081db3a240
* Update ember-cli to ~3.20 * Remove bad optional-feature * Remove ember-fetch dep * re-install ember-fetch * update model fragments pr * update ember model fragments correct package name * update ember composable helpers to solve array helper error * update ember-concurrency * add back engine dependencies, automatically removed during ember-cli-upgrade * make author-form-options component js file otherwise error * for now comment out withTestWaiter * add eslint-node and fix if not with unless in templates * fix linting for tab index of false is now -1 and add type button to all buttons without types * fix href errors for linting, likely have to come back and fix * using eslint fix flag to fix all this.gets * ember modules codemode removed files that had module twice, will fix in next commit * finish codemode ember-data-codemod needed to rename const model * more this.get removal codemode did not work * cont. removal of this.get * stop mixin rules until figure out how to reconfig them all * smaller eslint ignores * get codemode * testing app small fixes to bring it back after all the changes * small changes to eslint * test removal of getProperties * fix issue with baseKey because value could be unknown needed to add a question mark in nested get * smaller linting fixes * get nested fixes * small linting error fixes * small linting changes * working through more small linting changes * another round of linting modifications * liniting fixes * ember module codemod * quinit dom codemod * angle bracket codemod * discovered that components must have js files * ran all codemods this is all that's left * small changes to fix get needs two object, should not have been using get. * fix issue with one input in form field * fun times with set and onChange from oninput * fix issue with model not being passed through on secret-edit-display * fix issue with yarn run test not working, revert without npm run all * linting and small fix when loading without a selectAuthBackend * fix failing test with ui-wizard issue * fix test failure due to model not being asked for correctly with new changes, probably run into this more. * fix issue with component helper and at props specific to wizard * rename log to clilog due to conflict with new eslint rule * small changes for test failures * component helper at fixes * Revert to old component style something with new one broke this and can't figure it out for now * small fishy smelling test fixes will revisit * small test changes * more small test changes, appears upgrade treats spaces differently * comment out code and test that no longer seems relevant but confirm * clean run on component test though still some potential timing issues on ui-console test * fixing one auth test issue and timing issue on enable-test * small mods * fix this conditional check from upgrade * linting fixes after master merge * package updates using yarn upgrade-interactive * update libraries that did not effect any of the test failures. * update ember truth helpers library * settling tests * Fix ui-panel control group output * fix features selection test failures * Fix auth tests (x-vault-token) * fix shared test * fix issue with data null on backend * Revert "Fix auth tests (x-vault-token)" This reverts commit 89cb174b2f1998efa56d9604d14131415ae65d6f. * Fix auth tests (x-vault-token) without updating this.set * Update redirect-to tests * fix wrapped token test * skip some flaky test * fix issue with href and a tags vs buttons * fix linting * updates to get tests running (#10409) * yarn isntall * increasing resource_class * whoops * trying large * back to xlarge * Fix param issue on transform item routes * test fixes * settle on policies (old) test * fix browserstack test warning and skips of test confirmed worked * Fix redirect-to test * skips * fix transformation test and skip some kmip * Skip tests * Add meep marker to remaining failing tests * Skip test with failing component * rever skip on secret-create test * Skip piece of test that fails due to navigation-input * fix settings test where can and skip in others after confirming * fix circle ci test failures * ssh role settle * Fix navigate-input and add settled to test * Remove extra import * secret cubbyhole and alicloud * Add settled to gcpkms test * settles on redirect to test * Bump browserstack test resource to large * Update browserstack resource size to xlarge * update todos * add back in withTestWaiter * try and fix credentials conditional action added comment instead * Update volatile computed properies to get functions * this step was never reached and we never defined secretType anywhere so I removed * add settled to policy old test * Fix navigate-input on policies and leases * replace ssh test with no var hoping that helps and add settled to other failing tests, unskip console tests * kmip, transit, role test remove a skip and add in settled * fix hover copy button, had to remove some testing functionality * Remove private router service * remove skip on control ssh and ui panel, fix search select by restructuring how to read the error * final bit of working through skipped test * Replace clearNonGlobalModels by linking directly to namespace with href-to * Remove unused var * Fix role-ssh id bug by updating form-field-from-model to form-field-group-loop * Fix transit create id would not update * Update option toggle selector for ssh-role * Fix ssh selector * cleanup pt1 * small clean up * cleanup part2 * Fix computed on pricing-metrics-form * small cleanup based on chelseas comments. Co-authored-by: Chelsea Shaw <chelshaw.dev@gmail.com> Co-authored-by: Sarah Thompson <sthompson@hashicorp.com>
339 lines
11 KiB
JavaScript
339 lines
11 KiB
JavaScript
import { run } from '@ember/runloop';
|
|
import { copy } from 'ember-copy';
|
|
import { module, test } from 'qunit';
|
|
import { setupTest } from 'ember-qunit';
|
|
import { TOKEN_SEPARATOR, TOKEN_PREFIX, ROOT_PREFIX } from 'vault/services/auth';
|
|
import Pretender from 'pretender';
|
|
|
|
function storage() {
|
|
return {
|
|
items: {},
|
|
getItem(key) {
|
|
var item = this.items[key];
|
|
return item && JSON.parse(item);
|
|
},
|
|
|
|
setItem(key, val) {
|
|
return (this.items[key] = JSON.stringify(val));
|
|
},
|
|
|
|
removeItem(key) {
|
|
delete this.items[key];
|
|
},
|
|
|
|
keys() {
|
|
return Object.keys(this.items);
|
|
},
|
|
};
|
|
}
|
|
|
|
let ROOT_TOKEN_RESPONSE = {
|
|
request_id: 'e6674d7f-c96f-d51f-4463-cc95f0ad307e',
|
|
lease_id: '',
|
|
renewable: false,
|
|
lease_duration: 0,
|
|
data: {
|
|
accessor: '1dd25306-fdb9-0f43-8169-48ad702041b0',
|
|
creation_time: 1477671134,
|
|
creation_ttl: 0,
|
|
display_name: 'root',
|
|
explicit_max_ttl: 0,
|
|
id: '',
|
|
meta: null,
|
|
num_uses: 0,
|
|
orphan: true,
|
|
path: 'auth/token/root',
|
|
policies: ['root'],
|
|
ttl: 0,
|
|
},
|
|
wrap_info: null,
|
|
warnings: null,
|
|
auth: null,
|
|
};
|
|
|
|
let TOKEN_NON_ROOT_RESPONSE = function() {
|
|
return {
|
|
request_id: '3ca32cd9-fd40-891d-02d5-ea23138e8642',
|
|
lease_id: '',
|
|
renewable: false,
|
|
lease_duration: 0,
|
|
data: {
|
|
accessor: '4ef32471-a94c-79ee-c290-aeba4d63bdc9',
|
|
creation_time: Math.floor(Date.now() / 1000),
|
|
creation_ttl: 2764800,
|
|
display_name: 'token',
|
|
explicit_max_ttl: 0,
|
|
id: '6d83e912-1b21-9df9-b51a-d201b709f3d5',
|
|
meta: null,
|
|
num_uses: 0,
|
|
orphan: false,
|
|
path: 'auth/token/create',
|
|
policies: ['default', 'userpass'],
|
|
renewable: true,
|
|
ttl: 2763327,
|
|
},
|
|
wrap_info: null,
|
|
warnings: null,
|
|
auth: null,
|
|
};
|
|
};
|
|
|
|
let USERPASS_RESPONSE = {
|
|
request_id: '7e5e8d3d-599e-6ef7-7570-f7057fc7c53d',
|
|
lease_id: '',
|
|
renewable: false,
|
|
lease_duration: 0,
|
|
data: null,
|
|
wrap_info: null,
|
|
warnings: null,
|
|
auth: {
|
|
client_token: '5313ff81-05cb-699f-29d1-b82b4e2906dc',
|
|
accessor: '5c5303e7-56d6-ea13-72df-d85411bd9a7d',
|
|
policies: ['default'],
|
|
metadata: {
|
|
username: 'matthew',
|
|
},
|
|
lease_duration: 2764800,
|
|
renewable: true,
|
|
},
|
|
};
|
|
|
|
let GITHUB_RESPONSE = {
|
|
request_id: '4913f9cd-a95f-d1f9-5746-4c3af4e15660',
|
|
lease_id: '',
|
|
renewable: false,
|
|
lease_duration: 0,
|
|
data: null,
|
|
wrap_info: null,
|
|
warnings: null,
|
|
auth: {
|
|
client_token: '0d39b535-598e-54d9-96e3-97493492a5f7',
|
|
accessor: 'd8cd894f-bedf-5ce3-f1b5-98f7c6cf8ab4',
|
|
policies: ['default'],
|
|
metadata: {
|
|
org: 'hashicorp',
|
|
username: 'meirish',
|
|
},
|
|
lease_duration: 2764800,
|
|
renewable: true,
|
|
},
|
|
};
|
|
|
|
module('Integration | Service | auth', function(hooks) {
|
|
setupTest(hooks);
|
|
|
|
hooks.beforeEach(function() {
|
|
this.owner.lookup('service:flash-messages').registerTypes(['warning']);
|
|
this.store = storage();
|
|
this.memStore = storage();
|
|
this.server = new Pretender(function() {
|
|
this.get('/v1/auth/token/lookup-self', function(request) {
|
|
let resp = copy(ROOT_TOKEN_RESPONSE, true);
|
|
resp.id = request.requestHeaders['X-Vault-Token'];
|
|
resp.data.id = request.requestHeaders['X-Vault-Token'];
|
|
return [200, {}, resp];
|
|
});
|
|
this.post('/v1/auth/userpass/login/:username', function(request) {
|
|
const { username } = request.params;
|
|
let resp = copy(USERPASS_RESPONSE, true);
|
|
resp.auth.metadata.username = username;
|
|
return [200, {}, resp];
|
|
});
|
|
|
|
this.post('/v1/auth/github/login', function() {
|
|
let resp = copy(GITHUB_RESPONSE, true);
|
|
return [200, {}, resp];
|
|
});
|
|
});
|
|
|
|
this.server.prepareBody = function(body) {
|
|
return body ? JSON.stringify(body) : '{"error": "not found"}';
|
|
};
|
|
|
|
this.server.prepareHeaders = function(headers) {
|
|
headers['content-type'] = 'application/javascript';
|
|
return headers;
|
|
};
|
|
});
|
|
|
|
hooks.afterEach(function() {
|
|
this.server.shutdown();
|
|
});
|
|
|
|
test('token authentication: root token', function(assert) {
|
|
let done = assert.async();
|
|
let self = this;
|
|
let service = this.owner.factoryFor('service:auth').create({
|
|
storage(tokenName) {
|
|
if (
|
|
tokenName &&
|
|
tokenName.indexOf(`${TOKEN_PREFIX}${ROOT_PREFIX}`) === 0 &&
|
|
this.environment() !== 'development'
|
|
) {
|
|
return self.memStore;
|
|
} else {
|
|
return self.store;
|
|
}
|
|
},
|
|
});
|
|
run(() => {
|
|
service.authenticate({ clusterId: '1', backend: 'token', data: { token: 'test' } }).then(() => {
|
|
const clusterTokenName = service.get('currentTokenName');
|
|
const clusterToken = service.get('currentToken');
|
|
const authData = service.get('authData');
|
|
|
|
const expectedTokenName = `${TOKEN_PREFIX}${ROOT_PREFIX}${TOKEN_SEPARATOR}1`;
|
|
assert.equal('test', clusterToken, 'token is saved properly');
|
|
assert.equal(
|
|
`${TOKEN_PREFIX}${ROOT_PREFIX}${TOKEN_SEPARATOR}1`,
|
|
clusterTokenName,
|
|
'token name is saved properly'
|
|
);
|
|
assert.equal('token', authData.backend.type, 'backend is saved properly');
|
|
assert.equal(
|
|
ROOT_TOKEN_RESPONSE.data.display_name,
|
|
authData.displayName,
|
|
'displayName is saved properly'
|
|
);
|
|
assert.ok(
|
|
this.memStore.keys().includes(expectedTokenName),
|
|
'root token is stored in the memory store'
|
|
);
|
|
assert.equal(this.store.keys().length, 0, 'normal storage is empty');
|
|
done();
|
|
});
|
|
});
|
|
});
|
|
|
|
test('token authentication: root token in ember development environment', async function(assert) {
|
|
let self = this;
|
|
let service = this.owner.factoryFor('service:auth').create({
|
|
storage(tokenName) {
|
|
if (
|
|
tokenName &&
|
|
tokenName.indexOf(`${TOKEN_PREFIX}${ROOT_PREFIX}`) === 0 &&
|
|
this.environment() !== 'development'
|
|
) {
|
|
return self.memStore;
|
|
} else {
|
|
return self.store;
|
|
}
|
|
},
|
|
environment: () => 'development',
|
|
});
|
|
await service.authenticate({ clusterId: '1', backend: 'token', data: { token: 'test' } });
|
|
const clusterTokenName = service.get('currentTokenName');
|
|
const clusterToken = service.get('currentToken');
|
|
const authData = service.get('authData');
|
|
|
|
const expectedTokenName = `${TOKEN_PREFIX}${ROOT_PREFIX}${TOKEN_SEPARATOR}1`;
|
|
assert.equal('test', clusterToken, 'token is saved properly');
|
|
assert.equal(
|
|
`${TOKEN_PREFIX}${ROOT_PREFIX}${TOKEN_SEPARATOR}1`,
|
|
clusterTokenName,
|
|
'token name is saved properly'
|
|
);
|
|
assert.equal('token', authData.backend.type, 'backend is saved properly');
|
|
assert.equal(
|
|
ROOT_TOKEN_RESPONSE.data.display_name,
|
|
authData.displayName,
|
|
'displayName is saved properly'
|
|
);
|
|
assert.ok(this.store.keys().includes(expectedTokenName), 'root token is stored in the store');
|
|
assert.equal(this.memStore.keys().length, 0, 'mem storage is empty');
|
|
});
|
|
|
|
test('github authentication', function(assert) {
|
|
let done = assert.async();
|
|
let service = this.owner.factoryFor('service:auth').create({
|
|
storage: type => (type === 'memory' ? this.memStore : this.store),
|
|
});
|
|
|
|
run(() => {
|
|
service.authenticate({ clusterId: '1', backend: 'github', data: { token: 'test' } }).then(() => {
|
|
const clusterTokenName = service.get('currentTokenName');
|
|
const clusterToken = service.get('currentToken');
|
|
const authData = service.get('authData');
|
|
const expectedTokenName = `${TOKEN_PREFIX}github${TOKEN_SEPARATOR}1`;
|
|
|
|
assert.equal(GITHUB_RESPONSE.auth.client_token, clusterToken, 'token is saved properly');
|
|
assert.equal(expectedTokenName, clusterTokenName, 'token name is saved properly');
|
|
assert.equal('github', authData.backend.type, 'backend is saved properly');
|
|
assert.equal(
|
|
GITHUB_RESPONSE.auth.metadata.org + '/' + GITHUB_RESPONSE.auth.metadata.username,
|
|
authData.displayName,
|
|
'displayName is saved properly'
|
|
);
|
|
assert.equal(this.memStore.keys().length, 0, 'mem storage is empty');
|
|
assert.ok(this.store.keys().includes(expectedTokenName), 'normal storage contains the token');
|
|
done();
|
|
});
|
|
});
|
|
});
|
|
|
|
test('userpass authentication', function(assert) {
|
|
let done = assert.async();
|
|
let service = this.owner.factoryFor('service:auth').create({ storage: () => this.store });
|
|
run(() => {
|
|
service
|
|
.authenticate({
|
|
clusterId: '1',
|
|
backend: 'userpass',
|
|
data: { username: USERPASS_RESPONSE.auth.metadata.username, password: 'passoword' },
|
|
})
|
|
.then(() => {
|
|
const clusterTokenName = service.get('currentTokenName');
|
|
const clusterToken = service.get('currentToken');
|
|
const authData = service.get('authData');
|
|
|
|
assert.equal(USERPASS_RESPONSE.auth.client_token, clusterToken, 'token is saved properly');
|
|
assert.equal(
|
|
`${TOKEN_PREFIX}userpass${TOKEN_SEPARATOR}1`,
|
|
clusterTokenName,
|
|
'token name is saved properly'
|
|
);
|
|
assert.equal('userpass', authData.backend.type, 'backend is saved properly');
|
|
assert.equal(
|
|
USERPASS_RESPONSE.auth.metadata.username,
|
|
authData.displayName,
|
|
'displayName is saved properly'
|
|
);
|
|
done();
|
|
});
|
|
});
|
|
});
|
|
|
|
test('token auth expiry with non-root token', function(assert) {
|
|
const tokenResp = TOKEN_NON_ROOT_RESPONSE();
|
|
this.server.map(function() {
|
|
this.get('/v1/auth/token/lookup-self', function(request) {
|
|
let resp = copy(tokenResp, true);
|
|
resp.id = request.requestHeaders['X-Vault-Token'];
|
|
resp.data.id = request.requestHeaders['X-Vault-Token'];
|
|
return [200, {}, resp];
|
|
});
|
|
});
|
|
|
|
let done = assert.async();
|
|
let service = this.owner.factoryFor('service:auth').create({ storage: () => this.store });
|
|
run(() => {
|
|
service.authenticate({ clusterId: '1', backend: 'token', data: { token: 'test' } }).then(() => {
|
|
const clusterTokenName = service.get('currentTokenName');
|
|
const clusterToken = service.get('currentToken');
|
|
const authData = service.get('authData');
|
|
|
|
assert.equal('test', clusterToken, 'token is saved properly');
|
|
assert.equal(
|
|
`${TOKEN_PREFIX}token${TOKEN_SEPARATOR}1`,
|
|
clusterTokenName,
|
|
'token name is saved properly'
|
|
);
|
|
assert.equal(authData.backend.type, 'token', 'backend is saved properly');
|
|
assert.equal(authData.displayName, tokenResp.data.display_name, 'displayName is saved properly');
|
|
assert.equal(service.get('tokenExpired'), false, 'token is not expired');
|
|
done();
|
|
});
|
|
});
|
|
});
|
|
});
|