mirror of
https://github.com/hashicorp/vault.git
synced 2025-08-15 11:07:00 +02:00
* Ember Engine for Kubernetes Secrets Engine (#17881) * adds in-repo ember engine for kubernetes secrets engine * updates kubernetes engine class name * Kubernetes route plumbing (#17895) * kubernetes route plumbing * adds kubernetes role index route with redirect to details * adds kubernetes as mountable and supported secrets engine (#17891) * adds models, adapters and serializers for kubernetes secrets engine (#18010) * adds mirage factories and handlers for kubernetes (#17943) * Kubernetes Secrets Engine Configuration (#18093) * moves RadioCard component to core addon * adds kubernetes configuration view * fixes tests using RadioCard after label for and input id changes * adds confirm modal when editing kubernetes config * addresses review comments * Kubernetes Configuration View (#18147) * removes configuration edit and index routes * adds kubernetes configuration view * Kubernetes Roles List (#18211) * removes configuration edit and index routes * adds kubernetes configuration view * adds kubernetes secrets engine roles list view * updates role details disabled state to explicitly check for false * VAULT-9863 Kubernetes Overview Page (#18232) * Add overview page view * Add overview page tests * Address feedback to update tests and minor changes * Use template built in helper for conditionally showing num roles * Set up roleOptions in constructor * Set up models in tests and fix minor bug * Kubernetes Secrets Engine Create/Edit Views (#18271) * moves kv-object-editor to core addon * moves json-editor to core addon * adds kubernetes secrets engine create/edit views * updates kubernetes/role adapter test * addresses feedback * fixes issue with overview route showing 404 page (#18303) * Kubernetes Role Details View (#18294) * moves format-duration helper to core addon * adds kubernetes secrets engine role details view * adds tests for role details page component * adds capabilities checks for toolbar actions * fixes list link for secrets in an ember engine (#18313) * Manual Testing: Bug Fixes and Improvements (#18333) * updates overview, configuration and roles components to pass args for individual model properties * bug fixes and improvements * adds top level index route to redirect to overview * VAULT-9877 Kubernetes Credential Generate/View Pages (#18270) * Add credentials route with create and view components * Update mirage response for creds and add ajax post call for creds in adapter * Move credentials create and view into one component * Add test classes * Remove files and update backend property name * Code cleanup and add tests * Put test helper in helper function * Add one more test! * Add code optimizations * Fix model in route and add form * Add onSubmit to form and preventDefault * Fix tests * Update mock data for test to be strong rather than record * adds acceptance tests for kubernetes secrets engine roles (#18360) * VAULT-11862 Kubernetes acceptance tests (#18431) * VAULT-12185 overview acceptance tests * VAULT-12298 credentials acceptance tests * VAULT-12186 configuration acceptance tests * VAULT-12127 Refactor breadcrumbs to use breadcrumb component (#18489) * VAULT-12127 Refactor breadcrumbs to use Page::Breadcrumbs component * Fix failing tests by adding breadcrumbs properties * VAULT-12166 add jsdocs to kubernetes secrets engine pages (#18509) * fixes incorrect merge conflict resolution * updates kubernetes check env vars endpoint (#18588) * hides kubernetes ca cert field if not defined in configuration view * fixes loading substate handling issue (#18592) * adds changelog entry Co-authored-by: Kianna <30884335+kiannaquach@users.noreply.github.com>
134 lines
5.5 KiB
JavaScript
134 lines
5.5 KiB
JavaScript
import { module, test } from 'qunit';
|
|
import { setupRenderingTest } from 'ember-qunit';
|
|
import { setupEngine } from 'ember-engines/test-support';
|
|
import { setupMirage } from 'ember-cli-mirage/test-support';
|
|
import { render, click, fillIn } from '@ember/test-helpers';
|
|
import { Response } from 'miragejs';
|
|
import hbs from 'htmlbars-inline-precompile';
|
|
|
|
module('Integration | Component | kubernetes | Page::Credentials', function (hooks) {
|
|
setupRenderingTest(hooks);
|
|
setupEngine(hooks, 'kubernetes');
|
|
setupMirage(hooks);
|
|
|
|
hooks.beforeEach(function () {
|
|
this.backend = 'kubernetes-test';
|
|
this.roleName = 'role-0';
|
|
|
|
this.getCreateCredentialsError = (roleName, errorType = null) => {
|
|
let errors;
|
|
|
|
if (errorType === 'noNamespace') {
|
|
errors = ["'kubernetes_namespace' is required"];
|
|
} else {
|
|
errors = [`role '${roleName}' does not exist`];
|
|
}
|
|
|
|
this.server.post(`/kubernetes-test/creds/${roleName}`, () => {
|
|
return new Response(400, {}, { errors });
|
|
});
|
|
};
|
|
this.breadcrumbs = [
|
|
{ label: this.backend, route: 'overview' },
|
|
{ label: 'roles', route: 'roles' },
|
|
{ label: this.roleName, route: 'roles.role.details' },
|
|
{ label: 'credentials' },
|
|
];
|
|
this.renderComponent = () => {
|
|
return render(
|
|
hbs`<Page::Credentials @backend={{this.backend}} @roleName={{this.roleName}} @breadcrumbs={{this.breadcrumbs}}/>`,
|
|
{
|
|
owner: this.engine,
|
|
}
|
|
);
|
|
};
|
|
});
|
|
|
|
test('it should display generate credentials form', async function (assert) {
|
|
await this.renderComponent();
|
|
assert.dom('[data-test-credentials-header]').hasText('Generate credentials');
|
|
assert
|
|
.dom('[data-test-generate-credentials] p')
|
|
.hasText(`This will generate credentials using the role ${this.roleName}.`);
|
|
assert.dom('[data-test-generate-credentials] label').hasText('Kubernetes namespace');
|
|
assert
|
|
.dom('[data-test-generate-credentials] .is-size-8')
|
|
.hasText('The namespace in which to generate the credentials.');
|
|
assert.dom('[data-test-toggle-label] .title').hasText('ClusterRoleBinding');
|
|
assert
|
|
.dom('[data-test-toggle-label] .description')
|
|
.hasText(
|
|
'Generate a ClusterRoleBinding to grant permissions across the whole cluster instead of within a namespace. This requires the Vault role to have kubernetes_role_type set to ClusterRole.'
|
|
);
|
|
});
|
|
|
|
test('it should show errors states when generating credentials', async function (assert) {
|
|
assert.expect(2);
|
|
|
|
this.getCreateCredentialsError(this.roleName, 'noNamespace');
|
|
await this.renderComponent();
|
|
await click('[data-test-generate-credentials-button]');
|
|
|
|
assert.dom('[data-test-error] .alert-banner-message-body').hasText("'kubernetes_namespace' is required");
|
|
|
|
this.roleName = 'role-2';
|
|
this.getCreateCredentialsError(this.roleName);
|
|
|
|
await this.renderComponent();
|
|
await click('[data-test-generate-credentials-button]');
|
|
assert
|
|
.dom('[data-test-error] .alert-banner-message-body')
|
|
.hasText(`role '${this.roleName}' does not exist`);
|
|
});
|
|
|
|
test('it should show correct credential information after generate credentials is clicked', async function (assert) {
|
|
assert.expect(15);
|
|
|
|
this.server.post('/kubernetes-test/creds/role-0', () => {
|
|
assert.ok('POST request made to generate credentials');
|
|
return {
|
|
request_id: '58fefc6c-5195-c17a-94f2-8f889f3df57c',
|
|
lease_id: 'kubernetes/creds/default-role/aWczfcfJ7NKUdiirJrPXIs38',
|
|
renewable: false,
|
|
lease_duration: 3600,
|
|
data: {
|
|
service_account_name: 'default',
|
|
service_account_namespace: 'default',
|
|
service_account_token: 'eyJhbGciOiJSUzI1NiIsImtpZCI6Imlr',
|
|
},
|
|
};
|
|
});
|
|
|
|
await this.renderComponent();
|
|
await fillIn('[data-test-kubernetes-namespace]', 'kubernetes-test');
|
|
assert.dom('[data-test-kubernetes-namespace]').hasValue('kubernetes-test', 'kubernetes-test');
|
|
|
|
await click('[data-test-toggle-input]');
|
|
await click('[data-test-toggle-input="Time-to-Live (TTL)"]');
|
|
await fillIn('[data-test-ttl-value="Time-to-Live (TTL)"]', 2);
|
|
await click('[data-test-generate-credentials-button]');
|
|
|
|
assert.dom('[data-test-credentials-header]').hasText('Credentials');
|
|
assert.dom('[data-test-alert-banner] .message-title').hasText('Warning');
|
|
assert
|
|
.dom('[data-test-alert-banner] .alert-banner-message-body')
|
|
.hasText("You won't be able to access these credentials later, so please copy them now.");
|
|
assert.dom('[data-test-row-label="Service account token"]').hasText('Service account token');
|
|
await click('[data-test-value-div="Service account token"] [data-test-button]');
|
|
assert
|
|
.dom('[data-test-value-div="Service account token"] .display-only')
|
|
.hasText('eyJhbGciOiJSUzI1NiIsImtpZCI6Imlr');
|
|
assert.dom('[data-test-row-label="Namespace"]').hasText('Namespace');
|
|
assert.dom('[data-test-value-div="Namespace"]').exists();
|
|
assert.dom('[data-test-row-label="Service account name"]').hasText('Service account name');
|
|
assert.dom('[data-test-value-div="Service account name"]').exists();
|
|
|
|
assert.dom('[data-test-row-label="Lease expiry"]').hasText('Lease expiry');
|
|
assert.dom('[data-test-value-div="Lease expiry"]').exists();
|
|
assert.dom('[data-test-row-label="lease_id"]').hasText('lease_id');
|
|
assert
|
|
.dom('[data-test-value-div="lease_id"] [data-test-row-value="lease_id"]')
|
|
.hasText('kubernetes/creds/default-role/aWczfcfJ7NKUdiirJrPXIs38');
|
|
});
|
|
});
|