Chapter 6. Retrieving configuration settings by using the API
Configuration settings can be returned on the CLI by leveraging the FEATURE_SUPERUSER_CONFIGDUMP
configuration field alongside the v1/superuser/config
API endpoint. Together, Red Hat Quay superusers can return all Flask configuration fields that are set, which can be used to show proof of compliance for various security policies, such as PCI-DSS 4.0.
Prerequisites
-
You have set
FEATURE_SUPERUSER_CONFIGDUMP: true
in yourconfig.yaml
file. -
You have assigned the superuser role to a user in your
config.yaml
file. - You have generated an OAuth 2 access token for the superuser.
Procedure
Retrieve configuration settings by using the
v1/superuser/config
API endpoint. For example:curl -X GET -H "Authorization: Bearer <bearer_token>" "http://<quay-server.example.com>/api/v1/superuser/config" | jq -r .config
$ curl -X GET -H "Authorization: Bearer <bearer_token>" "http://<quay-server.example.com>/api/v1/superuser/config" | jq -r .config
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Example output
Copy to Clipboard Copied! Toggle word wrap Toggle overflow You can pass in one of
.config
,.env
,.warning
, or.schema
to return specific information. For example:curl -X GET -H "Authorization: Bearer <bearer_token>" "http://<quay-server.example.com>/api/v1/superuser/config" | jq -r .warning
$ curl -X GET -H "Authorization: Bearer <bearer_token>" "http://<quay-server.example.com>/api/v1/superuser/config" | jq -r .warning
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Example output
Copy to Clipboard Copied! Toggle word wrap Toggle overflow