open-vault/ui/tests/acceptance/tools-test.js
Matthew Irish 463a3ebea9
UI - identity details (#4502)
* add popups
* add ability to disable entity and banner when entity is disabled
* re-add alias-popup template
* add accpetance tests for creating entities
* add more entity creation acceptance tests
* add delete to edit-form
* add more identity tests and associated selectors
* add onSuccess hook and use UnloadModel route mixins
* add ability to toggle entity disabling from the popover
* fix store list cache because unloadAll isn't synchronous
* fill out tests for identity items and aliases
* add ability to enable entity from the detail page
* toArray on the peekAll
* fix other tests/behavior that relied on a RecordArray
* adjust layout for disabled entity and label for disabling an entity on the edit form
* add item-details integration tests
* move disable field on the entity form
* use ghost buttons for delete in identity and policy edit forms
* adding computed macros for lazy capability fetching and using them in the identity models
2018-05-23 22:10:21 -05:00

177 lines
5.1 KiB
JavaScript

import Pretender from 'pretender';
import { test } from 'qunit';
import moduleForAcceptance from 'vault/tests/helpers/module-for-acceptance';
import { toolsActions } from 'vault/helpers/tools-actions';
moduleForAcceptance('Acceptance | tools', {
beforeEach() {
return authLogin();
},
afterEach() {
return authLogout();
},
});
const DATA_TO_WRAP = JSON.stringify({ tools: 'tests' });
const TOOLS_ACTIONS = toolsActions();
/*
data-test-tools-input="wrapping-token"
data-test-tools-input="rewrapped-token"
data-test-tools="token-lookup-row"
data-test-tools-action-link=supportedAction
*/
var createTokenStore = () => {
let token;
return {
set(val) {
token = val;
},
get() {
return token;
},
};
};
test('tools functionality', function(assert) {
var tokenStore = createTokenStore();
visit('/vault/tools');
andThen(function() {
assert.equal(currentURL(), '/vault/tools/wrap', 'forwards to the first action');
TOOLS_ACTIONS.forEach(action => {
assert.ok(findWithAssert(`[data-test-tools-action-link="${action}"]`), `${action} link renders`);
});
find('.CodeMirror').get(0).CodeMirror.setValue(DATA_TO_WRAP);
});
// wrap
click('[data-test-tools-submit]');
andThen(function() {
tokenStore.set(find('[data-test-tools-input="wrapping-token"]').val());
assert.ok(find('[data-test-tools-input="wrapping-token"]').val(), 'has a wrapping token');
});
//lookup
click('[data-test-tools-action-link="lookup"]');
// have to wrap this in andThen because tokenStore is sync, but fillIn is async
andThen(() => {
fillIn('[data-test-tools-input="wrapping-token"]', tokenStore.get());
});
click('[data-test-tools-submit]');
andThen(() => {
assert.ok(
find('[data-test-tools="token-lookup-row"]:eq(0)').text().match(/Creation time/i),
'show creation time row'
);
assert.ok(
find('[data-test-tools="token-lookup-row"]:eq(1)').text().match(/Creation ttl/i),
'show creation ttl row'
);
});
//rewrap
click('[data-test-tools-action-link="rewrap"]');
andThen(() => {
fillIn('[data-test-tools-input="wrapping-token"]', tokenStore.get());
});
click('[data-test-tools-submit]');
andThen(() => {
assert.ok(find('[data-test-tools-input="rewrapped-token"]').val(), 'has a new re-wrapped token');
assert.notEqual(
find('[data-test-tools-input="rewrapped-token"]').val(),
tokenStore.get(),
're-wrapped token is not the wrapped token'
);
tokenStore.set(find('[data-test-tools-input="rewrapped-token"]').val());
});
//unwrap
click('[data-test-tools-action-link="unwrap"]');
andThen(() => {
fillIn('[data-test-tools-input="wrapping-token"]', tokenStore.get());
});
click('[data-test-tools-submit]');
andThen(() => {
assert.deepEqual(
JSON.parse(find('.CodeMirror').get(0).CodeMirror.getValue()),
JSON.parse(DATA_TO_WRAP),
'unwrapped data equals input data'
);
});
//random
click('[data-test-tools-action-link="random"]');
andThen(() => {
assert.dom('[data-test-tools-input="bytes"]').hasValue('32', 'defaults to 32 bytes');
});
click('[data-test-tools-submit]');
andThen(() => {
assert.ok(
find('[data-test-tools-input="random-bytes"]').val(),
'shows the returned value of random bytes'
);
});
//hash
click('[data-test-tools-action-link="hash"]');
fillIn('[data-test-tools-input="hash-input"]', 'foo');
click('[data-test-tools-b64-toggle="input"]');
click('[data-test-tools-submit]');
andThen(() => {
assert
.dom('[data-test-tools-input="sum"]')
.hasValue('LCa0a2j/xo/5m0U8HTBBNBNCLXBkg7+g+YpeiGJm564=', 'hashes the data, encodes input');
});
click('[data-test-tools-back]');
fillIn('[data-test-tools-input="hash-input"]', 'e2RhdGE6ImZvbyJ9');
click('[data-test-tools-submit]');
andThen(() => {
assert
.dom('[data-test-tools-input="sum"]')
.hasValue('JmSi2Hhbgu2WYOrcOyTqqMdym7KT3sohCwAwaMonVrc=', 'hashes the data, passes b64 input through');
});
});
const AUTH_RESPONSE = {
request_id: '39802bc4-235c-2f0b-87f3-ccf38503ac3e',
lease_id: '',
renewable: false,
lease_duration: 0,
data: null,
wrap_info: null,
warnings: null,
auth: {
client_token: 'ecfc2758-588e-981d-50f4-a25883bbf03c',
accessor: '6299780b-f2b2-1a3f-7b83-9d3d67629249',
policies: ['root'],
metadata: null,
lease_duration: 0,
renewable: false,
entity_id: '',
},
};
test('ensure unwrap with auth block works properly', function(assert) {
this.server = new Pretender(function() {
this.post('/v1/sys/wrapping/unwrap', response => {
return [response, { 'Content-Type': 'application/json' }, JSON.stringify(AUTH_RESPONSE)];
});
});
visit('/vault/tools');
//unwrap
click('[data-test-tools-action-link="unwrap"]');
andThen(() => {
fillIn('[data-test-tools-input="wrapping-token"]', 'sometoken');
});
click('[data-test-tools-submit]');
andThen(() => {
assert.deepEqual(
JSON.parse(find('.CodeMirror').get(0).CodeMirror.getValue()),
AUTH_RESPONSE.auth,
'unwrapped data equals input data'
);
this.server.shutdown();
});
});