forked from TrueCloudLab/frostfs-s3-gw
[#131] authmate: Make authmate use cobra
Signed-off-by: Denis Kirillov <d.kirillov@yadro.com>
This commit is contained in:
parent
f74ab12f91
commit
0cd353707a
5 changed files with 68 additions and 746 deletions
|
@ -107,7 +107,6 @@ type (
|
||||||
Lifetime time.Duration
|
Lifetime time.Duration
|
||||||
AwsCliCredentialsFile string
|
AwsCliCredentialsFile string
|
||||||
ContainerPolicies ContainerPolicies
|
ContainerPolicies ContainerPolicies
|
||||||
UpdateCreds *UpdateOptions
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// UpdateSecretOptions contains options for passing to Agent.UpdateSecret method.
|
// UpdateSecretOptions contains options for passing to Agent.UpdateSecret method.
|
||||||
|
|
|
@ -2,758 +2,19 @@ package main
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"context"
|
"context"
|
||||||
"crypto/ecdsa"
|
|
||||||
"encoding/hex"
|
|
||||||
"encoding/json"
|
|
||||||
"fmt"
|
|
||||||
"os"
|
"os"
|
||||||
"os/signal"
|
"os/signal"
|
||||||
"runtime"
|
|
||||||
"strings"
|
|
||||||
"syscall"
|
"syscall"
|
||||||
"time"
|
|
||||||
|
|
||||||
"git.frostfs.info/TrueCloudLab/frostfs-s3-gw/api"
|
"git.frostfs.info/TrueCloudLab/frostfs-s3-gw/cmd/s3-authmate/modules"
|
||||||
"git.frostfs.info/TrueCloudLab/frostfs-s3-gw/api/auth"
|
|
||||||
"git.frostfs.info/TrueCloudLab/frostfs-s3-gw/authmate"
|
|
||||||
"git.frostfs.info/TrueCloudLab/frostfs-s3-gw/internal/frostfs"
|
|
||||||
"git.frostfs.info/TrueCloudLab/frostfs-s3-gw/internal/version"
|
|
||||||
"git.frostfs.info/TrueCloudLab/frostfs-s3-gw/internal/wallet"
|
|
||||||
cid "git.frostfs.info/TrueCloudLab/frostfs-sdk-go/container/id"
|
|
||||||
oid "git.frostfs.info/TrueCloudLab/frostfs-sdk-go/object/id"
|
|
||||||
"git.frostfs.info/TrueCloudLab/frostfs-sdk-go/pool"
|
|
||||||
"github.com/aws/aws-sdk-go/aws"
|
|
||||||
"github.com/aws/aws-sdk-go/aws/credentials"
|
|
||||||
"github.com/aws/aws-sdk-go/aws/session"
|
|
||||||
"github.com/nspcc-dev/neo-go/pkg/crypto/keys"
|
|
||||||
"github.com/spf13/viper"
|
|
||||||
"github.com/urfave/cli/v2"
|
|
||||||
"go.uber.org/zap"
|
|
||||||
"go.uber.org/zap/zapcore"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
const (
|
|
||||||
poolDialTimeout = 5 * time.Second
|
|
||||||
poolHealthcheckTimeout = 5 * time.Second
|
|
||||||
poolRebalanceInterval = 30 * time.Second
|
|
||||||
poolStreamTimeout = 10 * time.Second
|
|
||||||
|
|
||||||
// a month.
|
|
||||||
defaultLifetime = 30 * 24 * time.Hour
|
|
||||||
defaultPresignedLifetime = 12 * time.Hour
|
|
||||||
)
|
|
||||||
|
|
||||||
type PoolConfig struct {
|
|
||||||
Key *ecdsa.PrivateKey
|
|
||||||
Address string
|
|
||||||
DialTimeout time.Duration
|
|
||||||
HealthcheckTimeout time.Duration
|
|
||||||
StreamTimeout time.Duration
|
|
||||||
RebalanceInterval time.Duration
|
|
||||||
}
|
|
||||||
|
|
||||||
var (
|
|
||||||
walletPathFlag string
|
|
||||||
accountAddressFlag string
|
|
||||||
peerAddressFlag string
|
|
||||||
eaclRulesFlag string
|
|
||||||
disableImpersonateFlag bool
|
|
||||||
gateWalletPathFlag string
|
|
||||||
gateAccountAddressFlag string
|
|
||||||
accessKeyIDFlag string
|
|
||||||
containerIDFlag string
|
|
||||||
containerFriendlyName string
|
|
||||||
containerPlacementPolicy string
|
|
||||||
gatesPublicKeysFlag cli.StringSlice
|
|
||||||
logEnabledFlag bool
|
|
||||||
logDebugEnabledFlag bool
|
|
||||||
sessionTokenFlag string
|
|
||||||
lifetimeFlag time.Duration
|
|
||||||
endpointFlag string
|
|
||||||
bucketFlag string
|
|
||||||
objectFlag string
|
|
||||||
methodFlag string
|
|
||||||
profileFlag string
|
|
||||||
regionFlag string
|
|
||||||
secretAccessKeyFlag string
|
|
||||||
containerPolicies string
|
|
||||||
awcCliCredFile string
|
|
||||||
timeoutFlag time.Duration
|
|
||||||
|
|
||||||
// pool timeouts flag.
|
|
||||||
poolDialTimeoutFlag time.Duration
|
|
||||||
poolHealthcheckTimeoutFlag time.Duration
|
|
||||||
poolRebalanceIntervalFlag time.Duration
|
|
||||||
poolStreamTimeoutFlag time.Duration
|
|
||||||
)
|
|
||||||
|
|
||||||
const (
|
|
||||||
envWalletPassphrase = "wallet.passphrase"
|
|
||||||
envWalletGatePassphrase = "wallet.gate.passphrase"
|
|
||||||
envSecretAccessKey = "secret.access.key"
|
|
||||||
)
|
|
||||||
|
|
||||||
var zapConfig = zap.Config{
|
|
||||||
Development: true,
|
|
||||||
Encoding: "console",
|
|
||||||
Level: zap.NewAtomicLevelAt(zapcore.FatalLevel),
|
|
||||||
OutputPaths: []string{"stdout"},
|
|
||||||
EncoderConfig: zapcore.EncoderConfig{
|
|
||||||
MessageKey: "message",
|
|
||||||
LevelKey: "level",
|
|
||||||
EncodeLevel: zapcore.CapitalLevelEncoder,
|
|
||||||
TimeKey: "time",
|
|
||||||
EncodeTime: zapcore.ISO8601TimeEncoder,
|
|
||||||
CallerKey: "caller",
|
|
||||||
EncodeCaller: zapcore.ShortCallerEncoder,
|
|
||||||
},
|
|
||||||
}
|
|
||||||
|
|
||||||
func prepare() (context.Context, *zap.Logger) {
|
|
||||||
var (
|
|
||||||
err error
|
|
||||||
log = zap.NewNop()
|
|
||||||
ctx, _ = signal.NotifyContext(context.Background(), syscall.SIGINT, syscall.SIGTERM, syscall.SIGHUP)
|
|
||||||
)
|
|
||||||
|
|
||||||
if !logEnabledFlag {
|
|
||||||
return ctx, log
|
|
||||||
} else if logDebugEnabledFlag {
|
|
||||||
zapConfig.Level = zap.NewAtomicLevelAt(zapcore.DebugLevel)
|
|
||||||
}
|
|
||||||
|
|
||||||
if log, err = zapConfig.Build(); err != nil {
|
|
||||||
panic(fmt.Errorf("create logger: %w", err))
|
|
||||||
}
|
|
||||||
|
|
||||||
return ctx, log
|
|
||||||
}
|
|
||||||
|
|
||||||
func main() {
|
func main() {
|
||||||
app := &cli.App{
|
ctx, _ := signal.NotifyContext(context.Background(), syscall.SIGINT, syscall.SIGTERM, syscall.SIGHUP)
|
||||||
Name: "FrostFS S3 Authmate",
|
|
||||||
Usage: "Helps manage delegated access via gates to data stored in FrostFS network",
|
|
||||||
Version: version.Version,
|
|
||||||
Flags: appFlags(),
|
|
||||||
Commands: appCommands(),
|
|
||||||
}
|
|
||||||
cli.VersionPrinter = func(c *cli.Context) {
|
|
||||||
fmt.Printf("%s\nVersion: %s\nGoVersion: %s\n", c.App.Name, c.App.Version, runtime.Version())
|
|
||||||
}
|
|
||||||
|
|
||||||
viper.AutomaticEnv()
|
if cmd, err := modules.Execute(ctx); err != nil {
|
||||||
viper.SetEnvPrefix("AUTHMATE")
|
cmd.PrintErrln("Error:", err.Error())
|
||||||
viper.SetEnvKeyReplacer(strings.NewReplacer(".", "_"))
|
cmd.PrintErrf("Run '%v --help' for usage.\n", cmd.CommandPath())
|
||||||
viper.AllowEmptyEnv(true)
|
os.Exit(1)
|
||||||
|
|
||||||
if err := app.Run(os.Args); err != nil {
|
|
||||||
_, _ = fmt.Fprintf(os.Stderr, "error: %s\n", err)
|
|
||||||
os.Exit(100)
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func appFlags() []cli.Flag {
|
|
||||||
return []cli.Flag{
|
|
||||||
&cli.BoolFlag{
|
|
||||||
Name: "with-log",
|
|
||||||
Usage: "Enable logger",
|
|
||||||
Destination: &logEnabledFlag,
|
|
||||||
},
|
|
||||||
&cli.BoolFlag{
|
|
||||||
Name: "debug",
|
|
||||||
Usage: "Enable debug logger level",
|
|
||||||
Destination: &logDebugEnabledFlag,
|
|
||||||
},
|
|
||||||
&cli.DurationFlag{
|
|
||||||
Name: "timeout",
|
|
||||||
Usage: "timeout of processing of the command, for example 2m " +
|
|
||||||
"(note: max time unit is an hour so to set a day you should use 24h)",
|
|
||||||
Destination: &timeoutFlag,
|
|
||||||
Value: 1 * time.Minute,
|
|
||||||
},
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func appCommands() []*cli.Command {
|
|
||||||
return []*cli.Command{
|
|
||||||
issueSecret(),
|
|
||||||
obtainSecret(),
|
|
||||||
generatePresignedURL(),
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func issueSecret() *cli.Command {
|
|
||||||
return &cli.Command{
|
|
||||||
Name: "issue-secret",
|
|
||||||
Usage: "Issue a secret in FrostFS network",
|
|
||||||
Flags: []cli.Flag{
|
|
||||||
&cli.StringFlag{
|
|
||||||
Name: "wallet",
|
|
||||||
Value: "",
|
|
||||||
Usage: "path to the wallet",
|
|
||||||
Required: true,
|
|
||||||
Destination: &walletPathFlag,
|
|
||||||
},
|
|
||||||
&cli.StringFlag{
|
|
||||||
Name: "address",
|
|
||||||
Value: "",
|
|
||||||
Usage: "address of wallet account",
|
|
||||||
Required: false,
|
|
||||||
Destination: &accountAddressFlag,
|
|
||||||
},
|
|
||||||
&cli.StringFlag{
|
|
||||||
Name: "peer",
|
|
||||||
Value: "",
|
|
||||||
Usage: "address of a frostfs peer to connect to",
|
|
||||||
Required: true,
|
|
||||||
Destination: &peerAddressFlag,
|
|
||||||
},
|
|
||||||
&cli.StringFlag{
|
|
||||||
Name: "bearer-rules",
|
|
||||||
Usage: "rules for bearer token (filepath or a plain json string are allowed, can be used only with --disable-impersonate)",
|
|
||||||
Required: false,
|
|
||||||
Destination: &eaclRulesFlag,
|
|
||||||
},
|
|
||||||
&cli.BoolFlag{
|
|
||||||
Name: "disable-impersonate",
|
|
||||||
Usage: "mark token as not impersonate to don't consider token signer as request owner (must be provided to use --bearer-rules flag)",
|
|
||||||
Required: false,
|
|
||||||
Destination: &disableImpersonateFlag,
|
|
||||||
},
|
|
||||||
&cli.StringSliceFlag{
|
|
||||||
Name: "gate-public-key",
|
|
||||||
Usage: "public 256r1 key of a gate (use flags repeatedly for multiple gates)",
|
|
||||||
Required: true,
|
|
||||||
Destination: &gatesPublicKeysFlag,
|
|
||||||
},
|
|
||||||
&cli.StringFlag{
|
|
||||||
Name: "container-id",
|
|
||||||
Usage: "auth container id to put the secret into",
|
|
||||||
Required: false,
|
|
||||||
Destination: &containerIDFlag,
|
|
||||||
},
|
|
||||||
&cli.StringFlag{
|
|
||||||
Name: "access-key-id",
|
|
||||||
Usage: "access key id for s3 (use this flag to update existing creds, if this flag is provided '--container-id', '--container-friendly-name' and '--container-placement-policy' are ineffective)",
|
|
||||||
Required: false,
|
|
||||||
Destination: &accessKeyIDFlag,
|
|
||||||
},
|
|
||||||
&cli.StringFlag{
|
|
||||||
Name: "container-friendly-name",
|
|
||||||
Usage: "friendly name of auth container to put the secret into",
|
|
||||||
Required: false,
|
|
||||||
Destination: &containerFriendlyName,
|
|
||||||
},
|
|
||||||
&cli.StringFlag{
|
|
||||||
Name: "container-placement-policy",
|
|
||||||
Usage: "placement policy of auth container to put the secret into",
|
|
||||||
Required: false,
|
|
||||||
Destination: &containerPlacementPolicy,
|
|
||||||
Value: "REP 2 IN X CBF 3 SELECT 2 FROM * AS X",
|
|
||||||
},
|
|
||||||
&cli.StringFlag{
|
|
||||||
Name: "session-tokens",
|
|
||||||
Usage: "create session tokens with rules, if the rules are set as 'none', no session tokens will be created",
|
|
||||||
Required: false,
|
|
||||||
Destination: &sessionTokenFlag,
|
|
||||||
Value: "",
|
|
||||||
},
|
|
||||||
&cli.DurationFlag{
|
|
||||||
Name: "lifetime",
|
|
||||||
Usage: `Lifetime of tokens. For example 50h30m (note: max time unit is an hour so to set a day you should use 24h).
|
|
||||||
It will be ceil rounded to the nearest amount of epoch.`,
|
|
||||||
Required: false,
|
|
||||||
Destination: &lifetimeFlag,
|
|
||||||
Value: defaultLifetime,
|
|
||||||
},
|
|
||||||
&cli.StringFlag{
|
|
||||||
Name: "container-policy",
|
|
||||||
Usage: "mapping AWS storage class to FrostFS storage policy as plain json string or path to json file",
|
|
||||||
Required: false,
|
|
||||||
Destination: &containerPolicies,
|
|
||||||
},
|
|
||||||
&cli.StringFlag{
|
|
||||||
Name: "aws-cli-credentials",
|
|
||||||
Usage: "path to the aws cli credential file",
|
|
||||||
Required: false,
|
|
||||||
Destination: &awcCliCredFile,
|
|
||||||
},
|
|
||||||
&cli.DurationFlag{
|
|
||||||
Name: "pool-dial-timeout",
|
|
||||||
Usage: `Timeout for connection to the node in pool to be established`,
|
|
||||||
Required: false,
|
|
||||||
Destination: &poolDialTimeoutFlag,
|
|
||||||
Value: poolDialTimeout,
|
|
||||||
},
|
|
||||||
&cli.DurationFlag{
|
|
||||||
Name: "pool-healthcheck-timeout",
|
|
||||||
Usage: `Timeout for request to node to decide if it is alive`,
|
|
||||||
Required: false,
|
|
||||||
Destination: &poolHealthcheckTimeoutFlag,
|
|
||||||
Value: poolHealthcheckTimeout,
|
|
||||||
},
|
|
||||||
&cli.DurationFlag{
|
|
||||||
Name: "pool-rebalance-interval",
|
|
||||||
Usage: `Interval for updating nodes health status`,
|
|
||||||
Required: false,
|
|
||||||
Destination: &poolRebalanceIntervalFlag,
|
|
||||||
Value: poolRebalanceInterval,
|
|
||||||
},
|
|
||||||
&cli.DurationFlag{
|
|
||||||
Name: "pool-stream-timeout",
|
|
||||||
Usage: `Timeout for individual operation in streaming RPC`,
|
|
||||||
Required: false,
|
|
||||||
Destination: &poolStreamTimeoutFlag,
|
|
||||||
Value: poolStreamTimeout,
|
|
||||||
},
|
|
||||||
},
|
|
||||||
Action: func(c *cli.Context) error {
|
|
||||||
ctx, log := prepare()
|
|
||||||
|
|
||||||
password := wallet.GetPassword(viper.GetViper(), envWalletPassphrase)
|
|
||||||
key, err := wallet.GetKeyFromPath(walletPathFlag, accountAddressFlag, password)
|
|
||||||
if err != nil {
|
|
||||||
return cli.Exit(fmt.Sprintf("failed to load frostfs private key: %s", err), 1)
|
|
||||||
}
|
|
||||||
|
|
||||||
ctx, cancel := context.WithCancel(ctx)
|
|
||||||
defer cancel()
|
|
||||||
|
|
||||||
poolCfg := PoolConfig{
|
|
||||||
Key: &key.PrivateKey,
|
|
||||||
Address: peerAddressFlag,
|
|
||||||
DialTimeout: poolDialTimeoutFlag,
|
|
||||||
HealthcheckTimeout: poolHealthcheckTimeoutFlag,
|
|
||||||
StreamTimeout: poolStreamTimeoutFlag,
|
|
||||||
RebalanceInterval: poolRebalanceIntervalFlag,
|
|
||||||
}
|
|
||||||
|
|
||||||
frostFS, err := createFrostFS(ctx, log, poolCfg)
|
|
||||||
if err != nil {
|
|
||||||
return cli.Exit(fmt.Sprintf("failed to create FrostFS component: %s", err), 2)
|
|
||||||
}
|
|
||||||
|
|
||||||
agent := authmate.New(log, frostFS)
|
|
||||||
|
|
||||||
var containerID cid.ID
|
|
||||||
if len(containerIDFlag) > 0 {
|
|
||||||
if err = containerID.DecodeString(containerIDFlag); err != nil {
|
|
||||||
return cli.Exit(fmt.Sprintf("failed to parse auth container id: %s", err), 3)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
var credsToUpdate *authmate.UpdateOptions
|
|
||||||
if len(accessKeyIDFlag) > 0 {
|
|
||||||
secretAccessKeyStr := wallet.GetPassword(viper.GetViper(), envSecretAccessKey)
|
|
||||||
if secretAccessKeyStr == nil {
|
|
||||||
return fmt.Errorf("you must provide AUTHMATE_SECRET_ACCESS_KEY env to update existing creds")
|
|
||||||
}
|
|
||||||
|
|
||||||
secretAccessKey, err := hex.DecodeString(*secretAccessKeyStr)
|
|
||||||
if err != nil {
|
|
||||||
return fmt.Errorf("access key must be hex encoded")
|
|
||||||
}
|
|
||||||
|
|
||||||
var addr oid.Address
|
|
||||||
credAddr := strings.Replace(accessKeyIDFlag, "0", "/", 1)
|
|
||||||
if err = addr.DecodeString(credAddr); err != nil {
|
|
||||||
return fmt.Errorf("failed to parse creds address: %w", err)
|
|
||||||
}
|
|
||||||
// we can create new creds version only in the same container
|
|
||||||
containerID = addr.Container()
|
|
||||||
|
|
||||||
credsToUpdate = &authmate.UpdateOptions{
|
|
||||||
Address: addr,
|
|
||||||
SecretAccessKey: secretAccessKey,
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
var gatesPublicKeys []*keys.PublicKey
|
|
||||||
for _, key := range gatesPublicKeysFlag.Value() {
|
|
||||||
gpk, err := keys.NewPublicKeyFromString(key)
|
|
||||||
if err != nil {
|
|
||||||
return cli.Exit(fmt.Sprintf("failed to load gate's public key: %s", err), 4)
|
|
||||||
}
|
|
||||||
gatesPublicKeys = append(gatesPublicKeys, gpk)
|
|
||||||
}
|
|
||||||
|
|
||||||
if lifetimeFlag <= 0 {
|
|
||||||
return cli.Exit(fmt.Sprintf("lifetime must be greater 0, current value: %d", lifetimeFlag), 5)
|
|
||||||
}
|
|
||||||
|
|
||||||
policies, err := parsePolicies(containerPolicies)
|
|
||||||
if err != nil {
|
|
||||||
return cli.Exit(fmt.Sprintf("couldn't parse container policy: %s", err.Error()), 6)
|
|
||||||
}
|
|
||||||
|
|
||||||
if !disableImpersonateFlag && eaclRulesFlag != "" {
|
|
||||||
return cli.Exit("--bearer-rules flag can be used only with --disable-impersonate", 6)
|
|
||||||
}
|
|
||||||
|
|
||||||
bearerRules, err := getJSONRules(eaclRulesFlag)
|
|
||||||
if err != nil {
|
|
||||||
return cli.Exit(fmt.Sprintf("couldn't parse 'bearer-rules' flag: %s", err.Error()), 7)
|
|
||||||
}
|
|
||||||
|
|
||||||
sessionRules, skipSessionRules, err := getSessionRules(sessionTokenFlag)
|
|
||||||
if err != nil {
|
|
||||||
return cli.Exit(fmt.Sprintf("couldn't parse 'session-tokens' flag: %s", err.Error()), 8)
|
|
||||||
}
|
|
||||||
|
|
||||||
issueSecretOptions := &authmate.IssueSecretOptions{
|
|
||||||
Container: authmate.ContainerOptions{
|
|
||||||
ID: containerID,
|
|
||||||
FriendlyName: containerFriendlyName,
|
|
||||||
PlacementPolicy: containerPlacementPolicy,
|
|
||||||
},
|
|
||||||
FrostFSKey: key,
|
|
||||||
GatesPublicKeys: gatesPublicKeys,
|
|
||||||
EACLRules: bearerRules,
|
|
||||||
Impersonate: !disableImpersonateFlag,
|
|
||||||
SessionTokenRules: sessionRules,
|
|
||||||
SkipSessionRules: skipSessionRules,
|
|
||||||
ContainerPolicies: policies,
|
|
||||||
Lifetime: lifetimeFlag,
|
|
||||||
AwsCliCredentialsFile: awcCliCredFile,
|
|
||||||
UpdateCreds: credsToUpdate,
|
|
||||||
}
|
|
||||||
|
|
||||||
var tcancel context.CancelFunc
|
|
||||||
ctx, tcancel = context.WithTimeout(ctx, timeoutFlag)
|
|
||||||
defer tcancel()
|
|
||||||
|
|
||||||
if err = agent.IssueSecret(ctx, os.Stdout, issueSecretOptions); err != nil {
|
|
||||||
return cli.Exit(fmt.Sprintf("failed to issue secret: %s", err), 7)
|
|
||||||
}
|
|
||||||
return nil
|
|
||||||
},
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func generatePresignedURL() *cli.Command {
|
|
||||||
return &cli.Command{
|
|
||||||
Name: "generate-presigned-url",
|
|
||||||
Description: `Generate presigned url using AWS credentials. Credentials must be placed in ~/.aws/credentials.
|
|
||||||
You provide profile to load using --profile flag or explicitly provide credentials and region using
|
|
||||||
--aws-access-key-id, --aws-secret-access-key, --region.
|
|
||||||
Note to override credentials you must provide both access key and secret key.`,
|
|
||||||
Usage: "generate-presigned-url --endpoint http://s3.frostfs.devenv:8080 --bucket bucket-name --object object-name --method get --profile aws-profile",
|
|
||||||
Flags: []cli.Flag{
|
|
||||||
&cli.DurationFlag{
|
|
||||||
Name: "lifetime",
|
|
||||||
Usage: `Lifetime of presigned URL. For example 50h30m (note: max time unit is an hour so to set a day you should use 24h).
|
|
||||||
It will be ceil rounded to the nearest amount of epoch.`,
|
|
||||||
Required: false,
|
|
||||||
Destination: &lifetimeFlag,
|
|
||||||
Value: defaultPresignedLifetime,
|
|
||||||
},
|
|
||||||
&cli.StringFlag{
|
|
||||||
Name: "endpoint",
|
|
||||||
Usage: `Endpoint of s3-gw`,
|
|
||||||
Required: true,
|
|
||||||
Destination: &endpointFlag,
|
|
||||||
},
|
|
||||||
&cli.StringFlag{
|
|
||||||
Name: "bucket",
|
|
||||||
Usage: `Bucket name to perform action`,
|
|
||||||
Required: true,
|
|
||||||
Destination: &bucketFlag,
|
|
||||||
},
|
|
||||||
&cli.StringFlag{
|
|
||||||
Name: "object",
|
|
||||||
Usage: `Object name to perform action`,
|
|
||||||
Required: true,
|
|
||||||
Destination: &objectFlag,
|
|
||||||
},
|
|
||||||
&cli.StringFlag{
|
|
||||||
Name: "method",
|
|
||||||
Usage: `HTTP method to perform action`,
|
|
||||||
Required: true,
|
|
||||||
Destination: &methodFlag,
|
|
||||||
},
|
|
||||||
&cli.StringFlag{
|
|
||||||
Name: "profile",
|
|
||||||
Usage: `AWS profile to load`,
|
|
||||||
Required: false,
|
|
||||||
Destination: &profileFlag,
|
|
||||||
},
|
|
||||||
&cli.StringFlag{
|
|
||||||
Name: "region",
|
|
||||||
Usage: `AWS region to use in signature (default is taken from ~/.aws/config)`,
|
|
||||||
Required: false,
|
|
||||||
Destination: ®ionFlag,
|
|
||||||
},
|
|
||||||
&cli.StringFlag{
|
|
||||||
Name: "aws-access-key-id",
|
|
||||||
Usage: `AWS access key id to sign the URL (default is taken from ~/.aws/credentials)`,
|
|
||||||
Required: false,
|
|
||||||
Destination: &accessKeyIDFlag,
|
|
||||||
},
|
|
||||||
&cli.StringFlag{
|
|
||||||
Name: "aws-secret-access-key",
|
|
||||||
Usage: `AWS access secret access key to sign the URL (default is taken from ~/.aws/credentials)`,
|
|
||||||
Required: false,
|
|
||||||
Destination: &secretAccessKeyFlag,
|
|
||||||
},
|
|
||||||
},
|
|
||||||
Action: func(c *cli.Context) error {
|
|
||||||
var cfg aws.Config
|
|
||||||
if regionFlag != "" {
|
|
||||||
cfg.Region = ®ionFlag
|
|
||||||
}
|
|
||||||
if accessKeyIDFlag != "" && secretAccessKeyFlag != "" {
|
|
||||||
cfg.Credentials = credentials.NewStaticCredentialsFromCreds(credentials.Value{
|
|
||||||
AccessKeyID: accessKeyIDFlag,
|
|
||||||
SecretAccessKey: secretAccessKeyFlag,
|
|
||||||
})
|
|
||||||
}
|
|
||||||
|
|
||||||
sess, err := session.NewSessionWithOptions(session.Options{
|
|
||||||
Config: cfg,
|
|
||||||
Profile: profileFlag,
|
|
||||||
SharedConfigState: session.SharedConfigEnable,
|
|
||||||
})
|
|
||||||
if err != nil {
|
|
||||||
return fmt.Errorf("couldn't get credentials: %w", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
reqData := auth.RequestData{
|
|
||||||
Method: methodFlag,
|
|
||||||
Endpoint: endpointFlag,
|
|
||||||
Bucket: bucketFlag,
|
|
||||||
Object: objectFlag,
|
|
||||||
}
|
|
||||||
presignData := auth.PresignData{
|
|
||||||
Service: "s3",
|
|
||||||
Region: *sess.Config.Region,
|
|
||||||
Lifetime: lifetimeFlag,
|
|
||||||
SignTime: time.Now().UTC(),
|
|
||||||
}
|
|
||||||
|
|
||||||
req, err := auth.PresignRequest(sess.Config.Credentials, reqData, presignData)
|
|
||||||
if err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
|
|
||||||
res := &struct{ URL string }{
|
|
||||||
URL: req.URL.String(),
|
|
||||||
}
|
|
||||||
|
|
||||||
enc := json.NewEncoder(os.Stdout)
|
|
||||||
enc.SetIndent("", " ")
|
|
||||||
enc.SetEscapeHTML(false)
|
|
||||||
return enc.Encode(res)
|
|
||||||
},
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func parsePolicies(val string) (authmate.ContainerPolicies, error) {
|
|
||||||
if val == "" {
|
|
||||||
return nil, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
var (
|
|
||||||
data = []byte(val)
|
|
||||||
err error
|
|
||||||
)
|
|
||||||
|
|
||||||
if !json.Valid(data) {
|
|
||||||
if data, err = os.ReadFile(val); err != nil {
|
|
||||||
return nil, fmt.Errorf("coudln't read json file or provided json is invalid")
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
var policies authmate.ContainerPolicies
|
|
||||||
if err = json.Unmarshal(data, &policies); err != nil {
|
|
||||||
return nil, fmt.Errorf("unmarshal policies: %w", err)
|
|
||||||
}
|
|
||||||
if _, ok := policies[api.DefaultLocationConstraint]; ok {
|
|
||||||
return nil, fmt.Errorf("config overrides %s location constraint", api.DefaultLocationConstraint)
|
|
||||||
}
|
|
||||||
|
|
||||||
return policies, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
func getJSONRules(val string) ([]byte, error) {
|
|
||||||
if val == "" {
|
|
||||||
return nil, nil
|
|
||||||
}
|
|
||||||
data := []byte(val)
|
|
||||||
if json.Valid(data) {
|
|
||||||
return data, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
if data, err := os.ReadFile(val); err == nil {
|
|
||||||
if json.Valid(data) {
|
|
||||||
return data, nil
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return nil, fmt.Errorf("coudln't read json file or provided json is invalid")
|
|
||||||
}
|
|
||||||
|
|
||||||
// getSessionRules reads json session rules.
|
|
||||||
// It returns true if rules must be skipped.
|
|
||||||
func getSessionRules(r string) ([]byte, bool, error) {
|
|
||||||
if r == "none" {
|
|
||||||
return nil, true, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
data, err := getJSONRules(r)
|
|
||||||
return data, false, err
|
|
||||||
}
|
|
||||||
|
|
||||||
func obtainSecret() *cli.Command {
|
|
||||||
command := &cli.Command{
|
|
||||||
Name: "obtain-secret",
|
|
||||||
Usage: "Obtain a secret from FrostFS network",
|
|
||||||
Flags: []cli.Flag{
|
|
||||||
&cli.StringFlag{
|
|
||||||
Name: "wallet",
|
|
||||||
Value: "",
|
|
||||||
Usage: "path to the wallet",
|
|
||||||
Required: true,
|
|
||||||
Destination: &walletPathFlag,
|
|
||||||
},
|
|
||||||
&cli.StringFlag{
|
|
||||||
Name: "address",
|
|
||||||
Value: "",
|
|
||||||
Usage: "address of wallet account",
|
|
||||||
Required: false,
|
|
||||||
Destination: &accountAddressFlag,
|
|
||||||
},
|
|
||||||
&cli.StringFlag{
|
|
||||||
Name: "peer",
|
|
||||||
Value: "",
|
|
||||||
Usage: "address of frostfs peer to connect to",
|
|
||||||
Required: true,
|
|
||||||
Destination: &peerAddressFlag,
|
|
||||||
},
|
|
||||||
&cli.StringFlag{
|
|
||||||
Name: "gate-wallet",
|
|
||||||
Value: "",
|
|
||||||
Usage: "path to the wallet",
|
|
||||||
Required: true,
|
|
||||||
Destination: &gateWalletPathFlag,
|
|
||||||
},
|
|
||||||
&cli.StringFlag{
|
|
||||||
Name: "gate-address",
|
|
||||||
Value: "",
|
|
||||||
Usage: "address of wallet account",
|
|
||||||
Required: false,
|
|
||||||
Destination: &gateAccountAddressFlag,
|
|
||||||
},
|
|
||||||
&cli.StringFlag{
|
|
||||||
Name: "access-key-id",
|
|
||||||
Usage: "access key id for s3",
|
|
||||||
Required: true,
|
|
||||||
Destination: &accessKeyIDFlag,
|
|
||||||
},
|
|
||||||
&cli.DurationFlag{
|
|
||||||
Name: "pool-dial-timeout",
|
|
||||||
Usage: `Timeout for connection to the node in pool to be established`,
|
|
||||||
Required: false,
|
|
||||||
Destination: &poolDialTimeoutFlag,
|
|
||||||
Value: poolDialTimeout,
|
|
||||||
},
|
|
||||||
&cli.DurationFlag{
|
|
||||||
Name: "pool-healthcheck-timeout",
|
|
||||||
Usage: `Timeout for request to node to decide if it is alive`,
|
|
||||||
Required: false,
|
|
||||||
Destination: &poolHealthcheckTimeoutFlag,
|
|
||||||
Value: poolHealthcheckTimeout,
|
|
||||||
},
|
|
||||||
&cli.DurationFlag{
|
|
||||||
Name: "pool-rebalance-interval",
|
|
||||||
Usage: `Interval for updating nodes health status`,
|
|
||||||
Required: false,
|
|
||||||
Destination: &poolRebalanceIntervalFlag,
|
|
||||||
Value: poolRebalanceInterval,
|
|
||||||
},
|
|
||||||
&cli.DurationFlag{
|
|
||||||
Name: "pool-stream-timeout",
|
|
||||||
Usage: `Timeout for individual operation in streaming RPC`,
|
|
||||||
Required: false,
|
|
||||||
Destination: &poolStreamTimeoutFlag,
|
|
||||||
Value: poolStreamTimeout,
|
|
||||||
},
|
|
||||||
},
|
|
||||||
Action: func(c *cli.Context) error {
|
|
||||||
ctx, log := prepare()
|
|
||||||
|
|
||||||
password := wallet.GetPassword(viper.GetViper(), envWalletPassphrase)
|
|
||||||
key, err := wallet.GetKeyFromPath(walletPathFlag, accountAddressFlag, password)
|
|
||||||
if err != nil {
|
|
||||||
return cli.Exit(fmt.Sprintf("failed to load frostfs private key: %s", err), 1)
|
|
||||||
}
|
|
||||||
|
|
||||||
ctx, cancel := context.WithCancel(ctx)
|
|
||||||
defer cancel()
|
|
||||||
|
|
||||||
poolCfg := PoolConfig{
|
|
||||||
Key: &key.PrivateKey,
|
|
||||||
Address: peerAddressFlag,
|
|
||||||
DialTimeout: poolDialTimeoutFlag,
|
|
||||||
HealthcheckTimeout: poolHealthcheckTimeoutFlag,
|
|
||||||
StreamTimeout: poolStreamTimeoutFlag,
|
|
||||||
RebalanceInterval: poolRebalanceIntervalFlag,
|
|
||||||
}
|
|
||||||
|
|
||||||
frostFS, err := createFrostFS(ctx, log, poolCfg)
|
|
||||||
if err != nil {
|
|
||||||
return cli.Exit(fmt.Sprintf("failed to create FrostFS component: %s", err), 2)
|
|
||||||
}
|
|
||||||
|
|
||||||
agent := authmate.New(log, frostFS)
|
|
||||||
|
|
||||||
var _ = agent
|
|
||||||
|
|
||||||
password = wallet.GetPassword(viper.GetViper(), envWalletGatePassphrase)
|
|
||||||
gateCreds, err := wallet.GetKeyFromPath(gateWalletPathFlag, gateAccountAddressFlag, password)
|
|
||||||
if err != nil {
|
|
||||||
return cli.Exit(fmt.Sprintf("failed to create owner's private key: %s", err), 4)
|
|
||||||
}
|
|
||||||
|
|
||||||
secretAddress := strings.Replace(accessKeyIDFlag, "0", "/", 1)
|
|
||||||
|
|
||||||
obtainSecretOptions := &authmate.ObtainSecretOptions{
|
|
||||||
SecretAddress: secretAddress,
|
|
||||||
GatePrivateKey: gateCreds,
|
|
||||||
}
|
|
||||||
|
|
||||||
var tcancel context.CancelFunc
|
|
||||||
ctx, tcancel = context.WithTimeout(ctx, timeoutFlag)
|
|
||||||
defer tcancel()
|
|
||||||
|
|
||||||
if err = agent.ObtainSecret(ctx, os.Stdout, obtainSecretOptions); err != nil {
|
|
||||||
return cli.Exit(fmt.Sprintf("failed to obtain secret: %s", err), 5)
|
|
||||||
}
|
|
||||||
|
|
||||||
return nil
|
|
||||||
},
|
|
||||||
}
|
|
||||||
return command
|
|
||||||
}
|
|
||||||
|
|
||||||
func createFrostFS(ctx context.Context, log *zap.Logger, cfg PoolConfig) (authmate.FrostFS, error) {
|
|
||||||
log.Debug("prepare connection pool")
|
|
||||||
|
|
||||||
var prm pool.InitParameters
|
|
||||||
prm.SetKey(cfg.Key)
|
|
||||||
prm.SetNodeDialTimeout(cfg.DialTimeout)
|
|
||||||
prm.SetHealthcheckTimeout(cfg.HealthcheckTimeout)
|
|
||||||
prm.SetNodeStreamTimeout(cfg.StreamTimeout)
|
|
||||||
prm.SetClientRebalanceInterval(cfg.RebalanceInterval)
|
|
||||||
prm.AddNode(pool.NewNodeParam(1, cfg.Address, 1))
|
|
||||||
|
|
||||||
p, err := pool.NewPool(prm)
|
|
||||||
if err != nil {
|
|
||||||
return nil, fmt.Errorf("create pool: %w", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
if err = p.Dial(ctx); err != nil {
|
|
||||||
return nil, fmt.Errorf("dial pool: %w", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
return frostfs.NewAuthmateFrostFS(p), nil
|
|
||||||
}
|
|
||||||
|
|
56
cmd/s3-authmate/modules/root.go
Normal file
56
cmd/s3-authmate/modules/root.go
Normal file
|
@ -0,0 +1,56 @@
|
||||||
|
package modules
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
"runtime"
|
||||||
|
"strings"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"git.frostfs.info/TrueCloudLab/frostfs-s3-gw/internal/version"
|
||||||
|
"github.com/spf13/cobra"
|
||||||
|
"github.com/spf13/viper"
|
||||||
|
)
|
||||||
|
|
||||||
|
// rootCmd represents the base command when called without any subcommands.
|
||||||
|
var rootCmd = &cobra.Command{
|
||||||
|
Use: "frostfs-s3-authmate",
|
||||||
|
Version: version.Version,
|
||||||
|
Short: "FrostFS S3 Authmate",
|
||||||
|
Long: "Helps manage delegated access via gates to data stored in FrostFS network",
|
||||||
|
Example: "frostfs-s3-authmate --version",
|
||||||
|
SilenceErrors: true,
|
||||||
|
SilenceUsage: true,
|
||||||
|
PersistentPreRunE: func(cmd *cobra.Command, _ []string) error {
|
||||||
|
viper.AutomaticEnv()
|
||||||
|
viper.SetEnvPrefix("AUTHMATE")
|
||||||
|
viper.SetEnvKeyReplacer(strings.NewReplacer(".", "_"))
|
||||||
|
viper.AllowEmptyEnv(true)
|
||||||
|
|
||||||
|
return viper.BindPFlags(cmd.Flags())
|
||||||
|
},
|
||||||
|
RunE: func(cmd *cobra.Command, _ []string) error {
|
||||||
|
return cmd.Help()
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
const (
|
||||||
|
withLogFlag = "with-log"
|
||||||
|
debugFlag = "debug"
|
||||||
|
timeoutFlag = "timeout"
|
||||||
|
)
|
||||||
|
|
||||||
|
func Execute(ctx context.Context) (*cobra.Command, error) {
|
||||||
|
return rootCmd.ExecuteContextC(ctx)
|
||||||
|
}
|
||||||
|
|
||||||
|
func init() {
|
||||||
|
rootCmd.PersistentFlags().Bool(withLogFlag, false, "Enable logger")
|
||||||
|
rootCmd.PersistentFlags().Bool(debugFlag, false, "Enable debug logger level")
|
||||||
|
rootCmd.PersistentFlags().Duration(timeoutFlag, time.Minute, "Timeout of processing of the command, for example 2m (note: max time unit is an hour so to set a day you should use 24h)")
|
||||||
|
|
||||||
|
cobra.AddTemplateFunc("runtimeVersion", runtime.Version)
|
||||||
|
rootCmd.SetVersionTemplate(`Frostfs S3 Authmate
|
||||||
|
{{printf "Version: %s" .Version }}
|
||||||
|
GoVersion: {{ runtimeVersion }}
|
||||||
|
`)
|
||||||
|
}
|
2
go.mod
2
go.mod
|
@ -16,6 +16,7 @@ require (
|
||||||
github.com/panjf2000/ants/v2 v2.5.0
|
github.com/panjf2000/ants/v2 v2.5.0
|
||||||
github.com/prometheus/client_golang v1.15.1
|
github.com/prometheus/client_golang v1.15.1
|
||||||
github.com/prometheus/client_model v0.3.0
|
github.com/prometheus/client_model v0.3.0
|
||||||
|
github.com/spf13/cobra v1.7.0
|
||||||
github.com/spf13/pflag v1.0.5
|
github.com/spf13/pflag v1.0.5
|
||||||
github.com/spf13/viper v1.15.0
|
github.com/spf13/viper v1.15.0
|
||||||
github.com/stretchr/testify v1.8.3
|
github.com/stretchr/testify v1.8.3
|
||||||
|
@ -52,6 +53,7 @@ require (
|
||||||
github.com/hashicorp/golang-lru v0.6.0 // indirect
|
github.com/hashicorp/golang-lru v0.6.0 // indirect
|
||||||
github.com/hashicorp/golang-lru/v2 v2.0.2 // indirect
|
github.com/hashicorp/golang-lru/v2 v2.0.2 // indirect
|
||||||
github.com/hashicorp/hcl v1.0.0 // indirect
|
github.com/hashicorp/hcl v1.0.0 // indirect
|
||||||
|
github.com/inconshreveable/mousetrap v1.1.0 // indirect
|
||||||
github.com/jmespath/go-jmespath v0.4.0 // indirect
|
github.com/jmespath/go-jmespath v0.4.0 // indirect
|
||||||
github.com/magiconair/properties v1.8.7 // indirect
|
github.com/magiconair/properties v1.8.7 // indirect
|
||||||
github.com/matttproud/golang_protobuf_extensions v1.0.4 // indirect
|
github.com/matttproud/golang_protobuf_extensions v1.0.4 // indirect
|
||||||
|
|
4
go.sum
4
go.sum
|
@ -264,6 +264,8 @@ github.com/holiman/uint256 v1.2.0/go.mod h1:y4ga/t+u+Xwd7CpDgZESaRcWy0I7XMlTMA25
|
||||||
github.com/hpcloud/tail v1.0.0/go.mod h1:ab1qPbhIpdTxEkNHXyeSf5vhxWSCs/tWer42PpOxQnU=
|
github.com/hpcloud/tail v1.0.0/go.mod h1:ab1qPbhIpdTxEkNHXyeSf5vhxWSCs/tWer42PpOxQnU=
|
||||||
github.com/ianlancetaylor/demangle v0.0.0-20181102032728-5e5cf60278f6/go.mod h1:aSSvb/t6k1mPoxDqO4vJh6VOCGPwU4O0C2/Eqndh1Sc=
|
github.com/ianlancetaylor/demangle v0.0.0-20181102032728-5e5cf60278f6/go.mod h1:aSSvb/t6k1mPoxDqO4vJh6VOCGPwU4O0C2/Eqndh1Sc=
|
||||||
github.com/ianlancetaylor/demangle v0.0.0-20200824232613-28f6c0f3b639/go.mod h1:aSSvb/t6k1mPoxDqO4vJh6VOCGPwU4O0C2/Eqndh1Sc=
|
github.com/ianlancetaylor/demangle v0.0.0-20200824232613-28f6c0f3b639/go.mod h1:aSSvb/t6k1mPoxDqO4vJh6VOCGPwU4O0C2/Eqndh1Sc=
|
||||||
|
github.com/inconshreveable/mousetrap v1.1.0 h1:wN+x4NVGpMsO7ErUn/mUI3vEoE6Jt13X2s0bqwp9tc8=
|
||||||
|
github.com/inconshreveable/mousetrap v1.1.0/go.mod h1:vpF70FUmC8bwa3OWnCshd2FqLfsEA9PFc4w1p2J65bw=
|
||||||
github.com/jessevdk/go-flags v0.0.0-20141203071132-1679536dcc89/go.mod h1:4FA24M0QyGHXBuZZK/XkWh8h0e1EYbRYJSGM75WSRxI=
|
github.com/jessevdk/go-flags v0.0.0-20141203071132-1679536dcc89/go.mod h1:4FA24M0QyGHXBuZZK/XkWh8h0e1EYbRYJSGM75WSRxI=
|
||||||
github.com/jessevdk/go-flags v1.4.0/go.mod h1:4FA24M0QyGHXBuZZK/XkWh8h0e1EYbRYJSGM75WSRxI=
|
github.com/jessevdk/go-flags v1.4.0/go.mod h1:4FA24M0QyGHXBuZZK/XkWh8h0e1EYbRYJSGM75WSRxI=
|
||||||
github.com/jmespath/go-jmespath v0.4.0 h1:BEgLn5cpjn8UN1mAw4NjwDrS35OdebyEtFe+9YPoQUg=
|
github.com/jmespath/go-jmespath v0.4.0 h1:BEgLn5cpjn8UN1mAw4NjwDrS35OdebyEtFe+9YPoQUg=
|
||||||
|
@ -433,6 +435,8 @@ github.com/spf13/afero v1.9.3 h1:41FoI0fD7OR7mGcKE/aOiLkGreyf8ifIOQmJANWogMk=
|
||||||
github.com/spf13/afero v1.9.3/go.mod h1:iUV7ddyEEZPO5gA3zD4fJt6iStLlL+Lg4m2cihcDf8Y=
|
github.com/spf13/afero v1.9.3/go.mod h1:iUV7ddyEEZPO5gA3zD4fJt6iStLlL+Lg4m2cihcDf8Y=
|
||||||
github.com/spf13/cast v1.5.0 h1:rj3WzYc11XZaIZMPKmwP96zkFEnnAmV8s6XbB2aY32w=
|
github.com/spf13/cast v1.5.0 h1:rj3WzYc11XZaIZMPKmwP96zkFEnnAmV8s6XbB2aY32w=
|
||||||
github.com/spf13/cast v1.5.0/go.mod h1:SpXXQ5YoyJw6s3/6cMTQuxvgRl3PCJiyaX9p6b155UU=
|
github.com/spf13/cast v1.5.0/go.mod h1:SpXXQ5YoyJw6s3/6cMTQuxvgRl3PCJiyaX9p6b155UU=
|
||||||
|
github.com/spf13/cobra v1.7.0 h1:hyqWnYt1ZQShIddO5kBpj3vu05/++x6tJ6dg8EC572I=
|
||||||
|
github.com/spf13/cobra v1.7.0/go.mod h1:uLxZILRyS/50WlhOIKD7W6V5bgeIt+4sICxh6uRMrb0=
|
||||||
github.com/spf13/jwalterweatherman v1.1.0 h1:ue6voC5bR5F8YxI5S67j9i582FU4Qvo2bmqnqMYADFk=
|
github.com/spf13/jwalterweatherman v1.1.0 h1:ue6voC5bR5F8YxI5S67j9i582FU4Qvo2bmqnqMYADFk=
|
||||||
github.com/spf13/jwalterweatherman v1.1.0/go.mod h1:aNWZUN0dPAAO/Ljvb5BEdw96iTZ0EXowPYD95IqWIGo=
|
github.com/spf13/jwalterweatherman v1.1.0/go.mod h1:aNWZUN0dPAAO/Ljvb5BEdw96iTZ0EXowPYD95IqWIGo=
|
||||||
github.com/spf13/pflag v1.0.5 h1:iy+VFUOCP1a+8yFto/drg2CJ5u0yRoB7fZw3DKv/JXA=
|
github.com/spf13/pflag v1.0.5 h1:iy+VFUOCP1a+8yFto/drg2CJ5u0yRoB7fZw3DKv/JXA=
|
||||||
|
|
Loading…
Reference in a new issue