open-vault/ui/mirage/handlers/mfa-config.js
Jordan Reimer 5b1172ad7b
MFA method acceptance tests (#15665)
* adds acceptance tests for mfa config login enforcement workflows

* adds acceptance tests for mfa config method workflows

* reverts masked-input test selector changes

* fixes test failures
2022-05-27 14:49:44 -06:00

202 lines
6.4 KiB
JavaScript

import { Response } from 'miragejs';
export default function (server) {
const methods = ['totp', 'duo', 'okta', 'pingid'];
const required = {
totp: ['issuer'],
duo: ['secret_key', 'integration_key', 'api_hostname'],
okta: ['org_name', 'api_token'],
pingid: ['settings_file_base64'],
};
const validate = (type, data, cb) => {
if (!methods.includes(type)) {
return new Response(400, {}, { errors: [`Method ${type} not found`] });
}
if (data) {
const missing = required[type].reduce((params, key) => {
if (!data[key]) {
params.push(key);
}
return params;
}, []);
if (missing.length) {
return new Response(400, {}, { errors: [`Missing required parameters: [${missing.join(', ')}]`] });
}
}
return cb();
};
const dbKeyFromType = (type) => `mfa${type.charAt(0).toUpperCase()}${type.slice(1)}Methods`;
const generateListResponse = (schema, isMethod) => {
let records = [];
if (isMethod) {
methods.forEach((method) => {
records.addObjects(schema.db[dbKeyFromType(method)].where({}));
});
} else {
records = schema.db.mfaLoginEnforcements.where({});
}
// seed the db with a few records if none exist
if (!records.length) {
if (isMethod) {
methods.forEach((type) => {
records.push(server.create(`mfa-${type}-method`));
});
} else {
records = server.createList('mfa-login-enforcement', 4).toArray();
}
}
const dataKey = isMethod ? 'id' : 'name';
const data = records.reduce(
(resp, record) => {
resp.key_info[record[dataKey]] = record;
resp.keys.push(record[dataKey]);
return resp;
},
{
key_info: {},
keys: [],
}
);
return { data };
};
// list methods
server.get('/identity/mfa/method/', (schema) => {
return generateListResponse(schema, true);
});
// fetch method by id
server.get('/identity/mfa/method/:id', (schema, { params: { id } }) => {
let record;
for (const method of methods) {
record = schema.db[dbKeyFromType(method)].find(id);
if (record) {
break;
}
}
// inconvenient when testing edit route to return a 404 on refresh since mirage memory is cleared
// flip this variable to test 404 state if needed
const shouldError = false;
// create a new record so data is always returned
if (!record && !shouldError) {
return { data: server.create('mfa-totp-method') };
}
return !record ? new Response(404, {}, { errors: [] }) : { data: record };
});
// create method
server.post('/identity/mfa/method/:type', (schema, { params: { type }, requestBody }) => {
const data = JSON.parse(requestBody);
return validate(type, data, () => {
const record = server.create(`mfa-${type}-method`, data);
return { data: { method_id: record.id } };
});
});
// update method
server.post('/identity/mfa/method/:type/:id', (schema, { params: { type, id }, requestBody }) => {
const data = JSON.parse(requestBody);
return validate(type, data, () => {
schema.db[dbKeyFromType(type)].update(id, data);
return {};
});
});
// delete method
server.delete('/identity/mfa/method/:type/:id', (schema, { params: { type, id } }) => {
return validate(type, null, () => {
schema.db[dbKeyFromType(type)].remove(id);
return {};
});
});
// list enforcements
server.get('/identity/mfa/login-enforcement', (schema) => {
return generateListResponse(schema);
});
// fetch enforcement by name
server.get('/identity/mfa/login-enforcement/:name', (schema, { params: { name } }) => {
const record = schema.db.mfaLoginEnforcements.findBy({ name });
// inconvenient when testing edit route to return a 404 on refresh since mirage memory is cleared
// flip this variable to test 404 state if needed
const shouldError = false;
// create a new record so data is always returned
if (!record && !shouldError) {
return { data: server.create('mfa-login-enforcement', { name }) };
}
return !record ? new Response(404, {}, { errors: [] }) : { data: record };
});
// create/update enforcement
server.post('/identity/mfa/login-enforcement/:name', (schema, { params: { name }, requestBody }) => {
const data = JSON.parse(requestBody);
// at least one method id is required
if (!data.mfa_method_ids?.length) {
return new Response(400, {}, { errors: ['missing method ids'] });
}
// at least one of the following targets is required
const required = [
'auth_method_accessors',
'auth_method_types',
'identity_group_ids',
'identity_entity_ids',
];
let hasRequired = false;
for (let key of required) {
if (data[key]?.length) {
hasRequired = true;
break;
}
}
if (!hasRequired) {
return new Response(
400,
{},
{
errors: [
'One of auth_method_accessors, auth_method_types, identity_group_ids, identity_entity_ids must be specified',
],
}
);
}
if (schema.db.mfaLoginEnforcements.findBy({ name })) {
schema.db.mfaLoginEnforcements.update({ name }, data);
} else {
schema.db.mfaLoginEnforcements.insert(data);
}
return { ...data, id: data.name };
});
// delete enforcement
server.delete('/identity/mfa/login-enforcement/:name', (schema, { params: { name } }) => {
schema.db.mfaLoginEnforcements.remove({ name });
return {};
});
// endpoints for target selection
server.get('/identity/group/id', () => ({
data: {
key_info: { '34db6b52-591e-bc22-8af0-4add5e167326': { name: 'test-group' } },
keys: ['34db6b52-591e-bc22-8af0-4add5e167326'],
},
}));
server.get('/identity/group/id/:id', () => ({
data: {
id: '34db6b52-591e-bc22-8af0-4add5e167326',
name: 'test-group',
},
}));
server.get('/identity/entity/id', () => ({
data: {
key_info: { 'f831667b-7392-7a1c-c0fc-33d48cb1c57d': { name: 'test-entity' } },
keys: ['f831667b-7392-7a1c-c0fc-33d48cb1c57d'],
},
}));
server.get('/identity/entity/id/:id', () => ({
data: {
id: 'f831667b-7392-7a1c-c0fc-33d48cb1c57d',
name: 'test-entity',
},
}));
server.get('/sys/auth', () => ({
data: {
'userpass/': { accessor: 'auth_userpass_bb95c2b1', type: 'userpass' },
},
}));
}