4d9fa38a5e
* ui: add parameterized dispatch interface This commit adds a new interface for dispatching parameteried jobs, if the user has the right permissions. The UI can be accessed by viewing a parameterized job and clicking on the "Dispatch Job" button located in the "Job Launches" section. * fix failing lint test * clean up dispatch and remove meta This commit cleans up a few things that had typos and inconsistent naming. In line with this, the custom `meta` view was removed in favor of using the included `AttributesTable`. * ui: encode dispatch job payload and start adding tests * ui: remove unused test imports * ui: redesign job dispatch form * ui: initial acceptance tests for dispatch job * ui: generate parameterized job children with correct id format * ui: fix job dispatch breadcrumb link * ui: refactor job dispatch component into glimmer component and add form validation * ui: remove unused CSS class * ui: align job dispatch button * ui: handle namespace-specific requests on job dispatch * ui: rename payloadMissing to payloadHasError * ui: don't re-fetch job spec on dispatch job * ui: keep overview tab selected on job dispatch page * ui: fix task and task-group linting * ui: URL encode job id on dispatch job tests * ui: fix error when job meta is null * ui: handle job dispatch from adapter * ui: add more tests for dispatch job page * ui: add "job dispatch" capability check * ui: update job dispatch from code review Co-authored-by: Luiz Aoqui <luiz@hashicorp.com>
41 lines
1.2 KiB
JavaScript
41 lines
1.2 KiB
JavaScript
import AbstractAbility from './abstract';
|
|
import { computed } from '@ember/object';
|
|
import { or } from '@ember/object/computed';
|
|
|
|
export default class Job extends AbstractAbility {
|
|
@or('bypassAuthorization', 'selfTokenIsManagement', 'policiesSupportRunning')
|
|
canRun;
|
|
|
|
@or(
|
|
'bypassAuthorization',
|
|
'selfTokenIsManagement',
|
|
'policiesSupportRunning',
|
|
'policiesSupportScaling'
|
|
)
|
|
canScale;
|
|
|
|
// TODO: A person can also see all jobs if their token grants read access to all namespaces,
|
|
// but given the complexity of namespaces and policy precedence, there isn't a good quick way
|
|
// to confirm this.
|
|
@or('bypassAuthorization', 'selfTokenIsManagement')
|
|
canListAll;
|
|
|
|
@or('bypassAuthorization', 'selfTokenIsManagement', 'policiesSupportDispatching')
|
|
canDispatch;
|
|
|
|
@computed('rulesForNamespace.@each.capabilities')
|
|
get policiesSupportRunning() {
|
|
return this.namespaceIncludesCapability('submit-job');
|
|
}
|
|
|
|
@computed('rulesForNamespace.@each.capabilities')
|
|
get policiesSupportScaling() {
|
|
return this.namespaceIncludesCapability('scale-job');
|
|
}
|
|
|
|
@computed('rulesForNamespace.@each.capabilities')
|
|
get policiesSupportDispatching() {
|
|
return this.namespaceIncludesCapability('dispatch-job');
|
|
}
|
|
}
|