Skip to content

Commit 7d5b3b8

Browse files
Merge pull request #10 from vizmo-vms/fix-mfa-test-case-issues
2 parents 32251e6 + 8b400ab commit 7d5b3b8

File tree

1 file changed

+14
-14
lines changed

1 file changed

+14
-14
lines changed

spec/AuthenticationAdapters.spec.js

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -1534,7 +1534,7 @@ describe('OTP TOTP auth adatper', () => {
15341534
const token = totp.generate();
15351535
await user.save(
15361536
{ authData: { mfa: { secret: secret.base32, token } } },
1537-
{ sessionToken: user.getSessionToken() }
1537+
{ useMasterKey: true }
15381538
);
15391539
const response = user.get('authDataResponse');
15401540
expect(response.mfa).toBeDefined();
@@ -1557,7 +1557,7 @@ describe('OTP TOTP auth adatper', () => {
15571557
const token = totp.generate();
15581558
await user.save(
15591559
{ authData: { mfa: { secret: secret.base32, token } } },
1560-
{ sessionToken: user.getSessionToken() }
1560+
{ useMasterKey: true }
15611561
);
15621562
const response = await request({
15631563
headers,
@@ -1603,7 +1603,7 @@ describe('OTP TOTP auth adatper', () => {
16031603
const token = totp.generate();
16041604
await user.save(
16051605
{ authData: { mfa: { secret: secret.base32, token } } },
1606-
{ sessionToken: user.getSessionToken() }
1606+
{ useMasterKey: true }
16071607
);
16081608

16091609
const new_secret = new OTPAuth.Secret();
@@ -1618,7 +1618,7 @@ describe('OTP TOTP auth adatper', () => {
16181618
{
16191619
authData: { mfa: { secret: new_secret.base32, token: new_token, old: totp.generate() } },
16201620
},
1621-
{ sessionToken: user.getSessionToken() }
1621+
{ useMasterKey: true }
16221622
);
16231623
await user.fetch({ useMasterKey: true });
16241624
expect(user.get('authData').mfa.secret).toEqual(new_secret.base32);
@@ -1637,7 +1637,7 @@ describe('OTP TOTP auth adatper', () => {
16371637
const token = totp.generate();
16381638
await user.save(
16391639
{ authData: { mfa: { secret: secret.base32, token } } },
1640-
{ sessionToken: user.getSessionToken() }
1640+
{ useMasterKey: true }
16411641
);
16421642

16431643
const new_secret = new OTPAuth.Secret();
@@ -1673,8 +1673,9 @@ describe('OTP TOTP auth adatper', () => {
16731673
const token = totp.generate();
16741674
await user.save(
16751675
{ authData: { mfa: { secret: secret.base32, token } } },
1676-
{ sessionToken: user.getSessionToken() }
1676+
{ useMasterKey: true }
16771677
);
1678+
await user.fetch({ useMasterKey: true });
16781679
await expectAsync(Parse.User.logIn('username', 'password')).toBeRejectedWith(
16791680
new Parse.Error(Parse.Error.OTHER_CAUSE, 'Missing additional authData mfa')
16801681
);
@@ -1693,7 +1694,7 @@ describe('OTP TOTP auth adatper', () => {
16931694
const token = totp.generate();
16941695
await user.save(
16951696
{ authData: { mfa: { secret: secret.base32, token } } },
1696-
{ sessionToken: user.getSessionToken() }
1697+
{ useMasterKey: true }
16971698
);
16981699
await expectAsync(
16991700
request({
@@ -1749,10 +1750,9 @@ describe('OTP SMS auth adatper', () => {
17491750

17501751
it('can enroll', async () => {
17511752
const user = await Parse.User.signUp('username', 'password');
1752-
const sessionToken = user.getSessionToken();
17531753
const spy = spyOn(mfa, 'sendSMS').and.callThrough();
1754-
await user.save({ authData: { mfa: { mobile: '+11111111111' } } }, { sessionToken });
1755-
await user.fetch({ sessionToken });
1754+
await user.save({ authData: { mfa: { mobile: '+11111111111' } } }, { useMasterKey: true });
1755+
await user.fetch({ sessionToken: user.getSessionToken() });
17561756
expect(user.get('authData')).toEqual({ mfa: { status: 'disabled' } });
17571757
expect(spy).toHaveBeenCalledWith(code, '+11111111111');
17581758
await user.fetch({ useMasterKey: true });
@@ -1761,8 +1761,8 @@ describe('OTP SMS auth adatper', () => {
17611761
expect(authData['+11111111111']).toBeDefined();
17621762
expect(Object.keys(authData['+11111111111'])).toEqual(['token', 'expiry']);
17631763

1764-
await user.save({ authData: { mfa: { mobile, token: code } } }, { sessionToken });
1765-
await user.fetch({ sessionToken });
1764+
await user.save({ authData: { mfa: { mobile, token: code } } }, { useMasterKey: true });
1765+
await user.fetch({ sessionToken: user.getSessionToken() });
17661766
expect(user.get('authData')).toEqual({ mfa: { status: 'enabled', type: 'SMS' } });
17671767
});
17681768

@@ -1771,12 +1771,12 @@ describe('OTP SMS auth adatper', () => {
17711771
const spy = spyOn(mfa, 'sendSMS').and.callThrough();
17721772
await user.save(
17731773
{ authData: { mfa: { mobile: '+11111111111' } } },
1774-
{ sessionToken: user.getSessionToken() }
1774+
{ useMasterKey: true }
17751775
);
17761776

17771777
await user.save(
17781778
{ authData: { mfa: { mobile, token: code } } },
1779-
{ sessionToken: user.getSessionToken() }
1779+
{ useMasterKey: true }
17801780
);
17811781

17821782
spy.calls.reset();

0 commit comments

Comments
 (0)