mirror of
https://github.com/ansible-collections/community.crypto.git
synced 2026-03-26 21:33:25 +00:00
Fix some ansible-lint issues (#907)
* Fix fqcn[action-core]. * Fix fqcn[action]. * Fix jinja[spacing].
This commit is contained in:
@@ -3,20 +3,20 @@
|
||||
# GNU General Public License v3.0+ (see LICENSES/GPL-3.0-or-later.txt or https://www.gnu.org/licenses/gpl-3.0.txt)
|
||||
# SPDX-License-Identifier: GPL-3.0-or-later
|
||||
|
||||
- name: (Selfsigned, {{select_crypto_backend}}) Generate privatekey
|
||||
openssl_privatekey:
|
||||
- name: (Selfsigned, {{ select_crypto_backend }}) Generate privatekey
|
||||
community.crypto.openssl_privatekey:
|
||||
path: '{{ remote_tmp_dir }}/privatekey.pem'
|
||||
size: '{{ default_rsa_key_size_certificates }}'
|
||||
|
||||
- name: (Selfsigned, {{select_crypto_backend}}) Generate privatekey with password
|
||||
openssl_privatekey:
|
||||
- name: (Selfsigned, {{ select_crypto_backend }}) Generate privatekey with password
|
||||
community.crypto.openssl_privatekey:
|
||||
path: '{{ remote_tmp_dir }}/privatekeypw.pem'
|
||||
passphrase: hunter2
|
||||
select_crypto_backend: cryptography
|
||||
size: '{{ default_rsa_key_size_certificates }}'
|
||||
|
||||
- name: (Selfsigned, {{select_crypto_backend}}) Generate selfsigned certificate without CSR
|
||||
x509_certificate:
|
||||
- name: (Selfsigned, {{ select_crypto_backend }}) Generate selfsigned certificate without CSR
|
||||
community.crypto.x509_certificate:
|
||||
path: '{{ remote_tmp_dir }}/cert_no_csr.pem'
|
||||
privatekey_path: '{{ remote_tmp_dir }}/privatekey.pem'
|
||||
provider: selfsigned
|
||||
@@ -25,8 +25,8 @@
|
||||
return_content: true
|
||||
register: selfsigned_certificate_no_csr
|
||||
|
||||
- name: (Selfsigned, {{select_crypto_backend}}) Generate selfsigned certificate without CSR - idempotency
|
||||
x509_certificate:
|
||||
- name: (Selfsigned, {{ select_crypto_backend }}) Generate selfsigned certificate without CSR - idempotency
|
||||
community.crypto.x509_certificate:
|
||||
path: '{{ remote_tmp_dir }}/cert_no_csr.pem'
|
||||
privatekey_path: '{{ remote_tmp_dir }}/privatekey.pem'
|
||||
provider: selfsigned
|
||||
@@ -35,8 +35,8 @@
|
||||
return_content: true
|
||||
register: selfsigned_certificate_no_csr_idempotence
|
||||
|
||||
- name: (Selfsigned, {{select_crypto_backend}}) Generate selfsigned certificate without CSR (check mode)
|
||||
x509_certificate:
|
||||
- name: (Selfsigned, {{ select_crypto_backend }}) Generate selfsigned certificate without CSR (check mode)
|
||||
community.crypto.x509_certificate:
|
||||
path: '{{ remote_tmp_dir }}/cert_no_csr.pem'
|
||||
privatekey_path: '{{ remote_tmp_dir }}/privatekey.pem'
|
||||
provider: selfsigned
|
||||
@@ -45,22 +45,22 @@
|
||||
check_mode: true
|
||||
register: selfsigned_certificate_no_csr_idempotence_check
|
||||
|
||||
- name: (Selfsigned, {{select_crypto_backend}}) Generate CSR
|
||||
openssl_csr:
|
||||
- name: (Selfsigned, {{ select_crypto_backend }}) Generate CSR
|
||||
community.crypto.openssl_csr:
|
||||
path: '{{ remote_tmp_dir }}/csr.csr'
|
||||
privatekey_path: '{{ remote_tmp_dir }}/privatekey.pem'
|
||||
subject:
|
||||
commonName: www.example.com
|
||||
|
||||
- name: (Selfsigned, {{select_crypto_backend}}) Generate CSR
|
||||
openssl_csr:
|
||||
- name: (Selfsigned, {{ select_crypto_backend }}) Generate CSR
|
||||
community.crypto.openssl_csr:
|
||||
path: '{{ remote_tmp_dir }}/csr_minimal_change.csr'
|
||||
privatekey_path: '{{ remote_tmp_dir }}/privatekey.pem'
|
||||
subject:
|
||||
commonName: www.example.org
|
||||
|
||||
- name: (Selfsigned, {{select_crypto_backend}}) Generate selfsigned certificate
|
||||
x509_certificate:
|
||||
- name: (Selfsigned, {{ select_crypto_backend }}) Generate selfsigned certificate
|
||||
community.crypto.x509_certificate:
|
||||
path: '{{ remote_tmp_dir }}/cert.pem'
|
||||
csr_path: '{{ remote_tmp_dir }}/csr.csr'
|
||||
privatekey_path: '{{ remote_tmp_dir }}/privatekey.pem'
|
||||
@@ -70,8 +70,8 @@
|
||||
return_content: true
|
||||
register: selfsigned_certificate
|
||||
|
||||
- name: (Selfsigned, {{select_crypto_backend}}) Generate selfsigned certificate - idempotency
|
||||
x509_certificate:
|
||||
- name: (Selfsigned, {{ select_crypto_backend }}) Generate selfsigned certificate - idempotency
|
||||
community.crypto.x509_certificate:
|
||||
path: '{{ remote_tmp_dir }}/cert.pem'
|
||||
csr_path: '{{ remote_tmp_dir }}/csr.csr'
|
||||
privatekey_path: '{{ remote_tmp_dir }}/privatekey.pem'
|
||||
@@ -81,8 +81,8 @@
|
||||
return_content: true
|
||||
register: selfsigned_certificate_idempotence
|
||||
|
||||
- name: (Selfsigned, {{select_crypto_backend}}) Generate selfsigned certificate (check mode)
|
||||
x509_certificate:
|
||||
- name: (Selfsigned, {{ select_crypto_backend }}) Generate selfsigned certificate (check mode)
|
||||
community.crypto.x509_certificate:
|
||||
path: '{{ remote_tmp_dir }}/cert.pem'
|
||||
csr_path: '{{ remote_tmp_dir }}/csr.csr'
|
||||
privatekey_path: '{{ remote_tmp_dir }}/privatekey.pem'
|
||||
@@ -91,8 +91,8 @@
|
||||
select_crypto_backend: '{{ select_crypto_backend }}'
|
||||
check_mode: true
|
||||
|
||||
- name: (Selfsigned, {{select_crypto_backend}}) Generate selfsigned certificate (check mode, other CSR)
|
||||
x509_certificate:
|
||||
- name: (Selfsigned, {{ select_crypto_backend }}) Generate selfsigned certificate (check mode, other CSR)
|
||||
community.crypto.x509_certificate:
|
||||
path: '{{ remote_tmp_dir }}/cert.pem'
|
||||
csr_path: '{{ remote_tmp_dir }}/csr_minimal_change.csr'
|
||||
privatekey_path: '{{ remote_tmp_dir }}/privatekey.pem'
|
||||
@@ -102,20 +102,20 @@
|
||||
check_mode: true
|
||||
register: selfsigned_certificate_csr_minimal_change
|
||||
|
||||
- name: (Selfsigned, {{select_crypto_backend}}) Get certificate information
|
||||
- name: (Selfsigned, {{ select_crypto_backend }}) Get certificate information
|
||||
community.crypto.x509_certificate_info:
|
||||
path: '{{ remote_tmp_dir }}/cert.pem'
|
||||
select_crypto_backend: '{{ select_crypto_backend }}'
|
||||
register: result
|
||||
|
||||
- name: (Selfsigned, {{select_crypto_backend}}) Get private key information
|
||||
- name: (Selfsigned, {{ select_crypto_backend }}) Get private key information
|
||||
community.crypto.openssl_privatekey_info:
|
||||
path: '{{ remote_tmp_dir }}/privatekey.pem'
|
||||
select_crypto_backend: '{{ select_crypto_backend }}'
|
||||
register: result_privatekey
|
||||
|
||||
- name: (Selfsigned, {{select_crypto_backend}}) Check selfsigned certificate
|
||||
assert:
|
||||
- name: (Selfsigned, {{ select_crypto_backend }}) Check selfsigned certificate
|
||||
ansible.builtin.assert:
|
||||
that:
|
||||
- result.public_key == result_privatekey.public_key
|
||||
- "result.signature_algorithm == 'sha256WithRSAEncryption' or result.signature_algorithm == 'sha256WithECDSAEncryption'"
|
||||
@@ -123,8 +123,8 @@
|
||||
- not result.expired
|
||||
- result.version == 3
|
||||
|
||||
- name: (Selfsigned, {{select_crypto_backend}}) Generate selfsigned v2 certificate
|
||||
x509_certificate:
|
||||
- name: (Selfsigned, {{ select_crypto_backend }}) Generate selfsigned v2 certificate
|
||||
community.crypto.x509_certificate:
|
||||
path: '{{ remote_tmp_dir }}/cert_v2.pem'
|
||||
csr_path: '{{ remote_tmp_dir }}/csr.csr'
|
||||
privatekey_path: '{{ remote_tmp_dir }}/privatekey.pem'
|
||||
@@ -135,13 +135,13 @@
|
||||
register: selfsigned_v2_cert
|
||||
ignore_errors: true
|
||||
|
||||
- name: (Selfsigned, {{select_crypto_backend}}) Generate privatekey2
|
||||
openssl_privatekey:
|
||||
- name: (Selfsigned, {{ select_crypto_backend }}) Generate privatekey2
|
||||
community.crypto.openssl_privatekey:
|
||||
path: '{{ remote_tmp_dir }}/privatekey2.pem'
|
||||
size: '{{ default_rsa_key_size_certificates }}'
|
||||
|
||||
- name: (Selfsigned, {{select_crypto_backend}}) Generate CSR2
|
||||
openssl_csr:
|
||||
- name: (Selfsigned, {{ select_crypto_backend }}) Generate CSR2
|
||||
community.crypto.openssl_csr:
|
||||
subject:
|
||||
CN: www.example.com
|
||||
C: US
|
||||
@@ -159,8 +159,8 @@
|
||||
- ipsecUser
|
||||
- biometricInfo
|
||||
|
||||
- name: (Selfsigned, {{select_crypto_backend}}) Generate selfsigned certificate2
|
||||
x509_certificate:
|
||||
- name: (Selfsigned, {{ select_crypto_backend }}) Generate selfsigned certificate2
|
||||
community.crypto.x509_certificate:
|
||||
path: '{{ remote_tmp_dir }}/cert2.pem'
|
||||
csr_path: '{{ remote_tmp_dir }}/csr2.csr'
|
||||
privatekey_path: '{{ remote_tmp_dir }}/privatekey2.pem'
|
||||
@@ -168,20 +168,20 @@
|
||||
selfsigned_digest: sha256
|
||||
select_crypto_backend: '{{ select_crypto_backend }}'
|
||||
|
||||
- name: (Selfsigned, {{select_crypto_backend}}) Get certificate information
|
||||
- name: (Selfsigned, {{ select_crypto_backend }}) Get certificate information
|
||||
community.crypto.x509_certificate_info:
|
||||
path: '{{ remote_tmp_dir }}/cert2.pem'
|
||||
select_crypto_backend: '{{ select_crypto_backend }}'
|
||||
register: result
|
||||
|
||||
- name: (Selfsigned, {{select_crypto_backend}}) Get private key information
|
||||
- name: (Selfsigned, {{ select_crypto_backend }}) Get private key information
|
||||
community.crypto.openssl_privatekey_info:
|
||||
path: '{{ remote_tmp_dir }}/privatekey2.pem'
|
||||
select_crypto_backend: '{{ select_crypto_backend }}'
|
||||
register: result_privatekey
|
||||
|
||||
- name: (Selfsigned, {{select_crypto_backend}}) Check selfsigned certificate2
|
||||
assert:
|
||||
- name: (Selfsigned, {{ select_crypto_backend }}) Check selfsigned certificate2
|
||||
ansible.builtin.assert:
|
||||
that:
|
||||
- result.public_key == result_privatekey.public_key
|
||||
- "result.signature_algorithm == 'sha256WithRSAEncryption' or result.signature_algorithm == 'sha256WithECDSAEncryption'"
|
||||
@@ -197,20 +197,20 @@
|
||||
- "'IPSec User' in result.extended_key_usage"
|
||||
- "'Biometric Info' in result.extended_key_usage"
|
||||
|
||||
- name: (Selfsigned, {{select_crypto_backend}}) Create private key 3
|
||||
openssl_privatekey:
|
||||
- name: (Selfsigned, {{ select_crypto_backend }}) Create private key 3
|
||||
community.crypto.openssl_privatekey:
|
||||
path: "{{ remote_tmp_dir }}/privatekey3.pem"
|
||||
size: '{{ default_rsa_key_size_certificates }}'
|
||||
|
||||
- name: (Selfsigned, {{select_crypto_backend}}) Create CSR 3
|
||||
openssl_csr:
|
||||
- name: (Selfsigned, {{ select_crypto_backend }}) Create CSR 3
|
||||
community.crypto.openssl_csr:
|
||||
subject:
|
||||
CN: www.example.com
|
||||
privatekey_path: "{{ remote_tmp_dir }}/privatekey3.pem"
|
||||
path: "{{ remote_tmp_dir }}/csr3.pem"
|
||||
|
||||
- name: (Selfsigned, {{select_crypto_backend}}) Create certificate3 with notBefore and notAfter
|
||||
x509_certificate:
|
||||
- name: (Selfsigned, {{ select_crypto_backend }}) Create certificate3 with notBefore and notAfter
|
||||
community.crypto.x509_certificate:
|
||||
provider: selfsigned
|
||||
selfsigned_not_before: 20181023133742Z
|
||||
selfsigned_not_after: 20191023133742Z
|
||||
@@ -219,8 +219,8 @@
|
||||
privatekey_path: "{{ remote_tmp_dir }}/privatekey3.pem"
|
||||
select_crypto_backend: '{{ select_crypto_backend }}'
|
||||
|
||||
- name: (Selfsigned, {{select_crypto_backend}}) Create certificate3 with notBefore and notAfter (idempotent)
|
||||
x509_certificate:
|
||||
- name: (Selfsigned, {{ select_crypto_backend }}) Create certificate3 with notBefore and notAfter (idempotent)
|
||||
community.crypto.x509_certificate:
|
||||
provider: selfsigned
|
||||
selfsigned_not_before: 20181023133742Z
|
||||
selfsigned_not_after: 20191023133742Z
|
||||
@@ -231,22 +231,22 @@
|
||||
select_crypto_backend: '{{ select_crypto_backend }}'
|
||||
register: cert3_selfsigned_idem
|
||||
|
||||
- name: (Selfsigned, {{select_crypto_backend}}) Generate privatekey
|
||||
openssl_privatekey:
|
||||
- name: (Selfsigned, {{ select_crypto_backend }}) Generate privatekey
|
||||
community.crypto.openssl_privatekey:
|
||||
path: '{{ remote_tmp_dir }}/privatekey_ecc.pem'
|
||||
type: ECC
|
||||
curve: "{{ (ansible_distribution == 'CentOS' and ansible_distribution_major_version == '6') | ternary('secp521r1', 'secp256k1') }}"
|
||||
# ^ cryptography on CentOS6 doesn't support secp256k1, so we use secp521r1 instead
|
||||
|
||||
- name: (Selfsigned, {{select_crypto_backend}}) Generate CSR
|
||||
openssl_csr:
|
||||
- name: (Selfsigned, {{ select_crypto_backend }}) Generate CSR
|
||||
community.crypto.openssl_csr:
|
||||
path: '{{ remote_tmp_dir }}/csr_ecc.csr'
|
||||
privatekey_path: '{{ remote_tmp_dir }}/privatekey_ecc.pem'
|
||||
subject:
|
||||
commonName: www.example.com
|
||||
|
||||
- name: (Selfsigned, {{select_crypto_backend}}) Generate selfsigned certificate
|
||||
x509_certificate:
|
||||
- name: (Selfsigned, {{ select_crypto_backend }}) Generate selfsigned certificate
|
||||
community.crypto.x509_certificate:
|
||||
path: '{{ remote_tmp_dir }}/cert_ecc.pem'
|
||||
csr_path: '{{ remote_tmp_dir }}/csr_ecc.csr'
|
||||
privatekey_path: '{{ remote_tmp_dir }}/privatekey_ecc.pem'
|
||||
@@ -255,16 +255,16 @@
|
||||
select_crypto_backend: '{{ select_crypto_backend }}'
|
||||
register: selfsigned_certificate_ecc
|
||||
|
||||
- name: (Selfsigned, {{select_crypto_backend}}) Generate CSR (privatekey passphrase)
|
||||
openssl_csr:
|
||||
- name: (Selfsigned, {{ select_crypto_backend }}) Generate CSR (privatekey passphrase)
|
||||
community.crypto.openssl_csr:
|
||||
path: '{{ remote_tmp_dir }}/csr_pass.csr'
|
||||
privatekey_path: '{{ remote_tmp_dir }}/privatekeypw.pem'
|
||||
privatekey_passphrase: hunter2
|
||||
subject:
|
||||
commonName: www.example.com
|
||||
|
||||
- name: (Selfsigned, {{select_crypto_backend}}) Generate selfsigned certificate (privatekey passphrase)
|
||||
x509_certificate:
|
||||
- name: (Selfsigned, {{ select_crypto_backend }}) Generate selfsigned certificate (privatekey passphrase)
|
||||
community.crypto.x509_certificate:
|
||||
path: '{{ remote_tmp_dir }}/cert_pass.pem'
|
||||
csr_path: '{{ remote_tmp_dir }}/csr_pass.csr'
|
||||
privatekey_path: '{{ remote_tmp_dir }}/privatekeypw.pem'
|
||||
@@ -274,8 +274,8 @@
|
||||
select_crypto_backend: '{{ select_crypto_backend }}'
|
||||
register: selfsigned_certificate_passphrase
|
||||
|
||||
- name: (Selfsigned, {{select_crypto_backend}}) Generate selfsigned certificate (failed passphrase 1)
|
||||
x509_certificate:
|
||||
- name: (Selfsigned, {{ select_crypto_backend }}) Generate selfsigned certificate (failed passphrase 1)
|
||||
community.crypto.x509_certificate:
|
||||
path: '{{ remote_tmp_dir }}/cert_pw1.pem'
|
||||
csr_path: '{{ remote_tmp_dir }}/csr_ecc.csr'
|
||||
privatekey_path: '{{ remote_tmp_dir }}/privatekey.pem'
|
||||
@@ -286,8 +286,8 @@
|
||||
ignore_errors: true
|
||||
register: passphrase_error_1
|
||||
|
||||
- name: (Selfsigned, {{select_crypto_backend}}) Generate selfsigned certificate (failed passphrase 2)
|
||||
x509_certificate:
|
||||
- name: (Selfsigned, {{ select_crypto_backend }}) Generate selfsigned certificate (failed passphrase 2)
|
||||
community.crypto.x509_certificate:
|
||||
path: '{{ remote_tmp_dir }}/cert_pw2.pem'
|
||||
csr_path: '{{ remote_tmp_dir }}/csr_ecc.csr'
|
||||
privatekey_path: '{{ remote_tmp_dir }}/privatekeypw.pem'
|
||||
@@ -298,8 +298,8 @@
|
||||
ignore_errors: true
|
||||
register: passphrase_error_2
|
||||
|
||||
- name: (Selfsigned, {{select_crypto_backend}}) Generate selfsigned certificate (failed passphrase 3)
|
||||
x509_certificate:
|
||||
- name: (Selfsigned, {{ select_crypto_backend }}) Generate selfsigned certificate (failed passphrase 3)
|
||||
community.crypto.x509_certificate:
|
||||
path: '{{ remote_tmp_dir }}/cert_pw3.pem'
|
||||
csr_path: '{{ remote_tmp_dir }}/csr_ecc.csr'
|
||||
privatekey_path: '{{ remote_tmp_dir }}/privatekeypw.pem'
|
||||
@@ -309,12 +309,12 @@
|
||||
ignore_errors: true
|
||||
register: passphrase_error_3
|
||||
|
||||
- name: (Selfsigned, {{select_crypto_backend}}) Create broken certificate
|
||||
copy:
|
||||
- name: (Selfsigned, {{ select_crypto_backend }}) Create broken certificate
|
||||
ansible.builtin.copy:
|
||||
dest: "{{ remote_tmp_dir }}/cert_broken.pem"
|
||||
content: "broken"
|
||||
- name: (Selfsigned, {{select_crypto_backend}}) Regenerate broken cert
|
||||
x509_certificate:
|
||||
- name: (Selfsigned, {{ select_crypto_backend }}) Regenerate broken cert
|
||||
community.crypto.x509_certificate:
|
||||
path: '{{ remote_tmp_dir }}/cert_broken.pem'
|
||||
csr_path: '{{ remote_tmp_dir }}/csr_ecc.csr'
|
||||
privatekey_path: '{{ remote_tmp_dir }}/privatekey_ecc.pem'
|
||||
@@ -322,8 +322,8 @@
|
||||
selfsigned_digest: sha256
|
||||
register: selfsigned_broken
|
||||
|
||||
- name: (Selfsigned, {{select_crypto_backend}}) Backup test
|
||||
x509_certificate:
|
||||
- name: (Selfsigned, {{ select_crypto_backend }}) Backup test
|
||||
community.crypto.x509_certificate:
|
||||
path: '{{ remote_tmp_dir }}/selfsigned_cert_backup.pem'
|
||||
csr_path: '{{ remote_tmp_dir }}/csr_ecc.csr'
|
||||
privatekey_path: '{{ remote_tmp_dir }}/privatekey_ecc.pem'
|
||||
@@ -332,8 +332,8 @@
|
||||
backup: true
|
||||
select_crypto_backend: '{{ select_crypto_backend }}'
|
||||
register: selfsigned_backup_1
|
||||
- name: (Selfsigned, {{select_crypto_backend}}) Backup test (idempotent)
|
||||
x509_certificate:
|
||||
- name: (Selfsigned, {{ select_crypto_backend }}) Backup test (idempotent)
|
||||
community.crypto.x509_certificate:
|
||||
path: '{{ remote_tmp_dir }}/selfsigned_cert_backup.pem'
|
||||
csr_path: '{{ remote_tmp_dir }}/csr_ecc.csr'
|
||||
privatekey_path: '{{ remote_tmp_dir }}/privatekey_ecc.pem'
|
||||
@@ -342,8 +342,8 @@
|
||||
backup: true
|
||||
select_crypto_backend: '{{ select_crypto_backend }}'
|
||||
register: selfsigned_backup_2
|
||||
- name: (Selfsigned, {{select_crypto_backend}}) Backup test (change)
|
||||
x509_certificate:
|
||||
- name: (Selfsigned, {{ select_crypto_backend }}) Backup test (change)
|
||||
community.crypto.x509_certificate:
|
||||
path: '{{ remote_tmp_dir }}/selfsigned_cert_backup.pem'
|
||||
csr_path: '{{ remote_tmp_dir }}/csr.csr'
|
||||
privatekey_path: '{{ remote_tmp_dir }}/privatekey.pem'
|
||||
@@ -352,16 +352,16 @@
|
||||
backup: true
|
||||
select_crypto_backend: '{{ select_crypto_backend }}'
|
||||
register: selfsigned_backup_3
|
||||
- name: (Selfsigned, {{select_crypto_backend}}) Backup test (remove)
|
||||
x509_certificate:
|
||||
- name: (Selfsigned, {{ select_crypto_backend }}) Backup test (remove)
|
||||
community.crypto.x509_certificate:
|
||||
path: '{{ remote_tmp_dir }}/selfsigned_cert_backup.pem'
|
||||
state: absent
|
||||
provider: selfsigned
|
||||
backup: true
|
||||
select_crypto_backend: '{{ select_crypto_backend }}'
|
||||
register: selfsigned_backup_4
|
||||
- name: (Selfsigned, {{select_crypto_backend}}) Backup test (remove, idempotent)
|
||||
x509_certificate:
|
||||
- name: (Selfsigned, {{ select_crypto_backend }}) Backup test (remove, idempotent)
|
||||
community.crypto.x509_certificate:
|
||||
path: '{{ remote_tmp_dir }}/selfsigned_cert_backup.pem'
|
||||
state: absent
|
||||
provider: selfsigned
|
||||
@@ -369,8 +369,8 @@
|
||||
select_crypto_backend: '{{ select_crypto_backend }}'
|
||||
register: selfsigned_backup_5
|
||||
|
||||
- name: (Selfsigned, {{select_crypto_backend}}) Create subject key identifier test
|
||||
x509_certificate:
|
||||
- name: (Selfsigned, {{ select_crypto_backend }}) Create subject key identifier test
|
||||
community.crypto.x509_certificate:
|
||||
path: '{{ remote_tmp_dir }}/selfsigned_cert_ski.pem'
|
||||
csr_path: '{{ remote_tmp_dir }}/csr_ecc.csr'
|
||||
privatekey_path: '{{ remote_tmp_dir }}/privatekey_ecc.pem'
|
||||
@@ -380,8 +380,8 @@
|
||||
select_crypto_backend: '{{ select_crypto_backend }}'
|
||||
register: selfsigned_subject_key_identifier_1
|
||||
|
||||
- name: (Selfsigned, {{select_crypto_backend}}) Create subject key identifier test (idempotency)
|
||||
x509_certificate:
|
||||
- name: (Selfsigned, {{ select_crypto_backend }}) Create subject key identifier test (idempotency)
|
||||
community.crypto.x509_certificate:
|
||||
path: '{{ remote_tmp_dir }}/selfsigned_cert_ski.pem'
|
||||
csr_path: '{{ remote_tmp_dir }}/csr_ecc.csr'
|
||||
privatekey_path: '{{ remote_tmp_dir }}/privatekey_ecc.pem'
|
||||
@@ -391,8 +391,8 @@
|
||||
select_crypto_backend: '{{ select_crypto_backend }}'
|
||||
register: selfsigned_subject_key_identifier_2
|
||||
|
||||
- name: (Selfsigned, {{select_crypto_backend}}) Create subject key identifier test (remove)
|
||||
x509_certificate:
|
||||
- name: (Selfsigned, {{ select_crypto_backend }}) Create subject key identifier test (remove)
|
||||
community.crypto.x509_certificate:
|
||||
path: '{{ remote_tmp_dir }}/selfsigned_cert_ski.pem'
|
||||
csr_path: '{{ remote_tmp_dir }}/csr_ecc.csr'
|
||||
privatekey_path: '{{ remote_tmp_dir }}/privatekey_ecc.pem'
|
||||
@@ -402,8 +402,8 @@
|
||||
select_crypto_backend: '{{ select_crypto_backend }}'
|
||||
register: selfsigned_subject_key_identifier_3
|
||||
|
||||
- name: (Selfsigned, {{select_crypto_backend}}) Create subject key identifier test (remove idempotency)
|
||||
x509_certificate:
|
||||
- name: (Selfsigned, {{ select_crypto_backend }}) Create subject key identifier test (remove idempotency)
|
||||
community.crypto.x509_certificate:
|
||||
path: '{{ remote_tmp_dir }}/selfsigned_cert_ski.pem'
|
||||
csr_path: '{{ remote_tmp_dir }}/csr_ecc.csr'
|
||||
privatekey_path: '{{ remote_tmp_dir }}/privatekey_ecc.pem'
|
||||
@@ -413,8 +413,8 @@
|
||||
select_crypto_backend: '{{ select_crypto_backend }}'
|
||||
register: selfsigned_subject_key_identifier_4
|
||||
|
||||
- name: (Selfsigned, {{select_crypto_backend}}) Create subject key identifier test (re-enable)
|
||||
x509_certificate:
|
||||
- name: (Selfsigned, {{ select_crypto_backend }}) Create subject key identifier test (re-enable)
|
||||
community.crypto.x509_certificate:
|
||||
path: '{{ remote_tmp_dir }}/selfsigned_cert_ski.pem'
|
||||
csr_path: '{{ remote_tmp_dir }}/csr_ecc.csr'
|
||||
privatekey_path: '{{ remote_tmp_dir }}/privatekey_ecc.pem'
|
||||
@@ -424,10 +424,10 @@
|
||||
select_crypto_backend: '{{ select_crypto_backend }}'
|
||||
register: selfsigned_subject_key_identifier_5
|
||||
|
||||
- name: (Selfsigned, {{select_crypto_backend}}) Ed25519 and Ed448 tests (for cryptography >= 2.6)
|
||||
- name: (Selfsigned, {{ select_crypto_backend }}) Ed25519 and Ed448 tests (for cryptography >= 2.6)
|
||||
block:
|
||||
- name: (Selfsigned, {{select_crypto_backend}}) Generate privatekeys
|
||||
openssl_privatekey:
|
||||
- name: (Selfsigned, {{ select_crypto_backend }}) Generate privatekeys
|
||||
community.crypto.openssl_privatekey:
|
||||
path: '{{ remote_tmp_dir }}/privatekey_{{ item }}.pem'
|
||||
type: '{{ item }}'
|
||||
loop:
|
||||
@@ -436,12 +436,12 @@
|
||||
register: selfsigned_certificate_ed25519_ed448_privatekey
|
||||
ignore_errors: true
|
||||
|
||||
- name: (Selfsigned, {{select_crypto_backend}}) Generate CSR etc. if private key generation succeeded
|
||||
- name: (Selfsigned, {{ select_crypto_backend }}) Generate CSR etc. if private key generation succeeded
|
||||
when: selfsigned_certificate_ed25519_ed448_privatekey is not failed
|
||||
block:
|
||||
|
||||
- name: (Selfsigned, {{select_crypto_backend}}) Generate CSR
|
||||
openssl_csr:
|
||||
- name: (Selfsigned, {{ select_crypto_backend }}) Generate CSR
|
||||
community.crypto.openssl_csr:
|
||||
path: '{{ remote_tmp_dir }}/csr_{{ item }}.csr'
|
||||
privatekey_path: '{{ remote_tmp_dir }}/privatekey_{{ item }}.pem'
|
||||
subject:
|
||||
@@ -452,8 +452,8 @@
|
||||
- Ed448
|
||||
ignore_errors: true
|
||||
|
||||
- name: (Selfsigned, {{select_crypto_backend}}) Generate selfsigned certificate
|
||||
x509_certificate:
|
||||
- name: (Selfsigned, {{ select_crypto_backend }}) Generate selfsigned certificate
|
||||
community.crypto.x509_certificate:
|
||||
path: '{{ remote_tmp_dir }}/cert_{{ item }}.pem'
|
||||
csr_path: '{{ remote_tmp_dir }}/csr_{{ item }}.csr'
|
||||
privatekey_path: '{{ remote_tmp_dir }}/privatekey_{{ item }}.pem'
|
||||
@@ -466,8 +466,8 @@
|
||||
register: selfsigned_certificate_ed25519_ed448
|
||||
ignore_errors: true
|
||||
|
||||
- name: (Selfsigned, {{select_crypto_backend}}) Generate selfsigned certificate - idempotency
|
||||
x509_certificate:
|
||||
- name: (Selfsigned, {{ select_crypto_backend }}) Generate selfsigned certificate - idempotency
|
||||
community.crypto.x509_certificate:
|
||||
path: '{{ remote_tmp_dir }}/cert_{{ item }}.pem'
|
||||
csr_path: '{{ remote_tmp_dir }}/csr_{{ item }}.csr'
|
||||
privatekey_path: '{{ remote_tmp_dir }}/privatekey_{{ item }}.pem'
|
||||
@@ -482,4 +482,4 @@
|
||||
|
||||
when: select_crypto_backend == 'cryptography' and cryptography_version is version('3.3', '>=')
|
||||
|
||||
- import_tasks: ../tests/validate_selfsigned.yml
|
||||
- ansible.builtin.import_tasks: ../tests/validate_selfsigned.yml
|
||||
|
||||
Reference in New Issue
Block a user