saltstack/salt

View on GitHub
salt/states/postgres_default_privileges.py

Summary

Maintainability
F
5 days
Test Coverage
# -*- coding: utf-8 -*-
'''
Management of PostgreSQL Default Privileges
===========================================

The postgres_default_privileges module is used to manage Postgres privileges by default.
Privileges can be set as either absent or present. They take any and all previously existing
and future objects into account.

Privileges can be set on the following database object types:

* schema
* table
* sequence
* group

Setting the grant option is supported as well.

.. versionadded:: 2016.3.0

.. code-block:: yaml

    baruwa:
      postgres_privileges.present:
        - object_name: awl
        - object_type: table
        - privileges:
          - SELECT
          - INSERT
          - DELETE
        - grant_option: False
        - prepend: public
        - maintenance_db: testdb

.. code-block:: yaml

    andrew:
      postgres_privileges.present:
        - object_name: admins
        - object_type: group
        - grant_option: False
        - maintenance_db: testdb

.. code-block:: yaml

    baruwa:
      postgres_privileges.absent:
        - object_name: awl
        - object_type: table
        - privileges:
          - SELECT
          - INSERT
          - DELETE
        - prepend: public
        - maintenance_db: testdb

.. code-block:: yaml

    andrew:
      postgres_privileges.absent:
        - object_name: admins
        - object_type: group
        - maintenance_db: testdb
'''
from __future__ import absolute_import, unicode_literals, print_function


def __virtual__():
    '''
    Only load if the postgres module is present
    '''
    if 'postgres.default_privileges_grant' not in __salt__:
        return (False, 'Unable to load postgres module.  Make sure `postgres.bins_dir` is set.')
    return True


def present(name,
            object_name,
            object_type,
            defprivileges=None,
            grant_option=None,
            prepend='public',
            maintenance_db=None,
            user=None,
            db_password=None,
            db_host=None,
            db_port=None,
            db_user=None):
    '''
    Grant the requested privilege(s) on the specified object to a role

    name
        Name of the role to which privileges should be granted

    object_name
       Name of the object on which the grant is to be performed.
       'ALL' may be used for objects of type 'table' or 'sequence'.

    object_type
       The object type, which can be one of the following:

       - table
       - sequence
       - schema
       - group
       - function

       View permissions should specify `object_type: table`.

    privileges
       List of privileges to grant, from the list below:

       - INSERT
       - CREATE
       - TRUNCATE
       - CONNECT
       - TRIGGER
       - SELECT
       - USAGE
       - TEMPORARY
       - UPDATE
       - EXECUTE
       - REFERENCES
       - DELETE
       - ALL

       :note: privileges should not be set when granting group membership

    grant_option
        If grant_option is set to True, the recipient of the privilege can
        in turn grant it to others

    prepend
        Table and Sequence object types live under a schema so this should be
        provided if the object is not under the default `public` schema

    maintenance_db
        The name of the database in which the language is to be installed

    user
        System user all operations should be performed on behalf of

    db_user
        database username if different from config or default

    db_password
        user password if any password for a specified user

    db_host
        Database host if different from config or default

    db_port
        Database port if different from config or default
    '''
    ret = {
        'name': name,
        'changes': {},
        'result': True,
        'comment': 'The requested default privilege(s) are already set'
    }

    defprivileges = ','.join(defprivileges) if defprivileges else None

    kwargs = {
        'defprivileges': defprivileges,
        'grant_option': grant_option,
        'prepend': prepend,
        'maintenance_db': maintenance_db,
        'runas': user,
        'host': db_host,
        'user': db_user,
        'port': db_port,
        'password': db_password,
    }

    if not __salt__['postgres.has_default_privileges'](
            name, object_name, object_type, **kwargs):
        _defprivs = object_name if object_type == 'group' else defprivileges

        if __opts__['test']:
            ret['result'] = None
            ret['comment'] = ('The default privilege(s): {0} are'
                ' set to be granted to {1}').format(_defprivs, name)
            return ret

        if __salt__['postgres.default_privileges_grant'](
                name, object_name, object_type, **kwargs):
            ret['comment'] = ('The default privilege(s): {0} have '
                'been granted to {1}').format(_defprivs, name)
            ret['changes'][name] = 'Present'
        else:
            ret['comment'] = ('Failed to grant default privilege(s):'
                ' {0} to {1}').format(_defprivs, name)
            ret['result'] = False

    return ret


def absent(name,
            object_name,
            object_type,
            defprivileges=None,
            prepend='public',
            maintenance_db=None,
            user=None,
            db_password=None,
            db_host=None,
            db_port=None,
            db_user=None):
    '''
    Revoke the requested default privilege(s) on the specificed object(s)

    name
        Name of the role whose default privileges should be revoked

    object_name
       Name of the object on which the revoke is to be performed

    object_type
       The object type, which can be one of the following:

       - table
       - sequence
       - schema
       - tablespace  -- to delete
       - language    --  to delete
       - database    - to delete
       - group
       - function

       View permissions should specify `object_type: table`.

    privileges
       Comma separated list of default privileges to revoke, from the list below:

       - INSERT
       - CREATE
       - TRUNCATE
       - CONNECT
       - TRIGGER
       - SELECT
       - USAGE
       - TEMPORARY
       - UPDATE
       - EXECUTE
       - REFERENCES
       - DELETE
       - ALL

       :note: default privileges should not be set when revoking group membership

    prepend
        Table and Sequence object types live under a schema so this should be
        provided if the object is not under the default `public` schema

    maintenance_db
        The name of the database in which the language is to be installed

    user
        System user all operations should be performed on behalf of

    db_user
        database username if different from config or default

    db_password
        user password if any password for a specified user

    db_host
        Database host if different from config or default

    db_port
        Database port if different from config or default
    '''
    ret = {
        'name': name,
        'changes': {},
        'result': True,
        'comment': ('The requested default privilege(s) are '
            'not set so cannot be revoked')
    }

    defprivileges = ','.join(defprivileges) if defprivileges else None

    kwargs = {
        'defprivileges': defprivileges,
        'prepend': prepend,
        'maintenance_db': maintenance_db,
        'runas': user,
        'host': db_host,
        'user': db_user,
        'port': db_port,
        'password': db_password,
    }

    if __salt__['postgres.has_default_privileges'](
            name, object_name, object_type, **kwargs):
        _defprivs = object_name if object_type == 'group' else defprivileges

        if __opts__['test']:
            ret['result'] = None
            ret['comment'] = ('The default privilege(s): {0} are'
                ' set to be revoked from {1}').format(_defprivs, name)
            return ret

        if __salt__['postgres.default_privileges_revoke'](
                name, object_name, object_type, **kwargs):
            ret['comment'] = ('The default privilege(s): {0} have '
                'been revoked from {1}').format(_defprivs, name)
            ret['changes'][name] = 'Absent'
        else:
            ret['comment'] = ('Failed to revoke default privilege(s):'
                ' {0} from {1}').format(_defprivs, name)
            ret['result'] = False

    return ret