2016-11-07 14:00:57 +01:00
|
|
|
---
|
|
|
|
|
|
|
|
- name: Test if uid exists for '{{ user.name }}'
|
|
|
|
command: 'getent passwd {{ user.uid }}'
|
|
|
|
register: uidisbusy
|
|
|
|
failed_when: False
|
|
|
|
changed_when: False
|
|
|
|
|
|
|
|
- name: Add Unix account with classical uid for '{{ user.name }}'
|
|
|
|
user:
|
|
|
|
state: present
|
|
|
|
uid: '{{ user.uid }}'
|
|
|
|
name: '{{ user.name }}'
|
|
|
|
comment: '{{ user.fullname }}'
|
|
|
|
shell: /bin/bash
|
|
|
|
password: '{{ user.password_hash }}'
|
|
|
|
update_password: on_create
|
|
|
|
when: uidisbusy|failed
|
|
|
|
|
|
|
|
- name: Add Unix account with random uid for '{{ user.name }}'
|
|
|
|
user:
|
|
|
|
state: present
|
|
|
|
name: '{{ user.name }}'
|
|
|
|
comment: '{{ user.fullname }}'
|
|
|
|
shell: /bin/bash
|
|
|
|
password: '{{ user.password_hash }}'
|
|
|
|
update_password: on_create
|
|
|
|
when: uidisbusy|success
|
|
|
|
|
|
|
|
- name: Fix perms on homedirectory for '{{ user.name }}'
|
|
|
|
file:
|
|
|
|
name: '/home/{{ user.name }}'
|
|
|
|
mode: 0700
|
|
|
|
state: directory
|
|
|
|
|
|
|
|
- name: is evomaintenance installed?
|
|
|
|
stat:
|
2016-12-19 14:19:35 +01:00
|
|
|
path: "/usr/share/scripts/evomaintenance.sh"
|
2016-11-07 14:00:57 +01:00
|
|
|
register: evomaintenance_script
|
|
|
|
|
|
|
|
- name: Add evomaintenance trap for '{{ user.name }}'
|
|
|
|
lineinfile:
|
|
|
|
state: present
|
|
|
|
dest: '/home/{{ user.name }}/.profile'
|
|
|
|
insertafter: EOF
|
2016-12-19 14:19:35 +01:00
|
|
|
line: 'trap "sudo /usr/share/scripts/evomaintenance.sh" 0'
|
2016-11-07 14:00:57 +01:00
|
|
|
when: evomaintenance_script.stat.exists
|
|
|
|
|
|
|
|
- name: Create .ssh directory for '{{ user.name }}'
|
|
|
|
file:
|
|
|
|
dest: '/home/{{ user.name }}/.ssh/'
|
|
|
|
state: directory
|
|
|
|
mode: 0700
|
|
|
|
owner: '{{ user.name }}'
|
|
|
|
group: '{{ user.name }}'
|
|
|
|
|
|
|
|
- name: Add user's SSH public key for '{{ user.name }}'
|
2016-12-27 14:04:02 +01:00
|
|
|
authorized_key:
|
|
|
|
user: "{{ user.name }}"
|
|
|
|
key: "{{ user.ssh_key }}"
|
|
|
|
state: present
|
|
|
|
|
|
|
|
- name: verify AllowUsers directive
|
|
|
|
command: "grep AllowUsers /etc/ssh/sshd_config"
|
|
|
|
changed_when: False
|
|
|
|
failed_when: False
|
|
|
|
register: grep_allowusers_ssh
|
|
|
|
|
|
|
|
- name: Add AllowUsers' sshd directive for '{{ user.name }}'
|
2016-11-07 14:00:57 +01:00
|
|
|
lineinfile:
|
2016-12-27 14:04:02 +01:00
|
|
|
dest: /etc/ssh/sshd_config
|
|
|
|
line: "\nAllowUsers {{ user.name }}"
|
|
|
|
insertafter: '^UsePAM'
|
|
|
|
validate: '/usr/sbin/sshd -T -f %s'
|
|
|
|
notify:
|
|
|
|
- reload sshd
|
|
|
|
when: grep_allowusers_ssh.rc != 0
|
2016-11-07 14:00:57 +01:00
|
|
|
|
|
|
|
- name: Modify AllowUsers' sshd directive for '{{ user.name }}'
|
|
|
|
replace:
|
|
|
|
dest: /etc/ssh/sshd_config
|
|
|
|
regexp: '^(AllowUsers ((?!{{ user.name }}).)*)$'
|
|
|
|
replace: '\1 {{ user.name }}'
|
2016-12-27 14:04:02 +01:00
|
|
|
validate: '/usr/sbin/sshd -T -f %s'
|
|
|
|
notify:
|
|
|
|
- reload sshd
|
|
|
|
when: grep_allowusers_ssh.rc == 0
|
|
|
|
|
|
|
|
- name: verify Match User directive
|
|
|
|
command: "grep 'Match User' /etc/ssh/sshd_config"
|
|
|
|
changed_when: False
|
|
|
|
failed_when: False
|
|
|
|
register: grep_matchuser_ssh
|
|
|
|
|
|
|
|
- name: Add Match User sshd directive for '{{ user.name }}'
|
|
|
|
lineinfile:
|
|
|
|
dest: /etc/ssh/sshd_config
|
|
|
|
line: "\nMatch User {{ user.name }}\n PasswordAuthentication no"
|
|
|
|
validate: '/usr/sbin/sshd -T -f %s'
|
2016-11-07 14:00:57 +01:00
|
|
|
notify:
|
|
|
|
- reload sshd
|
2016-12-27 14:04:02 +01:00
|
|
|
when: grep_matchuser_ssh.rc != 0
|
2016-11-07 14:00:57 +01:00
|
|
|
|
|
|
|
- name: Modify Match User's sshd directive for '{{ user.name }}'
|
|
|
|
replace:
|
|
|
|
dest: /etc/ssh/sshd_config
|
|
|
|
regexp: '^(Match User ((?!{{ user.name }}).)*)$'
|
|
|
|
replace: '\1,{{ user.name }}'
|
2016-12-27 14:04:02 +01:00
|
|
|
validate: '/usr/sbin/sshd -T -f %s'
|
2016-11-07 14:00:57 +01:00
|
|
|
notify:
|
|
|
|
- reload sshd
|
2016-12-27 14:04:02 +01:00
|
|
|
when: grep_matchuser_ssh.rc == 0
|
2016-11-07 14:00:57 +01:00
|
|
|
|
2016-12-27 14:04:02 +01:00
|
|
|
- name: Verify Evolinux sudoers file presence
|
2016-11-07 14:00:57 +01:00
|
|
|
template:
|
|
|
|
src: sudoers_debian.j2
|
|
|
|
dest: /etc/sudoers.d/evolinux
|
|
|
|
force: false
|
|
|
|
validate: '/usr/sbin/visudo -cf %s'
|
|
|
|
register: copy_sudoers_evolinux
|
|
|
|
|
|
|
|
- name: Add user in sudoers file for '{{ user.name }}'
|
|
|
|
replace:
|
|
|
|
dest: /etc/sudoers.d/evolinux
|
|
|
|
regexp: '^(User_Alias\s+ADMINS\s+=((?!{{ user.name }}).)*)$'
|
|
|
|
replace: '\1,{{ user.name }}'
|
|
|
|
validate: '/usr/sbin/visudo -cf %s'
|
|
|
|
when: not copy_sudoers_evolinux.changed
|