# -*- coding: utf-8 -*- # Copyright (C) 2016 Guido Günther , Daniel Lobato Garcia # Copyright (c) 2018 Ansible Project # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) from __future__ import (absolute_import, division, print_function) __metaclass__ = type DOCUMENTATION = ''' name: proxmox short_description: Proxmox inventory source version_added: "1.2.0" author: - Jeffrey van Pelt (@Thulium-Drake) requirements: - requests >= 1.1 description: - Get inventory hosts from a Proxmox PVE cluster. - "Uses a configuration file as an inventory source, it must end in C(.proxmox.yml) or C(.proxmox.yaml)" - Will retrieve the first network interface with an IP for Proxmox nodes. - Can retrieve LXC/QEMU configuration as facts. extends_documentation_fragment: - constructed - inventory_cache options: plugin: description: The name of this plugin, it should always be set to C(community.general.proxmox) for this plugin to recognize it as it's own. required: yes choices: ['community.general.proxmox'] type: str url: description: - URL to Proxmox cluster. - If the value is not specified in the inventory configuration, the value of environment variable C(PROXMOX_URL) will be used instead. default: 'http://localhost:8006' type: str env: - name: PROXMOX_URL version_added: 2.0.0 user: description: - Proxmox authentication user. - If the value is not specified in the inventory configuration, the value of environment variable C(PROXMOX_USER) will be used instead. required: yes type: str env: - name: PROXMOX_USER version_added: 2.0.0 password: description: - Proxmox authentication password. - If the value is not specified in the inventory configuration, the value of environment variable C(PROXMOX_PASSWORD) will be used instead. required: yes type: str env: - name: PROXMOX_PASSWORD version_added: 2.0.0 validate_certs: description: Verify SSL certificate if using HTTPS. type: boolean default: yes group_prefix: description: Prefix to apply to Proxmox groups. default: proxmox_ type: str facts_prefix: description: Prefix to apply to LXC/QEMU config facts. default: proxmox_ type: str want_facts: description: Gather LXC/QEMU configuration facts. default: no type: bool want_proxmox_nodes_ansible_host: version_added: 3.0.0 description: - Whether to set C(ansbile_host) for proxmox nodes. - When set to C(true) (default), will use the first available interface. This can be different from what you expect. default: true type: bool filters: version_added: 4.6.0 description: A list of Jinja templates that allow filtering hosts. type: list elements: str default: [] strict: version_added: 2.5.0 compose: version_added: 2.5.0 groups: version_added: 2.5.0 keyed_groups: version_added: 2.5.0 ''' EXAMPLES = ''' # Minimal example which will not gather additional facts for QEMU/LXC guests # By not specifying a URL the plugin will attempt to connect to the controller host on port 8006 # my.proxmox.yml plugin: community.general.proxmox user: ansible@pve password: secure # More complete example demonstrating the use of 'want_facts' and the constructed options # Note that using facts returned by 'want_facts' in constructed options requires 'want_facts=true' # my.proxmox.yml plugin: community.general.proxmox url: http://pve.domain.com:8006 user: ansible@pve password: secure validate_certs: false want_facts: true keyed_groups: # proxmox_tags_parsed is an example of a fact only returned when 'want_facts=true' - key: proxmox_tags_parsed separator: "" prefix: group groups: webservers: "'web' in (proxmox_tags_parsed|list)" mailservers: "'mail' in (proxmox_tags_parsed|list)" compose: ansible_port: 2222 # Using the inventory to allow ansible to connect via the first IP address of the VM / Container # (Default is connection by name of QEMU/LXC guests) # Note: my_inv_var demonstrates how to add a string variable to every host used by the inventory. # my.proxmox.yml plugin: community.general.proxmox url: http://pve.domain.com:8006 user: ansible@pve password: secure validate_certs: false want_facts: true compose: ansible_host: proxmox_ipconfig0.ip | default(proxmox_net0.ip) | ipaddr('address') my_inv_var_1: "'my_var1_value'" my_inv_var_2: > "my_var_2_value" ''' import itertools import re from ansible.module_utils.common._collections_compat import MutableMapping from ansible.errors import AnsibleError from ansible.plugins.inventory import BaseInventoryPlugin, Constructable, Cacheable from ansible.module_utils.common.text.converters import to_native from ansible.module_utils.six.moves.urllib.parse import urlencode from ansible.utils.display import Display from ansible_collections.community.general.plugins.module_utils.version import LooseVersion # 3rd party imports try: import requests if LooseVersion(requests.__version__) < LooseVersion('1.1.0'): raise ImportError HAS_REQUESTS = True except ImportError: HAS_REQUESTS = False display = Display() class InventoryModule(BaseInventoryPlugin, Constructable, Cacheable): ''' Host inventory parser for ansible using Proxmox as source. ''' NAME = 'community.general.proxmox' def __init__(self): super(InventoryModule, self).__init__() # from config self.proxmox_url = None self.session = None self.cache_key = None self.use_cache = None def verify_file(self, path): valid = False if super(InventoryModule, self).verify_file(path): if path.endswith(('proxmox.yaml', 'proxmox.yml')): valid = True else: self.display.vvv('Skipping due to inventory source not ending in "proxmox.yaml" nor "proxmox.yml"') return valid def _get_session(self): if not self.session: self.session = requests.session() self.session.verify = self.get_option('validate_certs') return self.session def _get_auth(self): credentials = urlencode({'username': self.proxmox_user, 'password': self.proxmox_password, }) a = self._get_session() ret = a.post('%s/api2/json/access/ticket' % self.proxmox_url, data=credentials) json = ret.json() self.credentials = { 'ticket': json['data']['ticket'], 'CSRFPreventionToken': json['data']['CSRFPreventionToken'], } def _get_json(self, url, ignore_errors=None): if not self.use_cache or url not in self._cache.get(self.cache_key, {}): if self.cache_key not in self._cache: self._cache[self.cache_key] = {'url': ''} data = [] s = self._get_session() while True: headers = {'Cookie': 'PVEAuthCookie={0}'.format(self.credentials['ticket'])} ret = s.get(url, headers=headers) if ignore_errors and ret.status_code in ignore_errors: break ret.raise_for_status() json = ret.json() # process results # FIXME: This assumes 'return type' matches a specific query, # it will break if we expand the queries and they dont have different types if 'data' not in json: # /hosts/:id does not have a 'data' key data = json break elif isinstance(json['data'], MutableMapping): # /facts are returned as dict in 'data' data = json['data'] break else: # /hosts 's 'results' is a list of all hosts, returned is paginated data = data + json['data'] break self._cache[self.cache_key][url] = data return self._cache[self.cache_key][url] def _get_nodes(self): return self._get_json("%s/api2/json/nodes" % self.proxmox_url) def _get_pools(self): return self._get_json("%s/api2/json/pools" % self.proxmox_url) def _get_lxc_per_node(self, node): return self._get_json("%s/api2/json/nodes/%s/lxc" % (self.proxmox_url, node)) def _get_qemu_per_node(self, node): return self._get_json("%s/api2/json/nodes/%s/qemu" % (self.proxmox_url, node)) def _get_members_per_pool(self, pool): ret = self._get_json("%s/api2/json/pools/%s" % (self.proxmox_url, pool)) return ret['members'] def _get_node_ip(self, node): ret = self._get_json("%s/api2/json/nodes/%s/network" % (self.proxmox_url, node)) for iface in ret: try: return iface['address'] except Exception: return None def _get_agent_network_interfaces(self, node, vmid, vmtype): result = [] try: ifaces = self._get_json( "%s/api2/json/nodes/%s/%s/%s/agent/network-get-interfaces" % ( self.proxmox_url, node, vmtype, vmid ) )['result'] if "error" in ifaces: if "class" in ifaces["error"]: # This happens on Windows, even though qemu agent is running, the IP address # cannot be fetched, as it's unsupported, also a command disabled can happen. errorClass = ifaces["error"]["class"] if errorClass in ["Unsupported"]: self.display.v("Retrieving network interfaces from guest agents on windows with older qemu-guest-agents is not supported") elif errorClass in ["CommandDisabled"]: self.display.v("Retrieving network interfaces from guest agents has been disabled") return result for iface in ifaces: result.append({ 'name': iface['name'], 'mac-address': iface['hardware-address'] if 'hardware-address' in iface else '', 'ip-addresses': ["%s/%s" % (ip['ip-address'], ip['prefix']) for ip in iface['ip-addresses']] if 'ip-addresses' in iface else [] }) except requests.HTTPError: pass return result def _get_vm_config(self, properties, node, vmid, vmtype, name): ret = self._get_json("%s/api2/json/nodes/%s/%s/%s/config" % (self.proxmox_url, node, vmtype, vmid)) properties[self._fact('node')] = node properties[self._fact('vmid')] = vmid properties[self._fact('vmtype')] = vmtype plaintext_configs = [ 'description', ] for config in ret: key = self._fact(config) value = ret[config] try: # fixup disk images as they have no key if config == 'rootfs' or config.startswith(('virtio', 'sata', 'ide', 'scsi')): value = ('disk_image=' + value) # Additional field containing parsed tags as list if config == 'tags': parsed_key = self.to_safe('%s%s' % (key, "_parsed")) properties[parsed_key] = [tag.strip() for tag in value.split(",")] # The first field in the agent string tells you whether the agent is enabled # the rest of the comma separated string is extra config for the agent if config == 'agent' and int(value.split(',')[0]): agent_iface_value = self._get_agent_network_interfaces(node, vmid, vmtype) if agent_iface_value: agent_iface_key = self.to_safe('%s%s' % (key, "_interfaces")) properties[agent_iface_key] = agent_iface_value if config not in plaintext_configs and not isinstance(value, int) and all("=" in v for v in value.split(",")): # split off strings with commas to a dict # skip over any keys that cannot be processed try: value = dict(key.split("=", 1) for key in value.split(",")) except Exception: continue properties[key] = value except NameError: return None def _get_vm_status(self, properties, node, vmid, vmtype, name): ret = self._get_json("%s/api2/json/nodes/%s/%s/%s/status/current" % (self.proxmox_url, node, vmtype, vmid)) properties[self._fact('status')] = ret['status'] def _get_vm_snapshots(self, properties, node, vmid, vmtype, name): ret = self._get_json("%s/api2/json/nodes/%s/%s/%s/snapshot" % (self.proxmox_url, node, vmtype, vmid)) snapshots = [snapshot['name'] for snapshot in ret if snapshot['name'] != 'current'] properties[self._fact('snapshots')] = snapshots def to_safe(self, word): '''Converts 'bad' characters in a string to underscores so they can be used as Ansible groups #> ProxmoxInventory.to_safe("foo-bar baz") 'foo_barbaz' ''' regex = r"[^A-Za-z0-9\_]" return re.sub(regex, "_", word.replace(" ", "")) def _fact(self, name): '''Generate a fact's full name from the common prefix and a name.''' return self.to_safe('%s%s' % (self.facts_prefix, name.lower())) def _group(self, name): '''Generate a group's full name from the common prefix and a name.''' return self.to_safe('%s%s' % (self.group_prefix, name.lower())) def _can_add_host(self, name, properties): '''Ensure that a host satisfies all defined hosts filters. If strict mode is enabled, any error during host filter compositing will lead to an AnsibleError being raised, otherwise the filter will be ignored. ''' for host_filter in self.host_filters: try: if not self._compose(host_filter, properties): return False except Exception as e: # pylint: disable=broad-except message = "Could not evaluate host filter %s for host %s - %s" % (host_filter, name, to_native(e)) if self.strict: raise AnsibleError(message) display.warning(message) return True def _add_host(self, name, variables): self.inventory.add_host(name) for k, v in variables.items(): self.inventory.set_variable(name, k, v) variables = self.inventory.get_host(name).get_vars() self._set_composite_vars(self.get_option('compose'), variables, name, strict=self.strict) self._add_host_to_composed_groups(self.get_option('groups'), variables, name, strict=self.strict) self._add_host_to_keyed_groups(self.get_option('keyed_groups'), variables, name, strict=self.strict) def _handle_item(self, node, ittype, item): '''Handle an item from the list of LXC containers and Qemu VM. The return value will be either None if the item was skipped or the name of the item if it was added to the inventory.''' if item.get('template'): return None properties = dict() name, vmid = item['name'], item['vmid'] # get status, config and snapshots if want_facts == True if self.get_option('want_facts'): self._get_vm_status(properties, node, vmid, ittype, name) self._get_vm_config(properties, node, vmid, ittype, name) self._get_vm_snapshots(properties, node, vmid, ittype, name) # ensure the host satisfies filters if not self._can_add_host(name, properties): return None # add the host to the inventory self._add_host(name, properties) node_type_group = self._group('%s_%s' % (node, ittype)) self.inventory.add_child(self._group('all_' + ittype), name) self.inventory.add_child(node_type_group, name) if item['status'] == 'stopped': self.inventory.add_child(self._group('all_stopped'), name) elif item['status'] == 'running': self.inventory.add_child(self._group('all_running'), name) return name def _populate_pool_groups(self, added_hosts): '''Generate groups from Proxmox resource pools, ignoring VMs and containers that were skipped.''' for pool in self._get_pools(): poolid = pool.get('poolid') if not poolid: continue pool_group = self._group('pool_' + poolid) self.inventory.add_group(pool_group) for member in self._get_members_per_pool(poolid): name = member.get('name') if name and name in added_hosts: self.inventory.add_child(pool_group, name) def _populate(self): # create common groups self.inventory.add_group(self._group('all_lxc')) self.inventory.add_group(self._group('all_qemu')) self.inventory.add_group(self._group('all_running')) self.inventory.add_group(self._group('all_stopped')) nodes_group = self._group('nodes') self.inventory.add_group(nodes_group) # gather vm's on nodes self._get_auth() hosts = [] for node in self._get_nodes(): if not node.get('node'): continue self.inventory.add_host(node['node']) if node['type'] == 'node': self.inventory.add_child(nodes_group, node['node']) if node['status'] == 'offline': continue # get node IP address if self.get_option("want_proxmox_nodes_ansible_host"): ip = self._get_node_ip(node['node']) self.inventory.set_variable(node['node'], 'ansible_host', ip) # add LXC/Qemu groups for the node for ittype in ('lxc', 'qemu'): node_type_group = self._group('%s_%s' % (node['node'], ittype)) self.inventory.add_group(node_type_group) # get LXC containers and Qemu VMs for this node lxc_objects = zip(itertools.repeat('lxc'), self._get_lxc_per_node(node['node'])) qemu_objects = zip(itertools.repeat('qemu'), self._get_qemu_per_node(node['node'])) for ittype, item in itertools.chain(lxc_objects, qemu_objects): name = self._handle_item(node['node'], ittype, item) if name is not None: hosts.append(name) # gather vm's in pools self._populate_pool_groups(hosts) def parse(self, inventory, loader, path, cache=True): if not HAS_REQUESTS: raise AnsibleError('This module requires Python Requests 1.1.0 or higher: ' 'https://github.com/psf/requests.') super(InventoryModule, self).parse(inventory, loader, path) # read config from file, this sets 'options' self._read_config_data(path) # read options self.proxmox_url = self.get_option('url').rstrip('/') self.proxmox_user = self.get_option('user') self.proxmox_password = self.get_option('password') self.cache_key = self.get_cache_key(path) self.use_cache = cache and self.get_option('cache') self.host_filters = self.get_option('filters') self.group_prefix = self.get_option('group_prefix') self.facts_prefix = self.get_option('facts_prefix') self.strict = self.get_option('strict') # actually populate inventory self._populate()