mirror of
				https://github.com/optim-enterprises-bv/vault.git
				synced 2025-10-30 18:17:55 +00:00 
			
		
		
		
	 a78fe24e77
			
		
	
	a78fe24e77
	
	
	
		
			
			Backport of UI: add SSH role attribute allowed_domains_template Co-authored-by: Chelsea Shaw <82459713+hashishaw@users.noreply.github.com>
		
			
				
	
	
		
			164 lines
		
	
	
		
			5.6 KiB
		
	
	
	
		
			JavaScript
		
	
	
	
	
	
			
		
		
	
	
			164 lines
		
	
	
		
			5.6 KiB
		
	
	
	
		
			JavaScript
		
	
	
	
	
	
| import Model, { attr } from '@ember-data/model';
 | |
| import { alias } from '@ember/object/computed';
 | |
| import { computed } from '@ember/object';
 | |
| import fieldToAttrs, { expandAttributeMeta } from 'vault/utils/field-to-attrs';
 | |
| import lazyCapabilities, { apiPath } from 'vault/macros/lazy-capabilities';
 | |
| 
 | |
| // these arrays define the order in which the fields will be displayed
 | |
| // see
 | |
| // https://github.com/hashicorp/vault/blob/main/builtin/logical/ssh/path_roles.go#L542 for list of fields for each key type
 | |
| const OTP_FIELDS = [
 | |
|   'name',
 | |
|   'keyType',
 | |
|   'defaultUser',
 | |
|   'adminUser',
 | |
|   'port',
 | |
|   'allowedUsers',
 | |
|   'cidrList',
 | |
|   'excludeCidrList',
 | |
| ];
 | |
| const CA_FIELDS = [
 | |
|   'name',
 | |
|   'keyType',
 | |
|   'allowUserCertificates',
 | |
|   'allowHostCertificates',
 | |
|   'defaultUser',
 | |
|   'allowedUsers',
 | |
|   'allowedUsersTemplate',
 | |
|   'allowedDomains',
 | |
|   'allowedDomainsTemplate',
 | |
|   'ttl',
 | |
|   'maxTtl',
 | |
|   'allowedCriticalOptions',
 | |
|   'defaultCriticalOptions',
 | |
|   'allowedExtensions',
 | |
|   'defaultExtensions',
 | |
|   'allowBareDomains',
 | |
|   'allowSubdomains',
 | |
|   'allowUserKeyIds',
 | |
|   'keyIdFormat',
 | |
|   'notBeforeDuration',
 | |
|   'algorithmSigner',
 | |
| ];
 | |
| 
 | |
| export default Model.extend({
 | |
|   useOpenAPI: true,
 | |
|   getHelpUrl: function (backend) {
 | |
|     return `/v1/${backend}/roles/example?help=1`;
 | |
|   },
 | |
|   zeroAddress: attr('boolean', {
 | |
|     readOnly: true,
 | |
|   }),
 | |
|   backend: attr('string', {
 | |
|     readOnly: true,
 | |
|   }),
 | |
|   name: attr('string', {
 | |
|     label: 'Role Name',
 | |
|     fieldValue: 'name',
 | |
|     readOnly: true,
 | |
|   }),
 | |
|   keyType: attr('string', {
 | |
|     possibleValues: ['ca', 'otp'], //overriding the API which also lists 'dynamic' as a type though it is deprecated
 | |
|   }),
 | |
|   adminUser: attr('string', {
 | |
|     helpText: 'Username of the admin user at the remote host',
 | |
|   }),
 | |
|   defaultUser: attr('string', {
 | |
|     helpText: "Username to use when one isn't specified",
 | |
|   }),
 | |
|   allowedUsers: attr('string', {
 | |
|     helpText:
 | |
|       'Create a list of users who are allowed to use this key (e.g. `admin, dev`, or use `*` to allow all.)',
 | |
|   }),
 | |
|   allowedUsersTemplate: attr('boolean', {
 | |
|     helpText:
 | |
|       'Specifies that Allowed Users can be templated e.g. {{identity.entity.aliases.mount_accessor_xyz.name}}',
 | |
|   }),
 | |
|   allowedDomains: attr('string', {
 | |
|     helpText:
 | |
|       'List of domains for which a client can request a certificate (e.g. `example.com`, or `*` to allow all)',
 | |
|   }),
 | |
|   allowedDomainsTemplate: attr('boolean', {
 | |
|     helpText:
 | |
|       'Specifies that Allowed Domains can be set using identity template policies. Non-templated domains are also permitted.',
 | |
|   }),
 | |
|   cidrList: attr('string', {
 | |
|     helpText: 'List of CIDR blocks for which this role is applicable',
 | |
|   }),
 | |
|   excludeCidrList: attr('string', {
 | |
|     helpText: 'List of CIDR blocks that are not accepted by this role',
 | |
|   }),
 | |
|   port: attr('number', {
 | |
|     helpText: 'Port number for the SSH connection (default is `22`)',
 | |
|   }),
 | |
|   allowedCriticalOptions: attr('string', {
 | |
|     helpText: 'List of critical options that certificates have when signed',
 | |
|   }),
 | |
|   defaultCriticalOptions: attr('object', {
 | |
|     helpText: 'Map of critical options certificates should have if none are provided when signing',
 | |
|   }),
 | |
|   allowedExtensions: attr('string', {
 | |
|     helpText: 'List of extensions that certificates can have when signed',
 | |
|   }),
 | |
|   defaultExtensions: attr('object', {
 | |
|     helpText: 'Map of extensions certificates should have if none are provided when signing',
 | |
|   }),
 | |
|   allowUserCertificates: attr('boolean', {
 | |
|     helpText: 'Specifies if certificates are allowed to be signed for us as a user',
 | |
|   }),
 | |
|   allowHostCertificates: attr('boolean', {
 | |
|     helpText: 'Specifies if certificates are allowed to be signed for us as a host',
 | |
|   }),
 | |
|   allowBareDomains: attr('boolean', {
 | |
|     helpText:
 | |
|       'Specifies if host certificates that are requested are allowed to use the base domains listed in Allowed Domains',
 | |
|   }),
 | |
|   allowSubdomains: attr('boolean', {
 | |
|     helpText:
 | |
|       'Specifies if host certificates that are requested are allowed to be subdomains of those listed in Allowed Domains',
 | |
|   }),
 | |
|   allowUserKeyIds: attr('boolean', {
 | |
|     helpText: 'Specifies if users can override the key ID for a signed certificate with the "key_id" field',
 | |
|   }),
 | |
|   keyIdFormat: attr('string', {
 | |
|     helpText: 'When supplied, this value specifies a custom format for the key id of a signed certificate',
 | |
|   }),
 | |
|   algorithmSigner: attr('string', {
 | |
|     helpText: 'When supplied, this value specifies a signing algorithm for the key',
 | |
|     possibleValues: ['default', 'ssh-rsa', 'rsa-sha2-256', 'rsa-sha2-512'],
 | |
|   }),
 | |
| 
 | |
|   showFields: computed('keyType', function () {
 | |
|     const keyType = this.keyType;
 | |
|     const keys = keyType === 'ca' ? CA_FIELDS.slice(0) : OTP_FIELDS.slice(0);
 | |
|     return expandAttributeMeta(this, keys);
 | |
|   }),
 | |
| 
 | |
|   fieldGroups: computed('keyType', function () {
 | |
|     const numRequired = this.keyType === 'otp' ? 3 : 4;
 | |
|     const fields = this.keyType === 'otp' ? [...OTP_FIELDS] : [...CA_FIELDS];
 | |
|     const defaultFields = fields.splice(0, numRequired);
 | |
|     const groups = [
 | |
|       { default: defaultFields },
 | |
|       {
 | |
|         Options: [...fields],
 | |
|       },
 | |
|     ];
 | |
|     return fieldToAttrs(this, groups);
 | |
|   }),
 | |
| 
 | |
|   updatePath: lazyCapabilities(apiPath`${'backend'}/roles/${'id'}`, 'backend', 'id'),
 | |
|   canDelete: alias('updatePath.canDelete'),
 | |
|   canEdit: alias('updatePath.canUpdate'),
 | |
|   canRead: alias('updatePath.canRead'),
 | |
| 
 | |
|   generatePath: lazyCapabilities(apiPath`${'backend'}/creds/${'id'}`, 'backend', 'id'),
 | |
|   canGenerate: alias('generatePath.canUpdate'),
 | |
| 
 | |
|   signPath: lazyCapabilities(apiPath`${'backend'}/sign/${'id'}`, 'backend', 'id'),
 | |
|   canSign: alias('signPath.canUpdate'),
 | |
| 
 | |
|   zeroAddressPath: lazyCapabilities(apiPath`${'backend'}/config/zeroaddress`, 'backend'),
 | |
|   canEditZeroAddress: alias('zeroAddressPath.canUpdate'),
 | |
| });
 |