Requested the feature - https://github.com/ansible/ansible/issues/68214
On Friday, March 13, 2020 at 3:31:12 PM UTC, Bala Mutyam wrote:
>
> I have changed the ident to 2A and it's working fine.
>
> command: psql -c "update users set crypted_password = '{{ admin_password |
>
I have changed the ident to 2A and it's working fine.
command: psql -c "update users set crypted_password = '{{ admin_password |
password_hash('bcrypt', salt=None, rounds=10) }}' where login = 'admin'"
sonarqube
Thanks
On Friday, March 13, 2020 at 11:58:44 AM UTC, Dick Visser wrote:
>
>
OS - Debian 10
PostgreSQL - 11.7
On Friday, March 13, 2020 at 12:01:47 PM UTC, Stefan Hornburg (Racke) wrote:
>
> On 3/13/20 12:38 PM, Bala Mutyam wrote:
> > I've deleted the salt option altogether but tit didn't work.
> >
> > Yeah, it's the app which doesn't like 2b variant.
> >
> > Thanks
Ok,thanks.
On Friday, March 13, 2020 at 11:58:44 AM UTC, Dick Visser wrote:
>
> Ansible's password_hash doesn't support setting the 'ident' option,
> but if you want to test anyway, try editing passlib itself and change:
>
> default_ident = IDENT_2A
>
> into:
>
> default_ident = IDENT_2B
>
On 3/13/20 12:38 PM, Bala Mutyam wrote:
> I've deleted the salt option altogether but tit didn't work.
>
> Yeah, it's the app which doesn't like 2b variant.
>
> Thanks
Hello Bala,
according to Wikipedia $2b$ was introduced int February 2014. On which
operating system / version do you
run
Ansible's password_hash doesn't support setting the 'ident' option,
but if you want to test anyway, try editing passlib itself and change:
default_ident = IDENT_2A
into:
default_ident = IDENT_2B
This should be in handlers/bcrypt.py
If that does work for you, then you might want to submit a
I've deleted the salt option altogether but tit didn't work.
Yeah, it's the app which doesn't like 2b variant.
Thanks
On Thursday, March 12, 2020 at 6:12:49 PM UTC, Dick Visser wrote:
>
> The hardcoded admin hash uses the 2a version of bcrypt.
> It may be that your application cannot handle
The hardcoded admin hash uses the 2a version of bcrypt.
It may be that your application cannot handle the newer 2b variant of
bcrypt - which ansible creates.
But this sounds unlikely.
Can you try to create a password with ansible using a salt (so leaving
the "salt=None" out) ?
Dick
On Thu, 12
Hi,
I've tried the rounds but no luck,still not able to login to UI.
About the salt option, it's Sonarqube application which doesn't use salt.
This is the command used on Sonarqube doc -
https://docs.sonarqube.org/latest/instance-administration/security/
update users set crypted_password =
Hi
Your hardcoded hash (the one "UI login only works") appears to use 10
rounds, while the hash generated by password_hash uses 12 (the
default).
Based on the docs at
https://passlib.readthedocs.io/en/stable/lib/passlib.hash.bcrypt.html#interface
you should be able to configure that as an
Hi,
I manged to run the task successfully but i'm not able to login with the
password to Sonarqube UI.
ansible 2.7.7
config file = /etc/ansible/ansible.cfg
configured module search path = ['/root/.ansible/plugins/modules',
'/usr/share/ansible/plugins/modules']
ansible python module
On 3/10/20 1:20 PM, Bala Mutyam wrote:
> Hi Everyone,
>
> I'm trying to create a task for below command but it's not working, can you
> help me how to make it work please?
>
> Command:
>
> |update users set crypted_password =
> '$2a$12$uCkkXmhW5ThVK8mpBvnXOOJRLd64LJeHTeCkSuB3lfaR2N0AYBaSi',
What is the error and what is sending the error? (i.e. is the error from
"psql" or from Ansible itself?)
Can you run the playbook with "-vvv" and paste in the errors the "Reset
Admin pw" step produces.
On Tuesday, March 10, 2020 at 11:12:17 AM UTC-5, Bala Mutyam wrote:
>
> Hi,
>
> Thanks for
Hi,
Thanks for the reply. By hard coding the hash working fine.
I'm trying to workout something like this but this is giving me an error.
- name: Reset Admin pw
become: yes
become_user: postgres
command: psql -c "update users set crypted_password = '{{ admin_password |
You manual command has more arguments than the one in your task.
Try making that consistent.
If that doesn't work, try hardcoding the hash in your task to see if
that works at all.
On Tue, 10 Mar 2020 at 13:21, Bala Mutyam wrote:
>
> Hi Everyone,
>
> I'm trying to create a task for below
Hi Everyone,
I'm trying to create a task for below command but it's not working, can you
help me how to make it work please?
Command:
update users set crypted_password =
'$2a$12$uCkkXmhW5ThVK8mpBvnXOOJRLd64LJeHTeCkSuB3lfaR2N0AYBaSi', salt=null,
hash_method='BCRYPT' where login = 'admin'
-
16 matches
Mail list logo