-
Notifications
You must be signed in to change notification settings - Fork 63
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
New environment variable scheme causes issues in some usage #85
Comments
Hey @wenottingham , thanks for submitting! This has been brought up in the past and the current open issue for it is #49 (I should rename the title probably to clarify). I'll close this issue so the conversation can be moved over to there, but I'll briefly explain as well, that first off I don't have any experience with AWX/tower, so I don't fully understand the system or how it works. What I will say that it seems wrong to me, to fully restrict setting those environment variables that begin with Again I don't use AWX, so I don't really get why it's a security risk that you can set env vars before invoking Ansible, any more than it's a risk that someone runs In any case, given that the Unfortunately, for the reasons outlined in #10, retaining the original variables isn't something we're looking to do across the board (some are being retained, with lower precedence, due to their use in Vault CLI), and sticking to a standard that aligns closely with the rest of the Ansible-using world makes more sense in my opinion than aligning with AWX's indiscriminate blocking of all That being said I don't want to unnecessarily break usage for AWX users, so as outlined in #49 , the plan is to add Ansible vars as another way of setting the values, and from testing by affected users, that seems to be compatible with the AWX credential option. In that way, instead of setting an environment variable like I expect that work to be completed before version 2.0.0 of the collection (when some of the deprecated env vars will be removed), that way there is a bridge for AWX users. |
SUMMARY
Hi - I was pointed here by ansible/awx#10275.
In AWX, we let users create custom credentials to pass secrets/info to playbooks for use by modules. However, we do not allow any custom credentials that pass variables that start with ANSIBLE_ - allowing a user delegated access to a playbook to pass arbitrary ANSIBLE_* parameters is a security risk, as they can change ansible behavior in unexpected ways (think ANSIBLE_SSH_EXECUTABLE, ANSIBLE_COLLLECTION_PATHS, and other things).
This means that at least in AWX, we can't allow users to create a custom credential that uses the new variables in use by v2 of this collection.
Is it possible to keep the legacy variables?
ISSUE TYPE
COMPONENT NAME
community.hashi_vault
ANSIBLE VERSION
CONFIGURATION
OS / ENVIRONMENT
under AWX, or Ansible Automation Platform
cc @infra-monkey
The text was updated successfully, but these errors were encountered: