open-vault/ui/tests/acceptance/enterprise-kmip-test.js
Matthew Irish 4a1013e915
Update ui dependencies (#7244)
* be more specific about node version, and specify a yarn version

* update ember, ember-cli, ember-data, ember-data-model-fragments

* use router handlers to access transition information

* fix shadowing of component helper

* update ivy-codemirror, ember-cli-inject-live-reload

* remove custom router service

* don't use transition.queryParams

* update ember-cli-deprecation-workflow

* refactor kv v1 to use 'path' instead of 'id' on creation

* fix auth-jwt-test and toolbar-link-test

* update ember composable helpers

* remove Ember.copy from test file

* no more deprecations in the workflow

* fix more secret tests

* fix remaining failed tests

* move select component to core because it's used by ttl-picker

* generate new model class for each test instead of reusing an existing one

* fix selectors on kmip tests

* refactor how control groups construct urls from the new transition objects

* add router service override back in, and have it be evented so that we can trigger router events on it

* move stories and markdown files to core if the component lives in core

* update ember-cli, ember-cli-babel, ember-auto-import

* update base64js, date-fns, deepmerge, codemirror, broccoli-asset-rev

* update linting rules

* fix test selectors

* update ember-api-actions, ember-concurrency, ember-load-initializers, escape-string-regexp, normalize.css, prettier-eslint-cli, jsdoc-to-markdown

* remove test-results dir

* update base64js, ember-cli-clipboard, ember-cli-sass, ember-cli-string-helpers, ember-cli-template-lint, ember-cli-uglify, ember-link-action

* fix linting

* run yarn install without restoring from cache

* refactor how tests are run and handle the vault server subprocess

* update makefile for new test task names

* update circle config to use the new yarn task

* fix writing the seal keys when starting the dev server

* remove optional deps from the lockfile

* don't ignore-optional on yarn install

* remove errant console.log

* update ember-basic-dropdown-hover, jsonlint, yargs-parser

* update ember-cli-flash

* add back optionalDeps

* update @babel/core@7.5.5, ember-basic-dropdown@1.1.3, eslint-plugin-ember@6.8.2

* update storybook to the latest release

* add a babel config with targets so that the ember babel plugin works properly

* update ember-resolver, move ember-cli-storybook to devDependencies

* revert normalize.css upgrade

* silence fetchadapter warning for now

* exclude 3rd party array helper now that ember includes one

* fix switch and entity lookup styling

* only add -root suffix if it's not in versions mode

* make sure drop always has an array on the aws role form

* fix labels like we did with the backport

* update eslintignore

* update the yarn version in the docker build file

* update eslint ignore
2019-08-19 15:45:39 -05:00

228 lines
7.9 KiB
JavaScript

import { currentURL, currentRouteName } from '@ember/test-helpers';
import { module, test } from 'qunit';
import { setupApplicationTest } from 'ember-qunit';
import { create } from 'ember-cli-page-object';
import consoleClass from 'vault/tests/pages/components/console/ui-panel';
import authPage from 'vault/tests/pages/auth';
import scopesPage from 'vault/tests/pages/secrets/backend/kmip/scopes';
import rolesPage from 'vault/tests/pages/secrets/backend/kmip/roles';
import credentialsPage from 'vault/tests/pages/secrets/backend/kmip/credentials';
import mountSecrets from 'vault/tests/pages/settings/mount-secret-backend';
const uiConsole = create(consoleClass);
const mount = async (shouldConfig = true) => {
let path = `kmip-${Date.now()}`;
let commands = shouldConfig
? [`write sys/mounts/${path} type=kmip`, `write ${path}/config -force`]
: [`write sys/mounts/${path} type=kmip`];
await uiConsole.runCommands(commands);
return path;
};
const createScope = async () => {
let path = await mount();
let scope = `scope-${Date.now()}`;
await uiConsole.runCommands([`write ${path}/scope/${scope} -force`]);
return { path, scope };
};
const createRole = async () => {
let { path, scope } = await createScope();
let role = `role-${Date.now()}`;
await uiConsole.runCommands([`write ${path}/scope/${scope}/role/${role} operation_all=true`]);
return { path, scope, role };
};
const generateCreds = async () => {
let { path, scope, role } = await createRole();
await uiConsole.runCommands([
`write ${path}/scope/${scope}/role/${role}/credential/generate format=pem
-field=serial_number`,
]);
let serial = uiConsole.lastLogOutput;
return { path, scope, role, serial };
};
module('Acceptance | Enterprise | KMIP secrets', function(hooks) {
setupApplicationTest(hooks);
hooks.beforeEach(function() {
return authPage.login();
});
test('it enables KMIP secrets engine', async function(assert) {
let path = `kmip-${Date.now()}`;
await mountSecrets.enable('kmip', path);
assert.equal(
currentURL(),
`/vault/secrets/${path}/kmip/scopes`,
'mounts and redirects to the kmip scopes page'
);
assert.ok(scopesPage.isEmpty, 'renders empty state');
});
test('it can configure a KMIP secrets engine', async function(assert) {
let path = await mount(false);
await scopesPage.visit({ backend: path });
await scopesPage.configurationLink();
assert.equal(
currentURL(),
`/vault/secrets/${path}/kmip/configuration`,
'configuration navigates to the config page'
);
assert.ok(scopesPage.isEmpty, 'config page renders empty state');
await scopesPage.configureLink();
assert.equal(
currentURL(),
`/vault/secrets/${path}/kmip/configure`,
'configuration navigates to the configure page'
);
await scopesPage.submit();
assert.equal(
currentURL(),
`/vault/secrets/${path}/kmip/configuration`,
'redirects to configuration page after saving config'
);
assert.notOk(scopesPage.isEmpty, 'configuration page no longer renders empty state');
});
test('it can create a scope', async function(assert) {
let path = await mount(this);
await scopesPage.visit({ backend: path });
await scopesPage.createLink();
assert.equal(
currentURL(),
`/vault/secrets/${path}/kmip/scopes/create`,
'navigates to the kmip scope create page'
);
// create scope
await scopesPage.scopeName('foo');
await scopesPage.submit();
assert.equal(
currentURL(),
`/vault/secrets/${path}/kmip/scopes`,
'navigates to the kmip scopes page after create'
);
assert.equal(scopesPage.listItemLinks.length, 1, 'renders a single scope');
});
test('it can delete a scope from the list', async function(assert) {
let { path } = await createScope(this);
await scopesPage.visit({ backend: path });
// delete the scope
await scopesPage.listItemLinks.objectAt(0).menuToggle();
await scopesPage.delete();
await scopesPage.confirmDelete();
assert.equal(scopesPage.listItemLinks.length, 0, 'no scopes');
assert.ok(scopesPage.isEmpty, 'renders the empty state');
});
test('it can create a role', async function(assert) {
let { path, scope } = await createScope(this);
let role = `role-${Date.now()}`;
await rolesPage.visit({ backend: path, scope });
assert.ok(rolesPage.isEmpty, 'renders the empty role page');
await rolesPage.create();
assert.equal(
currentURL(),
`/vault/secrets/${path}/kmip/scopes/${scope}/roles/create`,
'links to the role create form'
);
await rolesPage.roleName(role);
await rolesPage.submit();
assert.equal(
currentURL(),
`/vault/secrets/${path}/kmip/scopes/${scope}/roles`,
'redirects to roles list'
);
assert.equal(rolesPage.listItemLinks.length, 1, 'renders a single role');
});
test('it can delete a role from the list', async function(assert) {
let { path, scope } = await createRole();
await rolesPage.visit({ backend: path, scope });
// delete the role
await rolesPage.listItemLinks.objectAt(0).menuToggle();
await rolesPage.delete();
await rolesPage.confirmDelete();
assert.equal(rolesPage.listItemLinks.length, 0, 'renders no roles');
assert.ok(rolesPage.isEmpty, 'renders empty');
});
test('it can delete a role from the detail page', async function(assert) {
let { path, scope, role } = await createRole(this);
await rolesPage.visitDetail({ backend: path, scope, role });
await rolesPage.detailEditLink();
assert.equal(
currentURL(),
`/vault/secrets/${path}/kmip/scopes/${scope}/roles/${role}/edit`,
'navigates to role edit'
);
await rolesPage.cancelLink();
assert.equal(
currentURL(),
`/vault/secrets/${path}/kmip/scopes/${scope}/roles/${role}`,
'cancel navigates to role show'
);
await rolesPage.delete().confirmDelete();
assert.equal(
currentURL(),
`/vault/secrets/${path}/kmip/scopes/${scope}/roles`,
'redirects to the roles list'
);
assert.ok(rolesPage.isEmpty, 'renders an empty roles page');
});
test('it can create a credential', async function(assert) {
let { path, scope, role } = await createRole();
await credentialsPage.visit({ backend: path, scope, role });
assert.ok(credentialsPage.isEmpty, 'renders empty creds page');
await credentialsPage.generateCredentialsLink();
assert.equal(
currentURL(),
`/vault/secrets/${path}/kmip/scopes/${scope}/roles/${role}/credentials/generate`,
'navigates to generate credentials'
);
await credentialsPage.submit();
assert.equal(
currentRouteName(),
'vault.cluster.secrets.backend.kmip.credentials.show',
'generate redirects to the show page'
);
await credentialsPage.backToRoleLink();
assert.equal(credentialsPage.listItemLinks.length, 1, 'renders a single credential');
});
test('it can revoke a credential from the list', async function(assert) {
let { path, scope, role } = await generateCreds();
await credentialsPage.visit({ backend: path, scope, role });
// revoke the credentials
await credentialsPage.listItemLinks.objectAt(0).menuToggle();
await credentialsPage.delete().confirmDelete();
assert.equal(credentialsPage.listItemLinks.length, 0, 'renders no credentials');
assert.ok(credentialsPage.isEmpty, 'renders empty');
});
test('it can revoke from the credentials show page', async function(assert) {
let { path, scope, role, serial } = await generateCreds();
await credentialsPage.visitDetail({ backend: path, scope, role, serial });
await credentialsPage.delete().confirmDelete();
assert.equal(
currentURL(),
`/vault/secrets/${path}/kmip/scopes/${scope}/roles/${role}/credentials`,
'redirects to the credentials list'
);
assert.ok(credentialsPage.isEmpty, 'renders an empty credentials page');
});
});