- hosts: demo gather_facts: no tasks: - name: "Test privileged {{ jms_account.username }} account" ansible.builtin.ping: - name: "Check if {{ account.username }} user exists" getent: database: passwd key: "{{ account.username }}" register: user_info ignore_errors: yes # 忽略错误,如果用户不存在时不会导致playbook失败 - name: "Add {{ account.username }} user" ansible.builtin.user: name: "{{ account.username }}" shell: "{{ params.shell }}" home: "{{ params.home | default('/home/' + account.username, true) }}" groups: "{{ params.groups }}" expires: -1 state: present when: user_info.failed - name: "Add {{ account.username }} group" ansible.builtin.group: name: "{{ account.username }}" state: present when: user_info.failed - name: "Add {{ account.username }} user to group" ansible.builtin.user: name: "{{ account.username }}" groups: "{{ params.groups }}" when: - user_info.failed - params.groups - name: "Change {{ account.username }} password" ansible.builtin.user: name: "{{ account.username }}" password: "{{ account.secret | password_hash('sha512') }}" update_password: always ignore_errors: true when: account.secret_type == "password" - name: remove jumpserver ssh key ansible.builtin.lineinfile: dest: "{{ ssh_params.dest }}" regexp: "{{ ssh_params.regexp }}" state: absent when: - account.secret_type == "ssh_key" - ssh_params.strategy == "set_jms" - name: "Change {{ account.username }} SSH key" ansible.builtin.authorized_key: user: "{{ account.username }}" key: "{{ account.secret }}" exclusive: "{{ ssh_params.exclusive }}" when: account.secret_type == "ssh_key" - name: "Set {{ account.username }} sudo setting" ansible.builtin.lineinfile: dest: /etc/sudoers state: present regexp: "^{{ account.username }} ALL=" line: "{{ account.username + ' ALL=(ALL) NOPASSWD: ' + params.sudo }}" validate: visudo -cf %s when: - user_info.failed - params.sudo - name: Refresh connection ansible.builtin.meta: reset_connection - name: "Verify {{ account.username }} password" ansible.builtin.ping: become: no vars: ansible_user: "{{ account.username }}" ansible_password: "{{ account.secret }}" ansible_become: no when: account.secret_type == "password" - name: "Verify {{ account.username }} SSH key" ansible.builtin.ping: become: no vars: ansible_user: "{{ account.username }}" ansible_ssh_private_key_file: "{{ account.private_key_path }}" ansible_become: no when: account.secret_type == "ssh_key"