oc_adm_policy_user.py 73 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923192419251926192719281929193019311932193319341935193619371938193919401941194219431944194519461947194819491950195119521953195419551956195719581959196019611962196319641965196619671968196919701971197219731974197519761977197819791980198119821983198419851986198719881989199019911992199319941995199619971998199920002001200220032004200520062007200820092010201120122013201420152016201720182019202020212022202320242025202620272028202920302031203220332034203520362037203820392040204120422043204420452046204720482049205020512052205320542055205620572058205920602061206220632064206520662067206820692070207120722073207420752076207720782079208020812082208320842085208620872088208920902091209220932094209520962097209820992100210121022103210421052106210721082109211021112112211321142115211621172118211921202121212221232124212521262127212821292130213121322133213421352136213721382139214021412142214321442145214621472148214921502151215221532154215521562157215821592160216121622163216421652166216721682169217021712172217321742175217621772178217921802181218221832184218521862187218821892190219121922193219421952196219721982199220022012202220322042205220622072208220922102211221222132214221522162217221822192220222122222223222422252226222722282229223022312232223322342235223622372238223922402241224222432244
  1. #!/usr/bin/env python
  2. # pylint: disable=missing-docstring
  3. # flake8: noqa: T001
  4. # ___ ___ _ _ ___ ___ _ _____ ___ ___
  5. # / __| __| \| | __| _ \ /_\_ _| __| \
  6. # | (_ | _|| .` | _|| / / _ \| | | _|| |) |
  7. # \___|___|_|\_|___|_|_\/_/_\_\_|_|___|___/_ _____
  8. # | \ / _ \ | \| |/ _ \_ _| | __| \_ _|_ _|
  9. # | |) | (_) | | .` | (_) || | | _|| |) | | | |
  10. # |___/ \___/ |_|\_|\___/ |_| |___|___/___| |_|
  11. #
  12. # Copyright 2016 Red Hat, Inc. and/or its affiliates
  13. # and other contributors as indicated by the @author tags.
  14. #
  15. # Licensed under the Apache License, Version 2.0 (the "License");
  16. # you may not use this file except in compliance with the License.
  17. # You may obtain a copy of the License at
  18. #
  19. # http://www.apache.org/licenses/LICENSE-2.0
  20. #
  21. # Unless required by applicable law or agreed to in writing, software
  22. # distributed under the License is distributed on an "AS IS" BASIS,
  23. # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  24. # See the License for the specific language governing permissions and
  25. # limitations under the License.
  26. #
  27. # -*- -*- -*- Begin included fragment: lib/import.py -*- -*- -*-
  28. '''
  29. OpenShiftCLI class that wraps the oc commands in a subprocess
  30. '''
  31. # pylint: disable=too-many-lines
  32. from __future__ import print_function
  33. import atexit
  34. import copy
  35. import fcntl
  36. import json
  37. import time
  38. import os
  39. import re
  40. import shutil
  41. import subprocess
  42. import tempfile
  43. # pylint: disable=import-error
  44. try:
  45. import ruamel.yaml as yaml
  46. except ImportError:
  47. import yaml
  48. from ansible.module_utils.basic import AnsibleModule
  49. # -*- -*- -*- End included fragment: lib/import.py -*- -*- -*-
  50. # -*- -*- -*- Begin included fragment: doc/policy_user -*- -*- -*-
  51. DOCUMENTATION = '''
  52. ---
  53. module: oc_adm_policy_user
  54. short_description: Module to manage openshift policy for users
  55. description:
  56. - Manage openshift policy for users.
  57. options:
  58. kubeconfig:
  59. description:
  60. - The path for the kubeconfig file to use for authentication
  61. required: false
  62. default: /etc/origin/master/admin.kubeconfig
  63. aliases: []
  64. namespace:
  65. description:
  66. - The namespace scope
  67. required: false
  68. default: None
  69. aliases: []
  70. role_namespace:
  71. description:
  72. - The namespace where to find the role
  73. required: false
  74. default: None
  75. aliases: []
  76. debug:
  77. description:
  78. - Turn on debug output.
  79. required: false
  80. default: False
  81. aliases: []
  82. user:
  83. description:
  84. - The name of the user
  85. required: true
  86. default: None
  87. aliases: []
  88. resource_kind:
  89. description:
  90. - The kind of policy to affect
  91. required: true
  92. default: None
  93. choices: ["role", "cluster-role", "scc"]
  94. aliases: []
  95. resource_name:
  96. description:
  97. - The name of the policy
  98. required: true
  99. default: None
  100. aliases: []
  101. state:
  102. description:
  103. - Desired state of the policy
  104. required: true
  105. default: present
  106. choices: ["present", "absent"]
  107. aliases: []
  108. author:
  109. - "Kenny Woodson <kwoodson@redhat.com>"
  110. extends_documentation_fragment: []
  111. '''
  112. EXAMPLES = '''
  113. - name: oc adm policy remove-scc-from-user an-scc ausername
  114. oc_adm_policy_user:
  115. user: ausername
  116. resource_kind: scc
  117. resource_name: an-scc
  118. state: absent
  119. - name: oc adm policy add-cluster-role-to-user system:build-strategy-docker ausername
  120. oc_adm_policy_user:
  121. user: ausername
  122. resource_kind: cluster-role
  123. resource_name: system:build-strategy-docker
  124. state: present
  125. - name: oc adm policy add-role-to-user system:build-strategy-docker ausername --role-namespace foo
  126. oc_adm_policy_user:
  127. user: ausername
  128. resource_kind: cluster-role
  129. resource_name: system:build-strategy-docker
  130. state: present
  131. role_namespace: foo
  132. '''
  133. # -*- -*- -*- End included fragment: doc/policy_user -*- -*- -*-
  134. # -*- -*- -*- Begin included fragment: ../../lib_utils/src/class/yedit.py -*- -*- -*-
  135. class YeditException(Exception): # pragma: no cover
  136. ''' Exception class for Yedit '''
  137. pass
  138. # pylint: disable=too-many-public-methods
  139. class Yedit(object): # pragma: no cover
  140. ''' Class to modify yaml files '''
  141. re_valid_key = r"(((\[-?\d+\])|([0-9a-zA-Z%s/_-]+)).?)+$"
  142. re_key = r"(?:\[(-?\d+)\])|([0-9a-zA-Z{}/_-]+)"
  143. com_sep = set(['.', '#', '|', ':'])
  144. # pylint: disable=too-many-arguments
  145. def __init__(self,
  146. filename=None,
  147. content=None,
  148. content_type='yaml',
  149. separator='.',
  150. backup=False):
  151. self.content = content
  152. self._separator = separator
  153. self.filename = filename
  154. self.__yaml_dict = content
  155. self.content_type = content_type
  156. self.backup = backup
  157. self.load(content_type=self.content_type)
  158. if self.__yaml_dict is None:
  159. self.__yaml_dict = {}
  160. @property
  161. def separator(self):
  162. ''' getter method for separator '''
  163. return self._separator
  164. @separator.setter
  165. def separator(self, inc_sep):
  166. ''' setter method for separator '''
  167. self._separator = inc_sep
  168. @property
  169. def yaml_dict(self):
  170. ''' getter method for yaml_dict '''
  171. return self.__yaml_dict
  172. @yaml_dict.setter
  173. def yaml_dict(self, value):
  174. ''' setter method for yaml_dict '''
  175. self.__yaml_dict = value
  176. @staticmethod
  177. def parse_key(key, sep='.'):
  178. '''parse the key allowing the appropriate separator'''
  179. common_separators = list(Yedit.com_sep - set([sep]))
  180. return re.findall(Yedit.re_key.format(''.join(common_separators)), key)
  181. @staticmethod
  182. def valid_key(key, sep='.'):
  183. '''validate the incoming key'''
  184. common_separators = list(Yedit.com_sep - set([sep]))
  185. if not re.match(Yedit.re_valid_key.format(''.join(common_separators)), key):
  186. return False
  187. return True
  188. # pylint: disable=too-many-return-statements,too-many-branches
  189. @staticmethod
  190. def remove_entry(data, key, index=None, value=None, sep='.'):
  191. ''' remove data at location key '''
  192. if key == '' and isinstance(data, dict):
  193. if value is not None:
  194. data.pop(value)
  195. elif index is not None:
  196. raise YeditException("remove_entry for a dictionary does not have an index {}".format(index))
  197. else:
  198. data.clear()
  199. return True
  200. elif key == '' and isinstance(data, list):
  201. ind = None
  202. if value is not None:
  203. try:
  204. ind = data.index(value)
  205. except ValueError:
  206. return False
  207. elif index is not None:
  208. ind = index
  209. else:
  210. del data[:]
  211. if ind is not None:
  212. data.pop(ind)
  213. return True
  214. if not (key and Yedit.valid_key(key, sep)) and \
  215. isinstance(data, (list, dict)):
  216. return None
  217. key_indexes = Yedit.parse_key(key, sep)
  218. for arr_ind, dict_key in key_indexes[:-1]:
  219. if dict_key and isinstance(data, dict):
  220. data = data.get(dict_key)
  221. elif (arr_ind and isinstance(data, list) and
  222. int(arr_ind) <= len(data) - 1):
  223. data = data[int(arr_ind)]
  224. else:
  225. return None
  226. # process last index for remove
  227. # expected list entry
  228. if key_indexes[-1][0]:
  229. if isinstance(data, list) and int(key_indexes[-1][0]) <= len(data) - 1: # noqa: E501
  230. del data[int(key_indexes[-1][0])]
  231. return True
  232. # expected dict entry
  233. elif key_indexes[-1][1]:
  234. if isinstance(data, dict):
  235. del data[key_indexes[-1][1]]
  236. return True
  237. @staticmethod
  238. def add_entry(data, key, item=None, sep='.'):
  239. ''' Get an item from a dictionary with key notation a.b.c
  240. d = {'a': {'b': 'c'}}}
  241. key = a#b
  242. return c
  243. '''
  244. if key == '':
  245. pass
  246. elif (not (key and Yedit.valid_key(key, sep)) and
  247. isinstance(data, (list, dict))):
  248. return None
  249. key_indexes = Yedit.parse_key(key, sep)
  250. for arr_ind, dict_key in key_indexes[:-1]:
  251. if dict_key:
  252. if isinstance(data, dict) and dict_key in data and data[dict_key]: # noqa: E501
  253. data = data[dict_key]
  254. continue
  255. elif data and not isinstance(data, dict):
  256. raise YeditException("Unexpected item type found while going through key " +
  257. "path: {} (at key: {})".format(key, dict_key))
  258. data[dict_key] = {}
  259. data = data[dict_key]
  260. elif (arr_ind and isinstance(data, list) and
  261. int(arr_ind) <= len(data) - 1):
  262. data = data[int(arr_ind)]
  263. else:
  264. raise YeditException("Unexpected item type found while going through key path: {}".format(key))
  265. if key == '':
  266. data = item
  267. # process last index for add
  268. # expected list entry
  269. elif key_indexes[-1][0] and isinstance(data, list) and int(key_indexes[-1][0]) <= len(data) - 1: # noqa: E501
  270. data[int(key_indexes[-1][0])] = item
  271. # expected dict entry
  272. elif key_indexes[-1][1] and isinstance(data, dict):
  273. data[key_indexes[-1][1]] = item
  274. # didn't add/update to an existing list, nor add/update key to a dict
  275. # so we must have been provided some syntax like a.b.c[<int>] = "data" for a
  276. # non-existent array
  277. else:
  278. raise YeditException("Error adding to object at path: {}".format(key))
  279. return data
  280. @staticmethod
  281. def get_entry(data, key, sep='.'):
  282. ''' Get an item from a dictionary with key notation a.b.c
  283. d = {'a': {'b': 'c'}}}
  284. key = a.b
  285. return c
  286. '''
  287. if key == '':
  288. pass
  289. elif (not (key and Yedit.valid_key(key, sep)) and
  290. isinstance(data, (list, dict))):
  291. return None
  292. key_indexes = Yedit.parse_key(key, sep)
  293. for arr_ind, dict_key in key_indexes:
  294. if dict_key and isinstance(data, dict):
  295. data = data.get(dict_key)
  296. elif (arr_ind and isinstance(data, list) and
  297. int(arr_ind) <= len(data) - 1):
  298. data = data[int(arr_ind)]
  299. else:
  300. return None
  301. return data
  302. @staticmethod
  303. def _write(filename, contents):
  304. ''' Actually write the file contents to disk. This helps with mocking. '''
  305. tmp_filename = filename + '.yedit'
  306. with open(tmp_filename, 'w') as yfd:
  307. fcntl.flock(yfd, fcntl.LOCK_EX | fcntl.LOCK_NB)
  308. yfd.write(contents)
  309. fcntl.flock(yfd, fcntl.LOCK_UN)
  310. os.rename(tmp_filename, filename)
  311. def write(self):
  312. ''' write to file '''
  313. if not self.filename:
  314. raise YeditException('Please specify a filename.')
  315. if self.backup and self.file_exists():
  316. shutil.copy(self.filename, '{}.{}'.format(self.filename, time.strftime("%Y%m%dT%H%M%S")))
  317. # Try to set format attributes if supported
  318. try:
  319. self.yaml_dict.fa.set_block_style()
  320. except AttributeError:
  321. pass
  322. # Try to use RoundTripDumper if supported.
  323. if self.content_type == 'yaml':
  324. try:
  325. Yedit._write(self.filename, yaml.dump(self.yaml_dict, Dumper=yaml.RoundTripDumper))
  326. except AttributeError:
  327. Yedit._write(self.filename, yaml.safe_dump(self.yaml_dict, default_flow_style=False))
  328. elif self.content_type == 'json':
  329. Yedit._write(self.filename, json.dumps(self.yaml_dict, indent=4, sort_keys=True))
  330. else:
  331. raise YeditException('Unsupported content_type: {}.'.format(self.content_type) +
  332. 'Please specify a content_type of yaml or json.')
  333. return (True, self.yaml_dict)
  334. def read(self):
  335. ''' read from file '''
  336. # check if it exists
  337. if self.filename is None or not self.file_exists():
  338. return None
  339. contents = None
  340. with open(self.filename) as yfd:
  341. contents = yfd.read()
  342. return contents
  343. def file_exists(self):
  344. ''' return whether file exists '''
  345. if os.path.exists(self.filename):
  346. return True
  347. return False
  348. def load(self, content_type='yaml'):
  349. ''' return yaml file '''
  350. contents = self.read()
  351. if not contents and not self.content:
  352. return None
  353. if self.content:
  354. if isinstance(self.content, dict):
  355. self.yaml_dict = self.content
  356. return self.yaml_dict
  357. elif isinstance(self.content, str):
  358. contents = self.content
  359. # check if it is yaml
  360. try:
  361. if content_type == 'yaml' and contents:
  362. # Try to set format attributes if supported
  363. try:
  364. self.yaml_dict.fa.set_block_style()
  365. except AttributeError:
  366. pass
  367. # Try to use RoundTripLoader if supported.
  368. try:
  369. self.yaml_dict = yaml.load(contents, yaml.RoundTripLoader)
  370. except AttributeError:
  371. self.yaml_dict = yaml.safe_load(contents)
  372. # Try to set format attributes if supported
  373. try:
  374. self.yaml_dict.fa.set_block_style()
  375. except AttributeError:
  376. pass
  377. elif content_type == 'json' and contents:
  378. self.yaml_dict = json.loads(contents)
  379. except yaml.YAMLError as err:
  380. # Error loading yaml or json
  381. raise YeditException('Problem with loading yaml file. {}'.format(err))
  382. return self.yaml_dict
  383. def get(self, key):
  384. ''' get a specified key'''
  385. try:
  386. entry = Yedit.get_entry(self.yaml_dict, key, self.separator)
  387. except KeyError:
  388. entry = None
  389. return entry
  390. def pop(self, path, key_or_item):
  391. ''' remove a key, value pair from a dict or an item for a list'''
  392. try:
  393. entry = Yedit.get_entry(self.yaml_dict, path, self.separator)
  394. except KeyError:
  395. entry = None
  396. if entry is None:
  397. return (False, self.yaml_dict)
  398. if isinstance(entry, dict):
  399. # AUDIT:maybe-no-member makes sense due to fuzzy types
  400. # pylint: disable=maybe-no-member
  401. if key_or_item in entry:
  402. entry.pop(key_or_item)
  403. return (True, self.yaml_dict)
  404. return (False, self.yaml_dict)
  405. elif isinstance(entry, list):
  406. # AUDIT:maybe-no-member makes sense due to fuzzy types
  407. # pylint: disable=maybe-no-member
  408. ind = None
  409. try:
  410. ind = entry.index(key_or_item)
  411. except ValueError:
  412. return (False, self.yaml_dict)
  413. entry.pop(ind)
  414. return (True, self.yaml_dict)
  415. return (False, self.yaml_dict)
  416. def delete(self, path, index=None, value=None):
  417. ''' remove path from a dict'''
  418. try:
  419. entry = Yedit.get_entry(self.yaml_dict, path, self.separator)
  420. except KeyError:
  421. entry = None
  422. if entry is None:
  423. return (False, self.yaml_dict)
  424. result = Yedit.remove_entry(self.yaml_dict, path, index, value, self.separator)
  425. if not result:
  426. return (False, self.yaml_dict)
  427. return (True, self.yaml_dict)
  428. def exists(self, path, value):
  429. ''' check if value exists at path'''
  430. try:
  431. entry = Yedit.get_entry(self.yaml_dict, path, self.separator)
  432. except KeyError:
  433. entry = None
  434. if isinstance(entry, list):
  435. if value in entry:
  436. return True
  437. return False
  438. elif isinstance(entry, dict):
  439. if isinstance(value, dict):
  440. rval = False
  441. for key, val in value.items():
  442. if entry[key] != val:
  443. rval = False
  444. break
  445. else:
  446. rval = True
  447. return rval
  448. return value in entry
  449. return entry == value
  450. def append(self, path, value):
  451. '''append value to a list'''
  452. try:
  453. entry = Yedit.get_entry(self.yaml_dict, path, self.separator)
  454. except KeyError:
  455. entry = None
  456. if entry is None:
  457. self.put(path, [])
  458. entry = Yedit.get_entry(self.yaml_dict, path, self.separator)
  459. if not isinstance(entry, list):
  460. return (False, self.yaml_dict)
  461. # AUDIT:maybe-no-member makes sense due to loading data from
  462. # a serialized format.
  463. # pylint: disable=maybe-no-member
  464. entry.append(value)
  465. return (True, self.yaml_dict)
  466. # pylint: disable=too-many-arguments
  467. def update(self, path, value, index=None, curr_value=None):
  468. ''' put path, value into a dict '''
  469. try:
  470. entry = Yedit.get_entry(self.yaml_dict, path, self.separator)
  471. except KeyError:
  472. entry = None
  473. if isinstance(entry, dict):
  474. # AUDIT:maybe-no-member makes sense due to fuzzy types
  475. # pylint: disable=maybe-no-member
  476. if not isinstance(value, dict):
  477. raise YeditException('Cannot replace key, value entry in dict with non-dict type. ' +
  478. 'value=[{}] type=[{}]'.format(value, type(value)))
  479. entry.update(value)
  480. return (True, self.yaml_dict)
  481. elif isinstance(entry, list):
  482. # AUDIT:maybe-no-member makes sense due to fuzzy types
  483. # pylint: disable=maybe-no-member
  484. ind = None
  485. if curr_value:
  486. try:
  487. ind = entry.index(curr_value)
  488. except ValueError:
  489. return (False, self.yaml_dict)
  490. elif index is not None:
  491. ind = index
  492. if ind is not None and entry[ind] != value:
  493. entry[ind] = value
  494. return (True, self.yaml_dict)
  495. # see if it exists in the list
  496. try:
  497. ind = entry.index(value)
  498. except ValueError:
  499. # doesn't exist, append it
  500. entry.append(value)
  501. return (True, self.yaml_dict)
  502. # already exists, return
  503. if ind is not None:
  504. return (False, self.yaml_dict)
  505. return (False, self.yaml_dict)
  506. def put(self, path, value):
  507. ''' put path, value into a dict '''
  508. try:
  509. entry = Yedit.get_entry(self.yaml_dict, path, self.separator)
  510. except KeyError:
  511. entry = None
  512. if entry == value:
  513. return (False, self.yaml_dict)
  514. # deepcopy didn't work
  515. # Try to use ruamel.yaml and fallback to pyyaml
  516. try:
  517. tmp_copy = yaml.load(yaml.round_trip_dump(self.yaml_dict,
  518. default_flow_style=False),
  519. yaml.RoundTripLoader)
  520. except AttributeError:
  521. tmp_copy = copy.deepcopy(self.yaml_dict)
  522. # set the format attributes if available
  523. try:
  524. tmp_copy.fa.set_block_style()
  525. except AttributeError:
  526. pass
  527. result = Yedit.add_entry(tmp_copy, path, value, self.separator)
  528. if result is None:
  529. return (False, self.yaml_dict)
  530. # When path equals "" it is a special case.
  531. # "" refers to the root of the document
  532. # Only update the root path (entire document) when its a list or dict
  533. if path == '':
  534. if isinstance(result, list) or isinstance(result, dict):
  535. self.yaml_dict = result
  536. return (True, self.yaml_dict)
  537. return (False, self.yaml_dict)
  538. self.yaml_dict = tmp_copy
  539. return (True, self.yaml_dict)
  540. def create(self, path, value):
  541. ''' create a yaml file '''
  542. if not self.file_exists():
  543. # deepcopy didn't work
  544. # Try to use ruamel.yaml and fallback to pyyaml
  545. try:
  546. tmp_copy = yaml.load(yaml.round_trip_dump(self.yaml_dict,
  547. default_flow_style=False),
  548. yaml.RoundTripLoader)
  549. except AttributeError:
  550. tmp_copy = copy.deepcopy(self.yaml_dict)
  551. # set the format attributes if available
  552. try:
  553. tmp_copy.fa.set_block_style()
  554. except AttributeError:
  555. pass
  556. result = Yedit.add_entry(tmp_copy, path, value, self.separator)
  557. if result is not None:
  558. self.yaml_dict = tmp_copy
  559. return (True, self.yaml_dict)
  560. return (False, self.yaml_dict)
  561. @staticmethod
  562. def get_curr_value(invalue, val_type):
  563. '''return the current value'''
  564. if invalue is None:
  565. return None
  566. curr_value = invalue
  567. if val_type == 'yaml':
  568. try:
  569. # AUDIT:maybe-no-member makes sense due to different yaml libraries
  570. # pylint: disable=maybe-no-member
  571. curr_value = yaml.safe_load(invalue, Loader=yaml.RoundTripLoader)
  572. except AttributeError:
  573. curr_value = yaml.safe_load(invalue)
  574. elif val_type == 'json':
  575. curr_value = json.loads(invalue)
  576. return curr_value
  577. @staticmethod
  578. def parse_value(inc_value, vtype=''):
  579. '''determine value type passed'''
  580. true_bools = ['y', 'Y', 'yes', 'Yes', 'YES', 'true', 'True', 'TRUE',
  581. 'on', 'On', 'ON', ]
  582. false_bools = ['n', 'N', 'no', 'No', 'NO', 'false', 'False', 'FALSE',
  583. 'off', 'Off', 'OFF']
  584. # It came in as a string but you didn't specify value_type as string
  585. # we will convert to bool if it matches any of the above cases
  586. if isinstance(inc_value, str) and 'bool' in vtype:
  587. if inc_value not in true_bools and inc_value not in false_bools:
  588. raise YeditException('Not a boolean type. str=[{}] vtype=[{}]'.format(inc_value, vtype))
  589. elif isinstance(inc_value, bool) and 'str' in vtype:
  590. inc_value = str(inc_value)
  591. # There is a special case where '' will turn into None after yaml loading it so skip
  592. if isinstance(inc_value, str) and inc_value == '':
  593. pass
  594. # If vtype is not str then go ahead and attempt to yaml load it.
  595. elif isinstance(inc_value, str) and 'str' not in vtype:
  596. try:
  597. inc_value = yaml.safe_load(inc_value)
  598. except Exception:
  599. raise YeditException('Could not determine type of incoming value. ' +
  600. 'value=[{}] vtype=[{}]'.format(type(inc_value), vtype))
  601. return inc_value
  602. @staticmethod
  603. def process_edits(edits, yamlfile):
  604. '''run through a list of edits and process them one-by-one'''
  605. results = []
  606. for edit in edits:
  607. value = Yedit.parse_value(edit['value'], edit.get('value_type', ''))
  608. if edit.get('action') == 'update':
  609. # pylint: disable=line-too-long
  610. curr_value = Yedit.get_curr_value(
  611. Yedit.parse_value(edit.get('curr_value')),
  612. edit.get('curr_value_format'))
  613. rval = yamlfile.update(edit['key'],
  614. value,
  615. edit.get('index'),
  616. curr_value)
  617. elif edit.get('action') == 'append':
  618. rval = yamlfile.append(edit['key'], value)
  619. else:
  620. rval = yamlfile.put(edit['key'], value)
  621. if rval[0]:
  622. results.append({'key': edit['key'], 'edit': rval[1]})
  623. return {'changed': len(results) > 0, 'results': results}
  624. # pylint: disable=too-many-return-statements,too-many-branches
  625. @staticmethod
  626. def run_ansible(params):
  627. '''perform the idempotent crud operations'''
  628. yamlfile = Yedit(filename=params['src'],
  629. backup=params['backup'],
  630. content_type=params['content_type'],
  631. separator=params['separator'])
  632. state = params['state']
  633. if params['src']:
  634. rval = yamlfile.load()
  635. if yamlfile.yaml_dict is None and state != 'present':
  636. return {'failed': True,
  637. 'msg': 'Error opening file [{}]. Verify that the '.format(params['src']) +
  638. 'file exists, that it is has correct permissions, and is valid yaml.'}
  639. if state == 'list':
  640. if params['content']:
  641. content = Yedit.parse_value(params['content'], params['content_type'])
  642. yamlfile.yaml_dict = content
  643. if params['key']:
  644. rval = yamlfile.get(params['key'])
  645. return {'changed': False, 'result': rval, 'state': state}
  646. elif state == 'absent':
  647. if params['content']:
  648. content = Yedit.parse_value(params['content'], params['content_type'])
  649. yamlfile.yaml_dict = content
  650. if params['update']:
  651. rval = yamlfile.pop(params['key'], params['value'])
  652. else:
  653. rval = yamlfile.delete(params['key'], params['index'], params['value'])
  654. if rval[0] and params['src']:
  655. yamlfile.write()
  656. return {'changed': rval[0], 'result': rval[1], 'state': state}
  657. elif state == 'present':
  658. # check if content is different than what is in the file
  659. if params['content']:
  660. content = Yedit.parse_value(params['content'], params['content_type'])
  661. # We had no edits to make and the contents are the same
  662. if yamlfile.yaml_dict == content and \
  663. params['value'] is None:
  664. return {'changed': False, 'result': yamlfile.yaml_dict, 'state': state}
  665. yamlfile.yaml_dict = content
  666. # If we were passed a key, value then
  667. # we enapsulate it in a list and process it
  668. # Key, Value passed to the module : Converted to Edits list #
  669. edits = []
  670. _edit = {}
  671. if params['value'] is not None:
  672. _edit['value'] = params['value']
  673. _edit['value_type'] = params['value_type']
  674. _edit['key'] = params['key']
  675. if params['update']:
  676. _edit['action'] = 'update'
  677. _edit['curr_value'] = params['curr_value']
  678. _edit['curr_value_format'] = params['curr_value_format']
  679. _edit['index'] = params['index']
  680. elif params['append']:
  681. _edit['action'] = 'append'
  682. edits.append(_edit)
  683. elif params['edits'] is not None:
  684. edits = params['edits']
  685. if edits:
  686. results = Yedit.process_edits(edits, yamlfile)
  687. # if there were changes and a src provided to us we need to write
  688. if results['changed'] and params['src']:
  689. yamlfile.write()
  690. return {'changed': results['changed'], 'result': results['results'], 'state': state}
  691. # no edits to make
  692. if params['src']:
  693. # pylint: disable=redefined-variable-type
  694. rval = yamlfile.write()
  695. return {'changed': rval[0],
  696. 'result': rval[1],
  697. 'state': state}
  698. # We were passed content but no src, key or value, or edits. Return contents in memory
  699. return {'changed': False, 'result': yamlfile.yaml_dict, 'state': state}
  700. return {'failed': True, 'msg': 'Unkown state passed'}
  701. # -*- -*- -*- End included fragment: ../../lib_utils/src/class/yedit.py -*- -*- -*-
  702. # -*- -*- -*- Begin included fragment: lib/base.py -*- -*- -*-
  703. # pylint: disable=too-many-lines
  704. # noqa: E301,E302,E303,T001
  705. class OpenShiftCLIError(Exception):
  706. '''Exception class for openshiftcli'''
  707. pass
  708. ADDITIONAL_PATH_LOOKUPS = ['/usr/local/bin', os.path.expanduser('~/bin')]
  709. def locate_oc_binary():
  710. ''' Find and return oc binary file '''
  711. # https://github.com/openshift/openshift-ansible/issues/3410
  712. # oc can be in /usr/local/bin in some cases, but that may not
  713. # be in $PATH due to ansible/sudo
  714. paths = os.environ.get("PATH", os.defpath).split(os.pathsep) + ADDITIONAL_PATH_LOOKUPS
  715. oc_binary = 'oc'
  716. # Use shutil.which if it is available, otherwise fallback to a naive path search
  717. try:
  718. which_result = shutil.which(oc_binary, path=os.pathsep.join(paths))
  719. if which_result is not None:
  720. oc_binary = which_result
  721. except AttributeError:
  722. for path in paths:
  723. if os.path.exists(os.path.join(path, oc_binary)):
  724. oc_binary = os.path.join(path, oc_binary)
  725. break
  726. return oc_binary
  727. # pylint: disable=too-few-public-methods
  728. class OpenShiftCLI(object):
  729. ''' Class to wrap the command line tools '''
  730. def __init__(self,
  731. namespace,
  732. kubeconfig='/etc/origin/master/admin.kubeconfig',
  733. verbose=False,
  734. all_namespaces=False):
  735. ''' Constructor for OpenshiftCLI '''
  736. self.namespace = namespace
  737. self.verbose = verbose
  738. self.kubeconfig = Utils.create_tmpfile_copy(kubeconfig)
  739. self.all_namespaces = all_namespaces
  740. self.oc_binary = locate_oc_binary()
  741. # Pylint allows only 5 arguments to be passed.
  742. # pylint: disable=too-many-arguments
  743. def _replace_content(self, resource, rname, content, edits=None, force=False, sep='.'):
  744. ''' replace the current object with the content '''
  745. res = self._get(resource, rname)
  746. if not res['results']:
  747. return res
  748. fname = Utils.create_tmpfile(rname + '-')
  749. yed = Yedit(fname, res['results'][0], separator=sep)
  750. updated = False
  751. if content is not None:
  752. changes = []
  753. for key, value in content.items():
  754. changes.append(yed.put(key, value))
  755. if any([change[0] for change in changes]):
  756. updated = True
  757. elif edits is not None:
  758. results = Yedit.process_edits(edits, yed)
  759. if results['changed']:
  760. updated = True
  761. if updated:
  762. yed.write()
  763. atexit.register(Utils.cleanup, [fname])
  764. return self._replace(fname, force)
  765. return {'returncode': 0, 'updated': False}
  766. def _replace(self, fname, force=False):
  767. '''replace the current object with oc replace'''
  768. # We are removing the 'resourceVersion' to handle
  769. # a race condition when modifying oc objects
  770. yed = Yedit(fname)
  771. results = yed.delete('metadata.resourceVersion')
  772. if results[0]:
  773. yed.write()
  774. cmd = ['replace', '-f', fname]
  775. if force:
  776. cmd.append('--force')
  777. return self.openshift_cmd(cmd)
  778. def _create_from_content(self, rname, content):
  779. '''create a temporary file and then call oc create on it'''
  780. fname = Utils.create_tmpfile(rname + '-')
  781. yed = Yedit(fname, content=content)
  782. yed.write()
  783. atexit.register(Utils.cleanup, [fname])
  784. return self._create(fname)
  785. def _create(self, fname):
  786. '''call oc create on a filename'''
  787. return self.openshift_cmd(['create', '-f', fname])
  788. def _delete(self, resource, name=None, selector=None):
  789. '''call oc delete on a resource'''
  790. cmd = ['delete', resource]
  791. if selector is not None:
  792. cmd.append('--selector={}'.format(selector))
  793. elif name is not None:
  794. cmd.append(name)
  795. else:
  796. raise OpenShiftCLIError('Either name or selector is required when calling delete.')
  797. return self.openshift_cmd(cmd)
  798. def _process(self, template_name, create=False, params=None, template_data=None): # noqa: E501
  799. '''process a template
  800. template_name: the name of the template to process
  801. create: whether to send to oc create after processing
  802. params: the parameters for the template
  803. template_data: the incoming template's data; instead of a file
  804. '''
  805. cmd = ['process']
  806. if template_data:
  807. cmd.extend(['-f', '-'])
  808. else:
  809. cmd.append(template_name)
  810. if params:
  811. param_str = ["{}={}".format(key, str(value).replace("'", r'"')) for key, value in params.items()]
  812. cmd.append('-v')
  813. cmd.extend(param_str)
  814. results = self.openshift_cmd(cmd, output=True, input_data=template_data)
  815. if results['returncode'] != 0 or not create:
  816. return results
  817. fname = Utils.create_tmpfile(template_name + '-')
  818. yed = Yedit(fname, results['results'])
  819. yed.write()
  820. atexit.register(Utils.cleanup, [fname])
  821. return self.openshift_cmd(['create', '-f', fname])
  822. def _get(self, resource, name=None, selector=None, field_selector=None):
  823. '''return a resource by name '''
  824. cmd = ['get', resource]
  825. if selector is not None:
  826. cmd.append('--selector={}'.format(selector))
  827. if field_selector is not None:
  828. cmd.append('--field-selector={}'.format(field_selector))
  829. # Name cannot be used with selector or field_selector.
  830. if selector is None and field_selector is None and name is not None:
  831. cmd.append(name)
  832. cmd.extend(['-o', 'json'])
  833. rval = self.openshift_cmd(cmd, output=True)
  834. # Ensure results are retuned in an array
  835. if 'items' in rval:
  836. rval['results'] = rval['items']
  837. elif not isinstance(rval['results'], list):
  838. rval['results'] = [rval['results']]
  839. return rval
  840. def _schedulable(self, node=None, selector=None, schedulable=True):
  841. ''' perform oadm manage-node scheduable '''
  842. cmd = ['manage-node']
  843. if node:
  844. cmd.extend(node)
  845. else:
  846. cmd.append('--selector={}'.format(selector))
  847. cmd.append('--schedulable={}'.format(schedulable))
  848. return self.openshift_cmd(cmd, oadm=True, output=True, output_type='raw') # noqa: E501
  849. def _list_pods(self, node=None, selector=None, pod_selector=None):
  850. ''' perform oadm list pods
  851. node: the node in which to list pods
  852. selector: the label selector filter if provided
  853. pod_selector: the pod selector filter if provided
  854. '''
  855. cmd = ['manage-node']
  856. if node:
  857. cmd.extend(node)
  858. else:
  859. cmd.append('--selector={}'.format(selector))
  860. if pod_selector:
  861. cmd.append('--pod-selector={}'.format(pod_selector))
  862. cmd.extend(['--list-pods', '-o', 'json'])
  863. return self.openshift_cmd(cmd, oadm=True, output=True, output_type='raw')
  864. # pylint: disable=too-many-arguments
  865. def _evacuate(self, node=None, selector=None, pod_selector=None, dry_run=False, grace_period=None, force=False):
  866. ''' perform oadm manage-node evacuate '''
  867. cmd = ['manage-node']
  868. if node:
  869. cmd.extend(node)
  870. else:
  871. cmd.append('--selector={}'.format(selector))
  872. if dry_run:
  873. cmd.append('--dry-run')
  874. if pod_selector:
  875. cmd.append('--pod-selector={}'.format(pod_selector))
  876. if grace_period:
  877. cmd.append('--grace-period={}'.format(int(grace_period)))
  878. if force:
  879. cmd.append('--force')
  880. cmd.append('--evacuate')
  881. return self.openshift_cmd(cmd, oadm=True, output=True, output_type='raw')
  882. def _version(self):
  883. ''' return the openshift version'''
  884. return self.openshift_cmd(['version'], output=True, output_type='raw')
  885. def _import_image(self, url=None, name=None, tag=None):
  886. ''' perform image import '''
  887. cmd = ['import-image']
  888. image = '{0}'.format(name)
  889. if tag:
  890. image += ':{0}'.format(tag)
  891. cmd.append(image)
  892. if url:
  893. cmd.append('--from={0}/{1}'.format(url, image))
  894. cmd.append('-n{0}'.format(self.namespace))
  895. cmd.append('--confirm')
  896. return self.openshift_cmd(cmd)
  897. def _run(self, cmds, input_data):
  898. ''' Actually executes the command. This makes mocking easier. '''
  899. curr_env = os.environ.copy()
  900. curr_env.update({'KUBECONFIG': self.kubeconfig})
  901. proc = subprocess.Popen(cmds,
  902. stdin=subprocess.PIPE,
  903. stdout=subprocess.PIPE,
  904. stderr=subprocess.PIPE,
  905. env=curr_env)
  906. stdout, stderr = proc.communicate(input_data)
  907. return proc.returncode, stdout.decode('utf-8'), stderr.decode('utf-8')
  908. # pylint: disable=too-many-arguments,too-many-branches
  909. def openshift_cmd(self, cmd, oadm=False, output=False, output_type='json', input_data=None):
  910. '''Base command for oc '''
  911. cmds = [self.oc_binary]
  912. if oadm:
  913. cmds.append('adm')
  914. cmds.extend(cmd)
  915. if self.all_namespaces:
  916. cmds.extend(['--all-namespaces'])
  917. elif self.namespace is not None and self.namespace.lower() not in ['none', 'emtpy']: # E501
  918. cmds.extend(['-n', self.namespace])
  919. if self.verbose:
  920. print(' '.join(cmds))
  921. try:
  922. returncode, stdout, stderr = self._run(cmds, input_data)
  923. except OSError as ex:
  924. returncode, stdout, stderr = 1, '', 'Failed to execute {}: {}'.format(subprocess.list2cmdline(cmds), ex)
  925. rval = {"returncode": returncode,
  926. "cmd": ' '.join(cmds)}
  927. if output_type == 'json':
  928. rval['results'] = {}
  929. if output and stdout:
  930. try:
  931. rval['results'] = json.loads(stdout)
  932. except ValueError as verr:
  933. if "No JSON object could be decoded" in verr.args:
  934. rval['err'] = verr.args
  935. elif output_type == 'raw':
  936. rval['results'] = stdout if output else ''
  937. if self.verbose:
  938. print("STDOUT: {0}".format(stdout))
  939. print("STDERR: {0}".format(stderr))
  940. if 'err' in rval or returncode != 0:
  941. rval.update({"stderr": stderr,
  942. "stdout": stdout})
  943. return rval
  944. class Utils(object): # pragma: no cover
  945. ''' utilities for openshiftcli modules '''
  946. @staticmethod
  947. def _write(filename, contents):
  948. ''' Actually write the file contents to disk. This helps with mocking. '''
  949. with open(filename, 'w') as sfd:
  950. sfd.write(str(contents))
  951. @staticmethod
  952. def create_tmp_file_from_contents(rname, data, ftype='yaml'):
  953. ''' create a file in tmp with name and contents'''
  954. tmp = Utils.create_tmpfile(prefix=rname)
  955. if ftype == 'yaml':
  956. # AUDIT:no-member makes sense here due to ruamel.YAML/PyYAML usage
  957. # pylint: disable=no-member
  958. if hasattr(yaml, 'RoundTripDumper'):
  959. Utils._write(tmp, yaml.dump(data, Dumper=yaml.RoundTripDumper))
  960. else:
  961. Utils._write(tmp, yaml.safe_dump(data, default_flow_style=False))
  962. elif ftype == 'json':
  963. Utils._write(tmp, json.dumps(data))
  964. else:
  965. Utils._write(tmp, data)
  966. # Register cleanup when module is done
  967. atexit.register(Utils.cleanup, [tmp])
  968. return tmp
  969. @staticmethod
  970. def create_tmpfile_copy(inc_file):
  971. '''create a temporary copy of a file'''
  972. tmpfile = Utils.create_tmpfile('lib_openshift-')
  973. Utils._write(tmpfile, open(inc_file).read())
  974. # Cleanup the tmpfile
  975. atexit.register(Utils.cleanup, [tmpfile])
  976. return tmpfile
  977. @staticmethod
  978. def create_tmpfile(prefix='tmp'):
  979. ''' Generates and returns a temporary file name '''
  980. with tempfile.NamedTemporaryFile(prefix=prefix, delete=False) as tmp:
  981. return tmp.name
  982. @staticmethod
  983. def create_tmp_files_from_contents(content, content_type=None):
  984. '''Turn an array of dict: filename, content into a files array'''
  985. if not isinstance(content, list):
  986. content = [content]
  987. files = []
  988. for item in content:
  989. path = Utils.create_tmp_file_from_contents(item['path'] + '-',
  990. item['data'],
  991. ftype=content_type)
  992. files.append({'name': os.path.basename(item['path']),
  993. 'path': path})
  994. return files
  995. @staticmethod
  996. def cleanup(files):
  997. '''Clean up on exit '''
  998. for sfile in files:
  999. if os.path.exists(sfile):
  1000. if os.path.isdir(sfile):
  1001. shutil.rmtree(sfile)
  1002. elif os.path.isfile(sfile):
  1003. os.remove(sfile)
  1004. @staticmethod
  1005. def exists(results, _name):
  1006. ''' Check to see if the results include the name '''
  1007. if not results:
  1008. return False
  1009. if Utils.find_result(results, _name):
  1010. return True
  1011. return False
  1012. @staticmethod
  1013. def find_result(results, _name):
  1014. ''' Find the specified result by name'''
  1015. rval = None
  1016. for result in results:
  1017. if 'metadata' in result and result['metadata']['name'] == _name:
  1018. rval = result
  1019. break
  1020. return rval
  1021. @staticmethod
  1022. def get_resource_file(sfile, sfile_type='yaml'):
  1023. ''' return the service file '''
  1024. contents = None
  1025. with open(sfile) as sfd:
  1026. contents = sfd.read()
  1027. if sfile_type == 'yaml':
  1028. # AUDIT:no-member makes sense here due to ruamel.YAML/PyYAML usage
  1029. # pylint: disable=no-member
  1030. if hasattr(yaml, 'RoundTripLoader'):
  1031. contents = yaml.load(contents, yaml.RoundTripLoader)
  1032. else:
  1033. contents = yaml.safe_load(contents)
  1034. elif sfile_type == 'json':
  1035. contents = json.loads(contents)
  1036. return contents
  1037. @staticmethod
  1038. def filter_versions(stdout):
  1039. ''' filter the oc version output '''
  1040. version_dict = {}
  1041. version_search = ['oc', 'openshift', 'kubernetes']
  1042. for line in stdout.strip().split('\n'):
  1043. for term in version_search:
  1044. if not line:
  1045. continue
  1046. if line.startswith(term):
  1047. version_dict[term] = line.split()[-1]
  1048. # horrible hack to get openshift version in Openshift 3.2
  1049. # By default "oc version in 3.2 does not return an "openshift" version
  1050. if "openshift" not in version_dict:
  1051. version_dict["openshift"] = version_dict["oc"]
  1052. return version_dict
  1053. @staticmethod
  1054. def add_custom_versions(versions):
  1055. ''' create custom versions strings '''
  1056. versions_dict = {}
  1057. for tech, version in versions.items():
  1058. # clean up "-" from version
  1059. if "-" in version:
  1060. version = version.split("-")[0]
  1061. if version.startswith('v'):
  1062. versions_dict[tech + '_numeric'] = version[1:].split('+')[0]
  1063. # "v3.3.0.33" is what we have, we want "3.3"
  1064. versions_dict[tech + '_short'] = version[1:4]
  1065. return versions_dict
  1066. @staticmethod
  1067. def openshift_installed():
  1068. ''' check if openshift is installed '''
  1069. import rpm
  1070. transaction_set = rpm.TransactionSet()
  1071. rpmquery = transaction_set.dbMatch("name", "atomic-openshift")
  1072. return rpmquery.count() > 0
  1073. # Disabling too-many-branches. This is a yaml dictionary comparison function
  1074. # pylint: disable=too-many-branches,too-many-return-statements,too-many-statements
  1075. @staticmethod
  1076. def check_def_equal(user_def, result_def, skip_keys=None, debug=False):
  1077. ''' Given a user defined definition, compare it with the results given back by our query. '''
  1078. # Currently these values are autogenerated and we do not need to check them
  1079. skip = ['metadata', 'status']
  1080. if skip_keys:
  1081. skip.extend(skip_keys)
  1082. for key, value in result_def.items():
  1083. if key in skip:
  1084. continue
  1085. # Both are lists
  1086. if isinstance(value, list):
  1087. if key not in user_def:
  1088. if debug:
  1089. print('User data does not have key [%s]' % key)
  1090. print('User data: %s' % user_def)
  1091. return False
  1092. if not isinstance(user_def[key], list):
  1093. if debug:
  1094. print('user_def[key] is not a list key=[%s] user_def[key]=%s' % (key, user_def[key]))
  1095. return False
  1096. if len(user_def[key]) != len(value):
  1097. if debug:
  1098. print("List lengths are not equal.")
  1099. print("key=[%s]: user_def[%s] != value[%s]" % (key, len(user_def[key]), len(value)))
  1100. print("user_def: %s" % user_def[key])
  1101. print("value: %s" % value)
  1102. return False
  1103. for values in zip(user_def[key], value):
  1104. if isinstance(values[0], dict) and isinstance(values[1], dict):
  1105. if debug:
  1106. print('sending list - list')
  1107. print(type(values[0]))
  1108. print(type(values[1]))
  1109. result = Utils.check_def_equal(values[0], values[1], skip_keys=skip_keys, debug=debug)
  1110. if not result:
  1111. print('list compare returned false')
  1112. return False
  1113. elif value != user_def[key]:
  1114. if debug:
  1115. print('value should be identical')
  1116. print(user_def[key])
  1117. print(value)
  1118. return False
  1119. # recurse on a dictionary
  1120. elif isinstance(value, dict):
  1121. if key not in user_def:
  1122. if debug:
  1123. print("user_def does not have key [%s]" % key)
  1124. return False
  1125. if not isinstance(user_def[key], dict):
  1126. if debug:
  1127. print("dict returned false: not instance of dict")
  1128. return False
  1129. # before passing ensure keys match
  1130. api_values = set(value.keys()) - set(skip)
  1131. user_values = set(user_def[key].keys()) - set(skip)
  1132. if api_values != user_values:
  1133. if debug:
  1134. print("keys are not equal in dict")
  1135. print(user_values)
  1136. print(api_values)
  1137. return False
  1138. result = Utils.check_def_equal(user_def[key], value, skip_keys=skip_keys, debug=debug)
  1139. if not result:
  1140. if debug:
  1141. print("dict returned false")
  1142. print(result)
  1143. return False
  1144. # Verify each key, value pair is the same
  1145. else:
  1146. if key not in user_def or value != user_def[key]:
  1147. if debug:
  1148. print("value not equal; user_def does not have key")
  1149. print(key)
  1150. print(value)
  1151. if key in user_def:
  1152. print(user_def[key])
  1153. return False
  1154. if debug:
  1155. print('returning true')
  1156. return True
  1157. class OpenShiftCLIConfig(object):
  1158. '''Generic Config'''
  1159. def __init__(self, rname, namespace, kubeconfig, options):
  1160. self.kubeconfig = kubeconfig
  1161. self.name = rname
  1162. self.namespace = namespace
  1163. self._options = options
  1164. @property
  1165. def config_options(self):
  1166. ''' return config options '''
  1167. return self._options
  1168. def to_option_list(self, ascommalist=''):
  1169. '''return all options as a string
  1170. if ascommalist is set to the name of a key, and
  1171. the value of that key is a dict, format the dict
  1172. as a list of comma delimited key=value pairs'''
  1173. return self.stringify(ascommalist)
  1174. def stringify(self, ascommalist=''):
  1175. ''' return the options hash as cli params in a string
  1176. if ascommalist is set to the name of a key, and
  1177. the value of that key is a dict, format the dict
  1178. as a list of comma delimited key=value pairs '''
  1179. rval = []
  1180. for key in sorted(self.config_options.keys()):
  1181. data = self.config_options[key]
  1182. if data['include'] \
  1183. and (data['value'] is not None or isinstance(data['value'], int)):
  1184. if key == ascommalist:
  1185. val = ','.join(['{}={}'.format(kk, vv) for kk, vv in sorted(data['value'].items())])
  1186. else:
  1187. val = data['value']
  1188. rval.append('--{}={}'.format(key.replace('_', '-'), val))
  1189. return rval
  1190. # -*- -*- -*- End included fragment: lib/base.py -*- -*- -*-
  1191. # -*- -*- -*- Begin included fragment: lib/rolebinding.py -*- -*- -*-
  1192. # pylint: disable=too-many-instance-attributes
  1193. class RoleBindingConfig(object):
  1194. ''' Handle rolebinding config '''
  1195. # pylint: disable=too-many-arguments
  1196. def __init__(self,
  1197. name,
  1198. namespace,
  1199. kubeconfig,
  1200. group_names=None,
  1201. role_ref=None,
  1202. subjects=None,
  1203. usernames=None):
  1204. ''' constructor for handling rolebinding options '''
  1205. self.kubeconfig = kubeconfig
  1206. self.name = name
  1207. self.namespace = namespace
  1208. self.group_names = group_names
  1209. self.role_ref = role_ref
  1210. self.subjects = subjects
  1211. self.usernames = usernames
  1212. self.data = {}
  1213. self.create_dict()
  1214. def create_dict(self):
  1215. ''' create a default rolebinding as a dict '''
  1216. self.data['apiVersion'] = 'v1'
  1217. self.data['kind'] = 'RoleBinding'
  1218. self.data['groupNames'] = self.group_names
  1219. self.data['metadata']['name'] = self.name
  1220. self.data['metadata']['namespace'] = self.namespace
  1221. self.data['roleRef'] = self.role_ref
  1222. self.data['subjects'] = self.subjects
  1223. self.data['userNames'] = self.usernames
  1224. # pylint: disable=too-many-instance-attributes,too-many-public-methods
  1225. class RoleBinding(Yedit):
  1226. ''' Class to model a rolebinding openshift object'''
  1227. group_names_path = "groupNames"
  1228. role_ref_path = "roleRef"
  1229. subjects_path = "subjects"
  1230. user_names_path = "userNames"
  1231. kind = 'RoleBinding'
  1232. def __init__(self, content):
  1233. '''RoleBinding constructor'''
  1234. super(RoleBinding, self).__init__(content=content)
  1235. self._subjects = None
  1236. self._role_ref = None
  1237. self._group_names = None
  1238. self._user_names = None
  1239. @property
  1240. def subjects(self):
  1241. ''' subjects property '''
  1242. if self._subjects is None:
  1243. self._subjects = self.get_subjects()
  1244. return self._subjects
  1245. @subjects.setter
  1246. def subjects(self, data):
  1247. ''' subjects property setter'''
  1248. self._subjects = data
  1249. @property
  1250. def role_ref(self):
  1251. ''' role_ref property '''
  1252. if self._role_ref is None:
  1253. self._role_ref = self.get_role_ref()
  1254. return self._role_ref
  1255. @role_ref.setter
  1256. def role_ref(self, data):
  1257. ''' role_ref property setter'''
  1258. self._role_ref = data
  1259. @property
  1260. def group_names(self):
  1261. ''' group_names property '''
  1262. if self._group_names is None:
  1263. self._group_names = self.get_group_names()
  1264. return self._group_names
  1265. @group_names.setter
  1266. def group_names(self, data):
  1267. ''' group_names property setter'''
  1268. self._group_names = data
  1269. @property
  1270. def user_names(self):
  1271. ''' user_names property '''
  1272. if self._user_names is None:
  1273. self._user_names = self.get_user_names()
  1274. return self._user_names
  1275. @user_names.setter
  1276. def user_names(self, data):
  1277. ''' user_names property setter'''
  1278. self._user_names = data
  1279. def get_group_names(self):
  1280. ''' return groupNames '''
  1281. return self.get(RoleBinding.group_names_path) or []
  1282. def get_user_names(self):
  1283. ''' return usernames '''
  1284. return self.get(RoleBinding.user_names_path) or []
  1285. def get_role_ref(self):
  1286. ''' return role_ref '''
  1287. return self.get(RoleBinding.role_ref_path) or {}
  1288. def get_subjects(self):
  1289. ''' return subjects '''
  1290. return self.get(RoleBinding.subjects_path) or []
  1291. #### ADD #####
  1292. def add_subject(self, inc_subject):
  1293. ''' add a subject '''
  1294. if self.subjects:
  1295. # pylint: disable=no-member
  1296. self.subjects.append(inc_subject)
  1297. else:
  1298. self.put(RoleBinding.subjects_path, [inc_subject])
  1299. return True
  1300. def add_role_ref(self, inc_role_ref):
  1301. ''' add a role_ref '''
  1302. if not self.role_ref:
  1303. self.put(RoleBinding.role_ref_path, {"name": inc_role_ref})
  1304. return True
  1305. return False
  1306. def add_group_names(self, inc_group_names):
  1307. ''' add a group_names '''
  1308. if self.group_names:
  1309. # pylint: disable=no-member
  1310. self.group_names.append(inc_group_names)
  1311. else:
  1312. self.put(RoleBinding.group_names_path, [inc_group_names])
  1313. return True
  1314. def add_user_name(self, inc_user_name):
  1315. ''' add a username '''
  1316. if self.user_names:
  1317. # pylint: disable=no-member
  1318. self.user_names.append(inc_user_name)
  1319. else:
  1320. self.put(RoleBinding.user_names_path, [inc_user_name])
  1321. return True
  1322. #### /ADD #####
  1323. #### Remove #####
  1324. def remove_subject(self, inc_subject):
  1325. ''' remove a subject '''
  1326. try:
  1327. # pylint: disable=no-member
  1328. self.subjects.remove(inc_subject)
  1329. except ValueError as _:
  1330. return False
  1331. return True
  1332. def remove_role_ref(self, inc_role_ref):
  1333. ''' remove a role_ref '''
  1334. if self.role_ref and self.role_ref['name'] == inc_role_ref:
  1335. del self.role_ref['name']
  1336. return True
  1337. return False
  1338. def remove_group_name(self, inc_group_name):
  1339. ''' remove a groupname '''
  1340. try:
  1341. # pylint: disable=no-member
  1342. self.group_names.remove(inc_group_name)
  1343. except ValueError as _:
  1344. return False
  1345. return True
  1346. def remove_user_name(self, inc_user_name):
  1347. ''' remove a username '''
  1348. try:
  1349. # pylint: disable=no-member
  1350. self.user_names.remove(inc_user_name)
  1351. except ValueError as _:
  1352. return False
  1353. return True
  1354. #### /REMOVE #####
  1355. #### UPDATE #####
  1356. def update_subject(self, inc_subject):
  1357. ''' update a subject '''
  1358. try:
  1359. # pylint: disable=no-member
  1360. index = self.subjects.index(inc_subject)
  1361. except ValueError as _:
  1362. return self.add_subject(inc_subject)
  1363. self.subjects[index] = inc_subject
  1364. return True
  1365. def update_group_name(self, inc_group_name):
  1366. ''' update a groupname '''
  1367. try:
  1368. # pylint: disable=no-member
  1369. index = self.group_names.index(inc_group_name)
  1370. except ValueError as _:
  1371. return self.add_group_names(inc_group_name)
  1372. self.group_names[index] = inc_group_name
  1373. return True
  1374. def update_user_name(self, inc_user_name):
  1375. ''' update a username '''
  1376. try:
  1377. # pylint: disable=no-member
  1378. index = self.user_names.index(inc_user_name)
  1379. except ValueError as _:
  1380. return self.add_user_name(inc_user_name)
  1381. self.user_names[index] = inc_user_name
  1382. return True
  1383. def update_role_ref(self, inc_role_ref):
  1384. ''' update a role_ref '''
  1385. self.role_ref['name'] = inc_role_ref
  1386. return True
  1387. #### /UPDATE #####
  1388. #### FIND ####
  1389. def find_subject(self, inc_subject):
  1390. ''' find a subject '''
  1391. index = None
  1392. try:
  1393. # pylint: disable=no-member
  1394. index = self.subjects.index(inc_subject)
  1395. except ValueError as _:
  1396. return index
  1397. return index
  1398. def find_group_name(self, inc_group_name):
  1399. ''' find a group_name '''
  1400. index = None
  1401. try:
  1402. # pylint: disable=no-member
  1403. index = self.group_names.index(inc_group_name)
  1404. except ValueError as _:
  1405. return index
  1406. return index
  1407. def find_user_name(self, inc_user_name):
  1408. ''' find a user_name '''
  1409. index = None
  1410. try:
  1411. # pylint: disable=no-member
  1412. index = self.user_names.index(inc_user_name)
  1413. except ValueError as _:
  1414. return index
  1415. return index
  1416. def find_role_ref(self, inc_role_ref):
  1417. ''' find a user_name '''
  1418. if self.role_ref and self.role_ref['name'] == inc_role_ref['name']:
  1419. return self.role_ref
  1420. return None
  1421. # -*- -*- -*- End included fragment: lib/rolebinding.py -*- -*- -*-
  1422. # -*- -*- -*- Begin included fragment: lib/scc.py -*- -*- -*-
  1423. # pylint: disable=too-many-instance-attributes
  1424. class SecurityContextConstraintsConfig(object):
  1425. ''' Handle scc options '''
  1426. # pylint: disable=too-many-arguments
  1427. def __init__(self,
  1428. sname,
  1429. kubeconfig,
  1430. options=None,
  1431. fs_group='MustRunAs',
  1432. default_add_capabilities=None,
  1433. groups=None,
  1434. priority=None,
  1435. required_drop_capabilities=None,
  1436. run_as_user='MustRunAsRange',
  1437. se_linux_context='MustRunAs',
  1438. supplemental_groups='RunAsAny',
  1439. users=None,
  1440. annotations=None):
  1441. ''' constructor for handling scc options '''
  1442. self.kubeconfig = kubeconfig
  1443. self.name = sname
  1444. self.options = options
  1445. self.fs_group = fs_group
  1446. self.default_add_capabilities = default_add_capabilities
  1447. self.groups = groups
  1448. self.priority = priority
  1449. self.required_drop_capabilities = required_drop_capabilities
  1450. self.run_as_user = run_as_user
  1451. self.se_linux_context = se_linux_context
  1452. self.supplemental_groups = supplemental_groups
  1453. self.users = users
  1454. self.annotations = annotations
  1455. self.data = {}
  1456. self.create_dict()
  1457. def create_dict(self):
  1458. ''' assign the correct properties for a scc dict '''
  1459. # allow options
  1460. if self.options:
  1461. for key, value in self.options.items():
  1462. self.data[key] = value
  1463. else:
  1464. self.data['allowHostDirVolumePlugin'] = False
  1465. self.data['allowHostIPC'] = False
  1466. self.data['allowHostNetwork'] = False
  1467. self.data['allowHostPID'] = False
  1468. self.data['allowHostPorts'] = False
  1469. self.data['allowPrivilegedContainer'] = False
  1470. self.data['allowedCapabilities'] = None
  1471. # version
  1472. self.data['apiVersion'] = 'v1'
  1473. # kind
  1474. self.data['kind'] = 'SecurityContextConstraints'
  1475. # defaultAddCapabilities
  1476. self.data['defaultAddCapabilities'] = self.default_add_capabilities
  1477. # fsGroup
  1478. self.data['fsGroup']['type'] = self.fs_group
  1479. # groups
  1480. self.data['groups'] = []
  1481. if self.groups:
  1482. self.data['groups'] = self.groups
  1483. # metadata
  1484. self.data['metadata'] = {}
  1485. self.data['metadata']['name'] = self.name
  1486. if self.annotations:
  1487. for key, value in self.annotations.items():
  1488. self.data['metadata'][key] = value
  1489. # priority
  1490. self.data['priority'] = self.priority
  1491. # requiredDropCapabilities
  1492. self.data['requiredDropCapabilities'] = self.required_drop_capabilities
  1493. # runAsUser
  1494. self.data['runAsUser'] = {'type': self.run_as_user}
  1495. # seLinuxContext
  1496. self.data['seLinuxContext'] = {'type': self.se_linux_context}
  1497. # supplementalGroups
  1498. self.data['supplementalGroups'] = {'type': self.supplemental_groups}
  1499. # users
  1500. self.data['users'] = []
  1501. if self.users:
  1502. self.data['users'] = self.users
  1503. # pylint: disable=too-many-instance-attributes,too-many-public-methods,no-member
  1504. class SecurityContextConstraints(Yedit):
  1505. ''' Class to wrap the oc command line tools '''
  1506. default_add_capabilities_path = "defaultAddCapabilities"
  1507. fs_group_path = "fsGroup"
  1508. groups_path = "groups"
  1509. priority_path = "priority"
  1510. required_drop_capabilities_path = "requiredDropCapabilities"
  1511. run_as_user_path = "runAsUser"
  1512. se_linux_context_path = "seLinuxContext"
  1513. supplemental_groups_path = "supplementalGroups"
  1514. users_path = "users"
  1515. kind = 'SecurityContextConstraints'
  1516. def __init__(self, content):
  1517. '''SecurityContextConstraints constructor'''
  1518. super(SecurityContextConstraints, self).__init__(content=content)
  1519. self._users = None
  1520. self._groups = None
  1521. @property
  1522. def users(self):
  1523. ''' users property getter '''
  1524. if self._users is None:
  1525. self._users = self.get_users()
  1526. return self._users
  1527. @property
  1528. def groups(self):
  1529. ''' groups property getter '''
  1530. if self._groups is None:
  1531. self._groups = self.get_groups()
  1532. return self._groups
  1533. @users.setter
  1534. def users(self, data):
  1535. ''' users property setter'''
  1536. self._users = data
  1537. @groups.setter
  1538. def groups(self, data):
  1539. ''' groups property setter'''
  1540. self._groups = data
  1541. def get_users(self):
  1542. '''get scc users'''
  1543. return self.get(SecurityContextConstraints.users_path) or []
  1544. def get_groups(self):
  1545. '''get scc groups'''
  1546. return self.get(SecurityContextConstraints.groups_path) or []
  1547. def add_user(self, inc_user):
  1548. ''' add a user '''
  1549. if self.users:
  1550. self.users.append(inc_user)
  1551. else:
  1552. self.put(SecurityContextConstraints.users_path, [inc_user])
  1553. return True
  1554. def add_group(self, inc_group):
  1555. ''' add a group '''
  1556. if self.groups:
  1557. self.groups.append(inc_group)
  1558. else:
  1559. self.put(SecurityContextConstraints.groups_path, [inc_group])
  1560. return True
  1561. def remove_user(self, inc_user):
  1562. ''' remove a user '''
  1563. try:
  1564. self.users.remove(inc_user)
  1565. except ValueError as _:
  1566. return False
  1567. return True
  1568. def remove_group(self, inc_group):
  1569. ''' remove a group '''
  1570. try:
  1571. self.groups.remove(inc_group)
  1572. except ValueError as _:
  1573. return False
  1574. return True
  1575. def update_user(self, inc_user):
  1576. ''' update a user '''
  1577. try:
  1578. index = self.users.index(inc_user)
  1579. except ValueError as _:
  1580. return self.add_user(inc_user)
  1581. self.users[index] = inc_user
  1582. return True
  1583. def update_group(self, inc_group):
  1584. ''' update a group '''
  1585. try:
  1586. index = self.groups.index(inc_group)
  1587. except ValueError as _:
  1588. return self.add_group(inc_group)
  1589. self.groups[index] = inc_group
  1590. return True
  1591. def find_user(self, inc_user):
  1592. ''' find a user '''
  1593. index = None
  1594. try:
  1595. index = self.users.index(inc_user)
  1596. except ValueError as _:
  1597. return index
  1598. return index
  1599. def find_group(self, inc_group):
  1600. ''' find a group '''
  1601. index = None
  1602. try:
  1603. index = self.groups.index(inc_group)
  1604. except ValueError as _:
  1605. return index
  1606. return index
  1607. # -*- -*- -*- End included fragment: lib/scc.py -*- -*- -*-
  1608. # -*- -*- -*- Begin included fragment: class/oc_adm_policy_user.py -*- -*- -*-
  1609. class PolicyUserException(Exception):
  1610. ''' PolicyUser exception'''
  1611. pass
  1612. class PolicyUserConfig(OpenShiftCLIConfig):
  1613. ''' PolicyUserConfig is a DTO for user related policy. '''
  1614. def __init__(self, namespace, kubeconfig, policy_options):
  1615. super(PolicyUserConfig, self).__init__(policy_options['name']['value'],
  1616. namespace, kubeconfig, policy_options)
  1617. self.kind = self.get_kind()
  1618. self.namespace = namespace
  1619. def get_kind(self):
  1620. ''' return the kind we are working with '''
  1621. if self.config_options['resource_kind']['value'] == 'role':
  1622. return 'rolebinding'
  1623. elif self.config_options['resource_kind']['value'] == 'cluster-role':
  1624. return 'clusterrolebinding'
  1625. elif self.config_options['resource_kind']['value'] == 'scc':
  1626. return 'scc'
  1627. return None
  1628. # pylint: disable=too-many-return-statements
  1629. class PolicyUser(OpenShiftCLI):
  1630. ''' Class to handle attaching policies to users '''
  1631. def __init__(self,
  1632. config,
  1633. verbose=False):
  1634. ''' Constructor for PolicyUser '''
  1635. super(PolicyUser, self).__init__(config.namespace, config.kubeconfig, verbose)
  1636. self.config = config
  1637. self.verbose = verbose
  1638. self._rolebinding = None
  1639. self._scc = None
  1640. self._cluster_role_bindings = None
  1641. self._role_bindings = None
  1642. @property
  1643. def rolebindings(self):
  1644. if self._role_bindings is None:
  1645. results = self._get('rolebindings', None)
  1646. if results['returncode'] != 0:
  1647. raise OpenShiftCLIError('Could not retrieve rolebindings')
  1648. self._role_bindings = results['results'][0]['items']
  1649. return self._role_bindings
  1650. @property
  1651. def clusterrolebindings(self):
  1652. if self._cluster_role_bindings is None:
  1653. results = self._get('clusterrolebindings', None)
  1654. if results['returncode'] != 0:
  1655. raise OpenShiftCLIError('Could not retrieve clusterrolebindings')
  1656. self._cluster_role_bindings = results['results'][0]['items']
  1657. return self._cluster_role_bindings
  1658. @property
  1659. def role_binding(self):
  1660. ''' role_binding property '''
  1661. return self._rolebinding
  1662. @role_binding.setter
  1663. def role_binding(self, binding):
  1664. ''' setter for role_binding property '''
  1665. self._rolebinding = binding
  1666. @property
  1667. def security_context_constraint(self):
  1668. ''' security_context_constraint property '''
  1669. return self._scc
  1670. @security_context_constraint.setter
  1671. def security_context_constraint(self, scc):
  1672. ''' setter for security_context_constraint property '''
  1673. self._scc = scc
  1674. def get(self):
  1675. '''fetch the desired kind
  1676. This is only used for scc objects.
  1677. The {cluster}rolebindings happen in exists.
  1678. '''
  1679. resource_name = self.config.config_options['name']['value']
  1680. if resource_name == 'cluster-reader':
  1681. resource_name += 's'
  1682. return self._get(self.config.kind, resource_name)
  1683. def exists_role_binding(self):
  1684. ''' return whether role_binding exists '''
  1685. bindings = None
  1686. if self.config.config_options['resource_kind']['value'] == 'cluster-role':
  1687. bindings = self.clusterrolebindings
  1688. else:
  1689. bindings = self.rolebindings
  1690. if bindings is None:
  1691. return False
  1692. for binding in bindings:
  1693. if binding['roleRef']['name'] == self.config.config_options['name']['value'] and \
  1694. binding['userNames'] is not None and \
  1695. self.config.config_options['user']['value'] in binding['userNames']:
  1696. self.role_binding = binding
  1697. return True
  1698. return False
  1699. def exists_scc(self):
  1700. ''' return whether scc exists '''
  1701. results = self.get()
  1702. if results['returncode'] == 0:
  1703. self.security_context_constraint = SecurityContextConstraints(results['results'][0])
  1704. if self.security_context_constraint.find_user(self.config.config_options['user']['value']) != None:
  1705. return True
  1706. return False
  1707. return results
  1708. def exists(self):
  1709. '''does the object exist?'''
  1710. if self.config.config_options['resource_kind']['value'] == 'cluster-role':
  1711. return self.exists_role_binding()
  1712. elif self.config.config_options['resource_kind']['value'] == 'role':
  1713. return self.exists_role_binding()
  1714. elif self.config.config_options['resource_kind']['value'] == 'scc':
  1715. return self.exists_scc()
  1716. return False
  1717. def perform(self):
  1718. '''perform action on resource'''
  1719. cmd = ['policy',
  1720. self.config.config_options['action']['value'],
  1721. self.config.config_options['name']['value'],
  1722. self.config.config_options['user']['value']]
  1723. if self.config.config_options['role_namespace']['value'] is not None:
  1724. cmd.extend(['--role-namespace', self.config.config_options['role_namespace']['value']])
  1725. return self.openshift_cmd(cmd, oadm=True)
  1726. @staticmethod
  1727. def run_ansible(params, check_mode):
  1728. '''run the idempotent ansible code'''
  1729. state = params['state']
  1730. action = None
  1731. if state == 'present':
  1732. action = 'add-' + params['resource_kind'] + '-to-user'
  1733. else:
  1734. action = 'remove-' + params['resource_kind'] + '-from-user'
  1735. nconfig = PolicyUserConfig(params['namespace'],
  1736. params['kubeconfig'],
  1737. {'action': {'value': action, 'include': False},
  1738. 'user': {'value': params['user'], 'include': False},
  1739. 'resource_kind': {'value': params['resource_kind'], 'include': False},
  1740. 'name': {'value': params['resource_name'], 'include': False},
  1741. 'role_namespace': {'value': params['role_namespace'], 'include': False},
  1742. })
  1743. policyuser = PolicyUser(nconfig, params['debug'])
  1744. # Run the oc adm policy user related command
  1745. ########
  1746. # Delete
  1747. ########
  1748. if state == 'absent':
  1749. if not policyuser.exists():
  1750. return {'changed': False, 'state': 'absent'}
  1751. if check_mode:
  1752. return {'changed': False, 'msg': 'CHECK_MODE: would have performed a delete.'}
  1753. api_rval = policyuser.perform()
  1754. if api_rval['returncode'] != 0:
  1755. return {'msg': api_rval}
  1756. return {'changed': True, 'results' : api_rval, state:'absent'}
  1757. if state == 'present':
  1758. ########
  1759. # Create
  1760. ########
  1761. results = policyuser.exists()
  1762. if isinstance(results, dict) and 'returncode' in results and results['returncode'] != 0:
  1763. return {'msg': results}
  1764. if not results:
  1765. if check_mode:
  1766. return {'changed': False, 'msg': 'CHECK_MODE: would have performed a create.'}
  1767. api_rval = policyuser.perform()
  1768. if api_rval['returncode'] != 0:
  1769. return {'msg': api_rval}
  1770. return {'changed': True, 'results': api_rval, state: 'present'}
  1771. return {'changed': False, state: 'present'}
  1772. return {'failed': True, 'changed': False, 'results': 'Unknown state passed. %s' % state, state: 'unknown'}
  1773. # -*- -*- -*- End included fragment: class/oc_adm_policy_user.py -*- -*- -*-
  1774. # -*- -*- -*- Begin included fragment: ansible/oc_adm_policy_user.py -*- -*- -*-
  1775. def main():
  1776. '''
  1777. ansible oc adm module for user policy
  1778. '''
  1779. module = AnsibleModule(
  1780. argument_spec=dict(
  1781. state=dict(default='present', type='str',
  1782. choices=['present', 'absent']),
  1783. debug=dict(default=False, type='bool'),
  1784. resource_name=dict(required=True, type='str'),
  1785. namespace=dict(default='default', type='str'),
  1786. role_namespace=dict(default=None, type='str'),
  1787. kubeconfig=dict(default='/etc/origin/master/admin.kubeconfig', type='str'),
  1788. user=dict(required=True, type='str'),
  1789. resource_kind=dict(required=True, choices=['role', 'cluster-role', 'scc'], type='str'),
  1790. ),
  1791. supports_check_mode=True,
  1792. )
  1793. results = PolicyUser.run_ansible(module.params, module.check_mode)
  1794. if 'failed' in results:
  1795. module.fail_json(**results)
  1796. module.exit_json(**results)
  1797. if __name__ == "__main__":
  1798. main()
  1799. # -*- -*- -*- End included fragment: ansible/oc_adm_policy_user.py -*- -*- -*-