|
results
|
Result #1
| Field |
Value |
|
ansible_loop_var
|
|
|
changed
|
|
|
false_condition
|
(item.0.haproxy_service_enabled | default(True)) | bool
|
|
item
|
[
{
"haproxy_backend_arguments": [
"errorfile 503 /etc/haproxy/security.txt"
],
"haproxy_backend_nodes": [],
"haproxy_backend_only": true,
"haproxy_balance_type": "http",
"haproxy_service_enabled": false,
"haproxy_service_name": "security_txt"
},
{
"entries": [
".*/security.txt security_txt-back"
],
"name": "base_regex"
}
]
|
|
skip_reason
|
Conditional result was False
|
|
skipped
|
|
Result #2
| Field |
Value |
|
ansible_loop_var
|
|
|
changed
|
|
|
checksum
|
188e43b9e73078ed9e43d643308b82c6fd9afda4
|
|
dest
|
/etc/haproxy/map.conf.d/base_regex/00-base.map
|
|
diff
|
|
|
failed
|
|
|
gid
|
|
|
group
|
|
|
invocation
|
{
"module_args": {
"_original_basename": "map.j2",
"attributes": null,
"backup": false,
"checksum": "188e43b9e73078ed9e43d643308b82c6fd9afda4",
"content": null,
"dest": "/etc/haproxy/map.conf.d/base_regex/00-base.map",
"directory_mode": null,
"follow": false,
"force": true,
"group": "haproxy",
"local_follow": null,
"mode": "0640",
"owner": "root",
"remote_src": null,
"selevel": null,
"serole": null,
"setype": null,
"seuser": null,
"src": "/root/.ansible/tmp/ansible-tmp-1765707348.8628352-118886-92919939197889/.source.map",
"unsafe_writes": false,
"validate": null
}
}
|
|
item
|
[
{
"haproxy_balance_type": "http",
"haproxy_frontend_acls": {},
"haproxy_frontend_only": true,
"haproxy_frontend_raw": [
"http-response set-header Strict-Transport-Security \"max-age=31536000; includeSubDomains;\"",
"http-response set-header X-Content-Type-Options \"nosniff\"",
"http-response set-header Referrer-Policy \"same-origin\"",
"http-response set-header Permissions-Policy \"accelerometer=(), ambient-light-sensor=(), autoplay=(), battery=(), camera=(), cross-origin-isolated=(), display-capture=(), document-domain=(), encrypted-media=(), execution-while-not-rendered=(), execution-while-out-of-viewport=(), fullscreen=(self), geolocation=(), gyroscope=(), magnetometer=(), microphone=(), midi=(), navigation-override=(self), payment=(), picture-in-picture=(), publickey-credentials-get=(), screen-wake-lock=(), sync-xhr=(), usb=(), web-share=(), xr-spatial-tracking=(), clipboard-read=(self), clipboard-write=(self), gamepad=(), speaker-selection=()\"",
"http-response set-header Content-Security-Policy \" default-src 'self'; frame-ancestors 'self' ; form-action 'self'; upgrade-insecure-requests; style-src 'self' 'unsafe-inline'; script-src 'self' 'unsafe-inline' 'unsafe-eval'; child-src 'self' 10.0.19.177:6082 10.0.19.177:6080 10.0.19.177:6083; frame-src 'self' 10.0.19.177:6082 10.0.19.177:6080 10.0.19.177:6083; connect-src 'self' 10.0.19.177:* wss://10.0.19.177:6083; img-src 'self' data:; worker-src blob:; \"\n",
""
],
"haproxy_maps": [
"use_backend %[path,map_reg(/etc/haproxy/base_regex.map)]"
],
"haproxy_port": "443",
"haproxy_redirect_http_port": 80,
"haproxy_redirect_scheme": "https if !{ ssl_fc }",
"haproxy_service_enabled": true,
"haproxy_service_name": "base",
"haproxy_ssl": true,
"haproxy_ssl_all_vips": true
},
{
"entries": [
"#Regular expression map file - this comment is defined in the base frontend config"
],
"name": "base_regex"
}
]
|
|
md5sum
|
9ec7df81b50ece2de12534fb73fea4a4
|
|
mode
|
|
|
owner
|
|
|
size
|
|
|
src
|
/root/.ansible/tmp/ansible-tmp-1765707348.8628352-118886-92919939197889/.source.map
|
|
state
|
|
|
uid
|
|
|