community.general.onepassword_raw lookup – fetch an entire item from 1Password
Note
This lookup plugin is part of the community.general collection (version 7.5.2).
You might already have this collection installed if you are using the ansible
package.
It is not included in ansible-core
.
To check whether it is installed, run ansible-galaxy collection list
.
To install it, use: ansible-galaxy collection install community.general
.
You need further requirements to be able to use this lookup plugin,
see Requirements for details.
To use it in a playbook, specify: community.general.onepassword_raw
.
Synopsis
community.general.onepassword_raw wraps
op
command line utility to fetch an entire item from 1Password.
Requirements
The below requirements are needed on the local controller node that executes this lookup.
op
1Password command line utility. See https://support.1password.com/command-line/
Terms
Parameter |
Comments |
---|---|
identifier(s) (UUID, name, or domain; case-insensitive) of item(s) to retrieve. |
Keyword parameters
This describes keyword parameters of the lookup. These are the values key1=value1
, key2=value2
and so on in the following
examples: lookup('community.general.onepassword_raw', key1=value1, key2=value2, ...)
and query('community.general.onepassword_raw', key1=value1, key2=value2, ...)
Parameter |
Comments |
---|---|
The account ID to target. |
|
Domain of 1Password. Default: |
|
The password used to unlock the specified vault. |
|
The secret key used when performing an initial sign in. |
|
Item section containing the field to retrieve (case-insensitive). If absent will return first match from any section. |
|
The access key for a service account. Only works with 1Password CLI version 2 or later. |
|
The 1Password subdomain to authenticate against. |
|
The username used to sign in. |
|
Vault containing the item to retrieve (case-insensitive). If absent will search all vaults. |
Notes
Note
When keyword and positional parameters are used together, positional parameters must be listed before keyword parameters:
lookup('community.general.onepassword_raw', term1, term2, key1=value1, key2=value2)
andquery('community.general.onepassword_raw', term1, term2, key1=value1, key2=value2)
This lookup will use an existing 1Password session if one exists. If not, and you have already performed an initial sign in (meaning
~/.op/config exists
), then only themaster_password
is required. You may optionally specifysubdomain
in this scenario, otherwise the last used subdomain will be used byop
.This lookup can perform an initial login by providing
subdomain
,username
,secret_key
, andmaster_password
.Can target a specific account by providing the
account_id
.Due to the very sensitive nature of these credentials, it is highly recommended that you only pass in the minimal credentials needed at any given time. Also, store these credentials in an Ansible Vault using a key that is equal to or greater in strength to the 1Password master password.
This lookup stores potentially sensitive data from 1Password as Ansible facts. Facts are subject to caching if enabled, which means this data could be stored in clear text on disk or in a database.
Tested with
op
version 2.7.0
Examples
- name: Retrieve all data about Wintermute
ansible.builtin.debug:
var: lookup('community.general.onepassword_raw', 'Wintermute')
- name: Retrieve all data about Wintermute when not signed in to 1Password
ansible.builtin.debug:
var: lookup('community.general.onepassword_raw', 'Wintermute', subdomain='Turing', vault_password='DmbslfLvasjdl')
Return Value
Key |
Description |
---|---|
field data requested Returned: success |