open-vault/ui/app/controllers/vault/cluster/init.js

93 lines
2.2 KiB
JavaScript

import { computed } from '@ember/object';
import { inject as service } from '@ember/service';
import Controller from '@ember/controller';
const DEFAULTS = {
keyData: null,
secret_shares: null,
secret_threshold: null,
pgp_keys: null,
use_pgp: false,
loading: false,
};
export default Controller.extend(DEFAULTS, {
wizard: service(),
reset() {
this.setProperties(DEFAULTS);
},
initSuccess(resp) {
this.set('loading', false);
this.set('keyData', resp);
this.model.reload();
this.wizard.set('initEvent', 'SAVE');
this.wizard.transitionTutorialMachine(this.wizard.currentState, 'TOSAVE');
},
initError(e) {
this.set('loading', false);
if (e.httpStatus === 400) {
this.set('errors', e.errors);
} else {
throw e;
}
},
keyFilename: computed('model.name', function() {
return `vault-cluster-${this.model.name}`;
}),
actions: {
initCluster(data) {
let isCloudSeal = !!this.model.sealType && this.model.sealType !== 'shamir';
if (data.secret_shares) {
let shares = parseInt(data.secret_shares, 10);
data.secret_shares = shares;
if (isCloudSeal) {
data.stored_shares = 1;
data.recovery_shares = shares;
}
}
if (data.secret_threshold) {
let threshold = parseInt(data.secret_threshold, 10);
data.secret_threshold = threshold;
if (isCloudSeal) {
data.recovery_threshold = threshold;
}
}
if (!data.use_pgp) {
delete data.pgp_keys;
}
if (data.use_pgp && isCloudSeal) {
data.recovery_pgp_keys = data.pgp_keys;
}
if (!data.use_pgp_for_root) {
delete data.root_token_pgp_key;
}
delete data.use_pgp;
delete data.use_pgp_for_root;
const store = this.model.store;
this.setProperties({
loading: true,
errors: null,
});
store
.adapterFor('cluster')
.initCluster(data)
.then(resp => this.initSuccess(resp), (...errArgs) => this.initError(...errArgs));
},
setKeys(data) {
this.set('pgp_keys', data);
},
setRootKey([key]) {
this.set('root_token_pgp_key', key);
},
},
});