2015-09-14 15:47:49 +00:00
|
|
|
---
|
|
|
|
layout: "docs"
|
|
|
|
page_title: "Secret Backend: Cubbyhole"
|
|
|
|
sidebar_current: "docs-secrets-cubbyhole"
|
|
|
|
description: |-
|
|
|
|
The cubbyhole secret backend can store arbitrary secrets scoped to a single token.
|
|
|
|
---
|
|
|
|
|
|
|
|
# Cubbyhole Secret Backend
|
|
|
|
|
|
|
|
Name: `cubbyhole`
|
|
|
|
|
|
|
|
The `cubbyhole` secret backend is used to store arbitrary secrets within
|
|
|
|
the configured physical storage for Vault. It is mounted at the `cubbyhole/`
|
|
|
|
prefix by default and cannot be mounted elsewhere or removed.
|
|
|
|
|
|
|
|
This backend differs from the `generic` backend in that the `generic` backend's
|
2016-03-03 15:58:58 +00:00
|
|
|
values are accessible to any token with read privileges on that path. In
|
|
|
|
`cubbyhole`, paths are scoped per token; no token can access another token's
|
|
|
|
cubbyhole, whether to read, write, list, or for any other operation. When the
|
|
|
|
token expires, its cubbyhole is destroyed.
|
2015-09-14 15:47:49 +00:00
|
|
|
|
|
|
|
Also unlike the `generic` backend, because the cubbyhole's lifetime is linked
|
2016-05-19 17:33:51 +00:00
|
|
|
to that of an authentication token, there is no concept of a TTL or refresh
|
|
|
|
interval for values contained in the token's cubbyhole.
|
2015-09-14 15:47:49 +00:00
|
|
|
|
2016-01-14 19:18:27 +00:00
|
|
|
Writing to a key in the `cubbyhole` backend will replace the old value;
|
2015-09-14 15:47:49 +00:00
|
|
|
the sub-fields are not merged together.
|
|
|
|
|
2016-05-19 17:33:51 +00:00
|
|
|
## Response Wrapping
|
|
|
|
|
|
|
|
Starting in Vault 0.6, almost any response (except those from `sys/` endpoints)
|
|
|
|
from Vault can be wrapped (see the [Response
|
|
|
|
Wrapping](https://www.vaultproject.io/docs/concepts/response-wrapping.html)
|
|
|
|
concept page for details).
|
|
|
|
|
|
|
|
The TTL for the token is set by the client using the `X-Vault-Wrap-TTL` header
|
|
|
|
and can be either an integer number of seconds or a string duration of seconds
|
|
|
|
(`15s`), minutes (`20m`), or hours (`25h`). When using the Vault CLI, you can
|
|
|
|
set this via the `-wrap-ttl` parameter. Response wrapping is per-request; it is
|
|
|
|
the presence of a value in this header that activates wrapping of the response.
|
|
|
|
|
|
|
|
If a client requests wrapping:
|
|
|
|
|
|
|
|
1. The original response is serialized to JSON
|
|
|
|
2. A new single-use token is generated with a TTL as supplied by the client
|
2016-09-29 21:44:15 +00:00
|
|
|
3. Internally, the original response JSON is stored in the single-use token's
|
|
|
|
cubbyhole.
|
2016-05-19 17:33:51 +00:00
|
|
|
4. A new response is generated, with the token ID and the token TTL stored in
|
|
|
|
the new response's `wrap_info` dict
|
|
|
|
5. The new response is returned to the caller
|
|
|
|
|
2016-09-29 21:44:15 +00:00
|
|
|
To get the original value, if using the API, perform a write on
|
|
|
|
`sys/wrapping/unwrap`, passing in the wrapping token ID. The original value
|
|
|
|
will be returned.
|
2016-05-19 17:33:51 +00:00
|
|
|
|
|
|
|
If using the CLI, passing the wrapping token's ID to the `vault unwrap` command
|
|
|
|
will return the original value; `-format` and `-field` can be set like with
|
|
|
|
`vault read`.
|
|
|
|
|
2016-06-14 05:59:50 +00:00
|
|
|
If the original response is an authentication response containing a token, the
|
|
|
|
token's accessor will be made available to the caller. This allows a privileged
|
|
|
|
caller to generate tokens for clients and be able to manage the tokens'
|
|
|
|
lifecycle while not being exposed to the actual client token IDs.
|
|
|
|
|
2015-09-14 15:47:49 +00:00
|
|
|
## Quick Start
|
|
|
|
|
|
|
|
The `cubbyhole` backend allows for writing keys with arbitrary values.
|
|
|
|
|
|
|
|
As an example, we can write a new key "foo" to the `cubbyhole` backend, which
|
|
|
|
is mounted at `cubbyhole/`:
|
|
|
|
|
|
|
|
```
|
2015-10-12 16:10:22 +00:00
|
|
|
$ vault write cubbyhole/foo \
|
|
|
|
zip=zap
|
2015-09-14 15:47:49 +00:00
|
|
|
Success! Data written to: cubbyhole/foo
|
|
|
|
```
|
|
|
|
|
|
|
|
This writes the key with the "zip" field set to "zap". We can test this by doing
|
|
|
|
a read:
|
|
|
|
|
|
|
|
```
|
|
|
|
$ vault read cubbyhole/foo
|
|
|
|
Key Value
|
|
|
|
zip zap
|
|
|
|
```
|
|
|
|
|
|
|
|
As expected, the value previously set is returned to us.
|
2015-09-21 15:25:22 +00:00
|
|
|
|
|
|
|
## API
|
|
|
|
|
|
|
|
#### GET
|
|
|
|
|
|
|
|
<dl class="api">
|
|
|
|
<dt>Description</dt>
|
|
|
|
<dd>
|
|
|
|
Retrieves the secret at the specified location.
|
|
|
|
</dd>
|
|
|
|
|
|
|
|
<dt>Method</dt>
|
|
|
|
<dd>GET</dd>
|
|
|
|
|
|
|
|
<dt>URL</dt>
|
|
|
|
<dd>`/cubbyhole/<path>`</dd>
|
|
|
|
|
|
|
|
<dt>Parameters</dt>
|
|
|
|
<dd>
|
|
|
|
None
|
|
|
|
</dd>
|
|
|
|
|
|
|
|
<dt>Returns</dt>
|
|
|
|
<dd>
|
|
|
|
|
2015-10-12 16:10:22 +00:00
|
|
|
```javascript
|
|
|
|
{
|
2015-09-21 15:25:22 +00:00
|
|
|
"auth": null,
|
|
|
|
"data": {
|
2015-10-12 16:10:22 +00:00
|
|
|
"foo": "bar"
|
2015-09-21 15:25:22 +00:00
|
|
|
},
|
|
|
|
"lease_duration": 0,
|
|
|
|
"lease_id": "",
|
|
|
|
"renewable": false
|
2015-10-12 16:10:22 +00:00
|
|
|
}
|
|
|
|
```
|
2015-09-21 15:25:22 +00:00
|
|
|
|
|
|
|
</dd>
|
|
|
|
</dl>
|
|
|
|
|
2016-01-14 19:18:27 +00:00
|
|
|
#### LIST
|
|
|
|
|
|
|
|
<dl class="api">
|
|
|
|
<dt>Description</dt>
|
|
|
|
<dd>
|
|
|
|
Returns a list of secret entries at the specified location. Folders are
|
2016-01-19 22:05:01 +00:00
|
|
|
suffixed with `/`. The input must be a folder; list on a file will not
|
2016-03-03 15:58:58 +00:00
|
|
|
return a value. The values themselves are not accessible via this command.
|
2016-01-14 19:18:27 +00:00
|
|
|
</dd>
|
|
|
|
|
|
|
|
<dt>Method</dt>
|
2016-09-30 19:47:33 +00:00
|
|
|
<dd>LIST/GET</dd>
|
2016-01-14 19:18:27 +00:00
|
|
|
|
|
|
|
<dt>URL</dt>
|
2016-09-30 19:47:33 +00:00
|
|
|
<dd>`/cubbyhole/<path>` (LIST) or `/cubbyhole/<path>?list=true` (GET)</dd>
|
2016-01-14 19:18:27 +00:00
|
|
|
|
|
|
|
<dt>Parameters</dt>
|
|
|
|
<dd>
|
|
|
|
None
|
|
|
|
</dd>
|
|
|
|
|
|
|
|
<dt>Returns</dt>
|
|
|
|
<dd>
|
|
|
|
The example below shows output for a query path of `cubbyhole/` when there
|
|
|
|
are secrets at `cubbyhole/foo` and `cubbyhole/foo/bar`; note the difference
|
|
|
|
in the two entries.
|
|
|
|
|
|
|
|
```javascript
|
|
|
|
{
|
|
|
|
"auth": null,
|
|
|
|
"data": {
|
2016-01-19 22:05:01 +00:00
|
|
|
"keys": ["foo", "foo/"]
|
2016-01-14 19:18:27 +00:00
|
|
|
},
|
2016-09-28 22:32:49 +00:00
|
|
|
"lease_duration": 2764800,
|
2016-01-14 19:18:27 +00:00
|
|
|
"lease_id": "",
|
|
|
|
"renewable": false
|
|
|
|
}
|
|
|
|
```
|
|
|
|
|
|
|
|
</dd>
|
|
|
|
</dl>
|
|
|
|
|
2015-09-21 15:25:22 +00:00
|
|
|
#### POST/PUT
|
|
|
|
|
|
|
|
<dl class="api">
|
|
|
|
<dt>Description</dt>
|
|
|
|
<dd>
|
|
|
|
Stores a secret at the specified location.
|
|
|
|
</dd>
|
|
|
|
|
|
|
|
<dt>Method</dt>
|
|
|
|
<dd>POST/PUT</dd>
|
|
|
|
|
|
|
|
<dt>URL</dt>
|
|
|
|
<dd>`/cubbyhole/<path>`</dd>
|
|
|
|
|
|
|
|
<dt>Parameters</dt>
|
|
|
|
<dd>
|
|
|
|
<ul>
|
|
|
|
<li>
|
|
|
|
<span class="param">(key)</span>
|
|
|
|
<span class="param-flags">optional</span>
|
|
|
|
A key, paired with an associated value, to be held at the
|
|
|
|
given location. Multiple key/value pairs can be specified,
|
|
|
|
and all will be returned on a read operation.
|
|
|
|
</li>
|
|
|
|
</ul>
|
|
|
|
</dd>
|
|
|
|
|
|
|
|
<dt>Returns</dt>
|
|
|
|
<dd>
|
|
|
|
A `204` response code.
|
|
|
|
</dd>
|
|
|
|
</dl>
|
2016-01-26 07:47:33 +00:00
|
|
|
|
|
|
|
#### DELETE
|
|
|
|
|
|
|
|
<dl class="api">
|
|
|
|
<dt>Description</dt>
|
|
|
|
<dd>
|
|
|
|
Deletes the secret at the specified location.
|
|
|
|
</dd>
|
|
|
|
|
|
|
|
<dt>Method</dt>
|
|
|
|
<dd>DELETE</dd>
|
|
|
|
|
|
|
|
<dt>URL</dt>
|
|
|
|
<dd>`/cubbyhole/<path>`</dd>
|
|
|
|
|
|
|
|
<dt>Parameters</dt>
|
|
|
|
<dd>
|
|
|
|
None
|
|
|
|
</dd>
|
|
|
|
|
|
|
|
<dt>Returns</dt>
|
|
|
|
<dd>
|
|
|
|
A `204` response code.
|
|
|
|
</dd>
|
|
|
|
</dl>
|