Anons79 Mini Shell

Directory : /lib/python2.7/site-packages/ansible/modules/system/
Upload File :
Current File : //lib/python2.7/site-packages/ansible/modules/system/user.pyo

�
�Udac@`s�ddlmZmZmZeZidd6dgd6dd6ZdZd	Zd
Z	ddl
Z
ddlZddlZddl
Z
ddlZddlZddlZddlZddlZddlZddlZddlZddlZddlmZdd
lmZmZddlmZmZmZyddl Z e!Z"Wne#k
r_e$Z"nXej%d�Z&de'fd��YZ(de(fd��YZ)de)fd��YZ*de(fd��YZ+de(fd��YZ,de(fd��YZ-de(fd��YZ.de(fd��YZ/d e(fd!��YZ0d"e(fd#��YZ1d$e1fd%��YZ2d&�Z3e4d'kr�e3�ndS((i(tabsolute_importtdivisiontprint_functions1.1tmetadata_versiontstableinterfacetstatustcoretsupported_bys�+
module: user
version_added: "0.2"
short_description: Manage user accounts
description:
    - Manage user accounts and user attributes.
    - For Windows targets, use the M(win_user) module instead.
options:
    name:
        description:
            - Name of the user to create, remove or modify.
        type: str
        required: true
        aliases: [ user ]
    uid:
        description:
            - Optionally sets the I(UID) of the user.
        type: int
    comment:
        description:
            - Optionally sets the description (aka I(GECOS)) of user account.
        type: str
    hidden:
        description:
            - macOS only, optionally hide the user from the login window and system preferences.
            - The default will be C(yes) if the I(system) option is used.
        type: bool
        version_added: "2.6"
    non_unique:
        description:
            - Optionally when used with the -u option, this option allows to change the user ID to a non-unique value.
        type: bool
        default: no
        version_added: "1.1"
    seuser:
        description:
            - Optionally sets the seuser type (user_u) on selinux enabled systems.
        type: str
        version_added: "2.1"
    group:
        description:
            - Optionally sets the user's primary group (takes a group name).
        type: str
    groups:
        description:
            - List of groups user will be added to. When set to an empty string C(''),
              the user is removed from all groups except the primary group.
            - Before Ansible 2.3, the only input format allowed was a comma separated string.
            - Mutually exclusive with C(local)
        type: list
    append:
        description:
            - If C(yes), add the user to the groups specified in C(groups).
            - If C(no), user will only be added to the groups specified in C(groups),
              removing them from all other groups.
            - Mutually exclusive with C(local)
        type: bool
        default: no
    shell:
        description:
            - Optionally set the user's shell.
            - On macOS, before Ansible 2.5, the default shell for non-system users was C(/usr/bin/false).
              Since Ansible 2.5, the default shell for non-system users on macOS is C(/bin/bash).
            - On other operating systems, the default shell is determined by the underlying tool being
              used. See Notes for details.
        type: str
    home:
        description:
            - Optionally set the user's home directory.
        type: path
    skeleton:
        description:
            - Optionally set a home skeleton directory.
            - Requires C(create_home) option!
        type: str
        version_added: "2.0"
    password:
        description:
            - Optionally set the user's password to this crypted value.
            - On macOS systems, this value has to be cleartext. Beware of security issues.
            - To create a disabled account on Linux systems, set this to C('!') or C('*').
            - To create a disabled account on OpenBSD, set this to C('*************').
            - See U(https://docs.ansible.com/ansible/faq.html#how-do-i-generate-encrypted-passwords-for-the-user-module)
              for details on various ways to generate these password values.
        type: str
    state:
        description:
            - Whether the account should exist or not, taking action if the state is different from what is stated.
        type: str
        choices: [ absent, present ]
        default: present
    create_home:
        description:
            - Unless set to C(no), a home directory will be made for the user
              when the account is created or if the home directory does not exist.
            - Changed from C(createhome) to C(create_home) in Ansible 2.5.
        type: bool
        default: yes
        aliases: [ createhome ]
    move_home:
        description:
            - "If set to C(yes) when used with C(home: ), attempt to move the user's old home
              directory to the specified directory if it isn't there already and the old home exists."
        type: bool
        default: no
    system:
        description:
            - When creating an account C(state=present), setting this to C(yes) makes the user a system account.
            - This setting cannot be changed on existing users.
        type: bool
        default: no
    force:
        description:
            - This only affects C(state=absent), it forces removal of the user and associated directories on supported platforms.
            - The behavior is the same as C(userdel --force), check the man page for C(userdel) on your system for details and support.
            - When used with C(generate_ssh_key=yes) this forces an existing key to be overwritten.
        type: bool
        default: no
    remove:
        description:
            - This only affects C(state=absent), it attempts to remove directories associated with the user.
            - The behavior is the same as C(userdel --remove), check the man page for details and support.
        type: bool
        default: no
    login_class:
        description:
            - Optionally sets the user's login class, a feature of most BSD OSs.
        type: str
    generate_ssh_key:
        description:
            - Whether to generate a SSH key for the user in question.
            - This will B(not) overwrite an existing SSH key unless used with C(force=yes).
        type: bool
        default: no
        version_added: "0.9"
    ssh_key_bits:
        description:
            - Optionally specify number of bits in SSH key to create.
        type: int
        default: default set by ssh-keygen
        version_added: "0.9"
    ssh_key_type:
        description:
            - Optionally specify the type of SSH key to generate.
            - Available SSH key types will depend on implementation
              present on target host.
        type: str
        default: rsa
        version_added: "0.9"
    ssh_key_file:
        description:
            - Optionally specify the SSH key filename.
            - If this is a relative filename then it will be relative to the user's home directory.
            - This parameter defaults to I(.ssh/id_rsa).
        type: path
        version_added: "0.9"
    ssh_key_comment:
        description:
            - Optionally define the comment for the SSH key.
        type: str
        default: ansible-generated on $HOSTNAME
        version_added: "0.9"
    ssh_key_passphrase:
        description:
            - Set a passphrase for the SSH key.
            - If no passphrase is provided, the SSH key will default to having no passphrase.
        type: str
        version_added: "0.9"
    update_password:
        description:
            - C(always) will update passwords if they differ.
            - C(on_create) will only set the password for newly created users.
        type: str
        choices: [ always, on_create ]
        default: always
        version_added: "1.3"
    expires:
        description:
            - An expiry time for the user in epoch, it will be ignored on platforms that do not support this.
            - Currently supported on GNU/Linux, FreeBSD, and DragonFlyBSD.
            - Since Ansible 2.6 you can remove the expiry time specify a negative value.
              Currently supported on GNU/Linux and FreeBSD.
        type: float
        version_added: "1.9"
    password_lock:
        description:
            - Lock the password (C(usermod -L), C(usermod -U), C(pw lock)).
            - Implementation differs by platform. This option does not always mean the user cannot login using other methods.
            - This option does not disable the user, only lock the password.
            - This must be set to C(False) in order to unlock a currently locked password. The absence of this parameter will not unlock a password.
            - Currently supported on Linux, FreeBSD, DragonFlyBSD, NetBSD, OpenBSD.
        type: bool
        version_added: "2.6"
    local:
        description:
            - Forces the use of "local" command alternatives on platforms that implement it.
            - This is useful in environments that use centralized authentification when you want to manipulate the local users
              (i.e. it uses C(luseradd) instead of C(useradd)).
            - This will check C(/etc/passwd) for an existing account before invoking commands. If the local account database
              exists somewhere other than C(/etc/passwd), this setting will not work properly.
            - This requires that the above commands as well as C(/etc/passwd) must exist on the target host, otherwise it will be a fatal error.
            - Mutually exclusive with C(groups) and C(append)
        type: bool
        default: no
        version_added: "2.4"
    profile:
        description:
            - Sets the profile of the user.
            - Does nothing when used with other platforms.
            - Can set multiple profiles using comma separation.
            - To delete all the profiles, use C(profile='').
            - Currently supported on Illumos/Solaris.
        type: str
        version_added: "2.8"
    authorization:
        description:
            - Sets the authorization of the user.
            - Does nothing when used with other platforms.
            - Can set multiple authorizations using comma separation.
            - To delete all authorizations, use C(authorization='').
            - Currently supported on Illumos/Solaris.
        type: str
        version_added: "2.8"
    role:
        description:
            - Sets the role of the user.
            - Does nothing when used with other platforms.
            - Can set multiple roles using comma separation.
            - To delete all roles, use C(role='').
            - Currently supported on Illumos/Solaris.
        type: str
        version_added: "2.8"
notes:
  - There are specific requirements per platform on user management utilities. However
    they generally come pre-installed with the system and Ansible will require they
    are present at runtime. If they are not, a descriptive error message will be shown.
  - On SunOS platforms, the shadow file is backed up automatically since this module edits it directly.
    On other platforms, the shadow file is backed up by the underlying tools used by this module.
  - On macOS, this module uses C(dscl) to create, modify, and delete accounts. C(dseditgroup) is used to
    modify group membership. Accounts are hidden from the login window by modifying
    C(/Library/Preferences/com.apple.loginwindow.plist).
  - On FreeBSD, this module uses C(pw useradd) and C(chpass) to create, C(pw usermod) and C(chpass) to modify,
    C(pw userdel) remove, C(pw lock) to lock, and C(pw unlock) to unlock accounts.
  - On all other platforms, this module uses C(useradd) to create, C(usermod) to modify, and
    C(userdel) to remove accounts.
seealso:
- module: authorized_key
- module: group
- module: win_user
author:
- Stephen Fromm (@sfromm)
s�
- name: Add the user 'johnd' with a specific uid and a primary group of 'admin'
  user:
    name: johnd
    comment: John Doe
    uid: 1040
    group: admin

- name: Add the user 'james' with a bash shell, appending the group 'admins' and 'developers' to the user's groups
  user:
    name: james
    shell: /bin/bash
    groups: admins,developers
    append: yes

- name: Remove the user 'johnd'
  user:
    name: johnd
    state: absent
    remove: yes

- name: Create a 2048-bit SSH key for user jsmith in ~jsmith/.ssh/id_rsa
  user:
    name: jsmith
    generate_ssh_key: yes
    ssh_key_bits: 2048
    ssh_key_file: .ssh/id_rsa

- name: Added a consultant whose account you want to expire
  user:
    name: james18
    shell: /bin/zsh
    groups: developers
    expires: 1422403387

- name: Starting at Ansible 2.6, modify user, remove expiry time
  user:
    name: james18
    expires: -1
s�
append:
  description: Whether or not to append the user to groups
  returned: When state is 'present' and the user exists
  type: bool
  sample: True
comment:
  description: Comment section from passwd file, usually the user name
  returned: When user exists
  type: str
  sample: Agent Smith
create_home:
  description: Whether or not to create the home directory
  returned: When user does not exist and not check mode
  type: bool
  sample: True
force:
  description: Whether or not a user account was forcibly deleted
  returned: When state is 'absent' and user exists
  type: bool
  sample: False
group:
  description: Primary user group ID
  returned: When user exists
  type: int
  sample: 1001
groups:
  description: List of groups of which the user is a member
  returned: When C(groups) is not empty and C(state) is 'present'
  type: str
  sample: 'chrony,apache'
home:
  description: "Path to user's home directory"
  returned: When C(state) is 'present'
  type: str
  sample: '/home/asmith'
move_home:
  description: Whether or not to move an existing home directory
  returned: When C(state) is 'present' and user exists
  type: bool
  sample: False
name:
  description: User account name
  returned: always
  type: str
  sample: asmith
password:
  description: Masked value of the password
  returned: When C(state) is 'present' and C(password) is not empty
  type: str
  sample: 'NOT_LOGGING_PASSWORD'
remove:
  description: Whether or not to remove the user account
  returned: When C(state) is 'absent' and user exists
  type: bool
  sample: True
shell:
  description: User login shell
  returned: When C(state) is 'present'
  type: str
  sample: '/bin/bash'
ssh_fingerprint:
  description: Fingerprint of generated SSH key
  returned: When C(generate_ssh_key) is C(True)
  type: str
  sample: '2048 SHA256:aYNHYcyVm87Igh0IMEDMbvW0QDlRQfE0aJugp684ko8 ansible-generated on host (RSA)'
ssh_key_file:
  description: Path to generated SSH private key file
  returned: When C(generate_ssh_key) is C(True)
  type: str
  sample: /home/asmith/.ssh/id_rsa
ssh_public_key:
  description: Generated SSH public key file
  returned: When C(generate_ssh_key) is C(True)
  type: str
  sample: >
    'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC95opt4SPEC06tOYsJQJIuN23BbLMGmYo8ysVZQc4h2DZE9ugbjWWGS1/pweUGjVstgzMkBEeBCByaEf/RJKNecKRPeGd2Bw9DCj/bn5Z6rGfNENKBmo
    618mUJBvdlEgea96QGjOwSB7/gmonduC7gsWDMNcOdSE3wJMTim4lddiBx4RgC9yXsJ6Tkz9BHD73MXPpT5ETnse+A3fw3IGVSjaueVnlUyUmOBf7fzmZbhlFVXf2Zi2rFTXqvbdGHKkzpw1U8eB8xFPP7y
    d5u1u0e6Acju/8aZ/l17IDFiLke5IzlqIMRTEbDwLNeO84YQKWTm9fODHzhYe0yvxqLiK07 ansible-generated on host'
stderr:
  description: Standard error from running commands
  returned: When stderr is returned by a command that is run
  type: str
  sample: Group wheels does not exist
stdout:
  description: Standard output from running commands
  returned: When standard output is returned by the command that is run
  type: str
  sample:
system:
  description: Whether or not the account is a system account
  returned: When C(system) is passed to the module and the account does not exist
  type: bool
  sample: True
uid:
  description: User ID of the user account
  returned: When C(UID) is passed to the module
  type: int
  sample: 1044
N(tdistro(tload_platform_subclasst
AnsibleModule(tto_bytest	to_nativetto_texts[^a-zA-Z0-9./=]tUsercB`s:eZdZdZd"ZdZdZdZdZ	dZ
d�Zd�Zd	�Z
ed"ed
�Zd�Zd�Zd
�Zd�Zd�Zd�Zd�Zed�Zed�Zd�Zd�Zd�Zd�Zd�Zd�Zd�Z d�Z!d�Z"d�Z#d�Z$d�Z%d �Z&d!�Z'RS(#s|
    This is a generic User manipulation class that is subclassed
    based on platform.

    A subclass may wish to override the following action methods:-
      - create_user()
      - remove_user()
      - modify_user()
      - ssh_key_gen()
      - ssh_key_fingerprint()
      - user_exists()

    All subclasses MUST define platform and distribution (which may be None).
    tGenerics/etc/passwds/etc/shadowis/etc/login.defss%Y-%m-%dcO`stt||�S(N(R	R(tclstargstkwargs((s?/usr/lib/python2.7/site-packages/ansible/modules/system/user.pyt__new__�scC`s�||_|jd|_|jd|_|jd|_|jd|_|jd|_|jd|_|jd|_|jd|_	|jd	|_
|jd
|_|jd|_|jd|_
|jd
|_|jd|_|jd|_|jd|_|jd|_|jd|_|jd|_|jd|_|jd|_|jd|_|jd|_|jd|_|jd|_d|_|jd|_d|_|jd|_|jd|_ |jd|_!|jd|_"|jddk	r*d j#|jd�|_n|jd!dk	r�yt$j%|jd!�|_Wq�t&k
r�}|j'd"d#|jt(|�f�q�Xn|jd$dk	r�|jd$|_)nt*j+j#d%d&|j�|_)dS('Ntstatetnametuidthiddent
non_uniquetseusertgrouptcommenttshelltpasswordtforcetremovetcreate_homet	move_hometskeletontsystemtlogin_classtappendtgenerate_ssh_keytssh_key_bitstssh_key_typetssh_key_commenttssh_key_passphrasetupdate_passwordthomet
password_locktlocaltprofilet
authorizationtroletgroupst,texpirestmsgs"Invalid value for 'expires' %s: %stssh_key_files.sshsid_%s(,tmoduletparamsRRRRRRRRRRRRR R!R"R#R$R%t	sshkeygentssh_bitstssh_typetssh_commenttssh_passphraseR+R,tNoneR4R-R2R.R/R0R1tjointtimetgmtimet	Exceptiont	fail_jsonRtssh_filetostpath(tselfR7te((s?/usr/lib/python2.7/site-packages/ansible/modules/system/user.pyt__init__�sV			*c`s��jjdr��jdkr�t}�jjdtdddg�krSt}n't�fd�dD��rxt}nd�jjdkr�t}n��jjdjd�}t|�d	krtt	t
j|d
��r�t}n|ddkrt|d
�d
krt}n|ddkrBt|d
�dkrBt}n|ddkrzt|d
�dkrzt}qznt}|r��jjd�q�ndS(NRtDarwint*t!s
*************c3`s%|]}|�jjdkVqdS(RN(R7R8(t.0tchar(RG(s?/usr/lib/python2.7/site-packages/ansible/modules/system/user.pys	<genexpr>
ss:*!t$ii����it1it5i+t6iVsThe input password appears not to have been hashed. The 'password' argument must be encrypted for this module to work properly.(
R7R8tplatformtFalsetsettanytTruetsplittlentboolt_HASH_REtsearchtwarn(RGt
maybe_invalidtfields((RGs?/usr/lib/python2.7/site-packages/ansible/modules/system/user.pytcheck_password_encrypteds*%				&	&	&cC`si|jjr*|r*|jjd|�dSg|D]}t|�^q1}|jj|d|d|�SdS(Ns#In check mode, would have run: "%s"ittuse_unsafe_shelltdata(iRaRa(R7t
check_modetdebugtstrtrun_command(RGtcmdRbRctobey_checkmodetx((s?/usr/lib/python2.7/site-packages/ansible/modules/system/user.pytexecute_command&s
cC`s-|jjr)|jr)|jj|j�SdS(N(R7Rdt
SHADOWFILEtbackup_local(RG((s?/usr/lib/python2.7/site-packages/ansible/modules/system/user.pyt
backup_shadow/scC`s|jrd}nd}|jj|t�g}|jrI|jd�n|jrb|jd�n|j|j�|j|�S(Ntluserdeltuserdels-fs-r(	R.R7tget_bin_pathRWRR%RRRk(RGtcommand_nameRh((s?/usr/lib/python2.7/site-packages/ansible/modules/system/user.pytremove_user_userdel3s				c	C`sw|jr'd}|jjdt�}nd}|jj|t�g}|jdk	r�|jd�|j|j�|jr�|jd�q�n|jdk	r�|jd�|j|j�n|j	dk	r|j
|j	�s�|jjdd|j	�n|jd	�|j|j	�n�|j
|j�r	t
jjd
�r�tjdt�}t|djd
�d�}|dkr�|jd�q|jd�q	t
jjd�r�tjdt�}t|djd
�d�}|dkr|jd�qq	|jd�n|jdk	rc|jrct|j�rc|j�}|jd�|jdj|��n|jdk	r�|jd�|j|j�n|jdk	r|jr�t
jj|j�}t
jj|�s�|j|j�q�n|jd�|j|j�n|jdk	r6|jd�|j|j�n|j dk	r�|jr�|jd�|j t!j"d�kr�|jd�q�|jt!j#|j$|j ��n|j%dk	r�|jd�|j&r�|jd|j%�q�|j|j%�n|jrI|js|jd�n|j'dk	rV|jd�|j|j'�qVn
|jd�|j(ro|jd �n|j|j�|j)|�\}}	}
|js�|dkr�||	|
fS|j dk	rj|j t!j"d�kr�d!}n#tt*j+|jj,d"��d#}|j)|d$t-|�|jg�\}}}
|	|7}	|
|
7}
|dkrj||	|
fSn||	|
fS(%Ntluseraddtlchagetuseradds-us-os-ZR5sGroup %s does not exists-gs/etc/redhat-releasetfull_distribution_nameit.iis-ns-Ns/etc/SuSE-releaseis-GR3s-cs-ds-ss-eRas-ps!%ss-ms-ks-Ms-ri����R4i�Qs-E(.R.R7RqRWRR>R%RRRtgroup_existsRCRRERFtexistsRtlinux_distributionRTtintRXR2RYtget_groups_setR?RR,R tdirnametisdirtcreate_homedirRR4R@RAtstrftimetDATE_FORMATRR-R"R#RktmathtfloorR8R(RGRrt
lchage_cmdRhtdistt
major_releaseR2tparenttrctoutterrtlexpirest_outt_err((s?/usr/lib/python2.7/site-packages/ansible/modules/system/user.pytcreate_user_useraddBs�	
	

(

	


"
			

	
	#-

c
C`s�|jrd}nd}|jj|t�}tj|tj�sFtS|dg}|j|dt�\}}}||}t	|�j
d�}x'|D]}	|	j�jd�r�tSq�WtS(Ntlusermodtusermods--helpRis
s-a, --append(
R.R7RqRWREtaccesstX_OKRTRkRRXtstript
startswith(
RGRrtusermod_pathRhR�tdata1tdata2thelpouttlinestline((s?/usr/lib/python2.7/site-packages/ansible/modules/system/user.pyt_check_usermod_append�s		

cC`s{|jr-d}|jjdt�}d}nd}|jj|t�g}|j�}|j�}|jdk	r�|dt|j�kr�|j	d�|j	|j�|j
r�|j	d�q�n|jdk	rK|j|j�s|jj
dd|j�n|j|j�}|d	|dkrK|j	d
�|j	|j�qKn|jdk	r�|jdt�}t}	g}
|jdkr�|r"|j	r"t}	q"n|jd
t�}
t|�j|
�}|r"|j	rxC|
D]2}||kr�|r|j	d�nt}	Pq�q�Wq"t}	n|	r�|jr�|j	rh|rh|j	d�|j	dj|��q�|j	d�|j	dj|
��q�n|jdk	r�|d|jkr�|j	d�|j	|j�n|jdk	r.|d|jkr.|j	d�|j	|j�|jr.|j	d�q.n|jdk	rp|d|jkrp|j	d�|j	|j�n|jdk	r�t|j�d�}
|jtjd�kr�|
dkr|jr�d}q�|j	d�|j	d�qq�tj|
d�}|
dks!|d	 |jd	 kr�|jrPttj|jj d��d}q|j	d�|j	tj!|j"|j��q�n|j#r�|dj$d�r�|j	d �n2|j#tkr�|dj$d�r�|j	d!�n|j%d"kr�|j&dk	r�|dj'd�|j&j'd�kr�g|D]}|d&kr+|^q+}|j	d#�|j#rv|j	d$|j&�q�|j	|j&�nd'\}}}t(|�dkr�|j	|j)�|j*|�\}}}n|js�|dkp�|dkr|||fS|dk	rn|j*|d%t+|�|j)g�\}}}||7}||7}|dkrn|||fSn|||fS((NR�RuR�is-us-oR5sGroup %s does not existis-gtexclude_primaryRatremove_existings-as-AR3s-Gis-cis-ds-mis-siii����s-ei�QR4RLs-Ls-Utalwayss-ps!%ss-E(s-Us-L(NRaRa(,R.R7RqRWR>t	user_infoR�RR|R%RRRyRCt
group_infoR2tuser_group_membershipRTR}RUtsymmetric_differenceR?RR,R!RR4t
user_passwordR@RAR�R�R8R�R�R-R�R+RtlstripRYRRkR(RGRrR�R�Rhtinfot
has_appendtginfotcurrent_groupstgroups_need_modR2t
group_difftgtcurrent_expirestcurrent_expire_datetcR�R�R�R�R�((s?/usr/lib/python2.7/site-packages/ansible/modules/system/user.pytmodify_user_usermod�s�		(
	
	
	

"
"
	"
		
#	&
%"C%
	#
-

cC`scytjt|��tSWnAttfk
r^ytj|�tSWq_tk
rZtSXnXdS(N(tgrptgetgrgidR|RWt
ValueErrortKeyErrortgetgrnamRT(RGR((s?/usr/lib/python2.7/site-packages/ansible/modules/system/user.pyRyYs

cC`s^|j|�stSyttjt|���SWn'ttfk
rYttj|��SXdS(N(	RyRTtlistR�R�R|R�R�R�(RGR((s?/usr/lib/python2.7/site-packages/ansible/modules/system/user.pyR�escC`s�|jdkrdS|j�}td�|jjd�D��}xv|j�D]h}|j|�s}|jjdd|�n|rN|rN|j	|�d|dkrN|j
|�qNqNW|S(Ncs`s!|]}|r|j�VqdS(N(R�(RMRj((s?/usr/lib/python2.7/site-packages/ansible/modules/system/user.pys	<genexpr>rsR3R5sGroup %s does not existii(R2R>R�RURXtcopyRyR7RCR�R(RGR�R�R2R�((s?/usr/lib/python2.7/site-packages/ansible/modules/system/user.pyR}ns")cC`s�g}|j�}xjtj�D]\}|j|jkr|sQ|j|d�q{|d|jkr{|j|d�q{qqW|S(s- Return a list of groups the user belongs to ii(tget_pwd_infoR�tgetgrallRtgr_memR%tgr_gid(RGR�R2R�R((s?/usr/lib/python2.7/site-packages/ansible/modules/system/user.pyR�zscC`s$|jr�tjj|j�s@|jjddj|j��nt}dj|j	�}t
|jd��P}|j�ddd�}x-|D]%}|jt
|��r�t}Pq�q�WWdQX|s�|jjdjd|jd|j	��n|Sytj|j	�r
tSWntk
rtSXdS(	NR5sK'local: true' specified but unable to find local account file {0} to parse.s{0}:trbi����s�'local: true' specified and user '{name}' was not found in {file}. The local user account may already exist if the local account database exists somewhere other than {file}.tfileR(R.RERFRztPASSWORDFILER7RCtformatRTRtopent	readlinesR�RRWR]tpwdtgetpwnamR�(RGRzt	name_testtftreversed_linesR�((s?/usr/lib/python2.7/site-packages/ansible/modules/system/user.pytuser_exists�s*	"
		
cC`s&|j�stSttj|j��S(N(R�RTR�R�R�R(RG((s?/usr/lib/python2.7/site-packages/ansible/modules/system/user.pyR��scC`sc|j�stS|j�}t|d�dksHt|d�dkr_|j�d|d<n|S(Nii(R�RTR�RYR�(RGR�((s?/usr/lib/python2.7/site-packages/ansible/modules/system/user.pyR��s,cC`s�d}d}tr�y:tj|j�d}tj|j�d}||fSWq�tk
rf||fStk
r�}|jtjtjfkr�||fS�q�Xn|j	�s�||fS|j
r�|j�\}}n||fS(NRaii(t	HAVE_SPWDtspwdtgetspnamRR�tOSErrorterrnotEACCEStEPERMR�Rltparse_shadow_file(RGtpasswdR4RH((s?/usr/lib/python2.7/site-packages/ansible/modules/system/user.pyR��s$




	c	C`s�d}d}tjj|j�r�tj|jtj�r�t|jd��`}xV|D]N}|jd|j�rU|j	d�d}|j	d�|j
p�d}qUqUWWdQXn||fS(NRatrs%s:t:ii����(RERFRzRlR�tR_OKR�R�RRXtSHADOWFILE_EXPIRE_INDEX(RGR�R4R�R�((s?/usr/lib/python2.7/site-packages/ansible/modules/system/user.pyR��s-
,cC`s�|j�}tjj|j�r-|j}nVtjj|d�rg|jjrgtd|j	��ntjj
|d|j�}|S(Nis%User %s home directory does not exist(R�RERFtisabsRDRzR7RdRBRR?(RGR�R6((s?/usr/lib/python2.7/site-packages/ansible/modules/system/user.pytget_ssh_key_path�s$cC`s�|j�}d}y|j�}Wn#tk
rG}ddt|�fSXtjj|�}tjj|�s�|j	j
r|d#Sy8tj|tdd��tj
||d|d�Wq�tk
r�}ddd|t|�ffSXntjj|�r|jrd	}qd$Sn|j	jdt�g}|jd�|j|j�|jdkrv|jd
�|j|j�n|jd�|j|j�|jd�|j|�|jdk	r|j	j
r�|j	jd|�d%Stj�\}}tj�\}	}
tj�\}}tjj�}
d|
d<y�tjg|D]}t|�^q?d|d|
d|dtjd|
�}d}d}x3|j �dkr�t!j!|	|gggd�\}}}d}d}|}x�|D]�}||	krEtj"|	d�}||7}||kr�tj#|t|jdd�d�|}q�nTtj"|d�}||7}||kr�tj#|t|jdd�d�|}nd|ks�d|kr�d&Sq�Wq�W|j$}t|�}t|�}Wq@tk
r}ddt|�fSXn8|jd �|jd�|j%|d!|�\}}}|dkr�|j	j
r�tj
||d|d�tj
d"||d|d�n|||fS('NiRait0700iiisFailed to create %s: %stys1Key already exists, use "force: yes" to overwrites
ssh-keygens-ts-bs-Cs-fs#In check mode, would have run: "%s"tCtLC_ALLtstdintstdouttstderrt
preexec_fntenvs+Enter passphrase (empty for no passphrase):sEnter same passphrase againi(terrorststricts
sOverwrite (y/n)?sKey already existss-NRcs%s.pub(iRaRa(Ns1Key already exists, use "force: yes" to overwriteRa(iRaRa(NsKey already existsRa(&R�R>R�RBRRERFR~RzR7RdtmkdirR|tchownR�RRqRWR%R;R:R<R=RetptytopenptytenvironR�t
subprocesstPopenRtsetsidtpolltselecttreadtwritet
returncodeRk(RGR�t	overwriteR6RHtssh_dirRhtmaster_in_fdtslave_in_fdt
master_out_fdtslave_out_fdt
master_err_fdtslave_err_fdR�R�tpt
out_buffert
err_bufferR�twtfirst_promptt
second_prompttprompttfdtchunkR�R�R�((s?/usr/lib/python2.7/site-packages/ansible/modules/system/user.pytssh_key_gen�s�!		





%		'

#
#		

"cC`s�|j�}tjj|�s/dd|dfS|jjdt�g}|jd�|jd�|j|�|j|dt	�S(NisSSH Key file %s does not existRas
ssh-keygens-ls-fRi(
R�RERFRzR7RqRWR%RkRT(RGR6Rh((s?/usr/lib/python2.7/site-packages/ansible/modules/system/user.pytssh_key_fingerprint@s


cC`sWd|j�}y.t|d��}|j�j�}WdQXWntk
rRdSX|S(Ns%s.pubR�(R�R�R�R�tIOErrorR>(RGtssh_public_key_fileR�tssh_public_key((s?/usr/lib/python2.7/site-packages/ansible/modules/system/user.pytget_ssh_public_keyKs
cC`s
|j�S(N(R�(RG((s?/usr/lib/python2.7/site-packages/ansible/modules/system/user.pytcreate_userTscC`s
|j�S(N(Rs(RG((s?/usr/lib/python2.7/site-packages/ansible/modules/system/user.pytremove_userXscC`s
|j�S(N(R�(RG((s?/usr/lib/python2.7/site-packages/ansible/modules/system/user.pytmodify_user\sc	C`s�tjj|�s�|jdk	r-|j}nd}tjj|�r�ytj||dt�Wq�tk
r�}|j	j
dtddt|��q�XnJytj|�Wn6tk
r�}|j	j
dtddt|��nXtjj|j
�r�t|j
d���}x�|D]�}tjd|�}|rt|jd�d	�}d
|@}ytj||�Wq�tk
r�}|j	j
dtddt|��q�XqqWWdQXq�ndS(Ns	/etc/skeltsymlinkstfailedR5s%sR�s^UMASK\s+(\d+)$iii�(RERFRzR"R>tshutiltcopytreeRWR�R7t	exit_jsonRtmakedirst
LOGIN_DEFSR�tretmatchR|Rtchmod(	RGRFR"RHR�R�tmtumasktmode((s?/usr/lib/python2.7/site-packages/ansible/modules/system/user.pyR�`s0*'
c
C`s�y�tj|||�x�tj|�D]u\}}}x0|D](}tjtjj||�||�q<Wx0|D](}tjtjj||�||�qoWq&WWn6tk
r�}	|jjdtddt	|	��nXdS(NR
R5s%s(
RER�twalkRFR?R�R7R
RWR(
RGRtgidRFtroottdirstfilestdR�RH((s?/usr/lib/python2.7/site-packages/ansible/modules/system/user.pyt
chown_homedir~s
&
.N((t__name__t
__module__t__doc__RSR>tdistributionR�RlR�RR�RRIR`RTRWRkRnRsR�R�R�RyR�R}R�R�R�R�R�R�R�RRRRRRR�R(((s?/usr/lib/python2.7/site-packages/ansible/modules/system/user.pyR�sF		1	$				v		�				!					
	[							tFreeBsdUsercB`sPeZdZdZd	ZdZdZdZd�Z	d�Z
d�Zd�ZRS(
s1
    This is a FreeBSD User manipulation class - it uses the pw command
    to manipulate the user database, followed by the chpass command
    to change the password.

    This overrides the following methods from the generic class:-
      - create_user()
      - remove_user()
      - modify_user()
    tFreeBSDs/etc/master.passwdis%d-%b-%YcC`s;|j�}|jr�|djd�r�|jjdt�d|jg}|jdk	r�|dt	|j�kr�|j
d�|j
|j�n|j|�S|jtkr7|djd�r7|jjdt�d|jg}|jdk	r*|dt	|j�kr*|j
d�|j
|j�n|j|�Sd	S(
Nis*LOCKED*tpwtlockis-utunlockRa(NRaRa(
R�R-R�R7RqRWRRR>R|R%RkRT(RGR�Rh((s?/usr/lib/python2.7/site-packages/ansible/modules/system/user.pyt_handle_lock�s$(

"(

cC`sJ|jjdt�dd|jg}|jr=|jd�n|j|�S(NR#Rps-ns-r(R7RqRWRRR%Rk(RGRh((s?/usr/lib/python2.7/site-packages/ansible/modules/system/user.pyR�s	c	C`s�|jjdt�dd|jg}|jdk	rl|jd�|j|j�|jrl|jd�qln|jdk	r�|jd�|j|j�n|j	dk	r�|jd�|j|j	�n|j
dk	r(|j|j
�s|jjdd	|j
�n|jd
�|j|j
�n|j
dk	ri|j�}|jd�|jdj|��n|jr�|jd
�|jdk	r�|jd�|j|j�q�n|jdk	r�|jd�|j|j�n|jdk	r|jd�|j|j�n|jdk	ru|jd�|jtjd�krS|jd�qu|jttj|j���n|j|�\}}}|dk	r�|dkr�|jjd|jd|d|�n|jdk	rD|jjdt�d|j|jg}|j|�\}}}|dkr-|}n||7}||7}n|j�\}}}|dkrn|}n||7}||7}|||fS(NR#Rvs-ns-us-os-cs-dR5sGroup %s does not exists-gs-GR3s-ms-ks-ss-Ls-eit0RR�tchpasss-p(R7RqRWRRR>R%RRR,RRyRCR2R}R?R R"RR$R4R@RARftcalendarttimegmRkRR&(	RGRhR2R�R�R�t_rcR�R�((s?/usr/lib/python2.7/site-packages/ansible/modules/system/user.pyR�sv
	



	




"%	

	

cC`s^|jjdt�dd|jg}t|�}|j�}|jdk	r�|dt|j�kr�|j	d�|j	|j�|j
r�|j	d�q�n|jdk	r�|d|jkr�|j	d�|j	|j�n|jdk	r�|d	|jkr
|j
s)tjj|j�r9|jr9|j	d
�n|d	|jkrl|j	d�|j	|j�n|jdk	r�|j	d�|j	|j�q�n|jdk	r%|j|j�s�|jjd
d|j�n|j|j�}|d|dkr%|j	d�|j	|j�q%n|jdk	rg|d|jkrg|j	d�|j	|j�n|jdk	r6d}tjj|j�rtj|jtj�rt|jd��D}x:|D]2}|jd|j�r�|jd�d}q�q�WWdQXn|j|kr6|j	d�|j	|j�q6n|jdk	r|j �}|j!�}	t"|�j#|	�}
t$}|
r�|j	r�x-|	D]}||
kr�t}Pq�q�Wq�t}n|r|j	d�|	}
|j	r�|	t"|�B}
n|j	dj%|
��qn|j&dk	r�t|j'�d�}|j&t(j)d�krt|dkr�|j	d�|j	d�q�q�t(j)|�}|dks�|d |j&d kr�|j	d�|j	t*t+j,|j&���q�nd$\}}}|t|�kre|j-|�\}}}||7}||7}|dk	re|dkre|jjd|jd
|d|�qen|j.d kr|j/dk	r|dj0d!�|j/j0d!�kr|jjd"t�d#|j/|jg}|j-|�\}}}|dkr�|}n||7}||7}n|j1�\}}}|dkr=|}n||7}||7}|||fS(%NR#R�s-nis-us-ois-cis-ms-ds-kR5sGroup %s does not existis-gis-sR�s%s:R�s-Ls-GR3iis-eR'RaRR�R�s*LOCKED*R(s-p(NRaRa(2R7RqRWRRYR�RR>R|R%RRR,R!RERFRzR R"RRyRCR�RR$RlR�R�R�R�RXR2R�R}RUR�RTR?R4R�R@RARfR)R*RkR+RR�R&(RGRhtcmd_lenR�R�tuser_login_classR�R�R�R2R�R�R�t
new_groupsR�R�R�R�R�R�R�R+((s?/usr/lib/python2.7/site-packages/ansible/modules/system/user.pyRs�(
	"
;


"
-
#
	
	
	
#
%

(C	

	

N(
RRRRSR>R RlR�R�R&RRR(((s?/usr/lib/python2.7/site-packages/ansible/modules/system/user.pyR!�s
			VtDragonFlyBsdUsercB`seZdZdZRS(s�
    This is a DragonFlyBSD User manipulation class - it inherits the
    FreeBsdUser class behaviors, such as using the pw command to
    manipulate the user database, followed by the chpass command
    to change the password.
    t	DragonFly(RRRRS(((s?/usr/lib/python2.7/site-packages/ansible/modules/system/user.pyR/�stOpenBSDUsercB`s;eZdZdZdZdZd�Zd�Zd�Z	RS(s,
    This is a OpenBSD User manipulation class.
    Main differences are that OpenBSD:-
     - has no concept of "system" account.
     - has no force delete user

    This overrides the following methods from the generic class:-
      - create_user()
      - remove_user()
      - modify_user()
    tOpenBSDs/etc/master.passwdcC`s^|jjdt�g}|jdk	r`|jd�|j|j�|jr`|jd�q`n|jdk	r�|j|j�s�|jj	dd|j�n|jd�|j|j�n|j
dk	r�|j�}|jd�|jdj|��n|j
dk	r.|jd	�|j|j
�n|jdk	r]|jd
�|j|j�n|jdk	r�|jd�|j|j�n|jdk	r�|jd�|j|j�n|jdk	r�|jd
kr�|jd�|j|j�n|jrA|jd�|jdk	rA|jd�|j|j�qAn|j|j�|j|�S(NRvs-us-oR5sGroup %s does not exists-gs-GR3s-cs-ds-ss-LRKs-ps-ms-k(R7RqRWRR>R%RRRyRCR2R}R?RR,RR$RR R"RRk(RGRhR2((s?/usr/lib/python2.7/site-packages/ansible/modules/system/user.pyR�sJ
	






	

cC`sN|jjdt�g}|jr1|jd�n|j|j�|j|�S(NRps-r(R7RqRWRR%RRk(RGRh((s?/usr/lib/python2.7/site-packages/ansible/modules/system/user.pyRs�s
	c
C`s�|jjdt�g}|j�}|jdk	r�|dt|j�kr�|jd�|j|j�|jr�|jd�q�n|j	dk	r|j
|j	�s�|jjdd|j	�n|j|j	�}|d|dkr|jd�|j|j	�qn|j
dk	r�|j�}t}d	}g}|j
d
krd|r�|jr�t}q�ni|j�}t|�j|�}|r�|jr�x3|D]"}	|	|kr�d}t}Pq�q�Wq�t}n|r�|j|�|jdj|��q�n|jdk	r>|d
|jkr>|jd�|j|j�n|jdk	r�|d|jkr�|jry|jd�n|jd�|j|j�n|jdk	r�|d|jkr�|jd�|j|j�n|jdk	r�d}
|jjdt�|jg}|j|dt�\}}
}xO|
j�D]A}|j�}|ddkr9t|�dkr9|d}
q9q9W|j|
kr�|jd�|j|j�q�n|jr�|djd�r�|jd�n2|jtkr|djd�r|jd�n|j dkro|j!dk	ro|j!dkro|d|j!kro|jd�|j|j!�nt|�dkr�dS|j|j�|j|�S( NR�is-us-oR5sGroup %s does not existis-gs-SRas-GR3is-cis-ms-dis-stuserinfoRiitclassis-LRKs-Zs-UR�s-p(NRaRa("R7RqRWR�RR>R|R%RRRyRCR�R2R�RTR}RUR�R?RR,R!RR$RRkt
splitlinesRXRYR-R�R+R(RGRhR�R�R�R�t
groups_optionR2R�R�R-tuserinfo_cmdR�R�R�R�ttokens((s?/usr/lib/python2.7/site-packages/ansible/modules/system/user.pyR�s�(
	
	
	
"
"	
"
"
""
N(
RRRRSR>R RlRRsR(((s?/usr/lib/python2.7/site-packages/ansible/modules/system/user.pyR1�s	3	t
NetBSDUsercB`s;eZdZdZdZdZd�Zd�Zd�Z	RS(s+
    This is a NetBSD User manipulation class.
    Main differences are that NetBSD:-
     - has no concept of "system" account.
     - has no force delete user


    This overrides the following methods from the generic class:-
      - create_user()
      - remove_user()
      - modify_user()
    tNetBSDs/etc/master.passwdcC`s�|jjdt�g}|jdk	r`|jd�|j|j�|jr`|jd�q`n|jdk	r�|j|j�s�|jj	dd|j�n|jd�|j|j�n|j
dk	r1|j�}t|�dkr|jj	ddt|��n|jd	�|jd
j
|��n|jdk	r`|jd�|j|j�n|jdk	r�|jd�|j|j�n|jdk	r�|jd
�|j|j�n|jdk	r�|jd�|j|j�n|jdk	r|jd�|j|j�n|jrd|jd�|jdk	rd|jd�|j|j�qdn|j|j�|j|�S(NRvs-us-oR5sGroup %s does not exists-gis.Too many groups (%d) NetBSD allows for 16 max.s-GR3s-cs-ds-ss-Ls-ps-ms-k(R7RqRWRR>R%RRRyRCR2R}RYR?RR,RR$RR R"RRk(RGRhR2((s?/usr/lib/python2.7/site-packages/ansible/modules/system/user.pyRgsN
	
 





	

cC`sN|jjdt�g}|jr1|jd�n|j|j�|j|�S(NRps-r(R7RqRWRR%RRk(RGRh((s?/usr/lib/python2.7/site-packages/ansible/modules/system/user.pyRs�s
	c	C`s(|jjdt�g}|j�}|jdk	r�|dt|j�kr�|jd�|j|j�|jr�|jd�q�n|j	dk	r|j
|j	�s�|jjdd|j	�n|j|j	�}|d|dkr|jd�|j|j	�qn|j
dk	r7|j�}t}g}|j
d	kr^|r�|jr�t}q�nx|j�}t|�j|�}|r�|jr�xB|D]1}||kr�t|�j|�}t}Pq�q�Wq�t}n|r7t|�d
kr|jjddt|��n|jd�|jd
j|��q7n|jdk	ry|d|jkry|jd�|j|j�n|jdk	r�|d|jkr�|jr�|jd�n|jd�|j|j�n|jdk	r|d|jkr|jd�|j|j�n|jdk	rE|jd�|j|j�n|jdkr�|jdk	r�|d|jkr�|jd�|j|j�n|jr�|djd�r�|jd�n2|jtkr�|djd�r�|jd�nt|�dkrdS|j|j�|j |�S(NR�is-us-oR5sGroup %s does not existis-gRais.Too many groups (%d) NetBSD allows for 16 max.s-GR3is-cis-ms-dis-ss-LR�is-ps*LOCKED*s-C yess-C no(NRaRa(!R7RqRWR�RR>R|R%RRRyRCR�R2R�RTR}RUR�tunionRYR?RR,R!RR$R+RR-R�RRk(	RGRhR�R�R�R�R2R�R�((s?/usr/lib/python2.7/site-packages/ansible/modules/system/user.pyR�sz(
	
	
	 
"
"	
"

1
"N(
RRRRSR>R RlRRsR(((s?/usr/lib/python2.7/site-packages/ansible/modules/system/user.pyR9Us	5	tSunOScB`s\eZdZdZd
ZdZdZd�Zd�Z	d�Z
d�Zd�Zd	�Z
RS(s�
    This is a SunOS User manipulation class - The main difference between
    this class and the generic user class is that Solaris-type distros
    don't support the concept of a "system" account and we need to
    edit the /etc/shadow file manually to set a password. (Ugh)

    This overrides the following methods from the generic class:-
      - create_user()
      - remove_user()
      - modify_user()
      - user_info()
    R<s/etc/shadows/etc/user_attrc
	C`sEyd}d}d}tdd���}x�|D]�}|j�}|jd�s.|dkraq.ntjd|�}|r�|jd�}n|jd�\}}|dkr�|jd	�}q.|d
kr�|jd	�}q.|dkr.|jd	�}q.q.WWdQXWn0tk
r7}	|j	j
dd
t|	��nX|||fS(NRas/etc/default/passwdR�t#s^([^#]*)#(.*)$it=tMINWEEKSs
tMAXWEEKSt	WARNWEEKSR5s&failed to read /etc/default/passwd: %s(R�R�R�RRRRXtrstripRBR7RCR(
RGtminweekstmaxweekst	warnweeksR�R�RtkeytvalueR�((s?/usr/lib/python2.7/site-packages/ansible/modules/system/user.pytget_password_defaultss,
 !cC`sN|jjdt�g}|jr1|jd�n|j|j�|j|�S(NRps-r(R7RqRWRR%RRk(RGRh((s?/usr/lib/python2.7/site-packages/ansible/modules/system/user.pyR"s
	c
C`s�|jjdt�g}|jdk	r`|jd�|j|j�|jr`|jd�q`n|jdk	r�|j|j�s�|jj	dd|j�n|jd�|j|j�n|j
dk	r�|j�}|jd�|jdj|��n|j
dk	r.|jd	�|j|j
�n|jdk	r]|jd
�|j|j�n|jdk	r�|jd�|j|j�n|jr�|jd�|jdk	r�|jd
�|j|j�q�n|jdk	r|jd�|j|j�n|jdk	r2|jd�|j|j�n|jdk	ra|jd�|j|j�n|j|j�|j|�\}}}|dk	r�|dkr�|jj	d|jd|d|�n|jjs�|jdk	r�|j�|j�\}}}y�g}	t|jd��c}
xY|
D]Q}t|dd�}|j�jd�}|d|jksx|	j|�q%n|j|d<t t!t"j"�d��|d<|r�yt t!|�d�|d<Wq�t#k
r�q�Xn|ryt t!|�d�|d<Wqt#k
rqXn|rVyt t!|�d�|d<WqVt#k
rRqVXndj|�}|	jd|�q%WWdQXt|jd ��}
|
j$|	�WdQXWq�t%k
r�}|jj	dd!t|��q�Xq�n|||fS("NRvs-us-oR5sGroup %s does not exists-gs-GR3s-cs-ds-ss-ms-ks-Ps-As-RiRR�R�R�tsurrogate_or_strictR�ii�Qiiiiis%s
sw+s#failed to update users password: %s(&R7RqRWRR>R%RRRyRCR2R}R?RR,RR R"R/R0R1RRkRdRRnRHR�RlRR�RXRfR|R@R�t
writelinesRB(
RGRhR2R�R�R�RCRDRER�R�R�R_((s?/usr/lib/python2.7/site-packages/ansible/modules/system/user.pyR*s�
	




	




%



 


'cC`s0|jjdt�g}t|�}|j�}|jdk	r�|dt|j�kr�|jd�|j|j�|j	r�|jd�q�n|j
dk	r|j|j
�s�|jjdd|j
�n|j
|j
�}|d|dkr|jd�|j|j
�qn|jdk	r�|j�}|j�}t|�j|�}t}|r�|jr�x-|D]}	|	|krpt}PqpqpWq�t}n|r�|jd	�|}
|jr�|
j|�n|jd
j|
��q�n|jdk	r,|d|jkr,|jd�|j|j�n|jdk	r�|d
|jkr�|jrg|jd�n|jd�|j|j�n|jdk	r�|d|jkr�|jd�|j|j�n|jdk	r|d|jkr|jd�|j|j�n|jdk	rM|d|jkrM|jd�|j|j�n|jdk	r�|d|jkr�|jd�|j|j�n|t|�kr	|j|j�|j|�\}}}
|dk	r|dkr|jjd|jd|
d|�qnd&\}}}
|jdkr#|j dk	r#|d|j kr#|j!�d'\}}}
|jj"s#|j#�\}}}ygg}t$|j%d��}x|D]	}t&|dd �}|j'�j(d!�}|d|jks�|j|�q�n|j |d<t)tt*j*�d"��|d<|rKt)t|�d�|d<n|rnt)t|�d�|d<n|r�t)t|�d�|d
<nd!j|�}|jd#|�q�WWdQXt$|j%d$��}|j+|�WdQXd}Wq t,k
r}
|jjdd%t&|
��q Xq#n|||
fS((NR�is-us-oR5sGroup %s does not existis-gs-GR3is-cis-ms-dis-sis-Pis-Ai	s-RiRR�RaR�iR�R�RIR�i�Qs%s
sw+s#failed to update users password: %s(NRaRa(iRaRa(-R7RqRWRYR�RR>R|R%RRRyRCR�R2R�R}RUR�RTtupdateR?RR,R!RR/R0R1RRkR+RRnRdRHR�RlRR�RXRfR@RJRB(RGRhR,R�R�R�R2R�R�R�R.R�R�R�RCRDRER�R�R�R_((s?/usr/lib/python2.7/site-packages/ansible/modules/system/user.pyR��s�(
	
	
	
	"
"	
"
"
"
"
(1



 
'cC`s2tt|�j�}|r.||j�7}n|S(N(tsuperR<R�t_user_attr_info(RGR�((s?/usr/lib/python2.7/site-packages/ansible/modules/system/user.pyR��sc	C`s�dgd}t|jd���}x�|D]�}|j�jd�}|d|jkr)td�|djd�D��}|jd	d�|d<|jd
d�|d<|jdd�|d<q)q)WWdQX|S(
NRaiR�s::::ics`s|]}|jd�VqdS(R>N(RX(RMRj((s?/usr/lib/python2.7/site-packages/ansible/modules/system/user.pys	<genexpr>	sit;tprofilestauthstrolesi(R�t	USER_ATTRR�RXRtdicttget(RGR�tfile_handlerR�R�ttmp((s?/usr/lib/python2.7/site-packages/ansible/modules/system/user.pyRMs

##N(RRRRSR>R RlRRRHRRR�R�RM(((s?/usr/lib/python2.7/site-packages/ansible/modules/system/user.pyR<�s			e	n	t
DarwinUsercB`s�eZdZdZdZdZdZdd d!d"d#d$gZd�Z	d�Z
d�Zd�Zdd�Z
d�Zd�Zd�Zd�Zd�Zd�Zd�Zdd�Zd�ZRS(%s�
    This is a Darwin macOS User manipulation class.
    Main differences are that Darwin:-
      - Handles accounts in a database managed by dscl(1)
      - Has no useradd/groupadd
      - Does not create home directories
      - User password must be cleartext
      - UID must be given
      - System users must ben under 500

    This overrides the following methods from the generic class:-
      - user_exists()
      - create_user()
      - remove_user()
      - modify_user()
    RJRxRtRealNameR,tNFSHomeDirectoryRt	UserShellRtUniqueIDRtPrimaryGroupIDRtIsHiddencC`s�tt|�j|�|jdkr=|jr[d|_q[n|jrRd|_n	d|_|jdk	r}|jjd�ndS(NiiRR](shiddenR](RLRWRIRR>R#R_R%(RGR7((s?/usr/lib/python2.7/site-packages/ansible/modules/system/user.pyRI0s			cC`s|jjdt�|jgS(Ntdscl(R7RqRWtdscl_directory(RG((s?/usr/lib/python2.7/site-packages/ansible/modules/system/user.pyt	_get_dsclAscC`s�|j�}|ddd|jg7}|j|dt�\}}}g}xO|j�D]A}|jd�sV|jd�r�qVn|j|j�d�qVW|S(Ns-searchs/GroupstGroupMembershipRit t)i(R`RRkRTR5R�R%RX(RGRhR�R�R�R2R�((s?/usr/lib/python2.7/site-packages/ansible/modules/system/user.pyt_list_user_groupsDscC`s�|j�}|dd|j|g7}|j|dt�\}}}|dkrTd	S|j�}t|�dkr�|djd�dSt|�dkr�dj|dj	�g|d�St|�dkr�|dj	�Sd	Sd	S(
sCReturn user PROPERTY as given my dscl(1) read or None if not found.s-reads	/Users/%sRiiis: is
N(
R`RRkRTR>R5RYRXR?R�(RGtpropertyRhR�R�R�R�((s?/usr/lib/python2.7/site-packages/ansible/modules/system/user.pyt_get_user_propertyOs"c
	C`s|j�}|dddg7}|j|dt�\}}}|dkrq|jjddd|d	|d
|�nd}d}xc|j�D]U}t|jd�d�}	||	kr�|	}n||	kr�|	d
kr�|	}q�q�W|r
d|kodknr
|dS|dS(sv
        Return the next available uid. If system=True, then
        uid should be below of 500, if possible.
        s-lists/UsersR[RiiR5s$Unable to get the next available uidR�R�R�Rbi����i�i�i(R`RkRTR7RCR5R|RX(
RGR#RhR�R�R�tmax_uidtmax_system_uidR�tcurrent_uid((s?/usr/lib/python2.7/site-packages/ansible/modules/system/user.pyt
_get_next_uidfs(
	
"c	C`s�|j�}|jr5|dd|j|jg7}n|dd|jddg7}|j|�\}}}|dkr�|jjddd	|d
|d|�n|||fS(ssChange password for SELF.NAME against SELF.PASSWORD.

        Please note that password must be cleartext.
        s-passwds	/Users/%ss-createtPasswordRKiR5sError when changing passwordR�R�R�(R`RRRkR7RC(RGRhR�R�R�((s?/usr/lib/python2.7/site-packages/ansible/modules/system/user.pyt_change_user_password�s	 (cC`s{|jdkrd|_nytj|j�j|_Wn+tk
rd|jjdd|j�nXt|j�|_dS(sDConvert SELF.GROUP to is stringed numerical value suitable for dscl.tnogroupR5sBGroup "%s" not found. Try to create it first using "group" module.N(	RR>R�R�R�R�R7RCRf(RG((s?/usr/lib/python2.7/site-packages/ansible/modules/system/user.pyt_make_group_numerical�s
c	C`s�|dkrd}nd}ddd||jdd|g}|j|�\}}}|d	kr�|jjd
d||j|fd|d
|d|�n|||fS(s�Add or remove SELF.NAME to or from GROUP depending on ACTION.
        ACTION can be 'add' or 'remove' otherwise 'remove' is assumed. tadds-as-dtdseditgroups-otedits-ttuseriR5s"Cannot %s user "%s" to group "%s".R�R�R�(RRkR7RC(RGRtactiontoptionRhR�R�R�((s?/usr/lib/python2.7/site-packages/ansible/modules/system/user.pyt__modify_group�s	!)cC`s*d}d}d}t}t|j��}|jdk	rTt|jjd��}ntg�}|jtkr�xT||D]E}|j|d�\}}	}
||7}||	7}||
7}t}qzWnxQ||D]E}|j|d�\}}	}
||7}||	7}||
7}t}q�W||||fS(s�Add or remove SELF.NAME to or from GROUP depending on ACTION.
        ACTION can be 'add' or 'remove' otherwise 'remove' is assumed. iRaR3tdeleteRoN(	RTRURdR2R>RXR%t_DarwinUser__modify_groupRW(RGR�R�R�tchangedtcurrentttargetRR+R�R�Ro((s?/usr/lib/python2.7/site-packages/ansible/modules/system/user.pyt
_modify_group�s,







c	C`s�d}dd|dg}|j|dt�\}}}g}x_|j�dd!D]J}y|jd�d}Wntk
r�|j�}nX|j|�qPW|jr+|j|kr�dd	|dd
|jg}|j|�\}}}|dkr$|j	j
dd
|jd|d|d|�ndSn�|j|kr�||j|j�=dd	|ddg|}|j|�\}}}|dkr�|j	j
dd|jd|d|d|�ndSdS(svHide or show user on login window according SELF.SYSTEM.

        Returns 0 if a change has been made, None otherwise.s0/Library/Preferences/com.apple.loginwindow.plisttdefaultsR�tHiddenUsersListRiii����t"R�s
-array-addiR5s%Cannot user "%s" to hidden user list.R�R�R�s-arrays.Cannot remove user "%s" from hidden user list.N(RkRTR5RXt
IndexErrorR�R%R#RR7RCtindex(RGt
plist_fileRhR�R�R�thidden_usersRj((s?/usr/lib/python2.7/site-packages/ansible/modules/system/user.pyt_update_system_user�s0
	//cC`sK|j�}|dd|jg7}|j|dt�\}}}|dkS(s1Check is SELF.NAME is a known user on the system.s-lists	/Users/%sRii(R`RRkRT(RGRhR�R�R�((s?/usr/lib/python2.7/site-packages/ansible/modules/system/user.pyR��sc	C`s�|j�}|j�}|dd|jg7}|j|�\}}}|dkr�|jjdd|jd|d|d|�n|jr�tjj	|d	�r�t
j|d	�|d
|d	7}q�n|||fS(sCDelete SELF.NAME. If SELF.FORCE is true, remove its home directory.s-deletes	/Users/%siR5sCannot delete user "%s".R�R�R�is
Removed %s(R�R`RRkR7RCRRERFRzRtrmtree(RGR�RhR�R�R�((s?/usr/lib/python2.7/site-packages/ansible/modules/system/user.pyR	s/	R^c
C`s�|j�}|dd|jg7}|j|�\}}}|dkrv|jjdd|jd|d|d|�n|j�|jdkr�t|j	|j
��|_n|jr:|jdkr�d|j|_n|jj
s:tjj|j�stj|j�n|jt|j�t|j�|j�q:n|j
r_|jdkr_d	|_nx�|jD]�}|d|jkri|j|dri|j�}|dd|j|d
|j|dg7}|j|�\}}}|dkr(|jjdd|d|jfd|d|d|�n||7}||7}|dkrX|||fSqiqiW|j�\}}}||7}||7}|j�|jr�|j�\}}}}	||7}||7}n|||fS(Ns-creates	/Users/%siR5sCannot create user "%s".R�R�R�s	/bin/bashis&Cannot add property "%s" to user "%s".(R`RRkR7RCRnRR>RfRjR#R R,RdRERFRzRRR|RRR_t__dict__RlR�R2R{(
RGRrRhR�R�R�tfieldR�R�Rx((s?/usr/lib/python2.7/site-packages/ansible/modules/system/user.pyR	sJ/
	.$,9




	

cC`sd}d}d}|jr(|j�nx&|jD]}|d|jkr2|j|dr2|j|d�}|dks�|t|j|d�krM|j�}|dd|j|d|j|dg7}|j	|�\}}}	|dkr-|j
jdd|d|jfd|d	|d
|�n|}||7}||	7}qMq2q2W|jdkr�|j
dk	r�|j�\}}}	||7}||	7}|}n|jr�|j�\}}}	}
||7}||	7}|
tkr�|}q�n|j�}|dkr|}n|||fS(NRaiis-creates	/Users/%sR5s*Cannot update property "%s" for user "%s".R�R�R�R�(R>RRnR_R�RfR
R`RRkR7RCR+RRlR2R{RWR�(RGRxR�R�R�RyRhR�R�R�t_changed((s?/usr/lib/python2.7/site-packages/ansible/modules/system/user.pyRH	sD	
$),*


		

	N(scommentRX(shomeRY(sshellRZ(suidsUniqueID(sgroupR\(shiddensIsHidden(RRRRSR>R RlR_R_RIR`RdRfRjRlRnRwR{R�R�RRR(((s?/usr/lib/python2.7/site-packages/ansible/modules/system/user.pyRWs2									 	)		4tAIXcB`sGeZdZdZdZdZd�Zdd�Zd�Z	d�Z
RS(	s�
    This is a AIX User manipulation class.

    This overrides the following methods from the generic class:-
      - create_user()
      - remove_user()
      - modify_user()
      - parse_shadow_file()
    R�s/etc/security/passwdcC`sN|jjdt�g}|jr1|jd�n|j|j�|j|�S(NRps-r(R7RqRWRR%RRk(RGRh((s?/usr/lib/python2.7/site-packages/ansible/modules/system/user.pyR�	s
	RvcC`sp|jj|t�g}|jdk	rG|jd�|j|j�n|jdk	r�|j|j�s�|jjdd|j�n|jd�|j|j�n|j	dk	r�t
|j	�r�|j�}|jd�|jdj|��n|j
dk	r$|jd�|j|j
�n|jdk	rS|jd�|j|j�n|jdk	r�|jd	�|j|j�n|jr�|jd
�|jdk	r�|jd�|j|j�q�n|j|j�|j|�\}}}|jdk	rcg}|j|jjdt��|jd
�|jd�|j|dd|j|jf�n|||fS(Ns-uR5sGroup %s does not exists-gs-GR3s-cs-ds-ss-ms-ktchpasswds-eRcs%s:%s(R7RqRWRR>R%RRyRCR2RYR}R?RR,RR R"RRkR(RGRrRhR2R�R�R�((s?/usr/lib/python2.7/site-packages/ansible/modules/system/user.pyR��	sH





	



&c
C`s�|jjdt�g}|j�}|jdk	rl|dt|j�krl|jd�|j|j�n|jdk	r�|j	|j�s�|jj
dd|j�n|j|j�}|d|dkr�|jd�|j|j�q�n|jdk	r�|j
�}t}g}|jdkrE|r�|jr�t}q�nc|j�}t|�j|�}|r�|jr�x-|D]}||kr|t}Pq|q|Wq�t}n|r�|jd	�|jd
j|��q�n|jdk	r|d|jkr|jd�|j|j�n|jdk	rt|d
|jkrt|jrT|jd�n|jd�|j|j�n|jdk	r�|d|jkr�|jd�|j|j�nt|�dkr�d\}	}
}n(|j|j�|j|�\}	}
}|jdkr�|jdk	r�|d|jkr�g}|j|jjdt��|jd�|jd�|j|dd|j|jf�\}}
}nd\}}
}|	dk	r�|	|
|
||fS||
|
||fSdS(NR�is-uR5sGroup %s does not existis-gRas-GR3is-cis-ms-dis-siR�R�s-eRcs%s:%s(NRaRa(NRaRa(R7RqRWR�RR>R|R%RRyRCR�R2R�RTR}RUR�R?RR,R!RRYRRkR+R(RGRhR�R�R�R�R2R�R�R�R�R�trc2tout2terr2((s?/usr/lib/python2.7/site-packages/ansible/modules/system/user.pyR��	sp(

	
	
"
"	
"
1

1cC`s~t|j�}d}d}tjj|j�rVtj|jtj�rVt|jd��}|j	�}WdQXd}d}y�xMt
|�D]?\}}	|	jd|�r�||d}||d}Pq�q�Wd|kr�|jdd�dj
�}nd|kr$|jdd�dj
�}nWqVtk
rR|jjd	d
|j�qVXnt|�}
t|�pqd}|
|fS(sExample AIX shadowfile data:
        nobody:
                password = *

        operator1:
                password = {ssha512}06$xxxxxxxxxxxx....
                lastupdate = 1549558094

        test1:
                password = *
                lastupdate = 1553695126

        RaR�Ns%s:iis = i����R5sFailed to parse shadow file %s(RRRERFRzRlR�R�R�R�t	enumerateR�RXR�RR7RCR(RGtb_nametb_passwdt	b_expirestbftb_linest
b_passwd_linetb_expires_lineR�tb_lineR�R4((s?/usr/lib/python2.7/site-packages/ansible/modules/system/user.pyR�	
s.-#
!N(RRRRSR>R RlRR�R�R�(((s?/usr/lib/python2.7/site-packages/ansible/modules/system/user.pyR�s	s		2	MtHPUXcB`s;eZdZdZdZdZd�Zd�Zd�Z	RS(s�
    This is a HP-UX User manipulation class.

    This overrides the following methods from the generic class:-
      - create_user()
      - remove_user()
      - modify_user()
    sHP-UXs/etc/shadowcC`sdg}|jdk	rQ|jd�|j|j�|jrQ|jd�qQn|jdk	r�|j|j�s�|jjdd|j�n|jd�|j|j�n|jdk	r�t	|j�r�|j
�}|jd�|jdj|��n|jdk	r.|jd	�|j|j�n|j
dk	r]|jd
�|j|j
�n|jdk	r�|jd�|j|j�n|jdk	r�|jd�|j|j�n|jr�|jd
�n
|jd�|jr�|jd�n|j|j�|j|�S(Ns/usr/sam/lbin/useradd.sams-us-oR5sGroup %s does not exists-gs-GR3s-cs-ds-ss-ps-ms-Ms-r(RR>R%RRRyR7RCR2RYR}R?RR,RRR R#RRk(RGRhR2((s?/usr/lib/python2.7/site-packages/ansible/modules/system/user.pyRF
sD	
	





	
	cC`sXdg}|jr"|jd�n|jr;|jd�n|j|j�|j|�S(Ns/usr/sam/lbin/userdel.sams-Fs-r(RR%RRRk(RGRh((s?/usr/lib/python2.7/site-packages/ansible/modules/system/user.pyRv
s			c

C`sydg}|j�}|jdk	rv|dt|j�krv|jd�|j|j�|jrv|jd�qvn|jdk	r�|j|j�s�|jj	dd|j�n|j
|j�}|d|dkr�|jd�|j|j�q�n|jdk	r	|j�}t
}g}|jd	krO|r�|jr�t}q�ni|jd
t
�}t|�j|�}|r�|jr�x-|D]}||kr�t}Pq�q�Wq�t}n|r	|jd�|}	|jr�|t|�B}	n|jdj|	��q	n|jdk	rK|d
|jkrK|jd�|j|j�n|jdk	r�|d|jkr�|jd�|j|j�|jr�|jd�q�n|jdk	r�|d|jkr�|jd�|j|j�n|jdkrF|jdk	rF|d|jkrF|jd�|jd�|j|j�nt|�dkr\dS|j|j�|j|�S(Ns/usr/sam/lbin/usermod.samis-us-oR5sGroup %s does not existis-gRaR�s-GR3is-cis-ds-mis-sR�is-Fs-p(NRaRa(R�RR>R|R%RRRyR7RCR�R2R�RTRWR}RUR�R?RR,R!RR+RRYRRk(
RGRhR�R�R�R�R2R�R�R.((s?/usr/lib/python2.7/site-packages/ansible/modules/system/user.pyR
sn	(
	
	
	
	"
"
	"
1

N(
RRRRSR>R RlRRR(((s?/usr/lib/python2.7/site-packages/ansible/modules/system/user.pyR�8
s	0		tBusyBoxcB`s)eZdZd�Zd�Zd�ZRS(s�
    This is the BusyBox class for use on systems that have adduser, deluser,
    and delgroup commands. It overrides the following methods:
        - create_user()
        - remove_user()
        - modify_user()
    c	C`s�|jjdt�g}|jd�|jdk	rT|jd�|j|j�n|jdk	r�|j|j�s�|jjddj	|j��n|jd�|j|j�n|j
dk	r�|jd�|j|j
�n|jdk	r|jd�|j|j�n|jdk	rD|jd	�|j|j�n|j
s]|jd
�n|jdk	r�|jd�|j|j�n|jr�|jd�n|j|j�|j|�\}}}|dk	r
|d
kr
|jjd|jd|d|�n|jdk	r�|jjdt�g}|jd�dj	d|jd|j�}|j|d|�\}}}|dk	r�|d
kr�|jjd|jd|d|�q�n|jdk	rtt|j�rt|j�}|jjdt�}xx|D]m}||j|g}|j|�\}}}|dk	r|d
kr|jjd|jd|d|�qqWn|||fS(Ntaddusers-Ds-uR5sGroup {0} does not exists-Gs-gs-hs-ss-Hs-ks-SiRR�R�s--encrypteds{name}:{password}RRc(R7RqRWR%RR>RRyRCR�RR,RR R"R#RRkRR2RYR}(	RGRhR�R�R�RcR2tadd_cmd_binR((s?/usr/lib/python2.7/site-packages/ansible/modules/system/user.pyR�
s\

"



	
	%
(
,cC`sD|jjdt�|jg}|jr7|jd�n|j|�S(Ntdelusers
--remove-home(R7RqRWRRR%Rk(RGRh((s?/usr/lib/python2.7/site-packages/ansible/modules/system/user.pyRs
	cC`s�|j�}g}d}d}d}|j�}|jjdt�}|jjdt�}|jdk	r�t|j�r�|j�}t	|�j
|�}	|	r�x�|D]|}
|
|	kr�||j|
g}|j|�\}}}|dk	r"|dkr"|jj
d|jd|d|�q"q�q�Wx�|	D]�}
|
|kr-|jr-||j|
g}|j|�\}}}|dk	r�|dkr�|jj
d|jd|d|�q�q-q-Wq�n|jdkr�|jdk	r�|d	|jkr�|jjd
t�g}
|
jd�djd|jd
|j�}|j|
d|�\}}}|dk	r�|dkr�|jj
d|jd|d|�q�n|||fS(NRaR�tdelgroupiRR5R�R�iR�s--encrypteds{name}:{password}RRc(R�R>R�R7RqRWR2RYR}RUR�RRkRCR%R+RR�(RGR�R2R�R�R�R�R�tremove_cmd_binR�R�tadd_cmdt
remove_cmdRhRc((s?/usr/lib/python2.7/site-packages/ansible/modules/system/user.pyRs@
,
21
((RRRRRR(((s?/usr/lib/python2.7/site-packages/ansible/modules/system/user.pyR��
s	A	tAlpinecB`seZdZdZdZRS(s�
    This is the Alpine User manipulation class. It inherits the BusyBox class
    behaviors such as using adduser and deluser commands.
    tLinuxR�(RRRRSR (((s?/usr/lib/python2.7/site-packages/ansible/modules/system/user.pyR�Jsc
GC`stddddddddtj��}tdtd	tdd
ddd
ddg�dtdd
dtddg�dtdd�dtdddt�dtdd
�dtdd�dtdd
�dtdd�dtdd
�dtdd
dt�dtdd
�d tdd�d!tdd
�d"tdddt�d#tdddt�d$tdddtdd%g�d&tdd
�d'tdddt�d(tdddt�d)tdddt�d*tdd�d+tddd|d�d,tdd
d|d�d-tdd�d.tdd
d|d�d/tdd
dt�d0tdd
dd1d
d1d2gdt�d3tdd4�d5tdddt�d6tdd�d7tdd
�d8tdd
�d9tdd
��!d:td;dNdOg�}t|�}|j�|j	d<|j
�|jr$|j	d=|j�nd}d>}d>}i}|j|d<|j
|d	<|j
dkr�|j�r�|jr�|jd?t�n|j�\}}}|dkr�|jd|jd@|dA|�n|j|d"<|j|d#<q�n�|j
dkr�|j�s�|jr'|jd?t�nt}|jrr|jrrtjj|j�}tjj|�srt}qrn|j�\}}}|r�|j�}	|	tk	r�|j|	dB|	dC|j�q�n|jr�|j|d'<q.|j|d'<|j|d$<n/|j�\}}}|j |d)<|j!|d(<|dk	rh|dkrh|jd|jd@|dA|�n|j"dk	r�dD|d<q�n|dkr�t|d?<n
t|d?<|r�||dE<n|r�||dF<n|j�r�|j
dkr�|j�}	|	tkr!dG|j|d@<t|dH<n|	dB|d<|	dC|d<|	dI|d<|	dJ|d<|	dK|d<|j#dk	r�|j#|d<n|j�}	|jdkr�|	dJ|_ntjj$|j�r|jr|js
|j%|j�|j|	dB|	dC|j�nt|d?<n|j&r�|j'�\}}}|dk	ro|dkro|jd|jd@|dA|�n|dkr�t|d?<n|j(�\}}}|dkr�|j)�|dL<n|j)�|dL<|j*�|d-<|j+�|dM<q�n|j|�dS(PNtbitsittypetrsat
passphraseRsansible-generated on %st
argument_specRRftdefaulttpresenttchoicestabsentRtrequiredtaliasesRrRR|RRZRR2R�R,RFRRtno_logR$RRRRR t
createhomeR"R#R!R%R&R'R(R6R)R*R+R�t	on_createR4tfloatR-R.R/R0R1tsupports_check_modetmutually_exclusivesUser instantiated - platform %ss#User instantiated - distribution %sRaRxR5R�iitNOT_LOGGING_PASSWORDR�R�sfailed to look up user name: %sR
iiitssh_fingerprintR(R.R2(R.R%(,RSR>tsockettgethostnameR
RWRTRR`ReRSR RRR�RdR
RRCRRR,R RERFR~RRR�RR#RR%R!RR2RzR�R9RRR�R�R(
tssh_defaultsR7RrR�R�R�tresulttpath_needs_parentsR�R�((s?/usr/lib/python2.7/site-packages/ansible/modules/system/user.pytmainSs!'
	

	"
	$	


"




	!
	"
t__main__(5t
__future__RRRR�t
__metaclass__tANSIBLE_METADATAt
DOCUMENTATIONtEXAMPLEStRETURNR�R�R)RERR�R�R�RR�R�R@R�tansible.module_utilsRtansible.module_utils.basicR	R
tansible.module_utils._textRRR
R�RWR�tImportErrorRTtcompileR[tobjectRR!R/R1R9R<RWR�R�R�R�R�R(((s?/usr/lib/python2.7/site-packages/ansible/modules/system/user.pyt<module>s`


�)e


��������d���		�

Anons79 File Manager Version 1.0, Coded By Anons79
Email: [email protected]