Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Backport of UI: Enable KV create secret with Control Group into release/1.13.x #22480

Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Jump to
Jump to file
Failed to load files.
Diff view
Diff view
3 changes: 3 additions & 0 deletions changelog/22471.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:improvement
ui: enables create and update KV secret workflow when control group present
```
11 changes: 10 additions & 1 deletion ui/app/components/secret-create-or-update.js
Original file line number Diff line number Diff line change
Expand Up @@ -12,6 +12,7 @@
* @isV2=true
* @secretData={{@secretData}}
* @canCreateSecretMetadata=false
* @buttonDisabled={{this.saving}}
* />
* ```
* @param {string} mode - create, edit, show determines what view to display
Expand All @@ -21,6 +22,7 @@
* @param {boolean} isV2 - whether or not KV1 or KV2
* @param {object} secretData - class that is created in secret-edit
* @param {boolean} canUpdateSecretMetadata - based on permissions to the /metadata/ endpoint. If user has secret update. create is not enough for metadata.
* @param {boolean} buttonDisabled - if true, disables the submit button on the create/update form
*/

import Component from '@glimmer/component';
Expand All @@ -46,6 +48,7 @@ export default class SecretCreateOrUpdate extends Component {
@tracked validationMessages = null;

@service controlGroup;
@service flashMessages;
@service router;
@service store;

Expand Down Expand Up @@ -158,6 +161,7 @@ export default class SecretCreateOrUpdate extends Component {
if (error instanceof ControlGroupError) {
const errorMessage = this.controlGroup.logFromError(error);
this.error = errorMessage.content;
this.controlGroup.saveTokenFromError(error);
}
throw error;
});
Expand Down Expand Up @@ -228,8 +232,13 @@ export default class SecretCreateOrUpdate extends Component {
return;
}

const secretPath = type === 'create' ? this.args.modelForData.path : this.args.model.id;
this.persistKey(() => {
this.transitionToRoute(SHOW_ROUTE, this.args.model.path || this.args.model.id);
// Show flash message in case there's a control group on read
this.flashMessages.success(
`Secret ${secretPath} ${type === 'create' ? 'created' : 'updated'} successfully.`
);
this.transitionToRoute(SHOW_ROUTE, secretPath);
});
}
@action
Expand Down
11 changes: 11 additions & 0 deletions ui/app/services/control-group.js
Original file line number Diff line number Diff line change
Expand Up @@ -104,6 +104,17 @@ export default Service.extend({
return this.router.transitionTo('vault.cluster.access.control-group-accessor', accessor);
},

// Handle error from non-read request (eg. POST or UPDATE) so it can be retried
saveTokenFromError(error) {
const { accessor, token, creation_path, creation_time, ttl } = error;
const data = { accessor, token, creation_path, creation_time, ttl };
this.storeControlGroupToken(data);
// In the read flow the accessor is marked once the user clicks "Visit" from the control group page
// On a POST/UPDATE flow we don't redirect, so we need to mark automatically so that on the next try
// the request will attempt unwrap.
this.markTokenForUnwrap(accessor);
},

logFromError(error) {
const { accessor, token, creation_path, creation_time, ttl } = error;
const data = { accessor, token, creation_path, creation_time, ttl };
Expand Down
7 changes: 1 addition & 6 deletions ui/app/templates/components/secret-create-or-update.hbs
Original file line number Diff line number Diff line change
Expand Up @@ -134,12 +134,7 @@
{{/if}}
<div class="field is-grouped box is-fullwidth is-bottomless">
<div class="control">
<button
type="submit"
disabled={{or @buttonDisabled this.validationErrorCount this.error}}
class="button is-primary"
data-test-secret-save={{true}}
>
<button type="submit" disabled={{@buttonDisabled}} class="button is-primary" data-test-secret-save={{true}}>
Save
</button>
</div>
Expand Down
4 changes: 2 additions & 2 deletions ui/tests/acceptance/secrets/backend/kv/secret-test.js
Original file line number Diff line number Diff line change
Expand Up @@ -250,7 +250,7 @@ module('Acceptance | secrets/secret/create, read, delete', function (hooks) {
await deleteEngine(enginePath, assert);
});

test('it disables save when validation errors occur', async function (assert) {
test('it shows validation errors', async function (assert) {
assert.expect(5);
const enginePath = `kv-${new Date().getTime()}`;
const secretPath = 'not-duplicate';
Expand All @@ -272,7 +272,7 @@ module('Acceptance | secrets/secret/create, read, delete', function (hooks) {
assert
.dom('[data-test-input="maxVersions"]')
.hasClass('has-error-border', 'shows border error on input with error');
assert.dom('[data-test-secret-save]').isDisabled('Save button is disabled');
assert.dom('[data-test-secret-save]').isNotDisabled('Save button is disabled');
await fillIn('[data-test-input="maxVersions"]', 20); // fillIn replaces the text, whereas typeIn only adds to it.
await triggerKeyEvent('[data-test-input="maxVersions"]', 'keyup', 65);
await editPage.path(secretPath);
Expand Down