open-vault/ui/app/routes/vault/cluster/policies/index.js

82 lines
2.1 KiB
JavaScript
Raw Normal View History

import { inject as service } from '@ember/service';
import Route from '@ember/routing/route';
2018-04-03 14:16:57 +00:00
import ClusterRoute from 'vault/mixins/cluster-route';
UI - add kmip engine (#6936) * add kmip engine * adjust where kmip engine is mounted and sketch out routes * add secret mount path service to share params to engines * move list-controller and list-route mixins to core addon and adjust imports * properly link kmip secrets from the secrets list page * tweak routes and add list controllers * stub out some models and adapters * fix mixin exports * move a bunch of components into the core addon * use new empty yield in list-view in the namespace template * scopes list using list-view and list-item components * simplify and flatten routes, templates for all of the list pages * role show route and template and scope create template * add ember-router-helpers * add more packages to the dependencies of the core addon * add field-group-show component for listing fields from a model * move more components to the shared addon * make configure and configuration routes work and save a generated model * save and list scopes * role create, list, read * list credentials properly * move allowed attributes to field group * show allowed operations on role details page * add kmip logo to mount secrets engine list page * add role edit page * show all model attributes on role show page * enable role edit * fix newFields error by creating open api role model on the role list route * only show selected fields on role edit page * do not send scope and backend attrs to api * move path-or-array to core addon * move string-list component to core addon * remove extra top border when there is only one field group * add icons for all of the list pages * update kmip config model so defaultValue doesn't error * generate credentials * credential create and show * only show kmip when feature is enabled * fix saving of TTL fields generated from Open API * move masked-input and list-pagination components to core addon * add param on edit form to allow for calling onSave after render happens * polish credential show page and redirect there after generating credentials * add externalLink for kmip engine * add kmip-breadcrumb component * use kmip-breadcrumb component * add linkPrefix param to linked-block component to allow for routing programmatically inside an engine * redirect to the right place when enabling kmip * fix linting * review feedback * update signature for path-help usage * fix ttl field expansion test * remove role filed from role form, fix generate redirect * remove field-group-show because it's in the core addon * remove bottom rule from show pages * fix Max TTL displayAttrs for ssh role * update edit-form to take fields or attrs * fix linting * remove listenAddrs and set default val on ttl if a val is passed in
2019-06-21 21:05:45 +00:00
import ListRoute from 'core/mixins/list-route';
2018-04-03 14:16:57 +00:00
export default Route.extend(ClusterRoute, ListRoute, {
version: service(),
wizard: service(),
2018-04-03 14:16:57 +00:00
2018-08-28 05:03:55 +00:00
activate() {
if (this.get('wizard.featureState') === 'details') {
this.get('wizard').transitionFeatureMachine('details', 'CONTINUE', this.policyType());
}
},
2018-04-03 14:16:57 +00:00
shouldReturnEmptyModel(policyType, version) {
return policyType !== 'acl' && (version.get('isOSS') || !version.get('hasSentinel'));
2018-04-03 14:16:57 +00:00
},
model(params) {
let policyType = this.policyType();
if (this.shouldReturnEmptyModel(policyType, this.get('version'))) {
return;
}
return this.store
.lazyPaginatedQuery(`policy/${policyType}`, {
page: params.page,
pageFilter: params.pageFilter,
responsePath: 'data.keys',
})
.catch(err => {
// acls will never be empty, but sentinel policies can be
if (err.httpStatus === 404 && this.policyType() !== 'acl') {
return [];
} else {
throw err;
}
});
},
setupController(controller, model) {
const params = this.paramsFor(this.routeName);
if (!model) {
controller.setProperties({
model: null,
policyType: this.policyType(),
});
return;
}
controller.setProperties({
model,
filter: params.pageFilter || '',
page: model.get('meta.currentPage') || 1,
policyType: this.policyType(),
});
},
resetController(controller, isExiting) {
this._super(...arguments);
if (isExiting) {
controller.set('filter', '');
}
},
actions: {
willTransition(transition) {
window.scrollTo(0, 0);
if (!transition || transition.targetName !== this.routeName) {
this.store.clearAllDatasets();
}
return true;
},
reload() {
this.store.clearAllDatasets();
this.refresh();
},
2018-04-03 14:16:57 +00:00
},
policyType() {
return this.paramsFor('vault.cluster.policies').type;
},
});