mirror of
https://github.com/hashicorp/vault.git
synced 2025-08-18 21:21:06 +02:00
* adds ldap ember engine (#20786) * adds ldap as mountable and supported secrets engine (#20793) * removes active directory as mountable secrets engine (#20798) * LDAP Config Ember Data Setup (#20863) * adds secret-engine-path adapter * adds model, adapater and serializer for ldap config * adds test for ldap config adapter * addresses PR feedback * updates remaining instances of getURL in secrets-engine-path adapter * adds underscore to getURL method in kubernetes/config adapter * adds check config vars test for kubernetes/config adapter * adds comment regarding primaryKey in secrets-engine-path adapter * adds tab-page-header component for ldap secrets engine (#20941) * LDAP Config Route (#21059) * converts secret-mount-path service to ts and moves kubernetes fetch-config decorator to core addon and converts to ts * adds ldap config route * fixes withConfig import path in kubernetes roles route * updates types in ldap config route * adds unit tests for fetch-secret-config decorator * updates comments in fetch-secret-config decorator * renames fetch-secret-config decorator * LDAP Configure Page Component (#21384) * adds ldap page configure component * removes pauseTest and updates radio card selector in ldap config test * LDAP Configuration (#21430) * adds ldap configuration route * adds secrets-engine-mount-config component to core addon * adds ldap config-cta component * adds display fields to ldap configuration page and test * fixes ldap config-cta test * adds yield to secrets-engine-mount-config component * fixes tests * LDAP Overview Route and Page Component (#21579) * adds ldap overview route and page component * changes toolbar link action type for create role on overview page * LDAP Role Model, Adapter and Serializer (#21655) * adds model, adapter and serializer for ldap roles * addresses review feedback * changes ldap role type from tracked prop to attr and sets in adapter for query methods * adds assertions to verify that frontend only props are returned from query methods in ldap role adapter * LDAP Library Model, Adapter and Serializer (#21728) * adds model, adapter and serializer for ldap library * updates capitalization and punction for ldap role and library form fields * LDAP Roles Create and Edit (#21818) * moves stringify and jsonify helpers to core addon * adds validation error for ttl picker in form field component * adds ldap roles create and edit routes and page component * adds ldap mirage handler and factory for roles * adds example workflow to json editor component * adds tests for ldap page create and edit component * addresses feedback * LDAP Role Details (#22036) * adds ldap role route to pass down model to child routes * adds ldap role details route and page component * updates ldap role model capabilities checks * adds periods to error messages * removes modelFor from ldap roles edit and details routes * adds flash message on ldap role delete success * LDAP Roles (#22070) * adds ldap roles route and page component * update ldap role adapter tests and adds adapter options to query for partialErrorInfo * updates ldap role adapter based on PR feedback * adds filter-input component to core addon * updates ldap roles page to use filter-input component * updates ldap role adapter tests * LDAP Role Credentials (#22142) * adds ldap roles route and page component * update ldap role adapter tests and adds adapter options to query for partialErrorInfo * adds credentials actions to ldap roles list menu and fixes rotate action in details view * adds ldap role credentials route and page component * adds tests for ldap role credentials * LDAP Library Create and Edit (#22171) * adds ldap library create/edit routes and page component * adds ldap library create-and-edit tests and library mirage factory * updates form-field component to display validation errors and warnings for all fields * updates ldap library edit route class name * updates ldap library model interface name * adds missing period in flash message * LDAP Libraries (#22184) * updates interface and class names in ldap roles route * adds ldap libraries route and page component * fixes lint error * LDAP Library Details (#22200) * updates interface and class names in ldap roles route * adds ldap libraries route and page component * fixes lint error * adds ldap library details route and page component * LDAP Library Details Configuration (#22201) * updates interface and class names in ldap roles route * adds ldap libraries route and page component * fixes lint error * adds ldap library details route and page component * adds ldap library details configuration route and page component * updates ldap library check-in enforcement value mapping * fixes issue in code mirror modifier after merging upgrade * fixes failing database secrets test * LDAP Library Account Details (#22287) * adds route and page component for ldap library accounts * adds ldap component for checked out accounts * updates ldap library adapter tests * LDAP Library Check-out (#22289) * adds route and page component for ldap library accounts * adds ldap component for checked out accounts * adds route and page component for ldap library checkout * addresses PR feedback * LDAP Overview Cards (#22325) * adds overview cards to ldap overview route * adds create library toolbar action to ldap overview route * adds acceptance tests for ldap workflows (#22375) * Fetch Secrets Engine Config Decorator Docs (#22416) * removes uneccesary asyncs from ldap route model hooks * updates ldap overview route class name * adds documentation for fetch-secrets-engine-config decorator * add changelog * adding back external links, missed due to merge. * changelog * fix test after merging in dashboard work * Update 20790.txt --------- Co-authored-by: Angel Garbarino <angel@hashicorp.com> Co-authored-by: Angel Garbarino <Monkeychip@users.noreply.github.com>
228 lines
7.2 KiB
JavaScript
228 lines
7.2 KiB
JavaScript
/**
|
|
* Copyright (c) HashiCorp, Inc.
|
|
* SPDX-License-Identifier: MPL-2.0
|
|
*/
|
|
|
|
import { module, test } from 'qunit';
|
|
import { setupTest } from 'ember-qunit';
|
|
import { setupMirage } from 'ember-cli-mirage/test-support';
|
|
import { Response } from 'miragejs';
|
|
import sinon from 'sinon';
|
|
|
|
module('Unit | Adapter | ldap/role', function (hooks) {
|
|
setupTest(hooks);
|
|
setupMirage(hooks);
|
|
|
|
hooks.beforeEach(function () {
|
|
this.store = this.owner.lookup('service:store');
|
|
this.adapter = this.store.adapterFor('ldap/role');
|
|
this.path = 'role';
|
|
});
|
|
|
|
test('it should make request to correct endpoints when listing records', async function (assert) {
|
|
assert.expect(6);
|
|
|
|
const assertRequest = (schema, req) => {
|
|
assert.ok(req.queryParams.list, 'list query param sent when listing roles');
|
|
const name = req.params.path === 'static-role' ? 'static-test' : 'dynamic-test';
|
|
return { data: { keys: [name] } };
|
|
};
|
|
|
|
this.server.get('/ldap-test/static-role', assertRequest);
|
|
this.server.get('/ldap-test/role', assertRequest);
|
|
|
|
this.models = await this.store.query('ldap/role', { backend: 'ldap-test' });
|
|
|
|
const model = this.models.firstObject;
|
|
assert.strictEqual(this.models.length, 2, 'Returns responses from both endpoints');
|
|
assert.strictEqual(model.backend, 'ldap-test', 'Backend value is set on records returned from query');
|
|
// sorted alphabetically by name so dynamic should be first
|
|
assert.strictEqual(model.type, 'dynamic', 'Type value is set on records returned from query');
|
|
assert.strictEqual(model.name, 'dynamic-test', 'Name value is set on records returned from query');
|
|
});
|
|
|
|
test('it should conditionally trigger info level flash message for single endpoint error from query', async function (assert) {
|
|
const flashMessages = this.owner.lookup('service:flashMessages');
|
|
const flashSpy = sinon.spy(flashMessages, 'info');
|
|
|
|
this.server.get('/ldap-test/static-role', () => {
|
|
return new Response(403, {}, { errors: ['permission denied'] });
|
|
});
|
|
this.server.get('/ldap-test/role', () => ({ data: { keys: ['dynamic-test'] } }));
|
|
|
|
await this.store.query('ldap/role', { backend: 'ldap-test' });
|
|
await this.store.query(
|
|
'ldap/role',
|
|
{ backend: 'ldap-test' },
|
|
{ adapterOptions: { showPartialError: true } }
|
|
);
|
|
|
|
assert.true(
|
|
flashSpy.calledOnceWith('Error fetching roles from /v1/ldap-test/static-role: permission denied'),
|
|
'Partial error info only displays when adapter option is passed'
|
|
);
|
|
});
|
|
|
|
test('it should throw error for query when requests to both endpoints fail', async function (assert) {
|
|
assert.expect(1);
|
|
|
|
this.server.get('/ldap-test/:path', (schema, req) => {
|
|
const errors = {
|
|
'static-role': ['permission denied'],
|
|
role: ['server error'],
|
|
}[req.params.path];
|
|
return new Response(req.params.path === 'static-role' ? 403 : 500, {}, { errors });
|
|
});
|
|
|
|
try {
|
|
await this.store.query('ldap/role', { backend: 'ldap-test' });
|
|
} catch (error) {
|
|
assert.deepEqual(
|
|
error,
|
|
{
|
|
message: 'Error fetching roles:',
|
|
errors: ['/v1/ldap-test/static-role: permission denied', '/v1/ldap-test/role: server error'],
|
|
},
|
|
'Error is thrown with correct payload from query'
|
|
);
|
|
}
|
|
});
|
|
|
|
test('it should make request to correct endpoints when querying record', async function (assert) {
|
|
assert.expect(5);
|
|
|
|
this.server.get('/ldap-test/:path/test-role', (schema, req) => {
|
|
assert.strictEqual(
|
|
req.params.path,
|
|
this.path,
|
|
'GET request made to correct endpoint when querying record'
|
|
);
|
|
});
|
|
|
|
for (const type of ['dynamic', 'static']) {
|
|
this.model = await this.store.queryRecord('ldap/role', {
|
|
backend: 'ldap-test',
|
|
type,
|
|
name: 'test-role',
|
|
});
|
|
this.path = 'static-role';
|
|
}
|
|
|
|
assert.strictEqual(
|
|
this.model.backend,
|
|
'ldap-test',
|
|
'Backend value is set on records returned from query'
|
|
);
|
|
assert.strictEqual(this.model.type, 'static', 'Type value is set on records returned from query');
|
|
assert.strictEqual(this.model.name, 'test-role', 'Name value is set on records returned from query');
|
|
});
|
|
|
|
test('it should make request to correct endpoints when creating new record', async function (assert) {
|
|
assert.expect(2);
|
|
|
|
this.server.post('/ldap-test/:path/test-role', (schema, req) => {
|
|
assert.strictEqual(
|
|
req.params.path,
|
|
this.path,
|
|
'POST request made to correct endpoint when creating new record'
|
|
);
|
|
});
|
|
|
|
const getModel = (type) => {
|
|
return this.store.createRecord('ldap/role', {
|
|
backend: 'ldap-test',
|
|
name: 'test-role',
|
|
type,
|
|
});
|
|
};
|
|
|
|
for (const type of ['dynamic', 'static']) {
|
|
const model = getModel(type);
|
|
await model.save();
|
|
this.path = 'static-role';
|
|
}
|
|
});
|
|
|
|
test('it should make request to correct endpoints when updating record', async function (assert) {
|
|
assert.expect(2);
|
|
|
|
this.server.post('/ldap-test/:path/test-role', (schema, req) => {
|
|
assert.strictEqual(
|
|
req.params.path,
|
|
this.path,
|
|
'POST request made to correct endpoint when updating record'
|
|
);
|
|
});
|
|
|
|
this.store.pushPayload('ldap/role', {
|
|
modelName: 'ldap/role',
|
|
backend: 'ldap-test',
|
|
name: 'test-role',
|
|
});
|
|
const record = this.store.peekRecord('ldap/role', 'test-role');
|
|
|
|
for (const type of ['dynamic', 'static']) {
|
|
record.type = type;
|
|
await record.save();
|
|
this.path = 'static-role';
|
|
}
|
|
});
|
|
|
|
test('it should make request to correct endpoints when deleting record', async function (assert) {
|
|
assert.expect(2);
|
|
|
|
this.server.delete('/ldap-test/:path/test-role', (schema, req) => {
|
|
assert.strictEqual(
|
|
req.params.path,
|
|
this.path,
|
|
'DELETE request made to correct endpoint when deleting record'
|
|
);
|
|
});
|
|
|
|
const getModel = () => {
|
|
this.store.pushPayload('ldap/role', {
|
|
modelName: 'ldap/role',
|
|
backend: 'ldap-test',
|
|
name: 'test-role',
|
|
});
|
|
return this.store.peekRecord('ldap/role', 'test-role');
|
|
};
|
|
|
|
for (const type of ['dynamic', 'static']) {
|
|
const record = getModel();
|
|
record.type = type;
|
|
await record.destroyRecord();
|
|
this.path = 'static-role';
|
|
}
|
|
});
|
|
|
|
test('it should make request to correct endpoints when fetching credentials', async function (assert) {
|
|
assert.expect(2);
|
|
|
|
this.path = 'creds';
|
|
|
|
this.server.get('/ldap-test/:path/test-role', (schema, req) => {
|
|
assert.strictEqual(
|
|
req.params.path,
|
|
this.path,
|
|
'GET request made to correct endpoint when fetching credentials'
|
|
);
|
|
});
|
|
|
|
for (const type of ['dynamic', 'static']) {
|
|
await this.adapter.fetchCredentials('ldap-test', type, 'test-role');
|
|
this.path = 'static-cred';
|
|
}
|
|
});
|
|
|
|
test('it should make request to correct endpoint when rotating static role password', async function (assert) {
|
|
assert.expect(1);
|
|
|
|
this.server.post('/ldap-test/rotate-role/test-role', () => {
|
|
assert.ok('GET request made to correct endpoint when rotating static role password');
|
|
});
|
|
|
|
await this.adapter.rotateStaticPassword('ldap-test', 'test-role');
|
|
});
|
|
});
|