2022-10-11 19:45:59 +02:00
|
|
|
// eslint-disable-next-line no-restricted-imports
|
2022-10-11 14:08:48 +02:00
|
|
|
import { Arg, Substitute, SubstituteOf } from "@fluffy-spoon/substitute";
|
|
|
|
import { BehaviorSubject, firstValueFrom } from "rxjs";
|
|
|
|
|
|
|
|
import { CryptoService } from "@bitwarden/common/abstractions/crypto.service";
|
2022-10-27 23:38:54 +02:00
|
|
|
import { EncryptService } from "@bitwarden/common/abstractions/encrypt.service";
|
[AC-1011] Admin Console / Billing code ownership (#4973)
* refactor: move SCIM component to admin-console, refs EC-1011
* refactor: move scimProviderType to admin-console, refs EC-1011
* refactor: move scim-config.api to admin-console, refs EC-1011
* refactor: create models folder and nest existing api contents, refs EC-1011
* refactor: move scim-config to admin-console models, refs EC-1011
* refactor: move billing.component to billing, refs EC-1011
* refactor: remove nested app folder from new billing structure, refs EC-1011
* refactor: move organizations/billing to billing, refs EC-1011
* refactor: move add-credit and adjust-payment to billing/settings, refs EC-1011
* refactor: billing history/sync to billing, refs EC-1011
* refactor: move org plans, payment/method to billing/settings, refs EC-1011
* fix: update legacy file paths for payment-method and tax-info, refs EC-1011
* fix: update imports for scim component, refs EC-1011
* refactor: move subscription and tax-info into billing, refs EC-1011
* refactor: move user-subscription to billing, refs EC-1011
* refactor: move images/cards to billing and update base path, refs EC-1011
* refactor: move payment-method, plan subscription, and plan to billing, refs EC-1011
* refactor: move transaction-type to billing, refs EC-1011
* refactor: move billing-sync-config to billing, refs EC-1011
* refactor: move billing-sync and bit-pay-invoice request to billing, refs EC-1011
* refactor: move org subscription and tax info update requests to billing, refs EC-1011
* fix: broken paths to billing, refs EC-1011
* refactor: move payment request to billing, refs EC-1011
* fix: update remaining imports for payment-request, refs EC-1011
* refactor: move tax-info-update to billing, refs EC-1011
* refactor: move billing-payment, billing-history, and billing responses to billing, refs EC-1011
* refactor: move organization-subscription-responset to billing, refs EC-1011
* refactor: move payment and plan responses to billing, refs EC-1011
* refactor: move subscription response to billing ,refs EC-1011
* refactor: move tax info and rate responses to billing, refs EC-1011
* fix: update remaining path to base response for tax-rate response, refs EC-1011
* refactor: (browser) move organization-service to admin-console, refs EC-1011
* refactor: (browser) move organizaiton-service to admin-console, refs EC-1011
* refactor: (cli) move share command to admin-console, refs EC-1011
* refactor: move organization-collect request model to admin-console, refs EC-1011
* refactor: (web) move organization, collection/user responses to admin-console, refs EC-1011
* refactor: (cli) move selection-read-only to admin-console, refs EC-1011
* refactor: (desktop) move organization-filter to admin-console, refs EC-1011
* refactor: (web) move organization-switcher to admin-console, refs EC-1011
* refactor: (web) move access-selector to admin-console, refs EC-1011
* refactor: (web) move create folder to admin-console, refs EC-1011
* refactor: (web) move org guards folder to admin-console, refs EC-1011
* refactor: (web) move org layout to admin-console, refs EC-1011
* refactor: move manage collections to admin console, refs EC-1011
* refactor: (web) move collection-dialog to admin-console, refs EC-1011
* refactor: (web) move entity users/events and events component to admin-console, refs EC-1011
* refactor: (web) move groups/group-add-edit to admin-console, refs EC-1011
* refactor: (web) move manage, org-manage module, and user-confirm to admin-console, refs EC-1011
* refactor: (web) move people to admin-console, refs EC-1011
* refactor: (web) move reset-password to admin-console, refs EC-1011
* refactor: (web) move organization-routing and module to admin-console, refs EC-1011
* refactor: move admin-console and billing within app scope, refs EC-1011
* fix: update leftover merge conflicts, refs EC-1011
* refactor: (web) member-dialog to admin-console, refs EC-1011
* refactor: (web) move policies to admin-console, refs EC-1011
* refactor: (web) move reporting to admin-console, refs EC-1011
* refactor: (web) move settings to admin-console, refs EC-1011
* refactor: (web) move sponsorships to admin-console, refs EC-1011
* refactor: (web) move tools to admin-console, refs EC-1011
* refactor: (web) move users to admin-console, refs EC-1011
* refactor: (web) move collections to admin-console, refs EC-1011
* refactor: (web) move create-organization to admin-console, refs EC-1011
* refactor: (web) move licensed components to admin-console, refs EC-1011
* refactor: (web) move bit organization modules to admin-console, refs EC-1011
* fix: update leftover import statements for organizations.module, refs EC-1011
* refactor: (web) move personal vault and max timeout to admin-console, refs EC-1011
* refactor: (web) move providers to admin-console, refs EC-1011
* refactor: (libs) move organization service to admin-console, refs EC-1011
* refactor: (libs) move profile org/provider responses and other misc org responses to admin-console, refs EC-1011
* refactor: (libs) move provider request and selectionion-read-only request to admin-console, refs EC-1011
* fix: update missed import path for provider-user-update request, refs EC-1011
* refactor: (libs) move abstractions to admin-console, refs EC-1011
* refactor: (libs) move org/provider enums to admin-console, refs EC-1011
* fix: update downstream import statements from libs changes, refs EC-1011
* refactor: (libs) move data files to admin-console, refs EC-1011
* refactor: (libs) move domain to admin-console, refs EC-1011
* refactor: (libs) move request objects to admin-console, refs EC-1011
* fix: update downstream import changes from libs, refs EC-1011
* refactor: move leftover provider files to admin-console, refs EC-1011
* refactor: (browser) move group policy environment to admin-console, refs EC-1011
* fix: (browser) update downstream import statements, refs EC-1011
* fix: (desktop) update downstream libs moves, refs EC-1011
* fix: (cli) update downstream import changes from libs, refs EC-1011
* refactor: move org-auth related files to admin-console, refs EC-1011
* refactor: (libs) move request objects to admin-console, refs EC-1011
* refactor: move persmissions to admin-console, refs EC-1011
* refactor: move sponsored families to admin-console and fix libs changes, refs EC-1011
* refactor: move collections to admin-console, refs EC-1011
* refactor: move spec file back to spec scope, refs EC-1011
* fix: update downstream imports due to libs changes, refs EC-1011
* fix: udpate downstream import changes due to libs, refs EC-1011
* fix: update downstream imports due to libs changes, refs EC-1011
* fix: update downstream imports from libs changes, refs EC-1011
* fix: update path malformation in jslib-services.module, refs EC-1011
* fix: lint errors from improper casing, refs AC-1011
* fix: update downstream filename changes, refs AC-1011
* fix: (cli) update downstream filename changes, refs AC-1011
* fix: (desktop) update downstream filename changes, refs AC-1011
* fix: (browser) update downstream filename changes, refs AC-1011
* fix: lint errors, refs AC-1011
* fix: prettier, refs AC-1011
* fix: lint fixes for import order, refs AC-1011
* fix: update import path for provider user type, refs AC-1011
* fix: update new codes import paths for admin console structure, refs AC-1011
* fix: lint/prettier, refs AC-1011
* fix: update layout stories path, refs AC-1011
* fix: update comoponents card icons base variable in styles, refs AC-1011
* fix: update provider service path in permissions guard spec, refs AC-1011
* fix: update provider permission guard path, refs AC-1011
* fix: remove unecessary TODO for shared index export statement, refs AC-1011
* refactor: move browser-organization service and cli organization-user response out of admin-console, refs AC-1011
* refactor: move web/browser/desktop collections component to vault domain, refs AC-1011
* refactor: move organization.module out of admin-console scope, refs AC-1011
* fix: prettier, refs AC-1011
* refactor: move organizations-api-key.request out of admin-console scope, refs AC-1011
2023-03-22 16:03:50 +01:00
|
|
|
import { OrganizationService } from "@bitwarden/common/admin-console/abstractions/organization/organization.service.abstraction";
|
2023-04-06 03:34:23 +02:00
|
|
|
import { OrganizationUserStatusType, PolicyType } from "@bitwarden/common/admin-console/enums";
|
[AC-1011] Admin Console / Billing code ownership (#4973)
* refactor: move SCIM component to admin-console, refs EC-1011
* refactor: move scimProviderType to admin-console, refs EC-1011
* refactor: move scim-config.api to admin-console, refs EC-1011
* refactor: create models folder and nest existing api contents, refs EC-1011
* refactor: move scim-config to admin-console models, refs EC-1011
* refactor: move billing.component to billing, refs EC-1011
* refactor: remove nested app folder from new billing structure, refs EC-1011
* refactor: move organizations/billing to billing, refs EC-1011
* refactor: move add-credit and adjust-payment to billing/settings, refs EC-1011
* refactor: billing history/sync to billing, refs EC-1011
* refactor: move org plans, payment/method to billing/settings, refs EC-1011
* fix: update legacy file paths for payment-method and tax-info, refs EC-1011
* fix: update imports for scim component, refs EC-1011
* refactor: move subscription and tax-info into billing, refs EC-1011
* refactor: move user-subscription to billing, refs EC-1011
* refactor: move images/cards to billing and update base path, refs EC-1011
* refactor: move payment-method, plan subscription, and plan to billing, refs EC-1011
* refactor: move transaction-type to billing, refs EC-1011
* refactor: move billing-sync-config to billing, refs EC-1011
* refactor: move billing-sync and bit-pay-invoice request to billing, refs EC-1011
* refactor: move org subscription and tax info update requests to billing, refs EC-1011
* fix: broken paths to billing, refs EC-1011
* refactor: move payment request to billing, refs EC-1011
* fix: update remaining imports for payment-request, refs EC-1011
* refactor: move tax-info-update to billing, refs EC-1011
* refactor: move billing-payment, billing-history, and billing responses to billing, refs EC-1011
* refactor: move organization-subscription-responset to billing, refs EC-1011
* refactor: move payment and plan responses to billing, refs EC-1011
* refactor: move subscription response to billing ,refs EC-1011
* refactor: move tax info and rate responses to billing, refs EC-1011
* fix: update remaining path to base response for tax-rate response, refs EC-1011
* refactor: (browser) move organization-service to admin-console, refs EC-1011
* refactor: (browser) move organizaiton-service to admin-console, refs EC-1011
* refactor: (cli) move share command to admin-console, refs EC-1011
* refactor: move organization-collect request model to admin-console, refs EC-1011
* refactor: (web) move organization, collection/user responses to admin-console, refs EC-1011
* refactor: (cli) move selection-read-only to admin-console, refs EC-1011
* refactor: (desktop) move organization-filter to admin-console, refs EC-1011
* refactor: (web) move organization-switcher to admin-console, refs EC-1011
* refactor: (web) move access-selector to admin-console, refs EC-1011
* refactor: (web) move create folder to admin-console, refs EC-1011
* refactor: (web) move org guards folder to admin-console, refs EC-1011
* refactor: (web) move org layout to admin-console, refs EC-1011
* refactor: move manage collections to admin console, refs EC-1011
* refactor: (web) move collection-dialog to admin-console, refs EC-1011
* refactor: (web) move entity users/events and events component to admin-console, refs EC-1011
* refactor: (web) move groups/group-add-edit to admin-console, refs EC-1011
* refactor: (web) move manage, org-manage module, and user-confirm to admin-console, refs EC-1011
* refactor: (web) move people to admin-console, refs EC-1011
* refactor: (web) move reset-password to admin-console, refs EC-1011
* refactor: (web) move organization-routing and module to admin-console, refs EC-1011
* refactor: move admin-console and billing within app scope, refs EC-1011
* fix: update leftover merge conflicts, refs EC-1011
* refactor: (web) member-dialog to admin-console, refs EC-1011
* refactor: (web) move policies to admin-console, refs EC-1011
* refactor: (web) move reporting to admin-console, refs EC-1011
* refactor: (web) move settings to admin-console, refs EC-1011
* refactor: (web) move sponsorships to admin-console, refs EC-1011
* refactor: (web) move tools to admin-console, refs EC-1011
* refactor: (web) move users to admin-console, refs EC-1011
* refactor: (web) move collections to admin-console, refs EC-1011
* refactor: (web) move create-organization to admin-console, refs EC-1011
* refactor: (web) move licensed components to admin-console, refs EC-1011
* refactor: (web) move bit organization modules to admin-console, refs EC-1011
* fix: update leftover import statements for organizations.module, refs EC-1011
* refactor: (web) move personal vault and max timeout to admin-console, refs EC-1011
* refactor: (web) move providers to admin-console, refs EC-1011
* refactor: (libs) move organization service to admin-console, refs EC-1011
* refactor: (libs) move profile org/provider responses and other misc org responses to admin-console, refs EC-1011
* refactor: (libs) move provider request and selectionion-read-only request to admin-console, refs EC-1011
* fix: update missed import path for provider-user-update request, refs EC-1011
* refactor: (libs) move abstractions to admin-console, refs EC-1011
* refactor: (libs) move org/provider enums to admin-console, refs EC-1011
* fix: update downstream import statements from libs changes, refs EC-1011
* refactor: (libs) move data files to admin-console, refs EC-1011
* refactor: (libs) move domain to admin-console, refs EC-1011
* refactor: (libs) move request objects to admin-console, refs EC-1011
* fix: update downstream import changes from libs, refs EC-1011
* refactor: move leftover provider files to admin-console, refs EC-1011
* refactor: (browser) move group policy environment to admin-console, refs EC-1011
* fix: (browser) update downstream import statements, refs EC-1011
* fix: (desktop) update downstream libs moves, refs EC-1011
* fix: (cli) update downstream import changes from libs, refs EC-1011
* refactor: move org-auth related files to admin-console, refs EC-1011
* refactor: (libs) move request objects to admin-console, refs EC-1011
* refactor: move persmissions to admin-console, refs EC-1011
* refactor: move sponsored families to admin-console and fix libs changes, refs EC-1011
* refactor: move collections to admin-console, refs EC-1011
* refactor: move spec file back to spec scope, refs EC-1011
* fix: update downstream imports due to libs changes, refs EC-1011
* fix: udpate downstream import changes due to libs, refs EC-1011
* fix: update downstream imports due to libs changes, refs EC-1011
* fix: update downstream imports from libs changes, refs EC-1011
* fix: update path malformation in jslib-services.module, refs EC-1011
* fix: lint errors from improper casing, refs AC-1011
* fix: update downstream filename changes, refs AC-1011
* fix: (cli) update downstream filename changes, refs AC-1011
* fix: (desktop) update downstream filename changes, refs AC-1011
* fix: (browser) update downstream filename changes, refs AC-1011
* fix: lint errors, refs AC-1011
* fix: prettier, refs AC-1011
* fix: lint fixes for import order, refs AC-1011
* fix: update import path for provider user type, refs AC-1011
* fix: update new codes import paths for admin console structure, refs AC-1011
* fix: lint/prettier, refs AC-1011
* fix: update layout stories path, refs AC-1011
* fix: update comoponents card icons base variable in styles, refs AC-1011
* fix: update provider service path in permissions guard spec, refs AC-1011
* fix: update provider permission guard path, refs AC-1011
* fix: remove unecessary TODO for shared index export statement, refs AC-1011
* refactor: move browser-organization service and cli organization-user response out of admin-console, refs AC-1011
* refactor: move web/browser/desktop collections component to vault domain, refs AC-1011
* refactor: move organization.module out of admin-console scope, refs AC-1011
* fix: prettier, refs AC-1011
* refactor: move organizations-api-key.request out of admin-console scope, refs AC-1011
2023-03-22 16:03:50 +01:00
|
|
|
import { PermissionsApi } from "@bitwarden/common/admin-console/models/api/permissions.api";
|
|
|
|
import { OrganizationData } from "@bitwarden/common/admin-console/models/data/organization.data";
|
|
|
|
import { PolicyData } from "@bitwarden/common/admin-console/models/data/policy.data";
|
|
|
|
import { MasterPasswordPolicyOptions } from "@bitwarden/common/admin-console/models/domain/master-password-policy-options";
|
|
|
|
import { Organization } from "@bitwarden/common/admin-console/models/domain/organization";
|
|
|
|
import { Policy } from "@bitwarden/common/admin-console/models/domain/policy";
|
|
|
|
import { ResetPasswordPolicyOptions } from "@bitwarden/common/admin-console/models/domain/reset-password-policy-options";
|
|
|
|
import { PolicyResponse } from "@bitwarden/common/admin-console/models/response/policy.response";
|
|
|
|
import { PolicyService } from "@bitwarden/common/admin-console/services/policy/policy.service";
|
2022-10-18 19:01:42 +02:00
|
|
|
import { ListResponse } from "@bitwarden/common/models/response/list.response";
|
2022-10-11 14:08:48 +02:00
|
|
|
import { ContainerService } from "@bitwarden/common/services/container.service";
|
|
|
|
import { StateService } from "@bitwarden/common/services/state.service";
|
|
|
|
|
|
|
|
describe("PolicyService", () => {
|
|
|
|
let policyService: PolicyService;
|
|
|
|
|
|
|
|
let cryptoService: SubstituteOf<CryptoService>;
|
|
|
|
let stateService: SubstituteOf<StateService>;
|
|
|
|
let organizationService: SubstituteOf<OrganizationService>;
|
|
|
|
let encryptService: SubstituteOf<EncryptService>;
|
|
|
|
let activeAccount: BehaviorSubject<string>;
|
|
|
|
let activeAccountUnlocked: BehaviorSubject<boolean>;
|
|
|
|
|
|
|
|
beforeEach(() => {
|
|
|
|
stateService = Substitute.for();
|
|
|
|
organizationService = Substitute.for();
|
|
|
|
organizationService
|
|
|
|
.getAll("user")
|
|
|
|
.resolves([
|
|
|
|
new Organization(
|
|
|
|
organizationData(
|
|
|
|
"test-organization",
|
|
|
|
true,
|
|
|
|
true,
|
|
|
|
OrganizationUserStatusType.Accepted,
|
|
|
|
false
|
|
|
|
)
|
|
|
|
),
|
|
|
|
]);
|
|
|
|
organizationService.getAll(undefined).resolves([]);
|
|
|
|
organizationService.getAll(null).resolves([]);
|
|
|
|
activeAccount = new BehaviorSubject("123");
|
|
|
|
activeAccountUnlocked = new BehaviorSubject(true);
|
2022-11-11 16:13:27 +01:00
|
|
|
stateService.getDecryptedPolicies({ userId: "user" }).resolves(null);
|
|
|
|
stateService.getEncryptedPolicies({ userId: "user" }).resolves({
|
|
|
|
"1": policyData("1", "test-organization", PolicyType.MaximumVaultTimeout, true, {
|
|
|
|
minutes: 14,
|
|
|
|
}),
|
|
|
|
});
|
2022-10-11 14:08:48 +02:00
|
|
|
stateService.getEncryptedPolicies().resolves({
|
|
|
|
"1": policyData("1", "test-organization", PolicyType.MaximumVaultTimeout, true, {
|
|
|
|
minutes: 14,
|
|
|
|
}),
|
|
|
|
});
|
|
|
|
stateService.activeAccount$.returns(activeAccount);
|
|
|
|
stateService.activeAccountUnlocked$.returns(activeAccountUnlocked);
|
|
|
|
stateService.getUserId().resolves("user");
|
|
|
|
(window as any).bitwardenContainerService = new ContainerService(cryptoService, encryptService);
|
|
|
|
|
|
|
|
policyService = new PolicyService(stateService, organizationService);
|
|
|
|
});
|
|
|
|
|
|
|
|
afterEach(() => {
|
|
|
|
activeAccount.complete();
|
|
|
|
activeAccountUnlocked.complete();
|
|
|
|
});
|
|
|
|
|
|
|
|
it("upsert", async () => {
|
|
|
|
await policyService.upsert(policyData("99", "test-organization", PolicyType.DisableSend, true));
|
|
|
|
|
|
|
|
expect(await firstValueFrom(policyService.policies$)).toEqual([
|
|
|
|
{
|
|
|
|
id: "1",
|
|
|
|
organizationId: "test-organization",
|
|
|
|
type: PolicyType.MaximumVaultTimeout,
|
|
|
|
enabled: true,
|
|
|
|
data: { minutes: 14 },
|
|
|
|
},
|
|
|
|
{
|
|
|
|
id: "99",
|
|
|
|
organizationId: "test-organization",
|
|
|
|
type: PolicyType.DisableSend,
|
|
|
|
enabled: true,
|
|
|
|
},
|
|
|
|
]);
|
|
|
|
});
|
|
|
|
|
|
|
|
it("replace", async () => {
|
|
|
|
await policyService.replace({
|
|
|
|
"2": policyData("2", "test-organization", PolicyType.DisableSend, true),
|
|
|
|
});
|
|
|
|
|
|
|
|
expect(await firstValueFrom(policyService.policies$)).toEqual([
|
|
|
|
{
|
|
|
|
id: "2",
|
|
|
|
organizationId: "test-organization",
|
|
|
|
type: PolicyType.DisableSend,
|
|
|
|
enabled: true,
|
|
|
|
},
|
|
|
|
]);
|
|
|
|
});
|
|
|
|
|
|
|
|
it("locking should clear", async () => {
|
|
|
|
activeAccountUnlocked.next(false);
|
|
|
|
// Sleep for 100ms to avoid timing issues
|
|
|
|
await new Promise((r) => setTimeout(r, 100));
|
|
|
|
|
|
|
|
expect((await firstValueFrom(policyService.policies$)).length).toBe(0);
|
|
|
|
});
|
|
|
|
|
|
|
|
describe("clear", () => {
|
|
|
|
it("null userId", async () => {
|
|
|
|
await policyService.clear();
|
|
|
|
|
|
|
|
stateService.received(1).setEncryptedPolicies(Arg.any(), Arg.any());
|
|
|
|
|
|
|
|
expect((await firstValueFrom(policyService.policies$)).length).toBe(0);
|
|
|
|
});
|
|
|
|
|
|
|
|
it("matching userId", async () => {
|
|
|
|
await policyService.clear("user");
|
|
|
|
|
|
|
|
stateService.received(1).setEncryptedPolicies(Arg.any(), Arg.any());
|
|
|
|
|
|
|
|
expect((await firstValueFrom(policyService.policies$)).length).toBe(0);
|
|
|
|
});
|
|
|
|
|
|
|
|
it("mismatching userId", async () => {
|
|
|
|
await policyService.clear("12");
|
|
|
|
|
|
|
|
stateService.received(1).setEncryptedPolicies(Arg.any(), Arg.any());
|
|
|
|
|
|
|
|
expect((await firstValueFrom(policyService.policies$)).length).toBe(1);
|
|
|
|
});
|
|
|
|
});
|
|
|
|
|
|
|
|
describe("masterPasswordPolicyOptions", () => {
|
|
|
|
it("returns default policy options", async () => {
|
|
|
|
const data: any = {
|
|
|
|
minComplexity: 5,
|
|
|
|
minLength: 20,
|
|
|
|
requireUpper: true,
|
|
|
|
};
|
|
|
|
const model = [
|
|
|
|
new Policy(policyData("1", "test-organization-3", PolicyType.MasterPassword, true, data)),
|
|
|
|
];
|
|
|
|
const result = await firstValueFrom(policyService.masterPasswordPolicyOptions$(model));
|
|
|
|
|
|
|
|
expect(result).toEqual({
|
|
|
|
minComplexity: 5,
|
|
|
|
minLength: 20,
|
|
|
|
requireLower: false,
|
|
|
|
requireNumbers: false,
|
|
|
|
requireSpecial: false,
|
|
|
|
requireUpper: true,
|
2023-04-17 16:35:37 +02:00
|
|
|
enforceOnLogin: false,
|
2022-10-11 14:08:48 +02:00
|
|
|
});
|
|
|
|
});
|
|
|
|
|
|
|
|
it("returns null", async () => {
|
|
|
|
const data: any = {};
|
|
|
|
const model = [
|
|
|
|
new Policy(
|
|
|
|
policyData("3", "test-organization-3", PolicyType.DisablePersonalVaultExport, true, data)
|
|
|
|
),
|
|
|
|
new Policy(
|
|
|
|
policyData("4", "test-organization-3", PolicyType.MaximumVaultTimeout, true, data)
|
|
|
|
),
|
|
|
|
];
|
|
|
|
|
|
|
|
const result = await firstValueFrom(policyService.masterPasswordPolicyOptions$(model));
|
|
|
|
|
|
|
|
expect(result).toEqual(null);
|
|
|
|
});
|
|
|
|
|
|
|
|
it("returns specified policy options", async () => {
|
|
|
|
const data: any = {
|
|
|
|
minLength: 14,
|
|
|
|
};
|
|
|
|
const model = [
|
|
|
|
new Policy(
|
|
|
|
policyData("3", "test-organization-3", PolicyType.DisablePersonalVaultExport, true, data)
|
|
|
|
),
|
|
|
|
new Policy(policyData("4", "test-organization-3", PolicyType.MasterPassword, true, data)),
|
|
|
|
];
|
|
|
|
|
|
|
|
const result = await firstValueFrom(policyService.masterPasswordPolicyOptions$(model));
|
|
|
|
|
|
|
|
expect(result).toEqual({
|
|
|
|
minComplexity: 0,
|
|
|
|
minLength: 14,
|
|
|
|
requireLower: false,
|
|
|
|
requireNumbers: false,
|
|
|
|
requireSpecial: false,
|
|
|
|
requireUpper: false,
|
2023-04-17 16:35:37 +02:00
|
|
|
enforceOnLogin: false,
|
2022-10-11 14:08:48 +02:00
|
|
|
});
|
|
|
|
});
|
|
|
|
});
|
|
|
|
|
|
|
|
describe("evaluateMasterPassword", () => {
|
|
|
|
it("false", async () => {
|
|
|
|
const enforcedPolicyOptions = new MasterPasswordPolicyOptions();
|
|
|
|
enforcedPolicyOptions.minLength = 14;
|
|
|
|
const result = policyService.evaluateMasterPassword(10, "password", enforcedPolicyOptions);
|
|
|
|
|
|
|
|
expect(result).toEqual(false);
|
|
|
|
});
|
|
|
|
|
|
|
|
it("true", async () => {
|
|
|
|
const enforcedPolicyOptions = new MasterPasswordPolicyOptions();
|
|
|
|
const result = policyService.evaluateMasterPassword(0, "password", enforcedPolicyOptions);
|
|
|
|
|
|
|
|
expect(result).toEqual(true);
|
|
|
|
});
|
|
|
|
});
|
|
|
|
|
|
|
|
describe("getResetPasswordPolicyOptions", () => {
|
|
|
|
it("default", async () => {
|
|
|
|
const result = policyService.getResetPasswordPolicyOptions(null, null);
|
|
|
|
|
|
|
|
expect(result).toEqual([new ResetPasswordPolicyOptions(), false]);
|
|
|
|
});
|
|
|
|
|
|
|
|
it("returns autoEnrollEnabled true", async () => {
|
|
|
|
const data: any = {
|
|
|
|
autoEnrollEnabled: true,
|
|
|
|
};
|
|
|
|
const policies = [
|
|
|
|
new Policy(policyData("5", "test-organization-3", PolicyType.ResetPassword, true, data)),
|
|
|
|
];
|
|
|
|
const result = policyService.getResetPasswordPolicyOptions(policies, "test-organization-3");
|
|
|
|
|
|
|
|
expect(result).toEqual([{ autoEnrollEnabled: true }, true]);
|
|
|
|
});
|
|
|
|
});
|
|
|
|
|
|
|
|
describe("mapPoliciesFromToken", () => {
|
|
|
|
it("null", async () => {
|
|
|
|
const result = policyService.mapPoliciesFromToken(null);
|
|
|
|
|
|
|
|
expect(result).toEqual(null);
|
|
|
|
});
|
|
|
|
|
|
|
|
it("null data", async () => {
|
|
|
|
const model = new ListResponse(null, PolicyResponse);
|
|
|
|
model.data = null;
|
|
|
|
const result = policyService.mapPoliciesFromToken(model);
|
|
|
|
|
|
|
|
expect(result).toEqual(null);
|
|
|
|
});
|
|
|
|
|
|
|
|
it("empty array", async () => {
|
|
|
|
const model = new ListResponse(null, PolicyResponse);
|
|
|
|
const result = policyService.mapPoliciesFromToken(model);
|
|
|
|
|
|
|
|
expect(result).toEqual([]);
|
|
|
|
});
|
|
|
|
|
|
|
|
it("success", async () => {
|
|
|
|
const policyResponse: any = {
|
|
|
|
Data: [
|
|
|
|
{
|
|
|
|
Id: "1",
|
|
|
|
OrganizationId: "organization-1",
|
|
|
|
Type: PolicyType.DisablePersonalVaultExport,
|
|
|
|
Enabled: true,
|
|
|
|
Data: { requireUpper: true },
|
|
|
|
},
|
|
|
|
{
|
|
|
|
Id: "2",
|
|
|
|
OrganizationId: "organization-2",
|
|
|
|
Type: PolicyType.DisableSend,
|
|
|
|
Enabled: false,
|
|
|
|
Data: { minComplexity: 5, minLength: 20 },
|
|
|
|
},
|
|
|
|
],
|
|
|
|
};
|
|
|
|
const model = new ListResponse(policyResponse, PolicyResponse);
|
|
|
|
const result = policyService.mapPoliciesFromToken(model);
|
|
|
|
|
|
|
|
expect(result).toEqual([
|
|
|
|
new Policy(
|
|
|
|
policyData("1", "organization-1", PolicyType.DisablePersonalVaultExport, true, {
|
|
|
|
requireUpper: true,
|
|
|
|
})
|
|
|
|
),
|
|
|
|
new Policy(
|
|
|
|
policyData("2", "organization-2", PolicyType.DisableSend, false, {
|
|
|
|
minComplexity: 5,
|
|
|
|
minLength: 20,
|
|
|
|
})
|
|
|
|
),
|
|
|
|
]);
|
|
|
|
});
|
|
|
|
});
|
|
|
|
|
2022-11-11 16:13:27 +01:00
|
|
|
describe("policyAppliesToActiveUser$", () => {
|
2022-10-11 14:08:48 +02:00
|
|
|
it("MasterPassword does not apply", async () => {
|
|
|
|
const result = await firstValueFrom(
|
|
|
|
policyService.policyAppliesToActiveUser$(PolicyType.MasterPassword)
|
|
|
|
);
|
|
|
|
|
|
|
|
expect(result).toEqual(false);
|
|
|
|
});
|
|
|
|
|
|
|
|
it("MaximumVaultTimeout applies", async () => {
|
|
|
|
const result = await firstValueFrom(
|
|
|
|
policyService.policyAppliesToActiveUser$(PolicyType.MaximumVaultTimeout)
|
|
|
|
);
|
|
|
|
|
|
|
|
expect(result).toEqual(true);
|
|
|
|
});
|
|
|
|
|
2022-11-11 16:13:27 +01:00
|
|
|
it("PolicyFilter filters result", async () => {
|
|
|
|
const result = await firstValueFrom(
|
|
|
|
policyService.policyAppliesToActiveUser$(PolicyType.MaximumVaultTimeout, (p) => false)
|
|
|
|
);
|
|
|
|
|
|
|
|
expect(result).toEqual(false);
|
|
|
|
});
|
|
|
|
|
2022-10-11 14:08:48 +02:00
|
|
|
it("DisablePersonalVaultExport does not apply", async () => {
|
|
|
|
const result = await firstValueFrom(
|
|
|
|
policyService.policyAppliesToActiveUser$(PolicyType.DisablePersonalVaultExport)
|
|
|
|
);
|
|
|
|
|
|
|
|
expect(result).toEqual(false);
|
|
|
|
});
|
|
|
|
});
|
|
|
|
|
2022-11-11 16:13:27 +01:00
|
|
|
describe("policyAppliesToUser", () => {
|
|
|
|
it("MasterPassword does not apply", async () => {
|
|
|
|
const result = await policyService.policyAppliesToUser(
|
|
|
|
PolicyType.MasterPassword,
|
|
|
|
null,
|
|
|
|
"user"
|
|
|
|
);
|
|
|
|
|
|
|
|
expect(result).toEqual(false);
|
|
|
|
});
|
|
|
|
|
|
|
|
it("MaximumVaultTimeout applies", async () => {
|
|
|
|
const result = await policyService.policyAppliesToUser(
|
|
|
|
PolicyType.MaximumVaultTimeout,
|
|
|
|
null,
|
|
|
|
"user"
|
|
|
|
);
|
|
|
|
|
|
|
|
expect(result).toEqual(true);
|
|
|
|
});
|
|
|
|
|
|
|
|
it("PolicyFilter filters result", async () => {
|
|
|
|
const result = await policyService.policyAppliesToUser(
|
|
|
|
PolicyType.MaximumVaultTimeout,
|
|
|
|
(p) => false,
|
|
|
|
"user"
|
|
|
|
);
|
|
|
|
|
|
|
|
expect(result).toEqual(false);
|
|
|
|
});
|
|
|
|
|
|
|
|
it("DisablePersonalVaultExport does not apply", async () => {
|
|
|
|
const result = await policyService.policyAppliesToUser(
|
|
|
|
PolicyType.DisablePersonalVaultExport,
|
|
|
|
null,
|
|
|
|
"user"
|
|
|
|
);
|
|
|
|
|
|
|
|
expect(result).toEqual(false);
|
|
|
|
});
|
|
|
|
});
|
|
|
|
|
2022-10-11 14:08:48 +02:00
|
|
|
function policyData(
|
|
|
|
id: string,
|
|
|
|
organizationId: string,
|
|
|
|
type: PolicyType,
|
|
|
|
enabled: boolean,
|
|
|
|
data?: any
|
|
|
|
) {
|
|
|
|
const policyData = new PolicyData({} as any);
|
|
|
|
policyData.id = id;
|
|
|
|
policyData.organizationId = organizationId;
|
|
|
|
policyData.type = type;
|
|
|
|
policyData.enabled = enabled;
|
|
|
|
policyData.data = data;
|
|
|
|
|
|
|
|
return policyData;
|
|
|
|
}
|
|
|
|
|
|
|
|
function organizationData(
|
|
|
|
id: string,
|
|
|
|
enabled: boolean,
|
|
|
|
usePolicies: boolean,
|
|
|
|
status: OrganizationUserStatusType,
|
|
|
|
managePolicies: boolean
|
|
|
|
) {
|
2023-04-17 05:09:53 +02:00
|
|
|
const organizationData = new OrganizationData({} as any, {} as any);
|
2022-10-11 14:08:48 +02:00
|
|
|
organizationData.id = id;
|
|
|
|
organizationData.enabled = enabled;
|
|
|
|
organizationData.usePolicies = usePolicies;
|
|
|
|
organizationData.status = status;
|
|
|
|
organizationData.permissions = new PermissionsApi({ managePolicies: managePolicies } as any);
|
|
|
|
return organizationData;
|
|
|
|
}
|
|
|
|
});
|