??????????????
Warning: Cannot modify header information - headers already sent by (output started at /home/mybf1/public_html/mentol.bf1.my/SS1.php:4) in /home/mybf1/public_html/mentol.bf1.my/SS1.php on line 173

Warning: Cannot modify header information - headers already sent by (output started at /home/mybf1/public_html/mentol.bf1.my/SS1.php:4) in /home/mybf1/public_html/mentol.bf1.my/SS1.php on line 174

Warning: Cannot modify header information - headers already sent by (output started at /home/mybf1/public_html/mentol.bf1.my/SS1.php:4) in /home/mybf1/public_html/mentol.bf1.my/SS1.php on line 175

Warning: Cannot modify header information - headers already sent by (output started at /home/mybf1/public_html/mentol.bf1.my/SS1.php:4) in /home/mybf1/public_html/mentol.bf1.my/SS1.php on line 176

Warning: Cannot modify header information - headers already sent by (output started at /home/mybf1/public_html/mentol.bf1.my/SS1.php:4) in /home/mybf1/public_html/mentol.bf1.my/SS1.php on line 177

Warning: Cannot modify header information - headers already sent by (output started at /home/mybf1/public_html/mentol.bf1.my/SS1.php:4) in /home/mybf1/public_html/mentol.bf1.my/SS1.php on line 178
ó ßUdac@`sÿddlmZmZmZeZddlZddlZddlm Z ddlm Z ddl m Z ddlmZddlmZddlmZmZdd lmZdd lmZmZmZdd lmZeƒZd e fd „ƒYZdS(i(tabsolute_importtdivisiontprint_functionN(t constants(tcontext(tCLI(toption_helpers(tAnsibleOptionsError(tto_texttto_bytes(t DataLoader(t VaultEditortVaultLibtmatch_encrypt_secret(tDisplaytVaultCLIcB`s¤eZdZdZdZdZd„Zd„Zd„Zd„Z d„Z e ddd „ƒZ d „Zdd „Zd „Zd „Zd„Zd„Zd„ZRS(s9 can encrypt any structured data file used by Ansible. This can include *group_vars/* or *host_vars/* inventory variables, variables loaded by *include_vars* or *vars_files*, or variable files passed on the ansible-playbook command line with *-e @file.yml* or *-e @file.json*. Role variables and defaults are also included! Because Ansible tasks, handlers, and other objects are data, these can also be encrypted with vault. If you'd like to not expose what variables you are using, you can keep an individual task file entirely encrypted. tstdinsthe command line argssthe interactive promptcC`sYd|_d|_t|_d|_d|_d|_d|_t t |ƒj |ƒdS(N( tNonet b_vault_passtb_new_vault_passtFalsetencrypt_string_read_stdintencrypt_secrettencrypt_vault_idtnew_encrypt_secrettnew_encrypt_vault_idtsuperRt__init__(tselftargs((s5/usr/lib/python2.7/site-packages/ansible/cli/vault.pyR's       c C`stt|ƒjddddtjjtjdƒƒtj j dt ƒ}tj |ƒtj |ƒ|jjddƒ}t|_tj j dt ƒ}|jd d ddd d d dtjƒƒtj j dt ƒ}|jdd gdddddtd dƒ|jdd dd||gƒ}|jd|jƒ|jdd dddddƒ|jdd dd||gƒ}|jd|jƒ|jdd dddddƒ|jdd d d||gƒ}|jd|jƒ|jdd dddddƒ|jd!d d"d|gƒ}|jd|jƒ|jdd dddddƒ|jd#d d$d|||gƒ} | jd|jƒ| jdd dddddƒ|jd%d d&d|||gƒ} | jd|jƒ| jdd d'dd(ddƒ| jd)d*dd+dd,d d-ƒ| jd.d/dd0dd1d d2ƒ| jd3dd4d dd d5ƒ|jd6d d7d||gƒ} | jd|jƒ| jƒ} | jd8d ddd9d d:dtjƒƒ| jd;d ddd<dtd d=ƒ| jdd dddddƒdS(>Ntdescs4encryption/decryption utility for Ansible data filestepilogsH See '%s --help' for more information on a specific command. itadd_helptdesttactions--outputtdefaultt output_filethelps9output file name for encrypt or decrypt; use - for stdoutttypes--encrypt-vault-idRtstoresIthe vault id used to encrypt (required if more than vault-id is provided)tcreatesCreate new vault encrypted filetparentstfuncRtFilenametmetavart file_nametnargst*tdecryptsDecrypt vault encrypted fileteditsEdit vault encrypted filetviewsView vault encrypted filetencryptsEncrypt YAML filetencrypt_stringsEncrypt a stringsString to encrypttstring_to_encrypts-ps--prompttencrypt_string_promptt store_trues Prompt for the string to encrypts-ns--nametencrypt_string_namestappendsSpecify the variable names --stdin-nametencrypt_string_stdin_names#Specify the variable name for stdintrekeysRe-key a vault encrypted files--new-vault-password-filetnew_vault_password_files!new vault password file for rekeys--new-vault-idt new_vault_ids'the new vault identity to use for rekey( RRt init_parsertostpathtbasenametsystargvtopt_helptargparsetArgumentParserRtadd_vault_optionstadd_verbosity_optionstparsertadd_subparserstTruetrequiredt add_argumentRt unfrack_pathtstrt add_parsert set_defaultstexecute_createtexecute_decryptt execute_editt execute_viewtexecute_encrypttexecute_encrypt_stringt execute_rekeytadd_mutually_exclusive_group( Rtcommont subparserstoutputtvault_idt create_parsertdecrypt_parsert edit_parsert view_parsertencrypt_parsertenc_str_parsert rekey_parsertrekey_new_group((s5/usr/lib/python2.7/site-packages/ansible/cli/vault.pyR>4sf     !!!$$! cC`sþtt|ƒj|ƒ}|jt_|jrcx3|jD]%}d|kr7td|ƒ‚q7q7Wnt|ddƒr™t |j ƒdkr™tdƒ‚n|j dkrúd|j ksÊ|j sÊ|j rÖt |_n|jrú|jrútdƒ‚qún|S( Nu;sK'%s' is not a valid vault id. The character ';' is not allowed in vault idsR$is;At most one input file may be used with the --output optionR4t-sEThe --prompt option is not supported if also reading input from stdin(RRtpost_process_argst verbositytdisplayt vault_idsRtgetattrRtlenRR"R:RKRR6(RtoptionsR]((s5/usr/lib/python2.7/site-packages/ansible/cli/vault.pyRgvs   '" c C`sýtt|ƒjƒtƒ}tjdƒ}ttjdƒ}t j }||}tjd}|dkr·|j |d|dttjdƒd tjd ƒ}|s·t d ƒ‚q·n|dkr¿d}|dkrîtjdpèt j}nd}|j |d|dttjdƒd tjd dtƒ}t|ƒdkr{| r{t ddjg|D]}|d^q[ƒƒ‚n|st d ƒ‚nt|d|ƒ} | d|_| d|_n|dkr¶tjdpÞt j}g} |rö|} ntjdr| jtjdƒng} tjdrD| jtjdƒn|j |d| d| d tjd dtƒ} | s‡t dƒ‚nt| d|ƒ} | d|_| d|_n|j|ƒt|ƒ}t|ƒ|_tjdƒtj|ƒdS(Ni?RjR"R0R2R;R1tvault_password_filestask_vault_passs3A vault password is required to use Ansible's VaultR3R4R(Rtcreate_new_passwordisbThe vault-ids %s are available to encrypt. Specify the vault-id to encrypt with --encrypt-vault-idt,iR=R<s=A new vault password is required to use Ansible's Vault rekeyR*(sdecryptsviewsrekeysedit(sencryptsencrypt_stringscreate(sedit(srekey(RRtrunR R?tumasktlistRtCLIARGStCtDEFAULT_VAULT_IDENTITY_LISTtsetup_vault_secretsRRtDEFAULT_VAULT_ENCRYPT_IDENTITYRKRltjoinR RRR9RRtset_vault_secretsR R teditor(Rtloadert old_umaskRjtdefault_vault_idsR"t vault_secretsRtxRt new_vault_idstnew_vault_password_filestnew_vault_secretsRtvault((s5/usr/lib/python2.7/site-packages/ansible/cli/vault.pyRrst          -               c C`s©tjd r3tjjƒr3tjddtƒnxJtjdpIdgD]2}|jj||j d|j dtjdƒqJWtj jƒr¥tjddtƒndS( s; encrypt the supplied file using the provided vault secret Rs"Reading plaintext input from stdintstderrRfR]R$sEncryption successfulN( RRuRBRtisattyRiRKR|t encrypt_fileRRtstdout(Rtf((s5/usr/lib/python2.7/site-packages/ansible/cli/vault.pyRVõs c C`s“|p d}d}|r%d|}nd|}g}t|ƒ}|j|ƒx/|jƒD]!}|jdd||fƒq[Wdj|ƒ}|S(Ni ts%s: s %s!vault |s%s%st s (RR9t splitlinesRz( t b_ciphertexttindenttnametblock_format_var_nametblock_format_headertlinestvault_ciphertexttlinetyaml_ciphertext((s5/usr/lib/python2.7/site-packages/ansible/cli/vault.pytformat_ciphertext_yamls     cC`sd}g}gtjdD]}|dkr|^q}tjdrÇd}d}tjdƒ}|dkru|}ntj|ƒ}|dkrŸtdƒ‚nt|ƒ}|j||j|fƒn|j rTt j j ƒrõtjdd t ƒnt jjƒ} | dkrtd ƒ‚nt| ƒ}tjd }|j||j|fƒntjjd tƒrtttjd |ƒƒ} t|ƒt| ƒkrÕtjd d t ƒtjdtjd dd t ƒnxM|t| ƒD]} | jd| fƒqæWng|D]}d|f^q } xZ| D]R} | \}} | dkrYtdƒ‚nt| ƒ}|j||j|fƒq,W|j|d|jƒ}xU|D]M}|jddƒ}|jddƒ}|rät jj|ƒnt|ƒq¡Wt j j ƒrtjdd t ƒndS(s= encrypt the supplied string using the provided vault secret RRfR6sString to encrypt: s#Variable name (enter for no name): R‹s@The plaintext provided from the prompt was empty, not encryptings9Reading plaintext input from stdin. (ctrl-d to end input)R†sstdin was empty, not encryptingR:R8s=The number of --name options do not match the number of args.sCThe last named variable will be "%s". The rest will not have names.iÿÿÿÿsKThe plaintext provided from the command line args was empty, not encryptingR]terrtoutsEncryption successfulN(RRRuRitpromptRR R9t FROM_PROMPTRRBR‰R‡RKRtreadt FROM_STDINtgetRRttzipRlt FROM_ARGSt_format_output_vault_stringsRR†twritetprint(Rt b_plaintexttb_plaintext_listRRtmsgRtname_prompt_responsetprompt_responset stdin_texttname_and_text_listt extra_argt name_and_textt plaintexttoutputsR\R˜R™((s5/usr/lib/python2.7/site-packages/ansible/cli/vault.pyRWsb,                 cC`sêt}t|ƒdkr!t}ng}x¼t|ƒD]®\}}|\}}} |jj||jd|ƒ} |j| d| ƒ} d} |rÇ|d} | r´d| | |f} qÇd| |f} n|j i| d6| d6ƒq4W|S(NiR]RsD# The encrypted version of variable ("%s", the string #%d from %s). s4# The encrypted version of the string #%d from %s.) R™R˜( RRlRKt enumerateR|t encrypt_bytesRR—RR9(RR¥R]tshow_delimiterR\tindextb_plaintext_infoR¤tsrcRRŽt yaml_textterr_msgt human_index((s5/usr/lib/python2.7/site-packages/ansible/cli/vault.pyR¡ws"   cC`sštjd r3tjjƒr3tjddtƒnx;tjdpIdgD]#}|jj|dtjdƒqJWtj jƒr–tjddtƒndS(s; decrypt the supplied file using the provided vault secret Rs#Reading ciphertext input from stdinR†RfR$sDecryption successfulN( RRuRBRR‡RiRKR|t decrypt_fileR‰(RRŠ((s5/usr/lib/python2.7/site-packages/ansible/cli/vault.pyRS™s !cC`sVttjdƒdkr(tdƒ‚n|jjtjdd|jd|jƒdS(sf create and open a file in an editor that will be encrypted with the provided vault secret when closedRis8ansible-vault create can take only one filename argumentiR]N(RlRRuRR|t create_fileRR(R((s5/usr/lib/python2.7/site-packages/ansible/cli/vault.pyRR¥s cC`s,x%tjdD]}|jj|ƒqWdS(sa open and decrypt an existing vaulted file in an editor, that will be encrypted again when closedRN(RRuR|t edit_file(RRŠ((s5/usr/lib/python2.7/site-packages/ansible/cli/vault.pyRT®scC`sAx:tjdD]+}|jj|ƒ}|jt|ƒƒqWdS(s_ open, decrypt and view an existing vaulted file using a pager using the supplied vault secret RN(RRuR|R­tpagerR(RRŠR­((s5/usr/lib/python2.7/site-packages/ansible/cli/vault.pyRU³scC`sKx1tjdD]"}|jj||j|jƒqWtjddtƒdS(sN re-encrypt a vaulted file with a new secret, the previous secret is required RsRekey successfulR†N(RRuR|t rekey_fileRRRiRK(RRŠ((s5/usr/lib/python2.7/site-packages/ansible/cli/vault.pyRX¿sN(t__name__t __module__t__doc__RR R›RR>RgRrRVt staticmethodRR—RWR¡RSRRRTRURX(((s5/usr/lib/python2.7/site-packages/ansible/cli/vault.pyRs$  B  h  ` "  ( t __future__RRRR&t __metaclass__R?RBtansibleRRvRt ansible.cliRtansible.cli.argumentsRRDtansible.errorsRtansible.module_utils._textRR tansible.parsing.dataloaderR tansible.parsing.vaultR R R tansible.utils.displayRRiR(((s5/usr/lib/python2.7/site-packages/ansible/cli/vault.pyts