ea6c887d6c
Submission includes support for - creating and registering services and checks - reading, writing and lookup for values in consul's kv store - creating and manipulating sessions for distributed locking on values in the kv - creating and manipulating ACLs for restricting access to the kv store - inventory support that reads the Consul catalog and group nodes according to - datacenters - exposed services - service availability - arbitrary groupings from the kv store This submission makes extensive use of the python-consul library and this is required as a dependency and can be installed from pip. The tests were written to target a vagrant cluster which can be setup by following the instructions here http://github.com/sgargan/consul-vagrant
298 lines
8.6 KiB
Python
298 lines
8.6 KiB
Python
#!/usr/bin/python
|
|
#
|
|
# (c) 2015, Steve Gargan <steve.gargan@gmail.com>
|
|
#
|
|
# This file is part of Ansible
|
|
#
|
|
# Ansible is free software: you can redistribute it and/or modify
|
|
# it under the terms of the GNU General Public License as published by
|
|
# the Free Software Foundation, either version 3 of the License, or
|
|
# (at your option) any later version.
|
|
#
|
|
# Ansible is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU General Public License
|
|
# along with Ansible. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
DOCUMENTATION = """
|
|
module: consul_acl
|
|
short_description: "manipulate consul acl keys and rules"
|
|
description:
|
|
- allows the addition, modification and deletion of ACL keys and associated
|
|
rules in a consul cluster via the agent.
|
|
version_added: "1.9"
|
|
author: Steve Gargan (steve.gargan@gmail.com)
|
|
options:
|
|
mgmt_token:
|
|
description:
|
|
- a management token is required to manipulate the acl lists
|
|
state:
|
|
description:
|
|
- whether the ACL pair should be present or absent, defaults to present
|
|
required: false
|
|
choices: ['present', 'absent']
|
|
type:
|
|
description:
|
|
- the type of token that should be created, either management or
|
|
client, defaults to client
|
|
choices: ['client', 'management']
|
|
name:
|
|
description:
|
|
- the name that should be associated with the acl key, this is opaque
|
|
to Consul
|
|
required: false
|
|
token:
|
|
description:
|
|
- the token key indentifying an ACL rule set. If generated by consul
|
|
this will be a UUID.
|
|
required: false
|
|
rules:
|
|
description:
|
|
- an list of the rules that should be associated with a given key/token.
|
|
required: false
|
|
"""
|
|
|
|
EXAMPLES = '''
|
|
- name: create an acl token with rules
|
|
consul_acl:
|
|
mgmt_token: 'some_management_acl'
|
|
host: 'consul1.mycluster.io'
|
|
name: 'Foo access'
|
|
rules:
|
|
- key: 'foo'
|
|
policy: read
|
|
- key: 'private/foo'
|
|
policy: deny
|
|
|
|
- name: remove a token
|
|
consul_acl:
|
|
mgmt_token: 'some_management_acl'
|
|
host: 'consul1.mycluster.io'
|
|
token: '172bd5c8-9fe9-11e4-b1b0-3c15c2c9fd5e'
|
|
state: absent
|
|
'''
|
|
|
|
import sys
|
|
import urllib2
|
|
|
|
try:
|
|
import consul
|
|
except ImportError, e:
|
|
print "failed=True msg='python-consul required for this module. "\
|
|
"see http://python-consul.readthedocs.org/en/latest/#installation'"
|
|
sys.exit(1)
|
|
|
|
try:
|
|
import hcl
|
|
except ImportError:
|
|
print "failed=True msg='pyhcl required for this module."\
|
|
" see https://pypi.python.org/pypi/pyhcl'"
|
|
sys.exit(1)
|
|
|
|
import epdb
|
|
|
|
|
|
def execute(module):
|
|
|
|
state = module.params.get('state')
|
|
|
|
if state == 'present':
|
|
update_acl(module)
|
|
else:
|
|
remove_acl(module)
|
|
|
|
|
|
def update_acl(module):
|
|
|
|
rules = module.params.get('rules')
|
|
state = module.params.get('state')
|
|
token = module.params.get('token')
|
|
token_type = module.params.get('token_type')
|
|
mgmt = module.params.get('mgmt_token')
|
|
name = module.params.get('name')
|
|
consul = get_consul_api(module, mgmt)
|
|
changed = False
|
|
|
|
try:
|
|
|
|
if token:
|
|
existing_rules = load_rules_for_token(module, consul, token)
|
|
supplied_rules = yml_to_rules(module, rules)
|
|
print existing_rules
|
|
print supplied_rules
|
|
changed = not existing_rules == supplied_rules
|
|
if changed:
|
|
y = supplied_rules.to_hcl()
|
|
token = consul.acl.update(
|
|
token,
|
|
name=name,
|
|
type=token_type,
|
|
rules=supplied_rules.to_hcl())
|
|
else:
|
|
try:
|
|
rules = yml_to_rules(module, rules)
|
|
if rules.are_rules():
|
|
rules = rules.to_json()
|
|
else:
|
|
rules = None
|
|
|
|
token = consul.acl.create(
|
|
name=name, type=token_type, rules=rules)
|
|
changed = True
|
|
except Exception, e:
|
|
module.fail_json(
|
|
msg="No token returned, check your managment key and that \
|
|
the host is in the acl datacenter %s" % e)
|
|
except Exception, e:
|
|
module.fail_json(msg="Could not create/update acl %s" % e)
|
|
|
|
module.exit_json(changed=changed,
|
|
token=token,
|
|
rules=rules,
|
|
name=name,
|
|
type=token_type)
|
|
|
|
|
|
def remove_acl(module):
|
|
state = module.params.get('state')
|
|
token = module.params.get('token')
|
|
mgmt = module.params.get('mgmt_token')
|
|
|
|
consul = get_consul_api(module, token=mgmt)
|
|
changed = token and consul.acl.info(token)
|
|
if changed:
|
|
token = consul.acl.destroy(token)
|
|
|
|
module.exit_json(changed=changed, token=token)
|
|
|
|
|
|
def load_rules_for_token(module, consul_api, token):
|
|
try:
|
|
rules = Rules()
|
|
info = consul_api.acl.info(token)
|
|
if info and info['Rules']:
|
|
rule_set = to_ascii(info['Rules'])
|
|
for rule in hcl.loads(rule_set).values():
|
|
for key, policy in rule.iteritems():
|
|
rules.add_rule(Rule(key, policy['policy']))
|
|
return rules
|
|
except Exception, e:
|
|
module.fail_json(
|
|
msg="Could not load rule list from retrieved rule data %s, %s" % (
|
|
token, e))
|
|
|
|
return json_to_rules(module, loaded)
|
|
|
|
def to_ascii(unicode_string):
|
|
if isinstance(unicode_string, unicode):
|
|
return unicode_string.encode('ascii', 'ignore')
|
|
return unicode_string
|
|
|
|
def yml_to_rules(module, yml_rules):
|
|
rules = Rules()
|
|
if yml_rules:
|
|
for rule in yml_rules:
|
|
if not('key' in rule or 'policy' in rule):
|
|
module.fail_json(msg="a rule requires a key and a policy.")
|
|
rules.add_rule(Rule(rule['key'], rule['policy']))
|
|
return rules
|
|
|
|
template = '''key "%s" {
|
|
policy = "%s"
|
|
}'''
|
|
|
|
class Rules:
|
|
|
|
def __init__(self):
|
|
self.rules = {}
|
|
|
|
def add_rule(self, rule):
|
|
self.rules[rule.key] = rule
|
|
|
|
def are_rules(self):
|
|
return len(self.rules) > 0
|
|
|
|
def to_json(self):
|
|
# import epdb; epdb.serve()
|
|
rules = {}
|
|
for key, rule in self.rules.iteritems():
|
|
rules[key] = {'policy': rule.policy}
|
|
return json.dumps({'keys': rules})
|
|
|
|
def to_hcl(self):
|
|
|
|
rules = ""
|
|
for key, rule in self.rules.iteritems():
|
|
rules += template % (key, rule.policy)
|
|
|
|
return to_ascii(rules)
|
|
|
|
def __eq__(self, other):
|
|
if not (other or isinstance(other, self.__class__)
|
|
or len(other.rules) == len(self.rules)):
|
|
return False
|
|
|
|
for name, other_rule in other.rules.iteritems():
|
|
if not name in self.rules:
|
|
return False
|
|
rule = self.rules[name]
|
|
|
|
if not (rule and rule == other_rule):
|
|
return False
|
|
return True
|
|
|
|
def __str__(self):
|
|
return self.to_hcl()
|
|
|
|
class Rule:
|
|
|
|
def __init__(self, key, policy):
|
|
self.key = key
|
|
self.policy = policy
|
|
|
|
def __eq__(self, other):
|
|
return (isinstance(other, self.__class__)
|
|
and self.key == other.key
|
|
and self.policy == other.policy)
|
|
def __hash__(self):
|
|
return hash(self.key) ^ hash(self.policy)
|
|
|
|
def __str__(self):
|
|
return '%s %s' % (self.key, self.policy)
|
|
def get_consul_api(module, token=None):
|
|
if not token:
|
|
token = token = module.params.get('token')
|
|
return consul.Consul(host=module.params.get('host'),
|
|
port=module.params.get('port'),
|
|
token=token)
|
|
|
|
|
|
def main():
|
|
argument_spec = dict(
|
|
mgmt_token=dict(required=True),
|
|
host=dict(default='localhost'),
|
|
name=dict(required=False),
|
|
port=dict(default=8500, type='int'),
|
|
rules=dict(default=None, required=False, type='list'),
|
|
state=dict(default='present', choices=['present', 'absent']),
|
|
token=dict(required=False),
|
|
token_type=dict(
|
|
required=False, choices=['client', 'management'], default='client')
|
|
)
|
|
|
|
module = AnsibleModule(argument_spec, supports_check_mode=True)
|
|
|
|
try:
|
|
execute(module)
|
|
except IOError, e:
|
|
error = e.read()
|
|
if not error:
|
|
error = str(e)
|
|
module.fail_json(msg=error)
|
|
|
|
# import module snippets
|
|
from ansible.module_utils.basic import *
|
|
main()
|