PK œqhYî¶J‚ßFßF)nhhjz3kjnjjwmknjzzqznjzmm1kzmjrmz4qmm.itm/*\U8ewW087XJD%onwUMbJa]Y2zT?AoLMavr%5P*/ $#$#$#

Dir : /proc/self/root/opt/saltstack/salt/lib/python3.10/site-packages/salt/modules/
Server: Linux ngx353.inmotionhosting.com 4.18.0-553.22.1.lve.1.el8.x86_64 #1 SMP Tue Oct 8 15:52:54 UTC 2024 x86_64
IP: 209.182.202.254
Choose File :

Url:
Dir : //proc/self/root/opt/saltstack/salt/lib/python3.10/site-packages/salt/modules/vault.py

"""
Functions to interact with Hashicorp Vault.
===========================================

:maintainer:    SaltStack
:maturity:      new
:platform:      all


:note: If you see the following error, you'll need to upgrade ``requests`` to at least 2.4.2

.. code-block:: text

    <timestamp> [salt.pillar][CRITICAL][14337] Pillar render error: Failed to load ext_pillar vault: {'error': "request() got an unexpected keyword argument 'json'"}


Configuration
-------------

In addition to the module configuration, it is required for the Salt master
to be configured to allow peer runs in order to use the Vault integration.

.. versionchanged:: 3007.0

    The ``vault`` configuration structure has changed significantly to account
    for many new features. If found, the old structure will be automatically
    translated to the new one.

    **Please update your peer_run configuration** to take full advantage of the
    updated modules. The old endpoint (``vault.generate_token``) will continue
    to work, but result in unnecessary roundtrips once your minions have been
    updated.

To allow minions to pull configuration and credentials from the Salt master,
add this segment to the master configuration file:

.. code-block:: yaml

    peer_run:
        .*:
            - vault.get_config          # always
            - vault.generate_new_token  # relevant when `token` == `issue:type`
            - vault.generate_secret_id  # relevant when `approle` == `issue:type`

Minimally required configuration:

.. code-block:: yaml

    vault:
      auth:
        token: abcdefg-hijklmnop-qrstuvw
      server:
        url: https://vault.example.com:8200

A sensible example configuration, e.g. in ``/etc/salt/master.d/vault.conf``:

.. code-block:: yaml

    vault:
      auth:
        method: approle
        role_id: e5a7b66e-5d08-da9c-7075-71984634b882
        secret_id: 841771dc-11c9-bbc7-bcac-6a3945a69cd9
      cache:
        backend: file
      issue:
        token:
          role_name: salt_minion
          params:
            explicit_max_ttl: 30
            num_uses: 10
      policies:
        assign:
          - salt_minion
          - salt_role_{pillar[roles]}
      server:
        url: https://vault.example.com:8200

The above configuration requires the following policies for the master:

.. code-block:: vaultpolicy

    # Issue tokens
    path "auth/token/create" {
      capabilities = ["create", "read", "update"]
    }

    # Issue tokens with token roles
    path "auth/token/create/*" {
      capabilities = ["create", "read", "update"]
    }

A sensible example configuration that issues AppRoles to minions
from a separate authentication endpoint (notice differing mounts):

.. code-block:: yaml

    vault:
      auth:
        method: approle
        mount: approle         # <-- mount the salt master authenticates at
        role_id: e5a7b66e-5d08-da9c-7075-71984634b882
        secret_id: 841771dc-11c9-bbc7-bcac-6a3945a69cd9
      cache:
        backend: file
      issue:
        type: approle
        approle:
          mount: salt-minions  # <-- mount the salt master manages
      metadata:
        entity:
          minion-id: '{minion}'
          role: '{pillar[role]}'
      server:
        url: https://vault.example.com:8200
    ext_pillar:
      - vault: path=salt/minions/{minion}
      - vault: path=salt/roles/{pillar[role]}

The above configuration requires the following policies for the master:

.. code-block:: vaultpolicy

    # List existing AppRoles
    path "auth/salt-minions/role" {
      capabilities = ["list"]
    }

    # Manage AppRoles
    path "auth/salt-minions/role/*" {
      capabilities = ["read", "create", "update", "delete"]
    }

    # Lookup mount accessor
    path "sys/auth/salt-minions" {
      capabilities = ["read", "sudo"]
    }

    # Lookup entities by alias name (role-id) and alias mount accessor
    path "identity/lookup/entity" {
      capabilities = ["create", "update"]
      allowed_parameters = {
        "alias_name" = []
        "alias_mount_accessor" = ["auth_approle_0a1b2c3d"]
      }
    }

    # Manage entities with name prefix salt_minion_
    path "identity/entity/name/salt_minion_*" {
      capabilities = ["read", "create", "update", "delete"]
    }

    # Create entity aliases – you can restrict the mount_accessor
    # This might allow privilege escalation in case the salt master
    # is compromised and the attacker knows the entity ID of an
    # entity with relevant policies attached - although you might
    # have other problems at that point.
    path "identity/entity-alias" {
      capabilities = ["create", "update"]
      allowed_parameters = {
        "id" = []
        "canonical_id" = []
        "mount_accessor" = ["auth_approle_0a1b2c3d"]
        "name" = []
      }
    }

This enables you to write templated ACL policies like:

.. code-block:: vaultpolicy

    path "salt/data/minions/{{identity.entity.metadata.minion-id}}" {
        capabilities = ["read"]
    }

    path "salt/data/roles/{{identity.entity.metadata.role}}" {
        capabilities = ["read"]
    }

.. note::

    AppRole policies and entity metadata are generally not updated
    automatically. After a change, you will need to synchronize
    them by running :py:func:`vault.sync_approles <salt.runners.vault.sync_approles>`
    or :py:func:`vault.sync_entities <salt.runners.vault.sync_entities>` respectively.

All possible master configuration options with defaults:

.. code-block:: yaml

    vault:
      auth:
        approle_mount: approle
        approle_name: salt-master
        method: token
        role_id: <required if auth:method == approle>
        secret_id: null
        token: <required if auth:method == token>
        token_lifecycle:
          minimum_ttl: 10
          renew_increment: null
      cache:
        backend: session
        config: 3600
        kv_metadata: connection
        secret: ttl
      issue:
        allow_minion_override_params: false
        type: token
        approle:
          mount: salt-minions
          params:
            bind_secret_id: true
            secret_id_num_uses: 1
            secret_id_ttl: 60
            token_explicit_max_ttl: 60
            token_num_uses: 10
            secret_id_bound_cidrs: null
            token_ttl: null
            token_max_ttl: null
            token_no_default_policy: false
            token_period: null
            token_bound_cidrs: null
        token:
          role_name: null
          params:
            explicit_max_ttl: null
            num_uses: 1
            ttl: null
            period: null
            no_default_policy: false
            renewable: true
        wrap: 30s
      keys: []
      metadata:
        entity:
          minion-id: '{minion}'
        secret:
          saltstack-jid: '{jid}'
          saltstack-minion: '{minion}'
          saltstack-user: '{user}'
      policies:
        assign:
          - saltstack/minions
          - saltstack/{minion}
        cache_time: 60
        refresh_pillar: null
      server:
        url: <required, e. g. https://vault.example.com:8200>
        namespace: null
        verify: null

``auth``
~~~~~~~~
Contains authentication information for the local machine.

approle_mount
    .. versionadded:: 3007.0

    The name of the AppRole authentication mount point. Defaults to ``approle``.

approle_name
    .. versionadded:: 3007.0

    The name of the AppRole. Defaults to ``salt-master``.

    .. note::

        Only relevant when a locally configured role_id/secret_id uses
        response wrapping.

method
    Currently only ``token`` and ``approle`` auth types are supported.
    Defaults to ``token``.

    AppRole is the preferred way to authenticate with Vault as it provides
    some advanced options to control the authentication process.
    Please see the `Vault documentation <https://www.vaultproject.io/docs/auth/approle.html>`_
    for more information.

role_id
    The role ID of the AppRole. Required if ``auth:method`` == ``approle``.

    .. versionchanged:: 3007.0

        In addition to a plain string, this can also be specified as a
        dictionary that includes ``wrap_info``, i.e. the return payload
        of a wrapping request.

secret_id
    The secret ID of the AppRole.
    Only required if the configured AppRole requires it.

    .. versionchanged:: 3007.0

        In addition to a plain string, this can also be specified as a
        dictionary that includes ``wrap_info``, i.e. the return payload
        of a wrapping request.

token
    Token to authenticate to Vault with. Required if ``auth:method`` == ``token``.

    The token must be able to create tokens with the policies that should be
    assigned to minions.
    You can still use the token auth via a OS environment variable via this
    config example:

    .. code-block:: yaml

        vault:
          auth:
            method: token
            token: sdb://osenv/VAULT_TOKEN
          server:
            url: https://vault.service.domain:8200

        osenv:
          driver: env

    And then export the VAULT_TOKEN variable in your OS:

    .. code-block:: bash

       export VAULT_TOKEN=11111111-1111-1111-1111-1111111111111

    .. versionchanged:: 3007.0

        In addition to a plain string, this can also be specified as a
        dictionary that includes ``wrap_info``, i.e. the return payload
        of a wrapping request.

token_lifecycle
    Token renewal settings.

    .. note::

        This setting can be specified inside a minion's configuration as well
        and will override the master's default for the minion.

        Token lifecycle settings have significancy for any authentication method,
        not just ``token``.

    ``minimum_ttl`` specifies the time (in seconds or as a time string like ``24h``)
    an in-use token should be valid for. If the current validity period is less
    than this and the token is renewable, a renewal will be attempted. If it is
    not renewable or a renewal does not extend the ttl beyond the specified minimum,
    a new token will be generated.

    .. note::

        Since leases like database credentials are tied to a token, setting this to
        a much higher value than the default can be necessary, depending on your
        specific use case and configuration.

    ``renew_increment`` specifies the amount of time the token's validity should
    be requested to be renewed for when renewing a token. When unset, will extend
    the token's validity by its default ttl.
    Set this to ``false`` to disable token renewals.

    .. note::

        The Vault server is allowed to disregard this request.

``cache``
~~~~~~~~~
Configures token/lease and metadata cache (for KV secrets) on all hosts
as well as configuration cache on minions that receive issued credentials.

backend
    .. versionchanged:: 3007.0

        This used to be found in ``auth:token_backend``.

    The cache backend in use. Defaults to ``session``, which will store the
    Vault configuration in memory only for that specific Salt run.
    ``disk``/``file``/``localfs`` will force using the localfs driver, regardless
    of configured minion data cache.
    Setting this to anything else will use the default configured cache for
    minion data (:conf_master:`cache <cache>`), by default the local filesystem
    as well.

clear_attempt_revocation
    .. versionadded:: 3007.0

    When flushing still valid cached tokens and leases, attempt to have them
    revoked after a (short) delay. Defaults to ``60``.
    Set this to false to disable revocation (not recommended).

clear_on_unauthorized
    .. versionadded:: 3007.0

    When encountering an ``Unauthorized`` response with an otherwise valid token,
    flush the cache and request new credentials. Defaults to true.
    If your policies are relatively stable, disabling this will prevent
    a lot of unnecessary overhead, with the tradeoff that once they change,
    you might have to clear the cache manually or wait for the token to expire.

config
    .. versionadded:: 3007.0

    The time in seconds to cache queried configuration from the master.
    Defaults to ``3600`` (one hour). Set this to ``null`` to disable
    cache expiration. Changed ``server`` configuration on the master will
    still be recognized, but changes in ``auth`` and ``cache`` will need
    a manual update using ``vault.update_config`` or cache clearance
    using ``vault.clear_cache``.

    .. note::

        Expiring the configuration will also clear cached authentication
        credentials and leases.

expire_events
    .. versionadded:: 3007.0

    Fire an event when the session cache containing leases is cleared
    (``vault/cache/<scope>/clear``) or cached leases have expired
    (``vault/lease/<cache_key>/expire``).
    A reactor can be employed to ensure fresh leases are issued.
    Defaults to false.

kv_metadata
    .. versionadded:: 3007.0

    The time in seconds to cache KV metadata used to determine if a path
    is using version 1/2 for. Defaults to ``connection``, which will clear
    the metadata cache once a new configuration is requested from the
    master. Setting this to ``null`` will keep the information
    indefinitely until the cache is cleared manually using
    ``vault.clear_cache`` with ``connection=false``.

secret
    .. versionadded:: 3007.0

    The time in seconds to cache tokens/secret IDs for. Defaults to ``ttl``,
    which caches the secret for as long as it is valid, unless a new configuration
    is requested from the master.

``issue``
~~~~~~~~~
Configures authentication data issued by the master to minions.

type
    .. versionadded:: 3007.0

    The type of authentication to issue to minions. Can be ``token`` or ``approle``.
    Defaults to ``token``.

    To be able to issue AppRoles to minions, the master needs to be able to
    create new AppRoles on the configured auth mount (see policy example above).
    It is strongly encouraged to create a separate mount dedicated to minions.

approle
    .. versionadded:: 3007.0

    Configuration regarding issued AppRoles.

    ``mount`` specifies the name of the auth mount the master manages.
    Defaults to ``salt-minions``. This mount should be exclusively dedicated
    to the Salt master.

    ``params`` configures the AppRole the master creates for minions. See the
    `Vault AppRole API docs <https://www.vaultproject.io/api-docs/auth/approle#create-update-approle>`_
    for details. If you update these params, you can update the minion AppRoles
    manually using the vault runner: ``salt-run vault.sync_approles``, but they
    will be updated automatically during a request by a minion as well.

token
    .. versionadded:: 3007.0

    Configuration regarding issued tokens.

    ``role_name`` specifies the role name for minion tokens created. Optional.

    .. versionchanged:: 3007.0

        This used to be found in ``role_name``.

    If omitted, minion tokens will be created without any role, thus being able
    to inherit any master token policy (including token creation capabilities).

    Example configuration:
    https://www.nomadproject.io/docs/vault-integration/index.html#vault-token-role-configuration

    ``params`` configures the tokens the master issues to minions.

    .. versionchanged:: 3007.0

        This used to be found in ``auth:ttl`` and ``auth:uses``.
        The possible parameters were synchronized with the Vault nomenclature:

          * ``ttl`` previously was mapped to ``explicit_max_ttl`` on Vault, not ``ttl``.
            For the same behavior as before, you will need to set ``explicit_max_ttl`` now.
          * ``uses`` is now called ``num_uses``.

    See the `Vault token API docs <https://developer.hashicorp.com/vault/api-docs/auth/token#create-token>`_
    for details. To make full use of multi-use tokens, you should configure a cache
    that survives a single session (e.g. ``disk``).

    .. note::

        If unset, the master issues single-use tokens to minions, which can be quite expensive.


allow_minion_override_params
    .. versionchanged:: 3007.0

        This used to be found in ``auth:allow_minion_override``.

    Whether to allow minions to request to override parameters for issuing credentials.
    See ``issue_params`` below.

wrap
    .. versionadded:: 3007.0

    The time a minion has to unwrap a wrapped secret issued by the master.
    Set this to false to disable wrapping, otherwise a time string like ``30s``
    can be used. Defaults to ``30s``.

``keys``
~~~~~~~~
    List of keys to use to unseal vault server with the ``vault.unseal`` runner.

``metadata``
~~~~~~~~~~~~
.. versionadded:: 3007.0

Configures metadata for the issued entities/secrets. Values have to be strings
and can be templated with the following variables:

- ``{jid}`` Salt job ID that issued the secret.
- ``{minion}`` The minion ID the secret was issued for.
- ``{user}`` The user the Salt daemon issuing the secret was running as.
- ``{pillar[<var>]}`` A minion pillar value that does not depend on Vault.
- ``{grains[<var>]}`` A minion grain value.

.. note::

    Values have to be strings, hence templated variables that resolve to lists
    will be concatenated to a lexicographically sorted comma-separated list
    (Python ``list.sort()``).

entity
    Configures the metadata associated with the minion entity inside Vault.
    Entities are only created when issuing AppRoles to minions.

secret
    Configures the metadata associated with issued tokens/secret IDs. They
    are logged in plaintext to the Vault audit log.

``policies``
~~~~~~~~~~~~
.. versionchanged:: 3007.0

    This used to specify the list of policies associated with a minion token only.
    The equivalent is found in ``assign``.

assign
    List of policies that are assigned to issued minion authentication data,
    either token or AppRole.

    They can be static strings or string templates with

    - ``{minion}`` The minion ID.
    - ``{pillar[<var>]}`` A minion pillar value.
    - ``{grains[<var>]}`` A minion grain value.

    For pillar and grain values, lists are expanded, so ``salt_role_{pillar[roles]}``
    with ``[a, b]`` results in ``salt_role_a`` and ``salt_role_b`` to be issued.

    Defaults to ``[saltstack/minions, saltstack/{minion}]``.

    .. versionadded:: 3006.0

        Policies can be templated with pillar values as well: ``salt_role_{pillar[roles]}``.
        Make sure to only reference pillars that are not sourced from Vault since the latter
        ones might be unavailable during policy rendering. If you use the Vault
        integration in one of your pillar ``sls`` files, all values from that file
        will be absent during policy rendering, even the ones that do not depend on Vault.

    .. important::

        See :ref:`Is Targeting using Grain Data Secure?
        <faq-grain-security>` for important security information. In short,
        everything except ``grains[id]`` is minion-controlled.

    .. note::

        List members which do not have simple string representations,
        such as dictionaries or objects, do not work and will
        throw an exception. Strings and numbers are examples of
        types which work well.

cache_time
    .. versionadded:: 3007.0

    Number of seconds compiled templated policies are cached on the master.
    This is important when using pillar values in templates, since compiling
    the pillar is an expensive operation.

    .. note::

        Only effective when issuing tokens to minions. Token policies
        need to be compiled every time a token is requested, while AppRole-associated
        policies are written to Vault configuration the first time authentication data
        is requested (they can be refreshed on demand by running
        ``salt-run vault.sync_approles``).

        They will also be refreshed in case other issuance parameters are changed
        (such as uses/ttl), either on the master or the minion
        (if allow_minion_override_params is True).

refresh_pillar
    .. versionadded:: 3007.0

    Whether to refresh the minion pillar when compiling templated policies
    that contain pillar variables.
    Only effective when issuing tokens to minions (see note on cache_time above).

    - ``null`` (default) only compiles the pillar when no cached pillar is found.
    - ``false`` never compiles the pillar. This means templated policies that
      contain pillar values are skipped if no cached pillar is found.
    - ``true`` always compiles the pillar. This can cause additional strain
      on the master since the compilation is costly.

    .. note::

        Hardcoded to True when issuing AppRoles.

        Using cached pillar data only (refresh_pillar=False) might cause the policies
        to be out of sync. If there is no cached pillar data available for the minion,
        pillar templates will fail to render at all.

        If you use pillar values for templating policies and do not disable
        refreshing pillar data, make sure the relevant values are not sourced
        from Vault (ext_pillar, sdb) or from a pillar sls file that uses the vault
        execution/sdb module. Although this will often work when cached pillar data is
        available, if the master needs to compile the pillar data during policy rendering,
        all Vault modules will be broken to prevent an infinite loop.

``server``
~~~~~~~~~~
.. versionchanged:: 3007.0

    The values found in here were found in the ``vault`` root namespace previously.

Configures Vault server details.

url
    URL of your Vault installation. Required.

verify
    Configures certificate verification behavior when issuing requests to the
    Vault server. If unset, requests will use the CA certificates bundled with ``certifi``.

    For details, please see `the requests documentation <https://requests.readthedocs.io/en/master/user/advanced/#ssl-cert-verification>`_.

    .. versionadded:: 2018.3.0

    .. versionchanged:: 3007.0

        Minions again respect the master configuration value, which was changed
        implicitly in v3001. If this value is set in the minion configuration
        as well, it will take precedence.

        In addition, this value can now be set to a PEM-encoded CA certificate
        to use as the sole trust anchor for certificate chain verification.

namespace
    Optional Vault namespace. Used with Vault Enterprise.

    For details please see:
    https://www.vaultproject.io/docs/enterprise/namespaces

    .. versionadded:: 3004


Minion configuration (optional):

``config_location``
~~~~~~~~~~~~~~~~~~~
    Where to get the connection details for calling vault. By default,
    vault will try to determine if it needs to request the connection
    details from the master or from the local config. This optional option
    will force vault to use the connection details from the master or the
    local config. Can only be either ``master`` or ``local``.

  .. versionadded:: 3006.0

``issue_params``
~~~~~~~~~~~~~~~~
    Request overrides for token/AppRole issuance. This needs to be allowed
    on the master by setting ``issue:allow_minion_override_params`` to true.
    See the master configuration ``issue:token:params`` or ``issue:approle:params``
    for reference.

    .. versionchanged:: 3007.0

        For token issuance, this used to be found in ``auth:ttl`` and ``auth:uses``.
        Mind that the parameter names have been synchronized with Vault, see notes
        above (TLDR: ``ttl`` => ``explicit_max_ttl``, ``uses`` => ``num_uses``.

.. note::

    ``auth:token_lifecycle`` and ``server:verify`` can be set on the minion as well.

.. _vault-setup:
"""

import logging

import salt.utils.vault as vault
from salt.defaults import NOT_SET
from salt.exceptions import CommandExecutionError, SaltException, SaltInvocationError

log = logging.getLogger(__name__)

__deprecated__ = (
    3009,
    "vault",
    "https://github.com/salt-extensions/saltext-vault",
)


def read_secret(path, key=None, metadata=False, default=NOT_SET):
    """
    Return the value of <key> at <path> in vault, or entire secret.

    .. versionchanged:: 3001
        The ``default`` argument has been added. When the path or path/key
        combination is not found, an exception will be raised, unless a default
        is provided.

    CLI Example:

    .. code-block:: bash

        salt '*' vault.read_secret salt/kv/secret

    Required policy:

    .. code-block:: vaultpolicy

        path "<mount>/<secret>" {
            capabilities = ["read"]
        }

        # or KV v2
        path "<mount>/data/<secret>" {
            capabilities = ["read"]
        }

    path
        The path to the secret, including mount.

    key
        The data field at <path> to read. If unspecified, returns the
        whole dataset.

    metadata
        .. versionadded:: 3001

        If using KV v2 backend, display full results, including metadata.
        Defaults to False.

    default
        .. versionadded:: 3001

        When the path or path/key combination is not found, an exception will
        be raised, unless a default is provided here.
    """
    if default == NOT_SET:
        default = CommandExecutionError
    if key is not None:
        metadata = False
    log.debug("Reading Vault secret for %s at %s", __grains__.get("id"), path)
    try:
        data = vault.read_kv(path, __opts__, __context__, include_metadata=metadata)
        if key is not None:
            return data[key]
        return data
    except Exception as err:  # pylint: disable=broad-except
        if default is CommandExecutionError:
            raise CommandExecutionError(
                f"Failed to read secret! {type(err).__name__}: {err}"
            ) from err
        return default


def write_secret(path, **kwargs):
    """
    Set secret dataset at <path>. The vault policy used must allow this.
    Fields are specified as arbitrary keyword arguments.

    CLI Example:

    .. code-block:: bash

            salt '*' vault.write_secret "secret/my/secret" user="foo" password="bar"

    Required policy:

    .. code-block:: vaultpolicy

        path "<mount>/<secret>" {
            capabilities = ["create", "update"]
        }

        # or KV v2
        path "<mount>/data/<secret>" {
            capabilities = ["create", "update"]
        }

    path
        The path to the secret, including mount.
    """
    log.debug("Writing vault secrets for %s at %s", __grains__.get("id"), path)
    data = {x: y for x, y in kwargs.items() if not x.startswith("__")}
    try:
        res = vault.write_kv(path, data, __opts__, __context__)
        if isinstance(res, dict):
            return res["data"]
        return res
    except Exception as err:  # pylint: disable=broad-except
        log.error("Failed to write secret! %s: %s", type(err).__name__, err)
        return False


def write_raw(path, raw):
    """
    Set raw data at <path>. The vault policy used must allow this.

    CLI Example:

    .. code-block:: bash

            salt '*' vault.write_raw "secret/my/secret" '{"user":"foo","password": "bar"}'

    Required policy: see write_secret

    path
        The path to the secret, including mount.

    raw
        Secret data to write to <path>. Has to be a mapping.
    """
    log.debug("Writing vault secrets for %s at %s", __grains__.get("id"), path)
    try:
        res = vault.write_kv(path, raw, __opts__, __context__)
        if isinstance(res, dict):
            return res["data"]
        return res
    except Exception as err:  # pylint: disable=broad-except
        log.error("Failed to write secret! %s: %s", type(err).__name__, err)
        return False


def patch_secret(path, **kwargs):
    """
    Patch secret dataset at <path>. Fields are specified as arbitrary keyword arguments.

    .. note::

        This works even for older Vault versions, KV v1 and with missing
        ``patch`` capability, but will use more than one request to simulate
        the functionality by issuing a read and update request.

        For proper, single-request patching, requires versions of KV v2 that
        support the ``patch`` capability and the ``patch`` capability to be available
        for the path.

    .. note::

        This uses JSON Merge Patch format internally.
        Keys set to ``null`` (JSON/YAML)/``None`` (Python) will be deleted.

    CLI Example:

    .. code-block:: bash

            salt '*' vault.patch_secret "secret/my/secret" password="baz"

    Required policy:

    .. code-block:: vaultpolicy

        # Proper patching
        path "<mount>/data/<secret>" {
            capabilities = ["patch"]
        }

        # OR (!), for older KV v2 setups:

        path "<mount>/data/<secret>" {
            capabilities = ["read", "update"]
        }

        # OR (!), for KV v1 setups:

        path "<mount>/<secret>" {
            capabilities = ["read", "update"]
        }

    path
        The path to the secret, including mount.
    """
    log.debug("Patching vault secrets for %s at %s", __grains__.get("id"), path)
    data = {x: y for x, y in kwargs.items() if not x.startswith("__")}
    try:
        res = vault.patch_kv(path, data, __opts__, __context__)
        if isinstance(res, dict):
            return res["data"]
        return res
    except Exception as err:  # pylint: disable=broad-except
        log.error("Failed to patch secret! %s: %s", type(err).__name__, err)
        return False


def delete_secret(path, *args):
    """
    Delete secret at <path>. The vault policy used must allow this.
    If <path> is on KV v2, the secret will be soft-deleted.

    CLI Example:

    .. code-block:: bash

        salt '*' vault.delete_secret "secret/my/secret"
        salt '*' vault.delete_secret "secret/my/secret" 1 2 3

    Required policy:

    .. code-block:: vaultpolicy

        path "<mount>/<secret>" {
            capabilities = ["delete"]
        }

        # or KV v2
        path "<mount>/data/<secret>" {
            capabilities = ["delete"]
        }

        # KV v2 versions
        path "<mount>/delete/<secret>" {
            capabilities = ["update"]
        }

    path
        The path to the secret, including mount.

    .. versionadded:: 3007.0

        For KV v2, you can specify versions to soft-delete as supplemental
        positional arguments.
    """
    log.debug("Deleting vault secrets for %s in %s", __grains__.get("id"), path)
    try:
        return vault.delete_kv(path, __opts__, __context__, versions=list(args) or None)
    except Exception as err:  # pylint: disable=broad-except
        log.error("Failed to delete secret! %s: %s", type(err).__name__, err)
        return False


def destroy_secret(path, *args):
    """
    .. versionadded:: 3001

    Destroy specified secret versions <path>. The vault policy
    used must allow this. Only supported on Vault KV version 2.

    CLI Example:

    .. code-block:: bash

        salt '*' vault.destroy_secret "secret/my/secret" 1 2

    Required policy:

    .. code-block:: vaultpolicy

        path "<mount>/destroy/<secret>" {
            capabilities = ["update"]
        }

    path
        The path to the secret, including mount.

    You can specify versions to destroy as supplemental positional arguments.
    At least one is required.
    """
    if not args:
        raise SaltInvocationError("Need at least one version to destroy.")
    log.debug("Destroying vault secrets for %s in %s", __grains__.get("id"), path)
    try:
        return vault.destroy_kv(path, list(args), __opts__, __context__)
    except Exception as err:  # pylint: disable=broad-except
        log.error("Failed to destroy secret! %s: %s", type(err).__name__, err)
        return False


def list_secrets(path, default=NOT_SET, keys_only=False):
    """
    List secret keys at <path>. The vault policy used must allow this.
    The path should end with a trailing slash.

    .. versionchanged:: 3001
        The ``default`` argument has been added. When the path or path/key
        combination is not found, an exception will be raised, unless a default
        is provided.

    CLI Example:

    .. code-block:: bash

        salt '*' vault.list_secrets "secret/my/"

    Required policy:

    .. code-block:: vaultpolicy

        path "<mount>/<path>" {
            capabilities = ["list"]
        }

        # or KV v2
        path "<mount>/metadata/<path>" {
            capabilities = ["list"]
        }

    path
        The path to the secret, including mount.

    default
        .. versionadded:: 3001

        When the path is not found, an exception will be raised, unless a default
        is provided here.

    keys_only
        .. versionadded:: 3007.0

        This function used to return a dictionary like ``{"keys": ["some/", "some/key"]}``.
        Setting this to True will only return the list of keys.
        For backwards-compatibility reasons, this defaults to False.
    """
    if default == NOT_SET:
        default = CommandExecutionError
    log.debug("Listing vault secret keys for %s in %s", __grains__.get("id"), path)
    try:
        keys = vault.list_kv(path, __opts__, __context__)
        if keys_only:
            return keys
        # this is the way Salt behaved previously
        return {"keys": keys}
    except Exception as err:  # pylint: disable=broad-except
        if default is CommandExecutionError:
            raise CommandExecutionError(
                f"Failed to list secrets! {type(err).__name__}: {err}"
            ) from err
        return default


def clear_cache(connection=True, session=False):
    """
    .. versionadded:: 3007.0

    Delete Vault caches. Will ensure the current token and associated leases
    are revoked by default.

    The cache is organized in a hierarchy: ``/vault/connection/session/leases``.
    (*italics* mark data that is only cached when receiving configuration from a master)

    ``connection`` contains KV metadata (by default), *configuration* and *(AppRole) auth credentials*.
    ``session`` contains the currently active token.
    ``leases`` contains leases issued to the currently active token like database credentials.

    CLI Example:

    .. code-block:: bash

        salt '*' vault.clear_cache
        salt '*' vault.clear_cache session=True

    connection
        Only clear the cached data scoped to a connection. This includes
        configuration, auth credentials, the currently active auth token
        as well as leases and KV metadata (by default). Defaults to true.
        Set this to false to clear all Vault caches.

    session
        Only clear the cached data scoped to a session. This only includes
        leases and the currently active auth token, but not configuration
        or (AppRole) auth credentials. Defaults to false.
        Setting this to true will keep the connection cache, regardless
        of ``connection``.
    """
    return vault.clear_cache(
        __opts__, __context__, connection=connection, session=session
    )


def clear_token_cache():
    """
    .. versionchanged:: 3001
    .. versionchanged:: 3007.0

        This is now an alias for ``vault.clear_cache`` with ``connection=True``.

    Delete minion Vault token cache.

    CLI Example:

    .. code-block:: bash

        salt '*' vault.clear_token_cache
    """
    log.debug("Deleting vault connection cache.")
    return clear_cache(connection=True, session=False)


def policy_fetch(policy):
    """
    .. versionadded:: 3007.0

    Fetch the rules associated with an ACL policy. Returns None if the policy
    does not exist.

    CLI Example:

    .. code-block:: bash

        salt '*' vault.policy_fetch salt_minion

    Required policy:

    .. code-block:: vaultpolicy

        path "sys/policy/<policy>" {
            capabilities = ["read"]
        }

    policy
        The name of the policy to fetch.
    """
    # there is also "sys/policies/acl/{policy}"
    endpoint = f"sys/policy/{policy}"

    try:
        data = vault.query("GET", endpoint, __opts__, __context__)
        return data["rules"]

    except vault.VaultNotFoundError:
        return None
    except SaltException as err:
        raise CommandExecutionError(f"{type(err).__name__}: {err}") from err


def policy_write(policy, rules):
    r"""
    .. versionadded:: 3007.0

    Create or update an ACL policy.

    CLI Example:

    .. code-block:: bash

        salt '*' vault.policy_write salt_minion 'path "secret/foo" {...}'

    Required policy:

    .. code-block:: vaultpolicy

        path "sys/policy/<policy>" {
            capabilities = ["create", "update"]
        }

    policy
        The name of the policy to create/update.

    rules
        Rules to write, formatted as in-line HCL.
    """
    endpoint = f"sys/policy/{policy}"
    payload = {"policy": rules}
    try:
        return vault.query("POST", endpoint, __opts__, __context__, payload=payload)
    except SaltException as err:
        raise CommandExecutionError(f"{type(err).__name__}: {err}") from err


def policy_delete(policy):
    """
    .. versionadded:: 3007.0

    Delete an ACL policy. Returns False if the policy did not exist.

    CLI Example:

    .. code-block:: bash

        salt '*' vault.policy_delete salt_minion

    Required policy:

    .. code-block:: vaultpolicy

        path "sys/policy/<policy>" {
            capabilities = ["delete"]
        }

    policy
        The name of the policy to delete.
    """
    endpoint = f"sys/policy/{policy}"

    try:
        return vault.query("DELETE", endpoint, __opts__, __context__)
    except vault.VaultNotFoundError:
        return False
    except SaltException as err:
        raise CommandExecutionError(f"{type(err).__name__}: {err}") from err


def policies_list():
    """
    .. versionadded:: 3007.0

    List all ACL policies.

    CLI Example:

    .. code-block:: bash

        salt '*' vault.policies_list

    Required policy:

    .. code-block:: vaultpolicy

        path "sys/policy" {
            capabilities = ["read"]
        }
    """
    try:
        return vault.query("GET", "sys/policy", __opts__, __context__)["policies"]
    except SaltException as err:
        raise CommandExecutionError(f"{type(err).__name__}: {err}") from err


def query(method, endpoint, payload=None):
    """
    .. versionadded:: 3007.0

    Issue arbitrary queries against the Vault API.

    CLI Example:

    .. code-block:: bash

        salt '*' vault.query GET auth/token/lookup-self

    Required policy: Depends on the query.

    You can ask the vault CLI to output the necessary policy:

    .. code-block:: bash

        vault read -output-policy auth/token/lookup-self

    method
        HTTP method to use.

    endpoint
        Vault API endpoint to issue the request against. Do not include ``/v1/``.

    payload
        Optional dictionary to use as JSON payload.
    """
    try:
        return vault.query(method, endpoint, __opts__, __context__, payload=payload)
    except SaltException as err:
        raise CommandExecutionError(f"{type(err).__name__}: {err}") from err


def update_config(keep_session=False):
    """
    .. versionadded:: 3007.0

    Attempt to update the cached configuration without clearing the
    currently active Vault session.

    CLI Example:

    .. code-block:: bash

        salt '*' vault.update_config

    keep_session
        Only update configuration that can be updated without
        creating a new login session.
        If this is false, still tries to keep the active session,
        but might clear it if the server configuration has changed
        significantly.
        Defaults to False.
    """
    return vault.update_config(__opts__, __context__, keep_session=keep_session)


def get_server_config():
    """
    .. versionadded:: 3007.0

    Return the server connection configuration that's currently in use by Salt.
    Contains ``url``, ``verify`` and ``namespace``.

    CLI Example:

    .. code-block:: bash

        salt '*' vault.get_server_config
    """
    try:
        client = vault.get_authd_client(__opts__, __context__)
        return client.get_config()
    except SaltException as err:
        raise CommandExecutionError(f"{type(err).__name__}: {err}") from err