Utilisation de /etc/crans/secrets

Plutot que de mettre en clair le mot de passe dans le depot,
on recupere les secrets depuis /etc/crans/secrets lors de la
compilation des templates.

darcs-hash:20071207023459-af139-26e0e8a1f3006255a52b2e80b8aca28f9f994e37.gz
This commit is contained in:
Jeremie Dimino 2007-12-07 03:34:59 +01:00
parent 4ab280aae3
commit 2fe87a6040
2 changed files with 8 additions and 1 deletions

View file

@ -12,6 +12,7 @@
{% end %}\
{% include /var/lib/bcfg2/etc/genshi/ldap.txt %}\
{% include /var/lib/bcfg2/etc/genshi/secrets.txt %}\
# Connexion LDAP
server_host = $ldap_host
@ -19,7 +20,7 @@ search_base = ou=data,dc=crans,dc=org
version = 3
bind = yes
bind_dn = cn=postfix,dc=crans,dc=org
bind_pw = $ldap_password_readonly
bind_pw = ${secrets.get("ldap_postfix")}
# Requete faite a la base, %s est remplace
# par l'alias recherche

6
etc/genshi/secrets.txt Normal file
View file

@ -0,0 +1,6 @@
{# Recuperation des mots de passe #}
{% python
import os
os.sys.append('/usr/script/gestion')
import secrets
%}