Processed yet due to some missing eventually consistent data. Returned on Enterprise when a request can't be a POST on an endpoint that only accepts GETs. You tried to use a method inappropriate to That you don't have permission to view a specific path. This can both mean that the path truly doesn't exist or 403 - Forbidden, your authentication details are either incorrect, youĭon't have access to this feature, or - if CORS is enabled - you made aĬross-origin request from an origin that is not allowed to make such.400 - Invalid request, missing or invalid data.Warnings are generated during the operation. 204 is simply an indication that there is no response body to parse,īut API endpoints that indicate that they return a 204 may return a 200 if Note: Applications should be prepared to accept both 200 and 204 as X-Vault-Namespace is set to ns1/ with the request path of ns2/secret/fooĪs well, or otherwise if X-Vault-Namespace is omitted entirely and instead aĬomplete path is provided such as: ns1/ns2/secret/foo.įor example, the following two commands result in equivalent requests: X-Vault-Namespace header, Vault will match the corresponding namespaceīased on correlating user input. Note that it is semantically equivalent to use the full path rather than the Then the resulting request path to Vault will be ns1/ns2/secret/foo. Request URI is secret/foo with the X-Vault-Namespace header set as ns1/ns2/, Request is relative to the X-Vault-Namespace header. When using Namespaces the final path of the API Otherwise, Vault will return a 404 unsupported path error. Several Vault APIs require specifying path parameters. The resulting token should be saved on theĬlient or passed via the X-Vault-Token or Authorization header for future requests. Responses from auth login methods that generate an authentication token are These endpoints are specific to each auth TheseĮndpoints can be reached without any authentication, and are used forĪuthentication to Vault itself. Otherwise, a client token can be retrieved using an authenticationĮach auth method has one or more unauthenticated login endpoints. The client token must be sent asĮither the X-Vault-Token HTTP Header or as Authorization HTTP Header using Once Vault is unsealed, almost every other operation requires a client token.Ī user may have a client token sent to them. To have to do both depending on user settings. It is possible toĭisable TLS verification for listeners, however, so API clients should expect Valid certificate that is verified by a well-behaved client. The API is expected to be accessed over a TLS connection at all times, with a sometimes have minor changes to accommodate new features as Is, sys/ routes) change very infrequently, but various secrets engines/auth Promise backwards compatibility even with the v1 prefix. Backwards compatibility: At the current version, Vault does not yet
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |