Dan Rivera fbb446f974
UI: Custom login settings views (#30592)
* UI: Adding routes for custom login settings  (#30404)

* adding route block

* adding to side nav

* jk its diff

* adding TODO, adding empty files

* UI: Adding List view component for custom login settings (#30459)

* first pass setting up list view

* style fix

* messing with routes

* fix

* undo

* using mock data

* renaming

* [UI] API Service Error Parsing (#30454)

* adds error parsing method to api service

* replaces apiErrorMessage util instances with api service parseError

* removes apiErrorMessage util and tests

* removes ApiError type

* fixes issue in isLocalStorageSupported error handling

* remove cli folder (#30458)

* [DOCS] Add explicit links to older release notes (#30461)

* Add explicit links to older release notes

* remove domain from URLs

* add link to important changes as well

* bump timeout for single flaky test (#30460)

* adds list response parsing to api service (#30455)

* update versions, and replace summary in important changes section (#30471)

* Update CHANGELOG.md (#30456)

* UI: Update Enterprise Client Count Datepicker (#30349)

* date picker changes (mostly) for ent client counts

* Move edit modal button + padding

* only show start time in dropdown and add changelog

* remove unused variable and update toggle width

* remove unnecessary period end dates

* tidy

* update tests

* Update changelog/30349.txt

Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com>

* improve date logic

* add export button back in, re-arrange header, update dropdown

* update when date is shown

* add default for retention months

* update tests and remove unnecessary tests

* account for retention months that are not whole periods

* update logic to show end date on export modal

* update exported file name

---------

Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com>

* Prevent early-exit of plugin reload (#30329)

* update to use util, update to this.cap

---------

Co-authored-by: Jordan Reimer <zofskeez@gmail.com>
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
Co-authored-by: Angel Garbarino <Monkeychip@users.noreply.github.com>
Co-authored-by: Ellie <ellie.sterner@hashicorp.com>
Co-authored-by: Tony Wittinger <anwittin@users.noreply.github.com>
Co-authored-by: lane-wetmore <lane.wetmore@hashicorp.com>
Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com>
Co-authored-by: kpcraig <3031348+kpcraig@users.noreply.github.com>

* UI: Create details component for custom login rules (#30530)

* setup

* adding to view

* fixing table keys

* add breadcrumbs

* fixes

* removing default vals

* pr comments

* adding delete button to toolbar

* adding delete functionality

* reorder and fix error handling

* updating api call, adding error template, fixing selectors

* remove param

* UI: Updating visibility attr on auth config to be a toggle with direct login link (#30548)

* updating visibility attr to be a toggle, adding link placeholder

* update test

* test fix pt2

* updating to build link + copy button

* updates

* use the right word

* using hds text

* updating helper text, path

* use encode directly

* updating capabilities check, creating test files, empty state

* UI: Update custom login to use api instead of mirage (#30640)

* updating to use api, removing store

* temp test fix

* fixes on types, remove test funcs

* fix assertion

* adding tests

* updating test

* adding to tests

* stub delete?

* removing stubs, updating tests

* fixes

* moving cmd placement, updating inheritance

* adding changelog

* fix changelog

* pr comments

* update check & update test

* remove empty state block

* remove comment

* Revert "remove empty state block"

This reverts commit ce34d8c76fea3b43bb96c6acd342a5ba0471f441.

* remove the right empty state

---------

Co-authored-by: Jordan Reimer <zofskeez@gmail.com>
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
Co-authored-by: Angel Garbarino <Monkeychip@users.noreply.github.com>
Co-authored-by: Ellie <ellie.sterner@hashicorp.com>
Co-authored-by: Tony Wittinger <anwittin@users.noreply.github.com>
Co-authored-by: lane-wetmore <lane.wetmore@hashicorp.com>
Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com>
Co-authored-by: kpcraig <3031348+kpcraig@users.noreply.github.com>
2025-05-22 14:17:14 -04:00

266 lines
9.3 KiB
JavaScript

/**
* Copyright (c) HashiCorp, Inc.
* SPDX-License-Identifier: BUSL-1.1
*/
import { module, test } from 'qunit';
import { setupRenderingTest } from 'ember-qunit';
import { render } from '@ember/test-helpers';
import hbs from 'htmlbars-inline-precompile';
import { stubFeaturesAndPermissions } from 'vault/tests/helpers/components/sidebar-nav';
import { setRunOptions } from 'ember-a11y-testing/test-support';
import { GENERAL } from 'vault/tests/helpers/general-selectors';
const renderComponent = () => {
return render(hbs`
<Sidebar::Frame @isVisible={{true}}>
<Sidebar::Nav::Cluster />
</Sidebar::Frame>
`);
};
module('Integration | Component | sidebar-nav-cluster', function (hooks) {
setupRenderingTest(hooks);
hooks.beforeEach(function () {
this.flags = this.owner.lookup('service:flags');
setRunOptions({
rules: {
// This is an issue with Hds::SideNav::Header::HomeLink
'aria-prohibited-attr': { enabled: false },
// TODO: fix use Dropdown on user-menu
'nested-interactive': { enabled: false },
},
});
});
test('it should render nav headings', async function (assert) {
const headings = ['Vault', 'Monitoring', 'Settings'];
stubFeaturesAndPermissions(this.owner, true, true);
await renderComponent();
assert
.dom('[data-test-sidebar-nav-heading]')
.exists({ count: headings.length }, 'Correct number of headings render');
headings.forEach((heading) => {
assert
.dom(`[data-test-sidebar-nav-heading="${heading}"]`)
.hasText(heading, `${heading} heading renders`);
});
});
test('it should hide links and headings user does not have access too', async function (assert) {
await renderComponent();
assert
.dom('[data-test-sidebar-nav-link]')
.exists({ count: 2 }, 'Nav links are hidden other than secrets and dashboard');
assert
.dom('[data-test-sidebar-nav-heading]')
.exists({ count: 1 }, 'Headings are hidden other than Vault');
});
test('it should render nav links', async function (assert) {
const links = [
'Dashboard',
'Secrets Engines',
'Secrets Sync',
'Access',
'Policies',
'Tools',
'Replication',
'Raft Storage',
'Client Count',
'Vault Usage',
'License',
'Seal Vault',
'System Messages',
'UI Login Rules',
];
stubFeaturesAndPermissions(this.owner, true, true);
await renderComponent();
assert
.dom('[data-test-sidebar-nav-link]')
.exists({ count: links.length }, 'Correct number of links render');
links.forEach((link) => {
assert.dom(`[data-test-sidebar-nav-link="${link}"]`).hasText(link, `${link} link renders`);
});
});
test('it should hide enterprise related links in child namespace', async function (assert) {
const links = [
'Disaster Recovery',
'Performance',
'Replication',
'Raft Storage',
'License',
'Seal Vault',
];
this.owner.lookup('service:namespace').set('path', 'foo');
const stubs = stubFeaturesAndPermissions(this.owner, true, true);
stubs.hasNavPermission.callsFake((route) => route !== 'clients');
await renderComponent();
assert
.dom('[data-test-sidebar-nav-heading="Monitoring"]')
.doesNotExist(
'Monitoring heading is hidden in child namespace when user does not have access to Client Count'
);
links.forEach((link) => {
assert
.dom(`[data-test-sidebar-nav-link="${link}"]`)
.doesNotExist(`${link} is hidden in child namespace`);
});
});
test('it should hide client counts link in chroot namespace', async function (assert) {
this.owner.lookup('service:permissions').setPaths({
data: {
chroot_namespace: 'admin',
root: true,
},
});
this.owner.lookup('service:currentCluster').setCluster({
id: 'foo',
anyReplicationEnabled: true,
usingRaft: true,
hasChrootNamespace: true,
});
const links = ['Client Counts', 'Replication', 'Raft Storage', 'License', 'Seal Vault'];
await renderComponent();
assert
.dom('[data-test-sidebar-nav-heading="Monitoring"]')
.doesNotExist('Monitoring heading is hidden in chroot namespace');
links.forEach((link) => {
assert
.dom(`[data-test-sidebar-nav-link="${link}"]`)
.doesNotExist(`${link} is hidden in chroot namespace`);
});
});
test('it should render badge for promotional links on managed clusters', async function (assert) {
this.flags.featureFlags = ['VAULT_CLOUD_ADMIN_NAMESPACE'];
const promotionalLinks = ['Secrets Sync'];
stubFeaturesAndPermissions(this.owner, true, true);
await renderComponent();
promotionalLinks.forEach((link) => {
assert
.dom(`[data-test-sidebar-nav-link="${link}"]`)
.hasText(`${link} Plus`, `${link} link renders Plus badge`);
});
});
// Secrets Sync side nav link has multiple combinations of three variables to test:
// 1. cluster type: enterprise (on and off license), HVD managed or community
// 2. activation status: activated or not
// 3. permissions: policy access to sys/sync routes or not
test('community: it hides Secrets Sync nav link', async function (assert) {
stubFeaturesAndPermissions(this.owner, false, false);
await renderComponent();
assert.dom(GENERAL.navLink('Secrets Sync')).doesNotExist();
});
test('ent but feature is not on license: it hides Secrets Sync nav link', async function (assert) {
stubFeaturesAndPermissions(this.owner, true, false, []);
await renderComponent();
assert.dom(GENERAL.navLink('Secrets Sync')).doesNotExist();
});
test('ent (on license), activated and permissions: it shows Secrets Sync nav link', async function (assert) {
stubFeaturesAndPermissions(this.owner, true, false, ['Secrets Sync']);
this.flags.activatedFlags = ['secrets-sync'];
await renderComponent();
assert.dom(GENERAL.navLink('Secrets Sync')).exists();
});
test('ent (on license), activated and no permissions: it hides Secrets Sync nav link', async function (assert) {
stubFeaturesAndPermissions(this.owner, true, false, ['Secrets Sync'], false);
this.flags.activatedFlags = ['secrets-sync'];
await renderComponent();
assert.dom(GENERAL.navLink('Secrets Sync')).doesNotExist();
});
test('ent (on license), not activated and permissions: it shows Secrets Sync nav link', async function (assert) {
stubFeaturesAndPermissions(this.owner, true, false, ['Secrets Sync']);
this.flags.activatedFlags = [];
await renderComponent();
assert.dom(GENERAL.navLink('Secrets Sync')).exists();
});
test('ent (on license), not activated and no permissions: it shows Secrets Sync nav link', async function (assert) {
stubFeaturesAndPermissions(this.owner, true, false, ['Secrets Sync'], false);
this.flags.activatedFlags = [];
await renderComponent();
assert.dom(GENERAL.navLink('Secrets Sync')).exists();
});
test('hvd managed: it shows Secrets Sync nav link regardless of activation status or permissions', async function (assert) {
stubFeaturesAndPermissions(this.owner, true, false, [], false);
this.flags.featureFlags = ['VAULT_CLOUD_ADMIN_NAMESPACE'];
this.flags.activatedFlags = [];
await renderComponent();
assert.dom(GENERAL.navLink('Secrets Sync')).exists();
});
test('it shows Vault Usage when user is enterprise and in root namespace', async function (assert) {
stubFeaturesAndPermissions(this.owner, true);
await renderComponent();
assert.dom(GENERAL.navLink('Vault Usage')).exists();
});
test('it does NOT show Vault Usage when user is user is on CE || OSS || community', async function (assert) {
stubFeaturesAndPermissions(this.owner, false);
await renderComponent();
assert.dom(GENERAL.navLink('Vault Usage')).doesNotExist();
});
test('it does NOT show Vault Usage when user is enterprise but not in root namespace', async function (assert) {
stubFeaturesAndPermissions(this.owner, true);
this.owner.lookup('service:namespace').set('path', 'foo');
await renderComponent();
assert.dom(GENERAL.navLink('Vault Usage')).doesNotExist();
});
test('it does NOT show Vault Usage when user lacks the necessary permission', async function (assert) {
// no permissions
stubFeaturesAndPermissions(this.owner, true, false, [], false);
await renderComponent();
assert.dom(GENERAL.navLink('Vault Usage')).doesNotExist();
});
test('it does NOT Vault Usage if the user has the necessary permission but user is on CE || OSS || community', async function (assert) {
// no permissions
const stubs = stubFeaturesAndPermissions(this.owner, false, false, [], false);
// allow the route
stubs.hasNavPermission.callsFake((route) => route === 'monitoring');
await renderComponent();
assert.dom(GENERAL.navLink('Vault Usage')).doesNotExist();
});
test('it shows Vault Usage when user is in HVD admin namespace', async function (assert) {
const stubs = stubFeaturesAndPermissions(this.owner, true, false, [], false);
stubs.hasNavPermission.callsFake((route) => route === 'monitoring');
this.flags.featureFlags = ['VAULT_CLOUD_ADMIN_NAMESPACE'];
const namespace = this.owner.lookup('service:namespace');
namespace.setNamespace('admin');
await renderComponent();
assert.dom(GENERAL.navLink('Vault Usage')).exists();
});
});