Description of problem: Version-Release number of selected component (if applicable): How reproducible: Steps to Reproduce: 1. Create a Service with type Ansible Playbook with extra vars. 2. Prepare a service dialog for the service. It can be automatically created. 3. Edit the dialog to make one of the extra var to be a password text field. Actual results: Depend on the actual playbook, the execution may succeed or fail, but the value passed to the playbook is still encrypted. For example if the playbook creates a VM and a login user/password is configured. The VM may be successfully created but user cannot log on with given password. Expected results: The password should be decrypted before passing to the playbook. However it should remain encrypted in the service's options column. Additional info:
https://github.com/ManageIQ/manageiq/pull/14636
New commit detected on ManageIQ/manageiq/master: https://github.com/ManageIQ/manageiq/commit/b2066945c8bbbe0fb611cdb0dfc399a3cbd1a3de commit b2066945c8bbbe0fb611cdb0dfc399a3cbd1a3de Author: Bill Wei <bilwei> AuthorDate: Tue Apr 4 11:44:33 2017 -0400 Commit: Bill Wei <bilwei> CommitDate: Tue Apr 4 15:24:00 2017 -0400 Parse password field from dialog and decryt before job launch https://bugzilla.redhat.com/show_bug.cgi?id=1438923 app/models/service_ansible_playbook.rb | 17 ++++++++------- spec/models/service_ansible_playbook_spec.rb | 31 +++++++++++++++++----------- 2 files changed, 29 insertions(+), 19 deletions(-)
Blocked by https://bugzilla.redhat.com/1501528 since service can not be added to catalog and order can not be placed to check if the Bug is fixed.
Verified for 5.9.0.8