Intrusion Exploit
Server: LiteSpeed
System: Linux cisadane.iixcp.rumahweb.net 5.14.0-427.42.1.el9_4.x86_64 #1 SMP PREEMPT_DYNAMIC Fri Nov 1 14:58:02 EDT 2024 x86_64
User: lenf4658 (1805)
PHP: 8.4.19
Disabled: NONE
Upload Files
File: //lib/python3.9/site-packages/ansible_collections/ansible/windows/plugins/modules/slurp.yml
# Copyright (c) 2022 Ansible Project
# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt)

DOCUMENTATION:
  module: slurp
  short_description: Slurps a file from remote nodes
  description:
  - This module works like M(ansible.builtin.fetch). It is used for fetching a base64-
    encoded blob containing the data in a remote file.
  options:
    src:
      description:
      - The file on the remote system to fetch. This I(must) be a file, not a directory.
      type: path
      required: true
      aliases: [ path ]
  notes:
  - This module returns an 'in memory' base64 encoded version of the file, take
    into account that this will require at least twice the RAM as the original file size.
  seealso:
  - module: ansible.builtin.fetch
  - module: ansible.builtin.slurp
  author:
  - Ansible Core Team

EXAMPLES: |
  - name: Retrieve remote ini file on a Windows host
    ansible.builtin.slurp:
      src: C:\Program Files\Program\program.ini
    register: program_conf

  - name: Print returned information
    ansible.builtin.debug:
      msg: "{{ program_conf['content'] | b64decode }}"

RETURN:
  content:
      description: Encoded file content
      returned: success
      type: str
      sample: "MjE3OQo="
  encoding:
      description: Type of encoding used for file
      returned: success
      type: str
      sample: "base64"
  source:
      description: Actual path of file slurped
      returned: success
      type: str
      sample: C:\Program Files\Program\program.ini