Skip to content

Instantly share code, notes, and snippets.

@mtak
Created February 9, 2018 22:37
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save mtak/029a0b8ac4a1568d237bda4d8261d53c to your computer and use it in GitHub Desktop.
Save mtak/029a0b8ac4a1568d237bda4d8261d53c to your computer and use it in GitHub Desktop.
run-docker-compose-dev output
mtak@rubiks:~/dev/vault-ui-bugfix(root-to..)$ ./run-docker-compose-dev
------------- yarn install -------------
yarn install v1.3.2
[1/4] Resolving packages...
success Already up-to-date.
Done in 0.51s.
------------- docker-compose up -d -------------
Creating network "vaultuibugfix_default" with the default driver
Creating vaultuibugfix_vault_1
Creating vaultuibugfix_webpack_1
Creating vaultuibugfix_vault-ui_1
------------- docker-compose ps -------------
Name Command State Ports
------------------------------------------------------------------------------------------------------------------
vaultuibugfix_vault-ui_1 ./bin/entrypoint.sh dev Up 0.0.0.0:8000->8000/tcp
vaultuibugfix_vault_1 docker-entrypoint.sh serve ... Up 0.0.0.0:8200->8200/tcp, 0.0.0.0:8201->8201/tcp
vaultuibugfix_webpack_1 ./bin/entrypoint.sh yarn r ... Up 8000/tcp
------------- vault login 477a7083-80a1-e760-c6f1-833c7113ffb0 -------------
Success! You are now authenticated. The token information displayed below
is already stored in the token helper. You do NOT need to run "vault login"
again. Future Vault requests will automatically use this token.
Key Value
--- -----
token 477a7083-80a1-e760-c6f1-833c7113ffb0
token_accessor 4d482b93-6be4-8529-f6b2-0af5f88534e5
token_duration ∞
token_renewable false
token_policies [root]
------------- vault status -------------
Key Value
--- -----
Seal Type shamir
Sealed false
Total Shares 1
Threshold 1
Version 0.9.3
Cluster Name vault-cluster-ddddd5ce
Cluster ID 83bfd725-a63d-798d-1e8d-ccb3a833db2f
HA Enabled false
------------- vault auth enable userpass -------------
Success! Enabled userpass auth method at: userpass/
------------- vault auth enable -path=userpass2 userpass -------------
Success! Enabled userpass auth method at: userpass2/
------------- vault auth enable github -------------
Success! Enabled github auth method at: github/
------------- vault auth enable radius -------------
Success! Enabled radius auth method at: radius/
------------- vault auth enable -path=awsaccount1 aws-ec2 -------------
Success! Enabled aws-ec2 auth method at: awsaccount1/
------------- vault auth enable okta -------------
Success! Enabled okta auth method at: okta/
------------- vault auth enable approle -------------
Success! Enabled approle auth method at: approle/
------------- vault auth enable kubernetes -------------
Success! Enabled kubernetes auth method at: kubernetes/
------------- vault policy write admin /misc/admin.hcl -------------
Success! Uploaded policy: admin
------------- vault write auth/userpass/users/test password=test policies=admin -------------
Success! Data written to: auth/userpass/users/test
------------- vault write auth/userpass2/users/john password=doe policies=admin -------------
Success! Data written to: auth/userpass2/users/john
------------- vault write auth/userpass/users/lame password=lame policies=default -------------
Success! Data written to: auth/userpass/users/lame
------------- vault write auth/radius/users/test password=test policies=admin -------------
Success! Data written to: auth/radius/users/test
------------- vault write secret/test somekey=somedata -------------
Success! Data written to: secret/test
------------- vault secrets enable -path=ultrasecret generic -------------
Success! Enabled the generic secrets engine at: ultrasecret/
------------- vault write ultrasecret/moretest somekey=somedata -------------
Success! Data written to: ultrasecret/moretest
------------- vault write ultrasecret/dir1/secret somekey=somedata -------------
Success! Data written to: ultrasecret/dir1/secret
------------- vault write ultrasecret/dir2/secret somekey=somedata -------------
Success! Data written to: ultrasecret/dir2/secret
------------- vault write ultrasecret/dir2/secret2 somekey=somedata -------------
Success! Data written to: ultrasecret/dir2/secret2
------------- vault write ultrasecret/admincantlistthis/butcanreadthis somekey=somedata -------------
Success! Data written to: ultrasecret/admincantlistthis/butcanreadthis
------------- vault write ultrasecret/admincantreadthis somekey=somedata -------------
Success! Data written to: ultrasecret/admincantreadthis
------------- Vault Root Token -------------
vault_1 | Root Token: 477a7083-80a1-e760-c6f1-833c7113ffb0
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment