-12-02 21:03:10 +01:00
# import module snippets
2013-11-19 17:52:54 +01:00
from ansible.module_utils.basic import *
2013-12-02 21:03:10 +01:00
from ansible.module_utils.rax import *
2013-11-19 17:52:54 +01:00
2013-12-02 21:03:10 +01:00
### invoke the module
2013-11-19 17:52:54 +01:00
main()