open-vault/ui/app/components/role-aws-edit.js
Matthew Irish 331b6ce6f5
refactor aws secret ui (#5193)
Update UI for AWS secret backend refactor

* Support empty AWS policy documents
* Try to make ARN input multiple
* move aws-role serializer to use the application serializer as the base
* support editing strings as JSON in the form field component
* update model, form and show to use form-component component, and swap fields based on credential type
* fix tests
* unify credential generation for aws and remove the STS specific action in the UI
* add label to the new json string form field
2018-08-27 19:54:30 -05:00

56 lines
1.4 KiB
JavaScript

import RoleEdit from './role-edit';
import Ember from 'ember';
const { get, set } = Ember;
const SHOW_ROUTE = 'vault.cluster.secrets.backend.show';
export default RoleEdit.extend({
init() {
this._super(...arguments);
},
actions: {
createOrUpdate(type, event) {
event.preventDefault();
const modelId = this.get('model.id');
// prevent from submitting if there's no key
// maybe do something fancier later
if (type === 'create' && Ember.isBlank(modelId)) {
return;
}
var credential_type = get(this, 'model.credential_type');
if (credential_type == "iam_user") {
set(this, 'model.role_arns', []);
}
if (credential_type == "assumed_role") {
set(this, 'model.policy_arns', []);
}
if (credential_type == "federation_token") {
set(this, 'model.role_arns', []);
set(this, 'model.policy_arns', []);
}
var policy_document = get(this, 'model.policy_document');
if (policy_document == '{}') {
set(this, 'model.policy_document', '');
}
this.persist('save', () => {
this.hasDataChanges();
this.transitionToRoute(SHOW_ROUTE, modelId);
});
},
codemirrorUpdated(attr, val, codemirror) {
codemirror.performLint();
const hasErrors = codemirror.state.lint.marked.length > 0;
if (!hasErrors) {
set(this.get('model'), attr, val);
}
},
},
});