- block: - name: Create a local temporary directory shell: mktemp -d /tmp/ansible_test.XXXXXXXXX register: tempfile_result delegate_to: localhost - set_fact: local_temp_dir: '{{ tempfile_result.stdout }}' remote_dir: '{{ output_dir }}' symlinks: ansible-test-abs-link: /tmp/ansible-test-abs-link ansible-test-abs-link-dir: /tmp/ansible-test-abs-link-dir circles: ../ invalid: invalid invalid2: ../invalid out_of_tree_circle: /tmp/ansible-test-link-dir/out_of_tree_circle subdir3: ../subdir2/subdir3 bar.txt: ../bar.txt - file: path={{local_temp_dir}} state=directory name: ensure temp dir exists # file cannot do this properly, use command instead - name: Create symbolic link command: "ln -s '{{ item.value }}' '{{ item.key }}'" args: chdir: '{{role_path}}/files/subdir/subdir1' warn: no with_dict: "{{ symlinks }}" delegate_to: localhost - name: Create remote unprivileged remote user user: name: '{{ remote_unprivileged_user }}' register: user - name: Check sudoers dir stat: path: /etc/sudoers.d register: etc_sudoers - name: Set sudoers.d path fact set_fact: sudoers_d_file: "{{ '/etc/sudoers.d' if etc_sudoers.stat.exists else '/usr/local/etc/sudoers.d' }}/{{ remote_unprivileged_user }}" - name: Create sudoers file copy: dest: "{{ sudoers_d_file }}" content: "{{ remote_unprivileged_user }} ALL=(ALL) NOPASSWD: ALL" - file: path: "{{ user.home }}/.ssh" owner: '{{ remote_unprivileged_user }}' state: directory mode: 0700 - name: Duplicate authorized_keys copy: src: $HOME/.ssh/authorized_keys dest: '{{ user.home }}/.ssh/authorized_keys' owner: '{{ remote_unprivileged_user }}' mode: 0600 remote_src: yes - file: path: "{{ remote_dir }}" state: directory remote_user: '{{ remote_unprivileged_user }}' # execute tests tasks using an unprivileged user, this is useful to avoid # local/remote ambiguity when controller and managed hosts are identical. - import_tasks: tests.yml remote_user: '{{ remote_unprivileged_user }}' - import_tasks: acls.yml when: ansible_system == 'Linux' - import_tasks: selinux.yml when: ansible_os_family == 'RedHat' and ansible_selinux.get('mode') == 'enforcing' - import_tasks: no_log.yml delegate_to: localhost - import_tasks: check_mode.yml # https://github.com/ansible/ansible/issues/57618 - name: Test diff contents copy: content: 'Ansible managed\n' dest: "{{ local_temp_dir }}/file.txt" diff: yes register: diff_output - assert: that: - 'diff_output.diff[0].before == ""' - '"Ansible managed" in diff_output.diff[0].after' always: - name: Cleaning file: path: '{{ local_temp_dir }}' state: absent delegate_to: localhost - name: Remove symbolic link file: path: '{{ role_path }}/files/subdir/subdir1/{{ item.key }}' state: absent delegate_to: localhost with_dict: "{{ symlinks }}" - name: Remote unprivileged remote user user: name: '{{ remote_unprivileged_user }}' state: absent remove: yes force: yes - name: Remove sudoers.d file file: path: "{{ sudoers_d_file }}" state: absent