mirror of
				https://github.com/optim-enterprises-bv/vault.git
				synced 2025-11-03 20:17:59 +00:00 
			
		
		
		
	* fix deadlock in root credential rotation * add more logging of errors * adding cassandra test
		
			
				
	
	
		
			88 lines
		
	
	
		
			2.2 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			88 lines
		
	
	
		
			2.2 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
package database
 | 
						|
 | 
						|
import (
 | 
						|
	"context"
 | 
						|
	"fmt"
 | 
						|
 | 
						|
	"github.com/hashicorp/vault/logical"
 | 
						|
	"github.com/hashicorp/vault/logical/framework"
 | 
						|
)
 | 
						|
 | 
						|
func pathRotateCredentials(b *databaseBackend) *framework.Path {
 | 
						|
	return &framework.Path{
 | 
						|
		Pattern: "rotate-root/" + framework.GenericNameRegex("name"),
 | 
						|
		Fields: map[string]*framework.FieldSchema{
 | 
						|
			"name": &framework.FieldSchema{
 | 
						|
				Type:        framework.TypeString,
 | 
						|
				Description: "Name of this database connection",
 | 
						|
			},
 | 
						|
		},
 | 
						|
 | 
						|
		Callbacks: map[logical.Operation]framework.OperationFunc{
 | 
						|
			logical.UpdateOperation: b.pathRotateCredentialsUpdate(),
 | 
						|
		},
 | 
						|
 | 
						|
		HelpSynopsis:    pathCredsCreateReadHelpSyn,
 | 
						|
		HelpDescription: pathCredsCreateReadHelpDesc,
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func (b *databaseBackend) pathRotateCredentialsUpdate() framework.OperationFunc {
 | 
						|
	return func(ctx context.Context, req *logical.Request, data *framework.FieldData) (*logical.Response, error) {
 | 
						|
		name := data.Get("name").(string)
 | 
						|
		if name == "" {
 | 
						|
			return logical.ErrorResponse(respErrEmptyName), nil
 | 
						|
		}
 | 
						|
 | 
						|
		config, err := b.DatabaseConfig(ctx, req.Storage, name)
 | 
						|
		if err != nil {
 | 
						|
			return nil, err
 | 
						|
		}
 | 
						|
 | 
						|
		db, err := b.GetConnection(ctx, req.Storage, name)
 | 
						|
		if err != nil {
 | 
						|
			return nil, err
 | 
						|
		}
 | 
						|
 | 
						|
		// Take out the backend lock since we are swapping out the connection
 | 
						|
		b.Lock()
 | 
						|
		defer b.Unlock()
 | 
						|
 | 
						|
		// Take the write lock on the instance
 | 
						|
		db.Lock()
 | 
						|
		defer db.Unlock()
 | 
						|
 | 
						|
		connectionDetails, err := db.RotateRootCredentials(ctx, config.RootCredentialsRotateStatements)
 | 
						|
		if err != nil {
 | 
						|
			return nil, err
 | 
						|
		}
 | 
						|
 | 
						|
		config.ConnectionDetails = connectionDetails
 | 
						|
		entry, err := logical.StorageEntryJSON(fmt.Sprintf("config/%s", name), config)
 | 
						|
		if err != nil {
 | 
						|
			return nil, err
 | 
						|
		}
 | 
						|
		if err := req.Storage.Put(ctx, entry); err != nil {
 | 
						|
			return nil, err
 | 
						|
		}
 | 
						|
 | 
						|
		// Close the plugin
 | 
						|
		db.closed = true
 | 
						|
		if err := db.Database.Close(); err != nil {
 | 
						|
			b.Logger().Error("error closing the database plugin connection", "err", err)
 | 
						|
		}
 | 
						|
		// Even on error, still remove the connection
 | 
						|
		delete(b.connections, name)
 | 
						|
 | 
						|
		return nil, nil
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
const pathRotateCredentialsUpdateHelpSyn = `
 | 
						|
Request to rotate the root credentials for a certain database connection.
 | 
						|
`
 | 
						|
 | 
						|
const pathRotateCredentialsUpdateHelpDesc = `
 | 
						|
This path attempts to rotate the root credentials for the given database. 
 | 
						|
`
 |