Jim Wright 188e0c727d
[UI] Mount vault-reporting components (#30261)
* Reporting generated files

* Update vault reporting addon (#30264)

* Update yarn.lock based on main

* Update vault-reporting addon

* Mount reporting components

* Rename route and page component based on review feedback

Add docs to component

* Add page style to import vault-reporting style

* Add header to new page style
2025-04-23 10:41:16 -07:00

265 lines
9.3 KiB
JavaScript

/**
* Copyright (c) HashiCorp, Inc.
* SPDX-License-Identifier: BUSL-1.1
*/
import { module, test } from 'qunit';
import { setupRenderingTest } from 'ember-qunit';
import { render } from '@ember/test-helpers';
import hbs from 'htmlbars-inline-precompile';
import { stubFeaturesAndPermissions } from 'vault/tests/helpers/components/sidebar-nav';
import { setRunOptions } from 'ember-a11y-testing/test-support';
import { GENERAL } from 'vault/tests/helpers/general-selectors';
const renderComponent = () => {
return render(hbs`
<Sidebar::Frame @isVisible={{true}}>
<Sidebar::Nav::Cluster />
</Sidebar::Frame>
`);
};
module('Integration | Component | sidebar-nav-cluster', function (hooks) {
setupRenderingTest(hooks);
hooks.beforeEach(function () {
this.flags = this.owner.lookup('service:flags');
setRunOptions({
rules: {
// This is an issue with Hds::SideNav::Header::HomeLink
'aria-prohibited-attr': { enabled: false },
// TODO: fix use Dropdown on user-menu
'nested-interactive': { enabled: false },
},
});
});
test('it should render nav headings', async function (assert) {
const headings = ['Vault', 'Monitoring', 'Settings'];
stubFeaturesAndPermissions(this.owner, true, true);
await renderComponent();
assert
.dom('[data-test-sidebar-nav-heading]')
.exists({ count: headings.length }, 'Correct number of headings render');
headings.forEach((heading) => {
assert
.dom(`[data-test-sidebar-nav-heading="${heading}"]`)
.hasText(heading, `${heading} heading renders`);
});
});
test('it should hide links and headings user does not have access too', async function (assert) {
await renderComponent();
assert
.dom('[data-test-sidebar-nav-link]')
.exists({ count: 2 }, 'Nav links are hidden other than secrets and dashboard');
assert
.dom('[data-test-sidebar-nav-heading]')
.exists({ count: 1 }, 'Headings are hidden other than Vault');
});
test('it should render nav links', async function (assert) {
const links = [
'Dashboard',
'Secrets Engines',
'Secrets Sync',
'Access',
'Policies',
'Tools',
'Replication',
'Raft Storage',
'Client Count',
'Vault Usage',
'License',
'Seal Vault',
'Custom Messages',
];
stubFeaturesAndPermissions(this.owner, true, true);
await renderComponent();
assert
.dom('[data-test-sidebar-nav-link]')
.exists({ count: links.length }, 'Correct number of links render');
links.forEach((link) => {
assert.dom(`[data-test-sidebar-nav-link="${link}"]`).hasText(link, `${link} link renders`);
});
});
test('it should hide enterprise related links in child namespace', async function (assert) {
const links = [
'Disaster Recovery',
'Performance',
'Replication',
'Raft Storage',
'License',
'Seal Vault',
];
this.owner.lookup('service:namespace').set('path', 'foo');
const stubs = stubFeaturesAndPermissions(this.owner, true, true);
stubs.hasNavPermission.callsFake((route) => route !== 'clients');
await renderComponent();
assert
.dom('[data-test-sidebar-nav-heading="Monitoring"]')
.doesNotExist(
'Monitoring heading is hidden in child namespace when user does not have access to Client Count'
);
links.forEach((link) => {
assert
.dom(`[data-test-sidebar-nav-link="${link}"]`)
.doesNotExist(`${link} is hidden in child namespace`);
});
});
test('it should hide client counts link in chroot namespace', async function (assert) {
this.owner.lookup('service:permissions').setPaths({
data: {
chroot_namespace: 'admin',
root: true,
},
});
this.owner.lookup('service:currentCluster').setCluster({
id: 'foo',
anyReplicationEnabled: true,
usingRaft: true,
hasChrootNamespace: true,
});
const links = ['Client Counts', 'Replication', 'Raft Storage', 'License', 'Seal Vault'];
await renderComponent();
assert
.dom('[data-test-sidebar-nav-heading="Monitoring"]')
.doesNotExist('Monitoring heading is hidden in chroot namespace');
links.forEach((link) => {
assert
.dom(`[data-test-sidebar-nav-link="${link}"]`)
.doesNotExist(`${link} is hidden in chroot namespace`);
});
});
test('it should render badge for promotional links on managed clusters', async function (assert) {
this.flags.featureFlags = ['VAULT_CLOUD_ADMIN_NAMESPACE'];
const promotionalLinks = ['Secrets Sync'];
stubFeaturesAndPermissions(this.owner, true, true);
await renderComponent();
promotionalLinks.forEach((link) => {
assert
.dom(`[data-test-sidebar-nav-link="${link}"]`)
.hasText(`${link} Plus`, `${link} link renders Plus badge`);
});
});
// Secrets Sync side nav link has multiple combinations of three variables to test:
// 1. cluster type: enterprise (on and off license), HVD managed or community
// 2. activation status: activated or not
// 3. permissions: policy access to sys/sync routes or not
test('community: it hides Secrets Sync nav link', async function (assert) {
stubFeaturesAndPermissions(this.owner, false, false);
await renderComponent();
assert.dom(GENERAL.navLink('Secrets Sync')).doesNotExist();
});
test('ent but feature is not on license: it hides Secrets Sync nav link', async function (assert) {
stubFeaturesAndPermissions(this.owner, true, false, []);
await renderComponent();
assert.dom(GENERAL.navLink('Secrets Sync')).doesNotExist();
});
test('ent (on license), activated and permissions: it shows Secrets Sync nav link', async function (assert) {
stubFeaturesAndPermissions(this.owner, true, false, ['Secrets Sync']);
this.flags.activatedFlags = ['secrets-sync'];
await renderComponent();
assert.dom(GENERAL.navLink('Secrets Sync')).exists();
});
test('ent (on license), activated and no permissions: it hides Secrets Sync nav link', async function (assert) {
stubFeaturesAndPermissions(this.owner, true, false, ['Secrets Sync'], false);
this.flags.activatedFlags = ['secrets-sync'];
await renderComponent();
assert.dom(GENERAL.navLink('Secrets Sync')).doesNotExist();
});
test('ent (on license), not activated and permissions: it shows Secrets Sync nav link', async function (assert) {
stubFeaturesAndPermissions(this.owner, true, false, ['Secrets Sync']);
this.flags.activatedFlags = [];
await renderComponent();
assert.dom(GENERAL.navLink('Secrets Sync')).exists();
});
test('ent (on license), not activated and no permissions: it shows Secrets Sync nav link', async function (assert) {
stubFeaturesAndPermissions(this.owner, true, false, ['Secrets Sync'], false);
this.flags.activatedFlags = [];
await renderComponent();
assert.dom(GENERAL.navLink('Secrets Sync')).exists();
});
test('hvd managed: it shows Secrets Sync nav link regardless of activation status or permissions', async function (assert) {
stubFeaturesAndPermissions(this.owner, true, false, [], false);
this.flags.featureFlags = ['VAULT_CLOUD_ADMIN_NAMESPACE'];
this.flags.activatedFlags = [];
await renderComponent();
assert.dom(GENERAL.navLink('Secrets Sync')).exists();
});
test('it shows Vault Usage when user is enterprise and in root namespace', async function (assert) {
stubFeaturesAndPermissions(this.owner, true);
await renderComponent();
assert.dom(GENERAL.navLink('Vault Usage')).exists();
});
test('it does NOT show Vault Usage when user is user is on CE || OSS || community', async function (assert) {
stubFeaturesAndPermissions(this.owner, false);
await renderComponent();
assert.dom(GENERAL.navLink('Vault Usage')).doesNotExist();
});
test('it does NOT show Vault Usage when user is enterprise but not in root namespace', async function (assert) {
stubFeaturesAndPermissions(this.owner, true);
this.owner.lookup('service:namespace').set('path', 'foo');
await renderComponent();
assert.dom(GENERAL.navLink('Vault Usage')).doesNotExist();
});
test('it does NOT show Vault Usage when user lacks the necessary permission', async function (assert) {
// no permissions
stubFeaturesAndPermissions(this.owner, true, false, [], false);
await renderComponent();
assert.dom(GENERAL.navLink('Vault Usage')).doesNotExist();
});
test('it does NOT Vault Usage if the user has the necessary permission but user is on CE || OSS || community', async function (assert) {
// no permissions
const stubs = stubFeaturesAndPermissions(this.owner, false, false, [], false);
// allow the route
stubs.hasNavPermission.callsFake((route) => route === 'monitoring');
await renderComponent();
assert.dom(GENERAL.navLink('Vault Usage')).doesNotExist();
});
test('it shows Vault Usage when user is in HVD admin namespace', async function (assert) {
const stubs = stubFeaturesAndPermissions(this.owner, true, false, [], false);
stubs.hasNavPermission.callsFake((route) => route === 'monitoring');
this.flags.featureFlags = ['VAULT_CLOUD_ADMIN_NAMESPACE'];
const namespace = this.owner.lookup('service:namespace');
namespace.setNamespace('admin');
await renderComponent();
assert.dom(GENERAL.navLink('Vault Usage')).exists();
});
});