mirror of
https://github.com/hashicorp/vault.git
synced 2025-08-23 23:51:08 +02:00
* add ember-cli-content-security-policy * only enable client side CSP when not in production - the go side handles this otherwise * add service that handles and stores CSP violations via the securitypolicyviolation event * update auth form component to show a specialized message when there's a CSP error * move to computed prop for showing the CSP error message * fix typos
78 lines
2.6 KiB
JavaScript
78 lines
2.6 KiB
JavaScript
import Ember from 'ember';
|
|
import { supportedAuthBackends } from 'vault/helpers/supported-auth-backends';
|
|
const BACKENDS = supportedAuthBackends();
|
|
const { computed, inject } = Ember;
|
|
|
|
export default Ember.Component.extend({
|
|
classNames: ['auth-form'],
|
|
routing: inject.service('-routing'),
|
|
auth: inject.service(),
|
|
flashMessages: inject.service(),
|
|
csp: inject.service('csp-event'),
|
|
didRender() {
|
|
// on very narrow viewports the active tab may be overflowed, so we scroll it into view here
|
|
this.$('li.is-active').get(0).scrollIntoView();
|
|
},
|
|
|
|
cluster: null,
|
|
redirectTo: null,
|
|
|
|
selectedAuthType: 'token',
|
|
selectedAuthBackend: Ember.computed('selectedAuthType', function() {
|
|
return BACKENDS.findBy('type', this.get('selectedAuthType'));
|
|
}),
|
|
|
|
providerComponentName: Ember.computed('selectedAuthBackend.type', function() {
|
|
const type = Ember.String.dasherize(this.get('selectedAuthBackend.type'));
|
|
return `auth-form/${type}`;
|
|
}),
|
|
|
|
hasCSPError: computed.alias('csp.connectionViolations.firstObject'),
|
|
|
|
cspErrorText: `This is a standby Vault node but can't communicate with the active node via request forwarding. Sign in at the active node to use the Vault UI.`,
|
|
|
|
handleError(e) {
|
|
this.set('loading', false);
|
|
|
|
let errors = e.errors.map(error => {
|
|
if (error.detail) {
|
|
return error.detail;
|
|
}
|
|
return error;
|
|
});
|
|
|
|
this.set('error', `Authentication failed: ${errors.join('.')}`);
|
|
},
|
|
|
|
actions: {
|
|
doSubmit(data) {
|
|
this.setProperties({
|
|
loading: true,
|
|
error: null,
|
|
});
|
|
const targetRoute = this.get('redirectTo') || 'vault.cluster';
|
|
//const {password, token, username} = data;
|
|
const backend = this.get('selectedAuthBackend.type');
|
|
const path = this.get('customPath');
|
|
if (this.get('useCustomPath') && path) {
|
|
data.path = path;
|
|
}
|
|
const clusterId = this.get('cluster.id');
|
|
this.get('auth').authenticate({ clusterId, backend, data }).then(
|
|
({ isRoot }) => {
|
|
this.set('loading', false);
|
|
const transition = this.get('routing.router').transitionTo(targetRoute);
|
|
if (isRoot) {
|
|
transition.followRedirects().then(() => {
|
|
this.get('flashMessages').warning(
|
|
'You have logged in with a root token. As a security precaution, this root token will not be stored by your browser and you will need to re-authenticate after the window is closed or refreshed.'
|
|
);
|
|
});
|
|
}
|
|
},
|
|
(...errArgs) => this.handleError(...errArgs)
|
|
);
|
|
},
|
|
},
|
|
});
|