mirror of
https://github.com/kemko/nomad.git
synced 2026-01-07 02:45:42 +03:00
* Rename pages to include roles * Models and adapters * [ui] Any policy checks in the UI now check for roles' policies as well as token policies (#18346) * combinedPolicies as a concept * Classic decorator on role adapter * We added a new request for roles, so the test based on a specific order of requests got fickle fast * Mirage roles cluster scaffolded * Acceptance test for roles and policies on the login page * Update mirage mock for nodes fetch to account for role policies / empty token.policies * Roles-derived policies checks * [ui] Access Control with Roles and Tokens (#18413) * top level policies routes moved into access control * A few more routes and name cleanup * Delog and test fixes to account for new url prefix and document titles * Overview page * Tokens and Roles routes * Tokens helios table * Add a role * Hacky role page and deletion * New policy keyboard shortcut and roles breadcrumb nav * If you leave New Role but havent made any changes, remove the newly-created record from store * Roles index list and general role route crud * Roles index actually links to roles now * Helios button styles for new roles and policies * Handle when you try to create a new role without having any policies * Token editing generally * Create Token functionality * Cant delete self-token but management token editing and deleting is fine * Upgrading helios caused codemirror to explode, shimmed * Policies table fix * without bang-element condition, modifier would refire over and over * Token TTL or Time setting * time will take you on * Mirage hooks for create and list roles * Ensure policy names only use allow characters in mirage mocks * Mirage mocked roles and policies in the default cluster * log and lintfix * chromedriver to 2.1.2 * unused unit tests removed * Nice profile dropdown * With the HDS accordion, rename our internal component scss ref * design revisions after discussion * Tooltip on deleted-policy tokens * Two-step button peripheral isDeleting gcode removed * Never to null on token save * copywrite headers added and empty routefiles removed * acceptance test fixes for policies endpoint * Route for updating a token * Policies testfixes * Ember on-click-outside modifier upgraded with general ember-modifier upgrade * Test adjustments to account for new profile header dropdown * Test adjustments for tokens via policy pages * Removed an unused route * Access Control index page tests * a11y tests * Tokens index acceptance tests generally * Lintfix * Token edit page tests * Token editing tests * New token expiration tests * Roles Index tests * Role editing policies tests * A complete set of Access Control Roles tests * Policies test * Be more specific about which row to check for expiration time * Nil check on expirationTime equality * Management tokens shouldnt show No Roles/Policies, give them their own designation * Route guard on selftoken, conditional columns, and afterModel at parent to prevent orphaned policies on tokens/roles from stopping a new save * Policy unloading on delete and other todos plus autofocus conditionally re-enabled * Invalid policies non-links now a concept for Roles index * HDS style links to make job.variables.alert links look like links again * Mirage finding looks weird so making model async in hash even though redundant * Drop rsvp * RSVP wasnt the problem, cached lookups were * remove old todo comments * de-log
121 lines
3.4 KiB
JavaScript
121 lines
3.4 KiB
JavaScript
/**
|
|
* Copyright (c) HashiCorp, Inc.
|
|
* SPDX-License-Identifier: BUSL-1.1
|
|
*/
|
|
|
|
// @ts-check
|
|
import { action } from '@ember/object';
|
|
import { inject as service } from '@ember/service';
|
|
import { alias } from '@ember/object/computed';
|
|
import Component from '@glimmer/component';
|
|
import { tracked } from '@glimmer/tracking';
|
|
|
|
export default class TokenEditorComponent extends Component {
|
|
@service notifications;
|
|
@service router;
|
|
@service store;
|
|
|
|
@alias('args.roles') roles;
|
|
@alias('args.token') activeToken;
|
|
@alias('args.policies') policies;
|
|
|
|
@tracked tokenPolicies = [];
|
|
@tracked tokenRoles = [];
|
|
|
|
// when this renders, set up tokenPolicies
|
|
constructor() {
|
|
super(...arguments);
|
|
this.tokenPolicies = this.activeToken.policies.toArray() || [];
|
|
this.tokenRoles = this.activeToken.roles.toArray() || [];
|
|
if (this.activeToken.isNew) {
|
|
this.activeToken.expirationTTL = 'never';
|
|
}
|
|
}
|
|
|
|
@action updateTokenPolicies(policy, event) {
|
|
let { checked } = event.target;
|
|
if (checked) {
|
|
this.tokenPolicies.push(policy);
|
|
} else {
|
|
this.tokenPolicies = this.tokenPolicies.filter((p) => p !== policy);
|
|
}
|
|
}
|
|
|
|
@action updateTokenRoles(role, event) {
|
|
let { checked } = event.target;
|
|
if (checked) {
|
|
this.tokenRoles.push(role);
|
|
} else {
|
|
this.tokenRoles = this.tokenRoles.filter((p) => p !== role);
|
|
}
|
|
}
|
|
|
|
@action updateTokenType(event) {
|
|
let tokenType = event.target.id;
|
|
this.activeToken.type = tokenType;
|
|
}
|
|
|
|
@action updateTokenExpirationTime(event) {
|
|
// Override expirationTTL if user selects a time
|
|
this.activeToken.expirationTTL = null;
|
|
this.activeToken.expirationTime = new Date(event.target.value);
|
|
}
|
|
@action updateTokenExpirationTTL(event) {
|
|
// Override expirationTime if user selects a TTL
|
|
this.activeToken.expirationTime = null;
|
|
if (event.target.value === 'never') {
|
|
this.activeToken.expirationTTL = null;
|
|
} else if (event.target.value === 'custom') {
|
|
this.activeToken.expirationTime = new Date();
|
|
} else {
|
|
this.activeToken.expirationTTL = event.target.value;
|
|
}
|
|
}
|
|
|
|
@action async save() {
|
|
try {
|
|
const shouldRedirectAfterSave = this.activeToken.isNew;
|
|
|
|
this.activeToken.policies = this.tokenPolicies;
|
|
this.activeToken.roles = this.tokenRoles;
|
|
|
|
if (this.activeToken.type === 'management') {
|
|
// Management tokens cannot have policies or roles
|
|
this.activeToken.policyIDs = [];
|
|
this.activeToken.policyNames = [];
|
|
this.activeToken.policies = [];
|
|
this.activeToken.roles = [];
|
|
}
|
|
|
|
// Sets to "never" for auto-selecting the radio button;
|
|
// if it gets updated by the user, will fall back to "" to represent
|
|
// no expiration. However, if the user never updates it,
|
|
// it stays as the string "never", where the API expects a null value.
|
|
if (this.activeToken.expirationTTL === 'never') {
|
|
this.activeToken.expirationTTL = null;
|
|
}
|
|
|
|
await this.activeToken.save();
|
|
|
|
this.notifications.add({
|
|
title: 'Token Saved',
|
|
color: 'success',
|
|
});
|
|
|
|
if (shouldRedirectAfterSave) {
|
|
this.router.transitionTo(
|
|
'access-control.tokens.token',
|
|
this.activeToken.id
|
|
);
|
|
}
|
|
} catch (error) {
|
|
this.notifications.add({
|
|
title: `Error creating Token ${this.activeToken.name}`,
|
|
message: error,
|
|
color: 'critical',
|
|
sticky: true,
|
|
});
|
|
}
|
|
}
|
|
}
|