be632db682
* runs ember-cli-update to 4.4.0 * updates yarn.lock * updates dependencies causing runtime errors (#17135) * Inject Store Service When Accessed Implicitly (#17345) * adds codemod for injecting store service * adds custom babylon parser with decorators-legacy plugin for jscodeshift transforms * updates inject-store-service codemod to only look for .extend object expressions and adds recast options * runs inject-store-service codemod on js files * replace query-params helper with hash (#17404) * Updates/removes dependencies throwing errors in Ember 4.4 (#17396) * updates ember-responsive to latest * updates ember-composable-helpers to latest and uses includes helper since contains was removed * updates ember-concurrency to latest * updates ember-cli-clipboard to latest * temporary workaround for toolbar-link component throwing errors for using params arg with LinkTo * adds missing store injection to auth configure route * fixes issue with string-list component throwing error for accessing prop in same computation * fixes non-iterable query params issue in mfa methods controller * refactors field-to-attrs to handle belongsTo rather than fragments * converts mount-config fragment to belongsTo on auth-method model * removes ember-api-actions and adds tune method to auth-method adapter * converts cluster replication attributes from fragment to relationship * updates ember-data, removes ember-data-fragments and updates yarn to latest * removes fragments from secret-engine model * removes fragment from test-form-model * removes commented out code * minor change to inject-store-service codemod and runs again on js files * Remove LinkTo positional params (#17421) * updates ember-cli-page-object to latest version * update toolbar-link to support link-to args and not positional params * adds replace arg to toolbar-link component * Clean up js lint errors (#17426) * replaces assert.equal to assert.strictEqual * update eslint no-console to error and disables invididual intended uses of console * cleans up hbs lint warnings (#17432) * Upgrade bug and test fixes (#17500) * updates inject-service codemod to take arg for service name and runs for flashMessages service * fixes hbs lint error after merging main * fixes flash messages * updates more deps * bug fixes * test fixes * updates ember-cli-content-security-policy and prevents default form submission throwing errors * more bug and test fixes * removes commented out code * fixes issue with code-mirror modifier sending change event on setup causing same computation error * Upgrade Clean Up (#17543) * updates deprecation workflow and filter * cleans up build errors, removes unused ivy-codemirror and sass and updates ember-cli-sass and node-sass to latest * fixes control groups test that was skipped after upgrade * updates control group service tests * addresses review feedback * updates control group service handleError method to use router.currentURL rather that transition.intent.url * adds changelog entry
167 lines
5 KiB
JavaScript
167 lines
5 KiB
JavaScript
import Model, { attr } from '@ember-data/model';
|
|
import { tracked } from '@glimmer/tracking';
|
|
import { expandAttributeMeta } from 'vault/utils/field-to-attrs';
|
|
import { withModelValidations } from 'vault/decorators/model-validations';
|
|
import lazyCapabilities, { apiPath } from 'vault/macros/lazy-capabilities';
|
|
import { inject as service } from '@ember/service';
|
|
|
|
const CRED_PROPS = {
|
|
azurekeyvault: ['client_id', 'client_secret', 'tenant_id'],
|
|
awskms: ['access_key', 'secret_key', 'session_token', 'endpoint'],
|
|
gcpckms: ['service_account_file'],
|
|
};
|
|
|
|
const OPTIONAL_CRED_PROPS = ['session_token', 'endpoint'];
|
|
|
|
// since we have dynamic credential attributes based on provider we need a dynamic presence validator
|
|
// add validators for all cred props and return true for value if not associated with selected provider
|
|
const credValidators = Object.keys(CRED_PROPS).reduce((obj, providerKey) => {
|
|
CRED_PROPS[providerKey].forEach((prop) => {
|
|
if (!OPTIONAL_CRED_PROPS.includes(prop)) {
|
|
obj[`credentials.${prop}`] = [
|
|
{
|
|
message: `${prop} is required`,
|
|
validator(model) {
|
|
return model.credentialProps.includes(prop) ? model.credentials[prop] : true;
|
|
},
|
|
},
|
|
];
|
|
}
|
|
});
|
|
return obj;
|
|
}, {});
|
|
|
|
const validations = {
|
|
name: [{ type: 'presence', message: 'Provider name is required' }],
|
|
keyCollection: [{ type: 'presence', message: 'Key Vault instance name' }],
|
|
...credValidators,
|
|
};
|
|
|
|
@withModelValidations(validations)
|
|
export default class KeymgmtProviderModel extends Model {
|
|
@service store;
|
|
@attr('string') backend;
|
|
@attr('string', {
|
|
label: 'Provider name',
|
|
subText: 'This is the name of the provider that will be displayed in Vault. This cannot be edited later.',
|
|
})
|
|
name;
|
|
|
|
@attr('string', {
|
|
label: 'Type',
|
|
subText: 'Choose the provider type.',
|
|
possibleValues: ['azurekeyvault', 'awskms', 'gcpckms'],
|
|
noDefault: true,
|
|
})
|
|
provider;
|
|
|
|
@attr('string', {
|
|
label: 'Key Vault instance name',
|
|
subText: 'The name of a Key Vault instance must be supplied. This cannot be edited later.',
|
|
})
|
|
keyCollection;
|
|
|
|
idPrefix = 'provider/';
|
|
type = 'provider';
|
|
|
|
@tracked keys = [];
|
|
@tracked credentials = null; // never returned from API -- set only during create/edit
|
|
|
|
get icon() {
|
|
return {
|
|
azurekeyvault: 'azure-color',
|
|
awskms: 'aws-color',
|
|
gcpckms: 'gcp-color',
|
|
}[this.provider];
|
|
}
|
|
get typeName() {
|
|
return {
|
|
azurekeyvault: 'Azure Key Vault',
|
|
awskms: 'AWS Key Management Service',
|
|
gcpckms: 'Google Cloud Key Management Service',
|
|
}[this.provider];
|
|
}
|
|
get showFields() {
|
|
const attrs = expandAttributeMeta(this, ['name', 'keyCollection']);
|
|
attrs.splice(1, 0, { hasBlock: true, label: 'Type', value: this.typeName, icon: this.icon });
|
|
const l = this.keys.length;
|
|
const value = l
|
|
? `${l} ${l > 1 ? 'keys' : 'key'}`
|
|
: this.canListKeys
|
|
? 'None'
|
|
: 'You do not have permission to list keys';
|
|
attrs.push({ hasBlock: true, isLink: l, label: 'Keys', value });
|
|
return attrs;
|
|
}
|
|
get credentialProps() {
|
|
if (!this.provider) return [];
|
|
return CRED_PROPS[this.provider];
|
|
}
|
|
get credentialFields() {
|
|
const [creds, fields] = this.credentialProps.reduce(
|
|
([creds, fields], prop) => {
|
|
creds[prop] = null;
|
|
let field = { name: `credentials.${prop}`, type: 'string', options: { label: prop } };
|
|
if (prop === 'service_account_file') {
|
|
field.options.subText = 'The path to a Google service account key file, not the file itself.';
|
|
}
|
|
fields.push(field);
|
|
return [creds, fields];
|
|
},
|
|
[{}, []]
|
|
);
|
|
this.credentials = creds;
|
|
return fields;
|
|
}
|
|
get createFields() {
|
|
return expandAttributeMeta(this, ['provider', 'name', 'keyCollection']);
|
|
}
|
|
|
|
async fetchKeys(page) {
|
|
if (this.canListKeys === false) {
|
|
this.keys = [];
|
|
} else {
|
|
// try unless capabilities returns false
|
|
try {
|
|
this.keys = await this.store.lazyPaginatedQuery('keymgmt/key', {
|
|
backend: this.backend,
|
|
provider: this.name,
|
|
responsePath: 'data.keys',
|
|
page,
|
|
});
|
|
} catch (error) {
|
|
this.keys = [];
|
|
if (error.httpStatus !== 404) {
|
|
throw error;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
@lazyCapabilities(apiPath`${'backend'}/kms/${'id'}`, 'backend', 'id') providerPath;
|
|
@lazyCapabilities(apiPath`${'backend'}/kms`, 'backend') providersPath;
|
|
@lazyCapabilities(apiPath`${'backend'}/kms/${'id'}/key`, 'backend', 'id') providerKeysPath;
|
|
|
|
get canCreate() {
|
|
return this.providerPath.get('canCreate');
|
|
}
|
|
get canDelete() {
|
|
return this.providerPath.get('canDelete');
|
|
}
|
|
get canEdit() {
|
|
return this.providerPath.get('canUpdate');
|
|
}
|
|
get canRead() {
|
|
return this.providerPath.get('canRead');
|
|
}
|
|
get canList() {
|
|
return this.providersPath.get('canList');
|
|
}
|
|
get canListKeys() {
|
|
return this.providerKeysPath.get('canList');
|
|
}
|
|
get canCreateKeys() {
|
|
return this.providerKeysPath.get('canCreate');
|
|
}
|
|
}
|