Skip to content

Install cryptography Python library #213

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 9 commits into from
Sep 7, 2023
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 0 additions & 2 deletions docs/role-beats.md
Original file line number Diff line number Diff line change
@@ -10,7 +10,6 @@ Requirements

You need to have the beats you want to install available in your software repositories. We provide a [role](./role-repos.md) for just that but if you have other ways of managing software, just make sure it's available. Alternatively you can install the Beats yourself.

* `cryptography` >= 2.5
* `community.crypto` collection: ansible-galaxy collection install community.crypto

Role Variables
@@ -87,7 +86,6 @@ beats_filebeat_journald_inputs:
* *beats_loglevel*: Level of logging (for all beats) (Default: `info`)
* *beats_logpath*: If logging to file, where to put logfiles (Default: `/var/log/beats`)
* *beats_fields*: Fields that are added to every input in the configuration
* *beats_manage_unzip*: Install `unzip` via package manager (Default: `true`)

The following variables only apply if you use this role together with our other Elastic Stack roles.

5 changes: 0 additions & 5 deletions docs/role-elasticsearch.md
Original file line number Diff line number Diff line change
@@ -9,11 +9,6 @@ If you use the role to set up security you, can use its CA to create certificate

Please note that setting `elasticsearch_bootstrap_pw` as variable will only take effect when initialising Elasticsearch. Changes after starting elasticsearch for the first time will not change the bootstrap password for the instance and will lead to breaking tests.

Requirements
------------

* `cryptography` >= 2.5

Role Variables
--------------

5 changes: 0 additions & 5 deletions docs/role-kibana.md
Original file line number Diff line number Diff line change
@@ -5,11 +5,6 @@ Ansible Role: Kibana

This roles installs and configures Kibana.

Requirements
------------

* `cryptography` >= 2.5

Role Variables
--------------

1 change: 0 additions & 1 deletion docs/role-logstash.md
Original file line number Diff line number Diff line change
@@ -19,7 +19,6 @@ Requirements
------------

* `community.general` collection
* `cryptography` >= 2.5

You need to have the Elastic Repos configured on your system. You can use our [role](./role-repos.md)

1 change: 0 additions & 1 deletion roles/beats/defaults/main.yml
Original file line number Diff line number Diff line change
@@ -10,7 +10,6 @@ elasticstack_beats_port: 5044
beats_logging: file
beats_logpath: /var/log/beats
beats_loglevel: info
beats_manage_unzip: true

# Use TLS without Elastic X-Pack #

10 changes: 7 additions & 3 deletions roles/beats/tasks/beats-security.yml
Original file line number Diff line number Diff line change
@@ -1,11 +1,15 @@
---

- name: Install unzip for certificate handling
- name: Install packages for security tasks
ansible.builtin.package:
name: unzip
when: beats_manage_unzip | bool
name:
- unzip
- python3-cryptography
- openssl
tags:
- certificates
- renew_ca
- renew_kibana_cert
- renew_beats_cert

- name: Ensure beats certificate exists
12 changes: 12 additions & 0 deletions roles/elasticsearch/tasks/elasticsearch-security.yml
Original file line number Diff line number Diff line change
@@ -1,5 +1,17 @@
---

- name: Install packages for security tasks
ansible.builtin.package:
name:
- unzip
- python3-cryptography
- openssl
tags:
- certificates
- renew_ca
- renew_kibana_cert
- renew_es_cert

- name: Set elasticstack_ca variable if not already done by user
ansible.builtin.set_fact:
elasticstack_ca: "{{ groups['elasticsearch'][0] }}"
7 changes: 5 additions & 2 deletions roles/kibana/tasks/kibana-security.yml
Original file line number Diff line number Diff line change
@@ -1,8 +1,11 @@
---

- name: Make sure openssl is installed
- name: Install packages for security tasks
ansible.builtin.package:
name: openssl
name:
- unzip
- python3-cryptography
- openssl
tags:
- certificates
- renew_ca
9 changes: 6 additions & 3 deletions roles/logstash/tasks/logstash-security.yml
Original file line number Diff line number Diff line change
@@ -1,8 +1,11 @@
---

- name: Install unzip for certificate handling
- name: Install packages for security tasks
ansible.builtin.package:
name: unzip
name:
- unzip
- python3-cryptography
- openssl
tags:
- certificates
- renew_ca
@@ -383,7 +386,7 @@

- name: Create logstash password hash salt
ansible.builtin.copy:
content: "{{ lookup('password', '/dev/null', chars=['ascii_lowercase', 'digits'], length=logstash_password_hash_salt_length, seed=logstash_password_hash_salt_seed)}}"
content: "{{ lookup('password', '/dev/null', chars=['ascii_lowercase', 'digits'], length=logstash_password_hash_salt_length, seed=logstash_password_hash_salt_seed) }}"
dest: /root/logstash_password_hash_salt
owner: root
group: root