Uses of Class
de.stklcode.jvault.connector.exception.VaultConnectorException
Packages that use VaultConnectorException
Package
Description
Java Vault Connector base package - contains
VaultConnector interface and
default implementation.Some custom exceptions for error handling.
-
Uses of VaultConnectorException in de.stklcode.jvault.connector
Methods in de.stklcode.jvault.connector that throw VaultConnectorExceptionModifier and TypeMethodDescriptionfinal AuthResponseHTTPVaultConnector.authAppRole(String roleID, String secretID) default AuthResponseVaultConnector.authAppRole(String roleID) Authorize to Vault using AppRole method without secret ID.VaultConnector.authAppRole(String roleID, String secretID) Authorize to Vault using AppRole method.final TokenResponseAuthorize to Vault using token.final AuthResponseHTTPVaultConnector.authUserPass(String username, String password) VaultConnector.authUserPass(String username, String password) Authorize to Vault using username and password.HTTPVaultConnectorBuilder.buildAndAuth()Build connector and authenticate with token set in factory or from environment.final booleanHTTPVaultConnector.createAppRole(AppRole role) booleanVaultConnector.createAppRole(AppRole role) Register a new AppRole role from given metamodel.default booleanVaultConnector.createAppRole(String roleName) Register new AppRole role with default policy.default booleanVaultConnector.createAppRole(String roleName, String roleID) Register new AppRole role with default policy and custom ID.default booleanVaultConnector.createAppRole(String roleName, List<String> policies) Register new AppRole role with policies.default booleanVaultConnector.createAppRole(String roleName, List<String> policies, String roleID) Register new AppRole role with policies and custom ID.final AppRoleSecretResponseHTTPVaultConnector.createAppRoleSecret(String roleName, AppRoleSecret secret) default AppRoleSecretResponseVaultConnector.createAppRoleSecret(String roleName) Register new random generated AppRole secret.VaultConnector.createAppRoleSecret(String roleName, AppRoleSecret secret) Register new AppRole secret with custom ID.default AppRoleSecretResponseVaultConnector.createAppRoleSecret(String roleName, String secretID) Register new AppRole secret with custom ID.booleanHTTPVaultConnector.createOrUpdateTokenRole(String name, TokenRole role) default booleanVaultConnector.createOrUpdateTokenRole(TokenRole role) Create a new or update an existing token role.booleanVaultConnector.createOrUpdateTokenRole(String name, TokenRole role) Create a new or update an existing token role.final AuthResponseHTTPVaultConnector.createToken(Token token) final AuthResponseHTTPVaultConnector.createToken(Token token, boolean orphan) final AuthResponseHTTPVaultConnector.createToken(Token token, String role) VaultConnector.createToken(Token token) Create a new token.VaultConnector.createToken(Token token, boolean orphan) Create a new token.VaultConnector.createToken(Token token, String role) Create a new token for specific role.final voidvoidDelete key from Vault.final voidHTTPVaultConnector.deleteAllSecretVersions(String mount, String key) voidVaultConnector.deleteAllSecretVersions(String mount, String key) Delete latest version of a secret from Vault.final booleanHTTPVaultConnector.deleteAppRole(String roleName) booleanVaultConnector.deleteAppRole(String roleName) Delete AppRole role from Vault.final voidHTTPVaultConnector.deleteLatestSecretVersion(String mount, String key) voidVaultConnector.deleteLatestSecretVersion(String mount, String key) Delete latest version of a secret from Vault.final voidHTTPVaultConnector.deleteSecretVersions(String mount, String key, int... versions) voidVaultConnector.deleteSecretVersions(String mount, String key, int... versions) Delete secret versions from Vault.booleanHTTPVaultConnector.deleteTokenRole(String name) booleanVaultConnector.deleteTokenRole(String name) Delete a token role.final booleanHTTPVaultConnector.destroyAppRoleSecret(String roleName, String secretID) booleanVaultConnector.destroyAppRoleSecret(String roleName, String secretID) Destroy an AppRole secret.final voidHTTPVaultConnector.destroySecretVersions(String mount, String key, int... versions) voidVaultConnector.destroySecretVersions(String mount, String key, int... versions) Destroy secret versions from Vault.HTTPVaultConnectorBuilder.fromEnv()Build connector based on theVAULT_ADDRandVAULT_CACERT(optional) environment variables.final StringHTTPVaultConnector.getAppRoleID(String roleName) VaultConnector.getAppRoleID(String roleName) Retrieve ID for an AppRole role.final List<AuthBackend> HTTPVaultConnector.getAuthBackends()VaultConnector.getAuthBackends()Get all available authentication backends.HTTPVaultConnector.getHealth()VaultConnector.getHealth()Query server health information.List available nodes from Vault.HTTPVaultConnector.listAppRoles()VaultConnector.listAppRoles()List existing (accessible) AppRole roles.HTTPVaultConnector.listAppRoleSecrets(String roleName) VaultConnector.listAppRoleSecrets(String roleName) List existing (accessible) secret IDs for AppRole role.HTTPVaultConnector.listTokenRoles()VaultConnector.listTokenRoles()List available token roles from Vault.final AppRoleResponseHTTPVaultConnector.lookupAppRole(String roleName) VaultConnector.lookupAppRole(String roleName) Lookup an AppRole role.final AppRoleSecretResponseHTTPVaultConnector.lookupAppRoleSecret(String roleName, String secretID) VaultConnector.lookupAppRoleSecret(String roleName, String secretID) Lookup an AppRole secret.final TokenResponseHTTPVaultConnector.lookupToken(String token) VaultConnector.lookupToken(String token) Lookup token information.final SecretResponseRetrieve any nodes content from Vault.default CredentialsResponseVaultConnector.readDbCredentials(String role, String mount) Read credentials for database backends.default CredentialsResponseVaultConnector.readMongoDbCredentials(String role) Deprecated, for removal: This API element is subject to removal in a future version.default CredentialsResponseVaultConnector.readMsSqlCredentials(String role) Deprecated, for removal: This API element is subject to removal in a future version.useVaultConnector.readDbCredentials(String, String)your MSSQL mountpointdefault CredentialsResponseVaultConnector.readMySqlCredentials(String role) Deprecated, for removal: This API element is subject to removal in a future version.useVaultConnector.readDbCredentials(String, String)your MySQL mountpointdefault CredentialsResponseVaultConnector.readPostgreSqlCredentials(String role) Deprecated, for removal: This API element is subject to removal in a future version.useVaultConnector.readDbCredentials(String, String)your PostgreSQL mountpointdefault SecretResponseVaultConnector.readSecretData(String mount, String key) Retrieve the latest secret data for specific version from Vault.final MetadataResponseHTTPVaultConnector.readSecretMetadata(String mount, String key) VaultConnector.readSecretMetadata(String mount, String key) Retrieve secret metadata from Vault.final SecretResponseHTTPVaultConnector.readSecretVersion(String mount, String key, Integer version) VaultConnector.readSecretVersion(String mount, String key, Integer version) Retrieve secret data from Vault.HTTPVaultConnector.readTokenRole(String name) VaultConnector.readTokenRole(String name) Lookup token information.final SecretResponsedefault SecretResponseRenew lease with given ID.Renew lease with given ID.final voidvoidRevoke given lease immediately.final voidHTTPVaultConnector.seal()voidVaultConnector.seal()Seal vault.final SealResponseHTTPVaultConnector.sealStatus()VaultConnector.sealStatus()Retrieve status of vault seal.final booleanHTTPVaultConnector.setAppRoleID(String roleName, String roleID) booleanVaultConnector.setAppRoleID(String roleName, String roleID) Set custom ID for an AppRole role.final TransitResponseHTTPVaultConnector.transitDecrypt(String keyName, String ciphertext) VaultConnector.transitDecrypt(String keyName, String ciphertext) Decrypt ciphertext via transit engine from Vault.final TransitResponseHTTPVaultConnector.transitEncrypt(String keyName, String plaintext) default TransitResponseVaultConnector.transitEncrypt(String keyName, byte[] plaintext) Encrypt plaintext via transit engine from Vault.VaultConnector.transitEncrypt(String keyName, String plaintext) Encrypt plaintext via transit engine from Vault.final TransitResponseHTTPVaultConnector.transitHash(String algorithm, String input, String format) default TransitResponseVaultConnector.transitHash(String algorithm, byte[] input, String format) Hash data via transit engine from Vault.default TransitResponseVaultConnector.transitHash(String algorithm, String input) Hash data in hex format via transit engine from Vault.VaultConnector.transitHash(String algorithm, String input, String format) Hash data via transit engine from Vault.final voidHTTPVaultConnector.undeleteSecretVersions(String mount, String key, int... versions) voidVaultConnector.undeleteSecretVersions(String mount, String key, int... versions) Undelete (restore) secret versions from Vault.final SealResponsedefault SealResponseUnseal vault.Unseal vault.voidHTTPVaultConnector.updateSecretMetadata(String mount, String key, Integer maxVersions, boolean casRequired) voidVaultConnector.updateSecretMetadata(String mount, String key, Integer maxVersions, boolean casRequired) Update secret metadata.HTTPVaultConnectorBuilder.withTrustedCA(Path cert) Add a trusted CA certificate for HTTPS connections.final voiddefault voidWrite simple value to Vault.default voidWrite value to Vault.voidWrite value to Vault.final SecretVersionResponsedefault SecretVersionResponseWrite secret to Vault.Write secret to Vault. -
Uses of VaultConnectorException in de.stklcode.jvault.connector.exception
Subclasses of VaultConnectorException in de.stklcode.jvault.connector.exceptionModifier and TypeClassDescriptionclassException thrown trying to do a request without any authorization handles.classException thrown on problems with connection to Vault backend.classException thrown when trying to send malformed request.final classException thrown when response from vault returned with erroneous status code or payload could not be parsed to entity class.classException thrown when trying to access a path the current user/token does not have permission to access.classException thrown on errors with TLS connection.
VaultConnector.readDbCredentials(String, String)your MongoDB mountpoint