mirror of
https://github.com/optim-enterprises-bv/vault.git
synced 2025-10-29 09:42:25 +00:00
* UI: Implement overview page for KV v2 (#28162) * build json editor patch form * finish patch component and tests * add tab to each route * and path route * add overview tab to tests * update overview to use updated_time instead of created_time * redirect relevant secret.details to secret.index * compute secretState in component instead of pass as arg * add capabilities service * add error handling to fetchSubkeys adapter request * add overview tabs to test * add subtext to overview card * remaining redirects in secret edit * remove create new version from popup menu * fix breadcrumbs for overview * separate adding capabilities service * add service to kv engine * Revert "separate adding capabilities service" This reverts commit bb70b12ab7dbcde0fbd2d4d81768e5c8b1c420cc. * Revert "add service to kv engine" This reverts commit bfa880535ef7d529d7610936b2c1aae55673d23f. * update navigation test * consistently navigate to secret.index route to be explicit * finish overview navigation tests * add copyright header * update delete tests * fix nav testrs * cleanup secret edit redirects * remove redundant async/awaits * fix create test * edge case tests * secret acceptance tests * final component tests * rename kvSecretDetails external route to kvSecretOverview * add comment * UI: Add patch route and implement Page::Secret::Patch page component (sidebranch) (#28192) * add tab to each route * and path route * add overview tab to tests * update overview to use updated_time instead of created_time * redirect relevant secret.details to secret.index * compute secretState in component instead of pass as arg * add capabilities service * add error handling to fetchSubkeys adapter request * add patch route and put in page component * add patch secret action to subkeys card * fix component name * add patch capability * alphabetize computed capabilities * update links, cleanup selectors * fix more merge conflict stuff * add capabilities test * add models to patch link * add test for patch route * rename external route * add error templates * make notes about enterprise tests, filter one * remove errors, transition (redirect) instead * redirect patch routes * UI: Move fetching secret data to child route (#28198) * remove @secret from metadata details * use metadata model instead of secret in paths page * put delete back into kv/data adapter * grant access in control group test * update metadata route and permissions * remove secret from parent route, only fetch in details route * change more permissions to route perms, add tests * revert overview redirect from list view * wrap model in conditional for perms * remove redundant canReadCustomMetadata check * rename adapter method * handle overview 404 * remove comment * add customMetadata as an arg * update grantAccess in test * make version param easier to follow * VAULT-30494 handle 404 jira * refactor capabilities to return an object * update create tests * add test for default truthy capabilities * remove destroy-all-versions from kv/data adapter * UI: Add enterprise checks (#28215) * add enterprise check for subkey card * add max height and scroll to subkey card * only fetch subkeys if enterprise * remove check in overview * add test * Update ui/tests/integration/components/kv/page/kv-page-overview-test.js * fix test failures (#28222) * add assertion * add optional chaining * create/delete versioned secret in each module * wait for transition * add another waitUntil * UI: Add patch latest version to toolbar (#28223) * add patch latest version action to toolbar * make isPatchAllowed arg all encompassing * no longer need model check * use hash so both promises fire at the same time * add subkeys to policy * Update ui/lib/kv/addon/routes/secret.js * add changelog * small cleanup items! (#28229) * add conditional for enterprise checking tabs * cleanup fetchMultiplePaths method * add test * remove todo comment, ticket created and design wants to hold off * keep transition, update comments * cleanup tests, add index to breadcrumbs * add some test coverage * toggle so value is readable
133 lines
4.9 KiB
JavaScript
133 lines
4.9 KiB
JavaScript
/**
|
|
* Copyright (c) HashiCorp, Inc.
|
|
* SPDX-License-Identifier: BUSL-1.1
|
|
*/
|
|
|
|
import { module, test } from 'qunit';
|
|
import { setupRenderingTest } from 'ember-qunit';
|
|
import { setupEngine } from 'ember-engines/test-support';
|
|
import { setupMirage } from 'ember-cli-mirage/test-support';
|
|
import { render } from '@ember/test-helpers';
|
|
import { hbs } from 'ember-cli-htmlbars';
|
|
import { kvDataPath } from 'vault/utils/kv-path';
|
|
import { PAGE } from 'vault/tests/helpers/kv/kv-selectors';
|
|
import { baseSetup, metadataModel } from 'vault/tests/helpers/kv/kv-run-commands';
|
|
import { dateFormat } from 'core/helpers/date-format';
|
|
|
|
module('Integration | Component | kv-v2 | Page::Secret::Metadata::Details', function (hooks) {
|
|
setupRenderingTest(hooks);
|
|
setupEngine(hooks, 'kv');
|
|
setupMirage(hooks);
|
|
|
|
hooks.beforeEach(async function () {
|
|
baseSetup(this);
|
|
this.dataId = kvDataPath(this.backend, this.path);
|
|
// empty secret model always exists for permissions
|
|
this.store.pushPayload('kv/data', {
|
|
modelName: 'kv/data',
|
|
id: this.dataId,
|
|
custom_metadata: null,
|
|
});
|
|
this.secret = this.store.peekRecord('kv/data', this.dataId);
|
|
|
|
// this is the route model, not an ember data model
|
|
this.model = {
|
|
backend: this.backend,
|
|
path: this.path,
|
|
secret: this.secret,
|
|
metadata: this.metadata,
|
|
};
|
|
this.breadcrumbs = [
|
|
{ label: 'Secrets', route: 'secrets', linkExternal: true },
|
|
{ label: this.model.backend, route: 'list' },
|
|
{ label: this.model.path },
|
|
];
|
|
this.canDeleteMetadata = true;
|
|
this.canReadCustomMetadata = true;
|
|
this.canReadMetadata = true;
|
|
this.canUpdateMetadata = true;
|
|
|
|
this.renderComponent = () => {
|
|
return render(
|
|
hbs`
|
|
<Page::Secret::Metadata::Details
|
|
@breadcrumbs={{this.breadcrumbs}}
|
|
@canDeleteMetadata={{this.canDeleteMetadata}}
|
|
@canReadMetadata={{this.canReadMetadata}}
|
|
@canUpdateMetadata={{this.canReadMetadata}}
|
|
@customMetadata={{or this.model.metadata.customMetadata this.model.secret.customMetadata}}
|
|
@metadata={{this.model.metadata}}
|
|
@path={{this.model.path}}
|
|
/>
|
|
`,
|
|
{ owner: this.engine }
|
|
);
|
|
};
|
|
});
|
|
|
|
test('it renders metadata details', async function (assert) {
|
|
assert.expect(8);
|
|
await this.renderComponent();
|
|
|
|
assert.dom(PAGE.title).includesText(this.model.path, 'renders secret path as page title');
|
|
assert.dom(PAGE.emptyStateTitle).hasText('No custom metadata', 'renders the correct empty state');
|
|
assert.dom(PAGE.metadata.deleteMetadata).exists();
|
|
assert.dom(PAGE.metadata.editBtn).exists();
|
|
|
|
// Metadata details
|
|
const expectedTime = dateFormat([this.metadata.updatedTime, 'MMM d, yyyy hh:mm aa'], {});
|
|
assert
|
|
.dom(PAGE.infoRowValue('Last updated'))
|
|
.hasTextContaining(expectedTime, 'Displays updated date with formatting');
|
|
assert.dom(PAGE.infoRowValue('Maximum versions')).hasText('15');
|
|
assert.dom(PAGE.infoRowValue('Check-and-Set required')).hasText('Yes');
|
|
assert
|
|
.dom(PAGE.infoRowValue('Delete version after'))
|
|
.hasText('3 hours 25 minutes 19 seconds', 'correctly shows and formats the timestamp.');
|
|
});
|
|
|
|
test('it renders custom metadata from secret model', async function (assert) {
|
|
assert.expect(2);
|
|
this.secret.customMetadata = { hi: 'there' };
|
|
await this.renderComponent();
|
|
|
|
assert.dom(PAGE.emptyStateTitle).doesNotExist();
|
|
assert.dom(PAGE.infoRowValue('hi')).hasText('there', 'renders custom metadata from secret');
|
|
});
|
|
|
|
test('it renders custom metadata from metadata model', async function (assert) {
|
|
assert.expect(4);
|
|
this.model.metadata = metadataModel(this, { withCustom: true });
|
|
await this.renderComponent();
|
|
|
|
assert.dom(PAGE.emptyStateTitle).doesNotExist();
|
|
// Metadata details
|
|
assert.dom(PAGE.infoRowValue('foo')).hasText('abc');
|
|
assert.dom(PAGE.infoRowValue('bar')).hasText('123');
|
|
assert.dom(PAGE.infoRowValue('baz')).hasText('5c07d823-3810-48f6-a147-4c06b5219e84');
|
|
});
|
|
|
|
test('it renders custom metadata from metadata if secret data exists', async function (assert) {
|
|
assert.expect(4);
|
|
this.secret.customMetadata = { hi: 'there' };
|
|
this.model.metadata = metadataModel(this, { withCustom: true });
|
|
await this.renderComponent();
|
|
|
|
assert.dom(PAGE.emptyStateTitle).doesNotExist();
|
|
// Metadata details
|
|
assert.dom(PAGE.infoRowValue('foo')).hasText('abc');
|
|
assert.dom(PAGE.infoRowValue('bar')).hasText('123');
|
|
assert.dom(PAGE.infoRowValue('baz')).hasText('5c07d823-3810-48f6-a147-4c06b5219e84');
|
|
});
|
|
|
|
test('it hides delete modal when no permissions', async function (assert) {
|
|
this.canDeleteMetadata = false;
|
|
assert.dom(PAGE.metadata.deleteMetadata).doesNotExist();
|
|
});
|
|
|
|
test('it hides edit action when no permissions', async function (assert) {
|
|
this.canUpdateMetadata = false;
|
|
assert.dom(PAGE.metadata.editBtn).doesNotExist();
|
|
});
|
|
});
|