03cf302e9a
* logbridge with hclog and identical output * Initial search & replace This compiles, but there is a fair amount of TODO and commented out code, especially around the plugin logclient/logserver code. * strip logbridge * fix majority of tests * update logxi aliases * WIP fixing tests * more test fixes * Update test to hclog * Fix format * Rename hclog -> log * WIP making hclog and logxi love each other * update logger_test.go * clean up merged comments * Replace RawLogger interface with a Logger * Add some logger names * Replace Trace with Debug * update builtin logical logging patterns * Fix build errors * More log updates * update log approach in command and builtin * More log updates * update helper, http, and logical directories * Update loggers * Log updates * Update logging * Update logging * Update logging * Update logging * update logging in physical * prefixing and lowercase * Update logging * Move phyisical logging name to server command * Fix som tests * address jims feedback so far * incorporate brians feedback so far * strip comments * move vault.go to logging package * update Debug to Trace * Update go-plugin deps * Update logging based on review comments * Updates from review * Unvendor logxi * Remove null_logger.go
56 lines
1.4 KiB
Go
56 lines
1.4 KiB
Go
package vault
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"strings"
|
|
"time"
|
|
)
|
|
|
|
// tuneMount is used to set config on a mount point
|
|
func (b *SystemBackend) tuneMountTTLs(ctx context.Context, path string, me *MountEntry, newDefault, newMax time.Duration) error {
|
|
zero := time.Duration(0)
|
|
|
|
switch {
|
|
case newDefault == zero && newMax == zero:
|
|
// No checks needed
|
|
|
|
case newDefault == zero && newMax != zero:
|
|
// No default/max conflict, no checks needed
|
|
|
|
case newDefault != zero && newMax == zero:
|
|
// No default/max conflict, no checks needed
|
|
|
|
case newDefault != zero && newMax != zero:
|
|
if newMax < newDefault {
|
|
return fmt.Errorf("backend max lease TTL of %d would be less than backend default lease TTL of %d",
|
|
int(newMax.Seconds()), int(newDefault.Seconds()))
|
|
}
|
|
}
|
|
|
|
origMax := me.Config.MaxLeaseTTL
|
|
origDefault := me.Config.DefaultLeaseTTL
|
|
|
|
me.Config.MaxLeaseTTL = newMax
|
|
me.Config.DefaultLeaseTTL = newDefault
|
|
|
|
// Update the mount table
|
|
var err error
|
|
switch {
|
|
case strings.HasPrefix(path, credentialRoutePrefix):
|
|
err = b.Core.persistAuth(ctx, b.Core.auth, me.Local)
|
|
default:
|
|
err = b.Core.persistMounts(ctx, b.Core.mounts, me.Local)
|
|
}
|
|
if err != nil {
|
|
me.Config.MaxLeaseTTL = origMax
|
|
me.Config.DefaultLeaseTTL = origDefault
|
|
return fmt.Errorf("failed to update mount table, rolling back TTL changes")
|
|
}
|
|
if b.Core.logger.IsInfo() {
|
|
b.Core.logger.Info("mount tuning of leases successful", "path", path)
|
|
}
|
|
|
|
return nil
|
|
}
|