diff options
author | Matt Martz <matt@sivel.net> | 2019-04-23 13:54:39 -0500 |
---|---|---|
committer | GitHub <noreply@github.com> | 2019-04-23 13:54:39 -0500 |
commit | db6cc603528c5d1c15acf89e092f99f5d24ca848 (patch) | |
tree | 71ba2d9d769f9882f210722d21fd644a5b2f0052 /docs/docsite/rst/user_guide | |
parent | 7ee6c136fddbab8a2f854f8c9561fadd5bc4c1c8 (diff) | |
download | ansible-db6cc603528c5d1c15acf89e092f99f5d24ca848.tar.gz |
Migrate command line parsing to argparse (#50610)
* Start of migration to argparse
* various fixes and improvements
* Linting fixes
* Test fixes
* Fix vault_password_files
* Add PrependAction for argparse
* A bunch of additional tweak/fixes
* Fix ansible-config tests
* Fix man page generation
* linting fix
* More adhoc pattern fixes
* Add changelog fragment
* Add support for argcomplete
* Enable argcomplete global completion
* Rename PrependAction to PrependListAction to better describe what it does
* Add documentation for installing and configuring argcomplete
* Address rebase issues
* Fix display encoding for vault
* Fix line length
* Address rebase issues
* Handle rebase issues
* Use mutually exclusive group instead of handling manually
* Fix rebase issues
* Address rebase issue
* Update version added for argcomplete support
* -e must be given a value
* ci_complete
Diffstat (limited to 'docs/docsite/rst/user_guide')
-rw-r--r-- | docs/docsite/rst/user_guide/playbooks_vault.rst | 2 | ||||
-rw-r--r-- | docs/docsite/rst/user_guide/vault.rst | 2 |
2 files changed, 2 insertions, 2 deletions
diff --git a/docs/docsite/rst/user_guide/playbooks_vault.rst b/docs/docsite/rst/user_guide/playbooks_vault.rst index 3aae832780..b6905df04c 100644 --- a/docs/docsite/rst/user_guide/playbooks_vault.rst +++ b/docs/docsite/rst/user_guide/playbooks_vault.rst @@ -7,7 +7,7 @@ Using Vault in playbooks The "Vault" is a feature of Ansible that allows you to keep sensitive data such as passwords or keys in encrypted files, rather than as plaintext in playbooks or roles. These vault files can then be distributed or placed in source control. -To enable this feature, a command line tool, :ref:`ansible-vault` is used to edit files, and a command line flag :option:`--ask-vault-pass <ansible-vault --ask-vault-pass>`, :option:`--vault-password-file <ansible-vault --vault-password-file>` or :option:`--vault-id <ansible-playbook --vault-id>` is used. You can also modify your ``ansible.cfg`` file to specify the location of a password file or configure Ansible to always prompt for the password. These options require no command line flag usage. +To enable this feature, a command line tool, :ref:`ansible-vault` is used to edit files, and a command line flag :option:`--ask-vault-pass <ansible-vault-create --ask-vault-pass>`, :option:`--vault-password-file <ansible-vault-create --vault-password-file>` or :option:`--vault-id <ansible-playbook --vault-id>` is used. You can also modify your ``ansible.cfg`` file to specify the location of a password file or configure Ansible to always prompt for the password. These options require no command line flag usage. For best practices advice, refer to :ref:`best_practices_for_variables_and_vaults`. diff --git a/docs/docsite/rst/user_guide/vault.rst b/docs/docsite/rst/user_guide/vault.rst index 5a977fe8cf..e467fcd85c 100644 --- a/docs/docsite/rst/user_guide/vault.rst +++ b/docs/docsite/rst/user_guide/vault.rst @@ -344,7 +344,7 @@ passwords will be tried in the order they are specified. In the above case, the 'dev' password will be tried first, then the 'prod' password for cases where Ansible doesn't know which vault ID is used to encrypt something. -To add a vault ID label to the encrypted data use the :option:`--vault-id <ansible-vault --vault-id>` option +To add a vault ID label to the encrypted data use the :option:`--vault-id <ansible-vault-create --vault-id>` option with a label when encrypting the data. The :ref:`DEFAULT_VAULT_ID_MATCH` config option can be set so that Ansible will only use the password with |