open-vault/ui/mirage/handlers/kms.js
Jordan Reimer 3172e74d7e
Key Management Secrets Engine Phase 1 (#15036)
* KMSE: Key Model / Adapter / Serializer setup (#13638)

* First pass model

* KMS key adapter (create/update), serializer, model

* Add last rotated and provider to key

* KeyEdit secret-edit component, and more key model stuff

* add formatDate param support to infotablerow

* Add keymgmt key to routes and options-for-backend

* Rename keymgmt-key to keymgmt/key

* Add test, cleanup

* Add mirage handler for kms

* Address PR comments

* KMS Providers (#13797)

* adds pagination-controls component

* adds kms provider model, adapter and serializer

* adds kms provider-edit component

* updates secrets routes to handle itemType query param for kms

* updates kms key adapter to query by provider

* adds tests for provider-edit component

* refactors kms provider adapter to account for dynamic path

* adds model-validations-helper util

* removes keymgmt from supported-secret-backends

* fixes issue generating url for fetching keys for a provider

* updates modelType method on secret-edit route to accept options object as arg rather than transition

* adds additional checks to ensure queryParams are defined in options object for modelType method

* UI/keymgmt distribute key (#13840)

* Add distribution details on key page, and empty states if no permissions

* Allow search-select component to return object so parent can tell when new item was created

* Add stringarray transform

* Distribute component first pass

* Refactor distribute component for use with internal object rather than ember-data model

* Specific permission denied errors on key edit

* Allow inline errors on search-select component

* Style updates for form errors

* Styling and error messages on distribute component

* Allow block template on inline alert so we can add doc links

* Add distribute action, flash messages, cleanup

* Cleanup & Add tests

* More cleanup

* Address PR comments

* Move disable operations logic to commponent class

* KMSE Enable/Config (#14835)

* adds keymgmt secrets engine as supported backend

* adds comment to check on keymgmt as member of adp module

* updates kms provider to use model-validations decorator

* fixes lint errors and tests

Co-authored-by: Chelsea Shaw <82459713+hashishaw@users.noreply.github.com>
2022-04-20 12:40:27 -06:00

59 lines
1.3 KiB
JavaScript

export default function (server) {
server.get('keymgmt/key?list=true', function () {
return {
data: {
keys: ['example-1', 'example-2', 'example-3'],
},
};
});
server.get('keymgmt/key/:name', function (_, request) {
let name = request.params.name;
return {
data: {
name,
deletion_allowed: false,
keys: {
1: {
creation_time: '2020-11-02T15:54:58.768473-08:00',
public_key: '-----BEGIN PUBLIC KEY----- ... -----END PUBLIC KEY-----',
},
2: {
creation_time: '2020-11-04T16:58:47.591718-08:00',
public_key: '-----BEGIN PUBLIC KEY----- ... -----END PUBLIC KEY-----',
},
},
latest_version: 2,
min_enabled_version: 1,
type: 'rsa-2048',
},
};
});
server.get('keymgmt/key/:name/kms', function () {
return {
data: {
keys: ['example-kms'],
},
};
});
server.post('keymgmt/key/:name', function () {
return {};
});
server.put('keymgmt/key/:name', function () {
return {};
});
server.get('/keymgmt/kms/:provider/key', () => {
const keys = [];
let i = 1;
while (i <= 75) {
keys.push(`testkey-${i}`);
i++;
}
return { data: { keys } };
});
}