===========================================================
                                      .___ __  __   
          _________________  __ __  __| _/|__|/  |_ 
         / ___\_` __ \__  \ |  |  \/ __ | | \\_  __\
        / /_/  >  | \// __ \|  |  / /_/ | |  ||  |  
        \___  /|__|  (____  /____/\____ | |__||__|  
       /_____/            \/           \/           
              grep rough audit - static analysis tool
                  v2.8 written by @Wireghoul
=================================[justanotherhacker.com]===
vault-1.0.2+dfsg2/Makefile-39-# *-mem variants will enable memory profiling which will write snapshots of heap usage
vault-1.0.2+dfsg2/Makefile:40:# to $TMP/vaultprof every 5 minutes. These can be analyzed using `$ go tool pprof <profile_file>`.
vault-1.0.2+dfsg2/Makefile:41:# Note that any build can have profiling added via: `$ BUILD_TAGS=memprofiler make ...`
vault-1.0.2+dfsg2/Makefile-42-dev-mem: BUILD_TAGS+=memprofiler
##############################################
vault-1.0.2+dfsg2/README.md-66-[GOPATH](https://golang.org/doc/code.html#GOPATH). Next, clone this repository
vault-1.0.2+dfsg2/README.md:67:into `$GOPATH/src/github.com/hashicorp/vault`. You can then download any
vault-1.0.2+dfsg2/README.md-68-required build tools by bootstrapping your environment:
##############################################
vault-1.0.2+dfsg2/README.md-75-To compile a development version of Vault, run `make` or `make dev`. This will
vault-1.0.2+dfsg2/README.md:76:put the Vault binary in the `bin` and `$GOPATH/bin` folders:
vault-1.0.2+dfsg2/README.md-77-
##############################################
vault-1.0.2+dfsg2/api/api_integration_test.go-119-	client, err := api.NewClient(&api.Config{
vault-1.0.2+dfsg2/api/api_integration_test.go:120:		Address: "http://" + listener.Addr().String(),
vault-1.0.2+dfsg2/api/api_integration_test.go-121-	})
##############################################
vault-1.0.2+dfsg2/api/api_test.go-22-	config := DefaultConfig()
vault-1.0.2+dfsg2/api/api_test.go:23:	config.Address = fmt.Sprintf("http://%s", ln.Addr())
vault-1.0.2+dfsg2/api/api_test.go-24-
##############################################
vault-1.0.2+dfsg2/api/ssh_agent_test.go-69-
vault-1.0.2+dfsg2/api/ssh_agent_test.go:70:func TestParseSSHHelperConfig_missingVaultAddr(t *testing.T) {
vault-1.0.2+dfsg2/api/ssh_agent_test.go-71-	_, err := ParseSSHHelperConfig("")
##############################################
vault-1.0.2+dfsg2/audit/format.go-151-			PolicyOverride:     req.PolicyOverride,
vault-1.0.2+dfsg2/audit/format.go:152:			RemoteAddr:         getRemoteAddr(req),
vault-1.0.2+dfsg2/audit/format.go-153-			ReplicationCluster: req.ReplicationCluster,
##############################################
vault-1.0.2+dfsg2/audit/format.go-364-			PolicyOverride:     req.PolicyOverride,
vault-1.0.2+dfsg2/audit/format.go:365:			RemoteAddr:         getRemoteAddr(req),
vault-1.0.2+dfsg2/audit/format.go-366-			ReplicationCluster: req.ReplicationCluster,
##############################################
vault-1.0.2+dfsg2/audit/format.go-465-// getRemoteAddr safely gets the remote address avoiding a nil pointer
vault-1.0.2+dfsg2/audit/format.go:466:func getRemoteAddr(req *logical.Request) string {
vault-1.0.2+dfsg2/audit/format.go-467-	if req != nil && req.Connection != nil {
##############################################
vault-1.0.2+dfsg2/builtin/credential/cert/backend_test.go-123-	go func() {
vault-1.0.2+dfsg2/builtin/credential/cert/backend_test.go:124:		addr := list.Addr().String()
vault-1.0.2+dfsg2/builtin/credential/cert/backend_test.go-125-		conn, err := tls.Dial("tcp", addr, dialConf)
##############################################
vault-1.0.2+dfsg2/builtin/credential/cert/backend_test.go-1613-	go func() {
vault-1.0.2+dfsg2/builtin/credential/cert/backend_test.go:1614:		addr := list.Addr().String()
vault-1.0.2+dfsg2/builtin/credential/cert/backend_test.go-1615-		conn, err := tls.Dial("tcp", addr, dialConf)
##############################################
vault-1.0.2+dfsg2/builtin/logical/postgresql/secret_creds.go-138-		var exists bool
vault-1.0.2+dfsg2/builtin/logical/postgresql/secret_creds.go:139:		err = db.QueryRow("SELECT exists (SELECT rolname FROM pg_roles WHERE rolname=$1);", username).Scan(&exists)
vault-1.0.2+dfsg2/builtin/logical/postgresql/secret_creds.go-140-		if err != nil && err != sql.ErrNoRows {
##############################################
vault-1.0.2+dfsg2/builtin/logical/postgresql/secret_creds.go-151-		// we want to remove as much access as possible
vault-1.0.2+dfsg2/builtin/logical/postgresql/secret_creds.go:152:		stmt, err := db.Prepare("SELECT DISTINCT table_schema FROM information_schema.role_column_grants WHERE grantee=$1;")
vault-1.0.2+dfsg2/builtin/logical/postgresql/secret_creds.go-153-		if err != nil {
##############################################
vault-1.0.2+dfsg2/command/command_test.go-208-	client, err := api.NewClient(&api.Config{
vault-1.0.2+dfsg2/command/command_test.go:209:		Address: "http://" + listener.Addr().String(),
vault-1.0.2+dfsg2/command/command_test.go-210-	})
##############################################
vault-1.0.2+dfsg2/command/config.go-16-// Config is the CLI configuration for Vault that can be specified via
vault-1.0.2+dfsg2/command/config.go:17:// a `$HOME/.vault` file which is HCL-formatted (therefore HCL or JSON).
vault-1.0.2+dfsg2/command/config.go-18-type DefaultConfig struct {
##############################################
vault-1.0.2+dfsg2/command/config/config.go-24-// Config is the CLI configuration for Vault that can be specified via
vault-1.0.2+dfsg2/command/config/config.go:25:// a `$HOME/.vault` file which is HCL-formatted (therefore HCL or JSON).
vault-1.0.2+dfsg2/command/config/config.go-26-type DefaultConfig struct {
##############################################
vault-1.0.2+dfsg2/command/server.go-808-				addr = addrRaw.(string)
vault-1.0.2+dfsg2/command/server.go:809:				tcpAddr, err := net.ResolveTCPAddr("tcp", addr)
vault-1.0.2+dfsg2/command/server.go-810-				if err != nil {
##############################################
vault-1.0.2+dfsg2/command/server.go-815-			} else {
vault-1.0.2+dfsg2/command/server.go:816:				tcpAddr, ok := ln.Addr().(*net.TCPAddr)
vault-1.0.2+dfsg2/command/server.go-817-				if !ok {
##############################################
vault-1.0.2+dfsg2/command/server.go-1599-	// Get the hostname
vault-1.0.2+dfsg2/command/server.go:1600:	host, err := detect.DetectHostAddr()
vault-1.0.2+dfsg2/command/server.go-1601-	if err != nil {
##############################################
vault-1.0.2+dfsg2/command/server/listener_tcp_test.go-26-	connFn := func(lnReal net.Listener) (net.Conn, error) {
vault-1.0.2+dfsg2/command/server/listener_tcp_test.go:27:		return net.Dial("tcp", ln.Addr().String())
vault-1.0.2+dfsg2/command/server/listener_tcp_test.go-28-	}
##############################################
vault-1.0.2+dfsg2/command/server/listener_tcp_test.go-76-			}
vault-1.0.2+dfsg2/command/server/listener_tcp_test.go:77:			conn, err := tls.Dial("tcp", ln.Addr().String(), conf)
vault-1.0.2+dfsg2/command/server/listener_tcp_test.go-78-
##############################################
vault-1.0.2+dfsg2/command/server_test.go-29-
vault-1.0.2+dfsg2/command/server_test.go:30:	addr, err := net.ResolveTCPAddr("tcp", "127.0.0.1:0")
vault-1.0.2+dfsg2/command/server_test.go-31-	if err != nil {
##############################################
vault-1.0.2+dfsg2/command/server_test.go-40-
vault-1.0.2+dfsg2/command/server_test.go:41:	return l.Addr().(*net.TCPAddr).Port
vault-1.0.2+dfsg2/command/server_test.go-42-}
##############################################
vault-1.0.2+dfsg2/command/ssh.go-878-	// Vault only deals with IP addresses.
vault-1.0.2+dfsg2/command/ssh.go:879:	ipAddr, err := net.ResolveIPAddr("ip", hostname)
vault-1.0.2+dfsg2/command/ssh.go-880-	if err != nil {
##############################################
vault-1.0.2+dfsg2/helper/cidrutil/cidr.go-20-	}
vault-1.0.2+dfsg2/helper/cidrutil/cidr.go:21:	remoteSockAddr, err := sockaddr.NewSockAddr(remoteAddr)
vault-1.0.2+dfsg2/helper/cidrutil/cidr.go-22-	if err != nil {
##############################################
vault-1.0.2+dfsg2/helper/cidrutil/cidr_test.go-202-func TestCIDRUtil_RemoteAddrIsOk_NegativeTest(t *testing.T) {
vault-1.0.2+dfsg2/helper/cidrutil/cidr_test.go:203:	addr, err := sockaddr.NewSockAddr("127.0.0.1/8")
vault-1.0.2+dfsg2/helper/cidrutil/cidr_test.go-204-	if err != nil {
##############################################
vault-1.0.2+dfsg2/helper/cidrutil/cidr_test.go-215-func TestCIDRUtil_RemoteAddrIsOk_PositiveTest(t *testing.T) {
vault-1.0.2+dfsg2/helper/cidrutil/cidr_test.go:216:	addr, err := sockaddr.NewSockAddr("127.0.0.1/8")
vault-1.0.2+dfsg2/helper/cidrutil/cidr_test.go-217-	if err != nil {
##############################################
vault-1.0.2+dfsg2/helper/forwarding/types.pb.go-99-
vault-1.0.2+dfsg2/helper/forwarding/types.pb.go:100:func (m *Request) GetRemoteAddr() string {
vault-1.0.2+dfsg2/helper/forwarding/types.pb.go-101-	if m != nil {
##############################################
vault-1.0.2+dfsg2/helper/mfa/duo/duo.go-76-		authapi.PreauthUsername(duoUser),
vault-1.0.2+dfsg2/helper/mfa/duo/duo.go:77:		authapi.PreauthIpAddr(request.ipAddr),
vault-1.0.2+dfsg2/helper/mfa/duo/duo.go-78-	)
##############################################
vault-1.0.2+dfsg2/helper/parseutil/parseutil.go-156-	for _, addr := range stringAddrs {
vault-1.0.2+dfsg2/helper/parseutil/parseutil.go:157:		sa, err := sockaddr.NewSockAddr(addr)
vault-1.0.2+dfsg2/helper/parseutil/parseutil.go-158-		if err != nil {
##############################################
vault-1.0.2+dfsg2/helper/proxyutil/proxyutil.go-56-
vault-1.0.2+dfsg2/helper/proxyutil/proxyutil.go:57:				sa, err := sockaddr.NewSockAddr(addr.String())
vault-1.0.2+dfsg2/helper/proxyutil/proxyutil.go-58-				if err != nil {
##############################################
vault-1.0.2+dfsg2/http/forwarded_for_test.go-13-func TestHandler_XForwardedFor(t *testing.T) {
vault-1.0.2+dfsg2/http/forwarded_for_test.go:14:	goodAddr, err := sockaddr.NewIPAddr("127.0.0.1")
vault-1.0.2+dfsg2/http/forwarded_for_test.go-15-	if err != nil {
##############################################
vault-1.0.2+dfsg2/http/forwarded_for_test.go-18-
vault-1.0.2+dfsg2/http/forwarded_for_test.go:19:	badAddr, err := sockaddr.NewIPAddr("1.2.3.4")
vault-1.0.2+dfsg2/http/forwarded_for_test.go-20-	if err != nil {
##############################################
vault-1.0.2+dfsg2/http/handler.go-223-
vault-1.0.2+dfsg2/http/handler.go:224:		addr, err := sockaddr.NewIPAddr(host)
vault-1.0.2+dfsg2/http/handler.go-225-		if err != nil {
##############################################
vault-1.0.2+dfsg2/http/testing.go-23-	}
vault-1.0.2+dfsg2/http/testing.go:24:	addr := "http://" + ln.Addr().String()
vault-1.0.2+dfsg2/http/testing.go-25-	return ln, addr
##############################################
vault-1.0.2+dfsg2/http/testing.go-35-	server := &http.Server{
vault-1.0.2+dfsg2/http/testing.go:36:		Addr:     ln.Addr().String(),
vault-1.0.2+dfsg2/http/testing.go-37-		Handler:  mux,
##############################################
vault-1.0.2+dfsg2/logical/framework/openapi.go-185-var cleanCharsRe = regexp.MustCompile("[()^$?]")                     // Set of regex characters that will be stripped during cleaning
vault-1.0.2+dfsg2/logical/framework/openapi.go:186:var cleanSuffixRe = regexp.MustCompile(`/\?\$?$`)                    // Path suffix patterns that will be stripped during cleaning
vault-1.0.2+dfsg2/logical/framework/openapi.go-187-var wsRe = regexp.MustCompile(`\s+`)                                 // Match whitespace, to be compressed during cleaning
##############################################
vault-1.0.2+dfsg2/logical/framework/openapi_test.go-60-	t.Run("Alternation", func(t *testing.T) {
vault-1.0.2+dfsg2/logical/framework/openapi_test.go:61:		input := `(raw/?$|raw/(?P<path>.+))`
vault-1.0.2+dfsg2/logical/framework/openapi_test.go-62-
##############################################
vault-1.0.2+dfsg2/logical/framework/openapi_test.go-113-			{
vault-1.0.2+dfsg2/logical/framework/openapi_test.go:114:				input:  `ab?cde^fg(hi?j$k`,
vault-1.0.2+dfsg2/logical/framework/openapi_test.go-115-				regex:  cleanCharsRe,
##############################################
vault-1.0.2+dfsg2/logical/framework/openapi_test.go-173-		}},
vault-1.0.2+dfsg2/logical/framework/openapi_test.go:174:		{`(raw/?$|raw/(?P<path>.+))`, []string{
vault-1.0.2+dfsg2/logical/framework/openapi_test.go-175-			"raw",
##############################################
vault-1.0.2+dfsg2/logical/plugin/pb/backend.pb.go-2646-
vault-1.0.2+dfsg2/logical/plugin/pb/backend.pb.go:2647:func (m *Connection) GetRemoteAddr() string {
vault-1.0.2+dfsg2/logical/plugin/pb/backend.pb.go-2648-	if m != nil {
##############################################
vault-1.0.2+dfsg2/physical/cockroachdb/cockroachdb.go-85-				" UPDATE SET (path, value) = ($1, $2)",
vault-1.0.2+dfsg2/physical/cockroachdb/cockroachdb.go:86:			"get":    "SELECT value FROM " + dbTable + " WHERE path = $1",
vault-1.0.2+dfsg2/physical/cockroachdb/cockroachdb.go:87:			"delete": "DELETE FROM " + dbTable + " WHERE path = $1",
vault-1.0.2+dfsg2/physical/cockroachdb/cockroachdb.go-88-			"list":   "SELECT path FROM " + dbTable + " WHERE path LIKE $1",
##############################################
vault-1.0.2+dfsg2/physical/consul/consul.go-537-// DetectHostAddr is used to detect the host address by asking the Consul agent
vault-1.0.2+dfsg2/physical/consul/consul.go:538:func (c *ConsulBackend) DetectHostAddr() (string, error) {
vault-1.0.2+dfsg2/physical/consul/consul.go-539-	agent := c.client.Agent()
##############################################
vault-1.0.2+dfsg2/physical/consul/consul.go-629-func (c *ConsulBackend) RunServiceDiscovery(waitGroup *sync.WaitGroup, shutdownCh physical.ShutdownChannel, redirectAddr string, activeFunc physical.ActiveFunction, sealedFunc physical.SealedFunction, perfStandbyFunc physical.PerformanceStandbyFunction) (err error) {
vault-1.0.2+dfsg2/physical/consul/consul.go:630:	if err := c.setRedirectAddr(redirectAddr); err != nil {
vault-1.0.2+dfsg2/physical/consul/consul.go-631-		return err
##############################################
vault-1.0.2+dfsg2/physical/consul/consul.go-875-
vault-1.0.2+dfsg2/physical/consul/consul.go:876:func (c *ConsulBackend) setRedirectAddr(addr string) (err error) {
vault-1.0.2+dfsg2/physical/consul/consul.go-877-	if addr == "" {
##############################################
vault-1.0.2+dfsg2/physical/consul/consul_test.go-342-
vault-1.0.2+dfsg2/physical/consul/consul_test.go:343:func TestConsul_setRedirectAddr(t *testing.T) {
vault-1.0.2+dfsg2/physical/consul/consul_test.go-344-	tests := []struct {
##############################################
vault-1.0.2+dfsg2/physical/consul/consul_test.go-384-		c := testConsulBackend(t)
vault-1.0.2+dfsg2/physical/consul/consul_test.go:385:		err := c.setRedirectAddr(test.addr)
vault-1.0.2+dfsg2/physical/consul/consul_test.go-386-		if test.pass {
##############################################
vault-1.0.2+dfsg2/physical/consul/consul_test.go-482-
vault-1.0.2+dfsg2/physical/consul/consul_test.go:483:		if err := c.setRedirectAddr(test.redirectAddr); err != nil {
vault-1.0.2+dfsg2/physical/consul/consul_test.go-484-			t.Fatalf("bad: %s %v", test.name, err)
##############################################
vault-1.0.2+dfsg2/physical/consul/consul_test.go-583-	}
vault-1.0.2+dfsg2/physical/consul/consul_test.go:584:	host, err := detect.DetectHostAddr()
vault-1.0.2+dfsg2/physical/consul/consul_test.go-585-	if err != nil {
##############################################
vault-1.0.2+dfsg2/physical/foundationdb/fdb-go-install.sh-57-
vault-1.0.2+dfsg2/physical/foundationdb/fdb-go-install.sh:58:filedir=$(cd `dirname "${BASH_SOURCE[0]}"` && pwd)
vault-1.0.2+dfsg2/physical/foundationdb/fdb-go-install.sh-59-destdir=""
##############################################
vault-1.0.2+dfsg2/physical/physical.go-71-	// DetectHostAddr is used to detect the host address
vault-1.0.2+dfsg2/physical/physical.go:72:	DetectHostAddr() (string, error)
vault-1.0.2+dfsg2/physical/physical.go-73-}
##############################################
vault-1.0.2+dfsg2/physical/postgresql/postgresql.go-95-		put_query:    put_query,
vault-1.0.2+dfsg2/physical/postgresql/postgresql.go:96:		get_query:    "SELECT value FROM " + quoted_table + " WHERE path = $1 AND key = $2",
vault-1.0.2+dfsg2/physical/postgresql/postgresql.go:97:		delete_query: "DELETE FROM " + quoted_table + " WHERE path = $1 AND key = $2",
vault-1.0.2+dfsg2/physical/postgresql/postgresql.go:98:		list_query: "SELECT key FROM " + quoted_table + " WHERE path = $1" +
vault-1.0.2+dfsg2/physical/postgresql/postgresql.go-99-			"UNION SELECT DISTINCT substring(substr(path, length($1)+1) from '^.*?/') FROM " +
##############################################
vault-1.0.2+dfsg2/physical/zookeeper/zookeeper.go-227-			if !ipSanCheck {
vault-1.0.2+dfsg2/physical/zookeeper/zookeeper.go:228:				lookupAddressMany, lookupErr := net.LookupAddr(serverName)
vault-1.0.2+dfsg2/physical/zookeeper/zookeeper.go-229-				if lookupErr == nil {
##############################################
vault-1.0.2+dfsg2/plugins/database/postgresql/postgresql.go-265-	var exists bool
vault-1.0.2+dfsg2/plugins/database/postgresql/postgresql.go:266:	err = db.QueryRowContext(ctx, "SELECT exists (SELECT rolname FROM pg_roles WHERE rolname=$1);", username).Scan(&exists)
vault-1.0.2+dfsg2/plugins/database/postgresql/postgresql.go-267-	if err != nil && err != sql.ErrNoRows {
##############################################
vault-1.0.2+dfsg2/plugins/database/postgresql/postgresql.go-278-	// we want to remove as much access as possible
vault-1.0.2+dfsg2/plugins/database/postgresql/postgresql.go:279:	stmt, err := db.PrepareContext(ctx, "SELECT DISTINCT table_schema FROM information_schema.role_column_grants WHERE grantee=$1;")
vault-1.0.2+dfsg2/plugins/database/postgresql/postgresql.go-280-	if err != nil {
##############################################
vault-1.0.2+dfsg2/ui/app/adapters/auth-config/_base.js-9-    if (type === 'identity-whitelist' || type === 'roletag-blacklist') {
vault-1.0.2+dfsg2/ui/app/adapters/auth-config/_base.js:10:      return `tidy/${type}`;
vault-1.0.2+dfsg2/ui/app/adapters/auth-config/_base.js-11-    }
##############################################
vault-1.0.2+dfsg2/ui/app/adapters/auth-config/_base.js-16-    const backendId = id ? id : snapshot.belongsTo('backend').id;
vault-1.0.2+dfsg2/ui/app/adapters/auth-config/_base.js:17:    let url = `${this.get('namespace')}/${backendId}/config`;
vault-1.0.2+dfsg2/ui/app/adapters/auth-config/_base.js-18-    // aws has a lot more config endpoints
vault-1.0.2+dfsg2/ui/app/adapters/auth-config/_base.js-19-    if (modelName.includes('aws')) {
vault-1.0.2+dfsg2/ui/app/adapters/auth-config/_base.js:20:      url = `${url}/${this.pathForType(modelName)}`;
vault-1.0.2+dfsg2/ui/app/adapters/auth-config/_base.js-21-    }
##############################################
vault-1.0.2+dfsg2/ui/app/adapters/auth-method.js-7-  url(path) {
vault-1.0.2+dfsg2/ui/app/adapters/auth-method.js:8:    const url = `${this.buildURL()}/auth`;
vault-1.0.2+dfsg2/ui/app/adapters/auth-method.js-9-    return path ? url + '/' + path : url;
##############################################
vault-1.0.2+dfsg2/ui/app/adapters/auth-method.js-19-    if (isUnauthenticated) {
vault-1.0.2+dfsg2/ui/app/adapters/auth-method.js:20:      let url = `/${this.urlPrefix()}/internal/ui/mounts`;
vault-1.0.2+dfsg2/ui/app/adapters/auth-method.js-21-      return this.ajax(url, 'GET', {
##############################################
vault-1.0.2+dfsg2/ui/app/adapters/aws-credential.js-22-    let role = snapshot.attr('role');
vault-1.0.2+dfsg2/ui/app/adapters/aws-credential.js:23:    let url = `/v1/${role.backend}/creds/${role.name}`;
vault-1.0.2+dfsg2/ui/app/adapters/aws-credential.js-24-
##############################################
vault-1.0.2+dfsg2/ui/app/adapters/cluster.js-83-  features() {
vault-1.0.2+dfsg2/ui/app/adapters/cluster.js:84:    return this.ajax(`${this.urlFor('license')}/features`, 'GET', {
vault-1.0.2+dfsg2/ui/app/adapters/cluster.js-85-      unauthenticated: true,
##############################################
vault-1.0.2+dfsg2/ui/app/adapters/cluster.js-131-      throw new Error(
vault-1.0.2+dfsg2/ui/app/adapters/cluster.js:132:        `Calls to a ${endpoint} endpoint are not currently allowed in the vault cluster adapater`
vault-1.0.2+dfsg2/ui/app/adapters/cluster.js-133-      );
vault-1.0.2+dfsg2/ui/app/adapters/cluster.js-134-    }
vault-1.0.2+dfsg2/ui/app/adapters/cluster.js:135:    return `${this.buildURL()}/${endpoint}`;
vault-1.0.2+dfsg2/ui/app/adapters/cluster.js-136-  },
##############################################
vault-1.0.2+dfsg2/ui/app/adapters/cluster.js-141-      github: 'login',
vault-1.0.2+dfsg2/ui/app/adapters/cluster.js:142:      userpass: `login/${encodeURIComponent(username)}`,
vault-1.0.2+dfsg2/ui/app/adapters/cluster.js:143:      ldap: `login/${encodeURIComponent(username)}`,
vault-1.0.2+dfsg2/ui/app/adapters/cluster.js:144:      okta: `login/${encodeURIComponent(username)}`,
vault-1.0.2+dfsg2/ui/app/adapters/cluster.js-145-      token: 'lookup-self',
##############################################
vault-1.0.2+dfsg2/ui/app/adapters/cluster.js-149-    if (!urlSuffix) {
vault-1.0.2+dfsg2/ui/app/adapters/cluster.js:150:      throw new Error(`There is no auth url for ${type}.`);
vault-1.0.2+dfsg2/ui/app/adapters/cluster.js-151-    }
vault-1.0.2+dfsg2/ui/app/adapters/cluster.js:152:    return `/v1/auth/${urlPrefix}/${urlSuffix}`;
vault-1.0.2+dfsg2/ui/app/adapters/cluster.js-153-  },
##############################################
vault-1.0.2+dfsg2/ui/app/adapters/cluster.js-156-    let suffix;
vault-1.0.2+dfsg2/ui/app/adapters/cluster.js:157:    const errString = `Calls to replication ${endpoint} endpoint are not currently allowed in the vault cluster adapater`;
vault-1.0.2+dfsg2/ui/app/adapters/cluster.js-158-    if (clusterMode) {
vault-1.0.2+dfsg2/ui/app/adapters/cluster.js-159-      assert(errString, REPLICATION_ENDPOINTS[clusterMode].includes(endpoint));
vault-1.0.2+dfsg2/ui/app/adapters/cluster.js:160:      suffix = `${replicationMode}/${clusterMode}/${endpoint}`;
vault-1.0.2+dfsg2/ui/app/adapters/cluster.js-161-    } else {
vault-1.0.2+dfsg2/ui/app/adapters/cluster.js-162-      assert(errString, REPLICATION_ENDPOINTS[endpoint]);
vault-1.0.2+dfsg2/ui/app/adapters/cluster.js:163:      suffix = `${endpoint}`;
vault-1.0.2+dfsg2/ui/app/adapters/cluster.js-164-    }
vault-1.0.2+dfsg2/ui/app/adapters/cluster.js:165:    return `${this.buildURL()}/replication/${suffix}`;
vault-1.0.2+dfsg2/ui/app/adapters/cluster.js-166-  },
##############################################
vault-1.0.2+dfsg2/ui/app/adapters/cluster.js-168-  replicationStatus() {
vault-1.0.2+dfsg2/ui/app/adapters/cluster.js:169:    return this.ajax(`${this.buildURL()}/replication/status`, 'GET', { unauthenticated: true });
vault-1.0.2+dfsg2/ui/app/adapters/cluster.js-170-  },
##############################################
vault-1.0.2+dfsg2/ui/app/adapters/cluster.js-173-    const verb = options && options.checkStatus ? 'GET' : 'PUT';
vault-1.0.2+dfsg2/ui/app/adapters/cluster.js:174:    return this.ajax(`${this.buildURL()}/replication/dr/secondary/promote`, verb, {
vault-1.0.2+dfsg2/ui/app/adapters/cluster.js-175-      data,
##############################################
vault-1.0.2+dfsg2/ui/app/adapters/cluster.js-181-    const verb = options && options.checkStatus ? 'GET' : 'PUT';
vault-1.0.2+dfsg2/ui/app/adapters/cluster.js:182:    let url = `${this.buildURL()}/replication/dr/secondary/generate-operation-token/`;
vault-1.0.2+dfsg2/ui/app/adapters/cluster.js-183-    if (!data || data.pgp_key || data.attempt) {
##############################################
vault-1.0.2+dfsg2/ui/app/adapters/cluster.js-197-    assert(
vault-1.0.2+dfsg2/ui/app/adapters/cluster.js:198:      `${replicationMode} is an unsupported replication mode.`,
vault-1.0.2+dfsg2/ui/app/adapters/cluster.js-199-      replicationMode && REPLICATION_MODES.includes(replicationMode)
##############################################
vault-1.0.2+dfsg2/ui/app/adapters/control-group.js-9-    let baseUrl = this.buildURL(type.modelName);
vault-1.0.2+dfsg2/ui/app/adapters/control-group.js:10:    return this.ajax(`${baseUrl}/request`, 'POST', {
vault-1.0.2+dfsg2/ui/app/adapters/control-group.js-11-      data: {
##############################################
vault-1.0.2+dfsg2/ui/app/adapters/control-group.js-21-    let base = this.buildURL(modelName);
vault-1.0.2+dfsg2/ui/app/adapters/control-group.js:22:    return `${base}/authorize`;
vault-1.0.2+dfsg2/ui/app/adapters/control-group.js-23-  },
##############################################
vault-1.0.2+dfsg2/ui/app/adapters/identity/base.js-20-    }
vault-1.0.2+dfsg2/ui/app/adapters/identity/base.js:21:    return this._super(`${modelName}/id`, id, snapshot, requestType, query);
vault-1.0.2+dfsg2/ui/app/adapters/identity/base.js-22-  },
##############################################
vault-1.0.2+dfsg2/ui/app/adapters/identity/entity.js-4-  lookup(store, data) {
vault-1.0.2+dfsg2/ui/app/adapters/identity/entity.js:5:    let url = `/${this.urlPrefix()}/identity/lookup/entity`;
vault-1.0.2+dfsg2/ui/app/adapters/identity/entity.js-6-    return this.ajax(url, 'POST', { data }).then(response => {
##############################################
vault-1.0.2+dfsg2/ui/app/adapters/identity/group.js-4-  lookup(store, data) {
vault-1.0.2+dfsg2/ui/app/adapters/identity/group.js:5:    let url = `/${this.urlPrefix()}/identity/lookup/group`;
vault-1.0.2+dfsg2/ui/app/adapters/identity/group.js-6-    return this.ajax(url, 'POST', { data }).then(response => {
##############################################
vault-1.0.2+dfsg2/ui/app/adapters/mount-filter-config.js-4-  url(id) {
vault-1.0.2+dfsg2/ui/app/adapters/mount-filter-config.js:5:    return `${this.buildURL()}/replication/performance/primary/mount-filter/${id}`;
vault-1.0.2+dfsg2/ui/app/adapters/mount-filter-config.js-6-  },
##############################################
vault-1.0.2+dfsg2/ui/app/adapters/namespace.js-8-    if (snapshot.adapterOptions && snapshot.adapterOptions.forUser) {
vault-1.0.2+dfsg2/ui/app/adapters/namespace.js:9:      return `/${this.urlPrefix()}/internal/ui/namespaces`;
vault-1.0.2+dfsg2/ui/app/adapters/namespace.js-10-    }
vault-1.0.2+dfsg2/ui/app/adapters/namespace.js:11:    return `/${this.urlPrefix()}/namespaces?list=true`;
vault-1.0.2+dfsg2/ui/app/adapters/namespace.js-12-  },
##############################################
vault-1.0.2+dfsg2/ui/app/adapters/pki-ca-certificate-sign.js-5-    const backend = snapshot.attr('backend');
vault-1.0.2+dfsg2/ui/app/adapters/pki-ca-certificate-sign.js:6:    return `/v1/${backend}/root/sign-intermediate`;
vault-1.0.2+dfsg2/ui/app/adapters/pki-ca-certificate-sign.js-7-  },
##############################################
vault-1.0.2+dfsg2/ui/app/adapters/pki-ca-certificate.js-8-    if (action === 'sign-intermediate') {
vault-1.0.2+dfsg2/ui/app/adapters/pki-ca-certificate.js:9:      return `/v1/${backend}/root/sign-intermediate`;
vault-1.0.2+dfsg2/ui/app/adapters/pki-ca-certificate.js-10-    }
vault-1.0.2+dfsg2/ui/app/adapters/pki-ca-certificate.js-11-    if (action === 'set-signed-intermediate') {
vault-1.0.2+dfsg2/ui/app/adapters/pki-ca-certificate.js:12:      return `/v1/${backend}/intermediate/set-signed`;
vault-1.0.2+dfsg2/ui/app/adapters/pki-ca-certificate.js-13-    }
vault-1.0.2+dfsg2/ui/app/adapters/pki-ca-certificate.js-14-    if (action === 'upload') {
vault-1.0.2+dfsg2/ui/app/adapters/pki-ca-certificate.js:15:      return `/v1/${backend}/config/ca`;
vault-1.0.2+dfsg2/ui/app/adapters/pki-ca-certificate.js-16-    }
vault-1.0.2+dfsg2/ui/app/adapters/pki-ca-certificate.js:17:    return `/v1/${backend}/${caType}/generate/${type}`;
vault-1.0.2+dfsg2/ui/app/adapters/pki-ca-certificate.js-18-  },
##############################################
vault-1.0.2+dfsg2/ui/app/adapters/pki-ca-certificate.js-57-    const backend = snapshot.attr('backend');
vault-1.0.2+dfsg2/ui/app/adapters/pki-ca-certificate.js:58:    return this.ajax(`/v1/${backend}/root`, 'DELETE');
vault-1.0.2+dfsg2/ui/app/adapters/pki-ca-certificate.js-59-  },
##############################################
vault-1.0.2+dfsg2/ui/app/adapters/pki-certificate-sign.js-5-    if (snapshot.attr('signVerbatim') === true) {
vault-1.0.2+dfsg2/ui/app/adapters/pki-certificate-sign.js:6:      return `/v1/${role.backend}/sign-verbatim/${role.name}`;
vault-1.0.2+dfsg2/ui/app/adapters/pki-certificate-sign.js-7-    }
vault-1.0.2+dfsg2/ui/app/adapters/pki-certificate-sign.js:8:    return `/v1/${role.backend}/sign/${role.name}`;
vault-1.0.2+dfsg2/ui/app/adapters/pki-certificate-sign.js-9-  },
##############################################
vault-1.0.2+dfsg2/ui/app/adapters/pki-certificate.js-5-  url(role) {
vault-1.0.2+dfsg2/ui/app/adapters/pki-certificate.js:6:    return `/v1/${role.backend}/issue/${role.name}`;
vault-1.0.2+dfsg2/ui/app/adapters/pki-certificate.js-7-  },
##############################################
vault-1.0.2+dfsg2/ui/app/adapters/pki-certificate.js-9-  urlFor(backend, id) {
vault-1.0.2+dfsg2/ui/app/adapters/pki-certificate.js:10:    let url = `${this.buildURL()}/${backend}/certs`;
vault-1.0.2+dfsg2/ui/app/adapters/pki-certificate.js-11-    if (id) {
vault-1.0.2+dfsg2/ui/app/adapters/pki-certificate.js:12:      url = `${this.buildURL()}/${backend}/cert/${id}`;
vault-1.0.2+dfsg2/ui/app/adapters/pki-certificate.js-13-    }
##############################################
vault-1.0.2+dfsg2/ui/app/adapters/pki-certificate.js-33-        data.id = id;
vault-1.0.2+dfsg2/ui/app/adapters/pki-certificate.js:34:        data.id_for_nav = `cert/${id}`;
vault-1.0.2+dfsg2/ui/app/adapters/pki-certificate.js-35-      }
##############################################
vault-1.0.2+dfsg2/ui/app/adapters/pki-certificate.js-56-    };
vault-1.0.2+dfsg2/ui/app/adapters/pki-certificate.js:57:    return this.ajax(`${this.buildURL()}/${backend}/revoke`, 'POST', { data }).then(resp => {
vault-1.0.2+dfsg2/ui/app/adapters/pki-certificate.js-58-      const data = {
##############################################
vault-1.0.2+dfsg2/ui/app/adapters/pki-config.js-11-    const urls = {
vault-1.0.2+dfsg2/ui/app/adapters/pki-config.js:12:      tidy: `/v1/${backend}/tidy`,
vault-1.0.2+dfsg2/ui/app/adapters/pki-config.js:13:      urls: `/v1/${backend}/config/urls`,
vault-1.0.2+dfsg2/ui/app/adapters/pki-config.js:14:      crl: `/v1/${backend}/config/crl`,
vault-1.0.2+dfsg2/ui/app/adapters/pki-config.js-15-    };
##############################################
vault-1.0.2+dfsg2/ui/app/adapters/pki-config.js-35-      let response = resp || {};
vault-1.0.2+dfsg2/ui/app/adapters/pki-config.js:36:      response.id = `${snapshot.record.get('backend')}-${snapshot.adapterOptions.method}`;
vault-1.0.2+dfsg2/ui/app/adapters/pki-config.js-37-      return response;
##############################################
vault-1.0.2+dfsg2/ui/app/adapters/pki-config.js-55-    }
vault-1.0.2+dfsg2/ui/app/adapters/pki-config.js:56:    return this[`fetch${capitalize(section)}`](backendPath);
vault-1.0.2+dfsg2/ui/app/adapters/pki-config.js-57-  },
##############################################
vault-1.0.2+dfsg2/ui/app/adapters/pki-config.js-64-    // these are all un-authed so using `fetch` directly works
vault-1.0.2+dfsg2/ui/app/adapters/pki-config.js:65:    const derURL = `/v1/${backendPath}/ca`;
vault-1.0.2+dfsg2/ui/app/adapters/pki-config.js:66:    const pemURL = `${derURL}/pem`;
vault-1.0.2+dfsg2/ui/app/adapters/pki-config.js:67:    const chainURL = `${derURL}_chain`;
vault-1.0.2+dfsg2/ui/app/adapters/pki-config.js-68-
##############################################
vault-1.0.2+dfsg2/ui/app/adapters/pki-config.js-78-  fetchUrls(backendPath) {
vault-1.0.2+dfsg2/ui/app/adapters/pki-config.js:79:    const url = `/v1/${backendPath}/config/urls`;
vault-1.0.2+dfsg2/ui/app/adapters/pki-config.js-80-    const id = this.id(backendPath);
##############################################
vault-1.0.2+dfsg2/ui/app/adapters/pki-config.js-96-  fetchCrl(backendPath) {
vault-1.0.2+dfsg2/ui/app/adapters/pki-config.js:97:    const url = `/v1/${backendPath}/config/crl`;
vault-1.0.2+dfsg2/ui/app/adapters/pki-config.js-98-    const id = this.id(backendPath);
##############################################
vault-1.0.2+dfsg2/ui/app/adapters/role-aws.js-33-  urlForRole(backend, id) {
vault-1.0.2+dfsg2/ui/app/adapters/role-aws.js:34:    let url = `${this.buildURL()}/${backend}/roles`;
vault-1.0.2+dfsg2/ui/app/adapters/role-aws.js-35-    if (id) {
##############################################
vault-1.0.2+dfsg2/ui/app/adapters/role-pki.js-33-  urlForRole(backend, id) {
vault-1.0.2+dfsg2/ui/app/adapters/role-pki.js:34:    let url = `${this.buildURL()}/${backend}/roles`;
vault-1.0.2+dfsg2/ui/app/adapters/role-pki.js-35-    if (id) {
##############################################
vault-1.0.2+dfsg2/ui/app/adapters/role-ssh.js-36-  urlForRole(backend, id) {
vault-1.0.2+dfsg2/ui/app/adapters/role-ssh.js:37:    let url = `${this.buildURL()}/${backend}/roles`;
vault-1.0.2+dfsg2/ui/app/adapters/role-ssh.js-38-    if (id) {
##############################################
vault-1.0.2+dfsg2/ui/app/adapters/role-ssh.js-86-    const { backend } = query;
vault-1.0.2+dfsg2/ui/app/adapters/role-ssh.js:87:    const url = `/v1/${backend}/config/zeroaddress`;
vault-1.0.2+dfsg2/ui/app/adapters/role-ssh.js-88-    return this.ajax(url, 'GET');
##############################################
vault-1.0.2+dfsg2/ui/app/adapters/secret-engine.js-5-  url(path) {
vault-1.0.2+dfsg2/ui/app/adapters/secret-engine.js:6:    const url = `${this.buildURL()}/mounts`;
vault-1.0.2+dfsg2/ui/app/adapters/secret-engine.js-7-    return path ? url + '/' + path : url;
##############################################
vault-1.0.2+dfsg2/ui/app/adapters/secret-engine.js-14-  query(store, type, query) {
vault-1.0.2+dfsg2/ui/app/adapters/secret-engine.js:15:    let url = `/${this.urlPrefix()}/internal/ui/mounts`;
vault-1.0.2+dfsg2/ui/app/adapters/secret-engine.js-16-    if (query.path) {
vault-1.0.2+dfsg2/ui/app/adapters/secret-engine.js:17:      url = `${url}/${query.path}`;
vault-1.0.2+dfsg2/ui/app/adapters/secret-engine.js-18-    }
##############################################
vault-1.0.2+dfsg2/ui/app/adapters/secret-engine.js-36-    if (snapshot.attr('type') === 'ssh') {
vault-1.0.2+dfsg2/ui/app/adapters/secret-engine.js:37:      return this.ajax(`/v1/${path}/config/ca`, 'GET');
vault-1.0.2+dfsg2/ui/app/adapters/secret-engine.js-38-    }
##############################################
vault-1.0.2+dfsg2/ui/app/adapters/secret-engine.js-43-    if (query.type === 'aws') {
vault-1.0.2+dfsg2/ui/app/adapters/secret-engine.js:44:      return this.ajax(`/v1/${query.backend}/config/lease`, 'GET').then(resp => {
vault-1.0.2+dfsg2/ui/app/adapters/secret-engine.js-45-        resp.path = query.backend + '/';
##############################################
vault-1.0.2+dfsg2/ui/app/adapters/secret-engine.js-60-      const path = snapshot.id;
vault-1.0.2+dfsg2/ui/app/adapters/secret-engine.js:61:      return this.ajax(`/v1/${path}/${apiPath}`, options.isDelete ? 'DELETE' : 'POST', { data });
vault-1.0.2+dfsg2/ui/app/adapters/secret-engine.js-62-    }
##############################################
vault-1.0.2+dfsg2/ui/app/adapters/secret-engine.js-67-    const path = snapshot.id;
vault-1.0.2+dfsg2/ui/app/adapters/secret-engine.js:68:    return this.ajax(`/v1/${path}/config/root`, 'POST', { data });
vault-1.0.2+dfsg2/ui/app/adapters/secret-engine.js-69-  },
##############################################
vault-1.0.2+dfsg2/ui/app/adapters/secret-engine.js-73-    const path = snapshot.id;
vault-1.0.2+dfsg2/ui/app/adapters/secret-engine.js:74:    return this.ajax(`/v1/${path}/config/lease`, 'POST', { data });
vault-1.0.2+dfsg2/ui/app/adapters/secret-engine.js-75-  },
##############################################
vault-1.0.2+dfsg2/ui/app/adapters/secret-engine.js-83-      .join(',');
vault-1.0.2+dfsg2/ui/app/adapters/secret-engine.js:84:    const url = `/v1/${path}/config/zeroaddress`;
vault-1.0.2+dfsg2/ui/app/adapters/secret-engine.js-85-    const data = { roles };
##############################################
vault-1.0.2+dfsg2/ui/app/adapters/secret-v2-version.js-9-  _url(backend, id, infix = 'data') {
vault-1.0.2+dfsg2/ui/app/adapters/secret-v2-version.js:10:    let url = `${this.buildURL()}/${backend}/${infix}/`;
vault-1.0.2+dfsg2/ui/app/adapters/secret-v2-version.js-11-    if (!isEmpty(id)) {
##############################################
vault-1.0.2+dfsg2/ui/app/adapters/secret-v2-version.js-19-    let base = this._url(backend, path);
vault-1.0.2+dfsg2/ui/app/adapters/secret-v2-version.js:20:    return version ? base + `?version=${version}` : base;
vault-1.0.2+dfsg2/ui/app/adapters/secret-v2-version.js-21-  },
##############################################
vault-1.0.2+dfsg2/ui/app/adapters/secret-v2.js-7-  _url(backend, id) {
vault-1.0.2+dfsg2/ui/app/adapters/secret-v2.js:8:    let url = `${this.buildURL()}/${backend}/metadata/`;
vault-1.0.2+dfsg2/ui/app/adapters/secret-v2.js-9-    if (!isEmpty(id)) {
##############################################
vault-1.0.2+dfsg2/ui/app/adapters/secret.js-28-  urlForSecret(backend, id) {
vault-1.0.2+dfsg2/ui/app/adapters/secret.js:29:    let url = `${this.buildURL()}/${backend}/`;
vault-1.0.2+dfsg2/ui/app/adapters/secret.js-30-    if (!isEmpty(id)) {
##############################################
vault-1.0.2+dfsg2/ui/app/adapters/ssh-otp-credential.js-4-  url(role) {
vault-1.0.2+dfsg2/ui/app/adapters/ssh-otp-credential.js:5:    return `/v1/${role.backend}/creds/${role.name}`;
vault-1.0.2+dfsg2/ui/app/adapters/ssh-otp-credential.js-6-  },
##############################################
vault-1.0.2+dfsg2/ui/app/adapters/ssh-sign.js-4-  url(role) {
vault-1.0.2+dfsg2/ui/app/adapters/ssh-sign.js:5:    return `/v1/${role.backend}/sign/${role.name}`;
vault-1.0.2+dfsg2/ui/app/adapters/ssh-sign.js-6-  },
##############################################
vault-1.0.2+dfsg2/ui/app/adapters/tools.js-11-    if (!isWrapping && !isTool) {
vault-1.0.2+dfsg2/ui/app/adapters/tools.js:12:      throw new Error(`Calls to a ${action} endpoint are not currently allowed in the tool adapter`);
vault-1.0.2+dfsg2/ui/app/adapters/tools.js-13-    }
vault-1.0.2+dfsg2/ui/app/adapters/tools.js:14:    return `${this.buildURL()}/${prefix}/${action}`;
vault-1.0.2+dfsg2/ui/app/adapters/tools.js-15-  },
##############################################
vault-1.0.2+dfsg2/ui/app/adapters/transit-key.js-49-  urlForSecret(backend, id) {
vault-1.0.2+dfsg2/ui/app/adapters/transit-key.js:50:    let url = `${this.buildURL()}/${backend}/keys/`;
vault-1.0.2+dfsg2/ui/app/adapters/transit-key.js-51-    if (id) {
##############################################
vault-1.0.2+dfsg2/ui/app/adapters/transit-key.js-57-  urlForAction(action, backend, id, param) {
vault-1.0.2+dfsg2/ui/app/adapters/transit-key.js:58:    let urlBase = `${this.buildURL()}/${backend}/${action}`;
vault-1.0.2+dfsg2/ui/app/adapters/transit-key.js-59-    // these aren't key-specific
##############################################
vault-1.0.2+dfsg2/ui/app/adapters/transit-key.js-64-      // datakey action has `wrapped` or `plaintext` as part of the url
vault-1.0.2+dfsg2/ui/app/adapters/transit-key.js:65:      return `${urlBase}/${param}/${id}`;
vault-1.0.2+dfsg2/ui/app/adapters/transit-key.js-66-    }
##############################################
vault-1.0.2+dfsg2/ui/app/adapters/transit-key.js-68-      let [type, version] = param;
vault-1.0.2+dfsg2/ui/app/adapters/transit-key.js:69:      const exportBase = `${urlBase}/${type}-key/${id}`;
vault-1.0.2+dfsg2/ui/app/adapters/transit-key.js:70:      return version ? `${exportBase}/${version}` : exportBase;
vault-1.0.2+dfsg2/ui/app/adapters/transit-key.js-71-    }
vault-1.0.2+dfsg2/ui/app/adapters/transit-key.js:72:    return `${urlBase}/${id}`;
vault-1.0.2+dfsg2/ui/app/adapters/transit-key.js-73-  },
##############################################
vault-1.0.2+dfsg2/ui/app/components/auth-form.js-102-    let templateName = dasherize(type);
vault-1.0.2+dfsg2/ui/app/components/auth-form.js:103:    return `partials/auth-form/${templateName}`;
vault-1.0.2+dfsg2/ui/app/components/auth-form.js-104-  }),
##############################################
vault-1.0.2+dfsg2/ui/app/components/auth-form.js-135-    } catch (e) {
vault-1.0.2+dfsg2/ui/app/components/auth-form.js:136:      this.set('error', `Token unwrap failed: ${e.errors[0]}`);
vault-1.0.2+dfsg2/ui/app/components/auth-form.js-137-    }
##############################################
vault-1.0.2+dfsg2/ui/app/components/auth-form.js-152-    } catch (e) {
vault-1.0.2+dfsg2/ui/app/components/auth-form.js:153:      this.set('error', `There was an error fetching auth methods: ${e.errors[0]}`);
vault-1.0.2+dfsg2/ui/app/components/auth-form.js-154-    }
##############################################
vault-1.0.2+dfsg2/ui/app/components/auth-form.js-166-    });
vault-1.0.2+dfsg2/ui/app/components/auth-form.js:167:    this.set('error', `Authentication failed: ${errors.join('.')}`);
vault-1.0.2+dfsg2/ui/app/components/auth-form.js-168-  },
##############################################
vault-1.0.2+dfsg2/ui/app/components/config-pki-ca.js-86-    const caCert = store.createRecord(modelType || 'pki-ca-certificate', {
vault-1.0.2+dfsg2/ui/app/components/config-pki-ca.js:87:      id: `${backend}-ca-cert`,
vault-1.0.2+dfsg2/ui/app/components/config-pki-ca.js-88-      backend,
##############################################
vault-1.0.2+dfsg2/ui/app/components/config-pki-ca.js-113-        display: 'Download CA Certificate in PEM format',
vault-1.0.2+dfsg2/ui/app/components/config-pki-ca.js:114:        name: `${backend}_ca.pem`,
vault-1.0.2+dfsg2/ui/app/components/config-pki-ca.js-115-        url: URL.createObjectURL(pemFile),
##############################################
vault-1.0.2+dfsg2/ui/app/components/config-pki-ca.js-118-        display: 'Download CA Certificate in DER format',
vault-1.0.2+dfsg2/ui/app/components/config-pki-ca.js:119:        name: `${backend}_ca.der`,
vault-1.0.2+dfsg2/ui/app/components/config-pki-ca.js-120-        url: URL.createObjectURL(der),
##############################################
vault-1.0.2+dfsg2/ui/app/components/config-pki-ca.js-126-        display: 'Download CA Certificate Chain',
vault-1.0.2+dfsg2/ui/app/components/config-pki-ca.js:127:        name: `${backend}_ca_chain.pem`,
vault-1.0.2+dfsg2/ui/app/components/config-pki-ca.js-128-        url: URL.createObjectURL(caChainFile),
##############################################
vault-1.0.2+dfsg2/ui/app/components/config-pki-ca.js-168-          this.get('flashMessages').success(
vault-1.0.2+dfsg2/ui/app/components/config-pki-ca.js:169:            `The CA key for ${backend} has been deleted. The old CA certificate will still be accessible for reading until a new certificate/key are generated or uploaded.`
vault-1.0.2+dfsg2/ui/app/components/config-pki-ca.js-170-          );
##############################################
vault-1.0.2+dfsg2/ui/app/components/config-pki.js-46-            method: section,
vault-1.0.2+dfsg2/ui/app/components/config-pki.js:47:            fields: get(config, `${section}Attrs`).map(attr => attr.name),
vault-1.0.2+dfsg2/ui/app/components/config-pki.js-48-          },
##############################################
vault-1.0.2+dfsg2/ui/app/components/config-pki.js-50-        .then(() => {
vault-1.0.2+dfsg2/ui/app/components/config-pki.js:51:          this.get('flashMessages').success(`The ${section} config for this backend has been updated.`);
vault-1.0.2+dfsg2/ui/app/components/config-pki.js-52-          // attrs aren't persistent for Tidy
##############################################
vault-1.0.2+dfsg2/ui/app/components/console/ui-panel.js-95-    let routeName = this.get('router.currentRouteName');
vault-1.0.2+dfsg2/ui/app/components/console/ui-panel.js:96:    let route = owner.lookup(`route:${routeName}`);
vault-1.0.2+dfsg2/ui/app/components/console/ui-panel.js-97-
##############################################
vault-1.0.2+dfsg2/ui/app/components/control-group-success.js-25-    } catch (e) {
vault-1.0.2+dfsg2/ui/app/components/control-group-success.js:26:      this.set('error', `Token unwrap failed: ${e.errors[0]}`);
vault-1.0.2+dfsg2/ui/app/components/control-group-success.js-27-    }
##############################################
vault-1.0.2+dfsg2/ui/app/components/doc-link.js-17-  href: computed('host', 'path', function() {
vault-1.0.2+dfsg2/ui/app/components/doc-link.js:18:    return `${this.host}${this.path}`;
vault-1.0.2+dfsg2/ui/app/components/doc-link.js-19-  }),
##############################################
vault-1.0.2+dfsg2/ui/app/components/download-button.js-10-  download: computed('filename', 'extension', function() {
vault-1.0.2+dfsg2/ui/app/components/download-button.js:11:    return `${this.get('filename')}-${new Date().toISOString()}.${this.get('extension')}`;
vault-1.0.2+dfsg2/ui/app/components/download-button.js-12-  }),
##############################################
vault-1.0.2+dfsg2/ui/app/components/flash-message.js-11-
vault-1.0.2+dfsg2/ui/app/components/flash-message.js:12:      return `${prefix}${flashType}`;
vault-1.0.2+dfsg2/ui/app/components/flash-message.js-13-    },
##############################################
vault-1.0.2+dfsg2/ui/app/components/generate-credentials.js-52-    const action = this.get('action') || 'creds';
vault-1.0.2+dfsg2/ui/app/components/generate-credentials.js:53:    return MODEL_TYPES[`${this.get('backendType')}-${action}`];
vault-1.0.2+dfsg2/ui/app/components/generate-credentials.js-54-  }),
##############################################
vault-1.0.2+dfsg2/ui/app/components/generate-credentials.js-91-      },
vault-1.0.2+dfsg2/ui/app/components/generate-credentials.js:92:      id: `${backendPath}-${roleName}`,
vault-1.0.2+dfsg2/ui/app/components/generate-credentials.js-93-    };
##############################################
vault-1.0.2+dfsg2/ui/app/components/i-con.js-66-    const glyph = this.get('glyph');
vault-1.0.2+dfsg2/ui/app/components/i-con.js:67:    return `svg/icons/${camelize(glyph)}`;
vault-1.0.2+dfsg2/ui/app/components/i-con.js-68-  }),
##############################################
vault-1.0.2+dfsg2/ui/app/components/identity/edit-form.js-23-    let { model, mode } = this.getProperties('model', 'mode');
vault-1.0.2+dfsg2/ui/app/components/identity/edit-form.js:24:    let key = `${mode}-${model.get('identityType')}`;
vault-1.0.2+dfsg2/ui/app/components/identity/edit-form.js-25-    let routes = {
##############################################
vault-1.0.2+dfsg2/ui/app/components/identity/edit-form.js-47-    if (model.get('id')) {
vault-1.0.2+dfsg2/ui/app/components/identity/edit-form.js:48:      return `Successfully ${action} ${typeDisplay} ${model.id}.`;
vault-1.0.2+dfsg2/ui/app/components/identity/edit-form.js-49-    }
vault-1.0.2+dfsg2/ui/app/components/identity/edit-form.js:50:    return `Successfully ${action} ${typeDisplay}.`;
vault-1.0.2+dfsg2/ui/app/components/identity/edit-form.js-51-  },
##############################################
vault-1.0.2+dfsg2/ui/app/components/identity/item-details.js-13-        .then(() => {
vault-1.0.2+dfsg2/ui/app/components/identity/item-details.js:14:          this.get('flashMessages').success(`Successfully enabled entity: ${model.id}`);
vault-1.0.2+dfsg2/ui/app/components/identity/item-details.js-15-        })
##############################################
vault-1.0.2+dfsg2/ui/app/components/identity/item-details.js-17-          this.get('flashMessages').success(
vault-1.0.2+dfsg2/ui/app/components/identity/item-details.js:18:            `There was a problem enabling the entity: ${model.id} - ${e.errors.join(' ') || e.message}`
vault-1.0.2+dfsg2/ui/app/components/identity/item-details.js-19-          );
##############################################
vault-1.0.2+dfsg2/ui/app/components/identity/lookup-input.js-33-    let store = this.get('store');
vault-1.0.2+dfsg2/ui/app/components/identity/lookup-input.js:34:    return store.adapterFor(`identity/${type}`);
vault-1.0.2+dfsg2/ui/app/components/identity/lookup-input.js-35-  },
##############################################
vault-1.0.2+dfsg2/ui/app/components/identity/lookup-input.js-61-      flash.danger(
vault-1.0.2+dfsg2/ui/app/components/identity/lookup-input.js:62:        `We encountered an error attempting the ${type} lookup: ${err.message || err.errors.join('')}.`
vault-1.0.2+dfsg2/ui/app/components/identity/lookup-input.js-63-      );
##############################################
vault-1.0.2+dfsg2/ui/app/components/identity/lookup-input.js-68-    } else {
vault-1.0.2+dfsg2/ui/app/components/identity/lookup-input.js:69:      flash.danger(`We were unable to find an identity ${type} with a "${param}" of "${paramValue}".`);
vault-1.0.2+dfsg2/ui/app/components/identity/lookup-input.js-70-    }
##############################################
vault-1.0.2+dfsg2/ui/app/components/identity/popup-alias.js-10-  successMessage(type, id) {
vault-1.0.2+dfsg2/ui/app/components/identity/popup-alias.js:11:    return `Successfully deleted ${type}: ${id}`;
vault-1.0.2+dfsg2/ui/app/components/identity/popup-alias.js-12-  },
##############################################
vault-1.0.2+dfsg2/ui/app/components/identity/popup-alias.js-15-    let error = e.errors ? e.errors.join(' ') : e.message;
vault-1.0.2+dfsg2/ui/app/components/identity/popup-alias.js:16:    return `There was a problem deleting ${type}: ${id} - ${error}`;
vault-1.0.2+dfsg2/ui/app/components/identity/popup-alias.js-17-  },
##############################################
vault-1.0.2+dfsg2/ui/app/components/identity/popup-members.js-20-  successMessage(model, groupArray, memberId) {
vault-1.0.2+dfsg2/ui/app/components/identity/popup-members.js:21:    return `Successfully removed '${memberId}' from the group`;
vault-1.0.2+dfsg2/ui/app/components/identity/popup-members.js-22-  },
##############################################
vault-1.0.2+dfsg2/ui/app/components/identity/popup-members.js-25-    let error = e.errors ? e.errors.join(' ') : e.message;
vault-1.0.2+dfsg2/ui/app/components/identity/popup-members.js:26:    return `There was a problem removing '${memberId}' from the group - ${error}`;
vault-1.0.2+dfsg2/ui/app/components/identity/popup-members.js-27-  },
##############################################
vault-1.0.2+dfsg2/ui/app/components/identity/popup-policy.js-15-  successMessage(model, policyName) {
vault-1.0.2+dfsg2/ui/app/components/identity/popup-policy.js:16:    return `Successfully removed '${policyName}' policy from ${model.id} `;
vault-1.0.2+dfsg2/ui/app/components/identity/popup-policy.js-17-  },
##############################################
vault-1.0.2+dfsg2/ui/app/components/identity/popup-policy.js-20-    let error = e.errors ? e.errors.join(' ') : e.message;
vault-1.0.2+dfsg2/ui/app/components/identity/popup-policy.js:21:    return `There was a problem removing '${policyName}' policy - ${error}`;
vault-1.0.2+dfsg2/ui/app/components/identity/popup-policy.js-22-  },
##############################################
vault-1.0.2+dfsg2/ui/app/components/key-value-header.js-26-    }
vault-1.0.2+dfsg2/ui/app/components/key-value-header.js:27:    return `vault.cluster.secrets.backend.${mode}`;
vault-1.0.2+dfsg2/ui/app/components/key-value-header.js-28-  }),
##############################################
vault-1.0.2+dfsg2/ui/app/components/list-view.js-14-    let items = pluralize(this.get('itemNoun'));
vault-1.0.2+dfsg2/ui/app/components/list-view.js:15:    return `No ${items} yet`;
vault-1.0.2+dfsg2/ui/app/components/list-view.js-16-  }),
##############################################
vault-1.0.2+dfsg2/ui/app/components/list-view.js-19-    let items = pluralize(this.get('itemNoun'));
vault-1.0.2+dfsg2/ui/app/components/list-view.js:20:    return `Your ${items} will be listed here. Add your first ${this.get('itemNoun')} to get started.`;
vault-1.0.2+dfsg2/ui/app/components/list-view.js-21-  }),
##############################################
vault-1.0.2+dfsg2/ui/app/components/mount-backend-form.js-66-    // or auth-azure
vault-1.0.2+dfsg2/ui/app/components/mount-backend-form.js:67:    let key = `${mountType}-${methodType}`;
vault-1.0.2+dfsg2/ui/app/components/mount-backend-form.js-68-    let noConfig = ['auth-approle', 'auth-alicloud'];
##############################################
vault-1.0.2+dfsg2/ui/app/components/mount-backend-form.js-74-    }
vault-1.0.2+dfsg2/ui/app/components/mount-backend-form.js:75:    return `auth-config/${methodType}`;
vault-1.0.2+dfsg2/ui/app/components/mount-backend-form.js-76-  },
##############################################
vault-1.0.2+dfsg2/ui/app/components/mount-backend-form.js-119-    let mountType = this.get('mountType');
vault-1.0.2+dfsg2/ui/app/components/mount-backend-form.js:120:    mountType = mountType === 'secret' ? `${mountType}s engine` : `${mountType} method`;
vault-1.0.2+dfsg2/ui/app/components/mount-backend-form.js:121:    this.get('flashMessages').success(`Successfully mounted the ${type} ${mountType} at ${path}.`);
vault-1.0.2+dfsg2/ui/app/components/mount-backend-form.js-122-    if (this.get('mountType') === 'secret') {
##############################################
vault-1.0.2+dfsg2/ui/app/components/mount-backend-form.js-149-        this.get('flashMessages').success(
vault-1.0.2+dfsg2/ui/app/components/mount-backend-form.js:150:          `The config for ${type} ${this.get('mountType')} method at ${path} was saved successfully.`
vault-1.0.2+dfsg2/ui/app/components/mount-backend-form.js-151-        );
##############################################
vault-1.0.2+dfsg2/ui/app/components/namespace-reminder.js-16-    }
vault-1.0.2+dfsg2/ui/app/components/namespace-reminder.js:17:    return mode.endsWith('e') ? `${mode}d` : `${mode}ed`;
vault-1.0.2+dfsg2/ui/app/components/namespace-reminder.js-18-  }),
##############################################
vault-1.0.2+dfsg2/ui/app/components/navigate-input.js-60-    }
vault-1.0.2+dfsg2/ui/app/components/navigate-input.js:61:    return `cert/${key}`;
vault-1.0.2+dfsg2/ui/app/components/navigate-input.js-62-  },
##############################################
vault-1.0.2+dfsg2/ui/app/components/radial-progress.js-14-    let s = this.get('size');
vault-1.0.2+dfsg2/ui/app/components/radial-progress.js:15:    return `0 0 ${s} ${s}`;
vault-1.0.2+dfsg2/ui/app/components/radial-progress.js-16-  }),
##############################################
vault-1.0.2+dfsg2/ui/app/components/replication-mode-summary.js-6-const replicationAttr = function(attr) {
vault-1.0.2+dfsg2/ui/app/components/replication-mode-summary.js:7:  return computed('mode', `cluster.{dr,performance}.${attr}`, function() {
vault-1.0.2+dfsg2/ui/app/components/replication-mode-summary.js-8-    const { mode, cluster } = getProperties(this, 'mode', 'cluster');
vault-1.0.2+dfsg2/ui/app/components/replication-mode-summary.js:9:    return get(cluster, `${mode}.${attr}`);
vault-1.0.2+dfsg2/ui/app/components/replication-mode-summary.js-10-  });
##############################################
vault-1.0.2+dfsg2/ui/app/components/search-select.js-46-        options = options.toArray().map(option => {
vault-1.0.2+dfsg2/ui/app/components/search-select.js:47:          option.searchText = `${option.name} ${option.id}`;
vault-1.0.2+dfsg2/ui/app/components/search-select.js-48-          return option;
##############################################
vault-1.0.2+dfsg2/ui/app/components/secret-edit.js-91-  partialName: computed('mode', function() {
vault-1.0.2+dfsg2/ui/app/components/secret-edit.js:92:    return `partials/secret-form-${this.mode}`;
vault-1.0.2+dfsg2/ui/app/components/secret-edit.js-93-  }),
##############################################
vault-1.0.2+dfsg2/ui/app/components/secret-edit.js-102-      let id = context.model.id;
vault-1.0.2+dfsg2/ui/app/components/secret-edit.js:103:      let path = context.isV2 ? `${backend}/data/${id}` : `${backend}/${id}`;
vault-1.0.2+dfsg2/ui/app/components/secret-edit.js-104-      return {
##############################################
vault-1.0.2+dfsg2/ui/app/components/secret-edit.js-124-      return {
vault-1.0.2+dfsg2/ui/app/components/secret-edit.js:125:        id: `${backend}/metadata/${id}`,
vault-1.0.2+dfsg2/ui/app/components/secret-edit.js-126-      };
##############################################
vault-1.0.2+dfsg2/ui/app/components/secret-link.js-5-  let params;
vault-1.0.2+dfsg2/ui/app/components/secret-link.js:6:  const route = `vault.cluster.secrets.backend.${mode}`;
vault-1.0.2+dfsg2/ui/app/components/secret-link.js-7-
##############################################
vault-1.0.2+dfsg2/ui/app/components/secret-version-menu.js-16-      return {
vault-1.0.2+dfsg2/ui/app/components/secret-version-menu.js:17:        id: `${backend}/delete/${id}`,
vault-1.0.2+dfsg2/ui/app/components/secret-version-menu.js-18-      };
##############################################
vault-1.0.2+dfsg2/ui/app/components/secret-version-menu.js-27-      return {
vault-1.0.2+dfsg2/ui/app/components/secret-version-menu.js:28:        id: `${backend}/destroy/${id}`,
vault-1.0.2+dfsg2/ui/app/components/secret-version-menu.js-29-      };
##############################################
vault-1.0.2+dfsg2/ui/app/components/secret-version-menu.js-38-      return {
vault-1.0.2+dfsg2/ui/app/components/secret-version-menu.js:39:        id: `${backend}/undelete/${id}`,
vault-1.0.2+dfsg2/ui/app/components/secret-version-menu.js-40-      };
##############################################
vault-1.0.2+dfsg2/ui/app/components/status-menu.js-15-  partialName: computed('type', function() {
vault-1.0.2+dfsg2/ui/app/components/status-menu.js:16:    return `partials/status/${this.type}`;
vault-1.0.2+dfsg2/ui/app/components/status-menu.js-17-  }),
##############################################
vault-1.0.2+dfsg2/ui/app/components/toggle-button.js-20-      'isOpen',
vault-1.0.2+dfsg2/ui/app/components/toggle-button.js:21:      computed(`toggleTarget.${toggleAttr}`, () => {
vault-1.0.2+dfsg2/ui/app/components/toggle-button.js-22-        const props = this.getProperties('toggleTarget', 'toggleAttr');
##############################################
vault-1.0.2+dfsg2/ui/app/components/wizard-content.js-48-        feature: this.currentMachine,
vault-1.0.2+dfsg2/ui/app/components/wizard-content.js:49:        text: `Step ${this.featureMachineHistory.length} of ${totalSteps}`,
vault-1.0.2+dfsg2/ui/app/components/wizard-content.js-50-      };
##############################################
vault-1.0.2+dfsg2/ui/app/components/wizard-content.js-59-        percentage: (currentStepNumber / INIT_STEPS.length) * 100,
vault-1.0.2+dfsg2/ui/app/components/wizard-content.js:60:        text: `Step ${currentStepNumber} of ${INIT_STEPS.length}`,
vault-1.0.2+dfsg2/ui/app/components/wizard-content.js-61-      };
##############################################
vault-1.0.2+dfsg2/ui/app/components/wizard-content.js-68-      bar.push({
vault-1.0.2+dfsg2/ui/app/components/wizard-content.js:69:        style: `width:${this.currentTutorialProgress.percentage}%;`,
vault-1.0.2+dfsg2/ui/app/components/wizard-content.js-70-        completed: false,
##############################################
vault-1.0.2+dfsg2/ui/app/components/wizard-content.js-80-            bar.push({
vault-1.0.2+dfsg2/ui/app/components/wizard-content.js:81:              style: `width:${this.currentFeatureProgress.percentage}%;`,
vault-1.0.2+dfsg2/ui/app/components/wizard-content.js-82-              completed: this.currentFeatureProgress.percentage == 100 ? true : false,
##############################################
vault-1.0.2+dfsg2/ui/app/components/wizard/mounts-wizard.js-28-    let suffix = this.get('currentMachine') === 'secrets' ? 'engine' : 'method';
vault-1.0.2+dfsg2/ui/app/components/wizard/mounts-wizard.js:29:    return this.get('mountSubtype') ? `wizard/${this.get('mountSubtype')}-${suffix}` : null;
vault-1.0.2+dfsg2/ui/app/components/wizard/mounts-wizard.js-30-  }),
##############################################
vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/access/identity/index.js-15-          this.send('reload');
vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/access/identity/index.js:16:          this.get('flashMessages').success(`Successfully deleted ${type}: ${id}`);
vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/access/identity/index.js-17-        })
##############################################
vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/access/identity/index.js-19-          this.get('flashMessages').success(
vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/access/identity/index.js:20:            `There was a problem deleting ${type}: ${id} - ${e.errors.join(' ') || e.message}`
vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/access/identity/index.js-21-          );
##############################################
vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/access/identity/index.js-33-        .then(() => {
vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/access/identity/index.js:34:          this.get('flashMessages').success(`Successfully ${action[0]} ${type}: ${id}`);
vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/access/identity/index.js-35-        })
##############################################
vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/access/identity/index.js-37-          this.get('flashMessages').success(
vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/access/identity/index.js:38:            `There was a problem ${action[1]} ${type}: ${id} - ${e.errors.join(' ') || e.message}`
vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/access/identity/index.js-39-          );
##############################################
vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/access/leases/list.js-59-      if (filter === id) {
vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/access/leases/list.js:60:        return `There are no leases under &quot;${filter}&quot;.`;
vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/access/leases/list.js-61-      } else {
vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/access/leases/list.js:62:        return `We couldn't find a prefix matching &quot;${filter}&quot;.`;
vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/access/leases/list.js-63-      }
##############################################
vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/access/leases/list.js-82-          return this.transitionToRoute('vault.cluster.access.leases.list-root').then(() => {
vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/access/leases/list.js:83:            this.get('flashMessages').success(`All of the leases under ${prefix} will be revoked.`);
vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/access/leases/list.js-84-          });
##############################################
vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/access/leases/list.js-88-          this.get('flashMessages').danger(
vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/access/leases/list.js:89:            `There was an error attempting to revoke the prefix: ${prefix}. ${errString}.`
vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/access/leases/list.js-90-          );
##############################################
vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/access/leases/show.js-35-          next(() => {
vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/access/leases/show.js:36:            flash.success(`The lease ${model.id} was successfully renewed.`);
vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/access/leases/show.js-37-          });
##############################################
vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/access/leases/show.js-40-          const errString = e.errors.join('.');
vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/access/leases/show.js:41:          flash.danger(`There was an error renewing the lease: ${errString}`);
vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/access/leases/show.js-42-        });
##############################################
vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/access/methods.js-17-      yield method.destroyRecord();
vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/access/methods.js:18:      this.get('flashMessages').success(`The ${type} auth method at ${path} has been disabled.`);
vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/access/methods.js-19-    } catch (err) {
vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/access/methods.js-20-      this.get('flashMessages').danger(
vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/access/methods.js:21:        `There was an error disabling auth method at ${path}: ${err.errors.join(' ')}.`
vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/access/methods.js-22-      );
##############################################
vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/init.js-38-  keyFilename: computed('model.name', function() {
vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/init.js:39:    return `vault-cluster-${this.get('model.name')}`;
vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/init.js-40-  }),
##############################################
vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/policies/index.js-59-          this.send('reload');
vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/policies/index.js:60:          flash.success(`${policyType.toUpperCase()} policy "${name}" was successfully deleted.`);
vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/policies/index.js-61-          if (this.get('wizard.featureState') === 'delete') {
##############################################
vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/policies/index.js-67-          flash.danger(
vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/policies/index.js:68:            `There was an error deleting the ${policyType.toUpperCase()} policy "${name}": ${errors}.`
vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/policies/index.js-69-          );
##############################################
vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/replication/mode/secondaries/config-edit.js-50-          flash.error(
vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/replication/mode/secondaries/config-edit.js:51:            `There was an error ${isDelete ? 'deleting' : 'saving'} the config for ${id}: ${errString}`
vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/replication/mode/secondaries/config-edit.js-52-          );
##############################################
vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/secrets/backend/list.js-71-      item.destroyRecord().then(() => {
vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/secrets/backend/list.js:72:        this.get('flashMessages').success(`${name} was successfully deleted.`);
vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/secrets/backend/list.js-73-        this.send('reload');
##############################################
vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/secrets/backend/sign.js-31-        role: roleModel,
vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/secrets/backend/sign.js:32:        id: `${get(roleModel, 'backend')}-${get(roleModel, 'name')}`,
vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/secrets/backend/sign.js-33-      });
##############################################
vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/secrets/backends.js-33-      yield engine.destroyRecord();
vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/secrets/backends.js:34:      this.get('flashMessages').success(`The ${engineType} secrets engine at ${path} has been disabled.`);
vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/secrets/backends.js-35-    } catch (err) {
vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/secrets/backends.js-36-      this.get('flashMessages').danger(
vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/secrets/backends.js:37:        `There was an error disabling the ${engineType} secrets engine at ${path}: ${err.errors.join(' ')}.`
vault-1.0.2+dfsg2/ui/app/controllers/vault/cluster/secrets/backends.js-38-      );
##############################################
vault-1.0.2+dfsg2/ui/app/helpers/has-feature.js-18-  if (!FEATURES.includes(featureName)) {
vault-1.0.2+dfsg2/ui/app/helpers/has-feature.js:19:    assert(`${featureName} is not one of the available values for Vault Enterprise features.`, false);
vault-1.0.2+dfsg2/ui/app/helpers/has-feature.js-20-    return false;
##############################################
vault-1.0.2+dfsg2/ui/app/helpers/is-version.js-12-    if (sku !== 'OSS' && sku !== 'Enterprise') {
vault-1.0.2+dfsg2/ui/app/helpers/is-version.js:13:      assert(`${sku} is not one of the available values for Vault versions.`, false);
vault-1.0.2+dfsg2/ui/app/helpers/is-version.js-14-      return false;
vault-1.0.2+dfsg2/ui/app/helpers/is-version.js-15-    }
vault-1.0.2+dfsg2/ui/app/helpers/is-version.js:16:    return this.get(`version.is${sku}`);
vault-1.0.2+dfsg2/ui/app/helpers/is-version.js-17-  },
##############################################
vault-1.0.2+dfsg2/ui/app/helpers/replication-action-for-mode.js-16-export function replicationActionForMode([replicationMode, clusterMode] /*, hash*/) {
vault-1.0.2+dfsg2/ui/app/helpers/replication-action-for-mode.js:17:  return get(ACTIONS, `${replicationMode}.${clusterMode}`);
vault-1.0.2+dfsg2/ui/app/helpers/replication-action-for-mode.js-18-}
##############################################
vault-1.0.2+dfsg2/ui/app/helpers/tabs-for-identity-show.js-15-  if (groupType) {
vault-1.0.2+dfsg2/ui/app/helpers/tabs-for-identity-show.js:16:    key = `${key}-${groupType}`;
vault-1.0.2+dfsg2/ui/app/helpers/tabs-for-identity-show.js-17-  }
##############################################
vault-1.0.2+dfsg2/ui/app/lib/console-helpers.js-95-      method === 'write'
vault-1.0.2+dfsg2/ui/app/lib/console-helpers.js:96:        ? `Success! Data written to: ${path}`
vault-1.0.2+dfsg2/ui/app/lib/console-helpers.js:97:        : `Success! Data deleted (if it existed) at: ${path}`;
vault-1.0.2+dfsg2/ui/app/lib/console-helpers.js-98-
##############################################
vault-1.0.2+dfsg2/ui/app/lib/console-helpers.js-117-    } else {
vault-1.0.2+dfsg2/ui/app/lib/console-helpers.js:118:      response = { type: 'error', content: `Field "${field}" not present in secret` };
vault-1.0.2+dfsg2/ui/app/lib/console-helpers.js-119-    }
##############################################
vault-1.0.2+dfsg2/ui/app/lib/console-helpers.js-144-
vault-1.0.2+dfsg2/ui/app/lib/console-helpers.js:145:  content = `Error ${verbClause}: ${vaultPath}.\nURL: ${path}\nCode: ${httpStatus}`;
vault-1.0.2+dfsg2/ui/app/lib/console-helpers.js-146-
vault-1.0.2+dfsg2/ui/app/lib/console-helpers.js-147-  if (typeof error.errors[0] === 'string') {
vault-1.0.2+dfsg2/ui/app/lib/console-helpers.js:148:    content = `${content}\nErrors:\n  ${error.errors.join('\n  ')}`;
vault-1.0.2+dfsg2/ui/app/lib/console-helpers.js-149-  }
##############################################
vault-1.0.2+dfsg2/ui/app/macros/identity-capabilities.js-3-export default function() {
vault-1.0.2+dfsg2/ui/app/macros/identity-capabilities.js:4:  return lazyCapabilities(apiPath`identity/${'identityType'}/id/${'id'}`, 'id', 'identityType');
vault-1.0.2+dfsg2/ui/app/macros/identity-capabilities.js-5-}
##############################################
vault-1.0.2+dfsg2/ui/app/macros/lazy-capabilities.js-8-//   //knows where to put each value
vault-1.0.2+dfsg2/ui/app/macros/lazy-capabilities.js:9://   zeroAddressPath: lazyCapabilities(apiPath`${'id'}/config/zeroaddress`, 'id'),
vault-1.0.2+dfsg2/ui/app/macros/lazy-capabilities.js-10-//
##############################################
vault-1.0.2+dfsg2/ui/app/mixins/focus-on-insert.js-5-export default Mixin.create({
vault-1.0.2+dfsg2/ui/app/mixins/focus-on-insert.js:6:  // selector passed to `this.$()` to find the element to focus
vault-1.0.2+dfsg2/ui/app/mixins/focus-on-insert.js-7-  // defaults to `'input'`
##############################################
vault-1.0.2+dfsg2/ui/app/mixins/policy-edit-controller.js-14-        .then(() => {
vault-1.0.2+dfsg2/ui/app/mixins/policy-edit-controller.js:15:          flash.success(`${policyType.toUpperCase()} policy "${name}" was successfully deleted.`);
vault-1.0.2+dfsg2/ui/app/mixins/policy-edit-controller.js-16-          return this.transitionToRoute('vault.cluster.policies', policyType);
##############################################
vault-1.0.2+dfsg2/ui/app/mixins/policy-edit-controller.js-20-          flash.danger(
vault-1.0.2+dfsg2/ui/app/mixins/policy-edit-controller.js:21:            `There was an error deleting the ${policyType.toUpperCase()} policy "${name}": ${errors}.`
vault-1.0.2+dfsg2/ui/app/mixins/policy-edit-controller.js-22-          );
##############################################
vault-1.0.2+dfsg2/ui/app/mixins/policy-edit-controller.js-32-        .then(m => {
vault-1.0.2+dfsg2/ui/app/mixins/policy-edit-controller.js:33:          flash.success(`${policyType.toUpperCase()} policy "${name}" was successfully saved.`);
vault-1.0.2+dfsg2/ui/app/mixins/policy-edit-controller.js-34-          if (this.get('wizard.featureState') === 'create') {
##############################################
vault-1.0.2+dfsg2/ui/app/models/auth-method.js-13-  return function(...values) {
vault-1.0.2+dfsg2/ui/app/models/auth-method.js:14:    return `${strings[0]}${values[key]}${strings[1]}`;
vault-1.0.2+dfsg2/ui/app/models/auth-method.js-15-  };
##############################################
vault-1.0.2+dfsg2/ui/app/models/auth-method.js-43-  apiPath: computed('path', function() {
vault-1.0.2+dfsg2/ui/app/models/auth-method.js:44:    return `auth/${this.get('path')}`;
vault-1.0.2+dfsg2/ui/app/models/auth-method.js-45-  }),
##############################################
vault-1.0.2+dfsg2/ui/app/models/auth-method.js-101-    if (type === 'aws') {
vault-1.0.2+dfsg2/ui/app/models/auth-method.js:102:      return configPath`auth/${0}/config/client`;
vault-1.0.2+dfsg2/ui/app/models/auth-method.js-103-    } else {
vault-1.0.2+dfsg2/ui/app/models/auth-method.js:104:      return configPath`auth/${0}/config`;
vault-1.0.2+dfsg2/ui/app/models/auth-method.js-105-    }
##############################################
vault-1.0.2+dfsg2/ui/app/models/auth-method.js-119-
vault-1.0.2+dfsg2/ui/app/models/auth-method.js:120:  deletePath: lazyCapabilities(apiPath`sys/auth/${'id'}`, 'id'),
vault-1.0.2+dfsg2/ui/app/models/auth-method.js-121-  canDisable: alias('deletePath.canDelete'),
##############################################
vault-1.0.2+dfsg2/ui/app/models/pki-ca-certificate.js-150-
vault-1.0.2+dfsg2/ui/app/models/pki-ca-certificate.js:151:  deletePath: lazyCapabilities(apiPath`${'backend'}/root`, 'backend'),
vault-1.0.2+dfsg2/ui/app/models/pki-ca-certificate.js-152-  canDeleteRoot: and('deletePath.canDelete', 'deletePath.canSudo'),
##############################################
vault-1.0.2+dfsg2/ui/app/models/pki-certificate.js-128-
vault-1.0.2+dfsg2/ui/app/models/pki-certificate.js:129:  revokePath: lazyCapabilities(apiPath`${'backend'}/revoke`, 'backend'),
vault-1.0.2+dfsg2/ui/app/models/pki-certificate.js-130-  canRevoke: alias('revokePath.canUpdate'),
##############################################
vault-1.0.2+dfsg2/ui/app/models/policy.js-14-
vault-1.0.2+dfsg2/ui/app/models/policy.js:15:  updatePath: lazyCapabilities(apiPath`sys/policies/${'policyType'}/${'id'}`, 'id', 'policyType'),
vault-1.0.2+dfsg2/ui/app/models/policy.js-16-  canDelete: alias('updatePath.canDelete'),
##############################################
vault-1.0.2+dfsg2/ui/app/models/role-aws.js-65-
vault-1.0.2+dfsg2/ui/app/models/role-aws.js:66:  updatePath: lazyCapabilities(apiPath`${'backend'}/roles/${'id'}`, 'backend', 'id'),
vault-1.0.2+dfsg2/ui/app/models/role-aws.js-67-  canDelete: alias('updatePath.canDelete'),
##############################################
vault-1.0.2+dfsg2/ui/app/models/role-aws.js-70-
vault-1.0.2+dfsg2/ui/app/models/role-aws.js:71:  generatePath: lazyCapabilities(apiPath`${'backend'}/creds/${'id'}`, 'backend', 'id'),
vault-1.0.2+dfsg2/ui/app/models/role-aws.js-72-  canGenerate: alias('generatePath.canUpdate'),
##############################################
vault-1.0.2+dfsg2/ui/app/models/role-pki.js-112-
vault-1.0.2+dfsg2/ui/app/models/role-pki.js:113:  updatePath: lazyCapabilities(apiPath`${'backend'}/roles/${'id'}`, 'backend', 'id'),
vault-1.0.2+dfsg2/ui/app/models/role-pki.js-114-  canDelete: alias('updatePath.canDelete'),
##############################################
vault-1.0.2+dfsg2/ui/app/models/role-pki.js-117-
vault-1.0.2+dfsg2/ui/app/models/role-pki.js:118:  generatePath: lazyCapabilities(apiPath`${'backend'}/issue/${'id'}`, 'backend', 'id'),
vault-1.0.2+dfsg2/ui/app/models/role-pki.js-119-  canGenerate: alias('generatePath.canUpdate'),
vault-1.0.2+dfsg2/ui/app/models/role-pki.js-120-
vault-1.0.2+dfsg2/ui/app/models/role-pki.js:121:  signPath: lazyCapabilities(apiPath`${'backend'}/sign/${'id'}`, 'backend', 'id'),
vault-1.0.2+dfsg2/ui/app/models/role-pki.js-122-  canSign: alias('signPath.canUpdate'),
vault-1.0.2+dfsg2/ui/app/models/role-pki.js-123-
vault-1.0.2+dfsg2/ui/app/models/role-pki.js:124:  signVerbatimPath: lazyCapabilities(apiPath`${'backend'}/sign-verbatim/${'id'}`, 'backend', 'id'),
vault-1.0.2+dfsg2/ui/app/models/role-pki.js-125-  canSignVerbatim: alias('signVerbatimPath.canUpdate'),
##############################################
vault-1.0.2+dfsg2/ui/app/models/role-ssh.js-130-
vault-1.0.2+dfsg2/ui/app/models/role-ssh.js:131:  updatePath: lazyCapabilities(apiPath`${'backend'}/roles/${'id'}`, 'backend', 'id'),
vault-1.0.2+dfsg2/ui/app/models/role-ssh.js-132-  canDelete: alias('updatePath.canDelete'),
##############################################
vault-1.0.2+dfsg2/ui/app/models/role-ssh.js-135-
vault-1.0.2+dfsg2/ui/app/models/role-ssh.js:136:  generatePath: lazyCapabilities(apiPath`${'backend'}/creds/${'id'}`, 'backend', 'id'),
vault-1.0.2+dfsg2/ui/app/models/role-ssh.js-137-  canGenerate: alias('generatePath.canUpdate'),
vault-1.0.2+dfsg2/ui/app/models/role-ssh.js-138-
vault-1.0.2+dfsg2/ui/app/models/role-ssh.js:139:  signPath: lazyCapabilities(apiPath`${'backend'}/sign/${'id'}`, 'backend', 'id'),
vault-1.0.2+dfsg2/ui/app/models/role-ssh.js-140-  canSign: alias('signPath.canUpdate'),
vault-1.0.2+dfsg2/ui/app/models/role-ssh.js-141-
vault-1.0.2+dfsg2/ui/app/models/role-ssh.js:142:  zeroAddressPath: lazyCapabilities(apiPath`${'backend'}/config/zeroaddress`, 'backend'),
vault-1.0.2+dfsg2/ui/app/models/role-ssh.js-143-  canEditZeroAddress: alias('zeroAddressPath.canUpdate'),
##############################################
vault-1.0.2+dfsg2/ui/app/models/secret-v2.js-31-  }),
vault-1.0.2+dfsg2/ui/app/models/secret-v2.js:32:  versionPath: lazyCapabilities(apiPath`${'engineId'}/data/${'id'}`, 'engineId', 'id'),
vault-1.0.2+dfsg2/ui/app/models/secret-v2.js:33:  secretPath: lazyCapabilities(apiPath`${'engineId'}/metadata/${'id'}`, 'engineId', 'id'),
vault-1.0.2+dfsg2/ui/app/models/secret-v2.js-34-
##############################################
vault-1.0.2+dfsg2/ui/app/models/secret.js-27-  backend: attr('string'),
vault-1.0.2+dfsg2/ui/app/models/secret.js:28:  secretPath: lazyCapabilities(apiPath`${'backend'}/${'id'}`, 'backend', 'id'),
vault-1.0.2+dfsg2/ui/app/models/secret.js-29-  canEdit: alias('secretPath.canUpdate'),
##############################################
vault-1.0.2+dfsg2/ui/app/models/transit-key.js-122-
vault-1.0.2+dfsg2/ui/app/models/transit-key.js:123:  rotatePath: lazyCapabilities(apiPath`${'backend'}/keys/${'id'}/rotate`, 'backend', 'id'),
vault-1.0.2+dfsg2/ui/app/models/transit-key.js-124-  canRotate: alias('rotatePath.canUpdate'),
##############################################
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/access/identity/aliases/add.js-7-    let itemType = this.modelFor('vault.cluster.access.identity');
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/access/identity/aliases/add.js:8:    let modelType = `identity/${itemType}-alias`;
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/access/identity/aliases/add.js-9-    return this.store.createRecord(modelType, {
##############################################
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/access/identity/aliases/edit.js-7-    let itemType = this.modelFor('vault.cluster.access.identity');
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/access/identity/aliases/edit.js:8:    let modelType = `identity/${itemType}-alias`;
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/access/identity/aliases/edit.js-9-    return this.store.findRecord(modelType, params.item_alias_id);
##############################################
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/access/identity/aliases/index.js-6-    let itemType = this.modelFor('vault.cluster.access.identity');
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/access/identity/aliases/index.js:7:    let modelType = `identity/${itemType}-alias`;
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/access/identity/aliases/index.js-8-    return this.store
##############################################
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/access/identity/aliases/show.js-11-    let tabs = TABS[itemType];
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/access/identity/aliases/show.js:12:    let modelType = `identity/${itemType}`;
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/access/identity/aliases/show.js-13-    if (!tabs.includes(section)) {
##############################################
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/access/identity/create.js-7-    let itemType = this.modelFor('vault.cluster.access.identity');
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/access/identity/create.js:8:    let modelType = `identity/${itemType}`;
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/access/identity/create.js-9-    return this.store.createRecord(modelType);
##############################################
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/access/identity/edit.js-7-    let itemType = this.modelFor('vault.cluster.access.identity');
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/access/identity/edit.js:8:    let modelType = `identity/${itemType}`;
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/access/identity/edit.js-9-    return this.store.findRecord(modelType, params.item_id);
##############################################
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/access/identity/index.js-6-    let itemType = this.modelFor('vault.cluster.access.identity');
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/access/identity/index.js:7:    let modelType = `identity/${itemType}`;
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/access/identity/index.js-8-    return this.store
##############################################
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/access/identity/show.js-12-    let tabs = TABS[itemType];
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/access/identity/show.js:13:    let modelType = `identity/${itemType}`;
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/access/identity/show.js-14-    if (!tabs.includes(section)) {
##############################################
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/access/leases/list.js-39-        capabilities: hash({
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/access/leases/list.js:40:          revokePrefix: this.store.findRecord('capabilities', `sys/leases/revoke-prefix/${prefix}`),
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/access/leases/list.js:41:          forceRevokePrefix: this.store.findRecord('capabilities', `sys/leases/revoke-force/${prefix}`),
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/access/leases/list.js-42-        }),
##############################################
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/policies/create.js-20-    }
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/policies/create.js:21:    return this.store.createRecord(`policy/${policyType}`, {});
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/policies/create.js-22-  },
##############################################
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/policies/index.js-25-    return this.store
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/policies/index.js:26:      .lazyPaginatedQuery(`policy/${policyType}`, {
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/policies/index.js-27-        page: params.page,
##############################################
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/policy/show.js-16-    return hash({
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/policy/show.js:17:      policy: this.store.findRecord(`policy/${type}`, params.policy_name),
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/policy/show.js:18:      capabilities: this.store.findRecord('capabilities', `sys/policies/${type}/${params.policy_name}`),
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/policy/show.js-19-    });
##############################################
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/replication/mode/manage.js-9-  if (action === 'reindex' || action === 'recover') {
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/replication/mode/manage.js:10:    path = `sys/replication/${action}`;
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/replication/mode/manage.js-11-  } else {
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/replication/mode/manage.js:12:    path = `sys/replication/${replicationMode}/${clusterMode}/${action}`;
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/replication/mode/manage.js-13-  }
##############################################
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/replication/mode/manage.js-28-        return store.findRecord('capabilities', pathForAction(action)).then(capability => {
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/replication/mode/manage.js:29:          model.set(`can${camelize(action)}`, capability.get('canUpdate'));
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/replication/mode/manage.js-30-        });
##############################################
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/replication/mode/secondaries.js-11-      canAddSecondary: this.store
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/replication/mode/secondaries.js:12:        .findRecord('capabilities', `sys/replication/${replicationMode}/primary/secondary-token`)
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/replication/mode/secondaries.js-13-        .then(c => c.get('canUpdate')),
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/replication/mode/secondaries.js-14-      canRevokeSecondary: this.store
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/replication/mode/secondaries.js:15:        .findRecord('capabilities', `sys/replication/${replicationMode}/primary/revoke-secondary`)
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/replication/mode/secondaries.js-16-        .then(c => c.get('canUpdate')),
##############################################
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/replication/mode/secondaries.js-27-    if (
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/replication/mode/secondaries.js:28:      !model.get(`${replicationMode}.isPrimary`) ||
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/replication/mode/secondaries.js:29:      model.get(`${replicationMode}.replicationDisabled`) ||
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/replication/mode/secondaries.js:30:      model.get(`${replicationMode}.replicationUnsupported`)
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/replication/mode/secondaries.js-31-    ) {
##############################################
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/replication/mode/secondaries/add.js-13-    const replicationMode = this.get('replicationMode');
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/replication/mode/secondaries/add.js:14:    if (!model.cluster.get(`${replicationMode}.isPrimary`) || !model.cluster.get('canAddSecondary')) {
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/replication/mode/secondaries/add.js-15-      return this.transitionTo('vault.cluster.replication.mode', model.cluster.get('name'), replicationMode);
##############################################
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/replication/mode/secondaries/config-create.js-19-            flash.info(
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/replication/mode/secondaries/config-create.js:20:              `${id} already had a mount filter config, so we loaded the config edit screen for you.`
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/replication/mode/secondaries/config-create.js-21-            );
##############################################
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/replication/mode/secondaries/config-create.js-40-      replicationMode !== 'performance' ||
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/replication/mode/secondaries/config-create.js:41:      !cluster.get(`${replicationMode}.isPrimary`) ||
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/replication/mode/secondaries/config-create.js-42-      !cluster.get('canAddSecondary')
##############################################
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/replication/mode/secondaries/config-edit.js-20-      replicationMode !== 'performance' ||
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/replication/mode/secondaries/config-edit.js:21:      !cluster.get(`${replicationMode}.isPrimary`) ||
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/replication/mode/secondaries/config-edit.js-22-      !cluster.get('canAddSecondary')
##############################################
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/replication/mode/secondaries/config-show.js-26-      replicationMode !== 'performance' ||
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/replication/mode/secondaries/config-show.js:27:      !cluster.get(`${replicationMode}.isPrimary`)
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/replication/mode/secondaries/config-show.js-28-    ) {
##############################################
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/replication/mode/secondaries/revoke.js-9-    const replicationMode = this.get('replicationMode');
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/replication/mode/secondaries/revoke.js:10:    if (!model.get(`${replicationMode}.isPrimary`) || !model.get('canRevokeSecondary')) {
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/replication/mode/secondaries/revoke.js-11-      return this.transitionTo('vault.cluster.replication', model.get('name'));
##############################################
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/secrets/backend/sign.js-12-    return {
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/secrets/backend/sign.js:13:      id: `${backend}/sign/${role}`,
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/secrets/backend/sign.js-14-    };
##############################################
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/secrets/backend/sign.js-34-        },
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/secrets/backend/sign.js:35:        id: `${backend}-${role}`,
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/secrets/backend/sign.js-36-      });
##############################################
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/settings/auth/configure/section.js-24-    };
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/settings/auth/configure/section.js:25:    return MODELS[`${backendType}-${section}`];
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/settings/auth/configure/section.js-26-  },
##############################################
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/settings/configure-secret-backend.js-31-      if (transition.targetName === this.routeName) {
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/settings/configure-secret-backend.js:32:        return this.transitionTo(`${this.routeName}.section`, 'cert');
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/settings/configure-secret-backend.js-33-      } else {
##############################################
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/settings/configure-secret-backend/section.js-11-    const backendModel = this.modelFor('vault.cluster.settings.configure-secret-backend');
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/settings/configure-secret-backend/section.js:12:    const modelType = `${backendModel.get('type')}-config`;
vault-1.0.2+dfsg2/ui/app/routes/vault/cluster/settings/configure-secret-backend/section.js-13-    return this.store
##############################################
vault-1.0.2+dfsg2/ui/app/serializers/pki-certificate.js-25-        let model = {
vault-1.0.2+dfsg2/ui/app/serializers/pki-certificate.js:26:          id_for_nav: `cert/${key}`,
vault-1.0.2+dfsg2/ui/app/serializers/pki-certificate.js-27-          id: key,
##############################################
vault-1.0.2+dfsg2/ui/app/services/auth.js-38-    return (policies || []).includes('root')
vault-1.0.2+dfsg2/ui/app/services/auth.js:39:      ? `${TOKEN_PREFIX}${ROOT_PREFIX}${TOKEN_SEPARATOR}${clusterId}`
vault-1.0.2+dfsg2/ui/app/services/auth.js:40:      : `${TOKEN_PREFIX}${backend}${TOKEN_SEPARATOR}${clusterId}`;
vault-1.0.2+dfsg2/ui/app/services/auth.js-41-  },
##############################################
vault-1.0.2+dfsg2/ui/app/services/auth.js-43-  backendFromTokenName(tokenName) {
vault-1.0.2+dfsg2/ui/app/services/auth.js:44:    return tokenName.includes(`${TOKEN_PREFIX}${ROOT_PREFIX}`)
vault-1.0.2+dfsg2/ui/app/services/auth.js-45-      ? 'token'
##############################################
vault-1.0.2+dfsg2/ui/app/services/auth.js-51-      tokenName &&
vault-1.0.2+dfsg2/ui/app/services/auth.js:52:      tokenName.indexOf(`${TOKEN_PREFIX}${ROOT_PREFIX}`) === 0 &&
vault-1.0.2+dfsg2/ui/app/services/auth.js-53-      this.environment() !== 'development'
##############################################
vault-1.0.2+dfsg2/ui/app/services/control-group.js-19-const storageKey = (accessor, path) => {
vault-1.0.2+dfsg2/ui/app/services/control-group.js:20:  return `${CONTROL_GROUP_PREFIX}${accessor}${TOKEN_SEPARATOR}${path}`;
vault-1.0.2+dfsg2/ui/app/services/control-group.js-21-};
##############################################
vault-1.0.2+dfsg2/ui/app/services/control-group.js-128-    let lines = [
vault-1.0.2+dfsg2/ui/app/services/control-group.js:129:      `A Control Group was encountered at ${error.creation_path}.`,
vault-1.0.2+dfsg2/ui/app/services/control-group.js:130:      `The Control Group Token is ${error.token}.`,
vault-1.0.2+dfsg2/ui/app/services/control-group.js:131:      `The Accessor is ${error.accessor}.`,
vault-1.0.2+dfsg2/ui/app/services/control-group.js:132:      `Visit <a href='${href}'>${href}</a> for more details.`,
vault-1.0.2+dfsg2/ui/app/services/control-group.js-133-    ];
##############################################
vault-1.0.2+dfsg2/ui/app/services/namespace.js-44-          if (userRoot) {
vault-1.0.2+dfsg2/ui/app/services/namespace.js:45:            fullNS = `${userRoot}/${n}`;
vault-1.0.2+dfsg2/ui/app/services/namespace.js-46-          }
##############################################
vault-1.0.2+dfsg2/ui/app/services/wizard.js-187-        case 'render':
vault-1.0.2+dfsg2/ui/app/services/wizard.js:188:          this.set(`${action.level}Component`, action.component);
vault-1.0.2+dfsg2/ui/app/services/wizard.js-189-          break;
##############################################
vault-1.0.2+dfsg2/ui/app/utils/trim-right.js-5-  let prefix = isExtension ? '\\' : '';
vault-1.0.2+dfsg2/ui/app/utils/trim-right.js:6:  let trimRegex = new RegExp(endings.map(ext => `${prefix}${ext}$`).join('|'));
vault-1.0.2+dfsg2/ui/app/utils/trim-right.js-7-  return str.replace(trimRegex, '');
##############################################
vault-1.0.2+dfsg2/ui/scripts/list-templates.js-12-  // 'app/templates/path/to/file/filename'
vault-1.0.2+dfsg2/ui/scripts/list-templates.js:13:  return `app/${path.replace(/\.hbs$/, '')}`;
vault-1.0.2+dfsg2/ui/scripts/list-templates.js-14-});
##############################################
vault-1.0.2+dfsg2/ui/scripts/start-vault.js-44-        path.join(process.cwd(), 'tests/helpers/vault-keys.js'),
vault-1.0.2+dfsg2/ui/scripts/start-vault.js:45:        `export default ${JSON.stringify({ unseal, root }, null, 2)}`
vault-1.0.2+dfsg2/ui/scripts/start-vault.js-46-      );
##############################################
vault-1.0.2+dfsg2/ui/scripts/start-vault.js-56-vault.on('close', function(code) {
vault-1.0.2+dfsg2/ui/scripts/start-vault.js:57:  console.log(`child process exited with code ${code}`);
vault-1.0.2+dfsg2/ui/scripts/start-vault.js-58-  process.exit();
##############################################
vault-1.0.2+dfsg2/ui/scripts/start-vault.js-60-vault.on('error', function(error) {
vault-1.0.2+dfsg2/ui/scripts/start-vault.js:61:  console.log(`child process errored: ${error}`);
vault-1.0.2+dfsg2/ui/scripts/start-vault.js-62-  process.exit();
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-alias-tests.js-26-        'Successfully saved',
vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-alias-tests.js:27:        `${itemType}: shows a flash message`
vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-alias-tests.js-28-      )
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-alias-tests.js-38-  );
vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-alias-tests.js:39:  assert.ok(aliasShowPage.nameContains(name), `${itemType}: renders the name on the show page`);
vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-alias-tests.js-40-
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-alias-tests.js-44-    1,
vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-alias-tests.js:45:    `${itemType}: lists the entity in the entity list`
vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-alias-tests.js-46-  );
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-alias-tests.js-54-      'Successfully deleted',
vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-alias-tests.js:55:      `${itemType}: shows flash message`
vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-alias-tests.js-56-    );
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-alias-tests.js-58-
vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-alias-tests.js:59:  assert.equal(aliasIndexPage.items.filterBy('id', aliasID).length, 0, `${itemType}: the row is deleted`);
vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-alias-tests.js-60-};
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-alias-tests.js-84-    'vault.cluster.access.identity.aliases.edit',
vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-alias-tests.js:85:    `${itemType}: navigates to edit on create`
vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-alias-tests.js-86-  );
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-alias-tests.js-91-      'Successfully deleted',
vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-alias-tests.js:92:      `${itemType}: shows flash message`
vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-alias-tests.js-93-    );
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-alias-tests.js-98-    'vault.cluster.access.identity.aliases.index',
vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-alias-tests.js:99:    `${itemType}: navigates to list page on delete`
vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-alias-tests.js-100-  );
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-alias-tests.js-103-    0,
vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-alias-tests.js:104:    `${itemType}: the row does not show in the list`
vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-alias-tests.js-105-  );
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-tests.js-12-        'Successfully saved',
vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-tests.js:13:        `${itemType}: shows a flash message`
vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-tests.js-14-      )
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-tests.js-19-    'vault.cluster.access.identity.show',
vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-tests.js:20:    `${itemType}: navigates to show on create`
vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-tests.js-21-  );
vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-tests.js:22:  assert.ok(showPage.nameContains(name), `${itemType}: renders the name on the show page`);
vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-tests.js-23-
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-tests.js-27-    1,
vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-tests.js:28:    `${itemType}: lists the entity in the entity list`
vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-tests.js-29-  );
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-tests.js-35-        'Successfully deleted',
vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-tests.js:36:        `${itemType}: shows flash message`
vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-tests.js-37-      )
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-tests.js-39-  });
vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-tests.js:40:  assert.equal(indexPage.items.filterBy('name', name).length, 0, `${itemType}: the row is deleted`);
vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-tests.js-41-};
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-tests.js-50-    'vault.cluster.access.identity.edit',
vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-tests.js:51:    `${itemType}: navigates to edit on create`
vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-tests.js-52-  );
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-tests.js-57-        'Successfully deleted',
vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-tests.js:58:        `${itemType}: shows flash message`
vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-tests.js-59-      )
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-tests.js-64-    'vault.cluster.access.identity.index',
vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-tests.js:65:    `${itemType}: navigates to list page on delete`
vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-tests.js-66-  );
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-tests.js-69-    0,
vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-tests.js:70:    `${itemType}: the row does not show in the list`
vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/_shared-tests.js-71-  );
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/entities/aliases/create-test.js-13-  test('it allows create, list, delete of an entity alias', async function(assert) {
vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/entities/aliases/create-test.js:14:    let name = `alias-${Date.now()}`;
vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/entities/aliases/create-test.js-15-    await testAliasCRUD(name, 'entities', assert);
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/entities/aliases/create-test.js-18-  test('it allows delete from the edit form', async function(assert) {
vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/entities/aliases/create-test.js:19:    let name = `alias-${Date.now()}`;
vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/entities/aliases/create-test.js-20-    await testAliasDeleteFromForm(name, 'entities', assert);
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/entities/create-test.js-24-  test('it allows create, list, delete of an entity', async function(assert) {
vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/entities/create-test.js:25:    let name = `entity-${Date.now()}`;
vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/entities/create-test.js-26-    await testCRUD(name, 'entities', assert);
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/entities/create-test.js-29-  test('it can be deleted from the edit form', async function(assert) {
vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/entities/create-test.js:30:    let name = `entity-${Date.now()}`;
vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/entities/create-test.js-31-    await testDeleteFromForm(name, 'entities', assert);
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/groups/aliases/create-test.js-13-  test('it allows create, list, delete of an entity alias', async function(assert) {
vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/groups/aliases/create-test.js:14:    let name = `alias-${Date.now()}`;
vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/groups/aliases/create-test.js-15-    await testAliasCRUD(name, 'groups', assert);
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/groups/aliases/create-test.js-18-  test('it allows delete from the edit form', async function(assert) {
vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/groups/aliases/create-test.js:19:    let name = `alias-${Date.now()}`;
vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/groups/aliases/create-test.js-20-    await testAliasDeleteFromForm(name, 'groups', assert);
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/groups/create-test.js-24-  test('it allows create, list, delete of an group', async function(assert) {
vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/groups/create-test.js:25:    let name = `group-${Date.now()}`;
vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/groups/create-test.js-26-    await testCRUD(name, 'groups', assert);
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/groups/create-test.js-29-  test('it can be deleted from the group edit form', async function(assert) {
vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/groups/create-test.js:30:    let name = `group-${Date.now()}`;
vault-1.0.2+dfsg2/ui/tests/acceptance/access/identity/groups/create-test.js-31-    await testDeleteFromForm(name, 'groups', assert);
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/auth-test.js-38-    for (let backend of backends.reverse()) {
vault-1.0.2+dfsg2/ui/tests/acceptance/auth-test.js:39:      await click(`[data-test-auth-method-link="${backend.type}"]`);
vault-1.0.2+dfsg2/ui/tests/acceptance/auth-test.js-40-      assert.equal(
vault-1.0.2+dfsg2/ui/tests/acceptance/auth-test.js-41-        currentURL(),
vault-1.0.2+dfsg2/ui/tests/acceptance/auth-test.js:42:        `/vault/auth?with=${backend.type}`,
vault-1.0.2+dfsg2/ui/tests/acceptance/auth-test.js:43:        `has the correct URL for ${backend.type}`
vault-1.0.2+dfsg2/ui/tests/acceptance/auth-test.js-44-      );
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/auth-test.js-62-    for (let backend of backends.reverse()) {
vault-1.0.2+dfsg2/ui/tests/acceptance/auth-test.js:63:      await click(`[data-test-auth-method-link="${backend.type}"]`);
vault-1.0.2+dfsg2/ui/tests/acceptance/auth-test.js-64-      if (backend.type === 'github') {
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/auth-test.js-77-      } else {
vault-1.0.2+dfsg2/ui/tests/acceptance/auth-test.js:78:        assert.ok(Object.keys(body).includes('password'), `${backend.type} includes password`);
vault-1.0.2+dfsg2/ui/tests/acceptance/auth-test.js-79-      }
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/aws-test.js-31-    const now = new Date().getTime();
vault-1.0.2+dfsg2/ui/tests/acceptance/aws-test.js:32:    const path = `aws-${now}`;
vault-1.0.2+dfsg2/ui/tests/acceptance/aws-test.js-33-    const roleName = 'awsrole';
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/aws-test.js-37-    await click('[data-test-secret-backend-configure]');
vault-1.0.2+dfsg2/ui/tests/acceptance/aws-test.js:38:    assert.equal(currentURL(), `/vault/settings/secrets/configure/${path}`);
vault-1.0.2+dfsg2/ui/tests/acceptance/aws-test.js-39-    assert.ok(findAll('[data-test-aws-root-creds-form]').length, 'renders the empty root creds form');
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/aws-test.js-61-    await click('[data-test-backend-view-link]');
vault-1.0.2+dfsg2/ui/tests/acceptance/aws-test.js:62:    assert.equal(currentURL(), `/vault/secrets/${path}/list`, `navigates to the roles list`);
vault-1.0.2+dfsg2/ui/tests/acceptance/aws-test.js-63-
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/aws-test.js-76-      currentURL(),
vault-1.0.2+dfsg2/ui/tests/acceptance/aws-test.js:77:      `/vault/secrets/${path}/show/${roleName}`,
vault-1.0.2+dfsg2/ui/tests/acceptance/aws-test.js:78:      `$aws: navigates to the show page on creation`
vault-1.0.2+dfsg2/ui/tests/acceptance/aws-test.js-79-    );
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/aws-test.js-82-
vault-1.0.2+dfsg2/ui/tests/acceptance/aws-test.js:83:    assert.equal(currentURL(), `/vault/secrets/${path}/list`);
vault-1.0.2+dfsg2/ui/tests/acceptance/aws-test.js:84:    assert.ok(findAll(`[data-test-secret-link="${roleName}"]`).length, `aws: role shows in the list`);
vault-1.0.2+dfsg2/ui/tests/acceptance/aws-test.js-85-
vault-1.0.2+dfsg2/ui/tests/acceptance/aws-test.js-86-    //and delete
vault-1.0.2+dfsg2/ui/tests/acceptance/aws-test.js:87:    await click(`[data-test-secret-link="${roleName}"] [data-test-popup-menu-trigger]`);
vault-1.0.2+dfsg2/ui/tests/acceptance/aws-test.js:88:    await click(`[data-test-aws-role-delete="${roleName}"] button`);
vault-1.0.2+dfsg2/ui/tests/acceptance/aws-test.js-89-
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/aws-test.js-91-    await settled();
vault-1.0.2+dfsg2/ui/tests/acceptance/aws-test.js:92:    assert.dom(`[data-test-secret-link="${roleName}"]`).doesNotExist(`aws: role is no longer in the list`);
vault-1.0.2+dfsg2/ui/tests/acceptance/aws-test.js-93-  });
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/console-test.js-23-    for (let num of [1, 2, 3]) {
vault-1.0.2+dfsg2/ui/tests/acceptance/console-test.js:24:      let inputString = `write sys/mounts/${now + num} type=kv`;
vault-1.0.2+dfsg2/ui/tests/acceptance/console-test.js-25-      await consoleComponent.runCommands(inputString);
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/enterprise-control-groups-test.js-66-      'write sys/auth/userpass type=userpass',
vault-1.0.2+dfsg2/ui/tests/acceptance/enterprise-control-groups-test.js:67:      `write auth/userpass/users/${ADMIN_USER} password=${ADMIN_PASSWORD} policies=default`,
vault-1.0.2+dfsg2/ui/tests/acceptance/enterprise-control-groups-test.js:68:      `write identity/entity name=${ADMIN_USER} policies=test`,
vault-1.0.2+dfsg2/ui/tests/acceptance/enterprise-control-groups-test.js-69-      // write policies for control group + authorization
vault-1.0.2+dfsg2/ui/tests/acceptance/enterprise-control-groups-test.js:70:      `write sys/policies/acl/kv-control-group policy=${POLICY}`,
vault-1.0.2+dfsg2/ui/tests/acceptance/enterprise-control-groups-test.js:71:      `write sys/policies/acl/authorizer policy=${AUTHORIZER_POLICY}`,
vault-1.0.2+dfsg2/ui/tests/acceptance/enterprise-control-groups-test.js-72-      // read out mount to get the accessor
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/enterprise-control-groups-test.js-77-      // lookup entity id for our authorizer
vault-1.0.2+dfsg2/ui/tests/acceptance/enterprise-control-groups-test.js:78:      `write -field=id identity/lookup/entity name=${ADMIN_USER}`,
vault-1.0.2+dfsg2/ui/tests/acceptance/enterprise-control-groups-test.js-79-    ]);
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/enterprise-control-groups-test.js-82-      // create alias for authorizor and add them to the managers group
vault-1.0.2+dfsg2/ui/tests/acceptance/enterprise-control-groups-test.js:83:      `write identity/alias mount_accessor=${userpassAccessor} entity_id=${authorizerEntityId} name=${ADMIN_USER}`,
vault-1.0.2+dfsg2/ui/tests/acceptance/enterprise-control-groups-test.js:84:      `write identity/group name=managers member_entity_ids=${authorizerEntityId} policies=authorizer`,
vault-1.0.2+dfsg2/ui/tests/acceptance/enterprise-control-groups-test.js-85-      // create a token to request access to kv/foo
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/enterprise-control-groups-test.js-122-    await authFormComponent.login();
vault-1.0.2+dfsg2/ui/tests/acceptance/enterprise-control-groups-test.js:123:    await visit(`/vault/access/control-groups/${accessor}`);
vault-1.0.2+dfsg2/ui/tests/acceptance/enterprise-control-groups-test.js-124-    await controlGroupComponent.authorize();
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/enterprise-control-groups-test.js-141-      );
vault-1.0.2+dfsg2/ui/tests/acceptance/enterprise-control-groups-test.js:142:      await visit(`/vault/access/control-groups/${accessor}`);
vault-1.0.2+dfsg2/ui/tests/acceptance/enterprise-control-groups-test.js-143-      assert.ok(controlGroupSuccessComponent.showsNavigateMessage, 'shows user the navigate message');
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/enterprise-control-groups-test.js-146-    } else {
vault-1.0.2+dfsg2/ui/tests/acceptance/enterprise-control-groups-test.js:147:      await visit(`/vault/access/control-groups/${accessor}`);
vault-1.0.2+dfsg2/ui/tests/acceptance/enterprise-control-groups-test.js-148-      await controlGroupSuccessComponent.token(controlGroupToken);
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/enterprise-replication-test.js-9-  // disable performance replication
vault-1.0.2+dfsg2/ui/tests/acceptance/enterprise-replication-test.js:10:  await visit(`/vault/replication/${type}`);
vault-1.0.2+dfsg2/ui/tests/acceptance/enterprise-replication-test.js-11-  if (findAll('[data-test-replication-link="manage"]').length) {
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/enterprise-replication-test.js-15-      if (assert) {
vault-1.0.2+dfsg2/ui/tests/acceptance/enterprise-replication-test.js:16:        assert.equal(currentURL(), `/vault/replication/${type}/manage`, 'redirects to the replication page');
vault-1.0.2+dfsg2/ui/tests/acceptance/enterprise-replication-test.js-17-        assert.equal(
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/enterprise-replication-test.js-65-    await fillIn('[data-test-replication-filter-mount-mode]', mode);
vault-1.0.2+dfsg2/ui/tests/acceptance/enterprise-replication-test.js:66:    await click(findAll(`[data-test-mount-filter="${mountType}"]`)[0]);
vault-1.0.2+dfsg2/ui/tests/acceptance/enterprise-replication-test.js:67:    mountPath = findAll(`[data-test-mount-filter-path-for-type="${mountType}"]`)[0].textContent.trim();
vault-1.0.2+dfsg2/ui/tests/acceptance/enterprise-replication-test.js-68-    await click('[data-test-secondary-add]');
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/enterprise-replication-test.js-76-    await click('[data-test-replication-mount-filter-link]');
vault-1.0.2+dfsg2/ui/tests/acceptance/enterprise-replication-test.js:77:    assert.equal(currentURL(), `/vault/replication/performance/secondaries/config/show/${secondaryName}`);
vault-1.0.2+dfsg2/ui/tests/acceptance/enterprise-replication-test.js-78-    assert.ok(
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/enterprise-replication-test.js-95-        findAll('[data-test-flash-message-body]')[0].textContent.trim(),
vault-1.0.2+dfsg2/ui/tests/acceptance/enterprise-replication-test.js:96:        `The performance mount filter config for the secondary ${secondaryName} was successfully deleted.`,
vault-1.0.2+dfsg2/ui/tests/acceptance/enterprise-replication-test.js-97-        'renders success flash upon deletion'
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/init-test.js-98-    for (let attr of ['recovery_shares', 'recovery_threshold']) {
vault-1.0.2+dfsg2/ui/tests/acceptance/init-test.js:99:      assert.ok(requestBody[attr], `requestBody includes cloud seal specific attribute: ${attr}`);
vault-1.0.2+dfsg2/ui/tests/acceptance/init-test.js-100-    }
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/init-test.js-113-    for (let attr of ['recovery_shares', 'recovery_threshold']) {
vault-1.0.2+dfsg2/ui/tests/acceptance/init-test.js:114:      assert.notOk(requestBody[attr], `requestBody does not include cloud seal specific attribute: ${attr}`);
vault-1.0.2+dfsg2/ui/tests/acceptance/init-test.js-115-    }
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/leases-test.js-20-    await authPage.login();
vault-1.0.2+dfsg2/ui/tests/acceptance/leases-test.js:21:    this.enginePath = `kv-for-lease-${new Date().getTime()}`;
vault-1.0.2+dfsg2/ui/tests/acceptance/leases-test.js-22-    // need a version 1 mount for leased secrets here
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/leases-test.js-35-  const createSecret = async (context, isRenewable) => {
vault-1.0.2+dfsg2/ui/tests/acceptance/leases-test.js:36:    context.name = `secret-${new Date().getTime()}`;
vault-1.0.2+dfsg2/ui/tests/acceptance/leases-test.js-37-    await secretList.visitRoot({ backend: context.enginePath });
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/leases-test.js-47-    await visit('/vault/access/leases/');
vault-1.0.2+dfsg2/ui/tests/acceptance/leases-test.js:48:    await click(`[data-test-lease-link="${context.enginePath}/"]`);
vault-1.0.2+dfsg2/ui/tests/acceptance/leases-test.js:49:    await click(`[data-test-lease-link="${context.enginePath}/${context.name}/"]`);
vault-1.0.2+dfsg2/ui/tests/acceptance/leases-test.js-50-    await click(`[data-test-lease-link]:eq(0)`);
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/leases-test.js-89-    );
vault-1.0.2+dfsg2/ui/tests/acceptance/leases-test.js:90:    await click(`[data-test-lease-link="${this.enginePath}/"]`);
vault-1.0.2+dfsg2/ui/tests/acceptance/leases-test.js-91-    await click('[data-test-lease-link="data/"]');
vault-1.0.2+dfsg2/ui/tests/acceptance/leases-test.js-92-    assert
vault-1.0.2+dfsg2/ui/tests/acceptance/leases-test.js:93:      .dom(`[data-test-lease-link="${this.enginePath}/data/${this.name}/"]`)
vault-1.0.2+dfsg2/ui/tests/acceptance/leases-test.js-94-      .doesNotExist('link to the lease was removed with revocation');
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/leases-test.js-98-    createSecret(this);
vault-1.0.2+dfsg2/ui/tests/acceptance/leases-test.js:99:    await visit(`/vault/access/leases/list/${this.enginePath}`);
vault-1.0.2+dfsg2/ui/tests/acceptance/leases-test.js-100-    await click('[data-test-lease-revoke-prefix] button');
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/leases-test.js-107-    assert
vault-1.0.2+dfsg2/ui/tests/acceptance/leases-test.js:108:      .dom(`[data-test-lease-link="${this.enginePath}/"]`)
vault-1.0.2+dfsg2/ui/tests/acceptance/leases-test.js-109-      .doesNotExist('link to the prefix was removed with revocation');
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/policies-acl-old-test.js-16-    const policyString = 'path "*" { capabilities = ["update"]}';
vault-1.0.2+dfsg2/ui/tests/acceptance/policies-acl-old-test.js:17:    const policyName = `Policy test ${now}`;
vault-1.0.2+dfsg2/ui/tests/acceptance/policies-acl-old-test.js-18-    const policyLower = policyName.toLowerCase();
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/policies-acl-old-test.js-29-      currentURL(),
vault-1.0.2+dfsg2/ui/tests/acceptance/policies-acl-old-test.js:30:      `/vault/policy/acl/${encodeURIComponent(policyLower)}`,
vault-1.0.2+dfsg2/ui/tests/acceptance/policies-acl-old-test.js-31-      'navigates to policy show on successful save'
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/policies-acl-old-test.js-36-    assert
vault-1.0.2+dfsg2/ui/tests/acceptance/policies-acl-old-test.js:37:      .dom(`[data-test-policy-link="${policyLower}"]`)
vault-1.0.2+dfsg2/ui/tests/acceptance/policies-acl-old-test.js-38-      .exists({ count: 1 }, 'new policy shown in the list');
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/policies-acl-old-test.js-40-    // policy deletion
vault-1.0.2+dfsg2/ui/tests/acceptance/policies-acl-old-test.js:41:    await click(`[data-test-policy-link="${policyLower}"]`);
vault-1.0.2+dfsg2/ui/tests/acceptance/policies-acl-old-test.js-42-    await click('[data-test-policy-edit-toggle]');
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/policies-acl-old-test.js-46-    assert
vault-1.0.2+dfsg2/ui/tests/acceptance/policies-acl-old-test.js:47:      .dom(`[data-test-policy-item="${policyLower}"]`)
vault-1.0.2+dfsg2/ui/tests/acceptance/policies-acl-old-test.js-48-      .doesNotExist('deleted policy is not shown in the list');
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/policies-acl-old-test.js-54-    const policyString = 'path "*" { capabilities = ["update"]}';
vault-1.0.2+dfsg2/ui/tests/acceptance/policies-acl-old-test.js:55:    const policyName = `${now}-symbol,.`;
vault-1.0.2+dfsg2/ui/tests/acceptance/policies-acl-old-test.js-56-
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/policies-acl-old-test.js-64-      currentURL(),
vault-1.0.2+dfsg2/ui/tests/acceptance/policies-acl-old-test.js:65:      `/vault/policy/acl/${policyName}`,
vault-1.0.2+dfsg2/ui/tests/acceptance/policies-acl-old-test.js-66-      'navigates to policy show on successful save'
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/policies/index-test.js-35-    let policyName = 'list.policy';
vault-1.0.2+dfsg2/ui/tests/acceptance/policies/index-test.js:36:    await consoleComponent.runCommands([`write sys/policies/acl/${policyName} policy='${POLICY}'`]);
vault-1.0.2+dfsg2/ui/tests/acceptance/policies/index-test.js-37-    await page.visit({ type: 'acl' });
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/alicloud/secret-test.js-16-  test('enable alicloud', async function(assert) {
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/alicloud/secret-test.js:17:    let enginePath = `alicloud-${new Date().getTime()}`;
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/alicloud/secret-test.js-18-    await mountSecrets.visit();
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/alicloud/secret-test.js-28-
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/alicloud/secret-test.js:29:    assert.ok(backendsPage.rows.filterBy('path', `${enginePath}/`)[0], 'shows the alicloud engine');
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/alicloud/secret-test.js-30-  });
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/cubbyhole/secret-test.js-22-  test('it creates and can view a secret with the cubbyhole backend', async function(assert) {
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/cubbyhole/secret-test.js:23:    const kvPath = `cubbyhole-kv-${new Date().getTime()}`;
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/cubbyhole/secret-test.js-24-    await listPage.visitRoot({ backend: 'cubbyhole' });
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/engines-test.js-16-    // first mount an engine so we can disable it.
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/engines-test.js:17:    let enginePath = `alicloud-${new Date().getTime()}`;
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/engines-test.js-18-    await mountSecrets.enable('alicloud', enginePath);
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/engines-test.js-19-
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/engines-test.js:20:    assert.ok(backendsPage.rows.filterBy('path', `${enginePath}/`)[0], 'shows the mounted engine');
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/engines-test.js-21-
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/engines-test.js-22-    await backendsPage.visit();
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/engines-test.js:23:    let row = backendsPage.rows.filterBy('path', `${enginePath}/`)[0];
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/engines-test.js-24-    await row.menu();
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/engines-test.js-30-    assert.equal(
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/engines-test.js:31:      backendsPage.rows.filterBy('path', `${enginePath}/`).length,
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/engines-test.js-32-      0,
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/gcpkms/secrets-test.js-16-  test('enable gcpkms', async function(assert) {
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/gcpkms/secrets-test.js:17:    let enginePath = `gcpkms-${new Date().getTime()}`;
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/gcpkms/secrets-test.js-18-    await mountSecrets.visit();
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/gcpkms/secrets-test.js-28-
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/gcpkms/secrets-test.js:29:    assert.ok(backendsPage.rows.filterBy('path', `${enginePath}/`)[0], 'shows the gcpkms engine');
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/gcpkms/secrets-test.js-30-  });
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/generic/secret-test.js-28-  test('it creates and can view a secret with the generic backend', async function(assert) {
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/generic/secret-test.js:29:    const path = `generic-${new Date().getTime()}`;
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/generic/secret-test.js:30:    const kvPath = `generic-kv-${new Date().getTime()}`;
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/generic/secret-test.js:31:    cli.consoleInput(`write sys/mounts/${path} type=generic`);
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/generic/secret-test.js-32-    cli.enter();
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/generic/secret-test.js:33:    cli.consoleInput(`write ${path}/foo bar=baz`);
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/generic/secret-test.js-34-    cli.enter();
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/generic/secret-test.js-45-  test('upgrading generic to version 2 lists all existing secrets, and CRUD continues to work', async function(assert) {
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/generic/secret-test.js:46:    const path = `generic-${new Date().getTime()}`;
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/generic/secret-test.js:47:    const kvPath = `generic-kv-${new Date().getTime()}`;
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/generic/secret-test.js:48:    cli.consoleInput(`write sys/mounts/${path} type=generic`);
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/generic/secret-test.js-49-    cli.enter();
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/generic/secret-test.js:50:    cli.consoleInput(`write ${path}/foo bar=baz`);
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/generic/secret-test.js-51-    cli.enter();
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/generic/secret-test.js-52-    // upgrade to version 2 generic mount
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/generic/secret-test.js:53:    cli.consoleInput(`write sys/mounts/${path}/tune options=version=2`);
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/generic/secret-test.js-54-    cli.enter();
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/kv/secret-test.js-37-  test('it creates a secret and redirects', async function(assert) {
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/kv/secret-test.js:38:    const path = `kv-path-${new Date().getTime()}`;
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/kv/secret-test.js-39-    await listPage.visitRoot({ backend: 'secret' });
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/kv/secret-test.js-50-  test('it can create a secret when check-and-set is required', async function(assert) {
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/kv/secret-test.js:51:    let enginePath = `kv-${new Date().getTime()}`;
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/kv/secret-test.js-52-    let secretPath = 'foo/bar';
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/kv/secret-test.js-54-    await mountSecrets.enable('kv', enginePath);
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/kv/secret-test.js:55:    await consoleComponent.runCommands(`write ${enginePath}/config cas_required=true`);
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/kv/secret-test.js-56-    await writeSecret(enginePath, secretPath, 'foo', 'bar');
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/kv/secret-test.js-61-  test('version 1 performs the correct capabilities lookup', async function(assert) {
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/kv/secret-test.js:62:    let enginePath = `kv-${new Date().getTime()}`;
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/kv/secret-test.js-63-    let secretPath = 'foo/bar';
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/kv/secret-test.js-83-  test('version 1: nested paths creation maintains ability to navigate the tree', async function(assert) {
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/kv/secret-test.js:84:    let enginePath = `kv-${new Date().getTime()}`;
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/kv/secret-test.js-85-    let secretPath = '1/2/3/4';
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/kv/secret-test.js-126-    assert.equal(currentRouteName(), 'vault.cluster.secrets.backend.list');
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/kv/secret-test.js:127:    assert.equal(currentURL(), `/vault/secrets/${enginePath}/list/1/2/3/`, 'remains on the page');
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/kv/secret-test.js-128-
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/kv/secret-test.js-135-      currentURL(),
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/kv/secret-test.js:136:      `/vault/secrets/${enginePath}/list/1/`,
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/kv/secret-test.js-137-      'navigates to the ancestor created earlier'
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/kv/secret-test.js-152-  test('it redirects to the path ending in / for list pages', async function(assert) {
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/kv/secret-test.js:153:    const path = `foo/bar/kv-path-${new Date().getTime()}`;
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/kv/secret-test.js-154-    await listPage.visitRoot({ backend: 'secret' });
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/kv/secret-test.js-163-    let content = JSON.stringify({ foo: 'fa', bar: 'boo' });
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/kv/secret-test.js:164:    const path = `kv-path-${new Date().getTime()}`;
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/kv/secret-test.js-165-    await listPage.visitRoot({ backend: 'secret' });
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/kv/secret-test.js-190-    await consoleComponent.runCommands([
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/kv/secret-test.js:191:      `write sys/mounts/${backend} type=kv options=version=2`,
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/kv/secret-test.js:192:      `write sys/policies/acl/kv-v2-degrade policy=${V2_POLICY}`,
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/kv/secret-test.js-193-      // delete any kv previously written here so that tests can be re-run
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/kv/secret-test.js-218-    await consoleComponent.runCommands([
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/kv/secret-test.js:219:      `write sys/mounts/${backend} type=kv options=version=2`,
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/kv/secret-test.js:220:      `write sys/policies/acl/kv-v2-degrade policy=${V2_POLICY}`,
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/kv/secret-test.js-221-      // delete any kv previously written here so that tests can be re-run
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/pki/cert-test.js-38-  const setup = async (assert, action = 'issue') => {
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/pki/cert-test.js:39:    const path = `pki-${new Date().getTime()}`;
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/pki/cert-test.js-40-    const roleName = 'role';
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/pki/list-test.js-15-  const mountAndNav = async () => {
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/pki/list-test.js:16:    const path = `pki-${new Date().getTime()}`;
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/pki/list-test.js-17-    await enablePage.enable('pki', path);
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/pki/role-test.js-17-  const mountAndNav = async () => {
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/pki/role-test.js:18:    const path = `pki-${new Date().getTime()}`;
vault-1.0.2+dfsg2/ui/tests/acceptance/secrets/backend/pki/role-test.js-19-    await enablePage.enable('pki', path);
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/settings-test.js-23-    const type = 'consul';
vault-1.0.2+dfsg2/ui/tests/acceptance/settings-test.js:24:    const path = `path-${now}`;
vault-1.0.2+dfsg2/ui/tests/acceptance/settings-test.js-25-
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/settings-test.js-41-          find('[data-test-flash-message]').textContent.trim(),
vault-1.0.2+dfsg2/ui/tests/acceptance/settings-test.js:42:          `Successfully mounted '${type}' at '${path}'!`
vault-1.0.2+dfsg2/ui/tests/acceptance/settings-test.js-43-        );
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/settings/auth/configure/index-test.js-15-  test('it redirects to section options when there are no other sections', async function(assert) {
vault-1.0.2+dfsg2/ui/tests/acceptance/settings/auth/configure/index-test.js:16:    const path = `approle-${new Date().getTime()}`;
vault-1.0.2+dfsg2/ui/tests/acceptance/settings/auth/configure/index-test.js-17-    const type = 'approle';
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/settings/auth/configure/index-test.js-20-    assert.equal(currentRouteName(), 'vault.cluster.settings.auth.configure.section');
vault-1.0.2+dfsg2/ui/tests/acceptance/settings/auth/configure/index-test.js:21:    assert.equal(currentURL(), `/vault/settings/auth/configure/${path}/options`, 'loads the options route');
vault-1.0.2+dfsg2/ui/tests/acceptance/settings/auth/configure/index-test.js-22-  });
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/settings/auth/configure/index-test.js-24-  test('it redirects to the first section', async function(assert) {
vault-1.0.2+dfsg2/ui/tests/acceptance/settings/auth/configure/index-test.js:25:    const path = `aws-${new Date().getTime()}`;
vault-1.0.2+dfsg2/ui/tests/acceptance/settings/auth/configure/index-test.js-26-    const type = 'aws';
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/settings/auth/configure/index-test.js-31-      currentURL(),
vault-1.0.2+dfsg2/ui/tests/acceptance/settings/auth/configure/index-test.js:32:      `/vault/settings/auth/configure/${path}/client`,
vault-1.0.2+dfsg2/ui/tests/acceptance/settings/auth/configure/index-test.js-33-      'loads the first section for the type of auth method'
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/settings/auth/configure/section-test.js-26-  test('it can save options', async function(assert) {
vault-1.0.2+dfsg2/ui/tests/acceptance/settings/auth/configure/section-test.js:27:    const path = `approle-${new Date().getTime()}`;
vault-1.0.2+dfsg2/ui/tests/acceptance/settings/auth/configure/section-test.js-28-    const type = 'approle';
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/settings/auth/configure/section-test.js-39-    });
vault-1.0.2+dfsg2/ui/tests/acceptance/settings/auth/configure/section-test.js:40:    let tuneRequest = this.server.passthroughRequests.filterBy('url', `/v1/sys/mounts/auth/${path}/tune`)[0];
vault-1.0.2+dfsg2/ui/tests/acceptance/settings/auth/configure/section-test.js-41-    let keys = Object.keys(JSON.parse(tuneRequest.requestBody));
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/settings/auth/configure/section-test.js-46-  for (let type of ['aws', 'azure', 'gcp', 'github', 'kubernetes', 'ldap', 'okta', 'radius']) {
vault-1.0.2+dfsg2/ui/tests/acceptance/settings/auth/configure/section-test.js:47:    test(`it shows tabs for auth method: ${type}`, async assert => {
vault-1.0.2+dfsg2/ui/tests/acceptance/settings/auth/configure/section-test.js:48:      let path = `${type}-${Date.now()}`;
vault-1.0.2+dfsg2/ui/tests/acceptance/settings/auth/configure/section-test.js:49:      await cli.consoleInput(`write sys/auth/${path} type=${type}`);
vault-1.0.2+dfsg2/ui/tests/acceptance/settings/auth/configure/section-test.js-50-      await cli.enter();
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/settings/auth/enable-test.js-17-    // always force the new mount to the top of the list
vault-1.0.2+dfsg2/ui/tests/acceptance/settings/auth/enable-test.js:18:    const path = `approle-${new Date().getTime()}`;
vault-1.0.2+dfsg2/ui/tests/acceptance/settings/auth/enable-test.js-19-    const type = 'approle';
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/settings/auth/enable-test.js-24-        page.flash.latestMessage,
vault-1.0.2+dfsg2/ui/tests/acceptance/settings/auth/enable-test.js:25:        `Successfully mounted the ${type} auth method at ${path}.`,
vault-1.0.2+dfsg2/ui/tests/acceptance/settings/auth/enable-test.js-26-        'success flash shows'
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/settings/configure-secret-backends/pki/index-test.js-15-  test('it redirects to the cert section', async function(assert) {
vault-1.0.2+dfsg2/ui/tests/acceptance/settings/configure-secret-backends/pki/index-test.js:16:    const path = `pki-${new Date().getTime()}`;
vault-1.0.2+dfsg2/ui/tests/acceptance/settings/configure-secret-backends/pki/index-test.js-17-    await enablePage.enable('pki', path);
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/settings/configure-secret-backends/pki/section-cert-test.js-64-  const mountAndNav = async (assert, prefix) => {
vault-1.0.2+dfsg2/ui/tests/acceptance/settings/configure-secret-backends/pki/section-cert-test.js:65:    const path = `${prefix}pki-${new Date().getTime()}`;
vault-1.0.2+dfsg2/ui/tests/acceptance/settings/configure-secret-backends/pki/section-cert-test.js-66-    await enablePage.enable('pki', path);
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/settings/configure-secret-backends/pki/section-crl-test.js-16-  test('it saves crl config', async function(assert) {
vault-1.0.2+dfsg2/ui/tests/acceptance/settings/configure-secret-backends/pki/section-crl-test.js:17:    const path = `pki-${new Date().getTime()}`;
vault-1.0.2+dfsg2/ui/tests/acceptance/settings/configure-secret-backends/pki/section-crl-test.js-18-    await enablePage.enable('pki', path);
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/settings/configure-secret-backends/pki/section-tidy-test.js-16-  test('it saves tidy config', async function(assert) {
vault-1.0.2+dfsg2/ui/tests/acceptance/settings/configure-secret-backends/pki/section-tidy-test.js:17:    const path = `pki-${new Date().getTime()}`;
vault-1.0.2+dfsg2/ui/tests/acceptance/settings/configure-secret-backends/pki/section-tidy-test.js-18-    await enablePage.enable('pki', path);
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/settings/configure-secret-backends/pki/section-urls-test.js-16-  test('it saves urls config', async function(assert) {
vault-1.0.2+dfsg2/ui/tests/acceptance/settings/configure-secret-backends/pki/section-urls-test.js:17:    const path = `pki-${new Date().getTime()}`;
vault-1.0.2+dfsg2/ui/tests/acceptance/settings/configure-secret-backends/pki/section-urls-test.js-18-    await enablePage.enable('pki', path);
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/settings/mount-secret-backend-test.js-17-    // always force the new mount to the top of the list
vault-1.0.2+dfsg2/ui/tests/acceptance/settings/mount-secret-backend-test.js:18:    const path = `kv-${new Date().getTime()}`;
vault-1.0.2+dfsg2/ui/tests/acceptance/settings/mount-secret-backend-test.js-19-    const defaultTTLHours = 100;
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/ssh-test.js-26-      assertAfterGenerate(assert, sshPath) {
vault-1.0.2+dfsg2/ui/tests/acceptance/ssh-test.js:27:        assert.equal(currentURL(), `/vault/secrets/${sshPath}/sign/${this.name}`, 'ca sign url is correct');
vault-1.0.2+dfsg2/ui/tests/acceptance/ssh-test.js-28-        assert.dom('[data-test-row-label="Signed key"]').exists({ count: 1 }, 'renders the signed key');
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/ssh-test.js-50-          currentURL(),
vault-1.0.2+dfsg2/ui/tests/acceptance/ssh-test.js:51:          `/vault/secrets/${sshPath}/credentials/${this.name}`,
vault-1.0.2+dfsg2/ui/tests/acceptance/ssh-test.js-52-          'otp credential url is correct'
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/ssh-test.js-62-    const now = new Date().getTime();
vault-1.0.2+dfsg2/ui/tests/acceptance/ssh-test.js:63:    const sshPath = `ssh-${now}`;
vault-1.0.2+dfsg2/ui/tests/acceptance/ssh-test.js-64-
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/ssh-test.js-66-    await click('[data-test-secret-backend-configure]');
vault-1.0.2+dfsg2/ui/tests/acceptance/ssh-test.js:67:    assert.equal(currentURL(), `/vault/settings/secrets/configure/${sshPath}`);
vault-1.0.2+dfsg2/ui/tests/acceptance/ssh-test.js-68-    assert.ok(findAll('[data-test-ssh-configure-form]').length, 'renders the empty configuration form');
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/ssh-test.js-75-
vault-1.0.2+dfsg2/ui/tests/acceptance/ssh-test.js:76:    assert.equal(currentURL(), `/vault/secrets/${sshPath}/list`, `redirects to ssh index`);
vault-1.0.2+dfsg2/ui/tests/acceptance/ssh-test.js-77-
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/ssh-test.js-82-        find('[data-test-secret-header]').textContent.includes('SSH Role'),
vault-1.0.2+dfsg2/ui/tests/acceptance/ssh-test.js:83:        `${role.type}: renders the create page`
vault-1.0.2+dfsg2/ui/tests/acceptance/ssh-test.js-84-      );
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/ssh-test.js-93-        currentURL(),
vault-1.0.2+dfsg2/ui/tests/acceptance/ssh-test.js:94:        `/vault/secrets/${sshPath}/show/${role.name}`,
vault-1.0.2+dfsg2/ui/tests/acceptance/ssh-test.js:95:        `${role.type}: navigates to the show page on creation`
vault-1.0.2+dfsg2/ui/tests/acceptance/ssh-test.js-96-      );
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/ssh-test.js-109-        findAll('[data-test-secret-generate-form]').length,
vault-1.0.2+dfsg2/ui/tests/acceptance/ssh-test.js:110:        `${role.type}: back takes you back to the form`
vault-1.0.2+dfsg2/ui/tests/acceptance/ssh-test.js-111-      );
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/ssh-test.js-115-        currentURL(),
vault-1.0.2+dfsg2/ui/tests/acceptance/ssh-test.js:116:        `/vault/secrets/${sshPath}/list`,
vault-1.0.2+dfsg2/ui/tests/acceptance/ssh-test.js:117:        `${role.type}: cancel takes you to ssh index`
vault-1.0.2+dfsg2/ui/tests/acceptance/ssh-test.js-118-      );
vault-1.0.2+dfsg2/ui/tests/acceptance/ssh-test.js-119-      assert.ok(
vault-1.0.2+dfsg2/ui/tests/acceptance/ssh-test.js:120:        findAll(`[data-test-secret-link="${role.name}"]`).length,
vault-1.0.2+dfsg2/ui/tests/acceptance/ssh-test.js:121:        `${role.type}: role shows in the list`
vault-1.0.2+dfsg2/ui/tests/acceptance/ssh-test.js-122-      );
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/ssh-test.js-124-      //and delete
vault-1.0.2+dfsg2/ui/tests/acceptance/ssh-test.js:125:      await click(`[data-test-secret-link="${role.name}"] [data-test-popup-menu-trigger]`);
vault-1.0.2+dfsg2/ui/tests/acceptance/ssh-test.js:126:      await click(`[data-test-ssh-role-delete="${role.name}"] button`);
vault-1.0.2+dfsg2/ui/tests/acceptance/ssh-test.js-127-      await click(`[data-test-confirm-button]`);
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/ssh-test.js-130-      assert
vault-1.0.2+dfsg2/ui/tests/acceptance/ssh-test.js:131:        .dom(`[data-test-secret-link="${role.name}"]`)
vault-1.0.2+dfsg2/ui/tests/acceptance/ssh-test.js:132:        .doesNotExist(`${role.type}: role is no longer in the list`);
vault-1.0.2+dfsg2/ui/tests/acceptance/ssh-test.js-133-    }
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/tools-test.js-45-    TOOLS_ACTIONS.forEach(action => {
vault-1.0.2+dfsg2/ui/tests/acceptance/tools-test.js:46:      assert.ok(find(`[data-test-tools-action-link="${action}"]`), `${action} link renders`);
vault-1.0.2+dfsg2/ui/tests/acceptance/tools-test.js-47-    });
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-11-    {
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js:12:      name: `aes-${ts}`,
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-13-      type: 'aes256-gcm96',
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-17-    {
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js:18:      name: `aes-convergent-${ts}`,
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-19-      type: 'aes256-gcm96',
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-23-    {
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js:24:      name: `chacha-${ts}`,
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-25-      type: 'chacha20-poly1305',
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-29-    {
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js:30:      name: `chacha-convergent-${ts}`,
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-31-      type: 'chacha20-poly1305',
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-35-    {
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js:36:      name: `ecdsa-${ts}`,
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-37-      type: 'ecdsa-p256',
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-41-    {
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js:42:      name: `ed25519-${ts}`,
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-43-      type: 'ed25519',
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-47-    {
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js:48:      name: `rsa-2048-${ts}`,
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-49-      type: `rsa-2048`,
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-53-    {
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js:54:      name: `rsa-4096-${ts}`,
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-55-      type: `rsa-4096`,
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-94-          /vault:/.test(find('[data-test-transit-input="ciphertext"]').value),
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js:95:          `${key}: ciphertext shows a vault-prefixed ciphertext`
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-96-        );
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-102-            'nqR8LiVgNh/lwO2rArJJE9F9DMhh0lKo4JX9DAAkCDw=',
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js:103:            `${key}: the ui shows the base64-encoded context`
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-104-          );
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-111-            'NaXud2QW7KjyK6Me9ggh+zmnCeBGdG93LQED49PtoOI=',
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js:112:            `${key}: the ui shows the base64-encoded plaintext`
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-113-          );
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-125-          /vault:/.test(find('[data-test-transit-input="ciphertext"]').value),
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js:126:          `${key}: ciphertext shows a vault-prefixed ciphertext`
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-127-        );
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-131-          .dom('[data-test-transit-input="context"]')
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js:132:          .hasValue(encodeString('context'), `${key}: the ui shows the input context`);
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-133-      },
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-138-            'NaXud2QW7KjyK6Me9ggh+zmnCeBGdG93LQED49PtoOI=',
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js:139:            `${key}: the ui shows the base64-encoded plaintext`
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-140-          );
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-152-          /vault:/.test(find('[data-test-transit-input="ciphertext"]').value),
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js:153:          `${key}: ciphertext shows a vault-prefixed ciphertext`
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-154-        );
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-158-          .dom('[data-test-transit-input="context"]')
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js:159:          .hasValue(encodeString('context'), `${key}: the ui shows the input context`);
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-160-      },
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-163-          .dom('[data-test-transit-input="plaintext"]')
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js:164:          .hasValue('This is the secret', `${key}: the ui decodes plaintext`);
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-165-      },
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-175-      assertAfterEncrypt: key => {
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js:176:        assert.ok(find('[data-test-transit-input="ciphertext"]'), `${key}: ciphertext box shows`);
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-177-        assert.ok(
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-178-          /vault:/.test(find('[data-test-transit-input="ciphertext"]').value),
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js:179:          `${key}: ciphertext shows a vault-prefixed ciphertext`
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-180-        );
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-184-          .dom('[data-test-transit-input="context"]')
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js:185:          .hasValue(encodeString('secret 2'), `${key}: the ui shows the encoded context`);
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-186-      },
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-187-      assertAfterDecrypt: key => {
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js:188:        assert.ok(find('[data-test-transit-input="plaintext"]'), `${key}: plaintext box shows`);
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-189-        assert
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-190-          .dom('[data-test-transit-input="plaintext"]')
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js:191:          .hasValue('There are many secrets 🤐', `${key}: the ui decodes plaintext`);
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-192-      },
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-231-    const now = new Date().getTime();
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js:232:    hooks.transitPath = `transit-${now}`;
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-233-
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-241-    for (let [index, key] of hooks.transitKeys.entries()) {
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js:242:      await visit(`vault/secrets/${hooks.transitPath}/show/${key.name}`);
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-243-      if (index === 0) {
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-246-          .dom('[data-test-transit-key-version-row]')
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js:247:          .exists({ count: 1 }, `${key.name}: only one key version`);
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-248-        await click('[data-test-transit-key-rotate] button');
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-251-          .dom('[data-test-transit-key-version-row]')
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js:252:          .exists({ count: 2 }, `${key.name}: two key versions after rotate`);
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-253-      }
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-255-      assert.ok(
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js:256:        currentURL().startsWith(`/vault/secrets/${hooks.transitPath}/actions/${key.name}`),
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js:257:        `${key.name}: navigates to tranist actions`
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-258-      );
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-261-          find('[data-test-transit-key-version-select]'),
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js:262:          `${key.name}: the rotated key allows you to select versions`
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-263-        );
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-267-          find('[data-test-transit-action-link="export"]'),
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js:268:          `${key.name}: exportable key has a link to export action`
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-269-        );
##############################################
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-272-          .dom('[data-test-transit-action-link="export"]')
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js:273:          .doesNotExist(`${key.name}: non-exportable key does not link to export action`);
vault-1.0.2+dfsg2/ui/tests/acceptance/transit-test.js-274-      }
##############################################
vault-1.0.2+dfsg2/ui/tests/helpers/codemirror.js-8-  let element = document.querySelector(selector);
vault-1.0.2+dfsg2/ui/tests/helpers/codemirror.js:9:  invariant(element, `Selector ${selector} matched no elements`);
vault-1.0.2+dfsg2/ui/tests/helpers/codemirror.js-10-
vault-1.0.2+dfsg2/ui/tests/helpers/codemirror.js-11-  let cm = cmService.instanceFor(element.id);
vault-1.0.2+dfsg2/ui/tests/helpers/codemirror.js:12:  invariant(cm, `No registered CodeMirror instance for ${selector}`);
vault-1.0.2+dfsg2/ui/tests/helpers/codemirror.js-13-
##############################################
vault-1.0.2+dfsg2/ui/tests/integration/components/console/log-list-test.js-18-
vault-1.0.2+dfsg2/ui/tests/integration/components/console/log-list-test.js:19:    assert.dom('pre').includesText(`${expectedText}`);
vault-1.0.2+dfsg2/ui/tests/integration/components/console/log-list-test.js-20-  });
##############################################
vault-1.0.2+dfsg2/ui/tests/integration/components/console/log-object-test.js-26-
vault-1.0.2+dfsg2/ui/tests/integration/components/console/log-object-test.js:27:    assert.dom('pre').includesText(`${expectedText}`);
vault-1.0.2+dfsg2/ui/tests/integration/components/console/log-object-test.js-28-  });
##############################################
vault-1.0.2+dfsg2/ui/tests/integration/components/control-group-test.js-68-    assert.equal(component.bannerText, 'The path you requested is locked by a control group');
vault-1.0.2+dfsg2/ui/tests/integration/components/control-group-test.js:69:    assert.equal(component.requestorText, `You are requesting access to ${model.requestPath}`);
vault-1.0.2+dfsg2/ui/tests/integration/components/control-group-test.js-70-    assert.equal(component.showsTokenText, false, 'does not show token message when there is no token');
##############################################
vault-1.0.2+dfsg2/ui/tests/integration/components/control-group-test.js-127-      component.requestorText,
vault-1.0.2+dfsg2/ui/tests/integration/components/control-group-test.js:128:      `${model.requestEntity.name} is requesting access to ${model.requestPath}`
vault-1.0.2+dfsg2/ui/tests/integration/components/control-group-test.js-129-    );
##############################################
vault-1.0.2+dfsg2/ui/tests/integration/components/control-group-test.js-164-      component.requestorText,
vault-1.0.2+dfsg2/ui/tests/integration/components/control-group-test.js:165:      `${model.requestEntity.name} is authorized to access ${model.requestPath}`
vault-1.0.2+dfsg2/ui/tests/integration/components/control-group-test.js-166-    );
##############################################
vault-1.0.2+dfsg2/ui/tests/integration/components/replication-actions-test.js-86-  for (let [replicationMode, clusterMode, action, headerText, fillInFn, expectedOnSubmit] of testCases) {
vault-1.0.2+dfsg2/ui/tests/integration/components/replication-actions-test.js:87:    test(`replication mode ${replicationMode}, cluster mode: ${clusterMode}, action: ${action}`, async function(assert) {
vault-1.0.2+dfsg2/ui/tests/integration/components/replication-actions-test.js:88:      const testKey = `${replicationMode}-${clusterMode}-${action}`;
vault-1.0.2+dfsg2/ui/tests/integration/components/replication-actions-test.js-89-      this.set('model', {
##############################################
vault-1.0.2+dfsg2/ui/tests/integration/components/replication-actions-test.js-107-          JSON.stringify(expectedOnSubmit),
vault-1.0.2+dfsg2/ui/tests/integration/components/replication-actions-test.js:108:          `${testKey}: submitted values match expected`
vault-1.0.2+dfsg2/ui/tests/integration/components/replication-actions-test.js-109-        );
##############################################
vault-1.0.2+dfsg2/ui/tests/integration/components/replication-actions-test.js-119-        headerText,
vault-1.0.2+dfsg2/ui/tests/integration/components/replication-actions-test.js:120:        `${testKey}: renders the correct partial as default`
vault-1.0.2+dfsg2/ui/tests/integration/components/replication-actions-test.js-121-      );
##############################################
vault-1.0.2+dfsg2/ui/tests/integration/components/shamir-flow-test.js-83-      find('.shamir-progress').textContent.includes(
vault-1.0.2+dfsg2/ui/tests/integration/components/shamir-flow-test.js:84:        `${response.progress}/${response.required} keys provided`
vault-1.0.2+dfsg2/ui/tests/integration/components/shamir-flow-test.js-85-      ),
##############################################
vault-1.0.2+dfsg2/ui/tests/integration/components/shamir-flow-test.js-113-      find('.shamir-progress').textContent.includes(
vault-1.0.2+dfsg2/ui/tests/integration/components/shamir-flow-test.js:114:        `${response.progress}/${response.required} keys provided`
vault-1.0.2+dfsg2/ui/tests/integration/components/shamir-flow-test.js-115-      ),
##############################################
vault-1.0.2+dfsg2/ui/tests/integration/services/auth-test.js-169-          tokenName &&
vault-1.0.2+dfsg2/ui/tests/integration/services/auth-test.js:170:          tokenName.indexOf(`${TOKEN_PREFIX}${ROOT_PREFIX}`) === 0 &&
vault-1.0.2+dfsg2/ui/tests/integration/services/auth-test.js-171-          this.environment() !== 'development'
##############################################
vault-1.0.2+dfsg2/ui/tests/integration/services/auth-test.js-184-
vault-1.0.2+dfsg2/ui/tests/integration/services/auth-test.js:185:        const expectedTokenName = `${TOKEN_PREFIX}${ROOT_PREFIX}${TOKEN_SEPARATOR}1`;
vault-1.0.2+dfsg2/ui/tests/integration/services/auth-test.js-186-        assert.equal('test', clusterToken, 'token is saved properly');
vault-1.0.2+dfsg2/ui/tests/integration/services/auth-test.js-187-        assert.equal(
vault-1.0.2+dfsg2/ui/tests/integration/services/auth-test.js:188:          `${TOKEN_PREFIX}${ROOT_PREFIX}${TOKEN_SEPARATOR}1`,
vault-1.0.2+dfsg2/ui/tests/integration/services/auth-test.js-189-          clusterTokenName,
##############################################
vault-1.0.2+dfsg2/ui/tests/integration/services/auth-test.js-214-          tokenName &&
vault-1.0.2+dfsg2/ui/tests/integration/services/auth-test.js:215:          tokenName.indexOf(`${TOKEN_PREFIX}${ROOT_PREFIX}`) === 0 &&
vault-1.0.2+dfsg2/ui/tests/integration/services/auth-test.js-216-          this.environment() !== 'development'
##############################################
vault-1.0.2+dfsg2/ui/tests/integration/services/auth-test.js-230-
vault-1.0.2+dfsg2/ui/tests/integration/services/auth-test.js:231:        const expectedTokenName = `${TOKEN_PREFIX}${ROOT_PREFIX}${TOKEN_SEPARATOR}1`;
vault-1.0.2+dfsg2/ui/tests/integration/services/auth-test.js-232-        assert.equal('test', clusterToken, 'token is saved properly');
vault-1.0.2+dfsg2/ui/tests/integration/services/auth-test.js-233-        assert.equal(
vault-1.0.2+dfsg2/ui/tests/integration/services/auth-test.js:234:          `${TOKEN_PREFIX}${ROOT_PREFIX}${TOKEN_SEPARATOR}1`,
vault-1.0.2+dfsg2/ui/tests/integration/services/auth-test.js-235-          clusterTokenName,
##############################################
vault-1.0.2+dfsg2/ui/tests/integration/services/auth-test.js-261-        const authData = service.get('authData');
vault-1.0.2+dfsg2/ui/tests/integration/services/auth-test.js:262:        const expectedTokenName = `${TOKEN_PREFIX}github${TOKEN_SEPARATOR}1`;
vault-1.0.2+dfsg2/ui/tests/integration/services/auth-test.js-263-
##############################################
vault-1.0.2+dfsg2/ui/tests/integration/services/auth-test.js-295-          assert.equal(
vault-1.0.2+dfsg2/ui/tests/integration/services/auth-test.js:296:            `${TOKEN_PREFIX}userpass${TOKEN_SEPARATOR}1`,
vault-1.0.2+dfsg2/ui/tests/integration/services/auth-test.js-297-            clusterTokenName,
##############################################
vault-1.0.2+dfsg2/ui/tests/integration/services/auth-test.js-331-        assert.equal(
vault-1.0.2+dfsg2/ui/tests/integration/services/auth-test.js:332:          `${TOKEN_PREFIX}token${TOKEN_SEPARATOR}1`,
vault-1.0.2+dfsg2/ui/tests/integration/services/auth-test.js-333-          clusterTokenName,
##############################################
vault-1.0.2+dfsg2/ui/tests/unit/adapters/aws-credential-test.js-69-  cases.forEach(([description, args, expectedMethod, expectedRequestBody]) => {
vault-1.0.2+dfsg2/ui/tests/unit/adapters/aws-credential-test.js:70:    test(`aws-credential: ${description}`, function(assert) {
vault-1.0.2+dfsg2/ui/tests/unit/adapters/aws-credential-test.js-71-      assert.expect(3);
##############################################
vault-1.0.2+dfsg2/ui/tests/unit/adapters/aws-credential-test.js-75-      assert.equal(url, '/v1/aws/creds/foo', `calls the correct url`);
vault-1.0.2+dfsg2/ui/tests/unit/adapters/aws-credential-test.js:76:      assert.equal(method, expectedMethod, `${description} uses the correct http verb: ${expectedMethod}`);
vault-1.0.2+dfsg2/ui/tests/unit/adapters/aws-credential-test.js-77-      assert.equal(requestBody, JSON.stringify(expectedRequestBody));
##############################################
vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/_test-cases.js-13-      args: [null, { modelName }, 'foo'],
vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/_test-cases.js:14:      url: `/v1/${modelName}/id/foo`,
vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/_test-cases.js-15-      method: 'GET',
##############################################
vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/_test-cases.js-20-      args: [storeMVP, { modelName }],
vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/_test-cases.js:21:      url: `/v1/${modelName}`,
vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/_test-cases.js-22-      method: 'POST',
##############################################
vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/_test-cases.js-26-      args: [storeMVP, { modelName }, { id: 'foo' }],
vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/_test-cases.js:27:      url: `/v1/${modelName}/id/foo`,
vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/_test-cases.js-28-      method: 'PUT',
##############################################
vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/_test-cases.js-32-      args: [storeMVP, { modelName }, { id: 'foo' }],
vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/_test-cases.js:33:      url: `/v1/${modelName}/id/foo`,
vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/_test-cases.js-34-      method: 'DELETE',
##############################################
vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/_test-cases.js-38-      args: [null, { modelName }, {}],
vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/_test-cases.js:39:      url: `/v1/${modelName}/id?list=true`,
vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/_test-cases.js-40-      method: 'GET',
##############################################
vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/entity-alias-test.js-19-  cases.forEach(testCase => {
vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/entity-alias-test.js:20:    test(`entity-alias#${testCase.adapterMethod}`, function(assert) {
vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/entity-alias-test.js-21-      assert.expect(2);
##############################################
vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/entity-alias-test.js-24-      let { url, method } = this.server.handledRequests[0];
vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/entity-alias-test.js:25:      assert.equal(url, testCase.url, `${testCase.adapterMethod} calls the correct url: ${testCase.url}`);
vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/entity-alias-test.js-26-      assert.equal(
##############################################
vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/entity-alias-test.js-28-        testCase.method,
vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/entity-alias-test.js:29:        `${testCase.adapterMethod} uses the correct http verb: ${testCase.method}`
vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/entity-alias-test.js-30-      );
##############################################
vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/entity-test.js-19-  cases.forEach(testCase => {
vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/entity-test.js:20:    test(`entity#${testCase.adapterMethod}`, function(assert) {
vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/entity-test.js-21-      assert.expect(2);
##############################################
vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/entity-test.js-24-      let { url, method } = this.server.handledRequests[0];
vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/entity-test.js:25:      assert.equal(url, testCase.url, `${testCase.adapterMethod} calls the correct url: ${testCase.url}`);
vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/entity-test.js-26-      assert.equal(
##############################################
vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/entity-test.js-28-        testCase.method,
vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/entity-test.js:29:        `${testCase.adapterMethod} uses the correct http verb: ${testCase.method}`
vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/entity-test.js-30-      );
##############################################
vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/group-alias-test.js-19-  cases.forEach(testCase => {
vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/group-alias-test.js:20:    test(`group-alias#${testCase.adapterMethod}`, function(assert) {
vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/group-alias-test.js-21-      assert.expect(2);
##############################################
vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/group-alias-test.js-24-      let { url, method } = this.server.handledRequests[0];
vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/group-alias-test.js:25:      assert.equal(url, testCase.url, `${testCase.adapterMethod} calls the correct url: ${testCase.url}`);
vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/group-alias-test.js-26-      assert.equal(
##############################################
vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/group-alias-test.js-28-        testCase.method,
vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/group-alias-test.js:29:        `${testCase.adapterMethod} uses the correct http verb: ${testCase.method}`
vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/group-alias-test.js-30-      );
##############################################
vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/group-test.js-19-  cases.forEach(testCase => {
vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/group-test.js:20:    test(`group#${testCase.adapterMethod}`, function(assert) {
vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/group-test.js-21-      assert.expect(2);
##############################################
vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/group-test.js-24-      let { url, method } = this.server.handledRequests[0];
vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/group-test.js:25:      assert.equal(url, testCase.url, `${testCase.adapterMethod} calls the correct url: ${testCase.url}`);
vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/group-test.js-26-      assert.equal(
##############################################
vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/group-test.js-28-        testCase.method,
vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/group-test.js:29:        `${testCase.adapterMethod} uses the correct http verb: ${testCase.method}`
vault-1.0.2+dfsg2/ui/tests/unit/adapters/identity/group-test.js-30-      );
##############################################
vault-1.0.2+dfsg2/ui/tests/unit/adapters/secret-engine-test.js-51-  cases.forEach(testCase => {
vault-1.0.2+dfsg2/ui/tests/unit/adapters/secret-engine-test.js:52:    test(`secret-engine: ${testCase.description}`, function(assert) {
vault-1.0.2+dfsg2/ui/tests/unit/adapters/secret-engine-test.js-53-      assert.expect(2);
##############################################
vault-1.0.2+dfsg2/ui/tests/unit/adapters/secret-engine-test.js-56-      let { url, method } = this.server.handledRequests[0];
vault-1.0.2+dfsg2/ui/tests/unit/adapters/secret-engine-test.js:57:      assert.equal(url, testCase.url, `${testCase.adapterMethod} calls the correct url: ${testCase.url}`);
vault-1.0.2+dfsg2/ui/tests/unit/adapters/secret-engine-test.js-58-      assert.equal(
##############################################
vault-1.0.2+dfsg2/ui/tests/unit/adapters/secret-engine-test.js-60-        testCase.method,
vault-1.0.2+dfsg2/ui/tests/unit/adapters/secret-engine-test.js:61:        `${testCase.adapterMethod} uses the correct http verb: ${testCase.method}`
vault-1.0.2+dfsg2/ui/tests/unit/adapters/secret-engine-test.js-62-      );
##############################################
vault-1.0.2+dfsg2/ui/tests/unit/adapters/secret-v2-test.js-57-  ].forEach(([adapterMethod, store, type, queryOrSnapshot, expectedHttpVerb, expectedURL]) => {
vault-1.0.2+dfsg2/ui/tests/unit/adapters/secret-v2-test.js:58:    test(`secret-v2: ${adapterMethod}`, function(assert) {
vault-1.0.2+dfsg2/ui/tests/unit/adapters/secret-v2-test.js-59-      let adapter = this.owner.lookup('adapter:secret-v2');
##############################################
vault-1.0.2+dfsg2/ui/tests/unit/adapters/secret-v2-test.js-61-      let { url, method } = this.server.handledRequests[0];
vault-1.0.2+dfsg2/ui/tests/unit/adapters/secret-v2-test.js:62:      assert.equal(url, expectedURL, `${adapterMethod} calls the correct url: ${expectedURL}`);
vault-1.0.2+dfsg2/ui/tests/unit/adapters/secret-v2-test.js-63-      assert.equal(
##############################################
vault-1.0.2+dfsg2/ui/tests/unit/adapters/secret-v2-test.js-65-        expectedHttpVerb,
vault-1.0.2+dfsg2/ui/tests/unit/adapters/secret-v2-test.js:66:        `${adapterMethod} uses the correct http verb: ${expectedHttpVerb}`
vault-1.0.2+dfsg2/ui/tests/unit/adapters/secret-v2-test.js-67-      );
##############################################
vault-1.0.2+dfsg2/ui/tests/unit/adapters/secret-v2-version-test.js-70-  ].forEach(([testName, adapterMethod, args, expectedHttpVerb, expectedURL, exptectedRequestBody]) => {
vault-1.0.2+dfsg2/ui/tests/unit/adapters/secret-v2-version-test.js:71:    test(`${testName}`, function(assert) {
vault-1.0.2+dfsg2/ui/tests/unit/adapters/secret-v2-version-test.js-72-      let adapter = this.owner.lookup('adapter:secret-v2-version');
##############################################
vault-1.0.2+dfsg2/ui/tests/unit/adapters/secret-v2-version-test.js-74-      let { url, method, requestBody } = this.server.handledRequests[0];
vault-1.0.2+dfsg2/ui/tests/unit/adapters/secret-v2-version-test.js:75:      assert.equal(url, expectedURL, `${adapterMethod} calls the correct url: ${expectedURL}`);
vault-1.0.2+dfsg2/ui/tests/unit/adapters/secret-v2-version-test.js-76-      assert.equal(
##############################################
vault-1.0.2+dfsg2/ui/tests/unit/adapters/secret-v2-version-test.js-78-        expectedHttpVerb,
vault-1.0.2+dfsg2/ui/tests/unit/adapters/secret-v2-version-test.js:79:        `${adapterMethod} uses the correct http verb: ${expectedHttpVerb}`
vault-1.0.2+dfsg2/ui/tests/unit/adapters/secret-v2-version-test.js-80-      );
##############################################
vault-1.0.2+dfsg2/ui/tests/unit/components/identity/edit-form-test.js-60-    });
vault-1.0.2+dfsg2/ui/tests/unit/components/identity/edit-form-test.js:61:    test(`it computes cancelLink properly: ${testCase.identityType} ${testCase.mode}`, function(assert) {
vault-1.0.2+dfsg2/ui/tests/unit/components/identity/edit-form-test.js-62-      let component = this.owner.lookup('component:identity/edit-form');
##############################################
vault-1.0.2+dfsg2/ui/tests/unit/lib/console-helpers-test.js-36-  testCommands.forEach(function(testCase) {
vault-1.0.2+dfsg2/ui/tests/unit/lib/console-helpers-test.js:37:    test(`#parseCommand: ${testCase.name}`, function(assert) {
vault-1.0.2+dfsg2/ui/tests/unit/lib/console-helpers-test.js-38-      let result = parseCommand(testCase.command);
##############################################
vault-1.0.2+dfsg2/ui/tests/unit/lib/console-helpers-test.js-102-  testExtractCases.forEach(function(testCase) {
vault-1.0.2+dfsg2/ui/tests/unit/lib/console-helpers-test.js:103:    test(`#extractDataAndFlags: ${testCase.name}`, function(assert) {
vault-1.0.2+dfsg2/ui/tests/unit/lib/console-helpers-test.js-104-      let { data, flags } = extractDataAndFlags(...testCase.input);
##############################################
vault-1.0.2+dfsg2/ui/tests/unit/lib/console-helpers-test.js-256-  testResponseCases.forEach(function(testCase) {
vault-1.0.2+dfsg2/ui/tests/unit/lib/console-helpers-test.js:257:    test(`#logFromResponse: ${testCase.name}`, function(assert) {
vault-1.0.2+dfsg2/ui/tests/unit/lib/console-helpers-test.js-258-      let data = logFromResponse(...testCase.args);
##############################################
vault-1.0.2+dfsg2/ui/tests/unit/lib/console-helpers-test.js-301-  testErrorCases.forEach(function(testCase) {
vault-1.0.2+dfsg2/ui/tests/unit/lib/console-helpers-test.js:302:    test(`#logFromError: ${testCase.name}`, function(assert) {
vault-1.0.2+dfsg2/ui/tests/unit/lib/console-helpers-test.js-303-      let data = logFromError(...testCase.args);
##############################################
vault-1.0.2+dfsg2/ui/tests/unit/lib/console-helpers-test.js-325-  testCommandCases.forEach(function(testCase) {
vault-1.0.2+dfsg2/ui/tests/unit/lib/console-helpers-test.js:326:    test(`#logErrorFromInput: ${testCase.name}`, function(assert) {
vault-1.0.2+dfsg2/ui/tests/unit/lib/console-helpers-test.js-327-      let data = logErrorFromInput(...testCase.args);
##############################################
vault-1.0.2+dfsg2/ui/tests/unit/lib/kv-object-test.js-32-  fromJSONTests.forEach(function([name, input, content]) {
vault-1.0.2+dfsg2/ui/tests/unit/lib/kv-object-test.js:33:    test(`fromJSON: ${name}`, function(assert) {
vault-1.0.2+dfsg2/ui/tests/unit/lib/kv-object-test.js-34-      let data = KVObject.create({ content: [] }).fromJSON(input);
##############################################
vault-1.0.2+dfsg2/ui/tests/unit/lib/kv-object-test.js-50-  fromJSONTests.forEach(function([name, input, content]) {
vault-1.0.2+dfsg2/ui/tests/unit/lib/kv-object-test.js:51:    test(`fromJSONString: ${name}`, function(assert) {
vault-1.0.2+dfsg2/ui/tests/unit/lib/kv-object-test.js-52-      let inputString = JSON.stringify(input, null, 2);
##############################################
vault-1.0.2+dfsg2/ui/tests/unit/lib/kv-object-test.js-69-  toJSONTests.forEach(function([name, includeBlanks, input, output]) {
vault-1.0.2+dfsg2/ui/tests/unit/lib/kv-object-test.js:70:    test(`toJSON: ${name}`, function(assert) {
vault-1.0.2+dfsg2/ui/tests/unit/lib/kv-object-test.js-71-      let data = KVObject.create({ content: [] }).fromJSON(input);
##############################################
vault-1.0.2+dfsg2/ui/tests/unit/lib/kv-object-test.js-77-  toJSONTests.forEach(function([name, includeBlanks, input, output]) {
vault-1.0.2+dfsg2/ui/tests/unit/lib/kv-object-test.js:78:    test(`toJSONString: ${name}`, function(assert) {
vault-1.0.2+dfsg2/ui/tests/unit/lib/kv-object-test.js-79-      let expected = JSON.stringify(output, null, 2);
##############################################
vault-1.0.2+dfsg2/ui/tests/unit/lib/kv-object-test.js-95-  isAdvancedTests.forEach(function([name, input, expected]) {
vault-1.0.2+dfsg2/ui/tests/unit/lib/kv-object-test.js:96:    test(`isAdvanced: ${name}`, function(assert) {
vault-1.0.2+dfsg2/ui/tests/unit/lib/kv-object-test.js-97-      let data = KVObject.create({ content: [] }).fromJSON(input);
##############################################
vault-1.0.2+dfsg2/ui/tests/unit/lib/path-to-tree-test.js-54-  tests.forEach(function([name, input, expected]) {
vault-1.0.2+dfsg2/ui/tests/unit/lib/path-to-tree-test.js:55:    test(`pathToTree: ${name}`, function(assert) {
vault-1.0.2+dfsg2/ui/tests/unit/lib/path-to-tree-test.js-56-      let output = pathToTree(input);
##############################################
vault-1.0.2+dfsg2/ui/tests/unit/services/console-test.js-89-      let [url, verb, options] = ajax.lastCall.args;
vault-1.0.2+dfsg2/ui/tests/unit/services/console-test.js:90:      assert.equal(url, testCase.expectedURL, `${testCase.method}: uses trimmed passed url`);
vault-1.0.2+dfsg2/ui/tests/unit/services/console-test.js:91:      assert.equal(verb, testCase.expectedVerb, `${testCase.method}: uses the correct verb`);
vault-1.0.2+dfsg2/ui/tests/unit/services/console-test.js:92:      assert.deepEqual(options, testCase.expectedOptions, `${testCase.method}: uses the correct options`);
vault-1.0.2+dfsg2/ui/tests/unit/services/console-test.js-93-    });
##############################################
vault-1.0.2+dfsg2/ui/tests/unit/services/control-group-test.js-103-  ].forEach(function([name, setup, args, expectation]) {
vault-1.0.2+dfsg2/ui/tests/unit/services/control-group-test.js:104:    test(`checkForControlGroup: ${name}`, function(assert) {
vault-1.0.2+dfsg2/ui/tests/unit/services/control-group-test.js-105-      if (setup) {
##############################################
vault-1.0.2+dfsg2/ui/tests/unit/services/control-group-test.js-180-    let path = 'kv/foo/bar';
vault-1.0.2+dfsg2/ui/tests/unit/services/control-group-test.js:181:    let expectedKey = `${CONTROL_GROUP_PREFIX}${accessor}${TOKEN_SEPARATOR}${path}`;
vault-1.0.2+dfsg2/ui/tests/unit/services/control-group-test.js-182-    assert.equal(storageKey(accessor, path), expectedKey, 'uses expected key');
##############################################
vault-1.0.2+dfsg2/ui/tests/unit/services/control-group-test.js-189-    let data = { foo: 'bar' };
vault-1.0.2+dfsg2/ui/tests/unit/services/control-group-test.js:190:    let expectedKey = `${CONTROL_GROUP_PREFIX}${accessor}${TOKEN_SEPARATOR}${path}`;
vault-1.0.2+dfsg2/ui/tests/unit/services/control-group-test.js-191-    let subject = this.owner.factoryFor('service:control-group').create({
##############################################
vault-1.0.2+dfsg2/ui/tests/unit/services/control-group-test.js-197-    store.setItem(expectedKey, data);
vault-1.0.2+dfsg2/ui/tests/unit/services/control-group-test.js:198:    store.setItem(`${CONTROL_GROUP_PREFIX}2345${TOKEN_SEPARATOR}${path}`, 'ok');
vault-1.0.2+dfsg2/ui/tests/unit/services/control-group-test.js-199-
##############################################
vault-1.0.2+dfsg2/ui/tests/unit/services/control-group-test.js-216-    };
vault-1.0.2+dfsg2/ui/tests/unit/services/control-group-test.js:217:    let key = `${CONTROL_GROUP_PREFIX}${info.accessor}${TOKEN_SEPARATOR}${info.creation_path}`;
vault-1.0.2+dfsg2/ui/tests/unit/services/control-group-test.js-218-
##############################################
vault-1.0.2+dfsg2/ui/tests/unit/services/control-group-test.js-232-
vault-1.0.2+dfsg2/ui/tests/unit/services/control-group-test.js:233:    let expectedKey = `${CONTROL_GROUP_PREFIX}${accessor}${TOKEN_SEPARATOR}${path}`;
vault-1.0.2+dfsg2/ui/tests/unit/services/control-group-test.js-234-    store.setItem(expectedKey, { one: '2' });
##############################################
vault-1.0.2+dfsg2/ui/tests/unit/services/control-group-test.js-246-
vault-1.0.2+dfsg2/ui/tests/unit/services/control-group-test.js:247:    let keyOne = `${CONTROL_GROUP_PREFIX}foo`;
vault-1.0.2+dfsg2/ui/tests/unit/services/control-group-test.js:248:    let keyTwo = `${CONTROL_GROUP_PREFIX}bar`;
vault-1.0.2+dfsg2/ui/tests/unit/services/control-group-test.js-249-    store.setItem(keyOne, { one: '2' });
##############################################
vault-1.0.2+dfsg2/ui/tests/unit/services/control-group-test.js-265-
vault-1.0.2+dfsg2/ui/tests/unit/services/control-group-test.js:266:    let keyOne = `${CONTROL_GROUP_PREFIX}foo`;
vault-1.0.2+dfsg2/ui/tests/unit/services/control-group-test.js-267-    store.setItem(keyOne, { one: '2' });
##############################################
vault-1.0.2+dfsg2/ui/tests/unit/services/wizard-test.js-299-    let store = storage();
vault-1.0.2+dfsg2/ui/tests/unit/services/wizard-test.js:300:    test(`${testCase.method}`, function(assert) {
vault-1.0.2+dfsg2/ui/tests/unit/services/wizard-test.js-301-      let wizard = this.owner.factoryFor('service:wizard').create({
##############################################
vault-1.0.2+dfsg2/ui/tests/unit/services/wizard-test.js-322-            property.value,
vault-1.0.2+dfsg2/ui/tests/unit/services/wizard-test.js:323:            `${testCase.method} creates correct value for ${property.prop}`
vault-1.0.2+dfsg2/ui/tests/unit/services/wizard-test.js-324-          );
##############################################
vault-1.0.2+dfsg2/ui/tests/unit/services/wizard-test.js-331-            item.value,
vault-1.0.2+dfsg2/ui/tests/unit/services/wizard-test.js:332:            `${testCase.method} creates correct storage state for ${item.key}`
vault-1.0.2+dfsg2/ui/tests/unit/services/wizard-test.js-333-          );
##############################################
vault-1.0.2+dfsg2/ui/tests/unit/services/wizard-test.js-336-      if (testCase.expectedResults.value !== null && testCase.expectedResults.value !== undefined) {
vault-1.0.2+dfsg2/ui/tests/unit/services/wizard-test.js:337:        assert.equal(result, testCase.expectedResults.value, `${testCase.method} gives correct value`);
vault-1.0.2+dfsg2/ui/tests/unit/services/wizard-test.js-338-      }
##############################################
vault-1.0.2+dfsg2/ui/tests/unit/utils/decode-config-from-jwt-test.js-8-    'eyJhbGciOiJFUzUxMiIsInR5cCI6IkpXVCJ9.eyJhZGRyIjoiaHR0cDovLzEyNy4wLjAuMTo4MjAwIiwiZXhwIjoxNTE3NDM0NDA2LCJpYXQiOjE1MTc0MzI2MDYsImp0aSI6IjBiYmI1ZWMyLWM0ODgtMzRjYi0wMzY5LTkxZmJiMjVkZTFiYSIsInR5cGUiOiJ3cmFwcGluZyJ9.MIGHAkIBAGzB5EW6PolAi2rYOzZNvfJnR902WxprtRqnSF2E2I2ye9XLGX--L7npSBjBhnd27ocQ4ZO9VhfDIFqMzu1TNiwCQT52O6xAoz9ElRrq76PjkEHO4ns5_ZgjSKXuKaqdGysHYSlry8KEjWLGQECvZWg9LQeIf35jwqeQUfyJUfmwl5r_';
vault-1.0.2+dfsg2/ui/tests/unit/utils/decode-config-from-jwt-test.js:9:  const INVALID_JSON_TOKEN = `foo.${btoa({ addr: 'http://127.0.0.1' })}.bar`;
vault-1.0.2+dfsg2/ui/tests/unit/utils/decode-config-from-jwt-test.js-10-
##############################################
vault-1.0.2+dfsg2/vault/core_test.go-26-
vault-1.0.2+dfsg2/vault/core_test.go:27:func TestNewCore_badRedirectAddr(t *testing.T) {
vault-1.0.2+dfsg2/vault/core_test.go-28-	logger = logging.NewVaultLogger(log.Trace)
##############################################
vault-1.0.2+dfsg2/vault/request_forwarding.go-184-			if c.logger.IsInfo() {
vault-1.0.2+dfsg2/vault/request_forwarding.go:185:				c.logger.Info("serving cluster requests", "cluster_listen_address", tlsLn.Addr())
vault-1.0.2+dfsg2/vault/request_forwarding.go-186-			}
##############################################
vault-1.0.2+dfsg2/vault/request_forwarding_service.pb.go-74-
vault-1.0.2+dfsg2/vault/request_forwarding_service.pb.go:75:func (m *EchoRequest) GetClusterAddr() string {
vault-1.0.2+dfsg2/vault/request_forwarding_service.pb.go-76-	if m != nil {
##############################################
vault-1.0.2+dfsg2/vault/request_forwarding_service.pb.go-288-
vault-1.0.2+dfsg2/vault/request_forwarding_service.pb.go:289:func (m *PerfStandbyElectionResponse) GetPrimaryClusterAddr() string {
vault-1.0.2+dfsg2/vault/request_forwarding_service.pb.go-290-	if m != nil {
##############################################
vault-1.0.2+dfsg2/vault/request_handling.go-152-		var valid bool
vault-1.0.2+dfsg2/vault/request_handling.go:153:		remoteSockAddr, err := sockaddr.NewSockAddr(req.Connection.RemoteAddr)
vault-1.0.2+dfsg2/vault/request_handling.go-154-		if err != nil {
##############################################
vault-1.0.2+dfsg2/vault/testing.go-499-	}()
vault-1.0.2+dfsg2/vault/testing.go:500:	return soc.Addr().String(), nil
vault-1.0.2+dfsg2/vault/testing.go-501-}
##############################################
vault-1.0.2+dfsg2/vault/testing.go-964-	if opts != nil && opts.BaseListenAddress != "" {
vault-1.0.2+dfsg2/vault/testing.go:965:		baseAddr, err = net.ResolveTCPAddr("tcp", opts.BaseListenAddress)
vault-1.0.2+dfsg2/vault/testing.go-966-		if err != nil {
##############################################
vault-1.0.2+dfsg2/vault/testing.go-1135-		}
vault-1.0.2+dfsg2/vault/testing.go:1136:		certFile := filepath.Join(testCluster.TempDir, fmt.Sprintf("node%d_port_%d_cert.pem", i+1, ln.Addr().(*net.TCPAddr).Port))
vault-1.0.2+dfsg2/vault/testing.go:1137:		keyFile := filepath.Join(testCluster.TempDir, fmt.Sprintf("node%d_port_%d_key.pem", i+1, ln.Addr().(*net.TCPAddr).Port))
vault-1.0.2+dfsg2/vault/testing.go-1138-		err = ioutil.WriteFile(certFile, certInfoSlice[i].certPEM, 0755)
##############################################
vault-1.0.2+dfsg2/vault/testing.go-1163-			Listener: tls.NewListener(ln, tlsConfig),
vault-1.0.2+dfsg2/vault/testing.go:1164:			Address:  ln.Addr().(*net.TCPAddr),
vault-1.0.2+dfsg2/vault/testing.go-1165-		},
##############################################
vault-1.0.2+dfsg2/vault/token_store.go-3029-			for _, v := range boundCIDRs {
vault-1.0.2+dfsg2/vault/token_store.go:3030:				parsedCIDR, err := sockaddr.NewSockAddr(v)
vault-1.0.2+dfsg2/vault/token_store.go-3031-				if err != nil {
##############################################
vault-1.0.2+dfsg2/vault/cluster_test.go-119-		for _, ln := range cores[0].Listeners {
vault-1.0.2+dfsg2/vault/cluster_test.go:120:			tcpAddr, ok := ln.Addr().(*net.TCPAddr)
vault-1.0.2+dfsg2/vault/cluster_test.go-121-			if !ok {
##############################################
vault-1.0.2+dfsg2/vendor/github.com/duosecurity/duo_api_golang/authapi/authapi.go-209-
vault-1.0.2+dfsg2/vendor/github.com/duosecurity/duo_api_golang/authapi/authapi.go:210:func PreauthIpAddr(ip string) func(*url.Values) {
vault-1.0.2+dfsg2/vendor/github.com/duosecurity/duo_api_golang/authapi/authapi.go-211-	return func(opts *url.Values) {
##############################################
vault-1.0.2+dfsg2/vendor/github.com/duosecurity/duo_api_golang/authapi/authapi.go-257-
vault-1.0.2+dfsg2/vendor/github.com/duosecurity/duo_api_golang/authapi/authapi.go:258:func AuthIpAddr(ip string) func(*url.Values) {
vault-1.0.2+dfsg2/vendor/github.com/duosecurity/duo_api_golang/authapi/authapi.go-259-	return func(opts *url.Values) {
##############################################
vault-1.0.2+dfsg2/vendor/github.com/hashicorp/vault-plugin-auth-alicloud/README.md-49-Next, clone this repository into
vault-1.0.2+dfsg2/vendor/github.com/hashicorp/vault-plugin-auth-alicloud/README.md:50:`$GOPATH/src/github.com/hashicorp/vault-plugin-auth-alicloud`.
vault-1.0.2+dfsg2/vendor/github.com/hashicorp/vault-plugin-auth-alicloud/README.md-51-You can then download any required build tools by bootstrapping your
##############################################
vault-1.0.2+dfsg2/vendor/github.com/hashicorp/vault-plugin-auth-alicloud/README.md-58-To compile a development version of this plugin, run `make` or `make dev`.
vault-1.0.2+dfsg2/vendor/github.com/hashicorp/vault-plugin-auth-alicloud/README.md:59:This will put the plugin binary in the `bin` and `$GOPATH/bin` folders. `dev`
vault-1.0.2+dfsg2/vendor/github.com/hashicorp/vault-plugin-auth-alicloud/README.md-60-mode will only generate the binary for your platform and is faster:
##############################################
vault-1.0.2+dfsg2/vendor/github.com/hashicorp/vault-plugin-auth-centrify/README.md-105-Next, clone this repository into
vault-1.0.2+dfsg2/vendor/github.com/hashicorp/vault-plugin-auth-centrify/README.md:106:`$GOPATH/src/github.com/hashicorp/vault-plugin-auth-centrify`.
vault-1.0.2+dfsg2/vendor/github.com/hashicorp/vault-plugin-auth-centrify/README.md-107-You can then download any required build tools by bootstrapping your
##############################################
vault-1.0.2+dfsg2/vendor/github.com/hashicorp/vault-plugin-auth-centrify/README.md-114-To compile a development version of this plugin, run `make` or `make dev`.
vault-1.0.2+dfsg2/vendor/github.com/hashicorp/vault-plugin-auth-centrify/README.md:115:This will put the plugin binary in the `bin` and `$GOPATH/bin` folders. `dev`
vault-1.0.2+dfsg2/vendor/github.com/hashicorp/vault-plugin-auth-centrify/README.md-116-mode will only generate the binary for your platform and is faster:
##############################################
vault-1.0.2+dfsg2/vendor/github.com/hashicorp/vault-plugin-auth-kubernetes/README.md-53-Next, clone this repository into
vault-1.0.2+dfsg2/vendor/github.com/hashicorp/vault-plugin-auth-kubernetes/README.md:54:`$GOPATH/src/github.com/hashicorp/vault-plugin-auth-kubernetes`.
vault-1.0.2+dfsg2/vendor/github.com/hashicorp/vault-plugin-auth-kubernetes/README.md-55-You can then download any required build tools by bootstrapping your
##############################################
vault-1.0.2+dfsg2/vendor/github.com/hashicorp/vault-plugin-auth-kubernetes/README.md-62-To compile a development version of this plugin, run `make` or `make dev`.
vault-1.0.2+dfsg2/vendor/github.com/hashicorp/vault-plugin-auth-kubernetes/README.md:63:This will put the plugin binary in the `bin` and `$GOPATH/bin` folders. `dev`
vault-1.0.2+dfsg2/vendor/github.com/hashicorp/vault-plugin-auth-kubernetes/README.md-64-mode will only generate the binary for your platform and is faster:
##############################################
vault-1.0.2+dfsg2/vendor/github.com/hashicorp/vault-plugin-secrets-alicloud/README.md-64-To compile a development version of this plugin, run `make` or `make dev`.
vault-1.0.2+dfsg2/vendor/github.com/hashicorp/vault-plugin-secrets-alicloud/README.md:65:This will put the plugin binary in the `bin` and `$GOPATH/bin` folders. `dev`
vault-1.0.2+dfsg2/vendor/github.com/hashicorp/vault-plugin-secrets-alicloud/README.md-66-mode will only generate the binary for your platform and is faster:
##############################################
vault-1.0.2+dfsg2/vendor/github.com/hashicorp/vault-plugin-secrets-alicloud/README.md-110-
vault-1.0.2+dfsg2/vendor/github.com/hashicorp/vault-plugin-secrets-alicloud/README.md:111:The integration tests are run by `$ make test` and rather than firing real
vault-1.0.2+dfsg2/vendor/github.com/hashicorp/vault-plugin-secrets-alicloud/README.md-112-API calls, they fire API calls at a local test server that returns expected
##############################################
vault-1.0.2+dfsg2/vendor/github.com/hashicorp/vault-plugin-secrets-kv/README.md-47-Next, clone this repository into
vault-1.0.2+dfsg2/vendor/github.com/hashicorp/vault-plugin-secrets-kv/README.md:48:`$GOPATH/src/github.com/hashicorp/vault-plugin-secrets-kv`.
vault-1.0.2+dfsg2/vendor/github.com/hashicorp/vault-plugin-secrets-kv/README.md-49-You can then download any required build tools by bootstrapping your
##############################################
vault-1.0.2+dfsg2/vendor/github.com/hashicorp/vault-plugin-secrets-kv/README.md-56-To compile a development version of this plugin, run `make` or `make dev`.
vault-1.0.2+dfsg2/vendor/github.com/hashicorp/vault-plugin-secrets-kv/README.md:57:This will put the plugin binary in the `bin` and `$GOPATH/bin` folders. `dev`
vault-1.0.2+dfsg2/vendor/github.com/hashicorp/vault-plugin-secrets-kv/README.md-58-mode will only generate the binary for your platform and is faster:
##############################################
vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/apis/meta/v1/generated.proto-49-  // For example: the master will return an internal IP CIDR only, if the client reaches the server using an internal IP.
vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/apis/meta/v1/generated.proto:50:  // Server looks at X-Forwarded-For header or X-Real-Ip header or request.RemoteAddr (in that order) to get the client IP.
vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/apis/meta/v1/generated.proto-51-  // +optional
##############################################
vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/apis/meta/v1/generated.proto-122-  // For example: the master will return an internal IP CIDR only, if the client reaches the server using an internal IP.
vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/apis/meta/v1/generated.proto:123:  // Server looks at X-Forwarded-For header or X-Real-Ip header or request.RemoteAddr (in that order) to get the client IP.
vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/apis/meta/v1/generated.proto-124-  repeated ServerAddressByClientCIDR serverAddressByClientCIDRs = 2;
##############################################
vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/apis/meta/v1/types.go-821-	// For example: the master will return an internal IP CIDR only, if the client reaches the server using an internal IP.
vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/apis/meta/v1/types.go:822:	// Server looks at X-Forwarded-For header or X-Real-Ip header or request.RemoteAddr (in that order) to get the client IP.
vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/apis/meta/v1/types.go-823-	ServerAddressByClientCIDRs []ServerAddressByClientCIDR `json:"serverAddressByClientCIDRs" protobuf:"bytes,2,rep,name=serverAddressByClientCIDRs"`
##############################################
vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/apis/meta/v1/types.go-855-	// For example: the master will return an internal IP CIDR only, if the client reaches the server using an internal IP.
vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/apis/meta/v1/types.go:856:	// Server looks at X-Forwarded-For header or X-Real-Ip header or request.RemoteAddr (in that order) to get the client IP.
vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/apis/meta/v1/types.go-857-	// +optional
##############################################
vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/apis/meta/v1/types_swagger_doc_generated.go-34-	"preferredVersion":           "preferredVersion is the version preferred by the API server, which probably is the storage version.",
vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/apis/meta/v1/types_swagger_doc_generated.go:35:	"serverAddressByClientCIDRs": "a map of client CIDR to server address that is serving this group. This is to help clients reach servers in the most network-efficient way possible. Clients can use the appropriate server address as per the CIDR that they match. In case of multiple matches, clients should use the longest matching CIDR. The server returns only those CIDRs that it thinks that the client can match. For example: the master will return an internal IP CIDR only, if the client reaches the server using an internal IP. Server looks at X-Forwarded-For header or X-Real-Ip header or request.RemoteAddr (in that order) to get the client IP.",
vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/apis/meta/v1/types_swagger_doc_generated.go-36-}
##############################################
vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/apis/meta/v1/types_swagger_doc_generated.go-80-	"versions":                   "versions are the api versions that are available.",
vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/apis/meta/v1/types_swagger_doc_generated.go:81:	"serverAddressByClientCIDRs": "a map of client CIDR to server address that is serving this group. This is to help clients reach servers in the most network-efficient way possible. Clients can use the appropriate server address as per the CIDR that they match. In case of multiple matches, clients should use the longest matching CIDR. The server returns only those CIDRs that it thinks that the client can match. For example: the master will return an internal IP CIDR only, if the client reaches the server using an internal IP. Server looks at X-Forwarded-For header or X-Real-Ip header or request.RemoteAddr (in that order) to get the client IP.",
vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/apis/meta/v1/types_swagger_doc_generated.go-82-}
##############################################
vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/conversion/converter.go-506-	}
vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/conversion/converter.go:507:	if !dv.CanAddr() && !dv.CanSet() {
vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/conversion/converter.go-508-		return fmt.Errorf("can't write to dest")
##############################################
vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/conversion/converter.go-521-func (c *Converter) callCustom(sv, dv, custom reflect.Value, scope *scope) error {
vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/conversion/converter.go:522:	if !sv.CanAddr() {
vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/conversion/converter.go-523-		sv2 := reflect.New(sv.Type())
##############################################
vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/conversion/converter.go-526-	} else {
vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/conversion/converter.go:527:		sv = sv.Addr()
vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/conversion/converter.go-528-	}
vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/conversion/converter.go:529:	if !dv.CanAddr() {
vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/conversion/converter.go-530-		if !dv.CanSet() {
##############################################
vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/conversion/converter.go-536-	} else {
vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/conversion/converter.go:537:		dv = dv.Addr()
vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/conversion/converter.go-538-	}
##############################################
vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/conversion/converter.go-661-			scope.setKeys(sk.Interface(), dk.Interface())
vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/conversion/converter.go:662:			// TODO:  sv.MapIndex(sk) may return a value with CanAddr() == false,
vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/conversion/converter.go-663-			// because a map[string]struct{} does not allow a pointer reference.
##############################################
vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/conversion/queryparams/convert.go-92-	if !ok {
vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/conversion/queryparams/convert.go:93:		if !isPointerKind(value.Kind()) && value.CanAddr() {
vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/conversion/queryparams/convert.go:94:			marshaler, ok = value.Addr().Interface().(Marshaler)
vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/conversion/queryparams/convert.go-95-			if !ok {
##############################################
vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/runtime/converter.go-215-		}
vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/runtime/converter.go:216:		unmarshaler := dv.Addr().Interface().(encodingjson.Unmarshaler)
vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/runtime/converter.go-217-		return unmarshaler.UnmarshalJSON(data)
##############################################
vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/runtime/converter.go-497-	// Check pointer receivers if v is not a pointer
vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/runtime/converter.go:498:	if v.Kind() != reflect.Ptr && v.CanAddr() {
vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/runtime/converter.go:499:		v = v.Addr()
vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/runtime/converter.go-500-		if v.Type().Implements(marshalerType) {
##############################################
vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/runtime/helper.go-101-	}
vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/runtime/helper.go:102:	field = field.Addr()
vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/runtime/helper.go-103-	if field.Type().AssignableTo(v.Type()) {
##############################################
vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/util/validation/validation.go-395-// as defined in RFC 789. (e.g 0.0.0.0:10254 or [::]:10254))
vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/util/validation/validation.go:396:func IsValidSocketAddr(value string) []string {
vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/pkg/util/validation/validation.go-397-	var errs []string
##############################################
vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/third_party/forked/golang/reflect/deep_equal.go-123-
vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/third_party/forked/golang/reflect/deep_equal.go:124:	if v1.CanAddr() && v2.CanAddr() && hard(v1.Kind()) {
vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/third_party/forked/golang/reflect/deep_equal.go:125:		addr1 := v1.UnsafeAddr()
vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/third_party/forked/golang/reflect/deep_equal.go:126:		addr2 := v2.UnsafeAddr()
vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/third_party/forked/golang/reflect/deep_equal.go-127-		if addr1 > addr2 {
##############################################
vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/third_party/forked/golang/reflect/deep_equal.go-266-
vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/third_party/forked/golang/reflect/deep_equal.go:267:	if v1.CanAddr() && v2.CanAddr() && hard(v1.Kind()) {
vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/third_party/forked/golang/reflect/deep_equal.go:268:		addr1 := v1.UnsafeAddr()
vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/third_party/forked/golang/reflect/deep_equal.go:269:		addr2 := v2.UnsafeAddr()
vault-1.0.2+dfsg2/vendor/k8s.io/apimachinery/third_party/forked/golang/reflect/deep_equal.go-270-		if addr1 > addr2 {
##############################################
vault-1.0.2+dfsg2/vendor/layeh.com/radius/attribute.go-70-// returned if the attribute is not 4 bytes long.
vault-1.0.2+dfsg2/vendor/layeh.com/radius/attribute.go:71:func IPAddr(a Attribute) (net.IP, error) {
vault-1.0.2+dfsg2/vendor/layeh.com/radius/attribute.go-72-	if len(a) != net.IPv4len {
##############################################
vault-1.0.2+dfsg2/vendor/layeh.com/radius/attribute.go-81-// returned if the given address is not an IPv4 address.
vault-1.0.2+dfsg2/vendor/layeh.com/radius/attribute.go:82:func NewIPAddr(a net.IP) (Attribute, error) {
vault-1.0.2+dfsg2/vendor/layeh.com/radius/attribute.go-83-	a = a.To4()
##############################################
vault-1.0.2+dfsg2/vendor/layeh.com/radius/attribute.go-93-// returned if the attribute is not 16 bytes long.
vault-1.0.2+dfsg2/vendor/layeh.com/radius/attribute.go:94:func IPv6Addr(a Attribute) (net.IP, error) {
vault-1.0.2+dfsg2/vendor/layeh.com/radius/attribute.go-95-	if len(a) != net.IPv6len {
##############################################
vault-1.0.2+dfsg2/vendor/layeh.com/radius/attribute.go-104-// returned if the given address is not an IPv6 address.
vault-1.0.2+dfsg2/vendor/layeh.com/radius/attribute.go:105:func NewIPv6Addr(a net.IP) (Attribute, error) {
vault-1.0.2+dfsg2/vendor/layeh.com/radius/attribute.go-106-	a = a.To16()
##############################################
vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go-359-	var a radius.Attribute
vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go:360:	a, err = radius.NewIPAddr(value)
vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go-361-	if err != nil {
##############################################
vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go-375-	for _, attr := range p.Attributes[NASIPAddress_Type] {
vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go:376:		i, err = radius.IPAddr(attr)
vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go-377-		if err != nil {
##############################################
vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go-390-	}
vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go:391:	value, err = radius.IPAddr(a)
vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go-392-	return
##############################################
vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go-396-	var a radius.Attribute
vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go:397:	a, err = radius.NewIPAddr(value)
vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go-398-	if err != nil {
##############################################
vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go-629-	var a radius.Attribute
vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go:630:	a, err = radius.NewIPAddr(value)
vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go-631-	if err != nil {
##############################################
vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go-645-	for _, attr := range p.Attributes[FramedIPAddress_Type] {
vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go:646:		i, err = radius.IPAddr(attr)
vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go-647-		if err != nil {
##############################################
vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go-660-	}
vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go:661:	value, err = radius.IPAddr(a)
vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go-662-	return
##############################################
vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go-666-	var a radius.Attribute
vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go:667:	a, err = radius.NewIPAddr(value)
vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go-668-	if err != nil {
##############################################
vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go-680-	var a radius.Attribute
vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go:681:	a, err = radius.NewIPAddr(value)
vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go-682-	if err != nil {
##############################################
vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go-696-	for _, attr := range p.Attributes[FramedIPNetmask_Type] {
vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go:697:		i, err = radius.IPAddr(attr)
vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go-698-		if err != nil {
##############################################
vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go-711-	}
vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go:712:	value, err = radius.IPAddr(a)
vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go-713-	return
##############################################
vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go-717-	var a radius.Attribute
vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go:718:	a, err = radius.NewIPAddr(value)
vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go-719-	if err != nil {
##############################################
vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go-1030-	var a radius.Attribute
vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go:1031:	a, err = radius.NewIPAddr(value)
vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go-1032-	if err != nil {
##############################################
vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go-1046-	for _, attr := range p.Attributes[LoginIPHost_Type] {
vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go:1047:		i, err = radius.IPAddr(attr)
vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go-1048-		if err != nil {
##############################################
vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go-1061-	}
vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go:1062:	value, err = radius.IPAddr(a)
vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go-1063-	return
##############################################
vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go-1067-	var a radius.Attribute
vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go:1068:	a, err = radius.NewIPAddr(value)
vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go-1069-	if err != nil {
##############################################
vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go-1621-	var a radius.Attribute
vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go:1622:	a, err = radius.NewIPAddr(value)
vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go-1623-	if err != nil {
##############################################
vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go-1637-	for _, attr := range p.Attributes[FramedIPXNetwork_Type] {
vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go:1638:		i, err = radius.IPAddr(attr)
vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go-1639-		if err != nil {
##############################################
vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go-1652-	}
vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go:1653:	value, err = radius.IPAddr(a)
vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go-1654-	return
##############################################
vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go-1658-	var a radius.Attribute
vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go:1659:	a, err = radius.NewIPAddr(value)
vault-1.0.2+dfsg2/vendor/layeh.com/radius/rfc2865/generated.go-1660-	if err != nil {
##############################################
vault-1.0.2+dfsg2/vendor/layeh.com/radius/server-packet.go-176-			request := Request{
vault-1.0.2+dfsg2/vendor/layeh.com/radius/server-packet.go:177:				LocalAddr:  conn.LocalAddr(),
vault-1.0.2+dfsg2/vendor/layeh.com/radius/server-packet.go-178-				RemoteAddr: remoteAddr,
##############################################
vault-1.0.2+dfsg2/website/assets/app.js-7-/* eslint-disable-next-line */
vault-1.0.2+dfsg2/website/assets/app.js:8:console.log(`Building assets for environment *${process.env.NODE_ENV}*`)
vault-1.0.2+dfsg2/website/assets/app.js-9-
##############################################
vault-1.0.2+dfsg2/website/assets/app.js-27-  /* eslint-disable-next-line */
vault-1.0.2+dfsg2/website/assets/app.js:28:  console.log(`utilServerUrl=${utilServerUrl}`)
vault-1.0.2+dfsg2/website/assets/app.js-29-}
##############################################
vault-1.0.2+dfsg2/website/assets/js/analytics.js-68-      return {
vault-1.0.2+dfsg2/website/assets/js/analytics.js:69:        event: `Outbound Link | ${window.location.pathname}`,
vault-1.0.2+dfsg2/website/assets/js/analytics.js-70-        category: 'Outbound link',
##############################################
vault-1.0.2+dfsg2/website/assets/js/utils.js-10-    res[name] = []
vault-1.0.2+dfsg2/website/assets/js/utils.js:11:    each(document.querySelectorAll(`.g-${name}`), el => {
vault-1.0.2+dfsg2/website/assets/js/utils.js-12-      // do not initialize nested components
##############################################
vault-1.0.2+dfsg2/website/assets/js/utils.js-15-        .reduce((m, name) => {
vault-1.0.2+dfsg2/website/assets/js/utils.js:16:          const parent = findParent(el, `.g-${name}`)
vault-1.0.2+dfsg2/website/assets/js/utils.js-17-          if (parent) m.push(parent)
##############################################
vault-1.0.2+dfsg2/website/assets/js/utils.js-26-      const vdom = hydrateInitialState(el.dataset.state, {
vault-1.0.2+dfsg2/website/assets/js/utils.js:27:        [`hashi-${name}`]: obj[k]
vault-1.0.2+dfsg2/website/assets/js/utils.js-28-      })
##############################################
vault-1.0.2+dfsg2/website/source/api/auth/gcp/index.html.md-158-   generated under this token will have associated group aliases, namely
vault-1.0.2+dfsg2/website/source/api/auth/gcp/index.html.md:159:   `project-$PROJECT_ID`, `folder-$PROJECT_ID`, and `organization-$ORG_ID`
vault-1.0.2+dfsg2/website/source/api/auth/gcp/index.html.md-160-   for the entities project and all its folder or organization ancestors. This
##############################################
vault-1.0.2+dfsg2/website/source/api/secret/gcp/index.html.md-270-Generates an OAuth2 token with the scopes defined on the roleset. This OAuth access token can
vault-1.0.2+dfsg2/website/source/api/secret/gcp/index.html.md:271:be used in GCP API calls, e.g. `curl -H "Authorization: Bearer $TOKEN" ...`
vault-1.0.2+dfsg2/website/source/api/secret/gcp/index.html.md-272-
##############################################
vault-1.0.2+dfsg2/website/source/docs/auth/alicloud.html.md-101-```
vault-1.0.2+dfsg2/website/source/docs/auth/alicloud.html.md:102:Please note the `$ROLE_NAME` above is case-sensitive and must be consistent with how it's reflected
vault-1.0.2+dfsg2/website/source/docs/auth/alicloud.html.md-103-on the instance.
##############################################
vault-1.0.2+dfsg2/website/source/docs/auth/ldap.html.md-174-* Server does not allow anonymous binds for performing user search.
vault-1.0.2+dfsg2/website/source/docs/auth/ldap.html.md:175:* Bind account used for searching is `cn=vault,ou=users,dc=example,dc=com` with password `My$ecrt3tP4ss`.
vault-1.0.2+dfsg2/website/source/docs/auth/ldap.html.md-176-* User objects are under the `ou=Users,dc-example,dc=com` organizational unit.
##############################################
vault-1.0.2+dfsg2/website/source/docs/internals/plugins.html.md-22-the plugin's code or navigate to the Vault version holding the version of the
vault-1.0.2+dfsg2/website/source/docs/internals/plugins.html.md:23:plugin you desire. Then, you'd `$ cd` into the `cmd/:plugin-name` directory
vault-1.0.2+dfsg2/website/source/docs/internals/plugins.html.md-24-contained alongside that plugin's code. For instance, for AppRole, you would:
vault-1.0.2+dfsg2/website/source/docs/internals/plugins.html.md:25:`$ cd vault/builtin/credential/approle/cmd/approle`. Once in that directory,
vault-1.0.2+dfsg2/website/source/docs/internals/plugins.html.md:26:you would run `$ go build` to obtain a new binary for the AppRole plugin. Then
vault-1.0.2+dfsg2/website/source/docs/internals/plugins.html.md-27-you would add it to the plugin catalog as per normal, and enable it.
##############################################
vault-1.0.2+dfsg2/website/source/docs/secrets/ad/index.html.md-91-
vault-1.0.2+dfsg2/website/source/docs/secrets/ad/index.html.md:92:    The `$USERNAME` and `$PASSWORD` given must have access to modify passwords
vault-1.0.2+dfsg2/website/source/docs/secrets/ad/index.html.md-93-    for the given account. It is possible to delegate access to change
##############################################
vault-1.0.2+dfsg2/website/source/docs/secrets/gcp/index.html.md-476-  attributes when reading responses for the access tokens secrets endpoint (i.e.
vault-1.0.2+dfsg2/website/source/docs/secrets/gcp/index.html.md:477:  from `gcp/token/$roleset`). See the [documentation for access
vault-1.0.2+dfsg2/website/source/docs/secrets/gcp/index.html.md-478-  tokens](#access-tokens) to see the new format for the response.
##############################################
vault-1.0.2+dfsg2/website/source/intro/getting-started/apis.html.md-90-To make this guide easy to copy-and-paste, we will be using the environment
vault-1.0.2+dfsg2/website/source/intro/getting-started/apis.html.md:91:variable `$VAULT_TOKEN` to store the root token. You can export this Vault
vault-1.0.2+dfsg2/website/source/intro/getting-started/apis.html.md-92-token in your current shell like this:
##############################################
vault-1.0.2+dfsg2/debian/rules-18-	## Remove Files-Excluded (when built from checkout or non-DFSG tarball):
vault-1.0.2+dfsg2/debian/rules:19:	$(RM) -rv `perl -0nE 'say $$1 if m{^Files\-Excluded\:\s*(.*?)(?:\n\n|Files:|Comment:)}sm;' debian/copyright`
vault-1.0.2+dfsg2/debian/rules-20-#	-find . -type f -name '*.pb.go' -delete -printf 'removed %p\n'            ## delete generated .pb.go files
##############################################
vault-1.0.2+dfsg2/.pc/t-skip-tests.patch/logical/framework/openapi_test.go-60-	t.Run("Alternation", func(t *testing.T) {
vault-1.0.2+dfsg2/.pc/t-skip-tests.patch/logical/framework/openapi_test.go:61:		input := `(raw/?$|raw/(?P<path>.+))`
vault-1.0.2+dfsg2/.pc/t-skip-tests.patch/logical/framework/openapi_test.go-62-
##############################################
vault-1.0.2+dfsg2/.pc/t-skip-tests.patch/logical/framework/openapi_test.go-113-			{
vault-1.0.2+dfsg2/.pc/t-skip-tests.patch/logical/framework/openapi_test.go:114:				input:  `ab?cde^fg(hi?j$k`,
vault-1.0.2+dfsg2/.pc/t-skip-tests.patch/logical/framework/openapi_test.go-115-				regex:  cleanCharsRe,
##############################################
vault-1.0.2+dfsg2/.pc/t-skip-tests.patch/logical/framework/openapi_test.go-173-		}},
vault-1.0.2+dfsg2/.pc/t-skip-tests.patch/logical/framework/openapi_test.go:174:		{`(raw/?$|raw/(?P<path>.+))`, []string{
vault-1.0.2+dfsg2/.pc/t-skip-tests.patch/logical/framework/openapi_test.go-175-			"raw",
##############################################
vault-1.0.2+dfsg2/.pc/t-skip-tests.patch/vault/cluster_test.go-118-		for _, ln := range cores[0].Listeners {
vault-1.0.2+dfsg2/.pc/t-skip-tests.patch/vault/cluster_test.go:119:			tcpAddr, ok := ln.Addr().(*net.TCPAddr)
vault-1.0.2+dfsg2/.pc/t-skip-tests.patch/vault/cluster_test.go-120-			if !ok {