Note: This article does not provide instructions on how to decrypt the installation.yml present on Operations Manager VM at this location: /var/tempest/workspaces/default/installation.yml. If you are looking to decrypt the file present in that location, follow this article instead: How to manually edit the installation YAML file on the Operations Manager VM
Note: It is not supported to decrypt installation.yml on other Ops Manager instance, because the decryption not only relies on passphrase, but also a salt value in encryption_keys table of Ops Manager database. The salt must be identical, otherwise decryption would fail with error "TempestEncryptor::DecryptError: bad decrypt".
Pre-checks
sudo -u tempest-web SECRET_KEY_BASE="s" RAILS_ENV=production /home/tempest-web/tempest/web/scripts/decrypt /tmp/encrypted-installation.yml /tmp/decrypted-installation.yml
Failed to decrypt /tmp/encrypted-installation.yml: #<TempestEncryptor::DecryptError: bad decrypt> ...
Product Version: All releases
The encryption done on the installation.yml file from the installation.zip (Export Installation Settings) is subtly different compared to the encryption done on the file present in /var/tempest/workspaces/default/installation.yml.
The next section of this article highlights the steps you can take to decrypt installation.yml obtained from the installation.zip file.
Note: This change makes it impossible for the decrypt script to decrypt the installation.yml that's on the disk (/var/tempest/workspaces/default/installation.yml), we advise that you revert it back when you're done decrypting the installation.yml that's in the installation.zip.
@encryptor = TempestEncryptor.new(EncryptionKey.instance.encryption_key)
@encryptor = TempestEncryptor.new(EncryptionKey.instance.full_encryption_key)
sudo -u tempest-web SECRET_KEY_BASE="s" RAILS_ENV=production /home/tempest-web/tempest/web/scripts/decrypt /tmp/encrypted-installation.yml /tmp/decrypted-installation.yml