@@ -122,8 +122,8 @@ resource "terraform_data" "execute_playbooks" {
122122 # Decrypt ocp config if it already exists
123123 provisioner "remote-exec" {
124124 inline = [
125- " if [ -f \" ~ /.powervs/config.json\" ]; then echo ${ var . ansible_vault_password } > password_file; fi" ,
126- " if [ -f \" ~/ .powervs/config.json\" ]; then ansible-vault decrypt ~ /.powervs/config.json --vault-password-file password_file; fi"
125+ " if [ -f \" /root /.powervs/config.json\" ]; then echo ${ var . ansible_vault_password } > password_file; fi" ,
126+ " if [ -f \" /root/ .powervs/config.json\" ]; then ansible-vault decrypt /root /.powervs/config.json --vault-password-file password_file; fi"
127127 ]
128128 }
129129
@@ -145,8 +145,12 @@ resource "terraform_data" "execute_playbooks" {
145145 # Encrypt ocp config if it already exists
146146 provisioner "remote-exec" {
147147 inline = [
148- " if [ -f \" ~/.powervs/config.json\" ]; then echo ${ var . ansible_vault_password } > password_file; fi" ,
149- " if [ -f \" ~/.powervs/config.json\" ]; then ansible-vault encrypt ~/.powervs/config.json --vault-password-file password_file; fi" ,
148+ " if [ -f \" /root/.powervs/config.json\" ]; then" ,
149+ " if ! ( head -n 1 | grep -q '^\\ $ANSIBLE_VAULT' ); then" ,
150+ " echo ${ var . ansible_vault_password } > password_file" ,
151+ " ansible-vault encrypt /root/.powervs/config.json --vault-password-file password_file" ,
152+ " fi" ,
153+ " fi" ,
150154 " rm -f password_file"
151155 ]
152156 }
@@ -226,7 +230,7 @@ resource "terraform_data" "execute_playbooks_with_vault" {
226230 # Decrypt ocp config if it already exists
227231 provisioner "remote-exec" {
228232 inline = [
229- " if [ -f \" ~/ .powervs/config.json\" ]; then ansible-vault decrypt ~ /.powervs/config.json --vault-password-file password_file; fi"
233+ " if [ -f \" /root/ .powervs/config.json\" ]; then ansible-vault decrypt /root /.powervs/config.json --vault-password-file password_file; fi"
230234 ]
231235 }
232236
@@ -241,8 +245,12 @@ resource "terraform_data" "execute_playbooks_with_vault" {
241245 # Encrypt ocp config if it already exists
242246 provisioner "remote-exec" {
243247 inline = [
244- " if [ -f \" ~/.powervs/config.json\" ]; then echo ${ var . ansible_vault_password } > password_file; fi" ,
245- " if [ -f \" ~/.powervs/config.json\" ]; then ansible-vault encrypt ~/.powervs/config.json --vault-password-file password_file; fi" ,
248+ " if [ -f \" /root/.powervs/config.json\" ]; then" ,
249+ " if ! ( head -n 1 | grep -q '^\\ $ANSIBLE_VAULT' ); then" ,
250+ " echo ${ var . ansible_vault_password } > password_file" ,
251+ " ansible-vault encrypt /root/.powervs/config.json --vault-password-file password_file" ,
252+ " fi" ,
253+ " fi" ,
246254 " rm -f password_file"
247255 ]
248256 }
0 commit comments