5b1172ad7b
* adds acceptance tests for mfa config login enforcement workflows * adds acceptance tests for mfa config method workflows * reverts masked-input test selector changes * fixes test failures
202 lines
6.4 KiB
JavaScript
202 lines
6.4 KiB
JavaScript
import { Response } from 'miragejs';
|
|
|
|
export default function (server) {
|
|
const methods = ['totp', 'duo', 'okta', 'pingid'];
|
|
const required = {
|
|
totp: ['issuer'],
|
|
duo: ['secret_key', 'integration_key', 'api_hostname'],
|
|
okta: ['org_name', 'api_token'],
|
|
pingid: ['settings_file_base64'],
|
|
};
|
|
|
|
const validate = (type, data, cb) => {
|
|
if (!methods.includes(type)) {
|
|
return new Response(400, {}, { errors: [`Method ${type} not found`] });
|
|
}
|
|
if (data) {
|
|
const missing = required[type].reduce((params, key) => {
|
|
if (!data[key]) {
|
|
params.push(key);
|
|
}
|
|
return params;
|
|
}, []);
|
|
if (missing.length) {
|
|
return new Response(400, {}, { errors: [`Missing required parameters: [${missing.join(', ')}]`] });
|
|
}
|
|
}
|
|
return cb();
|
|
};
|
|
|
|
const dbKeyFromType = (type) => `mfa${type.charAt(0).toUpperCase()}${type.slice(1)}Methods`;
|
|
|
|
const generateListResponse = (schema, isMethod) => {
|
|
let records = [];
|
|
if (isMethod) {
|
|
methods.forEach((method) => {
|
|
records.addObjects(schema.db[dbKeyFromType(method)].where({}));
|
|
});
|
|
} else {
|
|
records = schema.db.mfaLoginEnforcements.where({});
|
|
}
|
|
// seed the db with a few records if none exist
|
|
if (!records.length) {
|
|
if (isMethod) {
|
|
methods.forEach((type) => {
|
|
records.push(server.create(`mfa-${type}-method`));
|
|
});
|
|
} else {
|
|
records = server.createList('mfa-login-enforcement', 4).toArray();
|
|
}
|
|
}
|
|
const dataKey = isMethod ? 'id' : 'name';
|
|
const data = records.reduce(
|
|
(resp, record) => {
|
|
resp.key_info[record[dataKey]] = record;
|
|
resp.keys.push(record[dataKey]);
|
|
return resp;
|
|
},
|
|
{
|
|
key_info: {},
|
|
keys: [],
|
|
}
|
|
);
|
|
return { data };
|
|
};
|
|
|
|
// list methods
|
|
server.get('/identity/mfa/method/', (schema) => {
|
|
return generateListResponse(schema, true);
|
|
});
|
|
// fetch method by id
|
|
server.get('/identity/mfa/method/:id', (schema, { params: { id } }) => {
|
|
let record;
|
|
for (const method of methods) {
|
|
record = schema.db[dbKeyFromType(method)].find(id);
|
|
if (record) {
|
|
break;
|
|
}
|
|
}
|
|
// inconvenient when testing edit route to return a 404 on refresh since mirage memory is cleared
|
|
// flip this variable to test 404 state if needed
|
|
const shouldError = false;
|
|
// create a new record so data is always returned
|
|
if (!record && !shouldError) {
|
|
return { data: server.create('mfa-totp-method') };
|
|
}
|
|
return !record ? new Response(404, {}, { errors: [] }) : { data: record };
|
|
});
|
|
// create method
|
|
server.post('/identity/mfa/method/:type', (schema, { params: { type }, requestBody }) => {
|
|
const data = JSON.parse(requestBody);
|
|
return validate(type, data, () => {
|
|
const record = server.create(`mfa-${type}-method`, data);
|
|
return { data: { method_id: record.id } };
|
|
});
|
|
});
|
|
// update method
|
|
server.post('/identity/mfa/method/:type/:id', (schema, { params: { type, id }, requestBody }) => {
|
|
const data = JSON.parse(requestBody);
|
|
return validate(type, data, () => {
|
|
schema.db[dbKeyFromType(type)].update(id, data);
|
|
return {};
|
|
});
|
|
});
|
|
// delete method
|
|
server.delete('/identity/mfa/method/:type/:id', (schema, { params: { type, id } }) => {
|
|
return validate(type, null, () => {
|
|
schema.db[dbKeyFromType(type)].remove(id);
|
|
return {};
|
|
});
|
|
});
|
|
// list enforcements
|
|
server.get('/identity/mfa/login-enforcement', (schema) => {
|
|
return generateListResponse(schema);
|
|
});
|
|
// fetch enforcement by name
|
|
server.get('/identity/mfa/login-enforcement/:name', (schema, { params: { name } }) => {
|
|
const record = schema.db.mfaLoginEnforcements.findBy({ name });
|
|
// inconvenient when testing edit route to return a 404 on refresh since mirage memory is cleared
|
|
// flip this variable to test 404 state if needed
|
|
const shouldError = false;
|
|
// create a new record so data is always returned
|
|
if (!record && !shouldError) {
|
|
return { data: server.create('mfa-login-enforcement', { name }) };
|
|
}
|
|
return !record ? new Response(404, {}, { errors: [] }) : { data: record };
|
|
});
|
|
// create/update enforcement
|
|
server.post('/identity/mfa/login-enforcement/:name', (schema, { params: { name }, requestBody }) => {
|
|
const data = JSON.parse(requestBody);
|
|
// at least one method id is required
|
|
if (!data.mfa_method_ids?.length) {
|
|
return new Response(400, {}, { errors: ['missing method ids'] });
|
|
}
|
|
// at least one of the following targets is required
|
|
const required = [
|
|
'auth_method_accessors',
|
|
'auth_method_types',
|
|
'identity_group_ids',
|
|
'identity_entity_ids',
|
|
];
|
|
let hasRequired = false;
|
|
for (let key of required) {
|
|
if (data[key]?.length) {
|
|
hasRequired = true;
|
|
break;
|
|
}
|
|
}
|
|
if (!hasRequired) {
|
|
return new Response(
|
|
400,
|
|
{},
|
|
{
|
|
errors: [
|
|
'One of auth_method_accessors, auth_method_types, identity_group_ids, identity_entity_ids must be specified',
|
|
],
|
|
}
|
|
);
|
|
}
|
|
if (schema.db.mfaLoginEnforcements.findBy({ name })) {
|
|
schema.db.mfaLoginEnforcements.update({ name }, data);
|
|
} else {
|
|
schema.db.mfaLoginEnforcements.insert(data);
|
|
}
|
|
return { ...data, id: data.name };
|
|
});
|
|
// delete enforcement
|
|
server.delete('/identity/mfa/login-enforcement/:name', (schema, { params: { name } }) => {
|
|
schema.db.mfaLoginEnforcements.remove({ name });
|
|
return {};
|
|
});
|
|
// endpoints for target selection
|
|
server.get('/identity/group/id', () => ({
|
|
data: {
|
|
key_info: { '34db6b52-591e-bc22-8af0-4add5e167326': { name: 'test-group' } },
|
|
keys: ['34db6b52-591e-bc22-8af0-4add5e167326'],
|
|
},
|
|
}));
|
|
server.get('/identity/group/id/:id', () => ({
|
|
data: {
|
|
id: '34db6b52-591e-bc22-8af0-4add5e167326',
|
|
name: 'test-group',
|
|
},
|
|
}));
|
|
server.get('/identity/entity/id', () => ({
|
|
data: {
|
|
key_info: { 'f831667b-7392-7a1c-c0fc-33d48cb1c57d': { name: 'test-entity' } },
|
|
keys: ['f831667b-7392-7a1c-c0fc-33d48cb1c57d'],
|
|
},
|
|
}));
|
|
server.get('/identity/entity/id/:id', () => ({
|
|
data: {
|
|
id: 'f831667b-7392-7a1c-c0fc-33d48cb1c57d',
|
|
name: 'test-entity',
|
|
},
|
|
}));
|
|
server.get('/sys/auth', () => ({
|
|
data: {
|
|
'userpass/': { accessor: 'auth_userpass_bb95c2b1', type: 'userpass' },
|
|
},
|
|
}));
|
|
}
|