1
0
mirror of https://github.com/bitwarden/server.git synced 2025-04-23 14:05:10 -05:00

[PM-2633] Warnings cleanup (#3010)

* Warnings cleanup

* One-line response with null

Co-authored-by: Thomas Avery <43214426+Thomas-Avery@users.noreply.github.com>

* Remove condition

* Fix lint from suggestion

---------

Co-authored-by: Thomas Avery <43214426+Thomas-Avery@users.noreply.github.com>
This commit is contained in:
Matt Bishop 2023-06-16 10:02:05 -04:00 committed by GitHub
parent 5a12db18d1
commit 53327b1993
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
12 changed files with 41 additions and 49 deletions

View File

@ -139,13 +139,13 @@ public class SecretRepository : Repository<Core.SecretsManager.Entities.Secret,
.Include("Projects") .Include("Projects")
.FirstAsync(s => s.Id == secret.Id); .FirstAsync(s => s.Id == secret.Id);
foreach (var p in entity.Projects?.Where(p => mappedEntity.Projects.All(mp => mp.Id != p.Id))) foreach (var p in entity.Projects.Where(p => mappedEntity.Projects.All(mp => mp.Id != p.Id)))
{ {
entity.Projects.Remove(p); entity.Projects.Remove(p);
} }
// Add new relationships // Add new relationships
foreach (var project in mappedEntity.Projects?.Where(p => entity.Projects.All(ep => ep.Id != p.Id))) foreach (var project in mappedEntity.Projects.Where(p => entity.Projects.All(ep => ep.Id != p.Id)))
{ {
var p = dbContext.AttachToOrGet<Project>(_ => _.Id == project.Id, () => project); var p = dbContext.AttachToOrGet<Project>(_ => _.Id == project.Id, () => project);
entity.Projects.Add(p); entity.Projects.Add(p);
@ -290,7 +290,7 @@ public class SecretRepository : Repository<Core.SecretsManager.Entities.Secret,
var policy = await query.FirstOrDefaultAsync(); var policy = await query.FirstOrDefaultAsync();
return (policy.Read, policy.Write); return policy == null ? (false, false) : (policy.Read, policy.Write);
} }
private IQueryable<SecretPermissionDetails> SecretToPermissionDetails(IQueryable<Secret> query, Guid userId, AccessClientType accessType) private IQueryable<SecretPermissionDetails> SecretToPermissionDetails(IQueryable<Secret> query, Guid userId, AccessClientType accessType)

View File

@ -23,8 +23,8 @@ public class AccessTokenCreationResponseModel : ResponseModel
} }
public Guid Id { get; set; } public Guid Id { get; set; }
public string Name { get; set; } public string? Name { get; set; }
public string ClientSecret { get; set; } public string? ClientSecret { get; set; }
public DateTime? ExpireAt { get; set; } public DateTime? ExpireAt { get; set; }
public DateTime CreationDate { get; set; } public DateTime CreationDate { get; set; }
public DateTime RevisionDate { get; set; } public DateTime RevisionDate { get; set; }

View File

@ -71,5 +71,5 @@ public class PotentialGranteeResponseModel : ResponseModel
public string Name { get; set; } public string Name { get; set; }
public string Type { get; set; } public string Type { get; set; }
public string? Email { get; set; } public string Email { get; set; }
} }

View File

@ -131,12 +131,12 @@ public class StripeController : Controller
if (subCanceled || subUnpaid || subIncompleteExpired) if (subCanceled || subUnpaid || subIncompleteExpired)
{ {
// org // org
if (organizationId != null && organizationId != Guid.Empty) if (organizationId != Guid.Empty)
{ {
await _organizationService.DisableAsync(organizationId, subscription.CurrentPeriodEnd); await _organizationService.DisableAsync(organizationId, subscription.CurrentPeriodEnd);
} }
// user // user
else if (userId != null && userId != Guid.Empty) else if (userId != Guid.Empty)
{ {
await _userService.DisablePremiumAsync(userId, subscription.CurrentPeriodEnd); await _userService.DisablePremiumAsync(userId, subscription.CurrentPeriodEnd);
} }
@ -145,11 +145,11 @@ public class StripeController : Controller
if (subActive) if (subActive)
{ {
if (organizationId != null && organizationId != Guid.Empty) if (organizationId != Guid.Empty)
{ {
await _organizationService.EnableAsync(organizationId); await _organizationService.EnableAsync(organizationId);
} }
else if (userId != null && userId != Guid.Empty) else if (userId != Guid.Empty)
{ {
await _userService.EnablePremiumAsync(userId, await _userService.EnablePremiumAsync(userId,
subscription.CurrentPeriodEnd); subscription.CurrentPeriodEnd);
@ -159,7 +159,7 @@ public class StripeController : Controller
if (subUpdated) if (subUpdated)
{ {
// org // org
if (organizationId != null && organizationId != Guid.Empty) if (organizationId != Guid.Empty)
{ {
await _organizationService.UpdateExpirationDateAsync(organizationId, await _organizationService.UpdateExpirationDateAsync(organizationId,
subscription.CurrentPeriodEnd); subscription.CurrentPeriodEnd);
@ -169,7 +169,7 @@ public class StripeController : Controller
} }
} }
// user // user
else if (userId != null && userId != Guid.Empty) else if (userId != Guid.Empty)
{ {
await _userService.UpdatePremiumExpirationAsync(userId, await _userService.UpdatePremiumExpirationAsync(userId,
subscription.CurrentPeriodEnd); subscription.CurrentPeriodEnd);

View File

@ -69,5 +69,5 @@ public class ReferenceEvent
public bool? SalesAssistedTrialStarted { get; set; } public bool? SalesAssistedTrialStarted { get; set; }
public string ClientId { get; set; } public string ClientId { get; set; }
public Version? ClientVersion { get; set; } public Version ClientVersion { get; set; }
} }

View File

@ -111,11 +111,11 @@ public class OrganizationDomainRepository : Repository<Core.Entities.Organizatio
var dbContext = GetDatabaseContext(scope); var dbContext = GetDatabaseContext(scope);
//Get domains that have not been verified after 72 hours //Get domains that have not been verified after 72 hours
var domains = dbContext.OrganizationDomains var domains = await dbContext.OrganizationDomains
.AsEnumerable()
.Where(x => (DateTime.UtcNow - x.CreationDate).Days == 4 .Where(x => (DateTime.UtcNow - x.CreationDate).Days == 4
&& x.VerifiedDate == null) && x.VerifiedDate == null)
.ToList(); .AsNoTracking()
.ToListAsync();
return Mapper.Map<List<Core.Entities.OrganizationDomain>>(domains); return Mapper.Map<List<Core.Entities.OrganizationDomain>>(domains);
} }

View File

@ -9,9 +9,6 @@ namespace Bit.Api.IntegrationTest.SecretsManager.Controllers;
public class SecretsManagerPortingControllerTests : IClassFixture<ApiApplicationFactory>, IAsyncLifetime public class SecretsManagerPortingControllerTests : IClassFixture<ApiApplicationFactory>, IAsyncLifetime
{ {
private readonly string _mockEncryptedString =
"2.3Uk+WNBIoU5xzmVFNcoWzz==|1MsPIYuRfdOHfu/0uY6H2Q==|/98sp4wb6pHP1VTZ9JcNCYgQjEUMFPlqJgCwRk1YXKg=";
private readonly HttpClient _client; private readonly HttpClient _client;
private readonly ApiApplicationFactory _factory; private readonly ApiApplicationFactory _factory;
private readonly IProjectRepository _projectRepository; private readonly IProjectRepository _projectRepository;

View File

@ -38,7 +38,6 @@ public class OrganizationsControllerTests : IDisposable
private readonly ICloudGetOrganizationLicenseQuery _cloudGetOrganizationLicenseQuery; private readonly ICloudGetOrganizationLicenseQuery _cloudGetOrganizationLicenseQuery;
private readonly ICreateOrganizationApiKeyCommand _createOrganizationApiKeyCommand; private readonly ICreateOrganizationApiKeyCommand _createOrganizationApiKeyCommand;
private readonly IUpdateOrganizationLicenseCommand _updateOrganizationLicenseCommand; private readonly IUpdateOrganizationLicenseCommand _updateOrganizationLicenseCommand;
private readonly IOrganizationDomainRepository _organizationDomainRepository;
private readonly IFeatureService _featureService; private readonly IFeatureService _featureService;
private readonly ILicensingService _licensingService; private readonly ILicensingService _licensingService;

View File

@ -17,7 +17,7 @@ public class SelfHostedOrganizationDetailsTests
[Theory] [Theory]
[BitAutoData] [BitAutoData]
[OrganizationLicenseCustomize] [OrganizationLicenseCustomize]
public async Task ValidateForOrganization_Success(List<OrganizationUser> orgUsers, public void ValidateForOrganization_Success(List<OrganizationUser> orgUsers,
List<Policy> policies, SsoConfig ssoConfig, List<OrganizationConnection<ScimConfig>> scimConnections, OrganizationLicense license) List<Policy> policies, SsoConfig ssoConfig, List<OrganizationConnection<ScimConfig>> scimConnections, OrganizationLicense license)
{ {
var (orgDetails, orgLicense) = GetOrganizationAndLicense(orgUsers, policies, ssoConfig, scimConnections, license); var (orgDetails, orgLicense) = GetOrganizationAndLicense(orgUsers, policies, ssoConfig, scimConnections, license);
@ -31,7 +31,7 @@ public class SelfHostedOrganizationDetailsTests
[Theory] [Theory]
[BitAutoData] [BitAutoData]
[OrganizationLicenseCustomize] [OrganizationLicenseCustomize]
public async Task ValidateForOrganization_OccupiedSeatCount_ExceedsLicense_Fail(List<OrganizationUser> orgUsers, public void ValidateForOrganization_OccupiedSeatCount_ExceedsLicense_Fail(List<OrganizationUser> orgUsers,
List<Policy> policies, SsoConfig ssoConfig, List<OrganizationConnection<ScimConfig>> scimConnections, OrganizationLicense license) List<Policy> policies, SsoConfig ssoConfig, List<OrganizationConnection<ScimConfig>> scimConnections, OrganizationLicense license)
{ {
var (orgDetails, orgLicense) = GetOrganizationAndLicense(orgUsers, policies, ssoConfig, scimConnections, license); var (orgDetails, orgLicense) = GetOrganizationAndLicense(orgUsers, policies, ssoConfig, scimConnections, license);
@ -46,7 +46,7 @@ public class SelfHostedOrganizationDetailsTests
[Theory] [Theory]
[BitAutoData] [BitAutoData]
[OrganizationLicenseCustomize] [OrganizationLicenseCustomize]
public async Task ValidateForOrganization_MaxCollections_ExceedsLicense_Fail(List<OrganizationUser> orgUsers, public void ValidateForOrganization_MaxCollections_ExceedsLicense_Fail(List<OrganizationUser> orgUsers,
List<Policy> policies, SsoConfig ssoConfig, List<OrganizationConnection<ScimConfig>> scimConnections, OrganizationLicense license) List<Policy> policies, SsoConfig ssoConfig, List<OrganizationConnection<ScimConfig>> scimConnections, OrganizationLicense license)
{ {
var (orgDetails, orgLicense) = GetOrganizationAndLicense(orgUsers, policies, ssoConfig, scimConnections, license); var (orgDetails, orgLicense) = GetOrganizationAndLicense(orgUsers, policies, ssoConfig, scimConnections, license);
@ -61,7 +61,7 @@ public class SelfHostedOrganizationDetailsTests
[Theory] [Theory]
[BitAutoData] [BitAutoData]
[OrganizationLicenseCustomize] [OrganizationLicenseCustomize]
public async Task ValidateForOrganization_Groups_NotAllowedByLicense_Fail(List<OrganizationUser> orgUsers, public void ValidateForOrganization_Groups_NotAllowedByLicense_Fail(List<OrganizationUser> orgUsers,
List<Policy> policies, SsoConfig ssoConfig, List<OrganizationConnection<ScimConfig>> scimConnections, OrganizationLicense license) List<Policy> policies, SsoConfig ssoConfig, List<OrganizationConnection<ScimConfig>> scimConnections, OrganizationLicense license)
{ {
var (orgDetails, orgLicense) = GetOrganizationAndLicense(orgUsers, policies, ssoConfig, scimConnections, license); var (orgDetails, orgLicense) = GetOrganizationAndLicense(orgUsers, policies, ssoConfig, scimConnections, license);
@ -76,7 +76,7 @@ public class SelfHostedOrganizationDetailsTests
[Theory] [Theory]
[BitAutoData] [BitAutoData]
[OrganizationLicenseCustomize] [OrganizationLicenseCustomize]
public async Task ValidateForOrganization_Policies_NotAllowedByLicense_Fail(List<OrganizationUser> orgUsers, public void ValidateForOrganization_Policies_NotAllowedByLicense_Fail(List<OrganizationUser> orgUsers,
List<Policy> policies, SsoConfig ssoConfig, List<OrganizationConnection<ScimConfig>> scimConnections, OrganizationLicense license) List<Policy> policies, SsoConfig ssoConfig, List<OrganizationConnection<ScimConfig>> scimConnections, OrganizationLicense license)
{ {
var (orgDetails, orgLicense) = GetOrganizationAndLicense(orgUsers, policies, ssoConfig, scimConnections, license); var (orgDetails, orgLicense) = GetOrganizationAndLicense(orgUsers, policies, ssoConfig, scimConnections, license);
@ -91,7 +91,7 @@ public class SelfHostedOrganizationDetailsTests
[Theory] [Theory]
[BitAutoData] [BitAutoData]
[OrganizationLicenseCustomize] [OrganizationLicenseCustomize]
public async Task ValidateForOrganization_DisabledPolicies_NotAllowedByLicense_Success(List<OrganizationUser> orgUsers, public void ValidateForOrganization_DisabledPolicies_NotAllowedByLicense_Success(List<OrganizationUser> orgUsers,
List<Policy> policies, SsoConfig ssoConfig, List<OrganizationConnection<ScimConfig>> scimConnections, OrganizationLicense license) List<Policy> policies, SsoConfig ssoConfig, List<OrganizationConnection<ScimConfig>> scimConnections, OrganizationLicense license)
{ {
var (orgDetails, orgLicense) = GetOrganizationAndLicense(orgUsers, policies, ssoConfig, scimConnections, license); var (orgDetails, orgLicense) = GetOrganizationAndLicense(orgUsers, policies, ssoConfig, scimConnections, license);
@ -107,7 +107,7 @@ public class SelfHostedOrganizationDetailsTests
[Theory] [Theory]
[BitAutoData] [BitAutoData]
[OrganizationLicenseCustomize] [OrganizationLicenseCustomize]
public async Task ValidateForOrganization_Sso_NotAllowedByLicense_Fail(List<OrganizationUser> orgUsers, public void ValidateForOrganization_Sso_NotAllowedByLicense_Fail(List<OrganizationUser> orgUsers,
List<Policy> policies, SsoConfig ssoConfig, List<OrganizationConnection<ScimConfig>> scimConnections, OrganizationLicense license) List<Policy> policies, SsoConfig ssoConfig, List<OrganizationConnection<ScimConfig>> scimConnections, OrganizationLicense license)
{ {
var (orgDetails, orgLicense) = GetOrganizationAndLicense(orgUsers, policies, ssoConfig, scimConnections, license); var (orgDetails, orgLicense) = GetOrganizationAndLicense(orgUsers, policies, ssoConfig, scimConnections, license);
@ -122,7 +122,7 @@ public class SelfHostedOrganizationDetailsTests
[Theory] [Theory]
[BitAutoData] [BitAutoData]
[OrganizationLicenseCustomize] [OrganizationLicenseCustomize]
public async Task ValidateForOrganization_DisabledSso_NotAllowedByLicense_Success(List<OrganizationUser> orgUsers, public void ValidateForOrganization_DisabledSso_NotAllowedByLicense_Success(List<OrganizationUser> orgUsers,
List<Policy> policies, SsoConfig ssoConfig, List<OrganizationConnection<ScimConfig>> scimConnections, OrganizationLicense license) List<Policy> policies, SsoConfig ssoConfig, List<OrganizationConnection<ScimConfig>> scimConnections, OrganizationLicense license)
{ {
var (orgDetails, orgLicense) = GetOrganizationAndLicense(orgUsers, policies, ssoConfig, scimConnections, license); var (orgDetails, orgLicense) = GetOrganizationAndLicense(orgUsers, policies, ssoConfig, scimConnections, license);
@ -138,7 +138,7 @@ public class SelfHostedOrganizationDetailsTests
[Theory] [Theory]
[BitAutoData] [BitAutoData]
[OrganizationLicenseCustomize] [OrganizationLicenseCustomize]
public async Task ValidateForOrganization_NoSso_NotAllowedByLicense_Success(List<OrganizationUser> orgUsers, public void ValidateForOrganization_NoSso_NotAllowedByLicense_Success(List<OrganizationUser> orgUsers,
List<Policy> policies, SsoConfig ssoConfig, List<OrganizationConnection<ScimConfig>> scimConnections, OrganizationLicense license) List<Policy> policies, SsoConfig ssoConfig, List<OrganizationConnection<ScimConfig>> scimConnections, OrganizationLicense license)
{ {
var (orgDetails, orgLicense) = GetOrganizationAndLicense(orgUsers, policies, ssoConfig, scimConnections, license); var (orgDetails, orgLicense) = GetOrganizationAndLicense(orgUsers, policies, ssoConfig, scimConnections, license);
@ -154,7 +154,7 @@ public class SelfHostedOrganizationDetailsTests
[Theory] [Theory]
[BitAutoData] [BitAutoData]
[OrganizationLicenseCustomize] [OrganizationLicenseCustomize]
public async Task ValidateForOrganization_KeyConnector_NotAllowedByLicense_Fail(List<OrganizationUser> orgUsers, public void ValidateForOrganization_KeyConnector_NotAllowedByLicense_Fail(List<OrganizationUser> orgUsers,
List<Policy> policies, SsoConfig ssoConfig, List<OrganizationConnection<ScimConfig>> scimConnections, OrganizationLicense license) List<Policy> policies, SsoConfig ssoConfig, List<OrganizationConnection<ScimConfig>> scimConnections, OrganizationLicense license)
{ {
var (orgDetails, orgLicense) = GetOrganizationAndLicense(orgUsers, policies, ssoConfig, scimConnections, license); var (orgDetails, orgLicense) = GetOrganizationAndLicense(orgUsers, policies, ssoConfig, scimConnections, license);
@ -169,7 +169,7 @@ public class SelfHostedOrganizationDetailsTests
[Theory] [Theory]
[BitAutoData] [BitAutoData]
[OrganizationLicenseCustomize] [OrganizationLicenseCustomize]
public async Task ValidateForOrganization_DisabledKeyConnector_NotAllowedByLicense_Success(List<OrganizationUser> orgUsers, public void ValidateForOrganization_DisabledKeyConnector_NotAllowedByLicense_Success(List<OrganizationUser> orgUsers,
List<Policy> policies, SsoConfig ssoConfig, List<OrganizationConnection<ScimConfig>> scimConnections, OrganizationLicense license) List<Policy> policies, SsoConfig ssoConfig, List<OrganizationConnection<ScimConfig>> scimConnections, OrganizationLicense license)
{ {
var (orgDetails, orgLicense) = GetOrganizationAndLicense(orgUsers, policies, ssoConfig, scimConnections, license); var (orgDetails, orgLicense) = GetOrganizationAndLicense(orgUsers, policies, ssoConfig, scimConnections, license);
@ -185,7 +185,7 @@ public class SelfHostedOrganizationDetailsTests
[Theory] [Theory]
[BitAutoData] [BitAutoData]
[OrganizationLicenseCustomize] [OrganizationLicenseCustomize]
public async Task ValidateForOrganization_NoSsoKeyConnector_NotAllowedByLicense_Success(List<OrganizationUser> orgUsers, public void ValidateForOrganization_NoSsoKeyConnector_NotAllowedByLicense_Success(List<OrganizationUser> orgUsers,
List<Policy> policies, SsoConfig ssoConfig, List<OrganizationConnection<ScimConfig>> scimConnections, OrganizationLicense license) List<Policy> policies, SsoConfig ssoConfig, List<OrganizationConnection<ScimConfig>> scimConnections, OrganizationLicense license)
{ {
var (orgDetails, orgLicense) = GetOrganizationAndLicense(orgUsers, policies, ssoConfig, scimConnections, license); var (orgDetails, orgLicense) = GetOrganizationAndLicense(orgUsers, policies, ssoConfig, scimConnections, license);
@ -201,7 +201,7 @@ public class SelfHostedOrganizationDetailsTests
[Theory] [Theory]
[BitAutoData] [BitAutoData]
[OrganizationLicenseCustomize] [OrganizationLicenseCustomize]
public async Task ValidateForOrganization_Scim_NotAllowedByLicense_Fail(List<OrganizationUser> orgUsers, public void ValidateForOrganization_Scim_NotAllowedByLicense_Fail(List<OrganizationUser> orgUsers,
List<Policy> policies, SsoConfig ssoConfig, List<OrganizationConnection<ScimConfig>> scimConnections, OrganizationLicense license) List<Policy> policies, SsoConfig ssoConfig, List<OrganizationConnection<ScimConfig>> scimConnections, OrganizationLicense license)
{ {
var (orgDetails, orgLicense) = GetOrganizationAndLicense(orgUsers, policies, ssoConfig, scimConnections, license); var (orgDetails, orgLicense) = GetOrganizationAndLicense(orgUsers, policies, ssoConfig, scimConnections, license);
@ -216,7 +216,7 @@ public class SelfHostedOrganizationDetailsTests
[Theory] [Theory]
[BitAutoData] [BitAutoData]
[OrganizationLicenseCustomize] [OrganizationLicenseCustomize]
public async Task ValidateForOrganization_DisabledScim_NotAllowedByLicense_Success(List<OrganizationUser> orgUsers, public void ValidateForOrganization_DisabledScim_NotAllowedByLicense_Success(List<OrganizationUser> orgUsers,
List<Policy> policies, SsoConfig ssoConfig, List<OrganizationConnection<ScimConfig>> scimConnections, OrganizationLicense license) List<Policy> policies, SsoConfig ssoConfig, List<OrganizationConnection<ScimConfig>> scimConnections, OrganizationLicense license)
{ {
var (orgDetails, orgLicense) = GetOrganizationAndLicense(orgUsers, policies, ssoConfig, scimConnections, license); var (orgDetails, orgLicense) = GetOrganizationAndLicense(orgUsers, policies, ssoConfig, scimConnections, license);
@ -233,7 +233,7 @@ public class SelfHostedOrganizationDetailsTests
[Theory] [Theory]
[BitAutoData] [BitAutoData]
[OrganizationLicenseCustomize] [OrganizationLicenseCustomize]
public async Task ValidateForOrganization_NoScimConfig_NotAllowedByLicense_Success(List<OrganizationUser> orgUsers, public void ValidateForOrganization_NoScimConfig_NotAllowedByLicense_Success(List<OrganizationUser> orgUsers,
List<Policy> policies, SsoConfig ssoConfig, List<OrganizationConnection<ScimConfig>> scimConnections, OrganizationLicense license) List<Policy> policies, SsoConfig ssoConfig, List<OrganizationConnection<ScimConfig>> scimConnections, OrganizationLicense license)
{ {
var (orgDetails, orgLicense) = GetOrganizationAndLicense(orgUsers, policies, ssoConfig, scimConnections, license); var (orgDetails, orgLicense) = GetOrganizationAndLicense(orgUsers, policies, ssoConfig, scimConnections, license);
@ -249,7 +249,7 @@ public class SelfHostedOrganizationDetailsTests
[Theory] [Theory]
[BitAutoData] [BitAutoData]
[OrganizationLicenseCustomize] [OrganizationLicenseCustomize]
public async Task ValidateForOrganization_CustomPermissions_NotAllowedByLicense_Fail(List<OrganizationUser> orgUsers, public void ValidateForOrganization_CustomPermissions_NotAllowedByLicense_Fail(List<OrganizationUser> orgUsers,
List<Policy> policies, SsoConfig ssoConfig, List<OrganizationConnection<ScimConfig>> scimConnections, OrganizationLicense license) List<Policy> policies, SsoConfig ssoConfig, List<OrganizationConnection<ScimConfig>> scimConnections, OrganizationLicense license)
{ {
var (orgDetails, orgLicense) = GetOrganizationAndLicense(orgUsers, policies, ssoConfig, scimConnections, license); var (orgDetails, orgLicense) = GetOrganizationAndLicense(orgUsers, policies, ssoConfig, scimConnections, license);
@ -264,7 +264,7 @@ public class SelfHostedOrganizationDetailsTests
[Theory] [Theory]
[BitAutoData] [BitAutoData]
[OrganizationLicenseCustomize] [OrganizationLicenseCustomize]
public async Task ValidateForOrganization_NoCustomPermissions_NotAllowedByLicense_Success(List<OrganizationUser> orgUsers, public void ValidateForOrganization_NoCustomPermissions_NotAllowedByLicense_Success(List<OrganizationUser> orgUsers,
List<Policy> policies, SsoConfig ssoConfig, List<OrganizationConnection<ScimConfig>> scimConnections, OrganizationLicense license) List<Policy> policies, SsoConfig ssoConfig, List<OrganizationConnection<ScimConfig>> scimConnections, OrganizationLicense license)
{ {
var (orgDetails, orgLicense) = GetOrganizationAndLicense(orgUsers, policies, ssoConfig, scimConnections, license); var (orgDetails, orgLicense) = GetOrganizationAndLicense(orgUsers, policies, ssoConfig, scimConnections, license);
@ -280,7 +280,7 @@ public class SelfHostedOrganizationDetailsTests
[Theory] [Theory]
[BitAutoData] [BitAutoData]
[OrganizationLicenseCustomize] [OrganizationLicenseCustomize]
public async Task ValidateForOrganization_ResetPassword_NotAllowedByLicense_Fail(List<OrganizationUser> orgUsers, public void ValidateForOrganization_ResetPassword_NotAllowedByLicense_Fail(List<OrganizationUser> orgUsers,
List<Policy> policies, SsoConfig ssoConfig, List<OrganizationConnection<ScimConfig>> scimConnections, OrganizationLicense license) List<Policy> policies, SsoConfig ssoConfig, List<OrganizationConnection<ScimConfig>> scimConnections, OrganizationLicense license)
{ {
var (orgDetails, orgLicense) = GetOrganizationAndLicense(orgUsers, policies, ssoConfig, scimConnections, license); var (orgDetails, orgLicense) = GetOrganizationAndLicense(orgUsers, policies, ssoConfig, scimConnections, license);
@ -295,7 +295,7 @@ public class SelfHostedOrganizationDetailsTests
[Theory] [Theory]
[BitAutoData] [BitAutoData]
[OrganizationLicenseCustomize] [OrganizationLicenseCustomize]
public async Task ValidateForOrganization_DisabledResetPassword_NotAllowedByLicense_Success(List<OrganizationUser> orgUsers, public void ValidateForOrganization_DisabledResetPassword_NotAllowedByLicense_Success(List<OrganizationUser> orgUsers,
List<Policy> policies, SsoConfig ssoConfig, List<OrganizationConnection<ScimConfig>> scimConnections, OrganizationLicense license) List<Policy> policies, SsoConfig ssoConfig, List<OrganizationConnection<ScimConfig>> scimConnections, OrganizationLicense license)
{ {
var (orgDetails, orgLicense) = GetOrganizationAndLicense(orgUsers, policies, ssoConfig, scimConnections, license); var (orgDetails, orgLicense) = GetOrganizationAndLicense(orgUsers, policies, ssoConfig, scimConnections, license);

View File

@ -180,18 +180,14 @@ public class CipherRepositoryTests
List<EfRepo.OrganizationRepository> efOrgRepos List<EfRepo.OrganizationRepository> efOrgRepos
) => await DeleteAsync_CipherIsDeleted(cipher, user, org, suts, efUserRepos, efOrgRepos); ) => await DeleteAsync_CipherIsDeleted(cipher, user, org, suts, efUserRepos, efOrgRepos);
[CiSkippedTheory, EfOrganizationCipherCustomize, BitAutoData] [CiSkippedTheory, EfOrganizationCipherCustomize, BitAutoData]
public Task OrganizationCipher_DeleteAsync_CipherIsDeleted( public async Task OrganizationCipher_DeleteAsync_CipherIsDeleted(
Cipher cipher, Cipher cipher,
User user, User user,
Organization org, Organization org,
List<EfVaultRepo.CipherRepository> suts, List<EfVaultRepo.CipherRepository> suts,
List<EfRepo.UserRepository> efUserRepos, List<EfRepo.UserRepository> efUserRepos,
List<EfRepo.OrganizationRepository> efOrgRepos List<EfRepo.OrganizationRepository> efOrgRepos
) ) => await DeleteAsync_CipherIsDeleted(cipher, user, org, suts, efUserRepos, efOrgRepos);
{
DeleteAsync_CipherIsDeleted(cipher, user, org, suts, efUserRepos, efOrgRepos);
return Task.CompletedTask;
}
private async Task DeleteAsync_CipherIsDeleted( private async Task DeleteAsync_CipherIsDeleted(
Cipher cipher, Cipher cipher,

View File

@ -154,9 +154,9 @@ public abstract class WebApplicationFactoryBase<T> : WebApplicationFactory<T>
return scope.ServiceProvider.GetRequiredService<DatabaseContext>(); return scope.ServiceProvider.GetRequiredService<DatabaseContext>();
} }
public T GetService<T>() public TS GetService<TS>()
{ {
var scope = Services.CreateScope(); var scope = Services.CreateScope();
return scope.ServiceProvider.GetRequiredService<T>(); return scope.ServiceProvider.GetRequiredService<TS>();
} }
} }

View File

@ -14,12 +14,12 @@ namespace Bit.EfShared;
public static class MigrationBuilderExtensions public static class MigrationBuilderExtensions
{ {
/// <summary> /// <summary>
/// Reads an embedded resource for it's SQL contents and formats it with the specified direction for easier custom migration steps /// Reads an embedded resource for its SQL contents and formats it with the specified direction for easier custom migration steps
/// </summary> /// </summary>
/// <param name="migrationBuilder">The MigrationBuilder instance the sql should be applied to</param> /// <param name="migrationBuilder">The MigrationBuilder instance the sql should be applied to</param>
/// <param name="resourceName">The file name portion of the resource name, it is assumed to be in a Scripts folder</param> /// <param name="resourceName">The file name portion of the resource name, it is assumed to be in a Scripts folder</param>
/// <param name="dir">The direction of the migration taking place</param> /// <param name="dir">The direction of the migration taking place</param>
public static void SqlResource(this MigrationBuilder migrationBuilder, string resourceName, [CallerMemberName] string dir = null) public static void SqlResource(this MigrationBuilder migrationBuilder, string resourceName, [CallerMemberName] string dir = "")
{ {
var formattedResourceName = string.IsNullOrEmpty(dir) ? resourceName : string.Format(resourceName, dir); var formattedResourceName = string.IsNullOrEmpty(dir) ? resourceName : string.Format(resourceName, dir);