open-vault/website/content/api-docs/system/license.mdx

238 lines
6.3 KiB
Plaintext
Raw Normal View History

2017-11-14 21:15:09 +00:00
---
layout: api
page_title: /sys/license - HTTP API
2017-11-14 21:15:09 +00:00
description: |-
The `/sys/license` endpoint is used to view and update the license used in
2017-11-14 21:15:09 +00:00
Vault.
---
# `/sys/license`
2021-06-18 16:19:18 +00:00
~> **Enterprise Only** These endpoints require Vault Enterprise.
2017-11-14 21:15:09 +00:00
The `/sys/license` endpoint is used to view and update the license used in
2017-11-14 21:15:09 +00:00
Vault.
## Read License
~> This API is deprecated as of Vault 1.8 and will be removed in a future version of Vault.
2021-06-18 16:19:18 +00:00
Please use [license autoloading](/docs/enterprise/license/autoloading) instead,
and see [License Status](#license-status) below for the non-deprecated equivalent API.
2017-11-14 21:15:09 +00:00
This endpoint returns information about the currently installed license.
| Method | Path |
| :----- | :------------- |
| `GET` | `/sys/license` |
2017-11-14 21:15:09 +00:00
### Sample Request
```shell-session
2017-11-14 21:15:09 +00:00
$ curl \
--header "X-Vault-Token: ..." \
2018-03-23 15:41:51 +00:00
http://127.0.0.1:8200/v1/sys/license
2017-11-14 21:15:09 +00:00
```
### Sample Response
```json
{
"data": {
"expiration_time": "2017-11-14T16:34:36.546753-05:00",
"features": ["UI", "HSM", "Performance Replication", "DR Replication"],
2017-11-14 21:15:09 +00:00
"license_id": "temporary",
"start_time": "2017-11-14T16:04:36.546753-05:00"
},
"warnings": ["time left on license is 29m33s"]
2017-11-14 21:15:09 +00:00
}
```
## Read Signed License
~> This API is deprecated as of Vault 1.8 and will be removed in a future version of Vault.
2021-06-18 16:19:18 +00:00
Please use [license autoloading](/docs/enterprise/license/autoloading) instead.
This endpoint returns the signed license blob for the currently installed license.
| Method | Path |
| :----- | :------------- |
| `GET` | `/sys/license/signed` |
### Sample Request
```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/sys/license/signed
```
### Sample Response
```json
{
"data": {
"signed": "01ABCDEFG..."
}
}
```
2017-11-14 21:15:09 +00:00
## Install License
~> This API is deprecated as of Vault 1.8 and will be removed in a future version of Vault.
2021-06-18 16:19:18 +00:00
Please use [license autoloading](/docs/enterprise/license/autoloading) instead.
This endpoint is used to install a license into Vault. The license will be
replicated to the Vault instances within the targeted cluster, but will not
replicate the license to a [performance replication](/docs/enterprise/replication) cluster. To license a
performance replication cluster, this must be run against a Vault instance within that cluster.
2017-11-14 21:15:09 +00:00
| Method | Path |
| :----- | :------------- |
| `POST` | `/sys/license` |
2017-11-14 21:15:09 +00:00
2018-01-23 02:44:38 +00:00
### Parameters
2021-06-18 16:19:18 +00:00
- `text` `(string: <required>)` The text of the license.
2018-01-23 02:44:38 +00:00
_DR Secondary Specific Parameters_
2018-01-23 02:44:38 +00:00
- `dr_operation_token` `(string: <required>)` - DR operation token used to authorize this request.
2021-06-18 16:19:18 +00:00
Note that this is the legacy mechanism for providing a DR operation token. It is
equally valid to provide the DR operation token in the `X-Vault-Token` header, as
with a regular vault token.
2018-01-23 02:44:38 +00:00
If you are using a batch `dr_operation_token`, note you will need to add the following to the token's policy
```# Manage license for DR Secondary
path "sys/replication/dr/secondary/license" {
capabilities = ["update"]
}```
2017-11-14 21:15:09 +00:00
### Sample Payload
```json
{
"text": "01ABCDEFG..."
}
```
### Sample Request
```shell-session
2017-11-14 21:15:09 +00:00
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
2017-11-14 21:15:09 +00:00
--data @payload.json \
2018-03-23 15:41:51 +00:00
http://127.0.0.1:8200/v1/sys/license
2017-11-14 21:15:09 +00:00
```
2021-06-18 16:19:18 +00:00
## Delete License
~> This API is deprecated as of Vault 1.8 and will be removed in a future version of Vault.
2021-06-18 16:19:18 +00:00
Please use [license autoloading](/docs/enterprise/license/autoloading) instead.
This endpoint is used to delete a stored license in Vault. This will return
an error unless license autoloading is in use.
| Method | Path |
| :----- | :------------- |
| `DELETE` | `/sys/license` |
### Sample Request
```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
http://127.0.0.1:8200/v1/sys/license
```
## License Status
This endpoint returns information about licensing. It returns similar information
to a GET of `sys/license`, but whereas that endpoint reports solely on the
license Vault is currently using, this one reports on all licensing
information the Vault cluster has. See
[license autoloading](/docs/enterprise/license/autoloading) for background.
In the response:
* `autoloading_used` will be true if an autoloaded license was provided to the
node, false otherwise.
* `autoloaded` is the autoloaded license if autoloading_used is true.
* `persisted_autoload` is the autoloaded license the active node last wrote to
storage; this is only used to detect inconsistently licensed nodes in the
cluster. It cannot be used as a license itself.
* `stored` is the stored license if any, i.e. one written using `POST sys/license`.
2021-06-18 16:19:18 +00:00
`autoloaded`, `persisted_autoload`, and `stored` all have the same structure,
which is also the same structure as the top-level `data` returned by `GET sys/license`.
| Method | Path |
| :----- | :------------- |
| `GET` | `/sys/license/status` |
### Sample Request
```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/sys/license/status
```
### Sample Response
```json
{
"data": {
"autoloading_used": true,
"autoloaded": {
"expiration_time": "2022-05-17T23:59:59.999Z",
"features": [
"HSM",
"Performance Replication",
"DR Replication",
"MFA",
"Sentinel",
"Seal Wrapping",
"Control Groups",
"Performance Standby",
"Namespaces",
"KMIP",
"Entropy Augmentation",
"Transform Secrets Engine",
"Lease Count Quotas",
"Key Management Secrets Engine",
"Automated Snapshots"
],
"license_id": "060d7820-fa59-f95c-832b-395db0aeb9ba",
"performance_standby_count": 9999,
"start_time": "2021-05-17T00:00:00Z"
},
"persisted_autoload": {
"expiration_time": "2022-05-17T23:59:59.999Z",
"features": [
"HSM",
"Performance Replication",
"DR Replication",
"MFA",
"Sentinel",
"Seal Wrapping",
"Control Groups",
"Performance Standby",
"Namespaces",
"KMIP",
"Entropy Augmentation",
"Transform Secrets Engine",
"Lease Count Quotas",
"Key Management Secrets Engine",
"Automated Snapshots"
],
"license_id": "060d7820-fa59-f95c-832b-395db0aeb9ba",
"performance_standby_count": 9999,
"start_time": "2021-05-17T00:00:00Z"
}
},
}
```