2020-03-09 10:11:07 +01:00
|
|
|
#!/usr/bin/python
|
|
|
|
# -*- coding: utf-8 -*-
|
|
|
|
|
|
|
|
# (c) 2016, Guillaume Grossetie <ggrossetie@yuzutech.fr>
|
|
|
|
# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt)
|
|
|
|
|
|
|
|
from __future__ import (absolute_import, division, print_function)
|
|
|
|
__metaclass__ = type
|
|
|
|
|
|
|
|
|
|
|
|
DOCUMENTATION = '''
|
|
|
|
---
|
|
|
|
module: java_keystore
|
|
|
|
short_description: Create or delete a Java keystore in JKS format.
|
|
|
|
description:
|
|
|
|
- Create or delete a Java keystore in JKS format for a given certificate.
|
|
|
|
options:
|
|
|
|
name:
|
2020-11-04 09:02:50 +01:00
|
|
|
type: str
|
2020-03-09 10:11:07 +01:00
|
|
|
description:
|
|
|
|
- Name of the certificate.
|
|
|
|
required: true
|
|
|
|
certificate:
|
2020-11-04 09:02:50 +01:00
|
|
|
type: str
|
2020-03-09 10:11:07 +01:00
|
|
|
description:
|
|
|
|
- Certificate that should be used to create the key store.
|
|
|
|
required: true
|
|
|
|
private_key:
|
2020-11-04 09:02:50 +01:00
|
|
|
type: str
|
2020-03-09 10:11:07 +01:00
|
|
|
description:
|
|
|
|
- Private key that should be used to create the key store.
|
|
|
|
required: true
|
2020-05-25 10:09:18 +02:00
|
|
|
private_key_passphrase:
|
|
|
|
description:
|
|
|
|
- Pass phrase for reading the private key, if required.
|
|
|
|
type: str
|
|
|
|
required: false
|
2020-06-13 15:01:19 +02:00
|
|
|
version_added: '0.2.0'
|
2020-03-09 10:11:07 +01:00
|
|
|
password:
|
2020-11-04 09:02:50 +01:00
|
|
|
type: str
|
2020-03-09 10:11:07 +01:00
|
|
|
description:
|
|
|
|
- Password that should be used to secure the key store.
|
|
|
|
required: true
|
|
|
|
dest:
|
2020-11-04 09:02:50 +01:00
|
|
|
type: path
|
2020-03-09 10:11:07 +01:00
|
|
|
description:
|
|
|
|
- Absolute path where the jks should be generated.
|
|
|
|
required: true
|
|
|
|
owner:
|
|
|
|
description:
|
|
|
|
- Name of the user that should own jks file.
|
|
|
|
required: false
|
|
|
|
group:
|
|
|
|
description:
|
|
|
|
- Name of the group that should own jks file.
|
|
|
|
required: false
|
|
|
|
mode:
|
|
|
|
description:
|
|
|
|
- Mode the file should be.
|
|
|
|
required: false
|
|
|
|
force:
|
|
|
|
description:
|
|
|
|
- Key store will be created even if it already exists.
|
|
|
|
required: false
|
|
|
|
type: bool
|
|
|
|
default: 'no'
|
|
|
|
requirements: [openssl, keytool]
|
|
|
|
author: Guillaume Grossetie (@Mogztter)
|
2020-11-04 09:02:50 +01:00
|
|
|
extends_documentation_fragment:
|
|
|
|
- files
|
|
|
|
|
2020-03-09 10:11:07 +01:00
|
|
|
'''
|
|
|
|
|
|
|
|
EXAMPLES = '''
|
2020-05-05 14:09:33 +02:00
|
|
|
- name: Create a key store for the given certificate (inline)
|
2020-07-13 21:50:31 +02:00
|
|
|
community.general.java_keystore:
|
2020-03-09 10:11:07 +01:00
|
|
|
name: example
|
|
|
|
certificate: |
|
|
|
|
-----BEGIN CERTIFICATE-----
|
|
|
|
h19dUZ2co2fI/ibYiwxWk4aeNE6KWvCaTQOMQ8t6Uo2XKhpL/xnjoAgh1uCQN/69
|
|
|
|
MG+34+RhUWzCfdZH7T8/qDxJw2kEPKluaYh7KnMsba+5jHjmtzix5QIDAQABo4IB
|
|
|
|
-----END CERTIFICATE-----
|
|
|
|
private_key: |
|
|
|
|
-----BEGIN RSA PRIVATE KEY-----
|
|
|
|
DBVFTEVDVFJJQ0lURSBERSBGUkFOQ0UxFzAVBgNVBAsMDjAwMDIgNTUyMDgxMzE3
|
|
|
|
GLlDNMw/uHyME7gHFsqJA7O11VY6O5WQ4IDP3m/s5ZV6s+Nn6Lerz17VZ99
|
|
|
|
-----END RSA PRIVATE KEY-----
|
|
|
|
password: changeit
|
|
|
|
dest: /etc/security/keystore.jks
|
|
|
|
|
2020-05-05 14:09:33 +02:00
|
|
|
- name: Create a key store for the given certificate (lookup)
|
2020-07-13 21:50:31 +02:00
|
|
|
community.general.java_keystore:
|
2020-03-09 10:11:07 +01:00
|
|
|
name: example
|
|
|
|
certificate: "{{lookup('file', '/path/to/certificate.crt') }}"
|
|
|
|
private_key: "{{lookup('file', '/path/to/private.key') }}"
|
|
|
|
password: changeit
|
|
|
|
dest: /etc/security/keystore.jks
|
|
|
|
'''
|
|
|
|
|
|
|
|
RETURN = '''
|
|
|
|
msg:
|
|
|
|
description: Output from stdout of keytool/openssl command after execution of given command or an error.
|
|
|
|
returned: changed and failure
|
|
|
|
type: str
|
|
|
|
sample: "Unable to find the current certificate fingerprint in ..."
|
|
|
|
|
|
|
|
rc:
|
|
|
|
description: keytool/openssl command execution return value
|
|
|
|
returned: changed and failure
|
|
|
|
type: int
|
|
|
|
sample: "0"
|
|
|
|
|
|
|
|
cmd:
|
|
|
|
description: Executed command to get action done
|
|
|
|
returned: changed and failure
|
|
|
|
type: str
|
2021-04-05 15:19:17 +02:00
|
|
|
sample: "/usr/bin/openssl x509 -noout -in /tmp/user/1000/tmp8jd_lh23 -fingerprint -sha256"
|
2020-03-09 10:11:07 +01:00
|
|
|
'''
|
|
|
|
|
|
|
|
|
|
|
|
import os
|
|
|
|
import re
|
2021-04-05 15:19:17 +02:00
|
|
|
import tempfile
|
|
|
|
|
|
|
|
from ansible.module_utils.basic import AnsibleModule
|
2020-03-09 10:11:07 +01:00
|
|
|
|
|
|
|
|
|
|
|
def read_certificate_fingerprint(module, openssl_bin, certificate_path):
|
2020-05-25 10:09:18 +02:00
|
|
|
current_certificate_fingerprint_cmd = [openssl_bin, "x509", "-noout", "-in", certificate_path, "-fingerprint", "-sha256"]
|
2020-03-09 10:11:07 +01:00
|
|
|
(rc, current_certificate_fingerprint_out, current_certificate_fingerprint_err) = run_commands(module, current_certificate_fingerprint_cmd)
|
|
|
|
if rc != 0:
|
|
|
|
return module.fail_json(msg=current_certificate_fingerprint_out,
|
|
|
|
err=current_certificate_fingerprint_err,
|
|
|
|
rc=rc,
|
|
|
|
cmd=current_certificate_fingerprint_cmd)
|
|
|
|
|
|
|
|
current_certificate_match = re.search(r"=([\w:]+)", current_certificate_fingerprint_out)
|
|
|
|
if not current_certificate_match:
|
|
|
|
return module.fail_json(
|
|
|
|
msg="Unable to find the current certificate fingerprint in %s" % current_certificate_fingerprint_out,
|
|
|
|
rc=rc,
|
|
|
|
cmd=current_certificate_fingerprint_err
|
|
|
|
)
|
|
|
|
|
|
|
|
return current_certificate_match.group(1)
|
|
|
|
|
|
|
|
|
|
|
|
def read_stored_certificate_fingerprint(module, keytool_bin, alias, keystore_path, keystore_password):
|
2021-04-05 18:45:06 +02:00
|
|
|
stored_certificate_fingerprint_cmd = [keytool_bin, "-list", "-alias", alias, "-keystore", keystore_path, "-storepass:env", "STOREPASS", "-v"]
|
|
|
|
(rc, stored_certificate_fingerprint_out, stored_certificate_fingerprint_err) = run_commands(
|
|
|
|
module, stored_certificate_fingerprint_cmd, environ_update=dict(STOREPASS=keystore_password))
|
2020-03-09 10:11:07 +01:00
|
|
|
if rc != 0:
|
|
|
|
if "keytool error: java.lang.Exception: Alias <%s> does not exist" % alias not in stored_certificate_fingerprint_out:
|
|
|
|
return module.fail_json(msg=stored_certificate_fingerprint_out,
|
|
|
|
err=stored_certificate_fingerprint_err,
|
|
|
|
rc=rc,
|
|
|
|
cmd=stored_certificate_fingerprint_cmd)
|
|
|
|
else:
|
|
|
|
return None
|
|
|
|
else:
|
|
|
|
stored_certificate_match = re.search(r"SHA256: ([\w:]+)", stored_certificate_fingerprint_out)
|
|
|
|
if not stored_certificate_match:
|
|
|
|
return module.fail_json(
|
|
|
|
msg="Unable to find the stored certificate fingerprint in %s" % stored_certificate_fingerprint_out,
|
|
|
|
rc=rc,
|
|
|
|
cmd=stored_certificate_fingerprint_cmd
|
|
|
|
)
|
|
|
|
|
|
|
|
return stored_certificate_match.group(1)
|
|
|
|
|
|
|
|
|
2021-04-05 18:45:06 +02:00
|
|
|
def run_commands(module, cmd, data=None, environ_update=None, check_rc=True):
|
|
|
|
return module.run_command(cmd, check_rc=check_rc, data=data, environ_update=environ_update)
|
2020-03-09 10:11:07 +01:00
|
|
|
|
|
|
|
|
2021-04-05 15:19:17 +02:00
|
|
|
def create_path():
|
|
|
|
tmpfd, tmpfile = tempfile.mkstemp()
|
|
|
|
os.remove(tmpfile)
|
|
|
|
return tmpfile
|
|
|
|
|
|
|
|
|
|
|
|
def create_file(content):
|
|
|
|
tmpfd, tmpfile = tempfile.mkstemp()
|
|
|
|
with os.fdopen(tmpfd, 'w') as f:
|
2020-03-09 10:11:07 +01:00
|
|
|
f.write(content)
|
2021-04-05 15:19:17 +02:00
|
|
|
return tmpfile
|
2020-03-09 10:11:07 +01:00
|
|
|
|
|
|
|
|
|
|
|
def create_tmp_certificate(module):
|
2021-04-05 15:19:17 +02:00
|
|
|
return create_file(module.params['certificate'])
|
2020-03-09 10:11:07 +01:00
|
|
|
|
|
|
|
|
|
|
|
def create_tmp_private_key(module):
|
2021-04-05 15:19:17 +02:00
|
|
|
return create_file(module.params['private_key'])
|
2020-03-09 10:11:07 +01:00
|
|
|
|
|
|
|
|
|
|
|
def cert_changed(module, openssl_bin, keytool_bin, keystore_path, keystore_pass, alias):
|
|
|
|
certificate_path = create_tmp_certificate(module)
|
|
|
|
try:
|
|
|
|
current_certificate_fingerprint = read_certificate_fingerprint(module, openssl_bin, certificate_path)
|
|
|
|
stored_certificate_fingerprint = read_stored_certificate_fingerprint(module, keytool_bin, alias, keystore_path, keystore_pass)
|
|
|
|
return current_certificate_fingerprint != stored_certificate_fingerprint
|
|
|
|
finally:
|
|
|
|
os.remove(certificate_path)
|
|
|
|
|
|
|
|
|
2020-05-25 10:09:18 +02:00
|
|
|
def create_jks(module, name, openssl_bin, keytool_bin, keystore_path, password, keypass):
|
2020-03-09 10:11:07 +01:00
|
|
|
if module.check_mode:
|
|
|
|
module.exit_json(changed=True)
|
|
|
|
else:
|
|
|
|
certificate_path = create_tmp_certificate(module)
|
|
|
|
private_key_path = create_tmp_private_key(module)
|
2021-04-05 15:19:17 +02:00
|
|
|
keystore_p12_path = create_path()
|
2020-03-09 10:11:07 +01:00
|
|
|
try:
|
|
|
|
if os.path.exists(keystore_path):
|
|
|
|
os.remove(keystore_path)
|
|
|
|
|
2020-05-25 10:09:18 +02:00
|
|
|
export_p12_cmd = [openssl_bin, "pkcs12", "-export", "-name", name, "-in", certificate_path,
|
2021-04-05 15:19:17 +02:00
|
|
|
"-inkey", private_key_path, "-out", keystore_p12_path, "-passout", "stdin"]
|
2020-05-25 10:09:18 +02:00
|
|
|
|
|
|
|
# when keypass is provided, add -passin
|
|
|
|
cmd_stdin = ""
|
|
|
|
if keypass:
|
|
|
|
export_p12_cmd.append("-passin")
|
|
|
|
export_p12_cmd.append("stdin")
|
|
|
|
cmd_stdin = "%s\n" % keypass
|
|
|
|
|
|
|
|
cmd_stdin += "%s\n%s" % (password, password)
|
|
|
|
(rc, export_p12_out, export_p12_err) = run_commands(module, export_p12_cmd, data=cmd_stdin)
|
2020-03-09 10:11:07 +01:00
|
|
|
if rc != 0:
|
|
|
|
return module.fail_json(msg=export_p12_out,
|
|
|
|
rc=rc,
|
|
|
|
cmd=export_p12_cmd)
|
|
|
|
|
2020-05-25 10:09:18 +02:00
|
|
|
import_keystore_cmd = [keytool_bin, "-importkeystore",
|
|
|
|
"-destkeystore", keystore_path,
|
|
|
|
"-srckeystore", keystore_p12_path,
|
|
|
|
"-srcstoretype", "pkcs12",
|
|
|
|
"-alias", name,
|
2021-04-05 18:45:06 +02:00
|
|
|
"-deststorepass:env", "STOREPASS",
|
|
|
|
"-srcstorepass:env", "STOREPASS",
|
2020-05-25 10:09:18 +02:00
|
|
|
"-noprompt"]
|
2021-04-05 18:45:06 +02:00
|
|
|
|
|
|
|
(rc, import_keystore_out, import_keystore_err) = run_commands(module, import_keystore_cmd, data=None,
|
|
|
|
environ_update=dict(STOREPASS=password))
|
2020-03-09 10:11:07 +01:00
|
|
|
if rc == 0:
|
|
|
|
update_jks_perm(module, keystore_path)
|
|
|
|
return module.exit_json(changed=True,
|
|
|
|
msg=import_keystore_out,
|
|
|
|
rc=rc,
|
|
|
|
cmd=import_keystore_cmd,
|
|
|
|
stdout_lines=import_keystore_out)
|
|
|
|
else:
|
|
|
|
return module.fail_json(msg=import_keystore_out,
|
|
|
|
rc=rc,
|
|
|
|
cmd=import_keystore_cmd)
|
|
|
|
finally:
|
|
|
|
os.remove(certificate_path)
|
|
|
|
os.remove(private_key_path)
|
2021-04-05 15:19:17 +02:00
|
|
|
os.remove(keystore_p12_path)
|
2020-03-09 10:11:07 +01:00
|
|
|
|
|
|
|
|
|
|
|
def update_jks_perm(module, keystore_path):
|
2020-05-08 15:38:23 +02:00
|
|
|
try:
|
|
|
|
file_args = module.load_file_common_arguments(module.params, path=keystore_path)
|
|
|
|
except TypeError:
|
2020-06-16 21:24:42 +02:00
|
|
|
# The path argument is only supported in Ansible-base 2.10+. Fall back to
|
2020-05-08 15:38:23 +02:00
|
|
|
# pre-2.10 behavior for older Ansible versions.
|
|
|
|
module.params['path'] = keystore_path
|
|
|
|
file_args = module.load_file_common_arguments(module.params)
|
2020-03-09 10:11:07 +01:00
|
|
|
module.set_fs_attributes_if_different(file_args, False)
|
|
|
|
|
|
|
|
|
|
|
|
def process_jks(module):
|
|
|
|
name = module.params['name']
|
|
|
|
password = module.params['password']
|
2020-05-25 10:09:18 +02:00
|
|
|
keypass = module.params['private_key_passphrase']
|
2020-03-09 10:11:07 +01:00
|
|
|
keystore_path = module.params['dest']
|
|
|
|
force = module.params['force']
|
|
|
|
openssl_bin = module.get_bin_path('openssl', True)
|
|
|
|
keytool_bin = module.get_bin_path('keytool', True)
|
|
|
|
|
|
|
|
if os.path.exists(keystore_path):
|
|
|
|
if force:
|
2020-05-25 10:09:18 +02:00
|
|
|
create_jks(module, name, openssl_bin, keytool_bin, keystore_path, password, keypass)
|
2020-03-09 10:11:07 +01:00
|
|
|
else:
|
|
|
|
if cert_changed(module, openssl_bin, keytool_bin, keystore_path, password, name):
|
2020-05-25 10:09:18 +02:00
|
|
|
create_jks(module, name, openssl_bin, keytool_bin, keystore_path, password, keypass)
|
2020-03-09 10:11:07 +01:00
|
|
|
else:
|
|
|
|
if not module.check_mode:
|
|
|
|
update_jks_perm(module, keystore_path)
|
|
|
|
return module.exit_json(changed=False)
|
|
|
|
else:
|
2020-05-25 10:09:18 +02:00
|
|
|
create_jks(module, name, openssl_bin, keytool_bin, keystore_path, password, keypass)
|
2020-03-09 10:11:07 +01:00
|
|
|
|
|
|
|
|
|
|
|
class ArgumentSpec(object):
|
|
|
|
def __init__(self):
|
|
|
|
self.supports_check_mode = True
|
|
|
|
self.add_file_common_args = True
|
|
|
|
argument_spec = dict(
|
|
|
|
name=dict(required=True),
|
|
|
|
certificate=dict(required=True, no_log=True),
|
|
|
|
private_key=dict(required=True, no_log=True),
|
|
|
|
password=dict(required=True, no_log=True),
|
2020-11-04 09:02:50 +01:00
|
|
|
dest=dict(required=True, type='path'),
|
2020-05-25 10:09:18 +02:00
|
|
|
force=dict(required=False, default=False, type='bool'),
|
|
|
|
private_key_passphrase=dict(required=False, no_log=True, type='str')
|
2020-03-09 10:11:07 +01:00
|
|
|
)
|
|
|
|
self.argument_spec = argument_spec
|
|
|
|
|
|
|
|
|
|
|
|
def main():
|
|
|
|
spec = ArgumentSpec()
|
|
|
|
module = AnsibleModule(
|
|
|
|
argument_spec=spec.argument_spec,
|
|
|
|
add_file_common_args=spec.add_file_common_args,
|
|
|
|
supports_check_mode=spec.supports_check_mode
|
|
|
|
)
|
|
|
|
process_jks(module)
|
|
|
|
|
|
|
|
|
|
|
|
if __name__ == '__main__':
|
|
|
|
main()
|