feat(secrets): add ability to fetch and view all secrets across projects and groups, include scopeName, and improve frontend merging/filtering
This commit is contained in:
@@ -304,6 +304,27 @@ export const fetchSecretsAction = dataStatePart.createAction<{
|
||||
}
|
||||
});
|
||||
|
||||
export const fetchAllSecretsAction = dataStatePart.createAction<{
|
||||
connectionId: string;
|
||||
scope: 'project' | 'group';
|
||||
}>(async (statePartArg, dataArg) => {
|
||||
const context = getActionContext();
|
||||
try {
|
||||
const typedRequest = new plugins.domtools.plugins.typedrequest.TypedRequest<
|
||||
interfaces.requests.IReq_GetAllSecrets
|
||||
>('/typedrequest', 'getAllSecrets');
|
||||
const response = await typedRequest.fire({
|
||||
identity: context.identity!,
|
||||
connectionId: dataArg.connectionId,
|
||||
scope: dataArg.scope,
|
||||
});
|
||||
return { ...statePartArg.getState(), secrets: response.secrets };
|
||||
} catch (err) {
|
||||
console.error('Failed to fetch all secrets:', err);
|
||||
return statePartArg.getState();
|
||||
}
|
||||
});
|
||||
|
||||
export const createSecretAction = dataStatePart.createAction<{
|
||||
connectionId: string;
|
||||
scope: 'project' | 'group';
|
||||
@@ -320,7 +341,7 @@ export const createSecretAction = dataStatePart.createAction<{
|
||||
identity: context.identity!,
|
||||
...dataArg,
|
||||
});
|
||||
// Re-fetch secrets
|
||||
// Re-fetch only the affected entity's secrets and merge
|
||||
const listReq = new plugins.domtools.plugins.typedrequest.TypedRequest<
|
||||
interfaces.requests.IReq_GetSecrets
|
||||
>('/typedrequest', 'getSecrets');
|
||||
@@ -330,7 +351,11 @@ export const createSecretAction = dataStatePart.createAction<{
|
||||
scope: dataArg.scope,
|
||||
scopeId: dataArg.scopeId,
|
||||
});
|
||||
return { ...statePartArg.getState(), secrets: listResp.secrets };
|
||||
const state = statePartArg.getState();
|
||||
const otherSecrets = state.secrets.filter(
|
||||
(s) => !(s.scopeId === dataArg.scopeId && s.scope === dataArg.scope),
|
||||
);
|
||||
return { ...state, secrets: [...otherSecrets, ...listResp.secrets] };
|
||||
} catch (err) {
|
||||
console.error('Failed to create secret:', err);
|
||||
return statePartArg.getState();
|
||||
@@ -353,7 +378,7 @@ export const updateSecretAction = dataStatePart.createAction<{
|
||||
identity: context.identity!,
|
||||
...dataArg,
|
||||
});
|
||||
// Re-fetch
|
||||
// Re-fetch only the affected entity's secrets and merge
|
||||
const listReq = new plugins.domtools.plugins.typedrequest.TypedRequest<
|
||||
interfaces.requests.IReq_GetSecrets
|
||||
>('/typedrequest', 'getSecrets');
|
||||
@@ -363,7 +388,11 @@ export const updateSecretAction = dataStatePart.createAction<{
|
||||
scope: dataArg.scope,
|
||||
scopeId: dataArg.scopeId,
|
||||
});
|
||||
return { ...statePartArg.getState(), secrets: listResp.secrets };
|
||||
const state = statePartArg.getState();
|
||||
const otherSecrets = state.secrets.filter(
|
||||
(s) => !(s.scopeId === dataArg.scopeId && s.scope === dataArg.scope),
|
||||
);
|
||||
return { ...state, secrets: [...otherSecrets, ...listResp.secrets] };
|
||||
} catch (err) {
|
||||
console.error('Failed to update secret:', err);
|
||||
return statePartArg.getState();
|
||||
@@ -388,7 +417,9 @@ export const deleteSecretAction = dataStatePart.createAction<{
|
||||
const state = statePartArg.getState();
|
||||
return {
|
||||
...state,
|
||||
secrets: state.secrets.filter((s) => s.key !== dataArg.key),
|
||||
secrets: state.secrets.filter(
|
||||
(s) => !(s.key === dataArg.key && s.scopeId === dataArg.scopeId && s.scope === dataArg.scope),
|
||||
),
|
||||
};
|
||||
} catch (err) {
|
||||
console.error('Failed to delete secret:', err);
|
||||
|
||||
Reference in New Issue
Block a user