mirror of
				https://github.com/optim-enterprises-bv/vault.git
				synced 2025-10-31 18:48:08 +00:00 
			
		
		
		
	 6d0d241190
			
		
	
	6d0d241190
	
	
	
		
			
			* Add type param to secret show, handle CG in database role show * If roleType is passed to credential, only make one creds API call * Clean up db role adapter and serializer * url param roleType passed to credentials call * Role list capabilities check for static and dynamic separately * Add changelog * Consistent adapter response for single or double call * Prioritize dynamic response if control group on role/creds
		
			
				
	
	
		
			112 lines
		
	
	
		
			3.1 KiB
		
	
	
	
		
			JavaScript
		
	
	
	
	
	
			
		
		
	
	
			112 lines
		
	
	
		
			3.1 KiB
		
	
	
	
		
			JavaScript
		
	
	
	
	
	
| import Component from '@glimmer/component';
 | ||
| import { inject as service } from '@ember/service';
 | ||
| import { action } from '@ember/object';
 | ||
| import { tracked } from '@glimmer/tracking';
 | ||
| 
 | ||
| const LIST_ROOT_ROUTE = 'vault.cluster.secrets.backend.list-root';
 | ||
| const SHOW_ROUTE = 'vault.cluster.secrets.backend.show';
 | ||
| 
 | ||
| export default class DatabaseRoleEdit extends Component {
 | ||
|   @service router;
 | ||
|   @service flashMessages;
 | ||
|   @service wizard;
 | ||
|   @service store;
 | ||
| 
 | ||
|   constructor() {
 | ||
|     super(...arguments);
 | ||
|     if (
 | ||
|       this.wizard.featureState === 'displayConnection' ||
 | ||
|       this.wizard.featureState === 'displayRoleDatabase'
 | ||
|     ) {
 | ||
|       this.wizard.transitionFeatureMachine(this.wizard.featureState, 'CONTINUE', 'database');
 | ||
|     }
 | ||
|     if (this.args.initialKey) {
 | ||
|       this.args.model.database = [this.args.initialKey];
 | ||
|     }
 | ||
|   }
 | ||
| 
 | ||
|   @tracked loading = false;
 | ||
| 
 | ||
|   get warningMessages() {
 | ||
|     let warnings = {};
 | ||
|     if (this.args.model.canUpdateDb === false) {
 | ||
|       warnings.database = `You don’t have permissions to update this database connection, so this role cannot be created.`;
 | ||
|     }
 | ||
|     if (
 | ||
|       (this.args.model.type === 'dynamic' && this.args.model.canCreateDynamic === false) ||
 | ||
|       (this.args.model.type === 'static' && this.args.model.canCreateStatic === false)
 | ||
|     ) {
 | ||
|       warnings.type = `You don't have permissions to create this type of role.`;
 | ||
|     }
 | ||
|     return warnings;
 | ||
|   }
 | ||
| 
 | ||
|   get databaseType() {
 | ||
|     const backend = this.args.model?.backend;
 | ||
|     const dbs = this.args.model?.database || [];
 | ||
|     if (!backend || dbs.length === 0) {
 | ||
|       return null;
 | ||
|     }
 | ||
|     return this.store
 | ||
|       .queryRecord('database/connection', { id: dbs[0], backend })
 | ||
|       .then(record => record.plugin_name)
 | ||
|       .catch(() => null);
 | ||
|   }
 | ||
| 
 | ||
|   @action
 | ||
|   generateCreds(roleId, roleType = '') {
 | ||
|     this.router.transitionTo('vault.cluster.secrets.backend.credentials', roleId, {
 | ||
|       queryParams: { roleType },
 | ||
|     });
 | ||
|   }
 | ||
| 
 | ||
|   @action
 | ||
|   delete() {
 | ||
|     const secret = this.args.model;
 | ||
|     const backend = secret.backend;
 | ||
|     secret
 | ||
|       .destroyRecord()
 | ||
|       .then(() => {
 | ||
|         try {
 | ||
|           this.router.transitionTo(LIST_ROOT_ROUTE, backend, { queryParams: { tab: 'role' } });
 | ||
|         } catch (e) {
 | ||
|           console.debug(e);
 | ||
|         }
 | ||
|       })
 | ||
|       .catch(e => {
 | ||
|         this.flashMessages.danger(e.errors?.join('. '));
 | ||
|       });
 | ||
|   }
 | ||
| 
 | ||
|   @action
 | ||
|   handleCreateEditRole(evt) {
 | ||
|     evt.preventDefault();
 | ||
|     this.loading = true;
 | ||
| 
 | ||
|     const mode = this.args.mode;
 | ||
|     let roleSecret = this.args.model;
 | ||
|     let secretId = roleSecret.name;
 | ||
|     if (mode === 'create') {
 | ||
|       roleSecret.set('id', secretId);
 | ||
|       let path = roleSecret.type === 'static' ? 'static-roles' : 'roles';
 | ||
|       roleSecret.set('path', path);
 | ||
|     }
 | ||
|     roleSecret
 | ||
|       .save()
 | ||
|       .then(() => {
 | ||
|         try {
 | ||
|           this.router.transitionTo(SHOW_ROUTE, `role/${secretId}`);
 | ||
|         } catch (e) {
 | ||
|           console.debug(e);
 | ||
|         }
 | ||
|       })
 | ||
|       .catch(e => {
 | ||
|         const errorMessage = e.errors?.join('. ') || e.message;
 | ||
|         this.flashMessages.danger(
 | ||
|           errorMessage || 'Could not save the role. Please check Vault logs for more information.'
 | ||
|         );
 | ||
|         this.loading = false;
 | ||
|       });
 | ||
|   }
 | ||
| }
 |