144 lines
5.4 KiB
JavaScript
144 lines
5.4 KiB
JavaScript
/**
|
|
* Copyright (c) HashiCorp, Inc.
|
|
* SPDX-License-Identifier: MPL-2.0
|
|
*/
|
|
|
|
/* eslint qunit/no-conditional-assertions: "warn" */
|
|
import { click, fillIn, settled, visit, triggerKeyEvent, find, waitUntil } from '@ember/test-helpers';
|
|
import { module, test } from 'qunit';
|
|
import { setupApplicationTest } from 'ember-qunit';
|
|
import { v4 as uuidv4 } from 'uuid';
|
|
|
|
import authPage from 'vault/tests/pages/auth';
|
|
import logout from 'vault/tests/pages/logout';
|
|
import enablePage from 'vault/tests/pages/settings/auth/enable';
|
|
import { supportedAuthBackends } from 'vault/helpers/supported-auth-backends';
|
|
import { supportedManagedAuthBackends } from 'vault/helpers/supported-managed-auth-backends';
|
|
import { create } from 'ember-cli-page-object';
|
|
import consoleClass from 'vault/tests/pages/components/console/ui-panel';
|
|
|
|
const consoleComponent = create(consoleClass);
|
|
|
|
module('Acceptance | auth backend list', function (hooks) {
|
|
setupApplicationTest(hooks);
|
|
|
|
hooks.beforeEach(function () {
|
|
return authPage.login();
|
|
});
|
|
|
|
hooks.afterEach(function () {
|
|
return logout.visit();
|
|
});
|
|
|
|
test('userpass secret backend', async function (assert) {
|
|
let n = Math.random();
|
|
const path1 = `userpass-${++n}`;
|
|
const path2 = `userpass-${++n}`;
|
|
const user1 = 'user1';
|
|
const user2 = 'user2';
|
|
|
|
// enable the first userpass method with one username
|
|
await enablePage.enable('userpass', path1);
|
|
await settled();
|
|
await click('[data-test-save-config="true"]');
|
|
|
|
await visit(`/vault/access/${path1}/item/user/create`);
|
|
await waitUntil(() => find('[data-test-input="username"]') && find('[data-test-textarea]'));
|
|
await fillIn('[data-test-input="username"]', user1);
|
|
await triggerKeyEvent('[data-test-input="username"]', 'keyup', 65);
|
|
await fillIn('[data-test-textarea]', user1);
|
|
await triggerKeyEvent('[data-test-textarea]', 'keyup', 65);
|
|
await click('[data-test-save-config="true"]');
|
|
|
|
// enable the first userpass method with one username
|
|
await visit(`/vault/settings/auth/enable`);
|
|
|
|
await click('[data-test-mount-type="userpass"]');
|
|
|
|
await click('[data-test-mount-next]');
|
|
|
|
await fillIn('[data-test-input="path"]', path2);
|
|
|
|
await click('[data-test-mount-submit="true"]');
|
|
|
|
await click('[data-test-save-config="true"]');
|
|
|
|
await click(`[data-test-auth-backend-link="${path2}"]`);
|
|
|
|
await click('[data-test-entity-create-link="user"]');
|
|
|
|
await fillIn('[data-test-input="username"]', user2);
|
|
await triggerKeyEvent('[data-test-input="username"]', 'keyup', 65);
|
|
await fillIn('[data-test-textarea]', user2);
|
|
await triggerKeyEvent('[data-test-textarea]', 'keyup', 65);
|
|
|
|
await click('[data-test-save-config="true"]');
|
|
|
|
//confirming that the user was created. There was a bug where the apiPath was not being updated when toggling between auth routes
|
|
assert
|
|
.dom('[data-test-list-item-content]')
|
|
.hasText(user2, 'user just created shows in current auth list');
|
|
|
|
//confirm that the auth method 1 shows the user1. There was a bug where it was not updated the list when toggling between auth routes
|
|
await visit(`/vault/access/${path1}/item/user`);
|
|
|
|
assert
|
|
.dom('[data-test-list-item-content]')
|
|
.hasText(user1, 'first user created shows in current auth list');
|
|
});
|
|
|
|
test('auth methods are linkable and link to correct view', async function (assert) {
|
|
assert.expect(16);
|
|
const uid = uuidv4();
|
|
await visit('/vault/access');
|
|
|
|
const supportManaged = supportedManagedAuthBackends();
|
|
const backends = supportedAuthBackends();
|
|
for (const backend of backends) {
|
|
const { type } = backend;
|
|
const path = `auth-list-${type}-${uid}`;
|
|
if (type !== 'token') {
|
|
await enablePage.enable(type, path);
|
|
}
|
|
await settled();
|
|
await visit('/vault/access');
|
|
|
|
// all auth methods should be linkable
|
|
await click(`[data-test-auth-backend-link="${type === 'token' ? type : path}"]`);
|
|
if (!supportManaged.includes(type)) {
|
|
assert.dom('[data-test-auth-section-tab]').exists({ count: 1 });
|
|
assert
|
|
.dom('[data-test-auth-section-tab]')
|
|
.hasText('Configuration', `only shows configuration tab for ${type} auth method`);
|
|
assert.dom('[data-test-doc-link] .doc-link').exists(`includes doc link for ${type} auth method`);
|
|
} else {
|
|
let expectedTabs = 2;
|
|
if (type == 'ldap' || type === 'okta') {
|
|
expectedTabs = 3;
|
|
}
|
|
assert
|
|
.dom('[data-test-auth-section-tab]')
|
|
.exists({ count: expectedTabs }, `has management tabs for ${type} auth method`);
|
|
// cleanup method
|
|
await consoleComponent.runCommands(`delete sys/auth/${path}`);
|
|
}
|
|
}
|
|
});
|
|
|
|
test('enterprise: token config within namespace', async function (assert) {
|
|
const ns = 'ns-wxyz';
|
|
await consoleComponent.runCommands(`write sys/namespaces/${ns} -f`);
|
|
await authPage.loginNs(ns);
|
|
// go directly to token configure route
|
|
await visit('/vault/settings/auth/configure/token/options');
|
|
await fillIn('[data-test-input="description"]', 'My custom description');
|
|
await click('[data-test-save-config="true"]');
|
|
assert.strictEqual(currentURL(), '/vault/access', 'successfully saves and navigates away');
|
|
await click('[data-test-auth-backend-link="token"]');
|
|
assert
|
|
.dom('[data-test-row-value="Description"]')
|
|
.hasText('My custom description', 'description was saved');
|
|
await consoleComponent.runCommands(`delete sys/namespaces/${ns}`);
|
|
});
|
|
});
|