open-vault/ui/app/adapters/cluster.js

189 lines
5.5 KiB
JavaScript
Raw Normal View History

2018-04-03 14:16:57 +00:00
import Ember from 'ember';
import ApplicationAdapter from './application';
import DS from 'ember-data';
const { AdapterError } = DS;
const { assert, inject } = Ember;
const ENDPOINTS = ['health', 'seal-status', 'tokens', 'token', 'seal', 'unseal', 'init', 'capabilities-self'];
const REPLICATION_ENDPOINTS = {
reindex: 'reindex',
recover: 'recover',
status: 'status',
primary: ['enable', 'disable', 'demote', 'secondary-token', 'revoke-secondary'],
secondary: ['enable', 'disable', 'promote', 'update-primary'],
};
const REPLICATION_MODES = ['dr', 'performance'];
export default ApplicationAdapter.extend({
version: inject.service(),
UI namespaces (#5119) * add namespace sidebar item * depend on ember-inflector directly * list-view and list-item components * fill out components and render empty namespaces page * list namespaces in access * add menu contextual component to list item * popup contextual component * full crud for namespaces * add namespaces service and picker component * split application and vault.cluster templates and controllers, add namespace query param, add namespace-picker to vault.namespace template * remove usage of href-to * remove ember-href-to from deps * add ember-responsive * start styling the picker and link to appropriate namespaces, use ember-responsive to render picker in different places based on the breakpoint * get query param working and save ns to authdata when authenticating, feed through ns in application adapter * move to observer on the controller for setting state on the service * set state in the beforeModel hook and clear the ember data model cache * nav to secrets on change and make error handling more resilient utilizing the method that atlas does to eagerly update URLs * add a list of sys endpoints in a helper * hide header elements if not in the root namespace * debounce namespace input on auth, fix 404 for auth method fetch, move auth method fetch to a task on the auth-form component and refretch on namespace change * fix display of supported engines and exclusion of sys and identity engines * don't fetch replication status if you're in a non-root namespace * hide seal sub-menu if not in the root namespace * don't autocomplete auth form inputs * always send some requests to the root namespace * use methodType and engineType instead of type in case there it is ns_ prefixed * use sys/internal/ui/namespaces to fetch the list in the dropdown * don't use model for namespace picker and always make the request to the token namespace * fix header handling for fetch calls * use namespace-reminder component on creation and edit forms throughout the application * add namespace-reminder to the console * add flat * add deepmerge for creating the tree in the menu * delayed rendering for animation timing * design and code feedback on the first round * white text in the namespace picker * fix namespace picker issues with root keys * separate path-to-tree * add tests for path-to-tree util * hide picker if you're in the root ns and you can't access other namespaces * show error message if you enter invalid characters for namespace path * return a different model if we dont have the namespaces feature and show upgrade page * if a token has a namespace_path, use that as the root user namespace and transition them there on login * use token namespace for user, but use specified namespace to log in * always renew tokens in the token namespace * fix edition-badge test
2018-08-16 17:48:24 +00:00
namespaceService: inject.service('namespace'),
2018-04-03 14:16:57 +00:00
shouldBackgroundReloadRecord() {
return true;
},
findRecord(store, type, id, snapshot) {
let fetches = {
health: this.health(),
sealStatus: this.sealStatus().catch(e => e),
};
UI namespaces (#5119) * add namespace sidebar item * depend on ember-inflector directly * list-view and list-item components * fill out components and render empty namespaces page * list namespaces in access * add menu contextual component to list item * popup contextual component * full crud for namespaces * add namespaces service and picker component * split application and vault.cluster templates and controllers, add namespace query param, add namespace-picker to vault.namespace template * remove usage of href-to * remove ember-href-to from deps * add ember-responsive * start styling the picker and link to appropriate namespaces, use ember-responsive to render picker in different places based on the breakpoint * get query param working and save ns to authdata when authenticating, feed through ns in application adapter * move to observer on the controller for setting state on the service * set state in the beforeModel hook and clear the ember data model cache * nav to secrets on change and make error handling more resilient utilizing the method that atlas does to eagerly update URLs * add a list of sys endpoints in a helper * hide header elements if not in the root namespace * debounce namespace input on auth, fix 404 for auth method fetch, move auth method fetch to a task on the auth-form component and refretch on namespace change * fix display of supported engines and exclusion of sys and identity engines * don't fetch replication status if you're in a non-root namespace * hide seal sub-menu if not in the root namespace * don't autocomplete auth form inputs * always send some requests to the root namespace * use methodType and engineType instead of type in case there it is ns_ prefixed * use sys/internal/ui/namespaces to fetch the list in the dropdown * don't use model for namespace picker and always make the request to the token namespace * fix header handling for fetch calls * use namespace-reminder component on creation and edit forms throughout the application * add namespace-reminder to the console * add flat * add deepmerge for creating the tree in the menu * delayed rendering for animation timing * design and code feedback on the first round * white text in the namespace picker * fix namespace picker issues with root keys * separate path-to-tree * add tests for path-to-tree util * hide picker if you're in the root ns and you can't access other namespaces * show error message if you enter invalid characters for namespace path * return a different model if we dont have the namespaces feature and show upgrade page * if a token has a namespace_path, use that as the root user namespace and transition them there on login * use token namespace for user, but use specified namespace to log in * always renew tokens in the token namespace * fix edition-badge test
2018-08-16 17:48:24 +00:00
if (this.get('version.isEnterprise') && this.get('namespaceService.inRootNamespace')) {
2018-04-03 14:16:57 +00:00
fetches.replicationStatus = this.replicationStatus().catch(e => e);
}
return Ember.RSVP.hash(fetches).then(({ health, sealStatus, replicationStatus }) => {
let ret = {
id,
name: snapshot.attr('name'),
};
ret = Ember.assign(ret, health);
if (sealStatus instanceof AdapterError === false) {
ret = Ember.assign(ret, { nodes: [sealStatus] });
}
if (replicationStatus && replicationStatus instanceof AdapterError === false) {
ret = Ember.assign(ret, replicationStatus.data);
}
return Ember.RSVP.resolve(ret);
});
},
pathForType(type) {
return type === 'cluster' ? 'clusters' : Ember.String.pluralize(type);
},
health() {
return this.ajax(this.urlFor('health'), 'GET', {
data: { standbycode: 200, sealedcode: 200, uninitcode: 200, drsecondarycode: 200 },
unauthenticated: true,
});
},
features() {
return this.ajax(`${this.buildURL()}/license/features`, 'GET', {
unauthenticated: true,
});
},
sealStatus() {
return this.ajax(this.urlFor('seal-status'), 'GET', { unauthenticated: true });
},
seal() {
return this.ajax(this.urlFor('seal'), 'PUT');
},
unseal(data) {
return this.ajax(this.urlFor('unseal'), 'PUT', {
data,
unauthenticated: true,
});
},
initCluster(data) {
return this.ajax(this.urlFor('init'), 'PUT', {
data,
unauthenticated: true,
});
},
authenticate({ backend, data }) {
const { token, password, username, path } = data;
const url = this.urlForAuth(backend, username, path);
const verb = backend === 'token' ? 'GET' : 'POST';
let options = {
unauthenticated: true,
};
if (backend === 'token') {
options.headers = {
'X-Vault-Token': token,
};
} else {
options.data = token ? { token, password } : { password };
}
return this.ajax(url, verb, options);
},
urlFor(endpoint) {
if (!ENDPOINTS.includes(endpoint)) {
throw new Error(
`Calls to a ${endpoint} endpoint are not currently allowed in the vault cluster adapater`
);
}
return `${this.buildURL()}/${endpoint}`;
},
urlForAuth(type, username, path) {
const authBackend = type.toLowerCase();
const authURLs = {
github: 'login',
userpass: `login/${encodeURIComponent(username)}`,
ldap: `login/${encodeURIComponent(username)}`,
okta: `login/${encodeURIComponent(username)}`,
token: 'lookup-self',
};
const urlSuffix = authURLs[authBackend];
const urlPrefix = path && authBackend !== 'token' ? path : authBackend;
if (!urlSuffix) {
throw new Error(`There is no auth url for ${type}.`);
}
return `/v1/auth/${urlPrefix}/${urlSuffix}`;
},
urlForReplication(replicationMode, clusterMode, endpoint) {
let suffix;
const errString = `Calls to replication ${endpoint} endpoint are not currently allowed in the vault cluster adapater`;
if (clusterMode) {
assert(errString, REPLICATION_ENDPOINTS[clusterMode].includes(endpoint));
suffix = `${replicationMode}/${clusterMode}/${endpoint}`;
} else {
assert(errString, REPLICATION_ENDPOINTS[endpoint]);
suffix = `${endpoint}`;
}
return `${this.buildURL()}/replication/${suffix}`;
},
replicationStatus() {
return this.ajax(`${this.buildURL()}/replication/status`, 'GET', { unauthenticated: true });
},
replicationDrPromote(data, options) {
const verb = options && options.checkStatus ? 'GET' : 'PUT';
return this.ajax(`${this.buildURL()}/replication/dr/secondary/promote`, verb, {
data,
unauthenticated: true,
});
},
generateDrOperationToken(data, options) {
const verb = options && options.checkStatus ? 'GET' : 'PUT';
let url = `${this.buildURL()}/replication/dr/secondary/generate-operation-token/`;
if (!data || data.pgp_key || data.otp) {
// start the generation
url = url + 'attempt';
} else {
// progress the operation
url = url + 'update';
}
return this.ajax(url, verb, {
data,
unauthenticated: true,
});
},
replicationAction(action, replicationMode, clusterMode, data) {
assert(
`${replicationMode} is an unsupported replication mode.`,
replicationMode && REPLICATION_MODES.includes(replicationMode)
);
const url =
action === 'recover' || action === 'reindex'
? this.urlForReplication(replicationMode, null, action)
: this.urlForReplication(replicationMode, clusterMode, action);
return this.ajax(url, 'POST', { data });
},
});