From 6a6b15fadaf6a6865337c48bc832e8abb5c0e3da Mon Sep 17 00:00:00 2001 From: Oscar Hinton Date: Thu, 9 Mar 2023 18:23:50 +0100 Subject: [PATCH] [SM-567] Change how project permission is resolved (#2791) * Change how project permission is resolved * Fix tests --------- Co-authored-by: Thomas Avery <43214426+Thomas-Avery@users.noreply.github.com> --- .../Repositories/ProjectRepository.cs | 59 +++++++++++-------- .../Controllers/ProjectsController.cs | 27 ++------- .../Repositories/IProjectRepository.cs | 3 +- .../Controllers/ProjectsControllerTests.cs | 10 ++-- 4 files changed, 45 insertions(+), 54 deletions(-) diff --git a/bitwarden_license/src/Commercial.Infrastructure.EntityFramework/SecretsManager/Repositories/ProjectRepository.cs b/bitwarden_license/src/Commercial.Infrastructure.EntityFramework/SecretsManager/Repositories/ProjectRepository.cs index f9bb3740d3..ca17e8b385 100644 --- a/bitwarden_license/src/Commercial.Infrastructure.EntityFramework/SecretsManager/Repositories/ProjectRepository.cs +++ b/bitwarden_license/src/Commercial.Infrastructure.EntityFramework/SecretsManager/Repositories/ProjectRepository.cs @@ -1,7 +1,6 @@ using System.Linq.Expressions; using AutoMapper; using Bit.Core.Enums; -using Bit.Core.SecretsManager.Models.Data; using Bit.Core.SecretsManager.Repositories; using Bit.Infrastructure.EntityFramework.Repositories; using Bit.Infrastructure.EntityFramework.SecretsManager.Models; @@ -28,31 +27,6 @@ public class ProjectRepository : Repository GetPermissionDetailsByIdAsync(Guid id, Guid userId) - { - using var scope = ServiceScopeFactory.CreateScope(); - var dbContext = GetDatabaseContext(scope); - - var project = await dbContext.Project - .Where(c => c.Id == id && c.DeletedDate == null) - .Select(p => new ProjectPermissionDetails - { - Id = p.Id, - OrganizationId = p.OrganizationId, - Name = p.Name, - CreationDate = p.CreationDate, - RevisionDate = p.RevisionDate, - DeletedDate = p.DeletedDate, - Read = p.UserAccessPolicies.Any(ap => ap.OrganizationUser.User.Id == userId && ap.Read) - || p.GroupAccessPolicies.Any(ap => - ap.Group.GroupUsers.Any(gu => gu.OrganizationUser.User.Id == userId && ap.Read)), - Write = p.UserAccessPolicies.Any(ap => ap.OrganizationUser.User.Id == userId && ap.Write) || - p.GroupAccessPolicies.Any(ap => - ap.Group.GroupUsers.Any(gu => gu.OrganizationUser.User.Id == userId && ap.Write)), - }).FirstOrDefaultAsync(); - return project; - } - public async Task> GetManyByOrganizationIdAsync(Guid organizationId, Guid userId, AccessClientType accessType) { using var scope = ServiceScopeFactory.CreateScope(); @@ -182,4 +156,37 @@ public class ProjectRepository : Repository AccessToProjectAsync(Guid id, Guid userId, AccessClientType accessType) + { + using var scope = ServiceScopeFactory.CreateScope(); + var dbContext = GetDatabaseContext(scope); + + var projectQuery = dbContext.Project + .Where(s => s.Id == id); + + var query = accessType switch + { + AccessClientType.NoAccessCheck => projectQuery.Select(_ => new { Read = true, Write = true }), + AccessClientType.User => projectQuery.Select(p => new + { + Read = p.UserAccessPolicies.Any(ap => ap.OrganizationUser.User.Id == userId && ap.Read) + || p.GroupAccessPolicies.Any(ap => + ap.Group.GroupUsers.Any(gu => gu.OrganizationUser.User.Id == userId && ap.Read)), + Write = p.UserAccessPolicies.Any(ap => ap.OrganizationUser.User.Id == userId && ap.Write) || + p.GroupAccessPolicies.Any(ap => + ap.Group.GroupUsers.Any(gu => gu.OrganizationUser.User.Id == userId && ap.Write)), + }), + AccessClientType.ServiceAccount => projectQuery.Select(p => new + { + Read = p.ServiceAccountAccessPolicies.Any(ap => ap.ServiceAccountId == userId && ap.Read), + Write = p.ServiceAccountAccessPolicies.Any(ap => ap.ServiceAccountId == userId && ap.Write), + }), + _ => projectQuery.Select(_ => new { Read = false, Write = false }), + }; + + var policy = await query.FirstOrDefaultAsync(); + + return (policy.Read, policy.Write); + } } diff --git a/src/Api/SecretsManager/Controllers/ProjectsController.cs b/src/Api/SecretsManager/Controllers/ProjectsController.cs index 75738b9819..2af5e77572 100644 --- a/src/Api/SecretsManager/Controllers/ProjectsController.cs +++ b/src/Api/SecretsManager/Controllers/ProjectsController.cs @@ -82,8 +82,7 @@ public class ProjectsController : Controller [HttpGet("projects/{id}")] public async Task GetAsync([FromRoute] Guid id) { - var userId = _userService.GetProperUserId(User).Value; - var project = await _projectRepository.GetPermissionDetailsByIdAsync(id, userId); + var project = await _projectRepository.GetByIdAsync(id); if (project == null) { throw new NotFoundException(); @@ -94,34 +93,18 @@ public class ProjectsController : Controller throw new NotFoundException(); } + var userId = _userService.GetProperUserId(User).Value; var orgAdmin = await _currentContext.OrganizationAdmin(project.OrganizationId); var accessClient = AccessClientHelper.ToAccessClient(_currentContext.ClientType, orgAdmin); - bool hasAccess; - var read = project.Read; - var write = project.Write; + var access = await _projectRepository.AccessToProjectAsync(id, userId, accessClient); - switch (accessClient) - { - case AccessClientType.NoAccessCheck: - hasAccess = true; - write = true; - read = true; - break; - case AccessClientType.User: - hasAccess = project.Read; - break; - default: - hasAccess = false; - break; - } - - if (!hasAccess) + if (!access.Read) { throw new NotFoundException(); } - return new ProjectPermissionDetailsResponseModel(project, read, write); + return new ProjectPermissionDetailsResponseModel(project, access.Read, access.Write); } [HttpPost("projects/delete")] diff --git a/src/Core/SecretsManager/Repositories/IProjectRepository.cs b/src/Core/SecretsManager/Repositories/IProjectRepository.cs index 1841fafecd..52409b0257 100644 --- a/src/Core/SecretsManager/Repositories/IProjectRepository.cs +++ b/src/Core/SecretsManager/Repositories/IProjectRepository.cs @@ -1,6 +1,5 @@ using Bit.Core.Enums; using Bit.Core.SecretsManager.Entities; -using Bit.Core.SecretsManager.Models.Data; namespace Bit.Core.SecretsManager.Repositories; @@ -9,7 +8,6 @@ public interface IProjectRepository Task> GetManyByOrganizationIdAsync(Guid organizationId, Guid userId, AccessClientType accessType); Task> GetManyByOrganizationIdWriteAccessAsync(Guid organizationId, Guid userId, AccessClientType accessType); Task> GetManyByIds(IEnumerable ids); - Task GetPermissionDetailsByIdAsync(Guid id, Guid userId); Task GetByIdAsync(Guid id); Task CreateAsync(Project project); Task ReplaceAsync(Project project); @@ -19,4 +17,5 @@ public interface IProjectRepository Task UserHasWriteAccessToProject(Guid id, Guid userId); Task ServiceAccountHasWriteAccessToProject(Guid id, Guid userId); Task ServiceAccountHasReadAccessToProject(Guid id, Guid userId); + Task<(bool Read, bool Write)> AccessToProjectAsync(Guid id, Guid userId, AccessClientType accessType); } diff --git a/test/Api.Test/SecretsManager/Controllers/ProjectsControllerTests.cs b/test/Api.Test/SecretsManager/Controllers/ProjectsControllerTests.cs index e216c9b78f..42ae51f952 100644 --- a/test/Api.Test/SecretsManager/Controllers/ProjectsControllerTests.cs +++ b/test/Api.Test/SecretsManager/Controllers/ProjectsControllerTests.cs @@ -6,7 +6,6 @@ using Bit.Core.Enums; using Bit.Core.Exceptions; using Bit.Core.SecretsManager.Commands.Projects.Interfaces; using Bit.Core.SecretsManager.Entities; -using Bit.Core.SecretsManager.Models.Data; using Bit.Core.SecretsManager.Repositories; using Bit.Core.Services; using Bit.Core.Test.SecretsManager.AutoFixture.ProjectsFixture; @@ -199,13 +198,16 @@ public class ProjectsControllerTests break; } - sutProvider.GetDependency().GetPermissionDetailsByIdAsync(Arg.Is(data), Arg.Any()) - .ReturnsForAnyArgs(new ProjectPermissionDetails() { Id = data, OrganizationId = orgId, Read = true, Write = true }); + sutProvider.GetDependency().GetByIdAsync(Arg.Is(data)) + .ReturnsForAnyArgs(new Project { Id = data, OrganizationId = orgId }); + + sutProvider.GetDependency().AccessToProjectAsync(default, default, default) + .ReturnsForAnyArgs((true, false)); await sutProvider.Sut.GetAsync(data); await sutProvider.GetDependency().Received(1) - .GetPermissionDetailsByIdAsync(Arg.Is(data), Arg.Any()); + .GetByIdAsync(Arg.Is(data)); } [Theory]