-
-
-
- {{/if}}
-{{else if this.setSignedIntermediate}}
-
Set signed intermediate
-
-
-
- Submit a signed CA certificate corresponding to a generated private key.
-
-
-{{else}}
-
- This is the default CA certificate used in Vault. It is not used for self-signed certificates or if you have a signed
- intermediate CA certificate with a generated key.
-
- {{#each this.downloadHrefs as |dl|}}
-
-
- {{dl.display}}
-
-
- {{/each}}
-
-
-
-
-
- {{#if this.config.pem}}
-
-
-
- {{/if}}
-
-
-
- {{#unless this.needsConfig}}
-
-
-
-
-
-
-
- Deleting a CA is only available via the CLI and API.
-
- Learn more
-
-
-
-
-
- {{/unless}}
-
-{{/if}}
\ No newline at end of file
diff --git a/ui/lib/pki/addon/components/page/pki-issuer-list.hbs b/ui/lib/pki/addon/components/page/pki-issuer-list.hbs
index 8477f9b4a..649fa419f 100644
--- a/ui/lib/pki/addon/components/page/pki-issuer-list.hbs
+++ b/ui/lib/pki/addon/components/page/pki-issuer-list.hbs
@@ -22,16 +22,20 @@
}}
{{/if}}
{{#if pkiIssuer.serialNumber}}
-
- Serial number
-
- {{pkiIssuer.serialNumber}}
+
+
+ Serial number
+
+ {{pkiIssuer.serialNumber}}
+
{{/if}}
- {{#if pkiIssuer.keyId}}
-
- Key ID
-
- {{pkiIssuer.keyId}}
+ {{#if pkiIssuer.parsedCertificate.common_name}}
+
+
+ Common name
+
+ {{pkiIssuer.parsedCertificate.common_name}}
+
{{/if}}
diff --git a/ui/lib/pki/addon/components/pki-role-form.hbs b/ui/lib/pki/addon/components/pki-role-form.hbs
index a412d0450..c4a699639 100644
--- a/ui/lib/pki/addon/components/pki-role-form.hbs
+++ b/ui/lib/pki/addon/components/pki-role-form.hbs
@@ -8,7 +8,7 @@
{{! DEFAULT VIEW }}
{{#if (eq group "default")}}
{{#each fields as |attr|}}
- {{#if (eq attr.name "issuerRef")}}
+ {{#if (and (eq attr.name "issuerRef") @issuers)}}
{
+ if (err.httpStatus === 404) {
+ return [];
+ } else {
+ throw err;
+ }
+ }),
});
}
diff --git a/ui/lib/pki/addon/routes/roles/role/edit.js b/ui/lib/pki/addon/routes/roles/role/edit.js
index 72f36a6f3..a08426a36 100644
--- a/ui/lib/pki/addon/routes/roles/role/edit.js
+++ b/ui/lib/pki/addon/routes/roles/role/edit.js
@@ -22,7 +22,13 @@ export default class PkiRoleEditRoute extends Route {
backend,
id: role,
}),
- issuers: this.store.query('pki/issuer', { backend }),
+ issuers: this.store.query('pki/issuer', { backend }).catch((err) => {
+ if (err.httpStatus === 404) {
+ return [];
+ } else {
+ throw err;
+ }
+ }),
});
}
diff --git a/ui/tests/acceptance/pki/pki-engine-workflow-test.js b/ui/tests/acceptance/pki/pki-engine-workflow-test.js
index a6918e0a0..5f1d21250 100644
--- a/ui/tests/acceptance/pki/pki-engine-workflow-test.js
+++ b/ui/tests/acceptance/pki/pki-engine-workflow-test.js
@@ -355,7 +355,7 @@ module('Acceptance | pki workflow', function (hooks) {
assert.dom('.linked-block').exists({ count: 1 }, 'One issuer is in list');
assert.dom('[data-test-is-root-tag="0"]').hasText('root');
assert.dom('[data-test-serial-number="0"]').exists({ count: 1 }, 'displays serial number tag');
- assert.dom('[data-test-key-id="0"]').exists({ count: 1 }, 'displays key id tag');
+ assert.dom('[data-test-common-name="0"]').exists({ count: 1 }, 'displays cert common name tag');
});
test('lists the correct issuer metadata info when user has only read permission', async function (assert) {
assert.expect(2);
@@ -379,7 +379,7 @@ module('Acceptance | pki workflow', function (hooks) {
await visit(`/vault/secrets/${this.mountPath}/pki/overview`);
await click(SELECTORS.issuersTab);
assert.dom('[data-test-serial-number="0"]').exists({ count: 1 }, 'displays serial number tag');
- assert.dom('[data-test-key-id="0"]').exists({ count: 1 }, 'displays key id tag');
+ assert.dom('[data-test-common-name="0"]').exists({ count: 1 }, 'displays cert common name tag');
});
test('details view renders correct number of info items', async function (assert) {