mirror of
https://github.com/optim-enterprises-bv/vault.git
synced 2025-10-29 17:52:32 +00:00
Backport of UI: Enable KV create secret with control group
Co-authored-by: Chelsea Shaw <82459713+hashishaw@users.noreply.github.com>
This commit is contained in:
committed by
GitHub
parent
13da593157
commit
9c9d39a6f8
3
changelog/22471.txt
Normal file
3
changelog/22471.txt
Normal file
@@ -0,0 +1,3 @@
|
||||
```release-note:improvement
|
||||
ui: enables create and update KV secret workflow when control group present
|
||||
```
|
||||
@@ -12,6 +12,7 @@
|
||||
* @isV2=true
|
||||
* @secretData={{@secretData}}
|
||||
* @canCreateSecretMetadata=false
|
||||
* @buttonDisabled={{this.saving}}
|
||||
* />
|
||||
* ```
|
||||
* @param {string} mode - create, edit, show determines what view to display
|
||||
@@ -21,6 +22,7 @@
|
||||
* @param {boolean} isV2 - whether or not KV1 or KV2
|
||||
* @param {object} secretData - class that is created in secret-edit
|
||||
* @param {boolean} canUpdateSecretMetadata - based on permissions to the /metadata/ endpoint. If user has secret update. create is not enough for metadata.
|
||||
* @param {boolean} buttonDisabled - if true, disables the submit button on the create/update form
|
||||
*/
|
||||
|
||||
import Component from '@glimmer/component';
|
||||
@@ -46,6 +48,7 @@ export default class SecretCreateOrUpdate extends Component {
|
||||
@tracked validationMessages = null;
|
||||
|
||||
@service controlGroup;
|
||||
@service flashMessages;
|
||||
@service router;
|
||||
@service store;
|
||||
|
||||
@@ -158,6 +161,7 @@ export default class SecretCreateOrUpdate extends Component {
|
||||
if (error instanceof ControlGroupError) {
|
||||
const errorMessage = this.controlGroup.logFromError(error);
|
||||
this.error = errorMessage.content;
|
||||
this.controlGroup.saveTokenFromError(error);
|
||||
}
|
||||
throw error;
|
||||
});
|
||||
@@ -228,8 +232,13 @@ export default class SecretCreateOrUpdate extends Component {
|
||||
return;
|
||||
}
|
||||
|
||||
const secretPath = type === 'create' ? this.args.modelForData.path : this.args.model.id;
|
||||
this.persistKey(() => {
|
||||
this.transitionToRoute(SHOW_ROUTE, this.args.model.path || this.args.model.id);
|
||||
// Show flash message in case there's a control group on read
|
||||
this.flashMessages.success(
|
||||
`Secret ${secretPath} ${type === 'create' ? 'created' : 'updated'} successfully.`
|
||||
);
|
||||
this.transitionToRoute(SHOW_ROUTE, secretPath);
|
||||
});
|
||||
}
|
||||
@action
|
||||
|
||||
@@ -104,6 +104,17 @@ export default Service.extend({
|
||||
return this.router.transitionTo('vault.cluster.access.control-group-accessor', accessor);
|
||||
},
|
||||
|
||||
// Handle error from non-read request (eg. POST or UPDATE) so it can be retried
|
||||
saveTokenFromError(error) {
|
||||
const { accessor, token, creation_path, creation_time, ttl } = error;
|
||||
const data = { accessor, token, creation_path, creation_time, ttl };
|
||||
this.storeControlGroupToken(data);
|
||||
// In the read flow the accessor is marked once the user clicks "Visit" from the control group page
|
||||
// On a POST/UPDATE flow we don't redirect, so we need to mark automatically so that on the next try
|
||||
// the request will attempt unwrap.
|
||||
this.markTokenForUnwrap(accessor);
|
||||
},
|
||||
|
||||
logFromError(error) {
|
||||
const { accessor, token, creation_path, creation_time, ttl } = error;
|
||||
const data = { accessor, token, creation_path, creation_time, ttl };
|
||||
|
||||
@@ -134,12 +134,7 @@
|
||||
{{/if}}
|
||||
<div class="field is-grouped box is-fullwidth is-bottomless">
|
||||
<div class="control">
|
||||
<button
|
||||
type="submit"
|
||||
disabled={{or @buttonDisabled this.validationErrorCount this.error}}
|
||||
class="button is-primary"
|
||||
data-test-secret-save={{true}}
|
||||
>
|
||||
<button type="submit" disabled={{@buttonDisabled}} class="button is-primary" data-test-secret-save={{true}}>
|
||||
Save
|
||||
</button>
|
||||
</div>
|
||||
|
||||
@@ -250,7 +250,7 @@ module('Acceptance | secrets/secret/create, read, delete', function (hooks) {
|
||||
await deleteEngine(enginePath, assert);
|
||||
});
|
||||
|
||||
test('it disables save when validation errors occur', async function (assert) {
|
||||
test('it shows validation errors', async function (assert) {
|
||||
assert.expect(5);
|
||||
const enginePath = `kv-${new Date().getTime()}`;
|
||||
const secretPath = 'not-duplicate';
|
||||
@@ -272,7 +272,7 @@ module('Acceptance | secrets/secret/create, read, delete', function (hooks) {
|
||||
assert
|
||||
.dom('[data-test-input="maxVersions"]')
|
||||
.hasClass('has-error-border', 'shows border error on input with error');
|
||||
assert.dom('[data-test-secret-save]').isDisabled('Save button is disabled');
|
||||
assert.dom('[data-test-secret-save]').isNotDisabled('Save button is disabled');
|
||||
await fillIn('[data-test-input="maxVersions"]', 20); // fillIn replaces the text, whereas typeIn only adds to it.
|
||||
await triggerKeyEvent('[data-test-input="maxVersions"]', 'keyup', 65);
|
||||
await editPage.path(secretPath);
|
||||
|
||||
Reference in New Issue
Block a user