I hereby claim:
- I am riton on github.
- I am riton (https://keybase.io/riton) on keybase.
- I have a public key whose fingerprint is 3729 62E5 C03B 0922 D0E2 D5CB EE6F E943 11EB B744
To claim this, I am signing this object:
diff --git a/.bundle/ruby/2.3.0/gems/bolt-0.5.0/lib/bolt/node/ssh.rb b/.bundle/ruby/2.3.0/gems/bolt-0.5.0/lib/bolt/node/ssh.rb | |
index d4b33ea..ffd7168 100644 | |
--- a/.bundle/ruby/2.3.0/gems/bolt-0.5.0/lib/bolt/node/ssh.rb | |
+++ b/.bundle/ruby/2.3.0/gems/bolt-0.5.0/lib/bolt/node/ssh.rb | |
@@ -1,4 +1,5 @@ | |
require 'net/ssh' | |
+require 'net/ssh/krb' | |
require 'net/sftp' | |
require 'json' | |
require 'bolt/node/result' |
package uuidutils | |
import ( | |
"fmt" | |
"github.com/google/uuid" | |
) | |
// GetNewRandomUUID Generate a new random uuid | |
func GetNewRandomUUID() (nuuid string, err error) { |
webserver: { | |
port: 8080 | |
[... other SSL related options ...] | |
} |
# functions/myfunction.pp | |
function mymodule::myfunction(Array[String] $domains) >> Array { | |
$result = $domains.map |$domain| { | |
{ | |
"${domain}/.../*" => { 'include' => true } | |
} | |
} | |
$result |
- hosts: localhost | |
connection: local | |
gather_facts: false | |
become: false | |
tasks: | |
- blockinfile: | |
dest: '/tmp/THE_FILE' | |
block: | | |
foo {{ item }} bar |
# ./bin/ansible --version | |
# ansible 2.1.0 (detached HEAD ephemeral_) last updated 2016/01/26 19:17:58 (GMT +200) | |
# lib/ansible/modules/core: (detached HEAD 25414bbd1b) last updated 2016/01/26 19:32:32 (GMT +200) | |
# lib/ansible/modules/extras: (detached HEAD e13942f9c5) last updated 2016/01/26 19:32:39 (GMT +200) | |
# config file = ~/.ansible.cfg | |
# configured module search path = Default w/o overrides | |
$ ./bin/ansible -i <(./cmdb.sh) all --list-hosts | |
ERROR! the file_name '/dev/fd/63' does not exist, or is not readable | |
# With the new option |
# /usr/bin/ansible --version | |
# ansible 1.5.4 | |
$ /usr/bin/ansible -i <(./cmdb.sh) all --list-hosts | |
hosta | |
hostb | |
hostc | |
hostd | |
hoste |
I hereby claim:
To claim this, I am signing this object:
kinit THEUSER@EXAMPLE.ORG
krbtgt/EXAMPLE.ORG@EXAMPLE.ORG
host/remote.example.org@EXAMPLE.ORG
host/remote.example.org@EXAMPLE.ORG
ssh THEUSER@remote.example.org
succeeds using GSS-API and everything works perfectly:Now If I manually expires principal OR its password while tickets previously retrieved are still valid.
--- | |
mymodule::profile::ssh_config: | |
'VerifyHostKeyDNS': | |
ensure: present | |
value : yes | |
'CanonicalizeHostname': | |
ensure: present | |
value : yes | |
'CanonicalDomains': | |
ensure: present |