summaryrefslogtreecommitdiffstats
path: root/lib/ansible/plugins/filter/vault.yml
blob: 1ad541e9d43b246a563451163238a3170dd219a8 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
DOCUMENTATION:
  name: vault
  author: Brian Coca (@bcoca)
  version_added: "2.12"
  short_description: vault your secrets
  description:
    - Put your information into an encrypted Ansible Vault.
  positional: secret
  options:
    _input:
      description: Data to vault.
      type: string
      required: true
    secret:
      description: Vault secret, the key that lets you open the vault.
      type: string
      required: true
    salt:
      description:
        - Encryption salt, will be random if not provided.
        - While providing one makes the resulting encrypted string reproducible, it can lower the security of the vault.
      type: string
    vault_id:
      description: Secret identifier, used internally to try to best match a secret when multiple are provided.
      type: string
      default: 'filter_default'
    wrap_object:
      description:
        - This toggle can force the return of an C(AnsibleVaultEncryptedUnicode) string object, when C(False), you get a simple string.
        - Mostly useful when combining with the C(to_yaml) filter to output the 'inline vault' format.
      type: bool
      default: False

EXAMPLES: |
  # simply encrypt my key in a vault
  vars:
    myvaultedkey: "{{ keyrawdata|vault(passphrase) }} "

  - name: save templated vaulted data
    template: src=dump_template_data.j2 dest=/some/key/vault.txt
    vars:
      mysalt: '{{2**256|random(seed=inventory_hostname)}}'
      template_data: '{{ secretdata|vault(vaultsecret, salt=mysalt) }}'

RETURN:
  _value:
    description: The vault string that contains the secret data (or C(AnsibleVaultEncryptedUnicode) string object).
    type: string