3da6487cf4
* add redirect_to query param * alias auth controller state to vault controller where the query param is defined * capture the current url before redirecting a user to auth if they're being redirected * consume and reset the redirectTo query param when authenticating * make sure that the current url when logging out does not get set as the redirect_to query param * add unit tests for the mixin and make it so that redirects from the root don't end up in redirect_to * acceptance tests for redirect
123 lines
4.5 KiB
JavaScript
123 lines
4.5 KiB
JavaScript
import { assign } from '@ember/polyfills';
|
|
import EmberObject from '@ember/object';
|
|
import ClusterRouteMixin from 'vault/mixins/cluster-route';
|
|
import {
|
|
INIT,
|
|
UNSEAL,
|
|
AUTH,
|
|
CLUSTER,
|
|
CLUSTER_INDEX,
|
|
DR_REPLICATION_SECONDARY,
|
|
} from 'vault/mixins/cluster-route';
|
|
import { module, test } from 'qunit';
|
|
import sinon from 'sinon';
|
|
|
|
module('Unit | Mixin | cluster route', function() {
|
|
function createClusterRoute(
|
|
clusterModel = {},
|
|
methods = { router: {}, hasKeyData: () => false, authToken: () => null, transitionTo: () => {} }
|
|
) {
|
|
let ClusterRouteObject = EmberObject.extend(
|
|
ClusterRouteMixin,
|
|
assign(methods, { clusterModel: () => clusterModel })
|
|
);
|
|
return ClusterRouteObject.create();
|
|
}
|
|
|
|
test('#targetRouteName init', function(assert) {
|
|
let subject = createClusterRoute({ needsInit: true });
|
|
subject.routeName = CLUSTER;
|
|
assert.equal(subject.targetRouteName(), INIT, 'forwards to INIT when cluster needs init');
|
|
|
|
subject = createClusterRoute({ needsInit: false, sealed: true });
|
|
subject.routeName = CLUSTER;
|
|
assert.equal(subject.targetRouteName(), UNSEAL, 'forwards to UNSEAL if sealed and initialized');
|
|
|
|
subject = createClusterRoute({ needsInit: false });
|
|
subject.routeName = CLUSTER;
|
|
assert.equal(subject.targetRouteName(), AUTH, 'forwards to AUTH if unsealed and initialized');
|
|
|
|
subject = createClusterRoute({ dr: { isSecondary: true } });
|
|
subject.routeName = CLUSTER;
|
|
assert.equal(
|
|
subject.targetRouteName(),
|
|
DR_REPLICATION_SECONDARY,
|
|
'forwards to DR_REPLICATION_SECONDARY if is a dr secondary'
|
|
);
|
|
});
|
|
|
|
test('#targetRouteName when #hasDataKey is true', function(assert) {
|
|
let subject = createClusterRoute(
|
|
{ needsInit: false, sealed: true },
|
|
{ hasKeyData: () => true, authToken: () => null }
|
|
);
|
|
|
|
subject.routeName = CLUSTER;
|
|
assert.equal(subject.targetRouteName(), INIT, 'still land on INIT if there are keys on the controller');
|
|
|
|
subject.routeName = UNSEAL;
|
|
assert.equal(subject.targetRouteName(), UNSEAL, 'allowed to proceed to unseal');
|
|
|
|
subject = createClusterRoute(
|
|
{ needsInit: false, sealed: false },
|
|
{ hasKeyData: () => true, authToken: () => null }
|
|
);
|
|
|
|
subject.routeName = AUTH;
|
|
assert.equal(subject.targetRouteName(), AUTH, 'allowed to proceed to auth');
|
|
});
|
|
|
|
test('#targetRouteName happy path forwards to CLUSTER route', function(assert) {
|
|
let subject = createClusterRoute(
|
|
{ needsInit: false, sealed: false, dr: { isSecondary: false } },
|
|
{ hasKeyData: () => false, authToken: () => 'a token' }
|
|
);
|
|
subject.routeName = INIT;
|
|
assert.equal(subject.targetRouteName(), CLUSTER, 'forwards when inited and navigating to INIT');
|
|
|
|
subject.routeName = UNSEAL;
|
|
assert.equal(subject.targetRouteName(), CLUSTER, 'forwards when unsealed and navigating to UNSEAL');
|
|
|
|
subject.routeName = AUTH;
|
|
assert.equal(subject.targetRouteName(), CLUSTER, 'forwards when authenticated and navigating to AUTH');
|
|
|
|
subject.routeName = DR_REPLICATION_SECONDARY;
|
|
assert.equal(
|
|
subject.targetRouteName(),
|
|
CLUSTER,
|
|
'forwards when not a DR secondary and navigating to DR_REPLICATION_SECONDARY'
|
|
);
|
|
});
|
|
|
|
test('#transitionToTargetRoute', function(assert) {
|
|
let redirectRouteURL = '/vault/secrets/secret/create';
|
|
let subject = createClusterRoute({ needsInit: false, sealed: false });
|
|
subject.router.currentURL = redirectRouteURL;
|
|
let spy = sinon.spy(subject, 'transitionTo');
|
|
subject.transitionToTargetRoute();
|
|
assert.ok(
|
|
spy.calledWithExactly(AUTH, { queryParams: { redirect_to: redirectRouteURL } }),
|
|
'calls transitionTo with the expected args'
|
|
);
|
|
|
|
spy.restore();
|
|
});
|
|
|
|
test('#transitionToTargetRoute with auth as a target', function(assert) {
|
|
let subject = createClusterRoute({ needsInit: false, sealed: false });
|
|
let spy = sinon.spy(subject, 'transitionTo');
|
|
// in this case it's already transitioning to the AUTH route so we don't need to call transitionTo again
|
|
subject.transitionToTargetRoute({ targetName: AUTH });
|
|
assert.ok(spy.notCalled, 'transitionTo is not called');
|
|
spy.restore();
|
|
});
|
|
|
|
test('#transitionToTargetRoute with auth target, coming from cluster route', function(assert) {
|
|
let subject = createClusterRoute({ needsInit: false, sealed: false });
|
|
let spy = sinon.spy(subject, 'transitionTo');
|
|
subject.transitionToTargetRoute({ targetName: CLUSTER_INDEX });
|
|
assert.ok(spy.calledWithExactly(AUTH), 'calls transitionTo without redirect_to');
|
|
spy.restore();
|
|
});
|
|
});
|