mirror of
https://github.com/optim-enterprises-bv/vault.git
synced 2025-10-31 18:48:08 +00:00
Revert deprecated plugin var names (#5822)
* Revert field back to ListPluginsResponse.Names * Revert field back to MountConfig.PluginName and APIMountConfig.PluginName
This commit is contained in:
committed by
Brian Kassouf
parent
4ad10f138d
commit
1fddbc98ba
@@ -21,8 +21,11 @@ type ListPluginsResponse struct {
|
|||||||
// PluginsByType is the list of plugins by type.
|
// PluginsByType is the list of plugins by type.
|
||||||
PluginsByType map[consts.PluginType][]string `json:"types"`
|
PluginsByType map[consts.PluginType][]string `json:"types"`
|
||||||
|
|
||||||
// NamesDeprecated is the list of names of the plugins.
|
// Names is the list of names of the plugins.
|
||||||
NamesDeprecated []string `json:"names"`
|
//
|
||||||
|
// Deprecated: Newer server responses should be returning PluginsByType (json:
|
||||||
|
// "types") instead.
|
||||||
|
Names []string `json:"names"`
|
||||||
}
|
}
|
||||||
|
|
||||||
// ListPlugins lists all plugins in the catalog and returns their names as a
|
// ListPlugins lists all plugins in the catalog and returns their names as a
|
||||||
@@ -73,7 +76,7 @@ func (c *Sys) ListPlugins(i *ListPluginsInput) (*ListPluginsResponse, error) {
|
|||||||
if err := resp.DecodeJSON(&result); err != nil {
|
if err := resp.DecodeJSON(&result); err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
return &ListPluginsResponse{NamesDeprecated: result.Data.Keys}, nil
|
return &ListPluginsResponse{Names: result.Data.Keys}, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
result := &ListPluginsResponse{
|
result := &ListPluginsResponse{
|
||||||
|
|||||||
@@ -720,7 +720,7 @@ func (c *Core) newCredentialBackend(ctx context.Context, entry *MountEntry, sysV
|
|||||||
|
|
||||||
switch {
|
switch {
|
||||||
case entry.Type == "plugin":
|
case entry.Type == "plugin":
|
||||||
conf["plugin_name"] = entry.Config.PluginNameDeprecated
|
conf["plugin_name"] = entry.Config.PluginName
|
||||||
default:
|
default:
|
||||||
conf["plugin_name"] = t
|
conf["plugin_name"] = t
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -800,11 +800,11 @@ func (b *SystemBackend) handleMount(ctx context.Context, req *logical.Request, d
|
|||||||
"backend type must be specified as a string"),
|
"backend type must be specified as a string"),
|
||||||
logical.ErrInvalidRequest
|
logical.ErrInvalidRequest
|
||||||
case "plugin":
|
case "plugin":
|
||||||
// Only set plugin-name if mount is of type plugin, with apiConfig.PluginNameDeprecated
|
// Only set plugin-name if mount is of type plugin, with apiConfig.PluginName
|
||||||
// option taking precedence.
|
// option taking precedence.
|
||||||
switch {
|
switch {
|
||||||
case apiConfig.PluginNameDeprecated != "":
|
case apiConfig.PluginName != "":
|
||||||
logicalType = apiConfig.PluginNameDeprecated
|
logicalType = apiConfig.PluginName
|
||||||
case pluginName != "":
|
case pluginName != "":
|
||||||
logicalType = pluginName
|
logicalType = pluginName
|
||||||
default:
|
default:
|
||||||
@@ -1699,11 +1699,11 @@ func (b *SystemBackend) handleEnableAuth(ctx context.Context, req *logical.Reque
|
|||||||
"backend type must be specified as a string"),
|
"backend type must be specified as a string"),
|
||||||
logical.ErrInvalidRequest
|
logical.ErrInvalidRequest
|
||||||
case "plugin":
|
case "plugin":
|
||||||
// Only set plugin name if mount is of type plugin, with apiConfig.PluginNameDeprecated
|
// Only set plugin name if mount is of type plugin, with apiConfig.PluginName
|
||||||
// option taking precedence.
|
// option taking precedence.
|
||||||
switch {
|
switch {
|
||||||
case apiConfig.PluginNameDeprecated != "":
|
case apiConfig.PluginName != "":
|
||||||
logicalType = apiConfig.PluginNameDeprecated
|
logicalType = apiConfig.PluginName
|
||||||
case pluginName != "":
|
case pluginName != "":
|
||||||
logicalType = pluginName
|
logicalType = pluginName
|
||||||
default:
|
default:
|
||||||
|
|||||||
@@ -223,12 +223,16 @@ type MountConfig struct {
|
|||||||
DefaultLeaseTTL time.Duration `json:"default_lease_ttl" structs:"default_lease_ttl" mapstructure:"default_lease_ttl"` // Override for global default
|
DefaultLeaseTTL time.Duration `json:"default_lease_ttl" structs:"default_lease_ttl" mapstructure:"default_lease_ttl"` // Override for global default
|
||||||
MaxLeaseTTL time.Duration `json:"max_lease_ttl" structs:"max_lease_ttl" mapstructure:"max_lease_ttl"` // Override for global default
|
MaxLeaseTTL time.Duration `json:"max_lease_ttl" structs:"max_lease_ttl" mapstructure:"max_lease_ttl"` // Override for global default
|
||||||
ForceNoCache bool `json:"force_no_cache" structs:"force_no_cache" mapstructure:"force_no_cache"` // Override for global default
|
ForceNoCache bool `json:"force_no_cache" structs:"force_no_cache" mapstructure:"force_no_cache"` // Override for global default
|
||||||
PluginNameDeprecated string `json:"plugin_name,omitempty" structs:"plugin_name,omitempty" mapstructure:"plugin_name"`
|
|
||||||
AuditNonHMACRequestKeys []string `json:"audit_non_hmac_request_keys,omitempty" structs:"audit_non_hmac_request_keys" mapstructure:"audit_non_hmac_request_keys"`
|
AuditNonHMACRequestKeys []string `json:"audit_non_hmac_request_keys,omitempty" structs:"audit_non_hmac_request_keys" mapstructure:"audit_non_hmac_request_keys"`
|
||||||
AuditNonHMACResponseKeys []string `json:"audit_non_hmac_response_keys,omitempty" structs:"audit_non_hmac_response_keys" mapstructure:"audit_non_hmac_response_keys"`
|
AuditNonHMACResponseKeys []string `json:"audit_non_hmac_response_keys,omitempty" structs:"audit_non_hmac_response_keys" mapstructure:"audit_non_hmac_response_keys"`
|
||||||
ListingVisibility ListingVisibilityType `json:"listing_visibility,omitempty" structs:"listing_visibility" mapstructure:"listing_visibility"`
|
ListingVisibility ListingVisibilityType `json:"listing_visibility,omitempty" structs:"listing_visibility" mapstructure:"listing_visibility"`
|
||||||
PassthroughRequestHeaders []string `json:"passthrough_request_headers,omitempty" structs:"passthrough_request_headers" mapstructure:"passthrough_request_headers"`
|
PassthroughRequestHeaders []string `json:"passthrough_request_headers,omitempty" structs:"passthrough_request_headers" mapstructure:"passthrough_request_headers"`
|
||||||
TokenType logical.TokenType `json:"token_type" structs:"token_type" mapstructure:"token_type"`
|
TokenType logical.TokenType `json:"token_type" structs:"token_type" mapstructure:"token_type"`
|
||||||
|
|
||||||
|
// PluginName is the name of the plugin registered in the catalog.
|
||||||
|
//
|
||||||
|
// Deprecated: MountEntry.Type should be used instead for Vault 1.0.0 and beyond.
|
||||||
|
PluginName string `json:"plugin_name,omitempty" structs:"plugin_name,omitempty" mapstructure:"plugin_name"`
|
||||||
}
|
}
|
||||||
|
|
||||||
// APIMountConfig is an embedded struct of api.MountConfigInput
|
// APIMountConfig is an embedded struct of api.MountConfigInput
|
||||||
@@ -236,12 +240,16 @@ type APIMountConfig struct {
|
|||||||
DefaultLeaseTTL string `json:"default_lease_ttl" structs:"default_lease_ttl" mapstructure:"default_lease_ttl"`
|
DefaultLeaseTTL string `json:"default_lease_ttl" structs:"default_lease_ttl" mapstructure:"default_lease_ttl"`
|
||||||
MaxLeaseTTL string `json:"max_lease_ttl" structs:"max_lease_ttl" mapstructure:"max_lease_ttl"`
|
MaxLeaseTTL string `json:"max_lease_ttl" structs:"max_lease_ttl" mapstructure:"max_lease_ttl"`
|
||||||
ForceNoCache bool `json:"force_no_cache" structs:"force_no_cache" mapstructure:"force_no_cache"`
|
ForceNoCache bool `json:"force_no_cache" structs:"force_no_cache" mapstructure:"force_no_cache"`
|
||||||
PluginNameDeprecated string `json:"plugin_name,omitempty" structs:"plugin_name,omitempty" mapstructure:"plugin_name"`
|
|
||||||
AuditNonHMACRequestKeys []string `json:"audit_non_hmac_request_keys,omitempty" structs:"audit_non_hmac_request_keys" mapstructure:"audit_non_hmac_request_keys"`
|
AuditNonHMACRequestKeys []string `json:"audit_non_hmac_request_keys,omitempty" structs:"audit_non_hmac_request_keys" mapstructure:"audit_non_hmac_request_keys"`
|
||||||
AuditNonHMACResponseKeys []string `json:"audit_non_hmac_response_keys,omitempty" structs:"audit_non_hmac_response_keys" mapstructure:"audit_non_hmac_response_keys"`
|
AuditNonHMACResponseKeys []string `json:"audit_non_hmac_response_keys,omitempty" structs:"audit_non_hmac_response_keys" mapstructure:"audit_non_hmac_response_keys"`
|
||||||
ListingVisibility ListingVisibilityType `json:"listing_visibility,omitempty" structs:"listing_visibility" mapstructure:"listing_visibility"`
|
ListingVisibility ListingVisibilityType `json:"listing_visibility,omitempty" structs:"listing_visibility" mapstructure:"listing_visibility"`
|
||||||
PassthroughRequestHeaders []string `json:"passthrough_request_headers,omitempty" structs:"passthrough_request_headers" mapstructure:"passthrough_request_headers"`
|
PassthroughRequestHeaders []string `json:"passthrough_request_headers,omitempty" structs:"passthrough_request_headers" mapstructure:"passthrough_request_headers"`
|
||||||
TokenType string `json:"token_type" structs:"token_type" mapstructure:"token_type"`
|
TokenType string `json:"token_type" structs:"token_type" mapstructure:"token_type"`
|
||||||
|
|
||||||
|
// PluginName is the name of the plugin registered in the catalog.
|
||||||
|
//
|
||||||
|
// Deprecated: MountEntry.Type should be used instead for Vault 1.0.0 and beyond.
|
||||||
|
PluginName string `json:"plugin_name,omitempty" structs:"plugin_name,omitempty" mapstructure:"plugin_name"`
|
||||||
}
|
}
|
||||||
|
|
||||||
// Clone returns a deep copy of the mount entry
|
// Clone returns a deep copy of the mount entry
|
||||||
@@ -1135,7 +1143,7 @@ func (c *Core) newLogicalBackend(ctx context.Context, entry *MountEntry, sysView
|
|||||||
|
|
||||||
switch {
|
switch {
|
||||||
case entry.Type == "plugin":
|
case entry.Type == "plugin":
|
||||||
conf["plugin_name"] = entry.Config.PluginNameDeprecated
|
conf["plugin_name"] = entry.Config.PluginName
|
||||||
default:
|
default:
|
||||||
conf["plugin_name"] = t
|
conf["plugin_name"] = t
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -75,7 +75,7 @@ func (c *Core) reloadMatchingPlugin(ctx context.Context, pluginName string) erro
|
|||||||
if ns.ID != entry.Namespace().ID {
|
if ns.ID != entry.Namespace().ID {
|
||||||
continue
|
continue
|
||||||
}
|
}
|
||||||
if entry.Type == pluginName || (entry.Type == "plugin" && entry.Config.PluginNameDeprecated == pluginName) {
|
if entry.Type == pluginName || (entry.Type == "plugin" && entry.Config.PluginName == pluginName) {
|
||||||
err := c.reloadBackendCommon(ctx, entry, false)
|
err := c.reloadBackendCommon(ctx, entry, false)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
@@ -91,7 +91,7 @@ func (c *Core) reloadMatchingPlugin(ctx context.Context, pluginName string) erro
|
|||||||
continue
|
continue
|
||||||
}
|
}
|
||||||
|
|
||||||
if entry.Type == pluginName || (entry.Type == "plugin" && entry.Config.PluginNameDeprecated == pluginName) {
|
if entry.Type == pluginName || (entry.Type == "plugin" && entry.Config.PluginName == pluginName) {
|
||||||
err := c.reloadBackendCommon(ctx, entry, true)
|
err := c.reloadBackendCommon(ctx, entry, true)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
|
|||||||
@@ -713,7 +713,7 @@ func (c *Core) handleRequest(ctx context.Context, req *logical.Request) (retResp
|
|||||||
case "plugin":
|
case "plugin":
|
||||||
// If we are a plugin type and the plugin name is "kv" check the
|
// If we are a plugin type and the plugin name is "kv" check the
|
||||||
// mount entry options.
|
// mount entry options.
|
||||||
if matchingMountEntry.Config.PluginNameDeprecated == "kv" && (matchingMountEntry.Options == nil || matchingMountEntry.Options["leased_passthrough"] != "true") {
|
if matchingMountEntry.Config.PluginName == "kv" && (matchingMountEntry.Options == nil || matchingMountEntry.Options["leased_passthrough"] != "true") {
|
||||||
registerLease = false
|
registerLease = false
|
||||||
resp.Secret.Renewable = false
|
resp.Secret.Renewable = false
|
||||||
}
|
}
|
||||||
|
|||||||
Reference in New Issue
Block a user