2012-05-30 22:41:38 +02:00
|
|
|
#!/usr/bin/env python
|
2012-08-03 03:29:10 +02:00
|
|
|
# -*- coding: utf-8 -*-
|
|
|
|
|
2012-07-28 23:02:16 +02:00
|
|
|
"""
|
|
|
|
Ansible module to add authorized_keys for ssh logins.
|
2012-05-30 22:41:38 +02:00
|
|
|
(c) 2012, Brad Olson <brado@movedbylight.com>
|
|
|
|
|
|
|
|
This file is part of Ansible
|
|
|
|
|
|
|
|
Ansible is free software: you can redistribute it and/or modify
|
|
|
|
it under the terms of the GNU General Public License as published by
|
|
|
|
the Free Software Foundation, either version 3 of the License, or
|
|
|
|
(at your option) any later version.
|
|
|
|
|
|
|
|
Ansible is distributed in the hope that it will be useful,
|
|
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
GNU General Public License for more details.
|
|
|
|
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
|
|
along with Ansible. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
"""
|
|
|
|
|
2012-09-28 21:55:49 +02:00
|
|
|
DOCUMENTATION = '''
|
|
|
|
---
|
|
|
|
module: authorized_key
|
2012-10-01 09:18:54 +02:00
|
|
|
short_description: Adds or removes an SSH authorized key
|
2012-09-28 21:55:49 +02:00
|
|
|
description:
|
2012-10-01 09:18:54 +02:00
|
|
|
- Adds or removes an SSH authorized key for a user from a remote host.
|
2012-09-28 21:55:49 +02:00
|
|
|
version_added: "0.5"
|
|
|
|
options:
|
|
|
|
user:
|
|
|
|
description:
|
|
|
|
- Name of the user who should have access to the remote host
|
|
|
|
required: true
|
|
|
|
default: null
|
|
|
|
aliases: []
|
|
|
|
key:
|
|
|
|
description:
|
|
|
|
- the SSH public key, as a string
|
|
|
|
required: true
|
|
|
|
default: null
|
|
|
|
state:
|
|
|
|
description:
|
|
|
|
- whether the given key should or should not be in the file
|
|
|
|
required: false
|
|
|
|
choices: [ "present", "absent" ]
|
|
|
|
default: "present"
|
|
|
|
examples:
|
|
|
|
- code: authorized_key user=charlie key="ssh-dss ASDF1234L+8BTwaRYr/rycsBF1D8e5pTxEsXHQs4iq+mZdyWqlW++L6pMiam1A8yweP+rKtgjK2httVS6GigVsuWWfOd7/sdWippefq74nppVUELHPKkaIOjJNN1zUHFoL/YMwAAAEBALnAsQN10TNGsRDe5arBsW8cTOjqLyYBcIqgPYTZW8zENErFxt7ij3fW3Jh/sCpnmy8rkS7FyK8ULX0PEy/2yDx8/5rXgMIICbRH/XaBy9Ud5bRBFVkEDu/r+rXP33wFPHjWjwvHAtfci1NRBAudQI/98DbcGQw5HmE89CjgZRo5ktkC5yu/8agEPocVjdHyZr7PaHfxZGUDGKtGRL2QzRYukCmWo1cZbMBHcI5FzImvTHS9/8B3SATjXMPgbfBuEeBwuBK5EjL+CtHY5bWs9kmYjmeo0KfUMH8hY4MAXDoKhQ7DhBPIrcjS5jPtoGxIREZjba67r6/P2XKXaCZH6Fc= charlie@example.org 2011-01-17"
|
|
|
|
description: "Example from Ansible Playbooks"
|
2012-10-03 04:32:17 +02:00
|
|
|
- code: "authorized_key user=charlie key=$FILE(/home/charlie/.ssh/id_rsa.pub)"
|
|
|
|
description: "Shorthand available in Ansible 0.8 and later"
|
2012-09-28 21:55:49 +02:00
|
|
|
author: Brad Olson
|
|
|
|
'''
|
|
|
|
|
2012-07-28 23:02:16 +02:00
|
|
|
# Makes sure the public key line is present or absent in the user's .ssh/authorized_keys.
|
|
|
|
#
|
|
|
|
# Arguments
|
|
|
|
# =========
|
|
|
|
# user = username
|
|
|
|
# key = line to add to authorized_keys for user
|
|
|
|
# state = absent|present (default: present)
|
|
|
|
#
|
|
|
|
# see example in examples/playbooks
|
|
|
|
|
|
|
|
import sys
|
|
|
|
import os
|
|
|
|
import pwd
|
|
|
|
import os.path
|
2012-05-30 22:41:38 +02:00
|
|
|
|
2012-07-02 21:16:57 +02:00
|
|
|
def keyfile(user, write=False):
|
2012-07-28 23:02:16 +02:00
|
|
|
"""
|
2012-08-07 02:07:02 +02:00
|
|
|
Calculate name of authorized keys file, optionally creating the
|
2012-05-30 22:41:38 +02:00
|
|
|
directories and file, properly setting permissions.
|
|
|
|
|
|
|
|
:param str user: name of user in passwd file
|
2012-07-02 21:16:57 +02:00
|
|
|
:param bool write: if True, write changes to authorized_keys file (creating directories if needed)
|
2012-05-30 22:41:38 +02:00
|
|
|
:return: full path string to authorized_keys for user
|
|
|
|
"""
|
|
|
|
|
|
|
|
user_entry = pwd.getpwnam(user)
|
2012-07-28 23:02:16 +02:00
|
|
|
homedir = user_entry.pw_dir
|
|
|
|
sshdir = os.path.join(homedir, ".ssh")
|
|
|
|
keysfile = os.path.join(sshdir, "authorized_keys")
|
|
|
|
|
2012-08-07 02:07:02 +02:00
|
|
|
if not write:
|
2012-07-28 23:02:16 +02:00
|
|
|
return keysfile
|
|
|
|
|
2012-05-30 22:41:38 +02:00
|
|
|
uid = user_entry.pw_uid
|
|
|
|
gid = user_entry.pw_gid
|
2012-07-28 23:02:16 +02:00
|
|
|
|
2012-08-07 02:07:02 +02:00
|
|
|
if not os.path.exists(sshdir):
|
2012-07-28 23:02:16 +02:00
|
|
|
os.mkdir(sshdir, 0700)
|
2012-05-30 22:41:38 +02:00
|
|
|
os.chown(sshdir, uid, gid)
|
|
|
|
os.chmod(sshdir, 0700)
|
2012-07-28 23:02:16 +02:00
|
|
|
|
|
|
|
if not os.path.exists( keysfile):
|
2012-07-02 19:57:38 +02:00
|
|
|
try:
|
2012-07-02 21:16:57 +02:00
|
|
|
f = open(keysfile, "w") #touches file so we can set ownership and perms
|
2012-07-02 19:57:38 +02:00
|
|
|
finally:
|
|
|
|
f.close()
|
2012-07-28 23:02:16 +02:00
|
|
|
|
2012-05-30 22:41:38 +02:00
|
|
|
os.chown(keysfile, uid, gid)
|
|
|
|
os.chmod(keysfile, 0600)
|
|
|
|
return keysfile
|
|
|
|
|
2012-07-28 23:02:16 +02:00
|
|
|
def readkeys(filename):
|
|
|
|
|
2012-08-07 02:07:02 +02:00
|
|
|
if not os.path.isfile(filename):
|
2012-07-28 23:02:16 +02:00
|
|
|
return []
|
|
|
|
f = open(filename)
|
|
|
|
keys = [line.rstrip() for line in f.readlines()]
|
|
|
|
f.close()
|
2012-05-30 22:41:38 +02:00
|
|
|
return keys
|
|
|
|
|
|
|
|
def writekeys( filename, keys):
|
2012-07-28 23:02:16 +02:00
|
|
|
|
|
|
|
f = open(filename,"w")
|
|
|
|
f.writelines( (key + "\n" for key in keys) )
|
|
|
|
f.close()
|
|
|
|
|
|
|
|
def enforce_state(module, params):
|
|
|
|
"""
|
|
|
|
Add or remove key.
|
2012-05-30 22:41:38 +02:00
|
|
|
"""
|
|
|
|
|
2012-07-28 23:02:16 +02:00
|
|
|
user = params["user"]
|
|
|
|
key = params["key"]
|
2012-05-30 22:41:38 +02:00
|
|
|
state = params.get("state", "present")
|
|
|
|
|
2012-07-28 23:02:16 +02:00
|
|
|
# check current state -- just get the filename, don't create file
|
2012-08-07 02:07:02 +02:00
|
|
|
params["keyfile"] = keyfile(user, write=False)
|
2012-07-28 23:02:16 +02:00
|
|
|
keys = readkeys(params["keyfile"])
|
2012-05-30 22:41:38 +02:00
|
|
|
present = key in keys
|
|
|
|
|
2012-07-28 23:02:16 +02:00
|
|
|
# handle idempotent state=present
|
2012-05-30 22:41:38 +02:00
|
|
|
if state=="present":
|
2012-08-07 02:07:02 +02:00
|
|
|
if present:
|
2012-07-28 23:02:16 +02:00
|
|
|
module.exit_json(changed=False)
|
2012-05-30 22:41:38 +02:00
|
|
|
keys.append(key)
|
2012-07-02 21:16:57 +02:00
|
|
|
writekeys(keyfile(user,write=True), keys)
|
2012-07-28 23:02:16 +02:00
|
|
|
|
2012-05-30 22:41:38 +02:00
|
|
|
elif state=="absent":
|
2012-08-07 02:07:02 +02:00
|
|
|
if not present:
|
2012-07-28 23:02:16 +02:00
|
|
|
module.exit_json(changed=False)
|
2012-05-30 22:41:38 +02:00
|
|
|
keys.remove(key)
|
2012-07-02 21:16:57 +02:00
|
|
|
writekeys(keyfile(user,write=True), keys)
|
2012-07-28 23:02:16 +02:00
|
|
|
|
|
|
|
params['changed'] = True
|
|
|
|
return params
|
|
|
|
|
|
|
|
def main():
|
|
|
|
|
|
|
|
module = AnsibleModule(
|
|
|
|
argument_spec = dict(
|
|
|
|
user = dict(required=True),
|
|
|
|
key = dict(required=True),
|
|
|
|
state = dict(default='present', choices=['absent','present'])
|
|
|
|
)
|
|
|
|
)
|
|
|
|
|
|
|
|
params = module.params
|
|
|
|
results = enforce_state(module, module.params)
|
|
|
|
module.exit_json(**results)
|
|
|
|
|
|
|
|
# this is magic, see lib/ansible/module_common.py
|
|
|
|
#<<INCLUDE_ANSIBLE_MODULE_COMMON>>
|
2012-08-07 02:07:02 +02:00
|
|
|
main()
|