mirror of
https://github.com/hashicorp/vault.git
synced 2025-08-23 15:41:07 +02:00
* UI: Adding routes for custom login settings (#30404) * adding route block * adding to side nav * jk its diff * adding TODO, adding empty files * UI: Adding List view component for custom login settings (#30459) * first pass setting up list view * style fix * messing with routes * fix * undo * using mock data * renaming * [UI] API Service Error Parsing (#30454) * adds error parsing method to api service * replaces apiErrorMessage util instances with api service parseError * removes apiErrorMessage util and tests * removes ApiError type * fixes issue in isLocalStorageSupported error handling * remove cli folder (#30458) * [DOCS] Add explicit links to older release notes (#30461) * Add explicit links to older release notes * remove domain from URLs * add link to important changes as well * bump timeout for single flaky test (#30460) * adds list response parsing to api service (#30455) * update versions, and replace summary in important changes section (#30471) * Update CHANGELOG.md (#30456) * UI: Update Enterprise Client Count Datepicker (#30349) * date picker changes (mostly) for ent client counts * Move edit modal button + padding * only show start time in dropdown and add changelog * remove unused variable and update toggle width * remove unnecessary period end dates * tidy * update tests * Update changelog/30349.txt Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com> * improve date logic * add export button back in, re-arrange header, update dropdown * update when date is shown * add default for retention months * update tests and remove unnecessary tests * account for retention months that are not whole periods * update logic to show end date on export modal * update exported file name --------- Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com> * Prevent early-exit of plugin reload (#30329) * update to use util, update to this.cap --------- Co-authored-by: Jordan Reimer <zofskeez@gmail.com> Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com> Co-authored-by: Angel Garbarino <Monkeychip@users.noreply.github.com> Co-authored-by: Ellie <ellie.sterner@hashicorp.com> Co-authored-by: Tony Wittinger <anwittin@users.noreply.github.com> Co-authored-by: lane-wetmore <lane.wetmore@hashicorp.com> Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com> Co-authored-by: kpcraig <3031348+kpcraig@users.noreply.github.com> * UI: Create details component for custom login rules (#30530) * setup * adding to view * fixing table keys * add breadcrumbs * fixes * removing default vals * pr comments * adding delete button to toolbar * adding delete functionality * reorder and fix error handling * updating api call, adding error template, fixing selectors * remove param * UI: Updating visibility attr on auth config to be a toggle with direct login link (#30548) * updating visibility attr to be a toggle, adding link placeholder * update test * test fix pt2 * updating to build link + copy button * updates * use the right word * using hds text * updating helper text, path * use encode directly * updating capabilities check, creating test files, empty state * UI: Update custom login to use api instead of mirage (#30640) * updating to use api, removing store * temp test fix * fixes on types, remove test funcs * fix assertion * adding tests * updating test * adding to tests * stub delete? * removing stubs, updating tests * fixes * moving cmd placement, updating inheritance * adding changelog * fix changelog * pr comments * update check & update test * remove empty state block * remove comment * Revert "remove empty state block" This reverts commit ce34d8c76fea3b43bb96c6acd342a5ba0471f441. * remove the right empty state --------- Co-authored-by: Jordan Reimer <zofskeez@gmail.com> Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com> Co-authored-by: Angel Garbarino <Monkeychip@users.noreply.github.com> Co-authored-by: Ellie <ellie.sterner@hashicorp.com> Co-authored-by: Tony Wittinger <anwittin@users.noreply.github.com> Co-authored-by: lane-wetmore <lane.wetmore@hashicorp.com> Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com> Co-authored-by: kpcraig <3031348+kpcraig@users.noreply.github.com>
266 lines
9.3 KiB
JavaScript
266 lines
9.3 KiB
JavaScript
/**
|
|
* Copyright (c) HashiCorp, Inc.
|
|
* SPDX-License-Identifier: BUSL-1.1
|
|
*/
|
|
|
|
import { module, test } from 'qunit';
|
|
import { setupRenderingTest } from 'ember-qunit';
|
|
import { render } from '@ember/test-helpers';
|
|
import hbs from 'htmlbars-inline-precompile';
|
|
import { stubFeaturesAndPermissions } from 'vault/tests/helpers/components/sidebar-nav';
|
|
import { setRunOptions } from 'ember-a11y-testing/test-support';
|
|
import { GENERAL } from 'vault/tests/helpers/general-selectors';
|
|
|
|
const renderComponent = () => {
|
|
return render(hbs`
|
|
<Sidebar::Frame @isVisible={{true}}>
|
|
<Sidebar::Nav::Cluster />
|
|
</Sidebar::Frame>
|
|
`);
|
|
};
|
|
|
|
module('Integration | Component | sidebar-nav-cluster', function (hooks) {
|
|
setupRenderingTest(hooks);
|
|
|
|
hooks.beforeEach(function () {
|
|
this.flags = this.owner.lookup('service:flags');
|
|
setRunOptions({
|
|
rules: {
|
|
// This is an issue with Hds::SideNav::Header::HomeLink
|
|
'aria-prohibited-attr': { enabled: false },
|
|
// TODO: fix use Dropdown on user-menu
|
|
'nested-interactive': { enabled: false },
|
|
},
|
|
});
|
|
});
|
|
|
|
test('it should render nav headings', async function (assert) {
|
|
const headings = ['Vault', 'Monitoring', 'Settings'];
|
|
stubFeaturesAndPermissions(this.owner, true, true);
|
|
await renderComponent();
|
|
|
|
assert
|
|
.dom('[data-test-sidebar-nav-heading]')
|
|
.exists({ count: headings.length }, 'Correct number of headings render');
|
|
headings.forEach((heading) => {
|
|
assert
|
|
.dom(`[data-test-sidebar-nav-heading="${heading}"]`)
|
|
.hasText(heading, `${heading} heading renders`);
|
|
});
|
|
});
|
|
|
|
test('it should hide links and headings user does not have access too', async function (assert) {
|
|
await renderComponent();
|
|
|
|
assert
|
|
.dom('[data-test-sidebar-nav-link]')
|
|
.exists({ count: 2 }, 'Nav links are hidden other than secrets and dashboard');
|
|
assert
|
|
.dom('[data-test-sidebar-nav-heading]')
|
|
.exists({ count: 1 }, 'Headings are hidden other than Vault');
|
|
});
|
|
|
|
test('it should render nav links', async function (assert) {
|
|
const links = [
|
|
'Dashboard',
|
|
'Secrets Engines',
|
|
'Secrets Sync',
|
|
'Access',
|
|
'Policies',
|
|
'Tools',
|
|
'Replication',
|
|
'Raft Storage',
|
|
'Client Count',
|
|
'Vault Usage',
|
|
'License',
|
|
'Seal Vault',
|
|
'System Messages',
|
|
'UI Login Rules',
|
|
];
|
|
stubFeaturesAndPermissions(this.owner, true, true);
|
|
await renderComponent();
|
|
|
|
assert
|
|
.dom('[data-test-sidebar-nav-link]')
|
|
.exists({ count: links.length }, 'Correct number of links render');
|
|
links.forEach((link) => {
|
|
assert.dom(`[data-test-sidebar-nav-link="${link}"]`).hasText(link, `${link} link renders`);
|
|
});
|
|
});
|
|
|
|
test('it should hide enterprise related links in child namespace', async function (assert) {
|
|
const links = [
|
|
'Disaster Recovery',
|
|
'Performance',
|
|
'Replication',
|
|
'Raft Storage',
|
|
'License',
|
|
'Seal Vault',
|
|
];
|
|
this.owner.lookup('service:namespace').set('path', 'foo');
|
|
const stubs = stubFeaturesAndPermissions(this.owner, true, true);
|
|
stubs.hasNavPermission.callsFake((route) => route !== 'clients');
|
|
|
|
await renderComponent();
|
|
|
|
assert
|
|
.dom('[data-test-sidebar-nav-heading="Monitoring"]')
|
|
.doesNotExist(
|
|
'Monitoring heading is hidden in child namespace when user does not have access to Client Count'
|
|
);
|
|
|
|
links.forEach((link) => {
|
|
assert
|
|
.dom(`[data-test-sidebar-nav-link="${link}"]`)
|
|
.doesNotExist(`${link} is hidden in child namespace`);
|
|
});
|
|
});
|
|
|
|
test('it should hide client counts link in chroot namespace', async function (assert) {
|
|
this.owner.lookup('service:permissions').setPaths({
|
|
data: {
|
|
chroot_namespace: 'admin',
|
|
root: true,
|
|
},
|
|
});
|
|
this.owner.lookup('service:currentCluster').setCluster({
|
|
id: 'foo',
|
|
anyReplicationEnabled: true,
|
|
usingRaft: true,
|
|
hasChrootNamespace: true,
|
|
});
|
|
const links = ['Client Counts', 'Replication', 'Raft Storage', 'License', 'Seal Vault'];
|
|
|
|
await renderComponent();
|
|
assert
|
|
.dom('[data-test-sidebar-nav-heading="Monitoring"]')
|
|
.doesNotExist('Monitoring heading is hidden in chroot namespace');
|
|
links.forEach((link) => {
|
|
assert
|
|
.dom(`[data-test-sidebar-nav-link="${link}"]`)
|
|
.doesNotExist(`${link} is hidden in chroot namespace`);
|
|
});
|
|
});
|
|
|
|
test('it should render badge for promotional links on managed clusters', async function (assert) {
|
|
this.flags.featureFlags = ['VAULT_CLOUD_ADMIN_NAMESPACE'];
|
|
const promotionalLinks = ['Secrets Sync'];
|
|
stubFeaturesAndPermissions(this.owner, true, true);
|
|
await renderComponent();
|
|
|
|
promotionalLinks.forEach((link) => {
|
|
assert
|
|
.dom(`[data-test-sidebar-nav-link="${link}"]`)
|
|
.hasText(`${link} Plus`, `${link} link renders Plus badge`);
|
|
});
|
|
});
|
|
|
|
// Secrets Sync side nav link has multiple combinations of three variables to test:
|
|
// 1. cluster type: enterprise (on and off license), HVD managed or community
|
|
// 2. activation status: activated or not
|
|
// 3. permissions: policy access to sys/sync routes or not
|
|
|
|
test('community: it hides Secrets Sync nav link', async function (assert) {
|
|
stubFeaturesAndPermissions(this.owner, false, false);
|
|
await renderComponent();
|
|
assert.dom(GENERAL.navLink('Secrets Sync')).doesNotExist();
|
|
});
|
|
|
|
test('ent but feature is not on license: it hides Secrets Sync nav link', async function (assert) {
|
|
stubFeaturesAndPermissions(this.owner, true, false, []);
|
|
await renderComponent();
|
|
assert.dom(GENERAL.navLink('Secrets Sync')).doesNotExist();
|
|
});
|
|
|
|
test('ent (on license), activated and permissions: it shows Secrets Sync nav link', async function (assert) {
|
|
stubFeaturesAndPermissions(this.owner, true, false, ['Secrets Sync']);
|
|
this.flags.activatedFlags = ['secrets-sync'];
|
|
await renderComponent();
|
|
assert.dom(GENERAL.navLink('Secrets Sync')).exists();
|
|
});
|
|
|
|
test('ent (on license), activated and no permissions: it hides Secrets Sync nav link', async function (assert) {
|
|
stubFeaturesAndPermissions(this.owner, true, false, ['Secrets Sync'], false);
|
|
this.flags.activatedFlags = ['secrets-sync'];
|
|
await renderComponent();
|
|
assert.dom(GENERAL.navLink('Secrets Sync')).doesNotExist();
|
|
});
|
|
|
|
test('ent (on license), not activated and permissions: it shows Secrets Sync nav link', async function (assert) {
|
|
stubFeaturesAndPermissions(this.owner, true, false, ['Secrets Sync']);
|
|
this.flags.activatedFlags = [];
|
|
await renderComponent();
|
|
assert.dom(GENERAL.navLink('Secrets Sync')).exists();
|
|
});
|
|
|
|
test('ent (on license), not activated and no permissions: it shows Secrets Sync nav link', async function (assert) {
|
|
stubFeaturesAndPermissions(this.owner, true, false, ['Secrets Sync'], false);
|
|
this.flags.activatedFlags = [];
|
|
await renderComponent();
|
|
assert.dom(GENERAL.navLink('Secrets Sync')).exists();
|
|
});
|
|
|
|
test('hvd managed: it shows Secrets Sync nav link regardless of activation status or permissions', async function (assert) {
|
|
stubFeaturesAndPermissions(this.owner, true, false, [], false);
|
|
this.flags.featureFlags = ['VAULT_CLOUD_ADMIN_NAMESPACE'];
|
|
this.flags.activatedFlags = [];
|
|
await renderComponent();
|
|
assert.dom(GENERAL.navLink('Secrets Sync')).exists();
|
|
});
|
|
|
|
test('it shows Vault Usage when user is enterprise and in root namespace', async function (assert) {
|
|
stubFeaturesAndPermissions(this.owner, true);
|
|
await renderComponent();
|
|
assert.dom(GENERAL.navLink('Vault Usage')).exists();
|
|
});
|
|
|
|
test('it does NOT show Vault Usage when user is user is on CE || OSS || community', async function (assert) {
|
|
stubFeaturesAndPermissions(this.owner, false);
|
|
await renderComponent();
|
|
assert.dom(GENERAL.navLink('Vault Usage')).doesNotExist();
|
|
});
|
|
|
|
test('it does NOT show Vault Usage when user is enterprise but not in root namespace', async function (assert) {
|
|
stubFeaturesAndPermissions(this.owner, true);
|
|
|
|
this.owner.lookup('service:namespace').set('path', 'foo');
|
|
|
|
await renderComponent();
|
|
assert.dom(GENERAL.navLink('Vault Usage')).doesNotExist();
|
|
});
|
|
|
|
test('it does NOT show Vault Usage when user lacks the necessary permission', async function (assert) {
|
|
// no permissions
|
|
stubFeaturesAndPermissions(this.owner, true, false, [], false);
|
|
|
|
await renderComponent();
|
|
assert.dom(GENERAL.navLink('Vault Usage')).doesNotExist();
|
|
});
|
|
|
|
test('it does NOT Vault Usage if the user has the necessary permission but user is on CE || OSS || community', async function (assert) {
|
|
// no permissions
|
|
const stubs = stubFeaturesAndPermissions(this.owner, false, false, [], false);
|
|
|
|
// allow the route
|
|
stubs.hasNavPermission.callsFake((route) => route === 'monitoring');
|
|
|
|
await renderComponent();
|
|
|
|
assert.dom(GENERAL.navLink('Vault Usage')).doesNotExist();
|
|
});
|
|
|
|
test('it shows Vault Usage when user is in HVD admin namespace', async function (assert) {
|
|
const stubs = stubFeaturesAndPermissions(this.owner, true, false, [], false);
|
|
stubs.hasNavPermission.callsFake((route) => route === 'monitoring');
|
|
|
|
this.flags.featureFlags = ['VAULT_CLOUD_ADMIN_NAMESPACE'];
|
|
|
|
const namespace = this.owner.lookup('service:namespace');
|
|
namespace.setNamespace('admin');
|
|
|
|
await renderComponent();
|
|
|
|
assert.dom(GENERAL.navLink('Vault Usage')).exists();
|
|
});
|
|
});
|