Drop vault.rocks (#4186)
This commit is contained in:
parent
1fcf0c6a38
commit
0b827774ae
|
@ -30,7 +30,7 @@ This endpoint returns a list the existing AppRoles in the method.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request LIST \
|
||||
https://vault.rocks/v1/auth/approle/role
|
||||
http://127.0.0.1:8200/v1/auth/approle/role
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -116,7 +116,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/auth/approle/role/application1
|
||||
http://127.0.0.1:8200/v1/auth/approle/role/application1
|
||||
```
|
||||
|
||||
## Read AppRole
|
||||
|
@ -136,7 +136,7 @@ Reads the properties of an existing AppRole.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/auth/approle/role/application1
|
||||
http://127.0.0.1:8200/v1/auth/approle/role/application1
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -182,7 +182,7 @@ Deletes an existing AppRole from the method.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request DELETE \
|
||||
https://vault.rocks/v1/auth/approle/role/application1
|
||||
http://127.0.0.1:8200/v1/auth/approle/role/application1
|
||||
```
|
||||
|
||||
## Read AppRole Role ID
|
||||
|
@ -202,7 +202,7 @@ Reads the RoleID of an existing AppRole.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/auth/approle/role/application1/role-id
|
||||
http://127.0.0.1:8200/v1/auth/approle/role/application1/role-id
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -249,7 +249,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/auth/approle/role/application1/role-id
|
||||
http://127.0.0.1:8200/v1/auth/approle/role/application1/role-id
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -306,7 +306,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/auth/approle/role/application1/secret-id
|
||||
http://127.0.0.1:8200/v1/auth/approle/role/application1/secret-id
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -345,7 +345,7 @@ This includes the accessors for "custom" SecretIDs as well.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request LIST \
|
||||
https://vault.rocks/v1/auth/approle/role/application1/secret-id
|
||||
http://127.0.0.1:8200/v1/auth/approle/role/application1/secret-id
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -398,7 +398,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--payload @payload.json \
|
||||
https://vault.rocks/v1/auth/approle/role/application1/secret-id/lookup
|
||||
http://127.0.0.1:8200/v1/auth/approle/role/application1/secret-id/lookup
|
||||
```
|
||||
|
||||
## Destroy AppRole Secret ID
|
||||
|
@ -429,7 +429,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--payload @payload.json \
|
||||
https://vault.rocks/v1/auth/approle/role/application1/secret-id/destroy
|
||||
http://127.0.0.1:8200/v1/auth/approle/role/application1/secret-id/destroy
|
||||
```
|
||||
|
||||
## Read AppRole Secret ID Accessor
|
||||
|
@ -460,7 +460,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--payload @payload.json \
|
||||
https://vault.rocks/v1/auth/approle/role/application1/secret-id-accessor/lookup
|
||||
http://127.0.0.1:8200/v1/auth/approle/role/application1/secret-id-accessor/lookup
|
||||
```
|
||||
|
||||
## Destroy AppRole Secret ID Accessor
|
||||
|
@ -491,7 +491,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--payload @payload.json \
|
||||
https://vault.rocks/v1/auth/approle/role/application1/secret-id-accessor/destroy
|
||||
http://127.0.0.1:8200/v1/auth/approle/role/application1/secret-id-accessor/destroy
|
||||
```
|
||||
|
||||
## Create Custom AppRole Secret ID
|
||||
|
@ -531,7 +531,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/auth/approle/role/application1/custom-secret-id
|
||||
http://127.0.0.1:8200/v1/auth/approle/role/application1/custom-secret-id
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -582,7 +582,7 @@ AppRole (such as client IP CIDR) are also evaluated.
|
|||
$ curl \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/auth/approle/login
|
||||
http://127.0.0.1:8200/v1/auth/approle/login
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
|
|
@ -81,7 +81,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/auth/aws/config/client
|
||||
http://127.0.0.1:8200/v1/auth/aws/config/client
|
||||
```
|
||||
|
||||
## Read Config
|
||||
|
@ -97,7 +97,7 @@ Returns the previously configured AWS access credentials.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/auth/aws/config/client
|
||||
http://127.0.0.1:8200/v1/auth/aws/config/client
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -129,7 +129,7 @@ Deletes the previously configured AWS access credentials.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request DELETE \
|
||||
https://vault.rocks/v1/auth/aws/config/client
|
||||
http://127.0.0.1:8200/v1/auth/aws/config/client
|
||||
```
|
||||
|
||||
## Create Certificate Configuration
|
||||
|
@ -170,7 +170,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/auth/aws/config/certificate/test-cert
|
||||
http://127.0.0.1:8200/v1/auth/aws/config/certificate/test-cert
|
||||
```
|
||||
|
||||
## Read Certificate Configuration
|
||||
|
@ -190,7 +190,7 @@ Returns the previously configured AWS public key.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/auth/aws/config/certificate/test-cert
|
||||
http://127.0.0.1:8200/v1/auth/aws/config/certificate/test-cert
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -218,7 +218,7 @@ Removes the previously configured AWS public key.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request DELETE \
|
||||
https://vault.rocks/v1/auth/aws/config/certificate/test-cert
|
||||
http://127.0.0.1:8200/v1/auth/aws/config/certificate/test-cert
|
||||
```
|
||||
|
||||
## List Certificate Configurations
|
||||
|
@ -235,7 +235,7 @@ Lists all the AWS public certificates that are registered with the method.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request LIST \
|
||||
https://vault.rocks/v1/auth/aws/config/certificates
|
||||
http://127.0.0.1:8200/v1/auth/aws/config/certificates
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -285,7 +285,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/auth/aws/config/sts/111122223333
|
||||
http://127.0.0.1:8200/v1/auth/aws/config/sts/111122223333
|
||||
```
|
||||
|
||||
## Read STS Role
|
||||
|
@ -307,7 +307,7 @@ Returns the previously configured STS role.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/auth/aws/config/sts/111122223333
|
||||
http://127.0.0.1:8200/v1/auth/aws/config/sts/111122223333
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -334,7 +334,7 @@ Lists all the AWS Account IDs for which an STS role is registered.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request LIST \
|
||||
https://vault.rocks/v1/auth/aws/config/sts
|
||||
http://127.0.0.1:8200/v1/auth/aws/config/sts
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -364,7 +364,7 @@ Deletes a previously configured AWS account/STS role association.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request DELETE \
|
||||
https://vault.rocks/v1/auth/aws/config/sts
|
||||
http://127.0.0.1:8200/v1/auth/aws/config/sts
|
||||
```
|
||||
|
||||
## Configure Identity Whitelist Tidy Operation
|
||||
|
@ -398,7 +398,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/auth/aws/config/tidy/identity-whitelist
|
||||
http://127.0.0.1:8200/v1/auth/aws/config/tidy/identity-whitelist
|
||||
```
|
||||
|
||||
## Read Identity Whitelist Tidy Settings
|
||||
|
@ -414,7 +414,7 @@ Returns the previously configured periodic whitelist tidying settings.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/auth/aws/config/tidy/identity-whitelist
|
||||
http://127.0.0.1:8200/v1/auth/aws/config/tidy/identity-whitelist
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -442,7 +442,7 @@ Deletes the previously configured periodic whitelist tidying settings.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request DELETE \
|
||||
https://vault.rocks/v1/auth/aws/config/tidy/identity-whitelist
|
||||
http://127.0.0.1:8200/v1/auth/aws/config/tidy/identity-whitelist
|
||||
```
|
||||
|
||||
## Configure Role Tag Blacklist Tidy Operation
|
||||
|
@ -476,7 +476,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/auth/aws/config/tidy/roletag-blacklist
|
||||
http://127.0.0.1:8200/v1/auth/aws/config/tidy/roletag-blacklist
|
||||
```
|
||||
|
||||
## Read Role Tag Blacklist Tidy Settings
|
||||
|
@ -492,7 +492,7 @@ Returns the previously configured periodic blacklist tidying settings.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/auth/aws/config/tidy/roletag-blacklist
|
||||
http://127.0.0.1:8200/v1/auth/aws/config/tidy/roletag-blacklist
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -520,7 +520,7 @@ Deletes the previously configured periodic blacklist tidying settings.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request DELETE \
|
||||
https://vault.rocks/v1/auth/aws/config/tidy/roletag-blacklist
|
||||
http://127.0.0.1:8200/v1/auth/aws/config/tidy/roletag-blacklist
|
||||
```
|
||||
|
||||
## Create Role
|
||||
|
@ -705,7 +705,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/auth/aws/role/dev-role
|
||||
http://127.0.0.1:8200/v1/auth/aws/role/dev-role
|
||||
```
|
||||
|
||||
## Read Role
|
||||
|
@ -725,7 +725,7 @@ Returns the previously registered role configuration.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/auth/aws/role/dev-role
|
||||
http://127.0.0.1:8200/v1/auth/aws/role/dev-role
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -761,7 +761,7 @@ Lists all the roles that are registered with the method.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request LIST \
|
||||
https://vault.rocks/v1/auth/aws/roles
|
||||
http://127.0.0.1:8200/v1/auth/aws/roles
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -795,7 +795,7 @@ Deletes the previously registered role.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request DELETE \
|
||||
https://vault.rocks/v1/auth/aws/role/dev-role
|
||||
http://127.0.0.1:8200/v1/auth/aws/role/dev-role
|
||||
```
|
||||
|
||||
## Create Role Tags
|
||||
|
@ -855,7 +855,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/auth/aws/role/dev-api-and-web-role/tag
|
||||
http://127.0.0.1:8200/v1/auth/aws/role/dev-api-and-web-role/tag
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -948,7 +948,7 @@ along with its RSA digest can be supplied to this endpoint.
|
|||
$ curl \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/auth/aws/login
|
||||
http://127.0.0.1:8200/v1/auth/aws/login
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -999,7 +999,7 @@ token.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
https://vault.rocks/v1/auth/aws/roletag-blacklist/djE6MDlWcDBxR3V5Qjg9OmE9YW1pLWZjZTNjNjk2OnA9ZGVmYXVsdCxwcm9kOmQ9ZmFsc2U6dD0zMDBoMG0wczp1UExLQ1F4cXNlZlJocnAxcW1WYTF3c1FWVVhYSkc4VVpQLwo=
|
||||
http://127.0.0.1:8200/v1/auth/aws/roletag-blacklist/djE6MDlWcDBxR3V5Qjg9OmE9YW1pLWZjZTNjNjk2OnA9ZGVmYXVsdCxwcm9kOmQ9ZmFsc2U6dD0zMDBoMG0wczp1UExLQ1F4cXNlZlJocnAxcW1WYTF3c1FWVVhYSkc4VVpQLwo=
|
||||
```
|
||||
|
||||
### Read Role Tag Blacklist Information
|
||||
|
@ -1021,7 +1021,7 @@ Returns the blacklist entry of a previously blacklisted role tag.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/auth/aws/roletag-blacklist/djE6MDlWcDBxR3V5Qjg9OmE9YW1pLWZjZTNjNjk2OnA9ZGVmYXVsdCxwcm9kOmQ9ZmFsc2U6dD0zMDBoMG0wczp1UExLQ1F4cXNlZlJocnAxcW1WYTF3c1FWVVhYSkc4VVpQLwo=
|
||||
http://127.0.0.1:8200/v1/auth/aws/roletag-blacklist/djE6MDlWcDBxR3V5Qjg9OmE9YW1pLWZjZTNjNjk2OnA9ZGVmYXVsdCxwcm9kOmQ9ZmFsc2U6dD0zMDBoMG0wczp1UExLQ1F4cXNlZlJocnAxcW1WYTF3c1FWVVhYSkc4VVpQLwo=
|
||||
```
|
||||
|
||||
|
||||
|
@ -1050,7 +1050,7 @@ Lists all the role tags that are blacklisted.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request LIST \
|
||||
https://vault.rocks/v1/auth/aws/roletag-blacklist
|
||||
http://127.0.0.1:8200/v1/auth/aws/roletag-blacklist
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -1086,7 +1086,7 @@ Deletes a blacklisted role tag.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request DELETE \
|
||||
https://vault.rocks/v1/auth/aws/roletag-blacklist/djE6MDlWcDBxR3V5Qjg9OmE9YW1pLWZjZTNjNjk2OnA9ZGVmYXVsdCxwcm9kOmQ9ZmFsc2U6dD0zMDBoMG0wczp1UExLQ1F4cXNlZlJocnAxcW1WYTF3c1FWVVhYSkc4VVpQLwo=
|
||||
http://127.0.0.1:8200/v1/auth/aws/roletag-blacklist/djE6MDlWcDBxR3V5Qjg9OmE9YW1pLWZjZTNjNjk2OnA9ZGVmYXVsdCxwcm9kOmQ9ZmFsc2U6dD0zMDBoMG0wczp1UExLQ1F4cXNlZlJocnAxcW1WYTF3c1FWVVhYSkc4VVpQLwo=
|
||||
```
|
||||
|
||||
## Tidy Blacklist Tags
|
||||
|
@ -1110,7 +1110,7 @@ Cleans up the entries in the blacklist based on expiration time on the entry and
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
https://vault.rocks/v1/auth/aws/tidy/roletag-blacklist
|
||||
http://127.0.0.1:8200/v1/auth/aws/tidy/roletag-blacklist
|
||||
```
|
||||
|
||||
### Read Identity Whitelist Information
|
||||
|
@ -1133,7 +1133,7 @@ successful login.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/auth/aws/identity-whitelist/i-aab47d37
|
||||
http://127.0.0.1:8200/v1/auth/aws/identity-whitelist/i-aab47d37
|
||||
```
|
||||
|
||||
|
||||
|
@ -1165,7 +1165,7 @@ $ curl \
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request LIST \
|
||||
https://vault.rocks/v1/auth/aws/roletag-blacklist
|
||||
http://127.0.0.1:8200/v1/auth/aws/roletag-blacklist
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -1200,7 +1200,7 @@ Deletes a cache of the successful login from an instance.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request DELETE \
|
||||
https://vault.rocks/v1/auth/aws/identity-whitelist/i-aab47d37
|
||||
http://127.0.0.1:8200/v1/auth/aws/identity-whitelist/i-aab47d37
|
||||
```
|
||||
|
||||
## Tidy Identity Whitelist Entries
|
||||
|
@ -1224,5 +1224,5 @@ Cleans up the entries in the whitelist based on expiration time and
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
https://vault.rocks/v1/auth/aws/tidy/identity-whitelist
|
||||
http://127.0.0.1:8200/v1/auth/aws/tidy/identity-whitelist
|
||||
```
|
||||
|
|
|
@ -71,7 +71,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json
|
||||
https://vault.rocks/v1/auth/cert/certs/test-ca
|
||||
http://127.0.0.1:8200/v1/auth/cert/certs/test-ca
|
||||
```
|
||||
|
||||
## Read CA Certificate Role
|
||||
|
@ -91,7 +91,7 @@ Gets information associated with the named role.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/auth/cert/certs/test-ca
|
||||
http://127.0.0.1:8200/v1/auth/cert/certs/test-ca
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -130,7 +130,7 @@ Lists configured certificate names.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request LIST \
|
||||
https://vault.rocks/v1/auth/cert/certs
|
||||
http://127.0.0.1:8200/v1/auth/cert/certs
|
||||
|
||||
### Sample Response
|
||||
|
||||
|
@ -169,7 +169,7 @@ Deletes the named role and CA cert from the method mount.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request DELETE \
|
||||
https://vault.rocks/v1/auth/cert/certs/cert1
|
||||
http://127.0.0.1:8200/v1/auth/cert/certs/cert1
|
||||
```
|
||||
|
||||
## Create CRL
|
||||
|
@ -201,7 +201,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--date @payload.json \
|
||||
https://vault.rocks/v1/auth/cert/crls/custom-crl
|
||||
http://127.0.0.1:8200/v1/auth/cert/crls/custom-crl
|
||||
```
|
||||
|
||||
## Read CRL
|
||||
|
@ -223,7 +223,7 @@ arbitrary size, these are returned as strings.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/auth/cert/crls/custom-crl
|
||||
http://127.0.0.1:8200/v1/auth/cert/crls/custom-crl
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -261,7 +261,7 @@ Deletes the named CRL from the auth method mount.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request DELETE \
|
||||
https://vault.rocks/v1/auth/cert/crls/cert1
|
||||
http://127.0.0.1:8200/v1/auth/cert/crls/cert1
|
||||
```
|
||||
|
||||
## Configure TLS Certificate Method
|
||||
|
@ -293,7 +293,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--date @payload.json \
|
||||
https://vault.rocks/v1/auth/cert/certs/cert1
|
||||
http://127.0.0.1:8200/v1/auth/cert/certs/cert1
|
||||
```
|
||||
|
||||
## Login with TLS Certificate Method
|
||||
|
@ -329,7 +329,7 @@ https://tools.ietf.org/html/rfc6125#section-2.3)
|
|||
$ curl \
|
||||
--request POST \
|
||||
--date @payload.json \
|
||||
https://vault.rocks/v1/auth/cert/login
|
||||
http://127.0.0.1:8200/v1/auth/cert/login
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
|
|
@ -60,7 +60,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/auth/gcp/config
|
||||
http://127.0.0.1:8200/v1/auth/gcp/config
|
||||
```
|
||||
|
||||
## Read Config
|
||||
|
@ -76,7 +76,7 @@ Returns the previously configured config, including credentials.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/auth/gcp/config
|
||||
http://127.0.0.1:8200/v1/auth/gcp/config
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -110,7 +110,7 @@ Deletes the previously configured GCP config and credentials.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request DELETE \
|
||||
https://vault.rocks/v1/auth/gcp/config
|
||||
http://127.0.0.1:8200/v1/auth/gcp/config
|
||||
```
|
||||
|
||||
## Create Role
|
||||
|
@ -226,7 +226,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/auth/gcp/role/dev-role
|
||||
http://127.0.0.1:8200/v1/auth/gcp/role/dev-role
|
||||
```
|
||||
|
||||
## Edit Service Accounts For IAM Role
|
||||
|
@ -268,7 +268,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/auth/gcp/role/dev-role
|
||||
http://127.0.0.1:8200/v1/auth/gcp/role/dev-role
|
||||
```
|
||||
|
||||
## Edit Labels For GCE Role
|
||||
|
@ -308,7 +308,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/auth/gcp/role/dev-role
|
||||
http://127.0.0.1:8200/v1/auth/gcp/role/dev-role
|
||||
```
|
||||
|
||||
## Read Role
|
||||
|
@ -328,7 +328,7 @@ Returns the previously registered role configuration.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/auth/gcp/role/dev-role
|
||||
http://127.0.0.1:8200/v1/auth/gcp/role/dev-role
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -372,7 +372,7 @@ Lists all the roles that are registered with the plugin.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request LIST \
|
||||
https://vault.rocks/v1/auth/gcp/roles
|
||||
http://127.0.0.1:8200/v1/auth/gcp/roles
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -407,7 +407,7 @@ Deletes the previously registered role.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request DELETE \
|
||||
https://vault.rocks/v1/auth/gcp/role/dev-role
|
||||
http://127.0.0.1:8200/v1/auth/gcp/role/dev-role
|
||||
```
|
||||
|
||||
## Login
|
||||
|
@ -445,7 +445,7 @@ entity and then authorizes the entity for the given role.
|
|||
$ curl \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/auth/gcp/login
|
||||
http://127.0.0.1:8200/v1/auth/gcp/login
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
|
|
@ -50,7 +50,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/auth/github/config
|
||||
http://127.0.0.1:8200/v1/auth/github/config
|
||||
```
|
||||
|
||||
## Read Configuration
|
||||
|
@ -66,7 +66,7 @@ Reads the GitHub configuration.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/auth/github/config
|
||||
http://127.0.0.1:8200/v1/auth/github/config
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -112,7 +112,7 @@ Login using GitHub access token.
|
|||
```
|
||||
$ curl \
|
||||
--request POST \
|
||||
https://vault.rocks/v1/auth/github/login
|
||||
http://127.0.0.1:8200/v1/auth/github/login
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
|
|
@ -56,7 +56,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/auth/kubernetes/config
|
||||
http://127.0.0.1:8200/v1/auth/kubernetes/config
|
||||
```
|
||||
|
||||
## Read Config
|
||||
|
@ -72,7 +72,7 @@ Returns the previously configured config, including credentials.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/auth/kubernetes/config
|
||||
http://127.0.0.1:8200/v1/auth/kubernetes/config
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -138,7 +138,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/auth/kubernetes/role/dev-role
|
||||
http://127.0.0.1:8200/v1/auth/kubernetes/role/dev-role
|
||||
```
|
||||
## Read Role
|
||||
|
||||
|
@ -157,7 +157,7 @@ Returns the previously registered role configuration.
|
|||
```text
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/auth/kubernetes/role/dev-role
|
||||
http://127.0.0.1:8200/v1/auth/kubernetes/role/dev-role
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -193,7 +193,7 @@ Lists all the roles that are registered with the auth method.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request LIST \
|
||||
https://vault.rocks/v1/auth/kubernetes/role
|
||||
http://127.0.0.1:8200/v1/auth/kubernetes/role
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -227,7 +227,7 @@ Deletes the previously registered role.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request DELETE \
|
||||
https://vault.rocks/v1/auth/kubernetes/role/dev-role
|
||||
http://127.0.0.1:8200/v1/auth/kubernetes/role/dev-role
|
||||
```
|
||||
|
||||
## Login
|
||||
|
@ -263,7 +263,7 @@ entity and then authorizes the entity for the given role.
|
|||
$ curl \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/auth/kubernetes/login
|
||||
http://127.0.0.1:8200/v1/auth/kubernetes/login
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
|
|
@ -76,7 +76,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/auth/ldap/config
|
||||
http://127.0.0.1:8200/v1/auth/ldap/config
|
||||
```
|
||||
|
||||
### Sample Payload
|
||||
|
@ -112,7 +112,7 @@ This endpoint retrieves the LDAP configuration for the auth method.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/auth/ldap/config
|
||||
http://127.0.0.1:8200/v1/auth/ldap/config
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -160,7 +160,7 @@ This endpoint returns a list of existing groups in the method.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request LIST \
|
||||
https://vault.rocks/v1/auth/ldap/groups
|
||||
http://127.0.0.1:8200/v1/auth/ldap/groups
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -199,7 +199,7 @@ This endpoint returns the policies associated with a LDAP group.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/auth/ldap/groups/admins
|
||||
http://127.0.0.1:8200/v1/auth/ldap/groups/admins
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -248,7 +248,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/auth/ldap/groups/admins
|
||||
http://127.0.0.1:8200/v1/auth/ldap/groups/admins
|
||||
```
|
||||
|
||||
## Delete LDAP Group
|
||||
|
@ -269,7 +269,7 @@ This endpoint deletes the LDAP group and policy association.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request DELETE \
|
||||
https://vault.rocks/v1/auth/ldap/groups/admins
|
||||
http://127.0.0.1:8200/v1/auth/ldap/groups/admins
|
||||
```
|
||||
|
||||
## List LDAP Users
|
||||
|
@ -286,7 +286,7 @@ This endpoint returns a list of existing users in the method.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request LIST \
|
||||
https://vault.rocks/v1/auth/ldap/users
|
||||
http://127.0.0.1:8200/v1/auth/ldap/users
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -325,7 +325,7 @@ This endpoint returns the policies associated with a LDAP user.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/auth/ldap/users/mitchellh
|
||||
http://127.0.0.1:8200/v1/auth/ldap/users/mitchellh
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -377,7 +377,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/auth/ldap/users/mitchellh
|
||||
http://127.0.0.1:8200/v1/auth/ldap/users/mitchellh
|
||||
```
|
||||
|
||||
## Delete LDAP User
|
||||
|
@ -398,7 +398,7 @@ This endpoint deletes the LDAP user and policy association.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request DELETE \
|
||||
https://vault.rocks/v1/auth/ldap/users/mitchellh
|
||||
http://127.0.0.1:8200/v1/auth/ldap/users/mitchellh
|
||||
```
|
||||
|
||||
## Login with LDAP User
|
||||
|
@ -428,7 +428,7 @@ This endpoint allows you to log in with LDAP credentials
|
|||
$ curl \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/auth/ldap/login/mitchellh
|
||||
http://127.0.0.1:8200/v1/auth/ldap/login/mitchellh
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
|
|
@ -57,7 +57,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/auth/okta/config
|
||||
http://127.0.0.1:8200/v1/auth/okta/config
|
||||
```
|
||||
|
||||
## Read Configuration
|
||||
|
@ -73,7 +73,7 @@ Reads the Okta configuration.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/auth/okta/config
|
||||
http://127.0.0.1:8200/v1/auth/okta/config
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -109,7 +109,7 @@ List the users configurated in the Okta method.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request LIST \
|
||||
https://vault.rocks/v1/auth/okta/users
|
||||
http://127.0.0.1:8200/v1/auth/okta/users
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -161,7 +161,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/auth/okta/users/fred
|
||||
http://127.0.0.1:8200/v1/auth/okta/users/fred
|
||||
```
|
||||
|
||||
## Read User
|
||||
|
@ -181,7 +181,7 @@ Reads the properties of an existing username.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/auth/okta/users/test-user
|
||||
http://127.0.0.1:8200/v1/auth/okta/users/test-user
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -221,7 +221,7 @@ Deletes an existing username from the method.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request DELETE \
|
||||
https://vault.rocks/v1/auth/okta/users/test-user
|
||||
http://127.0.0.1:8200/v1/auth/okta/users/test-user
|
||||
```
|
||||
|
||||
## List Groups
|
||||
|
@ -238,7 +238,7 @@ List the groups configurated in the Okta method.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request LIST \
|
||||
https://vault.rocks/v1/auth/okta/groups
|
||||
http://127.0.0.1:8200/v1/auth/okta/groups
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -289,7 +289,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/auth/okta/groups/admins
|
||||
http://127.0.0.1:8200/v1/auth/okta/groups/admins
|
||||
```
|
||||
|
||||
## Read Group
|
||||
|
@ -309,7 +309,7 @@ Reads the properties of an existing group.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/auth/okta/groups/admins
|
||||
http://127.0.0.1:8200/v1/auth/okta/groups/admins
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -348,7 +348,7 @@ Deletes an existing group from the method.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request DELETE \
|
||||
https://vault.rocks/v1/auth/okta/users/test-user
|
||||
http://127.0.0.1:8200/v1/auth/okta/users/test-user
|
||||
```
|
||||
|
||||
## Login
|
||||
|
@ -378,7 +378,7 @@ Login with the username and password.
|
|||
$ curl \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/auth/okta/login/fred
|
||||
http://127.0.0.1:8200/v1/auth/okta/login/fred
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
|
|
@ -56,7 +56,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/auth/radius/config
|
||||
http://127.0.0.1:8200/v1/auth/radius/config
|
||||
```
|
||||
|
||||
## Register User
|
||||
|
@ -87,7 +87,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/auth/radius/users/test-user
|
||||
http://127.0.0.1:8200/v1/auth/radius/users/test-user
|
||||
```
|
||||
|
||||
## Read User
|
||||
|
@ -107,7 +107,7 @@ Reads the properties of an existing username.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/auth/radius/users/test-user
|
||||
http://127.0.0.1:8200/v1/auth/radius/users/test-user
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -143,7 +143,7 @@ Deletes an existing username from the method.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request DELETE \
|
||||
https://vault.rocks/v1/auth/radius/users/test-user
|
||||
http://127.0.0.1:8200/v1/auth/radius/users/test-user
|
||||
```
|
||||
|
||||
## List Users
|
||||
|
@ -160,7 +160,7 @@ List the users registered with the method.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request LIST \
|
||||
https://vault.rocks/v1/auth/radius/users
|
||||
http://127.0.0.1:8200/v1/auth/radius/users
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -210,7 +210,7 @@ Login with the username and password.
|
|||
$ curl \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/auth/radius/login/test-user
|
||||
http://127.0.0.1:8200/v1/auth/radius/login/test-user
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
|
|
@ -28,7 +28,7 @@ large numbers of tokens and their associated leases at once.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request LIST \
|
||||
https://vault.rocks/v1/auth/token/accessors
|
||||
http://127.0.0.1:8200/v1/auth/token/accessors
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -123,7 +123,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/auth/token/create
|
||||
http://127.0.0.1:8200/v1/auth/token/create
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -172,7 +172,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/auth/token/lookup
|
||||
http://127.0.0.1:8200/v1/auth/token/lookup
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -209,7 +209,7 @@ Returns information about the current client token.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/auth/token/lookup-self
|
||||
http://127.0.0.1:8200/v1/auth/token/lookup-self
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -260,7 +260,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/auth/token/lookup-accessor
|
||||
http://127.0.0.1:8200/v1/auth/token/lookup-accessor
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -321,7 +321,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/auth/token/renew
|
||||
http://127.0.0.1:8200/v1/auth/token/renew
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -373,7 +373,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/auth/token/renew-self
|
||||
http://127.0.0.1:8200/v1/auth/token/renew-self
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -423,7 +423,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/auth/token/revoke
|
||||
http://127.0.0.1:8200/v1/auth/token/revoke
|
||||
```
|
||||
|
||||
## Revoke a Token (Self)
|
||||
|
@ -441,7 +441,7 @@ revoked, all dynamic secrets generated with it are also revoked.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
https://vault.rocks/v1/auth/token/revoke-self
|
||||
http://127.0.0.1:8200/v1/auth/token/revoke-self
|
||||
```
|
||||
|
||||
## Revoke a Token Accessor
|
||||
|
@ -473,7 +473,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/auth/token/revoke-accessor
|
||||
http://127.0.0.1:8200/v1/auth/token/revoke-accessor
|
||||
```
|
||||
|
||||
## Revoke Token and Orphan Children
|
||||
|
@ -507,7 +507,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/auth/token/revoke-orphan
|
||||
http://127.0.0.1:8200/v1/auth/token/revoke-orphan
|
||||
```
|
||||
|
||||
## Read Token Role
|
||||
|
@ -527,7 +527,7 @@ Fetches the named role configuration.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/auth/token/roles/nomad
|
||||
http://127.0.0.1:8200/v1/auth/token/roles/nomad
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -568,7 +568,7 @@ List available token roles.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request LIST
|
||||
https://vault.rocks/v1/auth/token/roles
|
||||
http://127.0.0.1:8200/v1/auth/token/roles
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -653,7 +653,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST
|
||||
--data @payload.json
|
||||
https://vault.rocks/v1/auth/token/roles/nomad
|
||||
http://127.0.0.1:8200/v1/auth/token/roles/nomad
|
||||
```
|
||||
|
||||
## Delete Token Role
|
||||
|
@ -674,7 +674,7 @@ This endpoint deletes the named token role.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request DELETE \
|
||||
https://vault.rocks/v1/auth/token/roles/admins
|
||||
http://127.0.0.1:8200/v1/auth/token/roles/admins
|
||||
```
|
||||
|
||||
## Tidy Tokens
|
||||
|
@ -694,5 +694,5 @@ storage method so should be used sparingly.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
https://vault.rocks/v1/auth/token/tidy
|
||||
http://127.0.0.1:8200/v1/auth/token/tidy
|
||||
```
|
||||
|
|
|
@ -51,7 +51,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/auth/userpass/users/mitchellh
|
||||
http://127.0.0.1:8200/v1/auth/userpass/users/mitchellh
|
||||
```
|
||||
|
||||
## Read User
|
||||
|
@ -67,7 +67,7 @@ Reads the properties of an existing username.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/auth/userpass/users/mitchellh
|
||||
http://127.0.0.1:8200/v1/auth/userpass/users/mitchellh
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -105,7 +105,7 @@ This endpoint deletes the user from the method.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request DELETE \
|
||||
https://vault.rocks/v1/auth/userpass/users/mitchellh
|
||||
http://127.0.0.1:8200/v1/auth/userpass/users/mitchellh
|
||||
```
|
||||
|
||||
## Update Password on User
|
||||
|
@ -136,7 +136,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/auth/userpass/users/mitchellh/password
|
||||
http://127.0.0.1:8200/v1/auth/userpass/users/mitchellh/password
|
||||
```
|
||||
|
||||
## Update Policies on User
|
||||
|
@ -167,7 +167,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/auth/userpass/users/mitchellh/policies
|
||||
http://127.0.0.1:8200/v1/auth/userpass/users/mitchellh/policies
|
||||
```
|
||||
|
||||
## List Users
|
||||
|
@ -184,7 +184,7 @@ List available userpass users.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request LIST
|
||||
https://vault.rocks/v1/auth/userpass/users
|
||||
http://127.0.0.1:8200/v1/auth/userpass/users
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -227,7 +227,7 @@ Login with the username and password.
|
|||
$ curl \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/auth/userpass/login/mitchellh
|
||||
http://127.0.0.1:8200/v1/auth/userpass/login/mitchellh
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
|
|
@ -77,7 +77,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/aws/config/root
|
||||
http://127.0.0.1:8200/v1/aws/config/root
|
||||
```
|
||||
|
||||
## Configure Lease
|
||||
|
@ -114,7 +114,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/aws/config/lease
|
||||
http://127.0.0.1:8200/v1/aws/config/lease
|
||||
```
|
||||
|
||||
## Read Lease
|
||||
|
@ -130,7 +130,7 @@ This endpoint returns the current lease settings for the AWS secrets engine.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/aws/config/lease
|
||||
http://127.0.0.1:8200/v1/aws/config/lease
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -172,7 +172,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/aws/roles/example-role
|
||||
http://127.0.0.1:8200/v1/aws/roles/example-role
|
||||
```
|
||||
|
||||
### Sample Payloads
|
||||
|
@ -212,7 +212,7 @@ exist, a 404 is returned.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/aws/roles/example-role
|
||||
http://127.0.0.1:8200/v1/aws/roles/example-role
|
||||
```
|
||||
|
||||
### Sample Responses
|
||||
|
@ -251,7 +251,7 @@ This endpoint lists all existing roles in the secrets engine.
|
|||
$ curl
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request LIST \
|
||||
https://vault.rocks/v1/aws/roles
|
||||
http://127.0.0.1:8200/v1/aws/roles
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -286,7 +286,7 @@ exist, a 404 is returned.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request DELETE \
|
||||
https://vault.rocks/v1/aws/roles/example-role
|
||||
http://127.0.0.1:8200/v1/aws/roles/example-role
|
||||
```
|
||||
|
||||
## Generate IAM Credentials
|
||||
|
@ -308,7 +308,7 @@ role must be created before queried.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/aws/creds/example-role
|
||||
http://127.0.0.1:8200/v1/aws/creds/example-role
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -361,7 +361,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/aws/sts/example-role
|
||||
http://127.0.0.1:8200/v1/aws/sts/example-role
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
|
|
@ -105,7 +105,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/cassandra/config/connection
|
||||
http://127.0.0.1:8200/v1/cassandra/config/connection
|
||||
```
|
||||
|
||||
## Create Role
|
||||
|
@ -156,7 +156,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/cassandra/roles/my-role
|
||||
http://127.0.0.1:8200/v1/cassandra/roles/my-role
|
||||
```
|
||||
|
||||
## Read Role
|
||||
|
@ -177,7 +177,7 @@ This endpoint queries the role definition.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/cassandra/roles/my-role
|
||||
http://127.0.0.1:8200/v1/cassandra/roles/my-role
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -212,7 +212,7 @@ This endpoint deletes the role definition.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request DELETE \
|
||||
https://vault.rocks/v1/cassandra/roles/my-role
|
||||
http://127.0.0.1:8200/v1/cassandra/roles/my-role
|
||||
```
|
||||
|
||||
## Generate Credentials
|
||||
|
@ -234,7 +234,7 @@ role.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/cassandra/creds/my-role
|
||||
http://127.0.0.1:8200/v1/cassandra/creds/my-role
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
|
|
@ -53,7 +53,7 @@ $ curl \
|
|||
--request POST \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/consul/config/access
|
||||
http://127.0.0.1:8200/v1/consul/config/access
|
||||
```
|
||||
|
||||
## Create/Update Role
|
||||
|
@ -108,7 +108,7 @@ $ curl \
|
|||
--request POST \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/consul/roles/example-role
|
||||
http://127.0.0.1:8200/v1/consul/roles/example-role
|
||||
```
|
||||
|
||||
## Read Role
|
||||
|
@ -130,7 +130,7 @@ If no role exists with that name, a 404 is returned.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/consul/roles/example-role
|
||||
http://127.0.0.1:8200/v1/consul/roles/example-role
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -159,7 +159,7 @@ This endpoint lists all existing roles in the secrets engine.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request LIST \
|
||||
https://vault.rocks/v1/consul/roles
|
||||
http://127.0.0.1:8200/v1/consul/roles
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -194,7 +194,7 @@ not exist, this endpoint will still return a successful response.
|
|||
$ curl \
|
||||
--request DELETE \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/consul/roles/example-role
|
||||
http://127.0.0.1:8200/v1/consul/roles/example-role
|
||||
```
|
||||
|
||||
## Generate Credential
|
||||
|
@ -216,7 +216,7 @@ definition.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/consul/creds/example-role
|
||||
http://127.0.0.1:8200/v1/consul/creds/example-role
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
|
|
@ -35,7 +35,7 @@ This endpoint retrieves the secret at the specified location.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/cubbyhole/my-secret
|
||||
http://127.0.0.1:8200/v1/cubbyhole/my-secret
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -73,7 +73,7 @@ not return a value. The values themselves are not accessible via this command.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request LIST \
|
||||
https://vault.rocks/v1/cubbyhole/my-secret
|
||||
http://127.0.0.1:8200/v1/cubbyhole/my-secret
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -129,7 +129,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/cubbyhole/my-secret
|
||||
http://127.0.0.1:8200/v1/cubbyhole/my-secret
|
||||
```
|
||||
|
||||
## Delete Secret
|
||||
|
@ -151,5 +151,5 @@ This endpoint deletes the secret at the specified location.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request DELETE \
|
||||
https://vault.rocks/v1/cubbyhole/my-secret
|
||||
http://127.0.0.1:8200/v1/cubbyhole/my-secret
|
||||
```
|
||||
|
|
|
@ -95,7 +95,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/cassandra/config/connection
|
||||
http://127.0.0.1:8200/v1/cassandra/config/connection
|
||||
```
|
||||
|
||||
## Statements
|
||||
|
|
|
@ -55,7 +55,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/database/config/hana
|
||||
http://127.0.0.1:8200/v1/database/config/hana
|
||||
```
|
||||
|
||||
## Statements
|
||||
|
|
|
@ -60,7 +60,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/database/config/mysql
|
||||
http://127.0.0.1:8200/v1/database/config/mysql
|
||||
```
|
||||
|
||||
## Read Connection
|
||||
|
@ -82,7 +82,7 @@ This endpoint returns the configuration settings for a connection.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request GET \
|
||||
https://vault.rocks/v1/database/config/mysql
|
||||
http://127.0.0.1:8200/v1/database/config/mysql
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -116,7 +116,7 @@ are returned, not any values.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request LIST \
|
||||
https://vault.rocks/v1/database/config
|
||||
http://127.0.0.1:8200/v1/database/config
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -148,7 +148,7 @@ This endpoint deletes a connection.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request DELETE \
|
||||
https://vault.rocks/v1/database/config/mysql
|
||||
http://127.0.0.1:8200/v1/database/config/mysql
|
||||
```
|
||||
|
||||
## Reset Connection
|
||||
|
@ -171,7 +171,7 @@ with the configuration stored in the barrier.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
https://vault.rocks/v1/database/reset/mysql
|
||||
http://127.0.0.1:8200/v1/database/reset/mysql
|
||||
```
|
||||
|
||||
## Create Role
|
||||
|
@ -236,7 +236,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/database/roles/my-role
|
||||
http://127.0.0.1:8200/v1/database/roles/my-role
|
||||
```
|
||||
|
||||
## Read Role
|
||||
|
@ -257,7 +257,7 @@ This endpoint queries the role definition.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/database/roles/my-role
|
||||
http://127.0.0.1:8200/v1/database/roles/my-role
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -291,7 +291,7 @@ returned, not any values.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request LIST \
|
||||
https://vault.rocks/v1/database/roles
|
||||
http://127.0.0.1:8200/v1/database/roles
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -327,7 +327,7 @@ This endpoint deletes the role definition.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request DELETE \
|
||||
https://vault.rocks/v1/database/roles/my-role
|
||||
http://127.0.0.1:8200/v1/database/roles/my-role
|
||||
```
|
||||
|
||||
## Generate Credentials
|
||||
|
@ -349,7 +349,7 @@ role.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/database/creds/my-role
|
||||
http://127.0.0.1:8200/v1/database/creds/my-role
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
|
|
@ -50,7 +50,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/database/config/mongodb
|
||||
http://127.0.0.1:8200/v1/database/config/mongodb
|
||||
```
|
||||
|
||||
## Statements
|
||||
|
|
|
@ -55,7 +55,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/database/config/mssql
|
||||
http://127.0.0.1:8200/v1/database/config/mssql
|
||||
```
|
||||
|
||||
## Statements
|
||||
|
|
|
@ -55,7 +55,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/database/config/mysql
|
||||
http://127.0.0.1:8200/v1/database/config/mysql
|
||||
```
|
||||
|
||||
## Statements
|
||||
|
|
|
@ -55,7 +55,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/database/config/oracle
|
||||
http://127.0.0.1:8200/v1/database/config/oracle
|
||||
```
|
||||
|
||||
## Statements
|
||||
|
|
|
@ -55,7 +55,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/database/config/postgresql
|
||||
http://127.0.0.1:8200/v1/database/config/postgresql
|
||||
```
|
||||
|
||||
## Statements
|
||||
|
|
|
@ -53,7 +53,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/identity/entity-alias
|
||||
http://127.0.0.1:8200/v1/identity/entity-alias
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -84,7 +84,7 @@ This endpoint queries the entity alias by its identifier.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/identity/entity-alias/id/34982d3d-e3ce-5d8b-6e5f-b9bb34246c31
|
||||
http://127.0.0.1:8200/v1/identity/entity-alias/id/34982d3d-e3ce-5d8b-6e5f-b9bb34246c31
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -154,7 +154,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/identity/entity-alias/id/34982d3d-e3ce-5d8b-6e5f-b9bb34246c31
|
||||
http://127.0.0.1:8200/v1/identity/entity-alias/id/34982d3d-e3ce-5d8b-6e5f-b9bb34246c31
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -186,7 +186,7 @@ This endpoint deletes an alias from its corresponding entity.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request DELETE \
|
||||
https://vault.rocks/v1/identity/entity-alias/id/34982d3d-e3ce-5d8b-6e5f-b9bb34246c31
|
||||
http://127.0.0.1:8200/v1/identity/entity-alias/id/34982d3d-e3ce-5d8b-6e5f-b9bb34246c31
|
||||
```
|
||||
|
||||
### List Entity Aliases by ID
|
||||
|
@ -204,7 +204,7 @@ This endpoint returns a list of available entity aliases by their identifiers.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request LIST \
|
||||
https://vault.rocks/v1/identity/entity-alias/id
|
||||
http://127.0.0.1:8200/v1/identity/entity-alias/id
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
|
|
@ -45,7 +45,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/identity/entity
|
||||
http://127.0.0.1:8200/v1/identity/entity
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -76,7 +76,7 @@ This endpoint queries the entity by its identifier.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/identity/entity/id/8d6a45e5-572f-8f13-d226-cd0d1ec57297
|
||||
http://127.0.0.1:8200/v1/identity/entity/id/8d6a45e5-572f-8f13-d226-cd0d1ec57297
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -141,7 +141,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/identity/entity/id/8d6a45e5-572f-8f13-d226-cd0d1ec57297
|
||||
http://127.0.0.1:8200/v1/identity/entity/id/8d6a45e5-572f-8f13-d226-cd0d1ec57297
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -173,7 +173,7 @@ This endpoint deletes an entity and all its associated aliases.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request DELETE \
|
||||
https://vault.rocks/v1/identity/entity/id/8d6a45e5-572f-8f13-d226-cd0d1ec57297
|
||||
http://127.0.0.1:8200/v1/identity/entity/id/8d6a45e5-572f-8f13-d226-cd0d1ec57297
|
||||
```
|
||||
|
||||
## List Entities by ID
|
||||
|
@ -191,7 +191,7 @@ This endpoint returns a list of available entities by their identifiers.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request LIST \
|
||||
https://vault.rocks/v1/identity/entity/id
|
||||
http://127.0.0.1:8200/v1/identity/entity/id
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
|
|
@ -44,7 +44,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/identity/group-alias
|
||||
http://127.0.0.1:8200/v1/identity/group-alias
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -75,7 +75,7 @@ This endpoint queries the group alias by its identifier.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/identity/group-alias/id/ca726050-d8ac-6f1f-4210-3b5c5b613824
|
||||
http://127.0.0.1:8200/v1/identity/group-alias/id/ca726050-d8ac-6f1f-4210-3b5c5b613824
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -115,7 +115,7 @@ This endpoint deletes a group alias.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request DELETE \
|
||||
https://vault.rocks/v1/identity/group-alias/id/ca726050-d8ac-6f1f-4210-3b5c5b613824
|
||||
http://127.0.0.1:8200/v1/identity/group-alias/id/ca726050-d8ac-6f1f-4210-3b5c5b613824
|
||||
```
|
||||
|
||||
## List Entities by ID
|
||||
|
@ -133,7 +133,7 @@ This endpoint returns a list of available group aliases by their identifiers.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request LIST \
|
||||
https://vault.rocks/v1/identity/group-alias/id
|
||||
http://127.0.0.1:8200/v1/identity/group-alias/id
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
|
|
@ -53,7 +53,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/identity/group
|
||||
http://127.0.0.1:8200/v1/identity/group
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -84,7 +84,7 @@ This endpoint queries the group by its identifier.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/identity/group/id/363926d8-dd8b-c9f0-21f8-7b248be80ce1
|
||||
http://127.0.0.1:8200/v1/identity/group/id/363926d8-dd8b-c9f0-21f8-7b248be80ce1
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -159,7 +159,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/identity/group/id/363926d8-dd8b-c9f0-21f8-7b248be80ce1
|
||||
http://127.0.0.1:8200/v1/identity/group/id/363926d8-dd8b-c9f0-21f8-7b248be80ce1
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -191,7 +191,7 @@ This endpoint deletes a group.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request DELETE \
|
||||
https://vault.rocks/v1/identity/group/id/363926d8-dd8b-c9f0-21f8-7b248be80ce1
|
||||
http://127.0.0.1:8200/v1/identity/group/id/363926d8-dd8b-c9f0-21f8-7b248be80ce1
|
||||
```
|
||||
|
||||
## List Groups by ID
|
||||
|
@ -209,7 +209,7 @@ This endpoint returns a list of available groups by their identifiers.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request LIST \
|
||||
https://vault.rocks/v1/identity/group/id
|
||||
http://127.0.0.1:8200/v1/identity/group/id
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
|
|
@ -46,7 +46,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/identity/group
|
||||
http://127.0.0.1:8200/v1/identity/group
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -98,7 +98,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/identity/group/id/454ceeb5-76d7-a131-b92a-7ecfb15523e8
|
||||
http://127.0.0.1:8200/v1/identity/group/id/454ceeb5-76d7-a131-b92a-7ecfb15523e8
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -129,7 +129,7 @@ This endpoint reads the group by its ID.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/identity/group/id/454ceeb5-76d7-a131-b92a-7ecfb15523e8
|
||||
http://127.0.0.1:8200/v1/identity/group/id/454ceeb5-76d7-a131-b92a-7ecfb15523e8
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -173,7 +173,7 @@ This endpoint deleted the group by its ID.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request DELETE \
|
||||
https://vault.rocks/v1/identity/group/id/454ceeb5-76d7-a131-b92a-7ecfb15523e8
|
||||
http://127.0.0.1:8200/v1/identity/group/id/454ceeb5-76d7-a131-b92a-7ecfb15523e8
|
||||
```
|
||||
|
||||
|
||||
|
@ -192,7 +192,7 @@ This endpoint lists all the groups by their ID.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request LIST \
|
||||
https://vault.rocks/v1/identity/group/id
|
||||
http://127.0.0.1:8200/v1/identity/group/id
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -240,7 +240,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/identity/lookup/group
|
||||
http://127.0.0.1:8200/v1/identity/lookup/group
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
|
|
@ -46,7 +46,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/identity/lookup/entity
|
||||
http://127.0.0.1:8200/v1/identity/lookup/entity
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -108,7 +108,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/identity/lookup/group
|
||||
http://127.0.0.1:8200/v1/identity/lookup/group
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
|
|
@ -34,7 +34,7 @@ This endpoint retrieves the secret at the specified location.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/secret/my-secret
|
||||
http://127.0.0.1:8200/v1/secret/my-secret
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -80,7 +80,7 @@ this command.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request LIST \
|
||||
https://vault.rocks/v1/secret/my-secret
|
||||
http://127.0.0.1:8200/v1/secret/my-secret
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -140,7 +140,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/secret/my-secret
|
||||
http://127.0.0.1:8200/v1/secret/my-secret
|
||||
```
|
||||
|
||||
## Delete Secret
|
||||
|
@ -162,5 +162,5 @@ This endpoint deletes the secret at the specified location.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request DELETE \
|
||||
https://vault.rocks/v1/secret/my-secret
|
||||
http://127.0.0.1:8200/v1/secret/my-secret
|
||||
```
|
||||
|
|
|
@ -54,7 +54,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/mongodb/config/connection
|
||||
http://127.0.0.1:8200/v1/mongodb/config/connection
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -88,7 +88,7 @@ including passwords, if any.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/mongodb/config/connection
|
||||
http://127.0.0.1:8200/v1/mongodb/config/connection
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -141,7 +141,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/mongodb/config/lease
|
||||
http://127.0.0.1:8200/v1/mongodb/config/lease
|
||||
```
|
||||
|
||||
## Read Lease
|
||||
|
@ -157,7 +157,7 @@ This endpoint queries the lease configuration.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/mongodb/config/lease
|
||||
http://127.0.0.1:8200/v1/mongodb/config/lease
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -209,7 +209,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/mongodb/roles/my-role
|
||||
http://127.0.0.1:8200/v1/mongodb/roles/my-role
|
||||
```
|
||||
|
||||
## Read Role
|
||||
|
@ -230,7 +230,7 @@ This endpoint queries the role definition.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/mongodb/roles/my-role
|
||||
http://127.0.0.1:8200/v1/mongodb/roles/my-role
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -265,7 +265,7 @@ returned, not any values.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request LIST \
|
||||
https://vault.rocks/v1/mongodb/roles
|
||||
http://127.0.0.1:8200/v1/mongodb/roles
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -306,7 +306,7 @@ This endpoint deletes the role definition.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request DELETE \
|
||||
https://vault.rocks/v1/mongodb/roles/my-role
|
||||
http://127.0.0.1:8200/v1/mongodb/roles/my-role
|
||||
```
|
||||
|
||||
## Generate Credentials
|
||||
|
@ -328,7 +328,7 @@ role.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/mongodb/creds/my-role
|
||||
http://127.0.0.1:8200/v1/mongodb/creds/my-role
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
|
|
@ -57,7 +57,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/mssql/config/connection
|
||||
http://127.0.0.1:8200/v1/mssql/config/connection
|
||||
```
|
||||
|
||||
## Configure Lease
|
||||
|
@ -93,7 +93,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/mssql/config/lease
|
||||
http://127.0.0.1:8200/v1/mssql/config/lease
|
||||
```
|
||||
|
||||
## Create Role
|
||||
|
@ -127,7 +127,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/mssql/roles/my-role
|
||||
http://127.0.0.1:8200/v1/mssql/roles/my-role
|
||||
```
|
||||
|
||||
## Read Role
|
||||
|
@ -148,7 +148,7 @@ This endpoint queries the role definition.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/mssql/roles/my-role
|
||||
http://127.0.0.1:8200/v1/mssql/roles/my-role
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -176,7 +176,7 @@ returned, not any values.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request LIST \
|
||||
https://vault.rocks/v1/mssql/roles
|
||||
http://127.0.0.1:8200/v1/mssql/roles
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -212,7 +212,7 @@ This endpoint deletes the role definition.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request DELETE \
|
||||
https://vault.rocks/v1/mssql/roles/my-role
|
||||
http://127.0.0.1:8200/v1/mssql/roles/my-role
|
||||
```
|
||||
|
||||
## Generate Credentials
|
||||
|
@ -234,7 +234,7 @@ role.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/mssql/creds/my-role
|
||||
http://127.0.0.1:8200/v1/mssql/creds/my-role
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
|
|
@ -59,7 +59,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/mysql/config/connection
|
||||
http://127.0.0.1:8200/v1/mysql/config/connection
|
||||
```
|
||||
|
||||
## Configure Lease
|
||||
|
@ -96,7 +96,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/mysql/config/lease
|
||||
http://127.0.0.1:8200/v1/mysql/config/lease
|
||||
```
|
||||
|
||||
## Create Role
|
||||
|
@ -148,7 +148,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/mysql/roles/my-role
|
||||
http://127.0.0.1:8200/v1/mysql/roles/my-role
|
||||
```
|
||||
|
||||
## Read Role
|
||||
|
@ -169,7 +169,7 @@ This endpoint queries the role definition.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/mysql/roles/my-role
|
||||
http://127.0.0.1:8200/v1/mysql/roles/my-role
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -197,7 +197,7 @@ returned, not any values.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request LIST \
|
||||
https://vault.rocks/v1/mysql/roles
|
||||
http://127.0.0.1:8200/v1/mysql/roles
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -233,7 +233,7 @@ This endpoint deletes the role definition.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request DELETE \
|
||||
https://vault.rocks/v1/mysql/roles/my-role
|
||||
http://127.0.0.1:8200/v1/mysql/roles/my-role
|
||||
```
|
||||
|
||||
## Generate Credentials
|
||||
|
@ -255,7 +255,7 @@ role.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/mysql/creds/my-role
|
||||
http://127.0.0.1:8200/v1/mysql/creds/my-role
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
|
|
@ -53,7 +53,7 @@ $ curl \
|
|||
--request POST \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/nomad/config/access
|
||||
http://127.0.0.1:8200/v1/nomad/config/access
|
||||
```
|
||||
|
||||
## Read Access Configuration
|
||||
|
@ -69,7 +69,7 @@ This endpoint queries for information about the Nomad connection.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/nomad/config/access
|
||||
http://127.0.0.1:8200/v1/nomad/config/access
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -114,7 +114,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/nomad/config/lease
|
||||
http://127.0.0.1:8200/v1/nomad/config/lease
|
||||
```
|
||||
|
||||
## Read Lease Configuration
|
||||
|
@ -130,7 +130,7 @@ This endpoint queries for information about the Lease TTL for the specified moun
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/nomad/config/lease
|
||||
http://127.0.0.1:8200/v1/nomad/config/lease
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -156,7 +156,7 @@ This endpoint deletes the lease configuration.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request DELETE \
|
||||
https://vault.rocks/v1/nomad/config/lease
|
||||
http://127.0.0.1:8200/v1/nomad/config/lease
|
||||
```
|
||||
|
||||
## Create/Update Role
|
||||
|
@ -202,7 +202,7 @@ $ curl \
|
|||
--request POST \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/nomad/role/monitoring
|
||||
http://127.0.0.1:8200/v1/nomad/role/monitoring
|
||||
```
|
||||
|
||||
## Read Role
|
||||
|
@ -224,7 +224,7 @@ If no role exists with that name, a 404 is returned.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/nomad/role/monitoring
|
||||
http://127.0.0.1:8200/v1/nomad/role/monitoring
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -256,7 +256,7 @@ This endpoint lists all existing roles in the backend.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request LIST \
|
||||
https://vault.rocks/v1/nomad/role
|
||||
http://127.0.0.1:8200/v1/nomad/role
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -291,7 +291,7 @@ not exist, this endpoint will still return a successful response.
|
|||
$ curl \
|
||||
--request DELETE \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/nomad/role/example-role
|
||||
http://127.0.0.1:8200/v1/nomad/role/example-role
|
||||
```
|
||||
|
||||
## Generate Credential
|
||||
|
@ -313,7 +313,7 @@ definition.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/nomad/creds/example
|
||||
http://127.0.0.1:8200/v1/nomad/creds/example
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
|
|
@ -62,7 +62,7 @@ This is an unauthenticated endpoint.
|
|||
|
||||
```
|
||||
$ curl \
|
||||
https://vault.rocks/v1/pki/ca/pem
|
||||
http://127.0.0.1:8200/v1/pki/ca/pem
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -87,7 +87,7 @@ This is an unauthenticated endpoint.
|
|||
|
||||
```
|
||||
$ curl \
|
||||
https://vault.rocks/v1/pki/ca_chain
|
||||
http://127.0.0.1:8200/v1/pki/ca_chain
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -121,7 +121,7 @@ This is an unauthenticated endpoint.
|
|||
|
||||
```
|
||||
$ curl \
|
||||
https://vault.rocks/v1/pki/cert/crl
|
||||
http://127.0.0.1:8200/v1/pki/cert/crl
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -148,7 +148,7 @@ This endpoint returns a list of the current certificates by serial number only.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request LIST \
|
||||
https://vault.rocks/v1/pki/certs
|
||||
http://127.0.0.1:8200/v1/pki/certs
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -225,7 +225,7 @@ marked valid.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/pki/config/crl
|
||||
http://127.0.0.1:8200/v1/pki/config/crl
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -270,7 +270,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/pki/config/crl
|
||||
http://127.0.0.1:8200/v1/pki/config/crl
|
||||
```
|
||||
|
||||
## Read URLs
|
||||
|
@ -286,7 +286,7 @@ This endpoint fetches the URLs to be encoded in generated certificates.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/pki/config/urls
|
||||
http://127.0.0.1:8200/v1/pki/config/urls
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -345,7 +345,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/pki/config/urls
|
||||
http://127.0.0.1:8200/v1/pki/config/urls
|
||||
```
|
||||
|
||||
## Read CRL
|
||||
|
@ -366,7 +366,7 @@ This is an unauthenticated endpoint.
|
|||
|
||||
```
|
||||
$ curl \
|
||||
https://vault.rocks/v1/pki/crl/pem
|
||||
http://127.0.0.1:8200/v1/pki/crl/pem
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -391,7 +391,7 @@ certificates being revoked.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/pki/crl/rotate
|
||||
http://127.0.0.1:8200/v1/pki/crl/rotate
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -505,7 +505,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/pki/intermediate/generate/internal
|
||||
http://127.0.0.1:8200/v1/pki/intermediate/generate/internal
|
||||
```
|
||||
|
||||
```json
|
||||
|
@ -556,7 +556,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/pki/intermediate/set-signed
|
||||
http://127.0.0.1:8200/v1/pki/intermediate/set-signed
|
||||
```
|
||||
|
||||
## Generate Certificate
|
||||
|
@ -632,7 +632,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/pki/issue/my-role
|
||||
http://127.0.0.1:8200/v1/pki/issue/my-role
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -685,7 +685,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/pki/revoke
|
||||
http://127.0.0.1:8200/v1/pki/revoke
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -867,7 +867,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/pki/roles/my-role
|
||||
http://127.0.0.1:8200/v1/pki/roles/my-role
|
||||
```
|
||||
|
||||
## Read Role
|
||||
|
@ -888,7 +888,7 @@ This endpoint queries the role definition.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/pki/roles/my-role
|
||||
http://127.0.0.1:8200/v1/pki/roles/my-role
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -927,7 +927,7 @@ returned, not any values.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request LIST \
|
||||
https://vault.rocks/v1/pki/roles
|
||||
http://127.0.0.1:8200/v1/pki/roles
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -964,7 +964,7 @@ revoke certificates previously issued under this role.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request DELETE \
|
||||
https://vault.rocks/v1/pki/roles/my-role
|
||||
http://127.0.0.1:8200/v1/pki/roles/my-role
|
||||
```
|
||||
|
||||
## Generate Root
|
||||
|
@ -1091,7 +1091,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/pki/root/generate/internal
|
||||
http://127.0.0.1:8200/v1/pki/root/generate/internal
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -1127,7 +1127,7 @@ _This endpoint requires sudo/root privileges._
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request DELETE \
|
||||
https://vault.rocks/v1/pki/root
|
||||
http://127.0.0.1:8200/v1/pki/root
|
||||
```
|
||||
|
||||
## Sign Intermediate
|
||||
|
@ -1243,7 +1243,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/pki/root/sign-intermediate
|
||||
http://127.0.0.1:8200/v1/pki/root/sign-intermediate
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -1303,7 +1303,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/pki/root/sign-self-issued
|
||||
http://127.0.0.1:8200/v1/pki/root/sign-self-issued
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -1444,7 +1444,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/pki/sign-verbatim
|
||||
http://127.0.0.1:8200/v1/pki/sign-verbatim
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -1505,5 +1505,5 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/pki/tidy
|
||||
http://127.0.0.1:8200/v1/pki/tidy
|
||||
```
|
||||
|
|
|
@ -62,7 +62,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/postgresql/config/connection
|
||||
http://127.0.0.1:8200/v1/postgresql/config/connection
|
||||
```
|
||||
|
||||
## Configure Lease
|
||||
|
@ -99,7 +99,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/postgresql/config/lease
|
||||
http://127.0.0.1:8200/v1/postgresql/config/lease
|
||||
```
|
||||
|
||||
## Create Role
|
||||
|
@ -142,7 +142,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/postgresql/roles/my-role
|
||||
http://127.0.0.1:8200/v1/postgresql/roles/my-role
|
||||
```
|
||||
|
||||
## Read Role
|
||||
|
@ -163,7 +163,7 @@ This endpoint queries the role definition.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/postgresql/roles/my-role
|
||||
http://127.0.0.1:8200/v1/postgresql/roles/my-role
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -191,7 +191,7 @@ returned, not any values.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request LIST \
|
||||
https://vault.rocks/v1/postgresql/roles
|
||||
http://127.0.0.1:8200/v1/postgresql/roles
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -227,7 +227,7 @@ This endpoint deletes the role definition.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request DELETE \
|
||||
https://vault.rocks/v1/postgresql/roles/my-role
|
||||
http://127.0.0.1:8200/v1/postgresql/roles/my-role
|
||||
```
|
||||
|
||||
## Generate Credentials
|
||||
|
@ -249,7 +249,7 @@ role.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/postgresql/creds/my-role
|
||||
http://127.0.0.1:8200/v1/postgresql/creds/my-role
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
|
|
@ -56,7 +56,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/rabbitmq/config/connection
|
||||
http://127.0.0.1:8200/v1/rabbitmq/config/connection
|
||||
```
|
||||
|
||||
## Configure Lease
|
||||
|
@ -89,7 +89,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/rabbitmq/config/lease
|
||||
http://127.0.0.1:8200/v1/rabbitmq/config/lease
|
||||
```
|
||||
|
||||
## Create Role
|
||||
|
@ -126,7 +126,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/rabbitmq/roles/my-role
|
||||
http://127.0.0.1:8200/v1/rabbitmq/roles/my-role
|
||||
```
|
||||
|
||||
## Read Role
|
||||
|
@ -147,7 +147,7 @@ This endpoint queries the role definition.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/rabbitmq/roles/my-role
|
||||
http://127.0.0.1:8200/v1/rabbitmq/roles/my-role
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -180,7 +180,7 @@ This endpoint deletes the role definition.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request DELETE \
|
||||
https://vault.rocks/v1/rabbitmq/roles/my-role
|
||||
http://127.0.0.1:8200/v1/rabbitmq/roles/my-role
|
||||
```
|
||||
|
||||
## Generate Credentials
|
||||
|
@ -202,7 +202,7 @@ role.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/rabbitmq/creds/my-role
|
||||
http://127.0.0.1:8200/v1/rabbitmq/creds/my-role
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
|
|
@ -47,7 +47,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/ssh/keys/my-key
|
||||
http://127.0.0.1:8200/v1/ssh/keys/my-key
|
||||
```
|
||||
|
||||
## Delete Key
|
||||
|
@ -70,7 +70,7 @@ This endpoint deletes a named key.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request DELETE \
|
||||
https://vault.rocks/v1/ssh/keys/my-key
|
||||
http://127.0.0.1:8200/v1/ssh/keys/my-key
|
||||
```
|
||||
|
||||
## Create Role
|
||||
|
@ -218,7 +218,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/ssh/roles/my-role
|
||||
http://127.0.0.1:8200/v1/ssh/roles/my-role
|
||||
```
|
||||
|
||||
## Read Role
|
||||
|
@ -239,7 +239,7 @@ This endpoint queries a named role.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/ssh/roles/my-role
|
||||
http://127.0.0.1:8200/v1/ssh/roles/my-role
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -301,7 +301,7 @@ returned, not any values.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request LIST \
|
||||
https://vault.rocks/v1/ssh/roles
|
||||
http://127.0.0.1:8200/v1/ssh/roles
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -346,7 +346,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request DELETE \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/ssh/roles/my-role
|
||||
http://127.0.0.1:8200/v1/ssh/roles/my-role
|
||||
```
|
||||
|
||||
## List Zero-Address Roles
|
||||
|
@ -362,7 +362,7 @@ This endpoint returns the list of configured zero-address roles.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/ssh/config/zeroaddress
|
||||
http://127.0.0.1:8200/v1/ssh/config/zeroaddress
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -411,7 +411,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/ssh/config/zeroaddress
|
||||
http://127.0.0.1:8200/v1/ssh/config/zeroaddress
|
||||
```
|
||||
|
||||
## Delete Zero-Address Role
|
||||
|
@ -428,7 +428,7 @@ This endpoint deletes the zero-address roles configuration.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request DELETE \
|
||||
https://vault.rocks/v1/ssh/config/zeroaddress
|
||||
http://127.0.0.1:8200/v1/ssh/config/zeroaddress
|
||||
```
|
||||
|
||||
## Generate SSH Credentials
|
||||
|
@ -464,7 +464,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/ssh/creds/my-role
|
||||
http://127.0.0.1:8200/v1/ssh/creds/my-role
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -540,7 +540,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/ssh/lookup
|
||||
http://127.0.0.1:8200/v1/ssh/lookup
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -592,7 +592,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/ssh/verify
|
||||
http://127.0.0.1:8200/v1/ssh/verify
|
||||
|
||||
### Sample Response
|
||||
|
||||
|
@ -647,7 +647,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/ssh/config/ca
|
||||
http://127.0.0.1:8200/v1/ssh/config/ca
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -682,7 +682,7 @@ This endpoint deletes the CA information for the backend via an SSH key pair.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request DELETE \
|
||||
https://vault.rocks/v1/ssh/config/ca
|
||||
http://127.0.0.1:8200/v1/ssh/config/ca
|
||||
```
|
||||
|
||||
## Read Public Key (Unauthenticated)
|
||||
|
@ -697,7 +697,7 @@ endpoint.
|
|||
### Sample Request
|
||||
|
||||
```
|
||||
$ curl https://vault.rocks/v1/ssh/public_key
|
||||
$ curl http://127.0.0.1:8200/v1/ssh/public_key
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -719,7 +719,7 @@ This endpoint reads the configured/generated public key.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/ssh/config/ca
|
||||
http://127.0.0.1:8200/v1/ssh/config/ca
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -788,7 +788,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/ssh/sign/my-key
|
||||
http://127.0.0.1:8200/v1/ssh/sign/my-key
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
|
|
@ -67,7 +67,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/totp/keys/my-key
|
||||
http://127.0.0.1:8200/v1/totp/keys/my-key
|
||||
```
|
||||
|
||||
### Sample Payload
|
||||
|
@ -87,7 +87,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/totp/keys/my-key
|
||||
http://127.0.0.1:8200/v1/totp/keys/my-key
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -124,7 +124,7 @@ This endpoint queries the key definition.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/totp/keys/my-key
|
||||
http://127.0.0.1:8200/v1/totp/keys/my-key
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -156,7 +156,7 @@ returned, not any values.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request LIST \
|
||||
https://vault.rocks/v1/totp/keys
|
||||
http://127.0.0.1:8200/v1/totp/keys
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -192,7 +192,7 @@ This endpoint deletes the key definition.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request DELETE \
|
||||
https://vault.rocks/v1/totp/keys/my-key
|
||||
http://127.0.0.1:8200/v1/totp/keys/my-key
|
||||
```
|
||||
|
||||
## Generate Code
|
||||
|
@ -214,7 +214,7 @@ key.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/totp/code/my-key
|
||||
http://127.0.0.1:8200/v1/totp/code/my-key
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -257,7 +257,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/totp/code/my-key
|
||||
http://127.0.0.1:8200/v1/totp/code/my-key
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
|
|
@ -77,7 +77,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/transit/keys/my-key
|
||||
http://127.0.0.1:8200/v1/transit/keys/my-key
|
||||
```
|
||||
|
||||
## Read Key
|
||||
|
@ -102,7 +102,7 @@ type.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/transit/keys/my-key
|
||||
http://127.0.0.1:8200/v1/transit/keys/my-key
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -144,7 +144,7 @@ actual keys themselves).
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request LIST \
|
||||
https://vault.rocks/v1/transit/keys
|
||||
http://127.0.0.1:8200/v1/transit/keys
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -182,7 +182,7 @@ catastrophic operation, the `deletion_allowed` tunable must be set in the key's
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request DELETE \
|
||||
https://vault.rocks/v1/transit/keys/my-key
|
||||
http://127.0.0.1:8200/v1/transit/keys/my-key
|
||||
```
|
||||
|
||||
## Update Key Configuration
|
||||
|
@ -233,7 +233,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/transit/keys/my-key/config
|
||||
http://127.0.0.1:8200/v1/transit/keys/my-key/config
|
||||
```
|
||||
|
||||
## Rotate Key
|
||||
|
@ -254,7 +254,7 @@ decryption operations.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
https://vault.rocks/v1/transit/keys/my-key/rotate
|
||||
http://127.0.0.1:8200/v1/transit/keys/my-key/rotate
|
||||
```
|
||||
|
||||
## Export Key
|
||||
|
@ -291,7 +291,7 @@ be valid.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/transit/export/encryption-key/my-key/1
|
||||
http://127.0.0.1:8200/v1/transit/export/encryption-key/my-key/1
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -391,7 +391,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/transit/encrypt/my-key
|
||||
http://127.0.0.1:8200/v1/transit/encrypt/my-key
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -460,7 +460,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/transit/decrypt/my-key
|
||||
http://127.0.0.1:8200/v1/transit/decrypt/my-key
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -535,7 +535,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/transit/rewrap/my-key
|
||||
http://127.0.0.1:8200/v1/transit/rewrap/my-key
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -599,7 +599,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/transit/datakey/plaintext/my-key
|
||||
http://127.0.0.1:8200/v1/transit/datakey/plaintext/my-key
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -644,7 +644,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/transit/random/164
|
||||
http://127.0.0.1:8200/v1/transit/random/164
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -696,7 +696,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/transit/hash/sha2-512
|
||||
http://127.0.0.1:8200/v1/transit/hash/sha2-512
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -755,7 +755,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/transit/hmac/my-key/sha2-512
|
||||
http://127.0.0.1:8200/v1/transit/hmac/my-key/sha2-512
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -829,7 +829,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/transit/sign/my-key/sha2-512
|
||||
http://127.0.0.1:8200/v1/transit/sign/my-key/sha2-512
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -905,7 +905,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/transit/verify/my-key/sha2-512
|
||||
http://127.0.0.1:8200/v1/transit/verify/my-key/sha2-512
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -938,7 +938,7 @@ restore the key.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/transit/backup/aes
|
||||
http://127.0.0.1:8200/v1/transit/backup/aes
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -982,5 +982,5 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/transit/restore
|
||||
http://127.0.0.1:8200/v1/transit/restore
|
||||
```
|
||||
|
|
|
@ -51,7 +51,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/sys/audit-hash/example-audit
|
||||
http://127.0.0.1:8200/v1/sys/audit-hash/example-audit
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
|
|
@ -29,7 +29,7 @@ available audit devices).
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/sys/audit
|
||||
http://127.0.0.1:8200/v1/sys/audit
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -95,7 +95,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request PUT \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/sys/audit/example-audit
|
||||
http://127.0.0.1:8200/v1/sys/audit/example-audit
|
||||
```
|
||||
|
||||
## Disable Audit Device
|
||||
|
@ -120,5 +120,5 @@ This endpoint disables the audit device at the given path.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request DELETE \
|
||||
https://vault.rocks/v1/sys/audit/example-audit
|
||||
http://127.0.0.1:8200/v1/sys/audit/example-audit
|
||||
```
|
||||
|
|
|
@ -25,7 +25,7 @@ This endpoint lists all enabled auth methods.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/sys/auth
|
||||
http://127.0.0.1:8200/v1/sys/auth
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -121,7 +121,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/sys/auth/my-auth
|
||||
http://127.0.0.1:8200/v1/sys/auth/my-auth
|
||||
```
|
||||
|
||||
## Disable Auth Method
|
||||
|
@ -146,7 +146,7 @@ This endpoint disables the auth method at the given auth path.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request DELETE \
|
||||
https://vault.rocks/v1/sys/auth/my-auth
|
||||
http://127.0.0.1:8200/v1/sys/auth/my-auth
|
||||
```
|
||||
|
||||
## Read Auth Method Tuning
|
||||
|
@ -171,7 +171,7 @@ without `sudo` via `sys/mounts/auth/[auth-path]/tune`._
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/sys/auth/my-auth/tune
|
||||
http://127.0.0.1:8200/v1/sys/auth/my-auth/tune
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -231,5 +231,5 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/sys/auth/my-auth/tune
|
||||
http://127.0.0.1:8200/v1/sys/auth/my-auth/tune
|
||||
```
|
||||
|
|
|
@ -50,7 +50,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/sys/capabilities-accessor
|
||||
http://127.0.0.1:8200/v1/sys/capabilities-accessor
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
|
|
@ -47,7 +47,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/sys/capabilities-self
|
||||
http://127.0.0.1:8200/v1/sys/capabilities-self
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
|
|
@ -48,7 +48,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/sys/capabilities
|
||||
http://127.0.0.1:8200/v1/sys/capabilities
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
|
|
@ -26,7 +26,7 @@ This endpoint lists the request headers that are configured to be audited.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/sys/config/auditing/request-headers
|
||||
http://127.0.0.1:8200/v1/sys/config/auditing/request-headers
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -62,7 +62,7 @@ This endpoint lists the information for the given request header.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/sys/config/auditing/request-headers/my-header
|
||||
http://127.0.0.1:8200/v1/sys/config/auditing/request-headers/my-header
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -106,7 +106,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request PUT \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/sys/config/auditing/request-headers/my-header
|
||||
http://127.0.0.1:8200/v1/sys/config/auditing/request-headers/my-header
|
||||
```
|
||||
|
||||
## Delete Audit Request Header
|
||||
|
@ -126,5 +126,5 @@ This endpoint disables auditing of the given request header.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request DELETE \
|
||||
https://vault.rocks/v1/sys/config/auditing/request-headers/my-header
|
||||
http://127.0.0.1:8200/v1/sys/config/auditing/request-headers/my-header
|
||||
```
|
||||
|
|
|
@ -26,7 +26,7 @@ This endpoint returns the current Control Group configuration.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/sys/config/control-group
|
||||
http://127.0.0.1:8200/v1/sys/config/control-group
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -64,7 +64,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request PUT \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/sys/config/control-group
|
||||
http://127.0.0.1:8200/v1/sys/config/control-group
|
||||
```
|
||||
|
||||
## Delete Control Group Settings
|
||||
|
@ -81,5 +81,5 @@ This endpoint removes any control group configuration.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request DELETE \
|
||||
https://vault.rocks/v1/sys/config/control-group
|
||||
http://127.0.0.1:8200/v1/sys/config/control-group
|
||||
```
|
||||
|
|
|
@ -26,7 +26,7 @@ This endpoint returns the current CORS configuration.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/sys/config/cors
|
||||
http://127.0.0.1:8200/v1/sys/config/cors
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -78,7 +78,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request PUT \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/sys/config/cors
|
||||
http://127.0.0.1:8200/v1/sys/config/cors
|
||||
```
|
||||
|
||||
## Delete CORS Settings
|
||||
|
@ -95,5 +95,5 @@ This endpoint removes any CORS configuration.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request DELETE \
|
||||
https://vault.rocks/v1/sys/config/cors
|
||||
http://127.0.0.1:8200/v1/sys/config/cors
|
||||
```
|
||||
|
|
|
@ -35,7 +35,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/sys/control-group/authorize
|
||||
http://127.0.0.1:8200/v1/sys/control-group/authorize
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -75,7 +75,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/sys/control-group/request
|
||||
http://127.0.0.1:8200/v1/sys/control-group/request
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
|
|
@ -24,7 +24,7 @@ attempt.
|
|||
|
||||
```
|
||||
$ curl \
|
||||
https://vault.rocks/v1/sys/generate-root/attempt
|
||||
http://127.0.0.1:8200/v1/sys/generate-root/attempt
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -82,7 +82,7 @@ generation attempt can take place at a time. One (and only one) of `otp` or
|
|||
$ curl \
|
||||
--request PUT \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/sys/generate-root/attempt
|
||||
http://127.0.0.1:8200/v1/sys/generate-root/attempt
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -113,7 +113,7 @@ progress made. This must be called to change the OTP or PGP key being used.
|
|||
```
|
||||
$ curl \
|
||||
--request DELETE \
|
||||
https://vault.rocks/v1/sys/generate-root/attempt
|
||||
http://127.0.0.1:8200/v1/sys/generate-root/attempt
|
||||
```
|
||||
|
||||
## Provide Key Share to Generate Root
|
||||
|
@ -149,7 +149,7 @@ nonce must be provided with each call.
|
|||
$ curl \
|
||||
--request PUT \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/sys/generate-root/update
|
||||
http://127.0.0.1:8200/v1/sys/generate-root/update
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
|
|
@ -52,7 +52,7 @@ The default status codes are:
|
|||
|
||||
```
|
||||
$ curl \
|
||||
https://vault.rocks/v1/sys/health
|
||||
http://127.0.0.1:8200/v1/sys/health
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
|
|
@ -22,7 +22,7 @@ This endpoint returns the initialization status of Vault.
|
|||
|
||||
```
|
||||
$ curl \
|
||||
https://vault.rocks/v1/sys/init
|
||||
http://127.0.0.1:8200/v1/sys/init
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -95,7 +95,7 @@ Additionally, the following options are only supported on Vault Pro/Enterprise:
|
|||
$ curl \
|
||||
--request PUT \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/sys/init
|
||||
http://127.0.0.1:8200/v1/sys/init
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
|
|
@ -25,7 +25,7 @@ of Vault.
|
|||
|
||||
```
|
||||
$ curl \
|
||||
https://vault.rocks/v1/sys/leader
|
||||
http://127.0.0.1:8200/v1/sys/leader
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
|
|
@ -37,7 +37,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request PUT \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/sys/leases/lookup
|
||||
http://127.0.0.1:8200/v1/sys/leases/lookup
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -70,7 +70,7 @@ This endpoint returns a list of lease ids.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request LIST \
|
||||
https://vault.rocks/v1/sys/leases/lookup/aws/creds/deploy/
|
||||
http://127.0.0.1:8200/v1/sys/leases/lookup/aws/creds/deploy/
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -119,7 +119,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request PUT \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/sys/leases/renew
|
||||
http://127.0.0.1:8200/v1/sys/leases/renew
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -159,7 +159,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request PUT \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/sys/leases/revoke
|
||||
http://127.0.0.1:8200/v1/sys/leases/revoke
|
||||
```
|
||||
|
||||
## Revoke Force
|
||||
|
@ -191,7 +191,7 @@ this endpoint should be tightly controlled.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request PUT \
|
||||
https://vault.rocks/v1/sys/leases/revoke-force/aws/creds
|
||||
http://127.0.0.1:8200/v1/sys/leases/revoke-force/aws/creds
|
||||
```
|
||||
|
||||
## Revoke Prefix
|
||||
|
@ -218,5 +218,5 @@ used to revoke very large numbers of secrets/tokens at once.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request PUT \
|
||||
https://vault.rocks/v1/sys/leases/revoke-prefix/aws/creds
|
||||
http://127.0.0.1:8200/v1/sys/leases/revoke-prefix/aws/creds
|
||||
```
|
||||
|
|
|
@ -27,7 +27,7 @@ This endpoint returns information about the currently installed license.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/sys/license
|
||||
http://127.0.0.1:8200/v1/sys/license
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -83,5 +83,5 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request PUT \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/sys/license
|
||||
http://127.0.0.1:8200/v1/sys/license
|
||||
```
|
||||
|
|
|
@ -52,7 +52,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/sys/mfa/method/duo/my_duo
|
||||
http://127.0.0.1:8200/v1/sys/mfa/method/duo/my_duo
|
||||
```
|
||||
|
||||
## Read Duo MFA Method
|
||||
|
@ -74,7 +74,7 @@ name.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request GET \
|
||||
https://vault.rocks/v1/sys/mfa/method/duo/my_duo
|
||||
http://127.0.0.1:8200/v1/sys/mfa/method/duo/my_duo
|
||||
|
||||
```
|
||||
|
||||
|
@ -114,6 +114,6 @@ This endpoint deletes a Duo MFA method.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request DELETE \
|
||||
https://vault.rocks/v1/sys/mfa/method/duo/my_duo
|
||||
http://127.0.0.1:8200/v1/sys/mfa/method/duo/my_duo
|
||||
|
||||
```
|
||||
|
|
|
@ -51,7 +51,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/sys/mfa/method/okta/my_okta
|
||||
http://127.0.0.1:8200/v1/sys/mfa/method/okta/my_okta
|
||||
```
|
||||
|
||||
## Read Okta MFA Method
|
||||
|
@ -73,7 +73,7 @@ name.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request GET \
|
||||
https://vault.rocks/v1/sys/mfa/method/okta/my_okta
|
||||
http://127.0.0.1:8200/v1/sys/mfa/method/okta/my_okta
|
||||
|
||||
```
|
||||
|
||||
|
@ -112,6 +112,6 @@ This endpoint deletes a Okta MFA method.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request DELETE \
|
||||
https://vault.rocks/v1/sys/mfa/method/okta/my_okta
|
||||
http://127.0.0.1:8200/v1/sys/mfa/method/okta/my_okta
|
||||
|
||||
```
|
||||
|
|
|
@ -44,7 +44,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/sys/mfa/method/pingid/ping
|
||||
http://127.0.0.1:8200/v1/sys/mfa/method/pingid/ping
|
||||
```
|
||||
|
||||
## Read PingiD MFA Method
|
||||
|
@ -66,7 +66,7 @@ name.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request GET \
|
||||
https://vault.rocks/v1/sys/mfa/method/pingid/ping
|
||||
http://127.0.0.1:8200/v1/sys/mfa/method/pingid/ping
|
||||
|
||||
```
|
||||
|
||||
|
@ -106,6 +106,6 @@ This endpoint deletes a PingID MFA method.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request DELETE \
|
||||
https://vault.rocks/v1/sys/mfa/method/pingid/ping
|
||||
http://127.0.0.1:8200/v1/sys/mfa/method/pingid/ping
|
||||
|
||||
```
|
||||
|
|
|
@ -48,7 +48,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/sys/mfa/method/totp/my_totp
|
||||
http://127.0.0.1:8200/v1/sys/mfa/method/totp/my_totp
|
||||
```
|
||||
|
||||
## Read TOTP MFA Method
|
||||
|
@ -70,7 +70,7 @@ name.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request GET \
|
||||
https://vault.rocks/v1/sys/mfa/method/totp/my_totp
|
||||
http://127.0.0.1:8200/v1/sys/mfa/method/totp/my_totp
|
||||
|
||||
```
|
||||
|
||||
|
@ -112,7 +112,7 @@ This endpoint deletes a TOTP MFA method.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request DELETE \
|
||||
https://vault.rocks/v1/sys/mfa/method/totp/my_totp
|
||||
http://127.0.0.1:8200/v1/sys/mfa/method/totp/my_totp
|
||||
|
||||
```
|
||||
|
||||
|
@ -136,7 +136,7 @@ method name.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request GET \
|
||||
https://vault.rocks/v1/sys/mfa/method/totp/my_totp/generate
|
||||
http://127.0.0.1:8200/v1/sys/mfa/method/totp/my_totp/generate
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -182,7 +182,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json
|
||||
https://vault.rocks/v1/sys/mfa/method/totp/my_totp/admin-generate
|
||||
http://127.0.0.1:8200/v1/sys/mfa/method/totp/my_totp/admin-generate
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -231,5 +231,5 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json
|
||||
https://vault.rocks/v1/sys/mfa/method/totp/my_totp/admin-destroy
|
||||
http://127.0.0.1:8200/v1/sys/mfa/method/totp/my_totp/admin-destroy
|
||||
```
|
||||
|
|
|
@ -23,7 +23,7 @@ This endpoints lists all the mounted secrets engines.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/sys/mounts
|
||||
http://127.0.0.1:8200/v1/sys/mounts
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -139,7 +139,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/sys/mounts/my-mount
|
||||
http://127.0.0.1:8200/v1/sys/mounts/my-mount
|
||||
```
|
||||
|
||||
## Disable Secrets Engine
|
||||
|
@ -156,7 +156,7 @@ This endpoint disables the mount point specified in the URL.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request DELETE \
|
||||
https://vault.rocks/v1/sys/mounts/my-mount
|
||||
http://127.0.0.1:8200/v1/sys/mounts/my-mount
|
||||
```
|
||||
|
||||
## Read Mount Configuration
|
||||
|
@ -174,7 +174,7 @@ be the system default or a mount-specific value.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/sys/mounts/my-mount/tune
|
||||
http://127.0.0.1:8200/v1/sys/mounts/my-mount/tune
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -232,5 +232,5 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/sys/mounts/my-mount/tune
|
||||
http://127.0.0.1:8200/v1/sys/mounts/my-mount/tune
|
||||
```
|
||||
|
|
|
@ -26,7 +26,7 @@ This endpoint lists the plugins in the catalog.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request LIST
|
||||
https://vault.rocks/v1/sys/plugins/catalog
|
||||
http://127.0.0.1:8200/v1/sys/plugins/catalog
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -86,7 +86,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request PUT \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/sys/plugins/catalog/example-plugin
|
||||
http://127.0.0.1:8200/v1/sys/plugins/catalog/example-plugin
|
||||
```
|
||||
|
||||
## Read Plugin
|
||||
|
@ -111,7 +111,7 @@ This endpoint returns the configuration data for the plugin with the given name.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request GET \
|
||||
https://vault.rocks/v1/sys/plugins/catalog/example-plugin
|
||||
http://127.0.0.1:8200/v1/sys/plugins/catalog/example-plugin
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -149,5 +149,5 @@ This endpoint removes the plugin with the given name.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request DELETE \
|
||||
https://vault.rocks/v1/sys/plugins/catalog/example-plugin
|
||||
http://127.0.0.1:8200/v1/sys/plugins/catalog/example-plugin
|
||||
```
|
||||
|
|
|
@ -43,5 +43,5 @@ This endpoint reloads mounted plugin backends.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request PUT
|
||||
https://vault.rocks/v1/sys/plugins/reload/backend
|
||||
http://127.0.0.1:8200/v1/sys/plugins/reload/backend
|
||||
```
|
||||
|
|
|
@ -26,7 +26,7 @@ This endpoint lists all configured ACL policies.
|
|||
```
|
||||
$ curl \
|
||||
-X LIST --header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/sys/policies/acl
|
||||
http://127.0.0.1:8200/v1/sys/policies/acl
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -55,7 +55,7 @@ This endpoint retrieves information about the named ACL policy.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/sys/policies/acl/my-policy
|
||||
http://127.0.0.1:8200/v1/sys/policies/acl/my-policy
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -99,7 +99,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request PUT \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/sys/policies/acl/my-policy
|
||||
http://127.0.0.1:8200/v1/sys/policies/acl/my-policy
|
||||
```
|
||||
|
||||
## Delete ACL Policy
|
||||
|
@ -123,7 +123,7 @@ acts as an empty policy.)
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request DELETE \
|
||||
https://vault.rocks/v1/sys/policies/acl/my-policy
|
||||
http://127.0.0.1:8200/v1/sys/policies/acl/my-policy
|
||||
```
|
||||
|
||||
## List RGP Policies
|
||||
|
@ -139,7 +139,7 @@ This endpoint lists all configured RGP policies.
|
|||
```
|
||||
$ curl \
|
||||
-X LIST --header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/sys/policies/rgp
|
||||
http://127.0.0.1:8200/v1/sys/policies/rgp
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -168,7 +168,7 @@ This endpoint retrieves information about the named RGP policy.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/sys/policies/rgp/webapp
|
||||
http://127.0.0.1:8200/v1/sys/policies/rgp/webapp
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -218,7 +218,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request PUT \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/sys/policies/rgp/webapp
|
||||
http://127.0.0.1:8200/v1/sys/policies/rgp/webapp
|
||||
```
|
||||
|
||||
## Delete RGP Policy
|
||||
|
@ -242,7 +242,7 @@ acts as an empty policy.)
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request DELETE \
|
||||
https://vault.rocks/v1/sys/policies/rgp/webapp
|
||||
http://127.0.0.1:8200/v1/sys/policies/rgp/webapp
|
||||
```
|
||||
|
||||
## List EGP Policies
|
||||
|
@ -264,7 +264,7 @@ path, this endpoint returns two identifiers:
|
|||
```
|
||||
$ curl \
|
||||
-X LIST --header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/sys/policies/egp
|
||||
http://127.0.0.1:8200/v1/sys/policies/egp
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -293,7 +293,7 @@ This endpoint retrieves information about the named EGP policy.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/sys/policies/egp/breakglass
|
||||
http://127.0.0.1:8200/v1/sys/policies/egp/breakglass
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -350,7 +350,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request PUT \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/sys/policies/egp/breakglass
|
||||
http://127.0.0.1:8200/v1/sys/policies/egp/breakglass
|
||||
```
|
||||
|
||||
## Delete EGP Policy
|
||||
|
@ -372,5 +372,5 @@ This endpoint deletes the EGP policy with the given name from all paths on which
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request DELETE \
|
||||
https://vault.rocks/v1/sys/policies/egp/breakglass
|
||||
http://127.0.0.1:8200/v1/sys/policies/egp/breakglass
|
||||
```
|
||||
|
|
|
@ -23,7 +23,7 @@ This endpoint lists all configured policies.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/sys/policy
|
||||
http://127.0.0.1:8200/v1/sys/policy
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -52,7 +52,7 @@ This endpoint retrieve the policy body for the named policy.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/sys/policy/my-policy
|
||||
http://127.0.0.1:8200/v1/sys/policy/my-policy
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -94,7 +94,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request PUT \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/sys/policy/my-policy
|
||||
http://127.0.0.1:8200/v1/sys/policy/my-policy
|
||||
```
|
||||
|
||||
## Delete Policy
|
||||
|
@ -117,5 +117,5 @@ affect all users associated with this policy.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request DELETE \
|
||||
https://vault.rocks/v1/sys/policy/my-policy
|
||||
http://127.0.0.1:8200/v1/sys/policy/my-policy
|
||||
```
|
||||
|
|
|
@ -34,7 +34,7 @@ system.
|
|||
```
|
||||
$ curl \
|
||||
---header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/sys/raw/secret/foo
|
||||
http://127.0.0.1:8200/v1/sys/raw/secret/foo
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -77,7 +77,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request PUT \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/sys/raw/secret/foo
|
||||
http://127.0.0.1:8200/v1/sys/raw/secret/foo
|
||||
```
|
||||
|
||||
## List Raw
|
||||
|
@ -98,7 +98,7 @@ This endpoint returns a list keys for a given path prefix.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request LIST \
|
||||
https://vault.rocks/v1/sys/raw/logical
|
||||
http://127.0.0.1:8200/v1/sys/raw/logical
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -135,5 +135,5 @@ storage backend and not the logical path that is exposed via the mount system.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request DELETE \
|
||||
https://vault.rocks/v1/sys/raw/secret/foo
|
||||
http://127.0.0.1:8200/v1/sys/raw/secret/foo
|
||||
```
|
||||
|
|
|
@ -25,7 +25,7 @@ This endpoint reads the configuration and progress of the current rekey attempt.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/sys/rekey-recovery-key/init
|
||||
http://127.0.0.1:8200/v1/sys/rekey-recovery-key/init
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -97,7 +97,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request PUT \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/sys/rekey-recovery-key/init
|
||||
http://127.0.0.1:8200/v1/sys/rekey-recovery-key/init
|
||||
```
|
||||
|
||||
## Cancel Rekey
|
||||
|
@ -116,7 +116,7 @@ rekey.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request DELETE \
|
||||
https://vault.rocks/v1/sys/rekey-recovery-key/init
|
||||
http://127.0.0.1:8200/v1/sys/rekey-recovery-key/init
|
||||
```
|
||||
|
||||
## Read Backup Key
|
||||
|
@ -134,7 +134,7 @@ fingerprint to hex-encoded PGP-encrypted key.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/sys/rekey-recovery-key/backup
|
||||
http://127.0.0.1:8200/v1/sys/rekey-recovery-key/backup
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -162,7 +162,7 @@ This endpoint deletes the backup copy of PGP-encrypted recovery key shares.
|
|||
$ curl \
|
||||
--header "X-Vault-Token" \
|
||||
--request DELETE \
|
||||
https://vault.rocks/v1/sys/rekey-recovery-key/backup
|
||||
http://127.0.0.1:8200/v1/sys/rekey-recovery-key/backup
|
||||
```
|
||||
|
||||
## Submit Key
|
||||
|
@ -199,7 +199,7 @@ $ curl \
|
|||
--header "X-Vault-Token" \
|
||||
--request PUT \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/sys/rekey-recovery-key/update
|
||||
http://127.0.0.1:8200/v1/sys/rekey-recovery-key/update
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
|
|
@ -28,7 +28,7 @@ This endpoint reads the configuration and progress of the current rekey attempt.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/sys/rekey/init
|
||||
http://127.0.0.1:8200/v1/sys/rekey/init
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -99,7 +99,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request PUT \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/sys/rekey/init
|
||||
http://127.0.0.1:8200/v1/sys/rekey/init
|
||||
```
|
||||
|
||||
## Cancel Rekey
|
||||
|
@ -118,7 +118,7 @@ rekey.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request DELETE \
|
||||
https://vault.rocks/v1/sys/rekey/init
|
||||
http://127.0.0.1:8200/v1/sys/rekey/init
|
||||
```
|
||||
|
||||
## Read Backup Key
|
||||
|
@ -136,7 +136,7 @@ hex-encoded PGP-encrypted key.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/sys/rekey/backup
|
||||
http://127.0.0.1:8200/v1/sys/rekey/backup
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -164,7 +164,7 @@ This endpoint deletes the backup copy of PGP-encrypted unseal keys.
|
|||
$ curl \
|
||||
--header "X-Vault-Token" \
|
||||
--request DELETE \
|
||||
https://vault.rocks/v1/sys/rekey/backup
|
||||
http://127.0.0.1:8200/v1/sys/rekey/backup
|
||||
```
|
||||
|
||||
## Submit Key
|
||||
|
@ -201,7 +201,7 @@ $ curl \
|
|||
--header "X-Vault-Token" \
|
||||
--request PUT \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/sys/rekey/update
|
||||
http://127.0.0.1:8200/v1/sys/rekey/update
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
|
|
@ -40,5 +40,5 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/sys/remount
|
||||
http://127.0.0.1:8200/v1/sys/remount
|
||||
```
|
||||
|
|
|
@ -25,7 +25,7 @@ This is an authenticated endpoint.
|
|||
|
||||
```
|
||||
$ curl \
|
||||
https://vault.rocks/v1/sys/replication/dr/status
|
||||
http://127.0.0.1:8200/v1/sys/replication/dr/status
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -87,7 +87,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/sys/replication/dr/primary/enable
|
||||
http://127.0.0.1:8200/v1/sys/replication/dr/primary/enable
|
||||
```
|
||||
|
||||
## Demote DR Primary
|
||||
|
@ -107,7 +107,7 @@ DR replication set without wiping local storage.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
https://vault.rocks/v1/sys/replication/dr/primary/demote
|
||||
http://127.0.0.1:8200/v1/sys/replication/dr/primary/demote
|
||||
```
|
||||
|
||||
## Disable DR Primary
|
||||
|
@ -129,7 +129,7 @@ will require a wipe of the underlying storage.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
https://vault.rocks/v1/sys/replication/dr/primary/disable
|
||||
http://127.0.0.1:8200/v1/sys/replication/dr/primary/disable
|
||||
```
|
||||
|
||||
## Generate DR Secondary Token
|
||||
|
@ -156,7 +156,7 @@ identifier can later be used to revoke a DR secondary's access.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/sys/replication/dr/primary/secondary-token?id=us-east-1
|
||||
http://127.0.0.1:8200/v1/sys/replication/dr/primary/secondary-token?id=us-east-1
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -207,7 +207,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/sys/replication/dr/primary/revoke-secondary
|
||||
http://127.0.0.1:8200/v1/sys/replication/dr/primary/revoke-secondary
|
||||
```
|
||||
|
||||
## Enable DR Secondary
|
||||
|
@ -254,7 +254,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/sys/replication/dr/secondary/enable
|
||||
http://127.0.0.1:8200/v1/sys/replication/dr/secondary/enable
|
||||
```
|
||||
|
||||
## Promote DR Secondary
|
||||
|
@ -306,7 +306,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/sys/replication/dr/secondary/promote
|
||||
http://127.0.0.1:8200/v1/sys/replication/dr/secondary/promote
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -382,7 +382,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/sys/replication/dr/secondary/update-primary
|
||||
http://127.0.0.1:8200/v1/sys/replication/dr/secondary/update-primary
|
||||
```
|
||||
|
||||
## Generate Disaster Recovery Operation Token
|
||||
|
@ -405,7 +405,7 @@ attempt.
|
|||
|
||||
```
|
||||
$ curl \
|
||||
https://vault.rocks/v1/sys/replication/dr/secondary/generate-operation-token/attempt
|
||||
http://127.0.0.1:8200/v1/sys/replication/dr/secondary/generate-operation-token/attempt
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -463,7 +463,7 @@ generation attempt can take place at a time. One (and only one) of `otp` or
|
|||
$ curl \
|
||||
--request PUT \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/sys/replication/dr/secondary/generate-operation-token/attempt
|
||||
http://127.0.0.1:8200/v1/sys/replication/dr/secondary/generate-operation-token/attempt
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -494,7 +494,7 @@ progress made. This must be called to change the OTP or PGP key being used.
|
|||
```
|
||||
$ curl \
|
||||
--request DELETE \
|
||||
https://vault.rocks/v1/sys/replication/dr/secondary/generate-operation-token/attempt
|
||||
http://127.0.0.1:8200/v1/sys/replication/dr/secondary/generate-operation-token/attempt
|
||||
```
|
||||
|
||||
## Provide Key Share to Generate Token
|
||||
|
@ -530,7 +530,7 @@ nonce must be provided with each call.
|
|||
$ curl \
|
||||
--request PUT \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/sys/replication/dr/secondary/generate-operation-token/update
|
||||
http://127.0.0.1:8200/v1/sys/replication/dr/secondary/generate-operation-token/update
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -579,5 +579,5 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/sys/replication/dr/secondary/operation-token/delete
|
||||
http://127.0.0.1:8200/v1/sys/replication/dr/secondary/operation-token/delete
|
||||
```
|
||||
|
|
|
@ -25,7 +25,7 @@ This is an authenticated endpoint.
|
|||
|
||||
```
|
||||
$ curl \
|
||||
https://vault.rocks/v1/sys/replication/performance/status
|
||||
http://127.0.0.1:8200/v1/sys/replication/performance/status
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -91,7 +91,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/sys/replication/performance/primary/enable
|
||||
http://127.0.0.1:8200/v1/sys/replication/performance/primary/enable
|
||||
```
|
||||
|
||||
## Demote Performance Primary
|
||||
|
@ -111,7 +111,7 @@ replication set without wiping local storage.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
https://vault.rocks/v1/sys/replication/performance/primary/demote
|
||||
http://127.0.0.1:8200/v1/sys/replication/performance/primary/demote
|
||||
```
|
||||
|
||||
## Disable Performance Primary
|
||||
|
@ -134,7 +134,7 @@ they have connected before) will require a wipe of the underlying storage.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
https://vault.rocks/v1/sys/replication/performance/primary/disable
|
||||
http://127.0.0.1:8200/v1/sys/replication/performance/primary/disable
|
||||
```
|
||||
|
||||
## Generate Performance Secondary Token
|
||||
|
@ -171,7 +171,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/sys/replication/performance/primary/secondary-token
|
||||
http://127.0.0.1:8200/v1/sys/replication/performance/primary/secondary-token
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -222,7 +222,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/sys/replication/performance/primary/revoke-secondary
|
||||
http://127.0.0.1:8200/v1/sys/replication/performance/primary/revoke-secondary
|
||||
```
|
||||
|
||||
## Create Mounts Filter
|
||||
|
@ -261,7 +261,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/sys/replication/performance/primary/mount-filter/us-east-1
|
||||
http://127.0.0.1:8200/v1/sys/replication/performance/primary/mount-filter/us-east-1
|
||||
```
|
||||
|
||||
## Read Mounts Filter
|
||||
|
@ -282,7 +282,7 @@ for a secondary.
|
|||
```
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/sys/replication/performance/primary/mount-filter/us-east-1
|
||||
http://127.0.0.1:8200/v1/sys/replication/performance/primary/mount-filter/us-east-1
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -312,7 +312,7 @@ This endpoint is used to delete the mount filters for a secondary.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request DELETE \
|
||||
https://vault.rocks/v1/sys/replication/performance/primary/mount-filter/us-east-1
|
||||
http://127.0.0.1:8200/v1/sys/replication/performance/primary/mount-filter/us-east-1
|
||||
```
|
||||
|
||||
## Enable Performance Secondary
|
||||
|
@ -359,7 +359,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/sys/replication/performance/secondary/enable
|
||||
http://127.0.0.1:8200/v1/sys/replication/performance/secondary/enable
|
||||
```
|
||||
|
||||
## Promote Performance Secondary
|
||||
|
@ -393,7 +393,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/sys/replication/performance/secondary/promote
|
||||
http://127.0.0.1:8200/v1/sys/replication/performance/secondary/promote
|
||||
```
|
||||
|
||||
## Disable Performance Secondary
|
||||
|
@ -418,7 +418,7 @@ underlying storage.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
https://vault.rocks/v1/sys/replication/performance/secondary/disable
|
||||
http://127.0.0.1:8200/v1/sys/replication/performance/secondary/disable
|
||||
```
|
||||
|
||||
## Update Performance Secondary's Primary
|
||||
|
@ -465,5 +465,5 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/sys/replication/performance/secondary/update-primary
|
||||
http://127.0.0.1:8200/v1/sys/replication/performance/secondary/update-primary
|
||||
```
|
||||
|
|
|
@ -25,7 +25,7 @@ example: an error has caused replication to stop syncing.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
https://vault.rocks/v1/sys/replication/recover
|
||||
http://127.0.0.1:8200/v1/sys/replication/recover
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -51,7 +51,7 @@ depending on the number and size of objects in the data store.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
https://vault.rocks/v1/sys/replication/reindex
|
||||
http://127.0.0.1:8200/v1/sys/replication/reindex
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -77,7 +77,7 @@ This is an authenticated endpoint.
|
|||
|
||||
```
|
||||
$ curl \
|
||||
https://vault.rocks/v1/sys/replication/status
|
||||
http://127.0.0.1:8200/v1/sys/replication/status
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
|
|
@ -27,5 +27,5 @@ the new key, while old values are decrypted with previous encryption keys.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request PUT \
|
||||
https://vault.rocks/v1/sys/rotate
|
||||
http://127.0.0.1:8200/v1/sys/rotate
|
||||
```
|
||||
|
|
|
@ -23,7 +23,7 @@ endpoint.
|
|||
|
||||
```
|
||||
$ curl \
|
||||
https://vault.rocks/v1/sys/seal-status
|
||||
http://127.0.0.1:8200/v1/sys/seal-status
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
|
|
@ -26,5 +26,5 @@ Standby nodes should be restarted to get the same effect. Requires a token with
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request PUT \
|
||||
https://vault.rocks/v1/sys/seal
|
||||
http://127.0.0.1:8200/v1/sys/seal
|
||||
```
|
||||
|
|
|
@ -29,5 +29,5 @@ the path.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request PUT \
|
||||
https://vault.rocks/v1/sys/step-down
|
||||
http://127.0.0.1:8200/v1/sys/step-down
|
||||
```
|
||||
|
|
|
@ -41,7 +41,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/sys/tools/random/164
|
||||
http://127.0.0.1:8200/v1/sys/tools/random/164
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
@ -93,7 +93,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/sys/tools/hash/sha2-512
|
||||
http://127.0.0.1:8200/v1/sys/tools/hash/sha2-512
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
|
|
@ -46,7 +46,7 @@ Either the `key` or `reset` parameter must be provided; if both are provided,
|
|||
$ curl \
|
||||
--request PUT \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/sys/unseal
|
||||
http://127.0.0.1:8200/v1/sys/unseal
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
|
|
@ -37,7 +37,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/sys/wrapping/lookup
|
||||
http://127.0.0.1:8200/v1/sys/wrapping/lookup
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
|
|
@ -41,7 +41,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/sys/wrapping/lookup
|
||||
http://127.0.0.1:8200/v1/sys/wrapping/lookup
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
|
|
@ -50,7 +50,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/sys/wrapping/unwrap
|
||||
http://127.0.0.1:8200/v1/sys/wrapping/unwrap
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
|
|
@ -44,7 +44,7 @@ $ curl \
|
|||
--header "X-Vault-Wrap-TTL: 60" \
|
||||
--request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/sys/wrapping/wrap
|
||||
http://127.0.0.1:8200/v1/sys/wrapping/wrap
|
||||
```
|
||||
|
||||
### Sample Response
|
||||
|
|
|
@ -76,7 +76,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--method POST \
|
||||
--data '{"user_id": ":user_id"}' \
|
||||
https://vault.rocks/v1/auth/app-id/login/:app_id
|
||||
http://127.0.0.1:8200/v1/auth/app-id/login/:app_id
|
||||
```
|
||||
|
||||
## Configuration
|
||||
|
|
|
@ -52,7 +52,7 @@ at a different path, use that value instead of `approle`.
|
|||
$ curl \
|
||||
--request POST \
|
||||
--data '{"role_id":"988a9df-...","secret_id":"37b74931..."}' \
|
||||
https://vault.rocks/v1/auth/approle/login
|
||||
http://127.0.0.1:8200/v1/auth/approle/login
|
||||
```
|
||||
|
||||
The response will contain the token at `auth.client_token`:
|
||||
|
@ -126,7 +126,7 @@ management tool.
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data '{"type": "approle"}' \
|
||||
https://vault.rocks/v1/sys/auth/approle
|
||||
http://127.0.0.1:8200/v1/sys/auth/approle
|
||||
```
|
||||
|
||||
1. Create an AppRole with desired set of policies:
|
||||
|
@ -136,7 +136,7 @@ management tool.
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data '{"policies": "dev-policy,test-policy"}' \
|
||||
https://vault.rocks/v1/auth/approle/role/my-role
|
||||
http://127.0.0.1:8200/v1/auth/approle/role/my-role
|
||||
```
|
||||
|
||||
1. Fetch the identifier of the role:
|
||||
|
@ -144,7 +144,7 @@ management tool.
|
|||
```sh
|
||||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
https://vault.rocks/v1/auth/approle/role/my-role/role-id
|
||||
http://127.0.0.1:8200/v1/auth/approle/role/my-role/role-id
|
||||
```
|
||||
|
||||
The response will look like:
|
||||
|
@ -163,7 +163,7 @@ management tool.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
https://vault.rocks/v1/auth/approle/role/my-role/secret-id
|
||||
http://127.0.0.1:8200/v1/auth/approle/role/my-role/secret-id
|
||||
```
|
||||
|
||||
The response will look like:
|
||||
|
|
|
@ -88,7 +88,7 @@ $ curl \
|
|||
--cert cert.pem \
|
||||
--key key.pem \
|
||||
--data '{"name": "web"}' \
|
||||
https://vault.rocks/v1/auth/cert/login
|
||||
http://127.0.0.1:8200/v1/auth/cert/login
|
||||
```
|
||||
|
||||
## Configuration
|
||||
|
|
|
@ -66,7 +66,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data '{"role": "dev-role", "jwt": "eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9..."}' \
|
||||
https://vault.rocks/v1/auth/gcp/login
|
||||
http://127.0.0.1:8200/v1/auth/gcp/login
|
||||
```
|
||||
|
||||
The response will contain the token at `auth.client_token`:
|
||||
|
@ -148,7 +148,7 @@ management tool.
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data '{"type": "gcp"}' \
|
||||
https://vault.rocks/v1/sys/auth/gcp
|
||||
http://127.0.0.1:8200/v1/sys/auth/gcp
|
||||
```
|
||||
|
||||
1. Configure the GCP auth method:
|
||||
|
@ -158,7 +158,7 @@ management tool.
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data '{"credentials": "{...}"}' \
|
||||
https://vault.rocks/v1/auth/gcp/config
|
||||
http://127.0.0.1:8200/v1/auth/gcp/config
|
||||
```
|
||||
|
||||
1. Create a role:
|
||||
|
@ -168,7 +168,7 @@ management tool.
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data '{"type": "iam", "project": "project-123456", ...}' \
|
||||
https://vault.rocks/v1/auth/gcp/role/dev-role
|
||||
http://127.0.0.1:8200/v1/auth/gcp/role/dev-role
|
||||
```
|
||||
|
||||
### Plugin Setup
|
||||
|
|
|
@ -42,7 +42,7 @@ at a different path, use that value instead of `github`.
|
|||
$ curl \
|
||||
--request POST \
|
||||
--data '{"token": "MY_TOKEN"}' \
|
||||
https://vault.rocks/v1/auth/github/login
|
||||
http://127.0.0.1:8200/v1/auth/github/login
|
||||
```
|
||||
|
||||
The response will contain a token at `auth.client_token`:
|
||||
|
|
|
@ -34,7 +34,7 @@ at a different path, use that value instead of `kubernetes`.
|
|||
$ curl \
|
||||
--request POST \
|
||||
--data '{"jwt": "your_service_account_jwt", "role": "demo"}' \
|
||||
https://vault.rocks/v1/auth/kubernetes/login
|
||||
http://127.0.0.1:8200/v1/auth/kubernetes/login
|
||||
```
|
||||
|
||||
The response will contain a token at `auth.client_token`:
|
||||
|
|
|
@ -58,7 +58,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data '{"password": "foo"}' \
|
||||
https://vault.rocks/v1/auth/ldap/login/mitchellh=
|
||||
http://127.0.0.1:8200/v1/auth/ldap/login/mitchellh=
|
||||
```
|
||||
|
||||
The response will be in JSON. For example:
|
||||
|
|
|
@ -52,7 +52,7 @@ MFA information should be sent in the POST body encoded as JSON.
|
|||
$ curl \
|
||||
--request POST \
|
||||
--data '{"password": "test", "passcode": "111111"}' \
|
||||
https://vault.rocks/v1/auth/userpass/login/my-username
|
||||
http://127.0.0.1:8200/v1/auth/userpass/login/my-username
|
||||
```
|
||||
|
||||
The response is the same as for the original method.
|
||||
|
|
|
@ -36,7 +36,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data '{"password": "MY_PASSWORD"}' \
|
||||
https://vault.rocks/v1/auth/okta/login/my-username
|
||||
http://127.0.0.1:8200/v1/auth/okta/login/my-username
|
||||
```
|
||||
|
||||
The response will contain a token at `auth.client_token`:
|
||||
|
|
|
@ -33,7 +33,7 @@ $ curl \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data '{"password": "..."}' \
|
||||
https://vault.rocks/v1/auth/radius/login/sethvargo
|
||||
http://127.0.0.1:8200/v1/auth/radius/login/sethvargo
|
||||
```
|
||||
|
||||
The response will contain a token at `auth.client_token`:
|
||||
|
|
|
@ -34,7 +34,7 @@ $ vault login -method=userpass \
|
|||
$ curl \
|
||||
--request POST \
|
||||
--data '{"password": "foo"}' \
|
||||
https://vault.rocks/v1/auth/userpass/login/mitchellh
|
||||
http://127.0.0.1:8200/v1/auth/userpass/login/mitchellh
|
||||
```
|
||||
|
||||
The response will contain the token at `auth.client_token`:
|
||||
|
|
|
@ -72,7 +72,7 @@ optional.
|
|||
$ curl \
|
||||
--header "X-Vault-Token: ..." \
|
||||
--header "X-Vault-MFA:my_totp:695452" \
|
||||
https://vault.rocks/v1/secret/foo
|
||||
http://127.0.0.1:8200/v1/secret/foo
|
||||
```
|
||||
|
||||
### API
|
||||
|
|
|
@ -76,7 +76,7 @@ be manual or automated using a configuration management tool. The public key is
|
|||
accessible via the API and does not require authentication.
|
||||
|
||||
```text
|
||||
$ curl -o /etc/ssh/trusted-user-ca-keys.pem https://vault.rocks/v1/ssh-client-signer/public_key
|
||||
$ curl -o /etc/ssh/trusted-user-ca-keys.pem http://127.0.0.1:8200/v1/ssh-client-signer/public_key
|
||||
```
|
||||
|
||||
```text
|
||||
|
@ -295,7 +295,7 @@ configuration on the host machine.
|
|||
target machines.
|
||||
|
||||
```text
|
||||
$ curl https://vault.rocks/v1/ssh-host-signer/public_key
|
||||
$ curl http://127.0.0.1:8200/v1/ssh-host-signer/public_key
|
||||
```
|
||||
|
||||
```text
|
||||
|
|
|
@ -187,7 +187,7 @@ parameters](/api/system/auth.html#enable-auth-method) of the method.
|
|||
$ curl --header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data '{"type": "approle"}' \
|
||||
https://vault.rocks/v1/sys/auth/approle
|
||||
http://127.0.0.1:8200/v1/sys/auth/approle
|
||||
```
|
||||
|
||||
The above example passes the **type** (`approle`) in the request payload
|
||||
|
@ -276,7 +276,7 @@ Before creating a role, create `jenkins` policy:
|
|||
|
||||
```shell
|
||||
$ curl --header "X-Vault-Token: ..." --request PUT --data @payload.json \
|
||||
https://vault.rocks/v1/sys/policy/jenkins
|
||||
http://127.0.0.1:8200/v1/sys/policy/jenkins
|
||||
|
||||
$ cat payload.json
|
||||
{
|
||||
|
@ -295,7 +295,7 @@ mode](/docs/auth/approle.html).)
|
|||
```shell
|
||||
$ curl --header "X-Vault-Token: ..." --request POST \
|
||||
--data '{"policies":"jenkins"}' \
|
||||
https://vault.rocks/v1/auth/approle/role/jenkins
|
||||
http://127.0.0.1:8200/v1/auth/approle/role/jenkins
|
||||
```
|
||||
|
||||
> There are a number of
|
||||
|
@ -315,14 +315,14 @@ separated string.
|
|||
$ curl --header "X-Vault-Token:..."
|
||||
--request POST \
|
||||
--data '{"policies":"jenkins,anotherpolicy"}' \
|
||||
https://vault.rocks/v1/auth/approle/role/jenkins
|
||||
http://127.0.0.1:8200/v1/auth/approle/role/jenkins
|
||||
````
|
||||
|
||||
To read the jenkins role you just created:
|
||||
|
||||
```shell
|
||||
$ curl --header "X-Vault-Token: ..." --request GET \
|
||||
https://vault.rocks/v1/auth/approle/role/jenkins | jq
|
||||
http://127.0.0.1:8200/v1/auth/approle/role/jenkins | jq
|
||||
{
|
||||
"request_id": "b18054ad-1ab5-8d83-eeed-193d97026ee7",
|
||||
"lease_id": "",
|
||||
|
@ -425,10 +425,10 @@ payload, or invoke the API with an empty payload.
|
|||
|
||||
```shell
|
||||
$ curl --header "X-Vault-Token:..." --request GET \
|
||||
https://vault.rocks/v1/auth/approle/role/jenkins/role-id | jq
|
||||
http://127.0.0.1:8200/v1/auth/approle/role/jenkins/role-id | jq
|
||||
|
||||
$ curl --header "X-Vault-Token:..." --request POST \
|
||||
https://vault.rocks/v1/auth/approle/role/jenkins/secret-id | jq
|
||||
http://127.0.0.1:8200/v1/auth/approle/role/jenkins/secret-id | jq
|
||||
```
|
||||
|
||||
If you specified `secret_id_ttl`, `secret_id_num_uses`, or `bound_cidr_list` on
|
||||
|
@ -484,7 +484,7 @@ $ cat payload.json
|
|||
"secret_id": "ed0a642f-2acf-c2da-232f-1b21300d5f29"
|
||||
}
|
||||
|
||||
$ curl --request POST --data @payload.json https://vault.rocks/v1/auth/approle/login | jq
|
||||
$ curl --request POST --data @payload.json http://127.0.0.1:8200/v1/auth/approle/login | jq
|
||||
{
|
||||
"request_id": "fccae32b-1e6a-9a9c-7666-f5cb07805c1e",
|
||||
"lease_id": "",
|
||||
|
@ -576,7 +576,7 @@ You can now pass the `client_token` returned in [Step 4](#step4) in the
|
|||
```plaintext
|
||||
$ curl --header "X-Vault-Token: 3e7dd0ac-8b3e-8f88-bb37-a2890455ca6e" \
|
||||
--request GET \
|
||||
https://vault.rocks/v1/secret/mysql/webapp | jq
|
||||
http://127.0.0.1:8200/v1/secret/mysql/webapp | jq
|
||||
{
|
||||
"errors": []
|
||||
}
|
||||
|
|
|
@ -210,7 +210,7 @@ Where `<TOKEN>` is your valid token with read permission on the
|
|||
|
||||
```shell
|
||||
$ curl --header "X-Vault-Token: ..." --request GET \
|
||||
https://vault.rocks/v1/sys/auth/token/tune | jq
|
||||
http://127.0.0.1:8200/v1/sys/auth/token/tune | jq
|
||||
{
|
||||
"default_lease_ttl": 2764800,
|
||||
"max_lease_ttl": 2764800,
|
||||
|
@ -321,7 +321,7 @@ The following example sets the `ttl` parameter.
|
|||
# Create a new token with TTl of 30 seconds
|
||||
$ curl --header "X-Vault-Token: ..." --request POST \
|
||||
--data '{"ttl": "30s"}' \
|
||||
https://vault.rocks/v1/auth/token/create | jq
|
||||
http://127.0.0.1:8200/v1/auth/token/create | jq
|
||||
{
|
||||
...
|
||||
"auth": {
|
||||
|
@ -339,7 +339,7 @@ $ curl --header "X-Vault-Token: ..." --request POST \
|
|||
# Pass the returned token (`client_token`) in the `X-Vault-Token` header to test
|
||||
$ curl --header "X-Vault-Token: f7d88963-1aba-64d7-11a0-9282ae7681d0" \
|
||||
--request GET \
|
||||
https://vault.rocks/v1/auth/token/lookup-self | jq
|
||||
http://127.0.0.1:8200/v1/auth/token/lookup-self | jq
|
||||
{
|
||||
...
|
||||
"data": {
|
||||
|
@ -363,12 +363,12 @@ token usage.
|
|||
|
||||
```shell
|
||||
$ curl --header "X-Vault-Token: ..." --request POST \
|
||||
https://vault.rocks/v1/auth/token/renew/<TOKEN> | jq
|
||||
http://127.0.0.1:8200/v1/auth/token/renew/<TOKEN> | jq
|
||||
|
||||
# Renew token with 1 hour extension
|
||||
$ curl --header "X-Vault-Token: ..." --request POST \
|
||||
--data '{"increment": "3600"}' \
|
||||
https://vault.rocks/v1/auth/token/renew/<TOKEN> | jq
|
||||
http://127.0.0.1:8200/v1/auth/token/renew/<TOKEN> | jq
|
||||
```
|
||||
|
||||
-> **NOTE:** Tokens can be renewed as long as its life hasn't reached its max
|
||||
|
@ -459,7 +459,7 @@ Set the `num_uses` property in the request payload.
|
|||
```shell
|
||||
$ curl --header "X-Vault-Token: ..." --request POST \
|
||||
--data '{ "policies": ["default"], "num_uses":2 }' \
|
||||
https://vault.rocks/v1/auth/token/create | jq
|
||||
http://127.0.0.1:8200/v1/auth/token/create | jq
|
||||
{
|
||||
"request_id": "0e98ff80-2825-7f50-6522-b6f95d596ef4",
|
||||
"lease_id": "",
|
||||
|
@ -488,7 +488,7 @@ This creates a token with the _default_ policy and a use limit of 2.
|
|||
```text
|
||||
$ curl --header "X-Vault-Token: d9c2f2e5-6b8a-4021-476c-ebd3f166d668" \
|
||||
--request GET \
|
||||
https://vault.rocks/v1/auth/token/lookup-self | jq
|
||||
http://127.0.0.1:8200/v1/auth/token/lookup-self | jq
|
||||
{
|
||||
"request_id": "77be1321-c0ca-e099-6f92-4ad87133b044",
|
||||
"lease_id": "",
|
||||
|
@ -511,12 +511,12 @@ $ curl --header "X-Vault-Token: d9c2f2e5-6b8a-4021-476c-ebd3f166d668" \
|
|||
$ curl --header "X-Vault-Token: d9c2f2e5-6b8a-4021-476c-ebd3f166d668" \
|
||||
--request POST \
|
||||
--data '{ "value": "d9c2f2e5-6b8a-4021-476c-ebd3f166d668" }' \
|
||||
https://vault.rocks/v1/cubbyhole/token
|
||||
http://127.0.0.1:8200/v1/cubbyhole/token
|
||||
|
||||
|
||||
$ curl --header "X-Vault-Token: d9c2f2e5-6b8a-4021-476c-ebd3f166d668" \
|
||||
--request GET \
|
||||
https://vault.rocks/v1/cubbyhole/token | jq
|
||||
http://127.0.0.1:8200/v1/cubbyhole/token | jq
|
||||
{
|
||||
"errors": [
|
||||
"permission denied"
|
||||
|
@ -581,7 +581,7 @@ token renewal period. This value can be an integer value in seconds (e.g.
|
|||
```shell
|
||||
$ curl --header "X-Vault-Token: ..." --request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/auth/token/roles/zabbix
|
||||
http://127.0.0.1:8200/v1/auth/token/roles/zabbix
|
||||
|
||||
$ cat payload.json
|
||||
{
|
||||
|
@ -599,7 +599,7 @@ Now, generate a token:
|
|||
|
||||
```plaintext
|
||||
$ curl --header "X-Vault-Token: ..." --request POST \
|
||||
https://vault.rocks/v1/auth/token/create/zabbix | jq
|
||||
http://127.0.0.1:8200/v1/auth/token/create/zabbix | jq
|
||||
{
|
||||
...
|
||||
"auth": {
|
||||
|
@ -643,7 +643,7 @@ Or
|
|||
```plaintext
|
||||
$ curl --header "X-Vault-Token:..." --request POST \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/auth/approle/role/jenkins
|
||||
http://127.0.0.1:8200/v1/auth/approle/role/jenkins
|
||||
|
||||
$ cat payload.json
|
||||
{
|
||||
|
@ -676,7 +676,7 @@ $ vault token create -orphan
|
|||
```shell
|
||||
$ curl --header "X-Vault-Token:..." --request POST \
|
||||
--data '{ "no_parent": true }' \
|
||||
https://vault.rocks/v1/auth/token/create-orphan | jq
|
||||
http://127.0.0.1:8200/v1/auth/token/create-orphan | jq
|
||||
```
|
||||
|
||||
|
||||
|
@ -723,15 +723,15 @@ To revoke a specific token, call `/auth/token/revoke` endpoint. If you want to
|
|||
# Revoke a specific token
|
||||
$ curl --header "X-Vault-Token:..." --request POST \
|
||||
--data '{ "token": "eeaf890e-4b0f-a687-4190-c75b1d6d70bc" }' \
|
||||
https://vault.rocks/v1/auth/token/revoke
|
||||
http://127.0.0.1:8200/v1/auth/token/revoke
|
||||
|
||||
# Revoke all secrets for database auth method
|
||||
$ curl --header "X-Vault-Token:..." --request POST \
|
||||
https://vault.rocks/v1/sys/leases/revoke-prefix/database/creds
|
||||
http://127.0.0.1:8200/v1/sys/leases/revoke-prefix/database/creds
|
||||
|
||||
# Revoke all tokens
|
||||
$ curl --header "X-Vault-Token:..." --request POST \
|
||||
https://vault.rocks/v1/sys/leases/revoke-prefix/auth/token/create
|
||||
http://127.0.0.1:8200/v1/sys/leases/revoke-prefix/auth/token/create
|
||||
```
|
||||
|
||||
|
||||
|
@ -776,7 +776,7 @@ Or
|
|||
```shell
|
||||
$ curl --header "X-Vault-Token:..." --request POST \
|
||||
--data '{ "max_lease_ttl": 129600}' \
|
||||
https://vault.rocks/v1/sys/mounts/database/tune
|
||||
http://127.0.0.1:8200/v1/sys/mounts/database/tune
|
||||
```
|
||||
|
||||
|
||||
|
|
|
@ -350,7 +350,7 @@ Now, create `admin` and `provisioner` policies:
|
|||
```shell
|
||||
# Create admin policy
|
||||
$ curl --request PUT --header "X-Vault-Token: ..." --data @admin-payload.json \
|
||||
https://vault.rocks/v1/sys/policy/admin
|
||||
http://127.0.0.1:8200/v1/sys/policy/admin
|
||||
|
||||
$ cat admin-payload.json
|
||||
{
|
||||
|
@ -359,7 +359,7 @@ $ cat admin-payload.json
|
|||
|
||||
# Create provisioner policy
|
||||
$ curl --request PUT --header "X-Vault-Token: ..." --data @provisioner-payload.json \
|
||||
https://vault.rocks/v1/sys/policy/provisioner
|
||||
http://127.0.0.1:8200/v1/sys/policy/provisioner
|
||||
|
||||
$ cat provisioner-payload.json
|
||||
{
|
||||
|
@ -424,7 +424,7 @@ path "sys/policy/*"
|
|||
To list existing ACL policies, use the `/sys/policy` endpoint.
|
||||
|
||||
```shell
|
||||
$ curl --request LIST --header "X-Vault-Token: ..." https://vault.rocks/v1/sys/policy | jq
|
||||
$ curl --request LIST --header "X-Vault-Token: ..." http://127.0.0.1:8200/v1/sys/policy | jq
|
||||
```
|
||||
|
||||
To read a specific policy, the endpoint path should be
|
||||
|
@ -435,7 +435,7 @@ To read a specific policy, the endpoint path should be
|
|||
Read the admin policy:
|
||||
|
||||
```plaintext
|
||||
$ curl --request GET --header "X-Vault-Token: ..." https://vault.rocks/v1/sys/policy/admin | jq
|
||||
$ curl --request GET --header "X-Vault-Token: ..." http://127.0.0.1:8200/v1/sys/policy/admin | jq
|
||||
{
|
||||
"name": "admin",
|
||||
"rules": "# Mount and manage auth methods broadly across Vault\npath \"auth/*\"\n{\n ...",
|
||||
|
@ -506,7 +506,7 @@ First, create a token attached to the `admin` policy:
|
|||
|
||||
```shell
|
||||
$ curl --request POST --header "X-Vault-Token: ..." --data '{ "policies":"admin" }' \
|
||||
https://vault.rocks/v1/auth/token/create
|
||||
http://127.0.0.1:8200/v1/auth/token/create
|
||||
{
|
||||
"request_id": "870ef38c-1401-7beb-633c-ff09cca3db68",
|
||||
"lease_id": "",
|
||||
|
@ -540,7 +540,7 @@ $ cat payload.json
|
|||
}
|
||||
|
||||
$ curl --request POST --header "X-Vault-Token: ..." --data @payload.json \
|
||||
https://vault.rocks/v1/sys/capabilities
|
||||
http://127.0.0.1:8200/v1/sys/capabilities
|
||||
{
|
||||
"capabilities": [
|
||||
"create",
|
||||
|
@ -577,7 +577,7 @@ the `sys/capabilities-self` endpoint.
|
|||
|
||||
```plaintext
|
||||
$ curl --request POST --header "X-Vault-Token: ..." --data '{"path":"sys/auth/approle"}' \
|
||||
https://vault.rocks/v1/sys/capabilities-self
|
||||
http://127.0.0.1:8200/v1/sys/capabilities-self
|
||||
```
|
||||
|
||||
|
||||
|
|
|
@ -207,7 +207,7 @@ $ cat payload.json
|
|||
|
||||
# API call to create a policy named, "apps"
|
||||
$ curl --header "X-Vault-Token: ..." --request PUT --data @payload.json \
|
||||
https://vault.rocks/v1/sys/policy/apps
|
||||
http://127.0.0.1:8200/v1/sys/policy/apps
|
||||
```
|
||||
|
||||
Response wrapping is per-request and is triggered by providing to Vault the
|
||||
|
@ -235,7 +235,7 @@ $ curl --header "X-Vault-Wrap-TTL: 120" \
|
|||
--header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data '{"policies":["apps"]}' \
|
||||
https://vault.rocks/v1/auth/token/create | jq
|
||||
http://127.0.0.1:8200/v1/auth/token/create | jq
|
||||
{
|
||||
"request_id": "",
|
||||
"lease_id": "",
|
||||
|
@ -355,7 +355,7 @@ First, create a token with `default` policy:
|
|||
# Create a new token default policy
|
||||
$ curl --header "X-Vault-Token: ..." --request POST \
|
||||
--data '{"policies": "default"}' \
|
||||
https://vault.rocks/v1/auth/token/create | jq
|
||||
http://127.0.0.1:8200/v1/auth/token/create | jq
|
||||
{
|
||||
...
|
||||
"auth": {
|
||||
|
@ -371,7 +371,7 @@ $ curl --header "X-Vault-Token: ..." --request POST \
|
|||
# Verify that you can NOT read secret/dev using default token
|
||||
$ curl --header "X-Vault-Token: 5fe14760-b0fd-22dc-403c-14a05003b67f" \
|
||||
--request GET \
|
||||
https://vault.rocks/v1/secret/dev | jq
|
||||
http://127.0.0.1:8200/v1/secret/dev | jq
|
||||
{
|
||||
"errors": [
|
||||
"permission denied"
|
||||
|
@ -392,7 +392,7 @@ $ curl --header "X-Vault-Token: <WRAPPING_TOKEN>" \
|
|||
```shell
|
||||
$ curl --header "X-Vault-Token: e095129f-123a-4fef-c007-1f6a487cfa78" \
|
||||
--request POST \
|
||||
https://vault.rocks/v1/sys/wrapping/unwrap | jq
|
||||
http://127.0.0.1:8200/v1/sys/wrapping/unwrap | jq
|
||||
{
|
||||
"request_id": "d704435d-c1cf-b8a3-52f6-ec50bc8246c4",
|
||||
"lease_id": "",
|
||||
|
@ -421,7 +421,7 @@ token.
|
|||
```plaintext
|
||||
$ curl --header "X-Vault-Token: af5f7682-aa55-fa37-5039-ee116df56600" \
|
||||
--request GET \
|
||||
https://vault.rocks/v1/secret/dev | jq
|
||||
http://127.0.0.1:8200/v1/secret/dev | jq
|
||||
{
|
||||
"errors": []
|
||||
}
|
||||
|
@ -509,11 +509,11 @@ Write secrets under `cubbyhole/private/` path, and read it back.
|
|||
# Write "token" to cubbyhole/private/access-token path
|
||||
$ curl --header "X-Vault-Token: e095129f-123a-4fef-c007-1f6a487cfa78" --request POST \
|
||||
--data '{"token": "123456789abcdefg87654321"}' \
|
||||
https://vault.rocks/v1/cubbyhole/private/access-token
|
||||
http://127.0.0.1:8200/v1/cubbyhole/private/access-token
|
||||
|
||||
# Read value from cubbyhole/private/access-token path
|
||||
$ curl --header "X-Vault-Token: e095129f-123a-4fef-c007-1f6a487cfa78" --request GET \
|
||||
https://vault.rocks/v1/cubbyhole/private/access-token | jq
|
||||
http://127.0.0.1:8200/v1/cubbyhole/private/access-token | jq
|
||||
{
|
||||
"request_id": "b2ff9f04-7a72-7eb0-672f-225b5eb652df",
|
||||
"lease_id": "",
|
||||
|
@ -533,7 +533,7 @@ secret.
|
|||
|
||||
```shell
|
||||
$ curl --header "X-Vault-Token: root" --request GET \
|
||||
https://vault.rocks/v1/cubbyhole/private/access-token | jq
|
||||
http://127.0.0.1:8200/v1/cubbyhole/private/access-token | jq
|
||||
{
|
||||
"errors": []
|
||||
}
|
||||
|
|
|
@ -229,7 +229,7 @@ $ vault write database/config/postgresql plugin_name=postgresql-database-plugin
|
|||
|
||||
```shell
|
||||
$ curl --header "X-Vault-Token: ..." --request POST --data @payload.json \
|
||||
https://vault.rocks/v1/database/config/postgresql
|
||||
http://127.0.0.1:8200/v1/database/config/postgresql
|
||||
|
||||
$ cat payload.json
|
||||
{
|
||||
|
@ -280,7 +280,7 @@ statement is passed as the role creation statement.
|
|||
|
||||
```shell
|
||||
$ curl --header "X-Vault-Token: ..." --request POST --data @payload.json \
|
||||
https://vault.rocks/v1/database/roles/readonly
|
||||
http://127.0.0.1:8200/v1/database/roles/readonly
|
||||
|
||||
$ cat payload.json
|
||||
{
|
||||
|
@ -381,12 +381,12 @@ $ cat payload.json
|
|||
# Create "apps" policy
|
||||
$ curl --header "X-Vault-Token: ..." --request PUT \
|
||||
--data @payload.json \
|
||||
https://vault.rocks/v1/sys/policy/apps
|
||||
http://127.0.0.1:8200/v1/sys/policy/apps
|
||||
|
||||
# Generate a new token with apps policy
|
||||
$ curl --header "X-Vault-Token: ..." --request POST \
|
||||
--data '{"policies": ["apps"]}' \
|
||||
https://vault.rocks/v1/auth/token/create | jq
|
||||
http://127.0.0.1:8200/v1/auth/token/create | jq
|
||||
{
|
||||
"request_id": "e1737bc8-7e51-3943-42a0-2dbd6cb40e3e",
|
||||
"lease_id": "",
|
||||
|
@ -418,7 +418,7 @@ demonstrates more sophisticated way of generating a token for your apps.
|
|||
```shell
|
||||
$ curl --header "X-Vault-Token: 1c97b03a-6098-31cf-9d8b-b404e52dcb4a" \
|
||||
--request GET \
|
||||
https://vault.rocks/v1/database/creds/readonly | jq
|
||||
http://127.0.0.1:8200/v1/database/creds/readonly | jq
|
||||
{
|
||||
"request_id": "e0e5a6c1-5e69-5cf3-c9d2-020af192de36",
|
||||
"lease_id": "database/creds/readonly/7aa462ab-98cb-fdcb-b226-f0a0d37644cc",
|
||||
|
|
Some files were not shown because too many files have changed in this diff Show more
Loading…
Reference in a new issue