572fb826be
* allow passing a path for options so that it can be extracted from the model * add cred type selector for the aws generate form * style hint text on generate creds form * add tests for aws-credential adapter * allow for the case where we might have zero ttl * show error for TTL picker if a non-number is entered for the duration part of the TTL * fix positioning of tooltips * fix ttl rendering with invalid input for initialValue
80 lines
2.4 KiB
JavaScript
80 lines
2.4 KiB
JavaScript
import { computed } from '@ember/object';
|
|
import DS from 'ember-data';
|
|
import { expandAttributeMeta } from 'vault/utils/field-to-attrs';
|
|
const { attr } = DS;
|
|
const CREDENTIAL_TYPES = [
|
|
{
|
|
value: 'iam_user',
|
|
displayName: 'IAM User',
|
|
},
|
|
{
|
|
value: 'assumed_role',
|
|
displayName: 'Assumed Role',
|
|
},
|
|
{
|
|
value: 'federation_token',
|
|
displayName: 'Federation Token',
|
|
},
|
|
];
|
|
|
|
const DISPLAY_FIELDS = ['accessKey', 'secretKey', 'securityToken', 'leaseId', 'renewable', 'leaseDuration'];
|
|
export default DS.Model.extend({
|
|
helpText:
|
|
'For Vault roles of credential type iam_user, there are no inputs, just submit the form. Choose a type to change the input options.',
|
|
role: attr('object', {
|
|
readOnly: true,
|
|
}),
|
|
|
|
credentialType: attr('string', {
|
|
defaultValue: 'iam_user',
|
|
possibleValues: CREDENTIAL_TYPES,
|
|
readOnly: true,
|
|
}),
|
|
|
|
roleArn: attr('string', {
|
|
label: 'Role ARN',
|
|
helpText:
|
|
'The ARN of the role to assume if credential_type on the Vault role is assumed_role. Optional if the role has a single role ARN; required otherwise.',
|
|
}),
|
|
|
|
ttl: attr({
|
|
editType: 'ttl',
|
|
defaultValue: '3600s',
|
|
setDefault: true,
|
|
label: 'TTL',
|
|
helpText:
|
|
'Specifies the TTL for the use of the STS token. Valid only when credential_type is assumed_role or federation_token.',
|
|
}),
|
|
leaseId: attr('string'),
|
|
renewable: attr('boolean'),
|
|
leaseDuration: attr('number'),
|
|
accessKey: attr('string'),
|
|
secretKey: attr('string'),
|
|
securityToken: attr('string'),
|
|
|
|
attrs: computed('credentialType', 'accessKey', 'securityToken', function() {
|
|
let type = this.get('credentialType');
|
|
let fieldsForType = {
|
|
iam_user: ['credentialType'],
|
|
assumed_role: ['credentialType', 'ttl', 'roleArn'],
|
|
federation_token: ['credentialType', 'ttl'],
|
|
};
|
|
if (this.get('accessKey') || this.get('securityToken')) {
|
|
return expandAttributeMeta(this, DISPLAY_FIELDS.slice(0));
|
|
}
|
|
return expandAttributeMeta(this, fieldsForType[type].slice(0));
|
|
}),
|
|
|
|
toCreds: computed('accessKey', 'secretKey', 'securityToken', 'leaseId', function() {
|
|
const props = this.getProperties('accessKey', 'secretKey', 'securityToken', 'leaseId');
|
|
const propsWithVals = Object.keys(props).reduce((ret, prop) => {
|
|
if (props[prop]) {
|
|
ret[prop] = props[prop];
|
|
return ret;
|
|
}
|
|
return ret;
|
|
}, {});
|
|
return JSON.stringify(propsWithVals, null, 2);
|
|
}),
|
|
});
|