forked from TerryHowe/ansible-modules-hashivault
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathhashivault_acl_policy_get.py
59 lines (52 loc) · 1.67 KB
/
hashivault_acl_policy_get.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
#!/usr/bin/python
# -*- coding: utf-8 -*-
from ansible.module_utils.hashivault import hashivault_argspec
from ansible.module_utils.hashivault import hashivault_auth_client
from ansible.module_utils.hashivault import hashivault_init
from ansible.module_utils.hashivault import hashiwrapper
ANSIBLE_METADATA = {'status': ['stableinterface'], 'supported_by': 'community', 'version': '1.1'}
DOCUMENTATION = '''
---
module: hashivault_acl_policy_get
version_added: "2.1.0"
short_description: Hashicorp Vault ACL policy get module
description:
- Module to get an ACL policy from Hashicorp Vault.
options:
name:
description:
- policy name.
extends_documentation_fragment: hashivault
'''
EXAMPLES = '''
---
- hosts: localhost
tasks:
- hashivault_acl_policy_get:
name: 'annie'
register: 'vault_acl_policy_get'
- debug: msg="User policy is {{vault_acl_policy_get.policy}}"
'''
def main():
argspec = hashivault_argspec()
argspec['name'] = dict(required=True, type='str')
module = hashivault_init(argspec)
result = hashivault_acl_policy_get(module.params)
if result.get('failed'):
module.fail_json(**result)
else:
module.exit_json(**result)
@hashiwrapper
def hashivault_acl_policy_get(params):
name = params.get('name')
client = hashivault_auth_client(params)
policy = client.sys.read_acl_policy(name)
policy = policy.get('data', policy).get('policy', policy)
if policy is None:
result = {"changed": False, "rc": 1, "failed": True}
result['msg'] = u"Policy \"%s\" does not exist." % name
return result
else:
return {'rules': policy}
if __name__ == '__main__':
main()