John Cowen 327aac9fe9
ui: Acceptance test improvements to prepare for more NS tests (#6980)
* ui: Acceptance test improvements to prepare for more NS tests

* ui: Namespace acceptance testing (#7005)

* Update api-double and consul-api-double for http.body

* Adds places where we missed passing the nspace through

* Hardcode nspace CRUD to use the default nspace for policies and roles

* Alter test helpers to allow us to control nspaces from the outside

* Amends to allow tests to account for namespace, move ns from queryParam

1. We decided to move how we pass the namespace value through to the
backend when performing write actions (create, update). Previoulsy we
were using the queryParam although using the post body is the preferred
method to send the Namespace details through to the backend.
2. Other various amends to take into account testing across multiple
namespaced scenarios

* Enable nspace testing by default

* Remove last few occurances of old style http assertions

We had informally 'deprecated' our old style of http assertions that
relied on the order of http calls (even though that order was not
important for the assertion). Following on from our namespace work we
removed the majority of the old occrances of these old style assertions.

This commit removes the remaining few, and also then cleans up the
assertions/http.js file to only include the ones we are using.

This reduces our available step count further and prevents any confusion
over the usage of the old types and the new types.

* ui: Namespace CRUD acceptance tests (#7016)

* Upgrade consul-api-double

* Add all the things required for testing:

1. edit and index page objects
2. enable CONSUL_NSPACE_COUNT cookie setting
3. enable mutating HTTP response bodies based on URL

* Add acceptance test for nspace edit/delete/list and searching
2020-01-24 12:26:28 +00:00

159 lines
5.0 KiB
Gherkin

@setupApplicationTest
@notNamespaceable
Feature: dc / acls / roles / as-many / add-new: Add new
Background:
Given 1 datacenter model with the value "datacenter"
And 1 token model from yaml
---
AccessorID: key
Description: The Description
Roles: ~
Policies: ~
ServiceIdentities: ~
---
And 1 policy model from yaml
---
ID: policy-1
Name: policy
---
When I visit the token page for yaml
---
dc: datacenter
token: key
---
Then the url should be /datacenter/acls/tokens/key
And I click roles.create
Then I fill in the roles.form with yaml
---
Name: New-Role
Description: New Role Description
---
Scenario: Add Policy-less Role
And I click submit on the roles.form
Then a PUT request was made to "/v1/acl/role?dc=datacenter" from yaml
---
body:
Name: New-Role
Namespace: @namespace
Description: New Role Description
---
And I submit
Then a PUT request was made to "/v1/acl/token/key?dc=datacenter" from yaml
---
body:
Description: The Description
Namespace: @namespace
Roles:
- Name: New-Role
ID: ee52203d-989f-4f7a-ab5a-2bef004164ca-1
---
Then the url should be /datacenter/acls/tokens
And "[data-notification]" has the "notification-update" class
And "[data-notification]" has the "success" class
Scenario: Add Role that has an existing Policy
And I click "#new-role-toggle + div .ember-power-select-trigger"
And I click ".ember-power-select-option:first-child"
And I click submit on the roles.form
Then a PUT request was made to "/v1/acl/role?dc=datacenter" from yaml
---
body:
Name: New-Role
Description: New Role Description
Namespace: @namespace
Policies:
- ID: policy-1
Name: policy
---
And I submit
Then a PUT request was made to "/v1/acl/token/key?dc=datacenter" from yaml
---
body:
Description: The Description
Namespace: @namespace
Roles:
- Name: New-Role
ID: ee52203d-989f-4f7a-ab5a-2bef004164ca-1
---
Then the url should be /datacenter/acls/tokens
And "[data-notification]" has the "notification-update" class
And "[data-notification]" has the "success" class
Scenario: Add Role and add a new Policy
And I click roles.form.policies.create
Then I fill in the roles.form.policies.form with yaml
---
Name: New-Policy
Description: New Policy Description
Rules: key {}
---
# This next line is actually the popped up policyForm due to the way things currently work
And I click submit on the roles.form
Then a PUT request was made to "/v1/acl/policy?dc=datacenter" from yaml
---
body:
Name: New-Policy
Description: New Policy Description
Namespace: @namespace
Rules: key {}
---
And I click submit on the roles.form
Then a PUT request was made to "/v1/acl/role?dc=datacenter" from yaml
---
body:
Name: New-Role
Description: New Role Description
Namespace: @namespace
Policies:
# TODO: Ouch, we need to do deep partial comparisons here
- ID: ee52203d-989f-4f7a-ab5a-2bef004164ca-1
Name: New-Policy
---
And I submit
Then a PUT request was made to "/v1/acl/token/key?dc=datacenter" from yaml
---
body:
Description: The Description
Namespace: @namespace
Roles:
- Name: New-Role
ID: ee52203d-989f-4f7a-ab5a-2bef004164ca-1
---
Then the url should be /datacenter/acls/tokens
And "[data-notification]" has the "notification-update" class
And "[data-notification]" has the "success" class
Scenario: Add Role and add a new Service Identity
And I click roles.form.policies.create
Then I fill in the roles.form.policies.form with yaml
---
Name: New-Service-Identity
---
And I click "[value='service-identity']"
# This next line is actually the popped up policyForm due to the way things currently work
And I click submit on the roles.form
And I click submit on the roles.form
Then a PUT request was made to "/v1/acl/role?dc=datacenter" from yaml
---
body:
Name: New-Role
Description: New Role Description
Namespace: @namespace
ServiceIdentities:
- ServiceName: New-Service-Identity
---
And I submit
Then a PUT request was made to "/v1/acl/token/key?dc=datacenter" from yaml
---
body:
Description: The Description
Namespace: @namespace
Roles:
- Name: New-Role
ID: ee52203d-989f-4f7a-ab5a-2bef004164ca-1
---
Then the url should be /datacenter/acls/tokens
And "[data-notification]" has the "notification-update" class
And "[data-notification]" has the "success" class
@ignore:
Scenario: Click the cancel form
Then ok
# And I click cancel on the policyForm