sanity_checks.py 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305
  1. """
  2. Ansible action plugin to ensure inventory variables are set
  3. appropriately and no conflicting options have been provided.
  4. """
  5. import re
  6. from ansible.plugins.action import ActionBase
  7. from ansible import errors
  8. # Valid values for openshift_deployment_type
  9. VALID_DEPLOYMENT_TYPES = ('origin', 'openshift-enterprise')
  10. # Tuple of variable names and default values if undefined.
  11. NET_PLUGIN_LIST = (('openshift_use_openshift_sdn', True),
  12. ('openshift_use_flannel', False),
  13. ('openshift_use_nuage', False),
  14. ('openshift_use_contiv', False),
  15. ('openshift_use_calico', False),
  16. ('openshift_use_kuryr', False))
  17. ENTERPRISE_TAG_REGEX_ERROR = """openshift_image_tag must be in the format
  18. v#.#[.#[.#]]. Examples: v1.2, v3.4.1, v3.5.1.3,
  19. v3.5.1.3.4, v1.2-1, v1.2.3-4, v1.2.3-4.5, v1.2.3-4.5.6
  20. You specified openshift_image_tag={}"""
  21. ORIGIN_TAG_REGEX_ERROR = """openshift_image_tag must be in the format
  22. v#.#[.#-optional.#]. Examples: v1.2.3, v3.5.1-alpha.1
  23. You specified openshift_image_tag={}"""
  24. ORIGIN_TAG_REGEX = {'re': '(^v?\\d+\\.\\d+.*)',
  25. 'error_msg': ORIGIN_TAG_REGEX_ERROR}
  26. ENTERPRISE_TAG_REGEX = {'re': '(^v\\d+\\.\\d+(\\.\\d+)*(-\\d+(\\.\\d+)*)?$)',
  27. 'error_msg': ENTERPRISE_TAG_REGEX_ERROR}
  28. IMAGE_TAG_REGEX = {'origin': ORIGIN_TAG_REGEX,
  29. 'openshift-enterprise': ENTERPRISE_TAG_REGEX}
  30. UNSUPPORTED_OCP_VERSIONS = {
  31. '^3.8.*$': 'OCP 3.8 is not supported and cannot be installed'
  32. }
  33. CONTAINERIZED_NO_TAG_ERROR_MSG = """To install a containerized Origin release,
  34. you must set openshift_release or openshift_image_tag in your inventory to
  35. specify which version of the OpenShift component images to use.
  36. (Suggestion: add openshift_release="x.y" to inventory.)"""
  37. STORAGE_KIND_TUPLE = (
  38. 'openshift_hosted_registry_storage_kind',
  39. 'openshift_loggingops_storage_kind',
  40. 'openshift_logging_storage_kind',
  41. 'openshift_metrics_storage_kind',
  42. 'openshift_prometheus_alertbuffer_storage_kind',
  43. 'openshift_prometheus_alertmanager_storage_kind',
  44. 'openshift_prometheus_storage_kind')
  45. def to_bool(var_to_check):
  46. """Determine a boolean value given the multiple
  47. ways bools can be specified in ansible."""
  48. # http://yaml.org/type/bool.html
  49. yes_list = (True, 1, "True", "1", "true", "TRUE",
  50. "Yes", "yes", "Y", "y", "YES",
  51. "on", "ON", "On")
  52. return var_to_check in yes_list
  53. class ActionModule(ActionBase):
  54. """Action plugin to execute sanity checks."""
  55. def template_var(self, hostvars, host, varname):
  56. """Retrieve a variable from hostvars and template it.
  57. If undefined, return None type."""
  58. # We will set the current host and variable checked for easy debugging
  59. # if there are any unhandled exceptions.
  60. # pylint: disable=W0201
  61. self.last_checked_var = varname
  62. # pylint: disable=W0201
  63. self.last_checked_host = host
  64. res = hostvars[host].get(varname)
  65. if res is None:
  66. return None
  67. return self._templar.template(res)
  68. def check_openshift_deployment_type(self, hostvars, host):
  69. """Ensure a valid openshift_deployment_type is set"""
  70. openshift_deployment_type = self.template_var(hostvars, host,
  71. 'openshift_deployment_type')
  72. if openshift_deployment_type not in VALID_DEPLOYMENT_TYPES:
  73. type_strings = ", ".join(VALID_DEPLOYMENT_TYPES)
  74. msg = "openshift_deployment_type must be defined and one of {}".format(type_strings)
  75. raise errors.AnsibleModuleError(msg)
  76. return openshift_deployment_type
  77. def check_python_version(self, hostvars, host, distro):
  78. """Ensure python version is 3 for Fedora and python 2 for others"""
  79. ansible_python = self.template_var(hostvars, host, 'ansible_python')
  80. if distro == "Fedora":
  81. if ansible_python['version']['major'] != 3:
  82. msg = "openshift-ansible requires Python 3 for {};".format(distro)
  83. msg += " For information on enabling Python 3 with Ansible,"
  84. msg += " see https://docs.ansible.com/ansible/python_3_support.html"
  85. raise errors.AnsibleModuleError(msg)
  86. else:
  87. if ansible_python['version']['major'] != 2:
  88. msg = "openshift-ansible requires Python 2 for {};".format(distro)
  89. def check_image_tag_format(self, hostvars, host, openshift_deployment_type):
  90. """Ensure openshift_image_tag is formatted correctly"""
  91. openshift_image_tag = self.template_var(hostvars, host, 'openshift_image_tag')
  92. if not openshift_image_tag or openshift_image_tag == 'latest':
  93. return None
  94. regex_to_match = IMAGE_TAG_REGEX[openshift_deployment_type]['re']
  95. res = re.match(regex_to_match, str(openshift_image_tag))
  96. if res is None:
  97. msg = IMAGE_TAG_REGEX[openshift_deployment_type]['error_msg']
  98. msg = msg.format(str(openshift_image_tag))
  99. raise errors.AnsibleModuleError(msg)
  100. def no_origin_image_version(self, hostvars, host, openshift_deployment_type):
  101. """Ensure we can determine what image version to use with origin
  102. fail when:
  103. - openshift_is_containerized
  104. - openshift_deployment_type == 'origin'
  105. - openshift_release is not defined
  106. - openshift_image_tag is not defined"""
  107. if not openshift_deployment_type == 'origin':
  108. return None
  109. oic = self.template_var(hostvars, host, 'openshift_is_containerized')
  110. if not to_bool(oic):
  111. return None
  112. orelease = self.template_var(hostvars, host, 'openshift_release')
  113. oitag = self.template_var(hostvars, host, 'openshift_image_tag')
  114. if not orelease and not oitag:
  115. raise errors.AnsibleModuleError(CONTAINERIZED_NO_TAG_ERROR_MSG)
  116. def network_plugin_check(self, hostvars, host):
  117. """Ensure only one type of network plugin is enabled"""
  118. res = []
  119. # Loop through each possible network plugin boolean, determine the
  120. # actual boolean value, and append results into a list.
  121. for plugin, default_val in NET_PLUGIN_LIST:
  122. res_temp = self.template_var(hostvars, host, plugin)
  123. if res_temp is None:
  124. res_temp = default_val
  125. res.append(to_bool(res_temp))
  126. if sum(res) not in (0, 1):
  127. plugin_str = list(zip([x[0] for x in NET_PLUGIN_LIST], res))
  128. msg = "Host Checked: {} Only one of must be true. Found: {}".format(host, plugin_str)
  129. raise errors.AnsibleModuleError(msg)
  130. def check_hostname_vars(self, hostvars, host):
  131. """Checks to ensure openshift_hostname
  132. and openshift_public_hostname
  133. conform to the proper length of 63 characters or less"""
  134. for varname in ('openshift_public_hostname', 'openshift_hostname'):
  135. var_value = self.template_var(hostvars, host, varname)
  136. if var_value and len(var_value) > 63:
  137. msg = '{} must be 63 characters or less'.format(varname)
  138. raise errors.AnsibleModuleError(msg)
  139. def check_supported_ocp_version(self, hostvars, host, openshift_deployment_type):
  140. """Checks that the OCP version supported"""
  141. if openshift_deployment_type == 'origin':
  142. return None
  143. openshift_version = self.template_var(hostvars, host, 'openshift_version')
  144. for regex_to_match, error_msg in UNSUPPORTED_OCP_VERSIONS.items():
  145. res = re.match(regex_to_match, str(openshift_version))
  146. if res is not None:
  147. raise errors.AnsibleModuleError(error_msg)
  148. return None
  149. def check_session_auth_secrets(self, hostvars, host):
  150. """Checks session_auth_secrets is correctly formatted"""
  151. sas = self.template_var(hostvars, host,
  152. 'openshift_master_session_auth_secrets')
  153. ses = self.template_var(hostvars, host,
  154. 'openshift_master_session_encryption_secrets')
  155. # This variable isn't mandatory, only check if set.
  156. if sas is None and ses is None:
  157. return None
  158. if not (
  159. issubclass(type(sas), list) and issubclass(type(ses), list)
  160. ) or len(sas) != len(ses):
  161. raise errors.AnsibleModuleError(
  162. 'Expects openshift_master_session_auth_secrets and '
  163. 'openshift_master_session_encryption_secrets are equal length lists')
  164. for secret in sas:
  165. if len(secret) < 32:
  166. raise errors.AnsibleModuleError(
  167. 'Invalid secret in openshift_master_session_auth_secrets. '
  168. 'Secrets must be at least 32 characters in length.')
  169. for secret in ses:
  170. if len(secret) not in [16, 24, 32]:
  171. raise errors.AnsibleModuleError(
  172. 'Invalid secret in openshift_master_session_encryption_secrets. '
  173. 'Secrets must be 16, 24, or 32 characters in length.')
  174. return None
  175. def check_unsupported_nfs_configs(self, hostvars, host):
  176. """Fails if nfs storage is in use for any components. This check is
  177. ignored if openshift_enable_unsupported_configurations=True"""
  178. enable_unsupported = self.template_var(
  179. hostvars, host, 'openshift_enable_unsupported_configurations')
  180. if to_bool(enable_unsupported):
  181. return None
  182. for storage in STORAGE_KIND_TUPLE:
  183. kind = self.template_var(hostvars, host, storage)
  184. if kind == 'nfs':
  185. raise errors.AnsibleModuleError(
  186. 'nfs is an unsupported type for {}. '
  187. 'openshift_enable_unsupported_configurations=True must'
  188. 'be specified to continue with this configuration.'
  189. ''.format(storage))
  190. return None
  191. def check_htpasswd_provider(self, hostvars, host):
  192. """Fails if openshift_master_identity_providers contains an entry of
  193. kind HTPasswdPasswordIdentityProvider and
  194. openshift_master_manage_htpasswd is False"""
  195. idps = self.template_var(
  196. hostvars, host, 'openshift_master_identity_providers')
  197. if not idps:
  198. # If we don't find any identity_providers, nothing for us to do.
  199. return None
  200. manage_pass = self.template_var(
  201. hostvars, host, 'openshift_master_manage_htpasswd')
  202. if to_bool(manage_pass):
  203. # If we manage the file, we can just generate in the new path.
  204. return None
  205. old_keys = ('file', 'fileName', 'file_name', 'filename')
  206. for idp in idps:
  207. if idp['kind'] == 'HTPasswdPasswordIdentityProvider':
  208. for old_key in old_keys:
  209. if old_key in idp is not None:
  210. raise errors.AnsibleModuleError(
  211. 'openshift_master_identity_providers contains a '
  212. 'provider of kind==HTPasswdPasswordIdentityProvider '
  213. 'and {} is set. Please migrate your htpasswd '
  214. 'files to /etc/origin/master/htpasswd and update your '
  215. 'existing master configs, and remove the {} key'
  216. 'before proceeding.'.format(old_key, old_key))
  217. def run_checks(self, hostvars, host):
  218. """Execute the hostvars validations against host"""
  219. distro = self.template_var(hostvars, host, 'ansible_distribution')
  220. odt = self.check_openshift_deployment_type(hostvars, host)
  221. self.check_python_version(hostvars, host, distro)
  222. self.check_image_tag_format(hostvars, host, odt)
  223. self.no_origin_image_version(hostvars, host, odt)
  224. self.network_plugin_check(hostvars, host)
  225. self.check_hostname_vars(hostvars, host)
  226. self.check_supported_ocp_version(hostvars, host, odt)
  227. self.check_session_auth_secrets(hostvars, host)
  228. self.check_unsupported_nfs_configs(hostvars, host)
  229. self.check_htpasswd_provider(hostvars, host)
  230. def run(self, tmp=None, task_vars=None):
  231. result = super(ActionModule, self).run(tmp, task_vars)
  232. # self.task_vars holds all in-scope variables.
  233. # Ignore settting self.task_vars outside of init.
  234. # pylint: disable=W0201
  235. self.task_vars = task_vars or {}
  236. # pylint: disable=W0201
  237. self.last_checked_host = "none"
  238. # pylint: disable=W0201
  239. self.last_checked_var = "none"
  240. # self._task.args holds task parameters.
  241. # check_hosts is a parameter to this plugin, and should provide
  242. # a list of hosts.
  243. check_hosts = self._task.args.get('check_hosts')
  244. if not check_hosts:
  245. msg = "check_hosts is required"
  246. raise errors.AnsibleModuleError(msg)
  247. # We need to access each host's variables
  248. hostvars = self.task_vars.get('hostvars')
  249. if not hostvars:
  250. msg = hostvars
  251. raise errors.AnsibleModuleError(msg)
  252. # We loop through each host in the provided list check_hosts
  253. for host in check_hosts:
  254. try:
  255. self.run_checks(hostvars, host)
  256. except Exception as uncaught_e:
  257. msg = "last_checked_host: {}, last_checked_var: {};"
  258. msg = msg.format(self.last_checked_host, self.last_checked_var)
  259. msg += str(uncaught_e)
  260. raise errors.AnsibleModuleError(msg)
  261. result["changed"] = False
  262. result["failed"] = False
  263. result["msg"] = "Sanity Checks passed"
  264. return result