def main(): argspec = hashivault_argspec() argspec['name'] = dict(required=True, type='str') argspec['state'] = dict(required=False, type='str', default='present', choices=['present', 'absent']) argspec['mount_point'] = dict(required=False, type='str', default='database') argspec['config_file'] = dict(required=False, type='str', default=None) argspec['db_username'] = dict(required=False, type='str') argspec['db_password'] = dict(required=False, type='str', no_log=True) argspec['plugin_name'] = dict(required=False, type='str') argspec['connection_url'] = dict(required=False, type='str') argspec['allowed_roles'] = dict(required=False, type='list', default=[]) argspec['verify_connection'] = dict(required=False, type='bool', default=True) argspec['root_credentials_rotate_statements'] = dict(required=False, type='list', default=[]) supports_check_mode = True required_one_of = [['config_file', 'connection_url']] module = hashivault_init(argspec, supports_check_mode, required_one_of=required_one_of) result = hashivault_db_secret_engine_config(module) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['name'] = dict(required=True, type='str') argspec['backend'] = dict(required=False, type='str', default='') argspec['description'] = dict(required=False, type='str', default='') argspec['config'] = dict(required=False, type='dict', default={ 'default_lease_ttl': DEFAULT_TTL, 'max_lease_ttl': DEFAULT_TTL, 'force_no_cache': False }) argspec['state'] = dict( required=False, type='str', choices=['present', 'enabled', 'absent', 'disabled'], default='present') argspec['options'] = dict(required=False, type='dict', default={}) argspec['cas_required'] = dict(required=False, type='bool') argspec['max_versions'] = dict(required=False, type='int') module = hashivault_init(argspec) result = hashivault_secret_engine(module) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['name'] = dict(required=True, type='str') argspec['bound_ami_id'] = dict(required=False, type='str') argspec['bound_vpc_id'] = dict(required=False, type='str') argspec['inferred_entity_type'] = dict(required=True, type='str') argspec['inferred_aws_region'] = dict(required=False, type='str') argspec['auth_type'] = dict(required=True, type='str') argspec['bound_account_id'] = dict(required=False, type='str') argspec['bound_iam_role_arn'] = dict(required=False, type='str') argspec['bound_iam_instance_profile_arn'] = dict(required=False, type='str') argspec['bound_ec2_instance_id'] = dict(required=False, type='str') argspec['bound_subnet_id'] = dict(required=False, type='str') argspec['allow_instance_migration'] = dict(required=False, type='bool') argspec['disallow_reauthentication'] = dict(required=False, type='bool') argspec['resolve_aws_unique_ids'] = dict(required=False, type='bool') argspec['token_max_ttl'] = dict(required=False, type='int') argspec['token_ttl'] = dict(required=False, type='int') module = hashivault_init(argspec) result = hashivault_aws_ec2_role_create(module.params) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['name'] = dict(required=True, type='str') argspec['auth_type'] = dict(required=False, type='str') argspec['resolve_aws_unique_ids'] = dict(required=False, type='bool') argspec['bound_ami_id'] = dict(required=False, type='str') argspec['bound_account_id'] = dict(required=False, type='str') argspec['bound_region'] = dict(required=False, type='str') argspec['bound_vpc_id'] = dict(required=False, type='str') argspec['bound_subnet_id'] = dict(required=False, type='str') argspec['bound_iam_role_arn'] = dict(required=False, type='str') argspec['bound_iam_instance_profile_arn'] = dict(required=False, type='str') argspec['bound_ec2_instance_id'] = dict(required=False, type='str') argspec['role_tag'] = dict(required=False, type='str') argspec['bound_iam_principal_arn'] = dict(required=False, type='str') argspec['inferred_entity_type'] = dict(required=False, type='str') argspec['inferred_aws_region'] = dict(required=False, type='str') argspec['ttl'] = dict(required=False, type='int') argspec['max_ttl'] = dict(required=False, type='int') argspec['period'] = dict(required=False, type='int') argspec['policies'] = dict(required=False, type='list') argspec['allow_instance_migration'] = dict(required=False, type='bool') argspec['disallow_reauthentication'] = dict(required=False, type='bool') argspec['mount_point'] = dict(required=False, default='aws', type='str') argspec['state'] = dict(required=False, choices=['present', 'absent'], default='present') module = hashivault_init(argspec) result = hashivault_aws_auth_role(module.params) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['role'] = dict(required=False, type='str') argspec['id'] = dict(required=False, type='str') argspec['policies'] = dict(required=True, type='list') argspec['metadata'] = dict(required=False, type='str') argspec['no_parent'] = dict(required=False, type='bool', default=False) argspec['lease'] = dict(required=False, type='str') argspec['display_name'] = dict(required=True, type='str') argspec['num_uses'] = dict(required=False, type='str') argspec['no_default_policy'] = dict(required=False, type='bool', default=False) argspec['ttl'] = dict(required=False, type='str') argspec['wrap_ttl'] = dict(required=False, type='str') argspec['orphan'] = dict(required=False, type='bool', default=False) argspec['renewable'] = dict(required=False, type='bool') argspec['explicit_max_ttl'] = dict(required=False, type='str') argspec['period'] = dict(required=False, type='str') module = hashivault_init(argspec) result = hashivault_token_create(module.params) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['state'] = dict(required=False, choices=['present', 'absent'], default='present') argspec['name'] = dict(required=True, type='str') argspec['role_file'] = dict(required=False, type='str') argspec['mount_point'] = dict(required=False, type='str', default='approle') argspec['bind_secret_id'] = dict(required=False, type='bool', no_log=True) argspec['bound_cidr_list'] = dict(required=False, type='list') argspec['policies'] = dict(required=False, type='list', default=[]) argspec['secret_id_num_uses'] = dict(required=False, type='str') argspec['secret_id_ttl'] = dict(required=False, type='str') argspec['token_num_uses'] = dict(required=False, type='int') argspec['token_ttl'] = dict(required=False, type='str') argspec['token_max_ttl'] = dict(required=False, type='str') argspec['period'] = dict(required=False, type='str') argspec['enable_local_secret_ids'] = dict(required=False, type='bool') module = hashivault_init(argspec, supports_check_mode=True) result = hashivault_approle_role(module) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['method_type'] = dict(required=True, type='str') argspec['description'] = dict(required=False, type='str') argspec['state'] = dict( required=False, type='str', default='enabled', choices=['enabled', 'disabled', 'enable', 'disable']) argspec['mount_point'] = dict(required=False, type='str', default=None) argspec['config'] = dict(required=False, type='dict', default={ 'default_lease_ttl': DEFAULT_TTL, 'max_lease_ttl': DEFAULT_TTL, 'force_no_cache': False, 'token_type': 'default-service' }) supports_check_mode = True module = hashivault_init(argspec, supports_check_mode=supports_check_mode) result = hashivault_auth_method(module) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['name'] = dict(required=True, type='str') argspec['bound_service_account_names'] = dict(required=False, type='list', default=[]) argspec['bound_service_account_namespaces'] = dict(required=False, type='list', default=[]) argspec['ttl'] = dict(required=False, type='int', default=0) argspec['max_ttl'] = dict(required=False, type='int', default=0) argspec['policies'] = dict(required=False, type='list') argspec['period'] = dict(required=False, type='int', default=0) argspec['mount_point'] = dict(required=False, type='str', default='kubernetes') argspec['role_file'] = dict(required=False, type='str') argspec['state'] = dict(required=False, type='str', default='present', choices=['present', 'absent']) supports_check_mode = True module = hashivault_init(argspec, supports_check_mode) result = hashivault_k8s_auth_role(module) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['bound_issuer'] = dict(required=False, type='str', default='') argspec['jwks_ca_pem'] = dict(required=False, type='str', default='') argspec['jwks_url'] = dict(required=False, type='str') argspec['jwt_supported_algs'] = dict(required=False, type='list', default=[]) argspec['jwt_validation_pubkeys'] = dict(required=False, type='list', default=[]) argspec['oidc_discovery_ca_pem'] = dict(required=False, type='str', default='') argspec['mount_point'] = dict(required=False, type='str', default='oidc') argspec['oidc_discovery_url'] = dict(required=False, type='str') argspec['oidc_client_id'] = dict(required=False, type='str') argspec['oidc_client_secret'] = dict(required=False, type='str') argspec['default_role'] = dict(required=False, type='str') supports_check_mode = True required_one_of = [['oidc_discovery_url', 'jwks_url']] module = hashivault_init(argspec, supports_check_mode, required_one_of=required_one_of) result = hashivault_oidc_auth_method_config(module) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def run(self, terms, variables=None, **kwargs): # self._display.v('Running lookup') argspec = hashivault_argspec() argspec['version'] = dict(required=False, type='int', default=1) argspec['mount_point'] = dict(required=False, type='str', default='secret') argspec['secret'] = dict(required=True, type='str') argspec['key'] = dict(required=False, type='str') argspec['default'] = dict(required=False, default=None, type='str') params = self._get_params(argspec, terms, kwargs) # self._display.v('ARGSPEC: ' + str(argspec)) # self._display.v('KWARGS: ' + str(kwargs)) # self._display.v('PARAMS: ' + str(params)) result = hashivault_read(params=params) if 'value' not in result: path = terms[0] try: key = '/' + terms[1] except IndexError: key = '' raise AnsibleError('Error reading vault %s%s: %s\n%s' % (path, key, result.get('msg', 'msg not set'), result.get('stack_trace', ''))) return [result['value']]
def main(): argspec = hashivault_argspec() argspec['state'] = dict(required=False, type='str', default='present', choices=['present', 'absent']) argspec['name'] = dict(required=True, type='str') argspec['mount_point'] = dict(required=False, type='str', default='oidc') argspec['user_claim'] = dict(required=False, type='str', default='sub') argspec['allowed_redirect_uris'] = dict(required=True, type='list') argspec['bound_audiences'] = dict(required=False, type='list', default=[]) argspec['bound_subject'] = dict(required=False, type='str', default='') argspec['bound_claims'] = dict(required=False, type='dict') argspec['groups_claim'] = dict(required=False, type='str', default='') argspec['claim_mappings'] = dict(required=False, type='dict') argspec['oidc_scopes'] = dict(required=False, type='list', default=[]) argspec['token_ttl'] = dict(required=False, type='int', default=0) argspec['token_max_ttl'] = dict(required=False, type='int', default=0) argspec['token_policies'] = dict(required=False, type='list', default=[]) argspec['policies'] = dict(required=False, type='list', default=[]) argspec['token_bound_cidrs'] = dict(required=False, type='list', default=[]) argspec['token_explicit_max_ttl'] = dict(required=False, type='int', default=0) argspec['token_no_default_policy'] = dict(required=False, type='bool', default=False) argspec['token_num_uses'] = dict(required=False, type='int', default=0) argspec['token_period'] = dict(required=False, type='int', default=0) argspec['token_type'] = dict(required=False, type='str', default='default') argspec['clock_skew_leeway'] = dict(required=False, type='int', default=0) argspec['expiration_leeway'] = dict(required=False, type='int', default=0) argspec['not_before_leeway'] = dict(required=False, type='int', default=0) module = hashivault_init(argspec) result = hashivault_oidc_auth_role(module) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['common_name'] = dict(required=True, type='str') argspec['mount_point'] = dict(required=False, type='str', default='pki') argspec['state'] = dict(required=False, type='str', default='present', choices=['present', 'absent']) argspec['kind'] = dict(required=False, type='str', default='root', choices=['root', 'intermediate']) argspec['type'] = dict(required=False, type='str', default='internal', choices=['internal', 'exported']) argspec['config'] = dict(required=False, type='dict', default={}) supports_check_mode = True module = hashivault_init(argspec, supports_check_mode) result = hashivault_pki_ca(module) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['name'] = dict(required=False, type='str', default=None) argspec['id'] = dict(required=False, type='str', default=None) argspec['group_type'] = dict(required=False, type='str', default='internal') argspec['mount_point'] = dict(required=False, type='str', default='identity') argspec['metadata'] = dict(required=False, type='dict', default={}) argspec['policies'] = dict(required=False, type='list', default=[]) argspec['member_group_ids'] = dict(required=False, type='list', default=None) argspec['member_entity_ids'] = dict(required=False, type='list', default=None) argspec['state'] = dict(required=False, choices=['present', 'absent'], default='present') module = hashivault_init(argspec) result = hashivault_identity_group(module.params) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['name'] = dict(required=True, type='str') argspec['state'] = dict(required=False, type='str', default='present', choices=['present', 'absent']) argspec['role_file'] = dict(required=False, type='str') argspec['policies'] = dict(required=False, type='list') argspec['mount_point'] = dict(required=False, type='str', default='azure') argspec['token_ttl'] = dict(required=False, type='int', default=0) argspec['token_max_ttl'] = dict(required=False, type='int', default=0) argspec['token_period'] = dict(required=False, type='int', default=0) argspec['bound_service_principal_ids'] = dict(required=False, type='list', default=[]) argspec['bound_group_ids'] = dict(required=False, type='list', default=[]) argspec['bound_locations'] = dict(required=False, type='list', default=[]) argspec['bound_subscription_ids'] = dict(required=False, type='list', default=[]) argspec['bound_resource_groups'] = dict(required=False, type='list', default=[]) argspec['bound_scale_sets'] = dict(required=False, type='list', default=[]) argspec['num_uses'] = dict(required=False, type='int', default=0) supports_check_mode = True module = hashivault_init(argspec, supports_check_mode) #, required_one_of) result = hashivault_azure_auth_role(module) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['name'] = dict(required=True, type='str') argspec['state'] = dict(required=False, type='str', default='present', choices=['present', 'absent']) argspec['role_file'] = dict(required=False, type='str') argspec['mount_point'] = dict(required=False, type='str', default='database') argspec['token_ttl'] = dict(required=False, type='int', default=0) argspec['token_max_ttl'] = dict(required=False, type='int', default=0) argspec['creation_statements'] = dict(required=False, type='list', default=[]) argspec['revocation_statements'] = dict(required=False, type='list', default=[]) argspec['rollback_statements'] = dict(required=False, type='list', default=[]) argspec['renew_statements'] = dict(required=False, type='list', default=[]) argspec['db_name'] = dict(required=False, type='str') supports_check_mode = True module = hashivault_init(argspec, supports_check_mode) result = hashivault_db_secret_engine_role(module) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() module = hashivault_init(argspec) result = hashivault_rekey_cancel(module.params) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() module = hashivault_init(argspec) result = hashivault_approle_role_list(module.params) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() module = hashivault_init(argspec) result = hashivault_generate_root_status(module.params) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['pgp_key'] = dict(required=False, type='str', default='') module = hashivault_init(argspec) result = hashivault_generate_root_init(module.params) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['mount_point'] = dict(required=False, type='str', default='approle') module = hashivault_init(argspec) result = hashivault_approle_role_list(module.params) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['name'] = dict(required=True, type='str') module = hashivault_init(argspec) result = hashivault_policy_delete(module.params) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['keys'] = dict(required=True, type='str', no_log=True) module = hashivault_init(argspec) result = hashivault_unseal(module.params) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['secret'] = dict(default='', type='str') module = hashivault_init(argspec) result = hashivault_list(module.params) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['name'] = dict(required=True, type='str') module = hashivault_init(argspec) result = hashivault_policy_get(module.params) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['standby_ok'] = dict(required=False, type='bool', default=True) argspec['method'] = dict(required=False, default="HEAD") module = hashivault_init(argspec) result = hashivault_cluster_status(module.params) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['name'] = dict(required=True, type='str') argspec['secret'] = dict(required=True, type='str') module = hashivault_init(argspec) result = hashivault_approle_role_secret_get(module.params) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['name'] = dict(required=True, type='str') argspec['secret'] = dict(required=True, type='str') module = hashivault_init(argspec) result = hashivault_approle_role_secret_delete(module.params) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['name'] = dict(required=True, type='str') argspec['mount_point'] = dict(required=False, type='str', default='userpass') module = hashivault_init(argspec) result = hashivault_userpass_delete(module.params) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['renew_token'] = dict(required=False, type='str') argspec['increment'] = dict(required=False, type='str', default=None) argspec['wrap_ttl'] = dict(required=False, type='int') module = hashivault_init(argspec) result = hashivault_token_renew(module.params) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['mount_point'] = dict(required=False, type='str', default='pki') module = hashivault_init(argspec) result = hashivault_pki_url_get(module) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['mount_point'] = dict(required=True, type='str') argspec['default_lease_ttl'] = dict(required=False, type='int', default=None) argspec['max_lease_ttl'] = dict(required=False, type='int', default=None) module = hashivault_init(argspec) result = hashivault_mount_tune(module) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['lookup_token'] = dict(required=False, type='str', no_log=True) argspec['accessor'] = dict(required=False, type='bool', default=False) argspec['wrap_ttl'] = dict(required=False, type='int') module = hashivault_init(argspec) result = hashivault_token_lookup(module.params) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['revoke_token'] = dict(required=False, type='str') argspec['accessor'] = dict(required=False, type='bool', default=False) argspec['orphan'] = dict(required=False, type='bool', default=False) module = hashivault_init(argspec) result = hashivault_token_revoke(module.params) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['name'] = dict(required=True, type='str') argspec['description'] = dict(required=False, type='str') argspec['mount_point'] = dict(required=False, type='str', default=None) module = hashivault_init(argspec) result = hashivault_auth_enable(module.params) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['name'] = dict(required=True, type='str') argspec['cidr_list'] = dict(required=False, type='str') argspec['metadata'] = dict(required=False, type='dict') argspec['wrap_ttl'] = dict(required=False, type='str') module = hashivault_init(argspec) result = hashivault_approle_role_secret_create(module.params) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['secret_shares'] = dict(required=False, type='int', default=5) argspec['secret_threshold'] = dict(required=False, type='int', default=3) argspec['pgp_keys'] = dict(required=False, type='list', default=[]) argspec['backup'] = dict(required=False, type='bool', default=False) module = hashivault_init(argspec) result = hashivault_rekey_init(module.params) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['version'] = dict(required=False, type='int', default=1) argspec['mount_point'] = dict(required=False, type='str', default='secret') argspec['secret'] = dict(required=True, type='str') argspec['update'] = dict(required=False, default=False, type='bool') argspec['data'] = dict(required=False, default={}, type='dict') module = hashivault_init(argspec, supports_check_mode=True) result = hashivault_write(module) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['name'] = dict(required=True, type='str') argspec['backend'] = dict(required=True, type='str') argspec['description'] = dict(required=False, type='str') argspec['config'] = dict(required=False, type='dict') argspec['options'] = dict(required=False, type='dict') module = hashivault_init(argspec) result = hashivault_secret_enable(module.params) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['name'] = dict(required=True, type='str', default=None) argspec['alias_id'] = dict(required=False, type='str', default=None) argspec['entity_name'] = dict(required=False, type='str', defualt=None) argspec['canonical_id'] = dict(required=False, type='str', default=None) argspec['mount_accessor'] = dict(required=False, type='str', default=None) argspec['state'] = dict(required=False, choices=['present', 'absent'], default='present') module = hashivault_init(argspec) result = hashivault_identity_entity_alias(module.params) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['name'] = dict(required=False, type='str', default=None) argspec['id'] = dict(required=False, type='str', default=None) argspec['metadata'] = dict(required=False, type='dict', default=None) argspec['disabled'] = dict(required=False, type='bool', default=None) argspec['policies'] = dict(required=False, type='list', default=None) argspec['state'] = dict(required=False, choices=['present', 'absent'], default='present') module = hashivault_init(argspec) result = hashivault_identity_entity(module.params) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['name'] = dict(required=True, type='str') argspec['pass'] = dict(required=False, type='str', default=None) argspec['pass_update'] = dict(required=False, type='bool', default=False) argspec['policies'] = dict(required=False, type='list', default=[]) argspec['state'] = dict(required=False, choices=['present', 'absent'], default='present') argspec['mount_point'] = dict(required=False, type='str', default='userpass') module = hashivault_init(argspec) result = hashivault_userpass(module.params) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['version'] = dict(required=False, type='int', default=1) argspec['mount_point'] = dict(required=False, type='str', default='secret') argspec['secret'] = dict(required=True, type='str') argspec['key'] = dict(required=False, type='str') argspec['register'] = dict(required=False, type='str') argspec['default'] = dict(required=False, default=None, type='str') module = hashivault_init(argspec) result = hashivault_read(module.params) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)
def main(): argspec = hashivault_argspec() argspec['name'] = dict(required=True, type='str') argspec['bind_secret_id'] = dict(required=False, type='bool') argspec['bound_cidr_list'] = dict(required=False, type='list') argspec['policies'] = dict(required=True, type='list') argspec['secret_id_num_uses'] = dict(required=False, type='str') argspec['secret_id_ttl'] = dict(required=False, type='str') argspec['token_num_uses'] = dict(required=False, type='int') argspec['token_ttl'] = dict(required=False, type='str') argspec['token_max_ttl'] = dict(required=False, type='str') argspec['period'] = dict(required=False, type='str') argspec['enable_local_secret_ids'] = dict(required=False, type='bool') module = hashivault_init(argspec) result = hashivault_approle_role_create(module.params) if result.get('failed'): module.fail_json(**result) else: module.exit_json(**result)