Steven Clark fe7eedafc3
Handle permission issue on pki health-check tune checkers (#19276)
* Handle permission issue on pki health-check tune checkers

 - Prior to this fix, if the end-user's Vault token did not have permission to the
   mount's tune api, we would return as if the tunable params had not been set.
 - Now check to see if we encountered a permission issue and report that back to
   the end-user like the other checks do.
2023-02-22 09:01:29 -05:00

56 lines
1.2 KiB
Go

package healthcheck
import (
"fmt"
"github.com/hashicorp/vault/sdk/logical"
)
func StringList(source interface{}) ([]string, error) {
if source == nil {
return nil, nil
}
if value, ok := source.([]string); ok {
return value, nil
}
if rValues, ok := source.([]interface{}); ok {
var result []string
for index, rValue := range rValues {
value, ok := rValue.(string)
if !ok {
return nil, fmt.Errorf("unknown source type for []string coercion at index %v: %T", index, rValue)
}
result = append(result, value)
}
return result, nil
}
return nil, fmt.Errorf("unknown source type for []string coercion: %T", source)
}
func fetchMountTune(e *Executor, versionError func()) (bool, *PathFetch, map[string]interface{}, error) {
tuneRet, err := e.FetchIfNotFetched(logical.ReadOperation, "/sys/mounts/{{mount}}/tune")
if err != nil {
return true, nil, nil, fmt.Errorf("failed to fetch mount tune information: %w", err)
}
if !tuneRet.IsSecretOK() {
if tuneRet.IsUnsupportedPathError() {
versionError()
}
return true, tuneRet, nil, nil
}
var data map[string]interface{} = nil
if len(tuneRet.Secret.Data) > 0 {
data = tuneRet.Secret.Data
}
return false, tuneRet, data, nil
}