if import_key:
user = "client.admin"
- user_key = os.path.join(
- "/etc/ceph/" + cluster + "." + user + ".keyring")
+ user_key = os.path.join("/etc/ceph/", cluster + "." + user + \
+ ".keyring")
cmd_list.append(generate_ceph_cmd(
cluster, args, user, user_key, container_image))
args = generate_caps(args, "ceph", caps)
user = "client.admin"
- user_key = os.path.join(
- "/etc/ceph/" + cluster + "." + user + ".keyring")
+ user_key = os.path.join("/etc/ceph/", cluster + "." + user + ".keyring")
cmd_list.append(generate_ceph_cmd(
cluster, args, user, user_key, container_image))
]
user = "client.admin"
- user_key = os.path.join(
- "/etc/ceph/" + cluster + "." + user + ".keyring")
+ user_key = os.path.join("/etc/ceph/", cluster + "." + user + ".keyring")
cmd_list.append(generate_ceph_cmd(
cluster, args, user, user_key, container_image))
]
user = "client.admin"
- user_key = os.path.join(
- "/etc/ceph/" + cluster + "." + user + ".keyring")
+ user_key = os.path.join("/etc/ceph/", cluster + "." + user + ".keyring")
cmd_list.append(generate_ceph_cmd(
cluster, args, user, user_key, container_image))
if "admin" in entity:
path = "/etc/ceph"
- key_path = os.path.join(
- path + "/" + cluster + "." + entity + ".keyring")
+ key_path = os.path.join(path, cluster + "." + entity + ".keyring")
elif "bootstrap" in entity:
path = "/var/lib/ceph"
# bootstrap keys show up as 'client.boostrap-osd'
# however the directory is called '/var/lib/ceph/bootstrap-osd'
# so we need to substring 'client.'
entity_split = entity.split('.')[1]
- key_path = os.path.join(
- path + "/" + entity_split + "/" + cluster + ".keyring")
+ key_path = os.path.join(path, entity_split, cluster + ".keyring")
else:
return None
# There is no guarantee that any cluster is running and we don't need one
if import_key:
user = "client.admin"
- user_key = os.path.join(
- "/etc/ceph/" + cluster + "." + user + ".keyring")
+ user_key = os.path.join("/etc/ceph/", cluster + "." + user + \
+ ".keyring")
output_format = "json"
rc, cmd, out, err = exec_commands(
module, info_key(cluster, name, user, user_key, output_format, container_image)) # noqa E501
elif 'bootstrap' in dest:
# Build a different path for bootstrap keys as there are stored as
# /var/lib/ceph/bootstrap-rbd/ceph.keyring
- file_path = os.path.join(dest + "/" + cluster + ".keyring")
+ file_path = os.path.join(dest, cluster + ".keyring")
else:
- file_path = os.path.join(dest + "/" + cluster +
- "." + name + ".keyring")
+ file_path = os.path.join(dest, cluster + "." + name + ".keyring")
# We allow 'present' to override any existing key
# ONLY if a secret is provided
module.exit_json(**result)
user = "client.admin"
- user_key = os.path.join(
- "/etc/ceph/" + cluster + "." + user + ".keyring")
+ user_key = os.path.join("/etc/ceph/", cluster + "." + user + ".keyring")
output_format = "json"
rc, cmd, out, err = exec_commands(
module, info_key(cluster, name, user, user_key, output_format, container_image)) # noqa E501
elif state == "list":
user = "client.admin"
- user_key = os.path.join(
- "/etc/ceph/" + cluster + "." + user + ".keyring")
+ user_key = os.path.join("/etc/ceph/", cluster + "." + user + ".keyring")
rc, cmd, out, err = exec_commands(
module, list_keys(cluster, user, user_key, container_image))
elif state == "fetch_initial_keys":
hostname = socket.gethostname().split('.', 1)[0]
user = "mon."
- user_key = os.path.join(
- "/var/lib/ceph/mon/" + cluster + "-" + hostname + "/keyring")
+ user_key = os.path.join("/var/lib/ceph/mon/", cluster + "-" + \
+ hostname + "/keyring")
rc, cmd, out, err = exec_commands(
module, list_keys(cluster, user, user_key, container_image))
if rc != 0:
'osd': 'allow rwx',
}
fake_dest = "/fake/ceph"
- fake_file_destination = os.path.join(
- fake_dest + "/" + fake_cluster + "." + fake_name + ".keyring")
+ fake_file_destination = os.path.join(fake_dest, fake_cluster + "." + fake_name + ".keyring")
expected_command_list = [
'ceph-authtool',
'--create-keyring',
'osd': 'allow rwx',
}
fake_dest = "/fake/ceph"
- fake_file_destination = os.path.join(
- fake_dest + "/" + fake_cluster + "." + fake_name + ".keyring")
+ fake_file_destination = os.path.join(fake_dest, fake_cluster + "." + fake_name + ".keyring")
fake_container_image = "docker.io/ceph/daemon:latest-luminous"
expected_command_list = ['docker',
'run',
}
fake_import_key = True
fake_dest = "/fake/ceph"
- fake_file_destination = os.path.join(
- fake_dest + "/" + fake_cluster + "." + fake_name + ".keyring")
+ fake_file_destination = os.path.join(fake_dest, fake_cluster + "." + fake_name + ".keyring")
expected_command_list = [
['ceph-authtool', '--create-keyring', fake_file_destination, '--name', fake_name, # noqa E501
'--add-key', fake_secret, '--cap', 'mon', 'allow *', '--cap', 'osd', 'allow rwx'], # noqa E501
}
fake_dest = "/fake/ceph"
fake_import_key = True
- fake_file_destination = os.path.join(
- fake_dest + "/" + fake_cluster + "." + fake_name + ".keyring")
+ fake_file_destination = os.path.join(fake_dest, fake_cluster + "." + fake_name + ".keyring")
fake_container_image = "docker.io/ceph/daemon:latest-luminous"
expected_command_list = [
['docker', # noqa E128
}
fake_dest = "/fake/ceph"
fake_import_key = False
- fake_file_destination = os.path.join(
- fake_dest + "/" + fake_cluster + "." + fake_name + ".keyring")
+ fake_file_destination = os.path.join(fake_dest, fake_cluster + "." + fake_name + ".keyring")
# create_key passes (one for ceph-authtool and one for itself) itw own array so the expected result is an array within an array # noqa E501
expected_command_list = [[
'ceph-authtool',
}
fake_dest = "/fake/ceph"
fake_import_key = False
- fake_file_destination = os.path.join(
- fake_dest + "/" + fake_cluster + "." + fake_name + ".keyring")
+ fake_file_destination = os.path.join(fake_dest, fake_cluster + "." + fake_name + ".keyring")
# create_key passes (one for ceph-authtool and one for itself) itw own array so the expected result is an array within an array # noqa E501
fake_container_image = "docker.io/ceph/daemon:latest-luminous"
expected_command_list = [['docker', # noqa E128
fake_name = "client.fake"
fake_container_image = "docker.io/ceph/daemon:latest-luminous"
fake_dest = "/fake/ceph"
- fake_file_destination = os.path.join(
- fake_dest + "/" + fake_cluster + "." + fake_name + ".keyring")
+ fake_file_destination = os.path.join(fake_dest, fake_cluster + "." + fake_name + ".keyring")
expected_command_list = [['docker', # noqa E128
'run',
'--rm',
fake_cluster = "fake"
fake_dest = "/fake/ceph"
fake_name = "client.fake"
- fake_file_destination = os.path.join(
- fake_dest + "/" + fake_cluster + "." + fake_name + ".keyring")
+ fake_file_destination = os.path.join(fake_dest, fake_cluster + "." + fake_name + ".keyring")
expected_command_list = [
['ceph', '-n', "client.admin", '-k', "/etc/ceph/fake.client.admin.keyring", # noqa E501
'--cluster', fake_cluster, 'auth', 'get', fake_name, '-o', fake_file_destination], # noqa E501
fake_hostname = "mon01"
fake_cluster = "fake"
fake_user = "mon."
- fake_key = os.path.join("/var/lib/ceph/mon/" + fake_cluster + "-" + fake_hostname + "/keyring") # noqa E501
+ fake_key = os.path.join("/var/lib/ceph/mon/", fake_cluster + "-" + fake_hostname, "keyring") # noqa E501
expected_command_list = [
['ceph', '-n', "mon.", '-k', "/var/lib/ceph/mon/fake-mon01/keyring", # noqa E501
'--cluster', fake_cluster, 'auth', 'ls', '-f', 'json'],
fake_hostname = "mon01"
fake_cluster = "fake"
fake_user = "mon."
- fake_key = os.path.join("/var/lib/ceph/mon/" + fake_cluster + "-" + fake_hostname + "/keyring") # noqa E501
+ fake_key = os.path.join("/var/lib/ceph/mon/", fake_cluster + "-" + fake_hostname, "keyring") # noqa E501
fake_container_image = "docker.io/ceph/daemon:latest-luminous"
expected_command_list = [['docker', # noqa E128
'run',