Use FQCN in examples. (#12)

pull/25/head
Felix Fontein 2020-03-31 16:23:45 +02:00 committed by GitHub
parent bffd7b0ce9
commit 4d157b93ee
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
24 changed files with 123 additions and 123 deletions

View File

@ -95,7 +95,7 @@ options:
EXAMPLES = ''' EXAMPLES = '''
- name: Make sure account exists and has given contacts. We agree to TOS. - name: Make sure account exists and has given contacts. We agree to TOS.
acme_account: community.crypto.acme_account:
account_key_src: /etc/pki/cert/private/account.key account_key_src: /etc/pki/cert/private/account.key
state: present state: present
terms_agreed: yes terms_agreed: yes
@ -104,7 +104,7 @@ EXAMPLES = '''
- mailto:myself@example.org - mailto:myself@example.org
- name: Make sure account has given email address. Don't create account if it doesn't exist - name: Make sure account has given email address. Don't create account if it doesn't exist
acme_account: community.crypto.acme_account:
account_key_src: /etc/pki/cert/private/account.key account_key_src: /etc/pki/cert/private/account.key
state: present state: present
allow_creation: no allow_creation: no
@ -112,13 +112,13 @@ EXAMPLES = '''
- mailto:me@example.com - mailto:me@example.com
- name: Change account's key to the one stored in the variable new_account_key - name: Change account's key to the one stored in the variable new_account_key
acme_account: community.crypto.acme_account:
account_key_src: /etc/pki/cert/private/account.key account_key_src: /etc/pki/cert/private/account.key
new_account_key_content: '{{ new_account_key }}' new_account_key_content: '{{ new_account_key }}'
state: changed_key state: changed_key
- name: Delete account (we have to use the new key) - name: Delete account (we have to use the new key)
acme_account: community.crypto.acme_account:
account_key_content: '{{ new_account_key }}' account_key_content: '{{ new_account_key }}'
state: absent state: absent
''' '''

View File

@ -51,7 +51,7 @@ extends_documentation_fragment:
EXAMPLES = ''' EXAMPLES = '''
- name: Check whether an account with the given account key exists - name: Check whether an account with the given account key exists
acme_account_info: community.crypto.acme_account_info:
account_key_src: /etc/pki/cert/private/account.key account_key_src: /etc/pki/cert/private/account.key
register: account_data register: account_data
- name: Verify that account exists - name: Verify that account exists

View File

@ -262,7 +262,7 @@ EXAMPLES = r'''
### Example with HTTP challenge ### ### Example with HTTP challenge ###
- name: Create a challenge for sample.com using a account key from a variable. - name: Create a challenge for sample.com using a account key from a variable.
acme_certificate: community.crypto.acme_certificate:
account_key_content: "{{ account_private_key }}" account_key_content: "{{ account_private_key }}"
csr: /etc/pki/cert/csr/sample.com.csr csr: /etc/pki/cert/csr/sample.com.csr
dest: /etc/httpd/ssl/sample.com.crt dest: /etc/httpd/ssl/sample.com.crt
@ -270,7 +270,7 @@ EXAMPLES = r'''
# Alternative first step: # Alternative first step:
- name: Create a challenge for sample.com using a account key from hashi vault. - name: Create a challenge for sample.com using a account key from hashi vault.
acme_certificate: community.crypto.acme_certificate:
account_key_content: "{{ lookup('hashi_vault', 'secret=secret/account_private_key:value') }}" account_key_content: "{{ lookup('hashi_vault', 'secret=secret/account_private_key:value') }}"
csr: /etc/pki/cert/csr/sample.com.csr csr: /etc/pki/cert/csr/sample.com.csr
fullchain_dest: /etc/httpd/ssl/sample.com-fullchain.crt fullchain_dest: /etc/httpd/ssl/sample.com-fullchain.crt
@ -278,7 +278,7 @@ EXAMPLES = r'''
# Alternative first step: # Alternative first step:
- name: Create a challenge for sample.com using a account key file. - name: Create a challenge for sample.com using a account key file.
acme_certificate: community.crypto.acme_certificate:
account_key_src: /etc/pki/cert/private/account.key account_key_src: /etc/pki/cert/private/account.key
csr: /etc/pki/cert/csr/sample.com.csr csr: /etc/pki/cert/csr/sample.com.csr
dest: /etc/httpd/ssl/sample.com.crt dest: /etc/httpd/ssl/sample.com.crt
@ -294,7 +294,7 @@ EXAMPLES = r'''
# when: sample_com_challenge is changed # when: sample_com_challenge is changed
- name: Let the challenge be validated and retrieve the cert and intermediate certificate - name: Let the challenge be validated and retrieve the cert and intermediate certificate
acme_certificate: community.crypto.acme_certificate:
account_key_src: /etc/pki/cert/private/account.key account_key_src: /etc/pki/cert/private/account.key
csr: /etc/pki/cert/csr/sample.com.csr csr: /etc/pki/cert/csr/sample.com.csr
dest: /etc/httpd/ssl/sample.com.crt dest: /etc/httpd/ssl/sample.com.crt
@ -305,7 +305,7 @@ EXAMPLES = r'''
### Example with DNS challenge against production ACME server ### ### Example with DNS challenge against production ACME server ###
- name: Create a challenge for sample.com using a account key file. - name: Create a challenge for sample.com using a account key file.
acme_certificate: community.crypto.acme_certificate:
account_key_src: /etc/pki/cert/private/account.key account_key_src: /etc/pki/cert/private/account.key
account_email: myself@sample.com account_email: myself@sample.com
src: /etc/pki/cert/csr/sample.com.csr src: /etc/pki/cert/csr/sample.com.csr
@ -319,7 +319,7 @@ EXAMPLES = r'''
# perform the necessary steps to fulfill the challenge # perform the necessary steps to fulfill the challenge
# for example: # for example:
# #
# - route53: # - community.aws.route53:
# zone: sample.com # zone: sample.com
# record: "{{ sample_com_challenge.challenge_data['sample.com']['dns-01'].record }}" # record: "{{ sample_com_challenge.challenge_data['sample.com']['dns-01'].record }}"
# type: TXT # type: TXT
@ -332,7 +332,7 @@ EXAMPLES = r'''
# #
# Alternative way: # Alternative way:
# #
# - route53: # - community.aws.route53:
# zone: sample.com # zone: sample.com
# record: "{{ item.key }}" # record: "{{ item.key }}"
# type: TXT # type: TXT
@ -346,7 +346,7 @@ EXAMPLES = r'''
# when: sample_com_challenge is changed # when: sample_com_challenge is changed
- name: Let the challenge be validated and retrieve the cert and intermediate certificate - name: Let the challenge be validated and retrieve the cert and intermediate certificate
acme_certificate: community.crypto.acme_certificate:
account_key_src: /etc/pki/cert/private/account.key account_key_src: /etc/pki/cert/private/account.key
account_email: myself@sample.com account_email: myself@sample.com
src: /etc/pki/cert/csr/sample.com.csr src: /etc/pki/cert/csr/sample.com.csr
@ -361,7 +361,7 @@ EXAMPLES = r'''
# Alternative second step: # Alternative second step:
- name: Let the challenge be validated and retrieve the cert and intermediate certificate - name: Let the challenge be validated and retrieve the cert and intermediate certificate
acme_certificate: community.crypto.acme_certificate:
account_key_src: /etc/pki/cert/private/account.key account_key_src: /etc/pki/cert/private/account.key
account_email: myself@sample.com account_email: myself@sample.com
src: /etc/pki/cert/csr/sample.com.csr src: /etc/pki/cert/csr/sample.com.csr

View File

@ -109,12 +109,12 @@ options:
EXAMPLES = ''' EXAMPLES = '''
- name: Revoke certificate with account key - name: Revoke certificate with account key
acme_certificate_revoke: community.crypto.acme_certificate_revoke:
account_key_src: /etc/pki/cert/private/account.key account_key_src: /etc/pki/cert/private/account.key
certificate: /etc/httpd/ssl/sample.com.crt certificate: /etc/httpd/ssl/sample.com.crt
- name: Revoke certificate with certificate's private key - name: Revoke certificate with certificate's private key
acme_certificate_revoke: community.crypto.acme_certificate_revoke:
private_key_src: /etc/httpd/ssl/sample.com.key private_key_src: /etc/httpd/ssl/sample.com.key
certificate: /etc/httpd/ssl/sample.com.crt certificate: /etc/httpd/ssl/sample.com.crt
''' '''

View File

@ -60,7 +60,7 @@ options:
EXAMPLES = ''' EXAMPLES = '''
- name: Create challenges for a given CRT for sample.com - name: Create challenges for a given CRT for sample.com
acme_certificate: community.crypto.acme_certificate:
account_key_src: /etc/pki/cert/private/account.key account_key_src: /etc/pki/cert/private/account.key
challenge: tls-alpn-01 challenge: tls-alpn-01
csr: /etc/pki/cert/csr/sample.com.csr csr: /etc/pki/cert/csr/sample.com.csr
@ -68,7 +68,7 @@ EXAMPLES = '''
register: sample_com_challenge register: sample_com_challenge
- name: Create certificates for challenges - name: Create certificates for challenges
acme_challenge_cert_helper: community.crypto.acme_challenge_cert_helper:
challenge: tls-alpn-01 challenge: tls-alpn-01
challenge_data: "{{ item.value['tls-alpn-01'] }}" challenge_data: "{{ item.value['tls-alpn-01'] }}"
private_key_src: /etc/pki/cert/key/sample.com.key private_key_src: /etc/pki/cert/key/sample.com.key
@ -92,7 +92,7 @@ EXAMPLES = '''
loop: "{{ sample_com_challenge_certs.results }}" loop: "{{ sample_com_challenge_certs.results }}"
- name: Create certificate for a given CSR for sample.com - name: Create certificate for a given CSR for sample.com
acme_certificate: community.crypto.acme_certificate:
account_key_src: /etc/pki/cert/private/account.key account_key_src: /etc/pki/cert/private/account.key
challenge: tls-alpn-01 challenge: tls-alpn-01
csr: /etc/pki/cert/csr/sample.com.csr csr: /etc/pki/cert/csr/sample.com.csr

View File

@ -85,14 +85,14 @@ options:
EXAMPLES = r''' EXAMPLES = r'''
- name: Get directory - name: Get directory
acme_inspect: community.crypto.acme_inspect:
acme_directory: https://acme-staging-v02.api.letsencrypt.org/directory acme_directory: https://acme-staging-v02.api.letsencrypt.org/directory
acme_version: 2 acme_version: 2
method: directory-only method: directory-only
register: directory register: directory
- name: Create an account - name: Create an account
acme_inspect: community.crypto.acme_inspect:
acme_directory: https://acme-staging-v02.api.letsencrypt.org/directory acme_directory: https://acme-staging-v02.api.letsencrypt.org/directory
acme_version: 2 acme_version: 2
account_key_src: /etc/pki/cert/private/account.key account_key_src: /etc/pki/cert/private/account.key
@ -104,7 +104,7 @@ EXAMPLES = r'''
# if creation was successful # if creation was successful
- name: Get account information - name: Get account information
acme_inspect: community.crypto.acme_inspect:
acme_directory: https://acme-staging-v02.api.letsencrypt.org/directory acme_directory: https://acme-staging-v02.api.letsencrypt.org/directory
acme_version: 2 acme_version: 2
account_key_src: /etc/pki/cert/private/account.key account_key_src: /etc/pki/cert/private/account.key
@ -113,7 +113,7 @@ EXAMPLES = r'''
method: get method: get
- name: Update account contacts - name: Update account contacts
acme_inspect: community.crypto.acme_inspect:
acme_directory: https://acme-staging-v02.api.letsencrypt.org/directory acme_directory: https://acme-staging-v02.api.letsencrypt.org/directory
acme_version: 2 acme_version: 2
account_key_src: /etc/pki/cert/private/account.key account_key_src: /etc/pki/cert/private/account.key
@ -129,7 +129,7 @@ EXAMPLES = r'''
- mailto:me@example.com - mailto:me@example.com
- name: Create certificate order - name: Create certificate order
acme_certificate: community.crypto.acme_certificate:
acme_directory: https://acme-staging-v02.api.letsencrypt.org/directory acme_directory: https://acme-staging-v02.api.letsencrypt.org/directory
acme_version: 2 acme_version: 2
account_key_src: /etc/pki/cert/private/account.key account_key_src: /etc/pki/cert/private/account.key
@ -143,7 +143,7 @@ EXAMPLES = r'''
# the order URI. # the order URI.
- name: Get order information - name: Get order information
acme_inspect: community.crypto.acme_inspect:
acme_directory: https://acme-staging-v02.api.letsencrypt.org/directory acme_directory: https://acme-staging-v02.api.letsencrypt.org/directory
acme_version: 2 acme_version: 2
account_key_src: /etc/pki/cert/private/account.key account_key_src: /etc/pki/cert/private/account.key
@ -153,7 +153,7 @@ EXAMPLES = r'''
register: order register: order
- name: Get first authz for order - name: Get first authz for order
acme_inspect: community.crypto.acme_inspect:
acme_directory: https://acme-staging-v02.api.letsencrypt.org/directory acme_directory: https://acme-staging-v02.api.letsencrypt.org/directory
acme_version: 2 acme_version: 2
account_key_src: /etc/pki/cert/private/account.key account_key_src: /etc/pki/cert/private/account.key
@ -163,7 +163,7 @@ EXAMPLES = r'''
register: authz register: authz
- name: Get HTTP-01 challenge for authz - name: Get HTTP-01 challenge for authz
acme_inspect: community.crypto.acme_inspect:
acme_directory: https://acme-staging-v02.api.letsencrypt.org/directory acme_directory: https://acme-staging-v02.api.letsencrypt.org/directory
acme_version: 2 acme_version: 2
account_key_src: /etc/pki/cert/private/account.key account_key_src: /etc/pki/cert/private/account.key
@ -173,7 +173,7 @@ EXAMPLES = r'''
register: http01challenge register: http01challenge
- name: Activate HTTP-01 challenge manually - name: Activate HTTP-01 challenge manually
acme_inspect: community.crypto.acme_inspect:
acme_directory: https://acme-staging-v02.api.letsencrypt.org/directory acme_directory: https://acme-staging-v02.api.letsencrypt.org/directory
acme_version: 2 acme_version: 2
account_key_src: /etc/pki/cert/private/account.key account_key_src: /etc/pki/cert/private/account.key

View File

@ -70,7 +70,7 @@ EXAMPLES = '''
# Given a leaf certificate for www.ansible.com and one or more intermediate # Given a leaf certificate for www.ansible.com and one or more intermediate
# certificates, finds the associated root certificate. # certificates, finds the associated root certificate.
- name: Find root certificate - name: Find root certificate
certificate_complete_chain: community.crypto.certificate_complete_chain:
input_chain: "{{ lookup('file', '/etc/ssl/csr/www.ansible.com-fullchain.pem') }}" input_chain: "{{ lookup('file', '/etc/ssl/csr/www.ansible.com-fullchain.pem') }}"
root_certificates: root_certificates:
- /etc/ca-certificates/ - /etc/ca-certificates/
@ -83,7 +83,7 @@ EXAMPLES = '''
# Given a leaf certificate for www.ansible.com, and a list of intermediate # Given a leaf certificate for www.ansible.com, and a list of intermediate
# certificates, finds the associated root certificate. # certificates, finds the associated root certificate.
- name: Find root certificate - name: Find root certificate
certificate_complete_chain: community.crypto.certificate_complete_chain:
input_chain: "{{ lookup('file', '/etc/ssl/csr/www.ansible.com.pem') }}" input_chain: "{{ lookup('file', '/etc/ssl/csr/www.ansible.com.pem') }}"
intermediate_certificates: intermediate_certificates:
- /etc/ssl/csr/www.ansible.com-chain.pem - /etc/ssl/csr/www.ansible.com-chain.pem

View File

@ -349,7 +349,7 @@ EXAMPLES = r'''
- name: Request a new certificate from Entrust with bare minimum parameters. - name: Request a new certificate from Entrust with bare minimum parameters.
Will request a new certificate if current one is valid but within 30 Will request a new certificate if current one is valid but within 30
days of expiry. If replacing an existing file in path, will back it up. days of expiry. If replacing an existing file in path, will back it up.
ecs_certificate: community.crypto.ecs_certificate:
backup: true backup: true
path: /etc/ssl/crt/ansible.com.crt path: /etc/ssl/crt/ansible.com.crt
full_chain_path: /etc/ssl/crt/ansible.com.chain.crt full_chain_path: /etc/ssl/crt/ansible.com.chain.crt
@ -367,7 +367,7 @@ EXAMPLES = r'''
of type EV_SSL. Otherwise, if there is an Entrust managed certificate of type EV_SSL. Otherwise, if there is an Entrust managed certificate
in path and it is within 63 days of expiration, request a renew of that in path and it is within 63 days of expiration, request a renew of that
certificate. certificate.
ecs_certificate: community.crypto.ecs_certificate:
path: /etc/ssl/crt/ansible.com.crt path: /etc/ssl/crt/ansible.com.crt
csr: /etc/ssl/csr/ansible.com.csr csr: /etc/ssl/csr/ansible.com.csr
cert_type: EV_SSL cert_type: EV_SSL
@ -387,7 +387,7 @@ EXAMPLES = r'''
certificate is within 79 days of expiration, request a renew of that certificate is within 79 days of expiration, request a renew of that
certificate and save it in path. This can be used to "migrate" a certificate and save it in path. This can be used to "migrate" a
certificate to be Ansible managed. certificate to be Ansible managed.
ecs_certificate: community.crypto.ecs_certificate:
path: /etc/ssl/crt/ansible.com.crt path: /etc/ssl/crt/ansible.com.crt
csr: /etc/ssl/csr/ansible.com.csr csr: /etc/ssl/csr/ansible.com.csr
tracking_id: 2378915 tracking_id: 2378915
@ -399,7 +399,7 @@ EXAMPLES = r'''
entrust_api_client_cert_key_path: /etc/ssl/entrust/ecs-client.key entrust_api_client_cert_key_path: /etc/ssl/entrust/ecs-client.key
- name: Force a reissue of the certificate specified by tracking_id. - name: Force a reissue of the certificate specified by tracking_id.
ecs_certificate: community.crypto.ecs_certificate:
path: /etc/ssl/crt/ansible.com.crt path: /etc/ssl/crt/ansible.com.crt
force: true force: true
tracking_id: 2378915 tracking_id: 2378915
@ -413,7 +413,7 @@ EXAMPLES = r'''
issued certificate will have it's Subject Distinguished Name use the issued certificate will have it's Subject Distinguished Name use the
organization details associated with that client, rather than what is organization details associated with that client, rather than what is
in the CSR. in the CSR.
ecs_certificate: community.crypto.ecs_certificate:
path: /etc/ssl/crt/ansible.com.crt path: /etc/ssl/crt/ansible.com.crt
csr: /etc/ssl/csr/ansible.com.csr csr: /etc/ssl/csr/ansible.com.csr
client_id: 2 client_id: 2
@ -427,7 +427,7 @@ EXAMPLES = r'''
- name: Request a new certificate with a number of CSR parameters overridden - name: Request a new certificate with a number of CSR parameters overridden
and tracking information and tracking information
ecs_certificate: community.crypto.ecs_certificate:
path: /etc/ssl/crt/ansible.com.crt path: /etc/ssl/crt/ansible.com.crt
full_chain_path: /etc/ssl/crt/ansible.com.chain.crt full_chain_path: /etc/ssl/crt/ansible.com.chain.crt
csr: /etc/ssl/csr/ansible.com.csr csr: /etc/ssl/csr/ansible.com.csr

View File

@ -89,7 +89,7 @@ extends_documentation_fragment:
EXAMPLES = r''' EXAMPLES = r'''
- name: Request domain validation using email validation for client ID of 2. - name: Request domain validation using email validation for client ID of 2.
ecs_domain: community.crypto.ecs_domain:
domain_name: ansible.com domain_name: ansible.com
client_id: 2 client_id: 2
verification_method: email verification_method: email
@ -101,7 +101,7 @@ EXAMPLES = r'''
- name: Request domain validation using DNS. If domain is already valid, - name: Request domain validation using DNS. If domain is already valid,
request revalidation if expires within 90 days request revalidation if expires within 90 days
ecs_domain: community.crypto.ecs_domain:
domain_name: ansible.com domain_name: ansible.com
verification_method: dns verification_method: dns
entrust_api_user: apiusername entrust_api_user: apiusername
@ -111,7 +111,7 @@ EXAMPLES = r'''
- name: Request domain validation using web server validation, and revalidate - name: Request domain validation using web server validation, and revalidate
if fewer than 60 days remaining of EV eligibility. if fewer than 60 days remaining of EV eligibility.
ecs_domain: community.crypto.ecs_domain:
domain_name: ansible.com domain_name: ansible.com
verification_method: web_server verification_method: web_server
entrust_api_user: apiusername entrust_api_user: apiusername
@ -120,7 +120,7 @@ EXAMPLES = r'''
entrust_api_client_cert_key_path: /etc/ssl/entrust/ecs-client.key entrust_api_client_cert_key_path: /etc/ssl/entrust/ecs-client.key
- name: Request domain validation using manual validation. - name: Request domain validation using manual validation.
ecs_domain: community.crypto.ecs_domain:
domain_name: ansible.com domain_name: ansible.com
verification_method: manual verification_method: manual
entrust_api_user: apiusername entrust_api_user: apiusername

View File

@ -128,7 +128,7 @@ version:
EXAMPLES = ''' EXAMPLES = '''
- name: Get the cert from an RDP port - name: Get the cert from an RDP port
get_certificate: community.crypto.get_certificate:
host: "1.2.3.4" host: "1.2.3.4"
port: 3389 port: 3389
delegate_to: localhost delegate_to: localhost
@ -136,7 +136,7 @@ EXAMPLES = '''
register: cert register: cert
- name: Get a cert from an https port - name: Get a cert from an https port
get_certificate: community.crypto.get_certificate:
host: "www.google.com" host: "www.google.com"
port: 443 port: 443
delegate_to: localhost delegate_to: localhost

View File

@ -163,91 +163,91 @@ author: Jan Pokorny (@japokorn)
EXAMPLES = ''' EXAMPLES = '''
- name: create LUKS container (remains unchanged if it already exists) - name: create LUKS container (remains unchanged if it already exists)
luks_device: community.crypto.luks_device:
device: "/dev/loop0" device: "/dev/loop0"
state: "present" state: "present"
keyfile: "/vault/keyfile" keyfile: "/vault/keyfile"
- name: create LUKS container with a passphrase - name: create LUKS container with a passphrase
luks_device: community.crypto.luks_device:
device: "/dev/loop0" device: "/dev/loop0"
state: "present" state: "present"
passphrase: "foo" passphrase: "foo"
- name: (create and) open the LUKS container; name it "mycrypt" - name: (create and) open the LUKS container; name it "mycrypt"
luks_device: community.crypto.luks_device:
device: "/dev/loop0" device: "/dev/loop0"
state: "opened" state: "opened"
name: "mycrypt" name: "mycrypt"
keyfile: "/vault/keyfile" keyfile: "/vault/keyfile"
- name: close the existing LUKS container "mycrypt" - name: close the existing LUKS container "mycrypt"
luks_device: community.crypto.luks_device:
state: "closed" state: "closed"
name: "mycrypt" name: "mycrypt"
- name: make sure LUKS container exists and is closed - name: make sure LUKS container exists and is closed
luks_device: community.crypto.luks_device:
device: "/dev/loop0" device: "/dev/loop0"
state: "closed" state: "closed"
keyfile: "/vault/keyfile" keyfile: "/vault/keyfile"
- name: create container if it does not exist and add new key to it - name: create container if it does not exist and add new key to it
luks_device: community.crypto.luks_device:
device: "/dev/loop0" device: "/dev/loop0"
state: "present" state: "present"
keyfile: "/vault/keyfile" keyfile: "/vault/keyfile"
new_keyfile: "/vault/keyfile2" new_keyfile: "/vault/keyfile2"
- name: add new key to the LUKS container (container has to exist) - name: add new key to the LUKS container (container has to exist)
luks_device: community.crypto.luks_device:
device: "/dev/loop0" device: "/dev/loop0"
keyfile: "/vault/keyfile" keyfile: "/vault/keyfile"
new_keyfile: "/vault/keyfile2" new_keyfile: "/vault/keyfile2"
- name: add new passphrase to the LUKS container - name: add new passphrase to the LUKS container
luks_device: community.crypto.luks_device:
device: "/dev/loop0" device: "/dev/loop0"
keyfile: "/vault/keyfile" keyfile: "/vault/keyfile"
new_passphrase: "foo" new_passphrase: "foo"
- name: remove existing keyfile from the LUKS container - name: remove existing keyfile from the LUKS container
luks_device: community.crypto.luks_device:
device: "/dev/loop0" device: "/dev/loop0"
remove_keyfile: "/vault/keyfile2" remove_keyfile: "/vault/keyfile2"
- name: remove existing passphrase from the LUKS container - name: remove existing passphrase from the LUKS container
luks_device: community.crypto.luks_device:
device: "/dev/loop0" device: "/dev/loop0"
remove_passphrase: "foo" remove_passphrase: "foo"
- name: completely remove the LUKS container and its contents - name: completely remove the LUKS container and its contents
luks_device: community.crypto.luks_device:
device: "/dev/loop0" device: "/dev/loop0"
state: "absent" state: "absent"
- name: create a container with label - name: create a container with label
luks_device: community.crypto.luks_device:
device: "/dev/loop0" device: "/dev/loop0"
state: "present" state: "present"
keyfile: "/vault/keyfile" keyfile: "/vault/keyfile"
label: personalLabelName label: personalLabelName
- name: open the LUKS container based on label without device; name it "mycrypt" - name: open the LUKS container based on label without device; name it "mycrypt"
luks_device: community.crypto.luks_device:
label: "personalLabelName" label: "personalLabelName"
state: "opened" state: "opened"
name: "mycrypt" name: "mycrypt"
keyfile: "/vault/keyfile" keyfile: "/vault/keyfile"
- name: close container based on UUID - name: close container based on UUID
luks_device: community.crypto.luks_device:
uuid: 03ecd578-fad4-4e6c-9348-842e3e8fa340 uuid: 03ecd578-fad4-4e6c-9348-842e3e8fa340
state: "closed" state: "closed"
name: "mycrypt" name: "mycrypt"
- name: create a container using luks2 format - name: create a container using luks2 format
luks_device: community.crypto.luks_device:
device: "/dev/loop0" device: "/dev/loop0"
state: "present" state: "present"
keyfile: "/vault/keyfile" keyfile: "/vault/keyfile"

View File

@ -123,7 +123,7 @@ extends_documentation_fragment: files
EXAMPLES = ''' EXAMPLES = '''
# Generate an OpenSSH user certificate that is valid forever and for all users # Generate an OpenSSH user certificate that is valid forever and for all users
- openssh_cert: - community.crypto.openssh_cert:
type: user type: user
signing_key: /path/to/private_key signing_key: /path/to/private_key
public_key: /path/to/public_key.pub public_key: /path/to/public_key.pub
@ -133,7 +133,7 @@ EXAMPLES = '''
# Generate an OpenSSH host certificate that is valid for 32 weeks from now and will be regenerated # Generate an OpenSSH host certificate that is valid for 32 weeks from now and will be regenerated
# if it is valid for less than 2 weeks from the time the module is being run # if it is valid for less than 2 weeks from the time the module is being run
- openssh_cert: - community.crypto.openssh_cert:
type: host type: host
signing_key: /path/to/private_key signing_key: /path/to/private_key
public_key: /path/to/public_key.pub public_key: /path/to/public_key.pub
@ -143,7 +143,7 @@ EXAMPLES = '''
valid_at: +2w valid_at: +2w
# Generate an OpenSSH host certificate that is valid forever and only for example.com and examplehost # Generate an OpenSSH host certificate that is valid forever and only for example.com and examplehost
- openssh_cert: - community.crypto.openssh_cert:
type: host type: host
signing_key: /path/to/private_key signing_key: /path/to/private_key
public_key: /path/to/public_key.pub public_key: /path/to/public_key.pub
@ -155,7 +155,7 @@ EXAMPLES = '''
- examplehost - examplehost
# Generate an OpenSSH host Certificate that is valid from 21.1.2001 to 21.1.2019 # Generate an OpenSSH host Certificate that is valid from 21.1.2001 to 21.1.2019
- openssh_cert: - community.crypto.openssh_cert:
type: host type: host
signing_key: /path/to/private_key signing_key: /path/to/private_key
public_key: /path/to/public_key.pub public_key: /path/to/public_key.pub
@ -164,7 +164,7 @@ EXAMPLES = '''
valid_to: "2019-01-21" valid_to: "2019-01-21"
# Generate an OpenSSH user Certificate with clear and force-command option: # Generate an OpenSSH user Certificate with clear and force-command option:
- openssh_cert: - community.crypto.openssh_cert:
type: user type: user
signing_key: /path/to/private_key signing_key: /path/to/private_key
public_key: /path/to/public_key.pub public_key: /path/to/public_key.pub

View File

@ -101,21 +101,21 @@ extends_documentation_fragment: files
EXAMPLES = ''' EXAMPLES = '''
# Generate an OpenSSH keypair with the default values (4096 bits, rsa) # Generate an OpenSSH keypair with the default values (4096 bits, rsa)
- openssh_keypair: - community.crypto.openssh_keypair:
path: /tmp/id_ssh_rsa path: /tmp/id_ssh_rsa
# Generate an OpenSSH rsa keypair with a different size (2048 bits) # Generate an OpenSSH rsa keypair with a different size (2048 bits)
- openssh_keypair: - community.crypto.openssh_keypair:
path: /tmp/id_ssh_rsa path: /tmp/id_ssh_rsa
size: 2048 size: 2048
# Force regenerate an OpenSSH keypair if it already exists # Force regenerate an OpenSSH keypair if it already exists
- openssh_keypair: - community.crypto.openssh_keypair:
path: /tmp/id_ssh_rsa path: /tmp/id_ssh_rsa
force: True force: True
# Generate an OpenSSH keypair with a different algorithm (dsa) # Generate an OpenSSH keypair with a different algorithm (dsa)
- openssh_keypair: - community.crypto.openssh_keypair:
path: /tmp/id_ssh_dsa path: /tmp/id_ssh_dsa
type: dsa type: dsa
''' '''

View File

@ -589,14 +589,14 @@ seealso:
EXAMPLES = r''' EXAMPLES = r'''
- name: Generate a Self Signed OpenSSL certificate - name: Generate a Self Signed OpenSSL certificate
openssl_certificate: community.crypto.openssl_certificate:
path: /etc/ssl/crt/ansible.com.crt path: /etc/ssl/crt/ansible.com.crt
privatekey_path: /etc/ssl/private/ansible.com.pem privatekey_path: /etc/ssl/private/ansible.com.pem
csr_path: /etc/ssl/csr/ansible.com.csr csr_path: /etc/ssl/csr/ansible.com.csr
provider: selfsigned provider: selfsigned
- name: Generate an OpenSSL certificate signed with your own CA certificate - name: Generate an OpenSSL certificate signed with your own CA certificate
openssl_certificate: community.crypto.openssl_certificate:
path: /etc/ssl/crt/ansible.com.crt path: /etc/ssl/crt/ansible.com.crt
csr_path: /etc/ssl/csr/ansible.com.csr csr_path: /etc/ssl/csr/ansible.com.csr
ownca_path: /etc/ssl/crt/ansible_CA.crt ownca_path: /etc/ssl/crt/ansible_CA.crt
@ -604,7 +604,7 @@ EXAMPLES = r'''
provider: ownca provider: ownca
- name: Generate a Let's Encrypt Certificate - name: Generate a Let's Encrypt Certificate
openssl_certificate: community.crypto.openssl_certificate:
path: /etc/ssl/crt/ansible.com.crt path: /etc/ssl/crt/ansible.com.crt
csr_path: /etc/ssl/csr/ansible.com.csr csr_path: /etc/ssl/csr/ansible.com.csr
provider: acme provider: acme
@ -612,7 +612,7 @@ EXAMPLES = r'''
acme_challenge_path: /etc/ssl/challenges/ansible.com/ acme_challenge_path: /etc/ssl/challenges/ansible.com/
- name: Force (re-)generate a new Let's Encrypt Certificate - name: Force (re-)generate a new Let's Encrypt Certificate
openssl_certificate: community.crypto.openssl_certificate:
path: /etc/ssl/crt/ansible.com.crt path: /etc/ssl/crt/ansible.com.crt
csr_path: /etc/ssl/csr/ansible.com.csr csr_path: /etc/ssl/csr/ansible.com.csr
provider: acme provider: acme
@ -621,7 +621,7 @@ EXAMPLES = r'''
force: yes force: yes
- name: Generate an Entrust certificate via the Entrust Certificate Services (ECS) API - name: Generate an Entrust certificate via the Entrust Certificate Services (ECS) API
openssl_certificate: community.crypto.openssl_certificate:
path: /etc/ssl/crt/ansible.com.crt path: /etc/ssl/crt/ansible.com.crt
csr_path: /etc/ssl/csr/ansible.com.csr csr_path: /etc/ssl/csr/ansible.com.csr
provider: entrust provider: entrust
@ -639,7 +639,7 @@ EXAMPLES = r'''
# assertonly, and shows how to emulate the behavior with the openssl_certificate_info, # assertonly, and shows how to emulate the behavior with the openssl_certificate_info,
# openssl_csr_info, openssl_privatekey_info and assert modules: # openssl_csr_info, openssl_privatekey_info and assert modules:
- openssl_certificate: - community.crypto.openssl_certificate:
provider: assertonly provider: assertonly
path: /etc/ssl/crt/ansible.com.crt path: /etc/ssl/crt/ansible.com.crt
csr_path: /etc/ssl/csr/ansible.com.csr csr_path: /etc/ssl/csr/ansible.com.csr
@ -670,7 +670,7 @@ EXAMPLES = r'''
invalid_at: 20200331202428Z invalid_at: 20200331202428Z
valid_in: 10 # in ten seconds valid_in: 10 # in ten seconds
- openssl_certificate_info: - community.crypto.openssl_certificate_info:
path: /etc/ssl/crt/ansible.com.crt path: /etc/ssl/crt/ansible.com.crt
# for valid_at, invalid_at and valid_in # for valid_at, invalid_at and valid_in
valid_at: valid_at:
@ -679,12 +679,12 @@ EXAMPLES = r'''
ten_seconds: "+10" ten_seconds: "+10"
register: result register: result
- openssl_csr_info: - community.crypto.openssl_csr_info:
# Verifies that the CSR signature is valid; module will fail if not # Verifies that the CSR signature is valid; module will fail if not
path: /etc/ssl/csr/ansible.com.csr path: /etc/ssl/csr/ansible.com.csr
register: result_csr register: result_csr
- openssl_privatekey_info: - community.crypto.openssl_privatekey_info:
path: /etc/ssl/csr/ansible.com.key path: /etc/ssl/csr/ansible.com.key
register: result_privatekey register: result_privatekey
@ -730,7 +730,7 @@ EXAMPLES = r'''
# How to use the assertonly provider to implement and trigger your own custom certificate generation workflow: # How to use the assertonly provider to implement and trigger your own custom certificate generation workflow:
- name: Check if a certificate is currently still valid, ignoring failures - name: Check if a certificate is currently still valid, ignoring failures
openssl_certificate: community.crypto.openssl_certificate:
path: /etc/ssl/crt/example.com.crt path: /etc/ssl/crt/example.com.crt
provider: assertonly provider: assertonly
has_expired: no has_expired: no
@ -742,7 +742,7 @@ EXAMPLES = r'''
when: validity_check.failed when: validity_check.failed
- name: Check the new certificate again for validity with the same parameters, this time failing the play if it is still invalid - name: Check the new certificate again for validity with the same parameters, this time failing the play if it is still invalid
openssl_certificate: community.crypto.openssl_certificate:
path: /etc/ssl/crt/example.com.crt path: /etc/ssl/crt/example.com.crt
provider: assertonly provider: assertonly
has_expired: no has_expired: no
@ -750,7 +750,7 @@ EXAMPLES = r'''
# Some other checks that assertonly could be used for: # Some other checks that assertonly could be used for:
- name: Verify that an existing certificate was issued by the Let's Encrypt CA and is currently still valid - name: Verify that an existing certificate was issued by the Let's Encrypt CA and is currently still valid
openssl_certificate: community.crypto.openssl_certificate:
path: /etc/ssl/crt/example.com.crt path: /etc/ssl/crt/example.com.crt
provider: assertonly provider: assertonly
issuer: issuer:
@ -758,7 +758,7 @@ EXAMPLES = r'''
has_expired: no has_expired: no
- name: Ensure that a certificate uses a modern signature algorithm (no SHA1, MD5 or DSA) - name: Ensure that a certificate uses a modern signature algorithm (no SHA1, MD5 or DSA)
openssl_certificate: community.crypto.openssl_certificate:
path: /etc/ssl/crt/example.com.crt path: /etc/ssl/crt/example.com.crt
provider: assertonly provider: assertonly
signature_algorithms: signature_algorithms:
@ -772,25 +772,25 @@ EXAMPLES = r'''
- sha512WithECDSAEncryption - sha512WithECDSAEncryption
- name: Ensure that the existing certificate belongs to the specified private key - name: Ensure that the existing certificate belongs to the specified private key
openssl_certificate: community.crypto.openssl_certificate:
path: /etc/ssl/crt/example.com.crt path: /etc/ssl/crt/example.com.crt
privatekey_path: /etc/ssl/private/example.com.pem privatekey_path: /etc/ssl/private/example.com.pem
provider: assertonly provider: assertonly
- name: Ensure that the existing certificate is still valid at the winter solstice 2017 - name: Ensure that the existing certificate is still valid at the winter solstice 2017
openssl_certificate: community.crypto.openssl_certificate:
path: /etc/ssl/crt/example.com.crt path: /etc/ssl/crt/example.com.crt
provider: assertonly provider: assertonly
valid_at: 20171221162800Z valid_at: 20171221162800Z
- name: Ensure that the existing certificate is still valid 2 weeks (1209600 seconds) from now - name: Ensure that the existing certificate is still valid 2 weeks (1209600 seconds) from now
openssl_certificate: community.crypto.openssl_certificate:
path: /etc/ssl/crt/example.com.crt path: /etc/ssl/crt/example.com.crt
provider: assertonly provider: assertonly
valid_in: 1209600 valid_in: 1209600
- name: Ensure that the existing certificate is only used for digital signatures and encrypting other keys - name: Ensure that the existing certificate is only used for digital signatures and encrypting other keys
openssl_certificate: community.crypto.openssl_certificate:
path: /etc/ssl/crt/example.com.crt path: /etc/ssl/crt/example.com.crt
provider: assertonly provider: assertonly
key_usage: key_usage:
@ -799,14 +799,14 @@ EXAMPLES = r'''
key_usage_strict: true key_usage_strict: true
- name: Ensure that the existing certificate can be used for client authentication - name: Ensure that the existing certificate can be used for client authentication
openssl_certificate: community.crypto.openssl_certificate:
path: /etc/ssl/crt/example.com.crt path: /etc/ssl/crt/example.com.crt
provider: assertonly provider: assertonly
extended_key_usage: extended_key_usage:
- clientAuth - clientAuth
- name: Ensure that the existing certificate can only be used for client authentication and time stamping - name: Ensure that the existing certificate can only be used for client authentication and time stamping
openssl_certificate: community.crypto.openssl_certificate:
path: /etc/ssl/crt/example.com.crt path: /etc/ssl/crt/example.com.crt
provider: assertonly provider: assertonly
extended_key_usage: extended_key_usage:
@ -815,7 +815,7 @@ EXAMPLES = r'''
extended_key_usage_strict: true extended_key_usage_strict: true
- name: Ensure that the existing certificate has a certain domain in its subjectAltName - name: Ensure that the existing certificate has a certain domain in its subjectAltName
openssl_certificate: community.crypto.openssl_certificate:
path: /etc/ssl/crt/example.com.crt path: /etc/ssl/crt/example.com.crt
provider: assertonly provider: assertonly
subject_alt_name: subject_alt_name:

View File

@ -72,7 +72,7 @@ seealso:
EXAMPLES = r''' EXAMPLES = r'''
- name: Generate a Self Signed OpenSSL certificate - name: Generate a Self Signed OpenSSL certificate
openssl_certificate: community.crypto.openssl_certificate:
path: /etc/ssl/crt/ansible.com.crt path: /etc/ssl/crt/ansible.com.crt
privatekey_path: /etc/ssl/private/ansible.com.pem privatekey_path: /etc/ssl/private/ansible.com.pem
csr_path: /etc/ssl/csr/ansible.com.csr csr_path: /etc/ssl/csr/ansible.com.csr
@ -82,7 +82,7 @@ EXAMPLES = r'''
# Get information on the certificate # Get information on the certificate
- name: Get information on generated certificate - name: Get information on generated certificate
openssl_certificate_info: community.crypto.openssl_certificate_info:
path: /etc/ssl/crt/ansible.com.crt path: /etc/ssl/crt/ansible.com.crt
register: result register: result
@ -97,7 +97,7 @@ EXAMPLES = r'''
# makes the playbook fail in case something is not as expected. # makes the playbook fail in case something is not as expected.
- name: Test whether that certificate is valid tomorrow and/or in three weeks - name: Test whether that certificate is valid tomorrow and/or in three weeks
openssl_certificate_info: community.crypto.openssl_certificate_info:
path: /etc/ssl/crt/ansible.com.crt path: /etc/ssl/crt/ansible.com.crt
valid_at: valid_at:
point_1: "+1d" point_1: "+1d"

View File

@ -286,26 +286,26 @@ seealso:
EXAMPLES = r''' EXAMPLES = r'''
- name: Generate an OpenSSL Certificate Signing Request - name: Generate an OpenSSL Certificate Signing Request
openssl_csr: community.crypto.openssl_csr:
path: /etc/ssl/csr/www.ansible.com.csr path: /etc/ssl/csr/www.ansible.com.csr
privatekey_path: /etc/ssl/private/ansible.com.pem privatekey_path: /etc/ssl/private/ansible.com.pem
common_name: www.ansible.com common_name: www.ansible.com
- name: Generate an OpenSSL Certificate Signing Request with an inline key - name: Generate an OpenSSL Certificate Signing Request with an inline key
openssl_csr: community.crypto.openssl_csr:
path: /etc/ssl/csr/www.ansible.com.csr path: /etc/ssl/csr/www.ansible.com.csr
privatekey_content: "{{ private_key_content }}" privatekey_content: "{{ private_key_content }}"
common_name: www.ansible.com common_name: www.ansible.com
- name: Generate an OpenSSL Certificate Signing Request with a passphrase protected private key - name: Generate an OpenSSL Certificate Signing Request with a passphrase protected private key
openssl_csr: community.crypto.openssl_csr:
path: /etc/ssl/csr/www.ansible.com.csr path: /etc/ssl/csr/www.ansible.com.csr
privatekey_path: /etc/ssl/private/ansible.com.pem privatekey_path: /etc/ssl/private/ansible.com.pem
privatekey_passphrase: ansible privatekey_passphrase: ansible
common_name: www.ansible.com common_name: www.ansible.com
- name: Generate an OpenSSL Certificate Signing Request with Subject information - name: Generate an OpenSSL Certificate Signing Request with Subject information
openssl_csr: community.crypto.openssl_csr:
path: /etc/ssl/csr/www.ansible.com.csr path: /etc/ssl/csr/www.ansible.com.csr
privatekey_path: /etc/ssl/private/ansible.com.pem privatekey_path: /etc/ssl/private/ansible.com.pem
country_name: FR country_name: FR
@ -314,13 +314,13 @@ EXAMPLES = r'''
common_name: www.ansible.com common_name: www.ansible.com
- name: Generate an OpenSSL Certificate Signing Request with subjectAltName extension - name: Generate an OpenSSL Certificate Signing Request with subjectAltName extension
openssl_csr: community.crypto.openssl_csr:
path: /etc/ssl/csr/www.ansible.com.csr path: /etc/ssl/csr/www.ansible.com.csr
privatekey_path: /etc/ssl/private/ansible.com.pem privatekey_path: /etc/ssl/private/ansible.com.pem
subject_alt_name: 'DNS:www.ansible.com,DNS:m.ansible.com' subject_alt_name: 'DNS:www.ansible.com,DNS:m.ansible.com'
- name: Generate an OpenSSL CSR with subjectAltName extension with dynamic list - name: Generate an OpenSSL CSR with subjectAltName extension with dynamic list
openssl_csr: community.crypto.openssl_csr:
path: /etc/ssl/csr/www.ansible.com.csr path: /etc/ssl/csr/www.ansible.com.csr
privatekey_path: /etc/ssl/private/ansible.com.pem privatekey_path: /etc/ssl/private/ansible.com.pem
subject_alt_name: "{{ item.value | map('regex_replace', '^', 'DNS:') | list }}" subject_alt_name: "{{ item.value | map('regex_replace', '^', 'DNS:') | list }}"
@ -330,14 +330,14 @@ EXAMPLES = r'''
- m.ansible.com - m.ansible.com
- name: Force regenerate an OpenSSL Certificate Signing Request - name: Force regenerate an OpenSSL Certificate Signing Request
openssl_csr: community.crypto.openssl_csr:
path: /etc/ssl/csr/www.ansible.com.csr path: /etc/ssl/csr/www.ansible.com.csr
privatekey_path: /etc/ssl/private/ansible.com.pem privatekey_path: /etc/ssl/private/ansible.com.pem
force: yes force: yes
common_name: www.ansible.com common_name: www.ansible.com
- name: Generate an OpenSSL Certificate Signing Request with special key usages - name: Generate an OpenSSL Certificate Signing Request with special key usages
openssl_csr: community.crypto.openssl_csr:
path: /etc/ssl/csr/www.ansible.com.csr path: /etc/ssl/csr/www.ansible.com.csr
privatekey_path: /etc/ssl/private/ansible.com.pem privatekey_path: /etc/ssl/private/ansible.com.pem
common_name: www.ansible.com common_name: www.ansible.com
@ -348,7 +348,7 @@ EXAMPLES = r'''
- clientAuth - clientAuth
- name: Generate an OpenSSL Certificate Signing Request with OCSP Must Staple - name: Generate an OpenSSL Certificate Signing Request with OCSP Must Staple
openssl_csr: community.crypto.openssl_csr:
path: /etc/ssl/csr/www.ansible.com.csr path: /etc/ssl/csr/www.ansible.com.csr
privatekey_path: /etc/ssl/private/ansible.com.pem privatekey_path: /etc/ssl/private/ansible.com.pem
common_name: www.ansible.com common_name: www.ansible.com

View File

@ -59,13 +59,13 @@ seealso:
EXAMPLES = r''' EXAMPLES = r'''
- name: Generate an OpenSSL Certificate Signing Request - name: Generate an OpenSSL Certificate Signing Request
openssl_csr: community.crypto.openssl_csr:
path: /etc/ssl/csr/www.ansible.com.csr path: /etc/ssl/csr/www.ansible.com.csr
privatekey_path: /etc/ssl/private/ansible.com.pem privatekey_path: /etc/ssl/private/ansible.com.pem
common_name: www.ansible.com common_name: www.ansible.com
- name: Get information on the CSR - name: Get information on the CSR
openssl_csr_info: community.crypto.openssl_csr_info:
path: /etc/ssl/csr/www.ansible.com.csr path: /etc/ssl/csr/www.ansible.com.csr
register: result register: result

View File

@ -84,16 +84,16 @@ seealso:
EXAMPLES = r''' EXAMPLES = r'''
- name: Generate Diffie-Hellman parameters with the default size (4096 bits) - name: Generate Diffie-Hellman parameters with the default size (4096 bits)
openssl_dhparam: community.crypto.openssl_dhparam:
path: /etc/ssl/dhparams.pem path: /etc/ssl/dhparams.pem
- name: Generate DH Parameters with a different size (2048 bits) - name: Generate DH Parameters with a different size (2048 bits)
openssl_dhparam: community.crypto.openssl_dhparam:
path: /etc/ssl/dhparams.pem path: /etc/ssl/dhparams.pem
size: 2048 size: 2048
- name: Force regenerate an DH parameters if they already exist - name: Force regenerate an DH parameters if they already exist
openssl_dhparam: community.crypto.openssl_dhparam:
path: /etc/ssl/dhparams.pem path: /etc/ssl/dhparams.pem
force: yes force: yes
''' '''

View File

@ -110,7 +110,7 @@ seealso:
EXAMPLES = r''' EXAMPLES = r'''
- name: Generate PKCS#12 file - name: Generate PKCS#12 file
openssl_pkcs12: community.crypto.openssl_pkcs12:
action: export action: export
path: /opt/certs/ansible.p12 path: /opt/certs/ansible.p12
friendly_name: raclette friendly_name: raclette
@ -120,7 +120,7 @@ EXAMPLES = r'''
state: present state: present
- name: Change PKCS#12 file permission - name: Change PKCS#12 file permission
openssl_pkcs12: community.crypto.openssl_pkcs12:
action: export action: export
path: /opt/certs/ansible.p12 path: /opt/certs/ansible.p12
friendly_name: raclette friendly_name: raclette
@ -131,7 +131,7 @@ EXAMPLES = r'''
mode: '0600' mode: '0600'
- name: Regen PKCS#12 file - name: Regen PKCS#12 file
openssl_pkcs12: community.crypto.openssl_pkcs12:
action: export action: export
src: /opt/certs/ansible.p12 src: /opt/certs/ansible.p12
path: /opt/certs/ansible.p12 path: /opt/certs/ansible.p12
@ -144,14 +144,14 @@ EXAMPLES = r'''
force: yes force: yes
- name: Dump/Parse PKCS#12 file - name: Dump/Parse PKCS#12 file
openssl_pkcs12: community.crypto.openssl_pkcs12:
action: parse action: parse
src: /opt/certs/ansible.p12 src: /opt/certs/ansible.p12
path: /opt/certs/ansible.pem path: /opt/certs/ansible.pem
state: present state: present
- name: Remove PKCS#12 file - name: Remove PKCS#12 file
openssl_pkcs12: community.crypto.openssl_pkcs12:
path: /opt/certs/ansible.p12 path: /opt/certs/ansible.p12
state: absent state: absent
''' '''

View File

@ -199,27 +199,27 @@ seealso:
EXAMPLES = r''' EXAMPLES = r'''
- name: Generate an OpenSSL private key with the default values (4096 bits, RSA) - name: Generate an OpenSSL private key with the default values (4096 bits, RSA)
openssl_privatekey: community.crypto.openssl_privatekey:
path: /etc/ssl/private/ansible.com.pem path: /etc/ssl/private/ansible.com.pem
- name: Generate an OpenSSL private key with the default values (4096 bits, RSA) and a passphrase - name: Generate an OpenSSL private key with the default values (4096 bits, RSA) and a passphrase
openssl_privatekey: community.crypto.openssl_privatekey:
path: /etc/ssl/private/ansible.com.pem path: /etc/ssl/private/ansible.com.pem
passphrase: ansible passphrase: ansible
cipher: aes256 cipher: aes256
- name: Generate an OpenSSL private key with a different size (2048 bits) - name: Generate an OpenSSL private key with a different size (2048 bits)
openssl_privatekey: community.crypto.openssl_privatekey:
path: /etc/ssl/private/ansible.com.pem path: /etc/ssl/private/ansible.com.pem
size: 2048 size: 2048
- name: Force regenerate an OpenSSL private key if it already exists - name: Force regenerate an OpenSSL private key if it already exists
openssl_privatekey: community.crypto.openssl_privatekey:
path: /etc/ssl/private/ansible.com.pem path: /etc/ssl/private/ansible.com.pem
force: yes force: yes
- name: Generate an OpenSSL private key with a different algorithm (DSA) - name: Generate an OpenSSL private key with a different algorithm (DSA)
openssl_privatekey: community.crypto.openssl_privatekey:
path: /etc/ssl/private/ansible.com.pem path: /etc/ssl/private/ansible.com.pem
type: DSA type: DSA
''' '''

View File

@ -73,11 +73,11 @@ seealso:
EXAMPLES = r''' EXAMPLES = r'''
- name: Generate an OpenSSL private key with the default values (4096 bits, RSA) - name: Generate an OpenSSL private key with the default values (4096 bits, RSA)
openssl_privatekey: community.crypto.openssl_privatekey:
path: /etc/ssl/private/ansible.com.pem path: /etc/ssl/private/ansible.com.pem
- name: Get information on generated key - name: Get information on generated key
openssl_privatekey_info: community.crypto.openssl_privatekey_info:
path: /etc/ssl/private/ansible.com.pem path: /etc/ssl/private/ansible.com.pem
register: result register: result

View File

@ -101,35 +101,35 @@ seealso:
EXAMPLES = r''' EXAMPLES = r'''
- name: Generate an OpenSSL public key in PEM format - name: Generate an OpenSSL public key in PEM format
openssl_publickey: community.crypto.openssl_publickey:
path: /etc/ssl/public/ansible.com.pem path: /etc/ssl/public/ansible.com.pem
privatekey_path: /etc/ssl/private/ansible.com.pem privatekey_path: /etc/ssl/private/ansible.com.pem
- name: Generate an OpenSSL public key in PEM format from an inline key - name: Generate an OpenSSL public key in PEM format from an inline key
openssl_publickey: community.crypto.openssl_publickey:
path: /etc/ssl/public/ansible.com.pem path: /etc/ssl/public/ansible.com.pem
privatekey_content: "{{ private_key_content }}" privatekey_content: "{{ private_key_content }}"
- name: Generate an OpenSSL public key in OpenSSH v2 format - name: Generate an OpenSSL public key in OpenSSH v2 format
openssl_publickey: community.crypto.openssl_publickey:
path: /etc/ssl/public/ansible.com.pem path: /etc/ssl/public/ansible.com.pem
privatekey_path: /etc/ssl/private/ansible.com.pem privatekey_path: /etc/ssl/private/ansible.com.pem
format: OpenSSH format: OpenSSH
- name: Generate an OpenSSL public key with a passphrase protected private key - name: Generate an OpenSSL public key with a passphrase protected private key
openssl_publickey: community.crypto.openssl_publickey:
path: /etc/ssl/public/ansible.com.pem path: /etc/ssl/public/ansible.com.pem
privatekey_path: /etc/ssl/private/ansible.com.pem privatekey_path: /etc/ssl/private/ansible.com.pem
privatekey_passphrase: ansible privatekey_passphrase: ansible
- name: Force regenerate an OpenSSL public key if it already exists - name: Force regenerate an OpenSSL public key if it already exists
openssl_publickey: community.crypto.openssl_publickey:
path: /etc/ssl/public/ansible.com.pem path: /etc/ssl/public/ansible.com.pem
privatekey_path: /etc/ssl/private/ansible.com.pem privatekey_path: /etc/ssl/private/ansible.com.pem
force: yes force: yes
- name: Remove an OpenSSL public key - name: Remove an OpenSSL public key
openssl_publickey: community.crypto.openssl_publickey:
path: /etc/ssl/public/ansible.com.pem path: /etc/ssl/public/ansible.com.pem
state: absent state: absent
''' '''

View File

@ -230,7 +230,7 @@ notes:
EXAMPLES = r''' EXAMPLES = r'''
- name: Generate a CRL - name: Generate a CRL
x509_crl: community.crypto.x509_crl:
path: /etc/ssl/my-ca.crl path: /etc/ssl/my-ca.crl
privatekey_path: /etc/ssl/private/my-ca.pem privatekey_path: /etc/ssl/private/my-ca.pem
issuer: issuer:

View File

@ -42,7 +42,7 @@ seealso:
EXAMPLES = r''' EXAMPLES = r'''
- name: Get information on CRL - name: Get information on CRL
x509_crl_info: community.crypto.x509_crl_info:
path: /etc/ssl/my-ca.crl path: /etc/ssl/my-ca.crl
register: result register: result