mirror of
https://github.com/ansible-collections/community.general.git
synced 2024-09-14 20:13:21 +02:00
authorized_key: support --diff (#19277)
* Refactoring: split readkeys() into readfile() and parsekeys() * Refactoring: split writekeys() into writefile() and serialize() * authorized_key: support --diff * Refactoring: remove no-longer used readkeys()/writekeys() * Integration test for authorized_key in check mode
This commit is contained in:
parent
5c36bd6714
commit
b0b7a636d8
2 changed files with 87 additions and 40 deletions
|
@ -390,14 +390,20 @@ def parsekey(module, raw_key, rank=None):
|
||||||
|
|
||||||
return (key, key_type, options, comment, rank)
|
return (key, key_type, options, comment, rank)
|
||||||
|
|
||||||
def readkeys(module, filename):
|
def readfile(filename):
|
||||||
|
|
||||||
if not os.path.isfile(filename):
|
if not os.path.isfile(filename):
|
||||||
return {}
|
return ''
|
||||||
|
|
||||||
keys = {}
|
|
||||||
f = open(filename)
|
f = open(filename)
|
||||||
for rank_index, line in enumerate(f.readlines()):
|
try:
|
||||||
|
return f.read()
|
||||||
|
finally:
|
||||||
|
f.close()
|
||||||
|
|
||||||
|
def parsekeys(module, lines):
|
||||||
|
keys = {}
|
||||||
|
for rank_index, line in enumerate(lines.splitlines(True)):
|
||||||
key_data = parsekey(module, line, rank=rank_index)
|
key_data = parsekey(module, line, rank=rank_index)
|
||||||
if key_data:
|
if key_data:
|
||||||
# use key as identifier
|
# use key as identifier
|
||||||
|
@ -406,16 +412,23 @@ def readkeys(module, filename):
|
||||||
# for an invalid line, just set the line
|
# for an invalid line, just set the line
|
||||||
# dict key to the line so it will be re-output later
|
# dict key to the line so it will be re-output later
|
||||||
keys[line] = (line, 'skipped', None, None, rank_index)
|
keys[line] = (line, 'skipped', None, None, rank_index)
|
||||||
f.close()
|
|
||||||
return keys
|
return keys
|
||||||
|
|
||||||
def writekeys(module, filename, keys):
|
def writefile(module, filename, content):
|
||||||
|
|
||||||
fd, tmp_path = tempfile.mkstemp('', 'tmp', os.path.dirname(filename))
|
fd, tmp_path = tempfile.mkstemp('', 'tmp', os.path.dirname(filename))
|
||||||
f = open(tmp_path,"w")
|
f = open(tmp_path,"w")
|
||||||
|
|
||||||
# FIXME: only the f.writelines() needs to be in try clause
|
|
||||||
try:
|
try:
|
||||||
|
f.write(content)
|
||||||
|
except IOError:
|
||||||
|
e = get_exception()
|
||||||
|
module.fail_json(msg="Failed to write to file %s: %s" % (tmp_path, str(e)))
|
||||||
|
f.close()
|
||||||
|
module.atomic_move(tmp_path, filename)
|
||||||
|
|
||||||
|
def serialize(keys):
|
||||||
|
lines = []
|
||||||
new_keys = keys.values()
|
new_keys = keys.values()
|
||||||
# order the new_keys by their original ordering, via the rank item in the tuple
|
# order the new_keys by their original ordering, via the rank item in the tuple
|
||||||
ordered_new_keys = sorted(new_keys, key=itemgetter(4))
|
ordered_new_keys = sorted(new_keys, key=itemgetter(4))
|
||||||
|
@ -445,12 +458,8 @@ def writekeys(module, filename, keys):
|
||||||
key_line = "%s%s %s %s\n" % (option_str, key_type, keyhash, comment)
|
key_line = "%s%s %s %s\n" % (option_str, key_type, keyhash, comment)
|
||||||
except:
|
except:
|
||||||
key_line = key
|
key_line = key
|
||||||
f.writelines(key_line)
|
lines.append(key_line)
|
||||||
except IOError:
|
return ''.join(lines)
|
||||||
e = get_exception()
|
|
||||||
module.fail_json(msg="Failed to write to file %s: %s" % (tmp_path, str(e)))
|
|
||||||
f.close()
|
|
||||||
module.atomic_move(tmp_path, filename)
|
|
||||||
|
|
||||||
def enforce_state(module, params):
|
def enforce_state(module, params):
|
||||||
"""
|
"""
|
||||||
|
@ -483,7 +492,9 @@ def enforce_state(module, params):
|
||||||
# check current state -- just get the filename, don't create file
|
# check current state -- just get the filename, don't create file
|
||||||
do_write = False
|
do_write = False
|
||||||
params["keyfile"] = keyfile(module, user, do_write, path, manage_dir)
|
params["keyfile"] = keyfile(module, user, do_write, path, manage_dir)
|
||||||
existing_keys = readkeys(module, params["keyfile"])
|
existing_content = readfile(params["keyfile"])
|
||||||
|
existing_keys = parsekeys(module, existing_content)
|
||||||
|
|
||||||
# Add a place holder for keys that should exist in the state=present and
|
# Add a place holder for keys that should exist in the state=present and
|
||||||
# exclusive=true case
|
# exclusive=true case
|
||||||
keys_to_exist = []
|
keys_to_exist = []
|
||||||
|
@ -551,10 +562,19 @@ def enforce_state(module, params):
|
||||||
do_write = True
|
do_write = True
|
||||||
|
|
||||||
if do_write:
|
if do_write:
|
||||||
|
filename = keyfile(module, user, do_write, path, manage_dir)
|
||||||
|
new_content = serialize(existing_keys)
|
||||||
|
diff = {
|
||||||
|
'before_header': params['keyfile'],
|
||||||
|
'after_header': filename,
|
||||||
|
'before': existing_content,
|
||||||
|
'after': new_content,
|
||||||
|
}
|
||||||
if module.check_mode:
|
if module.check_mode:
|
||||||
module.exit_json(changed=True)
|
module.exit_json(changed=True, diff=diff)
|
||||||
writekeys(module, keyfile(module, user, do_write, path, manage_dir), existing_keys)
|
writefile(module, filename, new_content)
|
||||||
params['changed'] = True
|
params['changed'] = True
|
||||||
|
params['diff'] = diff
|
||||||
else:
|
else:
|
||||||
if module.check_mode:
|
if module.check_mode:
|
||||||
module.exit_json(changed=False)
|
module.exit_json(changed=False)
|
||||||
|
|
|
@ -396,3 +396,30 @@
|
||||||
assert:
|
assert:
|
||||||
that:
|
that:
|
||||||
- 'content.stdout == "no-agent-forwarding,no-X11-forwarding,permitopen=\"10.9.8.1:8080\",permitopen=\"10.9.8.1:9001\" ssh-dss DATA_BASIC root@testing"'
|
- 'content.stdout == "no-agent-forwarding,no-X11-forwarding,permitopen=\"10.9.8.1:8080\",permitopen=\"10.9.8.1:9001\" ssh-dss DATA_BASIC root@testing"'
|
||||||
|
|
||||||
|
# -------------------------------------------------------------
|
||||||
|
# check mode
|
||||||
|
|
||||||
|
- name: copy an existing file in place with comments
|
||||||
|
copy: src=existing_authorized_keys dest="{{output_dir|expanduser}}/authorized_keys"
|
||||||
|
|
||||||
|
- authorized_key:
|
||||||
|
user: root
|
||||||
|
key: "{{ multiple_key_different_order_2 }}"
|
||||||
|
state: present
|
||||||
|
path: "{{output_dir|expanduser}}/authorized_keys"
|
||||||
|
check_mode: True
|
||||||
|
register: result
|
||||||
|
|
||||||
|
- name: assert that the key would be added and that the diff is shown
|
||||||
|
assert:
|
||||||
|
that:
|
||||||
|
- 'result.changed'
|
||||||
|
- '"ssh-rsa WHATEVER 2.5@testing" in result.diff.after'
|
||||||
|
|
||||||
|
- name: assert that the file was not changed
|
||||||
|
copy: src=existing_authorized_keys dest="{{output_dir|expanduser}}/authorized_keys"
|
||||||
|
register: result
|
||||||
|
- assert:
|
||||||
|
that:
|
||||||
|
- 'result.changed == False'
|
||||||
|
|
Loading…
Reference in a new issue