Uses of Class
de.stklcode.jvault.connector.exception.VaultConnectorException
Packages that use VaultConnectorException
Package
Description
Java Vault Connector base package - contains 
VaultConnector interface and
 default implementation.Some custom exceptions for error handling.
- 
Uses of VaultConnectorException in de.stklcode.jvault.connector
Methods in de.stklcode.jvault.connector that throw VaultConnectorExceptionModifier and TypeMethodDescriptionfinal AuthResponseDeprecated, for removal: This API element is subject to removal in a future version.Deprecated, for removal: This API element is subject to removal in a future version.As of Vault 0.6.1 App-ID is superseded by AppRole.final AuthResponseHTTPVaultConnector.authAppRole(String roleID, String secretID) default AuthResponseVaultConnector.authAppRole(String roleID) Authorize to Vault using AppRole method without secret ID.VaultConnector.authAppRole(String roleID, String secretID) Authorize to Vault using AppRole method.final TokenResponseAuthorize to Vault using token.final AuthResponseHTTPVaultConnector.authUserPass(String username, String password) VaultConnector.authUserPass(String username, String password) Authorize to Vault using username and password.HTTPVaultConnectorBuilder.buildAndAuth()Build connector and authenticate with token set in factory or from environment.final booleanHTTPVaultConnector.createAppRole(AppRole role) booleanVaultConnector.createAppRole(AppRole role) Register a new AppRole role from given metamodel.default booleanVaultConnector.createAppRole(String roleName) Register new AppRole role with default policy.default booleanVaultConnector.createAppRole(String roleName, String roleID) Register new AppRole role with default policy and custom ID.default booleanVaultConnector.createAppRole(String roleName, List<String> policies) Register new AppRole role with policies.default booleanVaultConnector.createAppRole(String roleName, List<String> policies, String roleID) Register new AppRole role with policies and custom ID.final AppRoleSecretResponseHTTPVaultConnector.createAppRoleSecret(String roleName, AppRoleSecret secret) default AppRoleSecretResponseVaultConnector.createAppRoleSecret(String roleName) Register new random generated AppRole secret.VaultConnector.createAppRoleSecret(String roleName, AppRoleSecret secret) Register new AppRole secret with custom ID.default AppRoleSecretResponseVaultConnector.createAppRoleSecret(String roleName, String secretID) Register new AppRole secret with custom ID.booleanHTTPVaultConnector.createOrUpdateTokenRole(String name, TokenRole role) default booleanVaultConnector.createOrUpdateTokenRole(TokenRole role) Create a new or update an existing token role.booleanVaultConnector.createOrUpdateTokenRole(String name, TokenRole role) Create a new or update an existing token role.final AuthResponseHTTPVaultConnector.createToken(Token token) final AuthResponseHTTPVaultConnector.createToken(Token token, boolean orphan) final AuthResponseHTTPVaultConnector.createToken(Token token, String role) VaultConnector.createToken(Token token) Create a new token.VaultConnector.createToken(Token token, boolean orphan) Create a new token.VaultConnector.createToken(Token token, String role) Create a new token for specific role.final voidvoidDelete key from Vault.final voidHTTPVaultConnector.deleteAllSecretVersions(String mount, String key) voidVaultConnector.deleteAllSecretVersions(String mount, String key) Delete latest version of a secret from Vault.final booleanHTTPVaultConnector.deleteAppRole(String roleName) booleanVaultConnector.deleteAppRole(String roleName) Delete AppRole role from Vault.final voidHTTPVaultConnector.deleteLatestSecretVersion(String mount, String key) voidVaultConnector.deleteLatestSecretVersion(String mount, String key) Delete latest version of a secret from Vault.final voidHTTPVaultConnector.deleteSecretVersions(String mount, String key, int... versions) voidVaultConnector.deleteSecretVersions(String mount, String key, int... versions) Delete secret versions from Vault.booleanHTTPVaultConnector.deleteTokenRole(String name) booleanVaultConnector.deleteTokenRole(String name) Delete a token role.final booleanHTTPVaultConnector.destroyAppRoleSecret(String roleName, String secretID) booleanVaultConnector.destroyAppRoleSecret(String roleName, String secretID) Destroy an AppRole secret.final voidHTTPVaultConnector.destroySecretVersions(String mount, String key, int... versions) voidVaultConnector.destroySecretVersions(String mount, String key, int... versions) Destroy secret versions from Vault.HTTPVaultConnectorBuilder.fromEnv()Build connector based on the VAULT_ADDR} andVAULT_CACERT(optional) environment variables.final StringHTTPVaultConnector.getAppRoleID(String roleName) VaultConnector.getAppRoleID(String roleName) Retrieve ID for an AppRole role.final List<AuthBackend> HTTPVaultConnector.getAuthBackends()VaultConnector.getAuthBackends()Get all available authentication backends.HTTPVaultConnector.getHealth()VaultConnector.getHealth()Query server health information.List available nodes from Vault.HTTPVaultConnector.listAppRoles()VaultConnector.listAppRoles()List existing (accessible) AppRole roles.HTTPVaultConnector.listAppRoleSecrets(String roleName) VaultConnector.listAppRoleSecrets(String roleName) List existing (accessible) secret IDs for AppRole role.HTTPVaultConnector.listTokenRoles()VaultConnector.listTokenRoles()List available token roles from Vault.final AppRoleResponseHTTPVaultConnector.lookupAppRole(String roleName) VaultConnector.lookupAppRole(String roleName) Lookup an AppRole role.final AppRoleSecretResponseHTTPVaultConnector.lookupAppRoleSecret(String roleName, String secretID) VaultConnector.lookupAppRoleSecret(String roleName, String secretID) Lookup an AppRole secret.final TokenResponseHTTPVaultConnector.lookupToken(String token) VaultConnector.lookupToken(String token) Lookup token information.final SecretResponseRetrieve any nodes content from Vault.default CredentialsResponseVaultConnector.readDbCredentials(String role, String mount) Read credentials for SQL backends.default CredentialsResponseVaultConnector.readMongoDbCredentials(String role) Read credentials for MSSQL backend at default mount point.default CredentialsResponseVaultConnector.readMsSqlCredentials(String role) Read credentials for MSSQL backend at default mount point.default CredentialsResponseVaultConnector.readMySqlCredentials(String role) Read credentials for MySQL backend at default mount point.default CredentialsResponseVaultConnector.readPostgreSqlCredentials(String role) Read credentials for PostgreSQL backend at default mount point.default SecretResponseVaultConnector.readSecretData(String mount, String key) Retrieve the latest secret data for specific version from Vault.final MetadataResponseHTTPVaultConnector.readSecretMetadata(String mount, String key) VaultConnector.readSecretMetadata(String mount, String key) Retrieve secret metadata from Vault.final SecretResponseHTTPVaultConnector.readSecretVersion(String mount, String key, Integer version) VaultConnector.readSecretVersion(String mount, String key, Integer version) Retrieve secret data from Vault.HTTPVaultConnector.readTokenRole(String name) VaultConnector.readTokenRole(String name) Lookup token information.final booleanHTTPVaultConnector.registerAppId(String appID, String policy, String displayName) Deprecated, for removal: This API element is subject to removal in a future version.booleanVaultConnector.registerAppId(String appID, String policy, String displayName) Deprecated, for removal: This API element is subject to removal in a future version.As of Vault 0.6.1 App-ID is superseded by AppRole.default booleanVaultConnector.registerAppUserId(String appID, String policy, String displayName, String userID) Deprecated, for removal: This API element is subject to removal in a future version.As of Vault 0.6.1 App-ID is superseded by AppRole.final booleanHTTPVaultConnector.registerUserId(String appID, String userID) Deprecated, for removal: This API element is subject to removal in a future version.booleanVaultConnector.registerUserId(String appID, String userID) Deprecated, for removal: This API element is subject to removal in a future version.As of Vault 0.6.1 App-ID is superseded by AppRole.final SecretResponsedefault SecretResponseRenew lease with given ID.Renew lease with given ID.final voidvoidRevoke given lease immediately.final voidHTTPVaultConnector.seal()voidVaultConnector.seal()Seal vault.final SealResponseHTTPVaultConnector.sealStatus()VaultConnector.sealStatus()Retrieve status of vault seal.final booleanHTTPVaultConnector.setAppRoleID(String roleName, String roleID) booleanVaultConnector.setAppRoleID(String roleName, String roleID) Set custom ID for an AppRole role.final voidHTTPVaultConnector.undeleteSecretVersions(String mount, String key, int... versions) voidVaultConnector.undeleteSecretVersions(String mount, String key, int... versions) Undelete (restore) secret versions from Vault.final SealResponsedefault SealResponseUnseal vault.Unseal vault.voidHTTPVaultConnector.updateSecretMetadata(String mount, String key, Integer maxVersions, boolean casRequired) voidVaultConnector.updateSecretMetadata(String mount, String key, Integer maxVersions, boolean casRequired) Update secret metadata.HTTPVaultConnectorBuilder.withTrustedCA(Path cert) Add a trusted CA certificate for HTTPS connections.final voiddefault voidWrite simple value to Vault.default voidWrite value to Vault.voidWrite value to Vault.final SecretVersionResponsedefault SecretVersionResponseWrite secret to Vault.Write secret to Vault. - 
Uses of VaultConnectorException in de.stklcode.jvault.connector.exception
Subclasses of VaultConnectorException in de.stklcode.jvault.connector.exceptionModifier and TypeClassDescriptionclassException thrown trying to do a request without any authorization handles.classException thrown on problems with connection to Vault backend.classException thrown when trying to send malformed request.final classException thrown when response from vault returned with erroneous status code or payload could not be parsed to entity class.classException thrown when trying to access a path the current user/token does not have permission to access.classException thrown on errors with TLS connection.