123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923192419251926192719281929193019311932193319341935193619371938193919401941194219431944194519461947194819491950195119521953195419551956195719581959196019611962196319641965196619671968196919701971197219731974197519761977197819791980198119821983198419851986198719881989199019911992199319941995199619971998199920002001200220032004200520062007200820092010201120122013201420152016201720182019202020212022202320242025202620272028202920302031203220332034203520362037203820392040204120422043204420452046204720482049205020512052205320542055205620572058205920602061206220632064206520662067206820692070207120722073207420752076207720782079208020812082208320842085208620872088208920902091209220932094209520962097209820992100210121022103210421052106210721082109211021112112211321142115211621172118211921202121212221232124212521262127212821292130213121322133213421352136213721382139214021412142214321442145214621472148214921502151215221532154215521562157215821592160216121622163216421652166216721682169217021712172217321742175217621772178217921802181218221832184218521862187218821892190219121922193219421952196219721982199220022012202220322042205220622072208220922102211221222132214221522162217221822192220222122222223222422252226222722282229223022312232223322342235223622372238223922402241224222432244224522462247 |
- #!/usr/bin/env python
- # pylint: disable=missing-docstring
- # flake8: noqa: T001
- # ___ ___ _ _ ___ ___ _ _____ ___ ___
- # / __| __| \| | __| _ \ /_\_ _| __| \
- # | (_ | _|| .` | _|| / / _ \| | | _|| |) |
- # \___|___|_|\_|___|_|_\/_/_\_\_|_|___|___/_ _____
- # | \ / _ \ | \| |/ _ \_ _| | __| \_ _|_ _|
- # | |) | (_) | | .` | (_) || | | _|| |) | | | |
- # |___/ \___/ |_|\_|\___/ |_| |___|___/___| |_|
- #
- # Copyright 2016 Red Hat, Inc. and/or its affiliates
- # and other contributors as indicated by the @author tags.
- #
- # Licensed under the Apache License, Version 2.0 (the "License");
- # you may not use this file except in compliance with the License.
- # You may obtain a copy of the License at
- #
- # http://www.apache.org/licenses/LICENSE-2.0
- #
- # Unless required by applicable law or agreed to in writing, software
- # distributed under the License is distributed on an "AS IS" BASIS,
- # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- # See the License for the specific language governing permissions and
- # limitations under the License.
- #
- # -*- -*- -*- Begin included fragment: lib/import.py -*- -*- -*-
- '''
- OpenShiftCLI class that wraps the oc commands in a subprocess
- '''
- # pylint: disable=too-many-lines
- from __future__ import print_function
- import atexit
- import copy
- import fcntl
- import json
- import time
- import os
- import re
- import shutil
- import subprocess
- import tempfile
- # pylint: disable=import-error
- try:
- import ruamel.yaml as yaml
- except ImportError:
- import yaml
- from ansible.module_utils.basic import AnsibleModule
- # -*- -*- -*- End included fragment: lib/import.py -*- -*- -*-
- # -*- -*- -*- Begin included fragment: doc/policy_user -*- -*- -*-
- DOCUMENTATION = '''
- ---
- module: oc_adm_policy_user
- short_description: Module to manage openshift policy for users
- description:
- - Manage openshift policy for users.
- options:
- kubeconfig:
- description:
- - The path for the kubeconfig file to use for authentication
- required: false
- default: /etc/origin/master/admin.kubeconfig
- aliases: []
- namespace:
- description:
- - The namespace scope
- required: false
- default: None
- aliases: []
- role_namespace:
- description:
- - The namespace where to find the role
- required: false
- default: None
- aliases: []
- debug:
- description:
- - Turn on debug output.
- required: false
- default: False
- aliases: []
- user:
- description:
- - The name of the user
- required: true
- default: None
- aliases: []
- resource_kind:
- description:
- - The kind of policy to affect
- required: true
- default: None
- choices: ["role", "cluster-role", "scc"]
- aliases: []
- resource_name:
- description:
- - The name of the policy
- required: true
- default: None
- aliases: []
- state:
- description:
- - Desired state of the policy
- required: true
- default: present
- choices: ["present", "absent"]
- aliases: []
- author:
- - "Kenny Woodson <kwoodson@redhat.com>"
- extends_documentation_fragment: []
- '''
- EXAMPLES = '''
- - name: oc adm policy remove-scc-from-user an-scc ausername
- oc_adm_policy_user:
- user: ausername
- resource_kind: scc
- resource_name: an-scc
- state: absent
- - name: oc adm policy add-cluster-role-to-user system:build-strategy-docker ausername
- oc_adm_policy_user:
- user: ausername
- resource_kind: cluster-role
- resource_name: system:build-strategy-docker
- state: present
- - name: oc adm policy add-role-to-user system:build-strategy-docker ausername --role-namespace foo
- oc_adm_policy_user:
- user: ausername
- resource_kind: cluster-role
- resource_name: system:build-strategy-docker
- state: present
- role_namespace: foo
- '''
- # -*- -*- -*- End included fragment: doc/policy_user -*- -*- -*-
- # -*- -*- -*- Begin included fragment: ../../lib_utils/src/class/yedit.py -*- -*- -*-
- class YeditException(Exception): # pragma: no cover
- ''' Exception class for Yedit '''
- pass
- # pylint: disable=too-many-public-methods,too-many-instance-attributes
- class Yedit(object): # pragma: no cover
- ''' Class to modify yaml files '''
- re_valid_key = r"(((\[-?\d+\])|([0-9a-zA-Z%s/_-]+)).?)+$"
- re_key = r"(?:\[(-?\d+)\])|([0-9a-zA-Z{}/_-]+)"
- com_sep = set(['.', '#', '|', ':'])
- # pylint: disable=too-many-arguments
- def __init__(self,
- filename=None,
- content=None,
- content_type='yaml',
- separator='.',
- backup_ext=None,
- backup=False):
- self.content = content
- self._separator = separator
- self.filename = filename
- self.__yaml_dict = content
- self.content_type = content_type
- self.backup = backup
- if backup_ext is None:
- self.backup_ext = ".{}".format(time.strftime("%Y%m%dT%H%M%S"))
- else:
- self.backup_ext = backup_ext
- self.load(content_type=self.content_type)
- if self.__yaml_dict is None:
- self.__yaml_dict = {}
- @property
- def separator(self):
- ''' getter method for separator '''
- return self._separator
- @separator.setter
- def separator(self, inc_sep):
- ''' setter method for separator '''
- self._separator = inc_sep
- @property
- def yaml_dict(self):
- ''' getter method for yaml_dict '''
- return self.__yaml_dict
- @yaml_dict.setter
- def yaml_dict(self, value):
- ''' setter method for yaml_dict '''
- self.__yaml_dict = value
- @staticmethod
- def parse_key(key, sep='.'):
- '''parse the key allowing the appropriate separator'''
- common_separators = list(Yedit.com_sep - set([sep]))
- return re.findall(Yedit.re_key.format(''.join(common_separators)), key)
- @staticmethod
- def valid_key(key, sep='.'):
- '''validate the incoming key'''
- common_separators = list(Yedit.com_sep - set([sep]))
- if not re.match(Yedit.re_valid_key.format(''.join(common_separators)), key):
- return False
- return True
- # pylint: disable=too-many-return-statements,too-many-branches
- @staticmethod
- def remove_entry(data, key, index=None, value=None, sep='.'):
- ''' remove data at location key '''
- if key == '' and isinstance(data, dict):
- if value is not None:
- data.pop(value)
- elif index is not None:
- raise YeditException("remove_entry for a dictionary does not have an index {}".format(index))
- else:
- data.clear()
- return True
- elif key == '' and isinstance(data, list):
- ind = None
- if value is not None:
- try:
- ind = data.index(value)
- except ValueError:
- return False
- elif index is not None:
- ind = index
- else:
- del data[:]
- if ind is not None:
- data.pop(ind)
- return True
- if not (key and Yedit.valid_key(key, sep)) and \
- isinstance(data, (list, dict)):
- return None
- key_indexes = Yedit.parse_key(key, sep)
- for arr_ind, dict_key in key_indexes[:-1]:
- if dict_key and isinstance(data, dict):
- data = data.get(dict_key)
- elif (arr_ind and isinstance(data, list) and
- int(arr_ind) <= len(data) - 1):
- data = data[int(arr_ind)]
- else:
- return None
- # process last index for remove
- # expected list entry
- if key_indexes[-1][0]:
- if isinstance(data, list) and int(key_indexes[-1][0]) <= len(data) - 1: # noqa: E501
- del data[int(key_indexes[-1][0])]
- return True
- # expected dict entry
- elif key_indexes[-1][1]:
- if isinstance(data, dict):
- del data[key_indexes[-1][1]]
- return True
- @staticmethod
- def add_entry(data, key, item=None, sep='.'):
- ''' Get an item from a dictionary with key notation a.b.c
- d = {'a': {'b': 'c'}}}
- key = a#b
- return c
- '''
- if key == '':
- pass
- elif (not (key and Yedit.valid_key(key, sep)) and
- isinstance(data, (list, dict))):
- return None
- key_indexes = Yedit.parse_key(key, sep)
- for arr_ind, dict_key in key_indexes[:-1]:
- if dict_key:
- if isinstance(data, dict) and dict_key in data and data[dict_key]: # noqa: E501
- data = data[dict_key]
- continue
- elif data and not isinstance(data, dict):
- raise YeditException("Unexpected item type found while going through key " +
- "path: {} (at key: {})".format(key, dict_key))
- data[dict_key] = {}
- data = data[dict_key]
- elif (arr_ind and isinstance(data, list) and
- int(arr_ind) <= len(data) - 1):
- data = data[int(arr_ind)]
- else:
- raise YeditException("Unexpected item type found while going through key path: {}".format(key))
- if key == '':
- data = item
- # process last index for add
- # expected list entry
- elif key_indexes[-1][0] and isinstance(data, list) and int(key_indexes[-1][0]) <= len(data) - 1: # noqa: E501
- data[int(key_indexes[-1][0])] = item
- # expected dict entry
- elif key_indexes[-1][1] and isinstance(data, dict):
- data[key_indexes[-1][1]] = item
- # didn't add/update to an existing list, nor add/update key to a dict
- # so we must have been provided some syntax like a.b.c[<int>] = "data" for a
- # non-existent array
- else:
- raise YeditException("Error adding to object at path: {}".format(key))
- return data
- @staticmethod
- def get_entry(data, key, sep='.'):
- ''' Get an item from a dictionary with key notation a.b.c
- d = {'a': {'b': 'c'}}}
- key = a.b
- return c
- '''
- if key == '':
- pass
- elif (not (key and Yedit.valid_key(key, sep)) and
- isinstance(data, (list, dict))):
- return None
- key_indexes = Yedit.parse_key(key, sep)
- for arr_ind, dict_key in key_indexes:
- if dict_key and isinstance(data, dict):
- data = data.get(dict_key)
- elif (arr_ind and isinstance(data, list) and
- int(arr_ind) <= len(data) - 1):
- data = data[int(arr_ind)]
- else:
- return None
- return data
- @staticmethod
- def _write(filename, contents):
- ''' Actually write the file contents to disk. This helps with mocking. '''
- tmp_filename = filename + '.yedit'
- with open(tmp_filename, 'w') as yfd:
- fcntl.flock(yfd, fcntl.LOCK_EX | fcntl.LOCK_NB)
- yfd.write(contents)
- fcntl.flock(yfd, fcntl.LOCK_UN)
- os.rename(tmp_filename, filename)
- def write(self):
- ''' write to file '''
- if not self.filename:
- raise YeditException('Please specify a filename.')
- if self.backup and self.file_exists():
- shutil.copy(self.filename, '{}{}'.format(self.filename, self.backup_ext))
- # Try to set format attributes if supported
- try:
- self.yaml_dict.fa.set_block_style()
- except AttributeError:
- pass
- # Try to use RoundTripDumper if supported.
- if self.content_type == 'yaml':
- try:
- Yedit._write(self.filename, yaml.dump(self.yaml_dict, Dumper=yaml.RoundTripDumper))
- except AttributeError:
- Yedit._write(self.filename, yaml.safe_dump(self.yaml_dict, default_flow_style=False))
- elif self.content_type == 'json':
- Yedit._write(self.filename, json.dumps(self.yaml_dict, indent=4, sort_keys=True))
- else:
- raise YeditException('Unsupported content_type: {}.'.format(self.content_type) +
- 'Please specify a content_type of yaml or json.')
- return (True, self.yaml_dict)
- def read(self):
- ''' read from file '''
- # check if it exists
- if self.filename is None or not self.file_exists():
- return None
- contents = None
- with open(self.filename) as yfd:
- contents = yfd.read()
- return contents
- def file_exists(self):
- ''' return whether file exists '''
- if os.path.exists(self.filename):
- return True
- return False
- def load(self, content_type='yaml'):
- ''' return yaml file '''
- contents = self.read()
- if not contents and not self.content:
- return None
- if self.content:
- if isinstance(self.content, dict):
- self.yaml_dict = self.content
- return self.yaml_dict
- elif isinstance(self.content, str):
- contents = self.content
- # check if it is yaml
- try:
- if content_type == 'yaml' and contents:
- # Try to set format attributes if supported
- try:
- self.yaml_dict.fa.set_block_style()
- except AttributeError:
- pass
- # Try to use RoundTripLoader if supported.
- try:
- self.yaml_dict = yaml.load(contents, yaml.RoundTripLoader)
- except AttributeError:
- self.yaml_dict = yaml.safe_load(contents)
- # Try to set format attributes if supported
- try:
- self.yaml_dict.fa.set_block_style()
- except AttributeError:
- pass
- elif content_type == 'json' and contents:
- self.yaml_dict = json.loads(contents)
- except yaml.YAMLError as err:
- # Error loading yaml or json
- raise YeditException('Problem with loading yaml file. {}'.format(err))
- return self.yaml_dict
- def get(self, key):
- ''' get a specified key'''
- try:
- entry = Yedit.get_entry(self.yaml_dict, key, self.separator)
- except KeyError:
- entry = None
- return entry
- def pop(self, path, key_or_item):
- ''' remove a key, value pair from a dict or an item for a list'''
- try:
- entry = Yedit.get_entry(self.yaml_dict, path, self.separator)
- except KeyError:
- entry = None
- if entry is None:
- return (False, self.yaml_dict)
- if isinstance(entry, dict):
- # AUDIT:maybe-no-member makes sense due to fuzzy types
- # pylint: disable=maybe-no-member
- if key_or_item in entry:
- entry.pop(key_or_item)
- return (True, self.yaml_dict)
- return (False, self.yaml_dict)
- elif isinstance(entry, list):
- # AUDIT:maybe-no-member makes sense due to fuzzy types
- # pylint: disable=maybe-no-member
- ind = None
- try:
- ind = entry.index(key_or_item)
- except ValueError:
- return (False, self.yaml_dict)
- entry.pop(ind)
- return (True, self.yaml_dict)
- return (False, self.yaml_dict)
- def delete(self, path, index=None, value=None):
- ''' remove path from a dict'''
- try:
- entry = Yedit.get_entry(self.yaml_dict, path, self.separator)
- except KeyError:
- entry = None
- if entry is None:
- return (False, self.yaml_dict)
- result = Yedit.remove_entry(self.yaml_dict, path, index, value, self.separator)
- if not result:
- return (False, self.yaml_dict)
- return (True, self.yaml_dict)
- def exists(self, path, value):
- ''' check if value exists at path'''
- try:
- entry = Yedit.get_entry(self.yaml_dict, path, self.separator)
- except KeyError:
- entry = None
- if isinstance(entry, list):
- if value in entry:
- return True
- return False
- elif isinstance(entry, dict):
- if isinstance(value, dict):
- rval = False
- for key, val in value.items():
- if entry[key] != val:
- rval = False
- break
- else:
- rval = True
- return rval
- return value in entry
- return entry == value
- def append(self, path, value):
- '''append value to a list'''
- try:
- entry = Yedit.get_entry(self.yaml_dict, path, self.separator)
- except KeyError:
- entry = None
- if entry is None:
- self.put(path, [])
- entry = Yedit.get_entry(self.yaml_dict, path, self.separator)
- if not isinstance(entry, list):
- return (False, self.yaml_dict)
- # AUDIT:maybe-no-member makes sense due to loading data from
- # a serialized format.
- # pylint: disable=maybe-no-member
- entry.append(value)
- return (True, self.yaml_dict)
- # pylint: disable=too-many-arguments
- def update(self, path, value, index=None, curr_value=None):
- ''' put path, value into a dict '''
- try:
- entry = Yedit.get_entry(self.yaml_dict, path, self.separator)
- except KeyError:
- entry = None
- if isinstance(entry, dict):
- # AUDIT:maybe-no-member makes sense due to fuzzy types
- # pylint: disable=maybe-no-member
- if not isinstance(value, dict):
- raise YeditException('Cannot replace key, value entry in dict with non-dict type. ' +
- 'value=[{}] type=[{}]'.format(value, type(value)))
- entry.update(value)
- return (True, self.yaml_dict)
- elif isinstance(entry, list):
- # AUDIT:maybe-no-member makes sense due to fuzzy types
- # pylint: disable=maybe-no-member
- ind = None
- if curr_value:
- try:
- ind = entry.index(curr_value)
- except ValueError:
- return (False, self.yaml_dict)
- elif index is not None:
- ind = index
- if ind is not None and entry[ind] != value:
- entry[ind] = value
- return (True, self.yaml_dict)
- # see if it exists in the list
- try:
- ind = entry.index(value)
- except ValueError:
- # doesn't exist, append it
- entry.append(value)
- return (True, self.yaml_dict)
- # already exists, return
- if ind is not None:
- return (False, self.yaml_dict)
- return (False, self.yaml_dict)
- def put(self, path, value):
- ''' put path, value into a dict '''
- try:
- entry = Yedit.get_entry(self.yaml_dict, path, self.separator)
- except KeyError:
- entry = None
- if entry == value:
- return (False, self.yaml_dict)
- # deepcopy didn't work
- # Try to use ruamel.yaml and fallback to pyyaml
- try:
- tmp_copy = yaml.load(yaml.round_trip_dump(self.yaml_dict,
- default_flow_style=False),
- yaml.RoundTripLoader)
- except AttributeError:
- tmp_copy = copy.deepcopy(self.yaml_dict)
- # set the format attributes if available
- try:
- tmp_copy.fa.set_block_style()
- except AttributeError:
- pass
- result = Yedit.add_entry(tmp_copy, path, value, self.separator)
- if result is None:
- return (False, self.yaml_dict)
- # When path equals "" it is a special case.
- # "" refers to the root of the document
- # Only update the root path (entire document) when its a list or dict
- if path == '':
- if isinstance(result, list) or isinstance(result, dict):
- self.yaml_dict = result
- return (True, self.yaml_dict)
- return (False, self.yaml_dict)
- self.yaml_dict = tmp_copy
- return (True, self.yaml_dict)
- def create(self, path, value):
- ''' create a yaml file '''
- if not self.file_exists():
- # deepcopy didn't work
- # Try to use ruamel.yaml and fallback to pyyaml
- try:
- tmp_copy = yaml.load(yaml.round_trip_dump(self.yaml_dict,
- default_flow_style=False),
- yaml.RoundTripLoader)
- except AttributeError:
- tmp_copy = copy.deepcopy(self.yaml_dict)
- # set the format attributes if available
- try:
- tmp_copy.fa.set_block_style()
- except AttributeError:
- pass
- result = Yedit.add_entry(tmp_copy, path, value, self.separator)
- if result is not None:
- self.yaml_dict = tmp_copy
- return (True, self.yaml_dict)
- return (False, self.yaml_dict)
- @staticmethod
- def get_curr_value(invalue, val_type):
- '''return the current value'''
- if invalue is None:
- return None
- curr_value = invalue
- if val_type == 'yaml':
- curr_value = yaml.safe_load(str(invalue))
- elif val_type == 'json':
- curr_value = json.loads(invalue)
- return curr_value
- @staticmethod
- def parse_value(inc_value, vtype=''):
- '''determine value type passed'''
- true_bools = ['y', 'Y', 'yes', 'Yes', 'YES', 'true', 'True', 'TRUE',
- 'on', 'On', 'ON', ]
- false_bools = ['n', 'N', 'no', 'No', 'NO', 'false', 'False', 'FALSE',
- 'off', 'Off', 'OFF']
- # It came in as a string but you didn't specify value_type as string
- # we will convert to bool if it matches any of the above cases
- if isinstance(inc_value, str) and 'bool' in vtype:
- if inc_value not in true_bools and inc_value not in false_bools:
- raise YeditException('Not a boolean type. str=[{}] vtype=[{}]'.format(inc_value, vtype))
- elif isinstance(inc_value, bool) and 'str' in vtype:
- inc_value = str(inc_value)
- # There is a special case where '' will turn into None after yaml loading it so skip
- if isinstance(inc_value, str) and inc_value == '':
- pass
- # If vtype is not str then go ahead and attempt to yaml load it.
- elif isinstance(inc_value, str) and 'str' not in vtype:
- try:
- inc_value = yaml.safe_load(inc_value)
- except Exception:
- raise YeditException('Could not determine type of incoming value. ' +
- 'value=[{}] vtype=[{}]'.format(type(inc_value), vtype))
- return inc_value
- @staticmethod
- def process_edits(edits, yamlfile):
- '''run through a list of edits and process them one-by-one'''
- results = []
- for edit in edits:
- value = Yedit.parse_value(edit['value'], edit.get('value_type', ''))
- if edit.get('action') == 'update':
- # pylint: disable=line-too-long
- curr_value = Yedit.get_curr_value(
- Yedit.parse_value(edit.get('curr_value')),
- edit.get('curr_value_format'))
- rval = yamlfile.update(edit['key'],
- value,
- edit.get('index'),
- curr_value)
- elif edit.get('action') == 'append':
- rval = yamlfile.append(edit['key'], value)
- else:
- rval = yamlfile.put(edit['key'], value)
- if rval[0]:
- results.append({'key': edit['key'], 'edit': rval[1]})
- return {'changed': len(results) > 0, 'results': results}
- # pylint: disable=too-many-return-statements,too-many-branches
- @staticmethod
- def run_ansible(params):
- '''perform the idempotent crud operations'''
- yamlfile = Yedit(filename=params['src'],
- backup=params['backup'],
- content_type=params['content_type'],
- backup_ext=params['backup_ext'],
- separator=params['separator'])
- state = params['state']
- if params['src']:
- rval = yamlfile.load()
- if yamlfile.yaml_dict is None and state != 'present':
- return {'failed': True,
- 'msg': 'Error opening file [{}]. Verify that the '.format(params['src']) +
- 'file exists, that it is has correct permissions, and is valid yaml.'}
- if state == 'list':
- if params['content']:
- content = Yedit.parse_value(params['content'], params['content_type'])
- yamlfile.yaml_dict = content
- if params['key']:
- rval = yamlfile.get(params['key'])
- return {'changed': False, 'result': rval, 'state': state}
- elif state == 'absent':
- if params['content']:
- content = Yedit.parse_value(params['content'], params['content_type'])
- yamlfile.yaml_dict = content
- if params['update']:
- rval = yamlfile.pop(params['key'], params['value'])
- else:
- rval = yamlfile.delete(params['key'], params['index'], params['value'])
- if rval[0] and params['src']:
- yamlfile.write()
- return {'changed': rval[0], 'result': rval[1], 'state': state}
- elif state == 'present':
- # check if content is different than what is in the file
- if params['content']:
- content = Yedit.parse_value(params['content'], params['content_type'])
- # We had no edits to make and the contents are the same
- if yamlfile.yaml_dict == content and \
- params['value'] is None:
- return {'changed': False, 'result': yamlfile.yaml_dict, 'state': state}
- yamlfile.yaml_dict = content
- # If we were passed a key, value then
- # we enapsulate it in a list and process it
- # Key, Value passed to the module : Converted to Edits list #
- edits = []
- _edit = {}
- if params['value'] is not None:
- _edit['value'] = params['value']
- _edit['value_type'] = params['value_type']
- _edit['key'] = params['key']
- if params['update']:
- _edit['action'] = 'update'
- _edit['curr_value'] = params['curr_value']
- _edit['curr_value_format'] = params['curr_value_format']
- _edit['index'] = params['index']
- elif params['append']:
- _edit['action'] = 'append'
- edits.append(_edit)
- elif params['edits'] is not None:
- edits = params['edits']
- if edits:
- results = Yedit.process_edits(edits, yamlfile)
- # if there were changes and a src provided to us we need to write
- if results['changed'] and params['src']:
- yamlfile.write()
- return {'changed': results['changed'], 'result': results['results'], 'state': state}
- # no edits to make
- if params['src']:
- # pylint: disable=redefined-variable-type
- rval = yamlfile.write()
- return {'changed': rval[0],
- 'result': rval[1],
- 'state': state}
- # We were passed content but no src, key or value, or edits. Return contents in memory
- return {'changed': False, 'result': yamlfile.yaml_dict, 'state': state}
- return {'failed': True, 'msg': 'Unkown state passed'}
- # -*- -*- -*- End included fragment: ../../lib_utils/src/class/yedit.py -*- -*- -*-
- # -*- -*- -*- Begin included fragment: lib/base.py -*- -*- -*-
- # pylint: disable=too-many-lines
- # noqa: E301,E302,E303,T001
- class OpenShiftCLIError(Exception):
- '''Exception class for openshiftcli'''
- pass
- ADDITIONAL_PATH_LOOKUPS = ['/usr/local/bin', os.path.expanduser('~/bin')]
- def locate_oc_binary():
- ''' Find and return oc binary file '''
- # https://github.com/openshift/openshift-ansible/issues/3410
- # oc can be in /usr/local/bin in some cases, but that may not
- # be in $PATH due to ansible/sudo
- paths = os.environ.get("PATH", os.defpath).split(os.pathsep) + ADDITIONAL_PATH_LOOKUPS
- oc_binary = 'oc'
- # Use shutil.which if it is available, otherwise fallback to a naive path search
- try:
- which_result = shutil.which(oc_binary, path=os.pathsep.join(paths))
- if which_result is not None:
- oc_binary = which_result
- except AttributeError:
- for path in paths:
- if os.path.exists(os.path.join(path, oc_binary)):
- oc_binary = os.path.join(path, oc_binary)
- break
- return oc_binary
- # pylint: disable=too-few-public-methods
- class OpenShiftCLI(object):
- ''' Class to wrap the command line tools '''
- def __init__(self,
- namespace,
- kubeconfig='/etc/origin/master/admin.kubeconfig',
- verbose=False,
- all_namespaces=False):
- ''' Constructor for OpenshiftCLI '''
- self.namespace = namespace
- self.verbose = verbose
- self.kubeconfig = Utils.create_tmpfile_copy(kubeconfig)
- self.all_namespaces = all_namespaces
- self.oc_binary = locate_oc_binary()
- # Pylint allows only 5 arguments to be passed.
- # pylint: disable=too-many-arguments
- def _replace_content(self, resource, rname, content, edits=None, force=False, sep='.'):
- ''' replace the current object with the content '''
- res = self._get(resource, rname)
- if not res['results']:
- return res
- fname = Utils.create_tmpfile(rname + '-')
- yed = Yedit(fname, res['results'][0], separator=sep)
- updated = False
- if content is not None:
- changes = []
- for key, value in content.items():
- changes.append(yed.put(key, value))
- if any([change[0] for change in changes]):
- updated = True
- elif edits is not None:
- results = Yedit.process_edits(edits, yed)
- if results['changed']:
- updated = True
- if updated:
- yed.write()
- atexit.register(Utils.cleanup, [fname])
- return self._replace(fname, force)
- return {'returncode': 0, 'updated': False}
- def _replace(self, fname, force=False):
- '''replace the current object with oc replace'''
- # We are removing the 'resourceVersion' to handle
- # a race condition when modifying oc objects
- yed = Yedit(fname)
- results = yed.delete('metadata.resourceVersion')
- if results[0]:
- yed.write()
- cmd = ['replace', '-f', fname]
- if force:
- cmd.append('--force')
- return self.openshift_cmd(cmd)
- def _create_from_content(self, rname, content):
- '''create a temporary file and then call oc create on it'''
- fname = Utils.create_tmpfile(rname + '-')
- yed = Yedit(fname, content=content)
- yed.write()
- atexit.register(Utils.cleanup, [fname])
- return self._create(fname)
- def _create(self, fname):
- '''call oc create on a filename'''
- return self.openshift_cmd(['create', '-f', fname])
- def _delete(self, resource, name=None, selector=None):
- '''call oc delete on a resource'''
- cmd = ['delete', resource]
- if selector is not None:
- cmd.append('--selector={}'.format(selector))
- elif name is not None:
- cmd.append(name)
- else:
- raise OpenShiftCLIError('Either name or selector is required when calling delete.')
- return self.openshift_cmd(cmd)
- def _process(self, template_name, create=False, params=None, template_data=None): # noqa: E501
- '''process a template
- template_name: the name of the template to process
- create: whether to send to oc create after processing
- params: the parameters for the template
- template_data: the incoming template's data; instead of a file
- '''
- cmd = ['process']
- if template_data:
- cmd.extend(['-f', '-'])
- else:
- cmd.append(template_name)
- if params:
- param_str = ["{}={}".format(key, str(value).replace("'", r'"')) for key, value in params.items()]
- cmd.append('-p')
- cmd.extend(param_str)
- results = self.openshift_cmd(cmd, output=True, input_data=template_data)
- if results['returncode'] != 0 or not create:
- return results
- fname = Utils.create_tmpfile(template_name + '-')
- yed = Yedit(fname, results['results'])
- yed.write()
- atexit.register(Utils.cleanup, [fname])
- return self.openshift_cmd(['create', '-f', fname])
- def _get(self, resource, name=None, selector=None, field_selector=None):
- '''return a resource by name '''
- cmd = ['get', resource]
- if selector is not None:
- cmd.append('--selector={}'.format(selector))
- if field_selector is not None:
- cmd.append('--field-selector={}'.format(field_selector))
- # Name cannot be used with selector or field_selector.
- if selector is None and field_selector is None and name is not None:
- cmd.append(name)
- cmd.extend(['-o', 'json'])
- rval = self.openshift_cmd(cmd, output=True)
- # Ensure results are retuned in an array
- if 'items' in rval:
- rval['results'] = rval['items']
- elif not isinstance(rval['results'], list):
- rval['results'] = [rval['results']]
- return rval
- def _schedulable(self, node=None, selector=None, schedulable=True):
- ''' perform oadm manage-node scheduable '''
- cmd = ['manage-node']
- if node:
- cmd.extend(node)
- else:
- cmd.append('--selector={}'.format(selector))
- cmd.append('--schedulable={}'.format(schedulable))
- return self.openshift_cmd(cmd, oadm=True, output=True, output_type='raw') # noqa: E501
- def _list_pods(self, node=None, selector=None, pod_selector=None):
- ''' perform oadm list pods
- node: the node in which to list pods
- selector: the label selector filter if provided
- pod_selector: the pod selector filter if provided
- '''
- cmd = ['manage-node']
- if node:
- cmd.extend(node)
- else:
- cmd.append('--selector={}'.format(selector))
- if pod_selector:
- cmd.append('--pod-selector={}'.format(pod_selector))
- cmd.extend(['--list-pods', '-o', 'json'])
- return self.openshift_cmd(cmd, oadm=True, output=True, output_type='raw')
- # pylint: disable=too-many-arguments
- def _evacuate(self, node=None, selector=None, pod_selector=None, dry_run=False, grace_period=None, force=False):
- ''' perform oadm manage-node evacuate '''
- cmd = ['manage-node']
- if node:
- cmd.extend(node)
- else:
- cmd.append('--selector={}'.format(selector))
- if dry_run:
- cmd.append('--dry-run')
- if pod_selector:
- cmd.append('--pod-selector={}'.format(pod_selector))
- if grace_period:
- cmd.append('--grace-period={}'.format(int(grace_period)))
- if force:
- cmd.append('--force')
- cmd.append('--evacuate')
- return self.openshift_cmd(cmd, oadm=True, output=True, output_type='raw')
- def _version(self):
- ''' return the openshift version'''
- return self.openshift_cmd(['version'], output=True, output_type='raw')
- def _import_image(self, url=None, name=None, tag=None):
- ''' perform image import '''
- cmd = ['import-image']
- image = '{0}'.format(name)
- if tag:
- image += ':{0}'.format(tag)
- cmd.append(image)
- if url:
- cmd.append('--from={0}/{1}'.format(url, image))
- cmd.append('-n{0}'.format(self.namespace))
- cmd.append('--confirm')
- return self.openshift_cmd(cmd)
- def _run(self, cmds, input_data):
- ''' Actually executes the command. This makes mocking easier. '''
- curr_env = os.environ.copy()
- curr_env.update({'KUBECONFIG': self.kubeconfig})
- proc = subprocess.Popen(cmds,
- stdin=subprocess.PIPE,
- stdout=subprocess.PIPE,
- stderr=subprocess.PIPE,
- env=curr_env)
- stdout, stderr = proc.communicate(input_data)
- return proc.returncode, stdout.decode('utf-8'), stderr.decode('utf-8')
- # pylint: disable=too-many-arguments,too-many-branches
- def openshift_cmd(self, cmd, oadm=False, output=False, output_type='json', input_data=None):
- '''Base command for oc '''
- cmds = [self.oc_binary]
- if oadm:
- cmds.append('adm')
- cmds.extend(cmd)
- if self.all_namespaces:
- cmds.extend(['--all-namespaces'])
- elif self.namespace is not None and self.namespace.lower() not in ['none', 'emtpy']: # E501
- cmds.extend(['-n', self.namespace])
- if self.verbose:
- print(' '.join(cmds))
- try:
- returncode, stdout, stderr = self._run(cmds, input_data)
- except OSError as ex:
- returncode, stdout, stderr = 1, '', 'Failed to execute {}: {}'.format(subprocess.list2cmdline(cmds), ex)
- rval = {"returncode": returncode,
- "cmd": ' '.join(cmds)}
- if output_type == 'json':
- rval['results'] = {}
- if output and stdout:
- try:
- rval['results'] = json.loads(stdout)
- except ValueError as verr:
- if "No JSON object could be decoded" in verr.args:
- rval['err'] = verr.args
- elif output_type == 'raw':
- rval['results'] = stdout if output else ''
- if self.verbose:
- print("STDOUT: {0}".format(stdout))
- print("STDERR: {0}".format(stderr))
- if 'err' in rval or returncode != 0:
- rval.update({"stderr": stderr,
- "stdout": stdout})
- return rval
- class Utils(object): # pragma: no cover
- ''' utilities for openshiftcli modules '''
- @staticmethod
- def _write(filename, contents):
- ''' Actually write the file contents to disk. This helps with mocking. '''
- with open(filename, 'w') as sfd:
- sfd.write(str(contents))
- @staticmethod
- def create_tmp_file_from_contents(rname, data, ftype='yaml'):
- ''' create a file in tmp with name and contents'''
- tmp = Utils.create_tmpfile(prefix=rname)
- if ftype == 'yaml':
- # AUDIT:no-member makes sense here due to ruamel.YAML/PyYAML usage
- # pylint: disable=no-member
- if hasattr(yaml, 'RoundTripDumper'):
- Utils._write(tmp, yaml.dump(data, Dumper=yaml.RoundTripDumper))
- else:
- Utils._write(tmp, yaml.safe_dump(data, default_flow_style=False))
- elif ftype == 'json':
- Utils._write(tmp, json.dumps(data))
- else:
- Utils._write(tmp, data)
- # Register cleanup when module is done
- atexit.register(Utils.cleanup, [tmp])
- return tmp
- @staticmethod
- def create_tmpfile_copy(inc_file):
- '''create a temporary copy of a file'''
- tmpfile = Utils.create_tmpfile('lib_openshift-')
- Utils._write(tmpfile, open(inc_file).read())
- # Cleanup the tmpfile
- atexit.register(Utils.cleanup, [tmpfile])
- return tmpfile
- @staticmethod
- def create_tmpfile(prefix='tmp'):
- ''' Generates and returns a temporary file name '''
- with tempfile.NamedTemporaryFile(prefix=prefix, delete=False) as tmp:
- return tmp.name
- @staticmethod
- def create_tmp_files_from_contents(content, content_type=None):
- '''Turn an array of dict: filename, content into a files array'''
- if not isinstance(content, list):
- content = [content]
- files = []
- for item in content:
- path = Utils.create_tmp_file_from_contents(item['path'] + '-',
- item['data'],
- ftype=content_type)
- files.append({'name': os.path.basename(item['path']),
- 'path': path})
- return files
- @staticmethod
- def cleanup(files):
- '''Clean up on exit '''
- for sfile in files:
- if os.path.exists(sfile):
- if os.path.isdir(sfile):
- shutil.rmtree(sfile)
- elif os.path.isfile(sfile):
- os.remove(sfile)
- @staticmethod
- def exists(results, _name):
- ''' Check to see if the results include the name '''
- if not results:
- return False
- if Utils.find_result(results, _name):
- return True
- return False
- @staticmethod
- def find_result(results, _name):
- ''' Find the specified result by name'''
- rval = None
- for result in results:
- if 'metadata' in result and result['metadata']['name'] == _name:
- rval = result
- break
- return rval
- @staticmethod
- def get_resource_file(sfile, sfile_type='yaml'):
- ''' return the service file '''
- contents = None
- with open(sfile) as sfd:
- contents = sfd.read()
- if sfile_type == 'yaml':
- # AUDIT:no-member makes sense here due to ruamel.YAML/PyYAML usage
- # pylint: disable=no-member
- if hasattr(yaml, 'RoundTripLoader'):
- contents = yaml.load(contents, yaml.RoundTripLoader)
- else:
- contents = yaml.safe_load(contents)
- elif sfile_type == 'json':
- contents = json.loads(contents)
- return contents
- @staticmethod
- def filter_versions(stdout):
- ''' filter the oc version output '''
- version_dict = {}
- version_search = ['oc', 'openshift', 'kubernetes']
- for line in stdout.strip().split('\n'):
- for term in version_search:
- if not line:
- continue
- if line.startswith(term):
- version_dict[term] = line.split()[-1]
- # horrible hack to get openshift version in Openshift 3.2
- # By default "oc version in 3.2 does not return an "openshift" version
- if "openshift" not in version_dict:
- version_dict["openshift"] = version_dict["oc"]
- return version_dict
- @staticmethod
- def add_custom_versions(versions):
- ''' create custom versions strings '''
- versions_dict = {}
- for tech, version in versions.items():
- # clean up "-" from version
- if "-" in version:
- version = version.split("-")[0]
- if version.startswith('v'):
- version = version[1:] # Remove the 'v' prefix
- versions_dict[tech + '_numeric'] = version.split('+')[0]
- # "3.3.0.33" is what we have, we want "3.3"
- versions_dict[tech + '_short'] = "{}.{}".format(*version.split('.'))
- return versions_dict
- @staticmethod
- def openshift_installed():
- ''' check if openshift is installed '''
- import rpm
- transaction_set = rpm.TransactionSet()
- rpmquery = transaction_set.dbMatch("name", "atomic-openshift")
- return rpmquery.count() > 0
- # Disabling too-many-branches. This is a yaml dictionary comparison function
- # pylint: disable=too-many-branches,too-many-return-statements,too-many-statements
- @staticmethod
- def check_def_equal(user_def, result_def, skip_keys=None, debug=False):
- ''' Given a user defined definition, compare it with the results given back by our query. '''
- # Currently these values are autogenerated and we do not need to check them
- skip = ['metadata', 'status']
- if skip_keys:
- skip.extend(skip_keys)
- for key, value in result_def.items():
- if key in skip:
- continue
- # Both are lists
- if isinstance(value, list):
- if key not in user_def:
- if debug:
- print('User data does not have key [%s]' % key)
- print('User data: %s' % user_def)
- return False
- if not isinstance(user_def[key], list):
- if debug:
- print('user_def[key] is not a list key=[%s] user_def[key]=%s' % (key, user_def[key]))
- return False
- if len(user_def[key]) != len(value):
- if debug:
- print("List lengths are not equal.")
- print("key=[%s]: user_def[%s] != value[%s]" % (key, len(user_def[key]), len(value)))
- print("user_def: %s" % user_def[key])
- print("value: %s" % value)
- return False
- for values in zip(user_def[key], value):
- if isinstance(values[0], dict) and isinstance(values[1], dict):
- if debug:
- print('sending list - list')
- print(type(values[0]))
- print(type(values[1]))
- result = Utils.check_def_equal(values[0], values[1], skip_keys=skip_keys, debug=debug)
- if not result:
- print('list compare returned false')
- return False
- elif value != user_def[key]:
- if debug:
- print('value should be identical')
- print(user_def[key])
- print(value)
- return False
- # recurse on a dictionary
- elif isinstance(value, dict):
- if key not in user_def:
- if debug:
- print("user_def does not have key [%s]" % key)
- return False
- if not isinstance(user_def[key], dict):
- if debug:
- print("dict returned false: not instance of dict")
- return False
- # before passing ensure keys match
- api_values = set(value.keys()) - set(skip)
- user_values = set(user_def[key].keys()) - set(skip)
- if api_values != user_values:
- if debug:
- print("keys are not equal in dict")
- print(user_values)
- print(api_values)
- return False
- result = Utils.check_def_equal(user_def[key], value, skip_keys=skip_keys, debug=debug)
- if not result:
- if debug:
- print("dict returned false")
- print(result)
- return False
- # Verify each key, value pair is the same
- else:
- if key not in user_def or value != user_def[key]:
- if debug:
- print("value not equal; user_def does not have key")
- print(key)
- print(value)
- if key in user_def:
- print(user_def[key])
- return False
- if debug:
- print('returning true')
- return True
- class OpenShiftCLIConfig(object):
- '''Generic Config'''
- def __init__(self, rname, namespace, kubeconfig, options):
- self.kubeconfig = kubeconfig
- self.name = rname
- self.namespace = namespace
- self._options = options
- @property
- def config_options(self):
- ''' return config options '''
- return self._options
- def to_option_list(self, ascommalist=''):
- '''return all options as a string
- if ascommalist is set to the name of a key, and
- the value of that key is a dict, format the dict
- as a list of comma delimited key=value pairs'''
- return self.stringify(ascommalist)
- def stringify(self, ascommalist=''):
- ''' return the options hash as cli params in a string
- if ascommalist is set to the name of a key, and
- the value of that key is a dict, format the dict
- as a list of comma delimited key=value pairs '''
- rval = []
- for key in sorted(self.config_options.keys()):
- data = self.config_options[key]
- if data['include'] \
- and (data['value'] is not None or isinstance(data['value'], int)):
- if key == ascommalist:
- val = ','.join(['{}={}'.format(kk, vv) for kk, vv in sorted(data['value'].items())])
- else:
- val = data['value']
- rval.append('--{}={}'.format(key.replace('_', '-'), val))
- return rval
- # -*- -*- -*- End included fragment: lib/base.py -*- -*- -*-
- # -*- -*- -*- Begin included fragment: lib/rolebinding.py -*- -*- -*-
- # pylint: disable=too-many-instance-attributes
- class RoleBindingConfig(object):
- ''' Handle rolebinding config '''
- # pylint: disable=too-many-arguments
- def __init__(self,
- name,
- namespace,
- kubeconfig,
- group_names=None,
- role_ref=None,
- subjects=None,
- usernames=None):
- ''' constructor for handling rolebinding options '''
- self.kubeconfig = kubeconfig
- self.name = name
- self.namespace = namespace
- self.group_names = group_names
- self.role_ref = role_ref
- self.subjects = subjects
- self.usernames = usernames
- self.data = {}
- self.create_dict()
- def create_dict(self):
- ''' create a default rolebinding as a dict '''
- self.data['apiVersion'] = 'v1'
- self.data['kind'] = 'RoleBinding'
- self.data['groupNames'] = self.group_names
- self.data['metadata']['name'] = self.name
- self.data['metadata']['namespace'] = self.namespace
- self.data['roleRef'] = self.role_ref
- self.data['subjects'] = self.subjects
- self.data['userNames'] = self.usernames
- # pylint: disable=too-many-instance-attributes,too-many-public-methods
- class RoleBinding(Yedit):
- ''' Class to model a rolebinding openshift object'''
- group_names_path = "groupNames"
- role_ref_path = "roleRef"
- subjects_path = "subjects"
- user_names_path = "userNames"
- kind = 'RoleBinding'
- def __init__(self, content):
- '''RoleBinding constructor'''
- super(RoleBinding, self).__init__(content=content)
- self._subjects = None
- self._role_ref = None
- self._group_names = None
- self._user_names = None
- @property
- def subjects(self):
- ''' subjects property '''
- if self._subjects is None:
- self._subjects = self.get_subjects()
- return self._subjects
- @subjects.setter
- def subjects(self, data):
- ''' subjects property setter'''
- self._subjects = data
- @property
- def role_ref(self):
- ''' role_ref property '''
- if self._role_ref is None:
- self._role_ref = self.get_role_ref()
- return self._role_ref
- @role_ref.setter
- def role_ref(self, data):
- ''' role_ref property setter'''
- self._role_ref = data
- @property
- def group_names(self):
- ''' group_names property '''
- if self._group_names is None:
- self._group_names = self.get_group_names()
- return self._group_names
- @group_names.setter
- def group_names(self, data):
- ''' group_names property setter'''
- self._group_names = data
- @property
- def user_names(self):
- ''' user_names property '''
- if self._user_names is None:
- self._user_names = self.get_user_names()
- return self._user_names
- @user_names.setter
- def user_names(self, data):
- ''' user_names property setter'''
- self._user_names = data
- def get_group_names(self):
- ''' return groupNames '''
- return self.get(RoleBinding.group_names_path) or []
- def get_user_names(self):
- ''' return usernames '''
- return self.get(RoleBinding.user_names_path) or []
- def get_role_ref(self):
- ''' return role_ref '''
- return self.get(RoleBinding.role_ref_path) or {}
- def get_subjects(self):
- ''' return subjects '''
- return self.get(RoleBinding.subjects_path) or []
- #### ADD #####
- def add_subject(self, inc_subject):
- ''' add a subject '''
- if self.subjects:
- # pylint: disable=no-member
- self.subjects.append(inc_subject)
- else:
- self.put(RoleBinding.subjects_path, [inc_subject])
- return True
- def add_role_ref(self, inc_role_ref):
- ''' add a role_ref '''
- if not self.role_ref:
- self.put(RoleBinding.role_ref_path, {"name": inc_role_ref})
- return True
- return False
- def add_group_names(self, inc_group_names):
- ''' add a group_names '''
- if self.group_names:
- # pylint: disable=no-member
- self.group_names.append(inc_group_names)
- else:
- self.put(RoleBinding.group_names_path, [inc_group_names])
- return True
- def add_user_name(self, inc_user_name):
- ''' add a username '''
- if self.user_names:
- # pylint: disable=no-member
- self.user_names.append(inc_user_name)
- else:
- self.put(RoleBinding.user_names_path, [inc_user_name])
- return True
- #### /ADD #####
- #### Remove #####
- def remove_subject(self, inc_subject):
- ''' remove a subject '''
- try:
- # pylint: disable=no-member
- self.subjects.remove(inc_subject)
- except ValueError as _:
- return False
- return True
- def remove_role_ref(self, inc_role_ref):
- ''' remove a role_ref '''
- if self.role_ref and self.role_ref['name'] == inc_role_ref:
- del self.role_ref['name']
- return True
- return False
- def remove_group_name(self, inc_group_name):
- ''' remove a groupname '''
- try:
- # pylint: disable=no-member
- self.group_names.remove(inc_group_name)
- except ValueError as _:
- return False
- return True
- def remove_user_name(self, inc_user_name):
- ''' remove a username '''
- try:
- # pylint: disable=no-member
- self.user_names.remove(inc_user_name)
- except ValueError as _:
- return False
- return True
- #### /REMOVE #####
- #### UPDATE #####
- def update_subject(self, inc_subject):
- ''' update a subject '''
- try:
- # pylint: disable=no-member
- index = self.subjects.index(inc_subject)
- except ValueError as _:
- return self.add_subject(inc_subject)
- self.subjects[index] = inc_subject
- return True
- def update_group_name(self, inc_group_name):
- ''' update a groupname '''
- try:
- # pylint: disable=no-member
- index = self.group_names.index(inc_group_name)
- except ValueError as _:
- return self.add_group_names(inc_group_name)
- self.group_names[index] = inc_group_name
- return True
- def update_user_name(self, inc_user_name):
- ''' update a username '''
- try:
- # pylint: disable=no-member
- index = self.user_names.index(inc_user_name)
- except ValueError as _:
- return self.add_user_name(inc_user_name)
- self.user_names[index] = inc_user_name
- return True
- def update_role_ref(self, inc_role_ref):
- ''' update a role_ref '''
- self.role_ref['name'] = inc_role_ref
- return True
- #### /UPDATE #####
- #### FIND ####
- def find_subject(self, inc_subject):
- ''' find a subject '''
- index = None
- try:
- # pylint: disable=no-member
- index = self.subjects.index(inc_subject)
- except ValueError as _:
- return index
- return index
- def find_group_name(self, inc_group_name):
- ''' find a group_name '''
- index = None
- try:
- # pylint: disable=no-member
- index = self.group_names.index(inc_group_name)
- except ValueError as _:
- return index
- return index
- def find_user_name(self, inc_user_name):
- ''' find a user_name '''
- index = None
- try:
- # pylint: disable=no-member
- index = self.user_names.index(inc_user_name)
- except ValueError as _:
- return index
- return index
- def find_role_ref(self, inc_role_ref):
- ''' find a user_name '''
- if self.role_ref and self.role_ref['name'] == inc_role_ref['name']:
- return self.role_ref
- return None
- # -*- -*- -*- End included fragment: lib/rolebinding.py -*- -*- -*-
- # -*- -*- -*- Begin included fragment: lib/scc.py -*- -*- -*-
- # pylint: disable=too-many-instance-attributes
- class SecurityContextConstraintsConfig(object):
- ''' Handle scc options '''
- # pylint: disable=too-many-arguments
- def __init__(self,
- sname,
- kubeconfig,
- options=None,
- fs_group='MustRunAs',
- default_add_capabilities=None,
- groups=None,
- priority=None,
- required_drop_capabilities=None,
- run_as_user='MustRunAsRange',
- se_linux_context='MustRunAs',
- supplemental_groups='RunAsAny',
- users=None,
- annotations=None):
- ''' constructor for handling scc options '''
- self.kubeconfig = kubeconfig
- self.name = sname
- self.options = options
- self.fs_group = fs_group
- self.default_add_capabilities = default_add_capabilities
- self.groups = groups
- self.priority = priority
- self.required_drop_capabilities = required_drop_capabilities
- self.run_as_user = run_as_user
- self.se_linux_context = se_linux_context
- self.supplemental_groups = supplemental_groups
- self.users = users
- self.annotations = annotations
- self.data = {}
- self.create_dict()
- def create_dict(self):
- ''' assign the correct properties for a scc dict '''
- # allow options
- if self.options:
- for key, value in self.options.items():
- self.data[key] = value
- else:
- self.data['allowHostDirVolumePlugin'] = False
- self.data['allowHostIPC'] = False
- self.data['allowHostNetwork'] = False
- self.data['allowHostPID'] = False
- self.data['allowHostPorts'] = False
- self.data['allowPrivilegedContainer'] = False
- self.data['allowedCapabilities'] = None
- # version
- self.data['apiVersion'] = 'v1'
- # kind
- self.data['kind'] = 'SecurityContextConstraints'
- # defaultAddCapabilities
- self.data['defaultAddCapabilities'] = self.default_add_capabilities
- # fsGroup
- self.data['fsGroup']['type'] = self.fs_group
- # groups
- self.data['groups'] = []
- if self.groups:
- self.data['groups'] = self.groups
- # metadata
- self.data['metadata'] = {}
- self.data['metadata']['name'] = self.name
- if self.annotations:
- for key, value in self.annotations.items():
- self.data['metadata'][key] = value
- # priority
- self.data['priority'] = self.priority
- # requiredDropCapabilities
- self.data['requiredDropCapabilities'] = self.required_drop_capabilities
- # runAsUser
- self.data['runAsUser'] = {'type': self.run_as_user}
- # seLinuxContext
- self.data['seLinuxContext'] = {'type': self.se_linux_context}
- # supplementalGroups
- self.data['supplementalGroups'] = {'type': self.supplemental_groups}
- # users
- self.data['users'] = []
- if self.users:
- self.data['users'] = self.users
- # pylint: disable=too-many-instance-attributes,too-many-public-methods,no-member
- class SecurityContextConstraints(Yedit):
- ''' Class to wrap the oc command line tools '''
- default_add_capabilities_path = "defaultAddCapabilities"
- fs_group_path = "fsGroup"
- groups_path = "groups"
- priority_path = "priority"
- required_drop_capabilities_path = "requiredDropCapabilities"
- run_as_user_path = "runAsUser"
- se_linux_context_path = "seLinuxContext"
- supplemental_groups_path = "supplementalGroups"
- users_path = "users"
- kind = 'SecurityContextConstraints'
- def __init__(self, content):
- '''SecurityContextConstraints constructor'''
- super(SecurityContextConstraints, self).__init__(content=content)
- self._users = None
- self._groups = None
- @property
- def users(self):
- ''' users property getter '''
- if self._users is None:
- self._users = self.get_users()
- return self._users
- @property
- def groups(self):
- ''' groups property getter '''
- if self._groups is None:
- self._groups = self.get_groups()
- return self._groups
- @users.setter
- def users(self, data):
- ''' users property setter'''
- self._users = data
- @groups.setter
- def groups(self, data):
- ''' groups property setter'''
- self._groups = data
- def get_users(self):
- '''get scc users'''
- return self.get(SecurityContextConstraints.users_path) or []
- def get_groups(self):
- '''get scc groups'''
- return self.get(SecurityContextConstraints.groups_path) or []
- def add_user(self, inc_user):
- ''' add a user '''
- if self.users:
- self.users.append(inc_user)
- else:
- self.put(SecurityContextConstraints.users_path, [inc_user])
- return True
- def add_group(self, inc_group):
- ''' add a group '''
- if self.groups:
- self.groups.append(inc_group)
- else:
- self.put(SecurityContextConstraints.groups_path, [inc_group])
- return True
- def remove_user(self, inc_user):
- ''' remove a user '''
- try:
- self.users.remove(inc_user)
- except ValueError as _:
- return False
- return True
- def remove_group(self, inc_group):
- ''' remove a group '''
- try:
- self.groups.remove(inc_group)
- except ValueError as _:
- return False
- return True
- def update_user(self, inc_user):
- ''' update a user '''
- try:
- index = self.users.index(inc_user)
- except ValueError as _:
- return self.add_user(inc_user)
- self.users[index] = inc_user
- return True
- def update_group(self, inc_group):
- ''' update a group '''
- try:
- index = self.groups.index(inc_group)
- except ValueError as _:
- return self.add_group(inc_group)
- self.groups[index] = inc_group
- return True
- def find_user(self, inc_user):
- ''' find a user '''
- index = None
- try:
- index = self.users.index(inc_user)
- except ValueError as _:
- return index
- return index
- def find_group(self, inc_group):
- ''' find a group '''
- index = None
- try:
- index = self.groups.index(inc_group)
- except ValueError as _:
- return index
- return index
- # -*- -*- -*- End included fragment: lib/scc.py -*- -*- -*-
- # -*- -*- -*- Begin included fragment: class/oc_adm_policy_user.py -*- -*- -*-
- class PolicyUserException(Exception):
- ''' PolicyUser exception'''
- pass
- class PolicyUserConfig(OpenShiftCLIConfig):
- ''' PolicyUserConfig is a DTO for user related policy. '''
- def __init__(self, namespace, kubeconfig, policy_options):
- super(PolicyUserConfig, self).__init__(policy_options['name']['value'],
- namespace, kubeconfig, policy_options)
- self.kind = self.get_kind()
- self.namespace = namespace
- def get_kind(self):
- ''' return the kind we are working with '''
- if self.config_options['resource_kind']['value'] == 'role':
- return 'rolebinding'
- elif self.config_options['resource_kind']['value'] == 'cluster-role':
- return 'clusterrolebinding'
- elif self.config_options['resource_kind']['value'] == 'scc':
- return 'scc'
- return None
- # pylint: disable=too-many-return-statements
- class PolicyUser(OpenShiftCLI):
- ''' Class to handle attaching policies to users '''
- def __init__(self,
- config,
- verbose=False):
- ''' Constructor for PolicyUser '''
- super(PolicyUser, self).__init__(config.namespace, config.kubeconfig, verbose)
- self.config = config
- self.verbose = verbose
- self._rolebinding = None
- self._scc = None
- self._cluster_role_bindings = None
- self._role_bindings = None
- @property
- def rolebindings(self):
- if self._role_bindings is None:
- results = self._get('rolebindings', None)
- if results['returncode'] != 0:
- raise OpenShiftCLIError('Could not retrieve rolebindings')
- self._role_bindings = results['results'][0]['items']
- return self._role_bindings
- @property
- def clusterrolebindings(self):
- if self._cluster_role_bindings is None:
- results = self._get('clusterrolebindings', None)
- if results['returncode'] != 0:
- raise OpenShiftCLIError('Could not retrieve clusterrolebindings')
- self._cluster_role_bindings = results['results'][0]['items']
- return self._cluster_role_bindings
- @property
- def role_binding(self):
- ''' role_binding property '''
- return self._rolebinding
- @role_binding.setter
- def role_binding(self, binding):
- ''' setter for role_binding property '''
- self._rolebinding = binding
- @property
- def security_context_constraint(self):
- ''' security_context_constraint property '''
- return self._scc
- @security_context_constraint.setter
- def security_context_constraint(self, scc):
- ''' setter for security_context_constraint property '''
- self._scc = scc
- def get(self):
- '''fetch the desired kind
- This is only used for scc objects.
- The {cluster}rolebindings happen in exists.
- '''
- resource_name = self.config.config_options['name']['value']
- if resource_name == 'cluster-reader':
- resource_name += 's'
- return self._get(self.config.kind, resource_name)
- def exists_role_binding(self):
- ''' return whether role_binding exists '''
- bindings = None
- if self.config.config_options['resource_kind']['value'] == 'cluster-role':
- bindings = self.clusterrolebindings
- else:
- bindings = self.rolebindings
- if bindings is None:
- return False
- for binding in bindings:
- if binding['roleRef']['name'] == self.config.config_options['name']['value'] and \
- 'userNames' in binding and binding['userNames'] is not None and \
- self.config.config_options['user']['value'] in binding['userNames']:
- self.role_binding = binding
- return True
- return False
- def exists_scc(self):
- ''' return whether scc exists '''
- results = self.get()
- if results['returncode'] == 0:
- self.security_context_constraint = SecurityContextConstraints(results['results'][0])
- if self.security_context_constraint.find_user(self.config.config_options['user']['value']) != None:
- return True
- return False
- return results
- def exists(self):
- '''does the object exist?'''
- if self.config.config_options['resource_kind']['value'] == 'cluster-role':
- return self.exists_role_binding()
- elif self.config.config_options['resource_kind']['value'] == 'role':
- return self.exists_role_binding()
- elif self.config.config_options['resource_kind']['value'] == 'scc':
- return self.exists_scc()
- return False
- def perform(self):
- '''perform action on resource'''
- cmd = ['policy',
- self.config.config_options['action']['value'],
- self.config.config_options['name']['value'],
- self.config.config_options['user']['value']]
- if self.config.config_options['role_namespace']['value'] is not None:
- cmd.extend(['--role-namespace', self.config.config_options['role_namespace']['value']])
- return self.openshift_cmd(cmd, oadm=True)
- @staticmethod
- def run_ansible(params, check_mode):
- '''run the oc_adm_policy_user module'''
- state = params['state']
- action = None
- if state == 'present':
- action = 'add-' + params['resource_kind'] + '-to-user'
- else:
- action = 'remove-' + params['resource_kind'] + '-from-user'
- nconfig = PolicyUserConfig(params['namespace'],
- params['kubeconfig'],
- {'action': {'value': action, 'include': False},
- 'user': {'value': params['user'], 'include': False},
- 'resource_kind': {'value': params['resource_kind'], 'include': False},
- 'name': {'value': params['resource_name'], 'include': False},
- 'role_namespace': {'value': params['role_namespace'], 'include': False},
- })
- policyuser = PolicyUser(nconfig, params['debug'])
- # Run the oc adm policy user related command
- ########
- # Delete
- ########
- if state == 'absent':
- if not policyuser.exists():
- return {'changed': False, 'state': 'absent'}
- if check_mode:
- return {'changed': False, 'msg': 'CHECK_MODE: would have performed a delete.'}
- api_rval = policyuser.perform()
- if api_rval['returncode'] != 0:
- return {'msg': api_rval}
- return {'changed': True, 'results' : api_rval, state:'absent'}
- if state == 'present':
- ########
- # Create
- ########
- results = policyuser.exists()
- if isinstance(results, dict) and 'returncode' in results and results['returncode'] != 0:
- return {'msg': results}
- if not results:
- if check_mode:
- return {'changed': False, 'msg': 'CHECK_MODE: would have performed a create.'}
- api_rval = policyuser.perform()
- if api_rval['returncode'] != 0:
- return {'msg': api_rval}
- return {'changed': True, 'results': api_rval, state: 'present'}
- return {'changed': False, state: 'present'}
- return {'failed': True, 'changed': False, 'results': 'Unknown state passed. %s' % state, state: 'unknown'}
- # -*- -*- -*- End included fragment: class/oc_adm_policy_user.py -*- -*- -*-
- # -*- -*- -*- Begin included fragment: ansible/oc_adm_policy_user.py -*- -*- -*-
- def main():
- '''
- ansible oc adm module for user policy
- '''
- module = AnsibleModule(
- argument_spec=dict(
- state=dict(default='present', type='str',
- choices=['present', 'absent']),
- debug=dict(default=False, type='bool'),
- resource_name=dict(required=True, type='str'),
- namespace=dict(default='default', type='str'),
- role_namespace=dict(default=None, type='str'),
- kubeconfig=dict(default='/etc/origin/master/admin.kubeconfig', type='str'),
- user=dict(required=True, type='str'),
- resource_kind=dict(required=True, choices=['role', 'cluster-role', 'scc'], type='str'),
- ),
- supports_check_mode=True,
- )
- results = PolicyUser.run_ansible(module.params, module.check_mode)
- if 'failed' in results:
- module.fail_json(**results)
- module.exit_json(**results)
- if __name__ == "__main__":
- main()
- # -*- -*- -*- End included fragment: ansible/oc_adm_policy_user.py -*- -*- -*-
|