2018-09-25 16:28:26 +00:00
|
|
|
import { click, fillIn, find, currentURL, settled, visit } from '@ember/test-helpers';
|
|
|
|
import { module, test } from 'qunit';
|
|
|
|
import { setupApplicationTest } from 'ember-qunit';
|
2018-04-03 14:16:57 +00:00
|
|
|
import { encodeString } from 'vault/utils/b64';
|
2018-09-25 16:28:26 +00:00
|
|
|
import authPage from 'vault/tests/pages/auth';
|
|
|
|
import enablePage from 'vault/tests/pages/settings/mount-secret-backend';
|
2020-02-13 20:03:28 +00:00
|
|
|
import secretListPage from 'vault/tests/pages/secrets/backend/list';
|
2018-04-03 14:16:57 +00:00
|
|
|
|
2019-06-20 13:37:27 +00:00
|
|
|
const keyTypes = [
|
|
|
|
{
|
|
|
|
name: ts => `aes-${ts}`,
|
|
|
|
type: 'aes256-gcm96',
|
|
|
|
exportable: true,
|
|
|
|
supportsEncryption: true,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: ts => `aes-convergent-${ts}`,
|
|
|
|
type: 'aes256-gcm96',
|
|
|
|
convergent: true,
|
|
|
|
supportsEncryption: true,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: ts => `chacha-${ts}`,
|
|
|
|
type: 'chacha20-poly1305',
|
|
|
|
exportable: true,
|
|
|
|
supportsEncryption: true,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: ts => `chacha-convergent-${ts}`,
|
|
|
|
type: 'chacha20-poly1305',
|
|
|
|
convergent: true,
|
|
|
|
supportsEncryption: true,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: ts => `ecdsa-${ts}`,
|
|
|
|
type: 'ecdsa-p256',
|
|
|
|
exportable: true,
|
|
|
|
supportsSigning: true,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: ts => `ed25519-${ts}`,
|
|
|
|
type: 'ed25519',
|
|
|
|
derived: true,
|
|
|
|
supportsSigning: true,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: ts => `rsa-2048-${ts}`,
|
|
|
|
type: `rsa-2048`,
|
|
|
|
supportsSigning: true,
|
|
|
|
supportsEncryption: true,
|
|
|
|
},
|
2020-02-15 22:40:50 +00:00
|
|
|
{
|
|
|
|
name: ts => `rsa-3072-${ts}`,
|
|
|
|
type: `rsa-3072`,
|
|
|
|
supportsSigning: true,
|
|
|
|
supportsEncryption: true,
|
|
|
|
},
|
2019-06-20 13:37:27 +00:00
|
|
|
{
|
|
|
|
name: ts => `rsa-4096-${ts}`,
|
|
|
|
type: `rsa-4096`,
|
|
|
|
supportsSigning: true,
|
|
|
|
supportsEncryption: true,
|
|
|
|
},
|
|
|
|
];
|
2018-04-03 14:16:57 +00:00
|
|
|
|
2019-06-20 13:37:27 +00:00
|
|
|
let generateTransitKey = async function(key, now) {
|
|
|
|
let name = key.name(now);
|
|
|
|
await click('[data-test-secret-create]');
|
|
|
|
await fillIn('[data-test-transit-key-name]', name);
|
|
|
|
await fillIn('[data-test-transit-key-type]', key.type);
|
|
|
|
if (key.exportable) {
|
|
|
|
await click('[data-test-transit-key-exportable]');
|
|
|
|
}
|
|
|
|
if (key.derived) {
|
|
|
|
await click('[data-test-transit-key-derived]');
|
|
|
|
}
|
|
|
|
if (key.convergent) {
|
|
|
|
await click('[data-test-transit-key-convergent-encryption]');
|
2018-09-25 16:28:26 +00:00
|
|
|
}
|
2019-06-20 13:37:27 +00:00
|
|
|
await click('[data-test-transit-key-create]');
|
2018-09-25 16:28:26 +00:00
|
|
|
await settled();
|
2019-06-20 13:37:27 +00:00
|
|
|
|
|
|
|
// link back to the list
|
|
|
|
await click('[data-test-secret-root-link]');
|
|
|
|
await settled();
|
|
|
|
return name;
|
2018-04-03 14:16:57 +00:00
|
|
|
};
|
|
|
|
|
2019-06-20 13:37:27 +00:00
|
|
|
const testConvergentEncryption = async function(assert, keyName) {
|
2018-04-03 14:16:57 +00:00
|
|
|
const tests = [
|
|
|
|
// raw bytes for plaintext and context
|
|
|
|
{
|
|
|
|
plaintext: 'NaXud2QW7KjyK6Me9ggh+zmnCeBGdG93LQED49PtoOI=',
|
|
|
|
context: 'nqR8LiVgNh/lwO2rArJJE9F9DMhh0lKo4JX9DAAkCDw=',
|
|
|
|
encodePlaintext: false,
|
|
|
|
encodeContext: false,
|
|
|
|
assertAfterEncrypt: key => {
|
2020-03-16 22:48:11 +00:00
|
|
|
assert.dom('.modal.is-active').exists(`${key}: Modal opens after encrypt`);
|
2018-04-03 14:16:57 +00:00
|
|
|
assert.ok(
|
2020-03-16 22:48:11 +00:00
|
|
|
/vault:/.test(find('[data-test-encrypted-value="ciphertext"]').innerText),
|
2018-04-03 14:16:57 +00:00
|
|
|
`${key}: ciphertext shows a vault-prefixed ciphertext`
|
|
|
|
);
|
|
|
|
},
|
|
|
|
assertBeforeDecrypt: key => {
|
2020-03-16 22:48:11 +00:00
|
|
|
assert.dom('.modal.is-active').doesNotExist(`${key}: Modal not open before decrypt`);
|
2018-05-24 03:10:21 +00:00
|
|
|
assert
|
|
|
|
.dom('[data-test-transit-input="context"]')
|
|
|
|
.hasValue(
|
|
|
|
'nqR8LiVgNh/lwO2rArJJE9F9DMhh0lKo4JX9DAAkCDw=',
|
|
|
|
`${key}: the ui shows the base64-encoded context`
|
|
|
|
);
|
2018-04-03 14:16:57 +00:00
|
|
|
},
|
|
|
|
|
|
|
|
assertAfterDecrypt: key => {
|
2020-03-16 22:48:11 +00:00
|
|
|
assert.dom('.modal.is-active').exists(`${key}: Modal opens after decrypt`);
|
2020-03-04 17:36:37 +00:00
|
|
|
assert.equal(
|
2020-03-16 22:48:11 +00:00
|
|
|
find('[data-test-encrypted-value="plaintext"]').innerText,
|
2020-03-04 17:36:37 +00:00
|
|
|
'NaXud2QW7KjyK6Me9ggh+zmnCeBGdG93LQED49PtoOI=',
|
|
|
|
`${key}: the ui shows the base64-encoded plaintext`
|
|
|
|
);
|
2018-04-03 14:16:57 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
// raw bytes for plaintext, string for context
|
|
|
|
{
|
|
|
|
plaintext: 'NaXud2QW7KjyK6Me9ggh+zmnCeBGdG93LQED49PtoOI=',
|
|
|
|
context: encodeString('context'),
|
|
|
|
encodePlaintext: false,
|
|
|
|
encodeContext: false,
|
|
|
|
assertAfterEncrypt: key => {
|
2020-03-16 22:48:11 +00:00
|
|
|
assert.dom('.modal.is-active').exists(`${key}: Modal opens after encrypt`);
|
2018-04-03 14:16:57 +00:00
|
|
|
assert.ok(
|
2020-03-16 22:48:11 +00:00
|
|
|
/vault:/.test(find('[data-test-encrypted-value="ciphertext"]').innerText),
|
2018-04-03 14:16:57 +00:00
|
|
|
`${key}: ciphertext shows a vault-prefixed ciphertext`
|
|
|
|
);
|
|
|
|
},
|
|
|
|
assertBeforeDecrypt: key => {
|
2020-03-16 22:48:11 +00:00
|
|
|
assert.dom('.modal.is-active').doesNotExist(`${key}: Modal not open before decrypt`);
|
2018-05-24 03:10:21 +00:00
|
|
|
assert
|
|
|
|
.dom('[data-test-transit-input="context"]')
|
|
|
|
.hasValue(encodeString('context'), `${key}: the ui shows the input context`);
|
2018-04-03 14:16:57 +00:00
|
|
|
},
|
|
|
|
assertAfterDecrypt: key => {
|
2020-03-16 22:48:11 +00:00
|
|
|
assert.dom('.modal.is-active').exists(`${key}: Modal opens after decrypt`);
|
2020-03-04 17:36:37 +00:00
|
|
|
assert.equal(
|
2020-03-16 22:48:11 +00:00
|
|
|
find('[data-test-encrypted-value="plaintext"]').innerText,
|
2020-03-04 17:36:37 +00:00
|
|
|
'NaXud2QW7KjyK6Me9ggh+zmnCeBGdG93LQED49PtoOI=',
|
|
|
|
`${key}: the ui shows the base64-encoded plaintext`
|
|
|
|
);
|
2018-04-03 14:16:57 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
// base64 input
|
|
|
|
{
|
|
|
|
plaintext: encodeString('This is the secret'),
|
|
|
|
context: encodeString('context'),
|
|
|
|
encodePlaintext: false,
|
|
|
|
encodeContext: false,
|
|
|
|
assertAfterEncrypt: key => {
|
2020-03-16 22:48:11 +00:00
|
|
|
assert.dom('.modal.is-active').exists(`${key}: Modal opens after encrypt`);
|
2018-04-03 14:16:57 +00:00
|
|
|
assert.ok(
|
2020-03-16 22:48:11 +00:00
|
|
|
/vault:/.test(find('[data-test-encrypted-value="ciphertext"]').innerText),
|
2018-04-03 14:16:57 +00:00
|
|
|
`${key}: ciphertext shows a vault-prefixed ciphertext`
|
|
|
|
);
|
|
|
|
},
|
|
|
|
assertBeforeDecrypt: key => {
|
2020-03-16 22:48:11 +00:00
|
|
|
assert.dom('.modal.is-active').doesNotExist(`${key}: Modal not open before decrypt`);
|
2018-05-24 03:10:21 +00:00
|
|
|
assert
|
|
|
|
.dom('[data-test-transit-input="context"]')
|
|
|
|
.hasValue(encodeString('context'), `${key}: the ui shows the input context`);
|
2018-04-03 14:16:57 +00:00
|
|
|
},
|
|
|
|
assertAfterDecrypt: key => {
|
2020-03-16 22:48:11 +00:00
|
|
|
assert.dom('.modal.is-active').exists(`${key}: Modal opens after decrypt`);
|
2020-03-04 17:36:37 +00:00
|
|
|
assert.equal(
|
2020-03-16 22:48:11 +00:00
|
|
|
find('[data-test-encrypted-value="plaintext"]').innerText,
|
|
|
|
encodeString('This is the secret'),
|
2020-03-04 17:36:37 +00:00
|
|
|
`${key}: the ui decodes plaintext`
|
|
|
|
);
|
2018-04-03 14:16:57 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
|
|
|
|
// string input
|
|
|
|
{
|
|
|
|
plaintext: 'There are many secrets 🤐',
|
|
|
|
context: 'secret 2',
|
|
|
|
encodePlaintext: true,
|
|
|
|
encodeContext: true,
|
|
|
|
assertAfterEncrypt: key => {
|
2020-03-16 22:48:11 +00:00
|
|
|
assert.dom('.modal.is-active').exists(`${key}: Modal opens after encrypt`);
|
2018-04-03 14:16:57 +00:00
|
|
|
assert.ok(
|
2020-03-16 22:48:11 +00:00
|
|
|
/vault:/.test(find('[data-test-encrypted-value="ciphertext"]').innerText),
|
2018-04-03 14:16:57 +00:00
|
|
|
`${key}: ciphertext shows a vault-prefixed ciphertext`
|
|
|
|
);
|
|
|
|
},
|
|
|
|
assertBeforeDecrypt: key => {
|
2020-03-16 22:48:11 +00:00
|
|
|
assert.dom('.modal.is-active').doesNotExist(`${key}: Modal not open before decrypt`);
|
2018-05-24 03:10:21 +00:00
|
|
|
assert
|
|
|
|
.dom('[data-test-transit-input="context"]')
|
|
|
|
.hasValue(encodeString('secret 2'), `${key}: the ui shows the encoded context`);
|
2018-04-03 14:16:57 +00:00
|
|
|
},
|
|
|
|
assertAfterDecrypt: key => {
|
2020-03-16 22:48:11 +00:00
|
|
|
assert.dom('.modal.is-active').exists(`${key}: Modal opens after decrypt`);
|
2020-03-04 17:36:37 +00:00
|
|
|
assert.equal(
|
2020-03-16 22:48:11 +00:00
|
|
|
find('[data-test-encrypted-value="plaintext"]').innerText,
|
|
|
|
encodeString('There are many secrets 🤐'),
|
2020-03-04 17:36:37 +00:00
|
|
|
`${key}: the ui decodes plaintext`
|
|
|
|
);
|
2018-04-03 14:16:57 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
];
|
|
|
|
|
2018-09-25 16:28:26 +00:00
|
|
|
for (let testCase of tests) {
|
|
|
|
await click('[data-test-transit-action-link="encrypt"]');
|
2020-03-04 17:36:37 +00:00
|
|
|
find('#plaintext-control .CodeMirror').CodeMirror.setValue(testCase.plaintext);
|
2018-09-25 16:28:26 +00:00
|
|
|
await fillIn('[data-test-transit-input="context"]', testCase.context);
|
2020-03-04 17:36:37 +00:00
|
|
|
if (!testCase.encodePlaintext) {
|
|
|
|
// If value is already encoded, check the box
|
|
|
|
await click('input[data-test-transit-input="encodedBase64"]');
|
2018-04-03 14:16:57 +00:00
|
|
|
}
|
|
|
|
if (testCase.encodeContext) {
|
2018-09-25 16:28:26 +00:00
|
|
|
await click('[data-test-transit-b64-toggle="context"]');
|
2018-04-03 14:16:57 +00:00
|
|
|
}
|
2020-03-16 22:48:11 +00:00
|
|
|
assert.dom('.modal.is-active').doesNotExist(`${name}: is not open before encrypt`);
|
2018-09-25 16:28:26 +00:00
|
|
|
await click('[data-test-button-encrypt]');
|
2019-06-20 13:37:27 +00:00
|
|
|
await settled();
|
2018-04-03 14:16:57 +00:00
|
|
|
if (testCase.assertAfterEncrypt) {
|
2018-09-25 16:28:26 +00:00
|
|
|
testCase.assertAfterEncrypt(keyName);
|
2018-04-03 14:16:57 +00:00
|
|
|
}
|
2020-03-16 22:48:11 +00:00
|
|
|
// store ciphertext for decryption step
|
|
|
|
const copiedCiphertext = find('[data-test-encrypted-value="ciphertext"]').innerText;
|
|
|
|
await click('[data-test-modal-background]');
|
|
|
|
await settled();
|
|
|
|
assert.dom('.modal.is-active').doesNotExist(`${name}: Modal closes after background clicked`);
|
2018-09-25 16:28:26 +00:00
|
|
|
await click('[data-test-transit-action-link="decrypt"]');
|
2019-06-20 13:37:27 +00:00
|
|
|
await settled();
|
2018-04-03 14:16:57 +00:00
|
|
|
if (testCase.assertBeforeDecrypt) {
|
2018-09-25 16:28:26 +00:00
|
|
|
testCase.assertBeforeDecrypt(keyName);
|
2018-04-03 14:16:57 +00:00
|
|
|
}
|
2020-03-16 22:48:11 +00:00
|
|
|
find('#ciphertext-control .CodeMirror').CodeMirror.setValue(copiedCiphertext);
|
2018-09-25 16:28:26 +00:00
|
|
|
await click('[data-test-button-decrypt]');
|
2019-06-20 13:37:27 +00:00
|
|
|
await settled();
|
2018-04-03 14:16:57 +00:00
|
|
|
|
|
|
|
if (testCase.assertAfterDecrypt) {
|
2020-03-16 22:48:11 +00:00
|
|
|
testCase.assertAfterDecrypt(keyName);
|
2018-04-03 14:16:57 +00:00
|
|
|
}
|
2020-03-16 22:48:11 +00:00
|
|
|
|
|
|
|
await click('[data-test-modal-background]');
|
|
|
|
await settled();
|
|
|
|
assert.dom('.modal.is-active').doesNotExist(`${name}: Modal closes after background clicked`);
|
2018-09-25 16:28:26 +00:00
|
|
|
}
|
2018-04-03 14:16:57 +00:00
|
|
|
};
|
2018-09-25 16:28:26 +00:00
|
|
|
module('Acceptance | transit', function(hooks) {
|
|
|
|
setupApplicationTest(hooks);
|
2019-06-20 13:37:27 +00:00
|
|
|
let path;
|
|
|
|
let now;
|
2018-04-03 14:16:57 +00:00
|
|
|
|
2018-09-25 16:28:26 +00:00
|
|
|
hooks.beforeEach(async function() {
|
|
|
|
await authPage.login();
|
2019-06-20 13:37:27 +00:00
|
|
|
now = new Date().getTime();
|
|
|
|
path = `transit-${now}`;
|
2018-04-03 14:16:57 +00:00
|
|
|
|
2019-06-20 13:37:27 +00:00
|
|
|
await enablePage.enable('transit', path);
|
|
|
|
await settled();
|
2018-09-25 16:28:26 +00:00
|
|
|
});
|
2018-04-03 14:16:57 +00:00
|
|
|
|
2020-02-13 20:03:28 +00:00
|
|
|
test(`transit backend: list menu`, async function(assert) {
|
|
|
|
await generateTransitKey(keyTypes[0], now);
|
|
|
|
await secretListPage.secrets.objectAt(0).menuToggle();
|
|
|
|
assert.equal(secretListPage.menuItems.length, 2, 'shows 2 items in the menu');
|
|
|
|
});
|
2019-06-20 13:37:27 +00:00
|
|
|
for (let key of keyTypes) {
|
|
|
|
test(`transit backend: ${key.type}`, async function(assert) {
|
|
|
|
let name = await generateTransitKey(key, now);
|
|
|
|
await visit(`vault/secrets/${path}/show/${name}`);
|
|
|
|
await settled();
|
|
|
|
await click('[data-test-transit-link="versions"]');
|
|
|
|
// wait for capabilities
|
|
|
|
await settled();
|
|
|
|
assert.dom('[data-test-transit-key-version-row]').exists({ count: 1 }, `${name}: only one key version`);
|
Update ui dependencies (#7244)
* be more specific about node version, and specify a yarn version
* update ember, ember-cli, ember-data, ember-data-model-fragments
* use router handlers to access transition information
* fix shadowing of component helper
* update ivy-codemirror, ember-cli-inject-live-reload
* remove custom router service
* don't use transition.queryParams
* update ember-cli-deprecation-workflow
* refactor kv v1 to use 'path' instead of 'id' on creation
* fix auth-jwt-test and toolbar-link-test
* update ember composable helpers
* remove Ember.copy from test file
* no more deprecations in the workflow
* fix more secret tests
* fix remaining failed tests
* move select component to core because it's used by ttl-picker
* generate new model class for each test instead of reusing an existing one
* fix selectors on kmip tests
* refactor how control groups construct urls from the new transition objects
* add router service override back in, and have it be evented so that we can trigger router events on it
* move stories and markdown files to core if the component lives in core
* update ember-cli, ember-cli-babel, ember-auto-import
* update base64js, date-fns, deepmerge, codemirror, broccoli-asset-rev
* update linting rules
* fix test selectors
* update ember-api-actions, ember-concurrency, ember-load-initializers, escape-string-regexp, normalize.css, prettier-eslint-cli, jsdoc-to-markdown
* remove test-results dir
* update base64js, ember-cli-clipboard, ember-cli-sass, ember-cli-string-helpers, ember-cli-template-lint, ember-cli-uglify, ember-link-action
* fix linting
* run yarn install without restoring from cache
* refactor how tests are run and handle the vault server subprocess
* update makefile for new test task names
* update circle config to use the new yarn task
* fix writing the seal keys when starting the dev server
* remove optional deps from the lockfile
* don't ignore-optional on yarn install
* remove errant console.log
* update ember-basic-dropdown-hover, jsonlint, yargs-parser
* update ember-cli-flash
* add back optionalDeps
* update @babel/core@7.5.5, ember-basic-dropdown@1.1.3, eslint-plugin-ember@6.8.2
* update storybook to the latest release
* add a babel config with targets so that the ember babel plugin works properly
* update ember-resolver, move ember-cli-storybook to devDependencies
* revert normalize.css upgrade
* silence fetchadapter warning for now
* exclude 3rd party array helper now that ember includes one
* fix switch and entity lookup styling
* only add -root suffix if it's not in versions mode
* make sure drop always has an array on the aws role form
* fix labels like we did with the backport
* update eslintignore
* update the yarn version in the docker build file
* update eslint ignore
2019-08-19 20:45:39 +00:00
|
|
|
await click('[data-test-confirm-action-trigger]');
|
2019-06-20 13:37:27 +00:00
|
|
|
await click('[data-test-confirm-button]');
|
|
|
|
// wait for rotate call
|
|
|
|
await settled();
|
|
|
|
assert
|
|
|
|
.dom('[data-test-transit-key-version-row]')
|
|
|
|
.exists({ count: 2 }, `${name}: two key versions after rotate`);
|
2018-09-25 16:28:26 +00:00
|
|
|
await click('[data-test-transit-key-actions-link]');
|
2019-06-20 13:37:27 +00:00
|
|
|
await settled();
|
2018-08-16 17:48:24 +00:00
|
|
|
assert.ok(
|
2020-02-14 17:20:44 +00:00
|
|
|
currentURL().startsWith(`/vault/secrets/${path}/show/${name}?tab=actions`),
|
|
|
|
`${name}: navigates to transit actions`
|
2019-06-20 13:37:27 +00:00
|
|
|
);
|
2020-02-14 17:20:44 +00:00
|
|
|
|
|
|
|
const keyAction = key.supportsEncryption ? 'encrypt' : 'sign';
|
|
|
|
const actionTitle = find(`[data-test-transit-action-title=${keyAction}]`).innerText.toLowerCase();
|
|
|
|
|
|
|
|
assert.equal(
|
|
|
|
actionTitle.includes(keyAction),
|
|
|
|
true,
|
|
|
|
`shows a card with title that links to the ${name} transit action`
|
|
|
|
);
|
|
|
|
|
|
|
|
await click(`[data-test-transit-card=${keyAction}]`);
|
|
|
|
await settled();
|
2019-06-20 13:37:27 +00:00
|
|
|
assert.ok(
|
|
|
|
find('[data-test-transit-key-version-select]'),
|
|
|
|
`${name}: the rotated key allows you to select versions`
|
2018-04-03 14:16:57 +00:00
|
|
|
);
|
|
|
|
if (key.exportable) {
|
|
|
|
assert.ok(
|
2018-09-25 16:28:26 +00:00
|
|
|
find('[data-test-transit-action-link="export"]'),
|
2019-06-20 13:37:27 +00:00
|
|
|
`${name}: exportable key has a link to export action`
|
2018-04-03 14:16:57 +00:00
|
|
|
);
|
|
|
|
} else {
|
2018-05-24 03:10:21 +00:00
|
|
|
assert
|
|
|
|
.dom('[data-test-transit-action-link="export"]')
|
2019-06-20 13:37:27 +00:00
|
|
|
.doesNotExist(`${name}: non-exportable key does not link to export action`);
|
2018-04-03 14:16:57 +00:00
|
|
|
}
|
|
|
|
if (key.convergent && key.supportsEncryption) {
|
2019-06-20 13:37:27 +00:00
|
|
|
await testConvergentEncryption(assert, name);
|
2018-04-03 14:16:57 +00:00
|
|
|
}
|
2019-06-20 13:37:27 +00:00
|
|
|
await settled();
|
|
|
|
});
|
|
|
|
}
|
2018-04-03 14:16:57 +00:00
|
|
|
});
|