vault/ui/lib/pki
hashicorp-copywrite[bot] 0b12cdcfd1
[COMPLIANCE] License changes (#22290)
* Adding explicit MPL license for sub-package.

This directory and its subdirectories (packages) contain files licensed with the MPLv2 `LICENSE` file in this directory and are intentionally licensed separately from the BSL `LICENSE` file at the root of this repository.

* Adding explicit MPL license for sub-package.

This directory and its subdirectories (packages) contain files licensed with the MPLv2 `LICENSE` file in this directory and are intentionally licensed separately from the BSL `LICENSE` file at the root of this repository.

* Updating the license from MPL to Business Source License.

Going forward, this project will be licensed under the Business Source License v1.1. Please see our blog post for more details at https://hashi.co/bsl-blog, FAQ at www.hashicorp.com/licensing-faq, and details of the license at www.hashicorp.com/bsl.

* add missing license headers

* Update copyright file headers to BUS-1.1

* Fix test that expected exact offset on hcl file

---------

Co-authored-by: hashicorp-copywrite[bot] <110428419+hashicorp-copywrite[bot]@users.noreply.github.com>
Co-authored-by: Sarah Thompson <sthompson@hashicorp.com>
Co-authored-by: Brian Kassouf <bkassouf@hashicorp.com>
2023-08-10 18:14:03 -07:00
..
addon [COMPLIANCE] License changes (#22290) 2023-08-10 18:14:03 -07:00
app/utils [COMPLIANCE] License changes (#22290) 2023-08-10 18:14:03 -07:00
config [COMPLIANCE] License changes (#22290) 2023-08-10 18:14:03 -07:00
index.js [COMPLIANCE] License changes (#22290) 2023-08-10 18:14:03 -07:00
package.json UI: pki auto-tidy views (#20685) 2023-05-23 23:05:15 +00:00
README.md UI: pki auto-tidy views (#20685) 2023-05-23 23:05:15 +00:00

Vault PKI

Welcome to the Vault PKI (Ember) Engine! Below is an overview of PKI and resources for how to get started working within this engine.

About PKI

Public Key Infrastructure (PKI) is a system of processes, technologies, and policies that allows you to encrypt and sign data. (source: digicert.com)

The Vault PKI Secrets Engine allows security engineers to create a chain of PKI certificates much easier than they would with traditional workflows.

About the UI engine

If you couldn't tell from the documentation above, PKI is complex. As such, the data doesn't map cleanly to a CRUD model and so the first thing you might notice is that the models and adapters for PKI (which live in the main app, not the engine) have some custom logic that differentiate it from most other secret engines. Below are the models used throughout PKI and how they are used to interact with the mount. Aside from pki/action, each model has a corresponding tab in the UI that takes you to its LIST view.

  • pki/action

    This model is used to perform different POST requests that receive similar parameters but don't create a single item (which would be a record in Ember data). These various actions may create multiple items that contain different attributes than those submitted in the POST request. For example:

    • POST pki/generate/root/:type creates a new self-signed CA certificate (an issuer) and private key, which is only returned if type = exported
    • POST pki/issuer/:issuer_ref/sign-intermediate creates a certificate, and returns issuing CA and CA chain data that is only available once

    The pki/actionadapter is used to map the desired action to the corresponding endpoint, and the pki/action serializer includes logic to send the relevant attributes. The following PKI workflows use this model:

  • pki/certificate/base

    This model is for specific interactions with certificate data. The base model contains attributes that make up a certificate's content. The other models that extend this model certificate/generate and certificate/sign include additional attributes to perform their relevant requests.

    The parsedCertificate attribute is an object that houses all of the parsed certificate data returned by the parse-pki-cert.js util.

  • pki/tidy

    This model is used to manage tidy operations in a few different contexts. All of the following endpoints share the same parameters except enabled and interval_duration which are reserved for auto-tidy operations only.

    pki/tidy-status does not use an Ember data model because it is read-only

    • POST pki/tidy - perform a single, manual tidy operation
    • POST pki/config/auto-tidy - set configuration for automating the tidy process
    • GET pki/config/auto-tidy - read auto-tidy configuration settings

    The auto-tidy config is the only data that persists so findRecord and updateRecord in the pki/tidy.js adapter only interact with the /config/auto-tidy endpoint. For each manual tidy operation, a new record is created so on save() the model uses the createRecord method which only ever uses the /tidy endpoint.

The following models more closely follow a CRUD pattern: