We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
When applying this role to a remote node:
- role: cyberark.conjur-host-identity conjur_appliance_url: 'https://conjur-master' conjur_account: 'demo' conjur_host_factory_token: "{{lookup('env', 'HFTOKEN')}}" conjur_host_name: "ansible" conjur_ssl_certificate: "{{ lookup('file', '/src/certs/ca.crt') }}" conjur_validate_certs: True
the content of the CA file is dumped to stdout:
PLAY [all] ****************************************************************************************************************************************************************** TASK [Gathering Facts] ****************************************************************************************************************************************************** ok: [localhost] TASK [cyberark.conjur-host-identity : Check if /etc/conjur.identity already exists] ***************************************************************************************** ok: [localhost] TASK [cyberark.conjur-host-identity : Set fact "conjurized"] **************************************************************************************************************** ok: [localhost] TASK [cyberark.conjur-host-identity : Ensure all required variables are set] ************************************************************************************************ skipping: [localhost] => (item=demo) skipping: [localhost] => (item=https://conjur-master) skipping: [localhost] => (item=ansible) TASK [cyberark.conjur-host-identity : Set fact "ssl_configuration"] ********************************************************************************************************* ok: [localhost] TASK [cyberark.conjur-host-identity : Ensure all required ssl variables are set] ******************************************************************************************** skipping: [localhost] => (item=-----BEGIN CERTIFICATE----- MIIDhTCCAm2gAwIBAgIJAN8JryhThobIMA0GCSqGSIb3DQEBCwUAMDsxDTALBgNV BAoTBGRlbW8xEjAQBgNVBAsTCUNvbmp1ciBDQTEWMBQGA1UEAxMNY29uanVyLW1h c3RlcjAeFw0xODAzMTMyMDU4MzVaFw0yODAzMTAyMDU4MzVaMDsxDTALBgNVBAoT BGRlbW8xEjAQBgNVBAsTCUNvbmp1ciBDQTEWMBQGA1UEAxMNY29uanVyLW1hc3Rl cjCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPP61jkwf00NV0NXjlK9 GW6kkjloJckrbwV0Q2d9MV6k9LLNKcGa/lYjJNZ8u175zoAHLVNOOhC7N4DxktW0 KTqz1+wh3Rm3fFt61fGtkl23aedggGg5RDTah4/q8J1/2vJfjfrjEUKA4q2Nf/D5 X6Th+73uy6kOyuEoZfOo+dtl/6ObOiuypwqSZGU66n13JFFJdGsaab2YY3JnV/0f tO06j/wMRAHJNwRgDwATvmu7d7TjY2YQBhNT/WaO6vf0UJJv3K9CoduFN4/kt7a9 Kj7cUBmi/tIMC+tL3N3VAfvOPbxqZqSxibX8nZzoDunFcTQMzTtPB8wXrykE3/nX M+MCAwEAAaOBizCBiDArBgNVHREEJDAigg1jb25qdXItbWFzdGVygglsb2NhbGhv c3SCBmNvbmp1cjAdBgNVHQ4EFgQUO+nODDlXAJ7aMH559gGXDn3uk7QwHwYDVR0j BBgwFoAUO+nODDlXAJ7aMH559gGXDn3uk7QwDAYDVR0TBAUwAwEB/zALBgNVHQ8E BAMCAeYwDQYJKoZIhvcNAQELBQADggEBAJmaCL0F+c0WUuCFwHtWtna+YqpfPrv2 0GujkFQ4lzOZByeMP7/wD0KHJmP/ythJlkAxi2ZZz6+A3Fmb0Tr5PZ4HwHiLt9a2 F1O5fz3inMJurAdjvkVqHNfnDxJp+Iq41UunYse4RRiyvabeMcQT+C4WPfPO2eSW v0ylYZDRCBC8M6gUWsaXn8NjyCWx2Zg7dg0QxYnaJEEnjCRYgJcv6E+OFt1u2EeX EHRSj2Y1raSP3uxtOOOLCYN9yGhyLFveJVDlbuCZK1cQUXPLBwoKnV8kBIFreH1m vkw6qeyBIIpY+SiZypJsPOP61DQGamS0cAMqS68rwIQ1nmDpewpKA0s= -----END CERTIFICATE-----) skipping: [localhost] => (item=True) TASK [cyberark.conjur-host-identity : Set fact "ssl file path"] ************************************************************************************************************* ok: [localhost] ...
Let's avoid doing this to insure our CA cert doesn't end up in a log aggregation tool
The text was updated successfully, but these errors were encountered:
No branches or pull requests
When applying this role to a remote node:
the content of the CA file is dumped to stdout:
Let's avoid doing this to insure our CA cert doesn't end up in a log aggregation tool
The text was updated successfully, but these errors were encountered: