openshift_cert_expiry.py 25 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638
  1. #!/usr/bin/python
  2. # -*- coding: utf-8 -*-
  3. # pylint: disable=line-too-long,invalid-name
  4. """For details on this module see DOCUMENTATION (below)"""
  5. # router/registry cert grabbing
  6. import subprocess
  7. # etcd config file
  8. import ConfigParser
  9. # Expiration parsing
  10. import datetime
  11. # File path stuff
  12. import os
  13. # Config file parsing
  14. import yaml
  15. # Certificate loading
  16. import OpenSSL.crypto
  17. DOCUMENTATION = '''
  18. ---
  19. module: openshift_cert_expiry
  20. short_description: Check OpenShift Container Platform (OCP) and Kube certificate expirations on a cluster
  21. description:
  22. - The M(openshift_cert_expiry) module has two basic functions: to flag certificates which will expire in a set window of time from now, and to notify you about certificates which have already expired.
  23. - When the module finishes, a summary of the examination is returned. Each certificate in the summary has a C(health) key with a value of one of the following:
  24. - C(ok) - not expired, and outside of the expiration C(warning_days) window.
  25. - C(warning) - not expired, but will expire between now and the C(warning_days) window.
  26. - C(expired) - an expired certificate.
  27. - Certificate flagging follow this logic:
  28. - If the expiration date is before now then the certificate is classified as C(expired).
  29. - The certificates time to live (expiration date - now) is calculated, if that time window is less than C(warning_days) the certificate is classified as C(warning).
  30. - All other conditions are classified as C(ok).
  31. - The following keys are ALSO present in the certificate summary:
  32. - C(cert_cn) - The common name of the certificate (additional CNs present in SAN extensions are omitted)
  33. - C(days_remaining) - The number of days until the certificate expires.
  34. - C(expiry) - The date the certificate expires on.
  35. - C(path) - The full path to the certificate on the examined host.
  36. version_added: "1.0"
  37. options:
  38. config_base:
  39. description:
  40. - Base path to OCP system settings.
  41. required: false
  42. default: /etc/origin
  43. warning_days:
  44. description:
  45. - Flag certificates which will expire in C(warning_days) days from now.
  46. required: false
  47. default: 30
  48. show_all:
  49. description:
  50. - Enable this option to show analysis of ALL certificates examined by this module.
  51. - By default only certificates which have expired, or will expire within the C(warning_days) window will be reported.
  52. required: false
  53. default: false
  54. author: "Tim Bielawa (@tbielawa) <tbielawa@redhat.com>"
  55. '''
  56. EXAMPLES = '''
  57. # Default invocation, only notify about expired certificates or certificates which will expire within 30 days from now
  58. - openshift_cert_expiry:
  59. # Expand the warning window to show certificates expiring within a year from now
  60. - openshift_cert_expiry: warning_days=365
  61. # Show expired, soon to expire (now + 30 days), and all other certificates examined
  62. - openshift_cert_expiry: show_all=true
  63. '''
  64. # We only need this for one thing, we don't care if it doesn't have
  65. # that many public methods
  66. #
  67. # pylint: disable=too-few-public-methods
  68. class FakeSecHead(object):
  69. """etcd does not begin their config file with an opening [section] as
  70. required by the Python ConfigParser module. We hack around it by
  71. slipping one in ourselves prior to parsing.
  72. Source: Alex Martelli - http://stackoverflow.com/a/2819788/6490583
  73. """
  74. def __init__(self, fp):
  75. self.fp = fp
  76. self.sechead = '[ETCD]\n'
  77. def readline(self):
  78. """Make this look like a file-type object"""
  79. if self.sechead:
  80. try:
  81. return self.sechead
  82. finally:
  83. self.sechead = None
  84. else:
  85. return self.fp.readline()
  86. ######################################################################
  87. def filter_paths(path_list):
  88. """`path_list` - A list of file paths to check. Only files which exist
  89. will be returned
  90. """
  91. return [p for p in path_list if os.path.exists(os.path.realpath(p))]
  92. def load_and_handle_cert(cert_string, now, base64decode=False):
  93. """Load a certificate, split off the good parts, and return some
  94. useful data
  95. Params:
  96. - `cert_string` (string) - a certificate loaded into a string object
  97. - `now` (datetime) - a datetime object of the time to calculate the certificate 'time_remaining' against
  98. - `base64decode` (bool) - run .decode('base64') on the input?
  99. Returns:
  100. A 3-tuple of the form: (certificate_common_name, certificate_expiry_date, certificate_time_remaining)
  101. """
  102. if base64decode:
  103. _cert_string = cert_string.decode('base-64')
  104. else:
  105. _cert_string = cert_string
  106. cert_loaded = OpenSSL.crypto.load_certificate(
  107. OpenSSL.crypto.FILETYPE_PEM, _cert_string)
  108. ######################################################################
  109. # Read all possible names from the cert
  110. cert_subjects = []
  111. for name, value in cert_loaded.get_subject().get_components():
  112. cert_subjects.append('{}:{}'.format(name, value))
  113. # To read SANs from a cert we must read the subjectAltName
  114. # extension from the X509 Object. What makes this more difficult
  115. # is that pyOpenSSL does not give extensions as a list, nor does
  116. # it provide a count of all loaded extensions.
  117. #
  118. # Rather, extensions are REQUESTED by index. We must iterate over
  119. # all extensions until we find the one called 'subjectAltName'. If
  120. # we don't find that extension we'll eventually request an
  121. # extension at an index where no extension exists (IndexError is
  122. # raised). When that happens we know that the cert has no SANs so
  123. # we break out of the loop.
  124. i = 0
  125. checked_all_extensions = False
  126. while not checked_all_extensions:
  127. try:
  128. # Read the extension at index 'i'
  129. ext = cert_loaded.get_extension(i)
  130. except IndexError:
  131. # We tried to read an extension but it isn't there, that
  132. # means we ran out of extensions to check. Abort
  133. san = None
  134. checked_all_extensions = True
  135. else:
  136. # We were able to load the extension at index 'i'
  137. if ext.get_short_name() == 'subjectAltName':
  138. san = ext
  139. checked_all_extensions = True
  140. else:
  141. # Try reading the next extension
  142. i += 1
  143. if san is not None:
  144. # The X509Extension object for subjectAltName prints as a
  145. # string with the alt names separated by a comma and a
  146. # space. Split the string by ', ' and then add our new names
  147. # to the list of existing names
  148. cert_subjects.extend(str(san).split(', '))
  149. cert_subject = ', '.join(cert_subjects)
  150. ######################################################################
  151. # Grab the expiration date
  152. cert_expiry = cert_loaded.get_notAfter()
  153. cert_expiry_date = datetime.datetime.strptime(
  154. cert_expiry,
  155. # example get_notAfter() => 20180922170439Z
  156. '%Y%m%d%H%M%SZ')
  157. time_remaining = cert_expiry_date - now
  158. return (cert_subject, cert_expiry_date, time_remaining)
  159. def classify_cert(cert_meta, now, time_remaining, expire_window, cert_list):
  160. """Given metadata about a certificate under examination, classify it
  161. into one of three categories, 'ok', 'warning', and 'expired'.
  162. Params:
  163. - `cert_meta` dict - A dict with certificate metadata. Required fields
  164. include: 'cert_cn', 'path', 'expiry', 'days_remaining', 'health'.
  165. - `now` (datetime) - a datetime object of the time to calculate the certificate 'time_remaining' against
  166. - `time_remaining` (datetime.timedelta) - a timedelta for how long until the cert expires
  167. - `expire_window` (datetime.timedelta) - a timedelta for how long the warning window is
  168. - `cert_list` list - A list to shove the classified cert into
  169. Return:
  170. - `cert_list` - The updated list of classified certificates
  171. """
  172. expiry_str = str(cert_meta['expiry'])
  173. # Categorization
  174. if cert_meta['expiry'] < now:
  175. # This already expired, must NOTIFY
  176. cert_meta['health'] = 'expired'
  177. elif time_remaining < expire_window:
  178. # WARN about this upcoming expirations
  179. cert_meta['health'] = 'warning'
  180. else:
  181. # Not expired or about to expire
  182. cert_meta['health'] = 'ok'
  183. cert_meta['expiry'] = expiry_str
  184. cert_list.append(cert_meta)
  185. return cert_list
  186. def tabulate_summary(certificates, kubeconfigs, etcd_certs, router_certs, registry_certs):
  187. """Calculate the summary text for when the module finishes
  188. running. This includes counts of each classification and what have
  189. you.
  190. Params:
  191. - `certificates` (list of dicts) - Processed `expire_check_result`
  192. dicts with filled in `health` keys for system certificates.
  193. - `kubeconfigs` - as above for kubeconfigs
  194. - `etcd_certs` - as above for etcd certs
  195. Return:
  196. - `summary_results` (dict) - Counts of each cert type classification
  197. and total items examined.
  198. """
  199. items = certificates + kubeconfigs + etcd_certs + router_certs + registry_certs
  200. summary_results = {
  201. 'system_certificates': len(certificates),
  202. 'kubeconfig_certificates': len(kubeconfigs),
  203. 'etcd_certificates': len(etcd_certs),
  204. 'router_certs': len(router_certs),
  205. 'registry_certs': len(registry_certs),
  206. 'total': len(items),
  207. 'ok': 0,
  208. 'warning': 0,
  209. 'expired': 0
  210. }
  211. summary_results['expired'] = len([c for c in items if c['health'] == 'expired'])
  212. summary_results['warning'] = len([c for c in items if c['health'] == 'warning'])
  213. summary_results['ok'] = len([c for c in items if c['health'] == 'ok'])
  214. return summary_results
  215. ######################################################################
  216. # This is our module MAIN function after all, so there's bound to be a
  217. # lot of code bundled up into one block
  218. #
  219. # pylint: disable=too-many-locals,too-many-locals,too-many-statements,too-many-branches
  220. def main():
  221. """This module examines certificates (in various forms) which compose
  222. an OpenShift Container Platform cluster
  223. """
  224. module = AnsibleModule(
  225. argument_spec=dict(
  226. config_base=dict(
  227. required=False,
  228. default="/etc/origin",
  229. type='str'),
  230. warning_days=dict(
  231. required=False,
  232. default=30,
  233. type='int'),
  234. show_all=dict(
  235. required=False,
  236. default=False,
  237. type='bool')
  238. ),
  239. supports_check_mode=True,
  240. )
  241. # Basic scaffolding for OpenShift specific certs
  242. openshift_base_config_path = module.params['config_base']
  243. openshift_master_config_path = os.path.normpath(
  244. os.path.join(openshift_base_config_path, "master/master-config.yaml")
  245. )
  246. openshift_node_config_path = os.path.normpath(
  247. os.path.join(openshift_base_config_path, "node/node-config.yaml")
  248. )
  249. openshift_cert_check_paths = [
  250. openshift_master_config_path,
  251. openshift_node_config_path,
  252. ]
  253. # Paths for Kubeconfigs. Additional kubeconfigs are conditionally
  254. # checked later in the code
  255. master_kube_configs = ['admin', 'openshift-master',
  256. 'openshift-node', 'openshift-router',
  257. 'openshift-registry']
  258. kubeconfig_paths = []
  259. for m_kube_config in master_kube_configs:
  260. kubeconfig_paths.append(
  261. os.path.normpath(
  262. os.path.join(openshift_base_config_path, "master/%s.kubeconfig" % m_kube_config)
  263. )
  264. )
  265. # Validate some paths we have the ability to do ahead of time
  266. openshift_cert_check_paths = filter_paths(openshift_cert_check_paths)
  267. kubeconfig_paths = filter_paths(kubeconfig_paths)
  268. # etcd, where do you hide your certs? Used when parsing etcd.conf
  269. etcd_cert_params = [
  270. "ETCD_CA_FILE",
  271. "ETCD_CERT_FILE",
  272. "ETCD_PEER_CA_FILE",
  273. "ETCD_PEER_CERT_FILE",
  274. ]
  275. # Expiry checking stuff
  276. now = datetime.datetime.now()
  277. # todo, catch exception for invalid input and return a fail_json
  278. warning_days = int(module.params['warning_days'])
  279. expire_window = datetime.timedelta(days=warning_days)
  280. # Module stuff
  281. #
  282. # The results of our cert checking to return from the task call
  283. check_results = {}
  284. check_results['meta'] = {}
  285. check_results['meta']['warning_days'] = warning_days
  286. check_results['meta']['checked_at_time'] = str(now)
  287. check_results['meta']['warn_before_date'] = str(now + expire_window)
  288. check_results['meta']['show_all'] = str(module.params['show_all'])
  289. # All the analyzed certs accumulate here
  290. ocp_certs = []
  291. ######################################################################
  292. # Sure, why not? Let's enable check mode.
  293. if module.check_mode:
  294. check_results['ocp_certs'] = []
  295. module.exit_json(
  296. check_results=check_results,
  297. msg="Checked 0 total certificates. Expired/Warning/OK: 0/0/0. Warning window: %s days" % module.params['warning_days'],
  298. rc=0,
  299. changed=False
  300. )
  301. ######################################################################
  302. # Check for OpenShift Container Platform specific certs
  303. ######################################################################
  304. for os_cert in filter_paths(openshift_cert_check_paths):
  305. # Open up that config file and locate the cert and CA
  306. with open(os_cert, 'r') as fp:
  307. cert_meta = {}
  308. cfg = yaml.load(fp)
  309. # cert files are specified in parsed `fp` as relative to the path
  310. # of the original config file. 'master-config.yaml' with certFile
  311. # = 'foo.crt' implies that 'foo.crt' is in the same
  312. # directory. certFile = '../foo.crt' is in the parent directory.
  313. cfg_path = os.path.dirname(fp.name)
  314. cert_meta['certFile'] = os.path.join(cfg_path, cfg['servingInfo']['certFile'])
  315. cert_meta['clientCA'] = os.path.join(cfg_path, cfg['servingInfo']['clientCA'])
  316. ######################################################################
  317. # Load the certificate and the CA, parse their expiration dates into
  318. # datetime objects so we can manipulate them later
  319. for _, v in cert_meta.iteritems():
  320. with open(v, 'r') as fp:
  321. cert = fp.read()
  322. cert_subject, cert_expiry_date, time_remaining = load_and_handle_cert(cert, now)
  323. expire_check_result = {
  324. 'cert_cn': cert_subject,
  325. 'path': fp.name,
  326. 'expiry': cert_expiry_date,
  327. 'days_remaining': time_remaining.days,
  328. 'health': None,
  329. }
  330. classify_cert(expire_check_result, now, time_remaining, expire_window, ocp_certs)
  331. ######################################################################
  332. # /Check for OpenShift Container Platform specific certs
  333. ######################################################################
  334. ######################################################################
  335. # Check service Kubeconfigs
  336. ######################################################################
  337. kubeconfigs = []
  338. # There may be additional kubeconfigs to check, but their naming
  339. # is less predictable than the ones we've already assembled.
  340. try:
  341. # Try to read the standard 'node-config.yaml' file to check if
  342. # this host is a node.
  343. with open(openshift_node_config_path, 'r') as fp:
  344. cfg = yaml.load(fp)
  345. # OK, the config file exists, therefore this is a
  346. # node. Nodes have their own kubeconfig files to
  347. # communicate with the master API. Let's read the relative
  348. # path to that file from the node config.
  349. node_masterKubeConfig = cfg['masterKubeConfig']
  350. # As before, the path to the 'masterKubeConfig' file is
  351. # relative to `fp`
  352. cfg_path = os.path.dirname(fp.name)
  353. node_kubeconfig = os.path.join(cfg_path, node_masterKubeConfig)
  354. with open(node_kubeconfig, 'r') as fp:
  355. # Read in the nodes kubeconfig file and grab the good stuff
  356. cfg = yaml.load(fp)
  357. c = cfg['users'][0]['user']['client-certificate-data']
  358. (cert_subject,
  359. cert_expiry_date,
  360. time_remaining) = load_and_handle_cert(c, now, base64decode=True)
  361. expire_check_result = {
  362. 'cert_cn': cert_subject,
  363. 'path': fp.name,
  364. 'expiry': cert_expiry_date,
  365. 'days_remaining': time_remaining.days,
  366. 'health': None,
  367. }
  368. classify_cert(expire_check_result, now, time_remaining, expire_window, kubeconfigs)
  369. except IOError:
  370. # This is not a node
  371. pass
  372. for kube in filter_paths(kubeconfig_paths):
  373. with open(kube, 'r') as fp:
  374. # TODO: Maybe consider catching exceptions here?
  375. cfg = yaml.load(fp)
  376. # Per conversation, "the kubeconfigs you care about:
  377. # admin, router, registry should all be single
  378. # value". Following that advice we only grab the data for
  379. # the user at index 0 in the 'users' list. There should
  380. # not be more than one user.
  381. c = cfg['users'][0]['user']['client-certificate-data']
  382. (cert_subject,
  383. cert_expiry_date,
  384. time_remaining) = load_and_handle_cert(c, now, base64decode=True)
  385. expire_check_result = {
  386. 'cert_cn': cert_subject,
  387. 'path': fp.name,
  388. 'expiry': cert_expiry_date,
  389. 'days_remaining': time_remaining.days,
  390. 'health': None,
  391. }
  392. classify_cert(expire_check_result, now, time_remaining, expire_window, kubeconfigs)
  393. ######################################################################
  394. # /Check service Kubeconfigs
  395. ######################################################################
  396. ######################################################################
  397. # Check etcd certs
  398. ######################################################################
  399. # Some values may be duplicated, make this a set for now so we
  400. # unique them all
  401. etcd_certs_to_check = set([])
  402. etcd_certs = []
  403. etcd_cert_params.append('dne')
  404. try:
  405. with open('/etc/etcd/etcd.conf', 'r') as fp:
  406. etcd_config = ConfigParser.ConfigParser()
  407. etcd_config.readfp(FakeSecHead(fp))
  408. for param in etcd_cert_params:
  409. try:
  410. etcd_certs_to_check.add(etcd_config.get('ETCD', param))
  411. except ConfigParser.NoOptionError:
  412. # That parameter does not exist, oh well...
  413. pass
  414. except IOError:
  415. # No etcd to see here, move along
  416. pass
  417. for etcd_cert in filter_paths(etcd_certs_to_check):
  418. with open(etcd_cert, 'r') as fp:
  419. c = fp.read()
  420. (cert_subject,
  421. cert_expiry_date,
  422. time_remaining) = load_and_handle_cert(c, now)
  423. expire_check_result = {
  424. 'cert_cn': cert_subject,
  425. 'path': fp.name,
  426. 'expiry': cert_expiry_date,
  427. 'days_remaining': time_remaining.days,
  428. 'health': None,
  429. }
  430. classify_cert(expire_check_result, now, time_remaining, expire_window, etcd_certs)
  431. ######################################################################
  432. # /Check etcd certs
  433. ######################################################################
  434. ######################################################################
  435. # Check router/registry certs
  436. #
  437. # These are saved as secrets in etcd. That means that we can not
  438. # simply read a file to grab the data. Instead we're going to
  439. # subprocess out to the 'oc get' command. On non-masters this
  440. # command will fail, that is expected so we catch that exception.
  441. ######################################################################
  442. router_certs = []
  443. registry_certs = []
  444. ######################################################################
  445. # First the router certs
  446. try:
  447. router_secrets_raw = subprocess.Popen('oc get secret router-certs -o yaml'.split(),
  448. stdout=subprocess.PIPE)
  449. router_ds = yaml.load(router_secrets_raw.communicate()[0])
  450. router_c = router_ds['data']['tls.crt']
  451. router_path = router_ds['metadata']['selfLink']
  452. except TypeError:
  453. # YAML couldn't load the result, this is not a master
  454. pass
  455. except OSError:
  456. # The OC command doesn't exist here. Move along.
  457. pass
  458. else:
  459. (cert_subject,
  460. cert_expiry_date,
  461. time_remaining) = load_and_handle_cert(router_c, now, base64decode=True)
  462. expire_check_result = {
  463. 'cert_cn': cert_subject,
  464. 'path': router_path,
  465. 'expiry': cert_expiry_date,
  466. 'days_remaining': time_remaining.days,
  467. 'health': None,
  468. }
  469. classify_cert(expire_check_result, now, time_remaining, expire_window, router_certs)
  470. ######################################################################
  471. # Now for registry
  472. try:
  473. registry_secrets_raw = subprocess.Popen('oc get secret registry-certificates -o yaml'.split(),
  474. stdout=subprocess.PIPE)
  475. registry_ds = yaml.load(registry_secrets_raw.communicate()[0])
  476. registry_c = registry_ds['data']['registry.crt']
  477. registry_path = registry_ds['metadata']['selfLink']
  478. except TypeError:
  479. # YAML couldn't load the result, this is not a master
  480. pass
  481. except OSError:
  482. # The OC command doesn't exist here. Move along.
  483. pass
  484. else:
  485. (cert_subject,
  486. cert_expiry_date,
  487. time_remaining) = load_and_handle_cert(registry_c, now, base64decode=True)
  488. expire_check_result = {
  489. 'cert_cn': cert_subject,
  490. 'path': registry_path,
  491. 'expiry': cert_expiry_date,
  492. 'days_remaining': time_remaining.days,
  493. 'health': None,
  494. }
  495. classify_cert(expire_check_result, now, time_remaining, expire_window, registry_certs)
  496. ######################################################################
  497. # /Check router/registry certs
  498. ######################################################################
  499. res = tabulate_summary(ocp_certs, kubeconfigs, etcd_certs, router_certs, registry_certs)
  500. msg = "Checked {count} total certificates. Expired/Warning/OK: {exp}/{warn}/{ok}. Warning window: {window} days".format(
  501. count=res['total'],
  502. exp=res['expired'],
  503. warn=res['warning'],
  504. ok=res['ok'],
  505. window=int(module.params['warning_days']),
  506. )
  507. # By default we only return detailed information about expired or
  508. # warning certificates. If show_all is true then we will print all
  509. # the certificates examined.
  510. if not module.params['show_all']:
  511. check_results['ocp_certs'] = [crt for crt in ocp_certs if crt['health'] in ['expired', 'warning']]
  512. check_results['kubeconfigs'] = [crt for crt in kubeconfigs if crt['health'] in ['expired', 'warning']]
  513. check_results['etcd'] = [crt for crt in etcd_certs if crt['health'] in ['expired', 'warning']]
  514. check_results['registry'] = [crt for crt in registry_certs if crt['health'] in ['expired', 'warning']]
  515. check_results['router'] = [crt for crt in router_certs if crt['health'] in ['expired', 'warning']]
  516. else:
  517. check_results['ocp_certs'] = ocp_certs
  518. check_results['kubeconfigs'] = kubeconfigs
  519. check_results['etcd'] = etcd_certs
  520. check_results['registry'] = registry_certs
  521. check_results['router'] = router_certs
  522. # Sort the final results to report in order of ascending safety
  523. # time. That is to say, the certificates which will expire sooner
  524. # will be at the front of the list and certificates which will
  525. # expire later are at the end. Router and registry certs should be
  526. # limited to just 1 result, so don't bother sorting those.
  527. check_results['ocp_certs'] = sorted(check_results['ocp_certs'], cmp=lambda x, y: cmp(x['days_remaining'], y['days_remaining']))
  528. check_results['kubeconfigs'] = sorted(check_results['kubeconfigs'], cmp=lambda x, y: cmp(x['days_remaining'], y['days_remaining']))
  529. check_results['etcd'] = sorted(check_results['etcd'], cmp=lambda x, y: cmp(x['days_remaining'], y['days_remaining']))
  530. # This module will never change anything, but we might want to
  531. # change the return code parameter if there is some catastrophic
  532. # error we noticed earlier
  533. module.exit_json(
  534. check_results=check_results,
  535. summary=res,
  536. msg=msg,
  537. rc=0,
  538. changed=False
  539. )
  540. ######################################################################
  541. # It's just the way we do things in Ansible. So disable this warning
  542. #
  543. # pylint: disable=wrong-import-position,import-error
  544. from ansible.module_utils.basic import AnsibleModule # noqa: E402
  545. if __name__ == '__main__':
  546. main()