def dump(self, check_mode=False): result = { 'changed': self.changed, 'filename': self.path, 'privatekey': self.privatekey_path, 'format': self.format, 'last_update': None, 'next_update': None, 'digest': None, 'issuer_ordered': None, 'issuer': None, 'revoked_certificates': [], } if self.backup_file: result['backup_file'] = self.backup_file if check_mode: result['last_update'] = self.last_update.strftime(TIMESTAMP_FORMAT) result['next_update'] = self.next_update.strftime(TIMESTAMP_FORMAT) # result['digest'] = cryptography_oid_to_name(self.crl.signature_algorithm_oid) result['digest'] = self.module.params['digest'] result['issuer_ordered'] = self.issuer result['issuer'] = {} for k, v in self.issuer: result['issuer'][k] = v result['revoked_certificates'] = [] for entry in self.revoked_certificates: result['revoked_certificates'].append( cryptography_dump_revoked(entry)) elif self.crl: result['last_update'] = self.crl.last_update.strftime( TIMESTAMP_FORMAT) result['next_update'] = self.crl.next_update.strftime( TIMESTAMP_FORMAT) result['digest'] = cryptography_oid_to_name( cryptography_get_signature_algorithm_oid_from_crl(self.crl)) issuer = [] for attribute in self.crl.issuer: issuer.append( [cryptography_oid_to_name(attribute.oid), attribute.value]) result['issuer_ordered'] = issuer result['issuer'] = {} for k, v in issuer: result['issuer'][k] = v result['revoked_certificates'] = [] for cert in self.crl: entry = cryptography_decode_revoked_certificate(cert) result['revoked_certificates'].append( cryptography_dump_revoked(entry)) if self.return_content: result['crl'] = self.crl_content result['diff'] = dict( before=self.diff_before, after=self.diff_after, ) return result
def get_info(self): result = { 'changed': False, 'format': 'pem' if self.crl_pem else 'der', 'last_update': None, 'next_update': None, 'digest': None, 'issuer_ordered': None, 'issuer': None, 'revoked_certificates': [], } result['last_update'] = self.crl.last_update.strftime(TIMESTAMP_FORMAT) result['next_update'] = self.crl.next_update.strftime(TIMESTAMP_FORMAT) result['digest'] = cryptography_oid_to_name( cryptography_get_signature_algorithm_oid_from_crl(self.crl)) issuer = [] for attribute in self.crl.issuer: issuer.append( [cryptography_oid_to_name(attribute.oid), attribute.value]) result['issuer_ordered'] = issuer result['issuer'] = {} for k, v in issuer: result['issuer'][k] = v result['revoked_certificates'] = [] for cert in self.crl: entry = cryptography_decode_revoked_certificate(cert) result['revoked_certificates'].append( cryptography_dump_revoked(entry)) return result
def get_info(self): self.crl_pem = identify_pem_format(self.content) try: if self.crl_pem: self.crl = x509.load_pem_x509_crl(self.content, default_backend()) else: self.crl = x509.load_der_x509_crl(self.content, default_backend()) except ValueError as e: self.module.fail_json(msg='Error while decoding CRL: {0}'.format(e)) result = { 'changed': False, 'format': 'pem' if self.crl_pem else 'der', 'last_update': None, 'next_update': None, 'digest': None, 'issuer_ordered': None, 'issuer': None, } result['last_update'] = self.crl.last_update.strftime(TIMESTAMP_FORMAT) result['next_update'] = self.crl.next_update.strftime(TIMESTAMP_FORMAT) result['digest'] = cryptography_oid_to_name(cryptography_get_signature_algorithm_oid_from_crl(self.crl)) issuer = [] for attribute in self.crl.issuer: issuer.append([cryptography_oid_to_name(attribute.oid), attribute.value]) result['issuer_ordered'] = issuer result['issuer'] = {} for k, v in issuer: result['issuer'][k] = v if self.list_revoked_certificates: result['revoked_certificates'] = [] for cert in self.crl: entry = cryptography_decode_revoked_certificate(cert) result['revoked_certificates'].append(cryptography_dump_revoked(entry)) return result