Este conteúdo não está disponível no idioma selecionado.
Chapter 6. Retrieving configuration settings by using the API
Configuration settings can be returned on the CLI by leveraging the FEATURE_SUPERUSER_CONFIGDUMP configuration field alongside the v1/superuser/config API endpoint. Together, Red Hat Quay superusers can return all Flask configuration fields that are set, which can be used to show proof of compliance for various security policies, such as PCI-DSS 4.0.
Prerequisites
-
You have set
FEATURE_SUPERUSER_CONFIGDUMP: truein yourconfig.yamlfile. -
You have assigned the superuser role to a user in your
config.yamlfile. - You have generated an OAuth 2 access token for the superuser.
Procedure
Retrieve configuration settings by using the
v1/superuser/configAPI endpoint. For example:curl -X GET -H "Authorization: Bearer <bearer_token>" "http://<quay-server.example.com>/api/v1/superuser/config" | jq -r .config
$ curl -X GET -H "Authorization: Bearer <bearer_token>" "http://<quay-server.example.com>/api/v1/superuser/config" | jq -r .configCopy to Clipboard Copied! Toggle word wrap Toggle overflow Example output
Copy to Clipboard Copied! Toggle word wrap Toggle overflow You can pass in one of
.config,.env,.warning, or.schemato return specific information. For example:curl -X GET -H "Authorization: Bearer <bearer_token>" "http://<quay-server.example.com>/api/v1/superuser/config" | jq -r .warning
$ curl -X GET -H "Authorization: Bearer <bearer_token>" "http://<quay-server.example.com>/api/v1/superuser/config" | jq -r .warningCopy to Clipboard Copied! Toggle word wrap Toggle overflow Example output
Copy to Clipboard Copied! Toggle word wrap Toggle overflow