mirror of
https://github.com/hashicorp/vault.git
synced 2025-12-10 03:51:10 +01:00
* Allow Managed clusters to see Secrets Sync Overview and Sidebar nav (#26649) * update badge text and allow hvd on secrets sync views * update logic in Secrets Sync overview and cta for hvd. * spacing * rearrange based on pr feedback * fix return on badgeText and cluster nav test * fix landing cta tests * update test to reflect new changes * moved call to feature-flags from application route to the service to match patterns * add managed test coverage on overview component test and remove premium feature so cta message appplies to both managed and non-managed clusters * missed service name and unskip admin test * clean up * fix tests * flags test fix * Rename isManaged and managedNamespaceRoot (#26697) * renames * lowercase HVD to match * missed some * test failure * [Secrets Sync] enable access to Sync clients page for HVD clusters (#26713) * feat: split client counts navbar into separate component * acceptance/clients/counts/overview-test: remove tests now covered by int tests * clients counts route: rename isSecretsSyncActivated to showSecretsSync * sync clients page: show unactivated state unless sync client history or feature is activated * client counts navbar: show sync tab only if client history or is /able to be/ activated * clients overview page: only show sync charts if activated * fix: rename isManaged to isHvd * acceptance/counts/overview-test: add HVD tests * acceptance/counts/overview-test: clean up unused cruft * aceptance/clients/counts/overview-test: ensure we dont get false negatives * chore: move Clients::Error to Clients::Counts::Error * chore: calculate showSecretSync in page component instead of route * chore: add copyright headers * acceptance/clients/counts/overview-test: stub activated flags to fix test * [Secrets sync] update sync test selectors (#26824) * acceptance/clients/counts/overview-test: use imported test selectors * general-selectors: add missing emptyStateSubtitle property * acceptance/clients/counts/sync: nest tests in top level module for easier test runs * Add permissions check to show/hide activate button (#26840) * add permissions check to flags service and consume in overview template * add back missing refresh * fix test failures * add test coverage * clean up * address flaky test * grr * address test failures * add changelog * try to fix test failure only on gh * fix fetch to match previous implementation of feature-flags * fix failing test * update comment --------- Co-authored-by: Noelle Daley <noelledaley@users.noreply.github.com> Co-authored-by: clairebontempo@gmail.com <clairebontempo@gmail.com>
138 lines
4.1 KiB
JavaScript
138 lines
4.1 KiB
JavaScript
/**
|
|
* Copyright (c) HashiCorp, Inc.
|
|
* SPDX-License-Identifier: BUSL-1.1
|
|
*/
|
|
|
|
import { module, test } from 'qunit';
|
|
import { setupTest } from 'ember-qunit';
|
|
import { setupMirage } from 'ember-cli-mirage/test-support';
|
|
|
|
const ACTIVATED_FLAGS_RESPONSE = {
|
|
data: {
|
|
activated: ['secrets-sync'],
|
|
unactivated: [],
|
|
},
|
|
};
|
|
|
|
const FEATURE_FLAGS_RESPONSE = {
|
|
feature_flags: ['VAULT_CLOUD_ADMIN_NAMESPACE'],
|
|
};
|
|
|
|
module('Unit | Service | flags', function (hooks) {
|
|
setupTest(hooks);
|
|
setupMirage(hooks);
|
|
|
|
hooks.beforeEach(function () {
|
|
this.service = this.owner.lookup('service:flags');
|
|
});
|
|
|
|
test('it loads with defaults', function (assert) {
|
|
assert.deepEqual(this.service.featureFlags, [], 'Flags are empty until fetched');
|
|
assert.deepEqual(this.service.activatedFlags, [], 'Activated flags are empty until fetched');
|
|
});
|
|
|
|
module('#fetchActivatedFlags', function (hooks) {
|
|
hooks.beforeEach(function () {
|
|
this.owner.lookup('service:version').type = 'enterprise';
|
|
});
|
|
|
|
test('it returns activated flags', async function (assert) {
|
|
assert.expect(2);
|
|
|
|
this.server.get('sys/activation-flags', () => {
|
|
assert.true(true, 'GET request made to activation-flags endpoint');
|
|
return ACTIVATED_FLAGS_RESPONSE;
|
|
});
|
|
|
|
await this.service.fetchActivatedFlags();
|
|
assert.deepEqual(
|
|
this.service.activatedFlags,
|
|
ACTIVATED_FLAGS_RESPONSE.data.activated,
|
|
'Activated flags are fetched and set'
|
|
);
|
|
});
|
|
|
|
test('it returns an empty array if no flags are activated', async function (assert) {
|
|
this.server.get('sys/activation-flags', () => {
|
|
return {
|
|
data: {
|
|
activated: [],
|
|
unactivated: [],
|
|
},
|
|
};
|
|
});
|
|
|
|
await this.service.fetchActivatedFlags();
|
|
assert.deepEqual(this.service.activatedFlags, [], 'Activated flags are empty');
|
|
});
|
|
|
|
test('it returns an empty array if the cluster is OSS', async function (assert) {
|
|
this.owner.lookup('service:version').type = 'community';
|
|
|
|
await this.service.fetchActivatedFlags();
|
|
assert.deepEqual(this.service.activatedFlags, [], 'Activated flags are empty');
|
|
});
|
|
});
|
|
|
|
module('#fetchFeatureFlags', function (hooks) {
|
|
hooks.beforeEach(function () {
|
|
this.owner.lookup('service:version').type = 'enterprise';
|
|
});
|
|
|
|
test('it returns feature flags', async function (assert) {
|
|
assert.expect(2);
|
|
|
|
this.server.get('sys/internal/ui/feature-flags', () => {
|
|
assert.true(true, 'GET request made to feature-flags endpoint');
|
|
return FEATURE_FLAGS_RESPONSE;
|
|
});
|
|
|
|
await this.service.fetchFeatureFlags();
|
|
|
|
assert.deepEqual(
|
|
this.service.featureFlags,
|
|
FEATURE_FLAGS_RESPONSE.feature_flags,
|
|
'Feature flags are fetched and set'
|
|
);
|
|
});
|
|
});
|
|
|
|
module('#hvdManagedNamespaceRoot', function () {
|
|
test('it returns null when flag is not present', function (assert) {
|
|
assert.strictEqual(this.service.hvdManagedNamespaceRoot, null);
|
|
});
|
|
|
|
test('it returns the namespace root when flag is present', function (assert) {
|
|
this.service.featureFlags = ['VAULT_CLOUD_ADMIN_NAMESPACE'];
|
|
assert.strictEqual(
|
|
this.service.hvdManagedNamespaceRoot,
|
|
'admin',
|
|
'Managed namespace is admin when flag present'
|
|
);
|
|
|
|
this.service.featureFlags = ['SOMETHING_ELSE'];
|
|
assert.strictEqual(
|
|
this.service.hvdManagedNamespaceRoot,
|
|
null,
|
|
'Flags were overwritten and root namespace is null again'
|
|
);
|
|
});
|
|
});
|
|
|
|
module('#secretsSyncActivated', function (hooks) {
|
|
hooks.beforeEach(function () {
|
|
this.owner.lookup('service:version').type = 'enterprise';
|
|
this.service.activatedFlags = ACTIVATED_FLAGS_RESPONSE.data.activated;
|
|
});
|
|
|
|
test('it returns true when secrets sync is activated', function (assert) {
|
|
assert.true(this.service.secretsSyncIsActivated);
|
|
});
|
|
|
|
test('it returns false when secrets sync is not activated', function (assert) {
|
|
this.service.activatedFlags = [];
|
|
assert.false(this.service.secretsSyncIsActivated);
|
|
});
|
|
});
|
|
});
|