oc_adm_policy_group.py 67 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923192419251926192719281929193019311932193319341935193619371938193919401941194219431944194519461947194819491950195119521953195419551956195719581959196019611962196319641965196619671968196919701971197219731974197519761977197819791980198119821983198419851986198719881989199019911992199319941995199619971998199920002001200220032004200520062007200820092010201120122013201420152016201720182019202020212022202320242025202620272028202920302031203220332034203520362037203820392040204120422043204420452046204720482049205020512052205320542055205620572058205920602061206220632064206520662067206820692070207120722073207420752076207720782079208020812082208320842085208620872088208920902091209220932094209520962097209820992100
  1. #!/usr/bin/env python
  2. # pylint: disable=missing-docstring
  3. # flake8: noqa: T001
  4. # ___ ___ _ _ ___ ___ _ _____ ___ ___
  5. # / __| __| \| | __| _ \ /_\_ _| __| \
  6. # | (_ | _|| .` | _|| / / _ \| | | _|| |) |
  7. # \___|___|_|\_|___|_|_\/_/_\_\_|_|___|___/_ _____
  8. # | \ / _ \ | \| |/ _ \_ _| | __| \_ _|_ _|
  9. # | |) | (_) | | .` | (_) || | | _|| |) | | | |
  10. # |___/ \___/ |_|\_|\___/ |_| |___|___/___| |_|
  11. #
  12. # Copyright 2016 Red Hat, Inc. and/or its affiliates
  13. # and other contributors as indicated by the @author tags.
  14. #
  15. # Licensed under the Apache License, Version 2.0 (the "License");
  16. # you may not use this file except in compliance with the License.
  17. # You may obtain a copy of the License at
  18. #
  19. # http://www.apache.org/licenses/LICENSE-2.0
  20. #
  21. # Unless required by applicable law or agreed to in writing, software
  22. # distributed under the License is distributed on an "AS IS" BASIS,
  23. # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  24. # See the License for the specific language governing permissions and
  25. # limitations under the License.
  26. #
  27. # -*- -*- -*- Begin included fragment: lib/import.py -*- -*- -*-
  28. '''
  29. OpenShiftCLI class that wraps the oc commands in a subprocess
  30. '''
  31. # pylint: disable=too-many-lines
  32. from __future__ import print_function
  33. import atexit
  34. import copy
  35. import json
  36. import os
  37. import re
  38. import shutil
  39. import subprocess
  40. import tempfile
  41. # pylint: disable=import-error
  42. try:
  43. import ruamel.yaml as yaml
  44. except ImportError:
  45. import yaml
  46. from ansible.module_utils.basic import AnsibleModule
  47. # -*- -*- -*- End included fragment: lib/import.py -*- -*- -*-
  48. # -*- -*- -*- Begin included fragment: doc/policy_group -*- -*- -*-
  49. DOCUMENTATION = '''
  50. ---
  51. module: oc_adm_policy_group
  52. short_description: Module to manage openshift policy for groups
  53. description:
  54. - Manage openshift policy for groups.
  55. options:
  56. kubeconfig:
  57. description:
  58. - The path for the kubeconfig file to use for authentication
  59. required: false
  60. default: /etc/origin/master/admin.kubeconfig
  61. aliases: []
  62. namespace:
  63. description:
  64. - The namespace scope
  65. required: false
  66. default: None
  67. aliases: []
  68. debug:
  69. description:
  70. - Turn on debug output.
  71. required: false
  72. default: False
  73. aliases: []
  74. group:
  75. description:
  76. - The name of the group
  77. required: true
  78. default: None
  79. aliases: []
  80. resource_kind:
  81. description:
  82. - The kind of policy to affect
  83. required: true
  84. default: None
  85. choices: ["role", "cluster-role", "scc"]
  86. aliases: []
  87. resource_name:
  88. description:
  89. - The name of the policy
  90. required: true
  91. default: None
  92. aliases: []
  93. state:
  94. description:
  95. - Desired state of the policy
  96. required: true
  97. default: present
  98. choices: ["present", "absent"]
  99. aliases: []
  100. author:
  101. - "Kenny Woodson <kwoodson@redhat.com>"
  102. extends_documentation_fragment: []
  103. '''
  104. EXAMPLES = '''
  105. - name: oc adm policy remove-scc-from-group an-scc agroup
  106. oc_adm_policy_group:
  107. group: agroup
  108. resource_kind: scc
  109. resource_name: an-scc
  110. state: absent
  111. - name: oc adm policy add-cluster-role-to-group system:build-strategy-docker agroup
  112. oc_adm_policy_group:
  113. group: agroup
  114. resource_kind: cluster-role
  115. resource_name: system:build-strategy-docker
  116. state: present
  117. '''
  118. # -*- -*- -*- End included fragment: doc/policy_group -*- -*- -*-
  119. # -*- -*- -*- Begin included fragment: ../../lib_utils/src/class/yedit.py -*- -*- -*-
  120. # pylint: disable=undefined-variable,missing-docstring
  121. # noqa: E301,E302
  122. class YeditException(Exception):
  123. ''' Exception class for Yedit '''
  124. pass
  125. # pylint: disable=too-many-public-methods
  126. class Yedit(object):
  127. ''' Class to modify yaml files '''
  128. re_valid_key = r"(((\[-?\d+\])|([0-9a-zA-Z%s/_-]+)).?)+$"
  129. re_key = r"(?:\[(-?\d+)\])|([0-9a-zA-Z%s/_-]+)"
  130. com_sep = set(['.', '#', '|', ':'])
  131. # pylint: disable=too-many-arguments
  132. def __init__(self,
  133. filename=None,
  134. content=None,
  135. content_type='yaml',
  136. separator='.',
  137. backup=False):
  138. self.content = content
  139. self._separator = separator
  140. self.filename = filename
  141. self.__yaml_dict = content
  142. self.content_type = content_type
  143. self.backup = backup
  144. self.load(content_type=self.content_type)
  145. if self.__yaml_dict is None:
  146. self.__yaml_dict = {}
  147. @property
  148. def separator(self):
  149. ''' getter method for yaml_dict '''
  150. return self._separator
  151. @separator.setter
  152. def separator(self):
  153. ''' getter method for yaml_dict '''
  154. return self._separator
  155. @property
  156. def yaml_dict(self):
  157. ''' getter method for yaml_dict '''
  158. return self.__yaml_dict
  159. @yaml_dict.setter
  160. def yaml_dict(self, value):
  161. ''' setter method for yaml_dict '''
  162. self.__yaml_dict = value
  163. @staticmethod
  164. def parse_key(key, sep='.'):
  165. '''parse the key allowing the appropriate separator'''
  166. common_separators = list(Yedit.com_sep - set([sep]))
  167. return re.findall(Yedit.re_key % ''.join(common_separators), key)
  168. @staticmethod
  169. def valid_key(key, sep='.'):
  170. '''validate the incoming key'''
  171. common_separators = list(Yedit.com_sep - set([sep]))
  172. if not re.match(Yedit.re_valid_key % ''.join(common_separators), key):
  173. return False
  174. return True
  175. @staticmethod
  176. def remove_entry(data, key, sep='.'):
  177. ''' remove data at location key '''
  178. if key == '' and isinstance(data, dict):
  179. data.clear()
  180. return True
  181. elif key == '' and isinstance(data, list):
  182. del data[:]
  183. return True
  184. if not (key and Yedit.valid_key(key, sep)) and \
  185. isinstance(data, (list, dict)):
  186. return None
  187. key_indexes = Yedit.parse_key(key, sep)
  188. for arr_ind, dict_key in key_indexes[:-1]:
  189. if dict_key and isinstance(data, dict):
  190. data = data.get(dict_key, None)
  191. elif (arr_ind and isinstance(data, list) and
  192. int(arr_ind) <= len(data) - 1):
  193. data = data[int(arr_ind)]
  194. else:
  195. return None
  196. # process last index for remove
  197. # expected list entry
  198. if key_indexes[-1][0]:
  199. if isinstance(data, list) and int(key_indexes[-1][0]) <= len(data) - 1: # noqa: E501
  200. del data[int(key_indexes[-1][0])]
  201. return True
  202. # expected dict entry
  203. elif key_indexes[-1][1]:
  204. if isinstance(data, dict):
  205. del data[key_indexes[-1][1]]
  206. return True
  207. @staticmethod
  208. def add_entry(data, key, item=None, sep='.'):
  209. ''' Get an item from a dictionary with key notation a.b.c
  210. d = {'a': {'b': 'c'}}}
  211. key = a#b
  212. return c
  213. '''
  214. if key == '':
  215. pass
  216. elif (not (key and Yedit.valid_key(key, sep)) and
  217. isinstance(data, (list, dict))):
  218. return None
  219. key_indexes = Yedit.parse_key(key, sep)
  220. for arr_ind, dict_key in key_indexes[:-1]:
  221. if dict_key:
  222. if isinstance(data, dict) and dict_key in data and data[dict_key]: # noqa: E501
  223. data = data[dict_key]
  224. continue
  225. elif data and not isinstance(data, dict):
  226. raise YeditException("Unexpected item type found while going through key " +
  227. "path: {} (at key: {})".format(key, dict_key))
  228. data[dict_key] = {}
  229. data = data[dict_key]
  230. elif (arr_ind and isinstance(data, list) and
  231. int(arr_ind) <= len(data) - 1):
  232. data = data[int(arr_ind)]
  233. else:
  234. raise YeditException("Unexpected item type found while going through key path: {}".format(key))
  235. if key == '':
  236. data = item
  237. # process last index for add
  238. # expected list entry
  239. elif key_indexes[-1][0] and isinstance(data, list) and int(key_indexes[-1][0]) <= len(data) - 1: # noqa: E501
  240. data[int(key_indexes[-1][0])] = item
  241. # expected dict entry
  242. elif key_indexes[-1][1] and isinstance(data, dict):
  243. data[key_indexes[-1][1]] = item
  244. # didn't add/update to an existing list, nor add/update key to a dict
  245. # so we must have been provided some syntax like a.b.c[<int>] = "data" for a
  246. # non-existent array
  247. else:
  248. raise YeditException("Error adding to object at path: {}".format(key))
  249. return data
  250. @staticmethod
  251. def get_entry(data, key, sep='.'):
  252. ''' Get an item from a dictionary with key notation a.b.c
  253. d = {'a': {'b': 'c'}}}
  254. key = a.b
  255. return c
  256. '''
  257. if key == '':
  258. pass
  259. elif (not (key and Yedit.valid_key(key, sep)) and
  260. isinstance(data, (list, dict))):
  261. return None
  262. key_indexes = Yedit.parse_key(key, sep)
  263. for arr_ind, dict_key in key_indexes:
  264. if dict_key and isinstance(data, dict):
  265. data = data.get(dict_key, None)
  266. elif (arr_ind and isinstance(data, list) and
  267. int(arr_ind) <= len(data) - 1):
  268. data = data[int(arr_ind)]
  269. else:
  270. return None
  271. return data
  272. @staticmethod
  273. def _write(filename, contents):
  274. ''' Actually write the file contents to disk. This helps with mocking. '''
  275. tmp_filename = filename + '.yedit'
  276. with open(tmp_filename, 'w') as yfd:
  277. yfd.write(contents)
  278. os.rename(tmp_filename, filename)
  279. def write(self):
  280. ''' write to file '''
  281. if not self.filename:
  282. raise YeditException('Please specify a filename.')
  283. if self.backup and self.file_exists():
  284. shutil.copy(self.filename, self.filename + '.orig')
  285. # Try to set format attributes if supported
  286. try:
  287. self.yaml_dict.fa.set_block_style()
  288. except AttributeError:
  289. pass
  290. # Try to use RoundTripDumper if supported.
  291. try:
  292. Yedit._write(self.filename, yaml.dump(self.yaml_dict, Dumper=yaml.RoundTripDumper))
  293. except AttributeError:
  294. Yedit._write(self.filename, yaml.safe_dump(self.yaml_dict, default_flow_style=False))
  295. return (True, self.yaml_dict)
  296. def read(self):
  297. ''' read from file '''
  298. # check if it exists
  299. if self.filename is None or not self.file_exists():
  300. return None
  301. contents = None
  302. with open(self.filename) as yfd:
  303. contents = yfd.read()
  304. return contents
  305. def file_exists(self):
  306. ''' return whether file exists '''
  307. if os.path.exists(self.filename):
  308. return True
  309. return False
  310. def load(self, content_type='yaml'):
  311. ''' return yaml file '''
  312. contents = self.read()
  313. if not contents and not self.content:
  314. return None
  315. if self.content:
  316. if isinstance(self.content, dict):
  317. self.yaml_dict = self.content
  318. return self.yaml_dict
  319. elif isinstance(self.content, str):
  320. contents = self.content
  321. # check if it is yaml
  322. try:
  323. if content_type == 'yaml' and contents:
  324. # Try to set format attributes if supported
  325. try:
  326. self.yaml_dict.fa.set_block_style()
  327. except AttributeError:
  328. pass
  329. # Try to use RoundTripLoader if supported.
  330. try:
  331. self.yaml_dict = yaml.safe_load(contents, yaml.RoundTripLoader)
  332. except AttributeError:
  333. self.yaml_dict = yaml.safe_load(contents)
  334. # Try to set format attributes if supported
  335. try:
  336. self.yaml_dict.fa.set_block_style()
  337. except AttributeError:
  338. pass
  339. elif content_type == 'json' and contents:
  340. self.yaml_dict = json.loads(contents)
  341. except yaml.YAMLError as err:
  342. # Error loading yaml or json
  343. raise YeditException('Problem with loading yaml file. %s' % err)
  344. return self.yaml_dict
  345. def get(self, key):
  346. ''' get a specified key'''
  347. try:
  348. entry = Yedit.get_entry(self.yaml_dict, key, self.separator)
  349. except KeyError:
  350. entry = None
  351. return entry
  352. def pop(self, path, key_or_item):
  353. ''' remove a key, value pair from a dict or an item for a list'''
  354. try:
  355. entry = Yedit.get_entry(self.yaml_dict, path, self.separator)
  356. except KeyError:
  357. entry = None
  358. if entry is None:
  359. return (False, self.yaml_dict)
  360. if isinstance(entry, dict):
  361. # AUDIT:maybe-no-member makes sense due to fuzzy types
  362. # pylint: disable=maybe-no-member
  363. if key_or_item in entry:
  364. entry.pop(key_or_item)
  365. return (True, self.yaml_dict)
  366. return (False, self.yaml_dict)
  367. elif isinstance(entry, list):
  368. # AUDIT:maybe-no-member makes sense due to fuzzy types
  369. # pylint: disable=maybe-no-member
  370. ind = None
  371. try:
  372. ind = entry.index(key_or_item)
  373. except ValueError:
  374. return (False, self.yaml_dict)
  375. entry.pop(ind)
  376. return (True, self.yaml_dict)
  377. return (False, self.yaml_dict)
  378. def delete(self, path):
  379. ''' remove path from a dict'''
  380. try:
  381. entry = Yedit.get_entry(self.yaml_dict, path, self.separator)
  382. except KeyError:
  383. entry = None
  384. if entry is None:
  385. return (False, self.yaml_dict)
  386. result = Yedit.remove_entry(self.yaml_dict, path, self.separator)
  387. if not result:
  388. return (False, self.yaml_dict)
  389. return (True, self.yaml_dict)
  390. def exists(self, path, value):
  391. ''' check if value exists at path'''
  392. try:
  393. entry = Yedit.get_entry(self.yaml_dict, path, self.separator)
  394. except KeyError:
  395. entry = None
  396. if isinstance(entry, list):
  397. if value in entry:
  398. return True
  399. return False
  400. elif isinstance(entry, dict):
  401. if isinstance(value, dict):
  402. rval = False
  403. for key, val in value.items():
  404. if entry[key] != val:
  405. rval = False
  406. break
  407. else:
  408. rval = True
  409. return rval
  410. return value in entry
  411. return entry == value
  412. def append(self, path, value):
  413. '''append value to a list'''
  414. try:
  415. entry = Yedit.get_entry(self.yaml_dict, path, self.separator)
  416. except KeyError:
  417. entry = None
  418. if entry is None:
  419. self.put(path, [])
  420. entry = Yedit.get_entry(self.yaml_dict, path, self.separator)
  421. if not isinstance(entry, list):
  422. return (False, self.yaml_dict)
  423. # AUDIT:maybe-no-member makes sense due to loading data from
  424. # a serialized format.
  425. # pylint: disable=maybe-no-member
  426. entry.append(value)
  427. return (True, self.yaml_dict)
  428. # pylint: disable=too-many-arguments
  429. def update(self, path, value, index=None, curr_value=None):
  430. ''' put path, value into a dict '''
  431. try:
  432. entry = Yedit.get_entry(self.yaml_dict, path, self.separator)
  433. except KeyError:
  434. entry = None
  435. if isinstance(entry, dict):
  436. # AUDIT:maybe-no-member makes sense due to fuzzy types
  437. # pylint: disable=maybe-no-member
  438. if not isinstance(value, dict):
  439. raise YeditException('Cannot replace key, value entry in ' +
  440. 'dict with non-dict type. value=[%s] [%s]' % (value, type(value))) # noqa: E501
  441. entry.update(value)
  442. return (True, self.yaml_dict)
  443. elif isinstance(entry, list):
  444. # AUDIT:maybe-no-member makes sense due to fuzzy types
  445. # pylint: disable=maybe-no-member
  446. ind = None
  447. if curr_value:
  448. try:
  449. ind = entry.index(curr_value)
  450. except ValueError:
  451. return (False, self.yaml_dict)
  452. elif index is not None:
  453. ind = index
  454. if ind is not None and entry[ind] != value:
  455. entry[ind] = value
  456. return (True, self.yaml_dict)
  457. # see if it exists in the list
  458. try:
  459. ind = entry.index(value)
  460. except ValueError:
  461. # doesn't exist, append it
  462. entry.append(value)
  463. return (True, self.yaml_dict)
  464. # already exists, return
  465. if ind is not None:
  466. return (False, self.yaml_dict)
  467. return (False, self.yaml_dict)
  468. def put(self, path, value):
  469. ''' put path, value into a dict '''
  470. try:
  471. entry = Yedit.get_entry(self.yaml_dict, path, self.separator)
  472. except KeyError:
  473. entry = None
  474. if entry == value:
  475. return (False, self.yaml_dict)
  476. # deepcopy didn't work
  477. # Try to use ruamel.yaml and fallback to pyyaml
  478. try:
  479. tmp_copy = yaml.load(yaml.round_trip_dump(self.yaml_dict,
  480. default_flow_style=False),
  481. yaml.RoundTripLoader)
  482. except AttributeError:
  483. tmp_copy = copy.deepcopy(self.yaml_dict)
  484. # set the format attributes if available
  485. try:
  486. tmp_copy.fa.set_block_style()
  487. except AttributeError:
  488. pass
  489. result = Yedit.add_entry(tmp_copy, path, value, self.separator)
  490. if not result:
  491. return (False, self.yaml_dict)
  492. self.yaml_dict = tmp_copy
  493. return (True, self.yaml_dict)
  494. def create(self, path, value):
  495. ''' create a yaml file '''
  496. if not self.file_exists():
  497. # deepcopy didn't work
  498. # Try to use ruamel.yaml and fallback to pyyaml
  499. try:
  500. tmp_copy = yaml.load(yaml.round_trip_dump(self.yaml_dict,
  501. default_flow_style=False),
  502. yaml.RoundTripLoader)
  503. except AttributeError:
  504. tmp_copy = copy.deepcopy(self.yaml_dict)
  505. # set the format attributes if available
  506. try:
  507. tmp_copy.fa.set_block_style()
  508. except AttributeError:
  509. pass
  510. result = Yedit.add_entry(tmp_copy, path, value, self.separator)
  511. if result:
  512. self.yaml_dict = tmp_copy
  513. return (True, self.yaml_dict)
  514. return (False, self.yaml_dict)
  515. @staticmethod
  516. def get_curr_value(invalue, val_type):
  517. '''return the current value'''
  518. if invalue is None:
  519. return None
  520. curr_value = invalue
  521. if val_type == 'yaml':
  522. curr_value = yaml.load(invalue)
  523. elif val_type == 'json':
  524. curr_value = json.loads(invalue)
  525. return curr_value
  526. @staticmethod
  527. def parse_value(inc_value, vtype=''):
  528. '''determine value type passed'''
  529. true_bools = ['y', 'Y', 'yes', 'Yes', 'YES', 'true', 'True', 'TRUE',
  530. 'on', 'On', 'ON', ]
  531. false_bools = ['n', 'N', 'no', 'No', 'NO', 'false', 'False', 'FALSE',
  532. 'off', 'Off', 'OFF']
  533. # It came in as a string but you didn't specify value_type as string
  534. # we will convert to bool if it matches any of the above cases
  535. if isinstance(inc_value, str) and 'bool' in vtype:
  536. if inc_value not in true_bools and inc_value not in false_bools:
  537. raise YeditException('Not a boolean type. str=[%s] vtype=[%s]'
  538. % (inc_value, vtype))
  539. elif isinstance(inc_value, bool) and 'str' in vtype:
  540. inc_value = str(inc_value)
  541. # If vtype is not str then go ahead and attempt to yaml load it.
  542. if isinstance(inc_value, str) and 'str' not in vtype:
  543. try:
  544. inc_value = yaml.load(inc_value)
  545. except Exception:
  546. raise YeditException('Could not determine type of incoming ' +
  547. 'value. value=[%s] vtype=[%s]'
  548. % (type(inc_value), vtype))
  549. return inc_value
  550. # pylint: disable=too-many-return-statements,too-many-branches
  551. @staticmethod
  552. def run_ansible(module):
  553. '''perform the idempotent crud operations'''
  554. yamlfile = Yedit(filename=module.params['src'],
  555. backup=module.params['backup'],
  556. separator=module.params['separator'])
  557. if module.params['src']:
  558. rval = yamlfile.load()
  559. if yamlfile.yaml_dict is None and \
  560. module.params['state'] != 'present':
  561. return {'failed': True,
  562. 'msg': 'Error opening file [%s]. Verify that the ' +
  563. 'file exists, that it is has correct' +
  564. ' permissions, and is valid yaml.'}
  565. if module.params['state'] == 'list':
  566. if module.params['content']:
  567. content = Yedit.parse_value(module.params['content'],
  568. module.params['content_type'])
  569. yamlfile.yaml_dict = content
  570. if module.params['key']:
  571. rval = yamlfile.get(module.params['key']) or {}
  572. return {'changed': False, 'result': rval, 'state': "list"}
  573. elif module.params['state'] == 'absent':
  574. if module.params['content']:
  575. content = Yedit.parse_value(module.params['content'],
  576. module.params['content_type'])
  577. yamlfile.yaml_dict = content
  578. if module.params['update']:
  579. rval = yamlfile.pop(module.params['key'],
  580. module.params['value'])
  581. else:
  582. rval = yamlfile.delete(module.params['key'])
  583. if rval[0] and module.params['src']:
  584. yamlfile.write()
  585. return {'changed': rval[0], 'result': rval[1], 'state': "absent"}
  586. elif module.params['state'] == 'present':
  587. # check if content is different than what is in the file
  588. if module.params['content']:
  589. content = Yedit.parse_value(module.params['content'],
  590. module.params['content_type'])
  591. # We had no edits to make and the contents are the same
  592. if yamlfile.yaml_dict == content and \
  593. module.params['value'] is None:
  594. return {'changed': False,
  595. 'result': yamlfile.yaml_dict,
  596. 'state': "present"}
  597. yamlfile.yaml_dict = content
  598. # we were passed a value; parse it
  599. if module.params['value']:
  600. value = Yedit.parse_value(module.params['value'],
  601. module.params['value_type'])
  602. key = module.params['key']
  603. if module.params['update']:
  604. # pylint: disable=line-too-long
  605. curr_value = Yedit.get_curr_value(Yedit.parse_value(module.params['curr_value']), # noqa: E501
  606. module.params['curr_value_format']) # noqa: E501
  607. rval = yamlfile.update(key, value, module.params['index'], curr_value) # noqa: E501
  608. elif module.params['append']:
  609. rval = yamlfile.append(key, value)
  610. else:
  611. rval = yamlfile.put(key, value)
  612. if rval[0] and module.params['src']:
  613. yamlfile.write()
  614. return {'changed': rval[0],
  615. 'result': rval[1], 'state': "present"}
  616. # no edits to make
  617. if module.params['src']:
  618. # pylint: disable=redefined-variable-type
  619. rval = yamlfile.write()
  620. return {'changed': rval[0],
  621. 'result': rval[1],
  622. 'state': "present"}
  623. return {'failed': True, 'msg': 'Unkown state passed'}
  624. # -*- -*- -*- End included fragment: ../../lib_utils/src/class/yedit.py -*- -*- -*-
  625. # -*- -*- -*- Begin included fragment: lib/base.py -*- -*- -*-
  626. # pylint: disable=too-many-lines
  627. # noqa: E301,E302,E303,T001
  628. class OpenShiftCLIError(Exception):
  629. '''Exception class for openshiftcli'''
  630. pass
  631. ADDITIONAL_PATH_LOOKUPS = ['/usr/local/bin', os.path.expanduser('~/bin')]
  632. def locate_oc_binary():
  633. ''' Find and return oc binary file '''
  634. # https://github.com/openshift/openshift-ansible/issues/3410
  635. # oc can be in /usr/local/bin in some cases, but that may not
  636. # be in $PATH due to ansible/sudo
  637. paths = os.environ.get("PATH", os.defpath).split(os.pathsep) + ADDITIONAL_PATH_LOOKUPS
  638. oc_binary = 'oc'
  639. # Use shutil.which if it is available, otherwise fallback to a naive path search
  640. try:
  641. which_result = shutil.which(oc_binary, path=os.pathsep.join(paths))
  642. if which_result is not None:
  643. oc_binary = which_result
  644. except AttributeError:
  645. for path in paths:
  646. if os.path.exists(os.path.join(path, oc_binary)):
  647. oc_binary = os.path.join(path, oc_binary)
  648. break
  649. return oc_binary
  650. # pylint: disable=too-few-public-methods
  651. class OpenShiftCLI(object):
  652. ''' Class to wrap the command line tools '''
  653. def __init__(self,
  654. namespace,
  655. kubeconfig='/etc/origin/master/admin.kubeconfig',
  656. verbose=False,
  657. all_namespaces=False):
  658. ''' Constructor for OpenshiftCLI '''
  659. self.namespace = namespace
  660. self.verbose = verbose
  661. self.kubeconfig = Utils.create_tmpfile_copy(kubeconfig)
  662. self.all_namespaces = all_namespaces
  663. self.oc_binary = locate_oc_binary()
  664. # Pylint allows only 5 arguments to be passed.
  665. # pylint: disable=too-many-arguments
  666. def _replace_content(self, resource, rname, content, force=False, sep='.'):
  667. ''' replace the current object with the content '''
  668. res = self._get(resource, rname)
  669. if not res['results']:
  670. return res
  671. fname = Utils.create_tmpfile(rname + '-')
  672. yed = Yedit(fname, res['results'][0], separator=sep)
  673. changes = []
  674. for key, value in content.items():
  675. changes.append(yed.put(key, value))
  676. if any([change[0] for change in changes]):
  677. yed.write()
  678. atexit.register(Utils.cleanup, [fname])
  679. return self._replace(fname, force)
  680. return {'returncode': 0, 'updated': False}
  681. def _replace(self, fname, force=False):
  682. '''replace the current object with oc replace'''
  683. cmd = ['replace', '-f', fname]
  684. if force:
  685. cmd.append('--force')
  686. return self.openshift_cmd(cmd)
  687. def _create_from_content(self, rname, content):
  688. '''create a temporary file and then call oc create on it'''
  689. fname = Utils.create_tmpfile(rname + '-')
  690. yed = Yedit(fname, content=content)
  691. yed.write()
  692. atexit.register(Utils.cleanup, [fname])
  693. return self._create(fname)
  694. def _create(self, fname):
  695. '''call oc create on a filename'''
  696. return self.openshift_cmd(['create', '-f', fname])
  697. def _delete(self, resource, rname, selector=None):
  698. '''call oc delete on a resource'''
  699. cmd = ['delete', resource, rname]
  700. if selector:
  701. cmd.append('--selector=%s' % selector)
  702. return self.openshift_cmd(cmd)
  703. def _process(self, template_name, create=False, params=None, template_data=None): # noqa: E501
  704. '''process a template
  705. template_name: the name of the template to process
  706. create: whether to send to oc create after processing
  707. params: the parameters for the template
  708. template_data: the incoming template's data; instead of a file
  709. '''
  710. cmd = ['process']
  711. if template_data:
  712. cmd.extend(['-f', '-'])
  713. else:
  714. cmd.append(template_name)
  715. if params:
  716. param_str = ["%s=%s" % (key, value) for key, value in params.items()]
  717. cmd.append('-v')
  718. cmd.extend(param_str)
  719. results = self.openshift_cmd(cmd, output=True, input_data=template_data)
  720. if results['returncode'] != 0 or not create:
  721. return results
  722. fname = Utils.create_tmpfile(template_name + '-')
  723. yed = Yedit(fname, results['results'])
  724. yed.write()
  725. atexit.register(Utils.cleanup, [fname])
  726. return self.openshift_cmd(['create', '-f', fname])
  727. def _get(self, resource, rname=None, selector=None):
  728. '''return a resource by name '''
  729. cmd = ['get', resource]
  730. if selector:
  731. cmd.append('--selector=%s' % selector)
  732. elif rname:
  733. cmd.append(rname)
  734. cmd.extend(['-o', 'json'])
  735. rval = self.openshift_cmd(cmd, output=True)
  736. # Ensure results are retuned in an array
  737. if 'items' in rval:
  738. rval['results'] = rval['items']
  739. elif not isinstance(rval['results'], list):
  740. rval['results'] = [rval['results']]
  741. return rval
  742. def _schedulable(self, node=None, selector=None, schedulable=True):
  743. ''' perform oadm manage-node scheduable '''
  744. cmd = ['manage-node']
  745. if node:
  746. cmd.extend(node)
  747. else:
  748. cmd.append('--selector=%s' % selector)
  749. cmd.append('--schedulable=%s' % schedulable)
  750. return self.openshift_cmd(cmd, oadm=True, output=True, output_type='raw') # noqa: E501
  751. def _list_pods(self, node=None, selector=None, pod_selector=None):
  752. ''' perform oadm list pods
  753. node: the node in which to list pods
  754. selector: the label selector filter if provided
  755. pod_selector: the pod selector filter if provided
  756. '''
  757. cmd = ['manage-node']
  758. if node:
  759. cmd.extend(node)
  760. else:
  761. cmd.append('--selector=%s' % selector)
  762. if pod_selector:
  763. cmd.append('--pod-selector=%s' % pod_selector)
  764. cmd.extend(['--list-pods', '-o', 'json'])
  765. return self.openshift_cmd(cmd, oadm=True, output=True, output_type='raw')
  766. # pylint: disable=too-many-arguments
  767. def _evacuate(self, node=None, selector=None, pod_selector=None, dry_run=False, grace_period=None, force=False):
  768. ''' perform oadm manage-node evacuate '''
  769. cmd = ['manage-node']
  770. if node:
  771. cmd.extend(node)
  772. else:
  773. cmd.append('--selector=%s' % selector)
  774. if dry_run:
  775. cmd.append('--dry-run')
  776. if pod_selector:
  777. cmd.append('--pod-selector=%s' % pod_selector)
  778. if grace_period:
  779. cmd.append('--grace-period=%s' % int(grace_period))
  780. if force:
  781. cmd.append('--force')
  782. cmd.append('--evacuate')
  783. return self.openshift_cmd(cmd, oadm=True, output=True, output_type='raw')
  784. def _version(self):
  785. ''' return the openshift version'''
  786. return self.openshift_cmd(['version'], output=True, output_type='raw')
  787. def _import_image(self, url=None, name=None, tag=None):
  788. ''' perform image import '''
  789. cmd = ['import-image']
  790. image = '{0}'.format(name)
  791. if tag:
  792. image += ':{0}'.format(tag)
  793. cmd.append(image)
  794. if url:
  795. cmd.append('--from={0}/{1}'.format(url, image))
  796. cmd.append('-n{0}'.format(self.namespace))
  797. cmd.append('--confirm')
  798. return self.openshift_cmd(cmd)
  799. def _run(self, cmds, input_data):
  800. ''' Actually executes the command. This makes mocking easier. '''
  801. curr_env = os.environ.copy()
  802. curr_env.update({'KUBECONFIG': self.kubeconfig})
  803. proc = subprocess.Popen(cmds,
  804. stdin=subprocess.PIPE,
  805. stdout=subprocess.PIPE,
  806. stderr=subprocess.PIPE,
  807. env=curr_env)
  808. stdout, stderr = proc.communicate(input_data)
  809. return proc.returncode, stdout.decode(), stderr.decode()
  810. # pylint: disable=too-many-arguments,too-many-branches
  811. def openshift_cmd(self, cmd, oadm=False, output=False, output_type='json', input_data=None):
  812. '''Base command for oc '''
  813. cmds = [self.oc_binary]
  814. if oadm:
  815. cmds.append('adm')
  816. cmds.extend(cmd)
  817. if self.all_namespaces:
  818. cmds.extend(['--all-namespaces'])
  819. elif self.namespace is not None and self.namespace.lower() not in ['none', 'emtpy']: # E501
  820. cmds.extend(['-n', self.namespace])
  821. rval = {}
  822. results = ''
  823. err = None
  824. if self.verbose:
  825. print(' '.join(cmds))
  826. try:
  827. returncode, stdout, stderr = self._run(cmds, input_data)
  828. except OSError as ex:
  829. returncode, stdout, stderr = 1, '', 'Failed to execute {}: {}'.format(subprocess.list2cmdline(cmds), ex)
  830. rval = {"returncode": returncode,
  831. "results": results,
  832. "cmd": ' '.join(cmds)}
  833. if returncode == 0:
  834. if output:
  835. if output_type == 'json':
  836. try:
  837. rval['results'] = json.loads(stdout)
  838. except ValueError as err:
  839. if "No JSON object could be decoded" in err.args:
  840. err = err.args
  841. elif output_type == 'raw':
  842. rval['results'] = stdout
  843. if self.verbose:
  844. print("STDOUT: {0}".format(stdout))
  845. print("STDERR: {0}".format(stderr))
  846. if err:
  847. rval.update({"err": err,
  848. "stderr": stderr,
  849. "stdout": stdout,
  850. "cmd": cmds})
  851. else:
  852. rval.update({"stderr": stderr,
  853. "stdout": stdout,
  854. "results": {}})
  855. return rval
  856. class Utils(object):
  857. ''' utilities for openshiftcli modules '''
  858. @staticmethod
  859. def _write(filename, contents):
  860. ''' Actually write the file contents to disk. This helps with mocking. '''
  861. with open(filename, 'w') as sfd:
  862. sfd.write(contents)
  863. @staticmethod
  864. def create_tmp_file_from_contents(rname, data, ftype='yaml'):
  865. ''' create a file in tmp with name and contents'''
  866. tmp = Utils.create_tmpfile(prefix=rname)
  867. if ftype == 'yaml':
  868. # AUDIT:no-member makes sense here due to ruamel.YAML/PyYAML usage
  869. # pylint: disable=no-member
  870. if hasattr(yaml, 'RoundTripDumper'):
  871. Utils._write(tmp, yaml.dump(data, Dumper=yaml.RoundTripDumper))
  872. else:
  873. Utils._write(tmp, yaml.safe_dump(data, default_flow_style=False))
  874. elif ftype == 'json':
  875. Utils._write(tmp, json.dumps(data))
  876. else:
  877. Utils._write(tmp, data)
  878. # Register cleanup when module is done
  879. atexit.register(Utils.cleanup, [tmp])
  880. return tmp
  881. @staticmethod
  882. def create_tmpfile_copy(inc_file):
  883. '''create a temporary copy of a file'''
  884. tmpfile = Utils.create_tmpfile('lib_openshift-')
  885. Utils._write(tmpfile, open(inc_file).read())
  886. # Cleanup the tmpfile
  887. atexit.register(Utils.cleanup, [tmpfile])
  888. return tmpfile
  889. @staticmethod
  890. def create_tmpfile(prefix='tmp'):
  891. ''' Generates and returns a temporary file name '''
  892. with tempfile.NamedTemporaryFile(prefix=prefix, delete=False) as tmp:
  893. return tmp.name
  894. @staticmethod
  895. def create_tmp_files_from_contents(content, content_type=None):
  896. '''Turn an array of dict: filename, content into a files array'''
  897. if not isinstance(content, list):
  898. content = [content]
  899. files = []
  900. for item in content:
  901. path = Utils.create_tmp_file_from_contents(item['path'] + '-',
  902. item['data'],
  903. ftype=content_type)
  904. files.append({'name': os.path.basename(item['path']),
  905. 'path': path})
  906. return files
  907. @staticmethod
  908. def cleanup(files):
  909. '''Clean up on exit '''
  910. for sfile in files:
  911. if os.path.exists(sfile):
  912. if os.path.isdir(sfile):
  913. shutil.rmtree(sfile)
  914. elif os.path.isfile(sfile):
  915. os.remove(sfile)
  916. @staticmethod
  917. def exists(results, _name):
  918. ''' Check to see if the results include the name '''
  919. if not results:
  920. return False
  921. if Utils.find_result(results, _name):
  922. return True
  923. return False
  924. @staticmethod
  925. def find_result(results, _name):
  926. ''' Find the specified result by name'''
  927. rval = None
  928. for result in results:
  929. if 'metadata' in result and result['metadata']['name'] == _name:
  930. rval = result
  931. break
  932. return rval
  933. @staticmethod
  934. def get_resource_file(sfile, sfile_type='yaml'):
  935. ''' return the service file '''
  936. contents = None
  937. with open(sfile) as sfd:
  938. contents = sfd.read()
  939. if sfile_type == 'yaml':
  940. # AUDIT:no-member makes sense here due to ruamel.YAML/PyYAML usage
  941. # pylint: disable=no-member
  942. if hasattr(yaml, 'RoundTripLoader'):
  943. contents = yaml.load(contents, yaml.RoundTripLoader)
  944. else:
  945. contents = yaml.safe_load(contents)
  946. elif sfile_type == 'json':
  947. contents = json.loads(contents)
  948. return contents
  949. @staticmethod
  950. def filter_versions(stdout):
  951. ''' filter the oc version output '''
  952. version_dict = {}
  953. version_search = ['oc', 'openshift', 'kubernetes']
  954. for line in stdout.strip().split('\n'):
  955. for term in version_search:
  956. if not line:
  957. continue
  958. if line.startswith(term):
  959. version_dict[term] = line.split()[-1]
  960. # horrible hack to get openshift version in Openshift 3.2
  961. # By default "oc version in 3.2 does not return an "openshift" version
  962. if "openshift" not in version_dict:
  963. version_dict["openshift"] = version_dict["oc"]
  964. return version_dict
  965. @staticmethod
  966. def add_custom_versions(versions):
  967. ''' create custom versions strings '''
  968. versions_dict = {}
  969. for tech, version in versions.items():
  970. # clean up "-" from version
  971. if "-" in version:
  972. version = version.split("-")[0]
  973. if version.startswith('v'):
  974. versions_dict[tech + '_numeric'] = version[1:].split('+')[0]
  975. # "v3.3.0.33" is what we have, we want "3.3"
  976. versions_dict[tech + '_short'] = version[1:4]
  977. return versions_dict
  978. @staticmethod
  979. def openshift_installed():
  980. ''' check if openshift is installed '''
  981. import yum
  982. yum_base = yum.YumBase()
  983. if yum_base.rpmdb.searchNevra(name='atomic-openshift'):
  984. return True
  985. return False
  986. # Disabling too-many-branches. This is a yaml dictionary comparison function
  987. # pylint: disable=too-many-branches,too-many-return-statements,too-many-statements
  988. @staticmethod
  989. def check_def_equal(user_def, result_def, skip_keys=None, debug=False):
  990. ''' Given a user defined definition, compare it with the results given back by our query. '''
  991. # Currently these values are autogenerated and we do not need to check them
  992. skip = ['metadata', 'status']
  993. if skip_keys:
  994. skip.extend(skip_keys)
  995. for key, value in result_def.items():
  996. if key in skip:
  997. continue
  998. # Both are lists
  999. if isinstance(value, list):
  1000. if key not in user_def:
  1001. if debug:
  1002. print('User data does not have key [%s]' % key)
  1003. print('User data: %s' % user_def)
  1004. return False
  1005. if not isinstance(user_def[key], list):
  1006. if debug:
  1007. print('user_def[key] is not a list key=[%s] user_def[key]=%s' % (key, user_def[key]))
  1008. return False
  1009. if len(user_def[key]) != len(value):
  1010. if debug:
  1011. print("List lengths are not equal.")
  1012. print("key=[%s]: user_def[%s] != value[%s]" % (key, len(user_def[key]), len(value)))
  1013. print("user_def: %s" % user_def[key])
  1014. print("value: %s" % value)
  1015. return False
  1016. for values in zip(user_def[key], value):
  1017. if isinstance(values[0], dict) and isinstance(values[1], dict):
  1018. if debug:
  1019. print('sending list - list')
  1020. print(type(values[0]))
  1021. print(type(values[1]))
  1022. result = Utils.check_def_equal(values[0], values[1], skip_keys=skip_keys, debug=debug)
  1023. if not result:
  1024. print('list compare returned false')
  1025. return False
  1026. elif value != user_def[key]:
  1027. if debug:
  1028. print('value should be identical')
  1029. print(user_def[key])
  1030. print(value)
  1031. return False
  1032. # recurse on a dictionary
  1033. elif isinstance(value, dict):
  1034. if key not in user_def:
  1035. if debug:
  1036. print("user_def does not have key [%s]" % key)
  1037. return False
  1038. if not isinstance(user_def[key], dict):
  1039. if debug:
  1040. print("dict returned false: not instance of dict")
  1041. return False
  1042. # before passing ensure keys match
  1043. api_values = set(value.keys()) - set(skip)
  1044. user_values = set(user_def[key].keys()) - set(skip)
  1045. if api_values != user_values:
  1046. if debug:
  1047. print("keys are not equal in dict")
  1048. print(user_values)
  1049. print(api_values)
  1050. return False
  1051. result = Utils.check_def_equal(user_def[key], value, skip_keys=skip_keys, debug=debug)
  1052. if not result:
  1053. if debug:
  1054. print("dict returned false")
  1055. print(result)
  1056. return False
  1057. # Verify each key, value pair is the same
  1058. else:
  1059. if key not in user_def or value != user_def[key]:
  1060. if debug:
  1061. print("value not equal; user_def does not have key")
  1062. print(key)
  1063. print(value)
  1064. if key in user_def:
  1065. print(user_def[key])
  1066. return False
  1067. if debug:
  1068. print('returning true')
  1069. return True
  1070. class OpenShiftCLIConfig(object):
  1071. '''Generic Config'''
  1072. def __init__(self, rname, namespace, kubeconfig, options):
  1073. self.kubeconfig = kubeconfig
  1074. self.name = rname
  1075. self.namespace = namespace
  1076. self._options = options
  1077. @property
  1078. def config_options(self):
  1079. ''' return config options '''
  1080. return self._options
  1081. def to_option_list(self):
  1082. '''return all options as a string'''
  1083. return self.stringify()
  1084. def stringify(self):
  1085. ''' return the options hash as cli params in a string '''
  1086. rval = []
  1087. for key in sorted(self.config_options.keys()):
  1088. data = self.config_options[key]
  1089. if data['include'] \
  1090. and (data['value'] or isinstance(data['value'], int)):
  1091. rval.append('--{}={}'.format(key.replace('_', '-'), data['value']))
  1092. return rval
  1093. # -*- -*- -*- End included fragment: lib/base.py -*- -*- -*-
  1094. # -*- -*- -*- Begin included fragment: lib/rolebinding.py -*- -*- -*-
  1095. # pylint: disable=too-many-instance-attributes
  1096. class RoleBindingConfig(object):
  1097. ''' Handle rolebinding config '''
  1098. # pylint: disable=too-many-arguments
  1099. def __init__(self,
  1100. name,
  1101. namespace,
  1102. kubeconfig,
  1103. group_names=None,
  1104. role_ref=None,
  1105. subjects=None,
  1106. usernames=None):
  1107. ''' constructor for handling rolebinding options '''
  1108. self.kubeconfig = kubeconfig
  1109. self.name = name
  1110. self.namespace = namespace
  1111. self.group_names = group_names
  1112. self.role_ref = role_ref
  1113. self.subjects = subjects
  1114. self.usernames = usernames
  1115. self.data = {}
  1116. self.create_dict()
  1117. def create_dict(self):
  1118. ''' create a default rolebinding as a dict '''
  1119. self.data['apiVersion'] = 'v1'
  1120. self.data['kind'] = 'RoleBinding'
  1121. self.data['groupNames'] = self.group_names
  1122. self.data['metadata']['name'] = self.name
  1123. self.data['metadata']['namespace'] = self.namespace
  1124. self.data['roleRef'] = self.role_ref
  1125. self.data['subjects'] = self.subjects
  1126. self.data['userNames'] = self.usernames
  1127. # pylint: disable=too-many-instance-attributes,too-many-public-methods
  1128. class RoleBinding(Yedit):
  1129. ''' Class to model a rolebinding openshift object'''
  1130. group_names_path = "groupNames"
  1131. role_ref_path = "roleRef"
  1132. subjects_path = "subjects"
  1133. user_names_path = "userNames"
  1134. kind = 'RoleBinding'
  1135. def __init__(self, content):
  1136. '''RoleBinding constructor'''
  1137. super(RoleBinding, self).__init__(content=content)
  1138. self._subjects = None
  1139. self._role_ref = None
  1140. self._group_names = None
  1141. self._user_names = None
  1142. @property
  1143. def subjects(self):
  1144. ''' subjects property '''
  1145. if self._subjects is None:
  1146. self._subjects = self.get_subjects()
  1147. return self._subjects
  1148. @subjects.setter
  1149. def subjects(self, data):
  1150. ''' subjects property setter'''
  1151. self._subjects = data
  1152. @property
  1153. def role_ref(self):
  1154. ''' role_ref property '''
  1155. if self._role_ref is None:
  1156. self._role_ref = self.get_role_ref()
  1157. return self._role_ref
  1158. @role_ref.setter
  1159. def role_ref(self, data):
  1160. ''' role_ref property setter'''
  1161. self._role_ref = data
  1162. @property
  1163. def group_names(self):
  1164. ''' group_names property '''
  1165. if self._group_names is None:
  1166. self._group_names = self.get_group_names()
  1167. return self._group_names
  1168. @group_names.setter
  1169. def group_names(self, data):
  1170. ''' group_names property setter'''
  1171. self._group_names = data
  1172. @property
  1173. def user_names(self):
  1174. ''' user_names property '''
  1175. if self._user_names is None:
  1176. self._user_names = self.get_user_names()
  1177. return self._user_names
  1178. @user_names.setter
  1179. def user_names(self, data):
  1180. ''' user_names property setter'''
  1181. self._user_names = data
  1182. def get_group_names(self):
  1183. ''' return groupNames '''
  1184. return self.get(RoleBinding.group_names_path) or []
  1185. def get_user_names(self):
  1186. ''' return usernames '''
  1187. return self.get(RoleBinding.user_names_path) or []
  1188. def get_role_ref(self):
  1189. ''' return role_ref '''
  1190. return self.get(RoleBinding.role_ref_path) or {}
  1191. def get_subjects(self):
  1192. ''' return subjects '''
  1193. return self.get(RoleBinding.subjects_path) or []
  1194. #### ADD #####
  1195. def add_subject(self, inc_subject):
  1196. ''' add a subject '''
  1197. if self.subjects:
  1198. # pylint: disable=no-member
  1199. self.subjects.append(inc_subject)
  1200. else:
  1201. self.put(RoleBinding.subjects_path, [inc_subject])
  1202. return True
  1203. def add_role_ref(self, inc_role_ref):
  1204. ''' add a role_ref '''
  1205. if not self.role_ref:
  1206. self.put(RoleBinding.role_ref_path, {"name": inc_role_ref})
  1207. return True
  1208. return False
  1209. def add_group_names(self, inc_group_names):
  1210. ''' add a group_names '''
  1211. if self.group_names:
  1212. # pylint: disable=no-member
  1213. self.group_names.append(inc_group_names)
  1214. else:
  1215. self.put(RoleBinding.group_names_path, [inc_group_names])
  1216. return True
  1217. def add_user_name(self, inc_user_name):
  1218. ''' add a username '''
  1219. if self.user_names:
  1220. # pylint: disable=no-member
  1221. self.user_names.append(inc_user_name)
  1222. else:
  1223. self.put(RoleBinding.user_names_path, [inc_user_name])
  1224. return True
  1225. #### /ADD #####
  1226. #### Remove #####
  1227. def remove_subject(self, inc_subject):
  1228. ''' remove a subject '''
  1229. try:
  1230. # pylint: disable=no-member
  1231. self.subjects.remove(inc_subject)
  1232. except ValueError as _:
  1233. return False
  1234. return True
  1235. def remove_role_ref(self, inc_role_ref):
  1236. ''' remove a role_ref '''
  1237. if self.role_ref and self.role_ref['name'] == inc_role_ref:
  1238. del self.role_ref['name']
  1239. return True
  1240. return False
  1241. def remove_group_name(self, inc_group_name):
  1242. ''' remove a groupname '''
  1243. try:
  1244. # pylint: disable=no-member
  1245. self.group_names.remove(inc_group_name)
  1246. except ValueError as _:
  1247. return False
  1248. return True
  1249. def remove_user_name(self, inc_user_name):
  1250. ''' remove a username '''
  1251. try:
  1252. # pylint: disable=no-member
  1253. self.user_names.remove(inc_user_name)
  1254. except ValueError as _:
  1255. return False
  1256. return True
  1257. #### /REMOVE #####
  1258. #### UPDATE #####
  1259. def update_subject(self, inc_subject):
  1260. ''' update a subject '''
  1261. try:
  1262. # pylint: disable=no-member
  1263. index = self.subjects.index(inc_subject)
  1264. except ValueError as _:
  1265. return self.add_subject(inc_subject)
  1266. self.subjects[index] = inc_subject
  1267. return True
  1268. def update_group_name(self, inc_group_name):
  1269. ''' update a groupname '''
  1270. try:
  1271. # pylint: disable=no-member
  1272. index = self.group_names.index(inc_group_name)
  1273. except ValueError as _:
  1274. return self.add_group_names(inc_group_name)
  1275. self.group_names[index] = inc_group_name
  1276. return True
  1277. def update_user_name(self, inc_user_name):
  1278. ''' update a username '''
  1279. try:
  1280. # pylint: disable=no-member
  1281. index = self.user_names.index(inc_user_name)
  1282. except ValueError as _:
  1283. return self.add_user_name(inc_user_name)
  1284. self.user_names[index] = inc_user_name
  1285. return True
  1286. def update_role_ref(self, inc_role_ref):
  1287. ''' update a role_ref '''
  1288. self.role_ref['name'] = inc_role_ref
  1289. return True
  1290. #### /UPDATE #####
  1291. #### FIND ####
  1292. def find_subject(self, inc_subject):
  1293. ''' find a subject '''
  1294. index = None
  1295. try:
  1296. # pylint: disable=no-member
  1297. index = self.subjects.index(inc_subject)
  1298. except ValueError as _:
  1299. return index
  1300. return index
  1301. def find_group_name(self, inc_group_name):
  1302. ''' find a group_name '''
  1303. index = None
  1304. try:
  1305. # pylint: disable=no-member
  1306. index = self.group_names.index(inc_group_name)
  1307. except ValueError as _:
  1308. return index
  1309. return index
  1310. def find_user_name(self, inc_user_name):
  1311. ''' find a user_name '''
  1312. index = None
  1313. try:
  1314. # pylint: disable=no-member
  1315. index = self.user_names.index(inc_user_name)
  1316. except ValueError as _:
  1317. return index
  1318. return index
  1319. def find_role_ref(self, inc_role_ref):
  1320. ''' find a user_name '''
  1321. if self.role_ref and self.role_ref['name'] == inc_role_ref['name']:
  1322. return self.role_ref
  1323. return None
  1324. # -*- -*- -*- End included fragment: lib/rolebinding.py -*- -*- -*-
  1325. # -*- -*- -*- Begin included fragment: lib/scc.py -*- -*- -*-
  1326. # pylint: disable=too-many-instance-attributes
  1327. class SecurityContextConstraintsConfig(object):
  1328. ''' Handle scc options '''
  1329. # pylint: disable=too-many-arguments
  1330. def __init__(self,
  1331. sname,
  1332. kubeconfig,
  1333. options=None,
  1334. fs_group='MustRunAs',
  1335. default_add_capabilities=None,
  1336. groups=None,
  1337. priority=None,
  1338. required_drop_capabilities=None,
  1339. run_as_user='MustRunAsRange',
  1340. se_linux_context='MustRunAs',
  1341. supplemental_groups='RunAsAny',
  1342. users=None,
  1343. annotations=None):
  1344. ''' constructor for handling scc options '''
  1345. self.kubeconfig = kubeconfig
  1346. self.name = sname
  1347. self.options = options
  1348. self.fs_group = fs_group
  1349. self.default_add_capabilities = default_add_capabilities
  1350. self.groups = groups
  1351. self.priority = priority
  1352. self.required_drop_capabilities = required_drop_capabilities
  1353. self.run_as_user = run_as_user
  1354. self.se_linux_context = se_linux_context
  1355. self.supplemental_groups = supplemental_groups
  1356. self.users = users
  1357. self.annotations = annotations
  1358. self.data = {}
  1359. self.create_dict()
  1360. def create_dict(self):
  1361. ''' assign the correct properties for a scc dict '''
  1362. # allow options
  1363. if self.options:
  1364. for key, value in self.options.items():
  1365. self.data[key] = value
  1366. else:
  1367. self.data['allowHostDirVolumePlugin'] = False
  1368. self.data['allowHostIPC'] = False
  1369. self.data['allowHostNetwork'] = False
  1370. self.data['allowHostPID'] = False
  1371. self.data['allowHostPorts'] = False
  1372. self.data['allowPrivilegedContainer'] = False
  1373. self.data['allowedCapabilities'] = None
  1374. # version
  1375. self.data['apiVersion'] = 'v1'
  1376. # kind
  1377. self.data['kind'] = 'SecurityContextConstraints'
  1378. # defaultAddCapabilities
  1379. self.data['defaultAddCapabilities'] = self.default_add_capabilities
  1380. # fsGroup
  1381. self.data['fsGroup']['type'] = self.fs_group
  1382. # groups
  1383. self.data['groups'] = []
  1384. if self.groups:
  1385. self.data['groups'] = self.groups
  1386. # metadata
  1387. self.data['metadata'] = {}
  1388. self.data['metadata']['name'] = self.name
  1389. if self.annotations:
  1390. for key, value in self.annotations.items():
  1391. self.data['metadata'][key] = value
  1392. # priority
  1393. self.data['priority'] = self.priority
  1394. # requiredDropCapabilities
  1395. self.data['requiredDropCapabilities'] = self.required_drop_capabilities
  1396. # runAsUser
  1397. self.data['runAsUser'] = {'type': self.run_as_user}
  1398. # seLinuxContext
  1399. self.data['seLinuxContext'] = {'type': self.se_linux_context}
  1400. # supplementalGroups
  1401. self.data['supplementalGroups'] = {'type': self.supplemental_groups}
  1402. # users
  1403. self.data['users'] = []
  1404. if self.users:
  1405. self.data['users'] = self.users
  1406. # pylint: disable=too-many-instance-attributes,too-many-public-methods,no-member
  1407. class SecurityContextConstraints(Yedit):
  1408. ''' Class to wrap the oc command line tools '''
  1409. default_add_capabilities_path = "defaultAddCapabilities"
  1410. fs_group_path = "fsGroup"
  1411. groups_path = "groups"
  1412. priority_path = "priority"
  1413. required_drop_capabilities_path = "requiredDropCapabilities"
  1414. run_as_user_path = "runAsUser"
  1415. se_linux_context_path = "seLinuxContext"
  1416. supplemental_groups_path = "supplementalGroups"
  1417. users_path = "users"
  1418. kind = 'SecurityContextConstraints'
  1419. def __init__(self, content):
  1420. '''SecurityContextConstraints constructor'''
  1421. super(SecurityContextConstraints, self).__init__(content=content)
  1422. self._users = None
  1423. self._groups = None
  1424. @property
  1425. def users(self):
  1426. ''' users property getter '''
  1427. if self._users is None:
  1428. self._users = self.get_users()
  1429. return self._users
  1430. @property
  1431. def groups(self):
  1432. ''' groups property getter '''
  1433. if self._groups is None:
  1434. self._groups = self.get_groups()
  1435. return self._groups
  1436. @users.setter
  1437. def users(self, data):
  1438. ''' users property setter'''
  1439. self._users = data
  1440. @groups.setter
  1441. def groups(self, data):
  1442. ''' groups property setter'''
  1443. self._groups = data
  1444. def get_users(self):
  1445. '''get scc users'''
  1446. return self.get(SecurityContextConstraints.users_path) or []
  1447. def get_groups(self):
  1448. '''get scc groups'''
  1449. return self.get(SecurityContextConstraints.groups_path) or []
  1450. def add_user(self, inc_user):
  1451. ''' add a user '''
  1452. if self.users:
  1453. self.users.append(inc_user)
  1454. else:
  1455. self.put(SecurityContextConstraints.users_path, [inc_user])
  1456. return True
  1457. def add_group(self, inc_group):
  1458. ''' add a group '''
  1459. if self.groups:
  1460. self.groups.append(inc_group)
  1461. else:
  1462. self.put(SecurityContextConstraints.groups_path, [inc_group])
  1463. return True
  1464. def remove_user(self, inc_user):
  1465. ''' remove a user '''
  1466. try:
  1467. self.users.remove(inc_user)
  1468. except ValueError as _:
  1469. return False
  1470. return True
  1471. def remove_group(self, inc_group):
  1472. ''' remove a group '''
  1473. try:
  1474. self.groups.remove(inc_group)
  1475. except ValueError as _:
  1476. return False
  1477. return True
  1478. def update_user(self, inc_user):
  1479. ''' update a user '''
  1480. try:
  1481. index = self.users.index(inc_user)
  1482. except ValueError as _:
  1483. return self.add_user(inc_user)
  1484. self.users[index] = inc_user
  1485. return True
  1486. def update_group(self, inc_group):
  1487. ''' update a group '''
  1488. try:
  1489. index = self.groups.index(inc_group)
  1490. except ValueError as _:
  1491. return self.add_group(inc_group)
  1492. self.groups[index] = inc_group
  1493. return True
  1494. def find_user(self, inc_user):
  1495. ''' find a user '''
  1496. index = None
  1497. try:
  1498. index = self.users.index(inc_user)
  1499. except ValueError as _:
  1500. return index
  1501. return index
  1502. def find_group(self, inc_group):
  1503. ''' find a group '''
  1504. index = None
  1505. try:
  1506. index = self.groups.index(inc_group)
  1507. except ValueError as _:
  1508. return index
  1509. return index
  1510. # -*- -*- -*- End included fragment: lib/scc.py -*- -*- -*-
  1511. # -*- -*- -*- Begin included fragment: class/oc_adm_policy_group.py -*- -*- -*-
  1512. class PolicyGroupException(Exception):
  1513. ''' PolicyGroup exception'''
  1514. pass
  1515. class PolicyGroupConfig(OpenShiftCLIConfig):
  1516. ''' PolicyGroupConfig is a DTO for group related policy. '''
  1517. def __init__(self, namespace, kubeconfig, policy_options):
  1518. super(PolicyGroupConfig, self).__init__(policy_options['name']['value'],
  1519. namespace, kubeconfig, policy_options)
  1520. self.kind = self.get_kind()
  1521. self.namespace = namespace
  1522. def get_kind(self):
  1523. ''' return the kind we are working with '''
  1524. if self.config_options['resource_kind']['value'] == 'role':
  1525. return 'rolebinding'
  1526. elif self.config_options['resource_kind']['value'] == 'cluster-role':
  1527. return 'clusterrolebinding'
  1528. elif self.config_options['resource_kind']['value'] == 'scc':
  1529. return 'scc'
  1530. return None
  1531. # pylint: disable=too-many-return-statements
  1532. class PolicyGroup(OpenShiftCLI):
  1533. ''' Class to handle attaching policies to users '''
  1534. def __init__(self,
  1535. config,
  1536. verbose=False):
  1537. ''' Constructor for PolicyGroup '''
  1538. super(PolicyGroup, self).__init__(config.namespace, config.kubeconfig, verbose)
  1539. self.config = config
  1540. self.verbose = verbose
  1541. self._rolebinding = None
  1542. self._scc = None
  1543. @property
  1544. def role_binding(self):
  1545. ''' role_binding getter '''
  1546. return self._rolebinding
  1547. @role_binding.setter
  1548. def role_binding(self, binding):
  1549. ''' role_binding setter '''
  1550. self._rolebinding = binding
  1551. @property
  1552. def security_context_constraint(self):
  1553. ''' security_context_constraint getter '''
  1554. return self._scc
  1555. @security_context_constraint.setter
  1556. def security_context_constraint(self, scc):
  1557. ''' security_context_constraint setter '''
  1558. self._scc = scc
  1559. def get(self):
  1560. '''fetch the desired kind'''
  1561. resource_name = self.config.config_options['name']['value']
  1562. if resource_name == 'cluster-reader':
  1563. resource_name += 's'
  1564. # oc adm policy add-... creates policy bindings with the name
  1565. # "[resource_name]-binding", however some bindings in the system
  1566. # simply use "[resource_name]". So try both.
  1567. results = self._get(self.config.kind, resource_name)
  1568. if results['returncode'] == 0:
  1569. return results
  1570. # Now try -binding naming convention
  1571. return self._get(self.config.kind, resource_name + "-binding")
  1572. def exists_role_binding(self):
  1573. ''' return whether role_binding exists '''
  1574. results = self.get()
  1575. if results['returncode'] == 0:
  1576. self.role_binding = RoleBinding(results['results'][0])
  1577. if self.role_binding.find_group_name(self.config.config_options['group']['value']) != None:
  1578. return True
  1579. return False
  1580. elif self.config.config_options['name']['value'] in results['stderr'] and '" not found' in results['stderr']:
  1581. return False
  1582. return results
  1583. def exists_scc(self):
  1584. ''' return whether scc exists '''
  1585. results = self.get()
  1586. if results['returncode'] == 0:
  1587. self.security_context_constraint = SecurityContextConstraints(results['results'][0])
  1588. if self.security_context_constraint.find_group(self.config.config_options['group']['value']) != None:
  1589. return True
  1590. return False
  1591. return results
  1592. def exists(self):
  1593. '''does the object exist?'''
  1594. if self.config.config_options['resource_kind']['value'] == 'cluster-role':
  1595. return self.exists_role_binding()
  1596. elif self.config.config_options['resource_kind']['value'] == 'role':
  1597. return self.exists_role_binding()
  1598. elif self.config.config_options['resource_kind']['value'] == 'scc':
  1599. return self.exists_scc()
  1600. return False
  1601. def perform(self):
  1602. '''perform action on resource'''
  1603. cmd = ['policy',
  1604. self.config.config_options['action']['value'],
  1605. self.config.config_options['name']['value'],
  1606. self.config.config_options['group']['value']]
  1607. return self.openshift_cmd(cmd, oadm=True)
  1608. @staticmethod
  1609. def run_ansible(params, check_mode):
  1610. '''run the idempotent ansible code'''
  1611. state = params['state']
  1612. action = None
  1613. if state == 'present':
  1614. action = 'add-' + params['resource_kind'] + '-to-group'
  1615. else:
  1616. action = 'remove-' + params['resource_kind'] + '-from-group'
  1617. nconfig = PolicyGroupConfig(params['namespace'],
  1618. params['kubeconfig'],
  1619. {'action': {'value': action, 'include': False},
  1620. 'group': {'value': params['group'], 'include': False},
  1621. 'resource_kind': {'value': params['resource_kind'], 'include': False},
  1622. 'name': {'value': params['resource_name'], 'include': False},
  1623. })
  1624. policygroup = PolicyGroup(nconfig, params['debug'])
  1625. # Run the oc adm policy group related command
  1626. ########
  1627. # Delete
  1628. ########
  1629. if state == 'absent':
  1630. if not policygroup.exists():
  1631. return {'changed': False, 'state': 'absent'}
  1632. if check_mode:
  1633. return {'changed': False, 'msg': 'CHECK_MODE: would have performed a delete.'}
  1634. api_rval = policygroup.perform()
  1635. if api_rval['returncode'] != 0:
  1636. return {'msg': api_rval}
  1637. return {'changed': True, 'results' : api_rval, state:'absent'}
  1638. if state == 'present':
  1639. ########
  1640. # Create
  1641. ########
  1642. results = policygroup.exists()
  1643. if isinstance(results, dict) and 'returncode' in results and results['returncode'] != 0:
  1644. return {'msg': results}
  1645. if not results:
  1646. if check_mode:
  1647. return {'changed': False, 'msg': 'CHECK_MODE: would have performed a create.'}
  1648. api_rval = policygroup.perform()
  1649. if api_rval['returncode'] != 0:
  1650. return {'msg': api_rval}
  1651. return {'changed': True, 'results': api_rval, state: 'present'}
  1652. return {'changed': False, state: 'present'}
  1653. return {'failed': True, 'changed': False, 'results': 'Unknown state passed. %s' % state, state: 'unknown'}
  1654. # -*- -*- -*- End included fragment: class/oc_adm_policy_group.py -*- -*- -*-
  1655. # -*- -*- -*- Begin included fragment: ansible/oc_adm_policy_group.py -*- -*- -*-
  1656. def main():
  1657. '''
  1658. ansible oc adm module for group policy
  1659. '''
  1660. module = AnsibleModule(
  1661. argument_spec=dict(
  1662. state=dict(default='present', type='str',
  1663. choices=['present', 'absent']),
  1664. debug=dict(default=False, type='bool'),
  1665. resource_name=dict(required=True, type='str'),
  1666. namespace=dict(default='default', type='str'),
  1667. kubeconfig=dict(default='/etc/origin/master/admin.kubeconfig', type='str'),
  1668. group=dict(required=True, type='str'),
  1669. resource_kind=dict(required=True, choices=['role', 'cluster-role', 'scc'], type='str'),
  1670. ),
  1671. supports_check_mode=True,
  1672. )
  1673. results = PolicyGroup.run_ansible(module.params, module.check_mode)
  1674. if 'failed' in results:
  1675. module.fail_json(**results)
  1676. module.exit_json(**results)
  1677. if __name__ == "__main__":
  1678. main()
  1679. # -*- -*- -*- End included fragment: ansible/oc_adm_policy_group.py -*- -*- -*-