sanity_checks.py 26 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555
  1. """
  2. Ansible action plugin to ensure inventory variables are set
  3. appropriately and no conflicting options have been provided.
  4. """
  5. import json
  6. import re
  7. from ansible.plugins.action import ActionBase
  8. from ansible import errors
  9. # pylint: disable=import-error,no-name-in-module
  10. from ansible.module_utils.six.moves.urllib.parse import urlparse
  11. # Valid values for openshift_deployment_type
  12. VALID_DEPLOYMENT_TYPES = ('origin', 'openshift-enterprise')
  13. # Tuple of variable names and default values if undefined.
  14. NET_PLUGIN_LIST = (('openshift_use_openshift_sdn', True),
  15. ('openshift_use_flannel', False),
  16. ('openshift_use_nuage', False),
  17. ('openshift_use_contiv', False),
  18. ('openshift_use_calico', False),
  19. ('openshift_use_kuryr', False))
  20. ENTERPRISE_TAG_REGEX_ERROR = """openshift_image_tag must be in the format
  21. v#.#[.#[.#]]. Examples: v1.2, v3.4.1, v3.5.1.3,
  22. v3.5.1.3.4, v1.2-1, v1.2.3-4, v1.2.3-4.5, v1.2.3-4.5.6
  23. You specified openshift_image_tag={}"""
  24. ORIGIN_TAG_REGEX_ERROR = """openshift_image_tag must be in the format
  25. v#.#[.#-optional.#]. Examples: v1.2.3, v3.5.1-alpha.1
  26. You specified openshift_image_tag={}"""
  27. ORIGIN_TAG_REGEX = {'re': '(^v?\\d+\\.\\d+.*)',
  28. 'error_msg': ORIGIN_TAG_REGEX_ERROR}
  29. ENTERPRISE_TAG_REGEX = {'re': '(^v\\d+\\.\\d+(\\.\\d+)*(-\\d+(\\.\\d+)*)?$)',
  30. 'error_msg': ENTERPRISE_TAG_REGEX_ERROR}
  31. IMAGE_TAG_REGEX = {'origin': ORIGIN_TAG_REGEX,
  32. 'openshift-enterprise': ENTERPRISE_TAG_REGEX}
  33. PKG_VERSION_REGEX_ERROR = """openshift_pkg_version must be in the format
  34. -[optional.release]. Examples: -3.6.0, -3.7.0-0.126.0.git.0.9351aae.el7 -3.11*
  35. You specified openshift_pkg_version={}"""
  36. PKG_VERSION_REGEX = {'re': '(^-.*)',
  37. 'error_msg': PKG_VERSION_REGEX_ERROR}
  38. RELEASE_REGEX_ERROR = """openshift_release must be in the format
  39. v#[.#[.#]]. Examples: v3.9, v3.10.0
  40. You specified openshift_release={}"""
  41. RELEASE_REGEX = {'re': '(^v?\\d+(\\.\\d+(\\.\\d+)?)?$)',
  42. 'error_msg': RELEASE_REGEX_ERROR}
  43. STORAGE_KIND_TUPLE = (
  44. 'openshift_loggingops_storage_kind',
  45. 'openshift_logging_storage_kind',
  46. 'openshift_metrics_storage_kind',
  47. 'openshift_prometheus_alertbuffer_storage_kind',
  48. 'openshift_prometheus_alertmanager_storage_kind',
  49. 'openshift_prometheus_storage_kind')
  50. IMAGE_POLICY_CONFIG_VAR = "openshift_master_image_policy_config"
  51. ALLOWED_REGISTRIES_VAR = "openshift_master_image_policy_allowed_registries_for_import"
  52. REMOVED_VARIABLES = (
  53. # TODO(michaelgugino): Remove in 3.12
  54. ('oreg_auth_credentials_replace', 'Removed: Credentials are now always updated'),
  55. ('oreg_url_master', 'oreg_url'),
  56. ('oreg_url_node', 'oreg_url'),
  57. ('openshift_cockpit_deployer_prefix', 'openshift_cockpit_deployer_image'),
  58. ('openshift_cockpit_deployer_basename', 'openshift_cockpit_deployer_image'),
  59. ('openshift_cockpit_deployer_version', 'openshift_cockpit_deployer_image'),
  60. ('openshift_hosted_logging_elasticsearch_pvc_prefix', 'openshift_logging_es_pvc_prefix'),
  61. ('logging_ops_hostname', 'openshift_logging_kibana_ops_hostname'),
  62. ('openshift_hosted_logging_ops_hostname', 'openshift_logging_kibana_ops_hostname'),
  63. ('openshift_hosted_logging_elasticsearch_cluster_size', 'logging_elasticsearch_cluster_size'),
  64. ('openshift_hosted_logging_elasticsearch_ops_cluster_size', 'logging_elasticsearch_ops_cluster_size'),
  65. ('openshift_hosted_logging_storage_kind', 'openshift_logging_storage_kind'),
  66. ('openshift_hosted_logging_storage_host', 'openshift_logging_storage_host'),
  67. ('openshift_hosted_logging_storage_labels', 'openshift_logging_storage_labels'),
  68. ('openshift_hosted_logging_storage_volume_size', 'openshift_logging_storage_volume_size'),
  69. ('openshift_hosted_loggingops_storage_kind', 'openshift_loggingops_storage_kind'),
  70. ('openshift_hosted_loggingops_storage_host', 'openshift_loggingops_storage_host'),
  71. ('openshift_hosted_loggingops_storage_labels', 'openshift_loggingops_storage_labels'),
  72. ('openshift_hosted_loggingops_storage_volume_size', 'openshift_loggingops_storage_volume_size'),
  73. ('openshift_hosted_logging_enable_ops_cluster', 'openshift_logging_use_ops'),
  74. ('openshift_hosted_logging_image_pull_secret', 'openshift_logging_image_pull_secret'),
  75. ('openshift_hosted_logging_hostname', 'openshift_logging_kibana_hostname'),
  76. ('openshift_hosted_logging_kibana_nodeselector', 'openshift_logging_kibana_nodeselector'),
  77. ('openshift_hosted_logging_kibana_ops_nodeselector', 'openshift_logging_kibana_ops_nodeselector'),
  78. ('openshift_hosted_logging_journal_source', 'openshift_logging_fluentd_journal_source'),
  79. ('openshift_hosted_logging_journal_read_from_head', 'openshift_logging_fluentd_journal_read_from_head'),
  80. ('openshift_hosted_logging_fluentd_nodeselector_label', 'openshift_logging_fluentd_nodeselector'),
  81. ('openshift_hosted_logging_elasticsearch_instance_ram', 'openshift_logging_es_memory_limit'),
  82. ('openshift_hosted_logging_elasticsearch_nodeselector', 'openshift_logging_es_nodeselector'),
  83. ('openshift_hosted_logging_elasticsearch_ops_nodeselector', 'openshift_logging_es_ops_nodeselector'),
  84. ('openshift_hosted_logging_elasticsearch_ops_instance_ram', 'openshift_logging_es_ops_memory_limit'),
  85. ('openshift_hosted_logging_storage_access_modes', 'openshift_logging_storage_access_modes'),
  86. ('openshift_hosted_logging_master_public_url', 'openshift_logging_master_public_url'),
  87. ('openshift_hosted_logging_deployer_prefix', 'openshift_logging_image_prefix'),
  88. ('openshift_hosted_logging_deployer_version', 'openshift_logging_image_version'),
  89. ('openshift_hosted_logging_deploy', 'openshift_logging_install_logging'),
  90. ('openshift_hosted_logging_curator_nodeselector', 'openshift_logging_curator_nodeselector'),
  91. ('openshift_hosted_logging_curator_ops_nodeselector', 'openshift_logging_curator_ops_nodeselector'),
  92. ('openshift_hosted_metrics_storage_access_modes', 'openshift_metrics_storage_access_modes'),
  93. ('openshift_hosted_metrics_storage_host', 'openshift_metrics_storage_host'),
  94. ('openshift_hosted_metrics_storage_nfs_directory', 'openshift_metrics_storage_nfs_directory'),
  95. ('openshift_hosted_metrics_storage_volume_name', 'openshift_metrics_storage_volume_name'),
  96. ('openshift_hosted_metrics_storage_volume_size', 'openshift_metrics_storage_volume_size'),
  97. ('openshift_hosted_metrics_storage_labels', 'openshift_metrics_storage_labels'),
  98. ('openshift_hosted_metrics_deployer_prefix', 'openshift_metrics_image_prefix'),
  99. ('openshift_hosted_metrics_deployer_version', 'openshift_metrics_image_version'),
  100. ('openshift_hosted_metrics_deploy', 'openshift_metrics_install_metrics'),
  101. ('openshift_hosted_metrics_storage_kind', 'openshift_metrics_storage_kind'),
  102. ('openshift_hosted_metrics_public_url', 'openshift_metrics_hawkular_hostname'),
  103. ('openshift_node_labels', 'openshift_node_groups[<item>].labels'),
  104. ('openshift_node_kubelet_args', 'openshift_node_groups[<item>].edits'),
  105. )
  106. # JSON_FORMAT_VARIABLES does not intende to cover all json variables, but
  107. # complicated json variables in hosts.example are covered.
  108. JSON_FORMAT_VARIABLES = (
  109. 'openshift_builddefaults_json',
  110. 'openshift_buildoverrides_json',
  111. 'openshift_master_admission_plugin_config',
  112. 'openshift_master_audit_config',
  113. 'openshift_crio_docker_gc_node_selector',
  114. 'openshift_master_image_policy_allowed_registries_for_import',
  115. 'openshift_master_image_policy_config',
  116. 'openshift_master_oauth_templates',
  117. 'container_runtime_extra_storage',
  118. 'openshift_additional_repos',
  119. 'openshift_master_identity_providers',
  120. 'openshift_master_htpasswd_users',
  121. 'openshift_additional_projects',
  122. 'openshift_hosted_routers',
  123. 'openshift_node_open_ports',
  124. 'openshift_master_open_ports',
  125. )
  126. def to_bool(var_to_check):
  127. """Determine a boolean value given the multiple
  128. ways bools can be specified in ansible."""
  129. # http://yaml.org/type/bool.html
  130. yes_list = (True, 1, "True", "1", "true", "TRUE",
  131. "Yes", "yes", "Y", "y", "YES",
  132. "on", "ON", "On")
  133. return var_to_check in yes_list
  134. def check_for_removed_vars(hostvars, host):
  135. """Fails if removed variables are found"""
  136. found_removed = []
  137. for item in REMOVED_VARIABLES:
  138. if item in hostvars[host]:
  139. found_removed.append(item)
  140. if found_removed:
  141. msg = "Found removed variables: "
  142. for item in found_removed:
  143. msg += "{} is replaced by {}; ".format(item[0], item[1])
  144. raise errors.AnsibleModuleError(msg)
  145. return None
  146. class ActionModule(ActionBase):
  147. """Action plugin to execute sanity checks."""
  148. def template_var(self, hostvars, host, varname):
  149. """Retrieve a variable from hostvars and template it.
  150. If undefined, return None type."""
  151. # We will set the current host and variable checked for easy debugging
  152. # if there are any unhandled exceptions.
  153. # pylint: disable=W0201
  154. self.last_checked_var = varname
  155. # pylint: disable=W0201
  156. self.last_checked_host = host
  157. res = hostvars[host].get(varname)
  158. if res is None:
  159. return None
  160. return self._templar.template(res)
  161. def check_openshift_deployment_type(self, hostvars, host):
  162. """Ensure a valid openshift_deployment_type is set"""
  163. openshift_deployment_type = self.template_var(hostvars, host,
  164. 'openshift_deployment_type')
  165. if openshift_deployment_type not in VALID_DEPLOYMENT_TYPES:
  166. type_strings = ", ".join(VALID_DEPLOYMENT_TYPES)
  167. msg = "openshift_deployment_type must be defined and one of {}".format(type_strings)
  168. raise errors.AnsibleModuleError(msg)
  169. return openshift_deployment_type
  170. def get_allowed_registries(self, hostvars, host):
  171. """Returns a list of configured allowedRegistriesForImport as a list of patterns"""
  172. allowed_registries_for_import = self.template_var(hostvars, host, ALLOWED_REGISTRIES_VAR)
  173. if allowed_registries_for_import is None:
  174. image_policy_config = self.template_var(hostvars, host, IMAGE_POLICY_CONFIG_VAR)
  175. if not image_policy_config:
  176. return image_policy_config
  177. if isinstance(image_policy_config, str):
  178. try:
  179. image_policy_config = json.loads(image_policy_config)
  180. except Exception:
  181. raise errors.AnsibleModuleError(
  182. "{} is not a valid json string".format(IMAGE_POLICY_CONFIG_VAR))
  183. if not isinstance(image_policy_config, dict):
  184. raise errors.AnsibleModuleError(
  185. "expected dictionary for {}, not {}".format(
  186. IMAGE_POLICY_CONFIG_VAR, type(image_policy_config)))
  187. detailed = image_policy_config.get("allowedRegistriesForImport", None)
  188. if not detailed:
  189. return detailed
  190. if not isinstance(detailed, list):
  191. raise errors.AnsibleModuleError("expected list for {}['{}'], not {}".format(
  192. IMAGE_POLICY_CONFIG_VAR, "allowedRegistriesForImport",
  193. type(allowed_registries_for_import)))
  194. try:
  195. return [i["domainName"] for i in detailed]
  196. except Exception:
  197. raise errors.AnsibleModuleError(
  198. "each item of allowedRegistriesForImport must be a dictionary with 'domainName' key")
  199. if not isinstance(allowed_registries_for_import, list):
  200. raise errors.AnsibleModuleError("expected list for {}, not {}".format(
  201. IMAGE_POLICY_CONFIG_VAR, type(allowed_registries_for_import)))
  202. return allowed_registries_for_import
  203. def check_whitelisted_registries(self, hostvars, host):
  204. """Ensure defined registries are whitelisted"""
  205. allowed = self.get_allowed_registries(hostvars, host)
  206. if allowed is None:
  207. return
  208. unmatched_registries = []
  209. for regvar in (
  210. "oreg_url"
  211. "openshift_cockpit_deployer_prefix",
  212. "openshift_metrics_image_prefix",
  213. "openshift_logging_image_prefix",
  214. "openshift_service_catalog_image_prefix",
  215. "openshift_docker_insecure_registries"):
  216. value = self.template_var(hostvars, host, regvar)
  217. if not value:
  218. continue
  219. if isinstance(value, list):
  220. registries = value
  221. else:
  222. registries = [value]
  223. for reg in registries:
  224. if not any(is_registry_match(reg, pat) for pat in allowed):
  225. unmatched_registries.append((regvar, reg))
  226. if unmatched_registries:
  227. registry_list = ", ".join(["{}:{}".format(n, v) for n, v in unmatched_registries])
  228. raise errors.AnsibleModuleError(
  229. "registry hostnames of the following image prefixes are not whitelisted by image"
  230. " policy configuration: {}".format(registry_list))
  231. def check_python_version(self, hostvars, host, distro):
  232. """Ensure python version is 3 for Fedora and python 2 for others"""
  233. ansible_python = self.template_var(hostvars, host, 'ansible_python')
  234. if distro == "Fedora":
  235. if ansible_python['version']['major'] != 3:
  236. msg = "openshift-ansible requires Python 3 for {};".format(distro)
  237. msg += " For information on enabling Python 3 with Ansible,"
  238. msg += " see https://docs.ansible.com/ansible/python_3_support.html"
  239. raise errors.AnsibleModuleError(msg)
  240. else:
  241. if ansible_python['version']['major'] != 2:
  242. msg = "openshift-ansible requires Python 2 for {};".format(distro)
  243. def check_image_tag_format(self, hostvars, host, openshift_deployment_type):
  244. """Ensure openshift_image_tag is formatted correctly"""
  245. openshift_image_tag = self.template_var(hostvars, host, 'openshift_image_tag')
  246. if not openshift_image_tag or openshift_image_tag == 'latest':
  247. return None
  248. regex_to_match = IMAGE_TAG_REGEX[openshift_deployment_type]['re']
  249. res = re.match(regex_to_match, str(openshift_image_tag))
  250. if res is None:
  251. msg = IMAGE_TAG_REGEX[openshift_deployment_type]['error_msg']
  252. msg = msg.format(str(openshift_image_tag))
  253. raise errors.AnsibleModuleError(msg)
  254. def check_pkg_version_format(self, hostvars, host):
  255. """Ensure openshift_pkg_version is formatted correctly"""
  256. openshift_pkg_version = self.template_var(hostvars, host, 'openshift_pkg_version')
  257. if not openshift_pkg_version:
  258. return None
  259. regex_to_match = PKG_VERSION_REGEX['re']
  260. res = re.match(regex_to_match, str(openshift_pkg_version))
  261. if res is None:
  262. msg = PKG_VERSION_REGEX['error_msg']
  263. msg = msg.format(str(openshift_pkg_version))
  264. raise errors.AnsibleModuleError(msg)
  265. def check_release_format(self, hostvars, host):
  266. """Ensure openshift_release is formatted correctly"""
  267. openshift_release = self.template_var(hostvars, host, 'openshift_release')
  268. if not openshift_release:
  269. return None
  270. regex_to_match = RELEASE_REGEX['re']
  271. res = re.match(regex_to_match, str(openshift_release))
  272. if res is None:
  273. msg = RELEASE_REGEX['error_msg']
  274. msg = msg.format(str(openshift_release))
  275. raise errors.AnsibleModuleError(msg)
  276. def network_plugin_check(self, hostvars, host):
  277. """Ensure only one type of network plugin is enabled"""
  278. res = []
  279. # Loop through each possible network plugin boolean, determine the
  280. # actual boolean value, and append results into a list.
  281. for plugin, default_val in NET_PLUGIN_LIST:
  282. res_temp = self.template_var(hostvars, host, plugin)
  283. if res_temp is None:
  284. res_temp = default_val
  285. res.append(to_bool(res_temp))
  286. if sum(res) not in (0, 1):
  287. plugin_str = list(zip([x[0] for x in NET_PLUGIN_LIST], res))
  288. msg = "Host Checked: {} Only one of must be true. Found: {}".format(host, plugin_str)
  289. raise errors.AnsibleModuleError(msg)
  290. def check_hostname_vars(self, hostvars, host):
  291. """Checks to ensure openshift_hostname
  292. and openshift_public_hostname
  293. conform to the proper length of 63 characters or less"""
  294. for varname in ('openshift_public_hostname', 'openshift_hostname'):
  295. var_value = self.template_var(hostvars, host, varname)
  296. if var_value and len(var_value) > 63:
  297. msg = '{} must be 63 characters or less'.format(varname)
  298. raise errors.AnsibleModuleError(msg)
  299. def check_session_auth_secrets(self, hostvars, host):
  300. """Checks session_auth_secrets is correctly formatted"""
  301. sas = self.template_var(hostvars, host,
  302. 'openshift_master_session_auth_secrets')
  303. ses = self.template_var(hostvars, host,
  304. 'openshift_master_session_encryption_secrets')
  305. # This variable isn't mandatory, only check if set.
  306. if sas is None and ses is None:
  307. return None
  308. if not (
  309. issubclass(type(sas), list) and issubclass(type(ses), list)
  310. ) or len(sas) != len(ses):
  311. raise errors.AnsibleModuleError(
  312. 'Expects openshift_master_session_auth_secrets and '
  313. 'openshift_master_session_encryption_secrets are equal length lists')
  314. for secret in sas:
  315. if len(secret) < 32:
  316. raise errors.AnsibleModuleError(
  317. 'Invalid secret in openshift_master_session_auth_secrets. '
  318. 'Secrets must be at least 32 characters in length.')
  319. for secret in ses:
  320. if len(secret) not in [16, 24, 32]:
  321. raise errors.AnsibleModuleError(
  322. 'Invalid secret in openshift_master_session_encryption_secrets. '
  323. 'Secrets must be 16, 24, or 32 characters in length.')
  324. return None
  325. def check_unsupported_nfs_configs(self, hostvars, host):
  326. """Fails if nfs storage is in use for any components. This check is
  327. ignored if openshift_enable_unsupported_configurations=True"""
  328. enable_unsupported = self.template_var(
  329. hostvars, host, 'openshift_enable_unsupported_configurations')
  330. if to_bool(enable_unsupported):
  331. return None
  332. for storage in STORAGE_KIND_TUPLE:
  333. kind = self.template_var(hostvars, host, storage)
  334. if kind == 'nfs':
  335. raise errors.AnsibleModuleError(
  336. 'nfs is an unsupported type for {}. '
  337. 'openshift_enable_unsupported_configurations=True must'
  338. 'be specified to continue with this configuration.'
  339. ''.format(storage))
  340. return None
  341. def check_htpasswd_provider(self, hostvars, host):
  342. """Fails if openshift_master_identity_providers contains an entry of
  343. kind HTPasswdPasswordIdentityProvider and
  344. openshift_master_manage_htpasswd is False"""
  345. manage_pass = self.template_var(
  346. hostvars, host, 'openshift_master_manage_htpasswd')
  347. if to_bool(manage_pass):
  348. # If we manage the file, we can just generate in the new path.
  349. return None
  350. idps = self.template_var(
  351. hostvars, host, 'openshift_master_identity_providers')
  352. if not idps:
  353. # If we don't find any identity_providers, nothing for us to do.
  354. return None
  355. old_keys = ('file', 'fileName', 'file_name', 'filename')
  356. if not isinstance(idps, list):
  357. raise errors.AnsibleModuleError("| not a list")
  358. for idp in idps:
  359. if idp['kind'] == 'HTPasswdPasswordIdentityProvider':
  360. for old_key in old_keys:
  361. if old_key in idp is not None:
  362. raise errors.AnsibleModuleError(
  363. 'openshift_master_identity_providers contains a '
  364. 'provider of kind==HTPasswdPasswordIdentityProvider '
  365. 'and {} is set. Please migrate your htpasswd '
  366. 'files to /etc/origin/master/htpasswd and update your '
  367. 'existing master configs, and remove the {} key'
  368. 'before proceeding.'.format(old_key, old_key))
  369. def validate_json_format_vars(self, hostvars, host):
  370. """Fails if invalid json format are found"""
  371. found_invalid_json = []
  372. for var in JSON_FORMAT_VARIABLES:
  373. if var in hostvars[host]:
  374. json_var = self.template_var(hostvars, host, var)
  375. try:
  376. json.loads(json_var)
  377. except ValueError as json_err:
  378. found_invalid_json.append([var, json_var, json_err])
  379. except BaseException:
  380. pass
  381. if found_invalid_json:
  382. msg = "Found invalid json format variables:\n"
  383. for item in found_invalid_json:
  384. msg += " {} specified in {} is invalid json format\n {}".format(item[1], item[0], item[2])
  385. raise errors.AnsibleModuleError(msg)
  386. return None
  387. def check_for_oreg_password(self, hostvars, host, odt):
  388. """Ensure oreg_password is defined when using registry.redhat.io"""
  389. reg_to_check = 'registry.redhat.io'
  390. err_msg = ("oreg_auth_user and oreg_auth_password must be provided when"
  391. "deploying openshift-enterprise")
  392. err_msg2 = ("oreg_auth_user and oreg_auth_password must be provided when using"
  393. "{}".format(reg_to_check))
  394. oreg_password = self.template_var(hostvars, host, 'oreg_auth_password')
  395. if oreg_password is not None:
  396. # A password is defined, so we're good to go.
  397. return None
  398. oreg_url = self.template_var(hostvars, host, 'oreg_url')
  399. if oreg_url is not None:
  400. if reg_to_check in oreg_url:
  401. raise errors.AnsibleModuleError(err_msg2)
  402. elif odt == 'openshift-enterprise':
  403. # We're not using an oreg_url, we're using default enterprise
  404. # registry. We require oreg_auth_user and oreg_auth_password
  405. raise errors.AnsibleModuleError(err_msg)
  406. def run_checks(self, hostvars, host):
  407. """Execute the hostvars validations against host"""
  408. distro = self.template_var(hostvars, host, 'ansible_distribution')
  409. odt = self.check_openshift_deployment_type(hostvars, host)
  410. self.check_whitelisted_registries(hostvars, host)
  411. self.check_python_version(hostvars, host, distro)
  412. self.check_image_tag_format(hostvars, host, odt)
  413. self.check_pkg_version_format(hostvars, host)
  414. self.check_release_format(hostvars, host)
  415. self.network_plugin_check(hostvars, host)
  416. self.check_hostname_vars(hostvars, host)
  417. self.check_session_auth_secrets(hostvars, host)
  418. self.check_unsupported_nfs_configs(hostvars, host)
  419. self.check_htpasswd_provider(hostvars, host)
  420. check_for_removed_vars(hostvars, host)
  421. self.validate_json_format_vars(hostvars, host)
  422. self.check_for_oreg_password(hostvars, host, odt)
  423. def run(self, tmp=None, task_vars=None):
  424. result = super(ActionModule, self).run(tmp, task_vars)
  425. # self.task_vars holds all in-scope variables.
  426. # Ignore settting self.task_vars outside of init.
  427. # pylint: disable=W0201
  428. self.task_vars = task_vars or {}
  429. # pylint: disable=W0201
  430. self.last_checked_host = "none"
  431. # pylint: disable=W0201
  432. self.last_checked_var = "none"
  433. # self._task.args holds task parameters.
  434. # check_hosts is a parameter to this plugin, and should provide
  435. # a list of hosts.
  436. check_hosts = self._task.args.get('check_hosts')
  437. if not check_hosts:
  438. msg = "check_hosts is required"
  439. raise errors.AnsibleModuleError(msg)
  440. # We need to access each host's variables
  441. hostvars = self.task_vars.get('hostvars')
  442. if not hostvars:
  443. msg = hostvars
  444. raise errors.AnsibleModuleError(msg)
  445. # We loop through each host in the provided list check_hosts
  446. for host in check_hosts:
  447. try:
  448. self.run_checks(hostvars, host)
  449. except Exception as uncaught_e:
  450. msg = "last_checked_host: {}, last_checked_var: {};"
  451. msg = msg.format(self.last_checked_host, self.last_checked_var)
  452. msg += str(uncaught_e)
  453. raise errors.AnsibleModuleError(msg)
  454. result["changed"] = False
  455. result["failed"] = False
  456. result["msg"] = "Sanity Checks passed"
  457. return result
  458. def is_registry_match(item, pattern):
  459. """returns True if the registry matches the given whitelist pattern
  460. Unlike in OpenShift, the comparison is done solely on hostname part
  461. (excluding the port part) since the latter is much more difficult due to
  462. vague definition of port defaulting based on insecure flag. Moreover, most
  463. of the registries will be listed without the port and insecure flag.
  464. """
  465. item = "schema://" + item.split('://', 1)[-1]
  466. return is_match(urlparse(item).hostname, pattern.rsplit(':', 1)[0])
  467. # taken from https://leetcode.com/problems/wildcard-matching/discuss/17845/python-dp-solution
  468. # (the same source as for openshift/origin/pkg/util/strings/wildcard.go)
  469. def is_match(item, pattern):
  470. """implements DP algorithm for string matching"""
  471. length = len(item)
  472. if len(pattern) - pattern.count('*') > length:
  473. return False
  474. matches = [True] + [False] * length
  475. for i in pattern:
  476. if i != '*':
  477. for index in reversed(range(length)):
  478. matches[index + 1] = matches[index] and (i == item[index] or i == '?')
  479. else:
  480. for index in range(1, length + 1):
  481. matches[index] = matches[index - 1] or matches[index]
  482. matches[0] = matches[0] and i == '*'
  483. return matches[-1]