diff options
author | Kenny Woodson <kwoodson@redhat.com> | 2017-02-17 09:34:10 -0500 |
---|---|---|
committer | Kenny Woodson <kwoodson@redhat.com> | 2017-02-20 20:12:16 -0500 |
commit | 5ff3071297b0bd91e5135bbe9def3a59dadfe885 (patch) | |
tree | b3c5e3ae8b7a77ea39a8f6d6af5f1dbc08c20b44 /roles/lib_openshift/src/ansible | |
parent | d517312b0b14c632d66edfe191269e732242a101 (diff) | |
download | openshift-5ff3071297b0bd91e5135bbe9def3a59dadfe885.tar.gz openshift-5ff3071297b0bd91e5135bbe9def3a59dadfe885.tar.bz2 openshift-5ff3071297b0bd91e5135bbe9def3a59dadfe885.tar.xz openshift-5ff3071297b0bd91e5135bbe9def3a59dadfe885.zip |
Rename of oadm_ca to oc_adm_ca. Decided to whittle down to the direct call, server_cert.
Diffstat (limited to 'roles/lib_openshift/src/ansible')
-rw-r--r-- | roles/lib_openshift/src/ansible/oc_adm_ca_server_cert.py (renamed from roles/lib_openshift/src/ansible/oadm_certificate_authority.py) | 20 |
1 files changed, 4 insertions, 16 deletions
diff --git a/roles/lib_openshift/src/ansible/oadm_certificate_authority.py b/roles/lib_openshift/src/ansible/oc_adm_ca_server_cert.py index ad00b25b4..91d8c83b0 100644 --- a/roles/lib_openshift/src/ansible/oadm_certificate_authority.py +++ b/roles/lib_openshift/src/ansible/oc_adm_ca_server_cert.py @@ -3,7 +3,7 @@ def main(): ''' - ansible oadm module for ca + ansible oc adm module for ca create-server-cert ''' module = AnsibleModule( @@ -12,32 +12,20 @@ def main(): debug=dict(default=False, type='bool'), kubeconfig=dict(default='/etc/origin/master/admin.kubeconfig', type='str'), cmd=dict(default=None, require=True, type='str'), - - # oadm ca create-master-certs [options] - cert_dir=dict(default=None, type='str'), - hostnames=dict(default=[], type='list'), - master=dict(default=None, type='str'), - public_master=dict(default=None, type='str'), - overwrite=dict(default=False, type='bool'), - signer_name=dict(default=None, type='str'), - - # oadm ca create-key-pair [options] - private_key=dict(default=None, type='str'), - public_key=dict(default=None, type='str'), - # oadm ca create-server-cert [options] cert=dict(default=None, type='str'), key=dict(default=None, type='str'), signer_cert=dict(default=None, type='str'), signer_key=dict(default=None, type='str'), signer_serial=dict(default=None, type='str'), - + hostnames=dict(default=[], type='list'), + overwrite=dict(default=False, type='bool'), ), supports_check_mode=True, ) # pylint: disable=line-too-long - results = CertificateAuthority.run_ansible(module.params, module.check_mode) + results = CAServerCert.run_ansible(module.params, module.check_mode) if 'failed' in results: return module.fail_json(**results) |