Skip to content

Commit

Permalink
UI: Fix metadata tab not showing given policy (#15824) (#15874)
Browse files Browse the repository at this point in the history
* Update path that metadata tab checks capabilities against

* Add changelog

* Update test to handle this case

* Fix tests url

Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com>
  • Loading branch information
hashishaw and hellobontempo committed Jun 28, 2022
1 parent 6ad55a8 commit 20e9333
Show file tree
Hide file tree
Showing 3 changed files with 26 additions and 11 deletions.
3 changes: 3 additions & 0 deletions changelog/15824.txt
@@ -0,0 +1,3 @@
```release-note:bug
ui: Fix issue where metadata tab is hidden even though policy grants access
```
5 changes: 3 additions & 2 deletions ui/app/components/secret-edit.js
Expand Up @@ -98,8 +98,9 @@ export default Component.extend(FocusOnInsertMixin, WithNavToNearestAncestor, {
if (!context.model || !context.isV2) {
return;
}
let backend = context.model.backend;
let path = `${backend}/metadata/`;
const backend = context.model.backend;
const id = context.model.id;
const path = `${backend}/metadata/${id}`;
return {
id: path,
};
Expand Down
29 changes: 20 additions & 9 deletions ui/tests/acceptance/secrets/backend/kv/secret-test.js
Expand Up @@ -29,6 +29,18 @@ let writeSecret = async function (backend, path, key, val) {
return editPage.createSecret(path, key, val);
};

let deleteEngine = async function (enginePath, assert) {
await logout.visit();
await authPage.login();
await consoleComponent.runCommands([`delete sys/mounts/${enginePath}`]);
const response = consoleComponent.lastLogOutput;
assert.equal(
response,
`Success! Data deleted (if it existed) at: sys/mounts/${enginePath}`,
'Engine successfully deleted'
);
};

module('Acceptance | secrets/secret/create', function (hooks) {
setupApplicationTest(hooks);

Expand Down Expand Up @@ -527,18 +539,17 @@ module('Acceptance | secrets/secret/create', function (hooks) {
});

test('version 2 with no access to data but access to metadata shows metadata tab', async function (assert) {
assert.expect(5);
let enginePath = 'kv-metadata-access-only';
let secretPath = 'kv-metadata-access-only-secret-name';
let secretPath = 'nested/kv-metadata-access-only-secret-name';
const V2_POLICY = `
path "${enginePath}/metadata/*" {
capabilities = ["read", "update", "list"]
path "${enginePath}/metadata/nested/*" {
capabilities = ["read", "update"]
}
`;
await consoleComponent.runCommands([
`write sys/mounts/${enginePath} type=kv options=version=2`,
`write sys/policies/acl/kv-v2-degrade policy=${btoa(V2_POLICY)}`,
// delete any kv previously written here so that tests can be re-run
`delete ${enginePath}/metadata/${secretPath}`,
'write -field=client_token auth/token/create policies=kv-v2-degrade',
]);

Expand All @@ -547,15 +558,15 @@ module('Acceptance | secrets/secret/create', function (hooks) {
await logout.visit();
await authPage.login(userToken);
await settled();
await click(`[data-test-auth-backend-link=${enginePath}]`);

await click(`[data-test-secret-link=${secretPath}]`);

await visit(`/vault/secrets/${enginePath}/show/${secretPath}`);
assert.dom('[data-test-empty-state-title]').hasText('You do not have permission to read this secret.');
assert.dom('[data-test-secret-metadata-tab]').exists('Metadata tab exists');
await editPage.metadataTab();
await settled();
assert.dom('[data-test-empty-state-title]').hasText('No custom metadata');
assert.dom('[data-test-add-custom-metadata]').exists('it shows link to edit metadata');

await deleteEngine(enginePath, assert);
});

test('version 2: with metadata no read or list but with delete access and full access to the data endpoint', async function (assert) {
Expand Down

0 comments on commit 20e9333

Please sign in to comment.