open-nomad/ui/tests/unit/abilities/job-test.js

253 lines
7.3 KiB
JavaScript
Raw Normal View History

/* eslint-disable ember/avoid-leaking-state-in-ember-objects */
import { module, test } from 'qunit';
import { setupTest } from 'ember-qunit';
import Service from '@ember/service';
import setupAbility from 'nomad-ui/tests/helpers/setup-ability';
2021-12-28 14:45:20 +00:00
module('Unit | Ability | job', function (hooks) {
setupTest(hooks);
setupAbility('job')(hooks);
2021-12-28 14:45:20 +00:00
test('it permits job run when ACLs are disabled', function (assert) {
const mockToken = Service.extend({
aclEnabled: false,
});
this.owner.register('service:token', mockToken);
assert.ok(this.ability.canRun);
});
2021-12-28 14:45:20 +00:00
test('it permits job run for management tokens', function (assert) {
const mockToken = Service.extend({
aclEnabled: true,
selfToken: { type: 'management' },
});
this.owner.register('service:token', mockToken);
assert.ok(this.ability.canRun);
});
2021-12-28 14:45:20 +00:00
test('it permits job run for client tokens with a policy that has namespace submit-job', function (assert) {
const mockSystem = Service.extend({
aclEnabled: true,
});
const mockToken = Service.extend({
aclEnabled: true,
selfToken: { type: 'client' },
selfTokenPolicies: [
{
rulesJSON: {
Namespaces: [
{
Name: 'aNamespace',
Capabilities: ['submit-job'],
},
],
},
},
],
});
this.owner.register('service:system', mockSystem);
this.owner.register('service:token', mockToken);
assert.ok(this.can.can('run job', null, { namespace: 'aNamespace' }));
});
2021-12-28 14:45:20 +00:00
test('it permits job run for client tokens with a policy that has default namespace submit-job and no capabilities for active namespace', function (assert) {
const mockSystem = Service.extend({
aclEnabled: true,
});
const mockToken = Service.extend({
aclEnabled: true,
selfToken: { type: 'client' },
selfTokenPolicies: [
{
rulesJSON: {
Namespaces: [
{
Name: 'aNamespace',
Capabilities: [],
},
{
Name: 'default',
Capabilities: ['submit-job'],
},
],
},
},
],
});
this.owner.register('service:system', mockSystem);
this.owner.register('service:token', mockToken);
assert.ok(this.can.can('run job', null, { namespace: 'anotherNamespace' }));
});
2021-12-28 14:45:20 +00:00
test('it blocks job run for client tokens with a policy that has no submit-job capability', function (assert) {
const mockSystem = Service.extend({
aclEnabled: true,
});
const mockToken = Service.extend({
aclEnabled: true,
selfToken: { type: 'client' },
selfTokenPolicies: [
{
rulesJSON: {
Namespaces: [
{
Name: 'aNamespace',
Capabilities: ['list-jobs'],
},
],
},
},
],
});
this.owner.register('service:system', mockSystem);
this.owner.register('service:token', mockToken);
assert.ok(this.can.cannot('run job', null, { namespace: 'aNamespace' }));
});
2021-12-28 14:45:20 +00:00
test('job scale requires a client token with the submit-job or scale-job capability', function (assert) {
2020-06-18 05:44:35 +00:00
const makePolicies = (namespace, ...capabilities) => [
{
rulesJSON: {
Namespaces: [
{
Name: namespace,
Capabilities: capabilities,
},
],
},
},
];
const mockSystem = Service.extend({
aclEnabled: true,
});
const mockToken = Service.extend({
aclEnabled: true,
selfToken: { type: 'client' },
selfTokenPolicies: makePolicies('aNamespace'),
});
this.owner.register('service:system', mockSystem);
this.owner.register('service:token', mockToken);
const tokenService = this.owner.lookup('service:token');
assert.ok(this.can.cannot('scale job', null, { namespace: 'aNamespace' }));
2020-06-18 05:44:35 +00:00
tokenService.set('selfTokenPolicies', makePolicies('aNamespace', 'scale-job'));
assert.ok(this.can.can('scale job', null, { namespace: 'aNamespace' }));
2020-06-18 05:44:35 +00:00
tokenService.set('selfTokenPolicies', makePolicies('aNamespace', 'submit-job'));
assert.ok(this.can.can('scale job', null, { namespace: 'aNamespace' }));
2020-06-18 05:44:35 +00:00
tokenService.set('selfTokenPolicies', makePolicies('bNamespace', 'scale-job'));
assert.ok(this.can.cannot('scale job', null, { namespace: 'aNamespace' }));
2020-06-18 05:44:35 +00:00
});
2021-12-28 14:45:20 +00:00
test('job dispatch requires a client token with the dispatch-job capability', function (assert) {
ui: add parameterized dispatch interface (#10675) * ui: add parameterized dispatch interface This commit adds a new interface for dispatching parameteried jobs, if the user has the right permissions. The UI can be accessed by viewing a parameterized job and clicking on the "Dispatch Job" button located in the "Job Launches" section. * fix failing lint test * clean up dispatch and remove meta This commit cleans up a few things that had typos and inconsistent naming. In line with this, the custom `meta` view was removed in favor of using the included `AttributesTable`. * ui: encode dispatch job payload and start adding tests * ui: remove unused test imports * ui: redesign job dispatch form * ui: initial acceptance tests for dispatch job * ui: generate parameterized job children with correct id format * ui: fix job dispatch breadcrumb link * ui: refactor job dispatch component into glimmer component and add form validation * ui: remove unused CSS class * ui: align job dispatch button * ui: handle namespace-specific requests on job dispatch * ui: rename payloadMissing to payloadHasError * ui: don't re-fetch job spec on dispatch job * ui: keep overview tab selected on job dispatch page * ui: fix task and task-group linting * ui: URL encode job id on dispatch job tests * ui: fix error when job meta is null * ui: handle job dispatch from adapter * ui: add more tests for dispatch job page * ui: add "job dispatch" capability check * ui: update job dispatch from code review Co-authored-by: Luiz Aoqui <luiz@hashicorp.com>
2021-07-20 22:27:41 +00:00
const makePolicies = (namespace, ...capabilities) => [
{
rulesJSON: {
Namespaces: [
{
Name: namespace,
Capabilities: capabilities,
},
],
},
},
];
const mockSystem = Service.extend({
aclEnabled: true,
});
const mockToken = Service.extend({
aclEnabled: true,
selfToken: { type: 'client' },
selfTokenPolicies: makePolicies('aNamespace'),
});
this.owner.register('service:system', mockSystem);
this.owner.register('service:token', mockToken);
const tokenService = this.owner.lookup('service:token');
assert.ok(this.can.cannot('dispatch job', null, { namespace: 'aNamespace' }));
tokenService.set('selfTokenPolicies', makePolicies('aNamespace', 'dispatch-job'));
assert.ok(this.can.can('dispatch job', null, { namespace: 'aNamespace' }));
});
2021-12-28 14:45:20 +00:00
test('it handles globs in namespace names', function (assert) {
const mockSystem = Service.extend({
aclEnabled: true,
});
const mockToken = Service.extend({
aclEnabled: true,
selfToken: { type: 'client' },
selfTokenPolicies: [
{
rulesJSON: {
Namespaces: [
{
Name: 'production-*',
Capabilities: ['submit-job'],
},
{
Name: 'production-api',
Capabilities: ['submit-job'],
},
{
Name: 'production-web',
Capabilities: [],
},
{
Name: '*-suffixed',
Capabilities: ['submit-job'],
},
{
Name: '*-more-suffixed',
Capabilities: [],
},
{
Name: '*-abc-*',
Capabilities: ['submit-job'],
},
],
},
},
],
});
this.owner.register('service:system', mockSystem);
this.owner.register('service:token', mockToken);
assert.ok(this.can.cannot('run job', null, { namespace: 'production-web' }));
assert.ok(this.can.can('run job', null, { namespace: 'production-api' }));
assert.ok(this.can.can('run job', null, { namespace: 'production-other' }));
assert.ok(this.can.can('run job', null, { namespace: 'something-suffixed' }));
assert.ok(
this.can.cannot('run job', null, { namespace: 'something-more-suffixed' }),
'expected the namespace with the greatest number of matched characters to be chosen'
);
assert.ok(
this.can.can('run job', null, { namespace: '000-abc-999' }),
'expected to be able to match against more than one wildcard'
);
});
});