2018-09-25 16:28:26 +00:00
|
|
|
import Service from '@ember/service';
|
|
|
|
import { module, test } from 'qunit';
|
|
|
|
import { setupRenderingTest } from 'ember-qunit';
|
|
|
|
import { render } from '@ember/test-helpers';
|
2018-07-19 01:59:04 +00:00
|
|
|
import hbs from 'htmlbars-inline-precompile';
|
|
|
|
import sinon from 'sinon';
|
|
|
|
import { create } from 'ember-cli-page-object';
|
|
|
|
import controlGroup from '../../pages/components/control-group';
|
|
|
|
|
|
|
|
const component = create(controlGroup);
|
|
|
|
|
2018-09-25 16:28:26 +00:00
|
|
|
const controlGroupService = Service.extend({
|
2018-07-19 01:59:04 +00:00
|
|
|
init() {
|
2018-09-25 16:28:26 +00:00
|
|
|
this._super(...arguments);
|
2018-07-19 01:59:04 +00:00
|
|
|
this.set('wrapInfo', null);
|
|
|
|
},
|
|
|
|
wrapInfoForAccessor() {
|
Ember-cli upgrade from ~3.8 to ~3.20 (#9972)
* Update ember-cli to ~3.20
* Remove bad optional-feature
* Remove ember-fetch dep
* re-install ember-fetch
* update model fragments pr
* update ember model fragments correct package name
* update ember composable helpers to solve array helper error
* update ember-concurrency
* add back engine dependencies, automatically removed during ember-cli-upgrade
* make author-form-options component js file otherwise error
* for now comment out withTestWaiter
* add eslint-node and fix if not with unless in templates
* fix linting for tab index of false is now -1 and add type button to all buttons without types
* fix href errors for linting, likely have to come back and fix
* using eslint fix flag to fix all this.gets
* ember modules codemode removed files that had module twice, will fix in next commit
* finish codemode ember-data-codemod needed to rename const model
* more this.get removal codemode did not work
* cont. removal of this.get
* stop mixin rules until figure out how to reconfig them all
* smaller eslint ignores
* get codemode
* testing app small fixes to bring it back after all the changes
* small changes to eslint
* test removal of getProperties
* fix issue with baseKey because value could be unknown needed to add a question mark in nested get
* smaller linting fixes
* get nested fixes
* small linting error fixes
* small linting changes
* working through more small linting changes
* another round of linting modifications
* liniting fixes
* ember module codemod
* quinit dom codemod
* angle bracket codemod
* discovered that components must have js files
* ran all codemods this is all that's left
* small changes to fix get needs two object, should not have been using get.
* fix issue with one input in form field
* fun times with set and onChange from oninput
* fix issue with model not being passed through on secret-edit-display
* fix issue with yarn run test not working, revert without npm run all
* linting and small fix when loading without a selectAuthBackend
* fix failing test with ui-wizard issue
* fix test failure due to model not being asked for correctly with new changes, probably run into this more.
* fix issue with component helper and at props specific to wizard
* rename log to clilog due to conflict with new eslint rule
* small changes for test failures
* component helper at fixes
* Revert to old component style something with new one broke this and can't figure it out for now
* small fishy smelling test fixes will revisit
* small test changes
* more small test changes, appears upgrade treats spaces differently
* comment out code and test that no longer seems relevant but confirm
* clean run on component test though still some potential timing issues on ui-console test
* fixing one auth test issue and timing issue on enable-test
* small mods
* fix this conditional check from upgrade
* linting fixes after master merge
* package updates using yarn upgrade-interactive
* update libraries that did not effect any of the test failures.
* update ember truth helpers library
* settling tests
* Fix ui-panel control group output
* fix features selection test failures
* Fix auth tests (x-vault-token)
* fix shared test
* fix issue with data null on backend
* Revert "Fix auth tests (x-vault-token)"
This reverts commit 89cb174b2f1998efa56d9604d14131415ae65d6f.
* Fix auth tests (x-vault-token) without updating this.set
* Update redirect-to tests
* fix wrapped token test
* skip some flaky test
* fix issue with href and a tags vs buttons
* fix linting
* updates to get tests running (#10409)
* yarn isntall
* increasing resource_class
* whoops
* trying large
* back to xlarge
* Fix param issue on transform item routes
* test fixes
* settle on policies (old) test
* fix browserstack test warning and skips of test confirmed worked
* Fix redirect-to test
* skips
* fix transformation test and skip some kmip
* Skip tests
* Add meep marker to remaining failing tests
* Skip test with failing component
* rever skip on secret-create test
* Skip piece of test that fails due to navigation-input
* fix settings test where can and skip in others after confirming
* fix circle ci test failures
* ssh role settle
* Fix navigate-input and add settled to test
* Remove extra import
* secret cubbyhole and alicloud
* Add settled to gcpkms test
* settles on redirect to test
* Bump browserstack test resource to large
* Update browserstack resource size to xlarge
* update todos
* add back in withTestWaiter
* try and fix credentials conditional action added comment instead
* Update volatile computed properies to get functions
* this step was never reached and we never defined secretType anywhere so I removed
* add settled to policy old test
* Fix navigate-input on policies and leases
* replace ssh test with no var hoping that helps and add settled to other failing tests, unskip console tests
* kmip, transit, role test remove a skip and add in settled
* fix hover copy button, had to remove some testing functionality
* Remove private router service
* remove skip on control ssh and ui panel, fix search select by restructuring how to read the error
* final bit of working through skipped test
* Replace clearNonGlobalModels by linking directly to namespace with href-to
* Remove unused var
* Fix role-ssh id bug by updating form-field-from-model to form-field-group-loop
* Fix transit create id would not update
* Update option toggle selector for ssh-role
* Fix ssh selector
* cleanup pt1
* small clean up
* cleanup part2
* Fix computed on pricing-metrics-form
* small cleanup based on chelseas comments.
Co-authored-by: Chelsea Shaw <chelshaw.dev@gmail.com>
Co-authored-by: Sarah Thompson <sthompson@hashicorp.com>
2020-12-03 23:00:22 +00:00
|
|
|
return this.wrapInfo;
|
2018-07-19 01:59:04 +00:00
|
|
|
},
|
|
|
|
});
|
|
|
|
|
2018-09-25 16:28:26 +00:00
|
|
|
const authService = Service.extend();
|
2018-07-19 01:59:04 +00:00
|
|
|
|
2018-09-25 16:28:26 +00:00
|
|
|
module('Integration | Component | control group', function(hooks) {
|
|
|
|
setupRenderingTest(hooks);
|
|
|
|
|
|
|
|
hooks.beforeEach(function() {
|
|
|
|
this.owner.register('service:auth', authService);
|
|
|
|
this.owner.register('service:control-group', controlGroupService);
|
|
|
|
this.controlGroup = this.owner.lookup('service:controlGroup');
|
|
|
|
this.auth = this.owner.lookup('service:auth');
|
|
|
|
});
|
2018-07-19 01:59:04 +00:00
|
|
|
|
2018-09-25 16:28:26 +00:00
|
|
|
const setup = (modelData = {}, authData = {}) => {
|
|
|
|
let modelDefaults = {
|
|
|
|
approved: false,
|
|
|
|
requestPath: 'foo/bar',
|
|
|
|
id: 'accessor',
|
|
|
|
requestEntity: { id: 'requestor', name: 'entity8509' },
|
|
|
|
reload: sinon.stub(),
|
|
|
|
};
|
|
|
|
let authDataDefaults = { entity_id: 'requestor' };
|
|
|
|
|
|
|
|
return {
|
|
|
|
model: {
|
|
|
|
...modelDefaults,
|
|
|
|
...modelData,
|
|
|
|
},
|
|
|
|
authData: {
|
|
|
|
...authDataDefaults,
|
|
|
|
...authData,
|
|
|
|
},
|
|
|
|
};
|
2018-07-19 01:59:04 +00:00
|
|
|
};
|
|
|
|
|
2018-09-25 16:28:26 +00:00
|
|
|
test('requestor rendering', async function(assert) {
|
|
|
|
let { model, authData } = setup();
|
|
|
|
this.set('model', model);
|
|
|
|
this.set('auth.authData', authData);
|
|
|
|
await render(hbs`{{control-group model=model}}`);
|
|
|
|
assert.ok(component.showsAccessorCallout, 'shows accessor callout');
|
|
|
|
assert.equal(component.bannerPrefix, 'Locked');
|
2019-03-30 17:07:52 +00:00
|
|
|
assert.equal(component.bannerText, 'The path you requested is locked by a Control Group');
|
2018-09-25 16:28:26 +00:00
|
|
|
assert.equal(component.requestorText, `You are requesting access to ${model.requestPath}`);
|
|
|
|
assert.equal(component.showsTokenText, false, 'does not show token message when there is no token');
|
|
|
|
assert.ok(component.showsRefresh, 'shows refresh button');
|
|
|
|
assert.ok(component.authorizationText, 'Awaiting authorization.');
|
|
|
|
});
|
|
|
|
|
|
|
|
test('requestor rendering: with token', async function(assert) {
|
|
|
|
let { model, authData } = setup();
|
|
|
|
this.set('model', model);
|
|
|
|
this.set('auth.authData', authData);
|
|
|
|
this.set('controlGroup.wrapInfo', { token: 'token' });
|
|
|
|
await render(hbs`{{control-group model=model}}`);
|
|
|
|
assert.equal(component.showsTokenText, true, 'shows token message');
|
|
|
|
assert.equal(component.token, 'token', 'shows token value');
|
|
|
|
});
|
|
|
|
|
|
|
|
test('requestor rendering: some approvals', async function(assert) {
|
|
|
|
let { model, authData } = setup({ authorizations: [{ name: 'manager 1' }, { name: 'manager 2' }] });
|
|
|
|
this.set('model', model);
|
|
|
|
this.set('auth.authData', authData);
|
|
|
|
await render(hbs`{{control-group model=model}}`);
|
|
|
|
assert.ok(component.authorizationText, 'Already approved by manager 1, manager 2');
|
|
|
|
});
|
|
|
|
|
|
|
|
test('requestor rendering: approved with no token', async function(assert) {
|
|
|
|
let { model, authData } = setup({ approved: true });
|
|
|
|
this.set('model', model);
|
|
|
|
this.set('auth.authData', authData);
|
|
|
|
await render(hbs`{{control-group model=model}}`);
|
|
|
|
|
|
|
|
assert.equal(component.bannerPrefix, 'Success!');
|
|
|
|
assert.equal(component.bannerText, 'You have been given authorization');
|
|
|
|
assert.equal(component.showsTokenText, false, 'does not show token message when there is no token');
|
|
|
|
assert.notOk(component.showsRefresh, 'does not shows refresh button');
|
|
|
|
assert.ok(component.showsSuccessComponent, 'renders control group success');
|
|
|
|
});
|
|
|
|
|
|
|
|
test('requestor rendering: approved with token', async function(assert) {
|
|
|
|
let { model, authData } = setup({ approved: true });
|
|
|
|
this.set('model', model);
|
|
|
|
this.set('auth.authData', authData);
|
|
|
|
this.set('controlGroup.wrapInfo', { token: 'token' });
|
|
|
|
await render(hbs`{{control-group model=model}}`);
|
|
|
|
assert.equal(component.showsTokenText, true, 'shows token');
|
|
|
|
assert.notOk(component.showsRefresh, 'does not shows refresh button');
|
|
|
|
assert.ok(component.showsSuccessComponent, 'renders control group success');
|
|
|
|
});
|
|
|
|
|
|
|
|
test('authorizer rendering', async function(assert) {
|
|
|
|
let { model, authData } = setup({ canAuthorize: true }, { entity_id: 'manager' });
|
|
|
|
|
|
|
|
this.set('model', model);
|
|
|
|
this.set('auth.authData', authData);
|
|
|
|
await render(hbs`{{control-group model=model}}`);
|
|
|
|
|
|
|
|
assert.equal(component.bannerPrefix, 'Locked');
|
2019-03-30 17:07:52 +00:00
|
|
|
assert.equal(component.bannerText, 'Someone is requesting access to a path locked by a Control Group');
|
2018-09-25 16:28:26 +00:00
|
|
|
assert.equal(
|
|
|
|
component.requestorText,
|
|
|
|
`${model.requestEntity.name} is requesting access to ${model.requestPath}`
|
|
|
|
);
|
|
|
|
assert.equal(component.showsTokenText, false, 'does not show token message when there is no token');
|
|
|
|
|
|
|
|
assert.ok(component.showsAuthorize, 'shows authorize button');
|
|
|
|
});
|
|
|
|
|
|
|
|
test('authorizer rendering:authorized', async function(assert) {
|
|
|
|
let { model, authData } = setup(
|
|
|
|
{ canAuthorize: true, authorizations: [{ id: 'manager', name: 'manager' }] },
|
|
|
|
{ entity_id: 'manager' }
|
|
|
|
);
|
|
|
|
|
|
|
|
this.set('model', model);
|
|
|
|
this.set('auth.authData', authData);
|
|
|
|
await render(hbs`{{control-group model=model}}`);
|
|
|
|
|
|
|
|
assert.equal(component.bannerPrefix, 'Thanks!');
|
|
|
|
assert.equal(component.bannerText, 'You have given authorization');
|
|
|
|
assert.ok(component.showsBackLink, 'back link is visible');
|
|
|
|
});
|
|
|
|
|
|
|
|
test('authorizer rendering: authorized and success', async function(assert) {
|
|
|
|
let { model, authData } = setup(
|
|
|
|
{ approved: true, canAuthorize: true, authorizations: [{ id: 'manager', name: 'manager' }] },
|
|
|
|
{ entity_id: 'manager' }
|
|
|
|
);
|
|
|
|
|
|
|
|
this.set('model', model);
|
|
|
|
this.set('auth.authData', authData);
|
|
|
|
await render(hbs`{{control-group model=model}}`);
|
|
|
|
|
|
|
|
assert.equal(component.bannerPrefix, 'Thanks!');
|
|
|
|
assert.equal(component.bannerText, 'You have given authorization');
|
|
|
|
assert.ok(component.showsBackLink, 'back link is visible');
|
|
|
|
assert.equal(
|
|
|
|
component.requestorText,
|
|
|
|
`${model.requestEntity.name} is authorized to access ${model.requestPath}`
|
|
|
|
);
|
|
|
|
assert.notOk(component.showsSuccessComponent, 'does not render control group success');
|
|
|
|
});
|
|
|
|
|
|
|
|
test('third-party: success', async function(assert) {
|
|
|
|
let { model, authData } = setup(
|
|
|
|
{ approved: true, canAuthorize: true, authorizations: [{ id: 'foo', name: 'foo' }] },
|
|
|
|
{ entity_id: 'manager' }
|
|
|
|
);
|
|
|
|
|
|
|
|
this.set('model', model);
|
|
|
|
this.set('auth.authData', authData);
|
|
|
|
await render(hbs`{{control-group model=model}}`);
|
|
|
|
assert.equal(component.bannerPrefix, 'Success!');
|
2019-03-30 17:07:52 +00:00
|
|
|
assert.equal(component.bannerText, 'This Control Group has been authorized');
|
2018-09-25 16:28:26 +00:00
|
|
|
assert.ok(component.showsBackLink, 'back link is visible');
|
|
|
|
assert.notOk(component.showsSuccessComponent, 'does not render control group success');
|
|
|
|
});
|
2018-07-19 01:59:04 +00:00
|
|
|
});
|