mirror of https://github.com/ansible/ansible.git
inventory_plugins: Add kubevirt inventory plugin
Signed-off-by: Ondra Machacek <omachace@redhat.com>pull/55115/head
parent
b41c6fcdd4
commit
af528bed80
@ -0,0 +1,263 @@
|
|||||||
|
# Copyright (c) 2018 Ansible Project
|
||||||
|
# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt)
|
||||||
|
|
||||||
|
from __future__ import (absolute_import, division, print_function)
|
||||||
|
|
||||||
|
__metaclass__ = type
|
||||||
|
|
||||||
|
DOCUMENTATION = '''
|
||||||
|
name: kubevirt
|
||||||
|
plugin_type: inventory
|
||||||
|
author:
|
||||||
|
- KubeVirt Team (@kubevirt)
|
||||||
|
|
||||||
|
version_added: "2.8"
|
||||||
|
short_description: KubeVirt inventory source
|
||||||
|
extends_documentation_fragment:
|
||||||
|
- inventory_cache
|
||||||
|
- constructed
|
||||||
|
description:
|
||||||
|
- Fetch running VirtualMachines for one or more namespaces.
|
||||||
|
- Groups by namespace, namespace_vms and labels.
|
||||||
|
- Uses kubevirt.(yml|yaml) YAML configuration file to set parameter values.
|
||||||
|
|
||||||
|
options:
|
||||||
|
plugin:
|
||||||
|
description: token that ensures this is a source file for the 'kubevirt' plugin.
|
||||||
|
required: True
|
||||||
|
choices: ['kubevirt']
|
||||||
|
type: str
|
||||||
|
host_format:
|
||||||
|
description:
|
||||||
|
- Specify the format of the host in the inventory group.
|
||||||
|
default: "{namespace}-{name}-{uid}"
|
||||||
|
connections:
|
||||||
|
type: list
|
||||||
|
description:
|
||||||
|
- Optional list of cluster connection settings. If no connections are provided, the default
|
||||||
|
I(~/.kube/config) and active context will be used, and objects will be returned for all namespaces
|
||||||
|
the active user is authorized to access.
|
||||||
|
suboptions:
|
||||||
|
name:
|
||||||
|
description:
|
||||||
|
- Optional name to assign to the cluster. If not provided, a name is constructed from the server
|
||||||
|
and port.
|
||||||
|
type: str
|
||||||
|
kubeconfig:
|
||||||
|
description:
|
||||||
|
- Path to an existing Kubernetes config file. If not provided, and no other connection
|
||||||
|
options are provided, the OpenShift client will attempt to load the default
|
||||||
|
configuration file from I(~/.kube/config.json). Can also be specified via K8S_AUTH_KUBECONFIG
|
||||||
|
environment variable.
|
||||||
|
type: str
|
||||||
|
context:
|
||||||
|
description:
|
||||||
|
- The name of a context found in the config file. Can also be specified via K8S_AUTH_CONTEXT environment
|
||||||
|
variable.
|
||||||
|
type: str
|
||||||
|
host:
|
||||||
|
description:
|
||||||
|
- Provide a URL for accessing the API. Can also be specified via K8S_AUTH_HOST environment variable.
|
||||||
|
type: str
|
||||||
|
api_key:
|
||||||
|
description:
|
||||||
|
- Token used to authenticate with the API. Can also be specified via K8S_AUTH_API_KEY environment
|
||||||
|
variable.
|
||||||
|
type: str
|
||||||
|
username:
|
||||||
|
description:
|
||||||
|
- Provide a username for authenticating with the API. Can also be specified via K8S_AUTH_USERNAME
|
||||||
|
environment variable.
|
||||||
|
type: str
|
||||||
|
password:
|
||||||
|
description:
|
||||||
|
- Provide a password for authenticating with the API. Can also be specified via K8S_AUTH_PASSWORD
|
||||||
|
environment variable.
|
||||||
|
type: str
|
||||||
|
cert_file:
|
||||||
|
description:
|
||||||
|
- Path to a certificate used to authenticate with the API. Can also be specified via K8S_AUTH_CERT_FILE
|
||||||
|
environment variable.
|
||||||
|
type: str
|
||||||
|
key_file:
|
||||||
|
description:
|
||||||
|
- Path to a key file used to authenticate with the API. Can also be specified via K8S_AUTH_HOST
|
||||||
|
environment variable.
|
||||||
|
type: str
|
||||||
|
ssl_ca_cert:
|
||||||
|
description:
|
||||||
|
- Path to a CA certificate used to authenticate with the API. Can also be specified via
|
||||||
|
K8S_AUTH_SSL_CA_CERT environment variable.
|
||||||
|
type: str
|
||||||
|
verify_ssl:
|
||||||
|
description:
|
||||||
|
- "Whether or not to verify the API server's SSL certificates. Can also be specified via
|
||||||
|
K8S_AUTH_VERIFY_SSL environment variable."
|
||||||
|
type: bool
|
||||||
|
namespaces:
|
||||||
|
description:
|
||||||
|
- List of namespaces. If not specified, will fetch all virtual machines for all namespaces user is authorized
|
||||||
|
to access.
|
||||||
|
type: list
|
||||||
|
network_name:
|
||||||
|
description:
|
||||||
|
- In case of multiple network attached to virtual machine, define which interface should be returned as primary IP
|
||||||
|
address.
|
||||||
|
type: str
|
||||||
|
api_version:
|
||||||
|
description:
|
||||||
|
- "Specify the KubeVirt API version."
|
||||||
|
type: str
|
||||||
|
annotation_variable:
|
||||||
|
description:
|
||||||
|
- "Specify the name of the annotation which provides data, which should be used as inventory host variables."
|
||||||
|
- "Note, that the value in ansible annotations should be json."
|
||||||
|
type: str
|
||||||
|
default: 'ansible'
|
||||||
|
requirements:
|
||||||
|
- "openshift >= 0.6"
|
||||||
|
- "PyYAML >= 3.11"
|
||||||
|
'''
|
||||||
|
|
||||||
|
EXAMPLES = '''
|
||||||
|
# File must be named kubevirt.yaml or kubevirt.yml
|
||||||
|
|
||||||
|
# Authenticate with token, and return all virtual machines for all namespaces
|
||||||
|
plugin: kubevirt
|
||||||
|
connections:
|
||||||
|
- host: https://kubevirt.io
|
||||||
|
token: xxxxxxxxxxxxxxxx
|
||||||
|
ssl_verify: false
|
||||||
|
|
||||||
|
# Use default config (~/.kube/config) file and active context, and return vms with interfaces
|
||||||
|
# connected to network myovsnetwork and from namespace vms
|
||||||
|
plugin: kubevirt
|
||||||
|
connections:
|
||||||
|
- namespaces:
|
||||||
|
- vms
|
||||||
|
network_name: myovsnetwork
|
||||||
|
'''
|
||||||
|
|
||||||
|
import json
|
||||||
|
|
||||||
|
from ansible.plugins.inventory.k8s import K8sInventoryException, InventoryModule as K8sInventoryModule, format_dynamic_api_exc
|
||||||
|
|
||||||
|
try:
|
||||||
|
from openshift.dynamic.exceptions import DynamicApiError
|
||||||
|
except ImportError:
|
||||||
|
pass
|
||||||
|
|
||||||
|
|
||||||
|
API_VERSION = 'kubevirt.io/v1alpha3'
|
||||||
|
|
||||||
|
|
||||||
|
class InventoryModule(K8sInventoryModule):
|
||||||
|
NAME = 'kubevirt'
|
||||||
|
|
||||||
|
def setup(self, config_data, cache, cache_key):
|
||||||
|
self.config_data = config_data
|
||||||
|
super(InventoryModule, self).setup(config_data, cache, cache_key)
|
||||||
|
|
||||||
|
def fetch_objects(self, connections):
|
||||||
|
client = self.get_api_client()
|
||||||
|
vm_format = self.config_data.get('host_format', '{namespace}-{name}-{uid}')
|
||||||
|
|
||||||
|
if connections:
|
||||||
|
for connection in connections:
|
||||||
|
client = self.get_api_client(**connection)
|
||||||
|
name = connection.get('name', self.get_default_host_name(client.configuration.host))
|
||||||
|
if connection.get('namespaces'):
|
||||||
|
namespaces = connection['namespaces']
|
||||||
|
else:
|
||||||
|
namespaces = self.get_available_namespaces(client)
|
||||||
|
interface_name = connection.get('network_name')
|
||||||
|
api_version = connection.get('api_version', API_VERSION)
|
||||||
|
annotation_variable = connection.get('annotation_variable', 'ansible')
|
||||||
|
for namespace in namespaces:
|
||||||
|
self.get_vms_for_namespace(client, name, namespace, vm_format, interface_name, api_version, annotation_variable)
|
||||||
|
else:
|
||||||
|
name = self.get_default_host_name(client.configuration.host)
|
||||||
|
namespaces = self.get_available_namespaces(client)
|
||||||
|
for namespace in namespaces:
|
||||||
|
self.get_vms_for_namespace(client, name, namespace, vm_format, None, api_version, annotation_variable)
|
||||||
|
|
||||||
|
def get_vms_for_namespace(self, client, name, namespace, name_format, interface_name=None, api_version=None, annotation_variable=None):
|
||||||
|
v1_vm = client.resources.get(api_version=api_version, kind='VirtualMachineInstance')
|
||||||
|
try:
|
||||||
|
obj = v1_vm.get(namespace=namespace)
|
||||||
|
except DynamicApiError as exc:
|
||||||
|
self.display.debug(exc)
|
||||||
|
raise K8sInventoryException('Error fetching Virtual Machines list: %s' % format_dynamic_api_exc(exc))
|
||||||
|
|
||||||
|
namespace_group = 'namespace_{0}'.format(namespace)
|
||||||
|
namespace_vms_group = '{0}_vms'.format(namespace_group)
|
||||||
|
|
||||||
|
name = self._sanitize_group_name(name)
|
||||||
|
namespace_group = self._sanitize_group_name(namespace_group)
|
||||||
|
namespace_vms_group = self._sanitize_group_name(namespace_vms_group)
|
||||||
|
self.inventory.add_group(name)
|
||||||
|
self.inventory.add_group(namespace_group)
|
||||||
|
self.inventory.add_child(name, namespace_group)
|
||||||
|
self.inventory.add_group(namespace_vms_group)
|
||||||
|
self.inventory.add_child(namespace_group, namespace_vms_group)
|
||||||
|
for vm in obj.items:
|
||||||
|
if not (vm.status and vm.status.interfaces):
|
||||||
|
continue
|
||||||
|
|
||||||
|
# Find interface by its name:
|
||||||
|
if interface_name is None:
|
||||||
|
interface = vm.status.interfaces[0]
|
||||||
|
else:
|
||||||
|
interface = next(
|
||||||
|
(i for i in vm.status.interfaces if i.name == interface_name),
|
||||||
|
None
|
||||||
|
)
|
||||||
|
|
||||||
|
# If interface is not found or IP address is not reported skip this VM:
|
||||||
|
if interface is None or interface.ipAddress is None:
|
||||||
|
continue
|
||||||
|
|
||||||
|
vm_name = name_format.format(namespace=vm.metadata.namespace, name=vm.metadata.name, uid=vm.metadata.uid)
|
||||||
|
vm_ip = interface.ipAddress
|
||||||
|
vm_annotations = {} if not vm.metadata.annotations else dict(vm.metadata.annotations)
|
||||||
|
|
||||||
|
self.inventory.add_host(vm_name)
|
||||||
|
|
||||||
|
if vm.metadata.labels:
|
||||||
|
# create a group for each label_value
|
||||||
|
for key, value in vm.metadata.labels:
|
||||||
|
group_name = 'label_{0}_{1}'.format(key, value)
|
||||||
|
group_name = self._sanitize_group_name(group_name)
|
||||||
|
self.inventory.add_group(group_name)
|
||||||
|
self.inventory.add_child(group_name, vm_name)
|
||||||
|
vm_labels = dict(vm.metadata.labels)
|
||||||
|
else:
|
||||||
|
vm_labels = {}
|
||||||
|
|
||||||
|
self.inventory.add_child(namespace_vms_group, vm_name)
|
||||||
|
|
||||||
|
# add hostvars
|
||||||
|
self.inventory.set_variable(vm_name, 'ansible_host', vm_ip)
|
||||||
|
self.inventory.set_variable(vm_name, 'labels', vm_labels)
|
||||||
|
self.inventory.set_variable(vm_name, 'annotations', vm_annotations)
|
||||||
|
self.inventory.set_variable(vm_name, 'object_type', 'vm')
|
||||||
|
self.inventory.set_variable(vm_name, 'resource_version', vm.metadata.resourceVersion)
|
||||||
|
self.inventory.set_variable(vm_name, 'uid', vm.metadata.uid)
|
||||||
|
|
||||||
|
# Add all variables which are listed in 'ansible' annotation:
|
||||||
|
annotations_data = json.loads(vm_annotations.get(annotation_variable, "{}"))
|
||||||
|
for k, v in annotations_data.items():
|
||||||
|
self.inventory.set_variable(vm_name, k, v)
|
||||||
|
|
||||||
|
def verify_file(self, path):
|
||||||
|
if super(InventoryModule, self).verify_file(path):
|
||||||
|
if path.endswith(('kubevirt.yml', 'kubevirt.yaml')):
|
||||||
|
return True
|
||||||
|
return False
|
||||||
|
|
||||||
|
def _sanitize_group_name(self, name):
|
||||||
|
""" Replace unsupported charactes in group name by underscore character """
|
||||||
|
name = name.replace('/', '_')
|
||||||
|
name = name.replace('.', '_')
|
||||||
|
name = name.replace('-', '_')
|
||||||
|
return name
|
@ -0,0 +1 @@
|
|||||||
|
shippable/posix/group2
|
@ -0,0 +1,67 @@
|
|||||||
|
#!/usr/bin/env python
|
||||||
|
|
||||||
|
import json
|
||||||
|
import sys
|
||||||
|
|
||||||
|
|
||||||
|
def check_hosts(contrib, plugin):
|
||||||
|
contrib_hosts = sorted(contrib['_meta']['hostvars'].keys())
|
||||||
|
plugin_hosts = sorted(plugin['_meta']['hostvars'].keys())
|
||||||
|
assert contrib_hosts == plugin_hosts
|
||||||
|
return contrib_hosts, plugin_hosts
|
||||||
|
|
||||||
|
|
||||||
|
def check_groups(contrib, plugin):
|
||||||
|
contrib_groups = set(contrib.keys())
|
||||||
|
plugin_groups = set(plugin.keys())
|
||||||
|
missing_groups = contrib_groups.difference(plugin_groups)
|
||||||
|
if missing_groups:
|
||||||
|
print("groups: %s are missing from the plugin" % missing_groups)
|
||||||
|
assert not missing_groups
|
||||||
|
return contrib_groups, plugin_groups
|
||||||
|
|
||||||
|
|
||||||
|
def check_host_vars(key, value, plugin, host):
|
||||||
|
# tags are a dict in the plugin
|
||||||
|
if key.startswith('ec2_tag'):
|
||||||
|
print('assert tag', key, value)
|
||||||
|
assert 'tags' in plugin['_meta']['hostvars'][host], 'b file does not have tags in host'
|
||||||
|
btags = plugin['_meta']['hostvars'][host]['tags']
|
||||||
|
tagkey = key.replace('ec2_tag_', '')
|
||||||
|
assert tagkey in btags, '%s tag not in b file host tags' % tagkey
|
||||||
|
assert value == btags[tagkey], '%s != %s' % (value, btags[tagkey])
|
||||||
|
else:
|
||||||
|
print('assert var', key, value, key in plugin['_meta']['hostvars'][host], plugin['_meta']['hostvars'][host].get(key))
|
||||||
|
assert key in plugin['_meta']['hostvars'][host], "%s not in b's %s hostvars" % (key, host)
|
||||||
|
assert value == plugin['_meta']['hostvars'][host][key], "%s != %s" % (value, plugin['_meta']['hostvars'][host][key])
|
||||||
|
|
||||||
|
|
||||||
|
def main():
|
||||||
|
# a should be the source of truth (the script output)
|
||||||
|
a = sys.argv[1]
|
||||||
|
# b should be the thing to check (the plugin output)
|
||||||
|
b = sys.argv[2]
|
||||||
|
|
||||||
|
with open(a, 'r') as f:
|
||||||
|
adata = json.loads(f.read())
|
||||||
|
with open(b, 'r') as f:
|
||||||
|
bdata = json.loads(f.read())
|
||||||
|
|
||||||
|
print(adata)
|
||||||
|
print(bdata)
|
||||||
|
|
||||||
|
# all hosts should be present obviously
|
||||||
|
ahosts, bhosts = check_hosts(adata, bdata)
|
||||||
|
|
||||||
|
# all groups should be present obviously
|
||||||
|
agroups, bgroups = check_groups(adata, bdata)
|
||||||
|
|
||||||
|
# check host vars can be reconstructed
|
||||||
|
for ahost in ahosts:
|
||||||
|
contrib_host_vars = adata['_meta']['hostvars'][ahost]
|
||||||
|
for key, value in contrib_host_vars.items():
|
||||||
|
check_host_vars(key, value, bdata, ahost)
|
||||||
|
|
||||||
|
|
||||||
|
if __name__ == "__main__":
|
||||||
|
main()
|
@ -0,0 +1,61 @@
|
|||||||
|
#!/usr/bin/env bash
|
||||||
|
|
||||||
|
if [[ $(python --version 2>&1) =~ 2\.6 ]]
|
||||||
|
then
|
||||||
|
echo "Openshift client is not supported on Python 2.6"
|
||||||
|
exit 0
|
||||||
|
fi
|
||||||
|
|
||||||
|
set -eux
|
||||||
|
|
||||||
|
source virtualenv.sh
|
||||||
|
pip install openshift
|
||||||
|
|
||||||
|
./server.py &
|
||||||
|
|
||||||
|
# Fake auth file
|
||||||
|
mkdir -p ~/.kube/
|
||||||
|
cat <<EOF > ~/.kube/config
|
||||||
|
apiVersion: v1
|
||||||
|
clusters:
|
||||||
|
- cluster:
|
||||||
|
insecure-skip-tls-verify: true
|
||||||
|
server: http://localhost:12345
|
||||||
|
name: development
|
||||||
|
contexts:
|
||||||
|
- context:
|
||||||
|
cluster: development
|
||||||
|
user: developer
|
||||||
|
name: dev-frontend
|
||||||
|
current-context: dev-frontend
|
||||||
|
kind: Config
|
||||||
|
preferences: {}
|
||||||
|
users:
|
||||||
|
- name: developer
|
||||||
|
user:
|
||||||
|
token: ZDNg7LzSlp8a0u0fht_tRnPMTOjxqgJGCyi_iy0ecUw
|
||||||
|
EOF
|
||||||
|
|
||||||
|
#################################################
|
||||||
|
# RUN THE PLUGIN
|
||||||
|
#################################################
|
||||||
|
|
||||||
|
# run the plugin second
|
||||||
|
export ANSIBLE_INVENTORY_ENABLED=kubevirt
|
||||||
|
export ANSIBLE_INVENTORY=test.kubevirt.yml
|
||||||
|
|
||||||
|
cat << EOF > "$OUTPUT_DIR/test.kubevirt.yml"
|
||||||
|
plugin: kubevirt
|
||||||
|
connections:
|
||||||
|
- namespaces:
|
||||||
|
- default
|
||||||
|
EOF
|
||||||
|
|
||||||
|
ANSIBLE_JINJA2_NATIVE=1 ansible-inventory -vvvv -i "$OUTPUT_DIR/test.kubevirt.yml" --list --output="$OUTPUT_DIR/plugin.out"
|
||||||
|
kill -9 "$(jobs -p)"
|
||||||
|
|
||||||
|
#################################################
|
||||||
|
# DIFF THE RESULTS
|
||||||
|
#################################################
|
||||||
|
|
||||||
|
./inventory_diff.py "$(pwd)/test.out" "$OUTPUT_DIR/plugin.out"
|
@ -0,0 +1,161 @@
|
|||||||
|
#!/usr/bin/env python
|
||||||
|
|
||||||
|
import json
|
||||||
|
import os
|
||||||
|
|
||||||
|
try:
|
||||||
|
from http.server import HTTPServer
|
||||||
|
from http.server import SimpleHTTPRequestHandler
|
||||||
|
except ImportError:
|
||||||
|
from BaseHTTPServer import HTTPServer
|
||||||
|
from SimpleHTTPServer import SimpleHTTPRequestHandler
|
||||||
|
|
||||||
|
from threading import Thread
|
||||||
|
|
||||||
|
try:
|
||||||
|
from urllib.parse import urlparse
|
||||||
|
except ImportError:
|
||||||
|
from urlparse import urlparse
|
||||||
|
|
||||||
|
|
||||||
|
class TestHandler(SimpleHTTPRequestHandler):
|
||||||
|
# Path handlers:
|
||||||
|
handlers = {}
|
||||||
|
|
||||||
|
def log_message(self, format, *args):
|
||||||
|
"""
|
||||||
|
Empty method, so we don't mix output of HTTP server with tests
|
||||||
|
"""
|
||||||
|
pass
|
||||||
|
|
||||||
|
def do_GET(self):
|
||||||
|
params = urlparse(self.path)
|
||||||
|
|
||||||
|
if params.path in self.handlers:
|
||||||
|
self.handlers[params.path](self)
|
||||||
|
else:
|
||||||
|
SimpleHTTPRequestHandler.do_GET(self)
|
||||||
|
|
||||||
|
def do_POST(self):
|
||||||
|
params = urlparse(self.path)
|
||||||
|
|
||||||
|
if params.path in self.handlers:
|
||||||
|
self.handlers[params.path](self)
|
||||||
|
else:
|
||||||
|
SimpleHTTPRequestHandler.do_POST(self)
|
||||||
|
|
||||||
|
|
||||||
|
class TestServer(object):
|
||||||
|
# The host and port and path used by the embedded tests web server:
|
||||||
|
PORT = None
|
||||||
|
|
||||||
|
# The embedded web server:
|
||||||
|
_httpd = None
|
||||||
|
# Thread for http server:
|
||||||
|
_thread = None
|
||||||
|
|
||||||
|
def set_json_response(self, path, code, body):
|
||||||
|
def _handle_request(handler):
|
||||||
|
handler.send_response(code)
|
||||||
|
handler.send_header('Content-Type', 'application/json')
|
||||||
|
handler.end_headers()
|
||||||
|
|
||||||
|
data = json.dumps(body, ensure_ascii=False).encode('utf-8')
|
||||||
|
handler.wfile.write(data)
|
||||||
|
|
||||||
|
TestHandler.handlers[path] = _handle_request
|
||||||
|
|
||||||
|
def start_server(self, host='localhost'):
|
||||||
|
self._httpd = HTTPServer((host, 12345), TestHandler)
|
||||||
|
self._thread = Thread(target=self._httpd.serve_forever)
|
||||||
|
self._thread.start()
|
||||||
|
|
||||||
|
def stop_server(self):
|
||||||
|
self._httpd.shutdown()
|
||||||
|
self._thread.join()
|
||||||
|
|
||||||
|
|
||||||
|
if __name__ == '__main__':
|
||||||
|
print(os.getpid())
|
||||||
|
server = TestServer()
|
||||||
|
server.start_server()
|
||||||
|
server.set_json_response(path="/version", code=200, body={})
|
||||||
|
server.set_json_response(path="/api", code=200, body={
|
||||||
|
"kind": "APIVersions", "versions": ["v1"], "serverAddressByClientCIDRs": [{"clientCIDR": "0.0.0.0/0", "serverAddress": "localhost:12345"}]
|
||||||
|
})
|
||||||
|
server.set_json_response(path="/api/v1", code=200, body={'resources': {}})
|
||||||
|
server.set_json_response(path="/apis", code=200, body={
|
||||||
|
"kind": "APIGroupList", "apiVersion": "v1",
|
||||||
|
"groups": [{
|
||||||
|
"name": "kubevirt.io", "versions": [{"groupVersion": "kubevirt.io/v1alpha3", "version": "v1alpha3"}],
|
||||||
|
"preferredVersion": {"groupVersion": "kubevirt.io/v1alpha3", "version": "v1alpha3"}
|
||||||
|
}]
|
||||||
|
})
|
||||||
|
server.set_json_response(
|
||||||
|
path="/apis/kubevirt.io/v1alpha3",
|
||||||
|
code=200,
|
||||||
|
body={
|
||||||
|
"kind": "APIResourceList", "apiVersion": "v1", "groupVersion": "kubevirt.io/v1alpha3",
|
||||||
|
"resources": [{
|
||||||
|
"name": "virtualmachineinstances", "singularName": "virtualmachineinstance",
|
||||||
|
"namespaced": True, "kind": "VirtualMachineInstance",
|
||||||
|
"verbs": ["delete", "deletecollection", "get", "list", "patch", "create", "update", "watch"],
|
||||||
|
"shortNames":["vmi", "vmis"]
|
||||||
|
}]
|
||||||
|
}
|
||||||
|
)
|
||||||
|
server.set_json_response(
|
||||||
|
path="/apis/kubevirt.io/v1alpha3/namespaces/default/virtualmachineinstances",
|
||||||
|
code=200,
|
||||||
|
body={'apiVersion': 'kubevirt.io/v1alpha3',
|
||||||
|
'items': [{'apiVersion': 'kubevirt.io/v1alpha3',
|
||||||
|
'kind': 'VirtualMachineInstance',
|
||||||
|
'metadata': {'annotations': {'ansible': '{"data1": "yes", "data2": "no"}'},
|
||||||
|
'creationTimestamp': '2019-04-05T14:17:02Z',
|
||||||
|
'generateName': 'myvm',
|
||||||
|
'generation': 1,
|
||||||
|
'labels': {'kubevirt.io/nodeName': 'localhost',
|
||||||
|
'label': 'x',
|
||||||
|
'vm.cnv.io/name': 'myvm'},
|
||||||
|
'name': 'myvm',
|
||||||
|
'namespace': 'default',
|
||||||
|
'ownerReferences': [{'apiVersion': 'kubevirt.io/v1alpha3',
|
||||||
|
'blockOwnerDeletion': True,
|
||||||
|
'controller': True,
|
||||||
|
'kind': 'VirtualMachine',
|
||||||
|
'name': 'myvm',
|
||||||
|
'uid': 'f78ebe62-5666-11e9-a214-0800279ffc6b'}],
|
||||||
|
'resourceVersion': '1614085',
|
||||||
|
'selfLink': '/apis/kubevirt.io/v1alpha3/namespaces/default/virtualmachineinstances/myvm',
|
||||||
|
'uid': '7ba1b196-57ad-11e9-9e2e-0800279ffc6b'},
|
||||||
|
'spec': {'domain': {'devices': {'disks': [{'disk': {'bus': 'virtio'},
|
||||||
|
'name': 'containerdisk'},
|
||||||
|
{'disk': {'bus': 'virtio'}, 'name': 'ansiblecloudinitdisk'}],
|
||||||
|
'interfaces': [{'bridge': {}, 'name': 'default'}]},
|
||||||
|
'firmware': {'uuid': 'cdf77e9e-871b-5acb-a707-80ef3d4b9849'},
|
||||||
|
'machine': {'type': ''},
|
||||||
|
'resources': {'requests': {'memory': '64M'}}},
|
||||||
|
'networks': [{'name': 'default', 'pod': {}}],
|
||||||
|
'volumes': [{'containerDisk': {'image': 'kubevirt/cirros-container-disk-demo:v0.11.0'},
|
||||||
|
'name': 'containerdisk'},
|
||||||
|
{'cloudInitNoCloud': {'userData': '#cloud-config\npassword: password\nchpasswd: { expire: False }'},
|
||||||
|
'name': 'ansiblecloudinitdisk'}]},
|
||||||
|
'status': {'conditions': [{'lastProbeTime': None,
|
||||||
|
'lastTransitionTime': None,
|
||||||
|
'status': 'True',
|
||||||
|
'type': 'LiveMigratable'},
|
||||||
|
{'lastProbeTime': None,
|
||||||
|
'lastTransitionTime': '2019-04-05T14:17:27Z',
|
||||||
|
'status': 'True',
|
||||||
|
'type': 'Ready'}],
|
||||||
|
'interfaces': [{'ipAddress': '172.17.0.19',
|
||||||
|
'mac': '02:42:ac:11:00:13',
|
||||||
|
'name': 'default'}],
|
||||||
|
'migrationMethod': 'BlockMigration',
|
||||||
|
'nodeName': 'localhost',
|
||||||
|
'phase': 'Running'}}],
|
||||||
|
'kind': 'VirtualMachineInstanceList',
|
||||||
|
'metadata': {'continue': '',
|
||||||
|
'resourceVersion': '1614862',
|
||||||
|
'selfLink': '/apis/kubevirt.io/v1alpha3/namespaces/default/virtualmachineinstances'}}
|
||||||
|
)
|
@ -0,0 +1,61 @@
|
|||||||
|
{
|
||||||
|
"_meta": {
|
||||||
|
"hostvars": {
|
||||||
|
"default-myvm-7ba1b196-57ad-11e9-9e2e-0800279ffc6b": {
|
||||||
|
"annotations": {
|
||||||
|
"ansible": "{\"data1\": \"yes\", \"data2\": \"no\"}"
|
||||||
|
},
|
||||||
|
"ansible_host": "172.17.0.19",
|
||||||
|
"data1": "yes",
|
||||||
|
"data2": "no",
|
||||||
|
"labels": {
|
||||||
|
"kubevirt.io/nodeName": "localhost",
|
||||||
|
"label": "x",
|
||||||
|
"vm.cnv.io/name": "myvm"
|
||||||
|
},
|
||||||
|
"object_type": "vm",
|
||||||
|
"resource_version": "1614085",
|
||||||
|
"uid": "7ba1b196-57ad-11e9-9e2e-0800279ffc6b"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"all": {
|
||||||
|
"children": [
|
||||||
|
"label_kubevirt_io_nodeName_localhost",
|
||||||
|
"label_label_x",
|
||||||
|
"label_vm_cnv_io_name_myvm",
|
||||||
|
"localhost_12345",
|
||||||
|
"ungrouped"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"label_kubevirt_io_nodeName_localhost": {
|
||||||
|
"hosts": [
|
||||||
|
"default-myvm-7ba1b196-57ad-11e9-9e2e-0800279ffc6b"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"label_label_x": {
|
||||||
|
"hosts": [
|
||||||
|
"default-myvm-7ba1b196-57ad-11e9-9e2e-0800279ffc6b"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"label_vm_cnv_io_name_myvm": {
|
||||||
|
"hosts": [
|
||||||
|
"default-myvm-7ba1b196-57ad-11e9-9e2e-0800279ffc6b"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"localhost_12345": {
|
||||||
|
"children": [
|
||||||
|
"namespace_default"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"namespace_default": {
|
||||||
|
"children": [
|
||||||
|
"namespace_default_vms"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"namespace_default_vms": {
|
||||||
|
"hosts": [
|
||||||
|
"default-myvm-7ba1b196-57ad-11e9-9e2e-0800279ffc6b"
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
Loading…
Reference in New Issue