iam_cert23.py 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314
  1. #!/usr/bin/python
  2. # pylint: skip-file
  3. # flake8: noqa
  4. # This file is part of Ansible
  5. #
  6. # Ansible is free software: you can redistribute it and/or modify
  7. # it under the terms of the GNU General Public License as published by
  8. # the Free Software Foundation, either version 3 of the License, or
  9. # (at your option) any later version.
  10. #
  11. # Ansible is distributed in the hope that it will be useful,
  12. # but WITHOUT ANY WARRANTY; without even the implied warranty of
  13. # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  14. # GNU General Public License for more details.
  15. #
  16. # You should have received a copy of the GNU General Public License
  17. # along with Ansible. If not, see <http://www.gnu.org/licenses/>.
  18. ANSIBLE_METADATA = {'metadata_version': '1.1',
  19. 'status': ['preview'],
  20. 'supported_by': 'community'}
  21. DOCUMENTATION = '''
  22. ---
  23. module: iam_cert
  24. short_description: Manage server certificates for use on ELBs and CloudFront
  25. description:
  26. - Allows for the management of server certificates
  27. version_added: "2.0"
  28. options:
  29. name:
  30. description:
  31. - Name of certificate to add, update or remove.
  32. required: true
  33. new_name:
  34. description:
  35. - When state is present, this will update the name of the cert.
  36. - The cert, key and cert_chain parameters will be ignored if this is defined.
  37. new_path:
  38. description:
  39. - When state is present, this will update the path of the cert.
  40. - The cert, key and cert_chain parameters will be ignored if this is defined.
  41. state:
  42. description:
  43. - Whether to create(or update) or delete certificate.
  44. - If new_path or new_name is defined, specifying present will attempt to make an update these.
  45. required: true
  46. choices: [ "present", "absent" ]
  47. path:
  48. description:
  49. - When creating or updating, specify the desired path of the certificate.
  50. default: "/"
  51. cert_chain:
  52. description:
  53. - The path to, or content of the CA certificate chain in PEM encoded format.
  54. As of 2.4 content is accepted. If the parameter is not a file, it is assumed to be content.
  55. cert:
  56. description:
  57. - The path to, or content of the certificate body in PEM encoded format.
  58. As of 2.4 content is accepted. If the parameter is not a file, it is assumed to be content.
  59. key:
  60. description:
  61. - The path to, or content of the private key in PEM encoded format.
  62. As of 2.4 content is accepted. If the parameter is not a file, it is assumed to be content.
  63. dup_ok:
  64. description:
  65. - By default the module will not upload a certificate that is already uploaded into AWS.
  66. If set to True, it will upload the certificate as long as the name is unique.
  67. default: False
  68. requirements: [ "boto" ]
  69. author: Jonathan I. Davila
  70. extends_documentation_fragment:
  71. - aws
  72. - ec2
  73. '''
  74. EXAMPLES = '''
  75. # Basic server certificate upload from local file
  76. - iam_cert:
  77. name: very_ssl
  78. state: present
  79. cert: "{{ lookup('file', 'path/to/cert') }}"
  80. key: "{{ lookup('file', 'path/to/key') }}"
  81. cert_chain: "{{ lookup('file', 'path/to/certchain') }}"
  82. # Basic server certificate upload
  83. - iam_cert:
  84. name: very_ssl
  85. state: present
  86. cert: path/to/cert
  87. key: path/to/key
  88. cert_chain: path/to/certchain
  89. # Server certificate upload using key string
  90. - iam_cert:
  91. name: very_ssl
  92. state: present
  93. path: "/a/cert/path/"
  94. cert: body_of_somecert
  95. key: vault_body_of_privcertkey
  96. cert_chain: body_of_myverytrustedchain
  97. # Basic rename of existing certificate
  98. - iam_cert:
  99. name: very_ssl
  100. new_name: new_very_ssl
  101. state: present
  102. '''
  103. from ansible.module_utils.basic import AnsibleModule
  104. from ansible.module_utils.ec2 import ec2_argument_spec, get_aws_connection_info, connect_to_aws
  105. import os
  106. try:
  107. import boto
  108. import boto.iam
  109. import boto.ec2
  110. HAS_BOTO = True
  111. except ImportError:
  112. HAS_BOTO = False
  113. def boto_exception(err):
  114. '''generic error message handler'''
  115. if hasattr(err, 'error_message'):
  116. error = err.error_message
  117. elif hasattr(err, 'message'):
  118. error = err.message
  119. else:
  120. error = '%s: %s' % (Exception, err)
  121. return error
  122. def cert_meta(iam, name):
  123. certificate = iam.get_server_certificate(name).get_server_certificate_result.server_certificate
  124. ocert = certificate.certificate_body
  125. opath = certificate.server_certificate_metadata.path
  126. ocert_id = certificate.server_certificate_metadata.server_certificate_id
  127. upload_date = certificate.server_certificate_metadata.upload_date
  128. exp = certificate.server_certificate_metadata.expiration
  129. arn = certificate.server_certificate_metadata.arn
  130. return opath, ocert, ocert_id, upload_date, exp, arn
  131. def dup_check(module, iam, name, new_name, cert, orig_cert_names, orig_cert_bodies, dup_ok):
  132. update = False
  133. # IAM cert names are case insensitive
  134. names_lower = [n.lower() for n in [name, new_name] if n is not None]
  135. orig_cert_names_lower = [ocn.lower() for ocn in orig_cert_names]
  136. if any(ct in orig_cert_names_lower for ct in names_lower):
  137. for i_name in names_lower:
  138. if cert is not None:
  139. try:
  140. c_index = orig_cert_names_lower.index(i_name)
  141. except NameError:
  142. continue
  143. else:
  144. # NOTE: remove the carriage return to strictly compare the cert bodies.
  145. slug_cert = cert.replace('\r', '')
  146. slug_orig_cert_bodies = orig_cert_bodies[c_index].replace('\r', '')
  147. if slug_orig_cert_bodies == slug_cert:
  148. update = True
  149. break
  150. elif slug_cert.startswith(slug_orig_cert_bodies):
  151. update = True
  152. break
  153. elif slug_orig_cert_bodies != slug_cert:
  154. module.fail_json(changed=False, msg='A cert with the name %s already exists and'
  155. ' has a different certificate body associated'
  156. ' with it. Certificates cannot have the same name' % orig_cert_names[c_index])
  157. else:
  158. update = True
  159. break
  160. elif cert in orig_cert_bodies and not dup_ok:
  161. for crt_name, crt_body in zip(orig_cert_names, orig_cert_bodies):
  162. if crt_body == cert:
  163. module.fail_json(changed=False, msg='This certificate already'
  164. ' exists under the name %s' % crt_name)
  165. return update
  166. def cert_action(module, iam, name, cpath, new_name, new_path, state,
  167. cert, key, cert_chain, orig_cert_names, orig_cert_bodies, dup_ok):
  168. if state == 'present':
  169. update = dup_check(module, iam, name, new_name, cert, orig_cert_names,
  170. orig_cert_bodies, dup_ok)
  171. if update:
  172. opath, ocert, ocert_id, upload_date, exp, arn = cert_meta(iam, name)
  173. changed = True
  174. if new_name and new_path:
  175. iam.update_server_cert(name, new_cert_name=new_name, new_path=new_path)
  176. module.exit_json(changed=changed, original_name=name, new_name=new_name,
  177. original_path=opath, new_path=new_path, cert_body=ocert,
  178. upload_date=upload_date, expiration_date=exp, arn=arn)
  179. elif new_name and not new_path:
  180. iam.update_server_cert(name, new_cert_name=new_name)
  181. module.exit_json(changed=changed, original_name=name, new_name=new_name,
  182. cert_path=opath, cert_body=ocert,
  183. upload_date=upload_date, expiration_date=exp, arn=arn)
  184. elif not new_name and new_path:
  185. iam.update_server_cert(name, new_path=new_path)
  186. module.exit_json(changed=changed, name=new_name,
  187. original_path=opath, new_path=new_path, cert_body=ocert,
  188. upload_date=upload_date, expiration_date=exp, arn=arn)
  189. else:
  190. changed = False
  191. module.exit_json(changed=changed, name=name, cert_path=opath, cert_body=ocert,
  192. upload_date=upload_date, expiration_date=exp, arn=arn,
  193. msg='No new path or name specified. No changes made')
  194. else:
  195. changed = True
  196. iam.upload_server_cert(name, cert, key, cert_chain=cert_chain, path=cpath)
  197. opath, ocert, ocert_id, upload_date, exp, arn = cert_meta(iam, name)
  198. module.exit_json(changed=changed, name=name, cert_path=opath, cert_body=ocert,
  199. upload_date=upload_date, expiration_date=exp, arn=arn)
  200. elif state == 'absent':
  201. if name in orig_cert_names:
  202. changed = True
  203. iam.delete_server_cert(name)
  204. module.exit_json(changed=changed, deleted_cert=name)
  205. else:
  206. changed = False
  207. module.exit_json(changed=changed, msg='Certificate with the name %s already absent' % name)
  208. def load_data(cert, key, cert_chain):
  209. # if paths are provided rather than lookups read the files and return the contents
  210. if cert and os.path.isfile(cert):
  211. cert = open(cert, 'r').read().rstrip()
  212. if key and os.path.isfile(key):
  213. key = open(key, 'r').read().rstrip()
  214. if cert_chain and os.path.isfile(cert_chain):
  215. cert_chain = open(cert_chain, 'r').read()
  216. return cert, key, cert_chain
  217. def main():
  218. argument_spec = ec2_argument_spec()
  219. argument_spec.update(dict(
  220. state=dict(required=True, choices=['present', 'absent']),
  221. name=dict(),
  222. cert=dict(),
  223. key=dict(no_log=True),
  224. cert_chain=dict(),
  225. new_name=dict(),
  226. path=dict(default='/'),
  227. new_path=dict(),
  228. dup_ok=dict(type='bool')
  229. )
  230. )
  231. module = AnsibleModule(
  232. argument_spec=argument_spec,
  233. mutually_exclusive=[
  234. ['new_path', 'key'],
  235. ['new_path', 'cert'],
  236. ['new_path', 'cert_chain'],
  237. ['new_name', 'key'],
  238. ['new_name', 'cert'],
  239. ['new_name', 'cert_chain'],
  240. ],
  241. )
  242. if not HAS_BOTO:
  243. module.fail_json(msg="Boto is required for this module")
  244. region, ec2_url, aws_connect_kwargs = get_aws_connection_info(module)
  245. try:
  246. if region:
  247. iam = connect_to_aws(boto.iam, region, **aws_connect_kwargs)
  248. else:
  249. iam = boto.iam.connection.IAMConnection(**aws_connect_kwargs)
  250. except boto.exception.NoAuthHandlerFound as e:
  251. module.fail_json(msg=str(e))
  252. state = module.params.get('state')
  253. name = module.params.get('name')
  254. path = module.params.get('path')
  255. new_name = module.params.get('new_name')
  256. new_path = module.params.get('new_path')
  257. dup_ok = module.params.get('dup_ok')
  258. if state == 'present' and not new_name and not new_path:
  259. cert, key, cert_chain = load_data(cert=module.params.get('cert'),
  260. key=module.params.get('key'),
  261. cert_chain=module.params.get('cert_chain'))
  262. else:
  263. cert = key = cert_chain = None
  264. orig_cert_names = [ctb['server_certificate_name'] for ctb in
  265. iam.get_all_server_certs().list_server_certificates_result.server_certificate_metadata_list]
  266. orig_cert_bodies = [iam.get_server_certificate(thing).get_server_certificate_result.certificate_body
  267. for thing in orig_cert_names]
  268. if new_name == name:
  269. new_name = None
  270. if new_path == path:
  271. new_path = None
  272. changed = False
  273. try:
  274. cert_action(module, iam, name, path, new_name, new_path, state,
  275. cert, key, cert_chain, orig_cert_names, orig_cert_bodies, dup_ok)
  276. except boto.exception.BotoServerError as err:
  277. module.fail_json(changed=changed, msg=str(err), debug=[cert, key])
  278. if __name__ == '__main__':
  279. main()