2013-01-03 22:09:29 +00:00
|
|
|
#!/usr/bin/python
|
|
|
|
# -*- coding: utf-8 -*-
|
|
|
|
|
|
|
|
# (c) 2012, Michael DeHaan <michael.dehaan@gmail.com>
|
|
|
|
# (c) 2012, Jayson Vantuyl <jayson@aggressive.ly>
|
|
|
|
#
|
|
|
|
# This file is part of Ansible
|
|
|
|
#
|
|
|
|
# Ansible is free software: you can redistribute it and/or modify
|
|
|
|
# it under the terms of the GNU General Public License as published by
|
|
|
|
# the Free Software Foundation, either version 3 of the License, or
|
|
|
|
# (at your option) any later version.
|
|
|
|
#
|
|
|
|
# Ansible is distributed in the hope that it will be useful,
|
|
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
# GNU General Public License for more details.
|
|
|
|
#
|
|
|
|
# You should have received a copy of the GNU General Public License
|
|
|
|
# along with Ansible. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
|
|
|
|
DOCUMENTATION = '''
|
|
|
|
---
|
|
|
|
module: apt_key
|
2013-01-28 20:41:46 +00:00
|
|
|
author: Jayson Vantuyl & others
|
2013-03-30 19:44:34 +00:00
|
|
|
version_added: "1.0"
|
2013-01-03 22:09:29 +00:00
|
|
|
short_description: Add or remove an apt key
|
|
|
|
description:
|
|
|
|
- Add or remove an I(apt) key, optionally downloading it
|
|
|
|
notes:
|
|
|
|
- doesn't download the key unless it really needs it
|
|
|
|
- as a sanity check, downloaded key id must match the one specified
|
|
|
|
- best practice is to specify the key id and the url
|
|
|
|
options:
|
|
|
|
id:
|
|
|
|
required: false
|
|
|
|
default: none
|
|
|
|
description:
|
|
|
|
- identifier of key
|
2013-06-14 11:29:45 +00:00
|
|
|
data:
|
|
|
|
required: false
|
|
|
|
default: none
|
|
|
|
description:
|
|
|
|
- keyfile contents
|
2013-06-14 11:26:36 +00:00
|
|
|
file:
|
|
|
|
required: false
|
|
|
|
default: none
|
|
|
|
description:
|
|
|
|
- keyfile path
|
2013-07-25 01:10:17 +00:00
|
|
|
keyring:
|
|
|
|
required: false
|
|
|
|
default: none
|
|
|
|
description:
|
|
|
|
- path to specific keyring file in /etc/apt/trusted.gpg.d
|
2013-08-03 18:22:38 +00:00
|
|
|
version_added: "1.3"
|
2013-01-03 22:09:29 +00:00
|
|
|
url:
|
|
|
|
required: false
|
|
|
|
default: none
|
|
|
|
description:
|
|
|
|
- url to retrieve key from.
|
|
|
|
state:
|
|
|
|
required: false
|
|
|
|
choices: [ absent, present ]
|
|
|
|
default: present
|
|
|
|
description:
|
|
|
|
- used to specify if key is being added or revoked
|
2014-03-10 21:06:52 +00:00
|
|
|
validate_certs:
|
|
|
|
description:
|
|
|
|
- If C(no), SSL certificates for the target url will not be validated. This should only be used
|
|
|
|
on personally controlled sites using self-signed certificates.
|
|
|
|
required: false
|
|
|
|
default: 'yes'
|
|
|
|
choices: ['yes', 'no']
|
|
|
|
|
2013-01-03 22:09:29 +00:00
|
|
|
'''
|
|
|
|
|
2013-06-14 09:53:43 +00:00
|
|
|
EXAMPLES = '''
|
|
|
|
# Add an Apt signing key, uses whichever key is at the URL
|
|
|
|
- apt_key: url=https://ftp-master.debian.org/keys/archive-key-6.0.asc state=present
|
|
|
|
|
|
|
|
# Add an Apt signing key, will not download if present
|
|
|
|
- apt_key: id=473041FA url=https://ftp-master.debian.org/keys/archive-key-6.0.asc state=present
|
|
|
|
|
|
|
|
# Remove an Apt signing key, uses whichever key is at the URL
|
|
|
|
- apt_key: url=https://ftp-master.debian.org/keys/archive-key-6.0.asc state=absent
|
|
|
|
|
2013-10-16 18:42:42 +00:00
|
|
|
# Remove a Apt specific signing key, leading 0x is valid
|
|
|
|
- apt_key: id=0x473041FA state=absent
|
2013-06-18 20:18:31 +00:00
|
|
|
|
2013-10-16 18:42:42 +00:00
|
|
|
# Add a key from a file on the Ansible server
|
2013-06-18 20:18:31 +00:00
|
|
|
- apt_key: data="{{ lookup('file', 'apt.gpg') }}" state=present
|
2013-07-25 01:10:17 +00:00
|
|
|
|
|
|
|
# Add an Apt signing key to a specific keyring file
|
|
|
|
- apt_key: id=473041FA url=https://ftp-master.debian.org/keys/archive-key-6.0.asc keyring=/etc/apt/trusted.gpg.d/debian.gpg state=present
|
2013-06-14 09:53:43 +00:00
|
|
|
'''
|
|
|
|
|
|
|
|
|
2013-01-28 20:41:46 +00:00
|
|
|
# FIXME: standardize into module_common
|
2013-01-03 22:09:29 +00:00
|
|
|
from traceback import format_exc
|
|
|
|
from re import compile as re_compile
|
2013-01-28 20:41:46 +00:00
|
|
|
# FIXME: standardize into module_common
|
2013-01-03 22:09:29 +00:00
|
|
|
from distutils.spawn import find_executable
|
|
|
|
from os import environ
|
|
|
|
from sys import exc_info
|
2013-01-28 20:41:46 +00:00
|
|
|
import traceback
|
2013-01-03 22:09:29 +00:00
|
|
|
|
|
|
|
match_key = re_compile("^gpg:.*key ([0-9a-fA-F]+):.*$")
|
|
|
|
|
|
|
|
REQUIRED_EXECUTABLES=['gpg', 'grep', 'apt-key']
|
|
|
|
|
|
|
|
|
2013-01-28 20:41:46 +00:00
|
|
|
def check_missing_binaries(module):
|
|
|
|
missing = [e for e in REQUIRED_EXECUTABLES if not find_executable(e)]
|
|
|
|
if len(missing):
|
|
|
|
module.fail_json(msg="binaries are missing", names=all)
|
|
|
|
|
2013-07-25 01:10:17 +00:00
|
|
|
def all_keys(module, keyring):
|
|
|
|
if keyring:
|
|
|
|
cmd = "apt-key --keyring %s list" % keyring
|
|
|
|
else:
|
|
|
|
cmd = "apt-key list"
|
|
|
|
(rc, out, err) = module.run_command(cmd)
|
2013-01-28 20:41:46 +00:00
|
|
|
results = []
|
|
|
|
lines = out.split('\n')
|
|
|
|
for line in lines:
|
2013-02-18 00:48:02 +00:00
|
|
|
if line.startswith("pub"):
|
|
|
|
tokens = line.split()
|
|
|
|
code = tokens[1]
|
|
|
|
(len_type, real_code) = code.split("/")
|
|
|
|
results.append(real_code)
|
2013-01-28 20:41:46 +00:00
|
|
|
return results
|
|
|
|
|
|
|
|
def key_present(module, key_id):
|
2014-03-12 21:44:53 +00:00
|
|
|
(rc, out, err) = module.run_command("apt-key list | 2>&1 grep -i -q %s" % pipes.quote(key_id), use_unsafe_shell=True)
|
2013-01-28 20:41:46 +00:00
|
|
|
return rc == 0
|
|
|
|
|
|
|
|
def download_key(module, url):
|
|
|
|
# FIXME: move get_url code to common, allow for in-memory D/L, support proxies
|
|
|
|
# and reuse here
|
2013-01-03 22:09:29 +00:00
|
|
|
if url is None:
|
2013-01-28 20:41:46 +00:00
|
|
|
module.fail_json(msg="needed a URL but was not specified")
|
|
|
|
try:
|
2014-03-12 15:31:01 +00:00
|
|
|
rsp, info = fetch_url(module, url)
|
2014-03-10 21:06:52 +00:00
|
|
|
return rsp.read()
|
2013-12-04 12:56:57 +00:00
|
|
|
except Exception:
|
2013-01-28 20:41:46 +00:00
|
|
|
module.fail_json(msg="error getting key id from url", traceback=format_exc())
|
|
|
|
|
|
|
|
|
2013-07-25 01:10:17 +00:00
|
|
|
def add_key(module, keyfile, keyring, data=None):
|
2013-06-26 18:46:29 +00:00
|
|
|
if data is not None:
|
2013-07-25 01:10:17 +00:00
|
|
|
if keyring:
|
|
|
|
cmd = "apt-key --keyring %s add -" % keyring
|
|
|
|
else:
|
|
|
|
cmd = "apt-key add -"
|
2013-06-26 18:46:29 +00:00
|
|
|
(rc, out, err) = module.run_command(cmd, data=data, check_rc=True, binary_data=True)
|
|
|
|
else:
|
2013-07-25 01:10:17 +00:00
|
|
|
if keyring:
|
|
|
|
cmd = "apt-key --keyring %s add %s" % (keyring, keyfile)
|
|
|
|
else:
|
|
|
|
cmd = "apt-key add %s" % (keyfile)
|
2013-06-26 18:46:29 +00:00
|
|
|
(rc, out, err) = module.run_command(cmd, check_rc=True)
|
2013-01-28 20:41:46 +00:00
|
|
|
return True
|
2013-01-03 22:09:29 +00:00
|
|
|
|
2013-07-25 01:10:17 +00:00
|
|
|
def remove_key(module, key_id, keyring):
|
2013-01-28 20:41:46 +00:00
|
|
|
# FIXME: use module.run_command, fail at point of error and don't discard useful stdin/stdout
|
2013-07-25 01:10:17 +00:00
|
|
|
if keyring:
|
|
|
|
cmd = 'apt-key --keyring %s del %s' % (keyring, key_id)
|
|
|
|
else:
|
|
|
|
cmd = 'apt-key del %s' % key_id
|
2013-01-28 20:41:46 +00:00
|
|
|
(rc, out, err) = module.run_command(cmd, check_rc=True)
|
|
|
|
return True
|
2013-01-03 22:09:29 +00:00
|
|
|
|
|
|
|
def main():
|
|
|
|
module = AnsibleModule(
|
|
|
|
argument_spec=dict(
|
|
|
|
id=dict(required=False, default=None),
|
|
|
|
url=dict(required=False),
|
2013-01-28 20:41:46 +00:00
|
|
|
data=dict(required=False),
|
2013-06-14 11:26:36 +00:00
|
|
|
file=dict(required=False),
|
2013-01-28 20:41:46 +00:00
|
|
|
key=dict(required=False),
|
2013-07-25 01:10:17 +00:00
|
|
|
keyring=dict(required=False),
|
2014-03-10 21:06:52 +00:00
|
|
|
state=dict(required=False, choices=['present', 'absent'], default='present'),
|
|
|
|
validate_certs=dict(default='yes', type='bool'),
|
2013-01-28 20:41:46 +00:00
|
|
|
),
|
2013-02-27 20:23:35 +00:00
|
|
|
supports_check_mode=True
|
2013-01-03 22:09:29 +00:00
|
|
|
)
|
|
|
|
|
2013-01-28 20:41:46 +00:00
|
|
|
key_id = module.params['id']
|
|
|
|
url = module.params['url']
|
|
|
|
data = module.params['data']
|
2013-06-26 18:46:29 +00:00
|
|
|
filename = module.params['file']
|
2013-07-25 01:10:17 +00:00
|
|
|
keyring = module.params['keyring']
|
2013-01-28 20:41:46 +00:00
|
|
|
state = module.params['state']
|
|
|
|
changed = False
|
2013-10-16 18:42:42 +00:00
|
|
|
|
2013-10-17 09:59:12 +00:00
|
|
|
if key_id:
|
|
|
|
try:
|
|
|
|
_ = int(key_id, 16)
|
2013-10-30 11:50:34 +00:00
|
|
|
if key_id.startswith('0x'):
|
|
|
|
key_id = key_id[2:]
|
2013-10-17 09:59:12 +00:00
|
|
|
except ValueError:
|
|
|
|
module.fail_json("Invalid key_id")
|
2013-10-16 18:42:42 +00:00
|
|
|
|
2013-01-28 20:41:46 +00:00
|
|
|
# FIXME: I think we have a common facility for this, if not, want
|
|
|
|
check_missing_binaries(module)
|
2013-01-03 22:09:29 +00:00
|
|
|
|
2013-07-25 01:10:17 +00:00
|
|
|
keys = all_keys(module, keyring)
|
2013-02-18 16:03:50 +00:00
|
|
|
return_values = {}
|
2013-01-03 22:09:29 +00:00
|
|
|
|
|
|
|
if state == 'present':
|
2013-01-28 20:41:46 +00:00
|
|
|
if key_id and key_id in keys:
|
|
|
|
module.exit_json(changed=False)
|
2013-01-03 22:09:29 +00:00
|
|
|
else:
|
2013-06-26 18:46:29 +00:00
|
|
|
if not filename and not data:
|
2013-01-28 20:41:46 +00:00
|
|
|
data = download_key(module, url)
|
|
|
|
if key_id and key_id in keys:
|
|
|
|
module.exit_json(changed=False)
|
2013-01-03 22:09:29 +00:00
|
|
|
else:
|
2013-02-27 20:23:35 +00:00
|
|
|
if module.check_mode:
|
|
|
|
module.exit_json(changed=True)
|
2013-06-26 18:46:29 +00:00
|
|
|
if filename:
|
2013-07-25 01:10:17 +00:00
|
|
|
add_key(module, filename, keyring)
|
2013-06-26 18:46:29 +00:00
|
|
|
else:
|
2013-07-25 01:10:17 +00:00
|
|
|
add_key(module, "-", keyring, data)
|
2013-01-28 20:41:46 +00:00
|
|
|
changed=False
|
2013-07-25 01:10:17 +00:00
|
|
|
keys2 = all_keys(module, keyring)
|
2013-01-28 20:41:46 +00:00
|
|
|
if len(keys) != len(keys2):
|
|
|
|
changed=True
|
|
|
|
if key_id and not key_id in keys2:
|
|
|
|
module.fail_json(msg="key does not seem to have been added", id=key_id)
|
|
|
|
module.exit_json(changed=changed)
|
2013-01-03 22:09:29 +00:00
|
|
|
elif state == 'absent':
|
2013-01-28 20:41:46 +00:00
|
|
|
if not key_id:
|
|
|
|
module.fail_json(msg="key is required")
|
|
|
|
if key_id in keys:
|
2013-02-27 20:23:35 +00:00
|
|
|
if module.check_mode:
|
|
|
|
module.exit_json(changed=True)
|
2013-07-25 01:10:17 +00:00
|
|
|
if remove_key(module, key_id, keyring):
|
2013-01-03 22:09:29 +00:00
|
|
|
changed=True
|
|
|
|
else:
|
2013-01-28 20:41:46 +00:00
|
|
|
# FIXME: module.fail_json or exit-json immediately at point of failure
|
2013-02-18 16:03:50 +00:00
|
|
|
module.fail_json(msg="error removing key_id", **return_values)
|
2013-01-03 22:09:29 +00:00
|
|
|
|
2013-02-18 16:03:50 +00:00
|
|
|
module.exit_json(changed=changed, **return_values)
|
2013-01-03 22:09:29 +00:00
|
|
|
|
2013-12-02 20:11:23 +00:00
|
|
|
# import module snippets
|
|
|
|
from ansible.module_utils.basic import *
|
2014-03-10 21:06:52 +00:00
|
|
|
from ansible.module_utils.urls import *
|
2013-01-03 22:09:29 +00:00
|
|
|
main()
|