summaryrefslogtreecommitdiffstats
path: root/ansible_collections/community/general/plugins/modules/keycloak_realm_key.py
blob: 6e762fba9dd5f476b10533ca56567ed3c6af5ea3 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
#!/usr/bin/python
# -*- coding: utf-8 -*-

# Copyright (c) 2017, Eike Frost <ei@kefro.st>
# Copyright (c) 2021, Christophe Gilles <christophe.gilles54@gmail.com>
# GNU General Public License v3.0+ (see LICENSES/GPL-3.0-or-later.txt or
# https://www.gnu.org/licenses/gpl-3.0.txt)
# SPDX-License-Identifier: GPL-3.0-or-later
from __future__ import absolute_import, division, print_function
__metaclass__ = type

DOCUMENTATION = '''
---
module: keycloak_realm_key

short_description: Allows administration of Keycloak realm keys via Keycloak API

version_added: 7.5.0

description:
    - This module allows the administration of Keycloak realm keys via the Keycloak REST API. It
      requires access to the REST API via OpenID Connect; the user connecting and the realm being
      used must have the requisite access rights. In a default Keycloak installation, admin-cli
      and an admin user would work, as would a separate realm definition with the scope tailored
      to your needs and a user having the expected roles.

    - The names of module options are snake_cased versions of the camelCase ones found in the
      Keycloak API and its documentation at U(https://www.keycloak.org/docs-api/8.0/rest-api/index.html).
      Aliases are provided so camelCased versions can be used as well.

    - This module is unable to detect changes to the actual cryptographic key after importing it.
      However, if some other property is changed alongside the cryptographic key, then the key
      will also get changed as a side-effect, as the JSON payload needs to include the private key.
      This can be considered either a bug or a feature, as the alternative would be to always
      update the realm key whether it has changed or not.

    - If certificate is not explicitly provided it will be dynamically created by Keycloak.
      Therefore comparing the current state of the certificate to the desired state (which may be
      empty) is not possible.

attributes:
    check_mode:
        support: full
    diff_mode:
        support: partial

options:
    state:
        description:
            - State of the keycloak realm key.
            - On V(present), the realm key will be created (or updated if it exists already).
            - On V(absent), the realm key will be removed if it exists.
        choices: ['present', 'absent']
        default: 'present'
        type: str
    name:
        description:
            - Name of the realm key to create.
        type: str
        required: true
    force:
        description:
            - Enforce the state of the private key and certificate. This is not automatically the
              case as this module is unable to determine the current state of the private key and
              thus cannot trigger an update based on an actual divergence. That said, a private key
              update may happen even if force is false as a side-effect of other changes.
        default: false
        type: bool
    parent_id:
        description:
            - The parent_id of the realm key. In practice the ID (name) of the realm.
        type: str
        required: true
    provider_id:
        description:
            - The name of the "provider ID" for the key.
            - The value V(rsa-enc) has been added in community.general 8.2.0.
        choices: ['rsa', 'rsa-enc']
        default: 'rsa'
        type: str
    config:
        description:
            - Dict specifying the key and its properties.
        type: dict
        suboptions:
            active:
                description:
                    - Whether they key is active or inactive. Not to be confused with the state
                      of the Ansible resource managed by the O(state) parameter.
                default: true
                type: bool
            enabled:
                description:
                    - Whether the key is enabled or disabled. Not to be confused with the state
                      of the Ansible resource managed by the O(state) parameter.
                default: true
                type: bool
            priority:
                description:
                    - The priority of the key.
                type: int
                required: true
            algorithm:
                description:
                    - Key algorithm.
                    - The values V(RS384), V(RS512), V(PS256), V(PS384), V(PS512), V(RSA1_5),
                      V(RSA-OAEP), V(RSA-OAEP-256) have been added in community.general 8.2.0.
                default: RS256
                choices: ['RS256', 'RS384', 'RS512', 'PS256', 'PS384', 'PS512', 'RSA1_5', 'RSA-OAEP', 'RSA-OAEP-256']
                type: str
            private_key:
                description:
                    - The private key as an ASCII string. Contents of the key must match O(config.algorithm)
                      and O(provider_id).
                    - Please note that the module cannot detect whether the private key specified differs from the
                      current state's private key. Use O(force=true) to force the module to update the private key
                      if you expect it to be updated.
                required: true
                type: str
            certificate:
                description:
                    - A certificate signed with the private key as an ASCII string. Contents of the
                      key must match O(config.algorithm) and O(provider_id).
                    - If you want Keycloak to automatically generate a certificate using your private key
                      then set this to an empty string.
                required: true
                type: str
notes:
    - Current value of the private key cannot be fetched from Keycloak.
      Therefore comparing its desired state to the current state is not
      possible.
    - If certificate is not explicitly provided it will be dynamically created
      by Keycloak. Therefore comparing the current state of the certificate to
      the desired state (which may be empty) is not possible.
    - Due to the private key and certificate options the module is
      B(not fully idempotent). You can use O(force=true) to force the module
      to always update if you know that the private key might have changed.

extends_documentation_fragment:
    - community.general.keycloak
    - community.general.attributes

author:
    - Samuli Seppänen (@mattock)
'''

EXAMPLES = '''
- name: Manage Keycloak realm key (certificate autogenerated by Keycloak)
  community.general.keycloak_realm_key:
    name: custom
    state: present
    parent_id: master
    provider_id: rsa
    auth_keycloak_url: http://localhost:8080/auth
    auth_username: keycloak
    auth_password: keycloak
    auth_realm: master
    config:
      private_key: "{{ private_key }}"
      certificate: ""
      enabled: true
      active: true
      priority: 120
      algorithm: RS256
- name: Manage Keycloak realm key and certificate
  community.general.keycloak_realm_key:
    name: custom
    state: present
    parent_id: master
    provider_id: rsa
    auth_keycloak_url: http://localhost:8080/auth
    auth_username: keycloak
    auth_password: keycloak
    auth_realm: master
    config:
      private_key: "{{ private_key }}"
      certificate: "{{ certificate }}"
      enabled: true
      active: true
      priority: 120
      algorithm: RS256
'''

RETURN = '''
msg:
    description: Message as to what action was taken.
    returned: always
    type: str

end_state:
    description: Representation of the keycloak_realm_key after module execution.
    returned: on success
    type: dict
    contains:
        id:
            description: ID of the realm key.
            type: str
            returned: when O(state=present)
            sample: 5b7ec13f-99da-46ad-8326-ab4c73cf4ce4
        name:
            description: Name of the realm key.
            type: str
            returned: when O(state=present)
            sample: mykey
        parentId:
            description: ID of the realm this key belongs to.
            type: str
            returned: when O(state=present)
            sample: myrealm
        providerId:
            description: The ID of the key provider.
            type: str
            returned: when O(state=present)
            sample: rsa
        providerType:
            description: The type of provider.
            type: str
            returned: when O(state=present)
        config:
            description: Realm key configuration.
            type: dict
            returned: when O(state=present)
            sample: {
              "active": ["true"],
              "algorithm": ["RS256"],
              "enabled": ["true"],
              "priority": ["140"]
            }
'''

from ansible_collections.community.general.plugins.module_utils.identity.keycloak.keycloak import KeycloakAPI, camel, \
    keycloak_argument_spec, get_token, KeycloakError
from ansible.module_utils.basic import AnsibleModule
from ansible.module_utils.six.moves.urllib.parse import urlencode
from copy import deepcopy


def main():
    """
    Module execution

    :return:
    """
    argument_spec = keycloak_argument_spec()

    meta_args = dict(
        state=dict(type='str', default='present', choices=['present', 'absent']),
        name=dict(type='str', required=True),
        force=dict(type='bool', default=False),
        parent_id=dict(type='str', required=True),
        provider_id=dict(type='str', default='rsa', choices=['rsa', 'rsa-enc']),
        config=dict(
            type='dict',
            options=dict(
                active=dict(type='bool', default=True),
                enabled=dict(type='bool', default=True),
                priority=dict(type='int', required=True),
                algorithm=dict(
                    type="str",
                    default="RS256",
                    choices=[
                        "RS256",
                        "RS384",
                        "RS512",
                        "PS256",
                        "PS384",
                        "PS512",
                        "RSA1_5",
                        "RSA-OAEP",
                        "RSA-OAEP-256",
                    ],
                ),
                private_key=dict(type='str', required=True, no_log=True),
                certificate=dict(type='str', required=True)
            )
        )
    )

    argument_spec.update(meta_args)

    module = AnsibleModule(argument_spec=argument_spec,
                           supports_check_mode=True,
                           required_one_of=([['token', 'auth_realm', 'auth_username', 'auth_password']]),
                           required_together=([['auth_realm', 'auth_username', 'auth_password']]))

    # Initialize the result object. Only "changed" seems to have special
    # meaning for Ansible.
    result = dict(changed=False, msg='', end_state={}, diff=dict(before={}, after={}))

    # This will include the current state of the realm key if it is already
    # present. This is only used for diff-mode.
    before_realm_key = {}
    before_realm_key['config'] = {}

    # Obtain access token, initialize API
    try:
        connection_header = get_token(module.params)
    except KeycloakError as e:
        module.fail_json(msg=str(e))

    kc = KeycloakAPI(module, connection_header)

    params_to_ignore = list(keycloak_argument_spec().keys()) + ["state", "force"]

    # Filter and map the parameters names that apply to the role
    component_params = [x for x in module.params
                        if x not in params_to_ignore and
                        module.params.get(x) is not None]

    # We only support one component provider type in this module
    provider_type = 'org.keycloak.keys.KeyProvider'

    # Build a proposed changeset from parameters given to this module
    changeset = {}
    changeset['config'] = {}

    # Generate a JSON payload for Keycloak Admin API from the module
    # parameters.  Parameters that do not belong to the JSON payload (e.g.
    # "state" or "auth_keycloal_url") have been filtered away earlier (see
    # above).
    #
    # This loop converts Ansible module parameters (snake-case) into
    # Keycloak-compatible format (camel-case). For example private_key
    # becomes privateKey.
    #
    # It also converts bool, str and int parameters into lists with a single
    # entry of 'str' type. Bool values are also lowercased. This is required
    # by Keycloak.
    #
    for component_param in component_params:
        if component_param == 'config':
            for config_param in module.params.get('config'):
                changeset['config'][camel(config_param)] = []
                raw_value = module.params.get('config')[config_param]
                if isinstance(raw_value, bool):
                    value = str(raw_value).lower()
                else:
                    value = str(raw_value)

                changeset['config'][camel(config_param)].append(value)
        else:
            # No need for camelcase in here as these are one word parameters
            new_param_value = module.params.get(component_param)
            changeset[camel(component_param)] = new_param_value

    # As provider_type is not a module parameter we have to add it to the
    # changeset explicitly.
    changeset['providerType'] = provider_type

    # Make a deep copy of the changeset. This is use when determining
    # changes to the current state.
    changeset_copy = deepcopy(changeset)

    # It is not possible to compare current keys to desired keys, because the
    # certificate parameter is a base64-encoded binary blob created on the fly
    # when a key is added. Moreover, the Keycloak Admin API does not seem to
    # return the value of the private key for comparison.  So, in effect, it we
    # just have to ignore changes to the keys.  However, as the privateKey
    # parameter needs be present in the JSON payload, any changes done to any
    # other parameters (e.g.  config.priority) will trigger update of the keys
    # as a side-effect.
    del changeset_copy['config']['privateKey']
    del changeset_copy['config']['certificate']

    # Make it easier to refer to current module parameters
    name = module.params.get('name')
    force = module.params.get('force')
    state = module.params.get('state')
    enabled = module.params.get('enabled')
    provider_id = module.params.get('provider_id')
    parent_id = module.params.get('parent_id')

    # Get a list of all Keycloak components that are of keyprovider type.
    realm_keys = kc.get_components(urlencode(dict(type=provider_type, parent=parent_id)), parent_id)

    # If this component is present get its key ID. Confusingly the key ID is
    # also known as the Provider ID.
    key_id = None

    # Track individual parameter changes
    changes = ""

    # This tells Ansible whether the key was changed (added, removed, modified)
    result['changed'] = False

    # Loop through the list of components. If we encounter a component whose
    # name matches the value of the name parameter then assume the key is
    # already present.
    for key in realm_keys:
        if key['name'] == name:
            key_id = key['id']
            changeset['id'] = key_id
            changeset_copy['id'] = key_id

            # Compare top-level parameters
            for param, value in changeset.items():
                before_realm_key[param] = key[param]

                if changeset_copy[param] != key[param] and param != 'config':
                    changes += "%s: %s -> %s, " % (param, key[param], changeset_copy[param])
                    result['changed'] = True

            # Compare parameters under the "config" key
            for p, v in changeset_copy['config'].items():
                before_realm_key['config'][p] = key['config'][p]
                if changeset_copy['config'][p] != key['config'][p]:
                    changes += "config.%s: %s -> %s, " % (p, key['config'][p], changeset_copy['config'][p])
                    result['changed'] = True

    # Sanitize linefeeds for the privateKey. Without this the JSON payload
    # will be invalid.
    changeset['config']['privateKey'][0] = changeset['config']['privateKey'][0].replace('\\n', '\n')
    changeset['config']['certificate'][0] = changeset['config']['certificate'][0].replace('\\n', '\n')

    # Check all the possible states of the resource and do what is needed to
    # converge current state with desired state (create, update or delete
    # the key).
    if key_id and state == 'present':
        if result['changed']:
            if module._diff:
                del before_realm_key['config']['privateKey']
                del before_realm_key['config']['certificate']
                result['diff'] = dict(before=before_realm_key, after=changeset_copy)

            if module.check_mode:
                result['msg'] = "Realm key %s would be changed: %s" % (name, changes.strip(", "))
            else:
                kc.update_component(changeset, parent_id)
                result['msg'] = "Realm key %s changed: %s" % (name, changes.strip(", "))
        elif not result['changed'] and force:
            kc.update_component(changeset, parent_id)
            result['changed'] = True
            result['msg'] = "Realm key %s was forcibly updated" % (name)
        else:
            result['msg'] = "Realm key %s was in sync" % (name)

        result['end_state'] = changeset_copy
    elif key_id and state == 'absent':
        if module._diff:
            del before_realm_key['config']['privateKey']
            del before_realm_key['config']['certificate']
            result['diff'] = dict(before=before_realm_key, after={})

        if module.check_mode:
            result['changed'] = True
            result['msg'] = "Realm key %s would be deleted" % (name)
        else:
            kc.delete_component(key_id, parent_id)
            result['changed'] = True
            result['msg'] = "Realm key %s deleted" % (name)

        result['end_state'] = {}
    elif not key_id and state == 'present':
        if module._diff:
            result['diff'] = dict(before={}, after=changeset_copy)

        if module.check_mode:
            result['changed'] = True
            result['msg'] = "Realm key %s would be created" % (name)
        else:
            kc.create_component(changeset, parent_id)
            result['changed'] = True
            result['msg'] = "Realm key %s created" % (name)

        result['end_state'] = changeset_copy
    elif not key_id and state == 'absent':
        result['changed'] = False
        result['msg'] = "Realm key %s not present" % (name)
        result['end_state'] = {}

    module.exit_json(**result)


if __name__ == '__main__':
    main()