331b6ce6f5
Update UI for AWS secret backend refactor * Support empty AWS policy documents * Try to make ARN input multiple * move aws-role serializer to use the application serializer as the base * support editing strings as JSON in the form field component * update model, form and show to use form-component component, and swap fields based on credential type * fix tests * unify credential generation for aws and remove the STS specific action in the UI * add label to the new json string form field
56 lines
1.4 KiB
JavaScript
56 lines
1.4 KiB
JavaScript
import RoleEdit from './role-edit';
|
|
import Ember from 'ember';
|
|
|
|
const { get, set } = Ember;
|
|
const SHOW_ROUTE = 'vault.cluster.secrets.backend.show';
|
|
|
|
export default RoleEdit.extend({
|
|
init() {
|
|
this._super(...arguments);
|
|
},
|
|
|
|
actions: {
|
|
createOrUpdate(type, event) {
|
|
event.preventDefault();
|
|
|
|
const modelId = this.get('model.id');
|
|
// prevent from submitting if there's no key
|
|
// maybe do something fancier later
|
|
if (type === 'create' && Ember.isBlank(modelId)) {
|
|
return;
|
|
}
|
|
|
|
var credential_type = get(this, 'model.credential_type');
|
|
if (credential_type == "iam_user") {
|
|
set(this, 'model.role_arns', []);
|
|
}
|
|
if (credential_type == "assumed_role") {
|
|
set(this, 'model.policy_arns', []);
|
|
}
|
|
if (credential_type == "federation_token") {
|
|
set(this, 'model.role_arns', []);
|
|
set(this, 'model.policy_arns', []);
|
|
}
|
|
|
|
var policy_document = get(this, 'model.policy_document');
|
|
if (policy_document == '{}') {
|
|
set(this, 'model.policy_document', '');
|
|
}
|
|
|
|
this.persist('save', () => {
|
|
this.hasDataChanges();
|
|
this.transitionToRoute(SHOW_ROUTE, modelId);
|
|
});
|
|
},
|
|
|
|
codemirrorUpdated(attr, val, codemirror) {
|
|
codemirror.performLint();
|
|
const hasErrors = codemirror.state.lint.marked.length > 0;
|
|
|
|
if (!hasErrors) {
|
|
set(this.get('model'), attr, val);
|
|
}
|
|
},
|
|
},
|
|
});
|