mirror of
https://github.com/hashicorp/vault.git
synced 2025-08-18 12:37:02 +02:00
* Ember Engine for Kubernetes Secrets Engine (#17881) * adds in-repo ember engine for kubernetes secrets engine * updates kubernetes engine class name * Kubernetes route plumbing (#17895) * kubernetes route plumbing * adds kubernetes role index route with redirect to details * adds kubernetes as mountable and supported secrets engine (#17891) * adds models, adapters and serializers for kubernetes secrets engine (#18010) * adds mirage factories and handlers for kubernetes (#17943) * Kubernetes Secrets Engine Configuration (#18093) * moves RadioCard component to core addon * adds kubernetes configuration view * fixes tests using RadioCard after label for and input id changes * adds confirm modal when editing kubernetes config * addresses review comments * Kubernetes Configuration View (#18147) * removes configuration edit and index routes * adds kubernetes configuration view * Kubernetes Roles List (#18211) * removes configuration edit and index routes * adds kubernetes configuration view * adds kubernetes secrets engine roles list view * updates role details disabled state to explicitly check for false * VAULT-9863 Kubernetes Overview Page (#18232) * Add overview page view * Add overview page tests * Address feedback to update tests and minor changes * Use template built in helper for conditionally showing num roles * Set up roleOptions in constructor * Set up models in tests and fix minor bug * Kubernetes Secrets Engine Create/Edit Views (#18271) * moves kv-object-editor to core addon * moves json-editor to core addon * adds kubernetes secrets engine create/edit views * updates kubernetes/role adapter test * addresses feedback * fixes issue with overview route showing 404 page (#18303) * Kubernetes Role Details View (#18294) * moves format-duration helper to core addon * adds kubernetes secrets engine role details view * adds tests for role details page component * adds capabilities checks for toolbar actions * fixes list link for secrets in an ember engine (#18313) * Manual Testing: Bug Fixes and Improvements (#18333) * updates overview, configuration and roles components to pass args for individual model properties * bug fixes and improvements * adds top level index route to redirect to overview * VAULT-9877 Kubernetes Credential Generate/View Pages (#18270) * Add credentials route with create and view components * Update mirage response for creds and add ajax post call for creds in adapter * Move credentials create and view into one component * Add test classes * Remove files and update backend property name * Code cleanup and add tests * Put test helper in helper function * Add one more test! * Add code optimizations * Fix model in route and add form * Add onSubmit to form and preventDefault * Fix tests * Update mock data for test to be strong rather than record * adds acceptance tests for kubernetes secrets engine roles (#18360) * VAULT-11862 Kubernetes acceptance tests (#18431) * VAULT-12185 overview acceptance tests * VAULT-12298 credentials acceptance tests * VAULT-12186 configuration acceptance tests * VAULT-12127 Refactor breadcrumbs to use breadcrumb component (#18489) * VAULT-12127 Refactor breadcrumbs to use Page::Breadcrumbs component * Fix failing tests by adding breadcrumbs properties * VAULT-12166 add jsdocs to kubernetes secrets engine pages (#18509) * fixes incorrect merge conflict resolution * updates kubernetes check env vars endpoint (#18588) * hides kubernetes ca cert field if not defined in configuration view * fixes loading substate handling issue (#18592) * adds changelog entry Co-authored-by: Kianna <30884335+kiannaquach@users.noreply.github.com>
141 lines
5.8 KiB
JavaScript
141 lines
5.8 KiB
JavaScript
import { module, test } from 'qunit';
|
|
import { setupRenderingTest } from 'ember-qunit';
|
|
import { setupEngine } from 'ember-engines/test-support';
|
|
import { setupMirage } from 'ember-cli-mirage/test-support';
|
|
import { render, click } from '@ember/test-helpers';
|
|
import hbs from 'htmlbars-inline-precompile';
|
|
import sinon from 'sinon';
|
|
import { duration } from 'core/helpers/format-duration';
|
|
|
|
const allFields = [
|
|
{ label: 'Role name', key: 'name' },
|
|
{ label: 'Kubernetes role type', key: 'kubernetesRoleType' },
|
|
{ label: 'Kubernetes role name', key: 'kubernetesRoleName' },
|
|
{ label: 'Service account name', key: 'serviceAccountName' },
|
|
{ label: 'Allowed Kubernetes namespaces', key: 'allowedKubernetesNamespaces' },
|
|
{ label: 'Max Lease TTL', key: 'tokenMaxTtl' },
|
|
{ label: 'Default Lease TTL', key: 'tokenDefaultTtl' },
|
|
{ label: 'Name template', key: 'nameTemplate' },
|
|
];
|
|
|
|
module('Integration | Component | kubernetes | Page::Role::Details', function (hooks) {
|
|
setupRenderingTest(hooks);
|
|
setupEngine(hooks, 'kubernetes');
|
|
setupMirage(hooks);
|
|
|
|
hooks.beforeEach(function () {
|
|
const store = this.owner.lookup('service:store');
|
|
this.server.post('/sys/capabilities-self', () => ({
|
|
data: {
|
|
capabilities: ['root'],
|
|
},
|
|
}));
|
|
this.renderComponent = (trait) => {
|
|
const data = this.server.create('kubernetes-role', trait);
|
|
store.pushPayload('kubernetes/role', {
|
|
modelName: 'kubernetes/role',
|
|
backend: 'kubernetes-test',
|
|
...data,
|
|
});
|
|
this.model = store.peekRecord('kubernetes/role', data.name);
|
|
this.breadcrumbs = [
|
|
{ label: this.model.backend, route: 'overview' },
|
|
{ label: 'roles', route: 'roles' },
|
|
{ label: this.model.name },
|
|
];
|
|
return render(hbs`<Page::Role::Details @model={{this.model}} @breadcrumbs={{this.breadcrumbs}} />`, {
|
|
owner: this.engine,
|
|
});
|
|
};
|
|
|
|
this.assertFilteredFields = (hiddenIndices, assert) => {
|
|
const fields = allFields.filter((field, index) => !hiddenIndices.includes(index));
|
|
assert
|
|
.dom('[data-test-filtered-field]')
|
|
.exists({ count: fields.length }, 'Correct number of filtered fields render');
|
|
fields.forEach((field) => {
|
|
assert
|
|
.dom(`[data-test-row-label="${field.label}"]`)
|
|
.hasText(field.label, `${field.label} label renders`);
|
|
const modelValue = this.model[field.key];
|
|
const value = field.key.includes('Ttl') ? duration([modelValue], {}) : modelValue;
|
|
assert.dom(`[data-test-row-value="${field.label}"]`).hasText(value, `${field.label} value renders`);
|
|
});
|
|
};
|
|
|
|
this.assertExtraFields = (modelKeys, assert) => {
|
|
modelKeys.forEach((modelKey) => {
|
|
for (const key in this.model[modelKey]) {
|
|
assert.dom(`[data-test-row-label="${key}"]`).hasText(key, `${modelKey} key renders`);
|
|
assert
|
|
.dom(`[data-test-row-value="${key}"]`)
|
|
.hasText(this.model[modelKey][key], `${modelKey} value renders`);
|
|
}
|
|
});
|
|
};
|
|
});
|
|
|
|
test('it should render header with role name and breadcrumbs', async function (assert) {
|
|
await this.renderComponent();
|
|
assert.dom('[data-test-header-title]').hasText(this.model.name, 'Role name renders in header');
|
|
assert
|
|
.dom('[data-test-breadcrumbs] li:nth-child(1)')
|
|
.containsText(this.model.backend, 'Overview breadcrumb renders');
|
|
assert.dom('[data-test-breadcrumbs] li:nth-child(2) a').containsText('roles', 'Roles breadcrumb renders');
|
|
assert
|
|
.dom('[data-test-breadcrumbs] li:nth-child(3)')
|
|
.containsText(this.model.name, 'Role breadcrumb renders');
|
|
});
|
|
|
|
test('it should render toolbar actions', async function (assert) {
|
|
assert.expect(5);
|
|
|
|
const transitionStub = sinon.stub(this.owner.lookup('service:router'), 'transitionTo');
|
|
|
|
await this.renderComponent();
|
|
|
|
this.server.delete(`/${this.model.backend}/roles/${this.model.name}`, () => {
|
|
assert.ok(true, 'Request made to delete role');
|
|
return;
|
|
});
|
|
|
|
assert.dom('[data-test-delete] button').hasText('Delete role', 'Delete action renders');
|
|
assert
|
|
.dom('[data-test-generate-credentials]')
|
|
.hasText('Generate credentials', 'Generate credentials action renders');
|
|
assert.dom('[data-test-edit]').hasText('Edit role', 'Edit action renders');
|
|
|
|
await click('[data-test-delete] button');
|
|
await click('[data-test-confirm-button]');
|
|
assert.ok(
|
|
transitionStub.calledWith('vault.cluster.secrets.backend.kubernetes.roles'),
|
|
'Transitions to roles route on delete success'
|
|
);
|
|
});
|
|
|
|
test('it should render fields that correspond to basic creation', async function (assert) {
|
|
assert.expect(13);
|
|
await this.renderComponent();
|
|
this.assertFilteredFields([1, 2, 7], assert);
|
|
assert.dom('[data-test-generated-role-rules]').doesNotExist('Generated role rules do not render');
|
|
assert.dom('[data-test-extra-fields]').doesNotExist('Annotations and labels do not render');
|
|
});
|
|
|
|
test('it should render fields that correspond to expanded creation', async function (assert) {
|
|
assert.expect(21);
|
|
await this.renderComponent('withRoleName');
|
|
this.assertFilteredFields([3], assert);
|
|
assert.dom('[data-test-generated-role-rules]').doesNotExist('Generated role rules do not render');
|
|
this.assertExtraFields(['extraAnnotations'], assert);
|
|
assert.dom('[data-test-extra-fields="Labels"]').doesNotExist('Labels do not render');
|
|
});
|
|
|
|
test('it should render fields that correspond to full creation', async function (assert) {
|
|
assert.expect(22);
|
|
await this.renderComponent('withRoleRules');
|
|
this.assertFilteredFields([2, 3], assert);
|
|
assert.dom('[data-test-generated-role-rules]').exists('Generated role rules render');
|
|
this.assertExtraFields(['extraAnnotations', 'extraLabels'], assert);
|
|
});
|
|
});
|