head -c ${1:-20} /dev/urandom | base64 | \
tr -d '\n' | \
- hydra $HYDRA eyaml $DISK encrypt -q -o block --stdin -l some::random:password >> \
+ hydra $HYDRA eyaml $DISK encrypt -q -o block --stdin -l some::random::password >> \
$CONFIG_FOLDER/puppet/config/secrets/node/$DISK.$DOMAIN.yaml
For `passwd(5)` and `shadow(5)` hashed passphrases, use something like this:
mkpasswd -m sha-512 | \
tr -d '\n' | \
- hydra $HYDRA eyaml $DISK encrypt -q -o block --stdin -l some::random:password >> \
+ hydra $HYDRA eyaml $DISK encrypt -q -o block --stdin -l some::random::password >> \
$CONFIG_FOLDER/puppet/config/secrets/node/$DISK.$DOMAIN.yaml
Or this, for a random passphrase:
head -c ${1:-20} /dev/urandom | base64 | \
mkpasswd -m sha-512 --stdin | \
tr -d '\n' | \
- hydra $HYDRA eyaml $DISK encrypt -q -o block --stdin -l some::random:password >> \
+ hydra $HYDRA eyaml $DISK encrypt -q -o block --stdin -l some::random::password >> \
$CONFIG_FOLDER/puppet/config/secrets/node/$DISK.$DOMAIN.yaml
[hiera-yaml]: https://github.com/voxpupuli/hiera-eyaml