jumpserver/apps/accounts/automations/change_secret/host/posix/main.yml

86 lines
2.5 KiB
YAML
Raw Normal View History

2022-10-09 12:54:11 +00:00
- hosts: demo
2022-10-10 05:56:42 +00:00
gather_facts: no
2022-10-09 12:54:11 +00:00
tasks:
- name: Test privileged account
2022-10-14 08:33:24 +00:00
ansible.builtin.ping:
2022-10-09 12:54:11 +00:00
- name: Check user
ansible.builtin.user:
name: "{{ account.username }}"
shell: "{{ params.shell }}"
home: "{{ params.home | default('/home/' + account.username, true) }}"
groups: "{{ params.groups }}"
expires: -1
state: present
- name: "Add {{ account.username }} group"
ansible.builtin.group:
name: "{{ account.username }}"
state: present
- name: Add user groups
ansible.builtin.user:
name: "{{ account.username }}"
groups: "{{ params.groups }}"
when: params.groups
2022-10-09 12:54:11 +00:00
- name: Change password
2022-10-14 08:33:24 +00:00
ansible.builtin.user:
2022-10-09 12:54:11 +00:00
name: "{{ account.username }}"
2022-10-13 09:47:29 +00:00
password: "{{ account.secret | password_hash('sha512') }}"
2022-10-09 12:54:11 +00:00
update_password: always
2023-05-19 08:09:32 +00:00
ignore_errors: true
when: account.secret_type == "password"
2022-10-09 12:54:11 +00:00
2022-10-20 12:34:15 +00:00
- name: create user If it already exists, no operation will be performed
ansible.builtin.user:
name: "{{ account.username }}"
when: account.secret_type == "ssh_key"
2022-10-20 12:34:15 +00:00
- name: remove jumpserver ssh key
ansible.builtin.lineinfile:
dest: "{{ ssh_params.dest }}"
regexp: "{{ ssh_params.regexp }}"
2022-10-20 12:34:15 +00:00
state: absent
2022-10-27 10:53:10 +00:00
when:
- account.secret_type == "ssh_key"
- ssh_params.strategy == "set_jms"
2022-10-20 12:34:15 +00:00
- name: Change SSH key
2022-10-14 08:33:24 +00:00
ansible.builtin.authorized_key:
2022-10-09 12:54:11 +00:00
user: "{{ account.username }}"
2022-10-20 12:34:15 +00:00
key: "{{ account.secret }}"
exclusive: "{{ ssh_params.exclusive }}"
when: account.secret_type == "ssh_key"
2022-10-14 08:33:24 +00:00
- name: Set sudo setting
ansible.builtin.lineinfile:
dest: /etc/sudoers
state: present
regexp: "^{{ account.username }} ALL="
line: "{{ account.username + ' ALL=(ALL) NOPASSWD: ' + params.sudo }}"
validate: visudo -cf %s
when:
- params.sudo
2022-10-14 08:33:24 +00:00
- name: Refresh connection
ansible.builtin.meta: reset_connection
2022-10-09 12:54:11 +00:00
- name: Verify password
2022-10-14 08:33:24 +00:00
ansible.builtin.ping:
become: no
2022-10-09 12:54:11 +00:00
vars:
ansible_user: "{{ account.username }}"
2022-10-14 08:33:24 +00:00
ansible_password: "{{ account.secret }}"
ansible_become: no
when: account.secret_type == "password"
2022-10-20 12:34:15 +00:00
- name: Verify SSH key
ansible.builtin.ping:
become: no
vars:
ansible_user: "{{ account.username }}"
ansible_ssh_private_key_file: "{{ account.private_key_path }}"
ansible_become: no
when: account.secret_type == "ssh_key"