Note
This plugin is part of the community.general collection.
To install it use: ansible-galaxy collection install community.general
.
To use it in a playbook, specify: community.general.hashi_vault
.
The below requirements are needed on the local controller node that executes this lookup.
Parameter | Choices/Defaults | Configuration | Comments |
---|---|---|---|
auth_method string |
| ini entries: [lookup_hashi_vault] added in 0.2.0 of community.general env:VAULT_AUTH_METHOD | Authentication method to be used. userpass is added in Ansible 2.8.aws_iam_login is added in community.general 0.2.0. |
aws_access_key string added in 0.2.0 of community.general | env:EC2_ACCESS_KEY env:AWS_ACCESS_KEY env:AWS_ACCESS_KEY_ID | The AWS access key to use. aliases: aws_access_key_id | |
aws_profile string added in 0.2.0 of community.general | env:AWS_DEFAULT_PROFILE env:AWS_PROFILE | The AWS profile aliases: boto_profile | |
aws_secret_key string added in 0.2.0 of community.general | env:EC2_SECRET_KEY env:AWS_SECRET_KEY env:AWS_SECRET_ACCESS_KEY | The AWS secret key that corresponds to the access key. aliases: aws_secret_access_key | |
aws_security_token string added in 0.2.0 of community.general | env:EC2_SECURITY_TOKEN env:AWS_SESSION_TOKEN env:AWS_SECURITY_TOKEN | The AWS security token if using temporary access and secret keys. | |
ca_cert string | Path to certificate to use for authentication. aliases: cacert | ||
mount_point string | Vault mount point, only required if you have a custom mount point. | ||
namespace string | env:VAULT_NAMESPACE added in 1.2.0 of community.general | Namespace where secrets reside. Requires HVAC 0.7.0+ and Vault 0.11+. | |
password string | Authentication password. | ||
region string added in 0.2.0 of community.general | env:EC2_REGION env:AWS_REGION | The AWS region for which to create the connection. | |
return_format string added in 0.2.0 of community.general |
| Controls how multiple key/value pairs in a path are treated on return. dict returns a single dict containing the key/value pairs (same behavior as before community.general 0.2.0).values returns a list of all the values only. Use when you don't care about the keys.raw returns the actual API result, which includes metadata and may have the data nested in other keys.aliases: as | |
role_id string | ini entries: [lookup_hashi_vault] added in 0.2.0 of community.general env:VAULT_ROLE_ID | Vault Role ID. Used in approle and aws_iam_login auth methods. | |
secret string / required | query you are making. | ||
secret_id string | env:VAULT_SECRET_ID | Secret id for a vault AppRole auth. | |
token string | env:VAULT_TOKEN | Vault token. If using token auth and no token is supplied, explicitly or through env, then the plugin will check for a token file, as determined by token_path and token_file . | |
token_file string added in 0.2.0 of community.general | Default: ".vault-token" | ini entries: [lookup_hashi_vault] env:VAULT_TOKEN_FILE added in 1.2.0 of community.general | If no token is specified, will try to read the token from this file in token_path . |
token_path string added in 0.2.0 of community.general | ini entries: [lookup_hashi_vault] env:VAULT_TOKEN_PATH added in 1.2.0 of community.general | If no token is specified, will try to read the token file from this path. | |
url string | Default: "http://127.0.0.1:8200" | ini entries: [lookup_hashi_vault] added in 0.2.0 of community.general env:VAULT_ADDR | URL to vault service. |
username string | Authentication user name. | ||
validate_certs boolean |
| Controls verification and validation of SSL certificates, mostly you only want to turn off with self signed ones. |
Note
secret
is the first option in the term string, secret=
is not required (see examples).- ansible.builtin.debug: msg: "{{ lookup('community.general.hashi_vault', 'secret=secret/hello:value token=c975b780-d1be-8016-866b-01d0f9b688a5 url=http://myvault:8200') }}" - name: Return all secrets from a path ansible.builtin.debug: msg: "{{ lookup('community.general.hashi_vault', 'secret=secret/hello token=c975b780-d1be-8016-866b-01d0f9b688a5 url=http://myvault:8200') }}" - name: Vault that requires authentication via LDAP ansible.builtin.debug: msg: "{{ lookup('community.general.hashi_vault', 'secret/hello:value auth_method=ldap mount_point=ldap username=myuser password=mypas') }}" - name: Vault that requires authentication via username and password ansible.builtin.debug: msg: "{{ lookup('community.general.hashi_vault', 'secret=secret/hello:value auth_method=userpass username=myuser password=psw url=http://myvault:8200') }}" - name: Using an ssl vault ansible.builtin.debug: msg: "{{ lookup('community.general.hashi_vault', 'secret=secret/hola:value token=c975b780-d1be-8016-866b-01d0f9b688a5 validate_certs=False') }}" - name: using certificate auth ansible.builtin.debug: msg: "{{ lookup('community.general.hashi_vault', 'secret/hi:value token=xxxx url=https://myvault:8200 validate_certs=True cacert=/cacert/path/ca.pem') }}" - name: authenticate with a Vault app role ansible.builtin.debug: msg: "{{ lookup('community.general.hashi_vault', 'secret=secret/hello:value auth_method=approle role_id=myroleid secret_id=mysecretid') }}" - name: Return all secrets from a path in a namespace ansible.builtin.debug: msg: "{{ lookup('community.general.hashi_vault', 'secret=secret/hello token=c975b780-d1be-8016-866b-01d0f9b688a5 namespace=teama/admins') }}" # When using KV v2 the PATH should include "data" between the secret engine mount and path (e.g. "secret/data/:path") # see: https://www.vaultproject.io/api/secret/kv/kv-v2.html#read-secret-version - name: Return latest KV v2 secret from path ansible.builtin.debug: msg: "{{ lookup('community.general.hashi_vault', 'secret=secret/data/hello token=my_vault_token url=http://myvault_url:8200') }}" # The following examples work in collection releases after community.general 0.2.0 - name: secret= is not required if secret is first ansible.builtin.debug: msg: "{{ lookup('community.general.hashi_vault', 'secret/data/hello token=<token> url=http://myvault_url:8200') }}" - name: options can be specified as parameters rather than put in term string ansible.builtin.debug: msg: "{{ lookup('community.general.hashi_vault', 'secret/data/hello', token=my_token_var, url='http://myvault_url:8200') }}" # return_format (or its alias 'as') can control how secrets are returned to you - name: return secrets as a dict (default) ansible.builtin.set_fact: my_secrets: "{{ lookup('community.general.hashi_vault', 'secret/data/manysecrets', token=my_token_var, url='http://myvault_url:8200') }}" - ansible.builtin.debug: msg: "{{ my_secrets['secret_key'] }}" - ansible.builtin.debug: msg: "Secret '{{ item.key }}' has value '{{ item.value }}'" loop: "{{ my_secrets | dict2items }}" - name: return secrets as values only ansible.builtin.debug: msg: "A secret value: {{ item }}" loop: "{{ query('community.general.hashi_vault', 'secret/data/manysecrets', token=my_token_var, url='http://myvault_url:8200', return_format='values') }}" - name: return raw secret from API, including metadata ansible.builtin.set_fact: my_secret: "{{ lookup('community.general.hashi_vault', 'secret/data/hello:value', token=my_token_var, url='http://myvault_url:8200', as='raw') }}" - ansible.builtin.debug: msg: "This is version {{ my_secret['metadata']['version'] }} of hello:value. The secret data is {{ my_secret['data']['data']['value'] }}" # AWS IAM authentication method # uses Ansible standard AWS options - name: authenticate with aws_iam_login ansible.builtin.debug: msg: "{{ lookup('community.general.hashi_vault', 'secret/hello:value', auth_method='aws_iam_login' role_id='myroleid', profile=my_boto_profile) }}"
Common return values are documented here, the following are the fields unique to this lookup:
Key | Returned | Description |
---|---|---|
_raw list / elements=dictionary | success | secrets(s) requested |
© 2012–2018 Michael DeHaan
© 2018–2019 Red Hat, Inc.
Licensed under the GNU General Public License version 3.
https://docs.ansible.com/ansible/2.10/collections/community/general/hashi_vault_lookup.html