Drop vault.rocks (#4186)

This commit is contained in:
Seth Vargo 2018-03-23 23:41:51 +08:00 committed by Jeff Mitchell
parent 1fcf0c6a38
commit 0b827774ae
101 changed files with 524 additions and 524 deletions

View file

@ -30,7 +30,7 @@ This endpoint returns a list the existing AppRoles in the method.
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
https://vault.rocks/v1/auth/approle/role
http://127.0.0.1:8200/v1/auth/approle/role
```
### Sample Response
@ -116,7 +116,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/auth/approle/role/application1
http://127.0.0.1:8200/v1/auth/approle/role/application1
```
## Read AppRole
@ -136,7 +136,7 @@ Reads the properties of an existing AppRole.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/auth/approle/role/application1
http://127.0.0.1:8200/v1/auth/approle/role/application1
```
### Sample Response
@ -182,7 +182,7 @@ Deletes an existing AppRole from the method.
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
https://vault.rocks/v1/auth/approle/role/application1
http://127.0.0.1:8200/v1/auth/approle/role/application1
```
## Read AppRole Role ID
@ -202,7 +202,7 @@ Reads the RoleID of an existing AppRole.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/auth/approle/role/application1/role-id
http://127.0.0.1:8200/v1/auth/approle/role/application1/role-id
```
### Sample Response
@ -249,7 +249,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/auth/approle/role/application1/role-id
http://127.0.0.1:8200/v1/auth/approle/role/application1/role-id
```
### Sample Response
@ -306,7 +306,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/auth/approle/role/application1/secret-id
http://127.0.0.1:8200/v1/auth/approle/role/application1/secret-id
```
### Sample Response
@ -345,7 +345,7 @@ This includes the accessors for "custom" SecretIDs as well.
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
https://vault.rocks/v1/auth/approle/role/application1/secret-id
http://127.0.0.1:8200/v1/auth/approle/role/application1/secret-id
```
### Sample Response
@ -398,7 +398,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--payload @payload.json \
https://vault.rocks/v1/auth/approle/role/application1/secret-id/lookup
http://127.0.0.1:8200/v1/auth/approle/role/application1/secret-id/lookup
```
## Destroy AppRole Secret ID
@ -429,7 +429,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--payload @payload.json \
https://vault.rocks/v1/auth/approle/role/application1/secret-id/destroy
http://127.0.0.1:8200/v1/auth/approle/role/application1/secret-id/destroy
```
## Read AppRole Secret ID Accessor
@ -460,7 +460,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--payload @payload.json \
https://vault.rocks/v1/auth/approle/role/application1/secret-id-accessor/lookup
http://127.0.0.1:8200/v1/auth/approle/role/application1/secret-id-accessor/lookup
```
## Destroy AppRole Secret ID Accessor
@ -491,7 +491,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--payload @payload.json \
https://vault.rocks/v1/auth/approle/role/application1/secret-id-accessor/destroy
http://127.0.0.1:8200/v1/auth/approle/role/application1/secret-id-accessor/destroy
```
## Create Custom AppRole Secret ID
@ -531,7 +531,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/auth/approle/role/application1/custom-secret-id
http://127.0.0.1:8200/v1/auth/approle/role/application1/custom-secret-id
```
### Sample Response
@ -582,7 +582,7 @@ AppRole (such as client IP CIDR) are also evaluated.
$ curl \
--request POST \
--data @payload.json \
https://vault.rocks/v1/auth/approle/login
http://127.0.0.1:8200/v1/auth/approle/login
```
### Sample Response

View file

@ -81,7 +81,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/auth/aws/config/client
http://127.0.0.1:8200/v1/auth/aws/config/client
```
## Read Config
@ -97,7 +97,7 @@ Returns the previously configured AWS access credentials.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/auth/aws/config/client
http://127.0.0.1:8200/v1/auth/aws/config/client
```
### Sample Response
@ -129,7 +129,7 @@ Deletes the previously configured AWS access credentials.
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
https://vault.rocks/v1/auth/aws/config/client
http://127.0.0.1:8200/v1/auth/aws/config/client
```
## Create Certificate Configuration
@ -170,7 +170,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/auth/aws/config/certificate/test-cert
http://127.0.0.1:8200/v1/auth/aws/config/certificate/test-cert
```
## Read Certificate Configuration
@ -190,7 +190,7 @@ Returns the previously configured AWS public key.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/auth/aws/config/certificate/test-cert
http://127.0.0.1:8200/v1/auth/aws/config/certificate/test-cert
```
### Sample Response
@ -218,7 +218,7 @@ Removes the previously configured AWS public key.
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
https://vault.rocks/v1/auth/aws/config/certificate/test-cert
http://127.0.0.1:8200/v1/auth/aws/config/certificate/test-cert
```
## List Certificate Configurations
@ -235,7 +235,7 @@ Lists all the AWS public certificates that are registered with the method.
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
https://vault.rocks/v1/auth/aws/config/certificates
http://127.0.0.1:8200/v1/auth/aws/config/certificates
```
### Sample Response
@ -285,7 +285,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/auth/aws/config/sts/111122223333
http://127.0.0.1:8200/v1/auth/aws/config/sts/111122223333
```
## Read STS Role
@ -307,7 +307,7 @@ Returns the previously configured STS role.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/auth/aws/config/sts/111122223333
http://127.0.0.1:8200/v1/auth/aws/config/sts/111122223333
```
### Sample Response
@ -334,7 +334,7 @@ Lists all the AWS Account IDs for which an STS role is registered.
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
https://vault.rocks/v1/auth/aws/config/sts
http://127.0.0.1:8200/v1/auth/aws/config/sts
```
### Sample Response
@ -364,7 +364,7 @@ Deletes a previously configured AWS account/STS role association.
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
https://vault.rocks/v1/auth/aws/config/sts
http://127.0.0.1:8200/v1/auth/aws/config/sts
```
## Configure Identity Whitelist Tidy Operation
@ -398,7 +398,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/auth/aws/config/tidy/identity-whitelist
http://127.0.0.1:8200/v1/auth/aws/config/tidy/identity-whitelist
```
## Read Identity Whitelist Tidy Settings
@ -414,7 +414,7 @@ Returns the previously configured periodic whitelist tidying settings.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/auth/aws/config/tidy/identity-whitelist
http://127.0.0.1:8200/v1/auth/aws/config/tidy/identity-whitelist
```
### Sample Response
@ -442,7 +442,7 @@ Deletes the previously configured periodic whitelist tidying settings.
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
https://vault.rocks/v1/auth/aws/config/tidy/identity-whitelist
http://127.0.0.1:8200/v1/auth/aws/config/tidy/identity-whitelist
```
## Configure Role Tag Blacklist Tidy Operation
@ -476,7 +476,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/auth/aws/config/tidy/roletag-blacklist
http://127.0.0.1:8200/v1/auth/aws/config/tidy/roletag-blacklist
```
## Read Role Tag Blacklist Tidy Settings
@ -492,7 +492,7 @@ Returns the previously configured periodic blacklist tidying settings.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/auth/aws/config/tidy/roletag-blacklist
http://127.0.0.1:8200/v1/auth/aws/config/tidy/roletag-blacklist
```
### Sample Response
@ -520,7 +520,7 @@ Deletes the previously configured periodic blacklist tidying settings.
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
https://vault.rocks/v1/auth/aws/config/tidy/roletag-blacklist
http://127.0.0.1:8200/v1/auth/aws/config/tidy/roletag-blacklist
```
## Create Role
@ -705,7 +705,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/auth/aws/role/dev-role
http://127.0.0.1:8200/v1/auth/aws/role/dev-role
```
## Read Role
@ -725,7 +725,7 @@ Returns the previously registered role configuration.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/auth/aws/role/dev-role
http://127.0.0.1:8200/v1/auth/aws/role/dev-role
```
### Sample Response
@ -761,7 +761,7 @@ Lists all the roles that are registered with the method.
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
https://vault.rocks/v1/auth/aws/roles
http://127.0.0.1:8200/v1/auth/aws/roles
```
### Sample Response
@ -795,7 +795,7 @@ Deletes the previously registered role.
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
https://vault.rocks/v1/auth/aws/role/dev-role
http://127.0.0.1:8200/v1/auth/aws/role/dev-role
```
## Create Role Tags
@ -855,7 +855,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/auth/aws/role/dev-api-and-web-role/tag
http://127.0.0.1:8200/v1/auth/aws/role/dev-api-and-web-role/tag
```
### Sample Response
@ -948,7 +948,7 @@ along with its RSA digest can be supplied to this endpoint.
$ curl \
--request POST \
--data @payload.json \
https://vault.rocks/v1/auth/aws/login
http://127.0.0.1:8200/v1/auth/aws/login
```
### Sample Response
@ -999,7 +999,7 @@ token.
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
https://vault.rocks/v1/auth/aws/roletag-blacklist/djE6MDlWcDBxR3V5Qjg9OmE9YW1pLWZjZTNjNjk2OnA9ZGVmYXVsdCxwcm9kOmQ9ZmFsc2U6dD0zMDBoMG0wczp1UExLQ1F4cXNlZlJocnAxcW1WYTF3c1FWVVhYSkc4VVpQLwo=
http://127.0.0.1:8200/v1/auth/aws/roletag-blacklist/djE6MDlWcDBxR3V5Qjg9OmE9YW1pLWZjZTNjNjk2OnA9ZGVmYXVsdCxwcm9kOmQ9ZmFsc2U6dD0zMDBoMG0wczp1UExLQ1F4cXNlZlJocnAxcW1WYTF3c1FWVVhYSkc4VVpQLwo=
```
### Read Role Tag Blacklist Information
@ -1021,7 +1021,7 @@ Returns the blacklist entry of a previously blacklisted role tag.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/auth/aws/roletag-blacklist/djE6MDlWcDBxR3V5Qjg9OmE9YW1pLWZjZTNjNjk2OnA9ZGVmYXVsdCxwcm9kOmQ9ZmFsc2U6dD0zMDBoMG0wczp1UExLQ1F4cXNlZlJocnAxcW1WYTF3c1FWVVhYSkc4VVpQLwo=
http://127.0.0.1:8200/v1/auth/aws/roletag-blacklist/djE6MDlWcDBxR3V5Qjg9OmE9YW1pLWZjZTNjNjk2OnA9ZGVmYXVsdCxwcm9kOmQ9ZmFsc2U6dD0zMDBoMG0wczp1UExLQ1F4cXNlZlJocnAxcW1WYTF3c1FWVVhYSkc4VVpQLwo=
```
@ -1050,7 +1050,7 @@ Lists all the role tags that are blacklisted.
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
https://vault.rocks/v1/auth/aws/roletag-blacklist
http://127.0.0.1:8200/v1/auth/aws/roletag-blacklist
```
### Sample Response
@ -1086,7 +1086,7 @@ Deletes a blacklisted role tag.
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
https://vault.rocks/v1/auth/aws/roletag-blacklist/djE6MDlWcDBxR3V5Qjg9OmE9YW1pLWZjZTNjNjk2OnA9ZGVmYXVsdCxwcm9kOmQ9ZmFsc2U6dD0zMDBoMG0wczp1UExLQ1F4cXNlZlJocnAxcW1WYTF3c1FWVVhYSkc4VVpQLwo=
http://127.0.0.1:8200/v1/auth/aws/roletag-blacklist/djE6MDlWcDBxR3V5Qjg9OmE9YW1pLWZjZTNjNjk2OnA9ZGVmYXVsdCxwcm9kOmQ9ZmFsc2U6dD0zMDBoMG0wczp1UExLQ1F4cXNlZlJocnAxcW1WYTF3c1FWVVhYSkc4VVpQLwo=
```
## Tidy Blacklist Tags
@ -1110,7 +1110,7 @@ Cleans up the entries in the blacklist based on expiration time on the entry and
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
https://vault.rocks/v1/auth/aws/tidy/roletag-blacklist
http://127.0.0.1:8200/v1/auth/aws/tidy/roletag-blacklist
```
### Read Identity Whitelist Information
@ -1133,7 +1133,7 @@ successful login.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/auth/aws/identity-whitelist/i-aab47d37
http://127.0.0.1:8200/v1/auth/aws/identity-whitelist/i-aab47d37
```
@ -1165,7 +1165,7 @@ $ curl \
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
https://vault.rocks/v1/auth/aws/roletag-blacklist
http://127.0.0.1:8200/v1/auth/aws/roletag-blacklist
```
### Sample Response
@ -1200,7 +1200,7 @@ Deletes a cache of the successful login from an instance.
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
https://vault.rocks/v1/auth/aws/identity-whitelist/i-aab47d37
http://127.0.0.1:8200/v1/auth/aws/identity-whitelist/i-aab47d37
```
## Tidy Identity Whitelist Entries
@ -1224,5 +1224,5 @@ Cleans up the entries in the whitelist based on expiration time and
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
https://vault.rocks/v1/auth/aws/tidy/identity-whitelist
http://127.0.0.1:8200/v1/auth/aws/tidy/identity-whitelist
```

View file

@ -71,7 +71,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json
https://vault.rocks/v1/auth/cert/certs/test-ca
http://127.0.0.1:8200/v1/auth/cert/certs/test-ca
```
## Read CA Certificate Role
@ -91,7 +91,7 @@ Gets information associated with the named role.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/auth/cert/certs/test-ca
http://127.0.0.1:8200/v1/auth/cert/certs/test-ca
```
### Sample Response
@ -130,7 +130,7 @@ Lists configured certificate names.
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
https://vault.rocks/v1/auth/cert/certs
http://127.0.0.1:8200/v1/auth/cert/certs
### Sample Response
@ -169,7 +169,7 @@ Deletes the named role and CA cert from the method mount.
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
https://vault.rocks/v1/auth/cert/certs/cert1
http://127.0.0.1:8200/v1/auth/cert/certs/cert1
```
## Create CRL
@ -201,7 +201,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--date @payload.json \
https://vault.rocks/v1/auth/cert/crls/custom-crl
http://127.0.0.1:8200/v1/auth/cert/crls/custom-crl
```
## Read CRL
@ -223,7 +223,7 @@ arbitrary size, these are returned as strings.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/auth/cert/crls/custom-crl
http://127.0.0.1:8200/v1/auth/cert/crls/custom-crl
```
### Sample Response
@ -261,7 +261,7 @@ Deletes the named CRL from the auth method mount.
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
https://vault.rocks/v1/auth/cert/crls/cert1
http://127.0.0.1:8200/v1/auth/cert/crls/cert1
```
## Configure TLS Certificate Method
@ -293,7 +293,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--date @payload.json \
https://vault.rocks/v1/auth/cert/certs/cert1
http://127.0.0.1:8200/v1/auth/cert/certs/cert1
```
## Login with TLS Certificate Method
@ -329,7 +329,7 @@ https://tools.ietf.org/html/rfc6125#section-2.3)
$ curl \
--request POST \
--date @payload.json \
https://vault.rocks/v1/auth/cert/login
http://127.0.0.1:8200/v1/auth/cert/login
```
### Sample Response

View file

@ -60,7 +60,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/auth/gcp/config
http://127.0.0.1:8200/v1/auth/gcp/config
```
## Read Config
@ -76,7 +76,7 @@ Returns the previously configured config, including credentials.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/auth/gcp/config
http://127.0.0.1:8200/v1/auth/gcp/config
```
### Sample Response
@ -110,7 +110,7 @@ Deletes the previously configured GCP config and credentials.
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
https://vault.rocks/v1/auth/gcp/config
http://127.0.0.1:8200/v1/auth/gcp/config
```
## Create Role
@ -226,7 +226,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/auth/gcp/role/dev-role
http://127.0.0.1:8200/v1/auth/gcp/role/dev-role
```
## Edit Service Accounts For IAM Role
@ -268,7 +268,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/auth/gcp/role/dev-role
http://127.0.0.1:8200/v1/auth/gcp/role/dev-role
```
## Edit Labels For GCE Role
@ -308,7 +308,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/auth/gcp/role/dev-role
http://127.0.0.1:8200/v1/auth/gcp/role/dev-role
```
## Read Role
@ -328,7 +328,7 @@ Returns the previously registered role configuration.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/auth/gcp/role/dev-role
http://127.0.0.1:8200/v1/auth/gcp/role/dev-role
```
### Sample Response
@ -372,7 +372,7 @@ Lists all the roles that are registered with the plugin.
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
https://vault.rocks/v1/auth/gcp/roles
http://127.0.0.1:8200/v1/auth/gcp/roles
```
### Sample Response
@ -407,7 +407,7 @@ Deletes the previously registered role.
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
https://vault.rocks/v1/auth/gcp/role/dev-role
http://127.0.0.1:8200/v1/auth/gcp/role/dev-role
```
## Login
@ -445,7 +445,7 @@ entity and then authorizes the entity for the given role.
$ curl \
--request POST \
--data @payload.json \
https://vault.rocks/v1/auth/gcp/login
http://127.0.0.1:8200/v1/auth/gcp/login
```
### Sample Response

View file

@ -50,7 +50,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/auth/github/config
http://127.0.0.1:8200/v1/auth/github/config
```
## Read Configuration
@ -66,7 +66,7 @@ Reads the GitHub configuration.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/auth/github/config
http://127.0.0.1:8200/v1/auth/github/config
```
### Sample Response
@ -112,7 +112,7 @@ Login using GitHub access token.
```
$ curl \
--request POST \
https://vault.rocks/v1/auth/github/login
http://127.0.0.1:8200/v1/auth/github/login
```
### Sample Response

View file

@ -56,7 +56,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/auth/kubernetes/config
http://127.0.0.1:8200/v1/auth/kubernetes/config
```
## Read Config
@ -72,7 +72,7 @@ Returns the previously configured config, including credentials.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/auth/kubernetes/config
http://127.0.0.1:8200/v1/auth/kubernetes/config
```
### Sample Response
@ -138,7 +138,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/auth/kubernetes/role/dev-role
http://127.0.0.1:8200/v1/auth/kubernetes/role/dev-role
```
## Read Role
@ -157,7 +157,7 @@ Returns the previously registered role configuration.
```text
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/auth/kubernetes/role/dev-role
http://127.0.0.1:8200/v1/auth/kubernetes/role/dev-role
```
### Sample Response
@ -193,7 +193,7 @@ Lists all the roles that are registered with the auth method.
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
https://vault.rocks/v1/auth/kubernetes/role
http://127.0.0.1:8200/v1/auth/kubernetes/role
```
### Sample Response
@ -227,7 +227,7 @@ Deletes the previously registered role.
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
https://vault.rocks/v1/auth/kubernetes/role/dev-role
http://127.0.0.1:8200/v1/auth/kubernetes/role/dev-role
```
## Login
@ -263,7 +263,7 @@ entity and then authorizes the entity for the given role.
$ curl \
--request POST \
--data @payload.json \
https://vault.rocks/v1/auth/kubernetes/login
http://127.0.0.1:8200/v1/auth/kubernetes/login
```
### Sample Response

View file

@ -76,7 +76,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/auth/ldap/config
http://127.0.0.1:8200/v1/auth/ldap/config
```
### Sample Payload
@ -112,7 +112,7 @@ This endpoint retrieves the LDAP configuration for the auth method.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/auth/ldap/config
http://127.0.0.1:8200/v1/auth/ldap/config
```
### Sample Response
@ -160,7 +160,7 @@ This endpoint returns a list of existing groups in the method.
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
https://vault.rocks/v1/auth/ldap/groups
http://127.0.0.1:8200/v1/auth/ldap/groups
```
### Sample Response
@ -199,7 +199,7 @@ This endpoint returns the policies associated with a LDAP group.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/auth/ldap/groups/admins
http://127.0.0.1:8200/v1/auth/ldap/groups/admins
```
### Sample Response
@ -248,7 +248,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/auth/ldap/groups/admins
http://127.0.0.1:8200/v1/auth/ldap/groups/admins
```
## Delete LDAP Group
@ -269,7 +269,7 @@ This endpoint deletes the LDAP group and policy association.
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
https://vault.rocks/v1/auth/ldap/groups/admins
http://127.0.0.1:8200/v1/auth/ldap/groups/admins
```
## List LDAP Users
@ -286,7 +286,7 @@ This endpoint returns a list of existing users in the method.
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
https://vault.rocks/v1/auth/ldap/users
http://127.0.0.1:8200/v1/auth/ldap/users
```
### Sample Response
@ -325,7 +325,7 @@ This endpoint returns the policies associated with a LDAP user.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/auth/ldap/users/mitchellh
http://127.0.0.1:8200/v1/auth/ldap/users/mitchellh
```
### Sample Response
@ -377,7 +377,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/auth/ldap/users/mitchellh
http://127.0.0.1:8200/v1/auth/ldap/users/mitchellh
```
## Delete LDAP User
@ -398,7 +398,7 @@ This endpoint deletes the LDAP user and policy association.
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
https://vault.rocks/v1/auth/ldap/users/mitchellh
http://127.0.0.1:8200/v1/auth/ldap/users/mitchellh
```
## Login with LDAP User
@ -428,7 +428,7 @@ This endpoint allows you to log in with LDAP credentials
$ curl \
--request POST \
--data @payload.json \
https://vault.rocks/v1/auth/ldap/login/mitchellh
http://127.0.0.1:8200/v1/auth/ldap/login/mitchellh
```
### Sample Response

View file

@ -57,7 +57,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/auth/okta/config
http://127.0.0.1:8200/v1/auth/okta/config
```
## Read Configuration
@ -73,7 +73,7 @@ Reads the Okta configuration.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/auth/okta/config
http://127.0.0.1:8200/v1/auth/okta/config
```
### Sample Response
@ -109,7 +109,7 @@ List the users configurated in the Okta method.
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
https://vault.rocks/v1/auth/okta/users
http://127.0.0.1:8200/v1/auth/okta/users
```
### Sample Response
@ -161,7 +161,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/auth/okta/users/fred
http://127.0.0.1:8200/v1/auth/okta/users/fred
```
## Read User
@ -181,7 +181,7 @@ Reads the properties of an existing username.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/auth/okta/users/test-user
http://127.0.0.1:8200/v1/auth/okta/users/test-user
```
### Sample Response
@ -221,7 +221,7 @@ Deletes an existing username from the method.
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
https://vault.rocks/v1/auth/okta/users/test-user
http://127.0.0.1:8200/v1/auth/okta/users/test-user
```
## List Groups
@ -238,7 +238,7 @@ List the groups configurated in the Okta method.
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
https://vault.rocks/v1/auth/okta/groups
http://127.0.0.1:8200/v1/auth/okta/groups
```
### Sample Response
@ -289,7 +289,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/auth/okta/groups/admins
http://127.0.0.1:8200/v1/auth/okta/groups/admins
```
## Read Group
@ -309,7 +309,7 @@ Reads the properties of an existing group.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/auth/okta/groups/admins
http://127.0.0.1:8200/v1/auth/okta/groups/admins
```
### Sample Response
@ -348,7 +348,7 @@ Deletes an existing group from the method.
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
https://vault.rocks/v1/auth/okta/users/test-user
http://127.0.0.1:8200/v1/auth/okta/users/test-user
```
## Login
@ -378,7 +378,7 @@ Login with the username and password.
$ curl \
--request POST \
--data @payload.json \
https://vault.rocks/v1/auth/okta/login/fred
http://127.0.0.1:8200/v1/auth/okta/login/fred
```
### Sample Response

View file

@ -56,7 +56,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/auth/radius/config
http://127.0.0.1:8200/v1/auth/radius/config
```
## Register User
@ -87,7 +87,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/auth/radius/users/test-user
http://127.0.0.1:8200/v1/auth/radius/users/test-user
```
## Read User
@ -107,7 +107,7 @@ Reads the properties of an existing username.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/auth/radius/users/test-user
http://127.0.0.1:8200/v1/auth/radius/users/test-user
```
### Sample Response
@ -143,7 +143,7 @@ Deletes an existing username from the method.
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
https://vault.rocks/v1/auth/radius/users/test-user
http://127.0.0.1:8200/v1/auth/radius/users/test-user
```
## List Users
@ -160,7 +160,7 @@ List the users registered with the method.
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
https://vault.rocks/v1/auth/radius/users
http://127.0.0.1:8200/v1/auth/radius/users
```
### Sample Response
@ -210,7 +210,7 @@ Login with the username and password.
$ curl \
--request POST \
--data @payload.json \
https://vault.rocks/v1/auth/radius/login/test-user
http://127.0.0.1:8200/v1/auth/radius/login/test-user
```
### Sample Response

View file

@ -28,7 +28,7 @@ large numbers of tokens and their associated leases at once.
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
https://vault.rocks/v1/auth/token/accessors
http://127.0.0.1:8200/v1/auth/token/accessors
```
### Sample Response
@ -123,7 +123,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/auth/token/create
http://127.0.0.1:8200/v1/auth/token/create
```
### Sample Response
@ -172,7 +172,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/auth/token/lookup
http://127.0.0.1:8200/v1/auth/token/lookup
```
### Sample Response
@ -209,7 +209,7 @@ Returns information about the current client token.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/auth/token/lookup-self
http://127.0.0.1:8200/v1/auth/token/lookup-self
```
### Sample Response
@ -260,7 +260,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/auth/token/lookup-accessor
http://127.0.0.1:8200/v1/auth/token/lookup-accessor
```
### Sample Response
@ -321,7 +321,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/auth/token/renew
http://127.0.0.1:8200/v1/auth/token/renew
```
### Sample Response
@ -373,7 +373,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/auth/token/renew-self
http://127.0.0.1:8200/v1/auth/token/renew-self
```
### Sample Response
@ -423,7 +423,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/auth/token/revoke
http://127.0.0.1:8200/v1/auth/token/revoke
```
## Revoke a Token (Self)
@ -441,7 +441,7 @@ revoked, all dynamic secrets generated with it are also revoked.
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
https://vault.rocks/v1/auth/token/revoke-self
http://127.0.0.1:8200/v1/auth/token/revoke-self
```
## Revoke a Token Accessor
@ -473,7 +473,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/auth/token/revoke-accessor
http://127.0.0.1:8200/v1/auth/token/revoke-accessor
```
## Revoke Token and Orphan Children
@ -507,7 +507,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/auth/token/revoke-orphan
http://127.0.0.1:8200/v1/auth/token/revoke-orphan
```
## Read Token Role
@ -527,7 +527,7 @@ Fetches the named role configuration.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/auth/token/roles/nomad
http://127.0.0.1:8200/v1/auth/token/roles/nomad
```
### Sample Response
@ -568,7 +568,7 @@ List available token roles.
$ curl \
--header "X-Vault-Token: ..." \
--request LIST
https://vault.rocks/v1/auth/token/roles
http://127.0.0.1:8200/v1/auth/token/roles
```
### Sample Response
@ -653,7 +653,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST
--data @payload.json
https://vault.rocks/v1/auth/token/roles/nomad
http://127.0.0.1:8200/v1/auth/token/roles/nomad
```
## Delete Token Role
@ -674,7 +674,7 @@ This endpoint deletes the named token role.
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
https://vault.rocks/v1/auth/token/roles/admins
http://127.0.0.1:8200/v1/auth/token/roles/admins
```
## Tidy Tokens
@ -694,5 +694,5 @@ storage method so should be used sparingly.
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
https://vault.rocks/v1/auth/token/tidy
http://127.0.0.1:8200/v1/auth/token/tidy
```

View file

@ -51,7 +51,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/auth/userpass/users/mitchellh
http://127.0.0.1:8200/v1/auth/userpass/users/mitchellh
```
## Read User
@ -67,7 +67,7 @@ Reads the properties of an existing username.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/auth/userpass/users/mitchellh
http://127.0.0.1:8200/v1/auth/userpass/users/mitchellh
```
### Sample Response
@ -105,7 +105,7 @@ This endpoint deletes the user from the method.
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
https://vault.rocks/v1/auth/userpass/users/mitchellh
http://127.0.0.1:8200/v1/auth/userpass/users/mitchellh
```
## Update Password on User
@ -136,7 +136,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/auth/userpass/users/mitchellh/password
http://127.0.0.1:8200/v1/auth/userpass/users/mitchellh/password
```
## Update Policies on User
@ -167,7 +167,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/auth/userpass/users/mitchellh/policies
http://127.0.0.1:8200/v1/auth/userpass/users/mitchellh/policies
```
## List Users
@ -184,7 +184,7 @@ List available userpass users.
$ curl \
--header "X-Vault-Token: ..." \
--request LIST
https://vault.rocks/v1/auth/userpass/users
http://127.0.0.1:8200/v1/auth/userpass/users
```
### Sample Response
@ -227,7 +227,7 @@ Login with the username and password.
$ curl \
--request POST \
--data @payload.json \
https://vault.rocks/v1/auth/userpass/login/mitchellh
http://127.0.0.1:8200/v1/auth/userpass/login/mitchellh
```
### Sample Response

View file

@ -77,7 +77,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/aws/config/root
http://127.0.0.1:8200/v1/aws/config/root
```
## Configure Lease
@ -114,7 +114,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/aws/config/lease
http://127.0.0.1:8200/v1/aws/config/lease
```
## Read Lease
@ -130,7 +130,7 @@ This endpoint returns the current lease settings for the AWS secrets engine.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/aws/config/lease
http://127.0.0.1:8200/v1/aws/config/lease
```
### Sample Response
@ -172,7 +172,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/aws/roles/example-role
http://127.0.0.1:8200/v1/aws/roles/example-role
```
### Sample Payloads
@ -212,7 +212,7 @@ exist, a 404 is returned.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/aws/roles/example-role
http://127.0.0.1:8200/v1/aws/roles/example-role
```
### Sample Responses
@ -251,7 +251,7 @@ This endpoint lists all existing roles in the secrets engine.
$ curl
--header "X-Vault-Token: ..." \
--request LIST \
https://vault.rocks/v1/aws/roles
http://127.0.0.1:8200/v1/aws/roles
```
### Sample Response
@ -286,7 +286,7 @@ exist, a 404 is returned.
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
https://vault.rocks/v1/aws/roles/example-role
http://127.0.0.1:8200/v1/aws/roles/example-role
```
## Generate IAM Credentials
@ -308,7 +308,7 @@ role must be created before queried.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/aws/creds/example-role
http://127.0.0.1:8200/v1/aws/creds/example-role
```
### Sample Response
@ -361,7 +361,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/aws/sts/example-role
http://127.0.0.1:8200/v1/aws/sts/example-role
```
### Sample Response

View file

@ -105,7 +105,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/cassandra/config/connection
http://127.0.0.1:8200/v1/cassandra/config/connection
```
## Create Role
@ -156,7 +156,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/cassandra/roles/my-role
http://127.0.0.1:8200/v1/cassandra/roles/my-role
```
## Read Role
@ -177,7 +177,7 @@ This endpoint queries the role definition.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/cassandra/roles/my-role
http://127.0.0.1:8200/v1/cassandra/roles/my-role
```
### Sample Response
@ -212,7 +212,7 @@ This endpoint deletes the role definition.
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
https://vault.rocks/v1/cassandra/roles/my-role
http://127.0.0.1:8200/v1/cassandra/roles/my-role
```
## Generate Credentials
@ -234,7 +234,7 @@ role.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/cassandra/creds/my-role
http://127.0.0.1:8200/v1/cassandra/creds/my-role
```
### Sample Response

View file

@ -53,7 +53,7 @@ $ curl \
--request POST \
--header "X-Vault-Token: ..." \
--data @payload.json \
https://vault.rocks/v1/consul/config/access
http://127.0.0.1:8200/v1/consul/config/access
```
## Create/Update Role
@ -108,7 +108,7 @@ $ curl \
--request POST \
--header "X-Vault-Token: ..." \
--data @payload.json \
https://vault.rocks/v1/consul/roles/example-role
http://127.0.0.1:8200/v1/consul/roles/example-role
```
## Read Role
@ -130,7 +130,7 @@ If no role exists with that name, a 404 is returned.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/consul/roles/example-role
http://127.0.0.1:8200/v1/consul/roles/example-role
```
### Sample Response
@ -159,7 +159,7 @@ This endpoint lists all existing roles in the secrets engine.
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
https://vault.rocks/v1/consul/roles
http://127.0.0.1:8200/v1/consul/roles
```
### Sample Response
@ -194,7 +194,7 @@ not exist, this endpoint will still return a successful response.
$ curl \
--request DELETE \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/consul/roles/example-role
http://127.0.0.1:8200/v1/consul/roles/example-role
```
## Generate Credential
@ -216,7 +216,7 @@ definition.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/consul/creds/example-role
http://127.0.0.1:8200/v1/consul/creds/example-role
```
### Sample Response

View file

@ -35,7 +35,7 @@ This endpoint retrieves the secret at the specified location.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/cubbyhole/my-secret
http://127.0.0.1:8200/v1/cubbyhole/my-secret
```
### Sample Response
@ -73,7 +73,7 @@ not return a value. The values themselves are not accessible via this command.
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
https://vault.rocks/v1/cubbyhole/my-secret
http://127.0.0.1:8200/v1/cubbyhole/my-secret
```
### Sample Response
@ -129,7 +129,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/cubbyhole/my-secret
http://127.0.0.1:8200/v1/cubbyhole/my-secret
```
## Delete Secret
@ -151,5 +151,5 @@ This endpoint deletes the secret at the specified location.
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
https://vault.rocks/v1/cubbyhole/my-secret
http://127.0.0.1:8200/v1/cubbyhole/my-secret
```

View file

@ -95,7 +95,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/cassandra/config/connection
http://127.0.0.1:8200/v1/cassandra/config/connection
```
## Statements

View file

@ -55,7 +55,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/database/config/hana
http://127.0.0.1:8200/v1/database/config/hana
```
## Statements

View file

@ -60,7 +60,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/database/config/mysql
http://127.0.0.1:8200/v1/database/config/mysql
```
## Read Connection
@ -82,7 +82,7 @@ This endpoint returns the configuration settings for a connection.
$ curl \
--header "X-Vault-Token: ..." \
--request GET \
https://vault.rocks/v1/database/config/mysql
http://127.0.0.1:8200/v1/database/config/mysql
```
### Sample Response
@ -116,7 +116,7 @@ are returned, not any values.
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
https://vault.rocks/v1/database/config
http://127.0.0.1:8200/v1/database/config
```
### Sample Response
@ -148,7 +148,7 @@ This endpoint deletes a connection.
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
https://vault.rocks/v1/database/config/mysql
http://127.0.0.1:8200/v1/database/config/mysql
```
## Reset Connection
@ -171,7 +171,7 @@ with the configuration stored in the barrier.
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
https://vault.rocks/v1/database/reset/mysql
http://127.0.0.1:8200/v1/database/reset/mysql
```
## Create Role
@ -236,7 +236,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/database/roles/my-role
http://127.0.0.1:8200/v1/database/roles/my-role
```
## Read Role
@ -257,7 +257,7 @@ This endpoint queries the role definition.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/database/roles/my-role
http://127.0.0.1:8200/v1/database/roles/my-role
```
### Sample Response
@ -291,7 +291,7 @@ returned, not any values.
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
https://vault.rocks/v1/database/roles
http://127.0.0.1:8200/v1/database/roles
```
### Sample Response
@ -327,7 +327,7 @@ This endpoint deletes the role definition.
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
https://vault.rocks/v1/database/roles/my-role
http://127.0.0.1:8200/v1/database/roles/my-role
```
## Generate Credentials
@ -349,7 +349,7 @@ role.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/database/creds/my-role
http://127.0.0.1:8200/v1/database/creds/my-role
```
### Sample Response

View file

@ -50,7 +50,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/database/config/mongodb
http://127.0.0.1:8200/v1/database/config/mongodb
```
## Statements

View file

@ -55,7 +55,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/database/config/mssql
http://127.0.0.1:8200/v1/database/config/mssql
```
## Statements

View file

@ -55,7 +55,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/database/config/mysql
http://127.0.0.1:8200/v1/database/config/mysql
```
## Statements

View file

@ -55,7 +55,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/database/config/oracle
http://127.0.0.1:8200/v1/database/config/oracle
```
## Statements

View file

@ -55,7 +55,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/database/config/postgresql
http://127.0.0.1:8200/v1/database/config/postgresql
```
## Statements

View file

@ -53,7 +53,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/identity/entity-alias
http://127.0.0.1:8200/v1/identity/entity-alias
```
### Sample Response
@ -84,7 +84,7 @@ This endpoint queries the entity alias by its identifier.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/identity/entity-alias/id/34982d3d-e3ce-5d8b-6e5f-b9bb34246c31
http://127.0.0.1:8200/v1/identity/entity-alias/id/34982d3d-e3ce-5d8b-6e5f-b9bb34246c31
```
### Sample Response
@ -154,7 +154,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/identity/entity-alias/id/34982d3d-e3ce-5d8b-6e5f-b9bb34246c31
http://127.0.0.1:8200/v1/identity/entity-alias/id/34982d3d-e3ce-5d8b-6e5f-b9bb34246c31
```
### Sample Response
@ -186,7 +186,7 @@ This endpoint deletes an alias from its corresponding entity.
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
https://vault.rocks/v1/identity/entity-alias/id/34982d3d-e3ce-5d8b-6e5f-b9bb34246c31
http://127.0.0.1:8200/v1/identity/entity-alias/id/34982d3d-e3ce-5d8b-6e5f-b9bb34246c31
```
### List Entity Aliases by ID
@ -204,7 +204,7 @@ This endpoint returns a list of available entity aliases by their identifiers.
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
https://vault.rocks/v1/identity/entity-alias/id
http://127.0.0.1:8200/v1/identity/entity-alias/id
```
### Sample Response

View file

@ -45,7 +45,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/identity/entity
http://127.0.0.1:8200/v1/identity/entity
```
### Sample Response
@ -76,7 +76,7 @@ This endpoint queries the entity by its identifier.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/identity/entity/id/8d6a45e5-572f-8f13-d226-cd0d1ec57297
http://127.0.0.1:8200/v1/identity/entity/id/8d6a45e5-572f-8f13-d226-cd0d1ec57297
```
### Sample Response
@ -141,7 +141,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/identity/entity/id/8d6a45e5-572f-8f13-d226-cd0d1ec57297
http://127.0.0.1:8200/v1/identity/entity/id/8d6a45e5-572f-8f13-d226-cd0d1ec57297
```
### Sample Response
@ -173,7 +173,7 @@ This endpoint deletes an entity and all its associated aliases.
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
https://vault.rocks/v1/identity/entity/id/8d6a45e5-572f-8f13-d226-cd0d1ec57297
http://127.0.0.1:8200/v1/identity/entity/id/8d6a45e5-572f-8f13-d226-cd0d1ec57297
```
## List Entities by ID
@ -191,7 +191,7 @@ This endpoint returns a list of available entities by their identifiers.
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
https://vault.rocks/v1/identity/entity/id
http://127.0.0.1:8200/v1/identity/entity/id
```
### Sample Response

View file

@ -44,7 +44,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/identity/group-alias
http://127.0.0.1:8200/v1/identity/group-alias
```
### Sample Response
@ -75,7 +75,7 @@ This endpoint queries the group alias by its identifier.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/identity/group-alias/id/ca726050-d8ac-6f1f-4210-3b5c5b613824
http://127.0.0.1:8200/v1/identity/group-alias/id/ca726050-d8ac-6f1f-4210-3b5c5b613824
```
### Sample Response
@ -115,7 +115,7 @@ This endpoint deletes a group alias.
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
https://vault.rocks/v1/identity/group-alias/id/ca726050-d8ac-6f1f-4210-3b5c5b613824
http://127.0.0.1:8200/v1/identity/group-alias/id/ca726050-d8ac-6f1f-4210-3b5c5b613824
```
## List Entities by ID
@ -133,7 +133,7 @@ This endpoint returns a list of available group aliases by their identifiers.
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
https://vault.rocks/v1/identity/group-alias/id
http://127.0.0.1:8200/v1/identity/group-alias/id
```
### Sample Response

View file

@ -53,7 +53,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/identity/group
http://127.0.0.1:8200/v1/identity/group
```
### Sample Response
@ -84,7 +84,7 @@ This endpoint queries the group by its identifier.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/identity/group/id/363926d8-dd8b-c9f0-21f8-7b248be80ce1
http://127.0.0.1:8200/v1/identity/group/id/363926d8-dd8b-c9f0-21f8-7b248be80ce1
```
### Sample Response
@ -159,7 +159,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/identity/group/id/363926d8-dd8b-c9f0-21f8-7b248be80ce1
http://127.0.0.1:8200/v1/identity/group/id/363926d8-dd8b-c9f0-21f8-7b248be80ce1
```
### Sample Response
@ -191,7 +191,7 @@ This endpoint deletes a group.
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
https://vault.rocks/v1/identity/group/id/363926d8-dd8b-c9f0-21f8-7b248be80ce1
http://127.0.0.1:8200/v1/identity/group/id/363926d8-dd8b-c9f0-21f8-7b248be80ce1
```
## List Groups by ID
@ -209,7 +209,7 @@ This endpoint returns a list of available groups by their identifiers.
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
https://vault.rocks/v1/identity/group/id
http://127.0.0.1:8200/v1/identity/group/id
```
### Sample Response

View file

@ -46,7 +46,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/identity/group
http://127.0.0.1:8200/v1/identity/group
```
### Sample Response
@ -98,7 +98,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/identity/group/id/454ceeb5-76d7-a131-b92a-7ecfb15523e8
http://127.0.0.1:8200/v1/identity/group/id/454ceeb5-76d7-a131-b92a-7ecfb15523e8
```
### Sample Response
@ -129,7 +129,7 @@ This endpoint reads the group by its ID.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/identity/group/id/454ceeb5-76d7-a131-b92a-7ecfb15523e8
http://127.0.0.1:8200/v1/identity/group/id/454ceeb5-76d7-a131-b92a-7ecfb15523e8
```
### Sample Response
@ -173,7 +173,7 @@ This endpoint deleted the group by its ID.
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
https://vault.rocks/v1/identity/group/id/454ceeb5-76d7-a131-b92a-7ecfb15523e8
http://127.0.0.1:8200/v1/identity/group/id/454ceeb5-76d7-a131-b92a-7ecfb15523e8
```
@ -192,7 +192,7 @@ This endpoint lists all the groups by their ID.
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
https://vault.rocks/v1/identity/group/id
http://127.0.0.1:8200/v1/identity/group/id
```
### Sample Response
@ -240,7 +240,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/identity/lookup/group
http://127.0.0.1:8200/v1/identity/lookup/group
```
### Sample Response

View file

@ -46,7 +46,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/identity/lookup/entity
http://127.0.0.1:8200/v1/identity/lookup/entity
```
### Sample Response
@ -108,7 +108,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/identity/lookup/group
http://127.0.0.1:8200/v1/identity/lookup/group
```
### Sample Response

View file

@ -34,7 +34,7 @@ This endpoint retrieves the secret at the specified location.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/secret/my-secret
http://127.0.0.1:8200/v1/secret/my-secret
```
### Sample Response
@ -80,7 +80,7 @@ this command.
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
https://vault.rocks/v1/secret/my-secret
http://127.0.0.1:8200/v1/secret/my-secret
```
### Sample Response
@ -140,7 +140,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/secret/my-secret
http://127.0.0.1:8200/v1/secret/my-secret
```
## Delete Secret
@ -162,5 +162,5 @@ This endpoint deletes the secret at the specified location.
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
https://vault.rocks/v1/secret/my-secret
http://127.0.0.1:8200/v1/secret/my-secret
```

View file

@ -54,7 +54,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/mongodb/config/connection
http://127.0.0.1:8200/v1/mongodb/config/connection
```
### Sample Response
@ -88,7 +88,7 @@ including passwords, if any.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/mongodb/config/connection
http://127.0.0.1:8200/v1/mongodb/config/connection
```
### Sample Response
@ -141,7 +141,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/mongodb/config/lease
http://127.0.0.1:8200/v1/mongodb/config/lease
```
## Read Lease
@ -157,7 +157,7 @@ This endpoint queries the lease configuration.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/mongodb/config/lease
http://127.0.0.1:8200/v1/mongodb/config/lease
```
### Sample Response
@ -209,7 +209,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/mongodb/roles/my-role
http://127.0.0.1:8200/v1/mongodb/roles/my-role
```
## Read Role
@ -230,7 +230,7 @@ This endpoint queries the role definition.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/mongodb/roles/my-role
http://127.0.0.1:8200/v1/mongodb/roles/my-role
```
### Sample Response
@ -265,7 +265,7 @@ returned, not any values.
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
https://vault.rocks/v1/mongodb/roles
http://127.0.0.1:8200/v1/mongodb/roles
```
### Sample Response
@ -306,7 +306,7 @@ This endpoint deletes the role definition.
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
https://vault.rocks/v1/mongodb/roles/my-role
http://127.0.0.1:8200/v1/mongodb/roles/my-role
```
## Generate Credentials
@ -328,7 +328,7 @@ role.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/mongodb/creds/my-role
http://127.0.0.1:8200/v1/mongodb/creds/my-role
```
### Sample Response

View file

@ -57,7 +57,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/mssql/config/connection
http://127.0.0.1:8200/v1/mssql/config/connection
```
## Configure Lease
@ -93,7 +93,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/mssql/config/lease
http://127.0.0.1:8200/v1/mssql/config/lease
```
## Create Role
@ -127,7 +127,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/mssql/roles/my-role
http://127.0.0.1:8200/v1/mssql/roles/my-role
```
## Read Role
@ -148,7 +148,7 @@ This endpoint queries the role definition.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/mssql/roles/my-role
http://127.0.0.1:8200/v1/mssql/roles/my-role
```
### Sample Response
@ -176,7 +176,7 @@ returned, not any values.
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
https://vault.rocks/v1/mssql/roles
http://127.0.0.1:8200/v1/mssql/roles
```
### Sample Response
@ -212,7 +212,7 @@ This endpoint deletes the role definition.
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
https://vault.rocks/v1/mssql/roles/my-role
http://127.0.0.1:8200/v1/mssql/roles/my-role
```
## Generate Credentials
@ -234,7 +234,7 @@ role.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/mssql/creds/my-role
http://127.0.0.1:8200/v1/mssql/creds/my-role
```
### Sample Response

View file

@ -59,7 +59,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/mysql/config/connection
http://127.0.0.1:8200/v1/mysql/config/connection
```
## Configure Lease
@ -96,7 +96,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/mysql/config/lease
http://127.0.0.1:8200/v1/mysql/config/lease
```
## Create Role
@ -148,7 +148,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/mysql/roles/my-role
http://127.0.0.1:8200/v1/mysql/roles/my-role
```
## Read Role
@ -169,7 +169,7 @@ This endpoint queries the role definition.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/mysql/roles/my-role
http://127.0.0.1:8200/v1/mysql/roles/my-role
```
### Sample Response
@ -197,7 +197,7 @@ returned, not any values.
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
https://vault.rocks/v1/mysql/roles
http://127.0.0.1:8200/v1/mysql/roles
```
### Sample Response
@ -233,7 +233,7 @@ This endpoint deletes the role definition.
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
https://vault.rocks/v1/mysql/roles/my-role
http://127.0.0.1:8200/v1/mysql/roles/my-role
```
## Generate Credentials
@ -255,7 +255,7 @@ role.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/mysql/creds/my-role
http://127.0.0.1:8200/v1/mysql/creds/my-role
```
### Sample Response

View file

@ -53,7 +53,7 @@ $ curl \
--request POST \
--header "X-Vault-Token: ..." \
--data @payload.json \
https://vault.rocks/v1/nomad/config/access
http://127.0.0.1:8200/v1/nomad/config/access
```
## Read Access Configuration
@ -69,7 +69,7 @@ This endpoint queries for information about the Nomad connection.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/nomad/config/access
http://127.0.0.1:8200/v1/nomad/config/access
```
### Sample Response
@ -114,7 +114,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/nomad/config/lease
http://127.0.0.1:8200/v1/nomad/config/lease
```
## Read Lease Configuration
@ -130,7 +130,7 @@ This endpoint queries for information about the Lease TTL for the specified moun
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/nomad/config/lease
http://127.0.0.1:8200/v1/nomad/config/lease
```
### Sample Response
@ -156,7 +156,7 @@ This endpoint deletes the lease configuration.
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
https://vault.rocks/v1/nomad/config/lease
http://127.0.0.1:8200/v1/nomad/config/lease
```
## Create/Update Role
@ -202,7 +202,7 @@ $ curl \
--request POST \
--header "X-Vault-Token: ..." \
--data @payload.json \
https://vault.rocks/v1/nomad/role/monitoring
http://127.0.0.1:8200/v1/nomad/role/monitoring
```
## Read Role
@ -224,7 +224,7 @@ If no role exists with that name, a 404 is returned.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/nomad/role/monitoring
http://127.0.0.1:8200/v1/nomad/role/monitoring
```
### Sample Response
@ -256,7 +256,7 @@ This endpoint lists all existing roles in the backend.
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
https://vault.rocks/v1/nomad/role
http://127.0.0.1:8200/v1/nomad/role
```
### Sample Response
@ -291,7 +291,7 @@ not exist, this endpoint will still return a successful response.
$ curl \
--request DELETE \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/nomad/role/example-role
http://127.0.0.1:8200/v1/nomad/role/example-role
```
## Generate Credential
@ -313,7 +313,7 @@ definition.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/nomad/creds/example
http://127.0.0.1:8200/v1/nomad/creds/example
```
### Sample Response

View file

@ -62,7 +62,7 @@ This is an unauthenticated endpoint.
```
$ curl \
https://vault.rocks/v1/pki/ca/pem
http://127.0.0.1:8200/v1/pki/ca/pem
```
### Sample Response
@ -87,7 +87,7 @@ This is an unauthenticated endpoint.
```
$ curl \
https://vault.rocks/v1/pki/ca_chain
http://127.0.0.1:8200/v1/pki/ca_chain
```
### Sample Response
@ -121,7 +121,7 @@ This is an unauthenticated endpoint.
```
$ curl \
https://vault.rocks/v1/pki/cert/crl
http://127.0.0.1:8200/v1/pki/cert/crl
```
### Sample Response
@ -148,7 +148,7 @@ This endpoint returns a list of the current certificates by serial number only.
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
https://vault.rocks/v1/pki/certs
http://127.0.0.1:8200/v1/pki/certs
```
### Sample Response
@ -225,7 +225,7 @@ marked valid.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/pki/config/crl
http://127.0.0.1:8200/v1/pki/config/crl
```
### Sample Response
@ -270,7 +270,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/pki/config/crl
http://127.0.0.1:8200/v1/pki/config/crl
```
## Read URLs
@ -286,7 +286,7 @@ This endpoint fetches the URLs to be encoded in generated certificates.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/pki/config/urls
http://127.0.0.1:8200/v1/pki/config/urls
```
### Sample Response
@ -345,7 +345,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/pki/config/urls
http://127.0.0.1:8200/v1/pki/config/urls
```
## Read CRL
@ -366,7 +366,7 @@ This is an unauthenticated endpoint.
```
$ curl \
https://vault.rocks/v1/pki/crl/pem
http://127.0.0.1:8200/v1/pki/crl/pem
```
### Sample Response
@ -391,7 +391,7 @@ certificates being revoked.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/pki/crl/rotate
http://127.0.0.1:8200/v1/pki/crl/rotate
```
### Sample Response
@ -505,7 +505,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/pki/intermediate/generate/internal
http://127.0.0.1:8200/v1/pki/intermediate/generate/internal
```
```json
@ -556,7 +556,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/pki/intermediate/set-signed
http://127.0.0.1:8200/v1/pki/intermediate/set-signed
```
## Generate Certificate
@ -632,7 +632,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/pki/issue/my-role
http://127.0.0.1:8200/v1/pki/issue/my-role
```
### Sample Response
@ -685,7 +685,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/pki/revoke
http://127.0.0.1:8200/v1/pki/revoke
```
### Sample Response
@ -867,7 +867,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/pki/roles/my-role
http://127.0.0.1:8200/v1/pki/roles/my-role
```
## Read Role
@ -888,7 +888,7 @@ This endpoint queries the role definition.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/pki/roles/my-role
http://127.0.0.1:8200/v1/pki/roles/my-role
```
### Sample Response
@ -927,7 +927,7 @@ returned, not any values.
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
https://vault.rocks/v1/pki/roles
http://127.0.0.1:8200/v1/pki/roles
```
### Sample Response
@ -964,7 +964,7 @@ revoke certificates previously issued under this role.
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
https://vault.rocks/v1/pki/roles/my-role
http://127.0.0.1:8200/v1/pki/roles/my-role
```
## Generate Root
@ -1091,7 +1091,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/pki/root/generate/internal
http://127.0.0.1:8200/v1/pki/root/generate/internal
```
### Sample Response
@ -1127,7 +1127,7 @@ _This endpoint requires sudo/root privileges._
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
https://vault.rocks/v1/pki/root
http://127.0.0.1:8200/v1/pki/root
```
## Sign Intermediate
@ -1243,7 +1243,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/pki/root/sign-intermediate
http://127.0.0.1:8200/v1/pki/root/sign-intermediate
```
### Sample Response
@ -1303,7 +1303,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/pki/root/sign-self-issued
http://127.0.0.1:8200/v1/pki/root/sign-self-issued
```
### Sample Response
@ -1444,7 +1444,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/pki/sign-verbatim
http://127.0.0.1:8200/v1/pki/sign-verbatim
```
### Sample Response
@ -1505,5 +1505,5 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/pki/tidy
http://127.0.0.1:8200/v1/pki/tidy
```

View file

@ -62,7 +62,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/postgresql/config/connection
http://127.0.0.1:8200/v1/postgresql/config/connection
```
## Configure Lease
@ -99,7 +99,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/postgresql/config/lease
http://127.0.0.1:8200/v1/postgresql/config/lease
```
## Create Role
@ -142,7 +142,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/postgresql/roles/my-role
http://127.0.0.1:8200/v1/postgresql/roles/my-role
```
## Read Role
@ -163,7 +163,7 @@ This endpoint queries the role definition.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/postgresql/roles/my-role
http://127.0.0.1:8200/v1/postgresql/roles/my-role
```
### Sample Response
@ -191,7 +191,7 @@ returned, not any values.
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
https://vault.rocks/v1/postgresql/roles
http://127.0.0.1:8200/v1/postgresql/roles
```
### Sample Response
@ -227,7 +227,7 @@ This endpoint deletes the role definition.
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
https://vault.rocks/v1/postgresql/roles/my-role
http://127.0.0.1:8200/v1/postgresql/roles/my-role
```
## Generate Credentials
@ -249,7 +249,7 @@ role.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/postgresql/creds/my-role
http://127.0.0.1:8200/v1/postgresql/creds/my-role
```
### Sample Response

View file

@ -56,7 +56,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/rabbitmq/config/connection
http://127.0.0.1:8200/v1/rabbitmq/config/connection
```
## Configure Lease
@ -89,7 +89,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/rabbitmq/config/lease
http://127.0.0.1:8200/v1/rabbitmq/config/lease
```
## Create Role
@ -126,7 +126,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/rabbitmq/roles/my-role
http://127.0.0.1:8200/v1/rabbitmq/roles/my-role
```
## Read Role
@ -147,7 +147,7 @@ This endpoint queries the role definition.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/rabbitmq/roles/my-role
http://127.0.0.1:8200/v1/rabbitmq/roles/my-role
```
### Sample Response
@ -180,7 +180,7 @@ This endpoint deletes the role definition.
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
https://vault.rocks/v1/rabbitmq/roles/my-role
http://127.0.0.1:8200/v1/rabbitmq/roles/my-role
```
## Generate Credentials
@ -202,7 +202,7 @@ role.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/rabbitmq/creds/my-role
http://127.0.0.1:8200/v1/rabbitmq/creds/my-role
```
### Sample Response

View file

@ -47,7 +47,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/ssh/keys/my-key
http://127.0.0.1:8200/v1/ssh/keys/my-key
```
## Delete Key
@ -70,7 +70,7 @@ This endpoint deletes a named key.
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
https://vault.rocks/v1/ssh/keys/my-key
http://127.0.0.1:8200/v1/ssh/keys/my-key
```
## Create Role
@ -218,7 +218,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/ssh/roles/my-role
http://127.0.0.1:8200/v1/ssh/roles/my-role
```
## Read Role
@ -239,7 +239,7 @@ This endpoint queries a named role.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/ssh/roles/my-role
http://127.0.0.1:8200/v1/ssh/roles/my-role
```
### Sample Response
@ -301,7 +301,7 @@ returned, not any values.
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
https://vault.rocks/v1/ssh/roles
http://127.0.0.1:8200/v1/ssh/roles
```
### Sample Response
@ -346,7 +346,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
--data @payload.json \
https://vault.rocks/v1/ssh/roles/my-role
http://127.0.0.1:8200/v1/ssh/roles/my-role
```
## List Zero-Address Roles
@ -362,7 +362,7 @@ This endpoint returns the list of configured zero-address roles.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/ssh/config/zeroaddress
http://127.0.0.1:8200/v1/ssh/config/zeroaddress
```
### Sample Response
@ -411,7 +411,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/ssh/config/zeroaddress
http://127.0.0.1:8200/v1/ssh/config/zeroaddress
```
## Delete Zero-Address Role
@ -428,7 +428,7 @@ This endpoint deletes the zero-address roles configuration.
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
https://vault.rocks/v1/ssh/config/zeroaddress
http://127.0.0.1:8200/v1/ssh/config/zeroaddress
```
## Generate SSH Credentials
@ -464,7 +464,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/ssh/creds/my-role
http://127.0.0.1:8200/v1/ssh/creds/my-role
```
### Sample Response
@ -540,7 +540,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/ssh/lookup
http://127.0.0.1:8200/v1/ssh/lookup
```
### Sample Response
@ -592,7 +592,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/ssh/verify
http://127.0.0.1:8200/v1/ssh/verify
### Sample Response
@ -647,7 +647,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/ssh/config/ca
http://127.0.0.1:8200/v1/ssh/config/ca
```
### Sample Response
@ -682,7 +682,7 @@ This endpoint deletes the CA information for the backend via an SSH key pair.
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
https://vault.rocks/v1/ssh/config/ca
http://127.0.0.1:8200/v1/ssh/config/ca
```
## Read Public Key (Unauthenticated)
@ -697,7 +697,7 @@ endpoint.
### Sample Request
```
$ curl https://vault.rocks/v1/ssh/public_key
$ curl http://127.0.0.1:8200/v1/ssh/public_key
```
### Sample Response
@ -719,7 +719,7 @@ This endpoint reads the configured/generated public key.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/ssh/config/ca
http://127.0.0.1:8200/v1/ssh/config/ca
```
### Sample Response
@ -788,7 +788,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/ssh/sign/my-key
http://127.0.0.1:8200/v1/ssh/sign/my-key
```
### Sample Response

View file

@ -67,7 +67,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/totp/keys/my-key
http://127.0.0.1:8200/v1/totp/keys/my-key
```
### Sample Payload
@ -87,7 +87,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/totp/keys/my-key
http://127.0.0.1:8200/v1/totp/keys/my-key
```
### Sample Response
@ -124,7 +124,7 @@ This endpoint queries the key definition.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/totp/keys/my-key
http://127.0.0.1:8200/v1/totp/keys/my-key
```
### Sample Response
@ -156,7 +156,7 @@ returned, not any values.
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
https://vault.rocks/v1/totp/keys
http://127.0.0.1:8200/v1/totp/keys
```
### Sample Response
@ -192,7 +192,7 @@ This endpoint deletes the key definition.
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
https://vault.rocks/v1/totp/keys/my-key
http://127.0.0.1:8200/v1/totp/keys/my-key
```
## Generate Code
@ -214,7 +214,7 @@ key.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/totp/code/my-key
http://127.0.0.1:8200/v1/totp/code/my-key
```
### Sample Response
@ -257,7 +257,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/totp/code/my-key
http://127.0.0.1:8200/v1/totp/code/my-key
```
### Sample Response

View file

@ -77,7 +77,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/transit/keys/my-key
http://127.0.0.1:8200/v1/transit/keys/my-key
```
## Read Key
@ -102,7 +102,7 @@ type.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/transit/keys/my-key
http://127.0.0.1:8200/v1/transit/keys/my-key
```
### Sample Response
@ -144,7 +144,7 @@ actual keys themselves).
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
https://vault.rocks/v1/transit/keys
http://127.0.0.1:8200/v1/transit/keys
```
### Sample Response
@ -182,7 +182,7 @@ catastrophic operation, the `deletion_allowed` tunable must be set in the key's
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
https://vault.rocks/v1/transit/keys/my-key
http://127.0.0.1:8200/v1/transit/keys/my-key
```
## Update Key Configuration
@ -233,7 +233,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/transit/keys/my-key/config
http://127.0.0.1:8200/v1/transit/keys/my-key/config
```
## Rotate Key
@ -254,7 +254,7 @@ decryption operations.
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
https://vault.rocks/v1/transit/keys/my-key/rotate
http://127.0.0.1:8200/v1/transit/keys/my-key/rotate
```
## Export Key
@ -291,7 +291,7 @@ be valid.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/transit/export/encryption-key/my-key/1
http://127.0.0.1:8200/v1/transit/export/encryption-key/my-key/1
```
### Sample Response
@ -391,7 +391,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/transit/encrypt/my-key
http://127.0.0.1:8200/v1/transit/encrypt/my-key
```
### Sample Response
@ -460,7 +460,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/transit/decrypt/my-key
http://127.0.0.1:8200/v1/transit/decrypt/my-key
```
### Sample Response
@ -535,7 +535,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/transit/rewrap/my-key
http://127.0.0.1:8200/v1/transit/rewrap/my-key
```
### Sample Response
@ -599,7 +599,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/transit/datakey/plaintext/my-key
http://127.0.0.1:8200/v1/transit/datakey/plaintext/my-key
```
### Sample Response
@ -644,7 +644,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/transit/random/164
http://127.0.0.1:8200/v1/transit/random/164
```
### Sample Response
@ -696,7 +696,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/transit/hash/sha2-512
http://127.0.0.1:8200/v1/transit/hash/sha2-512
```
### Sample Response
@ -755,7 +755,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/transit/hmac/my-key/sha2-512
http://127.0.0.1:8200/v1/transit/hmac/my-key/sha2-512
```
### Sample Response
@ -829,7 +829,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/transit/sign/my-key/sha2-512
http://127.0.0.1:8200/v1/transit/sign/my-key/sha2-512
```
### Sample Response
@ -905,7 +905,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/transit/verify/my-key/sha2-512
http://127.0.0.1:8200/v1/transit/verify/my-key/sha2-512
```
### Sample Response
@ -938,7 +938,7 @@ restore the key.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/transit/backup/aes
http://127.0.0.1:8200/v1/transit/backup/aes
```
### Sample Response
@ -982,5 +982,5 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/transit/restore
http://127.0.0.1:8200/v1/transit/restore
```

View file

@ -51,7 +51,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/sys/audit-hash/example-audit
http://127.0.0.1:8200/v1/sys/audit-hash/example-audit
```
### Sample Response

View file

@ -29,7 +29,7 @@ available audit devices).
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/sys/audit
http://127.0.0.1:8200/v1/sys/audit
```
### Sample Response
@ -95,7 +95,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request PUT \
--data @payload.json \
https://vault.rocks/v1/sys/audit/example-audit
http://127.0.0.1:8200/v1/sys/audit/example-audit
```
## Disable Audit Device
@ -120,5 +120,5 @@ This endpoint disables the audit device at the given path.
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
https://vault.rocks/v1/sys/audit/example-audit
http://127.0.0.1:8200/v1/sys/audit/example-audit
```

View file

@ -25,7 +25,7 @@ This endpoint lists all enabled auth methods.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/sys/auth
http://127.0.0.1:8200/v1/sys/auth
```
### Sample Response
@ -121,7 +121,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/sys/auth/my-auth
http://127.0.0.1:8200/v1/sys/auth/my-auth
```
## Disable Auth Method
@ -146,7 +146,7 @@ This endpoint disables the auth method at the given auth path.
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
https://vault.rocks/v1/sys/auth/my-auth
http://127.0.0.1:8200/v1/sys/auth/my-auth
```
## Read Auth Method Tuning
@ -171,7 +171,7 @@ without `sudo` via `sys/mounts/auth/[auth-path]/tune`._
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/sys/auth/my-auth/tune
http://127.0.0.1:8200/v1/sys/auth/my-auth/tune
```
### Sample Response
@ -231,5 +231,5 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/sys/auth/my-auth/tune
http://127.0.0.1:8200/v1/sys/auth/my-auth/tune
```

View file

@ -50,7 +50,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/sys/capabilities-accessor
http://127.0.0.1:8200/v1/sys/capabilities-accessor
```
### Sample Response

View file

@ -47,7 +47,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/sys/capabilities-self
http://127.0.0.1:8200/v1/sys/capabilities-self
```
### Sample Response

View file

@ -48,7 +48,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/sys/capabilities
http://127.0.0.1:8200/v1/sys/capabilities
```
### Sample Response

View file

@ -26,7 +26,7 @@ This endpoint lists the request headers that are configured to be audited.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/sys/config/auditing/request-headers
http://127.0.0.1:8200/v1/sys/config/auditing/request-headers
```
### Sample Response
@ -62,7 +62,7 @@ This endpoint lists the information for the given request header.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/sys/config/auditing/request-headers/my-header
http://127.0.0.1:8200/v1/sys/config/auditing/request-headers/my-header
```
### Sample Response
@ -106,7 +106,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request PUT \
--data @payload.json \
https://vault.rocks/v1/sys/config/auditing/request-headers/my-header
http://127.0.0.1:8200/v1/sys/config/auditing/request-headers/my-header
```
## Delete Audit Request Header
@ -126,5 +126,5 @@ This endpoint disables auditing of the given request header.
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
https://vault.rocks/v1/sys/config/auditing/request-headers/my-header
http://127.0.0.1:8200/v1/sys/config/auditing/request-headers/my-header
```

View file

@ -26,7 +26,7 @@ This endpoint returns the current Control Group configuration.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/sys/config/control-group
http://127.0.0.1:8200/v1/sys/config/control-group
```
### Sample Response
@ -64,7 +64,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request PUT \
--data @payload.json \
https://vault.rocks/v1/sys/config/control-group
http://127.0.0.1:8200/v1/sys/config/control-group
```
## Delete Control Group Settings
@ -81,5 +81,5 @@ This endpoint removes any control group configuration.
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
https://vault.rocks/v1/sys/config/control-group
http://127.0.0.1:8200/v1/sys/config/control-group
```

View file

@ -26,7 +26,7 @@ This endpoint returns the current CORS configuration.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/sys/config/cors
http://127.0.0.1:8200/v1/sys/config/cors
```
### Sample Response
@ -78,7 +78,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request PUT \
--data @payload.json \
https://vault.rocks/v1/sys/config/cors
http://127.0.0.1:8200/v1/sys/config/cors
```
## Delete CORS Settings
@ -95,5 +95,5 @@ This endpoint removes any CORS configuration.
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
https://vault.rocks/v1/sys/config/cors
http://127.0.0.1:8200/v1/sys/config/cors
```

View file

@ -35,7 +35,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/sys/control-group/authorize
http://127.0.0.1:8200/v1/sys/control-group/authorize
```
### Sample Response
@ -75,7 +75,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/sys/control-group/request
http://127.0.0.1:8200/v1/sys/control-group/request
```
### Sample Response

View file

@ -24,7 +24,7 @@ attempt.
```
$ curl \
https://vault.rocks/v1/sys/generate-root/attempt
http://127.0.0.1:8200/v1/sys/generate-root/attempt
```
### Sample Response
@ -82,7 +82,7 @@ generation attempt can take place at a time. One (and only one) of `otp` or
$ curl \
--request PUT \
--data @payload.json \
https://vault.rocks/v1/sys/generate-root/attempt
http://127.0.0.1:8200/v1/sys/generate-root/attempt
```
### Sample Response
@ -113,7 +113,7 @@ progress made. This must be called to change the OTP or PGP key being used.
```
$ curl \
--request DELETE \
https://vault.rocks/v1/sys/generate-root/attempt
http://127.0.0.1:8200/v1/sys/generate-root/attempt
```
## Provide Key Share to Generate Root
@ -149,7 +149,7 @@ nonce must be provided with each call.
$ curl \
--request PUT \
--data @payload.json \
https://vault.rocks/v1/sys/generate-root/update
http://127.0.0.1:8200/v1/sys/generate-root/update
```
### Sample Response

View file

@ -52,7 +52,7 @@ The default status codes are:
```
$ curl \
https://vault.rocks/v1/sys/health
http://127.0.0.1:8200/v1/sys/health
```
### Sample Response

View file

@ -22,7 +22,7 @@ This endpoint returns the initialization status of Vault.
```
$ curl \
https://vault.rocks/v1/sys/init
http://127.0.0.1:8200/v1/sys/init
```
### Sample Response
@ -95,7 +95,7 @@ Additionally, the following options are only supported on Vault Pro/Enterprise:
$ curl \
--request PUT \
--data @payload.json \
https://vault.rocks/v1/sys/init
http://127.0.0.1:8200/v1/sys/init
```
### Sample Response

View file

@ -25,7 +25,7 @@ of Vault.
```
$ curl \
https://vault.rocks/v1/sys/leader
http://127.0.0.1:8200/v1/sys/leader
```
### Sample Response

View file

@ -37,7 +37,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request PUT \
--data @payload.json \
https://vault.rocks/v1/sys/leases/lookup
http://127.0.0.1:8200/v1/sys/leases/lookup
```
### Sample Response
@ -70,7 +70,7 @@ This endpoint returns a list of lease ids.
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
https://vault.rocks/v1/sys/leases/lookup/aws/creds/deploy/
http://127.0.0.1:8200/v1/sys/leases/lookup/aws/creds/deploy/
```
### Sample Response
@ -119,7 +119,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request PUT \
--data @payload.json \
https://vault.rocks/v1/sys/leases/renew
http://127.0.0.1:8200/v1/sys/leases/renew
```
### Sample Response
@ -159,7 +159,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request PUT \
--data @payload.json \
https://vault.rocks/v1/sys/leases/revoke
http://127.0.0.1:8200/v1/sys/leases/revoke
```
## Revoke Force
@ -191,7 +191,7 @@ this endpoint should be tightly controlled.
$ curl \
--header "X-Vault-Token: ..." \
--request PUT \
https://vault.rocks/v1/sys/leases/revoke-force/aws/creds
http://127.0.0.1:8200/v1/sys/leases/revoke-force/aws/creds
```
## Revoke Prefix
@ -218,5 +218,5 @@ used to revoke very large numbers of secrets/tokens at once.
$ curl \
--header "X-Vault-Token: ..." \
--request PUT \
https://vault.rocks/v1/sys/leases/revoke-prefix/aws/creds
http://127.0.0.1:8200/v1/sys/leases/revoke-prefix/aws/creds
```

View file

@ -27,7 +27,7 @@ This endpoint returns information about the currently installed license.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/sys/license
http://127.0.0.1:8200/v1/sys/license
```
### Sample Response
@ -83,5 +83,5 @@ $ curl \
--header "X-Vault-Token: ..." \
--request PUT \
--data @payload.json \
https://vault.rocks/v1/sys/license
http://127.0.0.1:8200/v1/sys/license
```

View file

@ -52,7 +52,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/sys/mfa/method/duo/my_duo
http://127.0.0.1:8200/v1/sys/mfa/method/duo/my_duo
```
## Read Duo MFA Method
@ -74,7 +74,7 @@ name.
$ curl \
--header "X-Vault-Token: ..." \
--request GET \
https://vault.rocks/v1/sys/mfa/method/duo/my_duo
http://127.0.0.1:8200/v1/sys/mfa/method/duo/my_duo
```
@ -114,6 +114,6 @@ This endpoint deletes a Duo MFA method.
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
https://vault.rocks/v1/sys/mfa/method/duo/my_duo
http://127.0.0.1:8200/v1/sys/mfa/method/duo/my_duo
```

View file

@ -51,7 +51,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/sys/mfa/method/okta/my_okta
http://127.0.0.1:8200/v1/sys/mfa/method/okta/my_okta
```
## Read Okta MFA Method
@ -73,7 +73,7 @@ name.
$ curl \
--header "X-Vault-Token: ..." \
--request GET \
https://vault.rocks/v1/sys/mfa/method/okta/my_okta
http://127.0.0.1:8200/v1/sys/mfa/method/okta/my_okta
```
@ -112,6 +112,6 @@ This endpoint deletes a Okta MFA method.
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
https://vault.rocks/v1/sys/mfa/method/okta/my_okta
http://127.0.0.1:8200/v1/sys/mfa/method/okta/my_okta
```

View file

@ -44,7 +44,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/sys/mfa/method/pingid/ping
http://127.0.0.1:8200/v1/sys/mfa/method/pingid/ping
```
## Read PingiD MFA Method
@ -66,7 +66,7 @@ name.
$ curl \
--header "X-Vault-Token: ..." \
--request GET \
https://vault.rocks/v1/sys/mfa/method/pingid/ping
http://127.0.0.1:8200/v1/sys/mfa/method/pingid/ping
```
@ -106,6 +106,6 @@ This endpoint deletes a PingID MFA method.
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
https://vault.rocks/v1/sys/mfa/method/pingid/ping
http://127.0.0.1:8200/v1/sys/mfa/method/pingid/ping
```

View file

@ -48,7 +48,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/sys/mfa/method/totp/my_totp
http://127.0.0.1:8200/v1/sys/mfa/method/totp/my_totp
```
## Read TOTP MFA Method
@ -70,7 +70,7 @@ name.
$ curl \
--header "X-Vault-Token: ..." \
--request GET \
https://vault.rocks/v1/sys/mfa/method/totp/my_totp
http://127.0.0.1:8200/v1/sys/mfa/method/totp/my_totp
```
@ -112,7 +112,7 @@ This endpoint deletes a TOTP MFA method.
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
https://vault.rocks/v1/sys/mfa/method/totp/my_totp
http://127.0.0.1:8200/v1/sys/mfa/method/totp/my_totp
```
@ -136,7 +136,7 @@ method name.
$ curl \
--header "X-Vault-Token: ..." \
--request GET \
https://vault.rocks/v1/sys/mfa/method/totp/my_totp/generate
http://127.0.0.1:8200/v1/sys/mfa/method/totp/my_totp/generate
```
### Sample Response
@ -182,7 +182,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json
https://vault.rocks/v1/sys/mfa/method/totp/my_totp/admin-generate
http://127.0.0.1:8200/v1/sys/mfa/method/totp/my_totp/admin-generate
```
### Sample Response
@ -231,5 +231,5 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json
https://vault.rocks/v1/sys/mfa/method/totp/my_totp/admin-destroy
http://127.0.0.1:8200/v1/sys/mfa/method/totp/my_totp/admin-destroy
```

View file

@ -23,7 +23,7 @@ This endpoints lists all the mounted secrets engines.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/sys/mounts
http://127.0.0.1:8200/v1/sys/mounts
```
### Sample Response
@ -139,7 +139,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/sys/mounts/my-mount
http://127.0.0.1:8200/v1/sys/mounts/my-mount
```
## Disable Secrets Engine
@ -156,7 +156,7 @@ This endpoint disables the mount point specified in the URL.
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
https://vault.rocks/v1/sys/mounts/my-mount
http://127.0.0.1:8200/v1/sys/mounts/my-mount
```
## Read Mount Configuration
@ -174,7 +174,7 @@ be the system default or a mount-specific value.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/sys/mounts/my-mount/tune
http://127.0.0.1:8200/v1/sys/mounts/my-mount/tune
```
### Sample Response
@ -232,5 +232,5 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/sys/mounts/my-mount/tune
http://127.0.0.1:8200/v1/sys/mounts/my-mount/tune
```

View file

@ -26,7 +26,7 @@ This endpoint lists the plugins in the catalog.
$ curl \
--header "X-Vault-Token: ..." \
--request LIST
https://vault.rocks/v1/sys/plugins/catalog
http://127.0.0.1:8200/v1/sys/plugins/catalog
```
### Sample Response
@ -86,7 +86,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request PUT \
--data @payload.json \
https://vault.rocks/v1/sys/plugins/catalog/example-plugin
http://127.0.0.1:8200/v1/sys/plugins/catalog/example-plugin
```
## Read Plugin
@ -111,7 +111,7 @@ This endpoint returns the configuration data for the plugin with the given name.
$ curl \
--header "X-Vault-Token: ..." \
--request GET \
https://vault.rocks/v1/sys/plugins/catalog/example-plugin
http://127.0.0.1:8200/v1/sys/plugins/catalog/example-plugin
```
### Sample Response
@ -149,5 +149,5 @@ This endpoint removes the plugin with the given name.
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
https://vault.rocks/v1/sys/plugins/catalog/example-plugin
http://127.0.0.1:8200/v1/sys/plugins/catalog/example-plugin
```

View file

@ -43,5 +43,5 @@ This endpoint reloads mounted plugin backends.
$ curl \
--header "X-Vault-Token: ..." \
--request PUT
https://vault.rocks/v1/sys/plugins/reload/backend
http://127.0.0.1:8200/v1/sys/plugins/reload/backend
```

View file

@ -26,7 +26,7 @@ This endpoint lists all configured ACL policies.
```
$ curl \
-X LIST --header "X-Vault-Token: ..." \
https://vault.rocks/v1/sys/policies/acl
http://127.0.0.1:8200/v1/sys/policies/acl
```
### Sample Response
@ -55,7 +55,7 @@ This endpoint retrieves information about the named ACL policy.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/sys/policies/acl/my-policy
http://127.0.0.1:8200/v1/sys/policies/acl/my-policy
```
### Sample Response
@ -99,7 +99,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request PUT \
--data @payload.json \
https://vault.rocks/v1/sys/policies/acl/my-policy
http://127.0.0.1:8200/v1/sys/policies/acl/my-policy
```
## Delete ACL Policy
@ -123,7 +123,7 @@ acts as an empty policy.)
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
https://vault.rocks/v1/sys/policies/acl/my-policy
http://127.0.0.1:8200/v1/sys/policies/acl/my-policy
```
## List RGP Policies
@ -139,7 +139,7 @@ This endpoint lists all configured RGP policies.
```
$ curl \
-X LIST --header "X-Vault-Token: ..." \
https://vault.rocks/v1/sys/policies/rgp
http://127.0.0.1:8200/v1/sys/policies/rgp
```
### Sample Response
@ -168,7 +168,7 @@ This endpoint retrieves information about the named RGP policy.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/sys/policies/rgp/webapp
http://127.0.0.1:8200/v1/sys/policies/rgp/webapp
```
### Sample Response
@ -218,7 +218,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request PUT \
--data @payload.json \
https://vault.rocks/v1/sys/policies/rgp/webapp
http://127.0.0.1:8200/v1/sys/policies/rgp/webapp
```
## Delete RGP Policy
@ -242,7 +242,7 @@ acts as an empty policy.)
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
https://vault.rocks/v1/sys/policies/rgp/webapp
http://127.0.0.1:8200/v1/sys/policies/rgp/webapp
```
## List EGP Policies
@ -264,7 +264,7 @@ path, this endpoint returns two identifiers:
```
$ curl \
-X LIST --header "X-Vault-Token: ..." \
https://vault.rocks/v1/sys/policies/egp
http://127.0.0.1:8200/v1/sys/policies/egp
```
### Sample Response
@ -293,7 +293,7 @@ This endpoint retrieves information about the named EGP policy.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/sys/policies/egp/breakglass
http://127.0.0.1:8200/v1/sys/policies/egp/breakglass
```
### Sample Response
@ -350,7 +350,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request PUT \
--data @payload.json \
https://vault.rocks/v1/sys/policies/egp/breakglass
http://127.0.0.1:8200/v1/sys/policies/egp/breakglass
```
## Delete EGP Policy
@ -372,5 +372,5 @@ This endpoint deletes the EGP policy with the given name from all paths on which
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
https://vault.rocks/v1/sys/policies/egp/breakglass
http://127.0.0.1:8200/v1/sys/policies/egp/breakglass
```

View file

@ -23,7 +23,7 @@ This endpoint lists all configured policies.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/sys/policy
http://127.0.0.1:8200/v1/sys/policy
```
### Sample Response
@ -52,7 +52,7 @@ This endpoint retrieve the policy body for the named policy.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/sys/policy/my-policy
http://127.0.0.1:8200/v1/sys/policy/my-policy
```
### Sample Response
@ -94,7 +94,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request PUT \
--data @payload.json \
https://vault.rocks/v1/sys/policy/my-policy
http://127.0.0.1:8200/v1/sys/policy/my-policy
```
## Delete Policy
@ -117,5 +117,5 @@ affect all users associated with this policy.
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
https://vault.rocks/v1/sys/policy/my-policy
http://127.0.0.1:8200/v1/sys/policy/my-policy
```

View file

@ -34,7 +34,7 @@ system.
```
$ curl \
---header "X-Vault-Token: ..." \
https://vault.rocks/v1/sys/raw/secret/foo
http://127.0.0.1:8200/v1/sys/raw/secret/foo
```
### Sample Response
@ -77,7 +77,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request PUT \
--data @payload.json \
https://vault.rocks/v1/sys/raw/secret/foo
http://127.0.0.1:8200/v1/sys/raw/secret/foo
```
## List Raw
@ -98,7 +98,7 @@ This endpoint returns a list keys for a given path prefix.
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
https://vault.rocks/v1/sys/raw/logical
http://127.0.0.1:8200/v1/sys/raw/logical
```
### Sample Response
@ -135,5 +135,5 @@ storage backend and not the logical path that is exposed via the mount system.
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
https://vault.rocks/v1/sys/raw/secret/foo
http://127.0.0.1:8200/v1/sys/raw/secret/foo
```

View file

@ -25,7 +25,7 @@ This endpoint reads the configuration and progress of the current rekey attempt.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/sys/rekey-recovery-key/init
http://127.0.0.1:8200/v1/sys/rekey-recovery-key/init
```
### Sample Response
@ -97,7 +97,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request PUT \
--data @payload.json \
https://vault.rocks/v1/sys/rekey-recovery-key/init
http://127.0.0.1:8200/v1/sys/rekey-recovery-key/init
```
## Cancel Rekey
@ -116,7 +116,7 @@ rekey.
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
https://vault.rocks/v1/sys/rekey-recovery-key/init
http://127.0.0.1:8200/v1/sys/rekey-recovery-key/init
```
## Read Backup Key
@ -134,7 +134,7 @@ fingerprint to hex-encoded PGP-encrypted key.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/sys/rekey-recovery-key/backup
http://127.0.0.1:8200/v1/sys/rekey-recovery-key/backup
```
### Sample Response
@ -162,7 +162,7 @@ This endpoint deletes the backup copy of PGP-encrypted recovery key shares.
$ curl \
--header "X-Vault-Token" \
--request DELETE \
https://vault.rocks/v1/sys/rekey-recovery-key/backup
http://127.0.0.1:8200/v1/sys/rekey-recovery-key/backup
```
## Submit Key
@ -199,7 +199,7 @@ $ curl \
--header "X-Vault-Token" \
--request PUT \
--data @payload.json \
https://vault.rocks/v1/sys/rekey-recovery-key/update
http://127.0.0.1:8200/v1/sys/rekey-recovery-key/update
```
### Sample Response

View file

@ -28,7 +28,7 @@ This endpoint reads the configuration and progress of the current rekey attempt.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/sys/rekey/init
http://127.0.0.1:8200/v1/sys/rekey/init
```
### Sample Response
@ -99,7 +99,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request PUT \
--data @payload.json \
https://vault.rocks/v1/sys/rekey/init
http://127.0.0.1:8200/v1/sys/rekey/init
```
## Cancel Rekey
@ -118,7 +118,7 @@ rekey.
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
https://vault.rocks/v1/sys/rekey/init
http://127.0.0.1:8200/v1/sys/rekey/init
```
## Read Backup Key
@ -136,7 +136,7 @@ hex-encoded PGP-encrypted key.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/sys/rekey/backup
http://127.0.0.1:8200/v1/sys/rekey/backup
```
### Sample Response
@ -164,7 +164,7 @@ This endpoint deletes the backup copy of PGP-encrypted unseal keys.
$ curl \
--header "X-Vault-Token" \
--request DELETE \
https://vault.rocks/v1/sys/rekey/backup
http://127.0.0.1:8200/v1/sys/rekey/backup
```
## Submit Key
@ -201,7 +201,7 @@ $ curl \
--header "X-Vault-Token" \
--request PUT \
--data @payload.json \
https://vault.rocks/v1/sys/rekey/update
http://127.0.0.1:8200/v1/sys/rekey/update
```
### Sample Response

View file

@ -40,5 +40,5 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/sys/remount
http://127.0.0.1:8200/v1/sys/remount
```

View file

@ -25,7 +25,7 @@ This is an authenticated endpoint.
```
$ curl \
https://vault.rocks/v1/sys/replication/dr/status
http://127.0.0.1:8200/v1/sys/replication/dr/status
```
### Sample Response
@ -87,7 +87,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/sys/replication/dr/primary/enable
http://127.0.0.1:8200/v1/sys/replication/dr/primary/enable
```
## Demote DR Primary
@ -107,7 +107,7 @@ DR replication set without wiping local storage.
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
https://vault.rocks/v1/sys/replication/dr/primary/demote
http://127.0.0.1:8200/v1/sys/replication/dr/primary/demote
```
## Disable DR Primary
@ -129,7 +129,7 @@ will require a wipe of the underlying storage.
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
https://vault.rocks/v1/sys/replication/dr/primary/disable
http://127.0.0.1:8200/v1/sys/replication/dr/primary/disable
```
## Generate DR Secondary Token
@ -156,7 +156,7 @@ identifier can later be used to revoke a DR secondary's access.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/sys/replication/dr/primary/secondary-token?id=us-east-1
http://127.0.0.1:8200/v1/sys/replication/dr/primary/secondary-token?id=us-east-1
```
### Sample Response
@ -207,7 +207,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/sys/replication/dr/primary/revoke-secondary
http://127.0.0.1:8200/v1/sys/replication/dr/primary/revoke-secondary
```
## Enable DR Secondary
@ -254,7 +254,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/sys/replication/dr/secondary/enable
http://127.0.0.1:8200/v1/sys/replication/dr/secondary/enable
```
## Promote DR Secondary
@ -306,7 +306,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/sys/replication/dr/secondary/promote
http://127.0.0.1:8200/v1/sys/replication/dr/secondary/promote
```
### Sample Response
@ -382,7 +382,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/sys/replication/dr/secondary/update-primary
http://127.0.0.1:8200/v1/sys/replication/dr/secondary/update-primary
```
## Generate Disaster Recovery Operation Token
@ -405,7 +405,7 @@ attempt.
```
$ curl \
https://vault.rocks/v1/sys/replication/dr/secondary/generate-operation-token/attempt
http://127.0.0.1:8200/v1/sys/replication/dr/secondary/generate-operation-token/attempt
```
### Sample Response
@ -463,7 +463,7 @@ generation attempt can take place at a time. One (and only one) of `otp` or
$ curl \
--request PUT \
--data @payload.json \
https://vault.rocks/v1/sys/replication/dr/secondary/generate-operation-token/attempt
http://127.0.0.1:8200/v1/sys/replication/dr/secondary/generate-operation-token/attempt
```
### Sample Response
@ -494,7 +494,7 @@ progress made. This must be called to change the OTP or PGP key being used.
```
$ curl \
--request DELETE \
https://vault.rocks/v1/sys/replication/dr/secondary/generate-operation-token/attempt
http://127.0.0.1:8200/v1/sys/replication/dr/secondary/generate-operation-token/attempt
```
## Provide Key Share to Generate Token
@ -530,7 +530,7 @@ nonce must be provided with each call.
$ curl \
--request PUT \
--data @payload.json \
https://vault.rocks/v1/sys/replication/dr/secondary/generate-operation-token/update
http://127.0.0.1:8200/v1/sys/replication/dr/secondary/generate-operation-token/update
```
### Sample Response
@ -579,5 +579,5 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/sys/replication/dr/secondary/operation-token/delete
http://127.0.0.1:8200/v1/sys/replication/dr/secondary/operation-token/delete
```

View file

@ -25,7 +25,7 @@ This is an authenticated endpoint.
```
$ curl \
https://vault.rocks/v1/sys/replication/performance/status
http://127.0.0.1:8200/v1/sys/replication/performance/status
```
### Sample Response
@ -91,7 +91,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/sys/replication/performance/primary/enable
http://127.0.0.1:8200/v1/sys/replication/performance/primary/enable
```
## Demote Performance Primary
@ -111,7 +111,7 @@ replication set without wiping local storage.
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
https://vault.rocks/v1/sys/replication/performance/primary/demote
http://127.0.0.1:8200/v1/sys/replication/performance/primary/demote
```
## Disable Performance Primary
@ -134,7 +134,7 @@ they have connected before) will require a wipe of the underlying storage.
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
https://vault.rocks/v1/sys/replication/performance/primary/disable
http://127.0.0.1:8200/v1/sys/replication/performance/primary/disable
```
## Generate Performance Secondary Token
@ -171,7 +171,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/sys/replication/performance/primary/secondary-token
http://127.0.0.1:8200/v1/sys/replication/performance/primary/secondary-token
```
### Sample Response
@ -222,7 +222,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/sys/replication/performance/primary/revoke-secondary
http://127.0.0.1:8200/v1/sys/replication/performance/primary/revoke-secondary
```
## Create Mounts Filter
@ -261,7 +261,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/sys/replication/performance/primary/mount-filter/us-east-1
http://127.0.0.1:8200/v1/sys/replication/performance/primary/mount-filter/us-east-1
```
## Read Mounts Filter
@ -282,7 +282,7 @@ for a secondary.
```
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/sys/replication/performance/primary/mount-filter/us-east-1
http://127.0.0.1:8200/v1/sys/replication/performance/primary/mount-filter/us-east-1
```
### Sample Response
@ -312,7 +312,7 @@ This endpoint is used to delete the mount filters for a secondary.
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
https://vault.rocks/v1/sys/replication/performance/primary/mount-filter/us-east-1
http://127.0.0.1:8200/v1/sys/replication/performance/primary/mount-filter/us-east-1
```
## Enable Performance Secondary
@ -359,7 +359,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/sys/replication/performance/secondary/enable
http://127.0.0.1:8200/v1/sys/replication/performance/secondary/enable
```
## Promote Performance Secondary
@ -393,7 +393,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/sys/replication/performance/secondary/promote
http://127.0.0.1:8200/v1/sys/replication/performance/secondary/promote
```
## Disable Performance Secondary
@ -418,7 +418,7 @@ underlying storage.
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
https://vault.rocks/v1/sys/replication/performance/secondary/disable
http://127.0.0.1:8200/v1/sys/replication/performance/secondary/disable
```
## Update Performance Secondary's Primary
@ -465,5 +465,5 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/sys/replication/performance/secondary/update-primary
http://127.0.0.1:8200/v1/sys/replication/performance/secondary/update-primary
```

View file

@ -25,7 +25,7 @@ example: an error has caused replication to stop syncing.
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
https://vault.rocks/v1/sys/replication/recover
http://127.0.0.1:8200/v1/sys/replication/recover
```
### Sample Response
@ -51,7 +51,7 @@ depending on the number and size of objects in the data store.
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
https://vault.rocks/v1/sys/replication/reindex
http://127.0.0.1:8200/v1/sys/replication/reindex
```
### Sample Response
@ -77,7 +77,7 @@ This is an authenticated endpoint.
```
$ curl \
https://vault.rocks/v1/sys/replication/status
http://127.0.0.1:8200/v1/sys/replication/status
```
### Sample Response

View file

@ -27,5 +27,5 @@ the new key, while old values are decrypted with previous encryption keys.
$ curl \
--header "X-Vault-Token: ..." \
--request PUT \
https://vault.rocks/v1/sys/rotate
http://127.0.0.1:8200/v1/sys/rotate
```

View file

@ -23,7 +23,7 @@ endpoint.
```
$ curl \
https://vault.rocks/v1/sys/seal-status
http://127.0.0.1:8200/v1/sys/seal-status
```
### Sample Response

View file

@ -26,5 +26,5 @@ Standby nodes should be restarted to get the same effect. Requires a token with
$ curl \
--header "X-Vault-Token: ..." \
--request PUT \
https://vault.rocks/v1/sys/seal
http://127.0.0.1:8200/v1/sys/seal
```

View file

@ -29,5 +29,5 @@ the path.
$ curl \
--header "X-Vault-Token: ..." \
--request PUT \
https://vault.rocks/v1/sys/step-down
http://127.0.0.1:8200/v1/sys/step-down
```

View file

@ -41,7 +41,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/sys/tools/random/164
http://127.0.0.1:8200/v1/sys/tools/random/164
```
### Sample Response
@ -93,7 +93,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/sys/tools/hash/sha2-512
http://127.0.0.1:8200/v1/sys/tools/hash/sha2-512
```
### Sample Response

View file

@ -46,7 +46,7 @@ Either the `key` or `reset` parameter must be provided; if both are provided,
$ curl \
--request PUT \
--data @payload.json \
https://vault.rocks/v1/sys/unseal
http://127.0.0.1:8200/v1/sys/unseal
```
### Sample Response

View file

@ -37,7 +37,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/sys/wrapping/lookup
http://127.0.0.1:8200/v1/sys/wrapping/lookup
```
### Sample Response

View file

@ -41,7 +41,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/sys/wrapping/lookup
http://127.0.0.1:8200/v1/sys/wrapping/lookup
```
### Sample Response

View file

@ -50,7 +50,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
https://vault.rocks/v1/sys/wrapping/unwrap
http://127.0.0.1:8200/v1/sys/wrapping/unwrap
```
### Sample Response

View file

@ -44,7 +44,7 @@ $ curl \
--header "X-Vault-Wrap-TTL: 60" \
--request POST \
--data @payload.json \
https://vault.rocks/v1/sys/wrapping/wrap
http://127.0.0.1:8200/v1/sys/wrapping/wrap
```
### Sample Response

View file

@ -76,7 +76,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--method POST \
--data '{"user_id": ":user_id"}' \
https://vault.rocks/v1/auth/app-id/login/:app_id
http://127.0.0.1:8200/v1/auth/app-id/login/:app_id
```
## Configuration

View file

@ -52,7 +52,7 @@ at a different path, use that value instead of `approle`.
$ curl \
--request POST \
--data '{"role_id":"988a9df-...","secret_id":"37b74931..."}' \
https://vault.rocks/v1/auth/approle/login
http://127.0.0.1:8200/v1/auth/approle/login
```
The response will contain the token at `auth.client_token`:
@ -126,7 +126,7 @@ management tool.
--header "X-Vault-Token: ..." \
--request POST \
--data '{"type": "approle"}' \
https://vault.rocks/v1/sys/auth/approle
http://127.0.0.1:8200/v1/sys/auth/approle
```
1. Create an AppRole with desired set of policies:
@ -136,7 +136,7 @@ management tool.
--header "X-Vault-Token: ..." \
--request POST \
--data '{"policies": "dev-policy,test-policy"}' \
https://vault.rocks/v1/auth/approle/role/my-role
http://127.0.0.1:8200/v1/auth/approle/role/my-role
```
1. Fetch the identifier of the role:
@ -144,7 +144,7 @@ management tool.
```sh
$ curl \
--header "X-Vault-Token: ..." \
https://vault.rocks/v1/auth/approle/role/my-role/role-id
http://127.0.0.1:8200/v1/auth/approle/role/my-role/role-id
```
The response will look like:
@ -163,7 +163,7 @@ management tool.
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
https://vault.rocks/v1/auth/approle/role/my-role/secret-id
http://127.0.0.1:8200/v1/auth/approle/role/my-role/secret-id
```
The response will look like:

View file

@ -88,7 +88,7 @@ $ curl \
--cert cert.pem \
--key key.pem \
--data '{"name": "web"}' \
https://vault.rocks/v1/auth/cert/login
http://127.0.0.1:8200/v1/auth/cert/login
```
## Configuration

View file

@ -66,7 +66,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data '{"role": "dev-role", "jwt": "eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9..."}' \
https://vault.rocks/v1/auth/gcp/login
http://127.0.0.1:8200/v1/auth/gcp/login
```
The response will contain the token at `auth.client_token`:
@ -148,7 +148,7 @@ management tool.
--header "X-Vault-Token: ..." \
--request POST \
--data '{"type": "gcp"}' \
https://vault.rocks/v1/sys/auth/gcp
http://127.0.0.1:8200/v1/sys/auth/gcp
```
1. Configure the GCP auth method:
@ -158,7 +158,7 @@ management tool.
--header "X-Vault-Token: ..." \
--request POST \
--data '{"credentials": "{...}"}' \
https://vault.rocks/v1/auth/gcp/config
http://127.0.0.1:8200/v1/auth/gcp/config
```
1. Create a role:
@ -168,7 +168,7 @@ management tool.
--header "X-Vault-Token: ..." \
--request POST \
--data '{"type": "iam", "project": "project-123456", ...}' \
https://vault.rocks/v1/auth/gcp/role/dev-role
http://127.0.0.1:8200/v1/auth/gcp/role/dev-role
```
### Plugin Setup

View file

@ -42,7 +42,7 @@ at a different path, use that value instead of `github`.
$ curl \
--request POST \
--data '{"token": "MY_TOKEN"}' \
https://vault.rocks/v1/auth/github/login
http://127.0.0.1:8200/v1/auth/github/login
```
The response will contain a token at `auth.client_token`:

View file

@ -34,7 +34,7 @@ at a different path, use that value instead of `kubernetes`.
$ curl \
--request POST \
--data '{"jwt": "your_service_account_jwt", "role": "demo"}' \
https://vault.rocks/v1/auth/kubernetes/login
http://127.0.0.1:8200/v1/auth/kubernetes/login
```
The response will contain a token at `auth.client_token`:

View file

@ -58,7 +58,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data '{"password": "foo"}' \
https://vault.rocks/v1/auth/ldap/login/mitchellh=
http://127.0.0.1:8200/v1/auth/ldap/login/mitchellh=
```
The response will be in JSON. For example:

View file

@ -52,7 +52,7 @@ MFA information should be sent in the POST body encoded as JSON.
$ curl \
--request POST \
--data '{"password": "test", "passcode": "111111"}' \
https://vault.rocks/v1/auth/userpass/login/my-username
http://127.0.0.1:8200/v1/auth/userpass/login/my-username
```
The response is the same as for the original method.

View file

@ -36,7 +36,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data '{"password": "MY_PASSWORD"}' \
https://vault.rocks/v1/auth/okta/login/my-username
http://127.0.0.1:8200/v1/auth/okta/login/my-username
```
The response will contain a token at `auth.client_token`:

View file

@ -33,7 +33,7 @@ $ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data '{"password": "..."}' \
https://vault.rocks/v1/auth/radius/login/sethvargo
http://127.0.0.1:8200/v1/auth/radius/login/sethvargo
```
The response will contain a token at `auth.client_token`:

View file

@ -34,7 +34,7 @@ $ vault login -method=userpass \
$ curl \
--request POST \
--data '{"password": "foo"}' \
https://vault.rocks/v1/auth/userpass/login/mitchellh
http://127.0.0.1:8200/v1/auth/userpass/login/mitchellh
```
The response will contain the token at `auth.client_token`:

View file

@ -72,7 +72,7 @@ optional.
$ curl \
--header "X-Vault-Token: ..." \
--header "X-Vault-MFA:my_totp:695452" \
https://vault.rocks/v1/secret/foo
http://127.0.0.1:8200/v1/secret/foo
```
### API

View file

@ -76,7 +76,7 @@ be manual or automated using a configuration management tool. The public key is
accessible via the API and does not require authentication.
```text
$ curl -o /etc/ssh/trusted-user-ca-keys.pem https://vault.rocks/v1/ssh-client-signer/public_key
$ curl -o /etc/ssh/trusted-user-ca-keys.pem http://127.0.0.1:8200/v1/ssh-client-signer/public_key
```
```text
@ -295,7 +295,7 @@ configuration on the host machine.
target machines.
```text
$ curl https://vault.rocks/v1/ssh-host-signer/public_key
$ curl http://127.0.0.1:8200/v1/ssh-host-signer/public_key
```
```text

View file

@ -187,7 +187,7 @@ parameters](/api/system/auth.html#enable-auth-method) of the method.
$ curl --header "X-Vault-Token: ..." \
--request POST \
--data '{"type": "approle"}' \
https://vault.rocks/v1/sys/auth/approle
http://127.0.0.1:8200/v1/sys/auth/approle
```
The above example passes the **type** (`approle`) in the request payload
@ -276,7 +276,7 @@ Before creating a role, create `jenkins` policy:
```shell
$ curl --header "X-Vault-Token: ..." --request PUT --data @payload.json \
https://vault.rocks/v1/sys/policy/jenkins
http://127.0.0.1:8200/v1/sys/policy/jenkins
$ cat payload.json
{
@ -295,7 +295,7 @@ mode](/docs/auth/approle.html).)
```shell
$ curl --header "X-Vault-Token: ..." --request POST \
--data '{"policies":"jenkins"}' \
https://vault.rocks/v1/auth/approle/role/jenkins
http://127.0.0.1:8200/v1/auth/approle/role/jenkins
```
> There are a number of
@ -315,14 +315,14 @@ separated string.
$ curl --header "X-Vault-Token:..."
--request POST \
--data '{"policies":"jenkins,anotherpolicy"}' \
https://vault.rocks/v1/auth/approle/role/jenkins
http://127.0.0.1:8200/v1/auth/approle/role/jenkins
````
To read the jenkins role you just created:
```shell
$ curl --header "X-Vault-Token: ..." --request GET \
https://vault.rocks/v1/auth/approle/role/jenkins | jq
http://127.0.0.1:8200/v1/auth/approle/role/jenkins | jq
{
"request_id": "b18054ad-1ab5-8d83-eeed-193d97026ee7",
"lease_id": "",
@ -425,10 +425,10 @@ payload, or invoke the API with an empty payload.
```shell
$ curl --header "X-Vault-Token:..." --request GET \
https://vault.rocks/v1/auth/approle/role/jenkins/role-id | jq
http://127.0.0.1:8200/v1/auth/approle/role/jenkins/role-id | jq
$ curl --header "X-Vault-Token:..." --request POST \
https://vault.rocks/v1/auth/approle/role/jenkins/secret-id | jq
http://127.0.0.1:8200/v1/auth/approle/role/jenkins/secret-id | jq
```
If you specified `secret_id_ttl`, `secret_id_num_uses`, or `bound_cidr_list` on
@ -484,7 +484,7 @@ $ cat payload.json
"secret_id": "ed0a642f-2acf-c2da-232f-1b21300d5f29"
}
$ curl --request POST --data @payload.json https://vault.rocks/v1/auth/approle/login | jq
$ curl --request POST --data @payload.json http://127.0.0.1:8200/v1/auth/approle/login | jq
{
"request_id": "fccae32b-1e6a-9a9c-7666-f5cb07805c1e",
"lease_id": "",
@ -576,7 +576,7 @@ You can now pass the `client_token` returned in [Step 4](#step4) in the
```plaintext
$ curl --header "X-Vault-Token: 3e7dd0ac-8b3e-8f88-bb37-a2890455ca6e" \
--request GET \
https://vault.rocks/v1/secret/mysql/webapp | jq
http://127.0.0.1:8200/v1/secret/mysql/webapp | jq
{
"errors": []
}

View file

@ -210,7 +210,7 @@ Where `<TOKEN>` is your valid token with read permission on the
```shell
$ curl --header "X-Vault-Token: ..." --request GET \
https://vault.rocks/v1/sys/auth/token/tune | jq
http://127.0.0.1:8200/v1/sys/auth/token/tune | jq
{
"default_lease_ttl": 2764800,
"max_lease_ttl": 2764800,
@ -321,7 +321,7 @@ The following example sets the `ttl` parameter.
# Create a new token with TTl of 30 seconds
$ curl --header "X-Vault-Token: ..." --request POST \
--data '{"ttl": "30s"}' \
https://vault.rocks/v1/auth/token/create | jq
http://127.0.0.1:8200/v1/auth/token/create | jq
{
...
"auth": {
@ -339,7 +339,7 @@ $ curl --header "X-Vault-Token: ..." --request POST \
# Pass the returned token (`client_token`) in the `X-Vault-Token` header to test
$ curl --header "X-Vault-Token: f7d88963-1aba-64d7-11a0-9282ae7681d0" \
--request GET \
https://vault.rocks/v1/auth/token/lookup-self | jq
http://127.0.0.1:8200/v1/auth/token/lookup-self | jq
{
...
"data": {
@ -363,12 +363,12 @@ token usage.
```shell
$ curl --header "X-Vault-Token: ..." --request POST \
https://vault.rocks/v1/auth/token/renew/<TOKEN> | jq
http://127.0.0.1:8200/v1/auth/token/renew/<TOKEN> | jq
# Renew token with 1 hour extension
$ curl --header "X-Vault-Token: ..." --request POST \
--data '{"increment": "3600"}' \
https://vault.rocks/v1/auth/token/renew/<TOKEN> | jq
http://127.0.0.1:8200/v1/auth/token/renew/<TOKEN> | jq
```
-> **NOTE:** Tokens can be renewed as long as its life hasn't reached its max
@ -459,7 +459,7 @@ Set the `num_uses` property in the request payload.
```shell
$ curl --header "X-Vault-Token: ..." --request POST \
--data '{ "policies": ["default"], "num_uses":2 }' \
https://vault.rocks/v1/auth/token/create | jq
http://127.0.0.1:8200/v1/auth/token/create | jq
{
"request_id": "0e98ff80-2825-7f50-6522-b6f95d596ef4",
"lease_id": "",
@ -488,7 +488,7 @@ This creates a token with the _default_ policy and a use limit of 2.
```text
$ curl --header "X-Vault-Token: d9c2f2e5-6b8a-4021-476c-ebd3f166d668" \
--request GET \
https://vault.rocks/v1/auth/token/lookup-self | jq
http://127.0.0.1:8200/v1/auth/token/lookup-self | jq
{
"request_id": "77be1321-c0ca-e099-6f92-4ad87133b044",
"lease_id": "",
@ -511,12 +511,12 @@ $ curl --header "X-Vault-Token: d9c2f2e5-6b8a-4021-476c-ebd3f166d668" \
$ curl --header "X-Vault-Token: d9c2f2e5-6b8a-4021-476c-ebd3f166d668" \
--request POST \
--data '{ "value": "d9c2f2e5-6b8a-4021-476c-ebd3f166d668" }' \
https://vault.rocks/v1/cubbyhole/token
http://127.0.0.1:8200/v1/cubbyhole/token
$ curl --header "X-Vault-Token: d9c2f2e5-6b8a-4021-476c-ebd3f166d668" \
--request GET \
https://vault.rocks/v1/cubbyhole/token | jq
http://127.0.0.1:8200/v1/cubbyhole/token | jq
{
"errors": [
"permission denied"
@ -581,7 +581,7 @@ token renewal period. This value can be an integer value in seconds (e.g.
```shell
$ curl --header "X-Vault-Token: ..." --request POST \
--data @payload.json \
https://vault.rocks/v1/auth/token/roles/zabbix
http://127.0.0.1:8200/v1/auth/token/roles/zabbix
$ cat payload.json
{
@ -599,7 +599,7 @@ Now, generate a token:
```plaintext
$ curl --header "X-Vault-Token: ..." --request POST \
https://vault.rocks/v1/auth/token/create/zabbix | jq
http://127.0.0.1:8200/v1/auth/token/create/zabbix | jq
{
...
"auth": {
@ -643,7 +643,7 @@ Or
```plaintext
$ curl --header "X-Vault-Token:..." --request POST \
--data @payload.json \
https://vault.rocks/v1/auth/approle/role/jenkins
http://127.0.0.1:8200/v1/auth/approle/role/jenkins
$ cat payload.json
{
@ -676,7 +676,7 @@ $ vault token create -orphan
```shell
$ curl --header "X-Vault-Token:..." --request POST \
--data '{ "no_parent": true }' \
https://vault.rocks/v1/auth/token/create-orphan | jq
http://127.0.0.1:8200/v1/auth/token/create-orphan | jq
```
@ -723,15 +723,15 @@ To revoke a specific token, call `/auth/token/revoke` endpoint. If you want to
# Revoke a specific token
$ curl --header "X-Vault-Token:..." --request POST \
--data '{ "token": "eeaf890e-4b0f-a687-4190-c75b1d6d70bc" }' \
https://vault.rocks/v1/auth/token/revoke
http://127.0.0.1:8200/v1/auth/token/revoke
# Revoke all secrets for database auth method
$ curl --header "X-Vault-Token:..." --request POST \
https://vault.rocks/v1/sys/leases/revoke-prefix/database/creds
http://127.0.0.1:8200/v1/sys/leases/revoke-prefix/database/creds
# Revoke all tokens
$ curl --header "X-Vault-Token:..." --request POST \
https://vault.rocks/v1/sys/leases/revoke-prefix/auth/token/create
http://127.0.0.1:8200/v1/sys/leases/revoke-prefix/auth/token/create
```
@ -776,7 +776,7 @@ Or
```shell
$ curl --header "X-Vault-Token:..." --request POST \
--data '{ "max_lease_ttl": 129600}' \
https://vault.rocks/v1/sys/mounts/database/tune
http://127.0.0.1:8200/v1/sys/mounts/database/tune
```

View file

@ -350,7 +350,7 @@ Now, create `admin` and `provisioner` policies:
```shell
# Create admin policy
$ curl --request PUT --header "X-Vault-Token: ..." --data @admin-payload.json \
https://vault.rocks/v1/sys/policy/admin
http://127.0.0.1:8200/v1/sys/policy/admin
$ cat admin-payload.json
{
@ -359,7 +359,7 @@ $ cat admin-payload.json
# Create provisioner policy
$ curl --request PUT --header "X-Vault-Token: ..." --data @provisioner-payload.json \
https://vault.rocks/v1/sys/policy/provisioner
http://127.0.0.1:8200/v1/sys/policy/provisioner
$ cat provisioner-payload.json
{
@ -424,7 +424,7 @@ path "sys/policy/*"
To list existing ACL policies, use the `/sys/policy` endpoint.
```shell
$ curl --request LIST --header "X-Vault-Token: ..." https://vault.rocks/v1/sys/policy | jq
$ curl --request LIST --header "X-Vault-Token: ..." http://127.0.0.1:8200/v1/sys/policy | jq
```
To read a specific policy, the endpoint path should be
@ -435,7 +435,7 @@ To read a specific policy, the endpoint path should be
Read the admin policy:
```plaintext
$ curl --request GET --header "X-Vault-Token: ..." https://vault.rocks/v1/sys/policy/admin | jq
$ curl --request GET --header "X-Vault-Token: ..." http://127.0.0.1:8200/v1/sys/policy/admin | jq
{
"name": "admin",
"rules": "# Mount and manage auth methods broadly across Vault\npath \"auth/*\"\n{\n ...",
@ -506,7 +506,7 @@ First, create a token attached to the `admin` policy:
```shell
$ curl --request POST --header "X-Vault-Token: ..." --data '{ "policies":"admin" }' \
https://vault.rocks/v1/auth/token/create
http://127.0.0.1:8200/v1/auth/token/create
{
"request_id": "870ef38c-1401-7beb-633c-ff09cca3db68",
"lease_id": "",
@ -540,7 +540,7 @@ $ cat payload.json
}
$ curl --request POST --header "X-Vault-Token: ..." --data @payload.json \
https://vault.rocks/v1/sys/capabilities
http://127.0.0.1:8200/v1/sys/capabilities
{
"capabilities": [
"create",
@ -577,7 +577,7 @@ the `sys/capabilities-self` endpoint.
```plaintext
$ curl --request POST --header "X-Vault-Token: ..." --data '{"path":"sys/auth/approle"}' \
https://vault.rocks/v1/sys/capabilities-self
http://127.0.0.1:8200/v1/sys/capabilities-self
```

View file

@ -207,7 +207,7 @@ $ cat payload.json
# API call to create a policy named, "apps"
$ curl --header "X-Vault-Token: ..." --request PUT --data @payload.json \
https://vault.rocks/v1/sys/policy/apps
http://127.0.0.1:8200/v1/sys/policy/apps
```
Response wrapping is per-request and is triggered by providing to Vault the
@ -235,7 +235,7 @@ $ curl --header "X-Vault-Wrap-TTL: 120" \
--header "X-Vault-Token: ..." \
--request POST \
--data '{"policies":["apps"]}' \
https://vault.rocks/v1/auth/token/create | jq
http://127.0.0.1:8200/v1/auth/token/create | jq
{
"request_id": "",
"lease_id": "",
@ -355,7 +355,7 @@ First, create a token with `default` policy:
# Create a new token default policy
$ curl --header "X-Vault-Token: ..." --request POST \
--data '{"policies": "default"}' \
https://vault.rocks/v1/auth/token/create | jq
http://127.0.0.1:8200/v1/auth/token/create | jq
{
...
"auth": {
@ -371,7 +371,7 @@ $ curl --header "X-Vault-Token: ..." --request POST \
# Verify that you can NOT read secret/dev using default token
$ curl --header "X-Vault-Token: 5fe14760-b0fd-22dc-403c-14a05003b67f" \
--request GET \
https://vault.rocks/v1/secret/dev | jq
http://127.0.0.1:8200/v1/secret/dev | jq
{
"errors": [
"permission denied"
@ -392,7 +392,7 @@ $ curl --header "X-Vault-Token: <WRAPPING_TOKEN>" \
```shell
$ curl --header "X-Vault-Token: e095129f-123a-4fef-c007-1f6a487cfa78" \
--request POST \
https://vault.rocks/v1/sys/wrapping/unwrap | jq
http://127.0.0.1:8200/v1/sys/wrapping/unwrap | jq
{
"request_id": "d704435d-c1cf-b8a3-52f6-ec50bc8246c4",
"lease_id": "",
@ -421,7 +421,7 @@ token.
```plaintext
$ curl --header "X-Vault-Token: af5f7682-aa55-fa37-5039-ee116df56600" \
--request GET \
https://vault.rocks/v1/secret/dev | jq
http://127.0.0.1:8200/v1/secret/dev | jq
{
"errors": []
}
@ -509,11 +509,11 @@ Write secrets under `cubbyhole/private/` path, and read it back.
# Write "token" to cubbyhole/private/access-token path
$ curl --header "X-Vault-Token: e095129f-123a-4fef-c007-1f6a487cfa78" --request POST \
--data '{"token": "123456789abcdefg87654321"}' \
https://vault.rocks/v1/cubbyhole/private/access-token
http://127.0.0.1:8200/v1/cubbyhole/private/access-token
# Read value from cubbyhole/private/access-token path
$ curl --header "X-Vault-Token: e095129f-123a-4fef-c007-1f6a487cfa78" --request GET \
https://vault.rocks/v1/cubbyhole/private/access-token | jq
http://127.0.0.1:8200/v1/cubbyhole/private/access-token | jq
{
"request_id": "b2ff9f04-7a72-7eb0-672f-225b5eb652df",
"lease_id": "",
@ -533,7 +533,7 @@ secret.
```shell
$ curl --header "X-Vault-Token: root" --request GET \
https://vault.rocks/v1/cubbyhole/private/access-token | jq
http://127.0.0.1:8200/v1/cubbyhole/private/access-token | jq
{
"errors": []
}

View file

@ -229,7 +229,7 @@ $ vault write database/config/postgresql plugin_name=postgresql-database-plugin
```shell
$ curl --header "X-Vault-Token: ..." --request POST --data @payload.json \
https://vault.rocks/v1/database/config/postgresql
http://127.0.0.1:8200/v1/database/config/postgresql
$ cat payload.json
{
@ -280,7 +280,7 @@ statement is passed as the role creation statement.
```shell
$ curl --header "X-Vault-Token: ..." --request POST --data @payload.json \
https://vault.rocks/v1/database/roles/readonly
http://127.0.0.1:8200/v1/database/roles/readonly
$ cat payload.json
{
@ -381,12 +381,12 @@ $ cat payload.json
# Create "apps" policy
$ curl --header "X-Vault-Token: ..." --request PUT \
--data @payload.json \
https://vault.rocks/v1/sys/policy/apps
http://127.0.0.1:8200/v1/sys/policy/apps
# Generate a new token with apps policy
$ curl --header "X-Vault-Token: ..." --request POST \
--data '{"policies": ["apps"]}' \
https://vault.rocks/v1/auth/token/create | jq
http://127.0.0.1:8200/v1/auth/token/create | jq
{
"request_id": "e1737bc8-7e51-3943-42a0-2dbd6cb40e3e",
"lease_id": "",
@ -418,7 +418,7 @@ demonstrates more sophisticated way of generating a token for your apps.
```shell
$ curl --header "X-Vault-Token: 1c97b03a-6098-31cf-9d8b-b404e52dcb4a" \
--request GET \
https://vault.rocks/v1/database/creds/readonly | jq
http://127.0.0.1:8200/v1/database/creds/readonly | jq
{
"request_id": "e0e5a6c1-5e69-5cf3-c9d2-020af192de36",
"lease_id": "database/creds/readonly/7aa462ab-98cb-fdcb-b226-f0a0d37644cc",

Some files were not shown because too many files have changed in this diff Show more