oc_adm_csr.py 7.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209
  1. # pylint: skip-file
  2. # flake8: noqa
  3. class OCcsr(OpenShiftCLI):
  4. ''' Class to wrap the oc adm certificate command line'''
  5. kind = 'csr'
  6. # pylint: disable=too-many-arguments
  7. def __init__(self,
  8. nodes=None,
  9. approve_all=False,
  10. service_account=None,
  11. kubeconfig='/etc/origin/master/admin.kubeconfig',
  12. verbose=False):
  13. ''' Constructor for oc adm certificate '''
  14. super(OCcsr, self).__init__(None, kubeconfig, verbose)
  15. self.service_account = service_account
  16. self.nodes = self.create_nodes(nodes)
  17. self._csrs = []
  18. self.approve_all = approve_all
  19. self.verbose = verbose
  20. @property
  21. def csrs(self):
  22. '''property for managing csrs'''
  23. # any processing needed??
  24. self._csrs = self._get(resource=self.kind)['results'][0]['items']
  25. return self._csrs
  26. def create_nodes(self, nodes):
  27. '''create a node object to track csr signing status'''
  28. nodes_list = []
  29. if nodes is None:
  30. return nodes_list
  31. results = self._get(resource='nodes')['results'][0]['items']
  32. for node in nodes:
  33. nodes_list.append(dict(name=node, csrs={}, accepted=False, denied=False))
  34. for ocnode in results:
  35. if node in ocnode['metadata']['name']:
  36. nodes_list[-1]['accepted'] = True
  37. return nodes_list
  38. def get(self):
  39. '''get the current certificate signing requests'''
  40. return self.csrs
  41. @staticmethod
  42. def action_needed(csr, action):
  43. '''check to see if csr is in desired state'''
  44. if csr['status'] == {}:
  45. return True
  46. state = csr['status']['conditions'][0]['type']
  47. if action == 'approve' and state != 'Approved':
  48. return True
  49. elif action == 'deny' and state != 'Denied':
  50. return True
  51. return False
  52. def get_csr_request(self, request):
  53. '''base64 decode the request object and call openssl to determine the
  54. subject and specifically the CN: from the request
  55. Output:
  56. (0, '...
  57. Subject: O=system:nodes, CN=system:node:ip-172-31-54-54.ec2.internal
  58. ...')
  59. '''
  60. import base64
  61. return self._run(['openssl', 'req', '-noout', '-text'], base64.b64decode(request))[1]
  62. def match_node(self, csr):
  63. '''match an inc csr to a node in self.nodes'''
  64. for node in self.nodes:
  65. # we need to match based upon the csr's request certificate's CN
  66. if node['name'] in self.get_csr_request(csr['spec']['request']):
  67. node['csrs'][csr['metadata']['name']] = csr
  68. # check that the username is the node and type is 'Approved'
  69. if node['name'] in csr['spec']['username'] and csr['status']:
  70. if csr['status']['conditions'][0]['type'] == 'Approved':
  71. node['accepted'] = True
  72. # check type is 'Denied' and mark node as such
  73. if csr['status'] and csr['status']['conditions'][0]['type'] == 'Denied':
  74. node['denied'] = True
  75. return node
  76. return None
  77. def finished(self):
  78. '''determine if there are more csrs to sign'''
  79. # if nodes is set and we have nodes then return if all nodes are 'accepted'
  80. if self.nodes is not None and len(self.nodes) > 0:
  81. return all([node['accepted'] or node['denied'] for node in self.nodes])
  82. # we are approving everything or we still have nodes outstanding
  83. return False
  84. def manage(self, action):
  85. '''run openshift oc adm ca create-server-cert cmd and store results into self.nodes
  86. we attempt to verify if the node is one that was given to us to accept.
  87. action - (allow | deny)
  88. '''
  89. results = []
  90. # There are 2 types of requests:
  91. # - node-bootstrapper-client-ip-172-31-51-246-ec2-internal
  92. # The client request allows the client to talk to the api/controller
  93. # - node-bootstrapper-server-ip-172-31-51-246-ec2-internal
  94. # The server request allows the server to join the cluster
  95. # Here we need to determine how to approve/deny
  96. # we should query the csrs and verify they are from the nodes we thought
  97. for csr in self.csrs:
  98. node = self.match_node(csr)
  99. # oc adm certificate <approve|deny> csr
  100. # there are 3 known states: Denied, Aprroved, {}
  101. # verify something is needed by OCcsr.action_needed
  102. # if approve_all, then do it
  103. # if you passed in nodes, you must have a node that matches
  104. if self.approve_all or (node and OCcsr.action_needed(csr, action)):
  105. result = self.openshift_cmd(['certificate', action, csr['metadata']['name']], oadm=True)
  106. # if we successfully approved
  107. if result['returncode'] == 0:
  108. # client should have service account name in username field
  109. # server should have node name in username field
  110. if node and csr['metadata']['name'] not in node['csrs']:
  111. node['csrs'][csr['metadata']['name']] = csr
  112. # accept node in cluster
  113. if node['name'] in csr['spec']['username']:
  114. node['accepted'] = True
  115. results.append(result)
  116. return results
  117. @staticmethod
  118. def run_ansible(params, check_mode=False):
  119. '''run the oc_adm_csr module'''
  120. client = OCcsr(params['nodes'],
  121. params['approve_all'],
  122. params['service_account'],
  123. params['kubeconfig'],
  124. params['debug'])
  125. state = params['state']
  126. api_rval = client.get()
  127. if state == 'list':
  128. return {'changed': False, 'results': api_rval, 'state': state}
  129. if state in ['approve', 'deny']:
  130. if check_mode:
  131. return {'changed': True,
  132. 'msg': "CHECK_MODE: Would have {} the certificate.".format(params['state']),
  133. 'state': state}
  134. all_results = []
  135. finished = False
  136. timeout = False
  137. # loop for timeout or block until all nodes pass
  138. ctr = 0
  139. while True:
  140. all_results.extend(client.manage(params['state']))
  141. if client.finished():
  142. finished = True
  143. break
  144. if params['timeout'] == 0:
  145. if not params['approve_all']:
  146. ctr = 0
  147. if ctr * 2 > params['timeout']:
  148. timeout = True
  149. break
  150. # This provides time for the nodes to send their csr requests between approvals
  151. time.sleep(2)
  152. ctr += 1
  153. for result in all_results:
  154. if result['returncode'] != 0:
  155. return {'failed': True, 'msg': all_results, 'timeout': timeout}
  156. return dict(changed=len(all_results) > 0,
  157. results=all_results,
  158. nodes=client.nodes,
  159. state=state,
  160. finished=finished,
  161. timeout=timeout)
  162. return {'failed': True,
  163. 'msg': 'Unknown state passed. %s' % state}