Skip to content

Latest commit

 

History

History
451 lines (344 loc) · 22 KB

url_schemes.md

File metadata and controls

451 lines (344 loc) · 22 KB

URL Schemes and Filesystems

URL Format

All supported filesystems can be requested with a base URL. As a refresher, a URL has the following components:

  foo://userinfo@example.com:8042/over/there?name=ferret#nose
  \_/   \_______________________/\_________/ \_________/ \__/
   |           |                    |            |        |
scheme     authority               path        query   fragment

For our purposes, the scheme and the path components are especially important, though the other components are used by certain filesystems for particular purposes.

  • scheme: Identifies which filesystem to use. Some filesystems allow multiple different schemes to clarify access modes, such as consul+https.
  • authority: Used by remote (network-based) filesystems, and can be omitted in some of those cases. Consists of userinfo (user:pass), host, and port.
  • path: Can be omitted. Used as the root of the filesystem. For example, given a base of http://example.com/foo, calling Open with a path of bar/baz.txt will effectively resolve to http://example.com/foo/bar/baz.txt.
  • query: Used to alter filesystem-specific behaviour. For example an S3 bucket region can be specified with a region query: s3://my-bucket?region=us-west-1.
  • fragment: Used rarely

Opaque URIs

For some filesystems, opaque URIs can be used (rather than a hierarchical URL):

scheme                   path        query   fragment
   |   _____________________|__   _______|_   _|
  / \ /                        \ /         \ /  \
  urn:example:animal:ferret:nose?name=ferret#nose

The semantics of the different URI components are essentially the same as for hierarchical URLs (see above), but the path component may not start with a / character.

Non-standard URL conventions

For the most part, this module uses standard URL conventions as much as possible, however there are certain special cases.

Composite paths

Some filesystems can use composite paths to add extra location context to the path. This is marked by the presence of a double-slash (//) in the path component.

For example, in a git URL like git+https://github.com/hairyhenderson/go-which.git//cmd/which, the // sequence is used to separate the repository from the path. In this example, the filesystem will be rooted at /cmd/which inside the go-which repo.

Filesystem-specific URL Considerations

aws+sm

The scheme and path components are used by this filesystem. This may be an opaque URI (rather than a hierarchical URL) when the secret name or prefix does not begin with a / character (e.g. aws+sm:prod/env1).

  • scheme must be aws+sm
  • path is used optionally to specify the root secret heirarchy (this may be a hierarchical path beginning with /, or an opaque path without a leading /)

Examples

  • aws+sm:/// - filesystem that makes all accessible secrets available which are prefixed with a / character.
  • aws+sm:///scoped/secrets - filesystem that makes available only secrets whose names begin with /scoped/secrets/.
  • aws+sm: - filesystem that makes available all accessible secrets which are not prefixed with a / character.
  • aws+sm:prod/env1 - filesystem that makes available only secrets whose names begin with prod/env1/.

aws+smp

The scheme and path components are used by this filesystem.

  • scheme must be aws+smp
  • path is used optionally to specify the root parameter heirarchy

Examples

  • aws+smp:/// - filesystem that makes all accessible parameters available
  • aws+smp:///scoped/params - filesystem that makes available only parameters with a prefix of /scoped/params.

azblob

The scheme, authority, path, and query components are used by this filesystem.

  • scheme must be azblob
  • authority is used to specify the bucket name
  • path is used to specify the path to root the filesystem at
  • query can be used to provide parameters to configure the connection:
    • domain: The domain name used to access the Azure Blob storage (e.g. blob.core.windows.net). Overrides any setting provided by AZURE_STORAGE_DOMAIN

Examples

  • azblob://mybucket/- filesystem rooted at the root of the mybucket bucket
  • azblob://mybucket/configs/ - filesystem rooted at the /configs prefix in the mybucket bucket
  • azblob://mybucket/configs?domain=foo.example.com - same as the previous example, except the domain is overridden to foo.example.com.

Azure Blob Store Environment Variables

The following optional environment variables are understood by the azblob filesystem:

name usage
AZURE_STORAGE_ACCOUNT The Azure storage account name. Required.
AZURE_STORAGE_DOMAIN (optional) The domain name used to access the Azure Blob storage
AZURE_STORAGE_KEY Azure storage account key. Either this or AZURE_STORAGE_SAS_TOKEN must be set
AZURE_STORAGE_SAS_TOKEN Azure shared access signature (SAS) token. Either this or AZURE_STORAGE_KEY must be set

consul

The scheme, authority, and path components are used by this filesystem.

  • scheme can be consul, consul+http, or consul+https. The first two are equivalent, while the third instructs the client to connect to Consul over an encrypted HTTPS connection. Encryption can alternately be enabled by use of the $CONSUL_HTTP_SSL environment variable.
  • authority is used to specify the server to connect to (e.g. consul://localhost:8500), but if not specified, the $CONSUL_HTTP_ADDR environment variable will be used.
  • path is used optionally to specify the root key-space

Consul Environment Variables

The following optional environment variables are understood by the Consul filesystem:

name usage
CONSUL_HTTP_ADDR Hostname and optional port for connecting to Consul. Defaults to http://localhost:8500
CONSUL_TIMEOUT Timeout (in seconds) when communicating to Consul. Defaults to 10 seconds.
CONSUL_HTTP_TOKEN The Consul token to use when connecting to the server.
CONSUL_HTTP_AUTH Should be specified as <username>:<password>. Used to authenticate to the server.
CONSUL_HTTP_SSL Force HTTPS if set to true value. Disables if set to false. Any value acceptable to strconv.ParseBool can be provided.
CONSUL_TLS_SERVER_NAME The server name to use as the SNI host when connecting to Consul via TLS.
CONSUL_CACERT Path to CA file for verifying Consul server using TLS.
CONSUL_CAPATH Path to directory of CA files for verifying Consul server using TLS.
CONSUL_CLIENT_CERT Client certificate file for certificate authentication. If this is set, $CONSUL_CLIENT_KEY must also be set.
CONSUL_CLIENT_KEY Client key file for certificate authentication. If this is set, $CONSUL_CLIENT_CERT must also be set.
CONSUL_HTTP_SSL_VERIFY Set to false to disable Consul TLS certificate checking. Any value acceptable to strconv.ParseBool can be provided.
Recommended only for testing and development scenarios!
CONSUL_VAULT_ROLE Set to the name of the role to use for authenticating to Consul with Vault's Consul secret backend.
CONSUL_VAULT_MOUNT Used to override the mount-point when using Vault's Consul secret back-end for authentication. Defaults to consul.

Authentication

Instead of using a non-authenticated Consul connection, you can authenticate with these methods:

  • provide an ACL Token in the CONSUL_HTTP_TOKEN environment variable
  • use HTTP Basic Auth by setting the CONSUL_HTTP_AUTH environment variable
  • dynamically generate an ACL token with Vault. This requires Vault to be configured to use the Consul secret backend and is enabled by passing the name of the role to use in the CONSUL_VAULT_ROLE environment variable.

Examples

  • consul:/// - filesytem that accesses Consul at http://localhost:8500, making all accessible keys available.
  • consul+https://my-consul-server.com:8533/foo - filesystem that accesses the server running at https://my-consul-server.com:8533, making only keys prefixed by /foo/ available.
  • consul:///foo/ - filesystem that accesses the server running at http://localhost:8500, making only keys prefixed by /foo/ available.

file

The scheme and path components are used by this filesystem.

  • scheme must be file
  • authority can be used on Windows when a UNC is being referenced
  • path can be set to root the filesystem at a given directory

Examples

  • file:/// - provides full access to the local filesystem. Equivalent to using os.DirFS("/"). On Windows, the filesystem is rooted at the "current" volume.
  • file:///tmp - provides access to the local filesystem, rooted at the /tmp directory.
  • file:///D:/ - (Windows-specific) provides full access to the local filesystem rooted at the D:\ volume.
  • file://./C:/Program%20Files - (Windows-specific) provides access to the C:\Program Files\ directory. Note that this is equivalent to using a UNC in the local namespace (like \\.\C:\...)
  • file://remoteserver/sharename/foo - (Windows-specific) a filesystem rooted at the UNC \\remoteserver\sharename\foo

git

Note that this filesystem accesses the git state, and so for local filesystem repositories, any files not committed to a branch (i.e. "dirty" or modified files) will not be visible.

The scheme, authority (with userinfo), path, and fragment are used by this filesystem.

  • scheme may be one of these values:
  • authority points to the remote git server hostname (and optional port, if applicable). The userinfo subcomponent can be used for authenticated schemes like git+https and git+ssh.
  • path is a composite of the path to the repository, and the path to the directory being referenced within. The // sequence (double forward-slash) is used to separate the repository from the path. If no // is present in the URL, the filesystem will be rooted at the root directory of the repository.
  • fragment can be used to specify which branch or tag to reference. By default, the repository's default branch will be chosen.
    • branches can be referenced by short name or by the long form. Valid fragments are #main, #master, #develop, #refs/heads/mybranch, etc...
    • tags must use the long form prefixed by refs/tags/, i.e. #refs/tags/v1 for the v1 tag

Authentication

The git and git+file schemes are always unauthenticated, git+http/git+https can optionally be authenticated, and git+ssh must be authenticated.

Authenticating with both HTTP and SSH requires the user to be set (like git+ssh://user@example.com), but the credentials vary otherwise.

HTTP(S) Authentication

Note that because HTTP connections are unencypted, and HTTP authentication is performed with headers, it is strongly recommended to only use HTTPS (git+https) connections when accessing authenticated repositories.

Basic Auth

The most common form. The password can be specified as part of the URL, or provided through the GIT_HTTP_PASSWORD environment variable, or in a file referenced by the GIT_HTTP_PASSWORD_FILE environment variable.

For authenticating with GitHub, Bitbucket, GitLab and other popular git hosts, use this method with a personal access token, and the user set to git.

Token Auth

Some servers require the use of a bearer token. To use this method, a user is not required, and the token must be set in the GIT_HTTP_TOKEN environment variable, or in a file referenced by the GIT_HTTP_TOKEN_FILE environment variable.

SSH Authentication

Only public key based authentication is supported for git+ssh connections. The key can be provided directly, or via the SSH Agent (or Pageant on Windows).

To provide a key directly, set the GIT_SSH_KEY to the contents of the key, or point GIT_SSH_KEY_FILE to a file containing the key. Because the file may contain newline characters that may be difficult to provide in an environment variable, it can also be Base64-encoded.

If neither GIT_SSH_KEY nor GIT_SSH_KEY_FILE are set, gomplate will attempt to use the SSH Agent.

Note: password-protected SSH keys are currently not supported. If you have a password-protected key, use the SSH Agent.

Examples

  • git+https://github.com/hairyhenderson/gomplate//docs-src/content/functions - filesystem rooted at the github.com/hairyhenderson/gomplate repo, rooted in the /docs-src/content/functions directory.
  • git+file:///repos/go-which - filesystem rooted at the root of the repo located at /repos/go-which on the local filesystem.
  • git+https://github.com/hairyhenderson/go-which//cmd/which#refs/tags/v0.1.0 - filesystem rooted at a directory, on the v0.1.0 tag.
  • git+ssh://git@github.com/hairyhenderson/go-which.git - filesystem rooted at the root of the repo, using the SSH agent for authentication

gs

The scheme, authority, path, and query components are used by this filesystem.

Authentication

Most gs buckets need credentials, provided by the GOOGLE_APPLICATION_CREDENTIALS environment variable. This should point to an authentication configuration JSON file.

See Google Cloud's Getting Started with Authentication documentation for details.

Some buckets can be accessed anonymously. To do this, set the GOOGLE_ANON environment variable to true. Note that this is a non-standard environment variable, unique to this module.

Examples

  • gs://mybucket/foo/ - filesystem rooted at /foo in the mybucket bucket.
  • gs://mybucket/- filesystem rooted at the root of the mybucket bucket.

http

Note that HTTP does not support directory listings, and so this filesystem does not implement the ReadDirFS interface.

The scheme, authority, path, and query components are used by this filesystem.

  • scheme must be http or https
  • authority must be provided, and all parts are supported
  • path is used to specify the path to root the filesystem at
  • query can be used to provide parameters to the remote HTTP server

Examples

  • http://localhost/ - filesystem rooted at / on the HTTP server running at http://localhost:80
  • https://example.com/foo/bar?baz=42 - filesystem rooted at /foo/bar on the server running at https://example.com. All requests will be sent with the query string baz=42.

s3

The scheme, authority, path, and query components are used by this filesystem.

  • scheme must be s3
  • authority is used to specify the s3 bucket name
  • path is used optionally to specify the root
  • query can be used to provide parameters to configure the connection:
    • region: The AWS region for requests. Defaults to the value from the AWS_REGION or AWS_DEFAULT_REGION environment variables, or the EC2 region if used in AWS EC2.
    • endpoint: The endpoint (hostname, hostname:port, or fully qualified URI). Useful for using a different S3-compatible object storage server. You can also set the AWS_S3_ENDPOINT environment variable.
    • s3ForcePathStyle: A value of true forces use of the deprecated "path-style" access. This is necessary for some S3-compatible object storage servers.
    • disableSSL: A value of true disables SSL when sending requests. Use only for test scenarios!

Examples

  • s3://mybucket/- filesystem rooted at the root of the mybucket bucket. The region will be inferred.
  • s3://mybucket/configs/ - filesystem rooted at the /configs prefix in the mybucket bucket. The region will be inferred.
  • s3://mybucket/configs?region=eu-west-1 - same as the previous example, except the bucket's region is overridden to eu-west-1.
  • s3://mybucket/configs?endpoint=localhost:5432&disableSSL=true&s3ForcePathStyle=true - this example is typical of a scenario where an S3-compatible server (such as Minio, Zenko CloudServer, or testing-focused servers such as gofakes3) is being used. The endpoint is overridden to be a server running on localhost, and encryption is disabled since the endpoint is local. Also, "path-style" access is used - typical for local servers, or scenarios where modifying DNS is impossible or impractical.

vault

The scheme, authority, path, and query components are used by this filesystem.

  • scheme must be one of vault, vault+https (same as vault), or vault+http. The latter can be used to access dev mode Vault servers, for test purposes. Otherwise, all connections to Vault are encrypted.
  • authority can optionally be used to specify the Vault server's hostname and port. This overrides the value of $VAULT_ADDR.
  • path is used to specify the path to root the filesystem at
  • query is used to provide parameters to dynamic secret back-ends that require these. The values are included in the JSON body of the PUT request.

Examples

  • vault:/// - filesystem providing full access to accessible secrets on the server specified by $VAULT_ADDR.
  • vault://vault.example.com:8200 - filesystem providing full access to accessible secrets on the server running at vault.example.com over HTTPS at port 8200
  • vault:///ssh/creds/?ip=10.1.2.3&username=user - filesystem that allows reading dynamic secrets with the parameters ip and username provided in the body
  • vault:///secret/configs/ - filesystem rooted at /secret/configs on the server at $VAULT_ADDR

Vault Authentication

This table describes the currently-supported authentication mechanisms and how to use them, in order of precedence:

auth back-end configuration
approle Environment variables $VAULT_ROLE_ID and $VAULT_SECRET_ID must be set to the appropriate values.
If the back-end is mounted to a different location, set $VAULT_AUTH_APPROLE_MOUNT.
github Environment variable $VAULT_AUTH_GITHUB_TOKEN must be set to an appropriate value.
If the back-end is mounted to a different location, set $VAULT_AUTH_GITHUB_MOUNT.
userpass Environment variables $VAULT_AUTH_USERNAME and $VAULT_AUTH_PASSWORD must be set to the appropriate values.
If the back-end is mounted to a different location, set $VAULT_AUTH_USERPASS_MOUNT.
token Determined from either the $VAULT_TOKEN environment variable, or read from the file ~/.vault-token
aws The env var $VAULT_AUTH_AWS_ROLE defines the role to log in with - defaults to the AMI ID of the EC2 instance. Usually a Client Nonce should be used as well. Set $VAULT_AUTH_AWS_NONCE to the nonce value. The nonce can be generated and stored by setting $VAULT_AUTH_AWS_NONCE_OUTPUT to a path on the local filesystem.
If the back-end is mounted to a different location, set $VAULT_AUTH_AWS_MOUNT.
app-id (Deprecated - use approle instead)

Note: The secret values listed in the above table can either be set in environment variables or provided in files for increased security. To use files, specify the filename by appending _FILE to the environment variable, (e.g. VAULT_SECRET_ID_FILE). If the non-file variable is set, this will override any _FILE variable and the secret file will be ignored.

Vault Permissions

The correct capabilities must be allowed for the authenticated credentials. See the Vault documentation for full details.

  • regular secret read operations require the read capability
  • dynamic secret generation requires the create and update capabilities
  • list support requires the list capability

Vault Environment variables

In addition to the variables documented above, a number of environment variables are interpreted by the Vault client, and are documented in the official Vault documentation.