package postgresql import ( "context" "database/sql" "fmt" "github.com/hashicorp/vault/sdk/framework" "github.com/hashicorp/vault/sdk/logical" _ "github.com/lib/pq" ) func pathConfigConnection(b *backend) *framework.Path { return &framework.Path{ Pattern: "config/connection", Fields: map[string]*framework.FieldSchema{ "connection_url": { Type: framework.TypeString, Description: "DB connection string", }, "value": { Type: framework.TypeString, Description: `DB connection string. Use 'connection_url' instead. This will be deprecated.`, }, "verify_connection": { Type: framework.TypeBool, Default: true, Description: `If set, connection_url is verified by actually connecting to the database`, }, "max_open_connections": { Type: framework.TypeInt, Description: `Maximum number of open connections to the database; a zero uses the default value of two and a negative value means unlimited`, }, "max_idle_connections": { Type: framework.TypeInt, Description: `Maximum number of idle connections to the database; a zero uses the value of max_open_connections and a negative value disables idle connections. If larger than max_open_connections it will be reduced to the same size.`, }, }, Callbacks: map[logical.Operation]framework.OperationFunc{ logical.UpdateOperation: b.pathConnectionWrite, logical.ReadOperation: b.pathConnectionRead, }, HelpSynopsis: pathConfigConnectionHelpSyn, HelpDescription: pathConfigConnectionHelpDesc, } } // pathConnectionRead reads out the connection configuration func (b *backend) pathConnectionRead(ctx context.Context, req *logical.Request, data *framework.FieldData) (*logical.Response, error) { entry, err := req.Storage.Get(ctx, "config/connection") if err != nil { return nil, fmt.Errorf("failed to read connection configuration") } if entry == nil { return nil, nil } var config connectionConfig if err := entry.DecodeJSON(&config); err != nil { return nil, err } return &logical.Response{ Data: map[string]interface{}{ "max_open_connections": config.MaxOpenConnections, "max_idle_connections": config.MaxIdleConnections, }, }, nil } func (b *backend) pathConnectionWrite(ctx context.Context, req *logical.Request, data *framework.FieldData) (*logical.Response, error) { connValue := data.Get("value").(string) connURL := data.Get("connection_url").(string) if connURL == "" { if connValue == "" { return logical.ErrorResponse("connection_url parameter must be supplied"), nil } else { connURL = connValue } } maxOpenConns := data.Get("max_open_connections").(int) if maxOpenConns == 0 { maxOpenConns = 2 } maxIdleConns := data.Get("max_idle_connections").(int) if maxIdleConns == 0 { maxIdleConns = maxOpenConns } if maxIdleConns > maxOpenConns { maxIdleConns = maxOpenConns } // Don't check the connection_url if verification is disabled verifyConnection := data.Get("verify_connection").(bool) if verifyConnection { // Verify the string db, err := sql.Open("postgres", connURL) if err != nil { return logical.ErrorResponse(fmt.Sprintf( "Error validating connection info: %s", err)), nil } defer db.Close() if err := db.Ping(); err != nil { return logical.ErrorResponse(fmt.Sprintf( "Error validating connection info: %s", err)), nil } } // Store it entry, err := logical.StorageEntryJSON("config/connection", connectionConfig{ ConnectionString: connValue, ConnectionURL: connURL, MaxOpenConnections: maxOpenConns, MaxIdleConnections: maxIdleConns, }) if err != nil { return nil, err } if err := req.Storage.Put(ctx, entry); err != nil { return nil, err } // Reset the DB connection b.ResetDB(ctx) resp := &logical.Response{} resp.AddWarning("Read access to this endpoint should be controlled via ACLs as it will return the connection string or URL as it is, including passwords, if any.") return resp, nil } type connectionConfig struct { ConnectionURL string `json:"connection_url" structs:"connection_url" mapstructure:"connection_url"` // Deprecate "value" in coming releases ConnectionString string `json:"value" structs:"value" mapstructure:"value"` MaxOpenConnections int `json:"max_open_connections" structs:"max_open_connections" mapstructure:"max_open_connections"` MaxIdleConnections int `json:"max_idle_connections" structs:"max_idle_connections" mapstructure:"max_idle_connections"` } const pathConfigConnectionHelpSyn = ` Configure the connection string to talk to PostgreSQL. ` const pathConfigConnectionHelpDesc = ` This path configures the connection string used to connect to PostgreSQL. The value of the string can be a URL, or a PG style string in the format of "user=foo host=bar" etc. The URL looks like: "postgresql://user:pass@host:port/dbname" When configuring the connection string, the backend will verify its validity. `