document problem and work around when needing different passwords#4
Open
tpo wants to merge 1 commit intodsedivec:masterfrom
Open
document problem and work around when needing different passwords#4tpo wants to merge 1 commit intodsedivec:masterfrom
tpo wants to merge 1 commit intodsedivec:masterfrom
Conversation
I propose to document the problem and the work around when using different sets of vaults, each with set with its distinct password. Such a situation may arise when maintaining multiple ansible playbooks for different customers each with a different password. The proposed workaround is of course a disgusting hack. One improvement to this ugly hack could maybe be to replace `my_path = os.path.realpath(sys.argv[0])` [in line 72](https://github.com/dsedivec/ansible-plugins/blob/826d0eaccc24932217efd3f6d75db4619b6ede4d/vault_from_gpg_agent.py#L72) with `my_path = os.path.abspath(sys.argv[0])` which would not do symlink resolution and thus allow something like this: ``` ls -l ansible-tools lrwxrwxrwx 1 user group 6 Nov 12 09:00 vault_from_gpg_agent_customer_1.py -> vault_from_gpg_agent.py lrwxrwxrwx 1 user group 6 Nov 12 09:00 vault_from_gpg_agent_customer_2.py -> vault_from_gpg_agent.py lrwxrwxrwx 1 user group 6 Nov 12 09:00 vault_from_gpg_agent_customer_3.py -> vault_from_gpg_agent.py -rwxr-xr-x 1 user group 78 Nov 12 09:00 vault_from_gpg_agent.py ``` But this also makes we wince, so it's maybe just a *little* improvement. The real problem IMHO is that [ansible-vault calls the external password script](https://github.com/ansible/ansible/blob/aee7a3ed6809c93a81307466503eec630a343d9e/lib/ansible/parsing/vault/__init__.py#L454) without any parameters whatsoever, and so the password script is completely blind (I mean it doesn't even get to know which `vault-id`' is being used!) and thus can't do any intelligent decision. So maybe the right (and heroic) thing to do would be to move the discussion upstream and have the problem fixed there for good and for real by having `ansible-vault` pass all the necessary context to the external password script?
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
I propose to document the problem and the work around when using different sets of vaults, each with set with its distinct password. Such a situation may arise when maintaining multiple ansible playbooks for different customers each with a different password.
The proposed workaround is of course a disgusting hack. One improvement to this ugly hack could maybe be to replace
my_path = os.path.realpath(sys.argv[0])in line 72 withmy_path = os.path.abspath(sys.argv[0])which would not do symlink resolution and thus allow something like this:But this also makes we wince, so it's maybe just a little improvement.
The real problem IMHO is that ansible-vault calls the external password script without any parameters whatsoever, and so the password script is completely blind (I mean it doesn't even get to know which
vault-id' is being used!) and thus can't do any intelligent decision.So maybe the right (and heroic) thing to do would be to move the discussion upstream and have the problem fixed there for good and for real by having
ansible-vaultpass all the necessary context to the external password script?