Drop vault.rocks (#4186)

This commit is contained in:
Seth Vargo
2018-03-23 23:41:51 +08:00
committed by Jeff Mitchell
parent 6c0b238459
commit 04708d554c
101 changed files with 524 additions and 524 deletions

View File

@@ -30,7 +30,7 @@ This endpoint returns a list the existing AppRoles in the method.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request LIST \ --request LIST \
https://vault.rocks/v1/auth/approle/role http://127.0.0.1:8200/v1/auth/approle/role
``` ```
### Sample Response ### Sample Response
@@ -116,7 +116,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/auth/approle/role/application1 http://127.0.0.1:8200/v1/auth/approle/role/application1
``` ```
## Read AppRole ## Read AppRole
@@ -136,7 +136,7 @@ Reads the properties of an existing AppRole.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/auth/approle/role/application1 http://127.0.0.1:8200/v1/auth/approle/role/application1
``` ```
### Sample Response ### Sample Response
@@ -182,7 +182,7 @@ Deletes an existing AppRole from the method.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request DELETE \ --request DELETE \
https://vault.rocks/v1/auth/approle/role/application1 http://127.0.0.1:8200/v1/auth/approle/role/application1
``` ```
## Read AppRole Role ID ## Read AppRole Role ID
@@ -202,7 +202,7 @@ Reads the RoleID of an existing AppRole.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/auth/approle/role/application1/role-id http://127.0.0.1:8200/v1/auth/approle/role/application1/role-id
``` ```
### Sample Response ### Sample Response
@@ -249,7 +249,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/auth/approle/role/application1/role-id http://127.0.0.1:8200/v1/auth/approle/role/application1/role-id
``` ```
### Sample Response ### Sample Response
@@ -306,7 +306,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/auth/approle/role/application1/secret-id http://127.0.0.1:8200/v1/auth/approle/role/application1/secret-id
``` ```
### Sample Response ### Sample Response
@@ -345,7 +345,7 @@ This includes the accessors for "custom" SecretIDs as well.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request LIST \ --request LIST \
https://vault.rocks/v1/auth/approle/role/application1/secret-id http://127.0.0.1:8200/v1/auth/approle/role/application1/secret-id
``` ```
### Sample Response ### Sample Response
@@ -398,7 +398,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--payload @payload.json \ --payload @payload.json \
https://vault.rocks/v1/auth/approle/role/application1/secret-id/lookup http://127.0.0.1:8200/v1/auth/approle/role/application1/secret-id/lookup
``` ```
## Destroy AppRole Secret ID ## Destroy AppRole Secret ID
@@ -429,7 +429,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--payload @payload.json \ --payload @payload.json \
https://vault.rocks/v1/auth/approle/role/application1/secret-id/destroy http://127.0.0.1:8200/v1/auth/approle/role/application1/secret-id/destroy
``` ```
## Read AppRole Secret ID Accessor ## Read AppRole Secret ID Accessor
@@ -460,7 +460,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--payload @payload.json \ --payload @payload.json \
https://vault.rocks/v1/auth/approle/role/application1/secret-id-accessor/lookup http://127.0.0.1:8200/v1/auth/approle/role/application1/secret-id-accessor/lookup
``` ```
## Destroy AppRole Secret ID Accessor ## Destroy AppRole Secret ID Accessor
@@ -491,7 +491,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--payload @payload.json \ --payload @payload.json \
https://vault.rocks/v1/auth/approle/role/application1/secret-id-accessor/destroy http://127.0.0.1:8200/v1/auth/approle/role/application1/secret-id-accessor/destroy
``` ```
## Create Custom AppRole Secret ID ## Create Custom AppRole Secret ID
@@ -531,7 +531,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/auth/approle/role/application1/custom-secret-id http://127.0.0.1:8200/v1/auth/approle/role/application1/custom-secret-id
``` ```
### Sample Response ### Sample Response
@@ -582,7 +582,7 @@ AppRole (such as client IP CIDR) are also evaluated.
$ curl \ $ curl \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/auth/approle/login http://127.0.0.1:8200/v1/auth/approle/login
``` ```
### Sample Response ### Sample Response

View File

@@ -81,7 +81,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/auth/aws/config/client http://127.0.0.1:8200/v1/auth/aws/config/client
``` ```
## Read Config ## Read Config
@@ -97,7 +97,7 @@ Returns the previously configured AWS access credentials.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/auth/aws/config/client http://127.0.0.1:8200/v1/auth/aws/config/client
``` ```
### Sample Response ### Sample Response
@@ -129,7 +129,7 @@ Deletes the previously configured AWS access credentials.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request DELETE \ --request DELETE \
https://vault.rocks/v1/auth/aws/config/client http://127.0.0.1:8200/v1/auth/aws/config/client
``` ```
## Create Certificate Configuration ## Create Certificate Configuration
@@ -170,7 +170,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/auth/aws/config/certificate/test-cert http://127.0.0.1:8200/v1/auth/aws/config/certificate/test-cert
``` ```
## Read Certificate Configuration ## Read Certificate Configuration
@@ -190,7 +190,7 @@ Returns the previously configured AWS public key.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/auth/aws/config/certificate/test-cert http://127.0.0.1:8200/v1/auth/aws/config/certificate/test-cert
``` ```
### Sample Response ### Sample Response
@@ -218,7 +218,7 @@ Removes the previously configured AWS public key.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request DELETE \ --request DELETE \
https://vault.rocks/v1/auth/aws/config/certificate/test-cert http://127.0.0.1:8200/v1/auth/aws/config/certificate/test-cert
``` ```
## List Certificate Configurations ## List Certificate Configurations
@@ -235,7 +235,7 @@ Lists all the AWS public certificates that are registered with the method.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request LIST \ --request LIST \
https://vault.rocks/v1/auth/aws/config/certificates http://127.0.0.1:8200/v1/auth/aws/config/certificates
``` ```
### Sample Response ### Sample Response
@@ -285,7 +285,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/auth/aws/config/sts/111122223333 http://127.0.0.1:8200/v1/auth/aws/config/sts/111122223333
``` ```
## Read STS Role ## Read STS Role
@@ -307,7 +307,7 @@ Returns the previously configured STS role.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/auth/aws/config/sts/111122223333 http://127.0.0.1:8200/v1/auth/aws/config/sts/111122223333
``` ```
### Sample Response ### Sample Response
@@ -334,7 +334,7 @@ Lists all the AWS Account IDs for which an STS role is registered.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request LIST \ --request LIST \
https://vault.rocks/v1/auth/aws/config/sts http://127.0.0.1:8200/v1/auth/aws/config/sts
``` ```
### Sample Response ### Sample Response
@@ -364,7 +364,7 @@ Deletes a previously configured AWS account/STS role association.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request DELETE \ --request DELETE \
https://vault.rocks/v1/auth/aws/config/sts http://127.0.0.1:8200/v1/auth/aws/config/sts
``` ```
## Configure Identity Whitelist Tidy Operation ## Configure Identity Whitelist Tidy Operation
@@ -398,7 +398,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/auth/aws/config/tidy/identity-whitelist http://127.0.0.1:8200/v1/auth/aws/config/tidy/identity-whitelist
``` ```
## Read Identity Whitelist Tidy Settings ## Read Identity Whitelist Tidy Settings
@@ -414,7 +414,7 @@ Returns the previously configured periodic whitelist tidying settings.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/auth/aws/config/tidy/identity-whitelist http://127.0.0.1:8200/v1/auth/aws/config/tidy/identity-whitelist
``` ```
### Sample Response ### Sample Response
@@ -442,7 +442,7 @@ Deletes the previously configured periodic whitelist tidying settings.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request DELETE \ --request DELETE \
https://vault.rocks/v1/auth/aws/config/tidy/identity-whitelist http://127.0.0.1:8200/v1/auth/aws/config/tidy/identity-whitelist
``` ```
## Configure Role Tag Blacklist Tidy Operation ## Configure Role Tag Blacklist Tidy Operation
@@ -476,7 +476,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/auth/aws/config/tidy/roletag-blacklist http://127.0.0.1:8200/v1/auth/aws/config/tidy/roletag-blacklist
``` ```
## Read Role Tag Blacklist Tidy Settings ## Read Role Tag Blacklist Tidy Settings
@@ -492,7 +492,7 @@ Returns the previously configured periodic blacklist tidying settings.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/auth/aws/config/tidy/roletag-blacklist http://127.0.0.1:8200/v1/auth/aws/config/tidy/roletag-blacklist
``` ```
### Sample Response ### Sample Response
@@ -520,7 +520,7 @@ Deletes the previously configured periodic blacklist tidying settings.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request DELETE \ --request DELETE \
https://vault.rocks/v1/auth/aws/config/tidy/roletag-blacklist http://127.0.0.1:8200/v1/auth/aws/config/tidy/roletag-blacklist
``` ```
## Create Role ## Create Role
@@ -705,7 +705,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/auth/aws/role/dev-role http://127.0.0.1:8200/v1/auth/aws/role/dev-role
``` ```
## Read Role ## Read Role
@@ -725,7 +725,7 @@ Returns the previously registered role configuration.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/auth/aws/role/dev-role http://127.0.0.1:8200/v1/auth/aws/role/dev-role
``` ```
### Sample Response ### Sample Response
@@ -761,7 +761,7 @@ Lists all the roles that are registered with the method.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request LIST \ --request LIST \
https://vault.rocks/v1/auth/aws/roles http://127.0.0.1:8200/v1/auth/aws/roles
``` ```
### Sample Response ### Sample Response
@@ -795,7 +795,7 @@ Deletes the previously registered role.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request DELETE \ --request DELETE \
https://vault.rocks/v1/auth/aws/role/dev-role http://127.0.0.1:8200/v1/auth/aws/role/dev-role
``` ```
## Create Role Tags ## Create Role Tags
@@ -855,7 +855,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/auth/aws/role/dev-api-and-web-role/tag http://127.0.0.1:8200/v1/auth/aws/role/dev-api-and-web-role/tag
``` ```
### Sample Response ### Sample Response
@@ -948,7 +948,7 @@ along with its RSA digest can be supplied to this endpoint.
$ curl \ $ curl \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/auth/aws/login http://127.0.0.1:8200/v1/auth/aws/login
``` ```
### Sample Response ### Sample Response
@@ -999,7 +999,7 @@ token.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
https://vault.rocks/v1/auth/aws/roletag-blacklist/djE6MDlWcDBxR3V5Qjg9OmE9YW1pLWZjZTNjNjk2OnA9ZGVmYXVsdCxwcm9kOmQ9ZmFsc2U6dD0zMDBoMG0wczp1UExLQ1F4cXNlZlJocnAxcW1WYTF3c1FWVVhYSkc4VVpQLwo= http://127.0.0.1:8200/v1/auth/aws/roletag-blacklist/djE6MDlWcDBxR3V5Qjg9OmE9YW1pLWZjZTNjNjk2OnA9ZGVmYXVsdCxwcm9kOmQ9ZmFsc2U6dD0zMDBoMG0wczp1UExLQ1F4cXNlZlJocnAxcW1WYTF3c1FWVVhYSkc4VVpQLwo=
``` ```
### Read Role Tag Blacklist Information ### Read Role Tag Blacklist Information
@@ -1021,7 +1021,7 @@ Returns the blacklist entry of a previously blacklisted role tag.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/auth/aws/roletag-blacklist/djE6MDlWcDBxR3V5Qjg9OmE9YW1pLWZjZTNjNjk2OnA9ZGVmYXVsdCxwcm9kOmQ9ZmFsc2U6dD0zMDBoMG0wczp1UExLQ1F4cXNlZlJocnAxcW1WYTF3c1FWVVhYSkc4VVpQLwo= http://127.0.0.1:8200/v1/auth/aws/roletag-blacklist/djE6MDlWcDBxR3V5Qjg9OmE9YW1pLWZjZTNjNjk2OnA9ZGVmYXVsdCxwcm9kOmQ9ZmFsc2U6dD0zMDBoMG0wczp1UExLQ1F4cXNlZlJocnAxcW1WYTF3c1FWVVhYSkc4VVpQLwo=
``` ```
@@ -1050,7 +1050,7 @@ Lists all the role tags that are blacklisted.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request LIST \ --request LIST \
https://vault.rocks/v1/auth/aws/roletag-blacklist http://127.0.0.1:8200/v1/auth/aws/roletag-blacklist
``` ```
### Sample Response ### Sample Response
@@ -1086,7 +1086,7 @@ Deletes a blacklisted role tag.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request DELETE \ --request DELETE \
https://vault.rocks/v1/auth/aws/roletag-blacklist/djE6MDlWcDBxR3V5Qjg9OmE9YW1pLWZjZTNjNjk2OnA9ZGVmYXVsdCxwcm9kOmQ9ZmFsc2U6dD0zMDBoMG0wczp1UExLQ1F4cXNlZlJocnAxcW1WYTF3c1FWVVhYSkc4VVpQLwo= http://127.0.0.1:8200/v1/auth/aws/roletag-blacklist/djE6MDlWcDBxR3V5Qjg9OmE9YW1pLWZjZTNjNjk2OnA9ZGVmYXVsdCxwcm9kOmQ9ZmFsc2U6dD0zMDBoMG0wczp1UExLQ1F4cXNlZlJocnAxcW1WYTF3c1FWVVhYSkc4VVpQLwo=
``` ```
## Tidy Blacklist Tags ## Tidy Blacklist Tags
@@ -1110,7 +1110,7 @@ Cleans up the entries in the blacklist based on expiration time on the entry and
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
https://vault.rocks/v1/auth/aws/tidy/roletag-blacklist http://127.0.0.1:8200/v1/auth/aws/tidy/roletag-blacklist
``` ```
### Read Identity Whitelist Information ### Read Identity Whitelist Information
@@ -1133,7 +1133,7 @@ successful login.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/auth/aws/identity-whitelist/i-aab47d37 http://127.0.0.1:8200/v1/auth/aws/identity-whitelist/i-aab47d37
``` ```
@@ -1165,7 +1165,7 @@ $ curl \
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request LIST \ --request LIST \
https://vault.rocks/v1/auth/aws/roletag-blacklist http://127.0.0.1:8200/v1/auth/aws/roletag-blacklist
``` ```
### Sample Response ### Sample Response
@@ -1200,7 +1200,7 @@ Deletes a cache of the successful login from an instance.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request DELETE \ --request DELETE \
https://vault.rocks/v1/auth/aws/identity-whitelist/i-aab47d37 http://127.0.0.1:8200/v1/auth/aws/identity-whitelist/i-aab47d37
``` ```
## Tidy Identity Whitelist Entries ## Tidy Identity Whitelist Entries
@@ -1224,5 +1224,5 @@ Cleans up the entries in the whitelist based on expiration time and
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
https://vault.rocks/v1/auth/aws/tidy/identity-whitelist http://127.0.0.1:8200/v1/auth/aws/tidy/identity-whitelist
``` ```

View File

@@ -71,7 +71,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json --data @payload.json
https://vault.rocks/v1/auth/cert/certs/test-ca http://127.0.0.1:8200/v1/auth/cert/certs/test-ca
``` ```
## Read CA Certificate Role ## Read CA Certificate Role
@@ -91,7 +91,7 @@ Gets information associated with the named role.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/auth/cert/certs/test-ca http://127.0.0.1:8200/v1/auth/cert/certs/test-ca
``` ```
### Sample Response ### Sample Response
@@ -130,7 +130,7 @@ Lists configured certificate names.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request LIST \ --request LIST \
https://vault.rocks/v1/auth/cert/certs http://127.0.0.1:8200/v1/auth/cert/certs
### Sample Response ### Sample Response
@@ -169,7 +169,7 @@ Deletes the named role and CA cert from the method mount.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request DELETE \ --request DELETE \
https://vault.rocks/v1/auth/cert/certs/cert1 http://127.0.0.1:8200/v1/auth/cert/certs/cert1
``` ```
## Create CRL ## Create CRL
@@ -201,7 +201,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--date @payload.json \ --date @payload.json \
https://vault.rocks/v1/auth/cert/crls/custom-crl http://127.0.0.1:8200/v1/auth/cert/crls/custom-crl
``` ```
## Read CRL ## Read CRL
@@ -223,7 +223,7 @@ arbitrary size, these are returned as strings.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/auth/cert/crls/custom-crl http://127.0.0.1:8200/v1/auth/cert/crls/custom-crl
``` ```
### Sample Response ### Sample Response
@@ -261,7 +261,7 @@ Deletes the named CRL from the auth method mount.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request DELETE \ --request DELETE \
https://vault.rocks/v1/auth/cert/crls/cert1 http://127.0.0.1:8200/v1/auth/cert/crls/cert1
``` ```
## Configure TLS Certificate Method ## Configure TLS Certificate Method
@@ -293,7 +293,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--date @payload.json \ --date @payload.json \
https://vault.rocks/v1/auth/cert/certs/cert1 http://127.0.0.1:8200/v1/auth/cert/certs/cert1
``` ```
## Login with TLS Certificate Method ## Login with TLS Certificate Method
@@ -329,7 +329,7 @@ https://tools.ietf.org/html/rfc6125#section-2.3)
$ curl \ $ curl \
--request POST \ --request POST \
--date @payload.json \ --date @payload.json \
https://vault.rocks/v1/auth/cert/login http://127.0.0.1:8200/v1/auth/cert/login
``` ```
### Sample Response ### Sample Response

View File

@@ -60,7 +60,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/auth/gcp/config http://127.0.0.1:8200/v1/auth/gcp/config
``` ```
## Read Config ## Read Config
@@ -76,7 +76,7 @@ Returns the previously configured config, including credentials.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/auth/gcp/config http://127.0.0.1:8200/v1/auth/gcp/config
``` ```
### Sample Response ### Sample Response
@@ -110,7 +110,7 @@ Deletes the previously configured GCP config and credentials.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request DELETE \ --request DELETE \
https://vault.rocks/v1/auth/gcp/config http://127.0.0.1:8200/v1/auth/gcp/config
``` ```
## Create Role ## Create Role
@@ -226,7 +226,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/auth/gcp/role/dev-role http://127.0.0.1:8200/v1/auth/gcp/role/dev-role
``` ```
## Edit Service Accounts For IAM Role ## Edit Service Accounts For IAM Role
@@ -268,7 +268,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/auth/gcp/role/dev-role http://127.0.0.1:8200/v1/auth/gcp/role/dev-role
``` ```
## Edit Labels For GCE Role ## Edit Labels For GCE Role
@@ -308,7 +308,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/auth/gcp/role/dev-role http://127.0.0.1:8200/v1/auth/gcp/role/dev-role
``` ```
## Read Role ## Read Role
@@ -328,7 +328,7 @@ Returns the previously registered role configuration.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/auth/gcp/role/dev-role http://127.0.0.1:8200/v1/auth/gcp/role/dev-role
``` ```
### Sample Response ### Sample Response
@@ -372,7 +372,7 @@ Lists all the roles that are registered with the plugin.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request LIST \ --request LIST \
https://vault.rocks/v1/auth/gcp/roles http://127.0.0.1:8200/v1/auth/gcp/roles
``` ```
### Sample Response ### Sample Response
@@ -407,7 +407,7 @@ Deletes the previously registered role.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request DELETE \ --request DELETE \
https://vault.rocks/v1/auth/gcp/role/dev-role http://127.0.0.1:8200/v1/auth/gcp/role/dev-role
``` ```
## Login ## Login
@@ -445,7 +445,7 @@ entity and then authorizes the entity for the given role.
$ curl \ $ curl \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/auth/gcp/login http://127.0.0.1:8200/v1/auth/gcp/login
``` ```
### Sample Response ### Sample Response

View File

@@ -50,7 +50,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/auth/github/config http://127.0.0.1:8200/v1/auth/github/config
``` ```
## Read Configuration ## Read Configuration
@@ -66,7 +66,7 @@ Reads the GitHub configuration.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/auth/github/config http://127.0.0.1:8200/v1/auth/github/config
``` ```
### Sample Response ### Sample Response
@@ -112,7 +112,7 @@ Login using GitHub access token.
``` ```
$ curl \ $ curl \
--request POST \ --request POST \
https://vault.rocks/v1/auth/github/login http://127.0.0.1:8200/v1/auth/github/login
``` ```
### Sample Response ### Sample Response

View File

@@ -56,7 +56,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/auth/kubernetes/config http://127.0.0.1:8200/v1/auth/kubernetes/config
``` ```
## Read Config ## Read Config
@@ -72,7 +72,7 @@ Returns the previously configured config, including credentials.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/auth/kubernetes/config http://127.0.0.1:8200/v1/auth/kubernetes/config
``` ```
### Sample Response ### Sample Response
@@ -138,7 +138,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/auth/kubernetes/role/dev-role http://127.0.0.1:8200/v1/auth/kubernetes/role/dev-role
``` ```
## Read Role ## Read Role
@@ -157,7 +157,7 @@ Returns the previously registered role configuration.
```text ```text
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/auth/kubernetes/role/dev-role http://127.0.0.1:8200/v1/auth/kubernetes/role/dev-role
``` ```
### Sample Response ### Sample Response
@@ -193,7 +193,7 @@ Lists all the roles that are registered with the auth method.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request LIST \ --request LIST \
https://vault.rocks/v1/auth/kubernetes/role http://127.0.0.1:8200/v1/auth/kubernetes/role
``` ```
### Sample Response ### Sample Response
@@ -227,7 +227,7 @@ Deletes the previously registered role.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request DELETE \ --request DELETE \
https://vault.rocks/v1/auth/kubernetes/role/dev-role http://127.0.0.1:8200/v1/auth/kubernetes/role/dev-role
``` ```
## Login ## Login
@@ -263,7 +263,7 @@ entity and then authorizes the entity for the given role.
$ curl \ $ curl \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/auth/kubernetes/login http://127.0.0.1:8200/v1/auth/kubernetes/login
``` ```
### Sample Response ### Sample Response

View File

@@ -76,7 +76,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/auth/ldap/config http://127.0.0.1:8200/v1/auth/ldap/config
``` ```
### Sample Payload ### Sample Payload
@@ -112,7 +112,7 @@ This endpoint retrieves the LDAP configuration for the auth method.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/auth/ldap/config http://127.0.0.1:8200/v1/auth/ldap/config
``` ```
### Sample Response ### Sample Response
@@ -160,7 +160,7 @@ This endpoint returns a list of existing groups in the method.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request LIST \ --request LIST \
https://vault.rocks/v1/auth/ldap/groups http://127.0.0.1:8200/v1/auth/ldap/groups
``` ```
### Sample Response ### Sample Response
@@ -199,7 +199,7 @@ This endpoint returns the policies associated with a LDAP group.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/auth/ldap/groups/admins http://127.0.0.1:8200/v1/auth/ldap/groups/admins
``` ```
### Sample Response ### Sample Response
@@ -248,7 +248,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/auth/ldap/groups/admins http://127.0.0.1:8200/v1/auth/ldap/groups/admins
``` ```
## Delete LDAP Group ## Delete LDAP Group
@@ -269,7 +269,7 @@ This endpoint deletes the LDAP group and policy association.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request DELETE \ --request DELETE \
https://vault.rocks/v1/auth/ldap/groups/admins http://127.0.0.1:8200/v1/auth/ldap/groups/admins
``` ```
## List LDAP Users ## List LDAP Users
@@ -286,7 +286,7 @@ This endpoint returns a list of existing users in the method.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request LIST \ --request LIST \
https://vault.rocks/v1/auth/ldap/users http://127.0.0.1:8200/v1/auth/ldap/users
``` ```
### Sample Response ### Sample Response
@@ -325,7 +325,7 @@ This endpoint returns the policies associated with a LDAP user.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/auth/ldap/users/mitchellh http://127.0.0.1:8200/v1/auth/ldap/users/mitchellh
``` ```
### Sample Response ### Sample Response
@@ -377,7 +377,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/auth/ldap/users/mitchellh http://127.0.0.1:8200/v1/auth/ldap/users/mitchellh
``` ```
## Delete LDAP User ## Delete LDAP User
@@ -398,7 +398,7 @@ This endpoint deletes the LDAP user and policy association.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request DELETE \ --request DELETE \
https://vault.rocks/v1/auth/ldap/users/mitchellh http://127.0.0.1:8200/v1/auth/ldap/users/mitchellh
``` ```
## Login with LDAP User ## Login with LDAP User
@@ -428,7 +428,7 @@ This endpoint allows you to log in with LDAP credentials
$ curl \ $ curl \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/auth/ldap/login/mitchellh http://127.0.0.1:8200/v1/auth/ldap/login/mitchellh
``` ```
### Sample Response ### Sample Response

View File

@@ -57,7 +57,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/auth/okta/config http://127.0.0.1:8200/v1/auth/okta/config
``` ```
## Read Configuration ## Read Configuration
@@ -73,7 +73,7 @@ Reads the Okta configuration.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/auth/okta/config http://127.0.0.1:8200/v1/auth/okta/config
``` ```
### Sample Response ### Sample Response
@@ -109,7 +109,7 @@ List the users configurated in the Okta method.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request LIST \ --request LIST \
https://vault.rocks/v1/auth/okta/users http://127.0.0.1:8200/v1/auth/okta/users
``` ```
### Sample Response ### Sample Response
@@ -161,7 +161,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/auth/okta/users/fred http://127.0.0.1:8200/v1/auth/okta/users/fred
``` ```
## Read User ## Read User
@@ -181,7 +181,7 @@ Reads the properties of an existing username.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/auth/okta/users/test-user http://127.0.0.1:8200/v1/auth/okta/users/test-user
``` ```
### Sample Response ### Sample Response
@@ -221,7 +221,7 @@ Deletes an existing username from the method.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request DELETE \ --request DELETE \
https://vault.rocks/v1/auth/okta/users/test-user http://127.0.0.1:8200/v1/auth/okta/users/test-user
``` ```
## List Groups ## List Groups
@@ -238,7 +238,7 @@ List the groups configurated in the Okta method.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request LIST \ --request LIST \
https://vault.rocks/v1/auth/okta/groups http://127.0.0.1:8200/v1/auth/okta/groups
``` ```
### Sample Response ### Sample Response
@@ -289,7 +289,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/auth/okta/groups/admins http://127.0.0.1:8200/v1/auth/okta/groups/admins
``` ```
## Read Group ## Read Group
@@ -309,7 +309,7 @@ Reads the properties of an existing group.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/auth/okta/groups/admins http://127.0.0.1:8200/v1/auth/okta/groups/admins
``` ```
### Sample Response ### Sample Response
@@ -348,7 +348,7 @@ Deletes an existing group from the method.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request DELETE \ --request DELETE \
https://vault.rocks/v1/auth/okta/users/test-user http://127.0.0.1:8200/v1/auth/okta/users/test-user
``` ```
## Login ## Login
@@ -378,7 +378,7 @@ Login with the username and password.
$ curl \ $ curl \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/auth/okta/login/fred http://127.0.0.1:8200/v1/auth/okta/login/fred
``` ```
### Sample Response ### Sample Response

View File

@@ -56,7 +56,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/auth/radius/config http://127.0.0.1:8200/v1/auth/radius/config
``` ```
## Register User ## Register User
@@ -87,7 +87,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/auth/radius/users/test-user http://127.0.0.1:8200/v1/auth/radius/users/test-user
``` ```
## Read User ## Read User
@@ -107,7 +107,7 @@ Reads the properties of an existing username.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/auth/radius/users/test-user http://127.0.0.1:8200/v1/auth/radius/users/test-user
``` ```
### Sample Response ### Sample Response
@@ -143,7 +143,7 @@ Deletes an existing username from the method.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request DELETE \ --request DELETE \
https://vault.rocks/v1/auth/radius/users/test-user http://127.0.0.1:8200/v1/auth/radius/users/test-user
``` ```
## List Users ## List Users
@@ -160,7 +160,7 @@ List the users registered with the method.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request LIST \ --request LIST \
https://vault.rocks/v1/auth/radius/users http://127.0.0.1:8200/v1/auth/radius/users
``` ```
### Sample Response ### Sample Response
@@ -210,7 +210,7 @@ Login with the username and password.
$ curl \ $ curl \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/auth/radius/login/test-user http://127.0.0.1:8200/v1/auth/radius/login/test-user
``` ```
### Sample Response ### Sample Response

View File

@@ -28,7 +28,7 @@ large numbers of tokens and their associated leases at once.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request LIST \ --request LIST \
https://vault.rocks/v1/auth/token/accessors http://127.0.0.1:8200/v1/auth/token/accessors
``` ```
### Sample Response ### Sample Response
@@ -123,7 +123,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/auth/token/create http://127.0.0.1:8200/v1/auth/token/create
``` ```
### Sample Response ### Sample Response
@@ -172,7 +172,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/auth/token/lookup http://127.0.0.1:8200/v1/auth/token/lookup
``` ```
### Sample Response ### Sample Response
@@ -209,7 +209,7 @@ Returns information about the current client token.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/auth/token/lookup-self http://127.0.0.1:8200/v1/auth/token/lookup-self
``` ```
### Sample Response ### Sample Response
@@ -260,7 +260,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/auth/token/lookup-accessor http://127.0.0.1:8200/v1/auth/token/lookup-accessor
``` ```
### Sample Response ### Sample Response
@@ -321,7 +321,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/auth/token/renew http://127.0.0.1:8200/v1/auth/token/renew
``` ```
### Sample Response ### Sample Response
@@ -373,7 +373,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/auth/token/renew-self http://127.0.0.1:8200/v1/auth/token/renew-self
``` ```
### Sample Response ### Sample Response
@@ -423,7 +423,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/auth/token/revoke http://127.0.0.1:8200/v1/auth/token/revoke
``` ```
## Revoke a Token (Self) ## Revoke a Token (Self)
@@ -441,7 +441,7 @@ revoked, all dynamic secrets generated with it are also revoked.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
https://vault.rocks/v1/auth/token/revoke-self http://127.0.0.1:8200/v1/auth/token/revoke-self
``` ```
## Revoke a Token Accessor ## Revoke a Token Accessor
@@ -473,7 +473,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/auth/token/revoke-accessor http://127.0.0.1:8200/v1/auth/token/revoke-accessor
``` ```
## Revoke Token and Orphan Children ## Revoke Token and Orphan Children
@@ -507,7 +507,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/auth/token/revoke-orphan http://127.0.0.1:8200/v1/auth/token/revoke-orphan
``` ```
## Read Token Role ## Read Token Role
@@ -527,7 +527,7 @@ Fetches the named role configuration.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/auth/token/roles/nomad http://127.0.0.1:8200/v1/auth/token/roles/nomad
``` ```
### Sample Response ### Sample Response
@@ -568,7 +568,7 @@ List available token roles.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request LIST --request LIST
https://vault.rocks/v1/auth/token/roles http://127.0.0.1:8200/v1/auth/token/roles
``` ```
### Sample Response ### Sample Response
@@ -653,7 +653,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST --request POST
--data @payload.json --data @payload.json
https://vault.rocks/v1/auth/token/roles/nomad http://127.0.0.1:8200/v1/auth/token/roles/nomad
``` ```
## Delete Token Role ## Delete Token Role
@@ -674,7 +674,7 @@ This endpoint deletes the named token role.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request DELETE \ --request DELETE \
https://vault.rocks/v1/auth/token/roles/admins http://127.0.0.1:8200/v1/auth/token/roles/admins
``` ```
## Tidy Tokens ## Tidy Tokens
@@ -694,5 +694,5 @@ storage method so should be used sparingly.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
https://vault.rocks/v1/auth/token/tidy http://127.0.0.1:8200/v1/auth/token/tidy
``` ```

View File

@@ -51,7 +51,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/auth/userpass/users/mitchellh http://127.0.0.1:8200/v1/auth/userpass/users/mitchellh
``` ```
## Read User ## Read User
@@ -67,7 +67,7 @@ Reads the properties of an existing username.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/auth/userpass/users/mitchellh http://127.0.0.1:8200/v1/auth/userpass/users/mitchellh
``` ```
### Sample Response ### Sample Response
@@ -105,7 +105,7 @@ This endpoint deletes the user from the method.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request DELETE \ --request DELETE \
https://vault.rocks/v1/auth/userpass/users/mitchellh http://127.0.0.1:8200/v1/auth/userpass/users/mitchellh
``` ```
## Update Password on User ## Update Password on User
@@ -136,7 +136,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/auth/userpass/users/mitchellh/password http://127.0.0.1:8200/v1/auth/userpass/users/mitchellh/password
``` ```
## Update Policies on User ## Update Policies on User
@@ -167,7 +167,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/auth/userpass/users/mitchellh/policies http://127.0.0.1:8200/v1/auth/userpass/users/mitchellh/policies
``` ```
## List Users ## List Users
@@ -184,7 +184,7 @@ List available userpass users.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request LIST --request LIST
https://vault.rocks/v1/auth/userpass/users http://127.0.0.1:8200/v1/auth/userpass/users
``` ```
### Sample Response ### Sample Response
@@ -227,7 +227,7 @@ Login with the username and password.
$ curl \ $ curl \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/auth/userpass/login/mitchellh http://127.0.0.1:8200/v1/auth/userpass/login/mitchellh
``` ```
### Sample Response ### Sample Response

View File

@@ -77,7 +77,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/aws/config/root http://127.0.0.1:8200/v1/aws/config/root
``` ```
## Configure Lease ## Configure Lease
@@ -114,7 +114,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/aws/config/lease http://127.0.0.1:8200/v1/aws/config/lease
``` ```
## Read Lease ## Read Lease
@@ -130,7 +130,7 @@ This endpoint returns the current lease settings for the AWS secrets engine.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/aws/config/lease http://127.0.0.1:8200/v1/aws/config/lease
``` ```
### Sample Response ### Sample Response
@@ -172,7 +172,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/aws/roles/example-role http://127.0.0.1:8200/v1/aws/roles/example-role
``` ```
### Sample Payloads ### Sample Payloads
@@ -212,7 +212,7 @@ exist, a 404 is returned.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/aws/roles/example-role http://127.0.0.1:8200/v1/aws/roles/example-role
``` ```
### Sample Responses ### Sample Responses
@@ -251,7 +251,7 @@ This endpoint lists all existing roles in the secrets engine.
$ curl $ curl
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request LIST \ --request LIST \
https://vault.rocks/v1/aws/roles http://127.0.0.1:8200/v1/aws/roles
``` ```
### Sample Response ### Sample Response
@@ -286,7 +286,7 @@ exist, a 404 is returned.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request DELETE \ --request DELETE \
https://vault.rocks/v1/aws/roles/example-role http://127.0.0.1:8200/v1/aws/roles/example-role
``` ```
## Generate IAM Credentials ## Generate IAM Credentials
@@ -308,7 +308,7 @@ role must be created before queried.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/aws/creds/example-role http://127.0.0.1:8200/v1/aws/creds/example-role
``` ```
### Sample Response ### Sample Response
@@ -361,7 +361,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/aws/sts/example-role http://127.0.0.1:8200/v1/aws/sts/example-role
``` ```
### Sample Response ### Sample Response

View File

@@ -105,7 +105,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/cassandra/config/connection http://127.0.0.1:8200/v1/cassandra/config/connection
``` ```
## Create Role ## Create Role
@@ -156,7 +156,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/cassandra/roles/my-role http://127.0.0.1:8200/v1/cassandra/roles/my-role
``` ```
## Read Role ## Read Role
@@ -177,7 +177,7 @@ This endpoint queries the role definition.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/cassandra/roles/my-role http://127.0.0.1:8200/v1/cassandra/roles/my-role
``` ```
### Sample Response ### Sample Response
@@ -212,7 +212,7 @@ This endpoint deletes the role definition.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request DELETE \ --request DELETE \
https://vault.rocks/v1/cassandra/roles/my-role http://127.0.0.1:8200/v1/cassandra/roles/my-role
``` ```
## Generate Credentials ## Generate Credentials
@@ -234,7 +234,7 @@ role.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/cassandra/creds/my-role http://127.0.0.1:8200/v1/cassandra/creds/my-role
``` ```
### Sample Response ### Sample Response

View File

@@ -53,7 +53,7 @@ $ curl \
--request POST \ --request POST \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/consul/config/access http://127.0.0.1:8200/v1/consul/config/access
``` ```
## Create/Update Role ## Create/Update Role
@@ -108,7 +108,7 @@ $ curl \
--request POST \ --request POST \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/consul/roles/example-role http://127.0.0.1:8200/v1/consul/roles/example-role
``` ```
## Read Role ## Read Role
@@ -130,7 +130,7 @@ If no role exists with that name, a 404 is returned.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/consul/roles/example-role http://127.0.0.1:8200/v1/consul/roles/example-role
``` ```
### Sample Response ### Sample Response
@@ -159,7 +159,7 @@ This endpoint lists all existing roles in the secrets engine.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request LIST \ --request LIST \
https://vault.rocks/v1/consul/roles http://127.0.0.1:8200/v1/consul/roles
``` ```
### Sample Response ### Sample Response
@@ -194,7 +194,7 @@ not exist, this endpoint will still return a successful response.
$ curl \ $ curl \
--request DELETE \ --request DELETE \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/consul/roles/example-role http://127.0.0.1:8200/v1/consul/roles/example-role
``` ```
## Generate Credential ## Generate Credential
@@ -216,7 +216,7 @@ definition.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/consul/creds/example-role http://127.0.0.1:8200/v1/consul/creds/example-role
``` ```
### Sample Response ### Sample Response

View File

@@ -35,7 +35,7 @@ This endpoint retrieves the secret at the specified location.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/cubbyhole/my-secret http://127.0.0.1:8200/v1/cubbyhole/my-secret
``` ```
### Sample Response ### Sample Response
@@ -73,7 +73,7 @@ not return a value. The values themselves are not accessible via this command.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request LIST \ --request LIST \
https://vault.rocks/v1/cubbyhole/my-secret http://127.0.0.1:8200/v1/cubbyhole/my-secret
``` ```
### Sample Response ### Sample Response
@@ -129,7 +129,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/cubbyhole/my-secret http://127.0.0.1:8200/v1/cubbyhole/my-secret
``` ```
## Delete Secret ## Delete Secret
@@ -151,5 +151,5 @@ This endpoint deletes the secret at the specified location.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request DELETE \ --request DELETE \
https://vault.rocks/v1/cubbyhole/my-secret http://127.0.0.1:8200/v1/cubbyhole/my-secret
``` ```

View File

@@ -95,7 +95,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/cassandra/config/connection http://127.0.0.1:8200/v1/cassandra/config/connection
``` ```
## Statements ## Statements

View File

@@ -55,7 +55,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/database/config/hana http://127.0.0.1:8200/v1/database/config/hana
``` ```
## Statements ## Statements

View File

@@ -60,7 +60,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/database/config/mysql http://127.0.0.1:8200/v1/database/config/mysql
``` ```
## Read Connection ## Read Connection
@@ -82,7 +82,7 @@ This endpoint returns the configuration settings for a connection.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request GET \ --request GET \
https://vault.rocks/v1/database/config/mysql http://127.0.0.1:8200/v1/database/config/mysql
``` ```
### Sample Response ### Sample Response
@@ -116,7 +116,7 @@ are returned, not any values.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request LIST \ --request LIST \
https://vault.rocks/v1/database/config http://127.0.0.1:8200/v1/database/config
``` ```
### Sample Response ### Sample Response
@@ -148,7 +148,7 @@ This endpoint deletes a connection.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request DELETE \ --request DELETE \
https://vault.rocks/v1/database/config/mysql http://127.0.0.1:8200/v1/database/config/mysql
``` ```
## Reset Connection ## Reset Connection
@@ -171,7 +171,7 @@ with the configuration stored in the barrier.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
https://vault.rocks/v1/database/reset/mysql http://127.0.0.1:8200/v1/database/reset/mysql
``` ```
## Create Role ## Create Role
@@ -236,7 +236,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/database/roles/my-role http://127.0.0.1:8200/v1/database/roles/my-role
``` ```
## Read Role ## Read Role
@@ -257,7 +257,7 @@ This endpoint queries the role definition.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/database/roles/my-role http://127.0.0.1:8200/v1/database/roles/my-role
``` ```
### Sample Response ### Sample Response
@@ -291,7 +291,7 @@ returned, not any values.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request LIST \ --request LIST \
https://vault.rocks/v1/database/roles http://127.0.0.1:8200/v1/database/roles
``` ```
### Sample Response ### Sample Response
@@ -327,7 +327,7 @@ This endpoint deletes the role definition.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request DELETE \ --request DELETE \
https://vault.rocks/v1/database/roles/my-role http://127.0.0.1:8200/v1/database/roles/my-role
``` ```
## Generate Credentials ## Generate Credentials
@@ -349,7 +349,7 @@ role.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/database/creds/my-role http://127.0.0.1:8200/v1/database/creds/my-role
``` ```
### Sample Response ### Sample Response

View File

@@ -50,7 +50,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/database/config/mongodb http://127.0.0.1:8200/v1/database/config/mongodb
``` ```
## Statements ## Statements

View File

@@ -55,7 +55,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/database/config/mssql http://127.0.0.1:8200/v1/database/config/mssql
``` ```
## Statements ## Statements

View File

@@ -55,7 +55,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/database/config/mysql http://127.0.0.1:8200/v1/database/config/mysql
``` ```
## Statements ## Statements

View File

@@ -55,7 +55,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/database/config/oracle http://127.0.0.1:8200/v1/database/config/oracle
``` ```
## Statements ## Statements

View File

@@ -55,7 +55,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/database/config/postgresql http://127.0.0.1:8200/v1/database/config/postgresql
``` ```
## Statements ## Statements

View File

@@ -53,7 +53,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/identity/entity-alias http://127.0.0.1:8200/v1/identity/entity-alias
``` ```
### Sample Response ### Sample Response
@@ -84,7 +84,7 @@ This endpoint queries the entity alias by its identifier.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/identity/entity-alias/id/34982d3d-e3ce-5d8b-6e5f-b9bb34246c31 http://127.0.0.1:8200/v1/identity/entity-alias/id/34982d3d-e3ce-5d8b-6e5f-b9bb34246c31
``` ```
### Sample Response ### Sample Response
@@ -154,7 +154,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/identity/entity-alias/id/34982d3d-e3ce-5d8b-6e5f-b9bb34246c31 http://127.0.0.1:8200/v1/identity/entity-alias/id/34982d3d-e3ce-5d8b-6e5f-b9bb34246c31
``` ```
### Sample Response ### Sample Response
@@ -186,7 +186,7 @@ This endpoint deletes an alias from its corresponding entity.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request DELETE \ --request DELETE \
https://vault.rocks/v1/identity/entity-alias/id/34982d3d-e3ce-5d8b-6e5f-b9bb34246c31 http://127.0.0.1:8200/v1/identity/entity-alias/id/34982d3d-e3ce-5d8b-6e5f-b9bb34246c31
``` ```
### List Entity Aliases by ID ### List Entity Aliases by ID
@@ -204,7 +204,7 @@ This endpoint returns a list of available entity aliases by their identifiers.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request LIST \ --request LIST \
https://vault.rocks/v1/identity/entity-alias/id http://127.0.0.1:8200/v1/identity/entity-alias/id
``` ```
### Sample Response ### Sample Response

View File

@@ -45,7 +45,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/identity/entity http://127.0.0.1:8200/v1/identity/entity
``` ```
### Sample Response ### Sample Response
@@ -76,7 +76,7 @@ This endpoint queries the entity by its identifier.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/identity/entity/id/8d6a45e5-572f-8f13-d226-cd0d1ec57297 http://127.0.0.1:8200/v1/identity/entity/id/8d6a45e5-572f-8f13-d226-cd0d1ec57297
``` ```
### Sample Response ### Sample Response
@@ -141,7 +141,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/identity/entity/id/8d6a45e5-572f-8f13-d226-cd0d1ec57297 http://127.0.0.1:8200/v1/identity/entity/id/8d6a45e5-572f-8f13-d226-cd0d1ec57297
``` ```
### Sample Response ### Sample Response
@@ -173,7 +173,7 @@ This endpoint deletes an entity and all its associated aliases.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request DELETE \ --request DELETE \
https://vault.rocks/v1/identity/entity/id/8d6a45e5-572f-8f13-d226-cd0d1ec57297 http://127.0.0.1:8200/v1/identity/entity/id/8d6a45e5-572f-8f13-d226-cd0d1ec57297
``` ```
## List Entities by ID ## List Entities by ID
@@ -191,7 +191,7 @@ This endpoint returns a list of available entities by their identifiers.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request LIST \ --request LIST \
https://vault.rocks/v1/identity/entity/id http://127.0.0.1:8200/v1/identity/entity/id
``` ```
### Sample Response ### Sample Response

View File

@@ -44,7 +44,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/identity/group-alias http://127.0.0.1:8200/v1/identity/group-alias
``` ```
### Sample Response ### Sample Response
@@ -75,7 +75,7 @@ This endpoint queries the group alias by its identifier.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/identity/group-alias/id/ca726050-d8ac-6f1f-4210-3b5c5b613824 http://127.0.0.1:8200/v1/identity/group-alias/id/ca726050-d8ac-6f1f-4210-3b5c5b613824
``` ```
### Sample Response ### Sample Response
@@ -115,7 +115,7 @@ This endpoint deletes a group alias.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request DELETE \ --request DELETE \
https://vault.rocks/v1/identity/group-alias/id/ca726050-d8ac-6f1f-4210-3b5c5b613824 http://127.0.0.1:8200/v1/identity/group-alias/id/ca726050-d8ac-6f1f-4210-3b5c5b613824
``` ```
## List Entities by ID ## List Entities by ID
@@ -133,7 +133,7 @@ This endpoint returns a list of available group aliases by their identifiers.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request LIST \ --request LIST \
https://vault.rocks/v1/identity/group-alias/id http://127.0.0.1:8200/v1/identity/group-alias/id
``` ```
### Sample Response ### Sample Response

View File

@@ -53,7 +53,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/identity/group http://127.0.0.1:8200/v1/identity/group
``` ```
### Sample Response ### Sample Response
@@ -84,7 +84,7 @@ This endpoint queries the group by its identifier.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/identity/group/id/363926d8-dd8b-c9f0-21f8-7b248be80ce1 http://127.0.0.1:8200/v1/identity/group/id/363926d8-dd8b-c9f0-21f8-7b248be80ce1
``` ```
### Sample Response ### Sample Response
@@ -159,7 +159,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/identity/group/id/363926d8-dd8b-c9f0-21f8-7b248be80ce1 http://127.0.0.1:8200/v1/identity/group/id/363926d8-dd8b-c9f0-21f8-7b248be80ce1
``` ```
### Sample Response ### Sample Response
@@ -191,7 +191,7 @@ This endpoint deletes a group.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request DELETE \ --request DELETE \
https://vault.rocks/v1/identity/group/id/363926d8-dd8b-c9f0-21f8-7b248be80ce1 http://127.0.0.1:8200/v1/identity/group/id/363926d8-dd8b-c9f0-21f8-7b248be80ce1
``` ```
## List Groups by ID ## List Groups by ID
@@ -209,7 +209,7 @@ This endpoint returns a list of available groups by their identifiers.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request LIST \ --request LIST \
https://vault.rocks/v1/identity/group/id http://127.0.0.1:8200/v1/identity/group/id
``` ```
### Sample Response ### Sample Response

View File

@@ -46,7 +46,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/identity/group http://127.0.0.1:8200/v1/identity/group
``` ```
### Sample Response ### Sample Response
@@ -98,7 +98,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/identity/group/id/454ceeb5-76d7-a131-b92a-7ecfb15523e8 http://127.0.0.1:8200/v1/identity/group/id/454ceeb5-76d7-a131-b92a-7ecfb15523e8
``` ```
### Sample Response ### Sample Response
@@ -129,7 +129,7 @@ This endpoint reads the group by its ID.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/identity/group/id/454ceeb5-76d7-a131-b92a-7ecfb15523e8 http://127.0.0.1:8200/v1/identity/group/id/454ceeb5-76d7-a131-b92a-7ecfb15523e8
``` ```
### Sample Response ### Sample Response
@@ -173,7 +173,7 @@ This endpoint deleted the group by its ID.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request DELETE \ --request DELETE \
https://vault.rocks/v1/identity/group/id/454ceeb5-76d7-a131-b92a-7ecfb15523e8 http://127.0.0.1:8200/v1/identity/group/id/454ceeb5-76d7-a131-b92a-7ecfb15523e8
``` ```
@@ -192,7 +192,7 @@ This endpoint lists all the groups by their ID.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request LIST \ --request LIST \
https://vault.rocks/v1/identity/group/id http://127.0.0.1:8200/v1/identity/group/id
``` ```
### Sample Response ### Sample Response
@@ -240,7 +240,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/identity/lookup/group http://127.0.0.1:8200/v1/identity/lookup/group
``` ```
### Sample Response ### Sample Response

View File

@@ -46,7 +46,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/identity/lookup/entity http://127.0.0.1:8200/v1/identity/lookup/entity
``` ```
### Sample Response ### Sample Response
@@ -108,7 +108,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/identity/lookup/group http://127.0.0.1:8200/v1/identity/lookup/group
``` ```
### Sample Response ### Sample Response

View File

@@ -34,7 +34,7 @@ This endpoint retrieves the secret at the specified location.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/secret/my-secret http://127.0.0.1:8200/v1/secret/my-secret
``` ```
### Sample Response ### Sample Response
@@ -80,7 +80,7 @@ this command.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request LIST \ --request LIST \
https://vault.rocks/v1/secret/my-secret http://127.0.0.1:8200/v1/secret/my-secret
``` ```
### Sample Response ### Sample Response
@@ -140,7 +140,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/secret/my-secret http://127.0.0.1:8200/v1/secret/my-secret
``` ```
## Delete Secret ## Delete Secret
@@ -162,5 +162,5 @@ This endpoint deletes the secret at the specified location.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request DELETE \ --request DELETE \
https://vault.rocks/v1/secret/my-secret http://127.0.0.1:8200/v1/secret/my-secret
``` ```

View File

@@ -54,7 +54,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/mongodb/config/connection http://127.0.0.1:8200/v1/mongodb/config/connection
``` ```
### Sample Response ### Sample Response
@@ -88,7 +88,7 @@ including passwords, if any.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/mongodb/config/connection http://127.0.0.1:8200/v1/mongodb/config/connection
``` ```
### Sample Response ### Sample Response
@@ -141,7 +141,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/mongodb/config/lease http://127.0.0.1:8200/v1/mongodb/config/lease
``` ```
## Read Lease ## Read Lease
@@ -157,7 +157,7 @@ This endpoint queries the lease configuration.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/mongodb/config/lease http://127.0.0.1:8200/v1/mongodb/config/lease
``` ```
### Sample Response ### Sample Response
@@ -209,7 +209,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/mongodb/roles/my-role http://127.0.0.1:8200/v1/mongodb/roles/my-role
``` ```
## Read Role ## Read Role
@@ -230,7 +230,7 @@ This endpoint queries the role definition.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/mongodb/roles/my-role http://127.0.0.1:8200/v1/mongodb/roles/my-role
``` ```
### Sample Response ### Sample Response
@@ -265,7 +265,7 @@ returned, not any values.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request LIST \ --request LIST \
https://vault.rocks/v1/mongodb/roles http://127.0.0.1:8200/v1/mongodb/roles
``` ```
### Sample Response ### Sample Response
@@ -306,7 +306,7 @@ This endpoint deletes the role definition.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request DELETE \ --request DELETE \
https://vault.rocks/v1/mongodb/roles/my-role http://127.0.0.1:8200/v1/mongodb/roles/my-role
``` ```
## Generate Credentials ## Generate Credentials
@@ -328,7 +328,7 @@ role.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/mongodb/creds/my-role http://127.0.0.1:8200/v1/mongodb/creds/my-role
``` ```
### Sample Response ### Sample Response

View File

@@ -57,7 +57,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/mssql/config/connection http://127.0.0.1:8200/v1/mssql/config/connection
``` ```
## Configure Lease ## Configure Lease
@@ -93,7 +93,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/mssql/config/lease http://127.0.0.1:8200/v1/mssql/config/lease
``` ```
## Create Role ## Create Role
@@ -127,7 +127,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/mssql/roles/my-role http://127.0.0.1:8200/v1/mssql/roles/my-role
``` ```
## Read Role ## Read Role
@@ -148,7 +148,7 @@ This endpoint queries the role definition.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/mssql/roles/my-role http://127.0.0.1:8200/v1/mssql/roles/my-role
``` ```
### Sample Response ### Sample Response
@@ -176,7 +176,7 @@ returned, not any values.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request LIST \ --request LIST \
https://vault.rocks/v1/mssql/roles http://127.0.0.1:8200/v1/mssql/roles
``` ```
### Sample Response ### Sample Response
@@ -212,7 +212,7 @@ This endpoint deletes the role definition.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request DELETE \ --request DELETE \
https://vault.rocks/v1/mssql/roles/my-role http://127.0.0.1:8200/v1/mssql/roles/my-role
``` ```
## Generate Credentials ## Generate Credentials
@@ -234,7 +234,7 @@ role.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/mssql/creds/my-role http://127.0.0.1:8200/v1/mssql/creds/my-role
``` ```
### Sample Response ### Sample Response

View File

@@ -59,7 +59,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/mysql/config/connection http://127.0.0.1:8200/v1/mysql/config/connection
``` ```
## Configure Lease ## Configure Lease
@@ -96,7 +96,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/mysql/config/lease http://127.0.0.1:8200/v1/mysql/config/lease
``` ```
## Create Role ## Create Role
@@ -148,7 +148,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/mysql/roles/my-role http://127.0.0.1:8200/v1/mysql/roles/my-role
``` ```
## Read Role ## Read Role
@@ -169,7 +169,7 @@ This endpoint queries the role definition.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/mysql/roles/my-role http://127.0.0.1:8200/v1/mysql/roles/my-role
``` ```
### Sample Response ### Sample Response
@@ -197,7 +197,7 @@ returned, not any values.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request LIST \ --request LIST \
https://vault.rocks/v1/mysql/roles http://127.0.0.1:8200/v1/mysql/roles
``` ```
### Sample Response ### Sample Response
@@ -233,7 +233,7 @@ This endpoint deletes the role definition.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request DELETE \ --request DELETE \
https://vault.rocks/v1/mysql/roles/my-role http://127.0.0.1:8200/v1/mysql/roles/my-role
``` ```
## Generate Credentials ## Generate Credentials
@@ -255,7 +255,7 @@ role.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/mysql/creds/my-role http://127.0.0.1:8200/v1/mysql/creds/my-role
``` ```
### Sample Response ### Sample Response

View File

@@ -53,7 +53,7 @@ $ curl \
--request POST \ --request POST \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/nomad/config/access http://127.0.0.1:8200/v1/nomad/config/access
``` ```
## Read Access Configuration ## Read Access Configuration
@@ -69,7 +69,7 @@ This endpoint queries for information about the Nomad connection.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/nomad/config/access http://127.0.0.1:8200/v1/nomad/config/access
``` ```
### Sample Response ### Sample Response
@@ -114,7 +114,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/nomad/config/lease http://127.0.0.1:8200/v1/nomad/config/lease
``` ```
## Read Lease Configuration ## Read Lease Configuration
@@ -130,7 +130,7 @@ This endpoint queries for information about the Lease TTL for the specified moun
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/nomad/config/lease http://127.0.0.1:8200/v1/nomad/config/lease
``` ```
### Sample Response ### Sample Response
@@ -156,7 +156,7 @@ This endpoint deletes the lease configuration.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request DELETE \ --request DELETE \
https://vault.rocks/v1/nomad/config/lease http://127.0.0.1:8200/v1/nomad/config/lease
``` ```
## Create/Update Role ## Create/Update Role
@@ -202,7 +202,7 @@ $ curl \
--request POST \ --request POST \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/nomad/role/monitoring http://127.0.0.1:8200/v1/nomad/role/monitoring
``` ```
## Read Role ## Read Role
@@ -224,7 +224,7 @@ If no role exists with that name, a 404 is returned.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/nomad/role/monitoring http://127.0.0.1:8200/v1/nomad/role/monitoring
``` ```
### Sample Response ### Sample Response
@@ -256,7 +256,7 @@ This endpoint lists all existing roles in the backend.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request LIST \ --request LIST \
https://vault.rocks/v1/nomad/role http://127.0.0.1:8200/v1/nomad/role
``` ```
### Sample Response ### Sample Response
@@ -291,7 +291,7 @@ not exist, this endpoint will still return a successful response.
$ curl \ $ curl \
--request DELETE \ --request DELETE \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/nomad/role/example-role http://127.0.0.1:8200/v1/nomad/role/example-role
``` ```
## Generate Credential ## Generate Credential
@@ -313,7 +313,7 @@ definition.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/nomad/creds/example http://127.0.0.1:8200/v1/nomad/creds/example
``` ```
### Sample Response ### Sample Response

View File

@@ -62,7 +62,7 @@ This is an unauthenticated endpoint.
``` ```
$ curl \ $ curl \
https://vault.rocks/v1/pki/ca/pem http://127.0.0.1:8200/v1/pki/ca/pem
``` ```
### Sample Response ### Sample Response
@@ -87,7 +87,7 @@ This is an unauthenticated endpoint.
``` ```
$ curl \ $ curl \
https://vault.rocks/v1/pki/ca_chain http://127.0.0.1:8200/v1/pki/ca_chain
``` ```
### Sample Response ### Sample Response
@@ -121,7 +121,7 @@ This is an unauthenticated endpoint.
``` ```
$ curl \ $ curl \
https://vault.rocks/v1/pki/cert/crl http://127.0.0.1:8200/v1/pki/cert/crl
``` ```
### Sample Response ### Sample Response
@@ -148,7 +148,7 @@ This endpoint returns a list of the current certificates by serial number only.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request LIST \ --request LIST \
https://vault.rocks/v1/pki/certs http://127.0.0.1:8200/v1/pki/certs
``` ```
### Sample Response ### Sample Response
@@ -225,7 +225,7 @@ marked valid.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/pki/config/crl http://127.0.0.1:8200/v1/pki/config/crl
``` ```
### Sample Response ### Sample Response
@@ -270,7 +270,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/pki/config/crl http://127.0.0.1:8200/v1/pki/config/crl
``` ```
## Read URLs ## Read URLs
@@ -286,7 +286,7 @@ This endpoint fetches the URLs to be encoded in generated certificates.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/pki/config/urls http://127.0.0.1:8200/v1/pki/config/urls
``` ```
### Sample Response ### Sample Response
@@ -345,7 +345,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/pki/config/urls http://127.0.0.1:8200/v1/pki/config/urls
``` ```
## Read CRL ## Read CRL
@@ -366,7 +366,7 @@ This is an unauthenticated endpoint.
``` ```
$ curl \ $ curl \
https://vault.rocks/v1/pki/crl/pem http://127.0.0.1:8200/v1/pki/crl/pem
``` ```
### Sample Response ### Sample Response
@@ -391,7 +391,7 @@ certificates being revoked.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/pki/crl/rotate http://127.0.0.1:8200/v1/pki/crl/rotate
``` ```
### Sample Response ### Sample Response
@@ -505,7 +505,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/pki/intermediate/generate/internal http://127.0.0.1:8200/v1/pki/intermediate/generate/internal
``` ```
```json ```json
@@ -556,7 +556,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/pki/intermediate/set-signed http://127.0.0.1:8200/v1/pki/intermediate/set-signed
``` ```
## Generate Certificate ## Generate Certificate
@@ -632,7 +632,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/pki/issue/my-role http://127.0.0.1:8200/v1/pki/issue/my-role
``` ```
### Sample Response ### Sample Response
@@ -685,7 +685,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/pki/revoke http://127.0.0.1:8200/v1/pki/revoke
``` ```
### Sample Response ### Sample Response
@@ -867,7 +867,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/pki/roles/my-role http://127.0.0.1:8200/v1/pki/roles/my-role
``` ```
## Read Role ## Read Role
@@ -888,7 +888,7 @@ This endpoint queries the role definition.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/pki/roles/my-role http://127.0.0.1:8200/v1/pki/roles/my-role
``` ```
### Sample Response ### Sample Response
@@ -927,7 +927,7 @@ returned, not any values.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request LIST \ --request LIST \
https://vault.rocks/v1/pki/roles http://127.0.0.1:8200/v1/pki/roles
``` ```
### Sample Response ### Sample Response
@@ -964,7 +964,7 @@ revoke certificates previously issued under this role.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request DELETE \ --request DELETE \
https://vault.rocks/v1/pki/roles/my-role http://127.0.0.1:8200/v1/pki/roles/my-role
``` ```
## Generate Root ## Generate Root
@@ -1091,7 +1091,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/pki/root/generate/internal http://127.0.0.1:8200/v1/pki/root/generate/internal
``` ```
### Sample Response ### Sample Response
@@ -1127,7 +1127,7 @@ _This endpoint requires sudo/root privileges._
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request DELETE \ --request DELETE \
https://vault.rocks/v1/pki/root http://127.0.0.1:8200/v1/pki/root
``` ```
## Sign Intermediate ## Sign Intermediate
@@ -1243,7 +1243,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/pki/root/sign-intermediate http://127.0.0.1:8200/v1/pki/root/sign-intermediate
``` ```
### Sample Response ### Sample Response
@@ -1303,7 +1303,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/pki/root/sign-self-issued http://127.0.0.1:8200/v1/pki/root/sign-self-issued
``` ```
### Sample Response ### Sample Response
@@ -1444,7 +1444,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/pki/sign-verbatim http://127.0.0.1:8200/v1/pki/sign-verbatim
``` ```
### Sample Response ### Sample Response
@@ -1505,5 +1505,5 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/pki/tidy http://127.0.0.1:8200/v1/pki/tidy
``` ```

View File

@@ -62,7 +62,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/postgresql/config/connection http://127.0.0.1:8200/v1/postgresql/config/connection
``` ```
## Configure Lease ## Configure Lease
@@ -99,7 +99,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/postgresql/config/lease http://127.0.0.1:8200/v1/postgresql/config/lease
``` ```
## Create Role ## Create Role
@@ -142,7 +142,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/postgresql/roles/my-role http://127.0.0.1:8200/v1/postgresql/roles/my-role
``` ```
## Read Role ## Read Role
@@ -163,7 +163,7 @@ This endpoint queries the role definition.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/postgresql/roles/my-role http://127.0.0.1:8200/v1/postgresql/roles/my-role
``` ```
### Sample Response ### Sample Response
@@ -191,7 +191,7 @@ returned, not any values.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request LIST \ --request LIST \
https://vault.rocks/v1/postgresql/roles http://127.0.0.1:8200/v1/postgresql/roles
``` ```
### Sample Response ### Sample Response
@@ -227,7 +227,7 @@ This endpoint deletes the role definition.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request DELETE \ --request DELETE \
https://vault.rocks/v1/postgresql/roles/my-role http://127.0.0.1:8200/v1/postgresql/roles/my-role
``` ```
## Generate Credentials ## Generate Credentials
@@ -249,7 +249,7 @@ role.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/postgresql/creds/my-role http://127.0.0.1:8200/v1/postgresql/creds/my-role
``` ```
### Sample Response ### Sample Response

View File

@@ -56,7 +56,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/rabbitmq/config/connection http://127.0.0.1:8200/v1/rabbitmq/config/connection
``` ```
## Configure Lease ## Configure Lease
@@ -89,7 +89,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/rabbitmq/config/lease http://127.0.0.1:8200/v1/rabbitmq/config/lease
``` ```
## Create Role ## Create Role
@@ -126,7 +126,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/rabbitmq/roles/my-role http://127.0.0.1:8200/v1/rabbitmq/roles/my-role
``` ```
## Read Role ## Read Role
@@ -147,7 +147,7 @@ This endpoint queries the role definition.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/rabbitmq/roles/my-role http://127.0.0.1:8200/v1/rabbitmq/roles/my-role
``` ```
### Sample Response ### Sample Response
@@ -180,7 +180,7 @@ This endpoint deletes the role definition.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request DELETE \ --request DELETE \
https://vault.rocks/v1/rabbitmq/roles/my-role http://127.0.0.1:8200/v1/rabbitmq/roles/my-role
``` ```
## Generate Credentials ## Generate Credentials
@@ -202,7 +202,7 @@ role.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/rabbitmq/creds/my-role http://127.0.0.1:8200/v1/rabbitmq/creds/my-role
``` ```
### Sample Response ### Sample Response

View File

@@ -47,7 +47,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/ssh/keys/my-key http://127.0.0.1:8200/v1/ssh/keys/my-key
``` ```
## Delete Key ## Delete Key
@@ -70,7 +70,7 @@ This endpoint deletes a named key.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request DELETE \ --request DELETE \
https://vault.rocks/v1/ssh/keys/my-key http://127.0.0.1:8200/v1/ssh/keys/my-key
``` ```
## Create Role ## Create Role
@@ -218,7 +218,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/ssh/roles/my-role http://127.0.0.1:8200/v1/ssh/roles/my-role
``` ```
## Read Role ## Read Role
@@ -239,7 +239,7 @@ This endpoint queries a named role.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/ssh/roles/my-role http://127.0.0.1:8200/v1/ssh/roles/my-role
``` ```
### Sample Response ### Sample Response
@@ -301,7 +301,7 @@ returned, not any values.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request LIST \ --request LIST \
https://vault.rocks/v1/ssh/roles http://127.0.0.1:8200/v1/ssh/roles
``` ```
### Sample Response ### Sample Response
@@ -346,7 +346,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request DELETE \ --request DELETE \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/ssh/roles/my-role http://127.0.0.1:8200/v1/ssh/roles/my-role
``` ```
## List Zero-Address Roles ## List Zero-Address Roles
@@ -362,7 +362,7 @@ This endpoint returns the list of configured zero-address roles.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/ssh/config/zeroaddress http://127.0.0.1:8200/v1/ssh/config/zeroaddress
``` ```
### Sample Response ### Sample Response
@@ -411,7 +411,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/ssh/config/zeroaddress http://127.0.0.1:8200/v1/ssh/config/zeroaddress
``` ```
## Delete Zero-Address Role ## Delete Zero-Address Role
@@ -428,7 +428,7 @@ This endpoint deletes the zero-address roles configuration.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request DELETE \ --request DELETE \
https://vault.rocks/v1/ssh/config/zeroaddress http://127.0.0.1:8200/v1/ssh/config/zeroaddress
``` ```
## Generate SSH Credentials ## Generate SSH Credentials
@@ -464,7 +464,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/ssh/creds/my-role http://127.0.0.1:8200/v1/ssh/creds/my-role
``` ```
### Sample Response ### Sample Response
@@ -540,7 +540,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/ssh/lookup http://127.0.0.1:8200/v1/ssh/lookup
``` ```
### Sample Response ### Sample Response
@@ -592,7 +592,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/ssh/verify http://127.0.0.1:8200/v1/ssh/verify
### Sample Response ### Sample Response
@@ -647,7 +647,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/ssh/config/ca http://127.0.0.1:8200/v1/ssh/config/ca
``` ```
### Sample Response ### Sample Response
@@ -682,7 +682,7 @@ This endpoint deletes the CA information for the backend via an SSH key pair.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request DELETE \ --request DELETE \
https://vault.rocks/v1/ssh/config/ca http://127.0.0.1:8200/v1/ssh/config/ca
``` ```
## Read Public Key (Unauthenticated) ## Read Public Key (Unauthenticated)
@@ -697,7 +697,7 @@ endpoint.
### Sample Request ### Sample Request
``` ```
$ curl https://vault.rocks/v1/ssh/public_key $ curl http://127.0.0.1:8200/v1/ssh/public_key
``` ```
### Sample Response ### Sample Response
@@ -719,7 +719,7 @@ This endpoint reads the configured/generated public key.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/ssh/config/ca http://127.0.0.1:8200/v1/ssh/config/ca
``` ```
### Sample Response ### Sample Response
@@ -788,7 +788,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/ssh/sign/my-key http://127.0.0.1:8200/v1/ssh/sign/my-key
``` ```
### Sample Response ### Sample Response

View File

@@ -67,7 +67,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/totp/keys/my-key http://127.0.0.1:8200/v1/totp/keys/my-key
``` ```
### Sample Payload ### Sample Payload
@@ -87,7 +87,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/totp/keys/my-key http://127.0.0.1:8200/v1/totp/keys/my-key
``` ```
### Sample Response ### Sample Response
@@ -124,7 +124,7 @@ This endpoint queries the key definition.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/totp/keys/my-key http://127.0.0.1:8200/v1/totp/keys/my-key
``` ```
### Sample Response ### Sample Response
@@ -156,7 +156,7 @@ returned, not any values.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request LIST \ --request LIST \
https://vault.rocks/v1/totp/keys http://127.0.0.1:8200/v1/totp/keys
``` ```
### Sample Response ### Sample Response
@@ -192,7 +192,7 @@ This endpoint deletes the key definition.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request DELETE \ --request DELETE \
https://vault.rocks/v1/totp/keys/my-key http://127.0.0.1:8200/v1/totp/keys/my-key
``` ```
## Generate Code ## Generate Code
@@ -214,7 +214,7 @@ key.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/totp/code/my-key http://127.0.0.1:8200/v1/totp/code/my-key
``` ```
### Sample Response ### Sample Response
@@ -257,7 +257,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/totp/code/my-key http://127.0.0.1:8200/v1/totp/code/my-key
``` ```
### Sample Response ### Sample Response

View File

@@ -77,7 +77,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/transit/keys/my-key http://127.0.0.1:8200/v1/transit/keys/my-key
``` ```
## Read Key ## Read Key
@@ -102,7 +102,7 @@ type.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/transit/keys/my-key http://127.0.0.1:8200/v1/transit/keys/my-key
``` ```
### Sample Response ### Sample Response
@@ -144,7 +144,7 @@ actual keys themselves).
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request LIST \ --request LIST \
https://vault.rocks/v1/transit/keys http://127.0.0.1:8200/v1/transit/keys
``` ```
### Sample Response ### Sample Response
@@ -182,7 +182,7 @@ catastrophic operation, the `deletion_allowed` tunable must be set in the key's
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request DELETE \ --request DELETE \
https://vault.rocks/v1/transit/keys/my-key http://127.0.0.1:8200/v1/transit/keys/my-key
``` ```
## Update Key Configuration ## Update Key Configuration
@@ -233,7 +233,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/transit/keys/my-key/config http://127.0.0.1:8200/v1/transit/keys/my-key/config
``` ```
## Rotate Key ## Rotate Key
@@ -254,7 +254,7 @@ decryption operations.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
https://vault.rocks/v1/transit/keys/my-key/rotate http://127.0.0.1:8200/v1/transit/keys/my-key/rotate
``` ```
## Export Key ## Export Key
@@ -291,7 +291,7 @@ be valid.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/transit/export/encryption-key/my-key/1 http://127.0.0.1:8200/v1/transit/export/encryption-key/my-key/1
``` ```
### Sample Response ### Sample Response
@@ -391,7 +391,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/transit/encrypt/my-key http://127.0.0.1:8200/v1/transit/encrypt/my-key
``` ```
### Sample Response ### Sample Response
@@ -460,7 +460,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/transit/decrypt/my-key http://127.0.0.1:8200/v1/transit/decrypt/my-key
``` ```
### Sample Response ### Sample Response
@@ -535,7 +535,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/transit/rewrap/my-key http://127.0.0.1:8200/v1/transit/rewrap/my-key
``` ```
### Sample Response ### Sample Response
@@ -599,7 +599,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/transit/datakey/plaintext/my-key http://127.0.0.1:8200/v1/transit/datakey/plaintext/my-key
``` ```
### Sample Response ### Sample Response
@@ -644,7 +644,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/transit/random/164 http://127.0.0.1:8200/v1/transit/random/164
``` ```
### Sample Response ### Sample Response
@@ -696,7 +696,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/transit/hash/sha2-512 http://127.0.0.1:8200/v1/transit/hash/sha2-512
``` ```
### Sample Response ### Sample Response
@@ -755,7 +755,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/transit/hmac/my-key/sha2-512 http://127.0.0.1:8200/v1/transit/hmac/my-key/sha2-512
``` ```
### Sample Response ### Sample Response
@@ -829,7 +829,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/transit/sign/my-key/sha2-512 http://127.0.0.1:8200/v1/transit/sign/my-key/sha2-512
``` ```
### Sample Response ### Sample Response
@@ -905,7 +905,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/transit/verify/my-key/sha2-512 http://127.0.0.1:8200/v1/transit/verify/my-key/sha2-512
``` ```
### Sample Response ### Sample Response
@@ -938,7 +938,7 @@ restore the key.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/transit/backup/aes http://127.0.0.1:8200/v1/transit/backup/aes
``` ```
### Sample Response ### Sample Response
@@ -982,5 +982,5 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/transit/restore http://127.0.0.1:8200/v1/transit/restore
``` ```

View File

@@ -51,7 +51,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/sys/audit-hash/example-audit http://127.0.0.1:8200/v1/sys/audit-hash/example-audit
``` ```
### Sample Response ### Sample Response

View File

@@ -29,7 +29,7 @@ available audit devices).
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/sys/audit http://127.0.0.1:8200/v1/sys/audit
``` ```
### Sample Response ### Sample Response
@@ -95,7 +95,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request PUT \ --request PUT \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/sys/audit/example-audit http://127.0.0.1:8200/v1/sys/audit/example-audit
``` ```
## Disable Audit Device ## Disable Audit Device
@@ -120,5 +120,5 @@ This endpoint disables the audit device at the given path.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request DELETE \ --request DELETE \
https://vault.rocks/v1/sys/audit/example-audit http://127.0.0.1:8200/v1/sys/audit/example-audit
``` ```

View File

@@ -25,7 +25,7 @@ This endpoint lists all enabled auth methods.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/sys/auth http://127.0.0.1:8200/v1/sys/auth
``` ```
### Sample Response ### Sample Response
@@ -121,7 +121,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/sys/auth/my-auth http://127.0.0.1:8200/v1/sys/auth/my-auth
``` ```
## Disable Auth Method ## Disable Auth Method
@@ -146,7 +146,7 @@ This endpoint disables the auth method at the given auth path.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request DELETE \ --request DELETE \
https://vault.rocks/v1/sys/auth/my-auth http://127.0.0.1:8200/v1/sys/auth/my-auth
``` ```
## Read Auth Method Tuning ## Read Auth Method Tuning
@@ -171,7 +171,7 @@ without `sudo` via `sys/mounts/auth/[auth-path]/tune`._
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/sys/auth/my-auth/tune http://127.0.0.1:8200/v1/sys/auth/my-auth/tune
``` ```
### Sample Response ### Sample Response
@@ -231,5 +231,5 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/sys/auth/my-auth/tune http://127.0.0.1:8200/v1/sys/auth/my-auth/tune
``` ```

View File

@@ -50,7 +50,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/sys/capabilities-accessor http://127.0.0.1:8200/v1/sys/capabilities-accessor
``` ```
### Sample Response ### Sample Response

View File

@@ -47,7 +47,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/sys/capabilities-self http://127.0.0.1:8200/v1/sys/capabilities-self
``` ```
### Sample Response ### Sample Response

View File

@@ -48,7 +48,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/sys/capabilities http://127.0.0.1:8200/v1/sys/capabilities
``` ```
### Sample Response ### Sample Response

View File

@@ -26,7 +26,7 @@ This endpoint lists the request headers that are configured to be audited.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/sys/config/auditing/request-headers http://127.0.0.1:8200/v1/sys/config/auditing/request-headers
``` ```
### Sample Response ### Sample Response
@@ -62,7 +62,7 @@ This endpoint lists the information for the given request header.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/sys/config/auditing/request-headers/my-header http://127.0.0.1:8200/v1/sys/config/auditing/request-headers/my-header
``` ```
### Sample Response ### Sample Response
@@ -106,7 +106,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request PUT \ --request PUT \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/sys/config/auditing/request-headers/my-header http://127.0.0.1:8200/v1/sys/config/auditing/request-headers/my-header
``` ```
## Delete Audit Request Header ## Delete Audit Request Header
@@ -126,5 +126,5 @@ This endpoint disables auditing of the given request header.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request DELETE \ --request DELETE \
https://vault.rocks/v1/sys/config/auditing/request-headers/my-header http://127.0.0.1:8200/v1/sys/config/auditing/request-headers/my-header
``` ```

View File

@@ -26,7 +26,7 @@ This endpoint returns the current Control Group configuration.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/sys/config/control-group http://127.0.0.1:8200/v1/sys/config/control-group
``` ```
### Sample Response ### Sample Response
@@ -64,7 +64,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request PUT \ --request PUT \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/sys/config/control-group http://127.0.0.1:8200/v1/sys/config/control-group
``` ```
## Delete Control Group Settings ## Delete Control Group Settings
@@ -81,5 +81,5 @@ This endpoint removes any control group configuration.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request DELETE \ --request DELETE \
https://vault.rocks/v1/sys/config/control-group http://127.0.0.1:8200/v1/sys/config/control-group
``` ```

View File

@@ -26,7 +26,7 @@ This endpoint returns the current CORS configuration.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/sys/config/cors http://127.0.0.1:8200/v1/sys/config/cors
``` ```
### Sample Response ### Sample Response
@@ -78,7 +78,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request PUT \ --request PUT \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/sys/config/cors http://127.0.0.1:8200/v1/sys/config/cors
``` ```
## Delete CORS Settings ## Delete CORS Settings
@@ -95,5 +95,5 @@ This endpoint removes any CORS configuration.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request DELETE \ --request DELETE \
https://vault.rocks/v1/sys/config/cors http://127.0.0.1:8200/v1/sys/config/cors
``` ```

View File

@@ -35,7 +35,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/sys/control-group/authorize http://127.0.0.1:8200/v1/sys/control-group/authorize
``` ```
### Sample Response ### Sample Response
@@ -75,7 +75,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/sys/control-group/request http://127.0.0.1:8200/v1/sys/control-group/request
``` ```
### Sample Response ### Sample Response

View File

@@ -24,7 +24,7 @@ attempt.
``` ```
$ curl \ $ curl \
https://vault.rocks/v1/sys/generate-root/attempt http://127.0.0.1:8200/v1/sys/generate-root/attempt
``` ```
### Sample Response ### Sample Response
@@ -82,7 +82,7 @@ generation attempt can take place at a time. One (and only one) of `otp` or
$ curl \ $ curl \
--request PUT \ --request PUT \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/sys/generate-root/attempt http://127.0.0.1:8200/v1/sys/generate-root/attempt
``` ```
### Sample Response ### Sample Response
@@ -113,7 +113,7 @@ progress made. This must be called to change the OTP or PGP key being used.
``` ```
$ curl \ $ curl \
--request DELETE \ --request DELETE \
https://vault.rocks/v1/sys/generate-root/attempt http://127.0.0.1:8200/v1/sys/generate-root/attempt
``` ```
## Provide Key Share to Generate Root ## Provide Key Share to Generate Root
@@ -149,7 +149,7 @@ nonce must be provided with each call.
$ curl \ $ curl \
--request PUT \ --request PUT \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/sys/generate-root/update http://127.0.0.1:8200/v1/sys/generate-root/update
``` ```
### Sample Response ### Sample Response

View File

@@ -52,7 +52,7 @@ The default status codes are:
``` ```
$ curl \ $ curl \
https://vault.rocks/v1/sys/health http://127.0.0.1:8200/v1/sys/health
``` ```
### Sample Response ### Sample Response

View File

@@ -22,7 +22,7 @@ This endpoint returns the initialization status of Vault.
``` ```
$ curl \ $ curl \
https://vault.rocks/v1/sys/init http://127.0.0.1:8200/v1/sys/init
``` ```
### Sample Response ### Sample Response
@@ -95,7 +95,7 @@ Additionally, the following options are only supported on Vault Pro/Enterprise:
$ curl \ $ curl \
--request PUT \ --request PUT \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/sys/init http://127.0.0.1:8200/v1/sys/init
``` ```
### Sample Response ### Sample Response

View File

@@ -25,7 +25,7 @@ of Vault.
``` ```
$ curl \ $ curl \
https://vault.rocks/v1/sys/leader http://127.0.0.1:8200/v1/sys/leader
``` ```
### Sample Response ### Sample Response

View File

@@ -37,7 +37,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request PUT \ --request PUT \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/sys/leases/lookup http://127.0.0.1:8200/v1/sys/leases/lookup
``` ```
### Sample Response ### Sample Response
@@ -70,7 +70,7 @@ This endpoint returns a list of lease ids.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request LIST \ --request LIST \
https://vault.rocks/v1/sys/leases/lookup/aws/creds/deploy/ http://127.0.0.1:8200/v1/sys/leases/lookup/aws/creds/deploy/
``` ```
### Sample Response ### Sample Response
@@ -119,7 +119,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request PUT \ --request PUT \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/sys/leases/renew http://127.0.0.1:8200/v1/sys/leases/renew
``` ```
### Sample Response ### Sample Response
@@ -159,7 +159,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request PUT \ --request PUT \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/sys/leases/revoke http://127.0.0.1:8200/v1/sys/leases/revoke
``` ```
## Revoke Force ## Revoke Force
@@ -191,7 +191,7 @@ this endpoint should be tightly controlled.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request PUT \ --request PUT \
https://vault.rocks/v1/sys/leases/revoke-force/aws/creds http://127.0.0.1:8200/v1/sys/leases/revoke-force/aws/creds
``` ```
## Revoke Prefix ## Revoke Prefix
@@ -218,5 +218,5 @@ used to revoke very large numbers of secrets/tokens at once.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request PUT \ --request PUT \
https://vault.rocks/v1/sys/leases/revoke-prefix/aws/creds http://127.0.0.1:8200/v1/sys/leases/revoke-prefix/aws/creds
``` ```

View File

@@ -27,7 +27,7 @@ This endpoint returns information about the currently installed license.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/sys/license http://127.0.0.1:8200/v1/sys/license
``` ```
### Sample Response ### Sample Response
@@ -83,5 +83,5 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request PUT \ --request PUT \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/sys/license http://127.0.0.1:8200/v1/sys/license
``` ```

View File

@@ -52,7 +52,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/sys/mfa/method/duo/my_duo http://127.0.0.1:8200/v1/sys/mfa/method/duo/my_duo
``` ```
## Read Duo MFA Method ## Read Duo MFA Method
@@ -74,7 +74,7 @@ name.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request GET \ --request GET \
https://vault.rocks/v1/sys/mfa/method/duo/my_duo http://127.0.0.1:8200/v1/sys/mfa/method/duo/my_duo
``` ```
@@ -114,6 +114,6 @@ This endpoint deletes a Duo MFA method.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request DELETE \ --request DELETE \
https://vault.rocks/v1/sys/mfa/method/duo/my_duo http://127.0.0.1:8200/v1/sys/mfa/method/duo/my_duo
``` ```

View File

@@ -51,7 +51,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/sys/mfa/method/okta/my_okta http://127.0.0.1:8200/v1/sys/mfa/method/okta/my_okta
``` ```
## Read Okta MFA Method ## Read Okta MFA Method
@@ -73,7 +73,7 @@ name.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request GET \ --request GET \
https://vault.rocks/v1/sys/mfa/method/okta/my_okta http://127.0.0.1:8200/v1/sys/mfa/method/okta/my_okta
``` ```
@@ -112,6 +112,6 @@ This endpoint deletes a Okta MFA method.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request DELETE \ --request DELETE \
https://vault.rocks/v1/sys/mfa/method/okta/my_okta http://127.0.0.1:8200/v1/sys/mfa/method/okta/my_okta
``` ```

View File

@@ -44,7 +44,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/sys/mfa/method/pingid/ping http://127.0.0.1:8200/v1/sys/mfa/method/pingid/ping
``` ```
## Read PingiD MFA Method ## Read PingiD MFA Method
@@ -66,7 +66,7 @@ name.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request GET \ --request GET \
https://vault.rocks/v1/sys/mfa/method/pingid/ping http://127.0.0.1:8200/v1/sys/mfa/method/pingid/ping
``` ```
@@ -106,6 +106,6 @@ This endpoint deletes a PingID MFA method.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request DELETE \ --request DELETE \
https://vault.rocks/v1/sys/mfa/method/pingid/ping http://127.0.0.1:8200/v1/sys/mfa/method/pingid/ping
``` ```

View File

@@ -48,7 +48,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/sys/mfa/method/totp/my_totp http://127.0.0.1:8200/v1/sys/mfa/method/totp/my_totp
``` ```
## Read TOTP MFA Method ## Read TOTP MFA Method
@@ -70,7 +70,7 @@ name.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request GET \ --request GET \
https://vault.rocks/v1/sys/mfa/method/totp/my_totp http://127.0.0.1:8200/v1/sys/mfa/method/totp/my_totp
``` ```
@@ -112,7 +112,7 @@ This endpoint deletes a TOTP MFA method.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request DELETE \ --request DELETE \
https://vault.rocks/v1/sys/mfa/method/totp/my_totp http://127.0.0.1:8200/v1/sys/mfa/method/totp/my_totp
``` ```
@@ -136,7 +136,7 @@ method name.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request GET \ --request GET \
https://vault.rocks/v1/sys/mfa/method/totp/my_totp/generate http://127.0.0.1:8200/v1/sys/mfa/method/totp/my_totp/generate
``` ```
### Sample Response ### Sample Response
@@ -182,7 +182,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json --data @payload.json
https://vault.rocks/v1/sys/mfa/method/totp/my_totp/admin-generate http://127.0.0.1:8200/v1/sys/mfa/method/totp/my_totp/admin-generate
``` ```
### Sample Response ### Sample Response
@@ -231,5 +231,5 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json --data @payload.json
https://vault.rocks/v1/sys/mfa/method/totp/my_totp/admin-destroy http://127.0.0.1:8200/v1/sys/mfa/method/totp/my_totp/admin-destroy
``` ```

View File

@@ -23,7 +23,7 @@ This endpoints lists all the mounted secrets engines.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/sys/mounts http://127.0.0.1:8200/v1/sys/mounts
``` ```
### Sample Response ### Sample Response
@@ -139,7 +139,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/sys/mounts/my-mount http://127.0.0.1:8200/v1/sys/mounts/my-mount
``` ```
## Disable Secrets Engine ## Disable Secrets Engine
@@ -156,7 +156,7 @@ This endpoint disables the mount point specified in the URL.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request DELETE \ --request DELETE \
https://vault.rocks/v1/sys/mounts/my-mount http://127.0.0.1:8200/v1/sys/mounts/my-mount
``` ```
## Read Mount Configuration ## Read Mount Configuration
@@ -174,7 +174,7 @@ be the system default or a mount-specific value.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/sys/mounts/my-mount/tune http://127.0.0.1:8200/v1/sys/mounts/my-mount/tune
``` ```
### Sample Response ### Sample Response
@@ -232,5 +232,5 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/sys/mounts/my-mount/tune http://127.0.0.1:8200/v1/sys/mounts/my-mount/tune
``` ```

View File

@@ -26,7 +26,7 @@ This endpoint lists the plugins in the catalog.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request LIST --request LIST
https://vault.rocks/v1/sys/plugins/catalog http://127.0.0.1:8200/v1/sys/plugins/catalog
``` ```
### Sample Response ### Sample Response
@@ -86,7 +86,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request PUT \ --request PUT \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/sys/plugins/catalog/example-plugin http://127.0.0.1:8200/v1/sys/plugins/catalog/example-plugin
``` ```
## Read Plugin ## Read Plugin
@@ -111,7 +111,7 @@ This endpoint returns the configuration data for the plugin with the given name.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request GET \ --request GET \
https://vault.rocks/v1/sys/plugins/catalog/example-plugin http://127.0.0.1:8200/v1/sys/plugins/catalog/example-plugin
``` ```
### Sample Response ### Sample Response
@@ -149,5 +149,5 @@ This endpoint removes the plugin with the given name.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request DELETE \ --request DELETE \
https://vault.rocks/v1/sys/plugins/catalog/example-plugin http://127.0.0.1:8200/v1/sys/plugins/catalog/example-plugin
``` ```

View File

@@ -43,5 +43,5 @@ This endpoint reloads mounted plugin backends.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request PUT --request PUT
https://vault.rocks/v1/sys/plugins/reload/backend http://127.0.0.1:8200/v1/sys/plugins/reload/backend
``` ```

View File

@@ -26,7 +26,7 @@ This endpoint lists all configured ACL policies.
``` ```
$ curl \ $ curl \
-X LIST --header "X-Vault-Token: ..." \ -X LIST --header "X-Vault-Token: ..." \
https://vault.rocks/v1/sys/policies/acl http://127.0.0.1:8200/v1/sys/policies/acl
``` ```
### Sample Response ### Sample Response
@@ -55,7 +55,7 @@ This endpoint retrieves information about the named ACL policy.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/sys/policies/acl/my-policy http://127.0.0.1:8200/v1/sys/policies/acl/my-policy
``` ```
### Sample Response ### Sample Response
@@ -99,7 +99,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request PUT \ --request PUT \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/sys/policies/acl/my-policy http://127.0.0.1:8200/v1/sys/policies/acl/my-policy
``` ```
## Delete ACL Policy ## Delete ACL Policy
@@ -123,7 +123,7 @@ acts as an empty policy.)
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request DELETE \ --request DELETE \
https://vault.rocks/v1/sys/policies/acl/my-policy http://127.0.0.1:8200/v1/sys/policies/acl/my-policy
``` ```
## List RGP Policies ## List RGP Policies
@@ -139,7 +139,7 @@ This endpoint lists all configured RGP policies.
``` ```
$ curl \ $ curl \
-X LIST --header "X-Vault-Token: ..." \ -X LIST --header "X-Vault-Token: ..." \
https://vault.rocks/v1/sys/policies/rgp http://127.0.0.1:8200/v1/sys/policies/rgp
``` ```
### Sample Response ### Sample Response
@@ -168,7 +168,7 @@ This endpoint retrieves information about the named RGP policy.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/sys/policies/rgp/webapp http://127.0.0.1:8200/v1/sys/policies/rgp/webapp
``` ```
### Sample Response ### Sample Response
@@ -218,7 +218,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request PUT \ --request PUT \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/sys/policies/rgp/webapp http://127.0.0.1:8200/v1/sys/policies/rgp/webapp
``` ```
## Delete RGP Policy ## Delete RGP Policy
@@ -242,7 +242,7 @@ acts as an empty policy.)
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request DELETE \ --request DELETE \
https://vault.rocks/v1/sys/policies/rgp/webapp http://127.0.0.1:8200/v1/sys/policies/rgp/webapp
``` ```
## List EGP Policies ## List EGP Policies
@@ -264,7 +264,7 @@ path, this endpoint returns two identifiers:
``` ```
$ curl \ $ curl \
-X LIST --header "X-Vault-Token: ..." \ -X LIST --header "X-Vault-Token: ..." \
https://vault.rocks/v1/sys/policies/egp http://127.0.0.1:8200/v1/sys/policies/egp
``` ```
### Sample Response ### Sample Response
@@ -293,7 +293,7 @@ This endpoint retrieves information about the named EGP policy.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/sys/policies/egp/breakglass http://127.0.0.1:8200/v1/sys/policies/egp/breakglass
``` ```
### Sample Response ### Sample Response
@@ -350,7 +350,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request PUT \ --request PUT \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/sys/policies/egp/breakglass http://127.0.0.1:8200/v1/sys/policies/egp/breakglass
``` ```
## Delete EGP Policy ## Delete EGP Policy
@@ -372,5 +372,5 @@ This endpoint deletes the EGP policy with the given name from all paths on which
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request DELETE \ --request DELETE \
https://vault.rocks/v1/sys/policies/egp/breakglass http://127.0.0.1:8200/v1/sys/policies/egp/breakglass
``` ```

View File

@@ -23,7 +23,7 @@ This endpoint lists all configured policies.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/sys/policy http://127.0.0.1:8200/v1/sys/policy
``` ```
### Sample Response ### Sample Response
@@ -52,7 +52,7 @@ This endpoint retrieve the policy body for the named policy.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/sys/policy/my-policy http://127.0.0.1:8200/v1/sys/policy/my-policy
``` ```
### Sample Response ### Sample Response
@@ -94,7 +94,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request PUT \ --request PUT \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/sys/policy/my-policy http://127.0.0.1:8200/v1/sys/policy/my-policy
``` ```
## Delete Policy ## Delete Policy
@@ -117,5 +117,5 @@ affect all users associated with this policy.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request DELETE \ --request DELETE \
https://vault.rocks/v1/sys/policy/my-policy http://127.0.0.1:8200/v1/sys/policy/my-policy
``` ```

View File

@@ -34,7 +34,7 @@ system.
``` ```
$ curl \ $ curl \
---header "X-Vault-Token: ..." \ ---header "X-Vault-Token: ..." \
https://vault.rocks/v1/sys/raw/secret/foo http://127.0.0.1:8200/v1/sys/raw/secret/foo
``` ```
### Sample Response ### Sample Response
@@ -77,7 +77,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request PUT \ --request PUT \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/sys/raw/secret/foo http://127.0.0.1:8200/v1/sys/raw/secret/foo
``` ```
## List Raw ## List Raw
@@ -98,7 +98,7 @@ This endpoint returns a list keys for a given path prefix.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request LIST \ --request LIST \
https://vault.rocks/v1/sys/raw/logical http://127.0.0.1:8200/v1/sys/raw/logical
``` ```
### Sample Response ### Sample Response
@@ -135,5 +135,5 @@ storage backend and not the logical path that is exposed via the mount system.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request DELETE \ --request DELETE \
https://vault.rocks/v1/sys/raw/secret/foo http://127.0.0.1:8200/v1/sys/raw/secret/foo
``` ```

View File

@@ -25,7 +25,7 @@ This endpoint reads the configuration and progress of the current rekey attempt.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/sys/rekey-recovery-key/init http://127.0.0.1:8200/v1/sys/rekey-recovery-key/init
``` ```
### Sample Response ### Sample Response
@@ -97,7 +97,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request PUT \ --request PUT \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/sys/rekey-recovery-key/init http://127.0.0.1:8200/v1/sys/rekey-recovery-key/init
``` ```
## Cancel Rekey ## Cancel Rekey
@@ -116,7 +116,7 @@ rekey.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request DELETE \ --request DELETE \
https://vault.rocks/v1/sys/rekey-recovery-key/init http://127.0.0.1:8200/v1/sys/rekey-recovery-key/init
``` ```
## Read Backup Key ## Read Backup Key
@@ -134,7 +134,7 @@ fingerprint to hex-encoded PGP-encrypted key.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/sys/rekey-recovery-key/backup http://127.0.0.1:8200/v1/sys/rekey-recovery-key/backup
``` ```
### Sample Response ### Sample Response
@@ -162,7 +162,7 @@ This endpoint deletes the backup copy of PGP-encrypted recovery key shares.
$ curl \ $ curl \
--header "X-Vault-Token" \ --header "X-Vault-Token" \
--request DELETE \ --request DELETE \
https://vault.rocks/v1/sys/rekey-recovery-key/backup http://127.0.0.1:8200/v1/sys/rekey-recovery-key/backup
``` ```
## Submit Key ## Submit Key
@@ -199,7 +199,7 @@ $ curl \
--header "X-Vault-Token" \ --header "X-Vault-Token" \
--request PUT \ --request PUT \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/sys/rekey-recovery-key/update http://127.0.0.1:8200/v1/sys/rekey-recovery-key/update
``` ```
### Sample Response ### Sample Response

View File

@@ -28,7 +28,7 @@ This endpoint reads the configuration and progress of the current rekey attempt.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/sys/rekey/init http://127.0.0.1:8200/v1/sys/rekey/init
``` ```
### Sample Response ### Sample Response
@@ -99,7 +99,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request PUT \ --request PUT \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/sys/rekey/init http://127.0.0.1:8200/v1/sys/rekey/init
``` ```
## Cancel Rekey ## Cancel Rekey
@@ -118,7 +118,7 @@ rekey.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request DELETE \ --request DELETE \
https://vault.rocks/v1/sys/rekey/init http://127.0.0.1:8200/v1/sys/rekey/init
``` ```
## Read Backup Key ## Read Backup Key
@@ -136,7 +136,7 @@ hex-encoded PGP-encrypted key.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/sys/rekey/backup http://127.0.0.1:8200/v1/sys/rekey/backup
``` ```
### Sample Response ### Sample Response
@@ -164,7 +164,7 @@ This endpoint deletes the backup copy of PGP-encrypted unseal keys.
$ curl \ $ curl \
--header "X-Vault-Token" \ --header "X-Vault-Token" \
--request DELETE \ --request DELETE \
https://vault.rocks/v1/sys/rekey/backup http://127.0.0.1:8200/v1/sys/rekey/backup
``` ```
## Submit Key ## Submit Key
@@ -201,7 +201,7 @@ $ curl \
--header "X-Vault-Token" \ --header "X-Vault-Token" \
--request PUT \ --request PUT \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/sys/rekey/update http://127.0.0.1:8200/v1/sys/rekey/update
``` ```
### Sample Response ### Sample Response

View File

@@ -40,5 +40,5 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/sys/remount http://127.0.0.1:8200/v1/sys/remount
``` ```

View File

@@ -25,7 +25,7 @@ This is an authenticated endpoint.
``` ```
$ curl \ $ curl \
https://vault.rocks/v1/sys/replication/dr/status http://127.0.0.1:8200/v1/sys/replication/dr/status
``` ```
### Sample Response ### Sample Response
@@ -87,7 +87,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/sys/replication/dr/primary/enable http://127.0.0.1:8200/v1/sys/replication/dr/primary/enable
``` ```
## Demote DR Primary ## Demote DR Primary
@@ -107,7 +107,7 @@ DR replication set without wiping local storage.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
https://vault.rocks/v1/sys/replication/dr/primary/demote http://127.0.0.1:8200/v1/sys/replication/dr/primary/demote
``` ```
## Disable DR Primary ## Disable DR Primary
@@ -129,7 +129,7 @@ will require a wipe of the underlying storage.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
https://vault.rocks/v1/sys/replication/dr/primary/disable http://127.0.0.1:8200/v1/sys/replication/dr/primary/disable
``` ```
## Generate DR Secondary Token ## Generate DR Secondary Token
@@ -156,7 +156,7 @@ identifier can later be used to revoke a DR secondary's access.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/sys/replication/dr/primary/secondary-token?id=us-east-1 http://127.0.0.1:8200/v1/sys/replication/dr/primary/secondary-token?id=us-east-1
``` ```
### Sample Response ### Sample Response
@@ -207,7 +207,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/sys/replication/dr/primary/revoke-secondary http://127.0.0.1:8200/v1/sys/replication/dr/primary/revoke-secondary
``` ```
## Enable DR Secondary ## Enable DR Secondary
@@ -254,7 +254,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/sys/replication/dr/secondary/enable http://127.0.0.1:8200/v1/sys/replication/dr/secondary/enable
``` ```
## Promote DR Secondary ## Promote DR Secondary
@@ -306,7 +306,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/sys/replication/dr/secondary/promote http://127.0.0.1:8200/v1/sys/replication/dr/secondary/promote
``` ```
### Sample Response ### Sample Response
@@ -382,7 +382,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/sys/replication/dr/secondary/update-primary http://127.0.0.1:8200/v1/sys/replication/dr/secondary/update-primary
``` ```
## Generate Disaster Recovery Operation Token ## Generate Disaster Recovery Operation Token
@@ -405,7 +405,7 @@ attempt.
``` ```
$ curl \ $ curl \
https://vault.rocks/v1/sys/replication/dr/secondary/generate-operation-token/attempt http://127.0.0.1:8200/v1/sys/replication/dr/secondary/generate-operation-token/attempt
``` ```
### Sample Response ### Sample Response
@@ -463,7 +463,7 @@ generation attempt can take place at a time. One (and only one) of `otp` or
$ curl \ $ curl \
--request PUT \ --request PUT \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/sys/replication/dr/secondary/generate-operation-token/attempt http://127.0.0.1:8200/v1/sys/replication/dr/secondary/generate-operation-token/attempt
``` ```
### Sample Response ### Sample Response
@@ -494,7 +494,7 @@ progress made. This must be called to change the OTP or PGP key being used.
``` ```
$ curl \ $ curl \
--request DELETE \ --request DELETE \
https://vault.rocks/v1/sys/replication/dr/secondary/generate-operation-token/attempt http://127.0.0.1:8200/v1/sys/replication/dr/secondary/generate-operation-token/attempt
``` ```
## Provide Key Share to Generate Token ## Provide Key Share to Generate Token
@@ -530,7 +530,7 @@ nonce must be provided with each call.
$ curl \ $ curl \
--request PUT \ --request PUT \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/sys/replication/dr/secondary/generate-operation-token/update http://127.0.0.1:8200/v1/sys/replication/dr/secondary/generate-operation-token/update
``` ```
### Sample Response ### Sample Response
@@ -579,5 +579,5 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/sys/replication/dr/secondary/operation-token/delete http://127.0.0.1:8200/v1/sys/replication/dr/secondary/operation-token/delete
``` ```

View File

@@ -25,7 +25,7 @@ This is an authenticated endpoint.
``` ```
$ curl \ $ curl \
https://vault.rocks/v1/sys/replication/performance/status http://127.0.0.1:8200/v1/sys/replication/performance/status
``` ```
### Sample Response ### Sample Response
@@ -91,7 +91,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/sys/replication/performance/primary/enable http://127.0.0.1:8200/v1/sys/replication/performance/primary/enable
``` ```
## Demote Performance Primary ## Demote Performance Primary
@@ -111,7 +111,7 @@ replication set without wiping local storage.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
https://vault.rocks/v1/sys/replication/performance/primary/demote http://127.0.0.1:8200/v1/sys/replication/performance/primary/demote
``` ```
## Disable Performance Primary ## Disable Performance Primary
@@ -134,7 +134,7 @@ they have connected before) will require a wipe of the underlying storage.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
https://vault.rocks/v1/sys/replication/performance/primary/disable http://127.0.0.1:8200/v1/sys/replication/performance/primary/disable
``` ```
## Generate Performance Secondary Token ## Generate Performance Secondary Token
@@ -171,7 +171,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/sys/replication/performance/primary/secondary-token http://127.0.0.1:8200/v1/sys/replication/performance/primary/secondary-token
``` ```
### Sample Response ### Sample Response
@@ -222,7 +222,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/sys/replication/performance/primary/revoke-secondary http://127.0.0.1:8200/v1/sys/replication/performance/primary/revoke-secondary
``` ```
## Create Mounts Filter ## Create Mounts Filter
@@ -261,7 +261,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/sys/replication/performance/primary/mount-filter/us-east-1 http://127.0.0.1:8200/v1/sys/replication/performance/primary/mount-filter/us-east-1
``` ```
## Read Mounts Filter ## Read Mounts Filter
@@ -282,7 +282,7 @@ for a secondary.
``` ```
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/sys/replication/performance/primary/mount-filter/us-east-1 http://127.0.0.1:8200/v1/sys/replication/performance/primary/mount-filter/us-east-1
``` ```
### Sample Response ### Sample Response
@@ -312,7 +312,7 @@ This endpoint is used to delete the mount filters for a secondary.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request DELETE \ --request DELETE \
https://vault.rocks/v1/sys/replication/performance/primary/mount-filter/us-east-1 http://127.0.0.1:8200/v1/sys/replication/performance/primary/mount-filter/us-east-1
``` ```
## Enable Performance Secondary ## Enable Performance Secondary
@@ -359,7 +359,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/sys/replication/performance/secondary/enable http://127.0.0.1:8200/v1/sys/replication/performance/secondary/enable
``` ```
## Promote Performance Secondary ## Promote Performance Secondary
@@ -393,7 +393,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/sys/replication/performance/secondary/promote http://127.0.0.1:8200/v1/sys/replication/performance/secondary/promote
``` ```
## Disable Performance Secondary ## Disable Performance Secondary
@@ -418,7 +418,7 @@ underlying storage.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
https://vault.rocks/v1/sys/replication/performance/secondary/disable http://127.0.0.1:8200/v1/sys/replication/performance/secondary/disable
``` ```
## Update Performance Secondary's Primary ## Update Performance Secondary's Primary
@@ -465,5 +465,5 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/sys/replication/performance/secondary/update-primary http://127.0.0.1:8200/v1/sys/replication/performance/secondary/update-primary
``` ```

View File

@@ -25,7 +25,7 @@ example: an error has caused replication to stop syncing.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
https://vault.rocks/v1/sys/replication/recover http://127.0.0.1:8200/v1/sys/replication/recover
``` ```
### Sample Response ### Sample Response
@@ -51,7 +51,7 @@ depending on the number and size of objects in the data store.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
https://vault.rocks/v1/sys/replication/reindex http://127.0.0.1:8200/v1/sys/replication/reindex
``` ```
### Sample Response ### Sample Response
@@ -77,7 +77,7 @@ This is an authenticated endpoint.
``` ```
$ curl \ $ curl \
https://vault.rocks/v1/sys/replication/status http://127.0.0.1:8200/v1/sys/replication/status
``` ```
### Sample Response ### Sample Response

View File

@@ -27,5 +27,5 @@ the new key, while old values are decrypted with previous encryption keys.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request PUT \ --request PUT \
https://vault.rocks/v1/sys/rotate http://127.0.0.1:8200/v1/sys/rotate
``` ```

View File

@@ -23,7 +23,7 @@ endpoint.
``` ```
$ curl \ $ curl \
https://vault.rocks/v1/sys/seal-status http://127.0.0.1:8200/v1/sys/seal-status
``` ```
### Sample Response ### Sample Response

View File

@@ -26,5 +26,5 @@ Standby nodes should be restarted to get the same effect. Requires a token with
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request PUT \ --request PUT \
https://vault.rocks/v1/sys/seal http://127.0.0.1:8200/v1/sys/seal
``` ```

View File

@@ -29,5 +29,5 @@ the path.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request PUT \ --request PUT \
https://vault.rocks/v1/sys/step-down http://127.0.0.1:8200/v1/sys/step-down
``` ```

View File

@@ -41,7 +41,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/sys/tools/random/164 http://127.0.0.1:8200/v1/sys/tools/random/164
``` ```
### Sample Response ### Sample Response
@@ -93,7 +93,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/sys/tools/hash/sha2-512 http://127.0.0.1:8200/v1/sys/tools/hash/sha2-512
``` ```
### Sample Response ### Sample Response

View File

@@ -46,7 +46,7 @@ Either the `key` or `reset` parameter must be provided; if both are provided,
$ curl \ $ curl \
--request PUT \ --request PUT \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/sys/unseal http://127.0.0.1:8200/v1/sys/unseal
``` ```
### Sample Response ### Sample Response

View File

@@ -37,7 +37,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/sys/wrapping/lookup http://127.0.0.1:8200/v1/sys/wrapping/lookup
``` ```
### Sample Response ### Sample Response

View File

@@ -41,7 +41,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/sys/wrapping/lookup http://127.0.0.1:8200/v1/sys/wrapping/lookup
``` ```
### Sample Response ### Sample Response

View File

@@ -50,7 +50,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/sys/wrapping/unwrap http://127.0.0.1:8200/v1/sys/wrapping/unwrap
``` ```
### Sample Response ### Sample Response

View File

@@ -44,7 +44,7 @@ $ curl \
--header "X-Vault-Wrap-TTL: 60" \ --header "X-Vault-Wrap-TTL: 60" \
--request POST \ --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/sys/wrapping/wrap http://127.0.0.1:8200/v1/sys/wrapping/wrap
``` ```
### Sample Response ### Sample Response

View File

@@ -76,7 +76,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--method POST \ --method POST \
--data '{"user_id": ":user_id"}' \ --data '{"user_id": ":user_id"}' \
https://vault.rocks/v1/auth/app-id/login/:app_id http://127.0.0.1:8200/v1/auth/app-id/login/:app_id
``` ```
## Configuration ## Configuration

View File

@@ -52,7 +52,7 @@ at a different path, use that value instead of `approle`.
$ curl \ $ curl \
--request POST \ --request POST \
--data '{"role_id":"988a9df-...","secret_id":"37b74931..."}' \ --data '{"role_id":"988a9df-...","secret_id":"37b74931..."}' \
https://vault.rocks/v1/auth/approle/login http://127.0.0.1:8200/v1/auth/approle/login
``` ```
The response will contain the token at `auth.client_token`: The response will contain the token at `auth.client_token`:
@@ -126,7 +126,7 @@ management tool.
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data '{"type": "approle"}' \ --data '{"type": "approle"}' \
https://vault.rocks/v1/sys/auth/approle http://127.0.0.1:8200/v1/sys/auth/approle
``` ```
1. Create an AppRole with desired set of policies: 1. Create an AppRole with desired set of policies:
@@ -136,7 +136,7 @@ management tool.
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data '{"policies": "dev-policy,test-policy"}' \ --data '{"policies": "dev-policy,test-policy"}' \
https://vault.rocks/v1/auth/approle/role/my-role http://127.0.0.1:8200/v1/auth/approle/role/my-role
``` ```
1. Fetch the identifier of the role: 1. Fetch the identifier of the role:
@@ -144,7 +144,7 @@ management tool.
```sh ```sh
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
https://vault.rocks/v1/auth/approle/role/my-role/role-id http://127.0.0.1:8200/v1/auth/approle/role/my-role/role-id
``` ```
The response will look like: The response will look like:
@@ -163,7 +163,7 @@ management tool.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
https://vault.rocks/v1/auth/approle/role/my-role/secret-id http://127.0.0.1:8200/v1/auth/approle/role/my-role/secret-id
``` ```
The response will look like: The response will look like:

View File

@@ -88,7 +88,7 @@ $ curl \
--cert cert.pem \ --cert cert.pem \
--key key.pem \ --key key.pem \
--data '{"name": "web"}' \ --data '{"name": "web"}' \
https://vault.rocks/v1/auth/cert/login http://127.0.0.1:8200/v1/auth/cert/login
``` ```
## Configuration ## Configuration

View File

@@ -66,7 +66,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data '{"role": "dev-role", "jwt": "eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9..."}' \ --data '{"role": "dev-role", "jwt": "eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9..."}' \
https://vault.rocks/v1/auth/gcp/login http://127.0.0.1:8200/v1/auth/gcp/login
``` ```
The response will contain the token at `auth.client_token`: The response will contain the token at `auth.client_token`:
@@ -148,7 +148,7 @@ management tool.
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data '{"type": "gcp"}' \ --data '{"type": "gcp"}' \
https://vault.rocks/v1/sys/auth/gcp http://127.0.0.1:8200/v1/sys/auth/gcp
``` ```
1. Configure the GCP auth method: 1. Configure the GCP auth method:
@@ -158,7 +158,7 @@ management tool.
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data '{"credentials": "{...}"}' \ --data '{"credentials": "{...}"}' \
https://vault.rocks/v1/auth/gcp/config http://127.0.0.1:8200/v1/auth/gcp/config
``` ```
1. Create a role: 1. Create a role:
@@ -168,7 +168,7 @@ management tool.
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data '{"type": "iam", "project": "project-123456", ...}' \ --data '{"type": "iam", "project": "project-123456", ...}' \
https://vault.rocks/v1/auth/gcp/role/dev-role http://127.0.0.1:8200/v1/auth/gcp/role/dev-role
``` ```
### Plugin Setup ### Plugin Setup

View File

@@ -42,7 +42,7 @@ at a different path, use that value instead of `github`.
$ curl \ $ curl \
--request POST \ --request POST \
--data '{"token": "MY_TOKEN"}' \ --data '{"token": "MY_TOKEN"}' \
https://vault.rocks/v1/auth/github/login http://127.0.0.1:8200/v1/auth/github/login
``` ```
The response will contain a token at `auth.client_token`: The response will contain a token at `auth.client_token`:

View File

@@ -34,7 +34,7 @@ at a different path, use that value instead of `kubernetes`.
$ curl \ $ curl \
--request POST \ --request POST \
--data '{"jwt": "your_service_account_jwt", "role": "demo"}' \ --data '{"jwt": "your_service_account_jwt", "role": "demo"}' \
https://vault.rocks/v1/auth/kubernetes/login http://127.0.0.1:8200/v1/auth/kubernetes/login
``` ```
The response will contain a token at `auth.client_token`: The response will contain a token at `auth.client_token`:

View File

@@ -58,7 +58,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data '{"password": "foo"}' \ --data '{"password": "foo"}' \
https://vault.rocks/v1/auth/ldap/login/mitchellh= http://127.0.0.1:8200/v1/auth/ldap/login/mitchellh=
``` ```
The response will be in JSON. For example: The response will be in JSON. For example:

View File

@@ -52,7 +52,7 @@ MFA information should be sent in the POST body encoded as JSON.
$ curl \ $ curl \
--request POST \ --request POST \
--data '{"password": "test", "passcode": "111111"}' \ --data '{"password": "test", "passcode": "111111"}' \
https://vault.rocks/v1/auth/userpass/login/my-username http://127.0.0.1:8200/v1/auth/userpass/login/my-username
``` ```
The response is the same as for the original method. The response is the same as for the original method.

View File

@@ -36,7 +36,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data '{"password": "MY_PASSWORD"}' \ --data '{"password": "MY_PASSWORD"}' \
https://vault.rocks/v1/auth/okta/login/my-username http://127.0.0.1:8200/v1/auth/okta/login/my-username
``` ```
The response will contain a token at `auth.client_token`: The response will contain a token at `auth.client_token`:

View File

@@ -33,7 +33,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data '{"password": "..."}' \ --data '{"password": "..."}' \
https://vault.rocks/v1/auth/radius/login/sethvargo http://127.0.0.1:8200/v1/auth/radius/login/sethvargo
``` ```
The response will contain a token at `auth.client_token`: The response will contain a token at `auth.client_token`:

View File

@@ -34,7 +34,7 @@ $ vault login -method=userpass \
$ curl \ $ curl \
--request POST \ --request POST \
--data '{"password": "foo"}' \ --data '{"password": "foo"}' \
https://vault.rocks/v1/auth/userpass/login/mitchellh http://127.0.0.1:8200/v1/auth/userpass/login/mitchellh
``` ```
The response will contain the token at `auth.client_token`: The response will contain the token at `auth.client_token`:

View File

@@ -72,7 +72,7 @@ optional.
$ curl \ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--header "X-Vault-MFA:my_totp:695452" \ --header "X-Vault-MFA:my_totp:695452" \
https://vault.rocks/v1/secret/foo http://127.0.0.1:8200/v1/secret/foo
``` ```
### API ### API

View File

@@ -76,7 +76,7 @@ be manual or automated using a configuration management tool. The public key is
accessible via the API and does not require authentication. accessible via the API and does not require authentication.
```text ```text
$ curl -o /etc/ssh/trusted-user-ca-keys.pem https://vault.rocks/v1/ssh-client-signer/public_key $ curl -o /etc/ssh/trusted-user-ca-keys.pem http://127.0.0.1:8200/v1/ssh-client-signer/public_key
``` ```
```text ```text
@@ -295,7 +295,7 @@ configuration on the host machine.
target machines. target machines.
```text ```text
$ curl https://vault.rocks/v1/ssh-host-signer/public_key $ curl http://127.0.0.1:8200/v1/ssh-host-signer/public_key
``` ```
```text ```text

View File

@@ -187,7 +187,7 @@ parameters](/api/system/auth.html#enable-auth-method) of the method.
$ curl --header "X-Vault-Token: ..." \ $ curl --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data '{"type": "approle"}' \ --data '{"type": "approle"}' \
https://vault.rocks/v1/sys/auth/approle http://127.0.0.1:8200/v1/sys/auth/approle
``` ```
The above example passes the **type** (`approle`) in the request payload The above example passes the **type** (`approle`) in the request payload
@@ -276,7 +276,7 @@ Before creating a role, create `jenkins` policy:
```shell ```shell
$ curl --header "X-Vault-Token: ..." --request PUT --data @payload.json \ $ curl --header "X-Vault-Token: ..." --request PUT --data @payload.json \
https://vault.rocks/v1/sys/policy/jenkins http://127.0.0.1:8200/v1/sys/policy/jenkins
$ cat payload.json $ cat payload.json
{ {
@@ -295,7 +295,7 @@ mode](/docs/auth/approle.html).)
```shell ```shell
$ curl --header "X-Vault-Token: ..." --request POST \ $ curl --header "X-Vault-Token: ..." --request POST \
--data '{"policies":"jenkins"}' \ --data '{"policies":"jenkins"}' \
https://vault.rocks/v1/auth/approle/role/jenkins http://127.0.0.1:8200/v1/auth/approle/role/jenkins
``` ```
> There are a number of > There are a number of
@@ -315,14 +315,14 @@ separated string.
$ curl --header "X-Vault-Token:..." $ curl --header "X-Vault-Token:..."
--request POST \ --request POST \
--data '{"policies":"jenkins,anotherpolicy"}' \ --data '{"policies":"jenkins,anotherpolicy"}' \
https://vault.rocks/v1/auth/approle/role/jenkins http://127.0.0.1:8200/v1/auth/approle/role/jenkins
```` ````
To read the jenkins role you just created: To read the jenkins role you just created:
```shell ```shell
$ curl --header "X-Vault-Token: ..." --request GET \ $ curl --header "X-Vault-Token: ..." --request GET \
https://vault.rocks/v1/auth/approle/role/jenkins | jq http://127.0.0.1:8200/v1/auth/approle/role/jenkins | jq
{ {
"request_id": "b18054ad-1ab5-8d83-eeed-193d97026ee7", "request_id": "b18054ad-1ab5-8d83-eeed-193d97026ee7",
"lease_id": "", "lease_id": "",
@@ -425,10 +425,10 @@ payload, or invoke the API with an empty payload.
```shell ```shell
$ curl --header "X-Vault-Token:..." --request GET \ $ curl --header "X-Vault-Token:..." --request GET \
https://vault.rocks/v1/auth/approle/role/jenkins/role-id | jq http://127.0.0.1:8200/v1/auth/approle/role/jenkins/role-id | jq
$ curl --header "X-Vault-Token:..." --request POST \ $ curl --header "X-Vault-Token:..." --request POST \
https://vault.rocks/v1/auth/approle/role/jenkins/secret-id | jq http://127.0.0.1:8200/v1/auth/approle/role/jenkins/secret-id | jq
``` ```
If you specified `secret_id_ttl`, `secret_id_num_uses`, or `bound_cidr_list` on If you specified `secret_id_ttl`, `secret_id_num_uses`, or `bound_cidr_list` on
@@ -484,7 +484,7 @@ $ cat payload.json
"secret_id": "ed0a642f-2acf-c2da-232f-1b21300d5f29" "secret_id": "ed0a642f-2acf-c2da-232f-1b21300d5f29"
} }
$ curl --request POST --data @payload.json https://vault.rocks/v1/auth/approle/login | jq $ curl --request POST --data @payload.json http://127.0.0.1:8200/v1/auth/approle/login | jq
{ {
"request_id": "fccae32b-1e6a-9a9c-7666-f5cb07805c1e", "request_id": "fccae32b-1e6a-9a9c-7666-f5cb07805c1e",
"lease_id": "", "lease_id": "",
@@ -576,7 +576,7 @@ You can now pass the `client_token` returned in [Step 4](#step4) in the
```plaintext ```plaintext
$ curl --header "X-Vault-Token: 3e7dd0ac-8b3e-8f88-bb37-a2890455ca6e" \ $ curl --header "X-Vault-Token: 3e7dd0ac-8b3e-8f88-bb37-a2890455ca6e" \
--request GET \ --request GET \
https://vault.rocks/v1/secret/mysql/webapp | jq http://127.0.0.1:8200/v1/secret/mysql/webapp | jq
{ {
"errors": [] "errors": []
} }

View File

@@ -210,7 +210,7 @@ Where `<TOKEN>` is your valid token with read permission on the
```shell ```shell
$ curl --header "X-Vault-Token: ..." --request GET \ $ curl --header "X-Vault-Token: ..." --request GET \
https://vault.rocks/v1/sys/auth/token/tune | jq http://127.0.0.1:8200/v1/sys/auth/token/tune | jq
{ {
"default_lease_ttl": 2764800, "default_lease_ttl": 2764800,
"max_lease_ttl": 2764800, "max_lease_ttl": 2764800,
@@ -321,7 +321,7 @@ The following example sets the `ttl` parameter.
# Create a new token with TTl of 30 seconds # Create a new token with TTl of 30 seconds
$ curl --header "X-Vault-Token: ..." --request POST \ $ curl --header "X-Vault-Token: ..." --request POST \
--data '{"ttl": "30s"}' \ --data '{"ttl": "30s"}' \
https://vault.rocks/v1/auth/token/create | jq http://127.0.0.1:8200/v1/auth/token/create | jq
{ {
... ...
"auth": { "auth": {
@@ -339,7 +339,7 @@ $ curl --header "X-Vault-Token: ..." --request POST \
# Pass the returned token (`client_token`) in the `X-Vault-Token` header to test # Pass the returned token (`client_token`) in the `X-Vault-Token` header to test
$ curl --header "X-Vault-Token: f7d88963-1aba-64d7-11a0-9282ae7681d0" \ $ curl --header "X-Vault-Token: f7d88963-1aba-64d7-11a0-9282ae7681d0" \
--request GET \ --request GET \
https://vault.rocks/v1/auth/token/lookup-self | jq http://127.0.0.1:8200/v1/auth/token/lookup-self | jq
{ {
... ...
"data": { "data": {
@@ -363,12 +363,12 @@ token usage.
```shell ```shell
$ curl --header "X-Vault-Token: ..." --request POST \ $ curl --header "X-Vault-Token: ..." --request POST \
https://vault.rocks/v1/auth/token/renew/<TOKEN> | jq http://127.0.0.1:8200/v1/auth/token/renew/<TOKEN> | jq
# Renew token with 1 hour extension # Renew token with 1 hour extension
$ curl --header "X-Vault-Token: ..." --request POST \ $ curl --header "X-Vault-Token: ..." --request POST \
--data '{"increment": "3600"}' \ --data '{"increment": "3600"}' \
https://vault.rocks/v1/auth/token/renew/<TOKEN> | jq http://127.0.0.1:8200/v1/auth/token/renew/<TOKEN> | jq
``` ```
-> **NOTE:** Tokens can be renewed as long as its life hasn't reached its max -> **NOTE:** Tokens can be renewed as long as its life hasn't reached its max
@@ -459,7 +459,7 @@ Set the `num_uses` property in the request payload.
```shell ```shell
$ curl --header "X-Vault-Token: ..." --request POST \ $ curl --header "X-Vault-Token: ..." --request POST \
--data '{ "policies": ["default"], "num_uses":2 }' \ --data '{ "policies": ["default"], "num_uses":2 }' \
https://vault.rocks/v1/auth/token/create | jq http://127.0.0.1:8200/v1/auth/token/create | jq
{ {
"request_id": "0e98ff80-2825-7f50-6522-b6f95d596ef4", "request_id": "0e98ff80-2825-7f50-6522-b6f95d596ef4",
"lease_id": "", "lease_id": "",
@@ -488,7 +488,7 @@ This creates a token with the _default_ policy and a use limit of 2.
```text ```text
$ curl --header "X-Vault-Token: d9c2f2e5-6b8a-4021-476c-ebd3f166d668" \ $ curl --header "X-Vault-Token: d9c2f2e5-6b8a-4021-476c-ebd3f166d668" \
--request GET \ --request GET \
https://vault.rocks/v1/auth/token/lookup-self | jq http://127.0.0.1:8200/v1/auth/token/lookup-self | jq
{ {
"request_id": "77be1321-c0ca-e099-6f92-4ad87133b044", "request_id": "77be1321-c0ca-e099-6f92-4ad87133b044",
"lease_id": "", "lease_id": "",
@@ -511,12 +511,12 @@ $ curl --header "X-Vault-Token: d9c2f2e5-6b8a-4021-476c-ebd3f166d668" \
$ curl --header "X-Vault-Token: d9c2f2e5-6b8a-4021-476c-ebd3f166d668" \ $ curl --header "X-Vault-Token: d9c2f2e5-6b8a-4021-476c-ebd3f166d668" \
--request POST \ --request POST \
--data '{ "value": "d9c2f2e5-6b8a-4021-476c-ebd3f166d668" }' \ --data '{ "value": "d9c2f2e5-6b8a-4021-476c-ebd3f166d668" }' \
https://vault.rocks/v1/cubbyhole/token http://127.0.0.1:8200/v1/cubbyhole/token
$ curl --header "X-Vault-Token: d9c2f2e5-6b8a-4021-476c-ebd3f166d668" \ $ curl --header "X-Vault-Token: d9c2f2e5-6b8a-4021-476c-ebd3f166d668" \
--request GET \ --request GET \
https://vault.rocks/v1/cubbyhole/token | jq http://127.0.0.1:8200/v1/cubbyhole/token | jq
{ {
"errors": [ "errors": [
"permission denied" "permission denied"
@@ -581,7 +581,7 @@ token renewal period. This value can be an integer value in seconds (e.g.
```shell ```shell
$ curl --header "X-Vault-Token: ..." --request POST \ $ curl --header "X-Vault-Token: ..." --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/auth/token/roles/zabbix http://127.0.0.1:8200/v1/auth/token/roles/zabbix
$ cat payload.json $ cat payload.json
{ {
@@ -599,7 +599,7 @@ Now, generate a token:
```plaintext ```plaintext
$ curl --header "X-Vault-Token: ..." --request POST \ $ curl --header "X-Vault-Token: ..." --request POST \
https://vault.rocks/v1/auth/token/create/zabbix | jq http://127.0.0.1:8200/v1/auth/token/create/zabbix | jq
{ {
... ...
"auth": { "auth": {
@@ -643,7 +643,7 @@ Or
```plaintext ```plaintext
$ curl --header "X-Vault-Token:..." --request POST \ $ curl --header "X-Vault-Token:..." --request POST \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/auth/approle/role/jenkins http://127.0.0.1:8200/v1/auth/approle/role/jenkins
$ cat payload.json $ cat payload.json
{ {
@@ -676,7 +676,7 @@ $ vault token create -orphan
```shell ```shell
$ curl --header "X-Vault-Token:..." --request POST \ $ curl --header "X-Vault-Token:..." --request POST \
--data '{ "no_parent": true }' \ --data '{ "no_parent": true }' \
https://vault.rocks/v1/auth/token/create-orphan | jq http://127.0.0.1:8200/v1/auth/token/create-orphan | jq
``` ```
@@ -723,15 +723,15 @@ To revoke a specific token, call `/auth/token/revoke` endpoint. If you want to
# Revoke a specific token # Revoke a specific token
$ curl --header "X-Vault-Token:..." --request POST \ $ curl --header "X-Vault-Token:..." --request POST \
--data '{ "token": "eeaf890e-4b0f-a687-4190-c75b1d6d70bc" }' \ --data '{ "token": "eeaf890e-4b0f-a687-4190-c75b1d6d70bc" }' \
https://vault.rocks/v1/auth/token/revoke http://127.0.0.1:8200/v1/auth/token/revoke
# Revoke all secrets for database auth method # Revoke all secrets for database auth method
$ curl --header "X-Vault-Token:..." --request POST \ $ curl --header "X-Vault-Token:..." --request POST \
https://vault.rocks/v1/sys/leases/revoke-prefix/database/creds http://127.0.0.1:8200/v1/sys/leases/revoke-prefix/database/creds
# Revoke all tokens # Revoke all tokens
$ curl --header "X-Vault-Token:..." --request POST \ $ curl --header "X-Vault-Token:..." --request POST \
https://vault.rocks/v1/sys/leases/revoke-prefix/auth/token/create http://127.0.0.1:8200/v1/sys/leases/revoke-prefix/auth/token/create
``` ```
@@ -776,7 +776,7 @@ Or
```shell ```shell
$ curl --header "X-Vault-Token:..." --request POST \ $ curl --header "X-Vault-Token:..." --request POST \
--data '{ "max_lease_ttl": 129600}' \ --data '{ "max_lease_ttl": 129600}' \
https://vault.rocks/v1/sys/mounts/database/tune http://127.0.0.1:8200/v1/sys/mounts/database/tune
``` ```

View File

@@ -350,7 +350,7 @@ Now, create `admin` and `provisioner` policies:
```shell ```shell
# Create admin policy # Create admin policy
$ curl --request PUT --header "X-Vault-Token: ..." --data @admin-payload.json \ $ curl --request PUT --header "X-Vault-Token: ..." --data @admin-payload.json \
https://vault.rocks/v1/sys/policy/admin http://127.0.0.1:8200/v1/sys/policy/admin
$ cat admin-payload.json $ cat admin-payload.json
{ {
@@ -359,7 +359,7 @@ $ cat admin-payload.json
# Create provisioner policy # Create provisioner policy
$ curl --request PUT --header "X-Vault-Token: ..." --data @provisioner-payload.json \ $ curl --request PUT --header "X-Vault-Token: ..." --data @provisioner-payload.json \
https://vault.rocks/v1/sys/policy/provisioner http://127.0.0.1:8200/v1/sys/policy/provisioner
$ cat provisioner-payload.json $ cat provisioner-payload.json
{ {
@@ -424,7 +424,7 @@ path "sys/policy/*"
To list existing ACL policies, use the `/sys/policy` endpoint. To list existing ACL policies, use the `/sys/policy` endpoint.
```shell ```shell
$ curl --request LIST --header "X-Vault-Token: ..." https://vault.rocks/v1/sys/policy | jq $ curl --request LIST --header "X-Vault-Token: ..." http://127.0.0.1:8200/v1/sys/policy | jq
``` ```
To read a specific policy, the endpoint path should be To read a specific policy, the endpoint path should be
@@ -435,7 +435,7 @@ To read a specific policy, the endpoint path should be
Read the admin policy: Read the admin policy:
```plaintext ```plaintext
$ curl --request GET --header "X-Vault-Token: ..." https://vault.rocks/v1/sys/policy/admin | jq $ curl --request GET --header "X-Vault-Token: ..." http://127.0.0.1:8200/v1/sys/policy/admin | jq
{ {
"name": "admin", "name": "admin",
"rules": "# Mount and manage auth methods broadly across Vault\npath \"auth/*\"\n{\n ...", "rules": "# Mount and manage auth methods broadly across Vault\npath \"auth/*\"\n{\n ...",
@@ -506,7 +506,7 @@ First, create a token attached to the `admin` policy:
```shell ```shell
$ curl --request POST --header "X-Vault-Token: ..." --data '{ "policies":"admin" }' \ $ curl --request POST --header "X-Vault-Token: ..." --data '{ "policies":"admin" }' \
https://vault.rocks/v1/auth/token/create http://127.0.0.1:8200/v1/auth/token/create
{ {
"request_id": "870ef38c-1401-7beb-633c-ff09cca3db68", "request_id": "870ef38c-1401-7beb-633c-ff09cca3db68",
"lease_id": "", "lease_id": "",
@@ -540,7 +540,7 @@ $ cat payload.json
} }
$ curl --request POST --header "X-Vault-Token: ..." --data @payload.json \ $ curl --request POST --header "X-Vault-Token: ..." --data @payload.json \
https://vault.rocks/v1/sys/capabilities http://127.0.0.1:8200/v1/sys/capabilities
{ {
"capabilities": [ "capabilities": [
"create", "create",
@@ -577,7 +577,7 @@ the `sys/capabilities-self` endpoint.
```plaintext ```plaintext
$ curl --request POST --header "X-Vault-Token: ..." --data '{"path":"sys/auth/approle"}' \ $ curl --request POST --header "X-Vault-Token: ..." --data '{"path":"sys/auth/approle"}' \
https://vault.rocks/v1/sys/capabilities-self http://127.0.0.1:8200/v1/sys/capabilities-self
``` ```

View File

@@ -207,7 +207,7 @@ $ cat payload.json
# API call to create a policy named, "apps" # API call to create a policy named, "apps"
$ curl --header "X-Vault-Token: ..." --request PUT --data @payload.json \ $ curl --header "X-Vault-Token: ..." --request PUT --data @payload.json \
https://vault.rocks/v1/sys/policy/apps http://127.0.0.1:8200/v1/sys/policy/apps
``` ```
Response wrapping is per-request and is triggered by providing to Vault the Response wrapping is per-request and is triggered by providing to Vault the
@@ -235,7 +235,7 @@ $ curl --header "X-Vault-Wrap-TTL: 120" \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
--data '{"policies":["apps"]}' \ --data '{"policies":["apps"]}' \
https://vault.rocks/v1/auth/token/create | jq http://127.0.0.1:8200/v1/auth/token/create | jq
{ {
"request_id": "", "request_id": "",
"lease_id": "", "lease_id": "",
@@ -355,7 +355,7 @@ First, create a token with `default` policy:
# Create a new token default policy # Create a new token default policy
$ curl --header "X-Vault-Token: ..." --request POST \ $ curl --header "X-Vault-Token: ..." --request POST \
--data '{"policies": "default"}' \ --data '{"policies": "default"}' \
https://vault.rocks/v1/auth/token/create | jq http://127.0.0.1:8200/v1/auth/token/create | jq
{ {
... ...
"auth": { "auth": {
@@ -371,7 +371,7 @@ $ curl --header "X-Vault-Token: ..." --request POST \
# Verify that you can NOT read secret/dev using default token # Verify that you can NOT read secret/dev using default token
$ curl --header "X-Vault-Token: 5fe14760-b0fd-22dc-403c-14a05003b67f" \ $ curl --header "X-Vault-Token: 5fe14760-b0fd-22dc-403c-14a05003b67f" \
--request GET \ --request GET \
https://vault.rocks/v1/secret/dev | jq http://127.0.0.1:8200/v1/secret/dev | jq
{ {
"errors": [ "errors": [
"permission denied" "permission denied"
@@ -392,7 +392,7 @@ $ curl --header "X-Vault-Token: <WRAPPING_TOKEN>" \
```shell ```shell
$ curl --header "X-Vault-Token: e095129f-123a-4fef-c007-1f6a487cfa78" \ $ curl --header "X-Vault-Token: e095129f-123a-4fef-c007-1f6a487cfa78" \
--request POST \ --request POST \
https://vault.rocks/v1/sys/wrapping/unwrap | jq http://127.0.0.1:8200/v1/sys/wrapping/unwrap | jq
{ {
"request_id": "d704435d-c1cf-b8a3-52f6-ec50bc8246c4", "request_id": "d704435d-c1cf-b8a3-52f6-ec50bc8246c4",
"lease_id": "", "lease_id": "",
@@ -421,7 +421,7 @@ token.
```plaintext ```plaintext
$ curl --header "X-Vault-Token: af5f7682-aa55-fa37-5039-ee116df56600" \ $ curl --header "X-Vault-Token: af5f7682-aa55-fa37-5039-ee116df56600" \
--request GET \ --request GET \
https://vault.rocks/v1/secret/dev | jq http://127.0.0.1:8200/v1/secret/dev | jq
{ {
"errors": [] "errors": []
} }
@@ -509,11 +509,11 @@ Write secrets under `cubbyhole/private/` path, and read it back.
# Write "token" to cubbyhole/private/access-token path # Write "token" to cubbyhole/private/access-token path
$ curl --header "X-Vault-Token: e095129f-123a-4fef-c007-1f6a487cfa78" --request POST \ $ curl --header "X-Vault-Token: e095129f-123a-4fef-c007-1f6a487cfa78" --request POST \
--data '{"token": "123456789abcdefg87654321"}' \ --data '{"token": "123456789abcdefg87654321"}' \
https://vault.rocks/v1/cubbyhole/private/access-token http://127.0.0.1:8200/v1/cubbyhole/private/access-token
# Read value from cubbyhole/private/access-token path # Read value from cubbyhole/private/access-token path
$ curl --header "X-Vault-Token: e095129f-123a-4fef-c007-1f6a487cfa78" --request GET \ $ curl --header "X-Vault-Token: e095129f-123a-4fef-c007-1f6a487cfa78" --request GET \
https://vault.rocks/v1/cubbyhole/private/access-token | jq http://127.0.0.1:8200/v1/cubbyhole/private/access-token | jq
{ {
"request_id": "b2ff9f04-7a72-7eb0-672f-225b5eb652df", "request_id": "b2ff9f04-7a72-7eb0-672f-225b5eb652df",
"lease_id": "", "lease_id": "",
@@ -533,7 +533,7 @@ secret.
```shell ```shell
$ curl --header "X-Vault-Token: root" --request GET \ $ curl --header "X-Vault-Token: root" --request GET \
https://vault.rocks/v1/cubbyhole/private/access-token | jq http://127.0.0.1:8200/v1/cubbyhole/private/access-token | jq
{ {
"errors": [] "errors": []
} }

View File

@@ -229,7 +229,7 @@ $ vault write database/config/postgresql plugin_name=postgresql-database-plugin
```shell ```shell
$ curl --header "X-Vault-Token: ..." --request POST --data @payload.json \ $ curl --header "X-Vault-Token: ..." --request POST --data @payload.json \
https://vault.rocks/v1/database/config/postgresql http://127.0.0.1:8200/v1/database/config/postgresql
$ cat payload.json $ cat payload.json
{ {
@@ -280,7 +280,7 @@ statement is passed as the role creation statement.
```shell ```shell
$ curl --header "X-Vault-Token: ..." --request POST --data @payload.json \ $ curl --header "X-Vault-Token: ..." --request POST --data @payload.json \
https://vault.rocks/v1/database/roles/readonly http://127.0.0.1:8200/v1/database/roles/readonly
$ cat payload.json $ cat payload.json
{ {
@@ -381,12 +381,12 @@ $ cat payload.json
# Create "apps" policy # Create "apps" policy
$ curl --header "X-Vault-Token: ..." --request PUT \ $ curl --header "X-Vault-Token: ..." --request PUT \
--data @payload.json \ --data @payload.json \
https://vault.rocks/v1/sys/policy/apps http://127.0.0.1:8200/v1/sys/policy/apps
# Generate a new token with apps policy # Generate a new token with apps policy
$ curl --header "X-Vault-Token: ..." --request POST \ $ curl --header "X-Vault-Token: ..." --request POST \
--data '{"policies": ["apps"]}' \ --data '{"policies": ["apps"]}' \
https://vault.rocks/v1/auth/token/create | jq http://127.0.0.1:8200/v1/auth/token/create | jq
{ {
"request_id": "e1737bc8-7e51-3943-42a0-2dbd6cb40e3e", "request_id": "e1737bc8-7e51-3943-42a0-2dbd6cb40e3e",
"lease_id": "", "lease_id": "",
@@ -418,7 +418,7 @@ demonstrates more sophisticated way of generating a token for your apps.
```shell ```shell
$ curl --header "X-Vault-Token: 1c97b03a-6098-31cf-9d8b-b404e52dcb4a" \ $ curl --header "X-Vault-Token: 1c97b03a-6098-31cf-9d8b-b404e52dcb4a" \
--request GET \ --request GET \
https://vault.rocks/v1/database/creds/readonly | jq http://127.0.0.1:8200/v1/database/creds/readonly | jq
{ {
"request_id": "e0e5a6c1-5e69-5cf3-c9d2-020af192de36", "request_id": "e0e5a6c1-5e69-5cf3-c9d2-020af192de36",
"lease_id": "database/creds/readonly/7aa462ab-98cb-fdcb-b226-f0a0d37644cc", "lease_id": "database/creds/readonly/7aa462ab-98cb-fdcb-b226-f0a0d37644cc",

Some files were not shown because too many files have changed in this diff Show More