-
Notifications
You must be signed in to change notification settings - Fork 150
Conversation
Utilizing native Vault API—express server now only acts as a passthrough to bypass CORs for login methods.
callVaultApi has some assumptions that are not valid during login, specifically the presence of the vault_addr and vault_token variables in localstorage. These two variables are not yet available from the login screen.
Easy enough, LGTM 👍 |
What happens when a second |
@msessa-cotd looks like I have a bit of catching up to do on the project, right now it will only handle that |
Perhaps this problem could be solved in a more generic way by having a new route which sole purpose it to view/edit objects in the vault logical filesystem using the builtin json editor. something like: in fact, anything with the standard any thought @djenriquez ? |
Looks like the work got picked out of the branch it got merged to - think I may have done the work prematurely. Your solution sounds fine as well - and query string params are a bit more forgiving than dealing with paths. Not sure about opening it up beyond secrets - probably something I would ask @djenriquez about as well. |
@msessa-cotd Hmm I'm understanding that you're advocating to create a new route for the express server for I really think there is some benefit continuing on the path you started with the passthrough API. Normally I would agree that the above would be a good solution, but now that seems to be diverting off the route of simplifying the backend API--adding another layer of translation. |
@djenriquez I was strictly speaking client side react. No changes in the server side nodejs code. What I'm suggesting is basically a new react route Basically a UI version of the standard command-line read/write/delete commands. |
Ahhh, I see. So basically a generic editor providing no other Vault-UI feature but the editor itself. I can see where this can be useful. However, this is likely out of scope for 0.2.0, let's add this as a new feature request for now. Otherwise, I got the navigation fixed: 423ff0c It currently however does not handle nonexistent secrets at all, so we'll need to add that. |
This PR is to allow accessing secrets directly by visiting a URL. So, for example, if your secret is under
/one/two/three/four
and you go to urlVAULT_URL/secrets/one/two/three
then the secretfour
will be listed in the UI. Clicking through will now dobrowserHistory.push
to ensure the URL is always in sync with the current secret.