Liking cljdoc? Tell your friends :D

vault.auth

High-level namespace for client authentication.

High-level namespace for client authentication.
raw docstring

vault.auth.approle

The /auth/approle endpoint manages approle role-id & secret-id authentication functionality.

Reference: https://www.vaultproject.io/api-docs/auth/approle

The `/auth/approle` endpoint manages approle role-id & secret-id authentication functionality.

Reference: https://www.vaultproject.io/api-docs/auth/approle
raw docstring

vault.auth.github

The /auth/github endpoint manages GitHub authentication functionality.

Reference: https://www.vaultproject.io/api-docs/auth/github

The `/auth/github` endpoint manages GitHub authentication functionality.

Reference: https://www.vaultproject.io/api-docs/auth/github
raw docstring

vault.auth.kubernetes

The /auth/kubernetes endpoint manages Kubernetes authentication functionality.

Reference: https://www.vaultproject.io/api-docs/auth/kubernetes

The `/auth/kubernetes` endpoint manages Kubernetes authentication
functionality.

Reference: https://www.vaultproject.io/api-docs/auth/kubernetes
raw docstring

vault.auth.ldap

The /auth/ldap endpoint manages Lightweight Directory Access Protocol (LDAP) authentication functionality.

Reference: https://www.vaultproject.io/api-docs/auth/ldap

The `/auth/ldap` endpoint manages Lightweight Directory Access Protocol (LDAP)
authentication functionality.

Reference: https://www.vaultproject.io/api-docs/auth/ldap
raw docstring

vault.auth.token

The /auth/token endpoint manages token-based authentication functionality.

Reference: https://www.vaultproject.io/api-docs/auth/token

The `/auth/token` endpoint manages token-based authentication functionality.

Reference: https://www.vaultproject.io/api-docs/auth/token
raw docstring

vault.auth.userpass

The /auth/userpass endpoint manages username & password authentication functionality.

Reference: https://www.vaultproject.io/api-docs/auth/userpass

The `/auth/userpass` endpoint manages username & password authentication
functionality.

Reference: https://www.vaultproject.io/api-docs/auth/userpass
raw docstring

vault.client

Main Vault client namespace. Contains functions for generic client operations, constructing new clients, and using clients as components in a larger system.

Main Vault client namespace. Contains functions for generic client
operations, constructing new clients, and using clients as components in a
larger system.
raw docstring

vault.client.flow

A control flow handler defines a collection of functions which determine how requests and responses are handled through the Vault client.

A _control flow handler_ defines a collection of functions which determine
how requests and responses are handled through the Vault client.
raw docstring

vault.client.http

Vault HTTP client and core functions.

Vault HTTP client and core functions.
raw docstring

vault.client.mock

A mock in-memory Vault client for local testing.

A mock in-memory Vault client for local testing.
raw docstring

vault.lease

High-level namespace for tracking and maintaining leases on dynamic secrets read by a vault client.

High-level namespace for tracking and maintaining leases on dynamic secrets
read by a vault client.
raw docstring

vault.secret.aws

The AWS secrets engine generates AWS access credentials dynamically based on IAM policies.

Reference: https://www.vaultproject.io/api-docs/secret/aws

The AWS secrets engine generates AWS access credentials dynamically based on
IAM policies.

Reference: https://www.vaultproject.io/api-docs/secret/aws
raw docstring

vault.secret.database

The database secrets engine is used to manage dynamically-issued credentials for users of a database backend such as mysql, postgresql, mongodb, etc. The vault server uses a privileged 'root' user to create new users with randomized passwords on-demand for callers.

Reference: https://www.vaultproject.io/api-docs/secret/databases

The database secrets engine is used to manage dynamically-issued credentials
for users of a database backend such as mysql, postgresql, mongodb, etc. The
vault server uses a privileged 'root' user to create new users with randomized
passwords on-demand for callers.

Reference: https://www.vaultproject.io/api-docs/secret/databases
raw docstring

vault.secret.kv.v1

The kv secrets engine is used to store arbitrary secrets within the configured physical storage for Vault. Writing to a key in the kv-v1 backend will replace the old value; sub-fields are not merged together.

Reference: https://www.vaultproject.io/api-docs/secret/kv/kv-v1

The kv secrets engine is used to store arbitrary secrets within the
configured physical storage for Vault. Writing to a key in the kv-v1 backend
will replace the old value; sub-fields are not merged together.

Reference: https://www.vaultproject.io/api-docs/secret/kv/kv-v1
raw docstring

vault.secret.kv.v2

The kv secrets engine is used to store arbitrary secrets within the configured physical storage for Vault. Writing to a key in the kv-v1 backend will replace the old value; sub-fields are not merged together.

Reference: https://www.vaultproject.io/api-docs/secret/kv/kv-v1

The kv secrets engine is used to store arbitrary secrets within the
configured physical storage for Vault. Writing to a key in the kv-v1 backend
will replace the old value; sub-fields are not merged together.

Reference: https://www.vaultproject.io/api-docs/secret/kv/kv-v1
raw docstring

vault.secret.transit

The transit secrets engine handles cryptographic functions on data in-transit. It can also be viewed as "cryptography as a service" or "encryption as a service". The transit secrets engine can also sign and verify data; generate hashes and HMACs of data; and act as a source of random bytes.

Reference: https://www.vaultproject.io/api-docs/secret/transit

The transit secrets engine handles cryptographic functions on data
in-transit. It can also be viewed as "cryptography as a service" or
"encryption as a service". The transit secrets engine can also sign and
verify data; generate hashes and HMACs of data; and act as a source of random
bytes.

Reference: https://www.vaultproject.io/api-docs/secret/transit
raw docstring

vault.sys.auth

The /sys/auth endpoint is used to list, create, update, and delete auth methods. Auth methods convert user or machine-supplied information into a token which can be used for all future requests.

Reference: https://www.vaultproject.io/api-docs/system/auth

The `/sys/auth` endpoint is used to list, create, update, and delete auth
methods. Auth methods convert user or machine-supplied information into a
token which can be used for all future requests.

Reference: https://www.vaultproject.io/api-docs/system/auth
raw docstring

vault.sys.health

The /sys/health endpoint is used to check the health status of Vault.

Reference: https://www.vaultproject.io/api-docs/system/health

The `/sys/health` endpoint is used to check the health status of Vault.

Reference: https://www.vaultproject.io/api-docs/system/health
raw docstring

vault.sys.leases

The /sys/leases endpoint is used to view and manage leases in Vault.

Reference: https://www.vaultproject.io/api-docs/system/leases

The `/sys/leases` endpoint is used to view and manage leases in Vault.

Reference: https://www.vaultproject.io/api-docs/system/leases
raw docstring

vault.sys.mounts

The /sys/mounts endpoint is used to manage secrets engines in Vault.

Reference: https://www.vaultproject.io/api-docs/system/mounts

The `/sys/mounts` endpoint is used to manage secrets engines in Vault.

Reference: https://www.vaultproject.io/api-docs/system/mounts
raw docstring

vault.sys.wrapping

The `/sys/wrapping` endpoint is used to wrap secrets and lookup, rewrap, and
unwrap tokens.

Reference:
- https://www.vaultproject.io/api-docs/system/wrapping-lookup
- https://www.vaultproject.io/api-docs/system/wrapping-rewrap
- https://www.vaultproject.io/api-docs/system/wrapping-unwrap
- https://www.vaultproject.io/api-docs/system/wrapping-wrap
raw docstring

cljdoc is a website building & hosting documentation for Clojure/Script libraries

× close