=========================================================== .___ __ __ _________________ __ __ __| _/|__|/ |_ / ___\_` __ \__ \ | | \/ __ | | \\_ __\ / /_/ > | \// __ \| | / /_/ | | || | \___ /|__| (____ /____/\____ | |__||__| /_____/ \/ \/ grep rough audit - static analysis tool v2.8 written by @Wireghoul =================================[justanotherhacker.com]=== vault-1.0.2+dfsg2/Makefile-39-# *-mem variants will enable memory profiling which will write snapshots of heap usage vault-1.0.2+dfsg2/Makefile:40:# to $TMP/vaultprof every 5 minutes. These can be analyzed using `$ go tool pprof <profile_file>`. vault-1.0.2+dfsg2/Makefile:41:# Note that any build can have profiling added via: `$ BUILD_TAGS=memprofiler make ...` vault-1.0.2+dfsg2/Makefile-42-dev-mem: BUILD_TAGS+=memprofiler ############################################## vault-1.0.2+dfsg2/README.md-66-[GOPATH](https://golang.org/doc/code.html#GOPATH). Next, clone this repository vault-1.0.2+dfsg2/README.md:67:into `$GOPATH/src/github.com/hashicorp/vault`. You can then download any vault-1.0.2+dfsg2/README.md-68-required build tools by bootstrapping your environment: ############################################## vault-1.0.2+dfsg2/README.md-75-To compile a development version of Vault, run `make` or `make dev`. This will vault-1.0.2+dfsg2/README.md:76:put the Vault binary in the `bin` and `$GOPATH/bin` folders: vault-1.0.2+dfsg2/README.md-77- ############################################## vault-1.0.2+dfsg2/api/api_integration_test.go-119- client, err := api.NewClient(&api.Config{ vault-1.0.2+dfsg2/api/api_integration_test.go:120: Address: "http://" + listener.Addr().String(), vault-1.0.2+dfsg2/api/api_integration_test.go-121- }) ############################################## vault-1.0.2+dfsg2/api/api_test.go-22- config := DefaultConfig() vault-1.0.2+dfsg2/api/api_test.go:23: config.Address = fmt.Sprintf("http://%s", ln.Addr()) vault-1.0.2+dfsg2/api/api_test.go-24- ############################################## vault-1.0.2+dfsg2/api/ssh_agent_test.go-69- vault-1.0.2+dfsg2/api/ssh_agent_test.go:70:func TestParseSSHHelperConfig_missingVaultAddr(t *testing.T) { vault-1.0.2+dfsg2/api/ssh_agent_test.go-71- _, err := ParseSSHHelperConfig("") ############################################## vault-1.0.2+dfsg2/audit/format.go-151- PolicyOverride: req.PolicyOverride, vault-1.0.2+dfsg2/audit/format.go:152: RemoteAddr: getRemoteAddr(req), vault-1.0.2+dfsg2/audit/format.go-153- ReplicationCluster: req.ReplicationCluster, ############################################## vault-1.0.2+dfsg2/audit/format.go-364- PolicyOverride: req.PolicyOverride, vault-1.0.2+dfsg2/audit/format.go:365: RemoteAddr: getRemoteAddr(req), vault-1.0.2+dfsg2/audit/format.go-366- ReplicationCluster: req.ReplicationCluster, ############################################## vault-1.0.2+dfsg2/audit/format.go-465-// getRemoteAddr safely gets the remote address avoiding a nil pointer vault-1.0.2+dfsg2/audit/format.go:466:func getRemoteAddr(req *logical.Request) string { vault-1.0.2+dfsg2/audit/format.go-467- if req != nil && req.Connection != nil { ############################################## vault-1.0.2+dfsg2/builtin/credential/cert/backend_test.go-123- go func() { vault-1.0.2+dfsg2/builtin/credential/cert/backend_test.go:124: addr := list.Addr().String() vault-1.0.2+dfsg2/builtin/credential/cert/backend_test.go-125- conn, err := tls.Dial("tcp", addr, dialConf) ############################################## vault-1.0.2+dfsg2/builtin/credential/cert/backend_test.go-1613- go func() { vault-1.0.2+dfsg2/builtin/credential/cert/backend_test.go:1614: addr := list.Addr().String() vault-1.0.2+dfsg2/builtin/credential/cert/backend_test.go-1615- conn, err := tls.Dial("tcp", addr, dialConf) ############################################## vault-1.0.2+dfsg2/builtin/logical/postgresql/secret_creds.go-138- var exists bool vault-1.0.2+dfsg2/builtin/logical/postgresql/secret_creds.go:139: err = db.QueryRow("SELECT exists (SELECT rolname FROM pg_roles WHERE rolname=$1);", username).Scan(&exists) vault-1.0.2+dfsg2/builtin/logical/postgresql/secret_creds.go-140- if err != nil && err != sql.ErrNoRows { ############################################## vault-1.0.2+dfsg2/builtin/logical/postgresql/secret_creds.go-151- // we want to remove as much access as possible vault-1.0.2+dfsg2/builtin/logical/postgresql/secret_creds.go:152: stmt, err := db.Prepare("SELECT DISTINCT table_schema FROM information_schema.role_column_grants WHERE grantee=$1;") vault-1.0.2+dfsg2/builtin/logical/postgresql/secret_creds.go-153- if err != nil { ############################################## vault-1.0.2+dfsg2/command/command_test.go-208- client, err := api.NewClient(&api.Config{ vault-1.0.2+dfsg2/command/command_test.go:209: Address: "http://" + listener.Addr().String(), vault-1.0.2+dfsg2/command/command_test.go-210- }) ############################################## vault-1.0.2+dfsg2/command/config.go-16-// Config is the CLI configuration for Vault that can be specified via vault-1.0.2+dfsg2/command/config.go:17:// a `$HOME/.vault` file which is HCL-formatted (therefore HCL or JSON). vault-1.0.2+dfsg2/command/config.go-18-type DefaultConfig struct { ############################################## vault-1.0.2+dfsg2/command/config/config.go-24-// Config is the CLI configuration for Vault that can be specified via vault-1.0.2+dfsg2/command/config/config.go:25:// a `$HOME/.vault` file which is HCL-formatted (therefore HCL or JSON). vault-1.0.2+dfsg2/command/config/config.go-26-type DefaultConfig struct { ############################################## vault-1.0.2+dfsg2/command/server.go-808- addr = addrRaw.(string) vault-1.0.2+dfsg2/command/server.go:809: tcpAddr, err := net.ResolveTCPAddr("tcp", addr) vault-1.0.2+dfsg2/command/server.go-810- if err != nil { ############################################## vault-1.0.2+dfsg2/command/server.go-815- } else { vault-1.0.2+dfsg2/command/server.go:816: tcpAddr, ok := ln.Addr().(*net.TCPAddr) vault-1.0.2+dfsg2/command/server.go-817- if !ok { ############################################## vault-1.0.2+dfsg2/command/server.go-1599- // Get the hostname vault-1.0.2+dfsg2/command/server.go:1600: host, err := detect.DetectHostAddr() vault-1.0.2+dfsg2/command/server.go-1601- if err != nil { ############################################## vault-1.0.2+dfsg2/command/server/listener_tcp_test.go-26- connFn := func(lnReal net.Listener) (net.Conn, error) { vault-1.0.2+dfsg2/command/server/listener_tcp_test.go:27: return net.Dial("tcp", ln.Addr().String()) vault-1.0.2+dfsg2/command/server/listener_tcp_test.go-28- } ############################################## vault-1.0.2+dfsg2/command/server/listener_tcp_test.go-76- } vault-1.0.2+dfsg2/command/server/listener_tcp_test.go:77: conn, err := tls.Dial("tcp", ln.Addr().String(), conf) vault-1.0.2+dfsg2/command/server/listener_tcp_test.go-78- ############################################## vault-1.0.2+dfsg2/command/server_test.go-29- vault-1.0.2+dfsg2/command/server_test.go:30: addr, err := net.ResolveTCPAddr("tcp", "127.0.0.1:0") vault-1.0.2+dfsg2/command/server_test.go-31- if err != nil { ############################################## vault-1.0.2+dfsg2/command/server_test.go-40- vault-1.0.2+dfsg2/command/server_test.go:41: return l.Addr().(*net.TCPAddr).Port vault-1.0.2+dfsg2/command/server_test.go-42-} ############################################## vault-1.0.2+dfsg2/command/ssh.go-878- // Vault only deals with IP addresses. vault-1.0.2+dfsg2/command/ssh.go:879: ipAddr, err := net.ResolveIPAddr("ip", hostname) vault-1.0.2+dfsg2/command/ssh.go-880- if err != nil { ############################################## vault-1.0.2+dfsg2/helper/cidrutil/cidr.go-20- } vault-1.0.2+dfsg2/helper/cidrutil/cidr.go:21: remoteSockAddr, err := sockaddr.NewSockAddr(remoteAddr) vault-1.0.2+dfsg2/helper/cidrutil/cidr.go-22- if err != nil { ############################################## vault-1.0.2+dfsg2/helper/cidrutil/cidr_test.go-202-func TestCIDRUtil_RemoteAddrIsOk_NegativeTest(t *testing.T) { vault-1.0.2+dfsg2/helper/cidrutil/cidr_test.go:203: addr, err := sockaddr.NewSockAddr("127.0.0.1/8") vault-1.0.2+dfsg2/helper/cidrutil/cidr_test.go-204- if err != nil { ############################################## vault-1.0.2+dfsg2/helper/cidrutil/cidr_test.go-215-func TestCIDRUtil_RemoteAddrIsOk_PositiveTest(t *testing.T) { vault-1.0.2+dfsg2/helper/cidrutil/cidr_test.go:216: addr, err := sockaddr.NewSockAddr("127.0.0.1/8") vault-1.0.2+dfsg2/helper/cidrutil/cidr_test.go-217- if err != nil { ############################################## vault-1.0.2+dfsg2/helper/forwarding/types.pb.go-99- vault-1.0.2+dfsg2/helper/forwarding/types.pb.go:100:func (m *Request) GetRemoteAddr() string { vault-1.0.2+dfsg2/helper/forwarding/types.pb.go-101- if m != nil { ############################################## vault-1.0.2+dfsg2/helper/mfa/duo/duo.go-76- authapi.PreauthUsername(duoUser), vault-1.0.2+dfsg2/helper/mfa/duo/duo.go:77: authapi.PreauthIpAddr(request.ipAddr), vault-1.0.2+dfsg2/helper/mfa/duo/duo.go-78- ) ############################################## vault-1.0.2+dfsg2/helper/parseutil/parseutil.go-156- for _, addr := range stringAddrs { vault-1.0.2+dfsg2/helper/parseutil/parseutil.go:157: sa, err := sockaddr.NewSockAddr(addr) vault-1.0.2+dfsg2/helper/parseutil/parseutil.go-158- if err != nil { ############################################## vault-1.0.2+dfsg2/helper/proxyutil/proxyutil.go-56- vault-1.0.2+dfsg2/helper/proxyutil/proxyutil.go:57: sa, err := sockaddr.NewSockAddr(addr.String()) vault-1.0.2+dfsg2/helper/proxyutil/proxyutil.go-58- if err != nil { ############################################## vault-1.0.2+dfsg2/http/forwarded_for_test.go-13-func TestHandler_XForwardedFor(t *testing.T) { vault-1.0.2+dfsg2/http/forwarded_for_test.go:14: goodAddr, err := sockaddr.NewIPAddr("127.0.0.1") vault-1.0.2+dfsg2/http/forwarded_for_test.go-15- if err != nil { ############################################## vault-1.0.2+dfsg2/http/forwarded_for_test.go-18- vault-1.0.2+dfsg2/http/forwarded_for_test.go:19: badAddr, err := sockaddr.NewIPAddr("1.2.3.4") vault-1.0.2+dfsg2/http/forwarded_for_test.go-20- if err != nil { ############################################## vault-1.0.2+dfsg2/http/handler.go-223- vault-1.0.2+dfsg2/http/handler.go:224: addr, err := sockaddr.NewIPAddr(host) vault-1.0.2+dfsg2/http/handler.go-225- if err != nil { ############################################## vault-1.0.2+dfsg2/http/testing.go-23- } vault-1.0.2+dfsg2/http/testing.go:24: addr := "http://" + ln.Addr().String() vault-1.0.2+dfsg2/http/testing.go-25- return ln, addr ############################################## vault-1.0.2+dfsg2/http/testing.go-35- server := &http.Server{ vault-1.0.2+dfsg2/http/testing.go:36: Addr: ln.Addr().String(), vault-1.0.2+dfsg2/http/testing.go-37- Handler: mux, ############################################## vault-1.0.2+dfsg2/logical/framework/openapi.go-185-var cleanCharsRe = regexp.MustCompile("[()^$?]") // Set of regex characters that will be stripped during cleaning vault-1.0.2+dfsg2/logical/framework/openapi.go:186:var cleanSuffixRe = regexp.MustCompile(`/\?\$?$`) // Path suffix patterns that will be stripped during cleaning vault-1.0.2+dfsg2/logical/framework/openapi.go-187-var wsRe = regexp.MustCompile(`\s+`) // Match whitespace, to be compressed during cleaning ############################################## vault-1.0.2+dfsg2/logical/framework/openapi_test.go-60- t.Run("Alternation", func(t *testing.T) { vault-1.0.2+dfsg2/logical/framework/openapi_test.go:61: input := `(raw/?$|raw/(?P<path>.+))` vault-1.0.2+dfsg2/logical/framework/openapi_test.go-62- ############################################## vault-1.0.2+dfsg2/logical/framework/openapi_test.go-113- { vault-1.0.2+dfsg2/logical/framework/openapi_test.go:114: input: `ab?cde^fg(hi?j$k`, vault-1.0.2+dfsg2/logical/framework/openapi_test.go-115- regex: cleanCharsRe, ############################################## vault-1.0.2+dfsg2/logical/framework/openapi_test.go-173- }}, vault-1.0.2+dfsg2/logical/framework/openapi_test.go:174: {`(raw/?$|raw/(?P<path>.+))`, []string{ vault-1.0.2+dfsg2/logical/framework/openapi_test.go-175- "raw", ############################################## vault-1.0.2+dfsg2/logical/plugin/pb/backend.pb.go-2646- vault-1.0.2+dfsg2/logical/plugin/pb/backend.pb.go:2647:func (m *Connection) GetRemoteAddr() string { vault-1.0.2+dfsg2/logical/plugin/pb/backend.pb.go-2648- if m != nil { ############################################## vault-1.0.2+dfsg2/physical/cockroachdb/cockroachdb.go-85- " UPDATE SET (path, value) = ($1, $2)", vault-1.0.2+dfsg2/physical/cockroachdb/cockroachdb.go:86: "get": "SELECT value FROM " + dbTable + " WHERE path = $1", vault-1.0.2+dfsg2/physical/cockroachdb/cockroachdb.go:87: "delete": "DELETE FROM " + dbTable + " WHERE path = $1", vault-1.0.2+dfsg2/physical/cockroachdb/cockroachdb.go-88- "list": "SELECT path FROM " + dbTable + " WHERE path LIKE $1", ############################################## vault-1.0.2+dfsg2/physical/consul/consul.go-537-// DetectHostAddr is used to detect the host address by asking the Consul agent vault-1.0.2+dfsg2/physical/consul/consul.go:538:func (c *ConsulBackend) DetectHostAddr() (string, error) { vault-1.0.2+dfsg2/physical/consul/consul.go-539- agent := c.client.Agent() ############################################## vault-1.0.2+dfsg2/physical/consul/consul.go-629-func (c *ConsulBackend) RunServiceDiscovery(waitGroup *sync.WaitGroup, shutdownCh physical.ShutdownChannel, redirectAddr string, activeFunc physical.ActiveFunction, sealedFunc physical.SealedFunction, perfStandbyFunc physical.PerformanceStandbyFunction) (err error) { vault-1.0.2+dfsg2/physical/consul/consul.go:630: if err := c.setRedirectAddr(redirectAddr); err != nil { vault-1.0.2+dfsg2/physical/consul/consul.go-631- return err ############################################## vault-1.0.2+dfsg2/physical/consul/consul.go-875- vault-1.0.2+dfsg2/physical/consul/consul.go:876:func (c *ConsulBackend) setRedirectAddr(addr string) (err error) { vault-1.0.2+dfsg2/physical/consul/consul.go-877- if addr == "" { ############################################## vault-1.0.2+dfsg2/physical/consul/consul_test.go-342- vault-1.0.2+dfsg2/physical/consul/consul_test.go:343:func TestConsul_setRedirectAddr(t *testing.T) { vault-1.0.2+dfsg2/physical/consul/consul_test.go-344- tests := []struct { ############################################## vault-1.0.2+dfsg2/physical/consul/consul_test.go-384- c := testConsulBackend(t) vault-1.0.2+dfsg2/physical/consul/consul_test.go:385: err := c.setRedirectAddr(test.addr) vault-1.0.2+dfsg2/physical/consul/consul_test.go-386- if test.pass { ############################################## vault-1.0.2+dfsg2/physical/consul/consul_test.go-482- vault-1.0.2+dfsg2/physical/consul/consul_test.go:483: if err := c.setRedirectAddr(test.redirectAddr); err != nil { vault-1.0.2+dfsg2/physical/consul/consul_test.go-484- t.Fatalf("bad: %s %v", test.name, err) ############################################## vault-1.0.2+dfsg2/physical/consul/consul_test.go-583- } vault-1.0.2+dfsg2/physical/consul/consul_test.go:584: host, err := detect.DetectHostAddr() vault-1.0.2+dfsg2/physical/consul/consul_test.go-585- if err != nil { ############################################## vault-1.0.2+dfsg2/physical/foundationdb/fdb-go-install.sh-57- vault-1.0.2+dfsg2/physical/foundationdb/fdb-go-install.sh:58:filedir=$(cd `dirname "${BASH_SOURCE[0]}"` && pwd) vault-1.0.2+dfsg2/physical/foundationdb/fdb-go-install.sh-59-destdir="" ############################################## vault-1.0.2+dfsg2/physical/physical.go-71- // DetectHostAddr is used to detect the host address vault-1.0.2+dfsg2/physical/physical.go:72: DetectHostAddr() (string, error) vault-1.0.2+dfsg2/physical/physical.go-73-} ############################################## vault-1.0.2+dfsg2/physical/postgresql/postgresql.go-95- put_query: put_query, vault-1.0.2+dfsg2/physical/postgresql/postgresql.go:96: get_query: "SELECT value FROM " + quoted_table + " WHERE path = $1 AND key = $2", vault-1.0.2+dfsg2/physical/postgresql/postgresql.go:97: delete_query: "DELETE FROM " + quoted_table + " WHERE path = $1 AND key = $2", vault-1.0.2+dfsg2/physical/postgresql/postgresql.go:98: list_query: "SELECT key FROM " + quoted_table + " WHERE path = $1" + vault-1.0.2+dfsg2/physical/postgresql/postgresql.go-99- "UNION SELECT DISTINCT substring(substr(path, length($1)+1) from '^.*?/') FROM " + ############################################## vault-1.0.2+dfsg2/physical/zookeeper/zookeeper.go-227- if !ipSanCheck { vault-1.0.2+dfsg2/physical/zookeeper/zookeeper.go:228: lookupAddressMany, lookupErr := net.LookupAddr(serverName) vault-1.0.2+dfsg2/physical/zookeeper/zookeeper.go-229- if lookupErr == nil { ############################################## vault-1.0.2+dfsg2/plugins/database/postgresql/postgresql.go-265- var exists bool vault-1.0.2+dfsg2/plugins/database/postgresql/postgresql.go:266: err = db.QueryRowContext(ctx, "SELECT exists (SELECT rolname FROM pg_roles WHERE rolname=$1);", username).Scan(&exists) vault-1.0.2+dfsg2/plugins/database/postgresql/postgresql.go-267- if err != nil && err != sql.ErrNoRows { ############################################## vault-1.0.2+dfsg2/plugins/database/postgresql/postgresql.go-278- // we want to remove as much access as possible vault-1.0.2+dfsg2/plugins/database/postgresql/postgresql.go:279: stmt, err := db.PrepareContext(ctx, "SELECT DISTINCT table_schema FROM information_schema.role_column_grants WHERE grantee=$1;") vault-1.0.2+dfsg2/plugins/database/postgresql/postgresql.go-280- if err != nil { ############################################## vault-1.0.2+dfsg2/ui/app/adapters/auth-config/_base.js-9- if (type === 'identity-whitelist' || type === 'roletag-blacklist') { vault-1.0.2+dfsg2/ui/app/adapters/auth-config/_base.js:10: return `tidy/${type}`; vault-1.0.2+dfsg2/ui/app/adapters/auth-config/_base.js-11- } ############################################## vault-1.0.2+dfsg2/ui/app/adapters/auth-config/_base.js-16- const backendId = id ? id : snapshot.belongsTo('backend').id; vault-1.0.2+dfsg2/ui/app/adapters/auth-config/_base.js:17: let url = `${this.get('namespace')}/${backendId}/config`; vault-1.0.2+dfsg2/ui/app/adapters/auth-config/_base.js-18- // aws has a lot more config endpoints vault-1.0.2+dfsg2/ui/app/adapters/auth-config/_base.js-19- if (modelName.includes('aws')) { vault-1.0.2+dfsg2/ui/app/adapters/auth-config/_base.js:20: url = `${url}/${this.pathForType(modelName)}`; vault-1.0.2+dfsg2/ui/app/adapters/auth-config/_base.js-21- } ############################################## vault-1.0.2+dfsg2/ui/app/adapters/auth-method.js-7- url(path) { vault-1.0.2+dfsg2/ui/app/adapters/auth-method.js:8: const url = `${this.buildURL()}/auth`; vault-1.0.2+dfsg2/ui/app/adapters/auth-method.js-9- return path ? url + '/' + path : url; ############################################## vault-1.0.2+dfsg2/ui/app/adapters/auth-method.js-19- if (isUnauthenticated) { vault-1.0.2+dfsg2/ui/app/adapters/auth-method.js:20: let url = `/${this.urlPrefix()}/internal/ui/mounts`; vault-1.0.2+dfsg2/ui/app/adapters/auth-method.js-21- return this.ajax(url, 'GET', { ############################################## vault-1.0.2+dfsg2/ui/app/adapters/aws-credential.js-22- let role = snapshot.attr('role'); vault-1.0.2+dfsg2/ui/app/adapters/aws-credential.js:23: let url = `/v1/${role.backend}/creds/${role.name}`; vault-1.0.2+dfsg2/ui/app/adapters/aws-credential.js-24- ############################################## vault-1.0.2+dfsg2/ui/app/adapters/cluster.js-83- features() { vault-1.0.2+dfsg2/ui/app/adapters/cluster.js:84: return this.ajax(`${this.urlFor('license')}/features`, 'GET', { vault-1.0.2+dfsg2/ui/app/adapters/cluster.js-85- unauthenticated: true, ############################################## vault-1.0.2+dfsg2/ui/app/adapters/cluster.js-131- throw new Error( vault-1.0.2+dfsg2/ui/app/adapters/cluster.js:132: `Calls to a ${endpoint} endpoint are not currently allowed in the vault cluster adapater` vault-1.0.2+dfsg2/ui/app/adapters/cluster.js-133- ); vault-1.0.2+dfsg2/ui/app/adapters/cluster.js-134- } vault-1.0.2+dfsg2/ui/app/adapters/cluster.js:135: return `${this.buildURL()}/${endpoint}`; vault-1.0.2+dfsg2/ui/app/adapters/cluster.js-136- }, ############################################## vault-1.0.2+dfsg2/ui/app/adapters/cluster.js-141- github: 'login', vault-1.0.2+dfsg2/ui/app/adapters/cluster.js:142: userpass: `login/${encodeURIComponent(username)}`, vault-1.0.2+dfsg2/ui/app/adapters/cluster.js:143: ldap: `login/${encodeURIComponent(username)}`, vault-1.0.2+dfsg2/ui/app/adapters/cluster.js:144: okta: `login/${encodeURIComponent(username)}`, vault-1.0.2+dfsg2/ui/app/adapters/cluster.js-145- token: 'lookup-self', ############################################## vault-1.0.2+dfsg2/ui/app/adapters/cluster.js-149- if (!urlSuffix) { vault-1.0.2+dfsg2/ui/app/adapters/cluster.js:150: throw new Error(`There is no auth url for ${type}.`); vault-1.0.2+dfsg2/ui/app/adapters/cluster.js-151- } vault-1.0.2+dfsg2/ui/app/adapters/cluster.js:152: return `/v1/auth/${urlPrefix}/${urlSuffix}`; vault-1.0.2+dfsg2/ui/app/adapters/cluster.js-153- }, ############################################## vault-1.0.2+dfsg2/ui/app/adapters/cluster.js-156- let suffix; vault-1.0.2+dfsg2/ui/app/adapters/cluster.js:157: const errString = `Calls to replication ${endpoint} endpoint are not currently allowed in the vault cluster adapater`; vault-1.0.2+dfsg2/ui/app/adapters/cluster.js-158- if (clusterMode) { vault-1.0.2+dfsg2/ui/app/adapters/cluster.js-159- assert(errString, REPLICATION_ENDPOINTS[clusterMode].includes(endpoint)); vault-1.0.2+dfsg2/ui/app/adapters/cluster.js:160: suffix = `${replicationMode}/${clusterMode}/${endpoint}`; vault-1.0.2+dfsg2/ui/app/adapters/cluster.js-161- } else { vault-1.0.2+dfsg2/ui/app/adapters/cluster.js-162- assert(errString, REPLICATION_ENDPOINTS[endpoint]); vault-1.0.2+dfsg2/ui/app/adapters/cluster.js:163: suffix = `${endpoint}`; vault-1.0.2+dfsg2/ui/app/adapters/cluster.js-164- } vault-1.0.2+dfsg2/ui/app/adapters/cluster.js:165: return `${this.buildURL()}/replication/${suffix}`; vault-1.0.2+dfsg2/ui/app/adapters/cluster.js-166- }, ############################################## vault-1.0.2+dfsg2/ui/app/adapters/cluster.js-168- replicationStatus() { vault-1.0.2+dfsg2/ui/app/adapters/cluster.js:169: return this.ajax(`${this.buildURL()}/replication/status`, 'GET', { unauthenticated: true }); vault-1.0.2+dfsg2/ui/app/adapters/cluster.js-170- }, ############################################## vault-1.0.2+dfsg2/ui/app/adapters/cluster.js-173- const verb = options && options.checkStatus ? 'GET' : 'PUT'; vault-1.0.2+dfsg2/ui/app/adapters/cluster.js:174: return this.ajax(`${this.buildURL()}/replication/dr/secondary/promote`, verb, { vault-1.0.2+dfsg2/ui/app/adapters/cluster.js-175- data, ############################################## vault-1.0.2+dfsg2/ui/app/adapters/cluster.js-181- const verb = options && options.checkStatus ? 'GET' : 'PUT'; vault-1.0.2+dfsg2/ui/app/adapters/cluster.js:182: let url = `${this.buildURL()}/replication/dr/secondary/generate-operation-token/`; vault-1.0.2+dfsg2/ui/app/adapters/cluster.js-183- if (!data || data.pgp_key || data.attempt) { ############################################## vault-1.0.2+dfsg2/ui/app/adapters/cluster.js-197- assert( vault-1.0.2+dfsg2/ui/app/adapters/cluster.js:198: `${replicationMode} is an unsupported replication mode.`, vault-1.0.2+dfsg2/ui/app/adapters/cluster.js-199- replicationMode && REPLICATION_MODES.includes(replicationMode) ############################################## vault-1.0.2+dfsg2/ui/app/adapters/control-group.js-9- let baseUrl = this.buildURL(type.modelName); vault-1.0.2+dfsg2/ui/app/adapters/control-group.js:10: return this.ajax(`${baseUrl}/request`, 'POST', { vault-1.0.2+dfsg2/ui/app/adapters/control-group.js-11- data: { ############################################## vault-1.0.2+dfsg2/ui/app/adapters/control-group.js-21- let base = this.buildURL(modelName); vault-1.0.2+dfsg2/ui/app/adapters/control-group.js:22: return `${base}/authorize`; vault-1.0.2+dfsg2/ui/app/adapters/control-group.js-23- }, ############################################## vault-1.0.2+dfsg2/ui/app/adapters/identity/base.js-20- } vault-1.0.2+dfsg2/ui/app/adapters/identity/base.js:21: return this._super(`${modelName}/id`, id, snapshot, requestType, query); vault-1.0.2+dfsg2/ui/app/adapters/identity/base.js-22- }, ############################################## vault-1.0.2+dfsg2/ui/app/adapters/identity/entity.js-4- lookup(store, data) { vault-1.0.2+dfsg2/ui/app/adapters/identity/entity.js:5: let url = `/${this.urlPrefix()}/identity/lookup/entity`; vault-1.0.2+dfsg2/ui/app/adapters/identity/entity.js-6- return this.ajax(url, 'POST', { data }).then(response => { ############################################## vault-1.0.2+dfsg2/ui/app/adapters/identity/group.js-4- lookup(store, data) { vault-1.0.2+dfsg2/ui/app/adapters/identity/group.js:5: let url = `/${this.urlPrefix()}/identity/lookup/group`; vault-1.0.2+dfsg2/ui/app/adapters/identity/group.js-6- return this.ajax(url, 'POST', { data }).then(response => { ############################################## vault-1.0.2+dfsg2/ui/app/adapters/mount-filter-config.js-4- url(id) { vault-1.0.2+dfsg2/ui/app/adapters/mount-filter-config.js:5: return `${this.buildURL()}/replication/performance/primary/mount-filter/${id}`; vault-1.0.2+dfsg2/ui/app/adapters/mount-filter-config.js-6- }, ############################################## vault-1.0.2+dfsg2/ui/app/adapters/namespace.js-8- if (snapshot.adapterOptions && snapshot.adapterOptions.forUser) { vault-1.0.2+dfsg2/ui/app/adapters/namespace.js:9: return `/${this.urlPrefix()}/internal/ui/namespaces`; vault-1.0.2+dfsg2/ui/app/adapters/namespace.js-10- } vault-1.0.2+dfsg2/ui/app/adapters/namespace.js:11: return `/${this.urlPrefix()}/namespaces?list=true`; vault-1.0.2+dfsg2/ui/app/adapters/namespace.js-12- }, ############################################## vault-1.0.2+dfsg2/ui/app/adapters/pki-ca-certificate-sign.js-5- const backend = snapshot.attr('backend'); vault-1.0.2+dfsg2/ui/app/adapters/pki-ca-certificate-sign.js:6: return `/v1/${backend}/root/sign-intermediate`; vault-1.0.2+dfsg2/ui/app/adapters/pki-ca-certificate-sign.js-7- }, ############################################## vault-1.0.2+dfsg2/ui/app/adapters/pki-ca-certificate.js-8- if (action === 'sign-intermediate') { vault-1.0.2+dfsg2/ui/app/adapters/pki-ca-certificate.js:9: return `/v1/${backend}/root/sign-intermediate`; vault-1.0.2+dfsg2/ui/app/adapters/pki-ca-certificate.js-10- } vault-1.0.2+dfsg2/ui/app/adapters/pki-ca-certificate.js-11- if (action === 'set-signed-intermediate') { vault-1.0.2+dfsg2/ui/app/adapters/pki-ca-certificate.js:12: return `/v1/${backend}/intermediate/set-signed`; vault-1.0.2+dfsg2/ui/app/adapters/pki-ca-certificate.js-13- } vault-1.0.2+dfsg2/ui/app/adapters/pki-ca-certificate.js-14- if (action === 'upload') { vault-1.0.2+dfsg2/ui/app/adapters/pki-ca-certificate.js:15: return `/v1/${backend}/config/ca`; vault-1.0.2+dfsg2/ui/app/adapters/pki-ca-certificate.js-16- } vault-1.0.2+dfsg2/ui/app/adapters/pki-ca-certificate.js:17: return `/v1/${backend}/${caType}/generate/${type}`; vault-1.0.2+dfsg2/ui/app/adapters/pki-ca-certificate.js-18- }, ############################################## vault-1.0.2+dfsg2/ui/app/adapters/pki-ca-certificate.js-57- const backend = snapshot.attr('backend'); vault-1.0.2+dfsg2/ui/app/adapters/pki-ca-certificate.js:58: return this.ajax(`/v1/${backend}/root`, 'DELETE'); vault-1.0.2+dfsg2/ui/app/adapters/pki-ca-certificate.js-59- }, ############################################## vault-1.0.2+dfsg2/ui/app/adapters/pki-certificate-sign.js-5- if (snapshot.attr('signVerbatim') === true) { vault-1.0.2+dfsg2/ui/app/adapters/pki-certificate-sign.js:6: return `/v1/${role.backend}/sign-verbatim/${role.name}`; vault-1.0.2+dfsg2/ui/app/adapters/pki-certificate-sign.js-7- } vault-1.0.2+dfsg2/ui/app/adapters/pki-certificate-sign.js:8: return `/v1/${role.backend}/sign/${role.name}`; vault-1.0.2+dfsg2/ui/app/adapters/pki-certificate-sign.js-9- }, ############################################## vault-1.0.2+dfsg2/ui/app/adapters/pki-certificate.js-5- url(role) { vault-1.0.2+dfsg2/ui/app/adapters/pki-certificate.js:6: return `/v1/${role.backend}/issue/${role.name}`; vault-1.0.2+dfsg2/ui/app/adapters/pki-certificate.js-7- }, ############################################## vault-1.0.2+dfsg2/ui/app/adapters/pki-certificate.js-9- urlFor(backend, id) { vault-1.0.2+dfsg2/ui/app/adapters/pki-certificate.js:10: let url = `${this.buildURL()}/${backend}/certs`; vault-1.0.2+dfsg2/ui/app/adapters/pki-certificate.js-11- if (id) { vault-1.0.2+dfsg2/ui/app/adapters/pki-certificate.js:12: url = `${this.buildURL()}/${backend}/cert/${id}`; vault-1.0.2+dfsg2/ui/app/adapters/pki-certificate.js-13- } ############################################## vault-1.0.2+dfsg2/ui/app/adapters/pki-certificate.js-33- data.id = id; vault-1.0.2+dfsg2/ui/app/adapters/pki-certificate.js:34: data.id_for_nav = `cert/${id}`; vault-1.0.2+dfsg2/ui/app/adapters/pki-certificate.js-35- } ############################################## vault-1.0.2+dfsg2/ui/app/adapters/pki-certificate.js-56- }; vault-1.0.2+dfsg2/ui/app/adapters/pki-certificate.js:57: return this.ajax(`${this.buildURL()}/${backend}/revoke`, 'POST', { data }).then(resp => { vault-1.0.2+dfsg2/ui/app/adapters/pki-certificate.js-58- const data = { ############################################## vault-1.0.2+dfsg2/ui/app/adapters/pki-config.js-11- const urls = { vault-1.0.2+dfsg2/ui/app/adapters/pki-config.js:12: tidy: `/v1/${backend}/tidy`, vault-1.0.2+dfsg2/ui/app/adapters/pki-config.js:13: urls: `/v1/${backend}/config/urls`, vault-1.0.2+dfsg2/ui/app/adapters/pki-config.js:14: crl: `/v1/${backend}/config/crl`, vault-1.0.2+dfsg2/ui/app/adapters/pki-config.js-15- }; ############################################## vault-1.0.2+dfsg2/ui/app/adapters/pki-config.js-35- let response = resp || {}; vault-1.0.2+dfsg2/ui/app/adapters/pki-config.js:36: response.id = `${snapshot.record.get('backend')}-${snapshot.adapterOptions.method}`; vault-1.0.2+dfsg2/ui/app/adapters/pki-config.js-37- return response; ############################################## vault-1.0.2+dfsg2/ui/app/adapters/pki-config.js-55- } vault-1.0.2+dfsg2/ui/app/adapters/pki-config.js:56: return this[`fetch${capitalize(section)}`](backendPath); vault-1.0.2+dfsg2/ui/app/adapters/pki-config.js-57- }, ############################################## vault-1.0.2+dfsg2/ui/app/adapters/pki-config.js-64- // these are all un-authed so using `fetch` directly works vault-1.0.2+dfsg2/ui/app/adapters/pki-config.js:65: const derURL = `/v1/${backendPath}/ca`; vault-1.0.2+dfsg2/ui/app/adapters/pki-config.js:66: const pemURL = `${derURL}/pem`; vault-1.0.2+dfsg2/ui/app/adapters/pki-config.js:67: const chainURL = `${derURL}_chain`; vault-1.0.2+dfsg2/ui/app/adapters/pki-config.js-68- ############################################## vault-1.0.2+dfsg2/ui/app/adapters/pki-config.js-78- fetchUrls(backendPath) { vault-1.0.2+dfsg2/ui/app/adapters/pki-config.js:79: const url = `/v1/${backendPath}/config/urls`; vault-1.0.2+dfsg2/ui/app/adapters/pki-config.js-80- const id = this.id(backendPath); ############################################## vault-1.0.2+dfsg2/ui/app/adapters/pki-config.js-96- fetchCrl(backendPath) { vault-1.0.2+dfsg2/ui/app/adapters/pki-config.js:97: const url = `/v1/${backendPath}/config/crl`; vault-1.0.2+dfsg2/ui/app/adapters/pki-config.js-98- const id = this.id(backendPath); ############################################## vault-1.0.2+dfsg2/ui/app/adapters/role-aws.js-33- urlForRole(backend, id) { vault-1.0.2+dfsg2/ui/app/adapters/role-aws.js:34: let url = `${this.buildURL()}/${backend}/roles`; vault-1.0.2+dfsg2/ui/app/adapters/role-aws.js-35- if (id) { ############################################## vault-1.0.2+dfsg2/ui/app/adapters/role-pki.js-33- urlForRole(backend, id) { vault-1.0.2+dfsg2/ui/app/adapters/role-pki.js:34: let url = `${this.buildURL()}/${backend}/roles`; vault-1.0.2+dfsg2/ui/app/adapters/role-pki.js-35- if (id) { ############################################## vault-1.0.2+dfsg2/ui/app/adapters/role-ssh.js-36- urlForRole(backend, id) { vault-1.0.2+dfsg2/ui/app/adapters/role-ssh.js:37: let url = `${this.buildURL()}/${backend}/roles`; vault-1.0.2+dfsg2/ui/app/adapters/role-ssh.js-38- if (id) { ############################################## vault-1.0.2+dfsg2/ui/app/adapters/role-ssh.js-86- const { backend } = query; vault-1.0.2+dfsg2/ui/app/adapters/role-ssh.js:87: const url = `/v1/${backend}/config/zeroaddress`; vault-1.0.2+dfsg2/ui/app/adapters/role-ssh.js-88- return this.ajax(url, 'GET'); ############################################## vault-1.0.2+dfsg2/ui/app/adapters/secret-engine.js-5- url(path) { vault-1.0.2+dfsg2/ui/app/adapters/secret-engine.js:6: const url = `${this.buildURL()}/mounts`; vault-1.0.2+dfsg2/ui/app/adapters/secret-engine.js-7- return path ? url + '/' + path : url; ############################################## vault-1.0.2+dfsg2/ui/app/adapters/secret-engine.js-14- query(store, type, query) { vault-1.0.2+dfsg2/ui/app/adapters/secret-engine.js:15: let url = `/${this.urlPrefix()}/internal/ui/mounts`; vault-1.0.2+dfsg2/ui/app/adapters/secret-engine.js-16- if (query.path) { vault-1.0.2+dfsg2/ui/app/adapters/secret-engine.js:17: url = `${url}/${query.path}`; vault-1.0.2+dfsg2/ui/app/adapters/secret-engine.js-18- } ############################################## vault-1.0.2+dfsg2/ui/app/adapters/secret-engine.js-36- if (snapshot.attr('type') === 'ssh') { vault-1.0.2+dfsg2/ui/app/adapters/secret-engine.js:37: return this.ajax(`/v1/${path}/config/ca`, 'GET'); vault-1.0.2+dfsg2/ui/app/adapters/secret-engine.js-38- } ############################################## vault-1.0.2+dfsg2/ui/app/adapters/secret-engine.js-43- if (query.type === 'aws') { vault-1.0.2+dfsg2/ui/app/adapters/secret-engine.js:44: return this.ajax(`/v1/${query.backend}/config/lease`, 'GET').then(resp => { vault-1.0.2+dfsg2/ui/app/adapters/secret-engine.js-45- resp.path = query.backend + '/'; ############################################## vault-1.0.2+dfsg2/ui/app/adapters/secret-engine.js-60- const path = snapshot.id; vault-1.0.2+dfsg2/ui/app/adapters/secret-engine.js:61: return this.ajax(`/v1/${path}/${apiPath}`, options.isDelete ? 'DELETE' : 'POST', { data }); vault-1.0.2+dfsg2/ui/app/adapters/secret-engine.js-62- } ############################################## vault-1.0.2+dfsg2/ui/app/adapters/secret-engine.js-67- const path = snapshot.id; vault-1.0.2+dfsg2/ui/app/adapters/secret-engine.js:68: return this.ajax(`/v1/${path}/config/root`, 'POST', { data }); vault-1.0.2+dfsg2/ui/app/adapters/secret-engine.js-69- }, ############################################## vault-1.0.2+dfsg2/ui/app/adapters/secret-engine.js-73- const path = snapshot.id; vault-1.0.2+dfsg2/ui/app/adapters/secret-engine.js:74: return this.ajax(`/v1/${path}/config/lease`, 'POST', { data }); vault-1.0.2+dfsg2/ui/app/adapters/secret-engine.js-75- }, ############################################## vault-1.0.2+dfsg2/ui/app/adapters/secret-engine.js-83- .join(','); vault-1.0.2+dfsg2/ui/app/adapters/secret-engine.js:84: const url = `/v1/${path}/config/zeroaddress`; vault-1.0.2+dfsg2/ui/app/adapters/secret-engine.js-85- const data = { roles }; ############################################## vault-1.0.2+dfsg2/ui/app/adapters/secret-v2-version.js-9- _url(backend, id, infix = 'data') { vault-1.0.2+dfsg2/ui/app/adapters/secret-v2-version.js:10: let url = `${this.buildURL()}/${backend}/${infix}/`; vault-1.0.2+dfsg2/ui/app/adapters/secret-v2-version.js-11- if (!isEmpty(id)) { ############################################## vault-1.0.2+dfsg2/ui/app/adapters/secret-v2-version.js-19- let base = this._url(backend, path); vault-1.0.2+dfsg2/ui/app/adapters/secret-v2-version.js:20: return version ? base + `?version=${version}` : base; vault-1.0.2+dfsg2/ui/app/adapters/secret-v2-version.js-21- }, ############################################## vault-1.0.2+dfsg2/ui/app/adapters/secret-v2.js-7- _url(backend, id) { vault-1.0.2+dfsg2/ui/app/adapters/secret-v2.js:8: let url = `${this.buildURL()}/${backend}/metadata/`; vault-1.0.2+dfsg2/ui/app/adapters/secret-v2.js-9- if (!isEmpty(id)) { ############################################## vault-1.0.2+dfsg2/ui/app/adapters/secret.js-28- urlForSecret(backend, id) { vault-1.0.2+dfsg2/ui/app/adapters/secret.js:29: let url = `${this.buildURL()}/${backend}/`; vault-1.0.2+dfsg2/ui/app/adapters/secret.js-30- if (!isEmpty(id)) { ############################################## vault-1.0.2+dfsg2/ui/app/adapters/ssh-otp-credential.js-4- url(role) { vault-1.0.2+dfsg2/ui/app/adapters/ssh-otp-credential.js:5: return `/v1/${role.backend}/creds/${role.name}`; vault-1.0.2+dfsg2/ui/app/adapters/ssh-otp-credential.js-6- }, ############################################## vault-1.0.2+dfsg2/ui/app/adapters/ssh-sign.js-4- url(role) { vault-1.0.2+dfsg2/ui/app/adapters/ssh-sign.js:5: return `/v1/${role.backend}/sign/${role.name}`; vault-1.0.2+dfsg2/ui/app/adapters/ssh-sign.js-6- }, ############################################## vault-1.0.2+dfsg2/ui/app/adapters/tools.js-11- if (!isWrapping && !isTool) { vault-1.0.2+dfsg2/ui/app/adapters/tools.js:12: throw new Error(`Calls to a ${action} endpoint are not currently allowed in the tool adapter`); vault-1.0.2+dfsg2/ui/app/adapters/tools.js-13- } vault-1.0.2+dfsg2/ui/app/adapters/tools.js:14: return `${this.buildURL()}/${prefix}/${action}`; vault-1.0.2+dfsg2/ui/app/adapters/tools.js-15- }, ############################################## vault-1.0.2+dfsg2/ui/app/adapters/transit-key.js-49- urlForSecret(backend, id) { vault-1.0.2+dfsg2/ui/app/adapters/transit-key.js:50: let url = `${this.buildURL()}/${backend}/keys/`; vault-1.0.2+dfsg2/ui/app/adapters/transit-key.js-51- if (id) { ############################################## vault-1.0.2+dfsg2/ui/app/adapters/transit-key.js-57- urlForAction(action, backend, id, param) { vault-1.0.2+dfsg2/ui/app/adapters/transit-key.js:58: let urlBase = `${this.buildURL()}/${backend}/${action}`; vault-1.0.2+dfsg2/ui/app/adapters/transit-key.js-59- // these aren't key-specific ############################################## vault-1.0.2+dfsg2/ui/app/adapters/transit-key.js-64- // datakey action has `wrapped` or `plaintext` as part of the url vault-1.0.2+dfsg2/ui/app/adapters/transit-key.js:65: return `${urlBase}/${param}/${id}`; vault-1.0.2+dfsg2/ui/app/adapters/transit-key.js-66- } ############################################## vault-1.0.2+dfsg2/ui/app/adapters/transit-key.js-68- let [type, version] = param; vault-1.0.2+dfsg2/ui/app/adapters/transit-key.js:69: const exportBase = `${urlBase}/${type}-key/${id}`; vault-1.0.2+dfsg2/ui/app/adapters/transit-key.js:70: return version ? `${exportBase}/${version}` : exportBase; vault-1.0.2+dfsg2/ui/app/adapters/transit-key.js-71- } vault-1.0.2+dfsg2/ui/app/adapters/transit-key.js:72: return `${urlBase}/${id}`; vault-1.0.2+dfsg2/ui/app/adapters/transit-key.js-73- }, ############################################## vault-1.0.2+dfsg2/ui/app/components/auth-form.js-102- let templateName = dasherize(type); vault-1.0.2+dfsg2/ui/app/components/auth-form.js:103: return `partials/auth-form/${templateName}`; vault-1.0.2+dfsg2/ui/app/components/auth-form.js-104- }), ############################################## vault-1.0.2+dfsg2/ui/app/components/auth-form.js-135- } catch (e) { vault-1.0.2+dfsg2/ui/app/components/auth-form.js:136: this.set('error', `Token unwrap failed: ${e.errors[0]}`); vault-1.0.2+dfsg2/ui/app/components/auth-form.js-137- } ############################################## vault-1.0.2+dfsg2/ui/app/components/auth-form.js-152- } catch (e) { vault-1.0.2+dfsg2/ui/app/components/auth-form.js:153: this.set('error', `There was an error fetching auth methods: ${e.errors[0]}`); vault-1.0.2+dfsg2/ui/app/components/auth-form.js-154- } ############################################## vault-1.0.2+dfsg2/ui/app/components/auth-form.js-166- }); vault-1.0.2+dfsg2/ui/app/components/auth-form.js:167: this.set('error', `Authentication failed: ${errors.join('.')}`); vault-1.0.2+dfsg2/ui/app/components/auth-form.js-168- }, ############################################## vault-1.0.2+dfsg2/ui/app/components/config-pki-ca.js-86- const caCert = store.createRecord(modelType || 'pki-ca-certificate', { vault-1.0.2+dfsg2/ui/app/components/config-pki-ca.js:87: id: `${backend}-ca-cert`, vault-1.0.2+dfsg2/ui/app/components/config-pki-ca.js-88- backend, ############################################## vault-1.0.2+dfsg2/ui/app/components/config-pki-ca.js-113- display: 'Download CA Certificate in PEM format', vault-1.0.2+dfsg2/ui/app/components/config-pki-ca.js:114: name: `${backend}_ca.pem`, vault-1.0.2+dfsg2/ui/app/components/config-pki-ca.js-115- url: URL.createObjectURL(pemFile), ############################################## vault-1.0.2+dfsg2/ui/app/components/config-pki-ca.js-118- display: 'Download CA Certificate in DER format', vault-1.0.2+dfsg2/ui/app/components/config-pki-ca.js:119: name: `${backend}_ca.der`, vault-1.0.2+dfsg2/ui/app/components/config-pki-ca.js-120- url: URL.createObjectURL(der), ############################################## vault-1.0.2+dfsg2/ui/app/components/config-pki-ca.js-126- display: 'Download CA Certificate Chain', vault-1.0.2+dfsg2/ui/app/components/config-pki-ca.js:127: name: `${backend}_ca_chain.pem`, vault-1.0.2+dfsg2/ui/app/components/config-pki-ca.js-128- url: URL.createObjectURL(caChainFile), ############################################## vault-1.0.2+dfsg2/ui/app/components/config-pki-ca.js-168- this.get('flashMessages').success( vault-1.0.2+dfsg2/ui/app/components/config-pki-ca.js:169: `The CA key for ${backend} has been deleted. The old CA certificate will still be accessible for reading until a new certificate/key are generated or uploaded.` vault-1.0.2+dfsg2/ui/app/components/config-pki-ca.js-170- ); ############################################## vault-1.0.2+dfsg2/ui/app/components/config-pki.js-46- method: section, vault-1.0.2+dfsg2/ui/app/components/config-pki.js:47: fields: get(config, `${section}Attrs`).map(attr => attr.name), vault-1.0.2+dfsg2/ui/app/components/config-pki.js-48- }, ############################################## vault-1.0.2+dfsg2/ui/app/components/config-pki.js-50- .then(() => { vault-1.0.2+dfsg2/ui/app/components/config-pki.js:51: this.get('flashMessages').success(`The ${section} config for this backend has been updated.`); vault-1.0.2+dfsg2/ui/app/components/config-pki.js-52- // attrs aren't persistent for Tidy ############################################## vault-1.0.2+dfsg2/ui/app/components/console/ui-panel.js-95- let routeName = this.get('router.currentRouteName'); vault-1.0.2+dfsg2/ui/app/components/console/ui-panel.js:96: let route = owner.lookup(`route:${routeName}`); vault-1.0.2+dfsg2/ui/app/components/console/ui-panel.js-97- ############################################## vault-1.0.2+dfsg2/ui/app/components/control-group-success.js-25- } catch (e) { vault-1.0.2+dfsg2/ui/app/components/control-group-success.js:26: this.set('error', `Token unwrap failed: ${e.errors[0]}`); vault-1.0.2+dfsg2/ui/app/components/control-group-success.js-27- } ############################################## vault-1.0.2+dfsg2/ui/app/components/doc-link.js-17- href: computed('host', 'path', function() { vault-1.0.2+dfsg2/ui/app/components/doc-link.js:18: return `${this.host}${this.path}`; vault-1.0.2+dfsg2/ui/app/components/doc-link.js-19- }), ############################################## vault-1.0.2+dfsg2/ui/app/components/download-button.js-10- download: computed('filename', 'extension', function() { vault-1.0.2+dfsg2/ui/app/components/download-button.js:11: return `${this.get('filename')}-${new Date().toISOString()}.${this.get('extension')}`; vault-1.0.2+dfsg2/ui/app/components/download-button.js-12- }), ############################################## vault-1.0.2+dfsg2/ui/app/components/flash-message.js-11- vault-1.0.2+dfsg2/ui/app/components/flash-message.js:12: return `${prefix}${flashType}`; vault-1.0.2+dfsg2/ui/app/components/flash-message.js-13- }, ############################################## vault-1.0.2+dfsg2/ui/app/components/generate-credentials.js-52- const action = this.get('action') || 'creds'; vault-1.0.2+dfsg2/ui/app/components/generate-credentials.js:53: return MODEL_TYPES[`${this.get('backendType')}-${action}`]; vault-1.0.2+dfsg2/ui/app/components/generate-credentials.js-54- }), ############################################## vault-1.0.2+dfsg2/ui/app/components/generate-credentials.js-91- }, vault-1.0.2+dfsg2/ui/app/components/generate-credentials.js:92: id: `${backendPath}-${roleName}`, vault-1.0.2+dfsg2/ui/app/components/generate-credentials.js-93- }; ############################################## vault-1.0.2+dfsg2/ui/app/components/i-con.js-66- const glyph = this.get('glyph'); vault-1.0.2+dfsg2/ui/app/components/i-con.js:67: return `svg/icons/${camelize(glyph)}`; vault-1.0.2+dfsg2/ui/app/components/i-con.js-68- }), ############################################## vault-1.0.2+dfsg2/ui/app/components/identity/edit-form.js-23- let { model, mode } = this.getProperties('model', 'mode'); vault-1.0.2+dfsg2/ui/app/components/identity/edit-form.js:24: let key = `${mode}-${model.get('identityType')}`; vault-1.0.2+dfsg2/ui/app/components/identity/edit-form.js-25- let routes = { ############################################## vault-1.0.2+dfsg2/ui/app/components/identity/edit-form.js-47- if (model.get('id')) { vault-1.0.2+dfsg2/ui/app/components/identity/edit-form.js:48: return `Successfully ${action} ${typeDisplay} ${model.id}.`; vault-1.0.2+dfsg2/ui/app/components/identity/edit-form.js-49- } vault-1.0.2+dfsg2/ui/app/components/identity/edit-form.js:50: return `Successfully ${action} ${typeDisplay}.`; vault-1.0.2+dfsg2/ui/app/components/identity/edit-form.js-51- }, ############################################## vault-1.0.2+dfsg2/ui/app/components/identity/item-details.js-13- .then(() => { vault-1.0.2+dfsg2/ui/app/components/identity/item-details.js:14: this.get('flashMessages').success(`Successfully enabled entity: ${model.id}`); vault-1.0.2+dfsg2/ui/app/components/identity/item-details.js-15- }) ############################################## vault-1.0.2+dfsg2/ui/app/components/identity/item-details.js-17- this.get('flashMessages').success( vault-1.0.2+dfsg2/ui/app/components/identity/item-details.js:18: `There was a problem enabling the entity: ${model.id} - ${e.errors.join(' ') || e.message}` vault-1.0.2+dfsg2/ui/app/components/identity/item-details.js-19- ); ############################################## vault-1.0.2+dfsg2/ui/app/components/identity/lookup-input.js-33- let store = this.get('store'); vault-1.0.2+dfsg2/ui/app/components/identity/lookup-input.js:34: return store.adapterFor(`identity/${type}`); vault-1.0.2+dfsg2/ui/app/components/identity/lookup-input.js-35- }, ############################################## vault-1.0.2+dfsg2/ui/app/components/identity/lookup-input.js-61- flash.danger( vault-1.0.2+dfsg2/ui/app/components/identity/lookup-input.js:62: `We encountered an error attempting the ${type} lookup: ${err.message || err.errors.join('')}.` vault-1.0.2+dfsg2/ui/app/components/identity/lookup-input.js-63- ); ############################################## vault-1.0.2+dfsg2/ui/app/components/identity/lookup-input.js-68- } else { vault-1.0.2+dfsg2/ui/app/components/identity/lookup-input.js:69: flash.danger(`We were unable to find an identity ${type} with a "${param}" of "${paramValue}".`); vault-1.0.2+dfsg2/ui/app/components/identity/lookup-input.js-70- } ############################################## vault-1.0.2+dfsg2/ui/app/components/identity/popup-alias.js-10- successMessage(type, id) { vault-1.0.2+dfsg2/ui/app/components/identity/popup-alias.js:11: return `Successfully deleted ${type}: ${id}`; vault-1.0.2+dfsg2/ui/app/components/identity/popup-alias.js-12- }, ############################################## vault-1.0.2+dfsg2/ui/app/components/identity/popup-alias.js-15- let error = e.errors ? e.errors.join(' ') : e.message; vault-1.0.2+dfsg2/ui/app/components/identity/popup-alias.js:16: return `There was a problem deleting ${type}: ${id} - ${error}`; vault-1.0.2+dfsg2/ui/app/components/identity/popup-alias.js-17- }, ############################################## vault-1.0.2+dfsg2/ui/app/components/identity/popup-members.js-20- successMessage(model, groupArray, memberId) { vault-1.0.2+dfsg2/ui/app/components/identity/popup-members.js:21: return `Successfully removed '${memberId}' from the group`; vault-1.0.2+dfsg2/ui/app/components/identity/popup-members.js-22- }, ############################################## vault-1.0.2+dfsg2/ui/app/components/identity/popup-members.js-25- let error = e.errors ? e.errors.join(' ') : e.message; vault-1.0.2+dfsg2/ui/app/components/identity/popup-members.js:26: return `There was a problem removing '${memberId}' from the group - ${error}`; vault-1.0.2+dfsg2/ui/app/components/identity/popup-members.js-27- }, ############################################## vault-1.0.2+dfsg2/ui/app/components/identity/popup-policy.js-15- successMessage(model, policyName) { vault-1.0.2+dfsg2/ui/app/components/identity/popup-policy.js:16: return `Successfully removed '${policyName}' policy from ${model.id} `; vault-1.0.2+dfsg2/ui/app/components/identity/popup-policy.js-17- }, ############################################## vault-1.0.2+dfsg2/ui/app/components/identity/popup-policy.js-20- let error = e.errors ? e.errors.join(' ') : e.message; vault-1.0.2+dfsg2/ui/app/components/identity/popup-policy.js:21: return `There was a problem removing '${policyName}' policy - ${error}`; vault-1.0.2+dfsg2/ui/app/components/identity/popup-policy.js-22- }, ############################################## vault-1.0.2+dfsg2/ui/app/components/key-value-header.js-26- } vault-1.0.2+dfsg2/ui/app/components/key-value-header.js:27: return `vault.cluster.secrets.backend.${mode}`; vault-1.0.2+dfsg2/ui/app/components/key-value-header.js-28- }), ############################################## vault-1.0.2+dfsg2/ui/app/components/list-view.js-14- let items = pluralize(this.get('itemNoun')); vault-1.0.2+dfsg2/ui/app/components/list-view.js:15: return `No ${items} yet`; vault-1.0.2+dfsg2/ui/app/components/list-view.js-16- }), ############################################## vault-1.0.2+dfsg2/ui/app/components/list-view.js-19- let items = pluralize(this.get('itemNoun')); vault-1.0.2+dfsg2/ui/app/components/list-view.js:20: return `Your ${items} will be listed here. Add your first ${this.get('itemNoun')} to get started.`; vault-1.0.2+dfsg2/ui/app/components/list-view.js-21- }), ############################################## vault-1.0.2+dfsg2/ui/app/components/mount-backend-form.js-66- // or auth-azure vault-1.0.2+dfsg2/ui/app/components/mount-backend-form.js:67: let key = `${mountType}-${methodType}`; vault-1.0.2+dfsg2/ui/app/components/mount-backend-form.js-68- let noConfig = ['auth-approle', 'auth-alicloud']; ############################################## vault-1.0.2+dfsg2/ui/app/components/mount-backend-form.js-74- } vault-1.0.2+dfsg2/ui/app/components/mount-backend-form.js:75: return `auth-config/${methodType}`; vault-1.0.2+dfsg2/ui/app/components/mount-backend-form.js-76- }, ############################################## vault-1.0.2+dfsg2/ui/app/components/mount-backend-form.js-119- let mountType = this.get('mountType'); vault-1.0.2+dfsg2/ui/app/components/mount-backend-form.js:120: mountType = mountType === 'secret' ? `${mountType}s engine` : `${mountType} method`; vault-1.0.2+dfsg2/ui/app/components/mount-backend-form.js:121: this.get('flashMessages').success(`Successfully mounted the ${type} ${mountType} at ${path}.`); vault-1.0.2+dfsg2/ui/app/components/mount-backend-form.js-122- if (this.get('mountType') === 'secret') { ############################################## vault-1.0.2+dfsg2/ui/app/components/mount-backend-form.js-149- this.get('flashMessages').success( vault-1.0.2+dfsg2/ui/app/components/mount-backend-form.js:150: `The config for ${type} ${this.get('mountType')} method at ${path} was saved successfully.` vault-1.0.2+dfsg2/ui/app/components/mount-backend-form.js-151- ); ############################################## vault-1.0.2+dfsg2/ui/app/components/namespace-reminder.js-16- } vault-1.0.2+dfsg2/ui/app/components/namespace-reminder.js:17: return mode.endsWith('e') ? `${mode}d` : `${mode}ed`; vault-1.0.2+dfsg2/ui/app/components/namespace-reminder.js-18- }), ############################################## vault-1.0.2+dfsg2/ui/app/components/navigate-input.js-60- } vault-1.0.2+dfsg2/ui/app/components/navigate-input.js:61: return `cert/${key}`; vault-1.0.2+dfsg2/ui/app/components/navigate-input.js-62- }, ############################################## vault-1.0.2+dfsg2/ui/app/components/radial-progress.js-14- let s = this.get('size'); vault-1.0.2+dfsg2/ui/app/components/radial-progress.js:15: return `0 0 ${s} ${s}`; vault-1.0.2+dfsg2/ui/app/components/radial-progress.js-16- }), ############################################## vault-1.0.2+dfsg2/ui/app/components/replication-mode-summary.js-6-const replicationAttr = function(attr) { vault-1.0.2+dfsg2/ui/app/components/replication-mode-summary.js:7: return computed('mode', `cluster.{dr,performance}.${attr}`, function() { vault-1.0.2+dfsg2/ui/app/components/replication-mode-summary.js-8- const { mode, cluster } = getProperties(this, 'mode', 'cluster'); vault-1.0.2+dfsg2/ui/app/components/replication-mode-summary.js:9: return get(cluster, `${mode}.${attr}`); vault-1.0.2+dfsg2/ui/app/components/replication-mode-summary.js-10- }); ############################################## vault-1.0.2+dfsg2/ui/app/components/search-select.js-46- options = options.toArray().map(option => { vault-1.0.2+dfsg2/ui/app/components/search-select.js:47: option.searchText = `${option.name} ${option.id}`; vault-1.0.2+dfsg2/ui/app/components/search-select.js-48- return option; ############################################## vault-1.0.2+dfsg2/ui/app/components/secret-edit.js-91- partialName: computed('mode', function() { vault-1.0.2+dfsg2/ui/app/components/secret-edit.js:92: return `partials/secret-form-${this.mode}`; vault-1.0.2+dfsg2/ui/app/components/secret-edit.js-93- }), ############################################## vault-1.0.2+dfsg2/ui/app/components/secret-edit.js-102- let id = context.model.id; vault-1.0.2+dfsg2/ui/app/components/secret-edit.js:103: let path = context.isV2 ? `${backend}/data/${id}` : `${backend}/${id}`; vault-1.0.2+dfsg2/ui/app/components/secret-edit.js-104- return { ############################################## vault-1.0.2+dfsg2/ui/app/components/secret-edit.js-124- return { vault-1.0.2+dfsg2/ui/app/components/secret-edit.js:125: id: `${backend}/metadata/${id}`, vault-1.0.2+dfsg2/ui/app/components/secret-edit.js-126- }; ############################################## vault-1.0.2+dfsg2/ui/app/components/secret-link.js-5- let params; vault-1.0.2+dfsg2/ui/app/components/secret-link.js:6: const route = `vault.cluster.secrets.backend.${mode}`; vault-1.0.2+dfsg2/ui/app/components/secret-link.js-7- ############################################## vault-1.0.2+dfsg2/ui/app/components/secret-version-menu.js-16- return { vault-1.0.2+dfsg2/ui/app/components/secret-version-menu.js:17: id: `${backend}/delete/${id}`, vault-1.0.2+dfsg2/ui/app/components/secret-version-menu.js-18- }; ############################################## vault-1.0.2+dfsg2/ui/app/components/secret-version-menu.js-27- return { vault-1.0.2+dfsg2/ui/app/components/secret-version-menu.js:28: id: `${backend}/destroy/${id}`, vault-1.0.2+dfsg2/ui/app/components/secret-version-menu.js-29- }; ############################################## vault-1.0.2+dfsg2/ui/app/components/secret-version-menu.js-38- return { vault-1.0.2+dfsg2/ui/app/components/secret-version-menu.js:39: id: `${backend}/undelete/${id}`, vault-1.0.2+dfsg2/ui/app/components/secret-version-menu.js-40- }; ############################################## vault-1.0.2+dfsg2/ui/app/components/status-menu.js-15- partialName: computed('type', function() { vault-1.0.2+dfsg2/ui/app/components/status-menu.js:16: return `partials/status/${this.type}`; vault-1.0.2+dfsg2/ui/app/components/status-menu.js-17- }), ############################################## vault-1.0.2+dfsg2/ui/app/components/toggle-button.js-20- 'isOpen', vault-1.0.2+dfsg2/ui/app/components/toggle-button.js:21: computed(`toggleTarget.${toggleAttr}`, () => { vault-1.0.2+dfsg2/ui/app/components/toggle-button.js-22- const props = this.getProperties('toggleTarget', 'toggleAttr'); ############################################## vault-1.0.2+dfsg2/ui/app/components/wizard-content.js-48- feature: this.currentMachine, vault-1.0.2+dfsg2/ui/app/components/wizard-content.js:49: text: `Step ${this.featureMachineHistory.length} of ${totalSteps}`, vault-1.0.2+dfsg2/ui/app/components/wizard-content.js-50- }; ############################################## vault-1.0.2+dfsg2/ui/app/components/wizard-content.js-59- percentage: (currentStepNumber / INIT_STEPS.length) * 100, vault-1.0.2+dfsg2/ui/app/components/wizard-content.js:60: text: `Step ${currentStepNumber} of ${INIT_STEPS.length}`, vault-1.0.2+dfsg2/ui/app/components/wizard-content.js-61- }; ############################################## vault-1.0.2+dfsg2/ui/app/components/wizard-content.js-68- bar.push({ vault-1.0.2+dfsg2/ui/app/components/wizard-content.js:69: style: `width:${this.currentTutorialProgress.percentage}%;`, vault-1.0.2+dfsg2/ui/app/components/wizard-content.js-70- completed: false, ############################################## vault-1.0.2+dfsg2/ui/app/components/wizard-content.js-80- bar.push({ vault-1.0.2+dfsg2/ui/app/components/wizard-content.js:81: style: `width:${this.currentFeatureProgress.percentage}%;`, vault-1.0.2+dfsg2/ui/app/components/wizard-content.js-82- completed: this.currentFeatureProgress.percentage == 100 ? true : false, ############################################## vault-1.0.2+dfsg2/ui/app/components/wizard/mounts-wizard.js-28- let suffix = this.get('currentMachine') === 'secrets' ? 'engine' : 'method'; vault-1.0.2+dfsg2/ui/app/components/wizard/mounts-wizard.js:29: return this.get('mountSubtype') ? `wizard/${this.get('mountSubtype')}-${suffix}` : null; vault-1.0.2+dfsg2/ui/app/components/wizard/mounts-wizard.js-30- }), ############################################## vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/access/identity/index.js-15- this.send('reload'); vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/access/identity/index.js:16: this.get('flashMessages').success(`Successfully deleted ${type}: ${id}`); vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/access/identity/index.js-17- }) ############################################## vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/access/identity/index.js-19- this.get('flashMessages').success( vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/access/identity/index.js:20: `There was a problem deleting ${type}: ${id} - ${e.errors.join(' ') || e.message}` vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/access/identity/index.js-21- ); ############################################## vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/access/identity/index.js-33- .then(() => { vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/access/identity/index.js:34: this.get('flashMessages').success(`Successfully ${action[0]} ${type}: ${id}`); vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/access/identity/index.js-35- }) ############################################## vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/access/identity/index.js-37- this.get('flashMessages').success( vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/access/identity/index.js:38: `There was a problem ${action[1]} ${type}: ${id} - ${e.errors.join(' ') || e.message}` vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/access/identity/index.js-39- ); ############################################## vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/access/leases/list.js-59- if (filter === id) { vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/access/leases/list.js:60: return `There are no leases under "${filter}".`; vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/access/leases/list.js-61- } else { vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/access/leases/list.js:62: return `We couldn't find a prefix matching "${filter}".`; vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/access/leases/list.js-63- } ############################################## vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/access/leases/list.js-82- return this.transitionToRoute('vault.cluster.access.leases.list-root').then(() => { vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/access/leases/list.js:83: this.get('flashMessages').success(`All of the leases under ${prefix} will be revoked.`); vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/access/leases/list.js-84- }); ############################################## vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/access/leases/list.js-88- this.get('flashMessages').danger( vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/access/leases/list.js:89: `There was an error attempting to revoke the prefix: ${prefix}. ${errString}.` vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/access/leases/list.js-90- ); ############################################## vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/access/leases/show.js-35- next(() => { vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/access/leases/show.js:36: flash.success(`The lease ${model.id} was successfully renewed.`); vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/access/leases/show.js-37- }); ############################################## vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/access/leases/show.js-40- const errString = e.errors.join('.'); vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/access/leases/show.js:41: flash.danger(`There was an error renewing the lease: ${errString}`); vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/access/leases/show.js-42- }); ############################################## vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/access/methods.js-17- yield method.destroyRecord(); vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/access/methods.js:18: this.get('flashMessages').success(`The ${type} auth method at ${path} has been disabled.`); vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/access/methods.js-19- } catch (err) { vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/access/methods.js-20- this.get('flashMessages').danger( vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/access/methods.js:21: `There was an error disabling auth method at ${path}: ${err.errors.join(' ')}.` vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/access/methods.js-22- ); ############################################## vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/init.js-38- keyFilename: computed('model.name', function() { vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/init.js:39: return `vault-cluster-${this.get('model.name')}`; vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/init.js-40- }), ############################################## vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/policies/index.js-59- this.send('reload'); vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/policies/index.js:60: flash.success(`${policyType.toUpperCase()} policy "${name}" was successfully deleted.`); vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/policies/index.js-61- if (this.get('wizard.featureState') === 'delete') { ############################################## vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/policies/index.js-67- flash.danger( vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/policies/index.js:68: `There was an error deleting the ${policyType.toUpperCase()} policy "${name}": ${errors}.` vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/policies/index.js-69- ); ############################################## vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/replication/mode/secondaries/config-edit.js-50- flash.error( vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/replication/mode/secondaries/config-edit.js:51: `There was an error ${isDelete ? 'deleting' : 'saving'} the config for ${id}: ${errString}` vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/replication/mode/secondaries/config-edit.js-52- ); ############################################## vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/secrets/backend/list.js-71- item.destroyRecord().then(() => { vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/secrets/backend/list.js:72: this.get('flashMessages').success(`${name} was successfully deleted.`); vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/secrets/backend/list.js-73- this.send('reload'); ############################################## vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/secrets/backend/sign.js-31- role: roleModel, vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/secrets/backend/sign.js:32: id: `${get(roleModel, 'backend')}-${get(roleModel, 'name')}`, vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/secrets/backend/sign.js-33- }); ############################################## vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/secrets/backends.js-33- yield engine.destroyRecord(); vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/secrets/backends.js:34: this.get('flashMessages').success(`The ${engineType} secrets engine at ${path} has been disabled.`); vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/secrets/backends.js-35- } catch (err) { vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/secrets/backends.js-36- this.get('flashMessages').danger( vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/secrets/backends.js:37: `There was an error disabling the ${engineType} secrets engine at ${path}: ${err.errors.join(' ')}.` vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/secrets/backends.js-38- ); ############################################## vault-1.0.2+dfsg2/ui/app/helpers/has-feature.js-18- if (!FEATURES.includes(featureName)) { vault-1.0.2+dfsg2/ui/app/helpers/has-feature.js:19: assert(`${featureName} is not one of the available values for Vault Enterprise features.`, false); vault-1.0.2+dfsg2/ui/app/helpers/has-feature.js-20- return false; ############################################## vault-1.0.2+dfsg2/ui/app/helpers/is-version.js-12- if (sku !== 'OSS' && sku !== 'Enterprise') { vault-1.0.2+dfsg2/ui/app/helpers/is-version.js:13: assert(`${sku} is not one of the available values for Vault versions.`, false); vault-1.0.2+dfsg2/ui/app/helpers/is-version.js-14- return false; vault-1.0.2+dfsg2/ui/app/helpers/is-version.js-15- } vault-1.0.2+dfsg2/ui/app/helpers/is-version.js:16: return this.get(`version.is${sku}`); vault-1.0.2+dfsg2/ui/app/helpers/is-version.js-17- }, ############################################## vault-1.0.2+dfsg2/ui/app/helpers/replication-action-for-mode.js-16-export function replicationActionForMode([replicationMode, clusterMode] /*, hash*/) { vault-1.0.2+dfsg2/ui/app/helpers/replication-action-for-mode.js:17: return get(ACTIONS, `${replicationMode}.${clusterMode}`); vault-1.0.2+dfsg2/ui/app/helpers/replication-action-for-mode.js-18-} ############################################## vault-1.0.2+dfsg2/ui/app/helpers/tabs-for-identity-show.js-15- if (groupType) { vault-1.0.2+dfsg2/ui/app/helpers/tabs-for-identity-show.js:16: key = `${key}-${groupType}`; vault-1.0.2+dfsg2/ui/app/helpers/tabs-for-identity-show.js-17- } ############################################## vault-1.0.2+dfsg2/ui/app/lib/console-helpers.js-95- method === 'write' vault-1.0.2+dfsg2/ui/app/lib/console-helpers.js:96: ? `Success! Data written to: ${path}` vault-1.0.2+dfsg2/ui/app/lib/console-helpers.js:97: : `Success! Data deleted (if it existed) at: ${path}`; vault-1.0.2+dfsg2/ui/app/lib/console-helpers.js-98- ############################################## vault-1.0.2+dfsg2/ui/app/lib/console-helpers.js-117- } else { vault-1.0.2+dfsg2/ui/app/lib/console-helpers.js:118: response = { type: 'error', content: `Field "${field}" not present in secret` }; vault-1.0.2+dfsg2/ui/app/lib/console-helpers.js-119- } ############################################## vault-1.0.2+dfsg2/ui/app/lib/console-helpers.js-144- vault-1.0.2+dfsg2/ui/app/lib/console-helpers.js:145: content = `Error ${verbClause}: ${vaultPath}.\nURL: ${path}\nCode: ${httpStatus}`; vault-1.0.2+dfsg2/ui/app/lib/console-helpers.js-146- vault-1.0.2+dfsg2/ui/app/lib/console-helpers.js-147- if (typeof error.errors[0] === 'string') { vault-1.0.2+dfsg2/ui/app/lib/console-helpers.js:148: content = `${content}\nErrors:\n ${error.errors.join('\n ')}`; vault-1.0.2+dfsg2/ui/app/lib/console-helpers.js-149- } ############################################## vault-1.0.2+dfsg2/ui/app/macros/identity-capabilities.js-3-export default function() { vault-1.0.2+dfsg2/ui/app/macros/identity-capabilities.js:4: return lazyCapabilities(apiPath`identity/${'identityType'}/id/${'id'}`, 'id', 'identityType'); vault-1.0.2+dfsg2/ui/app/macros/identity-capabilities.js-5-} ############################################## vault-1.0.2+dfsg2/ui/app/macros/lazy-capabilities.js-8-// //knows where to put each value vault-1.0.2+dfsg2/ui/app/macros/lazy-capabilities.js:9:// zeroAddressPath: lazyCapabilities(apiPath`${'id'}/config/zeroaddress`, 'id'), vault-1.0.2+dfsg2/ui/app/macros/lazy-capabilities.js-10-// ############################################## vault-1.0.2+dfsg2/ui/app/mixins/focus-on-insert.js-5-export default Mixin.create({ vault-1.0.2+dfsg2/ui/app/mixins/focus-on-insert.js:6: // selector passed to `this.$()` to find the element to focus vault-1.0.2+dfsg2/ui/app/mixins/focus-on-insert.js-7- // defaults to `'input'` ############################################## vault-1.0.2+dfsg2/ui/app/mixins/policy-edit-controller.js-14- .then(() => { vault-1.0.2+dfsg2/ui/app/mixins/policy-edit-controller.js:15: flash.success(`${policyType.toUpperCase()} policy "${name}" was successfully deleted.`); vault-1.0.2+dfsg2/ui/app/mixins/policy-edit-controller.js-16- return this.transitionToRoute('vault.cluster.policies', policyType); ############################################## vault-1.0.2+dfsg2/ui/app/mixins/policy-edit-controller.js-20- flash.danger( vault-1.0.2+dfsg2/ui/app/mixins/policy-edit-controller.js:21: `There was an error deleting the ${policyType.toUpperCase()} policy "${name}": ${errors}.` vault-1.0.2+dfsg2/ui/app/mixins/policy-edit-controller.js-22- ); ############################################## vault-1.0.2+dfsg2/ui/app/mixins/policy-edit-controller.js-32- .then(m => { vault-1.0.2+dfsg2/ui/app/mixins/policy-edit-controller.js:33: flash.success(`${policyType.toUpperCase()} policy "${name}" was successfully saved.`); vault-1.0.2+dfsg2/ui/app/mixins/policy-edit-controller.js-34- if (this.get('wizard.featureState') === 'create') { ############################################## vault-1.0.2+dfsg2/ui/app/models/auth-method.js-13- return function(...values) { vault-1.0.2+dfsg2/ui/app/models/auth-method.js:14: return `${strings[0]}${values[key]}${strings[1]}`; vault-1.0.2+dfsg2/ui/app/models/auth-method.js-15- }; ############################################## vault-1.0.2+dfsg2/ui/app/models/auth-method.js-43- apiPath: computed('path', function() { vault-1.0.2+dfsg2/ui/app/models/auth-method.js:44: return `auth/${this.get('path')}`; vault-1.0.2+dfsg2/ui/app/models/auth-method.js-45- }), ############################################## vault-1.0.2+dfsg2/ui/app/models/auth-method.js-101- if (type === 'aws') { vault-1.0.2+dfsg2/ui/app/models/auth-method.js:102: return configPath`auth/${0}/config/client`; vault-1.0.2+dfsg2/ui/app/models/auth-method.js-103- } else { vault-1.0.2+dfsg2/ui/app/models/auth-method.js:104: return configPath`auth/${0}/config`; vault-1.0.2+dfsg2/ui/app/models/auth-method.js-105- } ############################################## vault-1.0.2+dfsg2/ui/app/models/auth-method.js-119- vault-1.0.2+dfsg2/ui/app/models/auth-method.js:120: deletePath: lazyCapabilities(apiPath`sys/auth/${'id'}`, 'id'), vault-1.0.2+dfsg2/ui/app/models/auth-method.js-121- canDisable: alias('deletePath.canDelete'), ############################################## vault-1.0.2+dfsg2/ui/app/models/pki-ca-certificate.js-150- vault-1.0.2+dfsg2/ui/app/models/pki-ca-certificate.js:151: deletePath: lazyCapabilities(apiPath`${'backend'}/root`, 'backend'), vault-1.0.2+dfsg2/ui/app/models/pki-ca-certificate.js-152- canDeleteRoot: and('deletePath.canDelete', 'deletePath.canSudo'), ############################################## vault-1.0.2+dfsg2/ui/app/models/pki-certificate.js-128- vault-1.0.2+dfsg2/ui/app/models/pki-certificate.js:129: revokePath: lazyCapabilities(apiPath`${'backend'}/revoke`, 'backend'), vault-1.0.2+dfsg2/ui/app/models/pki-certificate.js-130- canRevoke: alias('revokePath.canUpdate'), ############################################## vault-1.0.2+dfsg2/ui/app/models/policy.js-14- vault-1.0.2+dfsg2/ui/app/models/policy.js:15: updatePath: lazyCapabilities(apiPath`sys/policies/${'policyType'}/${'id'}`, 'id', 'policyType'), vault-1.0.2+dfsg2/ui/app/models/policy.js-16- canDelete: alias('updatePath.canDelete'), ############################################## vault-1.0.2+dfsg2/ui/app/models/role-aws.js-65- vault-1.0.2+dfsg2/ui/app/models/role-aws.js:66: updatePath: lazyCapabilities(apiPath`${'backend'}/roles/${'id'}`, 'backend', 'id'), vault-1.0.2+dfsg2/ui/app/models/role-aws.js-67- canDelete: alias('updatePath.canDelete'), ############################################## vault-1.0.2+dfsg2/ui/app/models/role-aws.js-70- vault-1.0.2+dfsg2/ui/app/models/role-aws.js:71: generatePath: lazyCapabilities(apiPath`${'backend'}/creds/${'id'}`, 'backend', 'id'), vault-1.0.2+dfsg2/ui/app/models/role-aws.js-72- canGenerate: alias('generatePath.canUpdate'), ############################################## vault-1.0.2+dfsg2/ui/app/models/role-pki.js-112- vault-1.0.2+dfsg2/ui/app/models/role-pki.js:113: updatePath: lazyCapabilities(apiPath`${'backend'}/roles/${'id'}`, 'backend', 'id'), vault-1.0.2+dfsg2/ui/app/models/role-pki.js-114- canDelete: alias('updatePath.canDelete'), ############################################## vault-1.0.2+dfsg2/ui/app/models/role-pki.js-117- vault-1.0.2+dfsg2/ui/app/models/role-pki.js:118: generatePath: lazyCapabilities(apiPath`${'backend'}/issue/${'id'}`, 'backend', 'id'), vault-1.0.2+dfsg2/ui/app/models/role-pki.js-119- canGenerate: alias('generatePath.canUpdate'), vault-1.0.2+dfsg2/ui/app/models/role-pki.js-120- vault-1.0.2+dfsg2/ui/app/models/role-pki.js:121: signPath: lazyCapabilities(apiPath`${'backend'}/sign/${'id'}`, 'backend', 'id'), vault-1.0.2+dfsg2/ui/app/models/role-pki.js-122- canSign: alias('signPath.canUpdate'), vault-1.0.2+dfsg2/ui/app/models/role-pki.js-123- vault-1.0.2+dfsg2/ui/app/models/role-pki.js:124: signVerbatimPath: lazyCapabilities(apiPath`${'backend'}/sign-verbatim/${'id'}`, 'backend', 'id'), vault-1.0.2+dfsg2/ui/app/models/role-pki.js-125- canSignVerbatim: alias('signVerbatimPath.canUpdate'), ############################################## vault-1.0.2+dfsg2/ui/app/models/role-ssh.js-130- vault-1.0.2+dfsg2/ui/app/models/role-ssh.js:131: updatePath: lazyCapabilities(apiPath`${'backend'}/roles/${'id'}`, 'backend', 'id'), vault-1.0.2+dfsg2/ui/app/models/role-ssh.js-132- canDelete: alias('updatePath.canDelete'), ############################################## vault-1.0.2+dfsg2/ui/app/models/role-ssh.js-135- vault-1.0.2+dfsg2/ui/app/models/role-ssh.js:136: generatePath: lazyCapabilities(apiPath`${'backend'}/creds/${'id'}`, 'backend', 'id'), vault-1.0.2+dfsg2/ui/app/models/role-ssh.js-137- canGenerate: alias('generatePath.canUpdate'), vault-1.0.2+dfsg2/ui/app/models/role-ssh.js-138- vault-1.0.2+dfsg2/ui/app/models/role-ssh.js:139: signPath: lazyCapabilities(apiPath`${'backend'}/sign/${'id'}`, 'backend', 'id'), vault-1.0.2+dfsg2/ui/app/models/role-ssh.js-140- canSign: alias('signPath.canUpdate'), vault-1.0.2+dfsg2/ui/app/models/role-ssh.js-141- vault-1.0.2+dfsg2/ui/app/models/role-ssh.js:142: zeroAddressPath: lazyCapabilities(apiPath`${'backend'}/config/zeroaddress`, 'backend'), vault-1.0.2+dfsg2/ui/app/models/role-ssh.js-143- canEditZeroAddress: alias('zeroAddressPath.canUpdate'), ############################################## vault-1.0.2+dfsg2/ui/app/models/secret-v2.js-31- }), vault-1.0.2+dfsg2/ui/app/models/secret-v2.js:32: versionPath: lazyCapabilities(apiPath`${'engineId'}/data/${'id'}`, 'engineId', 'id'), vault-1.0.2+dfsg2/ui/app/models/secret-v2.js:33: secretPath: lazyCapabilities(apiPath`${'engineId'}/metadata/${'id'}`, 'engineId', 'id'), vault-1.0.2+dfsg2/ui/app/models/secret-v2.js-34- ############################################## vault-1.0.2+dfsg2/ui/app/models/secret.js-27- backend: attr('string'), vault-1.0.2+dfsg2/ui/app/models/secret.js:28: secretPath: lazyCapabilities(apiPath`${'backend'}/${'id'}`, 'backend', 'id'), vault-1.0.2+dfsg2/ui/app/models/secret.js-29- canEdit: alias('secretPath.canUpdate'), ############################################## vault-1.0.2+dfsg2/ui/app/models/transit-key.js-122- vault-1.0.2+dfsg2/ui/app/models/transit-key.js:123: rotatePath: lazyCapabilities(apiPath`${'backend'}/keys/${'id'}/rotate`, 'backend', 'id'), vault-1.0.2+dfsg2/ui/app/models/transit-key.js-124- canRotate: alias('rotatePath.canUpdate'), ############################################## vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/access/identity/aliases/add.js-7- let itemType = this.modelFor('vault.cluster.access.identity'); vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/access/identity/aliases/add.js:8: let modelType = `identity/${itemType}-alias`; vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/access/identity/aliases/add.js-9- return this.store.createRecord(modelType, { ############################################## vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/access/identity/aliases/edit.js-7- let itemType = this.modelFor('vault.cluster.access.identity'); vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/access/identity/aliases/edit.js:8: let modelType = `identity/${itemType}-alias`; vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/access/identity/aliases/edit.js-9- return this.store.findRecord(modelType, params.item_alias_id); ############################################## vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/access/identity/aliases/index.js-6- let itemType = this.modelFor('vault.cluster.access.identity'); vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/access/identity/aliases/index.js:7: let modelType = `identity/${itemType}-alias`; vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/access/identity/aliases/index.js-8- return this.store ############################################## vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/access/identity/aliases/show.js-11- let tabs = TABS[itemType]; vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/access/identity/aliases/show.js:12: let modelType = `identity/${itemType}`; vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/access/identity/aliases/show.js-13- if (!tabs.includes(section)) { ############################################## vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/access/identity/create.js-7- let itemType = this.modelFor('vault.cluster.access.identity'); vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/access/identity/create.js:8: let modelType = `identity/${itemType}`; vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/access/identity/create.js-9- return this.store.createRecord(modelType); ############################################## vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/access/identity/edit.js-7- let itemType = this.modelFor('vault.cluster.access.identity'); vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/access/identity/edit.js:8: let modelType = `identity/${itemType}`; vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/access/identity/edit.js-9- return this.store.findRecord(modelType, params.item_id); ############################################## vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/access/identity/index.js-6- let itemType = this.modelFor('vault.cluster.access.identity'); vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/access/identity/index.js:7: let modelType = `identity/${itemType}`; vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/access/identity/index.js-8- return this.store ############################################## vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/access/identity/show.js-12- let tabs = TABS[itemType]; vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/access/identity/show.js:13: let modelType = `identity/${itemType}`; vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/access/identity/show.js-14- if (!tabs.includes(section)) { ############################################## vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/access/leases/list.js-39- capabilities: hash({ vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/access/leases/list.js:40: revokePrefix: this.store.findRecord('capabilities', `sys/leases/revoke-prefix/${prefix}`), vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/access/leases/list.js:41: forceRevokePrefix: this.store.findRecord('capabilities', `sys/leases/revoke-force/${prefix}`), vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/access/leases/list.js-42- }), ############################################## vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/policies/create.js-20- } vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/policies/create.js:21: return this.store.createRecord(`policy/${policyType}`, {}); vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/policies/create.js-22- }, ############################################## vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/policies/index.js-25- return this.store vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/policies/index.js:26: .lazyPaginatedQuery(`policy/${policyType}`, { vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/policies/index.js-27- page: params.page, ############################################## vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/policy/show.js-16- return hash({ vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/policy/show.js:17: policy: this.store.findRecord(`policy/${type}`, params.policy_name), vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/policy/show.js:18: capabilities: this.store.findRecord('capabilities', `sys/policies/${type}/${params.policy_name}`), vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/policy/show.js-19- }); ############################################## vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/replication/mode/manage.js-9- if (action === 'reindex' || action === 'recover') { vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/replication/mode/manage.js:10: path = `sys/replication/${action}`; vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/replication/mode/manage.js-11- } else { vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/replication/mode/manage.js:12: path = `sys/replication/${replicationMode}/${clusterMode}/${action}`; vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/replication/mode/manage.js-13- } ############################################## vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/replication/mode/manage.js-28- return store.findRecord('capabilities', pathForAction(action)).then(capability => { vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/replication/mode/manage.js:29: model.set(`can${camelize(action)}`, capability.get('canUpdate')); vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/replication/mode/manage.js-30- }); ############################################## vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/replication/mode/secondaries.js-11- canAddSecondary: this.store vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/replication/mode/secondaries.js:12: .findRecord('capabilities', `sys/replication/${replicationMode}/primary/secondary-token`) vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/replication/mode/secondaries.js-13- .then(c => c.get('canUpdate')), vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/replication/mode/secondaries.js-14- canRevokeSecondary: this.store vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/replication/mode/secondaries.js:15: .findRecord('capabilities', `sys/replication/${replicationMode}/primary/revoke-secondary`) vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/replication/mode/secondaries.js-16- .then(c => c.get('canUpdate')), ############################################## vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/replication/mode/secondaries.js-27- if ( vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/replication/mode/secondaries.js:28: !model.get(`${replicationMode}.isPrimary`) || vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/replication/mode/secondaries.js:29: model.get(`${replicationMode}.replicationDisabled`) || vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/replication/mode/secondaries.js:30: model.get(`${replicationMode}.replicationUnsupported`) vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/replication/mode/secondaries.js-31- ) { ############################################## vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/replication/mode/secondaries/add.js-13- const replicationMode = this.get('replicationMode'); vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/replication/mode/secondaries/add.js:14: if (!model.cluster.get(`${replicationMode}.isPrimary`) || !model.cluster.get('canAddSecondary')) { vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/replication/mode/secondaries/add.js-15- return this.transitionTo('vault.cluster.replication.mode', model.cluster.get('name'), replicationMode); ############################################## vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/replication/mode/secondaries/config-create.js-19- flash.info( vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/replication/mode/secondaries/config-create.js:20: `${id} already had a mount filter config, so we loaded the config edit screen for you.` vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/replication/mode/secondaries/config-create.js-21- ); ############################################## vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/replication/mode/secondaries/config-create.js-40- replicationMode !== 'performance' || vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/replication/mode/secondaries/config-create.js:41: !cluster.get(`${replicationMode}.isPrimary`) || vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/replication/mode/secondaries/config-create.js-42- !cluster.get('canAddSecondary') ############################################## vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/replication/mode/secondaries/config-edit.js-20- replicationMode !== 'performance' || vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/replication/mode/secondaries/config-edit.js:21: !cluster.get(`${replicationMode}.isPrimary`) || vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/replication/mode/secondaries/config-edit.js-22- !cluster.get('canAddSecondary') ############################################## vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/replication/mode/secondaries/config-show.js-26- replicationMode !== 'performance' || vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/replication/mode/secondaries/config-show.js:27: !cluster.get(`${replicationMode}.isPrimary`) vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/replication/mode/secondaries/config-show.js-28- ) { ############################################## vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/replication/mode/secondaries/revoke.js-9- const replicationMode = this.get('replicationMode'); vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/replication/mode/secondaries/revoke.js:10: if (!model.get(`${replicationMode}.isPrimary`) || !model.get('canRevokeSecondary')) { vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/replication/mode/secondaries/revoke.js-11- return this.transitionTo('vault.cluster.replication', model.get('name')); ############################################## vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/secrets/backend/sign.js-12- return { vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/secrets/backend/sign.js:13: id: `${backend}/sign/${role}`, vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/secrets/backend/sign.js-14- }; ############################################## vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/secrets/backend/sign.js-34- }, vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/secrets/backend/sign.js:35: id: `${backend}-${role}`, vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/secrets/backend/sign.js-36- }); ############################################## vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/settings/auth/configure/section.js-24- }; vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/settings/auth/configure/section.js:25: return MODELS[`${backendType}-${section}`]; vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/settings/auth/configure/section.js-26- }, ############################################## vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/settings/configure-secret-backend.js-31- if (transition.targetName === this.routeName) { vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/settings/configure-secret-backend.js:32: return this.transitionTo(`${this.routeName}.section`, 'cert'); vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/settings/configure-secret-backend.js-33- } else { ############################################## vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/settings/configure-secret-backend/section.js-11- const backendModel = this.modelFor('vault.cluster.settings.configure-secret-backend'); vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/settings/configure-secret-backend/section.js:12: const modelType = `${backendModel.get('type')}-config`; vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/settings/configure-secret-backend/section.js-13- return this.store ############################################## vault-1.0.2+dfsg2/ui/app/serializers/pki-certificate.js-25- let model = { vault-1.0.2+dfsg2/ui/app/serializers/pki-certificate.js:26: id_for_nav: `cert/${key}`, vault-1.0.2+dfsg2/ui/app/serializers/pki-certificate.js-27- id: key, ############################################## vault-1.0.2+dfsg2/ui/app/services/auth.js-38- return (policies || []).includes('root') vault-1.0.2+dfsg2/ui/app/services/auth.js:39: ? `${TOKEN_PREFIX}${ROOT_PREFIX}${TOKEN_SEPARATOR}${clusterId}` vault-1.0.2+dfsg2/ui/app/services/auth.js:40: : `${TOKEN_PREFIX}${backend}${TOKEN_SEPARATOR}${clusterId}`; vault-1.0.2+dfsg2/ui/app/services/auth.js-41- }, ############################################## vault-1.0.2+dfsg2/ui/app/services/auth.js-43- backendFromTokenName(tokenName) { vault-1.0.2+dfsg2/ui/app/services/auth.js:44: return tokenName.includes(`${TOKEN_PREFIX}${ROOT_PREFIX}`) vault-1.0.2+dfsg2/ui/app/services/auth.js-45- ? 'token' ############################################## vault-1.0.2+dfsg2/ui/app/services/auth.js-51- tokenName && vault-1.0.2+dfsg2/ui/app/services/auth.js:52: tokenName.indexOf(`${TOKEN_PREFIX}${ROOT_PREFIX}`) === 0 && vault-1.0.2+dfsg2/ui/app/services/auth.js-53- this.environment() !== 'development' ############################################## vault-1.0.2+dfsg2/ui/app/services/control-group.js-19-const storageKey = (accessor, path) => { vault-1.0.2+dfsg2/ui/app/services/control-group.js:20: return `${CONTROL_GROUP_PREFIX}${accessor}${TOKEN_SEPARATOR}${path}`; vault-1.0.2+dfsg2/ui/app/services/control-group.js-21-}; ############################################## vault-1.0.2+dfsg2/ui/app/services/control-group.js-128- let lines = [ vault-1.0.2+dfsg2/ui/app/services/control-group.js:129: `A Control Group was encountered at ${error.creation_path}.`, vault-1.0.2+dfsg2/ui/app/services/control-group.js:130: `The Control Group Token is ${error.token}.`, vault-1.0.2+dfsg2/ui/app/services/control-group.js:131: `The Accessor is ${error.accessor}.`, vault-1.0.2+dfsg2/ui/app/services/control-group.js:132: `Visit <a href='${href}'>${href}</a> for more details.`, vault-1.0.2+dfsg2/ui/app/services/control-group.js-133- ]; ############################################## vault-1.0.2+dfsg2/ui/app/services/namespace.js-44- if (userRoot) { vault-1.0.2+dfsg2/ui/app/services/namespace.js:45: fullNS = `${userRoot}/${n}`; vault-1.0.2+dfsg2/ui/app/services/namespace.js-46- } ############################################## vault-1.0.2+dfsg2/ui/app/services/wizard.js-187- case 'render': vault-1.0.2+dfsg2/ui/app/services/wizard.js:188: this.set(`${action.level}Component`, action.component); vault-1.0.2+dfsg2/ui/app/services/wizard.js-189- break; ############################################## vault-1.0.2+dfsg2/ui/app/utils/trim-right.js-5- let prefix = isExtension ? '\\' : ''; vault-1.0.2+dfsg2/ui/app/utils/trim-right.js:6: let trimRegex = new RegExp(endings.map(ext => `${prefix}${ext}$`).join('|')); vault-1.0.2+dfsg2/ui/app/utils/trim-right.js-7- return str.replace(trimRegex, ''); ############################################## vault-1.0.2+dfsg2/ui/scripts/list-templates.js-12- // 'app/templates/path/to/file/filename' vault-1.0.2+dfsg2/ui/scripts/list-templates.js:13: return `app/${path.replace(/\.hbs$/, '')}`; vault-1.0.2+dfsg2/ui/scripts/list-templates.js-14-}); ############################################## vault-1.0.2+dfsg2/ui/scripts/start-vault.js-44- path.join(process.cwd(), 'tests/helpers/vault-keys.js'), vault-1.0.2+dfsg2/ui/scripts/start-vault.js:45: `export default ${JSON.stringify({ unseal, root }, null, 2)}` vault-1.0.2+dfsg2/ui/scripts/start-vault.js-46- ); ############################################## vault-1.0.2+dfsg2/ui/scripts/start-vault.js-56-vault.on('close', function(code) { vault-1.0.2+dfsg2/ui/scripts/start-vault.js:57: console.log(`child process exited with code ${code}`); vault-1.0.2+dfsg2/ui/scripts/start-vault.js-58- process.exit(); ############################################## vault-1.0.2+dfsg2/ui/scripts/start-vault.js-60-vault.on('error', function(error) { vault-1.0.2+dfsg2/ui/scripts/start-vault.js:61: console.log(`child process errored: ${error}`); vault-1.0.2+dfsg2/ui/scripts/start-vault.js-62- process.exit(); ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-alias-tests.js-26- 'Successfully saved', vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-alias-tests.js:27: `${itemType}: shows a flash message` vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-alias-tests.js-28- ) ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-alias-tests.js-38- ); vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-alias-tests.js:39: assert.ok(aliasShowPage.nameContains(name), `${itemType}: renders the name on the show page`); vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-alias-tests.js-40- ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-alias-tests.js-44- 1, vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-alias-tests.js:45: `${itemType}: lists the entity in the entity list` vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-alias-tests.js-46- ); ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-alias-tests.js-54- 'Successfully deleted', vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-alias-tests.js:55: `${itemType}: shows flash message` vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-alias-tests.js-56- ); ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-alias-tests.js-58- vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-alias-tests.js:59: assert.equal(aliasIndexPage.items.filterBy('id', aliasID).length, 0, `${itemType}: the row is deleted`); vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-alias-tests.js-60-}; ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-alias-tests.js-84- 'vault.cluster.access.identity.aliases.edit', vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-alias-tests.js:85: `${itemType}: navigates to edit on create` vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-alias-tests.js-86- ); ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-alias-tests.js-91- 'Successfully deleted', vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-alias-tests.js:92: `${itemType}: shows flash message` vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-alias-tests.js-93- ); ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-alias-tests.js-98- 'vault.cluster.access.identity.aliases.index', vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-alias-tests.js:99: `${itemType}: navigates to list page on delete` vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-alias-tests.js-100- ); ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-alias-tests.js-103- 0, vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-alias-tests.js:104: `${itemType}: the row does not show in the list` vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-alias-tests.js-105- ); ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-tests.js-12- 'Successfully saved', vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-tests.js:13: `${itemType}: shows a flash message` vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-tests.js-14- ) ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-tests.js-19- 'vault.cluster.access.identity.show', vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-tests.js:20: `${itemType}: navigates to show on create` vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-tests.js-21- ); vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-tests.js:22: assert.ok(showPage.nameContains(name), `${itemType}: renders the name on the show page`); vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-tests.js-23- ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-tests.js-27- 1, vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-tests.js:28: `${itemType}: lists the entity in the entity list` vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-tests.js-29- ); ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-tests.js-35- 'Successfully deleted', vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-tests.js:36: `${itemType}: shows flash message` vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-tests.js-37- ) ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-tests.js-39- }); vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-tests.js:40: assert.equal(indexPage.items.filterBy('name', name).length, 0, `${itemType}: the row is deleted`); vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-tests.js-41-}; ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-tests.js-50- 'vault.cluster.access.identity.edit', vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-tests.js:51: `${itemType}: navigates to edit on create` vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-tests.js-52- ); ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-tests.js-57- 'Successfully deleted', vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-tests.js:58: `${itemType}: shows flash message` vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-tests.js-59- ) ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-tests.js-64- 'vault.cluster.access.identity.index', vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-tests.js:65: `${itemType}: navigates to list page on delete` vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-tests.js-66- ); ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-tests.js-69- 0, vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-tests.js:70: `${itemType}: the row does not show in the list` vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-tests.js-71- ); ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/entities/aliases/create-test.js-13- test('it allows create, list, delete of an entity alias', async function(assert) { vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/entities/aliases/create-test.js:14: let name = `alias-${Date.now()}`; vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/entities/aliases/create-test.js-15- await testAliasCRUD(name, 'entities', assert); ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/entities/aliases/create-test.js-18- test('it allows delete from the edit form', async function(assert) { vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/entities/aliases/create-test.js:19: let name = `alias-${Date.now()}`; vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/entities/aliases/create-test.js-20- await testAliasDeleteFromForm(name, 'entities', assert); ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/entities/create-test.js-24- test('it allows create, list, delete of an entity', async function(assert) { vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/entities/create-test.js:25: let name = `entity-${Date.now()}`; vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/entities/create-test.js-26- await testCRUD(name, 'entities', assert); ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/entities/create-test.js-29- test('it can be deleted from the edit form', async function(assert) { vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/entities/create-test.js:30: let name = `entity-${Date.now()}`; vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/entities/create-test.js-31- await testDeleteFromForm(name, 'entities', assert); ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/groups/aliases/create-test.js-13- test('it allows create, list, delete of an entity alias', async function(assert) { vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/groups/aliases/create-test.js:14: let name = `alias-${Date.now()}`; vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/groups/aliases/create-test.js-15- await testAliasCRUD(name, 'groups', assert); ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/groups/aliases/create-test.js-18- test('it allows delete from the edit form', async function(assert) { vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/groups/aliases/create-test.js:19: let name = `alias-${Date.now()}`; vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/groups/aliases/create-test.js-20- await testAliasDeleteFromForm(name, 'groups', assert); ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/groups/create-test.js-24- test('it allows create, list, delete of an group', async function(assert) { vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/groups/create-test.js:25: let name = `group-${Date.now()}`; vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/groups/create-test.js-26- await testCRUD(name, 'groups', assert); ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/groups/create-test.js-29- test('it can be deleted from the group edit form', async function(assert) { vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/groups/create-test.js:30: let name = `group-${Date.now()}`; vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/groups/create-test.js-31- await testDeleteFromForm(name, 'groups', assert); ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/auth-test.js-38- for (let backend of backends.reverse()) { vault-1.0.2+dfsg2/ui/tests/acceptance/auth-test.js:39: await click(`[data-test-auth-method-link="${backend.type}"]`); vault-1.0.2+dfsg2/ui/tests/acceptance/auth-test.js-40- assert.equal( vault-1.0.2+dfsg2/ui/tests/acceptance/auth-test.js-41- currentURL(), vault-1.0.2+dfsg2/ui/tests/acceptance/auth-test.js:42: `/vault/auth?with=${backend.type}`, vault-1.0.2+dfsg2/ui/tests/acceptance/auth-test.js:43: `has the correct URL for ${backend.type}` vault-1.0.2+dfsg2/ui/tests/acceptance/auth-test.js-44- ); ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/auth-test.js-62- for (let backend of backends.reverse()) { vault-1.0.2+dfsg2/ui/tests/acceptance/auth-test.js:63: await click(`[data-test-auth-method-link="${backend.type}"]`); vault-1.0.2+dfsg2/ui/tests/acceptance/auth-test.js-64- if (backend.type === 'github') { ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/auth-test.js-77- } else { vault-1.0.2+dfsg2/ui/tests/acceptance/auth-test.js:78: assert.ok(Object.keys(body).includes('password'), `${backend.type} includes password`); vault-1.0.2+dfsg2/ui/tests/acceptance/auth-test.js-79- } ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/aws-test.js-31- const now = new Date().getTime(); vault-1.0.2+dfsg2/ui/tests/acceptance/aws-test.js:32: const path = `aws-${now}`; vault-1.0.2+dfsg2/ui/tests/acceptance/aws-test.js-33- const roleName = 'awsrole'; ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/aws-test.js-37- await click('[data-test-secret-backend-configure]'); vault-1.0.2+dfsg2/ui/tests/acceptance/aws-test.js:38: assert.equal(currentURL(), `/vault/settings/secrets/configure/${path}`); vault-1.0.2+dfsg2/ui/tests/acceptance/aws-test.js-39- assert.ok(findAll('[data-test-aws-root-creds-form]').length, 'renders the empty root creds form'); ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/aws-test.js-61- await click('[data-test-backend-view-link]'); vault-1.0.2+dfsg2/ui/tests/acceptance/aws-test.js:62: assert.equal(currentURL(), `/vault/secrets/${path}/list`, `navigates to the roles list`); vault-1.0.2+dfsg2/ui/tests/acceptance/aws-test.js-63- ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/aws-test.js-76- currentURL(), vault-1.0.2+dfsg2/ui/tests/acceptance/aws-test.js:77: `/vault/secrets/${path}/show/${roleName}`, vault-1.0.2+dfsg2/ui/tests/acceptance/aws-test.js:78: `$aws: navigates to the show page on creation` vault-1.0.2+dfsg2/ui/tests/acceptance/aws-test.js-79- ); ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/aws-test.js-82- vault-1.0.2+dfsg2/ui/tests/acceptance/aws-test.js:83: assert.equal(currentURL(), `/vault/secrets/${path}/list`); vault-1.0.2+dfsg2/ui/tests/acceptance/aws-test.js:84: assert.ok(findAll(`[data-test-secret-link="${roleName}"]`).length, `aws: role shows in the list`); vault-1.0.2+dfsg2/ui/tests/acceptance/aws-test.js-85- vault-1.0.2+dfsg2/ui/tests/acceptance/aws-test.js-86- //and delete vault-1.0.2+dfsg2/ui/tests/acceptance/aws-test.js:87: await click(`[data-test-secret-link="${roleName}"] [data-test-popup-menu-trigger]`); vault-1.0.2+dfsg2/ui/tests/acceptance/aws-test.js:88: await click(`[data-test-aws-role-delete="${roleName}"] button`); vault-1.0.2+dfsg2/ui/tests/acceptance/aws-test.js-89- ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/aws-test.js-91- await settled(); vault-1.0.2+dfsg2/ui/tests/acceptance/aws-test.js:92: assert.dom(`[data-test-secret-link="${roleName}"]`).doesNotExist(`aws: role is no longer in the list`); vault-1.0.2+dfsg2/ui/tests/acceptance/aws-test.js-93- }); ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/console-test.js-23- for (let num of [1, 2, 3]) { vault-1.0.2+dfsg2/ui/tests/acceptance/console-test.js:24: let inputString = `write sys/mounts/${now + num} type=kv`; vault-1.0.2+dfsg2/ui/tests/acceptance/console-test.js-25- await consoleComponent.runCommands(inputString); ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/enterprise-control-groups-test.js-66- 'write sys/auth/userpass type=userpass', vault-1.0.2+dfsg2/ui/tests/acceptance/enterprise-control-groups-test.js:67: `write auth/userpass/users/${ADMIN_USER} password=${ADMIN_PASSWORD} policies=default`, vault-1.0.2+dfsg2/ui/tests/acceptance/enterprise-control-groups-test.js:68: `write identity/entity name=${ADMIN_USER} policies=test`, vault-1.0.2+dfsg2/ui/tests/acceptance/enterprise-control-groups-test.js-69- // write policies for control group + authorization vault-1.0.2+dfsg2/ui/tests/acceptance/enterprise-control-groups-test.js:70: `write sys/policies/acl/kv-control-group policy=${POLICY}`, vault-1.0.2+dfsg2/ui/tests/acceptance/enterprise-control-groups-test.js:71: `write sys/policies/acl/authorizer policy=${AUTHORIZER_POLICY}`, vault-1.0.2+dfsg2/ui/tests/acceptance/enterprise-control-groups-test.js-72- // read out mount to get the accessor ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/enterprise-control-groups-test.js-77- // lookup entity id for our authorizer vault-1.0.2+dfsg2/ui/tests/acceptance/enterprise-control-groups-test.js:78: `write -field=id identity/lookup/entity name=${ADMIN_USER}`, vault-1.0.2+dfsg2/ui/tests/acceptance/enterprise-control-groups-test.js-79- ]); ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/enterprise-control-groups-test.js-82- // create alias for authorizor and add them to the managers group vault-1.0.2+dfsg2/ui/tests/acceptance/enterprise-control-groups-test.js:83: `write identity/alias mount_accessor=${userpassAccessor} entity_id=${authorizerEntityId} name=${ADMIN_USER}`, vault-1.0.2+dfsg2/ui/tests/acceptance/enterprise-control-groups-test.js:84: `write identity/group name=managers member_entity_ids=${authorizerEntityId} policies=authorizer`, vault-1.0.2+dfsg2/ui/tests/acceptance/enterprise-control-groups-test.js-85- // create a token to request access to kv/foo ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/enterprise-control-groups-test.js-122- await authFormComponent.login(); vault-1.0.2+dfsg2/ui/tests/acceptance/enterprise-control-groups-test.js:123: await visit(`/vault/access/control-groups/${accessor}`); vault-1.0.2+dfsg2/ui/tests/acceptance/enterprise-control-groups-test.js-124- await controlGroupComponent.authorize(); ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/enterprise-control-groups-test.js-141- ); vault-1.0.2+dfsg2/ui/tests/acceptance/enterprise-control-groups-test.js:142: await visit(`/vault/access/control-groups/${accessor}`); vault-1.0.2+dfsg2/ui/tests/acceptance/enterprise-control-groups-test.js-143- assert.ok(controlGroupSuccessComponent.showsNavigateMessage, 'shows user the navigate message'); ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/enterprise-control-groups-test.js-146- } else { vault-1.0.2+dfsg2/ui/tests/acceptance/enterprise-control-groups-test.js:147: await visit(`/vault/access/control-groups/${accessor}`); vault-1.0.2+dfsg2/ui/tests/acceptance/enterprise-control-groups-test.js-148- await controlGroupSuccessComponent.token(controlGroupToken); ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/enterprise-replication-test.js-9- // disable performance replication vault-1.0.2+dfsg2/ui/tests/acceptance/enterprise-replication-test.js:10: await visit(`/vault/replication/${type}`); vault-1.0.2+dfsg2/ui/tests/acceptance/enterprise-replication-test.js-11- if (findAll('[data-test-replication-link="manage"]').length) { ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/enterprise-replication-test.js-15- if (assert) { vault-1.0.2+dfsg2/ui/tests/acceptance/enterprise-replication-test.js:16: assert.equal(currentURL(), `/vault/replication/${type}/manage`, 'redirects to the replication page'); vault-1.0.2+dfsg2/ui/tests/acceptance/enterprise-replication-test.js-17- assert.equal( ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/enterprise-replication-test.js-65- await fillIn('[data-test-replication-filter-mount-mode]', mode); vault-1.0.2+dfsg2/ui/tests/acceptance/enterprise-replication-test.js:66: await click(findAll(`[data-test-mount-filter="${mountType}"]`)[0]); vault-1.0.2+dfsg2/ui/tests/acceptance/enterprise-replication-test.js:67: mountPath = findAll(`[data-test-mount-filter-path-for-type="${mountType}"]`)[0].textContent.trim(); vault-1.0.2+dfsg2/ui/tests/acceptance/enterprise-replication-test.js-68- await click('[data-test-secondary-add]'); ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/enterprise-replication-test.js-76- await click('[data-test-replication-mount-filter-link]'); vault-1.0.2+dfsg2/ui/tests/acceptance/enterprise-replication-test.js:77: assert.equal(currentURL(), `/vault/replication/performance/secondaries/config/show/${secondaryName}`); vault-1.0.2+dfsg2/ui/tests/acceptance/enterprise-replication-test.js-78- assert.ok( ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/enterprise-replication-test.js-95- findAll('[data-test-flash-message-body]')[0].textContent.trim(), vault-1.0.2+dfsg2/ui/tests/acceptance/enterprise-replication-test.js:96: `The performance mount filter config for the secondary ${secondaryName} was successfully deleted.`, vault-1.0.2+dfsg2/ui/tests/acceptance/enterprise-replication-test.js-97- 'renders success flash upon deletion' ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/init-test.js-98- for (let attr of ['recovery_shares', 'recovery_threshold']) { vault-1.0.2+dfsg2/ui/tests/acceptance/init-test.js:99: assert.ok(requestBody[attr], `requestBody includes cloud seal specific attribute: ${attr}`); vault-1.0.2+dfsg2/ui/tests/acceptance/init-test.js-100- } ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/init-test.js-113- for (let attr of ['recovery_shares', 'recovery_threshold']) { vault-1.0.2+dfsg2/ui/tests/acceptance/init-test.js:114: assert.notOk(requestBody[attr], `requestBody does not include cloud seal specific attribute: ${attr}`); vault-1.0.2+dfsg2/ui/tests/acceptance/init-test.js-115- } ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/leases-test.js-20- await authPage.login(); vault-1.0.2+dfsg2/ui/tests/acceptance/leases-test.js:21: this.enginePath = `kv-for-lease-${new Date().getTime()}`; vault-1.0.2+dfsg2/ui/tests/acceptance/leases-test.js-22- // need a version 1 mount for leased secrets here ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/leases-test.js-35- const createSecret = async (context, isRenewable) => { vault-1.0.2+dfsg2/ui/tests/acceptance/leases-test.js:36: context.name = `secret-${new Date().getTime()}`; vault-1.0.2+dfsg2/ui/tests/acceptance/leases-test.js-37- await secretList.visitRoot({ backend: context.enginePath }); ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/leases-test.js-47- await visit('/vault/access/leases/'); vault-1.0.2+dfsg2/ui/tests/acceptance/leases-test.js:48: await click(`[data-test-lease-link="${context.enginePath}/"]`); vault-1.0.2+dfsg2/ui/tests/acceptance/leases-test.js:49: await click(`[data-test-lease-link="${context.enginePath}/${context.name}/"]`); vault-1.0.2+dfsg2/ui/tests/acceptance/leases-test.js-50- await click(`[data-test-lease-link]:eq(0)`); ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/leases-test.js-89- ); vault-1.0.2+dfsg2/ui/tests/acceptance/leases-test.js:90: await click(`[data-test-lease-link="${this.enginePath}/"]`); vault-1.0.2+dfsg2/ui/tests/acceptance/leases-test.js-91- await click('[data-test-lease-link="data/"]'); vault-1.0.2+dfsg2/ui/tests/acceptance/leases-test.js-92- assert vault-1.0.2+dfsg2/ui/tests/acceptance/leases-test.js:93: .dom(`[data-test-lease-link="${this.enginePath}/data/${this.name}/"]`) vault-1.0.2+dfsg2/ui/tests/acceptance/leases-test.js-94- .doesNotExist('link to the lease was removed with revocation'); ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/leases-test.js-98- createSecret(this); vault-1.0.2+dfsg2/ui/tests/acceptance/leases-test.js:99: await visit(`/vault/access/leases/list/${this.enginePath}`); vault-1.0.2+dfsg2/ui/tests/acceptance/leases-test.js-100- await click('[data-test-lease-revoke-prefix] button'); ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/leases-test.js-107- assert vault-1.0.2+dfsg2/ui/tests/acceptance/leases-test.js:108: .dom(`[data-test-lease-link="${this.enginePath}/"]`) vault-1.0.2+dfsg2/ui/tests/acceptance/leases-test.js-109- .doesNotExist('link to the prefix was removed with revocation'); ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/policies-acl-old-test.js-16- const policyString = 'path "*" { capabilities = ["update"]}'; vault-1.0.2+dfsg2/ui/tests/acceptance/policies-acl-old-test.js:17: const policyName = `Policy test ${now}`; vault-1.0.2+dfsg2/ui/tests/acceptance/policies-acl-old-test.js-18- const policyLower = policyName.toLowerCase(); ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/policies-acl-old-test.js-29- currentURL(), vault-1.0.2+dfsg2/ui/tests/acceptance/policies-acl-old-test.js:30: `/vault/policy/acl/${encodeURIComponent(policyLower)}`, vault-1.0.2+dfsg2/ui/tests/acceptance/policies-acl-old-test.js-31- 'navigates to policy show on successful save' ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/policies-acl-old-test.js-36- assert vault-1.0.2+dfsg2/ui/tests/acceptance/policies-acl-old-test.js:37: .dom(`[data-test-policy-link="${policyLower}"]`) vault-1.0.2+dfsg2/ui/tests/acceptance/policies-acl-old-test.js-38- .exists({ count: 1 }, 'new policy shown in the list'); ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/policies-acl-old-test.js-40- // policy deletion vault-1.0.2+dfsg2/ui/tests/acceptance/policies-acl-old-test.js:41: await click(`[data-test-policy-link="${policyLower}"]`); vault-1.0.2+dfsg2/ui/tests/acceptance/policies-acl-old-test.js-42- await click('[data-test-policy-edit-toggle]'); ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/policies-acl-old-test.js-46- assert vault-1.0.2+dfsg2/ui/tests/acceptance/policies-acl-old-test.js:47: .dom(`[data-test-policy-item="${policyLower}"]`) vault-1.0.2+dfsg2/ui/tests/acceptance/policies-acl-old-test.js-48- .doesNotExist('deleted policy is not shown in the list'); ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/policies-acl-old-test.js-54- const policyString = 'path "*" { capabilities = ["update"]}'; vault-1.0.2+dfsg2/ui/tests/acceptance/policies-acl-old-test.js:55: const policyName = `${now}-symbol,.`; vault-1.0.2+dfsg2/ui/tests/acceptance/policies-acl-old-test.js-56- ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/policies-acl-old-test.js-64- currentURL(), vault-1.0.2+dfsg2/ui/tests/acceptance/policies-acl-old-test.js:65: `/vault/policy/acl/${policyName}`, vault-1.0.2+dfsg2/ui/tests/acceptance/policies-acl-old-test.js-66- 'navigates to policy show on successful save' ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/policies/index-test.js-35- let policyName = 'list.policy'; vault-1.0.2+dfsg2/ui/tests/acceptance/policies/index-test.js:36: await consoleComponent.runCommands([`write sys/policies/acl/${policyName} policy='${POLICY}'`]); vault-1.0.2+dfsg2/ui/tests/acceptance/policies/index-test.js-37- await page.visit({ type: 'acl' }); ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/alicloud/secret-test.js-16- test('enable alicloud', async function(assert) { vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/alicloud/secret-test.js:17: let enginePath = `alicloud-${new Date().getTime()}`; vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/alicloud/secret-test.js-18- await mountSecrets.visit(); ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/alicloud/secret-test.js-28- vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/alicloud/secret-test.js:29: assert.ok(backendsPage.rows.filterBy('path', `${enginePath}/`)[0], 'shows the alicloud engine'); vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/alicloud/secret-test.js-30- }); ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/cubbyhole/secret-test.js-22- test('it creates and can view a secret with the cubbyhole backend', async function(assert) { vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/cubbyhole/secret-test.js:23: const kvPath = `cubbyhole-kv-${new Date().getTime()}`; vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/cubbyhole/secret-test.js-24- await listPage.visitRoot({ backend: 'cubbyhole' }); ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/engines-test.js-16- // first mount an engine so we can disable it. vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/engines-test.js:17: let enginePath = `alicloud-${new Date().getTime()}`; vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/engines-test.js-18- await mountSecrets.enable('alicloud', enginePath); vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/engines-test.js-19- vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/engines-test.js:20: assert.ok(backendsPage.rows.filterBy('path', `${enginePath}/`)[0], 'shows the mounted engine'); vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/engines-test.js-21- vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/engines-test.js-22- await backendsPage.visit(); vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/engines-test.js:23: let row = backendsPage.rows.filterBy('path', `${enginePath}/`)[0]; vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/engines-test.js-24- await row.menu(); ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/engines-test.js-30- assert.equal( vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/engines-test.js:31: backendsPage.rows.filterBy('path', `${enginePath}/`).length, vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/engines-test.js-32- 0, ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/gcpkms/secrets-test.js-16- test('enable gcpkms', async function(assert) { vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/gcpkms/secrets-test.js:17: let enginePath = `gcpkms-${new Date().getTime()}`; vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/gcpkms/secrets-test.js-18- await mountSecrets.visit(); ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/gcpkms/secrets-test.js-28- vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/gcpkms/secrets-test.js:29: assert.ok(backendsPage.rows.filterBy('path', `${enginePath}/`)[0], 'shows the gcpkms engine'); vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/gcpkms/secrets-test.js-30- }); ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/generic/secret-test.js-28- test('it creates and can view a secret with the generic backend', async function(assert) { vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/generic/secret-test.js:29: const path = `generic-${new Date().getTime()}`; vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/generic/secret-test.js:30: const kvPath = `generic-kv-${new Date().getTime()}`; vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/generic/secret-test.js:31: cli.consoleInput(`write sys/mounts/${path} type=generic`); vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/generic/secret-test.js-32- cli.enter(); vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/generic/secret-test.js:33: cli.consoleInput(`write ${path}/foo bar=baz`); vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/generic/secret-test.js-34- cli.enter(); ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/generic/secret-test.js-45- test('upgrading generic to version 2 lists all existing secrets, and CRUD continues to work', async function(assert) { vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/generic/secret-test.js:46: const path = `generic-${new Date().getTime()}`; vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/generic/secret-test.js:47: const kvPath = `generic-kv-${new Date().getTime()}`; vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/generic/secret-test.js:48: cli.consoleInput(`write sys/mounts/${path} type=generic`); vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/generic/secret-test.js-49- cli.enter(); vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/generic/secret-test.js:50: cli.consoleInput(`write ${path}/foo bar=baz`); vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/generic/secret-test.js-51- cli.enter(); vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/generic/secret-test.js-52- // upgrade to version 2 generic mount vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/generic/secret-test.js:53: cli.consoleInput(`write sys/mounts/${path}/tune options=version=2`); vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/generic/secret-test.js-54- cli.enter(); ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/kv/secret-test.js-37- test('it creates a secret and redirects', async function(assert) { vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/kv/secret-test.js:38: const path = `kv-path-${new Date().getTime()}`; vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/kv/secret-test.js-39- await listPage.visitRoot({ backend: 'secret' }); ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/kv/secret-test.js-50- test('it can create a secret when check-and-set is required', async function(assert) { vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/kv/secret-test.js:51: let enginePath = `kv-${new Date().getTime()}`; vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/kv/secret-test.js-52- let secretPath = 'foo/bar'; ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/kv/secret-test.js-54- await mountSecrets.enable('kv', enginePath); vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/kv/secret-test.js:55: await consoleComponent.runCommands(`write ${enginePath}/config cas_required=true`); vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/kv/secret-test.js-56- await writeSecret(enginePath, secretPath, 'foo', 'bar'); ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/kv/secret-test.js-61- test('version 1 performs the correct capabilities lookup', async function(assert) { vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/kv/secret-test.js:62: let enginePath = `kv-${new Date().getTime()}`; vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/kv/secret-test.js-63- let secretPath = 'foo/bar'; ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/kv/secret-test.js-83- test('version 1: nested paths creation maintains ability to navigate the tree', async function(assert) { vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/kv/secret-test.js:84: let enginePath = `kv-${new Date().getTime()}`; vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/kv/secret-test.js-85- let secretPath = '1/2/3/4'; ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/kv/secret-test.js-126- assert.equal(currentRouteName(), 'vault.cluster.secrets.backend.list'); vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/kv/secret-test.js:127: assert.equal(currentURL(), `/vault/secrets/${enginePath}/list/1/2/3/`, 'remains on the page'); vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/kv/secret-test.js-128- ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/kv/secret-test.js-135- currentURL(), vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/kv/secret-test.js:136: `/vault/secrets/${enginePath}/list/1/`, vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/kv/secret-test.js-137- 'navigates to the ancestor created earlier' ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/kv/secret-test.js-152- test('it redirects to the path ending in / for list pages', async function(assert) { vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/kv/secret-test.js:153: const path = `foo/bar/kv-path-${new Date().getTime()}`; vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/kv/secret-test.js-154- await listPage.visitRoot({ backend: 'secret' }); ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/kv/secret-test.js-163- let content = JSON.stringify({ foo: 'fa', bar: 'boo' }); vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/kv/secret-test.js:164: const path = `kv-path-${new Date().getTime()}`; vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/kv/secret-test.js-165- await listPage.visitRoot({ backend: 'secret' }); ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/kv/secret-test.js-190- await consoleComponent.runCommands([ vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/kv/secret-test.js:191: `write sys/mounts/${backend} type=kv options=version=2`, vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/kv/secret-test.js:192: `write sys/policies/acl/kv-v2-degrade policy=${V2_POLICY}`, vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/kv/secret-test.js-193- // delete any kv previously written here so that tests can be re-run ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/kv/secret-test.js-218- await consoleComponent.runCommands([ vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/kv/secret-test.js:219: `write sys/mounts/${backend} type=kv options=version=2`, vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/kv/secret-test.js:220: `write sys/policies/acl/kv-v2-degrade policy=${V2_POLICY}`, vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/kv/secret-test.js-221- // delete any kv previously written here so that tests can be re-run ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/pki/cert-test.js-38- const setup = async (assert, action = 'issue') => { vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/pki/cert-test.js:39: const path = `pki-${new Date().getTime()}`; vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/pki/cert-test.js-40- const roleName = 'role'; ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/pki/list-test.js-15- const mountAndNav = async () => { vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/pki/list-test.js:16: const path = `pki-${new Date().getTime()}`; vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/pki/list-test.js-17- await enablePage.enable('pki', path); ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/pki/role-test.js-17- const mountAndNav = async () => { vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/pki/role-test.js:18: const path = `pki-${new Date().getTime()}`; vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/pki/role-test.js-19- await enablePage.enable('pki', path); ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/settings-test.js-23- const type = 'consul'; vault-1.0.2+dfsg2/ui/tests/acceptance/settings-test.js:24: const path = `path-${now}`; vault-1.0.2+dfsg2/ui/tests/acceptance/settings-test.js-25- ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/settings-test.js-41- find('[data-test-flash-message]').textContent.trim(), vault-1.0.2+dfsg2/ui/tests/acceptance/settings-test.js:42: `Successfully mounted '${type}' at '${path}'!` vault-1.0.2+dfsg2/ui/tests/acceptance/settings-test.js-43- ); ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/settings/auth/configure/index-test.js-15- test('it redirects to section options when there are no other sections', async function(assert) { vault-1.0.2+dfsg2/ui/tests/acceptance/settings/auth/configure/index-test.js:16: const path = `approle-${new Date().getTime()}`; vault-1.0.2+dfsg2/ui/tests/acceptance/settings/auth/configure/index-test.js-17- const type = 'approle'; ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/settings/auth/configure/index-test.js-20- assert.equal(currentRouteName(), 'vault.cluster.settings.auth.configure.section'); vault-1.0.2+dfsg2/ui/tests/acceptance/settings/auth/configure/index-test.js:21: assert.equal(currentURL(), `/vault/settings/auth/configure/${path}/options`, 'loads the options route'); vault-1.0.2+dfsg2/ui/tests/acceptance/settings/auth/configure/index-test.js-22- }); ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/settings/auth/configure/index-test.js-24- test('it redirects to the first section', async function(assert) { vault-1.0.2+dfsg2/ui/tests/acceptance/settings/auth/configure/index-test.js:25: const path = `aws-${new Date().getTime()}`; vault-1.0.2+dfsg2/ui/tests/acceptance/settings/auth/configure/index-test.js-26- const type = 'aws'; ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/settings/auth/configure/index-test.js-31- currentURL(), vault-1.0.2+dfsg2/ui/tests/acceptance/settings/auth/configure/index-test.js:32: `/vault/settings/auth/configure/${path}/client`, vault-1.0.2+dfsg2/ui/tests/acceptance/settings/auth/configure/index-test.js-33- 'loads the first section for the type of auth method' ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/settings/auth/configure/section-test.js-26- test('it can save options', async function(assert) { vault-1.0.2+dfsg2/ui/tests/acceptance/settings/auth/configure/section-test.js:27: const path = `approle-${new Date().getTime()}`; vault-1.0.2+dfsg2/ui/tests/acceptance/settings/auth/configure/section-test.js-28- const type = 'approle'; ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/settings/auth/configure/section-test.js-39- }); vault-1.0.2+dfsg2/ui/tests/acceptance/settings/auth/configure/section-test.js:40: let tuneRequest = this.server.passthroughRequests.filterBy('url', `/v1/sys/mounts/auth/${path}/tune`)[0]; vault-1.0.2+dfsg2/ui/tests/acceptance/settings/auth/configure/section-test.js-41- let keys = Object.keys(JSON.parse(tuneRequest.requestBody)); ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/settings/auth/configure/section-test.js-46- for (let type of ['aws', 'azure', 'gcp', 'github', 'kubernetes', 'ldap', 'okta', 'radius']) { vault-1.0.2+dfsg2/ui/tests/acceptance/settings/auth/configure/section-test.js:47: test(`it shows tabs for auth method: ${type}`, async assert => { vault-1.0.2+dfsg2/ui/tests/acceptance/settings/auth/configure/section-test.js:48: let path = `${type}-${Date.now()}`; vault-1.0.2+dfsg2/ui/tests/acceptance/settings/auth/configure/section-test.js:49: await cli.consoleInput(`write sys/auth/${path} type=${type}`); vault-1.0.2+dfsg2/ui/tests/acceptance/settings/auth/configure/section-test.js-50- await cli.enter(); ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/settings/auth/enable-test.js-17- // always force the new mount to the top of the list vault-1.0.2+dfsg2/ui/tests/acceptance/settings/auth/enable-test.js:18: const path = `approle-${new Date().getTime()}`; vault-1.0.2+dfsg2/ui/tests/acceptance/settings/auth/enable-test.js-19- const type = 'approle'; ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/settings/auth/enable-test.js-24- page.flash.latestMessage, vault-1.0.2+dfsg2/ui/tests/acceptance/settings/auth/enable-test.js:25: `Successfully mounted the ${type} auth method at ${path}.`, vault-1.0.2+dfsg2/ui/tests/acceptance/settings/auth/enable-test.js-26- 'success flash shows' ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/settings/configure-secret-backends/pki/index-test.js-15- test('it redirects to the cert section', async function(assert) { vault-1.0.2+dfsg2/ui/tests/acceptance/settings/configure-secret-backends/pki/index-test.js:16: const path = `pki-${new Date().getTime()}`; vault-1.0.2+dfsg2/ui/tests/acceptance/settings/configure-secret-backends/pki/index-test.js-17- await enablePage.enable('pki', path); ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/settings/configure-secret-backends/pki/section-cert-test.js-64- const mountAndNav = async (assert, prefix) => { vault-1.0.2+dfsg2/ui/tests/acceptance/settings/configure-secret-backends/pki/section-cert-test.js:65: const path = `${prefix}pki-${new Date().getTime()}`; vault-1.0.2+dfsg2/ui/tests/acceptance/settings/configure-secret-backends/pki/section-cert-test.js-66- await enablePage.enable('pki', path); ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/settings/configure-secret-backends/pki/section-crl-test.js-16- test('it saves crl config', async function(assert) { vault-1.0.2+dfsg2/ui/tests/acceptance/settings/configure-secret-backends/pki/section-crl-test.js:17: const path = `pki-${new Date().getTime()}`; vault-1.0.2+dfsg2/ui/tests/acceptance/settings/configure-secret-backends/pki/section-crl-test.js-18- await enablePage.enable('pki', path); ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/settings/configure-secret-backends/pki/section-tidy-test.js-16- test('it saves tidy config', async function(assert) { vault-1.0.2+dfsg2/ui/tests/acceptance/settings/configure-secret-backends/pki/section-tidy-test.js:17: const path = `pki-${new Date().getTime()}`; vault-1.0.2+dfsg2/ui/tests/acceptance/settings/configure-secret-backends/pki/section-tidy-test.js-18- await enablePage.enable('pki', path); ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/settings/configure-secret-backends/pki/section-urls-test.js-16- test('it saves urls config', async function(assert) { vault-1.0.2+dfsg2/ui/tests/acceptance/settings/configure-secret-backends/pki/section-urls-test.js:17: const path = `pki-${new Date().getTime()}`; vault-1.0.2+dfsg2/ui/tests/acceptance/settings/configure-secret-backends/pki/section-urls-test.js-18- await enablePage.enable('pki', path); ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/settings/mount-secret-backend-test.js-17- // always force the new mount to the top of the list vault-1.0.2+dfsg2/ui/tests/acceptance/settings/mount-secret-backend-test.js:18: const path = `kv-${new Date().getTime()}`; vault-1.0.2+dfsg2/ui/tests/acceptance/settings/mount-secret-backend-test.js-19- const defaultTTLHours = 100; ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/ssh-test.js-26- assertAfterGenerate(assert, sshPath) { vault-1.0.2+dfsg2/ui/tests/acceptance/ssh-test.js:27: assert.equal(currentURL(), `/vault/secrets/${sshPath}/sign/${this.name}`, 'ca sign url is correct'); vault-1.0.2+dfsg2/ui/tests/acceptance/ssh-test.js-28- assert.dom('[data-test-row-label="Signed key"]').exists({ count: 1 }, 'renders the signed key'); ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/ssh-test.js-50- currentURL(), vault-1.0.2+dfsg2/ui/tests/acceptance/ssh-test.js:51: `/vault/secrets/${sshPath}/credentials/${this.name}`, vault-1.0.2+dfsg2/ui/tests/acceptance/ssh-test.js-52- 'otp credential url is correct' ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/ssh-test.js-62- const now = new Date().getTime(); vault-1.0.2+dfsg2/ui/tests/acceptance/ssh-test.js:63: const sshPath = `ssh-${now}`; vault-1.0.2+dfsg2/ui/tests/acceptance/ssh-test.js-64- ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/ssh-test.js-66- await click('[data-test-secret-backend-configure]'); vault-1.0.2+dfsg2/ui/tests/acceptance/ssh-test.js:67: assert.equal(currentURL(), `/vault/settings/secrets/configure/${sshPath}`); vault-1.0.2+dfsg2/ui/tests/acceptance/ssh-test.js-68- assert.ok(findAll('[data-test-ssh-configure-form]').length, 'renders the empty configuration form'); ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/ssh-test.js-75- vault-1.0.2+dfsg2/ui/tests/acceptance/ssh-test.js:76: assert.equal(currentURL(), `/vault/secrets/${sshPath}/list`, `redirects to ssh index`); vault-1.0.2+dfsg2/ui/tests/acceptance/ssh-test.js-77- ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/ssh-test.js-82- find('[data-test-secret-header]').textContent.includes('SSH Role'), vault-1.0.2+dfsg2/ui/tests/acceptance/ssh-test.js:83: `${role.type}: renders the create page` vault-1.0.2+dfsg2/ui/tests/acceptance/ssh-test.js-84- ); ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/ssh-test.js-93- currentURL(), vault-1.0.2+dfsg2/ui/tests/acceptance/ssh-test.js:94: `/vault/secrets/${sshPath}/show/${role.name}`, vault-1.0.2+dfsg2/ui/tests/acceptance/ssh-test.js:95: `${role.type}: navigates to the show page on creation` vault-1.0.2+dfsg2/ui/tests/acceptance/ssh-test.js-96- ); ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/ssh-test.js-109- findAll('[data-test-secret-generate-form]').length, vault-1.0.2+dfsg2/ui/tests/acceptance/ssh-test.js:110: `${role.type}: back takes you back to the form` vault-1.0.2+dfsg2/ui/tests/acceptance/ssh-test.js-111- ); ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/ssh-test.js-115- currentURL(), vault-1.0.2+dfsg2/ui/tests/acceptance/ssh-test.js:116: `/vault/secrets/${sshPath}/list`, vault-1.0.2+dfsg2/ui/tests/acceptance/ssh-test.js:117: `${role.type}: cancel takes you to ssh index` vault-1.0.2+dfsg2/ui/tests/acceptance/ssh-test.js-118- ); vault-1.0.2+dfsg2/ui/tests/acceptance/ssh-test.js-119- assert.ok( vault-1.0.2+dfsg2/ui/tests/acceptance/ssh-test.js:120: findAll(`[data-test-secret-link="${role.name}"]`).length, vault-1.0.2+dfsg2/ui/tests/acceptance/ssh-test.js:121: `${role.type}: role shows in the list` vault-1.0.2+dfsg2/ui/tests/acceptance/ssh-test.js-122- ); ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/ssh-test.js-124- //and delete vault-1.0.2+dfsg2/ui/tests/acceptance/ssh-test.js:125: await click(`[data-test-secret-link="${role.name}"] [data-test-popup-menu-trigger]`); vault-1.0.2+dfsg2/ui/tests/acceptance/ssh-test.js:126: await click(`[data-test-ssh-role-delete="${role.name}"] button`); vault-1.0.2+dfsg2/ui/tests/acceptance/ssh-test.js-127- await click(`[data-test-confirm-button]`); ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/ssh-test.js-130- assert vault-1.0.2+dfsg2/ui/tests/acceptance/ssh-test.js:131: .dom(`[data-test-secret-link="${role.name}"]`) vault-1.0.2+dfsg2/ui/tests/acceptance/ssh-test.js:132: .doesNotExist(`${role.type}: role is no longer in the list`); vault-1.0.2+dfsg2/ui/tests/acceptance/ssh-test.js-133- } ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/tools-test.js-45- TOOLS_ACTIONS.forEach(action => { vault-1.0.2+dfsg2/ui/tests/acceptance/tools-test.js:46: assert.ok(find(`[data-test-tools-action-link="${action}"]`), `${action} link renders`); vault-1.0.2+dfsg2/ui/tests/acceptance/tools-test.js-47- }); ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-11- { vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js:12: name: `aes-${ts}`, vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-13- type: 'aes256-gcm96', ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-17- { vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js:18: name: `aes-convergent-${ts}`, vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-19- type: 'aes256-gcm96', ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-23- { vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js:24: name: `chacha-${ts}`, vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-25- type: 'chacha20-poly1305', ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-29- { vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js:30: name: `chacha-convergent-${ts}`, vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-31- type: 'chacha20-poly1305', ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-35- { vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js:36: name: `ecdsa-${ts}`, vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-37- type: 'ecdsa-p256', ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-41- { vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js:42: name: `ed25519-${ts}`, vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-43- type: 'ed25519', ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-47- { vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js:48: name: `rsa-2048-${ts}`, vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-49- type: `rsa-2048`, ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-53- { vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js:54: name: `rsa-4096-${ts}`, vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-55- type: `rsa-4096`, ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-94- /vault:/.test(find('[data-test-transit-input="ciphertext"]').value), vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js:95: `${key}: ciphertext shows a vault-prefixed ciphertext` vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-96- ); ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-102- 'nqR8LiVgNh/lwO2rArJJE9F9DMhh0lKo4JX9DAAkCDw=', vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js:103: `${key}: the ui shows the base64-encoded context` vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-104- ); ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-111- 'NaXud2QW7KjyK6Me9ggh+zmnCeBGdG93LQED49PtoOI=', vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js:112: `${key}: the ui shows the base64-encoded plaintext` vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-113- ); ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-125- /vault:/.test(find('[data-test-transit-input="ciphertext"]').value), vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js:126: `${key}: ciphertext shows a vault-prefixed ciphertext` vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-127- ); ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-131- .dom('[data-test-transit-input="context"]') vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js:132: .hasValue(encodeString('context'), `${key}: the ui shows the input context`); vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-133- }, ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-138- 'NaXud2QW7KjyK6Me9ggh+zmnCeBGdG93LQED49PtoOI=', vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js:139: `${key}: the ui shows the base64-encoded plaintext` vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-140- ); ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-152- /vault:/.test(find('[data-test-transit-input="ciphertext"]').value), vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js:153: `${key}: ciphertext shows a vault-prefixed ciphertext` vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-154- ); ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-158- .dom('[data-test-transit-input="context"]') vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js:159: .hasValue(encodeString('context'), `${key}: the ui shows the input context`); vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-160- }, ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-163- .dom('[data-test-transit-input="plaintext"]') vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js:164: .hasValue('This is the secret', `${key}: the ui decodes plaintext`); vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-165- }, ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-175- assertAfterEncrypt: key => { vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js:176: assert.ok(find('[data-test-transit-input="ciphertext"]'), `${key}: ciphertext box shows`); vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-177- assert.ok( vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-178- /vault:/.test(find('[data-test-transit-input="ciphertext"]').value), vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js:179: `${key}: ciphertext shows a vault-prefixed ciphertext` vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-180- ); ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-184- .dom('[data-test-transit-input="context"]') vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js:185: .hasValue(encodeString('secret 2'), `${key}: the ui shows the encoded context`); vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-186- }, vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-187- assertAfterDecrypt: key => { vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js:188: assert.ok(find('[data-test-transit-input="plaintext"]'), `${key}: plaintext box shows`); vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-189- assert vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-190- .dom('[data-test-transit-input="plaintext"]') vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js:191: .hasValue('There are many secrets 🤐', `${key}: the ui decodes plaintext`); vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-192- }, ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-231- const now = new Date().getTime(); vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js:232: hooks.transitPath = `transit-${now}`; vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-233- ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-241- for (let [index, key] of hooks.transitKeys.entries()) { vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js:242: await visit(`vault/secrets/${hooks.transitPath}/show/${key.name}`); vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-243- if (index === 0) { ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-246- .dom('[data-test-transit-key-version-row]') vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js:247: .exists({ count: 1 }, `${key.name}: only one key version`); vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-248- await click('[data-test-transit-key-rotate] button'); ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-251- .dom('[data-test-transit-key-version-row]') vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js:252: .exists({ count: 2 }, `${key.name}: two key versions after rotate`); vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-253- } ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-255- assert.ok( vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js:256: currentURL().startsWith(`/vault/secrets/${hooks.transitPath}/actions/${key.name}`), vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js:257: `${key.name}: navigates to tranist actions` vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-258- ); ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-261- find('[data-test-transit-key-version-select]'), vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js:262: `${key.name}: the rotated key allows you to select versions` vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-263- ); ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-267- find('[data-test-transit-action-link="export"]'), vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js:268: `${key.name}: exportable key has a link to export action` vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-269- ); ############################################## vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-272- .dom('[data-test-transit-action-link="export"]') vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js:273: .doesNotExist(`${key.name}: non-exportable key does not link to export action`); vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-274- } ############################################## vault-1.0.2+dfsg2/ui/tests/helpers/codemirror.js-8- let element = document.querySelector(selector); vault-1.0.2+dfsg2/ui/tests/helpers/codemirror.js:9: invariant(element, `Selector ${selector} matched no elements`); vault-1.0.2+dfsg2/ui/tests/helpers/codemirror.js-10- vault-1.0.2+dfsg2/ui/tests/helpers/codemirror.js-11- let cm = cmService.instanceFor(element.id); vault-1.0.2+dfsg2/ui/tests/helpers/codemirror.js:12: invariant(cm, `No registered CodeMirror instance for ${selector}`); vault-1.0.2+dfsg2/ui/tests/helpers/codemirror.js-13- ############################################## vault-1.0.2+dfsg2/ui/tests/integration/components/console/log-list-test.js-18- vault-1.0.2+dfsg2/ui/tests/integration/components/console/log-list-test.js:19: assert.dom('pre').includesText(`${expectedText}`); vault-1.0.2+dfsg2/ui/tests/integration/components/console/log-list-test.js-20- }); ############################################## vault-1.0.2+dfsg2/ui/tests/integration/components/console/log-object-test.js-26- vault-1.0.2+dfsg2/ui/tests/integration/components/console/log-object-test.js:27: assert.dom('pre').includesText(`${expectedText}`); vault-1.0.2+dfsg2/ui/tests/integration/components/console/log-object-test.js-28- }); ############################################## vault-1.0.2+dfsg2/ui/tests/integration/components/control-group-test.js-68- assert.equal(component.bannerText, 'The path you requested is locked by a control group'); vault-1.0.2+dfsg2/ui/tests/integration/components/control-group-test.js:69: assert.equal(component.requestorText, `You are requesting access to ${model.requestPath}`); vault-1.0.2+dfsg2/ui/tests/integration/components/control-group-test.js-70- assert.equal(component.showsTokenText, false, 'does not show token message when there is no token'); ############################################## vault-1.0.2+dfsg2/ui/tests/integration/components/control-group-test.js-127- component.requestorText, vault-1.0.2+dfsg2/ui/tests/integration/components/control-group-test.js:128: `${model.requestEntity.name} is requesting access to ${model.requestPath}` vault-1.0.2+dfsg2/ui/tests/integration/components/control-group-test.js-129- ); ############################################## vault-1.0.2+dfsg2/ui/tests/integration/components/control-group-test.js-164- component.requestorText, vault-1.0.2+dfsg2/ui/tests/integration/components/control-group-test.js:165: `${model.requestEntity.name} is authorized to access ${model.requestPath}` vault-1.0.2+dfsg2/ui/tests/integration/components/control-group-test.js-166- ); ############################################## vault-1.0.2+dfsg2/ui/tests/integration/components/replication-actions-test.js-86- for (let [replicationMode, clusterMode, action, headerText, fillInFn, expectedOnSubmit] of testCases) { vault-1.0.2+dfsg2/ui/tests/integration/components/replication-actions-test.js:87: test(`replication mode ${replicationMode}, cluster mode: ${clusterMode}, action: ${action}`, async function(assert) { vault-1.0.2+dfsg2/ui/tests/integration/components/replication-actions-test.js:88: const testKey = `${replicationMode}-${clusterMode}-${action}`; vault-1.0.2+dfsg2/ui/tests/integration/components/replication-actions-test.js-89- this.set('model', { ############################################## vault-1.0.2+dfsg2/ui/tests/integration/components/replication-actions-test.js-107- JSON.stringify(expectedOnSubmit), vault-1.0.2+dfsg2/ui/tests/integration/components/replication-actions-test.js:108: `${testKey}: submitted values match expected` vault-1.0.2+dfsg2/ui/tests/integration/components/replication-actions-test.js-109- ); ############################################## vault-1.0.2+dfsg2/ui/tests/integration/components/replication-actions-test.js-119- headerText, vault-1.0.2+dfsg2/ui/tests/integration/components/replication-actions-test.js:120: `${testKey}: renders the correct partial as default` vault-1.0.2+dfsg2/ui/tests/integration/components/replication-actions-test.js-121- ); ############################################## vault-1.0.2+dfsg2/ui/tests/integration/components/shamir-flow-test.js-83- find('.shamir-progress').textContent.includes( vault-1.0.2+dfsg2/ui/tests/integration/components/shamir-flow-test.js:84: `${response.progress}/${response.required} keys provided` vault-1.0.2+dfsg2/ui/tests/integration/components/shamir-flow-test.js-85- ), ############################################## vault-1.0.2+dfsg2/ui/tests/integration/components/shamir-flow-test.js-113- find('.shamir-progress').textContent.includes( vault-1.0.2+dfsg2/ui/tests/integration/components/shamir-flow-test.js:114: `${response.progress}/${response.required} keys provided` vault-1.0.2+dfsg2/ui/tests/integration/components/shamir-flow-test.js-115- ), ############################################## vault-1.0.2+dfsg2/ui/tests/integration/services/auth-test.js-169- tokenName && vault-1.0.2+dfsg2/ui/tests/integration/services/auth-test.js:170: tokenName.indexOf(`${TOKEN_PREFIX}${ROOT_PREFIX}`) === 0 && vault-1.0.2+dfsg2/ui/tests/integration/services/auth-test.js-171- this.environment() !== 'development' ############################################## vault-1.0.2+dfsg2/ui/tests/integration/services/auth-test.js-184- vault-1.0.2+dfsg2/ui/tests/integration/services/auth-test.js:185: const expectedTokenName = `${TOKEN_PREFIX}${ROOT_PREFIX}${TOKEN_SEPARATOR}1`; vault-1.0.2+dfsg2/ui/tests/integration/services/auth-test.js-186- assert.equal('test', clusterToken, 'token is saved properly'); vault-1.0.2+dfsg2/ui/tests/integration/services/auth-test.js-187- assert.equal( vault-1.0.2+dfsg2/ui/tests/integration/services/auth-test.js:188: `${TOKEN_PREFIX}${ROOT_PREFIX}${TOKEN_SEPARATOR}1`, vault-1.0.2+dfsg2/ui/tests/integration/services/auth-test.js-189- clusterTokenName, ############################################## vault-1.0.2+dfsg2/ui/tests/integration/services/auth-test.js-214- tokenName && vault-1.0.2+dfsg2/ui/tests/integration/services/auth-test.js:215: tokenName.indexOf(`${TOKEN_PREFIX}${ROOT_PREFIX}`) === 0 && vault-1.0.2+dfsg2/ui/tests/integration/services/auth-test.js-216- this.environment() !== 'development' ############################################## vault-1.0.2+dfsg2/ui/tests/integration/services/auth-test.js-230- vault-1.0.2+dfsg2/ui/tests/integration/services/auth-test.js:231: const expectedTokenName = `${TOKEN_PREFIX}${ROOT_PREFIX}${TOKEN_SEPARATOR}1`; vault-1.0.2+dfsg2/ui/tests/integration/services/auth-test.js-232- assert.equal('test', clusterToken, 'token is saved properly'); vault-1.0.2+dfsg2/ui/tests/integration/services/auth-test.js-233- assert.equal( vault-1.0.2+dfsg2/ui/tests/integration/services/auth-test.js:234: `${TOKEN_PREFIX}${ROOT_PREFIX}${TOKEN_SEPARATOR}1`, vault-1.0.2+dfsg2/ui/tests/integration/services/auth-test.js-235- clusterTokenName, ############################################## vault-1.0.2+dfsg2/ui/tests/integration/services/auth-test.js-261- const authData = service.get('authData'); vault-1.0.2+dfsg2/ui/tests/integration/services/auth-test.js:262: const expectedTokenName = `${TOKEN_PREFIX}github${TOKEN_SEPARATOR}1`; vault-1.0.2+dfsg2/ui/tests/integration/services/auth-test.js-263- ############################################## vault-1.0.2+dfsg2/ui/tests/integration/services/auth-test.js-295- assert.equal( vault-1.0.2+dfsg2/ui/tests/integration/services/auth-test.js:296: `${TOKEN_PREFIX}userpass${TOKEN_SEPARATOR}1`, vault-1.0.2+dfsg2/ui/tests/integration/services/auth-test.js-297- clusterTokenName, ############################################## vault-1.0.2+dfsg2/ui/tests/integration/services/auth-test.js-331- assert.equal( vault-1.0.2+dfsg2/ui/tests/integration/services/auth-test.js:332: `${TOKEN_PREFIX}token${TOKEN_SEPARATOR}1`, vault-1.0.2+dfsg2/ui/tests/integration/services/auth-test.js-333- clusterTokenName, ############################################## vault-1.0.2+dfsg2/ui/tests/unit/adapters/aws-credential-test.js-69- cases.forEach(([description, args, expectedMethod, expectedRequestBody]) => { vault-1.0.2+dfsg2/ui/tests/unit/adapters/aws-credential-test.js:70: test(`aws-credential: ${description}`, function(assert) { vault-1.0.2+dfsg2/ui/tests/unit/adapters/aws-credential-test.js-71- assert.expect(3); ############################################## vault-1.0.2+dfsg2/ui/tests/unit/adapters/aws-credential-test.js-75- assert.equal(url, '/v1/aws/creds/foo', `calls the correct url`); vault-1.0.2+dfsg2/ui/tests/unit/adapters/aws-credential-test.js:76: assert.equal(method, expectedMethod, `${description} uses the correct http verb: ${expectedMethod}`); vault-1.0.2+dfsg2/ui/tests/unit/adapters/aws-credential-test.js-77- assert.equal(requestBody, JSON.stringify(expectedRequestBody)); ############################################## vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/_test-cases.js-13- args: [null, { modelName }, 'foo'], vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/_test-cases.js:14: url: `/v1/${modelName}/id/foo`, vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/_test-cases.js-15- method: 'GET', ############################################## vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/_test-cases.js-20- args: [storeMVP, { modelName }], vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/_test-cases.js:21: url: `/v1/${modelName}`, vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/_test-cases.js-22- method: 'POST', ############################################## vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/_test-cases.js-26- args: [storeMVP, { modelName }, { id: 'foo' }], vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/_test-cases.js:27: url: `/v1/${modelName}/id/foo`, vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/_test-cases.js-28- method: 'PUT', ############################################## vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/_test-cases.js-32- args: [storeMVP, { modelName }, { id: 'foo' }], vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/_test-cases.js:33: url: `/v1/${modelName}/id/foo`, vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/_test-cases.js-34- method: 'DELETE', ############################################## vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/_test-cases.js-38- args: [null, { modelName }, {}], vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/_test-cases.js:39: url: `/v1/${modelName}/id?list=true`, vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/_test-cases.js-40- method: 'GET', ############################################## vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/entity-alias-test.js-19- cases.forEach(testCase => { vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/entity-alias-test.js:20: test(`entity-alias#${testCase.adapterMethod}`, function(assert) { vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/entity-alias-test.js-21- assert.expect(2); ############################################## vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/entity-alias-test.js-24- let { url, method } = this.server.handledRequests[0]; vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/entity-alias-test.js:25: assert.equal(url, testCase.url, `${testCase.adapterMethod} calls the correct url: ${testCase.url}`); vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/entity-alias-test.js-26- assert.equal( ############################################## vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/entity-alias-test.js-28- testCase.method, vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/entity-alias-test.js:29: `${testCase.adapterMethod} uses the correct http verb: ${testCase.method}` vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/entity-alias-test.js-30- ); ############################################## vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/entity-test.js-19- cases.forEach(testCase => { vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/entity-test.js:20: test(`entity#${testCase.adapterMethod}`, function(assert) { vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/entity-test.js-21- assert.expect(2); ############################################## vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/entity-test.js-24- let { url, method } = this.server.handledRequests[0]; vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/entity-test.js:25: assert.equal(url, testCase.url, `${testCase.adapterMethod} calls the correct url: ${testCase.url}`); vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/entity-test.js-26- assert.equal( ############################################## vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/entity-test.js-28- testCase.method, vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/entity-test.js:29: `${testCase.adapterMethod} uses the correct http verb: ${testCase.method}` vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/entity-test.js-30- ); ############################################## vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/group-alias-test.js-19- cases.forEach(testCase => { vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/group-alias-test.js:20: test(`group-alias#${testCase.adapterMethod}`, function(assert) { vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/group-alias-test.js-21- assert.expect(2); ############################################## vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/group-alias-test.js-24- let { url, method } = this.server.handledRequests[0]; vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/group-alias-test.js:25: assert.equal(url, testCase.url, `${testCase.adapterMethod} calls the correct url: ${testCase.url}`); vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/group-alias-test.js-26- assert.equal( ############################################## vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/group-alias-test.js-28- testCase.method, vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/group-alias-test.js:29: `${testCase.adapterMethod} uses the correct http verb: ${testCase.method}` vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/group-alias-test.js-30- ); ############################################## vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/group-test.js-19- cases.forEach(testCase => { vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/group-test.js:20: test(`group#${testCase.adapterMethod}`, function(assert) { vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/group-test.js-21- assert.expect(2); ############################################## vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/group-test.js-24- let { url, method } = this.server.handledRequests[0]; vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/group-test.js:25: assert.equal(url, testCase.url, `${testCase.adapterMethod} calls the correct url: ${testCase.url}`); vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/group-test.js-26- assert.equal( ############################################## vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/group-test.js-28- testCase.method, vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/group-test.js:29: `${testCase.adapterMethod} uses the correct http verb: ${testCase.method}` vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/group-test.js-30- ); ############################################## vault-1.0.2+dfsg2/ui/tests/unit/adapters/secret-engine-test.js-51- cases.forEach(testCase => { vault-1.0.2+dfsg2/ui/tests/unit/adapters/secret-engine-test.js:52: test(`secret-engine: ${testCase.description}`, function(assert) { vault-1.0.2+dfsg2/ui/tests/unit/adapters/secret-engine-test.js-53- assert.expect(2); ############################################## vault-1.0.2+dfsg2/ui/tests/unit/adapters/secret-engine-test.js-56- let { url, method } = this.server.handledRequests[0]; vault-1.0.2+dfsg2/ui/tests/unit/adapters/secret-engine-test.js:57: assert.equal(url, testCase.url, `${testCase.adapterMethod} calls the correct url: ${testCase.url}`); vault-1.0.2+dfsg2/ui/tests/unit/adapters/secret-engine-test.js-58- assert.equal( ############################################## vault-1.0.2+dfsg2/ui/tests/unit/adapters/secret-engine-test.js-60- testCase.method, vault-1.0.2+dfsg2/ui/tests/unit/adapters/secret-engine-test.js:61: `${testCase.adapterMethod} uses the correct http verb: ${testCase.method}` vault-1.0.2+dfsg2/ui/tests/unit/adapters/secret-engine-test.js-62- ); ############################################## vault-1.0.2+dfsg2/ui/tests/unit/adapters/secret-v2-test.js-57- ].forEach(([adapterMethod, store, type, queryOrSnapshot, expectedHttpVerb, expectedURL]) => { vault-1.0.2+dfsg2/ui/tests/unit/adapters/secret-v2-test.js:58: test(`secret-v2: ${adapterMethod}`, function(assert) { vault-1.0.2+dfsg2/ui/tests/unit/adapters/secret-v2-test.js-59- let adapter = this.owner.lookup('adapter:secret-v2'); ############################################## vault-1.0.2+dfsg2/ui/tests/unit/adapters/secret-v2-test.js-61- let { url, method } = this.server.handledRequests[0]; vault-1.0.2+dfsg2/ui/tests/unit/adapters/secret-v2-test.js:62: assert.equal(url, expectedURL, `${adapterMethod} calls the correct url: ${expectedURL}`); vault-1.0.2+dfsg2/ui/tests/unit/adapters/secret-v2-test.js-63- assert.equal( ############################################## vault-1.0.2+dfsg2/ui/tests/unit/adapters/secret-v2-test.js-65- expectedHttpVerb, vault-1.0.2+dfsg2/ui/tests/unit/adapters/secret-v2-test.js:66: `${adapterMethod} uses the correct http verb: ${expectedHttpVerb}` vault-1.0.2+dfsg2/ui/tests/unit/adapters/secret-v2-test.js-67- ); ############################################## vault-1.0.2+dfsg2/ui/tests/unit/adapters/secret-v2-version-test.js-70- ].forEach(([testName, adapterMethod, args, expectedHttpVerb, expectedURL, exptectedRequestBody]) => { vault-1.0.2+dfsg2/ui/tests/unit/adapters/secret-v2-version-test.js:71: test(`${testName}`, function(assert) { vault-1.0.2+dfsg2/ui/tests/unit/adapters/secret-v2-version-test.js-72- let adapter = this.owner.lookup('adapter:secret-v2-version'); ############################################## vault-1.0.2+dfsg2/ui/tests/unit/adapters/secret-v2-version-test.js-74- let { url, method, requestBody } = this.server.handledRequests[0]; vault-1.0.2+dfsg2/ui/tests/unit/adapters/secret-v2-version-test.js:75: assert.equal(url, expectedURL, `${adapterMethod} calls the correct url: ${expectedURL}`); vault-1.0.2+dfsg2/ui/tests/unit/adapters/secret-v2-version-test.js-76- assert.equal( ############################################## vault-1.0.2+dfsg2/ui/tests/unit/adapters/secret-v2-version-test.js-78- expectedHttpVerb, vault-1.0.2+dfsg2/ui/tests/unit/adapters/secret-v2-version-test.js:79: `${adapterMethod} uses the correct http verb: ${expectedHttpVerb}` vault-1.0.2+dfsg2/ui/tests/unit/adapters/secret-v2-version-test.js-80- ); ############################################## vault-1.0.2+dfsg2/ui/tests/unit/components/identity/edit-form-test.js-60- }); vault-1.0.2+dfsg2/ui/tests/unit/components/identity/edit-form-test.js:61: test(`it computes cancelLink properly: ${testCase.identityType} ${testCase.mode}`, function(assert) { vault-1.0.2+dfsg2/ui/tests/unit/components/identity/edit-form-test.js-62- let component = this.owner.lookup('component:identity/edit-form'); ############################################## vault-1.0.2+dfsg2/ui/tests/unit/lib/console-helpers-test.js-36- testCommands.forEach(function(testCase) { vault-1.0.2+dfsg2/ui/tests/unit/lib/console-helpers-test.js:37: test(`#parseCommand: ${testCase.name}`, function(assert) { vault-1.0.2+dfsg2/ui/tests/unit/lib/console-helpers-test.js-38- let result = parseCommand(testCase.command); ############################################## vault-1.0.2+dfsg2/ui/tests/unit/lib/console-helpers-test.js-102- testExtractCases.forEach(function(testCase) { vault-1.0.2+dfsg2/ui/tests/unit/lib/console-helpers-test.js:103: test(`#extractDataAndFlags: ${testCase.name}`, function(assert) { vault-1.0.2+dfsg2/ui/tests/unit/lib/console-helpers-test.js-104- let { data, flags } = extractDataAndFlags(...testCase.input); ############################################## vault-1.0.2+dfsg2/ui/tests/unit/lib/console-helpers-test.js-256- testResponseCases.forEach(function(testCase) { vault-1.0.2+dfsg2/ui/tests/unit/lib/console-helpers-test.js:257: test(`#logFromResponse: ${testCase.name}`, function(assert) { vault-1.0.2+dfsg2/ui/tests/unit/lib/console-helpers-test.js-258- let data = logFromResponse(...testCase.args); ############################################## vault-1.0.2+dfsg2/ui/tests/unit/lib/console-helpers-test.js-301- testErrorCases.forEach(function(testCase) { vault-1.0.2+dfsg2/ui/tests/unit/lib/console-helpers-test.js:302: test(`#logFromError: ${testCase.name}`, function(assert) { vault-1.0.2+dfsg2/ui/tests/unit/lib/console-helpers-test.js-303- let data = logFromError(...testCase.args); ############################################## vault-1.0.2+dfsg2/ui/tests/unit/lib/console-helpers-test.js-325- testCommandCases.forEach(function(testCase) { vault-1.0.2+dfsg2/ui/tests/unit/lib/console-helpers-test.js:326: test(`#logErrorFromInput: ${testCase.name}`, function(assert) { vault-1.0.2+dfsg2/ui/tests/unit/lib/console-helpers-test.js-327- let data = logErrorFromInput(...testCase.args); ############################################## vault-1.0.2+dfsg2/ui/tests/unit/lib/kv-object-test.js-32- fromJSONTests.forEach(function([name, input, content]) { vault-1.0.2+dfsg2/ui/tests/unit/lib/kv-object-test.js:33: test(`fromJSON: ${name}`, function(assert) { vault-1.0.2+dfsg2/ui/tests/unit/lib/kv-object-test.js-34- let data = KVObject.create({ content: [] }).fromJSON(input); ############################################## vault-1.0.2+dfsg2/ui/tests/unit/lib/kv-object-test.js-50- fromJSONTests.forEach(function([name, input, content]) { vault-1.0.2+dfsg2/ui/tests/unit/lib/kv-object-test.js:51: test(`fromJSONString: ${name}`, function(assert) { vault-1.0.2+dfsg2/ui/tests/unit/lib/kv-object-test.js-52- let inputString = JSON.stringify(input, null, 2); ############################################## vault-1.0.2+dfsg2/ui/tests/unit/lib/kv-object-test.js-69- toJSONTests.forEach(function([name, includeBlanks, input, output]) { vault-1.0.2+dfsg2/ui/tests/unit/lib/kv-object-test.js:70: test(`toJSON: ${name}`, function(assert) { vault-1.0.2+dfsg2/ui/tests/unit/lib/kv-object-test.js-71- let data = KVObject.create({ content: [] }).fromJSON(input); ############################################## vault-1.0.2+dfsg2/ui/tests/unit/lib/kv-object-test.js-77- toJSONTests.forEach(function([name, includeBlanks, input, output]) { vault-1.0.2+dfsg2/ui/tests/unit/lib/kv-object-test.js:78: test(`toJSONString: ${name}`, function(assert) { vault-1.0.2+dfsg2/ui/tests/unit/lib/kv-object-test.js-79- let expected = JSON.stringify(output, null, 2); ############################################## vault-1.0.2+dfsg2/ui/tests/unit/lib/kv-object-test.js-95- isAdvancedTests.forEach(function([name, input, expected]) { vault-1.0.2+dfsg2/ui/tests/unit/lib/kv-object-test.js:96: test(`isAdvanced: ${name}`, function(assert) { vault-1.0.2+dfsg2/ui/tests/unit/lib/kv-object-test.js-97- let data = KVObject.create({ content: [] }).fromJSON(input); ############################################## vault-1.0.2+dfsg2/ui/tests/unit/lib/path-to-tree-test.js-54- tests.forEach(function([name, input, expected]) { vault-1.0.2+dfsg2/ui/tests/unit/lib/path-to-tree-test.js:55: test(`pathToTree: ${name}`, function(assert) { vault-1.0.2+dfsg2/ui/tests/unit/lib/path-to-tree-test.js-56- let output = pathToTree(input); ############################################## vault-1.0.2+dfsg2/ui/tests/unit/services/console-test.js-89- let [url, verb, options] = ajax.lastCall.args; vault-1.0.2+dfsg2/ui/tests/unit/services/console-test.js:90: assert.equal(url, testCase.expectedURL, `${testCase.method}: uses trimmed passed url`); vault-1.0.2+dfsg2/ui/tests/unit/services/console-test.js:91: assert.equal(verb, testCase.expectedVerb, `${testCase.method}: uses the correct verb`); vault-1.0.2+dfsg2/ui/tests/unit/services/console-test.js:92: assert.deepEqual(options, testCase.expectedOptions, `${testCase.method}: uses the correct options`); vault-1.0.2+dfsg2/ui/tests/unit/services/console-test.js-93- }); ############################################## vault-1.0.2+dfsg2/ui/tests/unit/services/control-group-test.js-103- ].forEach(function([name, setup, args, expectation]) { vault-1.0.2+dfsg2/ui/tests/unit/services/control-group-test.js:104: test(`checkForControlGroup: ${name}`, function(assert) { vault-1.0.2+dfsg2/ui/tests/unit/services/control-group-test.js-105- if (setup) { ############################################## vault-1.0.2+dfsg2/ui/tests/unit/services/control-group-test.js-180- let path = 'kv/foo/bar'; vault-1.0.2+dfsg2/ui/tests/unit/services/control-group-test.js:181: let expectedKey = `${CONTROL_GROUP_PREFIX}${accessor}${TOKEN_SEPARATOR}${path}`; vault-1.0.2+dfsg2/ui/tests/unit/services/control-group-test.js-182- assert.equal(storageKey(accessor, path), expectedKey, 'uses expected key'); ############################################## vault-1.0.2+dfsg2/ui/tests/unit/services/control-group-test.js-189- let data = { foo: 'bar' }; vault-1.0.2+dfsg2/ui/tests/unit/services/control-group-test.js:190: let expectedKey = `${CONTROL_GROUP_PREFIX}${accessor}${TOKEN_SEPARATOR}${path}`; vault-1.0.2+dfsg2/ui/tests/unit/services/control-group-test.js-191- let subject = this.owner.factoryFor('service:control-group').create({ ############################################## vault-1.0.2+dfsg2/ui/tests/unit/services/control-group-test.js-197- store.setItem(expectedKey, data); vault-1.0.2+dfsg2/ui/tests/unit/services/control-group-test.js:198: store.setItem(`${CONTROL_GROUP_PREFIX}2345${TOKEN_SEPARATOR}${path}`, 'ok'); vault-1.0.2+dfsg2/ui/tests/unit/services/control-group-test.js-199- ############################################## vault-1.0.2+dfsg2/ui/tests/unit/services/control-group-test.js-216- }; vault-1.0.2+dfsg2/ui/tests/unit/services/control-group-test.js:217: let key = `${CONTROL_GROUP_PREFIX}${info.accessor}${TOKEN_SEPARATOR}${info.creation_path}`; vault-1.0.2+dfsg2/ui/tests/unit/services/control-group-test.js-218- ############################################## vault-1.0.2+dfsg2/ui/tests/unit/services/control-group-test.js-232- vault-1.0.2+dfsg2/ui/tests/unit/services/control-group-test.js:233: let expectedKey = `${CONTROL_GROUP_PREFIX}${accessor}${TOKEN_SEPARATOR}${path}`; vault-1.0.2+dfsg2/ui/tests/unit/services/control-group-test.js-234- store.setItem(expectedKey, { one: '2' }); ############################################## vault-1.0.2+dfsg2/ui/tests/unit/services/control-group-test.js-246- vault-1.0.2+dfsg2/ui/tests/unit/services/control-group-test.js:247: let keyOne = `${CONTROL_GROUP_PREFIX}foo`; vault-1.0.2+dfsg2/ui/tests/unit/services/control-group-test.js:248: let keyTwo = `${CONTROL_GROUP_PREFIX}bar`; vault-1.0.2+dfsg2/ui/tests/unit/services/control-group-test.js-249- store.setItem(keyOne, { one: '2' }); ############################################## vault-1.0.2+dfsg2/ui/tests/unit/services/control-group-test.js-265- vault-1.0.2+dfsg2/ui/tests/unit/services/control-group-test.js:266: let keyOne = `${CONTROL_GROUP_PREFIX}foo`; vault-1.0.2+dfsg2/ui/tests/unit/services/control-group-test.js-267- store.setItem(keyOne, { one: '2' }); ############################################## vault-1.0.2+dfsg2/ui/tests/unit/services/wizard-test.js-299- let store = storage(); vault-1.0.2+dfsg2/ui/tests/unit/services/wizard-test.js:300: test(`${testCase.method}`, function(assert) { vault-1.0.2+dfsg2/ui/tests/unit/services/wizard-test.js-301- let wizard = this.owner.factoryFor('service:wizard').create({ ############################################## vault-1.0.2+dfsg2/ui/tests/unit/services/wizard-test.js-322- property.value, vault-1.0.2+dfsg2/ui/tests/unit/services/wizard-test.js:323: `${testCase.method} creates correct value for ${property.prop}` vault-1.0.2+dfsg2/ui/tests/unit/services/wizard-test.js-324- ); ############################################## vault-1.0.2+dfsg2/ui/tests/unit/services/wizard-test.js-331- item.value, vault-1.0.2+dfsg2/ui/tests/unit/services/wizard-test.js:332: `${testCase.method} creates correct storage state for ${item.key}` vault-1.0.2+dfsg2/ui/tests/unit/services/wizard-test.js-333- ); ############################################## vault-1.0.2+dfsg2/ui/tests/unit/services/wizard-test.js-336- if (testCase.expectedResults.value !== null && testCase.expectedResults.value !== undefined) { vault-1.0.2+dfsg2/ui/tests/unit/services/wizard-test.js:337: assert.equal(result, testCase.expectedResults.value, `${testCase.method} gives correct value`); vault-1.0.2+dfsg2/ui/tests/unit/services/wizard-test.js-338- } ############################################## vault-1.0.2+dfsg2/ui/tests/unit/utils/decode-config-from-jwt-test.js-8- 'eyJhbGciOiJFUzUxMiIsInR5cCI6IkpXVCJ9.eyJhZGRyIjoiaHR0cDovLzEyNy4wLjAuMTo4MjAwIiwiZXhwIjoxNTE3NDM0NDA2LCJpYXQiOjE1MTc0MzI2MDYsImp0aSI6IjBiYmI1ZWMyLWM0ODgtMzRjYi0wMzY5LTkxZmJiMjVkZTFiYSIsInR5cGUiOiJ3cmFwcGluZyJ9.MIGHAkIBAGzB5EW6PolAi2rYOzZNvfJnR902WxprtRqnSF2E2I2ye9XLGX--L7npSBjBhnd27ocQ4ZO9VhfDIFqMzu1TNiwCQT52O6xAoz9ElRrq76PjkEHO4ns5_ZgjSKXuKaqdGysHYSlry8KEjWLGQECvZWg9LQeIf35jwqeQUfyJUfmwl5r_'; vault-1.0.2+dfsg2/ui/tests/unit/utils/decode-config-from-jwt-test.js:9: const INVALID_JSON_TOKEN = `foo.${btoa({ addr: 'http://127.0.0.1' })}.bar`; vault-1.0.2+dfsg2/ui/tests/unit/utils/decode-config-from-jwt-test.js-10- ############################################## vault-1.0.2+dfsg2/vault/core_test.go-26- vault-1.0.2+dfsg2/vault/core_test.go:27:func TestNewCore_badRedirectAddr(t *testing.T) { vault-1.0.2+dfsg2/vault/core_test.go-28- logger = logging.NewVaultLogger(log.Trace) ############################################## vault-1.0.2+dfsg2/vault/request_forwarding.go-184- if c.logger.IsInfo() { vault-1.0.2+dfsg2/vault/request_forwarding.go:185: c.logger.Info("serving cluster requests", "cluster_listen_address", tlsLn.Addr()) vault-1.0.2+dfsg2/vault/request_forwarding.go-186- } ############################################## vault-1.0.2+dfsg2/vault/request_forwarding_service.pb.go-74- vault-1.0.2+dfsg2/vault/request_forwarding_service.pb.go:75:func (m *EchoRequest) GetClusterAddr() string { vault-1.0.2+dfsg2/vault/request_forwarding_service.pb.go-76- if m != nil { ############################################## vault-1.0.2+dfsg2/vault/request_forwarding_service.pb.go-288- vault-1.0.2+dfsg2/vault/request_forwarding_service.pb.go:289:func (m *PerfStandbyElectionResponse) GetPrimaryClusterAddr() string { vault-1.0.2+dfsg2/vault/request_forwarding_service.pb.go-290- if m != nil { ############################################## vault-1.0.2+dfsg2/vault/request_handling.go-152- var valid bool vault-1.0.2+dfsg2/vault/request_handling.go:153: remoteSockAddr, err := sockaddr.NewSockAddr(req.Connection.RemoteAddr) vault-1.0.2+dfsg2/vault/request_handling.go-154- if err != nil { ############################################## vault-1.0.2+dfsg2/vault/testing.go-499- }() vault-1.0.2+dfsg2/vault/testing.go:500: return soc.Addr().String(), nil vault-1.0.2+dfsg2/vault/testing.go-501-} ############################################## vault-1.0.2+dfsg2/vault/testing.go-964- if opts != nil && opts.BaseListenAddress != "" { vault-1.0.2+dfsg2/vault/testing.go:965: baseAddr, err = net.ResolveTCPAddr("tcp", opts.BaseListenAddress) vault-1.0.2+dfsg2/vault/testing.go-966- if err != nil { ############################################## vault-1.0.2+dfsg2/vault/testing.go-1135- } vault-1.0.2+dfsg2/vault/testing.go:1136: certFile := filepath.Join(testCluster.TempDir, fmt.Sprintf("node%d_port_%d_cert.pem", i+1, ln.Addr().(*net.TCPAddr).Port)) vault-1.0.2+dfsg2/vault/testing.go:1137: keyFile := filepath.Join(testCluster.TempDir, fmt.Sprintf("node%d_port_%d_key.pem", i+1, ln.Addr().(*net.TCPAddr).Port)) vault-1.0.2+dfsg2/vault/testing.go-1138- err = ioutil.WriteFile(certFile, certInfoSlice[i].certPEM, 0755) ############################################## vault-1.0.2+dfsg2/vault/testing.go-1163- Listener: tls.NewListener(ln, tlsConfig), vault-1.0.2+dfsg2/vault/testing.go:1164: Address: ln.Addr().(*net.TCPAddr), vault-1.0.2+dfsg2/vault/testing.go-1165- }, ############################################## vault-1.0.2+dfsg2/vault/token_store.go-3029- for _, v := range boundCIDRs { vault-1.0.2+dfsg2/vault/token_store.go:3030: parsedCIDR, err := sockaddr.NewSockAddr(v) vault-1.0.2+dfsg2/vault/token_store.go-3031- if err != nil { ############################################## vault-1.0.2+dfsg2/vault/cluster_test.go-119- for _, ln := range cores[0].Listeners { vault-1.0.2+dfsg2/vault/cluster_test.go:120: tcpAddr, ok := ln.Addr().(*net.TCPAddr) vault-1.0.2+dfsg2/vault/cluster_test.go-121- if !ok { ############################################## vault-1.0.2+dfsg2/vendor/github.com/duosecurity/duo_api_golang/authapi/authapi.go-209- vault-1.0.2+dfsg2/vendor/github.com/duosecurity/duo_api_golang/authapi/authapi.go:210:func PreauthIpAddr(ip string) func(*url.Values) { vault-1.0.2+dfsg2/vendor/github.com/duosecurity/duo_api_golang/authapi/authapi.go-211- return func(opts *url.Values) { ############################################## vault-1.0.2+dfsg2/vendor/github.com/duosecurity/duo_api_golang/authapi/authapi.go-257- vault-1.0.2+dfsg2/vendor/github.com/duosecurity/duo_api_golang/authapi/authapi.go:258:func AuthIpAddr(ip string) func(*url.Values) { vault-1.0.2+dfsg2/vendor/github.com/duosecurity/duo_api_golang/authapi/authapi.go-259- return func(opts *url.Values) { ############################################## vault-1.0.2+dfsg2/vendor/github.com/hashicorp/vault-plugin-auth-alicloud/README.md-49-Next, clone this repository into vault-1.0.2+dfsg2/vendor/github.com/hashicorp/vault-plugin-auth-alicloud/README.md:50:`$GOPATH/src/github.com/hashicorp/vault-plugin-auth-alicloud`. vault-1.0.2+dfsg2/vendor/github.com/hashicorp/vault-plugin-auth-alicloud/README.md-51-You can then download any required build tools by bootstrapping your ############################################## vault-1.0.2+dfsg2/vendor/github.com/hashicorp/vault-plugin-auth-alicloud/README.md-58-To compile a development version of this plugin, run `make` or `make dev`. vault-1.0.2+dfsg2/vendor/github.com/hashicorp/vault-plugin-auth-alicloud/README.md:59:This will put the plugin binary in the `bin` and `$GOPATH/bin` folders. `dev` vault-1.0.2+dfsg2/vendor/github.com/hashicorp/vault-plugin-auth-alicloud/README.md-60-mode will only generate the binary for your platform and is faster: ############################################## vault-1.0.2+dfsg2/vendor/github.com/hashicorp/vault-plugin-auth-centrify/README.md-105-Next, clone this repository into vault-1.0.2+dfsg2/vendor/github.com/hashicorp/vault-plugin-auth-centrify/README.md:106:`$GOPATH/src/github.com/hashicorp/vault-plugin-auth-centrify`. vault-1.0.2+dfsg2/vendor/github.com/hashicorp/vault-plugin-auth-centrify/README.md-107-You can then download any required build tools by bootstrapping your ############################################## vault-1.0.2+dfsg2/vendor/github.com/hashicorp/vault-plugin-auth-centrify/README.md-114-To compile a development version of this plugin, run `make` or `make dev`. vault-1.0.2+dfsg2/vendor/github.com/hashicorp/vault-plugin-auth-centrify/README.md:115:This will put the plugin binary in the `bin` and `$GOPATH/bin` folders. `dev` vault-1.0.2+dfsg2/vendor/github.com/hashicorp/vault-plugin-auth-centrify/README.md-116-mode will only generate the binary for your platform and is faster: ############################################## vault-1.0.2+dfsg2/vendor/github.com/hashicorp/vault-plugin-auth-kubernetes/README.md-53-Next, clone this repository into vault-1.0.2+dfsg2/vendor/github.com/hashicorp/vault-plugin-auth-kubernetes/README.md:54:`$GOPATH/src/github.com/hashicorp/vault-plugin-auth-kubernetes`. vault-1.0.2+dfsg2/vendor/github.com/hashicorp/vault-plugin-auth-kubernetes/README.md-55-You can then download any required build tools by bootstrapping your ############################################## vault-1.0.2+dfsg2/vendor/github.com/hashicorp/vault-plugin-auth-kubernetes/README.md-62-To compile a development version of this plugin, run `make` or `make dev`. vault-1.0.2+dfsg2/vendor/github.com/hashicorp/vault-plugin-auth-kubernetes/README.md:63:This will put the plugin binary in the `bin` and `$GOPATH/bin` folders. `dev` vault-1.0.2+dfsg2/vendor/github.com/hashicorp/vault-plugin-auth-kubernetes/README.md-64-mode will only generate the binary for your platform and is faster: ############################################## vault-1.0.2+dfsg2/vendor/github.com/hashicorp/vault-plugin-secrets-alicloud/README.md-64-To compile a development version of this plugin, run `make` or `make dev`. vault-1.0.2+dfsg2/vendor/github.com/hashicorp/vault-plugin-secrets-alicloud/README.md:65:This will put the plugin binary in the `bin` and `$GOPATH/bin` folders. `dev` vault-1.0.2+dfsg2/vendor/github.com/hashicorp/vault-plugin-secrets-alicloud/README.md-66-mode will only generate the binary for your platform and is faster: ############################################## vault-1.0.2+dfsg2/vendor/github.com/hashicorp/vault-plugin-secrets-alicloud/README.md-110- vault-1.0.2+dfsg2/vendor/github.com/hashicorp/vault-plugin-secrets-alicloud/README.md:111:The integration tests are run by `$ make test` and rather than firing real vault-1.0.2+dfsg2/vendor/github.com/hashicorp/vault-plugin-secrets-alicloud/README.md-112-API calls, they fire API calls at a local test server that returns expected ############################################## vault-1.0.2+dfsg2/vendor/github.com/hashicorp/vault-plugin-secrets-kv/README.md-47-Next, clone this repository into vault-1.0.2+dfsg2/vendor/github.com/hashicorp/vault-plugin-secrets-kv/README.md:48:`$GOPATH/src/github.com/hashicorp/vault-plugin-secrets-kv`. vault-1.0.2+dfsg2/vendor/github.com/hashicorp/vault-plugin-secrets-kv/README.md-49-You can then download any required build tools by bootstrapping your ############################################## vault-1.0.2+dfsg2/vendor/github.com/hashicorp/vault-plugin-secrets-kv/README.md-56-To compile a development version of this plugin, run `make` or `make dev`. vault-1.0.2+dfsg2/vendor/github.com/hashicorp/vault-plugin-secrets-kv/README.md:57:This will put the plugin binary in the `bin` and `$GOPATH/bin` folders. `dev` vault-1.0.2+dfsg2/vendor/github.com/hashicorp/vault-plugin-secrets-kv/README.md-58-mode will only generate the binary for your platform and is faster: ############################################## vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/apis/meta/v1/generated.proto-49- // For example: the master will return an internal IP CIDR only, if the client reaches the server using an internal IP. vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/apis/meta/v1/generated.proto:50: // Server looks at X-Forwarded-For header or X-Real-Ip header or request.RemoteAddr (in that order) to get the client IP. vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/apis/meta/v1/generated.proto-51- // +optional ############################################## vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/apis/meta/v1/generated.proto-122- // For example: the master will return an internal IP CIDR only, if the client reaches the server using an internal IP. vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/apis/meta/v1/generated.proto:123: // Server looks at X-Forwarded-For header or X-Real-Ip header or request.RemoteAddr (in that order) to get the client IP. vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/apis/meta/v1/generated.proto-124- repeated ServerAddressByClientCIDR serverAddressByClientCIDRs = 2; ############################################## vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/apis/meta/v1/types.go-821- // For example: the master will return an internal IP CIDR only, if the client reaches the server using an internal IP. vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/apis/meta/v1/types.go:822: // Server looks at X-Forwarded-For header or X-Real-Ip header or request.RemoteAddr (in that order) to get the client IP. vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/apis/meta/v1/types.go-823- ServerAddressByClientCIDRs []ServerAddressByClientCIDR `json:"serverAddressByClientCIDRs" protobuf:"bytes,2,rep,name=serverAddressByClientCIDRs"` ############################################## vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/apis/meta/v1/types.go-855- // For example: the master will return an internal IP CIDR only, if the client reaches the server using an internal IP. vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/apis/meta/v1/types.go:856: // Server looks at X-Forwarded-For header or X-Real-Ip header or request.RemoteAddr (in that order) to get the client IP. vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/apis/meta/v1/types.go-857- // +optional ############################################## vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/apis/meta/v1/types_swagger_doc_generated.go-34- "preferredVersion": "preferredVersion is the version preferred by the API server, which probably is the storage version.", vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/apis/meta/v1/types_swagger_doc_generated.go:35: "serverAddressByClientCIDRs": "a map of client CIDR to server address that is serving this group. This is to help clients reach servers in the most network-efficient way possible. Clients can use the appropriate server address as per the CIDR that they match. In case of multiple matches, clients should use the longest matching CIDR. The server returns only those CIDRs that it thinks that the client can match. For example: the master will return an internal IP CIDR only, if the client reaches the server using an internal IP. Server looks at X-Forwarded-For header or X-Real-Ip header or request.RemoteAddr (in that order) to get the client IP.", vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/apis/meta/v1/types_swagger_doc_generated.go-36-} ############################################## vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/apis/meta/v1/types_swagger_doc_generated.go-80- "versions": "versions are the api versions that are available.", vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/apis/meta/v1/types_swagger_doc_generated.go:81: "serverAddressByClientCIDRs": "a map of client CIDR to server address that is serving this group. This is to help clients reach servers in the most network-efficient way possible. Clients can use the appropriate server address as per the CIDR that they match. In case of multiple matches, clients should use the longest matching CIDR. The server returns only those CIDRs that it thinks that the client can match. For example: the master will return an internal IP CIDR only, if the client reaches the server using an internal IP. Server looks at X-Forwarded-For header or X-Real-Ip header or request.RemoteAddr (in that order) to get the client IP.", vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/apis/meta/v1/types_swagger_doc_generated.go-82-} ############################################## vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/conversion/converter.go-506- } vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/conversion/converter.go:507: if !dv.CanAddr() && !dv.CanSet() { vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/conversion/converter.go-508- return fmt.Errorf("can't write to dest") ############################################## vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/conversion/converter.go-521-func (c *Converter) callCustom(sv, dv, custom reflect.Value, scope *scope) error { vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/conversion/converter.go:522: if !sv.CanAddr() { vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/conversion/converter.go-523- sv2 := reflect.New(sv.Type()) ############################################## vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/conversion/converter.go-526- } else { vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/conversion/converter.go:527: sv = sv.Addr() vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/conversion/converter.go-528- } vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/conversion/converter.go:529: if !dv.CanAddr() { vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/conversion/converter.go-530- if !dv.CanSet() { ############################################## vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/conversion/converter.go-536- } else { vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/conversion/converter.go:537: dv = dv.Addr() vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/conversion/converter.go-538- } ############################################## vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/conversion/converter.go-661- scope.setKeys(sk.Interface(), dk.Interface()) vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/conversion/converter.go:662: // TODO: sv.MapIndex(sk) may return a value with CanAddr() == false, vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/conversion/converter.go-663- // because a map[string]struct{} does not allow a pointer reference. ############################################## vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/conversion/queryparams/convert.go-92- if !ok { vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/conversion/queryparams/convert.go:93: if !isPointerKind(value.Kind()) && value.CanAddr() { vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/conversion/queryparams/convert.go:94: marshaler, ok = value.Addr().Interface().(Marshaler) vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/conversion/queryparams/convert.go-95- if !ok { ############################################## vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/runtime/converter.go-215- } vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/runtime/converter.go:216: unmarshaler := dv.Addr().Interface().(encodingjson.Unmarshaler) vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/runtime/converter.go-217- return unmarshaler.UnmarshalJSON(data) ############################################## vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/runtime/converter.go-497- // Check pointer receivers if v is not a pointer vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/runtime/converter.go:498: if v.Kind() != reflect.Ptr && v.CanAddr() { vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/runtime/converter.go:499: v = v.Addr() vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/runtime/converter.go-500- if v.Type().Implements(marshalerType) { ############################################## vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/runtime/helper.go-101- } vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/runtime/helper.go:102: field = field.Addr() vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/runtime/helper.go-103- if field.Type().AssignableTo(v.Type()) { ############################################## vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/util/validation/validation.go-395-// as defined in RFC 789. (e.g 0.0.0.0:10254 or [::]:10254)) vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/util/validation/validation.go:396:func IsValidSocketAddr(value string) []string { vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/util/validation/validation.go-397- var errs []string ############################################## vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/third_party/forked/golang/reflect/deep_equal.go-123- vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/third_party/forked/golang/reflect/deep_equal.go:124: if v1.CanAddr() && v2.CanAddr() && hard(v1.Kind()) { vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/third_party/forked/golang/reflect/deep_equal.go:125: addr1 := v1.UnsafeAddr() vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/third_party/forked/golang/reflect/deep_equal.go:126: addr2 := v2.UnsafeAddr() vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/third_party/forked/golang/reflect/deep_equal.go-127- if addr1 > addr2 { ############################################## vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/third_party/forked/golang/reflect/deep_equal.go-266- vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/third_party/forked/golang/reflect/deep_equal.go:267: if v1.CanAddr() && v2.CanAddr() && hard(v1.Kind()) { vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/third_party/forked/golang/reflect/deep_equal.go:268: addr1 := v1.UnsafeAddr() vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/third_party/forked/golang/reflect/deep_equal.go:269: addr2 := v2.UnsafeAddr() vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/third_party/forked/golang/reflect/deep_equal.go-270- if addr1 > addr2 { ############################################## vault-1.0.2+dfsg2/vendor/layeh.com/radius/attribute.go-70-// returned if the attribute is not 4 bytes long. vault-1.0.2+dfsg2/vendor/layeh.com/radius/attribute.go:71:func IPAddr(a Attribute) (net.IP, error) { vault-1.0.2+dfsg2/vendor/layeh.com/radius/attribute.go-72- if len(a) != net.IPv4len { ############################################## vault-1.0.2+dfsg2/vendor/layeh.com/radius/attribute.go-81-// returned if the given address is not an IPv4 address. vault-1.0.2+dfsg2/vendor/layeh.com/radius/attribute.go:82:func NewIPAddr(a net.IP) (Attribute, error) { vault-1.0.2+dfsg2/vendor/layeh.com/radius/attribute.go-83- a = a.To4() ############################################## vault-1.0.2+dfsg2/vendor/layeh.com/radius/attribute.go-93-// returned if the attribute is not 16 bytes long. vault-1.0.2+dfsg2/vendor/layeh.com/radius/attribute.go:94:func IPv6Addr(a Attribute) (net.IP, error) { vault-1.0.2+dfsg2/vendor/layeh.com/radius/attribute.go-95- if len(a) != net.IPv6len { ############################################## vault-1.0.2+dfsg2/vendor/layeh.com/radius/attribute.go-104-// returned if the given address is not an IPv6 address. vault-1.0.2+dfsg2/vendor/layeh.com/radius/attribute.go:105:func NewIPv6Addr(a net.IP) (Attribute, error) { vault-1.0.2+dfsg2/vendor/layeh.com/radius/attribute.go-106- a = a.To16() ############################################## vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go-359- var a radius.Attribute vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go:360: a, err = radius.NewIPAddr(value) vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go-361- if err != nil { ############################################## vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go-375- for _, attr := range p.Attributes[NASIPAddress_Type] { vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go:376: i, err = radius.IPAddr(attr) vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go-377- if err != nil { ############################################## vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go-390- } vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go:391: value, err = radius.IPAddr(a) vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go-392- return ############################################## vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go-396- var a radius.Attribute vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go:397: a, err = radius.NewIPAddr(value) vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go-398- if err != nil { ############################################## vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go-629- var a radius.Attribute vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go:630: a, err = radius.NewIPAddr(value) vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go-631- if err != nil { ############################################## vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go-645- for _, attr := range p.Attributes[FramedIPAddress_Type] { vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go:646: i, err = radius.IPAddr(attr) vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go-647- if err != nil { ############################################## vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go-660- } vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go:661: value, err = radius.IPAddr(a) vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go-662- return ############################################## vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go-666- var a radius.Attribute vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go:667: a, err = radius.NewIPAddr(value) vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go-668- if err != nil { ############################################## vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go-680- var a radius.Attribute vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go:681: a, err = radius.NewIPAddr(value) vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go-682- if err != nil { ############################################## vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go-696- for _, attr := range p.Attributes[FramedIPNetmask_Type] { vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go:697: i, err = radius.IPAddr(attr) vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go-698- if err != nil { ############################################## vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go-711- } vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go:712: value, err = radius.IPAddr(a) vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go-713- return ############################################## vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go-717- var a radius.Attribute vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go:718: a, err = radius.NewIPAddr(value) vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go-719- if err != nil { ############################################## vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go-1030- var a radius.Attribute vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go:1031: a, err = radius.NewIPAddr(value) vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go-1032- if err != nil { ############################################## vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go-1046- for _, attr := range p.Attributes[LoginIPHost_Type] { vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go:1047: i, err = radius.IPAddr(attr) vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go-1048- if err != nil { ############################################## vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go-1061- } vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go:1062: value, err = radius.IPAddr(a) vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go-1063- return ############################################## vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go-1067- var a radius.Attribute vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go:1068: a, err = radius.NewIPAddr(value) vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go-1069- if err != nil { ############################################## vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go-1621- var a radius.Attribute vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go:1622: a, err = radius.NewIPAddr(value) vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go-1623- if err != nil { ############################################## vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go-1637- for _, attr := range p.Attributes[FramedIPXNetwork_Type] { vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go:1638: i, err = radius.IPAddr(attr) vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go-1639- if err != nil { ############################################## vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go-1652- } vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go:1653: value, err = radius.IPAddr(a) vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go-1654- return ############################################## vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go-1658- var a radius.Attribute vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go:1659: a, err = radius.NewIPAddr(value) vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go-1660- if err != nil { ############################################## vault-1.0.2+dfsg2/vendor/layeh.com/radius/server-packet.go-176- request := Request{ vault-1.0.2+dfsg2/vendor/layeh.com/radius/server-packet.go:177: LocalAddr: conn.LocalAddr(), vault-1.0.2+dfsg2/vendor/layeh.com/radius/server-packet.go-178- RemoteAddr: remoteAddr, ############################################## vault-1.0.2+dfsg2/website/assets/app.js-7-/* eslint-disable-next-line */ vault-1.0.2+dfsg2/website/assets/app.js:8:console.log(`Building assets for environment *${process.env.NODE_ENV}*`) vault-1.0.2+dfsg2/website/assets/app.js-9- ############################################## vault-1.0.2+dfsg2/website/assets/app.js-27- /* eslint-disable-next-line */ vault-1.0.2+dfsg2/website/assets/app.js:28: console.log(`utilServerUrl=${utilServerUrl}`) vault-1.0.2+dfsg2/website/assets/app.js-29-} ############################################## vault-1.0.2+dfsg2/website/assets/js/analytics.js-68- return { vault-1.0.2+dfsg2/website/assets/js/analytics.js:69: event: `Outbound Link | ${window.location.pathname}`, vault-1.0.2+dfsg2/website/assets/js/analytics.js-70- category: 'Outbound link', ############################################## vault-1.0.2+dfsg2/website/assets/js/utils.js-10- res[name] = [] vault-1.0.2+dfsg2/website/assets/js/utils.js:11: each(document.querySelectorAll(`.g-${name}`), el => { vault-1.0.2+dfsg2/website/assets/js/utils.js-12- // do not initialize nested components ############################################## vault-1.0.2+dfsg2/website/assets/js/utils.js-15- .reduce((m, name) => { vault-1.0.2+dfsg2/website/assets/js/utils.js:16: const parent = findParent(el, `.g-${name}`) vault-1.0.2+dfsg2/website/assets/js/utils.js-17- if (parent) m.push(parent) ############################################## vault-1.0.2+dfsg2/website/assets/js/utils.js-26- const vdom = hydrateInitialState(el.dataset.state, { vault-1.0.2+dfsg2/website/assets/js/utils.js:27: [`hashi-${name}`]: obj[k] vault-1.0.2+dfsg2/website/assets/js/utils.js-28- }) ############################################## vault-1.0.2+dfsg2/website/source/api/auth/gcp/index.html.md-158- generated under this token will have associated group aliases, namely vault-1.0.2+dfsg2/website/source/api/auth/gcp/index.html.md:159: `project-$PROJECT_ID`, `folder-$PROJECT_ID`, and `organization-$ORG_ID` vault-1.0.2+dfsg2/website/source/api/auth/gcp/index.html.md-160- for the entities project and all its folder or organization ancestors. This ############################################## vault-1.0.2+dfsg2/website/source/api/secret/gcp/index.html.md-270-Generates an OAuth2 token with the scopes defined on the roleset. This OAuth access token can vault-1.0.2+dfsg2/website/source/api/secret/gcp/index.html.md:271:be used in GCP API calls, e.g. `curl -H "Authorization: Bearer $TOKEN" ...` vault-1.0.2+dfsg2/website/source/api/secret/gcp/index.html.md-272- ############################################## vault-1.0.2+dfsg2/website/source/docs/auth/alicloud.html.md-101-``` vault-1.0.2+dfsg2/website/source/docs/auth/alicloud.html.md:102:Please note the `$ROLE_NAME` above is case-sensitive and must be consistent with how it's reflected vault-1.0.2+dfsg2/website/source/docs/auth/alicloud.html.md-103-on the instance. ############################################## vault-1.0.2+dfsg2/website/source/docs/auth/ldap.html.md-174-* Server does not allow anonymous binds for performing user search. vault-1.0.2+dfsg2/website/source/docs/auth/ldap.html.md:175:* Bind account used for searching is `cn=vault,ou=users,dc=example,dc=com` with password `My$ecrt3tP4ss`. vault-1.0.2+dfsg2/website/source/docs/auth/ldap.html.md-176-* User objects are under the `ou=Users,dc-example,dc=com` organizational unit. ############################################## vault-1.0.2+dfsg2/website/source/docs/internals/plugins.html.md-22-the plugin's code or navigate to the Vault version holding the version of the vault-1.0.2+dfsg2/website/source/docs/internals/plugins.html.md:23:plugin you desire. Then, you'd `$ cd` into the `cmd/:plugin-name` directory vault-1.0.2+dfsg2/website/source/docs/internals/plugins.html.md-24-contained alongside that plugin's code. For instance, for AppRole, you would: vault-1.0.2+dfsg2/website/source/docs/internals/plugins.html.md:25:`$ cd vault/builtin/credential/approle/cmd/approle`. Once in that directory, vault-1.0.2+dfsg2/website/source/docs/internals/plugins.html.md:26:you would run `$ go build` to obtain a new binary for the AppRole plugin. Then vault-1.0.2+dfsg2/website/source/docs/internals/plugins.html.md-27-you would add it to the plugin catalog as per normal, and enable it. ############################################## vault-1.0.2+dfsg2/website/source/docs/secrets/ad/index.html.md-91- vault-1.0.2+dfsg2/website/source/docs/secrets/ad/index.html.md:92: The `$USERNAME` and `$PASSWORD` given must have access to modify passwords vault-1.0.2+dfsg2/website/source/docs/secrets/ad/index.html.md-93- for the given account. It is possible to delegate access to change ############################################## vault-1.0.2+dfsg2/website/source/docs/secrets/gcp/index.html.md-476- attributes when reading responses for the access tokens secrets endpoint (i.e. vault-1.0.2+dfsg2/website/source/docs/secrets/gcp/index.html.md:477: from `gcp/token/$roleset`). See the [documentation for access vault-1.0.2+dfsg2/website/source/docs/secrets/gcp/index.html.md-478- tokens](#access-tokens) to see the new format for the response. ############################################## vault-1.0.2+dfsg2/website/source/intro/getting-started/apis.html.md-90-To make this guide easy to copy-and-paste, we will be using the environment vault-1.0.2+dfsg2/website/source/intro/getting-started/apis.html.md:91:variable `$VAULT_TOKEN` to store the root token. You can export this Vault vault-1.0.2+dfsg2/website/source/intro/getting-started/apis.html.md-92-token in your current shell like this: ############################################## vault-1.0.2+dfsg2/debian/rules-18- ## Remove Files-Excluded (when built from checkout or non-DFSG tarball): vault-1.0.2+dfsg2/debian/rules:19: $(RM) -rv `perl -0nE 'say $$1 if m{^Files\-Excluded\:\s*(.*?)(?:\n\n|Files:|Comment:)}sm;' debian/copyright` vault-1.0.2+dfsg2/debian/rules-20-# -find . -type f -name '*.pb.go' -delete -printf 'removed %p\n' ## delete generated .pb.go files ############################################## vault-1.0.2+dfsg2/.pc/t-skip-tests.patch/logical/framework/openapi_test.go-60- t.Run("Alternation", func(t *testing.T) { vault-1.0.2+dfsg2/.pc/t-skip-tests.patch/logical/framework/openapi_test.go:61: input := `(raw/?$|raw/(?P<path>.+))` vault-1.0.2+dfsg2/.pc/t-skip-tests.patch/logical/framework/openapi_test.go-62- ############################################## vault-1.0.2+dfsg2/.pc/t-skip-tests.patch/logical/framework/openapi_test.go-113- { vault-1.0.2+dfsg2/.pc/t-skip-tests.patch/logical/framework/openapi_test.go:114: input: `ab?cde^fg(hi?j$k`, vault-1.0.2+dfsg2/.pc/t-skip-tests.patch/logical/framework/openapi_test.go-115- regex: cleanCharsRe, ############################################## vault-1.0.2+dfsg2/.pc/t-skip-tests.patch/logical/framework/openapi_test.go-173- }}, vault-1.0.2+dfsg2/.pc/t-skip-tests.patch/logical/framework/openapi_test.go:174: {`(raw/?$|raw/(?P<path>.+))`, []string{ vault-1.0.2+dfsg2/.pc/t-skip-tests.patch/logical/framework/openapi_test.go-175- "raw", ############################################## vault-1.0.2+dfsg2/.pc/t-skip-tests.patch/vault/cluster_test.go-118- for _, ln := range cores[0].Listeners { vault-1.0.2+dfsg2/.pc/t-skip-tests.patch/vault/cluster_test.go:119: tcpAddr, ok := ln.Addr().(*net.TCPAddr) vault-1.0.2+dfsg2/.pc/t-skip-tests.patch/vault/cluster_test.go-120- if !ok {