#!/usr/bin/python # Modified from ansible_collections.community.mongodb.plugins.modules.mongodb_user from __future__ import absolute_import, division, print_function __metaclass__ = type DOCUMENTATION = ''' --- module: mongodb_user short_description: Adds or removes a user from a MongoDB database description: - Adds or removes a user from a MongoDB database. version_added: "1.0.0" extends_documentation_fragment: - community.mongodb.login_options - community.mongodb.ssl_options options: replica_set: description: - Replica set to connect to (automatically connects to primary for writes). type: str database: description: - The name of the database to add/remove the user from. required: true type: str aliases: [db] name: description: - The name of the user to add or remove. required: true aliases: [user] type: str password: description: - The password to use for the user. type: str aliases: [pass] roles: type: list elements: raw description: - > The database user roles valid values could either be one or more of the following strings: 'read', 'readWrite', 'dbAdmin', 'userAdmin', 'clusterAdmin', 'readAnyDatabase', 'readWriteAnyDatabase', 'userAdminAnyDatabase', 'dbAdminAnyDatabase' - "Or the following dictionary '{ db: DATABASE_NAME, role: ROLE_NAME }'." - "This param requires pymongo 2.5+. If it is a string, mongodb 2.4+ is also required. If it is a dictionary, mongo 2.6+ is required." state: description: - The database user state. default: present choices: [absent, present] type: str update_password: default: always choices: [always, on_create] description: - C(always) will always update passwords and cause the module to return changed. - C(on_create) will only set the password for newly created users. - This must be C(always) to use the localhost exception when adding the first admin user. - This option is effectively ignored when using x.509 certs. It is defaulted to 'on_create' to maintain a \ a specific module behaviour when the login_database is '$external'. type: str create_for_localhost_exception: type: path description: - This is parmeter is only useful for handling special treatment around the localhost exception. - If C(login_user) is defined, then the localhost exception is not active and this parameter has no effect. - If this file is NOT present (and C(login_user) is not defined), then touch this file after successfully adding the user. - If this file is present (and C(login_user) is not defined), then skip this task. notes: - Requires the pymongo Python package on the remote host, version 2.4.2+. This can be installed using pip or the OS package manager. Newer mongo server versions require newer pymongo versions. @see http://api.mongodb.org/python/current/installation.html requirements: - "pymongo" author: - "Elliott Foster (@elliotttf)" - "Julien Thebault (@Lujeni)" ''' EXAMPLES = ''' - name: Create 'burgers' database user with name 'bob' and password '12345'. community.mongodb.mongodb_user: database: burgers name: bob password: 12345 state: present - name: Create a database user via SSL (MongoDB must be compiled with the SSL option and configured properly) community.mongodb.mongodb_user: database: burgers name: bob password: 12345 state: present ssl: True - name: Delete 'burgers' database user with name 'bob'. community.mongodb.mongodb_user: database: burgers name: bob state: absent - name: Define more users with various specific roles (if not defined, no roles is assigned, and the user will be added via pre mongo 2.2 style) community.mongodb.mongodb_user: database: burgers name: ben password: 12345 roles: read state: present - name: Define roles community.mongodb.mongodb_user: database: burgers name: jim password: 12345 roles: readWrite,dbAdmin,userAdmin state: present - name: Define roles community.mongodb.mongodb_user: database: burgers name: joe password: 12345 roles: readWriteAnyDatabase state: present - name: Add a user to database in a replica set, the primary server is automatically discovered and written to community.mongodb.mongodb_user: database: burgers name: bob replica_set: belcher password: 12345 roles: readWriteAnyDatabase state: present # add a user 'oplog_reader' with read only access to the 'local' database on the replica_set 'belcher'. This is useful for oplog access (MONGO_OPLOG_URL). # please notice the credentials must be added to the 'admin' database because the 'local' database is not synchronized and can't receive user credentials # To login with such user, the connection string should be MONGO_OPLOG_URL="mongodb://oplog_reader:oplog_reader_password@server1,server2/local?authSource=admin" # This syntax requires mongodb 2.6+ and pymongo 2.5+ - name: Roles as a dictionary community.mongodb.mongodb_user: login_user: root login_password: root_password database: admin user: oplog_reader password: oplog_reader_password state: present replica_set: belcher roles: - db: local role: read - name: Adding a user with X.509 Member Authentication community.mongodb.mongodb_user: login_host: "mongodb-host.test" login_port: 27001 login_database: "$external" database: "admin" name: "admin" password: "test" roles: - dbAdminAnyDatabase ssl: true ssl_ca_certs: "/tmp/ca.crt" ssl_certfile: "/tmp/tls.key" #cert and key in one file state: present auth_mechanism: "MONGODB-X509" connection_options: - "tlsAllowInvalidHostnames=true" ''' RETURN = ''' user: description: The name of the user to add or remove. returned: success type: str ''' import os import traceback from operator import itemgetter from ansible.module_utils.basic import AnsibleModule from ansible.module_utils.six import binary_type, text_type from ansible.module_utils._text import to_native, to_bytes from ansible_collections.community.mongodb.plugins.module_utils.mongodb_common import ( missing_required_lib, mongodb_common_argument_spec, mongo_auth, PYMONGO_IMP_ERR, pymongo_found, get_mongodb_client, ) def user_find(client, user, db_name): """Check if the user exists. Args: client (cursor): Mongodb cursor on admin database. user (str): User to check. db_name (str): User's database. Returns: dict: when user exists, False otherwise. """ try: for mongo_user in client[db_name].command('usersInfo')['users']: if mongo_user['user'] == user: # NOTE: there is no 'db' field in mongo 2.4. if 'db' not in mongo_user: return mongo_user # Workaround to make the condition works with AWS DocumentDB, # since all users are in the admin database. if mongo_user["db"] in [db_name, "admin"]: return mongo_user except Exception as excep: if hasattr(excep, 'code') and excep.code == 11: # 11=UserNotFound pass # Allow return False else: raise return False def user_add(module, client, db_name, user, password, roles): # pymongo's user_add is a _create_or_update_user so we won't know if it was changed or updated # without reproducing a lot of the logic in database.py of pymongo db = client[db_name] try: exists = user_find(client, user, db_name) except Exception as excep: # We get this exception: "not authorized on admin to execute command" # when auth is enabled on a new instance. The loalhost exception should # allow us to create the first user. If the localhost exception does not apply, # then user creation will also fail with unauthorized. So, ignore Unauthorized here. if hasattr(excep, 'code') and excep.code == 13: # 13=Unauthorized exists = False else: raise if exists: user_add_db_command = 'updateUser' if not roles: roles = None else: user_add_db_command = 'createUser' user_dict = {} if password is not None: user_dict["pwd"] = password if roles is not None: user_dict["roles"] = roles db.command(user_add_db_command, user, **user_dict) def user_remove(module, client, db_name, user): exists = user_find(client, user, db_name) if exists: if module.check_mode: module.exit_json(changed=True, user=user) db = client[db_name] db.command("dropUser", user) else: module.exit_json(changed=False, user=user) def check_if_roles_changed(uinfo, roles, db_name): # We must be aware of users which can read the oplog on a replicaset # Such users must have access to the local DB, but since this DB does not store users credentials # and is not synchronized among replica sets, the user must be stored on the admin db # Therefore their structure is the following : # { # "_id" : "admin.oplog_reader", # "user" : "oplog_reader", # "db" : "admin", # <-- admin DB # "roles" : [ # { # "role" : "read", # "db" : "local" # <-- local DB # } # ] # } def make_sure_roles_are_a_list_of_dict(roles, db_name): output = list() for role in roles: if isinstance(role, (binary_type, text_type)): new_role = {"role": role, "db": db_name} output.append(new_role) else: output.append(role) return output roles_as_list_of_dict = make_sure_roles_are_a_list_of_dict(roles, db_name) uinfo_roles = uinfo.get('roles', []) if sorted(roles_as_list_of_dict, key=itemgetter('db')) == sorted(uinfo_roles, key=itemgetter('db')): return False return True # ========================================= # Module execution. # def main(): argument_spec = mongodb_common_argument_spec() argument_spec.update( database=dict(required=True, aliases=['db']), name=dict(required=True, aliases=['user']), password=dict(aliases=['pass'], no_log=True), replica_set=dict(default=None), roles=dict(default=None, type='list', elements='raw'), state=dict(default='present', choices=['absent', 'present']), update_password=dict(default="always", choices=["always", "on_create"], no_log=False), create_for_localhost_exception=dict(default=None, type='path'), ) module = AnsibleModule( argument_spec=argument_spec, supports_check_mode=True, ) login_user = module.params['login_user'] # Certs don't have a password but we want this module behaviour if module.params['login_database'] == '$external': module.params['update_password'] = 'on_create' if not pymongo_found: module.fail_json(msg=missing_required_lib('pymongo'), exception=PYMONGO_IMP_ERR) create_for_localhost_exception = module.params['create_for_localhost_exception'] b_create_for_localhost_exception = ( to_bytes(create_for_localhost_exception, errors='surrogate_or_strict') if create_for_localhost_exception is not None else None ) db_name = module.params['database'] user = module.params['name'] password = module.params['password'] roles = module.params['roles'] or [] state = module.params['state'] update_password = module.params['update_password'] try: directConnection = False if module.params['replica_set'] is None: directConnection = True client = get_mongodb_client(module, directConnection=directConnection) client = mongo_auth(module, client, directConnection=directConnection) except Exception as e: module.fail_json(msg='Unable to connect to database: %s' % to_native(e)) if state == 'present': if password is None and update_password == 'always': module.fail_json(msg='password parameter required when adding a user unless update_password is set to on_create') if login_user is None and create_for_localhost_exception is not None: if os.path.exists(b_create_for_localhost_exception): try: client.close() except Exception: pass module.exit_json(changed=False, user=user, skipped=True, msg="The path in create_for_localhost_exception exists.") try: if update_password != 'always': uinfo = user_find(client, user, db_name) if uinfo: password = None if not check_if_roles_changed(uinfo, roles, db_name): module.exit_json(changed=False, user=user) if module.check_mode: module.exit_json(changed=True, user=user) user_add(module, client, db_name, user, password, roles) except Exception as e: module.fail_json(msg='Unable to add or update user: %s' % to_native(e), exception=traceback.format_exc()) finally: try: client.close() except Exception: pass # Here we can check password change if mongo provide a query for that : https://jira.mongodb.org/browse/SERVER-22848 # newuinfo = user_find(client, user, db_name) # if uinfo['role'] == newuinfo['role'] and CheckPasswordHere: # module.exit_json(changed=False, user=user) if login_user is None and create_for_localhost_exception is not None: # localhost exception applied. try: # touch the file open(b_create_for_localhost_exception, 'wb').close() except Exception as e: module.fail_json( changed=True, msg='Added user but unable to touch create_for_localhost_exception file %s: %s' % (create_for_localhost_exception, to_native(e)), exception=traceback.format_exc() ) elif state == 'absent': try: user_remove(module, client, db_name, user) except Exception as e: module.fail_json(msg='Unable to remove user: %s' % to_native(e), exception=traceback.format_exc()) finally: try: client.close() except Exception: pass module.exit_json(changed=True, user=user) if __name__ == '__main__': main()