1
0
Fork 0
mirror of https://github.com/ansible-collections/community.general.git synced 2024-09-14 20:13:21 +02:00

authorized_key: support --diff (#19277)

* Refactoring: split readkeys() into readfile() and parsekeys()

* Refactoring: split writekeys() into writefile() and serialize()

* authorized_key: support --diff

* Refactoring: remove no-longer used readkeys()/writekeys()

* Integration test for authorized_key in check mode
This commit is contained in:
Marius Gedminas 2017-01-03 16:32:32 +02:00 committed by jctanner
parent 5c36bd6714
commit b0b7a636d8
2 changed files with 87 additions and 40 deletions

View file

@ -390,14 +390,20 @@ def parsekey(module, raw_key, rank=None):
return (key, key_type, options, comment, rank) return (key, key_type, options, comment, rank)
def readkeys(module, filename): def readfile(filename):
if not os.path.isfile(filename): if not os.path.isfile(filename):
return {} return ''
keys = {}
f = open(filename) f = open(filename)
for rank_index, line in enumerate(f.readlines()): try:
return f.read()
finally:
f.close()
def parsekeys(module, lines):
keys = {}
for rank_index, line in enumerate(lines.splitlines(True)):
key_data = parsekey(module, line, rank=rank_index) key_data = parsekey(module, line, rank=rank_index)
if key_data: if key_data:
# use key as identifier # use key as identifier
@ -406,52 +412,55 @@ def readkeys(module, filename):
# for an invalid line, just set the line # for an invalid line, just set the line
# dict key to the line so it will be re-output later # dict key to the line so it will be re-output later
keys[line] = (line, 'skipped', None, None, rank_index) keys[line] = (line, 'skipped', None, None, rank_index)
f.close()
return keys return keys
def writekeys(module, filename, keys): def writefile(module, filename, content):
fd, tmp_path = tempfile.mkstemp('', 'tmp', os.path.dirname(filename)) fd, tmp_path = tempfile.mkstemp('', 'tmp', os.path.dirname(filename))
f = open(tmp_path,"w") f = open(tmp_path,"w")
# FIXME: only the f.writelines() needs to be in try clause
try: try:
new_keys = keys.values() f.write(content)
# order the new_keys by their original ordering, via the rank item in the tuple
ordered_new_keys = sorted(new_keys, key=itemgetter(4))
for key in ordered_new_keys:
try:
(keyhash, key_type, options, comment, rank) = key
option_str = ""
if options:
option_strings = []
for option_key, value in options.items():
if value is None:
option_strings.append("%s" % option_key)
else:
option_strings.append("%s=%s" % (option_key, value))
option_str = ",".join(option_strings)
option_str += " "
# comment line or invalid line, just leave it
if not key_type:
key_line = key
if key_type == 'skipped':
key_line = key[0]
else:
key_line = "%s%s %s %s\n" % (option_str, key_type, keyhash, comment)
except:
key_line = key
f.writelines(key_line)
except IOError: except IOError:
e = get_exception() e = get_exception()
module.fail_json(msg="Failed to write to file %s: %s" % (tmp_path, str(e))) module.fail_json(msg="Failed to write to file %s: %s" % (tmp_path, str(e)))
f.close() f.close()
module.atomic_move(tmp_path, filename) module.atomic_move(tmp_path, filename)
def serialize(keys):
lines = []
new_keys = keys.values()
# order the new_keys by their original ordering, via the rank item in the tuple
ordered_new_keys = sorted(new_keys, key=itemgetter(4))
for key in ordered_new_keys:
try:
(keyhash, key_type, options, comment, rank) = key
option_str = ""
if options:
option_strings = []
for option_key, value in options.items():
if value is None:
option_strings.append("%s" % option_key)
else:
option_strings.append("%s=%s" % (option_key, value))
option_str = ",".join(option_strings)
option_str += " "
# comment line or invalid line, just leave it
if not key_type:
key_line = key
if key_type == 'skipped':
key_line = key[0]
else:
key_line = "%s%s %s %s\n" % (option_str, key_type, keyhash, comment)
except:
key_line = key
lines.append(key_line)
return ''.join(lines)
def enforce_state(module, params): def enforce_state(module, params):
""" """
Add or remove key. Add or remove key.
@ -483,7 +492,9 @@ def enforce_state(module, params):
# check current state -- just get the filename, don't create file # check current state -- just get the filename, don't create file
do_write = False do_write = False
params["keyfile"] = keyfile(module, user, do_write, path, manage_dir) params["keyfile"] = keyfile(module, user, do_write, path, manage_dir)
existing_keys = readkeys(module, params["keyfile"]) existing_content = readfile(params["keyfile"])
existing_keys = parsekeys(module, existing_content)
# Add a place holder for keys that should exist in the state=present and # Add a place holder for keys that should exist in the state=present and
# exclusive=true case # exclusive=true case
keys_to_exist = [] keys_to_exist = []
@ -551,10 +562,19 @@ def enforce_state(module, params):
do_write = True do_write = True
if do_write: if do_write:
filename = keyfile(module, user, do_write, path, manage_dir)
new_content = serialize(existing_keys)
diff = {
'before_header': params['keyfile'],
'after_header': filename,
'before': existing_content,
'after': new_content,
}
if module.check_mode: if module.check_mode:
module.exit_json(changed=True) module.exit_json(changed=True, diff=diff)
writekeys(module, keyfile(module, user, do_write, path, manage_dir), existing_keys) writefile(module, filename, new_content)
params['changed'] = True params['changed'] = True
params['diff'] = diff
else: else:
if module.check_mode: if module.check_mode:
module.exit_json(changed=False) module.exit_json(changed=False)

View file

@ -396,3 +396,30 @@
assert: assert:
that: that:
- 'content.stdout == "no-agent-forwarding,no-X11-forwarding,permitopen=\"10.9.8.1:8080\",permitopen=\"10.9.8.1:9001\" ssh-dss DATA_BASIC root@testing"' - 'content.stdout == "no-agent-forwarding,no-X11-forwarding,permitopen=\"10.9.8.1:8080\",permitopen=\"10.9.8.1:9001\" ssh-dss DATA_BASIC root@testing"'
# -------------------------------------------------------------
# check mode
- name: copy an existing file in place with comments
copy: src=existing_authorized_keys dest="{{output_dir|expanduser}}/authorized_keys"
- authorized_key:
user: root
key: "{{ multiple_key_different_order_2 }}"
state: present
path: "{{output_dir|expanduser}}/authorized_keys"
check_mode: True
register: result
- name: assert that the key would be added and that the diff is shown
assert:
that:
- 'result.changed'
- '"ssh-rsa WHATEVER 2.5@testing" in result.diff.after'
- name: assert that the file was not changed
copy: src=existing_authorized_keys dest="{{output_dir|expanduser}}/authorized_keys"
register: result
- assert:
that:
- 'result.changed == False'