summaryrefslogtreecommitdiff
path: root/lib/ansible/modules/extras/univention
diff options
context:
space:
mode:
Diffstat (limited to 'lib/ansible/modules/extras/univention')
-rw-r--r--lib/ansible/modules/extras/univention/__init__.py0
-rw-r--r--lib/ansible/modules/extras/univention/udm_dns_record.py182
-rw-r--r--lib/ansible/modules/extras/univention/udm_dns_zone.py240
-rw-r--r--lib/ansible/modules/extras/univention/udm_group.py176
-rw-r--r--lib/ansible/modules/extras/univention/udm_share.py617
-rw-r--r--lib/ansible/modules/extras/univention/udm_user.py591
6 files changed, 1806 insertions, 0 deletions
diff --git a/lib/ansible/modules/extras/univention/__init__.py b/lib/ansible/modules/extras/univention/__init__.py
new file mode 100644
index 0000000000..e69de29bb2
--- /dev/null
+++ b/lib/ansible/modules/extras/univention/__init__.py
diff --git a/lib/ansible/modules/extras/univention/udm_dns_record.py b/lib/ansible/modules/extras/univention/udm_dns_record.py
new file mode 100644
index 0000000000..dab1e13438
--- /dev/null
+++ b/lib/ansible/modules/extras/univention/udm_dns_record.py
@@ -0,0 +1,182 @@
+#!/usr/bin/python
+# -*- coding: UTF-8 -*-
+
+# Copyright (c) 2016, Adfinis SyGroup AG
+# Tobias Rueetschi <tobias.ruetschi@adfinis-sygroup.ch>
+#
+# This file is part of Ansible
+#
+# Ansible is free software: you can redistribute it and/or modify
+# it under the terms of the GNU General Public License as published by
+# the Free Software Foundation, either version 3 of the License, or
+# (at your option) any later version.
+#
+# Ansible is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with Ansible. If not, see <http://www.gnu.org/licenses/>.
+#
+
+
+from ansible.module_utils.basic import AnsibleModule
+from ansible.module_utils.univention_umc import (
+ umc_module_for_add,
+ umc_module_for_edit,
+ ldap_search,
+ base_dn,
+ config,
+ uldap,
+)
+from univention.admin.handlers.dns import (
+ forward_zone,
+ reverse_zone,
+)
+
+
+DOCUMENTATION = '''
+---
+module: udm_dns_record
+version_added: "2.2"
+author: "Tobias Rueetschi (@2-B)"
+short_description: Manage dns entries on a univention corporate server
+description:
+ - "This module allows to manage dns records on a univention corporate server (UCS).
+ It uses the python API of the UCS to create a new object or edit it."
+requirements:
+ - Python >= 2.6
+options:
+ state:
+ required: false
+ default: "present"
+ choices: [ present, absent ]
+ description:
+ - Whether the dns record is present or not.
+ name:
+ required: true
+ description:
+ - "Name of the record, this is also the DNS record. E.g. www for
+ www.example.com."
+ zone:
+ required: true
+ description:
+ - Corresponding DNS zone for this record, e.g. example.com.
+ type:
+ required: true
+ choices: [ host_record, alias, ptr_record, srv_record, txt_record ]
+ description:
+ - "Define the record type. C(host_record) is a A or AAAA record,
+ C(alias) is a CNAME, C(ptr_record) is a PTR record, C(srv_record)
+ is a SRV record and C(txt_record) is a TXT record."
+ data:
+ required: false
+ default: []
+ description:
+ - "Additional data for this record, e.g. ['a': '192.0.2.1'].
+ Required if C(state=present)."
+'''
+
+
+EXAMPLES = '''
+# Create a DNS record on a UCS
+- udm_dns_zone: name=www
+ zone=example.com
+ type=host_record
+ data=['a': '192.0.2.1']
+'''
+
+
+RETURN = '''# '''
+
+
+def main():
+ module = AnsibleModule(
+ argument_spec = dict(
+ type = dict(required=True,
+ type='str'),
+ zone = dict(required=True,
+ type='str'),
+ name = dict(required=True,
+ type='str'),
+ data = dict(default=[],
+ type='dict'),
+ state = dict(default='present',
+ choices=['present', 'absent'],
+ type='str')
+ ),
+ supports_check_mode=True,
+ required_if = ([
+ ('state', 'present', ['data'])
+ ])
+ )
+ type = module.params['type']
+ zone = module.params['zone']
+ name = module.params['name']
+ data = module.params['data']
+ state = module.params['state']
+ changed = False
+
+ obj = list(ldap_search(
+ '(&(objectClass=dNSZone)(zoneName={})(relativeDomainName={}))'.format(zone, name),
+ attr=['dNSZone']
+ ))
+
+ exists = bool(len(obj))
+ container = 'zoneName={},cn=dns,{}'.format(zone, base_dn())
+ dn = 'relativeDomainName={},{}'.format(name, container)
+
+ if state == 'present':
+ try:
+ if not exists:
+ so = forward_zone.lookup(
+ config(),
+ uldap(),
+ '(zone={})'.format(zone),
+ scope='domain',
+ ) or reverse_zone.lookup(
+ config(),
+ uldap(),
+ '(zone={})'.format(zone),
+ scope='domain',
+ )
+ obj = umc_module_for_add('dns/{}'.format(type), container, superordinate=so[0])
+ else:
+ obj = umc_module_for_edit('dns/{}'.format(type), dn)
+ obj['name'] = name
+ for k, v in data.items():
+ obj[k] = v
+ diff = obj.diff()
+ changed = obj.diff() != []
+ if not module.check_mode:
+ if not exists:
+ obj.create()
+ else:
+ obj.modify()
+ except BaseException as e:
+ module.fail_json(
+ msg='Creating/editing dns entry {} in {} failed: {}'.format(name, container, e)
+ )
+
+ if state == 'absent' and exists:
+ try:
+ obj = umc_module_for_edit('dns/{}'.format(type), dn)
+ if not module.check_mode:
+ obj.remove()
+ changed = True
+ except BaseException as e:
+ module.fail_json(
+ msg='Removing dns entry {} in {} failed: {}'.format(name, container, e)
+ )
+
+ module.exit_json(
+ changed=changed,
+ name=name,
+ diff=diff,
+ container=container
+ )
+
+
+if __name__ == '__main__':
+ main()
diff --git a/lib/ansible/modules/extras/univention/udm_dns_zone.py b/lib/ansible/modules/extras/univention/udm_dns_zone.py
new file mode 100644
index 0000000000..baf844b546
--- /dev/null
+++ b/lib/ansible/modules/extras/univention/udm_dns_zone.py
@@ -0,0 +1,240 @@
+#!/usr/bin/python
+# -*- coding: UTF-8 -*-
+
+# Copyright (c) 2016, Adfinis SyGroup AG
+# Tobias Rueetschi <tobias.ruetschi@adfinis-sygroup.ch>
+#
+# This file is part of Ansible
+#
+# Ansible is free software: you can redistribute it and/or modify
+# it under the terms of the GNU General Public License as published by
+# the Free Software Foundation, either version 3 of the License, or
+# (at your option) any later version.
+#
+# Ansible is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with Ansible. If not, see <http://www.gnu.org/licenses/>.
+#
+
+
+from ansible.module_utils.basic import AnsibleModule
+from ansible.module_utils.univention_umc import (
+ umc_module_for_add,
+ umc_module_for_edit,
+ ldap_search,
+ base_dn,
+)
+
+
+DOCUMENTATION = '''
+---
+module: udm_dns_zone
+version_added: "2.2"
+author: "Tobias Rueetschi (@2-B)"
+short_description: Manage dns zones on a univention corporate server
+description:
+ - "This module allows to manage dns zones on a univention corporate server (UCS).
+ It uses the python API of the UCS to create a new object or edit it."
+requirements:
+ - Python >= 2.6
+options:
+ state:
+ required: false
+ default: "present"
+ choices: [ present, absent ]
+ description:
+ - Whether the dns zone is present or not.
+ type:
+ required: true
+ choices: [ forward_zone, reverse_zone ]
+ description:
+ - Define if the zone is a forward or reverse DNS zone.
+ zone:
+ required: true
+ description:
+ - DNS zone name, e.g. C(example.com).
+ nameserver:
+ required: false
+ description:
+ - List of appropriate name servers. Required if C(state=present).
+ interfaces:
+ required: false
+ description:
+ - List of interface IP addresses, on which the server should
+ response this zone. Required if C(state=present).
+
+ refresh:
+ required: false
+ default: 3600
+ description:
+ - Interval before the zone should be refreshed.
+ retry:
+ required: false
+ default: 1800
+ description:
+ - Interval that should elapse before a failed refresh should be retried.
+ expire:
+ required: false
+ default: 604800
+ description:
+ - Specifies the upper limit on the time interval that can elapse before the zone is no longer authoritative.
+ ttl:
+ required: false
+ default: 600
+ description:
+ - Minimum TTL field that should be exported with any RR from this zone.
+
+ contact:
+ required: false
+ default: ''
+ description:
+ - Contact person in the SOA record.
+ mx:
+ required: false
+ default: []
+ description:
+ - List of MX servers. (Must declared as A or AAAA records).
+'''
+
+
+EXAMPLES = '''
+# Create a DNS zone on a UCS
+- udm_dns_zone: zone=example.com
+ type=forward_zone
+ nameserver=['ucs.example.com']
+ interfaces=['192.0.2.1']
+'''
+
+
+RETURN = '''# '''
+
+
+def convert_time(time):
+ """Convert a time in seconds into the biggest unit"""
+ units = [
+ (24 * 60 * 60 , 'days'),
+ (60 * 60 , 'hours'),
+ (60 , 'minutes'),
+ (1 , 'seconds'),
+ ]
+
+ if time == 0:
+ return ('0', 'seconds')
+ for unit in units:
+ if time >= unit[0]:
+ return ('{}'.format(time // unit[0]), unit[1])
+
+
+def main():
+ module = AnsibleModule(
+ argument_spec = dict(
+ type = dict(required=True,
+ type='str'),
+ zone = dict(required=True,
+ aliases=['name'],
+ type='str'),
+ nameserver = dict(default=[],
+ type='list'),
+ interfaces = dict(default=[],
+ type='list'),
+ refresh = dict(default=3600,
+ type='int'),
+ retry = dict(default=1800,
+ type='int'),
+ expire = dict(default=604800,
+ type='int'),
+ ttl = dict(default=600,
+ type='int'),
+ contact = dict(default='',
+ type='str'),
+ mx = dict(default=[],
+ type='list'),
+ state = dict(default='present',
+ choices=['present', 'absent'],
+ type='str')
+ ),
+ supports_check_mode=True,
+ required_if = ([
+ ('state', 'present', ['nameserver', 'interfaces'])
+ ])
+ )
+ type = module.params['type']
+ zone = module.params['zone']
+ nameserver = module.params['nameserver']
+ interfaces = module.params['interfaces']
+ refresh = module.params['refresh']
+ retry = module.params['retry']
+ expire = module.params['expire']
+ ttl = module.params['ttl']
+ contact = module.params['contact']
+ mx = module.params['mx']
+ state = module.params['state']
+ changed = False
+
+ obj = list(ldap_search(
+ '(&(objectClass=dNSZone)(zoneName={}))'.format(zone),
+ attr=['dNSZone']
+ ))
+
+ exists = bool(len(obj))
+ container = 'cn=dns,{}'.format(base_dn())
+ dn = 'zoneName={},{}'.format(zone, container)
+ if contact == '':
+ contact = 'root@{}.'.format(zone)
+
+ if state == 'present':
+ try:
+ if not exists:
+ obj = umc_module_for_add('dns/{}'.format(type), container)
+ else:
+ obj = umc_module_for_edit('dns/{}'.format(type), dn)
+ obj['zone'] = zone
+ obj['nameserver'] = nameserver
+ obj['a'] = interfaces
+ obj['refresh'] = convert_time(refresh)
+ obj['retry'] = convert_time(retry)
+ obj['expire'] = convert_time(expire)
+ obj['ttl'] = convert_time(ttl)
+ obj['contact'] = contact
+ obj['mx'] = mx
+ diff = obj.diff()
+ if exists:
+ for k in obj.keys():
+ if obj.hasChanged(k):
+ changed = True
+ else:
+ changed = True
+ if not module.check_mode:
+ if not exists:
+ obj.create()
+ elif changed:
+ obj.modify()
+ except Exception as e:
+ module.fail_json(
+ msg='Creating/editing dns zone {} failed: {}'.format(zone, e)
+ )
+
+ if state == 'absent' and exists:
+ try:
+ obj = umc_module_for_edit('dns/{}'.format(type), dn)
+ if not module.check_mode:
+ obj.remove()
+ changed = True
+ except Exception as e:
+ module.fail_json(
+ msg='Removing dns zone {} failed: {}'.format(zone, e)
+ )
+
+ module.exit_json(
+ changed=changed,
+ diff=diff,
+ zone=zone
+ )
+
+
+if __name__ == '__main__':
+ main()
diff --git a/lib/ansible/modules/extras/univention/udm_group.py b/lib/ansible/modules/extras/univention/udm_group.py
new file mode 100644
index 0000000000..588c765524
--- /dev/null
+++ b/lib/ansible/modules/extras/univention/udm_group.py
@@ -0,0 +1,176 @@
+#!/usr/bin/python
+# -*- coding: UTF-8 -*-
+
+# Copyright (c) 2016, Adfinis SyGroup AG
+# Tobias Rueetschi <tobias.ruetschi@adfinis-sygroup.ch>
+#
+# This file is part of Ansible
+#
+# Ansible is free software: you can redistribute it and/or modify
+# it under the terms of the GNU General Public License as published by
+# the Free Software Foundation, either version 3 of the License, or
+# (at your option) any later version.
+#
+# Ansible is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with Ansible. If not, see <http://www.gnu.org/licenses/>.
+#
+
+
+from ansible.module_utils.basic import AnsibleModule
+from ansible.module_utils.univention_umc import (
+ umc_module_for_add,
+ umc_module_for_edit,
+ ldap_search,
+ base_dn,
+)
+
+
+DOCUMENTATION = '''
+---
+module: udm_group
+version_added: "2.2"
+author: "Tobias Rueetschi (@2-B)"
+short_description: Manage of the posix group
+description:
+ - "This module allows to manage user groups on a univention corporate server (UCS).
+ It uses the python API of the UCS to create a new object or edit it."
+requirements:
+ - Python >= 2.6
+options:
+ state:
+ required: false
+ default: "present"
+ choices: [ present, absent ]
+ description:
+ - Whether the group is present or not.
+ name:
+ required: true
+ description:
+ - Name of the posix group.
+ description:
+ required: false
+ description:
+ - Group description.
+ position:
+ required: false
+ description:
+ - define the whole ldap position of the group, e.g.
+ C(cn=g123m-1A,cn=classes,cn=schueler,cn=groups,ou=schule,dc=example,dc=com).
+ ou:
+ required: false
+ description:
+ - LDAP OU, e.g. school for LDAP OU C(ou=school,dc=example,dc=com).
+ subpath:
+ required: false
+ description:
+ - Subpath inside the OU, e.g. C(cn=classes,cn=students,cn=groups).
+'''
+
+
+EXAMPLES = '''
+# Create a POSIX group
+- udm_group: name=g123m-1A
+
+# Create a POSIX group with the exact DN
+# C(cn=g123m-1A,cn=classes,cn=students,cn=groups,ou=school,dc=school,dc=example,dc=com)
+- udm_group: name=g123m-1A
+ subpath='cn=classes,cn=students,cn=groups'
+ ou=school
+# or
+- udm_group: name=g123m-1A
+ position='cn=classes,cn=students,cn=groups,ou=school,dc=school,dc=example,dc=com'
+'''
+
+
+RETURN = '''# '''
+
+
+def main():
+ module = AnsibleModule(
+ argument_spec = dict(
+ name = dict(required=True,
+ type='str'),
+ description = dict(default=None,
+ type='str'),
+ position = dict(default='',
+ type='str'),
+ ou = dict(default='',
+ type='str'),
+ subpath = dict(default='cn=groups',
+ type='str'),
+ state = dict(default='present',
+ choices=['present', 'absent'],
+ type='str')
+ ),
+ supports_check_mode=True
+ )
+ name = module.params['name']
+ description = module.params['description']
+ position = module.params['position']
+ ou = module.params['ou']
+ subpath = module.params['subpath']
+ state = module.params['state']
+ changed = False
+
+ groups = list(ldap_search(
+ '(&(objectClass=posixGroup)(cn={}))'.format(name),
+ attr=['cn']
+ ))
+ if position != '':
+ container = position
+ else:
+ if ou != '':
+ ou = 'ou={},'.format(ou)
+ if subpath != '':
+ subpath = '{},'.format(subpath)
+ container = '{}{}{}'.format(subpath, ou, base_dn())
+ group_dn = 'cn={},{}'.format(name, container)
+
+ exists = bool(len(groups))
+
+ if state == 'present':
+ try:
+ if not exists:
+ grp = umc_module_for_add('groups/group', container)
+ else:
+ grp = umc_module_for_edit('groups/group', group_dn)
+ grp['name'] = name
+ grp['description'] = description
+ diff = grp.diff()
+ changed = grp.diff() != []
+ if not module.check_mode:
+ if not exists:
+ grp.create()
+ else:
+ grp.modify()
+ except:
+ module.fail_json(
+ msg="Creating/editing group {} in {} failed".format(name, container)
+ )
+
+ if state == 'absent' and exists:
+ try:
+ grp = umc_module_for_edit('groups/group', group_dn)
+ if not module.check_mode:
+ grp.remove()
+ changed = True
+ except:
+ module.fail_json(
+ msg="Removing group {} failed".format(name)
+ )
+
+ module.exit_json(
+ changed=changed,
+ name=name,
+ diff=diff,
+ container=container
+ )
+
+
+if __name__ == '__main__':
+ main()
diff --git a/lib/ansible/modules/extras/univention/udm_share.py b/lib/ansible/modules/extras/univention/udm_share.py
new file mode 100644
index 0000000000..fa8639958e
--- /dev/null
+++ b/lib/ansible/modules/extras/univention/udm_share.py
@@ -0,0 +1,617 @@
+#!/usr/bin/python
+# -*- coding: UTF-8 -*-
+
+# Copyright (c) 2016, Adfinis SyGroup AG
+# Tobias Rueetschi <tobias.ruetschi@adfinis-sygroup.ch>
+#
+# This file is part of Ansible
+#
+# Ansible is free software: you can redistribute it and/or modify
+# it under the terms of the GNU General Public License as published by
+# the Free Software Foundation, either version 3 of the License, or
+# (at your option) any later version.
+#
+# Ansible is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with Ansible. If not, see <http://www.gnu.org/licenses/>.
+#
+
+
+from ansible.module_utils.basic import AnsibleModule
+from ansible.module_utils.univention_umc import (
+ umc_module_for_add,
+ umc_module_for_edit,
+ ldap_search,
+ base_dn,
+)
+
+
+DOCUMENTATION = '''
+---
+module: udm_share
+version_added: "2.2"
+author: "Tobias Rueetschi (@2-B)"
+short_description: Manage samba shares on a univention corporate server
+description:
+ - "This module allows to manage samba shares on a univention corporate
+ server (UCS).
+ It uses the python API of the UCS to create a new object or edit it."
+requirements:
+ - Python >= 2.6
+options:
+ state:
+ required: false
+ default: "present"
+ choices: [ present, absent ]
+ description:
+ - Whether the share is present or not.
+ name:
+ required: true
+ description:
+ - Name
+ host:
+ required: false
+ default: None
+ description:
+ - Host FQDN (server which provides the share), e.g. C({{
+ ansible_fqdn }}). Required if C(state=present).
+ path:
+ required: false
+ default: None
+ description:
+ - Directory on the providing server, e.g. C(/home). Required if C(state=present).
+ samba_name:
+ required: false
+ default: None
+ description:
+ - Windows name. Required if C(state=present).
+ aliases: [ sambaName ]
+ ou:
+ required: true
+ description:
+ - Organisational unit, inside the LDAP Base DN.
+ owner:
+ required: false
+ default: 0
+ description:
+ - Directory owner of the share's root directory.
+ group:
+ required: false
+ default: '0'
+ description:
+ - Directory owner group of the share's root directory.
+ directorymode:
+ required: false
+ default: '00755'
+ description:
+ - Permissions for the share's root directory.
+ root_squash:
+ required: false
+ default: '1'
+ choices: [ '0', '1' ]
+ description:
+ - Modify user ID for root user (root squashing).
+ subtree_checking:
+ required: false
+ default: '1'
+ choices: [ '0', '1' ]
+ description:
+ - Subtree checking.
+ sync:
+ required: false
+ default: 'sync'
+ description:
+ - NFS synchronisation.
+ writeable:
+ required: false
+ default: '1'
+ choices: [ '0', '1' ]
+ description:
+ - NFS write access.
+ samba_block_size:
+ required: false
+ default: None
+ description:
+ - Blocking size.
+ aliases: [ sambaBlockSize ]
+ samba_blocking_locks:
+ required: false
+ default: '1'
+ choices: [ '0', '1' ]
+ description:
+ - Blocking locks.
+ aliases: [ sambaBlockingLocks ]
+ samba_browseable:
+ required: false
+ default: '1'
+ choices: [ '0', '1' ]
+ description:
+ - Show in Windows network environment.
+ aliases: [ sambaBrowseable ]
+ samba_create_mode:
+ required: false
+ default: '0744'
+ description:
+ - File mode.
+ aliases: [ sambaCreateMode ]
+ samba_csc_policy:
+ required: false
+ default: 'manual'
+ description:
+ - Client-side caching policy.
+ aliases: [ sambaCscPolicy ]
+ samba_custom_settings:
+ required: false
+ default: []
+ description:
+ - Option name in smb.conf and its value.
+ aliases: [ sambaCustomSettings ]
+ samba_directory_mode:
+ required: false
+ default: '0755'
+ description:
+ - Directory mode.
+ aliases: [ sambaDirectoryMode ]
+ samba_directory_security_mode:
+ required: false
+ default: '0777'
+ description:
+ - Directory security mode.
+ aliases: [ sambaDirectorySecurityMode ]
+ samba_dos_filemode:
+ required: false
+ default: '0'
+ choices: [ '0', '1' ]
+ description:
+ - Users with write access may modify permissions.
+ aliases: [ sambaDosFilemode ]
+ samba_fake_oplocks:
+ required: false
+ default: '0'
+ choices: [ '0', '1' ]
+ description:
+ - Fake oplocks.
+ aliases: [ sambaFakeOplocks ]
+ samba_force_create_mode:
+ required: false
+ default: '0'
+ choices: [ '0', '1' ]
+ description:
+ - Force file mode.
+ aliases: [ sambaForceCreateMode ]
+ samba_force_directory_mode:
+ required: false
+ default: '0'
+ choices: [ '0', '1' ]
+ description:
+ - Force directory mode.
+ aliases: [ sambaForceDirectoryMode ]
+ samba_force_directory_security_mode:
+ required: false
+ default: '0'
+ choices: [ '0', '1' ]
+ description:
+ - Force directory security mode.
+ aliases: [ sambaForceDirectorySecurityMode ]
+ samba_force_group:
+ required: false
+ default: None
+ description:
+ - Force group.
+ aliases: [ sambaForceGroup ]
+ samba_force_security_mode:
+ required: false
+ default: '0'
+ choices: [ '0', '1' ]
+ description:
+ - Force security mode.
+ aliases: [ sambaForceSecurityMode ]
+ samba_force_user:
+ required: false
+ default: None
+ description:
+ - Force user.
+ aliases: [ sambaForceUser ]
+ samba_hide_files:
+ required: false
+ default: None
+ description:
+ - Hide files.
+ aliases: [ sambaHideFiles ]
+ samba_hide_unreadable:
+ required: false
+ default: '0'
+ choices: [ '0', '1' ]
+ description:
+ - Hide unreadable files/directories.
+ aliases: [ sambaHideUnreadable ]
+ samba_hosts_allow:
+ required: false
+ default: []
+ description:
+ - Allowed host/network.
+ aliases: [ sambaHostsAllow ]
+ samba_hosts_deny:
+ required: false
+ default: []
+ description:
+ - Denied host/network.
+ aliases: [ sambaHostsDeny ]
+ samba_inherit_acls:
+ required: false
+ default: '1'
+ choices: [ '0', '1' ]
+ description:
+ - Inherit ACLs.
+ aliases: [ sambaInheritAcls ]
+ samba_inherit_owner:
+ required: false
+ default: '0'
+ choices: [ '0', '1' ]
+ description:
+ - Create files/directories with the owner of the parent directory.
+ aliases: [ sambaInheritOwner ]
+ samba_inherit_permissions:
+ required: false
+ default: '0'
+ choices: [ '0', '1' ]
+ description:
+ - Create files/directories with permissions of the parent directory.
+ aliases: [ sambaInheritPermissions ]
+ samba_invalid_users:
+ required: false
+ default: None
+ description:
+ - Invalid users or groups.
+ aliases: [ sambaInvalidUsers ]
+ samba_level_2_oplocks:
+ required: false
+ default: '1'
+ choices: [ '0', '1' ]
+ description:
+ - Level 2 oplocks.
+ aliases: [ sambaLevel2Oplocks ]
+ samba_locking:
+ required: false
+ default: '1'
+ choices: [ '0', '1' ]
+ description:
+ - Locking.
+ aliases: [ sambaLocking ]
+ samba_msdfs_root:
+ required: false
+ default: '0'
+ choices: [ '0', '1' ]
+ description:
+ - MSDFS root.
+ aliases: [ sambaMSDFSRoot ]
+ samba_nt_acl_support:
+ required: false
+ default: '1'
+ choices: [ '0', '1' ]
+ description:
+ - NT ACL support.
+ aliases: [ sambaNtAclSupport ]
+ samba_oplocks:
+ required: false
+ default: '1'
+ choices: [ '0', '1' ]
+ description:
+ - Oplocks.
+ aliases: [ sambaOplocks ]
+ samba_postexec:
+ required: false
+ default: None
+ description:
+ - Postexec script.
+ aliases: [ sambaPostexec ]
+ samba_preexec:
+ required: false
+ default: None
+ description:
+ - Preexec script.
+ aliases: [ sambaPreexec ]
+ samba_public:
+ required: false
+ default: '0'
+ choices: [ '0', '1' ]
+ description:
+ - Allow anonymous read-only access with a guest user.
+ aliases: [ sambaPublic ]
+ samba_security_mode:
+ required: false
+ default: '0777'
+ description:
+ - Security mode.
+ aliases: [ sambaSecurityMode ]
+ samba_strict_locking:
+ required: false
+ default: 'Auto'
+ description:
+ - Strict locking.
+ aliases: [ sambaStrictLocking ]
+ samba_vfs_objects:
+ required: false
+ default: None
+ description:
+ - VFS objects.
+ aliases: [ sambaVFSObjects ]
+ samba_valid_users:
+ required: false
+ default: None
+ description:
+ - Valid users or groups.
+ aliases: [ sambaValidUsers ]
+ samba_write_list:
+ required: false
+ default: None
+ description:
+ - Restrict write access to these users/groups.
+ aliases: [ sambaWriteList ]
+ samba_writeable:
+ required: false
+ default: '1'
+ choices: [ '0', '1' ]
+ description:
+ - Samba write access.
+ aliases: [ sambaWriteable ]
+ nfs_hosts:
+ required: false
+ default: []
+ description:
+ - Only allow access for this host, IP address or network.
+ nfs_custom_settings:
+ required: false
+ default: []
+ description:
+ - Option name in exports file.
+ aliases: [ nfsCustomSettings ]
+'''
+
+
+EXAMPLES = '''
+# Create a share named home on the server ucs.example.com with the path /home.
+- udm_share: name=home
+ path=/home
+ host=ucs.example.com
+ sambaName=Home
+'''
+
+
+RETURN = '''# '''
+
+
+def main():
+ module = AnsibleModule(
+ argument_spec = dict(
+ name = dict(required=True,
+ type='str'),
+ ou = dict(required=True,
+ type='str'),
+ owner = dict(type='str',
+ default='0'),
+ group = dict(type='str',
+ default='0'),
+ path = dict(type='path',
+ default=None),
+ directorymode = dict(type='str',
+ default='00755'),
+ host = dict(type='str',
+ default=None),
+ root_squash = dict(type='bool',
+ default=True),
+ subtree_checking = dict(type='bool',
+ default=True),
+ sync = dict(type='str',
+ default='sync'),
+ writeable = dict(type='bool',
+ default=True),
+ sambaBlockSize = dict(type='str',
+ aliases=['samba_block_size'],
+ default=None),
+ sambaBlockingLocks = dict(type='bool',
+ aliases=['samba_blocking_locks'],
+ default=True),
+ sambaBrowseable = dict(type='bool',
+ aliases=['samba_browsable'],
+ default=True),
+ sambaCreateMode = dict(type='str',
+ aliases=['samba_create_mode'],
+ default='0744'),
+ sambaCscPolicy = dict(type='str',
+ aliases=['samba_csc_policy'],
+ default='manual'),
+ sambaCustomSettings = dict(type='list',
+ aliases=['samba_custom_settings'],
+ default=[]),
+ sambaDirectoryMode = dict(type='str',
+ aliases=['samba_directory_mode'],
+ default='0755'),
+ sambaDirectorySecurityMode = dict(type='str',
+ aliases=['samba_directory_security_mode'],
+ default='0777'),
+ sambaDosFilemode = dict(type='bool',
+ aliases=['samba_dos_filemode'],
+ default=False),
+ sambaFakeOplocks = dict(type='bool',
+ aliases=['samba_fake_oplocks'],
+ default=False),
+ sambaForceCreateMode = dict(type='bool',
+ aliases=['samba_force_create_mode'],
+ default=False),
+ sambaForceDirectoryMode = dict(type='bool',
+ aliases=['samba_force_directory_mode'],
+ default=False),
+ sambaForceDirectorySecurityMode = dict(type='bool',
+ aliases=['samba_force_directory_security_mode'],
+ default=False),
+ sambaForceGroup = dict(type='str',
+ aliases=['samba_force_group'],
+ default=None),
+ sambaForceSecurityMode = dict(type='bool',
+ aliases=['samba_force_security_mode'],
+ default=False),
+ sambaForceUser = dict(type='str',
+ aliases=['samba_force_user'],
+ default=None),
+ sambaHideFiles = dict(type='str',
+ aliases=['samba_hide_files'],
+ default=None),
+ sambaHideUnreadable = dict(type='bool',
+ aliases=['samba_hide_unreadable'],
+ default=False),
+ sambaHostsAllow = dict(type='list',
+ aliases=['samba_hosts_allow'],
+ default=[]),
+ sambaHostsDeny = dict(type='list',
+ aliases=['samba_hosts_deny'],
+ default=[]),
+ sambaInheritAcls = dict(type='bool',
+ aliases=['samba_inherit_acls'],
+ default=True),
+ sambaInheritOwner = dict(type='bool',
+ aliases=['samba_inherit_owner'],
+ default=False),
+ sambaInheritPermissions = dict(type='bool',
+ aliases=['samba_inherit_permissions'],
+ default=False),
+ sambaInvalidUsers = dict(type='str',
+ aliases=['samba_invalid_users'],
+ default=None),
+ sambaLevel2Oplocks = dict(type='bool',
+ aliases=['samba_level_2_oplocks'],
+ default=True),
+ sambaLocking = dict(type='bool',
+ aliases=['samba_locking'],
+ default=True),
+ sambaMSDFSRoot = dict(type='bool',
+ aliases=['samba_msdfs_root'],
+ default=False),
+ sambaName = dict(type='str',
+ aliases=['samba_name'],
+ default=None),
+ sambaNtAclSupport = dict(type='bool',
+ aliases=['samba_nt_acl_support'],
+ default=True),
+ sambaOplocks = dict(type='bool',
+ aliases=['samba_oplocks'],
+ default=True),
+ sambaPostexec = dict(type='str',
+ aliases=['samba_postexec'],
+ default=None),
+ sambaPreexec = dict(type='str',
+ aliases=['samba_preexec'],
+ default=None),
+ sambaPublic = dict(type='bool',
+ aliases=['samba_public'],
+ default=False),
+ sambaSecurityMode = dict(type='str',
+ aliases=['samba_security_mode'],
+ default='0777'),
+ sambaStrictLocking = dict(type='str',
+ aliases=['samba_strict_locking'],
+ default='Auto'),
+ sambaVFSObjects = dict(type='str',
+ aliases=['samba_vfs_objects'],
+ default=None),
+ sambaValidUsers = dict(type='str',
+ aliases=['samba_valid_users'],
+ default=None),
+ sambaWriteList = dict(type='str',
+ aliases=['samba_write_list'],
+ default=None),
+ sambaWriteable = dict(type='bool',
+ aliases=['samba_writeable'],
+ default=True),
+ nfs_hosts = dict(type='list',
+ default=[]),
+ nfsCustomSettings = dict(type='list',
+ aliases=['nfs_custom_settings'],
+ default=[]),
+ state = dict(default='present',
+ choices=['present', 'absent'],
+ type='str')
+ ),
+ supports_check_mode=True,
+ required_if = ([
+ ('state', 'present', ['path', 'host', 'sambaName'])
+ ])
+ )
+ name = module.params['name']
+ state = module.params['state']
+ changed = False
+
+ obj = list(ldap_search(
+ '(&(objectClass=univentionShare)(cn={}))'.format(name),
+ attr=['cn']
+ ))
+
+ exists = bool(len(obj))
+ container = 'cn=shares,ou={},{}'.format(module.params['ou'], base_dn())
+ dn = 'cn={},{}'.format(name, container)
+
+ if state == 'present':
+ try:
+ if not exists:
+ obj = umc_module_for_add('shares/share', container)
+ else:
+ obj = umc_module_for_edit('shares/share', dn)
+
+ module.params['printablename'] = '{} ({})'.format(name, module.params['host'])
+ for k in obj.keys():
+ if module.params[k] is True:
+ module.params[k] = '1'
+ elif module.params[k] is False:
+ module.params[k] = '0'
+ obj[k] = module.params[k]
+
+ diff = obj.diff()
+ if exists:
+ for k in obj.keys():
+ if obj.hasChanged(k):
+ changed = True
+ else:
+ changed = True
+ if not module.check_mode:
+ if not exists:
+ obj.create()
+ elif changed:
+ obj.modify()
+ except BaseException as err:
+ module.fail_json(
+ msg='Creating/editing share {} in {} failed: {}'.format(
+ name,
+ container,
+ err,
+ )
+ )
+
+ if state == 'absent' and exists:
+ try:
+ obj = umc_module_for_edit('shares/share', dn)
+ if not module.check_mode:
+ obj.remove()
+ changed = True
+ except BaseException as err:
+ module.fail_json(
+ msg='Removing share {} in {} failed: {}'.format(
+ name,
+ container,
+ err,
+ )
+ )
+
+ module.exit_json(
+ changed=changed,
+ name=name,
+ diff=diff,
+ container=container
+ )
+
+
+if __name__ == '__main__':
+ main()
diff --git a/lib/ansible/modules/extras/univention/udm_user.py b/lib/ansible/modules/extras/univention/udm_user.py
new file mode 100644
index 0000000000..2eed02a2c0
--- /dev/null
+++ b/lib/ansible/modules/extras/univention/udm_user.py
@@ -0,0 +1,591 @@
+#!/usr/bin/python
+# -*- coding: UTF-8 -*-
+
+# Copyright (c) 2016, Adfinis SyGroup AG
+# Tobias Rueetschi <tobias.ruetschi@adfinis-sygroup.ch>
+#
+# This file is part of Ansible
+#
+# Ansible is free software: you can redistribute it and/or modify
+# it under the terms of the GNU General Public License as published by
+# the Free Software Foundation, either version 3 of the License, or
+# (at your option) any later version.
+#
+# Ansible is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with Ansible. If not, see <http://www.gnu.org/licenses/>.
+#
+
+
+from datetime import date
+import crypt
+from ansible.module_utils.basic import AnsibleModule
+from ansible.module_utils.univention_umc import (
+ umc_module_for_add,
+ umc_module_for_edit,
+ ldap_search,
+ base_dn,
+)
+from dateutil.relativedelta import relativedelta
+
+
+DOCUMENTATION = '''
+---
+module: udm_user
+version_added: "2.2"
+author: "Tobias Rueetschi (@2-B)"
+short_description: Manage posix users on a univention corporate server
+description:
+ - "This module allows to manage posix users on a univention corporate
+ server (UCS).
+ It uses the python API of the UCS to create a new object or edit it."
+requirements:
+ - Python >= 2.6
+options:
+ state:
+ required: false
+ default: "present"
+ choices: [ present, absent ]
+ description:
+ - Whether the user is present or not.
+ username:
+ required: true
+ description:
+ - User name
+ aliases: ['name']
+ firstname:
+ required: false
+ description:
+ - First name. Required if C(state=present).
+ lastname:
+ required: false
+ description:
+ - Last name. Required if C(state=present).
+ password:
+ required: false
+ default: None
+ description:
+ - Password. Required if C(state=present).
+ birthday:
+ required: false
+ default: None
+ description:
+ - Birthday
+ city:
+ required: false
+ default: None
+ description:
+ - City of users business address.
+ country:
+ required: false
+ default: None
+ description:
+ - Country of users business address.
+ department_number:
+ required: false
+ default: None
+ description:
+ - Department number of users business address.
+ aliases: [ departmentNumber ]
+ description:
+ required: false
+ default: None
+ description:
+ - Description (not gecos)
+ display_name:
+ required: false
+ default: None
+ description:
+ - Display name (not gecos)
+ aliases: [ displayName ]
+ email:
+ required: false
+ default: ['']
+ description:
+ - A list of e-mail addresses.
+ employee_number:
+ required: false
+ default: None
+ description:
+ - Employee number
+ aliases: [ employeeNumber ]
+ employee_type:
+ required: false
+ default: None
+ description:
+ - Employee type
+ aliases: [ employeeType ]
+ gecos:
+ required: false
+ default: None
+ description:
+ - GECOS
+ groups:
+ required: false
+ default: []
+ description:
+ - "POSIX groups, the LDAP DNs of the groups will be found with the
+ LDAP filter for each group as $GROUP:
+ C((&(objectClass=posixGroup)(cn=$GROUP)))."
+ home_share:
+ required: false
+ default: None
+ description:
+ - "Home NFS share. Must be a LDAP DN, e.g.
+ C(cn=home,cn=shares,ou=school,dc=example,dc=com)."
+ aliases: [ homeShare ]
+ home_share_path:
+ required: false
+ default: None
+ description:
+ - Path to home NFS share, inside the homeShare.
+ aliases: [ homeSharePath ]
+ home_telephone_number:
+ required: false
+ default: []
+ description:
+ - List of private telephone numbers.
+ aliases: [ homeTelephoneNumber ]
+ homedrive:
+ required: false
+ default: None
+ description:
+ - Windows home drive, e.g. C("H:").
+ mail_alternative_address:
+ required: false
+ default: []
+ description:
+ - List of alternative e-mail addresses.
+ aliases: [ mailAlternativeAddress ]
+ mail_home_server:
+ required: false
+ default: None
+ description:
+ - FQDN of mail server
+ aliases: [ mailHomeServer ]
+ mail_primary_address:
+ required: false
+ default: None
+ description:
+ - Primary e-mail address
+ aliases: [ mailPrimaryAddress ]
+ mobile_telephone_number:
+ required: false
+ default: []
+ description:
+ - Mobile phone number
+ aliases: [ mobileTelephoneNumber ]
+ organisation:
+ required: false
+ default: None
+ description:
+ - Organisation
+ override_pw_history:
+ required: false
+ default: False
+ description:
+ - Override password history
+ aliases: [ overridePWHistory ]
+ override_pw_length:
+ required: false
+ default: False
+ description:
+ - Override password check
+ aliases: [ overridePWLength ]
+ pager_telephonenumber:
+ required: false
+ default: []
+ description:
+ - List of pager telephone numbers.
+ aliases: [ pagerTelephonenumber ]
+ phone:
+ required: false
+ default: []
+ description:
+ - List of telephone numbers.
+ postcode:
+ required: false
+ default: None
+ description:
+ - Postal code of users business address.
+ primary_group:
+ required: false
+ default: cn=Domain Users,cn=groups,$LDAP_BASE_DN
+ description:
+ - Primary group. This must be the group LDAP DN.
+ aliases: [ primaryGroup ]
+ profilepath:
+ required: false
+ default: None
+ description:
+ - Windows profile directory
+ pwd_change_next_login:
+ required: false
+ default: None
+ choices: [ '0', '1' ]
+ description:
+ - Change password on next login.
+ aliases: [ pwdChangeNextLogin ]
+ room_number:
+ required: false
+ default: None
+ description:
+ - Room number of users business address.
+ aliases: [ roomNumber ]
+ samba_privileges:
+ required: false
+ default: []
+ description:
+ - "Samba privilege, like allow printer administration, do domain
+ join."
+ aliases: [ sambaPrivileges ]
+ samba_user_workstations:
+ required: false
+ default: []
+ description:
+ - Allow the authentication only on this Microsoft Windows host.
+ aliases: [ sambaUserWorkstations ]
+ sambahome:
+ required: false
+ default: None
+ description:
+ - Windows home path, e.g. C('\\\\$FQDN\\$USERNAME').
+ scriptpath:
+ required: false
+ default: None
+ description:
+ - Windows logon script.
+ secretary:
+ required: false
+ default: []
+ description:
+ - A list of superiors as LDAP DNs.
+ serviceprovider:
+ required: false
+ default: ['']
+ description:
+ - Enable user for the following service providers.
+ shell:
+ required: false
+ default: '/bin/bash'
+ description:
+ - Login shell
+ street:
+ required: false
+ default: None
+ description:
+ - Street of users business address.
+ title:
+ required: false
+ default: None
+ description:
+ - Title, e.g. C(Prof.).
+ unixhome:
+ required: false
+ default: '/home/$USERNAME'
+ description:
+ - Unix home directory
+ userexpiry:
+ required: false
+ default: Today + 1 year
+ description:
+ - Account expiry date, e.g. C(1999-12-31).
+ position:
+ required: false
+ default: ''
+ description:
+ - "Define the whole position of users object inside the LDAP tree,
+ e.g. C(cn=employee,cn=users,ou=school,dc=example,dc=com)."
+ ou:
+ required: false
+ default: ''
+ description:
+ - "Organizational Unit inside the LDAP Base DN, e.g. C(school) for
+ LDAP OU C(ou=school,dc=example,dc=com)."
+ subpath:
+ required: false
+ default: 'cn=users'
+ description:
+ - "LDAP subpath inside the organizational unit, e.g.
+ C(cn=teachers,cn=users) for LDAP container
+ C(cn=teachers,cn=users,dc=example,dc=com)."
+'''
+
+
+EXAMPLES = '''
+# Create a user on a UCS
+- udm_user: name=FooBar
+ password=secure_password
+ firstname=Foo
+ lastname=Bar
+
+# Create a user with the DN
+# C(uid=foo,cn=teachers,cn=users,ou=school,dc=school,dc=example,dc=com)
+- udm_user: name=foo
+ password=secure_password
+ firstname=Foo
+ lastname=Bar
+ ou=school
+ subpath='cn=teachers,cn=users'
+# or define the position
+- udm_user: name=foo
+ password=secure_password
+ firstname=Foo
+ lastname=Bar
+ position='cn=teachers,cn=users,ou=school,dc=school,dc=example,dc=com'
+'''
+
+
+RETURN = '''# '''
+
+
+def main():
+ expiry = date.strftime(date.today() + relativedelta(years=1), "%Y-%m-%d")
+ module = AnsibleModule(
+ argument_spec = dict(
+ birthday = dict(default=None,
+ type='str'),
+ city = dict(default=None,
+ type='str'),
+ country = dict(default=None,
+ type='str'),
+ department_number = dict(default=None,
+ type='str',
+ aliases=['departmentNumber']),
+ description = dict(default=None,
+ type='str'),
+ display_name = dict(default=None,
+ type='str',
+ aliases=['displayName']),
+ email = dict(default=[''],
+ type='list'),
+ employee_number = dict(default=None,
+ type='str',
+ aliases=['employeeNumber']),
+ employee_type = dict(default=None,
+ type='str',
+ aliases=['employeeType']),
+ firstname = dict(default=None,
+ type='str'),
+ gecos = dict(default=None,
+ type='str'),
+ groups = dict(default=[],
+ type='list'),
+ home_share = dict(default=None,
+ type='str',
+ aliases=['homeShare']),
+ home_share_path = dict(default=None,
+ type='str',
+ aliases=['homeSharePath']),
+ home_telephone_number = dict(default=[],
+ type='list',
+ aliases=['homeTelephoneNumber']),
+ homedrive = dict(default=None,
+ type='str'),
+ lastname = dict(default=None,
+ type='str'),
+ mail_alternative_address= dict(default=[],
+ type='list',
+ aliases=['mailAlternativeAddress']),
+ mail_home_server = dict(default=None,
+ type='str',
+ aliases=['mailHomeServer']),
+ mail_primary_address = dict(default=None,
+ type='str',
+ aliases=['mailPrimaryAddress']),
+ mobile_telephone_number = dict(default=[],
+ type='list',
+ aliases=['mobileTelephoneNumber']),
+ organisation = dict(default=None,
+ type='str'),
+ overridePWHistory = dict(default=False,
+ type='bool',
+ aliases=['override_pw_history']),
+ overridePWLength = dict(default=False,
+ type='bool',
+ aliases=['override_pw_length']),
+ pager_telephonenumber = dict(default=[],
+ type='list',
+ aliases=['pagerTelephonenumber']),
+ password = dict(default=None,
+ type='str',
+ no_log=True),
+ phone = dict(default=[],
+ type='list'),
+ postcode = dict(default=None,
+ type='str'),
+ primary_group = dict(default=None,
+ type='str',
+ aliases=['primaryGroup']),
+ profilepath = dict(default=None,
+ type='str'),
+ pwd_change_next_login = dict(default=None,
+ type='str',
+ choices=['0', '1'],
+ aliases=['pwdChangeNextLogin']),
+ room_number = dict(default=None,
+ type='str',
+ aliases=['roomNumber']),
+ samba_privileges = dict(default=[],
+ type='list',
+ aliases=['sambaPrivileges']),
+ samba_user_workstations = dict(default=[],
+ type='list',
+ aliases=['sambaUserWorkstations']),
+ sambahome = dict(default=None,
+ type='str'),
+ scriptpath = dict(default=None,
+ type='str'),
+ secretary = dict(default=[],
+ type='list'),
+ serviceprovider = dict(default=[''],
+ type='list'),
+ shell = dict(default='/bin/bash',
+ type='str'),
+ street = dict(default=None,
+ type='str'),
+ title = dict(default=None,
+ type='str'),
+ unixhome = dict(default=None,
+ type='str'),
+ userexpiry = dict(default=expiry,
+ type='str'),
+ username = dict(required=True,
+ aliases=['name'],
+ type='str'),
+ position = dict(default='',
+ type='str'),
+ ou = dict(default='',
+ type='str'),
+ subpath = dict(default='cn=users',
+ type='str'),
+ state = dict(default='present',
+ choices=['present', 'absent'],
+ type='str')
+ ),
+ supports_check_mode=True,
+ required_if = ([
+ ('state', 'present', ['firstname', 'lastname', 'password'])
+ ])
+ )
+ username = module.params['username']
+ position = module.params['position']
+ ou = module.params['ou']
+ subpath = module.params['subpath']
+ state = module.params['state']
+ changed = False
+
+ users = list(ldap_search(
+ '(&(objectClass=posixAccount)(uid={}))'.format(username),
+ attr=['uid']
+ ))
+ if position != '':
+ container = position
+ else:
+ if ou != '':
+ ou = 'ou={},'.format(ou)
+ if subpath != '':
+ subpath = '{},'.format(subpath)
+ container = '{}{}{}'.format(subpath, ou, base_dn())
+ user_dn = 'uid={},{}'.format(username, container)
+
+ exists = bool(len(users))
+
+ if state == 'present':
+ try:
+ if not exists:
+ obj = umc_module_for_add('users/user', container)
+ else:
+ obj = umc_module_for_edit('users/user', user_dn)
+
+ if module.params['displayName'] is None:
+ module.params['displayName'] = '{} {}'.format(
+ module.params['firstname'],
+ module.params['lastname']
+ )
+ if module.params['unixhome'] is None:
+ module.params['unixhome'] = '/home/{}'.format(
+ module.params['username']
+ )
+ for k in obj.keys():
+ if (k != 'password' and
+ k != 'groups' and
+ k != 'overridePWHistory' and
+ k in module.params and
+ module.params[k] is not None):
+ obj[k] = module.params[k]
+ # handle some special values
+ obj['e-mail'] = module.params['email']
+ password = module.params['password']
+ if obj['password'] is None:
+ obj['password'] = password
+ else:
+ old_password = obj['password'].split('}', 2)[1]
+ if crypt.crypt(password, old_password) != old_password:
+ obj['overridePWHistory'] = module.params['overridePWHistory']
+ obj['overridePWLength'] = module.params['overridePWLength']
+ obj['password'] = password
+
+ diff = obj.diff()
+ if exists:
+ for k in obj.keys():
+ if obj.hasChanged(k):
+ changed = True
+ else:
+ changed = True
+ if not module.check_mode:
+ if not exists:
+ obj.create()
+ elif changed:
+ obj.modify()
+ except:
+ module.fail_json(
+ msg="Creating/editing user {} in {} failed".format(
+ username,
+ container
+ )
+ )
+ try:
+ groups = module.params['groups']
+ if groups:
+ filter = '(&(objectClass=posixGroup)(|(cn={})))'.format(
+ ')(cn='.join(groups)
+ )
+ group_dns = list(ldap_search(filter, attr=['dn']))
+ for dn in group_dns:
+ grp = umc_module_for_edit('groups/group', dn[0])
+ if user_dn not in grp['users']:
+ grp['users'].append(user_dn)
+ if not module.check_mode:
+ grp.modify()
+ changed = True
+ except:
+ module.fail_json(
+ msg="Adding groups to user {} failed".format(username)
+ )
+
+ if state == 'absent' and exists:
+ try:
+ obj = umc_module_for_edit('users/user', user_dn)
+ if not module.check_mode:
+ obj.remove()
+ changed = True
+ except:
+ module.fail_json(
+ msg="Removing user {} failed".format(username)
+ )
+
+ module.exit_json(
+ changed=changed,
+ username=username,
+ diff=diff,
+ container=container
+ )
+
+
+if __name__ == '__main__':
+ main()