Files
vault/ui/tests/acceptance/enterprise-control-groups-test.js
Angel Garbarino 403b94eb34 Ember-cli upgrade from ~3.8 to ~3.20 (#9972)
* Update ember-cli to ~3.20

* Remove bad optional-feature

* Remove ember-fetch dep

* re-install ember-fetch

* update model fragments pr

* update ember model fragments correct package name

* update ember composable helpers to solve array helper error

* update ember-concurrency

* add back engine dependencies, automatically removed during ember-cli-upgrade

* make author-form-options component js file otherwise error

* for now comment out withTestWaiter

* add eslint-node and fix if not with unless in templates

* fix linting for tab index of false is now -1 and add type button to all buttons without types

* fix href errors for linting, likely have to come back and fix

* using eslint fix flag to fix all this.gets

* ember modules codemode removed files that had module twice, will fix in next commit

* finish codemode ember-data-codemod needed to rename const model

* more this.get removal codemode did not work

* cont. removal of this.get

* stop mixin rules until figure out how to reconfig them all

* smaller eslint ignores

* get codemode

* testing app small fixes to bring it back after all the changes

* small changes to eslint

* test removal of getProperties

* fix issue with baseKey because value could be unknown needed to add a question mark in nested get

* smaller linting fixes

* get nested fixes

* small linting error fixes

* small linting changes

* working through more small linting changes

* another round of linting modifications

* liniting fixes

* ember module codemod

* quinit dom codemod

* angle bracket codemod

* discovered that components must have js files

* ran all codemods this is all that's left

* small changes to fix get needs two object, should not have been using get.

* fix issue with one input in form field

* fun times with set and onChange from oninput

* fix issue with model not being passed through on secret-edit-display

* fix issue with yarn run test not working, revert without npm run all

* linting and small fix when loading without a selectAuthBackend

* fix failing test with ui-wizard issue

* fix test failure due to model not being asked for correctly with new changes, probably run into this more.

* fix issue with component helper and at props specific to wizard

* rename log to clilog due to conflict with new eslint rule

* small changes for test failures

* component helper at fixes

* Revert to old component style something with new one broke this and can't figure it out for now

* small fishy smelling test fixes will revisit

* small test changes

* more small test changes, appears upgrade treats spaces differently

* comment out code and test that no longer seems relevant but confirm

* clean run on component test though still some potential timing issues on ui-console test

* fixing one auth test issue and timing issue on enable-test

* small mods

* fix this conditional check from upgrade

* linting fixes after master merge

* package updates using yarn upgrade-interactive

* update libraries that did not effect any of the test failures.

* update ember truth helpers library

* settling tests

* Fix ui-panel control group output

* fix features selection test failures

* Fix auth tests (x-vault-token)

* fix shared test

* fix issue with data null on backend

* Revert "Fix auth tests (x-vault-token)"

This reverts commit 89cb174b2f.

* Fix auth tests (x-vault-token) without updating this.set

* Update redirect-to tests

* fix wrapped token test

* skip some flaky test

* fix issue with href and a tags vs buttons

* fix linting

* updates to get tests running (#10409)

* yarn isntall

* increasing resource_class

* whoops

* trying large

* back to xlarge

* Fix param issue on transform item routes

* test fixes

* settle on policies (old) test

* fix browserstack test warning and skips of test confirmed worked

* Fix redirect-to test

* skips

* fix transformation test and skip some kmip

* Skip tests

* Add meep marker to remaining failing tests

* Skip test with failing component

* rever skip on secret-create test

* Skip piece of test that fails due to navigation-input

* fix settings test where can and skip in others after confirming

* fix circle ci test failures

* ssh role settle

* Fix navigate-input and add settled to test

* Remove extra import

* secret cubbyhole and alicloud

* Add settled to gcpkms test

* settles on redirect to test

* Bump browserstack test resource to large

* Update browserstack resource size to xlarge

* update todos

* add back in withTestWaiter

* try and fix credentials conditional action added comment instead

* Update volatile computed properies to get functions

* this step was never reached and we never defined secretType anywhere so I removed

* add settled to policy old test

* Fix navigate-input on policies and leases

* replace ssh test with no var hoping that helps and add settled to other failing tests, unskip console tests

* kmip, transit, role test remove a skip and add in settled

* fix hover copy button, had to remove some testing functionality

* Remove private router service

* remove skip on control ssh and ui panel, fix search select by restructuring how to read the error

* final bit of working through skipped test

* Replace clearNonGlobalModels by linking directly to namespace with href-to

* Remove unused var

* Fix role-ssh id bug by updating form-field-from-model to form-field-group-loop

* Fix transit create id would not update

* Update option toggle selector for ssh-role

* Fix ssh selector

* cleanup pt1

* small clean up

* cleanup part2

* Fix computed on pricing-metrics-form

* small cleanup based on chelseas comments.

Co-authored-by: Chelsea Shaw <chelshaw.dev@gmail.com>
Co-authored-by: Sarah Thompson <sthompson@hashicorp.com>
2020-12-03 16:00:22 -07:00

224 lines
7.8 KiB
JavaScript

import { settled, currentURL, currentRouteName, visit } from '@ember/test-helpers';
import { module, test } from 'qunit';
import { setupApplicationTest } from 'ember-qunit';
import { create } from 'ember-cli-page-object';
import { storageKey } from 'vault/services/control-group';
import consoleClass from 'vault/tests/pages/components/console/ui-panel';
import authForm from 'vault/tests/pages/components/auth-form';
import controlGroup from 'vault/tests/pages/components/control-group';
import controlGroupSuccess from 'vault/tests/pages/components/control-group-success';
import authPage from 'vault/tests/pages/auth';
import editPage from 'vault/tests/pages/secrets/backend/kv/edit-secret';
import listPage from 'vault/tests/pages/secrets/backend/list';
const consoleComponent = create(consoleClass);
const authFormComponent = create(authForm);
const controlGroupComponent = create(controlGroup);
const controlGroupSuccessComponent = create(controlGroupSuccess);
module('Acceptance | Enterprise | control groups', function(hooks) {
setupApplicationTest(hooks);
hooks.beforeEach(function() {
return authPage.login();
});
const POLICY = `
path "kv/foo" {
capabilities = ["create", "read", "update", "delete", "list"]
control_group = {
max_ttl = "24h"
factor "ops_manager" {
identity {
group_names = ["managers"]
approvals = 1
}
}
}
}
path "kv-v2-mount/data/foo" {
capabilities = ["create", "read", "update", "list"]
control_group = {
max_ttl = "24h"
factor "ops_manager" {
identity {
group_names = ["managers"]
approvals = 1
}
}
}
}
path "kv-v2-mount/*" {
capabilities = ["list"]
}
`;
const AUTHORIZER_POLICY = `
path "sys/control-group/authorize" {
capabilities = ["update"]
}
path "sys/control-group/request" {
capabilities = ["update"]
}
`;
const ADMIN_USER = 'authorizer';
const ADMIN_PASSWORD = 'test';
const setupControlGroup = async context => {
let userpassAccessor;
await visit('/vault/secrets');
await consoleComponent.toggle();
await consoleComponent.runCommands([
//enable kv-v1 mount and write a secret
'write sys/mounts/kv type=kv',
'write kv/foo bar=baz',
//enable userpass, create user and associated entity
'write sys/auth/userpass type=userpass',
`write auth/userpass/users/${ADMIN_USER} password=${ADMIN_PASSWORD} policies=default`,
`write identity/entity name=${ADMIN_USER} policies=test`,
// write policies for control group + authorization
`write sys/policies/acl/kv-control-group policy=${btoa(POLICY)}`,
`write sys/policies/acl/authorizer policy=${btoa(AUTHORIZER_POLICY)}`,
// read out mount to get the accessor
'read -field=accessor sys/internal/ui/mounts/auth/userpass',
]);
await settled();
userpassAccessor = consoleComponent.lastTextOutput;
await consoleComponent.runCommands([
// lookup entity id for our authorizer
`write -field=id identity/lookup/entity name=${ADMIN_USER}`,
]);
await settled();
let authorizerEntityId = consoleComponent.lastTextOutput;
await consoleComponent.runCommands([
// create alias for authorizor and add them to the managers group
`write identity/alias mount_accessor=${userpassAccessor} entity_id=${authorizerEntityId} name=${ADMIN_USER}`,
`write identity/group name=managers member_entity_ids=${authorizerEntityId} policies=authorizer`,
// create a token to request access to kv/foo
'write -field=client_token auth/token/create policies=kv-control-group',
]);
await settled();
context.userToken = consoleComponent.lastLogOutput;
await authPage.login(context.userToken);
return this;
};
const writeSecret = async function(backend, path, key, val) {
await listPage.visitRoot({ backend });
await listPage.create();
await editPage.createSecret(path, key, val);
};
test('for v2 secrets it redirects you if you try to navigate to a Control Group restricted path', async function(assert) {
await consoleComponent.runCommands([
'write sys/mounts/kv-v2-mount type=kv-v2',
'delete kv-v2-mount/metadata/foo',
]);
await writeSecret('kv-v2-mount', 'foo', 'bar', 'baz');
await settled();
await setupControlGroup(this);
await settled();
await visit('/vault/secrets/kv-v2-mount/show/foo');
await settled();
assert.equal(
currentRouteName(),
'vault.cluster.access.control-group-accessor',
'redirects to access control group route'
);
});
const workflow = async (assert, context, shouldStoreToken) => {
let controlGroupToken;
let accessor;
let url = '/vault/secrets/kv/show/foo';
await setupControlGroup(context);
await settled();
// as the requestor, go to the URL that's blocked by the control group
// and store the values
await visit(url);
await settled();
accessor = controlGroupComponent.accessor;
controlGroupToken = controlGroupComponent.token;
await authPage.logout();
await settled();
// log in as the admin, navigate to the accessor page,
// and authorize the control group request
await visit('/vault/auth?with=userpass');
await settled();
await authFormComponent.username(ADMIN_USER);
await settled();
await authFormComponent.password(ADMIN_PASSWORD);
await settled();
await authFormComponent.login();
await settled();
await visit(`/vault/access/control-groups/${accessor}`);
await settled();
await controlGroupComponent.authorize();
await settled();
assert.equal(controlGroupComponent.bannerPrefix, 'Thanks!', 'text display changes');
await settled();
await authPage.logout();
await settled();
await authPage.login(context.userToken);
await settled();
if (shouldStoreToken) {
localStorage.setItem(
storageKey(accessor, 'kv/foo'),
JSON.stringify({
accessor,
token: controlGroupToken,
creation_path: 'kv/foo',
uiParams: {
url,
},
})
);
await visit(`/vault/access/control-groups/${accessor}`);
await settled();
assert.ok(controlGroupSuccessComponent.showsNavigateMessage, 'shows user the navigate message');
await controlGroupSuccessComponent.navigate();
await settled();
assert.equal(currentURL(), url, 'successfully loads the target url');
} else {
await visit(`/vault/access/control-groups/${accessor}`);
await settled();
await controlGroupSuccessComponent.token(controlGroupToken);
await settled();
await controlGroupSuccessComponent.unwrap();
await settled();
assert.ok(controlGroupSuccessComponent.showsJsonViewer, 'shows the json viewer');
}
};
test('it allows the full flow to work with a saved token', async function(assert) {
await workflow(assert, this, true);
await settled();
});
test('it allows the full flow to work without a saved token', async function(assert) {
await workflow(assert, this);
await settled();
});
test('it displays the warning in the console when making a request to a Control Group path', async function(assert) {
await setupControlGroup(this);
await settled();
await consoleComponent.toggle();
await settled();
await consoleComponent.runCommands('read kv/foo');
await settled();
let output = consoleComponent.lastLogOutput;
assert.ok(output.includes('A Control Group was encountered at kv/foo'));
assert.ok(output.includes('The Control Group Token is'));
assert.ok(output.includes('The Accessor is'));
assert.ok(output.includes('Visit /ui/vault/access/control-groups/'));
});
});