Auth0 Rules used by the Mozilla IAM SSO system. You can find more information about Auth0 at https://www.auth0.com
The rules are snippets of javascript code running as webtasks, which modify the authentication flow of users in Auth0.
master:
The master branch is used for development of rules and are auto-deployed on https://manage-dev.mozilla.auth0.com/
production:
/!\ The production branch is used for deployments to the production Auth0 tenant. Deployment from the production branch to the production tenant is triggered by a manual execution of a CodeBuild job
Rules are deployed with auth0-ci https://github.com/mozilla-iam/auth0-ci after CI has completed.
For testing, this looks like this:
$ python3 -m venv venv
$ source venv/bin/activate
$ pip install -r requirements.txt
$ uploader_rules.py <args>
How do I know which nodejs modules are available to me?
As of July 2021 the production tenant of Auth0 runs node v8.17.0. The module list that is cached inside webtasks is listed here: https://auth0-extensions.github.io/canirequire/
The primary goal is to follow the style of the Auth0 example rules.
This appears to follow the Google JavaScript Style Guide
in some ways as there are trailing semi-colon characters. In other ways the
Auth0 rules do not follow the Google style as some contain var declarations
Try to follow the Google style in the Mozilla rules in this repo.
This is the cycle today. In the future we hopefully add CI driven tests. This cycle could be improved.
Please note that for any large change (i.e. anything but a single rule change), it is recommended to backup the current rules before deploying. You can do this by following the run-book at https://mana.mozilla.org/wiki/display/SECURITY/Create+and+reload+auth0+rules+backup
- Confirm that the head of
mastercontains the same code as is live inauth0-devby doing a diff.- Ensure you've checked out
auth0-ci, created and activated a virtualenv and have acredentials.jsonfile with valid credentials - Ensure your local copy of
auth0-deployis up to date and onmaster - Run
uploader_rules.pyon theauth0-deployrule directory./uploader_rules.py --dry-run --rules-dir ../auth0-deploy/rules - Confirm that no differences are detected between your local code and what's
live in
auth-dev
- Ensure you've checked out
- Create a branch to work in in your local repo
- Write a rule in your local branch of the repo
- Run
uploader_rules.py -r rulesto deploy the uncommitted rule toauth0-dev - Do manual testing in
auth0-devto determine if the rule does what you want - Iterate steps 1-3 until you have a rule that works
- Remove the new rule from
auth0-dev. This could be done by checking out master (which doesn't have the rule) and again runninguploader_rules.py -r rules
- Push your branch to your fork and create a PR with your new rule, requesting a review of the PR.
- Someone reviews the PR, either suggesting changes or approving
- Merge the PR to
master - CI deploys the PR to
auth0-dev- This CI runs in AWS CodeBuild in the
mozilla-iam(320464205386) AWS account in theus-west-2region in the AWS CodeBuild projectauth0-deploy-stage. - The CodeBuild project follows the
buildspec.ymlwhich calls theMakefilewhich calls theuploader_rules.pytool which is installed from theauth0-ciproject.
- This CI runs in AWS CodeBuild in the
- Manually test again in
auth0-devto validate that the rule works. This is the stage to do more thorough testing as this is the last step before production deployment
- If you're unsure if manual changes have been made in the production rules in
Auth0, you do the same kind of comparison we did in dev.
- Checkout the
productionbranch in your local repo - Run
uploader_rules.pyon theauth0-deployrule directory./uploader_rules.py --dry-run --rules-dir ../auth0-deploy/rules - Confirm that no differences are detected between your local code and what's live in production Auth0
- Checkout the
- Switch back to the
masterbranch - If testing validated that your new or changed rule is good, create a second PR from
mastertoproduction, requesting review and referencing, in the text of the PR, the first PR which contains the initial review. Ideally the changes in the first dev PR and this prod PR will be the same and the reviewer can leverage the dev PR's review. If that's not the case a new thorough review would be needed. - During change window, merge the PR. Now you have to manually run the
CodeBuild job
auth0-deploy-prodwhich will deploy the rules to the Auth0 production tenant. You can do this using the AWS cli runningaws codebuild start-build --project-name auth0-deploy-prod, or using the AWS UI console navigating to CodeBuild, choosingauth0-deploy-prod, pressingStart buildand pressing againStart buildin the next screen. Once the job finish successfully, all the rules should be uploaded to Auth0 prod. - Test in prod to make sure everything works and rollback if it doesn't.
HTTP 409 Conflict means that the unique ordering ID stored in a new rule's .json file is not unique across all .json files. Alter the ordering ID in the new rule's .json and try again.
Test are run by GitHub actions on every Pull Request. To run the tests locally, first setup your testing environment.
This is a one time step
cd testsnpm install
Next run the tests
cd testsnpm run tests
The Auth0 web UI where you can view and modify rules, for example at
https://manage-dev.mozilla.auth0.com/dashboard/pi/auth-dev/rules
has a jshint built in which isn't aware that Auth0 rules are run under
Node version 8.17.0 and as a result shows errors for things like
require and let. To work around this add this to the top of your rule
/*jshint esversion: 6 */
The Auth0 web UI where you can view and modify rules, for example at
https://manage-dev.mozilla.auth0.com/dashboard/pi/auth-dev/rules
when you click the Save button, a green banner saying
The rule script has been saved shows up. The content however won't
always be saved and the Save button won't always turn from blue to
gray. If waiting on the page for the async save to complete isn't working
you can click the Save button a second time.