mirror of
				https://github.com/optim-enterprises-bv/vault.git
				synced 2025-11-04 04:28:08 +00:00 
			
		
		
		
	* UI: Part 1 - hds adoption replace <Modal> (#23363) * replace policy-form modal * replace clients/attribution modal * clients/config modal * scope form odal * remove button type * include toolbar to match other example templates * rotate credentials modal * add toolbar button class for hds buttons * transformation-edit modal * add back test selector * add route arg to button! * update link status * fix link-status tests * remove prevent default * update db tests * update tests * use page alert for hcp link status banner * fix scopy button selector * fix sidebar test * change to neutral banner * UI: Part 2 - hds adoption replace <Modal> (#23398) * upgrade HDS library (adds support for snippet containers * cleanup flight icons * replace transit key action modals * re-add deps as devDeps * remove line * address transit tests * UI: Part 3 - hds adoption replace <Modal> (#23415) * cleanup css * cleanup extra type attr * masked input download modal * use Hds::Button in download button" * fix size of modal * tiny icon fix * refactor download button to always render download icon * update tests * UI: Part 3.5 - hds adoption replace <Modal> (#23448) * replication-promote modal * replication component modals * replication add secondary modal * move update text for diff * UI: Part 4 - hds adoption replace <Modal> (#23451) * k8 configure modal * kv delete modal * ldap modals * pki modals * add trash icon * move deps * UI: Part 5 - hds adoption replace <Modal> (#23471) * replace confirmation modals --------- * UI: Part 6 - hds adoption replace <Modal> (#23484) * search select with modal * policy search select modal * replace date dropdown for client dashboard * change padding to top * update policy example args * lolllll test typo wow * update dropdown tests * shamir flow modals! * add one more container * update test selectors * UI: Final hds adoption replace <Modal> cleanup PR (#23522) * search select with modal * policy search select modal * replace date dropdown for client dashboard * change padding to top * update policy example args * lolllll test typo wow * update dropdown tests * shamir flow modals! * add one more container * update test selectors * remove wormhole and modal component * fix selectors * uninstall wormhole * remove shamir-modal-flow class * fix confirm modal test * fix pki and kv test * fix toolbar selector kv * client and download button test * fix-confirmation-modal-padding * fix replication modal tests so relevant modal opens (#23540) * more confirmation modal tests * adds changelog
		
			
				
	
	
		
			82 lines
		
	
	
		
			2.5 KiB
		
	
	
	
		
			JavaScript
		
	
	
	
	
	
			
		
		
	
	
			82 lines
		
	
	
		
			2.5 KiB
		
	
	
	
		
			JavaScript
		
	
	
	
	
	
/**
 | 
						||
 * Copyright (c) HashiCorp, Inc.
 | 
						||
 * SPDX-License-Identifier: BUSL-1.1
 | 
						||
 */
 | 
						||
 | 
						||
import Component from '@glimmer/component';
 | 
						||
 | 
						||
/**
 | 
						||
 * @module PolicyExample
 | 
						||
 * The PolicyExample component receives a policy type ('acl', 'rgp', or 'egp') and renders a copyable policy example of
 | 
						||
 * that type using the <JsonEditor> component. Inside a modal, the PolicyExample component must be wrapped in a conditional
 | 
						||
 * (example below), otherwise the <JsonEditor> value won't render until it's focused.
 | 
						||
 *
 | 
						||
 * @example
 | 
						||
 *  <PolicyExample
 | 
						||
 *    @policyType={{@model.policyType}}
 | 
						||
 *    @container="#search-select-modal"
 | 
						||
 *  />
 | 
						||
 * ```
 | 
						||
 * @param {string} policyType - policy type to decide which template to render; can either be "acl" or "rgp"
 | 
						||
 * @param {string} container - selector for the container the example renders inside, passed to the copy button in JsonEditor
 | 
						||
 */
 | 
						||
 | 
						||
export default class PolicyExampleComponent extends Component {
 | 
						||
  // formatting here is purposeful so that whitespace renders correctly in JsonEditor
 | 
						||
  policyTemplates = {
 | 
						||
    acl: `
 | 
						||
# Grant 'create', 'read' , 'update', and ‘list’ permission
 | 
						||
# to paths prefixed by 'secret/*'
 | 
						||
path "secret/*" {
 | 
						||
  capabilities = [ "create", "read", "update", "list" ]
 | 
						||
}
 | 
						||
 | 
						||
# Even though we allowed secret/*, this line explicitly denies
 | 
						||
# secret/super-secret. This takes precedence.
 | 
						||
path "secret/super-secret" {
 | 
						||
  capabilities = ["deny"]
 | 
						||
}
 | 
						||
`,
 | 
						||
    rgp: `
 | 
						||
# Import strings library that exposes common string operations
 | 
						||
import "strings"
 | 
						||
 | 
						||
# Conditional rule (precond) checks the incoming request endpoint
 | 
						||
# targeted to sys/policies/acl/admin
 | 
						||
precond = rule {
 | 
						||
    strings.has_prefix(request.path, "sys/policies/admin")
 | 
						||
}
 | 
						||
 | 
						||
# Vault checks to see if the request was made by an entity
 | 
						||
# named James Thomas or Team Lead role defined as its metadata
 | 
						||
main = rule when precond {
 | 
						||
    identity.entity.metadata.role is "Team Lead" or
 | 
						||
      identity.entity.name is "James Thomas"
 | 
						||
}
 | 
						||
`,
 | 
						||
    egp: `
 | 
						||
import "time"
 | 
						||
 | 
						||
# Expect requests to only happen during work days (Monday
 | 
						||
# through Friday) 0 for Sunday and 6 for Saturday
 | 
						||
workdays = rule {
 | 
						||
    time.now.weekday > 0 and time.now.weekday < 6
 | 
						||
}
 | 
						||
 | 
						||
# Expect requests to only happen during work hours (7:00 am -
 | 
						||
# 6:00 pm)
 | 
						||
workhours = rule {
 | 
						||
    time.now.hour > 7 and time.now.hour < 18
 | 
						||
}
 | 
						||
main = rule {
 | 
						||
    workdays and workhours
 | 
						||
}
 | 
						||
`,
 | 
						||
  };
 | 
						||
  moreInformationLinks = {
 | 
						||
    acl: '/vault/docs/concepts/policies#capabilities',
 | 
						||
    rgp: '/vault/tutorials/policies/sentinel#role-governing-policies-rgps',
 | 
						||
    egp: '/vault/docs/enterprise/sentinel#endpoint-governing-policies-egps',
 | 
						||
  };
 | 
						||
}
 |