Explorar el Código

Delete password_config.yml

Signed-off-by: abhishek-sa1 <abhishek.sa3@dell.com>
abhishek-sa1 hace 3 años
padre
commit
ceffb4eac6
Se han modificado 1 ficheros con 0 adiciones y 261 borrados
  1. 0 261
      control_plane/roles/control_plane_common/tasks/password_config.yml

+ 0 - 261
control_plane/roles/control_plane_common/tasks/password_config.yml

@@ -1,261 +0,0 @@
-# Copyright 2022 Dell Inc. or its subsidiaries. All Rights Reserved.
-#
-#  Licensed under the Apache License, Version 2.0 (the "License");
-#  you may not use this file except in compliance with the License.
-#  You may obtain a copy of the License at
-#
-#      http://www.apache.org/licenses/LICENSE-2.0
-#
-#  Unless required by applicable law or agreed to in writing, software
-#  distributed under the License is distributed on an "AS IS" BASIS,
-#  WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
-#  See the License for the specific language governing permissions and
-#  limitations under the License.
----
-
-- name: Check login_vars file is encrypted
-  command: cat {{ login_vars_filename }}
-  changed_when: false
-  register: config_content
-  no_log: true
-
-- name: Decrpyt login_vars.yml
-  command: >-
-    ansible-vault decrypt {{ login_vars_filename }}
-    --vault-password-file {{ vault_filename }}
-  changed_when: false
-  when: "'$ANSIBLE_VAULT;' in config_content.stdout"
-
-- name: Include variable file login_vars.yml
-  include_vars: "{{ login_vars_filename }}"
-  no_log: true
-
-- name: Validate input parameters are not empty
-  fail:
-    msg: "{{ login_input_config_failure_msg }}"
-  register: input_config_check
-  when:
-    - provision_password | length < 1 or
-      cobbler_password | length < 1 or      
-      idrac_username | length < 1 or
-      idrac_password | length < 1
-
-- name: Validate security parameters when enable_security_support is set to true
-  fail:
-    msg: "{{ login_input_config_failure_msg }} for ipa server installation"
-  when:
-    - ( directory_manager_password | length < 1 or
-      ipa_admin_password | length < 1 ) and
-      enable_security_support
-
-- name: Assert provision credentials
-  block:
-    - name: Assert provision_password
-      assert:
-        that:
-          - provision_password | length > min_length | int - 1
-          - provision_password | length < max_length | int + 1
-          - '"-" not in provision_password '
-          - '"\\" not in provision_password '
-          - '"\"" not in provision_password '
-          - " \"'\" not in provision_password "
-      no_log: true
-  rescue:
-    - name: Provision password validation check
-      fail:
-        msg: "{{ fail_msg_provision_password }}"
-
-- name: Assert cobbler credentials
-  block:
-    - name: Assert cobbler_password
-      assert:
-        that:
-          - cobbler_password | length > min_length | int - 1
-          - cobbler_password | length < max_length | int + 1
-          - '"-" not in cobbler_password '
-          - '"\\" not in cobbler_password '
-          - '"\"" not in cobbler_password '
-          - " \"'\" not in cobbler_password "
-      no_log: true
-  rescue:
-    - name: Cobbler password validation check
-      fail:
-        msg: "{{ fail_msg_cobbler_password }}"
-
-- name: Assert idrac credentials
-  block:
-    - name: Assert idrac_username and idrac_password
-      assert:
-        that:
-          - idrac_username | length >= min_username_length
-          - idrac_username | length < max_length
-          - '"-" not in idrac_username '
-          - '"\\" not in idrac_username '
-          - '"\"" not in idrac_username '
-          - " \"'\" not in idrac_username "
-          - idrac_password | length > min_username_length | int - 1
-          - idrac_password | length < max_length | int + 1
-          - '"-" not in idrac_password '
-          - '"\\" not in idrac_password '
-          - '"\"" not in idrac_password '
-          - " \"'\" not in idrac_password "
-      no_log: true
-  rescue:
-    - name: idrac credentials validation check
-      fail:
-        msg: "{{ fail_msg_idrac_credentials }}"
-
-- name: Assert grafana credentials
-  block:
-    - name: Assert grafana_username and grafana_username
-      assert:
-        that:
-          - grafana_username | length >= min_length_grafana
-          - grafana_username | length <= max_length
-          - '"-" not in grafana_username '
-          - '"\\" not in grafana_username '
-          - '"\"" not in grafana_username '
-          - " \"'\" not in grafana_username "
-          - grafana_password | length >= min_length_grafana
-          - grafana_password | length <= max_length
-          - not grafana_password == 'admin'
-          - '"-" not in grafana_password '
-          - '"\\" not in grafana_password '
-          - '"\"" not in grafana_password '
-          - " \"'\" not in grafana_password "
-      no_log: true
-  rescue:
-    - name: grafana credentials validation check
-      fail:
-        msg: "{{ fail_msg_grafana_credentials }}"
-
-- name: Assert username and password for ethernet switches
-  block:
-    - name: Verify ethernet_switch_username and ethernet_switch_password are not empty
-      assert:
-        that:
-          - ethernet_switch_username | length >= min_username_length
-          - ethernet_switch_username | length < max_length
-          - '"-" not in ethernet_switch_username '
-          - '"\\" not in ethernet_switch_username '
-          - '"\"" not in ethernet_switch_username '
-          - " \"'\" not in ethernet_switch_username "
-          - ethernet_switch_password | length > min_username_length | int - 1
-          - ethernet_switch_password | length < max_length | int + 1
-          - '"-" not in ethernet_switch_password '
-          - '"\\" not in ethernet_switch_password '
-          - '"\"" not in ethernet_switch_password '
-          - " \"'\" not in ethernet_switch_password "
-      no_log: true
-  rescue:
-    - name: ethernet switch credentials validation check
-      fail:
-        msg: "{{ fail_msg_ethernet_credentials }}"
-  when: ethernet_switch_support
-
-- name: Assert username and password for IB switches
-  block:
-    - name: Assert ib_username and ib_password
-      assert:
-        that:
-          - ib_username | length >= min_username_length
-          - ib_username | length < max_length
-          - '"-" not in ib_username '
-          - '"\\" not in ib_username '
-          - '"\"" not in ib_username '
-          - " \"'\" not in ib_username "
-          - ib_password | length > min_username_length | int - 1
-          - ib_password | length < max_length | int + 1
-          - '"-" not in ib_password '
-          - '"\\" not in ib_password '
-          - '"\"" not in ib_password '
-          - " \"'\" not in ib_password "
-      no_log: true
-  rescue:
-    - name: IB switch credentials validation check
-      fail:
-        msg: "{{ fail_msg_ib_credentials }}"
-  when: ib_switch_support
-
-- name: Assert username and password for powervault me4
-  block:
-    - name: Assert powervault_me4_username and powervault_me4_password
-      assert:
-        that:
-          - powervault_me4_username | length >= min_username_length
-          - powervault_me4_username | length < max_length
-          - '"-" not in powervault_me4_username '
-          - '"\\" not in powervault_me4_username '
-          - '"\"" not in powervault_me4_username '
-          - " \"'\" not in powervault_me4_username "
-          - powervault_me4_password | length > min_length | int - 1
-          - powervault_me4_password | length < max_length | int + 1
-          - '"-" not in powervault_me4_password '
-          - '"," not in powervault_me4_password '
-          - '"." not in powervault_me4_password '
-          - '"<" not in powervault_me4_password '
-          - '"\\" not in powervault_me4_password '
-          - '"\"" not in powervault_me4_password '
-          - " \"'\" not in powervault_me4_password "
-          - powervault_me4_password | regex_search('^(?=.*[a-z]).+$')
-          - powervault_me4_password | regex_search('^(?=.*[A-Z]).+$')
-          - powervault_me4_password | regex_search('^(?=.*\\d).+$')
-          - powervault_me4_password | regex_search('^(?=.*[!#$%&()*+/:;=>?@^_`{} ~]).+$')
-      no_log: true
-  rescue:
-    - name: Powervault me4 credentials validation check
-      fail:
-        msg: "{{ fail_msg_me4_credentials }}"
-  when: powervault_support
-
-- name: Assert directory_manager_password
-  assert:
-    that:
-      - directory_manager_password | length > min_length | int - 1
-      - directory_manager_password | length < max_length | int + 1
-      - '"-" not in directory_manager_password '
-      - '"\\" not in directory_manager_password '
-      - '"\"" not in directory_manager_password '
-      - " \"'\" not in directory_manager_password "
-    success_msg: "{{ success_msg_dir_manager_password }}"
-    fail_msg: "{{ fail_msg_dir_manager_password }}"
-  when: enable_security_support
-
-- name: Assert ipa_admin_password
-  assert:
-    that:
-      - ipa_admin_password | length > min_length | int - 1
-      - ipa_admin_password | length < max_length | int + 1
-      - '"-" not in ipa_admin_password '
-      - '"\\" not in ipa_admin_password '
-      - '"\"" not in ipa_admin_password '
-      - " \"'\" not in ipa_admin_password "
-    success_msg: "{{ success_msg_ipa_admin_pwd }}"
-    fail_msg: "{{ fail_msg_ipa_admin_pwd }}"
-  when: enable_security_support
-
-- name: Create ansible vault key
-  set_fact:
-    vault_key: "{{ lookup('password', '/dev/null chars=ascii_letters') }}"
-  when: "'$ANSIBLE_VAULT;' not in config_content.stdout"
-
-- name: Save vault key
-  copy:
-    dest: "{{ vault_filename }}"
-    content: |
-      {{ vault_key }}
-    owner: root
-    force: yes
-    mode: "{{ vault_file_perm }}"
-  when: "'$ANSIBLE_VAULT;' not in config_content.stdout"
-
-- name: Encrypt input config file
-  command: >-
-    ansible-vault encrypt {{ login_vars_filename }}
-    --vault-password-file {{ vault_filename }}
-  changed_when: false
-
-- name: Update login_vars.yml permission
-  file:
-    path: "{{ login_vars_filename }}"
-    mode: "{{ file_perm }}"