2023-03-15 16:00:52 +00:00
|
|
|
/**
|
|
|
|
* Copyright (c) HashiCorp, Inc.
|
|
|
|
* SPDX-License-Identifier: MPL-2.0
|
|
|
|
*/
|
|
|
|
|
2022-04-20 18:40:27 +00:00
|
|
|
import Model, { attr } from '@ember-data/model';
|
|
|
|
import { tracked } from '@glimmer/tracking';
|
|
|
|
import { expandAttributeMeta } from 'vault/utils/field-to-attrs';
|
|
|
|
import { withModelValidations } from 'vault/decorators/model-validations';
|
2022-04-26 14:23:31 +00:00
|
|
|
import lazyCapabilities, { apiPath } from 'vault/macros/lazy-capabilities';
|
2022-10-18 15:46:02 +00:00
|
|
|
import { inject as service } from '@ember/service';
|
2022-04-20 18:40:27 +00:00
|
|
|
|
|
|
|
const CRED_PROPS = {
|
|
|
|
azurekeyvault: ['client_id', 'client_secret', 'tenant_id'],
|
|
|
|
awskms: ['access_key', 'secret_key', 'session_token', 'endpoint'],
|
|
|
|
gcpckms: ['service_account_file'],
|
|
|
|
};
|
2022-10-18 15:46:02 +00:00
|
|
|
|
2022-04-20 18:40:27 +00:00
|
|
|
const OPTIONAL_CRED_PROPS = ['session_token', 'endpoint'];
|
2022-10-18 15:46:02 +00:00
|
|
|
|
2022-04-20 18:40:27 +00:00
|
|
|
// since we have dynamic credential attributes based on provider we need a dynamic presence validator
|
|
|
|
// add validators for all cred props and return true for value if not associated with selected provider
|
|
|
|
const credValidators = Object.keys(CRED_PROPS).reduce((obj, providerKey) => {
|
|
|
|
CRED_PROPS[providerKey].forEach((prop) => {
|
|
|
|
if (!OPTIONAL_CRED_PROPS.includes(prop)) {
|
|
|
|
obj[`credentials.${prop}`] = [
|
|
|
|
{
|
|
|
|
message: `${prop} is required`,
|
|
|
|
validator(model) {
|
|
|
|
return model.credentialProps.includes(prop) ? model.credentials[prop] : true;
|
|
|
|
},
|
|
|
|
},
|
|
|
|
];
|
|
|
|
}
|
|
|
|
});
|
|
|
|
return obj;
|
|
|
|
}, {});
|
2022-10-18 15:46:02 +00:00
|
|
|
|
2022-04-20 18:40:27 +00:00
|
|
|
const validations = {
|
|
|
|
name: [{ type: 'presence', message: 'Provider name is required' }],
|
|
|
|
keyCollection: [{ type: 'presence', message: 'Key Vault instance name' }],
|
|
|
|
...credValidators,
|
|
|
|
};
|
2022-10-18 15:46:02 +00:00
|
|
|
|
2022-04-20 18:40:27 +00:00
|
|
|
@withModelValidations(validations)
|
|
|
|
export default class KeymgmtProviderModel extends Model {
|
2022-10-18 15:46:02 +00:00
|
|
|
@service store;
|
2022-04-20 18:40:27 +00:00
|
|
|
@attr('string') backend;
|
|
|
|
@attr('string', {
|
|
|
|
label: 'Provider name',
|
|
|
|
subText: 'This is the name of the provider that will be displayed in Vault. This cannot be edited later.',
|
|
|
|
})
|
|
|
|
name;
|
|
|
|
|
|
|
|
@attr('string', {
|
|
|
|
label: 'Type',
|
|
|
|
subText: 'Choose the provider type.',
|
|
|
|
possibleValues: ['azurekeyvault', 'awskms', 'gcpckms'],
|
2022-05-20 15:41:24 +00:00
|
|
|
noDefault: true,
|
2022-04-20 18:40:27 +00:00
|
|
|
})
|
|
|
|
provider;
|
|
|
|
|
|
|
|
@attr('string', {
|
|
|
|
label: 'Key Vault instance name',
|
|
|
|
subText: 'The name of a Key Vault instance must be supplied. This cannot be edited later.',
|
|
|
|
})
|
|
|
|
keyCollection;
|
|
|
|
|
|
|
|
idPrefix = 'provider/';
|
|
|
|
type = 'provider';
|
|
|
|
|
|
|
|
@tracked keys = [];
|
|
|
|
@tracked credentials = null; // never returned from API -- set only during create/edit
|
|
|
|
|
|
|
|
get icon() {
|
|
|
|
return {
|
|
|
|
azurekeyvault: 'azure-color',
|
|
|
|
awskms: 'aws-color',
|
|
|
|
gcpckms: 'gcp-color',
|
|
|
|
}[this.provider];
|
|
|
|
}
|
|
|
|
get typeName() {
|
|
|
|
return {
|
|
|
|
azurekeyvault: 'Azure Key Vault',
|
|
|
|
awskms: 'AWS Key Management Service',
|
|
|
|
gcpckms: 'Google Cloud Key Management Service',
|
|
|
|
}[this.provider];
|
|
|
|
}
|
|
|
|
get showFields() {
|
2022-05-20 15:41:24 +00:00
|
|
|
const attrs = expandAttributeMeta(this, ['name', 'keyCollection']);
|
2022-04-20 18:40:27 +00:00
|
|
|
attrs.splice(1, 0, { hasBlock: true, label: 'Type', value: this.typeName, icon: this.icon });
|
|
|
|
const l = this.keys.length;
|
2022-04-26 14:23:31 +00:00
|
|
|
const value = l
|
|
|
|
? `${l} ${l > 1 ? 'keys' : 'key'}`
|
|
|
|
: this.canListKeys
|
|
|
|
? 'None'
|
|
|
|
: 'You do not have permission to list keys';
|
2022-04-20 18:40:27 +00:00
|
|
|
attrs.push({ hasBlock: true, isLink: l, label: 'Keys', value });
|
|
|
|
return attrs;
|
|
|
|
}
|
|
|
|
get credentialProps() {
|
2022-05-20 15:41:24 +00:00
|
|
|
if (!this.provider) return [];
|
2022-04-20 18:40:27 +00:00
|
|
|
return CRED_PROPS[this.provider];
|
|
|
|
}
|
|
|
|
get credentialFields() {
|
|
|
|
const [creds, fields] = this.credentialProps.reduce(
|
|
|
|
([creds, fields], prop) => {
|
|
|
|
creds[prop] = null;
|
2022-11-09 23:15:31 +00:00
|
|
|
const field = { name: `credentials.${prop}`, type: 'string', options: { label: prop } };
|
2022-05-20 15:41:24 +00:00
|
|
|
if (prop === 'service_account_file') {
|
|
|
|
field.options.subText = 'The path to a Google service account key file, not the file itself.';
|
|
|
|
}
|
|
|
|
fields.push(field);
|
2022-04-20 18:40:27 +00:00
|
|
|
return [creds, fields];
|
|
|
|
},
|
|
|
|
[{}, []]
|
|
|
|
);
|
|
|
|
this.credentials = creds;
|
|
|
|
return fields;
|
|
|
|
}
|
|
|
|
get createFields() {
|
|
|
|
return expandAttributeMeta(this, ['provider', 'name', 'keyCollection']);
|
|
|
|
}
|
|
|
|
|
|
|
|
async fetchKeys(page) {
|
2022-05-20 15:41:24 +00:00
|
|
|
if (this.canListKeys === false) {
|
|
|
|
this.keys = [];
|
|
|
|
} else {
|
|
|
|
// try unless capabilities returns false
|
2022-04-26 14:23:31 +00:00
|
|
|
try {
|
|
|
|
this.keys = await this.store.lazyPaginatedQuery('keymgmt/key', {
|
2022-06-14 17:12:37 +00:00
|
|
|
backend: this.backend,
|
2022-04-26 14:23:31 +00:00
|
|
|
provider: this.name,
|
|
|
|
responsePath: 'data.keys',
|
|
|
|
page,
|
|
|
|
});
|
|
|
|
} catch (error) {
|
|
|
|
this.keys = [];
|
|
|
|
if (error.httpStatus !== 404) {
|
|
|
|
throw error;
|
|
|
|
}
|
2022-04-20 18:40:27 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2022-04-26 14:23:31 +00:00
|
|
|
|
|
|
|
@lazyCapabilities(apiPath`${'backend'}/kms/${'id'}`, 'backend', 'id') providerPath;
|
|
|
|
@lazyCapabilities(apiPath`${'backend'}/kms`, 'backend') providersPath;
|
|
|
|
@lazyCapabilities(apiPath`${'backend'}/kms/${'id'}/key`, 'backend', 'id') providerKeysPath;
|
|
|
|
|
|
|
|
get canCreate() {
|
|
|
|
return this.providerPath.get('canCreate');
|
|
|
|
}
|
|
|
|
get canDelete() {
|
|
|
|
return this.providerPath.get('canDelete');
|
|
|
|
}
|
|
|
|
get canEdit() {
|
|
|
|
return this.providerPath.get('canUpdate');
|
|
|
|
}
|
|
|
|
get canRead() {
|
|
|
|
return this.providerPath.get('canRead');
|
|
|
|
}
|
|
|
|
get canList() {
|
|
|
|
return this.providersPath.get('canList');
|
|
|
|
}
|
|
|
|
get canListKeys() {
|
|
|
|
return this.providerKeysPath.get('canList');
|
|
|
|
}
|
|
|
|
get canCreateKeys() {
|
|
|
|
return this.providerKeysPath.get('canCreate');
|
|
|
|
}
|
2022-04-20 18:40:27 +00:00
|
|
|
}
|