|
15 | 15 | # See the License for the specific language governing permissions and |
16 | 16 | # limitations under the License. |
17 | 17 |
|
18 | | -from ansible_collections.cloudera.cluster.plugins.module_utils.cm_utils import ( |
19 | | - ClouderaManagerModule, |
20 | | -) |
21 | | -from cm_client import ( |
22 | | - ClouderaManagerResourceApi, |
23 | | - ApiGenerateCmcaArguments, |
24 | | - ApiConfigList, |
25 | | - ApiConfig, |
26 | | -) |
27 | | - |
28 | 18 | DOCUMENTATION = r""" |
29 | 19 | module: cm_autotls |
30 | 20 | short_description: Manage and configure Auto-TLS and Cloudera Manager CA |
|
265 | 255 | returned: when supported |
266 | 256 | """ |
267 | 257 |
|
| 258 | +from ansible_collections.cloudera.cluster.plugins.module_utils.cm_utils import ( |
| 259 | + ClouderaManagerModule, |
| 260 | +) |
| 261 | +from cm_client import ( |
| 262 | + ClouderaManagerResourceApi, |
| 263 | + ApiGenerateCmcaArguments, |
| 264 | + ApiConfigList, |
| 265 | + ApiConfig, |
| 266 | +) |
| 267 | + |
268 | 268 |
|
269 | 269 | class ClouderaManagerAutoTLS(ClouderaManagerModule): |
270 | 270 | def __init__(self, module): |
@@ -400,27 +400,27 @@ def main(): |
400 | 400 | argument_spec=dict( |
401 | 401 | connection_ssh_port=dict(required=False, type="int"), |
402 | 402 | connection_user_name=dict(required=False, type="str"), |
403 | | - connection_password=dict(required=False, type="str"), |
404 | | - connection_private_key=dict(required=False, type="str"), |
405 | | - connection_passphrase=dict(required=False, type="str"), |
| 403 | + connection_password=dict(required=False, type="str", no_log=True), |
| 404 | + connection_private_key=dict(required=False, type="str", no_log=True), |
| 405 | + connection_passphrase=dict(required=False, type="str", no_log=True), |
406 | 406 | configure_all_services=dict(required=False, type="bool", default=True), |
407 | 407 | custom_ca=dict(required=False, type="bool"), |
408 | 408 | force=dict(required=False, type="bool", default=False), |
409 | 409 | location=dict(required=False, type="str"), |
410 | 410 | interpret_as_filenames=dict(required=False, type="bool", default=True), |
411 | 411 | cm_host_cert=dict(required=False, type="str"), |
412 | | - cm_host_key=dict(required=False, type="str"), |
| 412 | + cm_host_key=dict(required=False, type="str", no_log=True), |
413 | 413 | ca_cert=dict(required=False, type="str"), |
414 | | - keystore_passwd=dict(required=False, type="str"), |
415 | | - truststore_passwd=dict(required=False, type="str"), |
| 414 | + keystore_passwd=dict(required=False, type="str", no_log=True), |
| 415 | + truststore_passwd=dict(required=False, type="str", no_log=True), |
416 | 416 | trusted_ca_certs=dict(required=False, type="str"), |
417 | 417 | host_certs=dict( |
418 | 418 | type="list", |
419 | 419 | elements="dict", |
420 | 420 | options=dict( |
421 | 421 | hostname=dict(), |
422 | 422 | certificate=dict(), |
423 | | - key=dict(), |
| 423 | + key=dict(no_log=True), |
424 | 424 | ), |
425 | 425 | ), |
426 | 426 | state=dict( |
|
0 commit comments