From 847597fbae0663870d492bc93ad7d57eb44b7627 Mon Sep 17 00:00:00 2001 From: claire bontempo <68122737+hellobontempo@users.noreply.github.com> Date: Mon, 23 Dec 2024 18:22:21 -0600 Subject: [PATCH] add open api params (#29257) --- .../acceptance/open-api-path-help-test.js | 2 +- .../helpers/openapi/expected-secret-attrs.js | 49 +++++++++++++++++++ 2 files changed, 50 insertions(+), 1 deletion(-) diff --git a/ui/tests/acceptance/open-api-path-help-test.js b/ui/tests/acceptance/open-api-path-help-test.js index e48316d9fe31..621d36326a84 100644 --- a/ui/tests/acceptance/open-api-path-help-test.js +++ b/ui/tests/acceptance/open-api-path-help-test.js @@ -80,7 +80,7 @@ function secretEngineHelper(test, secretEngine) { assert.deepEqual( Object.keys(result).sort(), Object.keys(expected).sort(), - `getProps returns expected attributes for ${modelName}` + `getProps returns expected attributes for ${modelName} (help url: "${helpUrl}")` ); Object.keys(expected).forEach((attrName) => { assert.deepEqual(result[attrName], expected[attrName], `${attrName} attribute details match`); diff --git a/ui/tests/helpers/openapi/expected-secret-attrs.js b/ui/tests/helpers/openapi/expected-secret-attrs.js index 1fb27c2eba76..c72160e1a963 100644 --- a/ui/tests/helpers/openapi/expected-secret-attrs.js +++ b/ui/tests/helpers/openapi/expected-secret-attrs.js @@ -1234,6 +1234,34 @@ const pki = { label: 'Exclude Common Name from Subject Alternative Names (SANs)', type: 'boolean', }, + excludedDnsDomains: { + editType: 'stringArray', + fieldGroup: 'default', + helpText: + 'Domains for which this certificate is not allowed to sign or issue child certificates (see https://tools.ietf.org/html/rfc5280#section-4.2.1.10).', + label: 'Excluded DNS Domains', + }, + excludedEmailAddresses: { + editType: 'stringArray', + fieldGroup: 'default', + helpText: + 'Email addresses for which this certificate is not allowed to sign or issue child certificates (see https://tools.ietf.org/html/rfc5280#section-4.2.1.10).', + label: 'Excluded email addresses', + }, + excludedIpRanges: { + editType: 'stringArray', + fieldGroup: 'default', + helpText: + 'IP ranges for which this certificate is not allowed to sign or issue child certificates (see https://tools.ietf.org/html/rfc5280#section-4.2.1.10). Ranges must be specified in the notation of IP address and prefix length, like "192.0.2.0/24" or "2001:db8::/32", as defined in RFC 4632 and RFC 4291.', + label: 'Excluded IP ranges', + }, + excludedUriDomains: { + editType: 'stringArray', + fieldGroup: 'default', + helpText: + 'URI domains for which this certificate is not allowed to sign or issue child certificates (see https://tools.ietf.org/html/rfc5280#section-4.2.1.10).', + label: 'Excluded URI domains', + }, format: { editType: 'string', helpText: @@ -1312,6 +1340,27 @@ const pki = { fieldGroup: 'default', label: 'Permitted DNS Domains', }, + permittedEmailAddresses: { + editType: 'stringArray', + fieldGroup: 'default', + helpText: + 'Email addresses for which this certificate is allowed to sign or issue child certificates (see https://tools.ietf.org/html/rfc5280#section-4.2.1.10).', + label: 'Permitted email adresses', + }, + permittedIpRanges: { + editType: 'stringArray', + fieldGroup: 'default', + helpText: + 'IP ranges for which this certificate is allowed to sign or issue child certificates (see https://tools.ietf.org/html/rfc5280#section-4.2.1.10). Ranges must be specified in the notation of IP address and prefix length, like "192.0.2.0/24" or "2001:db8::/32", as defined in RFC 4632 and RFC 4291.', + label: 'Permitted IP ranges', + }, + permittedUriDomains: { + editType: 'stringArray', + fieldGroup: 'default', + helpText: + 'URI domains for which this certificate is allowed to sign or issue child certificates (see https://tools.ietf.org/html/rfc5280#section-4.2.1.10).', + label: 'Permitted URI domains', + }, postalCode: { editType: 'stringArray', helpText: 'If set, Postal Code will be set to this value.',