open-vault/ui/app/services/control-group.js
Noelle Daley 899f0dc2cb
do not swallow ControlGroupErrors when viewing or editing kvv2 secrets (#7504)
* do not swallow ControlGroupErrors when viewing or editing kvv2 secrets

* test kv v2 control group workflow

* do not manually clearModelCache when logging out since this already happens when leaving the logout route

* remove pauseTest

* update comments

* wip - looking into why restricted user can see the control group protected secret after it has already been unwrapped once

* strip version from query params so we can unwrap a secret after it is authorized

* use attachCapabilities instead of lazyCapabilities to ensure models are cleaned up properly

* remove comment

* make ControlGroupError extend AdapterError

* fix broken redirect_to test

* one day i will remember to remove my debugger statements; today is not that day

* no need to check for a ControlGroupError since it extends an AdapterError

* see if using EmberError instead of AdapterError fixes the browserstack tests

* Revert "see if using EmberError instead of AdapterError fixes the browserstack tests"

This reverts commit 14ddd67cacbf1ccecb8cc2d1f59a2c273866da72.
2019-10-04 13:15:33 -07:00

154 lines
4.8 KiB
JavaScript

import { get } from '@ember/object';
import Service, { inject as service } from '@ember/service';
import RSVP from 'rsvp';
import ControlGroupError from 'vault/lib/control-group-error';
import getStorage from 'vault/lib/token-storage';
import parseURL from 'core/utils/parse-url';
const CONTROL_GROUP_PREFIX = 'vault:cg-';
const TOKEN_SEPARATOR = '☃';
// list of endpoints that return wrapped responses
// without `wrap-ttl`
const WRAPPED_RESPONSE_PATHS = [
'sys/wrapping/rewrap',
'sys/wrapping/wrap',
'sys/replication/performance/primary/secondary-token',
'sys/replication/dr/primary/secondary-token',
];
const storageKey = (accessor, path) => {
return `${CONTROL_GROUP_PREFIX}${accessor}${TOKEN_SEPARATOR}${path}`;
};
export { storageKey, CONTROL_GROUP_PREFIX, TOKEN_SEPARATOR };
export default Service.extend({
version: service(),
router: service(),
storage() {
return getStorage();
},
keyFromAccessor(accessor) {
let keys = this.storage().keys() || [];
let returnKey = keys
.filter(k => k.startsWith(CONTROL_GROUP_PREFIX))
.find(key => key.replace(CONTROL_GROUP_PREFIX, '').startsWith(accessor));
return returnKey ? returnKey : null;
},
storeControlGroupToken(info) {
let key = storageKey(info.accessor, info.creation_path);
this.storage().setItem(key, info);
},
deleteControlGroupToken(accessor) {
this.unmarkTokenForUnwrap();
let key = this.keyFromAccessor(accessor);
this.storage().removeItem(key);
},
deleteTokens() {
let keys = this.storage().keys() || [];
keys.filter(k => k.startsWith(CONTROL_GROUP_PREFIX)).forEach(key => this.storage().removeItem(key));
},
wrapInfoForAccessor(accessor) {
let key = this.keyFromAccessor(accessor);
return key ? this.storage().getItem(key) : null;
},
tokenToUnwrap: null,
markTokenForUnwrap(accessor) {
this.set('tokenToUnwrap', this.wrapInfoForAccessor(accessor));
},
unmarkTokenForUnwrap() {
this.set('tokenToUnwrap', null);
},
tokenForUrl(url) {
if (this.get('version.isOSS')) {
return null;
}
let pathForUrl = parseURL(url).pathname;
pathForUrl = pathForUrl.replace('/v1/', '');
let tokenInfo = this.get('tokenToUnwrap');
if (tokenInfo && tokenInfo.creation_path === pathForUrl) {
let { token, accessor, creation_time } = tokenInfo;
return { token, accessor, creationTime: creation_time };
}
return null;
},
checkForControlGroup(callbackArgs, response, wasWrapTTLRequested) {
let creationPath = response && get(response, 'wrap_info.creation_path');
if (
this.get('version.isOSS') ||
wasWrapTTLRequested ||
!response ||
(creationPath && WRAPPED_RESPONSE_PATHS.includes(creationPath)) ||
!response.wrap_info
) {
return RSVP.resolve(...callbackArgs);
}
let error = new ControlGroupError(response.wrap_info);
return RSVP.reject(error);
},
paramsFromTransition(transitionTo, params, queryParams) {
let returnedParams = params.slice();
let qps = queryParams;
transitionTo.paramNames.map(name => {
let param = transitionTo.params[name];
if (param.length) {
// push on to the front of the array since were're started at the end
returnedParams.unshift(param);
}
});
qps = { ...queryParams, ...transitionTo.queryParams };
// if there's a parent transition, recurse to get its route params
if (transitionTo.parent) {
[returnedParams, qps] = this.paramsFromTransition(transitionTo.parent, returnedParams, qps);
}
return [returnedParams, qps];
},
urlFromTransition(transitionObj) {
let transition = transitionObj.to;
let [params, queryParams] = this.paramsFromTransition(transition, [], {});
let url = this.get('router').urlFor(transition.name, ...params, {
queryParams,
});
return url.replace('/ui', '');
},
handleError(error, transition) {
let { accessor, token, creation_path, creation_time, ttl } = error;
let url = this.urlFromTransition(transition);
let data = { accessor, token, creation_path, creation_time, ttl };
data.uiParams = { url };
this.storeControlGroupToken(data);
return this.get('router').transitionTo('vault.cluster.access.control-group-accessor', accessor);
},
logFromError(error) {
let { accessor, token, creation_path, creation_time, ttl } = error;
let data = { accessor, token, creation_path, creation_time, ttl };
this.storeControlGroupToken(data);
let href = this.get('router').urlFor('vault.cluster.access.control-group-accessor', accessor);
let lines = [
`A Control Group was encountered at ${error.creation_path}.`,
`The Control Group Token is ${error.token}.`,
`The Accessor is ${error.accessor}.`,
`Visit <a href='${href}'>${href}</a> for more details.`,
];
return {
type: 'error-with-html',
content: lines.join('\n'),
};
},
});