diff --git a/changelogs/fragments/134_authorized_key.yml b/changelogs/fragments/134_authorized_key.yml new file mode 100644 index 0000000..38a47dc --- /dev/null +++ b/changelogs/fragments/134_authorized_key.yml @@ -0,0 +1,2 @@ +minor_changes: +- authorized_key - add a list of valid key types (https://github.com/ansible-collections/ansible.posix/issues/134). diff --git a/plugins/modules/authorized_key.py b/plugins/modules/authorized_key.py index 25c06e3..7f203e3 100644 --- a/plugins/modules/authorized_key.py +++ b/plugins/modules/authorized_key.py @@ -389,13 +389,28 @@ def parsekey(module, raw_key, rank=None): VALID_SSH2_KEY_TYPES = [ 'sk-ecdsa-sha2-nistp256@openssh.com', + 'sk-ecdsa-sha2-nistp256-cert-v01@openssh.com', + 'webauthn-sk-ecdsa-sha2-nistp256@openssh.com', 'ecdsa-sha2-nistp256', + 'ecdsa-sha2-nistp256-cert-v01@openssh.com', 'ecdsa-sha2-nistp384', + 'ecdsa-sha2-nistp384-cert-v01@openssh.com', 'ecdsa-sha2-nistp521', + 'ecdsa-sha2-nistp521-cert-v01@openssh.com', 'sk-ssh-ed25519@openssh.com', + 'sk-ssh-ed25519-cert-v01@openssh.com', 'ssh-ed25519', + 'ssh-ed25519-cert-v01@openssh.com', 'ssh-dss', 'ssh-rsa', + 'ssh-xmss@openssh.com', + 'ssh-xmss-cert-v01@openssh.com', + 'rsa-sha2-256', + 'rsa-sha2-512', + 'ssh-rsa-cert-v01@openssh.com', + 'rsa-sha2-256-cert-v01@openssh.com', + 'rsa-sha2-512-cert-v01@openssh.com', + 'ssh-dss-cert-v01@openssh.com', ] options = None # connection options