2017-03-09 02:47:35 +00:00
|
|
|
|
---
|
2020-01-18 00:18:09 +00:00
|
|
|
|
layout: api
|
|
|
|
|
page_title: Cassandra - Secrets Engines - HTTP API
|
|
|
|
|
description: This is the API documentation for the Vault Cassandra secrets engine.
|
2017-03-09 02:47:35 +00:00
|
|
|
|
---
|
|
|
|
|
|
2017-09-20 20:05:00 +00:00
|
|
|
|
# Cassandra Secrets Engine (API)
|
2017-03-09 02:47:35 +00:00
|
|
|
|
|
2022-06-01 19:41:11 +00:00
|
|
|
|
@include 'x509-sha1-deprecation.mdx'
|
|
|
|
|
|
2017-06-08 06:45:01 +00:00
|
|
|
|
~> **Deprecation Note:** This backend is deprecated in favor of the
|
|
|
|
|
combined databases backend added in v0.7.1. See the API documentation for
|
|
|
|
|
the new implementation of this backend at
|
2020-01-22 20:05:41 +00:00
|
|
|
|
[Cassandra database plugin HTTP API](/api/secret/databases/cassandra).
|
2017-06-08 06:45:01 +00:00
|
|
|
|
|
2017-09-20 20:05:00 +00:00
|
|
|
|
This is the API documentation for the Vault Cassandra secrets engine. For
|
2017-03-09 02:47:35 +00:00
|
|
|
|
general information about the usage and operation of the Cassandra backend,
|
|
|
|
|
please see the
|
2020-01-22 20:05:41 +00:00
|
|
|
|
[Vault Cassandra backend documentation](/docs/secrets/cassandra).
|
2017-03-09 02:47:35 +00:00
|
|
|
|
|
|
|
|
|
This documentation assumes the Cassandra backend is mounted at the `/cassandra`
|
2017-09-21 21:14:40 +00:00
|
|
|
|
path in Vault. Since it is possible to enable secrets engines at any location,
|
2017-03-09 02:47:35 +00:00
|
|
|
|
please update your API calls accordingly.
|
|
|
|
|
|
|
|
|
|
## Configure Connection
|
|
|
|
|
|
|
|
|
|
This endpoint configures the connection information used to communicate with
|
|
|
|
|
Cassandra.
|
|
|
|
|
|
2020-01-18 00:18:09 +00:00
|
|
|
|
| Method | Path |
|
|
|
|
|
| :----- | :----------------------------- |
|
|
|
|
|
| `POST` | `/cassandra/config/connection` |
|
2017-03-09 02:47:35 +00:00
|
|
|
|
|
|
|
|
|
### Parameters
|
|
|
|
|
|
|
|
|
|
- `hosts` `(string: <required>)` – Specifies a set of comma-delineated Cassandra
|
|
|
|
|
hosts to connect to.
|
|
|
|
|
|
|
|
|
|
- `username` `(string: <required>)` – Specifies the username to use for
|
|
|
|
|
superuser access.
|
|
|
|
|
|
|
|
|
|
- `password` `(string: <required>)` – Specifies the password corresponding to
|
|
|
|
|
the given username.
|
|
|
|
|
|
|
|
|
|
- `tls` `(bool: true)` – Specifies whether to use TLS when connecting to
|
|
|
|
|
Cassandra.
|
|
|
|
|
|
|
|
|
|
- `insecure_tls` `(bool: false)` – Specifies whether to skip verification of the
|
|
|
|
|
server certificate when using TLS.
|
|
|
|
|
|
|
|
|
|
- `pem_bundle` `(string: "")` – Specifies concatenated PEM blocks containing a
|
|
|
|
|
certificate and private key; a certificate, private key, and issuing CA
|
|
|
|
|
certificate; or just a CA certificate.
|
|
|
|
|
|
|
|
|
|
- `pem_json` `(string: "")` – Specifies JSON containing a certificate and
|
|
|
|
|
private key; a certificate, private key, and issuing CA certificate; or just a
|
|
|
|
|
CA certificate. For convenience format is the same as the output of the
|
|
|
|
|
`issue` command from the `pki` backend; see
|
2020-01-22 20:05:41 +00:00
|
|
|
|
[the pki documentation](/docs/secrets/pki).
|
2017-03-09 02:47:35 +00:00
|
|
|
|
|
|
|
|
|
- `protocol_version` `(int: 2)` – Specifies the CQL protocol version to use.
|
|
|
|
|
|
|
|
|
|
- `connect_timeout` `(string: "5s")` – Specifies the connection timeout to use.
|
|
|
|
|
|
2020-01-18 00:18:09 +00:00
|
|
|
|
- `consistency` `(string: "")` – Specifies the consistency option to use. See
|
2017-12-02 19:18:23 +00:00
|
|
|
|
the [gocql
|
2019-03-04 15:21:33 +00:00
|
|
|
|
definition](https://github.com/gocql/gocql/blob/master/frame.go#L188) for
|
2017-12-02 19:18:23 +00:00
|
|
|
|
valid options.
|
|
|
|
|
|
2017-03-09 02:47:35 +00:00
|
|
|
|
TLS works as follows:
|
|
|
|
|
|
|
|
|
|
- If `tls` is set to true, the connection will use TLS; this happens
|
|
|
|
|
automatically if `pem_bundle`, `pem_json`, or `insecure_tls` is set
|
|
|
|
|
|
|
|
|
|
- If `insecure_tls` is set to true, the connection will not perform verification
|
|
|
|
|
of the server certificate; this also sets `tls` to true
|
|
|
|
|
|
|
|
|
|
- If only `issuing_ca` is set in `pem_json`, or the only certificate in
|
|
|
|
|
`pem_bundle` is a CA certificate, the given CA certificate will be used for
|
|
|
|
|
server certificate verification; otherwise the system CA certificates will be
|
|
|
|
|
used
|
|
|
|
|
|
|
|
|
|
- If `certificate` and `private_key` are set in `pem_bundle` or `pem_json`,
|
|
|
|
|
client auth will be turned on for the connection
|
|
|
|
|
|
|
|
|
|
`pem_bundle` should be a PEM-concatenated bundle of a private key + client
|
|
|
|
|
certificate, an issuing CA certificate, or both. `pem_json` should contain the
|
|
|
|
|
same information; for convenience, the JSON format is the same as that output by
|
|
|
|
|
the issue command from the PKI backend.
|
|
|
|
|
|
|
|
|
|
### Sample Payload
|
|
|
|
|
|
|
|
|
|
```json
|
|
|
|
|
{
|
|
|
|
|
"hosts": "cassandra1.local",
|
|
|
|
|
"username": "user",
|
|
|
|
|
"password": "pass"
|
|
|
|
|
}
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
### Sample Request
|
|
|
|
|
|
2020-05-21 17:18:17 +00:00
|
|
|
|
```shell-session
|
2017-03-09 02:47:35 +00:00
|
|
|
|
$ curl \
|
|
|
|
|
--header "X-Vault-Token: ..." \
|
|
|
|
|
--request POST \
|
|
|
|
|
--data @payload.json \
|
2018-03-23 15:41:51 +00:00
|
|
|
|
http://127.0.0.1:8200/v1/cassandra/config/connection
|
2017-03-09 02:47:35 +00:00
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
## Create Role
|
|
|
|
|
|
|
|
|
|
This endpoint creates or updates the role definition.
|
|
|
|
|
|
2020-01-18 00:18:09 +00:00
|
|
|
|
| Method | Path |
|
|
|
|
|
| :----- | :----------------------- |
|
|
|
|
|
| `POST` | `/cassandra/roles/:name` |
|
2017-03-09 02:47:35 +00:00
|
|
|
|
|
|
|
|
|
### Parameters
|
|
|
|
|
|
|
|
|
|
- `creation_cql` `(string: "")` – Specifies the CQL statements executed to
|
|
|
|
|
create and configure the new user. Must be a semicolon-separated string, a
|
|
|
|
|
base64-encoded semicolon-separated string, a serialized JSON string array, or
|
|
|
|
|
a base64-encoded serialized JSON string array. The '{{username}}' and
|
|
|
|
|
'{{password}}' values will be substituted; it is required that these
|
|
|
|
|
parameters are in single quotes. The default creates a non-superuser user with
|
|
|
|
|
no authorization grants.
|
|
|
|
|
|
|
|
|
|
- `rollback_cql` `(string: "")` – Specifies the CQL statements executed to
|
|
|
|
|
attempt a rollback if an error is encountered during user creation. The
|
|
|
|
|
default is to delete the user. Must be a semicolon-separated string, a
|
|
|
|
|
base64-encoded semicolon-separated string, a serialized JSON string array, or
|
|
|
|
|
a base64-encoded serialized JSON string array. The '{{username}}' and
|
|
|
|
|
'{{password}}' values will be substituted; it is required that these
|
|
|
|
|
parameters are in single quotes.
|
|
|
|
|
|
|
|
|
|
- `lease` `(string: "")` – Specifies the lease value provided as a string
|
|
|
|
|
duration with time suffix. "h" hour is the largest suffix.
|
|
|
|
|
|
|
|
|
|
- `consistency` `(string: "Quorum")` – Specifies the consistency level value
|
|
|
|
|
provided as a string. Determines the consistency level used for operations
|
|
|
|
|
performed on the Cassandra database.
|
|
|
|
|
|
|
|
|
|
### Sample Payload
|
|
|
|
|
|
|
|
|
|
```json
|
|
|
|
|
{
|
|
|
|
|
"creation_cql": "CREATE USER ..."
|
|
|
|
|
}
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
### Sample Request
|
|
|
|
|
|
2020-05-21 17:18:17 +00:00
|
|
|
|
```shell-session
|
2017-03-09 02:47:35 +00:00
|
|
|
|
$ curl \
|
|
|
|
|
--header "X-Vault-Token: ..." \
|
|
|
|
|
--request POST \
|
|
|
|
|
--data @payload.json \
|
2018-03-23 15:41:51 +00:00
|
|
|
|
http://127.0.0.1:8200/v1/cassandra/roles/my-role
|
2017-03-09 02:47:35 +00:00
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
## Read Role
|
|
|
|
|
|
|
|
|
|
This endpoint queries the role definition.
|
|
|
|
|
|
2020-01-18 00:18:09 +00:00
|
|
|
|
| Method | Path |
|
|
|
|
|
| :----- | :----------------------- |
|
|
|
|
|
| `GET` | `/cassandra/roles/:name` |
|
2017-03-09 02:47:35 +00:00
|
|
|
|
|
|
|
|
|
### Parameters
|
|
|
|
|
|
|
|
|
|
- `name` `(string: <required>)` – Specifies the name of the role to read. This
|
|
|
|
|
is part of the request URL.
|
|
|
|
|
|
|
|
|
|
### Sample Request
|
|
|
|
|
|
2020-05-21 17:18:17 +00:00
|
|
|
|
```shell-session
|
2017-03-09 02:47:35 +00:00
|
|
|
|
$ curl \
|
|
|
|
|
--header "X-Vault-Token: ..." \
|
2018-03-23 15:41:51 +00:00
|
|
|
|
http://127.0.0.1:8200/v1/cassandra/roles/my-role
|
2017-03-09 02:47:35 +00:00
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
### Sample Response
|
|
|
|
|
|
|
|
|
|
```json
|
|
|
|
|
{
|
|
|
|
|
"data": {
|
|
|
|
|
"creation_cql": "CREATE USER...",
|
|
|
|
|
"rollback_cql": "DROP USER...",
|
|
|
|
|
"lease": "12h",
|
|
|
|
|
"consistency": "Quorum"
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
## Delete Role
|
|
|
|
|
|
|
|
|
|
This endpoint deletes the role definition.
|
|
|
|
|
|
2020-01-18 00:18:09 +00:00
|
|
|
|
| Method | Path |
|
2020-12-17 21:53:33 +00:00
|
|
|
|
| :------- | :----------------------- | --------------- |
|
2020-01-18 00:18:09 +00:00
|
|
|
|
| `DELETE` | `/cassandra/roles/:name` | `204 (no body)` |
|
2017-03-09 02:47:35 +00:00
|
|
|
|
|
|
|
|
|
### Parameters
|
|
|
|
|
|
|
|
|
|
- `name` `(string: <required>)` – Specifies the name of the role to delete. This
|
|
|
|
|
is part of the request URL.
|
|
|
|
|
|
|
|
|
|
### Sample Request
|
|
|
|
|
|
2020-05-21 17:18:17 +00:00
|
|
|
|
```shell-session
|
2017-03-09 02:47:35 +00:00
|
|
|
|
$ curl \
|
|
|
|
|
--header "X-Vault-Token: ..." \
|
|
|
|
|
--request DELETE \
|
2018-03-23 15:41:51 +00:00
|
|
|
|
http://127.0.0.1:8200/v1/cassandra/roles/my-role
|
2017-03-09 02:47:35 +00:00
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
## Generate Credentials
|
|
|
|
|
|
|
|
|
|
This endpoint generates a new set of dynamic credentials based on the named
|
|
|
|
|
role.
|
|
|
|
|
|
2020-01-18 00:18:09 +00:00
|
|
|
|
| Method | Path |
|
|
|
|
|
| :----- | :----------------------- |
|
|
|
|
|
| `GET` | `/cassandra/creds/:name` |
|
2017-03-09 02:47:35 +00:00
|
|
|
|
|
|
|
|
|
### Parameters
|
|
|
|
|
|
|
|
|
|
- `name` `(string: <required>)` – Specifies the name of the role to create
|
|
|
|
|
credentials against. This is part of the request URL.
|
|
|
|
|
|
|
|
|
|
### Sample Request
|
|
|
|
|
|
2020-05-21 17:18:17 +00:00
|
|
|
|
```shell-session
|
2017-03-09 02:47:35 +00:00
|
|
|
|
$ curl \
|
2017-03-20 05:50:45 +00:00
|
|
|
|
--header "X-Vault-Token: ..." \
|
2018-03-23 15:41:51 +00:00
|
|
|
|
http://127.0.0.1:8200/v1/cassandra/creds/my-role
|
2017-03-09 02:47:35 +00:00
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
### Sample Response
|
|
|
|
|
|
|
|
|
|
```json
|
|
|
|
|
{
|
|
|
|
|
"data": {
|
|
|
|
|
"username": "vault-root-1430158508-126",
|
|
|
|
|
"password": "132ae3ef-5a64-7499-351e-bfe59f3a2a21"
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
```
|