be632db682
* runs ember-cli-update to 4.4.0 * updates yarn.lock * updates dependencies causing runtime errors (#17135) * Inject Store Service When Accessed Implicitly (#17345) * adds codemod for injecting store service * adds custom babylon parser with decorators-legacy plugin for jscodeshift transforms * updates inject-store-service codemod to only look for .extend object expressions and adds recast options * runs inject-store-service codemod on js files * replace query-params helper with hash (#17404) * Updates/removes dependencies throwing errors in Ember 4.4 (#17396) * updates ember-responsive to latest * updates ember-composable-helpers to latest and uses includes helper since contains was removed * updates ember-concurrency to latest * updates ember-cli-clipboard to latest * temporary workaround for toolbar-link component throwing errors for using params arg with LinkTo * adds missing store injection to auth configure route * fixes issue with string-list component throwing error for accessing prop in same computation * fixes non-iterable query params issue in mfa methods controller * refactors field-to-attrs to handle belongsTo rather than fragments * converts mount-config fragment to belongsTo on auth-method model * removes ember-api-actions and adds tune method to auth-method adapter * converts cluster replication attributes from fragment to relationship * updates ember-data, removes ember-data-fragments and updates yarn to latest * removes fragments from secret-engine model * removes fragment from test-form-model * removes commented out code * minor change to inject-store-service codemod and runs again on js files * Remove LinkTo positional params (#17421) * updates ember-cli-page-object to latest version * update toolbar-link to support link-to args and not positional params * adds replace arg to toolbar-link component * Clean up js lint errors (#17426) * replaces assert.equal to assert.strictEqual * update eslint no-console to error and disables invididual intended uses of console * cleans up hbs lint warnings (#17432) * Upgrade bug and test fixes (#17500) * updates inject-service codemod to take arg for service name and runs for flashMessages service * fixes hbs lint error after merging main * fixes flash messages * updates more deps * bug fixes * test fixes * updates ember-cli-content-security-policy and prevents default form submission throwing errors * more bug and test fixes * removes commented out code * fixes issue with code-mirror modifier sending change event on setup causing same computation error * Upgrade Clean Up (#17543) * updates deprecation workflow and filter * cleans up build errors, removes unused ivy-codemirror and sass and updates ember-cli-sass and node-sass to latest * fixes control groups test that was skipped after upgrade * updates control group service tests * addresses review feedback * updates control group service handleError method to use router.currentURL rather that transition.intent.url * adds changelog entry
158 lines
5.5 KiB
JavaScript
158 lines
5.5 KiB
JavaScript
import { assign } from '@ember/polyfills';
|
|
import EmberObject from '@ember/object';
|
|
import ClusterRouteMixin from 'vault/mixins/cluster-route';
|
|
import {
|
|
INIT,
|
|
UNSEAL,
|
|
AUTH,
|
|
CLUSTER,
|
|
CLUSTER_INDEX,
|
|
DR_REPLICATION_SECONDARY,
|
|
REDIRECT,
|
|
} from 'vault/lib/route-paths';
|
|
import { module, test } from 'qunit';
|
|
import sinon from 'sinon';
|
|
|
|
module('Unit | Mixin | cluster route', function () {
|
|
function createClusterRoute(
|
|
clusterModel = {},
|
|
methods = { router: {}, hasKeyData: () => false, authToken: () => null, transitionTo: () => {} }
|
|
) {
|
|
let ClusterRouteObject = EmberObject.extend(
|
|
ClusterRouteMixin,
|
|
assign(methods, { clusterModel: () => clusterModel })
|
|
);
|
|
return ClusterRouteObject.create();
|
|
}
|
|
|
|
test('#targetRouteName init', function (assert) {
|
|
let subject = createClusterRoute({ needsInit: true });
|
|
subject.routeName = CLUSTER;
|
|
assert.strictEqual(subject.targetRouteName(), INIT, 'forwards to INIT when cluster needs init');
|
|
|
|
subject = createClusterRoute({ needsInit: false, sealed: true });
|
|
subject.routeName = CLUSTER;
|
|
assert.strictEqual(subject.targetRouteName(), UNSEAL, 'forwards to UNSEAL if sealed and initialized');
|
|
|
|
subject = createClusterRoute({ needsInit: false });
|
|
subject.routeName = CLUSTER;
|
|
assert.strictEqual(subject.targetRouteName(), AUTH, 'forwards to AUTH if unsealed and initialized');
|
|
|
|
subject = createClusterRoute({ dr: { isSecondary: true } });
|
|
subject.routeName = CLUSTER;
|
|
assert.strictEqual(
|
|
subject.targetRouteName(),
|
|
DR_REPLICATION_SECONDARY,
|
|
'forwards to DR_REPLICATION_SECONDARY if is a dr secondary'
|
|
);
|
|
});
|
|
|
|
test('#targetRouteName when #hasDataKey is true', function (assert) {
|
|
let subject = createClusterRoute(
|
|
{ needsInit: false, sealed: true },
|
|
{ hasKeyData: () => true, authToken: () => null }
|
|
);
|
|
|
|
subject.routeName = CLUSTER;
|
|
assert.strictEqual(
|
|
subject.targetRouteName(),
|
|
INIT,
|
|
'still land on INIT if there are keys on the controller'
|
|
);
|
|
|
|
subject.routeName = UNSEAL;
|
|
assert.strictEqual(subject.targetRouteName(), UNSEAL, 'allowed to proceed to unseal');
|
|
|
|
subject = createClusterRoute(
|
|
{ needsInit: false, sealed: false },
|
|
{ hasKeyData: () => true, authToken: () => null }
|
|
);
|
|
|
|
subject.routeName = AUTH;
|
|
assert.strictEqual(subject.targetRouteName(), AUTH, 'allowed to proceed to auth');
|
|
});
|
|
|
|
test('#targetRouteName happy path forwards to CLUSTER route', function (assert) {
|
|
let subject = createClusterRoute(
|
|
{ needsInit: false, sealed: false, dr: { isSecondary: false } },
|
|
{ hasKeyData: () => false, authToken: () => 'a token' }
|
|
);
|
|
subject.routeName = INIT;
|
|
assert.strictEqual(subject.targetRouteName(), CLUSTER, 'forwards when inited and navigating to INIT');
|
|
|
|
subject.routeName = UNSEAL;
|
|
assert.strictEqual(subject.targetRouteName(), CLUSTER, 'forwards when unsealed and navigating to UNSEAL');
|
|
|
|
subject.routeName = AUTH;
|
|
assert.strictEqual(
|
|
subject.targetRouteName(),
|
|
REDIRECT,
|
|
'forwards when authenticated and navigating to AUTH'
|
|
);
|
|
|
|
subject.routeName = DR_REPLICATION_SECONDARY;
|
|
assert.strictEqual(
|
|
subject.targetRouteName(),
|
|
CLUSTER,
|
|
'forwards when not a DR secondary and navigating to DR_REPLICATION_SECONDARY'
|
|
);
|
|
});
|
|
|
|
test('#targetRouteName happy path when not authed forwards to AUTH', function (assert) {
|
|
let subject = createClusterRoute(
|
|
{ needsInit: false, sealed: false, dr: { isSecondary: false } },
|
|
{ hasKeyData: () => false, authToken: () => null }
|
|
);
|
|
subject.routeName = INIT;
|
|
assert.strictEqual(subject.targetRouteName(), AUTH, 'forwards when inited and navigating to INIT');
|
|
|
|
subject.routeName = UNSEAL;
|
|
assert.strictEqual(subject.targetRouteName(), AUTH, 'forwards when unsealed and navigating to UNSEAL');
|
|
|
|
subject.routeName = AUTH;
|
|
assert.strictEqual(
|
|
subject.targetRouteName(),
|
|
AUTH,
|
|
'forwards when non-authenticated and navigating to AUTH'
|
|
);
|
|
|
|
subject.routeName = DR_REPLICATION_SECONDARY;
|
|
assert.strictEqual(
|
|
subject.targetRouteName(),
|
|
AUTH,
|
|
'forwards when not a DR secondary and navigating to DR_REPLICATION_SECONDARY'
|
|
);
|
|
});
|
|
|
|
test('#transitionToTargetRoute', function (assert) {
|
|
let redirectRouteURL = '/vault/secrets/secret/create';
|
|
let subject = createClusterRoute({ needsInit: false, sealed: false });
|
|
subject.router.currentURL = redirectRouteURL;
|
|
let spy = sinon.spy(subject, 'transitionTo');
|
|
subject.transitionToTargetRoute();
|
|
assert.ok(
|
|
spy.calledWithExactly(AUTH, { queryParams: { redirect_to: redirectRouteURL } }),
|
|
'calls transitionTo with the expected args'
|
|
);
|
|
|
|
spy.restore();
|
|
});
|
|
|
|
test('#transitionToTargetRoute with auth as a target', function (assert) {
|
|
let subject = createClusterRoute({ needsInit: false, sealed: false });
|
|
let spy = sinon.spy(subject, 'transitionTo');
|
|
// in this case it's already transitioning to the AUTH route so we don't need to call transitionTo again
|
|
subject.transitionToTargetRoute({ targetName: AUTH });
|
|
assert.ok(spy.notCalled, 'transitionTo is not called');
|
|
spy.restore();
|
|
});
|
|
|
|
test('#transitionToTargetRoute with auth target, coming from cluster route', function (assert) {
|
|
let subject = createClusterRoute({ needsInit: false, sealed: false });
|
|
let spy = sinon.spy(subject, 'transitionTo');
|
|
subject.transitionToTargetRoute({ targetName: CLUSTER_INDEX });
|
|
assert.ok(spy.calledWithExactly(AUTH), 'calls transitionTo without redirect_to');
|
|
spy.restore();
|
|
});
|
|
});
|