3172e74d7e
* KMSE: Key Model / Adapter / Serializer setup (#13638) * First pass model * KMS key adapter (create/update), serializer, model * Add last rotated and provider to key * KeyEdit secret-edit component, and more key model stuff * add formatDate param support to infotablerow * Add keymgmt key to routes and options-for-backend * Rename keymgmt-key to keymgmt/key * Add test, cleanup * Add mirage handler for kms * Address PR comments * KMS Providers (#13797) * adds pagination-controls component * adds kms provider model, adapter and serializer * adds kms provider-edit component * updates secrets routes to handle itemType query param for kms * updates kms key adapter to query by provider * adds tests for provider-edit component * refactors kms provider adapter to account for dynamic path * adds model-validations-helper util * removes keymgmt from supported-secret-backends * fixes issue generating url for fetching keys for a provider * updates modelType method on secret-edit route to accept options object as arg rather than transition * adds additional checks to ensure queryParams are defined in options object for modelType method * UI/keymgmt distribute key (#13840) * Add distribution details on key page, and empty states if no permissions * Allow search-select component to return object so parent can tell when new item was created * Add stringarray transform * Distribute component first pass * Refactor distribute component for use with internal object rather than ember-data model * Specific permission denied errors on key edit * Allow inline errors on search-select component * Style updates for form errors * Styling and error messages on distribute component * Allow block template on inline alert so we can add doc links * Add distribute action, flash messages, cleanup * Cleanup & Add tests * More cleanup * Address PR comments * Move disable operations logic to commponent class * KMSE Enable/Config (#14835) * adds keymgmt secrets engine as supported backend * adds comment to check on keymgmt as member of adp module * updates kms provider to use model-validations decorator * fixes lint errors and tests Co-authored-by: Chelsea Shaw <82459713+hashishaw@users.noreply.github.com>
203 lines
7 KiB
JavaScript
203 lines
7 KiB
JavaScript
import Model, { attr } from '@ember-data/model';
|
||
import { computed } from '@ember/object'; // eslint-disable-line
|
||
import { equal } from '@ember/object/computed'; // eslint-disable-line
|
||
import { fragment } from 'ember-data-model-fragments/attributes';
|
||
import fieldToAttrs, { expandAttributeMeta } from 'vault/utils/field-to-attrs';
|
||
import { withModelValidations } from 'vault/decorators/model-validations';
|
||
|
||
// identity will be managed separately and the inclusion
|
||
// of the system backend is an implementation detail
|
||
const LIST_EXCLUDED_BACKENDS = ['system', 'identity'];
|
||
|
||
const validations = {
|
||
path: [{ type: 'presence', message: "Path can't be blank." }],
|
||
maxVersions: [
|
||
{ type: 'number', options: { asString: true }, message: 'Maximum versions must be a number.' },
|
||
{ type: 'length', options: { min: 1, max: 16 }, message: 'You cannot go over 16 characters.' },
|
||
],
|
||
};
|
||
|
||
@withModelValidations(validations)
|
||
class SecretEngineModel extends Model {}
|
||
export default SecretEngineModel.extend({
|
||
path: attr('string'),
|
||
accessor: attr('string'),
|
||
name: attr('string'),
|
||
type: attr('string', {
|
||
label: 'Secret engine type',
|
||
}),
|
||
description: attr('string', {
|
||
editType: 'textarea',
|
||
}),
|
||
config: fragment('mount-config', { defaultValue: {} }),
|
||
options: fragment('mount-options', { defaultValue: {} }),
|
||
local: attr('boolean', {
|
||
helpText:
|
||
'When Replication is enabled, a local mount will not be replicated across clusters. This can only be specified at mount time.',
|
||
}),
|
||
sealWrap: attr('boolean', {
|
||
helpText:
|
||
'When enabled - if a seal supporting seal wrapping is specified in the configuration, all critical security parameters (CSPs) in this backend will be seal wrapped. (For K/V mounts, all values will be seal wrapped.) This can only be specified at mount time.',
|
||
}),
|
||
// KV 2 additional config default options
|
||
maxVersions: attr('number', {
|
||
defaultValue: 0,
|
||
label: 'Maximum number of versions',
|
||
subText:
|
||
'The number of versions to keep per key. Once the number of keys exceeds the maximum number set here, the oldest version will be permanently deleted. This value applies to all keys, but a key’s metadata settings can overwrite this value. When 0 is used or the value is unset, Vault will keep 10 versions.',
|
||
}),
|
||
casRequired: attr('boolean', {
|
||
defaultValue: false,
|
||
label: 'Require Check and Set',
|
||
subText:
|
||
'If checked, all keys will require the cas parameter to be set on all write requests. A key’s metadata settings can overwrite this value.',
|
||
}),
|
||
deleteVersionAfter: attr({
|
||
defaultValue: 0,
|
||
editType: 'ttl',
|
||
label: 'Automate secret deletion',
|
||
helperTextDisabled: 'A secret’s version must be manually deleted.',
|
||
helperTextEnabled: 'Delete all new versions of this secret after',
|
||
}),
|
||
|
||
modelTypeForKV: computed('engineType', 'options.version', function () {
|
||
let type = this.engineType;
|
||
let version = this.options?.version;
|
||
let modelType = 'secret';
|
||
if ((type === 'kv' || type === 'generic') && version === 2) {
|
||
modelType = 'secret-v2';
|
||
}
|
||
return modelType;
|
||
}),
|
||
|
||
isV2KV: equal('modelTypeForKV', 'secret-v2'),
|
||
|
||
formFields: computed('engineType', 'options.version', function () {
|
||
let type = this.engineType;
|
||
let version = this.options?.version;
|
||
let fields = ['type', 'path', 'description', 'accessor', 'local', 'sealWrap'];
|
||
// no ttl options for keymgmt
|
||
const ttl = type !== 'keymgmt' ? 'defaultLeaseTtl,maxLeaseTtl,' : '';
|
||
fields.push(`config.{${ttl}auditNonHmacRequestKeys,auditNonHmacResponseKeys,passthroughRequestHeaders}`);
|
||
if (type === 'kv' || type === 'generic') {
|
||
fields.push('options.{version}');
|
||
}
|
||
// version comes in as number not string
|
||
if (type === 'kv' && version === 2) {
|
||
fields.push('casRequired', 'deleteVersionAfter', 'maxVersions');
|
||
}
|
||
return fields;
|
||
}),
|
||
|
||
formFieldGroups: computed('engineType', function () {
|
||
let type = this.engineType;
|
||
let defaultGroup;
|
||
// KV has specific config options it adds on the enable engine. https://www.vaultproject.io/api/secret/kv/kv-v2#configure-the-kv-engine
|
||
if (type === 'kv') {
|
||
defaultGroup = { default: ['path', 'maxVersions', 'casRequired', 'deleteVersionAfter'] };
|
||
} else {
|
||
defaultGroup = { default: ['path'] };
|
||
}
|
||
let optionsGroup = {
|
||
'Method Options': ['description', 'config.listingVisibility', 'local', 'sealWrap'],
|
||
};
|
||
// no ttl options for keymgmt
|
||
const ttl = type !== 'keymgmt' ? 'defaultLeaseTtl,maxLeaseTtl,' : '';
|
||
optionsGroup['Method Options'].push(
|
||
`config.{${ttl}auditNonHmacRequestKeys,auditNonHmacResponseKeys,passthroughRequestHeaders}`
|
||
);
|
||
|
||
if (type === 'kv' || type === 'generic') {
|
||
optionsGroup['Method Options'].unshift('options.{version}');
|
||
}
|
||
if (type === 'database') {
|
||
// For the Database Secret Engine we want to highlight the defaultLeaseTtl and maxLeaseTtl, removing them from the options object
|
||
defaultGroup.default.push('config.{defaultLeaseTtl}', 'config.{maxLeaseTtl}');
|
||
return [
|
||
defaultGroup,
|
||
{
|
||
'Method Options': [
|
||
'description',
|
||
'config.listingVisibility',
|
||
'local',
|
||
'sealWrap',
|
||
'config.{auditNonHmacRequestKeys,auditNonHmacResponseKeys,passthroughRequestHeaders}',
|
||
],
|
||
},
|
||
];
|
||
}
|
||
return [defaultGroup, optionsGroup];
|
||
}),
|
||
|
||
attrs: computed('formFields', function () {
|
||
return expandAttributeMeta(this, this.formFields);
|
||
}),
|
||
|
||
fieldGroups: computed('formFieldGroups', function () {
|
||
return fieldToAttrs(this, this.formFieldGroups);
|
||
}),
|
||
|
||
icon: computed('engineType', function () {
|
||
if (!this.engineType || this.engineType === 'kmip') {
|
||
return 'secrets';
|
||
}
|
||
if (this.engineType === 'keymgmt') {
|
||
return 'key';
|
||
}
|
||
return this.engineType;
|
||
}),
|
||
|
||
// namespaces introduced types with a `ns_` prefix for built-in engines
|
||
// so we need to strip that to normalize the type
|
||
engineType: computed('type', function () {
|
||
return (this.type || '').replace(/^ns_/, '');
|
||
}),
|
||
|
||
shouldIncludeInList: computed('engineType', function () {
|
||
return !LIST_EXCLUDED_BACKENDS.includes(this.engineType);
|
||
}),
|
||
|
||
localDisplay: computed('local', function () {
|
||
return this.local ? 'local' : 'replicated';
|
||
}),
|
||
|
||
// ssh specific ones
|
||
privateKey: attr('string'),
|
||
publicKey: attr('string'),
|
||
generateSigningKey: attr('boolean', {
|
||
defaultValue: true,
|
||
}),
|
||
|
||
saveCA(options) {
|
||
if (this.type !== 'ssh') {
|
||
return;
|
||
}
|
||
if (options.isDelete) {
|
||
this.setProperties({
|
||
privateKey: null,
|
||
publicKey: null,
|
||
generateSigningKey: false,
|
||
});
|
||
}
|
||
return this.save({
|
||
adapterOptions: {
|
||
options: options,
|
||
apiPath: 'config/ca',
|
||
attrsToSend: ['privateKey', 'publicKey', 'generateSigningKey'],
|
||
},
|
||
});
|
||
},
|
||
|
||
saveZeroAddressConfig() {
|
||
return this.save({
|
||
adapterOptions: {
|
||
adapterMethod: 'saveZeroAddressConfig',
|
||
},
|
||
});
|
||
},
|
||
|
||
// aws backend attrs
|
||
lease: attr('string'),
|
||
leaseMax: attr('string'),
|
||
});
|