mirror of
https://github.com/ansible-collections/community.general.git
synced 2026-02-04 07:51:50 +00:00
Reformat everything.
This commit is contained in:
parent
3f2213791a
commit
340ff8586d
1008 changed files with 61301 additions and 58309 deletions
|
|
@ -213,48 +213,33 @@ from ansible.module_utils.basic import AnsibleModule
|
|||
|
||||
|
||||
def _get_keystore_type_keytool_parameters(keystore_type):
|
||||
''' Check that custom keystore is presented in parameters '''
|
||||
"""Check that custom keystore is presented in parameters"""
|
||||
if keystore_type:
|
||||
return ["-storetype", keystore_type]
|
||||
return []
|
||||
|
||||
|
||||
def _check_cert_present(module, executable, keystore_path, keystore_pass, alias, keystore_type):
|
||||
''' Check if certificate with alias is present in keystore
|
||||
located at keystore_path '''
|
||||
test_cmd = [
|
||||
executable,
|
||||
"-list",
|
||||
"-keystore",
|
||||
keystore_path,
|
||||
"-alias",
|
||||
alias,
|
||||
"-rfc"
|
||||
]
|
||||
"""Check if certificate with alias is present in keystore
|
||||
located at keystore_path"""
|
||||
test_cmd = [executable, "-list", "-keystore", keystore_path, "-alias", alias, "-rfc"]
|
||||
test_cmd += _get_keystore_type_keytool_parameters(keystore_type)
|
||||
|
||||
(check_rc, stdout, dummy) = module.run_command(test_cmd, data=keystore_pass, check_rc=False)
|
||||
if check_rc == 0:
|
||||
return (True, stdout)
|
||||
return (False, '')
|
||||
return (False, "")
|
||||
|
||||
|
||||
def _get_certificate_from_url(module, executable, url, port, pem_certificate_output):
|
||||
remote_cert_pem_chain = _download_cert_url(module, executable, url, port)
|
||||
with open(pem_certificate_output, 'w') as f:
|
||||
with open(pem_certificate_output, "w") as f:
|
||||
f.write(remote_cert_pem_chain)
|
||||
|
||||
|
||||
def _get_first_certificate_from_x509_file(module, pem_certificate_file, pem_certificate_output, openssl_bin):
|
||||
""" Read a X509 certificate chain file and output the first certificate in the list """
|
||||
extract_cmd = [
|
||||
openssl_bin,
|
||||
"x509",
|
||||
"-in",
|
||||
pem_certificate_file,
|
||||
"-out",
|
||||
pem_certificate_output
|
||||
]
|
||||
"""Read a X509 certificate chain file and output the first certificate in the list"""
|
||||
extract_cmd = [openssl_bin, "x509", "-in", pem_certificate_file, "-out", pem_certificate_output]
|
||||
(extract_rc, dummy, extract_stderr) = module.run_command(extract_cmd, check_rc=False)
|
||||
|
||||
if extract_rc != 0:
|
||||
|
|
@ -264,76 +249,69 @@ def _get_first_certificate_from_x509_file(module, pem_certificate_file, pem_cert
|
|||
|
||||
if extract_rc != 0:
|
||||
# this time it is a real failure
|
||||
module.fail_json(msg=f"Internal module failure, cannot extract certificate, error: {extract_stderr}",
|
||||
rc=extract_rc, cmd=extract_cmd)
|
||||
module.fail_json(
|
||||
msg=f"Internal module failure, cannot extract certificate, error: {extract_stderr}",
|
||||
rc=extract_rc,
|
||||
cmd=extract_cmd,
|
||||
)
|
||||
|
||||
return extract_rc
|
||||
|
||||
|
||||
def _get_digest_from_x509_file(module, pem_certificate_file, openssl_bin):
|
||||
""" Read a X509 certificate file and output sha256 digest using openssl """
|
||||
"""Read a X509 certificate file and output sha256 digest using openssl"""
|
||||
# cleanup file before to compare
|
||||
(dummy, tmp_certificate) = tempfile.mkstemp()
|
||||
module.add_cleanup_file(tmp_certificate)
|
||||
_get_first_certificate_from_x509_file(module, pem_certificate_file, tmp_certificate, openssl_bin)
|
||||
dgst_cmd = [
|
||||
openssl_bin,
|
||||
"dgst",
|
||||
"-r",
|
||||
"-sha256",
|
||||
tmp_certificate
|
||||
]
|
||||
dgst_cmd = [openssl_bin, "dgst", "-r", "-sha256", tmp_certificate]
|
||||
(dgst_rc, dgst_stdout, dgst_stderr) = module.run_command(dgst_cmd, check_rc=False)
|
||||
|
||||
if dgst_rc != 0:
|
||||
module.fail_json(msg=f"Internal module failure, cannot compute digest for certificate, error: {dgst_stderr}",
|
||||
rc=dgst_rc, cmd=dgst_cmd)
|
||||
module.fail_json(
|
||||
msg=f"Internal module failure, cannot compute digest for certificate, error: {dgst_stderr}",
|
||||
rc=dgst_rc,
|
||||
cmd=dgst_cmd,
|
||||
)
|
||||
|
||||
return dgst_stdout.split(' ')[0]
|
||||
return dgst_stdout.split(" ")[0]
|
||||
|
||||
|
||||
def _export_public_cert_from_pkcs12(module, executable, pkcs_file, alias, password, dest):
|
||||
""" Runs keytools to extract the public cert from a PKCS12 archive and write it to a file. """
|
||||
export_cmd = [
|
||||
executable,
|
||||
"-list",
|
||||
"-noprompt",
|
||||
"-keystore",
|
||||
pkcs_file,
|
||||
"-storetype",
|
||||
"pkcs12",
|
||||
"-rfc"
|
||||
]
|
||||
"""Runs keytools to extract the public cert from a PKCS12 archive and write it to a file."""
|
||||
export_cmd = [executable, "-list", "-noprompt", "-keystore", pkcs_file, "-storetype", "pkcs12", "-rfc"]
|
||||
# Append optional alias
|
||||
if alias:
|
||||
export_cmd.extend(["-alias", alias])
|
||||
(export_rc, export_stdout, export_err) = module.run_command(export_cmd, data=password, check_rc=False)
|
||||
|
||||
if export_rc != 0:
|
||||
module.fail_json(msg=f"Internal module failure, cannot extract public certificate from PKCS12, message: {export_stdout}",
|
||||
stderr=export_err,
|
||||
rc=export_rc)
|
||||
module.fail_json(
|
||||
msg=f"Internal module failure, cannot extract public certificate from PKCS12, message: {export_stdout}",
|
||||
stderr=export_err,
|
||||
rc=export_rc,
|
||||
)
|
||||
|
||||
with open(dest, 'w') as f:
|
||||
with open(dest, "w") as f:
|
||||
f.write(export_stdout)
|
||||
|
||||
|
||||
def get_proxy_settings(scheme='https'):
|
||||
""" Returns a tuple containing (proxy_host, proxy_port). (False, False) if no proxy is found """
|
||||
proxy_url = getproxies().get(scheme, '')
|
||||
def get_proxy_settings(scheme="https"):
|
||||
"""Returns a tuple containing (proxy_host, proxy_port). (False, False) if no proxy is found"""
|
||||
proxy_url = getproxies().get(scheme, "")
|
||||
if not proxy_url:
|
||||
return (False, False)
|
||||
else:
|
||||
parsed_url = urlparse(proxy_url)
|
||||
if parsed_url.scheme:
|
||||
(proxy_host, proxy_port) = parsed_url.netloc.split(':')
|
||||
(proxy_host, proxy_port) = parsed_url.netloc.split(":")
|
||||
else:
|
||||
(proxy_host, proxy_port) = parsed_url.path.split(':')
|
||||
(proxy_host, proxy_port) = parsed_url.path.split(":")
|
||||
return (proxy_host, proxy_port)
|
||||
|
||||
|
||||
def build_proxy_options():
|
||||
""" Returns list of valid proxy options for keytool """
|
||||
"""Returns list of valid proxy options for keytool"""
|
||||
(proxy_host, proxy_port) = get_proxy_settings()
|
||||
no_proxy = os.getenv("no_proxy")
|
||||
|
||||
|
|
@ -344,8 +322,8 @@ def build_proxy_options():
|
|||
if no_proxy is not None:
|
||||
# For Java's nonProxyHosts property, items are separated by '|',
|
||||
# and patterns have to start with "*".
|
||||
non_proxy_hosts = no_proxy.replace(',', '|')
|
||||
non_proxy_hosts = re.sub(r'(^|\|)\.', r'\1*.', non_proxy_hosts)
|
||||
non_proxy_hosts = no_proxy.replace(",", "|")
|
||||
non_proxy_hosts = re.sub(r"(^|\|)\.", r"\1*.", non_proxy_hosts)
|
||||
|
||||
# The property name is http.nonProxyHosts, there is no
|
||||
# separate setting for HTTPS.
|
||||
|
|
@ -354,14 +332,14 @@ def build_proxy_options():
|
|||
|
||||
|
||||
def _update_permissions(module, keystore_path):
|
||||
""" Updates keystore file attributes as necessary """
|
||||
"""Updates keystore file attributes as necessary"""
|
||||
file_args = module.load_file_common_arguments(module.params, path=keystore_path)
|
||||
return module.set_fs_attributes_if_different(file_args, False)
|
||||
|
||||
|
||||
def _download_cert_url(module, executable, url, port):
|
||||
""" Fetches the certificate from the remote URL using `keytool -printcert...`
|
||||
The PEM formatted string is returned """
|
||||
"""Fetches the certificate from the remote URL using `keytool -printcert...`
|
||||
The PEM formatted string is returned"""
|
||||
proxy_opts = build_proxy_options()
|
||||
fetch_cmd = [executable, "-printcert", "-rfc", "-sslserver"] + proxy_opts + [f"{url}:{port}"]
|
||||
|
||||
|
|
@ -369,20 +347,27 @@ def _download_cert_url(module, executable, url, port):
|
|||
(fetch_rc, fetch_out, fetch_err) = module.run_command(fetch_cmd, check_rc=False)
|
||||
|
||||
if fetch_rc != 0:
|
||||
module.fail_json(msg=f"Internal module failure, cannot download certificate, error: {fetch_err}",
|
||||
rc=fetch_rc, cmd=fetch_cmd)
|
||||
module.fail_json(
|
||||
msg=f"Internal module failure, cannot download certificate, error: {fetch_err}", rc=fetch_rc, cmd=fetch_cmd
|
||||
)
|
||||
|
||||
return fetch_out
|
||||
|
||||
|
||||
def import_pkcs12_path(module, executable, pkcs12_path, pkcs12_pass, pkcs12_alias,
|
||||
keystore_path, keystore_pass, keystore_alias, keystore_type):
|
||||
''' Import pkcs12 from path into keystore located on
|
||||
keystore_path as alias '''
|
||||
optional_aliases = {
|
||||
"-destalias": keystore_alias,
|
||||
"-srcalias": pkcs12_alias
|
||||
}
|
||||
def import_pkcs12_path(
|
||||
module,
|
||||
executable,
|
||||
pkcs12_path,
|
||||
pkcs12_pass,
|
||||
pkcs12_alias,
|
||||
keystore_path,
|
||||
keystore_pass,
|
||||
keystore_alias,
|
||||
keystore_type,
|
||||
):
|
||||
"""Import pkcs12 from path into keystore located on
|
||||
keystore_path as alias"""
|
||||
optional_aliases = {"-destalias": keystore_alias, "-srcalias": pkcs12_alias}
|
||||
import_cmd = [
|
||||
executable,
|
||||
"-importkeystore",
|
||||
|
|
@ -408,83 +393,64 @@ def import_pkcs12_path(module, executable, pkcs12_path, pkcs12_pass, pkcs12_alia
|
|||
|
||||
# Use local certificate from local path and import it to a java keystore
|
||||
(import_rc, import_out, import_err) = module.run_command(import_cmd, data=secret_data, check_rc=False)
|
||||
diff = {'before': '\n', 'after': f'{keystore_alias}\n'}
|
||||
diff = {"before": "\n", "after": f"{keystore_alias}\n"}
|
||||
|
||||
if import_rc != 0 or not os.path.exists(keystore_path):
|
||||
module.fail_json(msg=import_out, rc=import_rc, cmd=import_cmd, error=import_err)
|
||||
|
||||
return dict(changed=True, msg=import_out,
|
||||
rc=import_rc, cmd=import_cmd, stdout=import_out,
|
||||
error=import_err, diff=diff)
|
||||
return dict(
|
||||
changed=True, msg=import_out, rc=import_rc, cmd=import_cmd, stdout=import_out, error=import_err, diff=diff
|
||||
)
|
||||
|
||||
|
||||
def import_cert_path(module, executable, path, keystore_path, keystore_pass, alias, keystore_type, trust_cacert):
|
||||
''' Import certificate from path into keystore located on
|
||||
keystore_path as alias '''
|
||||
import_cmd = [
|
||||
executable,
|
||||
"-importcert",
|
||||
"-noprompt",
|
||||
"-keystore",
|
||||
keystore_path,
|
||||
"-file",
|
||||
path,
|
||||
"-alias",
|
||||
alias
|
||||
]
|
||||
"""Import certificate from path into keystore located on
|
||||
keystore_path as alias"""
|
||||
import_cmd = [executable, "-importcert", "-noprompt", "-keystore", keystore_path, "-file", path, "-alias", alias]
|
||||
import_cmd += _get_keystore_type_keytool_parameters(keystore_type)
|
||||
|
||||
if trust_cacert:
|
||||
import_cmd.extend(["-trustcacerts"])
|
||||
|
||||
# Use local certificate from local path and import it to a java keystore
|
||||
(import_rc, import_out, import_err) = module.run_command(import_cmd,
|
||||
data=f"{keystore_pass}\n{keystore_pass}",
|
||||
check_rc=False)
|
||||
diff = {'before': '\n', 'after': f'{alias}\n'}
|
||||
(import_rc, import_out, import_err) = module.run_command(
|
||||
import_cmd, data=f"{keystore_pass}\n{keystore_pass}", check_rc=False
|
||||
)
|
||||
diff = {"before": "\n", "after": f"{alias}\n"}
|
||||
|
||||
if import_rc != 0:
|
||||
module.fail_json(msg=import_out, rc=import_rc, cmd=import_cmd, error=import_err)
|
||||
|
||||
return dict(changed=True, msg=import_out,
|
||||
rc=import_rc, cmd=import_cmd, stdout=import_out,
|
||||
error=import_err, diff=diff)
|
||||
return dict(
|
||||
changed=True, msg=import_out, rc=import_rc, cmd=import_cmd, stdout=import_out, error=import_err, diff=diff
|
||||
)
|
||||
|
||||
|
||||
def delete_cert(module, executable, keystore_path, keystore_pass, alias, keystore_type):
|
||||
''' Delete certificate identified with alias from keystore on keystore_path '''
|
||||
del_cmd = [
|
||||
executable,
|
||||
"-delete",
|
||||
"-noprompt",
|
||||
"-keystore",
|
||||
keystore_path,
|
||||
"-alias",
|
||||
alias
|
||||
]
|
||||
"""Delete certificate identified with alias from keystore on keystore_path"""
|
||||
del_cmd = [executable, "-delete", "-noprompt", "-keystore", keystore_path, "-alias", alias]
|
||||
|
||||
del_cmd += _get_keystore_type_keytool_parameters(keystore_type)
|
||||
|
||||
# Delete SSL certificate from keystore
|
||||
(del_rc, del_out, del_err) = module.run_command(del_cmd, data=keystore_pass, check_rc=True)
|
||||
diff = {'before': f'{alias}\n', 'after': None}
|
||||
diff = {"before": f"{alias}\n", "after": None}
|
||||
|
||||
if del_rc != 0:
|
||||
module.fail_json(msg=del_out, rc=del_rc, cmd=del_cmd, error=del_err)
|
||||
|
||||
return dict(changed=True, msg=del_out, rc=del_rc, cmd=del_cmd,
|
||||
stdout=del_out, error=del_err, diff=diff)
|
||||
return dict(changed=True, msg=del_out, rc=del_rc, cmd=del_cmd, stdout=del_out, error=del_err, diff=diff)
|
||||
|
||||
|
||||
def test_keytool(module, executable):
|
||||
''' Test if keytool is actually executable or not '''
|
||||
"""Test if keytool is actually executable or not"""
|
||||
module.run_command([executable], check_rc=True)
|
||||
|
||||
|
||||
def test_keystore(module, keystore_path):
|
||||
''' Check if we can access keystore as file or not '''
|
||||
"""Check if we can access keystore as file or not"""
|
||||
if keystore_path is None:
|
||||
keystore_path = ''
|
||||
keystore_path = ""
|
||||
|
||||
if not os.path.exists(keystore_path) and not os.path.isfile(keystore_path):
|
||||
# Keystore doesn't exist we want to create it
|
||||
|
|
@ -493,60 +459,59 @@ def test_keystore(module, keystore_path):
|
|||
|
||||
def main():
|
||||
argument_spec = dict(
|
||||
cert_url=dict(type='str'),
|
||||
cert_path=dict(type='path'),
|
||||
cert_content=dict(type='str'),
|
||||
pkcs12_path=dict(type='path'),
|
||||
pkcs12_password=dict(type='str', no_log=True),
|
||||
pkcs12_alias=dict(type='str'),
|
||||
cert_alias=dict(type='str'),
|
||||
cert_port=dict(type='int', default=443),
|
||||
keystore_path=dict(type='path'),
|
||||
keystore_pass=dict(type='str', required=True, no_log=True),
|
||||
trust_cacert=dict(type='bool', default=False),
|
||||
keystore_create=dict(type='bool', default=False),
|
||||
keystore_type=dict(type='str'),
|
||||
executable=dict(type='str', default='keytool'),
|
||||
state=dict(type='str', default='present', choices=['absent', 'present']),
|
||||
cert_url=dict(type="str"),
|
||||
cert_path=dict(type="path"),
|
||||
cert_content=dict(type="str"),
|
||||
pkcs12_path=dict(type="path"),
|
||||
pkcs12_password=dict(type="str", no_log=True),
|
||||
pkcs12_alias=dict(type="str"),
|
||||
cert_alias=dict(type="str"),
|
||||
cert_port=dict(type="int", default=443),
|
||||
keystore_path=dict(type="path"),
|
||||
keystore_pass=dict(type="str", required=True, no_log=True),
|
||||
trust_cacert=dict(type="bool", default=False),
|
||||
keystore_create=dict(type="bool", default=False),
|
||||
keystore_type=dict(type="str"),
|
||||
executable=dict(type="str", default="keytool"),
|
||||
state=dict(type="str", default="present", choices=["absent", "present"]),
|
||||
)
|
||||
|
||||
module = AnsibleModule(
|
||||
argument_spec=argument_spec,
|
||||
required_if=[['state', 'present', ('cert_path', 'cert_url', 'cert_content', 'pkcs12_path'), True],
|
||||
['state', 'absent', ('cert_url', 'cert_alias'), True]],
|
||||
required_together=[['keystore_path', 'keystore_pass']],
|
||||
mutually_exclusive=[
|
||||
['cert_url', 'cert_path', 'cert_content', 'pkcs12_path']
|
||||
required_if=[
|
||||
["state", "present", ("cert_path", "cert_url", "cert_content", "pkcs12_path"), True],
|
||||
["state", "absent", ("cert_url", "cert_alias"), True],
|
||||
],
|
||||
required_together=[["keystore_path", "keystore_pass"]],
|
||||
mutually_exclusive=[["cert_url", "cert_path", "cert_content", "pkcs12_path"]],
|
||||
supports_check_mode=True,
|
||||
add_file_common_args=True,
|
||||
)
|
||||
|
||||
url = module.params.get('cert_url')
|
||||
path = module.params.get('cert_path')
|
||||
content = module.params.get('cert_content')
|
||||
port = module.params.get('cert_port')
|
||||
url = module.params.get("cert_url")
|
||||
path = module.params.get("cert_path")
|
||||
content = module.params.get("cert_content")
|
||||
port = module.params.get("cert_port")
|
||||
|
||||
pkcs12_path = module.params.get('pkcs12_path')
|
||||
pkcs12_pass = module.params.get('pkcs12_password', '')
|
||||
pkcs12_alias = module.params.get('pkcs12_alias', '1')
|
||||
pkcs12_path = module.params.get("pkcs12_path")
|
||||
pkcs12_pass = module.params.get("pkcs12_password", "")
|
||||
pkcs12_alias = module.params.get("pkcs12_alias", "1")
|
||||
|
||||
cert_alias = module.params.get('cert_alias') or url
|
||||
trust_cacert = module.params.get('trust_cacert')
|
||||
cert_alias = module.params.get("cert_alias") or url
|
||||
trust_cacert = module.params.get("trust_cacert")
|
||||
|
||||
keystore_path = module.params.get('keystore_path')
|
||||
keystore_pass = module.params.get('keystore_pass')
|
||||
keystore_create = module.params.get('keystore_create')
|
||||
keystore_type = module.params.get('keystore_type')
|
||||
executable = module.params.get('executable')
|
||||
state = module.params.get('state')
|
||||
keystore_path = module.params.get("keystore_path")
|
||||
keystore_pass = module.params.get("keystore_pass")
|
||||
keystore_create = module.params.get("keystore_create")
|
||||
keystore_type = module.params.get("keystore_type")
|
||||
executable = module.params.get("executable")
|
||||
state = module.params.get("state")
|
||||
|
||||
# openssl dependency resolution
|
||||
openssl_bin = module.get_bin_path('openssl', True)
|
||||
openssl_bin = module.get_bin_path("openssl", True)
|
||||
|
||||
if path and not cert_alias:
|
||||
module.fail_json(changed=False,
|
||||
msg=f"Using local path import from {keystore_path} requires alias argument.")
|
||||
module.fail_json(changed=False, msg=f"Using local path import from {keystore_path} requires alias argument.")
|
||||
|
||||
test_keytool(module, executable)
|
||||
|
||||
|
|
@ -554,7 +519,8 @@ def main():
|
|||
test_keystore(module, keystore_path)
|
||||
|
||||
alias_exists, alias_exists_output = _check_cert_present(
|
||||
module, executable, keystore_path, keystore_pass, cert_alias, keystore_type)
|
||||
module, executable, keystore_path, keystore_pass, cert_alias, keystore_type
|
||||
)
|
||||
|
||||
(dummy, new_certificate) = tempfile.mkstemp()
|
||||
(dummy, old_certificate) = tempfile.mkstemp()
|
||||
|
|
@ -563,7 +529,7 @@ def main():
|
|||
|
||||
result = dict()
|
||||
|
||||
if state == 'absent' and alias_exists:
|
||||
if state == "absent" and alias_exists:
|
||||
if module.check_mode:
|
||||
module.exit_json(changed=True)
|
||||
|
||||
|
|
@ -571,7 +537,7 @@ def main():
|
|||
result = delete_cert(module, executable, keystore_path, keystore_pass, cert_alias, keystore_type)
|
||||
|
||||
# dump certificate to enroll in the keystore on disk and compute digest
|
||||
if state == 'present':
|
||||
if state == "present":
|
||||
# The alias exists in the keystore so we must now compare the SHA256 hash of the
|
||||
# public certificate already in the keystore, and the certificate we are wanting to add
|
||||
if alias_exists:
|
||||
|
|
@ -580,7 +546,7 @@ def main():
|
|||
keystore_cert_digest = _get_digest_from_x509_file(module, old_certificate, openssl_bin)
|
||||
|
||||
else:
|
||||
keystore_cert_digest = ''
|
||||
keystore_cert_digest = ""
|
||||
|
||||
if pkcs12_path:
|
||||
# Extracting certificate with openssl
|
||||
|
|
@ -603,7 +569,6 @@ def main():
|
|||
new_cert_digest = _get_digest_from_x509_file(module, new_certificate, openssl_bin)
|
||||
|
||||
if keystore_cert_digest != new_cert_digest:
|
||||
|
||||
if module.check_mode:
|
||||
module.exit_json(changed=True)
|
||||
|
||||
|
|
@ -613,15 +578,32 @@ def main():
|
|||
delete_cert(module, executable, keystore_path, keystore_pass, cert_alias, keystore_type)
|
||||
|
||||
if pkcs12_path:
|
||||
result = import_pkcs12_path(module, executable, pkcs12_path, pkcs12_pass, pkcs12_alias,
|
||||
keystore_path, keystore_pass, cert_alias, keystore_type)
|
||||
result = import_pkcs12_path(
|
||||
module,
|
||||
executable,
|
||||
pkcs12_path,
|
||||
pkcs12_pass,
|
||||
pkcs12_alias,
|
||||
keystore_path,
|
||||
keystore_pass,
|
||||
cert_alias,
|
||||
keystore_type,
|
||||
)
|
||||
else:
|
||||
result = import_cert_path(module, executable, new_certificate, keystore_path,
|
||||
keystore_pass, cert_alias, keystore_type, trust_cacert)
|
||||
result = import_cert_path(
|
||||
module,
|
||||
executable,
|
||||
new_certificate,
|
||||
keystore_path,
|
||||
keystore_pass,
|
||||
cert_alias,
|
||||
keystore_type,
|
||||
trust_cacert,
|
||||
)
|
||||
|
||||
if os.path.exists(keystore_path):
|
||||
changed_permissions = _update_permissions(module, keystore_path)
|
||||
result['changed'] = result.get('changed', False) or changed_permissions
|
||||
result["changed"] = result.get("changed", False) or changed_permissions
|
||||
|
||||
module.exit_json(**result)
|
||||
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue