04d1a0438c
Some cephx keys (manila) have specail features enabled via quoted words in their capabilities list. The initial key is created on the file system with escaped quotes (\"auth del\" and \"auth caps\"). However the output of ceph auth get does not excape these quotes. This results in the grep in unless satement always failing and causing the key to be reimported multiple times. A Ceph tracker issue has been opend to for this issue. (1) 1: http://tracker.ceph.com/issues/22227 Change-Id: I2cf6d3ded28d2d37c10fbe9ffb29822b744a561c
193 lines
5.5 KiB
Puppet
193 lines
5.5 KiB
Puppet
#
|
|
# Copyright (C) 2014 Catalyst IT Limited.
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
# you may not use this file except in compliance with the License.
|
|
# You may obtain a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
# See the License for the specific language governing permissions and
|
|
# limitations under the License.
|
|
#
|
|
# Author: Ricardo Rocha <ricardo@catalyst.net.nz>
|
|
#
|
|
# Handles ceph keys (cephx), generates keys, creates keyring files, injects
|
|
# keys into or delete keys from the cluster/keyring via ceph and ceph-authtool
|
|
# tools.
|
|
#
|
|
# == Define: ceph::key
|
|
#
|
|
# The full ceph ID name, e.g. 'client.admin' or 'mon.'.
|
|
#
|
|
# === Parameters:
|
|
#
|
|
# [*secret*] Key secret.
|
|
# Mandatory. Can be created with ceph-authtool --gen-print-key.
|
|
#
|
|
# [*cluster*] The ceph cluster
|
|
# Optional. Same default as ceph.
|
|
#
|
|
# [*keyring_path*] Path to the keyring file.
|
|
# Optional. Absolute path to the keyring file, including the file name.
|
|
# Defaults to /etc/ceph/ceph.${name}.keyring.
|
|
#
|
|
# [*cap_mon*] cephx capabilities for MON access.
|
|
# Optional. e.g. 'allow *'
|
|
# Defaults to 'undef'.
|
|
#
|
|
# [*cap_osd*] cephx capabilities for OSD access.
|
|
# Optional. e.g. 'allow *'
|
|
# Defaults to 'undef'.
|
|
#
|
|
# [*cap_mds*] cephx capabilities for MDS access.
|
|
# Optional. e.g. 'allow *'
|
|
# Defaults to 'undef'.
|
|
#
|
|
# [*cap_mgr*] cephx capabilities for MGR access.
|
|
# Optional. e.g. 'allow *'
|
|
# Defaults to 'undef'.
|
|
#
|
|
# [*user*] Owner of the *keyring_path* file.
|
|
# Optional. Defaults to 'root'.
|
|
#
|
|
# [*group*] Group of the *keyring_path* file.
|
|
# Optional. Defaults to 'root'.
|
|
#
|
|
# [*mode*] Mode (permissions) of the *keyring_path* file.
|
|
# Optional. Defaults to 0600.
|
|
#
|
|
# [*inject*] True if the key should be injected into the cluster.
|
|
# Optional. Boolean value (true to inject the key).
|
|
# Default to false.
|
|
#
|
|
# [*inject_as_id*] the ceph ID used to inject the key Optional. Only
|
|
# taken into account if 'inject' was set to true, in which case it
|
|
# overrides the ceph default if set to a value other than
|
|
# undef. Default to undef.
|
|
#
|
|
# [*inject_keyring*] keyring file with injection credentials
|
|
# Optional. Only taken into account if 'inject' was set to true. If
|
|
# set to a value other than undef, it overrides the ceph default
|
|
# inferred from the client name. Default to undef.
|
|
#
|
|
define ceph::key (
|
|
$secret,
|
|
$cluster = undef,
|
|
$keyring_path = "/etc/ceph/ceph.${name}.keyring",
|
|
$cap_mon = undef,
|
|
$cap_osd = undef,
|
|
$cap_mds = undef,
|
|
$cap_mgr = undef,
|
|
$user = 'root',
|
|
$group = 'root',
|
|
$mode = '0600',
|
|
$inject = false,
|
|
$inject_as_id = undef,
|
|
$inject_keyring = undef,
|
|
) {
|
|
|
|
if $cluster {
|
|
$cluster_option = "--cluster ${cluster}"
|
|
} else
|
|
{
|
|
$cluster_option = ''
|
|
}
|
|
|
|
if $cap_mon {
|
|
$mon_caps = "--cap mon '${cap_mon}' "
|
|
} else {
|
|
$mon_caps = ''
|
|
}
|
|
if $cap_osd {
|
|
$osd_caps = "--cap osd '${cap_osd}' "
|
|
} else {
|
|
$osd_caps = ''
|
|
}
|
|
if $cap_mds {
|
|
$mds_caps = "--cap mds '${cap_mds}' "
|
|
} else {
|
|
$mds_caps = ''
|
|
}
|
|
if $cap_mgr {
|
|
$mgr_caps = "--cap mgr '${cap_mgr}' "
|
|
} else {
|
|
$mgr_caps = ''
|
|
}
|
|
|
|
$caps = "${mon_caps}${osd_caps}${mds_caps}${mgr_caps}"
|
|
|
|
# this allows multiple defines for the same 'keyring file',
|
|
# which is supported by ceph-authtool
|
|
if ! defined(File[$keyring_path]) {
|
|
file { $keyring_path:
|
|
ensure => file,
|
|
owner => $user,
|
|
group => $group,
|
|
mode => $mode,
|
|
selinux_ignore_defaults => true,
|
|
require => Package[$::ceph::params::packages],
|
|
}
|
|
}
|
|
|
|
# ceph-authtool --add-key is idempotent, will just update pre-existing keys
|
|
exec { "ceph-key-${name}":
|
|
command => "/bin/true # comment to satisfy puppet syntax requirements
|
|
set -ex
|
|
ceph-authtool ${keyring_path} --name '${name}' --add-key '${secret}' ${caps}",
|
|
unless => "/bin/true # comment to satisfy puppet syntax requirements
|
|
set -x
|
|
NEW_KEYRING=\$(mktemp)
|
|
ceph-authtool \$NEW_KEYRING --name '${name}' --add-key '${secret}' ${caps}
|
|
diff -N \$NEW_KEYRING ${keyring_path}
|
|
rv=\$?
|
|
rm \$NEW_KEYRING
|
|
exit \$rv",
|
|
require => [ File[$keyring_path], ],
|
|
logoutput => true,
|
|
}
|
|
|
|
if $inject {
|
|
|
|
if $inject_as_id {
|
|
$inject_id_option = " --name '${inject_as_id}' "
|
|
}
|
|
else {
|
|
$inject_id_option = ''
|
|
}
|
|
|
|
if $inject_keyring {
|
|
$inject_keyring_option = " --keyring '${inject_keyring}' "
|
|
}
|
|
else {
|
|
$inject_keyring_option = ''
|
|
}
|
|
|
|
Ceph_config<||> -> Exec["ceph-injectkey-${name}"]
|
|
Ceph::Mon<||> -> Exec["ceph-injectkey-${name}"]
|
|
# ceph auth import is idempotent, will just update pre-existing keys
|
|
exec { "ceph-injectkey-${name}":
|
|
command => "/bin/true # comment to satisfy puppet syntax requirements
|
|
set -ex
|
|
ceph ${cluster_option} ${inject_id_option} ${inject_keyring_option} auth import -i ${keyring_path}",
|
|
unless => "/bin/true # comment to satisfy puppet syntax requirements
|
|
set -x
|
|
OLD_KEYRING=\$(mktemp)
|
|
TMP_KEYRING=\$(mktemp)
|
|
cat ${keyring_path} | sed -e 's/\\\\//g' > \$TMP_KEYRING
|
|
ceph ${cluster_option} ${inject_id_option} ${inject_keyring_option} auth get ${name} -o \$OLD_KEYRING || true
|
|
diff -N \$OLD_KEYRING \$TMP_KEYRING
|
|
rv=$?
|
|
rm \$OLD_KEYRING
|
|
rm \$TMP_KEYRING
|
|
exit \$rv",
|
|
require => [ Class['ceph'], Exec["ceph-key-${name}"], ],
|
|
logoutput => true,
|
|
}
|
|
|
|
}
|
|
}
|