be632db682
* runs ember-cli-update to 4.4.0 * updates yarn.lock * updates dependencies causing runtime errors (#17135) * Inject Store Service When Accessed Implicitly (#17345) * adds codemod for injecting store service * adds custom babylon parser with decorators-legacy plugin for jscodeshift transforms * updates inject-store-service codemod to only look for .extend object expressions and adds recast options * runs inject-store-service codemod on js files * replace query-params helper with hash (#17404) * Updates/removes dependencies throwing errors in Ember 4.4 (#17396) * updates ember-responsive to latest * updates ember-composable-helpers to latest and uses includes helper since contains was removed * updates ember-concurrency to latest * updates ember-cli-clipboard to latest * temporary workaround for toolbar-link component throwing errors for using params arg with LinkTo * adds missing store injection to auth configure route * fixes issue with string-list component throwing error for accessing prop in same computation * fixes non-iterable query params issue in mfa methods controller * refactors field-to-attrs to handle belongsTo rather than fragments * converts mount-config fragment to belongsTo on auth-method model * removes ember-api-actions and adds tune method to auth-method adapter * converts cluster replication attributes from fragment to relationship * updates ember-data, removes ember-data-fragments and updates yarn to latest * removes fragments from secret-engine model * removes fragment from test-form-model * removes commented out code * minor change to inject-store-service codemod and runs again on js files * Remove LinkTo positional params (#17421) * updates ember-cli-page-object to latest version * update toolbar-link to support link-to args and not positional params * adds replace arg to toolbar-link component * Clean up js lint errors (#17426) * replaces assert.equal to assert.strictEqual * update eslint no-console to error and disables invididual intended uses of console * cleans up hbs lint warnings (#17432) * Upgrade bug and test fixes (#17500) * updates inject-service codemod to take arg for service name and runs for flashMessages service * fixes hbs lint error after merging main * fixes flash messages * updates more deps * bug fixes * test fixes * updates ember-cli-content-security-policy and prevents default form submission throwing errors * more bug and test fixes * removes commented out code * fixes issue with code-mirror modifier sending change event on setup causing same computation error * Upgrade Clean Up (#17543) * updates deprecation workflow and filter * cleans up build errors, removes unused ivy-codemirror and sass and updates ember-cli-sass and node-sass to latest * fixes control groups test that was skipped after upgrade * updates control group service tests * addresses review feedback * updates control group service handleError method to use router.currentURL rather that transition.intent.url * adds changelog entry
94 lines
4 KiB
JavaScript
94 lines
4 KiB
JavaScript
import { module, test } from 'qunit';
|
|
import { setupApplicationTest } from 'ember-qunit';
|
|
import { click, visit, fillIn } from '@ember/test-helpers';
|
|
import { setupMirage } from 'ember-cli-mirage/test-support';
|
|
import sinon from 'sinon';
|
|
import { Response } from 'miragejs';
|
|
import { ERROR_JWT_LOGIN } from 'vault/components/auth-jwt';
|
|
|
|
module('Acceptance | jwt auth method', function (hooks) {
|
|
setupApplicationTest(hooks);
|
|
setupMirage(hooks);
|
|
|
|
hooks.beforeEach(function () {
|
|
localStorage.clear(); // ensure that a token isn't stored otherwise visit('/vault/auth') will redirect to secrets
|
|
this.stub = sinon.stub();
|
|
this.server.post(
|
|
'/auth/:path/oidc/auth_url',
|
|
() =>
|
|
new Response(
|
|
400,
|
|
{ 'Content-Type': 'application/json' },
|
|
JSON.stringify({ errors: [ERROR_JWT_LOGIN] })
|
|
)
|
|
);
|
|
this.server.get('/auth/foo/oidc/callback', () => ({
|
|
auth: { client_token: 'root' },
|
|
}));
|
|
});
|
|
|
|
test('it works correctly with default name and no role', async function (assert) {
|
|
assert.expect(6);
|
|
this.server.post('/auth/jwt/login', (schema, req) => {
|
|
const { jwt, role } = JSON.parse(req.requestBody);
|
|
assert.ok(true, 'request made to auth/jwt/login after submit');
|
|
assert.strictEqual(jwt, 'my-test-jwt-token', 'JWT token is sent in body');
|
|
assert.strictEqual(role, undefined, 'role is not sent in body when not filled in');
|
|
req.passthrough();
|
|
});
|
|
await visit('/vault/auth');
|
|
await fillIn('[data-test-select="auth-method"]', 'jwt');
|
|
assert.dom('[data-test-role]').exists({ count: 1 }, 'Role input exists');
|
|
assert.dom('[data-test-jwt]').exists({ count: 1 }, 'JWT input exists');
|
|
await fillIn('[data-test-jwt]', 'my-test-jwt-token');
|
|
await click('[data-test-auth-submit]');
|
|
assert.dom('[data-test-error]').exists('Failed login');
|
|
});
|
|
|
|
test('it works correctly with default name and a role', async function (assert) {
|
|
assert.expect(7);
|
|
this.server.post('/auth/jwt/login', (schema, req) => {
|
|
const { jwt, role } = JSON.parse(req.requestBody);
|
|
assert.ok(true, 'request made to auth/jwt/login after login');
|
|
assert.strictEqual(jwt, 'my-test-jwt-token', 'JWT token is sent in body');
|
|
assert.strictEqual(role, 'some-role', 'role is sent in the body when filled in');
|
|
req.passthrough();
|
|
});
|
|
await visit('/vault/auth');
|
|
await fillIn('[data-test-select="auth-method"]', 'jwt');
|
|
assert.dom('[data-test-role]').exists({ count: 1 }, 'Role input exists');
|
|
assert.dom('[data-test-jwt]').exists({ count: 1 }, 'JWT input exists');
|
|
await fillIn('[data-test-role]', 'some-role');
|
|
await fillIn('[data-test-jwt]', 'my-test-jwt-token');
|
|
assert.dom('[data-test-jwt]').exists({ count: 1 }, 'JWT input exists');
|
|
await click('[data-test-auth-submit]');
|
|
assert.dom('[data-test-error]').exists('Failed login');
|
|
});
|
|
|
|
test('it works correctly with custom endpoint and a role', async function (assert) {
|
|
assert.expect(6);
|
|
this.server.get('/sys/internal/ui/mounts', () => ({
|
|
data: {
|
|
auth: {
|
|
'test-jwt/': { description: '', options: {}, type: 'jwt' },
|
|
},
|
|
},
|
|
}));
|
|
this.server.post('/auth/test-jwt/login', (schema, req) => {
|
|
const { jwt, role } = JSON.parse(req.requestBody);
|
|
assert.ok(true, 'request made to auth/custom-jwt-login after login');
|
|
assert.strictEqual(jwt, 'my-test-jwt-token', 'JWT token is sent in body');
|
|
assert.strictEqual(role, 'some-role', 'role is sent in body when filled in');
|
|
req.passthrough();
|
|
});
|
|
await visit('/vault/auth');
|
|
await click('[data-test-auth-method-link="jwt"]');
|
|
assert.dom('[data-test-role]').exists({ count: 1 }, 'Role input exists');
|
|
assert.dom('[data-test-jwt]').exists({ count: 1 }, 'JWT input exists');
|
|
await fillIn('[data-test-role]', 'some-role');
|
|
await fillIn('[data-test-jwt]', 'my-test-jwt-token');
|
|
await click('[data-test-auth-submit]');
|
|
assert.dom('[data-test-error]').exists('Failed login');
|
|
});
|
|
});
|