community.hashi_vault.vault_login module – Perform a login operation against HashiCorp Vault
Note
This module is part of the community.hashi_vault collection (version 2.5.0).
You might already have this collection installed if you are using the ansible
package.
It is not included in ansible-core
.
To check whether it is installed, run ansible-galaxy collection list
.
To install it, use: ansible-galaxy collection install community.hashi_vault
.
To use it in a playbook, specify: community.hashi_vault.vault_login
.
New in version 2.2.0: of community.hashi_vault
Synopsis
Performs a login operation against a given path in HashiCorp Vault, returning the login response, including the token.
Requirements
The below requirements are needed on the host that executes this module.
hvac
(Python library)For detailed requirements, see the collection requirements page.
Parameters
Parameter |
Comments |
---|---|
Authentication method to be used.
Choices:
|
|
The AWS access key to use. |
|
If specified, sets the value to use for the |
|
The AWS profile |
|
The AWS secret key that corresponds to the access key. |
|
The AWS security token if using temporary access and secret keys. |
|
Path to certificate to use for authentication. If not specified by any other means, the |
|
For |
|
For |
|
The JSON Web Token (JWT) to use for JWT authentication to Vault. |
|
Vault mount point. If not specified, the default mount point for a given auth method is used. Does not apply to token authentication. |
|
Vault namespace where secrets reside. This option requires HVAC 0.7.0+ and Vault 0.11+. Optionally, this may be achieved by prefixing the authentication mount point and/or secret path with the namespace (e.g If environment variable |
|
Authentication password. |
|
URL(s) to the proxies used to access the Vault service. It can be a string or a dict. If it’s a dict, provide the scheme (eg. If it’s a string, provide a single URL that will be used as the proxy for both A string that can be interpreted as a dictionary will be converted to one (see examples). You can specify a different proxy for HTTP and HTTPS resources. If not specified, environment variables from the Requests library are used. |
|
The AWS region for which to create the connection. |
|
Allows for retrying on errors, based on the Retry class in the urllib3 library. This collection defines recommended defaults for retrying connections to Vault. This option can be specified as a positive number (integer) or dictionary. If this option is not specified or the number is A number sets the total number of retries, and uses collection defaults for the other settings. A dictionary value is used directly to initialize the For detailed information on retries, see the collection User Guide. |
|
Controls whether and how to show messages on retries. This has no effect if a request is not retried. Choices:
|
|
Vault Role ID or name. Used in For |
|
Secret ID to be used for Vault AppRole authentication. |
|
Sets the connection timeout in seconds. If not set, then the |
|
Vault token. Token may be specified explicitly, through the listed [env] vars, and also through the If no token is supplied, explicitly or through env, then the plugin will check for a token file, as determined by token_path and token_file. The order of token loading (first found wins) is |
|
If no token is specified, will try to read the token from this file in token_path. Default: “.vault-token” |
|
If no token is specified, will try to read the token_file from this path. |
|
For token auth, will perform a Disable if your token does not have the Choices:
|
|
URL to the Vault service. If not specified by any other means, the value of the If |
|
Authentication user name. |
|
Controls verification and validation of SSL certificates, mostly you only want to turn off with self signed ones. Will be populated with the inverse of Will default to Choices:
|
Notes
Note
A login is a write operation (creating a token persisted to storage), so this module always reports
changed=True
, except when used withtoken
auth, because no new token is created in that case. For the purposes of Ansible playbooks however, it may be more useful to setchanged_when=false
if you’re doing idempotency checks against the target system.The
none
auth method is not valid for this module because there is no response to return.With
token
auth, no actual login is performed. Instead, the given token’s additional information is returned in a structure that resembles what login responses look like.The
token
auth method will only return full information if token_validate=True. If the token does not have thelookup-self
capability, this will fail. If token_validate=False, only the token value itself will be returned in the structure.In check mode, this module will not perform a login, and will instead return a basic structure with an empty token. However this may not be useful if the token is required for follow on tasks. It may be better to use this module with
check_mode=no
in order to have a valid token that can be used.
See Also
See also
- community.hashi_vault.vault_login lookup
The official documentation for the
community.hashi_vault.vault_login
lookup plugin.- community.hashi_vault.vault_login_token filter
The official documentation for the
community.hashi_vault.vault_login_token
filter plugin.
Examples
- name: Login and use the resulting token
community.hashi_vault.vault_login:
url: https://vault:8201
auth_method: userpass
username: user
password: '{{ passwd }}'
register: login_data
- name: Retrieve an approle role ID (token via filter)
community.hashi_vault.vault_read:
url: https://vault:8201
auth_method: token
token: '{{ login_data | community.hashi_vault.vault_login_token }}'
path: auth/approle/role/role-name/role-id
register: approle_id
- name: Retrieve an approle role ID (token via direct dict access)
community.hashi_vault.vault_read:
url: https://vault:8201
auth_method: token
token: '{{ login_data.login.auth.client_token }}'
path: auth/approle/role/role-name/role-id
register: approle_id
Return Values
Common return values are documented here, the following are the fields unique to this module:
Key |
Description |
---|---|
The result of the login against the given auth method. Returned: success |
|
The Returned: success |
|
Contains the token provided by the login operation (or the input token when auth_method=token). Returned: success |
|
The Returned: success, when available |
Authors
Brian Scholer (@briantist)
Collection links
Issue Tracker Repository (Sources) Discussion, Q&A, troubleshooting Communication