mirror of
https://github.com/bitwarden/server.git
synced 2025-04-05 13:08:17 -05:00
Merge branch 'main' into brant/add-repositories-organization-integration-configuration
This commit is contained in:
commit
0ddc8d42bb
@ -16,6 +16,7 @@ using Bit.Core.Services;
|
|||||||
using Bit.Core.Settings;
|
using Bit.Core.Settings;
|
||||||
using Bit.Core.Tools.Services;
|
using Bit.Core.Tools.Services;
|
||||||
using Bit.Core.Utilities;
|
using Bit.Core.Utilities;
|
||||||
|
using Bit.Core.Vault.Authorization.Permissions;
|
||||||
using Bit.Core.Vault.Entities;
|
using Bit.Core.Vault.Entities;
|
||||||
using Bit.Core.Vault.Models.Data;
|
using Bit.Core.Vault.Models.Data;
|
||||||
using Bit.Core.Vault.Queries;
|
using Bit.Core.Vault.Queries;
|
||||||
@ -345,6 +346,77 @@ public class CiphersController : Controller
|
|||||||
return await CanEditCiphersAsync(organizationId, cipherIds);
|
return await CanEditCiphersAsync(organizationId, cipherIds);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
private async Task<bool> CanDeleteOrRestoreCipherAsAdminAsync(Guid organizationId, IEnumerable<Guid> cipherIds)
|
||||||
|
{
|
||||||
|
if (!_featureService.IsEnabled(FeatureFlagKeys.LimitItemDeletion))
|
||||||
|
{
|
||||||
|
return await CanEditCipherAsAdminAsync(organizationId, cipherIds);
|
||||||
|
}
|
||||||
|
|
||||||
|
var org = _currentContext.GetOrganization(organizationId);
|
||||||
|
|
||||||
|
// If we're not an "admin", we don't need to check the ciphers
|
||||||
|
if (org is not ({ Type: OrganizationUserType.Owner or OrganizationUserType.Admin } or { Permissions.EditAnyCollection: true }))
|
||||||
|
{
|
||||||
|
// Are we a provider user? If so, we need to be sure we're not restricted
|
||||||
|
// Once the feature flag is removed, this check can be combined with the above
|
||||||
|
if (await _currentContext.ProviderUserForOrgAsync(organizationId))
|
||||||
|
{
|
||||||
|
// Provider is restricted from editing ciphers, so we're not an "admin"
|
||||||
|
if (_featureService.IsEnabled(FeatureFlagKeys.RestrictProviderAccess))
|
||||||
|
{
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
// Provider is unrestricted, so we're an "admin", don't return early
|
||||||
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
|
// Not a provider or admin
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// If the user can edit all ciphers for the organization, just check they all belong to the org
|
||||||
|
if (await CanEditAllCiphersAsync(organizationId))
|
||||||
|
{
|
||||||
|
// TODO: This can likely be optimized to only query the requested ciphers and then checking they belong to the org
|
||||||
|
var orgCiphers = (await _cipherRepository.GetManyByOrganizationIdAsync(organizationId)).ToDictionary(c => c.Id);
|
||||||
|
|
||||||
|
// Ensure all requested ciphers are in orgCiphers
|
||||||
|
return cipherIds.All(c => orgCiphers.ContainsKey(c));
|
||||||
|
}
|
||||||
|
|
||||||
|
// The user cannot access any ciphers for the organization, we're done
|
||||||
|
if (!await CanAccessOrganizationCiphersAsync(organizationId))
|
||||||
|
{
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
var user = await _userService.GetUserByPrincipalAsync(User);
|
||||||
|
// Select all deletable ciphers for this user belonging to the organization
|
||||||
|
var deletableOrgCipherList = (await _cipherRepository.GetManyByUserIdAsync(user.Id, true))
|
||||||
|
.Where(c => c.OrganizationId == organizationId && c.UserId == null).ToList();
|
||||||
|
|
||||||
|
// Special case for unassigned ciphers
|
||||||
|
if (await CanAccessUnassignedCiphersAsync(organizationId))
|
||||||
|
{
|
||||||
|
var unassignedCiphers =
|
||||||
|
(await _cipherRepository.GetManyUnassignedOrganizationDetailsByOrganizationIdAsync(
|
||||||
|
organizationId));
|
||||||
|
|
||||||
|
// Users that can access unassigned ciphers can also delete them
|
||||||
|
deletableOrgCipherList.AddRange(unassignedCiphers.Select(c => new CipherDetails(c) { Manage = true }));
|
||||||
|
}
|
||||||
|
|
||||||
|
var organizationAbility = await _applicationCacheService.GetOrganizationAbilityAsync(organizationId);
|
||||||
|
var deletableOrgCiphers = deletableOrgCipherList
|
||||||
|
.Where(c => NormalCipherPermissions.CanDelete(user, c, organizationAbility))
|
||||||
|
.ToDictionary(c => c.Id);
|
||||||
|
|
||||||
|
return cipherIds.All(c => deletableOrgCiphers.ContainsKey(c));
|
||||||
|
}
|
||||||
|
|
||||||
/// <summary>
|
/// <summary>
|
||||||
/// TODO: Move this to its own authorization handler or equivalent service - AC-2062
|
/// TODO: Move this to its own authorization handler or equivalent service - AC-2062
|
||||||
/// </summary>
|
/// </summary>
|
||||||
@ -763,12 +835,12 @@ public class CiphersController : Controller
|
|||||||
|
|
||||||
[HttpDelete("{id}/admin")]
|
[HttpDelete("{id}/admin")]
|
||||||
[HttpPost("{id}/delete-admin")]
|
[HttpPost("{id}/delete-admin")]
|
||||||
public async Task DeleteAdmin(string id)
|
public async Task DeleteAdmin(Guid id)
|
||||||
{
|
{
|
||||||
var userId = _userService.GetProperUserId(User).Value;
|
var userId = _userService.GetProperUserId(User).Value;
|
||||||
var cipher = await _cipherRepository.GetByIdAsync(new Guid(id));
|
var cipher = await GetByIdAsync(id, userId);
|
||||||
if (cipher == null || !cipher.OrganizationId.HasValue ||
|
if (cipher == null || !cipher.OrganizationId.HasValue ||
|
||||||
!await CanEditCipherAsAdminAsync(cipher.OrganizationId.Value, new[] { cipher.Id }))
|
!await CanDeleteOrRestoreCipherAsAdminAsync(cipher.OrganizationId.Value, new[] { cipher.Id }))
|
||||||
{
|
{
|
||||||
throw new NotFoundException();
|
throw new NotFoundException();
|
||||||
}
|
}
|
||||||
@ -808,7 +880,7 @@ public class CiphersController : Controller
|
|||||||
var cipherIds = model.Ids.Select(i => new Guid(i)).ToList();
|
var cipherIds = model.Ids.Select(i => new Guid(i)).ToList();
|
||||||
|
|
||||||
if (string.IsNullOrWhiteSpace(model.OrganizationId) ||
|
if (string.IsNullOrWhiteSpace(model.OrganizationId) ||
|
||||||
!await CanEditCipherAsAdminAsync(new Guid(model.OrganizationId), cipherIds))
|
!await CanDeleteOrRestoreCipherAsAdminAsync(new Guid(model.OrganizationId), cipherIds))
|
||||||
{
|
{
|
||||||
throw new NotFoundException();
|
throw new NotFoundException();
|
||||||
}
|
}
|
||||||
@ -830,12 +902,12 @@ public class CiphersController : Controller
|
|||||||
}
|
}
|
||||||
|
|
||||||
[HttpPut("{id}/delete-admin")]
|
[HttpPut("{id}/delete-admin")]
|
||||||
public async Task PutDeleteAdmin(string id)
|
public async Task PutDeleteAdmin(Guid id)
|
||||||
{
|
{
|
||||||
var userId = _userService.GetProperUserId(User).Value;
|
var userId = _userService.GetProperUserId(User).Value;
|
||||||
var cipher = await _cipherRepository.GetByIdAsync(new Guid(id));
|
var cipher = await GetByIdAsync(id, userId);
|
||||||
if (cipher == null || !cipher.OrganizationId.HasValue ||
|
if (cipher == null || !cipher.OrganizationId.HasValue ||
|
||||||
!await CanEditCipherAsAdminAsync(cipher.OrganizationId.Value, new[] { cipher.Id }))
|
!await CanDeleteOrRestoreCipherAsAdminAsync(cipher.OrganizationId.Value, new[] { cipher.Id }))
|
||||||
{
|
{
|
||||||
throw new NotFoundException();
|
throw new NotFoundException();
|
||||||
}
|
}
|
||||||
@ -871,7 +943,7 @@ public class CiphersController : Controller
|
|||||||
var cipherIds = model.Ids.Select(i => new Guid(i)).ToList();
|
var cipherIds = model.Ids.Select(i => new Guid(i)).ToList();
|
||||||
|
|
||||||
if (string.IsNullOrWhiteSpace(model.OrganizationId) ||
|
if (string.IsNullOrWhiteSpace(model.OrganizationId) ||
|
||||||
!await CanEditCipherAsAdminAsync(new Guid(model.OrganizationId), cipherIds))
|
!await CanDeleteOrRestoreCipherAsAdminAsync(new Guid(model.OrganizationId), cipherIds))
|
||||||
{
|
{
|
||||||
throw new NotFoundException();
|
throw new NotFoundException();
|
||||||
}
|
}
|
||||||
@ -899,12 +971,12 @@ public class CiphersController : Controller
|
|||||||
}
|
}
|
||||||
|
|
||||||
[HttpPut("{id}/restore-admin")]
|
[HttpPut("{id}/restore-admin")]
|
||||||
public async Task<CipherMiniResponseModel> PutRestoreAdmin(string id)
|
public async Task<CipherMiniResponseModel> PutRestoreAdmin(Guid id)
|
||||||
{
|
{
|
||||||
var userId = _userService.GetProperUserId(User).Value;
|
var userId = _userService.GetProperUserId(User).Value;
|
||||||
var cipher = await _cipherRepository.GetOrganizationDetailsByIdAsync(new Guid(id));
|
var cipher = await GetByIdAsync(id, userId);
|
||||||
if (cipher == null || !cipher.OrganizationId.HasValue ||
|
if (cipher == null || !cipher.OrganizationId.HasValue ||
|
||||||
!await CanEditCipherAsAdminAsync(cipher.OrganizationId.Value, new[] { cipher.Id }))
|
!await CanDeleteOrRestoreCipherAsAdminAsync(cipher.OrganizationId.Value, new[] { cipher.Id }))
|
||||||
{
|
{
|
||||||
throw new NotFoundException();
|
throw new NotFoundException();
|
||||||
}
|
}
|
||||||
@ -944,7 +1016,7 @@ public class CiphersController : Controller
|
|||||||
|
|
||||||
var cipherIdsToRestore = new HashSet<Guid>(model.Ids.Select(i => new Guid(i)));
|
var cipherIdsToRestore = new HashSet<Guid>(model.Ids.Select(i => new Guid(i)));
|
||||||
|
|
||||||
if (model.OrganizationId == default || !await CanEditCipherAsAdminAsync(model.OrganizationId, cipherIdsToRestore))
|
if (model.OrganizationId == default || !await CanDeleteOrRestoreCipherAsAdminAsync(model.OrganizationId, cipherIdsToRestore))
|
||||||
{
|
{
|
||||||
throw new NotFoundException();
|
throw new NotFoundException();
|
||||||
}
|
}
|
||||||
|
@ -287,12 +287,6 @@ public class AuthRequestService : IAuthRequestService
|
|||||||
|
|
||||||
private async Task NotifyAdminsOfDeviceApprovalRequestAsync(OrganizationUser organizationUser, User user)
|
private async Task NotifyAdminsOfDeviceApprovalRequestAsync(OrganizationUser organizationUser, User user)
|
||||||
{
|
{
|
||||||
if (!_featureService.IsEnabled(FeatureFlagKeys.DeviceApprovalRequestAdminNotifications))
|
|
||||||
{
|
|
||||||
_logger.LogWarning("Skipped sending device approval notification to admins - feature flag disabled");
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
|
|
||||||
var adminEmails = await GetAdminAndAccountRecoveryEmailsAsync(organizationUser.OrganizationId);
|
var adminEmails = await GetAdminAndAccountRecoveryEmailsAsync(organizationUser.OrganizationId);
|
||||||
|
|
||||||
await _mailService.SendDeviceApprovalRequestedNotificationEmailAsync(
|
await _mailService.SendDeviceApprovalRequestedNotificationEmailAsync(
|
||||||
|
@ -15,7 +15,7 @@ public interface ICipherService
|
|||||||
long requestLength, Guid savingUserId, bool orgAdmin = false);
|
long requestLength, Guid savingUserId, bool orgAdmin = false);
|
||||||
Task CreateAttachmentShareAsync(Cipher cipher, Stream stream, string fileName, string key, long requestLength,
|
Task CreateAttachmentShareAsync(Cipher cipher, Stream stream, string fileName, string key, long requestLength,
|
||||||
string attachmentId, Guid organizationShareId);
|
string attachmentId, Guid organizationShareId);
|
||||||
Task DeleteAsync(Cipher cipher, Guid deletingUserId, bool orgAdmin = false);
|
Task DeleteAsync(CipherDetails cipherDetails, Guid deletingUserId, bool orgAdmin = false);
|
||||||
Task DeleteManyAsync(IEnumerable<Guid> cipherIds, Guid deletingUserId, Guid? organizationId = null, bool orgAdmin = false);
|
Task DeleteManyAsync(IEnumerable<Guid> cipherIds, Guid deletingUserId, Guid? organizationId = null, bool orgAdmin = false);
|
||||||
Task<DeleteAttachmentResponseData> DeleteAttachmentAsync(Cipher cipher, string attachmentId, Guid deletingUserId, bool orgAdmin = false);
|
Task<DeleteAttachmentResponseData> DeleteAttachmentAsync(Cipher cipher, string attachmentId, Guid deletingUserId, bool orgAdmin = false);
|
||||||
Task PurgeAsync(Guid organizationId);
|
Task PurgeAsync(Guid organizationId);
|
||||||
@ -27,9 +27,9 @@ public interface ICipherService
|
|||||||
Task ShareManyAsync(IEnumerable<(Cipher cipher, DateTime? lastKnownRevisionDate)> ciphers, Guid organizationId,
|
Task ShareManyAsync(IEnumerable<(Cipher cipher, DateTime? lastKnownRevisionDate)> ciphers, Guid organizationId,
|
||||||
IEnumerable<Guid> collectionIds, Guid sharingUserId);
|
IEnumerable<Guid> collectionIds, Guid sharingUserId);
|
||||||
Task SaveCollectionsAsync(Cipher cipher, IEnumerable<Guid> collectionIds, Guid savingUserId, bool orgAdmin);
|
Task SaveCollectionsAsync(Cipher cipher, IEnumerable<Guid> collectionIds, Guid savingUserId, bool orgAdmin);
|
||||||
Task SoftDeleteAsync(Cipher cipher, Guid deletingUserId, bool orgAdmin = false);
|
Task SoftDeleteAsync(CipherDetails cipherDetails, Guid deletingUserId, bool orgAdmin = false);
|
||||||
Task SoftDeleteManyAsync(IEnumerable<Guid> cipherIds, Guid deletingUserId, Guid? organizationId = null, bool orgAdmin = false);
|
Task SoftDeleteManyAsync(IEnumerable<Guid> cipherIds, Guid deletingUserId, Guid? organizationId = null, bool orgAdmin = false);
|
||||||
Task RestoreAsync(Cipher cipher, Guid restoringUserId, bool orgAdmin = false);
|
Task RestoreAsync(CipherDetails cipherDetails, Guid restoringUserId, bool orgAdmin = false);
|
||||||
Task<ICollection<CipherOrganizationDetails>> RestoreManyAsync(IEnumerable<Guid> cipherIds, Guid restoringUserId, Guid? organizationId = null, bool orgAdmin = false);
|
Task<ICollection<CipherOrganizationDetails>> RestoreManyAsync(IEnumerable<Guid> cipherIds, Guid restoringUserId, Guid? organizationId = null, bool orgAdmin = false);
|
||||||
Task UploadFileForExistingAttachmentAsync(Stream stream, Cipher cipher, CipherAttachment.MetaData attachmentId);
|
Task UploadFileForExistingAttachmentAsync(Stream stream, Cipher cipher, CipherAttachment.MetaData attachmentId);
|
||||||
Task<AttachmentResponseData> GetAttachmentDownloadDataAsync(Cipher cipher, string attachmentId);
|
Task<AttachmentResponseData> GetAttachmentDownloadDataAsync(Cipher cipher, string attachmentId);
|
||||||
|
@ -14,6 +14,7 @@ using Bit.Core.Tools.Enums;
|
|||||||
using Bit.Core.Tools.Models.Business;
|
using Bit.Core.Tools.Models.Business;
|
||||||
using Bit.Core.Tools.Services;
|
using Bit.Core.Tools.Services;
|
||||||
using Bit.Core.Utilities;
|
using Bit.Core.Utilities;
|
||||||
|
using Bit.Core.Vault.Authorization.Permissions;
|
||||||
using Bit.Core.Vault.Entities;
|
using Bit.Core.Vault.Entities;
|
||||||
using Bit.Core.Vault.Enums;
|
using Bit.Core.Vault.Enums;
|
||||||
using Bit.Core.Vault.Models.Data;
|
using Bit.Core.Vault.Models.Data;
|
||||||
@ -44,6 +45,7 @@ public class CipherService : ICipherService
|
|||||||
private readonly ICurrentContext _currentContext;
|
private readonly ICurrentContext _currentContext;
|
||||||
private readonly IGetCipherPermissionsForUserQuery _getCipherPermissionsForUserQuery;
|
private readonly IGetCipherPermissionsForUserQuery _getCipherPermissionsForUserQuery;
|
||||||
private readonly IPolicyRequirementQuery _policyRequirementQuery;
|
private readonly IPolicyRequirementQuery _policyRequirementQuery;
|
||||||
|
private readonly IApplicationCacheService _applicationCacheService;
|
||||||
private readonly IFeatureService _featureService;
|
private readonly IFeatureService _featureService;
|
||||||
|
|
||||||
public CipherService(
|
public CipherService(
|
||||||
@ -64,6 +66,7 @@ public class CipherService : ICipherService
|
|||||||
ICurrentContext currentContext,
|
ICurrentContext currentContext,
|
||||||
IGetCipherPermissionsForUserQuery getCipherPermissionsForUserQuery,
|
IGetCipherPermissionsForUserQuery getCipherPermissionsForUserQuery,
|
||||||
IPolicyRequirementQuery policyRequirementQuery,
|
IPolicyRequirementQuery policyRequirementQuery,
|
||||||
|
IApplicationCacheService applicationCacheService,
|
||||||
IFeatureService featureService)
|
IFeatureService featureService)
|
||||||
{
|
{
|
||||||
_cipherRepository = cipherRepository;
|
_cipherRepository = cipherRepository;
|
||||||
@ -83,6 +86,7 @@ public class CipherService : ICipherService
|
|||||||
_currentContext = currentContext;
|
_currentContext = currentContext;
|
||||||
_getCipherPermissionsForUserQuery = getCipherPermissionsForUserQuery;
|
_getCipherPermissionsForUserQuery = getCipherPermissionsForUserQuery;
|
||||||
_policyRequirementQuery = policyRequirementQuery;
|
_policyRequirementQuery = policyRequirementQuery;
|
||||||
|
_applicationCacheService = applicationCacheService;
|
||||||
_featureService = featureService;
|
_featureService = featureService;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -421,19 +425,19 @@ public class CipherService : ICipherService
|
|||||||
return response;
|
return response;
|
||||||
}
|
}
|
||||||
|
|
||||||
public async Task DeleteAsync(Cipher cipher, Guid deletingUserId, bool orgAdmin = false)
|
public async Task DeleteAsync(CipherDetails cipherDetails, Guid deletingUserId, bool orgAdmin = false)
|
||||||
{
|
{
|
||||||
if (!orgAdmin && !(await UserCanEditAsync(cipher, deletingUserId)))
|
if (!orgAdmin && !await UserCanDeleteAsync(cipherDetails, deletingUserId))
|
||||||
{
|
{
|
||||||
throw new BadRequestException("You do not have permissions to delete this.");
|
throw new BadRequestException("You do not have permissions to delete this.");
|
||||||
}
|
}
|
||||||
|
|
||||||
await _cipherRepository.DeleteAsync(cipher);
|
await _cipherRepository.DeleteAsync(cipherDetails);
|
||||||
await _attachmentStorageService.DeleteAttachmentsForCipherAsync(cipher.Id);
|
await _attachmentStorageService.DeleteAttachmentsForCipherAsync(cipherDetails.Id);
|
||||||
await _eventService.LogCipherEventAsync(cipher, EventType.Cipher_Deleted);
|
await _eventService.LogCipherEventAsync(cipherDetails, EventType.Cipher_Deleted);
|
||||||
|
|
||||||
// push
|
// push
|
||||||
await _pushService.PushSyncCipherDeleteAsync(cipher);
|
await _pushService.PushSyncCipherDeleteAsync(cipherDetails);
|
||||||
}
|
}
|
||||||
|
|
||||||
public async Task DeleteManyAsync(IEnumerable<Guid> cipherIds, Guid deletingUserId, Guid? organizationId = null, bool orgAdmin = false)
|
public async Task DeleteManyAsync(IEnumerable<Guid> cipherIds, Guid deletingUserId, Guid? organizationId = null, bool orgAdmin = false)
|
||||||
@ -450,8 +454,8 @@ public class CipherService : ICipherService
|
|||||||
else
|
else
|
||||||
{
|
{
|
||||||
var ciphers = await _cipherRepository.GetManyByUserIdAsync(deletingUserId);
|
var ciphers = await _cipherRepository.GetManyByUserIdAsync(deletingUserId);
|
||||||
deletingCiphers = ciphers.Where(c => cipherIdsSet.Contains(c.Id) && c.Edit).Select(x => (Cipher)x).ToList();
|
var filteredCiphers = await FilterCiphersByDeletePermission(ciphers, cipherIdsSet, deletingUserId);
|
||||||
|
deletingCiphers = filteredCiphers.Select(c => (Cipher)c).ToList();
|
||||||
await _cipherRepository.DeleteAsync(deletingCiphers.Select(c => c.Id), deletingUserId);
|
await _cipherRepository.DeleteAsync(deletingCiphers.Select(c => c.Id), deletingUserId);
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -703,33 +707,26 @@ public class CipherService : ICipherService
|
|||||||
await _pushService.PushSyncCipherUpdateAsync(cipher, collectionIds);
|
await _pushService.PushSyncCipherUpdateAsync(cipher, collectionIds);
|
||||||
}
|
}
|
||||||
|
|
||||||
public async Task SoftDeleteAsync(Cipher cipher, Guid deletingUserId, bool orgAdmin = false)
|
public async Task SoftDeleteAsync(CipherDetails cipherDetails, Guid deletingUserId, bool orgAdmin = false)
|
||||||
{
|
{
|
||||||
if (!orgAdmin && !(await UserCanEditAsync(cipher, deletingUserId)))
|
if (!orgAdmin && !await UserCanDeleteAsync(cipherDetails, deletingUserId))
|
||||||
{
|
{
|
||||||
throw new BadRequestException("You do not have permissions to soft delete this.");
|
throw new BadRequestException("You do not have permissions to soft delete this.");
|
||||||
}
|
}
|
||||||
|
|
||||||
if (cipher.DeletedDate.HasValue)
|
if (cipherDetails.DeletedDate.HasValue)
|
||||||
{
|
{
|
||||||
// Already soft-deleted, we can safely ignore this
|
// Already soft-deleted, we can safely ignore this
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
cipher.DeletedDate = cipher.RevisionDate = DateTime.UtcNow;
|
cipherDetails.DeletedDate = cipherDetails.RevisionDate = DateTime.UtcNow;
|
||||||
|
|
||||||
if (cipher is CipherDetails details)
|
await _cipherRepository.UpsertAsync(cipherDetails);
|
||||||
{
|
await _eventService.LogCipherEventAsync(cipherDetails, EventType.Cipher_SoftDeleted);
|
||||||
await _cipherRepository.UpsertAsync(details);
|
|
||||||
}
|
|
||||||
else
|
|
||||||
{
|
|
||||||
await _cipherRepository.UpsertAsync(cipher);
|
|
||||||
}
|
|
||||||
await _eventService.LogCipherEventAsync(cipher, EventType.Cipher_SoftDeleted);
|
|
||||||
|
|
||||||
// push
|
// push
|
||||||
await _pushService.PushSyncCipherUpdateAsync(cipher, null);
|
await _pushService.PushSyncCipherUpdateAsync(cipherDetails, null);
|
||||||
}
|
}
|
||||||
|
|
||||||
public async Task SoftDeleteManyAsync(IEnumerable<Guid> cipherIds, Guid deletingUserId, Guid? organizationId, bool orgAdmin)
|
public async Task SoftDeleteManyAsync(IEnumerable<Guid> cipherIds, Guid deletingUserId, Guid? organizationId, bool orgAdmin)
|
||||||
@ -746,8 +743,8 @@ public class CipherService : ICipherService
|
|||||||
else
|
else
|
||||||
{
|
{
|
||||||
var ciphers = await _cipherRepository.GetManyByUserIdAsync(deletingUserId);
|
var ciphers = await _cipherRepository.GetManyByUserIdAsync(deletingUserId);
|
||||||
deletingCiphers = ciphers.Where(c => cipherIdsSet.Contains(c.Id) && c.Edit).Select(x => (Cipher)x).ToList();
|
var filteredCiphers = await FilterCiphersByDeletePermission(ciphers, cipherIdsSet, deletingUserId);
|
||||||
|
deletingCiphers = filteredCiphers.Select(c => (Cipher)c).ToList();
|
||||||
await _cipherRepository.SoftDeleteAsync(deletingCiphers.Select(c => c.Id), deletingUserId);
|
await _cipherRepository.SoftDeleteAsync(deletingCiphers.Select(c => c.Id), deletingUserId);
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -762,34 +759,27 @@ public class CipherService : ICipherService
|
|||||||
await _pushService.PushSyncCiphersAsync(deletingUserId);
|
await _pushService.PushSyncCiphersAsync(deletingUserId);
|
||||||
}
|
}
|
||||||
|
|
||||||
public async Task RestoreAsync(Cipher cipher, Guid restoringUserId, bool orgAdmin = false)
|
public async Task RestoreAsync(CipherDetails cipherDetails, Guid restoringUserId, bool orgAdmin = false)
|
||||||
{
|
{
|
||||||
if (!orgAdmin && !(await UserCanEditAsync(cipher, restoringUserId)))
|
if (!orgAdmin && !await UserCanRestoreAsync(cipherDetails, restoringUserId))
|
||||||
{
|
{
|
||||||
throw new BadRequestException("You do not have permissions to delete this.");
|
throw new BadRequestException("You do not have permissions to delete this.");
|
||||||
}
|
}
|
||||||
|
|
||||||
if (!cipher.DeletedDate.HasValue)
|
if (!cipherDetails.DeletedDate.HasValue)
|
||||||
{
|
{
|
||||||
// Already restored, we can safely ignore this
|
// Already restored, we can safely ignore this
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
cipher.DeletedDate = null;
|
cipherDetails.DeletedDate = null;
|
||||||
cipher.RevisionDate = DateTime.UtcNow;
|
cipherDetails.RevisionDate = DateTime.UtcNow;
|
||||||
|
|
||||||
if (cipher is CipherDetails details)
|
await _cipherRepository.UpsertAsync(cipherDetails);
|
||||||
{
|
await _eventService.LogCipherEventAsync(cipherDetails, EventType.Cipher_Restored);
|
||||||
await _cipherRepository.UpsertAsync(details);
|
|
||||||
}
|
|
||||||
else
|
|
||||||
{
|
|
||||||
await _cipherRepository.UpsertAsync(cipher);
|
|
||||||
}
|
|
||||||
await _eventService.LogCipherEventAsync(cipher, EventType.Cipher_Restored);
|
|
||||||
|
|
||||||
// push
|
// push
|
||||||
await _pushService.PushSyncCipherUpdateAsync(cipher, null);
|
await _pushService.PushSyncCipherUpdateAsync(cipherDetails, null);
|
||||||
}
|
}
|
||||||
|
|
||||||
public async Task<ICollection<CipherOrganizationDetails>> RestoreManyAsync(IEnumerable<Guid> cipherIds, Guid restoringUserId, Guid? organizationId = null, bool orgAdmin = false)
|
public async Task<ICollection<CipherOrganizationDetails>> RestoreManyAsync(IEnumerable<Guid> cipherIds, Guid restoringUserId, Guid? organizationId = null, bool orgAdmin = false)
|
||||||
@ -812,8 +802,8 @@ public class CipherService : ICipherService
|
|||||||
else
|
else
|
||||||
{
|
{
|
||||||
var ciphers = await _cipherRepository.GetManyByUserIdAsync(restoringUserId);
|
var ciphers = await _cipherRepository.GetManyByUserIdAsync(restoringUserId);
|
||||||
restoringCiphers = ciphers.Where(c => cipherIdsSet.Contains(c.Id) && c.Edit).Select(c => (CipherOrganizationDetails)c).ToList();
|
var filteredCiphers = await FilterCiphersByDeletePermission(ciphers, cipherIdsSet, restoringUserId);
|
||||||
|
restoringCiphers = filteredCiphers.Select(c => (CipherOrganizationDetails)c).ToList();
|
||||||
revisionDate = await _cipherRepository.RestoreAsync(restoringCiphers.Select(c => c.Id), restoringUserId);
|
revisionDate = await _cipherRepository.RestoreAsync(restoringCiphers.Select(c => c.Id), restoringUserId);
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -844,6 +834,34 @@ public class CipherService : ICipherService
|
|||||||
return await _cipherRepository.GetCanEditByIdAsync(userId, cipher.Id);
|
return await _cipherRepository.GetCanEditByIdAsync(userId, cipher.Id);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
private async Task<bool> UserCanDeleteAsync(CipherDetails cipher, Guid userId)
|
||||||
|
{
|
||||||
|
if (!_featureService.IsEnabled(FeatureFlagKeys.LimitItemDeletion))
|
||||||
|
{
|
||||||
|
return await UserCanEditAsync(cipher, userId);
|
||||||
|
}
|
||||||
|
|
||||||
|
var user = await _userService.GetUserByIdAsync(userId);
|
||||||
|
var organizationAbility = cipher.OrganizationId.HasValue ?
|
||||||
|
await _applicationCacheService.GetOrganizationAbilityAsync(cipher.OrganizationId.Value) : null;
|
||||||
|
|
||||||
|
return NormalCipherPermissions.CanDelete(user, cipher, organizationAbility);
|
||||||
|
}
|
||||||
|
|
||||||
|
private async Task<bool> UserCanRestoreAsync(CipherDetails cipher, Guid userId)
|
||||||
|
{
|
||||||
|
if (!_featureService.IsEnabled(FeatureFlagKeys.LimitItemDeletion))
|
||||||
|
{
|
||||||
|
return await UserCanEditAsync(cipher, userId);
|
||||||
|
}
|
||||||
|
|
||||||
|
var user = await _userService.GetUserByIdAsync(userId);
|
||||||
|
var organizationAbility = cipher.OrganizationId.HasValue ?
|
||||||
|
await _applicationCacheService.GetOrganizationAbilityAsync(cipher.OrganizationId.Value) : null;
|
||||||
|
|
||||||
|
return NormalCipherPermissions.CanRestore(user, cipher, organizationAbility);
|
||||||
|
}
|
||||||
|
|
||||||
private void ValidateCipherLastKnownRevisionDateAsync(Cipher cipher, DateTime? lastKnownRevisionDate)
|
private void ValidateCipherLastKnownRevisionDateAsync(Cipher cipher, DateTime? lastKnownRevisionDate)
|
||||||
{
|
{
|
||||||
if (cipher.Id == default || !lastKnownRevisionDate.HasValue)
|
if (cipher.Id == default || !lastKnownRevisionDate.HasValue)
|
||||||
@ -1010,4 +1028,35 @@ public class CipherService : ICipherService
|
|||||||
cipher.Data = JsonSerializer.Serialize(newCipherData);
|
cipher.Data = JsonSerializer.Serialize(newCipherData);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// This method is used to filter ciphers based on the user's permissions to delete them.
|
||||||
|
// It supports both the old and new logic depending on the feature flag.
|
||||||
|
private async Task<List<T>> FilterCiphersByDeletePermission<T>(
|
||||||
|
IEnumerable<T> ciphers,
|
||||||
|
HashSet<Guid> cipherIdsSet,
|
||||||
|
Guid userId) where T : CipherDetails
|
||||||
|
{
|
||||||
|
if (!_featureService.IsEnabled(FeatureFlagKeys.LimitItemDeletion))
|
||||||
|
{
|
||||||
|
return ciphers.Where(c => cipherIdsSet.Contains(c.Id) && c.Edit).ToList();
|
||||||
|
}
|
||||||
|
|
||||||
|
var user = await _userService.GetUserByIdAsync(userId);
|
||||||
|
var organizationAbilities = await _applicationCacheService.GetOrganizationAbilitiesAsync();
|
||||||
|
|
||||||
|
var filteredCiphers = ciphers
|
||||||
|
.Where(c => cipherIdsSet.Contains(c.Id))
|
||||||
|
.GroupBy(c => c.OrganizationId)
|
||||||
|
.SelectMany(group =>
|
||||||
|
{
|
||||||
|
var organizationAbility = group.Key.HasValue &&
|
||||||
|
organizationAbilities.TryGetValue(group.Key.Value, out var ability) ?
|
||||||
|
ability : null;
|
||||||
|
|
||||||
|
return group.Where(c => NormalCipherPermissions.CanDelete(user, c, organizationAbility));
|
||||||
|
})
|
||||||
|
.ToList();
|
||||||
|
|
||||||
|
return filteredCiphers;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
File diff suppressed because it is too large
Load Diff
@ -273,78 +273,7 @@ public class AuthRequestServiceTests
|
|||||||
/// each of them.
|
/// each of them.
|
||||||
/// </summary>
|
/// </summary>
|
||||||
[Theory, BitAutoData]
|
[Theory, BitAutoData]
|
||||||
public async Task CreateAuthRequestAsync_AdminApproval_CreatesForEachOrganization(
|
public async Task CreateAuthRequestAsync_AdminApproval_CreatesForEachOrganization_SendsEmails(
|
||||||
SutProvider<AuthRequestService> sutProvider,
|
|
||||||
AuthRequestCreateRequestModel createModel,
|
|
||||||
User user,
|
|
||||||
OrganizationUser organizationUser1,
|
|
||||||
OrganizationUser organizationUser2)
|
|
||||||
{
|
|
||||||
createModel.Type = AuthRequestType.AdminApproval;
|
|
||||||
user.Email = createModel.Email;
|
|
||||||
organizationUser1.UserId = user.Id;
|
|
||||||
organizationUser2.UserId = user.Id;
|
|
||||||
|
|
||||||
sutProvider.GetDependency<IUserRepository>()
|
|
||||||
.GetByEmailAsync(user.Email)
|
|
||||||
.Returns(user);
|
|
||||||
|
|
||||||
sutProvider.GetDependency<ICurrentContext>()
|
|
||||||
.DeviceType
|
|
||||||
.Returns(DeviceType.ChromeExtension);
|
|
||||||
|
|
||||||
sutProvider.GetDependency<ICurrentContext>()
|
|
||||||
.UserId
|
|
||||||
.Returns(user.Id);
|
|
||||||
|
|
||||||
sutProvider.GetDependency<IGlobalSettings>()
|
|
||||||
.PasswordlessAuth.KnownDevicesOnly
|
|
||||||
.Returns(false);
|
|
||||||
|
|
||||||
|
|
||||||
sutProvider.GetDependency<IOrganizationUserRepository>()
|
|
||||||
.GetManyByUserAsync(user.Id)
|
|
||||||
.Returns(new List<OrganizationUser>
|
|
||||||
{
|
|
||||||
organizationUser1,
|
|
||||||
organizationUser2,
|
|
||||||
});
|
|
||||||
|
|
||||||
sutProvider.GetDependency<IAuthRequestRepository>()
|
|
||||||
.CreateAsync(Arg.Any<AuthRequest>())
|
|
||||||
.Returns(c => c.ArgAt<AuthRequest>(0));
|
|
||||||
|
|
||||||
var authRequest = await sutProvider.Sut.CreateAuthRequestAsync(createModel);
|
|
||||||
|
|
||||||
Assert.Equal(organizationUser1.OrganizationId, authRequest.OrganizationId);
|
|
||||||
|
|
||||||
await sutProvider.GetDependency<IAuthRequestRepository>()
|
|
||||||
.Received(1)
|
|
||||||
.CreateAsync(Arg.Is<AuthRequest>(o => o.OrganizationId == organizationUser1.OrganizationId));
|
|
||||||
|
|
||||||
await sutProvider.GetDependency<IAuthRequestRepository>()
|
|
||||||
.Received(1)
|
|
||||||
.CreateAsync(Arg.Is<AuthRequest>(o => o.OrganizationId == organizationUser2.OrganizationId));
|
|
||||||
|
|
||||||
await sutProvider.GetDependency<IAuthRequestRepository>()
|
|
||||||
.Received(2)
|
|
||||||
.CreateAsync(Arg.Any<AuthRequest>());
|
|
||||||
|
|
||||||
await sutProvider.GetDependency<IEventService>()
|
|
||||||
.Received(1)
|
|
||||||
.LogUserEventAsync(user.Id, EventType.User_RequestedDeviceApproval);
|
|
||||||
|
|
||||||
await sutProvider.GetDependency<IMailService>()
|
|
||||||
.DidNotReceiveWithAnyArgs()
|
|
||||||
.SendDeviceApprovalRequestedNotificationEmailAsync(
|
|
||||||
Arg.Any<IEnumerable<string>>(),
|
|
||||||
Arg.Any<Guid>(),
|
|
||||||
Arg.Any<string>(),
|
|
||||||
Arg.Any<string>());
|
|
||||||
}
|
|
||||||
|
|
||||||
[Theory, BitAutoData]
|
|
||||||
public async Task CreateAuthRequestAsync_AdminApproval_WithAdminNotifications_CreatesForEachOrganization_SendsEmails(
|
|
||||||
SutProvider<AuthRequestService> sutProvider,
|
SutProvider<AuthRequestService> sutProvider,
|
||||||
AuthRequestCreateRequestModel createModel,
|
AuthRequestCreateRequestModel createModel,
|
||||||
User user,
|
User user,
|
||||||
@ -369,10 +298,6 @@ public class AuthRequestServiceTests
|
|||||||
ManageResetPassword = true,
|
ManageResetPassword = true,
|
||||||
});
|
});
|
||||||
|
|
||||||
sutProvider.GetDependency<IFeatureService>()
|
|
||||||
.IsEnabled(FeatureFlagKeys.DeviceApprovalRequestAdminNotifications)
|
|
||||||
.Returns(true);
|
|
||||||
|
|
||||||
sutProvider.GetDependency<IUserRepository>()
|
sutProvider.GetDependency<IUserRepository>()
|
||||||
.GetByEmailAsync(user.Email)
|
.GetByEmailAsync(user.Email)
|
||||||
.Returns(user);
|
.Returns(user);
|
||||||
|
File diff suppressed because it is too large
Load Diff
Loading…
x
Reference in New Issue
Block a user