Skip to content

Commit

Permalink
backport of commit 2a4dbc1
Browse files Browse the repository at this point in the history
  • Loading branch information
hashishaw committed Aug 21, 2023
1 parent 13da593 commit 85d8eae
Show file tree
Hide file tree
Showing 5 changed files with 27 additions and 9 deletions.
3 changes: 3 additions & 0 deletions changelog/22471.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:improvement
ui: enables create and update KV secret workflow when control group present
```
11 changes: 10 additions & 1 deletion ui/app/components/secret-create-or-update.js
Original file line number Diff line number Diff line change
Expand Up @@ -12,6 +12,7 @@
* @isV2=true
* @secretData={{@secretData}}
* @canCreateSecretMetadata=false
* @buttonDisabled={{this.saving}}
* />
* ```
* @param {string} mode - create, edit, show determines what view to display
Expand All @@ -21,6 +22,7 @@
* @param {boolean} isV2 - whether or not KV1 or KV2
* @param {object} secretData - class that is created in secret-edit
* @param {boolean} canUpdateSecretMetadata - based on permissions to the /metadata/ endpoint. If user has secret update. create is not enough for metadata.
* @param {boolean} buttonDisabled - if true, disables the submit button on the create/update form
*/

import Component from '@glimmer/component';
Expand All @@ -46,6 +48,7 @@ export default class SecretCreateOrUpdate extends Component {
@tracked validationMessages = null;

@service controlGroup;
@service flashMessages;
@service router;
@service store;

Expand Down Expand Up @@ -158,6 +161,7 @@ export default class SecretCreateOrUpdate extends Component {
if (error instanceof ControlGroupError) {
const errorMessage = this.controlGroup.logFromError(error);
this.error = errorMessage.content;
this.controlGroup.saveTokenFromError(error);
}
throw error;
});
Expand Down Expand Up @@ -228,8 +232,13 @@ export default class SecretCreateOrUpdate extends Component {
return;
}

const secretPath = type === 'create' ? this.args.modelForData.path : this.args.model.id;
this.persistKey(() => {
this.transitionToRoute(SHOW_ROUTE, this.args.model.path || this.args.model.id);
// Show flash message in case there's a control group on read
this.flashMessages.success(
`Secret ${secretPath} ${type === 'create' ? 'created' : 'updated'} successfully.`
);
this.transitionToRoute(SHOW_ROUTE, secretPath);
});
}
@action
Expand Down
11 changes: 11 additions & 0 deletions ui/app/services/control-group.js
Original file line number Diff line number Diff line change
Expand Up @@ -104,6 +104,17 @@ export default Service.extend({
return this.router.transitionTo('vault.cluster.access.control-group-accessor', accessor);
},

// Handle error from non-read request (eg. POST or UPDATE) so it can be retried
saveTokenFromError(error) {
const { accessor, token, creation_path, creation_time, ttl } = error;
const data = { accessor, token, creation_path, creation_time, ttl };
this.storeControlGroupToken(data);
// In the read flow the accessor is marked once the user clicks "Visit" from the control group page
// On a POST/UPDATE flow we don't redirect, so we need to mark automatically so that on the next try
// the request will attempt unwrap.
this.markTokenForUnwrap(accessor);
},

logFromError(error) {
const { accessor, token, creation_path, creation_time, ttl } = error;
const data = { accessor, token, creation_path, creation_time, ttl };
Expand Down
7 changes: 1 addition & 6 deletions ui/app/templates/components/secret-create-or-update.hbs
Original file line number Diff line number Diff line change
Expand Up @@ -134,12 +134,7 @@
{{/if}}
<div class="field is-grouped box is-fullwidth is-bottomless">
<div class="control">
<button
type="submit"
disabled={{or @buttonDisabled this.validationErrorCount this.error}}
class="button is-primary"
data-test-secret-save={{true}}
>
<button type="submit" disabled={{@buttonDisabled}} class="button is-primary" data-test-secret-save={{true}}>
Save
</button>
</div>
Expand Down
4 changes: 2 additions & 2 deletions ui/tests/acceptance/secrets/backend/kv/secret-test.js
Original file line number Diff line number Diff line change
Expand Up @@ -250,7 +250,7 @@ module('Acceptance | secrets/secret/create, read, delete', function (hooks) {
await deleteEngine(enginePath, assert);
});

test('it disables save when validation errors occur', async function (assert) {
test('it shows validation errors', async function (assert) {
assert.expect(5);
const enginePath = `kv-${new Date().getTime()}`;
const secretPath = 'not-duplicate';
Expand All @@ -272,7 +272,7 @@ module('Acceptance | secrets/secret/create, read, delete', function (hooks) {
assert
.dom('[data-test-input="maxVersions"]')
.hasClass('has-error-border', 'shows border error on input with error');
assert.dom('[data-test-secret-save]').isDisabled('Save button is disabled');
assert.dom('[data-test-secret-save]').isNotDisabled('Save button is disabled');
await fillIn('[data-test-input="maxVersions"]', 20); // fillIn replaces the text, whereas typeIn only adds to it.
await triggerKeyEvent('[data-test-input="maxVersions"]', 'keyup', 65);
await editPage.path(secretPath);
Expand Down

0 comments on commit 85d8eae

Please sign in to comment.