2020-03-09 10:11:07 +01:00
|
|
|
#!/usr/bin/python
|
|
|
|
# -*- coding: utf-8 -*-
|
|
|
|
|
2022-08-08 14:24:58 +02:00
|
|
|
# Copyright (c) Ansible project
|
2022-08-05 12:28:29 +02:00
|
|
|
# GNU General Public License v3.0+ (see LICENSES/GPL-3.0-or-later.txt or https://www.gnu.org/licenses/gpl-3.0.txt)
|
|
|
|
# SPDX-License-Identifier: GPL-3.0-or-later
|
2020-03-09 10:11:07 +01:00
|
|
|
|
|
|
|
from __future__ import absolute_import, division, print_function
|
|
|
|
__metaclass__ = type
|
|
|
|
|
|
|
|
|
|
|
|
DOCUMENTATION = '''
|
|
|
|
---
|
|
|
|
module: github_deploy_key
|
|
|
|
author: "Ali (@bincyber)"
|
2022-11-09 07:18:40 +01:00
|
|
|
short_description: Manages deploy keys for GitHub repositories
|
2020-03-09 10:11:07 +01:00
|
|
|
description:
|
|
|
|
- "Adds or removes deploy keys for GitHub repositories. Supports authentication using username and password,
|
|
|
|
username and password and 2-factor authentication code (OTP), OAuth2 token, or personal access token. Admin
|
|
|
|
rights on the repository are required."
|
2023-02-20 17:26:28 +01:00
|
|
|
extends_documentation_fragment:
|
|
|
|
- community.general.attributes
|
|
|
|
attributes:
|
|
|
|
check_mode:
|
|
|
|
support: full
|
|
|
|
diff_mode:
|
|
|
|
support: none
|
2020-03-09 10:11:07 +01:00
|
|
|
options:
|
|
|
|
github_url:
|
|
|
|
description:
|
|
|
|
- The base URL of the GitHub API
|
|
|
|
required: false
|
|
|
|
type: str
|
2020-06-13 15:01:19 +02:00
|
|
|
version_added: '0.2.0'
|
2020-03-09 10:11:07 +01:00
|
|
|
default: https://api.github.com
|
|
|
|
owner:
|
|
|
|
description:
|
|
|
|
- The name of the individual account or organization that owns the GitHub repository.
|
|
|
|
required: true
|
|
|
|
aliases: [ 'account', 'organization' ]
|
2021-02-25 09:39:48 +01:00
|
|
|
type: str
|
2020-03-09 10:11:07 +01:00
|
|
|
repo:
|
|
|
|
description:
|
|
|
|
- The name of the GitHub repository.
|
|
|
|
required: true
|
|
|
|
aliases: [ 'repository' ]
|
2021-02-25 09:39:48 +01:00
|
|
|
type: str
|
2020-03-09 10:11:07 +01:00
|
|
|
name:
|
|
|
|
description:
|
|
|
|
- The name for the deploy key.
|
|
|
|
required: true
|
|
|
|
aliases: [ 'title', 'label' ]
|
2021-02-25 09:39:48 +01:00
|
|
|
type: str
|
2020-03-09 10:11:07 +01:00
|
|
|
key:
|
|
|
|
description:
|
|
|
|
- The SSH public key to add to the repository as a deploy key.
|
|
|
|
required: true
|
2021-02-25 09:39:48 +01:00
|
|
|
type: str
|
2020-03-09 10:11:07 +01:00
|
|
|
read_only:
|
|
|
|
description:
|
2023-06-15 15:46:44 +02:00
|
|
|
- If V(true), the deploy key will only be able to read repository contents. Otherwise, the deploy key will be able to read and write.
|
2020-03-09 10:11:07 +01:00
|
|
|
type: bool
|
2022-08-24 19:59:56 +02:00
|
|
|
default: true
|
2020-03-09 10:11:07 +01:00
|
|
|
state:
|
|
|
|
description:
|
|
|
|
- The state of the deploy key.
|
|
|
|
default: "present"
|
|
|
|
choices: [ "present", "absent" ]
|
2021-02-25 09:39:48 +01:00
|
|
|
type: str
|
2020-03-09 10:11:07 +01:00
|
|
|
force:
|
|
|
|
description:
|
2023-06-15 15:46:44 +02:00
|
|
|
- If V(true), forcefully adds the deploy key by deleting any existing deploy key with the same public key or title.
|
2020-03-09 10:11:07 +01:00
|
|
|
type: bool
|
2022-08-24 19:59:56 +02:00
|
|
|
default: false
|
2020-03-09 10:11:07 +01:00
|
|
|
username:
|
|
|
|
description:
|
|
|
|
- The username to authenticate with. Should not be set when using personal access token
|
2021-02-25 09:39:48 +01:00
|
|
|
type: str
|
2020-03-09 10:11:07 +01:00
|
|
|
password:
|
|
|
|
description:
|
2023-06-15 15:46:44 +02:00
|
|
|
- The password to authenticate with. Alternatively, a personal access token can be used instead of O(username) and O(password) combination.
|
2021-02-25 09:39:48 +01:00
|
|
|
type: str
|
2020-03-09 10:11:07 +01:00
|
|
|
token:
|
|
|
|
description:
|
2023-06-15 15:46:44 +02:00
|
|
|
- The OAuth2 token or personal access token to authenticate with. Mutually exclusive with O(password).
|
2021-02-25 09:39:48 +01:00
|
|
|
type: str
|
2020-03-09 10:11:07 +01:00
|
|
|
otp:
|
|
|
|
description:
|
2023-06-15 15:46:44 +02:00
|
|
|
- The 6 digit One Time Password for 2-Factor Authentication. Required together with O(username) and O(password).
|
2021-02-25 09:39:48 +01:00
|
|
|
type: int
|
2020-03-09 10:11:07 +01:00
|
|
|
notes:
|
|
|
|
- "Refer to GitHub's API documentation here: https://developer.github.com/v3/repos/keys/."
|
|
|
|
'''
|
|
|
|
|
|
|
|
EXAMPLES = '''
|
2020-05-15 12:27:06 +02:00
|
|
|
- name: Add a new read-only deploy key to a GitHub repository using basic authentication
|
2020-07-13 21:50:31 +02:00
|
|
|
community.general.github_deploy_key:
|
2020-03-09 10:11:07 +01:00
|
|
|
owner: "johndoe"
|
|
|
|
repo: "example"
|
|
|
|
name: "new-deploy-key"
|
|
|
|
key: "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDAwXxn7kIMNWzcDfou..."
|
2022-08-24 19:59:56 +02:00
|
|
|
read_only: true
|
2020-03-09 10:11:07 +01:00
|
|
|
username: "johndoe"
|
|
|
|
password: "supersecretpassword"
|
|
|
|
|
2020-05-15 12:27:06 +02:00
|
|
|
- name: Remove an existing deploy key from a GitHub repository
|
2020-07-13 21:50:31 +02:00
|
|
|
community.general.github_deploy_key:
|
2020-03-09 10:11:07 +01:00
|
|
|
owner: "johndoe"
|
|
|
|
repository: "example"
|
|
|
|
name: "new-deploy-key"
|
|
|
|
key: "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDAwXxn7kIMNWzcDfou..."
|
2022-08-24 19:59:56 +02:00
|
|
|
force: true
|
2020-03-09 10:11:07 +01:00
|
|
|
username: "johndoe"
|
|
|
|
password: "supersecretpassword"
|
|
|
|
state: absent
|
|
|
|
|
2020-05-15 12:27:06 +02:00
|
|
|
- name: Add a new deploy key to a GitHub repository, replace an existing key, use an OAuth2 token to authenticate
|
2020-07-13 21:50:31 +02:00
|
|
|
community.general.github_deploy_key:
|
2020-03-09 10:11:07 +01:00
|
|
|
owner: "johndoe"
|
|
|
|
repository: "example"
|
|
|
|
name: "new-deploy-key"
|
|
|
|
key: "{{ lookup('file', '~/.ssh/github.pub') }}"
|
2022-08-24 19:59:56 +02:00
|
|
|
force: true
|
2020-03-09 10:11:07 +01:00
|
|
|
token: "ABAQDAwXxn7kIMNWzcDfo..."
|
|
|
|
|
2020-05-15 12:27:06 +02:00
|
|
|
- name: Re-add a deploy key to a GitHub repository but with a different name
|
2020-07-13 21:50:31 +02:00
|
|
|
community.general.github_deploy_key:
|
2020-03-09 10:11:07 +01:00
|
|
|
owner: "johndoe"
|
|
|
|
repository: "example"
|
|
|
|
name: "replace-deploy-key"
|
|
|
|
key: "{{ lookup('file', '~/.ssh/github.pub') }}"
|
|
|
|
username: "johndoe"
|
|
|
|
password: "supersecretpassword"
|
|
|
|
|
2020-05-15 12:27:06 +02:00
|
|
|
- name: Add a new deploy key to a GitHub repository using 2FA
|
2020-07-13 21:50:31 +02:00
|
|
|
community.general.github_deploy_key:
|
2020-03-09 10:11:07 +01:00
|
|
|
owner: "johndoe"
|
|
|
|
repo: "example"
|
|
|
|
name: "new-deploy-key-2"
|
|
|
|
key: "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDAwXxn7kIMNWzcDfou..."
|
|
|
|
username: "johndoe"
|
|
|
|
password: "supersecretpassword"
|
|
|
|
otp: 123456
|
|
|
|
|
2020-05-15 12:27:06 +02:00
|
|
|
- name: Add a read-only deploy key to a repository hosted on GitHub Enterprise
|
2020-07-13 21:50:31 +02:00
|
|
|
community.general.github_deploy_key:
|
2020-03-09 10:11:07 +01:00
|
|
|
github_url: "https://api.example.com"
|
|
|
|
owner: "janedoe"
|
|
|
|
repo: "example"
|
|
|
|
name: "new-deploy-key"
|
|
|
|
key: "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDAwXxn7kIMNWzcDfou..."
|
2022-08-24 19:59:56 +02:00
|
|
|
read_only: true
|
2020-03-09 10:11:07 +01:00
|
|
|
username: "janedoe"
|
|
|
|
password: "supersecretpassword"
|
|
|
|
'''
|
|
|
|
|
|
|
|
RETURN = '''
|
|
|
|
msg:
|
|
|
|
description: the status message describing what occurred
|
|
|
|
returned: always
|
|
|
|
type: str
|
|
|
|
sample: "Deploy key added successfully"
|
|
|
|
|
|
|
|
http_status_code:
|
|
|
|
description: the HTTP status code returned by the GitHub API
|
|
|
|
returned: failed
|
|
|
|
type: int
|
|
|
|
sample: 400
|
|
|
|
|
|
|
|
error:
|
|
|
|
description: the error message returned by the GitHub API
|
|
|
|
returned: failed
|
|
|
|
type: str
|
|
|
|
sample: "key is already in use"
|
|
|
|
|
|
|
|
id:
|
|
|
|
description: the key identifier assigned by GitHub for the deploy key
|
|
|
|
returned: changed
|
|
|
|
type: int
|
|
|
|
sample: 24381901
|
|
|
|
'''
|
|
|
|
|
|
|
|
from ansible.module_utils.basic import AnsibleModule
|
|
|
|
from ansible.module_utils.urls import fetch_url
|
|
|
|
from re import findall
|
|
|
|
|
|
|
|
|
|
|
|
class GithubDeployKey(object):
|
|
|
|
def __init__(self, module):
|
|
|
|
self.module = module
|
|
|
|
|
|
|
|
self.github_url = self.module.params['github_url']
|
|
|
|
self.name = module.params['name']
|
|
|
|
self.key = module.params['key']
|
|
|
|
self.state = module.params['state']
|
|
|
|
self.read_only = module.params.get('read_only', True)
|
|
|
|
self.force = module.params.get('force', False)
|
|
|
|
self.username = module.params.get('username', None)
|
|
|
|
self.password = module.params.get('password', None)
|
|
|
|
self.token = module.params.get('token', None)
|
|
|
|
self.otp = module.params.get('otp', None)
|
|
|
|
|
|
|
|
@property
|
|
|
|
def url(self):
|
|
|
|
owner = self.module.params['owner']
|
|
|
|
repo = self.module.params['repo']
|
|
|
|
return "{0}/repos/{1}/{2}/keys".format(self.github_url, owner, repo)
|
|
|
|
|
|
|
|
@property
|
|
|
|
def headers(self):
|
|
|
|
if self.username is not None and self.password is not None:
|
|
|
|
self.module.params['url_username'] = self.username
|
|
|
|
self.module.params['url_password'] = self.password
|
|
|
|
self.module.params['force_basic_auth'] = True
|
|
|
|
if self.otp is not None:
|
|
|
|
return {"X-GitHub-OTP": self.otp}
|
|
|
|
elif self.token is not None:
|
|
|
|
return {"Authorization": "token {0}".format(self.token)}
|
|
|
|
else:
|
|
|
|
return None
|
|
|
|
|
|
|
|
def paginate(self, url):
|
|
|
|
while url:
|
|
|
|
resp, info = fetch_url(self.module, url, headers=self.headers, method="GET")
|
|
|
|
|
|
|
|
if info["status"] == 200:
|
|
|
|
yield self.module.from_json(resp.read())
|
|
|
|
|
|
|
|
links = {}
|
|
|
|
for x, y in findall(r'<([^>]+)>;\s*rel="(\w+)"', info["link"]):
|
|
|
|
links[y] = x
|
|
|
|
|
|
|
|
url = links.get('next')
|
|
|
|
else:
|
|
|
|
self.handle_error(method="GET", info=info)
|
|
|
|
|
|
|
|
def get_existing_key(self):
|
|
|
|
for keys in self.paginate(self.url):
|
|
|
|
if keys:
|
|
|
|
for i in keys:
|
|
|
|
existing_key_id = str(i["id"])
|
|
|
|
if i["key"].split() == self.key.split()[:2]:
|
|
|
|
return existing_key_id
|
|
|
|
elif i['title'] == self.name and self.force:
|
|
|
|
return existing_key_id
|
|
|
|
else:
|
|
|
|
return None
|
|
|
|
|
|
|
|
def add_new_key(self):
|
|
|
|
request_body = {"title": self.name, "key": self.key, "read_only": self.read_only}
|
|
|
|
|
|
|
|
resp, info = fetch_url(self.module, self.url, data=self.module.jsonify(request_body), headers=self.headers, method="POST", timeout=30)
|
|
|
|
|
|
|
|
status_code = info["status"]
|
|
|
|
|
|
|
|
if status_code == 201:
|
|
|
|
response_body = self.module.from_json(resp.read())
|
|
|
|
key_id = response_body["id"]
|
|
|
|
self.module.exit_json(changed=True, msg="Deploy key successfully added", id=key_id)
|
|
|
|
elif status_code == 422:
|
|
|
|
self.module.exit_json(changed=False, msg="Deploy key already exists")
|
|
|
|
else:
|
|
|
|
self.handle_error(method="POST", info=info)
|
|
|
|
|
|
|
|
def remove_existing_key(self, key_id):
|
|
|
|
resp, info = fetch_url(self.module, "{0}/{1}".format(self.url, key_id), headers=self.headers, method="DELETE")
|
|
|
|
|
|
|
|
status_code = info["status"]
|
|
|
|
|
|
|
|
if status_code == 204:
|
|
|
|
if self.state == 'absent':
|
|
|
|
self.module.exit_json(changed=True, msg="Deploy key successfully deleted", id=key_id)
|
|
|
|
else:
|
|
|
|
self.handle_error(method="DELETE", info=info, key_id=key_id)
|
|
|
|
|
|
|
|
def handle_error(self, method, info, key_id=None):
|
|
|
|
status_code = info['status']
|
|
|
|
body = info.get('body')
|
|
|
|
if body:
|
|
|
|
err = self.module.from_json(body)['message']
|
|
|
|
|
|
|
|
if status_code == 401:
|
|
|
|
self.module.fail_json(msg="Failed to connect to {0} due to invalid credentials".format(self.github_url), http_status_code=status_code, error=err)
|
|
|
|
elif status_code == 404:
|
|
|
|
self.module.fail_json(msg="GitHub repository does not exist", http_status_code=status_code, error=err)
|
|
|
|
else:
|
|
|
|
if method == "GET":
|
|
|
|
self.module.fail_json(msg="Failed to retrieve existing deploy keys", http_status_code=status_code, error=err)
|
|
|
|
elif method == "POST":
|
|
|
|
self.module.fail_json(msg="Failed to add deploy key", http_status_code=status_code, error=err)
|
|
|
|
elif method == "DELETE":
|
|
|
|
self.module.fail_json(msg="Failed to delete existing deploy key", id=key_id, http_status_code=status_code, error=err)
|
|
|
|
|
|
|
|
|
|
|
|
def main():
|
|
|
|
module = AnsibleModule(
|
|
|
|
argument_spec=dict(
|
|
|
|
github_url=dict(required=False, type='str', default="https://api.github.com"),
|
|
|
|
owner=dict(required=True, type='str', aliases=['account', 'organization']),
|
|
|
|
repo=dict(required=True, type='str', aliases=['repository']),
|
|
|
|
name=dict(required=True, type='str', aliases=['title', 'label']),
|
2021-03-12 08:51:47 +01:00
|
|
|
key=dict(required=True, type='str', no_log=False),
|
2020-03-09 10:11:07 +01:00
|
|
|
read_only=dict(required=False, type='bool', default=True),
|
|
|
|
state=dict(default='present', choices=['present', 'absent']),
|
|
|
|
force=dict(required=False, type='bool', default=False),
|
|
|
|
username=dict(required=False, type='str'),
|
|
|
|
password=dict(required=False, type='str', no_log=True),
|
2022-04-26 11:45:15 +02:00
|
|
|
otp=dict(required=False, type='int', no_log=True),
|
2020-03-09 10:11:07 +01:00
|
|
|
token=dict(required=False, type='str', no_log=True)
|
|
|
|
),
|
|
|
|
mutually_exclusive=[
|
|
|
|
['password', 'token']
|
|
|
|
],
|
|
|
|
required_together=[
|
|
|
|
['username', 'password'],
|
|
|
|
['otp', 'username', 'password']
|
|
|
|
],
|
|
|
|
required_one_of=[
|
|
|
|
['username', 'token']
|
|
|
|
],
|
|
|
|
supports_check_mode=True,
|
|
|
|
)
|
|
|
|
|
|
|
|
deploy_key = GithubDeployKey(module)
|
|
|
|
|
|
|
|
if module.check_mode:
|
|
|
|
key_id = deploy_key.get_existing_key()
|
|
|
|
if deploy_key.state == "present" and key_id is None:
|
|
|
|
module.exit_json(changed=True)
|
|
|
|
elif deploy_key.state == "present" and key_id is not None:
|
|
|
|
module.exit_json(changed=False)
|
|
|
|
|
|
|
|
# to forcefully modify an existing key, the existing key must be deleted first
|
|
|
|
if deploy_key.state == 'absent' or deploy_key.force:
|
|
|
|
key_id = deploy_key.get_existing_key()
|
|
|
|
|
|
|
|
if key_id is not None:
|
|
|
|
deploy_key.remove_existing_key(key_id)
|
|
|
|
elif deploy_key.state == 'absent':
|
|
|
|
module.exit_json(changed=False, msg="Deploy key does not exist")
|
|
|
|
|
|
|
|
if deploy_key.state == "present":
|
|
|
|
deploy_key.add_new_key()
|
|
|
|
|
|
|
|
|
|
|
|
if __name__ == '__main__':
|
|
|
|
main()
|