forked from TerryHowe/ansible-modules-hashivault
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathhashivault_audit.py
92 lines (83 loc) · 2.86 KB
/
hashivault_audit.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
#!/usr/bin/python
from ansible.module_utils.hashivault import hashivault_argspec
from ansible.module_utils.hashivault import hashivault_auth_client
from ansible.module_utils.hashivault import hashivault_init
from ansible.module_utils.hashivault import hashiwrapper
ANSIBLE_METADATA = {'status': ['stableinterface'], 'supported_by': 'community', 'version': '1.1'}
DOCUMENTATION = '''
---
module: hashivault_audit
version_added: "2.2.0"
short_description: Hashicorp Vault audit module
description:
- Module to enable/disable audit backends in Hashicorp Vault.
options:
device_type:
description:
- device_type of auditor
path:
description:
- path of auditor
default: value of device_type
description:
description:
- description of auditor
options:
description:
- options for auditor
state:
description:
- should auth mount be enabled or disabled
default: enabled
extends_documentation_fragment: hashivault
'''
EXAMPLES = '''
---
- hosts: localhost
tasks:
- hashivault_audit:
device_type: syslog
'''
def main():
argspec = hashivault_argspec()
argspec['device_type'] = dict(required=True, type='str')
argspec['description'] = dict(required=False, type='str', default='')
argspec['options'] = dict(required=False, type='dict')
argspec['path'] = dict(required=False, type='str')
argspec['state'] = dict(required=False, type='str', default='enabled',
choices=['enabled', 'enable', 'present', 'disabled', 'disable', 'absent'])
module = hashivault_init(argspec)
result = hashivault_audit(module.params)
if result.get('failed'):
module.fail_json(**result)
else:
module.exit_json(**result)
@hashiwrapper
def hashivault_audit(params):
client = hashivault_auth_client(params)
device_type = params.get('device_type')
description = params.get('description')
options = params.get('options')
path = params.get('path')
state = params.get('state')
if state in ['enabled', 'enable', 'present']:
state = 'enabled'
else:
state = 'disabled'
result = client.sys.list_enabled_audit_devices()
backends = result.get('data', result)
if not path:
path = device_type + "/"
if path[-1] != "/":
path = path + "/"
if state == 'enabled':
if path in backends:
return {'changed': False, 'msg': 'Backend exists and Vault does not support update'}
client.sys.enable_audit_device(device_type=device_type, description=description, options=options, path=path)
elif state == 'disabled':
if path not in backends:
return {'changed': False, 'msg': 'Backend does not exist'}
client.sys.disable_audit_device(path=path)
return {'changed': True}
if __name__ == '__main__':
main()