mirror of
				https://github.com/optim-enterprises-bv/vault.git
				synced 2025-11-04 04:28:08 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			188 lines
		
	
	
		
			6.7 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			188 lines
		
	
	
		
			6.7 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
// Copyright (c) HashiCorp, Inc.
 | 
						|
// SPDX-License-Identifier: MPL-2.0
 | 
						|
 | 
						|
package dbplugin
 | 
						|
 | 
						|
import (
 | 
						|
	"context"
 | 
						|
	"fmt"
 | 
						|
	"time"
 | 
						|
 | 
						|
	"google.golang.org/grpc"
 | 
						|
 | 
						|
	"github.com/hashicorp/errwrap"
 | 
						|
	log "github.com/hashicorp/go-hclog"
 | 
						|
	plugin "github.com/hashicorp/go-plugin"
 | 
						|
	"github.com/hashicorp/vault/sdk/helper/consts"
 | 
						|
	"github.com/hashicorp/vault/sdk/helper/pluginutil"
 | 
						|
)
 | 
						|
 | 
						|
// Database is the interface that all database objects must implement.
 | 
						|
type Database interface {
 | 
						|
	// Type returns the TypeName for the particular database backend
 | 
						|
	// implementation. This type name is usually set as a constant within the
 | 
						|
	// database backend implementation, e.g. "mysql" for the MySQL database
 | 
						|
	// backend.
 | 
						|
	Type() (string, error)
 | 
						|
 | 
						|
	// CreateUser is called on `$ vault read database/creds/:role-name` and it's
 | 
						|
	// also the first time anything is touched from `$ vault write
 | 
						|
	// database/roles/:role-name`. This is likely to be the highest-throughput
 | 
						|
	// method for most plugins.
 | 
						|
	CreateUser(ctx context.Context, statements Statements, usernameConfig UsernameConfig, expiration time.Time) (username string, password string, err error)
 | 
						|
 | 
						|
	// RenewUser is triggered by a renewal call to the API. In many database
 | 
						|
	// backends, this triggers a call on the underlying database that extends a
 | 
						|
	// VALID UNTIL clause on a user. However, if no such need exists, setting
 | 
						|
	// this as a NO-OP means that when renewal is called, the lease renewal time
 | 
						|
	// is pushed further out as appropriate, thus pushing out the time until the
 | 
						|
	// RevokeUser method is called.
 | 
						|
	RenewUser(ctx context.Context, statements Statements, username string, expiration time.Time) error
 | 
						|
 | 
						|
	// RevokeUser is triggered either automatically by a lease expiration, or by
 | 
						|
	// a revocation call to the API.
 | 
						|
	RevokeUser(ctx context.Context, statements Statements, username string) error
 | 
						|
 | 
						|
	// RotateRootCredentials is triggered by a root credential rotation call to
 | 
						|
	// the API.
 | 
						|
	RotateRootCredentials(ctx context.Context, statements []string) (config map[string]interface{}, err error)
 | 
						|
 | 
						|
	// GenerateCredentials returns a generated password for the plugin. This is
 | 
						|
	// used in combination with SetCredentials to set a specific password for a
 | 
						|
	// database user and preserve the password in WAL entries.
 | 
						|
	GenerateCredentials(ctx context.Context) (string, error)
 | 
						|
 | 
						|
	// SetCredentials uses provided information to create or set the credentials
 | 
						|
	// for a database user. Unlike CreateUser, this method requires both a
 | 
						|
	// username and a password given instead of generating them. This is used for
 | 
						|
	// creating and setting the password of static accounts, as well as rolling
 | 
						|
	// back passwords in the database in the event an updated database fails to
 | 
						|
	// save in Vault's storage.
 | 
						|
	SetCredentials(ctx context.Context, statements Statements, staticConfig StaticUserConfig) (username string, password string, err error)
 | 
						|
 | 
						|
	// Init is called on `$ vault write database/config/:db-name`, or when you
 | 
						|
	// do a creds call after Vault's been restarted. The config provided won't
 | 
						|
	// hold all the keys and values provided in the API call, some will be
 | 
						|
	// stripped by the database engine before the config is provided. The config
 | 
						|
	// returned will be stored, which will persist it across shutdowns.
 | 
						|
	Init(ctx context.Context, config map[string]interface{}, verifyConnection bool) (saveConfig map[string]interface{}, err error)
 | 
						|
 | 
						|
	// Close attempts to close the underlying database connection that was
 | 
						|
	// established by the backend.
 | 
						|
	Close() error
 | 
						|
}
 | 
						|
 | 
						|
// PluginFactory is used to build plugin database types. It wraps the database
 | 
						|
// object in a logging and metrics middleware.
 | 
						|
func PluginFactory(ctx context.Context, pluginName string, pluginVersion string, sys pluginutil.LookRunnerUtil, logger log.Logger) (Database, error) {
 | 
						|
	return PluginFactoryVersion(ctx, pluginName, "", sys, logger)
 | 
						|
}
 | 
						|
 | 
						|
// PluginFactory is used to build plugin database types with a version specified.
 | 
						|
// It wraps the database object in a logging and metrics middleware.
 | 
						|
func PluginFactoryVersion(ctx context.Context, pluginName string, pluginVersion string, sys pluginutil.LookRunnerUtil, logger log.Logger) (Database, error) {
 | 
						|
	// Look for plugin in the plugin catalog
 | 
						|
	pluginRunner, err := sys.LookupPluginVersion(ctx, pluginName, consts.PluginTypeDatabase, pluginVersion)
 | 
						|
	if err != nil {
 | 
						|
		return nil, err
 | 
						|
	}
 | 
						|
 | 
						|
	namedLogger := logger.Named(pluginName)
 | 
						|
 | 
						|
	var transport string
 | 
						|
	var db Database
 | 
						|
	if pluginRunner.Builtin {
 | 
						|
		// Plugin is builtin so we can retrieve an instance of the interface
 | 
						|
		// from the pluginRunner. Then cast it to a Database.
 | 
						|
		dbRaw, err := pluginRunner.BuiltinFactory()
 | 
						|
		if err != nil {
 | 
						|
			return nil, errwrap.Wrapf("error initializing plugin: {{err}}", err)
 | 
						|
		}
 | 
						|
 | 
						|
		var ok bool
 | 
						|
		db, ok = dbRaw.(Database)
 | 
						|
		if !ok {
 | 
						|
			return nil, fmt.Errorf("unsupported database type: %q", pluginName)
 | 
						|
		}
 | 
						|
 | 
						|
		transport = "builtin"
 | 
						|
 | 
						|
	} else {
 | 
						|
		// create a DatabasePluginClient instance
 | 
						|
		db, err = NewPluginClient(ctx, sys, pluginRunner, namedLogger, false)
 | 
						|
		if err != nil {
 | 
						|
			return nil, err
 | 
						|
		}
 | 
						|
 | 
						|
		// Switch on the underlying database client type to get the transport
 | 
						|
		// method.
 | 
						|
		switch db.(*DatabasePluginClient).Database.(type) {
 | 
						|
		case *gRPCClient:
 | 
						|
			transport = "gRPC"
 | 
						|
		}
 | 
						|
 | 
						|
	}
 | 
						|
 | 
						|
	typeStr, err := db.Type()
 | 
						|
	if err != nil {
 | 
						|
		return nil, errwrap.Wrapf("error getting plugin type: {{err}}", err)
 | 
						|
	}
 | 
						|
 | 
						|
	// Wrap with metrics middleware
 | 
						|
	db = &databaseMetricsMiddleware{
 | 
						|
		next:    db,
 | 
						|
		typeStr: typeStr,
 | 
						|
	}
 | 
						|
 | 
						|
	// Wrap with tracing middleware
 | 
						|
	if namedLogger.IsTrace() {
 | 
						|
		db = &databaseTracingMiddleware{
 | 
						|
			next:   db,
 | 
						|
			logger: namedLogger.With("transport", transport),
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	return db, nil
 | 
						|
}
 | 
						|
 | 
						|
// handshakeConfigs are used to just do a basic handshake between
 | 
						|
// a plugin and host. If the handshake fails, a user friendly error is shown.
 | 
						|
// This prevents users from executing bad plugins or executing a plugin
 | 
						|
// directory. It is a UX feature, not a security feature.
 | 
						|
var handshakeConfig = plugin.HandshakeConfig{
 | 
						|
	ProtocolVersion:  4,
 | 
						|
	MagicCookieKey:   "VAULT_DATABASE_PLUGIN",
 | 
						|
	MagicCookieValue: "926a0820-aea2-be28-51d6-83cdf00e8edb",
 | 
						|
}
 | 
						|
 | 
						|
var (
 | 
						|
	_ plugin.Plugin     = &GRPCDatabasePlugin{}
 | 
						|
	_ plugin.GRPCPlugin = &GRPCDatabasePlugin{}
 | 
						|
)
 | 
						|
 | 
						|
// GRPCDatabasePlugin is the plugin.Plugin implementation that only supports GRPC
 | 
						|
// transport
 | 
						|
type GRPCDatabasePlugin struct {
 | 
						|
	Impl Database
 | 
						|
 | 
						|
	// Embeding this will disable the netRPC protocol
 | 
						|
	plugin.NetRPCUnsupportedPlugin
 | 
						|
}
 | 
						|
 | 
						|
func (d GRPCDatabasePlugin) GRPCServer(_ *plugin.GRPCBroker, s *grpc.Server) error {
 | 
						|
	impl := &DatabaseErrorSanitizerMiddleware{
 | 
						|
		next: d.Impl,
 | 
						|
	}
 | 
						|
 | 
						|
	RegisterDatabaseServer(s, &gRPCServer{impl: impl})
 | 
						|
	return nil
 | 
						|
}
 | 
						|
 | 
						|
func (GRPCDatabasePlugin) GRPCClient(doneCtx context.Context, _ *plugin.GRPCBroker, c *grpc.ClientConn) (interface{}, error) {
 | 
						|
	return &gRPCClient{
 | 
						|
		client:     NewDatabaseClient(c),
 | 
						|
		clientConn: c,
 | 
						|
		doneCtx:    doneCtx,
 | 
						|
	}, nil
 | 
						|
}
 |