-
-
Notifications
You must be signed in to change notification settings - Fork 864
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Safer to prompt for root password? #300
Comments
You can set any variable and prompt its value input from playbook installing a role. Add pre-task for setting parameters you need for example. |
do you have example handy? @tgadiev :) |
one way is to take it from the environment, in a playbook:
example of a shellscript to ask for it (and generate a random password with pwgen):
|
This issue has been marked 'stale' due to lack of recent activity. If there is no further activity, the issue will be closed in another 30 days. Thank you for your contribution! Please read this blog post to see the reasons why I mark issues as stale. |
This issue has been closed due to inactivity. If you feel this is in error, please reopen the issue or file a new issue with the relevant details. |
I don't believe that this is necessary as others have mentioned several ways of handling this in Ansible. Another one: If you're committing your playbooks to Git, you can leave out the passwords there and specify them on the command line. But I think I better strategy is the one I mentioned in #223, generate a random one and stick it in the appropriate file. |
Is it possible to have it prompt for a root password?
I thought maybe the
mysql_root_password_update
is what does this, but I'm misunderstanding it.Thinking about perhaps a deployment server where we might not want the root database password lingering in a .yml file or even an environment config...
The text was updated successfully, but these errors were encountered: