mirror of
https://github.com/optim-enterprises-bv/vault.git
synced 2025-11-02 03:27:54 +00:00
Change warn to trace for these messages
This commit is contained in:
@@ -31,12 +31,12 @@ func pathRoleCreate(b *backend) *framework.Path {
|
||||
|
||||
func (b *backend) pathRoleCreateRead(
|
||||
req *logical.Request, data *framework.FieldData) (*logical.Response, error) {
|
||||
b.logger.Println("[WARN] postgres/pathRoleCreateRead: enter")
|
||||
defer b.logger.Println("[WARN] postgres/pathRoleCreateRead: exit")
|
||||
b.logger.Println("[TRACE] postgres/pathRoleCreateRead: enter")
|
||||
defer b.logger.Println("[TRACE] postgres/pathRoleCreateRead: exit")
|
||||
name := data.Get("name").(string)
|
||||
|
||||
// Get the role
|
||||
b.logger.Println("[WARN] postgres/pathRoleCreateRead: getting role")
|
||||
b.logger.Println("[TRACE] postgres/pathRoleCreateRead: getting role")
|
||||
role, err := b.Role(req.Storage, name)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
@@ -46,7 +46,7 @@ func (b *backend) pathRoleCreateRead(
|
||||
}
|
||||
|
||||
// Determine if we have a lease
|
||||
b.logger.Println("[WARN] postgres/pathRoleCreateRead: getting lease")
|
||||
b.logger.Println("[TRACE] postgres/pathRoleCreateRead: getting lease")
|
||||
lease, err := b.Lease(req.Storage)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
@@ -82,26 +82,26 @@ func (b *backend) pathRoleCreateRead(
|
||||
Format("2006-01-02 15:04:05-0700")
|
||||
|
||||
// Get our handle
|
||||
b.logger.Println("[WARN] postgres/pathRoleCreateRead: getting database")
|
||||
b.logger.Println("[TRACE] postgres/pathRoleCreateRead: getting database handle")
|
||||
db, err := b.DB(req.Storage)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
// Start a transaction
|
||||
b.logger.Println("[WARN] postgres/pathRoleCreateRead: starting transaction")
|
||||
b.logger.Println("[TRACE] postgres/pathRoleCreateRead: starting transaction")
|
||||
tx, err := db.Begin()
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
defer func() {
|
||||
b.logger.Println("[WARN] postgres/pathRoleCreateRead: rolling back transaction")
|
||||
b.logger.Println("[TRACE] postgres/pathRoleCreateRead: rolling back transaction")
|
||||
tx.Rollback()
|
||||
}()
|
||||
|
||||
// Execute each query
|
||||
for _, query := range SplitSQL(role.SQL) {
|
||||
b.logger.Println("[WARN] postgres/pathRoleCreateRead: preparing statement")
|
||||
b.logger.Println("[TRACE] postgres/pathRoleCreateRead: preparing statement")
|
||||
stmt, err := tx.Prepare(Query(query, map[string]string{
|
||||
"name": username,
|
||||
"password": password,
|
||||
@@ -111,7 +111,7 @@ func (b *backend) pathRoleCreateRead(
|
||||
return nil, err
|
||||
}
|
||||
defer stmt.Close()
|
||||
b.logger.Println("[WARN] postgres/pathRoleCreateRead: executing statement")
|
||||
b.logger.Println("[TRACE] postgres/pathRoleCreateRead: executing statement")
|
||||
if _, err := stmt.Exec(); err != nil {
|
||||
return nil, err
|
||||
}
|
||||
@@ -119,14 +119,14 @@ func (b *backend) pathRoleCreateRead(
|
||||
|
||||
// Commit the transaction
|
||||
|
||||
b.logger.Println("[WARN] postgres/pathRoleCreateRead: committing transaction")
|
||||
b.logger.Println("[TRACE] postgres/pathRoleCreateRead: committing transaction")
|
||||
if err := tx.Commit(); err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
// Return the secret
|
||||
|
||||
b.logger.Println("[WARN] postgres/pathRoleCreateRead: generating secret")
|
||||
b.logger.Println("[TRACE] postgres/pathRoleCreateRead: generating secret")
|
||||
resp := b.Secret(SecretCredsType).Response(map[string]interface{}{
|
||||
"username": username,
|
||||
"password": password,
|
||||
|
||||
Reference in New Issue
Block a user