bfba4f5e13
* Rename pages to include roles * Models and adapters * [ui] Any policy checks in the UI now check for roles' policies as well as token policies (#18346) * combinedPolicies as a concept * Classic decorator on role adapter * We added a new request for roles, so the test based on a specific order of requests got fickle fast * Mirage roles cluster scaffolded * Acceptance test for roles and policies on the login page * Update mirage mock for nodes fetch to account for role policies / empty token.policies * Roles-derived policies checks * [ui] Access Control with Roles and Tokens (#18413) * top level policies routes moved into access control * A few more routes and name cleanup * Delog and test fixes to account for new url prefix and document titles * Overview page * Tokens and Roles routes * Tokens helios table * Add a role * Hacky role page and deletion * New policy keyboard shortcut and roles breadcrumb nav * If you leave New Role but havent made any changes, remove the newly-created record from store * Roles index list and general role route crud * Roles index actually links to roles now * Helios button styles for new roles and policies * Handle when you try to create a new role without having any policies * Token editing generally * Create Token functionality * Cant delete self-token but management token editing and deleting is fine * Upgrading helios caused codemirror to explode, shimmed * Policies table fix * without bang-element condition, modifier would refire over and over * Token TTL or Time setting * time will take you on * Mirage hooks for create and list roles * Ensure policy names only use allow characters in mirage mocks * Mirage mocked roles and policies in the default cluster * log and lintfix * chromedriver to 2.1.2 * unused unit tests removed * Nice profile dropdown * With the HDS accordion, rename our internal component scss ref * design revisions after discussion * Tooltip on deleted-policy tokens * Two-step button peripheral isDeleting gcode removed * Never to null on token save * copywrite headers added and empty routefiles removed * acceptance test fixes for policies endpoint * Route for updating a token * Policies testfixes * Ember on-click-outside modifier upgraded with general ember-modifier upgrade * Test adjustments to account for new profile header dropdown * Test adjustments for tokens via policy pages * Removed an unused route * Access Control index page tests * a11y tests * Tokens index acceptance tests generally * Lintfix * Token edit page tests * Token editing tests * New token expiration tests * Roles Index tests * Role editing policies tests * A complete set of Access Control Roles tests * Policies test * Be more specific about which row to check for expiration time * Nil check on expirationTime equality * Management tokens shouldnt show No Roles/Policies, give them their own designation * Route guard on selftoken, conditional columns, and afterModel at parent to prevent orphaned policies on tokens/roles from stopping a new save * Policy unloading on delete and other todos plus autofocus conditionally re-enabled * Invalid policies non-links now a concept for Roles index * HDS style links to make job.variables.alert links look like links again * Mirage finding looks weird so making model async in hash even though redundant * Drop rsvp * RSVP wasnt the problem, cached lookups were * remove old todo comments * de-log
170 lines
6.8 KiB
JavaScript
170 lines
6.8 KiB
JavaScript
/**
|
|
* Copyright (c) HashiCorp, Inc.
|
|
* SPDX-License-Identifier: MPL-2.0
|
|
*/
|
|
|
|
import { module, test } from 'qunit';
|
|
import { visit, currentURL, click, typeIn, findAll } from '@ember/test-helpers';
|
|
import { setupApplicationTest } from 'ember-qunit';
|
|
import { allScenarios } from '../../mirage/scenarios/default';
|
|
import { setupMirage } from 'ember-cli-mirage/test-support';
|
|
import percySnapshot from '@percy/ember';
|
|
import a11yAudit from 'nomad-ui/tests/helpers/a11y-audit';
|
|
|
|
module('Acceptance | policies', function (hooks) {
|
|
setupApplicationTest(hooks);
|
|
setupMirage(hooks);
|
|
|
|
test('Policies index route looks good', async function (assert) {
|
|
assert.expect(4);
|
|
allScenarios.policiesTestCluster(server);
|
|
window.localStorage.nomadTokenSecret = server.db.tokens[0].secretId;
|
|
await visit('/access-control/policies');
|
|
assert.dom('[data-test-gutter-link="access-control"]').exists();
|
|
assert.equal(currentURL(), '/access-control/policies');
|
|
assert
|
|
.dom('[data-test-policy-row]')
|
|
.exists({ count: server.db.policies.length });
|
|
await a11yAudit(assert);
|
|
await percySnapshot(assert);
|
|
// Reset Token
|
|
window.localStorage.nomadTokenSecret = null;
|
|
});
|
|
|
|
test('Prevents policies access if you lack a management token', async function (assert) {
|
|
allScenarios.policiesTestCluster(server);
|
|
window.localStorage.nomadTokenSecret = server.db.tokens[1].secretId;
|
|
await visit('/access-control/policies');
|
|
assert.equal(currentURL(), '/jobs');
|
|
assert.dom('[data-test-gutter-link="access-control"]').doesNotExist();
|
|
// Reset Token
|
|
window.localStorage.nomadTokenSecret = null;
|
|
});
|
|
|
|
test('Modifying an existing policy', async function (assert) {
|
|
allScenarios.policiesTestCluster(server);
|
|
window.localStorage.nomadTokenSecret = server.db.tokens[0].secretId;
|
|
await visit('/access-control/policies');
|
|
await click('[data-test-policy-row]:first-child a');
|
|
// Table sorts by name by default
|
|
let firstPolicy = server.db.policies.sort((a, b) => {
|
|
return a.name.localeCompare(b.name);
|
|
})[0];
|
|
assert.equal(currentURL(), `/access-control/policies/${firstPolicy.name}`);
|
|
assert.dom('[data-test-policy-editor]').exists();
|
|
assert.dom('[data-test-title]').includesText(firstPolicy.name);
|
|
await click('button[data-test-save-policy]');
|
|
assert.dom('.flash-message.alert-success').exists();
|
|
assert.equal(
|
|
currentURL(),
|
|
`/access-control/policies/${firstPolicy.name}`,
|
|
'remain on page after save'
|
|
);
|
|
// Reset Token
|
|
window.localStorage.nomadTokenSecret = null;
|
|
});
|
|
|
|
test('Creating a test token', async function (assert) {
|
|
allScenarios.policiesTestCluster(server);
|
|
window.localStorage.nomadTokenSecret = server.db.tokens[0].secretId;
|
|
await visit('/access-control/policies');
|
|
await click('[data-test-policy-name="Variable-Maker"]');
|
|
assert.equal(currentURL(), '/access-control/policies/Variable-Maker');
|
|
await click('[data-test-create-test-token]');
|
|
assert.dom('.flash-message.alert-success').exists();
|
|
assert
|
|
.dom('[data-test-token-name="Example Token for Variable-Maker"]')
|
|
.exists('Test token is created and visible');
|
|
const newTokenRow = [
|
|
...findAll('[data-test-token-name="Example Token for Variable-Maker"]'),
|
|
][0].parentElement;
|
|
const newTokenDeleteButton = newTokenRow.querySelector(
|
|
'[data-test-delete-token-button]'
|
|
);
|
|
await click(newTokenDeleteButton);
|
|
assert
|
|
.dom('[data-test-token-name="Example Token for Variable-Maker"]')
|
|
.doesNotExist('Token is deleted');
|
|
// Reset Token
|
|
window.localStorage.nomadTokenSecret = null;
|
|
});
|
|
|
|
test('Creating a new policy', async function (assert) {
|
|
assert.expect(7);
|
|
allScenarios.policiesTestCluster(server);
|
|
window.localStorage.nomadTokenSecret = server.db.tokens[0].secretId;
|
|
await visit('/access-control/policies');
|
|
await click('[data-test-create-policy]');
|
|
assert.equal(currentURL(), '/access-control/policies/new');
|
|
await typeIn('[data-test-policy-name-input]', 'My Fun Policy');
|
|
await click('button[data-test-save-policy]');
|
|
assert
|
|
.dom('.flash-message.alert-critical')
|
|
.exists('Doesnt let you save a bad name');
|
|
assert.equal(currentURL(), '/access-control/policies/new');
|
|
document.querySelector('[data-test-policy-name-input]').value = ''; // clear
|
|
await typeIn('[data-test-policy-name-input]', 'My-Fun-Policy');
|
|
await click('button[data-test-save-policy]');
|
|
assert.dom('.flash-message.alert-success').exists();
|
|
assert.equal(
|
|
currentURL(),
|
|
'/access-control/policies/My-Fun-Policy',
|
|
'redirected to the now-created policy'
|
|
);
|
|
await visit('/access-control/policies');
|
|
const newPolicy = [...findAll('[data-test-policy-name]')].filter((a) =>
|
|
a.textContent.includes('My-Fun-Policy')
|
|
)[0];
|
|
assert.ok(newPolicy, 'Policy is in the list');
|
|
await click(newPolicy);
|
|
assert.equal(currentURL(), '/access-control/policies/My-Fun-Policy');
|
|
await percySnapshot(assert);
|
|
// Reset Token
|
|
window.localStorage.nomadTokenSecret = null;
|
|
});
|
|
|
|
test('Deleting a policy', async function (assert) {
|
|
allScenarios.policiesTestCluster(server);
|
|
window.localStorage.nomadTokenSecret = server.db.tokens[0].secretId;
|
|
await visit('/access-control/policies');
|
|
let firstPolicy = server.db.policies.sort((a, b) => {
|
|
return a.name.localeCompare(b.name);
|
|
})[0];
|
|
|
|
const firstPolicyName = firstPolicy.name;
|
|
const firstPolicyLink = [...findAll('[data-test-policy-name]')].filter(
|
|
(row) => row.textContent.includes(firstPolicyName)
|
|
)[0];
|
|
await click(firstPolicyLink);
|
|
assert.equal(currentURL(), `/access-control/policies/${firstPolicyName}`);
|
|
await click('[data-test-delete-policy]');
|
|
assert.dom('.flash-message.alert-success').exists();
|
|
assert.equal(currentURL(), '/access-control/policies');
|
|
assert.dom(`[data-test-policy-name="${firstPolicyName}"]`).doesNotExist();
|
|
// Reset Token
|
|
window.localStorage.nomadTokenSecret = null;
|
|
});
|
|
|
|
test('Policies Index', async function (assert) {
|
|
allScenarios.policiesTestCluster(server);
|
|
window.localStorage.nomadTokenSecret = server.db.tokens[0].secretId;
|
|
await visit('/access-control/policies');
|
|
// Table contains every policy in db
|
|
assert
|
|
.dom('[data-test-policy-row]')
|
|
.exists({ count: server.db.policies.length });
|
|
|
|
assert.dom('[data-test-empty-policies-list-headline]').doesNotExist();
|
|
|
|
// Deleting all policies results in a message
|
|
const policyRows = findAll('[data-test-policy-row]');
|
|
for (const row of policyRows) {
|
|
const deleteButton = row.querySelector('[data-test-delete-policy]');
|
|
await click(deleteButton);
|
|
}
|
|
assert.dom('[data-test-empty-policies-list-headline]').exists();
|
|
// Reset Token
|
|
window.localStorage.nomadTokenSecret = null;
|
|
});
|
|
});
|