| /** |
| * Copyright (c) HashiCorp, Inc. |
| * SPDX-License-Identifier: MPL-2.0 |
| */ |
| |
| import { Response } from 'miragejs'; |
| |
| export default function (server) { |
| const methods = ['totp', 'duo', 'okta', 'pingid']; |
| const required = { |
| totp: ['issuer'], |
| duo: ['secret_key', 'integration_key', 'api_hostname'], |
| okta: ['org_name', 'api_token'], |
| pingid: ['settings_file_base64'], |
| }; |
| |
| const validate = (type, data, cb) => { |
| if (!methods.includes(type)) { |
| return new Response(400, {}, { errors: [`Method ${type} not found`] }); |
| } |
| if (data) { |
| const missing = required[type].reduce((params, key) => { |
| if (!data[key]) { |
| params.push(key); |
| } |
| return params; |
| }, []); |
| if (missing.length) { |
| return new Response(400, {}, { errors: [`Missing required parameters: [${missing.join(', ')}]`] }); |
| } |
| } |
| return cb(); |
| }; |
| |
| const dbKeyFromType = (type) => `mfa${type.charAt(0).toUpperCase()}${type.slice(1)}Methods`; |
| |
| const generateListResponse = (schema, isMethod) => { |
| let records = []; |
| if (isMethod) { |
| methods.forEach((method) => { |
| records.addObjects(schema.db[dbKeyFromType(method)].where({})); |
| }); |
| } else { |
| records = schema.db.mfaLoginEnforcements.where({}); |
| } |
| // seed the db with a few records if none exist |
| if (!records.length) { |
| if (isMethod) { |
| methods.forEach((type) => { |
| records.push(server.create(`mfa-${type}-method`)); |
| }); |
| } else { |
| records = server.createList('mfa-login-enforcement', 4).toArray(); |
| } |
| } |
| const dataKey = isMethod ? 'id' : 'name'; |
| const data = records.reduce( |
| (resp, record) => { |
| resp.key_info[record[dataKey]] = record; |
| resp.keys.push(record[dataKey]); |
| return resp; |
| }, |
| { |
| key_info: {}, |
| keys: [], |
| } |
| ); |
| return { data }; |
| }; |
| |
| // list methods |
| server.get('/identity/mfa/method/', (schema) => { |
| return generateListResponse(schema, true); |
| }); |
| // fetch method by id |
| server.get('/identity/mfa/method/:id', (schema, { params: { id } }) => { |
| let record; |
| for (const method of methods) { |
| record = schema.db[dbKeyFromType(method)].find(id); |
| if (record) { |
| break; |
| } |
| } |
| // inconvenient when testing edit route to return a 404 on refresh since mirage memory is cleared |
| // flip this variable to test 404 state if needed |
| const shouldError = false; |
| // create a new record so data is always returned |
| if (!record && !shouldError) { |
| return { data: server.create('mfa-totp-method') }; |
| } |
| return !record ? new Response(404, {}, { errors: [] }) : { data: record }; |
| }); |
| // create method |
| server.post('/identity/mfa/method/:type', (schema, { params: { type }, requestBody }) => { |
| const data = JSON.parse(requestBody); |
| return validate(type, data, () => { |
| const record = server.create(`mfa-${type}-method`, data); |
| return { data: { method_id: record.id } }; |
| }); |
| }); |
| // update method |
| server.post('/identity/mfa/method/:type/:id', (schema, { params: { type, id }, requestBody }) => { |
| const data = JSON.parse(requestBody); |
| return validate(type, data, () => { |
| schema.db[dbKeyFromType(type)].update(id, data); |
| return {}; |
| }); |
| }); |
| // delete method |
| server.delete('/identity/mfa/method/:type/:id', (schema, { params: { type, id } }) => { |
| return validate(type, null, () => { |
| schema.db[dbKeyFromType(type)].remove(id); |
| return {}; |
| }); |
| }); |
| // list enforcements |
| server.get('/identity/mfa/login-enforcement', (schema) => { |
| return generateListResponse(schema); |
| }); |
| // fetch enforcement by name |
| server.get('/identity/mfa/login-enforcement/:name', (schema, { params: { name } }) => { |
| const record = schema.db.mfaLoginEnforcements.findBy({ name }); |
| // inconvenient when testing edit route to return a 404 on refresh since mirage memory is cleared |
| // flip this variable to test 404 state if needed |
| const shouldError = false; |
| // create a new record so data is always returned |
| if (!record && !shouldError) { |
| return { data: server.create('mfa-login-enforcement', { name }) }; |
| } |
| return !record ? new Response(404, {}, { errors: [] }) : { data: record }; |
| }); |
| // create/update enforcement |
| server.post('/identity/mfa/login-enforcement/:name', (schema, { params: { name }, requestBody }) => { |
| const data = JSON.parse(requestBody); |
| // at least one method id is required |
| if (!data.mfa_method_ids?.length) { |
| return new Response(400, {}, { errors: ['missing method ids'] }); |
| } |
| // at least one of the following targets is required |
| const required = [ |
| 'auth_method_accessors', |
| 'auth_method_types', |
| 'identity_group_ids', |
| 'identity_entity_ids', |
| ]; |
| let hasRequired = false; |
| for (const key of required) { |
| if (data[key]?.length) { |
| hasRequired = true; |
| break; |
| } |
| } |
| if (!hasRequired) { |
| return new Response( |
| 400, |
| {}, |
| { |
| errors: [ |
| 'One of auth_method_accessors, auth_method_types, identity_group_ids, identity_entity_ids must be specified', |
| ], |
| } |
| ); |
| } |
| if (schema.db.mfaLoginEnforcements.findBy({ name })) { |
| schema.db.mfaLoginEnforcements.update({ name }, data); |
| } else { |
| schema.db.mfaLoginEnforcements.insert(data); |
| } |
| return { ...data, id: data.name }; |
| }); |
| // delete enforcement |
| server.delete('/identity/mfa/login-enforcement/:name', (schema, { params: { name } }) => { |
| schema.db.mfaLoginEnforcements.remove({ name }); |
| return {}; |
| }); |
| // endpoints for target selection |
| server.get('/identity/group/id', () => ({ |
| data: { |
| key_info: { '34db6b52-591e-bc22-8af0-4add5e167326': { name: 'test-group' } }, |
| keys: ['34db6b52-591e-bc22-8af0-4add5e167326'], |
| }, |
| })); |
| server.get('/identity/group/id/:id', () => ({ |
| data: { |
| id: '34db6b52-591e-bc22-8af0-4add5e167326', |
| name: 'test-group', |
| }, |
| })); |
| server.get('/identity/entity/id', () => ({ |
| data: { |
| key_info: { 'f831667b-7392-7a1c-c0fc-33d48cb1c57d': { name: 'test-entity' } }, |
| keys: ['f831667b-7392-7a1c-c0fc-33d48cb1c57d'], |
| }, |
| })); |
| server.get('/identity/entity/id/:id', () => ({ |
| data: { |
| id: 'f831667b-7392-7a1c-c0fc-33d48cb1c57d', |
| name: 'test-entity', |
| }, |
| })); |
| server.get('/sys/auth', () => ({ |
| data: { |
| 'userpass/': { accessor: 'auth_userpass_bb95c2b1', type: 'userpass' }, |
| }, |
| })); |
| } |