ansible/cloud/lxd/lxd_container.py

814 lines
28 KiB
Python
Raw Normal View History

2016-05-10 17:48:36 +02:00
#!/usr/bin/python
# -*- coding: utf-8 -*-
# (c) 2016, Hiroaki Nakamura <hnakamur@gmail.com>
#
# This file is part of Ansible
#
# Ansible is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# Ansible is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with Ansible. If not, see <http://www.gnu.org/licenses/>.
DOCUMENTATION = """
---
module: lxd_container
short_description: Manage LXD Containers
version_added: 2.2.0
description:
- Management of LXD containers
author: "Hiroaki Nakamura (@hnakamur)"
options:
name:
description:
- Name of a container.
required: true
type:
choices:
- container
- profile
description:
- The resource type.
required: false
default: container
architecture:
description:
- The archiecture for the container (e.g. "x86_64" or "i686").
See https://github.com/lxc/lxd/blob/master/doc/rest-api.md#post-1
required: false
2016-05-10 17:48:36 +02:00
config:
description:
2016-06-28 16:02:08 +02:00
- >
The config for the container (e.g. {"limits.cpu": "2"}).
2016-05-10 17:48:36 +02:00
See https://github.com/lxc/lxd/blob/master/doc/rest-api.md#post-1
- If the container already exists and its "config" value in metadata
obtained from
2016-06-04 09:43:21 +02:00
GET /1.0/containers/<name>
https://github.com/lxc/lxd/blob/master/doc/rest-api.md#10containersname
are different, they this module tries to apply the configurations.
- The key starts with 'volatile.' are ignored for this comparison.
2016-06-04 09:43:21 +02:00
- Not all config values are supported to apply the existing container.
Maybe you need to delete and recreate a container.
2016-05-10 17:48:36 +02:00
required: false
devices:
description:
2016-06-28 16:02:08 +02:00
- >
The devices for the container
(e.g. { "rootfs": { "path": "/dev/kvm", "type": "unix-char" }).
See https://github.com/lxc/lxd/blob/master/doc/rest-api.md#post-1
required: false
ephemeral:
description:
- Whether or not the container is ephemeral (e.g. true or false).
See https://github.com/lxc/lxd/blob/master/doc/rest-api.md#post-1
required: false
source:
description:
2016-06-28 16:02:08 +02:00
- >
The source for the container
(e.g. { "type": "image",
"mode": "pull",
"server": "https://images.linuxcontainers.org",
"protocol": "lxd",
"alias": "ubuntu/xenial/amd64" }).
See https://github.com/lxc/lxd/blob/master/doc/rest-api.md#post-1
required: false
new_name:
description:
- A new name of a profile.
- If this parameter is specified a profile will be renamed to this name.
required: false
2016-05-10 17:48:36 +02:00
state:
choices:
- present
2016-05-10 17:48:36 +02:00
- started
- stopped
- restarted
- absent
- frozen
description:
- Define the state of a container or profile.
- Valid choices for type=container are started, stopped, restarted,
absent, or frozen.
- Valid choices for type=profile are present or absent.
2016-05-10 17:48:36 +02:00
required: false
default: started
timeout:
2016-05-10 17:48:36 +02:00
description:
- A timeout of one LXC REST API call.
- This is also used as a timeout for waiting until IPv4 addresses
are set to the all network interfaces in the container after
starting or restarting.
2016-05-10 17:48:36 +02:00
required: false
default: 30
wait_for_ipv4_addresses:
description:
- If this is true, the lxd_module waits until IPv4 addresses
are set to the all network interfaces in the container after
starting or restarting.
required: false
default: false
force_stop:
description:
- If this is true, the lxd_module forces to stop the container
when it stops or restarts the container.
required: false
default: false
unix_socket_path:
description:
- The unix domain socket path for the LXD server.
required: false
default: /var/lib/lxd/unix.socket
url:
description:
- The https URL for the LXD server.
- If url is set, this module connects to the LXD server via https.
If url it not set, this module connects to the LXD server via
unix domain socket specified with unix_socket_path.
key_file:
description:
- The client certificate key file path.
required: false
default: >
'{}/.config/lxc/client.key'.format(os.environ['HOME'])
cert_file:
description:
- The client certificate file path.
required: false
default: >
'{}/.config/lxc/client.crt'.format(os.environ['HOME'])
trust_password:
description:
- The client trusted password.
- You need to set this password on the LXD server before
running this module using the following command.
lxc config set core.trust_password <some random password>
See https://www.stgraber.org/2016/04/18/lxd-api-direct-interaction/
- If trust_password is set, this module send a request for
authentication before sending any requests.
required: false
2016-05-10 17:48:36 +02:00
notes:
- Containers must have a unique name. If you attempt to create a container
with a name that already existed in the users namespace the module will
simply return as "unchanged".
2016-05-17 16:08:16 +02:00
- There are two ways to can run commands in containers, using the command
module or using the ansible lxd connection plugin bundled in Ansible >=
2.1, the later requires python to be installed in the container which can
be done with the command module.
- You can copy a file from the host to the container
with the Ansible `copy` and `template` module and the `lxd` connection plugin.
See the example below.
- You can copy a file in the creatd container to the localhost
2016-05-17 16:08:16 +02:00
with `command=lxc file pull container_name/dir/filename filename`.
See the first example below.
2016-05-10 17:48:36 +02:00
"""
EXAMPLES = """
- hosts: localhost
connection: local
tasks:
- name: Create a started container
lxd_container:
name: mycontainer
state: started
source:
type: image
mode: pull
server: https://images.linuxcontainers.org
protocol: lxd
alias: "ubuntu/xenial/amd64"
profiles: ["default"]
- name: Install python in the created container "mycontainer"
command: lxc exec mycontainer -- apt install -y python
- name: Copy /etc/hosts in the created container "mycontainer" to localhost with name "mycontainer-hosts"
command: lxc file pull mycontainer/etc/hosts mycontainer-hosts
# Note your container must be in the inventory for the below example.
#
# [containers]
# mycontainer ansible_connection=lxd
#
- hosts:
- mycontainer
tasks:
- template: src=foo.j2 dest=/etc/bar
2016-05-10 17:48:36 +02:00
- hosts: localhost
connection: local
tasks:
- name: Create a stopped container
lxd_container:
name: mycontainer
state: stopped
source:
type: image
mode: pull
server: https://images.linuxcontainers.org
protocol: lxd
alias: "ubuntu/xenial/amd64"
profiles: ["default"]
2016-05-10 17:48:36 +02:00
- hosts: localhost
connection: local
tasks:
- name: Restart a container
lxd_container:
name: mycontainer
state: restarted
source:
type: image
mode: pull
server: https://images.linuxcontainers.org
protocol: lxd
alias: "ubuntu/xenial/amd64"
profiles: ["default"]
# An example for connecting to the LXD server using https
- hosts: localhost
connection: local
tasks:
- name: create macvlan profile
lxd_container:
url: https://127.0.0.1:8443
# These cert_file and key_file values are equal to the default values.
#cert_file: "{{ lookup('env', 'HOME') }}/.config/lxc/client.crt"
#key_file: "{{ lookup('env', 'HOME') }}/.config/lxc/client.key"
trust_password: mypassword
type: profile
name: macvlan
state: present
config: {}
description: 'my macvlan profile'
devices:
eth0:
nictype: macvlan
parent: br0
type: nic
2016-05-10 17:48:36 +02:00
"""
RETURN="""
lxd_container:
2016-05-11 00:37:34 +02:00
description: container information
returned: success
type: object
contains:
addresses:
description: mapping from the network device name to a list of IPv4 addresses in the container
returned: when state is started or restarted
type: object
sample: {"eth0": ["10.155.92.191"]}
old_state:
description: the old state of the container
returned: when state is started or restarted
sample: "stopped"
logs:
descriptions: the logs of requests and responses
returned: when requests are sent
actions:
2016-05-11 00:37:34 +02:00
description: list of actions performed for the container
returned: success
type: list
sample: ["create", "start"]
2016-05-10 17:48:36 +02:00
"""
import os
try:
import json
except ImportError:
import simplejson as json
2016-05-10 17:48:36 +02:00
# httplib/http.client connection using unix domain socket
import socket
import ssl
2016-05-10 17:48:36 +02:00
try:
from httplib import HTTPConnection, HTTPSConnection
2016-05-10 17:48:36 +02:00
except ImportError:
# Python 3
from http.client import HTTPConnection, HTTPSConnection
2016-06-27 13:35:19 +02:00
class UnixHTTPConnection(HTTPConnection):
def __init__(self, path, timeout=None):
2016-06-28 12:38:40 +02:00
HTTPConnection.__init__(self, 'localhost', timeout=timeout)
2016-06-27 13:35:19 +02:00
self.path = path
2016-06-27 13:35:19 +02:00
def connect(self):
sock = socket.socket(socket.AF_UNIX, socket.SOCK_STREAM)
sock.connect(self.path)
self.sock = sock
from ansible.module_utils.urls import generic_urlparse
try:
from urlparse import urlparse
except ImportError:
# Python 3
from url.parse import urlparse
2016-05-10 17:48:36 +02:00
# LXD_ANSIBLE_STATES is a map of states that contain values of methods used
# when a particular state is evoked.
LXD_ANSIBLE_STATES = {
'present': '', # TODO: Separate state for profile
2016-05-10 17:48:36 +02:00
'started': '_started',
'stopped': '_stopped',
'restarted': '_restarted',
'absent': '_destroyed',
'frozen': '_frozen'
}
# ANSIBLE_LXD_STATES is a map of states of lxd containers to the Ansible
# lxc_container module state parameter value.
ANSIBLE_LXD_STATES = {
'Running': 'started',
'Stopped': 'stopped',
'Frozen': 'frozen',
}
# CONFIG_PARAMS is a map from a resource type to config attribute names.
CONFIG_PARAMS = {
'container': ['architecture', 'config', 'devices', 'ephemeral', 'profiles', 'source'],
'profile': ['config', 'description', 'devices']
}
2016-05-10 17:48:36 +02:00
try:
callable(all)
except NameError:
# For python <2.5
# This definition is copied from https://docs.python.org/2/library/functions.html#all
def all(iterable):
for element in iterable:
if not element:
return False
return True
class LxdContainerManagement(object):
def __init__(self, module):
"""Management of LXC containers via Ansible.
:param module: Processed Ansible Module.
:type module: ``object``
"""
self.module = module
self.name = self.module.params['name']
self.type = self.module.params['type']
self._build_config()
# TODO: check state value according to type
2016-05-10 17:48:36 +02:00
self.state = self.module.params['state']
self.new_name = self.module.params.get('new_name', None)
self.timeout = self.module.params['timeout']
self.wait_for_ipv4_addresses = self.module.params['wait_for_ipv4_addresses']
self.force_stop = self.module.params['force_stop']
2016-05-10 17:48:36 +02:00
self.addresses = None
self.unix_socket_path = self.module.params['unix_socket_path']
self.url = self.module.params.get('url', None)
self.key_file = self.module.params.get('key_file', None)
self.cert_file = self.module.params.get('cert_file', None)
self.trust_password = self.module.params.get('trust_password', None)
if self.url is None:
self.connection = UnixHTTPConnection(self.unix_socket_path, timeout=self.timeout)
else:
parts = generic_urlparse(urlparse(self.url))
ctx = ssl.create_default_context(ssl.Purpose.CLIENT_AUTH)
ctx.load_cert_chain(self.cert_file, keyfile=self.key_file)
self.connection = HTTPSConnection(parts.get('netloc'), context=ctx, timeout=self.timeout)
2016-06-04 09:43:21 +02:00
self.logs = []
self.actions = []
def _build_config(self):
self.config = {}
for attr in CONFIG_PARAMS[self.type]:
param_val = self.module.params.get(attr, None)
if param_val is not None:
self.config[attr] = param_val
def _authenticate(self):
body_json = {'type': 'client', 'password': self.trust_password}
self._send_request('POST', '/1.0/certificates', body_json=body_json)
def _send_request(self, method, url, body_json=None, ok_error_codes=None):
try:
2016-06-26 02:20:49 +02:00
body = json.dumps(body_json)
self.connection.request(method, url, body=body)
2016-06-26 02:20:49 +02:00
resp = self.connection.getresponse()
resp_json = json.loads(resp.read())
2016-06-04 09:43:21 +02:00
self.logs.append({
'type': 'sent request',
'request': {'method': method, 'url': url, 'json': body_json, 'timeout': self.timeout},
2016-06-04 09:43:21 +02:00
'response': {'json': resp_json}
})
resp_type = resp_json.get('type', None)
if resp_type == 'error':
if ok_error_codes is not None and resp_json['error_code'] in ok_error_codes:
return resp_json
self.module.fail_json(
msg='error response',
request={'method': method, 'url': url, 'json': body_json, 'timeout': self.timeout},
2016-06-04 09:43:21 +02:00
response={'json': resp_json},
logs=self.logs
)
return resp_json
except socket.error as e:
if self.url is None:
self.module.fail_json(
msg='cannot connect to the LXD server',
unix_socket_path=self.unix_socket_path, error=e
)
else:
self.module.fail_json(
msg='cannot connect to the LXD server',
url=self.url, key_file=self.key_file, cert_file=self.cert_file,
error=e
)
def _operate_and_wait(self, method, path, body_json=None):
resp_json = self._send_request(method, path, body_json=body_json)
if resp_json['type'] == 'async':
url = '{0}/wait?timeout={1}'.format(resp_json['operation'], self.timeout)
resp_json = self._send_request('GET', url)
2016-06-04 09:43:21 +02:00
if resp_json['metadata']['status'] != 'Success':
self.module.fail_json(
msg='error response for waiting opearation',
request={'method': method, 'url': url, 'timeout': self.timeout},
2016-06-04 09:43:21 +02:00
response={'json': resp_json},
logs=self.logs
)
return resp_json
2016-06-04 09:43:21 +02:00
def _get_container_json(self):
return self._send_request(
'GET', '/1.0/containers/{0}'.format(self.name),
2016-06-04 09:43:21 +02:00
ok_error_codes=[404]
)
def _get_container_state_json(self):
return self._send_request(
'GET', '/1.0/containers/{0}/state'.format(self.name),
ok_error_codes=[404]
)
@staticmethod
2016-06-04 09:43:21 +02:00
def _container_json_to_module_state(resp_json):
if resp_json['type'] == 'error':
return 'absent'
return ANSIBLE_LXD_STATES[resp_json['metadata']['status']]
def _change_state(self, action, force_stop=False):
body_json={'action': action, 'timeout': self.timeout}
if force_stop:
body_json['force'] = True
return self._operate_and_wait('PUT', '/1.0/containers/{0}/state'.format(self.name), body_json=body_json)
2016-05-10 17:48:36 +02:00
def _create_container(self):
config = self.config.copy()
config['name'] = self.name
self._operate_and_wait('POST', '/1.0/containers', config)
self.actions.append('create')
2016-05-10 17:48:36 +02:00
def _start_container(self):
self._change_state('start')
self.actions.append('start')
2016-05-10 17:48:36 +02:00
def _stop_container(self):
self._change_state('stop', self.force_stop)
self.actions.append('stop')
2016-05-10 17:48:36 +02:00
def _restart_container(self):
self._change_state('restart', self.force_stop)
self.actions.append('restart')
2016-05-10 17:48:36 +02:00
def _delete_container(self):
return self._operate_and_wait('DELETE', '/1.0/containers/{0}'.format(self.name))
self.actions.append('delete')
2016-05-10 17:48:36 +02:00
def _freeze_container(self):
self._change_state('freeze')
self.actions.append('freeze')
2016-05-10 17:48:36 +02:00
def _unfreeze_container(self):
self._change_state('unfreeze')
self.actions.append('unfreez')
2016-05-10 17:48:36 +02:00
def _container_ipv4_addresses(self, ignore_devices=['lo']):
resp_json = self._get_container_state_json()
network = resp_json['metadata']['network'] or {}
2016-06-04 09:43:21 +02:00
network = dict((k, v) for k, v in network.items() if k not in ignore_devices) or {}
addresses = dict((k, [a['address'] for a in v['addresses'] if a['family'] == 'inet']) for k, v in network.items()) or {}
2016-05-10 17:48:36 +02:00
return addresses
@staticmethod
def _has_all_ipv4_addresses(addresses):
return len(addresses) > 0 and all([len(v) > 0 for v in addresses.itervalues()])
def _get_addresses(self):
due = datetime.datetime.now() + datetime.timedelta(seconds=self.timeout)
2016-05-10 17:48:36 +02:00
while datetime.datetime.now() < due:
time.sleep(1)
addresses = self._container_ipv4_addresses()
if self._has_all_ipv4_addresses(addresses):
self.addresses = addresses
return
state_changed = len(self.actions) > 0
self.module.fail_json(
failed=True,
msg='timeout for getting IPv4 addresses',
changed=state_changed,
2016-06-04 09:43:21 +02:00
actions=self.actions,
logs=self.logs)
2016-05-10 17:48:36 +02:00
def _started(self):
if self.old_state == 'absent':
2016-05-10 17:48:36 +02:00
self._create_container()
self._start_container()
else:
if self.old_state == 'frozen':
2016-05-10 17:48:36 +02:00
self._unfreeze_container()
2016-06-04 09:43:21 +02:00
elif self.old_state == 'stopped':
self._start_container()
if self._needs_to_apply_container_configs():
self._apply_container_configs()
if self.wait_for_ipv4_addresses:
self._get_addresses()
2016-05-10 17:48:36 +02:00
def _stopped(self):
if self.old_state == 'absent':
2016-05-10 17:48:36 +02:00
self._create_container()
else:
2016-06-04 09:43:21 +02:00
if self.old_state == 'stopped':
if self._needs_to_apply_container_configs():
2016-06-04 09:43:21 +02:00
self._start_container()
self._apply_container_configs()
2016-06-04 09:43:21 +02:00
self._stop_container()
else:
if self.old_state == 'frozen':
self._unfreeze_container()
if self._needs_to_apply_container_configs():
self._apply_container_configs()
2016-06-04 09:43:21 +02:00
self._stop_container()
2016-05-10 17:48:36 +02:00
def _restarted(self):
if self.old_state == 'absent':
2016-05-10 17:48:36 +02:00
self._create_container()
self._start_container()
else:
if self.old_state == 'frozen':
2016-05-10 17:48:36 +02:00
self._unfreeze_container()
if self._needs_to_apply_container_configs():
self._apply_container_configs()
self._restart_container()
if self.wait_for_ipv4_addresses:
self._get_addresses()
2016-05-10 17:48:36 +02:00
def _destroyed(self):
if self.old_state != 'absent':
if self.old_state == 'frozen':
2016-05-10 17:48:36 +02:00
self._unfreeze_container()
self._stop_container()
2016-05-10 17:48:36 +02:00
self._delete_container()
def _frozen(self):
if self.old_state == 'absent':
2016-05-10 17:48:36 +02:00
self._create_container()
self._start_container()
self._freeze_container()
else:
if self.old_state == 'stopped':
self._start_container()
if self._needs_to_apply_container_configs():
self._apply_container_configs()
self._freeze_container()
2016-05-10 17:48:36 +02:00
def _needs_to_change_container_config(self, key):
if key not in self.config:
2016-06-04 09:43:21 +02:00
return False
if key == 'config':
2016-06-25 11:04:29 +02:00
old_configs = dict((k, v) for k, v in self.old_container_json['metadata'][key].items() if not k.startswith('volatile.'))
2016-06-04 09:43:21 +02:00
else:
old_configs = self.old_container_json['metadata'][key]
return self.config[key] != old_configs
2016-06-04 09:43:21 +02:00
def _needs_to_apply_container_configs(self):
2016-06-04 09:43:21 +02:00
return (
self._needs_to_change_container_config('architecture') or
self._needs_to_change_container_config('config') or
self._needs_to_change_container_config('ephemeral') or
self._needs_to_change_container_config('devices') or
self._needs_to_change_container_config('profiles')
2016-06-04 09:43:21 +02:00
)
def _apply_container_configs(self):
2016-06-04 09:43:21 +02:00
old_metadata = self.old_container_json['metadata']
body_json = {
2016-06-04 09:43:21 +02:00
'architecture': old_metadata['architecture'],
'config': old_metadata['config'],
'devices': old_metadata['devices'],
'profiles': old_metadata['profiles']
}
if self._needs_to_change_container_config('architecture'):
body_json['architecture'] = self.config['architecture']
if self._needs_to_change_container_config('config'):
for k, v in self.config['config'].items():
body_json['config'][k] = v
if self._needs_to_change_container_config('ephemeral'):
body_json['ephemeral'] = self.config['ephemeral']
if self._needs_to_change_container_config('devices'):
body_json['devices'] = self.config['devices']
if self._needs_to_change_container_config('profiles'):
body_json['profiles'] = self.config['profiles']
self._operate_and_wait('PUT', '/1.0/containers/{0}'.format(self.name), body_json=body_json)
self.actions.append('apply_container_configs')
def _get_profile_json(self):
return self._send_request(
'GET', '/1.0/profiles/{0}'.format(self.name),
ok_error_codes=[404]
)
@staticmethod
def _profile_json_to_module_state(resp_json):
if resp_json['type'] == 'error':
return 'absent'
return 'present'
def _update_profile(self):
if self.state == 'present':
if self.old_state == 'absent':
if self.new_name is None:
self._create_profile()
else:
self.module.fail_json(
failed=True,
msg='new_name must not be set when the profile does not exist and the specified state is present',
changed=False)
else:
if self.new_name is not None and self.new_name != self.name:
self._rename_profile()
if self._needs_to_apply_profile_configs():
self._apply_profile_configs()
elif self.state == 'absent':
if self.old_state == 'present':
if self.new_name is None:
self._delete_profile()
else:
self.module.fail_json(
failed=True,
msg='new_name must not be set when the profile exists and the specified state is absent',
changed=False)
def _create_profile(self):
config = self.config.copy()
config['name'] = self.name
self._send_request('POST', '/1.0/profiles', config)
self.actions.append('create')
def _rename_profile(self):
config = {'name': self.new_name}
self._send_request('POST', '/1.0/profiles/{}'.format(self.name), config)
self.actions.append('rename')
self.name = self.new_name
def _needs_to_change_profile_config(self, key):
if key not in self.config:
return False
old_configs = self.old_profile_json['metadata'].get(key, None)
return self.config[key] != old_configs
def _needs_to_apply_profile_configs(self):
return (
self._needs_to_change_profile_config('config') or
self._needs_to_change_profile_config('description') or
self._needs_to_change_profile_config('devices')
)
def _apply_profile_configs(self):
config = self.old_profile_json.copy()
for k, v in self.config.iteritems():
config[k] = v
self._send_request('PUT', '/1.0/profiles/{}'.format(self.name), config)
self.actions.append('apply_profile_configs')
def _delete_profile(self):
self._send_request('DELETE', '/1.0/profiles/{}'.format(self.name))
self.actions.append('delete')
2016-06-04 09:43:21 +02:00
2016-05-10 17:48:36 +02:00
def run(self):
"""Run the main method."""
if self.trust_password is not None:
self._authenticate()
if self.type == 'container':
self.old_container_json = self._get_container_json()
self.old_state = self._container_json_to_module_state(self.old_container_json)
action = getattr(self, LXD_ANSIBLE_STATES[self.state])
action()
elif self.type == 'profile':
self.old_profile_json = self._get_profile_json()
self.old_state = self._profile_json_to_module_state(self.old_profile_json)
self._update_profile()
2016-05-10 17:48:36 +02:00
state_changed = len(self.actions) > 0
2016-05-10 17:48:36 +02:00
result_json = {
'changed': state_changed,
'old_state': self.old_state,
2016-06-04 09:43:21 +02:00
'logs': self.logs,
'actions': self.actions
2016-05-12 13:50:18 +02:00
}
2016-05-10 17:48:36 +02:00
if self.addresses is not None:
result_json['addresses'] = self.addresses
self.module.exit_json(**result_json)
def main():
"""Ansible Main module."""
module = AnsibleModule(
argument_spec=dict(
name=dict(
type='str',
required=True
),
new_name=dict(
type='str',
),
type=dict(
type='str',
choices=CONFIG_PARAMS.keys(),
default='container'
),
architecture=dict(
type='str',
),
2016-05-10 17:48:36 +02:00
config=dict(
type='dict',
),
description=dict(
type='str',
),
devices=dict(
type='dict',
),
ephemeral=dict(
type='bool',
),
profiles=dict(
type='list',
),
source=dict(
type='dict',
),
2016-05-10 17:48:36 +02:00
state=dict(
choices=LXD_ANSIBLE_STATES.keys(),
default='started'
),
timeout=dict(
2016-05-10 17:48:36 +02:00
type='int',
default=30
),
wait_for_ipv4_addresses=dict(
type='bool',
2016-06-04 09:43:21 +02:00
default=False
),
force_stop=dict(
type='bool',
default=False
),
unix_socket_path=dict(
type='str',
default='/var/lib/lxd/unix.socket'
),
url=dict(
type='str',
),
key_file=dict(
type='str',
default='{}/.config/lxc/client.key'.format(os.environ['HOME'])
),
cert_file=dict(
type='str',
default='{}/.config/lxc/client.crt'.format(os.environ['HOME'])
),
trust_password=dict(
type='str',
2016-05-10 17:48:36 +02:00
)
),
supports_check_mode=False,
)
lxd_manage = LxdContainerManagement(module=module)
lxd_manage.run()
# import module bits
from ansible.module_utils.basic import *
if __name__ == '__main__':
main()