/** * Copyright (c) HashiCorp, Inc. * SPDX-License-Identifier: BUSL-1.1 */ import { settled, click, visit } from '@ember/test-helpers'; import { module, test } from 'qunit'; import { setupApplicationTest } from 'ember-qunit'; import { v4 as uuidv4 } from 'uuid'; import { login, loginMethod, logout } from 'vault/tests/helpers/auth/auth-helpers'; import { mountBackend } from 'vault/tests/helpers/components/mount-backend-form-helpers'; import { runCmd } from 'vault/tests/helpers/commands'; import { GENERAL } from 'vault/tests/helpers/general-selectors'; const tokenWithPolicy = async function (name, policy) { return await runCmd([ `write sys/policies/acl/${name} policy=${btoa(policy)}`, `write -field=client_token auth/token/create policies=${name}`, ]); }; module('Acceptance | cluster', function (hooks) { setupApplicationTest(hooks); hooks.beforeEach(async function () { return login(); }); test('hides nav item if user does not have permission', async function (assert) { const deny_policies_policy = ` path "sys/policies/*" { capabilities = ["deny"] }, `; const userToken = await tokenWithPolicy('hide-policies-nav', deny_policies_policy); await login(userToken); await visit('/vault/access'); assert.dom('[data-test-sidebar-nav-link="Policies"]').doesNotExist(); }); test('it hides mfa setup if user has not entityId (ex: is a root user)', async function (assert) { const username = 'end-user'; const password = 'mypassword'; const path = `cluster-userpass-${uuidv4()}`; await visit('/vault/settings/auth/enable'); await mountBackend('userpass', path); await runCmd([`write auth/${path}/users/end-user password="${password}"`]); await loginMethod({ username, password, path }, { authType: 'userpass', toggleOptions: true }); await click(GENERAL.testButton('user-menu-trigger')); assert.dom('[data-test-user-menu-item="mfa"]').exists(); await login(); await settled(); await click(GENERAL.testButton('user-menu-trigger')); assert.dom('[data-test-user-menu-item="mfa"]').doesNotExist(); }); test('enterprise nav item links to first route that user has access to', async function (assert) { const read_rgp_policy = ` path "sys/policies/rgp" { capabilities = ["read"] }, `; const userToken = await tokenWithPolicy('show-policies-nav', read_rgp_policy); await login(userToken); await visit('/vault/access'); assert.dom('[data-test-sidebar-nav-link="Policies"]').hasAttribute('href', '/ui/vault/policies/rgp'); }); test('shows error banner if resultant-acl check fails', async function (assert) { const login_only = ` path "auth/token/lookup-self" { capabilities = ["read"] }, `; const noDefaultPolicyUser = await runCmd([ `write sys/policies/acl/login-only policy=${btoa(login_only)}`, `write -field=client_token auth/token/create no_default_policy=true policies="login-only"`, ]); assert.dom('[data-test-resultant-acl-banner]').doesNotExist('Resultant ACL banner does not show as root'); await logout(); assert.dom('[data-test-resultant-acl-banner]').doesNotExist('Does not show on login page'); await login(noDefaultPolicyUser); assert.dom('[data-test-resultant-acl-banner]').includesText('Resultant ACL check failed'); }); });