Forráskód Böngészése

Update install_389ds.yml

Signed-off-by: abhishek-sa1 <abhishek.sa3@dell.com>
abhishek-sa1 3 éve
szülő
commit
7e25d6b0bd
1 módosított fájl, 4 hozzáadás és 1 törlés
  1. 4 1
      roles/login_node/tasks/install_389ds.yml

+ 4 - 1
roles/login_node/tasks/install_389ds.yml

@@ -35,6 +35,7 @@
     kerberos_admin_password: "{{ hostvars['127.0.0.1']['kerberos_admin_password'] }}"
     kerberos_admin_password: "{{ hostvars['127.0.0.1']['kerberos_admin_password'] }}"
     domain_name: "{{ hostvars['127.0.0.1']['domain_name'] }}"
     domain_name: "{{ hostvars['127.0.0.1']['domain_name'] }}"
     realm_name: "{{ hostvars['127.0.0.1']['realm_name'] }}"
     realm_name: "{{ hostvars['127.0.0.1']['realm_name'] }}"
+  no_log: true
 
 
 - name: Check ldap instance is running or not
 - name: Check ldap instance is running or not
   command: dsctl {{ ldap_instance }} status
   command: dsctl {{ ldap_instance }} status
@@ -78,7 +79,8 @@
       lineinfile:
       lineinfile:
         path: "{{ ldap1_config_path }}"
         path: "{{ ldap1_config_path }}"
         regexp: "^root_password = password"
         regexp: "^root_password = password"
-        line: "root_password = {{ directory_manager_password }}"  
+        line: "root_password = {{ directory_manager_password }}"
+      no_log: true
 
 
     - name: Check ldap instance is running or not
     - name: Check ldap instance is running or not
       command: dsctl {{ ldap_instance }} status
       command: dsctl {{ ldap_instance }} status
@@ -216,4 +218,5 @@
 - name: Configure password policy in 389-ds
 - name: Configure password policy in 389-ds
   command: dsconf -w {{ directory_manager_password }} -D "cn=Directory Manager" ldap://{{ server_hostname_fqdn }} pwpolicy set --pwdlockoutduration {{ hostvars['127.0.0.1']['lockout_duration'] }} --pwdmaxfailures {{ hostvars['127.0.0.1']['max_failures'] }} --pwdresetfailcount {{ hostvars['127.0.0.1']['failure_reset_interval'] }}
   command: dsconf -w {{ directory_manager_password }} -D "cn=Directory Manager" ldap://{{ server_hostname_fqdn }} pwpolicy set --pwdlockoutduration {{ hostvars['127.0.0.1']['lockout_duration'] }} --pwdmaxfailures {{ hostvars['127.0.0.1']['max_failures'] }} --pwdresetfailcount {{ hostvars['127.0.0.1']['failure_reset_interval'] }}
   changed_when: true
   changed_when: true
+  no_log: true
   when: hostvars['127.0.0.1']['enable_secure_login_node']
   when: hostvars['127.0.0.1']['enable_secure_login_node']