Browse Source

Move more plugins to lib_utils

This commit continues moving plugins into lib_utils.

This commit does not move any plugins for add-on roles
such as logging and metrics.
Michael Gugino 7 years ago
parent
commit
d3fefc32a7
41 changed files with 350 additions and 66 deletions
  1. 1 0
      playbooks/openshift-master/private/certificates-backup.yml
  2. 1 0
      roles/etcd/tasks/certificates/fetch_client_certificates_from_ca.yml
  3. 2 0
      roles/etcd/tasks/certificates/fetch_server_certificates_from_ca.yml
  4. 0 0
      roles/lib_utils/action_plugins/generate_pv_pvcs_list.py
  5. 0 0
      roles/lib_utils/filter_plugins/oo_cert_expiry.py
  6. 9 0
      roles/lib_utils/filter_plugins/oo_filters.py
  7. 0 0
      roles/lib_utils/filter_plugins/openshift_aws_filters.py
  8. 0 0
      roles/lib_utils/filter_plugins/openshift_hosted_filters.py
  9. 0 0
      roles/lib_utils/filter_plugins/openshift_master.py
  10. 0 0
      roles/lib_utils/library/delegated_serial_command.py
  11. 0 0
      roles/lib_utils/library/openshift_cert_expiry.py
  12. 0 0
      roles/lib_utils/library/openshift_container_binary_sync.py
  13. 143 0
      roles/lib_utils/lookup_plugins/openshift_master_facts_default_predicates.py
  14. 117 0
      roles/lib_utils/lookup_plugins/openshift_master_facts_default_priorities.py
  15. 53 0
      roles/openshift_certificate_expiry/test/conftest.py
  16. 0 0
      roles/lib_utils/test/openshift_master_facts_bad_input_tests.py
  17. 0 0
      roles/lib_utils/test/openshift_master_facts_conftest.py
  18. 0 0
      roles/lib_utils/test/openshift_master_facts_default_predicates_tests.py
  19. 0 0
      roles/lib_utils/test/openshift_master_facts_default_priorities_tests.py
  20. 0 0
      roles/lib_utils/test/test_fakeopensslclasses.py
  21. 0 0
      roles/lib_utils/test/test_load_and_handle_cert.py
  22. 2 0
      roles/openshift_aws/defaults/main.yml
  23. 1 0
      roles/openshift_aws/tasks/build_node_group.yml
  24. 1 0
      roles/openshift_aws/tasks/wait_for_groups.yml
  25. 3 1
      roles/openshift_certificate_expiry/tasks/main.yml
  26. 2 0
      roles/openshift_cli/tasks/main.yml
  27. 1 1
      roles/openshift_health_checker/openshift_checks/disk_availability.py
  28. 1 0
      roles/openshift_hosted/tasks/router.yml
  29. 0 9
      roles/openshift_logging/filter_plugins/openshift_logging.py
  30. 1 0
      roles/openshift_logging_fluentd/defaults/main.yml
  31. 1 0
      roles/openshift_logging_mux/defaults/main.yml
  32. 1 0
      roles/openshift_master/tasks/main.yml
  33. 2 0
      roles/openshift_master/tasks/upgrade/upgrade_scheduler.yml
  34. 1 0
      roles/openshift_master_certificates/tasks/main.yml
  35. 3 0
      roles/openshift_master_facts/tasks/main.yml
  36. 0 21
      roles/openshift_named_certificates/filter_plugins/openshift_named_certificates.py
  37. 2 1
      roles/openshift_persistent_volumes/tasks/main.yml
  38. 0 10
      roles/openshift_sanitize_inventory/filter_plugins/openshift_sanitize_inventory.py
  39. 0 23
      roles/openshift_storage_glusterfs/filter_plugins/openshift_storage_glusterfs.py
  40. 1 0
      roles/openshift_storage_glusterfs/tasks/glusterfs_config.yml
  41. 1 0
      roles/openshift_storage_glusterfs/tasks/glusterfs_registry.yml

+ 1 - 0
playbooks/openshift-master/private/certificates-backup.yml

@@ -28,6 +28,7 @@
       path: "{{ openshift.common.config_base }}/master/{{ item }}"
       state: absent
     with_items:
+    # certificates_to_synchronize is a custom filter in lib_utils
     - "{{ hostvars[inventory_hostname] | certificates_to_synchronize(include_keys=false, include_ca=false) }}"
     - "etcd.server.crt"
     - "etcd.server.key"

+ 1 - 0
roles/etcd/tasks/certificates/fetch_client_certificates_from_ca.yml

@@ -57,6 +57,7 @@
 
 # Certificates must be signed serially in order to avoid competing
 # for the serial file.
+# delegated_serial_command is a custom module in lib_utils
 - name: Sign and create the client crt
   delegated_serial_command:
     command: >

+ 2 - 0
roles/etcd/tasks/certificates/fetch_server_certificates_from_ca.yml

@@ -50,6 +50,7 @@
 
 # Certificates must be signed serially in order to avoid competing
 # for the serial file.
+# delegated_serial_command is a custom module in lib_utils
 - name: Sign and create the server crt
   delegated_serial_command:
     command: >
@@ -83,6 +84,7 @@
 
 # Certificates must be signed serially in order to avoid competing
 # for the serial file.
+# delegated_serial_command is a custom module in lib_utils
 - name: Sign and create the peer crt
   delegated_serial_command:
     command: >

roles/openshift_persistent_volumes/action_plugins/generate_pv_pvcs_list.py → roles/lib_utils/action_plugins/generate_pv_pvcs_list.py


roles/openshift_certificate_expiry/filter_plugins/oo_cert_expiry.py → roles/lib_utils/filter_plugins/oo_cert_expiry.py


+ 9 - 0
roles/lib_utils/filter_plugins/oo_filters.py

@@ -589,6 +589,14 @@ that result to this filter plugin.
     return secret_name
 
 
+def map_from_pairs(source, delim="="):
+    ''' Returns a dict given the source and delim delimited '''
+    if source == '':
+        return dict()
+
+    return dict(item.split(delim) for item in source.split(","))
+
+
 class FilterModule(object):
     """ Custom ansible filter mapping """
 
@@ -618,4 +626,5 @@ class FilterModule(object):
             "lib_utils_oo_contains_rule": lib_utils_oo_contains_rule,
             "lib_utils_oo_selector_to_string_list": lib_utils_oo_selector_to_string_list,
             "lib_utils_oo_filter_sa_secrets": lib_utils_oo_filter_sa_secrets,
+            "map_from_pairs": map_from_pairs
         }

roles/openshift_aws/filter_plugins/openshift_aws_filters.py → roles/lib_utils/filter_plugins/openshift_aws_filters.py


roles/openshift_hosted/filter_plugins/openshift_hosted_filters.py → roles/lib_utils/filter_plugins/openshift_hosted_filters.py


roles/openshift_master_facts/filter_plugins/openshift_master.py → roles/lib_utils/filter_plugins/openshift_master.py


roles/etcd/library/delegated_serial_command.py → roles/lib_utils/library/delegated_serial_command.py


roles/openshift_certificate_expiry/library/openshift_cert_expiry.py → roles/lib_utils/library/openshift_cert_expiry.py


roles/openshift_cli/library/openshift_container_binary_sync.py → roles/lib_utils/library/openshift_container_binary_sync.py


+ 143 - 0
roles/lib_utils/lookup_plugins/openshift_master_facts_default_predicates.py

@@ -0,0 +1,143 @@
+# pylint: disable=missing-docstring
+
+import re
+from ansible.errors import AnsibleError
+from ansible.plugins.lookup import LookupBase
+
+
+class LookupModule(LookupBase):
+    # pylint: disable=too-many-branches,too-many-statements,too-many-arguments
+
+    def run(self, terms, variables=None, regions_enabled=True, short_version=None,
+            deployment_type=None, **kwargs):
+
+        predicates = []
+
+        if short_version is None or deployment_type is None:
+            if 'openshift' not in variables:
+                raise AnsibleError("This lookup module requires openshift_facts to be run prior to use")
+
+        if deployment_type is None:
+            if 'common' not in variables['openshift'] or 'deployment_type' not in variables['openshift']['common']:
+                raise AnsibleError("This lookup module requires that the deployment_type be set")
+
+            deployment_type = variables['openshift']['common']['deployment_type']
+
+        if short_version is None:
+            if 'short_version' in variables['openshift']['common']:
+                short_version = variables['openshift']['common']['short_version']
+            elif 'openshift_release' in variables:
+                release = variables['openshift_release']
+                if release.startswith('v'):
+                    short_version = release[1:]
+                else:
+                    short_version = release
+                short_version = '.'.join(short_version.split('.')[0:2])
+            elif 'openshift_version' in variables:
+                version = variables['openshift_version']
+                short_version = '.'.join(version.split('.')[0:2])
+            else:
+                # pylint: disable=line-too-long
+                raise AnsibleError("Either OpenShift needs to be installed or openshift_release needs to be specified")
+        if deployment_type == 'origin':
+            if short_version not in ['1.1', '1.2', '1.3', '1.4', '1.5', '3.6', '3.7', '3.8', '3.9', 'latest']:
+                raise AnsibleError("Unknown short_version %s" % short_version)
+        elif deployment_type == 'openshift-enterprise':
+            if short_version not in ['3.1', '3.2', '3.3', '3.4', '3.5', '3.6', '3.7', '3.8', '3.9', 'latest']:
+                raise AnsibleError("Unknown short_version %s" % short_version)
+        else:
+            raise AnsibleError("Unknown deployment_type %s" % deployment_type)
+
+        if deployment_type == 'origin':
+            # convert short_version to enterprise short_version
+            short_version = re.sub('^1.', '3.', short_version)
+
+        if short_version == 'latest':
+            short_version = '3.9'
+
+        # Predicates ordered according to OpenShift Origin source:
+        # origin/vendor/k8s.io/kubernetes/plugin/pkg/scheduler/algorithmprovider/defaults/defaults.go
+
+        if short_version == '3.1':
+            predicates.extend([
+                {'name': 'PodFitsHostPorts'},
+                {'name': 'PodFitsResources'},
+                {'name': 'NoDiskConflict'},
+                {'name': 'MatchNodeSelector'},
+            ])
+
+        if short_version == '3.2':
+            predicates.extend([
+                {'name': 'PodFitsHostPorts'},
+                {'name': 'PodFitsResources'},
+                {'name': 'NoDiskConflict'},
+                {'name': 'NoVolumeZoneConflict'},
+                {'name': 'MatchNodeSelector'},
+                {'name': 'MaxEBSVolumeCount'},
+                {'name': 'MaxGCEPDVolumeCount'}
+            ])
+
+        if short_version == '3.3':
+            predicates.extend([
+                {'name': 'NoDiskConflict'},
+                {'name': 'NoVolumeZoneConflict'},
+                {'name': 'MaxEBSVolumeCount'},
+                {'name': 'MaxGCEPDVolumeCount'},
+                {'name': 'GeneralPredicates'},
+                {'name': 'PodToleratesNodeTaints'},
+                {'name': 'CheckNodeMemoryPressure'}
+            ])
+
+        if short_version == '3.4':
+            predicates.extend([
+                {'name': 'NoDiskConflict'},
+                {'name': 'NoVolumeZoneConflict'},
+                {'name': 'MaxEBSVolumeCount'},
+                {'name': 'MaxGCEPDVolumeCount'},
+                {'name': 'GeneralPredicates'},
+                {'name': 'PodToleratesNodeTaints'},
+                {'name': 'CheckNodeMemoryPressure'},
+                {'name': 'CheckNodeDiskPressure'},
+                {'name': 'MatchInterPodAffinity'}
+            ])
+
+        if short_version in ['3.5', '3.6']:
+            predicates.extend([
+                {'name': 'NoVolumeZoneConflict'},
+                {'name': 'MaxEBSVolumeCount'},
+                {'name': 'MaxGCEPDVolumeCount'},
+                {'name': 'MatchInterPodAffinity'},
+                {'name': 'NoDiskConflict'},
+                {'name': 'GeneralPredicates'},
+                {'name': 'PodToleratesNodeTaints'},
+                {'name': 'CheckNodeMemoryPressure'},
+                {'name': 'CheckNodeDiskPressure'},
+            ])
+
+        if short_version in ['3.7', '3.8', '3.9']:
+            predicates.extend([
+                {'name': 'NoVolumeZoneConflict'},
+                {'name': 'MaxEBSVolumeCount'},
+                {'name': 'MaxGCEPDVolumeCount'},
+                {'name': 'MaxAzureDiskVolumeCount'},
+                {'name': 'MatchInterPodAffinity'},
+                {'name': 'NoDiskConflict'},
+                {'name': 'GeneralPredicates'},
+                {'name': 'PodToleratesNodeTaints'},
+                {'name': 'CheckNodeMemoryPressure'},
+                {'name': 'CheckNodeDiskPressure'},
+                {'name': 'NoVolumeNodeConflict'},
+            ])
+
+        if regions_enabled:
+            region_predicate = {
+                'name': 'Region',
+                'argument': {
+                    'serviceAffinity': {
+                        'labels': ['region']
+                    }
+                }
+            }
+            predicates.append(region_predicate)
+
+        return predicates

+ 117 - 0
roles/lib_utils/lookup_plugins/openshift_master_facts_default_priorities.py

@@ -0,0 +1,117 @@
+# pylint: disable=missing-docstring
+
+import re
+from ansible.errors import AnsibleError
+from ansible.plugins.lookup import LookupBase
+
+
+class LookupModule(LookupBase):
+    # pylint: disable=too-many-branches,too-many-statements,too-many-arguments
+
+    def run(self, terms, variables=None, zones_enabled=True, short_version=None,
+            deployment_type=None, **kwargs):
+
+        priorities = []
+
+        if short_version is None or deployment_type is None:
+            if 'openshift' not in variables:
+                raise AnsibleError("This lookup module requires openshift_facts to be run prior to use")
+
+        if deployment_type is None:
+            if 'common' not in variables['openshift'] or 'deployment_type' not in variables['openshift']['common']:
+                raise AnsibleError("This lookup module requires that the deployment_type be set")
+
+            deployment_type = variables['openshift']['common']['deployment_type']
+
+        if short_version is None:
+            if 'short_version' in variables['openshift']['common']:
+                short_version = variables['openshift']['common']['short_version']
+            elif 'openshift_release' in variables:
+                release = variables['openshift_release']
+                if release.startswith('v'):
+                    short_version = release[1:]
+                else:
+                    short_version = release
+                short_version = '.'.join(short_version.split('.')[0:2])
+            elif 'openshift_version' in variables:
+                version = variables['openshift_version']
+                short_version = '.'.join(version.split('.')[0:2])
+            else:
+                # pylint: disable=line-too-long
+                raise AnsibleError("Either OpenShift needs to be installed or openshift_release needs to be specified")
+
+        if deployment_type == 'origin':
+            if short_version not in ['1.1', '1.2', '1.3', '1.4', '1.5', '3.6', '3.7', '3.8', '3.9', 'latest']:
+                raise AnsibleError("Unknown short_version %s" % short_version)
+        elif deployment_type == 'openshift-enterprise':
+            if short_version not in ['3.1', '3.2', '3.3', '3.4', '3.5', '3.6', '3.7', '3.8', '3.9', 'latest']:
+                raise AnsibleError("Unknown short_version %s" % short_version)
+        else:
+            raise AnsibleError("Unknown deployment_type %s" % deployment_type)
+
+        if deployment_type == 'origin':
+            # convert short_version to origin short_version
+            short_version = re.sub('^1.', '3.', short_version)
+
+        if short_version == 'latest':
+            short_version = '3.9'
+
+        if short_version == '3.1':
+            priorities.extend([
+                {'name': 'LeastRequestedPriority', 'weight': 1},
+                {'name': 'BalancedResourceAllocation', 'weight': 1},
+                {'name': 'SelectorSpreadPriority', 'weight': 1}
+            ])
+
+        if short_version == '3.2':
+            priorities.extend([
+                {'name': 'LeastRequestedPriority', 'weight': 1},
+                {'name': 'BalancedResourceAllocation', 'weight': 1},
+                {'name': 'SelectorSpreadPriority', 'weight': 1},
+                {'name': 'NodeAffinityPriority', 'weight': 1}
+            ])
+
+        if short_version == '3.3':
+            priorities.extend([
+                {'name': 'LeastRequestedPriority', 'weight': 1},
+                {'name': 'BalancedResourceAllocation', 'weight': 1},
+                {'name': 'SelectorSpreadPriority', 'weight': 1},
+                {'name': 'NodeAffinityPriority', 'weight': 1},
+                {'name': 'TaintTolerationPriority', 'weight': 1}
+            ])
+
+        if short_version == '3.4':
+            priorities.extend([
+                {'name': 'LeastRequestedPriority', 'weight': 1},
+                {'name': 'BalancedResourceAllocation', 'weight': 1},
+                {'name': 'SelectorSpreadPriority', 'weight': 1},
+                {'name': 'NodePreferAvoidPodsPriority', 'weight': 10000},
+                {'name': 'NodeAffinityPriority', 'weight': 1},
+                {'name': 'TaintTolerationPriority', 'weight': 1},
+                {'name': 'InterPodAffinityPriority', 'weight': 1}
+            ])
+
+        if short_version in ['3.5', '3.6', '3.7', '3.8', '3.9']:
+            priorities.extend([
+                {'name': 'SelectorSpreadPriority', 'weight': 1},
+                {'name': 'InterPodAffinityPriority', 'weight': 1},
+                {'name': 'LeastRequestedPriority', 'weight': 1},
+                {'name': 'BalancedResourceAllocation', 'weight': 1},
+                {'name': 'NodePreferAvoidPodsPriority', 'weight': 10000},
+                {'name': 'NodeAffinityPriority', 'weight': 1},
+                {'name': 'TaintTolerationPriority', 'weight': 1}
+            ])
+
+        if zones_enabled:
+            zone_priority = {
+                'name': 'Zone',
+                'argument': {
+                    'serviceAntiAffinity': {
+                        'label': 'zone'
+                    }
+                },
+                'weight': 2
+            }
+            priorities.append(zone_priority)
+
+        return priorities

+ 53 - 0
roles/openshift_certificate_expiry/test/conftest.py

@@ -1,7 +1,15 @@
 # pylint: disable=missing-docstring,invalid-name,redefined-outer-name
+import os
 import pytest
+import sys
+
 from OpenSSL import crypto
 
+sys.path.insert(1, os.path.join(os.path.dirname(__file__), os.pardir, "lookup_plugins"))
+
+from openshift_master_facts_default_predicates import LookupModule as PredicatesLookupModule  # noqa: E402
+from openshift_master_facts_default_priorities import LookupModule as PrioritiesLookupModule  # noqa: E402
+
 # Parameter list for valid_cert fixture
 VALID_CERTIFICATE_PARAMS = [
     {
@@ -117,3 +125,48 @@ def valid_cert(request, ca):
         'cert_file': cert_file,
         'cert': cert
     }
+
+
+@pytest.fixture()
+def predicates_lookup():
+    return PredicatesLookupModule()
+
+
+@pytest.fixture()
+def priorities_lookup():
+    return PrioritiesLookupModule()
+
+
+@pytest.fixture()
+def facts():
+    return {
+        'openshift': {
+            'common': {}
+        }
+    }
+
+
+@pytest.fixture(params=[True, False])
+def regions_enabled(request):
+    return request.param
+
+
+@pytest.fixture(params=[True, False])
+def zones_enabled(request):
+    return request.param
+
+
+def v_prefix(release):
+    """Prefix a release number with 'v'."""
+    return "v" + release
+
+
+def minor(release):
+    """Add a suffix to release, making 'X.Y' become 'X.Y.Z'."""
+    return release + ".1"
+
+
+@pytest.fixture(params=[str, v_prefix, minor])
+def release_mod(request):
+    """Modifies a release string to alternative valid values."""
+    return request.param

roles/openshift_master_facts/test/openshift_master_facts_bad_input_tests.py → roles/lib_utils/test/openshift_master_facts_bad_input_tests.py


roles/openshift_master_facts/test/conftest.py → roles/lib_utils/test/openshift_master_facts_conftest.py


roles/openshift_master_facts/test/openshift_master_facts_default_predicates_tests.py → roles/lib_utils/test/openshift_master_facts_default_predicates_tests.py


roles/openshift_master_facts/test/openshift_master_facts_default_priorities_tests.py → roles/lib_utils/test/openshift_master_facts_default_priorities_tests.py


roles/openshift_certificate_expiry/test/test_fakeopensslclasses.py → roles/lib_utils/test/test_fakeopensslclasses.py


roles/openshift_certificate_expiry/test/test_load_and_handle_cert.py → roles/lib_utils/test/test_load_and_handle_cert.py


+ 2 - 0
roles/openshift_aws/defaults/main.yml

@@ -109,6 +109,7 @@ openshift_aws_node_group_config_node_volumes:
   device_type: gp2
   delete_on_termination: True
 
+# build_instance_tags is a custom filter in role lib_utils
 openshift_aws_node_group_config_tags: "{{ openshift_aws_clusterid | build_instance_tags }}"
 openshift_aws_node_group_termination_policy: Default
 openshift_aws_node_group_replace_instances: []
@@ -201,6 +202,7 @@ openshift_aws_node_group_config:
 openshift_aws_elb_tags: "{{ openshift_aws_kube_tags }}"
 openshift_aws_elb_az_load_balancing: False
 
+# build_instance_tags is a custom filter in role lib_utils
 openshift_aws_kube_tags: "{{ openshift_aws_clusterid | build_instance_tags }}"
 
 openshift_aws_elb_security_groups: "{{ openshift_aws_launch_config_security_groups }}"

+ 1 - 0
roles/openshift_aws/tasks/build_node_group.yml

@@ -43,6 +43,7 @@
 
 - name: set the value for the deployment_serial and the current asgs
   set_fact:
+    # scale_groups_serial is a custom filter in role lib_utils
     l_deployment_serial: "{{  openshift_aws_node_group_deployment_serial if openshift_aws_node_group_deployment_serial is defined else asgs.results | scale_groups_serial(openshift_aws_node_group_upgrade) }}"
     openshift_aws_current_asgs: "{{ asgs.results | map(attribute='auto_scaling_group_name') | list | union(openshift_aws_current_asgs) }}"
 

+ 1 - 0
roles/openshift_aws/tasks/wait_for_groups.yml

@@ -8,6 +8,7 @@
     tags:
       "{{ {'kubernetes.io/cluster/' ~ openshift_aws_clusterid: openshift_aws_clusterid } }}"
   register: qasg
+  # scale_groups_match_capacity is a custom filter in role lib_utils
   until: qasg | json_query('results[*]') | scale_groups_match_capacity | bool
   delay: 10
   retries: 60

+ 3 - 1
roles/openshift_certificate_expiry/tasks/main.yml

@@ -16,7 +16,9 @@
 
 - name: Generate the result JSON string
   run_once: yes
-  set_fact: json_result_string="{{ hostvars|oo_cert_expiry_results_to_json(play_hosts) }}"
+  set_fact:
+    # oo_cert_expiry_results_to_json is a custom filter in role lib_utils
+    json_result_string: "{{ hostvars|oo_cert_expiry_results_to_json(play_hosts) }}"
   when: openshift_certificate_expiry_save_json_results|bool
 
 - name: Generate results JSON file

+ 2 - 0
roles/openshift_cli/tasks/main.yml

@@ -12,6 +12,7 @@
     register: pull_result
     changed_when: "'Downloaded newer image' in pull_result.stdout"
 
+  # openshift_container_binary_sync is a custom module in lib_utils
   - name: Copy client binaries/symlinks out of CLI image for use on the host
     openshift_container_binary_sync:
       image: "{{ openshift_cli_image }}"
@@ -28,6 +29,7 @@
     register: pull_result
     changed_when: "'Pulling layer' in pull_result.stdout"
 
+  # openshift_container_binary_sync is a custom module in lib_utils
   - name: Copy client binaries/symlinks out of CLI image for use on the host
     openshift_container_binary_sync:
       image: "{{ '' if system_images_registry == 'docker' else system_images_registry + '/' }}{{ openshift_cli_image }}"

+ 1 - 1
roles/openshift_health_checker/openshift_checks/disk_availability.py

@@ -21,7 +21,7 @@ class DiskAvailability(OpenShiftCheck):
             'oo_etcd_to_config': 20 * 10**9,
         },
         # Used to copy client binaries into,
-        # see roles/openshift_cli/library/openshift_container_binary_sync.py.
+        # see roles/lib_utils/library/openshift_container_binary_sync.py.
         '/usr/local/bin': {
             'oo_masters_to_config': 1 * 10**9,
             'oo_nodes_to_config': 1 * 10**9,

+ 1 - 0
roles/openshift_hosted/tasks/router.yml

@@ -18,6 +18,7 @@
 
 - name: set_fact replicas
   set_fact:
+    # get_router_replicas is a custom filter in role lib_utils
     replicas: "{{ openshift_hosted_router_replicas | default(None) | get_router_replicas(router_nodes) }}"
 
 - name: Get the certificate contents for router

+ 0 - 9
roles/openshift_logging/filter_plugins/openshift_logging.py

@@ -79,14 +79,6 @@ def entry_from_named_pair(register_pairs, key):
     raise RuntimeError("There was no entry found in the dict that had an item with a name that matched {}".format(key))
 
 
-def map_from_pairs(source, delim="="):
-    ''' Returns a dict given the source and delim delimited '''
-    if source == '':
-        return dict()
-
-    return dict(item.split(delim) for item in source.split(","))
-
-
 def serviceaccount_name(qualified_sa):
     ''' Returns the simple name from a fully qualified name '''
     return qualified_sa.split(":")[-1]
@@ -134,7 +126,6 @@ class FilterModule(object):
         return {
             'random_word': random_word,
             'entry_from_named_pair': entry_from_named_pair,
-            'map_from_pairs': map_from_pairs,
             'min_cpu': min_cpu,
             'es_storage': es_storage,
             'serviceaccount_name': serviceaccount_name,

+ 1 - 0
roles/openshift_logging_fluentd/defaults/main.yml

@@ -5,6 +5,7 @@ openshift_logging_fluentd_master_url: "https://kubernetes.default.svc.{{ openshi
 openshift_logging_fluentd_namespace: logging
 
 ### Common settings
+# map_from_pairs is a custom filter plugin in role lib_utils
 openshift_logging_fluentd_nodeselector: "{{ openshift_hosted_logging_fluentd_nodeselector_label | default('logging-infra-fluentd=true') | map_from_pairs }}"
 openshift_logging_fluentd_cpu_limit: null
 openshift_logging_fluentd_cpu_request: 100m

+ 1 - 0
roles/openshift_logging_mux/defaults/main.yml

@@ -6,6 +6,7 @@ openshift_logging_mux_master_public_url: "{{ openshift_hosted_logging_master_pub
 openshift_logging_mux_namespace: logging
 
 ### Common settings
+# map_from_pairs is a custom filter plugin in role lib_utils
 openshift_logging_mux_nodeselector: "{{ openshift_hosted_logging_mux_nodeselector_label | default('') | map_from_pairs }}"
 openshift_logging_mux_cpu_limit: null
 openshift_logging_mux_cpu_request: 100m

+ 1 - 0
roles/openshift_master/tasks/main.yml

@@ -181,6 +181,7 @@
   - restart master api
 
 - set_fact:
+    # translate_idps is a custom filter in role lib_utils
     translated_identity_providers: "{{ openshift.master.identity_providers | translate_idps('v1') }}"
 
 # TODO: add the validate parameter when there is a validation command to run

+ 2 - 0
roles/openshift_master/tasks/upgrade/upgrade_scheduler.yml

@@ -1,6 +1,8 @@
 ---
 # Upgrade predicates
 - vars:
+    # openshift_master_facts_default_predicates is a custom lookup plugin in
+    # role lib_utils
     prev_predicates: "{{ lookup('openshift_master_facts_default_predicates', short_version=openshift_upgrade_min, deployment_type=openshift_deployment_type) }}"
     prev_predicates_no_region: "{{ lookup('openshift_master_facts_default_predicates', short_version=openshift_upgrade_min, deployment_type=openshift_deployment_type, regions_enabled=False) }}"
     default_predicates_no_region: "{{ lookup('openshift_master_facts_default_predicates', regions_enabled=False) }}"

+ 1 - 0
roles/openshift_master_certificates/tasks/main.yml

@@ -101,6 +101,7 @@
     state: hard
     force: true
   with_items:
+  # certificates_to_synchronize is a custom filter in lib_utils
   - "{{ hostvars[inventory_hostname] | certificates_to_synchronize }}"
   when: master_certs_missing | bool and inventory_hostname != openshift_ca_host
   delegate_to: "{{ openshift_ca_host }}"

+ 3 - 0
roles/openshift_master_facts/tasks/main.yml

@@ -57,6 +57,7 @@
       access_token_max_seconds: "{{ openshift_master_access_token_max_seconds | default(None) }}"
       auth_token_max_seconds: "{{ openshift_master_auth_token_max_seconds | default(None) }}"
       identity_providers: "{{ openshift_master_identity_providers | default(None) }}"
+      # oo_htpasswd_users_from_file is a custom filter in role lib_utils
       htpasswd_users: "{{ openshift_master_htpasswd_users | default(lookup('file', openshift_master_htpasswd_file) | oo_htpasswd_users_from_file if openshift_master_htpasswd_file is defined else None) }}"
       manage_htpasswd: "{{ openshift_master_manage_htpasswd | default(true) }}"
       ldap_ca: "{{ openshift_master_ldap_ca | default(lookup('file', openshift_master_ldap_ca_file) if openshift_master_ldap_ca_file is defined else None) }}"
@@ -90,6 +91,8 @@
 
 - name: Set Default scheduler predicates and priorities
   set_fact:
+    # openshift_master_facts_default_predicates is a custom lookup plugin in
+    # role lib_utils
     openshift_master_scheduler_default_predicates: "{{ lookup('openshift_master_facts_default_predicates') }}"
     openshift_master_scheduler_default_priorities: "{{ lookup('openshift_master_facts_default_priorities') }}"
 

+ 0 - 21
roles/openshift_named_certificates/filter_plugins/openshift_named_certificates.py

@@ -1,21 +0,0 @@
-#!/usr/bin/python
-# -*- coding: utf-8 -*-
-'''
-Custom filters for use with openshift named certificates
-'''
-
-
-class FilterModule(object):
-    ''' Custom ansible filters for use with openshift named certificates'''
-
-    @staticmethod
-    def oo_named_certificates_list(named_certificates):
-        ''' Returns named certificates list with correct fields for the master
-            config file.'''
-        return [{'certFile': named_certificate['certfile'],
-                 'keyFile': named_certificate['keyfile'],
-                 'names': named_certificate['names']} for named_certificate in named_certificates]
-
-    def filters(self):
-        ''' returns a mapping of filters to methods '''
-        return {"oo_named_certificates_list": self.oo_named_certificates_list}

+ 2 - 1
roles/openshift_persistent_volumes/tasks/main.yml

@@ -26,7 +26,8 @@
   when: openshift_hosted_registry_storage_glusterfs_swap | default(False)
 
 - name: create standard pv and pvc lists
-  # generate_pv_pvcs_list is a custom action module defined in ../action_plugins
+  # generate_pv_pvcs_list is a custom action module defined in
+  # roles/lib_utils/action_plugins/generate_pv_pvcs_list.py
   generate_pv_pvcs_list: {}
   register: l_pv_pvcs_list
 

+ 0 - 10
roles/openshift_sanitize_inventory/filter_plugins/openshift_sanitize_inventory.py

@@ -6,15 +6,6 @@
 import re
 
 
-# This should be removed after map_from_pairs is no longer used in __deprecations_logging.yml
-def map_from_pairs(source, delim="="):
-    ''' Returns a dict given the source and delim delimited '''
-    if source == '':
-        return dict()
-
-    return dict(item.split(delim) for item in source.split(","))
-
-
 def vars_with_pattern(source, pattern=""):
     ''' Returns a list of variables whose name matches the given pattern '''
     if source == '':
@@ -39,6 +30,5 @@ class FilterModule(object):
     def filters(self):
         ''' Returns the names of the filters provided by this class '''
         return {
-            'map_from_pairs': map_from_pairs,
             'vars_with_pattern': vars_with_pattern
         }

+ 0 - 23
roles/openshift_storage_glusterfs/filter_plugins/openshift_storage_glusterfs.py

@@ -1,23 +0,0 @@
-'''
- Openshift Storage GlusterFS class that provides useful filters used in GlusterFS
-'''
-
-
-def map_from_pairs(source, delim="="):
-    ''' Returns a dict given the source and delim delimited '''
-    if source == '':
-        return dict()
-
-    return dict(item.split(delim) for item in source.split(","))
-
-
-# pylint: disable=too-few-public-methods
-class FilterModule(object):
-    ''' OpenShift Storage GlusterFS Filters '''
-
-    # pylint: disable=no-self-use, too-few-public-methods
-    def filters(self):
-        ''' Returns the names of the filters provided by this class '''
-        return {
-            'map_from_pairs': map_from_pairs
-        }

+ 1 - 0
roles/openshift_storage_glusterfs/tasks/glusterfs_config.yml

@@ -4,6 +4,7 @@
     glusterfs_namespace: "{{ openshift_storage_glusterfs_namespace }}"
     glusterfs_is_native: "{{ openshift_storage_glusterfs_is_native | bool }}"
     glusterfs_name: "{{ openshift_storage_glusterfs_name }}"
+    # map_from_pairs is a custom filter plugin in role lib_utils
     glusterfs_nodeselector: "{{ openshift_storage_glusterfs_nodeselector | default(['storagenode', openshift_storage_glusterfs_name] | join('=')) | map_from_pairs }}"
     glusterfs_use_default_selector: "{{ openshift_storage_glusterfs_use_default_selector }}"
     glusterfs_storageclass: "{{ openshift_storage_glusterfs_storageclass }}"

+ 1 - 0
roles/openshift_storage_glusterfs/tasks/glusterfs_registry.yml

@@ -4,6 +4,7 @@
     glusterfs_namespace: "{{ openshift_storage_glusterfs_registry_namespace }}"
     glusterfs_is_native: "{{ openshift_storage_glusterfs_registry_is_native | bool }}"
     glusterfs_name: "{{ openshift_storage_glusterfs_registry_name }}"
+    # map_from_pairs is a custom filter plugin in role lib_utils
     glusterfs_nodeselector: "{{ openshift_storage_glusterfs_registry_nodeselector | default(['storagenode', openshift_storage_glusterfs_registry_name] | join('=')) | map_from_pairs }}"
     glusterfs_use_default_selector: "{{ openshift_storage_glusterfs_registry_use_default_selector }}"
     glusterfs_storageclass: "{{ openshift_storage_glusterfs_registry_storageclass }}"