diff --git a/changelog/12024.txt b/changelog/12024.txt
new file mode 100644
index 000000000..52e39a0fd
--- /dev/null
+++ b/changelog/12024.txt
@@ -0,0 +1,3 @@
+```release-note:bug
+ui: fix control group access for database credential
+```
diff --git a/ui/app/adapters/database/credential.js b/ui/app/adapters/database/credential.js
index e182ef8fc..f054dfca1 100644
--- a/ui/app/adapters/database/credential.js
+++ b/ui/app/adapters/database/credential.js
@@ -1,16 +1,46 @@
+import RSVP from 'rsvp';
import ApplicationAdapter from '../application';
export default ApplicationAdapter.extend({
namespace: 'v1',
- fetchByQuery(store, query) {
- const { backend, roleType, secret } = query;
- let creds = roleType === 'static' ? 'static-creds' : 'creds';
+ _staticCreds(backend, secret) {
return this.ajax(
- `${this.buildURL()}/${encodeURIComponent(backend)}/${creds}/${encodeURIComponent(secret)}`,
+ `${this.buildURL()}/${encodeURIComponent(backend)}/static-creds/${encodeURIComponent(secret)}`,
'GET'
+ ).then(resp => ({ ...resp, roleType: 'static' }));
+ },
+
+ _dynamicCreds(backend, secret) {
+ return this.ajax(
+ `${this.buildURL()}/${encodeURIComponent(backend)}/creds/${encodeURIComponent(secret)}`,
+ 'GET'
+ ).then(resp => ({ ...resp, roleType: 'dynamic' }));
+ },
+
+ fetchByQuery(store, query) {
+ const { backend, secret } = query;
+ return RSVP.allSettled([this._staticCreds(backend, secret), this._dynamicCreds(backend, secret)]).then(
+ ([staticResp, dynamicResp]) => {
+ // If one comes back with wrapped response from control group, throw it
+ const accessor = staticResp.accessor || dynamicResp.accessor;
+ if (accessor) {
+ throw accessor;
+ }
+ // if neither has payload, throw reason with highest httpStatus
+ if (!staticResp.value && !dynamicResp.value) {
+ let reason = dynamicResp.reason;
+ if (reason?.httpStatus < staticResp.reason?.httpStatus) {
+ reason = staticResp.reason;
+ }
+ throw reason;
+ }
+ // Otherwise, return whichever one has a value
+ return staticResp.value || dynamicResp.value;
+ }
);
},
+
queryRecord(store, type, query) {
return this.fetchByQuery(store, query);
},
diff --git a/ui/app/adapters/secret-v2-version.js b/ui/app/adapters/secret-v2-version.js
index 5bdd02129..4a6ab374d 100644
--- a/ui/app/adapters/secret-v2-version.js
+++ b/ui/app/adapters/secret-v2-version.js
@@ -4,7 +4,6 @@ import { isEmpty } from '@ember/utils';
import { get } from '@ember/object';
import ApplicationAdapter from './application';
import { encodePath } from 'vault/utils/path-encoding-helpers';
-import ControlGroupError from 'vault/lib/control-group-error';
export default ApplicationAdapter.extend({
namespace: 'v1',
diff --git a/ui/app/components/generate-credentials-database.js b/ui/app/components/generate-credentials-database.js
index 867b739f1..5cead9e9d 100644
--- a/ui/app/components/generate-credentials-database.js
+++ b/ui/app/components/generate-credentials-database.js
@@ -8,82 +8,19 @@
*
* ```
* @param {string} backendPath - the secret backend name. This is used in the breadcrumb.
- * @param {object} backendType - the secret type. Expected to be database.
+ * @param {string} roleType - either 'static', 'dynamic', or falsey.
* @param {string} roleName - the id of the credential returning.
+ * @param {object} model - database/credential model passed in. If no data, should have errorTitle, errorMessage, and errorHttpStatus
*/
-import { inject as service } from '@ember/service';
import Component from '@glimmer/component';
-import { task } from 'ember-concurrency';
import { action } from '@ember/object';
-import { tracked } from '@glimmer/tracking';
export default class GenerateCredentialsDatabase extends Component {
- @service store;
- // set on the component
- backendType = null;
- backendPath = null;
- roleName = null;
- @tracked roleType = '';
- @tracked model = null;
- @tracked errorMessage = '';
- @tracked errorHttpStatus = '';
- @tracked errorTitle = 'Something went wrong';
-
- constructor() {
- super(...arguments);
- this.fetchCredentials.perform();
+ get errorTitle() {
+ return this.args.model.errorTitle || 'Something went wrong';
}
- @task(function*() {
- let { roleName, backendPath } = this.args;
- try {
- let newModel = yield this.store.queryRecord('database/credential', {
- backend: backendPath,
- secret: roleName,
- roleType: 'static',
- });
- this.model = newModel;
- this.roleType = 'static';
- return;
- } catch (error) {
- this.errorHttpStatus = error.httpStatus; // set default http
- this.errorMessage = `We ran into a problem and could not continue: ${error.errors[0]}`;
- if (error.httpStatus === 403) {
- // 403 is forbidden
- this.errorTitle = 'You are not authorized';
- this.errorMessage =
- "Role wasn't found or you do not have permissions. Ask your administrator if you think you should have access.";
- }
- }
- try {
- let newModel = yield this.store.queryRecord('database/credential', {
- backend: backendPath,
- secret: roleName,
- roleType: 'dynamic',
- });
- this.model = newModel;
- this.roleType = 'dynamic';
- return;
- } catch (error) {
- if (error.httpStatus === 403) {
- // 403 is forbidden
- this.errorHttpStatus = error.httpStatus; // override default httpStatus which could be 400 which always happens on either dynamic or static depending on which kind of role you're querying
- this.errorTitle = 'You are not authorized';
- this.errorMessage =
- "Role wasn't found or you do not have permissions. Ask your administrator if you think you should have access.";
- }
- if (error.httpStatus == 500) {
- // internal server error happens when empty creation statement on dynamic role creation only
- this.errorHttpStatus = error.httpStatus;
- this.errorTitle = 'Internal Error';
- this.errorMessage = error.errors[0];
- }
- }
- this.roleType = 'noRoleFound';
- })
- fetchCredentials;
-
@action redirectPreviousPage() {
window.history.back();
}
diff --git a/ui/app/components/secret-list-header-tab.js b/ui/app/components/secret-list-header-tab.js
index 14a2ae15f..3627a2505 100644
--- a/ui/app/components/secret-list-header-tab.js
+++ b/ui/app/components/secret-list-header-tab.js
@@ -40,7 +40,10 @@ export default class SecretListHeaderTab extends Component {
let array = [];
// we only want to look at the canList, canCreate and canUpdate on the capabilities record
capabilitiesArray.forEach(item => {
- array.push(object[item]);
+ // object is sometimes null
+ if (object) {
+ array.push(object[item]);
+ }
});
return array;
};
diff --git a/ui/app/models/database/credential.js b/ui/app/models/database/credential.js
index 114d36966..080a738c4 100644
--- a/ui/app/models/database/credential.js
+++ b/ui/app/models/database/credential.js
@@ -8,4 +8,5 @@ export default Model.extend({
lastVaultRotation: attr('string'),
rotationPeriod: attr('number'),
ttl: attr('number'),
+ roleType: attr('string'),
});
diff --git a/ui/app/routes/vault/cluster/secrets/backend/credentials.js b/ui/app/routes/vault/cluster/secrets/backend/credentials.js
index 7ec251bbe..f3f5b60be 100644
--- a/ui/app/routes/vault/cluster/secrets/backend/credentials.js
+++ b/ui/app/routes/vault/cluster/secrets/backend/credentials.js
@@ -1,6 +1,7 @@
import { resolve } from 'rsvp';
import Route from '@ember/routing/route';
import { inject as service } from '@ember/service';
+import ControlGroupError from 'vault/lib/control-group-error';
const SUPPORTED_DYNAMIC_BACKENDS = ['database', 'ssh', 'aws', 'pki'];
@@ -22,13 +23,42 @@ export default Route.extend({
return this.pathHelp.getNewModel(modelType, backend);
},
- model(params) {
+ getDatabaseCredential(backend, secret) {
+ return this.store.queryRecord('database/credential', { backend, secret }).catch(error => {
+ if (error instanceof ControlGroupError) {
+ throw error;
+ }
+ // Unless it's a control group error, we want to pass back error info
+ // so we can render it on the GenerateCredentialsDatabase component
+ let status = error?.httpStatus;
+ let title;
+ let message = `We ran into a problem and could not continue: ${
+ error?.errors ? error.errors[0] : 'See Vault logs for details.'
+ }`;
+ if (status === 403) {
+ // 403 is forbidden
+ title = 'You are not authorized';
+ message =
+ "Role wasn't found or you do not have permissions. Ask your administrator if you think you should have access.";
+ }
+ return {
+ errorHttpStatus: status,
+ errorTitle: title,
+ errorMessage: message,
+ };
+ });
+ },
+
+ async model(params) {
let role = params.secret;
let backendModel = this.backendModel();
let backendPath = backendModel.get('id');
let backendType = backendModel.get('type');
let roleType = params.roleType;
-
+ let dbCred;
+ if (backendType === 'database') {
+ dbCred = await this.getDatabaseCredential(backendPath, role);
+ }
if (!SUPPORTED_DYNAMIC_BACKENDS.includes(backendModel.get('type'))) {
return this.transitionTo('vault.cluster.secrets.backend.list-root', backendPath);
}
@@ -37,6 +67,7 @@ export default Route.extend({
backendType,
roleName: role,
roleType,
+ dbCred,
});
},
diff --git a/ui/app/serializers/database/credential.js b/ui/app/serializers/database/credential.js
index da4b9003a..c0c157fb2 100644
--- a/ui/app/serializers/database/credential.js
+++ b/ui/app/serializers/database/credential.js
@@ -1,12 +1,11 @@
import RESTSerializer from '@ember-data/serializer/rest';
export default RESTSerializer.extend({
- primaryKey: 'request_id',
+ primaryKey: 'username',
normalizePayload(payload) {
if (payload.data) {
- const credentials = {
- request_id: payload.request_id,
+ return {
username: payload.data.username,
password: payload.data.password,
leaseId: payload.lease_id,
@@ -14,8 +13,9 @@ export default RESTSerializer.extend({
lastVaultRotation: payload.data.last_vault_rotation,
rotationPeriod: payload.data.rotation_period,
ttl: payload.data.ttl,
+ // roleType is added on adapter
+ roleType: payload.roleType,
};
- return credentials;
}
},
diff --git a/ui/app/templates/components/database-role-edit.hbs b/ui/app/templates/components/database-role-edit.hbs
index 1f4b460f1..8381befec 100644
--- a/ui/app/templates/components/database-role-edit.hbs
+++ b/ui/app/templates/components/database-role-edit.hbs
@@ -38,7 +38,7 @@
{{on 'click' (fn this.generateCreds @model.id)}}
data-test-database-role-generate-creds
>
- Generate credentials
+ {{if (eq @model.type "static") "Get credentials" "Generate credentials"}}
{{/if}}
{{#if @model.canEditRole}}
diff --git a/ui/app/templates/components/generate-credentials-database.hbs b/ui/app/templates/components/generate-credentials-database.hbs
index 0dd408e42..4661500df 100644
--- a/ui/app/templates/components/generate-credentials-database.hbs
+++ b/ui/app/templates/components/generate-credentials-database.hbs
@@ -18,15 +18,15 @@
-
- {{!-- ROLE TYPE NOT FOUND, returned when query on the creds and static creds both returned error --}}
- {{#if (eq this.roleType 'noRoleFound') }}
+
+ {{!-- If no role type, that means both static and dynamic requests returned an error --}}
+ {{#unless @roleType }}
- {{/if}}
- {{#unless (or model.errorMessage (eq this.roleType 'noRoleFound'))}}
+ {{/unless}}
+ {{#unless (or @model.errorMessage (not @roleType))}}
{{/unless}}
{{!-- DYNAMIC ROLE --}}
- {{#if (and (eq this.roleType 'dynamic') model.username)}}
-
+ {{#if (and (eq @roleType 'dynamic') @model.username)}}
+
-
+
-
-
+
+
{{/if}}
{{!-- STATIC ROLE --}}
- {{#if (and (eq this.roleType 'static') model.username)}}
+ {{#if (and (eq @roleType 'static') @model.username)}}
-
+
-
-
-
+
+
+
{{/if}}
diff --git a/ui/app/templates/components/get-credentials-card.hbs b/ui/app/templates/components/get-credentials-card.hbs
index f45b22d4e..8e2d06d8c 100644
--- a/ui/app/templates/components/get-credentials-card.hbs
+++ b/ui/app/templates/components/get-credentials-card.hbs
@@ -1,4 +1,4 @@
-
+ />
+
+
diff --git a/ui/app/templates/components/secret-list/database-list-item.hbs b/ui/app/templates/components/secret-list/database-list-item.hbs
index d868f76bd..b74bea636 100644
--- a/ui/app/templates/components/secret-list/database-list-item.hbs
+++ b/ui/app/templates/components/secret-list/database-list-item.hbs
@@ -53,7 +53,7 @@
{{#if @item.canGenerateCredentials}}
- Generate credentials
+ {{if (eq @item.type "static") "Get credentials" "Generate credentials"}}
{{/if}}
diff --git a/ui/app/templates/vault/cluster/secrets/backend/credentials.hbs b/ui/app/templates/vault/cluster/secrets/backend/credentials.hbs
index e2af4716e..855a53b8e 100644
--- a/ui/app/templates/vault/cluster/secrets/backend/credentials.hbs
+++ b/ui/app/templates/vault/cluster/secrets/backend/credentials.hbs
@@ -1,9 +1,9 @@
{{#if (eq model.backendType 'database')}}
{{else}}
{{!-- TODO smells a little to have action off of query param requiring a conditional --}}