diff options
author | Kenny Woodson <kwoodson@redhat.com> | 2017-02-22 13:24:01 -0500 |
---|---|---|
committer | GitHub <noreply@github.com> | 2017-02-22 13:24:01 -0500 |
commit | 5226b6583d6215f70c937fa8ef2d299dc61783ec (patch) | |
tree | 5f957feaf2f2a805ad5b9dd504559cbe0e1c2a17 /roles/lib_openshift/src/ansible | |
parent | c335320eae365ec02c9ede43d229ea59b9968ce5 (diff) | |
parent | 5fabd910189a125df2943ef8092ff492f90617a1 (diff) | |
download | openshift-5226b6583d6215f70c937fa8ef2d299dc61783ec.tar.gz openshift-5226b6583d6215f70c937fa8ef2d299dc61783ec.tar.bz2 openshift-5226b6583d6215f70c937fa8ef2d299dc61783ec.tar.xz openshift-5226b6583d6215f70c937fa8ef2d299dc61783ec.zip |
Merge pull request #3378 from kwoodson/oadm_ca
Adding oc_adm_ca_server_cert to lib_openshift
Diffstat (limited to 'roles/lib_openshift/src/ansible')
-rw-r--r-- | roles/lib_openshift/src/ansible/oc_adm_ca_server_cert.py | 35 |
1 files changed, 35 insertions, 0 deletions
diff --git a/roles/lib_openshift/src/ansible/oc_adm_ca_server_cert.py b/roles/lib_openshift/src/ansible/oc_adm_ca_server_cert.py new file mode 100644 index 000000000..c80c2eb44 --- /dev/null +++ b/roles/lib_openshift/src/ansible/oc_adm_ca_server_cert.py @@ -0,0 +1,35 @@ +# pylint: skip-file +# flake8: noqa + +def main(): + ''' + ansible oc adm module for ca create-server-cert + ''' + + module = AnsibleModule( + argument_spec=dict( + state=dict(default='present', type='str', choices=['present']), + debug=dict(default=False, type='bool'), + kubeconfig=dict(default='/etc/origin/master/admin.kubeconfig', type='str'), + backup=dict(default=True, type='bool'), + force=dict(default=False, type='bool'), + # oc adm ca create-server-cert [options] + cert=dict(default=None, type='str'), + key=dict(default=None, type='str'), + signer_cert=dict(default='/etc/origin/master/ca.crt', type='str'), + signer_key=dict(default='/etc/origin/master/ca.key', type='str'), + signer_serial=dict(default='/etc/origin/master/ca.serial.txt', type='str'), + hostnames=dict(default=[], type='list'), + ), + supports_check_mode=True, + ) + + results = CAServerCert.run_ansible(module.params, module.check_mode) + if 'failed' in results: + return module.fail_json(**results) + + return module.exit_json(**results) + + +if __name__ == '__main__': + main() |