open-vault/ui/app/adapters/cluster.js
Jordan Reimer 5c2a08de6d
Ember Upgrade to 3.24 (#13443)
* Update browserslist

* Add browserslistrc

* ember-cli-update --to 3.26, fix conflicts

* Run codemodes that start with ember-*

* More codemods - before cp*

* More codemods (curly data-test-*)

* WIP ember-basic-dropdown template errors

* updates ember-basic-dropdown and related deps to fix build issues

* updates basic dropdown instances to new version API

* updates more deps -- ember-template-lint is working again

* runs no-implicit-this codemod

* creates and runs no-quoteless-attributes codemod

* runs angle brackets codemod

* updates lint:hbs globs to only touch hbs files

* removes yield only templates

* creates and runs deprecated args transform

* supresses lint error for invokeAction on LinkTo component

* resolves remaining ambiguous path lint errors

* resolves simple-unless lint errors

* adds warnings for deprecated tagName arg on LinkTo components

* adds warnings for remaining curly component invocation

* updates global template lint rules

* resolves remaining template lint errors

* disables some ember specfic lint rules that target pre octane patterns

* js lint fix run

* resolves remaining js lint errors

* fixes test run

* adds npm-run-all dep

* fixes test attribute issues

* fixes console acceptance tests

* fixes tests

* adds yield only wizard/tutorial-active template

* fixes more tests

* attempts to fix more flaky tests

* removes commented out settled in transit test

* updates deprecations workflow and adds initializer to filter by version

* updates flaky policies acl old test

* updates to flaky transit test

* bumps ember deps down to LTS version

* runs linters after main merge

* fixes client count tests after bad merge conflict fixes

* fixes client count history test

* more updates to lint config

* another round of hbs lint fixes after extending stylistic rule

* updates lint-staged commands

* removes indent eslint rule since it seems to break things

* fixes bad attribute in transform-edit-form template

* test fixes

* fixes enterprise tests

* adds changelog

* removes deprecated ember-concurrency-test-waiters dep and adds @ember/test-waiters

* flaky test fix

Co-authored-by: hashishaw <cshaw@hashicorp.com>
2021-12-16 20:44:29 -07:00

216 lines
5.9 KiB
JavaScript

import AdapterError from '@ember-data/adapter/error';
import { inject as service } from '@ember/service';
import { assign } from '@ember/polyfills';
import { hash, resolve } from 'rsvp';
import { assert } from '@ember/debug';
import { pluralize } from 'ember-inflector';
import ApplicationAdapter from './application';
const ENDPOINTS = [
'health',
'seal-status',
'tokens',
'token',
'seal',
'unseal',
'init',
'capabilities-self',
'license',
];
const REPLICATION_ENDPOINTS = {
reindex: 'reindex',
recover: 'recover',
status: 'status',
primary: ['enable', 'disable', 'demote', 'secondary-token', 'revoke-secondary'],
secondary: ['enable', 'disable', 'promote', 'update-primary'],
};
const REPLICATION_MODES = ['dr', 'performance'];
export default ApplicationAdapter.extend({
version: service(),
namespaceService: service('namespace'),
shouldBackgroundReloadRecord() {
return true;
},
findRecord(store, type, id, snapshot) {
let fetches = {
health: this.health(),
sealStatus: this.sealStatus().catch((e) => e),
};
if (this.version.isEnterprise && this.namespaceService.inRootNamespace) {
fetches.replicationStatus = this.replicationStatus().catch((e) => e);
}
return hash(fetches).then(({ health, sealStatus, replicationStatus }) => {
let ret = {
id,
name: snapshot.attr('name'),
};
ret = assign(ret, health);
if (sealStatus instanceof AdapterError === false) {
ret = assign(ret, { nodes: [sealStatus] });
}
if (replicationStatus && replicationStatus instanceof AdapterError === false) {
ret = assign(ret, replicationStatus.data);
}
return resolve(ret);
});
},
pathForType(type) {
return type === 'cluster' ? 'clusters' : pluralize(type);
},
health() {
return this.ajax(this.urlFor('health'), 'GET', {
data: {
standbycode: 200,
sealedcode: 200,
uninitcode: 200,
drsecondarycode: 200,
performancestandbycode: 200,
},
unauthenticated: true,
});
},
features() {
return this.ajax(`${this.urlFor('license')}/features`, 'GET', {
unauthenticated: true,
});
},
sealStatus() {
return this.ajax(this.urlFor('seal-status'), 'GET', { unauthenticated: true });
},
seal() {
return this.ajax(this.urlFor('seal'), 'PUT');
},
unseal(data) {
return this.ajax(this.urlFor('unseal'), 'PUT', {
data,
unauthenticated: true,
});
},
initCluster(data) {
return this.ajax(this.urlFor('init'), 'PUT', {
data,
unauthenticated: true,
});
},
authenticate({ backend, data }) {
const { role, jwt, token, password, username, path } = data;
const url = this.urlForAuth(backend, username, path);
const verb = backend === 'token' ? 'GET' : 'POST';
let options = {
unauthenticated: true,
};
if (backend === 'token') {
options.headers = {
'X-Vault-Token': token,
};
} else if (backend === 'jwt' || backend === 'oidc') {
options.data = { role, jwt };
} else {
options.data = token ? { token, password } : { password };
}
return this.ajax(url, verb, options);
},
urlFor(endpoint) {
if (!ENDPOINTS.includes(endpoint)) {
throw new Error(
`Calls to a ${endpoint} endpoint are not currently allowed in the vault cluster adapater`
);
}
return `${this.buildURL()}/${endpoint}`;
},
urlForAuth(type, username, path) {
const authBackend = type.toLowerCase();
const authURLs = {
github: 'login',
jwt: 'login',
oidc: 'login',
userpass: `login/${encodeURIComponent(username)}`,
ldap: `login/${encodeURIComponent(username)}`,
okta: `login/${encodeURIComponent(username)}`,
radius: `login/${encodeURIComponent(username)}`,
token: 'lookup-self',
};
const urlSuffix = authURLs[authBackend];
const urlPrefix = path && authBackend !== 'token' ? path : authBackend;
if (!urlSuffix) {
throw new Error(`There is no auth url for ${type}.`);
}
return `/v1/auth/${urlPrefix}/${urlSuffix}`;
},
urlForReplication(replicationMode, clusterMode, endpoint) {
let suffix;
const errString = `Calls to replication ${endpoint} endpoint are not currently allowed in the vault cluster adapater`;
if (clusterMode) {
assert(errString, REPLICATION_ENDPOINTS[clusterMode].includes(endpoint));
suffix = `${replicationMode}/${clusterMode}/${endpoint}`;
} else {
assert(errString, REPLICATION_ENDPOINTS[endpoint]);
suffix = `${endpoint}`;
}
return `${this.buildURL()}/replication/${suffix}`;
},
replicationStatus() {
return this.ajax(`${this.buildURL()}/replication/status`, 'GET', { unauthenticated: true });
},
replicationDrPromote(data, options) {
const verb = options && options.checkStatus ? 'GET' : 'PUT';
return this.ajax(`${this.buildURL()}/replication/dr/secondary/promote`, verb, {
data,
unauthenticated: true,
});
},
generateDrOperationToken(data, options) {
let verb = options && options.checkStatus ? 'GET' : 'PUT';
if (options.cancel) {
verb = 'DELETE';
}
let url = `${this.buildURL()}/replication/dr/secondary/generate-operation-token/`;
if (!data || data.pgp_key || data.attempt) {
// start the generation
url = url + 'attempt';
} else {
// progress the operation
url = url + 'update';
}
return this.ajax(url, verb, {
data,
unauthenticated: true,
});
},
replicationAction(action, replicationMode, clusterMode, data) {
assert(
`${replicationMode} is an unsupported replication mode.`,
replicationMode && REPLICATION_MODES.includes(replicationMode)
);
const url =
action === 'recover' || action === 'reindex'
? this.urlForReplication(replicationMode, null, action)
: this.urlForReplication(replicationMode, clusterMode, action);
return this.ajax(url, 'POST', { data });
},
});