mirror of
https://github.com/hashicorp/vault.git
synced 2025-08-24 16:11:08 +02:00
* manual cherry pick to deal with all the merge things * changelog * test fixes * Update 28148.txt * fix tests failures after main merge * fix test failures after main merge * Add Access Type and conditionally render WIF fields (#28149) * initial work. * remove access_type * better no model logic well kind of * rollback attrs * remove defaults * stopping point * wip changing back to sidebranch * hustling shuffling and serializing * some of the component test coverage * disable acces type if editing * test coverage * hide max retries that sneaky bugger * cleanup * cleanup * Update root-config.js * remove flash message check, locally passes great but on ci flaky * clean up * thank you chelsea * test clean up per enterprise vs community * address pr comments * welp a miss add * UI (sidebranch) WIF Issuer field (#28187) * Add type declaration files for aws config models * use updated task syntax for save method on configure-aws * fix types on edit route * fetch issuer on configure edit page if aws + enterprise * track issuer within configure-aws component * add placeholder support on form-field * Add warning if issuer changed from previous value or could not be read * cleanup * preliminary tests * dont use while loop so we can test the modal * tests * cleanup * fix tests * remove extra tracked value and duplicate changed attrs check * modal footer --------- Co-authored-by: Angel Garbarino <argarbarino@gmail.com> * Display issuer on Configuration details (#28209) * display issuer on configuration details * workflow complete, now on to testing * handle issuer things * fix all the broken tests things * add test coveragE: * cleanup * rename model/adapter * Update configure-aws.ts * Update aws-configuration-test.js * 90 percent there for pr comments * last one for tonight * a few more because why not * hasDirtyAttributes fixes * revert back to previous noRead->queryIssuerError --------- Co-authored-by: Chelsea Shaw <82459713+hashishaw@users.noreply.github.com>
112 lines
3.9 KiB
JavaScript
112 lines
3.9 KiB
JavaScript
/**
|
|
* Copyright (c) HashiCorp, Inc.
|
|
* SPDX-License-Identifier: BUSL-1.1
|
|
*/
|
|
|
|
import ApplicationSerializer from './application';
|
|
import { EmbeddedRecordsMixin } from '@ember-data/serializer/rest';
|
|
import { WIF_ENGINES } from 'vault/helpers/mountable-secret-engines';
|
|
|
|
export default ApplicationSerializer.extend(EmbeddedRecordsMixin, {
|
|
attrs: {
|
|
config: { embedded: 'always' },
|
|
},
|
|
|
|
normalize(modelClass, data) {
|
|
// embedded records need a unique value to be stored
|
|
// set id for config to uuid of secret engine
|
|
if (data.config && !data.config.id) {
|
|
data.config.id = data.uuid;
|
|
}
|
|
// move version out of options so it can be defined on secret-engine model
|
|
data.version = data.options ? data.options.version : null;
|
|
return this._super(modelClass, data);
|
|
},
|
|
|
|
normalizeBackend(path, backend) {
|
|
let struct = {};
|
|
for (const attribute in backend) {
|
|
struct[attribute] = backend[attribute];
|
|
}
|
|
// queryRecord adds path to the response
|
|
if (path !== null && !struct.path) {
|
|
struct.path = path;
|
|
}
|
|
|
|
if (struct.data) {
|
|
struct = { ...struct, ...struct.data };
|
|
delete struct.data;
|
|
}
|
|
// strip the trailing slash off of the path so we
|
|
// can navigate to it without getting `//` in the url
|
|
struct.id = struct.path.slice(0, -1);
|
|
|
|
if (backend?.type === 'kv' && !backend?.options?.version) {
|
|
// enabling kv in the CLI without a version flag mounts a v1 engine
|
|
// however, when no version is specified the options key is null
|
|
// we explicitly set v1 here, otherwise v2 is pulled from the ember model default
|
|
struct.options = { version: '1', ...struct.options };
|
|
}
|
|
return struct;
|
|
},
|
|
|
|
normalizeResponse(store, primaryModelClass, payload, id, requestType) {
|
|
const isCreate = requestType === 'createRecord';
|
|
const isFind = requestType === 'findRecord';
|
|
const isQueryRecord = requestType === 'queryRecord';
|
|
let backends;
|
|
if (isCreate) {
|
|
backends = payload.data;
|
|
} else if (isFind) {
|
|
backends = this.normalizeBackend(id + '/', payload.data);
|
|
} else if (isQueryRecord) {
|
|
backends = this.normalizeBackend(null, payload);
|
|
} else {
|
|
// this is terrible, I'm sorry
|
|
// TODO extract AWS and SSH config saving from the secret-engine model to simplify this
|
|
if (payload.data.secret) {
|
|
backends = Object.keys(payload.data.secret).map((id) =>
|
|
this.normalizeBackend(id, payload.data.secret[id])
|
|
);
|
|
} else if (!payload.data.path) {
|
|
backends = Object.keys(payload.data).map((id) => this.normalizeBackend(id, payload[id]));
|
|
} else {
|
|
backends = [this.normalizeBackend(payload.data.path, payload.data)];
|
|
}
|
|
}
|
|
|
|
return this._super(store, primaryModelClass, backends, id, requestType);
|
|
},
|
|
|
|
serialize(snapshot) {
|
|
const type = snapshot.record.engineType;
|
|
const data = this._super(...arguments);
|
|
// move version back to options
|
|
data.options = data.version ? { version: data.version } : {};
|
|
delete data.version;
|
|
|
|
if (!WIF_ENGINES.includes(type)) {
|
|
// only send identity_token_key if it's set on a WIF secret engine.
|
|
// because of issues with the model unloading with a belongsTo relationships
|
|
// identity_token_key can accidentally carry over if a user backs out of the form and changes the type from WIF to non-WIF.
|
|
delete data.config.identity_token_key;
|
|
}
|
|
|
|
if (type !== 'kv' || data.options.version === 1) {
|
|
// These items are on the model, but used by the kv-v2 config endpoint only
|
|
delete data.max_versions;
|
|
delete data.cas_required;
|
|
delete data.delete_version_after;
|
|
}
|
|
// only KV uses options
|
|
if (type !== 'kv' && type !== 'generic') {
|
|
delete data.options;
|
|
} else if (!data.options.version) {
|
|
// if options.version isn't set for some reason
|
|
// default to 2
|
|
data.options.version = 2;
|
|
}
|
|
return data;
|
|
},
|
|
});
|