This website requires JavaScript.
Explore
Help
Sign in
ansible
/
community.general
Watch
1
Star
0
Fork
You've already forked community.general
0
mirror of
https://github.com/ansible-collections/community.general.git
synced
2024-09-14 20:13:21 +02:00
Code
Releases
Activity
51ec35378d
community.general
/
test
/
integration
/
test_vault.yml
5 lines
93 B
YAML
Raw
Normal View
History
Unescape
Escape
Added integration tests for encrypted vars
2014-05-21 21:06:47 +02:00
-
hosts
:
testhost
gather_facts
:
False
Implement vault encrypted yaml variables. (#16274) Make !vault-encrypted create a AnsibleVaultUnicode yaml object that can be used as a regular string object. This allows a playbook to include a encrypted vault blob for the value of a yaml variable. A 'secret_password' variable can have it's value encrypted instead of having to vault encrypt an entire vars file. Add __ENCRYPTED__ to the vault yaml types so template.Template can treat it similar to __UNSAFE__ flags. vault.VaultLib api changes: - Split VaultLib.encrypt to encrypt and encrypt_bytestring - VaultLib.encrypt() previously accepted the plaintext data as either a byte string or a unicode string. Doing the right thing based on the input type would fail on py3 if given a arg of type 'bytes'. To simplify the API, vaultlib.encrypt() now assumes input plaintext is a py2 unicode or py3 str. It will encode to utf-8 then call the new encrypt_bytestring(). The new methods are less ambiguous. - moved VaultLib.is_encrypted logic to vault module scope and split to is_encrypted() and is_encrypted_file(). Add a test/unit/mock/yaml_helper.py It has some helpers for testing parsing/yaml Integration tests added as roles test_vault and test_vault_embedded
2016-08-24 02:03:11 +02:00
roles
:
- {
role: test_vault, tags
:
test_vault}
Copy permalink