updated sso
diff --git a/defaults/main.yml b/defaults/main.yml
index a5bde60..0e3b346 100644
--- a/defaults/main.yml
+++ b/defaults/main.yml
@@ -11,14 +11,14 @@
jwt_key_size: 2048
saml_folder: "{{ apigee_home }}/customer/application/apigee-sso/saml"
-sso_saml_service_provider_key_filename: server.key
-sso_saml_service_provider_key: "{{ saml_folder }}/{{ sso_saml_service_provider_key_filename}}"
+sso_saml_service_provider_key_file_name: server.key
+sso_saml_service_provider_key_file_path: "{{ saml_folder }}/{{ sso_saml_service_provider_key_file_name }}"
saml_private_encryption_type: aes256
saml_private_key_size: 1024
saml_cert_signing_request_file_name: server.csr
saml_cert_signing_request: "{{ saml_folder }}/{{ saml_cert_signing_request_file_name }}"
-sso_saml_service_provider_certificate_filename: server.crt
-sso_saml_service_provider_certificate: "{{ saml_folder }}/{{ sso_saml_service_provider_certificate_filename }}"
+sso_saml_service_provider_certificate_file_name: server.crt
+sso_saml_service_provider_certificate_file_path: "{{ saml_folder }}/{{ sso_saml_service_provider_certificate_file_name }}"
saml_cert_encryption_type: sha256
saml_cert_expiry_days: 365
saml_cert_subject: "/C=US/O=google/OU=apigee/CN=apigee.com"
diff --git a/tasks/create-saml-keys-cert.yml b/tasks/create-saml-keys-cert.yml
index 3459ae0..9732cd3 100644
--- a/tasks/create-saml-keys-cert.yml
+++ b/tasks/create-saml-keys-cert.yml
@@ -1,7 +1,7 @@
---
- name: Assert that service provider key file exists
stat:
- path: "{{ sso_saml_service_provider_key_filename}}"
+ path: "{{ sso_saml_service_provider_key_file_path }}"
register: key
- block:
@@ -19,7 +19,7 @@
register: passphrase
- name: Generate your private key with a passphrase
- command: "openssl genrsa -{{ saml_private_encryption_type }} -passout pass:{{ passphrase.stdout }} -out {{ sso_saml_service_provider_key_filename}} {{ saml_private_key_size }}"
+ command: "openssl genrsa -{{ saml_private_encryption_type }} -passout pass:{{ passphrase.stdout }} -out {{ sso_saml_service_provider_key_file_name}} {{ saml_private_key_size }}"
args:
chdir: "{{ saml_folder }}"
@@ -29,8 +29,8 @@
#
# - name: Generate your private key with a passphrase
# openssl_certificate:
-# path: "{{ sso_saml_service_provider_certificate_filename }}"
-# privatekey_path: "{{ sso_saml_service_provider_key_filename }}"
+# path: "{{ sso_saml_service_provider_certificate_file_name }}"
+# privatekey_path: "{{ sso_saml_service_provider_key_filepath }}"
# csr_path: "{{ saml_cert_signing_request_file_name }}"
# provider: selfsigned
# subject: "{{ saml_cert_subject }}"
@@ -39,27 +39,27 @@
- name: Prep to remove passphrase from Key
copy:
- dest: "{{ saml_folder }}/remove-passphrase-{{ sso_saml_service_provider_key_filename}}"
- src: "{{ saml_folder }}/{{ sso_saml_service_provider_key_filename}}"
+ dest: "{{ saml_folder }}/remove-passphrase-{{ sso_saml_service_provider_key_file_name}}"
+ src: "{{ sso_saml_service_provider_key_filepath}}"
remote_src: yes
- name: Remove the passphrase from the key
- shell: "openssl rsa -in remove-passphrase-{{ sso_saml_service_provider_key_filename}} -passin pass:{{ passphrase.stdout }} -out {{ sso_saml_service_provider_key_filename}}"
+ shell: "openssl rsa -in remove-passphrase-{{ sso_saml_service_provider_key_file_name}} -passin pass:{{ passphrase.stdout }} -out {{ sso_saml_service_provider_key_file_name}}"
args:
chdir: "{{ saml_folder }}"
- name: Clean up passphrase removal file
file:
- path: "{{ saml_folder }}/remove-passphrase-{{ sso_saml_service_provider_key_filename}}"
+ path: "{{ saml_folder }}/remove-passphrase-{{ sso_saml_service_provider_key_file_name}}"
state: absent
- name: Generate certificate signing request for CA
- shell: "openssl req -x509 -sha256 -new -passin pass:{{ passphrase.stdout }} -key {{ sso_saml_service_provider_key_filename}} -out {{ saml_cert_signing_request_file_name }} -subj {{ saml_cert_subject }}"
+ shell: "openssl req -x509 -sha256 -new -passin pass:{{ passphrase.stdout }} -key {{ sso_saml_service_provider_key_file_name}} -out {{ saml_cert_signing_request_file_name }} -subj {{ saml_cert_subject }}"
args:
chdir: "{{ saml_folder }}"
- name: Generate self-signed certificate with 365 days expiry-time
- shell: "openssl x509 -{{ saml_cert_encryption_type }} -days {{ saml_cert_expiry_days }} -in {{ saml_cert_signing_request_file_name }} -signkey {{ sso_saml_service_provider_key_filename}} -out {{ sso_saml_service_provider_certificate_filename }}"
+ shell: "openssl x509 -{{ saml_cert_encryption_type }} -days {{ saml_cert_expiry_days }} -in {{ saml_cert_signing_request_file_name }} -signkey {{ sso_saml_service_provider_key_file_name}} -out {{ sso_saml_service_provider_certificate_file_name }}"
args:
chdir: "{{ saml_folder }}"
diff --git a/tasks/main.yml b/tasks/main.yml
index 90645b9..ce85294 100644
--- a/tasks/main.yml
+++ b/tasks/main.yml
@@ -14,7 +14,7 @@
with_items:
- { key: 'sso_jwt_signinig_key_filepath', value: '{{ sso_jwt_signinig_key_filepath }}' }
- { key: 'sso_saml_service_provider_key', value: '{{ sso_saml_service_provider_key }}' }
- - { key: 'sso_saml_service_provider_certificate', value: '{{ sso_saml_service_provider_certificate }}' }
+ - { key: 'sso_saml_service_provider_certificate', value: '{{ sso_saml_service_provider_certificate_file_path}}' }
- { key: 'edge_sso_installation_config_filename' , value: '{{ edge_sso_installation_config_filename }}' }
- { key: 'edge_sso_installation_config_file', value: "{{ edge_sso_installation_config_file }}" }
- { key: 'saml_folder', value: "{{ saml_folder }}" }