mirror of
https://github.com/hashicorp/vault.git
synced 2025-12-03 16:41:13 +01:00
* add secrets sync feature to version service * fix syntax for feature in version service * UI [Sidebranch]: correctly call activation flags endpoints (#26068) * Show empty state on client count sync page if feature isn't activated (#26024) * page/sync: show empty state if sync is not activated * tests: add sync page integration tests * tests: add secrets sync acceptance tests * cleanup: remove redundant empty state selector * chore: rename to isSecretsSyncActivated * Only make POST request to activation-flags in root namespace (#26081) * Clean up around opt-in banner on non-secrets-sync views (#26039) * only show and make request to activated-features if enterprise with secrets sync feature * waiting for final badge title but hiding banner and network request based on if user has secrets-sync feature. * final copy for badge * handle dismiss erorr message, custom messaging in errors, different badge names and upsell if not on license. * add secrets sync feature to version service * nope, add to main sidebranch not in this PR * use version service directly to check for secrets sync feature * update badges to use version service directly * do not unnecessarily pass hasSecretsSyncFeature, access from version directly * last spot to update using the feature getter * cleanup landing cta logic * UI [Sidebranch]: correctly call activation flags endpoints (#26068) * small cleanups after merge * remove unused type imports * update tests * update nav link test * add test waiter for race condition on test * add waiter to fetch activation-flags * remove customer waiters and go for waitFors in test * worth a try? mirage issues? * closer? * fix issue with inconsistent asserts * adding back in in case this is the issue * revert cluster.hbs change * skip test * delete test --------- Co-authored-by: clairebontempo@gmail.com <clairebontempo@gmail.com> Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com> Co-authored-by: Chelsea Shaw <82459713+hashishaw@users.noreply.github.com> * Hide sync for managed vault (#26084) * [secrets sync] hide sync content from client overview (#26078) * clients/overview: hide secrets sync content if not in license * clients: remove sync tab if not in license * routes: fetch isSecretsSyncActivated at clients/counts route level * wip - hide secrets sync from overview page * tests: fix usage-stats test * more wip hiding from overview page * hide secrets sync on attribution component/modal * hide secrets sync content on running total component * fix RunningTotal class name Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com> * controllers: fix type * tests: usage tests * tests: running totals tests * add s to secrets-sync * tests: running-total test cleanup --------- Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com> Co-authored-by: clairebontempo@gmail.com <clairebontempo@gmail.com> * cleanup unused version service * return extra line * wip - sync tests * wip -- clients overview acceptance tests * test coverage for sync in license, activated * tests: add more robust sync-related overview tests * hide sync client charts if feature not in license --------- Co-authored-by: clairebontempo@gmail.com <clairebontempo@gmail.com> Co-authored-by: Chelsea Shaw <82459713+hashishaw@users.noreply.github.com> Co-authored-by: Noelle Daley <noelledaley@users.noreply.github.com> Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com> Co-authored-by: Chelsea Shaw <cshaw@hashicorp.com>
148 lines
4.7 KiB
JavaScript
148 lines
4.7 KiB
JavaScript
/**
|
|
* Copyright (c) HashiCorp, Inc.
|
|
* SPDX-License-Identifier: BUSL-1.1
|
|
*/
|
|
|
|
import { module, test } from 'qunit';
|
|
import { setupRenderingTest } from 'ember-qunit';
|
|
import { render } from '@ember/test-helpers';
|
|
import hbs from 'htmlbars-inline-precompile';
|
|
import { stubFeaturesAndPermissions } from 'vault/tests/helpers/components/sidebar-nav';
|
|
import { setRunOptions } from 'ember-a11y-testing/test-support';
|
|
|
|
const renderComponent = () => {
|
|
return render(hbs`
|
|
<Sidebar::Frame @isVisible={{true}}>
|
|
<Sidebar::Nav::Cluster />
|
|
</Sidebar::Frame>
|
|
`);
|
|
};
|
|
|
|
module('Integration | Component | sidebar-nav-cluster', function (hooks) {
|
|
setupRenderingTest(hooks);
|
|
|
|
hooks.beforeEach(function () {
|
|
setRunOptions({
|
|
rules: {
|
|
// This is an issue with Hds::SideNav::Header::HomeLink
|
|
'aria-prohibited-attr': { enabled: false },
|
|
// TODO: fix use Dropdown on user-menu
|
|
'nested-interactive': { enabled: false },
|
|
},
|
|
});
|
|
});
|
|
|
|
test('it should render nav headings', async function (assert) {
|
|
const headings = ['Vault', 'Monitoring', 'Settings'];
|
|
stubFeaturesAndPermissions(this.owner, true, true);
|
|
await renderComponent();
|
|
|
|
assert
|
|
.dom('[data-test-sidebar-nav-heading]')
|
|
.exists({ count: headings.length }, 'Correct number of headings render');
|
|
headings.forEach((heading) => {
|
|
assert
|
|
.dom(`[data-test-sidebar-nav-heading="${heading}"]`)
|
|
.hasText(heading, `${heading} heading renders`);
|
|
});
|
|
});
|
|
|
|
test('it should hide links and headings user does not have access too', async function (assert) {
|
|
await renderComponent();
|
|
assert
|
|
.dom('[data-test-sidebar-nav-link]')
|
|
.exists({ count: 3 }, 'Nav links are hidden other than secrets, secrets sync and dashboard');
|
|
assert
|
|
.dom('[data-test-sidebar-nav-heading]')
|
|
.exists({ count: 1 }, 'Headings are hidden other than Vault');
|
|
});
|
|
|
|
test('it should render nav links', async function (assert) {
|
|
const links = [
|
|
'Dashboard',
|
|
'Secrets Engines',
|
|
'Secrets Sync',
|
|
'Access',
|
|
'Policies',
|
|
'Tools',
|
|
'Replication',
|
|
'Raft Storage',
|
|
'Client Count',
|
|
'License',
|
|
'Seal Vault',
|
|
'Custom Messages',
|
|
];
|
|
stubFeaturesAndPermissions(this.owner, true, true);
|
|
await renderComponent();
|
|
|
|
assert
|
|
.dom('[data-test-sidebar-nav-link]')
|
|
.exists({ count: links.length }, 'Correct number of links render');
|
|
links.forEach((link) => {
|
|
assert.dom(`[data-test-sidebar-nav-link="${link}"]`).hasText(link, `${link} link renders`);
|
|
});
|
|
});
|
|
|
|
test('it should render badge for promotional links on community version', async function (assert) {
|
|
const promotionalLinks = ['Secrets Sync'];
|
|
stubFeaturesAndPermissions(this.owner, false, true);
|
|
await renderComponent();
|
|
|
|
promotionalLinks.forEach((link) => {
|
|
assert
|
|
.dom(`[data-test-sidebar-nav-link="${link}"]`)
|
|
.hasText(`${link} Enterprise`, `${link} link renders Enterprise badge`);
|
|
});
|
|
});
|
|
|
|
test('it should render badge for promotional links on enterprise version', async function (assert) {
|
|
const promotionalLinks = ['Secrets Sync'];
|
|
stubFeaturesAndPermissions(this.owner, true, true, ['Namespaces']);
|
|
await renderComponent();
|
|
|
|
promotionalLinks.forEach((link) => {
|
|
assert
|
|
.dom(`[data-test-sidebar-nav-link="${link}"]`)
|
|
.hasText(`${link} Premium`, `${link} link renders Premium badge`);
|
|
});
|
|
});
|
|
|
|
test('it should hide enterprise related links in child namespace', async function (assert) {
|
|
const links = [
|
|
'Disaster Recovery',
|
|
'Performance',
|
|
'Replication',
|
|
'Raft Storage',
|
|
'License',
|
|
'Seal Vault',
|
|
];
|
|
this.owner.lookup('service:namespace').set('path', 'foo');
|
|
const stubs = stubFeaturesAndPermissions(this.owner, true, true);
|
|
stubs.hasNavPermission.callsFake((route) => route !== 'clients');
|
|
|
|
await renderComponent();
|
|
|
|
assert
|
|
.dom('[data-test-sidebar-nav-heading="Monitoring"]')
|
|
.doesNotExist(
|
|
'Monitoring heading is hidden in child namespace when user does not have access to Client Count'
|
|
);
|
|
|
|
links.forEach((link) => {
|
|
assert
|
|
.dom(`[data-test-sidebar-nav-link="${link}"]`)
|
|
.doesNotExist(`${link} is hidden in child namespace`);
|
|
});
|
|
});
|
|
|
|
test('it should not show sync links for managed cluster', async function (assert) {
|
|
this.owner.lookup('service:feature-flag').setFeatureFlags(['VAULT_CLOUD_ADMIN_NAMESPACE']);
|
|
stubFeaturesAndPermissions(this.owner, true, true, ['Secrets Sync']);
|
|
await renderComponent();
|
|
|
|
assert
|
|
.dom(`[data-test-sidebar-nav-link="Secrets Sync"]`)
|
|
.doesNotExist(`Secret Sync is hidden in managed vault`);
|
|
});
|
|
});
|