402 lines
13 KiB
Python
402 lines
13 KiB
Python
#!/usr/bin/python
|
|
#
|
|
# Copyright (c) 2019 Zim Kalinowski, (@zikalino)
|
|
#
|
|
# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt)
|
|
|
|
from __future__ import absolute_import, division, print_function
|
|
__metaclass__ = type
|
|
|
|
|
|
ANSIBLE_METADATA = {'metadata_version': '1.1',
|
|
'status': ['preview'],
|
|
'supported_by': 'community'}
|
|
|
|
|
|
DOCUMENTATION = '''
|
|
---
|
|
module: azure_rm_devtestlabpolicy
|
|
version_added: "2.8"
|
|
short_description: Manage Azure Policy instance.
|
|
description:
|
|
- Create, update and delete instance of Azure Policy.
|
|
|
|
options:
|
|
resource_group:
|
|
description:
|
|
- The name of the resource group.
|
|
required: True
|
|
lab_name:
|
|
description:
|
|
- The name of the lab.
|
|
required: True
|
|
policy_set_name:
|
|
description:
|
|
- The name of the policy set.
|
|
required: True
|
|
name:
|
|
description:
|
|
- The name of the policy.
|
|
required: True
|
|
description:
|
|
description:
|
|
- The description of the policy.
|
|
fact_name:
|
|
description:
|
|
- The fact name of the policy (e.g. C(lab_vm_count), C(lab_vm_size), MaxVmsAllowedPerLab, etc.
|
|
choices:
|
|
- 'user_owned_lab_vm_count'
|
|
- 'user_owned_lab_premium_vm_count'
|
|
- 'lab_vm_count'
|
|
- 'lab_premium_vm_count'
|
|
- 'lab_vm_size'
|
|
- 'gallery_image'
|
|
- 'user_owned_lab_vm_count_in_subnet'
|
|
- 'lab_target_cost'
|
|
threshold:
|
|
description:
|
|
- The threshold of the policy (it could be either a maximum value or a list of allowed values).
|
|
type: raw
|
|
state:
|
|
description:
|
|
- Assert the state of the Policy.
|
|
- Use C(present) to create or update an Policy and C(absent) to delete it.
|
|
default: present
|
|
choices:
|
|
- absent
|
|
- present
|
|
|
|
extends_documentation_fragment:
|
|
- azure
|
|
- azure_tags
|
|
|
|
author:
|
|
- "Zim Kalinowski (@zikalino)"
|
|
|
|
'''
|
|
|
|
EXAMPLES = '''
|
|
- name: Create DevTest Lab Policy
|
|
azure_rm_devtestlabpolicy:
|
|
resource_group: myResourceGroup
|
|
lab_name: myLab
|
|
policy_set_name: myPolicySet
|
|
name: myPolicy
|
|
fact_name: user_owned_lab_vm_count
|
|
threshold: 5
|
|
'''
|
|
|
|
RETURN = '''
|
|
id:
|
|
description:
|
|
- The identifier of the resource.
|
|
returned: always
|
|
type: str
|
|
sample: "/subscriptions/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx/resourcegroups/myResourceGroup/providers/microsoft.devtestlab/labs/myLab/policySets/
|
|
myPolicySet/policies/myPolicy"
|
|
|
|
'''
|
|
|
|
import time
|
|
from ansible.module_utils.azure_rm_common import AzureRMModuleBase
|
|
from ansible.module_utils.common.dict_transformations import _snake_to_camel
|
|
|
|
try:
|
|
from msrestazure.azure_exceptions import CloudError
|
|
from msrest.polling import LROPoller
|
|
from msrestazure.azure_operation import AzureOperationPoller
|
|
from azure.mgmt.devtestlabs import DevTestLabsClient
|
|
from msrest.serialization import Model
|
|
except ImportError:
|
|
# This is handled in azure_rm_common
|
|
pass
|
|
|
|
|
|
class Actions:
|
|
NoAction, Create, Update, Delete = range(4)
|
|
|
|
|
|
class AzureRMDtlPolicy(AzureRMModuleBase):
|
|
"""Configuration class for an Azure RM Policy resource"""
|
|
|
|
def __init__(self):
|
|
self.module_arg_spec = dict(
|
|
resource_group=dict(
|
|
type='str',
|
|
required=True
|
|
),
|
|
lab_name=dict(
|
|
type='str',
|
|
required=True
|
|
),
|
|
policy_set_name=dict(
|
|
type='str',
|
|
required=True
|
|
),
|
|
name=dict(
|
|
type='str',
|
|
required=True
|
|
),
|
|
description=dict(
|
|
type='str'
|
|
),
|
|
fact_name=dict(
|
|
type='str',
|
|
choices=['user_owned_lab_vm_count',
|
|
'user_owned_lab_premium_vm_count',
|
|
'lab_vm_count',
|
|
'lab_premium_vm_count',
|
|
'lab_vm_size',
|
|
'gallery_image',
|
|
'user_owned_lab_vm_count_in_subnet',
|
|
'lab_target_cost']
|
|
),
|
|
threshold=dict(
|
|
type='raw'
|
|
),
|
|
state=dict(
|
|
type='str',
|
|
default='present',
|
|
choices=['present', 'absent']
|
|
)
|
|
)
|
|
|
|
self.resource_group = None
|
|
self.lab_name = None
|
|
self.policy_set_name = None
|
|
self.name = None
|
|
self.policy = dict()
|
|
|
|
self.results = dict(changed=False)
|
|
self.mgmt_client = None
|
|
self.state = None
|
|
self.to_do = Actions.NoAction
|
|
|
|
required_if = [
|
|
('state', 'present', ['threshold', 'fact_name'])
|
|
]
|
|
|
|
super(AzureRMDtlPolicy, self).__init__(derived_arg_spec=self.module_arg_spec,
|
|
supports_check_mode=True,
|
|
supports_tags=True,
|
|
required_if=required_if)
|
|
|
|
def exec_module(self, **kwargs):
|
|
"""Main module execution method"""
|
|
|
|
for key in list(self.module_arg_spec.keys()) + ['tags']:
|
|
if hasattr(self, key):
|
|
setattr(self, key, kwargs[key])
|
|
elif kwargs[key] is not None:
|
|
self.policy[key] = kwargs[key]
|
|
|
|
if self.state == 'present':
|
|
self.policy['status'] = 'Enabled'
|
|
dict_camelize(self.policy, ['fact_name'], True)
|
|
if isinstance(self.policy['threshold'], list):
|
|
self.policy['evaluator_type'] = 'AllowedValuesPolicy'
|
|
else:
|
|
self.policy['evaluator_type'] = 'MaxValuePolicy'
|
|
|
|
response = None
|
|
|
|
self.mgmt_client = self.get_mgmt_svc_client(DevTestLabsClient,
|
|
base_url=self._cloud_environment.endpoints.resource_manager)
|
|
|
|
resource_group = self.get_resource_group(self.resource_group)
|
|
|
|
old_response = self.get_policy()
|
|
|
|
if not old_response:
|
|
self.log("Policy instance doesn't exist")
|
|
if self.state == 'absent':
|
|
self.log("Old instance didn't exist")
|
|
else:
|
|
self.to_do = Actions.Create
|
|
else:
|
|
self.log("Policy instance already exists")
|
|
if self.state == 'absent':
|
|
self.to_do = Actions.Delete
|
|
elif self.state == 'present':
|
|
if (not default_compare(self.policy, old_response, '', self.results)):
|
|
self.to_do = Actions.Update
|
|
|
|
if (self.to_do == Actions.Create) or (self.to_do == Actions.Update):
|
|
self.log("Need to Create / Update the Policy instance")
|
|
|
|
if self.check_mode:
|
|
self.results['changed'] = True
|
|
return self.results
|
|
|
|
response = self.create_update_policy()
|
|
|
|
self.results['changed'] = True
|
|
self.log("Creation / Update done")
|
|
elif self.to_do == Actions.Delete:
|
|
self.log("Policy instance deleted")
|
|
self.results['changed'] = True
|
|
|
|
if self.check_mode:
|
|
return self.results
|
|
|
|
self.delete_policy()
|
|
# This currently doesnt' work as there is a bug in SDK / Service
|
|
if isinstance(response, LROPoller) or isinstance(response, AzureOperationPoller):
|
|
response = self.get_poller_result(response)
|
|
else:
|
|
self.log("Policy instance unchanged")
|
|
self.results['changed'] = False
|
|
response = old_response
|
|
|
|
if self.state == 'present':
|
|
self.results.update({
|
|
'id': response.get('id', None),
|
|
'status': response.get('status', None)
|
|
})
|
|
return self.results
|
|
|
|
def create_update_policy(self):
|
|
'''
|
|
Creates or updates Policy with the specified configuration.
|
|
|
|
:return: deserialized Policy instance state dictionary
|
|
'''
|
|
self.log("Creating / Updating the Policy instance {0}".format(self.name))
|
|
|
|
try:
|
|
response = self.mgmt_client.policies.create_or_update(resource_group_name=self.resource_group,
|
|
lab_name=self.lab_name,
|
|
policy_set_name=self.policy_set_name,
|
|
name=self.name,
|
|
policy=self.policy)
|
|
if isinstance(response, LROPoller) or isinstance(response, AzureOperationPoller):
|
|
response = self.get_poller_result(response)
|
|
|
|
except CloudError as exc:
|
|
self.log('Error attempting to create the Policy instance.')
|
|
self.fail("Error creating the Policy instance: {0}".format(str(exc)))
|
|
return response.as_dict()
|
|
|
|
def delete_policy(self):
|
|
'''
|
|
Deletes specified Policy instance in the specified subscription and resource group.
|
|
|
|
:return: True
|
|
'''
|
|
self.log("Deleting the Policy instance {0}".format(self.name))
|
|
try:
|
|
response = self.mgmt_client.policies.delete(resource_group_name=self.resource_group,
|
|
lab_name=self.lab_name,
|
|
policy_set_name=self.policy_set_name,
|
|
name=self.name)
|
|
except CloudError as e:
|
|
self.log('Error attempting to delete the Policy instance.')
|
|
self.fail("Error deleting the Policy instance: {0}".format(str(e)))
|
|
|
|
return True
|
|
|
|
def get_policy(self):
|
|
'''
|
|
Gets the properties of the specified Policy.
|
|
|
|
:return: deserialized Policy instance state dictionary
|
|
'''
|
|
self.log("Checking if the Policy instance {0} is present".format(self.name))
|
|
found = False
|
|
try:
|
|
response = self.mgmt_client.policies.get(resource_group_name=self.resource_group,
|
|
lab_name=self.lab_name,
|
|
policy_set_name=self.policy_set_name,
|
|
name=self.name)
|
|
found = True
|
|
self.log("Response : {0}".format(response))
|
|
self.log("Policy instance : {0} found".format(response.name))
|
|
except CloudError as e:
|
|
self.log('Did not find the Policy instance.')
|
|
if found is True:
|
|
return response.as_dict()
|
|
|
|
return False
|
|
|
|
|
|
def default_compare(new, old, path, result):
|
|
if new is None:
|
|
return True
|
|
elif isinstance(new, dict):
|
|
if not isinstance(old, dict):
|
|
result['compare'] = 'changed [' + path + '] old dict is null'
|
|
return False
|
|
for k in new.keys():
|
|
if not default_compare(new.get(k), old.get(k, None), path + '/' + k, result):
|
|
return False
|
|
return True
|
|
elif isinstance(new, list):
|
|
if not isinstance(old, list) or len(new) != len(old):
|
|
result['compare'] = 'changed [' + path + '] length is different or null'
|
|
return False
|
|
if isinstance(old[0], dict):
|
|
key = None
|
|
if 'id' in old[0] and 'id' in new[0]:
|
|
key = 'id'
|
|
elif 'name' in old[0] and 'name' in new[0]:
|
|
key = 'name'
|
|
else:
|
|
key = list(old[0])[0]
|
|
new = sorted(new, key=lambda x: x.get(key, None))
|
|
old = sorted(old, key=lambda x: x.get(key, None))
|
|
else:
|
|
new = sorted(new)
|
|
old = sorted(old)
|
|
for i in range(len(new)):
|
|
if not default_compare(new[i], old[i], path + '/*', result):
|
|
return False
|
|
return True
|
|
else:
|
|
if path == '/location':
|
|
new = new.replace(' ', '').lower()
|
|
old = new.replace(' ', '').lower()
|
|
if str(new) == str(old):
|
|
return True
|
|
else:
|
|
result['compare'] = 'changed [' + path + '] ' + str(new) + ' != ' + str(old)
|
|
return False
|
|
|
|
|
|
def dict_camelize(d, path, camelize_first):
|
|
if isinstance(d, list):
|
|
for i in range(len(d)):
|
|
dict_camelize(d[i], path, camelize_first)
|
|
elif isinstance(d, dict):
|
|
if len(path) == 1:
|
|
old_value = d.get(path[0], None)
|
|
if old_value is not None:
|
|
d[path[0]] = _snake_to_camel(old_value, camelize_first)
|
|
else:
|
|
sd = d.get(path[0], None)
|
|
if sd is not None:
|
|
dict_camelize(sd, path[1:], camelize_first)
|
|
|
|
|
|
def dict_map(d, path, map):
|
|
if isinstance(d, list):
|
|
for i in range(len(d)):
|
|
dict_map(d[i], path, map)
|
|
elif isinstance(d, dict):
|
|
if len(path) == 1:
|
|
old_value = d.get(path[0], None)
|
|
if old_value is not None:
|
|
d[path[0]] = map.get(old_value, old_value)
|
|
else:
|
|
sd = d.get(path[0], None)
|
|
if sd is not None:
|
|
dict_map(sd, path[1:], map)
|
|
|
|
|
|
def main():
|
|
"""Main execution"""
|
|
AzureRMDtlPolicy()
|
|
|
|
|
|
if __name__ == '__main__':
|
|
main()
|