authorized_key 5 KB
Newer Older
1
#!/usr/bin/env python
2 3
# -*- coding: utf-8 -*-

4 5
"""
Ansible module to add authorized_keys for ssh logins.
6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23
(c) 2012, Brad Olson <brado@movedbylight.com>

This file is part of Ansible

Ansible is free software: you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation, either version 3 of the License, or
(at your option) any later version.

Ansible is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
GNU General Public License for more details.

You should have received a copy of the GNU General Public License
along with Ansible.  If not, see <http://www.gnu.org/licenses/>.
"""

24 25 26
DOCUMENTATION = '''
---
module: authorized_key
27
short_description: Adds or removes an SSH authorized key
28
description:
29
     - Adds or removes an SSH authorized key for a user from a remote host.
30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51
version_added: "0.5"
options:
  user:
    description:
      - Name of the user who should have access to the remote host
    required: true
    default: null
    aliases: []
  key:
    description:
      - the SSH public key, as a string
    required: true
    default: null
  state:
    description:
      - whether the given key should or should not be in the file
    required: false
    choices: [ "present", "absent" ]
    default: "present"
examples:
   - code: authorized_key user=charlie key="ssh-dss ASDF1234L+8BTwaRYr/rycsBF1D8e5pTxEsXHQs4iq+mZdyWqlW++L6pMiam1A8yweP+rKtgjK2httVS6GigVsuWWfOd7/sdWippefq74nppVUELHPKkaIOjJNN1zUHFoL/YMwAAAEBALnAsQN10TNGsRDe5arBsW8cTOjqLyYBcIqgPYTZW8zENErFxt7ij3fW3Jh/sCpnmy8rkS7FyK8ULX0PEy/2yDx8/5rXgMIICbRH/XaBy9Ud5bRBFVkEDu/r+rXP33wFPHjWjwvHAtfci1NRBAudQI/98DbcGQw5HmE89CjgZRo5ktkC5yu/8agEPocVjdHyZr7PaHfxZGUDGKtGRL2QzRYukCmWo1cZbMBHcI5FzImvTHS9/8B3SATjXMPgbfBuEeBwuBK5EjL+CtHY5bWs9kmYjmeo0KfUMH8hY4MAXDoKhQ7DhBPIrcjS5jPtoGxIREZjba67r6/P2XKXaCZH6Fc= charlie@example.org 2011-01-17"
     description: "Example from Ansible Playbooks"
52 53
   - code: "authorized_key user=charlie key=$FILE(/home/charlie/.ssh/id_rsa.pub)"
     description: "Shorthand available in Ansible 0.8 and later"
54 55 56
author: Brad Olson
'''

57 58 59 60 61 62 63 64 65 66 67 68 69 70
# Makes sure the public key line is present or absent in the user's .ssh/authorized_keys.
#
# Arguments
# =========
#    user = username
#    key = line to add to authorized_keys for user
#    state = absent|present (default: present)
#
# see example in examples/playbooks

import sys
import os
import pwd
import os.path
71

72
def keyfile(user, write=False):
73
    """
74
    Calculate name of authorized keys file, optionally creating the
75 76 77
    directories and file, properly setting permissions.

    :param str user: name of user in passwd file
78
    :param bool write: if True, write changes to authorized_keys file (creating directories if needed)
79 80 81 82
    :return: full path string to authorized_keys for user
    """

    user_entry = pwd.getpwnam(user)
83 84 85 86
    homedir    = user_entry.pw_dir
    sshdir     = os.path.join(homedir, ".ssh")
    keysfile   = os.path.join(sshdir, "authorized_keys")

87
    if not write:
88 89
        return keysfile

90 91
    uid = user_entry.pw_uid
    gid = user_entry.pw_gid
92

93
    if not os.path.exists(sshdir):
94
        os.mkdir(sshdir, 0700)
95 96
    os.chown(sshdir, uid, gid)
    os.chmod(sshdir, 0700)
97 98

    if not os.path.exists( keysfile):
99
        try:
100
            f = open(keysfile, "w") #touches file so we can set ownership and perms
101 102
        finally:
            f.close()
103

104 105 106 107
    os.chown(keysfile, uid, gid)
    os.chmod(keysfile, 0600)
    return keysfile

108 109
def readkeys(filename):

110
    if not os.path.isfile(filename):
111 112 113 114
        return []
    f = open(filename)
    keys = [line.rstrip() for line in f.readlines()]
    f.close()
115 116 117
    return keys

def writekeys( filename, keys):
118 119 120 121 122 123 124 125

    f = open(filename,"w")
    f.writelines( (key + "\n" for key in keys) )
    f.close()

def enforce_state(module, params):
    """
    Add or remove key.
126 127
    """

128 129
    user  = params["user"]
    key   = params["key"]
130 131
    state = params.get("state", "present")

132
    # check current state -- just get the filename, don't create file
133
    params["keyfile"] = keyfile(user, write=False)
134
    keys = readkeys(params["keyfile"])
135 136
    present = key in keys

137
    # handle idempotent state=present
138
    if state=="present":
139
        if present:
140
            module.exit_json(changed=False)
141
        keys.append(key)
142
        writekeys(keyfile(user,write=True), keys)
143

144
    elif state=="absent":
145
        if not present:
146
            module.exit_json(changed=False)
147
        keys.remove(key)
148
        writekeys(keyfile(user,write=True), keys)
149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168

    params['changed'] = True
    return params

def main():

    module = AnsibleModule(
        argument_spec = dict(
           user  = dict(required=True),
           key   = dict(required=True),
           state = dict(default='present', choices=['absent','present'])
        )
    )

    params = module.params
    results = enforce_state(module, module.params)
    module.exit_json(**results)

# this is magic, see lib/ansible/module_common.py
#<<INCLUDE_ANSIBLE_MODULE_COMMON>>
169
main()