Git Product home page Git Product logo

treasury's Introduction

Go Report Card

treasury

Treasury is a very simple tool for managing secrets. It uses Amazon S3 or SSM (Systems Manager Parameter Store) service to store secrets. By default, Treasury uses SSM as a backend. The secrets are encrypted before saving them on disks in Amazon data centers and decrypted when being read. Treasury uses Server-Side Encryption with AWS KMS-Managed Keys (SSE-KMS).

Architecture

Architecture overwiev

Command Line interface (CLI)

Treasury is controlled via a very easy to use command-line interface (CLI). Treasury is only a single command-line application: treasury. This application takes a subcommand such as "read", "write", "import" or "export".

The Treasury CLI is a well-behaved command line application. In erroneous cases, a non-zero exit status will be returned. It also responds to -h and --help as you'd most likely expect.

To view a list of the available commands at any time, just run treasury with no arguments. To get help for any specific subcommand, run the subcommand with the -h argument.

Configuration

AWS Credentials

Before using the Treasury CLI, ensure that you've configured AWS credentials. The best way to configure credentials on your machine is to use the ~/.aws/credentials file, which might look like:

[default]
aws_access_key_id = AKID1234567890
aws_secret_access_key = MY-SECRET-KEY

Alternatively, you can set the following environment variables:

AWS_ACCESS_KEY_ID=AKID1234567890
AWS_SECRET_ACCESS_KEY=MY-SECRET-KEY

You can also use non-default awscli profile:

AWS_PROFILE=development treasury read development/webapp/cockpit_api_pass`

And non-default awscli profile without default region:

AWS_PROFILE=development ./treasury --region eu-west-1 read test/webapp/cockpit_pass`

SSM store configuration

Treasury uses SSM store by default. No additional configuration is required.

S3 store configuration

In order to use S3 as a store, set TREASURY_S3 environment variable with S3 bucket name.

For example:

export TREASURY_S3=ah-dev-treasury-development

In order to use SSM as a store, unset previously configured TREASURY_S3 environment variable.

AWS Region configuration

In addition to the IAM credentials you'll need to specify the AWS region. You can specify the region either with an environment variable (example below), or directly in AWS configuration file $HOME/.aws/config. More about configuration here.

export AWS_DEFAULT_REGION=eu-west-1

Installation

on OSX:

brew tap airhelp/taps [email protected]:AirHelp/homebrew-taps.git
brew update
brew install treasury

CLI Usage

Write secret

> treasury write development/webapp/cockpit_api_pass superSecretPassword
Success! Data written to: development/webapp/cockpit_api_pass

Note: if secret value is equal to existing one, write is skipped. --force flag can be used to overwrite.

Write file content

> treasury write development/webapp/credentials_yaml <filename> --file
Success! Data written to: development/webapp/credentials_yaml

Note: if secret value is equal to existing one, write is skipped. --force flag can be used to overwrite. Stored file content in key is gzipped and converted to base64. You can decode it with bash script easily:

> treasury read  development/webapp/credentials_yaml | base64 -D | gzip -d > creadentails.yaml

or you can handle it with your application. Size limit depends on backend that you are using - for AWS SSM size limit is 4096 bytes (after gzip and base64).

Read secret

> treasury read development/webapp/cockpit_api_pass
superSecretPassword

List secrets

List the secrets set for a path

> treasury list development/application/
development/application/app_api_pass
development/application/test

Delete secret

Delete the secret from treasury

> treasury delete development/application/secret_key
Key development/application/secret_key has been successfully deleted

Import secrets

Assuming properties file ./secrets.env with content:

ke1=secret1
key2=secret2

To import these values into a previously configured store:

> treasury import development/application/ ./secrets.env
Import successful

Export secrets

Assuming stored secrets pairs on treasury store

development/webapp/key1 => superSecretPassword1
development/webapp/key2 => superSecretPassword2

To see exported values:

> treasury export development/webapp/
export key1=superSecretPassword1
export key2=superSecretPassword2

To export them into shell environment variables:

eval $(treasury export development/webapp/)

Teamplate usage

Render the template on disk at /tmp/template.tpl to /tmp/result:

treasury template --src /tmp/template.tpl --dst /tmp/result

Treasury parses file in the Go Template format. The input text for a template is UTF-8-encoded text in any format. "Actions"--data evaluations or control structures--are delimited by "{{" and "}}"; all text outside actions is copied to the output unchanged.

Template usage with string append to secret value

treasury template --src /tmp/template.tpl --dst /tmp/result --append key1:v2

This command ends up with output file where the value of variable key1 has a string "v2" appended.

Template usage with variables interpolation

Example template:

APPNAME={{ .AppName }}
API_PASSWORD={{ .ApiPassword }}
treasury template --src /tmp/template.tpl --dst /tmp/result.env --env AppName=test,ApiPassword=qwerty12345

Supported actions:

read

DEPRECATED (please use readFromEnv) Returns single value for given key

{{ read "ENVIRONMENT/APPLICATION/SECRET_NAME" }}

Example:

COCKPIT_API_PASSWORD={{ read "production/cockpit/cockpit_api_password" }}

readFromEnv

Returns single value for given key in specified environment

{{ readFromEnv "ENVIRONMENT" "APPLICATION/SECRET_NAME" }}

# example using interpolation:

{{ readFromEnv .Environment "app/API_PASSWORD" }}

export

DEPRECATED (please use exportFromEnv) Returns all values for a given path in key=value format

{{ export "development/treasury/" }}

will generate:

key1=secret1
key2=secret2
key3=secret3
key4=secret4

exportFromEnv

Returns all values from given environment and given key in key=value format

{{ exportFromEnv "development" "treasury" }}

# or using interpolation

{{ exportFromEnv .Environment "treasury" }}

will generate:

key1=secret1
key2=secret2
key3=secret3
key4=secret4

exportMap

Returns all values for a given path in Go map structure

{{ range $key, $value := exportMap "development/treasury/" }} {{ $key }}: {{ $value }}{{ end }}

will generate:

key1: secret1
key2: secret2
key3: secret3
key4: secret4

Setting up the infrastructure

IAM Policy for S3 store

  • Read and Write policy for test/test/* and test/cockpit/* keys
{
    "Version": "2012-10-17",
    "Statement": [
        {
            "Sid": "Stmt1491319766000",
            "Effect": "Allow",
            "Action": [
                "kms:Encrypt",
                "kms:Decrypt",
                "kms:ListAliases",
                "kms:ListKeys",
                "kms:GenerateDataKey*"
            ],
            "Resource": [
                "arn:aws:kms:eu-west-1:064764542321:key/14b4a163-6c9d-4edb-a4bf-5adc4cd50ad8"
            ]
        },
        {
            "Effect": "Allow",
            "Action": [
                "s3:ListBucket"
            ],
            "Resource": [
                "arn:aws:s3:::TREASURY_S3_BUCKET_NAME"
            ]
        },
        {
            "Sid": "Stmt1491319793000",
            "Effect": "Allow",
            "Action": [
                "s3:PutObject*",
                "s3:GetObject*",
                "s3:DeleteObject*"
            ],
            "Resource": [
                "arn:aws:s3:::TREASURY_S3_BUCKET_NAME/test/test/*",
                "arn:aws:s3:::TREASURY_S3_BUCKET_NAME/test/cockpit/*"
            ]
        }
    ]
}
  • Read only policy for test/* keys
{
    "Version": "2012-10-17",
    "Statement": [
        {
            "Sid": "Stmt1491319766000",
            "Effect": "Allow",
            "Action": [
                "kms:Decrypt",
                "kms:ListAliases",
                "kms:ListKeys",
            ],
            "Resource": [
                "arn:aws:kms:eu-west-1:064764542321:key/14b4a163-6c9d-4edb-a4bf-5adc4cd50ad8"
            ]
        },
        {
            "Effect": "Allow",
            "Action": [
                "s3:ListBucket"
            ],
            "Resource": [
                "arn:aws:s3:::TREASURY_S3_BUCKET_NAME"
            ]
        },
        {
            "Sid": "Stmt1491319793000",
            "Effect": "Allow",
            "Action": [
                "s3:GetObject*"
            ],
            "Resource": [
                "arn:aws:s3:::TREASURY_S3_BUCKET_NAME/test/*"
            ]
        }
    ]
}
  • Example AWS S3 Bucket Policy

The following bucket policy denies upload object (s3:PutObject) permission to everyone if the request does not include the x-amz-server-side-encryption header requesting server-side encryption with SSE-KMS.

{
  "Version": "2012-10-17",
  "Id": "PutObjPolicy",
  "Statement": [
    {
      "Sid": "DenyIncorrectEncryptionHeader",
      "Effect": "Deny",
      "Principal": "*",
      "Action": "s3:PutObject",
      "Resource": "arn:aws:s3:::TREASURY_S3_BUCKET_NAME/*",
      "Condition": {
        "StringNotEquals": {
          "s3:x-amz-server-side-encryption": "aws:kms"
        }
      }
    },
    {
      "Sid": "DenyUnEncryptedObjectUploads",
      "Effect": "Deny",
      "Principal": "*",
      "Action": "s3:PutObject",
      "Resource": "arn:aws:s3:::TREASURY_S3_BUCKET_NAME/*",
      "Condition": {
        "Null": {
          "s3:x-amz-server-side-encryption": true
        }
      }
    }
  ]
}

IAM Policy for SSM Store

  • Read only policy for development/cockpit/* keys
{
  "Version": "2012-10-17",
  "Statement": [
      {
          "Effect": "Allow",
          "Action": [
              "ssm:DescribeParameters",
              "ssm:GetParameterHistory",
              "ssm:ListTagsForResource"
          ],
          "Resource": "*"
      },
      {
          "Effect": "Allow",
          "Action": [
              "ssm:GetParameter*"
          ],
          "Resource": [
              "arn:aws:ssm:eu-west-1:064764542321:parameter/development/cockpit/*"
          ]
      },
      {
          "Effect": "Allow",
          "Action": [
              "kms:Decrypt"
          ],
          "Resource": [
              "arn:aws:kms:eu-west-1:064764542321:key/14b4a163-6c9d-4edb-a4bf-5adc4cd50ad8"
          ]
      }
  ]
}
  • Read and Write policy for /development/application/* keys
{
    "Version": "2012-10-17",
    "Statement": [
        {
            "Effect": "Allow",
            "Action": [
                "ssm:DescribeParameters",
                "ssm:GetParameterHistory",
                "ssm:ListTagsForResource"
            ],
            "Resource": "*"
        },
        {
            "Effect": "Allow",
            "Action": [
                "ssm:GetParameter*",
                "ssm:PutParameter",
                "ssm:DeleteParameter"
            ],
            "Resource": [
                "arn:aws:ssm:eu-west-1:064764542321:parameter/development/application/*"
            ]
        },
        {
            "Effect": "Allow",
            "Action": [
                "kms:Encrypt",
                "kms:Decrypt",
                "kms:GenerateDataKey*"
            ],
            "Resource": [
                "arn:aws:kms:eu-west-1:064764542321:key/14b4a163-6c9d-4edb-a4bf-5adc4cd50ad8"
            ]
        }
    ]
}

Treasury as a user vault

You can now use the treasure as a user vault with minimal policy change. Including the following statement in the default policy allows users to manage their secrets.

  statement {
    actions = [
      "ssm:*",
    ]

    resources = [
      "arn:aws:ssm::${var.aws_account_id}:parameter/user/$${aws:username}",
      "arn:aws:ssm::${var.aws_account_id}:parameter/user/$${aws:username}/*",
    ]
  }
  • Write user/marcin.janas/phone
$ treasury write write user/firstname.lastname/phone +48987654321
Success! Data written to:  user/firstname.lastname/phone
  • Read user/firstname.lastname/phone
$ treasury write read user/firstname.lastname/phone
+48987654321

Go Client

Example for S3 as a store:

import "github.com/AirHelp/treasury/client"

// use default client options
treasury, err := client.New(&client.Options{
    Backend: "s3",
    S3BucketName: TREASURY_S3_BUCKET_NAME,
})
secret, err := treasury.Read(key)
if err != nil {
  return err
}

fmt.Println(secret.Value)

TREASURY_S3_BUCKET_NAME is a S3 bucket name dedicated for treasury use.

Example for SSM as a store:

import "github.com/AirHelp/treasury/client"

// use default client options
treasury, err := client.New(&client.Options{
    Backend: "ssm",
})
secret, err := treasury.Read(key)
if err != nil {
  return err
}

fmt.Println(secret.Value)

** TO DO: add terraform resource **

Development

Build for development

make build

Tests

Go tests

make test

Bats tests

AWS_PROFILE=development make testall

If bats missing, install it:

brew install bats

treasury's People

Contributors

dependabot-preview[bot] avatar dependabot[bot] avatar jadrol avatar jazzbee avatar jmarmuszewski avatar krzwiatrzyk-lgd avatar kszarek avatar kszarlej avatar lukaszkowalczyk98 avatar marcin-janas avatar rafalradecki avatar tzaleski avatar wildmarten avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

treasury's Issues

[DepShield] (CVSS 7.5) Vulnerability due to usage of golang.org/x:net:0.0.0-20181220203305-927f97764cc3

Vulnerabilities

DepShield reports that this application's usage of golang.org/x:net:0.0.0-20181220203305-927f97764cc3 results in the following vulnerability(s):


Occurrences

golang.org/x:net:0.0.0-20181220203305-927f97764cc3 is a transitive dependency introduced by the following direct dependency(s):

github.com/spf13:cobra:0.0.7
        └─ github.com/spf13:viper:1.4.0
              └─ github.com/grpc-ecosystem:grpc-gateway:1.9.0
                    └─ golang.org/x:net:0.0.0-20181220203305-927f97764cc3
                    └─ gopkg.in:resty.v1:1.12.0
                          └─ golang.org/x:net:0.0.0-20181220203305-927f97764cc3

This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.

Add flag for AWS profile

Currently Treasury obtains AWS profile from environment variable. It would be nice to have a flag that allows to do this as well. This can decrease human error when running binary against wrong AWS profile.

[DepShield] (CVSS 5.9) Vulnerability due to usage of golang.org/x:crypto:0.0.0-20180904163835-0709b304e793

Vulnerabilities

DepShield reports that this application's usage of golang.org/x:crypto:0.0.0-20180904163835-0709b304e793 results in the following vulnerability(s):


Occurrences

golang.org/x:crypto:0.0.0-20180904163835-0709b304e793 is a transitive dependency introduced by the following direct dependency(s):

github.com/spf13:cobra:0.0.6
        └─ github.com/spf13:viper:1.4.0
              └─ github.com/prometheus:client_golang:0.9.3
                    └─ github.com/prometheus:common:0.4.0
                          └─ github.com/sirupsen:logrus:1.2.0
                                └─ golang.org/x:crypto:0.0.0-20180904163835-0709b304e793

This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.

[DepShield] (CVSS 7.5) Vulnerability due to usage of golang.org/x:net:0.0.0-20190620200207-3b0461eec859

Depshield will be deprecated soon

Please install our new product, Sonatype Lift with advanced features


Vulnerabilities

DepShield reports that this application's usage of golang.org/x:net:0.0.0-20190620200207-3b0461eec859 results in the following vulnerability(s):


Occurrences

golang.org/x:net:0.0.0-20190620200207-3b0461eec859 is a transitive dependency introduced by the following direct dependency(s):

github.com/aws:aws-sdk-go:1.44.150
        └─ golang.org/x:net:0.1.0
              └─ golang.org/x:text:0.4.0
                    └─ golang.org/x:tools:0.1.12
                          └─ golang.org/x:mod:0.6.0-dev.0.20220419223038-86c51ed26bb4
                                └─ golang.org/x:tools:0.0.0-20191119224855-298f0cb1881e
                                      └─ golang.org/x:net:0.0.0-20190620200207-3b0461eec859
                    └─ golang.org/x:mod:0.6.0-dev.0.20220419223038-86c51ed26bb4
                          └─ golang.org/x:tools:0.0.0-20191119224855-298f0cb1881e
                                └─ golang.org/x:net:0.0.0-20190620200207-3b0461eec859

This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.

[DepShield] (CVSS 7.5) Vulnerability due to usage of golang.org/x:net:0.0.0-20181114220301-adae6a3d119a

Vulnerabilities

DepShield reports that this application's usage of golang.org/x:net:0.0.0-20181114220301-adae6a3d119a results in the following vulnerability(s):


Occurrences

golang.org/x:net:0.0.0-20181114220301-adae6a3d119a is a transitive dependency introduced by the following direct dependency(s):

github.com/spf13:cobra:0.0.7
        └─ github.com/spf13:viper:1.4.0
              └─ github.com/prometheus:client_golang:0.9.3
                    └─ github.com/prometheus:common:0.4.0
                          └─ golang.org/x:net:0.0.0-20181114220301-adae6a3d119a

This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.

DepShield encountered errors while building your project

The project could not be analyzed because of build errors. Please review the error messages here. Another build will be scheduled when a change to a manifest file* occurs. If the build is successful this issue will be closed, otherwise the error message will be updated.

This is an automated GitHub Issue created by Sonatype DepShield. GitHub Apps, including DepShield, can be managed from the Developer settings of the repository administrators.

* Supported manifest files are: pom.xml, package.json, package-lock.json, npm-shrinkwrap.json, Cargo.lock, Cargo.toml, main.rs, lib.rs, build.gradle, build.gradle.kts, settings.gradle, settings.gradle.kts, gradle.properties, gradle-wrapper.properties, go.mod, go.sum

[DepShield] (CVSS 5.9) Vulnerability due to usage of golang.org/x:crypto:0.0.0-20181203042331-505ab145d0a9

Vulnerabilities

DepShield reports that this application's usage of golang.org/x:crypto:0.0.0-20181203042331-505ab145d0a9 results in the following vulnerability(s):


Occurrences

golang.org/x:crypto:0.0.0-20181203042331-505ab145d0a9 is a transitive dependency introduced by the following direct dependency(s):

github.com/spf13:cobra:0.0.5
        └─ github.com/spf13:viper:1.3.2
              └─ golang.org/x:crypto:0.0.0-20181203042331-505ab145d0a9

This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.

[DepShield] (CVSS 5.9) Vulnerability due to usage of golang.org/x:crypto:0.0.0-20190308221718-c2843e01d9a2

Vulnerabilities

DepShield reports that this application's usage of golang.org/x:crypto:0.0.0-20190308221718-c2843e01d9a2 results in the following vulnerability(s):


Occurrences

golang.org/x:crypto:0.0.0-20190308221718-c2843e01d9a2 is a transitive dependency introduced by the following direct dependency(s):

github.com/spf13:cobra:0.0.6
        └─ github.com/spf13:viper:1.4.0
              └─ golang.org/x:net:0.0.0-20190522155817-f3200d17e092
                    └─ golang.org/x:crypto:0.0.0-20190308221718-c2843e01d9a2
              └─ google.golang.org:grpc:1.21.0
                    └─ golang.org/x:lint:0.0.0-20190313153728-d0100b6bd8b3
                          └─ golang.org/x:tools:0.0.0-20190311212946-11955173bddd
                                └─ golang.org/x:net:0.0.0-20190311183353-d8887717615a
                                      └─ golang.org/x:crypto:0.0.0-20190308221718-c2843e01d9a2
                    └─ golang.org/x:net:0.0.0-20190311183353-d8887717615a
                          └─ golang.org/x:crypto:0.0.0-20190308221718-c2843e01d9a2
                    └─ golang.org/x:tools:0.0.0-20190311212946-11955173bddd
                          └─ golang.org/x:net:0.0.0-20190311183353-d8887717615a
                                └─ golang.org/x:crypto:0.0.0-20190308221718-c2843e01d9a2

This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.

[DepShield] (CVSS 7.5) Vulnerability due to usage of golang.org/x:net:0.0.0-20190522155817-f3200d17e092

Vulnerabilities

DepShield reports that this application's usage of golang.org/x:net:0.0.0-20190522155817-f3200d17e092 results in the following vulnerability(s):


Occurrences

golang.org/x:net:0.0.0-20190522155817-f3200d17e092 is a transitive dependency introduced by the following direct dependency(s):

github.com/spf13:cobra:0.0.7
        └─ github.com/spf13:viper:1.4.0
              └─ golang.org/x:net:0.0.0-20190522155817-f3200d17e092

This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.

[DepShield] (CVSS 7.5) Vulnerability due to usage of github.com/gorilla:websocket:1.4.0

Vulnerabilities

DepShield reports that this application's usage of github.com/gorilla:websocket:1.4.0 results in the following vulnerability(s):


Occurrences

github.com/gorilla:websocket:1.4.0 is a transitive dependency introduced by the following direct dependency(s):

github.com/spf13:cobra:0.0.7
        └─ github.com/spf13:viper:1.4.0
              └─ github.com/gorilla:websocket:1.4.0

This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.

[DepShield] (CVSS 7.5) Vulnerability due to usage of golang.org/x:net:0.0.0-20180826012351-8a410e7b638d

Vulnerabilities

DepShield reports that this application's usage of golang.org/x:net:0.0.0-20180826012351-8a410e7b638d results in the following vulnerability(s):


Occurrences

golang.org/x:net:0.0.0-20180826012351-8a410e7b638d is a transitive dependency introduced by the following direct dependency(s):

github.com/spf13:cobra:0.0.7
        └─ github.com/spf13:viper:1.4.0
              └─ github.com/grpc-ecosystem:grpc-gateway:1.9.0
                    └─ google.golang.org:grpc:1.19.0
                          └─ golang.org/x:net:0.0.0-20180826012351-8a410e7b638d

This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.

[DepShield] (CVSS 7.7) Vulnerability due to usage of github.com/coreos:etcd:3.3.10

Vulnerabilities

DepShield reports that this application's usage of github.com/coreos:etcd:3.3.10 results in the following vulnerability(s):


Occurrences

github.com/coreos:etcd:3.3.10 is a transitive dependency introduced by the following direct dependency(s):

github.com/spf13:cobra:0.0.7
        └─ github.com/spf13:viper:1.4.0
              └─ github.com/coreos:etcd:3.3.10

This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.

[DepShield] (CVSS 9.8) Vulnerability due to usage of github.com/gogo:protobuf:1.2.1

Vulnerabilities

DepShield reports that this application's usage of github.com/gogo:protobuf:1.2.1 results in the following vulnerability(s):


Occurrences

github.com/gogo:protobuf:1.2.1 is a transitive dependency introduced by the following direct dependency(s):

github.com/spf13:cobra:0.0.7
        └─ github.com/spf13:viper:1.4.0
              └─ github.com/gogo:protobuf:1.2.1

This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.

[DepShield] (CVSS 7.5) Vulnerability due to usage of golang.org/x:net:0.0.0-20190311183353-d8887717615a

Vulnerabilities

DepShield reports that this application's usage of golang.org/x:net:0.0.0-20190311183353-d8887717615a results in the following vulnerability(s):


Occurrences

golang.org/x:net:0.0.0-20190311183353-d8887717615a is a transitive dependency introduced by the following direct dependency(s):

github.com/spf13:cobra:0.0.7
        └─ github.com/spf13:viper:1.4.0
              └─ google.golang.org:grpc:1.21.0
                    └─ golang.org/x:lint:0.0.0-20190313153728-d0100b6bd8b3
                          └─ golang.org/x:tools:0.0.0-20190311212946-11955173bddd
                                └─ golang.org/x:net:0.0.0-20190311183353-d8887717615a
                    └─ golang.org/x:net:0.0.0-20190311183353-d8887717615a
                    └─ golang.org/x:tools:0.0.0-20190311212946-11955173bddd
                          └─ golang.org/x:net:0.0.0-20190311183353-d8887717615a

This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.

[DepShield] (CVSS 7.5) Vulnerability due to usage of github.com/dgrijalva:jwt-go:3.2.0

Vulnerabilities

DepShield reports that this application's usage of github.com/dgrijalva:jwt-go:3.2.0 results in the following vulnerability(s):


Occurrences

github.com/dgrijalva:jwt-go:3.2.0 is a transitive dependency introduced by the following direct dependency(s):

github.com/spf13:cobra:0.0.7
        └─ github.com/spf13:viper:1.4.0
              └─ github.com/dgrijalva:jwt-go:3.2.0

This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.

[DepShield] (CVSS 7.5) Vulnerability due to usage of golang.org/x:net:0.0.0-20190404232315-eb5bcb51f2a3

Vulnerabilities

DepShield reports that this application's usage of golang.org/x:net:0.0.0-20190404232315-eb5bcb51f2a3 results in the following vulnerability(s):


Occurrences

golang.org/x:net:0.0.0-20190404232315-eb5bcb51f2a3 is a transitive dependency introduced by the following direct dependency(s):

github.com/aws:aws-sdk-go:1.35.36
        └─ golang.org/x:net:0.0.0-20201110031124-69a78807bb2b
              └─ golang.org/x:crypto:0.0.0-20200622213623-75b288015ac9
                    └─ golang.org/x:net:0.0.0-20190404232315-eb5bcb51f2a3

This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.

[DepShield] (CVSS 7.5) Vulnerability due to usage of golang.org/x:net:0.0.0-20200202094626-16171245cfb2

Vulnerabilities

DepShield reports that this application's usage of golang.org/x:net:0.0.0-20200202094626-16171245cfb2 results in the following vulnerability(s):


Occurrences

golang.org/x:net:0.0.0-20200202094626-16171245cfb2 is a transitive dependency introduced by the following direct dependency(s):

github.com/aws:aws-sdk-go:1.35.0
        └─ golang.org/x:net:0.0.0-20200202094626-16171245cfb2

This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.

[DepShield] (CVSS 9.8) Vulnerability due to usage of github.com/gogo:protobuf:1.1.1

Vulnerabilities

DepShield reports that this application's usage of github.com/gogo:protobuf:1.1.1 results in the following vulnerability(s):


Occurrences

github.com/gogo:protobuf:1.1.1 is a transitive dependency introduced by the following direct dependency(s):

github.com/spf13:cobra:0.0.7
        └─ github.com/spf13:viper:1.4.0
              └─ github.com/prometheus:client_golang:0.9.3
                    └─ github.com/prometheus:common:0.4.0
                          └─ github.com/gogo:protobuf:1.1.1
                    └─ github.com/prometheus:tsdb:0.7.1
                          └─ github.com/gogo:protobuf:1.1.1

This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.