mirror of
				https://github.com/optim-enterprises-bv/vault.git
				synced 2025-10-31 10:37:56 +00:00 
			
		
		
		
	 d4766766f2
			
		
	
	d4766766f2
	
	
	
		
			
			* runs ember-cli-update to 4.4.0 * updates yarn.lock * updates dependencies causing runtime errors (#17135) * Inject Store Service When Accessed Implicitly (#17345) * adds codemod for injecting store service * adds custom babylon parser with decorators-legacy plugin for jscodeshift transforms * updates inject-store-service codemod to only look for .extend object expressions and adds recast options * runs inject-store-service codemod on js files * replace query-params helper with hash (#17404) * Updates/removes dependencies throwing errors in Ember 4.4 (#17396) * updates ember-responsive to latest * updates ember-composable-helpers to latest and uses includes helper since contains was removed * updates ember-concurrency to latest * updates ember-cli-clipboard to latest * temporary workaround for toolbar-link component throwing errors for using params arg with LinkTo * adds missing store injection to auth configure route * fixes issue with string-list component throwing error for accessing prop in same computation * fixes non-iterable query params issue in mfa methods controller * refactors field-to-attrs to handle belongsTo rather than fragments * converts mount-config fragment to belongsTo on auth-method model * removes ember-api-actions and adds tune method to auth-method adapter * converts cluster replication attributes from fragment to relationship * updates ember-data, removes ember-data-fragments and updates yarn to latest * removes fragments from secret-engine model * removes fragment from test-form-model * removes commented out code * minor change to inject-store-service codemod and runs again on js files * Remove LinkTo positional params (#17421) * updates ember-cli-page-object to latest version * update toolbar-link to support link-to args and not positional params * adds replace arg to toolbar-link component * Clean up js lint errors (#17426) * replaces assert.equal to assert.strictEqual * update eslint no-console to error and disables invididual intended uses of console * cleans up hbs lint warnings (#17432) * Upgrade bug and test fixes (#17500) * updates inject-service codemod to take arg for service name and runs for flashMessages service * fixes hbs lint error after merging main * fixes flash messages * updates more deps * bug fixes * test fixes * updates ember-cli-content-security-policy and prevents default form submission throwing errors * more bug and test fixes * removes commented out code * fixes issue with code-mirror modifier sending change event on setup causing same computation error * Upgrade Clean Up (#17543) * updates deprecation workflow and filter * cleans up build errors, removes unused ivy-codemirror and sass and updates ember-cli-sass and node-sass to latest * fixes control groups test that was skipped after upgrade * updates control group service tests * addresses review feedback * updates control group service handleError method to use router.currentURL rather that transition.intent.url * adds changelog entry
		
			
				
	
	
		
			183 lines
		
	
	
		
			7.0 KiB
		
	
	
	
		
			JavaScript
		
	
	
	
	
	
			
		
		
	
	
			183 lines
		
	
	
		
			7.0 KiB
		
	
	
	
		
			JavaScript
		
	
	
	
	
	
| import Service from '@ember/service';
 | |
| import { module, test } from 'qunit';
 | |
| import { setupRenderingTest } from 'ember-qunit';
 | |
| import { render } from '@ember/test-helpers';
 | |
| import hbs from 'htmlbars-inline-precompile';
 | |
| import sinon from 'sinon';
 | |
| import { create } from 'ember-cli-page-object';
 | |
| import controlGroup from '../../pages/components/control-group';
 | |
| 
 | |
| const component = create(controlGroup);
 | |
| 
 | |
| const controlGroupService = Service.extend({
 | |
|   init() {
 | |
|     this._super(...arguments);
 | |
|     this.set('wrapInfo', null);
 | |
|   },
 | |
|   wrapInfoForAccessor() {
 | |
|     return this.wrapInfo;
 | |
|   },
 | |
| });
 | |
| 
 | |
| const authService = Service.extend();
 | |
| 
 | |
| module('Integration | Component | control group', function (hooks) {
 | |
|   setupRenderingTest(hooks);
 | |
| 
 | |
|   hooks.beforeEach(function () {
 | |
|     this.owner.register('service:auth', authService);
 | |
|     this.owner.register('service:control-group', controlGroupService);
 | |
|     this.controlGroup = this.owner.lookup('service:controlGroup');
 | |
|     this.auth = this.owner.lookup('service:auth');
 | |
|   });
 | |
| 
 | |
|   const setup = (modelData = {}, authData = {}) => {
 | |
|     let modelDefaults = {
 | |
|       approved: false,
 | |
|       requestPath: 'foo/bar',
 | |
|       id: 'accessor',
 | |
|       requestEntity: { id: 'requestor', name: 'entity8509' },
 | |
|       reload: sinon.stub(),
 | |
|     };
 | |
|     let authDataDefaults = { entity_id: 'requestor' };
 | |
| 
 | |
|     return {
 | |
|       model: {
 | |
|         ...modelDefaults,
 | |
|         ...modelData,
 | |
|       },
 | |
|       authData: {
 | |
|         ...authDataDefaults,
 | |
|         ...authData,
 | |
|       },
 | |
|     };
 | |
|   };
 | |
| 
 | |
|   test('requestor rendering', async function (assert) {
 | |
|     let { model, authData } = setup();
 | |
|     this.set('model', model);
 | |
|     this.set('auth.authData', authData);
 | |
|     await render(hbs`{{control-group model=this.model}}`);
 | |
|     assert.ok(component.showsAccessorCallout, 'shows accessor callout');
 | |
|     assert.strictEqual(component.bannerPrefix, 'Locked');
 | |
|     assert.strictEqual(component.bannerText, 'The path you requested is locked by a Control Group');
 | |
|     assert.strictEqual(component.requestorText, `You are requesting access to ${model.requestPath}`);
 | |
|     assert.false(component.showsTokenText, 'does not show token message when there is no token');
 | |
|     assert.ok(component.showsRefresh, 'shows refresh button');
 | |
|     assert.ok(component.authorizationText, 'Awaiting authorization.');
 | |
|   });
 | |
| 
 | |
|   test('requestor rendering: with token', async function (assert) {
 | |
|     let { model, authData } = setup();
 | |
|     this.set('model', model);
 | |
|     this.set('auth.authData', authData);
 | |
|     this.set('controlGroup.wrapInfo', { token: 'token' });
 | |
|     await render(hbs`{{control-group model=this.model}}`);
 | |
|     assert.true(component.showsTokenText, 'shows token message');
 | |
|     assert.strictEqual(component.token, 'token', 'shows token value');
 | |
|   });
 | |
| 
 | |
|   test('requestor rendering: some approvals', async function (assert) {
 | |
|     let { model, authData } = setup({ authorizations: [{ name: 'manager 1' }, { name: 'manager 2' }] });
 | |
|     this.set('model', model);
 | |
|     this.set('auth.authData', authData);
 | |
|     await render(hbs`{{control-group model=this.model}}`);
 | |
|     assert.ok(component.authorizationText, 'Already approved by manager 1, manager 2');
 | |
|   });
 | |
| 
 | |
|   test('requestor rendering: approved with no token', async function (assert) {
 | |
|     let { model, authData } = setup({ approved: true });
 | |
|     this.set('model', model);
 | |
|     this.set('auth.authData', authData);
 | |
|     await render(hbs`{{control-group model=this.model}}`);
 | |
| 
 | |
|     assert.strictEqual(component.bannerPrefix, 'Success!');
 | |
|     assert.strictEqual(component.bannerText, 'You have been given authorization');
 | |
|     assert.false(component.showsTokenText, 'does not show token message when there is no token');
 | |
|     assert.notOk(component.showsRefresh, 'does not shows refresh button');
 | |
|     assert.ok(component.showsSuccessComponent, 'renders control group success');
 | |
|   });
 | |
| 
 | |
|   test('requestor rendering: approved with token', async function (assert) {
 | |
|     let { model, authData } = setup({ approved: true });
 | |
|     this.set('model', model);
 | |
|     this.set('auth.authData', authData);
 | |
|     this.set('controlGroup.wrapInfo', { token: 'token' });
 | |
|     await render(hbs`{{control-group model=this.model}}`);
 | |
|     assert.true(component.showsTokenText, 'shows token');
 | |
|     assert.notOk(component.showsRefresh, 'does not shows refresh button');
 | |
|     assert.ok(component.showsSuccessComponent, 'renders control group success');
 | |
|   });
 | |
| 
 | |
|   test('authorizer rendering', async function (assert) {
 | |
|     let { model, authData } = setup({ canAuthorize: true }, { entity_id: 'manager' });
 | |
| 
 | |
|     this.set('model', model);
 | |
|     this.set('auth.authData', authData);
 | |
|     await render(hbs`{{control-group model=this.model}}`);
 | |
| 
 | |
|     assert.strictEqual(component.bannerPrefix, 'Locked');
 | |
|     assert.strictEqual(
 | |
|       component.bannerText,
 | |
|       'Someone is requesting access to a path locked by a Control Group'
 | |
|     );
 | |
|     assert.strictEqual(
 | |
|       component.requestorText,
 | |
|       `${model.requestEntity.name} is requesting access to ${model.requestPath}`
 | |
|     );
 | |
|     assert.false(component.showsTokenText, 'does not show token message when there is no token');
 | |
| 
 | |
|     assert.ok(component.showsAuthorize, 'shows authorize button');
 | |
|   });
 | |
| 
 | |
|   test('authorizer rendering:authorized', async function (assert) {
 | |
|     let { model, authData } = setup(
 | |
|       { canAuthorize: true, authorizations: [{ id: 'manager', name: 'manager' }] },
 | |
|       { entity_id: 'manager' }
 | |
|     );
 | |
| 
 | |
|     this.set('model', model);
 | |
|     this.set('auth.authData', authData);
 | |
|     await render(hbs`{{control-group model=this.model}}`);
 | |
| 
 | |
|     assert.strictEqual(component.bannerPrefix, 'Thanks!');
 | |
|     assert.strictEqual(component.bannerText, 'You have given authorization');
 | |
|     assert.ok(component.showsBackLink, 'back link is visible');
 | |
|   });
 | |
| 
 | |
|   test('authorizer rendering: authorized and success', async function (assert) {
 | |
|     let { model, authData } = setup(
 | |
|       { approved: true, canAuthorize: true, authorizations: [{ id: 'manager', name: 'manager' }] },
 | |
|       { entity_id: 'manager' }
 | |
|     );
 | |
| 
 | |
|     this.set('model', model);
 | |
|     this.set('auth.authData', authData);
 | |
|     await render(hbs`{{control-group model=this.model}}`);
 | |
| 
 | |
|     assert.strictEqual(component.bannerPrefix, 'Thanks!');
 | |
|     assert.strictEqual(component.bannerText, 'You have given authorization');
 | |
|     assert.ok(component.showsBackLink, 'back link is visible');
 | |
|     assert.strictEqual(
 | |
|       component.requestorText,
 | |
|       `${model.requestEntity.name} is authorized to access ${model.requestPath}`
 | |
|     );
 | |
|     assert.notOk(component.showsSuccessComponent, 'does not render control group success');
 | |
|   });
 | |
| 
 | |
|   test('third-party: success', async function (assert) {
 | |
|     let { model, authData } = setup(
 | |
|       { approved: true, canAuthorize: true, authorizations: [{ id: 'foo', name: 'foo' }] },
 | |
|       { entity_id: 'manager' }
 | |
|     );
 | |
| 
 | |
|     this.set('model', model);
 | |
|     this.set('auth.authData', authData);
 | |
|     await render(hbs`{{control-group model=this.model}}`);
 | |
|     assert.strictEqual(component.bannerPrefix, 'Success!');
 | |
|     assert.strictEqual(component.bannerText, 'This Control Group has been authorized');
 | |
|     assert.ok(component.showsBackLink, 'back link is visible');
 | |
|     assert.notOk(component.showsSuccessComponent, 'does not render control group success');
 | |
|   });
 | |
| });
 |