Skip to content

Conversation

rculpepper
Copy link
Contributor

No description provided.

@rculpepper rculpepper requested a review from a team as a code owner August 20, 2025 17:00
Copy link

github-actions bot commented Aug 20, 2025

Vercel Previews Deployed

Name Status Preview Updated (UTC)
Dev Portal ✅ Ready (Inspect) Visit Preview Wed Aug 20 17:23:58 UTC 2025
Unified Docs API ✅ Ready (Inspect) Visit Preview Wed Aug 20 17:18:04 UTC 2025

Copy link

Broken Link Checker

Full Github Actions output

@yhyakuna yhyakuna added the Vault Content update for Vault product docs label Aug 21, 2025
Comment on lines +1206 to +1211
This endpoint generates a specified number of new high-entropy keys and encrypts them with the
named key. Optionally return the plaintext of the keys as well. Whether plaintext
is returned depends on the path; as a result, you can use Vault ACL policies to
control whether a user is allowed to retrieve the plaintext value of the keys. This
is useful if you want an untrusted user or operation to generate keys that are
then made available to trusted users.
Copy link
Contributor

@schavis schavis Aug 26, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
This endpoint generates a specified number of new high-entropy keys and encrypts them with the
named key. Optionally return the plaintext of the keys as well. Whether plaintext
is returned depends on the path; as a result, you can use Vault ACL policies to
control whether a user is allowed to retrieve the plaintext value of the keys. This
is useful if you want an untrusted user or operation to generate keys that are
then made available to trusted users.
The data keys endpoint generates the specified number of new, high-entropy keys.
Vault always returns keys encrypted with the provided named and optionally
returns the associated plaintext.
You can use Vault ACL policies to control which users can retrieve the plaintext
value of the keys. For example, to allow untrusted users or operations to
generate keys that are then available to trusted users.

Style correction: write in active voice, use complete sentences in paragraphs

| :----- | :----------------------------- |
| `POST` | `/transit/datakeys/:type/:name` |

### Parameters
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
### Parameters
### Path parameters

Comment on lines +1219 to +1222
- `type` `(string: <required>)` – Specifies the type of keys to generate. If
`plaintext`, the plaintext keys will be returned along with the ciphertexts. If
`wrapped`, only the ciphertext values will be returned. This is specified as
part of the URL.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
- `type` `(string: <required>)` – Specifies the type of keys to generate. If
`plaintext`, the plaintext keys will be returned along with the ciphertexts. If
`wrapped`, only the ciphertext values will be returned. This is specified as
part of the URL.
- `type` `(enum: <required>)` – Specifies the type of keys to generate.
- `plaintext` - return the plaintext keys along with the ciphertexts
- `wrapped` - only return the ciphertext values.


- `name` `(string: <required>)` – Specifies the name of the encryption key to
use to encrypt the datakeys. This is specified as part of the URL.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
### Request parameters

Comment on lines +1224 to +1225
- `name` `(string: <required>)` – Specifies the name of the encryption key to
use to encrypt the datakeys. This is specified as part of the URL.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
- `name` `(string: <required>)` – Specifies the name of the encryption key to
use to encrypt the datakeys. This is specified as part of the URL.
- `name` `(string: <required>)` – Specifies the name of the encryption key to
use to encrypt the datakeys.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Vault Content update for Vault product docs
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants