aboutsummaryrefslogtreecommitdiff
path: root/roles/signed_certificate/tasks/main.yml
diff options
context:
space:
mode:
authorGravatar Jonas Gunz <himself@jonasgunz.de> 2021-09-01 04:11:37 +0200
committerGravatar Jonas Gunz <himself@jonasgunz.de> 2021-09-01 04:11:37 +0200
commita024ad57e94976f7541bdd352e2d0a364c2aa5fb (patch)
treeb04a92bdb939f6ecba135c0feb5d82fd148838e8 /roles/signed_certificate/tasks/main.yml
downloadansible_collection-a024ad57e94976f7541bdd352e2d0a364c2aa5fb.tar.gz
initial
Diffstat (limited to 'roles/signed_certificate/tasks/main.yml')
-rw-r--r--roles/signed_certificate/tasks/main.yml50
1 files changed, 50 insertions, 0 deletions
diff --git a/roles/signed_certificate/tasks/main.yml b/roles/signed_certificate/tasks/main.yml
new file mode 100644
index 0000000..3e1a7b2
--- /dev/null
+++ b/roles/signed_certificate/tasks/main.yml
@@ -0,0 +1,50 @@
+---
+- name: Unset cert_changed flag
+ set_fact:
+ cert_changed: False
+
+- name: Instaall crypt libs
+ apt:
+ name:
+ - python3-cryptography
+ become: yes
+
+- name: Check for OpenSSL Private Key
+ community.crypto.openssl_privatekey_info:
+ path: '{{ key_path }}/{{ cert_name }}.key'
+ ignore_errors: yes
+ become: yes
+ register: key_check
+
+- name: Create OpenSSL Private Key
+ community.crypto.openssl_privatekey:
+ path: '{{ key_path }}/{{ cert_name }}.key'
+ owner: '{{ owner }}'
+ group: '{{ group }}'
+ become: yes
+ when: key_check.failed
+
+- name: Read existing Certificate
+ community.crypto.x509_certificate_info:
+ path: '{{ cert_path }}/{{ cert_name }}.pem'
+ valid_at:
+ point_1: '{{ signed_certificate.renew_at }}'
+ ignore_errors: yes
+ become: yes
+ register: existing_cert
+
+- name: Check certificate
+ assert:
+ that:
+ - existing_cert.valid_at.point_1
+ - not existing_cert.failed
+ - existing_cert.subject.commonName == ansible_facts.fqdn
+ - existing_cert.issuer.commonName == '{{ signed_certificate.issuer_cn }}'
+ success_msg: Certificate is valid
+ fail_msg: Certificate is not valid. creating a new one.
+ ignore_errors: yes
+ register: cert_assert
+
+- name: Trigger Cert generation
+ include: sign.yml
+ when: cert_assert.failed