diff --git a/docs/AppRoleLookUpSecretIdByAccessorResponse.md b/docs/AppRoleLookUpSecretIdByAccessorResponse.md index 2f788621..a3c37fc8 100644 --- a/docs/AppRoleLookUpSecretIdByAccessorResponse.md +++ b/docs/AppRoleLookUpSecretIdByAccessorResponse.md @@ -12,7 +12,7 @@ Name | Type | Description | Notes **Metadata** | Pointer to **map[string]interface{}** | | [optional] **SecretIdAccessor** | Pointer to **string** | Accessor of the secret ID | [optional] **SecretIdNumUses** | Pointer to **int32** | Number of times a secret ID can access the role, after which the secret ID will expire. | [optional] -**SecretIdTtl** | Pointer to **string** | Duration in seconds after which the issued secret ID expires. | [optional] +**SecretIdTtl** | Pointer to **int64** | Duration in seconds after which the issued secret ID expires. | [optional] **TokenBoundCidrs** | Pointer to **[]string** | List of CIDR blocks. If set, specifies the blocks of IP addresses which can use the returned token. Should be a subset of the token CIDR blocks listed on the role, if any. | [optional] diff --git a/docs/AppRoleLookUpSecretIdResponse.md b/docs/AppRoleLookUpSecretIdResponse.md index a73fb041..3bc04947 100644 --- a/docs/AppRoleLookUpSecretIdResponse.md +++ b/docs/AppRoleLookUpSecretIdResponse.md @@ -12,7 +12,7 @@ Name | Type | Description | Notes **Metadata** | Pointer to **map[string]interface{}** | | [optional] **SecretIdAccessor** | Pointer to **string** | Accessor of the secret ID | [optional] **SecretIdNumUses** | Pointer to **int32** | Number of times a secret ID can access the role, after which the secret ID will expire. | [optional] -**SecretIdTtl** | Pointer to **string** | Duration in seconds after which the issued secret ID expires. | [optional] +**SecretIdTtl** | Pointer to **int64** | Duration in seconds after which the issued secret ID expires. | [optional] **TokenBoundCidrs** | Pointer to **[]string** | List of CIDR blocks. If set, specifies the blocks of IP addresses which can use the returned token. Should be a subset of the token CIDR blocks listed on the role, if any. | [optional] diff --git a/docs/AppRoleReadPeriodResponse.md b/docs/AppRoleReadPeriodResponse.md index e03811b7..4bb58ce3 100644 --- a/docs/AppRoleReadPeriodResponse.md +++ b/docs/AppRoleReadPeriodResponse.md @@ -5,8 +5,8 @@ Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- -**Period** | Pointer to **string** | Use \"token_period\" instead. If this and \"token_period\" are both specified, only \"token_period\" will be used. | [optional] -**TokenPeriod** | Pointer to **string** | If set, tokens created via this role will have no max lifetime; instead, their renewal period will be fixed to this value. This takes an integer number of seconds, or a string duration (e.g. \"24h\"). | [optional] +**Period** | Pointer to **int64** | Use \"token_period\" instead. If this and \"token_period\" are both specified, only \"token_period\" will be used. | [optional] +**TokenPeriod** | Pointer to **int64** | If set, tokens created via this role will have no max lifetime; instead, their renewal period will be fixed to this value. This takes an integer number of seconds. | [optional] diff --git a/docs/AppRoleReadRoleResponse.md b/docs/AppRoleReadRoleResponse.md index 31f62128..1dbdbf4f 100644 --- a/docs/AppRoleReadRoleResponse.md +++ b/docs/AppRoleReadRoleResponse.md @@ -7,19 +7,19 @@ Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- **BindSecretId** | Pointer to **bool** | Impose secret ID to be presented when logging in using this role. | [optional] **LocalSecretIds** | Pointer to **bool** | If true, the secret identifiers generated using this role will be cluster local. This can only be set during role creation and once set, it can't be reset later | [optional] -**Period** | Pointer to **string** | Use \"token_period\" instead. If this and \"token_period\" are both specified, only \"token_period\" will be used. | [optional] +**Period** | Pointer to **int64** | Use \"token_period\" instead. If this and \"token_period\" are both specified, only \"token_period\" will be used. | [optional] **Policies** | Pointer to **[]string** | Use \"token_policies\" instead. If this and \"token_policies\" are both specified, only \"token_policies\" will be used. | [optional] **SecretIdBoundCidrs** | Pointer to **[]string** | Comma separated string or list of CIDR blocks. If set, specifies the blocks of IP addresses which can perform the login operation. | [optional] **SecretIdNumUses** | Pointer to **int32** | Number of times a secret ID can access the role, after which the secret ID will expire. | [optional] -**SecretIdTtl** | Pointer to **string** | Duration in seconds after which the issued secret ID expires. | [optional] +**SecretIdTtl** | Pointer to **int64** | Duration in seconds after which the issued secret ID expires. | [optional] **TokenBoundCidrs** | Pointer to **[]string** | Comma separated string or JSON list of CIDR blocks. If set, specifies the blocks of IP addresses which are allowed to use the generated token. | [optional] -**TokenExplicitMaxTtl** | Pointer to **string** | If set, tokens created via this role carry an explicit maximum TTL. During renewal, the current maximum TTL values of the role and the mount are not checked for changes, and any updates to these values will have no effect on the token being renewed. | [optional] -**TokenMaxTtl** | Pointer to **string** | The maximum lifetime of the generated token | [optional] +**TokenExplicitMaxTtl** | Pointer to **int64** | If set, tokens created via this role carry an explicit maximum TTL. During renewal, the current maximum TTL values of the role and the mount are not checked for changes, and any updates to these values will have no effect on the token being renewed. | [optional] +**TokenMaxTtl** | Pointer to **int64** | The maximum lifetime of the generated token | [optional] **TokenNoDefaultPolicy** | Pointer to **bool** | If true, the 'default' policy will not automatically be added to generated tokens | [optional] **TokenNumUses** | Pointer to **int32** | The maximum number of times a token may be used, a value of zero means unlimited | [optional] -**TokenPeriod** | Pointer to **string** | If set, tokens created via this role will have no max lifetime; instead, their renewal period will be fixed to this value. | [optional] +**TokenPeriod** | Pointer to **int64** | If set, tokens created via this role will have no max lifetime; instead, their renewal period will be fixed to this value. | [optional] **TokenPolicies** | Pointer to **[]string** | Comma-separated list of policies | [optional] -**TokenTtl** | Pointer to **string** | The initial ttl of the token to generate | [optional] +**TokenTtl** | Pointer to **int64** | The initial ttl of the token to generate | [optional] **TokenType** | Pointer to **string** | The type of token to generate, service or batch | [optional] [default to "default-service"] diff --git a/docs/AppRoleReadSecretIdTtlResponse.md b/docs/AppRoleReadSecretIdTtlResponse.md index ab4f7a53..443e6493 100644 --- a/docs/AppRoleReadSecretIdTtlResponse.md +++ b/docs/AppRoleReadSecretIdTtlResponse.md @@ -5,7 +5,7 @@ Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- -**SecretIdTtl** | Pointer to **string** | Duration in seconds after which the issued secret ID should expire. Defaults to 0, meaning no expiration. | [optional] +**SecretIdTtl** | Pointer to **int64** | Duration in seconds after which the issued secret ID should expire. Defaults to 0, meaning no expiration. | [optional] diff --git a/docs/AppRoleReadTokenMaxTtlResponse.md b/docs/AppRoleReadTokenMaxTtlResponse.md index ce27507f..fe4b4025 100644 --- a/docs/AppRoleReadTokenMaxTtlResponse.md +++ b/docs/AppRoleReadTokenMaxTtlResponse.md @@ -5,7 +5,7 @@ Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- -**TokenMaxTtl** | Pointer to **string** | The maximum lifetime of the generated token | [optional] +**TokenMaxTtl** | Pointer to **int64** | The maximum lifetime of the generated token | [optional] diff --git a/docs/AppRoleReadTokenTtlResponse.md b/docs/AppRoleReadTokenTtlResponse.md index babeaa6a..bd40a546 100644 --- a/docs/AppRoleReadTokenTtlResponse.md +++ b/docs/AppRoleReadTokenTtlResponse.md @@ -5,7 +5,7 @@ Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- -**TokenTtl** | Pointer to **string** | The initial ttl of the token to generate | [optional] +**TokenTtl** | Pointer to **int64** | The initial ttl of the token to generate | [optional] diff --git a/docs/AppRoleWriteCustomSecretIdResponse.md b/docs/AppRoleWriteCustomSecretIdResponse.md index 746b2601..182a7afd 100644 --- a/docs/AppRoleWriteCustomSecretIdResponse.md +++ b/docs/AppRoleWriteCustomSecretIdResponse.md @@ -8,7 +8,7 @@ Name | Type | Description | Notes **SecretId** | Pointer to **string** | Secret ID attached to the role. | [optional] **SecretIdAccessor** | Pointer to **string** | Accessor of the secret ID | [optional] **SecretIdNumUses** | Pointer to **int32** | Number of times a secret ID can access the role, after which the secret ID will expire. | [optional] -**SecretIdTtl** | Pointer to **string** | Duration in seconds after which the issued secret ID expires. | [optional] +**SecretIdTtl** | Pointer to **int64** | Duration in seconds after which the issued secret ID expires. | [optional] diff --git a/docs/AppRoleWriteSecretIdResponse.md b/docs/AppRoleWriteSecretIdResponse.md index f19ce226..8f7f95db 100644 --- a/docs/AppRoleWriteSecretIdResponse.md +++ b/docs/AppRoleWriteSecretIdResponse.md @@ -8,7 +8,7 @@ Name | Type | Description | Notes **SecretId** | Pointer to **string** | Secret ID attached to the role. | [optional] **SecretIdAccessor** | Pointer to **string** | Accessor of the secret ID | [optional] **SecretIdNumUses** | Pointer to **int32** | Number of times a secret ID can access the role, after which the secret ID will expire. | [optional] -**SecretIdTtl** | Pointer to **string** | Duration in seconds after which the issued secret ID expires. | [optional] +**SecretIdTtl** | Pointer to **int64** | Duration in seconds after which the issued secret ID expires. | [optional] diff --git a/openapi.json b/openapi.json index accc85f1..2f47e43e 100644 --- a/openapi.json +++ b/openapi.json @@ -16,9 +16,7 @@ "get": { "summary": "List token accessors, which can then be\nbe used to iterate and discover their properties\nor revoke them. Because this can be used to\ncause a denial of service, this endpoint\nrequires 'sudo' capability in addition to\n'list'.", "operationId": "token-list-accessors", - "tags": [ - "auth" - ], + "tags": ["auth"], "parameters": [ { "name": "list", @@ -26,9 +24,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -52,9 +48,7 @@ "post": { "summary": "The token create path is used to create new tokens.", "operationId": "token-create", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -77,9 +71,7 @@ "post": { "summary": "The token create path is used to create new orphan tokens.", "operationId": "token-create-orphan", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -113,9 +105,7 @@ "post": { "summary": "This token create path is used to create new tokens adhering to the given role.", "operationId": "token-create-against-role", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -137,9 +127,7 @@ "description": "This endpoint will lookup a token and its properties.", "get": { "operationId": "token-look-up-2", - "tags": [ - "auth" - ], + "tags": ["auth"], "parameters": [ { "name": "token", @@ -158,9 +146,7 @@ }, "post": { "operationId": "token-look-up", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -183,9 +169,7 @@ "post": { "summary": "This endpoint will lookup a token associated with the given accessor and its properties. Response will not contain the token ID.", "operationId": "token-look-up-accessor", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -207,9 +191,7 @@ "description": "This endpoint will lookup a token and its properties.", "get": { "operationId": "token-look-up-self", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "200": { "description": "OK" @@ -218,9 +200,7 @@ }, "post": { "operationId": "token-look-up-self2", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -243,9 +223,7 @@ "post": { "summary": "This endpoint will renew the given token and prevent expiration.", "operationId": "token-renew", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -268,9 +246,7 @@ "post": { "summary": "This endpoint will renew a token associated with the given accessor and its properties. Response will not contain the token ID.", "operationId": "token-renew-accessor", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -293,9 +269,7 @@ "post": { "summary": "This endpoint will renew the token used to call it and prevent expiration.", "operationId": "token-renew-self", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -318,9 +292,7 @@ "post": { "summary": "This endpoint will delete the given token and all of its child tokens.", "operationId": "token-revoke", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -343,9 +315,7 @@ "post": { "summary": "This endpoint will delete the token associated with the accessor and all of its child tokens.", "operationId": "token-revoke-accessor", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -369,9 +339,7 @@ "post": { "summary": "This endpoint will delete the token and orphan its child tokens.", "operationId": "token-revoke-orphan", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -394,9 +362,7 @@ "post": { "summary": "This endpoint will delete the token used to call it and all of its child tokens.", "operationId": "token-revoke-self", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "200": { "description": "OK" @@ -409,9 +375,7 @@ "get": { "summary": "This endpoint lists configured roles.", "operationId": "token-list-roles", - "tags": [ - "auth" - ], + "tags": ["auth"], "parameters": [ { "name": "list", @@ -419,9 +383,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -455,9 +417,7 @@ "x-vault-createSupported": true, "get": { "operationId": "token-read-role", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "200": { "description": "OK" @@ -466,9 +426,7 @@ }, "post": { "operationId": "token-write-role", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -487,9 +445,7 @@ }, "delete": { "operationId": "token-delete-role", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "204": { "description": "empty body" @@ -502,9 +458,7 @@ "post": { "summary": "This endpoint performs cleanup tasks that can be run if certain error\nconditions have occurred.", "operationId": "token-tidy", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "200": { "description": "OK" @@ -530,9 +484,7 @@ "post": { "summary": "Authenticates an RAM entity with Vault.", "operationId": "ali-cloud-login", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -567,9 +519,7 @@ "get": { "summary": "Lists all the roles that are registered with Vault.", "operationId": "ali-cloud-list-auth-roles", - "tags": [ - "auth" - ], + "tags": ["auth"], "parameters": [ { "name": "list", @@ -577,9 +527,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -625,9 +573,7 @@ "get": { "summary": "Create a role and associate policies to it.", "operationId": "ali-cloud-read-auth-role", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "200": { "description": "OK" @@ -637,9 +583,7 @@ "post": { "summary": "Create a role and associate policies to it.", "operationId": "ali-cloud-write-auth-role", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -659,9 +603,7 @@ "delete": { "summary": "Create a role and associate policies to it.", "operationId": "ali-cloud-delete-auth-role", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "204": { "description": "empty body" @@ -686,9 +628,7 @@ "get": { "summary": "Lists all the roles that are registered with Vault.", "operationId": "ali-cloud-list-auth-roles2", - "tags": [ - "auth" - ], + "tags": ["auth"], "parameters": [ { "name": "list", @@ -696,9 +636,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -734,9 +672,7 @@ "x-vault-unauthenticated": true, "post": { "operationId": "app-role-login", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -770,9 +706,7 @@ ], "get": { "operationId": "app-role-list-roles", - "tags": [ - "auth" - ], + "tags": ["auth"], "parameters": [ { "name": "list", @@ -780,9 +714,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -827,9 +759,7 @@ "x-vault-createSupported": true, "get": { "operationId": "app-role-read-role", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "200": { "description": "OK", @@ -845,9 +775,7 @@ }, "post": { "operationId": "app-role-write-role", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -866,9 +794,7 @@ }, "delete": { "operationId": "app-role-delete-role", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "204": { "description": "No Content" @@ -901,9 +827,7 @@ ], "get": { "operationId": "app-role-read-bind-secret-id", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "200": { "description": "OK", @@ -919,9 +843,7 @@ }, "post": { "operationId": "app-role-write-bind-secret-id", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -940,9 +862,7 @@ }, "delete": { "operationId": "app-role-delete-bind-secret-id", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "204": { "description": "No Content" @@ -975,9 +895,7 @@ ], "get": { "operationId": "app-role-read-bound-cidr-list", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "200": { "description": "OK", @@ -993,9 +911,7 @@ }, "post": { "operationId": "app-role-write-bound-cidr-list", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -1014,9 +930,7 @@ }, "delete": { "operationId": "app-role-delete-bound-cidr-list", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "204": { "description": "No Content" @@ -1049,9 +963,7 @@ ], "post": { "operationId": "app-role-write-custom-secret-id", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -1101,9 +1013,7 @@ ], "get": { "operationId": "app-role-read-local-secret-ids", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "200": { "description": "OK", @@ -1143,9 +1053,7 @@ ], "get": { "operationId": "app-role-read-period", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "200": { "description": "OK", @@ -1161,9 +1069,7 @@ }, "post": { "operationId": "app-role-write-period", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -1182,9 +1088,7 @@ }, "delete": { "operationId": "app-role-delete-period", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "204": { "description": "No Content" @@ -1217,9 +1121,7 @@ ], "get": { "operationId": "app-role-read-policies", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "200": { "description": "OK", @@ -1235,9 +1137,7 @@ }, "post": { "operationId": "app-role-write-policies", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -1256,9 +1156,7 @@ }, "delete": { "operationId": "app-role-delete-policies", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "204": { "description": "No Content" @@ -1291,9 +1189,7 @@ ], "get": { "operationId": "app-role-read-role-id", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "200": { "description": "OK", @@ -1309,9 +1205,7 @@ }, "post": { "operationId": "app-role-write-role-id", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -1354,9 +1248,7 @@ ], "post": { "operationId": "app-role-write-secret-id", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -1405,9 +1297,7 @@ ], "post": { "operationId": "app-role-destroy-secret-id-by-accessor", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -1426,9 +1316,7 @@ }, "delete": { "operationId": "app-role-destroy-secret-id-by-accessor2", - "tags": [ - "auth" - ], + "tags": ["auth"], "parameters": [ { "name": "secret_id_accessor", @@ -1470,9 +1358,7 @@ ], "post": { "operationId": "app-role-look-up-secret-id-by-accessor", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -1522,9 +1408,7 @@ ], "get": { "operationId": "app-role-read-secret-id-bound-cidrs", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "200": { "description": "OK", @@ -1540,9 +1424,7 @@ }, "post": { "operationId": "app-role-write-secret-id-bound-cidrs", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -1561,9 +1443,7 @@ }, "delete": { "operationId": "app-role-delete-secret-id-bound-cidrs", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "204": { "description": "No Content" @@ -1596,9 +1476,7 @@ ], "get": { "operationId": "app-role-read-secret-id-num-uses", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "200": { "description": "OK", @@ -1614,9 +1492,7 @@ }, "post": { "operationId": "app-role-write-secret-id-num-uses", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -1635,9 +1511,7 @@ }, "delete": { "operationId": "app-role-delete-secret-id-num-uses", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "204": { "description": "No Content" @@ -1670,9 +1544,7 @@ ], "get": { "operationId": "app-role-read-secret-id-ttl", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "200": { "description": "OK", @@ -1688,9 +1560,7 @@ }, "post": { "operationId": "app-role-write-secret-id-ttl", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -1709,9 +1579,7 @@ }, "delete": { "operationId": "app-role-delete-secret-id-ttl", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "204": { "description": "No Content" @@ -1744,9 +1612,7 @@ ], "get": { "operationId": "app-role-list-secret-ids", - "tags": [ - "auth" - ], + "tags": ["auth"], "parameters": [ { "name": "list", @@ -1754,9 +1620,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -1800,9 +1664,7 @@ ], "post": { "operationId": "app-role-destroy-secret-id", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -1821,9 +1683,7 @@ }, "delete": { "operationId": "app-role-destroy-secret-id2", - "tags": [ - "auth" - ], + "tags": ["auth"], "parameters": [ { "name": "secret_id", @@ -1866,9 +1726,7 @@ ], "post": { "operationId": "app-role-look-up-secret-id", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -1918,9 +1776,7 @@ ], "get": { "operationId": "app-role-read-token-bound-cidrs", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "200": { "description": "OK", @@ -1936,9 +1792,7 @@ }, "post": { "operationId": "app-role-write-token-bound-cidrs", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -1957,9 +1811,7 @@ }, "delete": { "operationId": "app-role-delete-token-bound-cidrs", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "204": { "description": "No Content" @@ -1992,9 +1844,7 @@ ], "get": { "operationId": "app-role-read-token-max-ttl", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "200": { "description": "OK", @@ -2010,9 +1860,7 @@ }, "post": { "operationId": "app-role-write-token-max-ttl", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -2031,9 +1879,7 @@ }, "delete": { "operationId": "app-role-delete-token-max-ttl", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "204": { "description": "No Content" @@ -2066,9 +1912,7 @@ ], "get": { "operationId": "app-role-read-token-num-uses", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "200": { "description": "OK", @@ -2084,9 +1928,7 @@ }, "post": { "operationId": "app-role-write-token-num-uses", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -2105,9 +1947,7 @@ }, "delete": { "operationId": "app-role-delete-token-num-uses", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "204": { "description": "No Content" @@ -2140,9 +1980,7 @@ ], "get": { "operationId": "app-role-read-token-ttl", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "200": { "description": "OK", @@ -2158,9 +1996,7 @@ }, "post": { "operationId": "app-role-write-token-ttl", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -2179,9 +2015,7 @@ }, "delete": { "operationId": "app-role-delete-token-ttl", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "204": { "description": "No Content" @@ -2205,9 +2039,7 @@ ], "post": { "operationId": "app-role-tidy-secret-id", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "202": { "description": "Accepted" @@ -2241,9 +2073,7 @@ "x-vault-createSupported": true, "get": { "operationId": "aws-read-certificate-configuration", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "200": { "description": "OK" @@ -2252,9 +2082,7 @@ }, "post": { "operationId": "aws-configure-certificate", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -2273,9 +2101,7 @@ }, "delete": { "operationId": "aws-delete-certificate-configuration", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "204": { "description": "empty body" @@ -2299,9 +2125,7 @@ ], "get": { "operationId": "aws-list-certificate-configurations", - "tags": [ - "auth" - ], + "tags": ["auth"], "parameters": [ { "name": "list", @@ -2309,9 +2133,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -2347,9 +2169,7 @@ "x-vault-createSupported": true, "get": { "operationId": "aws-read-client-configuration", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "200": { "description": "OK" @@ -2358,9 +2178,7 @@ }, "post": { "operationId": "aws-configure-client", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -2379,9 +2197,7 @@ }, "delete": { "operationId": "aws-delete-client-configuration", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "204": { "description": "empty body" @@ -2405,9 +2221,7 @@ ], "get": { "operationId": "aws-read-identity-integration-configuration", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "200": { "description": "OK" @@ -2416,9 +2230,7 @@ }, "post": { "operationId": "aws-configure-identity-integration", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -2452,9 +2264,7 @@ ], "post": { "operationId": "aws-rotate-root-credentials", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "200": { "description": "OK" @@ -2478,9 +2288,7 @@ ], "get": { "operationId": "aws-list-sts-role-relationships", - "tags": [ - "auth" - ], + "tags": ["auth"], "parameters": [ { "name": "list", @@ -2488,9 +2296,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -2535,9 +2341,7 @@ "x-vault-createSupported": true, "get": { "operationId": "aws-read-sts-role", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "200": { "description": "OK" @@ -2546,9 +2350,7 @@ }, "post": { "operationId": "aws-write-sts-role", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -2567,9 +2369,7 @@ }, "delete": { "operationId": "aws-delete-sts-role", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "204": { "description": "empty body" @@ -2594,9 +2394,7 @@ "x-vault-createSupported": true, "get": { "operationId": "aws-read-identity-access-list-tidy-settings", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "200": { "description": "OK" @@ -2605,9 +2403,7 @@ }, "post": { "operationId": "aws-configure-identity-access-list-tidy-operation", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -2626,9 +2422,7 @@ }, "delete": { "operationId": "aws-delete-identity-access-list-tidy-settings", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "204": { "description": "empty body" @@ -2653,9 +2447,7 @@ "x-vault-createSupported": true, "get": { "operationId": "aws-read-identity-whitelist-tidy-settings", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "200": { "description": "OK" @@ -2664,9 +2456,7 @@ }, "post": { "operationId": "aws-configure-identity-whitelist-tidy-operation", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -2685,9 +2475,7 @@ }, "delete": { "operationId": "aws-delete-identity-whitelist-tidy-settings", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "204": { "description": "empty body" @@ -2712,9 +2500,7 @@ "x-vault-createSupported": true, "get": { "operationId": "aws-read-role-tag-blacklist-tidy-settings", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "200": { "description": "OK" @@ -2723,9 +2509,7 @@ }, "post": { "operationId": "aws-configure-role-tag-blacklist-tidy-operation", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -2744,9 +2528,7 @@ }, "delete": { "operationId": "aws-delete-role-tag-blacklist-tidy-settings", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "204": { "description": "empty body" @@ -2771,9 +2553,7 @@ "x-vault-createSupported": true, "get": { "operationId": "aws-read-role-tag-deny-list-tidy-settings", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "200": { "description": "OK" @@ -2782,9 +2562,7 @@ }, "post": { "operationId": "aws-configure-role-tag-deny-list-tidy-operation", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -2803,9 +2581,7 @@ }, "delete": { "operationId": "aws-delete-role-tag-deny-list-tidy-settings", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "204": { "description": "empty body" @@ -2829,9 +2605,7 @@ ], "get": { "operationId": "aws-list-identity-access-list", - "tags": [ - "auth" - ], + "tags": ["auth"], "parameters": [ { "name": "list", @@ -2839,9 +2613,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -2885,9 +2657,7 @@ ], "get": { "operationId": "aws-read-identity-access-list", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "200": { "description": "OK" @@ -2896,9 +2666,7 @@ }, "delete": { "operationId": "aws-delete-identity-access-list", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "204": { "description": "empty body" @@ -2922,9 +2690,7 @@ ], "get": { "operationId": "aws-list-identity-whitelist", - "tags": [ - "auth" - ], + "tags": ["auth"], "parameters": [ { "name": "list", @@ -2932,9 +2698,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -2978,9 +2742,7 @@ ], "get": { "operationId": "aws-read-identity-whitelist", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "200": { "description": "OK" @@ -2989,9 +2751,7 @@ }, "delete": { "operationId": "aws-delete-identity-whitelist", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "204": { "description": "empty body" @@ -3016,9 +2776,7 @@ "x-vault-unauthenticated": true, "post": { "operationId": "aws-login", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -3052,9 +2810,7 @@ ], "get": { "operationId": "aws-list-auth-roles", - "tags": [ - "auth" - ], + "tags": ["auth"], "parameters": [ { "name": "list", @@ -3062,9 +2818,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -3109,9 +2863,7 @@ "x-vault-createSupported": true, "get": { "operationId": "aws-read-auth-role", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "200": { "description": "OK" @@ -3120,9 +2872,7 @@ }, "post": { "operationId": "aws-write-auth-role", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -3141,9 +2891,7 @@ }, "delete": { "operationId": "aws-delete-auth-role", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "204": { "description": "empty body" @@ -3176,9 +2924,7 @@ ], "post": { "operationId": "aws-write-role-tag", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -3212,9 +2958,7 @@ ], "get": { "operationId": "aws-list-auth-roles2", - "tags": [ - "auth" - ], + "tags": ["auth"], "parameters": [ { "name": "list", @@ -3222,9 +2966,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -3259,9 +3001,7 @@ ], "get": { "operationId": "aws-list-role-tag-blacklists", - "tags": [ - "auth" - ], + "tags": ["auth"], "parameters": [ { "name": "list", @@ -3269,9 +3009,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -3315,9 +3053,7 @@ ], "get": { "operationId": "aws-read-role-tag-blacklist", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "200": { "description": "OK" @@ -3326,9 +3062,7 @@ }, "post": { "operationId": "aws-write-role-tag-blacklist", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "200": { "description": "OK" @@ -3337,9 +3071,7 @@ }, "delete": { "operationId": "aws-delete-role-tag-blacklist", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "204": { "description": "empty body" @@ -3363,9 +3095,7 @@ ], "get": { "operationId": "aws-list-role-tag-deny-lists", - "tags": [ - "auth" - ], + "tags": ["auth"], "parameters": [ { "name": "list", @@ -3373,9 +3103,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -3419,9 +3147,7 @@ ], "get": { "operationId": "aws-read-role-tag-deny-list", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "200": { "description": "OK" @@ -3430,9 +3156,7 @@ }, "post": { "operationId": "aws-write-role-tag-deny-list", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "200": { "description": "OK" @@ -3441,9 +3165,7 @@ }, "delete": { "operationId": "aws-delete-role-tag-deny-list", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "204": { "description": "empty body" @@ -3467,9 +3189,7 @@ ], "post": { "operationId": "aws-tidy-identity-access-list", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -3503,9 +3223,7 @@ ], "post": { "operationId": "aws-tidy-identity-whitelist", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -3539,9 +3257,7 @@ ], "post": { "operationId": "aws-tidy-role-tag-blacklist", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -3575,9 +3291,7 @@ ], "post": { "operationId": "aws-tidy-role-tag-deny-list", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -3612,9 +3326,7 @@ "x-vault-createSupported": true, "get": { "operationId": "azure-read-auth-configuration", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "200": { "description": "OK" @@ -3623,9 +3335,7 @@ }, "post": { "operationId": "azure-configure-auth", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -3644,9 +3354,7 @@ }, "delete": { "operationId": "azure-delete-auth-configuration", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "204": { "description": "empty body" @@ -3671,9 +3379,7 @@ "x-vault-unauthenticated": true, "post": { "operationId": "azure-login", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -3707,9 +3413,7 @@ ], "get": { "operationId": "azure-list-auth-roles", - "tags": [ - "auth" - ], + "tags": ["auth"], "parameters": [ { "name": "list", @@ -3717,9 +3421,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -3764,9 +3466,7 @@ "x-vault-createSupported": true, "get": { "operationId": "azure-read-auth-role", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "200": { "description": "OK" @@ -3775,9 +3475,7 @@ }, "post": { "operationId": "azure-write-auth-role", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -3796,9 +3494,7 @@ }, "delete": { "operationId": "azure-delete-auth-role", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "204": { "description": "empty body" @@ -3822,9 +3518,7 @@ ], "post": { "operationId": "azure-rotate-root-credentials", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "200": { "description": "OK" @@ -3849,9 +3543,7 @@ "x-vault-createSupported": true, "get": { "operationId": "centrify-read-configuration", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "200": { "description": "OK" @@ -3860,9 +3552,7 @@ }, "post": { "operationId": "centrify-configure", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -3898,9 +3588,7 @@ "post": { "summary": "Log in with a username and password.", "operationId": "centrify-login", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -3939,9 +3627,7 @@ "get": { "summary": "Manage trusted certificates used for authentication.", "operationId": "cert-list-certificates", - "tags": [ - "auth" - ], + "tags": ["auth"], "parameters": [ { "name": "list", @@ -3949,9 +3635,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -4000,9 +3684,7 @@ "get": { "summary": "Manage trusted certificates used for authentication.", "operationId": "cert-read-certificate", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "200": { "description": "OK" @@ -4012,9 +3694,7 @@ "post": { "summary": "Manage trusted certificates used for authentication.", "operationId": "cert-write-certificate", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -4034,9 +3714,7 @@ "delete": { "summary": "Manage trusted certificates used for authentication.", "operationId": "cert-delete-certificate", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "204": { "description": "empty body" @@ -4059,9 +3737,7 @@ ], "get": { "operationId": "cert-read-configuration", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "200": { "description": "OK" @@ -4070,9 +3746,7 @@ }, "post": { "operationId": "cert-configure", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -4106,9 +3780,7 @@ ], "get": { "operationId": "cert-list-crls", - "tags": [ - "auth" - ], + "tags": ["auth"], "parameters": [ { "name": "list", @@ -4116,9 +3788,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -4163,9 +3833,7 @@ "get": { "summary": "Manage Certificate Revocation Lists checked during authentication.", "operationId": "cert-read-crl", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "200": { "description": "OK" @@ -4175,9 +3843,7 @@ "post": { "summary": "Manage Certificate Revocation Lists checked during authentication.", "operationId": "cert-write-crl", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -4197,9 +3863,7 @@ "delete": { "summary": "Manage Certificate Revocation Lists checked during authentication.", "operationId": "cert-delete-crl", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "204": { "description": "empty body" @@ -4223,9 +3887,7 @@ "x-vault-unauthenticated": true, "post": { "operationId": "cert-login", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -4259,9 +3921,7 @@ ], "get": { "operationId": "cloud-foundry-read-configuration", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "200": { "description": "OK" @@ -4270,9 +3930,7 @@ }, "post": { "operationId": "cloud-foundry-configure", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -4291,9 +3949,7 @@ }, "delete": { "operationId": "cloud-foundry-delete-configuration", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "204": { "description": "empty body" @@ -4318,9 +3974,7 @@ "x-vault-unauthenticated": true, "post": { "operationId": "cloud-foundry-login", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -4354,9 +4008,7 @@ ], "get": { "operationId": "cloud-foundry-list-roles", - "tags": [ - "auth" - ], + "tags": ["auth"], "parameters": [ { "name": "list", @@ -4364,9 +4016,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -4411,9 +4061,7 @@ "x-vault-createSupported": true, "get": { "operationId": "cloud-foundry-read-role", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "200": { "description": "OK" @@ -4422,9 +4070,7 @@ }, "post": { "operationId": "cloud-foundry-write-role", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -4443,9 +4089,7 @@ }, "delete": { "operationId": "cloud-foundry-delete-role", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "204": { "description": "empty body" @@ -4469,9 +4113,7 @@ ], "get": { "operationId": "google-cloud-read-auth-configuration", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "200": { "description": "OK" @@ -4480,9 +4122,7 @@ }, "post": { "operationId": "google-cloud-configure-auth", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -4517,9 +4157,7 @@ "x-vault-unauthenticated": true, "post": { "operationId": "google-cloud-login", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -4554,9 +4192,7 @@ "get": { "summary": "Lists all the roles that are registered with Vault.", "operationId": "google-cloud-list-roles", - "tags": [ - "auth" - ], + "tags": ["auth"], "parameters": [ { "name": "list", @@ -4564,9 +4200,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -4612,9 +4246,7 @@ "get": { "summary": "Create a GCP role with associated policies and required attributes.", "operationId": "google-cloud-read-role", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "200": { "description": "OK" @@ -4624,9 +4256,7 @@ "post": { "summary": "Create a GCP role with associated policies and required attributes.", "operationId": "google-cloud-write-role", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -4646,9 +4276,7 @@ "delete": { "summary": "Create a GCP role with associated policies and required attributes.", "operationId": "google-cloud-delete-role", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "204": { "description": "empty body" @@ -4682,9 +4310,7 @@ "post": { "summary": "Add or remove labels for an existing 'gce' role", "operationId": "google-cloud-edit-labels-for-role", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -4728,9 +4354,7 @@ "post": { "summary": "Add or remove service accounts for an existing `iam` role", "operationId": "google-cloud-edit-service-accounts-for-role", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -4765,9 +4389,7 @@ "get": { "summary": "Lists all the roles that are registered with Vault.", "operationId": "google-cloud-list-roles2", - "tags": [ - "auth" - ], + "tags": ["auth"], "parameters": [ { "name": "list", @@ -4775,9 +4397,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -4811,9 +4431,7 @@ ], "get": { "operationId": "github-read-configuration", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "200": { "description": "OK" @@ -4822,9 +4440,7 @@ }, "post": { "operationId": "github-configure", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -4858,9 +4474,7 @@ "x-vault-unauthenticated": true, "post": { "operationId": "github-login", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -4895,9 +4509,7 @@ "get": { "summary": "Read mappings for teams", "operationId": "github-list-teams2", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "200": { "description": "OK" @@ -4922,9 +4534,7 @@ "get": { "summary": "Read mappings for teams", "operationId": "github-list-teams", - "tags": [ - "auth" - ], + "tags": ["auth"], "parameters": [ { "name": "list", @@ -4932,9 +4542,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -4980,9 +4588,7 @@ "get": { "summary": "Read/write/delete a single teams mapping", "operationId": "github-read-team-mapping", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "200": { "description": "OK" @@ -4992,9 +4598,7 @@ "post": { "summary": "Read/write/delete a single teams mapping", "operationId": "github-write-team-mapping", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -5014,9 +4618,7 @@ "delete": { "summary": "Read/write/delete a single teams mapping", "operationId": "github-delete-team-mapping", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "204": { "description": "empty body" @@ -5041,9 +4643,7 @@ "get": { "summary": "Read mappings for users", "operationId": "github-list-users2", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "200": { "description": "OK" @@ -5068,9 +4668,7 @@ "get": { "summary": "Read mappings for users", "operationId": "github-list-users", - "tags": [ - "auth" - ], + "tags": ["auth"], "parameters": [ { "name": "list", @@ -5078,9 +4676,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -5126,9 +4722,7 @@ "get": { "summary": "Read/write/delete a single users mapping", "operationId": "github-read-user-mapping", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "200": { "description": "OK" @@ -5138,9 +4732,7 @@ "post": { "summary": "Read/write/delete a single users mapping", "operationId": "github-write-user-mapping", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -5160,9 +4752,7 @@ "delete": { "summary": "Read/write/delete a single users mapping", "operationId": "github-delete-user-mapping", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "204": { "description": "empty body" @@ -5187,9 +4777,7 @@ "get": { "summary": "Read the current JWT authentication backend configuration.", "operationId": "jwt-read-configuration", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "200": { "description": "OK" @@ -5200,9 +4788,7 @@ "summary": "Configure the JWT authentication backend.", "description": "The JWT authentication backend validates JWTs (or OIDC) using the configured\ncredentials. If using OIDC Discovery, the URL must be provided, along\nwith (optionally) the CA cert to use for the connection. If performing JWT\nvalidation locally, a set of public keys must be provided.", "operationId": "jwt-configure", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -5238,9 +4824,7 @@ "post": { "summary": "Authenticates to Vault using a JWT (or OIDC) token.", "operationId": "jwt-login", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -5275,9 +4859,7 @@ "post": { "summary": "Request an authorization URL to start an OIDC login flow.", "operationId": "jwt-oidc-request-authorization-url", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -5312,9 +4894,7 @@ "get": { "summary": "Callback endpoint to complete an OIDC login.", "operationId": "jwt-oidc-callback", - "tags": [ - "auth" - ], + "tags": ["auth"], "parameters": [ { "name": "client_nonce", @@ -5347,9 +4927,7 @@ "post": { "summary": "Callback endpoint to handle form_posts.", "operationId": "jwt-oidc-callback-form-post", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -5385,9 +4963,7 @@ "summary": "Lists all the roles registered with the backend.", "description": "The list will contain the names of the roles.", "operationId": "jwt-list-roles", - "tags": [ - "auth" - ], + "tags": ["auth"], "parameters": [ { "name": "list", @@ -5395,9 +4971,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -5443,9 +5017,7 @@ "get": { "summary": "Read an existing role.", "operationId": "jwt-read-role", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "200": { "description": "OK" @@ -5456,9 +5028,7 @@ "summary": "Register an role with the backend.", "description": "A role is required to authenticate with this backend. The role binds\n\t\tJWT token information with token policies and settings.\n\t\tThe bindings, token polices and token settings can all be configured\n\t\tusing this endpoint", "operationId": "jwt-write-role", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -5478,9 +5048,7 @@ "delete": { "summary": "Delete an existing role.", "operationId": "jwt-delete-role", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "204": { "description": "empty body" @@ -5504,9 +5072,7 @@ ], "get": { "operationId": "kerberos-read-configuration", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "200": { "description": "OK" @@ -5515,9 +5081,7 @@ }, "post": { "operationId": "kerberos-configure", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -5551,9 +5115,7 @@ ], "get": { "operationId": "kerberos-read-ldap-configuration", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "200": { "description": "OK" @@ -5562,9 +5124,7 @@ }, "post": { "operationId": "kerberos-configure-ldap", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -5598,9 +5158,7 @@ ], "get": { "operationId": "kerberos-list-groups", - "tags": [ - "auth" - ], + "tags": ["auth"], "parameters": [ { "name": "list", @@ -5608,9 +5166,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -5654,9 +5210,7 @@ ], "get": { "operationId": "kerberos-read-group", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "200": { "description": "OK" @@ -5665,9 +5219,7 @@ }, "post": { "operationId": "kerberos-write-group", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -5686,9 +5238,7 @@ }, "delete": { "operationId": "kerberos-delete-group", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "204": { "description": "empty body" @@ -5712,9 +5262,7 @@ "x-vault-unauthenticated": true, "get": { "operationId": "kerberos-login2", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "200": { "description": "OK" @@ -5723,9 +5271,7 @@ }, "post": { "operationId": "kerberos-login", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -5759,9 +5305,7 @@ ], "get": { "operationId": "kubernetes-read-auth-configuration", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "200": { "description": "OK" @@ -5770,9 +5314,7 @@ }, "post": { "operationId": "kubernetes-configure-auth", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -5808,9 +5350,7 @@ "post": { "summary": "Authenticates Kubernetes service accounts with Vault.", "operationId": "kubernetes-login", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -5849,9 +5389,7 @@ "get": { "summary": "Lists all the roles registered with the backend.", "operationId": "kubernetes-list-auth-roles", - "tags": [ - "auth" - ], + "tags": ["auth"], "parameters": [ { "name": "list", @@ -5859,9 +5397,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -5911,9 +5447,7 @@ "get": { "summary": "Register an role with the backend.", "operationId": "kubernetes-read-auth-role", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "200": { "description": "OK" @@ -5923,9 +5457,7 @@ "post": { "summary": "Register an role with the backend.", "operationId": "kubernetes-write-auth-role", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -5945,9 +5477,7 @@ "delete": { "summary": "Register an role with the backend.", "operationId": "kubernetes-delete-auth-role", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "204": { "description": "empty body" @@ -5974,9 +5504,7 @@ }, "get": { "operationId": "ldap-read-auth-configuration", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "200": { "description": "OK" @@ -5985,9 +5513,7 @@ }, "post": { "operationId": "ldap-configure-auth", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -6026,9 +5552,7 @@ "get": { "summary": "Manage additional groups for users allowed to authenticate.", "operationId": "ldap-list-groups", - "tags": [ - "auth" - ], + "tags": ["auth"], "parameters": [ { "name": "list", @@ -6036,9 +5560,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -6087,9 +5609,7 @@ "get": { "summary": "Manage additional groups for users allowed to authenticate.", "operationId": "ldap-read-group", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "200": { "description": "OK" @@ -6099,9 +5619,7 @@ "post": { "summary": "Manage additional groups for users allowed to authenticate.", "operationId": "ldap-write-group", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -6121,9 +5639,7 @@ "delete": { "summary": "Manage additional groups for users allowed to authenticate.", "operationId": "ldap-delete-group", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "204": { "description": "empty body" @@ -6158,9 +5674,7 @@ "post": { "summary": "Log in with a username and password.", "operationId": "ldap-login", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -6199,9 +5713,7 @@ "get": { "summary": "Manage users allowed to authenticate.", "operationId": "ldap-list-users", - "tags": [ - "auth" - ], + "tags": ["auth"], "parameters": [ { "name": "list", @@ -6209,9 +5721,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -6260,9 +5770,7 @@ "get": { "summary": "Manage users allowed to authenticate.", "operationId": "ldap-read-user", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "200": { "description": "OK" @@ -6272,9 +5780,7 @@ "post": { "summary": "Manage users allowed to authenticate.", "operationId": "ldap-write-user", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -6294,9 +5800,7 @@ "delete": { "summary": "Manage users allowed to authenticate.", "operationId": "ldap-delete-user", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "204": { "description": "empty body" @@ -6321,9 +5825,7 @@ "x-vault-createSupported": true, "get": { "operationId": "oci-read-configuration", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "200": { "description": "OK" @@ -6332,9 +5834,7 @@ }, "post": { "operationId": "oci-configure", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -6353,9 +5853,7 @@ }, "delete": { "operationId": "oci-delete-configuration", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "204": { "description": "empty body" @@ -6405,9 +5903,7 @@ "post": { "summary": "Authenticates to Vault using OCI credentials", "operationId": "oci-login", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -6442,9 +5938,7 @@ "get": { "summary": "Lists all the roles that are registered with Vault.", "operationId": "oci-list-roles", - "tags": [ - "auth" - ], + "tags": ["auth"], "parameters": [ { "name": "list", @@ -6452,9 +5946,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -6500,9 +5992,7 @@ "get": { "summary": "Create a role and associate policies to it.", "operationId": "oci-read-role", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "200": { "description": "OK" @@ -6512,9 +6002,7 @@ "post": { "summary": "Create a role and associate policies to it.", "operationId": "oci-write-role", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -6534,9 +6022,7 @@ "delete": { "summary": "Create a role and associate policies to it.", "operationId": "oci-delete-role", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "204": { "description": "empty body" @@ -6564,9 +6050,7 @@ }, "get": { "operationId": "okta-read-configuration", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "200": { "description": "OK" @@ -6575,9 +6059,7 @@ }, "post": { "operationId": "okta-configure", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -6616,9 +6098,7 @@ "get": { "summary": "Manage users allowed to authenticate.", "operationId": "okta-list-groups", - "tags": [ - "auth" - ], + "tags": ["auth"], "parameters": [ { "name": "list", @@ -6626,9 +6106,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -6677,9 +6155,7 @@ "get": { "summary": "Manage users allowed to authenticate.", "operationId": "okta-read-group", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "200": { "description": "OK" @@ -6689,9 +6165,7 @@ "post": { "summary": "Manage users allowed to authenticate.", "operationId": "okta-write-group", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -6711,9 +6185,7 @@ "delete": { "summary": "Manage users allowed to authenticate.", "operationId": "okta-delete-group", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "204": { "description": "empty body" @@ -6748,9 +6220,7 @@ "post": { "summary": "Log in with a username and password.", "operationId": "okta-login", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -6789,9 +6259,7 @@ "get": { "summary": "Manage additional groups for users allowed to authenticate.", "operationId": "okta-list-users", - "tags": [ - "auth" - ], + "tags": ["auth"], "parameters": [ { "name": "list", @@ -6799,9 +6267,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -6850,9 +6316,7 @@ "get": { "summary": "Manage additional groups for users allowed to authenticate.", "operationId": "okta-read-user", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "200": { "description": "OK" @@ -6862,9 +6326,7 @@ "post": { "summary": "Manage additional groups for users allowed to authenticate.", "operationId": "okta-write-user", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -6884,9 +6346,7 @@ "delete": { "summary": "Manage additional groups for users allowed to authenticate.", "operationId": "okta-delete-user", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "204": { "description": "empty body" @@ -6919,9 +6379,7 @@ "x-vault-unauthenticated": true, "get": { "operationId": "okta-verify", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "200": { "description": "OK" @@ -6949,9 +6407,7 @@ }, "get": { "operationId": "radius-read-configuration", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "200": { "description": "OK" @@ -6960,9 +6416,7 @@ }, "post": { "operationId": "radius-configure", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -6998,9 +6452,7 @@ "post": { "summary": "Log in with a username and password.", "operationId": "radius-login", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -7045,9 +6497,7 @@ "post": { "summary": "Log in with a username and password.", "operationId": "radius-login-with-username", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -7086,9 +6536,7 @@ "get": { "summary": "Manage users allowed to authenticate.", "operationId": "radius-list-users", - "tags": [ - "auth" - ], + "tags": ["auth"], "parameters": [ { "name": "list", @@ -7096,9 +6544,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -7148,9 +6594,7 @@ "get": { "summary": "Manage users allowed to authenticate.", "operationId": "radius-read-user", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "200": { "description": "OK" @@ -7160,9 +6604,7 @@ "post": { "summary": "Manage users allowed to authenticate.", "operationId": "radius-write-user", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -7182,9 +6624,7 @@ "delete": { "summary": "Manage users allowed to authenticate.", "operationId": "radius-delete-user", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "204": { "description": "empty body" @@ -7219,9 +6659,7 @@ "post": { "summary": "Log in with a username and password.", "operationId": "userpass-login", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -7260,9 +6698,7 @@ "get": { "summary": "Manage users allowed to authenticate.", "operationId": "userpass-list-users", - "tags": [ - "auth" - ], + "tags": ["auth"], "parameters": [ { "name": "list", @@ -7270,9 +6706,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -7322,9 +6756,7 @@ "get": { "summary": "Manage users allowed to authenticate.", "operationId": "userpass-read-user", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "200": { "description": "OK" @@ -7334,9 +6766,7 @@ "post": { "summary": "Manage users allowed to authenticate.", "operationId": "userpass-write-user", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -7356,9 +6786,7 @@ "delete": { "summary": "Manage users allowed to authenticate.", "operationId": "userpass-delete-user", - "tags": [ - "auth" - ], + "tags": ["auth"], "responses": { "204": { "description": "empty body" @@ -7392,9 +6820,7 @@ "post": { "summary": "Reset user's password.", "operationId": "userpass-reset-password", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -7438,9 +6864,7 @@ "post": { "summary": "Update the policies associated with the username.", "operationId": "userpass-update-policies", - "tags": [ - "auth" - ], + "tags": ["auth"], "requestBody": { "required": true, "content": { @@ -7475,9 +6899,7 @@ "get": { "summary": "Retrieve the secret at the specified location.", "operationId": "cubbyhole-read", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -7487,9 +6909,7 @@ "post": { "summary": "Store a secret at the specified location.", "operationId": "cubbyhole-write", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -7510,9 +6930,7 @@ "delete": { "summary": "Deletes the secret at the specified location.", "operationId": "cubbyhole-delete", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "204": { "description": "empty body" @@ -7537,9 +6955,7 @@ "summary": "List secret entries at the specified location.", "description": "Folders are suffixed with /. The input must be a folder; list on a file will not return a value. The values themselves are not accessible via this command.", "operationId": "cubbyhole-list", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "parameters": [ { "name": "list", @@ -7547,9 +6963,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -7573,9 +6987,7 @@ "post": { "summary": "Create a new alias.", "operationId": "alias-create", - "tags": [ - "identity" - ], + "tags": ["identity"], "requestBody": { "required": true, "content": { @@ -7598,9 +7010,7 @@ "get": { "summary": "List all the alias IDs.", "operationId": "alias-list-by-id", - "tags": [ - "identity" - ], + "tags": ["identity"], "parameters": [ { "name": "list", @@ -7608,9 +7018,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -7644,9 +7052,7 @@ ], "get": { "operationId": "alias-read-by-id", - "tags": [ - "identity" - ], + "tags": ["identity"], "responses": { "200": { "description": "OK" @@ -7655,9 +7061,7 @@ }, "post": { "operationId": "alias-update-by-id", - "tags": [ - "identity" - ], + "tags": ["identity"], "requestBody": { "required": true, "content": { @@ -7676,9 +7080,7 @@ }, "delete": { "operationId": "alias-delete-by-id", - "tags": [ - "identity" - ], + "tags": ["identity"], "responses": { "204": { "description": "empty body" @@ -7691,9 +7093,7 @@ "post": { "summary": "Create a new entity", "operationId": "entity-create", - "tags": [ - "identity" - ], + "tags": ["identity"], "requestBody": { "required": true, "content": { @@ -7716,9 +7116,7 @@ "post": { "summary": "Create a new alias.", "operationId": "entity-create-alias", - "tags": [ - "identity" - ], + "tags": ["identity"], "requestBody": { "required": true, "content": { @@ -7741,9 +7139,7 @@ "get": { "summary": "List all the alias IDs.", "operationId": "entity-list-aliases-by-id", - "tags": [ - "identity" - ], + "tags": ["identity"], "parameters": [ { "name": "list", @@ -7751,9 +7147,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -7787,9 +7181,7 @@ ], "get": { "operationId": "entity-read-alias-by-id", - "tags": [ - "identity" - ], + "tags": ["identity"], "responses": { "200": { "description": "OK" @@ -7798,9 +7190,7 @@ }, "post": { "operationId": "entity-update-alias-by-id", - "tags": [ - "identity" - ], + "tags": ["identity"], "requestBody": { "required": true, "content": { @@ -7819,9 +7209,7 @@ }, "delete": { "operationId": "entity-delete-alias-by-id", - "tags": [ - "identity" - ], + "tags": ["identity"], "responses": { "204": { "description": "empty body" @@ -7834,9 +7222,7 @@ "post": { "summary": "Delete all of the entities provided", "operationId": "entity-batch-delete", - "tags": [ - "identity" - ], + "tags": ["identity"], "requestBody": { "required": true, "content": { @@ -7859,9 +7245,7 @@ "get": { "summary": "List all the entity IDs", "operationId": "entity-list-by-id", - "tags": [ - "identity" - ], + "tags": ["identity"], "parameters": [ { "name": "list", @@ -7869,9 +7253,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -7905,9 +7287,7 @@ ], "get": { "operationId": "entity-read-by-id", - "tags": [ - "identity" - ], + "tags": ["identity"], "responses": { "200": { "description": "OK" @@ -7916,9 +7296,7 @@ }, "post": { "operationId": "entity-update-by-id", - "tags": [ - "identity" - ], + "tags": ["identity"], "requestBody": { "required": true, "content": { @@ -7937,9 +7315,7 @@ }, "delete": { "operationId": "entity-delete-by-id", - "tags": [ - "identity" - ], + "tags": ["identity"], "responses": { "204": { "description": "empty body" @@ -7952,9 +7328,7 @@ "post": { "summary": "Merge two or more entities together", "operationId": "entity-merge", - "tags": [ - "identity" - ], + "tags": ["identity"], "requestBody": { "required": true, "content": { @@ -7977,9 +7351,7 @@ "get": { "summary": "List all the entity names", "operationId": "entity-list-by-name", - "tags": [ - "identity" - ], + "tags": ["identity"], "parameters": [ { "name": "list", @@ -7987,9 +7359,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -8023,9 +7393,7 @@ ], "get": { "operationId": "entity-read-by-name", - "tags": [ - "identity" - ], + "tags": ["identity"], "responses": { "200": { "description": "OK" @@ -8034,9 +7402,7 @@ }, "post": { "operationId": "entity-update-by-name", - "tags": [ - "identity" - ], + "tags": ["identity"], "requestBody": { "required": true, "content": { @@ -8055,9 +7421,7 @@ }, "delete": { "operationId": "entity-delete-by-name", - "tags": [ - "identity" - ], + "tags": ["identity"], "responses": { "204": { "description": "empty body" @@ -8069,9 +7433,7 @@ "description": "Create a new group.", "post": { "operationId": "group-create", - "tags": [ - "identity" - ], + "tags": ["identity"], "requestBody": { "required": true, "content": { @@ -8094,9 +7456,7 @@ "post": { "summary": "Creates a new group alias, or updates an existing one.", "operationId": "group-create-alias", - "tags": [ - "identity" - ], + "tags": ["identity"], "requestBody": { "required": true, "content": { @@ -8119,9 +7479,7 @@ "get": { "summary": "List all the group alias IDs.", "operationId": "group-list-aliases-by-id", - "tags": [ - "identity" - ], + "tags": ["identity"], "parameters": [ { "name": "list", @@ -8129,9 +7487,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -8164,9 +7520,7 @@ ], "get": { "operationId": "group-read-alias-by-id", - "tags": [ - "identity" - ], + "tags": ["identity"], "responses": { "200": { "description": "OK" @@ -8175,9 +7529,7 @@ }, "post": { "operationId": "group-update-alias-by-id", - "tags": [ - "identity" - ], + "tags": ["identity"], "requestBody": { "required": true, "content": { @@ -8196,9 +7548,7 @@ }, "delete": { "operationId": "group-delete-alias-by-id", - "tags": [ - "identity" - ], + "tags": ["identity"], "responses": { "204": { "description": "empty body" @@ -8211,9 +7561,7 @@ "get": { "summary": "List all the group IDs.", "operationId": "group-list-by-id", - "tags": [ - "identity" - ], + "tags": ["identity"], "parameters": [ { "name": "list", @@ -8221,9 +7569,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -8257,9 +7603,7 @@ ], "get": { "operationId": "group-read-by-id", - "tags": [ - "identity" - ], + "tags": ["identity"], "responses": { "200": { "description": "OK" @@ -8268,9 +7612,7 @@ }, "post": { "operationId": "group-update-by-id", - "tags": [ - "identity" - ], + "tags": ["identity"], "requestBody": { "required": true, "content": { @@ -8289,9 +7631,7 @@ }, "delete": { "operationId": "group-delete-by-id", - "tags": [ - "identity" - ], + "tags": ["identity"], "responses": { "204": { "description": "empty body" @@ -8302,9 +7642,7 @@ "/identity/group/name/": { "get": { "operationId": "group-list-by-name", - "tags": [ - "identity" - ], + "tags": ["identity"], "parameters": [ { "name": "list", @@ -8312,9 +7650,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -8347,9 +7683,7 @@ ], "get": { "operationId": "group-read-by-name", - "tags": [ - "identity" - ], + "tags": ["identity"], "responses": { "200": { "description": "OK" @@ -8358,9 +7692,7 @@ }, "post": { "operationId": "group-update-by-name", - "tags": [ - "identity" - ], + "tags": ["identity"], "requestBody": { "required": true, "content": { @@ -8379,9 +7711,7 @@ }, "delete": { "operationId": "group-delete-by-name", - "tags": [ - "identity" - ], + "tags": ["identity"], "responses": { "204": { "description": "empty body" @@ -8394,9 +7724,7 @@ "post": { "summary": "Query entities based on various properties.", "operationId": "entity-look-up", - "tags": [ - "identity" - ], + "tags": ["identity"], "requestBody": { "required": true, "content": { @@ -8419,9 +7747,7 @@ "post": { "summary": "Query groups based on various properties.", "operationId": "group-look-up", - "tags": [ - "identity" - ], + "tags": ["identity"], "requestBody": { "required": true, "content": { @@ -8443,9 +7769,7 @@ "get": { "summary": "List login enforcements", "operationId": "mfa-list-login-enforcements", - "tags": [ - "identity" - ], + "tags": ["identity"], "parameters": [ { "name": "list", @@ -8453,9 +7777,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -8489,9 +7811,7 @@ "get": { "summary": "Read the current login enforcement", "operationId": "mfa-read-login-enforcement", - "tags": [ - "identity" - ], + "tags": ["identity"], "responses": { "200": { "description": "OK" @@ -8501,9 +7821,7 @@ "post": { "summary": "Create or update a login enforcement", "operationId": "mfa-write-login-enforcement", - "tags": [ - "identity" - ], + "tags": ["identity"], "requestBody": { "required": true, "content": { @@ -8523,9 +7841,7 @@ "delete": { "summary": "Delete a login enforcement", "operationId": "mfa-delete-login-enforcement", - "tags": [ - "identity" - ], + "tags": ["identity"], "responses": { "204": { "description": "empty body" @@ -8537,9 +7853,7 @@ "get": { "summary": "List MFA method configurations for all MFA methods", "operationId": "mfa-list-methods", - "tags": [ - "identity" - ], + "tags": ["identity"], "parameters": [ { "name": "list", @@ -8547,9 +7861,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -8572,9 +7884,7 @@ "post": { "summary": "Create the given MFA method", "operationId": "mfa-create-duo-method", - "tags": [ - "identity" - ], + "tags": ["identity"], "requestBody": { "required": true, "content": { @@ -8596,9 +7906,7 @@ "get": { "summary": "List MFA method configurations for the given MFA method", "operationId": "mfa-list-duo-methods", - "tags": [ - "identity" - ], + "tags": ["identity"], "parameters": [ { "name": "list", @@ -8606,9 +7914,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -8642,9 +7948,7 @@ "get": { "summary": "Read the current configuration for the given MFA method", "operationId": "mfa-read-duo-method", - "tags": [ - "identity" - ], + "tags": ["identity"], "responses": { "200": { "description": "OK" @@ -8654,9 +7958,7 @@ "post": { "summary": "Update the configuration for the given MFA method", "operationId": "mfa-update-duo-method", - "tags": [ - "identity" - ], + "tags": ["identity"], "requestBody": { "required": true, "content": { @@ -8676,9 +7978,7 @@ "delete": { "summary": "Delete the given MFA method", "operationId": "mfa-delete-duo-method", - "tags": [ - "identity" - ], + "tags": ["identity"], "responses": { "204": { "description": "empty body" @@ -8690,9 +7990,7 @@ "post": { "summary": "Create the given MFA method", "operationId": "mfa-create-okta-method", - "tags": [ - "identity" - ], + "tags": ["identity"], "requestBody": { "required": true, "content": { @@ -8714,9 +8012,7 @@ "get": { "summary": "List MFA method configurations for the given MFA method", "operationId": "mfa-list-okta-methods", - "tags": [ - "identity" - ], + "tags": ["identity"], "parameters": [ { "name": "list", @@ -8724,9 +8020,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -8760,9 +8054,7 @@ "get": { "summary": "Read the current configuration for the given MFA method", "operationId": "mfa-read-okta-method", - "tags": [ - "identity" - ], + "tags": ["identity"], "responses": { "200": { "description": "OK" @@ -8772,9 +8064,7 @@ "post": { "summary": "Update the configuration for the given MFA method", "operationId": "mfa-update-okta-method", - "tags": [ - "identity" - ], + "tags": ["identity"], "requestBody": { "required": true, "content": { @@ -8794,9 +8084,7 @@ "delete": { "summary": "Delete the given MFA method", "operationId": "mfa-delete-okta-method", - "tags": [ - "identity" - ], + "tags": ["identity"], "responses": { "204": { "description": "empty body" @@ -8808,9 +8096,7 @@ "post": { "summary": "Create the given MFA method", "operationId": "mfa-create-ping-id-method", - "tags": [ - "identity" - ], + "tags": ["identity"], "requestBody": { "required": true, "content": { @@ -8832,9 +8118,7 @@ "get": { "summary": "List MFA method configurations for the given MFA method", "operationId": "mfa-list-ping-id-methods", - "tags": [ - "identity" - ], + "tags": ["identity"], "parameters": [ { "name": "list", @@ -8842,9 +8126,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -8878,9 +8160,7 @@ "get": { "summary": "Read the current configuration for the given MFA method", "operationId": "mfa-read-ping-id-method", - "tags": [ - "identity" - ], + "tags": ["identity"], "responses": { "200": { "description": "OK" @@ -8890,9 +8170,7 @@ "post": { "summary": "Update the configuration for the given MFA method", "operationId": "mfa-update-ping-id-method", - "tags": [ - "identity" - ], + "tags": ["identity"], "requestBody": { "required": true, "content": { @@ -8912,9 +8190,7 @@ "delete": { "summary": "Delete the given MFA method", "operationId": "mfa-delete-ping-id-method", - "tags": [ - "identity" - ], + "tags": ["identity"], "responses": { "204": { "description": "empty body" @@ -8926,9 +8202,7 @@ "post": { "summary": "Create the given MFA method", "operationId": "mfa-create-totp-method", - "tags": [ - "identity" - ], + "tags": ["identity"], "requestBody": { "required": true, "content": { @@ -8950,9 +8224,7 @@ "get": { "summary": "List MFA method configurations for the given MFA method", "operationId": "mfa-list-totp-methods", - "tags": [ - "identity" - ], + "tags": ["identity"], "parameters": [ { "name": "list", @@ -8960,9 +8232,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -8985,9 +8255,7 @@ "post": { "summary": "Destroys a TOTP secret for the given MFA method ID on the given entity", "operationId": "mfa-admin-destroy-totp-secret", - "tags": [ - "identity" - ], + "tags": ["identity"], "requestBody": { "required": true, "content": { @@ -9009,9 +8277,7 @@ "post": { "summary": "Update or create TOTP secret for the given method ID on the given entity.", "operationId": "mfa-admin-generate-totp-secret", - "tags": [ - "identity" - ], + "tags": ["identity"], "requestBody": { "required": true, "content": { @@ -9033,9 +8299,7 @@ "post": { "summary": "Update or create TOTP secret for the given method ID on the given entity.", "operationId": "mfa-generate-totp-secret", - "tags": [ - "identity" - ], + "tags": ["identity"], "requestBody": { "required": true, "content": { @@ -9068,9 +8332,7 @@ "get": { "summary": "Read the current configuration for the given MFA method", "operationId": "mfa-read-totp-method", - "tags": [ - "identity" - ], + "tags": ["identity"], "responses": { "200": { "description": "OK" @@ -9080,9 +8342,7 @@ "post": { "summary": "Update the configuration for the given MFA method", "operationId": "mfa-update-totp-method", - "tags": [ - "identity" - ], + "tags": ["identity"], "requestBody": { "required": true, "content": { @@ -9102,9 +8362,7 @@ "delete": { "summary": "Delete the given MFA method", "operationId": "mfa-delete-totp-method", - "tags": [ - "identity" - ], + "tags": ["identity"], "responses": { "204": { "description": "empty body" @@ -9127,9 +8385,7 @@ "get": { "summary": "Read the current configuration for the given ID regardless of the MFA method type", "operationId": "mfa-read-method", - "tags": [ - "identity" - ], + "tags": ["identity"], "responses": { "200": { "description": "OK" @@ -9143,9 +8399,7 @@ "get": { "summary": "Retrieve public keys", "operationId": "oidc-read-public-keys", - "tags": [ - "identity" - ], + "tags": ["identity"], "responses": { "200": { "description": "OK" @@ -9159,9 +8413,7 @@ "get": { "summary": "Query OIDC configurations", "operationId": "oidc-read-open-id-configuration", - "tags": [ - "identity" - ], + "tags": ["identity"], "responses": { "200": { "description": "OK" @@ -9173,9 +8425,7 @@ "description": "List OIDC assignments", "get": { "operationId": "oidc-list-assignments", - "tags": [ - "identity" - ], + "tags": ["identity"], "parameters": [ { "name": "list", @@ -9183,9 +8433,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -9220,9 +8468,7 @@ "x-vault-createSupported": true, "get": { "operationId": "oidc-read-assignment", - "tags": [ - "identity" - ], + "tags": ["identity"], "responses": { "200": { "description": "OK" @@ -9231,9 +8477,7 @@ }, "post": { "operationId": "oidc-write-assignment", - "tags": [ - "identity" - ], + "tags": ["identity"], "requestBody": { "required": true, "content": { @@ -9252,9 +8496,7 @@ }, "delete": { "operationId": "oidc-delete-assignment", - "tags": [ - "identity" - ], + "tags": ["identity"], "responses": { "204": { "description": "empty body" @@ -9266,9 +8508,7 @@ "description": "List OIDC clients", "get": { "operationId": "oidc-list-clients", - "tags": [ - "identity" - ], + "tags": ["identity"], "parameters": [ { "name": "list", @@ -9276,9 +8516,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -9313,9 +8551,7 @@ "x-vault-createSupported": true, "get": { "operationId": "oidc-read-client", - "tags": [ - "identity" - ], + "tags": ["identity"], "responses": { "200": { "description": "OK" @@ -9324,9 +8560,7 @@ }, "post": { "operationId": "oidc-write-client", - "tags": [ - "identity" - ], + "tags": ["identity"], "requestBody": { "required": true, "content": { @@ -9345,9 +8579,7 @@ }, "delete": { "operationId": "oidc-delete-client", - "tags": [ - "identity" - ], + "tags": ["identity"], "responses": { "204": { "description": "empty body" @@ -9359,9 +8591,7 @@ "description": "OIDC configuration", "get": { "operationId": "oidc-read-configuration", - "tags": [ - "identity" - ], + "tags": ["identity"], "responses": { "200": { "description": "OK" @@ -9370,9 +8600,7 @@ }, "post": { "operationId": "oidc-configure", - "tags": [ - "identity" - ], + "tags": ["identity"], "requestBody": { "required": true, "content": { @@ -9395,9 +8623,7 @@ "post": { "summary": "Verify the authenticity of an OIDC token", "operationId": "oidc-introspect", - "tags": [ - "identity" - ], + "tags": ["identity"], "requestBody": { "required": true, "content": { @@ -9420,9 +8646,7 @@ "get": { "summary": "List OIDC keys", "operationId": "oidc-list-keys", - "tags": [ - "identity" - ], + "tags": ["identity"], "parameters": [ { "name": "list", @@ -9430,9 +8654,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -9468,9 +8690,7 @@ "get": { "summary": "CRUD operations for OIDC keys.", "operationId": "oidc-read-key", - "tags": [ - "identity" - ], + "tags": ["identity"], "responses": { "200": { "description": "OK" @@ -9480,9 +8700,7 @@ "post": { "summary": "CRUD operations for OIDC keys.", "operationId": "oidc-write-key", - "tags": [ - "identity" - ], + "tags": ["identity"], "requestBody": { "required": true, "content": { @@ -9502,9 +8720,7 @@ "delete": { "summary": "CRUD operations for OIDC keys.", "operationId": "oidc-delete-key", - "tags": [ - "identity" - ], + "tags": ["identity"], "responses": { "204": { "description": "empty body" @@ -9528,9 +8744,7 @@ "post": { "summary": "Rotate a named OIDC key.", "operationId": "oidc-rotate-key", - "tags": [ - "identity" - ], + "tags": ["identity"], "requestBody": { "required": true, "content": { @@ -9552,9 +8766,7 @@ "description": "List OIDC providers", "get": { "operationId": "oidc-list-providers", - "tags": [ - "identity" - ], + "tags": ["identity"], "parameters": [ { "name": "allowed_client_id", @@ -9571,9 +8783,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -9608,9 +8818,7 @@ "x-vault-createSupported": true, "get": { "operationId": "oidc-read-provider", - "tags": [ - "identity" - ], + "tags": ["identity"], "responses": { "200": { "description": "OK" @@ -9619,9 +8827,7 @@ }, "post": { "operationId": "oidc-write-provider", - "tags": [ - "identity" - ], + "tags": ["identity"], "requestBody": { "required": true, "content": { @@ -9640,9 +8846,7 @@ }, "delete": { "operationId": "oidc-delete-provider", - "tags": [ - "identity" - ], + "tags": ["identity"], "responses": { "204": { "description": "empty body" @@ -9666,9 +8870,7 @@ "x-vault-unauthenticated": true, "get": { "operationId": "oidc-read-provider-public-keys", - "tags": [ - "identity" - ], + "tags": ["identity"], "responses": { "200": { "description": "OK" @@ -9692,9 +8894,7 @@ "x-vault-unauthenticated": true, "get": { "operationId": "oidc-read-provider-open-id-configuration", - "tags": [ - "identity" - ], + "tags": ["identity"], "responses": { "200": { "description": "OK" @@ -9717,9 +8917,7 @@ ], "get": { "operationId": "oidc-provider-authorize", - "tags": [ - "identity" - ], + "tags": ["identity"], "parameters": [ { "name": "client_id", @@ -9803,9 +9001,7 @@ }, "post": { "operationId": "oidc-provider-authorize-with-parameters", - "tags": [ - "identity" - ], + "tags": ["identity"], "requestBody": { "required": true, "content": { @@ -9839,9 +9035,7 @@ "x-vault-unauthenticated": true, "post": { "operationId": "oidc-provider-token", - "tags": [ - "identity" - ], + "tags": ["identity"], "requestBody": { "required": true, "content": { @@ -9874,9 +9068,7 @@ ], "get": { "operationId": "oidc-provider-user-info", - "tags": [ - "identity" - ], + "tags": ["identity"], "responses": { "200": { "description": "OK" @@ -9885,9 +9077,7 @@ }, "post": { "operationId": "oidc-provider-user-info2", - "tags": [ - "identity" - ], + "tags": ["identity"], "responses": { "200": { "description": "OK" @@ -9900,9 +9090,7 @@ "get": { "summary": "List configured OIDC roles", "operationId": "oidc-list-roles", - "tags": [ - "identity" - ], + "tags": ["identity"], "parameters": [ { "name": "list", @@ -9910,9 +9098,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -9948,9 +9134,7 @@ "get": { "summary": "CRUD operations on OIDC Roles", "operationId": "oidc-read-role", - "tags": [ - "identity" - ], + "tags": ["identity"], "responses": { "200": { "description": "OK" @@ -9960,9 +9144,7 @@ "post": { "summary": "CRUD operations on OIDC Roles", "operationId": "oidc-write-role", - "tags": [ - "identity" - ], + "tags": ["identity"], "requestBody": { "required": true, "content": { @@ -9982,9 +9164,7 @@ "delete": { "summary": "CRUD operations on OIDC Roles", "operationId": "oidc-delete-role", - "tags": [ - "identity" - ], + "tags": ["identity"], "responses": { "204": { "description": "empty body" @@ -9996,9 +9176,7 @@ "description": "List OIDC scopes", "get": { "operationId": "oidc-list-scopes", - "tags": [ - "identity" - ], + "tags": ["identity"], "parameters": [ { "name": "list", @@ -10006,9 +9184,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -10043,9 +9219,7 @@ "x-vault-createSupported": true, "get": { "operationId": "oidc-read-scope", - "tags": [ - "identity" - ], + "tags": ["identity"], "responses": { "200": { "description": "OK" @@ -10054,9 +9228,7 @@ }, "post": { "operationId": "oidc-write-scope", - "tags": [ - "identity" - ], + "tags": ["identity"], "requestBody": { "required": true, "content": { @@ -10075,9 +9247,7 @@ }, "delete": { "operationId": "oidc-delete-scope", - "tags": [ - "identity" - ], + "tags": ["identity"], "responses": { "204": { "description": "empty body" @@ -10101,9 +9271,7 @@ "get": { "summary": "Generate an OIDC token", "operationId": "oidc-generate-token", - "tags": [ - "identity" - ], + "tags": ["identity"], "responses": { "200": { "description": "OK" @@ -10116,9 +9284,7 @@ "post": { "summary": "Create a new alias.", "operationId": "persona-create", - "tags": [ - "identity" - ], + "tags": ["identity"], "requestBody": { "required": true, "content": { @@ -10141,9 +9307,7 @@ "get": { "summary": "List all the alias IDs.", "operationId": "persona-list-by-id", - "tags": [ - "identity" - ], + "tags": ["identity"], "parameters": [ { "name": "list", @@ -10151,9 +9315,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -10187,9 +9349,7 @@ ], "get": { "operationId": "persona-read-by-id", - "tags": [ - "identity" - ], + "tags": ["identity"], "responses": { "200": { "description": "OK" @@ -10198,9 +9358,7 @@ }, "post": { "operationId": "persona-update-by-id", - "tags": [ - "identity" - ], + "tags": ["identity"], "requestBody": { "required": true, "content": { @@ -10219,9 +9377,7 @@ }, "delete": { "operationId": "persona-delete-by-id", - "tags": [ - "identity" - ], + "tags": ["identity"], "responses": { "204": { "description": "empty body" @@ -10235,9 +9391,7 @@ "get": { "summary": "List the enabled audit devices.", "operationId": "auditing-list-enabled-devices", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -10260,9 +9414,7 @@ ], "post": { "operationId": "auditing-calculate-hash", - "tags": [ - "system" - ], + "tags": ["system"], "requestBody": { "required": true, "content": { @@ -10304,9 +9456,7 @@ "post": { "summary": "Enable a new audit device at the supplied path.", "operationId": "auditing-enable-device", - "tags": [ - "system" - ], + "tags": ["system"], "requestBody": { "required": true, "content": { @@ -10326,9 +9476,7 @@ "delete": { "summary": "Disable the audit device at the given path.", "operationId": "auditing-disable-device", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "204": { "description": "OK" @@ -10340,9 +9488,7 @@ "description": "List the currently enabled credential backends.", "get": { "operationId": "auth-list-enabled-methods", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -10367,9 +9513,7 @@ "get": { "summary": "Read the configuration of the auth engine at the given path.", "operationId": "auth-read-configuration", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK", @@ -10387,9 +9531,7 @@ "summary": "Enables a new auth method.", "description": "After enabling, the auth method can be accessed and configured via the auth path specified as part of the URL. This auth path will be nested under the auth prefix.\n\nFor example, enable the \"foo\" auth method will make it accessible at /auth/foo.", "operationId": "auth-enable-method", - "tags": [ - "system" - ], + "tags": ["system"], "requestBody": { "required": true, "content": { @@ -10409,9 +9551,7 @@ "delete": { "summary": "Disable the auth method at the given auth path", "operationId": "auth-disable-method", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "204": { "description": "OK" @@ -10437,9 +9577,7 @@ "summary": "Reads the given auth path's configuration.", "description": "This endpoint requires sudo capability on the final path, but the same functionality can be achieved without sudo via `sys/mounts/auth/[auth-path]/tune`.", "operationId": "auth-read-tuning-information", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK", @@ -10457,9 +9595,7 @@ "summary": "Tune configuration parameters for a given auth path.", "description": "This endpoint requires sudo capability on the final path, but the same functionality can be achieved without sudo via `sys/mounts/auth/[auth-path]/tune`.", "operationId": "auth-tune-configuration-parameters", - "tags": [ - "system" - ], + "tags": ["system"], "requestBody": { "required": true, "content": { @@ -10481,9 +9617,7 @@ "description": "Fetches the capabilities of the given token on the given path.", "post": { "operationId": "query-token-capabilities", - "tags": [ - "system" - ], + "tags": ["system"], "requestBody": { "required": true, "content": { @@ -10505,9 +9639,7 @@ "description": "Fetches the capabilities of the token associated with the given token, on the given path.", "post": { "operationId": "query-token-accessor-capabilities", - "tags": [ - "system" - ], + "tags": ["system"], "requestBody": { "required": true, "content": { @@ -10529,9 +9661,7 @@ "description": "Fetches the capabilities of the given token on the given path.", "post": { "operationId": "query-token-self-capabilities", - "tags": [ - "system" - ], + "tags": ["system"], "requestBody": { "required": true, "content": { @@ -10555,9 +9685,7 @@ "get": { "summary": "List the request headers that are configured to be audited.", "operationId": "auditing-list-request-headers", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK", @@ -10588,9 +9716,7 @@ "get": { "summary": "List the information for the given request header.", "operationId": "auditing-read-request-header-information", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -10600,9 +9726,7 @@ "post": { "summary": "Enable auditing of a header.", "operationId": "auditing-enable-request-header", - "tags": [ - "system" - ], + "tags": ["system"], "requestBody": { "required": true, "content": { @@ -10622,9 +9746,7 @@ "delete": { "summary": "Disable auditing of the given request header.", "operationId": "auditing-disable-request-header", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "204": { "description": "OK" @@ -10635,9 +9757,7 @@ "/sys/config/control-group": { "get": { "operationId": "enterprise-stub-read-config-control-group", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -10646,9 +9766,7 @@ }, "post": { "operationId": "enterprise-stub-write-config-control-group", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -10657,9 +9775,7 @@ }, "delete": { "operationId": "enterprise-stub-delete-config-control-group", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "204": { "description": "empty body" @@ -10673,9 +9789,7 @@ "get": { "summary": "Return the current CORS settings.", "operationId": "cors-read-configuration", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK", @@ -10692,9 +9806,7 @@ "post": { "summary": "Configure the CORS settings.", "operationId": "cors-configure", - "tags": [ - "system" - ], + "tags": ["system"], "requestBody": { "required": true, "content": { @@ -10714,9 +9826,7 @@ "delete": { "summary": "Remove any CORS settings.", "operationId": "cors-delete-configuration", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "204": { "description": "OK" @@ -10727,9 +9837,7 @@ "/sys/config/group-policy-application": { "get": { "operationId": "enterprise-stub-read-config-group-policy-application", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -10738,9 +9846,7 @@ }, "post": { "operationId": "enterprise-stub-write-config-group-policy-application", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -10762,9 +9868,7 @@ "post": { "summary": "Reload the given subsystem", "operationId": "reload-subsystem", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "204": { "description": "OK" @@ -10777,9 +9881,7 @@ "summary": "Return a sanitized version of the Vault server configuration.", "description": "The sanitized output strips configuration values in the storage, HA storage, and seals stanzas, which may contain sensitive values such as API tokens. It also removes any token or secret fields in other stanzas, such as the circonus_api_token from telemetry.", "operationId": "read-sanitized-configuration-state", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -10793,9 +9895,7 @@ "get": { "summary": "Return a list of configured UI headers.", "operationId": "ui-headers-list", - "tags": [ - "system" - ], + "tags": ["system"], "parameters": [ { "name": "list", @@ -10803,9 +9903,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -10841,9 +9939,7 @@ "get": { "summary": "Return the given UI header's configuration", "operationId": "ui-headers-read-configuration", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK", @@ -10860,9 +9956,7 @@ "post": { "summary": "Configure the values to be returned for the UI header.", "operationId": "ui-headers-configure", - "tags": [ - "system" - ], + "tags": ["system"], "requestBody": { "required": true, "content": { @@ -10882,9 +9976,7 @@ "delete": { "summary": "Remove a UI header.", "operationId": "ui-headers-delete-configuration", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "204": { "description": "OK" @@ -10895,9 +9987,7 @@ "/sys/control-group/authorize": { "post": { "operationId": "enterprise-stub-write-control-group-authorize", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -10908,9 +9998,7 @@ "/sys/control-group/request": { "post": { "operationId": "enterprise-stub-write-control-group-request", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -10923,9 +10011,7 @@ "post": { "summary": "Decodes the encoded token with the otp.", "operationId": "decode", - "tags": [ - "system" - ], + "tags": ["system"], "requestBody": { "required": true, "content": { @@ -10948,9 +10034,7 @@ "get": { "summary": "Returns the available and enabled experiments", "operationId": "list-experimental-features", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -10963,9 +10047,7 @@ "get": { "summary": "Read the configuration and progress of the current root generation attempt.", "operationId": "root-token-generation-read-progress2", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK", @@ -10983,9 +10065,7 @@ "summary": "Initializes a new root generation attempt.", "description": "Only a single root generation attempt can take place at a time. One (and only one) of otp or pgp_key are required.", "operationId": "root-token-generation-initialize-2", - "tags": [ - "system" - ], + "tags": ["system"], "requestBody": { "required": true, "content": { @@ -11012,9 +10092,7 @@ "delete": { "summary": "Cancels any in-progress root generation attempt.", "operationId": "root-token-generation-cancel-2", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "204": { "description": "OK" @@ -11028,9 +10106,7 @@ "get": { "summary": "Read the configuration and progress of the current root generation attempt.", "operationId": "root-token-generation-read-progress", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK", @@ -11048,9 +10124,7 @@ "summary": "Initializes a new root generation attempt.", "description": "Only a single root generation attempt can take place at a time. One (and only one) of otp or pgp_key are required.", "operationId": "root-token-generation-initialize", - "tags": [ - "system" - ], + "tags": ["system"], "requestBody": { "required": true, "content": { @@ -11077,9 +10151,7 @@ "delete": { "summary": "Cancels any in-progress root generation attempt.", "operationId": "root-token-generation-cancel", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "204": { "description": "OK" @@ -11094,9 +10166,7 @@ "summary": "Enter a single unseal key share to progress the root generation attempt.", "description": "If the threshold number of unseal key shares is reached, Vault will complete the root generation and issue the new token. Otherwise, this API must be called multiple times until that threshold is met. The attempt nonce must be provided with each call.", "operationId": "root-token-generation-update", - "tags": [ - "system" - ], + "tags": ["system"], "requestBody": { "required": true, "content": { @@ -11126,9 +10196,7 @@ "get": { "summary": "Check the HA status of a Vault cluster", "operationId": "ha-status", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK", @@ -11149,9 +10217,7 @@ "get": { "summary": "Returns the health status of Vault.", "operationId": "read-health-status", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "initialized, unsealed, and active" @@ -11177,9 +10243,7 @@ "summary": "Information about the host instance that this Vault server is running on.", "description": "Information about the host instance that this Vault server is running on.\n\t\tThe information that gets collected includes host hardware information, and CPU,\n\t\tdisk, and memory utilization", "operationId": "collect-host-information", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK", @@ -11199,9 +10263,7 @@ "summary": "reports in-flight requests", "description": "This path responds to the following HTTP methods.\n\t\tGET /\n\t\t\tReturns a map of in-flight requests.", "operationId": "collect-in-flight-request-information", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -11215,9 +10277,7 @@ "get": { "summary": "Returns the initialization status of Vault.", "operationId": "read-initialization-status", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -11228,9 +10288,7 @@ "summary": "Initialize a new Vault.", "description": "The Vault must not have been previously initialized. The recovery options, as well as the stored shares option, are only available when using Vault HSM.", "operationId": "initialize", - "tags": [ - "system" - ], + "tags": ["system"], "requestBody": { "required": true, "content": { @@ -11253,9 +10311,7 @@ "get": { "summary": "Report the client count metrics, for this namespace and all child namespaces.", "operationId": "internal-client-activity-report-counts", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -11268,9 +10324,7 @@ "get": { "summary": "Report the client count metrics, for this namespace and all child namespaces.", "operationId": "internal-client-activity-export", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -11283,9 +10337,7 @@ "get": { "summary": "Report the number of clients for this month, for this namespace and all child namespaces.", "operationId": "internal-client-activity-report-counts-this-month", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -11298,9 +10350,7 @@ "get": { "summary": "Read the client count tracking configuration.", "operationId": "internal-client-activity-read-configuration", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -11310,9 +10360,7 @@ "post": { "summary": "Enable or disable collection of client count, set retention period, or set default reporting period.", "operationId": "internal-client-activity-configure", - "tags": [ - "system" - ], + "tags": ["system"], "requestBody": { "required": true, "content": { @@ -11335,9 +10383,7 @@ "get": { "summary": "Backwards compatibility is not guaranteed for this API", "operationId": "internal-count-entities", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK", @@ -11357,9 +10403,7 @@ "get": { "summary": "Backwards compatibility is not guaranteed for this API", "operationId": "internal-count-requests", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -11373,9 +10417,7 @@ "get": { "summary": "Backwards compatibility is not guaranteed for this API", "operationId": "internal-count-tokens", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK", @@ -11407,9 +10449,7 @@ "get": { "summary": "Expose the route entry and mount entry tables present in the router", "operationId": "internal-inspect-router", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -11422,9 +10462,7 @@ "x-vault-unauthenticated": true, "get": { "operationId": "internal-generate-open-api-document", - "tags": [ - "system" - ], + "tags": ["system"], "parameters": [ { "name": "context", @@ -11452,9 +10490,7 @@ }, "post": { "operationId": "internal-generate-open-api-document-with-parameters", - "tags": [ - "system" - ], + "tags": ["system"], "requestBody": { "required": true, "content": { @@ -11477,9 +10513,7 @@ "get": { "summary": "Lists enabled feature flags.", "operationId": "internal-ui-list-enabled-feature-flags", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK", @@ -11500,9 +10534,7 @@ "get": { "summary": "Lists all enabled and visible auth and secrets mounts.", "operationId": "internal-ui-list-enabled-visible-mounts", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK", @@ -11534,9 +10566,7 @@ "get": { "summary": "Return information about the given mount.", "operationId": "internal-ui-read-mount-information", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK", @@ -11557,9 +10587,7 @@ "get": { "summary": "Backwards compatibility is not guaranteed for this API", "operationId": "internal-ui-list-namespaces", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK", @@ -11579,9 +10607,7 @@ "get": { "summary": "Backwards compatibility is not guaranteed for this API", "operationId": "internal-ui-read-resultant-acl", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK", @@ -11604,9 +10630,7 @@ "get": { "summary": "Provides information about the backend encryption key.", "operationId": "encryption-key-status", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -11620,9 +10644,7 @@ "get": { "summary": "Returns the high availability status and current leader instance of Vault.", "operationId": "leader-status", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK", @@ -11642,9 +10664,7 @@ "x-vault-sudo": true, "get": { "operationId": "leases-list", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK", @@ -11663,9 +10683,7 @@ "description": "Count of leases associated with this Vault cluster", "get": { "operationId": "leases-count", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK", @@ -11684,9 +10702,7 @@ "description": "View or list lease metadata.", "post": { "operationId": "leases-read-lease", - "tags": [ - "system" - ], + "tags": ["system"], "requestBody": { "required": true, "content": { @@ -11727,9 +10743,7 @@ "x-vault-sudo": true, "get": { "operationId": "leases-look-up", - "tags": [ - "system" - ], + "tags": ["system"], "parameters": [ { "name": "list", @@ -11737,9 +10751,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -11763,9 +10775,7 @@ "post": { "summary": "Renews a lease, requesting to extend the lease.", "operationId": "leases-renew-lease", - "tags": [ - "system" - ], + "tags": ["system"], "requestBody": { "required": true, "content": { @@ -11799,9 +10809,7 @@ "post": { "summary": "Renews a lease, requesting to extend the lease.", "operationId": "leases-renew-lease-with-id", - "tags": [ - "system" - ], + "tags": ["system"], "requestBody": { "required": true, "content": { @@ -11824,9 +10832,7 @@ "post": { "summary": "Revokes a lease immediately.", "operationId": "leases-revoke-lease", - "tags": [ - "system" - ], + "tags": ["system"], "requestBody": { "required": true, "content": { @@ -11862,9 +10868,7 @@ "summary": "Revokes all secrets or tokens generated under a given prefix immediately", "description": "Unlike `/sys/leases/revoke-prefix`, this path ignores backend errors encountered during revocation. This is potentially very dangerous and should only be used in specific emergency situations where errors in the backend or the connected backend service prevent normal revocation.\n\nBy ignoring these errors, Vault abdicates responsibility for ensuring that the issued credentials or secrets are properly revoked and/or cleaned up. Access to this endpoint should be tightly controlled.", "operationId": "leases-force-revoke-lease-with-prefix", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "204": { "description": "OK" @@ -11889,9 +10893,7 @@ "post": { "summary": "Revokes all secrets (via a lease ID prefix) or tokens (via the tokens' path property) generated under a given prefix immediately.", "operationId": "leases-revoke-lease-with-prefix", - "tags": [ - "system" - ], + "tags": ["system"], "requestBody": { "required": true, "content": { @@ -11925,9 +10927,7 @@ "post": { "summary": "Revokes a lease immediately.", "operationId": "leases-revoke-lease-with-id", - "tags": [ - "system" - ], + "tags": ["system"], "requestBody": { "required": true, "content": { @@ -11949,9 +10949,7 @@ "description": "This endpoint performs cleanup tasks that can be run if certain error conditions have occurred.", "post": { "operationId": "leases-tidy", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "204": { "description": "OK" @@ -11962,9 +10960,7 @@ "/sys/license/status": { "get": { "operationId": "enterprise-stub-read-license-status", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -11977,9 +10973,7 @@ "get": { "summary": "Report the locked user count metrics, for this namespace and all child namespaces.", "operationId": "locked-users-list", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -12012,9 +11006,7 @@ "post": { "summary": "Unlocks the user with given mount_accessor and alias_identifier", "operationId": "locked-users-unlock", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -12026,9 +11018,7 @@ "get": { "summary": "Read the log level for all existing loggers.", "operationId": "loggers-read-verbosity-level", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -12038,9 +11028,7 @@ "post": { "summary": "Modify the log level for all existing loggers.", "operationId": "loggers-update-verbosity-level", - "tags": [ - "system" - ], + "tags": ["system"], "requestBody": { "required": true, "content": { @@ -12060,9 +11048,7 @@ "delete": { "summary": "Revert the all loggers to use log level provided in config.", "operationId": "loggers-revert-verbosity-level", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "204": { "description": "OK" @@ -12085,9 +11071,7 @@ "get": { "summary": "Read the log level for a single logger.", "operationId": "loggers-read-verbosity-level-for", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -12097,9 +11081,7 @@ "post": { "summary": "Modify the log level of a single logger.", "operationId": "loggers-update-verbosity-level-for", - "tags": [ - "system" - ], + "tags": ["system"], "requestBody": { "required": true, "content": { @@ -12119,9 +11101,7 @@ "delete": { "summary": "Revert a single logger to use log level provided in config.", "operationId": "loggers-revert-verbosity-level-for", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "204": { "description": "OK" @@ -12142,9 +11122,7 @@ ], "get": { "operationId": "enterprise-stub-list-managed-keys-type", - "tags": [ - "system" - ], + "tags": ["system"], "parameters": [ { "name": "list", @@ -12152,9 +11130,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -12195,9 +11171,7 @@ "x-vault-createSupported": true, "get": { "operationId": "enterprise-stub-read-managed-keys-type-name", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -12206,9 +11180,7 @@ }, "post": { "operationId": "enterprise-stub-write-managed-keys-type-name", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -12217,9 +11189,7 @@ }, "delete": { "operationId": "enterprise-stub-delete-managed-keys-type-name", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "204": { "description": "empty body" @@ -12249,9 +11219,7 @@ "x-vault-createSupported": true, "post": { "operationId": "enterprise-stub-write-managed-keys-type-name-test-sign", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -12263,9 +11231,7 @@ "description": "Export the metrics aggregated for telemetry purpose.", "get": { "operationId": "metrics", - "tags": [ - "system" - ], + "tags": ["system"], "parameters": [ { "name": "format", @@ -12286,9 +11252,7 @@ "/sys/mfa/method/": { "get": { "operationId": "enterprise-stub-list-mfa-method", - "tags": [ - "system" - ], + "tags": ["system"], "parameters": [ { "name": "list", @@ -12296,9 +11260,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -12330,9 +11292,7 @@ ], "get": { "operationId": "enterprise-stub-read-mfa-method-duo-name", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -12341,9 +11301,7 @@ }, "post": { "operationId": "enterprise-stub-write-mfa-method-duo-name", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -12352,9 +11310,7 @@ }, "delete": { "operationId": "enterprise-stub-delete-mfa-method-duo-name", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "204": { "description": "empty body" @@ -12375,9 +11331,7 @@ ], "get": { "operationId": "enterprise-stub-read-mfa-method-okta-name", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -12386,9 +11340,7 @@ }, "post": { "operationId": "enterprise-stub-write-mfa-method-okta-name", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -12397,9 +11349,7 @@ }, "delete": { "operationId": "enterprise-stub-delete-mfa-method-okta-name", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "204": { "description": "empty body" @@ -12420,9 +11370,7 @@ ], "get": { "operationId": "enterprise-stub-read-mfa-method-pingid-name", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -12431,9 +11379,7 @@ }, "post": { "operationId": "enterprise-stub-write-mfa-method-pingid-name", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -12442,9 +11388,7 @@ }, "delete": { "operationId": "enterprise-stub-delete-mfa-method-pingid-name", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "204": { "description": "empty body" @@ -12465,9 +11409,7 @@ ], "get": { "operationId": "enterprise-stub-read-mfa-method-totp-name", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -12476,9 +11418,7 @@ }, "post": { "operationId": "enterprise-stub-write-mfa-method-totp-name", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -12487,9 +11427,7 @@ }, "delete": { "operationId": "enterprise-stub-delete-mfa-method-totp-name", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "204": { "description": "empty body" @@ -12510,9 +11448,7 @@ ], "post": { "operationId": "enterprise-stub-write-mfa-method-totp-name-admin-destroy", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -12533,9 +11469,7 @@ ], "post": { "operationId": "enterprise-stub-write-mfa-method-totp-name-admin-generate", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -12556,9 +11490,7 @@ ], "get": { "operationId": "enterprise-stub-read-mfa-method-totp-name-generate", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -12571,9 +11503,7 @@ "post": { "summary": "Validates the login for the given MFA methods. Upon successful validation, it returns an auth response containing the client token", "operationId": "mfa-validate", - "tags": [ - "system" - ], + "tags": ["system"], "requestBody": { "required": true, "content": { @@ -12594,9 +11524,7 @@ "/sys/monitor": { "get": { "operationId": "monitor", - "tags": [ - "system" - ], + "tags": ["system"], "parameters": [ { "name": "log_format", @@ -12627,9 +11555,7 @@ "description": "List the currently mounted backends.", "get": { "operationId": "mounts-list-secrets-engines", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -12653,9 +11579,7 @@ "get": { "summary": "Read the configuration of the secret engine at the given path.", "operationId": "mounts-read-configuration", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK", @@ -12672,9 +11596,7 @@ "post": { "summary": "Enable a new secrets engine at the given path.", "operationId": "mounts-enable-secrets-engine", - "tags": [ - "system" - ], + "tags": ["system"], "requestBody": { "required": true, "content": { @@ -12694,9 +11616,7 @@ "delete": { "summary": "Disable the mount point specified at the given path.", "operationId": "mounts-disable-secrets-engine", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -12719,9 +11639,7 @@ ], "get": { "operationId": "mounts-read-tuning-information", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK", @@ -12737,9 +11655,7 @@ }, "post": { "operationId": "mounts-tune-configuration-parameters", - "tags": [ - "system" - ], + "tags": ["system"], "requestBody": { "required": true, "content": { @@ -12760,9 +11676,7 @@ "/sys/namespaces/": { "get": { "operationId": "enterprise-stub-list-namespaces", - "tags": [ - "system" - ], + "tags": ["system"], "parameters": [ { "name": "list", @@ -12770,9 +11684,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -12794,9 +11706,7 @@ "/sys/namespaces/api-lock/lock": { "post": { "operationId": "enterprise-stub-write-namespaces-api-lock-lock", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -12817,9 +11727,7 @@ ], "post": { "operationId": "enterprise-stub-write-namespaces-api-lock-lock-path", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -12830,9 +11738,7 @@ "/sys/namespaces/api-lock/unlock": { "post": { "operationId": "enterprise-stub-write-namespaces-api-lock-unlock", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -12853,9 +11759,7 @@ ], "post": { "operationId": "enterprise-stub-write-namespaces-api-lock-unlock-path", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -12876,9 +11780,7 @@ ], "get": { "operationId": "enterprise-stub-read-namespaces-path", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -12887,9 +11789,7 @@ }, "post": { "operationId": "enterprise-stub-write-namespaces-path", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -12898,9 +11798,7 @@ }, "delete": { "operationId": "enterprise-stub-delete-namespaces-path", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "204": { "description": "empty body" @@ -12912,9 +11810,7 @@ "description": "Lists all the plugins known to Vault", "get": { "operationId": "plugins-catalog-list-plugins", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK", @@ -12946,9 +11842,7 @@ "get": { "summary": "Return the configuration data for the plugin with the given name.", "operationId": "plugins-catalog-read-plugin-configuration", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK", @@ -12965,9 +11859,7 @@ "post": { "summary": "Register a new plugin, or updates an existing one with the supplied name.", "operationId": "plugins-catalog-register-plugin", - "tags": [ - "system" - ], + "tags": ["system"], "requestBody": { "required": true, "content": { @@ -12987,9 +11879,7 @@ "delete": { "summary": "Remove the plugin with the given name.", "operationId": "plugins-catalog-remove-plugin", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -13014,9 +11904,7 @@ "get": { "summary": "List the plugins in the catalog.", "operationId": "plugins-catalog-list-plugins-with-type", - "tags": [ - "system" - ], + "tags": ["system"], "parameters": [ { "name": "list", @@ -13024,9 +11912,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -13071,9 +11957,7 @@ "get": { "summary": "Return the configuration data for the plugin with the given name.", "operationId": "plugins-catalog-read-plugin-configuration-with-type", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK", @@ -13090,9 +11974,7 @@ "post": { "summary": "Register a new plugin, or updates an existing one with the supplied name.", "operationId": "plugins-catalog-register-plugin-with-type", - "tags": [ - "system" - ], + "tags": ["system"], "requestBody": { "required": true, "content": { @@ -13112,9 +11994,7 @@ "delete": { "summary": "Remove the plugin with the given name.", "operationId": "plugins-catalog-remove-plugin-with-type", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -13128,9 +12008,7 @@ "summary": "Reload mounted plugin backends.", "description": "Either the plugin name (`plugin`) or the desired plugin backend mounts (`mounts`) must be provided, but not both. In the case that the plugin name is provided, all mounted paths that use that plugin backend will be reloaded. If (`scope`) is provided and is (`global`), the plugin(s) are reloaded globally.", "operationId": "plugins-reload-backends", - "tags": [ - "system" - ], + "tags": ["system"], "requestBody": { "required": true, "content": { @@ -13168,9 +12046,7 @@ "/sys/plugins/reload/backend/status": { "get": { "operationId": "enterprise-stub-read-plugins-reload-backend-status", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -13183,9 +12059,7 @@ "x-vault-sudo": true, "get": { "operationId": "plugins-runtimes-catalog-list-plugins-runtimes", - "tags": [ - "system" - ], + "tags": ["system"], "parameters": [ { "name": "list", @@ -13193,9 +12067,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -13240,9 +12112,7 @@ "get": { "summary": "Return the configuration data for the plugin runtime with the given name.", "operationId": "plugins-runtimes-catalog-read-plugin-runtime-configuration", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK", @@ -13259,9 +12129,7 @@ "post": { "summary": "Register a new plugin runtime, or updates an existing one with the supplied name.", "operationId": "plugins-runtimes-catalog-register-plugin-runtime", - "tags": [ - "system" - ], + "tags": ["system"], "requestBody": { "required": true, "content": { @@ -13281,9 +12149,7 @@ "delete": { "summary": "Remove the plugin runtime with the given name.", "operationId": "plugins-runtimes-catalog-remove-plugin-runtime", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -13295,9 +12161,7 @@ "description": "List the configured access control policies.", "get": { "operationId": "policies-list-acl-policies", - "tags": [ - "system" - ], + "tags": ["system"], "parameters": [ { "name": "list", @@ -13305,9 +12169,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -13342,9 +12204,7 @@ "get": { "summary": "Retrieve information about the named ACL policy.", "operationId": "policies-read-acl-policy", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK", @@ -13361,9 +12221,7 @@ "post": { "summary": "Add a new or update an existing ACL policy.", "operationId": "policies-write-acl-policy", - "tags": [ - "system" - ], + "tags": ["system"], "requestBody": { "required": true, "content": { @@ -13383,9 +12241,7 @@ "delete": { "summary": "Delete the ACL policy with the given name.", "operationId": "policies-delete-acl-policy", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "204": { "description": "OK" @@ -13396,9 +12252,7 @@ "/sys/policies/egp/": { "get": { "operationId": "enterprise-stub-list-policies-egp", - "tags": [ - "system" - ], + "tags": ["system"], "parameters": [ { "name": "list", @@ -13406,9 +12260,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -13440,9 +12292,7 @@ ], "get": { "operationId": "enterprise-stub-read-policies-egp-name", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -13451,9 +12301,7 @@ }, "post": { "operationId": "enterprise-stub-write-policies-egp-name", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -13462,9 +12310,7 @@ }, "delete": { "operationId": "enterprise-stub-delete-policies-egp-name", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "204": { "description": "empty body" @@ -13476,9 +12322,7 @@ "get": { "summary": "List the existing password policies.", "operationId": "policies-list-password-policies", - "tags": [ - "system" - ], + "tags": ["system"], "parameters": [ { "name": "list", @@ -13486,9 +12330,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -13523,9 +12365,7 @@ "get": { "summary": "Retrieve an existing password policy.", "operationId": "policies-read-password-policy", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "204": { "description": "OK", @@ -13542,9 +12382,7 @@ "post": { "summary": "Add a new or update an existing password policy.", "operationId": "policies-write-password-policy", - "tags": [ - "system" - ], + "tags": ["system"], "requestBody": { "required": true, "content": { @@ -13564,9 +12402,7 @@ "delete": { "summary": "Delete a password policy.", "operationId": "policies-delete-password-policy", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "204": { "description": "OK" @@ -13590,9 +12426,7 @@ "get": { "summary": "Generate a password from an existing password policy.", "operationId": "policies-generate-password-from-password-policy", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK", @@ -13610,9 +12444,7 @@ "/sys/policies/rgp/": { "get": { "operationId": "enterprise-stub-list-policies-rgp", - "tags": [ - "system" - ], + "tags": ["system"], "parameters": [ { "name": "list", @@ -13620,9 +12452,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -13654,9 +12484,7 @@ ], "get": { "operationId": "enterprise-stub-read-policies-rgp-name", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -13665,9 +12493,7 @@ }, "post": { "operationId": "enterprise-stub-write-policies-rgp-name", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -13676,9 +12502,7 @@ }, "delete": { "operationId": "enterprise-stub-delete-policies-rgp-name", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "204": { "description": "empty body" @@ -13690,9 +12514,7 @@ "description": "List the configured access control policies.", "get": { "operationId": "policies-list-acl-policies2", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK", @@ -13711,9 +12533,7 @@ "description": "List the configured access control policies.", "get": { "operationId": "policies-list-acl-policies3", - "tags": [ - "system" - ], + "tags": ["system"], "parameters": [ { "name": "list", @@ -13721,9 +12541,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -13758,9 +12576,7 @@ "get": { "summary": "Retrieve the policy body for the named policy.", "operationId": "policies-read-acl-policy2", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK", @@ -13777,9 +12593,7 @@ "post": { "summary": "Add a new or update an existing policy.", "operationId": "policies-write-acl-policy2", - "tags": [ - "system" - ], + "tags": ["system"], "requestBody": { "required": true, "content": { @@ -13799,9 +12613,7 @@ "delete": { "summary": "Delete the policy with the given name.", "operationId": "policies-delete-acl-policy2", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "204": { "description": "OK" @@ -13814,9 +12626,7 @@ "summary": "Returns an HTML page listing the available profiles.", "description": "Returns an HTML page listing the available \nprofiles. This should be mainly accessed via browsers or applications that can \nrender pages.", "operationId": "pprof-index", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -13829,9 +12639,7 @@ "summary": "Returns a sampling of all past memory allocations.", "description": "Returns a sampling of all past memory allocations.", "operationId": "pprof-memory-allocations", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -13844,9 +12652,7 @@ "summary": "Returns stack traces that led to blocking on synchronization primitives", "description": "Returns stack traces that led to blocking on synchronization primitives", "operationId": "pprof-blocking", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -13859,9 +12665,7 @@ "summary": "Returns the running program's command line.", "description": "Returns the running program's command line, with arguments separated by NUL bytes.", "operationId": "pprof-command-line", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -13874,9 +12678,7 @@ "summary": "Returns stack traces of all current goroutines.", "description": "Returns stack traces of all current goroutines.", "operationId": "pprof-goroutines", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -13889,9 +12691,7 @@ "summary": "Returns a sampling of memory allocations of live object.", "description": "Returns a sampling of memory allocations of live object.", "operationId": "pprof-memory-allocations-live", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -13904,9 +12704,7 @@ "summary": "Returns stack traces of holders of contended mutexes", "description": "Returns stack traces of holders of contended mutexes", "operationId": "pprof-mutexes", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -13919,9 +12717,7 @@ "summary": "Returns a pprof-formatted cpu profile payload.", "description": "Returns a pprof-formatted cpu profile payload. Profiling lasts for duration specified in seconds GET parameter, or for 30 seconds if not specified.", "operationId": "pprof-cpu-profile", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -13934,9 +12730,7 @@ "summary": "Returns the program counters listed in the request.", "description": "Returns the program counters listed in the request.", "operationId": "pprof-symbols", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -13949,9 +12743,7 @@ "summary": "Returns stack traces that led to the creation of new OS threads", "description": "Returns stack traces that led to the creation of new OS threads", "operationId": "pprof-thread-creations", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -13964,9 +12756,7 @@ "summary": "Returns the execution trace in binary form.", "description": "Returns the execution trace in binary form. Tracing lasts for duration specified in seconds GET parameter, or for 1 second if not specified.", "operationId": "pprof-execution-trace", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -13978,9 +12768,7 @@ "description": "Create, update and read the quota configuration.", "get": { "operationId": "rate-limit-quotas-read-configuration", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK", @@ -13996,9 +12784,7 @@ }, "post": { "operationId": "rate-limit-quotas-configure", - "tags": [ - "system" - ], + "tags": ["system"], "requestBody": { "required": true, "content": { @@ -14019,9 +12805,7 @@ "/sys/quotas/lease-count/": { "get": { "operationId": "enterprise-stub-list-quotas-lease-count", - "tags": [ - "system" - ], + "tags": ["system"], "parameters": [ { "name": "list", @@ -14029,9 +12813,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -14063,9 +12845,7 @@ ], "get": { "operationId": "enterprise-stub-read-quotas-lease-count-name", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -14074,9 +12854,7 @@ }, "post": { "operationId": "enterprise-stub-write-quotas-lease-count-name", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -14085,9 +12863,7 @@ }, "delete": { "operationId": "enterprise-stub-delete-quotas-lease-count-name", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "204": { "description": "empty body" @@ -14099,9 +12875,7 @@ "description": "Lists the names of all the rate limit quotas.", "get": { "operationId": "rate-limit-quotas-list", - "tags": [ - "system" - ], + "tags": ["system"], "parameters": [ { "name": "list", @@ -14109,9 +12883,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -14145,9 +12917,7 @@ ], "get": { "operationId": "rate-limit-quotas-read", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK", @@ -14163,9 +12933,7 @@ }, "post": { "operationId": "rate-limit-quotas-write", - "tags": [ - "system" - ], + "tags": ["system"], "requestBody": { "required": true, "content": { @@ -14184,9 +12952,7 @@ }, "delete": { "operationId": "rate-limit-quotas-delete", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "204": { "description": "OK" @@ -14211,9 +12977,7 @@ "get": { "summary": "Read the value of the key at the given path.", "operationId": "raw-read", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK", @@ -14230,9 +12994,7 @@ "post": { "summary": "Update the value of the key at the given path.", "operationId": "raw-write", - "tags": [ - "system" - ], + "tags": ["system"], "requestBody": { "required": true, "content": { @@ -14252,9 +13014,7 @@ "delete": { "summary": "Delete the key with given path.", "operationId": "raw-delete", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "204": { "description": "OK" @@ -14278,9 +13038,7 @@ "get": { "summary": "Return a list keys for a given path prefix.", "operationId": "raw-list", - "tags": [ - "system" - ], + "tags": ["system"], "parameters": [ { "name": "list", @@ -14288,9 +13046,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -14314,9 +13070,7 @@ "get": { "summary": "Return the backup copy of PGP-encrypted unseal keys.", "operationId": "rekey-read-backup-key", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK", @@ -14333,9 +13087,7 @@ "delete": { "summary": "Delete the backup copy of PGP-encrypted unseal keys.", "operationId": "rekey-delete-backup-key", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "204": { "description": "OK" @@ -14348,9 +13100,7 @@ "get": { "summary": "Reads the configuration and progress of the current rekey attempt.", "operationId": "rekey-attempt-read-progress", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK", @@ -14368,9 +13118,7 @@ "summary": "Initializes a new rekey attempt.", "description": "Only a single rekey attempt can take place at a time, and changing the parameters of a rekey requires canceling and starting a new rekey, which will also provide a new nonce.", "operationId": "rekey-attempt-initialize", - "tags": [ - "system" - ], + "tags": ["system"], "requestBody": { "required": true, "content": { @@ -14398,9 +13146,7 @@ "summary": "Cancels any in-progress rekey.", "description": "This clears the rekey settings as well as any progress made. This must be called to change the parameters of the rekey. Note: verification is still a part of a rekey. If rekeying is canceled during the verification flow, the current unseal keys remain valid.", "operationId": "rekey-attempt-cancel", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -14412,9 +13158,7 @@ "description": "Allows fetching or deleting the backup of the rotated unseal keys.", "get": { "operationId": "rekey-read-backup-recovery-key", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK", @@ -14430,9 +13174,7 @@ }, "delete": { "operationId": "rekey-delete-backup-recovery-key", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "204": { "description": "OK" @@ -14445,9 +13187,7 @@ "post": { "summary": "Enter a single unseal key share to progress the rekey of the Vault.", "operationId": "rekey-attempt-update", - "tags": [ - "system" - ], + "tags": ["system"], "requestBody": { "required": true, "content": { @@ -14477,9 +13217,7 @@ "get": { "summary": "Read the configuration and progress of the current rekey verification attempt.", "operationId": "rekey-verification-read-progress", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK", @@ -14496,9 +13234,7 @@ "post": { "summary": "Enter a single new key share to progress the rekey verification operation.", "operationId": "rekey-verification-update", - "tags": [ - "system" - ], + "tags": ["system"], "requestBody": { "required": true, "content": { @@ -14526,9 +13262,7 @@ "summary": "Cancel any in-progress rekey verification operation.", "description": "This clears any progress made and resets the nonce. Unlike a `DELETE` against `sys/rekey/init`, this only resets the current verification operation, not the entire rekey atttempt.", "operationId": "rekey-verification-cancel", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK", @@ -14549,9 +13283,7 @@ "post": { "summary": "Initiate a mount migration", "operationId": "remount", - "tags": [ - "system" - ], + "tags": ["system"], "requestBody": { "required": true, "content": { @@ -14592,9 +13324,7 @@ "get": { "summary": "Check status of a mount migration", "operationId": "remount-status", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK", @@ -14614,9 +13344,7 @@ "post": { "summary": "Renews a lease, requesting to extend the lease.", "operationId": "leases-renew-lease2", - "tags": [ - "system" - ], + "tags": ["system"], "requestBody": { "required": true, "content": { @@ -14650,9 +13378,7 @@ "post": { "summary": "Renews a lease, requesting to extend the lease.", "operationId": "leases-renew-lease-with-id2", - "tags": [ - "system" - ], + "tags": ["system"], "requestBody": { "required": true, "content": { @@ -14673,9 +13399,7 @@ "/sys/replication/dr/primary/demote": { "post": { "operationId": "enterprise-stub-write-replication-dr-primary-demote", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -14686,9 +13410,7 @@ "/sys/replication/dr/primary/disable": { "post": { "operationId": "enterprise-stub-write-replication-dr-primary-disable", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -14699,9 +13421,7 @@ "/sys/replication/dr/primary/enable": { "post": { "operationId": "enterprise-stub-write-replication-dr-primary-enable", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -14712,9 +13432,7 @@ "/sys/replication/dr/primary/revoke-secondary": { "post": { "operationId": "enterprise-stub-write-replication-dr-primary-revoke-secondary", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -14726,9 +13444,7 @@ "x-vault-sudo": true, "post": { "operationId": "enterprise-stub-write-replication-dr-primary-secondary-token", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -14749,9 +13465,7 @@ ], "post": { "operationId": "enterprise-stub-write-replication-dr-secondary-config-reload-subsystem", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -14763,9 +13477,7 @@ "x-vault-unauthenticated": true, "post": { "operationId": "enterprise-stub-write-replication-dr-secondary-disable", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -14776,9 +13488,7 @@ "/sys/replication/dr/secondary/enable": { "post": { "operationId": "enterprise-stub-write-replication-dr-secondary-enable", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -14789,9 +13499,7 @@ "/sys/replication/dr/secondary/generate-public-key": { "post": { "operationId": "enterprise-stub-write-replication-dr-secondary-generate-public-key", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -14803,9 +13511,7 @@ "x-vault-unauthenticated": true, "get": { "operationId": "enterprise-stub-read-replication-dr-secondary-license-status", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -14817,9 +13523,7 @@ "x-vault-unauthenticated": true, "post": { "operationId": "enterprise-stub-write-replication-dr-secondary-operation-token-delete", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -14831,9 +13535,7 @@ "x-vault-unauthenticated": true, "post": { "operationId": "enterprise-stub-write-replication-dr-secondary-promote", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -14845,9 +13547,7 @@ "x-vault-unauthenticated": true, "post": { "operationId": "enterprise-stub-write-replication-dr-secondary-recover", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -14859,9 +13559,7 @@ "x-vault-unauthenticated": true, "post": { "operationId": "enterprise-stub-write-replication-dr-secondary-reindex", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -14873,9 +13571,7 @@ "x-vault-unauthenticated": true, "post": { "operationId": "enterprise-stub-write-replication-dr-secondary-update-primary", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -14887,9 +13583,7 @@ "x-vault-unauthenticated": true, "get": { "operationId": "enterprise-stub-read-replication-dr-status", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -14900,9 +13594,7 @@ "/sys/replication/performance/primary/demote": { "post": { "operationId": "enterprise-stub-write-replication-performance-primary-demote", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -14913,9 +13605,7 @@ "/sys/replication/performance/primary/disable": { "post": { "operationId": "enterprise-stub-write-replication-performance-primary-disable", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -14936,9 +13626,7 @@ ], "get": { "operationId": "enterprise-stub-read-replication-performance-primary-dynamic-filter-id", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -14949,9 +13637,7 @@ "/sys/replication/performance/primary/enable": { "post": { "operationId": "enterprise-stub-write-replication-performance-primary-enable", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -14972,9 +13658,7 @@ ], "get": { "operationId": "enterprise-stub-read-replication-performance-primary-paths-filter-id", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -14983,9 +13667,7 @@ }, "post": { "operationId": "enterprise-stub-write-replication-performance-primary-paths-filter-id", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -14994,9 +13676,7 @@ }, "delete": { "operationId": "enterprise-stub-delete-replication-performance-primary-paths-filter-id", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "204": { "description": "empty body" @@ -15007,9 +13687,7 @@ "/sys/replication/performance/primary/revoke-secondary": { "post": { "operationId": "enterprise-stub-write-replication-performance-primary-revoke-secondary", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -15021,9 +13699,7 @@ "x-vault-sudo": true, "post": { "operationId": "enterprise-stub-write-replication-performance-primary-secondary-token", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -15034,9 +13710,7 @@ "/sys/replication/performance/secondary/disable": { "post": { "operationId": "enterprise-stub-write-replication-performance-secondary-disable", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -15057,9 +13731,7 @@ ], "get": { "operationId": "enterprise-stub-read-replication-performance-secondary-dynamic-filter-id", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -15070,9 +13742,7 @@ "/sys/replication/performance/secondary/enable": { "post": { "operationId": "enterprise-stub-write-replication-performance-secondary-enable", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -15083,9 +13753,7 @@ "/sys/replication/performance/secondary/generate-public-key": { "post": { "operationId": "enterprise-stub-write-replication-performance-secondary-generate-public-key", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -15096,9 +13764,7 @@ "/sys/replication/performance/secondary/promote": { "post": { "operationId": "enterprise-stub-write-replication-performance-secondary-promote", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -15109,9 +13775,7 @@ "/sys/replication/performance/secondary/update-primary": { "post": { "operationId": "enterprise-stub-write-replication-performance-secondary-update-primary", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -15123,9 +13787,7 @@ "x-vault-unauthenticated": true, "get": { "operationId": "enterprise-stub-read-replication-performance-status", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -15136,9 +13798,7 @@ "/sys/replication/primary/demote": { "post": { "operationId": "enterprise-stub-write-replication-primary-demote", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -15149,9 +13809,7 @@ "/sys/replication/primary/disable": { "post": { "operationId": "enterprise-stub-write-replication-primary-disable", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -15162,9 +13820,7 @@ "/sys/replication/primary/enable": { "post": { "operationId": "enterprise-stub-write-replication-primary-enable", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -15175,9 +13831,7 @@ "/sys/replication/primary/revoke-secondary": { "post": { "operationId": "enterprise-stub-write-replication-primary-revoke-secondary", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -15189,9 +13843,7 @@ "x-vault-sudo": true, "post": { "operationId": "enterprise-stub-write-replication-primary-secondary-token", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -15202,9 +13854,7 @@ "/sys/replication/recover": { "post": { "operationId": "enterprise-stub-write-replication-recover", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -15216,9 +13866,7 @@ "x-vault-sudo": true, "post": { "operationId": "enterprise-stub-write-replication-reindex", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -15229,9 +13877,7 @@ "/sys/replication/secondary/disable": { "post": { "operationId": "enterprise-stub-write-replication-secondary-disable", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -15242,9 +13888,7 @@ "/sys/replication/secondary/enable": { "post": { "operationId": "enterprise-stub-write-replication-secondary-enable", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -15255,9 +13899,7 @@ "/sys/replication/secondary/promote": { "post": { "operationId": "enterprise-stub-write-replication-secondary-promote", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -15268,9 +13910,7 @@ "/sys/replication/secondary/update-primary": { "post": { "operationId": "enterprise-stub-write-replication-secondary-update-primary", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -15282,9 +13922,7 @@ "x-vault-unauthenticated": true, "get": { "operationId": "read-replication-status", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -15297,9 +13935,7 @@ "post": { "summary": "Revokes a lease immediately.", "operationId": "leases-revoke-lease2", - "tags": [ - "system" - ], + "tags": ["system"], "requestBody": { "required": true, "content": { @@ -15335,9 +13971,7 @@ "summary": "Revokes all secrets or tokens generated under a given prefix immediately", "description": "Unlike `/sys/leases/revoke-prefix`, this path ignores backend errors encountered during revocation. This is potentially very dangerous and should only be used in specific emergency situations where errors in the backend or the connected backend service prevent normal revocation.\n\nBy ignoring these errors, Vault abdicates responsibility for ensuring that the issued credentials or secrets are properly revoked and/or cleaned up. Access to this endpoint should be tightly controlled.", "operationId": "leases-force-revoke-lease-with-prefix2", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "204": { "description": "OK" @@ -15362,9 +13996,7 @@ "post": { "summary": "Revokes all secrets (via a lease ID prefix) or tokens (via the tokens' path property) generated under a given prefix immediately.", "operationId": "leases-revoke-lease-with-prefix2", - "tags": [ - "system" - ], + "tags": ["system"], "requestBody": { "required": true, "content": { @@ -15398,9 +14030,7 @@ "post": { "summary": "Revokes a lease immediately.", "operationId": "leases-revoke-lease-with-id2", - "tags": [ - "system" - ], + "tags": ["system"], "requestBody": { "required": true, "content": { @@ -15423,9 +14053,7 @@ "x-vault-sudo": true, "post": { "operationId": "encryption-key-rotate", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "204": { "description": "OK" @@ -15437,9 +14065,7 @@ "description": "Configures settings related to the backend encryption key management.", "get": { "operationId": "encryption-key-read-rotation-configuration", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK", @@ -15455,9 +14081,7 @@ }, "post": { "operationId": "encryption-key-configure-rotation", - "tags": [ - "system" - ], + "tags": ["system"], "requestBody": { "required": true, "content": { @@ -15481,9 +14105,7 @@ "post": { "summary": "Seal the Vault.", "operationId": "seal", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "204": { "description": "OK" @@ -15497,9 +14119,7 @@ "get": { "summary": "Check the seal status of a Vault.", "operationId": "seal-status", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "", @@ -15517,9 +14137,7 @@ "/sys/sealwrap/rewrap": { "get": { "operationId": "enterprise-stub-read-sealwrap-rewrap", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -15528,9 +14146,7 @@ }, "post": { "operationId": "enterprise-stub-write-sealwrap-rewrap", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -15544,9 +14160,7 @@ "summary": "Cause the node to give up active status.", "description": "This endpoint forces the node to give up active status. If the node does not have active status, this endpoint does nothing. Note that the node will sleep for ten seconds before attempting to grab the active lock again, but if no standby nodes grab the active lock in the interim, the same node may become the active node again.", "operationId": "step-down-leader", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "204": { "description": "empty body" @@ -15558,9 +14172,7 @@ "x-vault-sudo": true, "get": { "operationId": "enterprise-stub-list-storage-raft-snapshot-auto-config", - "tags": [ - "system" - ], + "tags": ["system"], "parameters": [ { "name": "list", @@ -15568,9 +14180,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -15603,9 +14213,7 @@ "x-vault-sudo": true, "get": { "operationId": "enterprise-stub-read-storage-raft-snapshot-auto-config-name", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -15614,9 +14222,7 @@ }, "post": { "operationId": "enterprise-stub-write-storage-raft-snapshot-auto-config-name", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -15625,9 +14231,7 @@ }, "delete": { "operationId": "enterprise-stub-delete-storage-raft-snapshot-auto-config-name", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "204": { "description": "empty body" @@ -15648,9 +14252,7 @@ ], "get": { "operationId": "enterprise-stub-read-storage-raft-snapshot-auto-status-name", - "tags": [ - "system" - ], + "tags": ["system"], "responses": { "200": { "description": "OK" @@ -15662,9 +14264,7 @@ "description": "Generate a hash sum for input data", "post": { "operationId": "generate-hash", - "tags": [ - "system" - ], + "tags": ["system"], "requestBody": { "required": true, "content": { @@ -15704,9 +14304,7 @@ ], "post": { "operationId": "generate-hash-with-algorithm", - "tags": [ - "system" - ], + "tags": ["system"], "requestBody": { "required": true, "content": { @@ -15735,9 +14333,7 @@ "description": "Generate random bytes", "post": { "operationId": "generate-random", - "tags": [ - "system" - ], + "tags": ["system"], "requestBody": { "required": true, "content": { @@ -15778,9 +14374,7 @@ ], "post": { "operationId": "generate-random-with-source", - "tags": [ - "system" - ], + "tags": ["system"], "requestBody": { "required": true, "content": { @@ -15830,9 +14424,7 @@ ], "post": { "operationId": "generate-random-with-source-and-bytes", - "tags": [ - "system" - ], + "tags": ["system"], "requestBody": { "required": true, "content": { @@ -15872,9 +14464,7 @@ ], "post": { "operationId": "generate-random-with-bytes", - "tags": [ - "system" - ], + "tags": ["system"], "requestBody": { "required": true, "content": { @@ -15905,9 +14495,7 @@ "post": { "summary": "Unseal the Vault.", "operationId": "unseal", - "tags": [ - "system" - ], + "tags": ["system"], "requestBody": { "required": true, "content": { @@ -15937,9 +14525,7 @@ "get": { "summary": "Returns map of historical version change entries", "operationId": "version-history", - "tags": [ - "system" - ], + "tags": ["system"], "parameters": [ { "name": "list", @@ -15947,9 +14533,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -15974,9 +14558,7 @@ "get": { "summary": "Look up wrapping properties for the requester's token.", "operationId": "read-wrapping-properties2", - "tags": [ - "system" - ], + "tags": ["system"], "parameters": [ { "name": "token", @@ -16002,9 +14584,7 @@ "post": { "summary": "Look up wrapping properties for the given token.", "operationId": "read-wrapping-properties", - "tags": [ - "system" - ], + "tags": ["system"], "requestBody": { "required": true, "content": { @@ -16033,9 +14613,7 @@ "description": "Rotates a response-wrapped token.", "post": { "operationId": "rewrap", - "tags": [ - "system" - ], + "tags": ["system"], "requestBody": { "required": true, "content": { @@ -16057,9 +14635,7 @@ "description": "Unwraps a response-wrapped token.", "post": { "operationId": "unwrap", - "tags": [ - "system" - ], + "tags": ["system"], "requestBody": { "required": true, "content": { @@ -16084,9 +14660,7 @@ "description": "Response-wraps an arbitrary JSON object.", "post": { "operationId": "wrap", - "tags": [ - "system" - ], + "tags": ["system"], "requestBody": { "required": true, "content": { @@ -16121,9 +14695,7 @@ ], "get": { "operationId": "ali-cloud-read-configuration", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -16132,9 +14704,7 @@ }, "post": { "operationId": "ali-cloud-configure", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -16153,9 +14723,7 @@ }, "delete": { "operationId": "ali-cloud-delete-configuration", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "204": { "description": "empty body" @@ -16189,9 +14757,7 @@ "get": { "summary": "Generate an API key or STS credential using the given role's configuration.'", "operationId": "ali-cloud-generate-credentials", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -16216,9 +14782,7 @@ "get": { "summary": "List the existing roles in this backend.", "operationId": "ali-cloud-list-roles", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "parameters": [ { "name": "list", @@ -16226,9 +14790,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -16274,9 +14836,7 @@ "get": { "summary": "Read, write and reference policies and roles that API keys or STS credentials can be made for.", "operationId": "ali-cloud-read-role", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -16286,9 +14846,7 @@ "post": { "summary": "Read, write and reference policies and roles that API keys or STS credentials can be made for.", "operationId": "ali-cloud-write-role", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -16308,9 +14866,7 @@ "delete": { "summary": "Read, write and reference policies and roles that API keys or STS credentials can be made for.", "operationId": "ali-cloud-delete-role", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "204": { "description": "empty body" @@ -16334,9 +14890,7 @@ ], "get": { "operationId": "aws-read-lease-configuration", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -16345,9 +14899,7 @@ }, "post": { "operationId": "aws-configure-lease", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -16381,9 +14933,7 @@ ], "get": { "operationId": "aws-read-root-iam-credentials-configuration", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -16392,9 +14942,7 @@ }, "post": { "operationId": "aws-configure-root-iam-credentials", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -16428,9 +14976,7 @@ ], "post": { "operationId": "aws-rotate-root-iam-credentials", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -16463,9 +15009,7 @@ ], "get": { "operationId": "aws-generate-credentials", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "parameters": [ { "name": "role_arn", @@ -16501,9 +15045,7 @@ }, "post": { "operationId": "aws-generate-credentials-with-parameters", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -16538,9 +15080,7 @@ "get": { "summary": "List the existing roles in this backend", "operationId": "aws-list-roles", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "parameters": [ { "name": "list", @@ -16548,9 +15088,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -16598,9 +15136,7 @@ "get": { "summary": "Read, write and reference IAM policies that access keys can be made for.", "operationId": "aws-read-role", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -16610,9 +15146,7 @@ "post": { "summary": "Read, write and reference IAM policies that access keys can be made for.", "operationId": "aws-write-role", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -16632,9 +15166,7 @@ "delete": { "summary": "Read, write and reference IAM policies that access keys can be made for.", "operationId": "aws-delete-role", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "204": { "description": "empty body" @@ -16667,9 +15199,7 @@ ], "get": { "operationId": "aws-read-static-creds-name", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK", @@ -16709,9 +15239,7 @@ ], "get": { "operationId": "aws-read-static-roles-name", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK", @@ -16727,9 +15255,7 @@ }, "post": { "operationId": "aws-write-static-roles-name", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -16755,9 +15281,7 @@ }, "delete": { "operationId": "aws-delete-static-roles-name", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "204": { "description": "No Content" @@ -16790,9 +15314,7 @@ ], "get": { "operationId": "aws-generate-sts-credentials", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "parameters": [ { "name": "role_arn", @@ -16828,9 +15350,7 @@ }, "post": { "operationId": "aws-generate-sts-credentials-with-parameters", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -16865,9 +15385,7 @@ "x-vault-createSupported": true, "get": { "operationId": "azure-read-configuration", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -16876,9 +15394,7 @@ }, "post": { "operationId": "azure-configure", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -16897,9 +15413,7 @@ }, "delete": { "operationId": "azure-delete-configuration", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "204": { "description": "empty body" @@ -16932,9 +15446,7 @@ ], "get": { "operationId": "azure-request-service-principal-credentials", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -16959,9 +15471,7 @@ "get": { "summary": "List existing roles.", "operationId": "azure-list-roles", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "parameters": [ { "name": "list", @@ -16969,9 +15479,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -17017,9 +15525,7 @@ "get": { "summary": "Manage the Vault roles used to generate Azure credentials.", "operationId": "azure-read-role", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -17029,9 +15535,7 @@ "post": { "summary": "Manage the Vault roles used to generate Azure credentials.", "operationId": "azure-write-role", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -17051,9 +15555,7 @@ "delete": { "summary": "Manage the Vault roles used to generate Azure credentials.", "operationId": "azure-delete-role", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "204": { "description": "empty body" @@ -17077,9 +15579,7 @@ ], "post": { "operationId": "azure-rotate-root", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -17102,9 +15602,7 @@ ], "get": { "operationId": "consul-read-access-configuration", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -17113,9 +15611,7 @@ }, "post": { "operationId": "consul-configure-access", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -17157,9 +15653,7 @@ ], "get": { "operationId": "consul-generate-credentials", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -17182,9 +15676,7 @@ ], "get": { "operationId": "consul-list-roles", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "parameters": [ { "name": "list", @@ -17192,9 +15684,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -17237,9 +15727,7 @@ ], "get": { "operationId": "consul-read-role", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -17248,9 +15736,7 @@ }, "post": { "operationId": "consul-write-role", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -17269,9 +15755,7 @@ }, "delete": { "operationId": "consul-delete-role", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "204": { "description": "empty body" @@ -17296,9 +15780,7 @@ "get": { "summary": "Configure connection details to a database plugin.", "operationId": "database-list-connections", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "parameters": [ { "name": "list", @@ -17306,9 +15788,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -17353,9 +15833,7 @@ "x-vault-createSupported": true, "get": { "operationId": "database-read-connection-configuration", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -17364,9 +15842,7 @@ }, "post": { "operationId": "database-configure-connection", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -17385,9 +15861,7 @@ }, "delete": { "operationId": "database-delete-connection-configuration", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "204": { "description": "empty body" @@ -17421,9 +15895,7 @@ "get": { "summary": "Request database credentials for a certain role.", "operationId": "database-generate-credentials", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -17457,9 +15929,7 @@ "post": { "summary": "Resets a database plugin.", "operationId": "database-reset-connection", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -17484,9 +15954,7 @@ "get": { "summary": "Manage the roles that can be created with this backend.", "operationId": "database-list-roles", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "parameters": [ { "name": "list", @@ -17494,9 +15962,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -17542,9 +16008,7 @@ "get": { "summary": "Manage the roles that can be created with this backend.", "operationId": "database-read-role", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -17554,9 +16018,7 @@ "post": { "summary": "Manage the roles that can be created with this backend.", "operationId": "database-write-role", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -17576,9 +16038,7 @@ "delete": { "summary": "Manage the roles that can be created with this backend.", "operationId": "database-delete-role", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "204": { "description": "empty body" @@ -17611,9 +16071,7 @@ ], "post": { "operationId": "database-rotate-static-role-credentials", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -17646,9 +16104,7 @@ ], "post": { "operationId": "database-rotate-root-credentials", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -17682,9 +16138,7 @@ "get": { "summary": "Request database credentials for a certain static role. These credentials are\nrotated periodically.", "operationId": "database-read-static-role-credentials", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -17709,9 +16163,7 @@ "get": { "summary": "Manage the static roles that can be created with this backend.", "operationId": "database-list-static-roles", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "parameters": [ { "name": "list", @@ -17719,9 +16171,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -17767,9 +16217,7 @@ "get": { "summary": "Manage the static roles that can be created with this backend.", "operationId": "database-read-static-role", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -17779,9 +16227,7 @@ "post": { "summary": "Manage the static roles that can be created with this backend.", "operationId": "database-write-static-role", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -17801,9 +16247,7 @@ "delete": { "summary": "Manage the static roles that can be created with this backend.", "operationId": "database-delete-static-role", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "204": { "description": "empty body" @@ -17827,9 +16271,7 @@ ], "get": { "operationId": "google-cloud-read-configuration", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -17838,9 +16280,7 @@ }, "post": { "operationId": "google-cloud-configure", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -17874,9 +16314,7 @@ ], "post": { "operationId": "google-cloud-rotate-root-credentials", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -17900,9 +16338,7 @@ ], "get": { "operationId": "google-cloud-list-impersonated-accounts", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "parameters": [ { "name": "list", @@ -17910,9 +16346,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -17957,9 +16391,7 @@ "x-vault-createSupported": true, "get": { "operationId": "google-cloud-read-impersonated-account", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -17968,9 +16400,7 @@ }, "post": { "operationId": "google-cloud-write-impersonated-account", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -17989,9 +16419,7 @@ }, "delete": { "operationId": "google-cloud-delete-impersonated-account", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "204": { "description": "empty body" @@ -18024,9 +16452,7 @@ ], "get": { "operationId": "google-cloud-generate-impersonated-account-access-token", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -18035,9 +16461,7 @@ }, "post": { "operationId": "google-cloud-generate-impersonated-account-access-token2", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -18061,9 +16485,7 @@ ], "get": { "operationId": "google-cloud-list-impersonated-accounts2", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "parameters": [ { "name": "list", @@ -18071,9 +16493,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -18117,9 +16537,7 @@ ], "get": { "operationId": "google-cloud-generate-roleset-key4", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "parameters": [ { "name": "key_algorithm", @@ -18156,9 +16574,7 @@ }, "post": { "operationId": "google-cloud-generate-roleset-key3", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -18192,9 +16608,7 @@ ], "get": { "operationId": "google-cloud-list-rolesets", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "parameters": [ { "name": "list", @@ -18202,9 +16616,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -18249,9 +16661,7 @@ "x-vault-createSupported": true, "get": { "operationId": "google-cloud-read-roleset", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -18260,9 +16670,7 @@ }, "post": { "operationId": "google-cloud-write-roleset", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -18281,9 +16689,7 @@ }, "delete": { "operationId": "google-cloud-delete-roleset", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "204": { "description": "empty body" @@ -18316,9 +16722,7 @@ ], "post": { "operationId": "google-cloud-rotate-roleset", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -18351,9 +16755,7 @@ ], "post": { "operationId": "google-cloud-rotate-roleset-key", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -18386,9 +16788,7 @@ ], "get": { "operationId": "google-cloud-generate-roleset-key2", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "parameters": [ { "name": "key_algorithm", @@ -18425,9 +16825,7 @@ }, "post": { "operationId": "google-cloud-generate-roleset-key", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -18470,9 +16868,7 @@ ], "get": { "operationId": "google-cloud-generate-roleset-access-token2", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -18481,9 +16877,7 @@ }, "post": { "operationId": "google-cloud-generate-roleset-access-token", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -18507,9 +16901,7 @@ ], "get": { "operationId": "google-cloud-list-rolesets2", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "parameters": [ { "name": "list", @@ -18517,9 +16909,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -18554,9 +16944,7 @@ ], "get": { "operationId": "google-cloud-list-static-accounts", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "parameters": [ { "name": "list", @@ -18564,9 +16952,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -18611,9 +16997,7 @@ "x-vault-createSupported": true, "get": { "operationId": "google-cloud-read-static-account", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -18622,9 +17006,7 @@ }, "post": { "operationId": "google-cloud-write-static-account", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -18643,9 +17025,7 @@ }, "delete": { "operationId": "google-cloud-delete-static-account", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "204": { "description": "empty body" @@ -18678,9 +17058,7 @@ ], "get": { "operationId": "google-cloud-generate-static-account-key2", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "parameters": [ { "name": "key_algorithm", @@ -18717,9 +17095,7 @@ }, "post": { "operationId": "google-cloud-generate-static-account-key", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -18762,9 +17138,7 @@ ], "post": { "operationId": "google-cloud-rotate-static-account-key", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -18797,9 +17171,7 @@ ], "get": { "operationId": "google-cloud-generate-static-account-access-token2", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -18808,9 +17180,7 @@ }, "post": { "operationId": "google-cloud-generate-static-account-access-token", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -18834,9 +17204,7 @@ ], "get": { "operationId": "google-cloud-list-static-accounts2", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "parameters": [ { "name": "list", @@ -18844,9 +17212,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -18890,9 +17256,7 @@ ], "get": { "operationId": "google-cloud-generate-roleset-access-token4", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -18901,9 +17265,7 @@ }, "post": { "operationId": "google-cloud-generate-roleset-access-token3", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -18928,9 +17290,7 @@ "x-vault-createSupported": true, "get": { "operationId": "google-cloud-kms-read-configuration", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -18939,9 +17299,7 @@ }, "post": { "operationId": "google-cloud-kms-configure", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -18960,9 +17318,7 @@ }, "delete": { "operationId": "google-cloud-kms-delete-configuration", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "204": { "description": "empty body" @@ -18996,9 +17352,7 @@ "post": { "summary": "Decrypt a ciphertext value using a named key", "operationId": "google-cloud-kms-decrypt", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -19042,9 +17396,7 @@ "post": { "summary": "Encrypt a plaintext value using a named key", "operationId": "google-cloud-kms-encrypt", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -19079,9 +17431,7 @@ "get": { "summary": "List named keys", "operationId": "google-cloud-kms-list-keys", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "parameters": [ { "name": "list", @@ -19089,9 +17439,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -19136,9 +17484,7 @@ "x-vault-createSupported": true, "get": { "operationId": "google-cloud-kms-read-key-configuration", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -19147,9 +17493,7 @@ }, "post": { "operationId": "google-cloud-kms-configure-key", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -19192,9 +17536,7 @@ ], "post": { "operationId": "google-cloud-kms-deregister-key", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -19203,9 +17545,7 @@ }, "delete": { "operationId": "google-cloud-kms-deregister-key2", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "204": { "description": "empty body" @@ -19239,9 +17579,7 @@ "post": { "summary": "Register an existing crypto key in Google Cloud KMS", "operationId": "google-cloud-kms-register-key", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -19285,9 +17623,7 @@ "post": { "summary": "Rotate a crypto key to a new primary version", "operationId": "google-cloud-kms-rotate-key", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -19321,9 +17657,7 @@ "x-vault-createSupported": true, "post": { "operationId": "google-cloud-kms-trim-key-versions", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -19332,9 +17666,7 @@ }, "delete": { "operationId": "google-cloud-kms-trim-key-versions2", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "204": { "description": "empty body" @@ -19369,9 +17701,7 @@ "get": { "summary": "Interact with crypto keys in Vault and Google Cloud KMS", "operationId": "google-cloud-kms-read-key", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -19381,9 +17711,7 @@ "post": { "summary": "Interact with crypto keys in Vault and Google Cloud KMS", "operationId": "google-cloud-kms-write-key", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -19403,9 +17731,7 @@ "delete": { "summary": "Interact with crypto keys in Vault and Google Cloud KMS", "operationId": "google-cloud-kms-delete-key", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "204": { "description": "empty body" @@ -19439,9 +17765,7 @@ "get": { "summary": "Retrieve the public key associated with the named key", "operationId": "google-cloud-kms-retrieve-public-key", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -19475,9 +17799,7 @@ "post": { "summary": "Re-encrypt existing ciphertext data to a new version", "operationId": "google-cloud-kms-reencrypt", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -19521,9 +17843,7 @@ "post": { "summary": "Signs a message or digest using a named key", "operationId": "google-cloud-kms-sign", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -19567,9 +17887,7 @@ "post": { "summary": "Verify a signature using a named key", "operationId": "google-cloud-kms-verify", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -19603,9 +17921,7 @@ ], "get": { "operationId": "kubernetes-check-configuration", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -19629,9 +17945,7 @@ ], "get": { "operationId": "kubernetes-read-configuration", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -19640,9 +17954,7 @@ }, "post": { "operationId": "kubernetes-configure", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -19661,9 +17973,7 @@ }, "delete": { "operationId": "kubernetes-delete-configuration", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "204": { "description": "empty body" @@ -19696,9 +18006,7 @@ ], "post": { "operationId": "kubernetes-generate-credentials", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -19732,9 +18040,7 @@ ], "get": { "operationId": "kubernetes-list-roles", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "parameters": [ { "name": "list", @@ -19742,9 +18048,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -19789,9 +18093,7 @@ "x-vault-createSupported": true, "get": { "operationId": "kubernetes-read-role", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -19800,9 +18102,7 @@ }, "post": { "operationId": "kubernetes-write-role", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -19821,9 +18121,7 @@ }, "delete": { "operationId": "kubernetes-delete-role", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "204": { "description": "empty body" @@ -19857,9 +18155,7 @@ "x-vault-createSupported": true, "get": { "operationId": "kv-v1-read", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -19868,9 +18164,7 @@ }, "post": { "operationId": "kv-v1-write", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -19890,9 +18184,7 @@ }, "delete": { "operationId": "kv-v1-delete", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "204": { "description": "No Content" @@ -19925,9 +18217,7 @@ ], "get": { "operationId": "kv-v1-list", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "parameters": [ { "name": "list", @@ -19935,9 +18225,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -19987,9 +18275,7 @@ "get": { "summary": "Read the backend level settings.", "operationId": "kv-v2-read-configuration", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK", @@ -20006,9 +18292,7 @@ "post": { "summary": "Configure backend level settings that are applied to every key in the key-value store.", "operationId": "kv-v2-configure", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -20052,9 +18336,7 @@ "x-vault-createSupported": true, "get": { "operationId": "kv-v2-read", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK", @@ -20070,9 +18352,7 @@ }, "post": { "operationId": "kv-v2-write", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -20098,9 +18378,7 @@ }, "delete": { "operationId": "kv-v2-delete", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "204": { "description": "No Content" @@ -20133,9 +18411,7 @@ ], "post": { "operationId": "kv-v2-delete-versions", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -20178,9 +18454,7 @@ ], "post": { "operationId": "kv-v2-destroy-versions", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -20224,9 +18498,7 @@ "x-vault-createSupported": true, "get": { "operationId": "kv-v2-read-metadata", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK", @@ -20242,9 +18514,7 @@ }, "post": { "operationId": "kv-v2-write-metadata", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -20263,9 +18533,7 @@ }, "delete": { "operationId": "kv-v2-delete-metadata-and-all-versions", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "204": { "description": "No Content" @@ -20298,9 +18566,7 @@ ], "get": { "operationId": "kv-v2-list", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "parameters": [ { "name": "list", @@ -20308,9 +18574,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -20354,9 +18618,7 @@ ], "get": { "operationId": "kv-v2-read-subkeys", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK", @@ -20396,9 +18658,7 @@ ], "post": { "operationId": "kv-v2-undelete-versions", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -20433,9 +18693,7 @@ "x-vault-createSupported": true, "get": { "operationId": "ldap-read-configuration", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -20444,9 +18702,7 @@ }, "post": { "operationId": "ldap-configure", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -20465,9 +18721,7 @@ }, "delete": { "operationId": "ldap-delete-configuration", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "204": { "description": "empty body" @@ -20500,9 +18754,7 @@ ], "get": { "operationId": "ldap-request-dynamic-role-credentials", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -20526,9 +18778,7 @@ ], "get": { "operationId": "ldap-library-list", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "parameters": [ { "name": "list", @@ -20536,9 +18786,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -20583,9 +18831,7 @@ "post": { "summary": "Check service accounts in to the library.", "operationId": "ldap-library-force-check-in", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -20630,9 +18876,7 @@ "get": { "summary": "Read a library set.", "operationId": "ldap-library-read", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -20642,9 +18886,7 @@ "post": { "summary": "Update a library set.", "operationId": "ldap-library-configure", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -20664,9 +18906,7 @@ "delete": { "summary": "Delete a library set.", "operationId": "ldap-library-delete", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "204": { "description": "empty body" @@ -20700,9 +18940,7 @@ "post": { "summary": "Check service accounts in to the library.", "operationId": "ldap-library-check-in", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -20746,9 +18984,7 @@ "post": { "summary": "Check a service account out from the library.", "operationId": "ldap-library-check-out", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -20792,9 +19028,7 @@ "get": { "summary": "Check the status of the service accounts in a library set.", "operationId": "ldap-library-check-status", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -20818,9 +19052,7 @@ ], "get": { "operationId": "ldap-list-dynamic-roles", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "parameters": [ { "name": "list", @@ -20828,9 +19060,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -20875,9 +19105,7 @@ "x-vault-createSupported": true, "get": { "operationId": "ldap-read-dynamic-role", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -20886,9 +19114,7 @@ }, "post": { "operationId": "ldap-write-dynamic-role", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -20907,9 +19133,7 @@ }, "delete": { "operationId": "ldap-delete-dynamic-role", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "204": { "description": "empty body" @@ -20942,9 +19166,7 @@ ], "post": { "operationId": "ldap-rotate-static-role", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -20968,9 +19190,7 @@ ], "post": { "operationId": "ldap-rotate-root-credentials", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -21003,9 +19223,7 @@ ], "get": { "operationId": "ldap-request-static-role-credentials", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -21029,9 +19247,7 @@ ], "get": { "operationId": "ldap-list-static-roles", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "parameters": [ { "name": "list", @@ -21039,9 +19255,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -21086,9 +19300,7 @@ "x-vault-createSupported": true, "get": { "operationId": "ldap-read-static-role", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -21097,9 +19309,7 @@ }, "post": { "operationId": "ldap-write-static-role", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -21118,9 +19328,7 @@ }, "delete": { "operationId": "ldap-delete-static-role", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "204": { "description": "empty body" @@ -21144,9 +19352,7 @@ ], "get": { "operationId": "mongo-db-atlas-read-configuration", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -21155,9 +19361,7 @@ }, "post": { "operationId": "mongo-db-atlas-configure", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -21200,9 +19404,7 @@ ], "get": { "operationId": "mongo-db-atlas-generate-credentials", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -21211,9 +19413,7 @@ }, "post": { "operationId": "mongo-db-atlas-generate-credentials2", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -21238,9 +19438,7 @@ "get": { "summary": "List the existing roles in this backend", "operationId": "mongo-db-atlas-list-roles", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "parameters": [ { "name": "list", @@ -21248,9 +19446,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -21295,9 +19491,7 @@ "get": { "summary": "Manage the roles used to generate MongoDB Atlas Programmatic API Keys.", "operationId": "mongo-db-atlas-read-role", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -21307,9 +19501,7 @@ "post": { "summary": "Manage the roles used to generate MongoDB Atlas Programmatic API Keys.", "operationId": "mongo-db-atlas-write-role", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -21329,9 +19521,7 @@ "delete": { "summary": "Manage the roles used to generate MongoDB Atlas Programmatic API Keys.", "operationId": "mongo-db-atlas-delete-role", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "204": { "description": "empty body" @@ -21355,9 +19545,7 @@ "x-vault-createSupported": true, "get": { "operationId": "nomad-read-access-configuration", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -21366,9 +19554,7 @@ }, "post": { "operationId": "nomad-configure-access", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -21387,9 +19573,7 @@ }, "delete": { "operationId": "nomad-delete-access-configuration", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "204": { "description": "empty body" @@ -21413,9 +19597,7 @@ ], "get": { "operationId": "nomad-read-lease-configuration", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -21424,9 +19606,7 @@ }, "post": { "operationId": "nomad-configure-lease", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -21445,9 +19625,7 @@ }, "delete": { "operationId": "nomad-delete-lease-configuration", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "204": { "description": "empty body" @@ -21479,9 +19657,7 @@ ], "get": { "operationId": "nomad-generate-credentials", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -21504,9 +19680,7 @@ ], "get": { "operationId": "nomad-list-roles", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "parameters": [ { "name": "list", @@ -21514,9 +19688,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -21560,9 +19732,7 @@ "x-vault-createSupported": true, "get": { "operationId": "nomad-read-role", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -21571,9 +19741,7 @@ }, "post": { "operationId": "nomad-write-role", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -21592,9 +19760,7 @@ }, "delete": { "operationId": "nomad-delete-role", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "204": { "description": "empty body" @@ -21628,9 +19794,7 @@ "x-vault-unauthenticated": true, "post": { "operationId": "pki-write-acme-account-kid", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -21674,9 +19838,7 @@ "x-vault-unauthenticated": true, "post": { "operationId": "pki-write-acme-authorization-auth_id", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -21729,9 +19891,7 @@ "x-vault-unauthenticated": true, "post": { "operationId": "pki-write-acme-challenge-auth_id-challenge_type", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -21766,9 +19926,7 @@ "x-vault-unauthenticated": true, "get": { "operationId": "pki-read-acme-directory", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -21793,9 +19951,7 @@ "x-vault-unauthenticated": true, "post": { "operationId": "pki-write-acme-new-account", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -21829,9 +19985,7 @@ ], "post": { "operationId": "pki-generate-eab-key", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK", @@ -21863,9 +20017,7 @@ "x-vault-unauthenticated": true, "get": { "operationId": "pki-read-acme-new-nonce", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -21890,9 +20042,7 @@ "x-vault-unauthenticated": true, "post": { "operationId": "pki-write-acme-new-order", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -21936,9 +20086,7 @@ "x-vault-unauthenticated": true, "post": { "operationId": "pki-write-acme-order-order_id", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -21982,9 +20130,7 @@ "x-vault-unauthenticated": true, "post": { "operationId": "pki-write-acme-order-order_id-cert", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -22028,9 +20174,7 @@ "x-vault-unauthenticated": true, "post": { "operationId": "pki-write-acme-order-order_id-finalize", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -22065,9 +20209,7 @@ "x-vault-unauthenticated": true, "post": { "operationId": "pki-write-acme-orders", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -22102,9 +20244,7 @@ "x-vault-unauthenticated": true, "post": { "operationId": "pki-write-acme-revoke-cert", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -22139,9 +20279,7 @@ "x-vault-unauthenticated": true, "get": { "operationId": "pki-read-ca-der", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK", @@ -22173,9 +20311,7 @@ "x-vault-unauthenticated": true, "get": { "operationId": "pki-read-ca-pem", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK", @@ -22207,9 +20343,7 @@ "x-vault-unauthenticated": true, "get": { "operationId": "pki-read-ca-chain-pem", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK", @@ -22241,9 +20375,7 @@ "x-vault-unauthenticated": true, "get": { "operationId": "pki-read-cert-ca-chain", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK", @@ -22275,9 +20407,7 @@ "x-vault-unauthenticated": true, "get": { "operationId": "pki-read-cert-crl", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK", @@ -22309,9 +20439,7 @@ "x-vault-unauthenticated": true, "get": { "operationId": "pki-read-cert-delta-crl", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK", @@ -22352,9 +20480,7 @@ "x-vault-unauthenticated": true, "get": { "operationId": "pki-read-cert", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK", @@ -22395,9 +20521,7 @@ "x-vault-unauthenticated": true, "get": { "operationId": "pki-read-cert-raw-der", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK", @@ -22438,9 +20562,7 @@ "x-vault-unauthenticated": true, "get": { "operationId": "pki-read-cert-raw-pem", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK", @@ -22471,9 +20593,7 @@ ], "get": { "operationId": "pki-list-certs", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "parameters": [ { "name": "list", @@ -22481,9 +20601,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -22518,9 +20636,7 @@ ], "get": { "operationId": "pki-list-revoked-certs", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "parameters": [ { "name": "list", @@ -22528,9 +20644,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -22565,9 +20679,7 @@ ], "get": { "operationId": "pki-read-acme-configuration", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -22576,9 +20688,7 @@ }, "post": { "operationId": "pki-configure-acme", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -22612,9 +20722,7 @@ ], "get": { "operationId": "pki-read-auto-tidy-configuration", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK", @@ -22630,9 +20738,7 @@ }, "post": { "operationId": "pki-configure-auto-tidy", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -22673,9 +20779,7 @@ ], "post": { "operationId": "pki-configure-ca", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -22716,9 +20820,7 @@ ], "get": { "operationId": "pki-read-cluster-configuration", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK", @@ -22734,9 +20836,7 @@ }, "post": { "operationId": "pki-configure-cluster", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -22777,9 +20877,7 @@ ], "get": { "operationId": "pki-read-crl-configuration", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK", @@ -22795,9 +20893,7 @@ }, "post": { "operationId": "pki-configure-crl", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -22838,9 +20934,7 @@ ], "get": { "operationId": "pki-read-issuers-configuration", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK", @@ -22856,9 +20950,7 @@ }, "post": { "operationId": "pki-configure-issuers", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -22899,9 +20991,7 @@ ], "get": { "operationId": "pki-read-keys-configuration", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK", @@ -22917,9 +21007,7 @@ }, "post": { "operationId": "pki-configure-keys", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -22960,9 +21048,7 @@ ], "get": { "operationId": "pki-read-urls-configuration", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK", @@ -22978,9 +21064,7 @@ }, "post": { "operationId": "pki-configure-urls", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -23022,9 +21106,7 @@ "x-vault-unauthenticated": true, "get": { "operationId": "pki-read-crl-der", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK", @@ -23056,9 +21138,7 @@ "x-vault-unauthenticated": true, "get": { "operationId": "pki-read-crl-delta", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK", @@ -23090,9 +21170,7 @@ "x-vault-unauthenticated": true, "get": { "operationId": "pki-read-crl-delta-pem", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK", @@ -23124,9 +21202,7 @@ "x-vault-unauthenticated": true, "get": { "operationId": "pki-read-crl-pem", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK", @@ -23157,9 +21233,7 @@ ], "get": { "operationId": "pki-rotate-crl", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK", @@ -23190,9 +21264,7 @@ ], "get": { "operationId": "pki-rotate-delta-crl", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK", @@ -23223,9 +21295,7 @@ ], "get": { "operationId": "pki-list-eab-keys", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "parameters": [ { "name": "list", @@ -23233,9 +21303,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -23279,9 +21347,7 @@ ], "delete": { "operationId": "pki-delete-eab-key", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "204": { "description": "empty body" @@ -23305,9 +21371,7 @@ ], "post": { "operationId": "pki-cross-sign-intermediate", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -23341,11 +21405,7 @@ "in": "path", "schema": { "type": "string", - "enum": [ - "internal", - "external", - "kms" - ] + "enum": ["internal", "external", "kms"] }, "required": true }, @@ -23362,9 +21422,7 @@ ], "post": { "operationId": "pki-generate-intermediate", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -23405,9 +21463,7 @@ ], "post": { "operationId": "pki-set-signed-intermediate", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -23457,9 +21513,7 @@ ], "post": { "operationId": "pki-issue-with-role", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -23510,9 +21564,7 @@ ], "get": { "operationId": "pki-read-issuer", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK", @@ -23528,9 +21580,7 @@ }, "post": { "operationId": "pki-write-issuer", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -23556,9 +21606,7 @@ }, "delete": { "operationId": "pki-delete-issuer", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "204": { "description": "No Content" @@ -23601,9 +21649,7 @@ "x-vault-unauthenticated": true, "post": { "operationId": "pki-write-issuer-issuer_ref-acme-account-kid", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -23656,9 +21702,7 @@ "x-vault-unauthenticated": true, "post": { "operationId": "pki-write-issuer-issuer_ref-acme-authorization-auth_id", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -23720,9 +21764,7 @@ "x-vault-unauthenticated": true, "post": { "operationId": "pki-write-issuer-issuer_ref-acme-challenge-auth_id-challenge_type", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -23766,9 +21808,7 @@ "x-vault-unauthenticated": true, "get": { "operationId": "pki-read-issuer-issuer_ref-acme-directory", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -23802,9 +21842,7 @@ "x-vault-unauthenticated": true, "post": { "operationId": "pki-write-issuer-issuer_ref-acme-new-account", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -23847,9 +21885,7 @@ ], "post": { "operationId": "pki-generate-eab-key-for-issuer", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK", @@ -23890,9 +21926,7 @@ "x-vault-unauthenticated": true, "get": { "operationId": "pki-read-issuer-issuer_ref-acme-new-nonce", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -23926,9 +21960,7 @@ "x-vault-unauthenticated": true, "post": { "operationId": "pki-write-issuer-issuer_ref-acme-new-order", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -23981,9 +22013,7 @@ "x-vault-unauthenticated": true, "post": { "operationId": "pki-write-issuer-issuer_ref-acme-order-order_id", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -24036,9 +22066,7 @@ "x-vault-unauthenticated": true, "post": { "operationId": "pki-write-issuer-issuer_ref-acme-order-order_id-cert", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -24091,9 +22119,7 @@ "x-vault-unauthenticated": true, "post": { "operationId": "pki-write-issuer-issuer_ref-acme-order-order_id-finalize", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -24137,9 +22163,7 @@ "x-vault-unauthenticated": true, "post": { "operationId": "pki-write-issuer-issuer_ref-acme-orders", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -24183,9 +22207,7 @@ "x-vault-unauthenticated": true, "post": { "operationId": "pki-write-issuer-issuer_ref-acme-revoke-cert", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -24230,9 +22252,7 @@ "x-vault-unauthenticated": true, "get": { "operationId": "pki-issuer-read-crl", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK", @@ -24274,9 +22294,7 @@ "x-vault-unauthenticated": true, "get": { "operationId": "pki-issuer-read-crl-delta", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK", @@ -24318,9 +22336,7 @@ "x-vault-unauthenticated": true, "get": { "operationId": "pki-issuer-read-crl-delta-der", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK", @@ -24362,9 +22378,7 @@ "x-vault-unauthenticated": true, "get": { "operationId": "pki-issuer-read-crl-delta-pem", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK", @@ -24406,9 +22420,7 @@ "x-vault-unauthenticated": true, "get": { "operationId": "pki-issuer-read-crl-der", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK", @@ -24450,9 +22462,7 @@ "x-vault-unauthenticated": true, "get": { "operationId": "pki-issuer-read-crl-pem", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK", @@ -24494,9 +22504,7 @@ "x-vault-unauthenticated": true, "get": { "operationId": "pki-read-issuer-der", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK", @@ -24549,9 +22557,7 @@ ], "post": { "operationId": "pki-issuer-issue-with-role", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -24603,9 +22609,7 @@ "x-vault-unauthenticated": true, "get": { "operationId": "pki-read-issuer-json", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK", @@ -24650,9 +22654,7 @@ "x-vault-unauthenticated": true, "get": { "operationId": "pki-read-issuer-pem", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK", @@ -24696,9 +22698,7 @@ ], "post": { "operationId": "pki-issuer-resign-crls", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -24749,9 +22749,7 @@ ], "post": { "operationId": "pki-revoke-issuer", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK", @@ -24810,9 +22808,7 @@ "x-vault-unauthenticated": true, "post": { "operationId": "pki-write-issuer-issuer_ref-roles-role-acme-account-kid", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -24874,9 +22870,7 @@ "x-vault-unauthenticated": true, "post": { "operationId": "pki-write-issuer-issuer_ref-roles-role-acme-authorization-auth_id", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -24947,9 +22941,7 @@ "x-vault-unauthenticated": true, "post": { "operationId": "pki-write-issuer-issuer_ref-roles-role-acme-challenge-auth_id-challenge_type", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -25002,9 +22994,7 @@ "x-vault-unauthenticated": true, "get": { "operationId": "pki-read-issuer-issuer_ref-roles-role-acme-directory", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -25047,9 +23037,7 @@ "x-vault-unauthenticated": true, "post": { "operationId": "pki-write-issuer-issuer_ref-roles-role-acme-new-account", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -25101,9 +23089,7 @@ ], "post": { "operationId": "pki-generate-eab-key-for-issuer-and-role", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK", @@ -25153,9 +23139,7 @@ "x-vault-unauthenticated": true, "get": { "operationId": "pki-read-issuer-issuer_ref-roles-role-acme-new-nonce", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -25198,9 +23182,7 @@ "x-vault-unauthenticated": true, "post": { "operationId": "pki-write-issuer-issuer_ref-roles-role-acme-new-order", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -25262,9 +23244,7 @@ "x-vault-unauthenticated": true, "post": { "operationId": "pki-write-issuer-issuer_ref-roles-role-acme-order-order_id", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -25326,9 +23306,7 @@ "x-vault-unauthenticated": true, "post": { "operationId": "pki-write-issuer-issuer_ref-roles-role-acme-order-order_id-cert", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -25390,9 +23368,7 @@ "x-vault-unauthenticated": true, "post": { "operationId": "pki-write-issuer-issuer_ref-roles-role-acme-order-order_id-finalize", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -25445,9 +23421,7 @@ "x-vault-unauthenticated": true, "post": { "operationId": "pki-write-issuer-issuer_ref-roles-role-acme-orders", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -25500,9 +23474,7 @@ "x-vault-unauthenticated": true, "post": { "operationId": "pki-write-issuer-issuer_ref-roles-role-acme-revoke-cert", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -25546,9 +23518,7 @@ ], "post": { "operationId": "pki-issuer-sign-intermediate", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -25599,9 +23569,7 @@ ], "post": { "operationId": "pki-issuer-sign-revocation-list", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -25652,9 +23620,7 @@ ], "post": { "operationId": "pki-issuer-sign-self-issued", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -25705,9 +23671,7 @@ ], "post": { "operationId": "pki-issuer-sign-verbatim", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -25767,9 +23731,7 @@ ], "post": { "operationId": "pki-issuer-sign-verbatim-with-role", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -25829,9 +23791,7 @@ ], "post": { "operationId": "pki-issuer-sign-with-role", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -25873,9 +23833,7 @@ "x-vault-unauthenticated": true, "get": { "operationId": "pki-list-issuers", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "parameters": [ { "name": "list", @@ -25883,9 +23841,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -25913,11 +23869,7 @@ "in": "path", "schema": { "type": "string", - "enum": [ - "internal", - "external", - "kms" - ] + "enum": ["internal", "external", "kms"] }, "required": true }, @@ -25934,9 +23886,7 @@ ], "post": { "operationId": "pki-issuers-generate-intermediate", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -25970,11 +23920,7 @@ "in": "path", "schema": { "type": "string", - "enum": [ - "internal", - "external", - "kms" - ] + "enum": ["internal", "external", "kms"] }, "required": true }, @@ -25991,9 +23937,7 @@ ], "post": { "operationId": "pki-issuers-generate-root", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -26034,9 +23978,7 @@ ], "post": { "operationId": "pki-issuers-import-bundle", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -26077,9 +24019,7 @@ ], "post": { "operationId": "pki-issuers-import-cert", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -26130,9 +24070,7 @@ ], "get": { "operationId": "pki-read-key", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK", @@ -26148,9 +24086,7 @@ }, "post": { "operationId": "pki-write-key", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -26176,9 +24112,7 @@ }, "delete": { "operationId": "pki-delete-key", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "204": { "description": "No Content" @@ -26202,9 +24136,7 @@ ], "get": { "operationId": "pki-list-keys", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "parameters": [ { "name": "list", @@ -26212,9 +24144,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -26249,9 +24179,7 @@ ], "post": { "operationId": "pki-generate-exported-key", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -26292,9 +24220,7 @@ ], "post": { "operationId": "pki-generate-internal-key", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -26335,9 +24261,7 @@ ], "post": { "operationId": "pki-generate-kms-key", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -26378,9 +24302,7 @@ ], "post": { "operationId": "pki-import-key", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -26422,9 +24344,7 @@ "x-vault-unauthenticated": true, "post": { "operationId": "pki-query-ocsp", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -26458,9 +24378,7 @@ "x-vault-unauthenticated": true, "get": { "operationId": "pki-query-ocsp-with-get-req", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -26484,9 +24402,7 @@ ], "post": { "operationId": "pki-revoke", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -26527,9 +24443,7 @@ ], "post": { "operationId": "pki-revoke-with-key", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -26570,9 +24484,7 @@ ], "get": { "operationId": "pki-list-roles", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "parameters": [ { "name": "list", @@ -26580,9 +24492,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -26626,9 +24536,7 @@ ], "get": { "operationId": "pki-read-role", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK", @@ -26644,9 +24552,7 @@ }, "post": { "operationId": "pki-write-role", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -26672,9 +24578,7 @@ }, "delete": { "operationId": "pki-delete-role", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "204": { "description": "No Content" @@ -26717,9 +24621,7 @@ "x-vault-unauthenticated": true, "post": { "operationId": "pki-write-roles-role-acme-account-kid", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -26772,9 +24674,7 @@ "x-vault-unauthenticated": true, "post": { "operationId": "pki-write-roles-role-acme-authorization-auth_id", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -26836,9 +24736,7 @@ "x-vault-unauthenticated": true, "post": { "operationId": "pki-write-roles-role-acme-challenge-auth_id-challenge_type", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -26882,9 +24780,7 @@ "x-vault-unauthenticated": true, "get": { "operationId": "pki-read-roles-role-acme-directory", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -26918,9 +24814,7 @@ "x-vault-unauthenticated": true, "post": { "operationId": "pki-write-roles-role-acme-new-account", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -26963,9 +24857,7 @@ ], "post": { "operationId": "pki-generate-eab-key-for-role", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK", @@ -27006,9 +24898,7 @@ "x-vault-unauthenticated": true, "get": { "operationId": "pki-read-roles-role-acme-new-nonce", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -27042,9 +24932,7 @@ "x-vault-unauthenticated": true, "post": { "operationId": "pki-write-roles-role-acme-new-order", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -27097,9 +24985,7 @@ "x-vault-unauthenticated": true, "post": { "operationId": "pki-write-roles-role-acme-order-order_id", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -27152,9 +25038,7 @@ "x-vault-unauthenticated": true, "post": { "operationId": "pki-write-roles-role-acme-order-order_id-cert", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -27207,9 +25091,7 @@ "x-vault-unauthenticated": true, "post": { "operationId": "pki-write-roles-role-acme-order-order_id-finalize", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -27253,9 +25135,7 @@ "x-vault-unauthenticated": true, "post": { "operationId": "pki-write-roles-role-acme-orders", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -27299,9 +25179,7 @@ "x-vault-unauthenticated": true, "post": { "operationId": "pki-write-roles-role-acme-revoke-cert", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -27336,9 +25214,7 @@ "x-vault-sudo": true, "delete": { "operationId": "pki-delete-root", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -27355,11 +25231,7 @@ "in": "path", "schema": { "type": "string", - "enum": [ - "internal", - "external", - "kms" - ] + "enum": ["internal", "external", "kms"] }, "required": true }, @@ -27376,9 +25248,7 @@ ], "post": { "operationId": "pki-generate-root", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -27419,9 +25289,7 @@ ], "post": { "operationId": "pki-replace-root", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -27455,11 +25323,7 @@ "in": "path", "schema": { "type": "string", - "enum": [ - "internal", - "external", - "kms" - ] + "enum": ["internal", "external", "kms"] }, "required": true }, @@ -27476,9 +25340,7 @@ ], "post": { "operationId": "pki-rotate-root", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -27519,9 +25381,7 @@ ], "post": { "operationId": "pki-root-sign-intermediate", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -27563,9 +25423,7 @@ "x-vault-sudo": true, "post": { "operationId": "pki-root-sign-self-issued", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -27606,9 +25464,7 @@ ], "post": { "operationId": "pki-sign-verbatim", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -27658,9 +25514,7 @@ ], "post": { "operationId": "pki-sign-verbatim-with-role", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -27710,9 +25564,7 @@ ], "post": { "operationId": "pki-sign-with-role", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -27753,9 +25605,7 @@ ], "post": { "operationId": "pki-tidy", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -27789,9 +25639,7 @@ ], "post": { "operationId": "pki-tidy-cancel", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK", @@ -27822,9 +25670,7 @@ ], "get": { "operationId": "pki-tidy-status", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK", @@ -27856,9 +25702,7 @@ "post": { "summary": "Configure the connection URI, username, and password to talk to RabbitMQ management HTTP API.", "operationId": "rabbit-mq-configure-connection", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -27892,9 +25736,7 @@ ], "get": { "operationId": "rabbit-mq-read-lease-configuration", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -27903,9 +25745,7 @@ }, "post": { "operationId": "rabbit-mq-configure-lease", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -27949,9 +25789,7 @@ "get": { "summary": "Request RabbitMQ credentials for a certain role.", "operationId": "rabbit-mq-request-credentials", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -27976,9 +25814,7 @@ "get": { "summary": "Manage the roles that can be created with this backend.", "operationId": "rabbit-mq-list-roles", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "parameters": [ { "name": "list", @@ -27986,9 +25822,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -28033,9 +25867,7 @@ "get": { "summary": "Manage the roles that can be created with this backend.", "operationId": "rabbit-mq-read-role", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -28045,9 +25877,7 @@ "post": { "summary": "Manage the roles that can be created with this backend.", "operationId": "rabbit-mq-write-role", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -28067,9 +25897,7 @@ "delete": { "summary": "Manage the roles that can be created with this backend.", "operationId": "rabbit-mq-delete-role", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "204": { "description": "empty body" @@ -28093,9 +25921,7 @@ ], "get": { "operationId": "ssh-read-ca-configuration", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -28104,9 +25930,7 @@ }, "post": { "operationId": "ssh-configure-ca", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -28125,9 +25949,7 @@ }, "delete": { "operationId": "ssh-delete-ca-configuration", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "204": { "description": "empty body" @@ -28151,9 +25973,7 @@ ], "get": { "operationId": "ssh-read-zero-address-configuration", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -28162,9 +25982,7 @@ }, "post": { "operationId": "ssh-configure-zero-address", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -28183,9 +26001,7 @@ }, "delete": { "operationId": "ssh-delete-zero-address-configuration", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "204": { "description": "empty body" @@ -28219,9 +26035,7 @@ "post": { "summary": "Creates a credential for establishing SSH connection with the remote host.", "operationId": "ssh-generate-credentials", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -28264,9 +26078,7 @@ ], "post": { "operationId": "ssh-issue-certificate", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -28301,9 +26113,7 @@ "post": { "summary": "List all the roles associated with the given IP address.", "operationId": "ssh-list-roles-by-ip", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -28339,9 +26149,7 @@ "get": { "summary": "Retrieve the public key.", "operationId": "ssh-read-public-key", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -28366,9 +26174,7 @@ "get": { "summary": "Manage the 'roles' that can be created with this backend.", "operationId": "ssh-list-roles", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "parameters": [ { "name": "list", @@ -28376,9 +26182,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -28423,9 +26227,7 @@ "get": { "summary": "Manage the 'roles' that can be created with this backend.", "operationId": "ssh-read-role", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -28435,9 +26237,7 @@ "post": { "summary": "Manage the 'roles' that can be created with this backend.", "operationId": "ssh-write-role", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -28457,9 +26257,7 @@ "delete": { "summary": "Manage the 'roles' that can be created with this backend.", "operationId": "ssh-delete-role", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "204": { "description": "empty body" @@ -28493,9 +26291,7 @@ "post": { "summary": "Request signing an SSH key using a certain role with the provided details.", "operationId": "ssh-sign-certificate", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -28530,9 +26326,7 @@ "delete": { "summary": "This endpoint removes the stored host keys used for the removed Dynamic Key feature, if present.", "operationId": "ssh-tidy-dynamic-host-keys", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "204": { "description": "empty body" @@ -28558,9 +26352,7 @@ "post": { "summary": "Validate the OTP provided by Vault SSH Agent.", "operationId": "ssh-verify-otp", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -28595,9 +26387,7 @@ "x-vault-createSupported": true, "get": { "operationId": "terraform-cloud-read-configuration", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -28606,9 +26396,7 @@ }, "post": { "operationId": "terraform-cloud-configure", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -28627,9 +26415,7 @@ }, "delete": { "operationId": "terraform-cloud-delete-configuration", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "204": { "description": "empty body" @@ -28662,9 +26448,7 @@ ], "get": { "operationId": "terraform-cloud-generate-credentials", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -28673,9 +26457,7 @@ }, "post": { "operationId": "terraform-cloud-generate-credentials2", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -28699,9 +26481,7 @@ ], "get": { "operationId": "terraform-cloud-list-roles", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "parameters": [ { "name": "list", @@ -28709,9 +26489,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -28755,9 +26533,7 @@ ], "get": { "operationId": "terraform-cloud-read-role", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -28766,9 +26542,7 @@ }, "post": { "operationId": "terraform-cloud-write-role", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -28787,9 +26561,7 @@ }, "delete": { "operationId": "terraform-cloud-delete-role", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "204": { "description": "empty body" @@ -28822,9 +26594,7 @@ ], "post": { "operationId": "terraform-cloud-rotate-role", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -28857,9 +26627,7 @@ ], "get": { "operationId": "totp-generate-code", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -28868,9 +26636,7 @@ }, "post": { "operationId": "totp-validate-code", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -28905,9 +26671,7 @@ "get": { "summary": "Manage the keys that can be created with this backend.", "operationId": "totp-list-keys", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "parameters": [ { "name": "list", @@ -28915,9 +26679,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -28961,9 +26723,7 @@ ], "get": { "operationId": "totp-read-key", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -28972,9 +26732,7 @@ }, "post": { "operationId": "totp-create-key", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -28993,9 +26751,7 @@ }, "delete": { "operationId": "totp-delete-key", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "204": { "description": "empty body" @@ -29029,9 +26785,7 @@ "get": { "summary": "Backup the named key", "operationId": "transit-back-up-key", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -29074,9 +26828,7 @@ "get": { "summary": "Securely export named encryption or signing key", "operationId": "transit-byok-key", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -29128,9 +26880,7 @@ "get": { "summary": "Securely export named encryption or signing key", "operationId": "transit-byok-key-version", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -29155,9 +26905,7 @@ "get": { "summary": "Returns the size of the active cache", "operationId": "transit-read-cache-configuration", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -29167,9 +26915,7 @@ "post": { "summary": "Configures a new cache of the specified size", "operationId": "transit-configure-cache", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -29203,9 +26949,7 @@ ], "get": { "operationId": "transit-read-keys-configuration", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -29214,9 +26958,7 @@ }, "post": { "operationId": "transit-configure-keys", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -29269,9 +27011,7 @@ "post": { "summary": "Generate a data key", "operationId": "transit-generate-data-key", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -29315,9 +27055,7 @@ "post": { "summary": "Decrypt a ciphertext value using a named key", "operationId": "transit-decrypt", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -29362,9 +27100,7 @@ "post": { "summary": "Encrypt a plaintext value or a batch of plaintext\nblocks using a named key", "operationId": "transit-encrypt", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -29417,9 +27153,7 @@ "get": { "summary": "Export named encryption or signing key", "operationId": "transit-export-key", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -29471,9 +27205,7 @@ "get": { "summary": "Export named encryption or signing key", "operationId": "transit-export-key-version", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -29498,9 +27230,7 @@ "post": { "summary": "Generate a hash sum for input data", "operationId": "transit-hash", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -29544,9 +27274,7 @@ "post": { "summary": "Generate a hash sum for input data", "operationId": "transit-hash-with-algorithm", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -29590,9 +27318,7 @@ "post": { "summary": "Generate an HMAC for input data using the named key", "operationId": "transit-generate-hmac", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -29645,9 +27371,7 @@ "post": { "summary": "Generate an HMAC for input data using the named key", "operationId": "transit-generate-hmac-with-algorithm", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -29682,9 +27406,7 @@ "get": { "summary": "Managed named encryption keys", "operationId": "transit-list-keys", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "parameters": [ { "name": "list", @@ -29692,9 +27414,7 @@ "in": "query", "schema": { "type": "string", - "enum": [ - "true" - ] + "enum": ["true"] }, "required": true } @@ -29738,9 +27458,7 @@ ], "get": { "operationId": "transit-read-key", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -29749,9 +27467,7 @@ }, "post": { "operationId": "transit-create-key", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -29770,9 +27486,7 @@ }, "delete": { "operationId": "transit-delete-key", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "204": { "description": "empty body" @@ -29806,9 +27520,7 @@ "post": { "summary": "Configure a named encryption key", "operationId": "transit-configure-key", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -29851,9 +27563,7 @@ ], "post": { "operationId": "transit-generate-csr-for-key", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -29897,9 +27607,7 @@ "post": { "summary": "Imports an externally-generated key into a new transit key", "operationId": "transit-import-key", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -29943,9 +27651,7 @@ "post": { "summary": "Imports an externally-generated key into an existing imported key", "operationId": "transit-import-key-version", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -29989,9 +27695,7 @@ "post": { "summary": "Rotate named encryption key", "operationId": "transit-rotate-key", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -30034,9 +27738,7 @@ ], "post": { "operationId": "transit-set-certificate-for-key", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -30080,9 +27782,7 @@ "post": { "summary": "Trim key versions of a named key", "operationId": "transit-trim-key", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -30117,9 +27817,7 @@ "post": { "summary": "Generate random bytes", "operationId": "transit-generate-random", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -30164,9 +27862,7 @@ "post": { "summary": "Generate random bytes", "operationId": "transit-generate-random-with-source", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -30220,9 +27916,7 @@ "post": { "summary": "Generate random bytes", "operationId": "transit-generate-random-with-source-and-bytes", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -30266,9 +27960,7 @@ "post": { "summary": "Generate random bytes", "operationId": "transit-generate-random-with-bytes", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -30303,9 +27995,7 @@ "post": { "summary": "Restore the named key", "operationId": "transit-restore-key", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -30349,9 +28039,7 @@ "post": { "summary": "Restore the named key", "operationId": "transit-restore-and-rename-key", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -30395,9 +28083,7 @@ "post": { "summary": "Rewrap ciphertext", "operationId": "transit-rewrap", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -30441,9 +28127,7 @@ "post": { "summary": "Generate a signature for input data using the named key", "operationId": "transit-sign", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -30496,9 +28180,7 @@ "post": { "summary": "Generate a signature for input data using the named key", "operationId": "transit-sign-with-algorithm", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -30542,9 +28224,7 @@ "post": { "summary": "Verify a signature or HMAC for input data created using the named key", "operationId": "transit-verify", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -30597,9 +28277,7 @@ "post": { "summary": "Verify a signature or HMAC for input data created using the named key", "operationId": "transit-verify-with-algorithm", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "requestBody": { "required": true, "content": { @@ -30634,9 +28312,7 @@ "get": { "summary": "Returns the public key to use for wrapping imported keys", "operationId": "transit-read-wrapping-key", - "tags": [ - "secrets" - ], + "tags": ["secrets"], "responses": { "200": { "description": "OK" @@ -30676,9 +28352,7 @@ "description": "Name of the role against which the login is being attempted. If 'role' is not specified, then the login endpoint looks for a role name in the ARN returned by the GetCallerIdentity request. If a matching role is not found, login fails." } }, - "required": [ - "role" - ] + "required": ["role"] }, "AliCloudWriteAuthRoleRequest": { "type": "object", @@ -30968,9 +28642,9 @@ "description": "Number of times a secret ID can access the role, after which the secret ID will expire." }, "secret_id_ttl": { - "type": "string", + "type": "integer", "description": "Duration in seconds after which the issued secret ID expires.", - "format": "duration" + "format": "int64" }, "token_bound_cidrs": { "type": "array", @@ -31025,9 +28699,9 @@ "description": "Number of times a secret ID can access the role, after which the secret ID will expire." }, "secret_id_ttl": { - "type": "string", + "type": "integer", "description": "Duration in seconds after which the issued secret ID expires.", - "format": "duration" + "format": "int64" }, "token_bound_cidrs": { "type": "array", @@ -31073,15 +28747,15 @@ "type": "object", "properties": { "period": { - "type": "string", + "type": "integer", "description": "Use \"token_period\" instead. If this and \"token_period\" are both specified, only \"token_period\" will be used.", - "format": "duration", + "format": "int64", "deprecated": true }, "token_period": { - "type": "string", - "description": "If set, tokens created via this role will have no max lifetime; instead, their renewal period will be fixed to this value. This takes an integer number of seconds, or a string duration (e.g. \"24h\").", - "format": "duration" + "type": "integer", + "description": "If set, tokens created via this role will have no max lifetime; instead, their renewal period will be fixed to this value. This takes an integer number of seconds.", + "format": "int64" } } }, @@ -31126,9 +28800,9 @@ "description": "If true, the secret identifiers generated using this role will be cluster local. This can only be set during role creation and once set, it can't be reset later" }, "period": { - "type": "string", + "type": "integer", "description": "Use \"token_period\" instead. If this and \"token_period\" are both specified, only \"token_period\" will be used.", - "format": "duration", + "format": "int64", "deprecated": true }, "policies": { @@ -31151,9 +28825,9 @@ "description": "Number of times a secret ID can access the role, after which the secret ID will expire." }, "secret_id_ttl": { - "type": "string", + "type": "integer", "description": "Duration in seconds after which the issued secret ID expires.", - "format": "duration" + "format": "int64" }, "token_bound_cidrs": { "type": "array", @@ -31163,14 +28837,14 @@ } }, "token_explicit_max_ttl": { - "type": "string", + "type": "integer", "description": "If set, tokens created via this role carry an explicit maximum TTL. During renewal, the current maximum TTL values of the role and the mount are not checked for changes, and any updates to these values will have no effect on the token being renewed.", - "format": "duration" + "format": "int64" }, "token_max_ttl": { - "type": "string", + "type": "integer", "description": "The maximum lifetime of the generated token", - "format": "duration" + "format": "int64" }, "token_no_default_policy": { "type": "boolean", @@ -31181,9 +28855,9 @@ "description": "The maximum number of times a token may be used, a value of zero means unlimited" }, "token_period": { - "type": "string", + "type": "integer", "description": "If set, tokens created via this role will have no max lifetime; instead, their renewal period will be fixed to this value.", - "format": "duration" + "format": "int64" }, "token_policies": { "type": "array", @@ -31193,9 +28867,9 @@ } }, "token_ttl": { - "type": "string", + "type": "integer", "description": "The initial ttl of the token to generate", - "format": "duration" + "format": "int64" }, "token_type": { "type": "string", @@ -31229,9 +28903,9 @@ "type": "object", "properties": { "secret_id_ttl": { - "type": "string", + "type": "integer", "description": "Duration in seconds after which the issued secret ID should expire. Defaults to 0, meaning no expiration.", - "format": "duration" + "format": "int64" } } }, @@ -31251,9 +28925,9 @@ "type": "object", "properties": { "token_max_ttl": { - "type": "string", + "type": "integer", "description": "The maximum lifetime of the generated token", - "format": "duration" + "format": "int64" } } }, @@ -31270,9 +28944,9 @@ "type": "object", "properties": { "token_ttl": { - "type": "string", + "type": "integer", "description": "The initial ttl of the token to generate", - "format": "duration" + "format": "int64" } } }, @@ -31350,9 +29024,9 @@ "description": "Number of times a secret ID can access the role, after which the secret ID will expire." }, "secret_id_ttl": { - "type": "string", + "type": "integer", "description": "Duration in seconds after which the issued secret ID expires.", - "format": "duration" + "format": "int64" } } }, @@ -31611,9 +29285,9 @@ "description": "Number of times a secret ID can access the role, after which the secret ID will expire." }, "secret_id_ttl": { - "type": "string", + "type": "integer", "description": "Duration in seconds after which the issued secret ID expires.", - "format": "duration" + "format": "int64" } } }, @@ -32062,9 +29736,7 @@ "items": { "type": "string" }, - "default": [ - "default" - ], + "default": ["default"], "x-vault-displayAttrs": { "name": "ec2_metadata", "value": "field1,field2" @@ -32081,9 +29753,7 @@ "items": { "type": "string" }, - "default": [ - "default" - ], + "default": ["default"], "x-vault-displayAttrs": { "name": "iam_metadata", "value": "field1,field2" @@ -33615,12 +31285,7 @@ } } }, - "required": [ - "cf_instance_cert", - "role", - "signature", - "signing_time" - ] + "required": ["cf_instance_cert", "role", "signature", "signing_time"] }, "CloudFoundryWriteRoleRequest": { "type": "object", @@ -34635,9 +32300,7 @@ "deprecated": true } }, - "required": [ - "organization" - ] + "required": ["organization"] }, "GithubLoginRequest": { "type": "object", @@ -34692,9 +32355,7 @@ "items": { "type": "string" }, - "default": [ - "default" - ], + "default": ["default"], "x-vault-displayAttrs": { "name": "gce_metadata", "value": "field1,field2" @@ -34716,9 +32377,7 @@ "items": { "type": "string" }, - "default": [ - "default" - ], + "default": ["default"], "x-vault-displayAttrs": { "name": "iam_metadata", "value": "field1,field2" @@ -36087,12 +33746,7 @@ "dereference_aliases": { "type": "string", "description": "When aliases should be dereferenced on search operations. Accepted values are 'never', 'finding', 'searching', 'always'. Defaults to 'never'.", - "enum": [ - "never", - "finding", - "searching", - "always" - ], + "enum": ["never", "finding", "searching", "always"], "default": "never" }, "discoverdn": { @@ -36154,12 +33808,7 @@ "tls_max_version": { "type": "string", "description": "Maximum TLS version to use. Accepted values are 'tls10', 'tls11', 'tls12' or 'tls13'. Defaults to 'tls12'", - "enum": [ - "tls10", - "tls11", - "tls12", - "tls13" - ], + "enum": ["tls10", "tls11", "tls12", "tls13"], "default": "tls12", "x-vault-displayAttrs": { "name": "Maximum TLS Version" @@ -36168,12 +33817,7 @@ "tls_min_version": { "type": "string", "description": "Minimum TLS version to use. Accepted values are 'tls10', 'tls11', 'tls12' or 'tls13'. Defaults to 'tls12'", - "enum": [ - "tls10", - "tls11", - "tls12", - "tls13" - ], + "enum": ["tls10", "tls11", "tls12", "tls13"], "default": "tls12", "x-vault-displayAttrs": { "name": "Minimum TLS Version" @@ -36480,9 +34124,7 @@ "format": "duration" } }, - "required": [ - "kubernetes_namespace" - ] + "required": ["kubernetes_namespace"] }, "KubernetesLoginRequest": { "type": "object", @@ -37009,12 +34651,7 @@ "dereference_aliases": { "type": "string", "description": "When aliases should be dereferenced on search operations. Accepted values are 'never', 'finding', 'searching', 'always'. Defaults to 'never'.", - "enum": [ - "never", - "finding", - "searching", - "always" - ], + "enum": ["never", "finding", "searching", "always"], "default": "never" }, "discoverdn": { @@ -37076,12 +34713,7 @@ "tls_max_version": { "type": "string", "description": "Maximum TLS version to use. Accepted values are 'tls10', 'tls11', 'tls12' or 'tls13'. Defaults to 'tls12'", - "enum": [ - "tls10", - "tls11", - "tls12", - "tls13" - ], + "enum": ["tls10", "tls11", "tls12", "tls13"], "default": "tls12", "x-vault-displayAttrs": { "name": "Maximum TLS Version" @@ -37090,12 +34722,7 @@ "tls_min_version": { "type": "string", "description": "Minimum TLS version to use. Accepted values are 'tls10', 'tls11', 'tls12' or 'tls13'. Defaults to 'tls12'", - "enum": [ - "tls10", - "tls11", - "tls12", - "tls13" - ], + "enum": ["tls10", "tls11", "tls12", "tls13"], "default": "tls12", "x-vault-displayAttrs": { "name": "Minimum TLS Version" @@ -37308,12 +34935,7 @@ "dereference_aliases": { "type": "string", "description": "When aliases should be dereferenced on search operations. Accepted values are 'never', 'finding', 'searching', 'always'. Defaults to 'never'.", - "enum": [ - "never", - "finding", - "searching", - "always" - ], + "enum": ["never", "finding", "searching", "always"], "default": "never" }, "discoverdn": { @@ -37394,12 +35016,7 @@ "tls_max_version": { "type": "string", "description": "Maximum TLS version to use. Accepted values are 'tls10', 'tls11', 'tls12' or 'tls13'. Defaults to 'tls12'", - "enum": [ - "tls10", - "tls11", - "tls12", - "tls13" - ], + "enum": ["tls10", "tls11", "tls12", "tls13"], "default": "tls12", "x-vault-displayAttrs": { "name": "Maximum TLS Version" @@ -37408,12 +35025,7 @@ "tls_min_version": { "type": "string", "description": "Minimum TLS version to use. Accepted values are 'tls10', 'tls11', 'tls12' or 'tls13'. Defaults to 'tls12'", - "enum": [ - "tls10", - "tls11", - "tls12", - "tls13" - ], + "enum": ["tls10", "tls11", "tls12", "tls13"], "default": "tls12", "x-vault-displayAttrs": { "name": "Minimum TLS Version" @@ -37581,10 +35193,7 @@ "description": "The template used to create a username" } }, - "required": [ - "creation_ldif", - "deletion_ldif" - ] + "required": ["creation_ldif", "deletion_ldif"] }, "LdapWriteGroupRequest": { "type": "object", @@ -37925,10 +35534,7 @@ "description": "The unique identifier for this MFA method." } }, - "required": [ - "entity_id", - "method_id" - ] + "required": ["entity_id", "method_id"] }, "MfaAdminGenerateTotpSecretRequest": { "type": "object", @@ -37942,10 +35548,7 @@ "description": "The unique identifier for this MFA method." } }, - "required": [ - "entity_id", - "method_id" - ] + "required": ["entity_id", "method_id"] }, "MfaCreateDuoMethodRequest": { "type": "object", @@ -38086,9 +35689,7 @@ "description": "The unique identifier for this MFA method." } }, - "required": [ - "method_id" - ] + "required": ["method_id"] }, "MfaUpdateDuoMethodRequest": { "type": "object", @@ -38234,10 +35835,7 @@ "description": "ID for this MFA request" } }, - "required": [ - "mfa_payload", - "mfa_request_id" - ] + "required": ["mfa_payload", "mfa_request_id"] }, "MfaWriteLoginEnforcementRequest": { "type": "object", @@ -38278,9 +35876,7 @@ } } }, - "required": [ - "mfa_method_ids" - ] + "required": ["mfa_method_ids"] }, "MongoDbAtlasConfigureRequest": { "type": "object", @@ -38297,10 +35893,7 @@ "description": "MongoDB Atlas Programmatic Public Key" } }, - "required": [ - "private_key", - "public_key" - ] + "required": ["private_key", "public_key"] }, "MongoDbAtlasWriteRoleRequest": { "type": "object", @@ -38352,9 +35945,7 @@ "format": "duration" } }, - "required": [ - "roles" - ] + "required": ["roles"] }, "MountsEnableSecretsEngineRequest": { "type": "object", @@ -38858,12 +36449,7 @@ "description": "The value used to maintain state between the authentication request and client." } }, - "required": [ - "client_id", - "redirect_uri", - "response_type", - "scope" - ] + "required": ["client_id", "redirect_uri", "response_type", "scope"] }, "OidcProviderTokenRequest": { "type": "object", @@ -38893,11 +36479,7 @@ "description": "The callback location where the authentication response was sent." } }, - "required": [ - "code", - "grant_type", - "redirect_uri" - ] + "required": ["code", "grant_type", "redirect_uri"] }, "OidcRotateKeyRequest": { "type": "object", @@ -39043,9 +36625,7 @@ "default": "24h" } }, - "required": [ - "key" - ] + "required": ["key"] }, "OidcWriteScopeRequest": { "type": "object", @@ -39322,9 +36902,7 @@ "items": { "type": "string" }, - "default": [ - "*" - ] + "default": ["*"] }, "allowed_roles": { "type": "array", @@ -39332,9 +36910,7 @@ "items": { "type": "string" }, - "default": [ - "*" - ] + "default": ["*"] }, "default_directory_policy": { "type": "string", @@ -39842,20 +37418,12 @@ "exported": { "type": "string", "description": "Must be \"internal\", \"exported\" or \"kms\". If set to \"exported\", the generated private key will be returned. This is your *only* chance to retrieve the private key!", - "enum": [ - "internal", - "external", - "kms" - ] + "enum": ["internal", "external", "kms"] }, "format": { "type": "string", "description": "Format for returned data. Can be \"pem\", \"der\", or \"pem_bundle\". If \"pem_bundle\", any private key and issuing cert will be appended to the certificate pem. If \"der\", the value will be base64 encoded. Defaults to \"pem\".", - "enum": [ - "pem", - "der", - "pem_bundle" - ], + "enum": ["pem", "der", "pem_bundle"], "default": "pem", "x-vault-displayAttrs": { "value": "pem" @@ -39891,11 +37459,7 @@ "key_type": { "type": "string", "description": "The type of key to use; defaults to RSA. \"rsa\" \"ec\" and \"ed25519\" are the only valid values.", - "enum": [ - "rsa", - "ec", - "ed25519" - ], + "enum": ["rsa", "ec", "ed25519"], "default": "rsa", "x-vault-displayAttrs": { "value": "rsa" @@ -39972,12 +37536,7 @@ "private_key_format": { "type": "string", "description": "Format for the returned private key. Generally the default will be controlled by the \"format\" parameter as either base64-encoded DER or PEM-encoded DER. However, this can be set to \"pkcs8\" to have the returned private key contain base64-encoded pkcs8 or PEM-encoded pkcs8 instead. Defaults to \"der\".", - "enum": [ - "", - "der", - "pem", - "pkcs8" - ], + "enum": ["", "der", "pem", "pkcs8"], "default": "der", "x-vault-displayAttrs": { "value": "der" @@ -40175,11 +37734,7 @@ "key_type": { "type": "string", "description": "The type of key to use; defaults to RSA. \"rsa\" \"ec\" and \"ed25519\" are the only valid values.", - "enum": [ - "rsa", - "ec", - "ed25519" - ], + "enum": ["rsa", "ec", "ed25519"], "default": "rsa", "x-vault-displayAttrs": { "value": "rsa" @@ -40252,11 +37807,7 @@ "format": { "type": "string", "description": "Format for returned data. Can be \"pem\", \"der\", or \"pem_bundle\". If \"pem_bundle\", any private key and issuing cert will be appended to the certificate pem. If \"der\", the value will be base64 encoded. Defaults to \"pem\".", - "enum": [ - "pem", - "der", - "pem_bundle" - ], + "enum": ["pem", "der", "pem_bundle"], "default": "pem", "x-vault-displayAttrs": { "value": "pem" @@ -40292,11 +37843,7 @@ "key_type": { "type": "string", "description": "The type of key to use; defaults to RSA. \"rsa\" \"ec\" and \"ed25519\" are the only valid values.", - "enum": [ - "rsa", - "ec", - "ed25519" - ], + "enum": ["rsa", "ec", "ed25519"], "default": "rsa", "x-vault-displayAttrs": { "value": "rsa" @@ -40373,12 +37920,7 @@ "private_key_format": { "type": "string", "description": "Format for the returned private key. Generally the default will be controlled by the \"format\" parameter as either base64-encoded DER or PEM-encoded DER. However, this can be set to \"pkcs8\" to have the returned private key contain base64-encoded pkcs8 or PEM-encoded pkcs8 instead. Defaults to \"der\".", - "enum": [ - "", - "der", - "pem", - "pkcs8" - ], + "enum": ["", "der", "pem", "pkcs8"], "default": "der", "x-vault-displayAttrs": { "value": "der" @@ -40472,11 +38014,7 @@ "key_type": { "type": "string", "description": "The type of key to use; defaults to RSA. \"rsa\" \"ec\" and \"ed25519\" are the only valid values.", - "enum": [ - "rsa", - "ec", - "ed25519" - ], + "enum": ["rsa", "ec", "ed25519"], "default": "rsa", "x-vault-displayAttrs": { "value": "rsa" @@ -40528,11 +38066,7 @@ "key_type": { "type": "string", "description": "The type of key to use; defaults to RSA. \"rsa\" \"ec\" and \"ed25519\" are the only valid values.", - "enum": [ - "rsa", - "ec", - "ed25519" - ], + "enum": ["rsa", "ec", "ed25519"], "default": "rsa", "x-vault-displayAttrs": { "value": "rsa" @@ -40601,11 +38135,7 @@ "format": { "type": "string", "description": "Format for returned data. Can be \"pem\", \"der\", or \"pem_bundle\". If \"pem_bundle\", any private key and issuing cert will be appended to the certificate pem. If \"der\", the value will be base64 encoded. Defaults to \"pem\".", - "enum": [ - "pem", - "der", - "pem_bundle" - ], + "enum": ["pem", "der", "pem_bundle"], "default": "pem", "x-vault-displayAttrs": { "value": "pem" @@ -40645,11 +38175,7 @@ "key_type": { "type": "string", "description": "The type of key to use; defaults to RSA. \"rsa\" \"ec\" and \"ed25519\" are the only valid values.", - "enum": [ - "rsa", - "ec", - "ed25519" - ], + "enum": ["rsa", "ec", "ed25519"], "default": "rsa", "x-vault-displayAttrs": { "value": "rsa" @@ -40741,12 +38267,7 @@ "private_key_format": { "type": "string", "description": "Format for the returned private key. Generally the default will be controlled by the \"format\" parameter as either base64-encoded DER or PEM-encoded DER. However, this can be set to \"pkcs8\" to have the returned private key contain base64-encoded pkcs8 or PEM-encoded pkcs8 instead. Defaults to \"der\".", - "enum": [ - "", - "der", - "pem", - "pkcs8" - ], + "enum": ["", "der", "pem", "pkcs8"], "default": "der", "x-vault-displayAttrs": { "value": "der" @@ -40906,11 +38427,7 @@ "format": { "type": "string", "description": "Format for returned data. Can be \"pem\", \"der\", or \"pem_bundle\". If \"pem_bundle\", any private key and issuing cert will be appended to the certificate pem. If \"der\", the value will be base64 encoded. Defaults to \"pem\".", - "enum": [ - "pem", - "der", - "pem_bundle" - ], + "enum": ["pem", "der", "pem_bundle"], "default": "pem", "x-vault-displayAttrs": { "value": "pem" @@ -40948,12 +38465,7 @@ "private_key_format": { "type": "string", "description": "Format for the returned private key. Generally the default will be controlled by the \"format\" parameter as either base64-encoded DER or PEM-encoded DER. However, this can be set to \"pkcs8\" to have the returned private key contain base64-encoded pkcs8 or PEM-encoded pkcs8 instead. Defaults to \"der\".", - "enum": [ - "", - "der", - "pem", - "pkcs8" - ], + "enum": ["", "der", "pem", "pkcs8"], "default": "der", "x-vault-displayAttrs": { "value": "der" @@ -41060,11 +38572,7 @@ "format": { "type": "string", "description": "Format for returned data. Can be \"pem\", \"der\", or \"pem_bundle\". If \"pem_bundle\", any private key and issuing cert will be appended to the certificate pem. If \"der\", the value will be base64 encoded. Defaults to \"pem\".", - "enum": [ - "pem", - "der", - "pem_bundle" - ], + "enum": ["pem", "der", "pem_bundle"], "default": "pem", "x-vault-displayAttrs": { "value": "pem" @@ -41097,12 +38605,7 @@ "private_key_format": { "type": "string", "description": "Format for the returned private key. Generally the default will be controlled by the \"format\" parameter as either base64-encoded DER or PEM-encoded DER. However, this can be set to \"pkcs8\" to have the returned private key contain base64-encoded pkcs8 or PEM-encoded pkcs8 instead. Defaults to \"der\".", - "enum": [ - "", - "der", - "pem", - "pkcs8" - ], + "enum": ["", "der", "pem", "pkcs8"], "default": "der", "x-vault-displayAttrs": { "value": "der" @@ -41309,11 +38812,7 @@ "format": { "type": "string", "description": "Format for returned data. Can be \"pem\", \"der\", or \"pem_bundle\". If \"pem_bundle\", any private key and issuing cert will be appended to the certificate pem. If \"der\", the value will be base64 encoded. Defaults to \"pem\".", - "enum": [ - "pem", - "der", - "pem_bundle" - ], + "enum": ["pem", "der", "pem_bundle"], "default": "pem", "x-vault-displayAttrs": { "value": "pem" @@ -41411,12 +38910,7 @@ "private_key_format": { "type": "string", "description": "Format for the returned private key. Generally the default will be controlled by the \"format\" parameter as either base64-encoded DER or PEM-encoded DER. However, this can be set to \"pkcs8\" to have the returned private key contain base64-encoded pkcs8 or PEM-encoded pkcs8 instead. Defaults to \"der\".", - "enum": [ - "", - "der", - "pem", - "pkcs8" - ], + "enum": ["", "der", "pem", "pkcs8"], "default": "der", "x-vault-displayAttrs": { "value": "der" @@ -41640,11 +39134,7 @@ "format": { "type": "string", "description": "Format for returned data. Can be \"pem\", \"der\", or \"pem_bundle\". If \"pem_bundle\", any private key and issuing cert will be appended to the certificate pem. If \"der\", the value will be base64 encoded. Defaults to \"pem\".", - "enum": [ - "pem", - "der", - "pem_bundle" - ], + "enum": ["pem", "der", "pem_bundle"], "default": "pem", "x-vault-displayAttrs": { "value": "pem" @@ -41666,11 +39156,7 @@ "items": { "type": "string" }, - "default": [ - "DigitalSignature", - "KeyAgreement", - "KeyEncipherment" - ] + "default": ["DigitalSignature", "KeyAgreement", "KeyEncipherment"] }, "not_after": { "type": "string", @@ -41689,12 +39175,7 @@ "private_key_format": { "type": "string", "description": "Format for the returned private key. Generally the default will be controlled by the \"format\" parameter as either base64-encoded DER or PEM-encoded DER. However, this can be set to \"pkcs8\" to have the returned private key contain base64-encoded pkcs8 or PEM-encoded pkcs8 instead. Defaults to \"der\".", - "enum": [ - "", - "der", - "pem", - "pkcs8" - ], + "enum": ["", "der", "pem", "pkcs8"], "default": "der", "x-vault-displayAttrs": { "value": "der" @@ -41826,11 +39307,7 @@ "format": { "type": "string", "description": "Format for returned data. Can be \"pem\", \"der\", or \"pem_bundle\". If \"pem_bundle\", any private key and issuing cert will be appended to the certificate pem. If \"der\", the value will be base64 encoded. Defaults to \"pem\".", - "enum": [ - "pem", - "der", - "pem_bundle" - ], + "enum": ["pem", "der", "pem_bundle"], "default": "pem", "x-vault-displayAttrs": { "value": "pem" @@ -41852,11 +39329,7 @@ "items": { "type": "string" }, - "default": [ - "DigitalSignature", - "KeyAgreement", - "KeyEncipherment" - ] + "default": ["DigitalSignature", "KeyAgreement", "KeyEncipherment"] }, "not_after": { "type": "string", @@ -41875,12 +39348,7 @@ "private_key_format": { "type": "string", "description": "Format for the returned private key. Generally the default will be controlled by the \"format\" parameter as either base64-encoded DER or PEM-encoded DER. However, this can be set to \"pkcs8\" to have the returned private key contain base64-encoded pkcs8 or PEM-encoded pkcs8 instead. Defaults to \"der\".", - "enum": [ - "", - "der", - "pem", - "pkcs8" - ], + "enum": ["", "der", "pem", "pkcs8"], "default": "der", "x-vault-displayAttrs": { "value": "der" @@ -41997,11 +39465,7 @@ "format": { "type": "string", "description": "Format for returned data. Can be \"pem\", \"der\", or \"pem_bundle\". If \"pem_bundle\", any private key and issuing cert will be appended to the certificate pem. If \"der\", the value will be base64 encoded. Defaults to \"pem\".", - "enum": [ - "pem", - "der", - "pem_bundle" - ], + "enum": ["pem", "der", "pem_bundle"], "default": "pem", "x-vault-displayAttrs": { "value": "pem" @@ -42034,12 +39498,7 @@ "private_key_format": { "type": "string", "description": "Format for the returned private key. Generally the default will be controlled by the \"format\" parameter as either base64-encoded DER or PEM-encoded DER. However, this can be set to \"pkcs8\" to have the returned private key contain base64-encoded pkcs8 or PEM-encoded pkcs8 instead. Defaults to \"der\".", - "enum": [ - "", - "der", - "pem", - "pkcs8" - ], + "enum": ["", "der", "pem", "pkcs8"], "default": "der", "x-vault-displayAttrs": { "value": "der" @@ -42149,11 +39608,7 @@ "format": { "type": "string", "description": "Format for returned data. Can be \"pem\", \"der\", or \"pem_bundle\". If \"pem_bundle\", any private key and issuing cert will be appended to the certificate pem. If \"der\", the value will be base64 encoded. Defaults to \"pem\".", - "enum": [ - "pem", - "der", - "pem_bundle" - ], + "enum": ["pem", "der", "pem_bundle"], "default": "pem", "x-vault-displayAttrs": { "value": "pem" @@ -42189,11 +39644,7 @@ "key_type": { "type": "string", "description": "The type of key to use; defaults to RSA. \"rsa\" \"ec\" and \"ed25519\" are the only valid values.", - "enum": [ - "rsa", - "ec", - "ed25519" - ], + "enum": ["rsa", "ec", "ed25519"], "default": "rsa", "x-vault-displayAttrs": { "value": "rsa" @@ -42270,12 +39721,7 @@ "private_key_format": { "type": "string", "description": "Format for the returned private key. Generally the default will be controlled by the \"format\" parameter as either base64-encoded DER or PEM-encoded DER. However, this can be set to \"pkcs8\" to have the returned private key contain base64-encoded pkcs8 or PEM-encoded pkcs8 instead. Defaults to \"der\".", - "enum": [ - "", - "der", - "pem", - "pkcs8" - ], + "enum": ["", "der", "pem", "pkcs8"], "default": "der", "x-vault-displayAttrs": { "value": "der" @@ -42386,11 +39832,7 @@ "format": { "type": "string", "description": "Format for returned data. Can be \"pem\", \"der\", or \"pem_bundle\". If \"pem_bundle\", any private key and issuing cert will be appended to the certificate pem. If \"der\", the value will be base64 encoded. Defaults to \"pem\".", - "enum": [ - "pem", - "der", - "pem_bundle" - ], + "enum": ["pem", "der", "pem_bundle"], "default": "pem", "x-vault-displayAttrs": { "value": "pem" @@ -42430,11 +39872,7 @@ "key_type": { "type": "string", "description": "The type of key to use; defaults to RSA. \"rsa\" \"ec\" and \"ed25519\" are the only valid values.", - "enum": [ - "rsa", - "ec", - "ed25519" - ], + "enum": ["rsa", "ec", "ed25519"], "default": "rsa", "x-vault-displayAttrs": { "value": "rsa" @@ -42526,12 +39964,7 @@ "private_key_format": { "type": "string", "description": "Format for the returned private key. Generally the default will be controlled by the \"format\" parameter as either base64-encoded DER or PEM-encoded DER. However, this can be set to \"pkcs8\" to have the returned private key contain base64-encoded pkcs8 or PEM-encoded pkcs8 instead. Defaults to \"der\".", - "enum": [ - "", - "der", - "pem", - "pkcs8" - ], + "enum": ["", "der", "pem", "pkcs8"], "default": "der", "x-vault-displayAttrs": { "value": "der" @@ -44270,11 +41703,7 @@ "format": { "type": "string", "description": "Format for returned data. Can be \"pem\", \"der\", or \"pem_bundle\". If \"pem_bundle\", any private key and issuing cert will be appended to the certificate pem. If \"der\", the value will be base64 encoded. Defaults to \"pem\".", - "enum": [ - "pem", - "der", - "pem_bundle" - ], + "enum": ["pem", "der", "pem_bundle"], "default": "pem", "x-vault-displayAttrs": { "value": "pem" @@ -44377,12 +41806,7 @@ "private_key_format": { "type": "string", "description": "Format for the returned private key. Generally the default will be controlled by the \"format\" parameter as either base64-encoded DER or PEM-encoded DER. However, this can be set to \"pkcs8\" to have the returned private key contain base64-encoded pkcs8 or PEM-encoded pkcs8 instead. Defaults to \"der\".", - "enum": [ - "", - "der", - "pem", - "pkcs8" - ], + "enum": ["", "der", "pem", "pkcs8"], "default": "der", "x-vault-displayAttrs": { "value": "der" @@ -44569,11 +41993,7 @@ "format": { "type": "string", "description": "Format for returned data. Can be \"pem\", \"der\", or \"pem_bundle\". If \"pem_bundle\", any private key and issuing cert will be appended to the certificate pem. If \"der\", the value will be base64 encoded. Defaults to \"pem\".", - "enum": [ - "pem", - "der", - "pem_bundle" - ], + "enum": ["pem", "der", "pem_bundle"], "default": "pem", "x-vault-displayAttrs": { "value": "pem" @@ -44613,11 +42033,7 @@ "key_type": { "type": "string", "description": "The type of key to use; defaults to RSA. \"rsa\" \"ec\" and \"ed25519\" are the only valid values.", - "enum": [ - "rsa", - "ec", - "ed25519" - ], + "enum": ["rsa", "ec", "ed25519"], "default": "rsa", "x-vault-displayAttrs": { "value": "rsa" @@ -44709,12 +42125,7 @@ "private_key_format": { "type": "string", "description": "Format for the returned private key. Generally the default will be controlled by the \"format\" parameter as either base64-encoded DER or PEM-encoded DER. However, this can be set to \"pkcs8\" to have the returned private key contain base64-encoded pkcs8 or PEM-encoded pkcs8 instead. Defaults to \"der\".", - "enum": [ - "", - "der", - "pem", - "pkcs8" - ], + "enum": ["", "der", "pem", "pkcs8"], "default": "der", "x-vault-displayAttrs": { "value": "der" @@ -44911,11 +42322,7 @@ "format": { "type": "string", "description": "Format for returned data. Can be \"pem\", \"der\", or \"pem_bundle\". If \"pem_bundle\", any private key and issuing cert will be appended to the certificate pem. If \"der\", the value will be base64 encoded. Defaults to \"pem\".", - "enum": [ - "pem", - "der", - "pem_bundle" - ], + "enum": ["pem", "der", "pem_bundle"], "default": "pem", "x-vault-displayAttrs": { "value": "pem" @@ -44942,11 +42349,7 @@ "items": { "type": "string" }, - "default": [ - "DigitalSignature", - "KeyAgreement", - "KeyEncipherment" - ] + "default": ["DigitalSignature", "KeyAgreement", "KeyEncipherment"] }, "not_after": { "type": "string", @@ -44965,12 +42368,7 @@ "private_key_format": { "type": "string", "description": "Format for the returned private key. Generally the default will be controlled by the \"format\" parameter as either base64-encoded DER or PEM-encoded DER. However, this can be set to \"pkcs8\" to have the returned private key contain base64-encoded pkcs8 or PEM-encoded pkcs8 instead. Defaults to \"der\".", - "enum": [ - "", - "der", - "pem", - "pkcs8" - ], + "enum": ["", "der", "pem", "pkcs8"], "default": "der", "x-vault-displayAttrs": { "value": "der" @@ -45102,11 +42500,7 @@ "format": { "type": "string", "description": "Format for returned data. Can be \"pem\", \"der\", or \"pem_bundle\". If \"pem_bundle\", any private key and issuing cert will be appended to the certificate pem. If \"der\", the value will be base64 encoded. Defaults to \"pem\".", - "enum": [ - "pem", - "der", - "pem_bundle" - ], + "enum": ["pem", "der", "pem_bundle"], "default": "pem", "x-vault-displayAttrs": { "value": "pem" @@ -45133,11 +42527,7 @@ "items": { "type": "string" }, - "default": [ - "DigitalSignature", - "KeyAgreement", - "KeyEncipherment" - ] + "default": ["DigitalSignature", "KeyAgreement", "KeyEncipherment"] }, "not_after": { "type": "string", @@ -45156,12 +42546,7 @@ "private_key_format": { "type": "string", "description": "Format for the returned private key. Generally the default will be controlled by the \"format\" parameter as either base64-encoded DER or PEM-encoded DER. However, this can be set to \"pkcs8\" to have the returned private key contain base64-encoded pkcs8 or PEM-encoded pkcs8 instead. Defaults to \"der\".", - "enum": [ - "", - "der", - "pem", - "pkcs8" - ], + "enum": ["", "der", "pem", "pkcs8"], "default": "der", "x-vault-displayAttrs": { "value": "der" @@ -45278,11 +42663,7 @@ "format": { "type": "string", "description": "Format for returned data. Can be \"pem\", \"der\", or \"pem_bundle\". If \"pem_bundle\", any private key and issuing cert will be appended to the certificate pem. If \"der\", the value will be base64 encoded. Defaults to \"pem\".", - "enum": [ - "pem", - "der", - "pem_bundle" - ], + "enum": ["pem", "der", "pem_bundle"], "default": "pem", "x-vault-displayAttrs": { "value": "pem" @@ -45320,12 +42701,7 @@ "private_key_format": { "type": "string", "description": "Format for the returned private key. Generally the default will be controlled by the \"format\" parameter as either base64-encoded DER or PEM-encoded DER. However, this can be set to \"pkcs8\" to have the returned private key contain base64-encoded pkcs8 or PEM-encoded pkcs8 instead. Defaults to \"der\".", - "enum": [ - "", - "der", - "pem", - "pkcs8" - ], + "enum": ["", "der", "pem", "pkcs8"], "default": "der", "x-vault-displayAttrs": { "value": "der" @@ -46517,10 +43893,7 @@ "items": { "type": "string" }, - "default": [ - "email", - "hostname" - ], + "default": ["email", "hostname"], "x-vault-displayAttrs": { "name": "Common Name Validations" } @@ -46586,12 +43959,7 @@ "key_type": { "type": "string", "description": "The type of key to use; defaults to RSA. \"rsa\" \"ec\", \"ed25519\" and \"any\" are the only valid values.", - "enum": [ - "rsa", - "ec", - "ed25519", - "any" - ], + "enum": ["rsa", "ec", "ed25519", "any"], "default": "rsa" }, "key_usage": { @@ -46600,11 +43968,7 @@ "items": { "type": "string" }, - "default": [ - "DigitalSignature", - "KeyAgreement", - "KeyEncipherment" - ], + "default": ["DigitalSignature", "KeyAgreement", "KeyEncipherment"], "x-vault-displayAttrs": { "value": "DigitalSignature,KeyAgreement,KeyEncipherment" } @@ -48772,13 +46136,7 @@ "algorithm_signer": { "type": "string", "description": "[Not applicable for OTP type] [Optional for CA type] When supplied, this value specifies a signing algorithm for the key. Possible values: ssh-rsa, rsa-sha2-256, rsa-sha2-512, default, or the empty string.", - "enum": [ - "", - "default", - "ssh-rsa", - "rsa-sha2-256", - "rsa-sha2-512" - ], + "enum": ["", "default", "ssh-rsa", "rsa-sha2-256", "rsa-sha2-512"], "x-vault-displayAttrs": { "name": "Signing Algorithm" } @@ -48890,10 +46248,7 @@ "key_type": { "type": "string", "description": "[Required for all types] Type of key used to login to hosts. It can be either 'otp' or 'ca'. 'otp' type requires agent to be installed in remote hosts.", - "enum": [ - "otp", - "ca" - ], + "enum": ["otp", "ca"], "x-vault-displayAttrs": { "value": "ca" } @@ -48966,9 +46321,7 @@ } } }, - "required": [ - "token" - ] + "required": ["token"] }, "TerraformCloudWriteRoleRequest": { "type": "object", @@ -50006,9 +47359,7 @@ "description": "Optional version of key, 'latest' if not set" } }, - "required": [ - "certificate_chain" - ] + "required": ["certificate_chain"] }, "TransitSignRequest": { "type": "object", diff --git a/schema/model_app_role_look_up_secret_id_by_accessor_response.go b/schema/model_app_role_look_up_secret_id_by_accessor_response.go index 7f778bbb..e58fe226 100644 --- a/schema/model_app_role_look_up_secret_id_by_accessor_response.go +++ b/schema/model_app_role_look_up_secret_id_by_accessor_response.go @@ -27,7 +27,7 @@ type AppRoleLookUpSecretIdByAccessorResponse struct { SecretIdNumUses int32 `json:"secret_id_num_uses,omitempty"` // Duration in seconds after which the issued secret ID expires. - SecretIdTtl string `json:"secret_id_ttl,omitempty"` + SecretIdTtl int64 `json:"secret_id_ttl,omitempty"` // List of CIDR blocks. If set, specifies the blocks of IP addresses which can use the returned token. Should be a subset of the token CIDR blocks listed on the role, if any. TokenBoundCidrs []string `json:"token_bound_cidrs,omitempty"` diff --git a/schema/model_app_role_look_up_secret_id_response.go b/schema/model_app_role_look_up_secret_id_response.go index 378c1f3e..a164bfe3 100644 --- a/schema/model_app_role_look_up_secret_id_response.go +++ b/schema/model_app_role_look_up_secret_id_response.go @@ -27,7 +27,7 @@ type AppRoleLookUpSecretIdResponse struct { SecretIdNumUses int32 `json:"secret_id_num_uses,omitempty"` // Duration in seconds after which the issued secret ID expires. - SecretIdTtl string `json:"secret_id_ttl,omitempty"` + SecretIdTtl int64 `json:"secret_id_ttl,omitempty"` // List of CIDR blocks. If set, specifies the blocks of IP addresses which can use the returned token. Should be a subset of the token CIDR blocks listed on the role, if any. TokenBoundCidrs []string `json:"token_bound_cidrs,omitempty"` diff --git a/schema/model_app_role_read_period_response.go b/schema/model_app_role_read_period_response.go index c990907e..afd19200 100644 --- a/schema/model_app_role_read_period_response.go +++ b/schema/model_app_role_read_period_response.go @@ -9,8 +9,8 @@ package schema type AppRoleReadPeriodResponse struct { // Use \"token_period\" instead. If this and \"token_period\" are both specified, only \"token_period\" will be used. // Deprecated - Period string `json:"period,omitempty"` + Period int64 `json:"period,omitempty"` - // If set, tokens created via this role will have no max lifetime; instead, their renewal period will be fixed to this value. This takes an integer number of seconds, or a string duration (e.g. \"24h\"). - TokenPeriod string `json:"token_period,omitempty"` + // If set, tokens created via this role will have no max lifetime; instead, their renewal period will be fixed to this value. This takes an integer number of seconds. + TokenPeriod int64 `json:"token_period,omitempty"` } diff --git a/schema/model_app_role_read_role_response.go b/schema/model_app_role_read_role_response.go index 1cfa637e..0df7a311 100644 --- a/schema/model_app_role_read_role_response.go +++ b/schema/model_app_role_read_role_response.go @@ -15,7 +15,7 @@ type AppRoleReadRoleResponse struct { // Use \"token_period\" instead. If this and \"token_period\" are both specified, only \"token_period\" will be used. // Deprecated - Period string `json:"period,omitempty"` + Period int64 `json:"period,omitempty"` // Use \"token_policies\" instead. If this and \"token_policies\" are both specified, only \"token_policies\" will be used. // Deprecated @@ -28,16 +28,16 @@ type AppRoleReadRoleResponse struct { SecretIdNumUses int32 `json:"secret_id_num_uses,omitempty"` // Duration in seconds after which the issued secret ID expires. - SecretIdTtl string `json:"secret_id_ttl,omitempty"` + SecretIdTtl int64 `json:"secret_id_ttl,omitempty"` // Comma separated string or JSON list of CIDR blocks. If set, specifies the blocks of IP addresses which are allowed to use the generated token. TokenBoundCidrs []string `json:"token_bound_cidrs,omitempty"` // If set, tokens created via this role carry an explicit maximum TTL. During renewal, the current maximum TTL values of the role and the mount are not checked for changes, and any updates to these values will have no effect on the token being renewed. - TokenExplicitMaxTtl string `json:"token_explicit_max_ttl,omitempty"` + TokenExplicitMaxTtl int64 `json:"token_explicit_max_ttl,omitempty"` // The maximum lifetime of the generated token - TokenMaxTtl string `json:"token_max_ttl,omitempty"` + TokenMaxTtl int64 `json:"token_max_ttl,omitempty"` // If true, the 'default' policy will not automatically be added to generated tokens TokenNoDefaultPolicy bool `json:"token_no_default_policy,omitempty"` @@ -46,13 +46,13 @@ type AppRoleReadRoleResponse struct { TokenNumUses int32 `json:"token_num_uses,omitempty"` // If set, tokens created via this role will have no max lifetime; instead, their renewal period will be fixed to this value. - TokenPeriod string `json:"token_period,omitempty"` + TokenPeriod int64 `json:"token_period,omitempty"` // Comma-separated list of policies TokenPolicies []string `json:"token_policies,omitempty"` // The initial ttl of the token to generate - TokenTtl string `json:"token_ttl,omitempty"` + TokenTtl int64 `json:"token_ttl,omitempty"` // The type of token to generate, service or batch TokenType string `json:"token_type,omitempty"` diff --git a/schema/model_app_role_read_secret_id_ttl_response.go b/schema/model_app_role_read_secret_id_ttl_response.go index 97a6cacd..57acee33 100644 --- a/schema/model_app_role_read_secret_id_ttl_response.go +++ b/schema/model_app_role_read_secret_id_ttl_response.go @@ -8,5 +8,5 @@ package schema // AppRoleReadSecretIdTtlResponse struct for AppRoleReadSecretIdTtlResponse type AppRoleReadSecretIdTtlResponse struct { // Duration in seconds after which the issued secret ID should expire. Defaults to 0, meaning no expiration. - SecretIdTtl string `json:"secret_id_ttl,omitempty"` + SecretIdTtl int64 `json:"secret_id_ttl,omitempty"` } diff --git a/schema/model_app_role_read_token_max_ttl_response.go b/schema/model_app_role_read_token_max_ttl_response.go index 03474e06..5213ad9f 100644 --- a/schema/model_app_role_read_token_max_ttl_response.go +++ b/schema/model_app_role_read_token_max_ttl_response.go @@ -8,5 +8,5 @@ package schema // AppRoleReadTokenMaxTtlResponse struct for AppRoleReadTokenMaxTtlResponse type AppRoleReadTokenMaxTtlResponse struct { // The maximum lifetime of the generated token - TokenMaxTtl string `json:"token_max_ttl,omitempty"` + TokenMaxTtl int64 `json:"token_max_ttl,omitempty"` } diff --git a/schema/model_app_role_read_token_ttl_response.go b/schema/model_app_role_read_token_ttl_response.go index df36bf5b..e1c3ee5b 100644 --- a/schema/model_app_role_read_token_ttl_response.go +++ b/schema/model_app_role_read_token_ttl_response.go @@ -8,5 +8,5 @@ package schema // AppRoleReadTokenTtlResponse struct for AppRoleReadTokenTtlResponse type AppRoleReadTokenTtlResponse struct { // The initial ttl of the token to generate - TokenTtl string `json:"token_ttl,omitempty"` + TokenTtl int64 `json:"token_ttl,omitempty"` } diff --git a/schema/model_app_role_write_custom_secret_id_response.go b/schema/model_app_role_write_custom_secret_id_response.go index 92b09687..a8e979b5 100644 --- a/schema/model_app_role_write_custom_secret_id_response.go +++ b/schema/model_app_role_write_custom_secret_id_response.go @@ -17,5 +17,5 @@ type AppRoleWriteCustomSecretIdResponse struct { SecretIdNumUses int32 `json:"secret_id_num_uses,omitempty"` // Duration in seconds after which the issued secret ID expires. - SecretIdTtl string `json:"secret_id_ttl,omitempty"` + SecretIdTtl int64 `json:"secret_id_ttl,omitempty"` } diff --git a/schema/model_app_role_write_secret_id_response.go b/schema/model_app_role_write_secret_id_response.go index ee8e913e..4f53a5c8 100644 --- a/schema/model_app_role_write_secret_id_response.go +++ b/schema/model_app_role_write_secret_id_response.go @@ -17,5 +17,5 @@ type AppRoleWriteSecretIdResponse struct { SecretIdNumUses int32 `json:"secret_id_num_uses,omitempty"` // Duration in seconds after which the issued secret ID expires. - SecretIdTtl string `json:"secret_id_ttl,omitempty"` + SecretIdTtl int64 `json:"secret_id_ttl,omitempty"` }