mirror of
				https://github.com/optim-enterprises-bv/vault.git
				synced 2025-10-31 18:48:08 +00:00 
			
		
		
		
	 c5a88aa1a6
			
		
	
	c5a88aa1a6
	
	
	
		
			
			* WIP replacing lib/pq * change timezome param to be URI format * add changelog * add changelog for redshift * update changelog * add test for DSN style connection string * more parseurl and quoteidentify to sdk; include copyright and license * call dbutil.ParseURL instead, fix import ordering Co-authored-by: Calvin Leung Huang <1883212+calvn@users.noreply.github.com>
		
			
				
	
	
		
			169 lines
		
	
	
		
			4.9 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			169 lines
		
	
	
		
			4.9 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| package postgresql
 | |
| 
 | |
| import (
 | |
| 	"context"
 | |
| 	"database/sql"
 | |
| 	"fmt"
 | |
| 
 | |
| 	"github.com/hashicorp/vault/sdk/framework"
 | |
| 	"github.com/hashicorp/vault/sdk/logical"
 | |
| 	_ "github.com/jackc/pgx/v4/stdlib"
 | |
| )
 | |
| 
 | |
| func pathConfigConnection(b *backend) *framework.Path {
 | |
| 	return &framework.Path{
 | |
| 		Pattern: "config/connection",
 | |
| 		Fields: map[string]*framework.FieldSchema{
 | |
| 			"connection_url": {
 | |
| 				Type:        framework.TypeString,
 | |
| 				Description: "DB connection string",
 | |
| 			},
 | |
| 
 | |
| 			"value": {
 | |
| 				Type: framework.TypeString,
 | |
| 				Description: `DB connection string. Use 'connection_url' instead.
 | |
| This will be deprecated.`,
 | |
| 			},
 | |
| 
 | |
| 			"verify_connection": {
 | |
| 				Type:        framework.TypeBool,
 | |
| 				Default:     true,
 | |
| 				Description: `If set, connection_url is verified by actually connecting to the database`,
 | |
| 			},
 | |
| 
 | |
| 			"max_open_connections": {
 | |
| 				Type: framework.TypeInt,
 | |
| 				Description: `Maximum number of open connections to the database;
 | |
| a zero uses the default value of two and a
 | |
| negative value means unlimited`,
 | |
| 			},
 | |
| 
 | |
| 			"max_idle_connections": {
 | |
| 				Type: framework.TypeInt,
 | |
| 				Description: `Maximum number of idle connections to the database;
 | |
| a zero uses the value of max_open_connections
 | |
| and a negative value disables idle connections.
 | |
| If larger than max_open_connections it will be
 | |
| reduced to the same size.`,
 | |
| 			},
 | |
| 		},
 | |
| 
 | |
| 		Callbacks: map[logical.Operation]framework.OperationFunc{
 | |
| 			logical.UpdateOperation: b.pathConnectionWrite,
 | |
| 			logical.ReadOperation:   b.pathConnectionRead,
 | |
| 		},
 | |
| 
 | |
| 		HelpSynopsis:    pathConfigConnectionHelpSyn,
 | |
| 		HelpDescription: pathConfigConnectionHelpDesc,
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // pathConnectionRead reads out the connection configuration
 | |
| func (b *backend) pathConnectionRead(ctx context.Context, req *logical.Request, data *framework.FieldData) (*logical.Response, error) {
 | |
| 	entry, err := req.Storage.Get(ctx, "config/connection")
 | |
| 	if err != nil {
 | |
| 		return nil, fmt.Errorf("failed to read connection configuration")
 | |
| 	}
 | |
| 	if entry == nil {
 | |
| 		return nil, nil
 | |
| 	}
 | |
| 
 | |
| 	var config connectionConfig
 | |
| 	if err := entry.DecodeJSON(&config); err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 
 | |
| 	return &logical.Response{
 | |
| 		Data: map[string]interface{}{
 | |
| 			"max_open_connections": config.MaxOpenConnections,
 | |
| 			"max_idle_connections": config.MaxIdleConnections,
 | |
| 		},
 | |
| 	}, nil
 | |
| }
 | |
| 
 | |
| func (b *backend) pathConnectionWrite(ctx context.Context, req *logical.Request, data *framework.FieldData) (*logical.Response, error) {
 | |
| 	connValue := data.Get("value").(string)
 | |
| 	connURL := data.Get("connection_url").(string)
 | |
| 	if connURL == "" {
 | |
| 		if connValue == "" {
 | |
| 			return logical.ErrorResponse("connection_url parameter must be supplied"), nil
 | |
| 		} else {
 | |
| 			connURL = connValue
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	maxOpenConns := data.Get("max_open_connections").(int)
 | |
| 	if maxOpenConns == 0 {
 | |
| 		maxOpenConns = 2
 | |
| 	}
 | |
| 
 | |
| 	maxIdleConns := data.Get("max_idle_connections").(int)
 | |
| 	if maxIdleConns == 0 {
 | |
| 		maxIdleConns = maxOpenConns
 | |
| 	}
 | |
| 	if maxIdleConns > maxOpenConns {
 | |
| 		maxIdleConns = maxOpenConns
 | |
| 	}
 | |
| 
 | |
| 	// Don't check the connection_url if verification is disabled
 | |
| 	verifyConnection := data.Get("verify_connection").(bool)
 | |
| 	if verifyConnection {
 | |
| 		// Verify the string
 | |
| 		db, err := sql.Open("pgx", connURL)
 | |
| 		if err != nil {
 | |
| 			return logical.ErrorResponse(fmt.Sprintf(
 | |
| 				"Error validating connection info: %s", err)), nil
 | |
| 		}
 | |
| 		defer db.Close()
 | |
| 		if err := db.Ping(); err != nil {
 | |
| 			return logical.ErrorResponse(fmt.Sprintf(
 | |
| 				"Error validating connection info: %s", err)), nil
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	// Store it
 | |
| 	entry, err := logical.StorageEntryJSON("config/connection", connectionConfig{
 | |
| 		ConnectionString:   connValue,
 | |
| 		ConnectionURL:      connURL,
 | |
| 		MaxOpenConnections: maxOpenConns,
 | |
| 		MaxIdleConnections: maxIdleConns,
 | |
| 	})
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	if err := req.Storage.Put(ctx, entry); err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 
 | |
| 	// Reset the DB connection
 | |
| 	b.ResetDB(ctx)
 | |
| 
 | |
| 	resp := &logical.Response{}
 | |
| 	resp.AddWarning("Read access to this endpoint should be controlled via ACLs as it will return the connection string or URL as it is, including passwords, if any.")
 | |
| 
 | |
| 	return resp, nil
 | |
| }
 | |
| 
 | |
| type connectionConfig struct {
 | |
| 	ConnectionURL string `json:"connection_url" structs:"connection_url" mapstructure:"connection_url"`
 | |
| 	// Deprecate "value" in coming releases
 | |
| 	ConnectionString   string `json:"value" structs:"value" mapstructure:"value"`
 | |
| 	MaxOpenConnections int    `json:"max_open_connections" structs:"max_open_connections" mapstructure:"max_open_connections"`
 | |
| 	MaxIdleConnections int    `json:"max_idle_connections" structs:"max_idle_connections" mapstructure:"max_idle_connections"`
 | |
| }
 | |
| 
 | |
| const pathConfigConnectionHelpSyn = `
 | |
| Configure the connection string to talk to PostgreSQL.
 | |
| `
 | |
| 
 | |
| const pathConfigConnectionHelpDesc = `
 | |
| This path configures the connection string used to connect to PostgreSQL.
 | |
| The value of the string can be a URL, or a PG style string in the
 | |
| format of "user=foo host=bar" etc.
 | |
| 
 | |
| The URL looks like:
 | |
| "postgresql://user:pass@host:port/dbname"
 | |
| 
 | |
| When configuring the connection string, the backend will verify its validity.
 | |
| `
 |