mirror of
https://github.com/openshift/community.okd.git
synced 2026-03-27 03:13:08 +00:00
* Upgrade Ansible and OKD versions for CI * Use ubi9 and fix sanity * Use correct pip install * Try using quotes * Ensure python3.9 * Upgrade ansible and molecule versions * Remove DeploymentConfig DeploymentConfigs are deprecated and seem to now be causing idempotence problems. Replacing them with Deployments fixes it. * Attempt to fix ldap integration tests Signed-off-by: Alina Buzachis <abuzachis@redhat.com> * Move sanity and unit tests to GH actions Signed-off-by: Alina Buzachis <abuzachis@redhat.com> * Firt round of sanity fixes Signed-off-by: Alina Buzachis <abuzachis@redhat.com> * Add kubernetes.core collection as sanity requirement Signed-off-by: Alina Buzachis <abuzachis@redhat.com> * Add ignore-2.16.txt Signed-off-by: Alina Buzachis <abuzachis@redhat.com> * Attempt to fix units Signed-off-by: Alina Buzachis <abuzachis@redhat.com> * Add ignore-2.17 Signed-off-by: Alina Buzachis <abuzachis@redhat.com> * Attempt to fix unit tests Signed-off-by: Alina Buzachis <abuzachis@redhat.com> * Add pytest-ansible to test-requirements.txt Signed-off-by: Alina Buzachis <abuzachis@redhat.com> * Add changelog fragment Signed-off-by: Alina Buzachis <abuzachis@redhat.com> * Add workflow for ansible-lint Signed-off-by: Alina Buzachis <abuzachis@redhat.com> * Apply black Signed-off-by: Alina Buzachis <abuzachis@redhat.com> * Fix linters Signed-off-by: Alina Buzachis <abuzachis@redhat.com> * Add # fmt: skip Signed-off-by: Alina Buzachis <abuzachis@redhat.com> * Yet another round of linting Signed-off-by: Alina Buzachis <abuzachis@redhat.com> * Yet another round of linting Signed-off-by: Alina Buzachis <abuzachis@redhat.com> * Remove setup.cfg Signed-off-by: Alina Buzachis <abuzachis@redhat.com> * Revert #fmt Signed-off-by: Alina Buzachis <abuzachis@redhat.com> * Use ansible-core 2.14 Signed-off-by: Alina Buzachis <abuzachis@redhat.com> * Cleanup ansible-lint ignores Signed-off-by: Alina Buzachis <abuzachis@redhat.com> * Try using service instead of pod IP * Fix typo * Actually use the correct port * See if NetworkPolicy is preventing connection * using Pod internal IP * fix adm prune auth roles syntax * adding some retry steps * fix: openshift_builds target * add flag --force-with-deps when building downstream collection * Remove yamllint from tox linters, bump minimum python supported version to 3.9, Remove support for ansible-core < 2.14 --------- Signed-off-by: Alina Buzachis <abuzachis@redhat.com> Co-authored-by: Mike Graves <mgraves@redhat.com> Co-authored-by: Alina Buzachis <abuzachis@redhat.com>
110 lines
2.5 KiB
Python
110 lines
2.5 KiB
Python
#!/usr/bin/python
|
|
# -*- coding: utf-8 -*-
|
|
|
|
# Copyright (c) 2021, Red Hat
|
|
# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt)
|
|
|
|
from __future__ import absolute_import, division, print_function
|
|
|
|
__metaclass__ = type
|
|
|
|
# STARTREMOVE (downstream)
|
|
DOCUMENTATION = r"""
|
|
|
|
module: openshift_registry_info
|
|
|
|
short_description: Display information about the integrated registry.
|
|
|
|
version_added: "2.2.0"
|
|
|
|
author:
|
|
- Aubin Bikouo (@abikouo)
|
|
|
|
description:
|
|
- This module exposes information about the integrated registry.
|
|
- Use C(check) to verify your local client can access the registry.
|
|
- If the adminstrator has not configured a public hostname for the registry then
|
|
this command may fail when run outside of the server.
|
|
- Analogous to C(oc registry info).
|
|
|
|
extends_documentation_fragment:
|
|
- kubernetes.core.k8s_auth_options
|
|
|
|
options:
|
|
check:
|
|
description:
|
|
- Attempt to contact the integrated registry using local client.
|
|
type: bool
|
|
default: False
|
|
|
|
requirements:
|
|
- python >= 3.6
|
|
- kubernetes >= 12.0.0
|
|
- docker-image-py
|
|
"""
|
|
|
|
EXAMPLES = r"""
|
|
# Get registry information
|
|
- name: Read integrated registry information
|
|
community.okd.openshift_registry_info:
|
|
|
|
# Read registry integrated information and attempt to contact using local client.
|
|
- name: Attempt to contact integrated registry using local client
|
|
community.okd.openshift_registry_info:
|
|
check: true
|
|
"""
|
|
|
|
|
|
RETURN = r"""
|
|
internal_hostname:
|
|
description:
|
|
- The internal registry hostname.
|
|
type: str
|
|
returned: success
|
|
public_hostname:
|
|
description:
|
|
- The public registry hostname.
|
|
type: str
|
|
returned: success
|
|
check:
|
|
description:
|
|
- Whether the local client can contact or not the registry.
|
|
type: dict
|
|
returned: success
|
|
contains:
|
|
reached:
|
|
description: Whether the registry has been reached or not.
|
|
returned: success
|
|
type: str
|
|
msg:
|
|
description: message describing the ping operation.
|
|
returned: always
|
|
type: str
|
|
"""
|
|
# ENDREMOVE (downstream)
|
|
|
|
import copy
|
|
|
|
from ansible_collections.kubernetes.core.plugins.module_utils.args_common import (
|
|
AUTH_ARG_SPEC,
|
|
)
|
|
|
|
|
|
def argument_spec():
|
|
args = copy.deepcopy(AUTH_ARG_SPEC)
|
|
args.update(dict(check=dict(type="bool", default=False)))
|
|
return args
|
|
|
|
|
|
def main():
|
|
from ansible_collections.community.okd.plugins.module_utils.openshift_registry import (
|
|
OpenShiftRegistry,
|
|
)
|
|
|
|
module = OpenShiftRegistry(argument_spec=argument_spec(), supports_check_mode=True)
|
|
module.run_module()
|
|
|
|
|
|
if __name__ == "__main__":
|
|
main()
|