)]}'
{"defaults/main.yml":[{"author":{"_account_id":25023,"name":"Jonathan Rosser","email":"jonathan.rosser@rd.bbc.co.uk","username":"jrosser"},"change_message_id":"d2a7f122fd1b5e044e198195a65ebcd8c5f1e000","unresolved":true,"context_lines":[{"line_number":94,"context_line":"# directories for server certificates"},{"line_number":95,"context_line":"pki_cert_dirs: \"{{ _pki_cert_dirs }}\""},{"line_number":96,"context_line":""},{"line_number":97,"context_line":"# certificates to install"},{"line_number":98,"context_line":"pki_install_certificates: []"},{"line_number":99,"context_line":""},{"line_number":100,"context_line":"# method used to create the certificates"},{"line_number":101,"context_line":"pki_method: standalone"}],"source_content_type":"text/x-yaml","patch_set":3,"id":"31239907_25b55e92","line":98,"range":{"start_line":97,"start_character":0,"end_line":98,"end_character":28},"updated":"2021-04-29 17:50:34.000000000","message":"needs an example","commit_id":"72d194f341b590b8cc3174c21948a5eedb5fe83d"}],"tasks/main.yml":[{"author":{"_account_id":28619,"name":"Dmitriy Rabotyagov","email":"noonedeadpunk@gmail.com","username":"noonedeadpunk"},"change_message_id":"94678ec1e3ae117bda4e4f7100409ecdc52cbf0a","unresolved":true,"context_lines":[{"line_number":13,"context_line":"# See the License for the specific language governing permissions and"},{"line_number":14,"context_line":"# limitations under the License."},{"line_number":15,"context_line":""},{"line_number":16,"context_line":"include_tasks: main_ca.yml"},{"line_number":17,"context_line":"include_tasks: main_certs.yml"}],"source_content_type":"text/x-yaml","patch_set":1,"id":"59c7d39b_7c3d377b","line":17,"range":{"start_line":16,"start_character":0,"end_line":17,"end_character":29},"updated":"2021-04-26 15:34:29.000000000","message":"Shouldn\u0027t it be a list anyway?","commit_id":"8236ec969c909aefcd880369ba6e2cd0f03b0f3c"}],"tasks/main_ca.yml":[{"author":{"_account_id":28619,"name":"Dmitriy Rabotyagov","email":"noonedeadpunk@gmail.com","username":"noonedeadpunk"},"change_message_id":"a07c3df3f859c7f430ccca31f76d46af7656a307","unresolved":true,"context_lines":[{"line_number":21,"context_line":"    pki_ca_defs: |-"},{"line_number":22,"context_line":"      {% if pki_authorities is defined %}"},{"line_number":23,"context_line":"      {%   set _cas \u003d pki_authorities %}"},{"line_number":24,"context_line":"      {% else %}    "},{"line_number":25,"context_line":"      {%   set _ca_search_hits \u003d vars.keys() | select(\u0027match\u0027, \u0027^\u0027 ~ pki_search_authorities_pattern ~ \u0027.*\u0027) %}"},{"line_number":26,"context_line":"      {%   set _cas \u003d [] %}"},{"line_number":27,"context_line":"      {%   for _ca in _ca_search_hits | default([]) %}"}],"source_content_type":"text/x-yaml","patch_set":3,"id":"8505b407_696cd91f","line":24,"range":{"start_line":24,"start_character":16,"end_line":24,"end_character":20},"updated":"2021-04-29 16:28:06.000000000","message":"Trailing","commit_id":"72d194f341b590b8cc3174c21948a5eedb5fe83d"},{"author":{"_account_id":28619,"name":"Dmitriy Rabotyagov","email":"noonedeadpunk@gmail.com","username":"noonedeadpunk"},"change_message_id":"a07c3df3f859c7f430ccca31f76d46af7656a307","unresolved":true,"context_lines":[{"line_number":18,"context_line":""},{"line_number":19,"context_line":"- name: Gather CA definitions from hostvars"},{"line_number":20,"context_line":"  set_fact:"},{"line_number":21,"context_line":"    pki_ca_defs: |-"},{"line_number":22,"context_line":"      {% if pki_authorities is defined %}"},{"line_number":23,"context_line":"      {%   set _cas \u003d pki_authorities %}"},{"line_number":24,"context_line":"      {% else %}    "},{"line_number":25,"context_line":"      {%   set _ca_search_hits \u003d vars.keys() | select(\u0027match\u0027, \u0027^\u0027 ~ pki_search_authorities_pattern ~ \u0027.*\u0027) %}"},{"line_number":26,"context_line":"      {%   set _cas \u003d [] %}"},{"line_number":27,"context_line":"      {%   for _ca in _ca_search_hits | default([]) %}"},{"line_number":28,"context_line":"      {%     set _ \u003d _cas.extend(lookup(\u0027vars\u0027, _ca)) %}"},{"line_number":29,"context_line":"      {%   endfor %}"},{"line_number":30,"context_line":"      {% endif %}"},{"line_number":31,"context_line":"      {{ _cas }}"},{"line_number":32,"context_line":"  when: pki_create_ca | bool"},{"line_number":33,"context_line":""},{"line_number":34,"context_line":"- name: Create PKI directories"}],"source_content_type":"text/x-yaml","patch_set":3,"id":"1bca2621_50a95af1","line":31,"range":{"start_line":21,"start_character":0,"end_line":31,"end_character":16},"updated":"2021-04-29 16:28:06.000000000","message":"tbh I think I\u0027d move that to vars/main.yml In case `Create certificate authorities` is not running, it should not be evaluated then anyway?","commit_id":"72d194f341b590b8cc3174c21948a5eedb5fe83d"}],"tasks/standalone/create_ca.yml":[{"author":{"_account_id":25023,"name":"Jonathan Rosser","email":"jonathan.rosser@rd.bbc.co.uk","username":"jrosser"},"change_message_id":"d2a7f122fd1b5e044e198195a65ebcd8c5f1e000","unresolved":true,"context_lines":[{"line_number":45,"context_line":""},{"line_number":46,"context_line":"    - name: Read the serial number for {{ ca.name }}"},{"line_number":47,"context_line":"      set_fact:"},{"line_number":48,"context_line":"        serial_no: \"{{ lookup(\u0027file\u0027, pki_dir ~ \u0027/roots/\u0027 ~ ca.name ~ \u0027/serial\u0027) }}\""},{"line_number":49,"context_line":"      when:"},{"line_number":50,"context_line":"        - ca_privkey is changed"},{"line_number":51,"context_line":""}],"source_content_type":"text/x-yaml","patch_set":3,"id":"9aac196d_5196a59c","line":48,"range":{"start_line":48,"start_character":0,"end_line":48,"end_character":84},"updated":"2021-04-29 17:50:34.000000000","message":"probably should be slurp for when pki_setup_host !\u003d localhost","commit_id":"72d194f341b590b8cc3174c21948a5eedb5fe83d"},{"author":{"_account_id":25023,"name":"Jonathan Rosser","email":"jonathan.rosser@rd.bbc.co.uk","username":"jrosser"},"change_message_id":"d2a7f122fd1b5e044e198195a65ebcd8c5f1e000","unresolved":true,"context_lines":[{"line_number":49,"context_line":"      when:"},{"line_number":50,"context_line":"        - ca_privkey is changed"},{"line_number":51,"context_line":""},{"line_number":52,"context_line":"    - name: Create the CA CSR for {{ ca.name }}"},{"line_number":53,"context_line":"      openssl_csr:"},{"line_number":54,"context_line":"        path: \"{{ ca_dir }}/csr/ca_csr-{{ (serial_no | int) + 1  }}.csr\""},{"line_number":55,"context_line":"        privatekey_path: \"{{ ca_privkey.filename }}\""},{"line_number":56,"context_line":"        common_name: \"{{ ca.cn }}\""},{"line_number":57,"context_line":"        basic_constraints_critical: yes"},{"line_number":58,"context_line":"        basic_constraints: \"{{ ca.basic_constraints }}\""},{"line_number":59,"context_line":"        key_usage: \"{{ ca.key_usage }}\""},{"line_number":60,"context_line":"        country_name: \"{{ ca.country_name | default(omit) }}\""},{"line_number":61,"context_line":"        state_or_province_name: \"{{ ca.state_or_province_name | default(omit) }}\""},{"line_number":62,"context_line":"        locality_name: \"{{ ca.locality_name | default(omit) }}\""},{"line_number":63,"context_line":"        organization_name: \"{{ ca.organizataion_name | default(omit) }}\""},{"line_number":64,"context_line":"        organizational_unit_name: \"{{ ca.organization_unit_name | default(omit) }}\""},{"line_number":65,"context_line":"        subject: \"{{ cert.subject | default(omit) }}\""},{"line_number":66,"context_line":"      register: ca_csr"},{"line_number":67,"context_line":"      when:"},{"line_number":68,"context_line":"        - ca_privkey is changed"},{"line_number":69,"context_line":""},{"line_number":70,"context_line":"    - name: Write out the new serial number for {{ ca.name }}"},{"line_number":71,"context_line":"      copy:"}],"source_content_type":"text/x-yaml","patch_set":3,"id":"7613475f_e616ed1a","line":68,"range":{"start_line":52,"start_character":0,"end_line":68,"end_character":31},"updated":"2021-04-29 17:50:34.000000000","message":"creating the CSR is always \u0027changed\u0027 without the when:, so needs investigating a bit. What behaviour do we want if a field in the csr is updated in vars but the private key is not changed?","commit_id":"72d194f341b590b8cc3174c21948a5eedb5fe83d"},{"author":{"_account_id":28619,"name":"Dmitriy Rabotyagov","email":"noonedeadpunk@gmail.com","username":"noonedeadpunk"},"change_message_id":"596c45cf4979ada47c1339afed91beb5e7a51424","unresolved":true,"context_lines":[{"line_number":49,"context_line":"      when:"},{"line_number":50,"context_line":"        - ca_privkey is changed"},{"line_number":51,"context_line":""},{"line_number":52,"context_line":"    - name: Create the CA CSR for {{ ca.name }}"},{"line_number":53,"context_line":"      openssl_csr:"},{"line_number":54,"context_line":"        path: \"{{ ca_dir }}/csr/ca_csr-{{ (serial_no | int) + 1  }}.csr\""},{"line_number":55,"context_line":"        privatekey_path: \"{{ ca_privkey.filename }}\""},{"line_number":56,"context_line":"        common_name: \"{{ ca.cn }}\""},{"line_number":57,"context_line":"        basic_constraints_critical: yes"},{"line_number":58,"context_line":"        basic_constraints: \"{{ ca.basic_constraints }}\""},{"line_number":59,"context_line":"        key_usage: \"{{ ca.key_usage }}\""},{"line_number":60,"context_line":"        country_name: \"{{ ca.country_name | default(omit) }}\""},{"line_number":61,"context_line":"        state_or_province_name: \"{{ ca.state_or_province_name | default(omit) }}\""},{"line_number":62,"context_line":"        locality_name: \"{{ ca.locality_name | default(omit) }}\""},{"line_number":63,"context_line":"        organization_name: \"{{ ca.organizataion_name | default(omit) }}\""},{"line_number":64,"context_line":"        organizational_unit_name: \"{{ ca.organization_unit_name | default(omit) }}\""},{"line_number":65,"context_line":"        subject: \"{{ cert.subject | default(omit) }}\""},{"line_number":66,"context_line":"      register: ca_csr"},{"line_number":67,"context_line":"      when:"},{"line_number":68,"context_line":"        - ca_privkey is changed"},{"line_number":69,"context_line":""},{"line_number":70,"context_line":"    - name: Write out the new serial number for {{ ca.name }}"},{"line_number":71,"context_line":"      copy:"}],"source_content_type":"text/x-yaml","patch_set":3,"id":"7aa8e319_be4e0402","line":68,"range":{"start_line":52,"start_character":0,"end_line":68,"end_character":31},"in_reply_to":"7613475f_e616ed1a","updated":"2021-04-30 09:52:46.000000000","message":"would be logical to suggest updating csr. But we can workaround by adding some variable, like ca_force_update: false, and adjust condition to `ca_privkey is changed or ca_force_update | bool`","commit_id":"72d194f341b590b8cc3174c21948a5eedb5fe83d"},{"author":{"_account_id":25023,"name":"Jonathan Rosser","email":"jonathan.rosser@rd.bbc.co.uk","username":"jrosser"},"change_message_id":"d2a7f122fd1b5e044e198195a65ebcd8c5f1e000","unresolved":true,"context_lines":[{"line_number":115,"context_line":"        dest: \"{{ ca_cert_prefix ~ \u0027.info\u0027 }}\""},{"line_number":116,"context_line":"      when: ca_ownca_crt is changed or ca_selfsigned_crt is changed"},{"line_number":117,"context_line":""},{"line_number":118,"context_line":"    - name: Create certificate chain for {{ ca.name }}"},{"line_number":119,"context_line":"      shell:"},{"line_number":120,"context_line":"        cmd: \"cat {{ ca_ownca_crt.filename }} {{ pki_dir ~ \u0027/roots/\u0027 ~ ca.signed_by ~ \u0027/certs/\u0027 ~ ca.signed_by ~ \u0027.crt\u0027 }} \u003e {{ ca_cert_prefix ~ \u0027-chain.crt\u0027 }}\""},{"line_number":121,"context_line":"      when: ca_ownca_crt is changed"}],"source_content_type":"text/x-yaml","patch_set":3,"id":"e1311a22_4be4b903","line":121,"range":{"start_line":118,"start_character":0,"end_line":121,"end_character":35},"updated":"2021-04-29 17:50:34.000000000","message":"the chain is made here of root and intermediate but i\u0027m not convinced its useful? For a server the chain would be the server cert and the intermediate.\n\nNeed to decide if we have generation of whatever chain is needed done in the calling role, or in the pki role.","commit_id":"72d194f341b590b8cc3174c21948a5eedb5fe83d"},{"author":{"_account_id":28619,"name":"Dmitriy Rabotyagov","email":"noonedeadpunk@gmail.com","username":"noonedeadpunk"},"change_message_id":"596c45cf4979ada47c1339afed91beb5e7a51424","unresolved":true,"context_lines":[{"line_number":115,"context_line":"        dest: \"{{ ca_cert_prefix ~ \u0027.info\u0027 }}\""},{"line_number":116,"context_line":"      when: ca_ownca_crt is changed or ca_selfsigned_crt is changed"},{"line_number":117,"context_line":""},{"line_number":118,"context_line":"    - name: Create certificate chain for {{ ca.name }}"},{"line_number":119,"context_line":"      shell:"},{"line_number":120,"context_line":"        cmd: \"cat {{ ca_ownca_crt.filename }} {{ pki_dir ~ \u0027/roots/\u0027 ~ ca.signed_by ~ \u0027/certs/\u0027 ~ ca.signed_by ~ \u0027.crt\u0027 }} \u003e {{ ca_cert_prefix ~ \u0027-chain.crt\u0027 }}\""},{"line_number":121,"context_line":"      when: ca_ownca_crt is changed"}],"source_content_type":"text/x-yaml","patch_set":3,"id":"ea633eb2_1ad710b2","line":121,"range":{"start_line":118,"start_character":0,"end_line":121,"end_character":35},"in_reply_to":"e1311a22_4be4b903","updated":"2021-04-30 09:52:46.000000000","message":"I think current logic is that pki role does handle certificate files creation in the requested directories for the service role? I think then it should also take care of chains?\n\nHowever I\u0027m not sure I fully understand all chains logic so hard for me to judge if this one is useful.","commit_id":"72d194f341b590b8cc3174c21948a5eedb5fe83d"}],"tasks/standalone/install_ca.yml":[{"author":{"_account_id":25023,"name":"Jonathan Rosser","email":"jonathan.rosser@rd.bbc.co.uk","username":"jrosser"},"change_message_id":"d2a7f122fd1b5e044e198195a65ebcd8c5f1e000","unresolved":true,"context_lines":[{"line_number":21,"context_line":"  register: ca_copy"},{"line_number":22,"context_line":"  loop: \"{{ pki_install_ca }}\""},{"line_number":23,"context_line":""},{"line_number":24,"context_line":"- name: Update CA store - Ubuntu"},{"line_number":25,"context_line":"  command: update-ca-certificates"},{"line_number":26,"context_line":"  when:"},{"line_number":27,"context_line":"    - ansible_facts[\u0027pkg_mgr\u0027] \u003d\u003d \u0027apt\u0027"},{"line_number":28,"context_line":"    - ca_copy is changed"},{"line_number":29,"context_line":""},{"line_number":30,"context_line":"- name: Update CA store - Centos"},{"line_number":31,"context_line":"  command: update-ca-trust extract"},{"line_number":32,"context_line":"  when:"},{"line_number":33,"context_line":"    - ansible_facts[\u0027pkg_mgr\u0027] \u003d\u003d \u0027dnf\u0027"},{"line_number":34,"context_line":"    - ca_copy is changed"}],"source_content_type":"text/x-yaml","patch_set":3,"id":"aa2769c0_e46db8c4","line":34,"range":{"start_line":24,"start_character":1,"end_line":34,"end_character":24},"updated":"2021-04-29 17:50:34.000000000","message":"can put this into one task by looking up the command to use in a dict per OS","commit_id":"72d194f341b590b8cc3174c21948a5eedb5fe83d"},{"author":{"_account_id":28619,"name":"Dmitriy Rabotyagov","email":"noonedeadpunk@gmail.com","username":"noonedeadpunk"},"change_message_id":"596c45cf4979ada47c1339afed91beb5e7a51424","unresolved":true,"context_lines":[{"line_number":21,"context_line":"  register: ca_copy"},{"line_number":22,"context_line":"  loop: \"{{ pki_install_ca }}\""},{"line_number":23,"context_line":""},{"line_number":24,"context_line":"- name: Update CA store - Ubuntu"},{"line_number":25,"context_line":"  command: update-ca-certificates"},{"line_number":26,"context_line":"  when:"},{"line_number":27,"context_line":"    - ansible_facts[\u0027pkg_mgr\u0027] \u003d\u003d \u0027apt\u0027"},{"line_number":28,"context_line":"    - ca_copy is changed"},{"line_number":29,"context_line":""},{"line_number":30,"context_line":"- name: Update CA store - Centos"},{"line_number":31,"context_line":"  command: update-ca-trust extract"},{"line_number":32,"context_line":"  when:"},{"line_number":33,"context_line":"    - ansible_facts[\u0027pkg_mgr\u0027] \u003d\u003d \u0027dnf\u0027"},{"line_number":34,"context_line":"    - ca_copy is changed"}],"source_content_type":"text/x-yaml","patch_set":3,"id":"246f8a6e_5f7080b2","line":34,"range":{"start_line":24,"start_character":1,"end_line":34,"end_character":24},"in_reply_to":"aa2769c0_e46db8c4","updated":"2021-04-30 09:52:46.000000000","message":"yeah, sounds good","commit_id":"72d194f341b590b8cc3174c21948a5eedb5fe83d"},{"author":{"_account_id":31542,"name":"Andrew Bonney","email":"andrew.bonney@bbc.co.uk","username":"andrewbonney"},"change_message_id":"d53cefcb71a0dfa3959e649872e59a240f69da91","unresolved":true,"context_lines":[{"line_number":22,"context_line":"  register: ca_copy"},{"line_number":23,"context_line":"  loop: \"{{ pki_install_ca }}\""},{"line_number":24,"context_line":""},{"line_number":25,"context_line":"- name: Update CA store - Ubuntu"},{"line_number":26,"context_line":"  command: \"{{ pki_ca_install_command[ansible_facts[\u0027pkg_mgr\u0027]] }}\""},{"line_number":27,"context_line":"  when:"},{"line_number":28,"context_line":"    - ca_copy is changed"}],"source_content_type":"text/x-yaml","patch_set":5,"id":"b0f80c6a_0b78cac2","line":25,"updated":"2021-05-07 07:51:14.000000000","message":"Can \u0027Ubuntu\u0027 be removed here?","commit_id":"7a91d6305fc426952503b90ed54fb62cd706951c"}],"vars/debian.yml":[{"author":{"_account_id":25023,"name":"Jonathan Rosser","email":"jonathan.rosser@rd.bbc.co.uk","username":"jrosser"},"change_message_id":"d2a7f122fd1b5e044e198195a65ebcd8c5f1e000","unresolved":true,"context_lines":[{"line_number":1,"context_line":"---"},{"line_number":2,"context_line":"# Copyright 2021, BBC"},{"line_number":3,"context_line":"#"},{"line_number":4,"context_line":"# Licensed under the Apache License, Version 2.0 (the \"License\");"}],"source_content_type":"text/x-yaml","patch_set":3,"id":"570bf3c3_bc6d0ebd","side":"PARENT","line":1,"updated":"2021-04-29 17:50:34.000000000","message":"file is empty so we should delete the whole file","commit_id":"2bf5964cc91f30d65801886300735b4684fed223"},{"author":{"_account_id":28619,"name":"Dmitriy Rabotyagov","email":"noonedeadpunk@gmail.com","username":"noonedeadpunk"},"change_message_id":"a07c3df3f859c7f430ccca31f76d46af7656a307","unresolved":true,"context_lines":[{"line_number":1,"context_line":"---"},{"line_number":2,"context_line":"# Copyright 2021, BBC"},{"line_number":3,"context_line":"#"},{"line_number":4,"context_line":"# Licensed under the Apache License, Version 2.0 (the \"License\");"}],"source_content_type":"text/x-yaml","patch_set":3,"id":"ef9600c1_74215dd1","side":"PARENT","line":1,"range":{"start_line":1,"start_character":0,"end_line":1,"end_character":3},"updated":"2021-04-29 16:28:06.000000000","message":"why drop this?","commit_id":"2bf5964cc91f30d65801886300735b4684fed223"}],"vars/redhat.yml":[{"author":{"_account_id":28619,"name":"Dmitriy Rabotyagov","email":"noonedeadpunk@gmail.com","username":"noonedeadpunk"},"change_message_id":"a07c3df3f859c7f430ccca31f76d46af7656a307","unresolved":true,"context_lines":[{"line_number":1,"context_line":"---"},{"line_number":2,"context_line":"# Copyright 2021, BBC"},{"line_number":3,"context_line":"#"},{"line_number":4,"context_line":"# Licensed under the Apache License, Version 2.0 (the \"License\");"}],"source_content_type":"text/x-yaml","patch_set":3,"id":"16e7cca3_237cd737","side":"PARENT","line":1,"range":{"start_line":1,"start_character":0,"end_line":1,"end_character":3},"updated":"2021-04-29 16:28:06.000000000","message":"ditto","commit_id":"2bf5964cc91f30d65801886300735b4684fed223"},{"author":{"_account_id":25023,"name":"Jonathan Rosser","email":"jonathan.rosser@rd.bbc.co.uk","username":"jrosser"},"change_message_id":"d2a7f122fd1b5e044e198195a65ebcd8c5f1e000","unresolved":true,"context_lines":[{"line_number":1,"context_line":"---"},{"line_number":2,"context_line":"# Copyright 2021, BBC"},{"line_number":3,"context_line":"#"},{"line_number":4,"context_line":"# Licensed under the Apache License, Version 2.0 (the \"License\");"}],"source_content_type":"text/x-yaml","patch_set":3,"id":"c5071abd_a61296fb","side":"PARENT","line":1,"updated":"2021-04-29 17:50:34.000000000","message":"file is empty so we should delete the whole file","commit_id":"2bf5964cc91f30d65801886300735b4684fed223"}],"vars/standalone_ca.yml":[{"author":{"_account_id":28619,"name":"Dmitriy Rabotyagov","email":"noonedeadpunk@gmail.com","username":"noonedeadpunk"},"change_message_id":"a07c3df3f859c7f430ccca31f76d46af7656a307","unresolved":true,"context_lines":[{"line_number":1,"context_line":"# Copyright 2021, BBC"},{"line_number":2,"context_line":"#"},{"line_number":3,"context_line":"# Licensed under the Apache License, Version 2.0 (the \"License\");"},{"line_number":4,"context_line":"# you may not use this file except in compliance with the License."}],"source_content_type":"text/x-yaml","patch_set":3,"id":"967ac7bd_b7ae5abb","line":1,"updated":"2021-04-29 16:28:06.000000000","message":"add --- ?","commit_id":"72d194f341b590b8cc3174c21948a5eedb5fe83d"},{"author":{"_account_id":25023,"name":"Jonathan Rosser","email":"jonathan.rosser@rd.bbc.co.uk","username":"jrosser"},"change_message_id":"d2a7f122fd1b5e044e198195a65ebcd8c5f1e000","unresolved":true,"context_lines":[{"line_number":13,"context_line":"# limitations under the License."},{"line_number":14,"context_line":""},{"line_number":15,"context_line":"# directories for certificate authorities on the CA host"},{"line_number":16,"context_line":"pki_ca_dirs:"},{"line_number":17,"context_line":"  - path: \"{{ pki_dir }}\""},{"line_number":18,"context_line":"  - path: \"{{ pki_dir ~ \u0027/roots\u0027 }}\""}],"source_content_type":"text/x-yaml","patch_set":3,"id":"0ffea192_a4754330","line":16,"range":{"start_line":16,"start_character":0,"end_line":16,"end_character":12},"updated":"2021-04-29 17:50:34.000000000","message":"the equivalent var for certs has a leading underscore, theres an error here somewhere","commit_id":"72d194f341b590b8cc3174c21948a5eedb5fe83d"}],"vars/standalone_cert.yml":[{"author":{"_account_id":28619,"name":"Dmitriy Rabotyagov","email":"noonedeadpunk@gmail.com","username":"noonedeadpunk"},"change_message_id":"a07c3df3f859c7f430ccca31f76d46af7656a307","unresolved":true,"context_lines":[{"line_number":1,"context_line":"# Copyright 2021, BBC"},{"line_number":2,"context_line":"#"},{"line_number":3,"context_line":"# Licensed under the Apache License, Version 2.0 (the \"License\");"},{"line_number":4,"context_line":"# you may not use this file except in compliance with the License."}],"source_content_type":"text/x-yaml","patch_set":3,"id":"a1493ce7_34f247f1","line":1,"updated":"2021-04-29 16:28:06.000000000","message":"add --- ?","commit_id":"72d194f341b590b8cc3174c21948a5eedb5fe83d"}]}
