--- - name: Generate privatekey openssl_privatekey: path: '{{ output_dir }}/privatekey.pem' - name: Generate CSR (check mode) openssl_csr: path: '{{ output_dir }}/csr.csr' privatekey_path: '{{ output_dir }}/privatekey.pem' subject: commonName: www.ansible.com select_crypto_backend: '{{ select_crypto_backend }}' check_mode: yes register: generate_csr_check - name: Generate CSR openssl_csr: path: '{{ output_dir }}/csr.csr' privatekey_path: '{{ output_dir }}/privatekey.pem' subject: commonName: www.ansible.com select_crypto_backend: '{{ select_crypto_backend }}' register: generate_csr - name: Generate CSR (idempotent) openssl_csr: path: '{{ output_dir }}/csr.csr' privatekey_path: '{{ output_dir }}/privatekey.pem' subject: commonName: www.ansible.com select_crypto_backend: '{{ select_crypto_backend }}' register: generate_csr_check_idempotent - name: Generate CSR (idempotent, check mode) openssl_csr: path: '{{ output_dir }}/csr.csr' privatekey_path: '{{ output_dir }}/privatekey.pem' subject: commonName: www.ansible.com select_crypto_backend: '{{ select_crypto_backend }}' check_mode: yes register: generate_csr_check_idempotent_check # keyUsage longname and shortname should be able to be used # interchangeably. Hence the long name is specified here # but the short name is used to test idempotency for ipsecuser # and vice-versa for biometricInfo - name: Generate CSR with KU and XKU openssl_csr: path: '{{ output_dir }}/csr_ku_xku.csr' privatekey_path: '{{ output_dir }}/privatekey.pem' subject: CN: www.ansible.com keyUsage: - digitalSignature - keyAgreement extendedKeyUsage: - qcStatements - DVCS - IPSec User - biometricInfo select_crypto_backend: '{{ select_crypto_backend }}' - name: Generate CSR with KU and XKU (test idempotency) openssl_csr: path: '{{ output_dir }}/csr_ku_xku.csr' privatekey_path: '{{ output_dir }}/privatekey.pem' subject: commonName: 'www.ansible.com' keyUsage: - Key Agreement - digitalSignature extendedKeyUsage: - ipsecUser - qcStatements - DVCS - Biometric Info select_crypto_backend: '{{ select_crypto_backend }}' register: csr_ku_xku - name: Generate CSR with KU and XKU (test XKU change) openssl_csr: path: '{{ output_dir }}/csr_ku_xku.csr' privatekey_path: '{{ output_dir }}/privatekey.pem' subject: commonName: 'www.ansible.com' keyUsage: - digitalSignature - keyAgreement extendedKeyUsage: - ipsecUser - qcStatements - Biometric Info select_crypto_backend: '{{ select_crypto_backend }}' register: csr_ku_xku_change - name: Generate CSR with KU and XKU (test KU change) openssl_csr: path: '{{ output_dir }}/csr_ku_xku.csr' privatekey_path: '{{ output_dir }}/privatekey.pem' subject: commonName: 'www.ansible.com' keyUsage: - digitalSignature extendedKeyUsage: - ipsecUser - qcStatements - Biometric Info select_crypto_backend: '{{ select_crypto_backend }}' register: csr_ku_xku_change_2 - name: Generate CSR with old API openssl_csr: path: '{{ output_dir }}/csr_oldapi.csr' privatekey_path: '{{ output_dir }}/privatekey.pem' commonName: www.ansible.com select_crypto_backend: '{{ select_crypto_backend }}' - name: Generate CSR with OCSP Must Staple openssl_csr: path: '{{ output_dir }}/csr_ocsp.csr' privatekey_path: '{{ output_dir }}/privatekey.pem' subject_alt_name: "DNS:www.ansible.com" ocsp_must_staple: true select_crypto_backend: '{{ select_crypto_backend }}' - name: Generate CSR with OCSP Must Staple (test idempotency) openssl_csr: path: '{{ output_dir }}/csr_ocsp.csr' privatekey_path: '{{ output_dir }}/privatekey.pem' subject_alt_name: "DNS:www.ansible.com" ocsp_must_staple: true select_crypto_backend: '{{ select_crypto_backend }}' register: csr_ocsp_idempotency - name: Generate ECC privatekey openssl_privatekey: path: '{{ output_dir }}/privatekey2.pem' type: ECC curve: secp384r1 - name: Generate CSR with ECC privatekey openssl_csr: path: '{{ output_dir }}/csr2.csr' privatekey_path: '{{ output_dir }}/privatekey2.pem' subject: commonName: www.ansible.com select_crypto_backend: '{{ select_crypto_backend }}'