-
Notifications
You must be signed in to change notification settings - Fork 149
Implement token management #41
Comments
I'm also looking into this. Should we create a branch where we can collaborate on the code? |
Yea, feel free to do so. Shippable will only push changes merged to master or release tags created. |
I've pushed some code from my implementation of the token management functionality in the token_management branch. Implemented functionalities:
TODO
NotesThere's a few things worth noting and perhaps discussing:
Any feedback is welcome, and thanks again for letting me join this awesome project! |
Awesome @msessa-cotd! Sorry for the delay, just now seeing this. I'll take a look tonight and see try to gather some feedback. |
@msessa-cotd Great work. The new API route is definitely the direction best for this project as it removes unnecessary translations. If/when CORs are supported by Vault, we can most definitely apply #42 and reduce the level of maintenance quite a bit. Though I would think with this kind of setup, it maybe easier for our users as it would apply a more "ready out-of-the-box" implementation--users won't need to change anything on Vault. If HashiCorp allows CORs, this may be something we allow users to choose between, based on their requirements. Otherwise beautiful implementation of the snackbar for accessibility. Is this functionality we can implement globally? Caching-wise, I think defining an app-wide inmemory cache would be a good start, designed to extend further when we begin to support external caching with something like memcached or redis. Please submit a PR for the branch for us to focus on the token specific feature development. |
Actually, I just read that there are still some todos. Let's do that PR when its all ready. |
Completed the token role management part. There's still a number of uncovered endpoints (revoke by token, lookup by token, etc). I think we can close this issue for now, the current code it's pretty functional at this point. |
Currently Vault-UI does not allow authorized users to manage tokens in Vault. Users still need to access Vault through the CLI to generate tokens and such. This feature request will allow users to perform all available token operations such as viewing, creating, modifying and revoking.
The text was updated successfully, but these errors were encountered: