lib/ansible/modules/cloud/alicloud/ali_ram_policy.py (143 lines of code) (raw):

#!/usr/bin/python # -*- coding: utf-8 -*- # Copyright (c) 2017-present Alibaba Group Holding Limited. He Guimin <heguimin36@163.com.com> # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) # # This file is part of Ansible # # Ansible is free software: you can redistribute it and/or modify # it under the terms of the GNU General Public License as published by # the Free Software Foundation, either version 3 of the License, or # (at your option) any later version. # # Ansible is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with Ansible. If not, see http://www.gnu.org/licenses/. from __future__ import (absolute_import, division, print_function) __metaclass__ = type ANSIBLE_METADATA = {'metadata_version': '1.1', 'status': ['preview'], 'supported_by': 'community'} DOCUMENTATION = """ --- module: ali_ram_policy short_description: Create, Delete, Attach and Detach policy in Alibaba Cloud. description: - Create, Delete, Attach and Detach policy in Alibaba Cloud. - An unique ali_ram_policy module is determined by parameters policy_name. options: state: description: - If I(state=present), policy will be created. - If I(state=present), policy and user_name exists, will attach policy to user. - If I(state=present), policy and group_name exists, will attach policy to group. - If I(state=present), policy and role_name exists, will attach policy to role. - If I(state=absent), policy will be removed. - If I(state=absent), and user_name exists, will detach policy from user. - If I(state=absent), and group_name exists, will detach policy from group. - If I(state=absent), and role_name exists, will detach policy from role. choices: ['present', 'absent'] default: 'present' type: str policy_document: description: - The policy text. It can be up to 2048 bytes. aliases: ['policy'] type: str policy_name: description: - The policy name. It must be 1 to 128 characters in length. - This is used to determine if the policy already exists. aliases: ['name'] required: True type: str description: description: - The policy description. It must be 1 to 1,024 characters in length. type: str user_name: description: - The username of the RAM user to which the policy is attached or detached. type: str group_name: description: - The groupname of the RAM group to which the policy is attached or detached. type: str role_name: description: - The rolename of the RAM role to which the policy is attached or detached. type: str policy_type: description: - The policy type. If this parameter is left unspecified, all polices are listed. choices: ['System', 'Custom'] type: str aliases: ['type'] requirements: - "python >= 3.6" - "footmark >= 1.17.0" extends_documentation_fragment: - alicloud author: - "He Guimin (@xiaozhu36)" """ EXAMPLES = """ # Note: These examples do not set authentication details, see the Alibaba Cloud Guide for details. - name: Changed. Create policy ali_ram_policy: policy_name: ansible_oss policy_document: '{"Statement":[{"Action":["oss:*"],"Effect":"Allow","Resource":["acs:oss:*:*:*"]}],"Version":"1"}' description: create for ansible - name: Changed. Attach policy to user ali_ram_policy: user_name: ansible policy_name: ansible_oss policy_type: Custom - name: Changed. Detach policy from user ali_ram_policy: state: absent user_name: ansible policy_name: ansible_oss policy_type: Custom - name: Changed. Attach policy to group ali_ram_policy: group_name: ansible policy_name: ansible_oss policy_type: Custom - name: Changed. Detach policy from group ali_ram_policy: state: absent group_name: ansible policy_name: ansible_oss policy_type: Custom - name: Changed. Attach policy to role ali_ram_policy: role_name: ansible policy_name: ansible_oss policy_type: Custom - name: Changed. Detach policy from role ali_ram_policy: state: absent role_name: ansible policy_name: ansible_oss policy_type: Custom - name: Changed. Delete policy ali_ram_policy: state: absent policy_name: ansible_oss """ RETURN = ''' policy: description: Returns an array of complex objects as described below. returned: always type: complex contains: attachment_count: description: The number of times that the policy is referenced. returned: always type: int sample: 0 create_date: description: The date and time when the policy was created. returned: always type: str sample: '2015-01-23T12:33:18Z' default_version: description: The default version. returned: always type: str sample: v1 description: description: The policy description. returned: always type: str sample: OSS administrator policy_name: description: The policy name. returned: always type: str sample: OSS-Administrator name: description: alias of 'policy_name'. returned: always type: str sample: OSS-Administrator policy_type: description: The policy type. returned: always type: str sample: Custom update_date: description: The date and time when the policy was modified. returned: always type: str sample: '2015-01-23T12:33:18Z' ''' from ansible.module_utils.basic import AnsibleModule from ansible.module_utils.alicloud_ecs import ecs_argument_spec, ram_connect HAS_FOOTMARK = False try: from footmark.exception import RAMResponseError HAS_FOOTMARK = True except ImportError: HAS_FOOTMARK = False def policy_exists(module, ram_conn, policy_name): try: policies = ram_conn.list_policies() for p in policies: if p.policy_name == policy_name: return p return None except Exception as e: module.fail_json(msg="Failed to describe Policies: {0}".format(e)) def main(): argument_spec = ecs_argument_spec() argument_spec.update(dict( state=dict(default='present', choices=['present', 'absent']), policy_document=dict(type='str', aliases=['policy']), policy_name=dict(type='str', required=True, aliases=['name']), description=dict(type='str'), user_name=dict(type='str'), group_name=dict(type='str'), role_name=dict(type='str'), policy_type=dict(type='str', choices=['System', 'Custom'], aliases=['type']) )) module = AnsibleModule(argument_spec=argument_spec) if HAS_FOOTMARK is False: module.fail_json(msg='footmark required for this module.') ram_conn = ram_connect(module) # Get values of variable state = module.params['state'] policy_name = module.params['policy_name'] user_name = module.params['user_name'] group_name = module.params['group_name'] role_name = module.params['role_name'] policy_type = module.params['policy_type'] changed = False # Check if policy exists policy = policy_exists(module, ram_conn, policy_name) if state == 'absent': if user_name: try: module.exit_json(changed=policy.detach_policy_from_user(user_name=user_name, policy_type=policy_type), policy=policy.read()) except RAMResponseError as ex: module.fail_json(msg='Unable to detach policy {0} from user {1}, error: {2}'.format(policy_name, user_name, ex)) if group_name: try: module.exit_json(changed=policy.detach_policy_from_group(group_name=group_name, policy_type=policy_type), policy=policy.read()) except RAMResponseError as ex: module.fail_json(msg='Unable to detach policy {0} from group {1}, error: {2}'.format(policy_name, group_name, ex)) if role_name: try: module.exit_json(changed=policy.detach_policy_from_role(role_name=role_name, policy_type=policy_type), policy=policy.read()) except RAMResponseError as ex: module.fail_json(msg='Unable to detach policy {0} from role {1}, error: {2}'.format(policy_name, role_name, ex)) if not policy: module.exit_json(changed=changed, policy={}) try: module.exit_json(changed=policy.delete(), policy={}) except RAMResponseError as ex: module.fail_json(msg='Unable to delete policy {0}, error: {1}'.format(policy_name, ex)) if not policy: try: policy = ram_conn.create_policy(**module.params) module.exit_json(changed=True, policy=policy.read()) except RAMResponseError as e: module.fail_json(msg='Unable to create policy, error: {0}'.format(e)) if user_name and policy_type: try: changed = policy.attach_policy_to_user(policy_type=policy_type, user_name=user_name) module.exit_json(changed=changed, policy=policy.read()) except Exception as e: module.fail_json(msg='Unable to attach policy to user, error: {0}'.format(e)) if group_name and policy_type: try: changed = policy.attach_policy_to_group(policy_type=policy_type, group_name=group_name) module.exit_json(changed=changed, policy=policy.read()) except Exception as e: module.fail_json(msg='Unable to attach policy to group, error: {0}'.format(e)) if role_name and policy_type: try: changed = policy.attach_policy_to_role(policy_type=policy_type, role_name=role_name) module.exit_json(changed=changed, policy=policy.read()) except Exception as e: module.fail_json(msg='Unable to attach policy to role, error: {0}'.format(e)) if __name__ == '__main__': main()