From 53ba2eeb189e34e2504d4355fd92965e8a998ac3 Mon Sep 17 00:00:00 2001 From: Thomas Avery <43214426+Thomas-Avery@users.noreply.github.com> Date: Thu, 19 Jan 2023 17:31:19 -0600 Subject: [PATCH] [SM-390] Project Access Policies (#2507) The purpose of this PR is to create server endpoints for creating, reading, updating, and deleting access policies for projects. --- .../CreateAccessPoliciesCommand.cs | 45 +++++ .../DeleteAccessPolicyCommand.cs | 27 +++ .../UpdateAccessPolicyCommand.cs | 32 +++ .../SecretManagerCollectionExtensions.cs | 8 +- ...CommercialEFServiceCollectionExtensions.cs | 2 - .../Repositories/AccessPolicyRepository.cs | 171 ++++++++++++++++ .../CreateAccessPoliciesCommandTests.cs | 126 ++++++++++++ .../DeleteAccessPolicyCommandTests.cs | 38 ++++ .../UpdateAccessPolicyCommandTests.cs | 40 ++++ .../Controllers/AccessPoliciesController.cs | 69 +++++++ .../Request/AccessPoliciesCreateRequest.cs | 77 ++++++++ .../Request/AccessPolicyUpdateRequest.cs | 12 ++ .../Response/AccessPolicyResponseModel.cs | 128 ++++++++++++ .../ProjectAccessPoliciesResponseModel.cs | 43 ++++ src/Core/Entities/AccessPolicy.cs | 38 +--- .../Repositories/IAccessPolicyRepository.cs | 11 +- .../ICreateAccessPoliciesCommand.cs | 8 + .../Interfaces/IDeleteAccessPolicyCommand.cs | 6 + .../Interfaces/IUpdateAccessPolicyCommand.cs | 8 + .../Models/AccessPolicy.cs | 5 +- .../Repositories/AccessPolicyRepository.cs | 27 --- .../Repositories/DatabaseContext.cs | 3 + .../AccessPoliciesControllerTest.cs | 185 ++++++++++++++++++ .../AccessPoliciesControllerTests.cs | 87 ++++++++ 24 files changed, 1133 insertions(+), 63 deletions(-) create mode 100644 bitwarden_license/src/Commercial.Core/SecretManagerFeatures/AccessPolicies/CreateAccessPoliciesCommand.cs create mode 100644 bitwarden_license/src/Commercial.Core/SecretManagerFeatures/AccessPolicies/DeleteAccessPolicyCommand.cs create mode 100644 bitwarden_license/src/Commercial.Core/SecretManagerFeatures/AccessPolicies/UpdateAccessPolicyCommand.cs create mode 100644 bitwarden_license/src/Commercial.Infrastructure.EntityFramework/Repositories/AccessPolicyRepository.cs create mode 100644 bitwarden_license/test/Commercial.Core.Test/SecretManagerFeatures/AccessPolicies/CreateAccessPoliciesCommandTests.cs create mode 100644 bitwarden_license/test/Commercial.Core.Test/SecretManagerFeatures/AccessPolicies/DeleteAccessPolicyCommandTests.cs create mode 100644 bitwarden_license/test/Commercial.Core.Test/SecretManagerFeatures/AccessPolicies/UpdateAccessPolicyCommandTests.cs create mode 100644 src/Api/Controllers/AccessPoliciesController.cs create mode 100644 src/Api/SecretManagerFeatures/Models/Request/AccessPoliciesCreateRequest.cs create mode 100644 src/Api/SecretManagerFeatures/Models/Request/AccessPolicyUpdateRequest.cs create mode 100644 src/Api/SecretManagerFeatures/Models/Response/AccessPolicyResponseModel.cs create mode 100644 src/Api/SecretManagerFeatures/Models/Response/ProjectAccessPoliciesResponseModel.cs create mode 100644 src/Core/SecretManagerFeatures/AccessPolicies/Interfaces/ICreateAccessPoliciesCommand.cs create mode 100644 src/Core/SecretManagerFeatures/AccessPolicies/Interfaces/IDeleteAccessPolicyCommand.cs create mode 100644 src/Core/SecretManagerFeatures/AccessPolicies/Interfaces/IUpdateAccessPolicyCommand.cs delete mode 100644 src/Infrastructure.EntityFramework/Repositories/AccessPolicyRepository.cs create mode 100644 test/Api.IntegrationTest/Controllers/AccessPoliciesControllerTest.cs create mode 100644 test/Api.Test/Controllers/AccessPoliciesControllerTests.cs diff --git a/bitwarden_license/src/Commercial.Core/SecretManagerFeatures/AccessPolicies/CreateAccessPoliciesCommand.cs b/bitwarden_license/src/Commercial.Core/SecretManagerFeatures/AccessPolicies/CreateAccessPoliciesCommand.cs new file mode 100644 index 0000000000..ea776bac79 --- /dev/null +++ b/bitwarden_license/src/Commercial.Core/SecretManagerFeatures/AccessPolicies/CreateAccessPoliciesCommand.cs @@ -0,0 +1,45 @@ +using Bit.Core.Entities; +using Bit.Core.Exceptions; +using Bit.Core.Repositories; +using Bit.Core.SecretManagerFeatures.AccessPolicies.Interfaces; + +namespace Bit.Commercial.Core.SecretManagerFeatures.AccessPolicies; + +public class CreateAccessPoliciesCommand : ICreateAccessPoliciesCommand +{ + private readonly IAccessPolicyRepository _accessPolicyRepository; + + public CreateAccessPoliciesCommand(IAccessPolicyRepository accessPolicyRepository) + { + _accessPolicyRepository = accessPolicyRepository; + } + + public async Task> CreateAsync(List accessPolicies) + { + var distinctAccessPolicies = accessPolicies.DistinctBy(baseAccessPolicy => + { + return baseAccessPolicy switch + { + UserProjectAccessPolicy ap => new Tuple(ap.OrganizationUserId, ap.GrantedProjectId), + GroupProjectAccessPolicy ap => new Tuple(ap.GroupId, ap.GrantedProjectId), + ServiceAccountProjectAccessPolicy ap => new Tuple(ap.ServiceAccountId, ap.GrantedProjectId), + _ => throw new ArgumentException("Unsupported access policy type provided.", nameof(baseAccessPolicy)) + }; + }).ToList(); + + if (accessPolicies.Count != distinctAccessPolicies.Count) + { + throw new BadRequestException("Resources must be unique"); + } + + foreach (var accessPolicy in accessPolicies) + { + if (await _accessPolicyRepository.AccessPolicyExists(accessPolicy)) + { + throw new BadRequestException("Resource already exists"); + } + } + + return await _accessPolicyRepository.CreateManyAsync(accessPolicies); + } +} diff --git a/bitwarden_license/src/Commercial.Core/SecretManagerFeatures/AccessPolicies/DeleteAccessPolicyCommand.cs b/bitwarden_license/src/Commercial.Core/SecretManagerFeatures/AccessPolicies/DeleteAccessPolicyCommand.cs new file mode 100644 index 0000000000..f84ca88bcb --- /dev/null +++ b/bitwarden_license/src/Commercial.Core/SecretManagerFeatures/AccessPolicies/DeleteAccessPolicyCommand.cs @@ -0,0 +1,27 @@ +using Bit.Core.Exceptions; +using Bit.Core.Repositories; +using Bit.Core.SecretManagerFeatures.AccessPolicies.Interfaces; + +namespace Bit.Commercial.Core.SecretManagerFeatures.AccessPolicies; + +public class DeleteAccessPolicyCommand : IDeleteAccessPolicyCommand +{ + private readonly IAccessPolicyRepository _accessPolicyRepository; + + public DeleteAccessPolicyCommand(IAccessPolicyRepository accessPolicyRepository) + { + _accessPolicyRepository = accessPolicyRepository; + } + + + public async Task DeleteAsync(Guid id) + { + var accessPolicy = await _accessPolicyRepository.GetByIdAsync(id); + if (accessPolicy == null) + { + throw new NotFoundException(); + } + + await _accessPolicyRepository.DeleteAsync(id); + } +} diff --git a/bitwarden_license/src/Commercial.Core/SecretManagerFeatures/AccessPolicies/UpdateAccessPolicyCommand.cs b/bitwarden_license/src/Commercial.Core/SecretManagerFeatures/AccessPolicies/UpdateAccessPolicyCommand.cs new file mode 100644 index 0000000000..6256b8b829 --- /dev/null +++ b/bitwarden_license/src/Commercial.Core/SecretManagerFeatures/AccessPolicies/UpdateAccessPolicyCommand.cs @@ -0,0 +1,32 @@ +using Bit.Core.Entities; +using Bit.Core.Exceptions; +using Bit.Core.Repositories; +using Bit.Core.SecretManagerFeatures.AccessPolicies.Interfaces; + +namespace Bit.Commercial.Core.SecretManagerFeatures.AccessPolicies; + +public class UpdateAccessPolicyCommand : IUpdateAccessPolicyCommand +{ + private readonly IAccessPolicyRepository _accessPolicyRepository; + + public UpdateAccessPolicyCommand(IAccessPolicyRepository accessPolicyRepository) + { + _accessPolicyRepository = accessPolicyRepository; + } + + public async Task UpdateAsync(Guid id, bool read, bool write) + { + var accessPolicy = await _accessPolicyRepository.GetByIdAsync(id); + if (accessPolicy == null) + { + throw new NotFoundException(); + } + + accessPolicy.Read = read; + accessPolicy.Write = write; + accessPolicy.RevisionDate = DateTime.UtcNow; + + await _accessPolicyRepository.ReplaceAsync(accessPolicy); + return accessPolicy; + } +} diff --git a/bitwarden_license/src/Commercial.Core/SecretManagerFeatures/SecretManagerCollectionExtensions.cs b/bitwarden_license/src/Commercial.Core/SecretManagerFeatures/SecretManagerCollectionExtensions.cs index f4a4f1bee1..5d3a871b50 100644 --- a/bitwarden_license/src/Commercial.Core/SecretManagerFeatures/SecretManagerCollectionExtensions.cs +++ b/bitwarden_license/src/Commercial.Core/SecretManagerFeatures/SecretManagerCollectionExtensions.cs @@ -1,7 +1,9 @@ -using Bit.Commercial.Core.SecretManagerFeatures.AccessTokens; +using Bit.Commercial.Core.SecretManagerFeatures.AccessPolicies; +using Bit.Commercial.Core.SecretManagerFeatures.AccessTokens; using Bit.Commercial.Core.SecretManagerFeatures.Projects; using Bit.Commercial.Core.SecretManagerFeatures.Secrets; using Bit.Commercial.Core.SecretManagerFeatures.ServiceAccounts; +using Bit.Core.SecretManagerFeatures.AccessPolicies.Interfaces; using Bit.Core.SecretManagerFeatures.AccessTokens.Interfaces; using Bit.Core.SecretManagerFeatures.Projects.Interfaces; using Bit.Core.SecretManagerFeatures.Secrets.Interfaces; @@ -23,6 +25,8 @@ public static class SecretManagerCollectionExtensions services.AddScoped(); services.AddScoped(); services.AddScoped(); + services.AddScoped(); + services.AddScoped(); + services.AddScoped(); } } - diff --git a/bitwarden_license/src/Commercial.Infrastructure.EntityFramework/CommercialEFServiceCollectionExtensions.cs b/bitwarden_license/src/Commercial.Infrastructure.EntityFramework/CommercialEFServiceCollectionExtensions.cs index 1fbc1bf9d8..05fee84fd5 100644 --- a/bitwarden_license/src/Commercial.Infrastructure.EntityFramework/CommercialEFServiceCollectionExtensions.cs +++ b/bitwarden_license/src/Commercial.Infrastructure.EntityFramework/CommercialEFServiceCollectionExtensions.cs @@ -1,6 +1,5 @@ using Bit.Commercial.Infrastructure.EntityFramework.Repositories; using Bit.Core.Repositories; -using Bit.Infrastructure.EntityFramework.Repositories; using Microsoft.Extensions.DependencyInjection; namespace Bit.Commercial.Infrastructure.EntityFramework; @@ -15,4 +14,3 @@ public static class CommercialEFServiceCollectionExtensions services.AddSingleton(); } } - diff --git a/bitwarden_license/src/Commercial.Infrastructure.EntityFramework/Repositories/AccessPolicyRepository.cs b/bitwarden_license/src/Commercial.Infrastructure.EntityFramework/Repositories/AccessPolicyRepository.cs new file mode 100644 index 0000000000..9d1d135f4e --- /dev/null +++ b/bitwarden_license/src/Commercial.Infrastructure.EntityFramework/Repositories/AccessPolicyRepository.cs @@ -0,0 +1,171 @@ +using AutoMapper; +using Bit.Core.Repositories; +using Bit.Infrastructure.EntityFramework.Models; +using Bit.Infrastructure.EntityFramework.Repositories; +using Microsoft.EntityFrameworkCore; +using Microsoft.Extensions.DependencyInjection; + +namespace Bit.Commercial.Infrastructure.EntityFramework.Repositories; + +public class AccessPolicyRepository : BaseEntityFrameworkRepository, IAccessPolicyRepository +{ + public AccessPolicyRepository(IServiceScopeFactory serviceScopeFactory, IMapper mapper) : base(serviceScopeFactory, + mapper) + { + } + + public async Task> CreateManyAsync(List baseAccessPolicies) + { + using (var scope = ServiceScopeFactory.CreateScope()) + { + var dbContext = GetDatabaseContext(scope); + foreach (var baseAccessPolicy in baseAccessPolicies) + { + baseAccessPolicy.SetNewId(); + switch (baseAccessPolicy) + { + case Core.Entities.UserProjectAccessPolicy accessPolicy: + { + var entity = + Mapper.Map(accessPolicy); + await dbContext.AddAsync(entity); + break; + } + case Core.Entities.GroupProjectAccessPolicy accessPolicy: + { + var entity = Mapper.Map(accessPolicy); + await dbContext.AddAsync(entity); + break; + } + case Core.Entities.ServiceAccountProjectAccessPolicy accessPolicy: + { + var entity = Mapper.Map(accessPolicy); + await dbContext.AddAsync(entity); + break; + } + } + } + + await dbContext.SaveChangesAsync(); + return baseAccessPolicies; + } + } + + public async Task AccessPolicyExists(Core.Entities.BaseAccessPolicy baseAccessPolicy) + { + using (var scope = ServiceScopeFactory.CreateScope()) + { + var dbContext = GetDatabaseContext(scope); + switch (baseAccessPolicy) + { + case Core.Entities.UserProjectAccessPolicy accessPolicy: + { + var policy = await dbContext.UserProjectAccessPolicy + .Where(c => c.OrganizationUserId == accessPolicy.OrganizationUserId && + c.GrantedProjectId == accessPolicy.GrantedProjectId) + .FirstOrDefaultAsync(); + return policy != null; + } + case Core.Entities.GroupProjectAccessPolicy accessPolicy: + { + var policy = await dbContext.GroupProjectAccessPolicy + .Where(c => c.GroupId == accessPolicy.GroupId && + c.GrantedProjectId == accessPolicy.GrantedProjectId) + .FirstOrDefaultAsync(); + return policy != null; + } + case Core.Entities.ServiceAccountProjectAccessPolicy accessPolicy: + { + var policy = await dbContext.ServiceAccountProjectAccessPolicy + .Where(c => c.ServiceAccountId == accessPolicy.ServiceAccountId && + c.GrantedProjectId == accessPolicy.GrantedProjectId) + .FirstOrDefaultAsync(); + return policy != null; + } + default: + throw new ArgumentException("Unsupported access policy type provided.", nameof(baseAccessPolicy)); + } + } + } + + public async Task GetByIdAsync(Guid id) + { + using (var scope = ServiceScopeFactory.CreateScope()) + { + var dbContext = GetDatabaseContext(scope); + var entity = await dbContext.AccessPolicies.Where(ap => ap.Id == id) + .Include(ap => ((UserProjectAccessPolicy)ap).OrganizationUser.User) + .Include(ap => ((GroupProjectAccessPolicy)ap).Group) + .Include(ap => ((ServiceAccountProjectAccessPolicy)ap).ServiceAccount) + .FirstOrDefaultAsync(); + + if (entity == null) + { + return null; + } + + return MapToCore(entity); + } + } + + public async Task ReplaceAsync(Core.Entities.BaseAccessPolicy baseAccessPolicy) + { + using (var scope = ServiceScopeFactory.CreateScope()) + { + var dbContext = GetDatabaseContext(scope); + var entity = await dbContext.AccessPolicies.FindAsync(baseAccessPolicy.Id); + if (entity != null) + { + dbContext.AccessPolicies.Attach(entity); + entity.Write = baseAccessPolicy.Write; + entity.Read = baseAccessPolicy.Read; + entity.RevisionDate = baseAccessPolicy.RevisionDate; + await dbContext.SaveChangesAsync(); + } + } + } + + public async Task?> GetManyByProjectId(Guid id) + { + using (var scope = ServiceScopeFactory.CreateScope()) + { + var dbContext = GetDatabaseContext(scope); + + var entities = await dbContext.AccessPolicies.Where(ap => + ((UserProjectAccessPolicy)ap).GrantedProjectId == id || + ((GroupProjectAccessPolicy)ap).GrantedProjectId == id || + ((ServiceAccountProjectAccessPolicy)ap).GrantedProjectId == id) + .Include(ap => ((UserProjectAccessPolicy)ap).OrganizationUser.User) + .Include(ap => ((GroupProjectAccessPolicy)ap).Group) + .Include(ap => ((ServiceAccountProjectAccessPolicy)ap).ServiceAccount) + .ToListAsync(); + + return !entities.Any() ? null : entities.Select(MapToCore); + } + } + + public async Task DeleteAsync(Guid id) + { + using (var scope = ServiceScopeFactory.CreateScope()) + { + var dbContext = GetDatabaseContext(scope); + var entity = await dbContext.AccessPolicies.FindAsync(id); + if (entity != null) + { + dbContext.Remove(entity); + await dbContext.SaveChangesAsync(); + } + } + } + + private Core.Entities.BaseAccessPolicy MapToCore(BaseAccessPolicy baseAccessPolicyEntity) + { + return baseAccessPolicyEntity switch + { + UserProjectAccessPolicy ap => Mapper.Map(ap), + GroupProjectAccessPolicy ap => Mapper.Map(ap), + ServiceAccountProjectAccessPolicy ap => Mapper.Map(ap), + _ => throw new ArgumentException("Unsupported access policy type") + }; + } +} diff --git a/bitwarden_license/test/Commercial.Core.Test/SecretManagerFeatures/AccessPolicies/CreateAccessPoliciesCommandTests.cs b/bitwarden_license/test/Commercial.Core.Test/SecretManagerFeatures/AccessPolicies/CreateAccessPoliciesCommandTests.cs new file mode 100644 index 0000000000..3d78102a5b --- /dev/null +++ b/bitwarden_license/test/Commercial.Core.Test/SecretManagerFeatures/AccessPolicies/CreateAccessPoliciesCommandTests.cs @@ -0,0 +1,126 @@ +using Bit.Commercial.Core.SecretManagerFeatures.AccessPolicies; +using Bit.Core.Entities; +using Bit.Core.Exceptions; +using Bit.Core.Repositories; +using Bit.Test.Common.AutoFixture; +using Bit.Test.Common.AutoFixture.Attributes; +using Bit.Test.Common.Helpers; +using NSubstitute; +using Xunit; + +namespace Bit.Commercial.Core.Test.SecretManagerFeatures.AccessPolicies; + +[SutProviderCustomize] +public class CreateAccessPoliciesCommandTests +{ + [Theory] + [BitAutoData] + public async Task CreateAsync_CallsCreate(List userProjectAccessPolicies, + List groupProjectAccessPolicies, + List serviceAccountProjectAccessPolicies, + SutProvider sutProvider) + { + var data = new List(); + data.AddRange(userProjectAccessPolicies); + data.AddRange(groupProjectAccessPolicies); + data.AddRange(serviceAccountProjectAccessPolicies); + + await sutProvider.Sut.CreateAsync(data); + + await sutProvider.GetDependency().Received(1) + .CreateManyAsync(Arg.Is(AssertHelper.AssertPropertyEqual(data))); + } + + [Theory] + [BitAutoData] + public async Task CreateAsync_AlreadyExists_Throws_BadRequestException( + List userProjectAccessPolicies, + List groupProjectAccessPolicies, + List serviceAccountProjectAccessPolicies, + SutProvider sutProvider) + { + var data = new List(); + data.AddRange(userProjectAccessPolicies); + data.AddRange(groupProjectAccessPolicies); + data.AddRange(serviceAccountProjectAccessPolicies); + + sutProvider.GetDependency().AccessPolicyExists(Arg.Any()) + .Returns(true); + + var exception = await Assert.ThrowsAsync(() => sutProvider.Sut.CreateAsync(data)); + + await sutProvider.GetDependency().DidNotReceiveWithAnyArgs().CreateManyAsync(default); + } + + + [Theory] + [BitAutoData(true, false, false)] + [BitAutoData(false, true, false)] + [BitAutoData(true, true, false)] + [BitAutoData(false, false, true)] + [BitAutoData(true, false, true)] + [BitAutoData(false, true, true)] + [BitAutoData(true, true, true)] + public async Task CreateAsync_NotUnique_ThrowsException( + bool testUserPolicies, + bool testGroupPolicies, + bool testServiceAccountPolicies, + List userProjectAccessPolicies, + List groupProjectAccessPolicies, + List serviceAccountProjectAccessPolicies, + SutProvider sutProvider + ) + { + var data = new List(); + data.AddRange(userProjectAccessPolicies); + data.AddRange(groupProjectAccessPolicies); + data.AddRange(serviceAccountProjectAccessPolicies); + + if (testUserPolicies) + { + var mockUserPolicy = new UserProjectAccessPolicy + { + OrganizationUserId = Guid.NewGuid(), + GrantedProjectId = Guid.NewGuid() + }; + data.Add(mockUserPolicy); + + // Add a duplicate policy + data.Add(mockUserPolicy); + } + + if (testGroupPolicies) + { + var mockGroupPolicy = new GroupProjectAccessPolicy + { + GroupId = Guid.NewGuid(), + GrantedProjectId = Guid.NewGuid() + }; + data.Add(mockGroupPolicy); + + // Add a duplicate policy + data.Add(mockGroupPolicy); + } + + if (testServiceAccountPolicies) + { + var mockServiceAccountPolicy = new ServiceAccountProjectAccessPolicy + { + ServiceAccountId = Guid.NewGuid(), + GrantedProjectId = Guid.NewGuid() + }; + data.Add(mockServiceAccountPolicy); + + // Add a duplicate policy + data.Add(mockServiceAccountPolicy); + } + + + sutProvider.GetDependency().AccessPolicyExists(Arg.Any()) + .Returns(true); + + var exception = await Assert.ThrowsAsync(() => sutProvider.Sut.CreateAsync(data)); + + await sutProvider.GetDependency().DidNotReceiveWithAnyArgs().CreateManyAsync(default); + } +} diff --git a/bitwarden_license/test/Commercial.Core.Test/SecretManagerFeatures/AccessPolicies/DeleteAccessPolicyCommandTests.cs b/bitwarden_license/test/Commercial.Core.Test/SecretManagerFeatures/AccessPolicies/DeleteAccessPolicyCommandTests.cs new file mode 100644 index 0000000000..e9f0875ce2 --- /dev/null +++ b/bitwarden_license/test/Commercial.Core.Test/SecretManagerFeatures/AccessPolicies/DeleteAccessPolicyCommandTests.cs @@ -0,0 +1,38 @@ +using Bit.Commercial.Core.SecretManagerFeatures.AccessPolicies; +using Bit.Core.Entities; +using Bit.Core.Exceptions; +using Bit.Core.Repositories; +using Bit.Test.Common.AutoFixture; +using Bit.Test.Common.AutoFixture.Attributes; +using NSubstitute; +using NSubstitute.ReturnsExtensions; +using Xunit; + +namespace Bit.Commercial.Core.Test.SecretManagerFeatures.AccessPolicies; + +[SutProviderCustomize] +public class DeleteAccessPolicyCommandTests +{ + [Theory] + [BitAutoData] + public async Task DeleteAccessPolicy_Throws_NotFoundException(Guid data, + SutProvider sutProvider) + { + sutProvider.GetDependency().GetByIdAsync(data).ReturnsNull(); + var exception = await Assert.ThrowsAsync(() => sutProvider.Sut.DeleteAsync(data)); + await sutProvider.GetDependency().DidNotReceiveWithAnyArgs().DeleteAsync(default); + } + + [Theory] + [BitAutoData] + public async Task DeleteAccessPolicy_Success(Guid data, + SutProvider sutProvider) + { + sutProvider.GetDependency().GetByIdAsync(data) + .Returns(new UserProjectAccessPolicy { Id = data }); + + await sutProvider.Sut.DeleteAsync(data); + + await sutProvider.GetDependency().Received(1).DeleteAsync(Arg.Is(data)); + } +} diff --git a/bitwarden_license/test/Commercial.Core.Test/SecretManagerFeatures/AccessPolicies/UpdateAccessPolicyCommandTests.cs b/bitwarden_license/test/Commercial.Core.Test/SecretManagerFeatures/AccessPolicies/UpdateAccessPolicyCommandTests.cs new file mode 100644 index 0000000000..f769271a7d --- /dev/null +++ b/bitwarden_license/test/Commercial.Core.Test/SecretManagerFeatures/AccessPolicies/UpdateAccessPolicyCommandTests.cs @@ -0,0 +1,40 @@ +using Bit.Commercial.Core.SecretManagerFeatures.AccessPolicies; +using Bit.Core.Entities; +using Bit.Core.Exceptions; +using Bit.Core.Repositories; +using Bit.Test.Common.AutoFixture; +using Bit.Test.Common.AutoFixture.Attributes; +using Bit.Test.Common.Helpers; +using NSubstitute; +using Xunit; + +namespace Bit.Commercial.Core.Test.SecretManagerFeatures.AccessPolicies; + +[SutProviderCustomize] +public class UpdateAccessPolicyCommandTests +{ + [Theory] + [BitAutoData] + public async Task UpdateAsync_Throws_NotFoundException(Guid data, bool read, bool write, + SutProvider sutProvider) + { + var exception = + await Assert.ThrowsAsync(() => sutProvider.Sut.UpdateAsync(data, read, write)); + await sutProvider.GetDependency().DidNotReceiveWithAnyArgs().ReplaceAsync(default); + } + + [Theory] + [BitAutoData] + public async Task UpdateAsync_Calls_Replace(Guid data, bool read, bool write, + SutProvider sutProvider) + { + var existingPolicy = new UserProjectAccessPolicy { Id = data, Read = true, Write = true }; + sutProvider.GetDependency().GetByIdAsync(data).Returns(existingPolicy); + var result = await sutProvider.Sut.UpdateAsync(data, read, write); + await sutProvider.GetDependency().Received(1).ReplaceAsync(existingPolicy); + + AssertHelper.AssertRecent(result.RevisionDate); + Assert.Equal(read, result.Read); + Assert.Equal(write, result.Write); + } +} diff --git a/src/Api/Controllers/AccessPoliciesController.cs b/src/Api/Controllers/AccessPoliciesController.cs new file mode 100644 index 0000000000..ea9bd320aa --- /dev/null +++ b/src/Api/Controllers/AccessPoliciesController.cs @@ -0,0 +1,69 @@ +using Bit.Api.SecretManagerFeatures.Models.Request; +using Bit.Api.SecretManagerFeatures.Models.Response; +using Bit.Api.Utilities; +using Bit.Core.Entities; +using Bit.Core.Repositories; +using Bit.Core.SecretManagerFeatures.AccessPolicies.Interfaces; +using Microsoft.AspNetCore.Mvc; + +namespace Bit.Api.Controllers; + +[SecretsManager] +[Route("access-policies")] +public class AccessPoliciesController : Controller +{ + private readonly IAccessPolicyRepository _accessPolicyRepository; + private readonly ICreateAccessPoliciesCommand _createAccessPoliciesCommand; + private readonly IDeleteAccessPolicyCommand _deleteAccessPolicyCommand; + private readonly IUpdateAccessPolicyCommand _updateAccessPolicyCommand; + + public AccessPoliciesController( + IAccessPolicyRepository accessPolicyRepository, + ICreateAccessPoliciesCommand createAccessPoliciesCommand, + IDeleteAccessPolicyCommand deleteAccessPolicyCommand, + IUpdateAccessPolicyCommand updateAccessPolicyCommand) + { + _accessPolicyRepository = accessPolicyRepository; + _createAccessPoliciesCommand = createAccessPoliciesCommand; + _deleteAccessPolicyCommand = deleteAccessPolicyCommand; + _updateAccessPolicyCommand = updateAccessPolicyCommand; + } + + [HttpPost("/projects/{id}/access-policies")] + public async Task CreateProjectAccessPoliciesAsync([FromRoute] Guid id, + [FromBody] AccessPoliciesCreateRequest request) + { + var policies = request.ToBaseAccessPoliciesForProject(id); + var results = await _createAccessPoliciesCommand.CreateAsync(policies); + return new ProjectAccessPoliciesResponseModel(results); + } + + [HttpGet("/projects/{id}/access-policies")] + public async Task GetProjectAccessPoliciesAsync([FromRoute] Guid id) + { + var results = await _accessPolicyRepository.GetManyByProjectId(id); + return new ProjectAccessPoliciesResponseModel(results); + } + + [HttpPut("{id}")] + public async Task UpdateAccessPolicyAsync([FromRoute] Guid id, + [FromBody] AccessPolicyUpdateRequest request) + { + var result = await _updateAccessPolicyCommand.UpdateAsync(id, request.Read, request.Write); + + return result switch + { + UserProjectAccessPolicy accessPolicy => new UserProjectAccessPolicyResponseModel(accessPolicy), + GroupProjectAccessPolicy accessPolicy => new GroupProjectAccessPolicyResponseModel(accessPolicy), + ServiceAccountProjectAccessPolicy accessPolicy => new ServiceAccountProjectAccessPolicyResponseModel( + accessPolicy), + _ => throw new ArgumentException("Unsupported access policy type provided.") + }; + } + + [HttpDelete("{id}")] + public async Task DeleteAccessPolicyAsync([FromRoute] Guid id) + { + await _deleteAccessPolicyCommand.DeleteAsync(id); + } +} diff --git a/src/Api/SecretManagerFeatures/Models/Request/AccessPoliciesCreateRequest.cs b/src/Api/SecretManagerFeatures/Models/Request/AccessPoliciesCreateRequest.cs new file mode 100644 index 0000000000..b6a0977c7a --- /dev/null +++ b/src/Api/SecretManagerFeatures/Models/Request/AccessPoliciesCreateRequest.cs @@ -0,0 +1,77 @@ +#nullable enable +using System.ComponentModel.DataAnnotations; +using Bit.Core.Entities; +using Bit.Core.Exceptions; + +namespace Bit.Api.SecretManagerFeatures.Models.Request; + +public class AccessPoliciesCreateRequest +{ + public IEnumerable? UserAccessPolicyRequests { get; set; } + + public IEnumerable? GroupAccessPolicyRequests { get; set; } + + public IEnumerable? ServiceAccountAccessPolicyRequests { get; set; } + + public List ToBaseAccessPoliciesForProject(Guid projectId) + { + if (UserAccessPolicyRequests == null && GroupAccessPolicyRequests == null && ServiceAccountAccessPolicyRequests == null) + { + throw new BadRequestException("No creation requests provided."); + } + + var userAccessPolicies = UserAccessPolicyRequests? + .Select(x => x.ToUserProjectAccessPolicy(projectId)).ToList(); + + var groupAccessPolicies = GroupAccessPolicyRequests? + .Select(x => x.ToGroupProjectAccessPolicy(projectId)).ToList(); + + var serviceAccountAccessPolicies = ServiceAccountAccessPolicyRequests? + .Select(x => x.ToServiceAccountProjectAccessPolicy(projectId)).ToList(); + + var policies = new List(); + if (userAccessPolicies != null) { policies.AddRange(userAccessPolicies); } + if (groupAccessPolicies != null) { policies.AddRange(groupAccessPolicies); } + if (serviceAccountAccessPolicies != null) { policies.AddRange(serviceAccountAccessPolicies); } + return policies; + } +} + +public class AccessPolicyRequest +{ + [Required] + public Guid GranteeId { get; set; } + + [Required] + public bool Read { get; set; } + + [Required] + public bool Write { get; set; } + + public UserProjectAccessPolicy ToUserProjectAccessPolicy(Guid projectId) => + new() + { + OrganizationUserId = GranteeId, + GrantedProjectId = projectId, + Read = Read, + Write = Write + }; + + public GroupProjectAccessPolicy ToGroupProjectAccessPolicy(Guid projectId) => + new() + { + GroupId = GranteeId, + GrantedProjectId = projectId, + Read = Read, + Write = Write + }; + + public ServiceAccountProjectAccessPolicy ToServiceAccountProjectAccessPolicy(Guid projectId) => + new() + { + ServiceAccountId = GranteeId, + GrantedProjectId = projectId, + Read = Read, + Write = Write + }; +} diff --git a/src/Api/SecretManagerFeatures/Models/Request/AccessPolicyUpdateRequest.cs b/src/Api/SecretManagerFeatures/Models/Request/AccessPolicyUpdateRequest.cs new file mode 100644 index 0000000000..d63331531c --- /dev/null +++ b/src/Api/SecretManagerFeatures/Models/Request/AccessPolicyUpdateRequest.cs @@ -0,0 +1,12 @@ +using System.ComponentModel.DataAnnotations; + +namespace Bit.Api.SecretManagerFeatures.Models.Request; + +public class AccessPolicyUpdateRequest +{ + [Required] + public bool Read { get; set; } + + [Required] + public bool Write { get; set; } +} diff --git a/src/Api/SecretManagerFeatures/Models/Response/AccessPolicyResponseModel.cs b/src/Api/SecretManagerFeatures/Models/Response/AccessPolicyResponseModel.cs new file mode 100644 index 0000000000..399d152061 --- /dev/null +++ b/src/Api/SecretManagerFeatures/Models/Response/AccessPolicyResponseModel.cs @@ -0,0 +1,128 @@ +#nullable enable +using Bit.Core.Entities; +using Bit.Core.Models.Api; + +namespace Bit.Api.SecretManagerFeatures.Models.Response; + +public abstract class BaseAccessPolicyResponseModel : ResponseModel +{ + protected BaseAccessPolicyResponseModel(BaseAccessPolicy baseAccessPolicy, string obj) : base(obj) + { + Id = baseAccessPolicy.Id; + Read = baseAccessPolicy.Read; + Write = baseAccessPolicy.Write; + CreationDate = baseAccessPolicy.CreationDate; + RevisionDate = baseAccessPolicy.RevisionDate; + } + + public Guid Id { get; set; } + public bool Read { get; set; } + public bool Write { get; set; } + public DateTime CreationDate { get; set; } + public DateTime RevisionDate { get; set; } +} + +public class UserProjectAccessPolicyResponseModel : BaseAccessPolicyResponseModel +{ + private const string _objectName = "userProjectAccessPolicy"; + + public UserProjectAccessPolicyResponseModel(UserProjectAccessPolicy accessPolicy) : base(accessPolicy, _objectName) + { + OrganizationUserId = accessPolicy.OrganizationUserId; + GrantedProjectId = accessPolicy.GrantedProjectId; + OrganizationUserName = accessPolicy.User?.Name; + } + + public UserProjectAccessPolicyResponseModel() : base(new UserProjectAccessPolicy(), _objectName) + { + } + + public Guid? OrganizationUserId { get; set; } + public string? OrganizationUserName { get; set; } + public Guid? GrantedProjectId { get; set; } +} + +public class UserServiceAccountAccessPolicyResponseModel : BaseAccessPolicyResponseModel +{ + private const string _objectName = "userServiceAccountAccessPolicy"; + + public UserServiceAccountAccessPolicyResponseModel(UserServiceAccountAccessPolicy accessPolicy) + : base(accessPolicy, _objectName) + { + OrganizationUserId = accessPolicy.OrganizationUserId; + GrantedServiceAccountId = accessPolicy.GrantedServiceAccountId; + OrganizationUserName = accessPolicy.User?.Name; + } + + public UserServiceAccountAccessPolicyResponseModel() : base(new UserServiceAccountAccessPolicy(), _objectName) + { + } + + public Guid? OrganizationUserId { get; set; } + public string? OrganizationUserName { get; set; } + public Guid? GrantedServiceAccountId { get; set; } +} + +public class GroupProjectAccessPolicyResponseModel : BaseAccessPolicyResponseModel +{ + private const string _objectName = "groupProjectAccessPolicy"; + + public GroupProjectAccessPolicyResponseModel(GroupProjectAccessPolicy accessPolicy) + : base(accessPolicy, _objectName) + { + GroupId = accessPolicy.GroupId; + GrantedProjectId = accessPolicy.GrantedProjectId; + GroupName = accessPolicy.Group?.Name; + } + + public GroupProjectAccessPolicyResponseModel() : base(new GroupProjectAccessPolicy(), _objectName) + { + } + + public Guid? GroupId { get; set; } + public string? GroupName { get; set; } + public Guid? GrantedProjectId { get; set; } +} + +public class GroupServiceAccountAccessPolicyResponseModel : BaseAccessPolicyResponseModel +{ + private const string _objectName = "groupServiceAccountAccessPolicy"; + + public GroupServiceAccountAccessPolicyResponseModel(GroupServiceAccountAccessPolicy accessPolicy) + : base(accessPolicy, _objectName) + { + GroupId = accessPolicy.GroupId; + GroupName = accessPolicy.Group?.Name; + GrantedServiceAccountId = accessPolicy.GrantedServiceAccountId; + } + + public GroupServiceAccountAccessPolicyResponseModel() : base(new GroupServiceAccountAccessPolicy(), _objectName) + { + } + + public Guid? GroupId { get; set; } + public string? GroupName { get; set; } + public Guid? GrantedServiceAccountId { get; set; } +} + +public class ServiceAccountProjectAccessPolicyResponseModel : BaseAccessPolicyResponseModel +{ + private const string _objectName = "serviceAccountProjectAccessPolicy"; + + public ServiceAccountProjectAccessPolicyResponseModel(ServiceAccountProjectAccessPolicy accessPolicy) + : base(accessPolicy, _objectName) + { + ServiceAccountId = accessPolicy.ServiceAccountId; + GrantedProjectId = accessPolicy.GrantedProjectId; + ServiceAccountName = accessPolicy.ServiceAccount?.Name; + } + + public ServiceAccountProjectAccessPolicyResponseModel() + : base(new ServiceAccountProjectAccessPolicy(), _objectName) + { + } + + public Guid? ServiceAccountId { get; set; } + public string? ServiceAccountName { get; set; } + public Guid? GrantedProjectId { get; set; } +} diff --git a/src/Api/SecretManagerFeatures/Models/Response/ProjectAccessPoliciesResponseModel.cs b/src/Api/SecretManagerFeatures/Models/Response/ProjectAccessPoliciesResponseModel.cs new file mode 100644 index 0000000000..a4416b03a7 --- /dev/null +++ b/src/Api/SecretManagerFeatures/Models/Response/ProjectAccessPoliciesResponseModel.cs @@ -0,0 +1,43 @@ +using Bit.Core.Entities; +using Bit.Core.Models.Api; + +namespace Bit.Api.SecretManagerFeatures.Models.Response; + +public class ProjectAccessPoliciesResponseModel : ResponseModel +{ + private const string _objectName = "projectAccessPolicies"; + + public ProjectAccessPoliciesResponseModel(IEnumerable baseAccessPolicies) + : base(_objectName) + { + if (baseAccessPolicies == null) + { + return; + } + + foreach (var baseAccessPolicy in baseAccessPolicies) + switch (baseAccessPolicy) + { + case UserProjectAccessPolicy accessPolicy: + UserAccessPolicies.Add(new UserProjectAccessPolicyResponseModel(accessPolicy)); + break; + case GroupProjectAccessPolicy accessPolicy: + GroupAccessPolicies.Add(new GroupProjectAccessPolicyResponseModel(accessPolicy)); + break; + case ServiceAccountProjectAccessPolicy accessPolicy: + ServiceAccountAccessPolicies.Add( + new ServiceAccountProjectAccessPolicyResponseModel(accessPolicy)); + break; + } + } + + public ProjectAccessPoliciesResponseModel() : base(_objectName) + { + } + + public List UserAccessPolicies { get; set; } = new(); + + public List GroupAccessPolicies { get; set; } = new(); + + public List ServiceAccountAccessPolicies { get; set; } = new(); +} diff --git a/src/Core/Entities/AccessPolicy.cs b/src/Core/Entities/AccessPolicy.cs index b90272fbc5..4c95831fdb 100644 --- a/src/Core/Entities/AccessPolicy.cs +++ b/src/Core/Entities/AccessPolicy.cs @@ -1,33 +1,8 @@ -using Bit.Core.Utilities; +#nullable enable +using Bit.Core.Utilities; namespace Bit.Core.Entities; -public class AccessPolicy : ITableObject -{ - public Guid Id { get; set; } - - // Object to grant access from - public Guid? OrganizationUserId { get; set; } - public Guid? GroupId { get; set; } - public Guid? ServiceAccountId { get; set; } - - // Object to grant access to - public Guid? GrantedProjectId { get; set; } - public Guid? GrantedServiceAccountId { get; set; } - - // Access - public bool Read { get; set; } - public bool Write { get; set; } - - public DateTime CreationDate { get; set; } - public DateTime RevisionDate { get; set; } - - public void SetNewId() - { - Id = CoreHelpers.GenerateComb(); - } -} - public abstract class BaseAccessPolicy { public Guid Id { get; set; } @@ -36,8 +11,8 @@ public abstract class BaseAccessPolicy public bool Read { get; set; } public bool Write { get; set; } - public DateTime CreationDate { get; set; } - public DateTime RevisionDate { get; set; } + public DateTime CreationDate { get; set; } = DateTime.UtcNow; + public DateTime RevisionDate { get; set; } = DateTime.UtcNow; public void SetNewId() { @@ -49,28 +24,33 @@ public class UserProjectAccessPolicy : BaseAccessPolicy { public Guid? OrganizationUserId { get; set; } public Guid? GrantedProjectId { get; set; } + public User? User { get; set; } } public class UserServiceAccountAccessPolicy : BaseAccessPolicy { public Guid? OrganizationUserId { get; set; } public Guid? GrantedServiceAccountId { get; set; } + public User? User { get; set; } } public class GroupProjectAccessPolicy : BaseAccessPolicy { public Guid? GroupId { get; set; } public Guid? GrantedProjectId { get; set; } + public Group? Group { get; set; } } public class GroupServiceAccountAccessPolicy : BaseAccessPolicy { public Guid? GroupId { get; set; } public Guid? GrantedServiceAccountId { get; set; } + public Group? Group { get; set; } } public class ServiceAccountProjectAccessPolicy : BaseAccessPolicy { public Guid? ServiceAccountId { get; set; } public Guid? GrantedProjectId { get; set; } + public ServiceAccount? ServiceAccount { get; set; } } diff --git a/src/Core/Repositories/IAccessPolicyRepository.cs b/src/Core/Repositories/IAccessPolicyRepository.cs index cecee6f1cd..e231b4e7da 100644 --- a/src/Core/Repositories/IAccessPolicyRepository.cs +++ b/src/Core/Repositories/IAccessPolicyRepository.cs @@ -1,7 +1,14 @@ -using Bit.Core.Entities; +#nullable enable +using Bit.Core.Entities; namespace Bit.Core.Repositories; -public interface IAccessPolicyRepository : IRepository +public interface IAccessPolicyRepository { + Task> CreateManyAsync(List baseAccessPolicies); + Task AccessPolicyExists(BaseAccessPolicy baseAccessPolicy); + Task GetByIdAsync(Guid id); + Task?> GetManyByProjectId(Guid id); + Task ReplaceAsync(BaseAccessPolicy baseAccessPolicy); + Task DeleteAsync(Guid id); } diff --git a/src/Core/SecretManagerFeatures/AccessPolicies/Interfaces/ICreateAccessPoliciesCommand.cs b/src/Core/SecretManagerFeatures/AccessPolicies/Interfaces/ICreateAccessPoliciesCommand.cs new file mode 100644 index 0000000000..50c77fb7f7 --- /dev/null +++ b/src/Core/SecretManagerFeatures/AccessPolicies/Interfaces/ICreateAccessPoliciesCommand.cs @@ -0,0 +1,8 @@ +using Bit.Core.Entities; + +namespace Bit.Core.SecretManagerFeatures.AccessPolicies.Interfaces; + +public interface ICreateAccessPoliciesCommand +{ + Task> CreateAsync(List accessPolicies); +} diff --git a/src/Core/SecretManagerFeatures/AccessPolicies/Interfaces/IDeleteAccessPolicyCommand.cs b/src/Core/SecretManagerFeatures/AccessPolicies/Interfaces/IDeleteAccessPolicyCommand.cs new file mode 100644 index 0000000000..e0c91f7e0a --- /dev/null +++ b/src/Core/SecretManagerFeatures/AccessPolicies/Interfaces/IDeleteAccessPolicyCommand.cs @@ -0,0 +1,6 @@ +namespace Bit.Core.SecretManagerFeatures.AccessPolicies.Interfaces; + +public interface IDeleteAccessPolicyCommand +{ + Task DeleteAsync(Guid id); +} diff --git a/src/Core/SecretManagerFeatures/AccessPolicies/Interfaces/IUpdateAccessPolicyCommand.cs b/src/Core/SecretManagerFeatures/AccessPolicies/Interfaces/IUpdateAccessPolicyCommand.cs new file mode 100644 index 0000000000..ae3a2e303c --- /dev/null +++ b/src/Core/SecretManagerFeatures/AccessPolicies/Interfaces/IUpdateAccessPolicyCommand.cs @@ -0,0 +1,8 @@ +using Bit.Core.Entities; + +namespace Bit.Core.SecretManagerFeatures.AccessPolicies.Interfaces; + +public interface IUpdateAccessPolicyCommand +{ + public Task UpdateAsync(Guid id, bool read, bool write); +} diff --git a/src/Infrastructure.EntityFramework/Models/AccessPolicy.cs b/src/Infrastructure.EntityFramework/Models/AccessPolicy.cs index f69d95b38f..9be7edb198 100644 --- a/src/Infrastructure.EntityFramework/Models/AccessPolicy.cs +++ b/src/Infrastructure.EntityFramework/Models/AccessPolicy.cs @@ -11,7 +11,10 @@ public class AccessPolicyMapperProfile : Profile { public AccessPolicyMapperProfile() { - CreateMap().ReverseMap(); + CreateMap().ReverseMap() + .ForMember(dst => dst.User, opt => opt.MapFrom(src => src.OrganizationUser.User)); + CreateMap().ReverseMap(); + CreateMap().ReverseMap(); } } diff --git a/src/Infrastructure.EntityFramework/Repositories/AccessPolicyRepository.cs b/src/Infrastructure.EntityFramework/Repositories/AccessPolicyRepository.cs deleted file mode 100644 index a34c284266..0000000000 --- a/src/Infrastructure.EntityFramework/Repositories/AccessPolicyRepository.cs +++ /dev/null @@ -1,27 +0,0 @@ -using AutoMapper; -using Bit.Core.Repositories; -using Bit.Infrastructure.EntityFramework.Models; -using Microsoft.EntityFrameworkCore; -using Microsoft.Extensions.DependencyInjection; -using CoreAccessPolicy = Bit.Core.Entities.AccessPolicy; - -namespace Bit.Infrastructure.EntityFramework.Repositories; - -public class AccessPolicyRepository : IAccessPolicyRepository -{ - public AccessPolicyRepository(IServiceScopeFactory serviceScopeFactory, IMapper mapper) - { - } - - protected Func> GetDbSet { get; private set; } - - public Task GetByIdAsync(Guid id) => throw new NotImplementedException(); - - public Task CreateAsync(CoreAccessPolicy obj) => throw new NotImplementedException(); - - public Task ReplaceAsync(CoreAccessPolicy obj) => throw new NotImplementedException(); - - public Task UpsertAsync(CoreAccessPolicy obj) => throw new NotImplementedException(); - - public Task DeleteAsync(CoreAccessPolicy obj) => throw new NotImplementedException(); -} diff --git a/src/Infrastructure.EntityFramework/Repositories/DatabaseContext.cs b/src/Infrastructure.EntityFramework/Repositories/DatabaseContext.cs index ffdcfdc24d..e4cabaffae 100644 --- a/src/Infrastructure.EntityFramework/Repositories/DatabaseContext.cs +++ b/src/Infrastructure.EntityFramework/Repositories/DatabaseContext.cs @@ -17,6 +17,9 @@ public class DatabaseContext : DbContext { } public DbSet AccessPolicies { get; set; } + public DbSet UserProjectAccessPolicy { get; set; } + public DbSet GroupProjectAccessPolicy { get; set; } + public DbSet ServiceAccountProjectAccessPolicy { get; set; } public DbSet ApiKeys { get; set; } public DbSet Ciphers { get; set; } public DbSet Collections { get; set; } diff --git a/test/Api.IntegrationTest/Controllers/AccessPoliciesControllerTest.cs b/test/Api.IntegrationTest/Controllers/AccessPoliciesControllerTest.cs new file mode 100644 index 0000000000..ecf1e55563 --- /dev/null +++ b/test/Api.IntegrationTest/Controllers/AccessPoliciesControllerTest.cs @@ -0,0 +1,185 @@ +using System.Net.Http.Headers; +using Bit.Api.IntegrationTest.Factories; +using Bit.Api.IntegrationTest.Helpers; +using Bit.Api.SecretManagerFeatures.Models.Request; +using Bit.Api.SecretManagerFeatures.Models.Response; +using Bit.Core.Entities; +using Bit.Core.Repositories; +using Bit.Test.Common.Helpers; +using Xunit; + +namespace Bit.Api.IntegrationTest.Controllers; + +public class AccessPoliciesControllerTest : IClassFixture, IAsyncLifetime +{ + private readonly IAccessPolicyRepository _accessPolicyRepository; + + private readonly HttpClient _client; + private readonly ApiApplicationFactory _factory; + + private const string _mockEncryptedString = "2.3Uk+WNBIoU5xzmVFNcoWzz==|1MsPIYuRfdOHfu/0uY6H2Q==|/98sp4wb6pHP1VTZ9JcNCYgQjEUMFPlqJgCwRk1YXKg="; + + private readonly IProjectRepository _projectRepository; + private readonly IServiceAccountRepository _serviceAccountRepository; + private Organization _organization = null!; + + public AccessPoliciesControllerTest(ApiApplicationFactory factory) + { + _factory = factory; + _client = _factory.CreateClient(); + _accessPolicyRepository = _factory.GetService(); + _serviceAccountRepository = _factory.GetService(); + _projectRepository = _factory.GetService(); + } + + public async Task InitializeAsync() + { + var ownerEmail = $"integration-test{Guid.NewGuid()}@bitwarden.com"; + var tokens = await _factory.LoginWithNewAccount(ownerEmail); + var (organization, _) = + await OrganizationTestHelpers.SignUpAsync(_factory, ownerEmail: ownerEmail, billingEmail: ownerEmail); + _client.DefaultRequestHeaders.Authorization = new AuthenticationHeaderValue("Bearer", tokens.Token); + _organization = organization; + } + + public Task DisposeAsync() => Task.CompletedTask; + + [Fact] + public async Task CreateProjectAccessPolicies() + { + var initialProject = await _projectRepository.CreateAsync(new Project + { + OrganizationId = _organization.Id, + Name = _mockEncryptedString + }); + + var initialServiceAccount = await _serviceAccountRepository.CreateAsync(new ServiceAccount + { + OrganizationId = _organization.Id, + Name = _mockEncryptedString + }); + + var request = new AccessPoliciesCreateRequest + { + ServiceAccountAccessPolicyRequests = new List + { + new() { GranteeId = initialServiceAccount.Id, Read = true, Write = true } + } + }; + + var response = await _client.PostAsJsonAsync($"/projects/{initialProject.Id}/access-policies", request); + response.EnsureSuccessStatusCode(); + + var result = await response.Content.ReadFromJsonAsync(); + + Assert.NotNull(result); + Assert.Equal(initialServiceAccount.Id, result!.ServiceAccountAccessPolicies.First().ServiceAccountId); + Assert.True(result.ServiceAccountAccessPolicies.First().Read); + Assert.True(result.ServiceAccountAccessPolicies.First().Write); + AssertHelper.AssertRecent(result.ServiceAccountAccessPolicies.First().RevisionDate); + AssertHelper.AssertRecent(result.ServiceAccountAccessPolicies.First().CreationDate); + + var createdAccessPolicy = + await _accessPolicyRepository.GetByIdAsync(result.ServiceAccountAccessPolicies.First().Id); + Assert.NotNull(createdAccessPolicy); + Assert.Equal(result.ServiceAccountAccessPolicies.First().Read, createdAccessPolicy!.Read); + Assert.Equal(result.ServiceAccountAccessPolicies.First().Write, createdAccessPolicy.Write); + Assert.Equal(result.ServiceAccountAccessPolicies.First().Id, createdAccessPolicy.Id); + AssertHelper.AssertRecent(createdAccessPolicy.CreationDate); + AssertHelper.AssertRecent(createdAccessPolicy.RevisionDate); + } + + [Fact] + public async Task UpdateAccessPolicy() + { + var initData = await SetupAccessPolicyRequest(); + + const bool expectedRead = true; + const bool expectedWrite = false; + var request = new AccessPolicyUpdateRequest { Read = expectedRead, Write = expectedWrite }; + + var response = await _client.PutAsJsonAsync($"/access-policies/{initData.InitialAccessPolicyId}", request); + response.EnsureSuccessStatusCode(); + + var result = await response.Content.ReadFromJsonAsync(); + + Assert.NotNull(result); + Assert.Equal(expectedRead, result!.Read); + Assert.Equal(expectedWrite, result.Write); + AssertHelper.AssertRecent(result.RevisionDate); + + var updatedAccessPolicy = await _accessPolicyRepository.GetByIdAsync(result.Id); + Assert.NotNull(updatedAccessPolicy); + Assert.Equal(expectedRead, updatedAccessPolicy!.Read); + Assert.Equal(expectedWrite, updatedAccessPolicy.Write); + AssertHelper.AssertRecent(updatedAccessPolicy.RevisionDate); + } + + + [Fact] + public async Task DeleteAccessPolicy() + { + var initData = await SetupAccessPolicyRequest(); + + var response = await _client.DeleteAsync($"/access-policies/{initData.InitialAccessPolicyId}"); + response.EnsureSuccessStatusCode(); + + var test = await _accessPolicyRepository.GetByIdAsync(initData.InitialAccessPolicyId); + Assert.Null(test); + } + + [Fact] + public async Task GetProjectAccessPolicies() + { + var initData = await SetupAccessPolicyRequest(); + + var response = await _client.GetAsync($"/projects/{initData.InitialProjectId}/access-policies"); + response.EnsureSuccessStatusCode(); + + var result = await response.Content.ReadFromJsonAsync(); + + Assert.NotNull(result?.ServiceAccountAccessPolicies); + Assert.Single(result!.ServiceAccountAccessPolicies); + } + + private async Task SetupAccessPolicyRequest() + { + var initialProject = await _projectRepository.CreateAsync(new Project + { + OrganizationId = _organization.Id, + Name = _mockEncryptedString, + }); + + var initialServiceAccount = await _serviceAccountRepository.CreateAsync(new ServiceAccount + { + OrganizationId = _organization.Id, + Name = _mockEncryptedString, + }); + + var initialAccessPolicy = await _accessPolicyRepository.CreateManyAsync( + new List + { + new ServiceAccountProjectAccessPolicy + { + Read = true, + Write = true, + ServiceAccountId = initialServiceAccount.Id, + GrantedProjectId = initialProject.Id, + } + }); + + return new RequestSetupData + { + InitialProjectId = initialProject.Id, + InitialServiceAccountId = initialServiceAccount.Id, + InitialAccessPolicyId = initialAccessPolicy.First().Id, + }; + } + + private class RequestSetupData + { + public Guid InitialProjectId { get; set; } + public Guid InitialAccessPolicyId { get; set; } + public Guid InitialServiceAccountId { get; set; } + } +} diff --git a/test/Api.Test/Controllers/AccessPoliciesControllerTests.cs b/test/Api.Test/Controllers/AccessPoliciesControllerTests.cs new file mode 100644 index 0000000000..236889ba47 --- /dev/null +++ b/test/Api.Test/Controllers/AccessPoliciesControllerTests.cs @@ -0,0 +1,87 @@ +using Bit.Api.Controllers; +using Bit.Api.SecretManagerFeatures.Models.Request; +using Bit.Core.Entities; +using Bit.Core.Repositories; +using Bit.Core.SecretManagerFeatures.AccessPolicies.Interfaces; +using Bit.Test.Common.AutoFixture; +using Bit.Test.Common.AutoFixture.Attributes; +using Bit.Test.Common.Helpers; +using NSubstitute; +using NSubstitute.ReturnsExtensions; +using Xunit; + +namespace Bit.Api.Test.Controllers; + +[ControllerCustomize(typeof(AccessPoliciesController))] +[SutProviderCustomize] +[JsonDocumentCustomize] +public class AccessPoliciesControllerTests +{ + [Theory] + [BitAutoData] + public async void GetAccessPoliciesByProject_ReturnsEmptyList(SutProvider sutProvider, + Guid id) + { + var result = await sutProvider.Sut.GetProjectAccessPoliciesAsync(id); + + await sutProvider.GetDependency().Received(1) + .GetManyByProjectId(Arg.Is(AssertHelper.AssertPropertyEqual(id))); + + Assert.Empty(result.GroupAccessPolicies); + Assert.Empty(result.UserAccessPolicies); + Assert.Empty(result.ServiceAccountAccessPolicies); + } + + [Theory] + [BitAutoData] + public async void GetAccessPoliciesByProject_Success(SutProvider sutProvider, Guid id, + UserProjectAccessPolicy resultAccessPolicy) + { + sutProvider.GetDependency().GetManyByProjectId(default) + .ReturnsForAnyArgs(new List { resultAccessPolicy }); + + var result = await sutProvider.Sut.GetProjectAccessPoliciesAsync(id); + + await sutProvider.GetDependency().Received(1) + .GetManyByProjectId(Arg.Is(AssertHelper.AssertPropertyEqual(id))); + + Assert.Empty(result.GroupAccessPolicies); + Assert.NotEmpty(result.UserAccessPolicies); + Assert.Empty(result.ServiceAccountAccessPolicies); + } + + [Theory] + [BitAutoData] + public async void CreateAccessPolicies_Success(SutProvider sutProvider, Guid id, + UserProjectAccessPolicy data, AccessPoliciesCreateRequest request) + { + sutProvider.GetDependency().CreateAsync(default) + .ReturnsForAnyArgs(new List { data }); + var result = await sutProvider.Sut.CreateProjectAccessPoliciesAsync(id, request); + await sutProvider.GetDependency().Received(1) + .CreateAsync(Arg.Any>()); + } + + + [Theory] + [BitAutoData] + public async void UpdateAccessPolicies_Success(SutProvider sutProvider, Guid id, + UserProjectAccessPolicy data, AccessPolicyUpdateRequest request) + { + sutProvider.GetDependency().UpdateAsync(default, default, default) + .ReturnsForAnyArgs(data); + var result = await sutProvider.Sut.UpdateAccessPolicyAsync(id, request); + await sutProvider.GetDependency().Received(1) + .UpdateAsync(Arg.Any(), Arg.Is(request.Read), Arg.Is(request.Write)); + } + + [Theory] + [BitAutoData] + public async void DeleteAccessPolicies_Success(SutProvider sutProvider, Guid id) + { + sutProvider.GetDependency().DeleteAsync(default).ReturnsNull(); + await sutProvider.Sut.DeleteAccessPolicyAsync(id); + await sutProvider.GetDependency().Received(1) + .DeleteAsync(Arg.Any()); + } +}