|
results
|
Result #1
| Field |
Value |
|
ansible_loop_var
|
|
|
changed
|
|
|
false_condition
|
(service.haproxy_service_enabled | default('True')) | bool
|
|
service
|
{
"haproxy_backend_arguments": [
"errorfile 503 /etc/haproxy/security.txt"
],
"haproxy_backend_nodes": [],
"haproxy_backend_only": true,
"haproxy_balance_type": "http",
"haproxy_map_entries": [
{
"entries": [
".*/security.txt security_txt-back"
],
"name": "base_regex"
}
],
"haproxy_service_enabled": false,
"haproxy_service_name": "security_txt"
}
|
|
skip_reason
|
Conditional result was False
|
|
skipped
|
|
Result #2
| Field |
Value |
|
ansible_loop_var
|
|
|
changed
|
|
|
checksum
|
0a3a071094d11a7e343ea0dafb30fe87220e0039
|
|
dest
|
|
|
diff
|
|
|
failed
|
|
|
gid
|
|
|
group
|
|
|
invocation
|
{
"module_args": {
"_original_basename": "service.j2",
"attributes": null,
"backup": false,
"checksum": "0a3a071094d11a7e343ea0dafb30fe87220e0039",
"content": null,
"dest": "/etc/haproxy/conf.d/base",
"directory_mode": null,
"follow": false,
"force": true,
"group": "haproxy",
"local_follow": null,
"mode": "0640",
"owner": "root",
"remote_src": null,
"selevel": null,
"serole": null,
"setype": null,
"seuser": null,
"src": "/root/.ansible/tmp/ansible-tmp-1765707347.344346-118836-90281385600841/.source",
"unsafe_writes": false,
"validate": null
}
}
|
|
md5sum
|
6b02aec2189e69a2a4eb1f77ae0dd680
|
|
mode
|
|
|
owner
|
|
|
service
|
{
"haproxy_balance_type": "http",
"haproxy_frontend_acls": {},
"haproxy_frontend_only": true,
"haproxy_frontend_raw": [
"http-response set-header Strict-Transport-Security \"max-age=31536000; includeSubDomains;\"",
"http-response set-header X-Content-Type-Options \"nosniff\"",
"http-response set-header Referrer-Policy \"same-origin\"",
"http-response set-header Permissions-Policy \"accelerometer=(), ambient-light-sensor=(), autoplay=(), battery=(), camera=(), cross-origin-isolated=(), display-capture=(), document-domain=(), encrypted-media=(), execution-while-not-rendered=(), execution-while-out-of-viewport=(), fullscreen=(self), geolocation=(), gyroscope=(), magnetometer=(), microphone=(), midi=(), navigation-override=(self), payment=(), picture-in-picture=(), publickey-credentials-get=(), screen-wake-lock=(), sync-xhr=(), usb=(), web-share=(), xr-spatial-tracking=(), clipboard-read=(self), clipboard-write=(self), gamepad=(), speaker-selection=()\"",
"http-response set-header Content-Security-Policy \" default-src 'self'; frame-ancestors 'self' ; form-action 'self'; upgrade-insecure-requests; style-src 'self' 'unsafe-inline'; script-src 'self' 'unsafe-inline' 'unsafe-eval'; child-src 'self' 10.0.19.177:6082 10.0.19.177:6080 10.0.19.177:6083; frame-src 'self' 10.0.19.177:6082 10.0.19.177:6080 10.0.19.177:6083; connect-src 'self' 10.0.19.177:* wss://10.0.19.177:6083; img-src 'self' data:; worker-src blob:; \"\n",
""
],
"haproxy_map_entries": [
{
"entries": [
"#Regular expression map file - this comment is defined in the base frontend config"
],
"name": "base_regex"
}
],
"haproxy_maps": [
"use_backend %[path,map_reg(/etc/haproxy/base_regex.map)]"
],
"haproxy_port": "443",
"haproxy_redirect_http_port": 80,
"haproxy_redirect_scheme": "https if !{ ssl_fc }",
"haproxy_service_enabled": true,
"haproxy_service_name": "base",
"haproxy_ssl": true,
"haproxy_ssl_all_vips": true
}
|
|
size
|
|
|
src
|
/root/.ansible/tmp/ansible-tmp-1765707347.344346-118836-90281385600841/.source
|
|
state
|
|
|
uid
|
|
Result #3
| Field |
Value |
|
ansible_loop_var
|
|
|
changed
|
|
|
false_condition
|
(service.haproxy_service_enabled | default('True')) | bool
|
|
service
|
{
"backend_fall": 5,
"backend_rise": 1,
"haproxy_backend_nodes": [
"aio1"
],
"haproxy_balance_type": "http",
"haproxy_bind": [
"127.0.0.1"
],
"haproxy_port": 8888,
"haproxy_service_enabled": false,
"haproxy_service_name": "letsencrypt",
"interval": 4000
}
|
|
skip_reason
|
Conditional result was False
|
|
skipped
|
|
Result #4
| Field |
Value |
|
ansible_loop_var
|
|
|
changed
|
|
|
false_condition
|
(service.haproxy_service_enabled | default('True')) | bool
|
|
service
|
{
"haproxy_accept_both_protocols": false,
"haproxy_backend_ca": true,
"haproxy_backend_httpcheck_options": [
"send meth HEAD",
"expect rstatus 200|405"
],
"haproxy_backend_nodes": [],
"haproxy_backend_ssl": false,
"haproxy_balance_alg": "source",
"haproxy_balance_type": "http",
"haproxy_port": "8080",
"haproxy_service_enabled": false,
"haproxy_service_name": "ceph-rgw",
"haproxy_ssl": true,
"haproxy_ssl_all_vips": false
}
|
|
skip_reason
|
Conditional result was False
|
|
skipped
|
|
|