vault/ui/app/serializers/secret-engine.js
Angel Garbarino 3abca46464
WIF sidebranch (#28148)
* manual cherry pick to deal with all the merge things

* changelog

* test fixes

* Update 28148.txt

* fix tests failures after main merge

* fix test failures after main merge

* Add Access Type and conditionally render WIF fields (#28149)

* initial work.

* remove access_type

* better no model logic well kind of

* rollback attrs

* remove defaults

* stopping point

* wip changing back to sidebranch

* hustling shuffling and serializing

* some of the component test coverage

* disable acces type if editing

* test coverage

* hide max retries that sneaky bugger

* cleanup

* cleanup

* Update root-config.js

* remove flash message check, locally passes great but on ci flaky

* clean up

* thank you chelsea

* test clean up per enterprise vs community

* address pr comments

* welp a miss add

* UI (sidebranch) WIF Issuer field (#28187)

* Add type declaration files for aws config models

* use updated task syntax for save method on configure-aws

* fix types on edit route

* fetch issuer on configure edit page if aws + enterprise

* track issuer within configure-aws component

* add placeholder support on form-field

* Add warning if issuer changed from previous value or could not be read

* cleanup

* preliminary tests

* dont use while loop so we can test the modal

* tests

* cleanup

* fix tests

* remove extra tracked value and duplicate changed attrs check

* modal footer

---------

Co-authored-by: Angel Garbarino <argarbarino@gmail.com>

* Display issuer on Configuration details (#28209)

* display issuer on configuration details

* workflow complete, now on to testing

* handle issuer things

* fix all the broken tests things

* add test coveragE:

* cleanup

* rename model/adapter

* Update configure-aws.ts

* Update aws-configuration-test.js

* 90 percent there for pr comments

* last one for tonight

* a few more because why not

* hasDirtyAttributes fixes

* revert back to previous noRead->queryIssuerError

---------

Co-authored-by: Chelsea Shaw <82459713+hashishaw@users.noreply.github.com>
2024-08-29 12:17:51 -06:00

112 lines
3.9 KiB
JavaScript

/**
* Copyright (c) HashiCorp, Inc.
* SPDX-License-Identifier: BUSL-1.1
*/
import ApplicationSerializer from './application';
import { EmbeddedRecordsMixin } from '@ember-data/serializer/rest';
import { WIF_ENGINES } from 'vault/helpers/mountable-secret-engines';
export default ApplicationSerializer.extend(EmbeddedRecordsMixin, {
attrs: {
config: { embedded: 'always' },
},
normalize(modelClass, data) {
// embedded records need a unique value to be stored
// set id for config to uuid of secret engine
if (data.config && !data.config.id) {
data.config.id = data.uuid;
}
// move version out of options so it can be defined on secret-engine model
data.version = data.options ? data.options.version : null;
return this._super(modelClass, data);
},
normalizeBackend(path, backend) {
let struct = {};
for (const attribute in backend) {
struct[attribute] = backend[attribute];
}
// queryRecord adds path to the response
if (path !== null && !struct.path) {
struct.path = path;
}
if (struct.data) {
struct = { ...struct, ...struct.data };
delete struct.data;
}
// strip the trailing slash off of the path so we
// can navigate to it without getting `//` in the url
struct.id = struct.path.slice(0, -1);
if (backend?.type === 'kv' && !backend?.options?.version) {
// enabling kv in the CLI without a version flag mounts a v1 engine
// however, when no version is specified the options key is null
// we explicitly set v1 here, otherwise v2 is pulled from the ember model default
struct.options = { version: '1', ...struct.options };
}
return struct;
},
normalizeResponse(store, primaryModelClass, payload, id, requestType) {
const isCreate = requestType === 'createRecord';
const isFind = requestType === 'findRecord';
const isQueryRecord = requestType === 'queryRecord';
let backends;
if (isCreate) {
backends = payload.data;
} else if (isFind) {
backends = this.normalizeBackend(id + '/', payload.data);
} else if (isQueryRecord) {
backends = this.normalizeBackend(null, payload);
} else {
// this is terrible, I'm sorry
// TODO extract AWS and SSH config saving from the secret-engine model to simplify this
if (payload.data.secret) {
backends = Object.keys(payload.data.secret).map((id) =>
this.normalizeBackend(id, payload.data.secret[id])
);
} else if (!payload.data.path) {
backends = Object.keys(payload.data).map((id) => this.normalizeBackend(id, payload[id]));
} else {
backends = [this.normalizeBackend(payload.data.path, payload.data)];
}
}
return this._super(store, primaryModelClass, backends, id, requestType);
},
serialize(snapshot) {
const type = snapshot.record.engineType;
const data = this._super(...arguments);
// move version back to options
data.options = data.version ? { version: data.version } : {};
delete data.version;
if (!WIF_ENGINES.includes(type)) {
// only send identity_token_key if it's set on a WIF secret engine.
// because of issues with the model unloading with a belongsTo relationships
// identity_token_key can accidentally carry over if a user backs out of the form and changes the type from WIF to non-WIF.
delete data.config.identity_token_key;
}
if (type !== 'kv' || data.options.version === 1) {
// These items are on the model, but used by the kv-v2 config endpoint only
delete data.max_versions;
delete data.cas_required;
delete data.delete_version_after;
}
// only KV uses options
if (type !== 'kv' && type !== 'generic') {
delete data.options;
} else if (!data.options.version) {
// if options.version isn't set for some reason
// default to 2
data.options.version = 2;
}
return data;
},
});