mirror of
https://github.com/bitwarden/server.git
synced 2025-04-05 13:08:17 -05:00
[PM-18085] Add Manage property to UserCipherDetails (#5390)
* Add Manage permission to UserCipherDetails and CipherDetails_ReadByIdUserId * Add Manage property to CipherDetails and UserCipherDetailsQuery * Add integration test for CipherRepository Manage permission rules * Update CipherDetails_ReadWithoutOrganizationsByUserId to include Manage permission * Refactor UserCipherDetailsQuery to include detailed permission and organization properties * Refactor CipherRepositoryTests to improve test organization and readability - Split large test method into smaller, focused methods - Added helper methods for creating test data and performing assertions - Improved test coverage for cipher permissions in different scenarios - Maintained existing test logic while enhancing code structure * Refactor CipherRepositoryTests to consolidate cipher permission tests - Removed redundant helper methods for permission assertions - Simplified test methods for GetCipherPermissionsForOrganizationAsync, GetManyByUserIdAsync, and GetByIdAsync - Maintained existing test coverage for cipher manage permissions - Improved code readability and reduced code duplication * Add integration test for CipherRepository group collection manage permissions - Added new test method GetCipherPermissionsForOrganizationAsync_ManageProperty_RespectsCollectionGroupRules - Implemented helper method CreateCipherInOrganizationCollectionWithGroup to support group-based collection permission testing - Verified manage permissions are correctly applied based on group collection access settings * Add @Manage parameter to Cipher stored procedures - Updated CipherDetails_Create, CipherDetails_CreateWithCollections, and CipherDetails_Update stored procedures - Added @Manage parameter with comment "-- not used" - Included new stored procedure implementations in migration script - Consistent with previous work on adding Manage property to cipher details * Update UserCipherDetails functions to reorder Manage and ViewPassword columns * Reorder Manage and ViewPassword properties in cipher details queries * Bump date in migration script
This commit is contained in:
parent
b0c6fc9146
commit
2b1db97d5c
@ -8,6 +8,7 @@ public class CipherDetails : CipherOrganizationDetails
|
|||||||
public bool Favorite { get; set; }
|
public bool Favorite { get; set; }
|
||||||
public bool Edit { get; set; }
|
public bool Edit { get; set; }
|
||||||
public bool ViewPassword { get; set; }
|
public bool ViewPassword { get; set; }
|
||||||
|
public bool Manage { get; set; }
|
||||||
|
|
||||||
public CipherDetails() { }
|
public CipherDetails() { }
|
||||||
|
|
||||||
@ -53,6 +54,7 @@ public class CipherDetailsWithCollections : CipherDetails
|
|||||||
Favorite = cipher.Favorite;
|
Favorite = cipher.Favorite;
|
||||||
Edit = cipher.Edit;
|
Edit = cipher.Edit;
|
||||||
ViewPassword = cipher.ViewPassword;
|
ViewPassword = cipher.ViewPassword;
|
||||||
|
Manage = cipher.Manage;
|
||||||
|
|
||||||
CollectionIds = collectionCiphersGroupDict.TryGetValue(Id, out var value)
|
CollectionIds = collectionCiphersGroupDict.TryGetValue(Id, out var value)
|
||||||
? value.Select(cc => cc.CollectionId)
|
? value.Select(cc => cc.CollectionId)
|
||||||
|
@ -50,11 +50,49 @@ public class UserCipherDetailsQuery : IQuery<CipherDetails>
|
|||||||
|
|
||||||
where (cu == null ? (Guid?)null : cu.CollectionId) != null || (cg == null ? (Guid?)null : cg.CollectionId) != null
|
where (cu == null ? (Guid?)null : cu.CollectionId) != null || (cg == null ? (Guid?)null : cg.CollectionId) != null
|
||||||
|
|
||||||
select c;
|
select new
|
||||||
|
{
|
||||||
|
c.Id,
|
||||||
|
c.UserId,
|
||||||
|
c.OrganizationId,
|
||||||
|
c.Type,
|
||||||
|
c.Data,
|
||||||
|
c.Attachments,
|
||||||
|
c.CreationDate,
|
||||||
|
c.RevisionDate,
|
||||||
|
c.DeletedDate,
|
||||||
|
c.Favorites,
|
||||||
|
c.Folders,
|
||||||
|
Edit = cu == null ? (cg != null && cg.ReadOnly == false) : cu.ReadOnly == false,
|
||||||
|
ViewPassword = cu == null ? (cg != null && cg.HidePasswords == false) : cu.HidePasswords == false,
|
||||||
|
Manage = cu == null ? (cg != null && cg.Manage == true) : cu.Manage == true,
|
||||||
|
OrganizationUseTotp = o.UseTotp,
|
||||||
|
c.Reprompt,
|
||||||
|
c.Key
|
||||||
|
};
|
||||||
|
|
||||||
var query2 = from c in dbContext.Ciphers
|
var query2 = from c in dbContext.Ciphers
|
||||||
where c.UserId == _userId
|
where c.UserId == _userId
|
||||||
select c;
|
select new
|
||||||
|
{
|
||||||
|
c.Id,
|
||||||
|
c.UserId,
|
||||||
|
c.OrganizationId,
|
||||||
|
c.Type,
|
||||||
|
c.Data,
|
||||||
|
c.Attachments,
|
||||||
|
c.CreationDate,
|
||||||
|
c.RevisionDate,
|
||||||
|
c.DeletedDate,
|
||||||
|
c.Favorites,
|
||||||
|
c.Folders,
|
||||||
|
Edit = true,
|
||||||
|
ViewPassword = true,
|
||||||
|
Manage = true,
|
||||||
|
OrganizationUseTotp = false,
|
||||||
|
c.Reprompt,
|
||||||
|
c.Key
|
||||||
|
};
|
||||||
|
|
||||||
var union = query.Union(query2).Select(c => new CipherDetails
|
var union = query.Union(query2).Select(c => new CipherDetails
|
||||||
{
|
{
|
||||||
@ -68,11 +106,12 @@ public class UserCipherDetailsQuery : IQuery<CipherDetails>
|
|||||||
RevisionDate = c.RevisionDate,
|
RevisionDate = c.RevisionDate,
|
||||||
DeletedDate = c.DeletedDate,
|
DeletedDate = c.DeletedDate,
|
||||||
Favorite = _userId.HasValue && c.Favorites != null && c.Favorites.ToLowerInvariant().Contains($"\"{_userId}\":true"),
|
Favorite = _userId.HasValue && c.Favorites != null && c.Favorites.ToLowerInvariant().Contains($"\"{_userId}\":true"),
|
||||||
FolderId = GetFolderId(_userId, c),
|
FolderId = GetFolderId(_userId, new Cipher { Id = c.Id, Folders = c.Folders }),
|
||||||
Edit = true,
|
Edit = c.Edit,
|
||||||
Reprompt = c.Reprompt,
|
Reprompt = c.Reprompt,
|
||||||
ViewPassword = true,
|
ViewPassword = c.ViewPassword,
|
||||||
OrganizationUseTotp = false,
|
Manage = c.Manage,
|
||||||
|
OrganizationUseTotp = c.OrganizationUseTotp,
|
||||||
Key = c.Key
|
Key = c.Key
|
||||||
});
|
});
|
||||||
return union;
|
return union;
|
||||||
|
@ -432,6 +432,7 @@ public class CipherRepository : Repository<Core.Vault.Entities.Cipher, Cipher, G
|
|||||||
Edit = true,
|
Edit = true,
|
||||||
Reprompt = c.Reprompt,
|
Reprompt = c.Reprompt,
|
||||||
ViewPassword = true,
|
ViewPassword = true,
|
||||||
|
Manage = true,
|
||||||
OrganizationUseTotp = false,
|
OrganizationUseTotp = false,
|
||||||
Key = c.Key
|
Key = c.Key
|
||||||
};
|
};
|
||||||
|
@ -23,6 +23,11 @@ SELECT
|
|||||||
THEN 1
|
THEN 1
|
||||||
ELSE 0
|
ELSE 0
|
||||||
END [ViewPassword],
|
END [ViewPassword],
|
||||||
|
CASE
|
||||||
|
WHEN COALESCE(CU.[Manage], CG.[Manage], 0) = 1
|
||||||
|
THEN 1
|
||||||
|
ELSE 0
|
||||||
|
END [Manage],
|
||||||
CASE
|
CASE
|
||||||
WHEN O.[UseTotp] = 1
|
WHEN O.[UseTotp] = 1
|
||||||
THEN 1
|
THEN 1
|
||||||
@ -54,6 +59,7 @@ SELECT
|
|||||||
*,
|
*,
|
||||||
1 [Edit],
|
1 [Edit],
|
||||||
1 [ViewPassword],
|
1 [ViewPassword],
|
||||||
|
1 [Manage],
|
||||||
0 [OrganizationUseTotp]
|
0 [OrganizationUseTotp]
|
||||||
FROM
|
FROM
|
||||||
[dbo].[CipherDetails](@UserId)
|
[dbo].[CipherDetails](@UserId)
|
||||||
|
@ -13,6 +13,7 @@
|
|||||||
@Favorite BIT,
|
@Favorite BIT,
|
||||||
@Edit BIT, -- not used
|
@Edit BIT, -- not used
|
||||||
@ViewPassword BIT, -- not used
|
@ViewPassword BIT, -- not used
|
||||||
|
@Manage BIT, -- not used
|
||||||
@OrganizationUseTotp BIT, -- not used
|
@OrganizationUseTotp BIT, -- not used
|
||||||
@DeletedDate DATETIME2(7),
|
@DeletedDate DATETIME2(7),
|
||||||
@Reprompt TINYINT,
|
@Reprompt TINYINT,
|
||||||
|
@ -13,6 +13,7 @@
|
|||||||
@Favorite BIT,
|
@Favorite BIT,
|
||||||
@Edit BIT, -- not used
|
@Edit BIT, -- not used
|
||||||
@ViewPassword BIT, -- not used
|
@ViewPassword BIT, -- not used
|
||||||
|
@Manage BIT, -- not used
|
||||||
@OrganizationUseTotp BIT, -- not used
|
@OrganizationUseTotp BIT, -- not used
|
||||||
@DeletedDate DATETIME2(7),
|
@DeletedDate DATETIME2(7),
|
||||||
@Reprompt TINYINT,
|
@Reprompt TINYINT,
|
||||||
@ -23,7 +24,7 @@ BEGIN
|
|||||||
SET NOCOUNT ON
|
SET NOCOUNT ON
|
||||||
|
|
||||||
EXEC [dbo].[CipherDetails_Create] @Id, @UserId, @OrganizationId, @Type, @Data, @Favorites, @Folders,
|
EXEC [dbo].[CipherDetails_Create] @Id, @UserId, @OrganizationId, @Type, @Data, @Favorites, @Folders,
|
||||||
@Attachments, @CreationDate, @RevisionDate, @FolderId, @Favorite, @Edit, @ViewPassword,
|
@Attachments, @CreationDate, @RevisionDate, @FolderId, @Favorite, @Edit, @ViewPassword, @Manage,
|
||||||
@OrganizationUseTotp, @DeletedDate, @Reprompt, @Key
|
@OrganizationUseTotp, @DeletedDate, @Reprompt, @Key
|
||||||
|
|
||||||
DECLARE @UpdateCollectionsSuccess INT
|
DECLARE @UpdateCollectionsSuccess INT
|
||||||
|
@ -21,7 +21,8 @@ SELECT
|
|||||||
[Key],
|
[Key],
|
||||||
[OrganizationUseTotp],
|
[OrganizationUseTotp],
|
||||||
MAX ([Edit]) AS [Edit],
|
MAX ([Edit]) AS [Edit],
|
||||||
MAX ([ViewPassword]) AS [ViewPassword]
|
MAX ([ViewPassword]) AS [ViewPassword],
|
||||||
|
MAX ([Manage]) AS [Manage]
|
||||||
FROM
|
FROM
|
||||||
[dbo].[UserCipherDetails](@UserId)
|
[dbo].[UserCipherDetails](@UserId)
|
||||||
WHERE
|
WHERE
|
||||||
|
@ -8,6 +8,7 @@ BEGIN
|
|||||||
*,
|
*,
|
||||||
1 [Edit],
|
1 [Edit],
|
||||||
1 [ViewPassword],
|
1 [ViewPassword],
|
||||||
|
1 [Manage],
|
||||||
0 [OrganizationUseTotp]
|
0 [OrganizationUseTotp]
|
||||||
FROM
|
FROM
|
||||||
[dbo].[CipherDetails](@UserId)
|
[dbo].[CipherDetails](@UserId)
|
||||||
|
@ -13,6 +13,7 @@
|
|||||||
@Favorite BIT,
|
@Favorite BIT,
|
||||||
@Edit BIT, -- not used
|
@Edit BIT, -- not used
|
||||||
@ViewPassword BIT, -- not used
|
@ViewPassword BIT, -- not used
|
||||||
|
@Manage BIT, -- not used
|
||||||
@OrganizationUseTotp BIT, -- not used
|
@OrganizationUseTotp BIT, -- not used
|
||||||
@DeletedDate DATETIME2(2),
|
@DeletedDate DATETIME2(2),
|
||||||
@Reprompt TINYINT,
|
@Reprompt TINYINT,
|
||||||
|
@ -433,4 +433,275 @@ public class CipherRepositoryTests
|
|||||||
Assert.False(unassignedCipherPermission.Read);
|
Assert.False(unassignedCipherPermission.Read);
|
||||||
Assert.False(unassignedCipherPermission.ViewPassword);
|
Assert.False(unassignedCipherPermission.ViewPassword);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
[DatabaseTheory, DatabaseData]
|
||||||
|
public async Task GetCipherPermissionsForOrganizationAsync_ManageProperty_RespectsCollectionUserRules(
|
||||||
|
ICipherRepository cipherRepository,
|
||||||
|
IUserRepository userRepository,
|
||||||
|
ICollectionCipherRepository collectionCipherRepository,
|
||||||
|
ICollectionRepository collectionRepository,
|
||||||
|
IOrganizationRepository organizationRepository,
|
||||||
|
IOrganizationUserRepository organizationUserRepository)
|
||||||
|
{
|
||||||
|
var (user, organization, orgUser) = await CreateTestUserAndOrganization(userRepository, organizationRepository, organizationUserRepository);
|
||||||
|
|
||||||
|
var manageCipher = await CreateCipherInOrganizationCollection(
|
||||||
|
organization, orgUser, cipherRepository, collectionRepository, collectionCipherRepository,
|
||||||
|
hasManagePermission: true, "Manage Collection");
|
||||||
|
|
||||||
|
var nonManageCipher = await CreateCipherInOrganizationCollection(
|
||||||
|
organization, orgUser, cipherRepository, collectionRepository, collectionCipherRepository,
|
||||||
|
hasManagePermission: false, "Non-Manage Collection");
|
||||||
|
|
||||||
|
var permissions = await cipherRepository.GetCipherPermissionsForOrganizationAsync(organization.Id, user.Id);
|
||||||
|
Assert.Equal(2, permissions.Count);
|
||||||
|
|
||||||
|
var managePermission = permissions.FirstOrDefault(c => c.Id == manageCipher.Id);
|
||||||
|
Assert.NotNull(managePermission);
|
||||||
|
Assert.True(managePermission.Manage, "Collection with Manage=true should grant Manage permission");
|
||||||
|
|
||||||
|
var nonManagePermission = permissions.FirstOrDefault(c => c.Id == nonManageCipher.Id);
|
||||||
|
Assert.NotNull(nonManagePermission);
|
||||||
|
Assert.False(nonManagePermission.Manage, "Collection with Manage=false should not grant Manage permission");
|
||||||
|
}
|
||||||
|
|
||||||
|
[DatabaseTheory, DatabaseData]
|
||||||
|
public async Task GetCipherPermissionsForOrganizationAsync_ManageProperty_RespectsCollectionGroupRules(
|
||||||
|
ICipherRepository cipherRepository,
|
||||||
|
IUserRepository userRepository,
|
||||||
|
ICollectionCipherRepository collectionCipherRepository,
|
||||||
|
ICollectionRepository collectionRepository,
|
||||||
|
IOrganizationRepository organizationRepository,
|
||||||
|
IOrganizationUserRepository organizationUserRepository,
|
||||||
|
IGroupRepository groupRepository)
|
||||||
|
{
|
||||||
|
var (user, organization, orgUser) = await CreateTestUserAndOrganization(userRepository, organizationRepository, organizationUserRepository);
|
||||||
|
|
||||||
|
var group = await groupRepository.CreateAsync(new Group
|
||||||
|
{
|
||||||
|
OrganizationId = organization.Id,
|
||||||
|
Name = "Test Group",
|
||||||
|
});
|
||||||
|
await groupRepository.UpdateUsersAsync(group.Id, new[] { orgUser.Id });
|
||||||
|
|
||||||
|
var (manageCipher, nonManageCipher) = await CreateCipherInOrganizationCollectionWithGroup(
|
||||||
|
organization, group, cipherRepository, collectionRepository, collectionCipherRepository, groupRepository);
|
||||||
|
|
||||||
|
var permissions = await cipherRepository.GetCipherPermissionsForOrganizationAsync(organization.Id, user.Id);
|
||||||
|
Assert.Equal(2, permissions.Count);
|
||||||
|
|
||||||
|
var managePermission = permissions.FirstOrDefault(c => c.Id == manageCipher.Id);
|
||||||
|
Assert.NotNull(managePermission);
|
||||||
|
Assert.True(managePermission.Manage, "Collection with Group Manage=true should grant Manage permission");
|
||||||
|
|
||||||
|
var nonManagePermission = permissions.FirstOrDefault(c => c.Id == nonManageCipher.Id);
|
||||||
|
Assert.NotNull(nonManagePermission);
|
||||||
|
Assert.False(nonManagePermission.Manage, "Collection with Group Manage=false should not grant Manage permission");
|
||||||
|
}
|
||||||
|
|
||||||
|
[DatabaseTheory, DatabaseData]
|
||||||
|
public async Task GetManyByUserIdAsync_ManageProperty_RespectsCollectionAndOwnershipRules(
|
||||||
|
ICipherRepository cipherRepository,
|
||||||
|
IUserRepository userRepository,
|
||||||
|
ICollectionCipherRepository collectionCipherRepository,
|
||||||
|
ICollectionRepository collectionRepository,
|
||||||
|
IOrganizationRepository organizationRepository,
|
||||||
|
IOrganizationUserRepository organizationUserRepository)
|
||||||
|
{
|
||||||
|
var (user, organization, orgUser) = await CreateTestUserAndOrganization(userRepository, organizationRepository, organizationUserRepository);
|
||||||
|
|
||||||
|
var manageCipher = await CreateCipherInOrganizationCollection(
|
||||||
|
organization, orgUser, cipherRepository, collectionRepository, collectionCipherRepository,
|
||||||
|
hasManagePermission: true, "Manage Collection");
|
||||||
|
|
||||||
|
var nonManageCipher = await CreateCipherInOrganizationCollection(
|
||||||
|
organization, orgUser, cipherRepository, collectionRepository, collectionCipherRepository,
|
||||||
|
hasManagePermission: false, "Non-Manage Collection");
|
||||||
|
|
||||||
|
var personalCipher = await CreatePersonalCipher(user, cipherRepository);
|
||||||
|
|
||||||
|
var userCiphers = await cipherRepository.GetManyByUserIdAsync(user.Id);
|
||||||
|
Assert.Equal(3, userCiphers.Count);
|
||||||
|
|
||||||
|
var managePermission = userCiphers.FirstOrDefault(c => c.Id == manageCipher.Id);
|
||||||
|
Assert.NotNull(managePermission);
|
||||||
|
Assert.True(managePermission.Manage, "Collection with Manage=true should grant Manage permission");
|
||||||
|
|
||||||
|
var nonManagePermission = userCiphers.FirstOrDefault(c => c.Id == nonManageCipher.Id);
|
||||||
|
Assert.NotNull(nonManagePermission);
|
||||||
|
Assert.False(nonManagePermission.Manage, "Collection with Manage=false should not grant Manage permission");
|
||||||
|
|
||||||
|
var personalPermission = userCiphers.FirstOrDefault(c => c.Id == personalCipher.Id);
|
||||||
|
Assert.NotNull(personalPermission);
|
||||||
|
Assert.True(personalPermission.Manage, "Personal ciphers should always have Manage permission");
|
||||||
|
}
|
||||||
|
|
||||||
|
[DatabaseTheory, DatabaseData]
|
||||||
|
public async Task GetByIdAsync_ManageProperty_RespectsCollectionAndOwnershipRules(
|
||||||
|
ICipherRepository cipherRepository,
|
||||||
|
IUserRepository userRepository,
|
||||||
|
ICollectionCipherRepository collectionCipherRepository,
|
||||||
|
ICollectionRepository collectionRepository,
|
||||||
|
IOrganizationRepository organizationRepository,
|
||||||
|
IOrganizationUserRepository organizationUserRepository)
|
||||||
|
{
|
||||||
|
var (user, organization, orgUser) = await CreateTestUserAndOrganization(userRepository, organizationRepository, organizationUserRepository);
|
||||||
|
|
||||||
|
var manageCipher = await CreateCipherInOrganizationCollection(
|
||||||
|
organization, orgUser, cipherRepository, collectionRepository, collectionCipherRepository,
|
||||||
|
hasManagePermission: true, "Manage Collection");
|
||||||
|
|
||||||
|
var nonManageCipher = await CreateCipherInOrganizationCollection(
|
||||||
|
organization, orgUser, cipherRepository, collectionRepository, collectionCipherRepository,
|
||||||
|
hasManagePermission: false, "Non-Manage Collection");
|
||||||
|
|
||||||
|
var personalCipher = await CreatePersonalCipher(user, cipherRepository);
|
||||||
|
|
||||||
|
var manageDetails = await cipherRepository.GetByIdAsync(manageCipher.Id, user.Id);
|
||||||
|
Assert.NotNull(manageDetails);
|
||||||
|
Assert.True(manageDetails.Manage, "Collection with Manage=true should grant Manage permission");
|
||||||
|
|
||||||
|
var nonManageDetails = await cipherRepository.GetByIdAsync(nonManageCipher.Id, user.Id);
|
||||||
|
Assert.NotNull(nonManageDetails);
|
||||||
|
Assert.False(nonManageDetails.Manage, "Collection with Manage=false should not grant Manage permission");
|
||||||
|
|
||||||
|
var personalDetails = await cipherRepository.GetByIdAsync(personalCipher.Id, user.Id);
|
||||||
|
Assert.NotNull(personalDetails);
|
||||||
|
Assert.True(personalDetails.Manage, "Personal ciphers should always have Manage permission");
|
||||||
|
}
|
||||||
|
|
||||||
|
private async Task<(User user, Organization org, OrganizationUser orgUser)> CreateTestUserAndOrganization(
|
||||||
|
IUserRepository userRepository,
|
||||||
|
IOrganizationRepository organizationRepository,
|
||||||
|
IOrganizationUserRepository organizationUserRepository)
|
||||||
|
{
|
||||||
|
var user = await userRepository.CreateAsync(new User
|
||||||
|
{
|
||||||
|
Name = "Test User",
|
||||||
|
Email = $"test+{Guid.NewGuid()}@email.com",
|
||||||
|
ApiKey = "TEST",
|
||||||
|
SecurityStamp = "stamp",
|
||||||
|
});
|
||||||
|
|
||||||
|
var organization = await organizationRepository.CreateAsync(new Organization
|
||||||
|
{
|
||||||
|
Name = "Test Organization",
|
||||||
|
BillingEmail = user.Email,
|
||||||
|
Plan = "Test"
|
||||||
|
});
|
||||||
|
|
||||||
|
var orgUser = await organizationUserRepository.CreateAsync(new OrganizationUser
|
||||||
|
{
|
||||||
|
UserId = user.Id,
|
||||||
|
OrganizationId = organization.Id,
|
||||||
|
Status = OrganizationUserStatusType.Confirmed,
|
||||||
|
Type = OrganizationUserType.Owner,
|
||||||
|
});
|
||||||
|
|
||||||
|
return (user, organization, orgUser);
|
||||||
|
}
|
||||||
|
|
||||||
|
private async Task<Cipher> CreateCipherInOrganizationCollection(
|
||||||
|
Organization organization,
|
||||||
|
OrganizationUser orgUser,
|
||||||
|
ICipherRepository cipherRepository,
|
||||||
|
ICollectionRepository collectionRepository,
|
||||||
|
ICollectionCipherRepository collectionCipherRepository,
|
||||||
|
bool hasManagePermission,
|
||||||
|
string collectionName)
|
||||||
|
{
|
||||||
|
var collection = await collectionRepository.CreateAsync(new Collection
|
||||||
|
{
|
||||||
|
Name = collectionName,
|
||||||
|
OrganizationId = organization.Id,
|
||||||
|
});
|
||||||
|
|
||||||
|
var cipher = await cipherRepository.CreateAsync(new Cipher
|
||||||
|
{
|
||||||
|
Type = CipherType.Login,
|
||||||
|
OrganizationId = organization.Id,
|
||||||
|
Data = ""
|
||||||
|
});
|
||||||
|
|
||||||
|
await collectionCipherRepository.UpdateCollectionsForAdminAsync(cipher.Id, organization.Id,
|
||||||
|
new List<Guid> { collection.Id });
|
||||||
|
|
||||||
|
await collectionRepository.UpdateUsersAsync(collection.Id, new List<CollectionAccessSelection>
|
||||||
|
{
|
||||||
|
new() { Id = orgUser.Id, HidePasswords = false, ReadOnly = false, Manage = hasManagePermission }
|
||||||
|
});
|
||||||
|
|
||||||
|
return cipher;
|
||||||
|
}
|
||||||
|
|
||||||
|
private async Task<(Cipher manageCipher, Cipher nonManageCipher)> CreateCipherInOrganizationCollectionWithGroup(
|
||||||
|
Organization organization,
|
||||||
|
Group group,
|
||||||
|
ICipherRepository cipherRepository,
|
||||||
|
ICollectionRepository collectionRepository,
|
||||||
|
ICollectionCipherRepository collectionCipherRepository,
|
||||||
|
IGroupRepository groupRepository)
|
||||||
|
{
|
||||||
|
var manageCollection = await collectionRepository.CreateAsync(new Collection
|
||||||
|
{
|
||||||
|
Name = "Group Manage Collection",
|
||||||
|
OrganizationId = organization.Id,
|
||||||
|
});
|
||||||
|
|
||||||
|
var nonManageCollection = await collectionRepository.CreateAsync(new Collection
|
||||||
|
{
|
||||||
|
Name = "Group Non-Manage Collection",
|
||||||
|
OrganizationId = organization.Id,
|
||||||
|
});
|
||||||
|
|
||||||
|
var manageCipher = await cipherRepository.CreateAsync(new Cipher
|
||||||
|
{
|
||||||
|
Type = CipherType.Login,
|
||||||
|
OrganizationId = organization.Id,
|
||||||
|
Data = ""
|
||||||
|
});
|
||||||
|
|
||||||
|
var nonManageCipher = await cipherRepository.CreateAsync(new Cipher
|
||||||
|
{
|
||||||
|
Type = CipherType.Login,
|
||||||
|
OrganizationId = organization.Id,
|
||||||
|
Data = ""
|
||||||
|
});
|
||||||
|
|
||||||
|
await collectionCipherRepository.UpdateCollectionsForAdminAsync(manageCipher.Id, organization.Id,
|
||||||
|
new List<Guid> { manageCollection.Id });
|
||||||
|
await collectionCipherRepository.UpdateCollectionsForAdminAsync(nonManageCipher.Id, organization.Id,
|
||||||
|
new List<Guid> { nonManageCollection.Id });
|
||||||
|
|
||||||
|
await groupRepository.ReplaceAsync(group,
|
||||||
|
new[]
|
||||||
|
{
|
||||||
|
new CollectionAccessSelection
|
||||||
|
{
|
||||||
|
Id = manageCollection.Id,
|
||||||
|
HidePasswords = false,
|
||||||
|
ReadOnly = false,
|
||||||
|
Manage = true
|
||||||
|
},
|
||||||
|
new CollectionAccessSelection
|
||||||
|
{
|
||||||
|
Id = nonManageCollection.Id,
|
||||||
|
HidePasswords = false,
|
||||||
|
ReadOnly = false,
|
||||||
|
Manage = false
|
||||||
|
}
|
||||||
|
});
|
||||||
|
|
||||||
|
return (manageCipher, nonManageCipher);
|
||||||
|
}
|
||||||
|
|
||||||
|
private async Task<Cipher> CreatePersonalCipher(User user, ICipherRepository cipherRepository)
|
||||||
|
{
|
||||||
|
return await cipherRepository.CreateAsync(new Cipher
|
||||||
|
{
|
||||||
|
Type = CipherType.Login,
|
||||||
|
UserId = user.Id,
|
||||||
|
Data = ""
|
||||||
|
});
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
@ -0,0 +1,309 @@
|
|||||||
|
CREATE OR ALTER FUNCTION [dbo].[UserCipherDetails](@UserId UNIQUEIDENTIFIER)
|
||||||
|
RETURNS TABLE
|
||||||
|
AS RETURN
|
||||||
|
WITH [CTE] AS (
|
||||||
|
SELECT
|
||||||
|
[Id],
|
||||||
|
[OrganizationId]
|
||||||
|
FROM
|
||||||
|
[OrganizationUser]
|
||||||
|
WHERE
|
||||||
|
[UserId] = @UserId
|
||||||
|
AND [Status] = 2 -- Confirmed
|
||||||
|
)
|
||||||
|
SELECT
|
||||||
|
C.*,
|
||||||
|
CASE
|
||||||
|
WHEN COALESCE(CU.[ReadOnly], CG.[ReadOnly], 0) = 0
|
||||||
|
THEN 1
|
||||||
|
ELSE 0
|
||||||
|
END [Edit],
|
||||||
|
CASE
|
||||||
|
WHEN COALESCE(CU.[HidePasswords], CG.[HidePasswords], 0) = 0
|
||||||
|
THEN 1
|
||||||
|
ELSE 0
|
||||||
|
END [ViewPassword],
|
||||||
|
CASE
|
||||||
|
WHEN COALESCE(CU.[Manage], CG.[Manage], 0) = 1
|
||||||
|
THEN 1
|
||||||
|
ELSE 0
|
||||||
|
END [Manage],
|
||||||
|
CASE
|
||||||
|
WHEN O.[UseTotp] = 1
|
||||||
|
THEN 1
|
||||||
|
ELSE 0
|
||||||
|
END [OrganizationUseTotp]
|
||||||
|
FROM
|
||||||
|
[dbo].[CipherDetails](@UserId) C
|
||||||
|
INNER JOIN
|
||||||
|
[CTE] OU ON C.[UserId] IS NULL AND C.[OrganizationId] IN (SELECT [OrganizationId] FROM [CTE])
|
||||||
|
INNER JOIN
|
||||||
|
[dbo].[Organization] O ON O.[Id] = OU.[OrganizationId] AND O.[Id] = C.[OrganizationId] AND O.[Enabled] = 1
|
||||||
|
LEFT JOIN
|
||||||
|
[dbo].[CollectionCipher] CC ON CC.[CipherId] = C.[Id]
|
||||||
|
LEFT JOIN
|
||||||
|
[dbo].[CollectionUser] CU ON CU.[CollectionId] = CC.[CollectionId] AND CU.[OrganizationUserId] = OU.[Id]
|
||||||
|
LEFT JOIN
|
||||||
|
[dbo].[GroupUser] GU ON CU.[CollectionId] IS NULL AND GU.[OrganizationUserId] = OU.[Id]
|
||||||
|
LEFT JOIN
|
||||||
|
[dbo].[Group] G ON G.[Id] = GU.[GroupId]
|
||||||
|
LEFT JOIN
|
||||||
|
[dbo].[CollectionGroup] CG ON CG.[CollectionId] = CC.[CollectionId] AND CG.[GroupId] = GU.[GroupId]
|
||||||
|
WHERE
|
||||||
|
CU.[CollectionId] IS NOT NULL
|
||||||
|
OR CG.[CollectionId] IS NOT NULL
|
||||||
|
|
||||||
|
UNION ALL
|
||||||
|
|
||||||
|
SELECT
|
||||||
|
*,
|
||||||
|
1 [Edit],
|
||||||
|
1 [ViewPassword],
|
||||||
|
1 [Manage],
|
||||||
|
0 [OrganizationUseTotp]
|
||||||
|
FROM
|
||||||
|
[dbo].[CipherDetails](@UserId)
|
||||||
|
WHERE
|
||||||
|
[UserId] = @UserId
|
||||||
|
GO
|
||||||
|
|
||||||
|
CREATE OR ALTER PROCEDURE [dbo].[CipherDetails_ReadByIdUserId]
|
||||||
|
@Id UNIQUEIDENTIFIER,
|
||||||
|
@UserId UNIQUEIDENTIFIER
|
||||||
|
AS
|
||||||
|
BEGIN
|
||||||
|
SET NOCOUNT ON
|
||||||
|
|
||||||
|
SELECT
|
||||||
|
[Id],
|
||||||
|
[UserId],
|
||||||
|
[OrganizationId],
|
||||||
|
[Type],
|
||||||
|
[Data],
|
||||||
|
[Attachments],
|
||||||
|
[CreationDate],
|
||||||
|
[RevisionDate],
|
||||||
|
[Favorite],
|
||||||
|
[FolderId],
|
||||||
|
[DeletedDate],
|
||||||
|
[Reprompt],
|
||||||
|
[Key],
|
||||||
|
[OrganizationUseTotp],
|
||||||
|
MAX ([Edit]) AS [Edit],
|
||||||
|
MAX ([ViewPassword]) AS [ViewPassword],
|
||||||
|
MAX ([Manage]) AS [Manage]
|
||||||
|
FROM
|
||||||
|
[dbo].[UserCipherDetails](@UserId)
|
||||||
|
WHERE
|
||||||
|
[Id] = @Id
|
||||||
|
GROUP BY
|
||||||
|
[Id],
|
||||||
|
[UserId],
|
||||||
|
[OrganizationId],
|
||||||
|
[Type],
|
||||||
|
[Data],
|
||||||
|
[Attachments],
|
||||||
|
[CreationDate],
|
||||||
|
[RevisionDate],
|
||||||
|
[Favorite],
|
||||||
|
[FolderId],
|
||||||
|
[DeletedDate],
|
||||||
|
[Reprompt],
|
||||||
|
[Key],
|
||||||
|
[OrganizationUseTotp]
|
||||||
|
END
|
||||||
|
GO
|
||||||
|
|
||||||
|
CREATE OR ALTER PROCEDURE [dbo].[CipherDetails_ReadWithoutOrganizationsByUserId]
|
||||||
|
@UserId UNIQUEIDENTIFIER
|
||||||
|
AS
|
||||||
|
BEGIN
|
||||||
|
SET NOCOUNT ON
|
||||||
|
|
||||||
|
SELECT
|
||||||
|
*,
|
||||||
|
1 [Edit],
|
||||||
|
1 [ViewPassword],
|
||||||
|
1 [Manage],
|
||||||
|
0 [OrganizationUseTotp]
|
||||||
|
FROM
|
||||||
|
[dbo].[CipherDetails](@UserId)
|
||||||
|
WHERE
|
||||||
|
[UserId] = @UserId
|
||||||
|
END
|
||||||
|
GO
|
||||||
|
|
||||||
|
CREATE OR ALTER PROCEDURE [dbo].[CipherDetails_Create]
|
||||||
|
@Id UNIQUEIDENTIFIER,
|
||||||
|
@UserId UNIQUEIDENTIFIER,
|
||||||
|
@OrganizationId UNIQUEIDENTIFIER,
|
||||||
|
@Type TINYINT,
|
||||||
|
@Data NVARCHAR(MAX),
|
||||||
|
@Favorites NVARCHAR(MAX), -- not used
|
||||||
|
@Folders NVARCHAR(MAX), -- not used
|
||||||
|
@Attachments NVARCHAR(MAX), -- not used
|
||||||
|
@CreationDate DATETIME2(7),
|
||||||
|
@RevisionDate DATETIME2(7),
|
||||||
|
@FolderId UNIQUEIDENTIFIER,
|
||||||
|
@Favorite BIT,
|
||||||
|
@Edit BIT, -- not used
|
||||||
|
@ViewPassword BIT, -- not used
|
||||||
|
@Manage BIT, -- not used
|
||||||
|
@OrganizationUseTotp BIT, -- not used
|
||||||
|
@DeletedDate DATETIME2(7),
|
||||||
|
@Reprompt TINYINT,
|
||||||
|
@Key VARCHAR(MAX) = NULL
|
||||||
|
AS
|
||||||
|
BEGIN
|
||||||
|
SET NOCOUNT ON
|
||||||
|
|
||||||
|
DECLARE @UserIdKey VARCHAR(50) = CONCAT('"', @UserId, '"')
|
||||||
|
DECLARE @UserIdPath VARCHAR(50) = CONCAT('$.', @UserIdKey)
|
||||||
|
|
||||||
|
INSERT INTO [dbo].[Cipher]
|
||||||
|
(
|
||||||
|
[Id],
|
||||||
|
[UserId],
|
||||||
|
[OrganizationId],
|
||||||
|
[Type],
|
||||||
|
[Data],
|
||||||
|
[Favorites],
|
||||||
|
[Folders],
|
||||||
|
[CreationDate],
|
||||||
|
[RevisionDate],
|
||||||
|
[DeletedDate],
|
||||||
|
[Reprompt],
|
||||||
|
[Key]
|
||||||
|
)
|
||||||
|
VALUES
|
||||||
|
(
|
||||||
|
@Id,
|
||||||
|
CASE WHEN @OrganizationId IS NULL THEN @UserId ELSE NULL END,
|
||||||
|
@OrganizationId,
|
||||||
|
@Type,
|
||||||
|
@Data,
|
||||||
|
CASE WHEN @Favorite = 1 THEN CONCAT('{', @UserIdKey, ':true}') ELSE NULL END,
|
||||||
|
CASE WHEN @FolderId IS NOT NULL THEN CONCAT('{', @UserIdKey, ':"', @FolderId, '"', '}') ELSE NULL END,
|
||||||
|
@CreationDate,
|
||||||
|
@RevisionDate,
|
||||||
|
@DeletedDate,
|
||||||
|
@Reprompt,
|
||||||
|
@Key
|
||||||
|
)
|
||||||
|
|
||||||
|
IF @OrganizationId IS NOT NULL
|
||||||
|
BEGIN
|
||||||
|
EXEC [dbo].[User_BumpAccountRevisionDateByCipherId] @Id, @OrganizationId
|
||||||
|
END
|
||||||
|
ELSE IF @UserId IS NOT NULL
|
||||||
|
BEGIN
|
||||||
|
EXEC [dbo].[User_BumpAccountRevisionDate] @UserId
|
||||||
|
END
|
||||||
|
END
|
||||||
|
GO
|
||||||
|
|
||||||
|
CREATE OR ALTER PROCEDURE [dbo].[CipherDetails_CreateWithCollections]
|
||||||
|
@Id UNIQUEIDENTIFIER,
|
||||||
|
@UserId UNIQUEIDENTIFIER,
|
||||||
|
@OrganizationId UNIQUEIDENTIFIER,
|
||||||
|
@Type TINYINT,
|
||||||
|
@Data NVARCHAR(MAX),
|
||||||
|
@Favorites NVARCHAR(MAX), -- not used
|
||||||
|
@Folders NVARCHAR(MAX), -- not used
|
||||||
|
@Attachments NVARCHAR(MAX), -- not used
|
||||||
|
@CreationDate DATETIME2(7),
|
||||||
|
@RevisionDate DATETIME2(7),
|
||||||
|
@FolderId UNIQUEIDENTIFIER,
|
||||||
|
@Favorite BIT,
|
||||||
|
@Edit BIT, -- not used
|
||||||
|
@ViewPassword BIT, -- not used
|
||||||
|
@Manage BIT, -- not used
|
||||||
|
@OrganizationUseTotp BIT, -- not used
|
||||||
|
@DeletedDate DATETIME2(7),
|
||||||
|
@Reprompt TINYINT,
|
||||||
|
@Key VARCHAR(MAX) = NULL,
|
||||||
|
@CollectionIds AS [dbo].[GuidIdArray] READONLY
|
||||||
|
AS
|
||||||
|
BEGIN
|
||||||
|
SET NOCOUNT ON
|
||||||
|
|
||||||
|
EXEC [dbo].[CipherDetails_Create] @Id, @UserId, @OrganizationId, @Type, @Data, @Favorites, @Folders,
|
||||||
|
@Attachments, @CreationDate, @RevisionDate, @FolderId, @Favorite, @Edit, @ViewPassword, @Manage,
|
||||||
|
@OrganizationUseTotp, @DeletedDate, @Reprompt, @Key
|
||||||
|
|
||||||
|
DECLARE @UpdateCollectionsSuccess INT
|
||||||
|
EXEC @UpdateCollectionsSuccess = [dbo].[Cipher_UpdateCollections] @Id, @UserId, @OrganizationId, @CollectionIds
|
||||||
|
END
|
||||||
|
GO
|
||||||
|
|
||||||
|
CREATE OR ALTER PROCEDURE [dbo].[CipherDetails_Update]
|
||||||
|
@Id UNIQUEIDENTIFIER,
|
||||||
|
@UserId UNIQUEIDENTIFIER,
|
||||||
|
@OrganizationId UNIQUEIDENTIFIER,
|
||||||
|
@Type TINYINT,
|
||||||
|
@Data NVARCHAR(MAX),
|
||||||
|
@Favorites NVARCHAR(MAX), -- not used
|
||||||
|
@Folders NVARCHAR(MAX), -- not used
|
||||||
|
@Attachments NVARCHAR(MAX),
|
||||||
|
@CreationDate DATETIME2(7),
|
||||||
|
@RevisionDate DATETIME2(7),
|
||||||
|
@FolderId UNIQUEIDENTIFIER,
|
||||||
|
@Favorite BIT,
|
||||||
|
@Edit BIT, -- not used
|
||||||
|
@ViewPassword BIT, -- not used
|
||||||
|
@Manage BIT, -- not used
|
||||||
|
@OrganizationUseTotp BIT, -- not used
|
||||||
|
@DeletedDate DATETIME2(2),
|
||||||
|
@Reprompt TINYINT,
|
||||||
|
@Key VARCHAR(MAX) = NULL
|
||||||
|
AS
|
||||||
|
BEGIN
|
||||||
|
SET NOCOUNT ON
|
||||||
|
|
||||||
|
DECLARE @UserIdKey VARCHAR(50) = CONCAT('"', @UserId, '"')
|
||||||
|
DECLARE @UserIdPath VARCHAR(50) = CONCAT('$.', @UserIdKey)
|
||||||
|
|
||||||
|
UPDATE
|
||||||
|
[dbo].[Cipher]
|
||||||
|
SET
|
||||||
|
[UserId] = CASE WHEN @OrganizationId IS NULL THEN @UserId ELSE NULL END,
|
||||||
|
[OrganizationId] = @OrganizationId,
|
||||||
|
[Type] = @Type,
|
||||||
|
[Data] = @Data,
|
||||||
|
[Folders] =
|
||||||
|
CASE
|
||||||
|
WHEN @FolderId IS NOT NULL AND [Folders] IS NULL THEN
|
||||||
|
CONCAT('{', @UserIdKey, ':"', @FolderId, '"', '}')
|
||||||
|
WHEN @FolderId IS NOT NULL THEN
|
||||||
|
JSON_MODIFY([Folders], @UserIdPath, CAST(@FolderId AS VARCHAR(50)))
|
||||||
|
ELSE
|
||||||
|
JSON_MODIFY([Folders], @UserIdPath, NULL)
|
||||||
|
END,
|
||||||
|
[Favorites] =
|
||||||
|
CASE
|
||||||
|
WHEN @Favorite = 1 AND [Favorites] IS NULL THEN
|
||||||
|
CONCAT('{', @UserIdKey, ':true}')
|
||||||
|
WHEN @Favorite = 1 THEN
|
||||||
|
JSON_MODIFY([Favorites], @UserIdPath, CAST(1 AS BIT))
|
||||||
|
ELSE
|
||||||
|
JSON_MODIFY([Favorites], @UserIdPath, NULL)
|
||||||
|
END,
|
||||||
|
[Attachments] = @Attachments,
|
||||||
|
[Reprompt] = @Reprompt,
|
||||||
|
[CreationDate] = @CreationDate,
|
||||||
|
[RevisionDate] = @RevisionDate,
|
||||||
|
[DeletedDate] = @DeletedDate,
|
||||||
|
[Key] = @Key
|
||||||
|
WHERE
|
||||||
|
[Id] = @Id
|
||||||
|
|
||||||
|
IF @OrganizationId IS NOT NULL
|
||||||
|
BEGIN
|
||||||
|
EXEC [dbo].[User_BumpAccountRevisionDateByCipherId] @Id, @OrganizationId
|
||||||
|
END
|
||||||
|
ELSE IF @UserId IS NOT NULL
|
||||||
|
BEGIN
|
||||||
|
EXEC [dbo].[User_BumpAccountRevisionDate] @UserId
|
||||||
|
END
|
||||||
|
END
|
||||||
|
GO
|
Loading…
x
Reference in New Issue
Block a user