d89ef3c369
* remove skip * remove skip from create test * some changes * small changes to address local failures * replace page object with dom click to help with flaky control group test * small fix that seems to help control group failures * some skipping to bring back my sanity * focusing on the section-cert-test for pki * another try at the secret cert test * skipping to focus on secret-certs * fingers crossed for pki role test * hopefully some help with control group * more on control groups * trying for one less skip here * create test remove skips * remove skip * remove comment * back to skip this test * shouldn't make sense but it does, changed the name to hit it first in acceptance test and that works * redirect testing * remove catch because that was not the issue, it never got triggered * cleanup * clean up * remove comments and add catch
286 lines
9.5 KiB
JavaScript
286 lines
9.5 KiB
JavaScript
import { currentURL, currentRouteName, settled, fillIn } from '@ember/test-helpers';
|
|
import { module, test } from 'qunit';
|
|
import { setupApplicationTest } from 'ember-qunit';
|
|
import { create } from 'ember-cli-page-object';
|
|
|
|
import consoleClass from 'vault/tests/pages/components/console/ui-panel';
|
|
import authPage from 'vault/tests/pages/auth';
|
|
import scopesPage from 'vault/tests/pages/secrets/backend/kmip/scopes';
|
|
import rolesPage from 'vault/tests/pages/secrets/backend/kmip/roles';
|
|
import credentialsPage from 'vault/tests/pages/secrets/backend/kmip/credentials';
|
|
import mountSecrets from 'vault/tests/pages/settings/mount-secret-backend';
|
|
|
|
const uiConsole = create(consoleClass);
|
|
|
|
const getRandomPort = () => {
|
|
let a = Math.floor(100000 + Math.random() * 900000);
|
|
a = String(a);
|
|
return a.substring(0, 4);
|
|
};
|
|
|
|
const mount = async (shouldConfig = true) => {
|
|
const now = Date.now();
|
|
let path = `kmip-${now}`;
|
|
let addr = `127.0.0.1:${getRandomPort()}`; // use random port
|
|
let commands = shouldConfig
|
|
? [`write sys/mounts/${path} type=kmip`, `write ${path}/config listen_addrs=${addr}`]
|
|
: [`write sys/mounts/${path} type=kmip`];
|
|
await uiConsole.runCommands(commands);
|
|
await settled();
|
|
let res = uiConsole.lastLogOutput;
|
|
if (res.includes('Error')) {
|
|
throw new Error(`Error mounting secrets engine: ${res}`);
|
|
}
|
|
return path;
|
|
};
|
|
|
|
const createScope = async () => {
|
|
let path = await mount();
|
|
let scope = `scope-${Date.now()}`;
|
|
await uiConsole.runCommands([`write ${path}/scope/${scope} -force`]);
|
|
let res = uiConsole.lastLogOutput;
|
|
if (res.includes('Error')) {
|
|
throw new Error(`Error creating scope: ${res}`);
|
|
}
|
|
return { path, scope };
|
|
};
|
|
|
|
const createRole = async () => {
|
|
let { path, scope } = await createScope();
|
|
let role = `role-${Date.now()}`;
|
|
await uiConsole.runCommands([`write ${path}/scope/${scope}/role/${role} operation_all=true`]);
|
|
let res = uiConsole.lastLogOutput;
|
|
if (res.includes('Error')) {
|
|
throw new Error(`Error creating role: ${res}`);
|
|
}
|
|
return { path, scope, role };
|
|
};
|
|
|
|
const generateCreds = async () => {
|
|
let { path, scope, role } = await createRole();
|
|
await uiConsole.runCommands([
|
|
`write ${path}/scope/${scope}/role/${role}/credential/generate format=pem -field=serial_number`,
|
|
]);
|
|
let serial = uiConsole.lastLogOutput;
|
|
if (serial.includes('Error')) {
|
|
throw new Error(`Credential generation failed with error: ${serial}`);
|
|
}
|
|
return { path, scope, role, serial };
|
|
};
|
|
module('Acceptance | Enterprise | KMIP secrets', function(hooks) {
|
|
setupApplicationTest(hooks);
|
|
|
|
hooks.beforeEach(function() {
|
|
return authPage.login();
|
|
});
|
|
|
|
test('it enables KMIP secrets engine', async function(assert) {
|
|
let path = `kmip-${Date.now()}`;
|
|
await mountSecrets.enable('kmip', path);
|
|
await settled();
|
|
assert.equal(
|
|
currentURL(),
|
|
`/vault/secrets/${path}/kmip/scopes`,
|
|
'mounts and redirects to the kmip scopes page'
|
|
);
|
|
assert.ok(scopesPage.isEmpty, 'renders empty state');
|
|
});
|
|
|
|
test('it can configure a KMIP secrets engine', async function(assert) {
|
|
let path = await mount(false);
|
|
await scopesPage.visit({ backend: path });
|
|
await settled();
|
|
await scopesPage.configurationLink();
|
|
await settled();
|
|
assert.equal(
|
|
currentURL(),
|
|
`/vault/secrets/${path}/kmip/configuration`,
|
|
'configuration navigates to the config page'
|
|
);
|
|
assert.ok(scopesPage.isEmpty, 'config page renders empty state');
|
|
|
|
await scopesPage.configureLink();
|
|
await settled();
|
|
assert.equal(
|
|
currentURL(),
|
|
`/vault/secrets/${path}/kmip/configure`,
|
|
'configuration navigates to the configure page'
|
|
);
|
|
let addr = `127.0.0.1:${getRandomPort()}`;
|
|
await fillIn('[data-test-string-list-input="0"]', addr);
|
|
|
|
await scopesPage.submit();
|
|
await settled();
|
|
assert.equal(
|
|
currentURL(),
|
|
`/vault/secrets/${path}/kmip/configuration`,
|
|
'redirects to configuration page after saving config'
|
|
);
|
|
assert.notOk(scopesPage.isEmpty, 'configuration page no longer renders empty state');
|
|
});
|
|
|
|
test('it can create a scope', async function(assert) {
|
|
let path = await mount(this);
|
|
await scopesPage.visit({ backend: path });
|
|
await settled();
|
|
await scopesPage.createLink();
|
|
await settled();
|
|
assert.equal(
|
|
currentURL(),
|
|
`/vault/secrets/${path}/kmip/scopes/create`,
|
|
'navigates to the kmip scope create page'
|
|
);
|
|
|
|
// create scope
|
|
await scopesPage.scopeName('foo');
|
|
await settled();
|
|
await scopesPage.submit();
|
|
await settled();
|
|
assert.equal(
|
|
currentURL(),
|
|
`/vault/secrets/${path}/kmip/scopes`,
|
|
'navigates to the kmip scopes page after create'
|
|
);
|
|
assert.equal(scopesPage.listItemLinks.length, 1, 'renders a single scope');
|
|
});
|
|
|
|
test('it can delete a scope from the list', async function(assert) {
|
|
let { path } = await createScope();
|
|
await scopesPage.visit({ backend: path });
|
|
await settled();
|
|
// delete the scope
|
|
await scopesPage.listItemLinks.objectAt(0).menuToggle();
|
|
await settled();
|
|
await scopesPage.delete();
|
|
await settled();
|
|
await scopesPage.confirmDelete();
|
|
await settled();
|
|
assert.equal(scopesPage.listItemLinks.length, 0, 'no scopes');
|
|
assert.ok(scopesPage.isEmpty, 'renders the empty state');
|
|
});
|
|
|
|
test('it can create a role', async function(assert) {
|
|
let { path, scope } = await createScope();
|
|
let role = `role-${Date.now()}`;
|
|
await rolesPage.visit({ backend: path, scope });
|
|
await settled();
|
|
assert.ok(rolesPage.isEmpty, 'renders the empty role page');
|
|
await rolesPage.create();
|
|
await settled();
|
|
assert.equal(
|
|
currentURL(),
|
|
`/vault/secrets/${path}/kmip/scopes/${scope}/roles/create`,
|
|
'links to the role create form'
|
|
);
|
|
|
|
await rolesPage.roleName(role);
|
|
await settled();
|
|
await rolesPage.submit();
|
|
await settled();
|
|
assert.equal(
|
|
currentURL(),
|
|
`/vault/secrets/${path}/kmip/scopes/${scope}/roles`,
|
|
'redirects to roles list'
|
|
);
|
|
|
|
assert.equal(rolesPage.listItemLinks.length, 1, 'renders a single role');
|
|
});
|
|
|
|
test('it can delete a role from the list', async function(assert) {
|
|
let { path, scope } = await createRole();
|
|
await rolesPage.visit({ backend: path, scope });
|
|
await settled();
|
|
// delete the role
|
|
await rolesPage.listItemLinks.objectAt(0).menuToggle();
|
|
await settled();
|
|
await rolesPage.delete();
|
|
await settled();
|
|
await rolesPage.confirmDelete();
|
|
await settled();
|
|
assert.equal(rolesPage.listItemLinks.length, 0, 'renders no roles');
|
|
assert.ok(rolesPage.isEmpty, 'renders empty');
|
|
});
|
|
|
|
test('it can delete a role from the detail page', async function(assert) {
|
|
let { path, scope, role } = await createRole();
|
|
await settled();
|
|
await rolesPage.visitDetail({ backend: path, scope, role });
|
|
await settled();
|
|
await rolesPage.detailEditLink();
|
|
await settled();
|
|
assert.equal(
|
|
currentURL(),
|
|
`/vault/secrets/${path}/kmip/scopes/${scope}/roles/${role}/edit`,
|
|
'navigates to role edit'
|
|
);
|
|
await rolesPage.cancelLink();
|
|
await settled();
|
|
assert.equal(
|
|
currentURL(),
|
|
`/vault/secrets/${path}/kmip/scopes/${scope}/roles/${role}`,
|
|
'cancel navigates to role show'
|
|
);
|
|
await rolesPage.delete().confirmDelete();
|
|
await settled();
|
|
assert.equal(
|
|
currentURL(),
|
|
`/vault/secrets/${path}/kmip/scopes/${scope}/roles`,
|
|
'redirects to the roles list'
|
|
);
|
|
assert.ok(rolesPage.isEmpty, 'renders an empty roles page');
|
|
});
|
|
|
|
test('it can create a credential', async function(assert) {
|
|
// TODO come back and figure out why issue here with test
|
|
let { path, scope, role } = await createRole();
|
|
await credentialsPage.visit({ backend: path, scope, role });
|
|
await settled();
|
|
assert.ok(credentialsPage.isEmpty, 'renders empty creds page');
|
|
await credentialsPage.generateCredentialsLink();
|
|
await settled();
|
|
assert.equal(
|
|
currentURL(),
|
|
`/vault/secrets/${path}/kmip/scopes/${scope}/roles/${role}/credentials/generate`,
|
|
'navigates to generate credentials'
|
|
);
|
|
await credentialsPage.submit();
|
|
await settled();
|
|
assert.equal(
|
|
currentRouteName(),
|
|
'vault.cluster.secrets.backend.kmip.credentials.show',
|
|
'generate redirects to the show page'
|
|
);
|
|
await credentialsPage.backToRoleLink();
|
|
await settled();
|
|
assert.equal(credentialsPage.listItemLinks.length, 1, 'renders a single credential');
|
|
});
|
|
|
|
test('it can revoke a credential from the list', async function(assert) {
|
|
let { path, scope, role } = await generateCreds();
|
|
await credentialsPage.visit({ backend: path, scope, role });
|
|
// revoke the credentials
|
|
await settled();
|
|
await credentialsPage.listItemLinks.objectAt(0).menuToggle();
|
|
await settled();
|
|
await credentialsPage.delete().confirmDelete();
|
|
await settled();
|
|
assert.equal(credentialsPage.listItemLinks.length, 0, 'renders no credentials');
|
|
assert.ok(credentialsPage.isEmpty, 'renders empty');
|
|
});
|
|
|
|
test('it can revoke from the credentials show page', async function(assert) {
|
|
let { path, scope, role, serial } = await generateCreds();
|
|
await credentialsPage.visitDetail({ backend: path, scope, role, serial });
|
|
await settled();
|
|
await credentialsPage.delete().confirmDelete();
|
|
await settled();
|
|
|
|
assert.equal(
|
|
currentURL(),
|
|
`/vault/secrets/${path}/kmip/scopes/${scope}/roles/${role}/credentials`,
|
|
'redirects to the credentials list'
|
|
);
|
|
assert.ok(credentialsPage.isEmpty, 'renders an empty credentials page');
|
|
});
|
|
});
|