Source code for saltext.azurerm.states.azurerm_keyvault_vault

"""
Azure Resource Manager Key Vault State Module

.. versionadded:: 2.1.0

:maintainer: <devops@eitr.tech>
:configuration: This module requires Azure Resource Manager credentials to be passed as a dictionary of
    keyword arguments to the ``connection_auth`` parameter in order to work properly. Since the authentication
    parameters are sensitive, it's recommended to pass them to the states via Pillar.

    Required provider parameters:

    if using username and password:
      * ``subscription_id``
      * ``username``
      * ``password``

    if using a service principal:
      * ``subscription_id``
      * ``tenant``
      * ``client_id``
      * ``secret``

    if using managed identity:
      * ``subscription_id``

    Optional provider parameters:

    **cloud_environment**: Used to point the cloud driver to different API endpoints, such as Azure GovCloud.

      Possible values:
        * ``AZURE_PUBLIC_CLOUD`` (default)
        * ``AZURE_CHINA_CLOUD``
        * ``AZURE_US_GOV_CLOUD``
        * ``AZURE_GERMAN_CLOUD``

"""

# Python libs
import logging
from operator import itemgetter

import salt.utils.dictdiffer  # pylint: disable=import-error

log = logging.getLogger(__name__)


[docs] def present( name, resource_group, location, tenant_id, sku, access_policies=None, vault_uri=None, create_mode=None, enabled_for_deployment=None, enabled_for_disk_encryption=None, enabled_for_template_deployment=None, enable_soft_delete=None, soft_delete_retention=None, enable_purge_protection=None, enable_rbac_authorization=None, network_acls=None, tags=None, connection_auth=None, **kwargs, ): """ .. versionadded:: 2.1.0 Ensure a specified keyvault exists. :param name: The name of the vault. :param resource_group: The name of the resource group to which the vault belongs. :param location: The supported Azure location where the key vault should be created. :param tenant_id: The Azure Active Direction tenant ID that should be used for authenticating requests to the key vault. :param sku: The SKU name to specify whether the key vault is a standard vault or a premium vault. Possible values include: 'standard' and 'premium'. :param access_policies: A list of 0 to 16 dictionaries that represent AccessPolicyEntry objects. The AccessPolicyEntry objects represent identities that have access to the key vault. All identities in the list must use the same tenant ID as the key vault's tenant ID. When createMode is set to "recover", access policies are not required. Otherwise, access policies are required. Valid parameters are: - ``tenant_id``: (Required) The Azure Active Directory tenant ID that should be used for authenticating requests to the key vault. - ``object_id``: (Required) The object ID of a user, service principal, or security group in the Azure Active Directory tenant for the vault. The object ID must be unique for the list of access policies. - ``application_id``: (Optional) Application ID of the client making request on behalf of a principal. - ``permissions``: (Required) A dictionary representing permissions the identity has for keys, secrets, and certifications. Valid parameters include: - ``keys``: A list that represents permissions to keys. Possible values include: 'backup', 'create', 'decrypt', 'delete', 'encrypt', 'get', 'import_enum', 'list', 'purge', 'recover', 'restore', 'sign', 'unwrap_key', 'update', 'verify', and 'wrap_key'. - ``secrets``: A list that represents permissions to secrets. Possible values include: 'backup', 'delete', 'get', 'list', 'purge', 'recover', 'restore', and 'set'. - ``certificates``: A list that represents permissions to certificates. Possible values include: 'create', 'delete', 'deleteissuers', 'get', 'getissuers', 'import_enum', 'list', 'listissuers', 'managecontacts', 'manageissuers', 'purge', 'recover', 'setissuers', and 'update'. - ``storage``: A list that represents permissions to storage accounts. Possible values include: 'backup', 'delete', 'deletesas', 'get', 'getsas', 'list', 'listsas', 'purge', 'recover', 'regeneratekey', 'restore', 'set', 'setsas', and 'update'. :param vault_uri: The URI of the vault for performing operations on keys and secrets. :param create_mode: The vault's create mode to indicate whether the vault needs to be recovered or not. Possible values include: 'recover' and 'default'. :param enabled_for_deployment: A boolean value specifying whether Azure Virtual Machines are permitted to retrieve certificates stored as secrets from the key vault. :param enabled_for_disk_encryption: A boolean value specifying whether Azure Disk Encrpytion is permitted to retrieve secrets from the vault and unwrap keys. :param enabled_for_template_deployment: A boolean value specifying whether Azure Resource Manager is permitted to retrieve secrets from the key vault. :param create_mode: The vault's create mode to indicate whether the vault needs to be recovered or not. Possible values include: 'recover' and 'default'. :param enable_soft_delete: A boolean value that specifies whether the 'soft delete' functionality is enabled for this key vault. If it's not set to any value (True or False) when creating new key vault, it will be set to True by default. Once set to True, it cannot be reverted to False. :param soft_delete_retention: The soft delete data retention period in days. It accepts values between 7-90, inclusive. Default value is 90. :param enable_purge_protection: A boolean value specifying whether protection against purge is enabled for this vault. Setting this property to True activates protection against purge for this vault and its content - only the Key Vault service may initiate a hard, irrecoverable deletion. Enabling this functionality is irreversible, that is, the property does not accept False as its value. This is only effective if soft delete has been enabled via the ``enable_soft_delete`` parameter. :param enable_rbac_authorization: A boolean value that controls how data actions are authorized. When set to True, the key vault will use Role Based Access Control (RBAC) for authorization of data actions, and the access policies specified in vault properties will be ignored (warning: this is a preview feature). When set as False, the key vault will use the access policies specified in vault properties, and any policy stored on Azure Resource Manager will be ignored. Note that management actions are always authorized with RBAC. Defaults to False. :param network_acls: A dictionary representing a NetworkRuleSet. Rules governing the accessibility of the key vault from specific network locations. :param tags: The tags that will be assigned to the key vault. :param connection_auth: A dict with subscription and authentication parameters to be used in connecting to the Azure Resource Manager API. Example usage: .. code-block:: yaml Ensure key vault exists: azurerm_keyvault_vault.present: - name: my_vault - resource_group: my_rg - location: my_location - tenant_id: my_tenant - sku: my_sku - access_policies: - tenant_id: my_tenant object_id: my_object permissions: keys: - perm1 - perm2 - perm3 secrets: - perm1 - perm2 - perm3 certificates: - perm1 - perm2 - perm3 - tags: contact_name: Elmer Fudd Gantry """ ret = {"name": name, "result": False, "comment": "", "changes": {}} action = "create" if not isinstance(connection_auth, dict): ret["comment"] = "Connection information must be specified via connection_auth dictionary!" return ret vault = __salt__["azurerm_keyvault_vault.get"]( name, resource_group, azurerm_log_level="info", **connection_auth ) if "error" not in vault: action = "update" ret["changes"]["properties"] = {} tag_changes = salt.utils.dictdiffer.deep_diff(vault.get("tags", {}), tags or {}) if tag_changes: ret["changes"]["tags"] = tag_changes # Checks for changes in the account_policies parameter if len(access_policies or []) == len(vault.get("properties").get("access_policies", [])): new_policies_sorted = sorted(access_policies or [], key=itemgetter("object_id")) old_policies_sorted = sorted( vault.get("properties").get("access_policies", []), key=itemgetter("object_id"), ) changed = False for index, new_policy in enumerate(new_policies_sorted): old_policy = old_policies_sorted[index] # Checks for changes with the tenant_id key if old_policy.get("tenant_id") != new_policy.get("tenant_id"): changed = True break # Checks for changes with the object_id key if old_policy.get("object_id") != new_policy.get("object_id"): changed = True break # Checks for changes with the application_id key if old_policy.get("application_id") != new_policy.get("application_id"): changed = True break # Checks for changes within the permissions key if new_policy["permissions"].get("keys") is not None: new_keys = sorted(new_policy["permissions"].get("keys")) old_keys = sorted(old_policy["permissions"].get("keys", [])) if new_keys != old_keys: changed = True break # Checks for changes within the secrets key if new_policy["permissions"].get("secrets") is not None: new_secrets = sorted(new_policy["permissions"].get("secrets")) old_secrets = sorted(old_policy["permissions"].get("secrets", [])) if new_secrets != old_secrets: changed = True break # Checks for changes within the certificates key if new_policy["permissions"].get("certificates") is not None: new_certificates = sorted(new_policy["permissions"].get("certificates")) old_certificates = sorted(old_policy["permissions"].get("certificates", [])) if new_certificates != old_certificates: changed = True break if changed: ret["changes"]["properties"]["access_policies"] = { "old": vault.get("properties").get("access_policies", []), "new": access_policies, } else: ret["changes"]["properties"]["access_policies"] = { "old": vault.get("properties").get("access_policies", []), "new": access_policies, } if sku != vault.get("properties").get("sku").get("name"): ret["changes"]["properties"]["sku"] = { "old": vault.get("properties").get("sku"), "new": {"name": sku}, } if enabled_for_deployment is not None: if enabled_for_deployment != vault.get("properties").get("enabled_for_deployment"): ret["changes"]["properties"]["enabled_for_deployment"] = { "old": vault.get("properties").get("enabled_for_deployment"), "new": enabled_for_deployment, } if enabled_for_disk_encryption is not None: if enabled_for_disk_encryption != vault.get("properties").get( "enabled_for_disk_encryption" ): ret["changes"]["properties"]["enabled_for_disk_encryption"] = { "old": vault.get("properties").get("enabled_for_disk_encryption"), "new": enabled_for_disk_encryption, } if enabled_for_template_deployment is not None: if enabled_for_template_deployment != vault.get("properties").get( "enabled_for_template_deployment" ): ret["changes"]["properties"]["enabled_for_template_deployment"] = { "old": vault.get("properties").get("enabled_for_template_deployment"), "new": enabled_for_template_deployment, } if enable_soft_delete is not None: if enable_soft_delete != vault.get("properties").get("enable_soft_delete"): ret["changes"]["properties"]["enable_soft_delete"] = { "old": vault.get("properties").get("enable_soft_delete"), "new": enable_soft_delete, } if enable_purge_protection is not None: if enable_purge_protection != vault.get("properties").get("enable_purge_protection"): ret["changes"]["properties"]["enable_purge_protection"] = { "old": vault.get("properties").get("enable_purge_protection"), "new": enable_purge_protection, } if enable_rbac_authorization is not None: if enable_rbac_authorization != vault.get("properties").get( "enable_rbac_authorization" ): ret["changes"]["properties"]["enable_rbac_authorization"] = { "old": vault.get("properties").get("enable_rbac_authorization"), "new": enable_rbac_authorization, } if network_acls: acls_changes = salt.utils.dictdiffer.deep_diff( vault.get("properties").get("network_acls", {}), network_acls or {} ) if acls_changes: ret["changes"]["properties"]["network_acls"] = acls_changes if not ret["changes"]["properties"]: del ret["changes"]["properties"] if not ret["changes"]: ret["result"] = True ret["comment"] = f"Key Vault {name} is already present." return ret if __opts__["test"]: ret["result"] = None ret["comment"] = f"Key Vault {name} would be updated." return ret if __opts__["test"]: ret["comment"] = f"Key vault {name} would be created." ret["result"] = None return ret vault_kwargs = kwargs.copy() vault_kwargs.update(connection_auth) vault = __salt__["azurerm_keyvault_vault.create_or_update"]( name=name, resource_group=resource_group, location=location, tenant_id=tenant_id, sku=sku, access_policies=access_policies, vault_uri=vault_uri, create_mode=create_mode, enable_soft_delete=enable_soft_delete, enable_purge_protection=enable_purge_protection, soft_delete_retention=soft_delete_retention, enabled_for_deployment=enabled_for_deployment, enabled_for_disk_encryption=enabled_for_disk_encryption, enabled_for_template_deployment=enabled_for_template_deployment, enable_rbac_authorization=enable_rbac_authorization, network_acls=network_acls, tags=tags, **vault_kwargs, ) if action == "create": ret["changes"] = {"old": {}, "new": vault} if "error" not in vault: ret["result"] = True ret["comment"] = f"Key Vault {name} has been {action}d." return ret ret["comment"] = ( "Failed to {} Key Vault {}! ({})".format( # pylint: disable=consider-using-f-string action, name, vault.get("error") ) ) if not ret["result"]: ret["changes"] = {} return ret
[docs] def absent(name, resource_group, connection_auth=None): """ .. versionadded:: 2.1.0 Ensure a specified key vault does not exist. :param name: The name of the vault. :param resource_group: The name of the resource group to which the vault belongs. :param connection_auth: A dict with subscription and authentication parameters to be used in connecting to the Azure Resource Manager API. Example usage: .. code-block:: yaml Ensure key vault is absent: azurerm_keyvault_vault.absent: - name: my_vault - resource_group: my_rg """ ret = {"name": name, "result": False, "comment": "", "changes": {}} if not isinstance(connection_auth, dict): ret["comment"] = "Connection information must be specified via connection_auth dictionary!" return ret vault = __salt__["azurerm_keyvault_vault.get"]( name, resource_group, azurerm_log_level="info", **connection_auth ) if "error" in vault: ret["result"] = True ret["comment"] = f"Key Vault {name} was not found." return ret if __opts__["test"]: ret["comment"] = f"Key Vault {name} would be deleted." ret["result"] = None ret["changes"] = { "old": vault, "new": {}, } return ret deleted = __salt__["azurerm_keyvault_vault.delete"](name, resource_group, **connection_auth) if deleted: ret["result"] = True ret["comment"] = f"Key Vault {name} has been deleted." ret["changes"] = {"old": vault, "new": {}} return ret ret["comment"] = f"Failed to delete Key Vault {name}!" return ret