#!/usr/bin/python # -*- coding: utf-8 -*- DOCUMENTATION = ''' --- module: keystone_service short_description: Manage OpenStack Identity (keystone) service endpoints options: name: description: - name of service (e.g., keystone) required: yes type: description: - type of service (e.g., identity) required: yes description: description: - description of service (e.g., Identity Service) required: yes public_url: description: - public url of service. - 'Alias: I(url)' - 'Alias: I(publicurl)' required: yes internal_url: description: - internal url of service. - 'Alias: I(internalurl)' required: no default: value of public_url admin_url: description: - admin url of service. - 'Alias: I(adminurl)' required: no default: value of public_url insecure: description: - allow use of self-signed SSL certificates required: no choices: [ "yes", "no" ] region: description: - region of service required: yes state: description: - Indicate desired state of the resource choices: ['present', 'absent'] default: present requirements: [ python-keystoneclient ] author: Lorin Hochstein ''' EXAMPLES = ''' examples: keystone_service: > name=keystone type=identity description="Keystone Identity Service" publicurl=http://192.168.206.130:5000/v2.0 internalurl=http://192.168.206.130:5000/v2.0 adminurl=http://192.168.206.130:35357/v2.0 keystone_service: > name=glance type=image description="Glance Identity Service" url=http://192.168.206.130:9292 ''' try: from keystoneclient.v2_0 import client except ImportError: keystoneclient_found = False else: keystoneclient_found = True import traceback def authenticate(endpoint, token, login_user, login_password, tenant_name, insecure): """Return a keystone client object""" if token: return client.Client(endpoint=endpoint, token=token, insecure=insecure) else: return client.Client(auth_url=endpoint, username=login_user, password=login_password, tenant_name=tenant_name, insecure=insecure) def get_service(keystone, name): """ Retrieve a service by name """ services = [x for x in keystone.services.list() if x.name == name] count = len(services) if count == 0: raise KeyError("No keystone services with name %s" % name) elif count > 1: raise ValueError("%d services with name %s" % (count, name)) else: return services[0] def get_endpoint(keystone, name): """ Retrieve a service endpoint by name """ service = get_service(keystone, name) endpoints = [x for x in keystone.endpoints.list() if x.service_id == service.id] count = len(endpoints) if count == 0: raise KeyError("No keystone endpoints with service name %s" % name) elif count > 1: raise ValueError("%d endpoints with service name %s" % (count, name)) else: return endpoints[0] def ensure_present(keystone, name, service_type, description, public_url, internal_url, admin_url, region, check_mode): """ Ensure the service and its endpoint are present and have the right values. Returns a tuple, where the first element is a boolean that indicates a state change, the second element is the service uuid (or None in check mode), and the third element is the endpoint uuid (or None in check mode).""" # Fetch service and endpoint, if they exist. service = None endpoint = None try: service = get_service(keystone, name) except: pass try: endpoint = get_endpoint(keystone, name) except: pass changed = False # Delete endpoint if it exists and doesn't match. if endpoint is not None: identical = endpoint.publicurl == public_url and \ endpoint.adminurl == admin_url and \ endpoint.internalurl == internal_url and \ endpoint.region == region if not identical: changed = True ensure_endpoint_absent(keystone, name, check_mode) endpoint = None # Delete service and its endpoint if the service exists and doesn't match. if service is not None: identical = service.name == name and \ service.type == service_type and \ service.description == description if not identical: changed = True ensure_endpoint_absent(keystone, name, check_mode) endpoint = None ensure_service_absent(keystone, name, check_mode) service = None # Recreate service, if necessary. if service is None: if not check_mode: service = keystone.services.create( name=name, service_type=service_type, description=description, ) changed = True # Recreate endpoint, if necessary. if endpoint is None: if not check_mode: endpoint = keystone.endpoints.create( region=region, service_id=service.id, publicurl=public_url, adminurl=admin_url, internalurl=internal_url, ) changed = True if check_mode: # In check mode, the service/endpoint uuids will be the old uuids, # so omit them. return changed, None, None return changed, service.id, endpoint.id def ensure_service_absent(keystone, name, check_mode): """ Ensure the service is absent""" try: service = get_service(keystone, name) if not check_mode: keystone.services.delete(service.id) return True except KeyError: # Service doesn't exist, so we're done. return False def ensure_endpoint_absent(keystone, name, check_mode): """ Ensure the service endpoint """ try: endpoint = get_endpoint(keystone, name) if not check_mode: keystone.endpoints.delete(endpoint.id) return True except KeyError: # Endpoint doesn't exist, so we're done. return False def dispatch(keystone, name, service_type, description, public_url, internal_url, admin_url, region, state, check_mode): if state == 'present': (changed, service_id, endpoint_id) = ensure_present( keystone, name, service_type, description, public_url, internal_url, admin_url, region, check_mode, ) return dict(changed=changed, service_id=service_id, endpoint_id=endpoint_id) elif state == 'absent': endpoint_changed = ensure_endpoint_absent(keystone, name, check_mode) service_changed = ensure_service_absent(keystone, name, check_mode) return dict(changed=service_changed or endpoint_changed) else: raise ValueError("Code should never reach here") def main(): module = AnsibleModule( argument_spec=dict( name=dict(required=True), type=dict(required=True), description=dict(required=False), public_url=dict(required=True, aliases=['url', 'publicurl']), internal_url=dict(required=False, aliases=['internalurl']), admin_url=dict(required=False, aliases=['adminurl']), region=dict(required=True), state=dict(default='present', choices=['present', 'absent']), endpoint=dict(required=False, default="http://127.0.0.1:35357/v2.0", aliases=['auth_url']), token=dict(required=False), insecure=dict(required=False, default=False, choices=BOOLEANS), login_user=dict(required=False), login_password=dict(required=False), tenant_name=dict(required=False, aliases=['tenant']) ), supports_check_mode=True, mutually_exclusive=[['token', 'login_user'], ['token', 'login_password'], ['token', 'tenant_name']] ) endpoint = module.params['endpoint'] token = module.params['token'] login_user = module.params['login_user'] login_password = module.params['login_password'] tenant_name = module.params['tenant_name'] insecure = module.boolean(module.params['insecure']) name = module.params['name'] service_type = module.params['type'] description = module.params['description'] public_url = module.params['public_url'] internal_url = module.params['internal_url'] if internal_url is None: internal_url = public_url admin_url = module.params['admin_url'] if admin_url is None: admin_url = public_url region = module.params['region'] state = module.params['state'] keystone = authenticate(endpoint, token, login_user, login_password, tenant_name, insecure) check_mode = module.check_mode try: d = dispatch(keystone, name, service_type, description, public_url, internal_url, admin_url, region, state, check_mode) except Exception: if check_mode: # If we have a failure in check mode module.exit_json(changed=True, msg="exception: %s" % traceback.format_exc()) else: module.fail_json(msg=traceback.format_exc()) else: module.exit_json(**d) # this is magic, see lib/ansible/module_common.py #<> if __name__ == '__main__': main()