-
Notifications
You must be signed in to change notification settings - Fork 65
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support writing to Vault #174
Comments
If I understand it correctly, #162 is about specific tools for kv2. The However, #162 also contains a more general point about testing. What is the estimated timeline to get the testing infrastructure in line for that and is there a more fine-grained list of tasks which would have to be resolved for that? The challenge for us is that we'd like to use this collection within the next month or so to be able to actually write stuff into vault from ansible. For this, we can allocate a bit of time to do implementation work if necessary, including helping to improve the CI checks. (Our fallback path would be to either use https://github.com/TerryHowe/ansible-modules-hashivault [which does seem a bit unmaintained at this point in time] or make command calls to |
@horazont I apologize for the delay, I though I responded to the above already!
That is exactly how I see
I understand, thank you for the context! I will say that I don't see this being ready for you within the next month or so, just because the last two months are quite busy for me, so the planned work I have is in progress and moving along, but slowly.
I can recommend two alternative workarounds, that are similar but distinct:
Notes about Option 1You'll be able to see the tests run in your fork's GitHub, which will help somewhat in ensuring some level of alignment, for a future contribution. You can keep the fork maintained by rebasing from upstream. Your local setup where you need to use it might be a little annoying, having to install the collection from your fork. Notes about Option 2The module utils in this collection are all considered internal, so they can change anytime in a way that breaks the interface. Actually, this is still an issue with Option 1 too, but it's something to consider. I would not recommend either of these options for you for long term use for that reason. With Option 2, you can keep this stuff committed in your repo, or maintain a separate collection internally, or whatever you like, while not affecting how your Ansible uses consume the upstream collection. |
Alright, so plans, as usual, have been deferred here, too. Things are becoming more relevant now and I wonder if the status on your side of things has remained the same? To be honest, I have never started an ansible module from scratch so I'm not quite sure how the necessary cross-importing for option 2 would work, but I suppose that can be figured out. That way would probably be preferable for us as that tends to be easier than trying to convince ansible to pull stuff it knows about from a non-default source. In addition, I expect this to break more loudly when we diverge from upstream (you), because we'll notice when things break on automatic dependency updates, while we might otherwise simply not rebas our fork :). |
The cross-importing just works, you reference the collection you want to import from (you can check the existing content here, it doesn't work only because the content is within the same collection). I still absolutely plan to implement In this collection, there's two new plugins on the way #216 and #213 (these wouldn't have been higher on my list, but I was prioritizing contributors/requests), |
SUMMARY
Support writing to Vault. Like
vault_read
, there should be avault_write
action. This is useful with secrets engines which use writes to generate data, such as PKI (generating a certificate), SSH (signing a key) etc.ISSUE TYPE
COMPONENT NAME
New, I guess? (Sorry, I don't really have a clue what is meant by "component" here)
ADDITIONAL INFORMATION
This is how I imagine it could look, using the SSH engine as an example:
The text was updated successfully, but these errors were encountered: