mirror of
https://github.com/optim-enterprises-bv/vault.git
synced 2025-11-01 19:17:58 +00:00
Revert deprecated plugin var names (#5822)
* Revert field back to ListPluginsResponse.Names * Revert field back to MountConfig.PluginName and APIMountConfig.PluginName
This commit is contained in:
committed by
Brian Kassouf
parent
4ad10f138d
commit
1fddbc98ba
@@ -21,8 +21,11 @@ type ListPluginsResponse struct {
|
||||
// PluginsByType is the list of plugins by type.
|
||||
PluginsByType map[consts.PluginType][]string `json:"types"`
|
||||
|
||||
// NamesDeprecated is the list of names of the plugins.
|
||||
NamesDeprecated []string `json:"names"`
|
||||
// Names is the list of names of the plugins.
|
||||
//
|
||||
// Deprecated: Newer server responses should be returning PluginsByType (json:
|
||||
// "types") instead.
|
||||
Names []string `json:"names"`
|
||||
}
|
||||
|
||||
// ListPlugins lists all plugins in the catalog and returns their names as a
|
||||
@@ -73,7 +76,7 @@ func (c *Sys) ListPlugins(i *ListPluginsInput) (*ListPluginsResponse, error) {
|
||||
if err := resp.DecodeJSON(&result); err != nil {
|
||||
return nil, err
|
||||
}
|
||||
return &ListPluginsResponse{NamesDeprecated: result.Data.Keys}, nil
|
||||
return &ListPluginsResponse{Names: result.Data.Keys}, nil
|
||||
}
|
||||
|
||||
result := &ListPluginsResponse{
|
||||
|
||||
@@ -720,7 +720,7 @@ func (c *Core) newCredentialBackend(ctx context.Context, entry *MountEntry, sysV
|
||||
|
||||
switch {
|
||||
case entry.Type == "plugin":
|
||||
conf["plugin_name"] = entry.Config.PluginNameDeprecated
|
||||
conf["plugin_name"] = entry.Config.PluginName
|
||||
default:
|
||||
conf["plugin_name"] = t
|
||||
}
|
||||
|
||||
@@ -800,11 +800,11 @@ func (b *SystemBackend) handleMount(ctx context.Context, req *logical.Request, d
|
||||
"backend type must be specified as a string"),
|
||||
logical.ErrInvalidRequest
|
||||
case "plugin":
|
||||
// Only set plugin-name if mount is of type plugin, with apiConfig.PluginNameDeprecated
|
||||
// Only set plugin-name if mount is of type plugin, with apiConfig.PluginName
|
||||
// option taking precedence.
|
||||
switch {
|
||||
case apiConfig.PluginNameDeprecated != "":
|
||||
logicalType = apiConfig.PluginNameDeprecated
|
||||
case apiConfig.PluginName != "":
|
||||
logicalType = apiConfig.PluginName
|
||||
case pluginName != "":
|
||||
logicalType = pluginName
|
||||
default:
|
||||
@@ -1699,11 +1699,11 @@ func (b *SystemBackend) handleEnableAuth(ctx context.Context, req *logical.Reque
|
||||
"backend type must be specified as a string"),
|
||||
logical.ErrInvalidRequest
|
||||
case "plugin":
|
||||
// Only set plugin name if mount is of type plugin, with apiConfig.PluginNameDeprecated
|
||||
// Only set plugin name if mount is of type plugin, with apiConfig.PluginName
|
||||
// option taking precedence.
|
||||
switch {
|
||||
case apiConfig.PluginNameDeprecated != "":
|
||||
logicalType = apiConfig.PluginNameDeprecated
|
||||
case apiConfig.PluginName != "":
|
||||
logicalType = apiConfig.PluginName
|
||||
case pluginName != "":
|
||||
logicalType = pluginName
|
||||
default:
|
||||
|
||||
@@ -223,12 +223,16 @@ type MountConfig struct {
|
||||
DefaultLeaseTTL time.Duration `json:"default_lease_ttl" structs:"default_lease_ttl" mapstructure:"default_lease_ttl"` // Override for global default
|
||||
MaxLeaseTTL time.Duration `json:"max_lease_ttl" structs:"max_lease_ttl" mapstructure:"max_lease_ttl"` // Override for global default
|
||||
ForceNoCache bool `json:"force_no_cache" structs:"force_no_cache" mapstructure:"force_no_cache"` // Override for global default
|
||||
PluginNameDeprecated string `json:"plugin_name,omitempty" structs:"plugin_name,omitempty" mapstructure:"plugin_name"`
|
||||
AuditNonHMACRequestKeys []string `json:"audit_non_hmac_request_keys,omitempty" structs:"audit_non_hmac_request_keys" mapstructure:"audit_non_hmac_request_keys"`
|
||||
AuditNonHMACResponseKeys []string `json:"audit_non_hmac_response_keys,omitempty" structs:"audit_non_hmac_response_keys" mapstructure:"audit_non_hmac_response_keys"`
|
||||
ListingVisibility ListingVisibilityType `json:"listing_visibility,omitempty" structs:"listing_visibility" mapstructure:"listing_visibility"`
|
||||
PassthroughRequestHeaders []string `json:"passthrough_request_headers,omitempty" structs:"passthrough_request_headers" mapstructure:"passthrough_request_headers"`
|
||||
TokenType logical.TokenType `json:"token_type" structs:"token_type" mapstructure:"token_type"`
|
||||
|
||||
// PluginName is the name of the plugin registered in the catalog.
|
||||
//
|
||||
// Deprecated: MountEntry.Type should be used instead for Vault 1.0.0 and beyond.
|
||||
PluginName string `json:"plugin_name,omitempty" structs:"plugin_name,omitempty" mapstructure:"plugin_name"`
|
||||
}
|
||||
|
||||
// APIMountConfig is an embedded struct of api.MountConfigInput
|
||||
@@ -236,12 +240,16 @@ type APIMountConfig struct {
|
||||
DefaultLeaseTTL string `json:"default_lease_ttl" structs:"default_lease_ttl" mapstructure:"default_lease_ttl"`
|
||||
MaxLeaseTTL string `json:"max_lease_ttl" structs:"max_lease_ttl" mapstructure:"max_lease_ttl"`
|
||||
ForceNoCache bool `json:"force_no_cache" structs:"force_no_cache" mapstructure:"force_no_cache"`
|
||||
PluginNameDeprecated string `json:"plugin_name,omitempty" structs:"plugin_name,omitempty" mapstructure:"plugin_name"`
|
||||
AuditNonHMACRequestKeys []string `json:"audit_non_hmac_request_keys,omitempty" structs:"audit_non_hmac_request_keys" mapstructure:"audit_non_hmac_request_keys"`
|
||||
AuditNonHMACResponseKeys []string `json:"audit_non_hmac_response_keys,omitempty" structs:"audit_non_hmac_response_keys" mapstructure:"audit_non_hmac_response_keys"`
|
||||
ListingVisibility ListingVisibilityType `json:"listing_visibility,omitempty" structs:"listing_visibility" mapstructure:"listing_visibility"`
|
||||
PassthroughRequestHeaders []string `json:"passthrough_request_headers,omitempty" structs:"passthrough_request_headers" mapstructure:"passthrough_request_headers"`
|
||||
TokenType string `json:"token_type" structs:"token_type" mapstructure:"token_type"`
|
||||
|
||||
// PluginName is the name of the plugin registered in the catalog.
|
||||
//
|
||||
// Deprecated: MountEntry.Type should be used instead for Vault 1.0.0 and beyond.
|
||||
PluginName string `json:"plugin_name,omitempty" structs:"plugin_name,omitempty" mapstructure:"plugin_name"`
|
||||
}
|
||||
|
||||
// Clone returns a deep copy of the mount entry
|
||||
@@ -1135,7 +1143,7 @@ func (c *Core) newLogicalBackend(ctx context.Context, entry *MountEntry, sysView
|
||||
|
||||
switch {
|
||||
case entry.Type == "plugin":
|
||||
conf["plugin_name"] = entry.Config.PluginNameDeprecated
|
||||
conf["plugin_name"] = entry.Config.PluginName
|
||||
default:
|
||||
conf["plugin_name"] = t
|
||||
}
|
||||
|
||||
@@ -75,7 +75,7 @@ func (c *Core) reloadMatchingPlugin(ctx context.Context, pluginName string) erro
|
||||
if ns.ID != entry.Namespace().ID {
|
||||
continue
|
||||
}
|
||||
if entry.Type == pluginName || (entry.Type == "plugin" && entry.Config.PluginNameDeprecated == pluginName) {
|
||||
if entry.Type == pluginName || (entry.Type == "plugin" && entry.Config.PluginName == pluginName) {
|
||||
err := c.reloadBackendCommon(ctx, entry, false)
|
||||
if err != nil {
|
||||
return err
|
||||
@@ -91,7 +91,7 @@ func (c *Core) reloadMatchingPlugin(ctx context.Context, pluginName string) erro
|
||||
continue
|
||||
}
|
||||
|
||||
if entry.Type == pluginName || (entry.Type == "plugin" && entry.Config.PluginNameDeprecated == pluginName) {
|
||||
if entry.Type == pluginName || (entry.Type == "plugin" && entry.Config.PluginName == pluginName) {
|
||||
err := c.reloadBackendCommon(ctx, entry, true)
|
||||
if err != nil {
|
||||
return err
|
||||
|
||||
@@ -713,7 +713,7 @@ func (c *Core) handleRequest(ctx context.Context, req *logical.Request) (retResp
|
||||
case "plugin":
|
||||
// If we are a plugin type and the plugin name is "kv" check the
|
||||
// mount entry options.
|
||||
if matchingMountEntry.Config.PluginNameDeprecated == "kv" && (matchingMountEntry.Options == nil || matchingMountEntry.Options["leased_passthrough"] != "true") {
|
||||
if matchingMountEntry.Config.PluginName == "kv" && (matchingMountEntry.Options == nil || matchingMountEntry.Options["leased_passthrough"] != "true") {
|
||||
registerLease = false
|
||||
resp.Secret.Renewable = false
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user