openshift_cert_expiry.py 27 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705
  1. #!/usr/bin/python
  2. # -*- coding: utf-8 -*-
  3. # pylint: disable=line-too-long,invalid-name
  4. """For details on this module see DOCUMENTATION (below)"""
  5. import datetime
  6. import os
  7. import subprocess
  8. from six.moves import configparser
  9. import yaml
  10. import OpenSSL.crypto
  11. DOCUMENTATION = '''
  12. ---
  13. module: openshift_cert_expiry
  14. short_description: Check OpenShift Container Platform (OCP) and Kube certificate expirations on a cluster
  15. description:
  16. - The M(openshift_cert_expiry) module has two basic functions: to flag certificates which will expire in a set window of time from now, and to notify you about certificates which have already expired.
  17. - When the module finishes, a summary of the examination is returned. Each certificate in the summary has a C(health) key with a value of one of the following:
  18. - C(ok) - not expired, and outside of the expiration C(warning_days) window.
  19. - C(warning) - not expired, but will expire between now and the C(warning_days) window.
  20. - C(expired) - an expired certificate.
  21. - Certificate flagging follow this logic:
  22. - If the expiration date is before now then the certificate is classified as C(expired).
  23. - The certificates time to live (expiration date - now) is calculated, if that time window is less than C(warning_days) the certificate is classified as C(warning).
  24. - All other conditions are classified as C(ok).
  25. - The following keys are ALSO present in the certificate summary:
  26. - C(cert_cn) - The common name of the certificate (additional CNs present in SAN extensions are omitted)
  27. - C(days_remaining) - The number of days until the certificate expires.
  28. - C(expiry) - The date the certificate expires on.
  29. - C(path) - The full path to the certificate on the examined host.
  30. version_added: "1.0"
  31. options:
  32. config_base:
  33. description:
  34. - Base path to OCP system settings.
  35. required: false
  36. default: /etc/origin
  37. warning_days:
  38. description:
  39. - Flag certificates which will expire in C(warning_days) days from now.
  40. required: false
  41. default: 30
  42. show_all:
  43. description:
  44. - Enable this option to show analysis of ALL certificates examined by this module.
  45. - By default only certificates which have expired, or will expire within the C(warning_days) window will be reported.
  46. required: false
  47. default: false
  48. author: "Tim Bielawa (@tbielawa) <tbielawa@redhat.com>"
  49. '''
  50. EXAMPLES = '''
  51. # Default invocation, only notify about expired certificates or certificates which will expire within 30 days from now
  52. - openshift_cert_expiry:
  53. # Expand the warning window to show certificates expiring within a year from now
  54. - openshift_cert_expiry: warning_days=365
  55. # Show expired, soon to expire (now + 30 days), and all other certificates examined
  56. - openshift_cert_expiry: show_all=true
  57. '''
  58. # We only need this for one thing, we don't care if it doesn't have
  59. # that many public methods
  60. #
  61. # pylint: disable=too-few-public-methods
  62. class FakeSecHead(object):
  63. """etcd does not begin their config file with an opening [section] as
  64. required by the Python ConfigParser module. We hack around it by
  65. slipping one in ourselves prior to parsing.
  66. Source: Alex Martelli - http://stackoverflow.com/a/2819788/6490583
  67. """
  68. def __init__(self, fp):
  69. self.fp = fp
  70. self.sechead = '[ETCD]\n'
  71. def readline(self):
  72. """Make this look like a file-type object"""
  73. if self.sechead:
  74. try:
  75. return self.sechead
  76. finally:
  77. self.sechead = None
  78. else:
  79. return self.fp.readline()
  80. ######################################################################
  81. def filter_paths(path_list):
  82. """`path_list` - A list of file paths to check. Only files which exist
  83. will be returned
  84. """
  85. return [p for p in path_list if os.path.exists(os.path.realpath(p))]
  86. def load_and_handle_cert(cert_string, now, base64decode=False):
  87. """Load a certificate, split off the good parts, and return some
  88. useful data
  89. Params:
  90. - `cert_string` (string) - a certificate loaded into a string object
  91. - `now` (datetime) - a datetime object of the time to calculate the certificate 'time_remaining' against
  92. - `base64decode` (bool) - run .decode('base64') on the input?
  93. Returns:
  94. A 3-tuple of the form: (certificate_common_name, certificate_expiry_date, certificate_time_remaining)
  95. """
  96. if base64decode:
  97. _cert_string = cert_string.decode('base-64')
  98. else:
  99. _cert_string = cert_string
  100. cert_loaded = OpenSSL.crypto.load_certificate(
  101. OpenSSL.crypto.FILETYPE_PEM, _cert_string)
  102. cert_serial = cert_loaded.get_serial_number()
  103. ######################################################################
  104. # Read all possible names from the cert
  105. cert_subjects = []
  106. for name, value in cert_loaded.get_subject().get_components():
  107. cert_subjects.append('{}:{}'.format(name, value))
  108. # To read SANs from a cert we must read the subjectAltName
  109. # extension from the X509 Object. What makes this more difficult
  110. # is that pyOpenSSL does not give extensions as a list, nor does
  111. # it provide a count of all loaded extensions.
  112. #
  113. # Rather, extensions are REQUESTED by index. We must iterate over
  114. # all extensions until we find the one called 'subjectAltName'. If
  115. # we don't find that extension we'll eventually request an
  116. # extension at an index where no extension exists (IndexError is
  117. # raised). When that happens we know that the cert has no SANs so
  118. # we break out of the loop.
  119. i = 0
  120. checked_all_extensions = False
  121. while not checked_all_extensions:
  122. try:
  123. # Read the extension at index 'i'
  124. ext = cert_loaded.get_extension(i)
  125. except IndexError:
  126. # We tried to read an extension but it isn't there, that
  127. # means we ran out of extensions to check. Abort
  128. san = None
  129. checked_all_extensions = True
  130. else:
  131. # We were able to load the extension at index 'i'
  132. if ext.get_short_name() == 'subjectAltName':
  133. san = ext
  134. checked_all_extensions = True
  135. else:
  136. # Try reading the next extension
  137. i += 1
  138. if san is not None:
  139. # The X509Extension object for subjectAltName prints as a
  140. # string with the alt names separated by a comma and a
  141. # space. Split the string by ', ' and then add our new names
  142. # to the list of existing names
  143. cert_subjects.extend(str(san).split(', '))
  144. cert_subject = ', '.join(cert_subjects)
  145. ######################################################################
  146. # Grab the expiration date
  147. cert_expiry = cert_loaded.get_notAfter()
  148. cert_expiry_date = datetime.datetime.strptime(
  149. cert_expiry,
  150. # example get_notAfter() => 20180922170439Z
  151. '%Y%m%d%H%M%SZ')
  152. time_remaining = cert_expiry_date - now
  153. return (cert_subject, cert_expiry_date, time_remaining, cert_serial)
  154. def classify_cert(cert_meta, now, time_remaining, expire_window, cert_list):
  155. """Given metadata about a certificate under examination, classify it
  156. into one of three categories, 'ok', 'warning', and 'expired'.
  157. Params:
  158. - `cert_meta` dict - A dict with certificate metadata. Required fields
  159. include: 'cert_cn', 'path', 'expiry', 'days_remaining', 'health'.
  160. - `now` (datetime) - a datetime object of the time to calculate the certificate 'time_remaining' against
  161. - `time_remaining` (datetime.timedelta) - a timedelta for how long until the cert expires
  162. - `expire_window` (datetime.timedelta) - a timedelta for how long the warning window is
  163. - `cert_list` list - A list to shove the classified cert into
  164. Return:
  165. - `cert_list` - The updated list of classified certificates
  166. """
  167. expiry_str = str(cert_meta['expiry'])
  168. # Categorization
  169. if cert_meta['expiry'] < now:
  170. # This already expired, must NOTIFY
  171. cert_meta['health'] = 'expired'
  172. elif time_remaining < expire_window:
  173. # WARN about this upcoming expirations
  174. cert_meta['health'] = 'warning'
  175. else:
  176. # Not expired or about to expire
  177. cert_meta['health'] = 'ok'
  178. cert_meta['expiry'] = expiry_str
  179. cert_meta['serial_hex'] = hex(int(cert_meta['serial']))
  180. cert_list.append(cert_meta)
  181. return cert_list
  182. def tabulate_summary(certificates, kubeconfigs, etcd_certs, router_certs, registry_certs):
  183. """Calculate the summary text for when the module finishes
  184. running. This includes counts of each classification and what have
  185. you.
  186. Params:
  187. - `certificates` (list of dicts) - Processed `expire_check_result`
  188. dicts with filled in `health` keys for system certificates.
  189. - `kubeconfigs` - as above for kubeconfigs
  190. - `etcd_certs` - as above for etcd certs
  191. Return:
  192. - `summary_results` (dict) - Counts of each cert type classification
  193. and total items examined.
  194. """
  195. items = certificates + kubeconfigs + etcd_certs + router_certs + registry_certs
  196. summary_results = {
  197. 'system_certificates': len(certificates),
  198. 'kubeconfig_certificates': len(kubeconfigs),
  199. 'etcd_certificates': len(etcd_certs),
  200. 'router_certs': len(router_certs),
  201. 'registry_certs': len(registry_certs),
  202. 'total': len(items),
  203. 'ok': 0,
  204. 'warning': 0,
  205. 'expired': 0
  206. }
  207. summary_results['expired'] = len([c for c in items if c['health'] == 'expired'])
  208. summary_results['warning'] = len([c for c in items if c['health'] == 'warning'])
  209. summary_results['ok'] = len([c for c in items if c['health'] == 'ok'])
  210. return summary_results
  211. ######################################################################
  212. # This is our module MAIN function after all, so there's bound to be a
  213. # lot of code bundled up into one block
  214. #
  215. # Reason: These checks are disabled because the issue was introduced
  216. # during a period where the pylint checks weren't enabled for this file
  217. # Status: temporarily disabled pending future refactoring
  218. # pylint: disable=too-many-locals,too-many-statements,too-many-branches
  219. def main():
  220. """This module examines certificates (in various forms) which compose
  221. an OpenShift Container Platform cluster
  222. """
  223. module = AnsibleModule(
  224. argument_spec=dict(
  225. config_base=dict(
  226. required=False,
  227. default="/etc/origin",
  228. type='str'),
  229. warning_days=dict(
  230. required=False,
  231. default=30,
  232. type='int'),
  233. show_all=dict(
  234. required=False,
  235. default=False,
  236. type='bool')
  237. ),
  238. supports_check_mode=True,
  239. )
  240. # Basic scaffolding for OpenShift specific certs
  241. openshift_base_config_path = module.params['config_base']
  242. openshift_master_config_path = os.path.normpath(
  243. os.path.join(openshift_base_config_path, "master/master-config.yaml")
  244. )
  245. openshift_node_config_path = os.path.normpath(
  246. os.path.join(openshift_base_config_path, "node/node-config.yaml")
  247. )
  248. openshift_cert_check_paths = [
  249. openshift_master_config_path,
  250. openshift_node_config_path,
  251. ]
  252. # Paths for Kubeconfigs. Additional kubeconfigs are conditionally
  253. # checked later in the code
  254. master_kube_configs = ['admin', 'openshift-master',
  255. 'openshift-node', 'openshift-router',
  256. 'openshift-registry']
  257. kubeconfig_paths = []
  258. for m_kube_config in master_kube_configs:
  259. kubeconfig_paths.append(
  260. os.path.normpath(
  261. os.path.join(openshift_base_config_path, "master/%s.kubeconfig" % m_kube_config)
  262. )
  263. )
  264. # Validate some paths we have the ability to do ahead of time
  265. openshift_cert_check_paths = filter_paths(openshift_cert_check_paths)
  266. kubeconfig_paths = filter_paths(kubeconfig_paths)
  267. # etcd, where do you hide your certs? Used when parsing etcd.conf
  268. etcd_cert_params = [
  269. "ETCD_CA_FILE",
  270. "ETCD_CERT_FILE",
  271. "ETCD_PEER_CA_FILE",
  272. "ETCD_PEER_CERT_FILE",
  273. ]
  274. # Expiry checking stuff
  275. now = datetime.datetime.now()
  276. # todo, catch exception for invalid input and return a fail_json
  277. warning_days = int(module.params['warning_days'])
  278. expire_window = datetime.timedelta(days=warning_days)
  279. # Module stuff
  280. #
  281. # The results of our cert checking to return from the task call
  282. check_results = {}
  283. check_results['meta'] = {}
  284. check_results['meta']['warning_days'] = warning_days
  285. check_results['meta']['checked_at_time'] = str(now)
  286. check_results['meta']['warn_before_date'] = str(now + expire_window)
  287. check_results['meta']['show_all'] = str(module.params['show_all'])
  288. # All the analyzed certs accumulate here
  289. ocp_certs = []
  290. ######################################################################
  291. # Sure, why not? Let's enable check mode.
  292. if module.check_mode:
  293. check_results['ocp_certs'] = []
  294. module.exit_json(
  295. check_results=check_results,
  296. msg="Checked 0 total certificates. Expired/Warning/OK: 0/0/0. Warning window: %s days" % module.params['warning_days'],
  297. rc=0,
  298. changed=False
  299. )
  300. ######################################################################
  301. # Check for OpenShift Container Platform specific certs
  302. ######################################################################
  303. for os_cert in filter_paths(openshift_cert_check_paths):
  304. # Open up that config file and locate the cert and CA
  305. with open(os_cert, 'r') as fp:
  306. cert_meta = {}
  307. cfg = yaml.load(fp)
  308. # cert files are specified in parsed `fp` as relative to the path
  309. # of the original config file. 'master-config.yaml' with certFile
  310. # = 'foo.crt' implies that 'foo.crt' is in the same
  311. # directory. certFile = '../foo.crt' is in the parent directory.
  312. cfg_path = os.path.dirname(fp.name)
  313. cert_meta['certFile'] = os.path.join(cfg_path, cfg['servingInfo']['certFile'])
  314. cert_meta['clientCA'] = os.path.join(cfg_path, cfg['servingInfo']['clientCA'])
  315. ######################################################################
  316. # Load the certificate and the CA, parse their expiration dates into
  317. # datetime objects so we can manipulate them later
  318. for _, v in cert_meta.items():
  319. with open(v, 'r') as fp:
  320. cert = fp.read()
  321. (cert_subject,
  322. cert_expiry_date,
  323. time_remaining,
  324. cert_serial) = load_and_handle_cert(cert, now)
  325. expire_check_result = {
  326. 'cert_cn': cert_subject,
  327. 'path': fp.name,
  328. 'expiry': cert_expiry_date,
  329. 'days_remaining': time_remaining.days,
  330. 'health': None,
  331. 'serial': cert_serial
  332. }
  333. classify_cert(expire_check_result, now, time_remaining, expire_window, ocp_certs)
  334. ######################################################################
  335. # /Check for OpenShift Container Platform specific certs
  336. ######################################################################
  337. ######################################################################
  338. # Check service Kubeconfigs
  339. ######################################################################
  340. kubeconfigs = []
  341. # There may be additional kubeconfigs to check, but their naming
  342. # is less predictable than the ones we've already assembled.
  343. try:
  344. # Try to read the standard 'node-config.yaml' file to check if
  345. # this host is a node.
  346. with open(openshift_node_config_path, 'r') as fp:
  347. cfg = yaml.load(fp)
  348. # OK, the config file exists, therefore this is a
  349. # node. Nodes have their own kubeconfig files to
  350. # communicate with the master API. Let's read the relative
  351. # path to that file from the node config.
  352. node_masterKubeConfig = cfg['masterKubeConfig']
  353. # As before, the path to the 'masterKubeConfig' file is
  354. # relative to `fp`
  355. cfg_path = os.path.dirname(fp.name)
  356. node_kubeconfig = os.path.join(cfg_path, node_masterKubeConfig)
  357. with open(node_kubeconfig, 'r') as fp:
  358. # Read in the nodes kubeconfig file and grab the good stuff
  359. cfg = yaml.load(fp)
  360. c = cfg['users'][0]['user']['client-certificate-data']
  361. (cert_subject,
  362. cert_expiry_date,
  363. time_remaining,
  364. cert_serial) = load_and_handle_cert(c, now, base64decode=True)
  365. expire_check_result = {
  366. 'cert_cn': cert_subject,
  367. 'path': fp.name,
  368. 'expiry': cert_expiry_date,
  369. 'days_remaining': time_remaining.days,
  370. 'health': None,
  371. 'serial': cert_serial
  372. }
  373. classify_cert(expire_check_result, now, time_remaining, expire_window, kubeconfigs)
  374. except IOError:
  375. # This is not a node
  376. pass
  377. for kube in filter_paths(kubeconfig_paths):
  378. with open(kube, 'r') as fp:
  379. # TODO: Maybe consider catching exceptions here?
  380. cfg = yaml.load(fp)
  381. # Per conversation, "the kubeconfigs you care about:
  382. # admin, router, registry should all be single
  383. # value". Following that advice we only grab the data for
  384. # the user at index 0 in the 'users' list. There should
  385. # not be more than one user.
  386. c = cfg['users'][0]['user']['client-certificate-data']
  387. (cert_subject,
  388. cert_expiry_date,
  389. time_remaining,
  390. cert_serial) = load_and_handle_cert(c, now, base64decode=True)
  391. expire_check_result = {
  392. 'cert_cn': cert_subject,
  393. 'path': fp.name,
  394. 'expiry': cert_expiry_date,
  395. 'days_remaining': time_remaining.days,
  396. 'health': None,
  397. 'serial': cert_serial
  398. }
  399. classify_cert(expire_check_result, now, time_remaining, expire_window, kubeconfigs)
  400. ######################################################################
  401. # /Check service Kubeconfigs
  402. ######################################################################
  403. ######################################################################
  404. # Check etcd certs
  405. #
  406. # Two things to check: 'external' etcd, and embedded etcd.
  407. ######################################################################
  408. # FIRST: The 'external' etcd
  409. #
  410. # Some values may be duplicated, make this a set for now so we
  411. # unique them all
  412. etcd_certs_to_check = set([])
  413. etcd_certs = []
  414. etcd_cert_params.append('dne')
  415. try:
  416. with open('/etc/etcd/etcd.conf', 'r') as fp:
  417. etcd_config = configparser.ConfigParser()
  418. # Reason: This check is disabled because the issue was introduced
  419. # during a period where the pylint checks weren't enabled for this file
  420. # Status: temporarily disabled pending future refactoring
  421. # pylint: disable=deprecated-method
  422. etcd_config.readfp(FakeSecHead(fp))
  423. for param in etcd_cert_params:
  424. try:
  425. etcd_certs_to_check.add(etcd_config.get('ETCD', param))
  426. except configparser.NoOptionError:
  427. # That parameter does not exist, oh well...
  428. pass
  429. except IOError:
  430. # No etcd to see here, move along
  431. pass
  432. for etcd_cert in filter_paths(etcd_certs_to_check):
  433. with open(etcd_cert, 'r') as fp:
  434. c = fp.read()
  435. (cert_subject,
  436. cert_expiry_date,
  437. time_remaining,
  438. cert_serial) = load_and_handle_cert(c, now)
  439. expire_check_result = {
  440. 'cert_cn': cert_subject,
  441. 'path': fp.name,
  442. 'expiry': cert_expiry_date,
  443. 'days_remaining': time_remaining.days,
  444. 'health': None,
  445. 'serial': cert_serial
  446. }
  447. classify_cert(expire_check_result, now, time_remaining, expire_window, etcd_certs)
  448. ######################################################################
  449. # Now the embedded etcd
  450. ######################################################################
  451. try:
  452. with open('/etc/origin/master/master-config.yaml', 'r') as fp:
  453. cfg = yaml.load(fp)
  454. except IOError:
  455. # Not present
  456. pass
  457. else:
  458. if cfg.get('etcdConfig', {}).get('servingInfo', {}).get('certFile', None) is not None:
  459. # This is embedded
  460. etcd_crt_name = cfg['etcdConfig']['servingInfo']['certFile']
  461. else:
  462. # Not embedded
  463. etcd_crt_name = None
  464. if etcd_crt_name is not None:
  465. # etcd_crt_name is relative to the location of the
  466. # master-config.yaml file
  467. cfg_path = os.path.dirname(fp.name)
  468. etcd_cert = os.path.join(cfg_path, etcd_crt_name)
  469. with open(etcd_cert, 'r') as etcd_fp:
  470. (cert_subject,
  471. cert_expiry_date,
  472. time_remaining,
  473. cert_serial) = load_and_handle_cert(etcd_fp.read(), now)
  474. expire_check_result = {
  475. 'cert_cn': cert_subject,
  476. 'path': etcd_fp.name,
  477. 'expiry': cert_expiry_date,
  478. 'days_remaining': time_remaining.days,
  479. 'health': None,
  480. 'serial': cert_serial
  481. }
  482. classify_cert(expire_check_result, now, time_remaining, expire_window, etcd_certs)
  483. ######################################################################
  484. # /Check etcd certs
  485. ######################################################################
  486. ######################################################################
  487. # Check router/registry certs
  488. #
  489. # These are saved as secrets in etcd. That means that we can not
  490. # simply read a file to grab the data. Instead we're going to
  491. # subprocess out to the 'oc get' command. On non-masters this
  492. # command will fail, that is expected so we catch that exception.
  493. ######################################################################
  494. router_certs = []
  495. registry_certs = []
  496. ######################################################################
  497. # First the router certs
  498. try:
  499. router_secrets_raw = subprocess.Popen('oc get -n default secret router-certs -o yaml'.split(),
  500. stdout=subprocess.PIPE)
  501. router_ds = yaml.load(router_secrets_raw.communicate()[0])
  502. router_c = router_ds['data']['tls.crt']
  503. router_path = router_ds['metadata']['selfLink']
  504. except TypeError:
  505. # YAML couldn't load the result, this is not a master
  506. pass
  507. except OSError:
  508. # The OC command doesn't exist here. Move along.
  509. pass
  510. else:
  511. (cert_subject,
  512. cert_expiry_date,
  513. time_remaining,
  514. cert_serial) = load_and_handle_cert(router_c, now, base64decode=True)
  515. expire_check_result = {
  516. 'cert_cn': cert_subject,
  517. 'path': router_path,
  518. 'expiry': cert_expiry_date,
  519. 'days_remaining': time_remaining.days,
  520. 'health': None,
  521. 'serial': cert_serial
  522. }
  523. classify_cert(expire_check_result, now, time_remaining, expire_window, router_certs)
  524. ######################################################################
  525. # Now for registry
  526. try:
  527. registry_secrets_raw = subprocess.Popen('oc get -n default secret registry-certificates -o yaml'.split(),
  528. stdout=subprocess.PIPE)
  529. registry_ds = yaml.load(registry_secrets_raw.communicate()[0])
  530. registry_c = registry_ds['data']['registry.crt']
  531. registry_path = registry_ds['metadata']['selfLink']
  532. except TypeError:
  533. # YAML couldn't load the result, this is not a master
  534. pass
  535. except OSError:
  536. # The OC command doesn't exist here. Move along.
  537. pass
  538. else:
  539. (cert_subject,
  540. cert_expiry_date,
  541. time_remaining,
  542. cert_serial) = load_and_handle_cert(registry_c, now, base64decode=True)
  543. expire_check_result = {
  544. 'cert_cn': cert_subject,
  545. 'path': registry_path,
  546. 'expiry': cert_expiry_date,
  547. 'days_remaining': time_remaining.days,
  548. 'health': None,
  549. 'serial': cert_serial
  550. }
  551. classify_cert(expire_check_result, now, time_remaining, expire_window, registry_certs)
  552. ######################################################################
  553. # /Check router/registry certs
  554. ######################################################################
  555. res = tabulate_summary(ocp_certs, kubeconfigs, etcd_certs, router_certs, registry_certs)
  556. msg = "Checked {count} total certificates. Expired/Warning/OK: {exp}/{warn}/{ok}. Warning window: {window} days".format(
  557. count=res['total'],
  558. exp=res['expired'],
  559. warn=res['warning'],
  560. ok=res['ok'],
  561. window=int(module.params['warning_days']),
  562. )
  563. # By default we only return detailed information about expired or
  564. # warning certificates. If show_all is true then we will print all
  565. # the certificates examined.
  566. if not module.params['show_all']:
  567. check_results['ocp_certs'] = [crt for crt in ocp_certs if crt['health'] in ['expired', 'warning']]
  568. check_results['kubeconfigs'] = [crt for crt in kubeconfigs if crt['health'] in ['expired', 'warning']]
  569. check_results['etcd'] = [crt for crt in etcd_certs if crt['health'] in ['expired', 'warning']]
  570. check_results['registry'] = [crt for crt in registry_certs if crt['health'] in ['expired', 'warning']]
  571. check_results['router'] = [crt for crt in router_certs if crt['health'] in ['expired', 'warning']]
  572. else:
  573. check_results['ocp_certs'] = ocp_certs
  574. check_results['kubeconfigs'] = kubeconfigs
  575. check_results['etcd'] = etcd_certs
  576. check_results['registry'] = registry_certs
  577. check_results['router'] = router_certs
  578. # Sort the final results to report in order of ascending safety
  579. # time. That is to say, the certificates which will expire sooner
  580. # will be at the front of the list and certificates which will
  581. # expire later are at the end. Router and registry certs should be
  582. # limited to just 1 result, so don't bother sorting those.
  583. def cert_key(item):
  584. ''' return the days_remaining key '''
  585. return item['days_remaining']
  586. check_results['ocp_certs'] = sorted(check_results['ocp_certs'], key=cert_key)
  587. check_results['kubeconfigs'] = sorted(check_results['kubeconfigs'], key=cert_key)
  588. check_results['etcd'] = sorted(check_results['etcd'], key=cert_key)
  589. # This module will never change anything, but we might want to
  590. # change the return code parameter if there is some catastrophic
  591. # error we noticed earlier
  592. module.exit_json(
  593. check_results=check_results,
  594. summary=res,
  595. msg=msg,
  596. rc=0,
  597. changed=False
  598. )
  599. ######################################################################
  600. # It's just the way we do things in Ansible. So disable this warning
  601. #
  602. # pylint: disable=wrong-import-position,import-error
  603. from ansible.module_utils.basic import AnsibleModule # noqa: E402
  604. if __name__ == '__main__':
  605. main()