def main(): argspec = hashivault_argspec() argspec['name'] = dict(required=True, type='str') argspec['bound_ami_id'] = dict(required=False, type='str') argspec['bound_vpc_id'] = dict(required=False, type='str') argspec['inferred_entity_type'] = dict(required=True, type='str') argspec['inferred_aws_region'] = dict(required=False, type='str') argspec['auth_type'] = dict(required=True, type='str') argspec['bound_account_id'] = dict(required=False, type='str') argspec['bound_iam_role_arn'] = dict(required=False, type='str') argspec['bound_iam_instance_profile_arn'] = dict(required=False, type='str') argspec['bound_ec2_instance_id'] = dict(required=False, type='str') argspec['bound_subnet_id'] = dict(required=False, type='str') argspec['allow_instance_migration'] = dict(required=False, type='bool') argspec['disallow_reauthentication'] = dict(required=False, type='bool') argspec['resolve_aws_unique_ids'] = dict(required=False, type='bool') argspec['token_max_ttl'] = dict(required=False, type='int') argspec['token_ttl'] = dict(required=False, type='int') module = hashivault_init(argspec) result = hashivault_aws_ec2_role_create(module.params) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() module = hashivault_init(argspec) result = hashivault_approle_role_list(module.params) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() module = hashivault_init(argspec) result = hashivault_generate_root_status(module.params) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() module = hashivault_init(argspec) result = hashivault_rekey_cancel(module.params) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['secret'] = dict(default='', type='str') module = hashivault_init(argspec) result = hashivault_list(module.params) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['name'] = dict(required=True, type='str') module = hashivault_init(argspec) result = hashivault_policy_get(module.params) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['pgp_key'] = dict(required=False, type='str', default='') module = hashivault_init(argspec) result = hashivault_generate_root_init(module.params) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['standby_ok'] = dict(required=False, type='bool', default=True) argspec['method'] = dict(required=False, default="HEAD") module = hashivault_init(argspec) result = hashivault_cluster_status(module.params) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['name'] = dict(required=True, type='str') argspec['mount_point'] = dict(required=False, type='str', default='userpass') module = hashivault_init(argspec) result = hashivault_userpass_delete(module.params) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['name'] = dict(required=True, type='str') argspec['secret'] = dict(required=True, type='str') module = hashivault_init(argspec) result = hashivault_approle_role_secret_delete(module.params) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['mount_point'] = dict(required=True, type='str') argspec['default_lease_ttl'] = dict(required=False, type='int', default=None) argspec['max_lease_ttl'] = dict(required=False, type='int', default=None) module = hashivault_init(argspec) result = hashivault_mount_tune(module) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['name'] = dict(required=True, type='str') argspec['description'] = dict(required=False, type='str') argspec['mount_point'] = dict(required=False, type='str', default=None) module = hashivault_init(argspec) result = hashivault_auth_enable(module.params) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['renew_token'] = dict(required=False, type='str') argspec['increment'] = dict(required=False, type='str', default=None) argspec['wrap_ttl'] = dict(required=False, type='int') module = hashivault_init(argspec) result = hashivault_token_renew(module.params) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['revoke_token'] = dict(required=False, type='str') argspec['accessor'] = dict(required=False, type='bool', default=False) argspec['orphan'] = dict(required=False, type='bool', default=False) module = hashivault_init(argspec) result = hashivault_token_revoke(module.params) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['name'] = dict(required=True, type='str') argspec['cidr_list'] = dict(required=False, type='str') argspec['metadata'] = dict(required=False, type='dict') argspec['wrap_ttl'] = dict(required=False, type='str') module = hashivault_init(argspec) result = hashivault_approle_role_secret_create(module.params) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['secret_shares'] = dict(required=False, type='int', default=5) argspec['secret_threshold'] = dict(required=False, type='int', default=3) argspec['pgp_keys'] = dict(required=False, type='list', default=[]) argspec['backup'] = dict(required=False, type='bool', default=False) module = hashivault_init(argspec) result = hashivault_rekey_init(module.params) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['version'] = dict(required=False, type='int', default=1) argspec['mount_point'] = dict(required=False, type='str', default='secret') argspec['secret'] = dict(required=True, type='str') argspec['update'] = dict(required=False, default=False, type='bool') argspec['data'] = dict(required=False, default={}, type='dict') module = hashivault_init(argspec, supports_check_mode=True) result = hashivault_write(module) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['name'] = dict(required=True, type='str') argspec['backend'] = dict(required=True, type='str') argspec['description'] = dict(required=False, type='str') argspec['config'] = dict(required=False, type='dict') argspec['options'] = dict(required=False, type='dict') module = hashivault_init(argspec) result = hashivault_secret_enable(module.params) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['role'] = dict(required=True, type='str') argspec['common_name'] = dict(required=True, type='str') argspec['extra_params'] = dict(required=False, type='dict', default={}) argspec['mount_point'] = dict(required=False, type='str', default='pki') module = hashivault_init(argspec) result = hashivault_pki_cert_issue(module) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['name'] = dict(required=True, type='str') argspec['backend'] = dict(required=False, type='str', default='') argspec['description'] = dict(required=False, type='str') argspec['config'] = dict(required=False, type='dict', default={'default_lease_ttl': DEFAULT_TTL, 'max_lease_ttl': DEFAULT_TTL, 'force_no_cache': False}) argspec['state'] = dict(required=False, type='str', choices=['present', 'enabled', 'absent', 'disabled'], default='present') argspec['options'] = dict(required=False, type='dict', default={'version': '1'}) module = hashivault_init(argspec) result = hashivault_secret_engine(module) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['name'] = dict(required=True, type='str') argspec['pass'] = dict(required=False, type='str', default=None) argspec['pass_update'] = dict(required=False, type='bool', default=False) argspec['policies'] = dict(required=False, type='list', default=[]) argspec['state'] = dict(required=False, choices=['present', 'absent'], default='present') argspec['mount_point'] = dict(required=False, type='str', default='userpass') module = hashivault_init(argspec) result = hashivault_userpass(module.params) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['name'] = dict(required=True, type='str', default=None) argspec['mount_point'] = dict(required=False, type='str', default='ldap') argspec['policies'] = dict(required=False, type='list', default=[]) argspec['state'] = dict(required=False, choices=['present', 'absent'], default='present') module = hashivault_init(argspec) result = hashivault_ldap_group(module.params) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['version'] = dict(required=False, type='int', default=1) argspec['mount_point'] = dict(required=False, type='str', default='secret') argspec['secret'] = dict(required=True, type='str') argspec['key'] = dict(required=False, type='str') argspec['register'] = dict(required=False, type='str') argspec['default'] = dict(required=False, default=None, type='str') module = hashivault_init(argspec) result = hashivault_read(module.params) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['name'] = dict(required=True, type='str') argspec['pass'] = dict(required=True, type='str') argspec['policies'] = dict(required=False, type='str', default='default') argspec['mount_point'] = dict(required=False, type='str', default='userpass') module = hashivault_init(argspec) result = hashivault_userpass_create(module.params) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['name'] = dict(required=True, type='str', default=None) argspec['alias_id'] = dict(required=False, type='str', default=None) argspec['entity_name'] = dict(required=False, type='str', defualt=None) argspec['canonical_id'] = dict(required=False, type='str', default=None) argspec['mount_accessor'] = dict(required=False, type='str', default=None) argspec['state'] = dict(required=False, choices=['present', 'absent'], default='present') module = hashivault_init(argspec) result = hashivault_identity_entity_alias(module.params) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['name'] = dict(required=False, type='str', default=None) argspec['id'] = dict(required=False, type='str', default=None) argspec['metadata'] = dict(required=False, type='dict', default=None) argspec['disabled'] = dict(required=False, type='bool', default=None) argspec['policies'] = dict(required=False, type='list', default=None) argspec['state'] = dict(required=False, choices=['present', 'absent'], default='present') module = hashivault_init(argspec) result = hashivault_identity_entity(module.params) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['pem_bundle'] = dict(required=True, type='str') argspec['mount_point'] = dict(required=False, type='str', default='pki') supports_check_mode = True module = hashivault_init(argspec, supports_check_mode) result = hashivault_pki_ca_set(module) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['version'] = dict(required=False, type='int', default=1) argspec['mount_point'] = dict(required=False, type='str', default='secret') argspec['secret'] = dict(required=True, type='str') argspec['key'] = dict(required=False, type='str') argspec['default'] = dict(required=False, default=None, type='str') argspec['secret_version'] = dict(required=False, type='int') module = hashivault_init(argspec) result = hashivault_read(module.params) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['name'] = dict(required=True, type='str') argspec['rules'] = dict(required=False, type='str') argspec['rules_file'] = dict(required=False, type='str') argspec['state'] = dict(required=False, choices=['present', 'absent'], default='present') mutually_exclusive = [['rules', 'rules_file']] module = hashivault_init(argspec, mutually_exclusive=mutually_exclusive) result = hashivault_policy(module.params) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['name'] = dict(required=True, type='str') argspec['azure_role'] = dict(required=False, type='str') argspec['azure_role_file'] = dict(required=False, type='str') argspec['mount_point'] = dict(required=False, type='str', default='azure') supports_check_mode = True mutually_exclusive = [['azure_role', 'azure_role_file']] module = hashivault_init(argspec, supports_check_mode=supports_check_mode, mutually_exclusive=mutually_exclusive) result = hashivault_azure_secret_engine_role(module) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['version'] = dict(required=False, type='int', default=1) argspec['mount_point'] = dict(required=False, type='str', default='secret') argspec['secret'] = dict(required=True, type='str') argspec['update'] = dict(required=False, default=False, type='bool') argspec['data'] = dict(required=False, default={}, type='dict', no_log=True) argspec['alternate_data'] = dict(required=False, default={}, type='dict') argspec['cas'] = dict(required=False, type='int') module = hashivault_init(argspec, supports_check_mode=True) result = hashivault_write(module) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['secret_shares'] = dict(required=False, type='int', default=5) argspec['secret_threshold'] = dict(required=False, type='int', default=3) argspec['pgp_keys'] = dict(required=False, type='list', default=[], no_log=True) argspec['backup'] = dict(required=False, type='bool', default=False) module = hashivault_init(argspec) result = hashivault_rekey_init(module.params) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['method_type'] = dict(required=True, type='str') argspec['description'] = dict(required=False, type='str', default='') argspec['state'] = dict(required=False, type='str', default='enabled', choices=['enabled', 'disabled', 'enable', 'disable']) argspec['mount_point'] = dict(required=False, type='str', default=None) argspec['config'] = dict(required=False, type='dict', default=DEFAULT_CONFIG) module = hashivault_init(argspec, supports_check_mode=True) result = hashivault_auth_method(module) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['name'] = dict(required=True, type='str') argspec['pass'] = dict(required=False, type='str', default=None, no_log=True) argspec['pass_update'] = dict(required=False, type='bool', default=False) argspec['policies'] = dict(required=False, type='list', default=[]) argspec['token_bound_cidrs'] = dict(required=False, type='list', default=[]) argspec['state'] = dict(required=False, choices=['present', 'absent'], default='present') argspec['mount_point'] = dict(required=False, type='str', default='userpass') module = hashivault_init(argspec) result = hashivault_userpass(module.params) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['name'] = dict(required=False, type='str', default=None) argspec['id'] = dict(required=False, type='str', default=None) argspec['metadata'] = dict(required=False, type='dict', default=None) argspec['disabled'] = dict(required=False, type='bool', default=None) argspec['policies'] = dict(required=False, type='list', default=None) argspec['state'] = dict(required=False, choices=['present', 'absent'], default='present') module = hashivault_init(argspec) result = hashivault_identity_entity(module.params) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['issuing_certificates'] = dict(required=False, type='list', default=[]) argspec['crl_distribution_points'] = dict(required=False, type='list', default=[]) argspec['ocsp_servers'] = dict(required=False, type='list', default=[]) argspec['mount_point'] = dict(required=False, type='str', default='pki') supports_check_mode = True module = hashivault_init(argspec, supports_check_mode) result = hashivault_pki_url(module) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['name'] = dict(required=True, type='str', default=None) argspec['alias_id'] = dict(required=False, type='str', default=None) argspec['group_name'] = dict(required=False, type='str', default=None) argspec['canonical_id'] = dict(required=False, type='str', default=None) argspec['mount_accessor'] = dict(required=False, type='str', default=None) argspec['state'] = dict(required=False, choices=['present', 'absent'], default='present') module = hashivault_init(argspec) result = hashivault_identity_group_alias(module.params) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): # separate long default value to pass linting default_group_filter = '(|(memberUid={{.Username}})(member={{.UserDN}})(uniqueMember={{.UserDN}}))' argspec = hashivault_argspec() argspec['description'] = dict(required=False, type='str') argspec['mount_point'] = dict(required=False, type='str', default='ldap') argspec['ldap_url'] = dict(required=False, type='str', default='ldap://127.0.0.1') argspec['case_sensitive_names'] = dict(required=False, type='bool', default=False) argspec['starttls'] = dict(required=False, type='bool', default=False) argspec['tls_min_version'] = dict(required=False, type='str', default='tls12') argspec['tls_max_version'] = dict(required=False, type='str', default='tls12') argspec['insecure_tls'] = dict(required=False, type='bool', default=False) argspec['certificate'] = dict(required=False, type='str', default='') argspec['bind_dn'] = dict(required=False, type='str', default='') argspec['bind_pass'] = dict(required=False, type='str', default=None, no_log=True) argspec['user_attr'] = dict(required=False, type='str', default='cn') argspec['user_dn'] = dict(required=False, type='str', default='') argspec['discover_dn'] = dict(required=False, type='bool', default=False) argspec['deny_null_bind'] = dict(required=False, type='bool', default=True) argspec['upn_domain'] = dict(required=False, type='str', default='') argspec['group_filter'] = dict(required=False, type='str', default=default_group_filter) argspec['group_attr'] = dict(required=False, type='str', default='cn') argspec['group_dn'] = dict(required=False, type='str', default='') argspec['use_token_groups'] = dict(required=False, type='bool', default=False) module = hashivault_init(argspec, supports_check_mode=True) result = hashivault_auth_ldap(module) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['csr'] = dict(required=True, type='str') argspec['role'] = dict(required=False, type='str') argspec['common_name'] = dict(required=False, type='str') argspec['extra_params'] = dict(required=False, type='dict', default={}) argspec['mount_point'] = dict(required=False, type='str', default='pki') argspec['type'] = dict(required=False, type='str', default='certificate', choices=["certificate", "intermediate", "verbatim"]) module = hashivault_init(argspec) result = hashivault_pki_cert_sign(module) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['mount_point'] = dict(required=False, type='str', default='azure') argspec['subscription_id'] = dict(required=False, type='str') argspec['tenant_id'] = dict(required=False, type='str') argspec['client_id'] = dict(required=False, type='str') argspec['client_secret'] = dict(required=False, type='str') argspec['environment'] = dict(required=False, type='str', default='AzurePublicCloud') argspec['config_file'] = dict(required=False, type='str', default=None) required_together = [['subscription_id', 'client_id', 'client_secret', 'tenant_id']] module = hashivault_init(argspec, supports_check_mode=True, required_together=required_together) result = hashivault_azure_secret_engine_config(module) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['mount_point'] = dict(required=False, type='str', default='azure') argspec['tenant_id'] = dict(required=False, type='str') argspec['client_id'] = dict(required=False, type='str') argspec['client_secret'] = dict(required=False, type='str') argspec['environment'] = dict(required=False, type='str', default='AzurePublicCloud') argspec['resource'] = dict(required=False, type='str', default='https://management.azure.com') argspec['config_file'] = dict(required=False, type='str', default=None) supports_check_mode=True required_together=[['client_id', 'client_secret', 'tenant_id']] module = hashivault_init(argspec, supports_check_mode, required_together) result = hashivault_azure_auth_config(module) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['max_retries'] = dict(required=False, type='int') argspec['access_key'] = dict(required=False, type='str') argspec['secret_key'] = dict(required=False, type='str') argspec['endpoint'] = dict(required=False, type='str') argspec['iam_endpoint'] = dict(required=False, type='str') argspec['sts_endpoint'] = dict(required=False, type='str') argspec['iam_server_id_header_value'] = dict(required=False, type='str') argspec['mount_point'] = dict(required=False, default='aws', type='str') argspec['state'] = dict(required=False, choices=['present', 'absent'], default='present') module = hashivault_init(argspec) result = hashivault_aws_auth_config(module.params) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['state'] = dict(required=False, type='str', default='present', choices=['present', 'absent']) argspec['name'] = dict(required=True, type='str') argspec['mount_point'] = dict(required=False, type='str', default='oidc') argspec['user_claim'] = dict(required=False, type='str', default='sub') argspec['allowed_redirect_uris'] = dict(required=True, type='list') argspec['bound_audiences'] = dict(required=False, type='list', default=[]) argspec['bound_subject'] = dict(required=False, type='str', default='') argspec['bound_claims'] = dict(required=False, type='dict') argspec['groups_claim'] = dict(required=False, type='str', default='') argspec['claim_mappings'] = dict(required=False, type='dict') argspec['oidc_scopes'] = dict(required=False, type='list', default=[]) argspec['token_ttl'] = dict(required=False, type='int', default=0) argspec['token_max_ttl'] = dict(required=False, type='int', default=0) argspec['token_policies'] = dict(required=False, type='list', default=[]) argspec['policies'] = dict(required=False, type='list', default=[]) argspec['token_bound_cidrs'] = dict(required=False, type='list', default=[]) argspec['token_explicit_max_ttl'] = dict(required=False, type='int', default=0) argspec['token_no_default_policy'] = dict(required=False, type='bool', default=False) argspec['token_num_uses'] = dict(required=False, type='int', default=0) argspec['token_period'] = dict(required=False, type='int', default=0) argspec['token_type'] = dict(required=False, type='str', default='default') argspec['clock_skew_leeway'] = dict(required=False, type='int', default=0) argspec['expiration_leeway'] = dict(required=False, type='int', default=0) argspec['not_before_leeway'] = dict(required=False, type='int', default=0) supports_check_mode = False module = hashivault_init(argspec, supports_check_mode) result = hashivault_oidc_auth_role(module) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['name'] = dict(required=True, type='str') argspec['bind_secret_id'] = dict(required=False, type='bool') argspec['bound_cidr_list'] = dict(required=False, type='list') argspec['policies'] = dict(required=True, type='list') argspec['secret_id_num_uses'] = dict(required=False, type='str') argspec['secret_id_ttl'] = dict(required=False, type='str') argspec['token_num_uses'] = dict(required=False, type='int') argspec['token_ttl'] = dict(required=False, type='str') argspec['token_max_ttl'] = dict(required=False, type='str') argspec['period'] = dict(required=False, type='str') argspec['enable_local_secret_ids'] = dict(required=False, type='bool') module = hashivault_init(argspec) result = hashivault_approle_role_create(module.params) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['device_type'] = dict(required=True, type='str') argspec['description'] = dict(required=False, type='str') argspec['options'] = dict(required=False, type='dict') argspec['path'] = dict(required=False, type='str') argspec['state'] = dict(required=False, type='str', default='enabled', choices=[ 'enabled', 'enable', 'present', 'disabled', 'disable', 'absent' ]) module = hashivault_init(argspec) result = hashivault_audit(module.params) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['state'] = dict(required=False, choices=['present', 'absent'], default='present') argspec['name'] = dict(required=True, type='str') argspec['mount_point'] = dict(required=False, type='str', default='approle') argspec['cidr_list'] = dict(required=False, type='str') argspec['metadata'] = dict(required=False, type='dict') argspec['wrap_ttl'] = dict(required=False, type='str') argspec['secret'] = dict(required=False, type='str') module = hashivault_init(argspec, supports_check_mode=True) result = hashivault_approle_role_secret(module) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['name'] = dict(required=True, type='str') argspec['state'] = dict(required=False, type='str', default='present', choices=['present', 'absent']) argspec['mount_point'] = dict(required=False, type='str', default='database') argspec['config_file'] = dict(required=False, type='str', default=None) argspec['plugin_name'] = dict(required=False, type='str') argspec['allowed_roles'] = dict(required=False, type='list', default=[]) argspec['root_credentials_rotate_statements'] = dict(required=False, type='list', default=[]) argspec['verify_connection'] = dict(required=False, type='bool', default=True) argspec['connection_details'] = dict(required=True, type='dict') required_one_of = [['config_file', 'connection_details']] module = hashivault_init(argspec, supports_check_mode=True, required_one_of=required_one_of) result = hashivault_db_secret_engine_config(module) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['name'] = dict(required=True, type='str') argspec['bind_secret_id'] = dict(required=False, type='bool') argspec['bound_cidr_list'] = dict(required=False, type='list') argspec['policies'] = dict(required=True, type='list') argspec['secret_id_num_uses'] = dict(required=False, type='str') argspec['secret_id_ttl'] = dict(required=False, type='str') argspec['token_num_uses'] = dict(required=False, type='int') argspec['token_ttl'] = dict(required=False, type='str') argspec['token_max_ttl'] = dict(required=False, type='str') argspec['period'] = dict(required=False, type='str') argspec['enable_local_secret_ids'] = dict(required=False, type='bool') module = hashivault_init(argspec) result = hashivault_approle_role_create(module.params) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['name'] = dict(required=True, type='str') argspec['state'] = dict(required=False, type='str', default='present', choices=['present', 'absent']) argspec['role_file'] = dict(required=False, type='str') argspec['mount_point'] = dict(required=False, type='str', default='database') argspec['token_ttl'] = dict(required=False, type='int', default=0) argspec['token_max_ttl'] = dict(required=False, type='int', default=0) argspec['creation_statements'] = dict(required=False, type='list', default=[]) argspec['revocation_statements'] = dict(required=False, type='list', default=[]) argspec['rollback_statements'] = dict(required=False, type='list', default=[]) argspec['renew_statements'] = dict(required=False, type='list', default=[]) argspec['db_name'] = dict(required=False, type='str') module = hashivault_init(argspec, supports_check_mode=True) result = hashivault_db_secret_engine_role(module) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['mount_point'] = dict(required=False, type='str', default='oidc') argspec['bound_issuer'] = dict(required=False, type='str', default='') argspec['jwks_ca_pem'] = dict(required=False, type='str', default='') argspec['jwks_url'] = dict(required=False, type='str') argspec['jwt_supported_algs'] = dict(required=False, type='list', default=[]) argspec['jwt_validation_pubkeys'] = dict(required=False, type='list', default=[]) argspec['oidc_discovery_url'] = dict(required=False, type='str') argspec['oidc_discovery_ca_pem'] = dict(required=False, type='str', default='') argspec['oidc_client_id'] = dict(required=False, type='str') argspec['oidc_client_secret'] = dict(required=False, type='str') argspec['default_role'] = dict(required=False, type='str') required_one_of = [['oidc_discovery_url', 'jwks_url']] module = hashivault_init(argspec, supports_check_mode=True, required_one_of=required_one_of) result = hashivault_oidc_auth_method_config(module) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['name'] = dict(required=True, type='str') argspec['state'] = dict(required=False, type='str', default='present', choices=['present', 'absent']) argspec['mount_point'] = dict(required=False, type='str', default='pki') argspec['role_file'] = dict(required=False, type='str') argspec['config'] = dict(required=False, type='dict') supports_check_mode = True module = hashivault_init(argspec, supports_check_mode) result = hashivault_pki_role(module) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['state'] = dict(required=False, type='str', choices=['present', 'update', 'absent'], default='present') argspec['version'] = dict(required=False, type='int', default=2) argspec['mount_point'] = dict(required=False, type='str', default='secret') argspec['secret'] = dict(required=True, type='str') argspec['data'] = dict(required=False, default={}, type='dict', no_log=True) argspec['cas'] = dict(required=False, type='int') argspec['permanent'] = dict(required=False, type='bool', default=False) module = hashivault_init(argspec, supports_check_mode=True) result = hashivault_secret(module) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['description'] = dict(required=False, type='str') argspec['mount_point'] = dict(required=False, type='str', default='ldap') argspec['ldap_url'] = dict(required=False, type='str', default='ldap://127.0.0.1') argspec['case_sensitive_names'] = dict(required=False, type='bool', default=False) argspec['starttls'] = dict(required=False, type='bool', default=False) argspec['tls_min_version'] = dict(required=False, type='str', default='tls12') argspec['tls_max_version'] = dict(required=False, type='str', default='tls12') argspec['insecure_tls'] = dict(required=False, type='bool', default=False) argspec['certificate'] = dict(required=False, type='str', default='') argspec['bind_dn'] = dict(required=False, type='str', default='') argspec['bind_pass'] = dict(required=False, type='str', default=None, no_log=True) argspec['user_attr'] = dict(required=False, type='str', default='cn') argspec['user_dn'] = dict(required=False, type='str', default='') argspec['discover_dn'] = dict(required=False, type='bool', default=False) argspec['deny_null_bind'] = dict(required=False, type='bool', default=True) argspec['upn_domain'] = dict(required=False, type='str', default='') argspec['group_filter'] = dict(required=False, type='str', default=DEFAULT_GROUP_FILTER) argspec['group_attr'] = dict(required=False, type='str', default='cn') argspec['group_dn'] = dict(required=False, type='str', default='') module = hashivault_init(argspec, supports_check_mode=True) result = hashivault_auth_ldap(module) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['role'] = dict(required=False, type='str') argspec['id'] = dict(required=False, type='str') argspec['policies'] = dict(required=True, type='list') argspec['metadata'] = dict(required=False, type='str') argspec['no_parent'] = dict(required=False, type='bool', default=False) argspec['lease'] = dict(required=False, type='str') argspec['display_name'] = dict(required=True, type='str') argspec['num_uses'] = dict(required=False, type='str') argspec['no_default_policy'] = dict(required=False, type='bool', default=False) argspec['ttl'] = dict(required=False, type='str') argspec['wrap_ttl'] = dict(required=False, type='str') argspec['orphan'] = dict(required=False, type='bool', default=False) argspec['renewable'] = dict(required=False, type='bool') argspec['explicit_max_ttl'] = dict(required=False, type='str') argspec['period'] = dict(required=False, type='str') module = hashivault_init(argspec) result = hashivault_token_create(module.params) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)