52fe56ec87
* adds prefer-const to eslint config and runs fixer * reverts unintended change
208 lines
7.3 KiB
JavaScript
208 lines
7.3 KiB
JavaScript
import Model, { attr, belongsTo } from '@ember-data/model';
|
||
import { computed } from '@ember/object'; // eslint-disable-line
|
||
import { equal } from '@ember/object/computed'; // eslint-disable-line
|
||
import fieldToAttrs, { expandAttributeMeta } from 'vault/utils/field-to-attrs';
|
||
import { withModelValidations } from 'vault/decorators/model-validations';
|
||
|
||
// identity will be managed separately and the inclusion
|
||
// of the system backend is an implementation detail
|
||
const LIST_EXCLUDED_BACKENDS = ['system', 'identity'];
|
||
|
||
const validations = {
|
||
path: [{ type: 'presence', message: "Path can't be blank." }],
|
||
maxVersions: [
|
||
{ type: 'number', message: 'Maximum versions must be a number.' },
|
||
{ type: 'length', options: { min: 1, max: 16 }, message: 'You cannot go over 16 characters.' },
|
||
],
|
||
};
|
||
|
||
@withModelValidations(validations)
|
||
class SecretEngineModel extends Model {}
|
||
export default SecretEngineModel.extend({
|
||
path: attr('string'),
|
||
accessor: attr('string'),
|
||
name: attr('string'),
|
||
type: attr('string', {
|
||
label: 'Secret engine type',
|
||
}),
|
||
description: attr('string', {
|
||
editType: 'textarea',
|
||
}),
|
||
// will only have value for kv type
|
||
version: attr('number', {
|
||
label: 'Version',
|
||
helpText:
|
||
'The KV Secrets Engine can operate in different modes. Version 1 is the original generic Secrets Engine the allows for storing of static key/value pairs. Version 2 added more features including data versioning, TTLs, and check and set.',
|
||
possibleValues: [2, 1],
|
||
// This shouldn't be defaultValue because if no version comes back from API we should assume it's v1
|
||
defaultFormValue: 2, // Set the form to 2 by default
|
||
}),
|
||
config: belongsTo('mount-config', { async: false, inverse: null }),
|
||
local: attr('boolean', {
|
||
helpText:
|
||
'When Replication is enabled, a local mount will not be replicated across clusters. This can only be specified at mount time.',
|
||
}),
|
||
sealWrap: attr('boolean', {
|
||
helpText:
|
||
'When enabled - if a seal supporting seal wrapping is specified in the configuration, all critical security parameters (CSPs) in this backend will be seal wrapped. (For K/V mounts, all values will be seal wrapped.) This can only be specified at mount time.',
|
||
}),
|
||
// KV 2 additional config default options
|
||
maxVersions: attr('number', {
|
||
defaultValue: 0,
|
||
label: 'Maximum number of versions',
|
||
subText:
|
||
'The number of versions to keep per key. Once the number of keys exceeds the maximum number set here, the oldest version will be permanently deleted. This value applies to all keys, but a key’s metadata settings can overwrite this value. When 0 is used or the value is unset, Vault will keep 10 versions.',
|
||
}),
|
||
casRequired: attr('boolean', {
|
||
defaultValue: false,
|
||
label: 'Require Check and Set',
|
||
subText:
|
||
'If checked, all keys will require the cas parameter to be set on all write requests. A key’s metadata settings can overwrite this value.',
|
||
}),
|
||
deleteVersionAfter: attr({
|
||
defaultValue: 0,
|
||
editType: 'ttl',
|
||
label: 'Automate secret deletion',
|
||
helperTextDisabled: 'A secret’s version must be manually deleted.',
|
||
helperTextEnabled: 'Delete all new versions of this secret after',
|
||
}),
|
||
|
||
modelTypeForKV: computed('engineType', 'version', function () {
|
||
const type = this.engineType;
|
||
let modelType = 'secret';
|
||
if ((type === 'kv' || type === 'generic') && this.version === 2) {
|
||
modelType = 'secret-v2';
|
||
}
|
||
return modelType;
|
||
}),
|
||
|
||
isV2KV: equal('modelTypeForKV', 'secret-v2'),
|
||
|
||
formFields: computed('engineType', 'version', function () {
|
||
const type = this.engineType;
|
||
const fields = ['type', 'path', 'description', 'accessor', 'local', 'sealWrap'];
|
||
// no ttl options for keymgmt
|
||
const ttl = type !== 'keymgmt' ? 'defaultLeaseTtl,maxLeaseTtl,' : '';
|
||
fields.push(`config.{${ttl}auditNonHmacRequestKeys,auditNonHmacResponseKeys,passthroughRequestHeaders}`);
|
||
if (type === 'kv' || type === 'generic') {
|
||
fields.push('version');
|
||
}
|
||
// version comes in as number not string
|
||
if (type === 'kv' && this.version === 2) {
|
||
fields.push('casRequired', 'deleteVersionAfter', 'maxVersions');
|
||
}
|
||
return fields;
|
||
}),
|
||
|
||
formFieldGroups: computed('engineType', function () {
|
||
const type = this.engineType;
|
||
let defaultGroup;
|
||
// KV has specific config options it adds on the enable engine. https://www.vaultproject.io/api/secret/kv/kv-v2#configure-the-kv-engine
|
||
if (type === 'kv') {
|
||
defaultGroup = { default: ['path', 'maxVersions', 'casRequired', 'deleteVersionAfter'] };
|
||
} else {
|
||
defaultGroup = { default: ['path'] };
|
||
}
|
||
const optionsGroup = {
|
||
'Method Options': ['description', 'config.listingVisibility', 'local', 'sealWrap'],
|
||
};
|
||
// no ttl options for keymgmt
|
||
const ttl = type !== 'keymgmt' ? 'defaultLeaseTtl,maxLeaseTtl,' : '';
|
||
optionsGroup['Method Options'].push(
|
||
`config.{${ttl}auditNonHmacRequestKeys,auditNonHmacResponseKeys,passthroughRequestHeaders}`
|
||
);
|
||
|
||
if (type === 'kv' || type === 'generic') {
|
||
optionsGroup['Method Options'].unshift('version');
|
||
}
|
||
if (type === 'database') {
|
||
// For the Database Secret Engine we want to highlight the defaultLeaseTtl and maxLeaseTtl, removing them from the options object
|
||
defaultGroup.default.push('config.{defaultLeaseTtl}', 'config.{maxLeaseTtl}');
|
||
return [
|
||
defaultGroup,
|
||
{
|
||
'Method Options': [
|
||
'description',
|
||
'config.listingVisibility',
|
||
'local',
|
||
'sealWrap',
|
||
'config.{auditNonHmacRequestKeys,auditNonHmacResponseKeys,passthroughRequestHeaders}',
|
||
],
|
||
},
|
||
];
|
||
}
|
||
return [defaultGroup, optionsGroup];
|
||
}),
|
||
|
||
attrs: computed('formFields', function () {
|
||
return expandAttributeMeta(this, this.formFields);
|
||
}),
|
||
|
||
fieldGroups: computed('formFieldGroups', function () {
|
||
return fieldToAttrs(this, this.formFieldGroups);
|
||
}),
|
||
|
||
icon: computed('engineType', function () {
|
||
if (!this.engineType || this.engineType === 'kmip') {
|
||
return 'secrets';
|
||
}
|
||
if (this.engineType === 'keymgmt') {
|
||
return 'key';
|
||
}
|
||
return this.engineType;
|
||
}),
|
||
|
||
// namespaces introduced types with a `ns_` prefix for built-in engines
|
||
// so we need to strip that to normalize the type
|
||
engineType: computed('type', function () {
|
||
return (this.type || '').replace(/^ns_/, '');
|
||
}),
|
||
|
||
shouldIncludeInList: computed('engineType', function () {
|
||
return !LIST_EXCLUDED_BACKENDS.includes(this.engineType);
|
||
}),
|
||
|
||
localDisplay: computed('local', function () {
|
||
return this.local ? 'local' : 'replicated';
|
||
}),
|
||
|
||
// ssh specific ones
|
||
privateKey: attr('string'),
|
||
publicKey: attr('string'),
|
||
generateSigningKey: attr('boolean', {
|
||
defaultValue: true,
|
||
}),
|
||
|
||
saveCA(options) {
|
||
if (this.type !== 'ssh') {
|
||
return;
|
||
}
|
||
if (options.isDelete) {
|
||
this.setProperties({
|
||
privateKey: null,
|
||
publicKey: null,
|
||
generateSigningKey: false,
|
||
});
|
||
}
|
||
return this.save({
|
||
adapterOptions: {
|
||
options: options,
|
||
apiPath: 'config/ca',
|
||
attrsToSend: ['privateKey', 'publicKey', 'generateSigningKey'],
|
||
},
|
||
});
|
||
},
|
||
|
||
saveZeroAddressConfig() {
|
||
return this.save({
|
||
adapterOptions: {
|
||
adapterMethod: 'saveZeroAddressConfig',
|
||
},
|
||
});
|
||
},
|
||
|
||
// aws backend attrs
|
||
lease: attr('string'),
|
||
leaseMax: attr('string'),
|
||
});
|