mirror of
https://github.com/hashicorp/vault.git
synced 2025-08-19 13:41:10 +02:00
* UI: Implement overview page for KV v2 (#28162) * build json editor patch form * finish patch component and tests * add tab to each route * and path route * add overview tab to tests * update overview to use updated_time instead of created_time * redirect relevant secret.details to secret.index * compute secretState in component instead of pass as arg * add capabilities service * add error handling to fetchSubkeys adapter request * add overview tabs to test * add subtext to overview card * remaining redirects in secret edit * remove create new version from popup menu * fix breadcrumbs for overview * separate adding capabilities service * add service to kv engine * Revert "separate adding capabilities service" This reverts commit bb70b12ab7dbcde0fbd2d4d81768e5c8b1c420cc. * Revert "add service to kv engine" This reverts commit bfa880535ef7d529d7610936b2c1aae55673d23f. * update navigation test * consistently navigate to secret.index route to be explicit * finish overview navigation tests * add copyright header * update delete tests * fix nav testrs * cleanup secret edit redirects * remove redundant async/awaits * fix create test * edge case tests * secret acceptance tests * final component tests * rename kvSecretDetails external route to kvSecretOverview * add comment * UI: Add patch route and implement Page::Secret::Patch page component (sidebranch) (#28192) * add tab to each route * and path route * add overview tab to tests * update overview to use updated_time instead of created_time * redirect relevant secret.details to secret.index * compute secretState in component instead of pass as arg * add capabilities service * add error handling to fetchSubkeys adapter request * add patch route and put in page component * add patch secret action to subkeys card * fix component name * add patch capability * alphabetize computed capabilities * update links, cleanup selectors * fix more merge conflict stuff * add capabilities test * add models to patch link * add test for patch route * rename external route * add error templates * make notes about enterprise tests, filter one * remove errors, transition (redirect) instead * redirect patch routes * UI: Move fetching secret data to child route (#28198) * remove @secret from metadata details * use metadata model instead of secret in paths page * put delete back into kv/data adapter * grant access in control group test * update metadata route and permissions * remove secret from parent route, only fetch in details route * change more permissions to route perms, add tests * revert overview redirect from list view * wrap model in conditional for perms * remove redundant canReadCustomMetadata check * rename adapter method * handle overview 404 * remove comment * add customMetadata as an arg * update grantAccess in test * make version param easier to follow * VAULT-30494 handle 404 jira * refactor capabilities to return an object * update create tests * add test for default truthy capabilities * remove destroy-all-versions from kv/data adapter * UI: Add enterprise checks (#28215) * add enterprise check for subkey card * add max height and scroll to subkey card * only fetch subkeys if enterprise * remove check in overview * add test * Update ui/tests/integration/components/kv/page/kv-page-overview-test.js * fix test failures (#28222) * add assertion * add optional chaining * create/delete versioned secret in each module * wait for transition * add another waitUntil * UI: Add patch latest version to toolbar (#28223) * add patch latest version action to toolbar * make isPatchAllowed arg all encompassing * no longer need model check * use hash so both promises fire at the same time * add subkeys to policy * Update ui/lib/kv/addon/routes/secret.js * add changelog * small cleanup items! (#28229) * add conditional for enterprise checking tabs * cleanup fetchMultiplePaths method * add test * remove todo comment, ticket created and design wants to hold off * keep transition, update comments * cleanup tests, add index to breadcrumbs * add some test coverage * toggle so value is readable
155 lines
5.1 KiB
JavaScript
155 lines
5.1 KiB
JavaScript
/**
|
|
* Copyright (c) HashiCorp, Inc.
|
|
* SPDX-License-Identifier: BUSL-1.1
|
|
*/
|
|
|
|
import { module, test } from 'qunit';
|
|
import { setupTest } from 'ember-qunit';
|
|
import { SUDO_PATHS, SUDO_PATH_PREFIXES } from 'vault/models/capabilities';
|
|
|
|
import { run } from '@ember/runloop';
|
|
|
|
const CAPABILITIES = {
|
|
canCreate: 'create',
|
|
canRead: 'read',
|
|
canUpdate: 'update',
|
|
canDelete: 'delete',
|
|
canList: 'list',
|
|
canPatch: 'patch',
|
|
};
|
|
|
|
module('Unit | Model | capabilities', function (hooks) {
|
|
setupTest(hooks);
|
|
|
|
test('it exists', function (assert) {
|
|
const model = run(() => this.owner.lookup('service:store').createRecord('capabilities'));
|
|
assert.ok(!!model);
|
|
});
|
|
|
|
test('it computes capabilities', function (assert) {
|
|
const model = run(() =>
|
|
this.owner.lookup('service:store').createRecord('capabilities', {
|
|
path: 'foo',
|
|
capabilities: ['list', 'read'],
|
|
})
|
|
);
|
|
|
|
assert.ok(model.get('canRead'));
|
|
assert.ok(model.get('canList'));
|
|
assert.notOk(model.get('canUpdate'));
|
|
assert.notOk(model.get('canDelete'));
|
|
});
|
|
|
|
for (const capability in CAPABILITIES) {
|
|
test(`it computes capability: ${capability}`, function (assert) {
|
|
const permission = CAPABILITIES[capability];
|
|
const model = run(() =>
|
|
this.owner.lookup('service:store').createRecord('capabilities', {
|
|
path: 'foo',
|
|
capabilities: [permission],
|
|
})
|
|
);
|
|
assert.true(model.get(capability), `${capability} is true`);
|
|
const falsyCapabilities = Object.keys(CAPABILITIES).filter((c) => c !== capability);
|
|
falsyCapabilities.forEach((c) => {
|
|
assert.false(model.get(c), `${c} is false`);
|
|
});
|
|
});
|
|
}
|
|
|
|
test('it allows everything if root is present', function (assert) {
|
|
const model = run(() =>
|
|
this.owner.lookup('service:store').createRecord('capabilities', {
|
|
path: 'foo',
|
|
capabilities: ['root', 'deny', 'read'],
|
|
})
|
|
);
|
|
|
|
Object.keys(CAPABILITIES).forEach((c) => {
|
|
assert.true(model.get(c), `${c} is true`);
|
|
});
|
|
});
|
|
|
|
test('it denies everything if deny is present', function (assert) {
|
|
const model = run(() =>
|
|
this.owner.lookup('service:store').createRecord('capabilities', {
|
|
path: 'foo',
|
|
capabilities: ['sudo', 'deny', 'read'],
|
|
})
|
|
);
|
|
Object.keys(CAPABILITIES).forEach((c) => {
|
|
assert.false(model.get(c), `${c} is false`);
|
|
});
|
|
});
|
|
|
|
test('it requires sudo on sudo paths', function (assert) {
|
|
const model = run(() =>
|
|
this.owner.lookup('service:store').createRecord('capabilities', {
|
|
path: SUDO_PATHS[0],
|
|
capabilities: ['sudo', 'read'],
|
|
})
|
|
);
|
|
assert.ok(model.get('canRead'));
|
|
assert.notOk(model.get('canCreate'), 'sudo requires the capability to be set as well');
|
|
assert.notOk(model.get('canUpdate'));
|
|
assert.notOk(model.get('canDelete'));
|
|
assert.notOk(model.get('canList'));
|
|
});
|
|
|
|
test('it requires sudo on sudo paths prefixes', function (assert) {
|
|
const model = run(() =>
|
|
this.owner.lookup('service:store').createRecord('capabilities', {
|
|
path: SUDO_PATH_PREFIXES[0] + '/foo',
|
|
capabilities: ['sudo', 'read'],
|
|
})
|
|
);
|
|
assert.ok(model.get('canRead'));
|
|
assert.notOk(model.get('canCreate'), 'sudo requires the capability to be set as well');
|
|
assert.notOk(model.get('canUpdate'));
|
|
assert.notOk(model.get('canDelete'));
|
|
assert.notOk(model.get('canList'));
|
|
});
|
|
|
|
test('it does not require sudo on sys/leases/revoke if update capability is present and path is not fully a sudo prefix', function (assert) {
|
|
const model = run(() =>
|
|
this.owner.lookup('service:store').createRecord('capabilities', {
|
|
path: 'sys/leases/revoke',
|
|
capabilities: ['update', 'read'],
|
|
})
|
|
);
|
|
assert.ok(model.get('canRead'));
|
|
assert.notOk(model.get('canCreate'), 'sudo requires the capability to be set as well');
|
|
assert.ok(model.get('canUpdate'), 'should not require sudo if it has update');
|
|
assert.notOk(model.get('canDelete'));
|
|
assert.notOk(model.get('canList'));
|
|
});
|
|
|
|
test('it requires sudo on prefix path even if capability is present', function (assert) {
|
|
const model = run(() =>
|
|
this.owner.lookup('service:store').createRecord('capabilities', {
|
|
path: SUDO_PATH_PREFIXES[0] + '/aws',
|
|
capabilities: ['update', 'read'],
|
|
})
|
|
);
|
|
assert.notOk(model.get('canRead'));
|
|
assert.notOk(model.get('canCreate'));
|
|
assert.notOk(model.get('canUpdate'), 'should still require sudo');
|
|
assert.notOk(model.get('canDelete'));
|
|
assert.notOk(model.get('canList'));
|
|
});
|
|
|
|
test('it does not require sudo on prefix path if both update and sudo capabilities are present', function (assert) {
|
|
const model = run(() =>
|
|
this.owner.lookup('service:store').createRecord('capabilities', {
|
|
path: SUDO_PATH_PREFIXES[0] + '/aws',
|
|
capabilities: ['sudo', 'update', 'read'],
|
|
})
|
|
);
|
|
assert.ok(model.get('canRead'));
|
|
assert.notOk(model.get('canCreate'));
|
|
assert.ok(model.get('canUpdate'), 'should not require sudo');
|
|
assert.notOk(model.get('canDelete'));
|
|
assert.notOk(model.get('canList'));
|
|
});
|
|
});
|