legacy_add_scc_to_user.yml 1.2 KB

12345678910111213141516171819202122232425262728293031323334353637
  1. ####
  2. #
  3. # OSE 3.0.z did not have 'oadm policy add-scc-to-user'.
  4. #
  5. ####
  6. - name: tmp dir for openshift
  7. file:
  8. path: /tmp/openshift
  9. state: directory
  10. owner: root
  11. mode: 700
  12. - name: Create service account configs
  13. template:
  14. src: serviceaccount.j2
  15. dest: "/tmp/openshift/{{ item }}-serviceaccount.yaml"
  16. with_items: '{{ openshift_serviceaccounts_names }}'
  17. - name: Get current security context constraints
  18. shell: >
  19. {{ openshift.common.client_binary }} get scc privileged -o yaml
  20. --output-version=v1 > /tmp/openshift/scc.yaml
  21. changed_when: false
  22. - name: Add security context constraint for {{ item }}
  23. lineinfile:
  24. dest: /tmp/openshift/scc.yaml
  25. line: "- system:serviceaccount:{{ openshift_serviceaccounts_namespace }}:{{ item.0 }}"
  26. insertafter: "^users:$"
  27. when: "item.1.rc == 0 and 'system:serviceaccount:{{ openshift_serviceaccounts_namespace }}:{{ item.0 }}' not in {{ (item.1.stdout | from_yaml).users }}"
  28. with_nested:
  29. - '{{ openshift_serviceaccounts_names }}'
  30. - '{{ scc_test.results }}'
  31. - name: Apply new scc rules for service accounts
  32. command: "{{ openshift.common.client_binary }} update -f /tmp/openshift/scc.yaml --api-version=v1"