open-vault/website/content/api-docs/system/license.mdx

238 lines
6.4 KiB
Plaintext
Raw Normal View History

2017-11-14 21:15:09 +00:00
---
layout: api
page_title: /sys/license - HTTP API
2017-11-14 21:15:09 +00:00
description: |-
The `/sys/license` endpoint is used to view and update the license used in
2017-11-14 21:15:09 +00:00
Vault.
---
# `/sys/license`
2021-06-18 16:19:18 +00:00
~> **Enterprise Only** These endpoints require Vault Enterprise.
2017-11-14 21:15:09 +00:00
The `/sys/license` endpoint is used to view and update the license used in
2017-11-14 21:15:09 +00:00
Vault.
## Read License
~> This API is deprecated as of Vault 1.8 and will be removed in a future version of Vault.
2021-06-18 16:19:18 +00:00
Please use [license autoloading](/docs/enterprise/license/autoloading) instead,
and see [License Status](#license-status) below for the non-deprecated equivalent API.
2017-11-14 21:15:09 +00:00
This endpoint returns information about the currently installed license.
| Method | Path |
| :----- | :------------- |
| `GET` | `/sys/license` |
2017-11-14 21:15:09 +00:00
### Sample Request
```shell-session
2017-11-14 21:15:09 +00:00
$ curl \
--header "X-Vault-Token: ..." \
2018-03-23 15:41:51 +00:00
http://127.0.0.1:8200/v1/sys/license
2017-11-14 21:15:09 +00:00
```
### Sample Response
```json
{
"data": {
"expiration_time": "2017-11-14T16:34:36.546753-05:00",
"features": ["UI", "HSM", "Performance Replication", "DR Replication"],
2017-11-14 21:15:09 +00:00
"license_id": "temporary",
"start_time": "2017-11-14T16:04:36.546753-05:00"
},
"warnings": ["time left on license is 29m33s"]
2017-11-14 21:15:09 +00:00
}
```
## Read Signed License
~> This API is deprecated as of Vault 1.8 and will be removed in a future version of Vault.
2021-06-18 16:19:18 +00:00
Please use [license autoloading](/docs/enterprise/license/autoloading) instead.
This endpoint returns the signed license blob for the currently installed license.
| Method | Path |
| :----- | :------------- |
| `GET` | `/sys/license/signed` |
### Sample Request
```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/sys/license/signed
```
### Sample Response
```json
{
"data": {
"signed": "01ABCDEFG..."
}
}
```
2017-11-14 21:15:09 +00:00
## Install License
~> This API is deprecated as of Vault 1.8 and will be removed in a future version of Vault.
2021-06-18 16:19:18 +00:00
Please use [license autoloading](/docs/enterprise/license/autoloading) instead.
This endpoint is used to install a license into Vault. The license will be
replicated to the Vault instances within the targeted cluster, but will not
replicate the license to a [performance replication](/docs/enterprise/replication) cluster. To license a
performance replication cluster, this must be run against a Vault instance within that cluster.
2017-11-14 21:15:09 +00:00
| Method | Path |
| :----- | :------------- |
| `POST` | `/sys/license` |
2017-11-14 21:15:09 +00:00
2018-01-23 02:44:38 +00:00
### Parameters
2021-06-18 16:19:18 +00:00
- `text` `(string: <required>)` The text of the license.
2018-01-23 02:44:38 +00:00
_DR Secondary Specific Parameters_
2018-01-23 02:44:38 +00:00
- `dr_operation_token` `(string: <required>)` - DR operation token used to authorize this request.
2021-06-18 16:19:18 +00:00
Note that this is the legacy mechanism for providing a DR operation token. It is
equally valid to provide the DR operation token in the `X-Vault-Token` header, as
with a regular vault token.
2018-01-23 02:44:38 +00:00
If you are using a batch `dr_operation_token`, note you will need to add the following to the token's policy
```# Manage license for DR Secondary
path "sys/replication/dr/secondary/license" {
capabilities = ["update"]
}```
2017-11-14 21:15:09 +00:00
### Sample Payload
```json
{
"text": "01ABCDEFG..."
}
```
### Sample Request
```shell-session
2017-11-14 21:15:09 +00:00
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
2017-11-14 21:15:09 +00:00
--data @payload.json \
2018-03-23 15:41:51 +00:00
http://127.0.0.1:8200/v1/sys/license
2017-11-14 21:15:09 +00:00
```
2021-06-18 16:19:18 +00:00
## Delete License
~> This API is deprecated as of Vault 1.8 and will be removed in a future version of Vault.
2021-06-18 16:19:18 +00:00
Please use [license autoloading](/docs/enterprise/license/autoloading) instead.
This endpoint is used to delete a license from Vault. Note that this API only works if license autoloading is in use.
If license autoloading is in use, this API will remove the legacy license from Vault's storage.
2021-06-18 16:19:18 +00:00
| Method | Path |
| :----- | :------------- |
| `DELETE` | `/sys/license` |
### Sample Request
```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
http://127.0.0.1:8200/v1/sys/license
```
## License Status
This endpoint returns information about licensing. It returns similar information
to a GET of `sys/license`, but whereas that endpoint reports solely on the
license Vault is currently using, this one reports on all licensing
information the Vault cluster has. See
[license autoloading](/docs/enterprise/license/autoloading) for background.
In the response:
* `autoloading_used` will be true if an autoloaded license was provided to the
node, false otherwise.
* `autoloaded` is the autoloaded license if autoloading_used is true.
* `persisted_autoload` is the autoloaded license the active node last wrote to
storage; this is only used to detect inconsistently licensed nodes in the
cluster. It cannot be used as a license itself.
* `stored` is the stored license if any, i.e. one written using `POST sys/license`.
2021-06-18 16:19:18 +00:00
`autoloaded`, `persisted_autoload`, and `stored` all have the same structure,
which is also the same structure as the top-level `data` returned by `GET sys/license`.
| Method | Path |
| :----- | :------------- |
| `GET` | `/sys/license/status` |
### Sample Request
```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/sys/license/status
```
### Sample Response
```json
{
"data": {
"autoloading_used": true,
"autoloaded": {
"expiration_time": "2022-05-17T23:59:59.999Z",
"features": [
"HSM",
"Performance Replication",
"DR Replication",
"MFA",
"Sentinel",
"Seal Wrapping",
"Control Groups",
"Performance Standby",
"Namespaces",
"KMIP",
"Entropy Augmentation",
"Transform Secrets Engine",
"Lease Count Quotas",
"Key Management Secrets Engine",
"Automated Snapshots"
],
"license_id": "060d7820-fa59-f95c-832b-395db0aeb9ba",
"performance_standby_count": 9999,
"start_time": "2021-05-17T00:00:00Z"
},
"persisted_autoload": {
"expiration_time": "2022-05-17T23:59:59.999Z",
"features": [
"HSM",
"Performance Replication",
"DR Replication",
"MFA",
"Sentinel",
"Seal Wrapping",
"Control Groups",
"Performance Standby",
"Namespaces",
"KMIP",
"Entropy Augmentation",
"Transform Secrets Engine",
"Lease Count Quotas",
"Key Management Secrets Engine",
"Automated Snapshots"
],
"license_id": "060d7820-fa59-f95c-832b-395db0aeb9ba",
"performance_standby_count": 9999,
"start_time": "2021-05-17T00:00:00Z"
}
},
}
```