5c2a08de6d
* Update browserslist * Add browserslistrc * ember-cli-update --to 3.26, fix conflicts * Run codemodes that start with ember-* * More codemods - before cp* * More codemods (curly data-test-*) * WIP ember-basic-dropdown template errors * updates ember-basic-dropdown and related deps to fix build issues * updates basic dropdown instances to new version API * updates more deps -- ember-template-lint is working again * runs no-implicit-this codemod * creates and runs no-quoteless-attributes codemod * runs angle brackets codemod * updates lint:hbs globs to only touch hbs files * removes yield only templates * creates and runs deprecated args transform * supresses lint error for invokeAction on LinkTo component * resolves remaining ambiguous path lint errors * resolves simple-unless lint errors * adds warnings for deprecated tagName arg on LinkTo components * adds warnings for remaining curly component invocation * updates global template lint rules * resolves remaining template lint errors * disables some ember specfic lint rules that target pre octane patterns * js lint fix run * resolves remaining js lint errors * fixes test run * adds npm-run-all dep * fixes test attribute issues * fixes console acceptance tests * fixes tests * adds yield only wizard/tutorial-active template * fixes more tests * attempts to fix more flaky tests * removes commented out settled in transit test * updates deprecations workflow and adds initializer to filter by version * updates flaky policies acl old test * updates to flaky transit test * bumps ember deps down to LTS version * runs linters after main merge * fixes client count tests after bad merge conflict fixes * fixes client count history test * more updates to lint config * another round of hbs lint fixes after extending stylistic rule * updates lint-staged commands * removes indent eslint rule since it seems to break things * fixes bad attribute in transform-edit-form template * test fixes * fixes enterprise tests * adds changelog * removes deprecated ember-concurrency-test-waiters dep and adds @ember/test-waiters * flaky test fix Co-authored-by: hashishaw <cshaw@hashicorp.com>
180 lines
6.9 KiB
JavaScript
180 lines
6.9 KiB
JavaScript
import Service from '@ember/service';
|
|
import { module, test } from 'qunit';
|
|
import { setupRenderingTest } from 'ember-qunit';
|
|
import { render } from '@ember/test-helpers';
|
|
import hbs from 'htmlbars-inline-precompile';
|
|
import sinon from 'sinon';
|
|
import { create } from 'ember-cli-page-object';
|
|
import controlGroup from '../../pages/components/control-group';
|
|
|
|
const component = create(controlGroup);
|
|
|
|
const controlGroupService = Service.extend({
|
|
init() {
|
|
this._super(...arguments);
|
|
this.set('wrapInfo', null);
|
|
},
|
|
wrapInfoForAccessor() {
|
|
return this.wrapInfo;
|
|
},
|
|
});
|
|
|
|
const authService = Service.extend();
|
|
|
|
module('Integration | Component | control group', function (hooks) {
|
|
setupRenderingTest(hooks);
|
|
|
|
hooks.beforeEach(function () {
|
|
this.owner.register('service:auth', authService);
|
|
this.owner.register('service:control-group', controlGroupService);
|
|
this.controlGroup = this.owner.lookup('service:controlGroup');
|
|
this.auth = this.owner.lookup('service:auth');
|
|
});
|
|
|
|
const setup = (modelData = {}, authData = {}) => {
|
|
let modelDefaults = {
|
|
approved: false,
|
|
requestPath: 'foo/bar',
|
|
id: 'accessor',
|
|
requestEntity: { id: 'requestor', name: 'entity8509' },
|
|
reload: sinon.stub(),
|
|
};
|
|
let authDataDefaults = { entity_id: 'requestor' };
|
|
|
|
return {
|
|
model: {
|
|
...modelDefaults,
|
|
...modelData,
|
|
},
|
|
authData: {
|
|
...authDataDefaults,
|
|
...authData,
|
|
},
|
|
};
|
|
};
|
|
|
|
test('requestor rendering', async function (assert) {
|
|
let { model, authData } = setup();
|
|
this.set('model', model);
|
|
this.set('auth.authData', authData);
|
|
await render(hbs`{{control-group model=model}}`);
|
|
assert.ok(component.showsAccessorCallout, 'shows accessor callout');
|
|
assert.equal(component.bannerPrefix, 'Locked');
|
|
assert.equal(component.bannerText, 'The path you requested is locked by a Control Group');
|
|
assert.equal(component.requestorText, `You are requesting access to ${model.requestPath}`);
|
|
assert.equal(component.showsTokenText, false, 'does not show token message when there is no token');
|
|
assert.ok(component.showsRefresh, 'shows refresh button');
|
|
assert.ok(component.authorizationText, 'Awaiting authorization.');
|
|
});
|
|
|
|
test('requestor rendering: with token', async function (assert) {
|
|
let { model, authData } = setup();
|
|
this.set('model', model);
|
|
this.set('auth.authData', authData);
|
|
this.set('controlGroup.wrapInfo', { token: 'token' });
|
|
await render(hbs`{{control-group model=model}}`);
|
|
assert.equal(component.showsTokenText, true, 'shows token message');
|
|
assert.equal(component.token, 'token', 'shows token value');
|
|
});
|
|
|
|
test('requestor rendering: some approvals', async function (assert) {
|
|
let { model, authData } = setup({ authorizations: [{ name: 'manager 1' }, { name: 'manager 2' }] });
|
|
this.set('model', model);
|
|
this.set('auth.authData', authData);
|
|
await render(hbs`{{control-group model=model}}`);
|
|
assert.ok(component.authorizationText, 'Already approved by manager 1, manager 2');
|
|
});
|
|
|
|
test('requestor rendering: approved with no token', async function (assert) {
|
|
let { model, authData } = setup({ approved: true });
|
|
this.set('model', model);
|
|
this.set('auth.authData', authData);
|
|
await render(hbs`{{control-group model=model}}`);
|
|
|
|
assert.equal(component.bannerPrefix, 'Success!');
|
|
assert.equal(component.bannerText, 'You have been given authorization');
|
|
assert.equal(component.showsTokenText, false, 'does not show token message when there is no token');
|
|
assert.notOk(component.showsRefresh, 'does not shows refresh button');
|
|
assert.ok(component.showsSuccessComponent, 'renders control group success');
|
|
});
|
|
|
|
test('requestor rendering: approved with token', async function (assert) {
|
|
let { model, authData } = setup({ approved: true });
|
|
this.set('model', model);
|
|
this.set('auth.authData', authData);
|
|
this.set('controlGroup.wrapInfo', { token: 'token' });
|
|
await render(hbs`{{control-group model=model}}`);
|
|
assert.equal(component.showsTokenText, true, 'shows token');
|
|
assert.notOk(component.showsRefresh, 'does not shows refresh button');
|
|
assert.ok(component.showsSuccessComponent, 'renders control group success');
|
|
});
|
|
|
|
test('authorizer rendering', async function (assert) {
|
|
let { model, authData } = setup({ canAuthorize: true }, { entity_id: 'manager' });
|
|
|
|
this.set('model', model);
|
|
this.set('auth.authData', authData);
|
|
await render(hbs`{{control-group model=model}}`);
|
|
|
|
assert.equal(component.bannerPrefix, 'Locked');
|
|
assert.equal(component.bannerText, 'Someone is requesting access to a path locked by a Control Group');
|
|
assert.equal(
|
|
component.requestorText,
|
|
`${model.requestEntity.name} is requesting access to ${model.requestPath}`
|
|
);
|
|
assert.equal(component.showsTokenText, false, 'does not show token message when there is no token');
|
|
|
|
assert.ok(component.showsAuthorize, 'shows authorize button');
|
|
});
|
|
|
|
test('authorizer rendering:authorized', async function (assert) {
|
|
let { model, authData } = setup(
|
|
{ canAuthorize: true, authorizations: [{ id: 'manager', name: 'manager' }] },
|
|
{ entity_id: 'manager' }
|
|
);
|
|
|
|
this.set('model', model);
|
|
this.set('auth.authData', authData);
|
|
await render(hbs`{{control-group model=model}}`);
|
|
|
|
assert.equal(component.bannerPrefix, 'Thanks!');
|
|
assert.equal(component.bannerText, 'You have given authorization');
|
|
assert.ok(component.showsBackLink, 'back link is visible');
|
|
});
|
|
|
|
test('authorizer rendering: authorized and success', async function (assert) {
|
|
let { model, authData } = setup(
|
|
{ approved: true, canAuthorize: true, authorizations: [{ id: 'manager', name: 'manager' }] },
|
|
{ entity_id: 'manager' }
|
|
);
|
|
|
|
this.set('model', model);
|
|
this.set('auth.authData', authData);
|
|
await render(hbs`{{control-group model=model}}`);
|
|
|
|
assert.equal(component.bannerPrefix, 'Thanks!');
|
|
assert.equal(component.bannerText, 'You have given authorization');
|
|
assert.ok(component.showsBackLink, 'back link is visible');
|
|
assert.equal(
|
|
component.requestorText,
|
|
`${model.requestEntity.name} is authorized to access ${model.requestPath}`
|
|
);
|
|
assert.notOk(component.showsSuccessComponent, 'does not render control group success');
|
|
});
|
|
|
|
test('third-party: success', async function (assert) {
|
|
let { model, authData } = setup(
|
|
{ approved: true, canAuthorize: true, authorizations: [{ id: 'foo', name: 'foo' }] },
|
|
{ entity_id: 'manager' }
|
|
);
|
|
|
|
this.set('model', model);
|
|
this.set('auth.authData', authData);
|
|
await render(hbs`{{control-group model=model}}`);
|
|
assert.equal(component.bannerPrefix, 'Success!');
|
|
assert.equal(component.bannerText, 'This Control Group has been authorized');
|
|
assert.ok(component.showsBackLink, 'back link is visible');
|
|
assert.notOk(component.showsSuccessComponent, 'does not render control group success');
|
|
});
|
|
});
|