mirror of
https://github.com/hashicorp/vault.git
synced 2025-08-15 19:17:02 +02:00
* Ember Engine for Kubernetes Secrets Engine (#17881) * adds in-repo ember engine for kubernetes secrets engine * updates kubernetes engine class name * Kubernetes route plumbing (#17895) * kubernetes route plumbing * adds kubernetes role index route with redirect to details * adds kubernetes as mountable and supported secrets engine (#17891) * adds models, adapters and serializers for kubernetes secrets engine (#18010) * adds mirage factories and handlers for kubernetes (#17943) * Kubernetes Secrets Engine Configuration (#18093) * moves RadioCard component to core addon * adds kubernetes configuration view * fixes tests using RadioCard after label for and input id changes * adds confirm modal when editing kubernetes config * addresses review comments * Kubernetes Configuration View (#18147) * removes configuration edit and index routes * adds kubernetes configuration view * Kubernetes Roles List (#18211) * removes configuration edit and index routes * adds kubernetes configuration view * adds kubernetes secrets engine roles list view * updates role details disabled state to explicitly check for false * VAULT-9863 Kubernetes Overview Page (#18232) * Add overview page view * Add overview page tests * Address feedback to update tests and minor changes * Use template built in helper for conditionally showing num roles * Set up roleOptions in constructor * Set up models in tests and fix minor bug * Kubernetes Secrets Engine Create/Edit Views (#18271) * moves kv-object-editor to core addon * moves json-editor to core addon * adds kubernetes secrets engine create/edit views * updates kubernetes/role adapter test * addresses feedback * fixes issue with overview route showing 404 page (#18303) * Kubernetes Role Details View (#18294) * moves format-duration helper to core addon * adds kubernetes secrets engine role details view * adds tests for role details page component * adds capabilities checks for toolbar actions * fixes list link for secrets in an ember engine (#18313) * Manual Testing: Bug Fixes and Improvements (#18333) * updates overview, configuration and roles components to pass args for individual model properties * bug fixes and improvements * adds top level index route to redirect to overview * VAULT-9877 Kubernetes Credential Generate/View Pages (#18270) * Add credentials route with create and view components * Update mirage response for creds and add ajax post call for creds in adapter * Move credentials create and view into one component * Add test classes * Remove files and update backend property name * Code cleanup and add tests * Put test helper in helper function * Add one more test! * Add code optimizations * Fix model in route and add form * Add onSubmit to form and preventDefault * Fix tests * Update mock data for test to be strong rather than record * adds acceptance tests for kubernetes secrets engine roles (#18360) * VAULT-11862 Kubernetes acceptance tests (#18431) * VAULT-12185 overview acceptance tests * VAULT-12298 credentials acceptance tests * VAULT-12186 configuration acceptance tests * VAULT-12127 Refactor breadcrumbs to use breadcrumb component (#18489) * VAULT-12127 Refactor breadcrumbs to use Page::Breadcrumbs component * Fix failing tests by adding breadcrumbs properties * VAULT-12166 add jsdocs to kubernetes secrets engine pages (#18509) * fixes incorrect merge conflict resolution * updates kubernetes check env vars endpoint (#18588) * hides kubernetes ca cert field if not defined in configuration view * fixes loading substate handling issue (#18592) * adds changelog entry Co-authored-by: Kianna <30884335+kiannaquach@users.noreply.github.com>
96 lines
3.7 KiB
JavaScript
96 lines
3.7 KiB
JavaScript
import { module, test } from 'qunit';
|
||
import { setupRenderingTest } from 'ember-qunit';
|
||
import { setupEngine } from 'ember-engines/test-support';
|
||
import { setupMirage } from 'ember-cli-mirage/test-support';
|
||
import { render } from '@ember/test-helpers';
|
||
import hbs from 'htmlbars-inline-precompile';
|
||
|
||
module('Integration | Component | kubernetes | Page::Configuration', function (hooks) {
|
||
setupRenderingTest(hooks);
|
||
setupEngine(hooks, 'kubernetes');
|
||
setupMirage(hooks);
|
||
|
||
hooks.beforeEach(function () {
|
||
this.store = this.owner.lookup('service:store');
|
||
this.store.pushPayload('secret-engine', {
|
||
modelName: 'secret-engine',
|
||
data: {
|
||
accessor: 'kubernetes_f3400dee',
|
||
path: 'kubernetes-test/',
|
||
type: 'kubernetes',
|
||
},
|
||
});
|
||
this.backend = this.store.peekRecord('secret-engine', 'kubernetes-test');
|
||
this.config = null;
|
||
|
||
this.setConfig = (disableLocal) => {
|
||
const data = this.server.create(
|
||
'kubernetes-config',
|
||
!disableLocal ? { disable_local_ca_jwt: false } : null
|
||
);
|
||
this.store.pushPayload('kubernetes/config', {
|
||
modelName: 'kubernetes/config',
|
||
backend: 'kubernetes-test',
|
||
...data,
|
||
});
|
||
this.config = this.store.peekRecord('kubernetes/config', 'kubernetes-test');
|
||
};
|
||
|
||
this.breadcrumbs = [
|
||
{ label: 'secrets', route: 'secrets', linkExternal: true },
|
||
{ label: this.backend.id },
|
||
];
|
||
|
||
this.renderComponent = () => {
|
||
return render(
|
||
hbs`<Page::Configuration @backend={{this.backend}} @config={{this.config}} @breadcrumbs={{this.breadcrumbs}} />`,
|
||
{
|
||
owner: this.engine,
|
||
}
|
||
);
|
||
};
|
||
});
|
||
|
||
test('it should render tab page header and config cta', async function (assert) {
|
||
await this.renderComponent();
|
||
assert.dom('.title svg').hasClass('flight-icon-kubernetes', 'Kubernetes icon renders in title');
|
||
assert.dom('.title').hasText('kubernetes-test', 'Mount path renders in title');
|
||
assert
|
||
.dom('[data-test-toolbar-config-action]')
|
||
.hasText('Configure Kubernetes', 'Toolbar action has correct text');
|
||
assert.dom('[data-test-config-cta]').exists('Config cta renders');
|
||
});
|
||
|
||
test('it should render message for inferred configuration', async function (assert) {
|
||
this.setConfig(false);
|
||
await this.renderComponent();
|
||
assert
|
||
.dom('[data-test-inferred-message] svg')
|
||
.hasClass('flight-icon-check-circle-fill', 'Inferred message icon renders');
|
||
const message =
|
||
'These details were successfully inferred from Vault’s kubernetes environment and were not explicity set in this config.';
|
||
assert.dom('[data-test-inferred-message]').hasText(message, 'Inferred message renders');
|
||
assert
|
||
.dom('[data-test-toolbar-config-action]')
|
||
.hasText('Edit configuration', 'Toolbar action has correct text');
|
||
});
|
||
|
||
test('it should render host and certificate info', async function (assert) {
|
||
this.setConfig(true);
|
||
await this.renderComponent();
|
||
assert.dom('[data-test-row-label="Kubernetes host"]').exists('Kubernetes host label renders');
|
||
assert
|
||
.dom('[data-test-row-value="Kubernetes host"]')
|
||
.hasText(this.config.kubernetesHost, 'Kubernetes host value renders');
|
||
assert.dom('[data-test-row-label="Certificate"]').exists('Certificate label renders');
|
||
assert
|
||
.dom('[data-test-certificate-icon]')
|
||
.hasClass('flight-icon-certificate', 'Certificate card icon renders');
|
||
assert.dom('[data-test-certificate-label]').hasText('PEM Format', 'Certificate card label renders');
|
||
assert
|
||
.dom('[data-test-certificate-value]')
|
||
.hasText(this.config.kubernetesCaCert, 'Certificate card value renders');
|
||
assert.dom('[data-test-certificate-copy]').exists('Certificate copy button renders');
|
||
});
|
||
});
|