Skip to content

Commit bacfd29

Browse files
authored
OIDC MFA URL params support (#667)
1 parent f2a21c5 commit bacfd29

File tree

5 files changed

+339
-17
lines changed

5 files changed

+339
-17
lines changed

package.json

+1-1
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@
5353
"eslint-plugin-security": "1.7.1",
5454
"eslint-plugin-testing-library": "6.2.0",
5555
"husky": "8.0.3",
56-
"jest": "29.7.0",
56+
"jest": "^29.7.0",
5757
"lint-staged": "15.2.0",
5858
"prettier": "3.2.2",
5959
"react-app-rewired": "^2.2.1",

src/App.test.tsx

+246-3
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,29 @@
11
import '@testing-library/jest-dom';
22
import React, { PropsWithChildren } from 'react';
3-
import { render, fireEvent, screen, waitFor } from '@testing-library/react';
3+
import {
4+
render,
5+
fireEvent,
6+
screen,
7+
waitFor,
8+
renderHook,
9+
within
10+
} from '@testing-library/react';
411
import App from './App';
512
import packageJson from '../package.json';
13+
import useOidcMfa from './hooks/useOidcMfa';
614

715
const mockDescope = jest.fn();
816
const mockAuthProvider = jest.fn();
917

1018
jest.mock('@descope/react-sdk', () => ({
1119
...jest.requireActual('@descope/react-sdk'),
12-
Descope: (props: unknown) => {
20+
Descope: ({ onSuccess, ...props }: { onSuccess: () => void }) => {
1321
mockDescope(props);
14-
return <div />;
22+
return (
23+
<button data-testid="descope-button" type="button" onClick={onSuccess}>
24+
Descope
25+
</button>
26+
);
1527
},
1628
AuthProvider: (props: PropsWithChildren<{ [key: string]: string }>) => {
1729
const { children } = props;
@@ -26,6 +38,9 @@ const baseUrl = 'https://api.descope.test';
2638
const flowId = 'test';
2739
const debug = true;
2840

41+
const mockFetch = jest.fn();
42+
global.fetch = mockFetch;
43+
2944
describe('App component', () => {
3045
beforeAll(() => {
3146
Object.defineProperty(window, 'location', {
@@ -147,4 +162,232 @@ describe('App component', () => {
147162
)
148163
);
149164
});
165+
166+
describe('onSuccess callback', () => {
167+
beforeEach(() => {
168+
jest.clearAllMocks();
169+
process.env.DESCOPE_PROJECT_ID = 'P123456789012345678901234567';
170+
process.env.DESCOPE_FLOW_ID = 'saml-config';
171+
process.env.REACT_APP_DESCOPE_BASE_URL = baseUrl;
172+
173+
// Set the ssoAppId URL parameter
174+
Object.defineProperty(window, 'location', {
175+
value: {
176+
...window.location,
177+
search: '?sso_app_id=testSsoAppId',
178+
pathname: '/test',
179+
assign: jest.fn()
180+
},
181+
writable: true
182+
});
183+
});
184+
185+
it('should update the URL with done=true when onSuccess is triggered', async () => {
186+
render(<App />);
187+
188+
const descopeButton = screen.getByTestId('descope-button');
189+
fireEvent.click(descopeButton);
190+
191+
await waitFor(() => {
192+
expect(window.location.assign).toHaveBeenCalledWith(
193+
`${baseUrl}/test?sso_app_id=testSsoAppId&done=true`
194+
);
195+
});
196+
});
197+
198+
it('should update the URL with done=true when onSuccess is triggered without existing search params', async () => {
199+
Object.defineProperty(window, 'location', {
200+
value: {
201+
...window.location,
202+
search: '',
203+
pathname: '/test',
204+
assign: jest.fn()
205+
},
206+
writable: true
207+
});
208+
209+
render(<App />);
210+
211+
const descopeButton = screen.getByTestId('descope-button');
212+
fireEvent.click(descopeButton);
213+
214+
await waitFor(() => {
215+
expect(window.location.assign).toHaveBeenCalledWith(
216+
`${baseUrl}/test?done=true`
217+
);
218+
});
219+
});
220+
});
221+
222+
describe('favicon', () => {
223+
beforeEach(() => {
224+
jest.clearAllMocks();
225+
process.env.REACT_APP_BASE_FUNCTIONS_URL = 'https://example.com';
226+
process.env.REACT_APP_FAVICON_URL = 'https://example.com/favicon.ico';
227+
process.env.DESCOPE_PROJECT_ID = 'P1234567890123456789012345678901';
228+
229+
Object.defineProperty(window, 'location', {
230+
value: {
231+
...window.location,
232+
search: '?sso_app_id=testSsoAppId',
233+
pathname: '/test'
234+
},
235+
writable: true
236+
});
237+
});
238+
239+
afterEach(() => {
240+
// clean head after each test
241+
document.head.innerHTML = '';
242+
});
243+
244+
it('should update the favicon when all conditions are met', async () => {
245+
mockFetch.mockResolvedValueOnce({
246+
ok: true,
247+
json: async () => ({
248+
faviconUrl: 'https://example.com/new-favicon.ico'
249+
})
250+
});
251+
252+
render(<App />);
253+
254+
await waitFor(() => {
255+
// eslint-disable-next-line testing-library/no-node-access -- can't query head with screen
256+
const link = document.head.querySelector(
257+
"link[rel~='icon']"
258+
) as HTMLLinkElement;
259+
expect(link).toBeInTheDocument();
260+
});
261+
262+
await waitFor(() => {
263+
// eslint-disable-next-line testing-library/no-node-access -- can't query head with screen
264+
const link = document.head.querySelector(
265+
"link[rel~='icon']"
266+
) as HTMLLinkElement;
267+
expect(link.href).toBe('https://example.com/new-favicon.ico');
268+
});
269+
});
270+
271+
it('should not update the favicon if the response is not ok', async () => {
272+
mockFetch.mockResolvedValueOnce({
273+
ok: false
274+
});
275+
276+
render(<App />);
277+
278+
await waitFor(() => {
279+
// eslint-disable-next-line testing-library/no-node-access -- can't query head with screen
280+
const link = document.head.querySelector("link[rel~='icon']");
281+
expect(link).not.toBeInTheDocument();
282+
});
283+
});
284+
285+
it('should not update the favicon if the URL is not secure', async () => {
286+
process.env.REACT_APP_FAVICON_URL = 'http://example.com/favicon.ico';
287+
288+
render(<App />);
289+
290+
await waitFor(() => {
291+
// eslint-disable-next-line testing-library/no-node-access -- can't query head with screen
292+
const link = document.querySelector("link[rel~='icon']");
293+
expect(link).not.toBeInTheDocument();
294+
});
295+
});
296+
297+
it('should not update the favicon if the URL is not valid', async () => {
298+
process.env.REACT_APP_FAVICON_URL = 'invalid-url';
299+
300+
render(<App />);
301+
302+
await waitFor(() => {
303+
// eslint-disable-next-line testing-library/no-node-access -- can't query head with screen
304+
const link = document.querySelector("link[rel~='icon']");
305+
expect(link).not.toBeInTheDocument();
306+
});
307+
});
308+
309+
it('should not update the favicon if fetch throws an error', async () => {
310+
mockFetch.mockRejectedValueOnce(new Error('test error'));
311+
312+
render(<App />);
313+
314+
await waitFor(() => {
315+
// eslint-disable-next-line testing-library/no-node-access -- can't query head with screen
316+
const link = document.querySelector("link[rel~='icon']");
317+
expect(link).not.toBeInTheDocument();
318+
});
319+
});
320+
321+
it('should not update the favicon if faviconUrl is missing', async () => {
322+
process.env.REACT_APP_FAVICON_URL = '';
323+
324+
render(<App />);
325+
326+
await waitFor(() => {
327+
// eslint-disable-next-line testing-library/no-node-access -- can't query head with screen
328+
const link = document.querySelector("link[rel~='icon']");
329+
expect(link).not.toBeInTheDocument();
330+
});
331+
});
332+
});
333+
334+
describe('useOidcMfa', () => {
335+
beforeEach(() => {
336+
Object.defineProperty(window, 'location', {
337+
value: {
338+
...window.location,
339+
search:
340+
'?oidc_mfa_state=testState&oidc_mfa_id_token=testIdToken&oidc_mfa_redirect_url=https://login.microsoftonline.com/common/federation/externalauthprovider',
341+
pathname: '/test'
342+
},
343+
writable: true
344+
});
345+
346+
// Mock window.history.replaceState
347+
window.history.replaceState = jest.fn();
348+
349+
// Mock form.submit
350+
HTMLFormElement.prototype.submit = jest.fn();
351+
});
352+
353+
afterEach(() => {
354+
// Clean up the DOM after each test
355+
document.body.innerHTML = '';
356+
});
357+
358+
it('should create and submit a form with the correct parameters', () => {
359+
renderHook(() => useOidcMfa());
360+
361+
const form = screen.getByTestId('oidc-mfa-form');
362+
expect(form).toBeInTheDocument();
363+
expect(form).toHaveAttribute(
364+
'action',
365+
'https://login.microsoftonline.com/common/federation/externalauthprovider'
366+
);
367+
expect(form).toHaveAttribute('method', 'POST');
368+
369+
const stateInput = within(form).getByTestId('state');
370+
expect(stateInput).toBeInTheDocument();
371+
expect(stateInput).toHaveValue('testState');
372+
373+
const idTokenInput = within(form).getByTestId('id_token', {});
374+
expect(idTokenInput).toBeInTheDocument();
375+
expect(idTokenInput).toHaveValue('testIdToken');
376+
});
377+
it('should not create form post if the URL is not approved', () => {
378+
Object.defineProperty(window, 'location', {
379+
value: {
380+
...window.location,
381+
search:
382+
'?oidc_mfa_state=testState&oidc_mfa_id_token=testIdToken&oidc_mfa_redirect_url=https://example.com',
383+
pathname: '/test'
384+
},
385+
writable: true
386+
});
387+
388+
renderHook(() => useOidcMfa());
389+
390+
expect(screen.queryByTestId('oidc-mfa-form')).not.toBeInTheDocument();
391+
});
392+
});
150393
});

src/App.tsx

+8-3
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ import React, { useEffect, useMemo } from 'react';
44
import './App.css';
55
import Done from './components/Done';
66
import Welcome from './components/Welcome';
7+
import useOidcMfa from './hooks/useOidcMfa';
78

89
const projectRegex = /^P([a-zA-Z0-9]{27}|[a-zA-Z0-9]{31})$/;
910
const ssoAppRegex = /^[a-zA-Z0-9\-_]{1,30}$/;
@@ -56,6 +57,8 @@ const App = () => {
5657
)?.[0];
5758
projectId = pathnameProjectId ?? envProjectId ?? '';
5859

60+
useOidcMfa();
61+
5962
const urlParams = useMemo(
6063
() => new URLSearchParams(window.location.search),
6164
[]
@@ -150,9 +153,11 @@ const App = () => {
150153
} else {
151154
search = `?done=true`;
152155
}
153-
window?.location.assign(
154-
`${window?.location.origin}/${window?.location.pathname}${search}`
155-
);
156+
// build the new URL
157+
const newUrl = new URL(window?.location.origin);
158+
newUrl.pathname = window?.location.pathname;
159+
newUrl.search = search;
160+
window?.location.assign(newUrl.toString());
156161
}
157162
})
158163
};

src/hooks/useOidcMfa.ts

+74
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,74 @@
1+
import { useEffect } from 'react';
2+
3+
const OIDC_MFA_URL_STATE_PARAM_NAME = 'oidc_mfa_state';
4+
const OIDC_MFA_URL_ID_TOKEN_PARAM_NAME = 'oidc_mfa_id_token';
5+
const OIDC_MFA_URL_REDIRECT_URL_PARAM_NAME = 'oidc_mfa_redirect_url';
6+
7+
const APPROVED_OIDC_MFA_URLS = [
8+
'https://login.microsoftonline.com',
9+
'https://login.microsoftonline.us',
10+
'https://login.partner.microsoftonline.cn'
11+
];
12+
13+
const createAndAppendInputElement = (
14+
form: HTMLFormElement,
15+
name: string,
16+
value: string
17+
): void => {
18+
const input = document.createElement('input');
19+
input.type = 'text';
20+
input.name = name;
21+
input.value = value;
22+
input.required = true;
23+
input.setAttribute('data-testid', name);
24+
form.appendChild(input);
25+
};
26+
27+
const useOidcMfa = () => {
28+
useEffect(() => {
29+
const urlParams = new URLSearchParams(window.location.search);
30+
const state = urlParams.get(OIDC_MFA_URL_STATE_PARAM_NAME);
31+
const idToken = urlParams.get(OIDC_MFA_URL_ID_TOKEN_PARAM_NAME);
32+
let redirectUrl = urlParams.get(OIDC_MFA_URL_REDIRECT_URL_PARAM_NAME);
33+
34+
if (!state || !idToken || !redirectUrl) {
35+
return;
36+
}
37+
38+
// Remove the parameters from the URL
39+
urlParams.delete(OIDC_MFA_URL_STATE_PARAM_NAME);
40+
urlParams.delete(OIDC_MFA_URL_ID_TOKEN_PARAM_NAME);
41+
urlParams.delete(OIDC_MFA_URL_REDIRECT_URL_PARAM_NAME);
42+
const newUrl = `${window.location.pathname}?${urlParams.toString()}`;
43+
window.history.replaceState({}, '', newUrl);
44+
45+
try {
46+
const parsedUrl = new URL(redirectUrl);
47+
if (
48+
!APPROVED_OIDC_MFA_URLS.some(
49+
(approvedUrl) => parsedUrl.origin === approvedUrl
50+
)
51+
) {
52+
throw new Error('Unapproved redirect URL');
53+
}
54+
redirectUrl = parsedUrl.href;
55+
} catch (error) {
56+
return;
57+
}
58+
59+
// Create and submit the form
60+
const form = document.createElement('form');
61+
form.action = redirectUrl;
62+
form.method = 'POST';
63+
form.style.display = 'none';
64+
form.setAttribute('data-testid', 'oidc-mfa-form');
65+
66+
createAndAppendInputElement(form, 'state', state);
67+
createAndAppendInputElement(form, 'id_token', idToken);
68+
69+
document.body.appendChild(form);
70+
form.submit();
71+
}, []);
72+
};
73+
74+
export default useOidcMfa;

0 commit comments

Comments
 (0)