mirror of
				https://github.com/optim-enterprises-bv/vault.git
				synced 2025-11-03 20:17:59 +00:00 
			
		
		
		
	Change warn to trace for these messages
This commit is contained in:
		@@ -31,12 +31,12 @@ func pathRoleCreate(b *backend) *framework.Path {
 | 
			
		||||
 | 
			
		||||
func (b *backend) pathRoleCreateRead(
 | 
			
		||||
	req *logical.Request, data *framework.FieldData) (*logical.Response, error) {
 | 
			
		||||
	b.logger.Println("[WARN] postgres/pathRoleCreateRead: enter")
 | 
			
		||||
	defer b.logger.Println("[WARN] postgres/pathRoleCreateRead: exit")
 | 
			
		||||
	b.logger.Println("[TRACE] postgres/pathRoleCreateRead: enter")
 | 
			
		||||
	defer b.logger.Println("[TRACE] postgres/pathRoleCreateRead: exit")
 | 
			
		||||
	name := data.Get("name").(string)
 | 
			
		||||
 | 
			
		||||
	// Get the role
 | 
			
		||||
	b.logger.Println("[WARN] postgres/pathRoleCreateRead: getting role")
 | 
			
		||||
	b.logger.Println("[TRACE] postgres/pathRoleCreateRead: getting role")
 | 
			
		||||
	role, err := b.Role(req.Storage, name)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return nil, err
 | 
			
		||||
@@ -46,7 +46,7 @@ func (b *backend) pathRoleCreateRead(
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	// Determine if we have a lease
 | 
			
		||||
	b.logger.Println("[WARN] postgres/pathRoleCreateRead: getting lease")
 | 
			
		||||
	b.logger.Println("[TRACE] postgres/pathRoleCreateRead: getting lease")
 | 
			
		||||
	lease, err := b.Lease(req.Storage)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return nil, err
 | 
			
		||||
@@ -82,26 +82,26 @@ func (b *backend) pathRoleCreateRead(
 | 
			
		||||
		Format("2006-01-02 15:04:05-0700")
 | 
			
		||||
 | 
			
		||||
	// Get our handle
 | 
			
		||||
	b.logger.Println("[WARN] postgres/pathRoleCreateRead: getting database")
 | 
			
		||||
	b.logger.Println("[TRACE] postgres/pathRoleCreateRead: getting database handle")
 | 
			
		||||
	db, err := b.DB(req.Storage)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return nil, err
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	// Start a transaction
 | 
			
		||||
	b.logger.Println("[WARN] postgres/pathRoleCreateRead: starting transaction")
 | 
			
		||||
	b.logger.Println("[TRACE] postgres/pathRoleCreateRead: starting transaction")
 | 
			
		||||
	tx, err := db.Begin()
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return nil, err
 | 
			
		||||
	}
 | 
			
		||||
	defer func() {
 | 
			
		||||
		b.logger.Println("[WARN] postgres/pathRoleCreateRead: rolling back transaction")
 | 
			
		||||
		b.logger.Println("[TRACE] postgres/pathRoleCreateRead: rolling back transaction")
 | 
			
		||||
		tx.Rollback()
 | 
			
		||||
	}()
 | 
			
		||||
 | 
			
		||||
	// Execute each query
 | 
			
		||||
	for _, query := range SplitSQL(role.SQL) {
 | 
			
		||||
		b.logger.Println("[WARN] postgres/pathRoleCreateRead: preparing statement")
 | 
			
		||||
		b.logger.Println("[TRACE] postgres/pathRoleCreateRead: preparing statement")
 | 
			
		||||
		stmt, err := tx.Prepare(Query(query, map[string]string{
 | 
			
		||||
			"name":       username,
 | 
			
		||||
			"password":   password,
 | 
			
		||||
@@ -111,7 +111,7 @@ func (b *backend) pathRoleCreateRead(
 | 
			
		||||
			return nil, err
 | 
			
		||||
		}
 | 
			
		||||
		defer stmt.Close()
 | 
			
		||||
		b.logger.Println("[WARN] postgres/pathRoleCreateRead: executing statement")
 | 
			
		||||
		b.logger.Println("[TRACE] postgres/pathRoleCreateRead: executing statement")
 | 
			
		||||
		if _, err := stmt.Exec(); err != nil {
 | 
			
		||||
			return nil, err
 | 
			
		||||
		}
 | 
			
		||||
@@ -119,14 +119,14 @@ func (b *backend) pathRoleCreateRead(
 | 
			
		||||
 | 
			
		||||
	// Commit the transaction
 | 
			
		||||
 | 
			
		||||
	b.logger.Println("[WARN] postgres/pathRoleCreateRead: committing transaction")
 | 
			
		||||
	b.logger.Println("[TRACE] postgres/pathRoleCreateRead: committing transaction")
 | 
			
		||||
	if err := tx.Commit(); err != nil {
 | 
			
		||||
		return nil, err
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	// Return the secret
 | 
			
		||||
 | 
			
		||||
	b.logger.Println("[WARN] postgres/pathRoleCreateRead: generating secret")
 | 
			
		||||
	b.logger.Println("[TRACE] postgres/pathRoleCreateRead: generating secret")
 | 
			
		||||
	resp := b.Secret(SecretCredsType).Response(map[string]interface{}{
 | 
			
		||||
		"username": username,
 | 
			
		||||
		"password": password,
 | 
			
		||||
 
 | 
			
		||||
		Reference in New Issue
	
	Block a user