mirror of
https://github.com/hashicorp/vault.git
synced 2025-09-12 09:21:10 +02:00
* wip control group fix? * dont rely on models for capabilities; * Revert "wip control group fix?" This reverts commit cf3e896ba05d2fdfe1f6287bba5c862df4e5d553. * make explicit request for data * remove dangerous triple curlies * cleanup template logic and reuse each-in * remove capability checks from model * update tests to reflect new behavior * add test coverage * fix mirage factory, update details tests * test control groups VAULT-29471 * finish patch test * alphabetize! * does await help? * fix factory * add conditionals for control group error
62 lines
2.1 KiB
JavaScript
62 lines
2.1 KiB
JavaScript
/**
|
|
* Copyright (c) HashiCorp, Inc.
|
|
* SPDX-License-Identifier: BUSL-1.1
|
|
*/
|
|
|
|
import Component from '@glimmer/component';
|
|
import { dateFormat } from 'core/helpers/date-format';
|
|
import { isDeleted } from 'kv/utils/kv-deleted';
|
|
|
|
/**
|
|
* @module KvSecretOverview
|
|
* <Page::Secret::Overview
|
|
* @backend={{this.model.backend}}
|
|
* @breadcrumbs={{this.breadcrumbs}}
|
|
* @canReadMetadata={{true}}
|
|
* @canUpdateData={{true}}
|
|
* @metadata={{this.model.metadata}}
|
|
* @path={{this.model.path}}
|
|
* @subkeys={{this.model.subkeys}}
|
|
* />
|
|
*
|
|
* @param {string} backend - kv secret mount to make network request
|
|
* @param {array} breadcrumbs - Array to generate breadcrumbs, passed to the page header component
|
|
* @param {boolean} canReadMetadata - permissions to read metadata
|
|
* @param {boolean} canUpdateData - permissions to create a new version of a secret
|
|
* @param {model} metadata - Ember data model: 'kv/metadata'
|
|
* @param {string} path - path to request secret data for selected version
|
|
* @param {object} subkeys - API response from subkeys endpoint, object with "subkeys" and "metadata" keys. This arg is null for community edition
|
|
*/
|
|
|
|
export default class KvSecretOverview extends Component {
|
|
get secretState() {
|
|
if (this.args.metadata) {
|
|
return this.args.metadata.currentSecret.state;
|
|
}
|
|
if (this.args.subkeys?.metadata) {
|
|
const { metadata } = this.args.subkeys;
|
|
const state = metadata.destroyed
|
|
? 'destroyed'
|
|
: isDeleted(metadata.deletion_time)
|
|
? 'deleted'
|
|
: 'created';
|
|
return state;
|
|
}
|
|
return 'created';
|
|
}
|
|
|
|
get versionSubtext() {
|
|
const state = this.secretState;
|
|
if (state === 'destroyed') {
|
|
return 'The current version of this secret has been permanently deleted and cannot be restored.';
|
|
}
|
|
if (state === 'deleted') {
|
|
const time =
|
|
this.args.metadata?.currentSecret.deletionTime || this.args.subkeys?.metadata.deletion_time;
|
|
const date = dateFormat([time], {});
|
|
return `The current version of this secret was deleted ${date}.`;
|
|
}
|
|
return 'The current version of this secret.';
|
|
}
|
|
}
|