165 lines
4.7 KiB
Go
165 lines
4.7 KiB
Go
package database
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"time"
|
|
|
|
v4 "github.com/hashicorp/vault/sdk/database/dbplugin"
|
|
v5 "github.com/hashicorp/vault/sdk/database/dbplugin/v5"
|
|
"github.com/hashicorp/vault/sdk/framework"
|
|
"github.com/hashicorp/vault/sdk/logical"
|
|
)
|
|
|
|
const SecretCredsType = "creds"
|
|
|
|
func secretCreds(b *databaseBackend) *framework.Secret {
|
|
return &framework.Secret{
|
|
Type: SecretCredsType,
|
|
Fields: map[string]*framework.FieldSchema{},
|
|
|
|
Renew: b.secretCredsRenew(),
|
|
Revoke: b.secretCredsRevoke(),
|
|
}
|
|
}
|
|
|
|
func (b *databaseBackend) secretCredsRenew() framework.OperationFunc {
|
|
return func(ctx context.Context, req *logical.Request, data *framework.FieldData) (*logical.Response, error) {
|
|
// Get the username from the internal data
|
|
usernameRaw, ok := req.Secret.InternalData["username"]
|
|
if !ok {
|
|
return nil, fmt.Errorf("secret is missing username internal data")
|
|
}
|
|
username, ok := usernameRaw.(string)
|
|
|
|
roleNameRaw, ok := req.Secret.InternalData["role"]
|
|
if !ok {
|
|
return nil, fmt.Errorf("could not find role with name: %q", req.Secret.InternalData["role"])
|
|
}
|
|
|
|
role, err := b.Role(ctx, req.Storage, roleNameRaw.(string))
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
if role == nil {
|
|
return nil, fmt.Errorf("error during renew: could not find role with name %q", req.Secret.InternalData["role"])
|
|
}
|
|
|
|
// Get the Database object
|
|
dbi, err := b.GetConnection(ctx, req.Storage, role.DBName)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
dbi.RLock()
|
|
defer dbi.RUnlock()
|
|
|
|
// Make sure we increase the VALID UNTIL endpoint for this user.
|
|
ttl, _, err := framework.CalculateTTL(b.System(), req.Secret.Increment, role.DefaultTTL, 0, role.MaxTTL, 0, req.Secret.IssueTime)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
if ttl > 0 {
|
|
expireTime := time.Now().Add(ttl)
|
|
// Adding a small buffer since the TTL will be calculated again after this call
|
|
// to ensure the database credential does not expire before the lease
|
|
expireTime = expireTime.Add(5 * time.Second)
|
|
|
|
updateReq := v5.UpdateUserRequest{
|
|
Username: username,
|
|
Expiration: &v5.ChangeExpiration{
|
|
NewExpiration: expireTime,
|
|
Statements: v5.Statements{
|
|
Commands: role.Statements.Renewal,
|
|
},
|
|
},
|
|
}
|
|
_, err := dbi.database.UpdateUser(ctx, updateReq, false)
|
|
if err != nil {
|
|
b.CloseIfShutdown(dbi, err)
|
|
return nil, err
|
|
}
|
|
}
|
|
resp := &logical.Response{Secret: req.Secret}
|
|
resp.Secret.TTL = role.DefaultTTL
|
|
resp.Secret.MaxTTL = role.MaxTTL
|
|
return resp, nil
|
|
}
|
|
}
|
|
|
|
func (b *databaseBackend) secretCredsRevoke() framework.OperationFunc {
|
|
return func(ctx context.Context, req *logical.Request, data *framework.FieldData) (*logical.Response, error) {
|
|
// Get the username from the internal data
|
|
usernameRaw, ok := req.Secret.InternalData["username"]
|
|
if !ok {
|
|
return nil, fmt.Errorf("secret is missing username internal data")
|
|
}
|
|
username, ok := usernameRaw.(string)
|
|
|
|
var resp *logical.Response
|
|
|
|
roleNameRaw, ok := req.Secret.InternalData["role"]
|
|
if !ok {
|
|
return nil, fmt.Errorf("no role name was provided")
|
|
}
|
|
|
|
var dbName string
|
|
var statements v4.Statements
|
|
|
|
role, err := b.Role(ctx, req.Storage, roleNameRaw.(string))
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
if role != nil {
|
|
dbName = role.DBName
|
|
statements = role.Statements
|
|
} else {
|
|
dbNameRaw, ok := req.Secret.InternalData["db_name"]
|
|
if !ok {
|
|
return nil, fmt.Errorf("error during revoke: could not find role with name %q or embedded revocation db name data", req.Secret.InternalData["role"])
|
|
}
|
|
dbName = dbNameRaw.(string)
|
|
|
|
statementsRaw, ok := req.Secret.InternalData["revocation_statements"]
|
|
if !ok {
|
|
return nil, fmt.Errorf("error during revoke: could not find role with name %q or embedded revocation statement data", req.Secret.InternalData["role"])
|
|
}
|
|
|
|
// If we don't actually have any statements, because none were
|
|
// set in the role, we'll end up with an empty one and the
|
|
// default for the db type will be attempted
|
|
if statementsRaw != nil {
|
|
statementsSlice, ok := statementsRaw.([]interface{})
|
|
if !ok {
|
|
return nil, fmt.Errorf("error during revoke: could not find role with name %q and embedded reovcation data could not be read", req.Secret.InternalData["role"])
|
|
}
|
|
for _, v := range statementsSlice {
|
|
statements.Revocation = append(statements.Revocation, v.(string))
|
|
}
|
|
}
|
|
}
|
|
|
|
// Get our connection
|
|
dbi, err := b.GetConnection(ctx, req.Storage, dbName)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
dbi.RLock()
|
|
defer dbi.RUnlock()
|
|
|
|
deleteReq := v5.DeleteUserRequest{
|
|
Username: username,
|
|
Statements: v5.Statements{
|
|
Commands: statements.Revocation,
|
|
},
|
|
}
|
|
_, err = dbi.database.DeleteUser(ctx, deleteReq)
|
|
if err != nil {
|
|
b.CloseIfShutdown(dbi, err)
|
|
return nil, err
|
|
}
|
|
return resp, nil
|
|
}
|
|
}
|