Description
===========
Currently the "Check password for Keystone user" task dumps raw password strings
in case the user is not yet created (or has a different password).
2022-11-28 16:08:38.471435 | fa163e7e-724d-ab58-6e4c-000000004537 | FATAL | Check password of Keystone user | undercloud | item=cinder | error={"ansible_loop_var": "tripleo_keystone_resources_data", ..., "msg": "MODULE FAILURE\nSee stdout/stderr for the exact error", "rc": 1, "tripleo_keystone_resources_data": {"cinder": {"password": "d5bsb9TKXiOFO4XHJb2XYbra4", "roles": ["admin", "service"]}}}
We should hide such sensitive information from ansible log.
Steps to reproduce
==================
* Deploy standalone
* See deployment output
Expected result
===============
* Output does not contain the raw password string
Actual result
=============
* Output contains the raw password string
Description
===========
Currently the "Check password for Keystone user" task dumps raw password strings
in case the user is not yet created (or has a different password).
2022-11-28 16:08:38.471435 | fa163e7e- 724d-ab58- 6e4c-0000000045 37 | FATAL | Check password of Keystone user | undercloud | item=cinder | error={ "ansible_ loop_var" : "tripleo_ keystone_ resources_ data", ..., "msg": "MODULE FAILURE\nSee stdout/stderr for the exact error", "rc": 1, "tripleo_ keystone_ resources_ data": {"cinder": {"password": "d5bsb9TKXiOFO4 XHJb2XYbra4" , "roles": ["admin", "service"]}}}
We should hide such sensitive information from ansible log.
Steps to reproduce
==================
* Deploy standalone
* See deployment output
Expected result
===============
* Output does not contain the raw password string
Actual result
=============
* Output contains the raw password string
Environment
===========
N/A
Logs & Configs /d1079d1c172c6e c8daf9- 8011a2266d21f0c 09baf1c83d6d500 2e.ssl. cf2.rackcdn. com/856228/ 4/check/ tripleo- ci-centos- 9-standalone/ e4d5674/ logs/undercloud /home/zuul/ standalone_ deploy. log
==============
Example:
https:/