summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--.gitignore5
-rw-r--r--Makefile46
-rw-r--r--backend.go91
-rw-r--r--backend_test.go41
-rw-r--r--client/client.go19
-rw-r--r--cmd/vault-plugin-kerberos-secrets/main.go30
-rw-r--r--config/config.go11
-rw-r--r--go.mod11
-rw-r--r--go.sum380
-rw-r--r--password/gen.go6
-rw-r--r--path_config.go253
-rw-r--r--path_config_test.go345
-rw-r--r--path_rotate.go172
-rw-r--r--path_static_creds.go61
-rw-r--r--path_static_roles.go202
15 files changed, 1673 insertions, 0 deletions
diff --git a/.gitignore b/.gitignore
new file mode 100644
index 0000000..3583229
--- /dev/null
+++ b/.gitignore
@@ -0,0 +1,5 @@
+.DS_Store
+.idea
+.vscode
+
+/vault \ No newline at end of file
diff --git a/Makefile b/Makefile
new file mode 100644
index 0000000..c71d776
--- /dev/null
+++ b/Makefile
@@ -0,0 +1,46 @@
+GOARCH = amd64
+
+UNAME = $(shell uname -s)
+
+ifndef OS
+ ifeq ($(UNAME), Linux)
+ OS = linux
+ else ifeq ($(UNAME), Darwin)
+ OS = darwin
+ endif
+endif
+
+.DEFAULT_GOAL := all
+
+all: fmt build start
+
+build:
+ GOOS=$(OS) GOARCH="$(GOARCH)" go build -o vault/plugins/vault-plugin-kerberos-secrets cmd/vault-plugin-kerberos-secrets/main.go
+
+start:
+ vault server -dev -log-level=debug -dev-root-token-id=root -dev-plugin-dir=./vault/plugins
+
+integration-test: enable test-config test-role test-rotate test-cred
+
+enable:
+ vault secrets enable -path=krb vault-plugin-kerberos-secrets
+
+test-config:
+ vault write krb/config realm=TARDISPROJECT.UK kdc=localhost:88 admin_server=localhost:749 kpasswd_server=localhost:749 username=tcmal password=1234
+
+test-role:
+ vault write krb/static-role/test principal=test
+
+test-rotate:
+ vault write -f krb/rotate-static-role/test
+
+test-cred:
+ vault read krb/static-cred/test
+
+clean:
+ rm -f ./vault/plugins/vault-plugin-kerberos-secrets
+
+fmt:
+ go fmt $$(go list ./...)
+
+.PHONY: build clean fmt start enable test_config
diff --git a/backend.go b/backend.go
new file mode 100644
index 0000000..fd5a983
--- /dev/null
+++ b/backend.go
@@ -0,0 +1,91 @@
+package secretsengine
+
+import (
+ "context"
+ "fmt"
+ "strings"
+
+ "git.tardisproject.uk/tcmal/vault-plugin-kerberos-secrets/client"
+ "github.com/hashicorp/vault/sdk/framework"
+ "github.com/hashicorp/vault/sdk/logical"
+)
+
+// krbBackend wraps the krbBackend framework and adds a map for storing key value pairs
+type krbBackend struct {
+ *framework.Backend
+ client KerberosClient
+}
+
+type KerberosClient interface {
+ SetPassword(username string, password string) error
+ SetPasswordWithOld(username string, oldPassword, newPassword string) error
+}
+
+var _ logical.Factory = Factory
+
+// Factory configures and returns Mock backends
+func Factory(ctx context.Context, conf *logical.BackendConfig) (logical.Backend, error) {
+ b := newBackend()
+
+ if conf == nil {
+ return nil, fmt.Errorf("configuration passed into backend is nil")
+ }
+
+ if err := b.Setup(ctx, conf); err != nil {
+ return nil, err
+ }
+
+ return b, nil
+}
+
+func newBackend() *krbBackend {
+ b := &krbBackend{}
+ b.Backend = &framework.Backend{
+ Help: strings.TrimSpace(mockHelp),
+ BackendType: logical.TypeLogical,
+ Paths: framework.PathAppend(
+ pathConfig(b),
+ pathStaticRole(b),
+ pathStaticCreds(b),
+ pathRotateCredentials(b),
+ ),
+ }
+
+ return b
+}
+
+// reset clears any client configuration for a new
+// backend to be configured
+func (b *krbBackend) reset() {
+ b.client = nil
+}
+
+// invalidate clears an existing client configuration in
+// the backend
+func (b *krbBackend) invalidate(ctx context.Context, key string) {
+ if key == "config" {
+ b.reset()
+ }
+}
+
+func (b *krbBackend) getClient(ctx context.Context, s logical.Storage) (*KerberosClient, error) {
+ if b.client == nil {
+ c, err := getConfig(ctx, s)
+ if err != nil {
+ return nil, err
+ }
+
+ client, err := client.ClientFromConfig(c)
+ if err != nil {
+ return nil, err
+ }
+
+ b.client = client
+ }
+
+ return &b.client, nil
+}
+
+const mockHelp = `
+The Kerberos backend is a backend that sets credentials in kerberos.
+`
diff --git a/backend_test.go b/backend_test.go
new file mode 100644
index 0000000..3452533
--- /dev/null
+++ b/backend_test.go
@@ -0,0 +1,41 @@
+package secretsengine
+
+import (
+ "context"
+ "fmt"
+
+ log "github.com/hashicorp/go-hclog"
+ "github.com/hashicorp/vault/sdk/helper/logging"
+ "github.com/hashicorp/vault/sdk/logical"
+)
+
+func getBackend() (*krbBackend, logical.Storage) {
+ config := &logical.BackendConfig{
+ Logger: logging.NewVaultLogger(log.Debug),
+ StorageView: &logical.InmemStorage{},
+ }
+
+ b := newBackend()
+ b.Setup(context.Background(), config)
+
+ return b, config.StorageView
+}
+
+var _ KerberosClient = fakeLdapClient{}
+
+type fakeLdapClient struct {
+ passwords map[string]string
+}
+
+func (c fakeLdapClient) SetPassword(username string, password string) error {
+ c.passwords[username] = password
+ return nil
+}
+
+func (c fakeLdapClient) SetPasswordWithOld(username string, oldPassword, newPassword string) error {
+ if realOldPassword, ok := c.passwords[username]; ok && oldPassword != realOldPassword {
+ return fmt.Errorf("invalid old password")
+ }
+ c.passwords[username] = newPassword
+ return nil
+}
diff --git a/client/client.go b/client/client.go
new file mode 100644
index 0000000..b7f5eee
--- /dev/null
+++ b/client/client.go
@@ -0,0 +1,19 @@
+package client
+
+import (
+ "git.tardisproject.uk/tcmal/vault-plugin-kerberos-secrets/config"
+)
+
+type client struct{}
+
+func ClientFromConfig(config *config.Config) (client, error) {
+ return client{}, nil
+}
+
+func (c client) SetPassword(username string, password string) error {
+ return nil // TODO
+}
+
+func (c client) SetPasswordWithOld(username string, oldPassword, newPassword string) error {
+ return nil // TODO
+}
diff --git a/cmd/vault-plugin-kerberos-secrets/main.go b/cmd/vault-plugin-kerberos-secrets/main.go
new file mode 100644
index 0000000..59396c0
--- /dev/null
+++ b/cmd/vault-plugin-kerberos-secrets/main.go
@@ -0,0 +1,30 @@
+package main
+
+import (
+ "os"
+
+ krb "git.tardisproject.uk/tcmal/vault-plugin-kerberos-secrets"
+ "github.com/hashicorp/go-hclog"
+ "github.com/hashicorp/vault/api"
+ "github.com/hashicorp/vault/sdk/plugin"
+)
+
+func main() {
+ apiClientMeta := &api.PluginAPIClientMeta{}
+ flags := apiClientMeta.FlagSet()
+ flags.Parse(os.Args[1:])
+
+ tlsConfig := apiClientMeta.GetTLSConfig()
+ tlsProviderFunc := api.VaultPluginTLSProvider(tlsConfig)
+
+ err := plugin.Serve(&plugin.ServeOpts{
+ BackendFactoryFunc: krb.Factory,
+ TLSProviderFunc: tlsProviderFunc,
+ })
+ if err != nil {
+ logger := hclog.New(&hclog.LoggerOptions{})
+
+ logger.Error("plugin shutting down", "error", err)
+ os.Exit(1)
+ }
+}
diff --git a/config/config.go b/config/config.go
new file mode 100644
index 0000000..5a8a6ca
--- /dev/null
+++ b/config/config.go
@@ -0,0 +1,11 @@
+package config
+
+type Config struct {
+ Realm string `json:"realm"`
+ KDC []string `json:"kdc"`
+ AdminServer []string `json:"admin_server"`
+ KPasswdServer []string `json:"kpasswd_server"`
+
+ Username string `json:"username"`
+ Password string `json:"password"`
+}
diff --git a/go.mod b/go.mod
new file mode 100644
index 0000000..0fe398d
--- /dev/null
+++ b/go.mod
@@ -0,0 +1,11 @@
+module git.tardisproject.uk/tcmal/vault-plugin-kerberos-secrets
+
+go 1.12
+
+require (
+ github.com/hashicorp/errwrap v1.0.0
+ github.com/hashicorp/go-hclog v0.14.1
+ github.com/hashicorp/vault/api v1.0.5-0.20210325191337-ac5500471f36
+ github.com/hashicorp/vault/sdk v0.1.14-0.20210325185647-d3758c9bd369
+ github.com/hashicorp/yamux v0.0.0-20181012175058-2f1d1f20f75d // indirect
+)
diff --git a/go.sum b/go.sum
new file mode 100644
index 0000000..c92d908
--- /dev/null
+++ b/go.sum
@@ -0,0 +1,380 @@
+bazil.org/fuse v0.0.0-20160811212531-371fbbdaa898/go.mod h1:Xbm+BRKSBEpa4q4hTSxohYNQpsxXPbPry4JJWOB3LB8=
+cloud.google.com/go v0.26.0/go.mod h1:aQUYkXzVsufM+DwF1aE+0xfcU+56JwCaLick0ClmMTw=
+github.com/Azure/go-ansiterm v0.0.0-20170929234023-d6e3b3328b78/go.mod h1:LmzpDX56iTiv29bbRTIsUNlaFfuhWRQBWjQdVyAevI8=
+github.com/BurntSushi/toml v0.3.1/go.mod h1:xHWCNGjB5oqiDr8zfno3MHue2Ht5sIBksp03qcyfWMU=
+github.com/DataDog/datadog-go v3.2.0+incompatible/go.mod h1:LButxg5PwREeZtORoXG3tL4fMGNddJ+vMq1mwgfaqoQ=
+github.com/Microsoft/go-winio v0.4.15-0.20190919025122-fc70bd9a86b5/go.mod h1:tTuCMEN+UleMWgg9dVx4Hu52b1bJo+59jBh3ajtinzw=
+github.com/Microsoft/hcsshim v0.8.9/go.mod h1:5692vkUqntj1idxauYlpoINNKeqCiG6Sg38RRsjT5y8=
+github.com/alecthomas/template v0.0.0-20160405071501-a0175ee3bccc/go.mod h1:LOuyumcjzFXgccqObfd/Ljyb9UuFJ6TxHnclSeseNhc=
+github.com/alecthomas/template v0.0.0-20190718012654-fb15b899a751/go.mod h1:LOuyumcjzFXgccqObfd/Ljyb9UuFJ6TxHnclSeseNhc=
+github.com/alecthomas/units v0.0.0-20151022065526-2efee857e7cf/go.mod h1:ybxpYRFXyAe+OPACYpWeL0wqObRcbAqCMya13uyzqw0=
+github.com/alecthomas/units v0.0.0-20190717042225-c3de453c63f4/go.mod h1:ybxpYRFXyAe+OPACYpWeL0wqObRcbAqCMya13uyzqw0=
+github.com/armon/go-metrics v0.3.0/go.mod h1:zXjbSimjXTd7vOpY8B0/2LpvNvDoXBuplAD+gJD3GYs=
+github.com/armon/go-metrics v0.3.3 h1:a9F4rlj7EWWrbj7BYw8J8+x+ZZkJeqzNyRk8hdPF+ro=
+github.com/armon/go-metrics v0.3.3/go.mod h1:4O98XIr/9W0sxpJ8UaYkvjk10Iff7SnFrb4QAOwNTFc=
+github.com/armon/go-radix v0.0.0-20180808171621-7fddfc383310/go.mod h1:ufUuZ+zHj4x4TnLV4JWEpy2hxWSpsRywHrMgIH9cCH8=
+github.com/armon/go-radix v1.0.0 h1:F4z6KzEeeQIMeLFa97iZU6vupzoecKdU5TX24SNppXI=
+github.com/armon/go-radix v1.0.0/go.mod h1:ufUuZ+zHj4x4TnLV4JWEpy2hxWSpsRywHrMgIH9cCH8=
+github.com/aws/aws-sdk-go v1.25.37/go.mod h1:KmX6BPdI08NWTb3/sm4ZGu5ShLoqVDhKgpiN924inxo=
+github.com/aws/aws-sdk-go v1.30.27/go.mod h1:5zCpMtNQVjRREroY7sYe8lOMRSxkhG6MZveU8YkpAk0=
+github.com/beorn7/perks v0.0.0-20180321164747-3a771d992973/go.mod h1:Dwedo/Wpr24TaqPxmxbtue+5NUziq4I4S80YR8gNf3Q=
+github.com/beorn7/perks v1.0.0/go.mod h1:KWe93zE9D1o94FZ5RNwFwVgaQK1VOXiVxmqh+CedLV8=
+github.com/beorn7/perks v1.0.1/go.mod h1:G2ZrVWU2WbWT9wwq4/hrbKbnv/1ERSJQ0ibhJ6rlkpw=
+github.com/bgentry/speakeasy v0.1.0/go.mod h1:+zsyZBPWlz7T6j88CTgSN5bM796AkVf0kBD4zp0CCIs=
+github.com/census-instrumentation/opencensus-proto v0.2.1/go.mod h1:f6KPmirojxKA12rnyqOA5BBL4O983OfeGPqjHWSTneU=
+github.com/cespare/xxhash/v2 v2.1.1/go.mod h1:VGX0DQ3Q6kWi7AoAeZDth3/j3BFtOZR5XLFGgcrjCOs=
+github.com/circonus-labs/circonus-gometrics v2.3.1+incompatible/go.mod h1:nmEj6Dob7S7YxXgwXpfOuvO54S+tGdZdw9fuRZt25Ag=
+github.com/circonus-labs/circonusllhist v0.1.3/go.mod h1:kMXHVDlOchFAehlya5ePtbp5jckzBHf4XRpQvBOLI+I=
+github.com/client9/misspell v0.3.4/go.mod h1:qj6jICC3Q7zFZvVWo7KLAzC3yx5G7kyvSDkc90ppPyw=
+github.com/cncf/udpa/go v0.0.0-20191209042840-269d4d468f6f/go.mod h1:M8M6+tZqaGXZJjfX53e64911xZQV5JYwmTeXPW+k8Sc=
+github.com/containerd/cgroups v0.0.0-20190919134610-bf292b21730f/go.mod h1:OApqhQ4XNSNC13gXIwDjhOQxjWa/NxkwZXJ1EvqT0ko=
+github.com/containerd/console v0.0.0-20180822173158-c12b1e7919c1/go.mod h1:Tj/on1eG8kiEhd0+fhSDzsPAFESxzBBvdyEgyryXffw=
+github.com/containerd/containerd v1.3.2/go.mod h1:bC6axHOhabU15QhwfG7w5PipXdVtMXFTttgp+kVtyUA=
+github.com/containerd/containerd v1.3.4/go.mod h1:bC6axHOhabU15QhwfG7w5PipXdVtMXFTttgp+kVtyUA=
+github.com/containerd/continuity v0.0.0-20190426062206-aaeac12a7ffc/go.mod h1:GL3xCUCBDV3CZiTSEKksMWbLE66hEyuu9qyDOOqM47Y=
+github.com/containerd/continuity v0.0.0-20200709052629-daa8e1ccc0bc/go.mod h1:cECdGN1O8G9bgKTlLhuPJimka6Xb/Gg7vYzCTNVxhvo=
+github.com/containerd/fifo v0.0.0-20190226154929-a9fb20d87448/go.mod h1:ODA38xgv3Kuk8dQz2ZQXpnv/UZZUHUCL7pnLehbXgQI=
+github.com/containerd/go-runc v0.0.0-20180907222934-5a6d9f37cfa3/go.mod h1:IV7qH3hrUgRmyYrtgEeGWJfWbgcHL9CSRruz2Vqcph0=
+github.com/containerd/ttrpc v0.0.0-20190828154514-0e0f228740de/go.mod h1:PvCDdDGpgqzQIzDW1TphrGLssLDZp2GuS+X5DkEJB8o=
+github.com/containerd/typeurl v0.0.0-20180627222232-a93fcdb778cd/go.mod h1:Cm3kwCdlkCfMSHURc+r6fwoGH6/F1hH3S4sg0rLFWPc=
+github.com/coreos/go-systemd v0.0.0-20190321100706-95778dfbb74e/go.mod h1:F5haX7vjVVG0kc13fIWeqUViNPyEJxv/OmvnBo0Yme4=
+github.com/creack/pty v1.1.9/go.mod h1:oKZEueFk5CKHvIhNR5MUki03XCEU+Q6VDXinZuGJ33E=
+github.com/davecgh/go-spew v1.1.0/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38=
+github.com/davecgh/go-spew v1.1.1 h1:vj9j/u1bqnvCEfJOwUhtlOARqs3+rkHYY13jYWTU97c=
+github.com/davecgh/go-spew v1.1.1/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38=
+github.com/docker/distribution v2.7.1+incompatible/go.mod h1:J2gT2udsDAN96Uj4KfcMRqY0/ypR+oyYUYmja8H+y+w=
+github.com/docker/docker v1.4.2-0.20200319182547-c7ad2b866182/go.mod h1:eEKB0N0r5NX/I1kEveEz05bcu8tLC/8azJZsviup8Sk=
+github.com/docker/go-connections v0.4.0/go.mod h1:Gbd7IOopHjR8Iph03tsViu4nIes5XhDvyHbTtUxmeec=
+github.com/docker/go-units v0.4.0/go.mod h1:fgPhTUdO+D/Jk86RDLlptpiXQzgHJF7gydDDbaIK4Dk=
+github.com/dustin/go-humanize v0.0.0-20171111073723-bb3d318650d4/go.mod h1:HtrtbFcZ19U5GC7JDqmcUSB87Iq5E25KnS6fMYU6eOk=
+github.com/envoyproxy/go-control-plane v0.9.0/go.mod h1:YTl/9mNaCwkRvm6d1a2C3ymFceY/DCBVvsKhRF0iEA4=
+github.com/envoyproxy/go-control-plane v0.9.1-0.20191026205805-5f8ba28d4473/go.mod h1:YTl/9mNaCwkRvm6d1a2C3ymFceY/DCBVvsKhRF0iEA4=
+github.com/envoyproxy/go-control-plane v0.9.4/go.mod h1:6rpuAdCZL397s3pYoYcLgu1mIlRU8Am5FuJP05cCM98=
+github.com/envoyproxy/protoc-gen-validate v0.1.0/go.mod h1:iSmxcyjqTsJpI2R4NaDN7+kN2VEUnK/pcBlmesArF7c=
+github.com/fatih/color v1.7.0 h1:DkWD4oS2D8LGGgTQ6IvwJJXSL5Vp2ffcQg58nFV38Ys=
+github.com/fatih/color v1.7.0/go.mod h1:Zm6kSWBoL9eyXnKyktHP6abPY2pDugNf5KwzbycvMj4=
+github.com/fatih/structs v1.1.0 h1:Q7juDM0QtcnhCpeyLGQKyg4TOIghuNXrkL32pHAUMxo=
+github.com/fatih/structs v1.1.0/go.mod h1:9NiDSp5zOcgEDl+j00MP/WkGVPOlPRLejGD8Ga6PJ7M=
+github.com/frankban/quicktest v1.10.0 h1:Gfh+GAJZOAoKZsIZeZbdn2JF10kN1XHNvjsvQK8gVkE=
+github.com/frankban/quicktest v1.10.0/go.mod h1:ui7WezCLWMWxVWr1GETZY3smRy0G4KWq9vcPtJmFl7Y=
+github.com/fsnotify/fsnotify v1.4.7/go.mod h1:jwhsz4b93w/PPRr/qN1Yymfu8t87LnFCMoQvtojpjFo=
+github.com/go-asn1-ber/asn1-ber v1.3.1/go.mod h1:hEBeB/ic+5LoWskz+yKT7vGhhPYkProFKoKdwZRWMe0=
+github.com/go-kit/kit v0.8.0/go.mod h1:xBxKIO96dXMWWy0MnWVtmwkA9/13aqxPnvrjFYMA2as=
+github.com/go-kit/kit v0.9.0/go.mod h1:xBxKIO96dXMWWy0MnWVtmwkA9/13aqxPnvrjFYMA2as=
+github.com/go-ldap/ldap/v3 v3.1.3/go.mod h1:3rbOH3jRS2u6jg2rJnKAMLE/xQyCKIveG2Sa/Cohzb8=
+github.com/go-ldap/ldap/v3 v3.1.10/go.mod h1:5Zun81jBTabRaI8lzN7E1JjyEl1g6zI6u9pd8luAK4Q=
+github.com/go-logfmt/logfmt v0.3.0/go.mod h1:Qt1PoO58o5twSAckw1HlFXLmHsOX5/0LbT9GBnD5lWE=
+github.com/go-logfmt/logfmt v0.4.0/go.mod h1:3RMwSq7FuexP4Kalkev3ejPJsZTpXXBr9+V4qmtdjCk=
+github.com/go-sql-driver/mysql v1.5.0/go.mod h1:DCzpHaOWr8IXmIStZouvnhqoel9Qv2LBy8hT2VhHyBg=
+github.com/go-stack/stack v1.8.0/go.mod h1:v0f6uXyyMGvRgIKkXu+yp6POWl0qKG85gN/melR3HDY=
+github.com/go-test/deep v1.0.2-0.20181118220953-042da051cf31/go.mod h1:wGDj63lr65AM2AQyKZd/NYHGb0R+1RLqB8NKt3aSFNA=
+github.com/go-test/deep v1.0.2 h1:onZX1rnHT3Wv6cqNgYyFOOlgVKJrksuCMCRvJStbMYw=
+github.com/go-test/deep v1.0.2/go.mod h1:wGDj63lr65AM2AQyKZd/NYHGb0R+1RLqB8NKt3aSFNA=
+github.com/godbus/dbus v0.0.0-20190422162347-ade71ed3457e/go.mod h1:bBOAhwG1umN6/6ZUMtDFBMQR8jRg9O75tm9K00oMsK4=
+github.com/gogo/protobuf v1.1.1/go.mod h1:r8qH/GZQm5c6nD/R0oafs1akxWv10x8SbQlK7atdtwQ=
+github.com/gogo/protobuf v1.2.1/go.mod h1:hp+jE20tsWTFYpLwKvXlhS1hjn+gTNwPg2I6zVXpSg4=
+github.com/gogo/protobuf v1.3.1/go.mod h1:SlYgWuQ5SjCEi6WLHjHCa1yvBfUnHcTbrrZtXPKa29o=
+github.com/golang/glog v0.0.0-20160126235308-23def4e6c14b/go.mod h1:SBH7ygxi8pfUlaOkMMuAQtPIUF8ecWP5IEl/CR7VP2Q=
+github.com/golang/mock v1.1.1/go.mod h1:oTYuIxOrZwtPieC+H1uAHpcLFnEyAGVDL/k47Jfbm0A=
+github.com/golang/protobuf v1.2.0/go.mod h1:6lQm79b+lXiMfvg/cZm0SGofjICqVBUtrP5yJMmIC1U=
+github.com/golang/protobuf v1.3.1/go.mod h1:6lQm79b+lXiMfvg/cZm0SGofjICqVBUtrP5yJMmIC1U=
+github.com/golang/protobuf v1.3.2/go.mod h1:6lQm79b+lXiMfvg/cZm0SGofjICqVBUtrP5yJMmIC1U=
+github.com/golang/protobuf v1.3.3/go.mod h1:vzj43D7+SQXF/4pzW/hwtAqwc6iTitCiVSaWz5lYuqw=
+github.com/golang/protobuf v1.4.0-rc.1/go.mod h1:ceaxUfeHdC40wWswd/P6IGgMaK3YpKi5j83Wpe3EHw8=
+github.com/golang/protobuf v1.4.0-rc.1.0.20200221234624-67d41d38c208/go.mod h1:xKAWHe0F5eneWXFV3EuXVDTCmh+JuBKY0li0aMyXATA=
+github.com/golang/protobuf v1.4.0-rc.2/go.mod h1:LlEzMj4AhA7rCAGe4KMBDvJI+AwstrUpVNzEA03Pprs=
+github.com/golang/protobuf v1.4.0-rc.4.0.20200313231945-b860323f09d0/go.mod h1:WU3c8KckQ9AFe+yFwt9sWVRKCVIyN9cPHBJSNnbL67w=
+github.com/golang/protobuf v1.4.0/go.mod h1:jodUvKwWbYaEsadDk5Fwe5c77LiNKVO9IDvqG2KuDX0=
+github.com/golang/protobuf v1.4.1/go.mod h1:U8fpvMrcmy5pZrNK1lt4xCsGvpyWQ/VVv6QDs8UjoX8=
+github.com/golang/protobuf v1.4.2 h1:+Z5KGCizgyZCbGh1KZqA0fcLLkwbsjIzS4aV2v7wJX0=
+github.com/golang/protobuf v1.4.2/go.mod h1:oDoupMAO8OvCJWAcko0GGGIgR6R6ocIYbsSw735rRwI=
+github.com/golang/snappy v0.0.1 h1:Qgr9rKW7uDUkrbSmQeiDsGa8SjGyCOGtuasMWwvp2P4=
+github.com/golang/snappy v0.0.1/go.mod h1:/XxbfmMg8lxefKM7IXC3fBNl/7bRcc72aCRzEWrmP2Q=
+github.com/google/go-cmp v0.2.0/go.mod h1:oXzfMopK8JAjlY9xF4vHSVASa0yLyX7SntLO5aqRK0M=
+github.com/google/go-cmp v0.3.0/go.mod h1:8QqcDgzrUqlUb/G2PQTWiueGozuR1884gddMywk6iLU=
+github.com/google/go-cmp v0.3.1/go.mod h1:8QqcDgzrUqlUb/G2PQTWiueGozuR1884gddMywk6iLU=
+github.com/google/go-cmp v0.4.0/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE=
+github.com/google/go-cmp v0.5.0 h1:/QaMHBdZ26BB3SSst0Iwl10Epc+xhTquomWX0oZEB6w=
+github.com/google/go-cmp v0.5.0/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE=
+github.com/google/gofuzz v1.0.0/go.mod h1:dBl0BpW6vV/+mYPU4Po3pmUjxk6FQPldtuIdl/M65Eg=
+github.com/gorilla/mux v1.7.4/go.mod h1:DVbg23sWSpFRCP0SfiEN6jmj59UnW/n46BH5rLB71So=
+github.com/hashicorp/errwrap v1.0.0 h1:hLrqtEDnRye3+sgx6z4qVLNuviH3MR5aQ0ykNJa/UYA=
+github.com/hashicorp/errwrap v1.0.0/go.mod h1:YH+1FKiLXxHSkmPseP+kNlulaMuP3n2brvKWEqk/Jc4=
+github.com/hashicorp/go-cleanhttp v0.5.0/go.mod h1:JpRdi6/HCYpAwUzNwuwqhbovhLtngrth3wmdIIUrZ80=
+github.com/hashicorp/go-cleanhttp v0.5.1 h1:dH3aiDG9Jvb5r5+bYHsikaOUIpcM0xvgMXVoDkXMzJM=
+github.com/hashicorp/go-cleanhttp v0.5.1/go.mod h1:JpRdi6/HCYpAwUzNwuwqhbovhLtngrth3wmdIIUrZ80=
+github.com/hashicorp/go-hclog v0.0.0-20180709165350-ff2cf002a8dd/go.mod h1:9bjs9uLqI8l75knNv3lV1kA55veR+WUPSiKIWcQHudI=
+github.com/hashicorp/go-hclog v0.9.2/go.mod h1:5CU+agLiy3J7N7QjHK5d05KxGsuXiQLrjA0H7acj2lQ=
+github.com/hashicorp/go-hclog v0.12.0/go.mod h1:whpDNt7SSdeAju8AWKIWsul05p54N/39EeqMAyrmvFQ=
+github.com/hashicorp/go-hclog v0.14.1 h1:nQcJDQwIAGnmoUWp8ubocEX40cCml/17YkF6csQLReU=
+github.com/hashicorp/go-hclog v0.14.1/go.mod h1:whpDNt7SSdeAju8AWKIWsul05p54N/39EeqMAyrmvFQ=
+github.com/hashicorp/go-immutable-radix v1.0.0/go.mod h1:0y9vanUI8NX6FsYoO3zeMjhV/C5i9g4Q3DwcSNZ4P60=
+github.com/hashicorp/go-immutable-radix v1.1.0 h1:vN9wG1D6KG6YHRTWr8512cxGOVgTMEfgEdSj/hr8MPc=
+github.com/hashicorp/go-immutable-radix v1.1.0/go.mod h1:0y9vanUI8NX6FsYoO3zeMjhV/C5i9g4Q3DwcSNZ4P60=
+github.com/hashicorp/go-kms-wrapping/entropy v0.1.0 h1:xuTi5ZwjimfpvpL09jDE71smCBRpnF5xfo871BSX4gs=
+github.com/hashicorp/go-kms-wrapping/entropy v0.1.0/go.mod h1:d1g9WGtAunDNpek8jUIEJnBlbgKS1N2Q61QkHiZyR1g=
+github.com/hashicorp/go-multierror v1.0.0/go.mod h1:dHtQlpGsu+cZNNAkkCN/P3hoUDHhCYQXV3UM06sGGrk=
+github.com/hashicorp/go-multierror v1.1.0 h1:B9UzwGQJehnUY1yNrnwREHc3fGbC2xefo8g4TbElacI=
+github.com/hashicorp/go-multierror v1.1.0/go.mod h1:spPvp8C1qA32ftKqdAHm4hHTbPw+vmowP0z+KUhOZdA=
+github.com/hashicorp/go-plugin v1.0.1 h1:4OtAfUGbnKC6yS48p0CtMX2oFYtzFZVv6rok3cRWgnE=
+github.com/hashicorp/go-plugin v1.0.1/go.mod h1:++UyYGoz3o5w9ZzAdZxtQKrWWP+iqPBn3cQptSMzBuY=
+github.com/hashicorp/go-retryablehttp v0.5.3/go.mod h1:9B5zBasrRhHXnJnui7y6sL7es7NDiJgTc6Er0maI1Xs=
+github.com/hashicorp/go-retryablehttp v0.6.2/go.mod h1:gEx6HMUGxYYhJScX7W1Il64m6cc2C1mDaW3NQ9sY1FY=
+github.com/hashicorp/go-retryablehttp v0.6.6 h1:HJunrbHTDDbBb/ay4kxa1n+dLmttUlnP3V9oNE4hmsM=
+github.com/hashicorp/go-retryablehttp v0.6.6/go.mod h1:vAew36LZh98gCBJNLH42IQ1ER/9wtLZZ8meHqQvEYWY=
+github.com/hashicorp/go-rootcerts v1.0.1/go.mod h1:pqUvnprVnM5bf7AOirdbb01K4ccR319Vf4pU3K5EGc8=
+github.com/hashicorp/go-rootcerts v1.0.2 h1:jzhAVGtqPKbwpyCPELlgNWhE1znq+qwJtW5Oi2viEzc=
+github.com/hashicorp/go-rootcerts v1.0.2/go.mod h1:pqUvnprVnM5bf7AOirdbb01K4ccR319Vf4pU3K5EGc8=
+github.com/hashicorp/go-sockaddr v1.0.2 h1:ztczhD1jLxIRjVejw8gFomI1BQZOe2WoVOu0SyteCQc=
+github.com/hashicorp/go-sockaddr v1.0.2/go.mod h1:rB4wwRAUzs07qva3c5SdrY/NEtAUjGlgmH/UkBUC97A=
+github.com/hashicorp/go-uuid v1.0.0/go.mod h1:6SBZvOh/SIDV7/2o3Jml5SYk/TvGqwFJ/bN7x4byOro=
+github.com/hashicorp/go-uuid v1.0.2 h1:cfejS+Tpcp13yd5nYHWDI6qVCny6wyX2Mt5SGur2IGE=
+github.com/hashicorp/go-uuid v1.0.2/go.mod h1:6SBZvOh/SIDV7/2o3Jml5SYk/TvGqwFJ/bN7x4byOro=
+github.com/hashicorp/go-version v1.1.0/go.mod h1:fltr4n8CU8Ke44wwGCBoEymUuxUHl09ZGVZPK5anwXA=
+github.com/hashicorp/go-version v1.2.0 h1:3vNe/fWF5CBgRIguda1meWhsZHy3m8gCJ5wx+dIzX/E=
+github.com/hashicorp/go-version v1.2.0/go.mod h1:fltr4n8CU8Ke44wwGCBoEymUuxUHl09ZGVZPK5anwXA=
+github.com/hashicorp/golang-lru v0.5.0/go.mod h1:/m3WP610KZHVQ1SGc6re/UDhFvYD7pJ4Ao+sR/qLZy8=
+github.com/hashicorp/golang-lru v0.5.1/go.mod h1:/m3WP610KZHVQ1SGc6re/UDhFvYD7pJ4Ao+sR/qLZy8=
+github.com/hashicorp/golang-lru v0.5.3 h1:YPkqC67at8FYaadspW/6uE0COsBxS2656RLEr8Bppgk=
+github.com/hashicorp/golang-lru v0.5.3/go.mod h1:iADmTwqILo4mZ8BN3D2Q6+9jd8WM5uGBxy+E8yxSoD4=
+github.com/hashicorp/hcl v1.0.0 h1:0Anlzjpi4vEasTeNFn2mLJgTSwt0+6sfsiTG8qcWGx4=
+github.com/hashicorp/hcl v1.0.0/go.mod h1:E5yfLk+7swimpb2L/Alb/PJmXilQ/rhwaUYs4T20WEQ=
+github.com/hashicorp/vault/api v1.0.5-0.20200519221902-385fac77e20f/go.mod h1:euTFbi2YJgwcju3imEt919lhJKF68nN1cQPq3aA+kBE=
+github.com/hashicorp/vault/api v1.0.5-0.20210325191337-ac5500471f36 h1:ApRbXrIwsFwWKS5pxg+pSCY/4aqPUkwWO86+dADlq/0=
+github.com/hashicorp/vault/api v1.0.5-0.20210325191337-ac5500471f36/go.mod h1:R3Umvhlxi2TN7Ex2hzOowyeNb+SfbVWI973N+ctaFMk=
+github.com/hashicorp/vault/sdk v0.1.14-0.20200519221530-14615acda45f/go.mod h1:WX57W2PwkrOPQ6rVQk+dy5/htHIaB4aBM70EwKThu10=
+github.com/hashicorp/vault/sdk v0.1.14-0.20200519221838-e0cfd64bc267/go.mod h1:WX57W2PwkrOPQ6rVQk+dy5/htHIaB4aBM70EwKThu10=
+github.com/hashicorp/vault/sdk v0.1.14-0.20210325185647-d3758c9bd369 h1:jy9dbpwTiEDOF/nemRLfj4s3ijHxy3pXO5k/ATnpSW0=
+github.com/hashicorp/vault/sdk v0.1.14-0.20210325185647-d3758c9bd369/go.mod h1:cAGI4nVnEfAyMeqt9oB+Mase8DNn3qA/LDNHURiwssY=
+github.com/hashicorp/yamux v0.0.0-20180604194846-3520598351bb/go.mod h1:+NfK9FKeTrX5uv1uIXGdwYDTeHna2qgaIlx54MXqjAM=
+github.com/hashicorp/yamux v0.0.0-20181012175058-2f1d1f20f75d h1:kJCB4vdITiW1eC1vq2e6IsrXKrZit1bv/TDYFGMp4BQ=
+github.com/hashicorp/yamux v0.0.0-20181012175058-2f1d1f20f75d/go.mod h1:+NfK9FKeTrX5uv1uIXGdwYDTeHna2qgaIlx54MXqjAM=
+github.com/hpcloud/tail v1.0.0/go.mod h1:ab1qPbhIpdTxEkNHXyeSf5vhxWSCs/tWer42PpOxQnU=
+github.com/inconshreveable/mousetrap v1.0.0/go.mod h1:PxqpIevigyE2G7u3NXJIT2ANytuPF1OarO4DADm73n8=
+github.com/jmespath/go-jmespath v0.0.0-20180206201540-c2b33e8439af/go.mod h1:Nht3zPeWKUH0NzdCt2Blrr5ys8VGpn0CEB0cQHVjt7k=
+github.com/jmespath/go-jmespath v0.3.0/go.mod h1:9QtRXoHjLGCJ5IBSaohpXITPlowMeeYCZ7fLUTSywik=
+github.com/json-iterator/go v1.1.6/go.mod h1:+SdeFBvtyEkXs7REEP0seUULqWtbJapLOCVDaaPEHmU=
+github.com/json-iterator/go v1.1.9/go.mod h1:KdQUCv79m/52Kvf8AW2vK1V8akMuk1QjK/uOdHXbAo4=
+github.com/julienschmidt/httprouter v1.2.0/go.mod h1:SYymIcj16QtmaHHD7aYtjjsJG7VTCxuUUipMqKk8s4w=
+github.com/kisielk/errcheck v1.1.0/go.mod h1:EZBBE59ingxPouuu3KfxchcWSUPOHkagtvWXihfKN4Q=
+github.com/kisielk/errcheck v1.2.0/go.mod h1:/BMXB+zMLi60iA8Vv6Ksmxu/1UDYcXs4uQLJ+jE2L00=
+github.com/kisielk/gotool v1.0.0/go.mod h1:XhKaO+MFFWcvkIS/tQcRk01m1F5IRFswLeQ+oQHNcck=
+github.com/konsorten/go-windows-terminal-sequences v1.0.1/go.mod h1:T0+1ngSBFLxvqU3pZ+m/2kptfBszLMUkC4ZK/EgS/cQ=
+github.com/kr/logfmt v0.0.0-20140226030751-b84e30acd515/go.mod h1:+0opPa2QZZtGFBFZlji/RkVcI2GknAs/DXo4wKdlNEc=
+github.com/kr/pretty v0.1.0/go.mod h1:dAy3ld7l9f0ibDNOQOHHMYYIIbhfbHSm3C4ZsoJORNo=
+github.com/kr/pretty v0.2.0 h1:s5hAObm+yFO5uHYt5dYjxi2rXrsnmRpJx4OYvIWUaQs=
+github.com/kr/pretty v0.2.0/go.mod h1:ipq/a2n7PKx3OHsz4KJII5eveXtPO4qwEXGdVfWzfnI=
+github.com/kr/pty v1.1.1/go.mod h1:pFQYn66WHrOpPYNljwOMqo10TkYh1fy3cYio2l3bCsQ=
+github.com/kr/text v0.1.0/go.mod h1:4Jbv+DJW3UT/LiOwJeYQe1efqtUx/iVham/4vfdArNI=
+github.com/kr/text v0.2.0 h1:5Nx0Ya0ZqY2ygV366QzturHI13Jq95ApcVaJBhpS+AY=
+github.com/kr/text v0.2.0/go.mod h1:eLer722TekiGuMkidMxC/pM04lWEeraHUUmBw8l2grE=
+github.com/mattn/go-colorable v0.0.9/go.mod h1:9vuHe8Xs5qXnSaW/c/ABM9alt+Vo+STaOChaDxuIBZU=
+github.com/mattn/go-colorable v0.1.4/go.mod h1:U0ppj6V5qS13XJ6of8GYAs25YV2eR4EVcfRqFIhoBtE=
+github.com/mattn/go-colorable v0.1.6 h1:6Su7aK7lXmJ/U79bYtBjLNaha4Fs1Rg9plHpcH+vvnE=
+github.com/mattn/go-colorable v0.1.6/go.mod h1:u6P/XSegPjTcexA+o6vUJrdnUu04hMope9wVRipJSqc=
+github.com/mattn/go-isatty v0.0.3/go.mod h1:M+lRXTBqGeGNdLjl/ufCoiOlB5xdOkqRJdNxMWT7Zi4=
+github.com/mattn/go-isatty v0.0.8/go.mod h1:Iq45c/XA43vh69/j3iqttzPXn0bhXyGjM0Hdxcsrc5s=
+github.com/mattn/go-isatty v0.0.10/go.mod h1:qgIWMr58cqv1PHHyhnkY9lrL7etaEgOFcMEpPG5Rm84=
+github.com/mattn/go-isatty v0.0.12 h1:wuysRhFDzyxgEmMf5xjvJ2M9dZoWAXNNr5LSBS7uHXY=
+github.com/mattn/go-isatty v0.0.12/go.mod h1:cbi8OIDigv2wuxKPP5vlRcQ1OAZbq2CE4Kysco4FUpU=
+github.com/matttproud/golang_protobuf_extensions v1.0.1/go.mod h1:D8He9yQNgCq6Z5Ld7szi9bcBfOoFv/3dc6xSMkL2PC0=
+github.com/mitchellh/cli v1.0.0/go.mod h1:hNIlj7HEI86fIcpObd7a0FcrxTWetlwJDGcceTlRvqc=
+github.com/mitchellh/copystructure v1.0.0 h1:Laisrj+bAB6b/yJwB5Bt3ITZhGJdqmxquMKeZ+mmkFQ=
+github.com/mitchellh/copystructure v1.0.0/go.mod h1:SNtv71yrdKgLRyLFxmLdkAbkKEFWgYaq1OVrnRcwhnw=
+github.com/mitchellh/go-homedir v1.1.0 h1:lukF9ziXFxDFPkA1vsr5zpc1XuPDn/wFntq5mG+4E0Y=
+github.com/mitchellh/go-homedir v1.1.0/go.mod h1:SfyaCUpYCn1Vlf4IUYiD9fPX4A5wJrkLzIz1N1q0pr0=
+github.com/mitchellh/go-testing-interface v0.0.0-20171004221916-a61a99592b77/go.mod h1:kRemZodwjscx+RGhAo8eIhFbs2+BFgRtFPeD/KE+zxI=
+github.com/mitchellh/go-testing-interface v1.0.0 h1:fzU/JVNcaqHQEcVFAKeR41fkiLdIPrefOvVG1VZ96U0=
+github.com/mitchellh/go-testing-interface v1.0.0/go.mod h1:kRemZodwjscx+RGhAo8eIhFbs2+BFgRtFPeD/KE+zxI=
+github.com/mitchellh/go-wordwrap v1.0.0/go.mod h1:ZXFpozHsX6DPmq2I0TCekCxypsnAUbP2oI0UX1GXzOo=
+github.com/mitchellh/mapstructure v1.1.2/go.mod h1:FVVH3fgwuzCH5S8UJGiWEs2h04kUh9fWfEaFds41c1Y=
+github.com/mitchellh/mapstructure v1.3.2 h1:mRS76wmkOn3KkKAyXDu42V+6ebnXWIztFSYGN7GeoRg=
+github.com/mitchellh/mapstructure v1.3.2/go.mod h1:bFUtVrKA4DC2yAKiSyO/QUcy7e+RRV2QTWOzhPopBRo=
+github.com/mitchellh/reflectwalk v1.0.0 h1:9D+8oIskB4VJBN5SFlmc27fSlIBZaov1Wpk/IfikLNY=
+github.com/mitchellh/reflectwalk v1.0.0/go.mod h1:mSTlrgnPZtwu0c4WaC2kGObEpuNDbx0jmZXqmk4esnw=
+github.com/modern-go/concurrent v0.0.0-20180228061459-e0a39a4cb421/go.mod h1:6dJC0mAP4ikYIbvyc7fijjWJddQyLn8Ig3JB5CqoB9Q=
+github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd/go.mod h1:6dJC0mAP4ikYIbvyc7fijjWJddQyLn8Ig3JB5CqoB9Q=
+github.com/modern-go/reflect2 v0.0.0-20180701023420-4b7aa43c6742/go.mod h1:bx2lNnkwVCuqBIxFjflWJWanXIb3RllmbCylyMrvgv0=
+github.com/modern-go/reflect2 v1.0.1/go.mod h1:bx2lNnkwVCuqBIxFjflWJWanXIb3RllmbCylyMrvgv0=
+github.com/morikuni/aec v1.0.0/go.mod h1:BbKIizmSmc5MMPqRYbxO4ZU0S0+P200+tUnFx7PXmsc=
+github.com/mwitkow/go-conntrack v0.0.0-20161129095857-cc309e4a2223/go.mod h1:qRWi+5nqEBWmkhHvq77mSJWrCKwh8bxhgT7d/eI7P4U=
+github.com/oklog/run v1.0.0 h1:Ru7dDtJNOyC66gQ5dQmaCa0qIsAUFY3sFpK1Xk8igrw=
+github.com/oklog/run v1.0.0/go.mod h1:dlhp/R75TPv97u0XWUtDeV/lRKWPKSdTuV0TZvrmrQA=
+github.com/onsi/ginkgo v1.6.0/go.mod h1:lLunBs/Ym6LB5Z9jYTR76FiuTmxDTDusOGeTQH+WWjE=
+github.com/onsi/ginkgo v1.10.1/go.mod h1:lLunBs/Ym6LB5Z9jYTR76FiuTmxDTDusOGeTQH+WWjE=
+github.com/onsi/gomega v1.7.0/go.mod h1:ex+gbHU/CVuBBDIJjb2X0qEXbFg53c61hWP/1CpauHY=
+github.com/opencontainers/go-digest v0.0.0-20180430190053-c9281466c8b2/go.mod h1:cMLVZDEM3+U2I4VmLI6N8jQYUd2OVphdqWwCJHrFt2s=
+github.com/opencontainers/go-digest v1.0.0-rc1/go.mod h1:cMLVZDEM3+U2I4VmLI6N8jQYUd2OVphdqWwCJHrFt2s=
+github.com/opencontainers/go-digest v1.0.0/go.mod h1:0JzlMkj0TRzQZfJkVvzbP0HBR3IKzErnv2BNG4W4MAM=
+github.com/opencontainers/image-spec v1.0.1/go.mod h1:BtxoFyWECRxE4U/7sNtV5W15zMzWCbyJoFRP3s7yZA0=
+github.com/opencontainers/runc v0.0.0-20190115041553-12f6a991201f/go.mod h1:qT5XzbpPznkRYVz/mWwUaVBUv2rmF59PVA73FjuZG0U=
+github.com/opencontainers/runc v0.1.1/go.mod h1:qT5XzbpPznkRYVz/mWwUaVBUv2rmF59PVA73FjuZG0U=
+github.com/opencontainers/runtime-spec v0.1.2-0.20190507144316-5b71a03e2700/go.mod h1:jwyrGlmzljRJv/Fgzds9SsS/C5hL+LL3ko9hs6T5lQ0=
+github.com/pascaldekloe/goe v0.1.0 h1:cBOtyMzM9HTpWjXfbbunk26uA6nG3a8n06Wieeh0MwY=
+github.com/pascaldekloe/goe v0.1.0/go.mod h1:lzWF7FIEvWOWxwDKqyGYQf6ZUaNfKdP144TG7ZOy1lc=
+github.com/pierrec/lz4 v2.0.5+incompatible/go.mod h1:pdkljMzZIN41W+lC3N2tnIh5sFi+IEE17M5jbnwPHcY=
+github.com/pierrec/lz4 v2.5.2+incompatible h1:WCjObylUIOlKy/+7Abdn34TLIkXiA4UWUMhxq9m9ZXI=
+github.com/pierrec/lz4 v2.5.2+incompatible/go.mod h1:pdkljMzZIN41W+lC3N2tnIh5sFi+IEE17M5jbnwPHcY=
+github.com/pkg/errors v0.8.0/go.mod h1:bwawxfHBFNV+L2hUp1rHADufV3IMtnDRdf1r5NINEl0=
+github.com/pkg/errors v0.8.1-0.20171018195549-f15c970de5b7/go.mod h1:bwawxfHBFNV+L2hUp1rHADufV3IMtnDRdf1r5NINEl0=
+github.com/pkg/errors v0.8.1/go.mod h1:bwawxfHBFNV+L2hUp1rHADufV3IMtnDRdf1r5NINEl0=
+github.com/pkg/errors v0.9.1/go.mod h1:bwawxfHBFNV+L2hUp1rHADufV3IMtnDRdf1r5NINEl0=
+github.com/pmezard/go-difflib v1.0.0 h1:4DBwDE0NGyQoBHbLQYPwSUPoCMWR5BEzIk/f1lZbAQM=
+github.com/pmezard/go-difflib v1.0.0/go.mod h1:iKH77koFhYxTK1pcRnkKkqfTogsbg7gZNVY4sRDYZ/4=
+github.com/posener/complete v1.1.1/go.mod h1:em0nMJCgc9GFtwrmVmEMR/ZL6WyhyjMBndrE9hABlRI=
+github.com/prometheus/client_golang v0.9.1/go.mod h1:7SWBe2y4D6OKWSNQJUaRYU/AaXPKyh/dDVn+NZz0KFw=
+github.com/prometheus/client_golang v0.9.2/go.mod h1:OsXs2jCmiKlQ1lTBmv21f2mNfw4xf/QclQDMrYNZzcM=
+github.com/prometheus/client_golang v1.0.0/go.mod h1:db9x61etRT2tGnBNRi70OPL5FsnadC4Ky3P0J6CfImo=
+github.com/prometheus/client_golang v1.4.0/go.mod h1:e9GMxYsXl05ICDXkRhurwBS4Q3OK1iX/F2sw+iXX5zU=
+github.com/prometheus/client_model v0.0.0-20180712105110-5c3871d89910/go.mod h1:MbSGuTsp3dbXC40dX6PRTWyKYBIrTGTE9sqQNg2J8bo=
+github.com/prometheus/client_model v0.0.0-20190129233127-fd36f4220a90/go.mod h1:xMI15A0UPsDsEKsMN9yxemIoYk6Tm2C1GtYGdfGttqA=
+github.com/prometheus/client_model v0.0.0-20190812154241-14fe0d1b01d4/go.mod h1:xMI15A0UPsDsEKsMN9yxemIoYk6Tm2C1GtYGdfGttqA=
+github.com/prometheus/client_model v0.2.0/go.mod h1:xMI15A0UPsDsEKsMN9yxemIoYk6Tm2C1GtYGdfGttqA=
+github.com/prometheus/common v0.0.0-20181126121408-4724e9255275/go.mod h1:daVV7qP5qjZbuso7PdcryaAu0sAZbrN9i7WWcTMWvro=
+github.com/prometheus/common v0.4.1/go.mod h1:TNfzLD0ON7rHzMJeJkieUDPYmFC7Snx/y86RQel1bk4=
+github.com/prometheus/common v0.9.1/go.mod h1:yhUN8i9wzaXS3w1O07YhxHEBxD+W35wd8bs7vj7HSQ4=
+github.com/prometheus/procfs v0.0.0-20180125133057-cb4147076ac7/go.mod h1:c3At6R/oaqEKCNdg8wHV1ftS6bRYblBhIjjI8uT2IGk=
+github.com/prometheus/procfs v0.0.0-20181005140218-185b4288413d/go.mod h1:c3At6R/oaqEKCNdg8wHV1ftS6bRYblBhIjjI8uT2IGk=
+github.com/prometheus/procfs v0.0.0-20181204211112-1dc9a6cbc91a/go.mod h1:c3At6R/oaqEKCNdg8wHV1ftS6bRYblBhIjjI8uT2IGk=
+github.com/prometheus/procfs v0.0.2/go.mod h1:TjEm7ze935MbeOT/UhFTIMYKhuLP4wbCsTZCD3I8kEA=
+github.com/prometheus/procfs v0.0.8/go.mod h1:7Qr8sr6344vo1JqZ6HhLceV9o3AJ1Ff+GxbHq6oeK9A=
+github.com/ryanuber/columnize v2.1.0+incompatible/go.mod h1:sm1tb6uqfes/u+d4ooFouqFdy9/2g9QGwK3SQygK0Ts=
+github.com/ryanuber/go-glob v1.0.0 h1:iQh3xXAumdQ+4Ufa5b25cRpC5TYKlno6hsv6Cb3pkBk=
+github.com/ryanuber/go-glob v1.0.0/go.mod h1:807d1WSdnB0XRJzKNil9Om6lcp/3a0v4qIHxIXzX/Yc=
+github.com/sirupsen/logrus v1.0.4-0.20170822132746-89742aefa4b2/go.mod h1:pMByvHTf9Beacp5x1UXfOR9xyW/9antXMhjMPG0dEzc=
+github.com/sirupsen/logrus v1.2.0/go.mod h1:LxeOpSwHxABJmUn/MG1IvRgCAasNZTLOkJPxbbu5VWo=
+github.com/sirupsen/logrus v1.4.1/go.mod h1:ni0Sbl8bgC9z8RoU9G6nDWqqs/fq4eDPysMBDgk/93Q=
+github.com/sirupsen/logrus v1.4.2/go.mod h1:tLMulIdttU9McNUspp0xgXVQah82FyeX6MwdIuYE2rE=
+github.com/spf13/cobra v0.0.2-0.20171109065643-2da4a54c5cee/go.mod h1:1l0Ry5zgKvJasoi3XT1TypsSe7PqH0Sj9dhYf7v3XqQ=
+github.com/spf13/pflag v1.0.1-0.20171106142849-4c012f6dcd95/go.mod h1:DYY7MBk1bdzusC3SYhjObp+wFpr4gzcvqqNjLnInEg4=
+github.com/spf13/pflag v1.0.3/go.mod h1:DYY7MBk1bdzusC3SYhjObp+wFpr4gzcvqqNjLnInEg4=
+github.com/stretchr/objx v0.1.0/go.mod h1:HFkY916IF+rwdDfMAkV7OtwuqBVzrE8GR6GFx+wExME=
+github.com/stretchr/objx v0.1.1 h1:2vfRuCMp5sSVIDSqO8oNnWJq7mPa6KVP3iPIwFBuy8A=
+github.com/stretchr/objx v0.1.1/go.mod h1:HFkY916IF+rwdDfMAkV7OtwuqBVzrE8GR6GFx+wExME=
+github.com/stretchr/testify v1.2.2/go.mod h1:a8OnRcib4nhh0OaRAV+Yts87kKdq0PP7pXfy6kDkUVs=
+github.com/stretchr/testify v1.3.0/go.mod h1:M5WIy9Dh21IEIfnGCwXGc5bZfKNJtfHm1UVUgZn+9EI=
+github.com/stretchr/testify v1.4.0/go.mod h1:j7eGeouHqKxXV5pUuKE4zz7dFj8WfuZ+81PSLYec5m4=
+github.com/stretchr/testify v1.5.1 h1:nOGnQDM7FYENwehXlg/kFVnos3rEvtKTjRvOWSzb6H4=
+github.com/stretchr/testify v1.5.1/go.mod h1:5W2xD1RspED5o8YsWQXVCued0rvSQ+mT+I5cxcmMvtA=
+github.com/tv42/httpunix v0.0.0-20150427012821-b75d8614f926/go.mod h1:9ESjWnEqriFuLhtthL60Sar/7RFoluCcXsuvEwTV5KM=
+github.com/urfave/cli v0.0.0-20171014202726-7bc6a0acffa5/go.mod h1:70zkFmudgCuE/ngEzBv17Jvp/497gISqfk5gWijbERA=
+go.opencensus.io v0.22.0/go.mod h1:+kGneAE2xo2IficOXnaByMWTGM9T73dGwxeWcUqIpI8=
+golang.org/x/crypto v0.0.0-20171113213409-9f005a07e0d3/go.mod h1:6SG95UA2DQfeDnfUPMdvaQW0Q7yPrPDi9nlGo2tz2b4=
+golang.org/x/crypto v0.0.0-20180904163835-0709b304e793/go.mod h1:6SG95UA2DQfeDnfUPMdvaQW0Q7yPrPDi9nlGo2tz2b4=
+golang.org/x/crypto v0.0.0-20190308221718-c2843e01d9a2/go.mod h1:djNgcEr1/C05ACkg1iLfiJU5Ep61QUkGW8qpdssI0+w=
+golang.org/x/crypto v0.0.0-20190418165655-df01cb2cc480/go.mod h1:WFFai1msRO1wXaEeE5yQxYXgSfI8pQAWXbQop6sCtWE=
+golang.org/x/crypto v0.0.0-20200604202706-70a84ac30bf9 h1:vEg9joUBmeBcK9iSJftGNf3coIG4HqZElCPehJsfAYM=
+golang.org/x/crypto v0.0.0-20200604202706-70a84ac30bf9/go.mod h1:LzIPMQfyMNhhGPhUkYOs5KpL4U8rLKemX1yGLhDgUto=
+golang.org/x/exp v0.0.0-20190121172915-509febef88a4/go.mod h1:CJ0aWSM057203Lf6IL+f9T1iT9GByDxfZKAQTCR3kQA=
+golang.org/x/lint v0.0.0-20181026193005-c67002cb31c3/go.mod h1:UVdnD1Gm6xHRNCYTkRU2/jEulfH38KcIWyp/GAMgvoE=
+golang.org/x/lint v0.0.0-20190227174305-5b3e6a55c961/go.mod h1:wehouNa3lNwaWXcvxsM5YxQ5yQlVC4a0KAMCusXpPoU=
+golang.org/x/lint v0.0.0-20190313153728-d0100b6bd8b3/go.mod h1:6SW0HCj/g11FgYtHlgUYUwCkIfeOF89ocIRzGO/8vkc=
+golang.org/x/net v0.0.0-20180724234803-3673e40ba225/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=
+golang.org/x/net v0.0.0-20180826012351-8a410e7b638d/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=
+golang.org/x/net v0.0.0-20180906233101-161cd47e91fd/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=
+golang.org/x/net v0.0.0-20181114220301-adae6a3d119a/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=
+golang.org/x/net v0.0.0-20181201002055-351d144fa1fc/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=
+golang.org/x/net v0.0.0-20190213061140-3a22650c66bd/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=
+golang.org/x/net v0.0.0-20190311183353-d8887717615a/go.mod h1:t9HGtf8HONx5eT2rtn7q6eTqICYqUVnKs3thJo3Qplg=
+golang.org/x/net v0.0.0-20190404232315-eb5bcb51f2a3/go.mod h1:t9HGtf8HONx5eT2rtn7q6eTqICYqUVnKs3thJo3Qplg=
+golang.org/x/net v0.0.0-20190501004415-9ce7a6920f09/go.mod h1:t9HGtf8HONx5eT2rtn7q6eTqICYqUVnKs3thJo3Qplg=
+golang.org/x/net v0.0.0-20190613194153-d28f0bde5980/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
+golang.org/x/net v0.0.0-20190813141303-74dc4d7220e7/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
+golang.org/x/net v0.0.0-20191004110552-13f9640d40b9/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
+golang.org/x/net v0.0.0-20200202094626-16171245cfb2/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
+golang.org/x/net v0.0.0-20200602114024-627f9648deb9 h1:pNX+40auqi2JqRfOP1akLGtYcn15TUbkhwuCO3foqqM=
+golang.org/x/net v0.0.0-20200602114024-627f9648deb9/go.mod h1:qpuaurCH72eLCgpAm/N6yyVIVM9cpaDIP3A8BGJEC5A=
+golang.org/x/oauth2 v0.0.0-20180821212333-d2e6202438be/go.mod h1:N/0e6XlmueqKjAGxoOufVs8QHGRruUQn6yWY3a++T0U=
+golang.org/x/sync v0.0.0-20180314180146-1d60e4601c6f/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
+golang.org/x/sync v0.0.0-20181108010431-42b317875d0f/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
+golang.org/x/sync v0.0.0-20181221193216-37e7f081c4d4/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
+golang.org/x/sync v0.0.0-20190227155943-e225da77a7e6/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
+golang.org/x/sync v0.0.0-20190423024810-112230192c58/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
+golang.org/x/sync v0.0.0-20190911185100-cd5d95a43a6e/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
+golang.org/x/sys v0.0.0-20180823144017-11551d06cbcc/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
+golang.org/x/sys v0.0.0-20180830151530-49385e6e1522/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
+golang.org/x/sys v0.0.0-20180905080454-ebe1bf3edb33/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
+golang.org/x/sys v0.0.0-20180909124046-d0be0721c37e/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
+golang.org/x/sys v0.0.0-20181116152217-5ac8a444bdc5/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
+golang.org/x/sys v0.0.0-20190129075346-302c3dd5f1cc/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
+golang.org/x/sys v0.0.0-20190215142949-d0b11bdaac8a/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
+golang.org/x/sys v0.0.0-20190222072716-a9d3bda3a223/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
+golang.org/x/sys v0.0.0-20190403152447-81d4e9dc473e/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20190412213103-97732733099d/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20190422165155-953cdadca894/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20190502145724-3ef323f4f1fd/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20190514135907-3a4b5fb9f71f/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20190916202348-b4ddaad3f8a3/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20191008105621-543471e840be/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20200116001909-b77594299b42/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20200122134326-e047566fdf82/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20200223170610-d5e6a3e2c0ae/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20200323222414-85ca7c5b95cd/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20200602225109-6fdc65e7d980 h1:OjiUf46hAmXblsZdnoSXsEUSKU8r1UEzcL5RVZ4gO9Y=
+golang.org/x/sys v0.0.0-20200602225109-6fdc65e7d980/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/text v0.3.0/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ=
+golang.org/x/text v0.3.2 h1:tW2bmiBqwgJj/UpqtC8EpXEZVYOwU0yG4iWbprSVAcs=
+golang.org/x/text v0.3.2/go.mod h1:bEr9sfX3Q8Zfm5fL9x+3itogRgK3+ptLWKqgva+5dAk=
+golang.org/x/time v0.0.0-20190308202827-9d24e82272b4/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ=
+golang.org/x/time v0.0.0-20200416051211-89c76fbcd5d1 h1:NusfzzA6yGQ+ua51ck7E3omNUX/JuqbFSaRGqU8CcLI=
+golang.org/x/time v0.0.0-20200416051211-89c76fbcd5d1/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ=
+golang.org/x/tools v0.0.0-20180221164845-07fd8470d635/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ=
+golang.org/x/tools v0.0.0-20180917221912-90fa682c2a6e/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ=
+golang.org/x/tools v0.0.0-20181030221726-6c7e314b6563/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ=
+golang.org/x/tools v0.0.0-20190114222345-bf090417da8b/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ=
+golang.org/x/tools v0.0.0-20190226205152-f727befe758c/go.mod h1:9Yl7xja0Znq3iFh3HoIrodX9oNMXvdceNzlUR8zjMvY=
+golang.org/x/tools v0.0.0-20190311212946-11955173bddd/go.mod h1:LCzVGOaR6xXOjkQ3onu1FJEFr0SW1gC7cKk1uF8kGRs=
+golang.org/x/tools v0.0.0-20190524140312-2c0ae7006135/go.mod h1:RgjU9mgBXZiqYHBnxXauZ1Gv1EHHAz9KjViQ78xBX0Q=
+golang.org/x/tools v0.0.0-20190624222133-a101b041ded4/go.mod h1:/rFqwRUd4F7ZHNgwSSTFct+R/Kf4OFW1sUzUTQQTgfc=
+golang.org/x/xerrors v0.0.0-20191204190536-9bdfabe68543 h1:E7g+9GITq07hpfrRu66IVDexMakfv52eLZ2CXBWiKr4=
+golang.org/x/xerrors v0.0.0-20191204190536-9bdfabe68543/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
+google.golang.org/appengine v1.1.0/go.mod h1:EbEs0AVv82hx2wNQdGPgUI5lhzA/G0D9YwlJXL52JkM=
+google.golang.org/appengine v1.4.0/go.mod h1:xpcJRLb0r/rnEns0DIKYYv+WjYCduHsrkT7/EB5XEv4=
+google.golang.org/genproto v0.0.0-20180817151627-c66870c02cf8/go.mod h1:JiN7NxoALGmiZfu7CAH4rXhgtRTLTxftemlI0sWmxmc=
+google.golang.org/genproto v0.0.0-20190425155659-357c62f0e4bb/go.mod h1:VzzqZJRnGkLBvHegQrXjBqPurQTc5/KpmUdxsrq26oE=
+google.golang.org/genproto v0.0.0-20190502173448-54afdca5d873/go.mod h1:VzzqZJRnGkLBvHegQrXjBqPurQTc5/KpmUdxsrq26oE=
+google.golang.org/genproto v0.0.0-20190819201941-24fa4b261c55/go.mod h1:DMBHOl98Agz4BDEuKkezgsaosCRResVns1a3J2ZsMNc=
+google.golang.org/genproto v0.0.0-20200526211855-cb27e3aa2013 h1:+kGHl1aib/qcwaRi1CbqBZ1rk19r85MNUf8HaBghugY=
+google.golang.org/genproto v0.0.0-20200526211855-cb27e3aa2013/go.mod h1:NbSheEEYHJ7i3ixzK3sjbqSGDJWnxyFXZblF3eUsNvo=
+google.golang.org/grpc v1.14.0/go.mod h1:yo6s7OP7yaDglbqo1J04qKzAhqBH6lvTonzMVmEdcZw=
+google.golang.org/grpc v1.19.0/go.mod h1:mqu4LbDTu4XGKhr4mRzUsmM4RtVoemTSY81AxZiDr8c=
+google.golang.org/grpc v1.20.1/go.mod h1:10oTOabMzJvdu6/UiuZezV6QK5dSlG84ov/aaiqXj38=
+google.golang.org/grpc v1.22.0/go.mod h1:Y5yQAOtifL1yxbo5wqy6BxZv8vAUGQwXBOALyacEbxg=
+google.golang.org/grpc v1.23.0/go.mod h1:Y5yQAOtifL1yxbo5wqy6BxZv8vAUGQwXBOALyacEbxg=
+google.golang.org/grpc v1.23.1/go.mod h1:Y5yQAOtifL1yxbo5wqy6BxZv8vAUGQwXBOALyacEbxg=
+google.golang.org/grpc v1.25.1/go.mod h1:c3i+UQWmh7LiEpx4sFZnkU36qjEYZ0imhYfXVyQciAY=
+google.golang.org/grpc v1.27.0/go.mod h1:qbnxyOmOxrQa7FizSgH+ReBfzJrCY1pSN7KXBS8abTk=
+google.golang.org/grpc v1.29.1 h1:EC2SB8S04d2r73uptxphDSUG+kTKVgjRPF+N3xpxRB4=
+google.golang.org/grpc v1.29.1/go.mod h1:itym6AZVZYACWQqET3MqgPpjcuV5QH3BxFS3IjizoKk=
+google.golang.org/protobuf v0.0.0-20200109180630-ec00e32a8dfd/go.mod h1:DFci5gLYBciE7Vtevhsrf46CRTquxDuWsQurQQe4oz8=
+google.golang.org/protobuf v0.0.0-20200221191635-4d8936d0db64/go.mod h1:kwYJMbMJ01Woi6D6+Kah6886xMZcty6N08ah7+eCXa0=
+google.golang.org/protobuf v0.0.0-20200228230310-ab0ca4ff8a60/go.mod h1:cfTl7dwQJ+fmap5saPgwCLgHXTUD7jkjRqWcaiX5VyM=
+google.golang.org/protobuf v1.20.1-0.20200309200217-e05f789c0967/go.mod h1:A+miEFZTKqfCUM6K7xSMQL9OKL/b6hQv+e19PK+JZNE=
+google.golang.org/protobuf v1.21.0/go.mod h1:47Nbq4nVaFHyn7ilMalzfO3qCViNmqZ2kzikPIcrTAo=
+google.golang.org/protobuf v1.22.0/go.mod h1:EGpADcykh3NcUnDUJcl1+ZksZNG86OlYog2l/sGQquU=
+google.golang.org/protobuf v1.23.0/go.mod h1:EGpADcykh3NcUnDUJcl1+ZksZNG86OlYog2l/sGQquU=
+google.golang.org/protobuf v1.23.1-0.20200526195155-81db48ad09cc/go.mod h1:EGpADcykh3NcUnDUJcl1+ZksZNG86OlYog2l/sGQquU=
+google.golang.org/protobuf v1.25.0 h1:Ejskq+SyPohKW+1uil0JJMtmHCgJPJ/qWTxr8qp+R4c=
+google.golang.org/protobuf v1.25.0/go.mod h1:9JNX74DMeImyA3h4bdi1ymwjUzf21/xIlbajtzgsN7c=
+gopkg.in/airbrake/gobrake.v2 v2.0.9/go.mod h1:/h5ZAUhDkGaJfjzjKLSjv6zCL6O0LLBxU4K+aSYdM/U=
+gopkg.in/alecthomas/kingpin.v2 v2.2.6/go.mod h1:FMv+mEhP44yOT+4EoQTLFTRgOQ1FBLkstjWtayDeSgw=
+gopkg.in/check.v1 v0.0.0-20161208181325-20d25e280405/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0=
+gopkg.in/check.v1 v1.0.0-20180628173108-788fd7840127/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0=
+gopkg.in/check.v1 v1.0.0-20190902080502-41f04d3bba15 h1:YR8cESwS4TdDjEe65xsg0ogRM/Nc3DYOhEAlW+xobZo=
+gopkg.in/check.v1 v1.0.0-20190902080502-41f04d3bba15/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0=
+gopkg.in/fsnotify.v1 v1.4.7/go.mod h1:Tz8NjZHkW78fSQdbUxIjBTcgA1z1m8ZHf0WmKUhAMys=
+gopkg.in/gemnasium/logrus-airbrake-hook.v2 v2.1.2/go.mod h1:Xk6kEKp8OKb+X14hQBKWaSkCsqBpgog8nAV2xsGOxlo=
+gopkg.in/square/go-jose.v2 v2.3.1/go.mod h1:M9dMgbHiYLoDGQrXy7OpJDJWiKiU//h+vD76mk0e1AI=
+gopkg.in/square/go-jose.v2 v2.5.1 h1:7odma5RETjNHWJnR32wx8t+Io4djHE1PqxCFx3iiZ2w=
+gopkg.in/square/go-jose.v2 v2.5.1/go.mod h1:M9dMgbHiYLoDGQrXy7OpJDJWiKiU//h+vD76mk0e1AI=
+gopkg.in/tomb.v1 v1.0.0-20141024135613-dd632973f1e7/go.mod h1:dt/ZhP58zS4L8KSrWDmTeBkI65Dw0HsyUHuEVlX15mw=
+gopkg.in/yaml.v2 v2.2.1/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI=
+gopkg.in/yaml.v2 v2.2.2/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI=
+gopkg.in/yaml.v2 v2.2.4/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI=
+gopkg.in/yaml.v2 v2.2.5/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI=
+gopkg.in/yaml.v2 v2.2.8 h1:obN1ZagJSUGI0Ek/LBmuj4SNLPfIny3KsKFopxRdj10=
+gopkg.in/yaml.v2 v2.2.8/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI=
+gotest.tools v2.2.0+incompatible/go.mod h1:DsYFclhRJ6vuDpmuTbkuFWG+y2sxOXAzmJt81HFBacw=
+gotest.tools/v3 v3.0.2/go.mod h1:3SzNCllyD9/Y+b5r9JIKQ474KzkZyqLqEfYqMsX94Bk=
+honnef.co/go/tools v0.0.0-20190102054323-c2f93a96b099/go.mod h1:rf3lG4BRIbNafJWhAfAdb/ePZxsR/4RtNHQocxwk9r4=
+honnef.co/go/tools v0.0.0-20190523083050-ea95bdfd59fc/go.mod h1:rf3lG4BRIbNafJWhAfAdb/ePZxsR/4RtNHQocxwk9r4=
diff --git a/password/gen.go b/password/gen.go
new file mode 100644
index 0000000..b948a8a
--- /dev/null
+++ b/password/gen.go
@@ -0,0 +1,6 @@
+package password
+
+// Generate randomly generates a secure password
+func Generate() string {
+ return "hunter21" // TODO
+}
diff --git a/path_config.go b/path_config.go
new file mode 100644
index 0000000..a89488b
--- /dev/null
+++ b/path_config.go
@@ -0,0 +1,253 @@
+package secretsengine
+
+import (
+ "context"
+ "errors"
+ "fmt"
+ "time"
+
+ "git.tardisproject.uk/tcmal/vault-plugin-kerberos-secrets/config"
+ "github.com/hashicorp/vault/sdk/framework"
+ "github.com/hashicorp/vault/sdk/logical"
+)
+
+const (
+ configStoragePath = "config"
+ defaultCtxTimeout = 1 * time.Minute
+)
+
+// ConfigPaths extends the Vault API with a `/config` endpoint for the backend.
+func pathConfig(b *krbBackend) []*framework.Path {
+ return []*framework.Path{&framework.Path{
+ Pattern: "config",
+ Fields: configSchema(),
+ Operations: map[logical.Operation]framework.OperationHandler{
+ logical.ReadOperation: &framework.PathOperation{
+ Callback: b.pathConfigRead,
+ },
+ logical.CreateOperation: &framework.PathOperation{
+ Callback: b.pathConfigWrite,
+ },
+ logical.UpdateOperation: &framework.PathOperation{
+ Callback: b.pathConfigWrite,
+ },
+ logical.DeleteOperation: &framework.PathOperation{
+ Callback: b.pathConfigDelete,
+ },
+ },
+ ExistenceCheck: b.pathConfigExistenceCheck,
+ HelpSynopsis: pathConfigHelpSynopsis,
+ HelpDescription: pathConfigHelpDescription,
+ },
+ }
+}
+
+func configSchema() map[string]*framework.FieldSchema {
+ return map[string]*framework.FieldSchema{
+ "realm": {
+ Type: framework.TypeString,
+ Description: "The realm to authenticate against",
+ Required: true,
+ DisplayAttrs: &framework.DisplayAttributes{
+ Name: "Realm",
+ Sensitive: false,
+ },
+ },
+ "username": {
+ Type: framework.TypeString,
+ Description: "The username to access kadmin with",
+ Required: true,
+ DisplayAttrs: &framework.DisplayAttributes{
+ Name: "Username",
+ Sensitive: false,
+ },
+ },
+ "password": {
+ Type: framework.TypeString,
+ Description: "The user's password to access kadmin with",
+ Required: true,
+ DisplayAttrs: &framework.DisplayAttributes{
+ Name: "Password",
+ Sensitive: true,
+ },
+ },
+ "kdc": {
+ Type: framework.TypeCommaStringSlice,
+ Description: "Available KDCs for the realm",
+ Required: true,
+ DisplayAttrs: &framework.DisplayAttributes{
+ Name: "KDCs",
+ Sensitive: false,
+ },
+ },
+ "admin_server": {
+ Type: framework.TypeCommaStringSlice,
+ Description: "Available admin servers for the realm",
+ Required: true,
+ DisplayAttrs: &framework.DisplayAttributes{
+ Name: "Admin Servers",
+ Sensitive: false,
+ },
+ },
+ "kpasswd_server": {
+ Type: framework.TypeCommaStringSlice,
+ Description: "KPasswd servers for the realm",
+ Required: true,
+ DisplayAttrs: &framework.DisplayAttributes{
+ Name: "KPasswd Servers",
+ Sensitive: false,
+ },
+ },
+ }
+
+}
+
+// pathConfigExistenceCheck verifies if the configuration exists.
+func (b *krbBackend) pathConfigExistenceCheck(ctx context.Context, req *logical.Request, data *framework.FieldData) (bool, error) {
+ out, err := req.Storage.Get(ctx, req.Path)
+ if err != nil {
+ return false, fmt.Errorf("existence check failed: %w", err)
+ }
+
+ return out != nil, nil
+}
+
+// pathConfigRead reads the configuration and outputs non-sensitive information.
+func (b *krbBackend) pathConfigRead(ctx context.Context, req *logical.Request, data *framework.FieldData) (*logical.Response, error) {
+ config, err := getConfig(ctx, req.Storage)
+ if err != nil {
+ return nil, err
+ }
+
+ if config == nil {
+ return nil, fmt.Errorf("config not yet created")
+ }
+
+ return &logical.Response{
+ Data: map[string]interface{}{
+ "realm": config.Realm,
+ "kdc": config.KDC,
+ "admin_server": config.AdminServer,
+ "kpasswd_server": config.KPasswdServer,
+ "username": config.Username,
+ },
+ }, nil
+}
+
+// pathConfigWrite updates the configuration for the backend
+func (b *krbBackend) pathConfigWrite(ctx context.Context, req *logical.Request, data *framework.FieldData) (*logical.Response, error) {
+ c, err := getConfig(ctx, req.Storage)
+ if err != nil {
+ return nil, err
+ }
+
+ createOperation := (req.Operation == logical.CreateOperation)
+
+ if c == nil {
+ if !createOperation {
+ return nil, errors.New("config not found during update operation")
+ }
+ c = new(config.Config)
+ }
+
+ if realm, ok := data.GetOk("realm"); ok {
+ c.Realm = realm.(string)
+ } else if !ok && createOperation {
+ return nil, fmt.Errorf("missing realm in configuration")
+ }
+
+ // TODO: Also validate these aren't empty
+ if kdc, ok := data.GetOk("kdc"); ok {
+ c.KDC = kdc.([]string)
+ } else if !ok && createOperation {
+ return nil, fmt.Errorf("missing KDCs in configuration")
+ }
+ if len(c.KDC) == 0 {
+ return nil, fmt.Errorf("no KDCs specified")
+ }
+
+ if admin_server, ok := data.GetOk("admin_server"); ok {
+ c.AdminServer = admin_server.([]string)
+ } else if !ok && createOperation {
+ return nil, fmt.Errorf("missing admin servers in configuration")
+ }
+ if len(c.AdminServer) == 0 {
+ return nil, fmt.Errorf("no admin servers specified")
+ }
+
+ if kpasswd_server, ok := data.GetOk("kpasswd_server"); ok {
+ c.KPasswdServer = kpasswd_server.([]string)
+ } else if !ok && createOperation {
+ return nil, fmt.Errorf("missing kpasswd servers in configuration")
+ }
+ if len(c.KPasswdServer) == 0 {
+ return nil, fmt.Errorf("no kpasswd servers specified")
+ }
+
+ if username, ok := data.GetOk("username"); ok {
+ c.Username = username.(string)
+ } else if !ok && createOperation {
+ return nil, fmt.Errorf("missing username in configuration")
+ }
+
+ if password, ok := data.GetOk("password"); ok {
+ c.Password = password.(string)
+ } else if !ok && createOperation {
+ return nil, fmt.Errorf("missing password in configuration")
+ }
+
+ entry, err := logical.StorageEntryJSON(configStoragePath, c)
+ if err != nil {
+ return nil, err
+ }
+
+ if err := req.Storage.Put(ctx, entry); err != nil {
+ return nil, err
+ }
+
+ b.reset()
+
+ return nil, nil
+}
+
+// pathConfigDelete removes the configuration for the backend
+func (b *krbBackend) pathConfigDelete(ctx context.Context, req *logical.Request, data *framework.FieldData) (*logical.Response, error) {
+ err := req.Storage.Delete(ctx, configStoragePath)
+
+ if err == nil {
+ b.reset()
+ }
+
+ return nil, err
+}
+
+func getConfig(ctx context.Context, s logical.Storage) (*config.Config, error) {
+ entry, err := s.Get(ctx, configStoragePath)
+ if err != nil {
+ return nil, err
+ }
+
+ if entry == nil {
+ return nil, nil
+ }
+
+ c := new(config.Config)
+ if err := entry.DecodeJSON(&c); err != nil {
+ return nil, fmt.Errorf("error reading root configuration: %w", err)
+ }
+
+ // return the config, we are done
+ return c, nil
+}
+
+// pathConfigHelpSynopsis summarizes the help text for the configuration
+const pathConfigHelpSynopsis = `Configure the Kerberos backend.`
+
+// pathConfigHelpDescription describes the help text for the configuration
+const pathConfigHelpDescription = `
+The Kerberos secret backend requires credentials and
+connection details for the Kerberos servers.
+
+The user provided must be able to create & modify principals
+in order for this backend to work correctly.
+`
diff --git a/path_config_test.go b/path_config_test.go
new file mode 100644
index 0000000..d465910
--- /dev/null
+++ b/path_config_test.go
@@ -0,0 +1,345 @@
+package secretsengine
+
+import (
+ "context"
+ // "fmt"
+ "reflect"
+ "testing"
+
+ "github.com/hashicorp/vault/sdk/framework"
+ "github.com/hashicorp/vault/sdk/logical"
+)
+
+var testConfigData map[string]interface{} = map[string]interface{}{
+ "realm": "ACME.INC",
+ "kdc": "localhost:88",
+ "admin_server": "localhost:749",
+ "kpasswd_server": "localhost:749",
+ "username": "admin",
+ "password": "hunter21",
+}
+
+func TestConfig_Create(t *testing.T) {
+ type testCase struct {
+ createData *framework.FieldData
+ createExpectErr bool
+
+ expectedReadResp map[string]interface{}
+ }
+
+ tests := map[string]testCase{
+ "happy path": {
+ createData: fieldData(map[string]interface{}{
+ "realm": "ACME.INC",
+ "kdc": "localhost:88",
+ "admin_server": "localhost:749",
+ "kpasswd_server": "localhost:749",
+ "username": "admin",
+ "password": "hunter21",
+ }),
+ createExpectErr: false,
+ expectedReadResp: map[string]interface{}{
+ "realm": "ACME.INC",
+ "kdc": []string{"localhost:88"},
+ "admin_server": []string{"localhost:749"},
+ "kpasswd_server": []string{"localhost:749"},
+ "username": "admin",
+ },
+ },
+ "happy path with multiple servers": {
+ createData: fieldData(map[string]interface{}{
+ "realm": "ACME.INC",
+ "kdc": []string{"localhost:88", "other.host:88"},
+ "admin_server": []string{"localhost:749", "other.host:749"},
+ "kpasswd_server": []string{"localhost:749", "other.host:749"},
+ "username": "admin",
+ "password": "hunter21",
+ }),
+ createExpectErr: false,
+ expectedReadResp: map[string]interface{}{
+ "realm": "ACME.INC",
+ "kdc": []string{"localhost:88", "other.host:88"},
+ "admin_server": []string{"localhost:749", "other.host:749"},
+ "kpasswd_server": []string{"localhost:749", "other.host:749"},
+ "username": "admin",
+ },
+ },
+ "happy path with multiple servers, comma seperated": {
+ createData: fieldData(map[string]interface{}{
+ "realm": "ACME.INC",
+ "kdc": "localhost:88,other.host:88",
+ "admin_server": "localhost:749,other.host:749",
+ "kpasswd_server": "localhost:749,other.host:749",
+ "username": "admin",
+ "password": "hunter21",
+ }),
+ createExpectErr: false,
+ expectedReadResp: map[string]interface{}{
+ "realm": "ACME.INC",
+ "kdc": []string{"localhost:88", "other.host:88"},
+ "admin_server": []string{"localhost:749", "other.host:749"},
+ "kpasswd_server": []string{"localhost:749", "other.host:749"},
+ "username": "admin",
+ },
+ },
+ "missing realm": {
+ createData: fieldData(map[string]interface{}{
+ "kdc": "localhost:88",
+ "admin_server": "localhost:749",
+ "kpasswd_server": "localhost:749",
+ "username": "admin",
+ "password": "hunter21",
+ }),
+ createExpectErr: true,
+ },
+ "missing username": {
+ createData: fieldData(map[string]interface{}{
+ "realm": "ACME.INC",
+ "kdc": "localhost:88",
+ "admin_server": "localhost:749",
+ "kpasswd_server": "localhost:749",
+ "password": "hunter21",
+ }),
+ createExpectErr: true,
+ },
+ "missing password": {
+ createData: fieldData(map[string]interface{}{
+ "realm": "ACME.INC",
+ "kdc": "localhost:88",
+ "admin_server": "localhost:749",
+ "kpasswd_server": "localhost:749",
+ "username": "admin",
+ }),
+ createExpectErr: true,
+ },
+ "missing kdc": {
+ createData: fieldData(map[string]interface{}{
+ "realm": "ACME.INC",
+ "admin_server": "localhost:749",
+ "kpasswd_server": "localhost:749",
+ "username": "admin",
+ "password": "hunter21",
+ }),
+ createExpectErr: true,
+ },
+ "empty kdc": {
+ createData: fieldData(map[string]interface{}{
+ "realm": "ACME.INC",
+ "kdc": "",
+ "admin_server": "localhost:749",
+ "kpasswd_server": "localhost:749",
+ "username": "admin",
+ "password": "hunter21",
+ }),
+ createExpectErr: true,
+ },
+ "empty kdc list": {
+ createData: fieldData(map[string]interface{}{
+ "realm": "ACME.INC",
+ "kdc": []string{},
+ "admin_server": "localhost:749",
+ "kpasswd_server": "localhost:749",
+ "username": "admin",
+ "password": "hunter21",
+ }),
+ createExpectErr: true,
+ },
+ "missing admin server": {
+ createData: fieldData(map[string]interface{}{
+ "realm": "ACME.INC",
+ "kdc": "localhost:88",
+ "kpasswd_server": "localhost:749",
+ "username": "admin",
+ "password": "hunter21",
+ }),
+ createExpectErr: true,
+ },
+ "empty admin server": {
+ createData: fieldData(map[string]interface{}{
+ "realm": "ACME.INC",
+ "kdc": "localhost:88",
+ "admin_server": "",
+ "kpasswd_server": "localhost:749",
+ "username": "admin",
+ "password": "hunter21",
+ }),
+ createExpectErr: true,
+ },
+ "empty admin server list": {
+ createData: fieldData(map[string]interface{}{
+ "realm": "ACME.INC",
+ "kdc": "localhost:88",
+ "admin_server": []string{},
+ "kpasswd_server": "localhost:749",
+ "username": "admin",
+ "password": "hunter21",
+ }),
+ createExpectErr: true,
+ },
+ "missing kpasswd server": {
+ createData: fieldData(map[string]interface{}{
+ "realm": "ACME.INC",
+ "kdc": "localhost:88",
+ "admin_server": "localhost:749",
+ "username": "admin",
+ "password": "hunter21",
+ }),
+ createExpectErr: true,
+ },
+ "empty kpasswd server": {
+ createData: fieldData(map[string]interface{}{
+ "realm": "ACME.INC",
+ "kdc": "localhost:88",
+ "admin_server": "localhost:749",
+ "kpasswd_server": "",
+ "username": "admin",
+ "password": "hunter21",
+ }),
+ createExpectErr: true,
+ },
+ "empty kpasswd server list": {
+ createData: fieldData(map[string]interface{}{
+ "realm": "ACME.INC",
+ "kdc": "localhost:88",
+ "admin_server": "localhost:749",
+ "kpasswd_server": []string{},
+ "username": "admin",
+ "password": "hunter21",
+ }),
+ createExpectErr: true,
+ },
+ }
+
+ for name, test := range tests {
+ t.Run(name, func(t *testing.T) {
+ b, storage := getBackend()
+ defer b.Cleanup(context.Background())
+
+ req := &logical.Request{
+ Storage: storage,
+ Operation: logical.CreateOperation,
+ }
+
+ resp, err := b.pathConfigWrite(context.Background(), req, test.createData)
+ if test.createExpectErr && err == nil {
+ t.Fatalf("err expected, got nil")
+ }
+ if !test.createExpectErr && err != nil {
+ t.Fatalf("no error expected, got: %s", err)
+ }
+ if resp != nil {
+ t.Fatalf("no response expected, got: %#v", resp)
+ }
+
+ if test.createExpectErr {
+ return
+ }
+
+ readReq := &logical.Request{
+ Storage: storage,
+ }
+
+ resp, err = b.pathConfigRead(context.Background(), readReq, nil)
+ if err != nil || (resp != nil && resp.IsError()) {
+ t.Fatalf("err:%s resp:%#v\n", err, resp)
+ }
+
+ if !reflect.DeepEqual(resp.Data, test.expectedReadResp) {
+ t.Fatalf("Actual: %#v\nExpected: %#v", resp.Data, test.expectedReadResp)
+ }
+ })
+ }
+}
+
+func TestConfig_Update(t *testing.T) {
+ t.Run("happy path", func(t *testing.T) {
+ b, storage := getBackend()
+ defer b.Cleanup(context.Background())
+
+ req := &logical.Request{
+ Operation: logical.CreateOperation,
+ Path: configStoragePath,
+ Storage: storage,
+ Data: testConfigData,
+ }
+
+ resp, err := b.HandleRequest(context.Background(), req)
+ if err != nil || (resp != nil && resp.IsError()) {
+ t.Fatalf("err:%s resp:%#v\n", err, resp)
+ }
+
+ data := map[string]interface{}{
+ "realm": "NEW.ACME.INC",
+ "kdc": "other.host:88",
+ "admin_server": "other.host:749",
+ "kpasswd_server": "other.host:749",
+ "username": "admin2",
+ "password": "hunter22",
+ }
+
+ req = &logical.Request{
+ Operation: logical.UpdateOperation,
+ Path: configStoragePath,
+ Storage: storage,
+ Data: data,
+ }
+
+ resp, err = b.HandleRequest(context.Background(), req)
+ if err != nil || (resp != nil && resp.IsError()) {
+ t.Fatalf("err:%s resp:%#v\n", err, resp)
+ }
+
+ req = &logical.Request{
+ Operation: logical.ReadOperation,
+ Path: configStoragePath,
+ Storage: storage,
+ Data: nil,
+ }
+
+ resp, err = b.HandleRequest(context.Background(), req)
+ if err != nil || (resp != nil && resp.IsError()) {
+ t.Fatalf("err:%s resp:%#v\n", err, resp)
+ }
+
+ if resp.Data["realm"] != "NEW.ACME.INC" {
+ t.Fatalf("expected realm to be %s, got %s", "NEW.ACME.INC", resp.Data["realm"])
+ }
+ })
+}
+
+func TestConfig_Delete(t *testing.T) {
+ t.Run("happy path", func(t *testing.T) {
+ b, storage := getBackend()
+ defer b.Cleanup(context.Background())
+
+ req := &logical.Request{
+ Operation: logical.CreateOperation,
+ Path: configStoragePath,
+ Storage: storage,
+ Data: testConfigData,
+ }
+
+ resp, err := b.HandleRequest(context.Background(), req)
+ if err != nil || (resp != nil && resp.IsError()) {
+ t.Fatalf("err:%s resp:%#v\n", err, resp)
+ }
+
+ req = &logical.Request{
+ Operation: logical.DeleteOperation,
+ Path: configStoragePath,
+ Storage: storage,
+ Data: nil,
+ }
+
+ resp, err = b.HandleRequest(context.Background(), req)
+ if err != nil || (resp != nil && resp.IsError()) {
+ t.Fatalf("err:%s resp:%#v\n", err, resp)
+ }
+ })
+}
+func fieldData(raw map[string]interface{}) *framework.FieldData {
+ return &framework.FieldData{
+ Raw: raw,
+ Schema: configSchema(),
+ }
+}
diff --git a/path_rotate.go b/path_rotate.go
new file mode 100644
index 0000000..d06c7ac
--- /dev/null
+++ b/path_rotate.go
@@ -0,0 +1,172 @@
+package secretsengine
+
+import (
+ "context"
+ "errors"
+ "fmt"
+ "time"
+
+ "git.tardisproject.uk/tcmal/vault-plugin-kerberos-secrets/config"
+ "git.tardisproject.uk/tcmal/vault-plugin-kerberos-secrets/password"
+ "github.com/hashicorp/vault/sdk/framework"
+ "github.com/hashicorp/vault/sdk/logical"
+)
+
+const (
+ rotateRootPath = "rotate-root"
+ rotateRolePath = "rotate-static-role/"
+)
+
+func pathRotateCredentials(b *krbBackend) []*framework.Path {
+ return []*framework.Path{
+ {
+ Pattern: rotateRootPath,
+ Fields: map[string]*framework.FieldSchema{},
+ Operations: map[logical.Operation]framework.OperationHandler{
+ logical.UpdateOperation: &framework.PathOperation{
+ Callback: b.pathRotateRootCredentialsUpdate,
+ ForwardPerformanceStandby: true,
+ ForwardPerformanceSecondary: true,
+ },
+ },
+ HelpSynopsis: "Request to rotate the root credentials Vault uses for the kerberos administrator account.",
+ HelpDescription: "This path attempts to rotate the root credentials of the administrator account " +
+ "used by Vault to manage credentials.",
+ },
+ {
+ Pattern: rotateRolePath + framework.GenericNameRegex("name"),
+ Fields: map[string]*framework.FieldSchema{
+ "name": {
+ Type: framework.TypeString,
+ Description: "Name of the static role",
+ },
+ },
+ Operations: map[logical.Operation]framework.OperationHandler{
+ logical.UpdateOperation: &framework.PathOperation{
+ Callback: b.pathRotateRoleCredentialsUpdate,
+ ForwardPerformanceStandby: true,
+ ForwardPerformanceSecondary: true,
+ },
+ },
+ HelpSynopsis: "Request to rotate the credentials for a static user account.",
+ HelpDescription: "This path attempts to rotate the credentials for the given static role.",
+ },
+ }
+}
+
+func (b *krbBackend) pathRotateRootCredentialsUpdate(ctx context.Context, req *logical.Request, data *framework.FieldData) (*logical.Response, error) {
+ if _, hasTimeout := ctx.Deadline(); !hasTimeout {
+ var cancel func()
+ ctx, cancel = context.WithTimeout(ctx, defaultCtxTimeout)
+ defer cancel()
+ }
+
+ config, err := getConfig(ctx, req.Storage)
+ if err != nil {
+ return nil, err
+ }
+ if config == nil {
+ return nil, errors.New("the config is currently unset")
+ }
+
+ client, err := b.getClient(ctx, req.Storage)
+ if err != nil {
+ return nil, err
+ }
+
+ newPassword := password.Generate()
+
+ // Update the password remotely.
+ if err := (*client).SetPassword(config.Username, newPassword); err != nil {
+ return nil, err
+ }
+
+ // Update the password locally.
+ config.Password = newPassword
+ if pwdStoringErr := storePassword(ctx, req.Storage, config); pwdStoringErr != nil {
+ return nil, fmt.Errorf("unable to update password due to storage err: %s", pwdStoringErr)
+ // TODO: deal with this more gracefully
+ }
+
+ b.reset()
+
+ // Respond with a 204.
+ return nil, nil
+}
+
+func (b *krbBackend) pathRotateRoleCredentialsUpdate(ctx context.Context, req *logical.Request, data *framework.FieldData) (*logical.Response, error) {
+ name := data.Get("name").(string)
+ if name == "" {
+ return logical.ErrorResponse("empty role name attribute given"), nil
+ }
+
+ ictx, _ := context.WithTimeout(context.Background(), time.Minute*60)
+ go b.doRotation(ictx, name, req.Storage)
+ return nil, nil
+}
+
+func (b *krbBackend) doRotation(ctx context.Context, name string, storage logical.Storage) {
+ log := b.Logger().With("role", name)
+ log.Debug("starting to rotate role")
+
+ for {
+ err, retry := b.attemptRotation(ctx, name, storage) // TODO
+ if err == nil {
+ log.Debug("credentials rotated")
+ return
+ }
+
+ log.Error("error rotating credentials", "error", err)
+ if !retry {
+ log.Error("unrecoverable error rotating credentials")
+ }
+
+ timer := time.NewTimer(30 * time.Second)
+ select {
+ case <-timer.C:
+ continue
+ case <-ctx.Done():
+ log.Error("timeout rotating credentials")
+ return
+ }
+ }
+}
+
+func (b *krbBackend) attemptRotation(ctx context.Context, name string, storage logical.Storage) (error, bool) {
+ role, err := b.getRole(ctx, storage, name)
+ if err != nil {
+ return fmt.Errorf("error fetching role from storage: %e", err), true
+ }
+ if role == nil {
+ return fmt.Errorf("role does not exist: %s", name), false
+ }
+
+ c, err := b.getClient(ctx, storage)
+ if err != nil {
+ return fmt.Errorf("error getting client: %e", err), true
+ }
+
+ newPassword := password.Generate()
+ err = (*c).SetPassword(role.Principal, newPassword)
+ if err != nil {
+ return fmt.Errorf("error setting password: %e", err), true
+ }
+
+ role.Password = newPassword
+ role.LastVaultRotation = time.Now()
+ err = setRole(ctx, storage, name, role)
+ if err != nil {
+ return fmt.Errorf("rotated password but could not save back to storage"), true
+ // TODO: deal with this more gracefully
+ }
+
+ return nil, false
+}
+
+func storePassword(ctx context.Context, s logical.Storage, cfg *config.Config) error {
+ entry, err := logical.StorageEntryJSON(configStoragePath, cfg)
+ if err != nil {
+ return err
+ }
+ return s.Put(ctx, entry)
+}
diff --git a/path_static_creds.go b/path_static_creds.go
new file mode 100644
index 0000000..bdbe54b
--- /dev/null
+++ b/path_static_creds.go
@@ -0,0 +1,61 @@
+package secretsengine
+
+import (
+ "context"
+
+ "github.com/hashicorp/vault/sdk/framework"
+ "github.com/hashicorp/vault/sdk/logical"
+)
+
+const staticCredPath = "static-cred/"
+
+func pathStaticCreds(b *krbBackend) []*framework.Path {
+ return []*framework.Path{
+ {
+ Pattern: staticCredPath + framework.GenericNameRegex("name"),
+ Fields: map[string]*framework.FieldSchema{
+ "name": {
+ Type: framework.TypeLowerCaseString,
+ Description: "Name of the static role.",
+ },
+ },
+ Operations: map[logical.Operation]framework.OperationHandler{
+ logical.ReadOperation: &framework.PathOperation{
+ Callback: b.pathStaticCredsRead,
+ },
+ },
+ HelpSynopsis: pathStaticCredsReadHelpSyn,
+ HelpDescription: pathStaticCredsReadHelpDesc,
+ },
+ }
+}
+
+func (b *krbBackend) pathStaticCredsRead(ctx context.Context, req *logical.Request, data *framework.FieldData) (*logical.Response, error) {
+ name := data.Get("name").(string)
+
+ role, err := b.getRole(ctx, req.Storage, name)
+ if err != nil {
+ return nil, err
+ }
+ if role == nil {
+ return logical.ErrorResponse("unknown role: %s", name), nil
+ }
+
+ return &logical.Response{
+ Data: map[string]interface{}{
+ "principal": role.Principal,
+ "password": role.Password,
+ "last_vault_rotation": role.LastVaultRotation,
+ },
+ }, nil
+}
+
+const pathStaticCredsReadHelpSyn = `
+Request credentials for a certain static role. These credentials are
+rotated periodically.`
+
+const pathStaticCredsReadHelpDesc = `
+This path reads credentials for a certain static role.
+The credentials are rotated periodically according to their configuration, and will
+return the same password until they are rotated.
+`
diff --git a/path_static_roles.go b/path_static_roles.go
new file mode 100644
index 0000000..a9b3ee9
--- /dev/null
+++ b/path_static_roles.go
@@ -0,0 +1,202 @@
+package secretsengine
+
+import (
+ "context"
+ "fmt"
+ "time"
+
+ "github.com/hashicorp/vault/sdk/framework"
+ "github.com/hashicorp/vault/sdk/logical"
+)
+
+const staticRolePath = "static-role"
+
+// staticRoleEntry defines the data required
+// for a static role, using a set principal
+type staticRoleEntry struct {
+ Principal string `json:"principal"`
+ Password string `json:"password"`
+ LastVaultRotation time.Time `json:"last_vault_rotation"`
+}
+
+// toResponseData returns response data for a role
+func (r *staticRoleEntry) toResponseData() map[string]interface{} {
+ respData := map[string]interface{}{
+ "principal": r.Principal,
+ "last_vault_rotation": r.LastVaultRotation,
+ }
+ return respData
+}
+
+// pathStaticRole extends the Vault API with a `/static-role`
+// endpoint for the backend.
+func pathStaticRole(b *krbBackend) []*framework.Path {
+ return []*framework.Path{
+ {
+ Pattern: staticRolePath + "/" + framework.GenericNameRegex("name"),
+ Fields: map[string]*framework.FieldSchema{
+ "name": {
+ Type: framework.TypeLowerCaseString,
+ Description: "Name of the role",
+ Required: true,
+ },
+ "principal": {
+ Type: framework.TypeString,
+ Description: "The principal credentials should be generated for.",
+ Required: true,
+ },
+ "last_vault_rotation": {
+ Type: framework.TypeDurationSecond,
+ Description: "Last time the credentials were rotated.",
+ },
+ },
+ Operations: map[logical.Operation]framework.OperationHandler{
+ logical.ReadOperation: &framework.PathOperation{
+ Callback: b.pathRolesRead,
+ },
+ logical.CreateOperation: &framework.PathOperation{
+ Callback: b.pathRolesWrite,
+ },
+ logical.UpdateOperation: &framework.PathOperation{
+ Callback: b.pathRolesWrite,
+ },
+ logical.DeleteOperation: &framework.PathOperation{
+ Callback: b.pathRolesDelete,
+ },
+ },
+ HelpSynopsis: pathRoleHelpSynopsis,
+ HelpDescription: pathRoleHelpDescription,
+ },
+ {
+ Pattern: staticRolePath + "/?$",
+ Operations: map[logical.Operation]framework.OperationHandler{
+ logical.ListOperation: &framework.PathOperation{
+ Callback: b.pathRolesList,
+ },
+ },
+ HelpSynopsis: pathRoleListHelpSynopsis,
+ HelpDescription: pathRoleListHelpDescription,
+ },
+ }
+}
+
+// pathRolesList makes a request to Vault storage to retrieve a list of roles for the backend
+func (b *krbBackend) pathRolesList(ctx context.Context, req *logical.Request, d *framework.FieldData) (*logical.Response, error) {
+ entries, err := req.Storage.List(ctx, staticRolePath)
+ if err != nil {
+ return nil, err
+ }
+
+ return logical.ListResponse(entries), nil
+}
+
+// pathRolesRead makes a request to Vault storage to read a role and return response data
+func (b *krbBackend) pathRolesRead(ctx context.Context, req *logical.Request, d *framework.FieldData) (*logical.Response, error) {
+ entry, err := b.getRole(ctx, req.Storage, d.Get("name").(string))
+ if err != nil {
+ return nil, err
+ }
+
+ if entry == nil {
+ return nil, nil
+ }
+
+ return &logical.Response{
+ Data: entry.toResponseData(),
+ }, nil
+}
+
+// pathRolesWrite makes a request to Vault storage to update a role based on the attributes passed to the role configuration
+func (b *krbBackend) pathRolesWrite(ctx context.Context, req *logical.Request, d *framework.FieldData) (*logical.Response, error) {
+ name, ok := d.GetOk("name")
+ if !ok {
+ return logical.ErrorResponse("missing role name"), nil
+ }
+
+ roleEntry, err := b.getRole(ctx, req.Storage, name.(string))
+ if err != nil {
+ return nil, err
+ }
+
+ if roleEntry == nil {
+ roleEntry = &staticRoleEntry{}
+ }
+
+ createOperation := (req.Operation == logical.CreateOperation)
+
+ if principal, ok := d.GetOk("principal"); ok {
+ roleEntry.Principal = principal.(string)
+ } else if !ok && createOperation {
+ return nil, fmt.Errorf("missing principal in role")
+ }
+
+ roleEntry.LastVaultRotation = time.Unix(0, 0)
+
+ if err := setRole(ctx, req.Storage, name.(string), roleEntry); err != nil {
+ return nil, err
+ }
+
+ return nil, nil
+}
+
+// pathRolesDelete makes a request to Vault storage to delete a role
+func (b *krbBackend) pathRolesDelete(ctx context.Context, req *logical.Request, d *framework.FieldData) (*logical.Response, error) {
+ err := req.Storage.Delete(ctx, staticRolePath+"/"+d.Get("name").(string))
+ if err != nil {
+ return nil, fmt.Errorf("error deleting krb role: %w", err)
+ }
+
+ return nil, nil
+}
+
+// setRole adds the role to the Vault storage API
+func setRole(ctx context.Context, s logical.Storage, name string, roleEntry *staticRoleEntry) error {
+ entry, err := logical.StorageEntryJSON(staticRolePath+"/"+name, roleEntry)
+ if err != nil {
+ return err
+ }
+
+ if entry == nil {
+ return fmt.Errorf("failed to create storage entry for role")
+ }
+
+ if err := s.Put(ctx, entry); err != nil {
+ return err
+ }
+
+ return nil
+}
+
+// getRole gets the role from the Vault storage API
+func (b *krbBackend) getRole(ctx context.Context, s logical.Storage, name string) (*staticRoleEntry, error) {
+ if name == "" {
+ return nil, fmt.Errorf("missing role name")
+ }
+
+ entry, err := s.Get(ctx, staticRolePath+"/"+name)
+ if err != nil {
+ return nil, err
+ }
+
+ if entry == nil {
+ return nil, nil
+ }
+
+ var role staticRoleEntry
+
+ if err := entry.DecodeJSON(&role); err != nil {
+ return nil, err
+ }
+ return &role, nil
+}
+
+const (
+ pathRoleHelpSynopsis = `Manages the Vault roles for credentials for individual Kerberos principals.`
+ pathRoleHelpDescription = `
+This path allows you to read and write roles used to generate credentials for individual Kerberos principals.
+You can configure a role to manage a principal's password by setting the principal field.
+`
+
+ pathRoleListHelpSynopsis = `List the existing roles in HashiCups backend`
+ pathRoleListHelpDescription = `Roles will be listed by the role name.`
+)