mirror of
https://github.com/ansible-collections/community.crypto.git
synced 2026-03-26 21:33:25 +00:00
Re-sort imports.
This commit is contained in:
@@ -20,7 +20,6 @@ from ansible_collections.community.crypto.plugins.plugin_utils._action_module im
|
||||
ActionModuleBase,
|
||||
)
|
||||
|
||||
|
||||
if t.TYPE_CHECKING:
|
||||
from ansible_collections.community.crypto.plugins.module_utils._argspec import ( # pragma: no cover
|
||||
ArgumentSpec,
|
||||
|
||||
@@ -4,7 +4,6 @@
|
||||
|
||||
from __future__ import annotations
|
||||
|
||||
|
||||
DOCUMENTATION = r"""
|
||||
name: gpg_fingerprint
|
||||
short_description: Retrieve a GPG fingerprint from a GPG public or private key
|
||||
|
||||
@@ -4,7 +4,6 @@
|
||||
|
||||
from __future__ import annotations
|
||||
|
||||
|
||||
DOCUMENTATION = r"""
|
||||
name: openssl_csr_info
|
||||
short_description: Retrieve information from OpenSSL Certificate Signing Requests (CSR)
|
||||
|
||||
@@ -4,7 +4,6 @@
|
||||
|
||||
from __future__ import annotations
|
||||
|
||||
|
||||
DOCUMENTATION = r"""
|
||||
name: openssl_privatekey_info
|
||||
short_description: Retrieve information from OpenSSL private keys
|
||||
|
||||
@@ -4,7 +4,6 @@
|
||||
|
||||
from __future__ import annotations
|
||||
|
||||
|
||||
DOCUMENTATION = r"""
|
||||
name: openssl_publickey_info
|
||||
short_description: Retrieve information from OpenSSL public keys in PEM format
|
||||
|
||||
@@ -4,7 +4,6 @@
|
||||
|
||||
from __future__ import annotations
|
||||
|
||||
|
||||
DOCUMENTATION = r"""
|
||||
name: parse_serial
|
||||
short_description: Convert a serial number as a colon-separated list of hex numbers to an integer
|
||||
|
||||
@@ -4,7 +4,6 @@
|
||||
|
||||
from __future__ import annotations
|
||||
|
||||
|
||||
DOCUMENTATION = r"""
|
||||
name: split_pem
|
||||
short_description: Split PEM file contents into multiple objects
|
||||
|
||||
@@ -4,7 +4,6 @@
|
||||
|
||||
from __future__ import annotations
|
||||
|
||||
|
||||
DOCUMENTATION = r"""
|
||||
name: to_serial
|
||||
short_description: Convert an integer to a colon-separated list of hex numbers
|
||||
|
||||
@@ -4,7 +4,6 @@
|
||||
|
||||
from __future__ import annotations
|
||||
|
||||
|
||||
DOCUMENTATION = r"""
|
||||
name: x509_certificate_info
|
||||
short_description: Retrieve information from X.509 certificates in PEM format
|
||||
|
||||
@@ -4,7 +4,6 @@
|
||||
|
||||
from __future__ import annotations
|
||||
|
||||
|
||||
DOCUMENTATION = r"""
|
||||
name: x509_crl_info
|
||||
short_description: Retrieve information from X.509 CRLs in PEM format
|
||||
|
||||
@@ -4,7 +4,6 @@
|
||||
|
||||
from __future__ import annotations
|
||||
|
||||
|
||||
DOCUMENTATION = r"""
|
||||
name: gpg_fingerprint
|
||||
short_description: Retrieve a GPG fingerprint from a GPG public or private key file
|
||||
|
||||
@@ -16,7 +16,6 @@ from ansible_collections.community.crypto.plugins.module_utils._acme.errors impo
|
||||
ModuleFailException,
|
||||
)
|
||||
|
||||
|
||||
if t.TYPE_CHECKING:
|
||||
from ansible_collections.community.crypto.plugins.module_utils._acme.acme import ( # pragma: no cover
|
||||
ACMEClient,
|
||||
|
||||
@@ -48,7 +48,6 @@ from ansible_collections.community.crypto.plugins.module_utils._time import (
|
||||
get_now_datetime,
|
||||
)
|
||||
|
||||
|
||||
if t.TYPE_CHECKING:
|
||||
import http.client # pragma: no cover
|
||||
import os # pragma: no cover
|
||||
@@ -810,8 +809,8 @@ def create_backend(
|
||||
|
||||
|
||||
__all__ = (
|
||||
"ACMEDirectory",
|
||||
"ACMEClient",
|
||||
"create_default_argspec",
|
||||
"ACMEDirectory",
|
||||
"create_backend",
|
||||
"create_default_argspec",
|
||||
)
|
||||
|
||||
@@ -54,7 +54,6 @@ from ansible_collections.community.crypto.plugins.module_utils._version import (
|
||||
LooseVersion,
|
||||
)
|
||||
|
||||
|
||||
CRYPTOGRAPHY_MINIMAL_VERSION = "1.5"
|
||||
|
||||
CRYPTOGRAPHY_ERROR: None | str
|
||||
@@ -539,9 +538,9 @@ class CryptographyBackend(CryptoBackend):
|
||||
|
||||
|
||||
__all__ = (
|
||||
"CRYPTOGRAPHY_ERROR",
|
||||
"CRYPTOGRAPHY_ERROR",
|
||||
"CRYPTOGRAPHY_MINIMAL_VERSION",
|
||||
"CRYPTOGRAPHY_ERROR",
|
||||
"CRYPTOGRAPHY_VERSION",
|
||||
"CRYPTOGRAPHY_ERROR",
|
||||
"CryptographyBackend",
|
||||
)
|
||||
|
||||
@@ -38,7 +38,6 @@ from ansible_collections.community.crypto.plugins.module_utils._time import (
|
||||
ensure_utc_timezone,
|
||||
)
|
||||
|
||||
|
||||
if t.TYPE_CHECKING:
|
||||
from ansible.module_utils.basic import AnsibleModule # pragma: no cover
|
||||
|
||||
|
||||
@@ -29,7 +29,6 @@ from ansible_collections.community.crypto.plugins.module_utils._time import (
|
||||
remove_timezone,
|
||||
)
|
||||
|
||||
|
||||
if t.TYPE_CHECKING:
|
||||
import os # pragma: no cover
|
||||
|
||||
|
||||
@@ -36,7 +36,6 @@ from ansible_collections.community.crypto.plugins.module_utils._acme.utils impor
|
||||
pem_to_der,
|
||||
)
|
||||
|
||||
|
||||
if t.TYPE_CHECKING:
|
||||
from ansible.module_utils.basic import AnsibleModule # pragma: no cover
|
||||
|
||||
|
||||
@@ -22,7 +22,6 @@ from ansible_collections.community.crypto.plugins.module_utils._crypto.pem impor
|
||||
split_pem_list,
|
||||
)
|
||||
|
||||
|
||||
if t.TYPE_CHECKING:
|
||||
from ansible_collections.community.crypto.plugins.module_utils._acme.acme import ( # pragma: no cover
|
||||
ACMEClient,
|
||||
@@ -129,4 +128,4 @@ class ChainMatcher(metaclass=abc.ABCMeta):
|
||||
"""
|
||||
|
||||
|
||||
__all__ = ("CertificateChain", "Criterium", "ChainMatcher")
|
||||
__all__ = ("CertificateChain", "ChainMatcher", "Criterium")
|
||||
|
||||
@@ -27,7 +27,6 @@ from ansible_collections.community.crypto.plugins.module_utils._acme.utils impor
|
||||
nopad_b64,
|
||||
)
|
||||
|
||||
|
||||
if t.TYPE_CHECKING:
|
||||
from ansible.module_utils.basic import AnsibleModule # pragma: no cover
|
||||
|
||||
@@ -429,11 +428,11 @@ def wait_for_validation(
|
||||
|
||||
|
||||
__all__ = (
|
||||
"create_key_authorization",
|
||||
"Authorization",
|
||||
"Challenge",
|
||||
"combine_identifier",
|
||||
"create_key_authorization",
|
||||
"normalize_combined_identifier",
|
||||
"split_identifier",
|
||||
"Challenge",
|
||||
"Authorization",
|
||||
"wait_for_validation",
|
||||
)
|
||||
|
||||
@@ -13,7 +13,6 @@ from http.client import responses as http_responses
|
||||
|
||||
from ansible.module_utils.common.text.converters import to_text
|
||||
|
||||
|
||||
if t.TYPE_CHECKING:
|
||||
import http.client # pragma: no cover
|
||||
import urllib.error # pragma: no cover
|
||||
@@ -185,11 +184,11 @@ class KeyParsingError(ModuleFailException):
|
||||
|
||||
|
||||
__all__ = (
|
||||
"format_http_status",
|
||||
"format_error_problem",
|
||||
"ModuleFailException",
|
||||
"ACMEProtocolException",
|
||||
"BackendException",
|
||||
"NetworkException",
|
||||
"KeyParsingError",
|
||||
"ModuleFailException",
|
||||
"NetworkException",
|
||||
"format_error_problem",
|
||||
"format_http_status",
|
||||
)
|
||||
|
||||
@@ -19,7 +19,6 @@ from ansible_collections.community.crypto.plugins.module_utils._acme.errors impo
|
||||
ModuleFailException,
|
||||
)
|
||||
|
||||
|
||||
if t.TYPE_CHECKING:
|
||||
from ansible.module_utils.basic import AnsibleModule # pragma: no cover
|
||||
|
||||
|
||||
@@ -24,7 +24,6 @@ from ansible_collections.community.crypto.plugins.module_utils._acme.utils impor
|
||||
nopad_b64,
|
||||
)
|
||||
|
||||
|
||||
if t.TYPE_CHECKING:
|
||||
from ansible_collections.community.crypto.plugins.module_utils._acme.acme import ( # pragma: no cover
|
||||
ACMEClient,
|
||||
|
||||
@@ -28,7 +28,6 @@ from ansible_collections.community.crypto.plugins.module_utils._time import (
|
||||
get_now_datetime,
|
||||
)
|
||||
|
||||
|
||||
if t.TYPE_CHECKING:
|
||||
from ansible_collections.community.crypto.plugins.module_utils._acme.backends import ( # pragma: no cover
|
||||
CertificateInformation,
|
||||
@@ -165,10 +164,10 @@ def compute_cert_id(
|
||||
|
||||
|
||||
__all__ = (
|
||||
"nopad_b64",
|
||||
"compute_cert_id",
|
||||
"der_to_pem",
|
||||
"nopad_b64",
|
||||
"parse_retry_after",
|
||||
"pem_to_der",
|
||||
"process_links",
|
||||
"parse_retry_after",
|
||||
"compute_cert_id",
|
||||
)
|
||||
|
||||
@@ -11,7 +11,6 @@ import typing as t
|
||||
|
||||
from ansible.module_utils.basic import AnsibleModule
|
||||
|
||||
|
||||
_T = t.TypeVar("_T")
|
||||
|
||||
|
||||
|
||||
@@ -12,7 +12,6 @@ import re
|
||||
|
||||
from ansible.module_utils.common.text.converters import to_bytes
|
||||
|
||||
|
||||
# An ASN.1 serialized as a string in the OpenSSL format:
|
||||
# [modifier,]type[:value]
|
||||
#
|
||||
@@ -173,4 +172,4 @@ def pack_asn1(
|
||||
return bytes(b_asn1_data) + b_data
|
||||
|
||||
|
||||
__all__ = ("TagClass", "TagNumber", "serialize_asn1_string_as_der", "pack_asn1")
|
||||
__all__ = ("TagClass", "TagNumber", "pack_asn1", "serialize_asn1_string_as_der")
|
||||
|
||||
@@ -33,7 +33,6 @@ from __future__ import annotations
|
||||
|
||||
import typing as t
|
||||
|
||||
|
||||
# WARNING: this function no longer works with cryptography 35.0.0 and newer!
|
||||
# It must **ONLY** be used in compatibility code for older
|
||||
# cryptography versions!
|
||||
|
||||
@@ -11,7 +11,6 @@ from ansible_collections.community.crypto.plugins.module_utils._crypto._objects_
|
||||
OID_MAP,
|
||||
)
|
||||
|
||||
|
||||
OID_LOOKUP: dict[str, str] = {}
|
||||
NORMALIZE_NAMES: dict[str, str] = {}
|
||||
NORMALIZE_NAMES_SHORT: dict[str, str] = {}
|
||||
@@ -35,4 +34,4 @@ for alias, original in [("userID", "userId")]:
|
||||
OID_LOOKUP[alias] = OID_LOOKUP[original]
|
||||
|
||||
|
||||
__all__ = ("OID_LOOKUP", "NORMALIZE_NAMES", "NORMALIZE_NAMES_SHORT")
|
||||
__all__ = ("NORMALIZE_NAMES", "NORMALIZE_NAMES_SHORT", "OID_LOOKUP")
|
||||
|
||||
@@ -19,7 +19,6 @@
|
||||
|
||||
from __future__ import annotations
|
||||
|
||||
|
||||
OID_MAP = {
|
||||
"0": ("itu-t", "ITU-T", "ccitt"),
|
||||
"0.3.4401.5": ("ntt-ds",),
|
||||
|
||||
@@ -8,7 +8,6 @@
|
||||
|
||||
from __future__ import annotations
|
||||
|
||||
|
||||
try:
|
||||
import cryptography # noqa: F401, pylint: disable=unused-import
|
||||
|
||||
@@ -26,4 +25,4 @@ class OpenSSLBadPassphraseError(OpenSSLObjectError):
|
||||
pass
|
||||
|
||||
|
||||
__all__ = ("HAS_CRYPTOGRAPHY", "OpenSSLObjectError", "OpenSSLBadPassphraseError")
|
||||
__all__ = ("HAS_CRYPTOGRAPHY", "OpenSSLBadPassphraseError", "OpenSSLObjectError")
|
||||
|
||||
@@ -13,7 +13,6 @@ from ansible_collections.community.crypto.plugins.module_utils._version import (
|
||||
LooseVersion as _LooseVersion,
|
||||
)
|
||||
|
||||
|
||||
try:
|
||||
import cryptography
|
||||
from cryptography import x509
|
||||
@@ -32,7 +31,6 @@ from ansible_collections.community.crypto.plugins.module_utils._crypto.cryptogra
|
||||
cryptography_decode_name,
|
||||
)
|
||||
|
||||
|
||||
if t.TYPE_CHECKING:
|
||||
import datetime # pragma: no cover
|
||||
|
||||
@@ -200,11 +198,11 @@ __all__ = (
|
||||
"cryptography_decode_revoked_certificate",
|
||||
"cryptography_dump_revoked",
|
||||
"cryptography_get_signature_algorithm_oid_from_crl",
|
||||
"get_next_update",
|
||||
"get_last_update",
|
||||
"get_revocation_date",
|
||||
"get_invalidity_date",
|
||||
"set_next_update",
|
||||
"get_last_update",
|
||||
"get_next_update",
|
||||
"get_revocation_date",
|
||||
"set_last_update",
|
||||
"set_next_update",
|
||||
"set_revocation_date",
|
||||
)
|
||||
|
||||
@@ -28,7 +28,6 @@ from ansible_collections.community.crypto.plugins.module_utils._version import (
|
||||
LooseVersion,
|
||||
)
|
||||
|
||||
|
||||
try:
|
||||
import cryptography
|
||||
from cryptography import x509
|
||||
@@ -86,7 +85,6 @@ from ansible_collections.community.crypto.plugins.module_utils._crypto.basic imp
|
||||
OpenSSLObjectError,
|
||||
)
|
||||
|
||||
|
||||
if t.TYPE_CHECKING:
|
||||
import datetime # pragma: no cover
|
||||
|
||||
@@ -1108,27 +1106,27 @@ def is_potential_certificate_issuer_public_key(
|
||||
|
||||
__all__ = (
|
||||
"CRYPTOGRAPHY_TIMEZONE",
|
||||
"cryptography_compare_private_keys",
|
||||
"cryptography_compare_public_keys",
|
||||
"cryptography_decode_name",
|
||||
"cryptography_get_basic_constraints",
|
||||
"cryptography_get_extensions_from_cert",
|
||||
"cryptography_get_extensions_from_csr",
|
||||
"cryptography_get_name",
|
||||
"cryptography_key_needs_digest_for_signing",
|
||||
"cryptography_name_to_oid",
|
||||
"cryptography_oid_to_name",
|
||||
"cryptography_parse_relative_distinguished_name",
|
||||
"cryptography_get_name",
|
||||
"cryptography_decode_name",
|
||||
"cryptography_parse_key_usage_params",
|
||||
"cryptography_get_basic_constraints",
|
||||
"cryptography_key_needs_digest_for_signing",
|
||||
"cryptography_compare_public_keys",
|
||||
"cryptography_compare_private_keys",
|
||||
"parse_pkcs12",
|
||||
"cryptography_verify_signature",
|
||||
"cryptography_parse_relative_distinguished_name",
|
||||
"cryptography_verify_certificate_signature",
|
||||
"cryptography_verify_signature",
|
||||
"get_not_valid_after",
|
||||
"get_not_valid_before",
|
||||
"is_potential_certificate_issuer_private_key",
|
||||
"is_potential_certificate_issuer_public_key",
|
||||
"is_potential_certificate_private_key",
|
||||
"is_potential_certificate_public_key",
|
||||
"parse_pkcs12",
|
||||
"set_not_valid_after",
|
||||
"set_not_valid_before",
|
||||
"is_potential_certificate_private_key",
|
||||
"is_potential_certificate_issuer_private_key",
|
||||
"is_potential_certificate_public_key",
|
||||
"is_potential_certificate_issuer_public_key",
|
||||
)
|
||||
|
||||
@@ -160,11 +160,11 @@ def convert_bytes_to_int(data: bytes) -> int:
|
||||
|
||||
__all__ = (
|
||||
"binary_exp_mod",
|
||||
"simple_gcd",
|
||||
"quick_is_not_prime",
|
||||
"count_bytes",
|
||||
"count_bits",
|
||||
"convert_bytes_to_int",
|
||||
"convert_int_to_bytes",
|
||||
"convert_int_to_hex",
|
||||
"convert_bytes_to_int",
|
||||
"count_bits",
|
||||
"count_bytes",
|
||||
"quick_is_not_prime",
|
||||
"simple_gcd",
|
||||
)
|
||||
|
||||
@@ -36,7 +36,6 @@ from ansible_collections.community.crypto.plugins.module_utils._cryptography_dep
|
||||
assert_required_cryptography_version,
|
||||
)
|
||||
|
||||
|
||||
if t.TYPE_CHECKING:
|
||||
import datetime # pragma: no cover
|
||||
|
||||
@@ -416,8 +415,8 @@ def get_certificate_argument_spec() -> ArgumentSpec:
|
||||
|
||||
|
||||
__all__ = (
|
||||
"CertificateError",
|
||||
"CertificateBackend",
|
||||
"CertificateError",
|
||||
"CertificateProvider",
|
||||
"get_certificate_argument_spec",
|
||||
)
|
||||
|
||||
@@ -21,7 +21,6 @@ from ansible_collections.community.crypto.plugins.module_utils._crypto.module_ba
|
||||
CertificateProvider,
|
||||
)
|
||||
|
||||
|
||||
if t.TYPE_CHECKING:
|
||||
from ansible.module_utils.basic import AnsibleModule # pragma: no cover
|
||||
|
||||
|
||||
@@ -37,7 +37,6 @@ from ansible_collections.community.crypto.plugins.module_utils._time import (
|
||||
get_now_datetime,
|
||||
)
|
||||
|
||||
|
||||
if t.TYPE_CHECKING:
|
||||
import datetime # pragma: no cover
|
||||
|
||||
|
||||
@@ -40,7 +40,6 @@ from ansible_collections.community.crypto.plugins.module_utils._time import (
|
||||
get_relative_time_option,
|
||||
)
|
||||
|
||||
|
||||
if t.TYPE_CHECKING:
|
||||
import datetime # pragma: no cover
|
||||
|
||||
|
||||
@@ -34,7 +34,6 @@ from ansible_collections.community.crypto.plugins.module_utils._time import (
|
||||
get_relative_time_option,
|
||||
)
|
||||
|
||||
|
||||
if t.TYPE_CHECKING:
|
||||
import datetime # pragma: no cover
|
||||
|
||||
|
||||
@@ -26,7 +26,6 @@ from ansible_collections.community.crypto.plugins.module_utils._cryptography_dep
|
||||
assert_required_cryptography_version,
|
||||
)
|
||||
|
||||
|
||||
if t.TYPE_CHECKING:
|
||||
from ansible.module_utils.basic import AnsibleModule # pragma: no cover
|
||||
|
||||
|
||||
@@ -47,7 +47,6 @@ from ansible_collections.community.crypto.plugins.module_utils._cryptography_dep
|
||||
assert_required_cryptography_version,
|
||||
)
|
||||
|
||||
|
||||
if t.TYPE_CHECKING:
|
||||
from ansible.module_utils.basic import AnsibleModule # pragma: no cover
|
||||
from cryptography.hazmat.primitives.asymmetric.types import ( # pragma: no cover
|
||||
@@ -926,8 +925,8 @@ def get_csr_argument_spec() -> ArgumentSpec:
|
||||
|
||||
|
||||
__all__ = (
|
||||
"CertificateSigningRequestError",
|
||||
"CertificateSigningRequestBackend",
|
||||
"select_backend",
|
||||
"CertificateSigningRequestError",
|
||||
"get_csr_argument_spec",
|
||||
"select_backend",
|
||||
)
|
||||
|
||||
@@ -30,7 +30,6 @@ from ansible_collections.community.crypto.plugins.module_utils._cryptography_dep
|
||||
assert_required_cryptography_version,
|
||||
)
|
||||
|
||||
|
||||
if t.TYPE_CHECKING:
|
||||
from ansible.module_utils.basic import AnsibleModule # pragma: no cover
|
||||
from cryptography.hazmat.primitives.asymmetric.types import ( # pragma: no cover
|
||||
|
||||
@@ -36,7 +36,6 @@ from ansible_collections.community.crypto.plugins.module_utils._cryptography_dep
|
||||
assert_required_cryptography_version,
|
||||
)
|
||||
|
||||
|
||||
if t.TYPE_CHECKING:
|
||||
from ansible.module_utils.basic import AnsibleModule # pragma: no cover
|
||||
from cryptography.hazmat.primitives.asymmetric.types import ( # pragma: no cover
|
||||
@@ -655,8 +654,8 @@ def get_privatekey_argument_spec() -> ArgumentSpec:
|
||||
|
||||
|
||||
__all__ = (
|
||||
"PrivateKeyError",
|
||||
"PrivateKeyBackend",
|
||||
"select_backend",
|
||||
"PrivateKeyError",
|
||||
"get_privatekey_argument_spec",
|
||||
"select_backend",
|
||||
)
|
||||
|
||||
@@ -30,7 +30,6 @@ from ansible_collections.community.crypto.plugins.module_utils._cryptography_dep
|
||||
)
|
||||
from ansible_collections.community.crypto.plugins.module_utils._io import load_file
|
||||
|
||||
|
||||
if t.TYPE_CHECKING:
|
||||
from ansible.module_utils.basic import AnsibleModule # pragma: no cover
|
||||
from cryptography.hazmat.primitives.asymmetric.types import ( # pragma: no cover
|
||||
@@ -287,8 +286,8 @@ def get_privatekey_argument_spec() -> ArgumentSpec:
|
||||
|
||||
|
||||
__all__ = (
|
||||
"PrivateKeyError",
|
||||
"PrivateKeyConvertBackend",
|
||||
"select_backend",
|
||||
"PrivateKeyError",
|
||||
"get_privatekey_argument_spec",
|
||||
"select_backend",
|
||||
)
|
||||
|
||||
@@ -33,7 +33,6 @@ from ansible_collections.community.crypto.plugins.module_utils._cryptography_dep
|
||||
assert_required_cryptography_version,
|
||||
)
|
||||
|
||||
|
||||
if t.TYPE_CHECKING:
|
||||
from ansible.module_utils.basic import AnsibleModule # pragma: no cover
|
||||
from cryptography.hazmat.primitives.asymmetric.types import ( # pragma: no cover
|
||||
@@ -336,8 +335,8 @@ def select_backend(
|
||||
|
||||
__all__ = (
|
||||
"PrivateKeyConsistencyError",
|
||||
"PrivateKeyParseError",
|
||||
"PrivateKeyInfoRetrieval",
|
||||
"PrivateKeyParseError",
|
||||
"get_privatekey_info",
|
||||
"select_backend",
|
||||
)
|
||||
|
||||
@@ -21,7 +21,6 @@ from ansible_collections.community.crypto.plugins.module_utils._cryptography_dep
|
||||
assert_required_cryptography_version,
|
||||
)
|
||||
|
||||
|
||||
if t.TYPE_CHECKING:
|
||||
from ansible.module_utils.basic import AnsibleModule # pragma: no cover
|
||||
from cryptography.hazmat.primitives.asymmetric.types import ( # pragma: no cover
|
||||
@@ -178,8 +177,8 @@ def select_backend(
|
||||
|
||||
|
||||
__all__ = (
|
||||
"PublicKeyParseError",
|
||||
"PublicKeyInfoRetrieval",
|
||||
"PublicKeyParseError",
|
||||
"get_publickey_info",
|
||||
"select_backend",
|
||||
)
|
||||
|
||||
@@ -9,7 +9,6 @@ from __future__ import annotations
|
||||
|
||||
import typing as t
|
||||
|
||||
|
||||
PEM_START = "-----BEGIN "
|
||||
PEM_END_START = "-----END "
|
||||
PEM_END = "-----"
|
||||
@@ -128,14 +127,14 @@ def extract_pem(content: str, *, strict: bool = False) -> tuple[str, str]:
|
||||
|
||||
|
||||
__all__ = (
|
||||
"PEM_START",
|
||||
"PEM_END_START",
|
||||
"PEM_END",
|
||||
"PKCS8_PRIVATEKEY_NAMES",
|
||||
"PEM_END_START",
|
||||
"PEM_START",
|
||||
"PKCS1_PRIVATEKEY_SUFFIX",
|
||||
"PKCS8_PRIVATEKEY_NAMES",
|
||||
"extract_first_pem",
|
||||
"extract_pem",
|
||||
"identify_pem_format",
|
||||
"identify_private_key_format",
|
||||
"split_pem_list",
|
||||
"extract_first_pem",
|
||||
"extract_pem",
|
||||
)
|
||||
|
||||
@@ -23,7 +23,6 @@ from ansible_collections.community.crypto.plugins.module_utils._crypto.pem impor
|
||||
identify_pem_format,
|
||||
)
|
||||
|
||||
|
||||
try:
|
||||
from cryptography import x509
|
||||
from cryptography.exceptions import UnsupportedAlgorithm
|
||||
@@ -38,7 +37,6 @@ from ansible_collections.community.crypto.plugins.module_utils._crypto.basic imp
|
||||
OpenSSLObjectError,
|
||||
)
|
||||
|
||||
|
||||
if t.TYPE_CHECKING:
|
||||
from ansible.module_utils.basic import AnsibleModule # pragma: no cover
|
||||
from cryptography.hazmat.primitives.asymmetric.types import ( # pragma: no cover
|
||||
@@ -467,17 +465,17 @@ class OpenSSLObject(metaclass=abc.ABCMeta):
|
||||
|
||||
|
||||
__all__ = (
|
||||
"OpenSSLObject",
|
||||
"get_fingerprint",
|
||||
"get_fingerprint_of_bytes",
|
||||
"get_fingerprint_of_privatekey",
|
||||
"get_fingerprint",
|
||||
"load_privatekey",
|
||||
"load_certificate_privatekey",
|
||||
"load_certificate_issuer_privatekey",
|
||||
"load_publickey",
|
||||
"load_certificate",
|
||||
"load_certificate_issuer_privatekey",
|
||||
"load_certificate_privatekey",
|
||||
"load_certificate_request",
|
||||
"load_privatekey",
|
||||
"load_publickey",
|
||||
"parse_name_field",
|
||||
"parse_ordered_name_field",
|
||||
"select_message_digest",
|
||||
"OpenSSLObject",
|
||||
)
|
||||
|
||||
@@ -22,7 +22,6 @@ from ansible_collections.community.crypto.plugins.module_utils._version import (
|
||||
LooseVersion,
|
||||
)
|
||||
|
||||
|
||||
if t.TYPE_CHECKING:
|
||||
from ansible.module_utils.basic import AnsibleModule # pragma: no cover
|
||||
|
||||
|
||||
@@ -82,7 +82,7 @@ def get_fingerprint_from_bytes(*, gpg_runner: GPGRunner, content: bytes) -> str:
|
||||
__all__ = (
|
||||
"GPGError",
|
||||
"GPGRunner",
|
||||
"get_fingerprint_from_stdout",
|
||||
"get_fingerprint_from_file",
|
||||
"get_fingerprint_from_bytes",
|
||||
"get_fingerprint_from_file",
|
||||
"get_fingerprint_from_stdout",
|
||||
)
|
||||
|
||||
@@ -12,7 +12,6 @@ import os
|
||||
import tempfile
|
||||
import typing as t
|
||||
|
||||
|
||||
if t.TYPE_CHECKING:
|
||||
from ansible.module_utils.basic import AnsibleModule # pragma: no cover
|
||||
|
||||
|
||||
@@ -18,7 +18,6 @@ from ansible_collections.community.crypto.plugins.module_utils._openssh.utils im
|
||||
parse_openssh_version,
|
||||
)
|
||||
|
||||
|
||||
if t.TYPE_CHECKING:
|
||||
from ansible.module_utils.basic import AnsibleModule # pragma: no cover
|
||||
|
||||
@@ -485,11 +484,11 @@ def parse_private_key_format(
|
||||
|
||||
|
||||
__all__ = (
|
||||
"restore_on_failure",
|
||||
"safe_atomic_move",
|
||||
"OpensshModule",
|
||||
"KeygenCommand",
|
||||
"OpensshModule",
|
||||
"PrivateKey",
|
||||
"PublicKey",
|
||||
"parse_private_key_format",
|
||||
"restore_on_failure",
|
||||
"safe_atomic_move",
|
||||
)
|
||||
|
||||
@@ -43,7 +43,6 @@ from ansible_collections.community.crypto.plugins.module_utils._version import (
|
||||
LooseVersion,
|
||||
)
|
||||
|
||||
|
||||
if t.TYPE_CHECKING:
|
||||
from ansible.module_utils.basic import AnsibleModule # pragma: no cover
|
||||
|
||||
|
||||
@@ -30,7 +30,6 @@ from ansible_collections.community.crypto.plugins.module_utils._time import (
|
||||
convert_relative_to_datetime,
|
||||
)
|
||||
|
||||
|
||||
if t.TYPE_CHECKING:
|
||||
from ansible_collections.community.crypto.plugins.module_utils._openssh.cryptography import ( # pragma: no cover
|
||||
KeyType,
|
||||
@@ -840,14 +839,14 @@ def parse_option_list(
|
||||
|
||||
|
||||
__all__ = (
|
||||
"OpensshCertificateTimeParameters",
|
||||
"OpensshCertificateOption",
|
||||
"OpensshCertificate",
|
||||
"OpensshCertificateInfo",
|
||||
"OpensshRSACertificateInfo",
|
||||
"OpensshCertificateOption",
|
||||
"OpensshCertificateTimeParameters",
|
||||
"OpensshDSACertificateInfo",
|
||||
"OpensshECDSACertificateInfo",
|
||||
"OpensshED25519CertificateInfo",
|
||||
"OpensshCertificate",
|
||||
"OpensshRSACertificateInfo",
|
||||
"apply_directives",
|
||||
"default_options",
|
||||
"fingerprint",
|
||||
|
||||
@@ -13,7 +13,6 @@ from base64 import b64decode, b64encode
|
||||
from getpass import getuser
|
||||
from socket import gethostname
|
||||
|
||||
|
||||
try:
|
||||
from cryptography import __version__ as CRYPTOGRAPHY_VERSION
|
||||
from cryptography.exceptions import InvalidSignature, UnsupportedAlgorithm
|
||||
@@ -73,7 +72,6 @@ from ansible_collections.community.crypto.plugins.module_utils._crypto.cryptogra
|
||||
is_potential_certificate_issuer_private_key,
|
||||
)
|
||||
|
||||
|
||||
if t.TYPE_CHECKING:
|
||||
KeyFormat = t.Literal["SSH", "PKCS8", "PKCS1"] # pragma: no cover
|
||||
KeySerializationFormat = t.Literal["PEM", "DER", "SSH"] # pragma: no cover
|
||||
@@ -815,27 +813,27 @@ def calculate_fingerprint(openssh_publickey: bytes) -> str:
|
||||
|
||||
|
||||
__all__ = (
|
||||
"HAS_OPENSSH_SUPPORT",
|
||||
"CRYPTOGRAPHY_VERSION",
|
||||
"OpenSSHError",
|
||||
"HAS_OPENSSH_SUPPORT",
|
||||
"AsymmetricKeypair",
|
||||
"InvalidAlgorithmError",
|
||||
"InvalidCommentError",
|
||||
"InvalidDataError",
|
||||
"InvalidPrivateKeyFileError",
|
||||
"InvalidPublicKeyFileError",
|
||||
"InvalidKeyFormatError",
|
||||
"InvalidKeySizeError",
|
||||
"InvalidKeyTypeError",
|
||||
"InvalidPassphraseError",
|
||||
"InvalidPrivateKeyFileError",
|
||||
"InvalidPublicKeyFileError",
|
||||
"InvalidSignatureError",
|
||||
"AsymmetricKeypair",
|
||||
"OpenSSHError",
|
||||
"OpensshKeypair",
|
||||
"calculate_fingerprint",
|
||||
"compare_encryption_algorithms",
|
||||
"compare_publickeys",
|
||||
"extract_comment",
|
||||
"get_encryption_algorithm",
|
||||
"load_privatekey",
|
||||
"load_publickey",
|
||||
"compare_publickeys",
|
||||
"compare_encryption_algorithms",
|
||||
"get_encryption_algorithm",
|
||||
"validate_comment",
|
||||
"extract_comment",
|
||||
"calculate_fingerprint",
|
||||
)
|
||||
|
||||
@@ -14,7 +14,6 @@ import typing as t
|
||||
from contextlib import contextmanager
|
||||
from struct import Struct
|
||||
|
||||
|
||||
# Protocol References
|
||||
# -------------------
|
||||
# https://datatracker.ietf.org/doc/html/rfc4251
|
||||
@@ -351,10 +350,10 @@ class _OpensshWriter:
|
||||
|
||||
|
||||
__all__ = (
|
||||
"OpensshParser",
|
||||
"any_in",
|
||||
"file_mode",
|
||||
"parse_openssh_version",
|
||||
"secure_open",
|
||||
"secure_write",
|
||||
"OpensshParser",
|
||||
)
|
||||
|
||||
@@ -16,7 +16,6 @@ from ansible_collections.community.crypto.plugins.module_utils._crypto.basic imp
|
||||
OpenSSLObjectError,
|
||||
)
|
||||
|
||||
|
||||
UTC = datetime.timezone.utc
|
||||
|
||||
|
||||
@@ -160,12 +159,12 @@ def get_relative_time_option(
|
||||
|
||||
|
||||
__all__ = (
|
||||
"get_now_datetime",
|
||||
"ensure_utc_timezone",
|
||||
"remove_timezone",
|
||||
"add_or_remove_timezone",
|
||||
"get_epoch_seconds",
|
||||
"from_epoch_seconds",
|
||||
"convert_relative_to_datetime",
|
||||
"ensure_utc_timezone",
|
||||
"from_epoch_seconds",
|
||||
"get_epoch_seconds",
|
||||
"get_now_datetime",
|
||||
"get_relative_time_option",
|
||||
"remove_timezone",
|
||||
)
|
||||
|
||||
@@ -11,5 +11,4 @@ from __future__ import annotations
|
||||
|
||||
from ansible.module_utils.compat.version import LooseVersion
|
||||
|
||||
|
||||
__all__ = ("LooseVersion",)
|
||||
|
||||
@@ -5,7 +5,6 @@
|
||||
|
||||
from __future__ import annotations
|
||||
|
||||
|
||||
DOCUMENTATION = r"""
|
||||
module: acme_account
|
||||
author: "Felix Fontein (@felixfontein)"
|
||||
|
||||
@@ -5,7 +5,6 @@
|
||||
|
||||
from __future__ import annotations
|
||||
|
||||
|
||||
DOCUMENTATION = r"""
|
||||
module: acme_account_info
|
||||
author: "Felix Fontein (@felixfontein)"
|
||||
@@ -222,7 +221,6 @@ from ansible_collections.community.crypto.plugins.module_utils._acme.utils impor
|
||||
process_links,
|
||||
)
|
||||
|
||||
|
||||
if t.TYPE_CHECKING:
|
||||
from ansible.module_utils.basic import AnsibleModule # pragma: no cover
|
||||
|
||||
|
||||
@@ -5,7 +5,6 @@
|
||||
|
||||
from __future__ import annotations
|
||||
|
||||
|
||||
DOCUMENTATION = r"""
|
||||
module: acme_ari_info
|
||||
author: "Felix Fontein (@felixfontein)"
|
||||
|
||||
@@ -5,7 +5,6 @@
|
||||
|
||||
from __future__ import annotations
|
||||
|
||||
|
||||
DOCUMENTATION = r"""
|
||||
module: acme_certificate
|
||||
author: "Michael Gruener (@mgruener)"
|
||||
@@ -596,7 +595,6 @@ from ansible_collections.community.crypto.plugins.module_utils._acme.utils impor
|
||||
pem_to_der,
|
||||
)
|
||||
|
||||
|
||||
if t.TYPE_CHECKING:
|
||||
from ansible.module_utils.basic import AnsibleModule # pragma: no cover
|
||||
|
||||
|
||||
@@ -5,7 +5,6 @@
|
||||
|
||||
from __future__ import annotations
|
||||
|
||||
|
||||
DOCUMENTATION = r"""
|
||||
module: acme_certificate_deactivate_authz
|
||||
author: "Felix Fontein (@felixfontein)"
|
||||
|
||||
@@ -5,7 +5,6 @@
|
||||
|
||||
from __future__ import annotations
|
||||
|
||||
|
||||
DOCUMENTATION = """
|
||||
module: acme_certificate_order_create
|
||||
author: Felix Fontein (@felixfontein)
|
||||
|
||||
@@ -5,7 +5,6 @@
|
||||
|
||||
from __future__ import annotations
|
||||
|
||||
|
||||
DOCUMENTATION = """
|
||||
module: acme_certificate_order_finalize
|
||||
author: Felix Fontein (@felixfontein)
|
||||
@@ -325,7 +324,6 @@ from ansible_collections.community.crypto.plugins.module_utils._acme.errors impo
|
||||
ModuleFailException,
|
||||
)
|
||||
|
||||
|
||||
if t.TYPE_CHECKING:
|
||||
from ansible_collections.community.crypto.plugins.module_utils._acme.certificates import ( # pragma: no cover
|
||||
CertificateChain,
|
||||
|
||||
@@ -5,7 +5,6 @@
|
||||
|
||||
from __future__ import annotations
|
||||
|
||||
|
||||
DOCUMENTATION = """
|
||||
module: acme_certificate_order_info
|
||||
author: Felix Fontein (@felixfontein)
|
||||
|
||||
@@ -5,7 +5,6 @@
|
||||
|
||||
from __future__ import annotations
|
||||
|
||||
|
||||
DOCUMENTATION = """
|
||||
module: acme_certificate_order_validate
|
||||
author: Felix Fontein (@felixfontein)
|
||||
@@ -237,7 +236,6 @@ from ansible_collections.community.crypto.plugins.module_utils._acme.errors impo
|
||||
ModuleFailException,
|
||||
)
|
||||
|
||||
|
||||
if t.TYPE_CHECKING:
|
||||
from ansible_collections.community.crypto.plugins.module_utils._acme.challenges import ( # pragma: no cover
|
||||
Authorization,
|
||||
|
||||
@@ -5,7 +5,6 @@
|
||||
|
||||
from __future__ import annotations
|
||||
|
||||
|
||||
DOCUMENTATION = r"""
|
||||
module: acme_certificate_renewal_info
|
||||
author: "Felix Fontein (@felixfontein)"
|
||||
|
||||
@@ -5,7 +5,6 @@
|
||||
|
||||
from __future__ import annotations
|
||||
|
||||
|
||||
DOCUMENTATION = r"""
|
||||
module: acme_certificate_revoke
|
||||
author: "Felix Fontein (@felixfontein)"
|
||||
|
||||
@@ -5,7 +5,6 @@
|
||||
|
||||
from __future__ import annotations
|
||||
|
||||
|
||||
DOCUMENTATION = r"""
|
||||
module: acme_challenge_cert_helper
|
||||
author: "Felix Fontein (@felixfontein)"
|
||||
@@ -173,7 +172,6 @@ from ansible_collections.community.crypto.plugins.module_utils._time import (
|
||||
get_now_datetime,
|
||||
)
|
||||
|
||||
|
||||
try:
|
||||
import cryptography
|
||||
import cryptography.hazmat.backends
|
||||
|
||||
@@ -5,7 +5,6 @@
|
||||
|
||||
from __future__ import annotations
|
||||
|
||||
|
||||
DOCUMENTATION = r"""
|
||||
module: acme_inspect
|
||||
author: "Felix Fontein (@felixfontein)"
|
||||
|
||||
@@ -5,7 +5,6 @@
|
||||
|
||||
from __future__ import annotations
|
||||
|
||||
|
||||
DOCUMENTATION = r"""
|
||||
module: certificate_complete_chain
|
||||
author: "Felix Fontein (@felixfontein)"
|
||||
@@ -134,7 +133,6 @@ from ansible_collections.community.crypto.plugins.module_utils._cryptography_dep
|
||||
assert_required_cryptography_version,
|
||||
)
|
||||
|
||||
|
||||
try:
|
||||
import cryptography
|
||||
import cryptography.exceptions
|
||||
|
||||
@@ -5,7 +5,6 @@
|
||||
|
||||
from __future__ import annotations
|
||||
|
||||
|
||||
DOCUMENTATION = r"""
|
||||
module: crypto_info
|
||||
author: "Felix Fontein (@felixfontein)"
|
||||
@@ -156,7 +155,6 @@ import typing as t
|
||||
|
||||
from ansible.module_utils.basic import AnsibleModule
|
||||
|
||||
|
||||
CRYPTOGRAPHY_VERSION: str | None
|
||||
CRYPTOGRAPHY_IMP_ERR: str | None
|
||||
try:
|
||||
|
||||
@@ -5,7 +5,6 @@
|
||||
|
||||
from __future__ import annotations
|
||||
|
||||
|
||||
DOCUMENTATION = r"""
|
||||
module: get_certificate
|
||||
author: "John Westcott IV (@john-westcott-iv)"
|
||||
@@ -296,7 +295,6 @@ from ansible_collections.community.crypto.plugins.module_utils._time import (
|
||||
get_now_datetime,
|
||||
)
|
||||
|
||||
|
||||
MINIMAL_CRYPTOGRAPHY_VERSION = COLLECTION_MINIMUM_CRYPTOGRAPHY_VERSION
|
||||
|
||||
try:
|
||||
|
||||
@@ -5,7 +5,6 @@
|
||||
|
||||
from __future__ import annotations
|
||||
|
||||
|
||||
DOCUMENTATION = r"""
|
||||
module: luks_device
|
||||
|
||||
@@ -486,7 +485,6 @@ from base64 import b64decode
|
||||
from ansible.module_utils.basic import AnsibleModule
|
||||
from ansible.module_utils.common.text.converters import to_bytes, to_text
|
||||
|
||||
|
||||
# used to get <luks-name> out of lsblk output in format 'crypt <luks-name>'
|
||||
# regex takes care of any possible blank characters
|
||||
LUKS_NAME_REGEX = re.compile(r"^crypt\s+([^\s]*)\s*$")
|
||||
|
||||
@@ -5,7 +5,6 @@
|
||||
|
||||
from __future__ import annotations
|
||||
|
||||
|
||||
DOCUMENTATION = r"""
|
||||
module: openssh_cert
|
||||
author: "David Kainz (@lolcube)"
|
||||
|
||||
@@ -5,7 +5,6 @@
|
||||
|
||||
from __future__ import annotations
|
||||
|
||||
|
||||
DOCUMENTATION = r"""
|
||||
module: openssh_keypair
|
||||
author: "David Kainz (@lolcube)"
|
||||
|
||||
@@ -6,7 +6,6 @@
|
||||
|
||||
from __future__ import annotations
|
||||
|
||||
|
||||
DOCUMENTATION = r"""
|
||||
module: openssl_csr
|
||||
short_description: Generate OpenSSL Certificate Signing Request (CSR)
|
||||
@@ -256,7 +255,6 @@ from ansible_collections.community.crypto.plugins.module_utils._io import (
|
||||
write_file,
|
||||
)
|
||||
|
||||
|
||||
if t.TYPE_CHECKING:
|
||||
from ansible.module_utils.basic import AnsibleModule # pragma: no cover
|
||||
|
||||
|
||||
@@ -6,7 +6,6 @@
|
||||
|
||||
from __future__ import annotations
|
||||
|
||||
|
||||
DOCUMENTATION = r"""
|
||||
module: openssl_csr_info
|
||||
short_description: Provide information of OpenSSL Certificate Signing Requests (CSR)
|
||||
|
||||
@@ -6,7 +6,6 @@
|
||||
|
||||
from __future__ import annotations
|
||||
|
||||
|
||||
DOCUMENTATION = r"""
|
||||
module: openssl_csr_pipe
|
||||
short_description: Generate OpenSSL Certificate Signing Request (CSR)
|
||||
@@ -137,7 +136,6 @@ from ansible_collections.community.crypto.plugins.module_utils._crypto.module_ba
|
||||
select_backend,
|
||||
)
|
||||
|
||||
|
||||
if t.TYPE_CHECKING:
|
||||
from ansible.module_utils.basic import AnsibleModule # pragma: no cover
|
||||
|
||||
|
||||
@@ -5,7 +5,6 @@
|
||||
|
||||
from __future__ import annotations
|
||||
|
||||
|
||||
DOCUMENTATION = r"""
|
||||
module: openssl_dhparam
|
||||
short_description: Generate OpenSSL Diffie-Hellman Parameters
|
||||
@@ -152,7 +151,6 @@ from ansible_collections.community.crypto.plugins.module_utils._version import (
|
||||
LooseVersion,
|
||||
)
|
||||
|
||||
|
||||
MINIMAL_CRYPTOGRAPHY_VERSION = COLLECTION_MINIMUM_CRYPTOGRAPHY_VERSION
|
||||
|
||||
try:
|
||||
|
||||
@@ -5,7 +5,6 @@
|
||||
|
||||
from __future__ import annotations
|
||||
|
||||
|
||||
DOCUMENTATION = r"""
|
||||
module: openssl_pkcs12
|
||||
author:
|
||||
@@ -307,7 +306,6 @@ from ansible_collections.community.crypto.plugins.module_utils._io import (
|
||||
write_file,
|
||||
)
|
||||
|
||||
|
||||
MINIMAL_CRYPTOGRAPHY_VERSION = COLLECTION_MINIMUM_CRYPTOGRAPHY_VERSION
|
||||
|
||||
try:
|
||||
|
||||
@@ -5,7 +5,6 @@
|
||||
|
||||
from __future__ import annotations
|
||||
|
||||
|
||||
DOCUMENTATION = r"""
|
||||
module: openssl_privatekey
|
||||
short_description: Generate OpenSSL private keys
|
||||
@@ -172,7 +171,6 @@ from ansible_collections.community.crypto.plugins.module_utils._io import (
|
||||
write_file,
|
||||
)
|
||||
|
||||
|
||||
if t.TYPE_CHECKING:
|
||||
from ansible.module_utils.basic import AnsibleModule # pragma: no cover
|
||||
|
||||
|
||||
@@ -5,7 +5,6 @@
|
||||
|
||||
from __future__ import annotations
|
||||
|
||||
|
||||
DOCUMENTATION = r"""
|
||||
module: openssl_privatekey_convert
|
||||
short_description: Convert OpenSSL private keys
|
||||
@@ -77,7 +76,6 @@ from ansible_collections.community.crypto.plugins.module_utils._io import (
|
||||
write_file,
|
||||
)
|
||||
|
||||
|
||||
if t.TYPE_CHECKING:
|
||||
from ansible.module_utils.basic import AnsibleModule # pragma: no cover
|
||||
|
||||
|
||||
@@ -6,7 +6,6 @@
|
||||
|
||||
from __future__ import annotations
|
||||
|
||||
|
||||
DOCUMENTATION = r"""
|
||||
module: openssl_privatekey_info
|
||||
short_description: Provide information for OpenSSL private keys
|
||||
|
||||
@@ -5,7 +5,6 @@
|
||||
|
||||
from __future__ import annotations
|
||||
|
||||
|
||||
DOCUMENTATION = r"""
|
||||
module: openssl_privatekey_pipe
|
||||
short_description: Generate OpenSSL private keys without disk access
|
||||
|
||||
@@ -5,7 +5,6 @@
|
||||
|
||||
from __future__ import annotations
|
||||
|
||||
|
||||
DOCUMENTATION = r"""
|
||||
module: openssl_publickey
|
||||
short_description: Generate an OpenSSL public key from its private key
|
||||
@@ -212,7 +211,6 @@ from ansible_collections.community.crypto.plugins.module_utils._io import (
|
||||
write_file,
|
||||
)
|
||||
|
||||
|
||||
MINIMAL_CRYPTOGRAPHY_VERSION = COLLECTION_MINIMUM_CRYPTOGRAPHY_VERSION
|
||||
|
||||
try:
|
||||
|
||||
@@ -5,7 +5,6 @@
|
||||
|
||||
from __future__ import annotations
|
||||
|
||||
|
||||
DOCUMENTATION = r"""
|
||||
module: openssl_publickey_info
|
||||
short_description: Provide information for OpenSSL public keys
|
||||
|
||||
@@ -5,7 +5,6 @@
|
||||
|
||||
from __future__ import annotations
|
||||
|
||||
|
||||
DOCUMENTATION = r"""
|
||||
module: openssl_signature
|
||||
version_added: 1.1.0
|
||||
@@ -109,7 +108,6 @@ from ansible_collections.community.crypto.plugins.module_utils._version import (
|
||||
LooseVersion,
|
||||
)
|
||||
|
||||
|
||||
MINIMAL_CRYPTOGRAPHY_VERSION = COLLECTION_MINIMUM_CRYPTOGRAPHY_VERSION
|
||||
|
||||
try:
|
||||
|
||||
@@ -5,7 +5,6 @@
|
||||
|
||||
from __future__ import annotations
|
||||
|
||||
|
||||
DOCUMENTATION = r"""
|
||||
module: openssl_signature_info
|
||||
version_added: 1.1.0
|
||||
@@ -98,7 +97,6 @@ from ansible_collections.community.crypto.plugins.module_utils._version import (
|
||||
LooseVersion,
|
||||
)
|
||||
|
||||
|
||||
MINIMAL_CRYPTOGRAPHY_VERSION = COLLECTION_MINIMUM_CRYPTOGRAPHY_VERSION
|
||||
|
||||
try:
|
||||
|
||||
@@ -6,7 +6,6 @@
|
||||
|
||||
from __future__ import annotations
|
||||
|
||||
|
||||
DOCUMENTATION = r"""
|
||||
module: x509_certificate
|
||||
short_description: Generate and/or check OpenSSL certificates
|
||||
@@ -236,7 +235,6 @@ from ansible_collections.community.crypto.plugins.module_utils._io import (
|
||||
write_file,
|
||||
)
|
||||
|
||||
|
||||
if t.TYPE_CHECKING:
|
||||
from ansible.module_utils.basic import AnsibleModule # pragma: no cover
|
||||
|
||||
|
||||
@@ -5,7 +5,6 @@
|
||||
|
||||
from __future__ import annotations
|
||||
|
||||
|
||||
DOCUMENTATION = r"""
|
||||
module: x509_certificate_convert
|
||||
short_description: Convert X.509 certificates
|
||||
@@ -134,7 +133,6 @@ from ansible_collections.community.crypto.plugins.module_utils._io import (
|
||||
write_file,
|
||||
)
|
||||
|
||||
|
||||
MINIMAL_CRYPTOGRAPHY_VERSION = COLLECTION_MINIMUM_CRYPTOGRAPHY_VERSION
|
||||
|
||||
try:
|
||||
|
||||
@@ -6,7 +6,6 @@
|
||||
|
||||
from __future__ import annotations
|
||||
|
||||
|
||||
DOCUMENTATION = r"""
|
||||
module: x509_certificate_info
|
||||
short_description: Provide information of OpenSSL X.509 certificates
|
||||
|
||||
@@ -7,7 +7,6 @@
|
||||
|
||||
from __future__ import annotations
|
||||
|
||||
|
||||
DOCUMENTATION = r"""
|
||||
module: x509_certificate_pipe
|
||||
short_description: Generate and/or check OpenSSL certificates
|
||||
@@ -134,7 +133,6 @@ from ansible_collections.community.crypto.plugins.module_utils._crypto.module_ba
|
||||
add_selfsigned_provider_to_argument_spec,
|
||||
)
|
||||
|
||||
|
||||
if t.TYPE_CHECKING:
|
||||
from ansible.module_utils.basic import AnsibleModule # pragma: no cover
|
||||
|
||||
|
||||
@@ -5,7 +5,6 @@
|
||||
|
||||
from __future__ import annotations
|
||||
|
||||
|
||||
DOCUMENTATION = r"""
|
||||
module: x509_crl
|
||||
version_added: '1.0.0'
|
||||
@@ -482,7 +481,6 @@ from ansible_collections.community.crypto.plugins.module_utils._time import (
|
||||
get_relative_time_option,
|
||||
)
|
||||
|
||||
|
||||
MINIMAL_CRYPTOGRAPHY_VERSION = COLLECTION_MINIMUM_CRYPTOGRAPHY_VERSION
|
||||
|
||||
try:
|
||||
|
||||
@@ -5,7 +5,6 @@
|
||||
|
||||
from __future__ import annotations
|
||||
|
||||
|
||||
DOCUMENTATION = r"""
|
||||
module: x509_crl_info
|
||||
version_added: '1.0.0'
|
||||
|
||||
@@ -26,7 +26,6 @@ from ansible.module_utils.common.arg_spec import ArgumentSpecValidator
|
||||
from ansible.module_utils.errors import UnsupportedError
|
||||
from ansible.plugins.action import ActionBase
|
||||
|
||||
|
||||
if t.TYPE_CHECKING:
|
||||
from ansible_collections.community.crypto.plugins.module_utils._argspec import (
|
||||
ArgumentSpec,
|
||||
@@ -223,4 +222,4 @@ class ActionModuleBase(ActionBase, metaclass=abc.ABCMeta):
|
||||
return result
|
||||
|
||||
|
||||
__all__ = ("AnsibleActionModule", "ActionModuleBase")
|
||||
__all__ = ("ActionModuleBase", "AnsibleActionModule")
|
||||
|
||||
@@ -14,7 +14,6 @@ import typing as t
|
||||
from ansible.errors import AnsibleFilterError
|
||||
from ansible.utils.display import Display
|
||||
|
||||
|
||||
_display = Display()
|
||||
|
||||
|
||||
|
||||
Reference in New Issue
Block a user