summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorMartin Krizek <martin.krizek@gmail.com>2021-10-19 17:45:15 +0200
committerGitHub <noreply@github.com>2021-10-19 08:45:15 -0700
commit2f3fbaac3c4f4729f6ccd21c6a9375f90070f3e6 (patch)
tree34ec898d4c4a8c2192b80fa232d6a449cc563de5
parent227f4398c2d57355b5436bd22ad3fe16763afc3c (diff)
downloadansible-2f3fbaac3c4f4729f6ccd21c6a9375f90070f3e6.tar.gz
Remove unused test/support plugins (#76078)
-rw-r--r--test/sanity/ignore.txt6
-rw-r--r--test/support/integration/plugins/lookup/rabbitmq.py190
-rw-r--r--test/support/integration/plugins/module_utils/crypto.py2125
-rw-r--r--test/support/integration/plugins/module_utils/database.py142
-rw-r--r--test/support/integration/plugins/module_utils/ecs/__init__.py0
-rw-r--r--test/support/integration/plugins/module_utils/ecs/api.py364
-rw-r--r--test/support/integration/plugins/module_utils/mysql.py106
-rw-r--r--test/support/integration/plugins/module_utils/postgres.py330
-rw-r--r--test/support/integration/plugins/module_utils/rabbitmq.py220
9 files changed, 0 insertions, 3483 deletions
diff --git a/test/sanity/ignore.txt b/test/sanity/ignore.txt
index 15a7226967..07e2e15b20 100644
--- a/test/sanity/ignore.txt
+++ b/test/sanity/ignore.txt
@@ -187,15 +187,9 @@ test/support/integration/plugins/module_utils/cloud.py pylint:isinstance-second-
test/support/integration/plugins/module_utils/compat/ipaddress.py future-import-boilerplate
test/support/integration/plugins/module_utils/compat/ipaddress.py metaclass-boilerplate
test/support/integration/plugins/module_utils/compat/ipaddress.py no-unicode-literals
-test/support/integration/plugins/module_utils/database.py future-import-boilerplate
-test/support/integration/plugins/module_utils/database.py metaclass-boilerplate
-test/support/integration/plugins/module_utils/mysql.py future-import-boilerplate
-test/support/integration/plugins/module_utils/mysql.py metaclass-boilerplate
test/support/integration/plugins/module_utils/network/common/utils.py future-import-boilerplate
test/support/integration/plugins/module_utils/network/common/utils.py metaclass-boilerplate
test/support/integration/plugins/module_utils/network/common/utils.py pylint:use-a-generator
-test/support/integration/plugins/module_utils/postgres.py future-import-boilerplate
-test/support/integration/plugins/module_utils/postgres.py metaclass-boilerplate
test/support/network-integration/collections/ansible_collections/ansible/netcommon/plugins/filter/network.py pylint:consider-using-dict-comprehension
test/support/network-integration/collections/ansible_collections/ansible/netcommon/plugins/module_utils/compat/ipaddress.py no-unicode-literals
test/support/network-integration/collections/ansible_collections/ansible/netcommon/plugins/module_utils/compat/ipaddress.py pep8:E203
diff --git a/test/support/integration/plugins/lookup/rabbitmq.py b/test/support/integration/plugins/lookup/rabbitmq.py
deleted file mode 100644
index 7c2745f41d..0000000000
--- a/test/support/integration/plugins/lookup/rabbitmq.py
+++ /dev/null
@@ -1,190 +0,0 @@
-# (c) 2018, John Imison <john+github@imison.net>
-# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt)
-
-from __future__ import (absolute_import, division, print_function)
-__metaclass__ = type
-
-DOCUMENTATION = """
- lookup: rabbitmq
- author: John Imison <@Im0>
- version_added: "2.8"
- short_description: Retrieve messages from an AMQP/AMQPS RabbitMQ queue.
- description:
- - This lookup uses a basic get to retrieve all, or a limited number C(count), messages from a RabbitMQ queue.
- options:
- url:
- description:
- - An URI connection string to connect to the AMQP/AMQPS RabbitMQ server.
- - For more information refer to the URI spec U(https://www.rabbitmq.com/uri-spec.html).
- required: True
- queue:
- description:
- - The queue to get messages from.
- required: True
- count:
- description:
- - How many messages to collect from the queue.
- - If not set, defaults to retrieving all the messages from the queue.
- requirements:
- - The python pika package U(https://pypi.org/project/pika/).
- notes:
- - This lookup implements BlockingChannel.basic_get to get messages from a RabbitMQ server.
- - After retrieving a message from the server, receipt of the message is acknowledged and the message on the server is deleted.
- - Pika is a pure-Python implementation of the AMQP 0-9-1 protocol that tries to stay fairly independent of the underlying network support library.
- - More information about pika can be found at U(https://pika.readthedocs.io/en/stable/).
- - This plugin is tested against RabbitMQ. Other AMQP 0.9.1 protocol based servers may work but not tested/guaranteed.
- - Assigning the return messages to a variable under C(vars) may result in unexpected results as the lookup is evaluated every time the
- variable is referenced.
- - Currently this plugin only handles text based messages from a queue. Unexpected results may occur when retrieving binary data.
-"""
-
-
-EXAMPLES = """
-- name: Get all messages off a queue
- debug:
- msg: "{{ lookup('rabbitmq', url='amqp://guest:guest@192.168.0.10:5672/%2F', queue='hello') }}"
-
-
-# If you are intending on using the returned messages as a variable in more than
-# one task (eg. debug, template), it is recommended to set_fact.
-
-- name: Get 2 messages off a queue and set a fact for re-use
- set_fact:
- messages: "{{ lookup('rabbitmq', url='amqp://guest:guest@192.168.0.10:5672/%2F', queue='hello', count=2) }}"
-
-- name: Dump out contents of the messages
- debug:
- var: messages
-
-"""
-
-RETURN = """
- _list:
- description:
- - A list of dictionaries with keys and value from the queue.
- type: list
- contains:
- content_type:
- description: The content_type on the message in the queue.
- type: str
- delivery_mode:
- description: The delivery_mode on the message in the queue.
- type: str
- delivery_tag:
- description: The delivery_tag on the message in the queue.
- type: str
- exchange:
- description: The exchange the message came from.
- type: str
- message_count:
- description: The message_count for the message on the queue.
- type: str
- msg:
- description: The content of the message.
- type: str
- redelivered:
- description: The redelivered flag. True if the message has been delivered before.
- type: bool
- routing_key:
- description: The routing_key on the message in the queue.
- type: str
- headers:
- description: The headers for the message returned from the queue.
- type: dict
- json:
- description: If application/json is specified in content_type, json will be loaded into variables.
- type: dict
-
-"""
-
-import json
-
-from ansible.errors import AnsibleError, AnsibleParserError
-from ansible.plugins.lookup import LookupBase
-from ansible.module_utils._text import to_native, to_text
-from ansible.utils.display import Display
-
-try:
- import pika
- from pika import spec
- HAS_PIKA = True
-except ImportError:
- HAS_PIKA = False
-
-display = Display()
-
-
-class LookupModule(LookupBase):
-
- def run(self, terms, variables=None, url=None, queue=None, count=None):
- if not HAS_PIKA:
- raise AnsibleError('pika python package is required for rabbitmq lookup.')
- if not url:
- raise AnsibleError('URL is required for rabbitmq lookup.')
- if not queue:
- raise AnsibleError('Queue is required for rabbitmq lookup.')
-
- display.vvv(u"terms:%s : variables:%s url:%s queue:%s count:%s" % (terms, variables, url, queue, count))
-
- try:
- parameters = pika.URLParameters(url)
- except Exception as e:
- raise AnsibleError("URL malformed: %s" % to_native(e))
-
- try:
- connection = pika.BlockingConnection(parameters)
- except Exception as e:
- raise AnsibleError("Connection issue: %s" % to_native(e))
-
- try:
- conn_channel = connection.channel()
- except pika.exceptions.AMQPChannelError as e:
- try:
- connection.close()
- except pika.exceptions.AMQPConnectionError as ie:
- raise AnsibleError("Channel and connection closing issues: %s / %s" % to_native(e), to_native(ie))
- raise AnsibleError("Channel issue: %s" % to_native(e))
-
- ret = []
- idx = 0
-
- while True:
- method_frame, properties, body = conn_channel.basic_get(queue=queue)
- if method_frame:
- display.vvv(u"%s, %s, %s " % (method_frame, properties, to_text(body)))
-
- # TODO: In the future consider checking content_type and handle text/binary data differently.
- msg_details = dict({
- 'msg': to_text(body),
- 'message_count': method_frame.message_count,
- 'routing_key': method_frame.routing_key,
- 'delivery_tag': method_frame.delivery_tag,
- 'redelivered': method_frame.redelivered,
- 'exchange': method_frame.exchange,
- 'delivery_mode': properties.delivery_mode,
- 'content_type': properties.content_type,
- 'headers': properties.headers
- })
- if properties.content_type == 'application/json':
- try:
- msg_details['json'] = json.loads(msg_details['msg'])
- except ValueError as e:
- raise AnsibleError("Unable to decode JSON for message %s: %s" % (method_frame.delivery_tag, to_native(e)))
-
- ret.append(msg_details)
- conn_channel.basic_ack(method_frame.delivery_tag)
- idx += 1
- if method_frame.message_count == 0 or idx == count:
- break
- # If we didn't get a method_frame, exit.
- else:
- break
-
- if connection.is_closed:
- return [ret]
- else:
- try:
- connection.close()
- except pika.exceptions.AMQPConnectionError:
- pass
- return [ret]
diff --git a/test/support/integration/plugins/module_utils/crypto.py b/test/support/integration/plugins/module_utils/crypto.py
deleted file mode 100644
index f3f43f071b..0000000000
--- a/test/support/integration/plugins/module_utils/crypto.py
+++ /dev/null
@@ -1,2125 +0,0 @@
-# -*- coding: utf-8 -*-
-#
-# (c) 2016, Yanis Guenane <yanis+ansible@guenane.org>
-#
-# Ansible is free software: you can redistribute it and/or modify
-# it under the terms of the GNU General Public License as published by
-# the Free Software Foundation, either version 3 of the License, or
-# (at your option) any later version.
-#
-# Ansible is distributed in the hope that it will be useful,
-# but WITHOUT ANY WARRANTY; without even the implied warranty of
-# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
-# GNU General Public License for more details.
-#
-# You should have received a copy of the GNU General Public License
-# along with Ansible. If not, see <http://www.gnu.org/licenses/>.
-#
-# ----------------------------------------------------------------------
-# A clearly marked portion of this file is licensed under the BSD license
-# Copyright (c) 2015, 2016 Paul Kehrer (@reaperhulk)
-# Copyright (c) 2017 Fraser Tweedale (@frasertweedale)
-# For more details, search for the function _obj2txt().
-# ---------------------------------------------------------------------
-# A clearly marked portion of this file is extracted from a project that
-# is licensed under the Apache License 2.0
-# Copyright (c) the OpenSSL contributors
-# For more details, search for the function _OID_MAP.
-
-from __future__ import absolute_import, division, print_function
-__metaclass__ = type
-
-
-import sys
-from ansible.module_utils.compat.version import LooseVersion
-
-try:
- import OpenSSL
- from OpenSSL import crypto
-except ImportError:
- # An error will be raised in the calling class to let the end
- # user know that OpenSSL couldn't be found.
- pass
-
-try:
- import cryptography
- from cryptography import x509
- from cryptography.hazmat.backends import default_backend as cryptography_backend
- from cryptography.hazmat.primitives.serialization import load_pem_private_key
- from cryptography.hazmat.primitives import hashes
- from cryptography.hazmat.primitives import serialization
- import ipaddress
-
- # Older versions of cryptography (< 2.1) do not have __hash__ functions for
- # general name objects (DNSName, IPAddress, ...), while providing overloaded
- # equality and string representation operations. This makes it impossible to
- # use them in hash-based data structures such as set or dict. Since we are
- # actually doing that in openssl_certificate, and potentially in other code,
- # we need to monkey-patch __hash__ for these classes to make sure our code
- # works fine.
- if LooseVersion(cryptography.__version__) < LooseVersion('2.1'):
- # A very simply hash function which relies on the representation
- # of an object to be implemented. This is the case since at least
- # cryptography 1.0, see
- # https://github.com/pyca/cryptography/commit/7a9abce4bff36c05d26d8d2680303a6f64a0e84f
- def simple_hash(self):
- return hash(repr(self))
-
- # The hash functions for the following types were added for cryptography 2.1:
- # https://github.com/pyca/cryptography/commit/fbfc36da2a4769045f2373b004ddf0aff906cf38
- x509.DNSName.__hash__ = simple_hash
- x509.DirectoryName.__hash__ = simple_hash
- x509.GeneralName.__hash__ = simple_hash
- x509.IPAddress.__hash__ = simple_hash
- x509.OtherName.__hash__ = simple_hash
- x509.RegisteredID.__hash__ = simple_hash
-
- if LooseVersion(cryptography.__version__) < LooseVersion('1.2'):
- # The hash functions for the following types were added for cryptography 1.2:
- # https://github.com/pyca/cryptography/commit/b642deed88a8696e5f01ce6855ccf89985fc35d0
- # https://github.com/pyca/cryptography/commit/d1b5681f6db2bde7a14625538bd7907b08dfb486
- x509.RFC822Name.__hash__ = simple_hash
- x509.UniformResourceIdentifier.__hash__ = simple_hash
-
- # Test whether we have support for X25519, X448, Ed25519 and/or Ed448
- try:
- import cryptography.hazmat.primitives.asymmetric.x25519
- CRYPTOGRAPHY_HAS_X25519 = True
- try:
- cryptography.hazmat.primitives.asymmetric.x25519.X25519PrivateKey.private_bytes
- CRYPTOGRAPHY_HAS_X25519_FULL = True
- except AttributeError:
- CRYPTOGRAPHY_HAS_X25519_FULL = False
- except ImportError:
- CRYPTOGRAPHY_HAS_X25519 = False
- CRYPTOGRAPHY_HAS_X25519_FULL = False
- try:
- import cryptography.hazmat.primitives.asymmetric.x448
- CRYPTOGRAPHY_HAS_X448 = True
- except ImportError:
- CRYPTOGRAPHY_HAS_X448 = False
- try:
- import cryptography.hazmat.primitives.asymmetric.ed25519
- CRYPTOGRAPHY_HAS_ED25519 = True
- except ImportError:
- CRYPTOGRAPHY_HAS_ED25519 = False
- try:
- import cryptography.hazmat.primitives.asymmetric.ed448
- CRYPTOGRAPHY_HAS_ED448 = True
- except ImportError:
- CRYPTOGRAPHY_HAS_ED448 = False
-
- HAS_CRYPTOGRAPHY = True
-except ImportError:
- # Error handled in the calling module.
- CRYPTOGRAPHY_HAS_X25519 = False
- CRYPTOGRAPHY_HAS_X25519_FULL = False
- CRYPTOGRAPHY_HAS_X448 = False
- CRYPTOGRAPHY_HAS_ED25519 = False
- CRYPTOGRAPHY_HAS_ED448 = False
- HAS_CRYPTOGRAPHY = False
-
-
-import abc
-import base64
-import binascii
-import datetime
-import errno
-import hashlib
-import os
-import re
-import tempfile
-
-from ansible.module_utils import six
-from ansible.module_utils._text import to_native, to_bytes, to_text
-
-
-class OpenSSLObjectError(Exception):
- pass
-
-
-class OpenSSLBadPassphraseError(OpenSSLObjectError):
- pass
-
-
-def get_fingerprint_of_bytes(source):
- """Generate the fingerprint of the given bytes."""
-
- fingerprint = {}
-
- try:
- algorithms = hashlib.algorithms
- except AttributeError:
- try:
- algorithms = hashlib.algorithms_guaranteed
- except AttributeError:
- return None
-
- for algo in algorithms:
- f = getattr(hashlib, algo)
- try:
- h = f(source)
- except ValueError:
- # This can happen for hash algorithms not supported in FIPS mode
- # (https://github.com/ansible/ansible/issues/67213)
- continue
- try:
- # Certain hash functions have a hexdigest() which expects a length parameter
- pubkey_digest = h.hexdigest()
- except TypeError:
- pubkey_digest = h.hexdigest(32)
- fingerprint[algo] = ':'.join(pubkey_digest[i:i + 2] for i in range(0, len(pubkey_digest), 2))
-
- return fingerprint
-
-
-def get_fingerprint(path, passphrase=None, content=None, backend='pyopenssl'):
- """Generate the fingerprint of the public key. """
-
- privatekey = load_privatekey(path, passphrase=passphrase, content=content, check_passphrase=False, backend=backend)
-
- if backend == 'pyopenssl':
- try:
- publickey = crypto.dump_publickey(crypto.FILETYPE_ASN1, privatekey)
- except AttributeError:
- # If PyOpenSSL < 16.0 crypto.dump_publickey() will fail.
- try:
- bio = crypto._new_mem_buf()
- rc = crypto._lib.i2d_PUBKEY_bio(bio, privatekey._pkey)
- if rc != 1:
- crypto._raise_current_error()
- publickey = crypto._bio_to_string(bio)
- except AttributeError:
- # By doing this we prevent the code from raising an error
- # yet we return no value in the fingerprint hash.
- return None
- elif backend == 'cryptography':
- publickey = privatekey.public_key().public_bytes(
- serialization.Encoding.DER,
- serialization.PublicFormat.SubjectPublicKeyInfo
- )
-
- return get_fingerprint_of_bytes(publickey)
-
-
-def load_file_if_exists(path, module=None, ignore_errors=False):
- try:
- with open(path, 'rb') as f:
- return f.read()
- except EnvironmentError as exc:
- if exc.errno == errno.ENOENT:
- return None
- if ignore_errors:
- return None
- if module is None:
- raise
- module.fail_json('Error while loading {0} - {1}'.format(path, str(exc)))
- except Exception as exc:
- if ignore_errors:
- return None
- if module is None:
- raise
- module.fail_json('Error while loading {0} - {1}'.format(path, str(exc)))
-
-
-def load_privatekey(path, passphrase=None, check_passphrase=True, content=None, backend='pyopenssl'):
- """Load the specified OpenSSL private key.
-
- The content can also be specified via content; in that case,
- this function will not load the key from disk.
- """
-
- try:
- if content is None:
- with open(path, 'rb') as b_priv_key_fh:
- priv_key_detail = b_priv_key_fh.read()
- else:
- priv_key_detail = content
-
- if backend == 'pyopenssl':
-
- # First try: try to load with real passphrase (resp. empty string)
- # Will work if this is the correct passphrase, or the key is not
- # password-protected.
- try:
- result = crypto.load_privatekey(crypto.FILETYPE_PEM,
- priv_key_detail,
- to_bytes(passphrase or ''))
- except crypto.Error as e:
- if len(e.args) > 0 and len(e.args[0]) > 0:
- if e.args[0][0][2] in ('bad decrypt', 'bad password read'):
- # This happens in case we have the wrong passphrase.
- if passphrase is not None:
- raise OpenSSLBadPassphraseError('Wrong passphrase provided for private key!')
- else:
- raise OpenSSLBadPassphraseError('No passphrase provided, but private key is password-protected!')
- raise OpenSSLObjectError('Error while deserializing key: {0}'.format(e))
- if check_passphrase:
- # Next we want to make sure that the key is actually protected by
- # a passphrase (in case we did try the empty string before, make
- # sure that the key is not protected by the empty string)
- try:
- crypto.load_privatekey(crypto.FILETYPE_PEM,
- priv_key_detail,
- to_bytes('y' if passphrase == 'x' else 'x'))
- if passphrase is not None:
- # Since we can load the key without an exception, the
- # key isn't password-protected
- raise OpenSSLBadPassphraseError('Passphrase provided, but private key is not password-protected!')
- except crypto.Error as e:
- if passphrase is None and len(e.args) > 0 and len(e.args[0]) > 0:
- if e.args[0][0][2] in ('bad decrypt', 'bad password read'):
- # The key is obviously protected by the empty string.
- # Don't do this at home (if it's possible at all)...
- raise OpenSSLBadPassphraseError('No passphrase provided, but private key is password-protected!')
- elif backend == 'cryptography':
- try:
- result = load_pem_private_key(priv_key_detail,
- None if passphrase is None else to_bytes(passphrase),
- cryptography_backend())
- except TypeError as dummy:
- raise OpenSSLBadPassphraseError('Wrong or empty passphrase provided for private key')
- except ValueError as dummy:
- raise OpenSSLBadPassphraseError('Wrong passphrase provided for private key')
-
- return result
- except (IOError, OSError) as exc:
- raise OpenSSLObjectError(exc)
-
-
-def load_certificate(path, content=None, backend='pyopenssl'):
- """Load the specified certificate."""
-
- try:
- if content is None:
- with open(path, 'rb') as cert_fh:
- cert_content = cert_fh.read()
- else:
- cert_content = content
- if backend == 'pyopenssl':
- return crypto.load_certificate(crypto.FILETYPE_PEM, cert_content)
- elif backend == 'cryptography':
- return x509.load_pem_x509_certificate(cert_content, cryptography_backend())
- except (IOError, OSError) as exc:
- raise OpenSSLObjectError(exc)
-
-
-def load_certificate_request(path, content=None, backend='pyopenssl'):
- """Load the specified certificate signing request."""
- try:
- if content is None:
- with open(path, 'rb') as csr_fh:
- csr_content = csr_fh.read()
- else:
- csr_content = content
- except (IOError, OSError) as exc:
- raise OpenSSLObjectError(exc)
- if backend == 'pyopenssl':
- return crypto.load_certificate_request(crypto.FILETYPE_PEM, csr_content)
- elif backend == 'cryptography':
- return x509.load_pem_x509_csr(csr_content, cryptography_backend())
-
-
-def parse_name_field(input_dict):
- """Take a dict with key: value or key: list_of_values mappings and return a list of tuples"""
-
- result = []
- for key in input_dict:
- if isinstance(input_dict[key], list):
- for entry in input_dict[key]:
- result.append((key, entry))
- else:
- result.append((key, input_dict[key]))
- return result
-
-
-def convert_relative_to_datetime(relative_time_string):
- """Get a datetime.datetime or None from a string in the time format described in sshd_config(5)"""
-
- parsed_result = re.match(
- r"^(?P<prefix>[+-])((?P<weeks>\d+)[wW])?((?P<days>\d+)[dD])?((?P<hours>\d+)[hH])?((?P<minutes>\d+)[mM])?((?P<seconds>\d+)[sS]?)?$",
- relative_time_string)
-
- if parsed_result is None or len(relative_time_string) == 1:
- # not matched or only a single "+" or "-"
- return None
-
- offset = datetime.timedelta(0)
- if parsed_result.group("weeks") is not None:
- offset += datetime.timedelta(weeks=int(parsed_result.group("weeks")))
- if parsed_result.group("days") is not None:
- offset += datetime.timedelta(days=int(parsed_result.group("days")))
- if parsed_result.group("hours") is not None:
- offset += datetime.timedelta(hours=int(parsed_result.group("hours")))
- if parsed_result.group("minutes") is not None:
- offset += datetime.timedelta(
- minutes=int(parsed_result.group("minutes")))
- if parsed_result.group("seconds") is not None:
- offset += datetime.timedelta(
- seconds=int(parsed_result.group("seconds")))
-
- if parsed_result.group("prefix") == "+":
- return datetime.datetime.utcnow() + offset
- else:
- return datetime.datetime.utcnow() - offset
-
-
-def get_relative_time_option(input_string, input_name, backend='cryptography'):
- """Return an absolute timespec if a relative timespec or an ASN1 formatted
- string is provided.
-
- The return value will be a datetime object for the cryptography backend,
- and a ASN1 formatted string for the pyopenssl backend."""
- result = to_native(input_string)
- if result is None:
- raise OpenSSLObjectError(
- 'The timespec "%s" for %s is not valid' %
- input_string, input_name)
- # Relative time
- if result.startswith("+") or result.startswith("-"):
- result_datetime = convert_relative_to_datetime(result)
- if backend == 'pyopenssl':
- return result_datetime.strftime("%Y%m%d%H%M%SZ")
- elif backend == 'cryptography':
- return result_datetime
- # Absolute time
- if backend == 'pyopenssl':
- return input_string
- elif backend == 'cryptography':
- for date_fmt in ['%Y%m%d%H%M%SZ', '%Y%m%d%H%MZ', '%Y%m%d%H%M%S%z', '%Y%m%d%H%M%z']:
- try:
- return datetime.datetime.strptime(result, date_fmt)
- except ValueError:
- pass
-
- raise OpenSSLObjectError(
- 'The time spec "%s" for %s is invalid' %
- (input_string, input_name)
- )
-
-
-def select_message_digest(digest_string):
- digest = None
- if digest_string == 'sha256':
- digest = hashes.SHA256()
- elif digest_string == 'sha384':
- digest = hashes.SHA384()
- elif digest_string == 'sha512':
- digest = hashes.SHA512()
- elif digest_string == 'sha1':
- digest = hashes.SHA1()
- elif digest_string == 'md5':
- digest = hashes.MD5()
- return digest
-
-
-def write_file(module, content, default_mode=None, path=None):
- '''
- Writes content into destination file as securely as possible.
- Uses file arguments from module.
- '''
- # Find out parameters for file
- file_args = module.load_file_common_arguments(module.params, path=path)
- if file_args['mode'] is None:
- file_args['mode'] = default_mode
- # Create tempfile name
- tmp_fd, tmp_name = tempfile.mkstemp(prefix=b'.ansible_tmp')
- try:
- os.close(tmp_fd)
- except Exception as dummy:
- pass
- module.add_cleanup_file(tmp_name) # if we fail, let Ansible try to remove the file
- try:
- try:
- # Create tempfile
- file = os.open(tmp_name, os.O_WRONLY | os.O_CREAT | os.O_TRUNC, 0o600)
- os.write(file, content)
- os.close(file)
- except Exception as e:
- try:
- os.remove(tmp_name)
- except Exception as dummy:
- pass
- module.fail_json(msg='Error while writing result into temporary file: {0}'.format(e))
- # Update destination to wanted permissions
- if os.path.exists(file_args['path']):
- module.set_fs_attributes_if_different(file_args, False)
- # Move tempfile to final destination
- module.atomic_move(tmp_name, file_args['path'])
- # Try to update permissions again
- module.set_fs_attributes_if_different(file_args, False)
- except Exception as e:
- try:
- os.remove(tmp_name)
- except Exception as dummy:
- pass
- module.fail_json(msg='Error while writing result: {0}'.format(e))
-
-
-@six.add_metaclass(abc.ABCMeta)
-class OpenSSLObject(object):
-
- def __init__(self, path, state, force, check_mode):
- self.path = path
- self.state = state
- self.force = force
- self.name = os.path.basename(path)
- self.changed = False
- self.check_mode = check_mode
-
- def check(self, module, perms_required=True):
- """Ensure the resource is in its desired state."""
-
- def _check_state():
- return os.path.exists(self.path)
-
- def _check_perms(module):
- file_args = module.load_file_common_arguments(module.params)
- return not module.set_fs_attributes_if_different(file_args, False)
-
- if not perms_required:
- return _check_state()
-
- return _check_state() and _check_perms(module)
-
- @abc.abstractmethod
- def dump(self):
- """Serialize the object into a dictionary."""
-
- pass
-
- @abc.abstractmethod
- def generate(self):
- """Generate the resource."""
-
- pass
-
- def remove(self, module):
- """Remove the resource from the filesystem."""
-
- try:
- os.remove(self.path)
- self.changed = True
- except OSError as exc:
- if exc.errno != errno.ENOENT:
- raise OpenSSLObjectError(exc)
- else:
- pass
-
-
-# #####################################################################################
-# #####################################################################################
-# This has been extracted from the OpenSSL project's objects.txt:
-# https://github.com/openssl/openssl/blob/9537fe5757bb07761fa275d779bbd40bcf5530e4/crypto/objects/objects.txt
-# Extracted with https://gist.github.com/felixfontein/376748017ad65ead093d56a45a5bf376
-#
-# In case the following data structure has any copyrightable content, note that it is licensed as follows:
-# Copyright (c) the OpenSSL contributors
-# Licensed under the Apache License 2.0
-# https://github.com/openssl/openssl/blob/master/LICENSE
-_OID_MAP = {
- '0': ('itu-t', 'ITU-T', 'ccitt'),
- '0.3.4401.5': ('ntt-ds', ),
- '0.3.4401.5.3.1.9': ('camellia', ),
- '0.3.4401.5.3.1.9.1': ('camellia-128-ecb', 'CAMELLIA-128-ECB'),
- '0.3.4401.5.3.1.9.3': ('camellia-128-ofb', 'CAMELLIA-128-OFB'),
- '0.3.4401.5.3.1.9.4': ('camellia-128-cfb', 'CAMELLIA-128-CFB'),
- '0.3.4401.5.3.1.9.6': ('camellia-128-gcm', 'CAMELLIA-128-GCM'),
- '0.3.4401.5.3.1.9.7': ('camellia-128-ccm', 'CAMELLIA-128-CCM'),
- '0.3.4401.5.3.1.9.9': ('camellia-128-ctr', 'CAMELLIA-128-CTR'),
- '0.3.4401.5.3.1.9.10': ('camellia-128-cmac', 'CAMELLIA-128-CMAC'),
- '0.3.4401.5.3.1.9.21': ('camellia-192-ecb', 'CAMELLIA-192-ECB'),
- '0.3.4401.5.3.1.9.23': ('camellia-192-ofb', 'CAMELLIA-192-OFB'),
- '0.3.4401.5.3.1.9.24': ('camellia-192-cfb', 'CAMELLIA-192-CFB'),
- '0.3.4401.5.3.1.9.26': ('camellia-192-gcm', 'CAMELLIA-192-GCM'),
- '0.3.4401.5.3.1.9.27': ('camellia-192-ccm', 'CAMELLIA-192-CCM'),
- '0.3.4401.5.3.1.9.29': ('camellia-192-ctr', 'CAMELLIA-192-CTR'),
- '0.3.4401.5.3.1.9.30': ('camellia-192-cmac', 'CAMELLIA-192-CMAC'),
- '0.3.4401.5.3.1.9.41': ('camellia-256-ecb', 'CAMELLIA-256-ECB'),
- '0.3.4401.5.3.1.9.43': ('camellia-256-ofb', 'CAMELLIA-256-OFB'),
- '0.3.4401.5.3.1.9.44': ('camellia-256-cfb', 'CAMELLIA-256-CFB'),
- '0.3.4401.5.3.1.9.46': ('camellia-256-gcm', 'CAMELLIA-256-GCM'),
- '0.3.4401.5.3.1.9.47': ('camellia-256-ccm', 'CAMELLIA-256-CCM'),
- '0.3.4401.5.3.1.9.49': ('camellia-256-ctr', 'CAMELLIA-256-CTR'),
- '0.3.4401.5.3.1.9.50': ('camellia-256-cmac', 'CAMELLIA-256-CMAC'),
- '0.9': ('data', ),
- '0.9.2342': ('pss', ),
- '0.9.2342.19200300': ('ucl', ),
- '0.9.2342.19200300.100': ('pilot', ),
- '0.9.2342.19200300.100.1': ('pilotAttributeType', ),
- '0.9.2342.19200300.100.1.1': ('userId', 'UID'),
- '0.9.2342.19200300.100.1.2': ('textEncodedORAddress', ),
- '0.9.2342.19200300.100.1.3': ('rfc822Mailbox', 'mail'),
- '0.9.2342.19200300.100.1.4': ('info', ),
- '0.9.2342.19200300.100.1.5': ('favouriteDrink', ),
- '0.9.2342.19200300.100.1.6': ('roomNumber', ),
- '0.9.2342.19200300.100.1.7': ('photo', ),
- '0.9.2342.19200300.100.1.8': ('userClass', ),
- '0.9.2342.19200300.100.1.9': ('host', ),
- '0.9.2342.19200300.100.1.10': ('manager', ),
- '0.9.2342.19200300.100.1.11': ('documentIdentifier', ),
- '0.9.2342.19200300.100.1.12': ('documentTitle', ),
- '0.9.2342.19200300.100.1.13': ('documentVersion', ),
- '0.9.2342.19200300.100.1.14': ('documentAuthor', ),
- '0.9.2342.19200300.100.1.15': ('documentLocation', ),
- '0.9.2342.19200300.100.1.20': ('homeTelephoneNumber', ),
- '0.9.2342.19200300.100.1.21': ('secretary', ),
- '0.9.2342.19200300.100.1.22': ('otherMailbox', ),
- '0.9.2342.19200300.100.1.23': ('lastModifiedTime', ),
- '0.9.2342.19200300.100.1.24': ('lastModifiedBy', ),
- '0.9.2342.19200300.100.1.25': ('domainComponent', 'DC'),
- '0.9.2342.19200300.100.1.26': ('aRecord', ),
- '0.9.2342.19200300.100.1.27': ('pilotAttributeType27', ),
- '0.9.2342.19200300.100.1.28': ('mXRecord', ),
- '0.9.2342.19200300.100.1.29': ('nSRecord', ),
- '0.9.2342.19200300.100.1.30': ('sOARecord', ),
- '0.9.2342.19200300.100.1.31': ('cNAMERecord', ),
- '0.9.2342.19200300.100.1.37': ('associatedDomain', ),
- '0.9.2342.19200300.100.1.38': ('associatedName', ),
- '0.9.2342.19200300.100.1.39': ('homePostalAddress', ),
- '0.9.2342.19200300.100.1.40': ('personalTitle', ),
- '0.9.2342.19200300.100.1.41': ('mobileTelephoneNumber', ),
- '0.9.2342.19200300.100.1.42': ('pagerTelephoneNumber', ),
- '0.9.2342.19200300.100.1.43': ('friendlyCountryName', ),
- '0.9.2342.19200300.100.1.44': ('uniqueIdentifier', 'uid'),
- '0.9.2342.19200300.100.1.45': ('organizationalStatus', ),
- '0.9.2342.19200300.100.1.46': ('janetMailbox', ),
- '0.9.2342.19200300.100.1.47': ('mailPreferenceOption', ),
- '0.9.2342.19200300.100.1.48': ('buildingName', ),
- '0.9.2342.19200300.100.1.49': ('dSAQuality', ),
- '0.9.2342.19200300.100.1.50': ('singleLevelQuality', ),
- '0.9.2342.19200300.100.1.51': ('subtreeMinimumQuality', ),
- '0.9.2342.19200300.100.1.52': ('subtreeMaximumQuality', ),
- '0.9.2342.19200300.100.1.53': ('personalSignature', ),
- '0.9.2342.19200300.100.1.54': ('dITRedirect', ),
- '0.9.2342.19200300.100.1.55': ('audio', ),
- '0.9.2342.19200300.100.1.56': ('documentPublisher', ),
- '0.9.2342.19200300.100.3': ('pilotAttributeSyntax', ),
- '0.9.2342.19200300.100.3.4': ('iA5StringSyntax', ),
- '0.9.2342.19200300.100.3.5': ('caseIgnoreIA5StringSyntax', ),
- '0.9.2342.19200300.100.4': ('pilotObjectClass', ),
- '0.9.2342.19200300.100.4.3': ('pilotObject', ),
- '0.9.2342.19200300.100.4.4': ('pilotPerson', ),
- '0.9.2342.19200300.100.4.5': ('account', ),
- '0.9.2342.19200300.100.4.6': ('document', ),
- '0.9.2342.19200300.100.4.7': ('room', ),
- '0.9.2342.19200300.100.4.9': ('documentSeries', ),
- '0.9.2342.19200300.100.4.13': ('Domain', 'domain'),
- '0.9.2342.19200300.100.4.14': ('rFC822localPart', ),
- '0.9.2342.19200300.100.4.15': ('dNSDomain', ),
- '0.9.2342.19200300.100.4.17': ('domainRelatedObject', ),
- '0.9.2342.19200300.100.4.18': ('friendlyCountry', ),
- '0.9.2342.19200300.100.4.19': ('simpleSecurityObject', ),
- '0.9.2342.19200300.100.4.20': ('pilotOrganization', ),
- '0.9.2342.19200300.100.4.21': ('pilotDSA', ),
- '0.9.2342.19200300.100.4.22': ('qualityLabelledData', ),
- '0.9.2342.19200300.100.10': ('pilotGroups', ),
- '1': ('iso', 'ISO'),
- '1.0.9797.3.4': ('gmac', 'GMAC'),
- '1.0.10118.3.0.55': ('whirlpool', ),
- '1.2': ('ISO Member Body', 'member-body'),
- '1.2.156': ('ISO CN Member Body', 'ISO-CN'),
- '1.2.156.10197': ('oscca', ),
- '1.2.156.10197.1': ('sm-scheme', ),
- '1.2.156.10197.1.104.1': ('sm4-ecb', 'SM4-ECB'),
- '1.2.156.10197.1.104.2': ('sm4-cbc', 'SM4-CBC'),
- '1.2.156.10197.1.104.3': ('sm4-ofb', 'SM4-OFB'),
- '1.2.156.10197.1.104.4': ('sm4-cfb', 'SM4-CFB'),
- '1.2.156.10197.1.104.5': ('sm4-cfb1', 'SM4-CFB1'),
- '1.2.156.10197.1.104.6': ('sm4-cfb8', 'SM4-CFB8'),
- '1.2.156.10197.1.104.7': ('sm4-ctr', 'SM4-CTR'),
- '1.2.156.10197.1.301': ('sm2', 'SM2'),
- '1.2.156.10197.1.401': ('sm3', 'SM3'),
- '1.2.156.10197.1.501': ('SM2-with-SM3', 'SM2-SM3'),
- '1.2.156.10197.1.504': ('sm3WithRSAEncryption', 'RSA-SM3'),
- '1.2.392.200011.61.1.1.1.2': ('camellia-128-cbc', 'CAMELLIA-128-CBC'),
- '1.2.392.200011.61.1.1.1.3': ('camellia-192-cbc', 'CAMELLIA-192-CBC'),
- '1.2.392.200011.61.1.1.1.4': ('camellia-256-cbc', 'CAMELLIA-256-CBC'),
- '1.2.392.200011.61.1.1.3.2': ('id-camellia128-wrap', ),
- '1.2.392.200011.61.1.1.3.3': ('id-camellia192-wrap', ),
- '1.2.392.200011.61.1.1.3.4': ('id-camellia256-wrap', ),
- '1.2.410.200004': ('kisa', 'KISA'),
- '1.2.410.200004.1.3': ('seed-ecb', 'SEED-ECB'),
- '1.2.410.200004.1.4': ('seed-cbc', 'SEED-CBC'),
- '1.2.410.200004.1.5': ('seed-cfb', 'SEED-CFB'),
- '1.2.410.200004.1.6': ('seed-ofb', 'SEED-OFB'),
- '1.2.410.200046.1.1': ('aria', ),
- '1.2.410.200046.1.1.1': ('aria-128-ecb', 'ARIA-128-ECB'),
- '1.2.410.200046.1.1.2': ('aria-128-cbc', 'ARIA-128-CBC'),
- '1.2.410.200046.1.1.3': ('aria-128-cfb', 'ARIA-128-CFB'),
- '1.2.410.200046.1.1.4': ('aria-128-ofb', 'ARIA-128-OFB'),
- '1.2.410.200046.1.1.5': ('aria-128-ctr', 'ARIA-128-CTR'),
- '1.2.410.200046.1.1.6': ('aria-192-ecb', 'ARIA-192-ECB'),
- '1.2.410.200046.1.1.7': ('aria-192-cbc', 'ARIA-192-CBC'),
- '1.2.410.200046.1.1.8': ('aria-192-cfb', 'ARIA-192-CFB'),
- '1.2.410.200046.1.1.9': ('aria-192-ofb', 'ARIA-192-OFB'),
- '1.2.410.200046.1.1.10': ('aria-192-ctr', 'ARIA-192-CTR'),
- '1.2.410.200046.1.1.11': ('aria-256-ecb', 'ARIA-256-ECB'),
- '1.2.410.200046.1.1.12': ('aria-256-cbc', 'ARIA-256-CBC'),
- '1.2.410.200046.1.1.13': ('aria-256-cfb', 'ARIA-256-CFB'),
- '1.2.410.200046.1.1.14': ('aria-256-ofb', 'ARIA-256-OFB'),
- '1.2.410.200046.1.1.15': ('aria-256-ctr', 'ARIA-256-CTR'),
- '1.2.410.200046.1.1.34': ('aria-128-gcm', 'ARIA-128-GCM'),
- '1.2.410.200046.1.1.35': ('aria-192-gcm', 'ARIA-192-GCM'),
- '1.2.410.200046.1.1.36': ('aria-256-gcm', 'ARIA-256-GCM'),
- '1.2.410.200046.1.1.37': ('aria-128-ccm', 'ARIA-128-CCM'),
- '1.2.410.200046.1.1.38': ('aria-192-ccm', 'ARIA-192-CCM'),
- '1.2.410.200046.1.1.39': ('aria-256-ccm', 'ARIA-256-CCM'),
- '1.2.643.2.2': ('cryptopro', ),
- '1.2.643.2.2.3': ('GOST R 34.11-94 with GOST R 34.10-2001', 'id-GostR3411-94-with-GostR3410-2001'),
- '1.2.643.2.2.4': ('GOST R 34.11-94 with GOST R 34.10-94', 'id-GostR3411-94-with-GostR3410-94'),
- '1.2.643.2.2.9': ('GOST R 34.11-94', 'md_gost94'),
- '1.2.643.2.2.10': ('HMAC GOST 34.11-94', 'id-HMACGostR3411-94'),
- '1.2.643.2.2.14.0': ('id-Gost28147-89-None-KeyMeshing', ),
- '1.2.643.2.2.14.1': ('id-Gost28147-89-CryptoPro-KeyMeshing', ),
- '1.2.643.2.2.19': ('GOST R 34.10-2001', 'gost2001'),
- '1.2.643.2.2.20': ('GOST R 34.10-94', 'gost94'),
- '1.2.643.2.2.20.1': ('id-GostR3410-94-a', ),
- '1.2.643.2.2.20.2': ('id-GostR3410-94-aBis', ),
- '1.2.643.2.2.20.3': ('id-GostR3410-94-b', ),
- '1.2.643.2.2.20.4': ('id-GostR3410-94-bBis', ),
- '1.2.643.2.2.21': ('GOST 28147-89', 'gost89'),
- '1.2.643.2.2.22': ('GOST 28147-89 MAC', 'gost-mac'),
- '1.2.643.2.2.23': ('GOST R 34.11-94 PRF', 'prf-gostr3411-94'),
- '1.2.643.2.2.30.0': ('id-GostR3411-94-TestParamSet', ),
- '1.2.643.2.2.30.1': ('id-GostR3411-94-CryptoProParamSet', ),
- '1.2.643.2.2.31.0': ('id-Gost28147-89-TestParamSet', ),
- '1.2.643.2.2.31.1': ('id-Gost28147-89-CryptoPro-A-ParamSet', ),
- '1.2.643.2.2.31.2': ('id-Gost28147-89-CryptoPro-B-ParamSet', ),
- '1.2.643.2.2.31.3': ('id-Gost28147-89-CryptoPro-C-ParamSet', ),
- '1.2.643.2.2.31.4': ('id-Gost28147-89-CryptoPro-D-ParamSet', ),
- '1.2.643.2.2.31.5': ('id-Gost28147-89-CryptoPro-Oscar-1-1-ParamSet', ),
- '1.2.643.2.2.31.6': ('id-Gost28147-89-CryptoPro-Oscar-1-0-ParamSet', ),
- '1.2.643.2.2.31.7': ('id-Gost28147-89-CryptoPro-RIC-1-ParamSet', ),
- '1.2.643.2.2.32.0': ('id-GostR3410-94-TestParamSet', ),
- '1.2.643.2.2.32.2': ('id-GostR3410-94-CryptoPro-A-ParamSet', ),
- '1.2.643.2.2.32.3': ('id-GostR3410-94-CryptoPro-B-ParamSet', ),
- '1.2.643.2.2.32.4': ('id-GostR3410-94-CryptoPro-C-ParamSet', ),
- '1.2.643.2.2.32.5': ('id-GostR3410-94-CryptoPro-D-ParamSet', ),
- '1.2.643.2.2.33.1': ('id-GostR3410-94-CryptoPro-XchA-ParamSet', ),
- '1.2.643.2.2.33.2': ('id-GostR3410-94-CryptoPro-XchB-ParamSet', ),
- '1.2.643.2.2.33.3': ('id-GostR3410-94-CryptoPro-XchC-ParamSet', ),
- '1.2.643.2.2.35.0': ('id-GostR3410-2001-TestParamSet', ),
- '1.2.643.2.2.35.1': ('id-GostR3410-2001-CryptoPro-A-ParamSet', ),
- '1.2.643.2.2.35.2': ('id-GostR3410-2001-CryptoPro-B-ParamSet', ),
- '1.2.643.2.2.35.3': ('id-GostR3410-2001-CryptoPro-C-ParamSet', ),
- '1.2.643.2.2.36.0': ('id-GostR3410-2001-CryptoPro-XchA-ParamSet', ),
- '1.2.643.2.2.36.1': ('id-GostR3410-2001-CryptoPro-XchB-ParamSet', ),
- '1.2.643.2.2.98': ('GOST R 34.10-2001 DH', 'id-GostR3410-2001DH'),
- '1.2.643.2.2.99': ('GOST R 34.10-94 DH', 'id-GostR3410-94DH'),
- '1.2.643.2.9': ('cryptocom', ),
- '1.2.643.2.9.1.3.3': ('GOST R 34.11-94 with GOST R 34.10-94 Cryptocom', 'id-GostR3411-94-with-GostR3410-94-cc'),
- '1.2.643.2.9.1.3.4': ('GOST R 34.11-94 with GOST R 34.10-2001 Cryptocom', 'id-GostR3411-94-with-GostR3410-2001-cc'),
- '1.2.643.2.9.1.5.3': ('GOST 34.10-94 Cryptocom', 'gost94cc'),
- '1.2.643.2.9.1.5.4': ('GOST 34.10-2001 Cryptocom', 'gost2001cc'),
- '1.2.643.2.9.1.6.1': ('GOST 28147-89 Cryptocom ParamSet', 'id-Gost28147-89-cc'),
- '1.2.643.2.9.1.8.1': ('GOST R 3410-2001 Parameter Set Cryptocom', 'id-GostR3410-2001-ParamSet-cc'),
- '1.2.643.3.131.1.1': ('INN', 'INN'),
- '1.2.643.7.1': ('id-tc26', ),
- '1.2.643.7.1.1': ('id-tc26-algorithms', ),
- '1.2.643.7.1.1.1': ('id-tc26-sign', ),
- '1.2.643.7.1.1.1.1': ('GOST R 34.10-2012 with 256 bit modulus', 'gost2012_256'),
- '1.2.643.7.1.1.1.2': ('GOST R 34.10-2012 with 512 bit modulus', 'gost2012_512'),
- '1.2.643.7.1.1.2': ('id-tc26-digest', ),
- '1.2.643.7.1.1.2.2': ('GOST R 34.11-2012 with 256 bit hash', 'md_gost12_256'),
- '1.2.643.7.1.1.2.3': ('GOST R 34.11-2012 with 512 bit hash', 'md_gost12_512'),
- '1.2.643.7.1.1.3': ('id-tc26-signwithdigest', ),
- '1.2.643.7.1.1.3.2': ('GOST R 34.10-2012 with GOST R 34.11-2012 (256 bit)', 'id-tc26-signwithdigest-gost3410-2012-256'),
- '1.2.643.7.1.1.3.3': ('GOST R 34.10-2012 with GOST R 34.11-2012 (512 bit)', 'id-tc26-signwithdigest-gost3410-2012-512'),
- '1.2.643.7.1.1.4': ('id-tc26-mac', ),
- '1.2.643.7.1.1.4.1': ('HMAC GOST 34.11-2012 256 bit', 'id-tc26-hmac-gost-3411-2012-256'),
- '1.2.643.7.1.1.4.2': ('HMAC GOST 34.11-2012 512 bit', 'id-tc26-hmac-gost-3411-2012-512'),
- '1.2.643.7.1.1.5': ('id-tc26-cipher', ),
- '1.2.643.7.1.1.5.1': ('id-tc26-cipher-gostr3412-2015-magma', ),
- '1.2.643.7.1.1.5.1.1': ('id-tc26-cipher-gostr3412-2015-magma-ctracpkm', ),
- '1.2.643.7.1.1.5.1.2': ('id-tc26-cipher-gostr3412-2015-magma-ctracpkm-omac', ),
- '1.2.643.7.1.1.5.2': ('id-tc26-cipher-gostr3412-2015-kuznyechik', ),
- '1.2.643.7.1.1.5.2.1': ('id-tc26-cipher-gostr3412-2015-kuznyechik-ctracpkm', ),
- '1.2.643.7.1.1.5.2.2': ('id-tc26-cipher-gostr3412-2015-kuznyechik-ctracpkm-omac', ),
- '1.2.643.7.1.1.6': ('id-tc26-agreement', ),
- '1.2.643.7.1.1.6.1': ('id-tc26-agreement-gost-3410-2012-256', ),
- '1.2.643.7.1.1.6.2': ('id-tc26-agreement-gost-3410-2012-512', ),
- '1.2.643.7.1.1.7': ('id-tc26-wrap', ),
- '1.2.643.7.1.1.7.1': ('id-tc26-wrap-gostr3412-2015-magma', ),
- '1.2.643.7.1.1.7.1.1': ('id-tc26-wrap-gostr3412-2015-magma-kexp15', 'id-tc26-wrap-gostr3412-2015-kuznyechik-kexp15'),
- '1.2.643.7.1.1.7.2': ('id-tc26-wrap-gostr3412-2015-kuznyechik', ),
- '1.2.643.7.1.2': ('id-tc26-constants', ),
- '1.2.643.7.1.2.1': ('id-tc26-sign-constants', ),
- '1.2.643.7.1.2.1.1': ('id-tc26-gost-3410-2012-256-constants', ),
- '1.2.643.7.1.2.1.1.1': ('GOST R 34.10-2012 (256 bit) ParamSet A', 'id-tc26-gost-3410-2012-256-paramSetA'),
- '1.2.643.7.1.2.1.1.2': ('GOST R 34.10-2012 (256 bit) ParamSet B', 'id-tc26-gost-3410-2012-256-paramSetB'),
- '1.2.643.7.1.2.1.1.3': ('GOST R 34.10-2012 (256 bit) ParamSet C', 'id-tc26-gost-3410-2012-256-paramSetC'),
- '1.2.643.7.1.2.1.1.4': ('GOST R 34.10-2012 (256 bit) ParamSet D', 'id-tc26-gost-3410-2012-256-paramSetD'),
- '1.2.643.7.1.2.1.2': ('id-tc26-gost-3410-2012-512-constants', ),
- '1.2.643.7.1.2.1.2.0': ('GOST R 34.10-2012 (512 bit) testing parameter set', 'id-tc26-gost-3410-2012-512-paramSetTest'),
- '1.2.643.7.1.2.1.2.1': ('GOST R 34.10-2012 (512 bit) ParamSet A', 'id-tc26-gost-3410-2012-512-paramSetA'),
- '1.2.643.7.1.2.1.2.2': ('GOST R 34.10-2012 (512 bit) ParamSet B', 'id-tc26-gost-3410-2012-512-paramSetB'),
- '1.2.643.7.1.2.1.2.3': ('GOST R 34.10-2012 (512 bit) ParamSet C', 'id-tc26-gost-3410-2012-512-paramSetC'),
- '1.2.643.7.1.2.2': ('id-tc26-digest-constants', ),
- '1.2.643.7.1.2.5': ('id-tc26-cipher-constants', ),
- '1.2.643.7.1.2.5.1': ('id-tc26-gost-28147-constants', ),
- '1.2.643.7.1.2.5.1.1': ('GOST 28147-89 TC26 parameter set', 'id-tc26-gost-28147-param-Z'),
- '1.2.643.100.1': ('OGRN', 'OGRN'),
- '1.2.643.100.3': ('SNILS', 'SNILS'),
- '1.2.643.100.111': ('Signing Tool of Subject', 'subjectSignTool'),
- '1.2.643.100.112': ('Signing Tool of Issuer', 'issuerSignTool'),
- '1.2.804': ('ISO-UA', ),
- '1.2.804.2.1.1.1': ('ua-pki', ),
- '1.2.804.2.1.1.1.1.1.1': ('DSTU Gost 28147-2009', 'dstu28147'),
- '1.2.804.2.1.1.1.1.1.1.2': ('DSTU Gost 28147-2009 OFB mode', 'dstu28147-ofb'),
- '1.2.804.2.1.1.1.1.1.1.3': ('DSTU Gost 28147-2009 CFB mode', 'dstu28147-cfb'),
- '1.2.804.2.1.1.1.1.1.1.5': ('DSTU Gost 28147-2009 key wrap', 'dstu28147-wrap'),
- '1.2.804.2.1.1.1.1.1.2': ('HMAC DSTU Gost 34311-95', 'hmacWithDstu34311'),
- '1.2.804.2.1.1.1.1.2.1': ('DSTU Gost 34311-95', 'dstu34311'),
- '1.2.804.2.1.1.1.1.3.1.1': ('DSTU 4145-2002 little endian', 'dstu4145le'),
- '1.2.804.2.1.1.1.1.3.1.1.1.1': ('DSTU 4145-2002 big endian', 'dstu4145be'),
- '1.2.804.2.1.1.1.1.3.1.1.2.0': ('DSTU curve 0', 'uacurve0'),
- '1.2.804.2.1.1.1.1.3.1.1.2.1': ('DSTU curve 1', 'uacurve1'),
- '1.2.804.2.1.1.1.1.3.1.1.2.2': ('DSTU curve 2', 'uacurve2'),
- '1.2.804.2.1.1.1.1.3.1.1.2.3': ('DSTU curve 3', 'uacurve3'),
- '1.2.804.2.1.1.1.1.3.1.1.2.4': ('DSTU curve 4', 'uacurve4'),
- '1.2.804.2.1.1.1.1.3.1.1.2.5': ('DSTU curve 5', 'uacurve5'),
- '1.2.804.2.1.1.1.1.3.1.1.2.6': ('DSTU curve 6', 'uacurve6'),
- '1.2.804.2.1.1.1.1.3.1.1.2.7': ('DSTU curve 7', 'uacurve7'),
- '1.2.804.2.1.1.1.1.3.1.1.2.8': ('DSTU curve 8', 'uacurve8'),
- '1.2.804.2.1.1.1.1.3.1.1.2.9': ('DSTU curve 9', 'uacurve9'),
- '1.2.840': ('ISO US Member Body', 'ISO-US'),
- '1.2.840.10040': ('X9.57', 'X9-57'),
- '1.2.840.10040.2': ('holdInstruction', ),
- '1.2.840.10040.2.1': ('Hold Instruction None', 'holdInstructionNone'),
- '1.2.840.10040.2.2': ('Hold Instruction Call Issuer', 'holdInstructionCallIssuer'),
- '1.2.840.10040.2.3': ('Hold Instruction Reject', 'holdInstructionReject'),
- '1.2.840.10040.4': ('X9.57 CM ?', 'X9cm'),
- '1.2.840.10040.4.1': ('dsaEncryption', 'DSA'),
- '1.2.840.10040.4.3': ('dsaWithSHA1', 'DSA-SHA1'),
- '1.2.840.10045': ('ANSI X9.62', 'ansi-X9-62'),
- '1.2.840.10045.1': ('id-fieldType', ),
- '1.2.840.10045.1.1': ('prime-field', ),
- '1.2.840.10045.1.2': ('characteristic-two-field', ),
- '1.2.840.10045.1.2.3': ('id-characteristic-two-basis', ),
- '1.2.840.10045.1.2.3.1': ('onBasis', ),
- '1.2.840.10045.1.2.3.2': ('tpBasis', ),
- '1.2.840.10045.1.2.3.3': ('ppBasis', ),
- '1.2.840.10045.2': ('id-publicKeyType', ),
- '1.2.840.10045.2.1': ('id-ecPublicKey', ),
- '1.2.840.10045.3': ('ellipticCurve', ),
- '1.2.840.10045.3.0': ('c-TwoCurve', ),
- '1.2.840.10045.3.0.1': ('c2pnb163v1', ),
- '1.2.840.10045.3.0.2': ('c2pnb163v2', ),
- '1.2.840.10045.3.0.3': ('c2pnb163v3', ),
- '1.2.840.10045.3.0.4': ('c2pnb176v1', ),
- '1.2.840.10045.3.0.5': ('c2tnb191v1', ),
- '1.2.840.10045.3.0.6': ('c2tnb191v2', ),
- '1.2.840.10045.3.0.7': ('c2tnb191v3', ),
- '1.2.840.10045.3.0.8': ('c2onb191v4', ),
- '1.2.840.10045.3.0.9': ('c2onb191v5', ),
- '1.2.840.10045.3.0.10': ('c2pnb208w1', ),
- '1.2.840.10045.3.0.11': ('c2tnb239v1', ),
- '1.2.840.10045.3.0.12': ('c2tnb239v2', ),
- '1.2.840.10045.3.0.13': ('c2tnb239v3', ),
- '1.2.840.10045.3.0.14': ('c2onb239v4', ),
- '1.2.840.10045.3.0.15': ('c2onb239v5', ),
- '1.2.840.10045.3.0.16': ('c2pnb272w1', ),
- '1.2.840.10045.3.0.17': ('c2pnb304w1', ),
- '1.2.840.10045.3.0.18': ('c2tnb359v1', ),
- '1.2.840.10045.3.0.19': ('c2pnb368w1', ),
- '1.2.840.10045.3.0.20': ('c2tnb431r1', ),
- '1.2.840.10045.3.1': ('primeCurve', ),
- '1.2.840.10045.3.1.1': ('prime192v1', ),
- '1.2.840.10045.3.1.2': ('prime192v2', ),
- '1.2.840.10045.3.1.3': ('prime192v3', ),
- '1.2.840.10045.3.1.4': ('prime239v1', ),
- '1.2.840.10045.3.1.5': ('prime239v2', ),
- '1.2.840.10045.3.1.6': ('prime239v3', ),
- '1.2.840.10045.3.1.7': ('prime256v1', ),
- '1.2.840.10045.4': ('id-ecSigType', ),
- '1.2.840.10045.4.1': ('ecdsa-with-SHA1', ),
- '1.2.840.10045.4.2': ('ecdsa-with-Recommended', ),
- '1.2.840.10045.4.3': ('ecdsa-with-Specified', ),
- '1.2.840.10045.4.3.1': ('ecdsa-with-SHA224', ),
- '1.2.840.10045.4.3.2': ('ecdsa-with-SHA256', ),
- '1.2.840.10045.4.3.3': ('ecdsa-with-SHA384', ),
- '1.2.840.10045.4.3.4': ('ecdsa-with-SHA512', ),
- '1.2.840.10046.2.1': ('X9.42 DH', 'dhpublicnumber'),
- '1.2.840.113533.7.66.10': ('cast5-cbc', 'CAST5-CBC'),
- '1.2.840.113533.7.66.12': ('pbeWithMD5AndCast5CBC', ),
- '1.2.840.113533.7.66.13': ('password based MAC', 'id-PasswordBasedMAC'),
- '1.2.840.113533.7.66.30': ('Diffie-Hellman based MAC', 'id-DHBasedMac'),
- '1.2.840.113549': ('RSA Data Security, Inc.', 'rsadsi'),
- '1.2.840.113549.1': ('RSA Data Security, Inc. PKCS', 'pkcs'),
- '1.2.840.113549.1.1': ('pkcs1', ),
- '1.2.840.113549.1.1.1': ('rsaEncryption', ),
- '1.2.840.113549.1.1.2': ('md2WithRSAEncryption', 'RSA-MD2'),
- '1.2.840.113549.1.1.3': ('md4WithRSAEncryption', 'RSA-MD4'),
- '1.2.840.113549.1.1.4': ('md5WithRSAEncryption', 'RSA-MD5'),
- '1.2.840.113549.1.1.5': ('sha1WithRSAEncryption', 'RSA-SHA1'),
- '1.2.840.113549.1.1.6': ('rsaOAEPEncryptionSET', ),
- '1.2.840.113549.1.1.7': ('rsaesOaep', 'RSAES-OAEP'),
- '1.2.840.113549.1.1.8': ('mgf1', 'MGF1'),
- '1.2.840.113549.1.1.9': ('pSpecified', 'PSPECIFIED'),
- '1.2.840.113549.1.1.10': ('rsassaPss', 'RSASSA-PSS'),
- '1.2.840.113549.1.1.11': ('sha256WithRSAEncryption', 'RSA-SHA256'),
- '1.2.840.113549.1.1.12': ('sha384WithRSAEncryption', 'RSA-SHA384'),
- '1.2.840.113549.1.1.13': ('sha512WithRSAEncryption', 'RSA-SHA512'),
- '1.2.840.113549.1.1.14': ('sha224WithRSAEncryption', 'RSA-SHA224'),
- '1.2.840.113549.1.1.15': ('sha512-224WithRSAEncryption', 'RSA-SHA512/224'),
- '1.2.840.113549.1.1.16': ('sha512-256WithRSAEncryption', 'RSA-SHA512/256'),
- '1.2.840.113549.1.3': ('pkcs3', ),
- '1.2.840.113549.1.3.1': ('dhKeyAgreement', ),
- '1.2.840.113549.1.5': ('pkcs5', ),
- '1.2.840.113549.1.5.1': ('pbeWithMD2AndDES-CBC', 'PBE-MD2-DES'),
- '1.2.840.113549.1.5.3': ('pbeWithMD5AndDES-CBC', 'PBE-MD5-DES'),
- '1.2.840.113549.1.5.4': ('pbeWithMD2AndRC2-CBC', 'PBE-MD2-RC2-64'),
- '1.2.840.113549.1.5.6': ('pbeWithMD5AndRC2-CBC', 'PBE-MD5-RC2-64'),
- '1.2.840.113549.1.5.10': ('pbeWithSHA1AndDES-CBC', 'PBE-SHA1-DES'),
- '1.2.840.113549.1.5.11': ('pbeWithSHA1AndRC2-CBC', 'PBE-SHA1-RC2-64'),
- '1.2.840.113549.1.5.12': ('PBKDF2', ),
- '1.2.840.113549.1.5.13': ('PBES2', ),
- '1.2.840.113549.1.5.14': ('PBMAC1', ),
- '1.2.840.113549.1.7': ('pkcs7', ),
- '1.2.840.113549.1.7.1': ('pkcs7-data', ),
- '1.2.840.113549.1.7.2': ('pkcs7-signedData', ),
- '1.2.840.113549.1.7.3': ('pkcs7-envelopedData', ),
- '1.2.840.113549.1.7.4': ('pkcs7-signedAndEnvelopedData', ),
- '1.2.840.113549.1.7.5': ('pkcs7-digestData', ),
- '1.2.840.113549.1.7.6': ('pkcs7-encryptedData', ),
- '1.2.840.113549.1.9': ('pkcs9', ),
- '1.2.840.113549.1.9.1': ('emailAddress', ),
- '1.2.840.113549.1.9.2': ('unstructuredName', ),
- '1.2.840.113549.1.9.3': ('contentType', ),
- '1.2.840.113549.1.9.4': ('messageDigest', ),
- '1.2.840.113549.1.9.5': ('signingTime', ),
- '1.2.840.113549.1.9.6': ('countersignature', ),
- '1.2.840.113549.1.9.7': ('challengePassword', ),
- '1.2.840.113549.1.9.8': ('unstructuredAddress', ),
- '1.2.840.113549.1.9.9': ('extendedCertificateAttributes', ),
- '1.2.840.113549.1.9.14': ('Extension Request', 'extReq'),
- '1.2.840.113549.1.9.15': ('S/MIME Capabilities', 'SMIME-CAPS'),
- '1.2.840.113549.1.9.16': ('S/MIME', 'SMIME'),
- '1.2.840.113549.1.9.16.0': ('id-smime-mod', ),
- '1.2.840.113549.1.9.16.0.1': ('id-smime-mod-cms', ),
- '1.2.840.113549.1.9.16.0.2': ('id-smime-mod-ess', ),
- '1.2.840.113549.1.9.16.0.3': ('id-smime-mod-oid', ),
- '1.2.840.113549.1.9.16.0.4': ('id-smime-mod-msg-v3', ),
- '1.2.840.113549.1.9.16.0.5': ('id-smime-mod-ets-eSignature-88', ),
- '1.2.840.113549.1.9.16.0.6': ('id-smime-mod-ets-eSignature-97', ),
- '1.2.840.113549.1.9.16.0.7': ('id-smime-mod-ets-eSigPolicy-88', ),
- '1.2.840.113549.1.9.16.0.8': ('id-smime-mod-ets-eSigPolicy-97', ),
- '1.2.840.113549.1.9.16.1': ('id-smime-ct', ),
- '1.2.840.113549.1.9.16.1.1': ('id-smime-ct-receipt', ),
- '1.2.840.113549.1.9.16.1.2': ('id-smime-ct-authData', ),
- '1.2.840.113549.1.9.16.1.3': ('id-smime-ct-publishCert', ),
- '1.2.840.113549.1.9.16.1.4': ('id-smime-ct-TSTInfo', ),
- '1.2.840.113549.1.9.16.1.5': ('id-smime-ct-TDTInfo', ),
- '1.2.840.113549.1.9.16.1.6': ('id-smime-ct-contentInfo', ),
- '1.2.840.113549.1.9.16.1.7': ('id-smime-ct-DVCSRequestData', ),
- '1.2.840.113549.1.9.16.1.8': ('id-smime-ct-DVCSResponseData', ),
- '1.2.840.113549.1.9.16.1.9': ('id-smime-ct-compressedData', ),
- '1.2.840.113549.1.9.16.1.19': ('id-smime-ct-contentCollection', ),
- '1.2.840.113549.1.9.16.1.23': ('id-smime-ct-authEnvelopedData', ),
- '1.2.840.113549.1.9.16.1.27': ('id-ct-asciiTextWithCRLF', ),
- '1.2.840.113549.1.9.16.1.28': ('id-ct-xml', ),
- '1.2.840.113549.1.9.16.2': ('id-smime-aa', ),
- '1.2.840.113549.1.9.16.2.1': ('id-smime-aa-receiptRequest', ),
- '1.2.840.113549.1.9.16.2.2': ('id-smime-aa-securityLabel', ),
- '1.2.840.113549.1.9.16.2.3': ('id-smime-aa-mlExpandHistory', ),
- '1.2.840.113549.1.9.16.2.4': ('id-smime-aa-contentHint', ),
- '1.2.840.113549.1.9.16.2.5': ('id-smime-aa-msgSigDigest', ),
- '1.2.840.113549.1.9.16.2.6': ('id-smime-aa-encapContentType', ),
- '1.2.840.113549.1.9.16.2.7': ('id-smime-aa-contentIdentifier', ),
- '1.2.840.113549.1.9.16.2.8': ('id-smime-aa-macValue', ),
- '1.2.840.113549.1.9.16.2.9': ('id-smime-aa-equivalentLabels', ),
- '1.2.840.113549.1.9.16.2.10': ('id-smime-aa-contentReference', ),
- '1.2.840.113549.1.9.16.2.11': ('id-smime-aa-encrypKeyPref', ),
- '1.2.840.113549.1.9.16.2.12': ('id-smime-aa-signingCertificate', ),
- '1.2.840.113549.1.9.16.2.13': ('id-smime-aa-smimeEncryptCerts', ),
- '1.2.840.113549.1.9.16.2.14': ('id-smime-aa-timeStampToken', ),
- '1.2.840.113549.1.9.16.2.15': ('id-smime-aa-ets-sigPolicyId', ),
- '1.2.840.113549.1.9.16.2.16': ('id-smime-aa-ets-commitmentType', ),
- '1.2.840.113549.1.9.16.2.17': ('id-smime-aa-ets-signerLocation', ),
- '1.2.840.113549.1.9.16.2.18': ('id-smime-aa-ets-signerAttr', ),
- '1.2.840.113549.1.9.16.2.19': ('id-smime-aa-ets-otherSigCert', ),
- '1.2.840.113549.1.9.16.2.20': ('id-smime-aa-ets-contentTimestamp', ),
- '1.2.840.113549.1.9.16.2.21': ('id-smime-aa-ets-CertificateRefs', ),
- '1.2.840.113549.1.9.16.2.22': ('id-smime-aa-ets-RevocationRefs', ),
- '1.2.840.113549.1.9.16.2.23': ('id-smime-aa-ets-certValues', ),
- '1.2.840.113549.1.9.16.2.24': ('id-smime-aa-ets-revocationValues', ),
- '1.2.840.113549.1.9.16.2.25': ('id-smime-aa-ets-escTimeStamp', ),
- '1.2.840.113549.1.9.16.2.26': ('id-smime-aa-ets-certCRLTimestamp', ),
- '1.2.840.113549.1.9.16.2.27': ('id-smime-aa-ets-archiveTimeStamp', ),
- '1.2.840.113549.1.9.16.2.28': ('id-smime-aa-signatureType', ),
- '1.2.840.113549.1.9.16.2.29': ('id-smime-aa-dvcs-dvc', ),
- '1.2.840.113549.1.9.16.2.47': ('id-smime-aa-signingCertificateV2', ),
- '1.2.840.113549.1.9.16.3': ('id-smime-alg', ),
- '1.2.840.113549.1.9.16.3.1': ('id-smime-alg-ESDHwith3DES', ),
- '1.2.840.113549.1.9.16.3.2': ('id-smime-alg-ESDHwithRC2', ),
- '1.2.840.113549.1.9.16.3.3': ('id-smime-alg-3DESwrap', ),
- '1.2.840.113549.1.9.16.3.4': ('id-smime-alg-RC2wrap', ),
- '1.2.840.113549.1.9.16.3.5': ('id-smime-alg-ESDH', ),
- '1.2.840.113549.1.9.16.3.6': ('id-smime-alg-CMS3DESwrap', ),
- '1.2.840.113549.1.9.16.3.7': ('id-smime-alg-CMSRC2wrap', ),
- '1.2.840.113549.1.9.16.3.8': ('zlib compression', 'ZLIB'),
- '1.2.840.113549.1.9.16.3.9': ('id-alg-PWRI-KEK', ),
- '1.2.840.113549.1.9.16.4': ('id-smime-cd', ),
- '1.2.840.113549.1.9.16.4.1': ('id-smime-cd-ldap', ),
- '1.2.840.113549.1.9.16.5': ('id-smime-spq', ),
- '1.2.840.113549.1.9.16.5.1': ('id-smime-spq-ets-sqt-uri', ),
- '1.2.840.113549.1.9.16.5.2': ('id-smime-spq-ets-sqt-unotice', ),
- '1.2.840.113549.1.9.16.6': ('id-smime-cti', ),
- '1.2.840.113549.1.9.16.6.1': ('id-smime-cti-ets-proofOfOrigin', ),
- '1.2.840.113549.1.9.16.6.2': ('id-smime-cti-ets-proofOfReceipt', ),
- '1.2.840.113549.1.9.16.6.3': ('id-smime-cti-ets-proofOfDelivery', ),
- '1.2.840.113549.1.9.16.6.4': ('id-smime-cti-ets-proofOfSender', ),
- '1.2.840.113549.1.9.16.6.5': ('id-smime-cti-ets-proofOfApproval', ),
- '1.2.840.113549.1.9.16.6.6': ('id-smime-cti-ets-proofOfCreation', ),
- '1.2.840.113549.1.9.20': ('friendlyName', ),
- '1.2.840.113549.1.9.21': ('localKeyID', ),
- '1.2.840.113549.1.9.22': ('certTypes', ),
- '1.2.840.113549.1.9.22.1': ('x509Certificate', ),
- '1.2.840.113549.1.9.22.2': ('sdsiCertificate', ),
- '1.2.840.113549.1.9.23': ('crlTypes', ),
- '1.2.840.113549.1.9.23.1': ('x509Crl', ),
- '1.2.840.113549.1.12': ('pkcs12', ),
- '1.2.840.113549.1.12.1': ('pkcs12-pbeids', ),
- '1.2.840.113549.1.12.1.1': ('pbeWithSHA1And128BitRC4', 'PBE-SHA1-RC4-128'),
- '1.2.840.113549.1.12.1.2': ('pbeWithSHA1And40BitRC4', 'PBE-SHA1-RC4-40'),
- '1.2.840.113549.1.12.1.3': ('pbeWithSHA1And3-KeyTripleDES-CBC', 'PBE-SHA1-3DES'),
- '1.2.840.113549.1.12.1.4': ('pbeWithSHA1And2-KeyTripleDES-CBC', 'PBE-SHA1-2DES'),
- '1.2.840.113549.1.12.1.5': ('pbeWithSHA1And128BitRC2-CBC', 'PBE-SHA1-RC2-128'),
- '1.2.840.113549.1.12.1.6': ('pbeWithSHA1And40BitRC2-CBC', 'PBE-SHA1-RC2-40'),
- '1.2.840.113549.1.12.10': ('pkcs12-Version1', ),
- '1.2.840.113549.1.12.10.1': ('pkcs12-BagIds', ),
- '1.2.840.113549.1.12.10.1.1': ('keyBag', ),
- '1.2.840.113549.1.12.10.1.2': ('pkcs8ShroudedKeyBag', ),
- '1.2.840.113549.1.12.10.1.3': ('certBag', ),
- '1.2.840.113549.1.12.10.1.4': ('crlBag', ),
- '1.2.840.113549.1.12.10.1.5': ('secretBag', ),
- '1.2.840.113549.1.12.10.1.6': ('safeContentsBag', ),
- '1.2.840.113549.2.2': ('md2', 'MD2'),
- '1.2.840.113549.2.4': ('md4', 'MD4'),
- '1.2.840.113549.2.5': ('md5', 'MD5'),
- '1.2.840.113549.2.6': ('hmacWithMD5', ),
- '1.2.840.113549.2.7': ('hmacWithSHA1', ),
- '1.2.840.113549.2.8': ('hmacWithSHA224', ),
- '1.2.840.113549.2.9': ('hmacWithSHA256', ),
- '1.2.840.113549.2.10': ('hmacWithSHA384', ),
- '1.2.840.113549.2.11': ('hmacWithSHA512', ),
- '1.2.840.113549.2.12': ('hmacWithSHA512-224', ),
- '1.2.840.113549.2.13': ('hmacWithSHA512-256', ),
- '1.2.840.113549.3.2': ('rc2-cbc', 'RC2-CBC'),
- '1.2.840.113549.3.4': ('rc4', 'RC4'),
- '1.2.840.113549.3.7': ('des-ede3-cbc', 'DES-EDE3-CBC'),
- '1.2.840.113549.3.8': ('rc5-cbc', 'RC5-CBC'),
- '1.2.840.113549.3.10': ('des-cdmf', 'DES-CDMF'),
- '1.3': ('identified-organization', 'org', 'ORG'),
- '1.3.6': ('dod', 'DOD'),
- '1.3.6.1': ('iana', 'IANA', 'internet'),
- '1.3.6.1.1': ('Directory', 'directory'),
- '1.3.6.1.2': ('Management', 'mgmt'),
- '1.3.6.1.3': ('Experimental', 'experimental'),
- '1.3.6.1.4': ('Private', 'private'),
- '1.3.6.1.4.1': ('Enterprises', 'enterprises'),
- '1.3.6.1.4.1.188.7.1.1.2': ('idea-cbc', 'IDEA-CBC'),
- '1.3.6.1.4.1.311.2.1.14': ('Microsoft Extension Request', 'msExtReq'),
- '1.3.6.1.4.1.311.2.1.21': ('Microsoft Individual Code Signing', 'msCodeInd'),
- '1.3.6.1.4.1.311.2.1.22': ('Microsoft Commercial Code Signing', 'msCodeCom'),
- '1.3.6.1.4.1.311.10.3.1': ('Microsoft Trust List Signing', 'msCTLSign'),
- '1.3.6.1.4.1.311.10.3.3': ('Microsoft Server Gated Crypto', 'msSGC'),
- '1.3.6.1.4.1.311.10.3.4': ('Microsoft Encrypted File System', 'msEFS'),
- '1.3.6.1.4.1.311.17.1': ('Microsoft CSP Name', 'CSPName'),
- '1.3.6.1.4.1.311.17.2': ('Microsoft Local Key set', 'LocalKeySet'),
- '1.3.6.1.4.1.311.20.2.2': ('Microsoft Smartcardlogin', 'msSmartcardLogin'),
- '1.3.6.1.4.1.311.20.2.3': ('Microsoft Universal Principal Name', 'msUPN'),
- '1.3.6.1.4.1.311.60.2.1.1': ('jurisdictionLocalityName', 'jurisdictionL'),
- '1.3.6.1.4.1.311.60.2.1.2': ('jurisdictionStateOrProvinceName', 'jurisdictionST'),
- '1.3.6.1.4.1.311.60.2.1.3': ('jurisdictionCountryName', 'jurisdictionC'),
- '1.3.6.1.4.1.1466.344': ('dcObject', 'dcobject'),
- '1.3.6.1.4.1.1722.12.2.1.16': ('blake2b512', 'BLAKE2b512'),
- '1.3.6.1.4.1.1722.12.2.2.8': ('blake2s256', 'BLAKE2s256'),
- '1.3.6.1.4.1.3029.1.2': ('bf-cbc', 'BF-CBC'),
- '1.3.6.1.4.1.11129.2.4.2': ('CT Precertificate SCTs', 'ct_precert_scts'),
- '1.3.6.1.4.1.11129.2.4.3': ('CT Precertificate Poison', 'ct_precert_poison'),
- '1.3.6.1.4.1.11129.2.4.4': ('CT Precertificate Signer', 'ct_precert_signer'),
- '1.3.6.1.4.1.11129.2.4.5': ('CT Certificate SCTs', 'ct_cert_scts'),
- '1.3.6.1.4.1.11591.4.11': ('scrypt', 'id-scrypt'),
- '1.3.6.1.5': ('Security', 'security'),
- '1.3.6.1.5.2.3': ('id-pkinit', ),
- '1.3.6.1.5.2.3.4': ('PKINIT Client Auth', 'pkInitClientAuth'),
- '1.3.6.1.5.2.3.5': ('Signing KDC Response', 'pkInitKDC'),
- '1.3.6.1.5.5.7': ('PKIX', ),
- '1.3.6.1.5.5.7.0': ('id-pkix-mod', ),
- '1.3.6.1.5.5.7.0.1': ('id-pkix1-explicit-88', ),
- '1.3.6.1.5.5.7.0.2': ('id-pkix1-implicit-88', ),
- '1.3.6.1.5.5.7.0.3': ('id-pkix1-explicit-93', ),
- '1.3.6.1.5.5.7.0.4': ('id-pkix1-implicit-93', ),
- '1.3.6.1.5.5.7.0.5': ('id-mod-crmf', ),
- '1.3.6.1.5.5.7.0.6': ('id-mod-cmc', ),
- '1.3.6.1.5.5.7.0.7': ('id-mod-kea-profile-88', ),
- '1.3.6.1.5.5.7.0.8': ('id-mod-kea-profile-93', ),
- '1.3.6.1.5.5.7.0.9': ('id-mod-cmp', ),
- '1.3.6.1.5.5.7.0.10': ('id-mod-qualified-cert-88', ),
- '1.3.6.1.5.5.7.0.11': ('id-mod-qualified-cert-93', ),
- '1.3.6.1.5.5.7.0.12': ('id-mod-attribute-cert', ),
- '1.3.6.1.5.5.7.0.13': ('id-mod-timestamp-protocol', ),
- '1.3.6.1.5.5.7.0.14': ('id-mod-ocsp', ),
- '1.3.6.1.5.5.7.0.15': ('id-mod-dvcs', ),
- '1.3.6.1.5.5.7.0.16': ('id-mod-cmp2000', ),
- '1.3.6.1.5.5.7.1': ('id-pe', ),
- '1.3.6.1.5.5.7.1.1': ('Authority Information Access', 'authorityInfoAccess'),
- '1.3.6.1.5.5.7.1.2': ('Biometric Info', 'biometricInfo'),
- '1.3.6.1.5.5.7.1.3': ('qcStatements', ),
- '1.3.6.1.5.5.7.1.4': ('ac-auditEntity', ),
- '1.3.6.1.5.5.7.1.5': ('ac-targeting', ),
- '1.3.6.1.5.5.7.1.6': ('aaControls', ),
- '1.3.6.1.5.5.7.1.7': ('sbgp-ipAddrBlock', ),
- '1.3.6.1.5.5.7.1.8': ('sbgp-autonomousSysNum', ),
- '1.3.6.1.5.5.7.1.9': ('sbgp-routerIdentifier', ),
- '1.3.6.1.5.5.7.1.10': ('ac-proxying', ),
- '1.3.6.1.5.5.7.1.11': ('Subject Information Access', 'subjectInfoAccess'),
- '1.3.6.1.5.5.7.1.14': ('Proxy Certificate Information', 'proxyCertInfo'),
- '1.3.6.1.5.5.7.1.24': ('TLS Feature', 'tlsfeature'),
- '1.3.6.1.5.5.7.2': ('id-qt', ),
- '1.3.6.1.5.5.7.2.1': ('Policy Qualifier CPS', 'id-qt-cps'),
- '1.3.6.1.5.5.7.2.2': ('Policy Qualifier User Notice', 'id-qt-unotice'),
- '1.3.6.1.5.5.7.2.3': ('textNotice', ),
- '1.3.6.1.5.5.7.3': ('id-kp', ),
- '1.3.6.1.5.5.7.3.1': ('TLS Web Server Authentication', 'serverAuth'),
- '1.3.6.1.5.5.7.3.2': ('TLS Web Client Authentication', 'clientAuth'),
- '1.3.6.1.5.5.7.3.3': ('Code Signing', 'codeSigning'),
- '1.3.6.1.5.5.7.3.4': ('E-mail Protection', 'emailProtection'),
- '1.3.6.1.5.5.7.3.5': ('IPSec End System', 'ipsecEndSystem'),
- '1.3.6.1.5.5.7.3.6': ('IPSec Tunnel', 'ipsecTunnel'),
- '1.3.6.1.5.5.7.3.7': ('IPSec User', 'ipsecUser'),
- '1.3.6.1.5.5.7.3.8': ('Time Stamping', 'timeStamping'),
- '1.3.6.1.5.5.7.3.9': ('OCSP Signing', 'OCSPSigning'),
- '1.3.6.1.5.5.7.3.10': ('dvcs', 'DVCS'),
- '1.3.6.1.5.5.7.3.17': ('ipsec Internet Key Exchange', 'ipsecIKE'),
- '1.3.6.1.5.5.7.3.18': ('Ctrl/provision WAP Access', 'capwapAC'),
- '1.3.6.1.5.5.7.3.19': ('Ctrl/Provision WAP Termination', 'capwapWTP'),
- '1.3.6.1.5.5.7.3.21': ('SSH Client', 'secureShellClient'),
- '1.3.6.1.5.5.7.3.22': ('SSH Server', 'secureShellServer'),
- '1.3.6.1.5.5.7.3.23': ('Send Router', 'sendRouter'),
- '1.3.6.1.5.5.7.3.24': ('Send Proxied Router', 'sendProxiedRouter'),
- '1.3.6.1.5.5.7.3.25': ('Send Owner', 'sendOwner'),
- '1.3.6.1.5.5.7.3.26': ('Send Proxied Owner', 'sendProxiedOwner'),
- '1.3.6.1.5.5.7.3.27': ('CMC Certificate Authority', 'cmcCA'),
- '1.3.6.1.5.5.7.3.28': ('CMC Registration Authority', 'cmcRA'),
- '1.3.6.1.5.5.7.4': ('id-it', ),
- '1.3.6.1.5.5.7.4.1': ('id-it-caProtEncCert', ),
- '1.3.6.1.5.5.7.4.2': ('id-it-signKeyPairTypes', ),
- '1.3.6.1.5.5.7.4.3': ('id-it-encKeyPairTypes', ),
- '1.3.6.1.5.5.7.4.4': ('id-it-preferredSymmAlg', ),
- '1.3.6.1.5.5.7.4.5': ('id-it-caKeyUpdateInfo', ),
- '1.3.6.1.5.5.7.4.6': ('id-it-currentCRL', ),
- '1.3.6.1.5.5.7.4.7': ('id-it-unsupportedOIDs', ),
- '1.3.6.1.5.5.7.4.8': ('id-it-subscriptionRequest', ),
- '1.3.6.1.5.5.7.4.9': ('id-it-subscriptionResponse', ),
- '1.3.6.1.5.5.7.4.10': ('id-it-keyPairParamReq', ),
- '1.3.6.1.5.5.7.4.11': ('id-it-keyPairParamRep', ),
- '1.3.6.1.5.5.7.4.12': ('id-it-revPassphrase', ),
- '1.3.6.1.5.5.7.4.13': ('id-it-implicitConfirm', ),
- '1.3.6.1.5.5.7.4.14': ('id-it-confirmWaitTime', ),
- '1.3.6.1.5.5.7.4.15': ('id-it-origPKIMessage', ),
- '1.3.6.1.5.5.7.4.16': ('id-it-suppLangTags', ),
- '1.3.6.1.5.5.7.5': ('id-pkip', ),
- '1.3.6.1.5.5.7.5.1': ('id-regCtrl', ),
- '1.3.6.1.5.5.7.5.1.1': ('id-regCtrl-regToken', ),
- '1.3.6.1.5.5.7.5.1.2': ('id-regCtrl-authenticator', ),
- '1.3.6.1.5.5.7.5.1.3': ('id-regCtrl-pkiPublicationInfo', ),
- '1.3.6.1.5.5.7.5.1.4': ('id-regCtrl-pkiArchiveOptions', ),
- '1.3.6.1.5.5.7.5.1.5': ('id-regCtrl-oldCertID', ),
- '1.3.6.1.5.5.7.5.1.6': ('id-regCtrl-protocolEncrKey', ),
- '1.3.6.1.5.5.7.5.2': ('id-regInfo', ),
- '1.3.6.1.5.5.7.5.2.1': ('id-regInfo-utf8Pairs', ),
- '1.3.6.1.5.5.7.5.2.2': ('id-regInfo-certReq', ),
- '1.3.6.1.5.5.7.6': ('id-alg', ),
- '1.3.6.1.5.5.7.6.1': ('id-alg-des40', ),
- '1.3.6.1.5.5.7.6.2': ('id-alg-noSignature', ),
- '1.3.6.1.5.5.7.6.3': ('id-alg-dh-sig-hmac-sha1', ),
- '1.3.6.1.5.5.7.6.4': ('id-alg-dh-pop', ),
- '1.3.6.1.5.5.7.7': ('id-cmc', ),
- '1.3.6.1.5.5.7.7.1': ('id-cmc-statusInfo', ),
- '1.3.6.1.5.5.7.7.2': ('id-cmc-identification', ),
- '1.3.6.1.5.5.7.7.3': ('id-cmc-identityProof', ),
- '1.3.6.1.5.5.7.7.4': ('id-cmc-dataReturn', ),
- '1.3.6.1.5.5.7.7.5': ('id-cmc-transactionId', ),
- '1.3.6.1.5.5.7.7.6': ('id-cmc-senderNonce', ),
- '1.3.6.1.5.5.7.7.7': ('id-cmc-recipientNonce', ),
- '1.3.6.1.5.5.7.7.8': ('id-cmc-addExtensions', ),
- '1.3.6.1.5.5.7.7.9': ('id-cmc-encryptedPOP', ),
- '1.3.6.1.5.5.7.7.10': ('id-cmc-decryptedPOP', ),
- '1.3.6.1.5.5.7.7.11': ('id-cmc-lraPOPWitness', ),
- '1.3.6.1.5.5.7.7.15': ('id-cmc-getCert', ),
- '1.3.6.1.5.5.7.7.16': ('id-cmc-getCRL', ),
- '1.3.6.1.5.5.7.7.17': ('id-cmc-revokeRequest', ),
- '1.3.6.1.5.5.7.7.18': ('id-cmc-regInfo', ),
- '1.3.6.1.5.5.7.7.19': ('id-cmc-responseInfo', ),
- '1.3.6.1.5.5.7.7.21': ('id-cmc-queryPending', ),
- '1.3.6.1.5.5.7.7.22': ('id-cmc-popLinkRandom', ),
- '1.3.6.1.5.5.7.7.23': ('id-cmc-popLinkWitness', ),
- '1.3.6.1.5.5.7.7.24': ('id-cmc-confirmCertAcceptance', ),
- '1.3.6.1.5.5.7.8': ('id-on', ),
- '1.3.6.1.5.5.7.8.1': ('id-on-personalData', ),
- '1.3.6.1.5.5.7.8.3': ('Permanent Identifier', 'id-on-permanentIdentifier'),
- '1.3.6.1.5.5.7.9': ('id-pda', ),
- '1.3.6.1.5.5.7.9.1': ('id-pda-dateOfBirth', ),
- '1.3.6.1.5.5.7.9.2': ('id-pda-placeOfBirth', ),
- '1.3.6.1.5.5.7.9.3': ('id-pda-gender', ),
- '1.3.6.1.5.5.7.9.4': ('id-pda-countryOfCitizenship', ),
- '1.3.6.1.5.5.7.9.5': ('id-pda-countryOfResidence', ),
- '1.3.6.1.5.5.7.10': ('id-aca', ),
- '1.3.6.1.5.5.7.10.1': ('id-aca-authenticationInfo', ),
- '1.3.6.1.5.5.7.10.2': ('id-aca-accessIdentity', ),
- '1.3.6.1.5.5.7.10.3': ('id-aca-chargingIdentity', ),
- '1.3.6.1.5.5.7.10.4': ('id-aca-group', ),
- '1.3.6.1.5.5.7.10.5': ('id-aca-role', ),
- '1.3.6.1.5.5.7.10.6': ('id-aca-encAttrs', ),
- '1.3.6.1.5.5.7.11': ('id-qcs', ),
- '1.3.6.1.5.5.7.11.1': ('id-qcs-pkixQCSyntax-v1', ),
- '1.3.6.1.5.5.7.12': ('id-cct', ),
- '1.3.6.1.5.5.7.12.1': ('id-cct-crs', ),
- '1.3.6.1.5.5.7.12.2': ('id-cct-PKIData', ),
- '1.3.6.1.5.5.7.12.3': ('id-cct-PKIResponse', ),
- '1.3.6.1.5.5.7.21': ('id-ppl', ),
- '1.3.6.1.5.5.7.21.0': ('Any language', 'id-ppl-anyLanguage'),
- '1.3.6.1.5.5.7.21.1': ('Inherit all', 'id-ppl-inheritAll'),
- '1.3.6.1.5.5.7.21.2': ('Independent', 'id-ppl-independent'),
- '1.3.6.1.5.5.7.48': ('id-ad', ),
- '1.3.6.1.5.5.7.48.1': ('OCSP', 'OCSP', 'id-pkix-OCSP'),
- '1.3.6.1.5.5.7.48.1.1': ('Basic OCSP Response', 'basicOCSPResponse'),
- '1.3.6.1.5.5.7.48.1.2': ('OCSP Nonce', 'Nonce'),
- '1.3.6.1.5.5.7.48.1.3': ('OCSP CRL ID', 'CrlID'),
- '1.3.6.1.5.5.7.48.1.4': ('Acceptable OCSP Responses', 'acceptableResponses'),
- '1.3.6.1.5.5.7.48.1.5': ('OCSP No Check', 'noCheck'),
- '1.3.6.1.5.5.7.48.1.6': ('OCSP Archive Cutoff', 'archiveCutoff'),
- '1.3.6.1.5.5.7.48.1.7': ('OCSP Service Locator', 'serviceLocator'),
- '1.3.6.1.5.5.7.48.1.8': ('Extended OCSP Status', 'extendedStatus'),
- '1.3.6.1.5.5.7.48.1.9': ('valid', ),
- '1.3.6.1.5.5.7.48.1.10': ('path', ),
- '1.3.6.1.5.5.7.48.1.11': ('Trust Root', 'trustRoot'),
- '1.3.6.1.5.5.7.48.2': ('CA Issuers', 'caIssuers'),
- '1.3.6.1.5.5.7.48.3': ('AD Time Stamping', 'ad_timestamping'),
- '1.3.6.1.5.5.7.48.4': ('ad dvcs', 'AD_DVCS'),
- '1.3.6.1.5.5.7.48.5': ('CA Repository', 'caRepository'),
- '1.3.6.1.5.5.8.1.1': ('hmac-md5', 'HMAC-MD5'),
- '1.3.6.1.5.5.8.1.2': ('hmac-sha1', 'HMAC-SHA1'),
- '1.3.6.1.6': ('SNMPv2', 'snmpv2'),
- '1.3.6.1.7': ('Mail', ),
- '1.3.6.1.7.1': ('MIME MHS', 'mime-mhs'),
- '1.3.6.1.7.1.1': ('mime-mhs-headings', 'mime-mhs-headings'),
- '1.3.6.1.7.1.1.1': ('id-hex-partial-message', 'id-hex-partial-message'),
- '1.3.6.1.7.1.1.2': ('id-hex-multipart-message', 'id-hex-multipart-message'),
- '1.3.6.1.7.1.2': ('mime-mhs-bodies', 'mime-mhs-bodies'),
- '1.3.14.3.2': ('algorithm', 'algorithm'),
- '1.3.14.3.2.3': ('md5WithRSA', 'RSA-NP-MD5'),
- '1.3.14.3.2.6': ('des-ecb', 'DES-ECB'),
- '1.3.14.3.2.7': ('des-cbc', 'DES-CBC'),
- '1.3.14.3.2.8': ('des-ofb', 'DES-OFB'),
- '1.3.14.3.2.9': ('des-cfb', 'DES-CFB'),
- '1.3.14.3.2.11': ('rsaSignature', ),
- '1.3.14.3.2.12': ('dsaEncryption-old', 'DSA-old'),
- '1.3.14.3.2.13': ('dsaWithSHA', 'DSA-SHA'),
- '1.3.14.3.2.15': ('shaWithRSAEncryption', 'RSA-SHA'),
- '1.3.14.3.2.17': ('des-ede', 'DES-EDE'),
- '1.3.14.3.2.18': ('sha', 'SHA'),
- '1.3.14.3.2.26': ('sha1', 'SHA1'),
- '1.3.14.3.2.27': ('dsaWithSHA1-old', 'DSA-SHA1-old'),
- '1.3.14.3.2.29': ('sha1WithRSA', 'RSA-SHA1-2'),
- '1.3.36.3.2.1': ('ripemd160', 'RIPEMD160'),
- '1.3.36.3.3.1.2': ('ripemd160WithRSA', 'RSA-RIPEMD160'),
- '1.3.36.3.3.2.8.1.1.1': ('brainpoolP160r1', ),
- '1.3.36.3.3.2.8.1.1.2': ('brainpoolP160t1', ),
- '1.3.36.3.3.2.8.1.1.3': ('brainpoolP192r1', ),
- '1.3.36.3.3.2.8.1.1.4': ('brainpoolP192t1', ),
- '1.3.36.3.3.2.8.1.1.5': ('brainpoolP224r1', ),
- '1.3.36.3.3.2.8.1.1.6': ('brainpoolP224t1', ),
- '1.3.36.3.3.2.8.1.1.7': ('brainpoolP256r1', ),
- '1.3.36.3.3.2.8.1.1.8': ('brainpoolP256t1', ),
- '1.3.36.3.3.2.8.1.1.9': ('brainpoolP320r1', ),
- '1.3.36.3.3.2.8.1.1.10': ('brainpoolP320t1', ),
- '1.3.36.3.3.2.8.1.1.11': ('brainpoolP384r1', ),
- '1.3.36.3.3.2.8.1.1.12': ('brainpoolP384t1', ),
- '1.3.36.3.3.2.8.1.1.13': ('brainpoolP512r1', ),
- '1.3.36.3.3.2.8.1.1.14': ('brainpoolP512t1', ),
- '1.3.36.8.3.3': ('Professional Information or basis for Admission', 'x509ExtAdmission'),
- '1.3.101.1.4.1': ('Strong Extranet ID', 'SXNetID'),
- '1.3.101.110': ('X25519', ),
- '1.3.101.111': ('X448', ),
- '1.3.101.112': ('ED25519', ),
- '1.3.101.113': ('ED448', ),
- '1.3.111': ('ieee', ),
- '1.3.111.2.1619': ('IEEE Security in Storage Working Group', 'ieee-siswg'),
- '1.3.111.2.1619.0.1.1': ('aes-128-xts', 'AES-128-XTS'),
- '1.3.111.2.1619.0.1.2': ('aes-256-xts', 'AES-256-XTS'),
- '1.3.132': ('certicom-arc', ),
- '1.3.132.0': ('secg_ellipticCurve', ),
- '1.3.132.0.1': ('sect163k1', ),
- '1.3.132.0.2': ('sect163r1', ),
- '1.3.132.0.3': ('sect239k1', ),
- '1.3.132.0.4': ('sect113r1', ),
- '1.3.132.0.5': ('sect113r2', ),
- '1.3.132.0.6': ('secp112r1', ),
- '1.3.132.0.7': ('secp112r2', ),
- '1.3.132.0.8': ('secp160r1', ),
- '1.3.132.0.9': ('secp160k1', ),
- '1.3.132.0.10': ('secp256k1', ),
- '1.3.132.0.15': ('sect163r2', ),
- '1.3.132.0.16': ('sect283k1', ),
- '1.3.132.0.17': ('sect283r1', ),
- '1.3.132.0.22': ('sect131r1', ),
- '1.3.132.0.23': ('sect131r2', ),
- '1.3.132.0.24': ('sect193r1', ),
- '1.3.132.0.25': ('sect193r2', ),
- '1.3.132.0.26': ('sect233k1', ),
- '1.3.132.0.27': ('sect233r1', ),
- '1.3.132.0.28': ('secp128r1', ),
- '1.3.132.0.29': ('secp128r2', ),
- '1.3.132.0.30': ('secp160r2', ),
- '1.3.132.0.31': ('secp192k1', ),
- '1.3.132.0.32': ('secp224k1', ),
- '1.3.132.0.33': ('secp224r1', ),
- '1.3.132.0.34': ('secp384r1', ),
- '1.3.132.0.35': ('secp521r1', ),
- '1.3.132.0.36': ('sect409k1', ),
- '1.3.132.0.37': ('sect409r1', ),
- '1.3.132.0.38': ('sect571k1', ),
- '1.3.132.0.39': ('sect571r1', ),
- '1.3.132.1': ('secg-scheme', ),
- '1.3.132.1.11.0': ('dhSinglePass-stdDH-sha224kdf-scheme', ),
- '1.3.132.1.11.1': ('dhSinglePass-stdDH-sha256kdf-scheme', ),
- '1.3.132.1.11.2': ('dhSinglePass-stdDH-sha384kdf-scheme', ),
- '1.3.132.1.11.3': ('dhSinglePass-stdDH-sha512kdf-scheme', ),
- '1.3.132.1.14.0': ('dhSinglePass-cofactorDH-sha224kdf-scheme', ),
- '1.3.132.1.14.1': ('dhSinglePass-cofactorDH-sha256kdf-scheme', ),
- '1.3.132.1.14.2': ('dhSinglePass-cofactorDH-sha384kdf-scheme', ),
- '1.3.132.1.14.3': ('dhSinglePass-cofactorDH-sha512kdf-scheme', ),
- '1.3.133.16.840.63.0': ('x9-63-scheme', ),
- '1.3.133.16.840.63.0.2': ('dhSinglePass-stdDH-sha1kdf-scheme', ),
- '1.3.133.16.840.63.0.3': ('dhSinglePass-cofactorDH-sha1kdf-scheme', ),
- '2': ('joint-iso-itu-t', 'JOINT-ISO-ITU-T', 'joint-iso-ccitt'),
- '2.5': ('directory services (X.500)', 'X500'),
- '2.5.1.5': ('Selected Attribute Types', 'selected-attribute-types'),
- '2.5.1.5.55': ('clearance', ),
- '2.5.4': ('X509', ),
- '2.5.4.3': ('commonName', 'CN'),
- '2.5.4.4': ('surname', 'SN'),
- '2.5.4.5': ('serialNumber', ),
- '2.5.4.6': ('countryName', 'C'),
- '2.5.4.7': ('localityName', 'L'),
- '2.5.4.8': ('stateOrProvinceName', 'ST'),
- '2.5.4.9': ('streetAddress', 'street'),
- '2.5.4.10': ('organizationName', 'O'),
- '2.5.4.11': ('organizationalUnitName', 'OU'),
- '2.5.4.12': ('title', 'title'),
- '2.5.4.13': ('description', ),
- '2.5.4.14': ('searchGuide', ),
- '2.5.4.15': ('businessCategory', ),
- '2.5.4.16': ('postalAddress', ),
- '2.5.4.17': ('postalCode', ),
- '2.5.4.18': ('postOfficeBox', ),
- '2.5.4.19': ('physicalDeliveryOfficeName', ),
- '2.5.4.20': ('telephoneNumber', ),
- '2.5.4.21': ('telexNumber', ),
- '2.5.4.22': ('teletexTerminalIdentifier', ),
- '2.5.4.23': ('facsimileTelephoneNumber', ),
- '2.5.4.24': ('x121Address', ),
- '2.5.4.25': ('internationaliSDNNumber', ),
- '2.5.4.26': ('registeredAddress', ),
- '2.5.4.27': ('destinationIndicator', ),
- '2.5.4.28': ('preferredDeliveryMethod', ),
- '2.5.4.29': ('presentationAddress', ),
- '2.5.4.30': ('supportedApplicationContext', ),
- '2.5.4.31': ('member', ),
- '2.5.4.32': ('owner', ),
- '2.5.4.33': ('roleOccupant', ),
- '2.5.4.34': ('seeAlso', ),
- '2.5.4.35': ('userPassword', ),
- '2.5.4.36': ('userCertificate', ),
- '2.5.4.37': ('cACertificate', ),
- '2.5.4.38': ('authorityRevocationList', ),
- '2.5.4.39': ('certificateRevocationList', ),
- '2.5.4.40': ('crossCertificatePair', ),
- '2.5.4.41': ('name', 'name'),
- '2.5.4.42': ('givenName', 'GN'),
- '2.5.4.43': ('initials', 'initials'),
- '2.5.4.44': ('generationQualifier', ),
- '2.5.4.45': ('x500UniqueIdentifier', ),
- '2.5.4.46': ('dnQualifier', 'dnQualifier'),
- '2.5.4.47': ('enhancedSearchGuide', ),
- '2.5.4.48': ('protocolInformation', ),
- '2.5.4.49': ('distinguishedName', ),
- '2.5.4.50': ('uniqueMember', ),
- '2.5.4.51': ('houseIdentifier', ),
- '2.5.4.52': ('supportedAlgorithms', ),
- '2.5.4.53': ('deltaRevocationList', ),
- '2.5.4.54': ('dmdName', ),
- '2.5.4.65': ('pseudonym', ),
- '2.5.4.72': ('role', 'role'),
- '2.5.4.97': ('organizationIdentifier', ),
- '2.5.4.98': ('countryCode3c', 'c3'),
- '2.5.4.99': ('countryCode3n', 'n3'),
- '2.5.4.100': ('dnsName', ),
- '2.5.8': ('directory services - algorithms', 'X500algorithms'),
- '2.5.8.1.1': ('rsa', 'RSA'),
- '2.5.8.3.100': ('mdc2WithRSA', 'RSA-MDC2'),
- '2.5.8.3.101': ('mdc2', 'MDC2'),
- '2.5.29': ('id-ce', ),
- '2.5.29.9': ('X509v3 Subject Directory Attributes', 'subjectDirectoryAttributes'),
- '2.5.29.14': ('X509v3 Subject Key Identifier', 'subjectKeyIdentifier'),
- '2.5.29.15': ('X509v3 Key Usage', 'keyUsage'),
- '2.5.29.16': ('X509v3 Private Key Usage Period', 'privateKeyUsagePeriod'),
- '2.5.29.17': ('X509v3 Subject Alternative Name', 'subjectAltName'),
- '2.5.29.18': ('X509v3 Issuer Alternative Name', 'issuerAltName'),
- '2.5.29.19': ('X509v3 Basic Constraints', 'basicConstraints'),
- '2.5.29.20': ('X509v3 CRL Number', 'crlNumber'),
- '2.5.29.21': ('X509v3 CRL Reason Code', 'CRLReason'),
- '2.5.29.23': ('Hold Instruction Code', 'holdInstructionCode'),
- '2.5.29.24': ('Invalidity Date', 'invalidityDate'),
- '2.5.29.27': ('X509v3 Delta CRL Indicator', 'deltaCRL'),
- '2.5.29.28': ('X509v3 Issuing Distribution Point', 'issuingDistributionPoint'),
- '2.5.29.29': ('X509v3 Certificate Issuer', 'certificateIssuer'),
- '2.5.29.30': ('X509v3 Name Constraints', 'nameConstraints'),
- '2.5.29.31': ('X509v3 CRL Distribution Points', 'crlDistributionPoints'),
- '2.5.29.32': ('X509v3 Certificate Policies', 'certificatePolicies'),
- '2.5.29.32.0': ('X509v3 Any Policy', 'anyPolicy'),
- '2.5.29.33': ('X509v3 Policy Mappings', 'policyMappings'),
- '2.5.29.35': ('X509v3 Authority Key Identifier', 'authorityKeyIdentifier'),
- '2.5.29.36': ('X509v3 Policy Constraints', 'policyConstraints'),
- '2.5.29.37': ('X509v3 Extended Key Usage', 'extendedKeyUsage'),
- '2.5.29.37.0': ('Any Extended Key Usage', 'anyExtendedKeyUsage'),
- '2.5.29.46': ('X509v3 Freshest CRL', 'freshestCRL'),
- '2.5.29.54': ('X509v3 Inhibit Any Policy', 'inhibitAnyPolicy'),
- '2.5.29.55': ('X509v3 AC Targeting', 'targetInformation'),
- '2.5.29.56': ('X509v3 No Revocation Available', 'noRevAvail'),
- '2.16.840.1.101.3': ('csor', ),
- '2.16.840.1.101.3.4': ('nistAlgorithms', ),
- '2.16.840.1.101.3.4.1': ('aes', ),
- '2.16.840.1.101.3.4.1.1': ('aes-128-ecb', 'AES-128-ECB'),
- '2.16.840.1.101.3.4.1.2': ('aes-128-cbc', 'AES-128-CBC'),
- '2.16.840.1.101.3.4.1.3': ('aes-128-ofb', 'AES-128-OFB'),
- '2.16.840.1.101.3.4.1.4': ('aes-128-cfb', 'AES-128-CFB'),
- '2.16.840.1.101.3.4.1.5': ('id-aes128-wrap', ),
- '2.16.840.1.101.3.4.1.6': ('aes-128-gcm', 'id-aes128-GCM'),
- '2.16.840.1.101.3.4.1.7': ('aes-128-ccm', 'id-aes128-CCM'),
- '2.16.840.1.101.3.4.1.8': ('id-aes128-wrap-pad', ),
- '2.16.840.1.101.3.4.1.21': ('aes-192-ecb', 'AES-192-ECB'),
- '2.16.840.1.101.3.4.1.22': ('aes-192-cbc', 'AES-192-CBC'),
- '2.16.840.1.101.3.4.1.23': ('aes-192-ofb', 'AES-192-OFB'),
- '2.16.840.1.101.3.4.1.24': ('aes-192-cfb', 'AES-192-CFB'),
- '2.16.840.1.101.3.4.1.25': ('id-aes192-wrap', ),
- '2.16.840.1.101.3.4.1.26': ('aes-192-gcm', 'id-aes192-GCM'),
- '2.16.840.1.101.3.4.1.27': ('aes-192-ccm', 'id-aes192-CCM'),
- '2.16.840.1.101.3.4.1.28': ('id-aes192-wrap-pad', ),
- '2.16.840.1.101.3.4.1.41': ('aes-256-ecb', 'AES-256-ECB'),
- '2.16.840.1.101.3.4.1.42': ('aes-256-cbc', 'AES-256-CBC'),
- '2.16.840.1.101.3.4.1.43': ('aes-256-ofb', 'AES-256-OFB'),
- '2.16.840.1.101.3.4.1.44': ('aes-256-cfb', 'AES-256-CFB'),
- '2.16.840.1.101.3.4.1.45': ('id-aes256-wrap', ),
- '2.16.840.1.101.3.4.1.46': ('aes-256-gcm', 'id-aes256-GCM'),
- '2.16.840.1.101.3.4.1.47': ('aes-256-ccm', 'id-aes256-CCM'),
- '2.16.840.1.101.3.4.1.48': ('id-aes256-wrap-pad', ),
- '2.16.840.1.101.3.4.2': ('nist_hashalgs', ),
- '2.16.840.1.101.3.4.2.1': ('sha256', 'SHA256'),
- '2.16.840.1.101.3.4.2.2': ('sha384', 'SHA384'),
- '2.16.840.1.101.3.4.2.3': ('sha512', 'SHA512'),
- '2.16.840.1.101.3.4.2.4': ('sha224', 'SHA224'),
- '2.16.840.1.101.3.4.2.5': ('sha512-224', 'SHA512-224'),
- '2.16.840.1.101.3.4.2.6': ('sha512-256', 'SHA512-256'),
- '2.16.840.1.101.3.4.2.7': ('sha3-224', 'SHA3-224'),
- '2.16.840.1.101.3.4.2.8': ('sha3-256', 'SHA3-256'),
- '2.16.840.1.101.3.4.2.9': ('sha3-384', 'SHA3-384'),
- '2.16.840.1.101.3.4.2.10': ('sha3-512', 'SHA3-512'),
- '2.16.840.1.101.3.4.2.11': ('shake128', 'SHAKE128'),
- '2.16.840.1.101.3.4.2.12': ('shake256', 'SHAKE256'),
- '2.16.840.1.101.3.4.2.13': ('hmac-sha3-224', 'id-hmacWithSHA3-224'),
- '2.16.840.1.101.3.4.2.14': ('hmac-sha3-256', 'id-hmacWithSHA3-256'),
- '2.16.840.1.101.3.4.2.15': ('hmac-sha3-384', 'id-hmacWithSHA3-384'),
- '2.16.840.1.101.3.4.2.16': ('hmac-sha3-512', 'id-hmacWithSHA3-512'),
- '2.16.840.1.101.3.4.3': ('dsa_with_sha2', 'sigAlgs'),
- '2.16.840.1.101.3.4.3.1': ('dsa_with_SHA224', ),
- '2.16.840.1.101.3.4.3.2': ('dsa_with_SHA256', ),
- '2.16.840.1.101.3.4.3.3': ('dsa_with_SHA384', 'id-dsa-with-sha384'),
- '2.16.840.1.101.3.4.3.4': ('dsa_with_SHA512', 'id-dsa-with-sha512'),
- '2.16.840.1.101.3.4.3.5': ('dsa_with_SHA3-224', 'id-dsa-with-sha3-224'),
- '2.16.840.1.101.3.4.3.6': ('dsa_with_SHA3-256', 'id-dsa-with-sha3-256'),
- '2.16.840.1.101.3.4.3.7': ('dsa_with_SHA3-384', 'id-dsa-with-sha3-384'),
- '2.16.840.1.101.3.4.3.8': ('dsa_with_SHA3-512', 'id-dsa-with-sha3-512'),
- '2.16.840.1.101.3.4.3.9': ('ecdsa_with_SHA3-224', 'id-ecdsa-with-sha3-224'),
- '2.16.840.1.101.3.4.3.10': ('ecdsa_with_SHA3-256', 'id-ecdsa-with-sha3-256'),
- '2.16.840.1.101.3.4.3.11': ('ecdsa_with_SHA3-384', 'id-ecdsa-with-sha3-384'),
- '2.16.840.1.101.3.4.3.12': ('ecdsa_with_SHA3-512', 'id-ecdsa-with-sha3-512'),
- '2.16.840.1.101.3.4.3.13': ('RSA-SHA3-224', 'id-rsassa-pkcs1-v1_5-with-sha3-224'),
- '2.16.840.1.101.3.4.3.14': ('RSA-SHA3-256', 'id-rsassa-pkcs1-v1_5-with-sha3-256'),
- '2.16.840.1.101.3.4.3.15': ('RSA-SHA3-384', 'id-rsassa-pkcs1-v1_5-with-sha3-384'),
- '2.16.840.1.101.3.4.3.16': ('RSA-SHA3-512', 'id-rsassa-pkcs1-v1_5-with-sha3-512'),
- '2.16.840.1.113730': ('Netscape Communications Corp.', 'Netscape'),
- '2.16.840.1.113730.1': ('Netscape Certificate Extension', 'nsCertExt'),
- '2.16.840.1.113730.1.1': ('Netscape Cert Type', 'nsCertType'),
- '2.16.840.1.113730.1.2': ('Netscape Base Url', 'nsBaseUrl'),
- '2.16.840.1.113730.1.3': ('Netscape Revocation Url', 'nsRevocationUrl'),
- '2.16.840.1.113730.1.4': ('Netscape CA Revocation Url', 'nsCaRevocationUrl'),
- '2.16.840.1.113730.1.7': ('Netscape Renewal Url', 'nsRenewalUrl'),
- '2.16.840.1.113730.1.8': ('Netscape CA Policy Url', 'nsCaPolicyUrl'),
- '2.16.840.1.113730.1.12': ('Netscape SSL Server Name', 'nsSslServerName'),
- '2.16.840.1.113730.1.13': ('Netscape Comment', 'nsComment'),
- '2.16.840.1.113730.2': ('Netscape Data Type', 'nsDataType'),
- '2.16.840.1.113730.2.5': ('Netscape Certificate Sequence', 'nsCertSequence'),
- '2.16.840.1.113730.4.1': ('Netscape Server Gated Crypto', 'nsSGC'),
- '2.23': ('International Organizations', 'international-organizations'),
- '2.23.42': ('Secure Electronic Transactions', 'id-set'),
- '2.23.42.0': ('content types', 'set-ctype'),
- '2.23.42.0.0': ('setct-PANData', ),
- '2.23.42.0.1': ('setct-PANToken', ),
- '2.23.42.0.2': ('setct-PANOnly', ),
- '2.23.42.0.3': ('setct-OIData', ),
- '2.23.42.0.4': ('setct-PI', ),
- '2.23.42.0.5': ('setct-PIData', ),
- '2.23.42.0.6': ('setct-PIDataUnsigned', ),
- '2.23.42.0.7': ('setct-HODInput', ),
- '2.23.42.0.8': ('setct-AuthResBaggage', ),
- '2.23.42.0.9': ('setct-AuthRevReqBaggage', ),
- '2.23.42.0.10': ('setct-AuthRevResBaggage', ),
- '2.23.42.0.11': ('setct-CapTokenSeq', ),
- '2.23.42.0.12': ('setct-PInitResData', ),
- '2.23.42.0.13': ('setct-PI-TBS', ),
- '2.23.42.0.14': ('setct-PResData', ),
- '2.23.42.0.16': ('setct-AuthReqTBS', ),
- '2.23.42.0.17': ('setct-AuthResTBS', ),
- '2.23.42.0.18': ('setct-AuthResTBSX', ),
- '2.23.42.0.19': ('setct-AuthTokenTBS', ),
- '2.23.42.0.20': ('setct-CapTokenData', ),
- '2.23.42.0.21': ('setct-CapTokenTBS', ),
- '2.23.42.0.22': ('setct-AcqCardCodeMsg', ),
- '2.23.42.0.23': ('setct-AuthRevReqTBS', ),
- '2.23.42.0.24': ('setct-AuthRevResData', ),
- '2.23.42.0.25': ('setct-AuthRevResTBS', ),
- '2.23.42.0.26': ('setct-CapReqTBS', ),
- '2.23.42.0.27': ('setct-CapReqTBSX', ),
- '2.23.42.0.28': ('setct-CapResData', ),
- '2.23.42.0.29': ('setct-CapRevReqTBS', ),
- '2.23.42.0.30': ('setct-CapRevReqTBSX', ),
- '2.23.42.0.31': ('setct-CapRevResData', ),
- '2.23.42.0.32': ('setct-CredReqTBS', ),
- '2.23.42.0.33': ('setct-CredReqTBSX', ),
- '2.23.42.0.34': ('setct-CredResData', ),
- '2.23.42.0.35': ('setct-CredRevReqTBS', ),
- '2.23.42.0.36': ('setct-CredRevReqTBSX', ),
- '2.23.42.0.37': ('setct-CredRevResData', ),
- '2.23.42.0.38': ('setct-PCertReqData', ),
- '2.23.42.0.39': ('setct-PCertResTBS', ),
- '2.23.42.0.40': ('setct-BatchAdminReqData', ),
- '2.23.42.0.41': ('setct-BatchAdminResData', ),
- '2.23.42.0.42': ('setct-CardCInitResTBS', ),
- '2.23.42.0.43': ('setct-MeAqCInitResTBS', ),
- '2.23.42.0.44': ('setct-RegFormResTBS', ),
- '2.23.42.0.45': ('setct-CertReqData', ),
- '2.23.42.0.46': ('setct-CertReqTBS', ),
- '2.23.42.0.47': ('setct-CertResData', ),
- '2.23.42.0.48': ('setct-CertInqReqTBS', ),
- '2.23.42.0.49': ('setct-ErrorTBS', ),
- '2.23.42.0.50': ('setct-PIDualSignedTBE', ),
- '2.23.42.0.51': ('setct-PIUnsignedTBE', ),
- '2.23.42.0.52': ('setct-AuthReqTBE', ),
- '2.23.42.0.53': ('setct-AuthResTBE', ),
- '2.23.42.0.54': ('setct-AuthResTBEX', ),
- '2.23.42.0.55': ('setct-AuthTokenTBE', ),
- '2.23.42.0.56': ('setct-CapTokenTBE', ),
- '2.23.42.0.57': ('setct-CapTokenTBEX', ),
- '2.23.42.0.58': ('setct-AcqCardCodeMsgTBE', ),
- '2.23.42.0.59': ('setct-AuthRevReqTBE', ),
- '2.23.42.0.60': ('setct-AuthRevResTBE', ),
- '2.23.42.0.61': ('setct-AuthRevResTBEB', ),
- '2.23.42.0.62': ('setct-CapReqTBE', ),
- '2.23.42.0.63': ('setct-CapReqTBEX', ),
- '2.23.42.0.64': ('setct-CapResTBE', ),
- '2.23.42.0.65': ('setct-CapRevReqTBE', ),
- '2.23.42.0.66': ('setct-CapRevReqTBEX', ),
- '2.23.42.0.67': ('setct-CapRevResTBE', ),
- '2.23.42.0.68': ('setct-CredReqTBE', ),
- '2.23.42.0.69': ('setct-CredReqTBEX', ),
- '2.23.42.0.70': ('setct-CredResTBE', ),
- '2.23.42.0.71': ('setct-CredRevReqTBE', ),
- '2.23.42.0.72': ('setct-CredRevReqTBEX', ),
- '2.23.42.0.73': ('setct-CredRevResTBE', ),
- '2.23.42.0.74': ('setct-BatchAdminReqTBE', ),
- '2.23.42.0.75': ('setct-BatchAdminResTBE', ),
- '2.23.42.0.76': ('setct-RegFormReqTBE', ),
- '2.23.42.0.77': ('setct-CertReqTBE', ),
- '2.23.42.0.78': ('setct-CertReqTBEX', ),
- '2.23.42.0.79': ('setct-CertResTBE', ),
- '2.23.42.0.80': ('setct-CRLNotificationTBS', ),
- '2.23.42.0.81': ('setct-CRLNotificationResTBS', ),
- '2.23.42.0.82': ('setct-BCIDistributionTBS', ),
- '2.23.42.1': ('message extensions', 'set-msgExt'),
- '2.23.42.1.1': ('generic cryptogram', 'setext-genCrypt'),
- '2.23.42.1.3': ('merchant initiated auth', 'setext-miAuth'),
- '2.23.42.1.4': ('setext-pinSecure', ),
- '2.23.42.1.5': ('setext-pinAny', ),
- '2.23.42.1.7': ('setext-track2', ),
- '2.23.42.1.8': ('additional verification', 'setext-cv'),
- '2.23.42.3': ('set-attr', ),
- '2.23.42.3.0': ('setAttr-Cert', ),
- '2.23.42.3.0.0': ('set-rootKeyThumb', ),
- '2.23.42.3.0.1': ('set-addPolicy', ),
- '2.23.42.3.1': ('payment gateway capabilities', 'setAttr-PGWYcap'),
- '2.23.42.3.2': ('setAttr-TokenType', ),
- '2.23.42.3.2.1': ('setAttr-Token-EMV', ),
- '2.23.42.3.2.2': ('setAttr-Token-B0Prime', ),
- '2.23.42.3.3': ('issuer capabilities', 'setAttr-IssCap'),
- '2.23.42.3.3.3': ('setAttr-IssCap-CVM', ),
- '2.23.42.3.3.3.1': ('generate cryptogram', 'setAttr-GenCryptgrm'),
- '2.23.42.3.3.4': ('setAttr-IssCap-T2', ),
- '2.23.42.3.3.4.1': ('encrypted track 2', 'setAttr-T2Enc'),
- '2.23.42.3.3.4.2': ('cleartext track 2', 'setAttr-T2cleartxt'),
- '2.23.42.3.3.5': ('setAttr-IssCap-Sig', ),
- '2.23.42.3.3.5.1': ('ICC or token signature', 'setAttr-TokICCsig'),
- '2.23.42.3.3.5.2': ('secure device signature', 'setAttr-SecDevSig'),
- '2.23.42.5': ('set-policy', ),
- '2.23.42.5.0': ('set-policy-root', ),
- '2.23.42.7': ('certificate extensions', 'set-certExt'),
- '2.23.42.7.0': ('setCext-hashedRoot', ),
- '2.23.42.7.1': ('setCext-certType', ),
- '2.23.42.7.2': ('setCext-merchData', ),
- '2.23.42.7.3': ('setCext-cCertRequired', ),
- '2.23.42.7.4': ('setCext-tunneling', ),
- '2.23.42.7.5': ('setCext-setExt', ),
- '2.23.42.7.6': ('setCext-setQualf', ),
- '2.23.42.7.7': ('setCext-PGWYcapabilities', ),
- '2.23.42.7.8': ('setCext-TokenIdentifier', ),
- '2.23.42.7.9': ('setCext-Track2Data', ),
- '2.23.42.7.10': ('setCext-TokenType', ),
- '2.23.42.7.11': ('setCext-IssuerCapabilities', ),
- '2.23.42.8': ('set-brand', ),
- '2.23.42.8.1': ('set-brand-IATA-ATA', ),
- '2.23.42.8.4': ('set-brand-Visa', ),
- '2.23.42.8.5': ('set-brand-MasterCard', ),
- '2.23.42.8.30': ('set-brand-Diners', ),
- '2.23.42.8.34': ('set-brand-AmericanExpress', ),
- '2.23.42.8.35': ('set-brand-JCB', ),
- '2.23.42.8.6011': ('set-brand-Novus', ),
- '2.23.43': ('wap', ),
- '2.23.43.1': ('wap-wsg', ),
- '2.23.43.1.4': ('wap-wsg-idm-ecid', ),
- '2.23.43.1.4.1': ('wap-wsg-idm-ecid-wtls1', ),
- '2.23.43.1.4.3': ('wap-wsg-idm-ecid-wtls3', ),
- '2.23.43.1.4.4': ('wap-wsg-idm-ecid-wtls4', ),
- '2.23.43.1.4.5': ('wap-wsg-idm-ecid-wtls5', ),
- '2.23.43.1.4.6': ('wap-wsg-idm-ecid-wtls6', ),
- '2.23.43.1.4.7': ('wap-wsg-idm-ecid-wtls7', ),
- '2.23.43.1.4.8': ('wap-wsg-idm-ecid-wtls8', ),
- '2.23.43.1.4.9': ('wap-wsg-idm-ecid-wtls9', ),
- '2.23.43.1.4.10': ('wap-wsg-idm-ecid-wtls10', ),
- '2.23.43.1.4.11': ('wap-wsg-idm-ecid-wtls11', ),
- '2.23.43.1.4.12': ('wap-wsg-idm-ecid-wtls12', ),
-}
-# #####################################################################################
-# #####################################################################################
-
-_OID_LOOKUP = dict()
-_NORMALIZE_NAMES = dict()
-_NORMALIZE_NAMES_SHORT = dict()
-
-for dotted, names in _OID_MAP.items():
- for name in names:
- if name in _NORMALIZE_NAMES and _OID_LOOKUP[name] != dotted:
- raise AssertionError(
- 'Name collision during setup: "{0}" for OIDs {1} and {2}'
- .format(name, dotted, _OID_LOOKUP[name])
- )
- _NORMALIZE_NAMES[name] = names[0]
- _NORMALIZE_NAMES_SHORT[name] = names[-1]
- _OID_LOOKUP[name] = dotted
-for alias, original in [('userID', 'userId')]:
- if alias in _NORMALIZE_NAMES:
- raise AssertionError(
- 'Name collision during adding aliases: "{0}" (alias for "{1}") is already mapped to OID {2}'
- .format(alias, original, _OID_LOOKUP[alias])
- )
- _NORMALIZE_NAMES[alias] = original
- _NORMALIZE_NAMES_SHORT[alias] = _NORMALIZE_NAMES_SHORT[original]
- _OID_LOOKUP[alias] = _OID_LOOKUP[original]
-
-
-def pyopenssl_normalize_name(name, short=False):
- nid = OpenSSL._util.lib.OBJ_txt2nid(to_bytes(name))
- if nid != 0:
- b_name = OpenSSL._util.lib.OBJ_nid2ln(nid)
- name = to_text(OpenSSL._util.ffi.string(b_name))
- if short:
- return _NORMALIZE_NAMES_SHORT.get(name, name)
- else:
- return _NORMALIZE_NAMES.get(name, name)
-
-
-# #####################################################################################
-# #####################################################################################
-# # This excerpt is dual licensed under the terms of the Apache License, Version
-# # 2.0, and the BSD License. See the LICENSE file at
-# # https://github.com/pyca/cryptography/blob/master/LICENSE for complete details.
-# #
-# # Adapted from cryptography's hazmat/backends/openssl/decode_asn1.py
-# #
-# # Copyright (c) 2015, 2016 Paul Kehrer (@reaperhulk)
-# # Copyright (c) 2017 Fraser Tweedale (@frasertweedale)
-# #
-# # Relevant commits from cryptography project (https://github.com/pyca/cryptography):
-# # pyca/cryptography@719d536dd691e84e208534798f2eb4f82aaa2e07
-# # pyca/cryptography@5ab6d6a5c05572bd1c75f05baf264a2d0001894a
-# # pyca/cryptography@2e776e20eb60378e0af9b7439000d0e80da7c7e3
-# # pyca/cryptography@fb309ed24647d1be9e319b61b1f2aa8ebb87b90b
-# # pyca/cryptography@2917e460993c475c72d7146c50dc3bbc2414280d
-# # pyca/cryptography@3057f91ea9a05fb593825006d87a391286a4d828
-# # pyca/cryptography@d607dd7e5bc5c08854ec0c9baff70ba4a35be36f
-def _obj2txt(openssl_lib, openssl_ffi, obj):
- # Set to 80 on the recommendation of
- # https://www.openssl.org/docs/crypto/OBJ_nid2ln.html#return_values
- #
- # But OIDs longer than this occur in real life (e.g. Active
- # Directory makes some very long OIDs). So we need to detect
- # and properly handle the case where the default buffer is not
- # big enough.
- #
- buf_len = 80
- buf = openssl_ffi.new("char[]", buf_len)
-
- # 'res' is the number of bytes that *would* be written if the
- # buffer is large enough. If 'res' > buf_len - 1, we need to
- # alloc a big-enough buffer and go again.
- res = openssl_lib.OBJ_obj2txt(buf, buf_len, obj, 1)
- if res > buf_len - 1: # account for terminating null byte
- buf_len = res + 1
- buf = openssl_ffi.new("char[]", buf_len)
- res = openssl_lib.OBJ_obj2txt(buf, buf_len, obj, 1)
- return openssl_ffi.buffer(buf, res)[:].decode()
-# #####################################################################################
-# #####################################################################################
-
-
-def cryptography_get_extensions_from_cert(cert):
- # Since cryptography won't give us the DER value for an extension
- # (that is only stored for unrecognized extensions), we have to re-do
- # the extension parsing outselves.
- result = dict()
- backend = cert._backend
- x509_obj = cert._x509
-
- for i in range(backend._lib.X509_get_ext_count(x509_obj)):
- ext = backend._lib.X509_get_ext(x509_obj, i)
- if ext == backend._ffi.NULL:
- continue
- crit = backend._lib.X509_EXTENSION_get_critical(ext)
- data = backend._lib.X509_EXTENSION_get_data(ext)
- backend.openssl_assert(data != backend._ffi.NULL)
- der = backend._ffi.buffer(data.data, data.length)[:]
- entry = dict(
- critical=(crit == 1),
- value=base64.b64encode(der),
- )
- oid = _obj2txt(backend._lib, backend._ffi, backend._lib.X509_EXTENSION_get_object(ext))
- result[oid] = entry
- return result
-
-
-def cryptography_get_extensions_from_csr(csr):
- # Since cryptography won't give us the DER value for an extension
- # (that is only stored for unrecognized extensions), we have to re-do
- # the extension parsing outselves.
- result = dict()
- backend = csr._backend
-
- extensions = backend._lib.X509_REQ_get_extensions(csr._x509_req)
- extensions = backend._ffi.gc(
- extensions,
- lambda ext: backend._lib.sk_X509_EXTENSION_pop_free(
- ext,
- backend._ffi.addressof(backend._lib._original_lib, "X509_EXTENSION_free")
- )
- )
-
- for i in range(backend._lib.sk_X509_EXTENSION_num(extensions)):
- ext = backend._lib.sk_X509_EXTENSION_value(extensions, i)
- if ext == backend._ffi.NULL:
- continue
- crit = backend._lib.X509_EXTENSION_get_critical(ext)
- data = backend._lib.X509_EXTENSION_get_data(ext)
- backend.openssl_assert(data != backend._ffi.NULL)
- der = backend._ffi.buffer(data.data, data.length)[:]
- entry = dict(
- critical=(crit == 1),
- value=base64.b64encode(der),
- )
- oid = _obj2txt(backend._lib, backend._ffi, backend._lib.X509_EXTENSION_get_object(ext))
- result[oid] = entry
- return result
-
-
-def pyopenssl_get_extensions_from_cert(cert):
- # While pyOpenSSL allows us to get an extension's DER value, it won't
- # give us the dotted string for an OID. So we have to do some magic to
- # get hold of it.
- result = dict()
- ext_count = cert.get_extension_count()
- for i in range(0, ext_count):
- ext = cert.get_extension(i)
- entry = dict(
- critical=bool(ext.get_critical()),
- value=base64.b64encode(ext.get_data()),
- )
- oid = _obj2txt(
- OpenSSL._util.lib,
- OpenSSL._util.ffi,
- OpenSSL._util.lib.X509_EXTENSION_get_object(ext._extension)
- )
- # This could also be done a bit simpler:
- #
- # oid = _obj2txt(OpenSSL._util.lib, OpenSSL._util.ffi, OpenSSL._util.lib.OBJ_nid2obj(ext._nid))
- #
- # Unfortunately this gives the wrong result in case the linked OpenSSL
- # doesn't know the OID. That's why we have to get the OID dotted string
- # similarly to how cryptography does it.
- result[oid] = entry
- return result
-
-
-def pyopenssl_get_extensions_from_csr(csr):
- # While pyOpenSSL allows us to get an extension's DER value, it won't
- # give us the dotted string for an OID. So we have to do some magic to
- # get hold of it.
- result = dict()
- for ext in csr.get_extensions():
- entry = dict(
- critical=bool(ext.get_critical()),
- value=base64.b64encode(ext.get_data()),
- )
- oid = _obj2txt(
- OpenSSL._util.lib,
- OpenSSL._util.ffi,
- OpenSSL._util.lib.X509_EXTENSION_get_object(ext._extension)
- )
- # This could also be done a bit simpler:
- #
- # oid = _obj2txt(OpenSSL._util.lib, OpenSSL._util.ffi, OpenSSL._util.lib.OBJ_nid2obj(ext._nid))
- #
- # Unfortunately this gives the wrong result in case the linked OpenSSL
- # doesn't know the OID. That's why we have to get the OID dotted string
- # similarly to how cryptography does it.
- result[oid] = entry
- return result
-
-
-def cryptography_name_to_oid(name):
- dotted = _OID_LOOKUP.get(name)
- if dotted is None:
- raise OpenSSLObjectError('Cannot find OID for "{0}"'.format(name))
- return x509.oid.ObjectIdentifier(dotted)
-
-
-def cryptography_oid_to_name(oid, short=False):
- dotted_string = oid.dotted_string
- names = _OID_MAP.get(dotted_string)
- name = names[0] if names else oid._name
- if short:
- return _NORMALIZE_NAMES_SHORT.get(name, name)
- else:
- return _NORMALIZE_NAMES.get(name, name)
-
-
-def cryptography_get_name(name):
- '''
- Given a name string, returns a cryptography x509.Name object.
- Raises an OpenSSLObjectError if the name is unknown or cannot be parsed.
- '''
- try:
- if name.startswith('DNS:'):
- return x509.DNSName(to_text(name[4:]))
- if name.startswith('IP:'):
- return x509.IPAddress(ipaddress.ip_address(to_text(name[3:])))
- if name.startswith('email:'):
- return x509.RFC822Name(to_text(name[6:]))
- if name.startswith('URI:'):
- return x509.UniformResourceIdentifier(to_text(name[4:]))
- except Exception as e:
- raise OpenSSLObjectError('Cannot parse Subject Alternative Name "{0}": {1}'.format(name, e))
- if ':' not in name:
- raise OpenSSLObjectError('Cannot parse Subject Alternative Name "{0}" (forgot "DNS:" prefix?)'.format(name))
- raise OpenSSLObjectError('Cannot parse Subject Alternative Name "{0}" (potentially unsupported by cryptography backend)'.format(name))
-
-
-def _get_hex(bytesstr):
- if bytesstr is None:
- return bytesstr
- data = binascii.hexlify(bytesstr)
- data = to_text(b':'.join(data[i:i + 2] for i in range(0, len(data), 2)))
- return data
-
-
-def cryptography_decode_name(name):
- '''
- Given a cryptography x509.Name object, returns a string.
- Raises an OpenSSLObjectError if the name is not supported.
- '''
- if isinstance(name, x509.DNSName):
- return 'DNS:{0}'.format(name.value)
- if isinstance(name, x509.IPAddress):
- return 'IP:{0}'.format(name.value.compressed)
- if isinstance(name, x509.RFC822Name):
- return 'email:{0}'.format(name.value)
- if isinstance(name, x509.UniformResourceIdentifier):
- return 'URI:{0}'.format(name.value)
- if isinstance(name, x509.DirectoryName):
- # FIXME: test
- return 'DirName:' + ''.join(['/{0}:{1}'.format(attribute.oid._name, attribute.value) for attribute in name.value])
- if isinstance(name, x509.RegisteredID):
- # FIXME: test
- return 'RegisteredID:{0}'.format(name.value)
- if isinstance(name, x509.OtherName):
- # FIXME: test
- return '{0}:{1}'.format(name.type_id.dotted_string, _get_hex(name.value))
- raise OpenSSLObjectError('Cannot decode name "{0}"'.format(name))
-
-
-def _cryptography_get_keyusage(usage):
- '''
- Given a key usage identifier string, returns the parameter name used by cryptography's x509.KeyUsage().
- Raises an OpenSSLObjectError if the identifier is unknown.
- '''
- if usage in ('Digital Signature', 'digitalSignature'):
- return 'digital_signature'
- if usage in ('Non Repudiation', 'nonRepudiation'):
- return 'content_commitment'
- if usage in ('Key Encipherment', 'keyEncipherment'):
- return 'key_encipherment'
- if usage in ('Data Encipherment', 'dataEncipherment'):
- return 'data_encipherment'
- if usage in ('Key Agreement', 'keyAgreement'):
- return 'key_agreement'
- if usage in ('Certificate Sign', 'keyCertSign'):
- return 'key_cert_sign'
- if usage in ('CRL Sign', 'cRLSign'):
- return 'crl_sign'
- if usage in ('Encipher Only', 'encipherOnly'):
- return 'encipher_only'
- if usage in ('Decipher Only', 'decipherOnly'):
- return 'decipher_only'
- raise OpenSSLObjectError('Unknown key usage "{0}"'.format(usage))
-
-
-def cryptography_parse_key_usage_params(usages):
- '''
- Given a list of key usage identifier strings, returns the parameters for cryptography's x509.KeyUsage().
- Raises an OpenSSLObjectError if an identifier is unknown.
- '''
- params = dict(
- digital_signature=False,
- content_commitment=False,
- key_encipherment=False,
- data_encipherment=False,
- key_agreement=False,
- key_cert_sign=False,
- crl_sign=False,
- encipher_only=False,
- decipher_only=False,
- )
- for usage in usages:
- params[_cryptography_get_keyusage(usage)] = True
- return params
-
-
-def cryptography_get_basic_constraints(constraints):
- '''
- Given a list of constraints, returns a tuple (ca, path_length).
- Raises an OpenSSLObjectError if a constraint is unknown or cannot be parsed.
- '''
- ca = False
- path_length = None
- if constraints:
- for constraint in constraints:
- if constraint.startswith('CA:'):
- if constraint == 'CA:TRUE':
- ca = True
- elif constraint == 'CA:FALSE':
- ca = False
- else:
- raise OpenSSLObjectError('Unknown basic constraint value "{0}" for CA'.format(constraint[3:]))
- elif constraint.startswith('pathlen:'):
- v = constraint[len('pathlen:'):]
- try:
- path_length = int(v)
- except Exception as e:
- raise OpenSSLObjectError('Cannot parse path length constraint "{0}" ({1})'.format(v, e))
- else:
- raise OpenSSLObjectError('Unknown basic constraint "{0}"'.format(constraint))
- return ca, path_length
-
-
-def binary_exp_mod(f, e, m):
- '''Computes f^e mod m in O(log e) multiplications modulo m.'''
- # Compute len_e = floor(log_2(e))
- len_e = -1
- x = e
- while x > 0:
- x >>= 1
- len_e += 1
- # Compute f**e mod m
- result = 1
- for k in range(len_e, -1, -1):
- result = (result * result) % m
- if ((e >> k) & 1) != 0:
- result = (result * f) % m
- return result
-
-
-def simple_gcd(a, b):
- '''Compute GCD of its two inputs.'''
- while b != 0:
- a, b = b, a % b
- return a
-
-
-def quick_is_not_prime(n):
- '''Does some quick checks to see if we can poke a hole into the primality of n.
-
- A result of `False` does **not** mean that the number is prime; it just means
- that we couldn't detect quickly whether it is not prime.
- '''
- if n <= 2:
- return True
- # The constant in the next line is the product of all primes < 200
- if simple_gcd(n, 7799922041683461553249199106329813876687996789903550945093032474868511536164700810) > 1:
- return True
- # TODO: maybe do some iterations of Miller-Rabin to increase confidence
- # (https://en.wikipedia.org/wiki/Miller%E2%80%93Rabin_primality_test)
- return False
-
-
-python_version = (sys.version_info[0], sys.version_info[1])
-if python_version >= (2, 7) or python_version >= (3, 1):
- # Ansible still supports Python 2.6 on remote nodes
- def count_bits(no):
- no = abs(no)
- if no == 0:
- return 0
- return no.bit_length()
-else:
- # Slow, but works
- def count_bits(no):
- no = abs(no)
- count = 0
- while no > 0:
- no >>= 1
- count += 1
- return count
-
-
-PEM_START = '-----BEGIN '
-PEM_END = '-----'
-PKCS8_PRIVATEKEY_NAMES = ('PRIVATE KEY', 'ENCRYPTED PRIVATE KEY')
-PKCS1_PRIVATEKEY_SUFFIX = ' PRIVATE KEY'
-
-
-def identify_private_key_format(content):
- '''Given the contents of a private key file, identifies its format.'''
- # See https://github.com/openssl/openssl/blob/master/crypto/pem/pem_pkey.c#L40-L85
- # (PEM_read_bio_PrivateKey)
- # and https://github.com/openssl/openssl/blob/master/include/openssl/pem.h#L46-L47
- # (PEM_STRING_PKCS8, PEM_STRING_PKCS8INF)
- try:
- lines = content.decode('utf-8').splitlines(False)
- if lines[0].startswith(PEM_START) and lines[0].endswith(PEM_END) and len(lines[0]) > len(PEM_START) + len(PEM_END):
- name = lines[0][len(PEM_START):-len(PEM_END)]
- if name in PKCS8_PRIVATEKEY_NAMES:
- return 'pkcs8'
- if len(name) > len(PKCS1_PRIVATEKEY_SUFFIX) and name.endswith(PKCS1_PRIVATEKEY_SUFFIX):
- return 'pkcs1'
- return 'unknown-pem'
- except UnicodeDecodeError:
- pass
- return 'raw'
-
-
-def cryptography_key_needs_digest_for_signing(key):
- '''Tests whether the given private key requires a digest algorithm for signing.
-
- Ed25519 and Ed448 keys do not; they need None to be passed as the digest algorithm.
- '''
- if CRYPTOGRAPHY_HAS_ED25519 and isinstance(key, cryptography.hazmat.primitives.asymmetric.ed25519.Ed25519PrivateKey):
- return False
- if CRYPTOGRAPHY_HAS_ED448 and isinstance(key, cryptography.hazmat.primitives.asymmetric.ed448.Ed448PrivateKey):
- return False
- return True
-
-
-def cryptography_compare_public_keys(key1, key2):
- '''Tests whether two public keys are the same.
-
- Needs special logic for Ed25519 and Ed448 keys, since they do not have public_numbers().
- '''
- if CRYPTOGRAPHY_HAS_ED25519:
- a = isinstance(key1, cryptography.hazmat.primitives.asymmetric.ed25519.Ed25519PublicKey)
- b = isinstance(key2, cryptography.hazmat.primitives.asymmetric.ed25519.Ed25519PublicKey)
- if a or b:
- if not a or not b:
- return False
- a = key1.public_bytes(serialization.Encoding.Raw, serialization.PublicFormat.Raw)
- b = key2.public_bytes(serialization.Encoding.Raw, serialization.PublicFormat.Raw)
- return a == b
- if CRYPTOGRAPHY_HAS_ED448:
- a = isinstance(key1, cryptography.hazmat.primitives.asymmetric.ed448.Ed448PublicKey)
- b = isinstance(key2, cryptography.hazmat.primitives.asymmetric.ed448.Ed448PublicKey)
- if a or b:
- if not a or not b:
- return False
- a = key1.public_bytes(serialization.Encoding.Raw, serialization.PublicFormat.Raw)
- b = key2.public_bytes(serialization.Encoding.Raw, serialization.PublicFormat.Raw)
- return a == b
- return key1.public_numbers() == key2.public_numbers()
-
-
-if HAS_CRYPTOGRAPHY:
- REVOCATION_REASON_MAP = {
- 'unspecified': x509.ReasonFlags.unspecified,
- 'key_compromise': x509.ReasonFlags.key_compromise,
- 'ca_compromise': x509.ReasonFlags.ca_compromise,
- 'affiliation_changed': x509.ReasonFlags.affiliation_changed,
- 'superseded': x509.ReasonFlags.superseded,
- 'cessation_of_operation': x509.ReasonFlags.cessation_of_operation,
- 'certificate_hold': x509.ReasonFlags.certificate_hold,
- 'privilege_withdrawn': x509.ReasonFlags.privilege_withdrawn,
- 'aa_compromise': x509.ReasonFlags.aa_compromise,
- 'remove_from_crl': x509.ReasonFlags.remove_from_crl,
- }
- REVOCATION_REASON_MAP_INVERSE = dict()
- for k, v in REVOCATION_REASON_MAP.items():
- REVOCATION_REASON_MAP_INVERSE[v] = k
-
-
-def cryptography_decode_revoked_certificate(cert):
- result = {
- 'serial_number': cert.serial_number,
- 'revocation_date': cert.revocation_date,
- 'issuer': None,
- 'issuer_critical': False,
- 'reason': None,
- 'reason_critical': False,
- 'invalidity_date': None,
- 'invalidity_date_critical': False,
- }
- try:
- ext = cert.extensions.get_extension_for_class(x509.CertificateIssuer)
- result['issuer'] = list(ext.value)
- result['issuer_critical'] = ext.critical
- except x509.ExtensionNotFound:
- pass
- try:
- ext = cert.extensions.get_extension_for_class(x509.CRLReason)
- result['reason'] = ext.value.reason
- result['reason_critical'] = ext.critical
- except x509.ExtensionNotFound:
- pass
- try:
- ext = cert.extensions.get_extension_for_class(x509.InvalidityDate)
- result['invalidity_date'] = ext.value.invalidity_date
- result['invalidity_date_critical'] = ext.critical
- except x509.ExtensionNotFound:
- pass
- return result
diff --git a/test/support/integration/plugins/module_utils/database.py b/test/support/integration/plugins/module_utils/database.py
deleted file mode 100644
index 014939a260..0000000000
--- a/test/support/integration/plugins/module_utils/database.py
+++ /dev/null
@@ -1,142 +0,0 @@
-# This code is part of Ansible, but is an independent component.
-# This particular file snippet, and this file snippet only, is BSD licensed.
-# Modules you write using this snippet, which is embedded dynamically by Ansible
-# still belong to the author of the module, and may assign their own license
-# to the complete work.
-#
-# Copyright (c) 2014, Toshio Kuratomi <tkuratomi@ansible.com>
-# All rights reserved.
-#
-# Redistribution and use in source and binary forms, with or without modification,
-# are permitted provided that the following conditions are met:
-#
-# * Redistributions of source code must retain the above copyright
-# notice, this list of conditions and the following disclaimer.
-# * Redistributions in binary form must reproduce the above copyright notice,
-# this list of conditions and the following disclaimer in the documentation
-# and/or other materials provided with the distribution.
-#
-# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND
-# ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
-# WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
-# IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
-# INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
-# PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
-# INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
-# LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE
-# USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-
-class SQLParseError(Exception):
- pass
-
-
-class UnclosedQuoteError(SQLParseError):
- pass
-
-
-# maps a type of identifier to the maximum number of dot levels that are
-# allowed to specify that identifier. For example, a database column can be
-# specified by up to 4 levels: database.schema.table.column
-_PG_IDENTIFIER_TO_DOT_LEVEL = dict(
- database=1,
- schema=2,
- table=3,
- column=4,
- role=1,
- tablespace=1,
- sequence=3,
- publication=1,
-)
-_MYSQL_IDENTIFIER_TO_DOT_LEVEL = dict(database=1, table=2, column=3, role=1, vars=1)
-
-
-def _find_end_quote(identifier, quote_char):
- accumulate = 0
- while True:
- try:
- quote = identifier.index(quote_char)
- except ValueError:
- raise UnclosedQuoteError
- accumulate = accumulate + quote
- try:
- next_char = identifier[quote + 1]
- except IndexError:
- return accumulate
- if next_char == quote_char:
- try:
- identifier = identifier[quote + 2:]
- accumulate = accumulate + 2
- except IndexError:
- raise UnclosedQuoteError
- else:
- return accumulate
-
-
-def _identifier_parse(identifier, quote_char):
- if not identifier:
- raise SQLParseError('Identifier name unspecified or unquoted trailing dot')
-
- already_quoted = False
- if identifier.startswith(quote_char):
- already_quoted = True
- try:
- end_quote = _find_end_quote(identifier[1:], quote_char=quote_char) + 1
- except UnclosedQuoteError:
- already_quoted = False
- else:
- if end_quote < len(identifier) - 1:
- if identifier[end_quote + 1] == '.':
- dot = end_quote + 1
- first_identifier = identifier[:dot]
- next_identifier = identifier[dot + 1:]
- further_identifiers = _identifier_parse(next_identifier, quote_char)
- further_identifiers.insert(0, first_identifier)
- else:
- raise SQLParseError('User escaped identifiers must escape extra quotes')
- else:
- further_identifiers = [identifier]
-
- if not already_quoted:
- try:
- dot = identifier.index('.')
- except ValueError:
- identifier = identifier.replace(quote_char, quote_char * 2)
- identifier = ''.join((quote_char, identifier, quote_char))
- further_identifiers = [identifier]
- else:
- if dot == 0 or dot >= len(identifier) - 1:
- identifier = identifier.replace(quote_char, quote_char * 2)
- identifier = ''.join((quote_char, identifier, quote_char))
- further_identifiers = [identifier]
- else:
- first_identifier = identifier[:dot]
- next_identifier = identifier[dot + 1:]
- further_identifiers = _identifier_parse(next_identifier, quote_char)
- first_identifier = first_identifier.replace(quote_char, quote_char * 2)
- first_identifier = ''.join((quote_char, first_identifier, quote_char))
- further_identifiers.insert(0, first_identifier)
-
- return further_identifiers
-
-
-def pg_quote_identifier(identifier, id_type):
- identifier_fragments = _identifier_parse(identifier, quote_char='"')
- if len(identifier_fragments) > _PG_IDENTIFIER_TO_DOT_LEVEL[id_type]:
- raise SQLParseError('PostgreSQL does not support %s with more than %i dots' % (id_type, _PG_IDENTIFIER_TO_DOT_LEVEL[id_type]))
- return '.'.join(identifier_fragments)
-
-
-def mysql_quote_identifier(identifier, id_type):
- identifier_fragments = _identifier_parse(identifier, quote_char='`')
- if (len(identifier_fragments) - 1) > _MYSQL_IDENTIFIER_TO_DOT_LEVEL[id_type]:
- raise SQLParseError('MySQL does not support %s with more than %i dots' % (id_type, _MYSQL_IDENTIFIER_TO_DOT_LEVEL[id_type]))
-
- special_cased_fragments = []
- for fragment in identifier_fragments:
- if fragment == '`*`':
- special_cased_fragments.append('*')
- else:
- special_cased_fragments.append(fragment)
-
- return '.'.join(special_cased_fragments)
diff --git a/test/support/integration/plugins/module_utils/ecs/__init__.py b/test/support/integration/plugins/module_utils/ecs/__init__.py
deleted file mode 100644
index e69de29bb2..0000000000
--- a/test/support/integration/plugins/module_utils/ecs/__init__.py
+++ /dev/null
diff --git a/test/support/integration/plugins/module_utils/ecs/api.py b/test/support/integration/plugins/module_utils/ecs/api.py
deleted file mode 100644
index d89b03330b..0000000000
--- a/test/support/integration/plugins/module_utils/ecs/api.py
+++ /dev/null
@@ -1,364 +0,0 @@
-# -*- coding: utf-8 -*-
-
-# This code is part of Ansible, but is an independent component.
-# This particular file snippet, and this file snippet only, is licensed under the
-# Modified BSD License. Modules you write using this snippet, which is embedded
-# dynamically by Ansible, still belong to the author of the module, and may assign
-# their own license to the complete work.
-#
-# Copyright (c), Entrust Datacard Corporation, 2019
-# Simplified BSD License (see licenses/simplified_bsd.txt or https://opensource.org/licenses/BSD-2-Clause)
-
-# Redistribution and use in source and binary forms, with or without modification,
-# are permitted provided that the following conditions are met:
-# 1. Redistributions of source code must retain the above copyright notice,
-# this list of conditions and the following disclaimer.
-# 2. Redistributions in binary form must reproduce the above copyright notice,
-# this list of conditions and the following disclaimer in the documentation
-# and/or other materials provided with the distribution.
-#
-# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND
-# ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
-# WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
-# IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
-# INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
-# PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
-# INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
-# LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE
-# USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-from __future__ import absolute_import, division, print_function
-
-__metaclass__ = type
-
-import json
-import os
-import re
-import time
-import traceback
-
-from ansible.module_utils._text import to_text, to_native
-from ansible.module_utils.basic import missing_required_lib
-from ansible.module_utils.six.moves.urllib.parse import urlencode
-from ansible.module_utils.six.moves.urllib.error import HTTPError
-from ansible.module_utils.urls import Request
-
-YAML_IMP_ERR = None
-try:
- import yaml
-except ImportError:
- YAML_FOUND = False
- YAML_IMP_ERR = traceback.format_exc()
-else:
- YAML_FOUND = True
-
-valid_file_format = re.compile(r".*(\.)(yml|yaml|json)$")
-
-
-def ecs_client_argument_spec():
- return dict(
- entrust_api_user=dict(type='str', required=True),
- entrust_api_key=dict(type='str', required=True, no_log=True),
- entrust_api_client_cert_path=dict(type='path', required=True),
- entrust_api_client_cert_key_path=dict(type='path', required=True, no_log=True),
- entrust_api_specification_path=dict(type='path', default='https://cloud.entrust.net/EntrustCloud/documentation/cms-api-2.1.0.yaml'),
- )
-
-
-class SessionConfigurationException(Exception):
- """ Raised if we cannot configure a session with the API """
-
- pass
-
-
-class RestOperationException(Exception):
- """ Encapsulate a REST API error """
-
- def __init__(self, error):
- self.status = to_native(error.get("status", None))
- self.errors = [to_native(err.get("message")) for err in error.get("errors", {})]
- self.message = to_native(" ".join(self.errors))
-
-
-def generate_docstring(operation_spec):
- """Generate a docstring for an operation defined in operation_spec (swagger)"""
- # Description of the operation
- docs = operation_spec.get("description", "No Description")
- docs += "\n\n"
-
- # Parameters of the operation
- parameters = operation_spec.get("parameters", [])
- if len(parameters) != 0:
- docs += "\tArguments:\n\n"
- for parameter in parameters:
- docs += "{0} ({1}:{2}): {3}\n".format(
- parameter.get("name"),
- parameter.get("type", "No Type"),
- "Required" if parameter.get("required", False) else "Not Required",
- parameter.get("description"),
- )
-
- return docs
-
-
-def bind(instance, method, operation_spec):
- def binding_scope_fn(*args, **kwargs):
- return method(instance, *args, **kwargs)
-
- # Make sure we don't confuse users; add the proper name and documentation to the function.
- # Users can use !help(<function>) to get help on the function from interactive python or pdb
- operation_name = operation_spec.get("operationId").split("Using")[0]
- binding_scope_fn.__name__ = str(operation_name)
- binding_scope_fn.__doc__ = generate_docstring(operation_spec)
-
- return binding_scope_fn
-
-
-class RestOperation(object):
- def __init__(self, session, uri, method, parameters=None):
- self.session = session
- self.method = method
- if parameters is None:
- self.parameters = {}
- else:
- self.parameters = parameters
- self.url = "{scheme}://{host}{base_path}{uri}".format(scheme="https", host=session._spec.get("host"), base_path=session._spec.get("basePath"), uri=uri)
-
- def restmethod(self, *args, **kwargs):
- """Do the hard work of making the request here"""
-
- # gather named path parameters and do substitution on the URL
- if self.parameters:
- path_parameters = {}
- body_parameters = {}
- query_parameters = {}
- for x in self.parameters:
- expected_location = x.get("in")
- key_name = x.get("name", None)
- key_value = kwargs.get(key_name, None)
- if expected_location == "path" and key_name and key_value:
- path_parameters.update({key_name: key_value})
- elif expected_location == "body" and key_name and key_value:
- body_parameters.update({key_name: key_value})
- elif expected_location == "query" and key_name and key_value:
- query_parameters.update({key_name: key_value})
-
- if len(body_parameters.keys()) >= 1:
- body_parameters = body_parameters.get(list(body_parameters.keys())[0])
- else:
- body_parameters = None
- else:
- path_parameters = {}
- query_parameters = {}
- body_parameters = None
-
- # This will fail if we have not set path parameters with a KeyError
- url = self.url.format(**path_parameters)
- if query_parameters:
- # modify the URL to add path parameters
- url = url + "?" + urlencode(query_parameters)
-
- try:
- if body_parameters:
- body_parameters_json = json.dumps(body_parameters)
- response = self.session.request.open(method=self.method, url=url, data=body_parameters_json)
- else:
- response = self.session.request.open(method=self.method, url=url)
- request_error = False
- except HTTPError as e:
- # An HTTPError has the same methods available as a valid response from request.open
- response = e
- request_error = True
-
- # Return the result if JSON and success ({} for empty responses)
- # Raise an exception if there was a failure.
- try:
- result_code = response.getcode()
- result = json.loads(response.read())
- except ValueError:
- result = {}
-
- if result or result == {}:
- if result_code and result_code < 400:
- return result
- else:
- raise RestOperationException(result)
-
- # Raise a generic RestOperationException if this fails
- raise RestOperationException({"status": result_code, "errors": [{"message": "REST Operation Failed"}]})
-
-
-class Resource(object):
- """ Implement basic CRUD operations against a path. """
-
- def __init__(self, session):
- self.session = session
- self.parameters = {}
-
- for url in session._spec.get("paths").keys():
- methods = session._spec.get("paths").get(url)
- for method in methods.keys():
- operation_spec = methods.get(method)
- operation_name = operation_spec.get("operationId", None)
- parameters = operation_spec.get("parameters")
-
- if not operation_name:
- if method.lower() == "post":
- operation_name = "Create"
- elif method.lower() == "get":
- operation_name = "Get"
- elif method.lower() == "put":
- operation_name = "Update"
- elif method.lower() == "delete":
- operation_name = "Delete"
- elif method.lower() == "patch":
- operation_name = "Patch"
- else:
- raise SessionConfigurationException(to_native("Invalid REST method type {0}".format(method)))
-
- # Get the non-parameter parts of the URL and append to the operation name
- # e.g /application/version -> GetApplicationVersion
- # e.g. /application/{id} -> GetApplication
- # This may lead to duplicates, which we must prevent.
- operation_name += re.sub(r"{(.*)}", "", url).replace("/", " ").title().replace(" ", "")
- operation_spec["operationId"] = operation_name
-
- op = RestOperation(session, url, method, parameters)
- setattr(self, operation_name, bind(self, op.restmethod, operation_spec))
-
-
-# Session to encapsulate the connection parameters of the module_utils Request object, the api spec, etc
-class ECSSession(object):
- def __init__(self, name, **kwargs):
- """
- Initialize our session
- """
-
- self._set_config(name, **kwargs)
-
- def client(self):
- resource = Resource(self)
- return resource
-
- def _set_config(self, name, **kwargs):
- headers = {
- "Content-Type": "application/json",
- "Connection": "keep-alive",
- }
- self.request = Request(headers=headers, timeout=60)
-
- configurators = [self._read_config_vars]
- for configurator in configurators:
- self._config = configurator(name, **kwargs)
- if self._config:
- break
- if self._config is None:
- raise SessionConfigurationException(to_native("No Configuration Found."))
-
- # set up auth if passed
- entrust_api_user = self.get_config("entrust_api_user")
- entrust_api_key = self.get_config("entrust_api_key")
- if entrust_api_user and entrust_api_key:
- self.request.url_username = entrust_api_user
- self.request.url_password = entrust_api_key
- else:
- raise SessionConfigurationException(to_native("User and key must be provided."))
-
- # set up client certificate if passed (support all-in one or cert + key)
- entrust_api_cert = self.get_config("entrust_api_cert")
- entrust_api_cert_key = self.get_config("entrust_api_cert_key")
- if entrust_api_cert:
- self.request.client_cert = entrust_api_cert
- if entrust_api_cert_key:
- self.request.client_key = entrust_api_cert_key
- else:
- raise SessionConfigurationException(to_native("Client certificate for authentication to the API must be provided."))
-
- # set up the spec
- entrust_api_specification_path = self.get_config("entrust_api_specification_path")
-
- if not entrust_api_specification_path.startswith("http") and not os.path.isfile(entrust_api_specification_path):
- raise SessionConfigurationException(to_native("OpenAPI specification was not found at location {0}.".format(entrust_api_specification_path)))
- if not valid_file_format.match(entrust_api_specification_path):
- raise SessionConfigurationException(to_native("OpenAPI specification filename must end in .json, .yml or .yaml"))
-
- self.verify = True
-
- if entrust_api_specification_path.startswith("http"):
- try:
- http_response = Request().open(method="GET", url=entrust_api_specification_path)
- http_response_contents = http_response.read()
- if entrust_api_specification_path.endswith(".json"):
- self._spec = json.load(http_response_contents)
- elif entrust_api_specification_path.endswith(".yml") or entrust_api_specification_path.endswith(".yaml"):
- self._spec = yaml.safe_load(http_response_contents)
- except HTTPError as e:
- raise SessionConfigurationException(to_native("Error downloading specification from address '{0}', received error code '{1}'".format(
- entrust_api_specification_path, e.getcode())))
- else:
- with open(entrust_api_specification_path) as f:
- if ".json" in entrust_api_specification_path:
- self._spec = json.load(f)
- elif ".yml" in entrust_api_specification_path or ".yaml" in entrust_api_specification_path:
- self._spec = yaml.safe_load(f)
-
- def get_config(self, item):
- return self._config.get(item, None)
-
- def _read_config_vars(self, name, **kwargs):
- """ Read configuration from variables passed to the module. """
- config = {}
-
- entrust_api_specification_path = kwargs.get("entrust_api_specification_path")
- if not entrust_api_specification_path or (not entrust_api_specification_path.startswith("http") and not os.path.isfile(entrust_api_specification_path)):
- raise SessionConfigurationException(
- to_native(
- "Parameter provided for entrust_api_specification_path of value '{0}' was not a valid file path or HTTPS address.".format(
- entrust_api_specification_path
- )
- )
- )
-
- for required_file in ["entrust_api_cert", "entrust_api_cert_key"]:
- file_path = kwargs.get(required_file)
- if not file_path or not os.path.isfile(file_path):
- raise SessionConfigurationException(
- to_native("Parameter provided for {0} of value '{1}' was not a valid file path.".format(required_file, file_path))
- )
-
- for required_var in ["entrust_api_user", "entrust_api_key"]:
- if not kwargs.get(required_var):
- raise SessionConfigurationException(to_native("Parameter provided for {0} was missing.".format(required_var)))
-
- config["entrust_api_cert"] = kwargs.get("entrust_api_cert")
- config["entrust_api_cert_key"] = kwargs.get("entrust_api_cert_key")
- config["entrust_api_specification_path"] = kwargs.get("entrust_api_specification_path")
- config["entrust_api_user"] = kwargs.get("entrust_api_user")
- config["entrust_api_key"] = kwargs.get("entrust_api_key")
-
- return config
-
-
-def ECSClient(entrust_api_user=None, entrust_api_key=None, entrust_api_cert=None, entrust_api_cert_key=None, entrust_api_specification_path=None):
- """Create an ECS client"""
-
- if not YAML_FOUND:
- raise SessionConfigurationException(missing_required_lib("PyYAML"), exception=YAML_IMP_ERR)
-
- if entrust_api_specification_path is None:
- entrust_api_specification_path = "https://cloud.entrust.net/EntrustCloud/documentation/cms-api-2.1.0.yaml"
-
- # Not functionally necessary with current uses of this module_util, but better to be explicit for future use cases
- entrust_api_user = to_text(entrust_api_user)
- entrust_api_key = to_text(entrust_api_key)
- entrust_api_cert_key = to_text(entrust_api_cert_key)
- entrust_api_specification_path = to_text(entrust_api_specification_path)
-
- return ECSSession(
- "ecs",
- entrust_api_user=entrust_api_user,
- entrust_api_key=entrust_api_key,
- entrust_api_cert=entrust_api_cert,
- entrust_api_cert_key=entrust_api_cert_key,
- entrust_api_specification_path=entrust_api_specification_path,
- ).client()
diff --git a/test/support/integration/plugins/module_utils/mysql.py b/test/support/integration/plugins/module_utils/mysql.py
deleted file mode 100644
index 46198f367b..0000000000
--- a/test/support/integration/plugins/module_utils/mysql.py
+++ /dev/null
@@ -1,106 +0,0 @@
-# This code is part of Ansible, but is an independent component.
-# This particular file snippet, and this file snippet only, is BSD licensed.
-# Modules you write using this snippet, which is embedded dynamically by Ansible
-# still belong to the author of the module, and may assign their own license
-# to the complete work.
-#
-# Copyright (c), Jonathan Mainguy <jon@soh.re>, 2015
-# Most of this was originally added by Sven Schliesing @muffl0n in the mysql_user.py module
-# All rights reserved.
-#
-# Redistribution and use in source and binary forms, with or without modification,
-# are permitted provided that the following conditions are met:
-#
-# * Redistributions of source code must retain the above copyright
-# notice, this list of conditions and the following disclaimer.
-# * Redistributions in binary form must reproduce the above copyright notice,
-# this list of conditions and the following disclaimer in the documentation
-# and/or other materials provided with the distribution.
-#
-# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND
-# ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
-# WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
-# IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
-# INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
-# PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
-# INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
-# LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE
-# USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-import os
-
-try:
- import pymysql as mysql_driver
- _mysql_cursor_param = 'cursor'
-except ImportError:
- try:
- import MySQLdb as mysql_driver
- import MySQLdb.cursors
- _mysql_cursor_param = 'cursorclass'
- except ImportError:
- mysql_driver = None
-
-mysql_driver_fail_msg = 'The PyMySQL (Python 2.7 and Python 3.X) or MySQL-python (Python 2.X) module is required.'
-
-
-def mysql_connect(module, login_user=None, login_password=None, config_file='', ssl_cert=None, ssl_key=None, ssl_ca=None, db=None, cursor_class=None,
- connect_timeout=30, autocommit=False):
- config = {}
-
- if ssl_ca is not None or ssl_key is not None or ssl_cert is not None:
- config['ssl'] = {}
-
- if module.params['login_unix_socket']:
- config['unix_socket'] = module.params['login_unix_socket']
- else:
- config['host'] = module.params['login_host']
- config['port'] = module.params['login_port']
-
- if os.path.exists(config_file):
- config['read_default_file'] = config_file
-
- # If login_user or login_password are given, they should override the
- # config file
- if login_user is not None:
- config['user'] = login_user
- if login_password is not None:
- config['passwd'] = login_password
- if ssl_cert is not None:
- config['ssl']['cert'] = ssl_cert
- if ssl_key is not None:
- config['ssl']['key'] = ssl_key
- if ssl_ca is not None:
- config['ssl']['ca'] = ssl_ca
- if db is not None:
- config['db'] = db
- if connect_timeout is not None:
- config['connect_timeout'] = connect_timeout
-
- if _mysql_cursor_param == 'cursor':
- # In case of PyMySQL driver:
- db_connection = mysql_driver.connect(autocommit=autocommit, **config)
- else:
- # In case of MySQLdb driver
- db_connection = mysql_driver.connect(**config)
- if autocommit:
- db_connection.autocommit(True)
-
- if cursor_class == 'DictCursor':
- return db_connection.cursor(**{_mysql_cursor_param: mysql_driver.cursors.DictCursor}), db_connection
- else:
- return db_connection.cursor(), db_connection
-
-
-def mysql_common_argument_spec():
- return dict(
- login_user=dict(type='str', default=None),
- login_password=dict(type='str', no_log=True),
- login_host=dict(type='str', default='localhost'),
- login_port=dict(type='int', default=3306),
- login_unix_socket=dict(type='str'),
- config_file=dict(type='path', default='~/.my.cnf'),
- connect_timeout=dict(type='int', default=30),
- client_cert=dict(type='path', aliases=['ssl_cert']),
- client_key=dict(type='path', aliases=['ssl_key']),
- ca_cert=dict(type='path', aliases=['ssl_ca']),
- )
diff --git a/test/support/integration/plugins/module_utils/postgres.py b/test/support/integration/plugins/module_utils/postgres.py
deleted file mode 100644
index 0ccc6ed7b5..0000000000
--- a/test/support/integration/plugins/module_utils/postgres.py
+++ /dev/null
@@ -1,330 +0,0 @@
-# This code is part of Ansible, but is an independent component.
-# This particular file snippet, and this file snippet only, is BSD licensed.
-# Modules you write using this snippet, which is embedded dynamically by Ansible
-# still belong to the author of the module, and may assign their own license
-# to the complete work.
-#
-# Copyright (c), Ted Timmons <ted@timmons.me>, 2017.
-# Most of this was originally added by other creators in the postgresql_user module.
-# All rights reserved.
-#
-# Redistribution and use in source and binary forms, with or without modification,
-# are permitted provided that the following conditions are met:
-#
-# * Redistributions of source code must retain the above copyright
-# notice, this list of conditions and the following disclaimer.
-# * Redistributions in binary form must reproduce the above copyright notice,
-# this list of conditions and the following disclaimer in the documentation
-# and/or other materials provided with the distribution.
-#
-# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND
-# ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
-# WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
-# IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
-# INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
-# PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
-# INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
-# LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE
-# USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-psycopg2 = None # This line needs for unit tests
-try:
- import psycopg2
- HAS_PSYCOPG2 = True
-except ImportError:
- HAS_PSYCOPG2 = False
-
-from ansible.module_utils.basic import missing_required_lib
-from ansible.module_utils._text import to_native
-from ansible.module_utils.six import iteritems
-from ansible.module_utils.compat.version import LooseVersion
-
-
-def postgres_common_argument_spec():
- """
- Return a dictionary with connection options.
-
- The options are commonly used by most of PostgreSQL modules.
- """
- return dict(
- login_user=dict(default='postgres'),
- login_password=dict(default='', no_log=True),
- login_host=dict(default=''),
- login_unix_socket=dict(default=''),
- port=dict(type='int', default=5432, aliases=['login_port']),
- ssl_mode=dict(default='prefer', choices=['allow', 'disable', 'prefer', 'require', 'verify-ca', 'verify-full']),
- ca_cert=dict(aliases=['ssl_rootcert']),
- )
-
-
-def ensure_required_libs(module):
- """Check required libraries."""
- if not HAS_PSYCOPG2:
- module.fail_json(msg=missing_required_lib('psycopg2'))
-
- if module.params.get('ca_cert') and LooseVersion(psycopg2.__version__) < LooseVersion('2.4.3'):
- module.fail_json(msg='psycopg2 must be at least 2.4.3 in order to use the ca_cert parameter')
-
-
-def connect_to_db(module, conn_params, autocommit=False, fail_on_conn=True):
- """Connect to a PostgreSQL database.
-
- Return psycopg2 connection object.
-
- Args:
- module (AnsibleModule) -- object of ansible.module_utils.basic.AnsibleModule class
- conn_params (dict) -- dictionary with connection parameters
-
- Kwargs:
- autocommit (bool) -- commit automatically (default False)
- fail_on_conn (bool) -- fail if connection failed or just warn and return None (default True)
- """
- ensure_required_libs(module)
-
- db_connection = None
- try:
- db_connection = psycopg2.connect(**conn_params)
- if autocommit:
- if LooseVersion(psycopg2.__version__) >= LooseVersion('2.4.2'):
- db_connection.set_session(autocommit=True)
- else:
- db_connection.set_isolation_level(psycopg2.extensions.ISOLATION_LEVEL_AUTOCOMMIT)
-
- # Switch role, if specified:
- if module.params.get('session_role'):
- cursor = db_connection.cursor(cursor_factory=psycopg2.extras.DictCursor)
-
- try:
- cursor.execute('SET ROLE "%s"' % module.params['session_role'])
- except Exception as e:
- module.fail_json(msg="Could not switch role: %s" % to_native(e))
- finally:
- cursor.close()
-
- except TypeError as e:
- if 'sslrootcert' in e.args[0]:
- module.fail_json(msg='Postgresql server must be at least '
- 'version 8.4 to support sslrootcert')
-
- if fail_on_conn:
- module.fail_json(msg="unable to connect to database: %s" % to_native(e))
- else:
- module.warn("PostgreSQL server is unavailable: %s" % to_native(e))
- db_connection = None
-
- except Exception as e:
- if fail_on_conn:
- module.fail_json(msg="unable to connect to database: %s" % to_native(e))
- else:
- module.warn("PostgreSQL server is unavailable: %s" % to_native(e))
- db_connection = None
-
- return db_connection
-
-
-def exec_sql(obj, query, query_params=None, ddl=False, add_to_executed=True, dont_exec=False):
- """Execute SQL.
-
- Auxiliary function for PostgreSQL user classes.
-
- Returns a query result if possible or True/False if ddl=True arg was passed.
- It necessary for statements that don't return any result (like DDL queries).
-
- Args:
- obj (obj) -- must be an object of a user class.
- The object must have module (AnsibleModule class object) and
- cursor (psycopg cursor object) attributes
- query (str) -- SQL query to execute
-
- Kwargs:
- query_params (dict or tuple) -- Query parameters to prevent SQL injections,
- could be a dict or tuple
- ddl (bool) -- must return True or False instead of rows (typical for DDL queries)
- (default False)
- add_to_executed (bool) -- append the query to obj.executed_queries attribute
- dont_exec (bool) -- used with add_to_executed=True to generate a query, add it
- to obj.executed_queries list and return True (default False)
- """
-
- if dont_exec:
- # This is usually needed to return queries in check_mode
- # without execution
- query = obj.cursor.mogrify(query, query_params)
- if add_to_executed:
- obj.executed_queries.append(query)
-
- return True
-
- try:
- if query_params is not None:
- obj.cursor.execute(query, query_params)
- else:
- obj.cursor.execute(query)
-
- if add_to_executed:
- if query_params is not None:
- obj.executed_queries.append(obj.cursor.mogrify(query, query_params))
- else:
- obj.executed_queries.append(query)
-
- if not ddl:
- res = obj.cursor.fetchall()
- return res
- return True
- except Exception as e:
- obj.module.fail_json(msg="Cannot execute SQL '%s': %s" % (query, to_native(e)))
- return False
-
-
-def get_conn_params(module, params_dict, warn_db_default=True):
- """Get connection parameters from the passed dictionary.
-
- Return a dictionary with parameters to connect to PostgreSQL server.
-
- Args:
- module (AnsibleModule) -- object of ansible.module_utils.basic.AnsibleModule class
- params_dict (dict) -- dictionary with variables
-
- Kwargs:
- warn_db_default (bool) -- warn that the default DB is used (default True)
- """
- # To use defaults values, keyword arguments must be absent, so
- # check which values are empty and don't include in the return dictionary
- params_map = {
- "login_host": "host",
- "login_user": "user",
- "login_password": "password",
- "port": "port",
- "ssl_mode": "sslmode",
- "ca_cert": "sslrootcert"
- }
-
- # Might be different in the modules:
- if params_dict.get('db'):
- params_map['db'] = 'database'
- elif params_dict.get('database'):
- params_map['database'] = 'database'
- elif params_dict.get('login_db'):
- params_map['login_db'] = 'database'
- else:
- if warn_db_default:
- module.warn('Database name has not been passed, '
- 'used default database to connect to.')
-
- kw = dict((params_map[k], v) for (k, v) in iteritems(params_dict)
- if k in params_map and v != '' and v is not None)
-
- # If a login_unix_socket is specified, incorporate it here.
- is_localhost = "host" not in kw or kw["host"] is None or kw["host"] == "localhost"
- if is_localhost and params_dict["login_unix_socket"] != "":
- kw["host"] = params_dict["login_unix_socket"]
-
- return kw
-
-
-class PgMembership(object):
- def __init__(self, module, cursor, groups, target_roles, fail_on_role=True):
- self.module = module
- self.cursor = cursor
- self.target_roles = [r.strip() for r in target_roles]
- self.groups = [r.strip() for r in groups]
- self.executed_queries = []
- self.granted = {}
- self.revoked = {}
- self.fail_on_role = fail_on_role
- self.non_existent_roles = []
- self.changed = False
- self.__check_roles_exist()
-
- def grant(self):
- for group in self.groups:
- self.granted[group] = []
-
- for role in self.target_roles:
- # If role is in a group now, pass:
- if self.__check_membership(group, role):
- continue
-
- query = 'GRANT "%s" TO "%s"' % (group, role)
- self.changed = exec_sql(self, query, ddl=True)
-
- if self.changed:
- self.granted[group].append(role)
-
- return self.changed
-
- def revoke(self):
- for group in self.groups:
- self.revoked[group] = []
-
- for role in self.target_roles:
- # If role is not in a group now, pass:
- if not self.__check_membership(group, role):
- continue
-
- query = 'REVOKE "%s" FROM "%s"' % (group, role)
- self.changed = exec_sql(self, query, ddl=True)
-
- if self.changed:
- self.revoked[group].append(role)
-
- return self.changed
-
- def __check_membership(self, src_role, dst_role):
- query = ("SELECT ARRAY(SELECT b.rolname FROM "
- "pg_catalog.pg_auth_members m "
- "JOIN pg_catalog.pg_roles b ON (m.roleid = b.oid) "
- "WHERE m.member = r.oid) "
- "FROM pg_catalog.pg_roles r "
- "WHERE r.rolname = %(dst_role)s")
-
- res = exec_sql(self, query, query_params={'dst_role': dst_role}, add_to_executed=False)
- membership = []
- if res:
- membership = res[0][0]
-
- if not membership:
- return False
-
- if src_role in membership:
- return True
-
- return False
-
- def __check_roles_exist(self):
- existent_groups = self.__roles_exist(self.groups)
- existent_roles = self.__roles_exist(self.target_roles)
-
- for group in self.groups:
- if group not in existent_groups:
- if self.fail_on_role:
- self.module.fail_json(msg="Role %s does not exist" % group)
- else:
- self.module.warn("Role %s does not exist, pass" % group)
- self.non_existent_roles.append(group)
-
- for role in self.target_roles:
- if role not in existent_roles:
- if self.fail_on_role:
- self.module.fail_json(msg="Role %s does not exist" % role)
- else:
- self.module.warn("Role %s does not exist, pass" % role)
-
- if role not in self.groups:
- self.non_existent_roles.append(role)
-
- else:
- if self.fail_on_role:
- self.module.exit_json(msg="Role role '%s' is a member of role '%s'" % (role, role))
- else:
- self.module.warn("Role role '%s' is a member of role '%s', pass" % (role, role))
-
- # Update role lists, excluding non existent roles:
- self.groups = [g for g in self.groups if g not in self.non_existent_roles]
-
- self.target_roles = [r for r in self.target_roles if r not in self.non_existent_roles]
-
- def __roles_exist(self, roles):
- tmp = ["'" + x + "'" for x in roles]
- query = "SELECT rolname FROM pg_roles WHERE rolname IN (%s)" % ','.join(tmp)
- return [x[0] for x in exec_sql(self, query, add_to_executed=False)]
diff --git a/test/support/integration/plugins/module_utils/rabbitmq.py b/test/support/integration/plugins/module_utils/rabbitmq.py
deleted file mode 100644
index cf76400644..0000000000
--- a/test/support/integration/plugins/module_utils/rabbitmq.py
+++ /dev/null
@@ -1,220 +0,0 @@
-# -*- coding: utf-8 -*-
-#
-# Copyright: (c) 2016, Jorge Rodriguez <jorge.rodriguez@tiriel.eu>
-# Copyright: (c) 2018, John Imison <john+github@imison.net>
-#
-# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt)
-
-from __future__ import absolute_import, division, print_function
-__metaclass__ = type
-
-from ansible.module_utils._text import to_native
-from ansible.module_utils.basic import missing_required_lib
-from ansible.module_utils.six.moves.urllib import parse as urllib_parse
-from mimetypes import MimeTypes
-
-import os
-import json
-import traceback
-
-PIKA_IMP_ERR = None
-try:
- import pika
- import pika.exceptions
- from pika import spec
- HAS_PIKA = True
-except ImportError:
- PIKA_IMP_ERR = traceback.format_exc()
- HAS_PIKA = False
-
-
-def rabbitmq_argument_spec():
- return dict(
- login_user=dict(type='str', default='guest'),
- login_password=dict(type='str', default='guest', no_log=True),
- login_host=dict(type='str', default='localhost'),
- login_port=dict(type='str', default='15672'),
- login_protocol=dict(type='str', default='http', choices=['http', 'https']),
- ca_cert=dict(type='path', aliases=['cacert']),
- client_cert=dict(type='path', aliases=['cert']),
- client_key=dict(type='path', aliases=['key']),
- vhost=dict(type='str', default='/'),
- )
-
-
-# notification/rabbitmq_basic_publish.py
-class RabbitClient():
- def __init__(self, module):
- self.module = module
- self.params = module.params
- self.check_required_library()
- self.check_host_params()
- self.url = self.params['url']
- self.proto = self.params['proto']
- self.username = self.params['username']
- self.password = self.params['password']
- self.host = self.params['host']
- self.port = self.params['port']
- self.vhost = self.params['vhost']
- self.queue = self.params['queue']
- self.headers = self.params['headers']
- self.cafile = self.params['cafile']
- self.certfile = self.params['certfile']
- self.keyfile = self.params['keyfile']
-
- if self.host is not None:
- self.build_url()
-
- if self.cafile is not None:
- self.append_ssl_certs()
-
- self.connect_to_rabbitmq()
-
- def check_required_library(self):
- if not HAS_PIKA:
- self.module.fail_json(msg=missing_required_lib("pika"), exception=PIKA_IMP_ERR)
-
- def check_host_params(self):
- # Fail if url is specified and other conflicting parameters have been specified
- if self.params['url'] is not None and any(self.params[k] is not None for k in ['proto', 'host', 'port', 'password', 'username', 'vhost']):
- self.module.fail_json(msg="url and proto, host, port, vhost, username or password cannot be specified at the same time.")
-
- # Fail if url not specified and there is a missing parameter to build the url
- if self.params['url'] is None and any(self.params[k] is None for k in ['proto', 'host', 'port', 'password', 'username', 'vhost']):
- self.module.fail_json(msg="Connection parameters must be passed via url, or, proto, host, port, vhost, username or password.")
-
- def append_ssl_certs(self):
- ssl_options = {}
- if self.cafile:
- ssl_options['cafile'] = self.cafile
- if self.certfile:
- ssl_options['certfile'] = self.certfile
- if self.keyfile:
- ssl_options['keyfile'] = self.keyfile
-
- self.url = self.url + '?ssl_options=' + urllib_parse.quote(json.dumps(ssl_options))
-
- @staticmethod
- def rabbitmq_argument_spec():
- return dict(
- url=dict(type='str'),
- proto=dict(type='str', choices=['amqp', 'amqps']),
- host=dict(type='str'),
- port=dict(type='int'),
- username=dict(type='str'),
- password=dict(type='str', no_log=True),
- vhost=dict(type='str'),
- queue=dict(type='str')
- )
-
- ''' Consider some file size limits here '''
- def _read_file(self, path):
- try:
- with open(path, "rb") as file_handle:
- return file_handle.read()
- except IOError as e:
- self.module.fail_json(msg="Unable to open file %s: %s" % (path, to_native(e)))
-
- @staticmethod
- def _check_file_mime_type(path):
- mime = MimeTypes()
- return mime.guess_type(path)
-
- def build_url(self):
- self.url = '{0}://{1}:{2}@{3}:{4}/{5}'.format(self.proto,
- self.username,
- self.password,
- self.host,
- self.port,
- self.vhost)
-
- def connect_to_rabbitmq(self):
- """
- Function to connect to rabbitmq using username and password
- """
- try:
- parameters = pika.URLParameters(self.url)
- except Exception as e:
- self.module.fail_json(msg="URL malformed: %s" % to_native(e))
-
- try:
- self.connection = pika.BlockingConnection(parameters)
- except Exception as e:
- self.module.fail_json(msg="Connection issue: %s" % to_native(e))
-
- try:
- self.conn_channel = self.connection.channel()
- except pika.exceptions.AMQPChannelError as e:
- self.close_connection()
- self.module.fail_json(msg="Channel issue: %s" % to_native(e))
-
- def close_connection(self):
- try:
- self.connection.close()
- except pika.exceptions.AMQPConnectionError:
- pass
-
- def basic_publish(self):
- self.content_type = self.params.get("content_type")
-
- if self.params.get("body") is not None:
- args = dict(
- body=self.params.get("body"),
- exchange=self.params.get("exchange"),
- routing_key=self.params.get("routing_key"),
- properties=pika.BasicProperties(content_type=self.content_type, delivery_mode=1, headers=self.headers))
-
- # If src (file) is defined and content_type is left as default, do a mime lookup on the file
- if self.params.get("src") is not None and self.content_type == 'text/plain':
- self.content_type = RabbitClient._check_file_mime_type(self.params.get("src"))[0]
- self.headers.update(
- filename=os.path.basename(self.params.get("src"))
- )
-
- args = dict(
- body=self._read_file(self.params.get("src")),
- exchange=self.params.get("exchange"),
- routing_key=self.params.get("routing_key"),
- properties=pika.BasicProperties(content_type=self.content_type,
- delivery_mode=1,
- headers=self.headers
- ))
- elif self.params.get("src") is not None:
- args = dict(
- body=self._read_file(self.params.get("src")),
- exchange=self.params.get("exchange"),
- routing_key=self.params.get("routing_key"),
- properties=pika.BasicProperties(content_type=self.content_type,
- delivery_mode=1,
- headers=self.headers
- ))
-
- try:
- # If queue is not defined, RabbitMQ will return the queue name of the automatically generated queue.
- if self.queue is None:
- result = self.conn_channel.queue_declare(durable=self.params.get("durable"),
- exclusive=self.params.get("exclusive"),
- auto_delete=self.params.get("auto_delete"))
- self.conn_channel.confirm_delivery()
- self.queue = result.method.queue
- else:
- self.conn_channel.queue_declare(queue=self.queue,
- durable=self.params.get("durable"),
- exclusive=self.params.get("exclusive"),
- auto_delete=self.params.get("auto_delete"))
- self.conn_channel.confirm_delivery()
- except Exception as e:
- self.module.fail_json(msg="Queue declare issue: %s" % to_native(e))
-
- # https://github.com/ansible/ansible/blob/devel/lib/ansible/module_utils/cloudstack.py#L150
- if args['routing_key'] is None:
- args['routing_key'] = self.queue
-
- if args['exchange'] is None:
- args['exchange'] = ''
-
- try:
- self.conn_channel.basic_publish(**args)
- return True
- except pika.exceptions.UnroutableError:
- return False