diff options
Diffstat (limited to 'roles')
39 files changed, 135 insertions, 67 deletions
diff --git a/roles/etcd/tasks/main.yml b/roles/etcd/tasks/main.yml index 8853740e5..35117225b 100644 --- a/roles/etcd/tasks/main.yml +++ b/roles/etcd/tasks/main.yml @@ -84,7 +84,7 @@        daemon_reload: yes      when: not openshift.common.is_etcd_system_container | bool      register: task_result -    failed_when: "task_result|failed and 'could not' not in task_result.msg|lower" +    failed_when: task_result|failed and 'could not' not in task_result.msg|lower    - name: Install etcd container service file      template: diff --git a/roles/lib_openshift/src/test/integration/oc_label.yml b/roles/lib_openshift/src/test/integration/oc_label.yml index b4e721407..22cf687c5 100755 --- a/roles/lib_openshift/src/test/integration/oc_label.yml +++ b/roles/lib_openshift/src/test/integration/oc_label.yml @@ -15,7 +15,7 @@    - name: ensure needed vars are defined      fail:        msg: "{{ item }} not defined" -    when: "{{ item }} is not defined" +    when: item is not defined      with_items:      - cli_master_test  # ansible inventory instance to run playbook against diff --git a/roles/lib_openshift/src/test/integration/oc_user.yml b/roles/lib_openshift/src/test/integration/oc_user.yml index ad1f9d188..9b4290052 100755 --- a/roles/lib_openshift/src/test/integration/oc_user.yml +++ b/roles/lib_openshift/src/test/integration/oc_user.yml @@ -14,7 +14,7 @@    - name: ensure needed vars are defined      fail:        msg: "{{ item }} no defined" -    when: "{{ item}} is not defined" +    when: item is not defined      with_items:      - cli_master_test  # ansible inventory instance to run playbook against diff --git a/roles/openshift_ca/tasks/main.yml b/roles/openshift_ca/tasks/main.yml index 3b17d9ed6..c7b906949 100644 --- a/roles/openshift_ca/tasks/main.yml +++ b/roles/openshift_ca/tasks/main.yml @@ -95,7 +95,7 @@      {% for legacy_ca_certificate in g_master_legacy_ca_result.files | default([]) | oo_collect('path') %}      --certificate-authority {{ legacy_ca_certificate }}      {% endfor %} -    --hostnames={{ openshift.common.all_hostnames | join(',') }} +    --hostnames={{ hostvars[openshift_ca_host].openshift.common.all_hostnames | join(',') }}      --master={{ openshift.master.api_url }}      --public-master={{ openshift.master.public_api_url }}      --cert-dir={{ openshift_ca_config_dir }} diff --git a/roles/openshift_certificate_expiry/filter_plugins/oo_cert_expiry.py b/roles/openshift_certificate_expiry/filter_plugins/oo_cert_expiry.py index 5f102e960..577a14b9a 100644 --- a/roles/openshift_certificate_expiry/filter_plugins/oo_cert_expiry.py +++ b/roles/openshift_certificate_expiry/filter_plugins/oo_cert_expiry.py @@ -35,7 +35,7 @@ Example playbook usage:      become: no      run_once: yes      delegate_to: localhost -    when: "{{ openshift_certificate_expiry_save_json_results|bool }}" +    when: openshift_certificate_expiry_save_json_results|bool      copy:        content: "{{ hostvars|oo_cert_expiry_results_to_json() }}"        dest: "{{ openshift_certificate_expiry_json_results_path }}" diff --git a/roles/openshift_certificate_expiry/library/openshift_cert_expiry.py b/roles/openshift_certificate_expiry/library/openshift_cert_expiry.py index c204b5341..0242f5b43 100644 --- a/roles/openshift_certificate_expiry/library/openshift_cert_expiry.py +++ b/roles/openshift_certificate_expiry/library/openshift_cert_expiry.py @@ -135,7 +135,7 @@ platforms missing the Python OpenSSL library.                  continue              elif l.startswith('Subject:'): -                # O=system:nodes, CN=system:node:m01.example.com +                # O = system:nodes, CN = system:node:m01.example.com                  self.subject = FakeOpenSSLCertificateSubjects(l.partition(': ')[-1])      def get_serial_number(self): @@ -202,7 +202,7 @@ object"""          """          self.subjects = []          for s in subject_string.split(', '): -            name, _, value = s.partition('=') +            name, _, value = s.partition(' = ')              self.subjects.append((name, value))      def get_components(self): diff --git a/roles/openshift_certificate_expiry/tasks/main.yml b/roles/openshift_certificate_expiry/tasks/main.yml index 139d5de6e..b5234bd1e 100644 --- a/roles/openshift_certificate_expiry/tasks/main.yml +++ b/roles/openshift_certificate_expiry/tasks/main.yml @@ -13,12 +13,12 @@      src: cert-expiry-table.html.j2      dest: "{{ openshift_certificate_expiry_html_report_path }}"    delegate_to: localhost -  when: "{{ openshift_certificate_expiry_generate_html_report|bool }}" +  when: openshift_certificate_expiry_generate_html_report|bool  - name: Generate the result JSON string    run_once: yes    set_fact: json_result_string="{{ hostvars|oo_cert_expiry_results_to_json(play_hosts) }}" -  when: "{{ openshift_certificate_expiry_save_json_results|bool }}" +  when: openshift_certificate_expiry_save_json_results|bool  - name: Generate results JSON file    become: no @@ -27,4 +27,4 @@      src: save_json_results.j2      dest: "{{ openshift_certificate_expiry_json_results_path }}"    delegate_to: localhost -  when: "{{ openshift_certificate_expiry_save_json_results|bool }}" +  when: openshift_certificate_expiry_save_json_results|bool diff --git a/roles/openshift_certificate_expiry/test/test_fakeopensslclasses.py b/roles/openshift_certificate_expiry/test/test_fakeopensslclasses.py index ccdd48fa8..8a521a765 100644 --- a/roles/openshift_certificate_expiry/test/test_fakeopensslclasses.py +++ b/roles/openshift_certificate_expiry/test/test_fakeopensslclasses.py @@ -17,7 +17,8 @@ from openshift_cert_expiry import FakeOpenSSLCertificate  # noqa: E402  @pytest.fixture(scope='module')  def fake_valid_cert(valid_cert): -    cmd = ['openssl', 'x509', '-in', str(valid_cert['cert_file']), '-text'] +    cmd = ['openssl', 'x509', '-in', str(valid_cert['cert_file']), '-text', +           '-nameopt', 'oneline']      cert = subprocess.check_output(cmd)      return FakeOpenSSLCertificate(cert.decode('utf8')) diff --git a/roles/openshift_cloud_provider/tasks/openstack.yml b/roles/openshift_cloud_provider/tasks/openstack.yml index f22dd4520..5788e6d74 100644 --- a/roles/openshift_cloud_provider/tasks/openstack.yml +++ b/roles/openshift_cloud_provider/tasks/openstack.yml @@ -7,4 +7,4 @@    template:      dest: "{{ openshift.common.config_base }}/cloudprovider/openstack.conf"      src: openstack.conf.j2 -  when: "openshift_cloudprovider_openstack_auth_url is defined and openshift_cloudprovider_openstack_username is defined and openshift_cloudprovider_openstack_password is defined and (openshift_cloudprovider_openstack_tenant_id is defined or openshift_cloudprovider_openstack_tenant_name is defined)" +  when: openshift_cloudprovider_openstack_auth_url is defined and openshift_cloudprovider_openstack_username is defined and openshift_cloudprovider_openstack_password is defined and (openshift_cloudprovider_openstack_tenant_id is defined or openshift_cloudprovider_openstack_tenant_name is defined) diff --git a/roles/openshift_excluder/tasks/verify_excluder.yml b/roles/openshift_excluder/tasks/verify_excluder.yml new file mode 100644 index 000000000..24a05d56e --- /dev/null +++ b/roles/openshift_excluder/tasks/verify_excluder.yml @@ -0,0 +1,29 @@ +--- +# input variables: +# - repoquery_cmd +# - excluder +# - openshift_upgrade_target +- block: +  - name: Get available excluder version +    command: > +      {{ repoquery_cmd }} --qf '%{version}' "{{ excluder }}" +    register: excluder_version +    failed_when: false +    changed_when: false + +  - name: "{{ excluder }} version detected" +    debug: +      msg: "{{ excluder }}: {{ excluder_version.stdout }}" + +  - name: Printing upgrade target version +    debug: +      msg: "{{ openshift_upgrade_target }}" + +  - name: Check the available {{ excluder }} version is at most of the upgrade target version +    fail: +      msg: "Available {{ excluder }} version {{ excluder_version.stdout }} is higher than the upgrade target version" +    when: +    - "{{ excluder_version.stdout != '' }}" +    - "{{ excluder_version.stdout.split('.')[0:2] | join('.') | version_compare(openshift_upgrade_target.split('.')[0:2] | join('.'), '>', strict=True) }}" +  when: +  - not openshift.common.is_atomic | bool diff --git a/roles/openshift_excluder/tasks/verify_upgrade.yml b/roles/openshift_excluder/tasks/verify_upgrade.yml new file mode 100644 index 000000000..6ea2130ac --- /dev/null +++ b/roles/openshift_excluder/tasks/verify_upgrade.yml @@ -0,0 +1,15 @@ +--- +# input variables +# - repoquery_cmd +# - openshift_upgrade_target +- include: init.yml + +- include: verify_excluder.yml +  vars: +    excluder: "{{ openshift.common.service_type }}-docker-excluder" +  when: docker_excluder_on + +- include: verify_excluder.yml +  vars: +    excluder: "{{ openshift.common.service_type }}-excluder" +  when: openshift_excluder_on diff --git a/roles/openshift_expand_partition/tasks/main.yml b/roles/openshift_expand_partition/tasks/main.yml index 00603f4fa..4cb5418c6 100644 --- a/roles/openshift_expand_partition/tasks/main.yml +++ b/roles/openshift_expand_partition/tasks/main.yml @@ -6,7 +6,7 @@  - name: Determine if growpart is installed    command: "rpm -q cloud-utils-growpart"    register: has_growpart -  failed_when: "has_growpart.cr != 0 and 'package cloud-utils-growpart is not installed' not in has_growpart.stdout" +  failed_when: has_growpart.cr != 0 and 'package cloud-utils-growpart is not installed' not in has_growpart.stdout    changed_when: false    when: openshift.common.is_containerized | bool diff --git a/roles/openshift_hosted_logging/tasks/deploy_logging.yaml b/roles/openshift_hosted_logging/tasks/deploy_logging.yaml index afd82766f..78b624109 100644 --- a/roles/openshift_hosted_logging/tasks/deploy_logging.yaml +++ b/roles/openshift_hosted_logging/tasks/deploy_logging.yaml @@ -36,7 +36,7 @@    command: >      {{ openshift.common.client_binary }} --config={{ mktemp.stdout }}/admin.kubeconfig secrets new logging-deployer {{ openshift_hosted_logging_secret_vars | default('nothing=/dev/null') }}    register: secret_output -  failed_when: "secret_output.rc == 1 and 'exists' not in secret_output.stderr" +  failed_when: secret_output.rc == 1 and 'exists' not in secret_output.stderr  - name: "Create templates for logging accounts and the deployer"    command: > @@ -60,21 +60,21 @@      {{ openshift.common.client_binary }} adm --config={{ mktemp.stdout }}/admin.kubeconfig      policy add-cluster-role-to-user oauth-editor system:serviceaccount:logging:logging-deployer    register: permiss_output -  failed_when: "permiss_output.rc == 1 and 'exists' not in permiss_output.stderr" +  failed_when: permiss_output.rc == 1 and 'exists' not in permiss_output.stderr  - name: "Set permissions for fluentd"    command: >      {{ openshift.common.client_binary }} adm --config={{ mktemp.stdout }}/admin.kubeconfig      policy add-scc-to-user privileged system:serviceaccount:logging:aggregated-logging-fluentd    register: fluentd_output -  failed_when: "fluentd_output.rc == 1 and 'exists' not in fluentd_output.stderr" +  failed_when: fluentd_output.rc == 1 and 'exists' not in fluentd_output.stderr  - name: "Set additional permissions for fluentd"    command: >      {{ openshift.common.client_binary }} adm policy --config={{ mktemp.stdout }}/admin.kubeconfig      add-cluster-role-to-user cluster-reader system:serviceaccount:logging:aggregated-logging-fluentd    register: fluentd2_output -  failed_when: "fluentd2_output.rc == 1 and 'exists' not in fluentd2_output.stderr" +  failed_when: fluentd2_output.rc == 1 and 'exists' not in fluentd2_output.stderr  - name: "Add rolebinding-reader to aggregated-logging-elasticsearch"    command: > @@ -82,13 +82,13 @@      policy add-cluster-role-to-user rolebinding-reader \      system:serviceaccount:logging:aggregated-logging-elasticsearch    register: rolebinding_reader_output -  failed_when: "rolebinding_reader_output == 1 and 'exists' not in rolebinding_reader_output.stderr" +  failed_when: rolebinding_reader_output == 1 and 'exists' not in rolebinding_reader_output.stderr  - name: "Create ConfigMap for deployer parameters"    command: >      {{ openshift.common.client_binary}} --config={{ mktemp.stdout }}/admin.kubeconfig create configmap logging-deployer {{ deployer_cmap_params }}    register: deployer_configmap_output -  failed_when: "deployer_configmap_output.rc == 1 and 'exists' not in deployer_configmap_output.stderr" +  failed_when: deployer_configmap_output.rc == 1 and 'exists' not in deployer_configmap_output.stderr  - name: "Process the deployer template"    shell: "{{ openshift.common.client_binary }} --config={{ mktemp.stdout }}/admin.kubeconfig new-app logging-deployer-template {{ oc_new_app_values }}" diff --git a/roles/openshift_hosted_metrics/tasks/install.yml b/roles/openshift_hosted_metrics/tasks/install.yml index 6a442cefc..15dd1bd54 100644 --- a/roles/openshift_hosted_metrics/tasks/install.yml +++ b/roles/openshift_hosted_metrics/tasks/install.yml @@ -81,7 +81,7 @@      secrets new metrics-deployer nothing=/dev/null    register: metrics_deployer_secret    changed_when: metrics_deployer_secret.rc == 0 -  failed_when: "metrics_deployer_secret.rc == 1 and 'already exists' not in metrics_deployer_secret.stderr" +  failed_when: metrics_deployer_secret.rc == 1 and 'already exists' not in metrics_deployer_secret.stderr  # TODO: extend this to allow user passed in certs or generating cert with  # OpenShift CA diff --git a/roles/openshift_logging/defaults/main.yml b/roles/openshift_logging/defaults/main.yml index 5ee8d1e2a..dbf5b4d3d 100644 --- a/roles/openshift_logging/defaults/main.yml +++ b/roles/openshift_logging/defaults/main.yml @@ -3,6 +3,10 @@ openshift_logging_use_ops: "{{ openshift_hosted_logging_enable_ops_cluster | def  openshift_logging_master_url: "https://kubernetes.default.svc.{{ openshift.common.dns_domain }}"  openshift_logging_master_public_url: "{{ openshift_hosted_logging_master_public_url | default('https://' + openshift.common.public_hostname + ':' ~ (openshift_master_api_port | default('8443', true))) }}"  openshift_logging_namespace: logging +openshift_logging_nodeselector: null +openshift_logging_labels: {} +openshift_logging_label_key: "" +openshift_logging_label_value: ""  openshift_logging_install_logging: True  openshift_logging_image_pull_secret: "{{ openshift_hosted_logging_image_pull_secret | default('') }}" diff --git a/roles/openshift_logging/tasks/generate_routes.yaml b/roles/openshift_logging/tasks/generate_routes.yaml index e77da7a24..f76bb3a0a 100644 --- a/roles/openshift_logging/tasks/generate_routes.yaml +++ b/roles/openshift_logging/tasks/generate_routes.yaml @@ -1,14 +1,14 @@  ---  - set_fact: kibana_key={{ lookup('file', openshift_logging_kibana_key) | b64encode }} -  when: "{{ openshift_logging_kibana_key | trim | length > 0 }}" +  when: openshift_logging_kibana_key | trim | length > 0    changed_when: false  - set_fact: kibana_cert={{ lookup('file', openshift_logging_kibana_cert)| b64encode  }} -  when: "{{openshift_logging_kibana_cert | trim | length > 0}}" +  when: openshift_logging_kibana_cert | trim | length > 0    changed_when: false  - set_fact: kibana_ca={{ lookup('file', openshift_logging_kibana_ca)| b64encode  }} -  when: "{{openshift_logging_kibana_ca | trim | length > 0}}" +  when: openshift_logging_kibana_ca | trim | length > 0    changed_when: false  - set_fact: kibana_ca={{key_pairs | entry_from_named_pair('ca_file') }} diff --git a/roles/openshift_logging/tasks/install_elasticsearch.yaml b/roles/openshift_logging/tasks/install_elasticsearch.yaml index b80f37892..878010eb0 100644 --- a/roles/openshift_logging/tasks/install_elasticsearch.yaml +++ b/roles/openshift_logging/tasks/install_elasticsearch.yaml @@ -3,7 +3,7 @@    set_fact: openshift_logging_current_es_size={{ openshift_logging_facts.elasticsearch.deploymentconfigs.keys() | length }}  - set_fact: openshift_logging_es_pvc_prefix="logging-es" -  when: "not openshift_logging_es_pvc_prefix or openshift_logging_es_pvc_prefix == ''" +  when: not openshift_logging_es_pvc_prefix or openshift_logging_es_pvc_prefix == ''  ### evaluate if the PVC attached to the dc currently matches the provided vars  ## if it does then we reuse that pvc in the DC @@ -65,7 +65,7 @@    check_mode: no  - set_fact: openshift_logging_es_ops_pvc_prefix="logging-es-ops" -  when: "not openshift_logging_es_ops_pvc_prefix or openshift_logging_es_ops_pvc_prefix == ''" +  when: not openshift_logging_es_ops_pvc_prefix or openshift_logging_es_ops_pvc_prefix == ''  - include: set_es_storage.yaml    vars: diff --git a/roles/openshift_logging/tasks/install_fluentd.yaml b/roles/openshift_logging/tasks/install_fluentd.yaml index 35273829c..6bc405819 100644 --- a/roles/openshift_logging/tasks/install_fluentd.yaml +++ b/roles/openshift_logging/tasks/install_fluentd.yaml @@ -32,7 +32,7 @@      {{ openshift.common.admin_binary}} --config={{ mktemp.stdout }}/admin.kubeconfig policy      add-scc-to-user privileged system:serviceaccount:{{openshift_logging_namespace}}:aggregated-logging-fluentd    register: fluentd_output -  failed_when: "fluentd_output.rc == 1 and 'exists' not in fluentd_output.stderr" +  failed_when: fluentd_output.rc == 1 and 'exists' not in fluentd_output.stderr    check_mode: no    when: fluentd_privileged.stdout.find("system:serviceaccount:{{openshift_logging_namespace}}:aggregated-logging-fluentd") == -1 @@ -49,6 +49,6 @@      {{ openshift.common.admin_binary}} --config={{ mktemp.stdout }}/admin.kubeconfig policy      add-cluster-role-to-user cluster-reader system:serviceaccount:{{openshift_logging_namespace}}:aggregated-logging-fluentd    register: fluentd2_output -  failed_when: "fluentd2_output.rc == 1 and 'exists' not in fluentd2_output.stderr" +  failed_when: fluentd2_output.rc == 1 and 'exists' not in fluentd2_output.stderr    check_mode: no    when: fluentd_cluster_reader.stdout.find("system:serviceaccount:{{openshift_logging_namespace}}:aggregated-logging-fluentd") == -1 diff --git a/roles/openshift_logging/tasks/install_mux.yaml b/roles/openshift_logging/tasks/install_mux.yaml index 296da626f..91eeb95a1 100644 --- a/roles/openshift_logging/tasks/install_mux.yaml +++ b/roles/openshift_logging/tasks/install_mux.yaml @@ -45,7 +45,7 @@      {{ openshift.common.admin_binary}} --config={{ mktemp.stdout }}/admin.kubeconfig policy      add-scc-to-user hostmount-anyuid system:serviceaccount:{{openshift_logging_namespace}}:aggregated-logging-fluentd    register: mux_output -  failed_when: "mux_output.rc == 1 and 'exists' not in mux_output.stderr" +  failed_when: mux_output.rc == 1 and 'exists' not in mux_output.stderr    check_mode: no    when: mux_hostmount_anyuid.stdout.find("system:serviceaccount:{{openshift_logging_namespace}}:aggregated-logging-fluentd") == -1 @@ -62,6 +62,6 @@      {{ openshift.common.admin_binary}} --config={{ mktemp.stdout }}/admin.kubeconfig policy      add-cluster-role-to-user cluster-reader system:serviceaccount:{{openshift_logging_namespace}}:aggregated-logging-fluentd    register: mux2_output -  failed_when: "mux2_output.rc == 1 and 'exists' not in mux2_output.stderr" +  failed_when: mux2_output.rc == 1 and 'exists' not in mux2_output.stderr    check_mode: no    when: mux_cluster_reader.stdout.find("system:serviceaccount:{{openshift_logging_namespace}}:aggregated-logging-fluentd") == -1 diff --git a/roles/openshift_logging/tasks/install_support.yaml b/roles/openshift_logging/tasks/install_support.yaml index da0bbb627..877ce3149 100644 --- a/roles/openshift_logging/tasks/install_support.yaml +++ b/roles/openshift_logging/tasks/install_support.yaml @@ -1,17 +1,36 @@  ---  # This is the base configuration for installing the other components -- name: Check for logging project already exists -  command: > -    {{ openshift.common.client_binary }} --config={{ mktemp.stdout }}/admin.kubeconfig get project {{openshift_logging_namespace}} --no-headers -  register: logging_project_result -  ignore_errors: yes -  when: not ansible_check_mode -  changed_when: no +- name: Set logging project +  oc_project: +    state: present +    name: "{{ openshift_logging_namespace }}" +    node_selector: "{{ openshift_logging_nodeselector | default(null) }}" + +- name: Labelling logging project +  oc_label: +    state: present +    kind: namespace +    name: "{{ openshift_logging_namespace }}" +    labels: +    - key: "{{ item.key }}" +      value: "{{ item.value }}" +  with_dict: "{{ openshift_logging_labels | default({}) }}" +  when: +  - openshift_logging_labels is defined +  - openshift_logging_labels is dict -- name: "Create logging project" -  command: > -    {{ openshift.common.admin_binary }} --config={{ mktemp.stdout }}/admin.kubeconfig new-project {{openshift_logging_namespace}} -  when: not ansible_check_mode and "not found" in logging_project_result.stderr +- name: Labelling logging project +  oc_label: +    state: present +    kind: namespace +    name: "{{ openshift_logging_namespace }}" +    labels: +    - key: "{{ openshift_logging_label_key }}" +      value: "{{ openshift_logging_label_value }}" +  when: +  - openshift_logging_label_key is defined +  - openshift_logging_label_key != "" +  - openshift_logging_label_value is defined  - name: Create logging cert directory    file: path={{openshift.common.config_base}}/logging state=directory mode=0755 diff --git a/roles/openshift_logging/tasks/main.yaml b/roles/openshift_logging/tasks/main.yaml index c7f4a2f93..387da618d 100644 --- a/roles/openshift_logging/tasks/main.yaml +++ b/roles/openshift_logging/tasks/main.yaml @@ -1,7 +1,7 @@  ---  - fail:      msg: Only one Fluentd nodeselector key pair should be provided -  when: "{{ openshift_logging_fluentd_nodeselector.keys() | count }} > 1" +  when: openshift_logging_fluentd_nodeselector.keys() | count > 1  - name: Set default image variables based on deployment_type    include_vars: "{{ item }}" diff --git a/roles/openshift_logging/tasks/start_cluster.yaml b/roles/openshift_logging/tasks/start_cluster.yaml index ef9a42a9e..7fec5db42 100644 --- a/roles/openshift_logging/tasks/start_cluster.yaml +++ b/roles/openshift_logging/tasks/start_cluster.yaml @@ -36,7 +36,7 @@      name: "{{ object }}"      namespace: "{{openshift_logging_namespace}}"      replicas: "{{ openshift_logging_mux_replica_count | default (1) }}" -  with_items: "{{ mux_dc.results.results[0]['items'] | map(attribute='metadata.name') | list }}" +  with_items: "{{ mux_dc.results.results[0]['items'] if 'results' in mux_dc else {} | map(attribute='metadata.name') | list }}"    loop_control:      loop_var: object    when: diff --git a/roles/openshift_logging/tasks/stop_cluster.yaml b/roles/openshift_logging/tasks/stop_cluster.yaml index d20c57cc1..c078e4b2f 100644 --- a/roles/openshift_logging/tasks/stop_cluster.yaml +++ b/roles/openshift_logging/tasks/stop_cluster.yaml @@ -36,7 +36,7 @@      name: "{{ object }}"      namespace: "{{openshift_logging_namespace}}"      replicas: 0 -  with_items: "{{ mux_dc.results.results[0]['items'] | map(attribute='metadata.name') | list }}" +  with_items: "{{ mux_dc.results.results[0]['items'] if 'results' in mux_dc else {} | map(attribute='metadata.name') | list }}"    loop_control:      loop_var: object    when: openshift_logging_use_mux diff --git a/roles/openshift_master/tasks/main.yml b/roles/openshift_master/tasks/main.yml index 98e0da1a2..5522fef26 100644 --- a/roles/openshift_master/tasks/main.yml +++ b/roles/openshift_master/tasks/main.yml @@ -194,7 +194,7 @@      state: stopped    when: openshift_master_ha | bool    register: task_result -  failed_when: "task_result|failed and 'could not' not in task_result.msg|lower" +  failed_when: task_result|failed and 'could not' not in task_result.msg|lower  - set_fact:      master_service_status_changed: "{{ start_result | changed }}" diff --git a/roles/openshift_master_facts/tasks/main.yml b/roles/openshift_master_facts/tasks/main.yml index 6f8f09b22..f048e0aef 100644 --- a/roles/openshift_master_facts/tasks/main.yml +++ b/roles/openshift_master_facts/tasks/main.yml @@ -128,10 +128,10 @@    - name: Test if scheduler config is readable      fail:        msg: "Unknown scheduler config apiVersion {{ openshift_master_scheduler_config.apiVersion }}" -    when: "{{ openshift_master_scheduler_current_config.apiVersion | default(None) != 'v1' }}" +    when: openshift_master_scheduler_current_config.apiVersion | default(None) != 'v1'    - name: Set current scheduler predicates and priorities      set_fact:        openshift_master_scheduler_current_predicates: "{{ openshift_master_scheduler_current_config.predicates }}"        openshift_master_scheduler_current_priorities: "{{ openshift_master_scheduler_current_config.priorities }}" -  when: "{{ scheduler_config_stat.stat.exists }}" +  when: scheduler_config_stat.stat.exists diff --git a/roles/openshift_metrics/tasks/install_cassandra.yaml b/roles/openshift_metrics/tasks/install_cassandra.yaml index a467c1a51..3b4e8560f 100644 --- a/roles/openshift_metrics/tasks/install_cassandra.yaml +++ b/roles/openshift_metrics/tasks/install_cassandra.yaml @@ -23,7 +23,7 @@    changed_when: false  - set_fact: openshift_metrics_cassandra_pvc_prefix="hawkular-metrics" -  when: "not openshift_metrics_cassandra_pvc_prefix or openshift_metrics_cassandra_pvc_prefix == ''" +  when: not openshift_metrics_cassandra_pvc_prefix or openshift_metrics_cassandra_pvc_prefix == ''  - name: generate hawkular-cassandra persistent volume claims    template: diff --git a/roles/openshift_metrics/tasks/install_heapster.yaml b/roles/openshift_metrics/tasks/install_heapster.yaml index d13b96be1..0eb852d91 100644 --- a/roles/openshift_metrics/tasks/install_heapster.yaml +++ b/roles/openshift_metrics/tasks/install_heapster.yaml @@ -22,7 +22,7 @@    with_items:      - hawkular-metrics-certs      - hawkular-metrics-account -  when: "not {{ openshift_metrics_heapster_standalone | bool }}" +  when: not openshift_metrics_heapster_standalone | bool  - name: Generating serviceaccount for heapster    template: src=serviceaccount.j2 dest={{mktemp.stdout}}/templates/metrics-{{obj_name}}-sa.yaml diff --git a/roles/openshift_metrics/tasks/install_metrics.yaml b/roles/openshift_metrics/tasks/install_metrics.yaml index ffe6f63a2..74eb56713 100644 --- a/roles/openshift_metrics/tasks/install_metrics.yaml +++ b/roles/openshift_metrics/tasks/install_metrics.yaml @@ -10,11 +10,11 @@      - cassandra    loop_control:      loop_var: include_file -  when: "not {{ openshift_metrics_heapster_standalone | bool }}" +  when: not openshift_metrics_heapster_standalone | bool  - name: Install Heapster Standalone    include: install_heapster.yaml -  when: "{{ openshift_metrics_heapster_standalone | bool }}" +  when: openshift_metrics_heapster_standalone | bool  - find: paths={{ mktemp.stdout }}/templates patterns=*.yaml    register: object_def_files @@ -48,7 +48,7 @@  - name: Scaling down cluster to recognize changes    include: stop_metrics.yaml -  when: "{{ existing_metrics_rc.stdout_lines | length > 0 }}" +  when: existing_metrics_rc.stdout_lines | length > 0  - name: Scaling up cluster    include: start_metrics.yaml diff --git a/roles/openshift_metrics/tasks/main.yaml b/roles/openshift_metrics/tasks/main.yaml index c8d222c60..e8b7bea5c 100644 --- a/roles/openshift_metrics/tasks/main.yaml +++ b/roles/openshift_metrics/tasks/main.yaml @@ -19,7 +19,7 @@  - name: Create temp directory for all our templates    file: path={{mktemp.stdout}}/templates state=directory mode=0755    changed_when: False -  when: "{{ openshift_metrics_install_metrics | bool }}" +  when: openshift_metrics_install_metrics | bool  - name: Create temp directory local on control node    local_action: command mktemp -d diff --git a/roles/openshift_metrics/tasks/start_metrics.yaml b/roles/openshift_metrics/tasks/start_metrics.yaml index b5a1c8f06..2037e8dc3 100644 --- a/roles/openshift_metrics/tasks/start_metrics.yaml +++ b/roles/openshift_metrics/tasks/start_metrics.yaml @@ -20,7 +20,7 @@    loop_control:      loop_var: object    when: metrics_cassandra_rc is defined -  changed_when: "{{metrics_cassandra_rc | length > 0 }}" +  changed_when: metrics_cassandra_rc | length > 0  - command: >      {{openshift.common.client_binary}} @@ -42,7 +42,7 @@    with_items: "{{metrics_metrics_rc.stdout_lines}}"    loop_control:      loop_var: object -  changed_when: "{{metrics_metrics_rc | length > 0 }}" +  changed_when: metrics_metrics_rc | length > 0  - command: >      {{openshift.common.client_binary}} diff --git a/roles/openshift_metrics/tasks/stop_metrics.yaml b/roles/openshift_metrics/tasks/stop_metrics.yaml index f69bb0f11..9a2ce9267 100644 --- a/roles/openshift_metrics/tasks/stop_metrics.yaml +++ b/roles/openshift_metrics/tasks/stop_metrics.yaml @@ -41,7 +41,7 @@    with_items: "{{metrics_hawkular_rc.stdout_lines}}"    loop_control:      loop_var: object -  changed_when: "{{metrics_hawkular_rc | length > 0 }}" +  changed_when: metrics_hawkular_rc | length > 0  - command: >      {{openshift.common.client_binary}} --config={{mktemp.stdout}}/admin.kubeconfig @@ -63,4 +63,4 @@    loop_control:      loop_var: object    when: metrics_cassandra_rc is defined -  changed_when: "{{metrics_cassandra_rc | length > 0 }}" +  changed_when: metrics_cassandra_rc | length > 0 diff --git a/roles/openshift_metrics/tasks/uninstall_metrics.yaml b/roles/openshift_metrics/tasks/uninstall_metrics.yaml index 8a6be6237..9a5d52eb6 100644 --- a/roles/openshift_metrics/tasks/uninstall_metrics.yaml +++ b/roles/openshift_metrics/tasks/uninstall_metrics.yaml @@ -8,7 +8,7 @@      delete --ignore-not-found --selector=metrics-infra      all,sa,secrets,templates,routes,pvc,rolebindings,clusterrolebindings    register: delete_metrics -  changed_when: "delete_metrics.stdout != 'No resources found'" +  changed_when: delete_metrics.stdout != 'No resources found'  - name: remove rolebindings    command: > @@ -16,4 +16,4 @@      delete --ignore-not-found      rolebinding/hawkular-view      clusterrolebinding/heapster-cluster-reader -  changed_when: "delete_metrics.stdout != 'No resources found'" +  changed_when: delete_metrics.stdout != 'No resources found' diff --git a/roles/openshift_node/tasks/main.yml b/roles/openshift_node/tasks/main.yml index d7fea2f32..656874f56 100644 --- a/roles/openshift_node/tasks/main.yml +++ b/roles/openshift_node/tasks/main.yml @@ -147,7 +147,7 @@      - regex: '^AWS_SECRET_ACCESS_KEY='        line: "AWS_SECRET_ACCESS_KEY={{ openshift_cloudprovider_aws_secret_key | default('') }}"    no_log: True -  when: "openshift_cloudprovider_kind is defined and openshift_cloudprovider_kind == 'aws' and openshift_cloudprovider_aws_access_key is defined and openshift_cloudprovider_aws_secret_key is defined" +  when: openshift_cloudprovider_kind is defined and openshift_cloudprovider_kind == 'aws' and openshift_cloudprovider_aws_access_key is defined and openshift_cloudprovider_aws_secret_key is defined    notify:      - restart node diff --git a/roles/openshift_provisioners/tasks/install_efs.yaml b/roles/openshift_provisioners/tasks/install_efs.yaml index 57279c665..b53b6afa1 100644 --- a/roles/openshift_provisioners/tasks/install_efs.yaml +++ b/roles/openshift_provisioners/tasks/install_efs.yaml @@ -65,6 +65,6 @@      {{ openshift.common.admin_binary}} --config={{ mktemp.stdout }}/admin.kubeconfig policy      add-scc-to-user anyuid system:serviceaccount:{{openshift_provisioners_project}}:provisioners-efs    register: efs_output -  failed_when: "efs_output.rc == 1 and 'exists' not in efs_output.stderr" +  failed_when: efs_output.rc == 1 and 'exists' not in efs_output.stderr    check_mode: no    when: efs_anyuid.stdout.find("system:serviceaccount:{{openshift_provisioners_project}}:provisioners-efs") == -1 diff --git a/roles/openshift_storage_glusterfs/tasks/glusterfs_registry.yml b/roles/openshift_storage_glusterfs/tasks/glusterfs_registry.yml index 9f092d5d5..6d02d2090 100644 --- a/roles/openshift_storage_glusterfs/tasks/glusterfs_registry.yml +++ b/roles/openshift_storage_glusterfs/tasks/glusterfs_registry.yml @@ -45,4 +45,4 @@  - name: Create GlusterFS registry volume    command: "heketi-cli -s http://{{ openshift_storage_glusterfs_heketi_url }} --user admin --secret '{{ openshift_storage_glusterfs_heketi_admin_key }}' volume create --size={{ openshift.hosted.registry.storage.volume.size | replace('Gi','') }} --name={{ openshift.hosted.registry.storage.glusterfs.path }}" -  when: "'{{ openshift.hosted.registry.storage.glusterfs.path }}' not in registry_volume.stdout" +  when: "'openshift.hosted.registry.storage.glusterfs.path' not in registry_volume.stdout" diff --git a/roles/openshift_storage_glusterfs/tasks/heketi_deploy_part2.yml b/roles/openshift_storage_glusterfs/tasks/heketi_deploy_part2.yml index 84b85e95d..778b5a673 100644 --- a/roles/openshift_storage_glusterfs/tasks/heketi_deploy_part2.yml +++ b/roles/openshift_storage_glusterfs/tasks/heketi_deploy_part2.yml @@ -14,7 +14,7 @@  # Need `command` here because heketi-storage.json contains multiple objects.  - name: Copy heketi DB to GlusterFS volume    command: "{{ openshift.common.client_binary }} --config={{ mktemp.stdout }}/admin.kubeconfig create -f {{ mktemp.stdout }}/heketi-storage.json -n {{ openshift_storage_glusterfs_namespace }}" -  when: "setup_storage.rc == 0" +  when: setup_storage.rc == 0  - name: Wait for copy job to finish    oc_obj: @@ -34,7 +34,7 @@    - "heketi_job.results.results | count > 0"    # Fail when pod's 'Failed' status is True    - "heketi_job.results.results | oo_collect(attribute='status.conditions') | oo_collect(attribute='status', filters={'type': 'Failed'}) | map('bool') | select | list | count == 1" -  when: "setup_storage.rc == 0" +  when: setup_storage.rc == 0  - name: Delete deploy resources    oc_obj: diff --git a/roles/openshift_storage_glusterfs/tasks/main.yml b/roles/openshift_storage_glusterfs/tasks/main.yml index 265a3cc6e..71c4a2732 100644 --- a/roles/openshift_storage_glusterfs/tasks/main.yml +++ b/roles/openshift_storage_glusterfs/tasks/main.yml @@ -163,7 +163,7 @@  - name: Load heketi topology    command: "heketi-cli -s http://{{ openshift_storage_glusterfs_heketi_url }} --user admin --secret '{{ openshift_storage_glusterfs_heketi_admin_key }}' topology load --json={{ mktemp.stdout }}/topology.json 2>&1"    register: topology_load -  failed_when: "topology_load.rc != 0 or 'Unable' in topology_load.stdout" +  failed_when: topology_load.rc != 0 or 'Unable' in topology_load.stdout    when:    - openshift_storage_glusterfs_is_native    - openshift_storage_glusterfs_heketi_topology_load @@ -172,7 +172,7 @@    when: openshift_storage_glusterfs_heketi_is_native and openshift_storage_glusterfs_heketi_is_missing  - include: glusterfs_registry.yml -  when: "openshift.hosted.registry.storage.kind == 'glusterfs'" +  when: openshift.hosted.registry.storage.kind == 'glusterfs'  - name: Delete temp directory    file: diff --git a/roles/os_firewall/tasks/firewall/firewalld.yml b/roles/os_firewall/tasks/firewall/firewalld.yml index 4b2979887..509655b0c 100644 --- a/roles/os_firewall/tasks/firewall/firewalld.yml +++ b/roles/os_firewall/tasks/firewall/firewalld.yml @@ -14,7 +14,7 @@      - iptables      - ip6tables    register: task_result -  failed_when: "task_result|failed and 'could not' not in task_result.msg|lower" +  failed_when: task_result|failed and 'could not' not in task_result.msg|lower  - name: Wait 10 seconds after disabling iptables    pause: diff --git a/roles/os_firewall/tasks/firewall/iptables.yml b/roles/os_firewall/tasks/firewall/iptables.yml index 38ea2477c..55f2fc471 100644 --- a/roles/os_firewall/tasks/firewall/iptables.yml +++ b/roles/os_firewall/tasks/firewall/iptables.yml @@ -7,7 +7,7 @@      enabled: no      masked: yes    register: task_result -  failed_when: "task_result|failed and 'could not' not in task_result.msg|lower" +  failed_when: task_result|failed and 'could not' not in task_result.msg|lower  - name: Wait 10 seconds after disabling firewalld    pause:  | 
