2021-04-17 18:17:53 +02:00
|
|
|
---
|
|
|
|
- name: Create test directory
|
|
|
|
ansible.builtin.file:
|
|
|
|
path: "{{ output_dir }}"
|
|
|
|
state: directory
|
|
|
|
|
|
|
|
- name: Ensure the Java keystore does not exist (cleanup between tests)
|
|
|
|
ansible.builtin.file:
|
|
|
|
path: "{{ output_dir ~ '/' ~ item.name ~ '.jks' }}"
|
|
|
|
state: absent
|
|
|
|
loop: "{{ java_keystore_certs }}"
|
|
|
|
loop_control:
|
|
|
|
label: "{{ output_dir ~ '/' ~ item.name ~ '.jks' }}"
|
|
|
|
|
|
|
|
|
|
|
|
- name: Create a Java keystore for the given ({{ 'remote' if remote_cert else 'local' }}) certificates (check mode)
|
|
|
|
community.general.java_keystore: &java_keystore_params
|
|
|
|
name: example
|
|
|
|
dest: "{{ output_dir ~ '/' ~ (item.keyname | d(item.name)) ~ '.jks' }}"
|
|
|
|
certificate: "{{ omit if remote_cert else lookup('file', output_dir ~ '/' ~ item.name ~ '.pem') }}"
|
|
|
|
private_key: "{{ omit if remote_cert else lookup('file', output_dir ~ '/' ~ (item.keyname | d(item.name)) ~ '.key') }}"
|
|
|
|
certificate_path: "{{ omit if not remote_cert else output_dir ~ '/' ~ item.name ~ '.pem' }}"
|
|
|
|
private_key_path: "{{ omit if not remote_cert else output_dir ~ '/' ~ (item.keyname | d(item.name)) ~ '.key' }}"
|
|
|
|
private_key_passphrase: "{{ item.passphrase | d(omit) }}"
|
|
|
|
password: changeit
|
2021-05-14 22:31:44 +02:00
|
|
|
ssl_backend: "{{ ssl_backend }}"
|
2021-06-27 14:56:43 +02:00
|
|
|
keystore_type: "{{ item.keystore_type | d(omit) }}"
|
2021-04-17 18:17:53 +02:00
|
|
|
loop: "{{ java_keystore_certs }}"
|
|
|
|
check_mode: yes
|
|
|
|
register: result_check
|
|
|
|
|
|
|
|
- name: Create a Java keystore for the given certificates
|
|
|
|
community.general.java_keystore: *java_keystore_params
|
|
|
|
loop: "{{ java_keystore_certs }}"
|
|
|
|
register: result
|
|
|
|
|
|
|
|
|
|
|
|
- name: Create a Java keystore for the given certificates (idempotency, check mode)
|
|
|
|
community.general.java_keystore: *java_keystore_params
|
|
|
|
loop: "{{ java_keystore_certs }}"
|
|
|
|
check_mode: yes
|
|
|
|
register: result_idem_check
|
|
|
|
|
|
|
|
- name: Create a Java keystore for the given certificates (idempotency)
|
|
|
|
community.general.java_keystore: *java_keystore_params
|
|
|
|
loop: "{{ java_keystore_certs }}"
|
|
|
|
register: result_idem
|
|
|
|
|
|
|
|
|
|
|
|
- name: Create a Java keystore for the given certificates (certificate changed, check mode)
|
|
|
|
community.general.java_keystore: *java_keystore_params
|
|
|
|
loop: "{{ java_keystore_new_certs }}"
|
|
|
|
check_mode: yes
|
|
|
|
register: result_change_check
|
|
|
|
|
|
|
|
- name: Create a Java keystore for the given certificates (certificate changed)
|
|
|
|
community.general.java_keystore: *java_keystore_params
|
|
|
|
loop: "{{ java_keystore_new_certs }}"
|
|
|
|
register: result_change
|
|
|
|
|
|
|
|
|
|
|
|
- name: Create a Java keystore for the given certificates (alias changed, check mode)
|
|
|
|
community.general.java_keystore:
|
|
|
|
<<: *java_keystore_params
|
|
|
|
name: foobar
|
|
|
|
loop: "{{ java_keystore_new_certs }}"
|
|
|
|
check_mode: yes
|
|
|
|
register: result_alias_change_check
|
|
|
|
|
|
|
|
- name: Create a Java keystore for the given certificates (alias changed)
|
|
|
|
community.general.java_keystore:
|
|
|
|
<<: *java_keystore_params
|
|
|
|
name: foobar
|
|
|
|
loop: "{{ java_keystore_new_certs }}"
|
|
|
|
register: result_alias_change
|
|
|
|
|
|
|
|
|
|
|
|
- name: Create a Java keystore for the given certificates (password changed, check mode)
|
|
|
|
community.general.java_keystore:
|
|
|
|
<<: *java_keystore_params
|
|
|
|
name: foobar
|
|
|
|
password: hunter2
|
|
|
|
loop: "{{ java_keystore_new_certs }}"
|
|
|
|
check_mode: yes
|
|
|
|
register: result_pw_change_check
|
|
|
|
|
|
|
|
- name: Create a Java keystore for the given certificates (password changed)
|
|
|
|
community.general.java_keystore:
|
|
|
|
<<: *java_keystore_params
|
|
|
|
name: foobar
|
|
|
|
password: hunter2
|
|
|
|
loop: "{{ java_keystore_new_certs }}"
|
|
|
|
register: result_pw_change
|
|
|
|
|
2021-06-27 14:56:43 +02:00
|
|
|
|
|
|
|
- name: Create a Java keystore for the given certificates (force keystore type pkcs12, check mode)
|
|
|
|
community.general.java_keystore:
|
|
|
|
<<: *java_keystore_params
|
|
|
|
name: foobar
|
|
|
|
password: hunter2
|
|
|
|
keystore_type: pkcs12
|
|
|
|
loop: "{{ java_keystore_new_certs }}"
|
|
|
|
check_mode: yes
|
|
|
|
register: result_type_pkcs12_check
|
|
|
|
|
|
|
|
- name: Create a Java keystore for the given certificates (force keystore type jks, check mode)
|
|
|
|
community.general.java_keystore:
|
|
|
|
<<: *java_keystore_params
|
|
|
|
name: foobar
|
|
|
|
password: hunter2
|
|
|
|
keystore_type: jks
|
|
|
|
loop: "{{ java_keystore_new_certs }}"
|
|
|
|
check_mode: yes
|
|
|
|
register: result_type_jks_check
|
|
|
|
|
|
|
|
- name: Create a Java keystore for the given certificates (force keystore type jks)
|
|
|
|
community.general.java_keystore:
|
|
|
|
<<: *java_keystore_params
|
|
|
|
name: foobar
|
|
|
|
password: hunter2
|
|
|
|
keystore_type: jks
|
|
|
|
loop: "{{ java_keystore_new_certs }}"
|
|
|
|
register: result_type_jks
|
|
|
|
|
|
|
|
|
|
|
|
- name: Stat keystore (before failure)
|
|
|
|
ansible.builtin.stat:
|
|
|
|
path: "{{ output_dir ~ '/' ~ (item.keyname | d(item.name)) ~ '.jks' }}"
|
|
|
|
loop: "{{ java_keystore_new_certs }}"
|
|
|
|
register: result_stat_before
|
|
|
|
|
|
|
|
- name: Fail to create a Java keystore for the given certificates (password too short)
|
|
|
|
community.general.java_keystore:
|
|
|
|
<<: *java_keystore_params
|
|
|
|
name: foobar
|
|
|
|
password: short
|
|
|
|
keystore_type: jks
|
|
|
|
loop: "{{ java_keystore_new_certs }}"
|
|
|
|
register: result_fail_jks
|
|
|
|
ignore_errors: true
|
|
|
|
|
|
|
|
- name: Stat keystore (after failure)
|
|
|
|
ansible.builtin.stat:
|
|
|
|
path: "{{ output_dir ~ '/' ~ (item.keyname | d(item.name)) ~ '.jks' }}"
|
|
|
|
loop: "{{ java_keystore_new_certs }}"
|
|
|
|
register: result_stat_after
|
|
|
|
|
|
|
|
|
|
|
|
- name: Create a Java keystore for the given certificates (keystore type changed, check mode)
|
|
|
|
community.general.java_keystore:
|
|
|
|
<<: *java_keystore_params
|
|
|
|
name: foobar
|
|
|
|
password: hunter2
|
|
|
|
keystore_type: pkcs12
|
|
|
|
loop: "{{ java_keystore_new_certs }}"
|
|
|
|
check_mode: yes
|
|
|
|
register: result_type_change_check
|
|
|
|
|
|
|
|
- name: Create a Java keystore for the given certificates (keystore type changed)
|
|
|
|
community.general.java_keystore:
|
|
|
|
<<: *java_keystore_params
|
|
|
|
name: foobar
|
|
|
|
password: hunter2
|
|
|
|
keystore_type: pkcs12
|
|
|
|
loop: "{{ java_keystore_new_certs }}"
|
|
|
|
register: result_type_change
|
|
|
|
|
|
|
|
|
|
|
|
- name: Create a Java keystore for the given certificates (omit keystore type, check mode)
|
|
|
|
community.general.java_keystore:
|
|
|
|
<<: *java_keystore_params
|
|
|
|
name: foobar
|
|
|
|
password: hunter2
|
|
|
|
loop: "{{ java_keystore_new_certs }}"
|
|
|
|
check_mode: yes
|
|
|
|
register: result_type_omit_check
|
|
|
|
|
|
|
|
- name: Create a Java keystore for the given certificates (omit keystore type)
|
|
|
|
community.general.java_keystore:
|
|
|
|
<<: *java_keystore_params
|
|
|
|
name: foobar
|
|
|
|
password: hunter2
|
|
|
|
loop: "{{ java_keystore_new_certs }}"
|
|
|
|
register: result_type_omit
|
|
|
|
|
|
|
|
|
2021-04-17 18:17:53 +02:00
|
|
|
- name: Check that the remote certificates have not been removed
|
|
|
|
ansible.builtin.file:
|
|
|
|
path: "{{ output_dir ~ '/' ~ item.name ~ '.pem' }}"
|
|
|
|
state: file
|
|
|
|
loop: "{{ java_keystore_certs + java_keystore_new_certs }}"
|
|
|
|
when: remote_cert
|
|
|
|
|
|
|
|
- name: Check that the remote private keys have not been removed
|
|
|
|
ansible.builtin.file:
|
|
|
|
path: "{{ output_dir ~ '/' ~ item.name ~ '.key' }}"
|
|
|
|
state: file
|
|
|
|
loop: "{{ java_keystore_certs }}"
|
|
|
|
when: remote_cert
|
|
|
|
|
|
|
|
- name: Validate results
|
|
|
|
assert:
|
|
|
|
that:
|
|
|
|
- result is changed
|
|
|
|
- result_check is changed
|
|
|
|
- result_idem is not changed
|
|
|
|
- result_idem_check is not changed
|
|
|
|
- result_change is changed
|
|
|
|
- result_change_check is changed
|
2021-04-19 06:59:52 +02:00
|
|
|
- result_alias_change is changed
|
|
|
|
- result_alias_change_check is changed
|
|
|
|
- result_pw_change is changed
|
|
|
|
- result_pw_change_check is changed
|
2021-06-27 14:56:43 +02:00
|
|
|
|
|
|
|
# We don't know if we start from jks or pkcs12 format, anyway check mode
|
|
|
|
# and actual mode must return the same 'changed' state, and 'jks' and
|
|
|
|
# 'pkcs12' must give opposite results on a same host.
|
|
|
|
- result_type_jks_check.changed != result_type_pkcs12_check.changed
|
|
|
|
- result_type_jks_check.changed == result_type_jks.changed
|
|
|
|
|
|
|
|
- result_type_change is changed
|
|
|
|
- result_type_change_check is changed
|
|
|
|
- result_type_omit is not changed
|
|
|
|
- result_type_omit_check is not changed
|
|
|
|
|
|
|
|
# keystore properties must remain the same after failure
|
|
|
|
- result_fail_jks is failed
|
|
|
|
- result_stat_before.results[0].stat.uid == result_stat_after.results[0].stat.uid
|
|
|
|
- result_stat_before.results[1].stat.uid == result_stat_after.results[1].stat.uid
|
|
|
|
- result_stat_before.results[0].stat.gid == result_stat_after.results[0].stat.gid
|
|
|
|
- result_stat_before.results[1].stat.gid == result_stat_after.results[1].stat.gid
|
|
|
|
- result_stat_before.results[0].stat.mode == result_stat_after.results[0].stat.mode
|
|
|
|
- result_stat_before.results[1].stat.mode == result_stat_after.results[1].stat.mode
|
|
|
|
- result_stat_before.results[0].stat.checksum == result_stat_after.results[0].stat.checksum
|
|
|
|
- result_stat_before.results[1].stat.checksum == result_stat_after.results[1].stat.checksum
|