legacy_add_scc_to_user.yml 1.2 KB

1234567891011121314151617181920212223242526272829303132333435363738
  1. ---
  2. ####
  3. #
  4. # OSE 3.0.z did not have 'oadm policy add-scc-to-user'.
  5. #
  6. ####
  7. - name: tmp dir for openshift
  8. file:
  9. path: /tmp/openshift
  10. state: directory
  11. owner: root
  12. mode: 0700
  13. - name: Create service account configs
  14. template:
  15. src: serviceaccount.j2
  16. dest: "/tmp/openshift/{{ item }}-serviceaccount.yaml"
  17. with_items: '{{ openshift_serviceaccounts_names }}'
  18. - name: Get current security context constraints
  19. shell: >
  20. {{ openshift.common.client_binary }} get scc privileged -o yaml
  21. --output-version=v1 > /tmp/openshift/scc.yaml
  22. changed_when: false
  23. - name: Add security context constraint for {{ item }}
  24. lineinfile:
  25. dest: /tmp/openshift/scc.yaml
  26. line: "- system:serviceaccount:{{ openshift_serviceaccounts_namespace }}:{{ item.0 }}"
  27. insertafter: "^users:$"
  28. when: "item.1.rc == 0 and 'system:serviceaccount:{{ openshift_serviceaccounts_namespace }}:{{ item.0 }}' not in {{ (item.1.stdout | from_yaml).users }}"
  29. with_nested:
  30. - '{{ openshift_serviceaccounts_names }}'
  31. - '{{ scc_test.results }}'
  32. - name: Apply new scc rules for service accounts
  33. command: "{{ openshift.common.client_binary }} update -f /tmp/openshift/scc.yaml --api-version=v1"