def groom(_plugin, model): setDefaultInMap(model["cluster"]["docker"], "disabled", False) if model["cluster"]["docker"]["disabled"]: return False else: setDefaultInMap(model["cluster"]["docker"], "version", "latest") lookupRepository(model, "docker", configEntry="docker_yum") lookupHttpProxy( model, model["cluster"]["docker"]["proxy_id"] if "proxy_id" in model["cluster"]["docker"] else None, "docker") return True
def groom(_plugin, model): setDefaultInMap(model[CLUSTER], K8S, {}) setDefaultInMap(model[CLUSTER][K8S], HELM, {}) setDefaultInMap(model[CLUSTER][K8S][HELM], DISABLED, False) if model[CLUSTER][K8S][HELM][DISABLED]: return False else: lookupRepository(model, HELM, repoId=model[CLUSTER][K8S][HELM]["repo_id"]) lookupHttpProxy( model, model[CLUSTER][K8S][HELM]["proxy_id"] if "proxy_id" in model[CLUSTER][K8S][HELM] else None, "helm") return True
def groom(_plugin, model): setDefaultInMap(model[CLUSTER][DOCKER_NEXUS_PROXY], DISABLED, False) if model[CLUSTER][DOCKER_NEXUS_PROXY][DISABLED]: return False else: setDefaultInMap(model[CLUSTER][DOCKER_NEXUS_PROXY], "nexus_default_port", 8081) setDefaultInMap(model[CLUSTER][DOCKER_NEXUS_PROXY], "nexus_internal_docker_port", 8082) setDefaultInMap(model[DATA], DOCKER_NEXUS_PROXY, {}) if NEXT_PROXY_ID in model[CLUSTER][DOCKER_NEXUS_PROXY]: lookupHttpProxy(model, model[CLUSTER][DOCKER_NEXUS_PROXY][NEXT_PROXY_ID], DOCKER_NEXUS_NEXT_PROXY) proxy = model[DATA][HTTPPROXIES][DOCKER_NEXUS_NEXT_PROXY] if HTTP_PROXY in proxy: x = urlparse(proxy[HTTP_PROXY]) model[DATA][DOCKER_NEXUS_PROXY][NEXT_PROXY_HTTP] = {} model[DATA][DOCKER_NEXUS_PROXY][NEXT_PROXY_HTTP][ HOST] = x.hostname model[DATA][DOCKER_NEXUS_PROXY][NEXT_PROXY_HTTP][PORT] = x.port model[DATA][DOCKER_NEXUS_PROXY][NEXT_PROXY_HTTP][ USERNAME] = x.username if x.username is not None else "" model[DATA][DOCKER_NEXUS_PROXY][NEXT_PROXY_HTTP][ PASSWORD] = x.password if x.password is not None else "" if HTTPS_PROXY in proxy: x = urlparse(proxy[HTTPS_PROXY]) model[DATA][DOCKER_NEXUS_PROXY][NEXT_PROXY_HTTPS] = {} model[DATA][DOCKER_NEXUS_PROXY][NEXT_PROXY_HTTPS][ HOST] = x.hostname model[DATA][DOCKER_NEXUS_PROXY][NEXT_PROXY_HTTPS][ PORT] = x.port model[DATA][DOCKER_NEXUS_PROXY][NEXT_PROXY_HTTPS][ USERNAME] = x.username if x.username is not None else "" model[DATA][DOCKER_NEXUS_PROXY][NEXT_PROXY_HTTPS][ PASSWORD] = x.password if x.password is not None else "" if NO_PROXY_JAVA in proxy: model[DATA][DOCKER_NEXUS_PROXY][NO_PROXY] = proxy[ NO_PROXY_JAVA].split(",") return True
def groom(_plugin, model): setDefaultInMap(model[CLUSTER], K8S, {}) setDefaultInMap(model[CLUSTER][K8S], KUBESPRAY, {}) setDefaultInMap(model[CLUSTER][K8S][KUBESPRAY], DISABLED, False) setDefaultInMap(model[CLUSTER][K8S][KUBESPRAY], METRICS_SERVER, True) setDefaultInMap(model[CLUSTER][K8S][KUBESPRAY], AUDIT, False) setDefaultInMap(model[CLUSTER][K8S][KUBESPRAY], POD_SECURITY_POLICIES, True) if model[CLUSTER][K8S][KUBESPRAY][DISABLED]: return False else: lookupRepository(model, None, "docker_yum", model[CLUSTER][K8S][KUBESPRAY]['docker_yum_repo_id']) if K9S_REPO_ID in model[CLUSTER][K8S][KUBESPRAY]: lookupRepository(model, "k9s", repoId = model[CLUSTER][K8S][KUBESPRAY][K9S_REPO_ID]) if HELM_REPO_ID in model[CLUSTER][K8S][KUBESPRAY]: lookupRepository(model, "helm", repoId = model[CLUSTER][K8S][KUBESPRAY][HELM_REPO_ID]) lookupHelper(model, KUBESPRAY, helperId=model[CLUSTER][K8S][KUBESPRAY]["helper_id"]) lookupHttpProxy(model, model[CLUSTER][K8S][KUBESPRAY]["docker_proxy_id"] if "docker_proxy_id" in model[CLUSTER][K8S][KUBESPRAY] else None, "docker") lookupHttpProxy(model, model[CLUSTER][K8S][KUBESPRAY]["master_root_proxy_id"] if "master_root_proxy_id" in model[CLUSTER][K8S][KUBESPRAY] else None, "master_root") lookupHttpProxy(model, model[CLUSTER][K8S][KUBESPRAY]["yumproxy_id"] if "yum_proxy_id" in model[CLUSTER][K8S][KUBESPRAY] else None, "yum") if FILES_REPO_ID in model[CLUSTER][K8S][KUBESPRAY]: lookupRepository(model, "kubespray_files", repoId=model[CLUSTER][K8S][KUBESPRAY][FILES_REPO_ID]) model[DATA][ROLE_PATHS].add(appendPath(model[DATA][HELPERS][KUBESPRAY][FOLDER], "roles")) model[DATA]["dnsNbrDots"] = model[CLUSTER][K8S][KUBESPRAY][CLUSTER_NAME].count(".") + 1 certByName = {} if DOCKER_CERTIFICATES in model["config"]: for cert in model["config"][DOCKER_CERTIFICATES]: cert["path"] = appendPath(os.path.dirname(model[DATA][CONFIG_FILE]), cert["path"]) if not os.path.isfile(cert["path"]) or not os.access(cert["path"], os.R_OK): ERROR("Configuration error: docker_certificates.{}: Invalid path '{}'".format(cert["name"], cert["path"])) certByName[cert["name"]] = cert model[DATA][DOCKER_CERTIFICATES] = [] if DOCKER_CERTIFICATES in model[CLUSTER][K8S][KUBESPRAY]: for certName in model[CLUSTER][K8S][KUBESPRAY][DOCKER_CERTIFICATES]: if certName in certByName: cert = certByName[certName] if "port" in cert: cert["endpoint"] = "{}:{}".format(cert["host"], cert['port']) else: cert["endoint"] = cert["host"] model[DATA][DOCKER_CERTIFICATES].append(cert) else: ERROR("docker_certificates '{}' is not defined in configuration file!".format(certName)) return True