3172e74d7e
* KMSE: Key Model / Adapter / Serializer setup (#13638) * First pass model * KMS key adapter (create/update), serializer, model * Add last rotated and provider to key * KeyEdit secret-edit component, and more key model stuff * add formatDate param support to infotablerow * Add keymgmt key to routes and options-for-backend * Rename keymgmt-key to keymgmt/key * Add test, cleanup * Add mirage handler for kms * Address PR comments * KMS Providers (#13797) * adds pagination-controls component * adds kms provider model, adapter and serializer * adds kms provider-edit component * updates secrets routes to handle itemType query param for kms * updates kms key adapter to query by provider * adds tests for provider-edit component * refactors kms provider adapter to account for dynamic path * adds model-validations-helper util * removes keymgmt from supported-secret-backends * fixes issue generating url for fetching keys for a provider * updates modelType method on secret-edit route to accept options object as arg rather than transition * adds additional checks to ensure queryParams are defined in options object for modelType method * UI/keymgmt distribute key (#13840) * Add distribution details on key page, and empty states if no permissions * Allow search-select component to return object so parent can tell when new item was created * Add stringarray transform * Distribute component first pass * Refactor distribute component for use with internal object rather than ember-data model * Specific permission denied errors on key edit * Allow inline errors on search-select component * Style updates for form errors * Styling and error messages on distribute component * Allow block template on inline alert so we can add doc links * Add distribute action, flash messages, cleanup * Cleanup & Add tests * More cleanup * Address PR comments * Move disable operations logic to commponent class * KMSE Enable/Config (#14835) * adds keymgmt secrets engine as supported backend * adds comment to check on keymgmt as member of adp module * updates kms provider to use model-validations decorator * fixes lint errors and tests Co-authored-by: Chelsea Shaw <82459713+hashishaw@users.noreply.github.com>
189 lines
5.8 KiB
JavaScript
189 lines
5.8 KiB
JavaScript
import Ember from 'ember';
|
|
import { inject as service } from '@ember/service';
|
|
import { computed } from '@ember/object';
|
|
import Component from '@ember/component';
|
|
import { task } from 'ember-concurrency';
|
|
import { methods } from 'vault/helpers/mountable-auth-methods';
|
|
import { engines, KMIP, TRANSFORM, KEYMGMT } from 'vault/helpers/mountable-secret-engines';
|
|
import { waitFor } from '@ember/test-waiters';
|
|
|
|
const METHODS = methods();
|
|
const ENGINES = engines();
|
|
|
|
export default Component.extend({
|
|
store: service(),
|
|
wizard: service(),
|
|
flashMessages: service(),
|
|
version: service(),
|
|
|
|
/*
|
|
* @param Function
|
|
* @public
|
|
*
|
|
* Optional param to call a function upon successfully mounting a backend
|
|
*
|
|
*/
|
|
onMountSuccess() {},
|
|
/*
|
|
* @param String
|
|
* @public
|
|
* the type of backend we want to mount
|
|
* defaults to `auth`
|
|
*
|
|
*/
|
|
mountType: 'auth',
|
|
|
|
/*
|
|
*
|
|
* @param DS.Model
|
|
* @private
|
|
* Ember Data model corresponding to the `mountType`.
|
|
* Created and set during `init`
|
|
*
|
|
*/
|
|
mountModel: null,
|
|
|
|
showEnable: false,
|
|
|
|
// validation related properties
|
|
modelValidations: null,
|
|
isFormInvalid: false,
|
|
|
|
mountIssue: false,
|
|
|
|
init() {
|
|
this._super(...arguments);
|
|
const type = this.mountType;
|
|
const modelType = type === 'secret' ? 'secret-engine' : 'auth-method';
|
|
const model = this.store.createRecord(modelType);
|
|
this.set('mountModel', model);
|
|
},
|
|
|
|
mountTypes: computed('engines', 'mountType', function () {
|
|
return this.mountType === 'secret' ? this.engines : METHODS;
|
|
}),
|
|
|
|
engines: computed('version.{features[],isEnterprise}', function () {
|
|
if (this.version.isEnterprise) {
|
|
return ENGINES.concat([KMIP, TRANSFORM, KEYMGMT]);
|
|
}
|
|
return ENGINES;
|
|
}),
|
|
|
|
willDestroy() {
|
|
this._super(...arguments);
|
|
// if unsaved, we want to unload so it doesn't show up in the auth mount list
|
|
this.mountModel.rollbackAttributes();
|
|
},
|
|
|
|
checkPathChange(type) {
|
|
let mount = this.mountModel;
|
|
let currentPath = mount.path;
|
|
let list = this.mountTypes;
|
|
// if the current path matches a type (meaning the user hasn't altered it),
|
|
// change it here to match the new type
|
|
let isUnchanged = list.findBy('type', currentPath);
|
|
if (!currentPath || isUnchanged) {
|
|
mount.set('path', type);
|
|
}
|
|
},
|
|
|
|
mountBackend: task(
|
|
waitFor(function* () {
|
|
const mountModel = this.mountModel;
|
|
const { type, path } = mountModel;
|
|
let capabilities = null;
|
|
try {
|
|
capabilities = yield this.store.findRecord('capabilities', `${path}/config`);
|
|
} catch (err) {
|
|
if (Ember.testing) {
|
|
//captures mount-backend-form component test
|
|
yield mountModel.save();
|
|
let mountType = this.mountType;
|
|
mountType = mountType === 'secret' ? `${mountType}s engine` : `${mountType} method`;
|
|
this.flashMessages.success(`Successfully mounted the ${type} ${mountType} at ${path}.`);
|
|
yield this.onMountSuccess(type, path);
|
|
return;
|
|
} else {
|
|
throw err;
|
|
}
|
|
}
|
|
|
|
let changedAttrKeys = Object.keys(mountModel.changedAttributes());
|
|
let updatesConfig =
|
|
changedAttrKeys.includes('casRequired') ||
|
|
changedAttrKeys.includes('deleteVersionAfter') ||
|
|
changedAttrKeys.includes('maxVersions');
|
|
|
|
try {
|
|
yield mountModel.save();
|
|
} catch (err) {
|
|
if (err.httpStatus === 403) {
|
|
this.mountIssue = true;
|
|
this.set('isFormInvalid', this.mountIssue);
|
|
this.flashMessages.danger(
|
|
'You do not have access to the sys/mounts endpoint. The secret engine was not mounted.'
|
|
);
|
|
return;
|
|
}
|
|
if (err.errors) {
|
|
let errors = err.errors.map((e) => {
|
|
if (typeof e === 'object') return e.title || e.message || JSON.stringify(e);
|
|
return e;
|
|
});
|
|
this.set('errors', errors);
|
|
} else if (err.message) {
|
|
this.set('errorMessage', err.message);
|
|
} else {
|
|
this.set('errorMessage', 'An error occurred, check the vault logs.');
|
|
}
|
|
return;
|
|
}
|
|
// mountModel must be after the save
|
|
if (mountModel.isV2KV && updatesConfig && !capabilities.get('canUpdate')) {
|
|
// config error is not thrown from secret-engine adapter, so handling here
|
|
this.flashMessages.warning(
|
|
'You do not have access to the config endpoint. The secret engine was mounted, but the configuration settings were not saved.'
|
|
);
|
|
// remove the config data from the model otherwise it will save it even if the network request failed.
|
|
[this.mountModel.maxVersions, this.mountModel.casRequired, this.mountModel.deleteVersionAfter] = [
|
|
0,
|
|
false,
|
|
0,
|
|
];
|
|
}
|
|
let mountType = this.mountType;
|
|
mountType = mountType === 'secret' ? `${mountType}s engine` : `${mountType} method`;
|
|
this.flashMessages.success(`Successfully mounted the ${type} ${mountType} at ${path}.`);
|
|
yield this.onMountSuccess(type, path);
|
|
return;
|
|
})
|
|
).drop(),
|
|
|
|
actions: {
|
|
onKeyUp(name, value) {
|
|
this.mountModel.set(name, value);
|
|
const { isValid, state } = this.mountModel.validate();
|
|
this.setProperties({
|
|
modelValidations: state,
|
|
isFormInvalid: !isValid,
|
|
});
|
|
},
|
|
onTypeChange(path, value) {
|
|
if (path === 'type') {
|
|
this.wizard.set('componentState', value);
|
|
this.checkPathChange(value);
|
|
}
|
|
},
|
|
|
|
toggleShowEnable(value) {
|
|
this.set('showEnable', value);
|
|
if (value === true && this.wizard.featureState === 'idle') {
|
|
this.wizard.transitionFeatureMachine(this.wizard.featureState, 'CONTINUE', this.mountModel.type);
|
|
} else {
|
|
this.wizard.transitionFeatureMachine(this.wizard.featureState, 'RESET', this.mountModel.type);
|
|
}
|
|
},
|
|
},
|
|
});
|