Import project for #9
add users, groups, authorized_keys, and dot files
This commit is contained in:
commit
95e4ee8c06
17 changed files with 431 additions and 0 deletions
109
add-users-groups-authorized_keys-dot-files/roles/users/README.md
Normal file
109
add-users-groups-authorized_keys-dot-files/roles/users/README.md
Normal file
|
@ -0,0 +1,109 @@
|
|||
# Users
|
||||
Ansible roles to create/configure users on Linux/FreeBSD.
|
||||
|
||||
## Variables
|
||||
| user_groups | | |
|
||||
| ---: |--- |--- |
|
||||
| name | name of the group | Data type |
|
||||
| gid | Optionally set the group ID | int |
|
||||
| state | whether the group shoud be created or removed | present/absent |
|
||||
|
||||
|
||||
| users | | |
|
||||
| ---: |---| ---|
|
||||
| _variable name_ | Description | Data type |
|
||||
| name | username | string |
|
||||
| state | whether the user should be created or removed | present/absent |
|
||||
| password | string of an encrypted value(1) | string |
|
||||
| groups | additional groups the user should belong to | list |
|
||||
| uid | optionally specify a user id | int |
|
||||
| keys | list of dictionaries | list |
|
||||
| shell_lines | list of dictionaries | list |
|
||||
|
||||
(1) https://docs.ansible.com/ansible/latest/reference_appendices/faq.html#how-do-i-generate-crypted-passwords-for-the-user-module
|
||||
## Default variables
|
||||
The default shells depending on the OS are:
|
||||
|
||||
- Linux: `/bin/bash`
|
||||
- FreeBSD: `/bin/cshrc`
|
||||
|
||||
This is defined in the `defaults` section of the **users** role
|
||||
|
||||
|
||||
## Example inventory
|
||||
```
|
||||
user_groups:
|
||||
- name: mygroup
|
||||
gid: 700
|
||||
|
||||
|
||||
users:
|
||||
- name: remember
|
||||
state: present
|
||||
password: "blabla"
|
||||
groups:
|
||||
- mygroup
|
||||
uid: 1100
|
||||
keys:
|
||||
- file: key1
|
||||
state: present
|
||||
shell_lines:
|
||||
- line: "export SSH_AUTH_SOCK=$HOME/.gnupg/S.gpg-agent.ssh"
|
||||
state: present
|
||||
- line: "alias ls='ls lah'"
|
||||
state: present
|
||||
- name: test
|
||||
keys:
|
||||
- file: key2
|
||||
state: absent
|
||||
shell_lines:
|
||||
- line: "export SSH_AUTH_SOCK=$HOME/.gnupg/S.gpg-agent.ssh"
|
||||
state: absent
|
||||
```
|
||||
## Using the Role
|
||||
### Example Playbook
|
||||
```
|
||||
---
|
||||
- name: Manage user configuration
|
||||
hosts: all
|
||||
remote_user: root
|
||||
roles:
|
||||
- users
|
||||
```
|
||||
### Configure a user's ssh keys
|
||||
For every user a directory matching the username should be created under the _keys_ folder in the role's _files_ folder. In this folder the user's ssh keys can be stored.
|
||||
|
||||
```
|
||||
├── files
|
||||
│ └── keys
|
||||
│ ├── remember
|
||||
│ │ └── key1.pub
|
||||
│ └── test
|
||||
│ └── key2.pub
|
||||
```
|
||||
The name of the file holding the key should match the name in the _users_ variable
|
||||
|
||||
```
|
||||
keys:
|
||||
- file: key1
|
||||
state: present
|
||||
```
|
||||
|
||||
### Configure a user's shell
|
||||
This role allows you to add or remove lines to a user's `.bashrc` or `cshrc` file. Since this is not based on a template that overwrites the complete file, users can still add their own configuration too.
|
||||
|
||||
Add items to the **shell_lines** key in the **users** variable. Each item exists of a _line_ and _state_ key.
|
||||
|
||||
Example:
|
||||
```
|
||||
shell_lines:
|
||||
- line: "testline"
|
||||
state: absent
|
||||
- line: "export SSH_AUTH_SOCK=$HOME/.gnupg/S.gpg-agent.ssh"
|
||||
state: present
|
||||
- line: "alias ls='ls lah'"
|
||||
state: present
|
||||
```
|
||||
|
||||
|
||||
|
|
@ -0,0 +1,4 @@
|
|||
default_freebsd_shell: "/bin/csh"
|
||||
default_linux_shell: "/bin/bash"
|
||||
default_shell_lines:
|
||||
- SSH_AUTH_SOCK=$HOME/.gnupg/S.gpg-agent.ssh
|
|
@ -0,0 +1 @@
|
|||
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDMfztaQoo3Alf4Ie4ZrSEkhojOcKl8VRdoRiYb/7FL3IS/5IcSKcan/MGJlRht3ibwJBx9/CY8wZivHgNKCqtbZWGepfOtgWOqI4ROo4sELmRgV8PZUACjCSfaOkOdvCJEjhw3n+aI5jmK9IUA+mwdXkZj/NckNDZAQ+FRqwR6sX7svM4TF/zEI70JvO3xnDgCuC2PgiztVFfMqbWl33NgkG3kWkJ+JarF2pNsxO/+82s/hoC4P+dpZD1PHhJC7OxUiAHe5nwF7heQh9DUBQxJBhitn7C3XqlxEf7Kx3/kO9CUJVDaxS84UUnfUPc0u1iYpE+5ypqkDSyj3yQNpwXf
|
|
@ -0,0 +1 @@
|
|||
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDMfztaQoo3Alf4Ie4ZrSEkhojOcKl8VRdoRiYb/7FL3IS/5IcSKcan/MGJlRht3ibwJBx9/CY8wZivHgNKCqtbZWGepfOtgWOqI4ROo4sELmRgV8PZUACjCSfaOkOdvCJEjhw3n+aI5jmK9IUA+mwdXkZj/NckNDZAQ+FRqwR6sX7svM4TF/zEI70JvO3xnDgCuC2PgiztVFfMqbWl33NgkG3kWkJ+JarF2pNsxO/+82s/hoC4P+dpZD1PHhJC7OxUiAHe5nwF7heQh9DUBQxJBhitn7C3XqlxEf7Kx3/kO9CUJVDaxS84UUnfUPc0u1iYpE+5ypqkDSyj3yQNpwXd
|
|
@ -0,0 +1,4 @@
|
|||
---
|
||||
- include_tasks: set_facts.yml
|
||||
- include_tasks: users.yml
|
||||
- include_tasks: ssh_config.yml
|
|
@ -0,0 +1,8 @@
|
|||
- set_fact:
|
||||
default_shell: "{{ default_freebsd_shell }}"
|
||||
when: ansible_os_family == 'FreeBSD'
|
||||
|
||||
- set_fact:
|
||||
default_shell: "{{ default_linux_shell }}"
|
||||
when: ansible_os_family == 'Debian'
|
||||
|
|
@ -0,0 +1,20 @@
|
|||
- name: Ensure .ssh folder is created
|
||||
file:
|
||||
path: "/home/{{item.name}}/.ssh"
|
||||
state: directory
|
||||
mode: 0700
|
||||
owner: "{{ item.name }}"
|
||||
group: "{{ item.name }}"
|
||||
with_items:
|
||||
- "{{ users }}"
|
||||
|
||||
|
||||
- name: Configure authorized_keys
|
||||
authorized_key:
|
||||
user: "{{ item.0.name }}"
|
||||
key: "{{ lookup('file', 'keys/' + item.0.name + '/' + item.1.file + '.pub') }}"
|
||||
state: "{{ item.1.state | default('present') }}"
|
||||
with_subelements:
|
||||
- "{{ users }}"
|
||||
- keys
|
||||
|
|
@ -0,0 +1,46 @@
|
|||
---
|
||||
- name: Ensure groups exist
|
||||
group:
|
||||
name: "{{ item.name }}"
|
||||
gid: "{{ item.gid | default(omit) }}"
|
||||
state: "{{ item.state | default('present') }}"
|
||||
with_items: "{{ user_groups }}"
|
||||
|
||||
|
||||
- name: Ensure users exist
|
||||
user:
|
||||
name: "{{ item.name }}"
|
||||
state: "{{ item.state | default('present') }}"
|
||||
password: "{{ item.password | default(omit) }}"
|
||||
groups: "{{ item.groups | default(omit) }}"
|
||||
uid: "{{ item.uid | default(omit) }}"
|
||||
shell: "{{ item.shell | default(default_shell) }}"
|
||||
append: yes
|
||||
no_log: True
|
||||
with_items: "{{ users }}"
|
||||
|
||||
|
||||
- name: Configure bashrc
|
||||
lineinfile:
|
||||
path: "/home/{{ item.0.name }}/.bashrc"
|
||||
line: "{{ item.1.line }}"
|
||||
state: "{{ item.1.state | default('present') }}"
|
||||
backup: yes
|
||||
with_subelements:
|
||||
- "{{ users }}"
|
||||
- shell_lines
|
||||
- skip_missing: true
|
||||
when: ansible_os_family == 'Debian'
|
||||
|
||||
|
||||
- name: Configure cshrc
|
||||
lineinfile:
|
||||
path: "/home/{{ item.0.name }}/.cshrc"
|
||||
line: "{{ item.1.line }}"
|
||||
state: "{{ item.1.state | default('present')}}"
|
||||
with_subelements:
|
||||
- "{{ users }}"
|
||||
- shell_lines
|
||||
- skip_missing: true
|
||||
when: ansible_os_family == 'FreeBSD'
|
||||
|
|
@ -0,0 +1,33 @@
|
|||
#---
|
||||
#user_groups:
|
||||
# - name: mygroup
|
||||
# gid: 700
|
||||
# - name: mysecondgroup
|
||||
# gid: 702
|
||||
# state: absent
|
||||
#
|
||||
#
|
||||
#users:
|
||||
# - name: remember
|
||||
# state: present
|
||||
# password: "blabla"
|
||||
# groups:
|
||||
# - mygroup
|
||||
# uid: 1100
|
||||
# keys:
|
||||
# - file: key1
|
||||
# state: present
|
||||
# shell_lines:
|
||||
# - line: "testline"
|
||||
# state: present
|
||||
# - line: "export SSH_AUTH_SOCK=$HOME/.gnupg/S.gpg-agent.ssh"
|
||||
# state: present
|
||||
# - line: "alias ls='ls lah'"
|
||||
# state: present
|
||||
# - name: test
|
||||
# keys:
|
||||
# - file: key2
|
||||
# state: absent
|
||||
# shell_lines:
|
||||
# - line: "export SSH_AUTH_SOCK=$HOME/.gnupg/S.gpg-agent.ssh"
|
||||
# state: present
|
Loading…
Add table
Add a link
Reference in a new issue