open-vault/ui/tests/acceptance/auth-list-test.js
claire bontempo 5f64520dac
UI: remove references to comma separation for string array edit types (#20163)
* remove intercepting helpText

* add subtext directly to StringList input component

* update tests and add coverage for new openapi-attrs util

* update test

* add warning validation to input

* lol is this right i dont know go

* literally no idea what im doing

* add Description to display attrs struct

* update struct comment

* add descriptions to remaining go fields

* add missing comma

* remaining commas..."

* add description to display attrs

* update tests

* update tests

* add changelog;

* Update ui/app/utils/openapi-to-attrs.js

* update tests following backend changes

* clearly name variable

* format files

* no longer need to test for modified tooltip since coming from backend now
2023-04-19 16:16:30 +00:00

128 lines
4.6 KiB
JavaScript

/**
* Copyright (c) HashiCorp, Inc.
* SPDX-License-Identifier: MPL-2.0
*/
/* eslint qunit/no-conditional-assertions: "warn" */
import { click, fillIn, settled, visit, triggerKeyEvent, find, waitUntil } from '@ember/test-helpers';
import { module, test } from 'qunit';
import { setupApplicationTest } from 'ember-qunit';
import { v4 as uuidv4 } from 'uuid';
import authPage from 'vault/tests/pages/auth';
import logout from 'vault/tests/pages/logout';
import enablePage from 'vault/tests/pages/settings/auth/enable';
import { supportedAuthBackends } from 'vault/helpers/supported-auth-backends';
import { supportedManagedAuthBackends } from 'vault/helpers/supported-managed-auth-backends';
import { create } from 'ember-cli-page-object';
import consoleClass from 'vault/tests/pages/components/console/ui-panel';
const consoleComponent = create(consoleClass);
module('Acceptance | auth backend list', function (hooks) {
setupApplicationTest(hooks);
hooks.beforeEach(function () {
return authPage.login();
});
hooks.afterEach(function () {
return logout.visit();
});
test('userpass secret backend', async function (assert) {
let n = Math.random();
const path1 = `userpass-${++n}`;
const path2 = `userpass-${++n}`;
const user1 = 'user1';
const user2 = 'user2';
// enable the first userpass method with one username
await enablePage.enable('userpass', path1);
await settled();
await click('[data-test-save-config="true"]');
await visit(`/vault/access/${path1}/item/user/create`);
await waitUntil(() => find('[data-test-input="username"]') && find('[data-test-textarea]'));
await fillIn('[data-test-input="username"]', user1);
await triggerKeyEvent('[data-test-input="username"]', 'keyup', 65);
await fillIn('[data-test-textarea]', user1);
await triggerKeyEvent('[data-test-textarea]', 'keyup', 65);
await click('[data-test-save-config="true"]');
// enable the first userpass method with one username
await visit(`/vault/settings/auth/enable`);
await click('[data-test-mount-type="userpass"]');
await click('[data-test-mount-next]');
await fillIn('[data-test-input="path"]', path2);
await click('[data-test-mount-submit="true"]');
await click('[data-test-save-config="true"]');
await click(`[data-test-auth-backend-link="${path2}"]`);
await click('[data-test-entity-create-link="user"]');
await fillIn('[data-test-input="username"]', user2);
await triggerKeyEvent('[data-test-input="username"]', 'keyup', 65);
await fillIn('[data-test-textarea]', user2);
await triggerKeyEvent('[data-test-textarea]', 'keyup', 65);
await click('[data-test-save-config="true"]');
//confirming that the user was created. There was a bug where the apiPath was not being updated when toggling between auth routes
assert
.dom('[data-test-list-item-content]')
.hasText(user2, 'user just created shows in current auth list');
//confirm that the auth method 1 shows the user1. There was a bug where it was not updated the list when toggling between auth routes
await visit(`/vault/access/${path1}/item/user`);
assert
.dom('[data-test-list-item-content]')
.hasText(user1, 'first user created shows in current auth list');
});
test('auth methods are linkable and link to correct view', async function (assert) {
assert.expect(16);
const uid = uuidv4();
await visit('/vault/access');
const supportManaged = supportedManagedAuthBackends();
const backends = supportedAuthBackends();
for (const backend of backends) {
const { type } = backend;
const path = `auth-list-${type}-${uid}`;
if (type !== 'token') {
await enablePage.enable(type, path);
}
await settled();
await visit('/vault/access');
// all auth methods should be linkable
await click(`[data-test-auth-backend-link="${type === 'token' ? type : path}"]`);
if (!supportManaged.includes(type)) {
assert.dom('[data-test-auth-section-tab]').exists({ count: 1 });
assert
.dom('[data-test-auth-section-tab]')
.hasText('Configuration', `only shows configuration tab for ${type} auth method`);
assert.dom('[data-test-doc-link] .doc-link').exists(`includes doc link for ${type} auth method`);
} else {
let expectedTabs = 2;
if (type == 'ldap' || type === 'okta') {
expectedTabs = 3;
}
assert
.dom('[data-test-auth-section-tab]')
.exists({ count: expectedTabs }, `has management tabs for ${type} auth method`);
// cleanup method
await consoleComponent.runCommands(`delete sys/auth/${path}`);
}
}
});
});