diff --git a/src/Api/Models/Request/Accounts/KdfRequestModel.cs b/src/Api/Models/Request/Accounts/KdfRequestModel.cs index ac920c7dbf..c7410826c9 100644 --- a/src/Api/Models/Request/Accounts/KdfRequestModel.cs +++ b/src/Api/Models/Request/Accounts/KdfRequestModel.cs @@ -10,7 +10,7 @@ public class KdfRequestModel : PasswordRequestModel, IValidatableObject [Required] public int? KdfIterations { get; set; } - public IEnumerable Validate(ValidationContext validationContext) + public override IEnumerable Validate(ValidationContext validationContext) { if (Kdf.HasValue && KdfIterations.HasValue) { diff --git a/src/Api/Models/Request/TwoFactorRequestModels.cs b/src/Api/Models/Request/TwoFactorRequestModels.cs index d7ceeb2f8f..39c9ecaa88 100644 --- a/src/Api/Models/Request/TwoFactorRequestModels.cs +++ b/src/Api/Models/Request/TwoFactorRequestModels.cs @@ -102,7 +102,7 @@ public class UpdateTwoFactorDuoRequestModel : SecretVerificationRequestModel, IV return extistingOrg; } - public IEnumerable Validate(ValidationContext validationContext) + public override IEnumerable Validate(ValidationContext validationContext) { if (!Core.Utilities.Duo.DuoApi.ValidHost(Host)) { @@ -160,7 +160,7 @@ public class UpdateTwoFactorYubicoOtpRequestModel : SecretVerificationRequestMod return keyValue.Substring(0, 12); } - public IEnumerable Validate(ValidationContext validationContext) + public override IEnumerable Validate(ValidationContext validationContext) { if (string.IsNullOrWhiteSpace(Key1) && string.IsNullOrWhiteSpace(Key2) && string.IsNullOrWhiteSpace(Key3) && string.IsNullOrWhiteSpace(Key4) && string.IsNullOrWhiteSpace(Key5)) diff --git a/src/Core/Tokens/DataProtectorTokenFactory.cs b/src/Core/Tokens/DataProtectorTokenFactory.cs index ad703cb585..1f8c2254f3 100644 --- a/src/Core/Tokens/DataProtectorTokenFactory.cs +++ b/src/Core/Tokens/DataProtectorTokenFactory.cs @@ -23,7 +23,6 @@ public class DataProtectorTokenFactory : IDataProtectorTokenFactory where /// Unprotect token /// /// The token to parse - /// The tokenable type to parse to /// The parsed tokenable /// Throws CryptographicException if fails to unprotect public T Unprotect(string token) => diff --git a/src/Core/Utilities/CoreHelpers.cs b/src/Core/Utilities/CoreHelpers.cs index 4878109ce9..b35bf76841 100644 --- a/src/Core/Utilities/CoreHelpers.cs +++ b/src/Core/Utilities/CoreHelpers.cs @@ -27,7 +27,6 @@ public static class CoreHelpers private static readonly DateTime _epoc = new DateTime(1970, 1, 1, 0, 0, 0, DateTimeKind.Utc); private static readonly DateTime _max = new DateTime(9999, 1, 1, 0, 0, 0, DateTimeKind.Utc); private static readonly Random _random = new Random(); - private static string _version; private static readonly string CloudFlareConnectingIp = "CF-Connecting-IP"; private static readonly string RealIp = "X-Real-IP"; diff --git a/src/Core/Utilities/StrictEmailAddressAttribute.cs b/src/Core/Utilities/StrictEmailAddressAttribute.cs index f84e41852d..eeb95093d0 100644 --- a/src/Core/Utilities/StrictEmailAddressAttribute.cs +++ b/src/Core/Utilities/StrictEmailAddressAttribute.cs @@ -31,16 +31,14 @@ public class StrictEmailAddressAttribute : ValidationAttribute return false; } - /** - The regex below is intended to catch edge cases that are not handled by the general parsing check above. - This enforces the following rules: - * Requires ASCII only in the local-part (code points 0-127) - * Requires an @ symbol - * Allows any char in second-level domain name, including unicode and symbols - * Requires at least one period (.) separating SLD from TLD - * Must end in a letter (including unicode) - See the unit tests for examples of what is allowed. - **/ + // The regex below is intended to catch edge cases that are not handled by the general parsing check above. + // This enforces the following rules: + // * Requires ASCII only in the local-part (code points 0-127) + // * Requires an @ symbol + // * Allows any char in second-level domain name, including unicode and symbols + // * Requires at least one period (.) separating SLD from TLD + // * Must end in a letter (including unicode) + // See the unit tests for examples of what is allowed. var emailFormat = @"^[\x00-\x7F]+@.+\.\p{L}+$"; if (!Regex.IsMatch(emailAddress, emailFormat)) { diff --git a/test/Api.IntegrationTest/Controllers/AccountsControllerTests.cs b/test/Api.IntegrationTest/Controllers/AccountsControllerTests.cs index 73c77e091e..16b9f195b6 100644 --- a/test/Api.IntegrationTest/Controllers/AccountsControllerTests.cs +++ b/test/Api.IntegrationTest/Controllers/AccountsControllerTests.cs @@ -25,7 +25,7 @@ public class AccountsControllerTest : IClassFixture var content = await response.Content.ReadFromJsonAsync(); - Assert.NotEmpty(content.Id); + Assert.NotEmpty(content!.Id); Assert.Equal("integration-test@bitwarden.com", content.Email); Assert.Null(content.Name); Assert.False(content.EmailVerified); diff --git a/test/Billing.Test/Controllers/FreshdeskControllerTests.cs b/test/Billing.Test/Controllers/FreshdeskControllerTests.cs index 94f9e28490..354c2db2a6 100644 --- a/test/Billing.Test/Controllers/FreshdeskControllerTests.cs +++ b/test/Billing.Test/Controllers/FreshdeskControllerTests.cs @@ -71,7 +71,7 @@ public class FreshdeskControllerTests return Send(request, cancellationToken); } - public virtual Task Send(HttpRequestMessage request, CancellationToken cancellationToken) + public new virtual Task Send(HttpRequestMessage request, CancellationToken cancellationToken) { throw new NotImplementedException(); } diff --git a/test/Infrastructure.EFIntegration.Test/Repositories/CipherRepositoryTests.cs b/test/Infrastructure.EFIntegration.Test/Repositories/CipherRepositoryTests.cs index e96a2a3b41..2e5bf69ccb 100644 --- a/test/Infrastructure.EFIntegration.Test/Repositories/CipherRepositoryTests.cs +++ b/test/Infrastructure.EFIntegration.Test/Repositories/CipherRepositoryTests.cs @@ -24,14 +24,14 @@ public class CipherRepositoryTests } [CiSkippedTheory, EfUserCipherCustomize, BitAutoData] - public async void UserCipher_CreateAsync_Works_DataMatches(Cipher cipher, User user, Organization org, + public void UserCipher_CreateAsync_Works_DataMatches(Cipher cipher, User user, Organization org, CipherCompare equalityComparer, List suts, List efUserRepos, List efOrgRepos, SqlRepo.CipherRepository sqlCipherRepo, SqlRepo.UserRepository sqlUserRepo, SqlRepo.OrganizationRepository sqlOrgRepo) => CreateAsync_Works_DataMatches( cipher, user, org, equalityComparer, suts, efUserRepos, efOrgRepos, sqlCipherRepo, sqlUserRepo, sqlOrgRepo); [CiSkippedTheory, EfOrganizationCipherCustomize, BitAutoData] - public async void OrganizationCipher_CreateAsync_Works_DataMatches(Cipher cipher, User user, Organization org, + public void OrganizationCipher_CreateAsync_Works_DataMatches(Cipher cipher, User user, Organization org, CipherCompare equalityComparer, List suts, List efUserRepos, List efOrgRepos, SqlRepo.CipherRepository sqlCipherRepo, SqlRepo.UserRepository sqlUserRepo, SqlRepo.OrganizationRepository sqlOrgRepo) => CreateAsync_Works_DataMatches( @@ -177,7 +177,7 @@ public class CipherRepositoryTests List efOrgRepos ) => await DeleteAsync_CipherIsDeleted(cipher, user, org, suts, efUserRepos, efOrgRepos); [CiSkippedTheory, EfOrganizationCipherCustomize, BitAutoData] - public async Task OrganizationCipher_DeleteAsync_CipherIsDeleted( + public Task OrganizationCipher_DeleteAsync_CipherIsDeleted( Cipher cipher, User user, Organization org,