Files
local-server/html/ui/js/Cluster.js

114 lines
4.1 KiB
JavaScript
Raw Normal View History

2023-02-07 21:29:19 +01:00
import Downloads from './Downloads.js';
2023-02-12 11:58:26 +01:00
import GetCopy from './GetCopy.js';
2023-02-07 21:29:19 +01:00
export default {
2023-02-12 11:58:26 +01:00
components: { Downloads, GetCopy },
2023-02-07 21:29:19 +01:00
props: [ 'cluster', 'token', 'state' ],
2025-06-29 00:12:12 +02:00
data() {
return {
2025-07-02 21:47:08 +02:00
signReqValidity: "1d",
2025-06-29 00:12:12 +02:00
sshSignReq: {
PubKey: "",
Principal: "root",
},
sshUserCert: null,
2025-07-02 21:47:08 +02:00
kubeSignReq: {
CSR: "",
2026-01-19 17:57:15 +01:00
User: "",
Group: "system:masters",
2025-07-02 21:47:08 +02:00
},
kubeUserCert: null,
2025-06-29 00:12:12 +02:00
};
},
methods: {
sshCASign() {
event.preventDefault();
fetch(`/clusters/${this.cluster.Name}/ssh/user-ca/sign`, {
method: 'POST',
2025-07-02 21:47:08 +02:00
body: JSON.stringify({ ...this.sshSignReq, Validity: this.signReqValidity }),
2025-06-29 00:12:12 +02:00
headers: { 'Authorization': 'Bearer ' + this.token, 'Content-Type': 'application/json' },
2026-01-19 17:57:15 +01:00
}).then((resp) => {
if (resp.ok) {
resp.blob().then((cert) => { this.sshUserCert = URL.createObjectURL(cert) })
} else {
resp.json().then((resp) => alert('failed to sign: '+resp.message))
}
})
2025-06-29 00:12:12 +02:00
.catch((e) => { alert('failed to sign: '+e); })
},
2025-07-02 21:47:08 +02:00
kubeCASign() {
event.preventDefault();
fetch(`/clusters/${this.cluster.Name}/kube/sign`, {
method: 'POST',
body: JSON.stringify({ ...this.kubeSignReq, Validity: this.signReqValidity }),
headers: { 'Authorization': 'Bearer ' + this.token, 'Content-Type': 'application/json' },
2026-01-19 17:57:15 +01:00
}).then((resp) => {
if (resp.ok) {
resp.blob().then((cert) => { this.kubeUserCert = URL.createObjectURL(cert) })
} else {
resp.json().then((resp) => alert('failed to sign: '+resp.message))
}
})
2025-07-02 21:47:08 +02:00
.catch((e) => { alert('failed to sign: '+e); })
},
2025-06-29 00:12:12 +02:00
},
2023-02-07 21:29:19 +01:00
template: `
2025-06-29 00:12:12 +02:00
<h3>Tokens</h3>
2023-02-12 11:58:26 +01:00
<section class="links">
<GetCopy v-for="n in cluster.Tokens" :token="token" :name="n" :href="'/clusters/'+cluster.Name+'/tokens/'+n" />
</section>
2025-06-29 00:12:12 +02:00
<h3>Passwords</h3>
2023-02-12 11:58:26 +01:00
<section class="links">
<GetCopy v-for="n in cluster.Passwords" :token="token" :name="n" :href="'/clusters/'+cluster.Name+'/passwords/'+n" />
</section>
2025-06-29 00:12:12 +02:00
<h3>Downloads</h3>
<Downloads :token="token" :state="state" kind="cluster" :name="cluster.Name" />
<h3>CAs</h3>
2023-02-15 08:49:34 +01:00
<table><tr><th>Name</th><th>Certificate</th><th>Signed certificates</th></tr>
<tr v-for="ca in cluster.CAs">
<td>{{ ca.Name }}</td>
<td><GetCopy :token="token" name="cert" :href="'/clusters/'+cluster.Name+'/CAs/'+ca.Name+'/certificate'" /></td>
<td><template v-for="signed in ca.Signed">
{{" "}}
<GetCopy :token="token" :name="signed" :href="'/clusters/'+cluster.Name+'/CAs/'+ca.Name+'/signed?name='+signed" />
</template></td>
</tr></table>
2025-06-29 00:12:12 +02:00
2025-07-02 21:47:08 +02:00
<h3>Access</h3>
<p>Allow cluster access from a public key</p>
<p>Certificate time validity: <input type="text" v-model="signReqValidity"/> <small>ie: -5m:1w, 5m, 1M, 1y, 1d-1s, etc.</p>
<h4>Grant SSH access</h4>
<p>Public key (OpenSSH format):<br/>
<textarea v-model="sshSignReq.PubKey" style="width:64em;height:2lh"></textarea>
</p>
2026-01-19 17:57:15 +01:00
<p>User: <input type="text" v-model="sshSignReq.Principal"/></p>
2025-07-02 21:47:08 +02:00
2026-01-19 17:57:15 +01:00
<p><button @click="sshCASign">Sign SSH access (validity: {{signReqValidity}})</button>
<template v-if="sshUserCert">
=&gt; <a :href="sshUserCert" download="ssh-cert.pub">Get certificate</a>
</template>
2025-07-02 21:47:08 +02:00
</p>
<h4>Grant Kubernetes API access</h4>
<p>Certificate signing request (PEM format):<br/>
<textarea v-model="kubeSignReq.CSR" style="width:64em;height:7lh;"></textarea>
</p>
<p>User: <input type="text" v-model="kubeSignReq.User"/></p>
<p>Group: <input type="text" v-model="kubeSignReq.Group"/></p>
2026-01-19 17:57:15 +01:00
<p><button @click="kubeCASign">Sign Kubernetes API access (validity: {{signReqValidity}})</button>
<template v-if="kubeUserCert">
=&gt; <a :href="kubeUserCert" download="kube-cert.pub">Get certificate</a>
</template>
2025-06-29 00:12:12 +02:00
</p>
2023-02-07 21:29:19 +01:00
`
}