forked from TerryHowe/ansible-modules-hashivault
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathhashivault_list.py
122 lines (114 loc) · 4.1 KB
/
hashivault_list.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
#!/usr/bin/env python
import warnings
from ansible.module_utils.hashivault import hashivault_argspec
from ansible.module_utils.hashivault import hashivault_auth_client
from ansible.module_utils.hashivault import hashivault_init
from ansible.module_utils.hashivault import hashiwrapper
ANSIBLE_METADATA = {'status': ['stableinterface'], 'supported_by': 'community', 'version': '1.1'}
DOCUMENTATION = '''
---
module: hashivault_list
version_added: "2.9"
short_description: Hashicorp Vault list
description:
- The M(hashivault_list) module lists keys in Hashicorp Vault. By
default this will list top-level keys under C(/secret), but you
can provide an alternate location as I(secret). This includes both
immediate subkeys and subkey paths, like the C(vault list) command.
options:
url:
description:
- url for vault
default: to environment variable VAULT_ADDR
ca_cert:
description:
- "path to a PEM-encoded CA cert file to use to verify the Vault server TLS certificate"
default: to environment variable VAULT_CACERT
ca_path:
description:
- "path to a directory of PEM-encoded CA cert files to verify the Vault server TLS certificate : if ca_cert
is specified, its value will take precedence"
default: to environment variable VAULT_CAPATH
client_cert:
description:
- "path to a PEM-encoded client certificate for TLS authentication to the Vault server"
default: to environment variable VAULT_CLIENT_CERT
client_key:
description:
- "path to an unencrypted PEM-encoded private key matching the client certificate"
default: to environment variable VAULT_CLIENT_KEY
verify:
description:
- "if set, do not verify presented TLS certificate before communicating with Vault server : setting this
variable is not recommended except during testing"
default: to environment variable VAULT_SKIP_VERIFY
authtype:
description:
- "authentication type to use: token, userpass, github, ldap, approle"
default: token
token:
description:
- token for vault
default: to environment variable VAULT_TOKEN
username:
description:
- username to login to vault.
default: to environment variable VAULT_USER
password:
description:
- password to login to vault.
default: to environment variable VAULT_PASSWORD
secret:
description:
- 'secret path to list. If this does not begin with a C(/)
then it is interpreted as a subpath of C(/secret). This
is always interpreted as a "directory": if a key C(/secret/foo)
exists, and you pass C(/secret/foo) as I(secret), then the key
itself will not be returned, but subpaths like
C(/secret/foo/bar) will.'
default: ''
'''
RETURN = '''
---
secrets:
description: list of secrets found, if any
returned: success
type: list
sample: ["giant", "stalks/"]
'''
EXAMPLES = '''
---
- hosts: localhost
tasks:
- hashivault_list:
secret: 'giant'
register: 'fie'
- debug: msg="Known secrets are {{ fie.secrets|join(', ') }}"
'''
def main():
argspec = hashivault_argspec()
argspec['secret'] = dict(default='', type='str')
module = hashivault_init(argspec)
result = hashivault_list(module.params)
if result.get('failed'):
module.fail_json(**result)
else:
module.exit_json(**result)
@hashiwrapper
def hashivault_list(params):
result = {"changed": False, "rc": 0}
client = hashivault_auth_client(params)
secret = params.get('secret')
if secret.startswith('/'):
secret = secret.lstrip('/')
else:
secret = 'secret/' + secret
with warnings.catch_warnings():
warnings.simplefilter("ignore")
response = client.list(secret)
if not response:
response = {}
result['secrets'] = response.get('data', {}).get('keys', [])
return result
if __name__ == '__main__':
main()