oc_csr_approve.py 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306
  1. #!/usr/bin/env python
  2. '''oc_csr_approve module'''
  3. # Copyright 2018 Red Hat, Inc. and/or its affiliates
  4. # and other contributors as indicated by the @author tags.
  5. #
  6. # Licensed under the Apache License, Version 2.0 (the "License");
  7. # you may not use this file except in compliance with the License.
  8. # You may obtain a copy of the License at
  9. #
  10. # http://www.apache.org/licenses/LICENSE-2.0
  11. #
  12. # Unless required by applicable law or agreed to in writing, software
  13. # distributed under the License is distributed on an "AS IS" BASIS,
  14. # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  15. # See the License for the specific language governing permissions and
  16. # limitations under the License.
  17. import base64
  18. import json
  19. from ansible.module_utils.basic import AnsibleModule
  20. try:
  21. from json.decoder import JSONDecodeError
  22. except ImportError:
  23. JSONDecodeError = ValueError
  24. DOCUMENTATION = '''
  25. ---
  26. module: oc_csr_approve
  27. short_description: Retrieve, approve, and verify node client csrs
  28. version_added: "2.4"
  29. description:
  30. - Runs various commands to list csrs, approve csrs, and verify nodes are
  31. ready.
  32. author:
  33. - "Michael Gugino <mgugino@redhat.com>"
  34. '''
  35. EXAMPLES = '''
  36. # Pass in a message
  37. - name: Place credentials in file
  38. oc_csr_approve:
  39. oc_bin: "/usr/bin/oc"
  40. oc_conf: "/etc/origin/master/admin.kubeconfig"
  41. node_list: ['node1.example.com', 'node2.example.com']
  42. '''
  43. CERT_MODE = {'client': 'client auth', 'server': 'server auth'}
  44. def run_command(module, command, rc_opts=None):
  45. '''Run a command using AnsibleModule.run_command, or fail'''
  46. if rc_opts is None:
  47. rc_opts = {}
  48. rtnc, stdout, err = module.run_command(command, **rc_opts)
  49. if rtnc:
  50. result = {'failed': True,
  51. 'changed': False,
  52. 'msg': str(err),
  53. 'state': 'unknown'}
  54. module.fail_json(**result)
  55. return stdout
  56. def get_ready_nodes(module, oc_bin, oc_conf):
  57. '''Get list of nodes currently ready vi oc'''
  58. # json output is necessary for consistency here.
  59. command = "{} {} get nodes -ojson".format(oc_bin, oc_conf)
  60. stdout = run_command(module, command)
  61. try:
  62. data = json.loads(stdout)
  63. except JSONDecodeError as err:
  64. result = {'failed': True,
  65. 'changed': False,
  66. 'msg': str(err),
  67. 'state': 'unknown'}
  68. module.fail_json(**result)
  69. ready_nodes = []
  70. for node in data['items']:
  71. if node.get('status') and node['status'].get('conditions'):
  72. for condition in node['status']['conditions']:
  73. # "True" is a string here, not a boolean.
  74. if condition['type'] == "Ready" and condition['status'] == 'True':
  75. ready_nodes.append(node['metadata']['name'])
  76. return ready_nodes
  77. def get_csrs(module, oc_bin, oc_conf):
  78. '''Retrieve csrs from cluster using oc get csr -ojson'''
  79. command = "{} {} get csr -ojson".format(oc_bin, oc_conf)
  80. stdout = run_command(module, command)
  81. try:
  82. data = json.loads(stdout)
  83. except JSONDecodeError as err:
  84. result = {'failed': True,
  85. 'changed': False,
  86. 'msg': str(err),
  87. 'state': 'unknown'}
  88. module.fail_json(**result)
  89. return data['items']
  90. def parse_subject_cn(subject_str):
  91. '''parse output of openssl req -noout -subject to retrieve CN.
  92. example input:
  93. 'subject=/C=US/CN=test.io/L=Raleigh/O=Red Hat/ST=North Carolina/OU=OpenShift\n'
  94. or
  95. 'subject=C = US, CN = test.io, L = City, O = Company, ST = State, OU = Dept\n'
  96. example output: 'test.io'
  97. '''
  98. stripped_string = subject_str[len('subject='):].strip()
  99. kv_strings = [x.strip() for x in stripped_string.split(',')]
  100. if len(kv_strings) == 1:
  101. kv_strings = [x.strip() for x in stripped_string.split('/')][1:]
  102. for item in kv_strings:
  103. item_parts = [x.strip() for x in item.split('=')]
  104. if item_parts[0] == 'CN':
  105. return item_parts[1]
  106. def process_csrs(module, csrs, node_list, mode):
  107. '''Return a dictionary of pending csrs where the format of the dict is
  108. k=csr name, v=Subject Common Name'''
  109. csr_dict = {}
  110. for item in csrs:
  111. status = item['status'].get('conditions')
  112. if status:
  113. # If status is not an empty dictionary, cert is not pending.
  114. continue
  115. if CERT_MODE[mode] not in item['spec']['usages']:
  116. continue
  117. name = item['metadata']['name']
  118. request_data = base64.b64decode(item['spec']['request'])
  119. command = "openssl req -noout -subject"
  120. # ansible's module.run_command accepts data to pipe via stdin as
  121. # as 'data' kwarg.
  122. rc_opts = {'data': request_data, 'binary_data': True}
  123. stdout = run_command(module, command, rc_opts=rc_opts)
  124. # parse common_name from subject string.
  125. common_name = parse_subject_cn(stdout)
  126. if common_name and common_name.startswith('system:node:'):
  127. # common name is typically prepended with system:node:.
  128. common_name = common_name.split('system:node:')[1]
  129. # we only want to approve csrs from nodes we know about.
  130. if common_name in node_list:
  131. csr_dict[name] = common_name
  132. return csr_dict
  133. def confirm_needed_requests_present(module, not_ready_nodes, csr_dict):
  134. '''Ensure all non-Ready nodes have a csr, or fail'''
  135. nodes_needed = set(not_ready_nodes)
  136. for _, val in csr_dict.items():
  137. nodes_needed.discard(val)
  138. # check that we found all of our needed nodes
  139. if nodes_needed:
  140. missing_nodes = ', '.join(nodes_needed)
  141. result = {'failed': True,
  142. 'changed': False,
  143. 'msg': "Cound not find csr for nodes: {}".format(missing_nodes),
  144. 'state': 'unknown'}
  145. module.fail_json(**result)
  146. def approve_csrs(module, oc_bin, oc_conf, csr_pending_list, mode):
  147. '''Loop through csr_pending_list and call:
  148. oc adm certificate approve <item>'''
  149. res_mode = "{}_approve_results".format(mode)
  150. base_command = "{} {} adm certificate approve {}"
  151. approve_results = []
  152. for csr in csr_pending_list:
  153. command = base_command.format(oc_bin, oc_conf, csr)
  154. rtnc, stdout, err = module.run_command(command)
  155. approve_results.append(stdout)
  156. if rtnc:
  157. result = {'failed': True,
  158. 'changed': False,
  159. 'msg': str(err),
  160. res_mode: approve_results,
  161. 'state': 'unknown'}
  162. module.fail_json(**result)
  163. return approve_results
  164. def get_ready_nodes_server(module, oc_bin, oc_conf, nodes_list):
  165. '''Determine which nodes have working server certificates'''
  166. ready_nodes_server = []
  167. base_command = "{} {} get --raw /api/v1/nodes/{}/proxy/healthz"
  168. for node in nodes_list:
  169. # need this to look like /api/v1/nodes/<node>/proxy/healthz
  170. command = base_command.format(oc_bin, oc_conf, node)
  171. rtnc, _, _ = module.run_command(command)
  172. if not rtnc:
  173. # if we can hit that api endpoint, the node has a valid server
  174. # cert.
  175. ready_nodes_server.append(node)
  176. return ready_nodes_server
  177. def verify_server_csrs(module, result, oc_bin, oc_conf, node_list):
  178. '''We approved some server csrs, now we need to validate they are working.
  179. This function will attempt to retry 10 times in case of failure.'''
  180. # Attempt to try node endpoints a few times.
  181. attempts = 0
  182. # Find not_ready_nodes for server-side again
  183. nodes_server_ready = get_ready_nodes_server(module, oc_bin, oc_conf,
  184. node_list)
  185. # Create list of nodes that still aren't ready.
  186. not_ready_nodes_server = set([item for item in node_list if item not in nodes_server_ready])
  187. while not_ready_nodes_server:
  188. nodes_server_ready = get_ready_nodes_server(module, oc_bin, oc_conf,
  189. not_ready_nodes_server)
  190. # if we have same number of nodes_server_ready now, all of the previous
  191. # not_ready_nodes are now ready.
  192. if len(nodes_server_ready) == len(not_ready_nodes_server):
  193. break
  194. attempts += 1
  195. if attempts > 9:
  196. result['failed'] = True
  197. result['rc'] = 1
  198. missing_nodes = not_ready_nodes_server - set(nodes_server_ready)
  199. msg = "Some nodes still not ready after approving server certs: {}"
  200. msg = msg.format(", ".join(missing_nodes))
  201. result['msg'] = msg
  202. def run_module():
  203. '''Run this module'''
  204. module_args = dict(
  205. oc_bin=dict(type='path', required=False, default='oc'),
  206. oc_conf=dict(type='path', required=False, default='/etc/origin/master/admin.kubeconfig'),
  207. node_list=dict(type='list', required=True),
  208. )
  209. module = AnsibleModule(
  210. supports_check_mode=False,
  211. argument_spec=module_args
  212. )
  213. oc_bin = module.params['oc_bin']
  214. oc_conf = '--config={}'.format(module.params['oc_conf'])
  215. node_list = module.params['node_list']
  216. result = {'changed': False, 'rc': 0}
  217. nodes_ready = get_ready_nodes(module, oc_bin, oc_conf)
  218. # don't need to check nodes that are already ready.
  219. not_ready_nodes = [item for item in node_list if item not in nodes_ready]
  220. # Get all csrs, no good way to filter on pending.
  221. csrs = get_csrs(module, oc_bin, oc_conf)
  222. # process data in csrs and build a dictionary of client requests
  223. csr_dict = process_csrs(module, csrs, node_list, "client")
  224. # This method is fail-happy and expects all non-Ready nodes have available
  225. # csrs. Handle failure for this method via ansible retry/until.
  226. confirm_needed_requests_present(module, not_ready_nodes, csr_dict)
  227. # save client_approve_results so we can report later.
  228. client_approve_results = approve_csrs(module, oc_bin, oc_conf, csr_dict,
  229. 'client')
  230. result['client_approve_results'] = client_approve_results
  231. # # Server Cert Section # #
  232. # Find not_ready_nodes for server-side
  233. nodes_server_ready = get_ready_nodes_server(module, oc_bin, oc_conf,
  234. node_list)
  235. # Create list of nodes that definitely need a server cert approved.
  236. not_ready_nodes_server = [item for item in node_list if item not in nodes_server_ready]
  237. # Get all csrs again, no good way to filter on pending.
  238. csrs = get_csrs(module, oc_bin, oc_conf)
  239. # process data in csrs and build a dictionary of server requests
  240. csr_dict = process_csrs(module, csrs, node_list, "server")
  241. # This will fail if all server csrs are not present, but probably shouldn't
  242. # at this point since we spent some time hitting the api to see if the
  243. # nodes are already responding.
  244. confirm_needed_requests_present(module, not_ready_nodes_server, csr_dict)
  245. server_approve_results = approve_csrs(module, oc_bin, oc_conf, csr_dict,
  246. 'server')
  247. result['server_approve_results'] = server_approve_results
  248. result['changed'] = bool(client_approve_results) or bool(server_approve_results)
  249. verify_server_csrs(module, result, oc_bin, oc_conf, node_list)
  250. module.exit_json(**result)
  251. def main():
  252. '''main'''
  253. run_module()
  254. if __name__ == '__main__':
  255. main()