Merge pull request #517 from xek/master

Use ansible_facts variable
This commit is contained in:
Rafael Guterres Jeffman
2021-04-07 21:38:05 -03:00
committed by GitHub
42 changed files with 119 additions and 118 deletions

View File

@@ -7,7 +7,7 @@
tasks: tasks:
- copy: - copy:
src: "{{ playbook_dir }}/password.txt" src: "{{ playbook_dir }}/password.txt"
dest: "{{ ansible_env.HOME }}/password.txt" dest: "{{ ansible_facts['env'].HOME }}/password.txt"
owner: "{{ ansible_user }}" owner: "{{ ansible_user }}"
group: "{{ ansible_user }}" group: "{{ ansible_user }}"
mode: 0600 mode: 0600
@@ -16,7 +16,7 @@
name: symvault name: symvault
username: admin username: admin
vault_type: symmetric vault_type: symmetric
vault_password_file: "{{ ansible_env.HOME }}/password.txt" vault_password_file: "{{ ansible_facts['env'].HOME }}/password.txt"
- file: - file:
path: "{{ ansible_env.HOME }}/password.txt" path: "{{ ansible_facts['env'].HOME }}/password.txt"
state: absent state: absent

View File

@@ -12,7 +12,7 @@
tasks: tasks:
- copy: - copy:
src: "{{ playbook_dir }}/public.pem" src: "{{ playbook_dir }}/public.pem"
dest: "{{ ansible_env.HOME }}/public.pem" dest: "{{ ansible_facts['env'].HOME }}/public.pem"
owner: "{{ ansible_user }}" owner: "{{ ansible_user }}"
group: "{{ ansible_user }}" group: "{{ ansible_user }}"
mode: 0600 mode: 0600
@@ -21,7 +21,7 @@
name: asymvault name: asymvault
username: admin username: admin
vault_type: asymmetric vault_type: asymmetric
vault_public_key_file: "{{ ansible_env.HOME }}/public.pem" vault_public_key_file: "{{ ansible_facts['env'].HOME }}/public.pem"
- file: - file:
path: "{{ ansible_env.HOME }}/public.pem" path: "{{ ansible_facts['env'].HOME }}/public.pem"
state: absent state: absent

View File

@@ -10,7 +10,7 @@
set_fact: set_fact:
ipabackup_controller_dir: ipabackup_controller_dir:
"{{ ipabackup_controller_path | default(lookup('env','PWD')) }}/{{ "{{ ipabackup_controller_path | default(lookup('env','PWD')) }}/{{
ipabackup_name_prefix | default(ansible_fqdn) }}_{{ ipabackup_name_prefix | default(ansible_facts['fqdn']) }}_{{
ipabackup_item }}/" ipabackup_item }}/"
- name: Stat backup on server - name: Stat backup on server

View File

@@ -6,9 +6,9 @@
- name: Import variables specific to distribution - name: Import variables specific to distribution
include_vars: "{{ item }}" include_vars: "{{ item }}"
with_first_found: with_first_found:
- "{{ role_path }}/vars/{{ ansible_distribution }}-{{ ansible_distribution_version }}.yml" - "{{ role_path }}/vars/{{ ansible_facts['distribution'] }}-{{ ansible_facts['distribution_version'] }}.yml"
- "{{ role_path }}/vars/{{ ansible_distribution }}-{{ ansible_distribution_major_version }}.yml" - "{{ role_path }}/vars/{{ ansible_facts['distribution'] }}-{{ ansible_facts['distribution_major_version'] }}.yml"
- "{{ role_path }}/vars/{{ ansible_distribution }}.yml" - "{{ role_path }}/vars/{{ ansible_facts['distribution'] }}.yml"
- "{{ role_path }}/vars/default.yml" - "{{ role_path }}/vars/default.yml"
### GET SERVICES FROM BACKUP ### GET SERVICES FROM BACKUP

View File

@@ -33,7 +33,7 @@
domain: "{{ ipaserver_domain | default(ipaclient_domain) | default(omit) }}" domain: "{{ ipaserver_domain | default(ipaclient_domain) | default(omit) }}"
servers: "{{ ipaclient_servers | default(omit) }}" servers: "{{ ipaclient_servers | default(omit) }}"
realm: "{{ ipaserver_realm | default(ipaclient_realm) | default(omit) }}" realm: "{{ ipaserver_realm | default(ipaclient_realm) | default(omit) }}"
hostname: "{{ ipaclient_hostname | default(ansible_fqdn) }}" hostname: "{{ ipaclient_hostname | default(ansible_facts['fqdn']) }}"
ntp_servers: "{{ ipaclient_ntp_servers | default(omit) }}" ntp_servers: "{{ ipaclient_ntp_servers | default(omit) }}"
ntp_pool: "{{ ipaclient_ntp_pool | default(omit) }}" ntp_pool: "{{ ipaclient_ntp_pool | default(omit) }}"
no_ntp: "{{ ipaclient_no_ntp }}" no_ntp: "{{ ipaclient_no_ntp }}"

View File

@@ -4,9 +4,9 @@
- name: Import variables specific to distribution - name: Import variables specific to distribution
include_vars: "{{ item }}" include_vars: "{{ item }}"
with_first_found: with_first_found:
- "{{ role_path }}/vars/{{ ansible_distribution }}-{{ ansible_distribution_version }}.yml" - "{{ role_path }}/vars/{{ ansible_facts['distribution'] }}-{{ ansible_facts['distribution_version'] }}.yml"
- "{{ role_path }}/vars/{{ ansible_distribution }}-{{ ansible_distribution_major_version }}.yml" - "{{ role_path }}/vars/{{ ansible_facts['distribution'] }}-{{ ansible_facts['distribution_major_version'] }}.yml"
- "{{ role_path }}/vars/{{ ansible_distribution }}.yml" - "{{ role_path }}/vars/{{ ansible_facts['distribution'] }}.yml"
- "{{ role_path }}/vars/default.yml" - "{{ role_path }}/vars/default.yml"
- name: Install IPA client - name: Install IPA client

View File

@@ -72,7 +72,7 @@
default(omit) }}" default(omit) }}"
servers: "{{ ipareplica_servers | default(omit) }}" servers: "{{ ipareplica_servers | default(omit) }}"
realm: "{{ ipareplica_realm | default(ipaserver_realm) |default(omit) }}" realm: "{{ ipareplica_realm | default(ipaserver_realm) |default(omit) }}"
hostname: "{{ ipareplica_hostname | default(ansible_fqdn) }}" hostname: "{{ ipareplica_hostname | default(ansible_facts['fqdn']) }}"
ca_cert_files: "{{ ipareplica_ca_cert_files | default([]) }}" ca_cert_files: "{{ ipareplica_ca_cert_files | default([]) }}"
hidden_replica: "{{ ipareplica_hidden_replica }}" hidden_replica: "{{ ipareplica_hidden_replica }}"
skip_mem_check: "{{ not ipareplica_mem_check }}" skip_mem_check: "{{ not ipareplica_mem_check }}"

View File

@@ -4,9 +4,9 @@
- name: Import variables specific to distribution - name: Import variables specific to distribution
include_vars: "{{ item }}" include_vars: "{{ item }}"
with_first_found: with_first_found:
- "vars/{{ ansible_distribution }}-{{ ansible_distribution_version }}.yml" - "vars/{{ ansible_facts['distribution'] }}-{{ ansible_facts['distribution_version'] }}.yml"
- "vars/{{ ansible_distribution }}-{{ ansible_distribution_major_version }}.yml" - "vars/{{ ansible_facts['distribution'] }}-{{ ansible_facts['distribution_major_version'] }}.yml"
- "vars/{{ ansible_distribution }}.yml" - "vars/{{ ansible_facts['distribution'] }}.yml"
- "vars/default.yml" - "vars/default.yml"
- name: Install IPA replica - name: Install IPA replica

View File

@@ -25,7 +25,7 @@
# command: > # command: >
# /usr/sbin/ipa-replica-manage # /usr/sbin/ipa-replica-manage
# del # del
# {{ ipareplica_hostname | default(ansible_fqdn) }} # {{ ipareplica_hostname | default(ansible_facts['fqdn']) }}
# --force # --force
# --password={{ ipadm_password }} # --password={{ ipadm_password }}
# failed_when: False # failed_when: False

View File

@@ -65,7 +65,7 @@
master_password: "{{ ipaserver_master_password | default(omit) }}" master_password: "{{ ipaserver_master_password | default(omit) }}"
domain: "{{ ipaserver_domain | default(omit) }}" domain: "{{ ipaserver_domain | default(omit) }}"
realm: "{{ ipaserver_realm | default(omit) }}" realm: "{{ ipaserver_realm | default(omit) }}"
hostname: "{{ ipaserver_hostname | default(ansible_fqdn) }}" hostname: "{{ ipaserver_hostname | default(ansible_facts['fqdn']) }}"
ca_cert_files: "{{ ipaserver_ca_cert_files | default(omit) }}" ca_cert_files: "{{ ipaserver_ca_cert_files | default(omit) }}"
no_host_dns: "{{ ipaserver_no_host_dns }}" no_host_dns: "{{ ipaserver_no_host_dns }}"
pki_config_override: "{{ ipaserver_pki_config_override | default(omit) }}" pki_config_override: "{{ ipaserver_pki_config_override | default(omit) }}"

View File

@@ -4,9 +4,9 @@
- name: Import variables specific to distribution - name: Import variables specific to distribution
include_vars: "{{ item }}" include_vars: "{{ item }}"
with_first_found: with_first_found:
- "vars/{{ ansible_distribution }}-{{ ansible_distribution_version }}.yml" - "vars/{{ ansible_facts['distribution'] }}-{{ ansible_facts['distribution_version'] }}.yml"
- "vars/{{ ansible_distribution }}-{{ ansible_distribution_major_version }}.yml" - "vars/{{ ansible_facts['distribution'] }}-{{ ansible_facts['distribution_major_version'] }}.yml"
- "vars/{{ ansible_distribution }}.yml" - "vars/{{ ansible_facts['distribution'] }}.yml"
- "vars/default.yml" - "vars/default.yml"
- name: Install IPA server - name: Install IPA server

View File

@@ -3,3 +3,4 @@ roles_path = ../roles:~/.ansible/roles:/usr/share/ansible/roles:/etc/ansible/rol
library = ../plugins/modules:~/.ansible/plugins/modules:/usr/share/ansible/plugins/modules library = ../plugins/modules:~/.ansible/plugins/modules:/usr/share/ansible/plugins/modules
module_utils = ../plugins/module_utils:~/.ansible/plugins/module_utils:/usr/share/ansible/plugins/module_utils module_utils = ../plugins/module_utils:~/.ansible/plugins/module_utils:/usr/share/ansible/plugins/module_utils
host_key_checking = false host_key_checking = false
inject_facts_as_vars = false

View File

@@ -2,9 +2,9 @@
# Set common vars and facts for test. # Set common vars and facts for test.
- name: Set IPv4 address prefix. - name: Set IPv4 address prefix.
set_fact: set_fact:
ipv4_prefix: "{{ ansible_default_ipv4.address.split('.')[:-1] | ipv4_prefix: "{{ ansible_facts['default_ipv4'].address.split('.')[:-1] |
join('.') }}" join('.') }}"
ipv4_reverse_sufix: "{{ ansible_default_ipv4.address.split('.')[:-1] | ipv4_reverse_sufix: "{{ ansible_facts['default_ipv4'].address.split('.')[:-1] |
reverse | reverse |
join('.') }}" join('.') }}"

View File

@@ -564,7 +564,7 @@
ipaadmin_password: SomeADMINpassword ipaadmin_password: SomeADMINpassword
name: iron01 name: iron01
zone_name: "{{ safezone }}" zone_name: "{{ safezone }}"
ip_address: "{{ ansible_default_ipv4.address }}" ip_address: "{{ ansible_facts['default_ipv4'].address }}"
register: result register: result
failed_when: not result.changed failed_when: not result.changed

View File

@@ -6,7 +6,7 @@
tasks: tasks:
- name: Get Domain from server name - name: Get Domain from server name
set_fact: set_fact:
ipaserver_domain: "{{ ansible_fqdn.split('.')[1:] | join ('.') }}" ipaserver_domain: "{{ ansible_facts['fqdn'].split('.')[1:] | join ('.') }}"
when: ipaserver_domain is not defined when: ipaserver_domain is not defined
# CLEANUP TEST ITEMS # CLEANUP TEST ITEMS

View File

@@ -6,7 +6,7 @@
tasks: tasks:
- name: Get Domain from server name - name: Get Domain from server name
set_fact: set_fact:
ipaserver_domain: "{{ ansible_fqdn.split('.')[1:] | join ('.') }}" ipaserver_domain: "{{ ansible_facts['fqdn'].split('.')[1:] | join ('.') }}"
when: ipaserver_domain is not defined when: ipaserver_domain is not defined
- name: Generate self-signed certificates. - name: Generate self-signed certificates.

View File

@@ -6,7 +6,7 @@
tasks: tasks:
- name: Get Domain from server name - name: Get Domain from server name
set_fact: set_fact:
ipaserver_domain: "{{ ansible_fqdn.split('.')[1:] | join ('.') }}" ipaserver_domain: "{{ ansible_facts['fqdn'].split('.')[1:] | join ('.') }}"
when: ipaserver_domain is not defined when: ipaserver_domain is not defined
- name: Host test absent - name: Host test absent

View File

@@ -6,7 +6,7 @@
tasks: tasks:
- name: Get Domain from server name - name: Get Domain from server name
set_fact: set_fact:
ipaserver_domain: "{{ ansible_fqdn.split('.')[1:] | join ('.') }}" ipaserver_domain: "{{ ansible_facts['fqdn'].split('.')[1:] | join ('.') }}"
when: ipaserver_domain is not defined when: ipaserver_domain is not defined
- name: Set host1_fqdn .. host6_fqdn - name: Set host1_fqdn .. host6_fqdn
@@ -33,7 +33,7 @@
- name: Get IPv4 address prefix from server node - name: Get IPv4 address prefix from server node
set_fact: set_fact:
ipv4_prefix: "{{ ansible_default_ipv4.address.split('.')[:-1] | ipv4_prefix: "{{ ansible_facts['default_ipv4'].address.split('.')[:-1] |
join('.') }}" join('.') }}"
- name: Host "{{ host1_fqdn }}" present - name: Host "{{ host1_fqdn }}" present

View File

@@ -6,12 +6,12 @@
tasks: tasks:
- name: Get Domain from server name - name: Get Domain from server name
set_fact: set_fact:
ipaserver_domain: "{{ ansible_fqdn.split('.')[1:] | join ('.') }}" ipaserver_domain: "{{ ansible_facts['fqdn'].split('.')[1:] | join ('.') }}"
when: ipaserver_domain is not defined when: ipaserver_domain is not defined
- name: Get Realm from server name - name: Get Realm from server name
set_fact: set_fact:
ipaserver_realm: "{{ ansible_fqdn.split('.')[1:] | join ('.') | upper }}" ipaserver_realm: "{{ ansible_facts['fqdn'].split('.')[1:] | join ('.') | upper }}"
when: ipaserver_realm is not defined when: ipaserver_realm is not defined
- name: Set host1_fqdn .. host3_fqdn - name: Set host1_fqdn .. host3_fqdn

View File

@@ -6,12 +6,12 @@
tasks: tasks:
- name: Get Domain from server name - name: Get Domain from server name
set_fact: set_fact:
ipaserver_domain: "{{ ansible_fqdn.split('.')[1:] | join ('.') }}" ipaserver_domain: "{{ ansible_facts['fqdn'].split('.')[1:] | join ('.') }}"
when: ipaserver_domain is not defined when: ipaserver_domain is not defined
- name: Get Realm from server name - name: Get Realm from server name
set_fact: set_fact:
ipaserver_realm: "{{ ansible_fqdn.split('.')[1:] | join ('.') | upper }}" ipaserver_realm: "{{ ansible_facts['fqdn'].split('.')[1:] | join ('.') | upper }}"
when: ipaserver_realm is not defined when: ipaserver_realm is not defined
- name: Set host1_fqdn .. host3_fqdn - name: Set host1_fqdn .. host3_fqdn

View File

@@ -6,7 +6,7 @@
tasks: tasks:
- name: Get Domain from server name - name: Get Domain from server name
set_fact: set_fact:
ipaserver_domain: "{{ ansible_fqdn.split('.')[1:] | join ('.') }}" ipaserver_domain: "{{ ansible_facts['fqdn'].split('.')[1:] | join ('.') }}"
when: ipaserver_domain is not defined when: ipaserver_domain is not defined
- name: Set host1_fqdn .. host6_fqdn - name: Set host1_fqdn .. host6_fqdn

View File

@@ -6,7 +6,7 @@
tasks: tasks:
- name: Get Domain from server name - name: Get Domain from server name
set_fact: set_fact:
ipaserver_domain: "{{ ansible_fqdn.split('.')[1:] | join ('.') }}" ipaserver_domain: "{{ ansible_facts['fqdn'].split('.')[1:] | join ('.') }}"
when: ipaserver_domain is not defined when: ipaserver_domain is not defined
- name: Set host1_fqdn .. host6_fqdn - name: Set host1_fqdn .. host6_fqdn
@@ -17,7 +17,7 @@
- name: Get IPv4 address prefix from server node - name: Get IPv4 address prefix from server node
set_fact: set_fact:
ipv4_prefix: "{{ ansible_default_ipv4.address.split('.')[:-1] | ipv4_prefix: "{{ ansible_facts['default_ipv4'].address.split('.')[:-1] |
join('.') }}" join('.') }}"
- name: Host absent - name: Host absent

View File

@@ -6,7 +6,7 @@
tasks: tasks:
- name: Get Domain from server name - name: Get Domain from server name
set_fact: set_fact:
ipaserver_domain: "{{ ansible_fqdn.split('.')[1:] | join ('.') }}" ipaserver_domain: "{{ ansible_facts['fqdn'].split('.')[1:] | join ('.') }}"
when: ipaserver_domain is not defined when: ipaserver_domain is not defined
- name: Set host1_fqdn .. host2_fqdn - name: Set host1_fqdn .. host2_fqdn
@@ -55,39 +55,39 @@
register: result register: result
failed_when: result.changed failed_when: result.changed
- name: Host "{{ host1_fqdn }}" managed by "{{ ansible_fqdn }}" - name: Host "{{ host1_fqdn }}" managed by "{{ ansible_facts['fqdn'] }}"
ipahost: ipahost:
ipaadmin_password: SomeADMINpassword ipaadmin_password: SomeADMINpassword
name: "{{ host1_fqdn }}" name: "{{ host1_fqdn }}"
managedby_host: "{{ ansible_fqdn }}" managedby_host: "{{ ansible_facts['fqdn'] }}"
action: member action: member
register: result register: result
failed_when: not result.changed failed_when: not result.changed
- name: Host "{{ host1_fqdn }}" managed by "{{ ansible_fqdn }}" again - name: Host "{{ host1_fqdn }}" managed by "{{ ansible_facts['fqdn'] }}" again
ipahost: ipahost:
ipaadmin_password: SomeADMINpassword ipaadmin_password: SomeADMINpassword
name: "{{ host1_fqdn }}" name: "{{ host1_fqdn }}"
managedby_host: "{{ ansible_fqdn }}" managedby_host: "{{ ansible_facts['fqdn'] }}"
action: member action: member
register: result register: result
failed_when: result.changed failed_when: result.changed
- name: Host "{{ host1_fqdn }}" not managed by "{{ ansible_fqdn }}" - name: Host "{{ host1_fqdn }}" not managed by "{{ ansible_facts['fqdn'] }}"
ipahost: ipahost:
ipaadmin_password: SomeADMINpassword ipaadmin_password: SomeADMINpassword
name: "{{ host1_fqdn }}" name: "{{ host1_fqdn }}"
managedby_host: "{{ ansible_fqdn }}" managedby_host: "{{ ansible_facts['fqdn'] }}"
action: member action: member
state: absent state: absent
register: result register: result
failed_when: not result.changed failed_when: not result.changed
- name: Host "{{ host1_fqdn }}" not managed by "{{ ansible_fqdn }}" again - name: Host "{{ host1_fqdn }}" not managed by "{{ ansible_facts['fqdn'] }}" again
ipahost: ipahost:
ipaadmin_password: SomeADMINpassword ipaadmin_password: SomeADMINpassword
name: "{{ host1_fqdn }}" name: "{{ host1_fqdn }}"
managedby_host: "{{ ansible_fqdn }}" managedby_host: "{{ ansible_facts['fqdn'] }}"
action: member action: member
state: absent state: absent
register: result register: result

View File

@@ -6,12 +6,12 @@
tasks: tasks:
- name: Get Domain from server name - name: Get Domain from server name
set_fact: set_fact:
ipaserver_domain: "{{ ansible_fqdn.split('.')[1:] | join ('.') }}" ipaserver_domain: "{{ ansible_facts['fqdn'].split('.')[1:] | join ('.') }}"
when: ipaserver_domain is not defined when: ipaserver_domain is not defined
- name: Get Realm from server name - name: Get Realm from server name
set_fact: set_fact:
ipaserver_realm: "{{ ansible_fqdn.split('.')[1:] | join ('.') | upper }}" ipaserver_realm: "{{ ansible_facts['fqdn'].split('.')[1:] | join ('.') | upper }}"
when: ipaserver_realm is not defined when: ipaserver_realm is not defined
- name: Set host1_fqdn - name: Set host1_fqdn

View File

@@ -6,7 +6,7 @@
tasks: tasks:
- name: Get Domain from server name - name: Get Domain from server name
set_fact: set_fact:
ipaserver_domain: "{{ ansible_fqdn.split('.')[1:] | join ('.') }}" ipaserver_domain: "{{ ansible_facts['fqdn'].split('.')[1:] | join ('.') }}"
when: ipaserver_domain is not defined when: ipaserver_domain is not defined
- name: Set host1_fqdn and host2_fqdn - name: Set host1_fqdn and host2_fqdn
@@ -77,11 +77,11 @@
debug: debug:
var: ipahost.host["{{host2_fqdn }}"].randompassword var: ipahost.host["{{host2_fqdn }}"].randompassword
- name: Enrolled host "{{ ansible_fqdn }}" fails to set random password with update_password always - name: Enrolled host "{{ ansible_facts['fqdn'] }}" fails to set random password with update_password always
ipahost: ipahost:
ipaadmin_password: SomeADMINpassword ipaadmin_password: SomeADMINpassword
hosts: hosts:
- name: "{{ ansible_fqdn }}" - name: "{{ ansible_facts['fqdn'] }}"
random: yes random: yes
update_password: always update_password: always
register: ipahost register: ipahost
@@ -89,7 +89,7 @@
- assert: - assert:
that: that:
- ipahost.host["{{ ansible_fqdn }}"].randompassword is - ipahost.host["{{ ansible_facts['fqdn'] }}"].randompassword is
not defined not defined
- "'Password cannot be set on enrolled host' in ipahost.msg" - "'Password cannot be set on enrolled host' in ipahost.msg"

View File

@@ -6,7 +6,7 @@
tasks: tasks:
- name: Get Domain from server name - name: Get Domain from server name
set_fact: set_fact:
ipaserver_domain: "{{ ansible_fqdn.split('.')[1:] | join ('.') }}" ipaserver_domain: "{{ ansible_facts['fqdn'].split('.')[1:] | join ('.') }}"
when: ipaserver_domain is not defined when: ipaserver_domain is not defined
- name: Set host1_fqdn - name: Set host1_fqdn
@@ -23,7 +23,7 @@
- name: Get IPv4 address prefix from server node - name: Get IPv4 address prefix from server node
set_fact: set_fact:
ipv4_prefix: "{{ ansible_default_ipv4.address.split('.')[:-1] | ipv4_prefix: "{{ ansible_facts['default_ipv4'].address.split('.')[:-1] |
join('.') }}" join('.') }}"
- name: Set zone prefixes. - name: Set zone prefixes.

View File

@@ -6,7 +6,7 @@
tasks: tasks:
- name: Get Domain from server name - name: Get Domain from server name
set_fact: set_fact:
ipaserver_domain: "{{ ansible_fqdn.split('.')[1:] | join ('.') }}" ipaserver_domain: "{{ ansible_facts['fqdn'].split('.')[1:] | join ('.') }}"
when: ipaserver_domain is not defined when: ipaserver_domain is not defined
- name: Set host1_fqdn .. host6_fqdn - name: Set host1_fqdn .. host6_fqdn

View File

@@ -6,7 +6,7 @@
tasks: tasks:
- name: Get Domain from server name - name: Get Domain from server name
set_fact: set_fact:
ipaserver_domain: "{{ ansible_fqdn.split('.')[1:] | join ('.') }}" ipaserver_domain: "{{ ansible_facts['fqdn'].split('.')[1:] | join ('.') }}"
when: ipaserver_domain is not defined when: ipaserver_domain is not defined
- name: Set host1_fqdn .. host5_fqdn - name: Set host1_fqdn .. host5_fqdn

View File

@@ -6,12 +6,12 @@
tasks: tasks:
- name: Get Domain from server name - name: Get Domain from server name
set_fact: set_fact:
ipaserver_domain: "{{ ansible_fqdn.split('.')[1:] | join ('.') }}" ipaserver_domain: "{{ ansible_facts['fqdn'].split('.')[1:] | join ('.') }}"
when: ipaserver_domain is not defined when: ipaserver_domain is not defined
- name: Get Realm from server name - name: Get Realm from server name
set_fact: set_fact:
ipaserver_realm: "{{ ansible_fqdn.split('.')[1:] | join ('.') | upper }}" ipaserver_realm: "{{ ansible_facts['fqdn'].split('.')[1:] | join ('.') | upper }}"
when: ipaserver_realm is not defined when: ipaserver_realm is not defined
- name: Set host1_fqdn .. host2_fqdn - name: Set host1_fqdn .. host2_fqdn

View File

@@ -7,7 +7,7 @@
tasks: tasks:
- name: Get Domain from server name - name: Get Domain from server name
set_fact: set_fact:
ipaserver_domain: "{{ ansible_fqdn.split('.')[1:] | join ('.') }}" ipaserver_domain: "{{ ansible_facts['fqdn'].split('.')[1:] | join ('.') }}"
when: ipaserver_domain is not defined when: ipaserver_domain is not defined
- name: Ensure host-group databases, mysql-server and oracle-server are absent - name: Ensure host-group databases, mysql-server and oracle-server are absent

View File

@@ -1,7 +1,7 @@
--- ---
- name: Get Domain from server name - name: Get Domain from server name
set_fact: set_fact:
ipaserver_domain: "{{ ansible_fqdn.split('.')[1:] | join ('.') }}" ipaserver_domain: "{{ ansible_facts['fqdn'].split('.')[1:] | join ('.') }}"
when: ipaserver_domain is not defined when: ipaserver_domain is not defined
- name: Set fact for realm name - name: Set fact for realm name

View File

@@ -29,12 +29,12 @@
# setup # setup
- name: Get Domain from server name - name: Get Domain from server name
set_fact: set_fact:
ipaserver_domain: "{{ ansible_fqdn.split('.')[1:] | join ('.') }}" ipaserver_domain: "{{ ansible_facts['fqdn'].split('.')[1:] | join ('.') }}"
when: ipaserver_domain is not defined when: ipaserver_domain is not defined
- name: Get IPv4 address prefix from server node - name: Get IPv4 address prefix from server node
set_fact: set_fact:
ipv4_prefix: "{{ ansible_default_ipv4.address.split('.')[:-1] | ipv4_prefix: "{{ ansible_facts['default_ipv4'].address.split('.')[:-1] |
join('.') }}" join('.') }}"
- name: Set test host FQDN - name: Set test host FQDN

View File

@@ -1,7 +1,7 @@
--- ---
- name: Get Domain from server name - name: Get Domain from server name
set_fact: set_fact:
test_domain: "{{ ansible_fqdn.split('.')[1:] | join('.') }}" test_domain: "{{ ansible_facts['fqdn'].split('.')[1:] | join('.') }}"
- name: Set host1, host2 and svc hosts fqdn - name: Set host1, host2 and svc hosts fqdn
set_fact: set_fact:
@@ -12,4 +12,4 @@
- name: Get IPv4 address prefix from server node - name: Get IPv4 address prefix from server node
set_fact: set_fact:
ipv4_prefix: "{{ ansible_default_ipv4.address.split('.')[:-1] | join('.') }}" ipv4_prefix: "{{ ansible_facts['default_ipv4'].address.split('.')[:-1] | join('.') }}"

View File

@@ -19,13 +19,13 @@
- name: Ensure service is absent - name: Ensure service is absent
ipaservice: ipaservice:
ipaadmin_password: SomeADMINpassword ipaadmin_password: SomeADMINpassword
name: "mysvc1/{{ ansible_fqdn }}" name: "mysvc1/{{ ansible_facts['fqdn'] }}"
state: absent state: absent
- name: Ensure service is present - name: Ensure service is present
ipaservice: ipaservice:
ipaadmin_password: SomeADMINpassword ipaadmin_password: SomeADMINpassword
name: "mysvc1/{{ ansible_fqdn }}" name: "mysvc1/{{ ansible_facts['fqdn'] }}"
certificate: certificate:
- MIIC/zCCAeegAwIBAgIUMNHIbn+hhrOVew/2WbkteisV29QwDQYJKoZIhvcNAQELBQAwDzENMAsGA1UEAwwEdGVzdDAeFw0yMDAyMDQxNDQxMDhaFw0zMDAyMDExNDQxMDhaMA8xDTALBgNVBAMMBHRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC+XVVGFYpHVkcDfVnNInE1Y/pFciegdzqTjMwUWlRL4Zt3u96GhaMLRbtk+OfEkzLUAhWBOwEraELJzMLJOMvjYF3C+TiGO7dStFLikZmccuSsSIXjnzIPwBXa8KvgRVRyGLoVvGbLJvmjfMXp0nIToTx/i74KF9S++WEes9H5ErJ99CDhLKFgq0amnvsgparYXhypHaRLnikn0vQINt55YoEd1s4KrvEcD2VdZkIMPbLRu2zFvMprF3cjQQG4LT9ggfEXNIPZ1nQWAnAsu7OJEkNF+E4Mkmpcxj9aGUVt5bsq1D+Tzj3GsidSX0nSNcZ2JltXRnL/5v63g5cZyE+nAgMBAAGjUzBRMB0GA1UdDgQWBBRV0j7JYukuH/r/t9+QeNlRLXDlEDAfBgNVHSMEGDAWgBRV0j7JYukuH/r/t9+QeNlRLXDlEDAPBgNVHRMBAf8EBTADAQH/MA0GCSqGSIb3DQEBCwUAA4IBAQCgVy1+1kNwHs5y1Zp0WjMWGCJC6/zw7FDG4OW5r2GJiCXZYdJ0UonY9ZtoVLJPrp2/DAv1m5DtnDhBYqicuPgLzEkOS1KdTi20Otm/J4yxLLrZC5W4x0XOeSVPXOJuQWfwQ5pPvKkn6WxYUYkGwIt1OH2nSMngkbami3CbSmKZOCpgQIiSlQeDJ8oGjWFMLDymYSHoVOIXHwNoooyEiaio3693l6noobyGv49zyCVLVR1DC7i6RJ186ql0av+D4vPoiF5mX7+sKC2E8xEj9uKQ5GTWRh59VnRBVC/SiMJ/H78tJnBAvoBwXxSEvj8Z3Kjm/BQqZfv4IBsA5yqV7MVq - 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
force: no force: no
@@ -33,51 +33,51 @@
failed_when: not result.changed failed_when: not result.changed
- name: Obtain keytab - name: Obtain keytab
shell: ipa-getkeytab -s "{{ ansible_fqdn }}" -p "mysvc1/{{ ansible_fqdn }}" -k mysvc1.keytab shell: ipa-getkeytab -s "{{ ansible_facts['fqdn'] }}" -p "mysvc1/{{ ansible_facts['fqdn'] }}" -k mysvc1.keytab
- name: Verify keytab - name: Verify keytab
shell: ipa service-find "mysvc1/{{ ansible_fqdn }}" shell: ipa service-find "mysvc1/{{ ansible_facts['fqdn'] }}"
register: result register: result
failed_when: result.failed or result.stdout | regex_search(" Keytab. true") failed_when: result.failed or result.stdout | regex_search(" Keytab. true")
- name: Ensure service is disabled - name: Ensure service is disabled
ipaservice: ipaservice:
ipaadmin_password: SomeADMINpassword ipaadmin_password: SomeADMINpassword
name: "mysvc1/{{ ansible_fqdn }}" name: "mysvc1/{{ ansible_facts['fqdn'] }}"
state: disabled state: disabled
register: result register: result
failed_when: not result.changed failed_when: not result.changed
- name: Verify keytab - name: Verify keytab
shell: ipa service-find "mysvc1/{{ ansible_fqdn }}" shell: ipa service-find "mysvc1/{{ ansible_facts['fqdn'] }}"
register: result register: result
failed_when: result.failed or result.stdout | regex_search(" Keytab. true") failed_when: result.failed or result.stdout | regex_search(" Keytab. true")
- name: Obtain keytab - name: Obtain keytab
shell: ipa-getkeytab -s "{{ ansible_fqdn }}" -p "mysvc1/{{ ansible_fqdn }}" -k mysvc1.keytab shell: ipa-getkeytab -s "{{ ansible_facts['fqdn'] }}" -p "mysvc1/{{ ansible_facts['fqdn'] }}" -k mysvc1.keytab
- name: Verify keytab - name: Verify keytab
shell: ipa service-find "mysvc1/{{ ansible_fqdn }}" shell: ipa service-find "mysvc1/{{ ansible_facts['fqdn'] }}"
register: result register: result
failed_when: result.failed or result.stdout | regex_search(" Keytab. true") failed_when: result.failed or result.stdout | regex_search(" Keytab. true")
- name: Ensure service is disabled - name: Ensure service is disabled
ipaservice: ipaservice:
ipaadmin_password: SomeADMINpassword ipaadmin_password: SomeADMINpassword
name: "mysvc1/{{ ansible_fqdn }}" name: "mysvc1/{{ ansible_facts['fqdn'] }}"
state: disabled state: disabled
register: result register: result
failed_when: not result.changed failed_when: not result.changed
- name: Verify keytab - name: Verify keytab
shell: ipa service-find "mysvc1/{{ ansible_fqdn }}" shell: ipa service-find "mysvc1/{{ ansible_facts['fqdn'] }}"
register: result register: result
failed_when: result.failed or result.stdout | regex_search(" Keytab. true") failed_when: result.failed or result.stdout | regex_search(" Keytab. true")
- name: Ensure service is disabled, with no keytab. - name: Ensure service is disabled, with no keytab.
ipaservice: ipaservice:
ipaadmin_password: SomeADMINpassword ipaadmin_password: SomeADMINpassword
name: "mysvc1/{{ ansible_fqdn }}" name: "mysvc1/{{ ansible_facts['fqdn'] }}"
state: disabled state: disabled
register: result register: result
failed_when: result.changed failed_when: result.changed
@@ -85,7 +85,7 @@
- name: Ensure service is absent - name: Ensure service is absent
ipaservice: ipaservice:
ipaadmin_password: SomeADMINpassword ipaadmin_password: SomeADMINpassword
name: "mysvc1/{{ ansible_fqdn }}" name: "mysvc1/{{ ansible_facts['fqdn'] }}"
- name: Destroy Kerberos tickets. - name: Destroy Kerberos tickets.
shell: kdestroy -A -q -c ${KRB5CCNAME} shell: kdestroy -A -q -c ${KRB5CCNAME}

View File

@@ -43,7 +43,7 @@
ipahostgroup: ipahostgroup:
ipaadmin_password: SomeADMINpassword ipaadmin_password: SomeADMINpassword
name: cluster name: cluster
host: "{{ ansible_fqdn }}" host: "{{ ansible_facts['fqdn'] }}"
- name: Ensure some sudocmds are available - name: Ensure some sudocmds are available
ipasudocmd: ipasudocmd:
@@ -500,20 +500,20 @@
register: result register: result
failed_when: result.changed failed_when: result.changed
- name: Ensure host "{{ ansible_fqdn }}" is present in sudorule. - name: Ensure host "{{ ansible_facts['fqdn'] }}" is present in sudorule.
ipasudorule: ipasudorule:
ipaadmin_password: SomeADMINpassword ipaadmin_password: SomeADMINpassword
name: testrule1 name: testrule1
host: "{{ ansible_fqdn }}" host: "{{ ansible_facts['fqdn'] }}"
action: member action: member
register: result register: result
failed_when: not result.changed failed_when: not result.changed
- name: Ensure host "{{ ansible_fqdn }}" is present in sudorule, again. - name: Ensure host "{{ ansible_facts['fqdn'] }}" is present in sudorule, again.
ipasudorule: ipasudorule:
ipaadmin_password: SomeADMINpassword ipaadmin_password: SomeADMINpassword
name: testrule1 name: testrule1
host: "{{ ansible_fqdn }}" host: "{{ ansible_facts['fqdn'] }}"
action: member action: member
register: result register: result
failed_when: result.changed failed_when: result.changed

View File

@@ -7,7 +7,7 @@
tasks: tasks:
- name: Get Domain from the server name - name: Get Domain from the server name
set_fact: set_fact:
ipaserver_domain: "{{ ansible_fqdn.split('.')[1:] | join ('.') }}" ipaserver_domain: "{{ ansible_facts['fqdn'].split('.')[1:] | join ('.') }}"
- name: Ensure sudorules are absent - name: Ensure sudorules are absent
ipasudorule: ipasudorule:

View File

@@ -40,7 +40,7 @@
- name: Remove files from target host. - name: Remove files from target host.
file: file:
path: "{{ ansible_env.HOME }}/{{ item }}" path: "{{ ansible_facts['env'].HOME }}/{{ item }}"
state: absent state: absent
with_items: with_items:
- A_private.pem - A_private.pem

View File

@@ -19,7 +19,7 @@
- name: Copy files to target host. - name: Copy files to target host.
copy: copy:
src: "{{ playbook_dir }}/{{ item }}" src: "{{ playbook_dir }}/{{ item }}"
dest: "{{ ansible_env.HOME }}/{{ item }}" dest: "{{ ansible_facts['env'].HOME }}/{{ item }}"
with_items: with_items:
- A_private.pem - A_private.pem
- A_public.pem - A_public.pem

View File

@@ -151,7 +151,7 @@
ipaadmin_password: SomeADMINpassword ipaadmin_password: SomeADMINpassword
name: "{{vault.name}}" name: "{{vault.name}}"
action: member action: member
services: "HTTP/{{ ansible_fqdn }}" services: "HTTP/{{ ansible_facts['fqdn'] }}"
register: result register: result
failed_when: not result.changed failed_when: not result.changed
@@ -160,7 +160,7 @@
ipaadmin_password: SomeADMINpassword ipaadmin_password: SomeADMINpassword
name: "{{vault.name}}" name: "{{vault.name}}"
action: member action: member
services: "HTTP/{{ ansible_fqdn }}" services: "HTTP/{{ ansible_facts['fqdn'] }}"
register: result register: result
failed_when: result.changed failed_when: result.changed
@@ -169,7 +169,7 @@
ipaadmin_password: SomeADMINpassword ipaadmin_password: SomeADMINpassword
name: "{{vault.name}}" name: "{{vault.name}}"
action: member action: member
services: "HTTP/{{ ansible_fqdn }}" services: "HTTP/{{ ansible_facts['fqdn'] }}"
state: absent state: absent
register: result register: result
failed_when: not result.changed failed_when: not result.changed
@@ -179,7 +179,7 @@
ipaadmin_password: SomeADMINpassword ipaadmin_password: SomeADMINpassword
name: "{{vault.name}}" name: "{{vault.name}}"
action: member action: member
services: "HTTP/{{ ansible_fqdn }}" services: "HTTP/{{ ansible_facts['fqdn'] }}"
state: absent state: absent
register: result register: result
failed_when: result.changed failed_when: result.changed
@@ -264,7 +264,7 @@
ipavault: ipavault:
ipaadmin_password: SomeADMINpassword ipaadmin_password: SomeADMINpassword
name: "{{vault.name}}" name: "{{vault.name}}"
ownerservices: "HTTP/{{ ansible_fqdn }}" ownerservices: "HTTP/{{ ansible_facts['fqdn'] }}"
action: member action: member
register: result register: result
failed_when: not result.changed failed_when: not result.changed
@@ -273,7 +273,7 @@
ipavault: ipavault:
ipaadmin_password: SomeADMINpassword ipaadmin_password: SomeADMINpassword
name: "{{vault.name}}" name: "{{vault.name}}"
ownerservices: "HTTP/{{ ansible_fqdn }}" ownerservices: "HTTP/{{ ansible_facts['fqdn'] }}"
action: member action: member
register: result register: result
failed_when: result.changed failed_when: result.changed
@@ -282,7 +282,7 @@
ipavault: ipavault:
ipaadmin_password: SomeADMINpassword ipaadmin_password: SomeADMINpassword
name: "{{vault.name}}" name: "{{vault.name}}"
ownerservices: "HTTP/{{ ansible_fqdn }}" ownerservices: "HTTP/{{ ansible_facts['fqdn'] }}"
state: absent state: absent
action: member action: member
register: result register: result
@@ -292,7 +292,7 @@
ipavault: ipavault:
ipaadmin_password: SomeADMINpassword ipaadmin_password: SomeADMINpassword
name: "{{vault.name}}" name: "{{vault.name}}"
ownerservices: "HTTP/{{ ansible_fqdn }}" ownerservices: "HTTP/{{ ansible_facts['fqdn'] }}"
state: absent state: absent
action: member action: member
register: result register: result

View File

@@ -68,7 +68,7 @@
ipaadmin_password: SomeADMINpassword ipaadmin_password: SomeADMINpassword
name: asymvault name: asymvault
vault_type: asymmetric vault_type: asymmetric
public_key_file: "{{ ansible_env.HOME }}/A_public.pem" public_key_file: "{{ ansible_facts['env'].HOME }}/A_public.pem"
private_key: "{{ lookup('file', 'B_private.b64') }}" private_key: "{{ lookup('file', 'B_private.b64') }}"
register: result register: result
failed_when: result.failed or not result.changed failed_when: result.failed or not result.changed
@@ -77,7 +77,7 @@
ipavault: ipavault:
ipaadmin_password: SomeADMINpassword ipaadmin_password: SomeADMINpassword
name: asymvault name: asymvault
private_key_file: "{{ ansible_env.HOME }}/A_private.pem" private_key_file: "{{ ansible_facts['env'].HOME }}/A_private.pem"
state: retrieved state: retrieved
register: result register: result
failed_when: result.failed or result.changed or result.vault.data != 'SomeValue' failed_when: result.failed or result.changed or result.vault.data != 'SomeValue'
@@ -87,8 +87,8 @@
ipaadmin_password: SomeADMINpassword ipaadmin_password: SomeADMINpassword
name: asymvault name: asymvault
vault_type: asymmetric vault_type: asymmetric
public_key_file: "{{ ansible_env.HOME }}/B_public.pem" public_key_file: "{{ ansible_facts['env'].HOME }}/B_public.pem"
private_key_file: "{{ ansible_env.HOME }}/A_private.pem" private_key_file: "{{ ansible_facts['env'].HOME }}/A_private.pem"
register: result register: result
failed_when: result.failed or not result.changed failed_when: result.failed or not result.changed
@@ -115,8 +115,8 @@
ipavault: ipavault:
ipaadmin_password: SomeADMINpassword ipaadmin_password: SomeADMINpassword
name: asymvault name: asymvault
public_key_file: "{{ ansible_env.HOME }}/B_public.pem" public_key_file: "{{ ansible_facts['env'].HOME }}/B_public.pem"
private_key_file: "{{ ansible_env.HOME }}/A_private.pem" private_key_file: "{{ ansible_facts['env'].HOME }}/A_private.pem"
register: result register: result
failed_when: result.failed or not result.changed failed_when: result.failed or not result.changed
@@ -154,11 +154,11 @@
register: result register: result
failed_when: result.vault.data != 'Hello World.' or result.changed failed_when: result.vault.data != 'Hello World.' or result.changed
- name: Retrieve data from asymmetric vault into file {{ ansible_env.HOME }}/data.txt. - name: Retrieve data from asymmetric vault into file {{ ansible_facts['env'].HOME }}/data.txt.
ipavault: ipavault:
ipaadmin_password: SomeADMINpassword ipaadmin_password: SomeADMINpassword
name: asymvault name: asymvault
out: "{{ ansible_env.HOME }}/data.txt" out: "{{ ansible_facts['env'].HOME }}/data.txt"
private_key: "{{ lookup('file', 'B_private.b64') }}" private_key: "{{ lookup('file', 'B_private.b64') }}"
state: retrieved state: retrieved
register: result register: result
@@ -166,7 +166,7 @@
- name: Verify retrieved data. - name: Verify retrieved data.
slurp: slurp:
src: "{{ ansible_env.HOME }}/data.txt" src: "{{ ansible_facts['env'].HOME }}/data.txt"
register: slurpfile register: slurpfile
failed_when: slurpfile['content'] | b64decode != 'Hello World.' failed_when: slurpfile['content'] | b64decode != 'Hello World.'
@@ -192,7 +192,7 @@
ipaadmin_password: SomeADMINpassword ipaadmin_password: SomeADMINpassword
name: asymvault name: asymvault
vault_type: asymmetric vault_type: asymmetric
in: "{{ ansible_env.HOME }}/in.txt" in: "{{ ansible_facts['env'].HOME }}/in.txt"
register: result register: result
failed_when: not result.changed failed_when: not result.changed
@@ -242,7 +242,7 @@
ipavault: ipavault:
ipaadmin_password: SomeADMINpassword ipaadmin_password: SomeADMINpassword
name: asymvault name: asymvault
public_key_file: "{{ ansible_env.HOME }}/B_public.pem" public_key_file: "{{ ansible_facts['env'].HOME }}/B_public.pem"
vault_type: asymmetric vault_type: asymmetric
register: result register: result
failed_when: not result.changed failed_when: not result.changed
@@ -251,7 +251,7 @@
ipavault: ipavault:
ipaadmin_password: SomeADMINpassword ipaadmin_password: SomeADMINpassword
name: asymvault name: asymvault
public_key_file: "{{ ansible_env.HOME }}/B_public.pem" public_key_file: "{{ ansible_facts['env'].HOME }}/B_public.pem"
vault_type: asymmetric vault_type: asymmetric
register: result register: result
failed_when: result.changed failed_when: result.changed
@@ -277,7 +277,7 @@
ipavault: ipavault:
ipaadmin_password: SomeADMINpassword ipaadmin_password: SomeADMINpassword
name: asymvault name: asymvault
private_key_file: "{{ ansible_env.HOME }}/B_private.pem" private_key_file: "{{ ansible_facts['env'].HOME }}/B_private.pem"
state: retrieved state: retrieved
register: result register: result
failed_when: result.vault.data != 'Hello World.' or result.changed failed_when: result.vault.data != 'Hello World.' or result.changed

View File

@@ -57,18 +57,18 @@
register: result register: result
failed_when: result.vault.data != 'Hello World.' or result.changed failed_when: result.vault.data != 'Hello World.' or result.changed
- name: Retrieve data from standard vault into file {{ ansible_env.HOME }}/data.txt. - name: Retrieve data from standard vault into file {{ ansible_facts['env'].HOME }}/data.txt.
ipavault: ipavault:
ipaadmin_password: SomeADMINpassword ipaadmin_password: SomeADMINpassword
name: stdvault name: stdvault
out: "{{ ansible_env.HOME }}/data.txt" out: "{{ ansible_facts['env'].HOME }}/data.txt"
state: retrieved state: retrieved
register: result register: result
failed_when: result.changed or result.failed or (result.vault.data | default(false)) failed_when: result.changed or result.failed or (result.vault.data | default(false))
- name: Verify retrieved data. - name: Verify retrieved data.
slurp: slurp:
src: "{{ ansible_env.HOME }}/data.txt" src: "{{ ansible_facts['env'].HOME }}/data.txt"
register: slurpfile register: slurpfile
failed_when: slurpfile['content'] | b64decode != 'Hello World.' failed_when: slurpfile['content'] | b64decode != 'Hello World.'
@@ -93,7 +93,7 @@
ipaadmin_password: SomeADMINpassword ipaadmin_password: SomeADMINpassword
name: stdvault name: stdvault
vault_type: standard vault_type: standard
in: "{{ ansible_env.HOME }}/in.txt" in: "{{ ansible_facts['env'].HOME }}/in.txt"
register: result register: result
failed_when: not result.changed failed_when: not result.changed

View File

@@ -63,19 +63,19 @@
register: result register: result
failed_when: result.changed or result.failed or result.vault.data != 'Hello World.' failed_when: result.changed or result.failed or result.vault.data != 'Hello World.'
- name: Retrieve data from symmetric vault into file {{ ansible_env.HOME }}/data.txt. - name: Retrieve data from symmetric vault into file {{ ansible_facts['env'].HOME }}/data.txt.
ipavault: ipavault:
ipaadmin_password: SomeADMINpassword ipaadmin_password: SomeADMINpassword
name: symvault name: symvault
password: SomeVAULTpassword password: SomeVAULTpassword
out: "{{ ansible_env.HOME }}/data.txt" out: "{{ ansible_facts['env'].HOME }}/data.txt"
state: retrieved state: retrieved
register: result register: result
failed_when: result.changed or result.failed or (result.vault.data | default(false)) failed_when: result.changed or result.failed or (result.vault.data | default(false))
- name: Verify retrieved data. - name: Verify retrieved data.
slurp: slurp:
src: "{{ ansible_env.HOME }}/data.txt" src: "{{ ansible_facts['env'].HOME }}/data.txt"
register: slurpfile register: slurpfile
failed_when: slurpfile['content'] | b64decode != 'Hello World.' failed_when: slurpfile['content'] | b64decode != 'Hello World.'
@@ -101,7 +101,7 @@
ipavault: ipavault:
ipaadmin_password: SomeADMINpassword ipaadmin_password: SomeADMINpassword
name: symvault name: symvault
in: "{{ ansible_env.HOME }}/in.txt" in: "{{ ansible_facts['env'].HOME }}/in.txt"
password: SomeVAULTpassword password: SomeVAULTpassword
register: result register: result
failed_when: result.failed or not result.changed failed_when: result.failed or not result.changed
@@ -154,7 +154,7 @@
ipaadmin_password: SomeADMINpassword ipaadmin_password: SomeADMINpassword
name: symvault name: symvault
username: user01 username: user01
password_file: "{{ ansible_env.HOME }}/password.txt" password_file: "{{ ansible_facts['env'].HOME }}/password.txt"
vault_type: symmetric vault_type: symmetric
register: result register: result
failed_when: result.failed or not result.changed failed_when: result.failed or not result.changed
@@ -164,7 +164,7 @@
ipaadmin_password: SomeADMINpassword ipaadmin_password: SomeADMINpassword
name: symvault name: symvault
username: user01 username: user01
password_file: "{{ ansible_env.HOME }}/password.txt" password_file: "{{ ansible_facts['env'].HOME }}/password.txt"
vault_type: symmetric vault_type: symmetric
register: result register: result
failed_when: result.failed or result.changed failed_when: result.failed or result.changed
@@ -191,7 +191,7 @@
ipavault: ipavault:
ipaadmin_password: SomeADMINpassword ipaadmin_password: SomeADMINpassword
name: symvault name: symvault
password_file: "{{ ansible_env.HOME }}/password.txt" password_file: "{{ ansible_facts['env'].HOME }}/password.txt"
state: retrieved state: retrieved
register: result register: result
failed_when: result.failed or result.changed or result.vault.data != 'Hello World.' failed_when: result.failed or result.changed or result.vault.data != 'Hello World.'
@@ -328,7 +328,7 @@
ipaadmin_password: SomeADMINpassword ipaadmin_password: SomeADMINpassword
name: symvault name: symvault
password: APasswordToChange password: APasswordToChange
new_password_file: "{{ ansible_env.HOME }}/password.txt" new_password_file: "{{ ansible_facts['env'].HOME }}/password.txt"
vault_type: symmetric vault_type: symmetric
register: result register: result
failed_when: not result.changed or result.failed failed_when: not result.changed or result.failed