open-vault/ui/app/models/secret.js
Matthew Irish af8eda9322
UI - kv v2 graceful degrade (#5879)
* turns out sourcemaps are useful

* add test for restricted policy in kv v2

* only include version param on fetch if it's encoded in the id

* rename some vars for clarity and use model.id when persisting a secret

* fix delete attributes on the models

* allow data edit when there's metadata access is disallowed

* add tests for edit with restricted policy

* hide metadata fields if you can't edit them
2018-12-03 08:22:13 -06:00

33 lines
1.1 KiB
JavaScript

import { computed } from '@ember/object';
import { alias } from '@ember/object/computed';
import DS from 'ember-data';
import KeyMixin from 'vault/mixins/key-mixin';
const { attr } = DS;
import lazyCapabilities, { apiPath } from 'vault/macros/lazy-capabilities';
export default DS.Model.extend(KeyMixin, {
auth: attr('string'),
lease_duration: attr('number'),
lease_id: attr('string'),
renewable: attr('boolean'),
secretData: attr('object'),
dataAsJSONString: computed('secretData', function() {
return JSON.stringify(this.get('secretData'), null, 2);
}),
isAdvancedFormat: computed('secretData', function() {
const data = this.get('secretData');
return Object.keys(data).some(key => typeof data[key] !== 'string');
}),
helpText: attr('string'),
// TODO this needs to be a relationship like `engine` on kv-v2
backend: attr('string'),
secretPath: lazyCapabilities(apiPath`${'backend'}/${'id'}`, 'backend', 'id'),
canEdit: alias('secretPath.canUpdate'),
canDelete: alias('secretPath.canDelete'),
canRead: alias('secretPath.canRead'),
});