community.hashi_vault.vault_kv2_write module – Perform a write operation against a KVv2 secret in HashiCorp Vault
Note
This module is part of the community.hashi_vault collection (version 4.2.1).
You might already have this collection installed if you are using the ansible
package.
It is not included in ansible-core
.
To check whether it is installed, run ansible-galaxy collection list
.
To install it, use: ansible-galaxy collection install community.hashi\_vault
.
You need further requirements to be able to use this module,
see Requirements for details.
To use it in a playbook, specify: community.hashi_vault.vault_kv2_write
.
New in community.hashi_vault 4.2.0
Synopsis
Perform a write operation against a KVv2 secret in HashiCorp Vault.
Requirements
The below requirements are needed on the host that executes this module.
hvac
(Python library)For detailed requirements, see the collection requirements page.
Parameters
Parameter |
Comments |
---|---|
Authentication method to be used.
Choices:
|
|
The AWS access key to use. |
|
If specified, sets the value to use for the |
|
The AWS profile |
|
The AWS secret key that corresponds to the access key. |
|
The AWS security token if using temporary access and secret keys. |
|
The client ID (also known as application ID) of the Azure AD service principal or managed identity. Should be a UUID. If not specified, will use the system assigned managed identity. |
|
The client secret of the Azure AD service principal. |
|
The resource URL for the application registered in Azure Active Directory. Usually should not be changed from the default. Default: |
|
The Azure Active Directory Tenant ID (also known as the Directory ID) of the service principal. Should be a UUID. Required when using a service principal to authenticate to Vault, e.g. required when both azure_client_id and azure_client_secret are specified. Optional when using managed identity to authenticate to Vault. |
|
Path to certificate to use for authentication. If not specified by any other means, the |
|
Perform a check-and-set operation. |
|
For |
|
For |
|
KVv2 secret data to write. |
|
The path where the secret backend is mounted. Default: |
|
The JSON Web Token (JWT) to use for JWT authentication to Vault. |
|
Vault mount point. If not specified, the default mount point for a given auth method is used. Does not apply to token authentication. |
|
Vault namespace where secrets reside. This option requires HVAC 0.7.0+ and Vault 0.11+. Optionally, this may be achieved by prefixing the authentication mount point and/or secret path with the namespace (e.g If environment variable |
|
Authentication password. |
|
Vault KVv2 path to be written to. This is relative to the engine_mount_point, so the mount path should not be included. |
|
URL(s) to the proxies used to access the Vault service. It can be a string or a dict. If it’s a dict, provide the scheme (eg. If it’s a string, provide a single URL that will be used as the proxy for both A string that can be interpreted as a dictionary will be converted to one (see examples). You can specify a different proxy for HTTP and HTTPS resources. If not specified, environment variables from the Requests library are used. |
|
Read the secret first and write only when data differs from the read data. Requires If Choices:
|
|
The AWS region for which to create the connection. |
|
Allows for retrying on errors, based on the Retry class in the urllib3 library. This collection defines recommended defaults for retrying connections to Vault. This option can be specified as a positive number (integer) or dictionary. If this option is not specified or the number is A number sets the total number of retries, and uses collection defaults for the other settings. A dictionary value is used directly to initialize the For detailed information on retries, see the collection User Guide. |
|
Controls whether and how to show messages on retries. This has no effect if a request is not retried. Choices:
|
|
Vault Role ID or name. Used in For For |
|
Secret ID to be used for Vault AppRole authentication. |
|
Sets the connection timeout in seconds. If not set, then the |
|
Vault token. Token may be specified explicitly, through the listed [env] vars, and also through the If no token is supplied, explicitly or through env, then the plugin will check for a token file, as determined by token_path and token_file. The order of token loading (first found wins) is |
|
If no token is specified, will try to read the token from this file in token_path. Default: |
|
If no token is specified, will try to read the token_file from this path. |
|
For token auth, will perform a Disable if your token does not have the Choices:
|
|
URL to the Vault service. If not specified by any other means, the value of the If |
|
Authentication user name. |
|
Controls verification and validation of SSL certificates, mostly you only want to turn off with self signed ones. Will be populated with the inverse of Will default to Choices:
|
Attributes
Attribute |
Support |
Description |
---|---|---|
Action group: community.hashi_vault.vault |
Use |
|
Support: partial If read_before_write is If read_before_write is |
Can run in |
See Also
See also
- community.hashi_vault.vault_write
The official documentation on the community.hashi_vault.vault_write module.
- community.hashi_vault.vault_kv2_get
The official documentation on the community.hashi_vault.vault_kv2_get module.
- community.hashi_vault.vault_kv2_delete
The official documentation on the community.hashi_vault.vault_kv2_delete module.
- community.hashi_vault.vault_write lookup
The official documentation for the
community.hashi_vault.vault_write
lookup plugin.- KV2 Secrets Engine
Documentation for the Vault KV secrets engine, version 2.
Examples
- name: Write/create a secret
community.hashi_vault.vault_kv2_write:
url: https://vault:8200
path: hello
data:
foo: bar
- name: Create a secret with CAS (the secret must not exist)
community.hashi_vault.vault_kv2_write:
url: https://vault:8200
path: caspath
cas: 0
data:
foo: bar
- name: Update a secret with CAS
community.hashi_vault.vault_kv2_write:
url: https://vault:8200
path: caspath
cas: 2
data:
hello: world
# This module does not have patch capability built in.
# Patching can be achieved with multiple tasks.
- name: Retrieve current secret
register: current
community.hashi_vault.vault_kv2_get:
url: https://vault:8200
path: hello
## patch without CAS
- name: Update the secret
vars:
values_to_update:
foo: baz
hello: goodbye
community.hashi_vault.vault_kv2_write:
url: https://vault:8200
path: hello
data: >-
{{
current.secret
| combine(values_to_update)
}}
## patch with CAS
- name: Update the secret
vars:
values_to_update:
foo: baz
hello: goodbye
community.hashi_vault.vault_kv2_write:
url: https://vault:8200
path: hello
cas: '{{ current.metadata.version | int }}'
data: >-
{{
current.secret
| combine(values_to_update)
}}
Return Values
Common return values are documented here, the following are the fields unique to this module:
Key |
Description |
---|---|
The raw Vault response. Returned: changed Sample: |
Collection links
Issue Tracker Repository (Sources) Discussion, Q&A, troubleshooting Communication