mirror of
https://github.com/bitwarden/server.git
synced 2025-06-27 22:26:13 -05:00
Add validation in CollectionService to prevent modification of DefaultUserCollection type
* Implemented a check in DeleteUserAsync to throw a BadRequestException if an attempt is made to modify member access for collections of type DefaultUserCollection. * Added a unit test to ensure the exception is thrown with the correct message when this condition is met.
This commit is contained in:
parent
f1afc653e3
commit
4d36e87b6f
@ -22,10 +22,13 @@ public class CollectionService : ICollectionService
|
|||||||
_collectionRepository = collectionRepository;
|
_collectionRepository = collectionRepository;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
public async Task DeleteUserAsync(Collection collection, Guid organizationUserId)
|
public async Task DeleteUserAsync(Collection collection, Guid organizationUserId)
|
||||||
{
|
{
|
||||||
|
if (collection.Type == Enums.CollectionType.DefaultUserCollection)
|
||||||
|
{
|
||||||
|
throw new BadRequestException("You cannot modify member access for collections with the type as DefaultUserCollection.");
|
||||||
|
}
|
||||||
|
|
||||||
var orgUser = await _organizationUserRepository.GetByIdAsync(organizationUserId);
|
var orgUser = await _organizationUserRepository.GetByIdAsync(organizationUserId);
|
||||||
if (orgUser == null || orgUser.OrganizationId != collection.OrganizationId)
|
if (orgUser == null || orgUser.OrganizationId != collection.OrganizationId)
|
||||||
{
|
{
|
||||||
|
@ -49,4 +49,22 @@ public class CollectionServiceTest
|
|||||||
await sutProvider.GetDependency<IEventService>().DidNotReceiveWithAnyArgs()
|
await sutProvider.GetDependency<IEventService>().DidNotReceiveWithAnyArgs()
|
||||||
.LogOrganizationUserEventAsync<OrganizationUser>(default, default);
|
.LogOrganizationUserEventAsync<OrganizationUser>(default, default);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
[Theory, BitAutoData]
|
||||||
|
public async Task DeleteUserAsync_WithDefaultUserCollectionType_ThrowsBadRequest(Collection collection,
|
||||||
|
Organization organization, OrganizationUser organizationUser, SutProvider<CollectionService> sutProvider)
|
||||||
|
{
|
||||||
|
collection.Type = CollectionType.DefaultUserCollection;
|
||||||
|
collection.OrganizationId = organization.Id;
|
||||||
|
organizationUser.OrganizationId = organization.Id;
|
||||||
|
|
||||||
|
var exception = await Assert.ThrowsAsync<BadRequestException>(() =>
|
||||||
|
sutProvider.Sut.DeleteUserAsync(collection, organizationUser.Id));
|
||||||
|
Assert.Contains("You cannot modify member access for collections with the type as DefaultUserCollection.", exception.Message);
|
||||||
|
|
||||||
|
await sutProvider.GetDependency<IOrganizationUserRepository>().DidNotReceiveWithAnyArgs().GetByIdAsync(default);
|
||||||
|
await sutProvider.GetDependency<ICollectionRepository>().DidNotReceiveWithAnyArgs().DeleteUserAsync(default, default);
|
||||||
|
await sutProvider.GetDependency<IEventService>().DidNotReceiveWithAnyArgs()
|
||||||
|
.LogOrganizationUserEventAsync<OrganizationUser>(default, default);
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
Loading…
x
Reference in New Issue
Block a user