2017-05-04 02:03:42 +00:00
|
|
|
|
---
|
2020-01-18 00:18:09 +00:00
|
|
|
|
layout: api
|
|
|
|
|
page_title: /sys/leases - HTTP API
|
|
|
|
|
description: The `/sys/leases` endpoints are used to view and manage leases.
|
2017-05-04 02:03:42 +00:00
|
|
|
|
---
|
|
|
|
|
|
|
|
|
|
# `/sys/leases`
|
|
|
|
|
|
|
|
|
|
The `/sys/leases` endpoints are used to view and manage leases in Vault.
|
|
|
|
|
|
|
|
|
|
## Read Lease
|
|
|
|
|
|
|
|
|
|
This endpoint retrieve lease metadata.
|
|
|
|
|
|
2020-01-18 00:18:09 +00:00
|
|
|
|
| Method | Path |
|
|
|
|
|
| :----- | :------------------- |
|
|
|
|
|
| `PUT` | `/sys/leases/lookup` |
|
2017-05-04 02:03:42 +00:00
|
|
|
|
|
|
|
|
|
### Parameters
|
|
|
|
|
|
|
|
|
|
- `lease_id` `(string: <required>)` – Specifies the ID of the lease to lookup.
|
|
|
|
|
|
|
|
|
|
### Sample Payload
|
|
|
|
|
|
|
|
|
|
```json
|
|
|
|
|
{
|
|
|
|
|
"lease_id": "aws/creds/deploy/abcd-1234..."
|
|
|
|
|
}
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
### Sample Request
|
|
|
|
|
|
2020-05-21 17:18:17 +00:00
|
|
|
|
```shell-session
|
2017-05-04 02:03:42 +00:00
|
|
|
|
$ curl \
|
|
|
|
|
--header "X-Vault-Token: ..." \
|
|
|
|
|
--request PUT \
|
|
|
|
|
--data @payload.json \
|
2018-03-23 15:41:51 +00:00
|
|
|
|
http://127.0.0.1:8200/v1/sys/leases/lookup
|
2017-05-04 02:03:42 +00:00
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
### Sample Response
|
|
|
|
|
|
|
|
|
|
```json
|
|
|
|
|
{
|
|
|
|
|
"id": "auth/token/create/25c75065466dfc5f920525feafe47502c4c9915c",
|
|
|
|
|
"issue_time": "2017-04-30T10:18:11.228946471-04:00",
|
|
|
|
|
"expire_time": "2017-04-30T11:18:11.228946708-04:00",
|
|
|
|
|
"last_renewal_time": null,
|
|
|
|
|
"renewable": true,
|
|
|
|
|
"ttl": 3558
|
|
|
|
|
}
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
## List Leases
|
|
|
|
|
|
|
|
|
|
This endpoint returns a list of lease ids.
|
|
|
|
|
|
|
|
|
|
**This endpoint requires 'sudo' capability.**
|
|
|
|
|
|
2020-01-18 00:18:09 +00:00
|
|
|
|
| Method | Path |
|
|
|
|
|
| :----- | :--------------------------- |
|
|
|
|
|
| `LIST` | `/sys/leases/lookup/:prefix` |
|
2017-05-04 02:03:42 +00:00
|
|
|
|
|
|
|
|
|
### Sample Request
|
|
|
|
|
|
2020-05-21 17:18:17 +00:00
|
|
|
|
```shell-session
|
2017-05-04 02:03:42 +00:00
|
|
|
|
$ curl \
|
|
|
|
|
--header "X-Vault-Token: ..." \
|
|
|
|
|
--request LIST \
|
2018-03-23 15:41:51 +00:00
|
|
|
|
http://127.0.0.1:8200/v1/sys/leases/lookup/aws/creds/deploy/
|
2017-05-04 02:03:42 +00:00
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
### Sample Response
|
|
|
|
|
|
|
|
|
|
```json
|
|
|
|
|
{
|
2020-01-18 00:18:09 +00:00
|
|
|
|
"data": {
|
|
|
|
|
"keys": ["abcd-1234...", "efgh-1234...", "ijkl-1234..."]
|
2017-05-04 02:03:42 +00:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
## Renew Lease
|
|
|
|
|
|
2020-01-18 00:18:09 +00:00
|
|
|
|
This endpoint renews a lease, requesting to extend the lease. Token leases
|
2019-10-02 14:55:20 +00:00
|
|
|
|
cannot be renewed using this endpoint, use instead the auth/token/renew endpoint.
|
2017-05-04 02:03:42 +00:00
|
|
|
|
|
2020-01-18 00:18:09 +00:00
|
|
|
|
| Method | Path |
|
|
|
|
|
| :----- | :------------------ |
|
|
|
|
|
| `PUT` | `/sys/leases/renew` |
|
2017-05-04 02:03:42 +00:00
|
|
|
|
|
|
|
|
|
### Parameters
|
|
|
|
|
|
|
|
|
|
- `lease_id` `(string: <required>)` – Specifies the ID of the lease to extend.
|
|
|
|
|
This can be specified as part of the URL or as part of the request body.
|
|
|
|
|
|
|
|
|
|
- `increment` `(int: 0)` – Specifies the requested amount of time (in seconds)
|
|
|
|
|
to extend the lease.
|
|
|
|
|
|
|
|
|
|
### Sample Payload
|
|
|
|
|
|
|
|
|
|
```json
|
|
|
|
|
{
|
|
|
|
|
"lease_id": "aws/creds/deploy/abcd-1234...",
|
|
|
|
|
"increment": 1800
|
|
|
|
|
}
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
### Sample Request
|
|
|
|
|
|
2020-05-21 17:18:17 +00:00
|
|
|
|
```shell-session
|
2017-05-04 02:03:42 +00:00
|
|
|
|
$ curl \
|
|
|
|
|
--header "X-Vault-Token: ..." \
|
|
|
|
|
--request PUT \
|
|
|
|
|
--data @payload.json \
|
2018-03-23 15:41:51 +00:00
|
|
|
|
http://127.0.0.1:8200/v1/sys/leases/renew
|
2017-05-04 02:03:42 +00:00
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
### Sample Response
|
|
|
|
|
|
|
|
|
|
```json
|
|
|
|
|
{
|
|
|
|
|
"lease_id": "aws/creds/deploy/abcd-1234...",
|
|
|
|
|
"renewable": true,
|
|
|
|
|
"lease_duration": 2764790
|
|
|
|
|
}
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
## Revoke Lease
|
|
|
|
|
|
|
|
|
|
This endpoint revokes a lease immediately.
|
|
|
|
|
|
2020-01-18 00:18:09 +00:00
|
|
|
|
| Method | Path |
|
|
|
|
|
| :----- | :------------------- |
|
|
|
|
|
| `PUT` | `/sys/leases/revoke` |
|
2017-05-04 02:03:42 +00:00
|
|
|
|
|
|
|
|
|
### Parameters
|
|
|
|
|
|
|
|
|
|
- `lease_id` `(string: <required>)` – Specifies the ID of the lease to revoke.
|
2021-05-06 14:18:46 +00:00
|
|
|
|
- `sync` `(bool: false)` - Instead of the default behaviour of queueing the lease
|
|
|
|
|
revocation, sync=true will revoke the lease immediately and only return once
|
|
|
|
|
complete.
|
2017-05-04 02:03:42 +00:00
|
|
|
|
|
|
|
|
|
### Sample Payload
|
|
|
|
|
|
|
|
|
|
```json
|
|
|
|
|
{
|
|
|
|
|
"lease_id": "postgresql/creds/readonly/abcd-1234..."
|
|
|
|
|
}
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
### Sample Request
|
|
|
|
|
|
2020-05-21 17:18:17 +00:00
|
|
|
|
```shell-session
|
2017-05-04 02:03:42 +00:00
|
|
|
|
$ curl \
|
|
|
|
|
--header "X-Vault-Token: ..." \
|
|
|
|
|
--request PUT \
|
|
|
|
|
--data @payload.json \
|
2018-03-23 15:41:51 +00:00
|
|
|
|
http://127.0.0.1:8200/v1/sys/leases/revoke
|
2017-05-04 02:03:42 +00:00
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
## Revoke Force
|
|
|
|
|
|
|
|
|
|
This endpoint revokes all secrets or tokens generated under a given prefix
|
|
|
|
|
immediately. Unlike `/sys/leases/revoke-prefix`, this path ignores backend errors
|
|
|
|
|
encountered during revocation. This is _potentially very dangerous_ and should
|
|
|
|
|
only be used in specific emergency situations where errors in the backend or the
|
|
|
|
|
connected backend service prevent normal revocation.
|
|
|
|
|
|
|
|
|
|
By ignoring these errors, Vault abdicates responsibility for ensuring that the
|
|
|
|
|
issued credentials or secrets are properly revoked and/or cleaned up. Access to
|
|
|
|
|
this endpoint should be tightly controlled.
|
|
|
|
|
|
|
|
|
|
**This endpoint requires 'sudo' capability.**
|
|
|
|
|
|
2020-01-18 00:18:09 +00:00
|
|
|
|
| Method | Path |
|
|
|
|
|
| :----- | :--------------------------------- |
|
|
|
|
|
| `PUT` | `/sys/leases/revoke-force/:prefix` |
|
2017-05-04 02:03:42 +00:00
|
|
|
|
|
|
|
|
|
### Parameters
|
|
|
|
|
|
|
|
|
|
- `prefix` `(string: <required>)` – Specifies the prefix to revoke. This is
|
|
|
|
|
specified as part of the URL.
|
|
|
|
|
|
|
|
|
|
### Sample Request
|
|
|
|
|
|
2020-05-21 17:18:17 +00:00
|
|
|
|
```shell-session
|
2017-05-04 02:03:42 +00:00
|
|
|
|
$ curl \
|
|
|
|
|
--header "X-Vault-Token: ..." \
|
|
|
|
|
--request PUT \
|
2018-03-23 15:41:51 +00:00
|
|
|
|
http://127.0.0.1:8200/v1/sys/leases/revoke-force/aws/creds
|
2017-05-04 02:03:42 +00:00
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
## Revoke Prefix
|
|
|
|
|
|
|
|
|
|
This endpoint revokes all secrets (via a lease ID prefix) or tokens (via the
|
|
|
|
|
tokens' path property) generated under a given prefix immediately. This requires
|
|
|
|
|
`sudo` capability and access to it should be tightly controlled as it can be
|
|
|
|
|
used to revoke very large numbers of secrets/tokens at once.
|
|
|
|
|
|
|
|
|
|
**This endpoint requires 'sudo' capability.**
|
|
|
|
|
|
2020-01-18 00:18:09 +00:00
|
|
|
|
| Method | Path |
|
|
|
|
|
| :----- | :---------------------------------- |
|
|
|
|
|
| `PUT` | `/sys/leases/revoke-prefix/:prefix` |
|
2017-05-04 02:03:42 +00:00
|
|
|
|
|
|
|
|
|
### Parameters
|
|
|
|
|
|
|
|
|
|
- `prefix` `(string: <required>)` – Specifies the prefix to revoke. This is
|
|
|
|
|
specified as part of the URL.
|
2021-05-06 14:18:46 +00:00
|
|
|
|
- `sync` `(bool: false)` - Instead of the default behaviour of queueing the lease
|
2021-06-02 18:01:05 +00:00
|
|
|
|
revocations, sync=true will revoke ths leases immediately and only return once
|
|
|
|
|
complete.
|
2017-05-04 02:03:42 +00:00
|
|
|
|
|
|
|
|
|
### Sample Request
|
|
|
|
|
|
2020-05-21 17:18:17 +00:00
|
|
|
|
```shell-session
|
2017-05-04 02:03:42 +00:00
|
|
|
|
$ curl \
|
|
|
|
|
--header "X-Vault-Token: ..." \
|
|
|
|
|
--request PUT \
|
2018-03-23 15:41:51 +00:00
|
|
|
|
http://127.0.0.1:8200/v1/sys/leases/revoke-prefix/aws/creds
|
2017-05-04 02:03:42 +00:00
|
|
|
|
```
|
2019-11-11 20:35:59 +00:00
|
|
|
|
|
|
|
|
|
## Tidy Leases
|
|
|
|
|
|
2020-06-09 20:54:06 +00:00
|
|
|
|
This endpoint cleans up the dangling storage entries for leases: for each lease
|
|
|
|
|
entry in storage, Vault will verify that it has an associated valid non-expired
|
|
|
|
|
token in storage, and if not, the lease will be revoked.
|
|
|
|
|
|
|
|
|
|
Generally, running this is not needed unless upgrade notes or support personnel
|
|
|
|
|
suggest it. This may perform a lot of I/O to the storage method so should be
|
|
|
|
|
used sparingly.
|
|
|
|
|
|
2019-11-11 20:35:59 +00:00
|
|
|
|
| Method | Path |
|
2020-01-18 00:18:09 +00:00
|
|
|
|
| :----- | :----------------- |
|
2019-11-11 20:35:59 +00:00
|
|
|
|
| `POST` | `/sys/leases/tidy` |
|
|
|
|
|
|
|
|
|
|
### Sample Request
|
|
|
|
|
|
2020-05-21 17:18:17 +00:00
|
|
|
|
```shell-session
|
2019-11-11 20:35:59 +00:00
|
|
|
|
$ curl \
|
|
|
|
|
--header "X-Vault-Token: ..." \
|
|
|
|
|
--request POST \
|
|
|
|
|
http://127.0.0.1:8200/v1/sys/leases/tidy
|
2020-01-18 00:18:09 +00:00
|
|
|
|
```
|
2021-06-02 16:11:30 +00:00
|
|
|
|
|
|
|
|
|
## Lease Counts
|
|
|
|
|
|
|
|
|
|
This endpoint returns the total count of a `type` of lease, as well as a count
|
|
|
|
|
per mount point. Note that it currently only supports type "irrevocable".
|
|
|
|
|
|
|
|
|
|
This can help determine if particular endpoints are disproportionately
|
|
|
|
|
resulting in irrevocable leases.
|
|
|
|
|
|
|
|
|
|
This endpoint was added in Vault 1.8.
|
|
|
|
|
|
|
|
|
|
### Parameters
|
|
|
|
|
|
2021-06-02 18:01:05 +00:00
|
|
|
|
- `type` `(string: <required>)` - Specifies the type of lease.
|
2021-06-02 16:11:30 +00:00
|
|
|
|
- `include_child_namespaces` (bool: false) - Specifies if leases in child
|
2021-06-02 18:01:05 +00:00
|
|
|
|
namespaces should be included in the result.
|
2021-06-02 16:11:30 +00:00
|
|
|
|
|
2021-06-02 18:01:05 +00:00
|
|
|
|
| Method | Path |
|
|
|
|
|
| :----- | :------------------ |
|
|
|
|
|
| `GET` | `/sys/leases/count` |
|
2021-06-02 16:11:30 +00:00
|
|
|
|
|
|
|
|
|
### Sample Request
|
|
|
|
|
|
|
|
|
|
```shell-session
|
|
|
|
|
$ curl \
|
|
|
|
|
--header "X-Vault-Token: ..." \
|
|
|
|
|
--request GET \
|
|
|
|
|
http://127.0.0.1:8200/v1/sys/leases/count \
|
|
|
|
|
-d type=irrevocable
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
## Leases List
|
|
|
|
|
|
|
|
|
|
This endpoint returns the total count of a `type` of lease, as well as a list
|
|
|
|
|
of leases per mount point. Note that it currently only supports type
|
|
|
|
|
"irrevocable".
|
|
|
|
|
|
|
|
|
|
This can help determine if particular endpoints or causes are disproportionately
|
|
|
|
|
resulting in irrevocable leases.
|
|
|
|
|
|
|
|
|
|
This endpoint was added in Vault 1.8.
|
|
|
|
|
|
|
|
|
|
### Parameters
|
|
|
|
|
|
2021-06-02 18:01:05 +00:00
|
|
|
|
- `type` `(string: <required>)` - Specifies the type of lease.
|
2021-06-02 16:11:30 +00:00
|
|
|
|
- `include_child_namespaces` (bool: false) - Specifies if leases in child
|
2021-06-02 18:01:05 +00:00
|
|
|
|
namespaces should be included in the result
|
2021-06-02 16:11:30 +00:00
|
|
|
|
- `limit` (string: "") - Specifies the maximum number of leases to return in a
|
2021-06-02 18:01:05 +00:00
|
|
|
|
request. To return all results, set to `none`. If not set, this API will
|
|
|
|
|
return a maximum of 10,000 leases. If not set to `none` and there exist more
|
|
|
|
|
leases than `limit`, the response will include a warning.
|
2021-06-02 16:11:30 +00:00
|
|
|
|
|
|
|
|
|
| Method | Path |
|
|
|
|
|
| :----- | :------------ |
|
|
|
|
|
| `GET` | `/sys/leases` |
|
|
|
|
|
|
|
|
|
|
### Sample Request
|
|
|
|
|
|
|
|
|
|
```shell-session
|
|
|
|
|
$ curl \
|
|
|
|
|
--header "X-Vault-Token: ..." \
|
|
|
|
|
--request GET \
|
|
|
|
|
http://127.0.0.1:8200/v1/sys/leases \
|
|
|
|
|
-d type=irrevocable
|
|
|
|
|
```
|