2017-03-09 02:47:35 +00:00
|
|
|
|
---
|
2020-01-18 00:18:09 +00:00
|
|
|
|
layout: api
|
|
|
|
|
page_title: Consul - Secrets Engines - HTTP API
|
|
|
|
|
description: This is the API documentation for the Vault Consul secrets engine.
|
2017-03-09 02:47:35 +00:00
|
|
|
|
---
|
|
|
|
|
|
2017-09-20 20:05:00 +00:00
|
|
|
|
# Consul Secrets Engine (API)
|
2017-03-09 02:47:35 +00:00
|
|
|
|
|
2022-06-01 19:41:11 +00:00
|
|
|
|
@include 'x509-sha1-deprecation.mdx'
|
|
|
|
|
|
2022-11-22 13:56:18 +00:00
|
|
|
|
@include 'consul-dataplane-compat.mdx'
|
|
|
|
|
|
2017-09-20 20:05:00 +00:00
|
|
|
|
This is the API documentation for the Vault Consul secrets engine. For general
|
|
|
|
|
information about the usage and operation of the Consul secrets engine, please
|
2020-01-22 20:05:41 +00:00
|
|
|
|
see the [Vault Consul documentation](/docs/secrets/consul).
|
2017-03-09 02:47:35 +00:00
|
|
|
|
|
2017-09-20 20:05:00 +00:00
|
|
|
|
This documentation assumes the Consul secrets engine is enabled at the `/consul`
|
|
|
|
|
path in Vault. Since it is possible to enable secrets engines at any location,
|
|
|
|
|
please update your API calls accordingly.
|
2017-03-09 02:47:35 +00:00
|
|
|
|
|
|
|
|
|
## Configure Access
|
|
|
|
|
|
|
|
|
|
This endpoint configures the access information for Consul. This access
|
|
|
|
|
information is used so that Vault can communicate with Consul and generate
|
|
|
|
|
Consul tokens.
|
|
|
|
|
|
2020-01-18 00:18:09 +00:00
|
|
|
|
| Method | Path |
|
|
|
|
|
| :----- | :---------------------- |
|
|
|
|
|
| `POST` | `/consul/config/access` |
|
2017-03-09 02:47:35 +00:00
|
|
|
|
|
|
|
|
|
### Parameters
|
|
|
|
|
|
|
|
|
|
- `address` `(string: <required>)` – Specifies the address of the Consul
|
|
|
|
|
instance, provided as `"host:port"` like `"127.0.0.1:8500"`.
|
|
|
|
|
|
|
|
|
|
- `scheme` `(string: "http")` – Specifies the URL scheme to use.
|
|
|
|
|
|
2022-04-20 22:16:15 +00:00
|
|
|
|
- `token` `(string: "")` – Specifies the Consul ACL token to use. This
|
|
|
|
|
must be a management type token. If this is not provided, Vault will try to
|
2022-06-08 18:54:55 +00:00
|
|
|
|
bootstrap the ACL system of the Consul cluster automatically.
|
2017-03-09 02:47:35 +00:00
|
|
|
|
|
2020-01-29 08:44:35 +00:00
|
|
|
|
- `ca_cert` `(string: "")` - CA certificate to use when verifying Consul server certificate,
|
|
|
|
|
must be x509 PEM encoded.
|
|
|
|
|
|
|
|
|
|
- `client_cert` `(string: "")` - Client certificate used for Consul's TLS communication,
|
|
|
|
|
must be x509 PEM encoded and if this is set you need to also set client_key.
|
|
|
|
|
|
|
|
|
|
- `client_key` `(string: "")` - Client key used for Consul's TLS communication,
|
|
|
|
|
must be x509 PEM encoded and if this is set you need to also set client_cert.
|
|
|
|
|
|
2017-03-09 02:47:35 +00:00
|
|
|
|
### Sample Payload
|
|
|
|
|
|
|
|
|
|
```json
|
|
|
|
|
{
|
|
|
|
|
"address": "127.0.0.1:8500",
|
|
|
|
|
"scheme": "https",
|
|
|
|
|
"token": "adha..."
|
|
|
|
|
}
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
### Sample Request
|
|
|
|
|
|
2020-05-21 17:18:17 +00:00
|
|
|
|
```shell-session
|
2017-03-09 02:47:35 +00:00
|
|
|
|
$ curl \
|
|
|
|
|
--request POST \
|
|
|
|
|
--header "X-Vault-Token: ..." \
|
|
|
|
|
--data @payload.json \
|
2018-03-23 15:41:51 +00:00
|
|
|
|
http://127.0.0.1:8200/v1/consul/config/access
|
2017-03-09 02:47:35 +00:00
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
## Create/Update Role
|
|
|
|
|
|
|
|
|
|
This endpoint creates or updates the Consul role definition. If the role does
|
|
|
|
|
not exist, it will be created. If the role already exists, it will receive
|
2022-06-08 18:54:55 +00:00
|
|
|
|
updated attributes. At least one of `consul_policies`, `consul_roles`,
|
|
|
|
|
`service_identities`, or `node_identities` is required depending on the
|
|
|
|
|
Consul version.
|
2017-03-09 02:47:35 +00:00
|
|
|
|
|
2020-01-18 00:18:09 +00:00
|
|
|
|
| Method | Path |
|
|
|
|
|
| :----- | :-------------------- |
|
|
|
|
|
| `POST` | `/consul/roles/:name` |
|
2017-03-09 02:47:35 +00:00
|
|
|
|
|
2022-02-25 23:43:18 +00:00
|
|
|
|
### Parameters for Consul versions 1.11 and above
|
|
|
|
|
|
2022-07-18 18:03:45 +00:00
|
|
|
|
- `partition` `(string: "")` - Specifies the Consul admin partition in which the token is generated.
|
2022-06-08 18:54:55 +00:00
|
|
|
|
The partition must exist, and the Consul policies or roles assigned to the
|
2022-07-18 18:03:45 +00:00
|
|
|
|
Vault role must also exist inside the given partition. If not provided, the partition `default`
|
2022-06-08 18:54:55 +00:00
|
|
|
|
is used.
|
2022-02-25 23:43:18 +00:00
|
|
|
|
|
2022-05-10 01:07:35 +00:00
|
|
|
|
To create a client token within a particular Consul admin partition:
|
|
|
|
|
|
|
|
|
|
```json
|
|
|
|
|
{
|
|
|
|
|
"partition": "admin1"
|
|
|
|
|
}
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
### Parameters for Consul versions 1.8 and above
|
|
|
|
|
|
2022-06-08 18:54:55 +00:00
|
|
|
|
- `node_identities` `(list: <node identity or identities>)` - The list of node identities to assign to the generated
|
|
|
|
|
token. This may be a comma-separated list to attach multiple node identities to a token.
|
2022-05-10 01:07:35 +00:00
|
|
|
|
|
2022-07-18 18:03:45 +00:00
|
|
|
|
To create a client token with node identities attached:
|
2022-02-25 23:43:18 +00:00
|
|
|
|
|
|
|
|
|
```json
|
|
|
|
|
{
|
2022-07-18 18:03:45 +00:00
|
|
|
|
"node_identities": [
|
|
|
|
|
"client-1:dc1",
|
|
|
|
|
"client-2:dc1"
|
|
|
|
|
]
|
2022-02-25 23:43:18 +00:00
|
|
|
|
}
|
|
|
|
|
```
|
|
|
|
|
|
2022-07-18 18:03:45 +00:00
|
|
|
|
### Parameters for Consul versions 1.7 and above
|
|
|
|
|
|
|
|
|
|
- `consul_namespace` `(string: "")` - Specifies the Consul namespace in which the token is generated.
|
|
|
|
|
The namespace must exist, and the Consul policies or roles assigned to the Vault role must also exist
|
|
|
|
|
inside the given Consul namespace. If not provided, the namespace `default` is used.
|
|
|
|
|
|
|
|
|
|
To create a client token within a particular Consul namespace:
|
2022-02-25 23:43:18 +00:00
|
|
|
|
|
|
|
|
|
```json
|
|
|
|
|
{
|
2022-07-18 18:03:45 +00:00
|
|
|
|
"consul_namespace": "ns1"
|
2022-02-25 23:43:18 +00:00
|
|
|
|
}
|
|
|
|
|
```
|
|
|
|
|
|
2022-06-08 18:54:55 +00:00
|
|
|
|
### Parameters for Consul version 1.5 and above
|
|
|
|
|
|
|
|
|
|
- `service_identities` `(list: <service identity or identities>)` - The list of service identities to assign to the generated
|
|
|
|
|
token. This may be a comma-separated list to attach multiple service identities to a token.
|
|
|
|
|
|
|
|
|
|
- `consul_roles` `(list: <role or roles>)` – The list of Consul roles to attach to the
|
|
|
|
|
token generated by Vault.
|
|
|
|
|
|
|
|
|
|
To create a client token with roles defined in Consul:
|
|
|
|
|
|
|
|
|
|
### Sample Payload
|
|
|
|
|
|
|
|
|
|
```json
|
|
|
|
|
{
|
|
|
|
|
"consul_roles": "role-a,role-b"
|
|
|
|
|
}
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
To create a client token with service identities attached:
|
|
|
|
|
|
|
|
|
|
```json
|
|
|
|
|
{
|
|
|
|
|
"service_identities": [
|
|
|
|
|
"myservice-1:dc1,dc2",
|
|
|
|
|
"myservice-2:dc1"
|
|
|
|
|
]
|
|
|
|
|
}
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
### Parameters for Consul versions 1.4 and above
|
2017-03-09 02:47:35 +00:00
|
|
|
|
|
|
|
|
|
- `name` `(string: <required>)` – Specifies the name of an existing role against
|
|
|
|
|
which to create this Consul credential. This is part of the request URL.
|
|
|
|
|
|
2022-06-08 18:54:55 +00:00
|
|
|
|
- `token_type` <sup>DEPRECATED (1.11)</sup> `(string: "client")` - Specifies the type of token to create
|
|
|
|
|
when using this role. Valid values are `"client"` or `"management"`. If a `"management"`
|
|
|
|
|
token, the `policy` parameter is not required. Defaults to `"client`". [Deprecated from Consul as of 1.4 and
|
2022-10-18 18:06:27 +00:00
|
|
|
|
removed as of Consul 1.11.](https://developer.hashicorp.com/consul/api-docs/acl/legacy)
|
2022-02-17 01:31:08 +00:00
|
|
|
|
|
2022-06-08 18:54:55 +00:00
|
|
|
|
- `policy` <sup>DEPRECATED (1.11)</sup> `(string: "")` – Specifies the base64-encoded ACL policy.
|
|
|
|
|
This is required unless the `token_type` is `"management"`. [Deprecated from Consul as of 1.4 and
|
2022-10-18 18:06:27 +00:00
|
|
|
|
removed as of Consul 1.11.](https://developer.hashicorp.com/consul/api-docs/acl/legacy)
|
2017-03-09 02:47:35 +00:00
|
|
|
|
|
2022-06-08 18:54:55 +00:00
|
|
|
|
- `policies` <sup>DEPRECATED (1.11)</sup> `(list: <policy or policies>)` - Same as `consul_policies`.
|
|
|
|
|
Deprecated in favor of using `consul_policies`.
|
2018-11-02 14:44:12 +00:00
|
|
|
|
|
2022-06-08 18:54:55 +00:00
|
|
|
|
- `consul_policies` `(list: <policy or policies>)` – The list of Consul policies to assign
|
|
|
|
|
to the generated token. This field is required if using using Consul 1.4.
|
2022-05-10 01:07:35 +00:00
|
|
|
|
|
2020-01-18 00:18:09 +00:00
|
|
|
|
- `local` `(bool: false)` - Indicates that the token should not be replicated
|
|
|
|
|
globally and instead be local to the current datacenter. Only available in Consul
|
2018-11-02 14:44:12 +00:00
|
|
|
|
1.4 and greater.
|
|
|
|
|
|
2022-06-13 12:51:07 +00:00
|
|
|
|
- `ttl` `(duration: "")` – Specifies the TTL for this role. If not
|
|
|
|
|
provided, the default Vault TTL is used. Uses [duration format strings](/docs/concepts/duration-format).
|
2018-11-02 14:44:12 +00:00
|
|
|
|
|
2022-06-13 12:51:07 +00:00
|
|
|
|
- `max_ttl` `(duration: "")` – Specifies the max TTL for this role. If not
|
|
|
|
|
provided, the default Vault Max TTL is used. Uses [duration format strings](/docs/concepts/duration-format).
|
2017-03-09 02:47:35 +00:00
|
|
|
|
|
|
|
|
|
### Sample Payload
|
|
|
|
|
|
2022-06-08 18:54:55 +00:00
|
|
|
|
To create a client token with policies defined in Consul:
|
2022-02-17 01:31:08 +00:00
|
|
|
|
|
|
|
|
|
```json
|
|
|
|
|
{
|
2022-06-08 18:54:55 +00:00
|
|
|
|
"consul_policies": "policy-1,policy-2"
|
2022-02-17 01:31:08 +00:00
|
|
|
|
}
|
|
|
|
|
```
|
|
|
|
|
|
2020-01-07 16:46:43 +00:00
|
|
|
|
### Parameters for Consul version below 1.4
|
2018-11-02 14:44:12 +00:00
|
|
|
|
|
2022-06-13 12:51:07 +00:00
|
|
|
|
- `lease` <sup>DEPRECATED (1.11)</sup> `(string: "")` – Specifies the lease for this role.
|
|
|
|
|
Uses [duration format strings](/docs/concepts/duration-format). If not
|
2018-11-02 14:44:12 +00:00
|
|
|
|
provided, the default Vault lease is used.
|
|
|
|
|
|
2022-06-08 18:54:55 +00:00
|
|
|
|
- `policy` <sup>DEPRECATED (1.11)</sup> `(string: <policy>)` – Specifies the base64-encoded ACL policy. The
|
2022-02-17 01:31:08 +00:00
|
|
|
|
ACL format can be found in the [Consul ACL
|
2022-10-18 18:06:27 +00:00
|
|
|
|
documentation](https://developer.hashicorp.com/consul/docs/security/acl/acl-legacy). This is
|
2022-02-17 01:31:08 +00:00
|
|
|
|
required unless the `token_type` is `"management"`.
|
2018-11-02 14:44:12 +00:00
|
|
|
|
|
2022-06-08 18:54:55 +00:00
|
|
|
|
### Sample Payload
|
2020-01-18 00:18:09 +00:00
|
|
|
|
|
2022-06-08 18:54:55 +00:00
|
|
|
|
To create a client token with a base64-encoded policy:
|
2022-02-17 01:31:08 +00:00
|
|
|
|
|
2018-11-02 14:44:12 +00:00
|
|
|
|
```json
|
|
|
|
|
{
|
2022-02-17 01:31:08 +00:00
|
|
|
|
"policy": "a2V5ICIi...=="
|
2018-11-02 14:44:12 +00:00
|
|
|
|
}
|
|
|
|
|
```
|
|
|
|
|
|
2022-06-08 18:54:55 +00:00
|
|
|
|
To create management tokens:
|
|
|
|
|
|
|
|
|
|
```json
|
|
|
|
|
{
|
|
|
|
|
"token_type": "management"
|
|
|
|
|
}
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
### Sample Request
|
2018-11-02 14:44:12 +00:00
|
|
|
|
|
2022-02-17 01:31:08 +00:00
|
|
|
|
```shell-session
|
|
|
|
|
$ curl \
|
|
|
|
|
--request POST \
|
|
|
|
|
--header "X-Vault-Token: ..." \
|
|
|
|
|
--data @payload.json \
|
|
|
|
|
http://127.0.0.1:8200/v1/consul/roles/example-role
|
2018-11-02 14:44:12 +00:00
|
|
|
|
```
|
|
|
|
|
|
2017-03-09 02:47:35 +00:00
|
|
|
|
## Read Role
|
|
|
|
|
|
|
|
|
|
This endpoint queries for information about a Consul role with the given name.
|
|
|
|
|
If no role exists with that name, a 404 is returned.
|
|
|
|
|
|
2020-01-18 00:18:09 +00:00
|
|
|
|
| Method | Path |
|
|
|
|
|
| :----- | :-------------------- |
|
|
|
|
|
| `GET` | `/consul/roles/:name` |
|
2017-03-09 02:47:35 +00:00
|
|
|
|
|
|
|
|
|
### Parameters
|
|
|
|
|
|
|
|
|
|
- `name` `(string: <required>)` – Specifies the name of the role to query. This
|
|
|
|
|
is part of the request URL.
|
|
|
|
|
|
|
|
|
|
### Sample Request
|
|
|
|
|
|
2020-05-21 17:18:17 +00:00
|
|
|
|
```shell-session
|
2017-03-09 02:47:35 +00:00
|
|
|
|
$ curl \
|
|
|
|
|
--header "X-Vault-Token: ..." \
|
2018-03-23 15:41:51 +00:00
|
|
|
|
http://127.0.0.1:8200/v1/consul/roles/example-role
|
2017-03-09 02:47:35 +00:00
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
### Sample Response
|
|
|
|
|
|
|
|
|
|
```json
|
|
|
|
|
{
|
|
|
|
|
"data": {
|
|
|
|
|
"policy": "abd2...==",
|
|
|
|
|
"lease": "1h0m0s",
|
|
|
|
|
"token_type": "client"
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
```
|
|
|
|
|
|
2017-04-20 11:44:25 +00:00
|
|
|
|
## List Roles
|
|
|
|
|
|
2017-09-20 20:05:00 +00:00
|
|
|
|
This endpoint lists all existing roles in the secrets engine.
|
2017-04-20 11:44:25 +00:00
|
|
|
|
|
2020-01-18 00:18:09 +00:00
|
|
|
|
| Method | Path |
|
|
|
|
|
| :----- | :-------------- |
|
|
|
|
|
| `LIST` | `/consul/roles` |
|
2017-04-20 11:44:25 +00:00
|
|
|
|
|
|
|
|
|
### Sample Request
|
|
|
|
|
|
2020-05-21 17:18:17 +00:00
|
|
|
|
```shell-session
|
2017-04-20 11:44:25 +00:00
|
|
|
|
$ curl \
|
|
|
|
|
--header "X-Vault-Token: ..." \
|
|
|
|
|
--request LIST \
|
2018-03-23 15:41:51 +00:00
|
|
|
|
http://127.0.0.1:8200/v1/consul/roles
|
2017-04-20 11:44:25 +00:00
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
### Sample Response
|
|
|
|
|
|
|
|
|
|
```json
|
|
|
|
|
{
|
|
|
|
|
"data": {
|
2020-01-18 00:18:09 +00:00
|
|
|
|
"keys": ["example-role"]
|
2017-04-20 11:44:25 +00:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
```
|
|
|
|
|
|
2017-03-09 02:47:35 +00:00
|
|
|
|
## Delete Role
|
|
|
|
|
|
|
|
|
|
This endpoint deletes a Consul role with the given name. Even if the role does
|
|
|
|
|
not exist, this endpoint will still return a successful response.
|
|
|
|
|
|
2020-01-18 00:18:09 +00:00
|
|
|
|
| Method | Path |
|
|
|
|
|
| :------- | :-------------------- |
|
|
|
|
|
| `DELETE` | `/consul/roles/:name` |
|
2017-03-09 02:47:35 +00:00
|
|
|
|
|
|
|
|
|
### Parameters
|
|
|
|
|
|
|
|
|
|
- `name` `(string: <required>)` – Specifies the name of the role to delete. This
|
|
|
|
|
is part of the request URL.
|
|
|
|
|
|
|
|
|
|
### Sample Request
|
|
|
|
|
|
2020-05-21 17:18:17 +00:00
|
|
|
|
```shell-session
|
2017-03-09 02:47:35 +00:00
|
|
|
|
$ curl \
|
|
|
|
|
--request DELETE \
|
|
|
|
|
--header "X-Vault-Token: ..." \
|
2018-03-23 15:41:51 +00:00
|
|
|
|
http://127.0.0.1:8200/v1/consul/roles/example-role
|
2017-03-09 02:47:35 +00:00
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
## Generate Credential
|
|
|
|
|
|
|
|
|
|
This endpoint generates a dynamic Consul token based on the given role
|
|
|
|
|
definition.
|
|
|
|
|
|
2020-01-18 00:18:09 +00:00
|
|
|
|
| Method | Path |
|
|
|
|
|
| :----- | :-------------------- |
|
|
|
|
|
| `GET` | `/consul/creds/:name` |
|
2017-03-09 02:47:35 +00:00
|
|
|
|
|
|
|
|
|
### Parameters
|
|
|
|
|
|
|
|
|
|
- `name` `(string: <required>)` – Specifies the name of an existing role against
|
|
|
|
|
which to create this Consul credential. This is part of the request URL.
|
|
|
|
|
|
|
|
|
|
### Sample Request
|
|
|
|
|
|
2020-05-21 17:18:17 +00:00
|
|
|
|
```shell-session
|
2017-03-09 02:47:35 +00:00
|
|
|
|
$ curl \
|
|
|
|
|
--header "X-Vault-Token: ..." \
|
2018-03-23 15:41:51 +00:00
|
|
|
|
http://127.0.0.1:8200/v1/consul/creds/example-role
|
2017-03-09 02:47:35 +00:00
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
### Sample Response
|
|
|
|
|
|
|
|
|
|
```json
|
|
|
|
|
{
|
|
|
|
|
"data": {
|
|
|
|
|
"token": "973a31ea-1ec4-c2de-0f63-623f477c2510"
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
```
|