updated sso
diff --git a/tasks/create-saml-keys-cert.yml b/tasks/create-saml-keys-cert.yml
index 570eb2e..8828746 100644
--- a/tasks/create-saml-keys-cert.yml
+++ b/tasks/create-saml-keys-cert.yml
@@ -7,73 +7,55 @@
owner: "{{ opdk_user_name }}"
group: "{{ opdk_group_name }}"
-# - name: Generate a passphrase
-# command: "openssl rand -base64 48"
-# args:
-# chdir: "{{ saml_folder }}"
-# register: passphrase
-#
-# - name: Generate your private key with a passphrase
-# command: "openssl genrsa -{{ saml_private_encryption_type }} -passout pass:{{ passphrase.stdout }} -out {{ sso_saml_service_provider_key_filename}} {{ saml_private_key_size }}"
-# args:
-# chdir: "{{ saml_folder }}"
-
- - name: Calculate 365 days
- command: date -d '+365 days' +%y%m%d%H%M
- register: expiry
+ - name: Generate a passphrase
+ command: "openssl rand -base64 48"
+ args:
+ chdir: "{{ saml_folder }}"
+ register: passphrase
- name: Generate your private key with a passphrase
- openssl_certificate:
- path: "{{ sso_saml_service_provider_certificate_filename }}"
- privatekey_path: "{{ sso_saml_service_provider_key_filename }}"
- csr_path: "{{ saml_cert_signing_request_file_name }}"
- provider: selfsigned
- subject: "{{ saml_cert_subject }}"
- state: present
- not_after: "{{ expiry.stdout }}"
+ command: "openssl genrsa -{{ saml_private_encryption_type }} -passout pass:{{ passphrase.stdout }} -out {{ sso_saml_service_provider_key_filename}} {{ saml_private_key_size }}"
+ args:
+ chdir: "{{ saml_folder }}"
-# - name: Prep to remove passphrase from Key
-# copy:
-# dest: "{{ saml_folder }}/remove-passphrase-{{ sso_saml_service_provider_key_filename}}"
-# src: "{{ saml_folder }}/{{ sso_saml_service_provider_key_filename}}"
-# remote_src: yes
+# - name: Calculate 365 days
+# command: date -d '+365 days' +%y%m%d%H%M
+# register: expiry
#
-# - name: Remove the passphrase from the key
-# shell: "openssl rsa -in remove-passphrase-{{ sso_saml_service_provider_key_filename}} -passin pass:{{ passphrase.stdout }} -out {{ sso_saml_service_provider_key_filename}}"
-# args:
-# chdir: "{{ saml_folder }}"
-#
-# - name: Clean up passphrase removal file
-# file:
-# path: "{{ saml_folder }}/remove-passphrase-{{ sso_saml_service_provider_key_filename}}"
-# state: absent
-#
-# - name: Generate certificate signing request for CA
-# shell: "openssl req -x509 -sha256 -new -passin pass:{{ passphrase.stdout }} -key {{ sso_saml_service_provider_key_filename}} -out {{ saml_cert_signing_request_file_name }} -subj {{ saml_cert_subject }}"
-# args:
-# chdir: "{{ saml_folder }}"
+# - name: Generate your private key with a passphrase
+# openssl_certificate:
+# path: "{{ sso_saml_service_provider_certificate_filename }}"
+# privatekey_path: "{{ sso_saml_service_provider_key_filename }}"
+# csr_path: "{{ saml_cert_signing_request_file_name }}"
+# provider: selfsigned
+# subject: "{{ saml_cert_subject }}"
+# state: present
+# not_after: "{{ expiry.stdout }}"
-# - name: Generate self-signed certificate with 365 days expiry-time
-# shell: "openssl x509 -{{ saml_cert_encryption_type }} -days {{ saml_cert_expiry_days }} -in {{ saml_cert_signing_request_file_name }} -signkey {{ sso_saml_service_provider_key_filename}} -out {{ sso_saml_service_provider_certificate_filename }}"
-# args:
-# chdir: "{{ saml_folder }}"
+ - name: Prep to remove passphrase from Key
+ copy:
+ dest: "{{ saml_folder }}/remove-passphrase-{{ sso_saml_service_provider_key_filename}}"
+ src: "{{ saml_folder }}/{{ sso_saml_service_provider_key_filename}}"
+ remote_src: yes
+
+ - name: Remove the passphrase from the key
+ shell: "openssl rsa -in remove-passphrase-{{ sso_saml_service_provider_key_filename}} -passin pass:{{ passphrase.stdout }} -out {{ sso_saml_service_provider_key_filename}}"
+ args:
+ chdir: "{{ saml_folder }}"
+
+ - name: Clean up passphrase removal file
+ file:
+ path: "{{ saml_folder }}/remove-passphrase-{{ sso_saml_service_provider_key_filename}}"
+ state: absent
+
+ - name: Generate certificate signing request for CA
+ shell: "openssl req -x509 -sha256 -new -passin pass:{{ passphrase.stdout }} -key {{ sso_saml_service_provider_key_filename}} -out {{ saml_cert_signing_request_file_name }} -subj {{ saml_cert_subject }}"
+ args:
+ chdir: "{{ saml_folder }}"
+
+ - name: Generate self-signed certificate with 365 days expiry-time
+ shell: "openssl x509 -{{ saml_cert_encryption_type }} -days {{ saml_cert_expiry_days }} -in {{ saml_cert_signing_request_file_name }} -signkey {{ sso_saml_service_provider_key_filename}} -out {{ sso_saml_service_provider_certificate_filename }}"
+ args:
+ chdir: "{{ saml_folder }}"
become: yes
-
-#- name: Collect certificate files
-# find:
-# paths: "{{ saml_folder }}"
-# patterns: '*.crt,*.key'
-# register: certs
-
-#- name: Set ownship of certs
-# become: yes
-# file:
-# path: "{{ item.1.path }}"
-# state: touch
-# owner: "{{ opdk_user_name }}"
-# group: "{{ opdk_group_name }}"
-# with_subelements:
-# - "{{ certs.results }}"
-# - files
-