mirror of
https://github.com/hashicorp/vault.git
synced 2025-08-18 21:21:06 +02:00
* UI: Implement overview page for KV v2 (#28162) * build json editor patch form * finish patch component and tests * add tab to each route * and path route * add overview tab to tests * update overview to use updated_time instead of created_time * redirect relevant secret.details to secret.index * compute secretState in component instead of pass as arg * add capabilities service * add error handling to fetchSubkeys adapter request * add overview tabs to test * add subtext to overview card * remaining redirects in secret edit * remove create new version from popup menu * fix breadcrumbs for overview * separate adding capabilities service * add service to kv engine * Revert "separate adding capabilities service" This reverts commit bb70b12ab7dbcde0fbd2d4d81768e5c8b1c420cc. * Revert "add service to kv engine" This reverts commit bfa880535ef7d529d7610936b2c1aae55673d23f. * update navigation test * consistently navigate to secret.index route to be explicit * finish overview navigation tests * add copyright header * update delete tests * fix nav testrs * cleanup secret edit redirects * remove redundant async/awaits * fix create test * edge case tests * secret acceptance tests * final component tests * rename kvSecretDetails external route to kvSecretOverview * add comment * UI: Add patch route and implement Page::Secret::Patch page component (sidebranch) (#28192) * add tab to each route * and path route * add overview tab to tests * update overview to use updated_time instead of created_time * redirect relevant secret.details to secret.index * compute secretState in component instead of pass as arg * add capabilities service * add error handling to fetchSubkeys adapter request * add patch route and put in page component * add patch secret action to subkeys card * fix component name * add patch capability * alphabetize computed capabilities * update links, cleanup selectors * fix more merge conflict stuff * add capabilities test * add models to patch link * add test for patch route * rename external route * add error templates * make notes about enterprise tests, filter one * remove errors, transition (redirect) instead * redirect patch routes * UI: Move fetching secret data to child route (#28198) * remove @secret from metadata details * use metadata model instead of secret in paths page * put delete back into kv/data adapter * grant access in control group test * update metadata route and permissions * remove secret from parent route, only fetch in details route * change more permissions to route perms, add tests * revert overview redirect from list view * wrap model in conditional for perms * remove redundant canReadCustomMetadata check * rename adapter method * handle overview 404 * remove comment * add customMetadata as an arg * update grantAccess in test * make version param easier to follow * VAULT-30494 handle 404 jira * refactor capabilities to return an object * update create tests * add test for default truthy capabilities * remove destroy-all-versions from kv/data adapter * UI: Add enterprise checks (#28215) * add enterprise check for subkey card * add max height and scroll to subkey card * only fetch subkeys if enterprise * remove check in overview * add test * Update ui/tests/integration/components/kv/page/kv-page-overview-test.js * fix test failures (#28222) * add assertion * add optional chaining * create/delete versioned secret in each module * wait for transition * add another waitUntil * UI: Add patch latest version to toolbar (#28223) * add patch latest version action to toolbar * make isPatchAllowed arg all encompassing * no longer need model check * use hash so both promises fire at the same time * add subkeys to policy * Update ui/lib/kv/addon/routes/secret.js * add changelog * small cleanup items! (#28229) * add conditional for enterprise checking tabs * cleanup fetchMultiplePaths method * add test * remove todo comment, ticket created and design wants to hold off * keep transition, update comments * cleanup tests, add index to breadcrumbs * add some test coverage * toggle so value is readable
104 lines
3.3 KiB
JavaScript
104 lines
3.3 KiB
JavaScript
/**
|
|
* Copyright (c) HashiCorp, Inc.
|
|
* SPDX-License-Identifier: BUSL-1.1
|
|
*/
|
|
|
|
import { module, test } from 'qunit';
|
|
import { breadcrumbsForSecret, pathIsDirectory, pathIsFromDirectory } from 'kv/utils/kv-breadcrumbs';
|
|
|
|
module('Unit | Utility | kv-breadcrumbs', function () {
|
|
test('pathIsDirectory works', function (assert) {
|
|
assert.expect(5);
|
|
[
|
|
{ path: 'some/path', expect: false },
|
|
{ path: 'some/path/', expect: true },
|
|
{ path: 'some', expect: false },
|
|
{ path: 'some/', expect: true },
|
|
{ path: '/some', expect: false },
|
|
].forEach((scenario) => {
|
|
assert.strictEqual(
|
|
pathIsDirectory(scenario.path),
|
|
scenario.expect,
|
|
`correct for path ${scenario.path}`
|
|
);
|
|
});
|
|
});
|
|
test('pathIsFromDirectory works', function (assert) {
|
|
assert.expect(5);
|
|
[
|
|
{ path: 'some/path', expect: true },
|
|
{ path: 'some/path/', expect: true },
|
|
{ path: 'some', expect: false },
|
|
{ path: 'some/', expect: true },
|
|
{ path: '/some', expect: true },
|
|
].forEach((scenario) => {
|
|
assert.strictEqual(
|
|
pathIsFromDirectory(scenario.path),
|
|
scenario.expect,
|
|
`correct for path ${scenario.path}`
|
|
);
|
|
});
|
|
});
|
|
|
|
test('breadcrumbsForSecret works', function (assert) {
|
|
let results = breadcrumbsForSecret('kv-mount', 'beep/bop/boop');
|
|
assert.deepEqual(
|
|
results,
|
|
[
|
|
{ label: 'beep', route: 'list-directory', models: ['kv-mount', 'beep/'] },
|
|
{ label: 'bop', route: 'list-directory', models: ['kv-mount', 'beep/bop/'] },
|
|
{ label: 'boop', route: 'secret.index', models: ['kv-mount', 'beep/bop/boop'] },
|
|
],
|
|
'correct when full nested path to secret'
|
|
);
|
|
|
|
results = breadcrumbsForSecret('kv-mount', 'beep/bop/boop', true);
|
|
assert.deepEqual(
|
|
results,
|
|
[
|
|
{ label: 'beep', route: 'list-directory', models: ['kv-mount', 'beep/'] },
|
|
{ label: 'bop', route: 'list-directory', models: ['kv-mount', 'beep/bop/'] },
|
|
{ label: 'boop' },
|
|
],
|
|
'correct when full nested path to secret and last item current'
|
|
);
|
|
|
|
results = breadcrumbsForSecret('kv-mount', 'beep');
|
|
assert.deepEqual(
|
|
results,
|
|
[{ label: 'beep', route: 'secret.index', models: ['kv-mount', 'beep'] }],
|
|
'correct when non-nested secret path'
|
|
);
|
|
|
|
results = breadcrumbsForSecret('kv-mount', 'beep', true);
|
|
assert.deepEqual(
|
|
results,
|
|
[{ label: 'beep' }],
|
|
'correct when non-nested secret path and last item current'
|
|
);
|
|
|
|
results = breadcrumbsForSecret('kv-mount', 'beep/bop/');
|
|
assert.deepEqual(
|
|
results,
|
|
[
|
|
{ label: 'beep', route: 'list-directory', models: ['kv-mount', 'beep/'] },
|
|
{ label: 'bop', route: 'list-directory', models: ['kv-mount', 'beep/bop/'] },
|
|
],
|
|
'correct when path is directory'
|
|
);
|
|
|
|
results = breadcrumbsForSecret('kv-mount', 'beep/bop/', true);
|
|
assert.deepEqual(
|
|
results,
|
|
[{ label: 'beep', route: 'list-directory', models: ['kv-mount', 'beep/'] }, { label: 'bop' }],
|
|
'correct when path is directory and last item current'
|
|
);
|
|
|
|
results = breadcrumbsForSecret();
|
|
assert.deepEqual(results, [], 'fails gracefully if backend is undefined');
|
|
|
|
results = breadcrumbsForSecret('backend-only');
|
|
assert.deepEqual(results, [], 'fails gracefully if secretPath is undefined');
|
|
});
|
|
});
|