-If set, this program will use the value as a path to the keyfile. The ["--private-key=path"](#private-key-path) option
-takes precedence if it is used.
+If set, this program will use the value as a path to private key used for decryption. The
+["--private-key=path"](#private-key-path) option takes precedence if used.
This will be the Ansible Vault password. You can see it if you want using the ["print-secret"](#print-secret)
command, but you don't need to.
This will be the Ansible Vault password. You can see it if you want using the ["print-secret"](#print-secret)
command, but you don't need to.
program that prints the Vault password to `STDOUT`. Create a file named `vault-password` with the
following script, and make it executable (`chmod +x vault-password`):
program that prints the Vault password to `STDOUT`. Create a file named `vault-password` with the
following script, and make it executable (`chmod +x vault-password`):
script we created earlier. You can use that argument with other ansible-vault commands to view or
edit the encrypted files.
script we created earlier. You can use that argument with other ansible-vault commands to view or
edit the encrypted files.
playbooks that refer to the encrypted variables:
ansible-playbook -i myinventory --vault-id=vault-password site.yml
What this does is execute `vault-password` which executes groupsecret to print the secret contained
playbooks that refer to the encrypted variables:
ansible-playbook -i myinventory --vault-id=vault-password site.yml
What this does is execute `vault-password` which executes groupsecret to print the secret contained
-in the `vault-password.yml` file (which is actually the Vault password) to <STDOUT>. In order to do
-this, groupsecret will decrypt the keyfile passphrase using any one of the private keys that have
+in the `vault-password.yml` file (which is actually the Vault password) to `STDOUT`. In order to
+do this, groupsecret will decrypt the keyfile passphrase using any one of the private keys that have