diff --git a/website/source/api/auth/approle/index.html.md b/website/source/api/auth/approle/index.html.md index c89ed8032e..2665a4ec4e 100644 --- a/website/source/api/auth/approle/index.html.md +++ b/website/source/api/auth/approle/index.html.md @@ -30,7 +30,7 @@ This endpoint returns a list the existing AppRoles in the method. $ curl \ --header "X-Vault-Token: ..." \ --request LIST \ - https://vault.rocks/v1/auth/approle/role + http://127.0.0.1:8200/v1/auth/approle/role ``` ### Sample Response @@ -116,7 +116,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/auth/approle/role/application1 + http://127.0.0.1:8200/v1/auth/approle/role/application1 ``` ## Read AppRole @@ -136,7 +136,7 @@ Reads the properties of an existing AppRole. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/auth/approle/role/application1 + http://127.0.0.1:8200/v1/auth/approle/role/application1 ``` ### Sample Response @@ -182,7 +182,7 @@ Deletes an existing AppRole from the method. $ curl \ --header "X-Vault-Token: ..." \ --request DELETE \ - https://vault.rocks/v1/auth/approle/role/application1 + http://127.0.0.1:8200/v1/auth/approle/role/application1 ``` ## Read AppRole Role ID @@ -202,7 +202,7 @@ Reads the RoleID of an existing AppRole. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/auth/approle/role/application1/role-id + http://127.0.0.1:8200/v1/auth/approle/role/application1/role-id ``` ### Sample Response @@ -249,7 +249,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/auth/approle/role/application1/role-id + http://127.0.0.1:8200/v1/auth/approle/role/application1/role-id ``` ### Sample Response @@ -306,7 +306,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/auth/approle/role/application1/secret-id + http://127.0.0.1:8200/v1/auth/approle/role/application1/secret-id ``` ### Sample Response @@ -345,7 +345,7 @@ This includes the accessors for "custom" SecretIDs as well. $ curl \ --header "X-Vault-Token: ..." \ --request LIST \ - https://vault.rocks/v1/auth/approle/role/application1/secret-id + http://127.0.0.1:8200/v1/auth/approle/role/application1/secret-id ``` ### Sample Response @@ -398,7 +398,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --payload @payload.json \ - https://vault.rocks/v1/auth/approle/role/application1/secret-id/lookup + http://127.0.0.1:8200/v1/auth/approle/role/application1/secret-id/lookup ``` ## Destroy AppRole Secret ID @@ -429,7 +429,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --payload @payload.json \ - https://vault.rocks/v1/auth/approle/role/application1/secret-id/destroy + http://127.0.0.1:8200/v1/auth/approle/role/application1/secret-id/destroy ``` ## Read AppRole Secret ID Accessor @@ -460,7 +460,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --payload @payload.json \ - https://vault.rocks/v1/auth/approle/role/application1/secret-id-accessor/lookup + http://127.0.0.1:8200/v1/auth/approle/role/application1/secret-id-accessor/lookup ``` ## Destroy AppRole Secret ID Accessor @@ -491,7 +491,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --payload @payload.json \ - https://vault.rocks/v1/auth/approle/role/application1/secret-id-accessor/destroy + http://127.0.0.1:8200/v1/auth/approle/role/application1/secret-id-accessor/destroy ``` ## Create Custom AppRole Secret ID @@ -531,7 +531,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/auth/approle/role/application1/custom-secret-id + http://127.0.0.1:8200/v1/auth/approle/role/application1/custom-secret-id ``` ### Sample Response @@ -582,7 +582,7 @@ AppRole (such as client IP CIDR) are also evaluated. $ curl \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/auth/approle/login + http://127.0.0.1:8200/v1/auth/approle/login ``` ### Sample Response diff --git a/website/source/api/auth/aws/index.html.md b/website/source/api/auth/aws/index.html.md index 187bb19d19..3fee3fcdc4 100644 --- a/website/source/api/auth/aws/index.html.md +++ b/website/source/api/auth/aws/index.html.md @@ -81,7 +81,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/auth/aws/config/client + http://127.0.0.1:8200/v1/auth/aws/config/client ``` ## Read Config @@ -97,7 +97,7 @@ Returns the previously configured AWS access credentials. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/auth/aws/config/client + http://127.0.0.1:8200/v1/auth/aws/config/client ``` ### Sample Response @@ -129,7 +129,7 @@ Deletes the previously configured AWS access credentials. $ curl \ --header "X-Vault-Token: ..." \ --request DELETE \ - https://vault.rocks/v1/auth/aws/config/client + http://127.0.0.1:8200/v1/auth/aws/config/client ``` ## Create Certificate Configuration @@ -170,7 +170,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/auth/aws/config/certificate/test-cert + http://127.0.0.1:8200/v1/auth/aws/config/certificate/test-cert ``` ## Read Certificate Configuration @@ -190,7 +190,7 @@ Returns the previously configured AWS public key. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/auth/aws/config/certificate/test-cert + http://127.0.0.1:8200/v1/auth/aws/config/certificate/test-cert ``` ### Sample Response @@ -218,7 +218,7 @@ Removes the previously configured AWS public key. $ curl \ --header "X-Vault-Token: ..." \ --request DELETE \ - https://vault.rocks/v1/auth/aws/config/certificate/test-cert + http://127.0.0.1:8200/v1/auth/aws/config/certificate/test-cert ``` ## List Certificate Configurations @@ -235,7 +235,7 @@ Lists all the AWS public certificates that are registered with the method. $ curl \ --header "X-Vault-Token: ..." \ --request LIST \ - https://vault.rocks/v1/auth/aws/config/certificates + http://127.0.0.1:8200/v1/auth/aws/config/certificates ``` ### Sample Response @@ -285,7 +285,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/auth/aws/config/sts/111122223333 + http://127.0.0.1:8200/v1/auth/aws/config/sts/111122223333 ``` ## Read STS Role @@ -307,7 +307,7 @@ Returns the previously configured STS role. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/auth/aws/config/sts/111122223333 + http://127.0.0.1:8200/v1/auth/aws/config/sts/111122223333 ``` ### Sample Response @@ -334,7 +334,7 @@ Lists all the AWS Account IDs for which an STS role is registered. $ curl \ --header "X-Vault-Token: ..." \ --request LIST \ - https://vault.rocks/v1/auth/aws/config/sts + http://127.0.0.1:8200/v1/auth/aws/config/sts ``` ### Sample Response @@ -364,7 +364,7 @@ Deletes a previously configured AWS account/STS role association. $ curl \ --header "X-Vault-Token: ..." \ --request DELETE \ - https://vault.rocks/v1/auth/aws/config/sts + http://127.0.0.1:8200/v1/auth/aws/config/sts ``` ## Configure Identity Whitelist Tidy Operation @@ -398,7 +398,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/auth/aws/config/tidy/identity-whitelist + http://127.0.0.1:8200/v1/auth/aws/config/tidy/identity-whitelist ``` ## Read Identity Whitelist Tidy Settings @@ -414,7 +414,7 @@ Returns the previously configured periodic whitelist tidying settings. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/auth/aws/config/tidy/identity-whitelist + http://127.0.0.1:8200/v1/auth/aws/config/tidy/identity-whitelist ``` ### Sample Response @@ -442,7 +442,7 @@ Deletes the previously configured periodic whitelist tidying settings. $ curl \ --header "X-Vault-Token: ..." \ --request DELETE \ - https://vault.rocks/v1/auth/aws/config/tidy/identity-whitelist + http://127.0.0.1:8200/v1/auth/aws/config/tidy/identity-whitelist ``` ## Configure Role Tag Blacklist Tidy Operation @@ -476,7 +476,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/auth/aws/config/tidy/roletag-blacklist + http://127.0.0.1:8200/v1/auth/aws/config/tidy/roletag-blacklist ``` ## Read Role Tag Blacklist Tidy Settings @@ -492,7 +492,7 @@ Returns the previously configured periodic blacklist tidying settings. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/auth/aws/config/tidy/roletag-blacklist + http://127.0.0.1:8200/v1/auth/aws/config/tidy/roletag-blacklist ``` ### Sample Response @@ -520,7 +520,7 @@ Deletes the previously configured periodic blacklist tidying settings. $ curl \ --header "X-Vault-Token: ..." \ --request DELETE \ - https://vault.rocks/v1/auth/aws/config/tidy/roletag-blacklist + http://127.0.0.1:8200/v1/auth/aws/config/tidy/roletag-blacklist ``` ## Create Role @@ -705,7 +705,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/auth/aws/role/dev-role + http://127.0.0.1:8200/v1/auth/aws/role/dev-role ``` ## Read Role @@ -725,7 +725,7 @@ Returns the previously registered role configuration. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/auth/aws/role/dev-role + http://127.0.0.1:8200/v1/auth/aws/role/dev-role ``` ### Sample Response @@ -761,7 +761,7 @@ Lists all the roles that are registered with the method. $ curl \ --header "X-Vault-Token: ..." \ --request LIST \ - https://vault.rocks/v1/auth/aws/roles + http://127.0.0.1:8200/v1/auth/aws/roles ``` ### Sample Response @@ -795,7 +795,7 @@ Deletes the previously registered role. $ curl \ --header "X-Vault-Token: ..." \ --request DELETE \ - https://vault.rocks/v1/auth/aws/role/dev-role + http://127.0.0.1:8200/v1/auth/aws/role/dev-role ``` ## Create Role Tags @@ -855,7 +855,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/auth/aws/role/dev-api-and-web-role/tag + http://127.0.0.1:8200/v1/auth/aws/role/dev-api-and-web-role/tag ``` ### Sample Response @@ -948,7 +948,7 @@ along with its RSA digest can be supplied to this endpoint. $ curl \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/auth/aws/login + http://127.0.0.1:8200/v1/auth/aws/login ``` ### Sample Response @@ -999,7 +999,7 @@ token. $ curl \ --header "X-Vault-Token: ..." \ --request POST \ - https://vault.rocks/v1/auth/aws/roletag-blacklist/djE6MDlWcDBxR3V5Qjg9OmE9YW1pLWZjZTNjNjk2OnA9ZGVmYXVsdCxwcm9kOmQ9ZmFsc2U6dD0zMDBoMG0wczp1UExLQ1F4cXNlZlJocnAxcW1WYTF3c1FWVVhYSkc4VVpQLwo= + http://127.0.0.1:8200/v1/auth/aws/roletag-blacklist/djE6MDlWcDBxR3V5Qjg9OmE9YW1pLWZjZTNjNjk2OnA9ZGVmYXVsdCxwcm9kOmQ9ZmFsc2U6dD0zMDBoMG0wczp1UExLQ1F4cXNlZlJocnAxcW1WYTF3c1FWVVhYSkc4VVpQLwo= ``` ### Read Role Tag Blacklist Information @@ -1021,7 +1021,7 @@ Returns the blacklist entry of a previously blacklisted role tag. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/auth/aws/roletag-blacklist/djE6MDlWcDBxR3V5Qjg9OmE9YW1pLWZjZTNjNjk2OnA9ZGVmYXVsdCxwcm9kOmQ9ZmFsc2U6dD0zMDBoMG0wczp1UExLQ1F4cXNlZlJocnAxcW1WYTF3c1FWVVhYSkc4VVpQLwo= + http://127.0.0.1:8200/v1/auth/aws/roletag-blacklist/djE6MDlWcDBxR3V5Qjg9OmE9YW1pLWZjZTNjNjk2OnA9ZGVmYXVsdCxwcm9kOmQ9ZmFsc2U6dD0zMDBoMG0wczp1UExLQ1F4cXNlZlJocnAxcW1WYTF3c1FWVVhYSkc4VVpQLwo= ``` @@ -1050,7 +1050,7 @@ Lists all the role tags that are blacklisted. $ curl \ --header "X-Vault-Token: ..." \ --request LIST \ - https://vault.rocks/v1/auth/aws/roletag-blacklist + http://127.0.0.1:8200/v1/auth/aws/roletag-blacklist ``` ### Sample Response @@ -1086,7 +1086,7 @@ Deletes a blacklisted role tag. $ curl \ --header "X-Vault-Token: ..." \ --request DELETE \ - https://vault.rocks/v1/auth/aws/roletag-blacklist/djE6MDlWcDBxR3V5Qjg9OmE9YW1pLWZjZTNjNjk2OnA9ZGVmYXVsdCxwcm9kOmQ9ZmFsc2U6dD0zMDBoMG0wczp1UExLQ1F4cXNlZlJocnAxcW1WYTF3c1FWVVhYSkc4VVpQLwo= + http://127.0.0.1:8200/v1/auth/aws/roletag-blacklist/djE6MDlWcDBxR3V5Qjg9OmE9YW1pLWZjZTNjNjk2OnA9ZGVmYXVsdCxwcm9kOmQ9ZmFsc2U6dD0zMDBoMG0wczp1UExLQ1F4cXNlZlJocnAxcW1WYTF3c1FWVVhYSkc4VVpQLwo= ``` ## Tidy Blacklist Tags @@ -1110,7 +1110,7 @@ Cleans up the entries in the blacklist based on expiration time on the entry and $ curl \ --header "X-Vault-Token: ..." \ --request POST \ - https://vault.rocks/v1/auth/aws/tidy/roletag-blacklist + http://127.0.0.1:8200/v1/auth/aws/tidy/roletag-blacklist ``` ### Read Identity Whitelist Information @@ -1133,7 +1133,7 @@ successful login. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/auth/aws/identity-whitelist/i-aab47d37 + http://127.0.0.1:8200/v1/auth/aws/identity-whitelist/i-aab47d37 ``` @@ -1165,7 +1165,7 @@ $ curl \ $ curl \ --header "X-Vault-Token: ..." \ --request LIST \ - https://vault.rocks/v1/auth/aws/roletag-blacklist + http://127.0.0.1:8200/v1/auth/aws/roletag-blacklist ``` ### Sample Response @@ -1200,7 +1200,7 @@ Deletes a cache of the successful login from an instance. $ curl \ --header "X-Vault-Token: ..." \ --request DELETE \ - https://vault.rocks/v1/auth/aws/identity-whitelist/i-aab47d37 + http://127.0.0.1:8200/v1/auth/aws/identity-whitelist/i-aab47d37 ``` ## Tidy Identity Whitelist Entries @@ -1224,5 +1224,5 @@ Cleans up the entries in the whitelist based on expiration time and $ curl \ --header "X-Vault-Token: ..." \ --request POST \ - https://vault.rocks/v1/auth/aws/tidy/identity-whitelist + http://127.0.0.1:8200/v1/auth/aws/tidy/identity-whitelist ``` diff --git a/website/source/api/auth/cert/index.html.md b/website/source/api/auth/cert/index.html.md index f1c6e4e998..9d94aef3dd 100644 --- a/website/source/api/auth/cert/index.html.md +++ b/website/source/api/auth/cert/index.html.md @@ -71,7 +71,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json - https://vault.rocks/v1/auth/cert/certs/test-ca + http://127.0.0.1:8200/v1/auth/cert/certs/test-ca ``` ## Read CA Certificate Role @@ -91,7 +91,7 @@ Gets information associated with the named role. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/auth/cert/certs/test-ca + http://127.0.0.1:8200/v1/auth/cert/certs/test-ca ``` ### Sample Response @@ -130,7 +130,7 @@ Lists configured certificate names. $ curl \ --header "X-Vault-Token: ..." \ --request LIST \ - https://vault.rocks/v1/auth/cert/certs + http://127.0.0.1:8200/v1/auth/cert/certs ### Sample Response @@ -169,7 +169,7 @@ Deletes the named role and CA cert from the method mount. $ curl \ --header "X-Vault-Token: ..." \ --request DELETE \ - https://vault.rocks/v1/auth/cert/certs/cert1 + http://127.0.0.1:8200/v1/auth/cert/certs/cert1 ``` ## Create CRL @@ -201,7 +201,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --date @payload.json \ - https://vault.rocks/v1/auth/cert/crls/custom-crl + http://127.0.0.1:8200/v1/auth/cert/crls/custom-crl ``` ## Read CRL @@ -223,7 +223,7 @@ arbitrary size, these are returned as strings. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/auth/cert/crls/custom-crl + http://127.0.0.1:8200/v1/auth/cert/crls/custom-crl ``` ### Sample Response @@ -261,7 +261,7 @@ Deletes the named CRL from the auth method mount. $ curl \ --header "X-Vault-Token: ..." \ --request DELETE \ - https://vault.rocks/v1/auth/cert/crls/cert1 + http://127.0.0.1:8200/v1/auth/cert/crls/cert1 ``` ## Configure TLS Certificate Method @@ -293,7 +293,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --date @payload.json \ - https://vault.rocks/v1/auth/cert/certs/cert1 + http://127.0.0.1:8200/v1/auth/cert/certs/cert1 ``` ## Login with TLS Certificate Method @@ -329,7 +329,7 @@ https://tools.ietf.org/html/rfc6125#section-2.3) $ curl \ --request POST \ --date @payload.json \ - https://vault.rocks/v1/auth/cert/login + http://127.0.0.1:8200/v1/auth/cert/login ``` ### Sample Response diff --git a/website/source/api/auth/gcp/index.html.md b/website/source/api/auth/gcp/index.html.md index a38ec10ad4..bd5097e367 100644 --- a/website/source/api/auth/gcp/index.html.md +++ b/website/source/api/auth/gcp/index.html.md @@ -60,7 +60,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/auth/gcp/config + http://127.0.0.1:8200/v1/auth/gcp/config ``` ## Read Config @@ -76,7 +76,7 @@ Returns the previously configured config, including credentials. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/auth/gcp/config + http://127.0.0.1:8200/v1/auth/gcp/config ``` ### Sample Response @@ -110,7 +110,7 @@ Deletes the previously configured GCP config and credentials. $ curl \ --header "X-Vault-Token: ..." \ --request DELETE \ - https://vault.rocks/v1/auth/gcp/config + http://127.0.0.1:8200/v1/auth/gcp/config ``` ## Create Role @@ -226,7 +226,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/auth/gcp/role/dev-role + http://127.0.0.1:8200/v1/auth/gcp/role/dev-role ``` ## Edit Service Accounts For IAM Role @@ -268,7 +268,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/auth/gcp/role/dev-role + http://127.0.0.1:8200/v1/auth/gcp/role/dev-role ``` ## Edit Labels For GCE Role @@ -308,7 +308,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/auth/gcp/role/dev-role + http://127.0.0.1:8200/v1/auth/gcp/role/dev-role ``` ## Read Role @@ -328,7 +328,7 @@ Returns the previously registered role configuration. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/auth/gcp/role/dev-role + http://127.0.0.1:8200/v1/auth/gcp/role/dev-role ``` ### Sample Response @@ -372,7 +372,7 @@ Lists all the roles that are registered with the plugin. $ curl \ --header "X-Vault-Token: ..." \ --request LIST \ - https://vault.rocks/v1/auth/gcp/roles + http://127.0.0.1:8200/v1/auth/gcp/roles ``` ### Sample Response @@ -407,7 +407,7 @@ Deletes the previously registered role. $ curl \ --header "X-Vault-Token: ..." \ --request DELETE \ - https://vault.rocks/v1/auth/gcp/role/dev-role + http://127.0.0.1:8200/v1/auth/gcp/role/dev-role ``` ## Login @@ -445,7 +445,7 @@ entity and then authorizes the entity for the given role. $ curl \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/auth/gcp/login + http://127.0.0.1:8200/v1/auth/gcp/login ``` ### Sample Response diff --git a/website/source/api/auth/github/index.html.md b/website/source/api/auth/github/index.html.md index d3df4145d8..975aed9801 100644 --- a/website/source/api/auth/github/index.html.md +++ b/website/source/api/auth/github/index.html.md @@ -50,7 +50,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/auth/github/config + http://127.0.0.1:8200/v1/auth/github/config ``` ## Read Configuration @@ -66,7 +66,7 @@ Reads the GitHub configuration. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/auth/github/config + http://127.0.0.1:8200/v1/auth/github/config ``` ### Sample Response @@ -112,7 +112,7 @@ Login using GitHub access token. ``` $ curl \ --request POST \ - https://vault.rocks/v1/auth/github/login + http://127.0.0.1:8200/v1/auth/github/login ``` ### Sample Response diff --git a/website/source/api/auth/kubernetes/index.html.md b/website/source/api/auth/kubernetes/index.html.md index 692b56f258..3bea3836e2 100644 --- a/website/source/api/auth/kubernetes/index.html.md +++ b/website/source/api/auth/kubernetes/index.html.md @@ -56,7 +56,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/auth/kubernetes/config + http://127.0.0.1:8200/v1/auth/kubernetes/config ``` ## Read Config @@ -72,7 +72,7 @@ Returns the previously configured config, including credentials. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/auth/kubernetes/config + http://127.0.0.1:8200/v1/auth/kubernetes/config ``` ### Sample Response @@ -138,7 +138,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/auth/kubernetes/role/dev-role + http://127.0.0.1:8200/v1/auth/kubernetes/role/dev-role ``` ## Read Role @@ -157,7 +157,7 @@ Returns the previously registered role configuration. ```text $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/auth/kubernetes/role/dev-role + http://127.0.0.1:8200/v1/auth/kubernetes/role/dev-role ``` ### Sample Response @@ -193,7 +193,7 @@ Lists all the roles that are registered with the auth method. $ curl \ --header "X-Vault-Token: ..." \ --request LIST \ - https://vault.rocks/v1/auth/kubernetes/role + http://127.0.0.1:8200/v1/auth/kubernetes/role ``` ### Sample Response @@ -227,7 +227,7 @@ Deletes the previously registered role. $ curl \ --header "X-Vault-Token: ..." \ --request DELETE \ - https://vault.rocks/v1/auth/kubernetes/role/dev-role + http://127.0.0.1:8200/v1/auth/kubernetes/role/dev-role ``` ## Login @@ -263,7 +263,7 @@ entity and then authorizes the entity for the given role. $ curl \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/auth/kubernetes/login + http://127.0.0.1:8200/v1/auth/kubernetes/login ``` ### Sample Response diff --git a/website/source/api/auth/ldap/index.html.md b/website/source/api/auth/ldap/index.html.md index b8342ec733..ee0a908f3a 100644 --- a/website/source/api/auth/ldap/index.html.md +++ b/website/source/api/auth/ldap/index.html.md @@ -76,7 +76,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/auth/ldap/config + http://127.0.0.1:8200/v1/auth/ldap/config ``` ### Sample Payload @@ -112,7 +112,7 @@ This endpoint retrieves the LDAP configuration for the auth method. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/auth/ldap/config + http://127.0.0.1:8200/v1/auth/ldap/config ``` ### Sample Response @@ -160,7 +160,7 @@ This endpoint returns a list of existing groups in the method. $ curl \ --header "X-Vault-Token: ..." \ --request LIST \ - https://vault.rocks/v1/auth/ldap/groups + http://127.0.0.1:8200/v1/auth/ldap/groups ``` ### Sample Response @@ -199,7 +199,7 @@ This endpoint returns the policies associated with a LDAP group. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/auth/ldap/groups/admins + http://127.0.0.1:8200/v1/auth/ldap/groups/admins ``` ### Sample Response @@ -248,7 +248,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/auth/ldap/groups/admins + http://127.0.0.1:8200/v1/auth/ldap/groups/admins ``` ## Delete LDAP Group @@ -269,7 +269,7 @@ This endpoint deletes the LDAP group and policy association. $ curl \ --header "X-Vault-Token: ..." \ --request DELETE \ - https://vault.rocks/v1/auth/ldap/groups/admins + http://127.0.0.1:8200/v1/auth/ldap/groups/admins ``` ## List LDAP Users @@ -286,7 +286,7 @@ This endpoint returns a list of existing users in the method. $ curl \ --header "X-Vault-Token: ..." \ --request LIST \ - https://vault.rocks/v1/auth/ldap/users + http://127.0.0.1:8200/v1/auth/ldap/users ``` ### Sample Response @@ -325,7 +325,7 @@ This endpoint returns the policies associated with a LDAP user. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/auth/ldap/users/mitchellh + http://127.0.0.1:8200/v1/auth/ldap/users/mitchellh ``` ### Sample Response @@ -377,7 +377,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/auth/ldap/users/mitchellh + http://127.0.0.1:8200/v1/auth/ldap/users/mitchellh ``` ## Delete LDAP User @@ -398,7 +398,7 @@ This endpoint deletes the LDAP user and policy association. $ curl \ --header "X-Vault-Token: ..." \ --request DELETE \ - https://vault.rocks/v1/auth/ldap/users/mitchellh + http://127.0.0.1:8200/v1/auth/ldap/users/mitchellh ``` ## Login with LDAP User @@ -428,7 +428,7 @@ This endpoint allows you to log in with LDAP credentials $ curl \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/auth/ldap/login/mitchellh + http://127.0.0.1:8200/v1/auth/ldap/login/mitchellh ``` ### Sample Response diff --git a/website/source/api/auth/okta/index.html.md b/website/source/api/auth/okta/index.html.md index bf64eb491e..7677c41151 100644 --- a/website/source/api/auth/okta/index.html.md +++ b/website/source/api/auth/okta/index.html.md @@ -57,7 +57,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/auth/okta/config + http://127.0.0.1:8200/v1/auth/okta/config ``` ## Read Configuration @@ -73,7 +73,7 @@ Reads the Okta configuration. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/auth/okta/config + http://127.0.0.1:8200/v1/auth/okta/config ``` ### Sample Response @@ -109,7 +109,7 @@ List the users configurated in the Okta method. $ curl \ --header "X-Vault-Token: ..." \ --request LIST \ - https://vault.rocks/v1/auth/okta/users + http://127.0.0.1:8200/v1/auth/okta/users ``` ### Sample Response @@ -161,7 +161,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/auth/okta/users/fred + http://127.0.0.1:8200/v1/auth/okta/users/fred ``` ## Read User @@ -181,7 +181,7 @@ Reads the properties of an existing username. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/auth/okta/users/test-user + http://127.0.0.1:8200/v1/auth/okta/users/test-user ``` ### Sample Response @@ -221,7 +221,7 @@ Deletes an existing username from the method. $ curl \ --header "X-Vault-Token: ..." \ --request DELETE \ - https://vault.rocks/v1/auth/okta/users/test-user + http://127.0.0.1:8200/v1/auth/okta/users/test-user ``` ## List Groups @@ -238,7 +238,7 @@ List the groups configurated in the Okta method. $ curl \ --header "X-Vault-Token: ..." \ --request LIST \ - https://vault.rocks/v1/auth/okta/groups + http://127.0.0.1:8200/v1/auth/okta/groups ``` ### Sample Response @@ -289,7 +289,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/auth/okta/groups/admins + http://127.0.0.1:8200/v1/auth/okta/groups/admins ``` ## Read Group @@ -309,7 +309,7 @@ Reads the properties of an existing group. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/auth/okta/groups/admins + http://127.0.0.1:8200/v1/auth/okta/groups/admins ``` ### Sample Response @@ -348,7 +348,7 @@ Deletes an existing group from the method. $ curl \ --header "X-Vault-Token: ..." \ --request DELETE \ - https://vault.rocks/v1/auth/okta/users/test-user + http://127.0.0.1:8200/v1/auth/okta/users/test-user ``` ## Login @@ -378,7 +378,7 @@ Login with the username and password. $ curl \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/auth/okta/login/fred + http://127.0.0.1:8200/v1/auth/okta/login/fred ``` ### Sample Response diff --git a/website/source/api/auth/radius/index.html.md b/website/source/api/auth/radius/index.html.md index 255dc8bfe2..7475e616c0 100644 --- a/website/source/api/auth/radius/index.html.md +++ b/website/source/api/auth/radius/index.html.md @@ -56,7 +56,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/auth/radius/config + http://127.0.0.1:8200/v1/auth/radius/config ``` ## Register User @@ -87,7 +87,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/auth/radius/users/test-user + http://127.0.0.1:8200/v1/auth/radius/users/test-user ``` ## Read User @@ -107,7 +107,7 @@ Reads the properties of an existing username. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/auth/radius/users/test-user + http://127.0.0.1:8200/v1/auth/radius/users/test-user ``` ### Sample Response @@ -143,7 +143,7 @@ Deletes an existing username from the method. $ curl \ --header "X-Vault-Token: ..." \ --request DELETE \ - https://vault.rocks/v1/auth/radius/users/test-user + http://127.0.0.1:8200/v1/auth/radius/users/test-user ``` ## List Users @@ -160,7 +160,7 @@ List the users registered with the method. $ curl \ --header "X-Vault-Token: ..." \ --request LIST \ - https://vault.rocks/v1/auth/radius/users + http://127.0.0.1:8200/v1/auth/radius/users ``` ### Sample Response @@ -210,7 +210,7 @@ Login with the username and password. $ curl \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/auth/radius/login/test-user + http://127.0.0.1:8200/v1/auth/radius/login/test-user ``` ### Sample Response diff --git a/website/source/api/auth/token/index.html.md b/website/source/api/auth/token/index.html.md index aacae7f005..b670b9b45d 100644 --- a/website/source/api/auth/token/index.html.md +++ b/website/source/api/auth/token/index.html.md @@ -28,7 +28,7 @@ large numbers of tokens and their associated leases at once. $ curl \ --header "X-Vault-Token: ..." \ --request LIST \ - https://vault.rocks/v1/auth/token/accessors + http://127.0.0.1:8200/v1/auth/token/accessors ``` ### Sample Response @@ -123,7 +123,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/auth/token/create + http://127.0.0.1:8200/v1/auth/token/create ``` ### Sample Response @@ -172,7 +172,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/auth/token/lookup + http://127.0.0.1:8200/v1/auth/token/lookup ``` ### Sample Response @@ -209,7 +209,7 @@ Returns information about the current client token. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/auth/token/lookup-self + http://127.0.0.1:8200/v1/auth/token/lookup-self ``` ### Sample Response @@ -260,7 +260,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/auth/token/lookup-accessor + http://127.0.0.1:8200/v1/auth/token/lookup-accessor ``` ### Sample Response @@ -321,7 +321,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/auth/token/renew + http://127.0.0.1:8200/v1/auth/token/renew ``` ### Sample Response @@ -373,7 +373,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/auth/token/renew-self + http://127.0.0.1:8200/v1/auth/token/renew-self ``` ### Sample Response @@ -423,7 +423,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/auth/token/revoke + http://127.0.0.1:8200/v1/auth/token/revoke ``` ## Revoke a Token (Self) @@ -441,7 +441,7 @@ revoked, all dynamic secrets generated with it are also revoked. $ curl \ --header "X-Vault-Token: ..." \ --request POST \ - https://vault.rocks/v1/auth/token/revoke-self + http://127.0.0.1:8200/v1/auth/token/revoke-self ``` ## Revoke a Token Accessor @@ -473,7 +473,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/auth/token/revoke-accessor + http://127.0.0.1:8200/v1/auth/token/revoke-accessor ``` ## Revoke Token and Orphan Children @@ -507,7 +507,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/auth/token/revoke-orphan + http://127.0.0.1:8200/v1/auth/token/revoke-orphan ``` ## Read Token Role @@ -527,7 +527,7 @@ Fetches the named role configuration. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/auth/token/roles/nomad + http://127.0.0.1:8200/v1/auth/token/roles/nomad ``` ### Sample Response @@ -568,7 +568,7 @@ List available token roles. $ curl \ --header "X-Vault-Token: ..." \ --request LIST - https://vault.rocks/v1/auth/token/roles + http://127.0.0.1:8200/v1/auth/token/roles ``` ### Sample Response @@ -653,7 +653,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST --data @payload.json - https://vault.rocks/v1/auth/token/roles/nomad + http://127.0.0.1:8200/v1/auth/token/roles/nomad ``` ## Delete Token Role @@ -674,7 +674,7 @@ This endpoint deletes the named token role. $ curl \ --header "X-Vault-Token: ..." \ --request DELETE \ - https://vault.rocks/v1/auth/token/roles/admins + http://127.0.0.1:8200/v1/auth/token/roles/admins ``` ## Tidy Tokens @@ -694,5 +694,5 @@ storage method so should be used sparingly. $ curl \ --header "X-Vault-Token: ..." \ --request POST \ - https://vault.rocks/v1/auth/token/tidy + http://127.0.0.1:8200/v1/auth/token/tidy ``` diff --git a/website/source/api/auth/userpass/index.html.md b/website/source/api/auth/userpass/index.html.md index 3bb0a53c87..b7ecad4042 100644 --- a/website/source/api/auth/userpass/index.html.md +++ b/website/source/api/auth/userpass/index.html.md @@ -51,7 +51,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/auth/userpass/users/mitchellh + http://127.0.0.1:8200/v1/auth/userpass/users/mitchellh ``` ## Read User @@ -67,7 +67,7 @@ Reads the properties of an existing username. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/auth/userpass/users/mitchellh + http://127.0.0.1:8200/v1/auth/userpass/users/mitchellh ``` ### Sample Response @@ -105,7 +105,7 @@ This endpoint deletes the user from the method. $ curl \ --header "X-Vault-Token: ..." \ --request DELETE \ - https://vault.rocks/v1/auth/userpass/users/mitchellh + http://127.0.0.1:8200/v1/auth/userpass/users/mitchellh ``` ## Update Password on User @@ -136,7 +136,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/auth/userpass/users/mitchellh/password + http://127.0.0.1:8200/v1/auth/userpass/users/mitchellh/password ``` ## Update Policies on User @@ -167,7 +167,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/auth/userpass/users/mitchellh/policies + http://127.0.0.1:8200/v1/auth/userpass/users/mitchellh/policies ``` ## List Users @@ -184,7 +184,7 @@ List available userpass users. $ curl \ --header "X-Vault-Token: ..." \ --request LIST - https://vault.rocks/v1/auth/userpass/users + http://127.0.0.1:8200/v1/auth/userpass/users ``` ### Sample Response @@ -227,7 +227,7 @@ Login with the username and password. $ curl \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/auth/userpass/login/mitchellh + http://127.0.0.1:8200/v1/auth/userpass/login/mitchellh ``` ### Sample Response diff --git a/website/source/api/secret/aws/index.html.md b/website/source/api/secret/aws/index.html.md index 0736841780..666a5f93f1 100644 --- a/website/source/api/secret/aws/index.html.md +++ b/website/source/api/secret/aws/index.html.md @@ -77,7 +77,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/aws/config/root + http://127.0.0.1:8200/v1/aws/config/root ``` ## Configure Lease @@ -114,7 +114,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/aws/config/lease + http://127.0.0.1:8200/v1/aws/config/lease ``` ## Read Lease @@ -130,7 +130,7 @@ This endpoint returns the current lease settings for the AWS secrets engine. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/aws/config/lease + http://127.0.0.1:8200/v1/aws/config/lease ``` ### Sample Response @@ -172,7 +172,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/aws/roles/example-role + http://127.0.0.1:8200/v1/aws/roles/example-role ``` ### Sample Payloads @@ -212,7 +212,7 @@ exist, a 404 is returned. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/aws/roles/example-role + http://127.0.0.1:8200/v1/aws/roles/example-role ``` ### Sample Responses @@ -251,7 +251,7 @@ This endpoint lists all existing roles in the secrets engine. $ curl --header "X-Vault-Token: ..." \ --request LIST \ - https://vault.rocks/v1/aws/roles + http://127.0.0.1:8200/v1/aws/roles ``` ### Sample Response @@ -286,7 +286,7 @@ exist, a 404 is returned. $ curl \ --header "X-Vault-Token: ..." \ --request DELETE \ - https://vault.rocks/v1/aws/roles/example-role + http://127.0.0.1:8200/v1/aws/roles/example-role ``` ## Generate IAM Credentials @@ -308,7 +308,7 @@ role must be created before queried. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/aws/creds/example-role + http://127.0.0.1:8200/v1/aws/creds/example-role ``` ### Sample Response @@ -361,7 +361,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/aws/sts/example-role + http://127.0.0.1:8200/v1/aws/sts/example-role ``` ### Sample Response diff --git a/website/source/api/secret/cassandra/index.html.md b/website/source/api/secret/cassandra/index.html.md index a4db9f0e72..3d094981cb 100644 --- a/website/source/api/secret/cassandra/index.html.md +++ b/website/source/api/secret/cassandra/index.html.md @@ -105,7 +105,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/cassandra/config/connection + http://127.0.0.1:8200/v1/cassandra/config/connection ``` ## Create Role @@ -156,7 +156,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/cassandra/roles/my-role + http://127.0.0.1:8200/v1/cassandra/roles/my-role ``` ## Read Role @@ -177,7 +177,7 @@ This endpoint queries the role definition. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/cassandra/roles/my-role + http://127.0.0.1:8200/v1/cassandra/roles/my-role ``` ### Sample Response @@ -212,7 +212,7 @@ This endpoint deletes the role definition. $ curl \ --header "X-Vault-Token: ..." \ --request DELETE \ - https://vault.rocks/v1/cassandra/roles/my-role + http://127.0.0.1:8200/v1/cassandra/roles/my-role ``` ## Generate Credentials @@ -234,7 +234,7 @@ role. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/cassandra/creds/my-role + http://127.0.0.1:8200/v1/cassandra/creds/my-role ``` ### Sample Response diff --git a/website/source/api/secret/consul/index.html.md b/website/source/api/secret/consul/index.html.md index d3c6bbc6cf..d158063fcb 100644 --- a/website/source/api/secret/consul/index.html.md +++ b/website/source/api/secret/consul/index.html.md @@ -53,7 +53,7 @@ $ curl \ --request POST \ --header "X-Vault-Token: ..." \ --data @payload.json \ - https://vault.rocks/v1/consul/config/access + http://127.0.0.1:8200/v1/consul/config/access ``` ## Create/Update Role @@ -108,7 +108,7 @@ $ curl \ --request POST \ --header "X-Vault-Token: ..." \ --data @payload.json \ - https://vault.rocks/v1/consul/roles/example-role + http://127.0.0.1:8200/v1/consul/roles/example-role ``` ## Read Role @@ -130,7 +130,7 @@ If no role exists with that name, a 404 is returned. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/consul/roles/example-role + http://127.0.0.1:8200/v1/consul/roles/example-role ``` ### Sample Response @@ -159,7 +159,7 @@ This endpoint lists all existing roles in the secrets engine. $ curl \ --header "X-Vault-Token: ..." \ --request LIST \ - https://vault.rocks/v1/consul/roles + http://127.0.0.1:8200/v1/consul/roles ``` ### Sample Response @@ -194,7 +194,7 @@ not exist, this endpoint will still return a successful response. $ curl \ --request DELETE \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/consul/roles/example-role + http://127.0.0.1:8200/v1/consul/roles/example-role ``` ## Generate Credential @@ -216,7 +216,7 @@ definition. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/consul/creds/example-role + http://127.0.0.1:8200/v1/consul/creds/example-role ``` ### Sample Response diff --git a/website/source/api/secret/cubbyhole/index.html.md b/website/source/api/secret/cubbyhole/index.html.md index ee86fe04f5..34970ee635 100644 --- a/website/source/api/secret/cubbyhole/index.html.md +++ b/website/source/api/secret/cubbyhole/index.html.md @@ -35,7 +35,7 @@ This endpoint retrieves the secret at the specified location. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/cubbyhole/my-secret + http://127.0.0.1:8200/v1/cubbyhole/my-secret ``` ### Sample Response @@ -73,7 +73,7 @@ not return a value. The values themselves are not accessible via this command. $ curl \ --header "X-Vault-Token: ..." \ --request LIST \ - https://vault.rocks/v1/cubbyhole/my-secret + http://127.0.0.1:8200/v1/cubbyhole/my-secret ``` ### Sample Response @@ -129,7 +129,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/cubbyhole/my-secret + http://127.0.0.1:8200/v1/cubbyhole/my-secret ``` ## Delete Secret @@ -151,5 +151,5 @@ This endpoint deletes the secret at the specified location. $ curl \ --header "X-Vault-Token: ..." \ --request DELETE \ - https://vault.rocks/v1/cubbyhole/my-secret + http://127.0.0.1:8200/v1/cubbyhole/my-secret ``` diff --git a/website/source/api/secret/databases/cassandra.html.md b/website/source/api/secret/databases/cassandra.html.md index 08515e6b1d..efb3e7aba3 100644 --- a/website/source/api/secret/databases/cassandra.html.md +++ b/website/source/api/secret/databases/cassandra.html.md @@ -95,7 +95,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/cassandra/config/connection + http://127.0.0.1:8200/v1/cassandra/config/connection ``` ## Statements diff --git a/website/source/api/secret/databases/hanadb.html.md b/website/source/api/secret/databases/hanadb.html.md index 43ae3059ef..cff0004958 100644 --- a/website/source/api/secret/databases/hanadb.html.md +++ b/website/source/api/secret/databases/hanadb.html.md @@ -55,7 +55,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/database/config/hana + http://127.0.0.1:8200/v1/database/config/hana ``` ## Statements diff --git a/website/source/api/secret/databases/index.html.md b/website/source/api/secret/databases/index.html.md index 6c3dcee452..ac8b8d683b 100644 --- a/website/source/api/secret/databases/index.html.md +++ b/website/source/api/secret/databases/index.html.md @@ -60,7 +60,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/database/config/mysql + http://127.0.0.1:8200/v1/database/config/mysql ``` ## Read Connection @@ -82,7 +82,7 @@ This endpoint returns the configuration settings for a connection. $ curl \ --header "X-Vault-Token: ..." \ --request GET \ - https://vault.rocks/v1/database/config/mysql + http://127.0.0.1:8200/v1/database/config/mysql ``` ### Sample Response @@ -116,7 +116,7 @@ are returned, not any values. $ curl \ --header "X-Vault-Token: ..." \ --request LIST \ - https://vault.rocks/v1/database/config + http://127.0.0.1:8200/v1/database/config ``` ### Sample Response @@ -148,7 +148,7 @@ This endpoint deletes a connection. $ curl \ --header "X-Vault-Token: ..." \ --request DELETE \ - https://vault.rocks/v1/database/config/mysql + http://127.0.0.1:8200/v1/database/config/mysql ``` ## Reset Connection @@ -171,7 +171,7 @@ with the configuration stored in the barrier. $ curl \ --header "X-Vault-Token: ..." \ --request POST \ - https://vault.rocks/v1/database/reset/mysql + http://127.0.0.1:8200/v1/database/reset/mysql ``` ## Create Role @@ -236,7 +236,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/database/roles/my-role + http://127.0.0.1:8200/v1/database/roles/my-role ``` ## Read Role @@ -257,7 +257,7 @@ This endpoint queries the role definition. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/database/roles/my-role + http://127.0.0.1:8200/v1/database/roles/my-role ``` ### Sample Response @@ -291,7 +291,7 @@ returned, not any values. $ curl \ --header "X-Vault-Token: ..." \ --request LIST \ - https://vault.rocks/v1/database/roles + http://127.0.0.1:8200/v1/database/roles ``` ### Sample Response @@ -327,7 +327,7 @@ This endpoint deletes the role definition. $ curl \ --header "X-Vault-Token: ..." \ --request DELETE \ - https://vault.rocks/v1/database/roles/my-role + http://127.0.0.1:8200/v1/database/roles/my-role ``` ## Generate Credentials @@ -349,7 +349,7 @@ role. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/database/creds/my-role + http://127.0.0.1:8200/v1/database/creds/my-role ``` ### Sample Response diff --git a/website/source/api/secret/databases/mongodb.html.md b/website/source/api/secret/databases/mongodb.html.md index 50953ed217..6f16df18e7 100644 --- a/website/source/api/secret/databases/mongodb.html.md +++ b/website/source/api/secret/databases/mongodb.html.md @@ -50,7 +50,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/database/config/mongodb + http://127.0.0.1:8200/v1/database/config/mongodb ``` ## Statements diff --git a/website/source/api/secret/databases/mssql.html.md b/website/source/api/secret/databases/mssql.html.md index 0a30e34e83..441e8b4514 100644 --- a/website/source/api/secret/databases/mssql.html.md +++ b/website/source/api/secret/databases/mssql.html.md @@ -55,7 +55,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/database/config/mssql + http://127.0.0.1:8200/v1/database/config/mssql ``` ## Statements diff --git a/website/source/api/secret/databases/mysql-maria.html.md b/website/source/api/secret/databases/mysql-maria.html.md index 2e14c7332e..bb7aa5e36e 100644 --- a/website/source/api/secret/databases/mysql-maria.html.md +++ b/website/source/api/secret/databases/mysql-maria.html.md @@ -55,7 +55,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/database/config/mysql + http://127.0.0.1:8200/v1/database/config/mysql ``` ## Statements diff --git a/website/source/api/secret/databases/oracle.html.md b/website/source/api/secret/databases/oracle.html.md index 24436f2ef8..5f72f79e66 100644 --- a/website/source/api/secret/databases/oracle.html.md +++ b/website/source/api/secret/databases/oracle.html.md @@ -55,7 +55,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/database/config/oracle + http://127.0.0.1:8200/v1/database/config/oracle ``` ## Statements diff --git a/website/source/api/secret/databases/postgresql.html.md b/website/source/api/secret/databases/postgresql.html.md index 5a1876bc9b..726d90709f 100644 --- a/website/source/api/secret/databases/postgresql.html.md +++ b/website/source/api/secret/databases/postgresql.html.md @@ -55,7 +55,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/database/config/postgresql + http://127.0.0.1:8200/v1/database/config/postgresql ``` ## Statements diff --git a/website/source/api/secret/identity/entity-alias.html.md b/website/source/api/secret/identity/entity-alias.html.md index 2123526ed0..e6f33c7d4a 100644 --- a/website/source/api/secret/identity/entity-alias.html.md +++ b/website/source/api/secret/identity/entity-alias.html.md @@ -53,7 +53,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/identity/entity-alias + http://127.0.0.1:8200/v1/identity/entity-alias ``` ### Sample Response @@ -84,7 +84,7 @@ This endpoint queries the entity alias by its identifier. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/identity/entity-alias/id/34982d3d-e3ce-5d8b-6e5f-b9bb34246c31 + http://127.0.0.1:8200/v1/identity/entity-alias/id/34982d3d-e3ce-5d8b-6e5f-b9bb34246c31 ``` ### Sample Response @@ -154,7 +154,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/identity/entity-alias/id/34982d3d-e3ce-5d8b-6e5f-b9bb34246c31 + http://127.0.0.1:8200/v1/identity/entity-alias/id/34982d3d-e3ce-5d8b-6e5f-b9bb34246c31 ``` ### Sample Response @@ -186,7 +186,7 @@ This endpoint deletes an alias from its corresponding entity. $ curl \ --header "X-Vault-Token: ..." \ --request DELETE \ - https://vault.rocks/v1/identity/entity-alias/id/34982d3d-e3ce-5d8b-6e5f-b9bb34246c31 + http://127.0.0.1:8200/v1/identity/entity-alias/id/34982d3d-e3ce-5d8b-6e5f-b9bb34246c31 ``` ### List Entity Aliases by ID @@ -204,7 +204,7 @@ This endpoint returns a list of available entity aliases by their identifiers. $ curl \ --header "X-Vault-Token: ..." \ --request LIST \ - https://vault.rocks/v1/identity/entity-alias/id + http://127.0.0.1:8200/v1/identity/entity-alias/id ``` ### Sample Response diff --git a/website/source/api/secret/identity/entity.html.md b/website/source/api/secret/identity/entity.html.md index 49bda424df..fc55c77abd 100644 --- a/website/source/api/secret/identity/entity.html.md +++ b/website/source/api/secret/identity/entity.html.md @@ -45,7 +45,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/identity/entity + http://127.0.0.1:8200/v1/identity/entity ``` ### Sample Response @@ -76,7 +76,7 @@ This endpoint queries the entity by its identifier. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/identity/entity/id/8d6a45e5-572f-8f13-d226-cd0d1ec57297 + http://127.0.0.1:8200/v1/identity/entity/id/8d6a45e5-572f-8f13-d226-cd0d1ec57297 ``` ### Sample Response @@ -141,7 +141,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/identity/entity/id/8d6a45e5-572f-8f13-d226-cd0d1ec57297 + http://127.0.0.1:8200/v1/identity/entity/id/8d6a45e5-572f-8f13-d226-cd0d1ec57297 ``` ### Sample Response @@ -173,7 +173,7 @@ This endpoint deletes an entity and all its associated aliases. $ curl \ --header "X-Vault-Token: ..." \ --request DELETE \ - https://vault.rocks/v1/identity/entity/id/8d6a45e5-572f-8f13-d226-cd0d1ec57297 + http://127.0.0.1:8200/v1/identity/entity/id/8d6a45e5-572f-8f13-d226-cd0d1ec57297 ``` ## List Entities by ID @@ -191,7 +191,7 @@ This endpoint returns a list of available entities by their identifiers. $ curl \ --header "X-Vault-Token: ..." \ --request LIST \ - https://vault.rocks/v1/identity/entity/id + http://127.0.0.1:8200/v1/identity/entity/id ``` ### Sample Response diff --git a/website/source/api/secret/identity/group-alias.html.md b/website/source/api/secret/identity/group-alias.html.md index e57f38bc24..4cbfb45402 100644 --- a/website/source/api/secret/identity/group-alias.html.md +++ b/website/source/api/secret/identity/group-alias.html.md @@ -44,7 +44,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/identity/group-alias + http://127.0.0.1:8200/v1/identity/group-alias ``` ### Sample Response @@ -75,7 +75,7 @@ This endpoint queries the group alias by its identifier. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/identity/group-alias/id/ca726050-d8ac-6f1f-4210-3b5c5b613824 + http://127.0.0.1:8200/v1/identity/group-alias/id/ca726050-d8ac-6f1f-4210-3b5c5b613824 ``` ### Sample Response @@ -115,7 +115,7 @@ This endpoint deletes a group alias. $ curl \ --header "X-Vault-Token: ..." \ --request DELETE \ - https://vault.rocks/v1/identity/group-alias/id/ca726050-d8ac-6f1f-4210-3b5c5b613824 + http://127.0.0.1:8200/v1/identity/group-alias/id/ca726050-d8ac-6f1f-4210-3b5c5b613824 ``` ## List Entities by ID @@ -133,7 +133,7 @@ This endpoint returns a list of available group aliases by their identifiers. $ curl \ --header "X-Vault-Token: ..." \ --request LIST \ - https://vault.rocks/v1/identity/group-alias/id + http://127.0.0.1:8200/v1/identity/group-alias/id ``` ### Sample Response diff --git a/website/source/api/secret/identity/group.html.md b/website/source/api/secret/identity/group.html.md index 3df64e80df..c61db93649 100644 --- a/website/source/api/secret/identity/group.html.md +++ b/website/source/api/secret/identity/group.html.md @@ -53,7 +53,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/identity/group + http://127.0.0.1:8200/v1/identity/group ``` ### Sample Response @@ -84,7 +84,7 @@ This endpoint queries the group by its identifier. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/identity/group/id/363926d8-dd8b-c9f0-21f8-7b248be80ce1 + http://127.0.0.1:8200/v1/identity/group/id/363926d8-dd8b-c9f0-21f8-7b248be80ce1 ``` ### Sample Response @@ -159,7 +159,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/identity/group/id/363926d8-dd8b-c9f0-21f8-7b248be80ce1 + http://127.0.0.1:8200/v1/identity/group/id/363926d8-dd8b-c9f0-21f8-7b248be80ce1 ``` ### Sample Response @@ -191,7 +191,7 @@ This endpoint deletes a group. $ curl \ --header "X-Vault-Token: ..." \ --request DELETE \ - https://vault.rocks/v1/identity/group/id/363926d8-dd8b-c9f0-21f8-7b248be80ce1 + http://127.0.0.1:8200/v1/identity/group/id/363926d8-dd8b-c9f0-21f8-7b248be80ce1 ``` ## List Groups by ID @@ -209,7 +209,7 @@ This endpoint returns a list of available groups by their identifiers. $ curl \ --header "X-Vault-Token: ..." \ --request LIST \ - https://vault.rocks/v1/identity/group/id + http://127.0.0.1:8200/v1/identity/group/id ``` ### Sample Response diff --git a/website/source/api/secret/identity/identity-groups.html.md b/website/source/api/secret/identity/identity-groups.html.md index 6a1d2f1102..1921aeabc7 100644 --- a/website/source/api/secret/identity/identity-groups.html.md +++ b/website/source/api/secret/identity/identity-groups.html.md @@ -46,7 +46,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/identity/group + http://127.0.0.1:8200/v1/identity/group ``` ### Sample Response @@ -98,7 +98,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/identity/group/id/454ceeb5-76d7-a131-b92a-7ecfb15523e8 + http://127.0.0.1:8200/v1/identity/group/id/454ceeb5-76d7-a131-b92a-7ecfb15523e8 ``` ### Sample Response @@ -129,7 +129,7 @@ This endpoint reads the group by its ID. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/identity/group/id/454ceeb5-76d7-a131-b92a-7ecfb15523e8 + http://127.0.0.1:8200/v1/identity/group/id/454ceeb5-76d7-a131-b92a-7ecfb15523e8 ``` ### Sample Response @@ -173,7 +173,7 @@ This endpoint deleted the group by its ID. $ curl \ --header "X-Vault-Token: ..." \ --request DELETE \ - https://vault.rocks/v1/identity/group/id/454ceeb5-76d7-a131-b92a-7ecfb15523e8 + http://127.0.0.1:8200/v1/identity/group/id/454ceeb5-76d7-a131-b92a-7ecfb15523e8 ``` @@ -192,7 +192,7 @@ This endpoint lists all the groups by their ID. $ curl \ --header "X-Vault-Token: ..." \ --request LIST \ - https://vault.rocks/v1/identity/group/id + http://127.0.0.1:8200/v1/identity/group/id ``` ### Sample Response @@ -240,7 +240,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/identity/lookup/group + http://127.0.0.1:8200/v1/identity/lookup/group ``` ### Sample Response diff --git a/website/source/api/secret/identity/lookup.html.md b/website/source/api/secret/identity/lookup.html.md index 67032ab0cb..0b212c4957 100644 --- a/website/source/api/secret/identity/lookup.html.md +++ b/website/source/api/secret/identity/lookup.html.md @@ -46,7 +46,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/identity/lookup/entity + http://127.0.0.1:8200/v1/identity/lookup/entity ``` ### Sample Response @@ -108,7 +108,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/identity/lookup/group + http://127.0.0.1:8200/v1/identity/lookup/group ``` ### Sample Response diff --git a/website/source/api/secret/kv/index.html.md b/website/source/api/secret/kv/index.html.md index 5042b8c504..dbbc3d28e5 100644 --- a/website/source/api/secret/kv/index.html.md +++ b/website/source/api/secret/kv/index.html.md @@ -34,7 +34,7 @@ This endpoint retrieves the secret at the specified location. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/secret/my-secret + http://127.0.0.1:8200/v1/secret/my-secret ``` ### Sample Response @@ -80,7 +80,7 @@ this command. $ curl \ --header "X-Vault-Token: ..." \ --request LIST \ - https://vault.rocks/v1/secret/my-secret + http://127.0.0.1:8200/v1/secret/my-secret ``` ### Sample Response @@ -140,7 +140,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/secret/my-secret + http://127.0.0.1:8200/v1/secret/my-secret ``` ## Delete Secret @@ -162,5 +162,5 @@ This endpoint deletes the secret at the specified location. $ curl \ --header "X-Vault-Token: ..." \ --request DELETE \ - https://vault.rocks/v1/secret/my-secret + http://127.0.0.1:8200/v1/secret/my-secret ``` diff --git a/website/source/api/secret/mongodb/index.html.md b/website/source/api/secret/mongodb/index.html.md index a4637e9ecf..26fa8c6965 100644 --- a/website/source/api/secret/mongodb/index.html.md +++ b/website/source/api/secret/mongodb/index.html.md @@ -54,7 +54,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/mongodb/config/connection + http://127.0.0.1:8200/v1/mongodb/config/connection ``` ### Sample Response @@ -88,7 +88,7 @@ including passwords, if any. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/mongodb/config/connection + http://127.0.0.1:8200/v1/mongodb/config/connection ``` ### Sample Response @@ -141,7 +141,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/mongodb/config/lease + http://127.0.0.1:8200/v1/mongodb/config/lease ``` ## Read Lease @@ -157,7 +157,7 @@ This endpoint queries the lease configuration. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/mongodb/config/lease + http://127.0.0.1:8200/v1/mongodb/config/lease ``` ### Sample Response @@ -209,7 +209,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/mongodb/roles/my-role + http://127.0.0.1:8200/v1/mongodb/roles/my-role ``` ## Read Role @@ -230,7 +230,7 @@ This endpoint queries the role definition. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/mongodb/roles/my-role + http://127.0.0.1:8200/v1/mongodb/roles/my-role ``` ### Sample Response @@ -265,7 +265,7 @@ returned, not any values. $ curl \ --header "X-Vault-Token: ..." \ --request LIST \ - https://vault.rocks/v1/mongodb/roles + http://127.0.0.1:8200/v1/mongodb/roles ``` ### Sample Response @@ -306,7 +306,7 @@ This endpoint deletes the role definition. $ curl \ --header "X-Vault-Token: ..." \ --request DELETE \ - https://vault.rocks/v1/mongodb/roles/my-role + http://127.0.0.1:8200/v1/mongodb/roles/my-role ``` ## Generate Credentials @@ -328,7 +328,7 @@ role. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/mongodb/creds/my-role + http://127.0.0.1:8200/v1/mongodb/creds/my-role ``` ### Sample Response diff --git a/website/source/api/secret/mssql/index.html.md b/website/source/api/secret/mssql/index.html.md index 30c17b34bb..b438e42634 100644 --- a/website/source/api/secret/mssql/index.html.md +++ b/website/source/api/secret/mssql/index.html.md @@ -57,7 +57,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/mssql/config/connection + http://127.0.0.1:8200/v1/mssql/config/connection ``` ## Configure Lease @@ -93,7 +93,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/mssql/config/lease + http://127.0.0.1:8200/v1/mssql/config/lease ``` ## Create Role @@ -127,7 +127,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/mssql/roles/my-role + http://127.0.0.1:8200/v1/mssql/roles/my-role ``` ## Read Role @@ -148,7 +148,7 @@ This endpoint queries the role definition. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/mssql/roles/my-role + http://127.0.0.1:8200/v1/mssql/roles/my-role ``` ### Sample Response @@ -176,7 +176,7 @@ returned, not any values. $ curl \ --header "X-Vault-Token: ..." \ --request LIST \ - https://vault.rocks/v1/mssql/roles + http://127.0.0.1:8200/v1/mssql/roles ``` ### Sample Response @@ -212,7 +212,7 @@ This endpoint deletes the role definition. $ curl \ --header "X-Vault-Token: ..." \ --request DELETE \ - https://vault.rocks/v1/mssql/roles/my-role + http://127.0.0.1:8200/v1/mssql/roles/my-role ``` ## Generate Credentials @@ -234,7 +234,7 @@ role. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/mssql/creds/my-role + http://127.0.0.1:8200/v1/mssql/creds/my-role ``` ### Sample Response diff --git a/website/source/api/secret/mysql/index.html.md b/website/source/api/secret/mysql/index.html.md index 9a7940615b..ca2d02e5e9 100644 --- a/website/source/api/secret/mysql/index.html.md +++ b/website/source/api/secret/mysql/index.html.md @@ -59,7 +59,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/mysql/config/connection + http://127.0.0.1:8200/v1/mysql/config/connection ``` ## Configure Lease @@ -96,7 +96,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/mysql/config/lease + http://127.0.0.1:8200/v1/mysql/config/lease ``` ## Create Role @@ -148,7 +148,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/mysql/roles/my-role + http://127.0.0.1:8200/v1/mysql/roles/my-role ``` ## Read Role @@ -169,7 +169,7 @@ This endpoint queries the role definition. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/mysql/roles/my-role + http://127.0.0.1:8200/v1/mysql/roles/my-role ``` ### Sample Response @@ -197,7 +197,7 @@ returned, not any values. $ curl \ --header "X-Vault-Token: ..." \ --request LIST \ - https://vault.rocks/v1/mysql/roles + http://127.0.0.1:8200/v1/mysql/roles ``` ### Sample Response @@ -233,7 +233,7 @@ This endpoint deletes the role definition. $ curl \ --header "X-Vault-Token: ..." \ --request DELETE \ - https://vault.rocks/v1/mysql/roles/my-role + http://127.0.0.1:8200/v1/mysql/roles/my-role ``` ## Generate Credentials @@ -255,7 +255,7 @@ role. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/mysql/creds/my-role + http://127.0.0.1:8200/v1/mysql/creds/my-role ``` ### Sample Response diff --git a/website/source/api/secret/nomad/index.html.md b/website/source/api/secret/nomad/index.html.md index baa07cbd93..4b0febaf7e 100644 --- a/website/source/api/secret/nomad/index.html.md +++ b/website/source/api/secret/nomad/index.html.md @@ -53,7 +53,7 @@ $ curl \ --request POST \ --header "X-Vault-Token: ..." \ --data @payload.json \ - https://vault.rocks/v1/nomad/config/access + http://127.0.0.1:8200/v1/nomad/config/access ``` ## Read Access Configuration @@ -69,7 +69,7 @@ This endpoint queries for information about the Nomad connection. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/nomad/config/access + http://127.0.0.1:8200/v1/nomad/config/access ``` ### Sample Response @@ -114,7 +114,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/nomad/config/lease + http://127.0.0.1:8200/v1/nomad/config/lease ``` ## Read Lease Configuration @@ -130,7 +130,7 @@ This endpoint queries for information about the Lease TTL for the specified moun ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/nomad/config/lease + http://127.0.0.1:8200/v1/nomad/config/lease ``` ### Sample Response @@ -156,7 +156,7 @@ This endpoint deletes the lease configuration. $ curl \ --header "X-Vault-Token: ..." \ --request DELETE \ - https://vault.rocks/v1/nomad/config/lease + http://127.0.0.1:8200/v1/nomad/config/lease ``` ## Create/Update Role @@ -202,7 +202,7 @@ $ curl \ --request POST \ --header "X-Vault-Token: ..." \ --data @payload.json \ - https://vault.rocks/v1/nomad/role/monitoring + http://127.0.0.1:8200/v1/nomad/role/monitoring ``` ## Read Role @@ -224,7 +224,7 @@ If no role exists with that name, a 404 is returned. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/nomad/role/monitoring + http://127.0.0.1:8200/v1/nomad/role/monitoring ``` ### Sample Response @@ -256,7 +256,7 @@ This endpoint lists all existing roles in the backend. $ curl \ --header "X-Vault-Token: ..." \ --request LIST \ - https://vault.rocks/v1/nomad/role + http://127.0.0.1:8200/v1/nomad/role ``` ### Sample Response @@ -291,7 +291,7 @@ not exist, this endpoint will still return a successful response. $ curl \ --request DELETE \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/nomad/role/example-role + http://127.0.0.1:8200/v1/nomad/role/example-role ``` ## Generate Credential @@ -313,7 +313,7 @@ definition. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/nomad/creds/example + http://127.0.0.1:8200/v1/nomad/creds/example ``` ### Sample Response diff --git a/website/source/api/secret/pki/index.html.md b/website/source/api/secret/pki/index.html.md index 49291bf295..72ef6a6abd 100644 --- a/website/source/api/secret/pki/index.html.md +++ b/website/source/api/secret/pki/index.html.md @@ -62,7 +62,7 @@ This is an unauthenticated endpoint. ``` $ curl \ - https://vault.rocks/v1/pki/ca/pem + http://127.0.0.1:8200/v1/pki/ca/pem ``` ### Sample Response @@ -87,7 +87,7 @@ This is an unauthenticated endpoint. ``` $ curl \ - https://vault.rocks/v1/pki/ca_chain + http://127.0.0.1:8200/v1/pki/ca_chain ``` ### Sample Response @@ -121,7 +121,7 @@ This is an unauthenticated endpoint. ``` $ curl \ - https://vault.rocks/v1/pki/cert/crl + http://127.0.0.1:8200/v1/pki/cert/crl ``` ### Sample Response @@ -148,7 +148,7 @@ This endpoint returns a list of the current certificates by serial number only. $ curl \ --header "X-Vault-Token: ..." \ --request LIST \ - https://vault.rocks/v1/pki/certs + http://127.0.0.1:8200/v1/pki/certs ``` ### Sample Response @@ -225,7 +225,7 @@ marked valid. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/pki/config/crl + http://127.0.0.1:8200/v1/pki/config/crl ``` ### Sample Response @@ -270,7 +270,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/pki/config/crl + http://127.0.0.1:8200/v1/pki/config/crl ``` ## Read URLs @@ -286,7 +286,7 @@ This endpoint fetches the URLs to be encoded in generated certificates. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/pki/config/urls + http://127.0.0.1:8200/v1/pki/config/urls ``` ### Sample Response @@ -345,7 +345,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/pki/config/urls + http://127.0.0.1:8200/v1/pki/config/urls ``` ## Read CRL @@ -366,7 +366,7 @@ This is an unauthenticated endpoint. ``` $ curl \ - https://vault.rocks/v1/pki/crl/pem + http://127.0.0.1:8200/v1/pki/crl/pem ``` ### Sample Response @@ -391,7 +391,7 @@ certificates being revoked. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/pki/crl/rotate + http://127.0.0.1:8200/v1/pki/crl/rotate ``` ### Sample Response @@ -505,7 +505,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/pki/intermediate/generate/internal + http://127.0.0.1:8200/v1/pki/intermediate/generate/internal ``` ```json @@ -556,7 +556,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/pki/intermediate/set-signed + http://127.0.0.1:8200/v1/pki/intermediate/set-signed ``` ## Generate Certificate @@ -632,7 +632,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/pki/issue/my-role + http://127.0.0.1:8200/v1/pki/issue/my-role ``` ### Sample Response @@ -685,7 +685,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/pki/revoke + http://127.0.0.1:8200/v1/pki/revoke ``` ### Sample Response @@ -867,7 +867,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/pki/roles/my-role + http://127.0.0.1:8200/v1/pki/roles/my-role ``` ## Read Role @@ -888,7 +888,7 @@ This endpoint queries the role definition. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/pki/roles/my-role + http://127.0.0.1:8200/v1/pki/roles/my-role ``` ### Sample Response @@ -927,7 +927,7 @@ returned, not any values. $ curl \ --header "X-Vault-Token: ..." \ --request LIST \ - https://vault.rocks/v1/pki/roles + http://127.0.0.1:8200/v1/pki/roles ``` ### Sample Response @@ -964,7 +964,7 @@ revoke certificates previously issued under this role. $ curl \ --header "X-Vault-Token: ..." \ --request DELETE \ - https://vault.rocks/v1/pki/roles/my-role + http://127.0.0.1:8200/v1/pki/roles/my-role ``` ## Generate Root @@ -1091,7 +1091,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/pki/root/generate/internal + http://127.0.0.1:8200/v1/pki/root/generate/internal ``` ### Sample Response @@ -1127,7 +1127,7 @@ _This endpoint requires sudo/root privileges._ $ curl \ --header "X-Vault-Token: ..." \ --request DELETE \ - https://vault.rocks/v1/pki/root + http://127.0.0.1:8200/v1/pki/root ``` ## Sign Intermediate @@ -1243,7 +1243,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/pki/root/sign-intermediate + http://127.0.0.1:8200/v1/pki/root/sign-intermediate ``` ### Sample Response @@ -1303,7 +1303,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/pki/root/sign-self-issued + http://127.0.0.1:8200/v1/pki/root/sign-self-issued ``` ### Sample Response @@ -1444,7 +1444,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/pki/sign-verbatim + http://127.0.0.1:8200/v1/pki/sign-verbatim ``` ### Sample Response @@ -1505,5 +1505,5 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/pki/tidy + http://127.0.0.1:8200/v1/pki/tidy ``` diff --git a/website/source/api/secret/postgresql/index.html.md b/website/source/api/secret/postgresql/index.html.md index a6a18a6f07..3d51eaad05 100644 --- a/website/source/api/secret/postgresql/index.html.md +++ b/website/source/api/secret/postgresql/index.html.md @@ -62,7 +62,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/postgresql/config/connection + http://127.0.0.1:8200/v1/postgresql/config/connection ``` ## Configure Lease @@ -99,7 +99,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/postgresql/config/lease + http://127.0.0.1:8200/v1/postgresql/config/lease ``` ## Create Role @@ -142,7 +142,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/postgresql/roles/my-role + http://127.0.0.1:8200/v1/postgresql/roles/my-role ``` ## Read Role @@ -163,7 +163,7 @@ This endpoint queries the role definition. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/postgresql/roles/my-role + http://127.0.0.1:8200/v1/postgresql/roles/my-role ``` ### Sample Response @@ -191,7 +191,7 @@ returned, not any values. $ curl \ --header "X-Vault-Token: ..." \ --request LIST \ - https://vault.rocks/v1/postgresql/roles + http://127.0.0.1:8200/v1/postgresql/roles ``` ### Sample Response @@ -227,7 +227,7 @@ This endpoint deletes the role definition. $ curl \ --header "X-Vault-Token: ..." \ --request DELETE \ - https://vault.rocks/v1/postgresql/roles/my-role + http://127.0.0.1:8200/v1/postgresql/roles/my-role ``` ## Generate Credentials @@ -249,7 +249,7 @@ role. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/postgresql/creds/my-role + http://127.0.0.1:8200/v1/postgresql/creds/my-role ``` ### Sample Response diff --git a/website/source/api/secret/rabbitmq/index.html.md b/website/source/api/secret/rabbitmq/index.html.md index b478b27b47..66f2069eb3 100644 --- a/website/source/api/secret/rabbitmq/index.html.md +++ b/website/source/api/secret/rabbitmq/index.html.md @@ -56,7 +56,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/rabbitmq/config/connection + http://127.0.0.1:8200/v1/rabbitmq/config/connection ``` ## Configure Lease @@ -89,7 +89,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/rabbitmq/config/lease + http://127.0.0.1:8200/v1/rabbitmq/config/lease ``` ## Create Role @@ -126,7 +126,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/rabbitmq/roles/my-role + http://127.0.0.1:8200/v1/rabbitmq/roles/my-role ``` ## Read Role @@ -147,7 +147,7 @@ This endpoint queries the role definition. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/rabbitmq/roles/my-role + http://127.0.0.1:8200/v1/rabbitmq/roles/my-role ``` ### Sample Response @@ -180,7 +180,7 @@ This endpoint deletes the role definition. $ curl \ --header "X-Vault-Token: ..." \ --request DELETE \ - https://vault.rocks/v1/rabbitmq/roles/my-role + http://127.0.0.1:8200/v1/rabbitmq/roles/my-role ``` ## Generate Credentials @@ -202,7 +202,7 @@ role. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/rabbitmq/creds/my-role + http://127.0.0.1:8200/v1/rabbitmq/creds/my-role ``` ### Sample Response diff --git a/website/source/api/secret/ssh/index.html.md b/website/source/api/secret/ssh/index.html.md index d7a9be8798..090ef7feef 100644 --- a/website/source/api/secret/ssh/index.html.md +++ b/website/source/api/secret/ssh/index.html.md @@ -47,7 +47,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/ssh/keys/my-key + http://127.0.0.1:8200/v1/ssh/keys/my-key ``` ## Delete Key @@ -70,7 +70,7 @@ This endpoint deletes a named key. $ curl \ --header "X-Vault-Token: ..." \ --request DELETE \ - https://vault.rocks/v1/ssh/keys/my-key + http://127.0.0.1:8200/v1/ssh/keys/my-key ``` ## Create Role @@ -218,7 +218,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/ssh/roles/my-role + http://127.0.0.1:8200/v1/ssh/roles/my-role ``` ## Read Role @@ -239,7 +239,7 @@ This endpoint queries a named role. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/ssh/roles/my-role + http://127.0.0.1:8200/v1/ssh/roles/my-role ``` ### Sample Response @@ -301,7 +301,7 @@ returned, not any values. $ curl \ --header "X-Vault-Token: ..." \ --request LIST \ - https://vault.rocks/v1/ssh/roles + http://127.0.0.1:8200/v1/ssh/roles ``` ### Sample Response @@ -346,7 +346,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request DELETE \ --data @payload.json \ - https://vault.rocks/v1/ssh/roles/my-role + http://127.0.0.1:8200/v1/ssh/roles/my-role ``` ## List Zero-Address Roles @@ -362,7 +362,7 @@ This endpoint returns the list of configured zero-address roles. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/ssh/config/zeroaddress + http://127.0.0.1:8200/v1/ssh/config/zeroaddress ``` ### Sample Response @@ -411,7 +411,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/ssh/config/zeroaddress + http://127.0.0.1:8200/v1/ssh/config/zeroaddress ``` ## Delete Zero-Address Role @@ -428,7 +428,7 @@ This endpoint deletes the zero-address roles configuration. $ curl \ --header "X-Vault-Token: ..." \ --request DELETE \ - https://vault.rocks/v1/ssh/config/zeroaddress + http://127.0.0.1:8200/v1/ssh/config/zeroaddress ``` ## Generate SSH Credentials @@ -464,7 +464,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/ssh/creds/my-role + http://127.0.0.1:8200/v1/ssh/creds/my-role ``` ### Sample Response @@ -540,7 +540,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/ssh/lookup + http://127.0.0.1:8200/v1/ssh/lookup ``` ### Sample Response @@ -592,7 +592,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/ssh/verify + http://127.0.0.1:8200/v1/ssh/verify ### Sample Response @@ -647,7 +647,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/ssh/config/ca + http://127.0.0.1:8200/v1/ssh/config/ca ``` ### Sample Response @@ -682,7 +682,7 @@ This endpoint deletes the CA information for the backend via an SSH key pair. $ curl \ --header "X-Vault-Token: ..." \ --request DELETE \ - https://vault.rocks/v1/ssh/config/ca + http://127.0.0.1:8200/v1/ssh/config/ca ``` ## Read Public Key (Unauthenticated) @@ -697,7 +697,7 @@ endpoint. ### Sample Request ``` -$ curl https://vault.rocks/v1/ssh/public_key +$ curl http://127.0.0.1:8200/v1/ssh/public_key ``` ### Sample Response @@ -719,7 +719,7 @@ This endpoint reads the configured/generated public key. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/ssh/config/ca + http://127.0.0.1:8200/v1/ssh/config/ca ``` ### Sample Response @@ -788,7 +788,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/ssh/sign/my-key + http://127.0.0.1:8200/v1/ssh/sign/my-key ``` ### Sample Response diff --git a/website/source/api/secret/totp/index.html.md b/website/source/api/secret/totp/index.html.md index f89865c70f..f86265f23d 100644 --- a/website/source/api/secret/totp/index.html.md +++ b/website/source/api/secret/totp/index.html.md @@ -67,7 +67,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/totp/keys/my-key + http://127.0.0.1:8200/v1/totp/keys/my-key ``` ### Sample Payload @@ -87,7 +87,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/totp/keys/my-key + http://127.0.0.1:8200/v1/totp/keys/my-key ``` ### Sample Response @@ -124,7 +124,7 @@ This endpoint queries the key definition. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/totp/keys/my-key + http://127.0.0.1:8200/v1/totp/keys/my-key ``` ### Sample Response @@ -156,7 +156,7 @@ returned, not any values. $ curl \ --header "X-Vault-Token: ..." \ --request LIST \ - https://vault.rocks/v1/totp/keys + http://127.0.0.1:8200/v1/totp/keys ``` ### Sample Response @@ -192,7 +192,7 @@ This endpoint deletes the key definition. $ curl \ --header "X-Vault-Token: ..." \ --request DELETE \ - https://vault.rocks/v1/totp/keys/my-key + http://127.0.0.1:8200/v1/totp/keys/my-key ``` ## Generate Code @@ -214,7 +214,7 @@ key. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/totp/code/my-key + http://127.0.0.1:8200/v1/totp/code/my-key ``` ### Sample Response @@ -257,7 +257,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/totp/code/my-key + http://127.0.0.1:8200/v1/totp/code/my-key ``` ### Sample Response diff --git a/website/source/api/secret/transit/index.html.md b/website/source/api/secret/transit/index.html.md index b6f1162496..4c2758deff 100644 --- a/website/source/api/secret/transit/index.html.md +++ b/website/source/api/secret/transit/index.html.md @@ -77,7 +77,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/transit/keys/my-key + http://127.0.0.1:8200/v1/transit/keys/my-key ``` ## Read Key @@ -102,7 +102,7 @@ type. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/transit/keys/my-key + http://127.0.0.1:8200/v1/transit/keys/my-key ``` ### Sample Response @@ -144,7 +144,7 @@ actual keys themselves). $ curl \ --header "X-Vault-Token: ..." \ --request LIST \ - https://vault.rocks/v1/transit/keys + http://127.0.0.1:8200/v1/transit/keys ``` ### Sample Response @@ -182,7 +182,7 @@ catastrophic operation, the `deletion_allowed` tunable must be set in the key's $ curl \ --header "X-Vault-Token: ..." \ --request DELETE \ - https://vault.rocks/v1/transit/keys/my-key + http://127.0.0.1:8200/v1/transit/keys/my-key ``` ## Update Key Configuration @@ -233,7 +233,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/transit/keys/my-key/config + http://127.0.0.1:8200/v1/transit/keys/my-key/config ``` ## Rotate Key @@ -254,7 +254,7 @@ decryption operations. $ curl \ --header "X-Vault-Token: ..." \ --request POST \ - https://vault.rocks/v1/transit/keys/my-key/rotate + http://127.0.0.1:8200/v1/transit/keys/my-key/rotate ``` ## Export Key @@ -291,7 +291,7 @@ be valid. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/transit/export/encryption-key/my-key/1 + http://127.0.0.1:8200/v1/transit/export/encryption-key/my-key/1 ``` ### Sample Response @@ -391,7 +391,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/transit/encrypt/my-key + http://127.0.0.1:8200/v1/transit/encrypt/my-key ``` ### Sample Response @@ -460,7 +460,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/transit/decrypt/my-key + http://127.0.0.1:8200/v1/transit/decrypt/my-key ``` ### Sample Response @@ -535,7 +535,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/transit/rewrap/my-key + http://127.0.0.1:8200/v1/transit/rewrap/my-key ``` ### Sample Response @@ -599,7 +599,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/transit/datakey/plaintext/my-key + http://127.0.0.1:8200/v1/transit/datakey/plaintext/my-key ``` ### Sample Response @@ -644,7 +644,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/transit/random/164 + http://127.0.0.1:8200/v1/transit/random/164 ``` ### Sample Response @@ -696,7 +696,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/transit/hash/sha2-512 + http://127.0.0.1:8200/v1/transit/hash/sha2-512 ``` ### Sample Response @@ -755,7 +755,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/transit/hmac/my-key/sha2-512 + http://127.0.0.1:8200/v1/transit/hmac/my-key/sha2-512 ``` ### Sample Response @@ -829,7 +829,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/transit/sign/my-key/sha2-512 + http://127.0.0.1:8200/v1/transit/sign/my-key/sha2-512 ``` ### Sample Response @@ -905,7 +905,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/transit/verify/my-key/sha2-512 + http://127.0.0.1:8200/v1/transit/verify/my-key/sha2-512 ``` ### Sample Response @@ -938,7 +938,7 @@ restore the key. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/transit/backup/aes + http://127.0.0.1:8200/v1/transit/backup/aes ``` ### Sample Response @@ -982,5 +982,5 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/transit/restore + http://127.0.0.1:8200/v1/transit/restore ``` diff --git a/website/source/api/system/audit-hash.html.md b/website/source/api/system/audit-hash.html.md index 280b77108e..81688bf252 100644 --- a/website/source/api/system/audit-hash.html.md +++ b/website/source/api/system/audit-hash.html.md @@ -51,7 +51,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/sys/audit-hash/example-audit + http://127.0.0.1:8200/v1/sys/audit-hash/example-audit ``` ### Sample Response diff --git a/website/source/api/system/audit.html.md b/website/source/api/system/audit.html.md index 5a63674ca1..35a94fd43d 100644 --- a/website/source/api/system/audit.html.md +++ b/website/source/api/system/audit.html.md @@ -29,7 +29,7 @@ available audit devices). ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/sys/audit + http://127.0.0.1:8200/v1/sys/audit ``` ### Sample Response @@ -95,7 +95,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request PUT \ --data @payload.json \ - https://vault.rocks/v1/sys/audit/example-audit + http://127.0.0.1:8200/v1/sys/audit/example-audit ``` ## Disable Audit Device @@ -120,5 +120,5 @@ This endpoint disables the audit device at the given path. $ curl \ --header "X-Vault-Token: ..." \ --request DELETE \ - https://vault.rocks/v1/sys/audit/example-audit + http://127.0.0.1:8200/v1/sys/audit/example-audit ``` diff --git a/website/source/api/system/auth.html.md b/website/source/api/system/auth.html.md index 2f85c191a7..0101c4111b 100644 --- a/website/source/api/system/auth.html.md +++ b/website/source/api/system/auth.html.md @@ -25,7 +25,7 @@ This endpoint lists all enabled auth methods. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/sys/auth + http://127.0.0.1:8200/v1/sys/auth ``` ### Sample Response @@ -121,7 +121,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/sys/auth/my-auth + http://127.0.0.1:8200/v1/sys/auth/my-auth ``` ## Disable Auth Method @@ -146,7 +146,7 @@ This endpoint disables the auth method at the given auth path. $ curl \ --header "X-Vault-Token: ..." \ --request DELETE \ - https://vault.rocks/v1/sys/auth/my-auth + http://127.0.0.1:8200/v1/sys/auth/my-auth ``` ## Read Auth Method Tuning @@ -171,7 +171,7 @@ without `sudo` via `sys/mounts/auth/[auth-path]/tune`._ ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/sys/auth/my-auth/tune + http://127.0.0.1:8200/v1/sys/auth/my-auth/tune ``` ### Sample Response @@ -231,5 +231,5 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/sys/auth/my-auth/tune + http://127.0.0.1:8200/v1/sys/auth/my-auth/tune ``` diff --git a/website/source/api/system/capabilities-accessor.html.md b/website/source/api/system/capabilities-accessor.html.md index 91881830b3..12a04e0414 100644 --- a/website/source/api/system/capabilities-accessor.html.md +++ b/website/source/api/system/capabilities-accessor.html.md @@ -50,7 +50,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/sys/capabilities-accessor + http://127.0.0.1:8200/v1/sys/capabilities-accessor ``` ### Sample Response diff --git a/website/source/api/system/capabilities-self.html.md b/website/source/api/system/capabilities-self.html.md index b1fbf816d2..4763dd6be6 100644 --- a/website/source/api/system/capabilities-self.html.md +++ b/website/source/api/system/capabilities-self.html.md @@ -47,7 +47,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/sys/capabilities-self + http://127.0.0.1:8200/v1/sys/capabilities-self ``` ### Sample Response diff --git a/website/source/api/system/capabilities.html.md b/website/source/api/system/capabilities.html.md index 896a04f66a..3d6c202a64 100644 --- a/website/source/api/system/capabilities.html.md +++ b/website/source/api/system/capabilities.html.md @@ -48,7 +48,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/sys/capabilities + http://127.0.0.1:8200/v1/sys/capabilities ``` ### Sample Response diff --git a/website/source/api/system/config-auditing.html.md b/website/source/api/system/config-auditing.html.md index 83fac0acb1..c288a3e5c1 100644 --- a/website/source/api/system/config-auditing.html.md +++ b/website/source/api/system/config-auditing.html.md @@ -26,7 +26,7 @@ This endpoint lists the request headers that are configured to be audited. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/sys/config/auditing/request-headers + http://127.0.0.1:8200/v1/sys/config/auditing/request-headers ``` ### Sample Response @@ -62,7 +62,7 @@ This endpoint lists the information for the given request header. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/sys/config/auditing/request-headers/my-header + http://127.0.0.1:8200/v1/sys/config/auditing/request-headers/my-header ``` ### Sample Response @@ -106,7 +106,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request PUT \ --data @payload.json \ - https://vault.rocks/v1/sys/config/auditing/request-headers/my-header + http://127.0.0.1:8200/v1/sys/config/auditing/request-headers/my-header ``` ## Delete Audit Request Header @@ -126,5 +126,5 @@ This endpoint disables auditing of the given request header. $ curl \ --header "X-Vault-Token: ..." \ --request DELETE \ - https://vault.rocks/v1/sys/config/auditing/request-headers/my-header + http://127.0.0.1:8200/v1/sys/config/auditing/request-headers/my-header ``` diff --git a/website/source/api/system/config-control-group.html.md b/website/source/api/system/config-control-group.html.md index edbd5acb6d..5f26c2763a 100644 --- a/website/source/api/system/config-control-group.html.md +++ b/website/source/api/system/config-control-group.html.md @@ -26,7 +26,7 @@ This endpoint returns the current Control Group configuration. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/sys/config/control-group + http://127.0.0.1:8200/v1/sys/config/control-group ``` ### Sample Response @@ -64,7 +64,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request PUT \ --data @payload.json \ - https://vault.rocks/v1/sys/config/control-group + http://127.0.0.1:8200/v1/sys/config/control-group ``` ## Delete Control Group Settings @@ -81,5 +81,5 @@ This endpoint removes any control group configuration. $ curl \ --header "X-Vault-Token: ..." \ --request DELETE \ - https://vault.rocks/v1/sys/config/control-group + http://127.0.0.1:8200/v1/sys/config/control-group ``` diff --git a/website/source/api/system/config-cors.html.md b/website/source/api/system/config-cors.html.md index 26c5b42a32..6365c597bb 100644 --- a/website/source/api/system/config-cors.html.md +++ b/website/source/api/system/config-cors.html.md @@ -26,7 +26,7 @@ This endpoint returns the current CORS configuration. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/sys/config/cors + http://127.0.0.1:8200/v1/sys/config/cors ``` ### Sample Response @@ -78,7 +78,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request PUT \ --data @payload.json \ - https://vault.rocks/v1/sys/config/cors + http://127.0.0.1:8200/v1/sys/config/cors ``` ## Delete CORS Settings @@ -95,5 +95,5 @@ This endpoint removes any CORS configuration. $ curl \ --header "X-Vault-Token: ..." \ --request DELETE \ - https://vault.rocks/v1/sys/config/cors + http://127.0.0.1:8200/v1/sys/config/cors ``` diff --git a/website/source/api/system/control-group.html.md b/website/source/api/system/control-group.html.md index 051ac3e5fb..8623f23eed 100644 --- a/website/source/api/system/control-group.html.md +++ b/website/source/api/system/control-group.html.md @@ -35,7 +35,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/sys/control-group/authorize + http://127.0.0.1:8200/v1/sys/control-group/authorize ``` ### Sample Response @@ -75,7 +75,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/sys/control-group/request + http://127.0.0.1:8200/v1/sys/control-group/request ``` ### Sample Response diff --git a/website/source/api/system/generate-root.html.md b/website/source/api/system/generate-root.html.md index cd38ef3b0e..d8284df3b9 100644 --- a/website/source/api/system/generate-root.html.md +++ b/website/source/api/system/generate-root.html.md @@ -24,7 +24,7 @@ attempt. ``` $ curl \ - https://vault.rocks/v1/sys/generate-root/attempt + http://127.0.0.1:8200/v1/sys/generate-root/attempt ``` ### Sample Response @@ -82,7 +82,7 @@ generation attempt can take place at a time. One (and only one) of `otp` or $ curl \ --request PUT \ --data @payload.json \ - https://vault.rocks/v1/sys/generate-root/attempt + http://127.0.0.1:8200/v1/sys/generate-root/attempt ``` ### Sample Response @@ -113,7 +113,7 @@ progress made. This must be called to change the OTP or PGP key being used. ``` $ curl \ --request DELETE \ - https://vault.rocks/v1/sys/generate-root/attempt + http://127.0.0.1:8200/v1/sys/generate-root/attempt ``` ## Provide Key Share to Generate Root @@ -149,7 +149,7 @@ nonce must be provided with each call. $ curl \ --request PUT \ --data @payload.json \ - https://vault.rocks/v1/sys/generate-root/update + http://127.0.0.1:8200/v1/sys/generate-root/update ``` ### Sample Response diff --git a/website/source/api/system/health.html.md b/website/source/api/system/health.html.md index f934e50777..74cf71ab3c 100644 --- a/website/source/api/system/health.html.md +++ b/website/source/api/system/health.html.md @@ -52,7 +52,7 @@ The default status codes are: ``` $ curl \ - https://vault.rocks/v1/sys/health + http://127.0.0.1:8200/v1/sys/health ``` ### Sample Response diff --git a/website/source/api/system/init.html.md b/website/source/api/system/init.html.md index d252fb5669..b97df17e35 100644 --- a/website/source/api/system/init.html.md +++ b/website/source/api/system/init.html.md @@ -22,7 +22,7 @@ This endpoint returns the initialization status of Vault. ``` $ curl \ - https://vault.rocks/v1/sys/init + http://127.0.0.1:8200/v1/sys/init ``` ### Sample Response @@ -95,7 +95,7 @@ Additionally, the following options are only supported on Vault Pro/Enterprise: $ curl \ --request PUT \ --data @payload.json \ - https://vault.rocks/v1/sys/init + http://127.0.0.1:8200/v1/sys/init ``` ### Sample Response diff --git a/website/source/api/system/leader.html.md b/website/source/api/system/leader.html.md index 358fffb185..ea541f6e82 100644 --- a/website/source/api/system/leader.html.md +++ b/website/source/api/system/leader.html.md @@ -25,7 +25,7 @@ of Vault. ``` $ curl \ - https://vault.rocks/v1/sys/leader + http://127.0.0.1:8200/v1/sys/leader ``` ### Sample Response diff --git a/website/source/api/system/leases.html.md b/website/source/api/system/leases.html.md index ec5166479a..2b1ac3e9eb 100644 --- a/website/source/api/system/leases.html.md +++ b/website/source/api/system/leases.html.md @@ -37,7 +37,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request PUT \ --data @payload.json \ - https://vault.rocks/v1/sys/leases/lookup + http://127.0.0.1:8200/v1/sys/leases/lookup ``` ### Sample Response @@ -70,7 +70,7 @@ This endpoint returns a list of lease ids. $ curl \ --header "X-Vault-Token: ..." \ --request LIST \ - https://vault.rocks/v1/sys/leases/lookup/aws/creds/deploy/ + http://127.0.0.1:8200/v1/sys/leases/lookup/aws/creds/deploy/ ``` ### Sample Response @@ -119,7 +119,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request PUT \ --data @payload.json \ - https://vault.rocks/v1/sys/leases/renew + http://127.0.0.1:8200/v1/sys/leases/renew ``` ### Sample Response @@ -159,7 +159,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request PUT \ --data @payload.json \ - https://vault.rocks/v1/sys/leases/revoke + http://127.0.0.1:8200/v1/sys/leases/revoke ``` ## Revoke Force @@ -191,7 +191,7 @@ this endpoint should be tightly controlled. $ curl \ --header "X-Vault-Token: ..." \ --request PUT \ - https://vault.rocks/v1/sys/leases/revoke-force/aws/creds + http://127.0.0.1:8200/v1/sys/leases/revoke-force/aws/creds ``` ## Revoke Prefix @@ -218,5 +218,5 @@ used to revoke very large numbers of secrets/tokens at once. $ curl \ --header "X-Vault-Token: ..." \ --request PUT \ - https://vault.rocks/v1/sys/leases/revoke-prefix/aws/creds + http://127.0.0.1:8200/v1/sys/leases/revoke-prefix/aws/creds ``` diff --git a/website/source/api/system/license.html.md b/website/source/api/system/license.html.md index 4faffd4f8c..933d277973 100644 --- a/website/source/api/system/license.html.md +++ b/website/source/api/system/license.html.md @@ -27,7 +27,7 @@ This endpoint returns information about the currently installed license. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/sys/license + http://127.0.0.1:8200/v1/sys/license ``` ### Sample Response @@ -83,5 +83,5 @@ $ curl \ --header "X-Vault-Token: ..." \ --request PUT \ --data @payload.json \ - https://vault.rocks/v1/sys/license + http://127.0.0.1:8200/v1/sys/license ``` diff --git a/website/source/api/system/mfa-duo.html.md b/website/source/api/system/mfa-duo.html.md index 0e9283dffe..b5f604245a 100644 --- a/website/source/api/system/mfa-duo.html.md +++ b/website/source/api/system/mfa-duo.html.md @@ -52,7 +52,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/sys/mfa/method/duo/my_duo + http://127.0.0.1:8200/v1/sys/mfa/method/duo/my_duo ``` ## Read Duo MFA Method @@ -74,7 +74,7 @@ name. $ curl \ --header "X-Vault-Token: ..." \ --request GET \ - https://vault.rocks/v1/sys/mfa/method/duo/my_duo + http://127.0.0.1:8200/v1/sys/mfa/method/duo/my_duo ``` @@ -114,6 +114,6 @@ This endpoint deletes a Duo MFA method. $ curl \ --header "X-Vault-Token: ..." \ --request DELETE \ - https://vault.rocks/v1/sys/mfa/method/duo/my_duo + http://127.0.0.1:8200/v1/sys/mfa/method/duo/my_duo ``` diff --git a/website/source/api/system/mfa-okta.html.md b/website/source/api/system/mfa-okta.html.md index 1772b8646b..4acd822939 100644 --- a/website/source/api/system/mfa-okta.html.md +++ b/website/source/api/system/mfa-okta.html.md @@ -51,7 +51,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/sys/mfa/method/okta/my_okta + http://127.0.0.1:8200/v1/sys/mfa/method/okta/my_okta ``` ## Read Okta MFA Method @@ -73,7 +73,7 @@ name. $ curl \ --header "X-Vault-Token: ..." \ --request GET \ - https://vault.rocks/v1/sys/mfa/method/okta/my_okta + http://127.0.0.1:8200/v1/sys/mfa/method/okta/my_okta ``` @@ -112,6 +112,6 @@ This endpoint deletes a Okta MFA method. $ curl \ --header "X-Vault-Token: ..." \ --request DELETE \ - https://vault.rocks/v1/sys/mfa/method/okta/my_okta + http://127.0.0.1:8200/v1/sys/mfa/method/okta/my_okta ``` diff --git a/website/source/api/system/mfa-pingid.html.md b/website/source/api/system/mfa-pingid.html.md index 649b9a9644..8764982f18 100644 --- a/website/source/api/system/mfa-pingid.html.md +++ b/website/source/api/system/mfa-pingid.html.md @@ -44,7 +44,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/sys/mfa/method/pingid/ping + http://127.0.0.1:8200/v1/sys/mfa/method/pingid/ping ``` ## Read PingiD MFA Method @@ -66,7 +66,7 @@ name. $ curl \ --header "X-Vault-Token: ..." \ --request GET \ - https://vault.rocks/v1/sys/mfa/method/pingid/ping + http://127.0.0.1:8200/v1/sys/mfa/method/pingid/ping ``` @@ -106,6 +106,6 @@ This endpoint deletes a PingID MFA method. $ curl \ --header "X-Vault-Token: ..." \ --request DELETE \ - https://vault.rocks/v1/sys/mfa/method/pingid/ping + http://127.0.0.1:8200/v1/sys/mfa/method/pingid/ping ``` diff --git a/website/source/api/system/mfa-totp.html.md b/website/source/api/system/mfa-totp.html.md index 6e1d622061..1e3bc5ebb8 100644 --- a/website/source/api/system/mfa-totp.html.md +++ b/website/source/api/system/mfa-totp.html.md @@ -48,7 +48,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/sys/mfa/method/totp/my_totp + http://127.0.0.1:8200/v1/sys/mfa/method/totp/my_totp ``` ## Read TOTP MFA Method @@ -70,7 +70,7 @@ name. $ curl \ --header "X-Vault-Token: ..." \ --request GET \ - https://vault.rocks/v1/sys/mfa/method/totp/my_totp + http://127.0.0.1:8200/v1/sys/mfa/method/totp/my_totp ``` @@ -112,7 +112,7 @@ This endpoint deletes a TOTP MFA method. $ curl \ --header "X-Vault-Token: ..." \ --request DELETE \ - https://vault.rocks/v1/sys/mfa/method/totp/my_totp + http://127.0.0.1:8200/v1/sys/mfa/method/totp/my_totp ``` @@ -136,7 +136,7 @@ method name. $ curl \ --header "X-Vault-Token: ..." \ --request GET \ - https://vault.rocks/v1/sys/mfa/method/totp/my_totp/generate + http://127.0.0.1:8200/v1/sys/mfa/method/totp/my_totp/generate ``` ### Sample Response @@ -182,7 +182,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json - https://vault.rocks/v1/sys/mfa/method/totp/my_totp/admin-generate + http://127.0.0.1:8200/v1/sys/mfa/method/totp/my_totp/admin-generate ``` ### Sample Response @@ -231,5 +231,5 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json - https://vault.rocks/v1/sys/mfa/method/totp/my_totp/admin-destroy + http://127.0.0.1:8200/v1/sys/mfa/method/totp/my_totp/admin-destroy ``` diff --git a/website/source/api/system/mounts.html.md b/website/source/api/system/mounts.html.md index d2a69900c0..a119af68a7 100644 --- a/website/source/api/system/mounts.html.md +++ b/website/source/api/system/mounts.html.md @@ -23,7 +23,7 @@ This endpoints lists all the mounted secrets engines. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/sys/mounts + http://127.0.0.1:8200/v1/sys/mounts ``` ### Sample Response @@ -139,7 +139,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/sys/mounts/my-mount + http://127.0.0.1:8200/v1/sys/mounts/my-mount ``` ## Disable Secrets Engine @@ -156,7 +156,7 @@ This endpoint disables the mount point specified in the URL. $ curl \ --header "X-Vault-Token: ..." \ --request DELETE \ - https://vault.rocks/v1/sys/mounts/my-mount + http://127.0.0.1:8200/v1/sys/mounts/my-mount ``` ## Read Mount Configuration @@ -174,7 +174,7 @@ be the system default or a mount-specific value. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/sys/mounts/my-mount/tune + http://127.0.0.1:8200/v1/sys/mounts/my-mount/tune ``` ### Sample Response @@ -232,5 +232,5 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/sys/mounts/my-mount/tune + http://127.0.0.1:8200/v1/sys/mounts/my-mount/tune ``` diff --git a/website/source/api/system/plugins-catalog.html.md b/website/source/api/system/plugins-catalog.html.md index 62697c6f0b..ee66673aee 100644 --- a/website/source/api/system/plugins-catalog.html.md +++ b/website/source/api/system/plugins-catalog.html.md @@ -26,7 +26,7 @@ This endpoint lists the plugins in the catalog. $ curl \ --header "X-Vault-Token: ..." \ --request LIST - https://vault.rocks/v1/sys/plugins/catalog + http://127.0.0.1:8200/v1/sys/plugins/catalog ``` ### Sample Response @@ -86,7 +86,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request PUT \ --data @payload.json \ - https://vault.rocks/v1/sys/plugins/catalog/example-plugin + http://127.0.0.1:8200/v1/sys/plugins/catalog/example-plugin ``` ## Read Plugin @@ -111,7 +111,7 @@ This endpoint returns the configuration data for the plugin with the given name. $ curl \ --header "X-Vault-Token: ..." \ --request GET \ - https://vault.rocks/v1/sys/plugins/catalog/example-plugin + http://127.0.0.1:8200/v1/sys/plugins/catalog/example-plugin ``` ### Sample Response @@ -149,5 +149,5 @@ This endpoint removes the plugin with the given name. $ curl \ --header "X-Vault-Token: ..." \ --request DELETE \ - https://vault.rocks/v1/sys/plugins/catalog/example-plugin + http://127.0.0.1:8200/v1/sys/plugins/catalog/example-plugin ``` diff --git a/website/source/api/system/plugins-reload-backend.html.md b/website/source/api/system/plugins-reload-backend.html.md index ea4bd28b2d..d2035f6ac2 100644 --- a/website/source/api/system/plugins-reload-backend.html.md +++ b/website/source/api/system/plugins-reload-backend.html.md @@ -43,5 +43,5 @@ This endpoint reloads mounted plugin backends. $ curl \ --header "X-Vault-Token: ..." \ --request PUT - https://vault.rocks/v1/sys/plugins/reload/backend + http://127.0.0.1:8200/v1/sys/plugins/reload/backend ``` diff --git a/website/source/api/system/policies.html.md b/website/source/api/system/policies.html.md index 4a502864ca..d99a7ea75d 100644 --- a/website/source/api/system/policies.html.md +++ b/website/source/api/system/policies.html.md @@ -26,7 +26,7 @@ This endpoint lists all configured ACL policies. ``` $ curl \ -X LIST --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/sys/policies/acl + http://127.0.0.1:8200/v1/sys/policies/acl ``` ### Sample Response @@ -55,7 +55,7 @@ This endpoint retrieves information about the named ACL policy. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/sys/policies/acl/my-policy + http://127.0.0.1:8200/v1/sys/policies/acl/my-policy ``` ### Sample Response @@ -99,7 +99,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request PUT \ --data @payload.json \ - https://vault.rocks/v1/sys/policies/acl/my-policy + http://127.0.0.1:8200/v1/sys/policies/acl/my-policy ``` ## Delete ACL Policy @@ -123,7 +123,7 @@ acts as an empty policy.) $ curl \ --header "X-Vault-Token: ..." \ --request DELETE \ - https://vault.rocks/v1/sys/policies/acl/my-policy + http://127.0.0.1:8200/v1/sys/policies/acl/my-policy ``` ## List RGP Policies @@ -139,7 +139,7 @@ This endpoint lists all configured RGP policies. ``` $ curl \ -X LIST --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/sys/policies/rgp + http://127.0.0.1:8200/v1/sys/policies/rgp ``` ### Sample Response @@ -168,7 +168,7 @@ This endpoint retrieves information about the named RGP policy. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/sys/policies/rgp/webapp + http://127.0.0.1:8200/v1/sys/policies/rgp/webapp ``` ### Sample Response @@ -218,7 +218,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request PUT \ --data @payload.json \ - https://vault.rocks/v1/sys/policies/rgp/webapp + http://127.0.0.1:8200/v1/sys/policies/rgp/webapp ``` ## Delete RGP Policy @@ -242,7 +242,7 @@ acts as an empty policy.) $ curl \ --header "X-Vault-Token: ..." \ --request DELETE \ - https://vault.rocks/v1/sys/policies/rgp/webapp + http://127.0.0.1:8200/v1/sys/policies/rgp/webapp ``` ## List EGP Policies @@ -264,7 +264,7 @@ path, this endpoint returns two identifiers: ``` $ curl \ -X LIST --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/sys/policies/egp + http://127.0.0.1:8200/v1/sys/policies/egp ``` ### Sample Response @@ -293,7 +293,7 @@ This endpoint retrieves information about the named EGP policy. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/sys/policies/egp/breakglass + http://127.0.0.1:8200/v1/sys/policies/egp/breakglass ``` ### Sample Response @@ -350,7 +350,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request PUT \ --data @payload.json \ - https://vault.rocks/v1/sys/policies/egp/breakglass + http://127.0.0.1:8200/v1/sys/policies/egp/breakglass ``` ## Delete EGP Policy @@ -372,5 +372,5 @@ This endpoint deletes the EGP policy with the given name from all paths on which $ curl \ --header "X-Vault-Token: ..." \ --request DELETE \ - https://vault.rocks/v1/sys/policies/egp/breakglass + http://127.0.0.1:8200/v1/sys/policies/egp/breakglass ``` diff --git a/website/source/api/system/policy.html.md b/website/source/api/system/policy.html.md index 2a5e0cf042..6fcce8bdc6 100644 --- a/website/source/api/system/policy.html.md +++ b/website/source/api/system/policy.html.md @@ -23,7 +23,7 @@ This endpoint lists all configured policies. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/sys/policy + http://127.0.0.1:8200/v1/sys/policy ``` ### Sample Response @@ -52,7 +52,7 @@ This endpoint retrieve the policy body for the named policy. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/sys/policy/my-policy + http://127.0.0.1:8200/v1/sys/policy/my-policy ``` ### Sample Response @@ -94,7 +94,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request PUT \ --data @payload.json \ - https://vault.rocks/v1/sys/policy/my-policy + http://127.0.0.1:8200/v1/sys/policy/my-policy ``` ## Delete Policy @@ -117,5 +117,5 @@ affect all users associated with this policy. $ curl \ --header "X-Vault-Token: ..." \ --request DELETE \ - https://vault.rocks/v1/sys/policy/my-policy + http://127.0.0.1:8200/v1/sys/policy/my-policy ``` diff --git a/website/source/api/system/raw.html.md b/website/source/api/system/raw.html.md index 68766bd1ca..6d55c15e08 100644 --- a/website/source/api/system/raw.html.md +++ b/website/source/api/system/raw.html.md @@ -34,7 +34,7 @@ system. ``` $ curl \ ---header "X-Vault-Token: ..." \ - https://vault.rocks/v1/sys/raw/secret/foo + http://127.0.0.1:8200/v1/sys/raw/secret/foo ``` ### Sample Response @@ -77,7 +77,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request PUT \ --data @payload.json \ - https://vault.rocks/v1/sys/raw/secret/foo + http://127.0.0.1:8200/v1/sys/raw/secret/foo ``` ## List Raw @@ -98,7 +98,7 @@ This endpoint returns a list keys for a given path prefix. $ curl \ --header "X-Vault-Token: ..." \ --request LIST \ - https://vault.rocks/v1/sys/raw/logical + http://127.0.0.1:8200/v1/sys/raw/logical ``` ### Sample Response @@ -135,5 +135,5 @@ storage backend and not the logical path that is exposed via the mount system. $ curl \ --header "X-Vault-Token: ..." \ --request DELETE \ - https://vault.rocks/v1/sys/raw/secret/foo + http://127.0.0.1:8200/v1/sys/raw/secret/foo ``` diff --git a/website/source/api/system/rekey-recovery-key.html.md b/website/source/api/system/rekey-recovery-key.html.md index b85fbe0bb5..360972ebcf 100644 --- a/website/source/api/system/rekey-recovery-key.html.md +++ b/website/source/api/system/rekey-recovery-key.html.md @@ -25,7 +25,7 @@ This endpoint reads the configuration and progress of the current rekey attempt. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/sys/rekey-recovery-key/init + http://127.0.0.1:8200/v1/sys/rekey-recovery-key/init ``` ### Sample Response @@ -97,7 +97,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request PUT \ --data @payload.json \ - https://vault.rocks/v1/sys/rekey-recovery-key/init + http://127.0.0.1:8200/v1/sys/rekey-recovery-key/init ``` ## Cancel Rekey @@ -116,7 +116,7 @@ rekey. $ curl \ --header "X-Vault-Token: ..." \ --request DELETE \ - https://vault.rocks/v1/sys/rekey-recovery-key/init + http://127.0.0.1:8200/v1/sys/rekey-recovery-key/init ``` ## Read Backup Key @@ -134,7 +134,7 @@ fingerprint to hex-encoded PGP-encrypted key. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/sys/rekey-recovery-key/backup + http://127.0.0.1:8200/v1/sys/rekey-recovery-key/backup ``` ### Sample Response @@ -162,7 +162,7 @@ This endpoint deletes the backup copy of PGP-encrypted recovery key shares. $ curl \ --header "X-Vault-Token" \ --request DELETE \ - https://vault.rocks/v1/sys/rekey-recovery-key/backup + http://127.0.0.1:8200/v1/sys/rekey-recovery-key/backup ``` ## Submit Key @@ -199,7 +199,7 @@ $ curl \ --header "X-Vault-Token" \ --request PUT \ --data @payload.json \ - https://vault.rocks/v1/sys/rekey-recovery-key/update + http://127.0.0.1:8200/v1/sys/rekey-recovery-key/update ``` ### Sample Response diff --git a/website/source/api/system/rekey.html.md b/website/source/api/system/rekey.html.md index 5d300e216a..39365d51c5 100644 --- a/website/source/api/system/rekey.html.md +++ b/website/source/api/system/rekey.html.md @@ -28,7 +28,7 @@ This endpoint reads the configuration and progress of the current rekey attempt. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/sys/rekey/init + http://127.0.0.1:8200/v1/sys/rekey/init ``` ### Sample Response @@ -99,7 +99,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request PUT \ --data @payload.json \ - https://vault.rocks/v1/sys/rekey/init + http://127.0.0.1:8200/v1/sys/rekey/init ``` ## Cancel Rekey @@ -118,7 +118,7 @@ rekey. $ curl \ --header "X-Vault-Token: ..." \ --request DELETE \ - https://vault.rocks/v1/sys/rekey/init + http://127.0.0.1:8200/v1/sys/rekey/init ``` ## Read Backup Key @@ -136,7 +136,7 @@ hex-encoded PGP-encrypted key. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/sys/rekey/backup + http://127.0.0.1:8200/v1/sys/rekey/backup ``` ### Sample Response @@ -164,7 +164,7 @@ This endpoint deletes the backup copy of PGP-encrypted unseal keys. $ curl \ --header "X-Vault-Token" \ --request DELETE \ - https://vault.rocks/v1/sys/rekey/backup + http://127.0.0.1:8200/v1/sys/rekey/backup ``` ## Submit Key @@ -201,7 +201,7 @@ $ curl \ --header "X-Vault-Token" \ --request PUT \ --data @payload.json \ - https://vault.rocks/v1/sys/rekey/update + http://127.0.0.1:8200/v1/sys/rekey/update ``` ### Sample Response diff --git a/website/source/api/system/remount.html.md b/website/source/api/system/remount.html.md index 02efe5ad89..1f17c2cbbc 100644 --- a/website/source/api/system/remount.html.md +++ b/website/source/api/system/remount.html.md @@ -40,5 +40,5 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/sys/remount + http://127.0.0.1:8200/v1/sys/remount ``` diff --git a/website/source/api/system/replication-dr.html.md b/website/source/api/system/replication-dr.html.md index 7ddf9d1614..3cb3f7f26f 100644 --- a/website/source/api/system/replication-dr.html.md +++ b/website/source/api/system/replication-dr.html.md @@ -25,7 +25,7 @@ This is an authenticated endpoint. ``` $ curl \ - https://vault.rocks/v1/sys/replication/dr/status + http://127.0.0.1:8200/v1/sys/replication/dr/status ``` ### Sample Response @@ -87,7 +87,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/sys/replication/dr/primary/enable + http://127.0.0.1:8200/v1/sys/replication/dr/primary/enable ``` ## Demote DR Primary @@ -107,7 +107,7 @@ DR replication set without wiping local storage. $ curl \ --header "X-Vault-Token: ..." \ --request POST \ - https://vault.rocks/v1/sys/replication/dr/primary/demote + http://127.0.0.1:8200/v1/sys/replication/dr/primary/demote ``` ## Disable DR Primary @@ -129,7 +129,7 @@ will require a wipe of the underlying storage. $ curl \ --header "X-Vault-Token: ..." \ --request POST \ - https://vault.rocks/v1/sys/replication/dr/primary/disable + http://127.0.0.1:8200/v1/sys/replication/dr/primary/disable ``` ## Generate DR Secondary Token @@ -156,7 +156,7 @@ identifier can later be used to revoke a DR secondary's access. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/sys/replication/dr/primary/secondary-token?id=us-east-1 + http://127.0.0.1:8200/v1/sys/replication/dr/primary/secondary-token?id=us-east-1 ``` ### Sample Response @@ -207,7 +207,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/sys/replication/dr/primary/revoke-secondary + http://127.0.0.1:8200/v1/sys/replication/dr/primary/revoke-secondary ``` ## Enable DR Secondary @@ -254,7 +254,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/sys/replication/dr/secondary/enable + http://127.0.0.1:8200/v1/sys/replication/dr/secondary/enable ``` ## Promote DR Secondary @@ -306,7 +306,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/sys/replication/dr/secondary/promote + http://127.0.0.1:8200/v1/sys/replication/dr/secondary/promote ``` ### Sample Response @@ -382,7 +382,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/sys/replication/dr/secondary/update-primary + http://127.0.0.1:8200/v1/sys/replication/dr/secondary/update-primary ``` ## Generate Disaster Recovery Operation Token @@ -405,7 +405,7 @@ attempt. ``` $ curl \ - https://vault.rocks/v1/sys/replication/dr/secondary/generate-operation-token/attempt + http://127.0.0.1:8200/v1/sys/replication/dr/secondary/generate-operation-token/attempt ``` ### Sample Response @@ -463,7 +463,7 @@ generation attempt can take place at a time. One (and only one) of `otp` or $ curl \ --request PUT \ --data @payload.json \ - https://vault.rocks/v1/sys/replication/dr/secondary/generate-operation-token/attempt + http://127.0.0.1:8200/v1/sys/replication/dr/secondary/generate-operation-token/attempt ``` ### Sample Response @@ -494,7 +494,7 @@ progress made. This must be called to change the OTP or PGP key being used. ``` $ curl \ --request DELETE \ - https://vault.rocks/v1/sys/replication/dr/secondary/generate-operation-token/attempt + http://127.0.0.1:8200/v1/sys/replication/dr/secondary/generate-operation-token/attempt ``` ## Provide Key Share to Generate Token @@ -530,7 +530,7 @@ nonce must be provided with each call. $ curl \ --request PUT \ --data @payload.json \ - https://vault.rocks/v1/sys/replication/dr/secondary/generate-operation-token/update + http://127.0.0.1:8200/v1/sys/replication/dr/secondary/generate-operation-token/update ``` ### Sample Response @@ -579,5 +579,5 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/sys/replication/dr/secondary/operation-token/delete + http://127.0.0.1:8200/v1/sys/replication/dr/secondary/operation-token/delete ``` diff --git a/website/source/api/system/replication-performance.html.md b/website/source/api/system/replication-performance.html.md index 3536cbc444..a36b0d8af5 100644 --- a/website/source/api/system/replication-performance.html.md +++ b/website/source/api/system/replication-performance.html.md @@ -25,7 +25,7 @@ This is an authenticated endpoint. ``` $ curl \ - https://vault.rocks/v1/sys/replication/performance/status + http://127.0.0.1:8200/v1/sys/replication/performance/status ``` ### Sample Response @@ -91,7 +91,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/sys/replication/performance/primary/enable + http://127.0.0.1:8200/v1/sys/replication/performance/primary/enable ``` ## Demote Performance Primary @@ -111,7 +111,7 @@ replication set without wiping local storage. $ curl \ --header "X-Vault-Token: ..." \ --request POST \ - https://vault.rocks/v1/sys/replication/performance/primary/demote + http://127.0.0.1:8200/v1/sys/replication/performance/primary/demote ``` ## Disable Performance Primary @@ -134,7 +134,7 @@ they have connected before) will require a wipe of the underlying storage. $ curl \ --header "X-Vault-Token: ..." \ --request POST \ - https://vault.rocks/v1/sys/replication/performance/primary/disable + http://127.0.0.1:8200/v1/sys/replication/performance/primary/disable ``` ## Generate Performance Secondary Token @@ -171,7 +171,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/sys/replication/performance/primary/secondary-token + http://127.0.0.1:8200/v1/sys/replication/performance/primary/secondary-token ``` ### Sample Response @@ -222,7 +222,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/sys/replication/performance/primary/revoke-secondary + http://127.0.0.1:8200/v1/sys/replication/performance/primary/revoke-secondary ``` ## Create Mounts Filter @@ -261,7 +261,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/sys/replication/performance/primary/mount-filter/us-east-1 + http://127.0.0.1:8200/v1/sys/replication/performance/primary/mount-filter/us-east-1 ``` ## Read Mounts Filter @@ -282,7 +282,7 @@ for a secondary. ``` $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/sys/replication/performance/primary/mount-filter/us-east-1 + http://127.0.0.1:8200/v1/sys/replication/performance/primary/mount-filter/us-east-1 ``` ### Sample Response @@ -312,7 +312,7 @@ This endpoint is used to delete the mount filters for a secondary. $ curl \ --header "X-Vault-Token: ..." \ --request DELETE \ - https://vault.rocks/v1/sys/replication/performance/primary/mount-filter/us-east-1 + http://127.0.0.1:8200/v1/sys/replication/performance/primary/mount-filter/us-east-1 ``` ## Enable Performance Secondary @@ -359,7 +359,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/sys/replication/performance/secondary/enable + http://127.0.0.1:8200/v1/sys/replication/performance/secondary/enable ``` ## Promote Performance Secondary @@ -393,7 +393,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/sys/replication/performance/secondary/promote + http://127.0.0.1:8200/v1/sys/replication/performance/secondary/promote ``` ## Disable Performance Secondary @@ -418,7 +418,7 @@ underlying storage. $ curl \ --header "X-Vault-Token: ..." \ --request POST \ - https://vault.rocks/v1/sys/replication/performance/secondary/disable + http://127.0.0.1:8200/v1/sys/replication/performance/secondary/disable ``` ## Update Performance Secondary's Primary @@ -465,5 +465,5 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/sys/replication/performance/secondary/update-primary + http://127.0.0.1:8200/v1/sys/replication/performance/secondary/update-primary ``` diff --git a/website/source/api/system/replication.html.md b/website/source/api/system/replication.html.md index 7874213179..81fea7bc7e 100644 --- a/website/source/api/system/replication.html.md +++ b/website/source/api/system/replication.html.md @@ -25,7 +25,7 @@ example: an error has caused replication to stop syncing. $ curl \ --header "X-Vault-Token: ..." \ --request POST \ - https://vault.rocks/v1/sys/replication/recover + http://127.0.0.1:8200/v1/sys/replication/recover ``` ### Sample Response @@ -51,7 +51,7 @@ depending on the number and size of objects in the data store. $ curl \ --header "X-Vault-Token: ..." \ --request POST \ - https://vault.rocks/v1/sys/replication/reindex + http://127.0.0.1:8200/v1/sys/replication/reindex ``` ### Sample Response @@ -77,7 +77,7 @@ This is an authenticated endpoint. ``` $ curl \ - https://vault.rocks/v1/sys/replication/status + http://127.0.0.1:8200/v1/sys/replication/status ``` ### Sample Response diff --git a/website/source/api/system/rotate.html.md b/website/source/api/system/rotate.html.md index 3e1bcf4afe..49415e2219 100644 --- a/website/source/api/system/rotate.html.md +++ b/website/source/api/system/rotate.html.md @@ -27,5 +27,5 @@ the new key, while old values are decrypted with previous encryption keys. $ curl \ --header "X-Vault-Token: ..." \ --request PUT \ - https://vault.rocks/v1/sys/rotate + http://127.0.0.1:8200/v1/sys/rotate ``` diff --git a/website/source/api/system/seal-status.html.md b/website/source/api/system/seal-status.html.md index bf5fd0c626..1f0f533018 100644 --- a/website/source/api/system/seal-status.html.md +++ b/website/source/api/system/seal-status.html.md @@ -23,7 +23,7 @@ endpoint. ``` $ curl \ - https://vault.rocks/v1/sys/seal-status + http://127.0.0.1:8200/v1/sys/seal-status ``` ### Sample Response diff --git a/website/source/api/system/seal.html.md b/website/source/api/system/seal.html.md index ef4d221181..96cc89892f 100644 --- a/website/source/api/system/seal.html.md +++ b/website/source/api/system/seal.html.md @@ -26,5 +26,5 @@ Standby nodes should be restarted to get the same effect. Requires a token with $ curl \ --header "X-Vault-Token: ..." \ --request PUT \ - https://vault.rocks/v1/sys/seal + http://127.0.0.1:8200/v1/sys/seal ``` diff --git a/website/source/api/system/step-down.html.md b/website/source/api/system/step-down.html.md index 5a16f607a7..fbb65f2f01 100644 --- a/website/source/api/system/step-down.html.md +++ b/website/source/api/system/step-down.html.md @@ -29,5 +29,5 @@ the path. $ curl \ --header "X-Vault-Token: ..." \ --request PUT \ - https://vault.rocks/v1/sys/step-down + http://127.0.0.1:8200/v1/sys/step-down ``` diff --git a/website/source/api/system/tools.html.md b/website/source/api/system/tools.html.md index 69dfcab737..d3db1606c4 100644 --- a/website/source/api/system/tools.html.md +++ b/website/source/api/system/tools.html.md @@ -41,7 +41,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/sys/tools/random/164 + http://127.0.0.1:8200/v1/sys/tools/random/164 ``` ### Sample Response @@ -93,7 +93,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/sys/tools/hash/sha2-512 + http://127.0.0.1:8200/v1/sys/tools/hash/sha2-512 ``` ### Sample Response diff --git a/website/source/api/system/unseal.html.md b/website/source/api/system/unseal.html.md index 3fd7d43a36..e94052c07f 100644 --- a/website/source/api/system/unseal.html.md +++ b/website/source/api/system/unseal.html.md @@ -46,7 +46,7 @@ Either the `key` or `reset` parameter must be provided; if both are provided, $ curl \ --request PUT \ --data @payload.json \ - https://vault.rocks/v1/sys/unseal + http://127.0.0.1:8200/v1/sys/unseal ``` ### Sample Response diff --git a/website/source/api/system/wrapping-lookup.html.md b/website/source/api/system/wrapping-lookup.html.md index b2b50e2672..d888f7ed88 100644 --- a/website/source/api/system/wrapping-lookup.html.md +++ b/website/source/api/system/wrapping-lookup.html.md @@ -37,7 +37,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/sys/wrapping/lookup + http://127.0.0.1:8200/v1/sys/wrapping/lookup ``` ### Sample Response diff --git a/website/source/api/system/wrapping-rewrap.html.md b/website/source/api/system/wrapping-rewrap.html.md index ebe6a10517..f95b2af569 100644 --- a/website/source/api/system/wrapping-rewrap.html.md +++ b/website/source/api/system/wrapping-rewrap.html.md @@ -41,7 +41,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/sys/wrapping/lookup + http://127.0.0.1:8200/v1/sys/wrapping/lookup ``` ### Sample Response diff --git a/website/source/api/system/wrapping-unwrap.html.md b/website/source/api/system/wrapping-unwrap.html.md index 5a1965ab17..ea99188377 100644 --- a/website/source/api/system/wrapping-unwrap.html.md +++ b/website/source/api/system/wrapping-unwrap.html.md @@ -50,7 +50,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/sys/wrapping/unwrap + http://127.0.0.1:8200/v1/sys/wrapping/unwrap ``` ### Sample Response diff --git a/website/source/api/system/wrapping-wrap.html.md b/website/source/api/system/wrapping-wrap.html.md index 18b704f5b8..1d28256714 100644 --- a/website/source/api/system/wrapping-wrap.html.md +++ b/website/source/api/system/wrapping-wrap.html.md @@ -44,7 +44,7 @@ $ curl \ --header "X-Vault-Wrap-TTL: 60" \ --request POST \ --data @payload.json \ - https://vault.rocks/v1/sys/wrapping/wrap + http://127.0.0.1:8200/v1/sys/wrapping/wrap ``` ### Sample Response diff --git a/website/source/docs/auth/app-id.html.md b/website/source/docs/auth/app-id.html.md index 9ac06ce540..aa9fd70836 100644 --- a/website/source/docs/auth/app-id.html.md +++ b/website/source/docs/auth/app-id.html.md @@ -76,7 +76,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --method POST \ --data '{"user_id": ":user_id"}' \ - https://vault.rocks/v1/auth/app-id/login/:app_id + http://127.0.0.1:8200/v1/auth/app-id/login/:app_id ``` ## Configuration diff --git a/website/source/docs/auth/approle.html.md b/website/source/docs/auth/approle.html.md index 4d76ea1917..c2cc3dde6b 100644 --- a/website/source/docs/auth/approle.html.md +++ b/website/source/docs/auth/approle.html.md @@ -52,7 +52,7 @@ at a different path, use that value instead of `approle`. $ curl \ --request POST \ --data '{"role_id":"988a9df-...","secret_id":"37b74931..."}' \ - https://vault.rocks/v1/auth/approle/login + http://127.0.0.1:8200/v1/auth/approle/login ``` The response will contain the token at `auth.client_token`: @@ -126,7 +126,7 @@ management tool. --header "X-Vault-Token: ..." \ --request POST \ --data '{"type": "approle"}' \ - https://vault.rocks/v1/sys/auth/approle + http://127.0.0.1:8200/v1/sys/auth/approle ``` 1. Create an AppRole with desired set of policies: @@ -136,7 +136,7 @@ management tool. --header "X-Vault-Token: ..." \ --request POST \ --data '{"policies": "dev-policy,test-policy"}' \ - https://vault.rocks/v1/auth/approle/role/my-role + http://127.0.0.1:8200/v1/auth/approle/role/my-role ``` 1. Fetch the identifier of the role: @@ -144,7 +144,7 @@ management tool. ```sh $ curl \ --header "X-Vault-Token: ..." \ - https://vault.rocks/v1/auth/approle/role/my-role/role-id + http://127.0.0.1:8200/v1/auth/approle/role/my-role/role-id ``` The response will look like: @@ -163,7 +163,7 @@ management tool. $ curl \ --header "X-Vault-Token: ..." \ --request POST \ - https://vault.rocks/v1/auth/approle/role/my-role/secret-id + http://127.0.0.1:8200/v1/auth/approle/role/my-role/secret-id ``` The response will look like: diff --git a/website/source/docs/auth/cert.html.md b/website/source/docs/auth/cert.html.md index 0cd0c81c26..665482b909 100644 --- a/website/source/docs/auth/cert.html.md +++ b/website/source/docs/auth/cert.html.md @@ -88,7 +88,7 @@ $ curl \ --cert cert.pem \ --key key.pem \ --data '{"name": "web"}' \ - https://vault.rocks/v1/auth/cert/login + http://127.0.0.1:8200/v1/auth/cert/login ``` ## Configuration diff --git a/website/source/docs/auth/gcp.html.md b/website/source/docs/auth/gcp.html.md index 087e3e9085..21eb8b7ea5 100644 --- a/website/source/docs/auth/gcp.html.md +++ b/website/source/docs/auth/gcp.html.md @@ -66,7 +66,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data '{"role": "dev-role", "jwt": "eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9..."}' \ - https://vault.rocks/v1/auth/gcp/login + http://127.0.0.1:8200/v1/auth/gcp/login ``` The response will contain the token at `auth.client_token`: @@ -148,7 +148,7 @@ management tool. --header "X-Vault-Token: ..." \ --request POST \ --data '{"type": "gcp"}' \ - https://vault.rocks/v1/sys/auth/gcp + http://127.0.0.1:8200/v1/sys/auth/gcp ``` 1. Configure the GCP auth method: @@ -158,7 +158,7 @@ management tool. --header "X-Vault-Token: ..." \ --request POST \ --data '{"credentials": "{...}"}' \ - https://vault.rocks/v1/auth/gcp/config + http://127.0.0.1:8200/v1/auth/gcp/config ``` 1. Create a role: @@ -168,7 +168,7 @@ management tool. --header "X-Vault-Token: ..." \ --request POST \ --data '{"type": "iam", "project": "project-123456", ...}' \ - https://vault.rocks/v1/auth/gcp/role/dev-role + http://127.0.0.1:8200/v1/auth/gcp/role/dev-role ``` ### Plugin Setup diff --git a/website/source/docs/auth/github.html.md b/website/source/docs/auth/github.html.md index 843b726281..728f0f1cf9 100644 --- a/website/source/docs/auth/github.html.md +++ b/website/source/docs/auth/github.html.md @@ -42,7 +42,7 @@ at a different path, use that value instead of `github`. $ curl \ --request POST \ --data '{"token": "MY_TOKEN"}' \ - https://vault.rocks/v1/auth/github/login + http://127.0.0.1:8200/v1/auth/github/login ``` The response will contain a token at `auth.client_token`: diff --git a/website/source/docs/auth/kubernetes.html.md b/website/source/docs/auth/kubernetes.html.md index 9048442594..1a3303ca38 100644 --- a/website/source/docs/auth/kubernetes.html.md +++ b/website/source/docs/auth/kubernetes.html.md @@ -34,7 +34,7 @@ at a different path, use that value instead of `kubernetes`. $ curl \ --request POST \ --data '{"jwt": "your_service_account_jwt", "role": "demo"}' \ - https://vault.rocks/v1/auth/kubernetes/login + http://127.0.0.1:8200/v1/auth/kubernetes/login ``` The response will contain a token at `auth.client_token`: diff --git a/website/source/docs/auth/ldap.html.md b/website/source/docs/auth/ldap.html.md index 44174cab18..a8661491bb 100644 --- a/website/source/docs/auth/ldap.html.md +++ b/website/source/docs/auth/ldap.html.md @@ -58,7 +58,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data '{"password": "foo"}' \ - https://vault.rocks/v1/auth/ldap/login/mitchellh= + http://127.0.0.1:8200/v1/auth/ldap/login/mitchellh= ``` The response will be in JSON. For example: diff --git a/website/source/docs/auth/mfa.html.md b/website/source/docs/auth/mfa.html.md index d8af55ecc4..9367bf2963 100644 --- a/website/source/docs/auth/mfa.html.md +++ b/website/source/docs/auth/mfa.html.md @@ -52,7 +52,7 @@ MFA information should be sent in the POST body encoded as JSON. $ curl \ --request POST \ --data '{"password": "test", "passcode": "111111"}' \ - https://vault.rocks/v1/auth/userpass/login/my-username + http://127.0.0.1:8200/v1/auth/userpass/login/my-username ``` The response is the same as for the original method. diff --git a/website/source/docs/auth/okta.html.md b/website/source/docs/auth/okta.html.md index 8c2e1375dd..c5b8067b4c 100644 --- a/website/source/docs/auth/okta.html.md +++ b/website/source/docs/auth/okta.html.md @@ -36,7 +36,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data '{"password": "MY_PASSWORD"}' \ - https://vault.rocks/v1/auth/okta/login/my-username + http://127.0.0.1:8200/v1/auth/okta/login/my-username ``` The response will contain a token at `auth.client_token`: diff --git a/website/source/docs/auth/radius.html.md b/website/source/docs/auth/radius.html.md index a0e522356c..5d91e5867c 100644 --- a/website/source/docs/auth/radius.html.md +++ b/website/source/docs/auth/radius.html.md @@ -33,7 +33,7 @@ $ curl \ --header "X-Vault-Token: ..." \ --request POST \ --data '{"password": "..."}' \ - https://vault.rocks/v1/auth/radius/login/sethvargo + http://127.0.0.1:8200/v1/auth/radius/login/sethvargo ``` The response will contain a token at `auth.client_token`: diff --git a/website/source/docs/auth/userpass.html.md b/website/source/docs/auth/userpass.html.md index d55a0c5792..e234fffdb0 100644 --- a/website/source/docs/auth/userpass.html.md +++ b/website/source/docs/auth/userpass.html.md @@ -34,7 +34,7 @@ $ vault login -method=userpass \ $ curl \ --request POST \ --data '{"password": "foo"}' \ - https://vault.rocks/v1/auth/userpass/login/mitchellh + http://127.0.0.1:8200/v1/auth/userpass/login/mitchellh ``` The response will contain the token at `auth.client_token`: diff --git a/website/source/docs/enterprise/mfa/index.html.md b/website/source/docs/enterprise/mfa/index.html.md index 92372b3571..4bfe5835d1 100644 --- a/website/source/docs/enterprise/mfa/index.html.md +++ b/website/source/docs/enterprise/mfa/index.html.md @@ -72,7 +72,7 @@ optional. $ curl \ --header "X-Vault-Token: ..." \ --header "X-Vault-MFA:my_totp:695452" \ - https://vault.rocks/v1/secret/foo + http://127.0.0.1:8200/v1/secret/foo ``` ### API diff --git a/website/source/docs/secrets/ssh/signed-ssh-certificates.html.md b/website/source/docs/secrets/ssh/signed-ssh-certificates.html.md index c9d62f6301..0127a57c73 100644 --- a/website/source/docs/secrets/ssh/signed-ssh-certificates.html.md +++ b/website/source/docs/secrets/ssh/signed-ssh-certificates.html.md @@ -76,7 +76,7 @@ be manual or automated using a configuration management tool. The public key is accessible via the API and does not require authentication. ```text - $ curl -o /etc/ssh/trusted-user-ca-keys.pem https://vault.rocks/v1/ssh-client-signer/public_key + $ curl -o /etc/ssh/trusted-user-ca-keys.pem http://127.0.0.1:8200/v1/ssh-client-signer/public_key ``` ```text @@ -295,7 +295,7 @@ configuration on the host machine. target machines. ```text - $ curl https://vault.rocks/v1/ssh-host-signer/public_key + $ curl http://127.0.0.1:8200/v1/ssh-host-signer/public_key ``` ```text diff --git a/website/source/guides/identity/authentication.html.md b/website/source/guides/identity/authentication.html.md index 96772c41c6..11d7150062 100644 --- a/website/source/guides/identity/authentication.html.md +++ b/website/source/guides/identity/authentication.html.md @@ -187,7 +187,7 @@ parameters](/api/system/auth.html#enable-auth-method) of the method. $ curl --header "X-Vault-Token: ..." \ --request POST \ --data '{"type": "approle"}' \ - https://vault.rocks/v1/sys/auth/approle + http://127.0.0.1:8200/v1/sys/auth/approle ``` The above example passes the **type** (`approle`) in the request payload @@ -276,7 +276,7 @@ Before creating a role, create `jenkins` policy: ```shell $ curl --header "X-Vault-Token: ..." --request PUT --data @payload.json \ - https://vault.rocks/v1/sys/policy/jenkins + http://127.0.0.1:8200/v1/sys/policy/jenkins $ cat payload.json { @@ -295,7 +295,7 @@ mode](/docs/auth/approle.html).) ```shell $ curl --header "X-Vault-Token: ..." --request POST \ --data '{"policies":"jenkins"}' \ - https://vault.rocks/v1/auth/approle/role/jenkins + http://127.0.0.1:8200/v1/auth/approle/role/jenkins ``` > There are a number of @@ -315,14 +315,14 @@ separated string. $ curl --header "X-Vault-Token:..." --request POST \ --data '{"policies":"jenkins,anotherpolicy"}' \ - https://vault.rocks/v1/auth/approle/role/jenkins + http://127.0.0.1:8200/v1/auth/approle/role/jenkins ```` To read the jenkins role you just created: ```shell $ curl --header "X-Vault-Token: ..." --request GET \ - https://vault.rocks/v1/auth/approle/role/jenkins | jq + http://127.0.0.1:8200/v1/auth/approle/role/jenkins | jq { "request_id": "b18054ad-1ab5-8d83-eeed-193d97026ee7", "lease_id": "", @@ -425,10 +425,10 @@ payload, or invoke the API with an empty payload. ```shell $ curl --header "X-Vault-Token:..." --request GET \ - https://vault.rocks/v1/auth/approle/role/jenkins/role-id | jq + http://127.0.0.1:8200/v1/auth/approle/role/jenkins/role-id | jq $ curl --header "X-Vault-Token:..." --request POST \ - https://vault.rocks/v1/auth/approle/role/jenkins/secret-id | jq + http://127.0.0.1:8200/v1/auth/approle/role/jenkins/secret-id | jq ``` If you specified `secret_id_ttl`, `secret_id_num_uses`, or `bound_cidr_list` on @@ -484,7 +484,7 @@ $ cat payload.json "secret_id": "ed0a642f-2acf-c2da-232f-1b21300d5f29" } -$ curl --request POST --data @payload.json https://vault.rocks/v1/auth/approle/login | jq +$ curl --request POST --data @payload.json http://127.0.0.1:8200/v1/auth/approle/login | jq { "request_id": "fccae32b-1e6a-9a9c-7666-f5cb07805c1e", "lease_id": "", @@ -576,7 +576,7 @@ You can now pass the `client_token` returned in [Step 4](#step4) in the ```plaintext $ curl --header "X-Vault-Token: 3e7dd0ac-8b3e-8f88-bb37-a2890455ca6e" \ --request GET \ - https://vault.rocks/v1/secret/mysql/webapp | jq + http://127.0.0.1:8200/v1/secret/mysql/webapp | jq { "errors": [] } diff --git a/website/source/guides/identity/lease.html.md b/website/source/guides/identity/lease.html.md index c029af38a5..bdc668fdc0 100644 --- a/website/source/guides/identity/lease.html.md +++ b/website/source/guides/identity/lease.html.md @@ -210,7 +210,7 @@ Where `` is your valid token with read permission on the ```shell $ curl --header "X-Vault-Token: ..." --request GET \ - https://vault.rocks/v1/sys/auth/token/tune | jq + http://127.0.0.1:8200/v1/sys/auth/token/tune | jq { "default_lease_ttl": 2764800, "max_lease_ttl": 2764800, @@ -321,7 +321,7 @@ The following example sets the `ttl` parameter. # Create a new token with TTl of 30 seconds $ curl --header "X-Vault-Token: ..." --request POST \ --data '{"ttl": "30s"}' \ - https://vault.rocks/v1/auth/token/create | jq + http://127.0.0.1:8200/v1/auth/token/create | jq { ... "auth": { @@ -339,7 +339,7 @@ $ curl --header "X-Vault-Token: ..." --request POST \ # Pass the returned token (`client_token`) in the `X-Vault-Token` header to test $ curl --header "X-Vault-Token: f7d88963-1aba-64d7-11a0-9282ae7681d0" \ --request GET \ - https://vault.rocks/v1/auth/token/lookup-self | jq + http://127.0.0.1:8200/v1/auth/token/lookup-self | jq { ... "data": { @@ -363,12 +363,12 @@ token usage. ```shell $ curl --header "X-Vault-Token: ..." --request POST \ - https://vault.rocks/v1/auth/token/renew/ | jq + http://127.0.0.1:8200/v1/auth/token/renew/ | jq # Renew token with 1 hour extension $ curl --header "X-Vault-Token: ..." --request POST \ --data '{"increment": "3600"}' \ - https://vault.rocks/v1/auth/token/renew/ | jq + http://127.0.0.1:8200/v1/auth/token/renew/ | jq ``` -> **NOTE:** Tokens can be renewed as long as its life hasn't reached its max @@ -459,7 +459,7 @@ Set the `num_uses` property in the request payload. ```shell $ curl --header "X-Vault-Token: ..." --request POST \ --data '{ "policies": ["default"], "num_uses":2 }' \ - https://vault.rocks/v1/auth/token/create | jq + http://127.0.0.1:8200/v1/auth/token/create | jq { "request_id": "0e98ff80-2825-7f50-6522-b6f95d596ef4", "lease_id": "", @@ -488,7 +488,7 @@ This creates a token with the _default_ policy and a use limit of 2. ```text $ curl --header "X-Vault-Token: d9c2f2e5-6b8a-4021-476c-ebd3f166d668" \ --request GET \ - https://vault.rocks/v1/auth/token/lookup-self | jq + http://127.0.0.1:8200/v1/auth/token/lookup-self | jq { "request_id": "77be1321-c0ca-e099-6f92-4ad87133b044", "lease_id": "", @@ -511,12 +511,12 @@ $ curl --header "X-Vault-Token: d9c2f2e5-6b8a-4021-476c-ebd3f166d668" \ $ curl --header "X-Vault-Token: d9c2f2e5-6b8a-4021-476c-ebd3f166d668" \ --request POST \ --data '{ "value": "d9c2f2e5-6b8a-4021-476c-ebd3f166d668" }' \ - https://vault.rocks/v1/cubbyhole/token + http://127.0.0.1:8200/v1/cubbyhole/token $ curl --header "X-Vault-Token: d9c2f2e5-6b8a-4021-476c-ebd3f166d668" \ --request GET \ - https://vault.rocks/v1/cubbyhole/token | jq + http://127.0.0.1:8200/v1/cubbyhole/token | jq { "errors": [ "permission denied" @@ -581,7 +581,7 @@ token renewal period. This value can be an integer value in seconds (e.g. ```shell $ curl --header "X-Vault-Token: ..." --request POST \ --data @payload.json \ - https://vault.rocks/v1/auth/token/roles/zabbix + http://127.0.0.1:8200/v1/auth/token/roles/zabbix $ cat payload.json { @@ -599,7 +599,7 @@ Now, generate a token: ```plaintext $ curl --header "X-Vault-Token: ..." --request POST \ - https://vault.rocks/v1/auth/token/create/zabbix | jq + http://127.0.0.1:8200/v1/auth/token/create/zabbix | jq { ... "auth": { @@ -643,7 +643,7 @@ Or ```plaintext $ curl --header "X-Vault-Token:..." --request POST \ --data @payload.json \ - https://vault.rocks/v1/auth/approle/role/jenkins + http://127.0.0.1:8200/v1/auth/approle/role/jenkins $ cat payload.json { @@ -676,7 +676,7 @@ $ vault token create -orphan ```shell $ curl --header "X-Vault-Token:..." --request POST \ --data '{ "no_parent": true }' \ - https://vault.rocks/v1/auth/token/create-orphan | jq + http://127.0.0.1:8200/v1/auth/token/create-orphan | jq ``` @@ -723,15 +723,15 @@ To revoke a specific token, call `/auth/token/revoke` endpoint. If you want to # Revoke a specific token $ curl --header "X-Vault-Token:..." --request POST \ --data '{ "token": "eeaf890e-4b0f-a687-4190-c75b1d6d70bc" }' \ - https://vault.rocks/v1/auth/token/revoke + http://127.0.0.1:8200/v1/auth/token/revoke # Revoke all secrets for database auth method $ curl --header "X-Vault-Token:..." --request POST \ - https://vault.rocks/v1/sys/leases/revoke-prefix/database/creds + http://127.0.0.1:8200/v1/sys/leases/revoke-prefix/database/creds # Revoke all tokens $ curl --header "X-Vault-Token:..." --request POST \ - https://vault.rocks/v1/sys/leases/revoke-prefix/auth/token/create + http://127.0.0.1:8200/v1/sys/leases/revoke-prefix/auth/token/create ``` @@ -776,7 +776,7 @@ Or ```shell $ curl --header "X-Vault-Token:..." --request POST \ --data '{ "max_lease_ttl": 129600}' \ - https://vault.rocks/v1/sys/mounts/database/tune + http://127.0.0.1:8200/v1/sys/mounts/database/tune ``` diff --git a/website/source/guides/identity/policies.html.md b/website/source/guides/identity/policies.html.md index 07fdc6c00a..912284cdd5 100644 --- a/website/source/guides/identity/policies.html.md +++ b/website/source/guides/identity/policies.html.md @@ -350,7 +350,7 @@ Now, create `admin` and `provisioner` policies: ```shell # Create admin policy $ curl --request PUT --header "X-Vault-Token: ..." --data @admin-payload.json \ - https://vault.rocks/v1/sys/policy/admin + http://127.0.0.1:8200/v1/sys/policy/admin $ cat admin-payload.json { @@ -359,7 +359,7 @@ $ cat admin-payload.json # Create provisioner policy $ curl --request PUT --header "X-Vault-Token: ..." --data @provisioner-payload.json \ - https://vault.rocks/v1/sys/policy/provisioner + http://127.0.0.1:8200/v1/sys/policy/provisioner $ cat provisioner-payload.json { @@ -424,7 +424,7 @@ path "sys/policy/*" To list existing ACL policies, use the `/sys/policy` endpoint. ```shell -$ curl --request LIST --header "X-Vault-Token: ..." https://vault.rocks/v1/sys/policy | jq +$ curl --request LIST --header "X-Vault-Token: ..." http://127.0.0.1:8200/v1/sys/policy | jq ``` To read a specific policy, the endpoint path should be @@ -435,7 +435,7 @@ To read a specific policy, the endpoint path should be Read the admin policy: ```plaintext -$ curl --request GET --header "X-Vault-Token: ..." https://vault.rocks/v1/sys/policy/admin | jq +$ curl --request GET --header "X-Vault-Token: ..." http://127.0.0.1:8200/v1/sys/policy/admin | jq { "name": "admin", "rules": "# Mount and manage auth methods broadly across Vault\npath \"auth/*\"\n{\n ...", @@ -506,7 +506,7 @@ First, create a token attached to the `admin` policy: ```shell $ curl --request POST --header "X-Vault-Token: ..." --data '{ "policies":"admin" }' \ - https://vault.rocks/v1/auth/token/create + http://127.0.0.1:8200/v1/auth/token/create { "request_id": "870ef38c-1401-7beb-633c-ff09cca3db68", "lease_id": "", @@ -540,7 +540,7 @@ $ cat payload.json } $ curl --request POST --header "X-Vault-Token: ..." --data @payload.json \ - https://vault.rocks/v1/sys/capabilities + http://127.0.0.1:8200/v1/sys/capabilities { "capabilities": [ "create", @@ -577,7 +577,7 @@ the `sys/capabilities-self` endpoint. ```plaintext $ curl --request POST --header "X-Vault-Token: ..." --data '{"path":"sys/auth/approle"}' \ - https://vault.rocks/v1/sys/capabilities-self + http://127.0.0.1:8200/v1/sys/capabilities-self ``` diff --git a/website/source/guides/secret-mgmt/cubbyhole.html.md b/website/source/guides/secret-mgmt/cubbyhole.html.md index dd9b2d1f21..fc4cefcdea 100644 --- a/website/source/guides/secret-mgmt/cubbyhole.html.md +++ b/website/source/guides/secret-mgmt/cubbyhole.html.md @@ -207,7 +207,7 @@ $ cat payload.json # API call to create a policy named, "apps" $ curl --header "X-Vault-Token: ..." --request PUT --data @payload.json \ - https://vault.rocks/v1/sys/policy/apps + http://127.0.0.1:8200/v1/sys/policy/apps ``` Response wrapping is per-request and is triggered by providing to Vault the @@ -235,7 +235,7 @@ $ curl --header "X-Vault-Wrap-TTL: 120" \ --header "X-Vault-Token: ..." \ --request POST \ --data '{"policies":["apps"]}' \ - https://vault.rocks/v1/auth/token/create | jq + http://127.0.0.1:8200/v1/auth/token/create | jq { "request_id": "", "lease_id": "", @@ -355,7 +355,7 @@ First, create a token with `default` policy: # Create a new token default policy $ curl --header "X-Vault-Token: ..." --request POST \ --data '{"policies": "default"}' \ - https://vault.rocks/v1/auth/token/create | jq + http://127.0.0.1:8200/v1/auth/token/create | jq { ... "auth": { @@ -371,7 +371,7 @@ $ curl --header "X-Vault-Token: ..." --request POST \ # Verify that you can NOT read secret/dev using default token $ curl --header "X-Vault-Token: 5fe14760-b0fd-22dc-403c-14a05003b67f" \ --request GET \ - https://vault.rocks/v1/secret/dev | jq + http://127.0.0.1:8200/v1/secret/dev | jq { "errors": [ "permission denied" @@ -392,7 +392,7 @@ $ curl --header "X-Vault-Token: " \ ```shell $ curl --header "X-Vault-Token: e095129f-123a-4fef-c007-1f6a487cfa78" \ --request POST \ - https://vault.rocks/v1/sys/wrapping/unwrap | jq + http://127.0.0.1:8200/v1/sys/wrapping/unwrap | jq { "request_id": "d704435d-c1cf-b8a3-52f6-ec50bc8246c4", "lease_id": "", @@ -421,7 +421,7 @@ token. ```plaintext $ curl --header "X-Vault-Token: af5f7682-aa55-fa37-5039-ee116df56600" \ --request GET \ - https://vault.rocks/v1/secret/dev | jq + http://127.0.0.1:8200/v1/secret/dev | jq { "errors": [] } @@ -509,11 +509,11 @@ Write secrets under `cubbyhole/private/` path, and read it back. # Write "token" to cubbyhole/private/access-token path $ curl --header "X-Vault-Token: e095129f-123a-4fef-c007-1f6a487cfa78" --request POST \ --data '{"token": "123456789abcdefg87654321"}' \ - https://vault.rocks/v1/cubbyhole/private/access-token + http://127.0.0.1:8200/v1/cubbyhole/private/access-token # Read value from cubbyhole/private/access-token path $ curl --header "X-Vault-Token: e095129f-123a-4fef-c007-1f6a487cfa78" --request GET \ - https://vault.rocks/v1/cubbyhole/private/access-token | jq + http://127.0.0.1:8200/v1/cubbyhole/private/access-token | jq { "request_id": "b2ff9f04-7a72-7eb0-672f-225b5eb652df", "lease_id": "", @@ -533,7 +533,7 @@ secret. ```shell $ curl --header "X-Vault-Token: root" --request GET \ - https://vault.rocks/v1/cubbyhole/private/access-token | jq + http://127.0.0.1:8200/v1/cubbyhole/private/access-token | jq { "errors": [] } diff --git a/website/source/guides/secret-mgmt/dynamic-secrets.html.md b/website/source/guides/secret-mgmt/dynamic-secrets.html.md index c9541c4ac1..7b851748c3 100644 --- a/website/source/guides/secret-mgmt/dynamic-secrets.html.md +++ b/website/source/guides/secret-mgmt/dynamic-secrets.html.md @@ -229,7 +229,7 @@ $ vault write database/config/postgresql plugin_name=postgresql-database-plugin ```shell $ curl --header "X-Vault-Token: ..." --request POST --data @payload.json \ - https://vault.rocks/v1/database/config/postgresql + http://127.0.0.1:8200/v1/database/config/postgresql $ cat payload.json { @@ -280,7 +280,7 @@ statement is passed as the role creation statement. ```shell $ curl --header "X-Vault-Token: ..." --request POST --data @payload.json \ - https://vault.rocks/v1/database/roles/readonly + http://127.0.0.1:8200/v1/database/roles/readonly $ cat payload.json { @@ -381,12 +381,12 @@ $ cat payload.json # Create "apps" policy $ curl --header "X-Vault-Token: ..." --request PUT \ --data @payload.json \ - https://vault.rocks/v1/sys/policy/apps + http://127.0.0.1:8200/v1/sys/policy/apps # Generate a new token with apps policy $ curl --header "X-Vault-Token: ..." --request POST \ --data '{"policies": ["apps"]}' \ - https://vault.rocks/v1/auth/token/create | jq + http://127.0.0.1:8200/v1/auth/token/create | jq { "request_id": "e1737bc8-7e51-3943-42a0-2dbd6cb40e3e", "lease_id": "", @@ -418,7 +418,7 @@ demonstrates more sophisticated way of generating a token for your apps. ```shell $ curl --header "X-Vault-Token: 1c97b03a-6098-31cf-9d8b-b404e52dcb4a" \ --request GET \ - https://vault.rocks/v1/database/creds/readonly | jq + http://127.0.0.1:8200/v1/database/creds/readonly | jq { "request_id": "e0e5a6c1-5e69-5cf3-c9d2-020af192de36", "lease_id": "database/creds/readonly/7aa462ab-98cb-fdcb-b226-f0a0d37644cc", diff --git a/website/source/guides/secret-mgmt/static-secrets.html.md b/website/source/guides/secret-mgmt/static-secrets.html.md index 0b69128ee1..8e30c10cab 100644 --- a/website/source/guides/secret-mgmt/static-secrets.html.md +++ b/website/source/guides/secret-mgmt/static-secrets.html.md @@ -180,7 +180,7 @@ secrets, and `secret/` is the path to your secrets. ```shell $ curl --header "X-Vault-Token: ..." --request POST \ --data '{"key": "AAaaBBccDDeeOTXzSMT1234BB_Z8JzG7JkSVxI"}' \ - https://vault.rocks/v1/secret/eng/apikey/Google + http://127.0.0.1:8200/v1/secret/eng/apikey/Google ``` The secret key is "key" and its value is @@ -254,7 +254,7 @@ To perform the same task using the Vault API, pass the token in the request head $ curl --header "X-Vault-Token: ..." \ --request POST \ --data @cert.pem \ - https://vault.rocks/v1/secret/prod/cert/mysql + http://127.0.0.1:8200/v1/secret/prod/cert/mysql ``` > **NOTE:** Any value begins with "@" is loaded from a file. @@ -321,12 +321,12 @@ $ cat payload.json # Create "apps" policy $ curl --header "X-Vault-Token: ..." --request PUT \ --data @payload.json \ - https://vault.rocks/v1/sys/policy/apps + http://127.0.0.1:8200/v1/sys/policy/apps # Generate a new token with apps policy $ curl --header "X-Vault-Token: ..." --request POST \ --data '{"policies": ["apps"]}' \ - https://vault.rocks/v1/auth/token/create | jq + http://127.0.0.1:8200/v1/auth/token/create | jq { "request_id": "e1737bc8-7e51-3943-42a0-2dbd6cb40e3e", "lease_id": "", @@ -431,7 +431,7 @@ Read the Google API key. ```shell $ curl --header "X-Vault-Token: 1c97b03a-6098-31cf-9d8b-b404e52dcb4a" \ --request GET \ - https://vault.rocks/v1/secret/eng/apikey/Google | jq + http://127.0.0.1:8200/v1/secret/eng/apikey/Google | jq { "request_id": "5a2005ac-1149-2275-cab3-76cee71bf524", "lease_id": "", @@ -453,7 +453,7 @@ Retrieve the key value with `jq`: ```shell $ curl --header "X-Vault-Token: 1c97b03a-6098-31cf-9d8b-b404e52dcb4a" \ --request GET \ - https://vault.rocks/v1/secret/eng/apikey/Google | jq ".data.key" + http://127.0.0.1:8200/v1/secret/eng/apikey/Google | jq ".data.key" ``` #### Root certificate example: @@ -461,7 +461,7 @@ $ curl --header "X-Vault-Token: 1c97b03a-6098-31cf-9d8b-b404e52dcb4a" \ ```shell $ curl --header "X-Vault-Token: 1c97b03a-6098-31cf-9d8b-b404e52dcb4a" \ --request GET \ - https://vault.rocks/v1/secret/prod/cert/mysql | jq ".data.cert" + http://127.0.0.1:8200/v1/secret/prod/cert/mysql | jq ".data.cert" ``` ## Additional Discussion