Created
August 28, 2015 20:15
-
-
Save bisoldi/662f632bd593e2342058 to your computer and use it in GitHub Desktop.
APIMAN API Manager ElasticSearch seed
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
{ | |
"took": 6, | |
"timed_out": false, | |
"_shards": { | |
"total": 5, | |
"successful": 5, | |
"failed": 0 | |
}, | |
"hits": { | |
"total": 14, | |
"max_score": 1, | |
"hits": [ | |
{ | |
"_index": "apiman_manager", | |
"_type": "user", | |
"_id": "admin", | |
"_score": 1, | |
"_source": { | |
"username": "admin", | |
"email": "[email protected]", | |
"fullName": "Admin", | |
"joinedOn": null | |
} | |
}, | |
{ | |
"_index": "apiman_manager", | |
"_type": "policyDef", | |
"_id": "IPWhitelistPolicy", | |
"_score": 1, | |
"_source": { | |
"id": "IPWhitelistPolicy", | |
"name": "IP Whitelist Policy", | |
"description": "Only requests that originate from a specified set of valid IP addresses will be allowed through.", | |
"form": null, | |
"formType": "Default", | |
"icon": "filter", | |
"pluginId": null, | |
"policyImpl": "class:io.apiman.gateway.engine.policies.IPWhitelistPolicy", | |
"templates": [ | |
{ | |
"language": null, | |
"template": "Only requests that originate from the set of @{ipList.size()} configured IP address(es) will be allowed to invoke the managed service." | |
} | |
] | |
} | |
}, | |
{ | |
"_index": "apiman_manager", | |
"_type": "policyDef", | |
"_id": "TransferQuotaPolicy", | |
"_score": 1, | |
"_source": { | |
"id": "TransferQuotaPolicy", | |
"name": "Transfer Quota Policy", | |
"description": "Provides a way to limit the total number of bytes that can be transferred from (or to) an API.", | |
"form": null, | |
"formType": "Default", | |
"icon": "download", | |
"pluginId": null, | |
"policyImpl": "class:io.apiman.gateway.engine.policies.TransferQuotaPolicy", | |
"templates": [ | |
{ | |
"language": null, | |
"template": "Consumers are limited to transferring @{limit} bytes per per @{granularity} per @{period}." | |
} | |
] | |
} | |
}, | |
{ | |
"_index": "apiman_manager", | |
"_type": "gateway", | |
"_id": "TheGateway", | |
"_score": 1, | |
"_source": { | |
"id": "TheGateway", | |
"name": "The Gateway", | |
"description": "This is the gateway.", | |
"type": "REST", | |
"configuration": "{\"endpoint\":\"https:\/\/localhost:8443\/apiman-gateway-api\",\"username\":\"apimanager\",\"password\":\"$CRYPT::nexST5ZhchjjNnLBpQBqrA==\"}", | |
"createdBy": "admin", | |
"createdOn": 1440169111093, | |
"modifiedBy": "admin", | |
"modifiedOn": 1440169111093 | |
} | |
}, | |
{ | |
"_index": "apiman_manager", | |
"_type": "policyDef", | |
"_id": "IPBlacklistPolicy", | |
"_score": 1, | |
"_source": { | |
"id": "IPBlacklistPolicy", | |
"name": "IP Blacklist Policy", | |
"description": "Requests that originate from a specified set of valid IP addresses will be denied access.", | |
"form": null, | |
"formType": "Default", | |
"icon": "thumbs-down", | |
"pluginId": null, | |
"policyImpl": "class:io.apiman.gateway.engine.policies.IPBlacklistPolicy", | |
"templates": [ | |
{ | |
"language": null, | |
"template": "Requests that originate from the set of @{ipList.size()} configured IP address(es) will be denied access to the managed service." | |
} | |
] | |
} | |
}, | |
{ | |
"_index": "apiman_manager", | |
"_type": "policyDef", | |
"_id": "CachingPolicy", | |
"_score": 1, | |
"_source": { | |
"id": "CachingPolicy", | |
"name": "Caching Policy", | |
"description": "Allows caching of API responses in the Gateway to reduce overall traffic to the back-end API.", | |
"form": null, | |
"formType": "Default", | |
"icon": "hdd-o", | |
"pluginId": null, | |
"policyImpl": "class:io.apiman.gateway.engine.policies.CachingPolicy", | |
"templates": [ | |
{ | |
"language": null, | |
"template": "API responses will be cached for @{ttl} seconds." | |
} | |
] | |
} | |
}, | |
{ | |
"_index": "apiman_manager", | |
"_type": "role", | |
"_id": "OrganizationOwner", | |
"_score": 1, | |
"_source": { | |
"id": "OrganizationOwner", | |
"name": "Organization Owner", | |
"description": "Automatically granted to the user who creates an Organization. Grants all privileges.", | |
"createdBy": "admin", | |
"createdOn": 1440169110193, | |
"autoGrant": true, | |
"permissions": [ | |
"svcAdmin", | |
"svcView", | |
"appEdit", | |
"appAdmin", | |
"planEdit", | |
"orgView", | |
"planView", | |
"orgEdit", | |
"svcEdit", | |
"orgAdmin", | |
"appView", | |
"planAdmin" | |
] | |
} | |
}, | |
{ | |
"_index": "apiman_manager", | |
"_type": "role", | |
"_id": "ApplicationDeveloper", | |
"_score": 1, | |
"_source": { | |
"id": "ApplicationDeveloper", | |
"name": "Application Developer", | |
"description": "Users responsible for creating and managing applications should be granted this role within an Organization.", | |
"createdBy": "admin", | |
"createdOn": 1440169110337, | |
"autoGrant": null, | |
"permissions": [ | |
"appEdit", | |
"appAdmin", | |
"appView" | |
] | |
} | |
}, | |
{ | |
"_index": "apiman_manager", | |
"_type": "role", | |
"_id": "ServiceDeveloper", | |
"_score": 1, | |
"_source": { | |
"id": "ServiceDeveloper", | |
"name": "Service Developer", | |
"description": "Users responsible for creating and managing services should be granted this role within an Organization.", | |
"createdBy": "admin", | |
"createdOn": 1440169110359, | |
"autoGrant": null, | |
"permissions": [ | |
"svcAdmin", | |
"svcView", | |
"planEdit", | |
"planView", | |
"svcEdit", | |
"planAdmin" | |
] | |
} | |
}, | |
{ | |
"_index": "apiman_manager", | |
"_type": "policyDef", | |
"_id": "BASICAuthenticationPolicy", | |
"_score": 1, | |
"_source": { | |
"id": "BASICAuthenticationPolicy", | |
"name": "BASIC Authentication Policy", | |
"description": "Enables HTTP BASIC Authentication on a service. Some configuration required.", | |
"form": null, | |
"formType": "Default", | |
"icon": "lock", | |
"pluginId": null, | |
"policyImpl": "class:io.apiman.gateway.engine.policies.BasicAuthenticationPolicy", | |
"templates": [ | |
{ | |
"language": null, | |
"template": "Access to the service is protected by BASIC Authentication through the '@{realm}' authentication realm. @if{forwardIdentityHttpHeader != null}Successfully authenticated requests will forward the authenticated identity to the back end service via the '@{forwardIdentityHttpHeader}' custom HTTP header.@end{}" | |
} | |
] | |
} | |
} | |
] | |
} | |
} | |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment