Parameter |
Choices/Defaults |
Comments |
allowed_roles
-
|
Default:
[]
|
list of the roles allowed to use this connection. Defaults to empty (no roles), if contains a "*" any role can use this connection.
|
authtype
-
|
Choices:
- token
- userpass
- github
- ldap
- approle
Default:
"token or environment variable `VAULT_AUTHTYPE`"
|
authentication type
|
aws_header
-
|
Default:
"to environment variable `VAULT_AWS_HEADER`"
|
X-Vault-AWS-IAM-Server-ID Header value to prevent replay attacks.
|
ca_cert
-
|
Default:
"to environment variable `VAULT_CACERT`"
|
Path to a PEM-encoded CA cert file to use to verify the Vault server TLS certificate
|
ca_path
-
|
Default:
"to environment variable `VAULT_CAPATH`"
|
Path to a directory of PEM-encoded CA cert files to verify the Vault server TLS certificate. If ca_cert is specified, its value will take precedence
|
client_cert
-
|
Default:
"to environment variable `VAULT_CLIENT_CERT`"
|
Path to a PEM-encoded client certificate for TLS authentication to the Vault server
|
client_key
-
|
Default:
"to environment variable `VAULT_CLIENT_KEY`"
|
Path to an unencrypted PEM-encoded private key matching the client certificate
|
config_file
-
|
|
Optional location of file containing relevant db configuration info. use either this or the following ansible params in your play
|
connection_details
-
|
|
root level database credential for example username, password, connection_url.
|
login_mount_point
-
|
Default:
"value of authtype or environment varialbe `VAULT_LOGIN_MOUNT_POINT`"
|
authentication mount point
|
mount_point
-
|
Default:
"database"
|
name of the secret engine mount name.
|
namespace
-
|
Default:
"to environment variable VAULT_NAMESPACE"
|
namespace for vault
|
password
-
|
Default:
"to environment variable `VAULT_PASSWORD`"
|
password to login to vault.
|
plugin_name
-
|
|
name of database plugin used. see out of the box list at https://www.vaultproject.io/docs/secrets/databases/index.html
|
root_credentials_rotate_statements
-
|
Default:
[]
|
Specifies the database statements to be executed to rotate the root user's credentials. See the plugin's API page for more information on support and formatting for this parameter.
|
state
-
|
Default:
"present"
|
should configuration be present or absent
|
token
-
|
Default:
"to environment variable `VAULT_TOKEN`"
|
token for vault
|
url
-
|
Default:
"to environment variable `VAULT_ADDR`"
|
url for vault
|
username
-
|
Default:
"to environment variable `VAULT_USER`"
|
username to login to vault.
|
verify
-
|
Default:
"to environment variable `VAULT_SKIP_VERIFY`"
|
If set, do not verify presented TLS certificate before communicating with Vault server. Setting this variable is not recommended except during testing
|
verify_connection
-
|
Default:
"yes"
|
Specifies if the connection is verified during initial configuration. Defaults to true.
|