mirror of
https://github.com/hashicorp/vault.git
synced 2025-08-24 08:01:07 +02:00
* add secrets sync feature to version service * fix syntax for feature in version service * UI [Sidebranch]: correctly call activation flags endpoints (#26068) * Show empty state on client count sync page if feature isn't activated (#26024) * page/sync: show empty state if sync is not activated * tests: add sync page integration tests * tests: add secrets sync acceptance tests * cleanup: remove redundant empty state selector * chore: rename to isSecretsSyncActivated * Only make POST request to activation-flags in root namespace (#26081) * Clean up around opt-in banner on non-secrets-sync views (#26039) * only show and make request to activated-features if enterprise with secrets sync feature * waiting for final badge title but hiding banner and network request based on if user has secrets-sync feature. * final copy for badge * handle dismiss erorr message, custom messaging in errors, different badge names and upsell if not on license. * add secrets sync feature to version service * nope, add to main sidebranch not in this PR * use version service directly to check for secrets sync feature * update badges to use version service directly * do not unnecessarily pass hasSecretsSyncFeature, access from version directly * last spot to update using the feature getter * cleanup landing cta logic * UI [Sidebranch]: correctly call activation flags endpoints (#26068) * small cleanups after merge * remove unused type imports * update tests * update nav link test * add test waiter for race condition on test * add waiter to fetch activation-flags * remove customer waiters and go for waitFors in test * worth a try? mirage issues? * closer? * fix issue with inconsistent asserts * adding back in in case this is the issue * revert cluster.hbs change * skip test * delete test --------- Co-authored-by: clairebontempo@gmail.com <clairebontempo@gmail.com> Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com> Co-authored-by: Chelsea Shaw <82459713+hashishaw@users.noreply.github.com> * Hide sync for managed vault (#26084) * [secrets sync] hide sync content from client overview (#26078) * clients/overview: hide secrets sync content if not in license * clients: remove sync tab if not in license * routes: fetch isSecretsSyncActivated at clients/counts route level * wip - hide secrets sync from overview page * tests: fix usage-stats test * more wip hiding from overview page * hide secrets sync on attribution component/modal * hide secrets sync content on running total component * fix RunningTotal class name Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com> * controllers: fix type * tests: usage tests * tests: running totals tests * add s to secrets-sync * tests: running-total test cleanup --------- Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com> Co-authored-by: clairebontempo@gmail.com <clairebontempo@gmail.com> * cleanup unused version service * return extra line * wip - sync tests * wip -- clients overview acceptance tests * test coverage for sync in license, activated * tests: add more robust sync-related overview tests * hide sync client charts if feature not in license --------- Co-authored-by: clairebontempo@gmail.com <clairebontempo@gmail.com> Co-authored-by: Chelsea Shaw <82459713+hashishaw@users.noreply.github.com> Co-authored-by: Noelle Daley <noelledaley@users.noreply.github.com> Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com> Co-authored-by: Chelsea Shaw <cshaw@hashicorp.com>
98 lines
2.4 KiB
JavaScript
98 lines
2.4 KiB
JavaScript
/**
|
|
* Copyright (c) HashiCorp, Inc.
|
|
* SPDX-License-Identifier: BUSL-1.1
|
|
*/
|
|
|
|
// base handlers used in mirage config when a specific handler is not specified
|
|
const EXPIRY_DATE = '2021-05-12T23:20:50.52Z';
|
|
|
|
export default function (server) {
|
|
server.get('/sys/internal/ui/feature-flags', (db) => {
|
|
const featuresResponse = db.features.first();
|
|
return {
|
|
data: {
|
|
feature_flags: featuresResponse ? featuresResponse.feature_flags : null,
|
|
},
|
|
};
|
|
});
|
|
|
|
server.get('/sys/activation-flags', () => {
|
|
return {
|
|
data: {
|
|
activated: [''],
|
|
unactivated: ['secrets-sync'],
|
|
},
|
|
};
|
|
});
|
|
|
|
server.get('/sys/health', function () {
|
|
return {
|
|
enterprise: true,
|
|
initialized: true,
|
|
sealed: false,
|
|
standby: false,
|
|
license: {
|
|
expiry: '2021-05-12T23:20:50.52Z',
|
|
state: 'stored',
|
|
},
|
|
performance_standby: false,
|
|
replication_performance_mode: 'disabled',
|
|
replication_dr_mode: 'disabled',
|
|
server_time_utc: 1622562585,
|
|
version: '1.9.0+ent',
|
|
cluster_name: 'vault-cluster-e779cd7c',
|
|
cluster_id: '5f20f5ab-acea-0481-787e-71ec2ff5a60b',
|
|
last_wal: 121,
|
|
};
|
|
});
|
|
|
|
server.get('/sys/license/status', function () {
|
|
return {
|
|
data: {
|
|
autoloading_used: false,
|
|
persisted_autoload: {
|
|
expiration_time: EXPIRY_DATE,
|
|
features: ['DR Replication', 'Namespaces', 'Lease Count Quotas', 'Automated Snapshots'],
|
|
license_id: '0eca7ef8-ebc0-f875-315e-3cc94a7870cf',
|
|
performance_standby_count: 0,
|
|
start_time: '2020-04-28T00:00:00Z',
|
|
},
|
|
autoloaded: {
|
|
expiration_time: EXPIRY_DATE,
|
|
features: ['DR Replication', 'Namespaces', 'Lease Count Quotas', 'Automated Snapshots'],
|
|
license_id: '0eca7ef8-ebc0-f875-315e-3cc94a7870cf',
|
|
performance_standby_count: 0,
|
|
start_time: '2020-04-28T00:00:00Z',
|
|
},
|
|
},
|
|
};
|
|
});
|
|
|
|
server.get('sys/namespaces', function () {
|
|
return {
|
|
data: {
|
|
keys: [
|
|
'ns1/',
|
|
'ns2/',
|
|
'ns3/',
|
|
'ns4/',
|
|
'ns5/',
|
|
'ns6/',
|
|
'ns7/',
|
|
'ns8/',
|
|
'ns9/',
|
|
'ns10/',
|
|
'ns11/',
|
|
'ns12/',
|
|
'ns13/',
|
|
'ns14/',
|
|
'ns15/',
|
|
'ns16/',
|
|
'ns17/',
|
|
'ns18/',
|
|
],
|
|
},
|
|
};
|
|
});
|
|
}
|