oc_adm_policy_user.py 72 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923192419251926192719281929193019311932193319341935193619371938193919401941194219431944194519461947194819491950195119521953195419551956195719581959196019611962196319641965196619671968196919701971197219731974197519761977197819791980198119821983198419851986198719881989199019911992199319941995199619971998199920002001200220032004200520062007200820092010201120122013201420152016201720182019202020212022202320242025202620272028202920302031203220332034203520362037203820392040204120422043204420452046204720482049205020512052205320542055205620572058205920602061206220632064206520662067206820692070207120722073207420752076207720782079208020812082208320842085208620872088208920902091209220932094209520962097209820992100210121022103210421052106210721082109211021112112211321142115211621172118211921202121212221232124212521262127212821292130213121322133213421352136213721382139214021412142214321442145214621472148214921502151215221532154215521562157215821592160216121622163216421652166216721682169217021712172217321742175217621772178217921802181218221832184218521862187218821892190219121922193219421952196219721982199220022012202220322042205220622072208220922102211221222132214221522162217221822192220222122222223222422252226
  1. #!/usr/bin/env python
  2. # pylint: disable=missing-docstring
  3. # flake8: noqa: T001
  4. # ___ ___ _ _ ___ ___ _ _____ ___ ___
  5. # / __| __| \| | __| _ \ /_\_ _| __| \
  6. # | (_ | _|| .` | _|| / / _ \| | | _|| |) |
  7. # \___|___|_|\_|___|_|_\/_/_\_\_|_|___|___/_ _____
  8. # | \ / _ \ | \| |/ _ \_ _| | __| \_ _|_ _|
  9. # | |) | (_) | | .` | (_) || | | _|| |) | | | |
  10. # |___/ \___/ |_|\_|\___/ |_| |___|___/___| |_|
  11. #
  12. # Copyright 2016 Red Hat, Inc. and/or its affiliates
  13. # and other contributors as indicated by the @author tags.
  14. #
  15. # Licensed under the Apache License, Version 2.0 (the "License");
  16. # you may not use this file except in compliance with the License.
  17. # You may obtain a copy of the License at
  18. #
  19. # http://www.apache.org/licenses/LICENSE-2.0
  20. #
  21. # Unless required by applicable law or agreed to in writing, software
  22. # distributed under the License is distributed on an "AS IS" BASIS,
  23. # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  24. # See the License for the specific language governing permissions and
  25. # limitations under the License.
  26. #
  27. # -*- -*- -*- Begin included fragment: lib/import.py -*- -*- -*-
  28. '''
  29. OpenShiftCLI class that wraps the oc commands in a subprocess
  30. '''
  31. # pylint: disable=too-many-lines
  32. from __future__ import print_function
  33. import atexit
  34. import copy
  35. import fcntl
  36. import json
  37. import os
  38. import re
  39. import shutil
  40. import subprocess
  41. import tempfile
  42. # pylint: disable=import-error
  43. try:
  44. import ruamel.yaml as yaml
  45. except ImportError:
  46. import yaml
  47. from ansible.module_utils.basic import AnsibleModule
  48. # -*- -*- -*- End included fragment: lib/import.py -*- -*- -*-
  49. # -*- -*- -*- Begin included fragment: doc/policy_user -*- -*- -*-
  50. DOCUMENTATION = '''
  51. ---
  52. module: oc_adm_policy_user
  53. short_description: Module to manage openshift policy for users
  54. description:
  55. - Manage openshift policy for users.
  56. options:
  57. kubeconfig:
  58. description:
  59. - The path for the kubeconfig file to use for authentication
  60. required: false
  61. default: /etc/origin/master/admin.kubeconfig
  62. aliases: []
  63. namespace:
  64. description:
  65. - The namespace scope
  66. required: false
  67. default: None
  68. aliases: []
  69. role_namespace:
  70. description:
  71. - The namespace where to find the role
  72. required: false
  73. default: None
  74. aliases: []
  75. debug:
  76. description:
  77. - Turn on debug output.
  78. required: false
  79. default: False
  80. aliases: []
  81. user:
  82. description:
  83. - The name of the user
  84. required: true
  85. default: None
  86. aliases: []
  87. resource_kind:
  88. description:
  89. - The kind of policy to affect
  90. required: true
  91. default: None
  92. choices: ["role", "cluster-role", "scc"]
  93. aliases: []
  94. resource_name:
  95. description:
  96. - The name of the policy
  97. required: true
  98. default: None
  99. aliases: []
  100. state:
  101. description:
  102. - Desired state of the policy
  103. required: true
  104. default: present
  105. choices: ["present", "absent"]
  106. aliases: []
  107. author:
  108. - "Kenny Woodson <kwoodson@redhat.com>"
  109. extends_documentation_fragment: []
  110. '''
  111. EXAMPLES = '''
  112. - name: oc adm policy remove-scc-from-user an-scc ausername
  113. oc_adm_policy_user:
  114. user: ausername
  115. resource_kind: scc
  116. resource_name: an-scc
  117. state: absent
  118. - name: oc adm policy add-cluster-role-to-user system:build-strategy-docker ausername
  119. oc_adm_policy_user:
  120. user: ausername
  121. resource_kind: cluster-role
  122. resource_name: system:build-strategy-docker
  123. state: present
  124. - name: oc adm policy add-role-to-user system:build-strategy-docker ausername --role-namespace foo
  125. oc_adm_policy_user:
  126. user: ausername
  127. resource_kind: cluster-role
  128. resource_name: system:build-strategy-docker
  129. state: present
  130. role_namespace: foo
  131. '''
  132. # -*- -*- -*- End included fragment: doc/policy_user -*- -*- -*-
  133. # -*- -*- -*- Begin included fragment: ../../lib_utils/src/class/yedit.py -*- -*- -*-
  134. class YeditException(Exception): # pragma: no cover
  135. ''' Exception class for Yedit '''
  136. pass
  137. # pylint: disable=too-many-public-methods
  138. class Yedit(object): # pragma: no cover
  139. ''' Class to modify yaml files '''
  140. re_valid_key = r"(((\[-?\d+\])|([0-9a-zA-Z%s/_-]+)).?)+$"
  141. re_key = r"(?:\[(-?\d+)\])|([0-9a-zA-Z{}/_-]+)"
  142. com_sep = set(['.', '#', '|', ':'])
  143. # pylint: disable=too-many-arguments
  144. def __init__(self,
  145. filename=None,
  146. content=None,
  147. content_type='yaml',
  148. separator='.',
  149. backup=False):
  150. self.content = content
  151. self._separator = separator
  152. self.filename = filename
  153. self.__yaml_dict = content
  154. self.content_type = content_type
  155. self.backup = backup
  156. self.load(content_type=self.content_type)
  157. if self.__yaml_dict is None:
  158. self.__yaml_dict = {}
  159. @property
  160. def separator(self):
  161. ''' getter method for separator '''
  162. return self._separator
  163. @separator.setter
  164. def separator(self, inc_sep):
  165. ''' setter method for separator '''
  166. self._separator = inc_sep
  167. @property
  168. def yaml_dict(self):
  169. ''' getter method for yaml_dict '''
  170. return self.__yaml_dict
  171. @yaml_dict.setter
  172. def yaml_dict(self, value):
  173. ''' setter method for yaml_dict '''
  174. self.__yaml_dict = value
  175. @staticmethod
  176. def parse_key(key, sep='.'):
  177. '''parse the key allowing the appropriate separator'''
  178. common_separators = list(Yedit.com_sep - set([sep]))
  179. return re.findall(Yedit.re_key.format(''.join(common_separators)), key)
  180. @staticmethod
  181. def valid_key(key, sep='.'):
  182. '''validate the incoming key'''
  183. common_separators = list(Yedit.com_sep - set([sep]))
  184. if not re.match(Yedit.re_valid_key.format(''.join(common_separators)), key):
  185. return False
  186. return True
  187. # pylint: disable=too-many-return-statements,too-many-branches
  188. @staticmethod
  189. def remove_entry(data, key, index=None, value=None, sep='.'):
  190. ''' remove data at location key '''
  191. if key == '' and isinstance(data, dict):
  192. if value is not None:
  193. data.pop(value)
  194. elif index is not None:
  195. raise YeditException("remove_entry for a dictionary does not have an index {}".format(index))
  196. else:
  197. data.clear()
  198. return True
  199. elif key == '' and isinstance(data, list):
  200. ind = None
  201. if value is not None:
  202. try:
  203. ind = data.index(value)
  204. except ValueError:
  205. return False
  206. elif index is not None:
  207. ind = index
  208. else:
  209. del data[:]
  210. if ind is not None:
  211. data.pop(ind)
  212. return True
  213. if not (key and Yedit.valid_key(key, sep)) and \
  214. isinstance(data, (list, dict)):
  215. return None
  216. key_indexes = Yedit.parse_key(key, sep)
  217. for arr_ind, dict_key in key_indexes[:-1]:
  218. if dict_key and isinstance(data, dict):
  219. data = data.get(dict_key)
  220. elif (arr_ind and isinstance(data, list) and
  221. int(arr_ind) <= len(data) - 1):
  222. data = data[int(arr_ind)]
  223. else:
  224. return None
  225. # process last index for remove
  226. # expected list entry
  227. if key_indexes[-1][0]:
  228. if isinstance(data, list) and int(key_indexes[-1][0]) <= len(data) - 1: # noqa: E501
  229. del data[int(key_indexes[-1][0])]
  230. return True
  231. # expected dict entry
  232. elif key_indexes[-1][1]:
  233. if isinstance(data, dict):
  234. del data[key_indexes[-1][1]]
  235. return True
  236. @staticmethod
  237. def add_entry(data, key, item=None, sep='.'):
  238. ''' Get an item from a dictionary with key notation a.b.c
  239. d = {'a': {'b': 'c'}}}
  240. key = a#b
  241. return c
  242. '''
  243. if key == '':
  244. pass
  245. elif (not (key and Yedit.valid_key(key, sep)) and
  246. isinstance(data, (list, dict))):
  247. return None
  248. key_indexes = Yedit.parse_key(key, sep)
  249. for arr_ind, dict_key in key_indexes[:-1]:
  250. if dict_key:
  251. if isinstance(data, dict) and dict_key in data and data[dict_key]: # noqa: E501
  252. data = data[dict_key]
  253. continue
  254. elif data and not isinstance(data, dict):
  255. raise YeditException("Unexpected item type found while going through key " +
  256. "path: {} (at key: {})".format(key, dict_key))
  257. data[dict_key] = {}
  258. data = data[dict_key]
  259. elif (arr_ind and isinstance(data, list) and
  260. int(arr_ind) <= len(data) - 1):
  261. data = data[int(arr_ind)]
  262. else:
  263. raise YeditException("Unexpected item type found while going through key path: {}".format(key))
  264. if key == '':
  265. data = item
  266. # process last index for add
  267. # expected list entry
  268. elif key_indexes[-1][0] and isinstance(data, list) and int(key_indexes[-1][0]) <= len(data) - 1: # noqa: E501
  269. data[int(key_indexes[-1][0])] = item
  270. # expected dict entry
  271. elif key_indexes[-1][1] and isinstance(data, dict):
  272. data[key_indexes[-1][1]] = item
  273. # didn't add/update to an existing list, nor add/update key to a dict
  274. # so we must have been provided some syntax like a.b.c[<int>] = "data" for a
  275. # non-existent array
  276. else:
  277. raise YeditException("Error adding to object at path: {}".format(key))
  278. return data
  279. @staticmethod
  280. def get_entry(data, key, sep='.'):
  281. ''' Get an item from a dictionary with key notation a.b.c
  282. d = {'a': {'b': 'c'}}}
  283. key = a.b
  284. return c
  285. '''
  286. if key == '':
  287. pass
  288. elif (not (key and Yedit.valid_key(key, sep)) and
  289. isinstance(data, (list, dict))):
  290. return None
  291. key_indexes = Yedit.parse_key(key, sep)
  292. for arr_ind, dict_key in key_indexes:
  293. if dict_key and isinstance(data, dict):
  294. data = data.get(dict_key)
  295. elif (arr_ind and isinstance(data, list) and
  296. int(arr_ind) <= len(data) - 1):
  297. data = data[int(arr_ind)]
  298. else:
  299. return None
  300. return data
  301. @staticmethod
  302. def _write(filename, contents):
  303. ''' Actually write the file contents to disk. This helps with mocking. '''
  304. tmp_filename = filename + '.yedit'
  305. with open(tmp_filename, 'w') as yfd:
  306. fcntl.flock(yfd, fcntl.LOCK_EX | fcntl.LOCK_NB)
  307. yfd.write(contents)
  308. fcntl.flock(yfd, fcntl.LOCK_UN)
  309. os.rename(tmp_filename, filename)
  310. def write(self):
  311. ''' write to file '''
  312. if not self.filename:
  313. raise YeditException('Please specify a filename.')
  314. if self.backup and self.file_exists():
  315. shutil.copy(self.filename, self.filename + '.orig')
  316. # Try to set format attributes if supported
  317. try:
  318. self.yaml_dict.fa.set_block_style()
  319. except AttributeError:
  320. pass
  321. # Try to use RoundTripDumper if supported.
  322. if self.content_type == 'yaml':
  323. try:
  324. Yedit._write(self.filename, yaml.dump(self.yaml_dict, Dumper=yaml.RoundTripDumper))
  325. except AttributeError:
  326. Yedit._write(self.filename, yaml.safe_dump(self.yaml_dict, default_flow_style=False))
  327. elif self.content_type == 'json':
  328. Yedit._write(self.filename, json.dumps(self.yaml_dict, indent=4, sort_keys=True))
  329. else:
  330. raise YeditException('Unsupported content_type: {}.'.format(self.content_type) +
  331. 'Please specify a content_type of yaml or json.')
  332. return (True, self.yaml_dict)
  333. def read(self):
  334. ''' read from file '''
  335. # check if it exists
  336. if self.filename is None or not self.file_exists():
  337. return None
  338. contents = None
  339. with open(self.filename) as yfd:
  340. contents = yfd.read()
  341. return contents
  342. def file_exists(self):
  343. ''' return whether file exists '''
  344. if os.path.exists(self.filename):
  345. return True
  346. return False
  347. def load(self, content_type='yaml'):
  348. ''' return yaml file '''
  349. contents = self.read()
  350. if not contents and not self.content:
  351. return None
  352. if self.content:
  353. if isinstance(self.content, dict):
  354. self.yaml_dict = self.content
  355. return self.yaml_dict
  356. elif isinstance(self.content, str):
  357. contents = self.content
  358. # check if it is yaml
  359. try:
  360. if content_type == 'yaml' and contents:
  361. # Try to set format attributes if supported
  362. try:
  363. self.yaml_dict.fa.set_block_style()
  364. except AttributeError:
  365. pass
  366. # Try to use RoundTripLoader if supported.
  367. try:
  368. self.yaml_dict = yaml.load(contents, yaml.RoundTripLoader)
  369. except AttributeError:
  370. self.yaml_dict = yaml.safe_load(contents)
  371. # Try to set format attributes if supported
  372. try:
  373. self.yaml_dict.fa.set_block_style()
  374. except AttributeError:
  375. pass
  376. elif content_type == 'json' and contents:
  377. self.yaml_dict = json.loads(contents)
  378. except yaml.YAMLError as err:
  379. # Error loading yaml or json
  380. raise YeditException('Problem with loading yaml file. {}'.format(err))
  381. return self.yaml_dict
  382. def get(self, key):
  383. ''' get a specified key'''
  384. try:
  385. entry = Yedit.get_entry(self.yaml_dict, key, self.separator)
  386. except KeyError:
  387. entry = None
  388. return entry
  389. def pop(self, path, key_or_item):
  390. ''' remove a key, value pair from a dict or an item for a list'''
  391. try:
  392. entry = Yedit.get_entry(self.yaml_dict, path, self.separator)
  393. except KeyError:
  394. entry = None
  395. if entry is None:
  396. return (False, self.yaml_dict)
  397. if isinstance(entry, dict):
  398. # AUDIT:maybe-no-member makes sense due to fuzzy types
  399. # pylint: disable=maybe-no-member
  400. if key_or_item in entry:
  401. entry.pop(key_or_item)
  402. return (True, self.yaml_dict)
  403. return (False, self.yaml_dict)
  404. elif isinstance(entry, list):
  405. # AUDIT:maybe-no-member makes sense due to fuzzy types
  406. # pylint: disable=maybe-no-member
  407. ind = None
  408. try:
  409. ind = entry.index(key_or_item)
  410. except ValueError:
  411. return (False, self.yaml_dict)
  412. entry.pop(ind)
  413. return (True, self.yaml_dict)
  414. return (False, self.yaml_dict)
  415. def delete(self, path, index=None, value=None):
  416. ''' remove path from a dict'''
  417. try:
  418. entry = Yedit.get_entry(self.yaml_dict, path, self.separator)
  419. except KeyError:
  420. entry = None
  421. if entry is None:
  422. return (False, self.yaml_dict)
  423. result = Yedit.remove_entry(self.yaml_dict, path, index, value, self.separator)
  424. if not result:
  425. return (False, self.yaml_dict)
  426. return (True, self.yaml_dict)
  427. def exists(self, path, value):
  428. ''' check if value exists at path'''
  429. try:
  430. entry = Yedit.get_entry(self.yaml_dict, path, self.separator)
  431. except KeyError:
  432. entry = None
  433. if isinstance(entry, list):
  434. if value in entry:
  435. return True
  436. return False
  437. elif isinstance(entry, dict):
  438. if isinstance(value, dict):
  439. rval = False
  440. for key, val in value.items():
  441. if entry[key] != val:
  442. rval = False
  443. break
  444. else:
  445. rval = True
  446. return rval
  447. return value in entry
  448. return entry == value
  449. def append(self, path, value):
  450. '''append value to a list'''
  451. try:
  452. entry = Yedit.get_entry(self.yaml_dict, path, self.separator)
  453. except KeyError:
  454. entry = None
  455. if entry is None:
  456. self.put(path, [])
  457. entry = Yedit.get_entry(self.yaml_dict, path, self.separator)
  458. if not isinstance(entry, list):
  459. return (False, self.yaml_dict)
  460. # AUDIT:maybe-no-member makes sense due to loading data from
  461. # a serialized format.
  462. # pylint: disable=maybe-no-member
  463. entry.append(value)
  464. return (True, self.yaml_dict)
  465. # pylint: disable=too-many-arguments
  466. def update(self, path, value, index=None, curr_value=None):
  467. ''' put path, value into a dict '''
  468. try:
  469. entry = Yedit.get_entry(self.yaml_dict, path, self.separator)
  470. except KeyError:
  471. entry = None
  472. if isinstance(entry, dict):
  473. # AUDIT:maybe-no-member makes sense due to fuzzy types
  474. # pylint: disable=maybe-no-member
  475. if not isinstance(value, dict):
  476. raise YeditException('Cannot replace key, value entry in dict with non-dict type. ' +
  477. 'value=[{}] type=[{}]'.format(value, type(value)))
  478. entry.update(value)
  479. return (True, self.yaml_dict)
  480. elif isinstance(entry, list):
  481. # AUDIT:maybe-no-member makes sense due to fuzzy types
  482. # pylint: disable=maybe-no-member
  483. ind = None
  484. if curr_value:
  485. try:
  486. ind = entry.index(curr_value)
  487. except ValueError:
  488. return (False, self.yaml_dict)
  489. elif index is not None:
  490. ind = index
  491. if ind is not None and entry[ind] != value:
  492. entry[ind] = value
  493. return (True, self.yaml_dict)
  494. # see if it exists in the list
  495. try:
  496. ind = entry.index(value)
  497. except ValueError:
  498. # doesn't exist, append it
  499. entry.append(value)
  500. return (True, self.yaml_dict)
  501. # already exists, return
  502. if ind is not None:
  503. return (False, self.yaml_dict)
  504. return (False, self.yaml_dict)
  505. def put(self, path, value):
  506. ''' put path, value into a dict '''
  507. try:
  508. entry = Yedit.get_entry(self.yaml_dict, path, self.separator)
  509. except KeyError:
  510. entry = None
  511. if entry == value:
  512. return (False, self.yaml_dict)
  513. # deepcopy didn't work
  514. # Try to use ruamel.yaml and fallback to pyyaml
  515. try:
  516. tmp_copy = yaml.load(yaml.round_trip_dump(self.yaml_dict,
  517. default_flow_style=False),
  518. yaml.RoundTripLoader)
  519. except AttributeError:
  520. tmp_copy = copy.deepcopy(self.yaml_dict)
  521. # set the format attributes if available
  522. try:
  523. tmp_copy.fa.set_block_style()
  524. except AttributeError:
  525. pass
  526. result = Yedit.add_entry(tmp_copy, path, value, self.separator)
  527. if result is None:
  528. return (False, self.yaml_dict)
  529. # When path equals "" it is a special case.
  530. # "" refers to the root of the document
  531. # Only update the root path (entire document) when its a list or dict
  532. if path == '':
  533. if isinstance(result, list) or isinstance(result, dict):
  534. self.yaml_dict = result
  535. return (True, self.yaml_dict)
  536. return (False, self.yaml_dict)
  537. self.yaml_dict = tmp_copy
  538. return (True, self.yaml_dict)
  539. def create(self, path, value):
  540. ''' create a yaml file '''
  541. if not self.file_exists():
  542. # deepcopy didn't work
  543. # Try to use ruamel.yaml and fallback to pyyaml
  544. try:
  545. tmp_copy = yaml.load(yaml.round_trip_dump(self.yaml_dict,
  546. default_flow_style=False),
  547. yaml.RoundTripLoader)
  548. except AttributeError:
  549. tmp_copy = copy.deepcopy(self.yaml_dict)
  550. # set the format attributes if available
  551. try:
  552. tmp_copy.fa.set_block_style()
  553. except AttributeError:
  554. pass
  555. result = Yedit.add_entry(tmp_copy, path, value, self.separator)
  556. if result is not None:
  557. self.yaml_dict = tmp_copy
  558. return (True, self.yaml_dict)
  559. return (False, self.yaml_dict)
  560. @staticmethod
  561. def get_curr_value(invalue, val_type):
  562. '''return the current value'''
  563. if invalue is None:
  564. return None
  565. curr_value = invalue
  566. if val_type == 'yaml':
  567. try:
  568. # AUDIT:maybe-no-member makes sense due to different yaml libraries
  569. # pylint: disable=maybe-no-member
  570. curr_value = yaml.safe_load(invalue, Loader=yaml.RoundTripLoader)
  571. except AttributeError:
  572. curr_value = yaml.safe_load(invalue)
  573. elif val_type == 'json':
  574. curr_value = json.loads(invalue)
  575. return curr_value
  576. @staticmethod
  577. def parse_value(inc_value, vtype=''):
  578. '''determine value type passed'''
  579. true_bools = ['y', 'Y', 'yes', 'Yes', 'YES', 'true', 'True', 'TRUE',
  580. 'on', 'On', 'ON', ]
  581. false_bools = ['n', 'N', 'no', 'No', 'NO', 'false', 'False', 'FALSE',
  582. 'off', 'Off', 'OFF']
  583. # It came in as a string but you didn't specify value_type as string
  584. # we will convert to bool if it matches any of the above cases
  585. if isinstance(inc_value, str) and 'bool' in vtype:
  586. if inc_value not in true_bools and inc_value not in false_bools:
  587. raise YeditException('Not a boolean type. str=[{}] vtype=[{}]'.format(inc_value, vtype))
  588. elif isinstance(inc_value, bool) and 'str' in vtype:
  589. inc_value = str(inc_value)
  590. # There is a special case where '' will turn into None after yaml loading it so skip
  591. if isinstance(inc_value, str) and inc_value == '':
  592. pass
  593. # If vtype is not str then go ahead and attempt to yaml load it.
  594. elif isinstance(inc_value, str) and 'str' not in vtype:
  595. try:
  596. inc_value = yaml.safe_load(inc_value)
  597. except Exception:
  598. raise YeditException('Could not determine type of incoming value. ' +
  599. 'value=[{}] vtype=[{}]'.format(type(inc_value), vtype))
  600. return inc_value
  601. @staticmethod
  602. def process_edits(edits, yamlfile):
  603. '''run through a list of edits and process them one-by-one'''
  604. results = []
  605. for edit in edits:
  606. value = Yedit.parse_value(edit['value'], edit.get('value_type', ''))
  607. if edit.get('action') == 'update':
  608. # pylint: disable=line-too-long
  609. curr_value = Yedit.get_curr_value(
  610. Yedit.parse_value(edit.get('curr_value')),
  611. edit.get('curr_value_format'))
  612. rval = yamlfile.update(edit['key'],
  613. value,
  614. edit.get('index'),
  615. curr_value)
  616. elif edit.get('action') == 'append':
  617. rval = yamlfile.append(edit['key'], value)
  618. else:
  619. rval = yamlfile.put(edit['key'], value)
  620. if rval[0]:
  621. results.append({'key': edit['key'], 'edit': rval[1]})
  622. return {'changed': len(results) > 0, 'results': results}
  623. # pylint: disable=too-many-return-statements,too-many-branches
  624. @staticmethod
  625. def run_ansible(params):
  626. '''perform the idempotent crud operations'''
  627. yamlfile = Yedit(filename=params['src'],
  628. backup=params['backup'],
  629. content_type=params['content_type'],
  630. separator=params['separator'])
  631. state = params['state']
  632. if params['src']:
  633. rval = yamlfile.load()
  634. if yamlfile.yaml_dict is None and state != 'present':
  635. return {'failed': True,
  636. 'msg': 'Error opening file [{}]. Verify that the '.format(params['src']) +
  637. 'file exists, that it is has correct permissions, and is valid yaml.'}
  638. if state == 'list':
  639. if params['content']:
  640. content = Yedit.parse_value(params['content'], params['content_type'])
  641. yamlfile.yaml_dict = content
  642. if params['key']:
  643. rval = yamlfile.get(params['key'])
  644. return {'changed': False, 'result': rval, 'state': state}
  645. elif state == 'absent':
  646. if params['content']:
  647. content = Yedit.parse_value(params['content'], params['content_type'])
  648. yamlfile.yaml_dict = content
  649. if params['update']:
  650. rval = yamlfile.pop(params['key'], params['value'])
  651. else:
  652. rval = yamlfile.delete(params['key'], params['index'], params['value'])
  653. if rval[0] and params['src']:
  654. yamlfile.write()
  655. return {'changed': rval[0], 'result': rval[1], 'state': state}
  656. elif state == 'present':
  657. # check if content is different than what is in the file
  658. if params['content']:
  659. content = Yedit.parse_value(params['content'], params['content_type'])
  660. # We had no edits to make and the contents are the same
  661. if yamlfile.yaml_dict == content and \
  662. params['value'] is None:
  663. return {'changed': False, 'result': yamlfile.yaml_dict, 'state': state}
  664. yamlfile.yaml_dict = content
  665. # If we were passed a key, value then
  666. # we enapsulate it in a list and process it
  667. # Key, Value passed to the module : Converted to Edits list #
  668. edits = []
  669. _edit = {}
  670. if params['value'] is not None:
  671. _edit['value'] = params['value']
  672. _edit['value_type'] = params['value_type']
  673. _edit['key'] = params['key']
  674. if params['update']:
  675. _edit['action'] = 'update'
  676. _edit['curr_value'] = params['curr_value']
  677. _edit['curr_value_format'] = params['curr_value_format']
  678. _edit['index'] = params['index']
  679. elif params['append']:
  680. _edit['action'] = 'append'
  681. edits.append(_edit)
  682. elif params['edits'] is not None:
  683. edits = params['edits']
  684. if edits:
  685. results = Yedit.process_edits(edits, yamlfile)
  686. # if there were changes and a src provided to us we need to write
  687. if results['changed'] and params['src']:
  688. yamlfile.write()
  689. return {'changed': results['changed'], 'result': results['results'], 'state': state}
  690. # no edits to make
  691. if params['src']:
  692. # pylint: disable=redefined-variable-type
  693. rval = yamlfile.write()
  694. return {'changed': rval[0],
  695. 'result': rval[1],
  696. 'state': state}
  697. # We were passed content but no src, key or value, or edits. Return contents in memory
  698. return {'changed': False, 'result': yamlfile.yaml_dict, 'state': state}
  699. return {'failed': True, 'msg': 'Unkown state passed'}
  700. # -*- -*- -*- End included fragment: ../../lib_utils/src/class/yedit.py -*- -*- -*-
  701. # -*- -*- -*- Begin included fragment: lib/base.py -*- -*- -*-
  702. # pylint: disable=too-many-lines
  703. # noqa: E301,E302,E303,T001
  704. class OpenShiftCLIError(Exception):
  705. '''Exception class for openshiftcli'''
  706. pass
  707. ADDITIONAL_PATH_LOOKUPS = ['/usr/local/bin', os.path.expanduser('~/bin')]
  708. def locate_oc_binary():
  709. ''' Find and return oc binary file '''
  710. # https://github.com/openshift/openshift-ansible/issues/3410
  711. # oc can be in /usr/local/bin in some cases, but that may not
  712. # be in $PATH due to ansible/sudo
  713. paths = os.environ.get("PATH", os.defpath).split(os.pathsep) + ADDITIONAL_PATH_LOOKUPS
  714. oc_binary = 'oc'
  715. # Use shutil.which if it is available, otherwise fallback to a naive path search
  716. try:
  717. which_result = shutil.which(oc_binary, path=os.pathsep.join(paths))
  718. if which_result is not None:
  719. oc_binary = which_result
  720. except AttributeError:
  721. for path in paths:
  722. if os.path.exists(os.path.join(path, oc_binary)):
  723. oc_binary = os.path.join(path, oc_binary)
  724. break
  725. return oc_binary
  726. # pylint: disable=too-few-public-methods
  727. class OpenShiftCLI(object):
  728. ''' Class to wrap the command line tools '''
  729. def __init__(self,
  730. namespace,
  731. kubeconfig='/etc/origin/master/admin.kubeconfig',
  732. verbose=False,
  733. all_namespaces=False):
  734. ''' Constructor for OpenshiftCLI '''
  735. self.namespace = namespace
  736. self.verbose = verbose
  737. self.kubeconfig = Utils.create_tmpfile_copy(kubeconfig)
  738. self.all_namespaces = all_namespaces
  739. self.oc_binary = locate_oc_binary()
  740. # Pylint allows only 5 arguments to be passed.
  741. # pylint: disable=too-many-arguments
  742. def _replace_content(self, resource, rname, content, force=False, sep='.'):
  743. ''' replace the current object with the content '''
  744. res = self._get(resource, rname)
  745. if not res['results']:
  746. return res
  747. fname = Utils.create_tmpfile(rname + '-')
  748. yed = Yedit(fname, res['results'][0], separator=sep)
  749. changes = []
  750. for key, value in content.items():
  751. changes.append(yed.put(key, value))
  752. if any([change[0] for change in changes]):
  753. yed.write()
  754. atexit.register(Utils.cleanup, [fname])
  755. return self._replace(fname, force)
  756. return {'returncode': 0, 'updated': False}
  757. def _replace(self, fname, force=False):
  758. '''replace the current object with oc replace'''
  759. # We are removing the 'resourceVersion' to handle
  760. # a race condition when modifying oc objects
  761. yed = Yedit(fname)
  762. results = yed.delete('metadata.resourceVersion')
  763. if results[0]:
  764. yed.write()
  765. cmd = ['replace', '-f', fname]
  766. if force:
  767. cmd.append('--force')
  768. return self.openshift_cmd(cmd)
  769. def _create_from_content(self, rname, content):
  770. '''create a temporary file and then call oc create on it'''
  771. fname = Utils.create_tmpfile(rname + '-')
  772. yed = Yedit(fname, content=content)
  773. yed.write()
  774. atexit.register(Utils.cleanup, [fname])
  775. return self._create(fname)
  776. def _create(self, fname):
  777. '''call oc create on a filename'''
  778. return self.openshift_cmd(['create', '-f', fname])
  779. def _delete(self, resource, name=None, selector=None):
  780. '''call oc delete on a resource'''
  781. cmd = ['delete', resource]
  782. if selector is not None:
  783. cmd.append('--selector={}'.format(selector))
  784. elif name is not None:
  785. cmd.append(name)
  786. else:
  787. raise OpenShiftCLIError('Either name or selector is required when calling delete.')
  788. return self.openshift_cmd(cmd)
  789. def _process(self, template_name, create=False, params=None, template_data=None): # noqa: E501
  790. '''process a template
  791. template_name: the name of the template to process
  792. create: whether to send to oc create after processing
  793. params: the parameters for the template
  794. template_data: the incoming template's data; instead of a file
  795. '''
  796. cmd = ['process']
  797. if template_data:
  798. cmd.extend(['-f', '-'])
  799. else:
  800. cmd.append(template_name)
  801. if params:
  802. param_str = ["{}={}".format(key, str(value).replace("'", r'"')) for key, value in params.items()]
  803. cmd.append('-v')
  804. cmd.extend(param_str)
  805. results = self.openshift_cmd(cmd, output=True, input_data=template_data)
  806. if results['returncode'] != 0 or not create:
  807. return results
  808. fname = Utils.create_tmpfile(template_name + '-')
  809. yed = Yedit(fname, results['results'])
  810. yed.write()
  811. atexit.register(Utils.cleanup, [fname])
  812. return self.openshift_cmd(['create', '-f', fname])
  813. def _get(self, resource, name=None, selector=None):
  814. '''return a resource by name '''
  815. cmd = ['get', resource]
  816. if selector is not None:
  817. cmd.append('--selector={}'.format(selector))
  818. elif name is not None:
  819. cmd.append(name)
  820. cmd.extend(['-o', 'json'])
  821. rval = self.openshift_cmd(cmd, output=True)
  822. # Ensure results are retuned in an array
  823. if 'items' in rval:
  824. rval['results'] = rval['items']
  825. elif not isinstance(rval['results'], list):
  826. rval['results'] = [rval['results']]
  827. return rval
  828. def _schedulable(self, node=None, selector=None, schedulable=True):
  829. ''' perform oadm manage-node scheduable '''
  830. cmd = ['manage-node']
  831. if node:
  832. cmd.extend(node)
  833. else:
  834. cmd.append('--selector={}'.format(selector))
  835. cmd.append('--schedulable={}'.format(schedulable))
  836. return self.openshift_cmd(cmd, oadm=True, output=True, output_type='raw') # noqa: E501
  837. def _list_pods(self, node=None, selector=None, pod_selector=None):
  838. ''' perform oadm list pods
  839. node: the node in which to list pods
  840. selector: the label selector filter if provided
  841. pod_selector: the pod selector filter if provided
  842. '''
  843. cmd = ['manage-node']
  844. if node:
  845. cmd.extend(node)
  846. else:
  847. cmd.append('--selector={}'.format(selector))
  848. if pod_selector:
  849. cmd.append('--pod-selector={}'.format(pod_selector))
  850. cmd.extend(['--list-pods', '-o', 'json'])
  851. return self.openshift_cmd(cmd, oadm=True, output=True, output_type='raw')
  852. # pylint: disable=too-many-arguments
  853. def _evacuate(self, node=None, selector=None, pod_selector=None, dry_run=False, grace_period=None, force=False):
  854. ''' perform oadm manage-node evacuate '''
  855. cmd = ['manage-node']
  856. if node:
  857. cmd.extend(node)
  858. else:
  859. cmd.append('--selector={}'.format(selector))
  860. if dry_run:
  861. cmd.append('--dry-run')
  862. if pod_selector:
  863. cmd.append('--pod-selector={}'.format(pod_selector))
  864. if grace_period:
  865. cmd.append('--grace-period={}'.format(int(grace_period)))
  866. if force:
  867. cmd.append('--force')
  868. cmd.append('--evacuate')
  869. return self.openshift_cmd(cmd, oadm=True, output=True, output_type='raw')
  870. def _version(self):
  871. ''' return the openshift version'''
  872. return self.openshift_cmd(['version'], output=True, output_type='raw')
  873. def _import_image(self, url=None, name=None, tag=None):
  874. ''' perform image import '''
  875. cmd = ['import-image']
  876. image = '{0}'.format(name)
  877. if tag:
  878. image += ':{0}'.format(tag)
  879. cmd.append(image)
  880. if url:
  881. cmd.append('--from={0}/{1}'.format(url, image))
  882. cmd.append('-n{0}'.format(self.namespace))
  883. cmd.append('--confirm')
  884. return self.openshift_cmd(cmd)
  885. def _run(self, cmds, input_data):
  886. ''' Actually executes the command. This makes mocking easier. '''
  887. curr_env = os.environ.copy()
  888. curr_env.update({'KUBECONFIG': self.kubeconfig})
  889. proc = subprocess.Popen(cmds,
  890. stdin=subprocess.PIPE,
  891. stdout=subprocess.PIPE,
  892. stderr=subprocess.PIPE,
  893. env=curr_env)
  894. stdout, stderr = proc.communicate(input_data)
  895. return proc.returncode, stdout.decode('utf-8'), stderr.decode('utf-8')
  896. # pylint: disable=too-many-arguments,too-many-branches
  897. def openshift_cmd(self, cmd, oadm=False, output=False, output_type='json', input_data=None):
  898. '''Base command for oc '''
  899. cmds = [self.oc_binary]
  900. if oadm:
  901. cmds.append('adm')
  902. cmds.extend(cmd)
  903. if self.all_namespaces:
  904. cmds.extend(['--all-namespaces'])
  905. elif self.namespace is not None and self.namespace.lower() not in ['none', 'emtpy']: # E501
  906. cmds.extend(['-n', self.namespace])
  907. if self.verbose:
  908. print(' '.join(cmds))
  909. try:
  910. returncode, stdout, stderr = self._run(cmds, input_data)
  911. except OSError as ex:
  912. returncode, stdout, stderr = 1, '', 'Failed to execute {}: {}'.format(subprocess.list2cmdline(cmds), ex)
  913. rval = {"returncode": returncode,
  914. "cmd": ' '.join(cmds)}
  915. if output_type == 'json':
  916. rval['results'] = {}
  917. if output and stdout:
  918. try:
  919. rval['results'] = json.loads(stdout)
  920. except ValueError as verr:
  921. if "No JSON object could be decoded" in verr.args:
  922. rval['err'] = verr.args
  923. elif output_type == 'raw':
  924. rval['results'] = stdout if output else ''
  925. if self.verbose:
  926. print("STDOUT: {0}".format(stdout))
  927. print("STDERR: {0}".format(stderr))
  928. if 'err' in rval or returncode != 0:
  929. rval.update({"stderr": stderr,
  930. "stdout": stdout})
  931. return rval
  932. class Utils(object): # pragma: no cover
  933. ''' utilities for openshiftcli modules '''
  934. @staticmethod
  935. def _write(filename, contents):
  936. ''' Actually write the file contents to disk. This helps with mocking. '''
  937. with open(filename, 'w') as sfd:
  938. sfd.write(str(contents))
  939. @staticmethod
  940. def create_tmp_file_from_contents(rname, data, ftype='yaml'):
  941. ''' create a file in tmp with name and contents'''
  942. tmp = Utils.create_tmpfile(prefix=rname)
  943. if ftype == 'yaml':
  944. # AUDIT:no-member makes sense here due to ruamel.YAML/PyYAML usage
  945. # pylint: disable=no-member
  946. if hasattr(yaml, 'RoundTripDumper'):
  947. Utils._write(tmp, yaml.dump(data, Dumper=yaml.RoundTripDumper))
  948. else:
  949. Utils._write(tmp, yaml.safe_dump(data, default_flow_style=False))
  950. elif ftype == 'json':
  951. Utils._write(tmp, json.dumps(data))
  952. else:
  953. Utils._write(tmp, data)
  954. # Register cleanup when module is done
  955. atexit.register(Utils.cleanup, [tmp])
  956. return tmp
  957. @staticmethod
  958. def create_tmpfile_copy(inc_file):
  959. '''create a temporary copy of a file'''
  960. tmpfile = Utils.create_tmpfile('lib_openshift-')
  961. Utils._write(tmpfile, open(inc_file).read())
  962. # Cleanup the tmpfile
  963. atexit.register(Utils.cleanup, [tmpfile])
  964. return tmpfile
  965. @staticmethod
  966. def create_tmpfile(prefix='tmp'):
  967. ''' Generates and returns a temporary file name '''
  968. with tempfile.NamedTemporaryFile(prefix=prefix, delete=False) as tmp:
  969. return tmp.name
  970. @staticmethod
  971. def create_tmp_files_from_contents(content, content_type=None):
  972. '''Turn an array of dict: filename, content into a files array'''
  973. if not isinstance(content, list):
  974. content = [content]
  975. files = []
  976. for item in content:
  977. path = Utils.create_tmp_file_from_contents(item['path'] + '-',
  978. item['data'],
  979. ftype=content_type)
  980. files.append({'name': os.path.basename(item['path']),
  981. 'path': path})
  982. return files
  983. @staticmethod
  984. def cleanup(files):
  985. '''Clean up on exit '''
  986. for sfile in files:
  987. if os.path.exists(sfile):
  988. if os.path.isdir(sfile):
  989. shutil.rmtree(sfile)
  990. elif os.path.isfile(sfile):
  991. os.remove(sfile)
  992. @staticmethod
  993. def exists(results, _name):
  994. ''' Check to see if the results include the name '''
  995. if not results:
  996. return False
  997. if Utils.find_result(results, _name):
  998. return True
  999. return False
  1000. @staticmethod
  1001. def find_result(results, _name):
  1002. ''' Find the specified result by name'''
  1003. rval = None
  1004. for result in results:
  1005. if 'metadata' in result and result['metadata']['name'] == _name:
  1006. rval = result
  1007. break
  1008. return rval
  1009. @staticmethod
  1010. def get_resource_file(sfile, sfile_type='yaml'):
  1011. ''' return the service file '''
  1012. contents = None
  1013. with open(sfile) as sfd:
  1014. contents = sfd.read()
  1015. if sfile_type == 'yaml':
  1016. # AUDIT:no-member makes sense here due to ruamel.YAML/PyYAML usage
  1017. # pylint: disable=no-member
  1018. if hasattr(yaml, 'RoundTripLoader'):
  1019. contents = yaml.load(contents, yaml.RoundTripLoader)
  1020. else:
  1021. contents = yaml.safe_load(contents)
  1022. elif sfile_type == 'json':
  1023. contents = json.loads(contents)
  1024. return contents
  1025. @staticmethod
  1026. def filter_versions(stdout):
  1027. ''' filter the oc version output '''
  1028. version_dict = {}
  1029. version_search = ['oc', 'openshift', 'kubernetes']
  1030. for line in stdout.strip().split('\n'):
  1031. for term in version_search:
  1032. if not line:
  1033. continue
  1034. if line.startswith(term):
  1035. version_dict[term] = line.split()[-1]
  1036. # horrible hack to get openshift version in Openshift 3.2
  1037. # By default "oc version in 3.2 does not return an "openshift" version
  1038. if "openshift" not in version_dict:
  1039. version_dict["openshift"] = version_dict["oc"]
  1040. return version_dict
  1041. @staticmethod
  1042. def add_custom_versions(versions):
  1043. ''' create custom versions strings '''
  1044. versions_dict = {}
  1045. for tech, version in versions.items():
  1046. # clean up "-" from version
  1047. if "-" in version:
  1048. version = version.split("-")[0]
  1049. if version.startswith('v'):
  1050. versions_dict[tech + '_numeric'] = version[1:].split('+')[0]
  1051. # "v3.3.0.33" is what we have, we want "3.3"
  1052. versions_dict[tech + '_short'] = version[1:4]
  1053. return versions_dict
  1054. @staticmethod
  1055. def openshift_installed():
  1056. ''' check if openshift is installed '''
  1057. import rpm
  1058. transaction_set = rpm.TransactionSet()
  1059. rpmquery = transaction_set.dbMatch("name", "atomic-openshift")
  1060. return rpmquery.count() > 0
  1061. # Disabling too-many-branches. This is a yaml dictionary comparison function
  1062. # pylint: disable=too-many-branches,too-many-return-statements,too-many-statements
  1063. @staticmethod
  1064. def check_def_equal(user_def, result_def, skip_keys=None, debug=False):
  1065. ''' Given a user defined definition, compare it with the results given back by our query. '''
  1066. # Currently these values are autogenerated and we do not need to check them
  1067. skip = ['metadata', 'status']
  1068. if skip_keys:
  1069. skip.extend(skip_keys)
  1070. for key, value in result_def.items():
  1071. if key in skip:
  1072. continue
  1073. # Both are lists
  1074. if isinstance(value, list):
  1075. if key not in user_def:
  1076. if debug:
  1077. print('User data does not have key [%s]' % key)
  1078. print('User data: %s' % user_def)
  1079. return False
  1080. if not isinstance(user_def[key], list):
  1081. if debug:
  1082. print('user_def[key] is not a list key=[%s] user_def[key]=%s' % (key, user_def[key]))
  1083. return False
  1084. if len(user_def[key]) != len(value):
  1085. if debug:
  1086. print("List lengths are not equal.")
  1087. print("key=[%s]: user_def[%s] != value[%s]" % (key, len(user_def[key]), len(value)))
  1088. print("user_def: %s" % user_def[key])
  1089. print("value: %s" % value)
  1090. return False
  1091. for values in zip(user_def[key], value):
  1092. if isinstance(values[0], dict) and isinstance(values[1], dict):
  1093. if debug:
  1094. print('sending list - list')
  1095. print(type(values[0]))
  1096. print(type(values[1]))
  1097. result = Utils.check_def_equal(values[0], values[1], skip_keys=skip_keys, debug=debug)
  1098. if not result:
  1099. print('list compare returned false')
  1100. return False
  1101. elif value != user_def[key]:
  1102. if debug:
  1103. print('value should be identical')
  1104. print(user_def[key])
  1105. print(value)
  1106. return False
  1107. # recurse on a dictionary
  1108. elif isinstance(value, dict):
  1109. if key not in user_def:
  1110. if debug:
  1111. print("user_def does not have key [%s]" % key)
  1112. return False
  1113. if not isinstance(user_def[key], dict):
  1114. if debug:
  1115. print("dict returned false: not instance of dict")
  1116. return False
  1117. # before passing ensure keys match
  1118. api_values = set(value.keys()) - set(skip)
  1119. user_values = set(user_def[key].keys()) - set(skip)
  1120. if api_values != user_values:
  1121. if debug:
  1122. print("keys are not equal in dict")
  1123. print(user_values)
  1124. print(api_values)
  1125. return False
  1126. result = Utils.check_def_equal(user_def[key], value, skip_keys=skip_keys, debug=debug)
  1127. if not result:
  1128. if debug:
  1129. print("dict returned false")
  1130. print(result)
  1131. return False
  1132. # Verify each key, value pair is the same
  1133. else:
  1134. if key not in user_def or value != user_def[key]:
  1135. if debug:
  1136. print("value not equal; user_def does not have key")
  1137. print(key)
  1138. print(value)
  1139. if key in user_def:
  1140. print(user_def[key])
  1141. return False
  1142. if debug:
  1143. print('returning true')
  1144. return True
  1145. class OpenShiftCLIConfig(object):
  1146. '''Generic Config'''
  1147. def __init__(self, rname, namespace, kubeconfig, options):
  1148. self.kubeconfig = kubeconfig
  1149. self.name = rname
  1150. self.namespace = namespace
  1151. self._options = options
  1152. @property
  1153. def config_options(self):
  1154. ''' return config options '''
  1155. return self._options
  1156. def to_option_list(self, ascommalist=''):
  1157. '''return all options as a string
  1158. if ascommalist is set to the name of a key, and
  1159. the value of that key is a dict, format the dict
  1160. as a list of comma delimited key=value pairs'''
  1161. return self.stringify(ascommalist)
  1162. def stringify(self, ascommalist=''):
  1163. ''' return the options hash as cli params in a string
  1164. if ascommalist is set to the name of a key, and
  1165. the value of that key is a dict, format the dict
  1166. as a list of comma delimited key=value pairs '''
  1167. rval = []
  1168. for key in sorted(self.config_options.keys()):
  1169. data = self.config_options[key]
  1170. if data['include'] \
  1171. and (data['value'] is not None or isinstance(data['value'], int)):
  1172. if key == ascommalist:
  1173. val = ','.join(['{}={}'.format(kk, vv) for kk, vv in sorted(data['value'].items())])
  1174. else:
  1175. val = data['value']
  1176. rval.append('--{}={}'.format(key.replace('_', '-'), val))
  1177. return rval
  1178. # -*- -*- -*- End included fragment: lib/base.py -*- -*- -*-
  1179. # -*- -*- -*- Begin included fragment: lib/rolebinding.py -*- -*- -*-
  1180. # pylint: disable=too-many-instance-attributes
  1181. class RoleBindingConfig(object):
  1182. ''' Handle rolebinding config '''
  1183. # pylint: disable=too-many-arguments
  1184. def __init__(self,
  1185. name,
  1186. namespace,
  1187. kubeconfig,
  1188. group_names=None,
  1189. role_ref=None,
  1190. subjects=None,
  1191. usernames=None):
  1192. ''' constructor for handling rolebinding options '''
  1193. self.kubeconfig = kubeconfig
  1194. self.name = name
  1195. self.namespace = namespace
  1196. self.group_names = group_names
  1197. self.role_ref = role_ref
  1198. self.subjects = subjects
  1199. self.usernames = usernames
  1200. self.data = {}
  1201. self.create_dict()
  1202. def create_dict(self):
  1203. ''' create a default rolebinding as a dict '''
  1204. self.data['apiVersion'] = 'v1'
  1205. self.data['kind'] = 'RoleBinding'
  1206. self.data['groupNames'] = self.group_names
  1207. self.data['metadata']['name'] = self.name
  1208. self.data['metadata']['namespace'] = self.namespace
  1209. self.data['roleRef'] = self.role_ref
  1210. self.data['subjects'] = self.subjects
  1211. self.data['userNames'] = self.usernames
  1212. # pylint: disable=too-many-instance-attributes,too-many-public-methods
  1213. class RoleBinding(Yedit):
  1214. ''' Class to model a rolebinding openshift object'''
  1215. group_names_path = "groupNames"
  1216. role_ref_path = "roleRef"
  1217. subjects_path = "subjects"
  1218. user_names_path = "userNames"
  1219. kind = 'RoleBinding'
  1220. def __init__(self, content):
  1221. '''RoleBinding constructor'''
  1222. super(RoleBinding, self).__init__(content=content)
  1223. self._subjects = None
  1224. self._role_ref = None
  1225. self._group_names = None
  1226. self._user_names = None
  1227. @property
  1228. def subjects(self):
  1229. ''' subjects property '''
  1230. if self._subjects is None:
  1231. self._subjects = self.get_subjects()
  1232. return self._subjects
  1233. @subjects.setter
  1234. def subjects(self, data):
  1235. ''' subjects property setter'''
  1236. self._subjects = data
  1237. @property
  1238. def role_ref(self):
  1239. ''' role_ref property '''
  1240. if self._role_ref is None:
  1241. self._role_ref = self.get_role_ref()
  1242. return self._role_ref
  1243. @role_ref.setter
  1244. def role_ref(self, data):
  1245. ''' role_ref property setter'''
  1246. self._role_ref = data
  1247. @property
  1248. def group_names(self):
  1249. ''' group_names property '''
  1250. if self._group_names is None:
  1251. self._group_names = self.get_group_names()
  1252. return self._group_names
  1253. @group_names.setter
  1254. def group_names(self, data):
  1255. ''' group_names property setter'''
  1256. self._group_names = data
  1257. @property
  1258. def user_names(self):
  1259. ''' user_names property '''
  1260. if self._user_names is None:
  1261. self._user_names = self.get_user_names()
  1262. return self._user_names
  1263. @user_names.setter
  1264. def user_names(self, data):
  1265. ''' user_names property setter'''
  1266. self._user_names = data
  1267. def get_group_names(self):
  1268. ''' return groupNames '''
  1269. return self.get(RoleBinding.group_names_path) or []
  1270. def get_user_names(self):
  1271. ''' return usernames '''
  1272. return self.get(RoleBinding.user_names_path) or []
  1273. def get_role_ref(self):
  1274. ''' return role_ref '''
  1275. return self.get(RoleBinding.role_ref_path) or {}
  1276. def get_subjects(self):
  1277. ''' return subjects '''
  1278. return self.get(RoleBinding.subjects_path) or []
  1279. #### ADD #####
  1280. def add_subject(self, inc_subject):
  1281. ''' add a subject '''
  1282. if self.subjects:
  1283. # pylint: disable=no-member
  1284. self.subjects.append(inc_subject)
  1285. else:
  1286. self.put(RoleBinding.subjects_path, [inc_subject])
  1287. return True
  1288. def add_role_ref(self, inc_role_ref):
  1289. ''' add a role_ref '''
  1290. if not self.role_ref:
  1291. self.put(RoleBinding.role_ref_path, {"name": inc_role_ref})
  1292. return True
  1293. return False
  1294. def add_group_names(self, inc_group_names):
  1295. ''' add a group_names '''
  1296. if self.group_names:
  1297. # pylint: disable=no-member
  1298. self.group_names.append(inc_group_names)
  1299. else:
  1300. self.put(RoleBinding.group_names_path, [inc_group_names])
  1301. return True
  1302. def add_user_name(self, inc_user_name):
  1303. ''' add a username '''
  1304. if self.user_names:
  1305. # pylint: disable=no-member
  1306. self.user_names.append(inc_user_name)
  1307. else:
  1308. self.put(RoleBinding.user_names_path, [inc_user_name])
  1309. return True
  1310. #### /ADD #####
  1311. #### Remove #####
  1312. def remove_subject(self, inc_subject):
  1313. ''' remove a subject '''
  1314. try:
  1315. # pylint: disable=no-member
  1316. self.subjects.remove(inc_subject)
  1317. except ValueError as _:
  1318. return False
  1319. return True
  1320. def remove_role_ref(self, inc_role_ref):
  1321. ''' remove a role_ref '''
  1322. if self.role_ref and self.role_ref['name'] == inc_role_ref:
  1323. del self.role_ref['name']
  1324. return True
  1325. return False
  1326. def remove_group_name(self, inc_group_name):
  1327. ''' remove a groupname '''
  1328. try:
  1329. # pylint: disable=no-member
  1330. self.group_names.remove(inc_group_name)
  1331. except ValueError as _:
  1332. return False
  1333. return True
  1334. def remove_user_name(self, inc_user_name):
  1335. ''' remove a username '''
  1336. try:
  1337. # pylint: disable=no-member
  1338. self.user_names.remove(inc_user_name)
  1339. except ValueError as _:
  1340. return False
  1341. return True
  1342. #### /REMOVE #####
  1343. #### UPDATE #####
  1344. def update_subject(self, inc_subject):
  1345. ''' update a subject '''
  1346. try:
  1347. # pylint: disable=no-member
  1348. index = self.subjects.index(inc_subject)
  1349. except ValueError as _:
  1350. return self.add_subject(inc_subject)
  1351. self.subjects[index] = inc_subject
  1352. return True
  1353. def update_group_name(self, inc_group_name):
  1354. ''' update a groupname '''
  1355. try:
  1356. # pylint: disable=no-member
  1357. index = self.group_names.index(inc_group_name)
  1358. except ValueError as _:
  1359. return self.add_group_names(inc_group_name)
  1360. self.group_names[index] = inc_group_name
  1361. return True
  1362. def update_user_name(self, inc_user_name):
  1363. ''' update a username '''
  1364. try:
  1365. # pylint: disable=no-member
  1366. index = self.user_names.index(inc_user_name)
  1367. except ValueError as _:
  1368. return self.add_user_name(inc_user_name)
  1369. self.user_names[index] = inc_user_name
  1370. return True
  1371. def update_role_ref(self, inc_role_ref):
  1372. ''' update a role_ref '''
  1373. self.role_ref['name'] = inc_role_ref
  1374. return True
  1375. #### /UPDATE #####
  1376. #### FIND ####
  1377. def find_subject(self, inc_subject):
  1378. ''' find a subject '''
  1379. index = None
  1380. try:
  1381. # pylint: disable=no-member
  1382. index = self.subjects.index(inc_subject)
  1383. except ValueError as _:
  1384. return index
  1385. return index
  1386. def find_group_name(self, inc_group_name):
  1387. ''' find a group_name '''
  1388. index = None
  1389. try:
  1390. # pylint: disable=no-member
  1391. index = self.group_names.index(inc_group_name)
  1392. except ValueError as _:
  1393. return index
  1394. return index
  1395. def find_user_name(self, inc_user_name):
  1396. ''' find a user_name '''
  1397. index = None
  1398. try:
  1399. # pylint: disable=no-member
  1400. index = self.user_names.index(inc_user_name)
  1401. except ValueError as _:
  1402. return index
  1403. return index
  1404. def find_role_ref(self, inc_role_ref):
  1405. ''' find a user_name '''
  1406. if self.role_ref and self.role_ref['name'] == inc_role_ref['name']:
  1407. return self.role_ref
  1408. return None
  1409. # -*- -*- -*- End included fragment: lib/rolebinding.py -*- -*- -*-
  1410. # -*- -*- -*- Begin included fragment: lib/scc.py -*- -*- -*-
  1411. # pylint: disable=too-many-instance-attributes
  1412. class SecurityContextConstraintsConfig(object):
  1413. ''' Handle scc options '''
  1414. # pylint: disable=too-many-arguments
  1415. def __init__(self,
  1416. sname,
  1417. kubeconfig,
  1418. options=None,
  1419. fs_group='MustRunAs',
  1420. default_add_capabilities=None,
  1421. groups=None,
  1422. priority=None,
  1423. required_drop_capabilities=None,
  1424. run_as_user='MustRunAsRange',
  1425. se_linux_context='MustRunAs',
  1426. supplemental_groups='RunAsAny',
  1427. users=None,
  1428. annotations=None):
  1429. ''' constructor for handling scc options '''
  1430. self.kubeconfig = kubeconfig
  1431. self.name = sname
  1432. self.options = options
  1433. self.fs_group = fs_group
  1434. self.default_add_capabilities = default_add_capabilities
  1435. self.groups = groups
  1436. self.priority = priority
  1437. self.required_drop_capabilities = required_drop_capabilities
  1438. self.run_as_user = run_as_user
  1439. self.se_linux_context = se_linux_context
  1440. self.supplemental_groups = supplemental_groups
  1441. self.users = users
  1442. self.annotations = annotations
  1443. self.data = {}
  1444. self.create_dict()
  1445. def create_dict(self):
  1446. ''' assign the correct properties for a scc dict '''
  1447. # allow options
  1448. if self.options:
  1449. for key, value in self.options.items():
  1450. self.data[key] = value
  1451. else:
  1452. self.data['allowHostDirVolumePlugin'] = False
  1453. self.data['allowHostIPC'] = False
  1454. self.data['allowHostNetwork'] = False
  1455. self.data['allowHostPID'] = False
  1456. self.data['allowHostPorts'] = False
  1457. self.data['allowPrivilegedContainer'] = False
  1458. self.data['allowedCapabilities'] = None
  1459. # version
  1460. self.data['apiVersion'] = 'v1'
  1461. # kind
  1462. self.data['kind'] = 'SecurityContextConstraints'
  1463. # defaultAddCapabilities
  1464. self.data['defaultAddCapabilities'] = self.default_add_capabilities
  1465. # fsGroup
  1466. self.data['fsGroup']['type'] = self.fs_group
  1467. # groups
  1468. self.data['groups'] = []
  1469. if self.groups:
  1470. self.data['groups'] = self.groups
  1471. # metadata
  1472. self.data['metadata'] = {}
  1473. self.data['metadata']['name'] = self.name
  1474. if self.annotations:
  1475. for key, value in self.annotations.items():
  1476. self.data['metadata'][key] = value
  1477. # priority
  1478. self.data['priority'] = self.priority
  1479. # requiredDropCapabilities
  1480. self.data['requiredDropCapabilities'] = self.required_drop_capabilities
  1481. # runAsUser
  1482. self.data['runAsUser'] = {'type': self.run_as_user}
  1483. # seLinuxContext
  1484. self.data['seLinuxContext'] = {'type': self.se_linux_context}
  1485. # supplementalGroups
  1486. self.data['supplementalGroups'] = {'type': self.supplemental_groups}
  1487. # users
  1488. self.data['users'] = []
  1489. if self.users:
  1490. self.data['users'] = self.users
  1491. # pylint: disable=too-many-instance-attributes,too-many-public-methods,no-member
  1492. class SecurityContextConstraints(Yedit):
  1493. ''' Class to wrap the oc command line tools '''
  1494. default_add_capabilities_path = "defaultAddCapabilities"
  1495. fs_group_path = "fsGroup"
  1496. groups_path = "groups"
  1497. priority_path = "priority"
  1498. required_drop_capabilities_path = "requiredDropCapabilities"
  1499. run_as_user_path = "runAsUser"
  1500. se_linux_context_path = "seLinuxContext"
  1501. supplemental_groups_path = "supplementalGroups"
  1502. users_path = "users"
  1503. kind = 'SecurityContextConstraints'
  1504. def __init__(self, content):
  1505. '''SecurityContextConstraints constructor'''
  1506. super(SecurityContextConstraints, self).__init__(content=content)
  1507. self._users = None
  1508. self._groups = None
  1509. @property
  1510. def users(self):
  1511. ''' users property getter '''
  1512. if self._users is None:
  1513. self._users = self.get_users()
  1514. return self._users
  1515. @property
  1516. def groups(self):
  1517. ''' groups property getter '''
  1518. if self._groups is None:
  1519. self._groups = self.get_groups()
  1520. return self._groups
  1521. @users.setter
  1522. def users(self, data):
  1523. ''' users property setter'''
  1524. self._users = data
  1525. @groups.setter
  1526. def groups(self, data):
  1527. ''' groups property setter'''
  1528. self._groups = data
  1529. def get_users(self):
  1530. '''get scc users'''
  1531. return self.get(SecurityContextConstraints.users_path) or []
  1532. def get_groups(self):
  1533. '''get scc groups'''
  1534. return self.get(SecurityContextConstraints.groups_path) or []
  1535. def add_user(self, inc_user):
  1536. ''' add a user '''
  1537. if self.users:
  1538. self.users.append(inc_user)
  1539. else:
  1540. self.put(SecurityContextConstraints.users_path, [inc_user])
  1541. return True
  1542. def add_group(self, inc_group):
  1543. ''' add a group '''
  1544. if self.groups:
  1545. self.groups.append(inc_group)
  1546. else:
  1547. self.put(SecurityContextConstraints.groups_path, [inc_group])
  1548. return True
  1549. def remove_user(self, inc_user):
  1550. ''' remove a user '''
  1551. try:
  1552. self.users.remove(inc_user)
  1553. except ValueError as _:
  1554. return False
  1555. return True
  1556. def remove_group(self, inc_group):
  1557. ''' remove a group '''
  1558. try:
  1559. self.groups.remove(inc_group)
  1560. except ValueError as _:
  1561. return False
  1562. return True
  1563. def update_user(self, inc_user):
  1564. ''' update a user '''
  1565. try:
  1566. index = self.users.index(inc_user)
  1567. except ValueError as _:
  1568. return self.add_user(inc_user)
  1569. self.users[index] = inc_user
  1570. return True
  1571. def update_group(self, inc_group):
  1572. ''' update a group '''
  1573. try:
  1574. index = self.groups.index(inc_group)
  1575. except ValueError as _:
  1576. return self.add_group(inc_group)
  1577. self.groups[index] = inc_group
  1578. return True
  1579. def find_user(self, inc_user):
  1580. ''' find a user '''
  1581. index = None
  1582. try:
  1583. index = self.users.index(inc_user)
  1584. except ValueError as _:
  1585. return index
  1586. return index
  1587. def find_group(self, inc_group):
  1588. ''' find a group '''
  1589. index = None
  1590. try:
  1591. index = self.groups.index(inc_group)
  1592. except ValueError as _:
  1593. return index
  1594. return index
  1595. # -*- -*- -*- End included fragment: lib/scc.py -*- -*- -*-
  1596. # -*- -*- -*- Begin included fragment: class/oc_adm_policy_user.py -*- -*- -*-
  1597. class PolicyUserException(Exception):
  1598. ''' PolicyUser exception'''
  1599. pass
  1600. class PolicyUserConfig(OpenShiftCLIConfig):
  1601. ''' PolicyUserConfig is a DTO for user related policy. '''
  1602. def __init__(self, namespace, kubeconfig, policy_options):
  1603. super(PolicyUserConfig, self).__init__(policy_options['name']['value'],
  1604. namespace, kubeconfig, policy_options)
  1605. self.kind = self.get_kind()
  1606. self.namespace = namespace
  1607. def get_kind(self):
  1608. ''' return the kind we are working with '''
  1609. if self.config_options['resource_kind']['value'] == 'role':
  1610. return 'rolebinding'
  1611. elif self.config_options['resource_kind']['value'] == 'cluster-role':
  1612. return 'clusterrolebinding'
  1613. elif self.config_options['resource_kind']['value'] == 'scc':
  1614. return 'scc'
  1615. return None
  1616. # pylint: disable=too-many-return-statements
  1617. class PolicyUser(OpenShiftCLI):
  1618. ''' Class to handle attaching policies to users '''
  1619. def __init__(self,
  1620. config,
  1621. verbose=False):
  1622. ''' Constructor for PolicyUser '''
  1623. super(PolicyUser, self).__init__(config.namespace, config.kubeconfig, verbose)
  1624. self.config = config
  1625. self.verbose = verbose
  1626. self._rolebinding = None
  1627. self._scc = None
  1628. self._cluster_role_bindings = None
  1629. self._role_bindings = None
  1630. @property
  1631. def rolebindings(self):
  1632. if self._role_bindings is None:
  1633. results = self._get('rolebindings', None)
  1634. if results['returncode'] != 0:
  1635. raise OpenShiftCLIError('Could not retrieve rolebindings')
  1636. self._role_bindings = results['results'][0]['items']
  1637. return self._role_bindings
  1638. @property
  1639. def clusterrolebindings(self):
  1640. if self._cluster_role_bindings is None:
  1641. results = self._get('clusterrolebindings', None)
  1642. if results['returncode'] != 0:
  1643. raise OpenShiftCLIError('Could not retrieve clusterrolebindings')
  1644. self._cluster_role_bindings = results['results'][0]['items']
  1645. return self._cluster_role_bindings
  1646. @property
  1647. def role_binding(self):
  1648. ''' role_binding property '''
  1649. return self._rolebinding
  1650. @role_binding.setter
  1651. def role_binding(self, binding):
  1652. ''' setter for role_binding property '''
  1653. self._rolebinding = binding
  1654. @property
  1655. def security_context_constraint(self):
  1656. ''' security_context_constraint property '''
  1657. return self._scc
  1658. @security_context_constraint.setter
  1659. def security_context_constraint(self, scc):
  1660. ''' setter for security_context_constraint property '''
  1661. self._scc = scc
  1662. def get(self):
  1663. '''fetch the desired kind
  1664. This is only used for scc objects.
  1665. The {cluster}rolebindings happen in exists.
  1666. '''
  1667. resource_name = self.config.config_options['name']['value']
  1668. if resource_name == 'cluster-reader':
  1669. resource_name += 's'
  1670. return self._get(self.config.kind, resource_name)
  1671. def exists_role_binding(self):
  1672. ''' return whether role_binding exists '''
  1673. bindings = None
  1674. if self.config.config_options['resource_kind']['value'] == 'cluster-role':
  1675. bindings = self.clusterrolebindings
  1676. else:
  1677. bindings = self.rolebindings
  1678. if bindings is None:
  1679. return False
  1680. for binding in bindings:
  1681. if binding['roleRef']['name'] == self.config.config_options['name']['value'] and \
  1682. binding['userNames'] is not None and \
  1683. self.config.config_options['user']['value'] in binding['userNames']:
  1684. self.role_binding = binding
  1685. return True
  1686. return False
  1687. def exists_scc(self):
  1688. ''' return whether scc exists '''
  1689. results = self.get()
  1690. if results['returncode'] == 0:
  1691. self.security_context_constraint = SecurityContextConstraints(results['results'][0])
  1692. if self.security_context_constraint.find_user(self.config.config_options['user']['value']) != None:
  1693. return True
  1694. return False
  1695. return results
  1696. def exists(self):
  1697. '''does the object exist?'''
  1698. if self.config.config_options['resource_kind']['value'] == 'cluster-role':
  1699. return self.exists_role_binding()
  1700. elif self.config.config_options['resource_kind']['value'] == 'role':
  1701. return self.exists_role_binding()
  1702. elif self.config.config_options['resource_kind']['value'] == 'scc':
  1703. return self.exists_scc()
  1704. return False
  1705. def perform(self):
  1706. '''perform action on resource'''
  1707. cmd = ['policy',
  1708. self.config.config_options['action']['value'],
  1709. self.config.config_options['name']['value'],
  1710. self.config.config_options['user']['value']]
  1711. if self.config.config_options['role_namespace']['value'] is not None:
  1712. cmd.extend(['--role-namespace', self.config.config_options['role_namespace']['value']])
  1713. return self.openshift_cmd(cmd, oadm=True)
  1714. @staticmethod
  1715. def run_ansible(params, check_mode):
  1716. '''run the idempotent ansible code'''
  1717. state = params['state']
  1718. action = None
  1719. if state == 'present':
  1720. action = 'add-' + params['resource_kind'] + '-to-user'
  1721. else:
  1722. action = 'remove-' + params['resource_kind'] + '-from-user'
  1723. nconfig = PolicyUserConfig(params['namespace'],
  1724. params['kubeconfig'],
  1725. {'action': {'value': action, 'include': False},
  1726. 'user': {'value': params['user'], 'include': False},
  1727. 'resource_kind': {'value': params['resource_kind'], 'include': False},
  1728. 'name': {'value': params['resource_name'], 'include': False},
  1729. 'role_namespace': {'value': params['role_namespace'], 'include': False},
  1730. })
  1731. policyuser = PolicyUser(nconfig, params['debug'])
  1732. # Run the oc adm policy user related command
  1733. ########
  1734. # Delete
  1735. ########
  1736. if state == 'absent':
  1737. if not policyuser.exists():
  1738. return {'changed': False, 'state': 'absent'}
  1739. if check_mode:
  1740. return {'changed': False, 'msg': 'CHECK_MODE: would have performed a delete.'}
  1741. api_rval = policyuser.perform()
  1742. if api_rval['returncode'] != 0:
  1743. return {'msg': api_rval}
  1744. return {'changed': True, 'results' : api_rval, state:'absent'}
  1745. if state == 'present':
  1746. ########
  1747. # Create
  1748. ########
  1749. results = policyuser.exists()
  1750. if isinstance(results, dict) and 'returncode' in results and results['returncode'] != 0:
  1751. return {'msg': results}
  1752. if not results:
  1753. if check_mode:
  1754. return {'changed': False, 'msg': 'CHECK_MODE: would have performed a create.'}
  1755. api_rval = policyuser.perform()
  1756. if api_rval['returncode'] != 0:
  1757. return {'msg': api_rval}
  1758. return {'changed': True, 'results': api_rval, state: 'present'}
  1759. return {'changed': False, state: 'present'}
  1760. return {'failed': True, 'changed': False, 'results': 'Unknown state passed. %s' % state, state: 'unknown'}
  1761. # -*- -*- -*- End included fragment: class/oc_adm_policy_user.py -*- -*- -*-
  1762. # -*- -*- -*- Begin included fragment: ansible/oc_adm_policy_user.py -*- -*- -*-
  1763. def main():
  1764. '''
  1765. ansible oc adm module for user policy
  1766. '''
  1767. module = AnsibleModule(
  1768. argument_spec=dict(
  1769. state=dict(default='present', type='str',
  1770. choices=['present', 'absent']),
  1771. debug=dict(default=False, type='bool'),
  1772. resource_name=dict(required=True, type='str'),
  1773. namespace=dict(default='default', type='str'),
  1774. role_namespace=dict(default=None, type='str'),
  1775. kubeconfig=dict(default='/etc/origin/master/admin.kubeconfig', type='str'),
  1776. user=dict(required=True, type='str'),
  1777. resource_kind=dict(required=True, choices=['role', 'cluster-role', 'scc'], type='str'),
  1778. ),
  1779. supports_check_mode=True,
  1780. )
  1781. results = PolicyUser.run_ansible(module.params, module.check_mode)
  1782. if 'failed' in results:
  1783. module.fail_json(**results)
  1784. module.exit_json(**results)
  1785. if __name__ == "__main__":
  1786. main()
  1787. # -*- -*- -*- End included fragment: ansible/oc_adm_policy_user.py -*- -*- -*-