|
results
|
Result #1
| Field |
Value |
|
ansible_loop_var
|
|
|
changed
|
|
|
failed
|
|
|
invocation
|
{
"module_args": {
"_diff_peek": null,
"_original_basename": null,
"access_time": null,
"access_time_format": "%Y%m%d%H%M.%S",
"attributes": null,
"follow": true,
"force": false,
"group": null,
"mode": null,
"modification_time": null,
"modification_time_format": "%Y%m%d%H%M.%S",
"owner": null,
"path": "/etc/haproxy/map.conf.d/base_regex/00-security_txt.map",
"recurse": false,
"selevel": null,
"serole": null,
"setype": null,
"seuser": null,
"src": null,
"state": "absent",
"unsafe_writes": false
}
}
|
|
item
|
[
{
"haproxy_backend_arguments": [
"errorfile 503 /etc/haproxy/security.txt"
],
"haproxy_backend_nodes": [],
"haproxy_backend_only": true,
"haproxy_balance_type": "http",
"haproxy_service_enabled": false,
"haproxy_service_name": "security_txt"
},
{
"entries": [
".*/security.txt security_txt-back"
],
"name": "base_regex"
}
]
|
|
path
|
/etc/haproxy/map.conf.d/base_regex/00-security_txt.map
|
|
state
|
|
Result #2
| Field |
Value |
|
ansible_loop_var
|
|
|
changed
|
|
|
false_condition
|
(item.0.haproxy_service_enabled | default('True')) | bool is falsy or (item.0.state is defined and item.0.state == 'absent') or (item.1.state | default('present') == 'absent')
|
|
item
|
[
{
"haproxy_balance_type": "http",
"haproxy_frontend_acls": {},
"haproxy_frontend_only": true,
"haproxy_frontend_raw": [
"http-response set-header Strict-Transport-Security \"max-age=31536000; includeSubDomains;\"",
"http-response set-header X-Content-Type-Options \"nosniff\"",
"http-response set-header Referrer-Policy \"same-origin\"",
"http-response set-header Permissions-Policy \"accelerometer=(), ambient-light-sensor=(), autoplay=(), battery=(), camera=(), cross-origin-isolated=(), display-capture=(), document-domain=(), encrypted-media=(), execution-while-not-rendered=(), execution-while-out-of-viewport=(), fullscreen=(self), geolocation=(), gyroscope=(), magnetometer=(), microphone=(), midi=(), navigation-override=(self), payment=(), picture-in-picture=(), publickey-credentials-get=(), screen-wake-lock=(), sync-xhr=(), usb=(), web-share=(), xr-spatial-tracking=(), clipboard-read=(self), clipboard-write=(self), gamepad=(), speaker-selection=()\"",
"http-response set-header Content-Security-Policy \" default-src 'self'; frame-ancestors 'self' ; form-action 'self'; upgrade-insecure-requests; style-src 'self' 'unsafe-inline'; script-src 'self' 'unsafe-inline' 'unsafe-eval'; child-src 'self' 23.253.164.124:6082 23.253.164.124:6080 23.253.164.124:6083; frame-src 'self' 23.253.164.124:6082 23.253.164.124:6080 23.253.164.124:6083; connect-src 'self' 23.253.164.124:* wss://23.253.164.124:6083; img-src 'self' data:; worker-src blob:; \"\n",
""
],
"haproxy_maps": [
"use_backend %[path,map_reg(/etc/haproxy/base_regex.map)]"
],
"haproxy_port": "443",
"haproxy_redirect_http_port": 80,
"haproxy_redirect_scheme": "https if !{ ssl_fc }",
"haproxy_service_enabled": true,
"haproxy_service_name": "base",
"haproxy_ssl": true,
"haproxy_ssl_all_vips": true
},
{
"entries": [
"#Regular expression map file - this comment is defined in the base frontend config"
],
"name": "base_regex"
}
]
|
|
skip_reason
|
Conditional result was False
|
|
skipped
|
|
|