@backstage-community/plugin-vault 0.1.30 → 0.1.32

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/CHANGELOG.md CHANGED
@@ -1,5 +1,17 @@
1
1
  # @backstage-community/plugin-vault
2
2
 
3
+ ## 0.1.32
4
+
5
+ ### Patch Changes
6
+
7
+ - 6f59d18: Fix package metadata
8
+
9
+ ## 0.1.31
10
+
11
+ ### Patch Changes
12
+
13
+ - 6757373: Backstage v1.28.4 version bump. Also addressed some of the upstream deprecations
14
+
3
15
  ## 0.1.30
4
16
 
5
17
  ### Patch Changes
@@ -0,0 +1,49 @@
1
+ import { createApiRef } from '@backstage/core-plugin-api';
2
+ import { NotFoundError, ResponseError } from '@backstage/errors';
3
+
4
+ const vaultApiRef = createApiRef({
5
+ id: "plugin.vault.service"
6
+ });
7
+ class VaultClient {
8
+ discoveryApi;
9
+ fetchApi;
10
+ constructor({
11
+ discoveryApi,
12
+ fetchApi
13
+ }) {
14
+ this.discoveryApi = discoveryApi;
15
+ this.fetchApi = fetchApi;
16
+ }
17
+ async callApi(path, query) {
18
+ const apiUrl = `${await this.discoveryApi.getBaseUrl("vault")}`;
19
+ const response = await this.fetchApi.fetch(
20
+ `${apiUrl}/${path}?${new URLSearchParams(query).toString()}`,
21
+ {
22
+ headers: {
23
+ Accept: "application/json"
24
+ }
25
+ }
26
+ );
27
+ if (response.ok) {
28
+ return await response.json();
29
+ } else if (response.status === 404) {
30
+ throw new NotFoundError(`No secrets found in path '${path}'`);
31
+ }
32
+ throw await ResponseError.fromResponse(response);
33
+ }
34
+ async listSecrets(secretPath, options) {
35
+ const query = {};
36
+ const { secretEngine } = options || {};
37
+ if (secretEngine) {
38
+ query.engine = secretEngine;
39
+ }
40
+ const result = await this.callApi(
41
+ `v1/secrets/${encodeURIComponent(secretPath)}`,
42
+ query
43
+ );
44
+ return result.items;
45
+ }
46
+ }
47
+
48
+ export { VaultClient, vaultApiRef };
49
+ //# sourceMappingURL=api.esm.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"api.esm.js","sources":["../src/api.ts"],"sourcesContent":["/*\n * Copyright 2020 The Backstage Authors\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://www.apache.org/licenses/LICENSE-2.0\n *\n * Unless required by applicable law or agreed to in writing, software\n * distributed under the License is distributed on an \"AS IS\" BASIS,\n * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n * See the License for the specific language governing permissions and\n * limitations under the License.\n */\nimport {\n DiscoveryApi,\n createApiRef,\n FetchApi,\n} from '@backstage/core-plugin-api';\nimport { NotFoundError, ResponseError } from '@backstage/errors';\n\n/**\n * @public\n */\nexport const vaultApiRef = createApiRef<VaultApi>({\n id: 'plugin.vault.service',\n});\n\n/**\n * Object containing the secret name and some links.\n * @public\n */\nexport type VaultSecret = {\n name: string;\n path: string;\n showUrl: string;\n editUrl: string;\n};\n\n/**\n * Interface for the VaultApi.\n * @public\n */\nexport interface VaultApi {\n /**\n * Returns a list of secrets used to show in a table.\n * @param secretPath - The path where the secrets are stored in Vault\n * @param options - Additional options to be passed to the Vault API, allows to override vault default settings in app config file\n */\n listSecrets(\n secretPath: string,\n options?: {\n secretEngine?: string;\n },\n ): Promise<VaultSecret[]>;\n}\n\n/**\n * Default implementation of the VaultApi.\n * @public\n */\nexport class VaultClient implements VaultApi {\n private readonly discoveryApi: DiscoveryApi;\n private readonly fetchApi: FetchApi;\n\n constructor({\n discoveryApi,\n fetchApi,\n }: {\n discoveryApi: DiscoveryApi;\n fetchApi: FetchApi;\n }) {\n this.discoveryApi = discoveryApi;\n this.fetchApi = fetchApi;\n }\n\n private async callApi<T>(\n path: string,\n query: { [key in string]: any },\n ): Promise<T> {\n const apiUrl = `${await this.discoveryApi.getBaseUrl('vault')}`;\n const response = await this.fetchApi.fetch(\n `${apiUrl}/${path}?${new URLSearchParams(query).toString()}`,\n {\n headers: {\n Accept: 'application/json',\n },\n },\n );\n if (response.ok) {\n return (await response.json()) as T;\n } else if (response.status === 404) {\n throw new NotFoundError(`No secrets found in path '${path}'`);\n }\n throw await ResponseError.fromResponse(response);\n }\n\n async listSecrets(\n secretPath: string,\n options?: {\n secretEngine?: string;\n },\n ): Promise<VaultSecret[]> {\n const query: { [key in string]: any } = {};\n const { secretEngine } = options || {};\n if (secretEngine) {\n query.engine = secretEngine;\n }\n\n const result = await this.callApi<{ items: VaultSecret[] }>(\n `v1/secrets/${encodeURIComponent(secretPath)}`,\n query,\n );\n return result.items;\n }\n}\n"],"names":[],"mappings":";;;AAyBO,MAAM,cAAc,YAAuB,CAAA;AAAA,EAChD,EAAI,EAAA,sBAAA;AACN,CAAC,EAAA;AAmCM,MAAM,WAAgC,CAAA;AAAA,EAC1B,YAAA,CAAA;AAAA,EACA,QAAA,CAAA;AAAA,EAEjB,WAAY,CAAA;AAAA,IACV,YAAA;AAAA,IACA,QAAA;AAAA,GAIC,EAAA;AACD,IAAA,IAAA,CAAK,YAAe,GAAA,YAAA,CAAA;AACpB,IAAA,IAAA,CAAK,QAAW,GAAA,QAAA,CAAA;AAAA,GAClB;AAAA,EAEA,MAAc,OACZ,CAAA,IAAA,EACA,KACY,EAAA;AACZ,IAAA,MAAM,SAAS,CAAG,EAAA,MAAM,KAAK,YAAa,CAAA,UAAA,CAAW,OAAO,CAAC,CAAA,CAAA,CAAA;AAC7D,IAAM,MAAA,QAAA,GAAW,MAAM,IAAA,CAAK,QAAS,CAAA,KAAA;AAAA,MACnC,CAAA,EAAG,MAAM,CAAA,CAAA,EAAI,IAAI,CAAA,CAAA,EAAI,IAAI,eAAgB,CAAA,KAAK,CAAE,CAAA,QAAA,EAAU,CAAA,CAAA;AAAA,MAC1D;AAAA,QACE,OAAS,EAAA;AAAA,UACP,MAAQ,EAAA,kBAAA;AAAA,SACV;AAAA,OACF;AAAA,KACF,CAAA;AACA,IAAA,IAAI,SAAS,EAAI,EAAA;AACf,MAAQ,OAAA,MAAM,SAAS,IAAK,EAAA,CAAA;AAAA,KAC9B,MAAA,IAAW,QAAS,CAAA,MAAA,KAAW,GAAK,EAAA;AAClC,MAAA,MAAM,IAAI,aAAA,CAAc,CAA6B,0BAAA,EAAA,IAAI,CAAG,CAAA,CAAA,CAAA,CAAA;AAAA,KAC9D;AACA,IAAM,MAAA,MAAM,aAAc,CAAA,YAAA,CAAa,QAAQ,CAAA,CAAA;AAAA,GACjD;AAAA,EAEA,MAAM,WACJ,CAAA,UAAA,EACA,OAGwB,EAAA;AACxB,IAAA,MAAM,QAAkC,EAAC,CAAA;AACzC,IAAA,MAAM,EAAE,YAAA,EAAiB,GAAA,OAAA,IAAW,EAAC,CAAA;AACrC,IAAA,IAAI,YAAc,EAAA;AAChB,MAAA,KAAA,CAAM,MAAS,GAAA,YAAA,CAAA;AAAA,KACjB;AAEA,IAAM,MAAA,MAAA,GAAS,MAAM,IAAK,CAAA,OAAA;AAAA,MACxB,CAAA,WAAA,EAAc,kBAAmB,CAAA,UAAU,CAAC,CAAA,CAAA;AAAA,MAC5C,KAAA;AAAA,KACF,CAAA;AACA,IAAA,OAAO,MAAO,CAAA,KAAA,CAAA;AAAA,GAChB;AACF;;;;"}
@@ -0,0 +1,16 @@
1
+ import React from 'react';
2
+ import { useEntity, MissingAnnotationEmptyState } from '@backstage/plugin-catalog-react';
3
+ import { isVaultAvailable } from '../../conditions.esm.js';
4
+ import { VAULT_SECRET_PATH_ANNOTATION } from '../../constants.esm.js';
5
+ import { EntityVaultTable } from '../EntityVaultTable/EntityVaultTable.esm.js';
6
+
7
+ const EntityVaultCard = () => {
8
+ const { entity } = useEntity();
9
+ if (isVaultAvailable(entity)) {
10
+ return /* @__PURE__ */ React.createElement(EntityVaultTable, { entity });
11
+ }
12
+ return /* @__PURE__ */ React.createElement(MissingAnnotationEmptyState, { annotation: VAULT_SECRET_PATH_ANNOTATION });
13
+ };
14
+
15
+ export { EntityVaultCard };
16
+ //# sourceMappingURL=EntityVaultCard.esm.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"EntityVaultCard.esm.js","sources":["../../../src/components/EntityVaultCard/EntityVaultCard.tsx"],"sourcesContent":["/*\n * Copyright 2020 The Backstage Authors\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://www.apache.org/licenses/LICENSE-2.0\n *\n * Unless required by applicable law or agreed to in writing, software\n * distributed under the License is distributed on an \"AS IS\" BASIS,\n * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n * See the License for the specific language governing permissions and\n * limitations under the License.\n */\n\nimport React from 'react';\nimport {\n useEntity,\n MissingAnnotationEmptyState,\n} from '@backstage/plugin-catalog-react';\nimport { isVaultAvailable } from '../../conditions';\nimport { VAULT_SECRET_PATH_ANNOTATION } from '../../constants';\nimport { EntityVaultTable } from '../EntityVaultTable';\n\nexport const EntityVaultCard = () => {\n const { entity } = useEntity();\n\n if (isVaultAvailable(entity)) {\n return <EntityVaultTable entity={entity} />;\n }\n return (\n <MissingAnnotationEmptyState annotation={VAULT_SECRET_PATH_ANNOTATION} />\n );\n};\n"],"names":[],"mappings":";;;;;;AAyBO,MAAM,kBAAkB,MAAM;AACnC,EAAM,MAAA,EAAE,MAAO,EAAA,GAAI,SAAU,EAAA,CAAA;AAE7B,EAAI,IAAA,gBAAA,CAAiB,MAAM,CAAG,EAAA;AAC5B,IAAO,uBAAA,KAAA,CAAA,aAAA,CAAC,oBAAiB,MAAgB,EAAA,CAAA,CAAA;AAAA,GAC3C;AACA,EACE,uBAAA,KAAA,CAAA,aAAA,CAAC,2BAA4B,EAAA,EAAA,UAAA,EAAY,4BAA8B,EAAA,CAAA,CAAA;AAE3E;;;;"}
@@ -0,0 +1,2 @@
1
+ export { EntityVaultCard } from './EntityVaultCard.esm.js';
2
+ //# sourceMappingURL=index.esm.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"index.esm.js","sources":[],"sourcesContent":[],"names":[],"mappings":""}
@@ -1,6 +1,4 @@
1
1
  import React from 'react';
2
- import { useEntity, MissingAnnotationEmptyState } from '@backstage/plugin-catalog-react';
3
- import { v as vaultApiRef, V as VAULT_SECRET_PATH_ANNOTATION, a as VAULT_SECRET_ENGINE_ANNOTATION, i as isVaultAvailable } from './index-C3tCbIvC.esm.js';
4
2
  import { Link, Table } from '@backstage/core-components';
5
3
  import { useApi } from '@backstage/core-plugin-api';
6
4
  import Box from '@material-ui/core/Box';
@@ -9,12 +7,12 @@ import Edit from '@material-ui/icons/Edit';
9
7
  import Visibility from '@material-ui/icons/Visibility';
10
8
  import Alert from '@material-ui/lab/Alert';
11
9
  import useAsync from 'react-use/esm/useAsync';
12
- import '@backstage/errors';
10
+ import { vaultApiRef } from '../../api.esm.js';
11
+ import { VAULT_SECRET_PATH_ANNOTATION, VAULT_SECRET_ENGINE_ANNOTATION } from '../../constants.esm.js';
13
12
 
14
13
  const vaultSecretConfig = (entity) => {
15
- var _a, _b;
16
- const secretPath = (_a = entity.metadata.annotations) == null ? void 0 : _a[VAULT_SECRET_PATH_ANNOTATION];
17
- const secretEngine = (_b = entity.metadata.annotations) == null ? void 0 : _b[VAULT_SECRET_ENGINE_ANNOTATION];
14
+ const secretPath = entity.metadata.annotations?.[VAULT_SECRET_PATH_ANNOTATION];
15
+ const secretEngine = entity.metadata.annotations?.[VAULT_SECRET_ENGINE_ANNOTATION];
18
16
  return { secretPath, secretEngine };
19
17
  };
20
18
  const EntityVaultTable = ({ entity }) => {
@@ -79,13 +77,5 @@ const EntityVaultTable = ({ entity }) => {
79
77
  );
80
78
  };
81
79
 
82
- const EntityVaultCard = () => {
83
- const { entity } = useEntity();
84
- if (isVaultAvailable(entity)) {
85
- return /* @__PURE__ */ React.createElement(EntityVaultTable, { entity });
86
- }
87
- return /* @__PURE__ */ React.createElement(MissingAnnotationEmptyState, { annotation: VAULT_SECRET_PATH_ANNOTATION });
88
- };
89
-
90
- export { EntityVaultCard };
91
- //# sourceMappingURL=index-_ZTGu21U.esm.js.map
80
+ export { EntityVaultTable, vaultSecretConfig };
81
+ //# sourceMappingURL=EntityVaultTable.esm.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"EntityVaultTable.esm.js","sources":["../../../src/components/EntityVaultTable/EntityVaultTable.tsx"],"sourcesContent":["/*\n * Copyright 2020 The Backstage Authors\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://www.apache.org/licenses/LICENSE-2.0\n *\n * Unless required by applicable law or agreed to in writing, software\n * distributed under the License is distributed on an \"AS IS\" BASIS,\n * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n * See the License for the specific language governing permissions and\n * limitations under the License.\n */\nimport React from 'react';\nimport { Entity } from '@backstage/catalog-model';\nimport { Link, Table, TableColumn } from '@backstage/core-components';\nimport { useApi } from '@backstage/core-plugin-api';\nimport Box from '@material-ui/core/Box';\nimport Typography from '@material-ui/core/Typography';\nimport Edit from '@material-ui/icons/Edit';\nimport Visibility from '@material-ui/icons/Visibility';\nimport Alert from '@material-ui/lab/Alert';\nimport useAsync from 'react-use/esm/useAsync';\nimport { VaultSecret, vaultApiRef } from '../../api';\nimport {\n VAULT_SECRET_ENGINE_ANNOTATION,\n VAULT_SECRET_PATH_ANNOTATION,\n} from '../../constants';\n\nexport const vaultSecretConfig = (entity: Entity) => {\n const secretPath =\n entity.metadata.annotations?.[VAULT_SECRET_PATH_ANNOTATION];\n const secretEngine =\n entity.metadata.annotations?.[VAULT_SECRET_ENGINE_ANNOTATION];\n\n return { secretPath, secretEngine };\n};\n\nexport const EntityVaultTable = ({ entity }: { entity: Entity }) => {\n const vaultApi = useApi(vaultApiRef);\n const { secretPath, secretEngine } = vaultSecretConfig(entity);\n if (!secretPath) {\n throw Error(\n `The secret path is undefined. Please, define the annotation ${VAULT_SECRET_PATH_ANNOTATION}`,\n );\n }\n\n const { value, loading, error } = useAsync(async (): Promise<\n VaultSecret[]\n > => {\n return vaultApi.listSecrets(secretPath, { secretEngine });\n }, []);\n\n const columns: TableColumn[] = [\n { title: 'Secret', field: 'secret', highlight: true },\n { title: 'View URL', field: 'view', width: '10%' },\n { title: 'Edit URL', field: 'edit', width: '10%' },\n ];\n\n const data = (value || []).map(secret => {\n const secretName = `${secret.path.replace(`${secretPath}/`, '')}/${\n secret.name\n }`;\n\n return {\n secret: secretName,\n view: (\n <Link\n aria-label=\"View\"\n title={`View ${secretName}`}\n to={secret.showUrl}\n >\n <Visibility style={{ fontSize: 16 }} />\n </Link>\n ),\n edit: (\n <Link\n aria-label=\"Edit\"\n title={`Edit ${secretName}`}\n to={secret.editUrl}\n >\n <Edit style={{ fontSize: 16 }} />\n </Link>\n ),\n };\n });\n\n if (error) {\n return (\n <Alert severity=\"error\">\n Unexpected error while fetching secrets from path '{secretPath}':{' '}\n {error.message}\n </Alert>\n );\n }\n\n return (\n <Table\n title=\"Vault\"\n subtitle={`Secrets for ${entity.metadata.name} in ${secretPath}`}\n columns={columns}\n data={data}\n isLoading={loading}\n options={{\n padding: 'dense',\n pageSize: 10,\n emptyRowsWhenPaging: false,\n search: false,\n }}\n emptyContent={\n <Box style={{ textAlign: 'center', padding: '15px' }}>\n <Typography variant=\"body1\">\n No secrets found for {entity.metadata.name} in {secretPath}\n </Typography>\n </Box>\n }\n />\n );\n};\n"],"names":[],"mappings":";;;;;;;;;;;;AA+Ba,MAAA,iBAAA,GAAoB,CAAC,MAAmB,KAAA;AACnD,EAAA,MAAM,UACJ,GAAA,MAAA,CAAO,QAAS,CAAA,WAAA,GAAc,4BAA4B,CAAA,CAAA;AAC5D,EAAA,MAAM,YACJ,GAAA,MAAA,CAAO,QAAS,CAAA,WAAA,GAAc,8BAA8B,CAAA,CAAA;AAE9D,EAAO,OAAA,EAAE,YAAY,YAAa,EAAA,CAAA;AACpC,EAAA;AAEO,MAAM,gBAAmB,GAAA,CAAC,EAAE,MAAA,EAAiC,KAAA;AAClE,EAAM,MAAA,QAAA,GAAW,OAAO,WAAW,CAAA,CAAA;AACnC,EAAA,MAAM,EAAE,UAAA,EAAY,YAAa,EAAA,GAAI,kBAAkB,MAAM,CAAA,CAAA;AAC7D,EAAA,IAAI,CAAC,UAAY,EAAA;AACf,IAAM,MAAA,KAAA;AAAA,MACJ,+DAA+D,4BAA4B,CAAA,CAAA;AAAA,KAC7F,CAAA;AAAA,GACF;AAEA,EAAA,MAAM,EAAE,KAAO,EAAA,OAAA,EAAS,KAAM,EAAA,GAAI,SAAS,YAEtC;AACH,IAAA,OAAO,QAAS,CAAA,WAAA,CAAY,UAAY,EAAA,EAAE,cAAc,CAAA,CAAA;AAAA,GAC1D,EAAG,EAAE,CAAA,CAAA;AAEL,EAAA,MAAM,OAAyB,GAAA;AAAA,IAC7B,EAAE,KAAO,EAAA,QAAA,EAAU,KAAO,EAAA,QAAA,EAAU,WAAW,IAAK,EAAA;AAAA,IACpD,EAAE,KAAO,EAAA,UAAA,EAAY,KAAO,EAAA,MAAA,EAAQ,OAAO,KAAM,EAAA;AAAA,IACjD,EAAE,KAAO,EAAA,UAAA,EAAY,KAAO,EAAA,MAAA,EAAQ,OAAO,KAAM,EAAA;AAAA,GACnD,CAAA;AAEA,EAAA,MAAM,IAAQ,GAAA,CAAA,KAAA,IAAS,EAAC,EAAG,IAAI,CAAU,MAAA,KAAA;AACvC,IAAA,MAAM,UAAa,GAAA,CAAA,EAAG,MAAO,CAAA,IAAA,CAAK,OAAQ,CAAA,CAAA,EAAG,UAAU,CAAA,CAAA,CAAA,EAAK,EAAE,CAAC,CAC7D,CAAA,EAAA,MAAA,CAAO,IACT,CAAA,CAAA,CAAA;AAEA,IAAO,OAAA;AAAA,MACL,MAAQ,EAAA,UAAA;AAAA,MACR,IACE,kBAAA,KAAA,CAAA,aAAA;AAAA,QAAC,IAAA;AAAA,QAAA;AAAA,UACC,YAAW,EAAA,MAAA;AAAA,UACX,KAAA,EAAO,QAAQ,UAAU,CAAA,CAAA;AAAA,UACzB,IAAI,MAAO,CAAA,OAAA;AAAA,SAAA;AAAA,4CAEV,UAAW,EAAA,EAAA,KAAA,EAAO,EAAE,QAAA,EAAU,IAAM,EAAA,CAAA;AAAA,OACvC;AAAA,MAEF,IACE,kBAAA,KAAA,CAAA,aAAA;AAAA,QAAC,IAAA;AAAA,QAAA;AAAA,UACC,YAAW,EAAA,MAAA;AAAA,UACX,KAAA,EAAO,QAAQ,UAAU,CAAA,CAAA;AAAA,UACzB,IAAI,MAAO,CAAA,OAAA;AAAA,SAAA;AAAA,4CAEV,IAAK,EAAA,EAAA,KAAA,EAAO,EAAE,QAAA,EAAU,IAAM,EAAA,CAAA;AAAA,OACjC;AAAA,KAEJ,CAAA;AAAA,GACD,CAAA,CAAA;AAED,EAAA,IAAI,KAAO,EAAA;AACT,IACE,uBAAA,KAAA,CAAA,aAAA,CAAC,SAAM,QAAS,EAAA,OAAA,EAAA,EAAQ,uDAC8B,UAAW,EAAA,IAAA,EAAG,GACjE,EAAA,KAAA,CAAM,OACT,CAAA,CAAA;AAAA,GAEJ;AAEA,EACE,uBAAA,KAAA,CAAA,aAAA;AAAA,IAAC,KAAA;AAAA,IAAA;AAAA,MACC,KAAM,EAAA,OAAA;AAAA,MACN,UAAU,CAAe,YAAA,EAAA,MAAA,CAAO,QAAS,CAAA,IAAI,OAAO,UAAU,CAAA,CAAA;AAAA,MAC9D,OAAA;AAAA,MACA,IAAA;AAAA,MACA,SAAW,EAAA,OAAA;AAAA,MACX,OAAS,EAAA;AAAA,QACP,OAAS,EAAA,OAAA;AAAA,QACT,QAAU,EAAA,EAAA;AAAA,QACV,mBAAqB,EAAA,KAAA;AAAA,QACrB,MAAQ,EAAA,KAAA;AAAA,OACV;AAAA,MACA,YAAA,sCACG,GAAI,EAAA,EAAA,KAAA,EAAO,EAAE,SAAW,EAAA,QAAA,EAAU,SAAS,MAAO,EAAA,EAAA,sCAChD,UAAW,EAAA,EAAA,OAAA,EAAQ,WAAQ,uBACJ,EAAA,MAAA,CAAO,SAAS,IAAK,EAAA,MAAA,EAAK,UAClD,CACF,CAAA;AAAA,KAAA;AAAA,GAEJ,CAAA;AAEJ;;;;"}
@@ -0,0 +1,10 @@
1
+ import { VAULT_SECRET_PATH_ANNOTATION } from './constants.esm.js';
2
+
3
+ function isVaultAvailable(entity) {
4
+ return Boolean(
5
+ entity.metadata.annotations?.hasOwnProperty(VAULT_SECRET_PATH_ANNOTATION)
6
+ );
7
+ }
8
+
9
+ export { isVaultAvailable };
10
+ //# sourceMappingURL=conditions.esm.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"conditions.esm.js","sources":["../src/conditions.ts"],"sourcesContent":["/*\n * Copyright 2020 The Backstage Authors\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://www.apache.org/licenses/LICENSE-2.0\n *\n * Unless required by applicable law or agreed to in writing, software\n * distributed under the License is distributed on an \"AS IS\" BASIS,\n * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n * See the License for the specific language governing permissions and\n * limitations under the License.\n */\nimport { Entity } from '@backstage/catalog-model';\nimport { VAULT_SECRET_PATH_ANNOTATION } from './constants';\n\n/**\n * Checks if an entity contains the annotation for Vault.\n * @param entity - The entity to check if the annotation exists\n * @returns If the annotation exists or not\n * @public\n */\nexport function isVaultAvailable(entity: Entity): boolean {\n return Boolean(\n entity.metadata.annotations?.hasOwnProperty(VAULT_SECRET_PATH_ANNOTATION),\n );\n}\n"],"names":[],"mappings":";;AAwBO,SAAS,iBAAiB,MAAyB,EAAA;AACxD,EAAO,OAAA,OAAA;AAAA,IACL,MAAO,CAAA,QAAA,CAAS,WAAa,EAAA,cAAA,CAAe,4BAA4B,CAAA;AAAA,GAC1E,CAAA;AACF;;;;"}
@@ -0,0 +1,5 @@
1
+ const VAULT_SECRET_ENGINE_ANNOTATION = "vault.io/secrets-engine";
2
+ const VAULT_SECRET_PATH_ANNOTATION = "vault.io/secrets-path";
3
+
4
+ export { VAULT_SECRET_ENGINE_ANNOTATION, VAULT_SECRET_PATH_ANNOTATION };
5
+ //# sourceMappingURL=constants.esm.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"constants.esm.js","sources":["../src/constants.ts"],"sourcesContent":["/*\n * Copyright 2020 The Backstage Authors\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://www.apache.org/licenses/LICENSE-2.0\n *\n * Unless required by applicable law or agreed to in writing, software\n * distributed under the License is distributed on an \"AS IS\" BASIS,\n * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n * See the License for the specific language governing permissions and\n * limitations under the License.\n */\n\n/**\n * @public\n */\nexport const VAULT_SECRET_ENGINE_ANNOTATION = 'vault.io/secrets-engine';\n/**\n * @public\n */\nexport const VAULT_SECRET_PATH_ANNOTATION = 'vault.io/secrets-path';\n"],"names":[],"mappings":"AAmBO,MAAM,8BAAiC,GAAA,0BAAA;AAIvC,MAAM,4BAA+B,GAAA;;;;"}
package/dist/index.esm.js CHANGED
@@ -1,4 +1,5 @@
1
- export { E as EntityVaultCard, V as VAULT_SECRET_PATH_ANNOTATION, i as isVaultAvailable, v as vaultApiRef, b as vaultPlugin } from './esm/index-C3tCbIvC.esm.js';
2
- import '@backstage/core-plugin-api';
3
- import '@backstage/errors';
1
+ export { EntityVaultCard, vaultPlugin } from './plugin.esm.js';
2
+ export { isVaultAvailable } from './conditions.esm.js';
3
+ export { VAULT_SECRET_PATH_ANNOTATION } from './constants.esm.js';
4
+ export { vaultApiRef } from './api.esm.js';
4
5
  //# sourceMappingURL=index.esm.js.map
@@ -1 +1 @@
1
- {"version":3,"file":"index.esm.js","sources":[],"sourcesContent":[],"names":[],"mappings":";;"}
1
+ {"version":3,"file":"index.esm.js","sources":[],"sourcesContent":[],"names":[],"mappings":";;;"}
@@ -0,0 +1,30 @@
1
+ import { createPlugin, createApiFactory, discoveryApiRef, fetchApiRef, createComponentExtension } from '@backstage/core-plugin-api';
2
+ import { vaultApiRef, VaultClient } from './api.esm.js';
3
+
4
+ const vaultPlugin = createPlugin({
5
+ id: "vault",
6
+ apis: [
7
+ createApiFactory({
8
+ api: vaultApiRef,
9
+ deps: { discoveryApi: discoveryApiRef, fetchApi: fetchApiRef },
10
+ factory: ({
11
+ discoveryApi,
12
+ fetchApi
13
+ }) => new VaultClient({
14
+ discoveryApi,
15
+ fetchApi
16
+ })
17
+ })
18
+ ]
19
+ });
20
+ const EntityVaultCard = vaultPlugin.provide(
21
+ createComponentExtension({
22
+ name: "EntityVaultCard",
23
+ component: {
24
+ lazy: () => import('./components/EntityVaultCard/index.esm.js').then((m) => m.EntityVaultCard)
25
+ }
26
+ })
27
+ );
28
+
29
+ export { EntityVaultCard, vaultPlugin };
30
+ //# sourceMappingURL=plugin.esm.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"plugin.esm.js","sources":["../src/plugin.ts"],"sourcesContent":["/*\n * Copyright 2020 The Backstage Authors\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://www.apache.org/licenses/LICENSE-2.0\n *\n * Unless required by applicable law or agreed to in writing, software\n * distributed under the License is distributed on an \"AS IS\" BASIS,\n * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n * See the License for the specific language governing permissions and\n * limitations under the License.\n */\nimport {\n createApiFactory,\n createComponentExtension,\n createPlugin,\n DiscoveryApi,\n discoveryApiRef,\n FetchApi,\n fetchApiRef,\n} from '@backstage/core-plugin-api';\n\nimport { vaultApiRef, VaultClient } from './api';\n\n/**\n * The vault plugin.\n * @public\n */\nexport const vaultPlugin = createPlugin({\n id: 'vault',\n apis: [\n createApiFactory({\n api: vaultApiRef,\n deps: { discoveryApi: discoveryApiRef, fetchApi: fetchApiRef },\n factory: ({\n discoveryApi,\n fetchApi,\n }: {\n discoveryApi: DiscoveryApi;\n fetchApi: FetchApi;\n }) =>\n new VaultClient({\n discoveryApi,\n fetchApi,\n }),\n }),\n ],\n});\n\n/**\n * Card used to show the list of Vault secrets.\n * @public\n */\nexport const EntityVaultCard = vaultPlugin.provide(\n createComponentExtension({\n name: 'EntityVaultCard',\n component: {\n lazy: () =>\n import('./components/EntityVaultCard').then(m => m.EntityVaultCard),\n },\n }),\n);\n"],"names":[],"mappings":";;;AA+BO,MAAM,cAAc,YAAa,CAAA;AAAA,EACtC,EAAI,EAAA,OAAA;AAAA,EACJ,IAAM,EAAA;AAAA,IACJ,gBAAiB,CAAA;AAAA,MACf,GAAK,EAAA,WAAA;AAAA,MACL,IAAM,EAAA,EAAE,YAAc,EAAA,eAAA,EAAiB,UAAU,WAAY,EAAA;AAAA,MAC7D,SAAS,CAAC;AAAA,QACR,YAAA;AAAA,QACA,QAAA;AAAA,OACF,KAIE,IAAI,WAAY,CAAA;AAAA,QACd,YAAA;AAAA,QACA,QAAA;AAAA,OACD,CAAA;AAAA,KACJ,CAAA;AAAA,GACH;AACF,CAAC,EAAA;AAMM,MAAM,kBAAkB,WAAY,CAAA,OAAA;AAAA,EACzC,wBAAyB,CAAA;AAAA,IACvB,IAAM,EAAA,iBAAA;AAAA,IACN,SAAW,EAAA;AAAA,MACT,IAAA,EAAM,MACJ,OAAO,2CAA8B,EAAE,IAAK,CAAA,CAAA,CAAA,KAAK,EAAE,eAAe,CAAA;AAAA,KACtE;AAAA,GACD,CAAA;AACH;;;;"}
package/package.json CHANGED
@@ -1,9 +1,15 @@
1
1
  {
2
2
  "name": "@backstage-community/plugin-vault",
3
- "version": "0.1.30",
3
+ "version": "0.1.32",
4
4
  "description": "A Backstage plugin that integrates towards Vault",
5
5
  "backstage": {
6
- "role": "frontend-plugin"
6
+ "role": "frontend-plugin",
7
+ "pluginId": "vault",
8
+ "pluginPackages": [
9
+ "@backstage-community/plugin-vault",
10
+ "@backstage-community/plugin-vault-backend",
11
+ "@backstage-community/plugin-vault-node"
12
+ ]
7
13
  },
8
14
  "publishConfig": {
9
15
  "access": "public",
@@ -37,11 +43,11 @@
37
43
  "test": "backstage-cli package test"
38
44
  },
39
45
  "dependencies": {
40
- "@backstage/catalog-model": "^1.4.5",
41
- "@backstage/core-components": "^0.14.4",
42
- "@backstage/core-plugin-api": "^1.9.2",
46
+ "@backstage/catalog-model": "^1.5.0",
47
+ "@backstage/core-components": "^0.14.8",
48
+ "@backstage/core-plugin-api": "^1.9.3",
43
49
  "@backstage/errors": "^1.2.4",
44
- "@backstage/plugin-catalog-react": "^1.11.3",
50
+ "@backstage/plugin-catalog-react": "^1.12.1",
45
51
  "@material-ui/core": "^4.12.2",
46
52
  "@material-ui/icons": "^4.9.1",
47
53
  "@material-ui/lab": "4.0.0-alpha.61",
@@ -49,10 +55,10 @@
49
55
  "react-use": "^17.2.4"
50
56
  },
51
57
  "devDependencies": {
52
- "@backstage/cli": "^0.26.3",
53
- "@backstage/core-app-api": "^1.12.4",
54
- "@backstage/dev-utils": "^1.0.31",
55
- "@backstage/test-utils": "^1.5.4",
58
+ "@backstage/cli": "^0.26.10",
59
+ "@backstage/core-app-api": "^1.13.0",
60
+ "@backstage/dev-utils": "^1.0.34",
61
+ "@backstage/test-utils": "^1.5.7",
56
62
  "@testing-library/dom": "^10.0.0",
57
63
  "@testing-library/jest-dom": "^6.0.0",
58
64
  "@testing-library/react": "^15.0.0",
@@ -1,90 +0,0 @@
1
- import { createApiRef, createPlugin, createApiFactory, discoveryApiRef, fetchApiRef, createComponentExtension } from '@backstage/core-plugin-api';
2
- import { NotFoundError, ResponseError } from '@backstage/errors';
3
-
4
- var __defProp = Object.defineProperty;
5
- var __defNormalProp = (obj, key, value) => key in obj ? __defProp(obj, key, { enumerable: true, configurable: true, writable: true, value }) : obj[key] = value;
6
- var __publicField = (obj, key, value) => {
7
- __defNormalProp(obj, typeof key !== "symbol" ? key + "" : key, value);
8
- return value;
9
- };
10
- const vaultApiRef = createApiRef({
11
- id: "plugin.vault.service"
12
- });
13
- class VaultClient {
14
- constructor({
15
- discoveryApi,
16
- fetchApi
17
- }) {
18
- __publicField(this, "discoveryApi");
19
- __publicField(this, "fetchApi");
20
- this.discoveryApi = discoveryApi;
21
- this.fetchApi = fetchApi;
22
- }
23
- async callApi(path, query) {
24
- const apiUrl = `${await this.discoveryApi.getBaseUrl("vault")}`;
25
- const response = await this.fetchApi.fetch(
26
- `${apiUrl}/${path}?${new URLSearchParams(query).toString()}`,
27
- {
28
- headers: {
29
- Accept: "application/json"
30
- }
31
- }
32
- );
33
- if (response.ok) {
34
- return await response.json();
35
- } else if (response.status === 404) {
36
- throw new NotFoundError(`No secrets found in path '${path}'`);
37
- }
38
- throw await ResponseError.fromResponse(response);
39
- }
40
- async listSecrets(secretPath, options) {
41
- const query = {};
42
- const { secretEngine } = options || {};
43
- if (secretEngine) {
44
- query.engine = secretEngine;
45
- }
46
- const result = await this.callApi(
47
- `v1/secrets/${encodeURIComponent(secretPath)}`,
48
- query
49
- );
50
- return result.items;
51
- }
52
- }
53
-
54
- const vaultPlugin = createPlugin({
55
- id: "vault",
56
- apis: [
57
- createApiFactory({
58
- api: vaultApiRef,
59
- deps: { discoveryApi: discoveryApiRef, fetchApi: fetchApiRef },
60
- factory: ({
61
- discoveryApi,
62
- fetchApi
63
- }) => new VaultClient({
64
- discoveryApi,
65
- fetchApi
66
- })
67
- })
68
- ]
69
- });
70
- const EntityVaultCard = vaultPlugin.provide(
71
- createComponentExtension({
72
- name: "EntityVaultCard",
73
- component: {
74
- lazy: () => import('./index-_ZTGu21U.esm.js').then((m) => m.EntityVaultCard)
75
- }
76
- })
77
- );
78
-
79
- const VAULT_SECRET_ENGINE_ANNOTATION = "vault.io/secrets-engine";
80
- const VAULT_SECRET_PATH_ANNOTATION = "vault.io/secrets-path";
81
-
82
- function isVaultAvailable(entity) {
83
- var _a;
84
- return Boolean(
85
- (_a = entity.metadata.annotations) == null ? void 0 : _a.hasOwnProperty(VAULT_SECRET_PATH_ANNOTATION)
86
- );
87
- }
88
-
89
- export { EntityVaultCard as E, VAULT_SECRET_PATH_ANNOTATION as V, VAULT_SECRET_ENGINE_ANNOTATION as a, vaultPlugin as b, isVaultAvailable as i, vaultApiRef as v };
90
- //# sourceMappingURL=index-C3tCbIvC.esm.js.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"index-C3tCbIvC.esm.js","sources":["../../src/api.ts","../../src/plugin.ts","../../src/constants.ts","../../src/conditions.ts"],"sourcesContent":["/*\n * Copyright 2020 The Backstage Authors\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://www.apache.org/licenses/LICENSE-2.0\n *\n * Unless required by applicable law or agreed to in writing, software\n * distributed under the License is distributed on an \"AS IS\" BASIS,\n * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n * See the License for the specific language governing permissions and\n * limitations under the License.\n */\nimport {\n DiscoveryApi,\n createApiRef,\n FetchApi,\n} from '@backstage/core-plugin-api';\nimport { NotFoundError, ResponseError } from '@backstage/errors';\n\n/**\n * @public\n */\nexport const vaultApiRef = createApiRef<VaultApi>({\n id: 'plugin.vault.service',\n});\n\n/**\n * Object containing the secret name and some links.\n * @public\n */\nexport type VaultSecret = {\n name: string;\n path: string;\n showUrl: string;\n editUrl: string;\n};\n\n/**\n * Interface for the VaultApi.\n * @public\n */\nexport interface VaultApi {\n /**\n * Returns a list of secrets used to show in a table.\n * @param secretPath - The path where the secrets are stored in Vault\n * @param options - Additional options to be passed to the Vault API, allows to override vault default settings in app config file\n */\n listSecrets(\n secretPath: string,\n options?: {\n secretEngine?: string;\n },\n ): Promise<VaultSecret[]>;\n}\n\n/**\n * Default implementation of the VaultApi.\n * @public\n */\nexport class VaultClient implements VaultApi {\n private readonly discoveryApi: DiscoveryApi;\n private readonly fetchApi: FetchApi;\n\n constructor({\n discoveryApi,\n fetchApi,\n }: {\n discoveryApi: DiscoveryApi;\n fetchApi: FetchApi;\n }) {\n this.discoveryApi = discoveryApi;\n this.fetchApi = fetchApi;\n }\n\n private async callApi<T>(\n path: string,\n query: { [key in string]: any },\n ): Promise<T> {\n const apiUrl = `${await this.discoveryApi.getBaseUrl('vault')}`;\n const response = await this.fetchApi.fetch(\n `${apiUrl}/${path}?${new URLSearchParams(query).toString()}`,\n {\n headers: {\n Accept: 'application/json',\n },\n },\n );\n if (response.ok) {\n return (await response.json()) as T;\n } else if (response.status === 404) {\n throw new NotFoundError(`No secrets found in path '${path}'`);\n }\n throw await ResponseError.fromResponse(response);\n }\n\n async listSecrets(\n secretPath: string,\n options?: {\n secretEngine?: string;\n },\n ): Promise<VaultSecret[]> {\n const query: { [key in string]: any } = {};\n const { secretEngine } = options || {};\n if (secretEngine) {\n query.engine = secretEngine;\n }\n\n const result = await this.callApi<{ items: VaultSecret[] }>(\n `v1/secrets/${encodeURIComponent(secretPath)}`,\n query,\n );\n return result.items;\n }\n}\n","/*\n * Copyright 2020 The Backstage Authors\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://www.apache.org/licenses/LICENSE-2.0\n *\n * Unless required by applicable law or agreed to in writing, software\n * distributed under the License is distributed on an \"AS IS\" BASIS,\n * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n * See the License for the specific language governing permissions and\n * limitations under the License.\n */\nimport {\n createApiFactory,\n createComponentExtension,\n createPlugin,\n DiscoveryApi,\n discoveryApiRef,\n FetchApi,\n fetchApiRef,\n} from '@backstage/core-plugin-api';\n\nimport { vaultApiRef, VaultClient } from './api';\n\n/**\n * The vault plugin.\n * @public\n */\nexport const vaultPlugin = createPlugin({\n id: 'vault',\n apis: [\n createApiFactory({\n api: vaultApiRef,\n deps: { discoveryApi: discoveryApiRef, fetchApi: fetchApiRef },\n factory: ({\n discoveryApi,\n fetchApi,\n }: {\n discoveryApi: DiscoveryApi;\n fetchApi: FetchApi;\n }) =>\n new VaultClient({\n discoveryApi,\n fetchApi,\n }),\n }),\n ],\n});\n\n/**\n * Card used to show the list of Vault secrets.\n * @public\n */\nexport const EntityVaultCard = vaultPlugin.provide(\n createComponentExtension({\n name: 'EntityVaultCard',\n component: {\n lazy: () =>\n import('./components/EntityVaultCard').then(m => m.EntityVaultCard),\n },\n }),\n);\n","/*\n * Copyright 2020 The Backstage Authors\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://www.apache.org/licenses/LICENSE-2.0\n *\n * Unless required by applicable law or agreed to in writing, software\n * distributed under the License is distributed on an \"AS IS\" BASIS,\n * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n * See the License for the specific language governing permissions and\n * limitations under the License.\n */\n\n/**\n * @public\n */\nexport const VAULT_SECRET_ENGINE_ANNOTATION = 'vault.io/secrets-engine';\n/**\n * @public\n */\nexport const VAULT_SECRET_PATH_ANNOTATION = 'vault.io/secrets-path';\n","/*\n * Copyright 2020 The Backstage Authors\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://www.apache.org/licenses/LICENSE-2.0\n *\n * Unless required by applicable law or agreed to in writing, software\n * distributed under the License is distributed on an \"AS IS\" BASIS,\n * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n * See the License for the specific language governing permissions and\n * limitations under the License.\n */\nimport { Entity } from '@backstage/catalog-model';\nimport { VAULT_SECRET_PATH_ANNOTATION } from './constants';\n\n/**\n * Checks if an entity contains the annotation for Vault.\n * @param entity - The entity to check if the annotation exists\n * @returns If the annotation exists or not\n * @public\n */\nexport function isVaultAvailable(entity: Entity): boolean {\n return Boolean(\n entity.metadata.annotations?.hasOwnProperty(VAULT_SECRET_PATH_ANNOTATION),\n );\n}\n"],"names":[],"mappings":";;;;;;;;;AAyBO,MAAM,cAAc,YAAuB,CAAA;AAAA,EAChD,EAAI,EAAA,sBAAA;AACN,CAAC,EAAA;AAmCM,MAAM,WAAgC,CAAA;AAAA,EAI3C,WAAY,CAAA;AAAA,IACV,YAAA;AAAA,IACA,QAAA;AAAA,GAIC,EAAA;AATH,IAAiB,aAAA,CAAA,IAAA,EAAA,cAAA,CAAA,CAAA;AACjB,IAAiB,aAAA,CAAA,IAAA,EAAA,UAAA,CAAA,CAAA;AASf,IAAA,IAAA,CAAK,YAAe,GAAA,YAAA,CAAA;AACpB,IAAA,IAAA,CAAK,QAAW,GAAA,QAAA,CAAA;AAAA,GAClB;AAAA,EAEA,MAAc,OACZ,CAAA,IAAA,EACA,KACY,EAAA;AACZ,IAAA,MAAM,SAAS,CAAG,EAAA,MAAM,KAAK,YAAa,CAAA,UAAA,CAAW,OAAO,CAAC,CAAA,CAAA,CAAA;AAC7D,IAAM,MAAA,QAAA,GAAW,MAAM,IAAA,CAAK,QAAS,CAAA,KAAA;AAAA,MACnC,CAAA,EAAG,MAAM,CAAA,CAAA,EAAI,IAAI,CAAA,CAAA,EAAI,IAAI,eAAgB,CAAA,KAAK,CAAE,CAAA,QAAA,EAAU,CAAA,CAAA;AAAA,MAC1D;AAAA,QACE,OAAS,EAAA;AAAA,UACP,MAAQ,EAAA,kBAAA;AAAA,SACV;AAAA,OACF;AAAA,KACF,CAAA;AACA,IAAA,IAAI,SAAS,EAAI,EAAA;AACf,MAAQ,OAAA,MAAM,SAAS,IAAK,EAAA,CAAA;AAAA,KAC9B,MAAA,IAAW,QAAS,CAAA,MAAA,KAAW,GAAK,EAAA;AAClC,MAAA,MAAM,IAAI,aAAA,CAAc,CAA6B,0BAAA,EAAA,IAAI,CAAG,CAAA,CAAA,CAAA,CAAA;AAAA,KAC9D;AACA,IAAM,MAAA,MAAM,aAAc,CAAA,YAAA,CAAa,QAAQ,CAAA,CAAA;AAAA,GACjD;AAAA,EAEA,MAAM,WACJ,CAAA,UAAA,EACA,OAGwB,EAAA;AACxB,IAAA,MAAM,QAAkC,EAAC,CAAA;AACzC,IAAA,MAAM,EAAE,YAAA,EAAiB,GAAA,OAAA,IAAW,EAAC,CAAA;AACrC,IAAA,IAAI,YAAc,EAAA;AAChB,MAAA,KAAA,CAAM,MAAS,GAAA,YAAA,CAAA;AAAA,KACjB;AAEA,IAAM,MAAA,MAAA,GAAS,MAAM,IAAK,CAAA,OAAA;AAAA,MACxB,CAAA,WAAA,EAAc,kBAAmB,CAAA,UAAU,CAAC,CAAA,CAAA;AAAA,MAC5C,KAAA;AAAA,KACF,CAAA;AACA,IAAA,OAAO,MAAO,CAAA,KAAA,CAAA;AAAA,GAChB;AACF;;ACrFO,MAAM,cAAc,YAAa,CAAA;AAAA,EACtC,EAAI,EAAA,OAAA;AAAA,EACJ,IAAM,EAAA;AAAA,IACJ,gBAAiB,CAAA;AAAA,MACf,GAAK,EAAA,WAAA;AAAA,MACL,IAAM,EAAA,EAAE,YAAc,EAAA,eAAA,EAAiB,UAAU,WAAY,EAAA;AAAA,MAC7D,SAAS,CAAC;AAAA,QACR,YAAA;AAAA,QACA,QAAA;AAAA,OACF,KAIE,IAAI,WAAY,CAAA;AAAA,QACd,YAAA;AAAA,QACA,QAAA;AAAA,OACD,CAAA;AAAA,KACJ,CAAA;AAAA,GACH;AACF,CAAC,EAAA;AAMM,MAAM,kBAAkB,WAAY,CAAA,OAAA;AAAA,EACzC,wBAAyB,CAAA;AAAA,IACvB,IAAM,EAAA,iBAAA;AAAA,IACN,SAAW,EAAA;AAAA,MACT,IAAA,EAAM,MACJ,OAAO,yBAA8B,EAAE,IAAK,CAAA,CAAA,CAAA,KAAK,EAAE,eAAe,CAAA;AAAA,KACtE;AAAA,GACD,CAAA;AACH;;AC7CO,MAAM,8BAAiC,GAAA,0BAAA;AAIvC,MAAM,4BAA+B,GAAA;;ACCrC,SAAS,iBAAiB,MAAyB,EAAA;AAxB1D,EAAA,IAAA,EAAA,CAAA;AAyBE,EAAO,OAAA,OAAA;AAAA,IAAA,CACL,EAAO,GAAA,MAAA,CAAA,QAAA,CAAS,WAAhB,KAAA,IAAA,GAAA,KAAA,CAAA,GAAA,EAAA,CAA6B,cAAe,CAAA,4BAAA,CAAA;AAAA,GAC9C,CAAA;AACF;;;;"}
@@ -1 +0,0 @@
1
- {"version":3,"file":"index-_ZTGu21U.esm.js","sources":["../../src/components/EntityVaultTable/EntityVaultTable.tsx","../../src/components/EntityVaultCard/EntityVaultCard.tsx"],"sourcesContent":["/*\n * Copyright 2020 The Backstage Authors\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://www.apache.org/licenses/LICENSE-2.0\n *\n * Unless required by applicable law or agreed to in writing, software\n * distributed under the License is distributed on an \"AS IS\" BASIS,\n * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n * See the License for the specific language governing permissions and\n * limitations under the License.\n */\nimport React from 'react';\nimport { Entity } from '@backstage/catalog-model';\nimport { Link, Table, TableColumn } from '@backstage/core-components';\nimport { useApi } from '@backstage/core-plugin-api';\nimport Box from '@material-ui/core/Box';\nimport Typography from '@material-ui/core/Typography';\nimport Edit from '@material-ui/icons/Edit';\nimport Visibility from '@material-ui/icons/Visibility';\nimport Alert from '@material-ui/lab/Alert';\nimport useAsync from 'react-use/esm/useAsync';\nimport { VaultSecret, vaultApiRef } from '../../api';\nimport {\n VAULT_SECRET_ENGINE_ANNOTATION,\n VAULT_SECRET_PATH_ANNOTATION,\n} from '../../constants';\n\nexport const vaultSecretConfig = (entity: Entity) => {\n const secretPath =\n entity.metadata.annotations?.[VAULT_SECRET_PATH_ANNOTATION];\n const secretEngine =\n entity.metadata.annotations?.[VAULT_SECRET_ENGINE_ANNOTATION];\n\n return { secretPath, secretEngine };\n};\n\nexport const EntityVaultTable = ({ entity }: { entity: Entity }) => {\n const vaultApi = useApi(vaultApiRef);\n const { secretPath, secretEngine } = vaultSecretConfig(entity);\n if (!secretPath) {\n throw Error(\n `The secret path is undefined. Please, define the annotation ${VAULT_SECRET_PATH_ANNOTATION}`,\n );\n }\n\n const { value, loading, error } = useAsync(async (): Promise<\n VaultSecret[]\n > => {\n return vaultApi.listSecrets(secretPath, { secretEngine });\n }, []);\n\n const columns: TableColumn[] = [\n { title: 'Secret', field: 'secret', highlight: true },\n { title: 'View URL', field: 'view', width: '10%' },\n { title: 'Edit URL', field: 'edit', width: '10%' },\n ];\n\n const data = (value || []).map(secret => {\n const secretName = `${secret.path.replace(`${secretPath}/`, '')}/${\n secret.name\n }`;\n\n return {\n secret: secretName,\n view: (\n <Link\n aria-label=\"View\"\n title={`View ${secretName}`}\n to={secret.showUrl}\n >\n <Visibility style={{ fontSize: 16 }} />\n </Link>\n ),\n edit: (\n <Link\n aria-label=\"Edit\"\n title={`Edit ${secretName}`}\n to={secret.editUrl}\n >\n <Edit style={{ fontSize: 16 }} />\n </Link>\n ),\n };\n });\n\n if (error) {\n return (\n <Alert severity=\"error\">\n Unexpected error while fetching secrets from path '{secretPath}':{' '}\n {error.message}\n </Alert>\n );\n }\n\n return (\n <Table\n title=\"Vault\"\n subtitle={`Secrets for ${entity.metadata.name} in ${secretPath}`}\n columns={columns}\n data={data}\n isLoading={loading}\n options={{\n padding: 'dense',\n pageSize: 10,\n emptyRowsWhenPaging: false,\n search: false,\n }}\n emptyContent={\n <Box style={{ textAlign: 'center', padding: '15px' }}>\n <Typography variant=\"body1\">\n No secrets found for {entity.metadata.name} in {secretPath}\n </Typography>\n </Box>\n }\n />\n );\n};\n","/*\n * Copyright 2020 The Backstage Authors\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://www.apache.org/licenses/LICENSE-2.0\n *\n * Unless required by applicable law or agreed to in writing, software\n * distributed under the License is distributed on an \"AS IS\" BASIS,\n * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n * See the License for the specific language governing permissions and\n * limitations under the License.\n */\n\nimport React from 'react';\nimport {\n useEntity,\n MissingAnnotationEmptyState,\n} from '@backstage/plugin-catalog-react';\nimport { isVaultAvailable } from '../../conditions';\nimport { VAULT_SECRET_PATH_ANNOTATION } from '../../constants';\nimport { EntityVaultTable } from '../EntityVaultTable';\n\nexport const EntityVaultCard = () => {\n const { entity } = useEntity();\n\n if (isVaultAvailable(entity)) {\n return <EntityVaultTable entity={entity} />;\n }\n return (\n <MissingAnnotationEmptyState annotation={VAULT_SECRET_PATH_ANNOTATION} />\n );\n};\n"],"names":[],"mappings":";;;;;;;;;;;;;AA+Ba,MAAA,iBAAA,GAAoB,CAAC,MAAmB,KAAA;AA/BrD,EAAA,IAAA,EAAA,EAAA,EAAA,CAAA;AAgCE,EAAA,MAAM,UACJ,GAAA,CAAA,EAAA,GAAA,MAAA,CAAO,QAAS,CAAA,WAAA,KAAhB,IAA8B,GAAA,KAAA,CAAA,GAAA,EAAA,CAAA,4BAAA,CAAA,CAAA;AAChC,EAAA,MAAM,YACJ,GAAA,CAAA,EAAA,GAAA,MAAA,CAAO,QAAS,CAAA,WAAA,KAAhB,IAA8B,GAAA,KAAA,CAAA,GAAA,EAAA,CAAA,8BAAA,CAAA,CAAA;AAEhC,EAAO,OAAA,EAAE,YAAY,YAAa,EAAA,CAAA;AACpC,CAAA,CAAA;AAEO,MAAM,gBAAmB,GAAA,CAAC,EAAE,MAAA,EAAiC,KAAA;AAClE,EAAM,MAAA,QAAA,GAAW,OAAO,WAAW,CAAA,CAAA;AACnC,EAAA,MAAM,EAAE,UAAA,EAAY,YAAa,EAAA,GAAI,kBAAkB,MAAM,CAAA,CAAA;AAC7D,EAAA,IAAI,CAAC,UAAY,EAAA;AACf,IAAM,MAAA,KAAA;AAAA,MACJ,+DAA+D,4BAA4B,CAAA,CAAA;AAAA,KAC7F,CAAA;AAAA,GACF;AAEA,EAAA,MAAM,EAAE,KAAO,EAAA,OAAA,EAAS,KAAM,EAAA,GAAI,SAAS,YAEtC;AACH,IAAA,OAAO,QAAS,CAAA,WAAA,CAAY,UAAY,EAAA,EAAE,cAAc,CAAA,CAAA;AAAA,GAC1D,EAAG,EAAE,CAAA,CAAA;AAEL,EAAA,MAAM,OAAyB,GAAA;AAAA,IAC7B,EAAE,KAAO,EAAA,QAAA,EAAU,KAAO,EAAA,QAAA,EAAU,WAAW,IAAK,EAAA;AAAA,IACpD,EAAE,KAAO,EAAA,UAAA,EAAY,KAAO,EAAA,MAAA,EAAQ,OAAO,KAAM,EAAA;AAAA,IACjD,EAAE,KAAO,EAAA,UAAA,EAAY,KAAO,EAAA,MAAA,EAAQ,OAAO,KAAM,EAAA;AAAA,GACnD,CAAA;AAEA,EAAA,MAAM,IAAQ,GAAA,CAAA,KAAA,IAAS,EAAC,EAAG,IAAI,CAAU,MAAA,KAAA;AACvC,IAAA,MAAM,UAAa,GAAA,CAAA,EAAG,MAAO,CAAA,IAAA,CAAK,OAAQ,CAAA,CAAA,EAAG,UAAU,CAAA,CAAA,CAAA,EAAK,EAAE,CAAC,CAC7D,CAAA,EAAA,MAAA,CAAO,IACT,CAAA,CAAA,CAAA;AAEA,IAAO,OAAA;AAAA,MACL,MAAQ,EAAA,UAAA;AAAA,MACR,IACE,kBAAA,KAAA,CAAA,aAAA;AAAA,QAAC,IAAA;AAAA,QAAA;AAAA,UACC,YAAW,EAAA,MAAA;AAAA,UACX,KAAA,EAAO,QAAQ,UAAU,CAAA,CAAA;AAAA,UACzB,IAAI,MAAO,CAAA,OAAA;AAAA,SAAA;AAAA,4CAEV,UAAW,EAAA,EAAA,KAAA,EAAO,EAAE,QAAA,EAAU,IAAM,EAAA,CAAA;AAAA,OACvC;AAAA,MAEF,IACE,kBAAA,KAAA,CAAA,aAAA;AAAA,QAAC,IAAA;AAAA,QAAA;AAAA,UACC,YAAW,EAAA,MAAA;AAAA,UACX,KAAA,EAAO,QAAQ,UAAU,CAAA,CAAA;AAAA,UACzB,IAAI,MAAO,CAAA,OAAA;AAAA,SAAA;AAAA,4CAEV,IAAK,EAAA,EAAA,KAAA,EAAO,EAAE,QAAA,EAAU,IAAM,EAAA,CAAA;AAAA,OACjC;AAAA,KAEJ,CAAA;AAAA,GACD,CAAA,CAAA;AAED,EAAA,IAAI,KAAO,EAAA;AACT,IACE,uBAAA,KAAA,CAAA,aAAA,CAAC,SAAM,QAAS,EAAA,OAAA,EAAA,EAAQ,uDAC8B,UAAW,EAAA,IAAA,EAAG,GACjE,EAAA,KAAA,CAAM,OACT,CAAA,CAAA;AAAA,GAEJ;AAEA,EACE,uBAAA,KAAA,CAAA,aAAA;AAAA,IAAC,KAAA;AAAA,IAAA;AAAA,MACC,KAAM,EAAA,OAAA;AAAA,MACN,UAAU,CAAe,YAAA,EAAA,MAAA,CAAO,QAAS,CAAA,IAAI,OAAO,UAAU,CAAA,CAAA;AAAA,MAC9D,OAAA;AAAA,MACA,IAAA;AAAA,MACA,SAAW,EAAA,OAAA;AAAA,MACX,OAAS,EAAA;AAAA,QACP,OAAS,EAAA,OAAA;AAAA,QACT,QAAU,EAAA,EAAA;AAAA,QACV,mBAAqB,EAAA,KAAA;AAAA,QACrB,MAAQ,EAAA,KAAA;AAAA,OACV;AAAA,MACA,YAAA,sCACG,GAAI,EAAA,EAAA,KAAA,EAAO,EAAE,SAAW,EAAA,QAAA,EAAU,SAAS,MAAO,EAAA,EAAA,sCAChD,UAAW,EAAA,EAAA,OAAA,EAAQ,WAAQ,uBACJ,EAAA,MAAA,CAAO,SAAS,IAAK,EAAA,MAAA,EAAK,UAClD,CACF,CAAA;AAAA,KAAA;AAAA,GAEJ,CAAA;AAEJ,CAAA;;AC/FO,MAAM,kBAAkB,MAAM;AACnC,EAAM,MAAA,EAAE,MAAO,EAAA,GAAI,SAAU,EAAA,CAAA;AAE7B,EAAI,IAAA,gBAAA,CAAiB,MAAM,CAAG,EAAA;AAC5B,IAAO,uBAAA,KAAA,CAAA,aAAA,CAAC,oBAAiB,MAAgB,EAAA,CAAA,CAAA;AAAA,GAC3C;AACA,EACE,uBAAA,KAAA,CAAA,aAAA,CAAC,2BAA4B,EAAA,EAAA,UAAA,EAAY,4BAA8B,EAAA,CAAA,CAAA;AAE3E;;;;"}