feat(website): migrates nav data format and updates docs pages (#11242)

* migrates nav data format and updates docs pages

* removes sidebar_title from content files
This commit is contained in:
Bryce Kalow
2021-04-06 12:49:04 -05:00
committed by GitHub
parent 759f9c1f21
commit e27b43c482
555 changed files with 3409 additions and 2301 deletions

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: AliCloud - Auth Methods - HTTP API page_title: AliCloud - Auth Methods - HTTP API
sidebar_title: AliCloud
description: This is the API documentation for the Vault AliCloud auth method. description: This is the API documentation for the Vault AliCloud auth method.
--- ---

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: AppID - Auth Methods - HTTP API page_title: AppID - Auth Methods - HTTP API
sidebar_title: App ID <sup>DEPRECATED</sup>
description: This is the API documentation for the Vault App ID auth method. description: This is the API documentation for the Vault App ID auth method.
--- ---

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: AppRole - Auth Methods - HTTP API page_title: AppRole - Auth Methods - HTTP API
sidebar_title: AppRole
description: This is the API documentation for the Vault AppRole auth method. description: This is the API documentation for the Vault AppRole auth method.
--- ---

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: AWS - Auth Methods - HTTP API page_title: AWS - Auth Methods - HTTP API
sidebar_title: AWS
description: This is the API documentation for the Vault AWS auth method. description: This is the API documentation for the Vault AWS auth method.
--- ---
@@ -516,8 +515,8 @@ $ curl \
Configures the periodic tidying operation of the access listed identity entries. Configures the periodic tidying operation of the access listed identity entries.
| Method | Path | | Method | Path |
| :----- | :----------------------------------------- | | :----- | :------------------------------------------ |
| `POST` | `/auth/aws/config/tidy/identity-accesslist` | | `POST` | `/auth/aws/config/tidy/identity-accesslist` |
### Parameters ### Parameters
@@ -550,8 +549,8 @@ $ curl \
Returns the previously configured periodic access list tidying settings. Returns the previously configured periodic access list tidying settings.
| Method | Path | | Method | Path |
| :----- | :----------------------------------------- | | :----- | :------------------------------------------ |
| `GET` | `/auth/aws/config/tidy/identity-accesslist` | | `GET` | `/auth/aws/config/tidy/identity-accesslist` |
### Sample Request ### Sample Request
@@ -577,8 +576,8 @@ $ curl \
Deletes the previously configured periodic access list tidying settings. Deletes the previously configured periodic access list tidying settings.
| Method | Path | | Method | Path |
| :------- | :----------------------------------------- | | :------- | :------------------------------------------ |
| `DELETE` | `/auth/aws/config/tidy/identity-accesslist` | | `DELETE` | `/auth/aws/config/tidy/identity-accesslist` |
### Sample Request ### Sample Request
@@ -594,8 +593,8 @@ $ curl \
Configures the periodic tidying operation of the deny listed role tag entries. Configures the periodic tidying operation of the deny listed role tag entries.
| Method | Path | | Method | Path |
| :----- | :---------------------------------------- | | :----- | :--------------------------------------- |
| `POST` | `/auth/aws/config/tidy/roletag-denylist` | | `POST` | `/auth/aws/config/tidy/roletag-denylist` |
### Parameters ### Parameters
@@ -628,8 +627,8 @@ $ curl \
Returns the previously configured periodic deny list tidying settings. Returns the previously configured periodic deny list tidying settings.
| Method | Path | | Method | Path |
| :----- | :---------------------------------------- | | :----- | :--------------------------------------- |
| `GET` | `/auth/aws/config/tidy/roletag-denylist` | | `GET` | `/auth/aws/config/tidy/roletag-denylist` |
### Sample Request ### Sample Request
@@ -655,8 +654,8 @@ $ curl \
Deletes the previously configured periodic deny list tidying settings. Deletes the previously configured periodic deny list tidying settings.
| Method | Path | | Method | Path |
| :------- | :---------------------------------------- | | :------- | :--------------------------------------- |
| `DELETE` | `/auth/aws/config/tidy/roletag-denylist` | | `DELETE` | `/auth/aws/config/tidy/roletag-denylist` |
### Sample Request ### Sample Request
@@ -1109,8 +1108,8 @@ that if the role tag was previously used to perform a successful login,
placing the tag in the deny list does not invalidate the already issued placing the tag in the deny list does not invalidate the already issued
token. token.
| Method | Path | | Method | Path |
| :----- | :-------------------------------------- | | :----- | :------------------------------------- |
| `POST` | `/auth/aws/roletag-denylist/:role_tag` | | `POST` | `/auth/aws/roletag-denylist/:role_tag` |
### Parameters ### Parameters
@@ -1132,8 +1131,8 @@ $ curl \
Returns the deny list entry of a previously deny listed role tag. Returns the deny list entry of a previously deny listed role tag.
| Method | Path | | Method | Path |
| :----- | :-------------------------------------- | | :----- | :------------------------------------- |
| `GET` | `/auth/aws/roletag-denylist/:role_tag` | | `GET` | `/auth/aws/roletag-denylist/:role_tag` |
### Parameters ### Parameters
@@ -1165,8 +1164,8 @@ $ curl \
Lists all the role tags that are deny listed. Lists all the role tags that are deny listed.
| Method | Path | | Method | Path |
| :----- | :---------------------------- | | :----- | :--------------------------- |
| `LIST` | `/auth/aws/roletag-denylist` | | `LIST` | `/auth/aws/roletag-denylist` |
### Sample Request ### Sample Request
@@ -1194,8 +1193,8 @@ $ curl \
Deletes a deny listed role tag. Deletes a deny listed role tag.
| Method | Path | | Method | Path |
| :------- | :-------------------------------------- | | :------- | :------------------------------------- |
| `DELETE` | `/auth/aws/roletag-denylist/:role_tag` | | `DELETE` | `/auth/aws/roletag-denylist/:role_tag` |
### Parameters ### Parameters
@@ -1218,8 +1217,8 @@ $ curl \
Cleans up the entries in the deny listed based on expiration time on the entry and Cleans up the entries in the deny listed based on expiration time on the entry and
`safety_buffer`. `safety_buffer`.
| Method | Path | | Method | Path |
| :----- | :--------------------------------- | | :----- | :-------------------------------- |
| `POST` | `/auth/aws/tidy/roletag-denylist` | | `POST` | `/auth/aws/tidy/roletag-denylist` |
### Parameters ### Parameters
@@ -1242,8 +1241,8 @@ $ curl \
Returns an entry in the identity access list. An entry will be created/updated by every Returns an entry in the identity access list. An entry will be created/updated by every
successful login. successful login.
| Method | Path | | Method | Path |
| :----- | :------------------------------------------ | | :----- | :------------------------------------------- |
| `GET` | `/auth/aws/identity-accesslist/:instance_id` | | `GET` | `/auth/aws/identity-accesslist/:instance_id` |
### Parameters ### Parameters
@@ -1278,8 +1277,8 @@ $ curl \
Lists all the instance IDs that are in the access list of successful logins. Lists all the instance IDs that are in the access list of successful logins.
| Method | Path | | Method | Path |
| :----- | :----------------------------- | | :----- | :------------------------------ |
| `LIST` | `/auth/aws/identity-accesslist` | | `LIST` | `/auth/aws/identity-accesslist` |
### Sample Request ### Sample Request
@@ -1305,8 +1304,8 @@ $ curl \
Deletes a cache of the successful login from an instance. Deletes a cache of the successful login from an instance.
| Method | Path | | Method | Path |
| :------- | :------------------------------------------ | | :------- | :------------------------------------------- |
| `DELETE` | `/auth/aws/identity-accesslist/:instance_id` | | `DELETE` | `/auth/aws/identity-accesslist/:instance_id` |
### Parameters ### Parameters
@@ -1329,8 +1328,8 @@ $ curl \
Cleans up the entries in the access list based on expiration time and Cleans up the entries in the access list based on expiration time and
`safety_buffer`. `safety_buffer`.
| Method | Path | | Method | Path |
| :----- | :---------------------------------- | | :----- | :----------------------------------- |
| `POST` | `/auth/aws/tidy/identity-accesslist` | | `POST` | `/auth/aws/tidy/identity-accesslist` |
### Parameters ### Parameters
@@ -1361,4 +1360,3 @@ URLs are deprecated. The affected APIs include:
| `/auth/aws/tidy/roletag-denylist` | `/auth/aws/tidy/roletag-blacklist` | | `/auth/aws/tidy/roletag-denylist` | `/auth/aws/tidy/roletag-blacklist` |
| `/auth/aws/config/tidy/identity-accesslist` | `/auth/aws/config/tidy/identity-whitelist` | | `/auth/aws/config/tidy/identity-accesslist` | `/auth/aws/config/tidy/identity-whitelist` |
| `/auth/aws/config/tidy/roletag-denylist` | `/auth/aws/config/tidy/roletag-blacklist` | | `/auth/aws/config/tidy/roletag-denylist` | `/auth/aws/config/tidy/roletag-blacklist` |

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: Azure - Auth Methods - HTTP API page_title: Azure - Auth Methods - HTTP API
sidebar_title: Azure
description: |- description: |-
This is the API documentation for the Vault Azure authentication This is the API documentation for the Vault Azure authentication
method plugin. method plugin.

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: TLS Certificate - Auth Methods - HTTP API page_title: TLS Certificate - Auth Methods - HTTP API
sidebar_title: TLS Certificates
description: |- description: |-
This is the API documentation for the Vault TLS Certificate authentication This is the API documentation for the Vault TLS Certificate authentication
method. method.

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: Cloud Foundry - Auth Methods - HTTP API page_title: Cloud Foundry - Auth Methods - HTTP API
sidebar_title: Cloud Foundry
description: This is the API documentation for the Vault Cloud Foundry auth method. description: This is the API documentation for the Vault Cloud Foundry auth method.
--- ---

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: Google Cloud - Auth Methods - HTTP API page_title: Google Cloud - Auth Methods - HTTP API
sidebar_title: Google Cloud
description: |- description: |-
This is the API documentation for the Vault Google Cloud authentication This is the API documentation for the Vault Google Cloud authentication
method. method.

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: GitHub - Auth Methods - HTTP API page_title: GitHub - Auth Methods - HTTP API
sidebar_title: GitHub
description: This is the API documentation for the Vault GitHub auth method. description: This is the API documentation for the Vault GitHub auth method.
--- ---

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: Auth Methods - HTTP API page_title: Auth Methods - HTTP API
sidebar_title: Auth Methods
description: |- description: |-
Each auth method publishes its own set of API paths and methods. Each auth method publishes its own set of API paths and methods.
These endpoints are documented in this section. These endpoints are documented in this section.

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: JWT/OIDC - Auth Methods - HTTP API page_title: JWT/OIDC - Auth Methods - HTTP API
sidebar_title: JWT/OIDC
description: |- description: |-
This is the API documentation for the Vault JWT/OIDC authentication This is the API documentation for the Vault JWT/OIDC authentication
method plugin. method plugin.

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: Kerberos - Auth Methods - HTTP API page_title: Kerberos - Auth Methods - HTTP API
sidebar_title: Kerberos
description: This is the API documentation for the Vault Kerberos auth method plugin. description: This is the API documentation for the Vault Kerberos auth method plugin.
--- ---

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: Kubernetes - Auth Methods - HTTP API page_title: Kubernetes - Auth Methods - HTTP API
sidebar_title: Kubernetes
description: This is the API documentation for the Vault Kubernetes auth method plugin. description: This is the API documentation for the Vault Kubernetes auth method plugin.
--- ---

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: LDAP - Auth Methods - HTTP API page_title: LDAP - Auth Methods - HTTP API
sidebar_title: LDAP
description: This is the API documentation for the Vault LDAP auth method. description: This is the API documentation for the Vault LDAP auth method.
--- ---

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: OCI - Auth Methods - HTTP API page_title: OCI - Auth Methods - HTTP API
sidebar_title: OCI
description: This is the API documentation for the Vault OCI auth method plugin. description: This is the API documentation for the Vault OCI auth method plugin.
--- ---

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: Okta - Auth Methods - HTTP API page_title: Okta - Auth Methods - HTTP API
sidebar_title: Okta
description: This is the API documentation for the Vault Okta auth method. description: This is the API documentation for the Vault Okta auth method.
--- ---

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: RADIUS - Auth Methods - HTTP API page_title: RADIUS - Auth Methods - HTTP API
sidebar_title: RADIUS
description: This is the API documentation for the Vault RADIUS auth method. description: This is the API documentation for the Vault RADIUS auth method.
--- ---

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: Token - Auth Methods - HTTP API page_title: Token - Auth Methods - HTTP API
sidebar_title: Tokens
description: This is the API documentation for the Vault token auth method. description: This is the API documentation for the Vault token auth method.
--- ---

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: Userpass - Auth Methods - HTTP API page_title: Userpass - Auth Methods - HTTP API
sidebar_title: Username & Password
description: |- description: |-
This is the API documentation for the Vault username and password This is the API documentation for the Vault username and password
auth method. auth method.

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: HTTP API page_title: HTTP API
sidebar_title: Overview
description: Vault has an HTTP API that can be used to control every aspect of Vault. description: Vault has an HTTP API that can be used to control every aspect of Vault.
--- ---

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: 'HTTP API: Libraries' page_title: 'HTTP API: Libraries'
sidebar_title: Client Libraries
description: >- description: >-
List of official and community contributed libraries for interacting with the List of official and community contributed libraries for interacting with the
Vault HTTP API. Vault HTTP API.

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: Related Tools page_title: Related Tools
sidebar_title: Related Tools
description: Short list of third-party tools that work with or are related to Vault. description: Short list of third-party tools that work with or are related to Vault.
--- ---

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: Active Directory - Secrets Engines - HTTP API page_title: Active Directory - Secrets Engines - HTTP API
sidebar_title: Active Directory
description: This is the API documentation for the Vault Active Directory secrets engine. description: This is the API documentation for the Vault Active Directory secrets engine.
--- ---

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: AliCloud - Secrets Engines - HTTP API page_title: AliCloud - Secrets Engines - HTTP API
sidebar_title: AliCloud
description: This is the API documentation for the Vault AliCloud secrets engine. description: This is the API documentation for the Vault AliCloud secrets engine.
--- ---

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: AWS - Secrets Engines - HTTP API page_title: AWS - Secrets Engines - HTTP API
sidebar_title: AWS
description: This is the API documentation for the Vault AWS secrets engine. description: This is the API documentation for the Vault AWS secrets engine.
--- ---

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: Azure - Secrets Engines - HTTP API page_title: Azure - Secrets Engines - HTTP API
sidebar_title: Azure
description: This is the API documentation for the Vault Azure secrets engine. description: This is the API documentation for the Vault Azure secrets engine.
--- ---

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: Cassandra - Secrets Engines - HTTP API page_title: Cassandra - Secrets Engines - HTTP API
sidebar_title: Cassandra <sup>DEPRECATED</sup>
description: This is the API documentation for the Vault Cassandra secrets engine. description: This is the API documentation for the Vault Cassandra secrets engine.
--- ---

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: Consul - Secrets Engines - HTTP API page_title: Consul - Secrets Engines - HTTP API
sidebar_title: Consul
description: This is the API documentation for the Vault Consul secrets engine. description: This is the API documentation for the Vault Consul secrets engine.
--- ---

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: Cubbyhole - Secrets Engines - HTTP API page_title: Cubbyhole - Secrets Engines - HTTP API
sidebar_title: Cubbyhole
description: This is the API documentation for the Vault Cubbyhole secrets engine. description: This is the API documentation for the Vault Cubbyhole secrets engine.
--- ---

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: Cassandra - Database - Secrets Engines - HTTP API page_title: Cassandra - Database - Secrets Engines - HTTP API
sidebar_title: Cassandra
description: >- description: >-
The Cassandra plugin for Vault's database secrets engine generates database The Cassandra plugin for Vault's database secrets engine generates database
credentials to access Cassandra servers. credentials to access Cassandra servers.

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: Couchbase - Database - Secrets Engines - HTTP API page_title: Couchbase - Database - Secrets Engines - HTTP API
sidebar_title: Couchbase
description: >- description: >-
The Couchbase plugin for Vault's database secrets engine generates database The Couchbase plugin for Vault's database secrets engine generates database
credentials to access Couchbase servers. credentials to access Couchbase servers.
@@ -59,17 +58,17 @@ V_{{.DisplayName | uppercase | truncate 64}}_{{.RoleName | uppercase | truncate
<details> <details>
<summary><b>Example Usernames:</b></summary> <summary><b>Example Usernames:</b></summary>
| Example | | | Example | |
| ------------- | ---------------------------------------------------- | | ------------- | ---------------------------------------------------- |
| `DisplayName` | `token` | | `DisplayName` | `token` |
| `RoleName` | `myrolename` | | `RoleName` | `myrolename` |
| Username | `V_TOKEN_MYROLENAME_USZT1N4CYHAL4M0XTGX3_1614294836` | | Username | `V_TOKEN_MYROLENAME_USZT1N4CYHAL4M0XTGX3_1614294836` |
| Example | | | Example | |
| ------------- | ------------------------------------------------------------------------------ | | ------------- | ------------------------------------------------------------------------------ |
| `DisplayName` | `amuchlonger_dispname` | | `DisplayName` | `amuchlonger_dispname` |
| `RoleName` | `role-name-with-dashes` | | `RoleName` | `role-name-with-dashes` |
| Username | `V_AMUCHLONGER_DISPNAME_ROLE-NAME-WITH-DASHES_S0T9XB0JSAB9NQZ7YJ40_1614294836` | | Username | `V_AMUCHLONGER_DISPNAME_ROLE-NAME-WITH-DASHES_S0T9XB0JSAB9NQZ7YJ40_1614294836` |
</details> </details>
</details> </details>

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: Elasticsearch - Database - Secrets Engines - HTTP API page_title: Elasticsearch - Database - Secrets Engines - HTTP API
sidebar_title: Elasticsearch
description: >- description: >-
The Elasticsearch plugin for Vault's database secrets engine generates The Elasticsearch plugin for Vault's database secrets engine generates
database credentials to access Elasticsearch. database credentials to access Elasticsearch.

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: HANA - Database - Secrets Engines - HTTP API page_title: HANA - Database - Secrets Engines - HTTP API
sidebar_title: HanaDB
description: >- description: >-
The HANA plugin for Vault's database secrets engine generates database The HANA plugin for Vault's database secrets engine generates database
credentials to access HANA servers. credentials to access HANA servers.

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: Database - Secrets Engines - HTTP API page_title: Database - Secrets Engines - HTTP API
sidebar_title: Databases
description: Top page for database secrets engine information description: Top page for database secrets engine information
--- ---

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: Influxdb - Database - Secrets Engines - HTTP API page_title: Influxdb - Database - Secrets Engines - HTTP API
sidebar_title: Influxdb
description: >- description: >-
The Influxdb plugin for Vault's database secrets engine generates database The Influxdb plugin for Vault's database secrets engine generates database
credentials to access Influxdb servers. credentials to access Influxdb servers.

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: MongoDB - Database - Secrets Engines - HTTP API page_title: MongoDB - Database - Secrets Engines - HTTP API
sidebar_title: MongoDB
description: >- description: >-
The MongoDB plugin for Vault's database secrets engine generates database The MongoDB plugin for Vault's database secrets engine generates database
credentials to access MongoDB servers. credentials to access MongoDB servers.
@@ -59,17 +58,17 @@ has a number of parameters to further configure a connection.
<details> <details>
<summary><b>Example Usernames:</b></summary> <summary><b>Example Usernames:</b></summary>
| Example | | | Example | |
| ------------- | ---------------------------------------------------- | | ------------- | ---------------------------------------------------- |
| `DisplayName` | `token` | | `DisplayName` | `token` |
| `RoleName` | `myrolename` | | `RoleName` | `myrolename` |
| Username | `v-token-myrolename-jNFRlKsZZMxJEx60o66i-1614294836` | | Username | `v-token-myrolename-jNFRlKsZZMxJEx60o66i-1614294836` |
| Example | | | Example | |
| ------------- | ------------------------------------------------------------------- | | ------------- | ------------------------------------------------------------------- |
| `DisplayName` | `amuchlonger_dispname` | | `DisplayName` | `amuchlonger_dispname` |
| `RoleName` | `role-name-with-dashes` | | `RoleName` | `role-name-with-dashes` |
| Username | `v-amuchlonger_dis-role-name-with--jNFRlKsZZMxJEx60o66i-1614294836` | | Username | `v-amuchlonger_dis-role-name-with--jNFRlKsZZMxJEx60o66i-1614294836` |
</details> </details>
</details> </details>

View File

@@ -1,7 +1,6 @@
--- ---
layout: 'api' layout: 'api'
page_title: 'MongoDB Atlas - Database - Secrets Engines - HTTP API' page_title: 'MongoDB Atlas - Database - Secrets Engines - HTTP API'
sidebar_title: 'MongoDB Atlas'
description: |- description: |-
The MongoDB Atlas plugin for Vault's Database Secrets Engine generates MongoDB Database User credentials for MongoDB Atlas. The MongoDB Atlas plugin for Vault's Database Secrets Engine generates MongoDB Database User credentials for MongoDB Atlas.
--- ---

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: MSSQL - Database - Secrets Engines - HTTP API page_title: MSSQL - Database - Secrets Engines - HTTP API
sidebar_title: MSSQL
description: >- description: >-
The MSSQL plugin for Vault's database secrets engine generates database The MSSQL plugin for Vault's database secrets engine generates database
credentials to access MSSQL servers. credentials to access MSSQL servers.
@@ -58,17 +57,17 @@ has a number of parameters to further configure a connection.
<details> <details>
<summary><b>Example Usernames:</b></summary> <summary><b>Example Usernames:</b></summary>
| Example | | | Example | |
| ------------- | ---------------------------------------------------- | | ------------- | ---------------------------------------------------- |
| `DisplayName` | `token` | | `DisplayName` | `token` |
| `RoleName` | `myrolename` | | `RoleName` | `myrolename` |
| Username | `v-token-myrolename-jNFRlKsZZMxJEx60o66i-1614294836` | | Username | `v-token-myrolename-jNFRlKsZZMxJEx60o66i-1614294836` |
| Example | | | Example | |
| ------------- | ----------------------------------------------------------------------------- | | ------------- | ----------------------------------------------------------------------------- |
| `DisplayName` | `amuchlonger_dispname` | | `DisplayName` | `amuchlonger_dispname` |
| `RoleName` | `role-name-with-dashes` | | `RoleName` | `role-name-with-dashes` |
| Username | `v-amuchlonger_dispname-role-name-with-dashe-LUHU9xqm6YNisikA3iCQ-1614294836` | | Username | `v-amuchlonger_dispname-role-name-with-dashe-LUHU9xqm6YNisikA3iCQ-1614294836` |
</details> </details>
</details> </details>

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: MySQL/MariaDB - Database - Secrets Engines - HTTP API page_title: MySQL/MariaDB - Database - Secrets Engines - HTTP API
sidebar_title: MySQL/MariaDB
description: >- description: >-
The MySQL/MariaDB plugin for Vault's database secrets engine generates The MySQL/MariaDB plugin for Vault's database secrets engine generates
database credentials to access MySQL and MariaDB servers. database credentials to access MySQL and MariaDB servers.
@@ -95,17 +94,17 @@ has a number of parameters to further configure a connection.
<details> <details>
<summary><b>Example Usernames:</b></summary> <summary><b>Example Usernames:</b></summary>
| Example | | | Example | |
| ------------- | ------------------ | | ------------- | ------------------ |
| `DisplayName` | `token` | | `DisplayName` | `token` |
| `RoleName` | `myrolename` | | `RoleName` | `myrolename` |
| Username | `v-myro-jNFRlKsZZ` | | Username | `v-myro-jNFRlKsZZ` |
| Example | | | Example | |
| ------------- | ----------------------- | | ------------- | ----------------------- |
| `DisplayName` | `amuchlonger_dispname` | | `DisplayName` | `amuchlonger_dispname` |
| `RoleName` | `role-name-with-dashes` | | `RoleName` | `role-name-with-dashes` |
| Username | `v-role-b9ODeKsfl` | | Username | `v-role-b9ODeKsfl` |
</details> </details>
</details> </details>

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: Oracle - Database - Secrets Engines - HTTP API page_title: Oracle - Database - Secrets Engines - HTTP API
sidebar_title: Oracle
description: >- description: >-
The Oracle plugin for Vault's database secrets engine generates database The Oracle plugin for Vault's database secrets engine generates database
credentials to access Oracle servers. credentials to access Oracle servers.

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: PostgreSQL - Database - Secrets Engines - HTTP API page_title: PostgreSQL - Database - Secrets Engines - HTTP API
sidebar_title: PostgreSQL
description: >- description: >-
The PostgreSQL plugin for Vault's database secrets engine generates database The PostgreSQL plugin for Vault's database secrets engine generates database
credentials to access PostgreSQL servers. credentials to access PostgreSQL servers.

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: Redshift - Database - Secrets Engines - HTTP API page_title: Redshift - Database - Secrets Engines - HTTP API
sidebar_title: Redshift
description: >- description: >-
The Redshift plugin for Vault's database secrets engine generates database The Redshift plugin for Vault's database secrets engine generates database
credentials to access the AWS Redshift service. credentials to access the AWS Redshift service.

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: Snowflake - Database - Secrets Engines - HTTP API page_title: Snowflake - Database - Secrets Engines - HTTP API
sidebar_title: Snowflake
description: >- description: >-
The Snowflake plugin for Vault's database secrets engine generates database The Snowflake plugin for Vault's database secrets engine generates database
credentials to access Snowflake servers. credentials to access Snowflake servers.

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: Google Cloud - Secrets Engines - HTTP API page_title: Google Cloud - Secrets Engines - HTTP API
sidebar_title: Google Cloud
description: This is the API documentation for the Vault Google Cloud secrets engine. description: This is the API documentation for the Vault Google Cloud secrets engine.
--- ---

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: Google Cloud KMS - Secrets Engines - HTTP API page_title: Google Cloud KMS - Secrets Engines - HTTP API
sidebar_title: Google Cloud KMS
description: This is the API documentation for the Vault Google Cloud KMS secrets engine. description: This is the API documentation for the Vault Google Cloud KMS secrets engine.
--- ---

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: 'Identity Secret Backend: Entity Alias - HTTP API' page_title: 'Identity Secret Backend: Entity Alias - HTTP API'
sidebar_title: Entity Alias
description: >- description: >-
This is the API documentation for managing entity aliases in the identity This is the API documentation for managing entity aliases in the identity
store. store.

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: 'Identity Secret Backend: Entity - HTTP API' page_title: 'Identity Secret Backend: Entity - HTTP API'
sidebar_title: Entity
description: This is the API documentation for managing entities in the identity store. description: This is the API documentation for managing entities in the identity store.
--- ---

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: 'Identity Secret Backend: Group Alias - HTTP API' page_title: 'Identity Secret Backend: Group Alias - HTTP API'
sidebar_title: Group Alias
description: >- description: >-
This is the API documentation for managing the group aliases in the identity This is the API documentation for managing the group aliases in the identity
store. store.

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: 'Identity Secret Backend: Group - HTTP API' page_title: 'Identity Secret Backend: Group - HTTP API'
sidebar_title: Group
description: This is the API documentation for managing groups in the identity store. description: This is the API documentation for managing groups in the identity store.
--- ---
@@ -15,7 +14,7 @@ This endpoint creates or updates a Group.
### Parameters ### Parameters
- `name` `(string: entity-<UUID>)` Name of the group. If set (and - `name` `(string: entity-<UUID>)` Name of the group. If set (and
ID is not set), updates the corresponding existing group. ID is not set), updates the corresponding existing group.
- `id` `(string: <optional>)` - ID of the group. If set, updates the - `id` `(string: <optional>)` - ID of the group. If set, updates the

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: Identity - Secrets Engines - HTTP API page_title: Identity - Secrets Engines - HTTP API
sidebar_title: Identity
description: This is the API documentation for the Vault Identity secrets engine. description: This is the API documentation for the Vault Identity secrets engine.
--- ---

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: 'Identity Secret Backend: Lookup - HTTP API' page_title: 'Identity Secret Backend: Lookup - HTTP API'
sidebar_title: Lookup
description: |- description: |-
This is the API documentation for entity and group lookups from identity This is the API documentation for entity and group lookups from identity
store. store.

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: 'Identity Secret Backend: Identity Tokens - HTTP API' page_title: 'Identity Secret Backend: Identity Tokens - HTTP API'
sidebar_title: Identity Tokens
description: >- description: >-
This is the API documentation for configuring, acquiring, and validating vault This is the API documentation for configuring, acquiring, and validating vault
issued identity tokens. issued identity tokens.

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: Secrets Engines - HTTP API page_title: Secrets Engines - HTTP API
sidebar_title: Secrets Engines
description: |- description: |-
Each secrets engine publishes its own set of API paths and methods. These Each secrets engine publishes its own set of API paths and methods. These
endpoints are documented in this section. endpoints are documented in this section.

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: AWS KMS - Key Management - Secrets Engines - HTTP API page_title: AWS KMS - Key Management - Secrets Engines - HTTP API
sidebar_title: AWS KMS
description: The AWS KMS API documentation for the Key Management secrets engine. description: The AWS KMS API documentation for the Key Management secrets engine.
--- ---
@@ -43,13 +42,13 @@ the given parameter values.
as environment variables. Credentials provided to this parameter will take precedence over as environment variables. Credentials provided to this parameter will take precedence over
credentials provided via environment variables. credentials provided via environment variables.
- `access_key` `(string: <required>)` - The AWS access key ID. May also be specified - `access_key` `(string: <required>)` - The AWS access key ID. May also be specified
by the `AWS_ACCESS_KEY_ID` environment variable. by the `AWS_ACCESS_KEY_ID` environment variable.
- `secret_key` `(string: <required>)` - The AWS secret access key. May also be specified - `secret_key` `(string: <required>)` - The AWS secret access key. May also be specified
by the `AWS_SECRET_ACCESS_KEY` environment variable. by the `AWS_SECRET_ACCESS_KEY` environment variable.
- `session_token` `(string: <optional>)` - The AWS session token. May also be specified - `session_token` `(string: <optional>)` - The AWS session token. May also be specified
by the `AWS_SESSION_TOKEN` environment variable. by the `AWS_SESSION_TOKEN` environment variable.
- `endpoint` `(string: <optional>)` - The KMS API endpoint to be used to make AWS KMS - `endpoint` `(string: <optional>)` - The KMS API endpoint to be used to make AWS KMS
requests. May also be specified by the `AWS_KMS_ENDPOINT` environment variable. This requests. May also be specified by the `AWS_KMS_ENDPOINT` environment variable. This
is useful when connecting to KMS over a [VPC Endpoint](https://docs.aws.amazon.com/kms/latest/developerguide/kms-vpc-endpoint.html). is useful when connecting to KMS over a [VPC Endpoint](https://docs.aws.amazon.com/kms/latest/developerguide/kms-vpc-endpoint.html).
If not set, the secrets engine will use the default API endpoint for the region. If not set, the secrets engine will use the default API endpoint for the region.

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: Azure Key Vault - Key Management - Secrets Engines - HTTP API page_title: Azure Key Vault - Key Management - Secrets Engines - HTTP API
sidebar_title: Azure Key Vault
description: The Azure Key Vault API documentation for the Key Management secrets engine. description: The Azure Key Vault API documentation for the Key Management secrets engine.
--- ---
@@ -40,11 +39,11 @@ the given parameter values.
be specified as environment variables. Environment variables will take precedence over be specified as environment variables. Environment variables will take precedence over
credentials provided via this parameter. credentials provided via this parameter.
- `tenant_id` `(string: <required>)` - The tenant ID for the Azure Active Directory - `tenant_id` `(string: <required>)` - The tenant ID for the Azure Active Directory
organization. May also be specified by the `AZURE_TENANT_ID` environment variable. organization. May also be specified by the `AZURE_TENANT_ID` environment variable.
- `client_id` `(string: <required or MSI>)` - The client ID for credentials to invoke the - `client_id` `(string: <required or MSI>)` - The client ID for credentials to invoke the
Azure APIs. May also be specified by the `AZURE_CLIENT_ID` environment variable. Azure APIs. May also be specified by the `AZURE_CLIENT_ID` environment variable.
- `client_secret` `(string: <required or MSI>)` - The client secret for credentials to invoke - `client_secret` `(string: <required or MSI>)` - The client secret for credentials to invoke
the Azure APIs. May also be specified by the `AZURE_CLIENT_SECRET` environment variable. the Azure APIs. May also be specified by the `AZURE_CLIENT_SECRET` environment variable.
- `environment` `(string: "AzurePublicCloud")` - The Azure Cloud environment API endpoints to - `environment` `(string: "AzurePublicCloud")` - The Azure Cloud environment API endpoints to
use. May also be specified by the `AZURE_ENVIRONMENT` environment variable. use. May also be specified by the `AZURE_ENVIRONMENT` environment variable.

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: Key Management - Secrets Engines - HTTP API page_title: Key Management - Secrets Engines - HTTP API
sidebar_title: Key Management <sup>ENTERPRISE</sup>
description: The API documentation for the Key Management secrets engine. description: The API documentation for the Key Management secrets engine.
--- ---
@@ -266,8 +265,8 @@ the given parameter values.
the [KMS Providers](/docs/secrets/key-management#kms-providers) section. The following values the [KMS Providers](/docs/secrets/key-management#kms-providers) section. The following values
are supported: are supported:
- `azurekeyvault` - `azurekeyvault`
- `awskms` - `awskms`
### Common Parameters ### Common Parameters

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: KMIP - Secrets Engines - HTTP API page_title: KMIP - Secrets Engines - HTTP API
sidebar_title: KMIP <sup>ENTERPRISE</sup>
description: This is the API documentation for the Vault KMIP secrets engine. description: This is the API documentation for the Vault KMIP secrets engine.
--- ---
@@ -24,9 +23,9 @@ update your API calls accordingly.
This endpoint configures shared information for the secrets engine. After writing This endpoint configures shared information for the secrets engine. After writing
to it the KMIP engine will generate a CA and start listening for KMIP requests. to it the KMIP engine will generate a CA and start listening for KMIP requests.
If the server was already running and any non-client settings are changed, the If the server was already running and any non-client settings are changed, the
server will be restarted using the new settings. All generated CAs will use server will be restarted using the new settings. All generated CAs will use
entropy augmentation to generate their certificates if entropy augmentation entropy augmentation to generate their certificates if entropy augmentation
is enabled. is enabled.
### Parameters ### Parameters
@@ -404,7 +403,7 @@ $ curl \
| :----- | :-------------------------------------------------- | | :----- | :-------------------------------------------------- |
| `POST` | `/kmip/scope/:scope/role/:role/credential/generate` | | `POST` | `/kmip/scope/:scope/role/:role/credential/generate` |
Create a new client certificate tied to the given role and scope. Create a new client certificate tied to the given role and scope.
This endpoint uses entropy augmentation to generate the client certificate This endpoint uses entropy augmentation to generate the client certificate
if entropy augmentation is enabled. if entropy augmentation is enabled.

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: KV - Secrets Engines - HTTP API page_title: KV - Secrets Engines - HTTP API
sidebar_title: Key/Value
description: This is the API documentation for the Vault KV secrets engine. description: This is the API documentation for the Vault KV secrets engine.
--- ---

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: KV - Secrets Engines - HTTP API page_title: KV - Secrets Engines - HTTP API
sidebar_title: K/V Version 1
description: This is the API documentation for the Vault KV secrets engine. description: This is the API documentation for the Vault KV secrets engine.
--- ---

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: KV - Secrets Engines - HTTP API page_title: KV - Secrets Engines - HTTP API
sidebar_title: K/V Version 2
description: This is the API documentation for the Vault KV secrets engine. description: This is the API documentation for the Vault KV secrets engine.
--- ---

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: MongoDB Atlas - Secrets Engines - HTTP API page_title: MongoDB Atlas - Secrets Engines - HTTP API
sidebar_title: MongoDB Atlas
description: |- description: |-
The MongoDB Atlas Secrets Engine for Vault generates MongoDB Atlas Programmatic API Keys dynamically. The MongoDB Atlas Secrets Engine for Vault generates MongoDB Atlas Programmatic API Keys dynamically.
--- ---

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: Nomad Secret Backend - HTTP API page_title: Nomad Secret Backend - HTTP API
sidebar_title: Nomad
description: This is the API documentation for the Vault Nomad secret backend. description: This is the API documentation for the Vault Nomad secret backend.
--- ---

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: OpenLDAP - Secrets Engines - HTTP API page_title: OpenLDAP - Secrets Engines - HTTP API
sidebar_title: OpenLDAP
description: This is the API documentation for the Vault OpenLDAP secrets engine. description: This is the API documentation for the Vault OpenLDAP secrets engine.
--- ---
@@ -226,7 +225,6 @@ $ curl \
http://127.0.0.1:8200/v1/openldap/static-cred/hashicorp http://127.0.0.1:8200/v1/openldap/static-cred/hashicorp
``` ```
#### Sample Get Response #### Sample Get Response
```json ```json
@@ -266,8 +264,8 @@ OpenLDAP domain user account.
#### Parameters #### Parameters
| Method | Path | | Method | Path |
| :------- | :------------------------- | | :------- | :-------------------------- |
| `POST` | `/openldap/role/:role_name` | | `POST` | `/openldap/role/:role_name` |
| `DELETE` | `/openldap/role/:role_name` | | `DELETE` | `/openldap/role/:role_name` |
@@ -341,6 +339,7 @@ The `creation_ldif`, `deletion_ldif`, `rollback_ldif`, and `username_template` f
Sample LDIF files: Sample LDIF files:
`creation.ldif`: `creation.ldif`:
``` ```
dn: cn={{.Username}},ou=users,dc=learn,dc=example dn: cn={{.Username}},ou=users,dc=learn,dc=example
objectClass: person objectClass: person
@@ -372,7 +371,7 @@ Full Payload:
``` ```
-> Note: The LDIF statements may optionally be base64 encoded. If they are base64 encoded when creating/updating the -> Note: The LDIF statements may optionally be base64 encoded. If they are base64 encoded when creating/updating the
role configuration, the decoded version will be returned from the `GET` endpoint. role configuration, the decoded version will be returned from the `GET` endpoint.
#### Sample POST Request #### Sample POST Request
@@ -386,8 +385,8 @@ $ curl \
### Read Dynamic Role Configuration ### Read Dynamic Role Configuration
| Method | Path | | Method | Path |
| ------ | -------------------------- | | ------ | --------------------------- |
| `GET` | `/openldap/role/:role_name` | | `GET` | `/openldap/role/:role_name` |
Retrieves a dynamic role's configuration. Retrieves a dynamic role's configuration.

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: PKI - Secrets Engines - HTTP API page_title: PKI - Secrets Engines - HTTP API
sidebar_title: PKI
description: This is the API documentation for the Vault PKI secrets engine. description: This is the API documentation for the Vault PKI secrets engine.
--- ---
@@ -1605,30 +1604,27 @@ $ curl \
# Cluster Scalability # Cluster Scalability
Most non-introspection operations in the PKI secrets engine require a write to Most non-introspection operations in the PKI secrets engine require a write to
storage, and so are forwarded to the cluster's active node for execution. storage, and so are forwarded to the cluster's active node for execution.
This table outlines which operations can be executed on performance standbys This table outlines which operations can be executed on performance standbys
and thus scale horizontally. and thus scale horizontally.
| Path | Operations | | Path | Operations |
| --------------------------- | ------------------- | | --------------------------- | -------------------- |
| ca[/pem] | Read | | ca[/pem] | Read |
| cert/<em>serial-number</em> | Read | | cert/<em>serial-number</em> | Read |
| cert/ca_chain | Read | | cert/ca_chain | Read |
| config/crl | Read | | config/crl | Read |
| certs | List | | certs | List |
| ca_chain | Read | | ca_chain | Read |
| crl[/pem] | Read | | crl[/pem] | Read |
| crl/pem | Read | | crl/pem | Read |
| issue | Update <sup>*</sup> | | issue | Update <sup>\*</sup> |
| revoked/* | Read, List | | revoked/\* | Read, List |
| sign | Update <sup>*</sup> | | sign | Update <sup>\*</sup> |
| sign-verbatim | Update <sup>*</sup> | | sign-verbatim | Update <sup>\*</sup> |
\* Only if the corresponding role has `no_store` set to true and `generate_lease` \* Only if the corresponding role has `no_store` set to true and `generate_lease`
set to false. If `generate_lease` is true the lease creation will be forwarded to set to false. If `generate_lease` is true the lease creation will be forwarded to
the active node; if `no_store` is false the entire request will be forwarded to the active node; if `no_store` is false the entire request will be forwarded to
the active node. the active node.

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: RabbitMQ - Secrets Engines - HTTP API page_title: RabbitMQ - Secrets Engines - HTTP API
sidebar_title: RabbitMQ
description: This is the API documentation for the Vault RabbitMQ secrets engine. description: This is the API documentation for the Vault RabbitMQ secrets engine.
--- ---

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: SSH - Secrets Engines - HTTP API page_title: SSH - Secrets Engines - HTTP API
sidebar_title: SSH
description: This is the API documentation for the Vault SSH secrets engine. description: This is the API documentation for the Vault SSH secrets engine.
--- ---

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: Terraform Cloud Secret Backend - HTTP API page_title: Terraform Cloud Secret Backend - HTTP API
sidebar_title: Terraform Cloud
description: This is the API documentation for the Vault Terraform Cloud secret backend. description: This is the API documentation for the Vault Terraform Cloud secret backend.
--- ---
@@ -21,8 +20,8 @@ This endpoint configures the access information for Terraform Cloud. This access
information is used so that Vault can communicate with Terraform Cloud and generate information is used so that Vault can communicate with Terraform Cloud and generate
Terraform Cloud tokens. Terraform Cloud tokens.
| Method | Path | | Method | Path |
| :----- | :--------------------- | | :----- | :------------------ |
| `POST` | `/terraform/config` | | `POST` | `/terraform/config` |
### Parameters ### Parameters
@@ -35,7 +34,6 @@ Terraform Cloud tokens.
use. This token must have the needed permissions to manage all Organization, use. This token must have the needed permissions to manage all Organization,
Team, and User tokens desired for this mount. Team, and User tokens desired for this mount.
### Sample Payload ### Sample Payload
```json ```json
@@ -59,8 +57,8 @@ $ curl \
This endpoint queries for information about the Terraform Cloud connection. This endpoint queries for information about the Terraform Cloud connection.
| Method | Path | | Method | Path |
| :----- | :--------------------- | | :----- | :------------------ |
| `GET` | `/terraform/config` | | `GET` | `/terraform/config` |
### Sample Request ### Sample Request
@@ -80,19 +78,18 @@ $ curl \
} }
``` ```
## Create/Update Role ## Create/Update Role
This endpoint creates or updates the Terraform Cloud role definition in Vault. This endpoint creates or updates the Terraform Cloud role definition in Vault.
If the role does not exist, it will be created. If the role already exists, it If the role does not exist, it will be created. If the role already exists, it
will receive updated attributes. will receive updated attributes.
Terraform Cloud offers three distinct types of API tokens with varying level of Terraform Cloud offers three distinct types of API tokens with varying level of
access: Organizations, Teams, and Users. A Vault Role can manage a single type access: Organizations, Teams, and Users. A Vault Role can manage a single type
of API token at a time, determined by how it is configured: of API token at a time, determined by how it is configured:
- To manage an Organization API token, provide the organization - To manage an Organization API token, provide the organization
name with the `organization` parameter name with the `organization` parameter
- To manage a Team API token, provide the `team_id` parameter - To manage a Team API token, provide the `team_id` parameter
- To manage a User API token, provide a `user_id` parameter - To manage a User API token, provide a `user_id` parameter
@@ -107,9 +104,8 @@ Please see the [Terraform Cloud API
Token documentation for more Token documentation for more
information](https://www.terraform.io/docs/cloud/users-teams-organizations/api-tokens.html). information](https://www.terraform.io/docs/cloud/users-teams-organizations/api-tokens.html).
| Method | Path |
| Method | Path | | :----- | :---------------------- |
| :----- | :------------------ |
| `POST` | `/terraform/role/:name` | | `POST` | `/terraform/role/:name` |
### Parameters ### Parameters
@@ -119,7 +115,7 @@ information](https://www.terraform.io/docs/cloud/users-teams-organizations/api-t
- `organization` `(string: "")` Organization name to manage the single API - `organization` `(string: "")` Organization name to manage the single API
token. Organizations can only have a single active API token at any given token. Organizations can only have a single active API token at any given
time. Conflicts with `user_id`. time. Conflicts with `user_id`.
- `team_id` `(string: "")` Team ID to manage the single API token. Teams can - `team_id` `(string: "")` Team ID to manage the single API token. Teams can
only have a single active API token at any given time. Conflicts with only have a single active API token at any given time. Conflicts with
@@ -136,7 +132,6 @@ information](https://www.terraform.io/docs/cloud/users-teams-organizations/api-t
as a string duration with a time suffix like `"30s"` or `"1h"` or as seconds. If not as a string duration with a time suffix like `"30s"` or `"1h"` or as seconds. If not
provided, the default Vault Max TTL is used. Only applies to User API tokens. provided, the default Vault Max TTL is used. Only applies to User API tokens.
### Sample Payload ### Sample Payload
To create a Vault role to manage a Terraform Cloud User tokens To create a Vault role to manage a Terraform Cloud User tokens
@@ -144,8 +139,8 @@ To create a Vault role to manage a Terraform Cloud User tokens
```json ```json
{ {
"user_id": "user-glhf1234", "user_id": "user-glhf1234",
"ttl":"1h", "ttl": "1h",
"max_ttl":"24h", "max_ttl": "24h"
} }
``` ```
@@ -164,8 +159,8 @@ $ curl \
This endpoint queries for information about a Terraform Cloud role with the given name. This endpoint queries for information about a Terraform Cloud role with the given name.
If no role exists with that name, a 404 is returned. If no role exists with that name, a 404 is returned.
| Method | Path | | Method | Path |
| :----- | :------------------ | | :----- | :---------------------- |
| `GET` | `/terraform/role/:name` | | `GET` | `/terraform/role/:name` |
### Parameters ### Parameters
@@ -190,7 +185,7 @@ $ curl \
"name": "tfuser", "name": "tfuser",
"ttl": 3600, "ttl": 3600,
"user_id": "user-glhf1234" "user_id": "user-glhf1234"
}, }
} }
``` ```
@@ -198,8 +193,8 @@ $ curl \
This endpoint lists all existing roles in the backend. This endpoint lists all existing roles in the backend.
| Method | Path | | Method | Path |
| :----- | :---------------------- | | :----- | :-------------------------- |
| `LIST` | `/terraform/role` | | `LIST` | `/terraform/role` |
| `GET` | `/terraform/role?list=true` | | `GET` | `/terraform/role?list=true` |
@@ -227,8 +222,8 @@ $ curl \
This endpoint deletes a Terraform Cloud role with the given name. Even if the role does This endpoint deletes a Terraform Cloud role with the given name. Even if the role does
not exist, this endpoint will still return a successful response. not exist, this endpoint will still return a successful response.
| Method | Path | | Method | Path |
| :------- | :------------------ | | :------- | :---------------------- |
| `DELETE` | `/terraform/role/:name` | | `DELETE` | `/terraform/role/:name` |
### Parameters ### Parameters
@@ -251,9 +246,8 @@ This endpoint rotates the credentials for a Terraform Cloud role that manages an
Organization or Team. This endpoint is only valid for those roles; attempting to Organization or Team. This endpoint is only valid for those roles; attempting to
rotate a role that manages user tokens will result in an error. rotate a role that manages user tokens will result in an error.
| Method | Path |
| Method | Path | | :----- | :----------------------------- |
| :------- | :------------------ |
| `POST` | `/terraform/rotate-role/:name` | | `POST` | `/terraform/rotate-role/:name` |
### Parameters ### Parameters
@@ -277,8 +271,8 @@ definition. For Organization and Team roles, the same API token is returned
until the token is rotated with `rotate-role`. For User roles, a new token is until the token is rotated with `rotate-role`. For User roles, a new token is
generated with each request. generated with each request.
| Method | Path | | Method | Path |
| :----- | :------------------- | | :----- | :----------------------- |
| `GET` | `/terraform/creds/:name` | | `GET` | `/terraform/creds/:name` |
### Parameters ### Parameters

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: TOTP - Secrets Engines - HTTP API page_title: TOTP - Secrets Engines - HTTP API
sidebar_title: TOTP
description: This is the API documentation for the Vault TOTP secrets engine. description: This is the API documentation for the Vault TOTP secrets engine.
--- ---

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: Transform - Secrets Engines - HTTP API page_title: Transform - Secrets Engines - HTTP API
sidebar_title: Transform <sup>ENTERPRISE</sup>
description: This is the API documentation for the Transform secrets engine. description: This is the API documentation for the Transform secrets engine.
--- ---
@@ -211,8 +210,8 @@ This endpoint creates or updates an FPE transformation with the given `name`. If
transformation with the name does not exist, it will be created. If the transformation with the name does not exist, it will be created. If the
transformation exists, it will be updated with the new attributes. transformation exists, it will be updated with the new attributes.
| Method | Path | | Method | Path |
| :----- | :------------------------------------ | | :----- | :------------------------------------- |
| `POST` | `/transform/transformations/fpe/:name` | | `POST` | `/transform/transformations/fpe/:name` |
### Parameters ### Parameters
@@ -260,8 +259,8 @@ This endpoint creates or updates a masking transformation with the given `name`.
transformation with the name does not exist, it will be created. If the transformation with the name does not exist, it will be created. If the
transformation exists, it will be updated with the new attributes. transformation exists, it will be updated with the new attributes.
| Method | Path | | Method | Path |
| :----- | :---------------------------------------- | | :----- | :----------------------------------------- |
| `POST` | `/transform/transformations/masking/:name` | | `POST` | `/transform/transformations/masking/:name` |
### Parameters ### Parameters
@@ -310,8 +309,8 @@ This endpoint creates or updates a tokenization transformation with the given `n
transformation with the name does not exist, it will be created. If the transformation with the name does not exist, it will be created. If the
transformation exists, it will be updated with the new attributes. transformation exists, it will be updated with the new attributes.
| Method | Path | | Method | Path |
| :----- | :--------------------------------------------- | | :----- | :---------------------------------------------- |
| `POST` | `/transform/transformations/tokenization/:name` | | `POST` | `/transform/transformations/tokenization/:name` |
### Parameters ### Parameters
@@ -361,8 +360,8 @@ $ curl \
This endpoint queries an existing transformation by the given name. This endpoint queries an existing transformation by the given name.
| Method | Path | | Method | Path |
| :----- | :-------------------------------- | | :----- | :--------------------------------- |
| `GET` | `/transform/transformations/:name` | | `GET` | `/transform/transformations/:name` |
- `name` `(string: <required>)` - `name` `(string: <required>)`
@@ -420,8 +419,8 @@ $ curl
This endpoint deletes an existing transformation by the given name. This endpoint deletes an existing transformation by the given name.
| Method | Path | | Method | Path |
| :------- | :-------------------------------- | | :------- | :--------------------------------- |
| `DELETE` | `/transform/transformations/:name` | | `DELETE` | `/transform/transformations/:name` |
### Parameters ### Parameters
@@ -705,7 +704,7 @@ The database user configured here should only have permission to `SELECT`,
- `type` `(string: <required>)` - - `type` `(string: <required>)` -
Specifies the type of store. Currently only `sql` is supported. Specifies the type of store. Currently only `sql` is supported.
- `driver` `(string: <required>)` - - `driver` `(string: <required>)` -
Specifies the database driver to use, and thus which SQL database type. Specifies the database driver to use, and thus which SQL database type.
Currently the supported options are `postgres` or `mysql` Currently the supported options are `postgres` or `mysql`
@@ -714,9 +713,10 @@ The database user configured here should only have permission to `SELECT`,
- `connection_string` `(string: <required>)` - - `connection_string` `(string: <required>)` -
A database connection string with template slots for username and password that A database connection string with template slots for username and password that
Vault will use for locating and connecting to a database. Each Vault will use for locating and connecting to a database. Each
database driver type has a different syntax for its connection strings. database driver type has a different syntax for its connection strings.
> When using MySQL, make sure to append `?parseTime=true` to enable timestamp parsing.
> When using MySQL, make sure to append `?parseTime=true` to enable timestamp parsing.
- `username`: `(string: <required>)` - - `username`: `(string: <required>)` -
The username value to use when connecting to the database. The username value to use when connecting to the database.
@@ -1360,21 +1360,21 @@ $ curl \
## Snapshot Tokenization State ## Snapshot Tokenization State
This endpoint starts or continues retrieving a snapshot of the stored This endpoint starts or continues retrieving a snapshot of the stored
state of a tokenization transform. This state is protected as it is state of a tokenization transform. This state is protected as it is
in the underlying store, and so is safe for storage or transport. Snapshots in the underlying store, and so is safe for storage or transport. Snapshots
may be used for backup purposes or to migrate from one store to another. may be used for backup purposes or to migrate from one store to another.
If more than one store is configured for a tokenization transform, the If more than one store is configured for a tokenization transform, the
snapshot data contains the contents of the first store. snapshot data contains the contents of the first store.
Since more values may exist than can be returned in a single call, if Since more values may exist than can be returned in a single call, if
a snapshot has more values, the response will contain the `continuation` a snapshot has more values, the response will contain the `continuation`
field, an opaque value that if provided on a subsequent call will resume field, an opaque value that if provided on a subsequent call will resume
snapshotting at the next value. If absent, the end of the snapshot has snapshotting at the next value. If absent, the end of the snapshot has
been reached. been reached.
Snapshots are guaranteed to contain the values present at the time Snapshots are guaranteed to contain the values present at the time
of the first call to start the snapshot. Values tokenized after the of the first call to start the snapshot. Values tokenized after the
snapshot began may or may not be included. snapshot began may or may not be included.
| Method | Path | | Method | Path |
@@ -1390,7 +1390,7 @@ snapshot began may or may not be included.
The maximum number of tokenized value states to return on this call. The maximum number of tokenized value states to return on this call.
- `continuation` `string: ""` - - `continuation` `string: ""` -
If absent or empty, a new snapshot is started. If present, the If absent or empty, a new snapshot is started. If present, the
snapshot should continue at the next available value. snapshot should continue at the next available value.
### Sample Payload ### Sample Payload
@@ -1401,6 +1401,7 @@ snapshot began may or may not be included.
"continuation": "2F1nUpUKMZUBnwQ77qByt1" "continuation": "2F1nUpUKMZUBnwQ77qByt1"
} }
``` ```
### Sample Request ### Sample Request
```shell-session ```shell-session
@@ -1429,7 +1430,7 @@ $ curl \
## Restore Tokenization State ## Restore Tokenization State
This endpoint restores previously snapshotted tokenization state values This endpoint restores previously snapshotted tokenization state values
to the underlying store(s) of a tokenization transform. Calls to this to the underlying store(s) of a tokenization transform. Calls to this
endpoint are idempotent, so multiple outputs from a snapshot run can endpoint are idempotent, so multiple outputs from a snapshot run can
be applied via restore in any order and duplicates will not cause a problem. be applied via restore in any order and duplicates will not cause a problem.
@@ -1448,18 +1449,18 @@ into an `exportable` mode store and vice versa.
- `values` `([]string: <required>)` - - `values` `([]string: <required>)` -
Any number of tokenization state values from a previous snapshot call. Any number of tokenization state values from a previous snapshot call.
### Sample Payload ### Sample Payload
```json ```json
{ {
"values": [ "values": [
"CiDiVGJaXlcS0ky4mRVvfLdxk7FWh8ATcFMSbQRtWCs/HxJ8CAESIGQH2oukpwPAFoK2SaKUcYAxrnxtvJn7n5d3dWx2eCLcIkZ3FXcQKu5+Bnl4NzOSL2ZkU5t9OOpQOMg0lwsMkq0Vm98ANGC9RabaP2ePddzTkD58GBvsVetYVnqHQFZufQ2pw/EXkFIWMg4I4KvX4vf/////ARCgHw==", "CiDiVGJaXlcS0ky4mRVvfLdxk7FWh8ATcFMSbQRtWCs/HxJ8CAESIGQH2oukpwPAFoK2SaKUcYAxrnxtvJn7n5d3dWx2eCLcIkZ3FXcQKu5+Bnl4NzOSL2ZkU5t9OOpQOMg0lwsMkq0Vm98ANGC9RabaP2ePddzTkD58GBvsVetYVnqHQFZufQ2pw/EXkFIWMg4I4KvX4vf/////ARCgHw==",
"CiADFWL7/equiN83oWl/MvYWRYQLvjUxDVvoxK1Ghw4drBJ8CAESIOWPEUBUq4ATLY83P3vLknmWlKYjKVwTgB1z7hYGdyHPIka2nyOX1z3D4pMsZWwMFJlNBiT1Lb4MMZ6CUbclykLw/LBG5GTWQbOXx/3Vd54RAA82382mUem8Lu8BCMJYAa6vj/6aS9CLMg4I4KvX4vf/////ARCIJw==", "CiADFWL7/equiN83oWl/MvYWRYQLvjUxDVvoxK1Ghw4drBJ8CAESIOWPEUBUq4ATLY83P3vLknmWlKYjKVwTgB1z7hYGdyHPIka2nyOX1z3D4pMsZWwMFJlNBiT1Lb4MMZ6CUbclykLw/LBG5GTWQbOXx/3Vd54RAA82382mUem8Lu8BCMJYAa6vj/6aS9CLMg4I4KvX4vf/////ARCIJw==",
"CiBf2+RqeiXmIHIh2fytEKOesTZ5U31D4BZ5xyhpuj3UfRJ8CAESIOWPEUBUq4ATLY83P3vLknmWlKYjKVwTgB1z7hYGdyHPIkbbU3ho25Om5AsuLUdsAPiEnyRGbtUUDxrvSoz5T1OVY363dN08cN8diJJro+AE/Zv4QMnq9Vbu8FD237YkLV1bnX/t29ZMMg4I4KvX4vf/////ARDwLg==" "CiBf2+RqeiXmIHIh2fytEKOesTZ5U31D4BZ5xyhpuj3UfRJ8CAESIOWPEUBUq4ATLY83P3vLknmWlKYjKVwTgB1z7hYGdyHPIkbbU3ho25Om5AsuLUdsAPiEnyRGbtUUDxrvSoz5T1OVY363dN08cN8diJJro+AE/Zv4QMnq9Vbu8FD237YkLV1bnX/t29ZMMg4I4KvX4vf/////ARDwLg=="
] ]
} }
``` ```
### Sample Request ### Sample Request
```shell-session ```shell-session
@@ -1472,22 +1473,22 @@ $ curl \
## Export Decoded Tokenization State ## Export Decoded Tokenization State
This endpoint starts or continues retrieving an export of tokenization This endpoint starts or continues retrieving an export of tokenization
state, including the tokens and their decoded values. This call is only state, including the tokens and their decoded values. This call is only
supported on tokenization stores configured with the `exportable` mapping supported on tokenization stores configured with the `exportable` mapping
mode. Refer to the Tokenization mode. Refer to the Tokenization
[documentation](../docs/secrets/transform/tokenization.mdx#security_considerations) [documentation](../docs/secrets/transform/tokenization.mdx#security_considerations)
for when to use the `exportable` mapping mode. for when to use the `exportable` mapping mode.
Decoded values are in Base64 representation. Decoded values are in Base64 representation.
Since more values may exist than can be returned in a single call, if Since more values may exist than can be returned in a single call, if
an export has more values, the response will contain the `continuation` an export has more values, the response will contain the `continuation`
field, an opaque value that if provided on a subsequent call will resume field, an opaque value that if provided on a subsequent call will resume
snapshotting at the next value. If absent, the end of the export has snapshotting at the next value. If absent, the end of the export has
been reached. been reached.
Exports are guaranteed to contain the values present at the time Exports are guaranteed to contain the values present at the time
of the first call to start the export. Values tokenized after the of the first call to start the export. Values tokenized after the
snapshot began may or may not be included. snapshot began may or may not be included.
| Method | Path | | Method | Path |
@@ -1503,7 +1504,7 @@ snapshot began may or may not be included.
The maximum number of tokenized value states to return on this call. The maximum number of tokenized value states to return on this call.
- `continuation` `string: ""` - - `continuation` `string: ""` -
If absent or empty, a new export is started. If present, the If absent or empty, a new export is started. If present, the
export should continue at the next available value. export should continue at the next available value.
### Sample Payload ### Sample Payload
@@ -1514,6 +1515,7 @@ snapshot began may or may not be included.
"continuation": "2F1nUpUKMZUBnwQ77qByt1" "continuation": "2F1nUpUKMZUBnwQ77qByt1"
} }
``` ```
### Sample Request ### Sample Request
```shell-session ```shell-session
@@ -1528,7 +1530,7 @@ $ curl \
```json ```json
{ {
"data": { "data": {
"continuation": "4hELrrmGAwhHFjmMFny", "continuation": "4hELrrmGAwhHFjmMFny",
"values": [ "values": [
{ {
@@ -1538,7 +1540,7 @@ $ curl \
{ {
"plaintext": "dmFsdWUtMg==", "plaintext": "dmFsdWUtMg==",
"token": "Q4tYgFXHxUNyMfqRW6fA82DYvMigwdf6JjATauyVzqx2SsmUShMhN5", "token": "Q4tYgFXHxUNyMfqRW6fA82DYvMigwdf6JjATauyVzqx2SsmUShMhN5",
"expiration_time": "2021-03-15T00:31:10Z", "expiration_time": "2021-03-15T00:31:10Z"
}, },
{ {
"plaintext": "dmFsdWUtMQ==", "plaintext": "dmFsdWUtMQ==",
@@ -1551,14 +1553,13 @@ $ curl \
## Rotate Tokenization Key ## Rotate Tokenization Key
This endpoint rotates the version of the named key. After rotation, This endpoint rotates the version of the named key. After rotation,
new requests will be encoded with the new version of the key. new requests will be encoded with the new version of the key.
| Method | Path | | Method | Path |
| :----- | :---------------------------------------------------- | | :----- | :---------------------------------------------------- |
| `POST` | `/transform/tokenization/keys/:transform_name/rotate` | | `POST` | `/transform/tokenization/keys/:transform_name/rotate` |
### Parameters ### Parameters
- `transform_name` `(string: <required>)` - `transform_name` `(string: <required>)`
@@ -1576,8 +1577,8 @@ $ curl \
## Update Tokenization Key Config ## Update Tokenization Key Config
This endpoint allows the minimum key version to be set for This endpoint allows the minimum key version to be set for
decode operations. decode operations.
Only valid for tokenization transformations. Only valid for tokenization transformations.
| Method | Path | | Method | Path |
@@ -1592,17 +1593,17 @@ Only valid for tokenization transformations.
- `min_decryption_version` `(int: <optional>)` - `min_decryption_version` `(int: <optional>)`
Specifies the minimum key version that vault can use to decode values for the Specifies the minimum key version that vault can use to decode values for the
corresponding transform. corresponding transform.
### Sample Payload ### Sample Payload
```json ```json
[ [
{ {
"min_decryption_version": 1, "min_decryption_version": 1
} }
] ]
``` ```
### Sample Request ### Sample Request
@@ -1619,10 +1620,9 @@ $ curl \
List all tokenization keys. List all tokenization keys.
Only valid for tokenization transformations. Only valid for tokenization transformations.
| Method | Path | | Method | Path |
| :----- | :------------------------------- | | :----- | :------------------------------ |
| `LIST` | `/transform/tokenization/keys/` | | `LIST` | `/transform/tokenization/keys/` |
### Sample Request ### Sample Request
@@ -1687,7 +1687,7 @@ Once trimmed, previous versions of the key cannot be recovered.
of the URL. of the URL.
- `min_available_version` `(int: <required>)` - `min_available_version` `(int: <required>)`
Specifies minimum key version available for use for this transform. All versions below Specifies minimum key version available for use for this transform. All versions below
this will be permanently forgotten. Cannot be set below `min_decryption_version` or above this will be permanently forgotten. Cannot be set below `min_decryption_version` or above
`latest_version`. `latest_version`.
@@ -1708,4 +1708,3 @@ $ curl \
--data @payload.json \ --data @payload.json \
http://127.0.0.1:8200/v1/transform//transform/tokenization/keys/:transform_name/trim http://127.0.0.1:8200/v1/transform//transform/tokenization/keys/:transform_name/trim
``` ```

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: Transit - Secrets Engines - HTTP API page_title: Transit - Secrets Engines - HTTP API
sidebar_title: Transit
description: This is the API documentation for the Vault Transit secrets engine. description: This is the API documentation for the Vault Transit secrets engine.
--- ---

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: /sys/audit-hash - HTTP API page_title: /sys/audit-hash - HTTP API
sidebar_title: <code>/sys/audit-hash</code>
description: |- description: |-
The `/sys/audit-hash` endpoint is used to hash data using an audit device's The `/sys/audit-hash` endpoint is used to hash data using an audit device's
hash function and salt. hash function and salt.

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: /sys/audit - HTTP API page_title: /sys/audit - HTTP API
sidebar_title: <code>/sys/audit</code>
description: The `/sys/audit` endpoint is used to enable and disable audit devices. description: The `/sys/audit` endpoint is used to enable and disable audit devices.
--- ---

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: /sys/auth - HTTP API page_title: /sys/auth - HTTP API
sidebar_title: <code>/sys/auth</code>
description: The `/sys/auth` endpoint is used to manage auth methods in Vault. description: The `/sys/auth` endpoint is used to manage auth methods in Vault.
--- ---

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: /sys/capabilities-accessor - HTTP API page_title: /sys/capabilities-accessor - HTTP API
sidebar_title: <code>/sys/capabilities-accessor</code>
description: |- description: |-
The `/sys/capabilities-accessor` endpoint is used to fetch the capabilities of The `/sys/capabilities-accessor` endpoint is used to fetch the capabilities of
the token associated with an accessor, on the given paths. the token associated with an accessor, on the given paths.

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: /sys/capabilities-self - HTTP API page_title: /sys/capabilities-self - HTTP API
sidebar_title: <code>/sys/capabilities-self</code>
description: |- description: |-
The `/sys/capabilities-self` endpoint is used to fetch the capabilities of The `/sys/capabilities-self` endpoint is used to fetch the capabilities of
client token on the given paths. client token on the given paths.

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: /sys/capabilities - HTTP API page_title: /sys/capabilities - HTTP API
sidebar_title: <code>/sys/capabilities</code>
description: |- description: |-
The `/sys/capabilities` endpoint is used to fetch the capabilities of a token The `/sys/capabilities` endpoint is used to fetch the capabilities of a token
on the given paths. on the given paths.

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: /sys/config/auditing - HTTP API page_title: /sys/config/auditing - HTTP API
sidebar_title: <code>/sys/config/auditing</code>
description: The `/sys/config/auditing` endpoint is used to configure auditing settings. description: The `/sys/config/auditing` endpoint is used to configure auditing settings.
--- ---

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: /sys/config/control-group - HTTP API page_title: /sys/config/control-group - HTTP API
sidebar_title: <code>/sys/config/control-group</code>
description: The '/sys/config/control-group' endpoint configures control groups. description: The '/sys/config/control-group' endpoint configures control groups.
--- ---

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: /sys/config/cors - HTTP API page_title: /sys/config/cors - HTTP API
sidebar_title: <code>/sys/config/cors</code>
description: >- description: >-
The '/sys/config/cors' endpoint configures how the Vault server responds to The '/sys/config/cors' endpoint configures how the Vault server responds to
cross-origin requests. cross-origin requests.

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: /sys/config/state - HTTP API page_title: /sys/config/state - HTTP API
sidebar_title: <code>/sys/config/state</code>
description: The '/sys/config/state' endpoint is used to retrieve the configuration state. description: The '/sys/config/state' endpoint is used to retrieve the configuration state.
--- ---

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: /sys/config/ui - HTTP API page_title: /sys/config/ui - HTTP API
sidebar_title: <code>/sys/config/ui</code>
description: The '/sys/config/ui' endpoint configures the UI. description: The '/sys/config/ui' endpoint configures the UI.
--- ---

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: /sys/control-group - HTTP API page_title: /sys/control-group - HTTP API
sidebar_title: <code>/sys/control-group</code>
description: The '/sys/control-group' endpoint handles the Control Group workflow. description: The '/sys/control-group' endpoint handles the Control Group workflow.
--- ---

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: /sys/generate-recovery-token - HTTP API page_title: /sys/generate-recovery-token - HTTP API
sidebar_title: <code>/sys/generate-recovery-token</code>
description: |- description: |-
The `/sys/generate-recovery-token/` endpoints are used to create a new The `/sys/generate-recovery-token/` endpoints are used to create a new
recovery token for Vault. They are only active in recovery mode. recovery token for Vault. They are only active in recovery mode.

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: /sys/generate-root - HTTP API page_title: /sys/generate-root - HTTP API
sidebar_title: <code>/sys/generate-root</code>
description: |- description: |-
The `/sys/generate-root/` endpoints are used to create a new root key for The `/sys/generate-root/` endpoints are used to create a new root key for
Vault. Vault.

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: /sys/health - HTTP API page_title: /sys/health - HTTP API
sidebar_title: <code>/sys/health</code>
description: The `/sys/health` endpoint is used to check the health status of Vault. description: The `/sys/health` endpoint is used to check the health status of Vault.
--- ---

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: /sys/host-info - HTTP API page_title: /sys/host-info - HTTP API
sidebar_title: <code>/sys/host-info</code>
description: The '/sys/host-info' endpoint is used to retrieve host information description: The '/sys/host-info' endpoint is used to retrieve host information
--- ---

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: System Backend - HTTP API page_title: System Backend - HTTP API
sidebar_title: System Backend
description: |- description: |-
The system backend is a default backend in Vault that is mounted at the `/sys` The system backend is a default backend in Vault that is mounted at the `/sys`
endpoint. This endpoint cannot be disabled or moved, and is used to configure endpoint. This endpoint cannot be disabled or moved, and is used to configure

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: /sys/init - HTTP API page_title: /sys/init - HTTP API
sidebar_title: <code>/sys/init</code>
description: The `/sys/init` endpoint is used to initialize a new Vault. description: The `/sys/init` endpoint is used to initialize a new Vault.
--- ---

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: /sys/internal/counters - HTTP API page_title: /sys/internal/counters - HTTP API
sidebar_title: <code>/sys/internal/counters</code>
description: >- description: >-
The `/sys/internal/counters` endpoints are used to return data about Vault usage. The `/sys/internal/counters` endpoints are used to return data about Vault usage.
--- ---
@@ -244,8 +243,8 @@ The time period is from the start of the current month, up until the time that t
Note: the client count may be inaccurate in the moments following a Vault reboot, or leadership change. Note: the client count may be inaccurate in the moments following a Vault reboot, or leadership change.
The estimate will stabilize when background loading of client data has completed. The estimate will stabilize when background loading of client data has completed.
| Method | Path | | Method | Path |
| :----- | :-------------------------------- | | :----- | :---------------------------------------- |
| `GET` | `/sys/internal/counters/activity/monthly` | | `GET` | `/sys/internal/counters/activity/monthly` |
### Sample Request ### Sample Request
@@ -268,7 +267,7 @@ $ curl \
"data": { "data": {
"distinct_entities": 100, "distinct_entities": 100,
"non_entity_tokens": 120, "non_entity_tokens": 120,
"clients": 220, "clients": 220
}, },
"wrap_info": null, "wrap_info": null,
"warnings": null, "warnings": null,

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: /sys/internal/specs/openapi - HTTP API page_title: /sys/internal/specs/openapi - HTTP API
sidebar_title: <code>/sys/internal/specs/openapi</code>
description: >- description: >-
The `/sys/internal/specs/openapi` endpoint is used to generate an OpenAPI The `/sys/internal/specs/openapi` endpoint is used to generate an OpenAPI
document of the mounted backends. document of the mounted backends.

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: /sys/internal/ui/feature-flags - HTTP API page_title: /sys/internal/ui/feature-flags - HTTP API
sidebar_title: <code>/sys/internal/ui/feature-flags</code>
description: >- description: >-
The `/sys/internal/ui/feature-flags` endpoint exposes feature flags to the UI. The `/sys/internal/ui/feature-flags` endpoint exposes feature flags to the UI.
--- ---
@@ -12,7 +11,7 @@ The `/sys/internal/ui/feature-flags` endpoint is used to expose feature flags
to the UI so that it can change its behavior in response, even before a user logs in. to the UI so that it can change its behavior in response, even before a user logs in.
This is currently only being used internally for the UI and is This is currently only being used internally for the UI and is
an unauthenticated endpoint. Due to the nature of its intended usage, there is no an unauthenticated endpoint. Due to the nature of its intended usage, there is no
guarantee on backwards compatibility for this endpoint. guarantee on backwards compatibility for this endpoint.
## Get Enabled Feature Flags ## Get Enabled Feature Flags

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: /sys/internal/ui/mounts - HTTP API page_title: /sys/internal/ui/mounts - HTTP API
sidebar_title: <code>/sys/internal/ui/mounts</code>
description: >- description: >-
The `/sys/internal/ui/mounts` endpoint is used to manage mount listing The `/sys/internal/ui/mounts` endpoint is used to manage mount listing
visibility. visibility.

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: /sys/key-status - HTTP API page_title: /sys/key-status - HTTP API
sidebar_title: <code>/sys/key-status</code>
description: |- description: |-
The `/sys/key-status` endpoint is used to query info about the current The `/sys/key-status` endpoint is used to query info about the current
encryption key of Vault. encryption key of Vault.

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: /sys/leader - HTTP API page_title: /sys/leader - HTTP API
sidebar_title: <code>/sys/leader</code>
description: |- description: |-
The `/sys/leader` endpoint is used to check the high availability status and The `/sys/leader` endpoint is used to check the high availability status and
current leader of Vault. current leader of Vault.

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: /sys/quotas/lease-count - HTTP API page_title: /sys/quotas/lease-count - HTTP API
sidebar_title: <code>/sys/quotas/lease-count</code>
description: The `/sys/quotas/lease-count` endpoint is used to create, edit and delete lease count quotas. description: The `/sys/quotas/lease-count` endpoint is used to create, edit and delete lease count quotas.
--- ---

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: /sys/leases - HTTP API page_title: /sys/leases - HTTP API
sidebar_title: <code>/sys/leases</code>
description: The `/sys/leases` endpoints are used to view and manage leases. description: The `/sys/leases` endpoints are used to view and manage leases.
--- ---

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: /sys/license - HTTP API page_title: /sys/license - HTTP API
sidebar_title: <code>/sys/license</code>
description: |- description: |-
The `/sys/license` endpoint is used to view and update the license used in The `/sys/license` endpoint is used to view and update the license used in
Vault. Vault.

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: /sys/metrics - HTTP API page_title: /sys/metrics - HTTP API
sidebar_title: <code>/sys/metrics</code>
description: The `/sys/metrics` endpoint is used to get telemetry metrics for Vault. description: The `/sys/metrics` endpoint is used to get telemetry metrics for Vault.
--- ---

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: /sys/mfa/method/duo - HTTP API page_title: /sys/mfa/method/duo - HTTP API
sidebar_title: <code>/sys/mfa/method/duo</code>
description: >- description: >-
The '/sys/mfa/method/duo' endpoint focuses on managing Duo MFA behaviors in The '/sys/mfa/method/duo' endpoint focuses on managing Duo MFA behaviors in
Vault Enterprise. Vault Enterprise.

View File

@@ -1,7 +1,6 @@
--- ---
layout: api layout: api
page_title: /sys/mfa - HTTP API page_title: /sys/mfa - HTTP API
sidebar_title: <code>/sys/mfa</code>
description: >- description: >-
The '/sys/mfa' endpoint focuses on managing MFA behaviors in Vault Enterprise The '/sys/mfa' endpoint focuses on managing MFA behaviors in Vault Enterprise
MFA. MFA.

Some files were not shown because too many files have changed in this diff Show More