Files
local-server/html/ui/js/Cluster.js

102 lines
3.7 KiB
JavaScript
Raw Normal View History

2023-02-07 21:29:19 +01:00
import Downloads from './Downloads.js';
2023-02-12 11:58:26 +01:00
import GetCopy from './GetCopy.js';
2023-02-07 21:29:19 +01:00
export default {
2023-02-12 11:58:26 +01:00
components: { Downloads, GetCopy },
2023-02-07 21:29:19 +01:00
props: [ 'cluster', 'token', 'state' ],
2025-06-29 00:12:12 +02:00
data() {
return {
2025-07-02 21:47:08 +02:00
signReqValidity: "1d",
2025-06-29 00:12:12 +02:00
sshSignReq: {
PubKey: "",
Principal: "root",
},
sshUserCert: null,
2025-07-02 21:47:08 +02:00
kubeSignReq: {
CSR: "",
User: "anonymous",
Group: "",
},
kubeUserCert: null,
2025-06-29 00:12:12 +02:00
};
},
methods: {
sshCASign() {
event.preventDefault();
fetch(`/clusters/${this.cluster.Name}/ssh/user-ca/sign`, {
method: 'POST',
2025-07-02 21:47:08 +02:00
body: JSON.stringify({ ...this.sshSignReq, Validity: this.signReqValidity }),
2025-06-29 00:12:12 +02:00
headers: { 'Authorization': 'Bearer ' + this.token, 'Content-Type': 'application/json' },
}).then((resp) => resp.blob())
.then((cert) => { this.sshUserCert = URL.createObjectURL(cert) })
.catch((e) => { alert('failed to sign: '+e); })
},
2025-07-02 21:47:08 +02:00
kubeCASign() {
event.preventDefault();
fetch(`/clusters/${this.cluster.Name}/kube/sign`, {
method: 'POST',
body: JSON.stringify({ ...this.kubeSignReq, Validity: this.signReqValidity }),
headers: { 'Authorization': 'Bearer ' + this.token, 'Content-Type': 'application/json' },
}).then((resp) => resp.blob())
.then((cert) => { this.kubeUserCert = URL.createObjectURL(cert) })
.catch((e) => { alert('failed to sign: '+e); })
},
2025-06-29 00:12:12 +02:00
},
2023-02-07 21:29:19 +01:00
template: `
2025-06-29 00:12:12 +02:00
<h3>Tokens</h3>
2023-02-12 11:58:26 +01:00
<section class="links">
<GetCopy v-for="n in cluster.Tokens" :token="token" :name="n" :href="'/clusters/'+cluster.Name+'/tokens/'+n" />
</section>
2025-06-29 00:12:12 +02:00
<h3>Passwords</h3>
2023-02-12 11:58:26 +01:00
<section class="links">
<GetCopy v-for="n in cluster.Passwords" :token="token" :name="n" :href="'/clusters/'+cluster.Name+'/passwords/'+n" />
</section>
2025-06-29 00:12:12 +02:00
<h3>Downloads</h3>
<Downloads :token="token" :state="state" kind="cluster" :name="cluster.Name" />
<h3>CAs</h3>
2023-02-15 08:49:34 +01:00
<table><tr><th>Name</th><th>Certificate</th><th>Signed certificates</th></tr>
<tr v-for="ca in cluster.CAs">
<td>{{ ca.Name }}</td>
<td><GetCopy :token="token" name="cert" :href="'/clusters/'+cluster.Name+'/CAs/'+ca.Name+'/certificate'" /></td>
<td><template v-for="signed in ca.Signed">
{{" "}}
<GetCopy :token="token" :name="signed" :href="'/clusters/'+cluster.Name+'/CAs/'+ca.Name+'/signed?name='+signed" />
</template></td>
</tr></table>
2025-06-29 00:12:12 +02:00
2025-07-02 21:47:08 +02:00
<h3>Access</h3>
<p>Allow cluster access from a public key</p>
<p>Certificate time validity: <input type="text" v-model="signReqValidity"/> <small>ie: -5m:1w, 5m, 1M, 1y, 1d-1s, etc.</p>
<h4>Grant SSH access</h4>
<p>Public key (OpenSSH format):<br/>
<textarea v-model="sshSignReq.PubKey" style="width:64em;height:2lh"></textarea>
</p>
<p>Principal: <input type="text" v-model="sshSignReq.Principal"/></p>
<p><button @click="sshCASign">Sign SSH access request</button></p>
2025-06-29 00:12:12 +02:00
<p v-if="sshUserCert">
2025-07-02 21:47:08 +02:00
<a :href="sshUserCert" download="ssh-cert.pub">Get certificate</a>
</p>
<h4>Grant Kubernetes API access</h4>
<p>Certificate signing request (PEM format):<br/>
<textarea v-model="kubeSignReq.CSR" style="width:64em;height:7lh;"></textarea>
</p>
<p>User: <input type="text" v-model="kubeSignReq.User"/></p>
<p>Group: <input type="text" v-model="kubeSignReq.Group"/></p>
<p><button @click="kubeCASign">Sign Kubernetes API access request</button></p>
<p v-if="kubeUserCert">
<a :href="kubeUserCert" download="kube-cert.pub">Get certificate</a>
2025-06-29 00:12:12 +02:00
</p>
2023-02-07 21:29:19 +01:00
`
}