description:
- name of the CephX key
required: true
+ user:
+ description:
+ - entity used to perform operation.
+ It corresponds to the -n option (--name)
+ required: false
+ user_key:
+ description:
+ - the path to the keyring corresponding to the
+ user being used.
+ It corresponds to the -k option (--keyring)
state:
description:
- If 'present' is used, the module creates a keyring
- name: create cephx key
ceph_key:
name: "{{ keys_to_create }}"
+ user: client.bootstrap-rgw
+ user_key: /var/lib/ceph/bootstrap-rgw/ceph.keyring
state: present
caps: "{{ caps }}"
return secret
-def generate_caps(cmd, _type, caps):
+def generate_caps(_type, caps):
'''
Generate CephX capabilities list
'''
+ caps_cli = []
+
for k, v in caps.items():
# makes sure someone didn't pass an empty var,
# we don't want to add an empty cap
if len(k) == 0:
continue
if _type == "ceph-authtool":
- cmd.extend(["--cap"])
- cmd.extend([k, v])
+ caps_cli.extend(["--cap"])
+ caps_cli.extend([k, v])
- return cmd
+ return caps_cli
-def generate_ceph_cmd(cluster, args, user, user_key, container_image=None):
+def generate_ceph_cmd(cluster, args, user, user_key_path, container_image=None):
'''
Generate 'ceph' command line to execute
'''
'-n',
user,
'-k',
- user_key,
+ user_key_path,
'--cluster',
cluster,
'auth',
]
cmd.extend(base_cmd)
- cmd = generate_caps(cmd, "ceph-authtool", caps)
+ cmd.extend(generate_caps("ceph-authtool", caps))
return cmd
-def create_key(module, result, cluster, name, secret, caps, import_key, dest, container_image=None): # noqa E501
+def create_key(module, result, cluster, user, user_key_path, name, secret, caps, import_key, dest, container_image=None): # noqa E501
'''
Create a CephX key
'''
- args = [
- 'import',
- '-i',
- dest,
- ]
cmd_list = []
-
if not secret:
secret = generate_secret()
+ if user == 'client.admin':
+ args = ['import', '-i', dest]
+ else:
+ args = ['get-or-create', name]
+ args.extend(generate_caps(None, caps))
+ args.extend(['-o', dest])
+
cmd_list.append(generate_ceph_authtool_cmd(
cluster, name, secret, caps, dest, container_image))
- if import_key:
- user = "client.admin"
- keyring_filename = cluster + "." + user + ".keyring"
- user_key = os.path.join("/etc/ceph/", keyring_filename)
+ if import_key or user != 'client.admin':
cmd_list.append(generate_ceph_cmd(
- cluster, args, user, user_key, container_image))
+ cluster, args, user, user_key_path, container_image))
return cmd_list
-def delete_key(cluster, name, container_image=None):
+def delete_key(cluster, user, user_key_path, name, container_image=None):
'''
Delete a CephX key
'''
name,
]
- user = "client.admin"
- keyring_filename = cluster + "." + user + ".keyring"
- user_key = os.path.join("/etc/ceph/", keyring_filename)
cmd_list.append(generate_ceph_cmd(
- cluster, args, user, user_key, container_image))
+ cluster, args, user, user_key_path, container_image))
return cmd_list
-def get_key(cluster, name, dest, container_image=None):
+def get_key(cluster, user, user_key_path, name, dest, container_image=None):
'''
Get a CephX key (write on the filesystem)
'''
dest,
]
- user = "client.admin"
- keyring_filename = cluster + "." + user + ".keyring"
- user_key = os.path.join("/etc/ceph/", keyring_filename)
cmd_list.append(generate_ceph_cmd(
- cluster, args, user, user_key, container_image))
+ cluster, args, user, user_key_path, container_image))
return cmd_list
-def info_key(cluster, name, user, user_key, output_format, container_image=None): # noqa E501
+def info_key(cluster, name, user, user_key_path, output_format, container_image=None): # noqa E501
'''
Get information about a CephX key
'''
]
cmd_list.append(generate_ceph_cmd(
- cluster, args, user, user_key, container_image))
+ cluster, args, user, user_key_path, container_image))
return cmd_list
-def list_keys(cluster, user, user_key, container_image=None):
+def list_keys(cluster, user, user_key_path, container_image=None):
'''
List all CephX keys
'''
]
cmd_list.append(generate_ceph_cmd(
- cluster, args, user, user_key, container_image))
+ cluster, args, user, user_key_path, container_image))
return cmd_list
secret=dict(type='str', required=False, default=None, no_log=True),
import_key=dict(type='bool', required=False, default=True),
dest=dict(type='str', required=False, default='/etc/ceph/'),
+ user=dict(type='str', required=False, default='client.admin'),
+ user_key=dict(type='str', required=False, default=None)
)
module = AnsibleModule(
secret = module.params.get('secret')
import_key = module.params.get('import_key')
dest = module.params.get('dest')
+ user = module.params.get('user')
+ user_key = module.params.get('user_key')
changed = False
_caps = caps
key_exist = 1
- user = "client.admin"
- keyring_filename = cluster + '.' + user + '.keyring'
- user_key = os.path.join("/etc/ceph/", keyring_filename)
+ if not user_key:
+ user_key_filename = '{}.{}.keyring'.format(cluster, user)
+ user_key_dir = '/etc/ceph'
+ user_key_path = os.path.join(user_key_dir, user_key_filename)
+ else:
+ user_key_path = user_key
+
output_format = "json"
if (state in ["present", "update"]):
if import_key:
_info_key = []
rc, cmd, out, err = exec_commands(
- module, info_key(cluster, name, user, user_key, output_format, container_image)) # noqa E501
+ module, info_key(cluster, name, user, user_key_path, output_format, container_image)) # noqa E501
key_exist = rc
if not caps and key_exist != 0:
fatal("Capabilities must be provided when state is 'present'", module) # noqa E501
_caps = _info_key[0]['caps']
if secret == _secret and caps == _caps:
if not os.path.isfile(file_path):
- rc, cmd, out, err = exec_commands(module, get_key(cluster, name, file_path, container_image)) # noqa E501
+ rc, cmd, out, err = exec_commands(module, get_key(cluster, user, user_key_path, name, file_path, container_image)) # noqa E501
result["rc"] = rc
if rc != 0:
result["stdout"] = "Couldn't fetch the key {0} at {1}.".format(name, file_path) # noqa E501
module.exit_json(**result)
if (key_exist == 0 and (secret != _secret or caps != _caps)) or key_exist != 0: # noqa E501
rc, cmd, out, err = exec_commands(module, create_key(
- module, result, cluster, name, secret, caps, import_key, file_path, container_image)) # noqa E501
+ module, result, cluster, user, user_key_path, name, secret, caps, import_key, file_path, container_image)) # noqa E501
if rc != 0:
result["stdout"] = "Couldn't create or update {0}".format(name)
result["stderr"] = err
elif state == "absent":
if key_exist == 0:
rc, cmd, out, err = exec_commands(
- module, delete_key(cluster, name, container_image))
+ module, delete_key(cluster, user, user_key_path, name, container_image))
if rc == 0:
changed = True
else:
elif state == "info":
rc, cmd, out, err = exec_commands(
- module, info_key(cluster, name, user, user_key, output_format, container_image)) # noqa E501
+ module, info_key(cluster, name, user, user_key_path, output_format, container_image)) # noqa E501
if rc != 0:
result["stdout"] = "skipped, since {0} does not exist".format(name)
result['rc'] = 0
elif state == "list":
rc, cmd, out, err = exec_commands(
- module, list_keys(cluster, user, user_key, container_image))
+ module, list_keys(cluster, user, user_key_path, container_image))
elif state == "fetch_initial_keys":
hostname = socket.gethostname().split('.', 1)[0]
user = "mon."
keyring_filename = cluster + "-" + hostname + "/keyring"
- user_key = os.path.join("/var/lib/ceph/mon/", keyring_filename)
+ user_key_path = os.path.join("/var/lib/ceph/mon/", keyring_filename)
rc, cmd, out, err = exec_commands(
- module, list_keys(cluster, user, user_key, container_image))
+ module, list_keys(cluster, user, user_key_path, container_image))
if rc != 0:
result["stdout"] = "failed to retrieve ceph keys"
result["sdterr"] = err
]
info_cmd = info_key(cluster, entity, user,
- user_key, output_format, container_image)
+ user_key_path, output_format, container_image)
# we use info_cmd[0] because info_cmd is an array made of an array
info_cmd[0].extend(extra_args)
rc, cmd, out, err = exec_commands(
import json
import os
import sys
-import ceph_key
import mock
import pytest
from ansible.module_utils import basic
from ansible.module_utils._text import to_bytes
sys.path.append('./library')
+import ceph_key # noqa: E402
# From ceph-ansible documentation
'mon': 'allow *',
'osd': 'allow rwx',
}
- fake_cmd = ['ceph']
fake_type = "ceph-authtool"
expected_command_list = [
- 'ceph',
'--cap',
'mon',
'allow *',
'osd',
'allow rwx'
]
- result = ceph_key.generate_caps(fake_cmd, fake_type, fake_caps)
+ result = ceph_key.generate_caps(fake_type, fake_caps)
assert result == expected_command_list
def test_generate_caps_not_ceph_authtool(self):
'mon': 'allow *',
'osd': 'allow rwx',
}
- fake_cmd = ['ceph']
fake_type = ""
expected_command_list = [
- 'ceph',
'mon',
'allow *',
'osd',
'allow rwx'
]
- result = ceph_key.generate_caps(fake_cmd, fake_type, fake_caps)
+ result = ceph_key.generate_caps(fake_type, fake_caps)
assert result == expected_command_list
def test_generate_ceph_cmd_list_non_container(self):
def test_create_key_non_container(self):
fake_module = "fake"
+ fake_user = 'client.admin'
+ fake_user_key = '/etc/ceph/fake.client.admin.keyring'
fake_result = " fake"
fake_cluster = "fake"
fake_name = "client.fake"
expected_command_list = [
['ceph-authtool', '--create-keyring', fake_file_destination, '--name', fake_name,
'--add-key', fake_secret, '--cap', 'mon', 'allow *', '--cap', 'osd', 'allow rwx'],
- ['ceph', '-n', 'client.admin', '-k', '/etc/ceph/fake.client.admin.keyring', '--cluster', fake_cluster, 'auth',
+ ['ceph', '-n', fake_user, '-k', fake_user_key, '--cluster', fake_cluster, 'auth',
'import', '-i', fake_file_destination],
]
- result = ceph_key.create_key(fake_module, fake_result, fake_cluster,
+ result = ceph_key.create_key(fake_module, fake_result, fake_cluster, fake_user, fake_user_key,
fake_name, fake_secret, fake_caps, fake_import_key, fake_file_destination)
assert result == expected_command_list
def test_create_key_container(self):
fake_module = "fake"
+ fake_user = 'client.admin'
+ fake_user_key = '/etc/ceph/fake.client.admin.keyring'
fake_result = "fake"
fake_cluster = "fake"
fake_name = "client.fake"
'--cluster', fake_cluster,
'auth', 'import',
'-i', fake_file_destination]]
- result = ceph_key.create_key(fake_module, fake_result, fake_cluster, fake_name,
+ result = ceph_key.create_key(fake_module, fake_result, fake_cluster, fake_user, fake_user_key, fake_name,
fake_secret, fake_caps, fake_import_key, fake_file_destination, fake_container_image)
assert result == expected_command_list
def test_create_key_non_container_no_import(self):
fake_module = "fake"
+ fake_user = 'client.admin'
+ fake_user_key = '/etc/ceph/fake.client.admin.keyring'
fake_result = "fake"
fake_cluster = "fake"
fake_name = "client.fake"
'osd',
'allow rwx', ]
]
- result = ceph_key.create_key(fake_module, fake_result, fake_cluster,
+ result = ceph_key.create_key(fake_module, fake_result, fake_cluster, fake_user, fake_user_key,
fake_name, fake_secret, fake_caps, fake_import_key, fake_file_destination) # noqa E501
assert result == expected_command_list
def test_create_key_container_no_import(self):
fake_module = "fake"
+ fake_user = 'client.admin'
+ fake_user_key = '/etc/ceph/fake.client.admin.keyring'
fake_result = "fake"
fake_cluster = "fake"
fake_name = "client.fake"
fake_file_destination = os.path.join(fake_dest, fake_keyring_filename)
# create_key passes (one for ceph-authtool and one for itself) itw own array so the expected result is an array within an array # noqa E501
fake_container_image = "quay.ceph.io/ceph-ci/daemon:latest-luminous"
- expected_command_list = [['docker',
+ expected_command_list = [['docker', # noqa E128
'run',
'--rm',
'--net=host',
'--cap',
'osd',
'allow rwx']]
- result = ceph_key.create_key(fake_module, fake_result, fake_cluster, fake_name,
+ result = ceph_key.create_key(fake_module, fake_result, fake_cluster, fake_user, fake_user_key, fake_name,
fake_secret, fake_caps, fake_import_key, fake_file_destination, fake_container_image)
assert result == expected_command_list
def test_delete_key_non_container(self):
+ fake_user = 'client.admin'
+ fake_user_key = '/etc/ceph/fake.client.admin.keyring'
fake_cluster = "fake"
fake_name = "client.fake"
expected_command_list = [
['ceph', '-n', 'client.admin', '-k', '/etc/ceph/fake.client.admin.keyring',
'--cluster', fake_cluster, 'auth', 'del', fake_name],
]
- result = ceph_key.delete_key(fake_cluster, fake_name)
+ result = ceph_key.delete_key(fake_cluster, fake_user, fake_user_key, fake_name)
assert result == expected_command_list
def test_delete_key_container(self):
+ fake_user = 'client.admin'
+ fake_user_key = '/etc/ceph/fake.client.admin.keyring'
fake_cluster = "fake"
fake_name = "client.fake"
fake_container_image = "quay.ceph.io/ceph-ci/daemon:latest-luminous"
'--cluster', fake_cluster,
'auth', 'del', fake_name]]
result = ceph_key.delete_key(
- fake_cluster, fake_name, fake_container_image)
+ fake_cluster, fake_user, fake_user_key, fake_name, fake_container_image)
assert result == expected_command_list
def test_info_key_non_container(self):
+ fake_user = 'client.admin'
+ fake_user_key = '/etc/ceph/fake.client.admin.keyring'
fake_cluster = "fake"
fake_name = "client.fake"
fake_user = "fake-user"
- fake_key = "/tmp/my-key"
fake_output_format = "json"
expected_command_list = [
- ['ceph', '-n', "fake-user", '-k', "/tmp/my-key", '--cluster', fake_cluster, 'auth',
+ ['ceph', '-n', fake_user, '-k', fake_user_key, '--cluster', fake_cluster, 'auth',
'get', fake_name, '-f', 'json'],
]
result = ceph_key.info_key(
- fake_cluster, fake_name, fake_user, fake_key, fake_output_format)
+ fake_cluster, fake_name, fake_user, fake_user_key, fake_output_format)
assert result == expected_command_list
def test_info_key_container(self):
fake_cluster = "fake"
fake_name = "client.fake"
- fake_user = "fake-user"
- fake_key = "/tmp/my-key"
+ fake_user = 'client.admin'
+ fake_user_key = '/etc/ceph/fake.client.admin.keyring'
fake_output_format = "json"
fake_container_image = "quay.ceph.io/ceph-ci/daemon:latest-luminous"
- expected_command_list = [['docker',
+ expected_command_list = [['docker', # noqa E128
'run',
'--rm',
'--net=host',
'-v', '/var/log/ceph/:/var/log/ceph/:z',
'--entrypoint=ceph',
'quay.ceph.io/ceph-ci/daemon:latest-luminous',
- '-n', "fake-user",
- '-k', "/tmp/my-key",
+ '-n', fake_user,
+ '-k', fake_user_key,
'--cluster', fake_cluster,
'auth', 'get', fake_name,
'-f', 'json']]
result = ceph_key.info_key(
- fake_cluster, fake_name, fake_user, fake_key, fake_output_format, fake_container_image)
+ fake_cluster, fake_name, fake_user, fake_user_key, fake_output_format, fake_container_image) # noqa E501
assert result == expected_command_list
def test_list_key_non_container(self):
def test_get_key_container(self):
fake_cluster = "fake"
+ fake_user = 'client.admin'
+ fake_user_key = '/etc/ceph/fake.client.admin.keyring'
fake_name = "client.fake"
fake_container_image = "quay.ceph.io/ceph-ci/daemon:latest-luminous"
fake_dest = "/fake/ceph"
fake_keyring_filename = fake_cluster + "." + fake_name + ".keyring"
fake_file_destination = os.path.join(fake_dest, fake_keyring_filename)
- expected_command_list = [['docker',
+ expected_command_list = [['docker', # noqa E128
'run',
'--rm',
'--net=host',
'-v', '/var/log/ceph/:/var/log/ceph/:z',
'--entrypoint=ceph',
'quay.ceph.io/ceph-ci/daemon:latest-luminous',
- '-n', "client.admin",
- '-k', "/etc/ceph/fake.client.admin.keyring",
+ '-n', fake_user,
+ '-k', fake_user_key,
'--cluster', fake_cluster,
'auth', 'get',
- fake_name, '-o', fake_file_destination], ]
+ fake_name, '-o', fake_file_destination]]
result = ceph_key.get_key(
- fake_cluster, fake_name, fake_file_destination, fake_container_image)
+ fake_cluster, fake_user, fake_user_key, fake_name, fake_file_destination, fake_container_image)
assert result == expected_command_list
def test_get_key_non_container(self):
fake_cluster = "fake"
+ fake_user = 'client.admin'
+ fake_user_key = '/etc/ceph/fake.client.admin.keyring'
fake_dest = "/fake/ceph"
fake_name = "client.fake"
fake_keyring_filename = fake_cluster + "." + fake_name + ".keyring"
fake_file_destination = os.path.join(fake_dest, fake_keyring_filename)
expected_command_list = [
- ['ceph', '-n', "client.admin", '-k', "/etc/ceph/fake.client.admin.keyring",
+ ['ceph', '-n', fake_user, '-k', fake_user_key,
'--cluster', fake_cluster, 'auth', 'get', fake_name, '-o', fake_file_destination],
]
result = ceph_key.get_key(
- fake_cluster, fake_name, fake_file_destination)
+ fake_cluster, fake_user, fake_user_key, fake_name, fake_file_destination)
assert result == expected_command_list
def test_list_key_non_container_with_mon_key(self):