081db3a240
* Update ember-cli to ~3.20 * Remove bad optional-feature * Remove ember-fetch dep * re-install ember-fetch * update model fragments pr * update ember model fragments correct package name * update ember composable helpers to solve array helper error * update ember-concurrency * add back engine dependencies, automatically removed during ember-cli-upgrade * make author-form-options component js file otherwise error * for now comment out withTestWaiter * add eslint-node and fix if not with unless in templates * fix linting for tab index of false is now -1 and add type button to all buttons without types * fix href errors for linting, likely have to come back and fix * using eslint fix flag to fix all this.gets * ember modules codemode removed files that had module twice, will fix in next commit * finish codemode ember-data-codemod needed to rename const model * more this.get removal codemode did not work * cont. removal of this.get * stop mixin rules until figure out how to reconfig them all * smaller eslint ignores * get codemode * testing app small fixes to bring it back after all the changes * small changes to eslint * test removal of getProperties * fix issue with baseKey because value could be unknown needed to add a question mark in nested get * smaller linting fixes * get nested fixes * small linting error fixes * small linting changes * working through more small linting changes * another round of linting modifications * liniting fixes * ember module codemod * quinit dom codemod * angle bracket codemod * discovered that components must have js files * ran all codemods this is all that's left * small changes to fix get needs two object, should not have been using get. * fix issue with one input in form field * fun times with set and onChange from oninput * fix issue with model not being passed through on secret-edit-display * fix issue with yarn run test not working, revert without npm run all * linting and small fix when loading without a selectAuthBackend * fix failing test with ui-wizard issue * fix test failure due to model not being asked for correctly with new changes, probably run into this more. * fix issue with component helper and at props specific to wizard * rename log to clilog due to conflict with new eslint rule * small changes for test failures * component helper at fixes * Revert to old component style something with new one broke this and can't figure it out for now * small fishy smelling test fixes will revisit * small test changes * more small test changes, appears upgrade treats spaces differently * comment out code and test that no longer seems relevant but confirm * clean run on component test though still some potential timing issues on ui-console test * fixing one auth test issue and timing issue on enable-test * small mods * fix this conditional check from upgrade * linting fixes after master merge * package updates using yarn upgrade-interactive * update libraries that did not effect any of the test failures. * update ember truth helpers library * settling tests * Fix ui-panel control group output * fix features selection test failures * Fix auth tests (x-vault-token) * fix shared test * fix issue with data null on backend * Revert "Fix auth tests (x-vault-token)" This reverts commit 89cb174b2f1998efa56d9604d14131415ae65d6f. * Fix auth tests (x-vault-token) without updating this.set * Update redirect-to tests * fix wrapped token test * skip some flaky test * fix issue with href and a tags vs buttons * fix linting * updates to get tests running (#10409) * yarn isntall * increasing resource_class * whoops * trying large * back to xlarge * Fix param issue on transform item routes * test fixes * settle on policies (old) test * fix browserstack test warning and skips of test confirmed worked * Fix redirect-to test * skips * fix transformation test and skip some kmip * Skip tests * Add meep marker to remaining failing tests * Skip test with failing component * rever skip on secret-create test * Skip piece of test that fails due to navigation-input * fix settings test where can and skip in others after confirming * fix circle ci test failures * ssh role settle * Fix navigate-input and add settled to test * Remove extra import * secret cubbyhole and alicloud * Add settled to gcpkms test * settles on redirect to test * Bump browserstack test resource to large * Update browserstack resource size to xlarge * update todos * add back in withTestWaiter * try and fix credentials conditional action added comment instead * Update volatile computed properies to get functions * this step was never reached and we never defined secretType anywhere so I removed * add settled to policy old test * Fix navigate-input on policies and leases * replace ssh test with no var hoping that helps and add settled to other failing tests, unskip console tests * kmip, transit, role test remove a skip and add in settled * fix hover copy button, had to remove some testing functionality * Remove private router service * remove skip on control ssh and ui panel, fix search select by restructuring how to read the error * final bit of working through skipped test * Replace clearNonGlobalModels by linking directly to namespace with href-to * Remove unused var * Fix role-ssh id bug by updating form-field-from-model to form-field-group-loop * Fix transit create id would not update * Update option toggle selector for ssh-role * Fix ssh selector * cleanup pt1 * small clean up * cleanup part2 * Fix computed on pricing-metrics-form * small cleanup based on chelseas comments. Co-authored-by: Chelsea Shaw <chelshaw.dev@gmail.com> Co-authored-by: Sarah Thompson <sthompson@hashicorp.com>
335 lines
11 KiB
JavaScript
335 lines
11 KiB
JavaScript
import { run } from '@ember/runloop';
|
|
import { resolve } from 'rsvp';
|
|
import { assign } from '@ember/polyfills';
|
|
import Service from '@ember/service';
|
|
import { module, test } from 'qunit';
|
|
import { setupRenderingTest } from 'ember-qunit';
|
|
import { render, click, find, findAll, fillIn, blur, triggerEvent } from '@ember/test-helpers';
|
|
import hbs from 'htmlbars-inline-precompile';
|
|
import { encodeString } from 'vault/utils/b64';
|
|
import waitForError from 'vault/tests/helpers/wait-for-error';
|
|
|
|
const storeStub = Service.extend({
|
|
callArgs: null,
|
|
keyActionReturnVal: null,
|
|
rootKeyActionReturnVal: null,
|
|
adapterFor() {
|
|
const self = this;
|
|
return {
|
|
keyAction(action, { backend, id, payload }, options) {
|
|
self.set('callArgs', { action, backend, id, payload });
|
|
self.set('callArgsOptions', options);
|
|
const rootResp = assign({}, self.get('rootKeyActionReturnVal'));
|
|
const resp =
|
|
Object.keys(rootResp).length > 0
|
|
? rootResp
|
|
: {
|
|
data: assign({}, self.get('keyActionReturnVal')),
|
|
};
|
|
return resolve(resp);
|
|
},
|
|
};
|
|
},
|
|
});
|
|
|
|
module('Integration | Component | transit key actions', function(hooks) {
|
|
setupRenderingTest(hooks);
|
|
|
|
hooks.beforeEach(function() {
|
|
run(() => {
|
|
this.owner.unregister('service:store');
|
|
this.owner.register('service:store', storeStub);
|
|
this.storeService = this.owner.lookup('service:store');
|
|
});
|
|
});
|
|
|
|
test('it requires `key`', async function(assert) {
|
|
let promise = waitForError();
|
|
render(hbs`
|
|
{{transit-key-actions}}
|
|
<div id="modal-wormhole"></div>
|
|
`);
|
|
let err = await promise;
|
|
assert.ok(err.message.includes('`key` is required for'), 'asserts without key');
|
|
});
|
|
|
|
test('it renders', async function(assert) {
|
|
this.set('key', { backend: 'transit', supportedActions: ['encrypt'] });
|
|
await render(hbs`
|
|
{{transit-key-actions selectedAction="encrypt" key=key}}
|
|
<div id="modal-wormhole"></div>
|
|
`);
|
|
assert.dom('[data-test-transit-action="encrypt"]').exists({ count: 1 }, 'renders encrypt');
|
|
|
|
this.set('key', { backend: 'transit', supportedActions: ['sign'] });
|
|
await render(hbs`
|
|
{{transit-key-actions selectedAction="sign" key=key}}
|
|
<div id="modal-wormhole"></div>`);
|
|
assert.dom('[data-test-transit-action="sign"]').exists({ count: 1 }, 'renders sign');
|
|
});
|
|
|
|
test('it renders: signature_algorithm field', async function(assert) {
|
|
this.set('key', { backend: 'transit', supportsSigning: true, supportedActions: ['sign', 'verify'] });
|
|
this.set('selectedAction', 'sign');
|
|
await render(hbs`
|
|
{{transit-key-actions selectedAction=selectedAction key=key}}
|
|
<div id="modal-wormhole"></div>
|
|
`);
|
|
assert
|
|
.dom('[data-test-signature-algorithm]')
|
|
.doesNotExist('does not render signature_algorithm field on sign');
|
|
this.set('selectedAction', 'verify');
|
|
assert
|
|
.dom('[data-test-signature-algorithm]')
|
|
.doesNotExist('does not render signature_algorithm field on verify');
|
|
|
|
this.set('selectedAction', 'sign');
|
|
this.set('key', {
|
|
type: 'rsa-2048',
|
|
supportsSigning: true,
|
|
backend: 'transit',
|
|
supportedActions: ['sign', 'verify'],
|
|
});
|
|
assert
|
|
.dom('[data-test-signature-algorithm]')
|
|
.exists({ count: 1 }, 'renders signature_algorithm field on sign with rsa key');
|
|
this.set('selectedAction', 'verify');
|
|
assert
|
|
.dom('[data-test-signature-algorithm]')
|
|
.exists({ count: 1 }, 'renders signature_algorithm field on verify with rsa key');
|
|
});
|
|
|
|
test('it renders: rotate', async function(assert) {
|
|
this.set('key', { backend: 'transit', id: 'akey', supportedActions: ['rotate'] });
|
|
await render(hbs`
|
|
{{transit-key-actions selectedAction="rotate" key=key}}
|
|
<div id="modal-wormhole"></div>
|
|
`);
|
|
|
|
assert.dom('*').hasText('', 'renders an empty div');
|
|
|
|
this.set('key.canRotate', true);
|
|
assert
|
|
.dom('button')
|
|
.hasText('Rotate encryption key', 'renders confirm-button when key.canRotate is true');
|
|
});
|
|
|
|
async function doEncrypt(assert, actions = [], keyattrs = {}) {
|
|
let keyDefaults = { backend: 'transit', id: 'akey', supportedActions: ['encrypt'].concat(actions) };
|
|
|
|
const key = assign({}, keyDefaults, keyattrs);
|
|
this.set('key', key);
|
|
this.set('selectedAction', 'encrypt');
|
|
this.set('storeService.keyActionReturnVal', { ciphertext: 'secret' });
|
|
await render(hbs`
|
|
{{transit-key-actions selectedAction=selectedAction key=key}}
|
|
<div id="modal-wormhole"></div>
|
|
`);
|
|
|
|
find('#plaintext-control .CodeMirror').CodeMirror.setValue('plaintext');
|
|
await click('button[type="submit"]');
|
|
assert.deepEqual(
|
|
this.storeService.callArgs,
|
|
{
|
|
action: 'encrypt',
|
|
backend: 'transit',
|
|
id: 'akey',
|
|
payload: {
|
|
plaintext: encodeString('plaintext'),
|
|
},
|
|
},
|
|
'passes expected args to the adapter'
|
|
);
|
|
|
|
assert.equal(find('[data-test-encrypted-value="ciphertext"]').innerText, 'secret');
|
|
|
|
// exit modal
|
|
await click('[data-test-modal-background]');
|
|
// Encrypt again, with pre-encoded value and checkbox selected
|
|
const preEncodedValue = encodeString('plaintext');
|
|
find('#plaintext-control .CodeMirror').CodeMirror.setValue(preEncodedValue);
|
|
await click('input[data-test-transit-input="encodedBase64"]');
|
|
await click('button[type="submit"]');
|
|
|
|
assert.deepEqual(
|
|
this.storeService.callArgs,
|
|
{
|
|
action: 'encrypt',
|
|
backend: 'transit',
|
|
id: 'akey',
|
|
payload: {
|
|
plaintext: preEncodedValue,
|
|
},
|
|
},
|
|
'passes expected args to the adapter'
|
|
);
|
|
}
|
|
|
|
test('it encrypts', doEncrypt);
|
|
|
|
test('it shows key version selection', async function(assert) {
|
|
let keyDefaults = { backend: 'transit', id: 'akey', supportedActions: ['encrypt'].concat([]) };
|
|
let keyattrs = { keysForEncryption: [3, 2, 1], latestVersion: 3 };
|
|
const key = assign({}, keyDefaults, keyattrs);
|
|
this.set('key', key);
|
|
this.set('storeService.keyActionReturnVal', { ciphertext: 'secret' });
|
|
await render(hbs`
|
|
{{transit-key-actions selectedAction="encrypt" key=key}}
|
|
<div id="modal-wormhole"></div>
|
|
`);
|
|
|
|
findAll('.CodeMirror')[0].CodeMirror.setValue('plaintext');
|
|
assert.dom('#key_version').exists({ count: 1 }, 'it renders the key version selector');
|
|
|
|
await triggerEvent('#key_version', 'change');
|
|
await click('button[type="submit"]');
|
|
assert.deepEqual(
|
|
this.storeService.callArgs,
|
|
{
|
|
action: 'encrypt',
|
|
backend: 'transit',
|
|
id: 'akey',
|
|
payload: {
|
|
plaintext: encodeString('plaintext'),
|
|
key_version: '0',
|
|
},
|
|
},
|
|
'includes key_version in the payload'
|
|
);
|
|
});
|
|
|
|
test('it hides key version selection', async function(assert) {
|
|
let keyDefaults = { backend: 'transit', id: 'akey', supportedActions: ['encrypt'].concat([]) };
|
|
let keyattrs = { keysForEncryption: [1] };
|
|
const key = assign({}, keyDefaults, keyattrs);
|
|
this.set('key', key);
|
|
this.set('storeService.keyActionReturnVal', { ciphertext: 'secret' });
|
|
await render(hbs`
|
|
{{transit-key-actions selectedAction="encrypt" key=key}}
|
|
<div id="modal-wormhole"></div>
|
|
`);
|
|
|
|
// await fillIn('#plaintext', 'plaintext');
|
|
find('#plaintext-control .CodeMirror').CodeMirror.setValue('plaintext');
|
|
assert.dom('#key_version').doesNotExist('it does not render the selector when there is only one key');
|
|
});
|
|
|
|
test('it does not carry ciphertext value over to decrypt', async function(assert) {
|
|
const plaintext = 'not so secret';
|
|
await doEncrypt.call(this, assert, ['decrypt']);
|
|
|
|
this.set('storeService.keyActionReturnVal', { plaintext });
|
|
this.set('selectedAction', 'decrypt');
|
|
assert.equal(
|
|
find('#ciphertext-control .CodeMirror').CodeMirror.getValue(),
|
|
'',
|
|
'does not prefill ciphertext value'
|
|
);
|
|
});
|
|
|
|
const setupExport = async function() {
|
|
this.set('key', {
|
|
backend: 'transit',
|
|
id: 'akey',
|
|
supportedActions: ['export'],
|
|
exportKeyTypes: ['encryption'],
|
|
validKeyVersions: [1],
|
|
});
|
|
await render(hbs`
|
|
{{transit-key-actions key=key}}
|
|
<div id="modal-wormhole"></div>
|
|
`);
|
|
};
|
|
|
|
test('it can export a key:default behavior', async function(assert) {
|
|
this.set('storeService.rootKeyActionReturnVal', { wrap_info: { token: 'wrapped-token' } });
|
|
await setupExport.call(this);
|
|
await click('button[type="submit"]');
|
|
|
|
assert.deepEqual(
|
|
this.storeService.callArgs,
|
|
{
|
|
action: 'export',
|
|
backend: 'transit',
|
|
id: 'akey',
|
|
payload: {
|
|
param: ['encryption'],
|
|
},
|
|
},
|
|
'passes expected args to the adapter'
|
|
);
|
|
assert.equal(this.storeService.callArgsOptions.wrapTTL, '30m', 'passes value for wrapTTL');
|
|
assert.equal(find('[data-test-encrypted-value="export"]').innerText, 'wrapped-token', 'wraps by default');
|
|
});
|
|
|
|
test('it can export a key:unwrapped behavior', async function(assert) {
|
|
const response = { keys: { a: 'key' } };
|
|
this.set('storeService.keyActionReturnVal', response);
|
|
await setupExport.call(this);
|
|
await click('[data-test-toggle-label="Wrap response"]');
|
|
await click('button[type="submit"]');
|
|
assert.dom('.modal.is-active').exists('Modal opens after export');
|
|
assert.deepEqual(
|
|
find('.modal [data-test-encrypted-value="export"]').innerText,
|
|
JSON.stringify(response, null, 2),
|
|
'prints json response'
|
|
);
|
|
});
|
|
|
|
test('it can export a key: unwrapped, single version', async function(assert) {
|
|
const response = { keys: { a: 'key' } };
|
|
this.set('storeService.keyActionReturnVal', response);
|
|
await setupExport.call(this);
|
|
await click('[data-test-toggle-label="Wrap response"]');
|
|
await click('#exportVersion');
|
|
await triggerEvent('#exportVersion', 'change');
|
|
await click('button[type="submit"]');
|
|
assert.dom('.modal.is-active').exists('Modal opens after export');
|
|
assert.deepEqual(
|
|
find('.modal [data-test-encrypted-value="export"]').innerText,
|
|
JSON.stringify(response, null, 2),
|
|
'prints json response'
|
|
);
|
|
assert.deepEqual(
|
|
this.storeService.callArgs,
|
|
{
|
|
action: 'export',
|
|
backend: 'transit',
|
|
id: 'akey',
|
|
payload: {
|
|
param: ['encryption', 1],
|
|
},
|
|
},
|
|
'passes expected args to the adapter'
|
|
);
|
|
});
|
|
|
|
test('it includes algorithm param for HMAC', async function(assert) {
|
|
this.set('key', {
|
|
backend: 'transit',
|
|
id: 'akey',
|
|
supportedActions: ['hmac'],
|
|
validKeyVersions: [1],
|
|
});
|
|
await render(hbs`
|
|
{{transit-key-actions key=key}}
|
|
<div id="modal-wormhole"></div>
|
|
`);
|
|
await fillIn('#algorithm', 'sha2-384');
|
|
await blur('#algorithm');
|
|
await click('button[type="submit"]');
|
|
assert.deepEqual(
|
|
this.storeService.callArgs,
|
|
{
|
|
action: 'hmac',
|
|
backend: 'transit',
|
|
id: 'akey',
|
|
payload: {
|
|
algorithm: 'sha2-384',
|
|
},
|
|
},
|
|
'passes expected args to the adapter'
|
|
);
|
|
});
|
|
});
|