File tree Expand file tree Collapse file tree 1 file changed +2
-2
lines changed
Expand file tree Collapse file tree 1 file changed +2
-2
lines changed Original file line number Diff line number Diff line change 2727 echo -n "${{ secrets.ANSIBLE_VAULT_PASSWORD }}" > $TMPFILE
2828 export ANSIBLE_VAULT_PASSWORD_FILE=$TMPFILE
2929
30- echo About to run playbook add-vpn-user.yml
30+ echo About to run playbook add-vpn-user.yml and load all PSONO secret IDs via group_vars/all WIREGUARD_VPN_PSONO_SECRET_IDS
3131
3232 # Bend over backwards to keep storing secrets in ansible vault rather than a specific CI/CD runner.
3333 # note this uses dynamic inventory. Since you can't set/get group_vars from a dynamic inventory,
3737 # The dynamic vpn hosts inventory is using the dynamic inventory file inventory-vpn-servers-hcloud.yml
3838
3939 export ANSIBLE_HOST_KEY_CHECKING=False
40- ansible-playbook --extra-vars "PSONO_SECRET_ID=${{ inputs.PSONO_SECRET_ID }} _vault_hetzner_cloud_token=$(ANSIBLE_LOAD_CALLBACK_PLUGINS=1 ANSIBLE_STDOUT_CALLBACK=ansible.posix.json ansible localhost -i inventory.ini -m debug -a "msg={{ hostvars[inventory_hostname].hetzner_hcloud_token }}" | jq '.plays[0]["tasks"][0]["hosts"]["localhost"]["msg"]')" -i inventory-vpn-servers-hcloud.yml playbooks/add-vpn-user.yml
40+ ansible-playbook --extra-vars "_vault_hetzner_cloud_token=$(ANSIBLE_LOAD_CALLBACK_PLUGINS=1 ANSIBLE_STDOUT_CALLBACK=ansible.posix.json ansible localhost -i inventory.ini -m debug -a "msg={{ hostvars[inventory_hostname].hetzner_hcloud_token }}" | jq '.plays[0]["tasks"][0]["hosts"]["localhost"]["msg"]')" -i inventory-vpn-servers-hcloud.yml playbooks/add-vpn-user.yml
4141 rm $TMPFILE
4242
4343 # Enable tmate debugging of manually-triggered workflows if the input option was provided
You can’t perform that action at this time.
0 commit comments