2016-12-19 18:15:58 +00:00
package database
import (
"fmt"
"github.com/fatih/structs"
"github.com/hashicorp/vault/builtin/logical/database/dbs"
"github.com/hashicorp/vault/logical"
"github.com/hashicorp/vault/logical/framework"
_ "github.com/lib/pq"
)
func pathConfigConnection ( b * databaseBackend ) * framework . Path {
return & framework . Path {
Pattern : fmt . Sprintf ( "dbs/%s" , framework . GenericNameRegex ( "name" ) ) ,
Fields : map [ string ] * framework . FieldSchema {
"name" : & framework . FieldSchema {
Type : framework . TypeString ,
Description : "Name of this DB type" ,
} ,
"connection_type" : & framework . FieldSchema {
Type : framework . TypeString ,
Description : "DB type (e.g. postgres)" ,
} ,
"connection_url" : & framework . FieldSchema {
Type : framework . TypeString ,
Description : "DB connection string" ,
} ,
"connection_details" : & framework . FieldSchema {
Type : framework . TypeMap ,
Description : "Connection details for specified connection type." ,
} ,
"verify_connection" : & framework . FieldSchema {
Type : framework . TypeBool ,
Default : true ,
Description : ` If set, connection_url is verified by actually connecting to the database ` ,
} ,
"max_open_connections" : & framework . FieldSchema {
Type : framework . TypeInt ,
Description : ` Maximum number of open connections to the database ;
a zero uses the default value of two and a
negative value means unlimited ` ,
} ,
"max_idle_connections" : & framework . FieldSchema {
Type : framework . TypeInt ,
Description : ` Maximum number of idle connections to the database ;
a zero uses the value of max_open_connections
and a negative value disables idle connections .
If larger than max_open_connections it will be
reduced to the same size . ` ,
} ,
} ,
Callbacks : map [ logical . Operation ] framework . OperationFunc {
logical . UpdateOperation : b . pathConnectionWrite ,
logical . ReadOperation : b . pathConnectionRead ,
} ,
HelpSynopsis : pathConfigConnectionHelpSyn ,
HelpDescription : pathConfigConnectionHelpDesc ,
}
}
// pathConnectionRead reads out the connection configuration
func ( b * databaseBackend ) pathConnectionRead ( req * logical . Request , data * framework . FieldData ) ( * logical . Response , error ) {
name := data . Get ( "name" ) . ( string )
entry , err := req . Storage . Get ( fmt . Sprintf ( "dbs/%s" , name ) )
if err != nil {
return nil , fmt . Errorf ( "failed to read connection configuration" )
}
if entry == nil {
return nil , nil
}
2016-12-20 19:46:20 +00:00
var config dbs . DatabaseConfig
2016-12-19 18:15:58 +00:00
if err := entry . DecodeJSON ( & config ) ; err != nil {
return nil , err
}
return & logical . Response {
Data : structs . New ( config ) . Map ( ) ,
} , nil
}
func ( b * databaseBackend ) pathConnectionWrite ( req * logical . Request , data * framework . FieldData ) ( * logical . Response , error ) {
connType := data . Get ( "connection_type" ) . ( string )
2016-12-20 19:46:20 +00:00
connDetails := data . Get ( "connection_details" ) . ( map [ string ] interface { } )
2016-12-19 18:15:58 +00:00
maxOpenConns := data . Get ( "max_open_connections" ) . ( int )
if maxOpenConns == 0 {
maxOpenConns = 2
}
maxIdleConns := data . Get ( "max_idle_connections" ) . ( int )
if maxIdleConns == 0 {
maxIdleConns = maxOpenConns
}
if maxIdleConns > maxOpenConns {
maxIdleConns = maxOpenConns
}
2016-12-20 19:46:20 +00:00
config := & dbs . DatabaseConfig {
DatabaseType : connType ,
ConnectionDetails : connDetails ,
2016-12-19 18:15:58 +00:00
MaxOpenConnections : maxOpenConns ,
MaxIdleConnections : maxIdleConns ,
}
name := data . Get ( "name" ) . ( string )
// Grab the mutex lock
b . Lock ( )
defer b . Unlock ( )
var err error
var db dbs . DatabaseType
if _ , ok := b . connections [ name ] ; ok {
// Don't allow the connection type to change
if b . connections [ name ] . Type ( ) != connType {
return logical . ErrorResponse ( "can not change type of existing connection" ) , nil
}
db = b . connections [ name ]
} else {
db , err = dbs . Factory ( config )
if err != nil {
return logical . ErrorResponse ( fmt . Sprintf ( "Error creating database object: %s" , err ) ) , nil
}
}
/ *
// Don't check the connection_url if verification is disabled
verifyConnection := data . Get ( "verify_connection" ) . ( bool )
if verifyConnection {
// Verify the string
db , err := sql . Open ( "postgres" , connURL )
if err != nil {
return logical . ErrorResponse ( fmt . Sprintf (
"Error validating connection info: %s" , err ) ) , nil
}
defer db . Close ( )
if err := db . Ping ( ) ; err != nil {
return logical . ErrorResponse ( fmt . Sprintf (
"Error validating connection info: %s" , err ) ) , nil
}
}
* /
// Store it
entry , err := logical . StorageEntryJSON ( fmt . Sprintf ( "dbs/%s" , name ) , config )
if err != nil {
return nil , err
}
if err := req . Storage . Put ( entry ) ; err != nil {
return nil , err
}
// Reset the DB connection
db . Reset ( config )
b . connections [ name ] = db
resp := & logical . Response { }
resp . AddWarning ( "Read access to this endpoint should be controlled via ACLs as it will return the connection string or URL as it is, including passwords, if any." )
return resp , nil
}
const pathConfigConnectionHelpSyn = `
Configure the connection string to talk to PostgreSQL .
`
const pathConfigConnectionHelpDesc = `
This path configures the connection string used to connect to PostgreSQL .
The value of the string can be a URL , or a PG style string in the
format of "user=foo host=bar" etc .
The URL looks like :
"postgresql://user:pass@host:port/dbname"
When configuring the connection string , the backend will verify its validity .
`