open-vault/ui/tests/integration/components/control-group-test.js
Jordan Reimer be632db682
Ember Upgrade to 4.4 (#17086)
* runs ember-cli-update to 4.4.0

* updates yarn.lock

* updates dependencies causing runtime errors (#17135)

* Inject Store Service When Accessed Implicitly (#17345)

* adds codemod for injecting store service

* adds custom babylon parser with decorators-legacy plugin for jscodeshift transforms

* updates inject-store-service codemod to only look for .extend object expressions and adds recast options

* runs inject-store-service codemod on js files

* replace query-params helper with hash (#17404)

* Updates/removes dependencies throwing errors in Ember 4.4 (#17396)

* updates ember-responsive to latest

* updates ember-composable-helpers to latest and uses includes helper since contains was removed

* updates ember-concurrency to latest

* updates ember-cli-clipboard to latest

* temporary workaround for toolbar-link component throwing errors for using params arg with LinkTo

* adds missing store injection to auth configure route

* fixes issue with string-list component throwing error for accessing prop in same computation

* fixes non-iterable query params issue in mfa methods controller

* refactors field-to-attrs to handle belongsTo rather than fragments

* converts mount-config fragment to belongsTo on auth-method model

* removes ember-api-actions and adds tune method to auth-method adapter

* converts cluster replication attributes from fragment to relationship

* updates ember-data, removes ember-data-fragments and updates yarn to latest

* removes fragments from secret-engine model

* removes fragment from test-form-model

* removes commented out code

* minor change to inject-store-service codemod and runs again on js files

* Remove LinkTo positional params (#17421)

* updates ember-cli-page-object to latest version

* update toolbar-link to support link-to args and not positional params

* adds replace arg to toolbar-link component

* Clean up js lint errors (#17426)

* replaces assert.equal to assert.strictEqual

* update eslint no-console to error and disables invididual intended uses of console

* cleans up hbs lint warnings (#17432)

* Upgrade bug and test fixes (#17500)

* updates inject-service codemod to take arg for service name and runs for flashMessages service

* fixes hbs lint error after merging main

* fixes flash messages

* updates more deps

* bug fixes

* test fixes

* updates ember-cli-content-security-policy and prevents default form submission throwing errors

* more bug and test fixes

* removes commented out code

* fixes issue with code-mirror modifier sending change event on setup causing same computation error

* Upgrade Clean Up (#17543)

* updates deprecation workflow and filter

* cleans up build errors, removes unused ivy-codemirror and sass and updates ember-cli-sass and node-sass to latest

* fixes control groups test that was skipped after upgrade

* updates control group service tests

* addresses review feedback

* updates control group service handleError method to use router.currentURL rather that transition.intent.url

* adds changelog entry
2022-10-18 09:46:02 -06:00

183 lines
7 KiB
JavaScript

import Service from '@ember/service';
import { module, test } from 'qunit';
import { setupRenderingTest } from 'ember-qunit';
import { render } from '@ember/test-helpers';
import hbs from 'htmlbars-inline-precompile';
import sinon from 'sinon';
import { create } from 'ember-cli-page-object';
import controlGroup from '../../pages/components/control-group';
const component = create(controlGroup);
const controlGroupService = Service.extend({
init() {
this._super(...arguments);
this.set('wrapInfo', null);
},
wrapInfoForAccessor() {
return this.wrapInfo;
},
});
const authService = Service.extend();
module('Integration | Component | control group', function (hooks) {
setupRenderingTest(hooks);
hooks.beforeEach(function () {
this.owner.register('service:auth', authService);
this.owner.register('service:control-group', controlGroupService);
this.controlGroup = this.owner.lookup('service:controlGroup');
this.auth = this.owner.lookup('service:auth');
});
const setup = (modelData = {}, authData = {}) => {
let modelDefaults = {
approved: false,
requestPath: 'foo/bar',
id: 'accessor',
requestEntity: { id: 'requestor', name: 'entity8509' },
reload: sinon.stub(),
};
let authDataDefaults = { entity_id: 'requestor' };
return {
model: {
...modelDefaults,
...modelData,
},
authData: {
...authDataDefaults,
...authData,
},
};
};
test('requestor rendering', async function (assert) {
let { model, authData } = setup();
this.set('model', model);
this.set('auth.authData', authData);
await render(hbs`{{control-group model=this.model}}`);
assert.ok(component.showsAccessorCallout, 'shows accessor callout');
assert.strictEqual(component.bannerPrefix, 'Locked');
assert.strictEqual(component.bannerText, 'The path you requested is locked by a Control Group');
assert.strictEqual(component.requestorText, `You are requesting access to ${model.requestPath}`);
assert.false(component.showsTokenText, 'does not show token message when there is no token');
assert.ok(component.showsRefresh, 'shows refresh button');
assert.ok(component.authorizationText, 'Awaiting authorization.');
});
test('requestor rendering: with token', async function (assert) {
let { model, authData } = setup();
this.set('model', model);
this.set('auth.authData', authData);
this.set('controlGroup.wrapInfo', { token: 'token' });
await render(hbs`{{control-group model=this.model}}`);
assert.true(component.showsTokenText, 'shows token message');
assert.strictEqual(component.token, 'token', 'shows token value');
});
test('requestor rendering: some approvals', async function (assert) {
let { model, authData } = setup({ authorizations: [{ name: 'manager 1' }, { name: 'manager 2' }] });
this.set('model', model);
this.set('auth.authData', authData);
await render(hbs`{{control-group model=this.model}}`);
assert.ok(component.authorizationText, 'Already approved by manager 1, manager 2');
});
test('requestor rendering: approved with no token', async function (assert) {
let { model, authData } = setup({ approved: true });
this.set('model', model);
this.set('auth.authData', authData);
await render(hbs`{{control-group model=this.model}}`);
assert.strictEqual(component.bannerPrefix, 'Success!');
assert.strictEqual(component.bannerText, 'You have been given authorization');
assert.false(component.showsTokenText, 'does not show token message when there is no token');
assert.notOk(component.showsRefresh, 'does not shows refresh button');
assert.ok(component.showsSuccessComponent, 'renders control group success');
});
test('requestor rendering: approved with token', async function (assert) {
let { model, authData } = setup({ approved: true });
this.set('model', model);
this.set('auth.authData', authData);
this.set('controlGroup.wrapInfo', { token: 'token' });
await render(hbs`{{control-group model=this.model}}`);
assert.true(component.showsTokenText, 'shows token');
assert.notOk(component.showsRefresh, 'does not shows refresh button');
assert.ok(component.showsSuccessComponent, 'renders control group success');
});
test('authorizer rendering', async function (assert) {
let { model, authData } = setup({ canAuthorize: true }, { entity_id: 'manager' });
this.set('model', model);
this.set('auth.authData', authData);
await render(hbs`{{control-group model=this.model}}`);
assert.strictEqual(component.bannerPrefix, 'Locked');
assert.strictEqual(
component.bannerText,
'Someone is requesting access to a path locked by a Control Group'
);
assert.strictEqual(
component.requestorText,
`${model.requestEntity.name} is requesting access to ${model.requestPath}`
);
assert.false(component.showsTokenText, 'does not show token message when there is no token');
assert.ok(component.showsAuthorize, 'shows authorize button');
});
test('authorizer rendering:authorized', async function (assert) {
let { model, authData } = setup(
{ canAuthorize: true, authorizations: [{ id: 'manager', name: 'manager' }] },
{ entity_id: 'manager' }
);
this.set('model', model);
this.set('auth.authData', authData);
await render(hbs`{{control-group model=this.model}}`);
assert.strictEqual(component.bannerPrefix, 'Thanks!');
assert.strictEqual(component.bannerText, 'You have given authorization');
assert.ok(component.showsBackLink, 'back link is visible');
});
test('authorizer rendering: authorized and success', async function (assert) {
let { model, authData } = setup(
{ approved: true, canAuthorize: true, authorizations: [{ id: 'manager', name: 'manager' }] },
{ entity_id: 'manager' }
);
this.set('model', model);
this.set('auth.authData', authData);
await render(hbs`{{control-group model=this.model}}`);
assert.strictEqual(component.bannerPrefix, 'Thanks!');
assert.strictEqual(component.bannerText, 'You have given authorization');
assert.ok(component.showsBackLink, 'back link is visible');
assert.strictEqual(
component.requestorText,
`${model.requestEntity.name} is authorized to access ${model.requestPath}`
);
assert.notOk(component.showsSuccessComponent, 'does not render control group success');
});
test('third-party: success', async function (assert) {
let { model, authData } = setup(
{ approved: true, canAuthorize: true, authorizations: [{ id: 'foo', name: 'foo' }] },
{ entity_id: 'manager' }
);
this.set('model', model);
this.set('auth.authData', authData);
await render(hbs`{{control-group model=this.model}}`);
assert.strictEqual(component.bannerPrefix, 'Success!');
assert.strictEqual(component.bannerText, 'This Control Group has been authorized');
assert.ok(component.showsBackLink, 'back link is visible');
assert.notOk(component.showsSuccessComponent, 'does not render control group success');
});
});