mirror of
				https://github.com/optim-enterprises-bv/vault.git
				synced 2025-10-31 02:28:09 +00:00 
			
		
		
		
	Revert deprecated plugin var names (#5822)
* Revert field back to ListPluginsResponse.Names * Revert field back to MountConfig.PluginName and APIMountConfig.PluginName
This commit is contained in:
		 Calvin Leung Huang
					Calvin Leung Huang
				
			
				
					committed by
					
						 Brian Kassouf
						Brian Kassouf
					
				
			
			
				
	
			
			
			 Brian Kassouf
						Brian Kassouf
					
				
			
						parent
						
							4ad10f138d
						
					
				
				
					commit
					1fddbc98ba
				
			| @@ -21,8 +21,11 @@ type ListPluginsResponse struct { | ||||
| 	// PluginsByType is the list of plugins by type. | ||||
| 	PluginsByType map[consts.PluginType][]string `json:"types"` | ||||
|  | ||||
| 	// NamesDeprecated is the list of names of the plugins. | ||||
| 	NamesDeprecated []string `json:"names"` | ||||
| 	// Names is the list of names of the plugins. | ||||
| 	// | ||||
| 	// Deprecated: Newer server responses should be returning PluginsByType (json: | ||||
| 	// "types") instead. | ||||
| 	Names []string `json:"names"` | ||||
| } | ||||
|  | ||||
| // ListPlugins lists all plugins in the catalog and returns their names as a | ||||
| @@ -73,7 +76,7 @@ func (c *Sys) ListPlugins(i *ListPluginsInput) (*ListPluginsResponse, error) { | ||||
| 		if err := resp.DecodeJSON(&result); err != nil { | ||||
| 			return nil, err | ||||
| 		} | ||||
| 		return &ListPluginsResponse{NamesDeprecated: result.Data.Keys}, nil | ||||
| 		return &ListPluginsResponse{Names: result.Data.Keys}, nil | ||||
| 	} | ||||
|  | ||||
| 	result := &ListPluginsResponse{ | ||||
|   | ||||
| @@ -720,7 +720,7 @@ func (c *Core) newCredentialBackend(ctx context.Context, entry *MountEntry, sysV | ||||
|  | ||||
| 	switch { | ||||
| 	case entry.Type == "plugin": | ||||
| 		conf["plugin_name"] = entry.Config.PluginNameDeprecated | ||||
| 		conf["plugin_name"] = entry.Config.PluginName | ||||
| 	default: | ||||
| 		conf["plugin_name"] = t | ||||
| 	} | ||||
|   | ||||
| @@ -800,11 +800,11 @@ func (b *SystemBackend) handleMount(ctx context.Context, req *logical.Request, d | ||||
| 				"backend type must be specified as a string"), | ||||
| 			logical.ErrInvalidRequest | ||||
| 	case "plugin": | ||||
| 		// Only set plugin-name if mount is of type plugin, with apiConfig.PluginNameDeprecated | ||||
| 		// Only set plugin-name if mount is of type plugin, with apiConfig.PluginName | ||||
| 		// option taking precedence. | ||||
| 		switch { | ||||
| 		case apiConfig.PluginNameDeprecated != "": | ||||
| 			logicalType = apiConfig.PluginNameDeprecated | ||||
| 		case apiConfig.PluginName != "": | ||||
| 			logicalType = apiConfig.PluginName | ||||
| 		case pluginName != "": | ||||
| 			logicalType = pluginName | ||||
| 		default: | ||||
| @@ -1699,11 +1699,11 @@ func (b *SystemBackend) handleEnableAuth(ctx context.Context, req *logical.Reque | ||||
| 				"backend type must be specified as a string"), | ||||
| 			logical.ErrInvalidRequest | ||||
| 	case "plugin": | ||||
| 		// Only set plugin name if mount is of type plugin, with apiConfig.PluginNameDeprecated | ||||
| 		// Only set plugin name if mount is of type plugin, with apiConfig.PluginName | ||||
| 		// option taking precedence. | ||||
| 		switch { | ||||
| 		case apiConfig.PluginNameDeprecated != "": | ||||
| 			logicalType = apiConfig.PluginNameDeprecated | ||||
| 		case apiConfig.PluginName != "": | ||||
| 			logicalType = apiConfig.PluginName | ||||
| 		case pluginName != "": | ||||
| 			logicalType = pluginName | ||||
| 		default: | ||||
|   | ||||
| @@ -223,12 +223,16 @@ type MountConfig struct { | ||||
| 	DefaultLeaseTTL           time.Duration         `json:"default_lease_ttl" structs:"default_lease_ttl" mapstructure:"default_lease_ttl"` // Override for global default | ||||
| 	MaxLeaseTTL               time.Duration         `json:"max_lease_ttl" structs:"max_lease_ttl" mapstructure:"max_lease_ttl"`             // Override for global default | ||||
| 	ForceNoCache              bool                  `json:"force_no_cache" structs:"force_no_cache" mapstructure:"force_no_cache"`          // Override for global default | ||||
| 	PluginNameDeprecated      string                `json:"plugin_name,omitempty" structs:"plugin_name,omitempty" mapstructure:"plugin_name"` | ||||
| 	AuditNonHMACRequestKeys   []string              `json:"audit_non_hmac_request_keys,omitempty" structs:"audit_non_hmac_request_keys" mapstructure:"audit_non_hmac_request_keys"` | ||||
| 	AuditNonHMACResponseKeys  []string              `json:"audit_non_hmac_response_keys,omitempty" structs:"audit_non_hmac_response_keys" mapstructure:"audit_non_hmac_response_keys"` | ||||
| 	ListingVisibility         ListingVisibilityType `json:"listing_visibility,omitempty" structs:"listing_visibility" mapstructure:"listing_visibility"` | ||||
| 	PassthroughRequestHeaders []string              `json:"passthrough_request_headers,omitempty" structs:"passthrough_request_headers" mapstructure:"passthrough_request_headers"` | ||||
| 	TokenType                 logical.TokenType     `json:"token_type" structs:"token_type" mapstructure:"token_type"` | ||||
|  | ||||
| 	// PluginName is the name of the plugin registered in the catalog. | ||||
| 	// | ||||
| 	// Deprecated: MountEntry.Type should be used instead for Vault 1.0.0 and beyond. | ||||
| 	PluginName string `json:"plugin_name,omitempty" structs:"plugin_name,omitempty" mapstructure:"plugin_name"` | ||||
| } | ||||
|  | ||||
| // APIMountConfig is an embedded struct of api.MountConfigInput | ||||
| @@ -236,12 +240,16 @@ type APIMountConfig struct { | ||||
| 	DefaultLeaseTTL           string                `json:"default_lease_ttl" structs:"default_lease_ttl" mapstructure:"default_lease_ttl"` | ||||
| 	MaxLeaseTTL               string                `json:"max_lease_ttl" structs:"max_lease_ttl" mapstructure:"max_lease_ttl"` | ||||
| 	ForceNoCache              bool                  `json:"force_no_cache" structs:"force_no_cache" mapstructure:"force_no_cache"` | ||||
| 	PluginNameDeprecated      string                `json:"plugin_name,omitempty" structs:"plugin_name,omitempty" mapstructure:"plugin_name"` | ||||
| 	AuditNonHMACRequestKeys   []string              `json:"audit_non_hmac_request_keys,omitempty" structs:"audit_non_hmac_request_keys" mapstructure:"audit_non_hmac_request_keys"` | ||||
| 	AuditNonHMACResponseKeys  []string              `json:"audit_non_hmac_response_keys,omitempty" structs:"audit_non_hmac_response_keys" mapstructure:"audit_non_hmac_response_keys"` | ||||
| 	ListingVisibility         ListingVisibilityType `json:"listing_visibility,omitempty" structs:"listing_visibility" mapstructure:"listing_visibility"` | ||||
| 	PassthroughRequestHeaders []string              `json:"passthrough_request_headers,omitempty" structs:"passthrough_request_headers" mapstructure:"passthrough_request_headers"` | ||||
| 	TokenType                 string                `json:"token_type" structs:"token_type" mapstructure:"token_type"` | ||||
|  | ||||
| 	// PluginName is the name of the plugin registered in the catalog. | ||||
| 	// | ||||
| 	// Deprecated: MountEntry.Type should be used instead for Vault 1.0.0 and beyond. | ||||
| 	PluginName string `json:"plugin_name,omitempty" structs:"plugin_name,omitempty" mapstructure:"plugin_name"` | ||||
| } | ||||
|  | ||||
| // Clone returns a deep copy of the mount entry | ||||
| @@ -1135,7 +1143,7 @@ func (c *Core) newLogicalBackend(ctx context.Context, entry *MountEntry, sysView | ||||
|  | ||||
| 	switch { | ||||
| 	case entry.Type == "plugin": | ||||
| 		conf["plugin_name"] = entry.Config.PluginNameDeprecated | ||||
| 		conf["plugin_name"] = entry.Config.PluginName | ||||
| 	default: | ||||
| 		conf["plugin_name"] = t | ||||
| 	} | ||||
|   | ||||
| @@ -75,7 +75,7 @@ func (c *Core) reloadMatchingPlugin(ctx context.Context, pluginName string) erro | ||||
| 		if ns.ID != entry.Namespace().ID { | ||||
| 			continue | ||||
| 		} | ||||
| 		if entry.Type == pluginName || (entry.Type == "plugin" && entry.Config.PluginNameDeprecated == pluginName) { | ||||
| 		if entry.Type == pluginName || (entry.Type == "plugin" && entry.Config.PluginName == pluginName) { | ||||
| 			err := c.reloadBackendCommon(ctx, entry, false) | ||||
| 			if err != nil { | ||||
| 				return err | ||||
| @@ -91,7 +91,7 @@ func (c *Core) reloadMatchingPlugin(ctx context.Context, pluginName string) erro | ||||
| 			continue | ||||
| 		} | ||||
|  | ||||
| 		if entry.Type == pluginName || (entry.Type == "plugin" && entry.Config.PluginNameDeprecated == pluginName) { | ||||
| 		if entry.Type == pluginName || (entry.Type == "plugin" && entry.Config.PluginName == pluginName) { | ||||
| 			err := c.reloadBackendCommon(ctx, entry, true) | ||||
| 			if err != nil { | ||||
| 				return err | ||||
|   | ||||
| @@ -713,7 +713,7 @@ func (c *Core) handleRequest(ctx context.Context, req *logical.Request) (retResp | ||||
| 		case "plugin": | ||||
| 			// If we are a plugin type and the plugin name is "kv" check the | ||||
| 			// mount entry options. | ||||
| 			if matchingMountEntry.Config.PluginNameDeprecated == "kv" && (matchingMountEntry.Options == nil || matchingMountEntry.Options["leased_passthrough"] != "true") { | ||||
| 			if matchingMountEntry.Config.PluginName == "kv" && (matchingMountEntry.Options == nil || matchingMountEntry.Options["leased_passthrough"] != "true") { | ||||
| 				registerLease = false | ||||
| 				resp.Secret.Renewable = false | ||||
| 			} | ||||
|   | ||||
		Reference in New Issue
	
	Block a user