b76d2cd09c
* Add cluster name to oidc-provider path * Move oidc-provider route up on router * Return base url for changelog if no version * OIDC Provider check on targetRouteName instead of transitionToTargetRoute * restore dynamic provider segment on route * Fix redirect after auth issue * handle permission denied
103 lines
3.2 KiB
JavaScript
103 lines
3.2 KiB
JavaScript
import { inject as service } from '@ember/service';
|
|
import Mixin from '@ember/object/mixin';
|
|
import RSVP from 'rsvp';
|
|
const INIT = 'vault.cluster.init';
|
|
const UNSEAL = 'vault.cluster.unseal';
|
|
const AUTH = 'vault.cluster.auth';
|
|
const CLUSTER = 'vault.cluster';
|
|
const CLUSTER_INDEX = 'vault.cluster.index';
|
|
const OIDC_CALLBACK = 'vault.cluster.oidc-callback';
|
|
const OIDC_PROVIDER = 'vault.cluster.identity.oidc-provider';
|
|
const DR_REPLICATION_SECONDARY = 'vault.cluster.replication-dr-promote';
|
|
const DR_REPLICATION_SECONDARY_DETAILS = 'vault.cluster.replication-dr-promote.details';
|
|
const EXCLUDED_REDIRECT_URLS = ['/vault/logout'];
|
|
|
|
export { INIT, UNSEAL, AUTH, CLUSTER, CLUSTER_INDEX, DR_REPLICATION_SECONDARY };
|
|
|
|
export default Mixin.create({
|
|
auth: service(),
|
|
store: service(),
|
|
router: service(),
|
|
|
|
transitionToTargetRoute(transition = {}) {
|
|
const targetRoute = this.targetRouteName(transition);
|
|
if (
|
|
targetRoute &&
|
|
targetRoute !== this.routeName &&
|
|
targetRoute !== transition.targetName &&
|
|
targetRoute !== this.router.currentRouteName
|
|
) {
|
|
if (
|
|
// only want to redirect if we're going to authenticate
|
|
targetRoute === AUTH &&
|
|
transition.targetName !== CLUSTER_INDEX &&
|
|
!EXCLUDED_REDIRECT_URLS.includes(this.router.currentURL)
|
|
) {
|
|
return this.transitionTo(targetRoute, { queryParams: { redirect_to: this.router.currentURL } });
|
|
}
|
|
return this.transitionTo(targetRoute);
|
|
}
|
|
|
|
return RSVP.resolve();
|
|
},
|
|
|
|
beforeModel(transition) {
|
|
return this.transitionToTargetRoute(transition);
|
|
},
|
|
|
|
clusterModel() {
|
|
return this.modelFor(CLUSTER) || this.store.peekRecord('cluster', 'vault');
|
|
},
|
|
|
|
authToken() {
|
|
return this.auth.currentToken;
|
|
},
|
|
|
|
hasKeyData() {
|
|
/* eslint-disable-next-line ember/no-controller-access-in-routes */
|
|
return !!this.controllerFor(INIT).keyData;
|
|
},
|
|
|
|
targetRouteName(transition) {
|
|
const cluster = this.clusterModel();
|
|
const isAuthed = this.authToken();
|
|
if (cluster.needsInit) {
|
|
return INIT;
|
|
}
|
|
if (this.hasKeyData() && this.routeName !== UNSEAL && this.routeName !== AUTH) {
|
|
return INIT;
|
|
}
|
|
if (cluster.sealed) {
|
|
return UNSEAL;
|
|
}
|
|
if (cluster?.dr?.isSecondary) {
|
|
if (transition && transition.targetName === DR_REPLICATION_SECONDARY_DETAILS) {
|
|
return DR_REPLICATION_SECONDARY_DETAILS;
|
|
}
|
|
if (this.router.currentRouteName === DR_REPLICATION_SECONDARY_DETAILS) {
|
|
return DR_REPLICATION_SECONDARY_DETAILS;
|
|
}
|
|
|
|
return DR_REPLICATION_SECONDARY;
|
|
}
|
|
if ((transition && transition.targetName === OIDC_PROVIDER) || this.routeName === OIDC_PROVIDER) {
|
|
return OIDC_PROVIDER;
|
|
}
|
|
if (!isAuthed) {
|
|
if ((transition && transition.targetName === OIDC_CALLBACK) || this.routeName === OIDC_CALLBACK) {
|
|
return OIDC_CALLBACK;
|
|
}
|
|
return AUTH;
|
|
}
|
|
if (
|
|
(!cluster.needsInit && this.routeName === INIT) ||
|
|
(!cluster.sealed && this.routeName === UNSEAL) ||
|
|
(!cluster?.dr?.isSecondary && this.routeName === DR_REPLICATION_SECONDARY) ||
|
|
(isAuthed && this.routeName === AUTH)
|
|
) {
|
|
return CLUSTER;
|
|
}
|
|
return null;
|
|
},
|
|
});
|