1
0
Fork 0
mirror of https://github.com/ansible-collections/community.general.git synced 2026-05-10 20:01:40 +00:00
community.general/plugins/modules/nomad_token.py
Alexei Znamensky 15a8444751
nomad modules: extract common connection logic into _nomad module utils (#11957)
* refactor(nomad): extract common connection logic into _nomad module_utils

Fixes #7688

Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>

* changelog: add fragment for PR 11957

Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>

* refactor(nomad): use direct param access instead of params.get()

Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>

* fix(nomad): fix mypy errors in _nomad module utils

Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>

---------

Co-authored-by: Claude Sonnet 4.6 <noreply@anthropic.com>
2026-05-08 23:25:26 +12:00

258 lines
7.7 KiB
Python

#!/usr/bin/python
# Copyright (c) 2023, Pedro Nascimento <apecnascimento@gmail.com>
# GNU General Public License v3.0+ (see LICENSES/GPL-3.0-or-later.txt or https://www.gnu.org/licenses/gpl-3.0.txt)
# SPDX-License-Identifier: GPL-3.0-or-later
from __future__ import annotations
DOCUMENTATION = r"""
module: nomad_token
author: Pedro Nascimento (@apecnascimento)
version_added: "8.1.0"
short_description: Manage Nomad ACL tokens
description:
- This module allows to create Bootstrap tokens, create ACL tokens, update ACL tokens, and delete ACL tokens.
requirements:
- python-nomad
extends_documentation_fragment:
- community.general._nomad
- community.general._attributes
attributes:
check_mode:
support: none
diff_mode:
support: none
options:
name:
description:
- Name of ACL token to create.
type: str
token_type:
description:
- The type of the token can be V(client), V(management), or V(bootstrap).
choices: ["client", "management", "bootstrap"]
type: str
default: "client"
policies:
description:
- A list of the policies assigned to the token.
type: list
elements: str
default: []
global_replicated:
description:
- Indicates whether or not the token was created with the C(--global).
type: bool
default: false
state:
description:
- Create or remove ACL token.
choices: ["present", "absent"]
required: true
type: str
seealso:
- name: Nomad ACL documentation
description: Complete documentation for Nomad API ACL.
link: https://developer.hashicorp.com/nomad/api-docs/acl/tokens
"""
EXAMPLES = r"""
- name: Create boostrap token
community.general.nomad_token:
host: localhost
token_type: bootstrap
state: present
- name: Create ACL token
community.general.nomad_token:
host: localhost
name: "Dev token"
token_type: client
policies:
- readonly
global_replicated: false
state: absent
- name: Update ACL token Dev token
community.general.nomad_token:
host: localhost
name: "Dev token"
token_type: client
policies:
- readonly
- devpolicy
global_replicated: false
state: absent
- name: Delete ACL token
community.general.nomad_token:
host: localhost
name: "Dev token"
state: absent
"""
RETURN = r"""
result:
description: Result returned by nomad.
returned: always
type: dict
sample:
{
"accessor_id": "0d01c55f-8d63-f832-04ff-1866d4eb594e",
"create_index": 14,
"create_time": "2023-11-12T18:48:34.248857001Z",
"expiration_time": null,
"expiration_ttl": "",
"global": true,
"hash": "eSn8H8RVqh8As8WQNnC2vlBRqXy6DECogc5umzX0P30=",
"modify_index": 836,
"name": "devs",
"policies": [
"readonly"
],
"roles": null,
"secret_id": "12e878ab-e1f6-e103-b4c4-3b5173bb4cea",
"type": "client"
}
"""
from ansible.module_utils.basic import AnsibleModule
from ansible_collections.community.general.plugins.module_utils._nomad import argument_spec as nomad_argument_spec
from ansible_collections.community.general.plugins.module_utils._nomad import nomad, setup_nomad_client
def get_token(name, nomad_client):
tokens = nomad_client.acl.get_tokens()
token = next((token for token in tokens if token.get("Name") == name), None)
return token
def transform_response(nomad_response):
transformed_response = {
"accessor_id": nomad_response["AccessorID"],
"create_index": nomad_response["CreateIndex"],
"create_time": nomad_response["CreateTime"],
"expiration_ttl": nomad_response["ExpirationTTL"],
"expiration_time": nomad_response["ExpirationTime"],
"global": nomad_response["Global"],
"hash": nomad_response["Hash"],
"modify_index": nomad_response["ModifyIndex"],
"name": nomad_response["Name"],
"policies": nomad_response["Policies"],
"roles": nomad_response["Roles"],
"secret_id": nomad_response["SecretID"],
"type": nomad_response["Type"],
}
return transformed_response
argument_spec = {
**nomad_argument_spec,
"state": dict(required=True, choices=["present", "absent"]),
"name": dict(type="str"),
"token_type": dict(choices=["client", "management", "bootstrap"], default="client"),
"policies": dict(type="list", elements="str", default=[]),
"global_replicated": dict(type="bool", default=False),
}
def setup_module_object():
module = AnsibleModule(
argument_spec=argument_spec,
supports_check_mode=False,
required_one_of=[["name", "token_type"]],
required_if=[
("token_type", "client", ("name",)),
("token_type", "management", ("name",)),
],
)
return module
def run(module):
nomad_client = setup_nomad_client(module)
msg = ""
result = {}
changed = False
if module.params["state"] == "present":
if module.params["token_type"] == "bootstrap":
try:
current_token = get_token("Bootstrap Token", nomad_client)
if current_token:
msg = "ACL bootstrap already exist."
else:
nomad_result = nomad_client.acl.generate_bootstrap()
msg = "Boostrap token created."
result = transform_response(nomad_result)
changed = True
except nomad.api.exceptions.URLNotAuthorizedNomadException:
try:
nomad_result = nomad_client.acl.generate_bootstrap()
msg = "Boostrap token created."
result = transform_response(nomad_result)
changed = True
except Exception as e:
module.fail_json(msg=f"{e}")
else:
try:
token_info = {
"Name": module.params["name"],
"Type": module.params["token_type"],
"Policies": module.params["policies"],
"Global": module.params["global_replicated"],
}
current_token = get_token(token_info["Name"], nomad_client)
if current_token:
token_info["AccessorID"] = current_token["AccessorID"]
nomad_result = nomad_client.acl.update_token(current_token["AccessorID"], token_info)
msg = "ACL token updated."
result = transform_response(nomad_result)
changed = True
else:
nomad_result = nomad_client.acl.create_token(token_info)
msg = "ACL token Created."
result = transform_response(nomad_result)
changed = True
except Exception as e:
module.fail_json(msg=f"{e}")
if module.params["state"] == "absent":
if not module.params["name"]:
module.fail_json(msg="name is needed to delete token.")
if module.params["token_type"] == "bootstrap" or module.params["name"] == "Bootstrap Token":
module.fail_json(msg="Delete ACL bootstrap token is not allowed.")
try:
token = get_token(module.params["name"], nomad_client)
if token:
nomad_client.acl.delete_token(token.get("AccessorID"))
msg = "ACL token deleted."
changed = True
else:
msg = f"No token with name '{module.params['name']}' found"
except Exception as e:
module.fail_json(msg=f"{e}")
module.exit_json(changed=changed, msg=msg, result=result)
def main():
module = setup_module_object()
run(module)
if __name__ == "__main__":
main()