open-vault/ui/lib/pki
claire bontempo 76f1971126
UI: pki configuration edit form (#20245)
* setup routing, move queries in ConfigurationIndex to parent resource route

* finish building out form, add model attrs build ttls

* add types

* update model attribute values, fix default ttl states

* remove defaults and use openApi, group with booleans

* add model to application route"

* add save functionality

* add error banner

* add transition after save

* use defaults from open api

* fix empty state language

* pass engine data

* change model attrs to ttl objects

* update types

* add invalid form alert to error block

* move data manipulation to serialize

* fix serializer, add comments

* add test for serializer

* edit configuration details view

* update details test

* change to updateRecord so POST request is made

* config/urls use POST instead of PUT

* add edit tests, update details

* add model hooks back to routes

* rearrange to remove dif

* remove createRecord for urls

* update comment

* wip sample ttl transform

* Revert "wip sample ttl transform"

This reverts commit 59fc179b5cd2994c4258e553e56667e29b3d6b72.

* revert changes, move model updates back to component

* simplify model fetches

* address comments;

* update pki/urls test

* update adapter test
2023-04-25 21:50:19 +00:00
..
addon UI: pki configuration edit form (#20245) 2023-04-25 21:50:19 +00:00
app/utils adding copyright header (#19555) 2023-03-15 09:00:52 -07:00
config adding copyright header (#19555) 2023-03-15 09:00:52 -07:00
README.md UI: PKI Generate Root Form (#18712) 2023-01-18 12:20:44 -06:00
index.js adding copyright header (#19555) 2023-03-15 09:00:52 -07:00
package.json Re-add custom flash service so engines can extend cluster's template (#19963) 2023-04-03 13:13:59 -06:00

README.md

Vault PKI

Welcome to the Vault PKI (Ember) Engine! Below is an overview of PKI and resources for how to get started working within this engine.

About PKI

Public Key Infrastructure (PKI) is a system of processes, technologies, and policies that allows you to encrypt and sign data. (source: digicert.com)

The Vault PKI Secrets Engine allows security engineers to create a chain of PKI certificates much easier than they would with traditional workflows.

About the UI engine

If you couldn't tell from the documentation above, PKI is complex. As such, the data doesn't map cleanly to a CRUD model and so the first thing you might notice is that the models and adapters for PKI (which live in the main app, not the engine) have some custom logic that differentiate it from most other secret engines. Below are the model

pki/key

TBD

pki/role

TBD

pki/issuer

TBD

pki/certificate/*

TBD

pki/action

TBD