12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646164716481649165016511652165316541655165616571658165916601661166216631664166516661667166816691670167116721673167416751676167716781679168016811682168316841685168616871688168916901691169216931694169516961697169816991700170117021703170417051706170717081709171017111712171317141715171617171718171917201721172217231724172517261727172817291730173117321733173417351736173717381739174017411742174317441745174617471748174917501751175217531754175517561757175817591760176117621763176417651766176717681769177017711772177317741775177617771778177917801781178217831784178517861787178817891790179117921793179417951796179717981799180018011802180318041805180618071808180918101811181218131814181518161817181818191820182118221823182418251826182718281829183018311832183318341835183618371838183918401841184218431844184518461847184818491850185118521853185418551856185718581859186018611862186318641865186618671868186918701871187218731874187518761877187818791880188118821883188418851886188718881889189018911892189318941895189618971898189919001901190219031904190519061907190819091910191119121913191419151916191719181919192019211922192319241925192619271928192919301931193219331934193519361937193819391940194119421943194419451946194719481949195019511952195319541955195619571958195919601961196219631964196519661967196819691970197119721973197419751976197719781979198019811982198319841985198619871988198919901991199219931994199519961997199819992000200120022003200420052006200720082009201020112012201320142015201620172018201920202021202220232024202520262027202820292030203120322033203420352036203720382039204020412042204320442045204620472048204920502051205220532054205520562057205820592060206120622063206420652066206720682069207020712072207320742075207620772078207920802081208220832084208520862087208820892090209120922093209420952096209720982099210021012102210321042105210621072108210921102111211221132114211521162117211821192120212121222123212421252126212721282129213021312132213321342135213621372138213921402141214221432144214521462147214821492150215121522153215421552156215721582159216021612162216321642165216621672168216921702171217221732174217521762177217821792180218121822183218421852186218721882189219021912192219321942195219621972198219922002201220222032204220522062207220822092210221122122213221422152216221722182219222022212222222322242225222622272228222922302231223222332234223522362237 |
- #!/usr/bin/env python
- # pylint: disable=missing-docstring
- # flake8: noqa: T001
- # ___ ___ _ _ ___ ___ _ _____ ___ ___
- # / __| __| \| | __| _ \ /_\_ _| __| \
- # | (_ | _|| .` | _|| / / _ \| | | _|| |) |
- # \___|___|_|\_|___|_|_\/_/_\_\_|_|___|___/_ _____
- # | \ / _ \ | \| |/ _ \_ _| | __| \_ _|_ _|
- # | |) | (_) | | .` | (_) || | | _|| |) | | | |
- # |___/ \___/ |_|\_|\___/ |_| |___|___/___| |_|
- #
- # Copyright 2016 Red Hat, Inc. and/or its affiliates
- # and other contributors as indicated by the @author tags.
- #
- # Licensed under the Apache License, Version 2.0 (the "License");
- # you may not use this file except in compliance with the License.
- # You may obtain a copy of the License at
- #
- # http://www.apache.org/licenses/LICENSE-2.0
- #
- # Unless required by applicable law or agreed to in writing, software
- # distributed under the License is distributed on an "AS IS" BASIS,
- # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- # See the License for the specific language governing permissions and
- # limitations under the License.
- #
- # -*- -*- -*- Begin included fragment: lib/import.py -*- -*- -*-
- '''
- OpenShiftCLI class that wraps the oc commands in a subprocess
- '''
- # pylint: disable=too-many-lines
- from __future__ import print_function
- import atexit
- import copy
- import fcntl
- import json
- import os
- import re
- import shutil
- import subprocess
- import tempfile
- # pylint: disable=import-error
- try:
- import ruamel.yaml as yaml
- except ImportError:
- import yaml
- from ansible.module_utils.basic import AnsibleModule
- # -*- -*- -*- End included fragment: lib/import.py -*- -*- -*-
- # -*- -*- -*- Begin included fragment: doc/policy_user -*- -*- -*-
- DOCUMENTATION = '''
- ---
- module: oc_adm_policy_user
- short_description: Module to manage openshift policy for users
- description:
- - Manage openshift policy for users.
- options:
- kubeconfig:
- description:
- - The path for the kubeconfig file to use for authentication
- required: false
- default: /etc/origin/master/admin.kubeconfig
- aliases: []
- namespace:
- description:
- - The namespace scope
- required: false
- default: None
- aliases: []
- role_namespace:
- description:
- - The namespace where to find the role
- required: false
- default: None
- aliases: []
- debug:
- description:
- - Turn on debug output.
- required: false
- default: False
- aliases: []
- user:
- description:
- - The name of the user
- required: true
- default: None
- aliases: []
- resource_kind:
- description:
- - The kind of policy to affect
- required: true
- default: None
- choices: ["role", "cluster-role", "scc"]
- aliases: []
- resource_name:
- description:
- - The name of the policy
- required: true
- default: None
- aliases: []
- state:
- description:
- - Desired state of the policy
- required: true
- default: present
- choices: ["present", "absent"]
- aliases: []
- author:
- - "Kenny Woodson <kwoodson@redhat.com>"
- extends_documentation_fragment: []
- '''
- EXAMPLES = '''
- - name: oc adm policy remove-scc-from-user an-scc ausername
- oc_adm_policy_user:
- user: ausername
- resource_kind: scc
- resource_name: an-scc
- state: absent
- - name: oc adm policy add-cluster-role-to-user system:build-strategy-docker ausername
- oc_adm_policy_user:
- user: ausername
- resource_kind: cluster-role
- resource_name: system:build-strategy-docker
- state: present
- - name: oc adm policy add-role-to-user system:build-strategy-docker ausername --role-namespace foo
- oc_adm_policy_user:
- user: ausername
- resource_kind: cluster-role
- resource_name: system:build-strategy-docker
- state: present
- role_namespace: foo
- '''
- # -*- -*- -*- End included fragment: doc/policy_user -*- -*- -*-
- # -*- -*- -*- Begin included fragment: ../../lib_utils/src/class/yedit.py -*- -*- -*-
- class YeditException(Exception): # pragma: no cover
- ''' Exception class for Yedit '''
- pass
- # pylint: disable=too-many-public-methods
- class Yedit(object): # pragma: no cover
- ''' Class to modify yaml files '''
- re_valid_key = r"(((\[-?\d+\])|([0-9a-zA-Z%s/_-]+)).?)+$"
- re_key = r"(?:\[(-?\d+)\])|([0-9a-zA-Z{}/_-]+)"
- com_sep = set(['.', '#', '|', ':'])
- # pylint: disable=too-many-arguments
- def __init__(self,
- filename=None,
- content=None,
- content_type='yaml',
- separator='.',
- backup=False):
- self.content = content
- self._separator = separator
- self.filename = filename
- self.__yaml_dict = content
- self.content_type = content_type
- self.backup = backup
- self.load(content_type=self.content_type)
- if self.__yaml_dict is None:
- self.__yaml_dict = {}
- @property
- def separator(self):
- ''' getter method for separator '''
- return self._separator
- @separator.setter
- def separator(self, inc_sep):
- ''' setter method for separator '''
- self._separator = inc_sep
- @property
- def yaml_dict(self):
- ''' getter method for yaml_dict '''
- return self.__yaml_dict
- @yaml_dict.setter
- def yaml_dict(self, value):
- ''' setter method for yaml_dict '''
- self.__yaml_dict = value
- @staticmethod
- def parse_key(key, sep='.'):
- '''parse the key allowing the appropriate separator'''
- common_separators = list(Yedit.com_sep - set([sep]))
- return re.findall(Yedit.re_key.format(''.join(common_separators)), key)
- @staticmethod
- def valid_key(key, sep='.'):
- '''validate the incoming key'''
- common_separators = list(Yedit.com_sep - set([sep]))
- if not re.match(Yedit.re_valid_key.format(''.join(common_separators)), key):
- return False
- return True
- # pylint: disable=too-many-return-statements,too-many-branches
- @staticmethod
- def remove_entry(data, key, index=None, value=None, sep='.'):
- ''' remove data at location key '''
- if key == '' and isinstance(data, dict):
- if value is not None:
- data.pop(value)
- elif index is not None:
- raise YeditException("remove_entry for a dictionary does not have an index {}".format(index))
- else:
- data.clear()
- return True
- elif key == '' and isinstance(data, list):
- ind = None
- if value is not None:
- try:
- ind = data.index(value)
- except ValueError:
- return False
- elif index is not None:
- ind = index
- else:
- del data[:]
- if ind is not None:
- data.pop(ind)
- return True
- if not (key and Yedit.valid_key(key, sep)) and \
- isinstance(data, (list, dict)):
- return None
- key_indexes = Yedit.parse_key(key, sep)
- for arr_ind, dict_key in key_indexes[:-1]:
- if dict_key and isinstance(data, dict):
- data = data.get(dict_key)
- elif (arr_ind and isinstance(data, list) and
- int(arr_ind) <= len(data) - 1):
- data = data[int(arr_ind)]
- else:
- return None
- # process last index for remove
- # expected list entry
- if key_indexes[-1][0]:
- if isinstance(data, list) and int(key_indexes[-1][0]) <= len(data) - 1: # noqa: E501
- del data[int(key_indexes[-1][0])]
- return True
- # expected dict entry
- elif key_indexes[-1][1]:
- if isinstance(data, dict):
- del data[key_indexes[-1][1]]
- return True
- @staticmethod
- def add_entry(data, key, item=None, sep='.'):
- ''' Get an item from a dictionary with key notation a.b.c
- d = {'a': {'b': 'c'}}}
- key = a#b
- return c
- '''
- if key == '':
- pass
- elif (not (key and Yedit.valid_key(key, sep)) and
- isinstance(data, (list, dict))):
- return None
- key_indexes = Yedit.parse_key(key, sep)
- for arr_ind, dict_key in key_indexes[:-1]:
- if dict_key:
- if isinstance(data, dict) and dict_key in data and data[dict_key]: # noqa: E501
- data = data[dict_key]
- continue
- elif data and not isinstance(data, dict):
- raise YeditException("Unexpected item type found while going through key " +
- "path: {} (at key: {})".format(key, dict_key))
- data[dict_key] = {}
- data = data[dict_key]
- elif (arr_ind and isinstance(data, list) and
- int(arr_ind) <= len(data) - 1):
- data = data[int(arr_ind)]
- else:
- raise YeditException("Unexpected item type found while going through key path: {}".format(key))
- if key == '':
- data = item
- # process last index for add
- # expected list entry
- elif key_indexes[-1][0] and isinstance(data, list) and int(key_indexes[-1][0]) <= len(data) - 1: # noqa: E501
- data[int(key_indexes[-1][0])] = item
- # expected dict entry
- elif key_indexes[-1][1] and isinstance(data, dict):
- data[key_indexes[-1][1]] = item
- # didn't add/update to an existing list, nor add/update key to a dict
- # so we must have been provided some syntax like a.b.c[<int>] = "data" for a
- # non-existent array
- else:
- raise YeditException("Error adding to object at path: {}".format(key))
- return data
- @staticmethod
- def get_entry(data, key, sep='.'):
- ''' Get an item from a dictionary with key notation a.b.c
- d = {'a': {'b': 'c'}}}
- key = a.b
- return c
- '''
- if key == '':
- pass
- elif (not (key and Yedit.valid_key(key, sep)) and
- isinstance(data, (list, dict))):
- return None
- key_indexes = Yedit.parse_key(key, sep)
- for arr_ind, dict_key in key_indexes:
- if dict_key and isinstance(data, dict):
- data = data.get(dict_key)
- elif (arr_ind and isinstance(data, list) and
- int(arr_ind) <= len(data) - 1):
- data = data[int(arr_ind)]
- else:
- return None
- return data
- @staticmethod
- def _write(filename, contents):
- ''' Actually write the file contents to disk. This helps with mocking. '''
- tmp_filename = filename + '.yedit'
- with open(tmp_filename, 'w') as yfd:
- fcntl.flock(yfd, fcntl.LOCK_EX | fcntl.LOCK_NB)
- yfd.write(contents)
- fcntl.flock(yfd, fcntl.LOCK_UN)
- os.rename(tmp_filename, filename)
- def write(self):
- ''' write to file '''
- if not self.filename:
- raise YeditException('Please specify a filename.')
- if self.backup and self.file_exists():
- shutil.copy(self.filename, self.filename + '.orig')
- # Try to set format attributes if supported
- try:
- self.yaml_dict.fa.set_block_style()
- except AttributeError:
- pass
- # Try to use RoundTripDumper if supported.
- if self.content_type == 'yaml':
- try:
- Yedit._write(self.filename, yaml.dump(self.yaml_dict, Dumper=yaml.RoundTripDumper))
- except AttributeError:
- Yedit._write(self.filename, yaml.safe_dump(self.yaml_dict, default_flow_style=False))
- elif self.content_type == 'json':
- Yedit._write(self.filename, json.dumps(self.yaml_dict, indent=4, sort_keys=True))
- else:
- raise YeditException('Unsupported content_type: {}.'.format(self.content_type) +
- 'Please specify a content_type of yaml or json.')
- return (True, self.yaml_dict)
- def read(self):
- ''' read from file '''
- # check if it exists
- if self.filename is None or not self.file_exists():
- return None
- contents = None
- with open(self.filename) as yfd:
- contents = yfd.read()
- return contents
- def file_exists(self):
- ''' return whether file exists '''
- if os.path.exists(self.filename):
- return True
- return False
- def load(self, content_type='yaml'):
- ''' return yaml file '''
- contents = self.read()
- if not contents and not self.content:
- return None
- if self.content:
- if isinstance(self.content, dict):
- self.yaml_dict = self.content
- return self.yaml_dict
- elif isinstance(self.content, str):
- contents = self.content
- # check if it is yaml
- try:
- if content_type == 'yaml' and contents:
- # Try to set format attributes if supported
- try:
- self.yaml_dict.fa.set_block_style()
- except AttributeError:
- pass
- # Try to use RoundTripLoader if supported.
- try:
- self.yaml_dict = yaml.load(contents, yaml.RoundTripLoader)
- except AttributeError:
- self.yaml_dict = yaml.safe_load(contents)
- # Try to set format attributes if supported
- try:
- self.yaml_dict.fa.set_block_style()
- except AttributeError:
- pass
- elif content_type == 'json' and contents:
- self.yaml_dict = json.loads(contents)
- except yaml.YAMLError as err:
- # Error loading yaml or json
- raise YeditException('Problem with loading yaml file. {}'.format(err))
- return self.yaml_dict
- def get(self, key):
- ''' get a specified key'''
- try:
- entry = Yedit.get_entry(self.yaml_dict, key, self.separator)
- except KeyError:
- entry = None
- return entry
- def pop(self, path, key_or_item):
- ''' remove a key, value pair from a dict or an item for a list'''
- try:
- entry = Yedit.get_entry(self.yaml_dict, path, self.separator)
- except KeyError:
- entry = None
- if entry is None:
- return (False, self.yaml_dict)
- if isinstance(entry, dict):
- # AUDIT:maybe-no-member makes sense due to fuzzy types
- # pylint: disable=maybe-no-member
- if key_or_item in entry:
- entry.pop(key_or_item)
- return (True, self.yaml_dict)
- return (False, self.yaml_dict)
- elif isinstance(entry, list):
- # AUDIT:maybe-no-member makes sense due to fuzzy types
- # pylint: disable=maybe-no-member
- ind = None
- try:
- ind = entry.index(key_or_item)
- except ValueError:
- return (False, self.yaml_dict)
- entry.pop(ind)
- return (True, self.yaml_dict)
- return (False, self.yaml_dict)
- def delete(self, path, index=None, value=None):
- ''' remove path from a dict'''
- try:
- entry = Yedit.get_entry(self.yaml_dict, path, self.separator)
- except KeyError:
- entry = None
- if entry is None:
- return (False, self.yaml_dict)
- result = Yedit.remove_entry(self.yaml_dict, path, index, value, self.separator)
- if not result:
- return (False, self.yaml_dict)
- return (True, self.yaml_dict)
- def exists(self, path, value):
- ''' check if value exists at path'''
- try:
- entry = Yedit.get_entry(self.yaml_dict, path, self.separator)
- except KeyError:
- entry = None
- if isinstance(entry, list):
- if value in entry:
- return True
- return False
- elif isinstance(entry, dict):
- if isinstance(value, dict):
- rval = False
- for key, val in value.items():
- if entry[key] != val:
- rval = False
- break
- else:
- rval = True
- return rval
- return value in entry
- return entry == value
- def append(self, path, value):
- '''append value to a list'''
- try:
- entry = Yedit.get_entry(self.yaml_dict, path, self.separator)
- except KeyError:
- entry = None
- if entry is None:
- self.put(path, [])
- entry = Yedit.get_entry(self.yaml_dict, path, self.separator)
- if not isinstance(entry, list):
- return (False, self.yaml_dict)
- # AUDIT:maybe-no-member makes sense due to loading data from
- # a serialized format.
- # pylint: disable=maybe-no-member
- entry.append(value)
- return (True, self.yaml_dict)
- # pylint: disable=too-many-arguments
- def update(self, path, value, index=None, curr_value=None):
- ''' put path, value into a dict '''
- try:
- entry = Yedit.get_entry(self.yaml_dict, path, self.separator)
- except KeyError:
- entry = None
- if isinstance(entry, dict):
- # AUDIT:maybe-no-member makes sense due to fuzzy types
- # pylint: disable=maybe-no-member
- if not isinstance(value, dict):
- raise YeditException('Cannot replace key, value entry in dict with non-dict type. ' +
- 'value=[{}] type=[{}]'.format(value, type(value)))
- entry.update(value)
- return (True, self.yaml_dict)
- elif isinstance(entry, list):
- # AUDIT:maybe-no-member makes sense due to fuzzy types
- # pylint: disable=maybe-no-member
- ind = None
- if curr_value:
- try:
- ind = entry.index(curr_value)
- except ValueError:
- return (False, self.yaml_dict)
- elif index is not None:
- ind = index
- if ind is not None and entry[ind] != value:
- entry[ind] = value
- return (True, self.yaml_dict)
- # see if it exists in the list
- try:
- ind = entry.index(value)
- except ValueError:
- # doesn't exist, append it
- entry.append(value)
- return (True, self.yaml_dict)
- # already exists, return
- if ind is not None:
- return (False, self.yaml_dict)
- return (False, self.yaml_dict)
- def put(self, path, value):
- ''' put path, value into a dict '''
- try:
- entry = Yedit.get_entry(self.yaml_dict, path, self.separator)
- except KeyError:
- entry = None
- if entry == value:
- return (False, self.yaml_dict)
- # deepcopy didn't work
- # Try to use ruamel.yaml and fallback to pyyaml
- try:
- tmp_copy = yaml.load(yaml.round_trip_dump(self.yaml_dict,
- default_flow_style=False),
- yaml.RoundTripLoader)
- except AttributeError:
- tmp_copy = copy.deepcopy(self.yaml_dict)
- # set the format attributes if available
- try:
- tmp_copy.fa.set_block_style()
- except AttributeError:
- pass
- result = Yedit.add_entry(tmp_copy, path, value, self.separator)
- if result is None:
- return (False, self.yaml_dict)
- # When path equals "" it is a special case.
- # "" refers to the root of the document
- # Only update the root path (entire document) when its a list or dict
- if path == '':
- if isinstance(result, list) or isinstance(result, dict):
- self.yaml_dict = result
- return (True, self.yaml_dict)
- return (False, self.yaml_dict)
- self.yaml_dict = tmp_copy
- return (True, self.yaml_dict)
- def create(self, path, value):
- ''' create a yaml file '''
- if not self.file_exists():
- # deepcopy didn't work
- # Try to use ruamel.yaml and fallback to pyyaml
- try:
- tmp_copy = yaml.load(yaml.round_trip_dump(self.yaml_dict,
- default_flow_style=False),
- yaml.RoundTripLoader)
- except AttributeError:
- tmp_copy = copy.deepcopy(self.yaml_dict)
- # set the format attributes if available
- try:
- tmp_copy.fa.set_block_style()
- except AttributeError:
- pass
- result = Yedit.add_entry(tmp_copy, path, value, self.separator)
- if result is not None:
- self.yaml_dict = tmp_copy
- return (True, self.yaml_dict)
- return (False, self.yaml_dict)
- @staticmethod
- def get_curr_value(invalue, val_type):
- '''return the current value'''
- if invalue is None:
- return None
- curr_value = invalue
- if val_type == 'yaml':
- try:
- # AUDIT:maybe-no-member makes sense due to different yaml libraries
- # pylint: disable=maybe-no-member
- curr_value = yaml.safe_load(invalue, Loader=yaml.RoundTripLoader)
- except AttributeError:
- curr_value = yaml.safe_load(invalue)
- elif val_type == 'json':
- curr_value = json.loads(invalue)
- return curr_value
- @staticmethod
- def parse_value(inc_value, vtype=''):
- '''determine value type passed'''
- true_bools = ['y', 'Y', 'yes', 'Yes', 'YES', 'true', 'True', 'TRUE',
- 'on', 'On', 'ON', ]
- false_bools = ['n', 'N', 'no', 'No', 'NO', 'false', 'False', 'FALSE',
- 'off', 'Off', 'OFF']
- # It came in as a string but you didn't specify value_type as string
- # we will convert to bool if it matches any of the above cases
- if isinstance(inc_value, str) and 'bool' in vtype:
- if inc_value not in true_bools and inc_value not in false_bools:
- raise YeditException('Not a boolean type. str=[{}] vtype=[{}]'.format(inc_value, vtype))
- elif isinstance(inc_value, bool) and 'str' in vtype:
- inc_value = str(inc_value)
- # There is a special case where '' will turn into None after yaml loading it so skip
- if isinstance(inc_value, str) and inc_value == '':
- pass
- # If vtype is not str then go ahead and attempt to yaml load it.
- elif isinstance(inc_value, str) and 'str' not in vtype:
- try:
- inc_value = yaml.safe_load(inc_value)
- except Exception:
- raise YeditException('Could not determine type of incoming value. ' +
- 'value=[{}] vtype=[{}]'.format(type(inc_value), vtype))
- return inc_value
- @staticmethod
- def process_edits(edits, yamlfile):
- '''run through a list of edits and process them one-by-one'''
- results = []
- for edit in edits:
- value = Yedit.parse_value(edit['value'], edit.get('value_type', ''))
- if edit.get('action') == 'update':
- # pylint: disable=line-too-long
- curr_value = Yedit.get_curr_value(
- Yedit.parse_value(edit.get('curr_value')),
- edit.get('curr_value_format'))
- rval = yamlfile.update(edit['key'],
- value,
- edit.get('index'),
- curr_value)
- elif edit.get('action') == 'append':
- rval = yamlfile.append(edit['key'], value)
- else:
- rval = yamlfile.put(edit['key'], value)
- if rval[0]:
- results.append({'key': edit['key'], 'edit': rval[1]})
- return {'changed': len(results) > 0, 'results': results}
- # pylint: disable=too-many-return-statements,too-many-branches
- @staticmethod
- def run_ansible(params):
- '''perform the idempotent crud operations'''
- yamlfile = Yedit(filename=params['src'],
- backup=params['backup'],
- content_type=params['content_type'],
- separator=params['separator'])
- state = params['state']
- if params['src']:
- rval = yamlfile.load()
- if yamlfile.yaml_dict is None and state != 'present':
- return {'failed': True,
- 'msg': 'Error opening file [{}]. Verify that the '.format(params['src']) +
- 'file exists, that it is has correct permissions, and is valid yaml.'}
- if state == 'list':
- if params['content']:
- content = Yedit.parse_value(params['content'], params['content_type'])
- yamlfile.yaml_dict = content
- if params['key']:
- rval = yamlfile.get(params['key'])
- return {'changed': False, 'result': rval, 'state': state}
- elif state == 'absent':
- if params['content']:
- content = Yedit.parse_value(params['content'], params['content_type'])
- yamlfile.yaml_dict = content
- if params['update']:
- rval = yamlfile.pop(params['key'], params['value'])
- else:
- rval = yamlfile.delete(params['key'], params['index'], params['value'])
- if rval[0] and params['src']:
- yamlfile.write()
- return {'changed': rval[0], 'result': rval[1], 'state': state}
- elif state == 'present':
- # check if content is different than what is in the file
- if params['content']:
- content = Yedit.parse_value(params['content'], params['content_type'])
- # We had no edits to make and the contents are the same
- if yamlfile.yaml_dict == content and \
- params['value'] is None:
- return {'changed': False, 'result': yamlfile.yaml_dict, 'state': state}
- yamlfile.yaml_dict = content
- # If we were passed a key, value then
- # we enapsulate it in a list and process it
- # Key, Value passed to the module : Converted to Edits list #
- edits = []
- _edit = {}
- if params['value'] is not None:
- _edit['value'] = params['value']
- _edit['value_type'] = params['value_type']
- _edit['key'] = params['key']
- if params['update']:
- _edit['action'] = 'update'
- _edit['curr_value'] = params['curr_value']
- _edit['curr_value_format'] = params['curr_value_format']
- _edit['index'] = params['index']
- elif params['append']:
- _edit['action'] = 'append'
- edits.append(_edit)
- elif params['edits'] is not None:
- edits = params['edits']
- if edits:
- results = Yedit.process_edits(edits, yamlfile)
- # if there were changes and a src provided to us we need to write
- if results['changed'] and params['src']:
- yamlfile.write()
- return {'changed': results['changed'], 'result': results['results'], 'state': state}
- # no edits to make
- if params['src']:
- # pylint: disable=redefined-variable-type
- rval = yamlfile.write()
- return {'changed': rval[0],
- 'result': rval[1],
- 'state': state}
- # We were passed content but no src, key or value, or edits. Return contents in memory
- return {'changed': False, 'result': yamlfile.yaml_dict, 'state': state}
- return {'failed': True, 'msg': 'Unkown state passed'}
- # -*- -*- -*- End included fragment: ../../lib_utils/src/class/yedit.py -*- -*- -*-
- # -*- -*- -*- Begin included fragment: lib/base.py -*- -*- -*-
- # pylint: disable=too-many-lines
- # noqa: E301,E302,E303,T001
- class OpenShiftCLIError(Exception):
- '''Exception class for openshiftcli'''
- pass
- ADDITIONAL_PATH_LOOKUPS = ['/usr/local/bin', os.path.expanduser('~/bin')]
- def locate_oc_binary():
- ''' Find and return oc binary file '''
- # https://github.com/openshift/openshift-ansible/issues/3410
- # oc can be in /usr/local/bin in some cases, but that may not
- # be in $PATH due to ansible/sudo
- paths = os.environ.get("PATH", os.defpath).split(os.pathsep) + ADDITIONAL_PATH_LOOKUPS
- oc_binary = 'oc'
- # Use shutil.which if it is available, otherwise fallback to a naive path search
- try:
- which_result = shutil.which(oc_binary, path=os.pathsep.join(paths))
- if which_result is not None:
- oc_binary = which_result
- except AttributeError:
- for path in paths:
- if os.path.exists(os.path.join(path, oc_binary)):
- oc_binary = os.path.join(path, oc_binary)
- break
- return oc_binary
- # pylint: disable=too-few-public-methods
- class OpenShiftCLI(object):
- ''' Class to wrap the command line tools '''
- def __init__(self,
- namespace,
- kubeconfig='/etc/origin/master/admin.kubeconfig',
- verbose=False,
- all_namespaces=False):
- ''' Constructor for OpenshiftCLI '''
- self.namespace = namespace
- self.verbose = verbose
- self.kubeconfig = Utils.create_tmpfile_copy(kubeconfig)
- self.all_namespaces = all_namespaces
- self.oc_binary = locate_oc_binary()
- # Pylint allows only 5 arguments to be passed.
- # pylint: disable=too-many-arguments
- def _replace_content(self, resource, rname, content, edits=None, force=False, sep='.'):
- ''' replace the current object with the content '''
- res = self._get(resource, rname)
- if not res['results']:
- return res
- fname = Utils.create_tmpfile(rname + '-')
- yed = Yedit(fname, res['results'][0], separator=sep)
- updated = False
- if content is not None:
- changes = []
- for key, value in content.items():
- changes.append(yed.put(key, value))
- if any([change[0] for change in changes]):
- updated = True
- elif edits is not None:
- results = Yedit.process_edits(edits, yed)
- if results['changed']:
- updated = True
- if updated:
- yed.write()
- atexit.register(Utils.cleanup, [fname])
- return self._replace(fname, force)
- return {'returncode': 0, 'updated': False}
- def _replace(self, fname, force=False):
- '''replace the current object with oc replace'''
- # We are removing the 'resourceVersion' to handle
- # a race condition when modifying oc objects
- yed = Yedit(fname)
- results = yed.delete('metadata.resourceVersion')
- if results[0]:
- yed.write()
- cmd = ['replace', '-f', fname]
- if force:
- cmd.append('--force')
- return self.openshift_cmd(cmd)
- def _create_from_content(self, rname, content):
- '''create a temporary file and then call oc create on it'''
- fname = Utils.create_tmpfile(rname + '-')
- yed = Yedit(fname, content=content)
- yed.write()
- atexit.register(Utils.cleanup, [fname])
- return self._create(fname)
- def _create(self, fname):
- '''call oc create on a filename'''
- return self.openshift_cmd(['create', '-f', fname])
- def _delete(self, resource, name=None, selector=None):
- '''call oc delete on a resource'''
- cmd = ['delete', resource]
- if selector is not None:
- cmd.append('--selector={}'.format(selector))
- elif name is not None:
- cmd.append(name)
- else:
- raise OpenShiftCLIError('Either name or selector is required when calling delete.')
- return self.openshift_cmd(cmd)
- def _process(self, template_name, create=False, params=None, template_data=None): # noqa: E501
- '''process a template
- template_name: the name of the template to process
- create: whether to send to oc create after processing
- params: the parameters for the template
- template_data: the incoming template's data; instead of a file
- '''
- cmd = ['process']
- if template_data:
- cmd.extend(['-f', '-'])
- else:
- cmd.append(template_name)
- if params:
- param_str = ["{}={}".format(key, str(value).replace("'", r'"')) for key, value in params.items()]
- cmd.append('-v')
- cmd.extend(param_str)
- results = self.openshift_cmd(cmd, output=True, input_data=template_data)
- if results['returncode'] != 0 or not create:
- return results
- fname = Utils.create_tmpfile(template_name + '-')
- yed = Yedit(fname, results['results'])
- yed.write()
- atexit.register(Utils.cleanup, [fname])
- return self.openshift_cmd(['create', '-f', fname])
- def _get(self, resource, name=None, selector=None):
- '''return a resource by name '''
- cmd = ['get', resource]
- if selector is not None:
- cmd.append('--selector={}'.format(selector))
- elif name is not None:
- cmd.append(name)
- cmd.extend(['-o', 'json'])
- rval = self.openshift_cmd(cmd, output=True)
- # Ensure results are retuned in an array
- if 'items' in rval:
- rval['results'] = rval['items']
- elif not isinstance(rval['results'], list):
- rval['results'] = [rval['results']]
- return rval
- def _schedulable(self, node=None, selector=None, schedulable=True):
- ''' perform oadm manage-node scheduable '''
- cmd = ['manage-node']
- if node:
- cmd.extend(node)
- else:
- cmd.append('--selector={}'.format(selector))
- cmd.append('--schedulable={}'.format(schedulable))
- return self.openshift_cmd(cmd, oadm=True, output=True, output_type='raw') # noqa: E501
- def _list_pods(self, node=None, selector=None, pod_selector=None):
- ''' perform oadm list pods
- node: the node in which to list pods
- selector: the label selector filter if provided
- pod_selector: the pod selector filter if provided
- '''
- cmd = ['manage-node']
- if node:
- cmd.extend(node)
- else:
- cmd.append('--selector={}'.format(selector))
- if pod_selector:
- cmd.append('--pod-selector={}'.format(pod_selector))
- cmd.extend(['--list-pods', '-o', 'json'])
- return self.openshift_cmd(cmd, oadm=True, output=True, output_type='raw')
- # pylint: disable=too-many-arguments
- def _evacuate(self, node=None, selector=None, pod_selector=None, dry_run=False, grace_period=None, force=False):
- ''' perform oadm manage-node evacuate '''
- cmd = ['manage-node']
- if node:
- cmd.extend(node)
- else:
- cmd.append('--selector={}'.format(selector))
- if dry_run:
- cmd.append('--dry-run')
- if pod_selector:
- cmd.append('--pod-selector={}'.format(pod_selector))
- if grace_period:
- cmd.append('--grace-period={}'.format(int(grace_period)))
- if force:
- cmd.append('--force')
- cmd.append('--evacuate')
- return self.openshift_cmd(cmd, oadm=True, output=True, output_type='raw')
- def _version(self):
- ''' return the openshift version'''
- return self.openshift_cmd(['version'], output=True, output_type='raw')
- def _import_image(self, url=None, name=None, tag=None):
- ''' perform image import '''
- cmd = ['import-image']
- image = '{0}'.format(name)
- if tag:
- image += ':{0}'.format(tag)
- cmd.append(image)
- if url:
- cmd.append('--from={0}/{1}'.format(url, image))
- cmd.append('-n{0}'.format(self.namespace))
- cmd.append('--confirm')
- return self.openshift_cmd(cmd)
- def _run(self, cmds, input_data):
- ''' Actually executes the command. This makes mocking easier. '''
- curr_env = os.environ.copy()
- curr_env.update({'KUBECONFIG': self.kubeconfig})
- proc = subprocess.Popen(cmds,
- stdin=subprocess.PIPE,
- stdout=subprocess.PIPE,
- stderr=subprocess.PIPE,
- env=curr_env)
- stdout, stderr = proc.communicate(input_data)
- return proc.returncode, stdout.decode('utf-8'), stderr.decode('utf-8')
- # pylint: disable=too-many-arguments,too-many-branches
- def openshift_cmd(self, cmd, oadm=False, output=False, output_type='json', input_data=None):
- '''Base command for oc '''
- cmds = [self.oc_binary]
- if oadm:
- cmds.append('adm')
- cmds.extend(cmd)
- if self.all_namespaces:
- cmds.extend(['--all-namespaces'])
- elif self.namespace is not None and self.namespace.lower() not in ['none', 'emtpy']: # E501
- cmds.extend(['-n', self.namespace])
- if self.verbose:
- print(' '.join(cmds))
- try:
- returncode, stdout, stderr = self._run(cmds, input_data)
- except OSError as ex:
- returncode, stdout, stderr = 1, '', 'Failed to execute {}: {}'.format(subprocess.list2cmdline(cmds), ex)
- rval = {"returncode": returncode,
- "cmd": ' '.join(cmds)}
- if output_type == 'json':
- rval['results'] = {}
- if output and stdout:
- try:
- rval['results'] = json.loads(stdout)
- except ValueError as verr:
- if "No JSON object could be decoded" in verr.args:
- rval['err'] = verr.args
- elif output_type == 'raw':
- rval['results'] = stdout if output else ''
- if self.verbose:
- print("STDOUT: {0}".format(stdout))
- print("STDERR: {0}".format(stderr))
- if 'err' in rval or returncode != 0:
- rval.update({"stderr": stderr,
- "stdout": stdout})
- return rval
- class Utils(object): # pragma: no cover
- ''' utilities for openshiftcli modules '''
- @staticmethod
- def _write(filename, contents):
- ''' Actually write the file contents to disk. This helps with mocking. '''
- with open(filename, 'w') as sfd:
- sfd.write(str(contents))
- @staticmethod
- def create_tmp_file_from_contents(rname, data, ftype='yaml'):
- ''' create a file in tmp with name and contents'''
- tmp = Utils.create_tmpfile(prefix=rname)
- if ftype == 'yaml':
- # AUDIT:no-member makes sense here due to ruamel.YAML/PyYAML usage
- # pylint: disable=no-member
- if hasattr(yaml, 'RoundTripDumper'):
- Utils._write(tmp, yaml.dump(data, Dumper=yaml.RoundTripDumper))
- else:
- Utils._write(tmp, yaml.safe_dump(data, default_flow_style=False))
- elif ftype == 'json':
- Utils._write(tmp, json.dumps(data))
- else:
- Utils._write(tmp, data)
- # Register cleanup when module is done
- atexit.register(Utils.cleanup, [tmp])
- return tmp
- @staticmethod
- def create_tmpfile_copy(inc_file):
- '''create a temporary copy of a file'''
- tmpfile = Utils.create_tmpfile('lib_openshift-')
- Utils._write(tmpfile, open(inc_file).read())
- # Cleanup the tmpfile
- atexit.register(Utils.cleanup, [tmpfile])
- return tmpfile
- @staticmethod
- def create_tmpfile(prefix='tmp'):
- ''' Generates and returns a temporary file name '''
- with tempfile.NamedTemporaryFile(prefix=prefix, delete=False) as tmp:
- return tmp.name
- @staticmethod
- def create_tmp_files_from_contents(content, content_type=None):
- '''Turn an array of dict: filename, content into a files array'''
- if not isinstance(content, list):
- content = [content]
- files = []
- for item in content:
- path = Utils.create_tmp_file_from_contents(item['path'] + '-',
- item['data'],
- ftype=content_type)
- files.append({'name': os.path.basename(item['path']),
- 'path': path})
- return files
- @staticmethod
- def cleanup(files):
- '''Clean up on exit '''
- for sfile in files:
- if os.path.exists(sfile):
- if os.path.isdir(sfile):
- shutil.rmtree(sfile)
- elif os.path.isfile(sfile):
- os.remove(sfile)
- @staticmethod
- def exists(results, _name):
- ''' Check to see if the results include the name '''
- if not results:
- return False
- if Utils.find_result(results, _name):
- return True
- return False
- @staticmethod
- def find_result(results, _name):
- ''' Find the specified result by name'''
- rval = None
- for result in results:
- if 'metadata' in result and result['metadata']['name'] == _name:
- rval = result
- break
- return rval
- @staticmethod
- def get_resource_file(sfile, sfile_type='yaml'):
- ''' return the service file '''
- contents = None
- with open(sfile) as sfd:
- contents = sfd.read()
- if sfile_type == 'yaml':
- # AUDIT:no-member makes sense here due to ruamel.YAML/PyYAML usage
- # pylint: disable=no-member
- if hasattr(yaml, 'RoundTripLoader'):
- contents = yaml.load(contents, yaml.RoundTripLoader)
- else:
- contents = yaml.safe_load(contents)
- elif sfile_type == 'json':
- contents = json.loads(contents)
- return contents
- @staticmethod
- def filter_versions(stdout):
- ''' filter the oc version output '''
- version_dict = {}
- version_search = ['oc', 'openshift', 'kubernetes']
- for line in stdout.strip().split('\n'):
- for term in version_search:
- if not line:
- continue
- if line.startswith(term):
- version_dict[term] = line.split()[-1]
- # horrible hack to get openshift version in Openshift 3.2
- # By default "oc version in 3.2 does not return an "openshift" version
- if "openshift" not in version_dict:
- version_dict["openshift"] = version_dict["oc"]
- return version_dict
- @staticmethod
- def add_custom_versions(versions):
- ''' create custom versions strings '''
- versions_dict = {}
- for tech, version in versions.items():
- # clean up "-" from version
- if "-" in version:
- version = version.split("-")[0]
- if version.startswith('v'):
- versions_dict[tech + '_numeric'] = version[1:].split('+')[0]
- # "v3.3.0.33" is what we have, we want "3.3"
- versions_dict[tech + '_short'] = version[1:4]
- return versions_dict
- @staticmethod
- def openshift_installed():
- ''' check if openshift is installed '''
- import rpm
- transaction_set = rpm.TransactionSet()
- rpmquery = transaction_set.dbMatch("name", "atomic-openshift")
- return rpmquery.count() > 0
- # Disabling too-many-branches. This is a yaml dictionary comparison function
- # pylint: disable=too-many-branches,too-many-return-statements,too-many-statements
- @staticmethod
- def check_def_equal(user_def, result_def, skip_keys=None, debug=False):
- ''' Given a user defined definition, compare it with the results given back by our query. '''
- # Currently these values are autogenerated and we do not need to check them
- skip = ['metadata', 'status']
- if skip_keys:
- skip.extend(skip_keys)
- for key, value in result_def.items():
- if key in skip:
- continue
- # Both are lists
- if isinstance(value, list):
- if key not in user_def:
- if debug:
- print('User data does not have key [%s]' % key)
- print('User data: %s' % user_def)
- return False
- if not isinstance(user_def[key], list):
- if debug:
- print('user_def[key] is not a list key=[%s] user_def[key]=%s' % (key, user_def[key]))
- return False
- if len(user_def[key]) != len(value):
- if debug:
- print("List lengths are not equal.")
- print("key=[%s]: user_def[%s] != value[%s]" % (key, len(user_def[key]), len(value)))
- print("user_def: %s" % user_def[key])
- print("value: %s" % value)
- return False
- for values in zip(user_def[key], value):
- if isinstance(values[0], dict) and isinstance(values[1], dict):
- if debug:
- print('sending list - list')
- print(type(values[0]))
- print(type(values[1]))
- result = Utils.check_def_equal(values[0], values[1], skip_keys=skip_keys, debug=debug)
- if not result:
- print('list compare returned false')
- return False
- elif value != user_def[key]:
- if debug:
- print('value should be identical')
- print(user_def[key])
- print(value)
- return False
- # recurse on a dictionary
- elif isinstance(value, dict):
- if key not in user_def:
- if debug:
- print("user_def does not have key [%s]" % key)
- return False
- if not isinstance(user_def[key], dict):
- if debug:
- print("dict returned false: not instance of dict")
- return False
- # before passing ensure keys match
- api_values = set(value.keys()) - set(skip)
- user_values = set(user_def[key].keys()) - set(skip)
- if api_values != user_values:
- if debug:
- print("keys are not equal in dict")
- print(user_values)
- print(api_values)
- return False
- result = Utils.check_def_equal(user_def[key], value, skip_keys=skip_keys, debug=debug)
- if not result:
- if debug:
- print("dict returned false")
- print(result)
- return False
- # Verify each key, value pair is the same
- else:
- if key not in user_def or value != user_def[key]:
- if debug:
- print("value not equal; user_def does not have key")
- print(key)
- print(value)
- if key in user_def:
- print(user_def[key])
- return False
- if debug:
- print('returning true')
- return True
- class OpenShiftCLIConfig(object):
- '''Generic Config'''
- def __init__(self, rname, namespace, kubeconfig, options):
- self.kubeconfig = kubeconfig
- self.name = rname
- self.namespace = namespace
- self._options = options
- @property
- def config_options(self):
- ''' return config options '''
- return self._options
- def to_option_list(self, ascommalist=''):
- '''return all options as a string
- if ascommalist is set to the name of a key, and
- the value of that key is a dict, format the dict
- as a list of comma delimited key=value pairs'''
- return self.stringify(ascommalist)
- def stringify(self, ascommalist=''):
- ''' return the options hash as cli params in a string
- if ascommalist is set to the name of a key, and
- the value of that key is a dict, format the dict
- as a list of comma delimited key=value pairs '''
- rval = []
- for key in sorted(self.config_options.keys()):
- data = self.config_options[key]
- if data['include'] \
- and (data['value'] is not None or isinstance(data['value'], int)):
- if key == ascommalist:
- val = ','.join(['{}={}'.format(kk, vv) for kk, vv in sorted(data['value'].items())])
- else:
- val = data['value']
- rval.append('--{}={}'.format(key.replace('_', '-'), val))
- return rval
- # -*- -*- -*- End included fragment: lib/base.py -*- -*- -*-
- # -*- -*- -*- Begin included fragment: lib/rolebinding.py -*- -*- -*-
- # pylint: disable=too-many-instance-attributes
- class RoleBindingConfig(object):
- ''' Handle rolebinding config '''
- # pylint: disable=too-many-arguments
- def __init__(self,
- name,
- namespace,
- kubeconfig,
- group_names=None,
- role_ref=None,
- subjects=None,
- usernames=None):
- ''' constructor for handling rolebinding options '''
- self.kubeconfig = kubeconfig
- self.name = name
- self.namespace = namespace
- self.group_names = group_names
- self.role_ref = role_ref
- self.subjects = subjects
- self.usernames = usernames
- self.data = {}
- self.create_dict()
- def create_dict(self):
- ''' create a default rolebinding as a dict '''
- self.data['apiVersion'] = 'v1'
- self.data['kind'] = 'RoleBinding'
- self.data['groupNames'] = self.group_names
- self.data['metadata']['name'] = self.name
- self.data['metadata']['namespace'] = self.namespace
- self.data['roleRef'] = self.role_ref
- self.data['subjects'] = self.subjects
- self.data['userNames'] = self.usernames
- # pylint: disable=too-many-instance-attributes,too-many-public-methods
- class RoleBinding(Yedit):
- ''' Class to model a rolebinding openshift object'''
- group_names_path = "groupNames"
- role_ref_path = "roleRef"
- subjects_path = "subjects"
- user_names_path = "userNames"
- kind = 'RoleBinding'
- def __init__(self, content):
- '''RoleBinding constructor'''
- super(RoleBinding, self).__init__(content=content)
- self._subjects = None
- self._role_ref = None
- self._group_names = None
- self._user_names = None
- @property
- def subjects(self):
- ''' subjects property '''
- if self._subjects is None:
- self._subjects = self.get_subjects()
- return self._subjects
- @subjects.setter
- def subjects(self, data):
- ''' subjects property setter'''
- self._subjects = data
- @property
- def role_ref(self):
- ''' role_ref property '''
- if self._role_ref is None:
- self._role_ref = self.get_role_ref()
- return self._role_ref
- @role_ref.setter
- def role_ref(self, data):
- ''' role_ref property setter'''
- self._role_ref = data
- @property
- def group_names(self):
- ''' group_names property '''
- if self._group_names is None:
- self._group_names = self.get_group_names()
- return self._group_names
- @group_names.setter
- def group_names(self, data):
- ''' group_names property setter'''
- self._group_names = data
- @property
- def user_names(self):
- ''' user_names property '''
- if self._user_names is None:
- self._user_names = self.get_user_names()
- return self._user_names
- @user_names.setter
- def user_names(self, data):
- ''' user_names property setter'''
- self._user_names = data
- def get_group_names(self):
- ''' return groupNames '''
- return self.get(RoleBinding.group_names_path) or []
- def get_user_names(self):
- ''' return usernames '''
- return self.get(RoleBinding.user_names_path) or []
- def get_role_ref(self):
- ''' return role_ref '''
- return self.get(RoleBinding.role_ref_path) or {}
- def get_subjects(self):
- ''' return subjects '''
- return self.get(RoleBinding.subjects_path) or []
- #### ADD #####
- def add_subject(self, inc_subject):
- ''' add a subject '''
- if self.subjects:
- # pylint: disable=no-member
- self.subjects.append(inc_subject)
- else:
- self.put(RoleBinding.subjects_path, [inc_subject])
- return True
- def add_role_ref(self, inc_role_ref):
- ''' add a role_ref '''
- if not self.role_ref:
- self.put(RoleBinding.role_ref_path, {"name": inc_role_ref})
- return True
- return False
- def add_group_names(self, inc_group_names):
- ''' add a group_names '''
- if self.group_names:
- # pylint: disable=no-member
- self.group_names.append(inc_group_names)
- else:
- self.put(RoleBinding.group_names_path, [inc_group_names])
- return True
- def add_user_name(self, inc_user_name):
- ''' add a username '''
- if self.user_names:
- # pylint: disable=no-member
- self.user_names.append(inc_user_name)
- else:
- self.put(RoleBinding.user_names_path, [inc_user_name])
- return True
- #### /ADD #####
- #### Remove #####
- def remove_subject(self, inc_subject):
- ''' remove a subject '''
- try:
- # pylint: disable=no-member
- self.subjects.remove(inc_subject)
- except ValueError as _:
- return False
- return True
- def remove_role_ref(self, inc_role_ref):
- ''' remove a role_ref '''
- if self.role_ref and self.role_ref['name'] == inc_role_ref:
- del self.role_ref['name']
- return True
- return False
- def remove_group_name(self, inc_group_name):
- ''' remove a groupname '''
- try:
- # pylint: disable=no-member
- self.group_names.remove(inc_group_name)
- except ValueError as _:
- return False
- return True
- def remove_user_name(self, inc_user_name):
- ''' remove a username '''
- try:
- # pylint: disable=no-member
- self.user_names.remove(inc_user_name)
- except ValueError as _:
- return False
- return True
- #### /REMOVE #####
- #### UPDATE #####
- def update_subject(self, inc_subject):
- ''' update a subject '''
- try:
- # pylint: disable=no-member
- index = self.subjects.index(inc_subject)
- except ValueError as _:
- return self.add_subject(inc_subject)
- self.subjects[index] = inc_subject
- return True
- def update_group_name(self, inc_group_name):
- ''' update a groupname '''
- try:
- # pylint: disable=no-member
- index = self.group_names.index(inc_group_name)
- except ValueError as _:
- return self.add_group_names(inc_group_name)
- self.group_names[index] = inc_group_name
- return True
- def update_user_name(self, inc_user_name):
- ''' update a username '''
- try:
- # pylint: disable=no-member
- index = self.user_names.index(inc_user_name)
- except ValueError as _:
- return self.add_user_name(inc_user_name)
- self.user_names[index] = inc_user_name
- return True
- def update_role_ref(self, inc_role_ref):
- ''' update a role_ref '''
- self.role_ref['name'] = inc_role_ref
- return True
- #### /UPDATE #####
- #### FIND ####
- def find_subject(self, inc_subject):
- ''' find a subject '''
- index = None
- try:
- # pylint: disable=no-member
- index = self.subjects.index(inc_subject)
- except ValueError as _:
- return index
- return index
- def find_group_name(self, inc_group_name):
- ''' find a group_name '''
- index = None
- try:
- # pylint: disable=no-member
- index = self.group_names.index(inc_group_name)
- except ValueError as _:
- return index
- return index
- def find_user_name(self, inc_user_name):
- ''' find a user_name '''
- index = None
- try:
- # pylint: disable=no-member
- index = self.user_names.index(inc_user_name)
- except ValueError as _:
- return index
- return index
- def find_role_ref(self, inc_role_ref):
- ''' find a user_name '''
- if self.role_ref and self.role_ref['name'] == inc_role_ref['name']:
- return self.role_ref
- return None
- # -*- -*- -*- End included fragment: lib/rolebinding.py -*- -*- -*-
- # -*- -*- -*- Begin included fragment: lib/scc.py -*- -*- -*-
- # pylint: disable=too-many-instance-attributes
- class SecurityContextConstraintsConfig(object):
- ''' Handle scc options '''
- # pylint: disable=too-many-arguments
- def __init__(self,
- sname,
- kubeconfig,
- options=None,
- fs_group='MustRunAs',
- default_add_capabilities=None,
- groups=None,
- priority=None,
- required_drop_capabilities=None,
- run_as_user='MustRunAsRange',
- se_linux_context='MustRunAs',
- supplemental_groups='RunAsAny',
- users=None,
- annotations=None):
- ''' constructor for handling scc options '''
- self.kubeconfig = kubeconfig
- self.name = sname
- self.options = options
- self.fs_group = fs_group
- self.default_add_capabilities = default_add_capabilities
- self.groups = groups
- self.priority = priority
- self.required_drop_capabilities = required_drop_capabilities
- self.run_as_user = run_as_user
- self.se_linux_context = se_linux_context
- self.supplemental_groups = supplemental_groups
- self.users = users
- self.annotations = annotations
- self.data = {}
- self.create_dict()
- def create_dict(self):
- ''' assign the correct properties for a scc dict '''
- # allow options
- if self.options:
- for key, value in self.options.items():
- self.data[key] = value
- else:
- self.data['allowHostDirVolumePlugin'] = False
- self.data['allowHostIPC'] = False
- self.data['allowHostNetwork'] = False
- self.data['allowHostPID'] = False
- self.data['allowHostPorts'] = False
- self.data['allowPrivilegedContainer'] = False
- self.data['allowedCapabilities'] = None
- # version
- self.data['apiVersion'] = 'v1'
- # kind
- self.data['kind'] = 'SecurityContextConstraints'
- # defaultAddCapabilities
- self.data['defaultAddCapabilities'] = self.default_add_capabilities
- # fsGroup
- self.data['fsGroup']['type'] = self.fs_group
- # groups
- self.data['groups'] = []
- if self.groups:
- self.data['groups'] = self.groups
- # metadata
- self.data['metadata'] = {}
- self.data['metadata']['name'] = self.name
- if self.annotations:
- for key, value in self.annotations.items():
- self.data['metadata'][key] = value
- # priority
- self.data['priority'] = self.priority
- # requiredDropCapabilities
- self.data['requiredDropCapabilities'] = self.required_drop_capabilities
- # runAsUser
- self.data['runAsUser'] = {'type': self.run_as_user}
- # seLinuxContext
- self.data['seLinuxContext'] = {'type': self.se_linux_context}
- # supplementalGroups
- self.data['supplementalGroups'] = {'type': self.supplemental_groups}
- # users
- self.data['users'] = []
- if self.users:
- self.data['users'] = self.users
- # pylint: disable=too-many-instance-attributes,too-many-public-methods,no-member
- class SecurityContextConstraints(Yedit):
- ''' Class to wrap the oc command line tools '''
- default_add_capabilities_path = "defaultAddCapabilities"
- fs_group_path = "fsGroup"
- groups_path = "groups"
- priority_path = "priority"
- required_drop_capabilities_path = "requiredDropCapabilities"
- run_as_user_path = "runAsUser"
- se_linux_context_path = "seLinuxContext"
- supplemental_groups_path = "supplementalGroups"
- users_path = "users"
- kind = 'SecurityContextConstraints'
- def __init__(self, content):
- '''SecurityContextConstraints constructor'''
- super(SecurityContextConstraints, self).__init__(content=content)
- self._users = None
- self._groups = None
- @property
- def users(self):
- ''' users property getter '''
- if self._users is None:
- self._users = self.get_users()
- return self._users
- @property
- def groups(self):
- ''' groups property getter '''
- if self._groups is None:
- self._groups = self.get_groups()
- return self._groups
- @users.setter
- def users(self, data):
- ''' users property setter'''
- self._users = data
- @groups.setter
- def groups(self, data):
- ''' groups property setter'''
- self._groups = data
- def get_users(self):
- '''get scc users'''
- return self.get(SecurityContextConstraints.users_path) or []
- def get_groups(self):
- '''get scc groups'''
- return self.get(SecurityContextConstraints.groups_path) or []
- def add_user(self, inc_user):
- ''' add a user '''
- if self.users:
- self.users.append(inc_user)
- else:
- self.put(SecurityContextConstraints.users_path, [inc_user])
- return True
- def add_group(self, inc_group):
- ''' add a group '''
- if self.groups:
- self.groups.append(inc_group)
- else:
- self.put(SecurityContextConstraints.groups_path, [inc_group])
- return True
- def remove_user(self, inc_user):
- ''' remove a user '''
- try:
- self.users.remove(inc_user)
- except ValueError as _:
- return False
- return True
- def remove_group(self, inc_group):
- ''' remove a group '''
- try:
- self.groups.remove(inc_group)
- except ValueError as _:
- return False
- return True
- def update_user(self, inc_user):
- ''' update a user '''
- try:
- index = self.users.index(inc_user)
- except ValueError as _:
- return self.add_user(inc_user)
- self.users[index] = inc_user
- return True
- def update_group(self, inc_group):
- ''' update a group '''
- try:
- index = self.groups.index(inc_group)
- except ValueError as _:
- return self.add_group(inc_group)
- self.groups[index] = inc_group
- return True
- def find_user(self, inc_user):
- ''' find a user '''
- index = None
- try:
- index = self.users.index(inc_user)
- except ValueError as _:
- return index
- return index
- def find_group(self, inc_group):
- ''' find a group '''
- index = None
- try:
- index = self.groups.index(inc_group)
- except ValueError as _:
- return index
- return index
- # -*- -*- -*- End included fragment: lib/scc.py -*- -*- -*-
- # -*- -*- -*- Begin included fragment: class/oc_adm_policy_user.py -*- -*- -*-
- class PolicyUserException(Exception):
- ''' PolicyUser exception'''
- pass
- class PolicyUserConfig(OpenShiftCLIConfig):
- ''' PolicyUserConfig is a DTO for user related policy. '''
- def __init__(self, namespace, kubeconfig, policy_options):
- super(PolicyUserConfig, self).__init__(policy_options['name']['value'],
- namespace, kubeconfig, policy_options)
- self.kind = self.get_kind()
- self.namespace = namespace
- def get_kind(self):
- ''' return the kind we are working with '''
- if self.config_options['resource_kind']['value'] == 'role':
- return 'rolebinding'
- elif self.config_options['resource_kind']['value'] == 'cluster-role':
- return 'clusterrolebinding'
- elif self.config_options['resource_kind']['value'] == 'scc':
- return 'scc'
- return None
- # pylint: disable=too-many-return-statements
- class PolicyUser(OpenShiftCLI):
- ''' Class to handle attaching policies to users '''
- def __init__(self,
- config,
- verbose=False):
- ''' Constructor for PolicyUser '''
- super(PolicyUser, self).__init__(config.namespace, config.kubeconfig, verbose)
- self.config = config
- self.verbose = verbose
- self._rolebinding = None
- self._scc = None
- self._cluster_role_bindings = None
- self._role_bindings = None
- @property
- def rolebindings(self):
- if self._role_bindings is None:
- results = self._get('rolebindings', None)
- if results['returncode'] != 0:
- raise OpenShiftCLIError('Could not retrieve rolebindings')
- self._role_bindings = results['results'][0]['items']
- return self._role_bindings
- @property
- def clusterrolebindings(self):
- if self._cluster_role_bindings is None:
- results = self._get('clusterrolebindings', None)
- if results['returncode'] != 0:
- raise OpenShiftCLIError('Could not retrieve clusterrolebindings')
- self._cluster_role_bindings = results['results'][0]['items']
- return self._cluster_role_bindings
- @property
- def role_binding(self):
- ''' role_binding property '''
- return self._rolebinding
- @role_binding.setter
- def role_binding(self, binding):
- ''' setter for role_binding property '''
- self._rolebinding = binding
- @property
- def security_context_constraint(self):
- ''' security_context_constraint property '''
- return self._scc
- @security_context_constraint.setter
- def security_context_constraint(self, scc):
- ''' setter for security_context_constraint property '''
- self._scc = scc
- def get(self):
- '''fetch the desired kind
- This is only used for scc objects.
- The {cluster}rolebindings happen in exists.
- '''
- resource_name = self.config.config_options['name']['value']
- if resource_name == 'cluster-reader':
- resource_name += 's'
- return self._get(self.config.kind, resource_name)
- def exists_role_binding(self):
- ''' return whether role_binding exists '''
- bindings = None
- if self.config.config_options['resource_kind']['value'] == 'cluster-role':
- bindings = self.clusterrolebindings
- else:
- bindings = self.rolebindings
- if bindings is None:
- return False
- for binding in bindings:
- if binding['roleRef']['name'] == self.config.config_options['name']['value'] and \
- binding['userNames'] is not None and \
- self.config.config_options['user']['value'] in binding['userNames']:
- self.role_binding = binding
- return True
- return False
- def exists_scc(self):
- ''' return whether scc exists '''
- results = self.get()
- if results['returncode'] == 0:
- self.security_context_constraint = SecurityContextConstraints(results['results'][0])
- if self.security_context_constraint.find_user(self.config.config_options['user']['value']) != None:
- return True
- return False
- return results
- def exists(self):
- '''does the object exist?'''
- if self.config.config_options['resource_kind']['value'] == 'cluster-role':
- return self.exists_role_binding()
- elif self.config.config_options['resource_kind']['value'] == 'role':
- return self.exists_role_binding()
- elif self.config.config_options['resource_kind']['value'] == 'scc':
- return self.exists_scc()
- return False
- def perform(self):
- '''perform action on resource'''
- cmd = ['policy',
- self.config.config_options['action']['value'],
- self.config.config_options['name']['value'],
- self.config.config_options['user']['value']]
- if self.config.config_options['role_namespace']['value'] is not None:
- cmd.extend(['--role-namespace', self.config.config_options['role_namespace']['value']])
- return self.openshift_cmd(cmd, oadm=True)
- @staticmethod
- def run_ansible(params, check_mode):
- '''run the idempotent ansible code'''
- state = params['state']
- action = None
- if state == 'present':
- action = 'add-' + params['resource_kind'] + '-to-user'
- else:
- action = 'remove-' + params['resource_kind'] + '-from-user'
- nconfig = PolicyUserConfig(params['namespace'],
- params['kubeconfig'],
- {'action': {'value': action, 'include': False},
- 'user': {'value': params['user'], 'include': False},
- 'resource_kind': {'value': params['resource_kind'], 'include': False},
- 'name': {'value': params['resource_name'], 'include': False},
- 'role_namespace': {'value': params['role_namespace'], 'include': False},
- })
- policyuser = PolicyUser(nconfig, params['debug'])
- # Run the oc adm policy user related command
- ########
- # Delete
- ########
- if state == 'absent':
- if not policyuser.exists():
- return {'changed': False, 'state': 'absent'}
- if check_mode:
- return {'changed': False, 'msg': 'CHECK_MODE: would have performed a delete.'}
- api_rval = policyuser.perform()
- if api_rval['returncode'] != 0:
- return {'msg': api_rval}
- return {'changed': True, 'results' : api_rval, state:'absent'}
- if state == 'present':
- ########
- # Create
- ########
- results = policyuser.exists()
- if isinstance(results, dict) and 'returncode' in results and results['returncode'] != 0:
- return {'msg': results}
- if not results:
- if check_mode:
- return {'changed': False, 'msg': 'CHECK_MODE: would have performed a create.'}
- api_rval = policyuser.perform()
- if api_rval['returncode'] != 0:
- return {'msg': api_rval}
- return {'changed': True, 'results': api_rval, state: 'present'}
- return {'changed': False, state: 'present'}
- return {'failed': True, 'changed': False, 'results': 'Unknown state passed. %s' % state, state: 'unknown'}
- # -*- -*- -*- End included fragment: class/oc_adm_policy_user.py -*- -*- -*-
- # -*- -*- -*- Begin included fragment: ansible/oc_adm_policy_user.py -*- -*- -*-
- def main():
- '''
- ansible oc adm module for user policy
- '''
- module = AnsibleModule(
- argument_spec=dict(
- state=dict(default='present', type='str',
- choices=['present', 'absent']),
- debug=dict(default=False, type='bool'),
- resource_name=dict(required=True, type='str'),
- namespace=dict(default='default', type='str'),
- role_namespace=dict(default=None, type='str'),
- kubeconfig=dict(default='/etc/origin/master/admin.kubeconfig', type='str'),
- user=dict(required=True, type='str'),
- resource_kind=dict(required=True, choices=['role', 'cluster-role', 'scc'], type='str'),
- ),
- supports_check_mode=True,
- )
- results = PolicyUser.run_ansible(module.params, module.check_mode)
- if 'failed' in results:
- module.fail_json(**results)
- module.exit_json(**results)
- if __name__ == "__main__":
- main()
- # -*- -*- -*- End included fragment: ansible/oc_adm_policy_user.py -*- -*- -*-
|