mirror of
https://github.com/hashicorp/vault.git
synced 2025-08-15 02:57:04 +02:00
* directly depend on route-recognizer * add path encode helper using route-recognizer normalizer methods * encode user-entered paths/ids for places we're not using the built-in ember data buildUrl method * encode secret link params * decode params from the url, and encode for linked-block and navigate-input components * add escape-string-regexp * use list-controller mixin and escape the string when contructing new Regex objects * encode paths in the console service * add acceptance tests for kv secrets * make encoding in linked-block an attribute, and use it on secret lists * egp endpoints are enterprise-only, so include 'enterprise' text in the test * fix routing test and exclude single quote from encoding tests * encode cli string before tokenizing * encode auth_path for use with urlFor * add test for single quote via UI input instead of web cli
72 lines
2.1 KiB
JavaScript
72 lines
2.1 KiB
JavaScript
import { create } from 'ember-cli-page-object';
|
|
import { module, test } from 'qunit';
|
|
import { setupApplicationTest } from 'ember-qunit';
|
|
import authPage from 'vault/tests/pages/auth';
|
|
import logout from 'vault/tests/pages/logout';
|
|
import consoleClass from 'vault/tests/pages/components/console/ui-panel';
|
|
|
|
const consoleComponent = create(consoleClass);
|
|
|
|
const tokenWithPolicy = async function(name, policy) {
|
|
await consoleComponent.runCommands([
|
|
`write sys/policies/acl/${name} policy=${policy}`,
|
|
`write -field=client_token auth/token/create policies=${name}`,
|
|
]);
|
|
|
|
return consoleComponent.lastLogOutput;
|
|
};
|
|
|
|
module('Acceptance | cluster', function(hooks) {
|
|
setupApplicationTest(hooks);
|
|
|
|
hooks.beforeEach(async function() {
|
|
await logout.visit();
|
|
return authPage.login();
|
|
});
|
|
|
|
test('hides nav item if user does not have permission', async function(assert) {
|
|
const deny_policies_policy = `'
|
|
path "sys/policies/*" {
|
|
capabilities = ["deny"]
|
|
},
|
|
'`;
|
|
|
|
const userToken = await tokenWithPolicy('hide-policies-nav', deny_policies_policy);
|
|
await logout.visit();
|
|
await authPage.login(userToken);
|
|
|
|
assert.dom('[data-test-navbar-item=policies]').doesNotExist();
|
|
await logout.visit();
|
|
});
|
|
|
|
test('shows nav item if user does have permission', async function(assert) {
|
|
const read_secrets_policy = `'
|
|
path "cubbyhole/" {
|
|
capabilities = ["read"]
|
|
},
|
|
'`;
|
|
|
|
const userToken = await tokenWithPolicy('show-secrets-nav', read_secrets_policy);
|
|
await logout.visit();
|
|
await authPage.login(userToken);
|
|
|
|
assert.dom('[data-test-navbar-item=secrets]').exists();
|
|
await logout.visit();
|
|
});
|
|
|
|
test('enterprise nav item links to first route that user has access to', async function(assert) {
|
|
const read_rgp_policy = `'
|
|
path "sys/policies/rgp" {
|
|
capabilities = ["read"]
|
|
},
|
|
'`;
|
|
|
|
const userToken = await tokenWithPolicy('show-policies-nav', read_rgp_policy);
|
|
await logout.visit();
|
|
await authPage.login(userToken);
|
|
|
|
assert.dom('[data-test-navbar-item=policies]').hasAttribute('href', '/ui/vault/policies/rgp');
|
|
await logout.visit();
|
|
});
|
|
});
|