mirror of
https://github.com/ansible-collections/hetzner.hcloud
synced 2025-01-10 19:28:47 +00:00
3058995219
[![Mend Renovate](https://app.renovatebot.com/images/banner.svg)](https://renovatebot.com) This PR contains the following updates: | Package | Type | Update | Change | |---|---|---|---| | [ansible/ansible-lint](https://togithub.com/ansible/ansible-lint) | repository | minor | `v6.20.3` -> `v6.21.0` | Note: The `pre-commit` manager in Renovate is not supported by the `pre-commit` maintainers or community. Please do not report any problems there, instead [create a Discussion in the Renovate repository](https://togithub.com/renovatebot/renovate/discussions/new) if you have any questions. --- ### Release Notes <details> <summary>ansible/ansible-lint (ansible/ansible-lint)</summary> ### [`v6.21.0`](https://togithub.com/ansible/ansible-lint/releases/tag/v6.21.0) [Compare Source](https://togithub.com/ansible/ansible-lint/compare/v6.20.3...v6.21.0) #### Minor Changes - Allow linting plugin EXAMPLES as playbooks ([#​3309](https://togithub.com/ansible/ansible-lint/issues/3309)) [@​Qalthos](https://togithub.com/Qalthos) #### Bugfixes - Add support for Rocky ([#​3843](https://togithub.com/ansible/ansible-lint/issues/3843)) [@​facorazza](https://togithub.com/facorazza) - Update supported Ubuntu versions in `meta.json` ([#​3845](https://togithub.com/ansible/ansible-lint/issues/3845)) [@​mcdonnnj](https://togithub.com/mcdonnnj) - Avoid false positives for handler in roles handlers directory ([#​3838](https://togithub.com/ansible/ansible-lint/issues/3838)) [@​ajinkyau](https://togithub.com/ajinkyau) - Hide stacktrace when loading invalid yaml ([#​3844](https://togithub.com/ansible/ansible-lint/issues/3844)) [@​ajinkyau](https://togithub.com/ajinkyau) - Add some platforms to `meta.json` ([#​3841](https://togithub.com/ansible/ansible-lint/issues/3841)) [@​mcdonnnj](https://togithub.com/mcdonnnj) - Temporary avoid auto-fixing YAML files not owned by ansible ([#​3837](https://togithub.com/ansible/ansible-lint/issues/3837)) [@​ssbarnea](https://togithub.com/ssbarnea) - Add environment variable for skipping schema update ([#​3835](https://togithub.com/ansible/ansible-lint/issues/3835)) [@​ajinkyau](https://togithub.com/ajinkyau) - Avoid creating temporary YAML files inside source tree ([#​3819](https://togithub.com/ansible/ansible-lint/issues/3819)) [@​Qalthos](https://togithub.com/Qalthos) - Document environment variables ([#​3833](https://togithub.com/ansible/ansible-lint/issues/3833)) [@​ssbarnea](https://togithub.com/ssbarnea) - Update schemas ([#​3832](https://togithub.com/ansible/ansible-lint/issues/3832)) [@​ssbarnea](https://togithub.com/ssbarnea) - Support complex requirements in argument_specs.yml ([#​3823](https://togithub.com/ansible/ansible-lint/issues/3823)) [@​tapetersen](https://togithub.com/tapetersen) - Fix SARIF-formatter severity levels ([#​3824](https://togithub.com/ansible/ansible-lint/issues/3824)) [@​4ch1m](https://togithub.com/4ch1m) - Add play level autofix for key-order rule ([#​3815](https://togithub.com/ansible/ansible-lint/issues/3815)) [@​ajinkyau](https://togithub.com/ajinkyau) - Add support for python 3.12 ([#​3813](https://togithub.com/ansible/ansible-lint/issues/3813)) [@​ssbarnea](https://togithub.com/ssbarnea) - Update SPDX license list ([#​3814](https://togithub.com/ansible/ansible-lint/issues/3814)) [@​ssbarnea](https://togithub.com/ssbarnea) - Use checkout action in install docs ([#​3810](https://togithub.com/ansible/ansible-lint/issues/3810)) [@​gma](https://togithub.com/gma) - Fix actions-tagger arguments ([#​3808](https://togithub.com/ansible/ansible-lint/issues/3808)) [@​ssbarnea](https://togithub.com/ssbarnea) </details> --- ### Configuration 📅 **Schedule**: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined). 🚦 **Automerge**: Disabled by config. Please merge this manually once you are satisfied. ♻ **Rebasing**: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox. 🔕 **Ignore**: Close this PR and you won't be reminded about this update again. --- - [ ] <!-- rebase-check -->If you want to rebase/retry this PR, check this box --- This PR has been generated by [Mend Renovate](https://www.mend.io/free-developer-tools/renovate/). View repository job log [here](https://developer.mend.io/github/ansible-collections/hetzner.hcloud). <!--renovate-debug:eyJjcmVhdGVkSW5WZXIiOiIzNy4xOS4yIiwidXBkYXRlZEluVmVyIjoiMzcuMTkuMiIsInRhcmdldEJyYW5jaCI6Im1haW4ifQ==--> --------- Co-authored-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com> Co-authored-by: jo <ljonas@riseup.net>
280 lines
9.5 KiB
Python
280 lines
9.5 KiB
Python
#!/usr/bin/python
|
|
|
|
# Copyright: (c) 2020, Hetzner Cloud GmbH <info@hetzner-cloud.de>
|
|
# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt)
|
|
|
|
|
|
DOCUMENTATION = """
|
|
---
|
|
module: hcloud_certificate
|
|
|
|
short_description: Create and manage certificates on the Hetzner Cloud.
|
|
|
|
|
|
description:
|
|
- Create, update and manage certificates on the Hetzner Cloud.
|
|
|
|
author:
|
|
- Lukas Kaemmerling (@lkaemmerling)
|
|
|
|
options:
|
|
id:
|
|
description:
|
|
- The ID of the Hetzner Cloud certificate to manage.
|
|
- Only required if no certificate I(name) is given
|
|
type: int
|
|
name:
|
|
description:
|
|
- The Name of the Hetzner Cloud certificate to manage.
|
|
- Only required if no certificate I(id) is given or a certificate does not exist.
|
|
type: str
|
|
labels:
|
|
description:
|
|
- User-defined labels (key-value pairs)
|
|
type: dict
|
|
certificate:
|
|
description:
|
|
- Certificate and chain in PEM format, in order so that each record directly certifies the one preceding.
|
|
- Required if certificate does not exist.
|
|
type: str
|
|
private_key:
|
|
description:
|
|
- Certificate key in PEM format.
|
|
- Required if certificate does not exist.
|
|
type: str
|
|
domain_names:
|
|
description:
|
|
- Certificate key in PEM format.
|
|
- Required if certificate does not exist.
|
|
type: list
|
|
default: [ ]
|
|
elements: str
|
|
type:
|
|
description:
|
|
- Choose between uploading a Certificate in PEM format or requesting a managed Let's Encrypt Certificate.
|
|
default: uploaded
|
|
choices: [ uploaded, managed ]
|
|
type: str
|
|
state:
|
|
description:
|
|
- State of the certificate.
|
|
default: present
|
|
choices: [ absent, present ]
|
|
type: str
|
|
extends_documentation_fragment:
|
|
- hetzner.hcloud.hcloud
|
|
|
|
"""
|
|
|
|
EXAMPLES = """
|
|
- name: Create a basic certificate
|
|
hetzner.hcloud.hcloud_certificate:
|
|
name: my-certificate
|
|
certificate: ssh-rsa AAAjjk76kgf...Xt
|
|
private_key: ssh-rsa AAAjjk76kgf...Xt
|
|
state: present
|
|
|
|
- name: Create a certificate with labels
|
|
hetzner.hcloud.hcloud_certificate:
|
|
name: my-certificate
|
|
certificate: ssh-rsa AAAjjk76kgf...Xt
|
|
private_key: ssh-rsa AAAjjk76kgf...Xt
|
|
labels:
|
|
key: value
|
|
mylabel: 123
|
|
state: present
|
|
|
|
- name: Ensure the certificate is absent (remove if needed)
|
|
hetzner.hcloud.hcloud_certificate:
|
|
name: my-certificate
|
|
state: absent
|
|
"""
|
|
|
|
RETURN = """
|
|
hcloud_certificate:
|
|
description: The certificate instance
|
|
returned: Always
|
|
type: complex
|
|
contains:
|
|
id:
|
|
description: Numeric identifier of the certificate
|
|
returned: always
|
|
type: int
|
|
sample: 1937415
|
|
name:
|
|
description: Name of the certificate
|
|
returned: always
|
|
type: str
|
|
sample: my website cert
|
|
fingerprint:
|
|
description: Fingerprint of the certificate
|
|
returned: always
|
|
type: str
|
|
sample: "03:c7:55:9b:2a:d1:04:17:09:f6:d0:7f:18:34:63:d4:3e:5f"
|
|
certificate:
|
|
description: Certificate and chain in PEM format
|
|
returned: always
|
|
type: str
|
|
sample: "-----BEGIN CERTIFICATE-----..."
|
|
domain_names:
|
|
description: List of Domains and Subdomains covered by the Certificate
|
|
returned: always
|
|
type: dict
|
|
not_valid_before:
|
|
description: Point in time when the Certificate becomes valid (in ISO-8601 format)
|
|
returned: always
|
|
type: str
|
|
not_valid_after:
|
|
description: Point in time when the Certificate stops being valid (in ISO-8601 format)
|
|
returned: always
|
|
type: str
|
|
labels:
|
|
description: User-defined labels (key-value pairs)
|
|
returned: always
|
|
type: dict
|
|
"""
|
|
|
|
from typing import Optional
|
|
|
|
from ansible.module_utils.basic import AnsibleModule
|
|
from ansible.module_utils.common.text.converters import to_native
|
|
|
|
from ..module_utils.hcloud import AnsibleHCloud
|
|
from ..module_utils.vendor.hcloud import HCloudException
|
|
from ..module_utils.vendor.hcloud.certificates import BoundCertificate
|
|
|
|
|
|
class AnsibleHCloudCertificate(AnsibleHCloud):
|
|
represent = "hcloud_certificate"
|
|
|
|
hcloud_certificate: Optional[BoundCertificate] = None
|
|
|
|
def _prepare_result(self):
|
|
return {
|
|
"id": to_native(self.hcloud_certificate.id),
|
|
"name": to_native(self.hcloud_certificate.name),
|
|
"type": to_native(self.hcloud_certificate.type),
|
|
"fingerprint": to_native(self.hcloud_certificate.fingerprint),
|
|
"certificate": to_native(self.hcloud_certificate.certificate),
|
|
"not_valid_before": to_native(self.hcloud_certificate.not_valid_before),
|
|
"not_valid_after": to_native(self.hcloud_certificate.not_valid_after),
|
|
"domain_names": [to_native(domain) for domain in self.hcloud_certificate.domain_names],
|
|
"labels": self.hcloud_certificate.labels,
|
|
}
|
|
|
|
def _get_certificate(self):
|
|
try:
|
|
if self.module.params.get("id") is not None:
|
|
self.hcloud_certificate = self.client.certificates.get_by_id(self.module.params.get("id"))
|
|
elif self.module.params.get("name") is not None:
|
|
self.hcloud_certificate = self.client.certificates.get_by_name(self.module.params.get("name"))
|
|
|
|
except HCloudException as exception:
|
|
self.fail_json_hcloud(exception)
|
|
|
|
def _create_certificate(self):
|
|
self.module.fail_on_missing_params(required_params=["name"])
|
|
|
|
params = {
|
|
"name": self.module.params.get("name"),
|
|
"labels": self.module.params.get("labels"),
|
|
}
|
|
if self.module.params.get("type") == "uploaded":
|
|
self.module.fail_on_missing_params(required_params=["certificate", "private_key"])
|
|
params["certificate"] = self.module.params.get("certificate")
|
|
params["private_key"] = self.module.params.get("private_key")
|
|
if not self.module.check_mode:
|
|
try:
|
|
self.client.certificates.create(**params)
|
|
except HCloudException as exception:
|
|
self.fail_json_hcloud(exception)
|
|
else:
|
|
self.module.fail_on_missing_params(required_params=["domain_names"])
|
|
params["domain_names"] = self.module.params.get("domain_names")
|
|
if not self.module.check_mode:
|
|
try:
|
|
resp = self.client.certificates.create_managed(**params)
|
|
resp.action.wait_until_finished(max_retries=1000)
|
|
except HCloudException as exception:
|
|
self.fail_json_hcloud(exception)
|
|
|
|
self._mark_as_changed()
|
|
self._get_certificate()
|
|
|
|
def _update_certificate(self):
|
|
try:
|
|
name = self.module.params.get("name")
|
|
if name is not None and self.hcloud_certificate.name != name:
|
|
self.module.fail_on_missing_params(required_params=["id"])
|
|
if not self.module.check_mode:
|
|
self.hcloud_certificate.update(name=name)
|
|
self._mark_as_changed()
|
|
|
|
labels = self.module.params.get("labels")
|
|
if labels is not None and self.hcloud_certificate.labels != labels:
|
|
if not self.module.check_mode:
|
|
self.hcloud_certificate.update(labels=labels)
|
|
self._mark_as_changed()
|
|
except HCloudException as exception:
|
|
self.fail_json_hcloud(exception)
|
|
self._get_certificate()
|
|
|
|
def present_certificate(self):
|
|
self._get_certificate()
|
|
if self.hcloud_certificate is None:
|
|
self._create_certificate()
|
|
else:
|
|
self._update_certificate()
|
|
|
|
def delete_certificate(self):
|
|
self._get_certificate()
|
|
if self.hcloud_certificate is not None:
|
|
if not self.module.check_mode:
|
|
try:
|
|
self.client.certificates.delete(self.hcloud_certificate)
|
|
except HCloudException as exception:
|
|
self.fail_json_hcloud(exception)
|
|
self._mark_as_changed()
|
|
self.hcloud_certificate = None
|
|
|
|
@classmethod
|
|
def define_module(cls):
|
|
return AnsibleModule(
|
|
argument_spec=dict(
|
|
id={"type": "int"},
|
|
name={"type": "str"},
|
|
type={
|
|
"choices": ["uploaded", "managed"],
|
|
"default": "uploaded",
|
|
},
|
|
domain_names={"type": "list", "elements": "str", "default": []},
|
|
certificate={"type": "str"},
|
|
private_key={"type": "str", "no_log": True},
|
|
labels={"type": "dict"},
|
|
state={
|
|
"choices": ["absent", "present"],
|
|
"default": "present",
|
|
},
|
|
**super().base_module_arguments()
|
|
),
|
|
required_one_of=[["id", "name"]],
|
|
required_if=[["state", "present", ["name"]]],
|
|
supports_check_mode=True,
|
|
)
|
|
|
|
|
|
def main():
|
|
module = AnsibleHCloudCertificate.define_module()
|
|
|
|
hcloud = AnsibleHCloudCertificate(module)
|
|
state = module.params.get("state")
|
|
if state == "absent":
|
|
hcloud.delete_certificate()
|
|
elif state == "present":
|
|
hcloud.present_certificate()
|
|
|
|
module.exit_json(**hcloud.get_result())
|
|
|
|
|
|
if __name__ == "__main__":
|
|
main()
|