# Copyright (c) 2013 AnsibleWorks, Inc. # # This file is part of Ansible Commander. # # Ansible Commander is free software: you can redistribute it and/or modify # it under the terms of the GNU General Public License as published by # the Free Software Foundation, version 3 of the License. # # Ansible Commander is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with Ansible Commander. If not, see . import os from django.conf import settings from django.db import models, DatabaseError from django.db.models import CASCADE, SET_NULL, PROTECT from django.db.models.signals import post_save from django.dispatch import receiver from django.utils.translation import ugettext_lazy as _ from django.core.urlresolvers import reverse from django.contrib.auth.models import User from django.utils.timezone import now import exceptions from jsonfield import JSONField from djcelery.models import TaskMeta from rest_framework.authtoken.models import Token import yaml # TODO: jobs and events model TBD # TODO: reporting model TBD PERM_INVENTORY_ADMIN = 'admin' PERM_INVENTORY_READ = 'read' PERM_INVENTORY_WRITE = 'write' PERM_INVENTORY_DEPLOY = 'run' PERM_INVENTORY_CHECK = 'check' JOB_TYPE_CHOICES = [ (PERM_INVENTORY_DEPLOY, _('Run')), (PERM_INVENTORY_CHECK, _('Check')), ] PERMISSION_TYPES = [ PERM_INVENTORY_ADMIN, PERM_INVENTORY_READ, PERM_INVENTORY_WRITE, PERM_INVENTORY_DEPLOY, PERM_INVENTORY_CHECK, ] PERMISSION_TYPES_ALLOWING_INVENTORY_READ = [ PERM_INVENTORY_ADMIN, PERM_INVENTORY_WRITE, PERM_INVENTORY_READ, ] PERMISSION_TYPES_ALLOWING_INVENTORY_WRITE = [ PERM_INVENTORY_ADMIN, PERM_INVENTORY_WRITE, ] PERMISSION_TYPES_ALLOWING_INVENTORY_ADMIN = [ PERM_INVENTORY_ADMIN, ] # FIXME: TODO: make sure all of these are used and consistent PERMISSION_TYPE_CHOICES = [ (PERM_INVENTORY_READ, _('Read Inventory')), (PERM_INVENTORY_WRITE, _('Edit Inventory')), (PERM_INVENTORY_ADMIN, _('Administrate Inventory')), (PERM_INVENTORY_DEPLOY, _('Deploy To Inventory')), (PERM_INVENTORY_CHECK, _('Deploy To Inventory (Dry Run)')), ] class EditHelper(object): @classmethod def illegal_changes(cls, request, obj, model_class): ''' have any illegal changes been made (for a PUT request)? ''' can_admin = model_class.can_user_administrate(request.user, obj, request.DATA) if (not can_admin) or (can_admin == 'partial'): check_fields = model_class.admin_only_edit_fields changed = cls.fields_changed(check_fields, obj, request.DATA) if len(changed.keys()) > 0: return True return False @classmethod def fields_changed(cls, fields, obj, data): ''' return the fields that would be changed by a prospective PUT operation ''' changed = {} for f in fields: left = getattr(obj, f, None) if left is None: raise Exception("internal error, %s is not a member of %s" % (f, obj)) right = data.get(f, None) if (right is not None) and (left != right): changed[f] = (left, right) return changed class UserHelper(object): # fields that the user themselves cannot edit, but are not actually read only admin_only_edit_fields = ('last_name', 'first_name', 'username', 'is_active', 'is_superuser') @classmethod def can_user_administrate(cls, user, obj, data): ''' a user can be administrated if they are themselves, or by org admins or superusers ''' if user == obj: return 'partial' if user.is_superuser: return True matching_orgs = obj.organizations.filter(admins__in = [user]).count() return matching_orgs @classmethod def can_user_read(cls, user, obj): ''' a user can be read if they are on the same team or can be administrated ''' matching_teams = user.teams.filter(users__in = [ user ]).count() return matching_teams or cls.can_user_administrate(user, obj, None) @classmethod def can_user_delete(cls, user, obj): if user.is_superuser: return True matching_orgs = obj.organizations.filter(admins__in = [user]).count() return matching_orgs @classmethod def can_user_attach(cls, user, obj, sub_obj, relationship_type, data): if type(sub_obj) != User: if not sub_obj.can_user_read(user, sub_obj): return False rc = cls.can_user_administrate(user, obj, None) if not rc: return False return sub_obj.__class__.can_user_read(user, sub_obj) @classmethod def can_user_unattach(cls, user, obj, sub_obj, relationship_type): return cls.can_user_administrate(user, obj, None) class PrimordialModel(models.Model): ''' common model for all object types that have these standard fields must use a subclass CommonModel or CommonModelNameNotUnique though as this lacks a name field. ''' class Meta: abstract = True description = models.TextField(blank=True, default='') created_by = models.ForeignKey('auth.User', on_delete=SET_NULL, null=True, related_name='%s(class)s_created', editable=False) # not blank=False on purpose for admin! creation_date = models.DateField(auto_now_add=True) tags = models.ManyToManyField('Tag', related_name='%(class)s_by_tag', blank=True) audit_trail = models.ManyToManyField('AuditTrail', related_name='%(class)s_by_audit_trail', blank=True) active = models.BooleanField(default=True) def __unicode__(self): return unicode("%s-%s"% (self.name, self.id)) @classmethod def can_user_administrate(cls, user, obj, data): # FIXME: do we want a seperate method to override put? This is kind of general purpose raise exceptions.NotImplementedError() @classmethod def can_user_delete(cls, user, obj): raise exceptions.NotImplementedError() @classmethod def can_user_read(cls, user, obj): raise exceptions.NotImplementedError() @classmethod def can_user_add(cls, user, data): return user.is_superuser @classmethod def can_user_attach(cls, user, obj, sub_obj, relationship_type, data): ''' whether you can add sub_obj to obj using the relationship type in a subobject view ''' if type(sub_obj) != User: if not sub_obj.can_user_read(user, sub_obj): return False rc = cls.can_user_administrate(user, obj, None) if not rc: return False # in order to attach something you also be able to read what you are attaching if type(sub_obj) == User: return UserHelper.can_user_read(user, sub_obj) else: return sub_obj.__class__.can_user_read(user, sub_obj) @classmethod def can_user_unattach(cls, user, obj, sub_obj, relationship): return cls.can_user_administrate(user, obj, None) class CommonModel(PrimordialModel): ''' a base model where the name is unique ''' class Meta: abstract = True name = models.CharField(max_length=512, unique=True) class CommonModelNameNotUnique(PrimordialModel): ''' a base model where the name is not unique ''' class Meta: abstract = True name = models.CharField(max_length=512, unique=False) class Tag(models.Model): ''' any type of object can be given a search tag ''' class Meta: app_label = 'main' name = models.CharField(max_length=512) def __unicode__(self): return unicode(self.name) def get_absolute_url(self): import lib.urls return reverse(lib.urls.views_TagsDetail, args=(self.pk,)) @classmethod def can_user_add(cls, user, data): # anybody can make up tags return True @classmethod def can_user_read(cls, user, obj): # anybody can read tags, we won't show much detail other than the names return True class AuditTrail(models.Model): ''' changing any object records the change ''' class Meta: app_label = 'main' resource_type = models.CharField(max_length=64) modified_by = models.ForeignKey('auth.User', on_delete=SET_NULL, null=True, blank=True) delta = models.TextField() # FIXME: switch to JSONField detail = models.TextField() comment = models.TextField() # FIXME: this looks like this should be a ManyToMany tag = models.ForeignKey('Tag', on_delete=SET_NULL, null=True, blank=True) class Organization(CommonModel): ''' organizations are the basic unit of multi-tenancy divisions ''' class Meta: app_label = 'main' users = models.ManyToManyField('auth.User', blank=True, related_name='organizations') admins = models.ManyToManyField('auth.User', blank=True, related_name='admin_of_organizations') projects = models.ManyToManyField('Project', blank=True, related_name='organizations') def get_absolute_url(self): import lib.urls return reverse(lib.urls.views_OrganizationsDetail, args=(self.pk,)) @classmethod def can_user_delete(cls, user, obj): return user in obj.admins.all() @classmethod def can_user_administrate(cls, user, obj, data): # FIXME: super user checks should be higher up so we don't have to repeat them if user.is_superuser: return True if obj.created_by == user: return True rc = user in obj.admins.all() return rc @classmethod def can_user_read(cls, user, obj): return cls.can_user_administrate(user,obj,None) or user in obj.users.all() @classmethod def can_user_delete(cls, user, obj): return cls.can_user_administrate(user, obj, None) def __unicode__(self): return self.name class Inventory(CommonModel): ''' an inventory source contains lists and hosts. ''' class Meta: app_label = 'main' verbose_name_plural = _('inventories') unique_together = (("name", "organization"),) organization = models.ForeignKey(Organization, null=False, related_name='inventories') def get_absolute_url(self): import lib.urls return reverse(lib.urls.views_InventoryDetail, args=(self.pk,)) @classmethod def _has_permission_types(cls, user, obj, allowed): if user.is_superuser: return True by_org_admin = obj.organization.admins.filter(pk = user.pk).count() by_team_permission = obj.permissions.filter( team__in = user.teams.all(), permission_type__in = allowed ).count() by_user_permission = obj.permissions.filter( user = user, permission_type__in = allowed ).count() result = (by_org_admin + by_team_permission + by_user_permission) return result > 0 @classmethod def _has_any_inventory_permission_types(cls, user, allowed): ''' rather than checking for a permission on a specific inventory, return whether we have permissions on any inventory. This is primarily used to decide if the user can create host or group objects ''' if user.is_superuser: return True by_org_admin = user.organizations.filter( admins__in = [ user ] ).count() by_team_permission = Permission.objects.filter( team__in = user.teams.all(), permission_type__in = allowed ).count() by_user_permission = user.permissions.filter( permission_type__in = allowed ).count() result = (by_org_admin + by_team_permission + by_user_permission) return result > 0 @classmethod def can_user_add(cls, user, data): if not 'organization' in data: return True if user.is_superuser: return True if not user.is_superuser: org = Organization.objects.get(pk=data['organization']) if user in org.admins.all(): return True return False @classmethod def can_user_administrate(cls, user, obj, data): return cls._has_permission_types(user, obj, PERMISSION_TYPES_ALLOWING_INVENTORY_ADMIN) @classmethod def can_user_attach(cls, user, obj, sub_obj, relationship_type, data): ''' whether you can add sub_obj to obj using the relationship type in a subobject view ''' if not sub_obj.can_user_read(user, sub_obj): return False return cls._has_permission_types(user, obj, PERMISSION_TYPES_ALLOWING_INVENTORY_WRITE) @classmethod def can_user_unattach(cls, user, obj, sub_obj, relationship): return cls._has_permission_types(user, obj, PERMISSION_TYPES_ALLOWING_INVENTORY_WRITE) @classmethod def can_user_read(cls, user, obj): return cls._has_permission_types(user, obj, PERMISSION_TYPES_ALLOWING_INVENTORY_READ) @classmethod def can_user_delete(cls, user, obj): return cls._has_permission_types(user, obj, PERMISSION_TYPES_ALLOWING_INVENTORY_ADMIN) class Host(CommonModelNameNotUnique): ''' A managed node ''' class Meta: app_label = 'main' unique_together = (("name", "inventory"),) variable_data = models.OneToOneField('VariableData', null=True, default=None, blank=True, on_delete=SET_NULL, related_name='host') inventory = models.ForeignKey('Inventory', null=False, related_name='hosts') def __unicode__(self): return self.name @classmethod def can_user_read(cls, user, obj): return Inventory.can_user_read(user, obj.inventory) @classmethod def can_user_add(cls, user, data): if not 'inventory' in data: return False inventory = Inventory.objects.get(pk=data['inventory']) rc = Inventory._has_permission_types(user, inventory, PERMISSION_TYPES_ALLOWING_INVENTORY_WRITE) return rc def get_absolute_url(self): import lib.urls return reverse(lib.urls.views_HostsDetail, args=(self.pk,)) # relationship to LaunchJobStatus # relationship to LaunchJobStatusEvent # last_job_status class Group(CommonModelNameNotUnique): ''' A group of managed nodes. May belong to multiple groups ''' class Meta: app_label = 'main' unique_together = (("name", "inventory"),) inventory = models.ForeignKey('Inventory', null=False, related_name='groups') parents = models.ManyToManyField('self', symmetrical=False, related_name='children', blank=True) variable_data = models.OneToOneField('VariableData', null=True, default=None, blank=True, on_delete=SET_NULL, related_name='group') hosts = models.ManyToManyField('Host', related_name='groups', blank=True) def __unicode__(self): return self.name @classmethod def can_user_add(cls, user, data): if not 'inventory' in data: return False inventory = Inventory.objects.get(pk=data['inventory']) return Inventory._has_permission_types(user, inventory, PERMISSION_TYPES_ALLOWING_INVENTORY_WRITE) @classmethod def can_user_administrate(cls, user, obj, data): # here this controls whether the user can attach subgroups return Inventory._has_permission_types(user, obj.inventory, PERMISSION_TYPES_ALLOWING_INVENTORY_WRITE) @classmethod def can_user_read(cls, user, obj): return Inventory.can_user_read(user, obj.inventory) def get_absolute_url(self): import lib.urls return reverse(lib.urls.views_GroupsDetail, args=(self.pk,)) # FIXME: audit nullables # FIXME: audit cascades class VariableData(CommonModelNameNotUnique): ''' A set of host or group variables ''' class Meta: app_label = 'main' verbose_name_plural = _('variable data') #host = models.OneToOneField('Host', null=True, default=None, blank=True, on_delete=SET_NULL, related_name='variable_data') #group = models.OneToOneField('Group', null=True, default=None, blank=True, on_delete=SET_NULL, related_name='variable_data') data = models.TextField() # FIXME: JsonField def __unicode__(self): return '%s = %s' % (self.name, self.data) def get_absolute_url(self): import lib.urls return reverse(lib.urls.views_VariableDetail, args=(self.pk,)) @classmethod def can_user_read(cls, user, obj): ''' a user can be read if they are on the same team or can be administrated ''' if obj.host is not None: return Inventory.can_user_read(user, obj.host.inventory) if obj.group is not None: return Inventory.can_user_read(user, obj.group.inventory) return False class Credential(CommonModelNameNotUnique): ''' A credential contains information about how to talk to a remote set of hosts Usually this is a SSH key location, and possibly an unlock password. If used with sudo, a sudo password should be set if required. ''' class Meta: app_label = 'main' user = models.ForeignKey('auth.User', null=True, default=None, blank=True, on_delete=SET_NULL, related_name='credentials') team = models.ForeignKey('Team', null=True, default=None, blank=True, on_delete=SET_NULL, related_name='credentials') # IF ssh_key_path is SET # # STAGE 1: SSH KEY SUPPORT # # ssh-agent bash & # save keyfile to tempdir in /var/tmp (permissions guarded) # ssh-add path-to-keydata # key could locked or unlocked, so use 'expect like' code to enter it at the prompt # if key is locked: # if ssh_key_unlock is provided provide key password # if not provided, FAIL # # default_username if set corresponds to -u on ansible-playbook, if unset -u root # # STAGE 2: # OR if ssh_password is set instead, do not use SSH agent # set ANSIBLE_SSH_PASSWORD # # STAGE 3: # # MICHAEL: modify ansible/ansible-playbook such that # if ANSIBLE_PASSWORD or ANSIBLE_SUDO_PASSWORD is set # you do not have to use --ask-pass and --ask-sudo-pass, so we don't have to do interactive # stuff with that. # # ansible-playbook foo.yml ... ssh_key_data = models.TextField(blank=True, default='') ssh_key_unlock = models.CharField(blank=True, default='', max_length=1024) default_username = models.CharField(blank=True, default='', max_length=1024) ssh_password = models.CharField(blank=True, default='', max_length=1024) sudo_password = models.CharField(blank=True, default='', max_length=1024) @classmethod def can_user_administrate(cls, user, obj, data): if user.is_superuser: return True if user == obj.user: return True if obj.user: if (obj.user.organizations.filter(admins__in = [user]).count()): return True if obj.team: if user in obj.team.organization.admins.all(): return True return False @classmethod def can_user_delete(cls, user, obj): if obj.user is None and obj.team is None: # unassociated credentials may be marked deleted by anyone return True return cls.can_user_administrate(user,obj,None) @classmethod def can_user_read(cls, user, obj): ''' a user can be read if they are on the same team or can be administrated ''' return cls.can_user_administrate(user, obj, None) @classmethod def can_user_add(cls, user, data): if user.is_superuser: return True if 'user' in data: user_obj = User.objects.get(pk=data['user']) return UserHelper.can_user_administrate(user, user_obj, data) if 'team' in data: team_obj = Team.objects.get(pk=data['team']) return Team.can_user_administrate(user, team_obj, data) def get_absolute_url(self): import lib.urls return reverse(lib.urls.views_CredentialsDetail, args=(self.pk,)) class Team(CommonModel): ''' A team is a group of users that work on common projects. ''' class Meta: app_label = 'main' projects = models.ManyToManyField('Project', blank=True, related_name='teams') users = models.ManyToManyField('auth.User', blank=True, related_name='teams') organization = models.ForeignKey('Organization', blank=False, null=True, on_delete=SET_NULL, related_name='teams') def get_absolute_url(self): import lib.urls return reverse(lib.urls.views_TeamsDetail, args=(self.pk,)) @classmethod def can_user_administrate(cls, user, obj, data): # FIXME -- audit when this is called explicitly, if any if user.is_superuser: return True if user in obj.organization.admins.all(): return True return False @classmethod def can_user_read(cls, user, obj): if cls.can_user_administrate(user, obj, None): return True if obj.users.filter(pk__in = [ user.pk ]).count(): return True return False @classmethod def can_user_add(cls, user, data): if user.is_superuser: return True if Organization.objects.filter(admins__in = [user]).count(): # team assignment to organizations is handled elsewhere, this just creates # a blank team return True return False @classmethod def can_user_delete(cls, user, obj): return cls.can_user_administrate(user, obj, None) class Project(CommonModel): ''' A project represents a playbook git repo that can access a set of inventories ''' # this is not part of the project, but managed with perms # inventories = models.ManyToManyField('Inventory', blank=True, related_name='projects') local_path = models.FilePathField( path=settings.PROJECTS_ROOT, recursive=False, allow_files=False, allow_folders=True, max_length=1024, unique=True, help_text=_('Local path (relative to PROJECTS_ROOT) containing ' 'playbooks and related files for this project.') ) #scm_type = models.CharField(max_length=64) #default_playbook = models.CharField(max_length=1024) def get_absolute_url(self): import lib.urls return reverse(lib.urls.views_ProjectsDetail, args=(self.pk,)) @classmethod def can_user_administrate(cls, user, obj, data): if user.is_superuser: return True if obj.created_by == user: return True organizations = Organization.objects.filter(admins__in = [ user ], projects__in = [ obj ]) for org in organizations: if org in project.organizations(): return True return False @classmethod def can_user_read(cls, user, obj): if cls.can_user_administrate(user, obj, None): return True # and also if I happen to be on a team inside the project # FIXME: add this too return False @classmethod def can_user_delete(cls, user, obj): return cls.can_user_administrate(user, obj, None) @property def available_playbooks(self): playbooks = [] if self.local_path and os.path.exists(self.local_path): for dirpath, dirnames, filenames in os.walk(self.local_path): for filename in filenames: if os.path.splitext(filename)[-1] != '.yml': continue playbook = os.path.join(dirpath, filename) # Filter any invalid YAML files. try: data = yaml.safe_load(file(playbook).read()) except (IOError, yaml.YAMLError): continue # Filter files that do not have either hosts or top-level # includes. try: if 'hosts' not in data[0] and 'include' not in data[0]: continue except (IndexError, KeyError): continue playbook = os.path.relpath(playbook, self.local_path) # Filter files in a roles subdirectory. if 'roles' in playbook.split(os.sep): continue # Filter files in a tasks subdirectory. if 'tasks' in playbook.split(os.sep): continue playbooks.append(playbook) return playbooks class Permission(CommonModelNameNotUnique): ''' A permission allows a user, project, or team to be able to use an inventory source. ''' class Meta: app_label = 'main' # permissions are granted to either a user or a team: user = models.ForeignKey('auth.User', null=True, on_delete=SET_NULL, blank=True, related_name='permissions') team = models.ForeignKey('Team', null=True, on_delete=SET_NULL, blank=True, related_name='permissions') # to be used against a project or inventory (or a project and inventory in conjunction): project = models.ForeignKey('Project', null=True, on_delete=SET_NULL, blank=True, related_name='permissions') inventory = models.ForeignKey('Inventory', null=True, on_delete=SET_NULL, related_name='permissions') # permission system explanation: # # for example, user A on inventory X has write permissions (PERM_INVENTORY_WRITE) # team C on inventory X has read permissions (PERM_INVENTORY_READ) # team C on inventory X and project Y has launch permissions (PERM_INVENTORY_DEPLOY) # team C on inventory X and project Z has dry run permissions (PERM_INVENTORY_CHECK) # # basically for launching, permissions can be awarded to the whole inventory source or just the inventory source # in context of a given project. # # the project parameter is not used when dealing with READ, WRITE, or ADMIN permissions. permission_type = models.CharField(max_length=64, choices=PERMISSION_TYPE_CHOICES) def __unicode__(self): return unicode("Permission(name=%s,ON(user=%s,team=%s),FOR(project=%s,inventory=%s,type=%s))" % ( self.name, self.user, self.team, self.project, self.inventory, self.permission_type )) # TODO: other job types (later) class JobTemplate(CommonModel): ''' A job template is a reusable job definition for applying a project (with playbook) to an inventory source with a given credential. ''' class Meta: app_label = 'main' job_type = models.CharField( max_length=64, choices=JOB_TYPE_CHOICES, ) inventory = models.ForeignKey( 'Inventory', related_name='job_templates', null=True, on_delete=models.SET_NULL, ) project = models.ForeignKey( 'Project', related_name='job_templates', null=True, on_delete=models.SET_NULL, ) playbook = models.CharField( max_length=1024, default='', ) credential = models.ForeignKey( 'Credential', related_name='job_templates', blank=True, null=True, default=None, on_delete=models.SET_NULL, ) def create_job(self, **kwargs): ''' Create a new job based on this template. ''' start_job = kwargs.pop('start', False) save_job = kwargs.pop('save', True) or start_job # Start implies save. kwargs['job_template'] = self kwargs.setdefault('name', '%s %s' % (self.name, now().isoformat())) kwargs.setdefault('description', self.description) kwargs.setdefault('job_type', self.job_type) kwargs.setdefault('inventory', self.inventory) kwargs.setdefault('project', self.project) kwargs.setdefault('playbook', self.playbook) kwargs.setdefault('credential', self.credential) job = Job(**kwargs) if save_job: job.save() if start_job: job.start() return job # project has one default playbook but really should have a list of playbooks and flags ... # ssh-agent bash # ssh-add ... < key entry # # playbook in source control is already on the disk # we'll extend ansible core to have callback context like # self.context.playbook # self.context.runner # and the callback will read the environment for ACOM_CELERY_JOB_ID or similar # and log tons into the database # the ansible commander setup instructions will include installing the database logging callback # inventory script is going to need some way to load Django models # it is documented on ansible.cc under API docs and takes two parameters # --list # -- host def get_absolute_url(self): import lib.urls return reverse(lib.urls.views_JobTemplateDetail, args=(self.pk,)) @classmethod def can_user_read(cls, user, obj): # you can only see the job templates that you have permission to launch. data = dict( inventory = obj.inventory.pk, project = obj.project.pk, job_type = obj.job_type ) return cls.can_user_add(user, data) @classmethod def can_user_add(cls, user, data): ''' a user can create a job template if they are a superuser, an org admin of any org that the project is a member, or if they have user or team based permissions tying the project to the inventory source for the given action. users who are able to create deploy jobs can also make check (dry run) jobs ''' if user.is_superuser: return True project = Project.objects.get(pk=data['project']) inventory = Inventory.objects.get(pk=data['inventory']) admin_of_orgs = project.organizations.filter(admins__in = [ user ]) if admin_of_orgs.count() > 0: return True job_type = data['job_type'] has_launch_permission = False user_permissions = Permission.objects.filter(inventory=inventory, project=project, user=user) for perm in user_permissions: if job_type == PERM_INVENTORY_CHECK: # if you have run permissions, you can also create check jobs has_launch_permission = True elif job_type == PERM_INVENTORY_DEPLOY and perm.permission_type == PERM_INVENTORY_DEPLOY: # you need explicit run permissions to make run jobs has_launch_permission = True team_permissions = Permission.objects.filter(inventory=inventory, project=project, team__users__in = [user]) for perm in team_permissions: if job_type == PERM_INVENTORY_CHECK: # if you have run permissions, you can also create check jobs has_launch_permission = True elif job_type == PERM_INVENTORY_DEPLOY and perm.permission_type == PERM_INVENTORY_DEPLOY: # you need explicit run permissions to make run jobs has_launch_permission = True if not has_launch_permission: return False # make sure user owns the credentials they are using if data.has_key('credential'): has_credential = False credential = Credential.objects.get(pk=data['credential']) if credential.team and credential.team.users.filter(id = user.pk).count(): has_credential = True if credential.user and credential.user == user: has_credential = True if not has_credential: return False # shouldn't really matter with permissions given, but make sure the user # is also currently on the team in case they were added a per-user permission and then removed # from the project. if project.teams.filter(users__in = [ user ]).count(): return False return True class Job(CommonModel): ''' A job applies a project (with playbook) to an inventory source with a given credential. It represents a single invocation of ansible-playbook with the given parameters. ''' STATUS_CHOICES = [ ('new', _('New')), # Job has been created, but not started. ('pending', _('Pending')), # Job has been queued, but is not yet running. ('running', _('Running')), # Job is currently running. ('successful', _('Successful')), # Job completed successfully. ('failed', _('Failed')), # Job completed, but with failures. ('error', _('Error')), # The job was unable to run. ] class Meta: app_label = 'main' job_template = models.ForeignKey( 'JobTemplate', related_name='jobs', blank=True, null=True, default=None, on_delete=models.SET_NULL, ) job_type = models.CharField( max_length=64, choices=JOB_TYPE_CHOICES, ) inventory = models.ForeignKey( 'Inventory', related_name='jobs', null=True, on_delete=models.SET_NULL, ) credential = models.ForeignKey( 'Credential', related_name='jobs', null=True, on_delete=models.SET_NULL, ) project = models.ForeignKey( 'Project', related_name='jobs', null=True, on_delete=models.SET_NULL, ) playbook = models.CharField( max_length=1024, ) status = models.CharField( max_length=20, choices=STATUS_CHOICES, default='new', editable=False, ) result_stdout = models.TextField( blank=True, default='', editable=False, ) result_stderr = models.TextField( blank=True, default='', editable=False, ) result_traceback = models.TextField( blank=True, default='', editable=False, ) celery_task_id = models.CharField( max_length=100, blank=True, default='', editable=False, ) hosts = models.ManyToManyField( 'Host', related_name='jobs', blank=True, editable=False, through='JobHostSummary', ) @property def celery_task(self): try: if self.celery_task_id: return TaskMeta.objects.get(task_id=self.celery_task_id) except TaskMeta.DoesNotExist: pass def start(self): from lib.main.tasks import run_job if self.status != 'new': return self.status = 'pending' self.save(update_fields=['status']) task_result = run_job.delay(self.pk) # The TaskMeta instance in the database isn't created until the worker # starts processing the task, so we can only store the task ID here. self.celery_task_id = task_result.task_id self.save(update_fields=['celery_task_id']) @property def successful_hosts(self): return Host.objects.filter(job_host_summaries__job__pk=self.pk, job_host_summaries__ok__gt=0) @property def failed_hosts(self): return Host.objects.filter(job_host_summaries__job__pk=self.pk, job_host_summaries__failures__gt=0) @property def changed_hosts(self): return Host.objects.filter(job_host_summaries__job__pk=self.pk, job_host_summaries__changed__gt=0) @property def dark_hosts(self): return Host.objects.filter(job_host_summaries__job__pk=self.pk, job_host_summaries__dark__gt=0) @property def unreachable_hosts(self): return self.dark_hosts @property def skipped_hosts(self): return Host.objects.filter(job_host_summaries__job__pk=self.pk, job_host_summaries__skipped__gt=0) @property def processed_hosts(self): return Host.objects.filter(job_host_summaries__job__pk=self.pk, job_host_summaries__processed__gt=0) class JobHostSummary(models.Model): ''' Per-host statistics for each job. ''' class Meta: unique_together = [('job', 'host')] verbose_name_plural = _('Job Host Summaries') ordering = ('-pk',) job = models.ForeignKey( 'Job', related_name='job_host_summaries', on_delete=models.CASCADE, ) host = models.ForeignKey('Host', related_name='job_host_summaries', on_delete=models.CASCADE, ) changed = models.PositiveIntegerField(default=0) dark = models.PositiveIntegerField(default=0) failures = models.PositiveIntegerField(default=0) ok = models.PositiveIntegerField(default=0) processed = models.PositiveIntegerField(default=0) skipped = models.PositiveIntegerField(default=0) def __unicode__(self): return '%s changed=%d dark=%d failures=%d ok=%d processed=%d skipped=%s' % \ (self.host.name, self.changed, self.dark, self.failures, self.ok, self.processed, self.skipped) class JobEvent(models.Model): ''' An event/message logged from the callback when running a job. ''' EVENT_TYPES = [ ('runner_on_failed', _('Runner on Failed')), ('runner_on_ok', _('Runner on OK')), ('runner_on_error', _('Runner on Error')), ('runner_on_skipped', _('Runner on Skipped')), ('runner_on_unreachable', _('Runner on Unreachable')), ('runner_on_no_hosts', _('Runner on No Hosts')), ('runner_on_async_poll', _('Runner on Async Poll')), ('runner_on_async_ok', _('Runner on Async OK')), ('runner_on_async_failed', _('Runner on Async Failed')), ('playbook_on_start', _('Playbook on Start')), ('playbook_on_notify', _('Playbook on Notify')), ('playbook_on_task_start', _('Playbook on Task Start')), ('playbook_on_vars_prompt', _('Playbook on Vars Prompt')), ('playbook_on_setup', _('Playbook on Setup')), ('playbook_on_import_for_host', _('Playbook on Import for Host')), ('playbook_on_not_import_for_host', _('Playbook on Not Import for Host')), ('playbook_on_play_start', _('Playbook on Play Start')), ('playbook_on_stats', _('Playbook on Stats')), ] class Meta: app_label = 'main' job = models.ForeignKey( 'Job', related_name='job_events', on_delete=models.CASCADE, ) created = models.DateTimeField( auto_now_add=True, ) event = models.CharField( max_length=100, choices=EVENT_TYPES, ) event_data = JSONField( blank=True, default='', ) host = models.ForeignKey( 'Host', related_name='job_events', blank=True, null=True, default=None, on_delete=models.SET_NULL, ) def __unicode__(self): return u'%s @ %s' % (self.get_event_display(), self.created.isoformat()) def save(self, *args, **kwargs): try: if not self.host and self.event_data.get('host', ''): self.host = self.job.inventory.hosts.get(name=self.event_data['host']) except (Host.DoesNotExist, AttributeError): pass super(JobEvent, self).save(*args, **kwargs) self.update_host_summary_from_stats() def update_host_summary_from_stats(self): if self.event != 'playbook_on_stats': return hostnames = set() try: for v in self.event_data.values(): hostnames.update(v.keys()) except AttributeError: # In case event_data or v isn't a dict. pass for hostname in hostnames: try: host = self.job.inventory.hosts.get(name=hostname) except Host.DoesNotExist: continue host_summary = self.job.job_host_summaries.get_or_create(host=host)[0] host_summary_changed = False for stat in ('changed', 'dark', 'failures', 'ok', 'processed', 'skipped'): try: value = self.event_data.get(stat, {}).get(hostname, 0) if getattr(host_summary, stat) != value: setattr(host_summary, stat, value) host_summary_changed = True except AttributeError: # in case event_data[stat] isn't a dict. pass if host_summary_changed: host_summary.save() # TODO: reporting (MPD) @receiver(post_save, sender=User) def create_auth_token_for_user(sender, **kwargs): instance = kwargs.get('instance', None) if instance: try: Token.objects.get_or_create(user=instance) except DatabaseError: pass # Only fails when creating a new superuser from syncdb on a # new database (before migrate has been called).