forked from CCCHH/ansible-infra
166 lines
5.6 KiB
Python
166 lines
5.6 KiB
Python
# Copyright 2018 Edoardo Tenani <e.tenani@arduino.cc> (@endorama)
|
|
# GNU General Public License v3.0+ (see LICENSES/GPL-3.0-or-later.txt or https://www.gnu.org/licenses/gpl-3.0.txt)
|
|
# SPDX-License-Identifier: GPL-3.0-or-later
|
|
|
|
from __future__ import annotations
|
|
|
|
DOCUMENTATION = r"""
|
|
name: sops
|
|
author: Edoardo Tenani (@endorama) <e.tenani@arduino.cc>
|
|
short_description: Read SOPS-encrypted file contents
|
|
version_added: '0.1.0'
|
|
description:
|
|
- This lookup returns the contents from a file on the Ansible controller's file system.
|
|
- This lookup requires the C(sops) executable to be available in the controller PATH.
|
|
options:
|
|
_terms:
|
|
description: Path(s) of files to read.
|
|
required: true
|
|
type: list
|
|
elements: str
|
|
rstrip:
|
|
description: Whether to remove trailing newlines and spaces.
|
|
type: bool
|
|
default: true
|
|
base64:
|
|
description:
|
|
- Base64-encodes the parsed result.
|
|
- Use this if you want to store binary data in Ansible variables.
|
|
type: bool
|
|
default: false
|
|
input_type:
|
|
description:
|
|
- Tell SOPS how to interpret the encrypted file.
|
|
- By default, SOPS will chose the input type from the file extension. If it detects the wrong type for a file, this
|
|
could result in decryption failing.
|
|
- The value V(ini) is available since community.sops 1.9.0.
|
|
type: str
|
|
choices:
|
|
- binary
|
|
- json
|
|
- yaml
|
|
- dotenv
|
|
- ini
|
|
output_type:
|
|
description:
|
|
- Tell SOPS how to interpret the decrypted file.
|
|
- By default, SOPS will chose the output type from the file extension. If it detects the wrong type for a file, this
|
|
could result in decryption failing.
|
|
- The value V(ini) is available since community.sops 1.9.0.
|
|
type: str
|
|
choices:
|
|
- binary
|
|
- json
|
|
- yaml
|
|
- dotenv
|
|
- ini
|
|
empty_on_not_exist:
|
|
description:
|
|
- When set to V(true), will not raise an error when a file cannot be found, but return an empty string instead.
|
|
type: bool
|
|
default: false
|
|
extract:
|
|
description:
|
|
- Tell SOPS to extract a specific key from a JSON or YAML file.
|
|
- Expects a string with the same 'querystring' syntax as SOPS' C(--encrypt) option, for example V(["somekey"][0]).
|
|
- B(Note:) Escape quotes appropriately.
|
|
type: str
|
|
version_added: 1.9.0
|
|
extends_documentation_fragment:
|
|
- community.sops.sops
|
|
- community.sops.sops.ansible_variables
|
|
- community.sops.sops.ansible_env
|
|
- community.sops.sops.ansible_ini
|
|
notes:
|
|
- This lookup does not understand 'globbing' - use the P(ansible.builtin.fileglob#lookup) lookup instead.
|
|
seealso:
|
|
- plugin: community.sops.decrypt
|
|
plugin_type: filter
|
|
description: The decrypt filter can be used to descrypt SOPS-encrypted in-memory data.
|
|
- plugin: community.sops.sops
|
|
plugin_type: vars
|
|
description: The sops vars plugin can be used to load SOPS-encrypted host or group variables.
|
|
- module: community.sops.load_vars
|
|
"""
|
|
|
|
EXAMPLES = r"""
|
|
---
|
|
- name: Output secrets to screen (BAD IDEA!)
|
|
ansible.builtin.debug:
|
|
msg: "Content: {{ lookup('community.sops.sops', item) }}"
|
|
loop:
|
|
- sops-encrypted-file.enc.yaml
|
|
|
|
- name: Add SSH private key
|
|
ansible.builtin.copy:
|
|
# Note that rstrip=false is necessary for some SSH versions to be able to use the key
|
|
content: "{{ lookup('community.sops.sops', user + '-id_rsa', rstrip=false) }}"
|
|
dest: /home/{{ user }}/.ssh/id_rsa
|
|
owner: "{{ user }}"
|
|
group: "{{ user }}"
|
|
mode: "0600"
|
|
no_log: true # avoid content to be written to log
|
|
|
|
- name: The file file.json is a YAML file, which contains the encryption of binary data
|
|
ansible.builtin.debug:
|
|
msg: "Content: {{ lookup('community.sops.sops', 'file.json', input_type='yaml', output_type='binary') }}"
|
|
"""
|
|
|
|
RETURN = r"""
|
|
_raw:
|
|
description: Decrypted file content.
|
|
type: list
|
|
elements: str
|
|
"""
|
|
|
|
import base64
|
|
|
|
from ansible.errors import AnsibleLookupError
|
|
from ansible.plugins.lookup import LookupBase
|
|
from ansible.module_utils.common.text.converters import to_native
|
|
from ansible_collections.community.sops.plugins.module_utils.sops import Sops, SopsError
|
|
|
|
from ansible.utils.display import Display
|
|
display = Display()
|
|
|
|
|
|
class LookupModule(LookupBase):
|
|
|
|
def run(self, terms, variables=None, **kwargs):
|
|
self.set_options(var_options=variables, direct=kwargs)
|
|
rstrip = self.get_option('rstrip')
|
|
use_base64 = self.get_option('base64')
|
|
input_type = self.get_option('input_type')
|
|
output_type = self.get_option('output_type')
|
|
empty_on_not_exist = self.get_option('empty_on_not_exist')
|
|
extract = self.get_option('extract')
|
|
|
|
ret = []
|
|
|
|
def get_option_value(argument_name):
|
|
return self.get_option(argument_name)
|
|
|
|
for term in terms:
|
|
display.debug("Sops lookup term: %s" % term)
|
|
lookupfile = self.find_file_in_search_path(variables, 'files', term, ignore_missing=empty_on_not_exist)
|
|
display.vvvv(u"Sops lookup using %s as file" % lookupfile)
|
|
|
|
if not lookupfile:
|
|
if empty_on_not_exist:
|
|
ret.append('')
|
|
continue
|
|
raise AnsibleLookupError("could not locate file in lookup: %s" % to_native(term))
|
|
|
|
try:
|
|
output = Sops.decrypt(
|
|
lookupfile, display=display, rstrip=rstrip, decode_output=(not use_base64),
|
|
input_type=input_type, output_type=output_type, get_option_value=get_option_value, extract=extract)
|
|
except SopsError as e:
|
|
raise AnsibleLookupError(to_native(e))
|
|
|
|
if use_base64:
|
|
output = to_native(base64.b64encode(output))
|
|
|
|
ret.append(output)
|
|
|
|
return ret
|