mirror of
https://github.com/bitwarden/server.git
synced 2025-04-05 05:00:19 -05:00
SM-1146: Secrets Manager total counts (#4200)
* SM-1146: SM Organization Counts for Projects, Secrets, Machine Accounts * SM-1146: Project total counts * SM-1146: models object renames * SM-1146: Service Account total counts * SM-1146: Unit test coverage for counts controller * SM-1146: Counts controller simplification, UT update * SM-1146: Service Account total counts from Service Account auth user * SM-1146: Integration Tests for total counts controller * SM-1146: Explicitly denying access for Service Accounts * SM-1146: Fix broken ProjectsController integration test * SM-1146: Integration tests for counts controller * SM-1146: Explicitly denying access for Service Accounts cleanup * SM-1146: Test cleanup * SM-1146: PR review comments fix * SM-1146: People, Service Accounts positive count on write access * Update bitwarden_license/src/Commercial.Infrastructure.EntityFramework/SecretsManager/Repositories/ProjectRepository.cs Co-authored-by: Thomas Avery <43214426+Thomas-Avery@users.noreply.github.com> --------- Co-authored-by: Thomas Avery <43214426+Thomas-Avery@users.noreply.github.com>
This commit is contained in:
parent
bb02bdb3e8
commit
77f8cc58e8
@ -169,6 +169,58 @@ public class ProjectRepository : Repository<Core.SecretsManager.Entities.Project
|
||||
return await accessQuery.ToDictionaryAsync(pa => pa.Id, pa => (pa.Read, pa.Write));
|
||||
}
|
||||
|
||||
public async Task<int> GetProjectCountByOrganizationIdAsync(Guid organizationId, Guid userId,
|
||||
AccessClientType accessType)
|
||||
{
|
||||
await using var scope = ServiceScopeFactory.CreateAsyncScope();
|
||||
var dbContext = GetDatabaseContext(scope);
|
||||
var query = dbContext.Project.Where(p => p.OrganizationId == organizationId && p.DeletedDate == null);
|
||||
|
||||
query = accessType switch
|
||||
{
|
||||
AccessClientType.NoAccessCheck => query,
|
||||
AccessClientType.User => query.Where(UserHasReadAccessToProject(userId)),
|
||||
_ => throw new ArgumentOutOfRangeException(nameof(accessType), accessType, null),
|
||||
};
|
||||
|
||||
return await query.CountAsync();
|
||||
}
|
||||
|
||||
public async Task<ProjectCounts> GetProjectCountsByIdAsync(Guid projectId, Guid userId, AccessClientType accessType)
|
||||
{
|
||||
await using var scope = ServiceScopeFactory.CreateAsyncScope();
|
||||
var dbContext = GetDatabaseContext(scope);
|
||||
var query = dbContext.Project.Where(p => p.Id == projectId && p.DeletedDate == null);
|
||||
|
||||
var queryReadAccess = accessType switch
|
||||
{
|
||||
AccessClientType.NoAccessCheck => query,
|
||||
AccessClientType.User => query.Where(UserHasReadAccessToProject(userId)),
|
||||
_ => throw new ArgumentOutOfRangeException(nameof(accessType), accessType, null),
|
||||
};
|
||||
|
||||
var queryWriteAccess = accessType switch
|
||||
{
|
||||
AccessClientType.NoAccessCheck => query,
|
||||
AccessClientType.User => query.Where(UserHasWriteAccessToProject(userId)),
|
||||
_ => throw new ArgumentOutOfRangeException(nameof(accessType), accessType, null),
|
||||
};
|
||||
|
||||
var secretsQuery = queryReadAccess.Select(project => project.Secrets.Count(s => s.DeletedDate == null));
|
||||
|
||||
var projectCountsQuery = queryWriteAccess.Select(project => new ProjectCounts
|
||||
{
|
||||
People = project.UserAccessPolicies.Count + project.GroupAccessPolicies.Count,
|
||||
ServiceAccounts = project.ServiceAccountAccessPolicies.Count
|
||||
});
|
||||
|
||||
var secrets = await secretsQuery.FirstOrDefaultAsync();
|
||||
var projectCounts = await projectCountsQuery.FirstOrDefaultAsync() ?? new ProjectCounts { Secrets = 0, People = 0, ServiceAccounts = 0 };
|
||||
projectCounts.Secrets = secrets;
|
||||
|
||||
return projectCounts;
|
||||
}
|
||||
|
||||
private record ProjectAccess(Guid Id, bool Read, bool Write);
|
||||
|
||||
private static IQueryable<ProjectAccess> BuildProjectAccessQuery(IQueryable<Project> projectQuery, Guid userId,
|
||||
|
@ -325,6 +325,23 @@ public class SecretRepository : Repository<Core.SecretsManager.Entities.Secret,
|
||||
await dbContext.SaveChangesAsync();
|
||||
}
|
||||
|
||||
public async Task<int> GetSecretsCountByOrganizationIdAsync(Guid organizationId, Guid userId,
|
||||
AccessClientType accessType)
|
||||
{
|
||||
await using var scope = ServiceScopeFactory.CreateAsyncScope();
|
||||
var dbContext = GetDatabaseContext(scope);
|
||||
var query = dbContext.Secret.Where(s => s.OrganizationId == organizationId && s.DeletedDate == null);
|
||||
|
||||
query = accessType switch
|
||||
{
|
||||
AccessClientType.NoAccessCheck => query,
|
||||
AccessClientType.User => query.Where(UserHasReadAccessToSecret(userId)),
|
||||
_ => throw new ArgumentOutOfRangeException(nameof(accessType), accessType, null),
|
||||
};
|
||||
|
||||
return await query.CountAsync();
|
||||
}
|
||||
|
||||
private IQueryable<SecretPermissionDetails> SecretToPermissionDetails(IQueryable<Secret> query, Guid userId, AccessClientType accessType)
|
||||
{
|
||||
var secrets = accessType switch
|
||||
|
@ -125,6 +125,48 @@ public class ServiceAccountRepository : Repository<Core.SecretsManager.Entities.
|
||||
}
|
||||
}
|
||||
|
||||
public async Task<int> GetServiceAccountCountByOrganizationIdAsync(Guid organizationId, Guid userId,
|
||||
AccessClientType accessType)
|
||||
{
|
||||
await using var scope = ServiceScopeFactory.CreateAsyncScope();
|
||||
var dbContext = GetDatabaseContext(scope);
|
||||
var query = dbContext.ServiceAccount.Where(sa => sa.OrganizationId == organizationId);
|
||||
|
||||
query = accessType switch
|
||||
{
|
||||
AccessClientType.NoAccessCheck => query,
|
||||
AccessClientType.User => query.Where(UserHasReadAccessToServiceAccount(userId)),
|
||||
_ => throw new ArgumentOutOfRangeException(nameof(accessType), accessType, null),
|
||||
};
|
||||
|
||||
return await query.CountAsync();
|
||||
}
|
||||
|
||||
public async Task<ServiceAccountCounts> GetServiceAccountCountsByIdAsync(Guid serviceAccountId, Guid userId,
|
||||
AccessClientType accessType)
|
||||
{
|
||||
await using var scope = ServiceScopeFactory.CreateAsyncScope();
|
||||
var dbContext = GetDatabaseContext(scope);
|
||||
var query = dbContext.ServiceAccount.Where(sa => sa.Id == serviceAccountId);
|
||||
|
||||
query = accessType switch
|
||||
{
|
||||
AccessClientType.NoAccessCheck => query,
|
||||
AccessClientType.User => query.Where(UserHasReadAccessToServiceAccount(userId)),
|
||||
_ => throw new ArgumentOutOfRangeException(nameof(accessType), accessType, null),
|
||||
};
|
||||
|
||||
var serviceAccountCountsQuery = query.Select(serviceAccount => new ServiceAccountCounts
|
||||
{
|
||||
Projects = serviceAccount.ProjectAccessPolicies.Count,
|
||||
People = serviceAccount.UserAccessPolicies.Count + serviceAccount.GroupAccessPolicies.Count,
|
||||
AccessTokens = serviceAccount.ApiKeys.Count
|
||||
});
|
||||
|
||||
var serviceAccountCounts = await serviceAccountCountsQuery.FirstOrDefaultAsync();
|
||||
return serviceAccountCounts ?? new ServiceAccountCounts { Projects = 0, People = 0, AccessTokens = 0 };
|
||||
}
|
||||
|
||||
public async Task<bool> ServiceAccountsAreInOrganizationAsync(List<Guid> serviceAccountIds, Guid organizationId)
|
||||
{
|
||||
await using var scope = ServiceScopeFactory.CreateAsyncScope();
|
||||
|
119
src/Api/SecretsManager/Controllers/CountsController.cs
Normal file
119
src/Api/SecretsManager/Controllers/CountsController.cs
Normal file
@ -0,0 +1,119 @@
|
||||
#nullable enable
|
||||
using Bit.Api.SecretsManager.Models.Response;
|
||||
using Bit.Core.Context;
|
||||
using Bit.Core.Enums;
|
||||
using Bit.Core.Exceptions;
|
||||
using Bit.Core.SecretsManager.Queries.Interfaces;
|
||||
using Bit.Core.SecretsManager.Repositories;
|
||||
using Microsoft.AspNetCore.Authorization;
|
||||
using Microsoft.AspNetCore.Mvc;
|
||||
|
||||
namespace Bit.Api.SecretsManager.Controllers;
|
||||
|
||||
[Authorize("secrets")]
|
||||
public class CountsController : Controller
|
||||
{
|
||||
private readonly ICurrentContext _currentContext;
|
||||
private readonly IAccessClientQuery _accessClientQuery;
|
||||
private readonly IProjectRepository _projectRepository;
|
||||
private readonly ISecretRepository _secretRepository;
|
||||
private readonly IServiceAccountRepository _serviceAccountRepository;
|
||||
|
||||
public CountsController(
|
||||
ICurrentContext currentContext,
|
||||
IAccessClientQuery accessClientQuery,
|
||||
IProjectRepository projectRepository,
|
||||
ISecretRepository secretRepository,
|
||||
IServiceAccountRepository serviceAccountRepository)
|
||||
{
|
||||
_currentContext = currentContext;
|
||||
_accessClientQuery = accessClientQuery;
|
||||
_projectRepository = projectRepository;
|
||||
_secretRepository = secretRepository;
|
||||
_serviceAccountRepository = serviceAccountRepository;
|
||||
}
|
||||
|
||||
[HttpGet("organizations/{organizationId}/sm-counts")]
|
||||
public async Task<OrganizationCountsResponseModel> GetByOrganizationAsync([FromRoute] Guid organizationId)
|
||||
{
|
||||
var (accessType, userId) = await GetAccessClientAsync(organizationId);
|
||||
|
||||
var projectsCountTask = _projectRepository.GetProjectCountByOrganizationIdAsync(organizationId,
|
||||
userId, accessType);
|
||||
|
||||
var secretsCountTask = _secretRepository.GetSecretsCountByOrganizationIdAsync(organizationId,
|
||||
userId, accessType);
|
||||
|
||||
var serviceAccountsCountsTask = _serviceAccountRepository.GetServiceAccountCountByOrganizationIdAsync(
|
||||
organizationId, userId, accessType);
|
||||
|
||||
var counts = await Task.WhenAll(projectsCountTask, secretsCountTask, serviceAccountsCountsTask);
|
||||
|
||||
return new OrganizationCountsResponseModel
|
||||
{
|
||||
Projects = counts[0],
|
||||
Secrets = counts[1],
|
||||
ServiceAccounts = counts[2]
|
||||
};
|
||||
}
|
||||
|
||||
|
||||
[HttpGet("projects/{projectId}/sm-counts")]
|
||||
public async Task<ProjectCountsResponseModel> GetByProjectAsync([FromRoute] Guid projectId)
|
||||
{
|
||||
var project = await _projectRepository.GetByIdAsync(projectId);
|
||||
if (project == null)
|
||||
{
|
||||
throw new NotFoundException();
|
||||
}
|
||||
|
||||
var (accessType, userId) = await GetAccessClientAsync(project.OrganizationId);
|
||||
|
||||
var projectsCounts = await _projectRepository.GetProjectCountsByIdAsync(projectId, userId, accessType);
|
||||
|
||||
return new ProjectCountsResponseModel
|
||||
{
|
||||
Secrets = projectsCounts.Secrets,
|
||||
People = projectsCounts.People,
|
||||
ServiceAccounts = projectsCounts.ServiceAccounts
|
||||
};
|
||||
}
|
||||
|
||||
[HttpGet("service-accounts/{serviceAccountId}/sm-counts")]
|
||||
public async Task<ServiceAccountCountsResponseModel> GetByServiceAccountAsync([FromRoute] Guid serviceAccountId)
|
||||
{
|
||||
var serviceAccount = await _serviceAccountRepository.GetByIdAsync(serviceAccountId);
|
||||
if (serviceAccount == null)
|
||||
{
|
||||
throw new NotFoundException();
|
||||
}
|
||||
|
||||
var (accessType, userId) = await GetAccessClientAsync(serviceAccount.OrganizationId);
|
||||
|
||||
var serviceAccountCounts =
|
||||
await _serviceAccountRepository.GetServiceAccountCountsByIdAsync(serviceAccountId, userId, accessType);
|
||||
|
||||
return new ServiceAccountCountsResponseModel
|
||||
{
|
||||
Projects = serviceAccountCounts.Projects,
|
||||
People = serviceAccountCounts.People,
|
||||
AccessTokens = serviceAccountCounts.AccessTokens
|
||||
};
|
||||
}
|
||||
|
||||
private async Task<(AccessClientType, Guid)> GetAccessClientAsync(Guid organizationId)
|
||||
{
|
||||
if (!_currentContext.AccessSecretsManager(organizationId))
|
||||
{
|
||||
throw new NotFoundException();
|
||||
}
|
||||
|
||||
var (accessType, userId) = await _accessClientQuery.GetAccessClientAsync(User, organizationId);
|
||||
if (accessType == AccessClientType.ServiceAccount)
|
||||
{
|
||||
throw new NotFoundException();
|
||||
}
|
||||
|
||||
return (accessType, userId);
|
||||
}
|
||||
}
|
@ -0,0 +1,15 @@
|
||||
#nullable enable
|
||||
using Bit.Core.Models.Api;
|
||||
|
||||
namespace Bit.Api.SecretsManager.Models.Response;
|
||||
|
||||
public class OrganizationCountsResponseModel() : ResponseModel(_objectName)
|
||||
{
|
||||
private const string _objectName = "organizationCounts";
|
||||
|
||||
public int Projects { get; set; }
|
||||
|
||||
public int Secrets { get; set; }
|
||||
|
||||
public int ServiceAccounts { get; set; }
|
||||
}
|
@ -0,0 +1,15 @@
|
||||
#nullable enable
|
||||
using Bit.Core.Models.Api;
|
||||
|
||||
namespace Bit.Api.SecretsManager.Models.Response;
|
||||
|
||||
public class ProjectCountsResponseModel() : ResponseModel(_objectName)
|
||||
{
|
||||
private const string _objectName = "projectCounts";
|
||||
|
||||
public int Secrets { get; set; }
|
||||
|
||||
public int People { get; set; }
|
||||
|
||||
public int ServiceAccounts { get; set; }
|
||||
}
|
@ -0,0 +1,15 @@
|
||||
#nullable enable
|
||||
using Bit.Core.Models.Api;
|
||||
|
||||
namespace Bit.Api.SecretsManager.Models.Response;
|
||||
|
||||
public class ServiceAccountCountsResponseModel() : ResponseModel(_objectName)
|
||||
{
|
||||
private const string _objectName = "serviceAccountCounts";
|
||||
|
||||
public int Projects { get; set; }
|
||||
|
||||
public int People { get; set; }
|
||||
|
||||
public int AccessTokens { get; set; }
|
||||
}
|
10
src/Core/SecretsManager/Models/Data/ProjectCounts.cs
Normal file
10
src/Core/SecretsManager/Models/Data/ProjectCounts.cs
Normal file
@ -0,0 +1,10 @@
|
||||
namespace Bit.Core.SecretsManager.Models.Data;
|
||||
|
||||
public class ProjectCounts
|
||||
{
|
||||
public int Secrets { get; set; }
|
||||
|
||||
public int People { get; set; }
|
||||
|
||||
public int ServiceAccounts { get; set; }
|
||||
}
|
10
src/Core/SecretsManager/Models/Data/ServiceAccountCounts.cs
Normal file
10
src/Core/SecretsManager/Models/Data/ServiceAccountCounts.cs
Normal file
@ -0,0 +1,10 @@
|
||||
namespace Bit.Core.SecretsManager.Models.Data;
|
||||
|
||||
public class ServiceAccountCounts
|
||||
{
|
||||
public int Projects { get; set; }
|
||||
|
||||
public int People { get; set; }
|
||||
|
||||
public int AccessTokens { get; set; }
|
||||
}
|
@ -17,6 +17,8 @@ public interface IProjectRepository
|
||||
Task<(bool Read, bool Write)> AccessToProjectAsync(Guid id, Guid userId, AccessClientType accessType);
|
||||
Task<bool> ProjectsAreInOrganization(List<Guid> projectIds, Guid organizationId);
|
||||
Task<int> GetProjectCountByOrganizationIdAsync(Guid organizationId);
|
||||
Task<int> GetProjectCountByOrganizationIdAsync(Guid organizationId, Guid userId, AccessClientType accessType);
|
||||
Task<ProjectCounts> GetProjectCountsByIdAsync(Guid projectId, Guid userId, AccessClientType accessType);
|
||||
Task<Dictionary<Guid, (bool Read, bool Write)>> AccessToProjectsAsync(IEnumerable<Guid> projectIds, Guid userId,
|
||||
AccessClientType accessType);
|
||||
}
|
||||
|
@ -24,4 +24,5 @@ public interface ISecretRepository
|
||||
Task<Dictionary<Guid, (bool Read, bool Write)>> AccessToSecretsAsync(IEnumerable<Guid> ids, Guid userId, AccessClientType accessType);
|
||||
Task EmptyTrash(DateTime nowTime, uint deleteAfterThisNumberOfDays);
|
||||
Task<int> GetSecretsCountByOrganizationIdAsync(Guid organizationId);
|
||||
Task<int> GetSecretsCountByOrganizationIdAsync(Guid organizationId, Guid userId, AccessClientType accessType);
|
||||
}
|
||||
|
@ -17,6 +17,9 @@ public interface IServiceAccountRepository
|
||||
Task<Dictionary<Guid, (bool Read, bool Write)>> AccessToServiceAccountsAsync(IEnumerable<Guid> ids, Guid userId,
|
||||
AccessClientType accessType);
|
||||
Task<int> GetServiceAccountCountByOrganizationIdAsync(Guid organizationId);
|
||||
Task<int> GetServiceAccountCountByOrganizationIdAsync(Guid organizationId, Guid userId, AccessClientType accessType);
|
||||
Task<ServiceAccountCounts> GetServiceAccountCountsByIdAsync(Guid serviceAccountId, Guid userId, AccessClientType accessType);
|
||||
|
||||
Task<IEnumerable<ServiceAccountSecretsDetails>> GetManyByOrganizationIdWithSecretsDetailsAsync(Guid organizationId, Guid userId, AccessClientType accessType);
|
||||
Task<bool> ServiceAccountsAreInOrganizationAsync(List<Guid> serviceAccountIds, Guid organizationId);
|
||||
}
|
||||
|
@ -63,6 +63,17 @@ public class NoopProjectRepository : IProjectRepository
|
||||
return Task.FromResult(0);
|
||||
}
|
||||
|
||||
public Task<int> GetProjectCountByOrganizationIdAsync(Guid organizationId, Guid userId,
|
||||
AccessClientType accessType)
|
||||
{
|
||||
return Task.FromResult(0);
|
||||
}
|
||||
|
||||
public Task<ProjectCounts> GetProjectCountsByIdAsync(Guid projectId, Guid userId, AccessClientType accessType)
|
||||
{
|
||||
return Task.FromResult(null as ProjectCounts);
|
||||
}
|
||||
|
||||
public Task<Dictionary<Guid, (bool Read, bool Write)>> AccessToProjectsAsync(IEnumerable<Guid> projectIds,
|
||||
Guid userId, AccessClientType accessType)
|
||||
{
|
||||
|
@ -96,4 +96,10 @@ public class NoopSecretRepository : ISecretRepository
|
||||
{
|
||||
return Task.FromResult(0);
|
||||
}
|
||||
|
||||
public Task<int> GetSecretsCountByOrganizationIdAsync(Guid organizationId, Guid userId,
|
||||
AccessClientType accessType)
|
||||
{
|
||||
return Task.FromResult(0);
|
||||
}
|
||||
}
|
||||
|
@ -64,6 +64,18 @@ public class NoopServiceAccountRepository : IServiceAccountRepository
|
||||
return Task.FromResult(0);
|
||||
}
|
||||
|
||||
public Task<int> GetServiceAccountCountByOrganizationIdAsync(Guid organizationId, Guid userId,
|
||||
AccessClientType accessType)
|
||||
{
|
||||
return Task.FromResult(0);
|
||||
}
|
||||
|
||||
public Task<ServiceAccountCounts> GetServiceAccountCountsByIdAsync(Guid serviceAccountId, Guid userId,
|
||||
AccessClientType accessType)
|
||||
{
|
||||
return Task.FromResult(null as ServiceAccountCounts);
|
||||
}
|
||||
|
||||
public Task<IEnumerable<ServiceAccountSecretsDetails>> GetManyByOrganizationIdWithSecretsDetailsAsync(
|
||||
Guid organizationId, Guid userId, AccessClientType accessType)
|
||||
{
|
||||
|
@ -8,6 +8,8 @@ public class ServiceAccount : Core.SecretsManager.Entities.ServiceAccount
|
||||
public virtual Organization Organization { get; set; }
|
||||
public virtual ICollection<GroupServiceAccountAccessPolicy> GroupAccessPolicies { get; set; }
|
||||
public virtual ICollection<UserServiceAccountAccessPolicy> UserAccessPolicies { get; set; }
|
||||
public virtual ICollection<ServiceAccountProjectAccessPolicy> ProjectAccessPolicies { get; set; }
|
||||
public virtual ICollection<ApiKey> ApiKeys { get; set; }
|
||||
}
|
||||
|
||||
public class ServiceAccountMapperProfile : Profile
|
||||
|
@ -0,0 +1,550 @@
|
||||
using System.Net;
|
||||
using Bit.Api.IntegrationTest.Factories;
|
||||
using Bit.Api.IntegrationTest.SecretsManager.Enums;
|
||||
using Bit.Api.IntegrationTest.SecretsManager.Helpers;
|
||||
using Bit.Api.SecretsManager.Models.Response;
|
||||
using Bit.Core.AdminConsole.Entities;
|
||||
using Bit.Core.AdminConsole.Repositories;
|
||||
using Bit.Core.Entities;
|
||||
using Bit.Core.Enums;
|
||||
using Bit.Core.Repositories;
|
||||
using Bit.Core.SecretsManager.Entities;
|
||||
using Bit.Core.SecretsManager.Repositories;
|
||||
using Xunit;
|
||||
|
||||
namespace Bit.Api.IntegrationTest.SecretsManager.Controllers;
|
||||
|
||||
public class CountsControllerTests : IClassFixture<ApiApplicationFactory>, IAsyncLifetime
|
||||
{
|
||||
private readonly string _mockEncryptedString =
|
||||
"2.3Uk+WNBIoU5xzmVFNcoWzz==|1MsPIYuRfdOHfu/0uY6H2Q==|/98sp4wb6pHP1VTZ9JcNCYgQjEUMFPlqJgCwRk1YXKg=";
|
||||
|
||||
private readonly HttpClient _client;
|
||||
private readonly ApiApplicationFactory _factory;
|
||||
private readonly IProjectRepository _projectRepository;
|
||||
private readonly ISecretRepository _secretRepository;
|
||||
private readonly IServiceAccountRepository _serviceAccountRepository;
|
||||
private readonly IApiKeyRepository _apiKeyRepository;
|
||||
private readonly IAccessPolicyRepository _accessPolicyRepository;
|
||||
private readonly IGroupRepository _groupRepository;
|
||||
private readonly IOrganizationUserRepository _organizationUserRepository;
|
||||
private readonly LoginHelper _loginHelper;
|
||||
|
||||
private string _email = null!;
|
||||
private SecretsManagerOrganizationHelper _organizationHelper = null!;
|
||||
|
||||
|
||||
public CountsControllerTests(ApiApplicationFactory factory)
|
||||
{
|
||||
_factory = factory;
|
||||
_client = _factory.CreateClient();
|
||||
_projectRepository = _factory.GetService<IProjectRepository>();
|
||||
_secretRepository = _factory.GetService<ISecretRepository>();
|
||||
_serviceAccountRepository = _factory.GetService<IServiceAccountRepository>();
|
||||
_apiKeyRepository = _factory.GetService<IApiKeyRepository>();
|
||||
_accessPolicyRepository = _factory.GetService<IAccessPolicyRepository>();
|
||||
_groupRepository = _factory.GetService<IGroupRepository>();
|
||||
_organizationUserRepository = _factory.GetService<IOrganizationUserRepository>();
|
||||
_loginHelper = new LoginHelper(_factory, _client);
|
||||
}
|
||||
|
||||
|
||||
public async Task InitializeAsync()
|
||||
{
|
||||
_email = $"integration-test{Guid.NewGuid()}@bitwarden.com";
|
||||
await _factory.LoginWithNewAccount(_email);
|
||||
_organizationHelper = new SecretsManagerOrganizationHelper(_factory, _email);
|
||||
}
|
||||
|
||||
public Task DisposeAsync()
|
||||
{
|
||||
_client.Dispose();
|
||||
return Task.CompletedTask;
|
||||
}
|
||||
|
||||
[Theory]
|
||||
[InlineData(false, false, false)]
|
||||
[InlineData(false, false, true)]
|
||||
[InlineData(false, true, false)]
|
||||
[InlineData(false, true, true)]
|
||||
[InlineData(true, false, false)]
|
||||
[InlineData(true, false, true)]
|
||||
[InlineData(true, true, false)]
|
||||
public async Task GetByOrganizationAsync_SmAccessDenied_NotFound(bool useSecrets, bool accessSecrets,
|
||||
bool organizationEnabled)
|
||||
{
|
||||
var (org, _) = await _organizationHelper.Initialize(useSecrets, accessSecrets, organizationEnabled);
|
||||
await _loginHelper.LoginAsync(_email);
|
||||
|
||||
var response = await _client.GetAsync($"/organizations/{org.Id}/sm-counts");
|
||||
Assert.Equal(HttpStatusCode.NotFound, response.StatusCode);
|
||||
}
|
||||
|
||||
[Fact]
|
||||
public async Task GetByOrganizationAsync_RunAsServiceAccount_NotFound()
|
||||
{
|
||||
var (_, org, _) = await SetupProjectsWithAccessAsync(PermissionType.RunAsServiceAccountWithPermission);
|
||||
|
||||
var response = await _client.GetAsync($"/organizations/{org.Id}/sm-counts");
|
||||
Assert.Equal(HttpStatusCode.NotFound, response.StatusCode);
|
||||
}
|
||||
|
||||
[Fact]
|
||||
public async Task GetByOrganizationAsync_UserWithoutPermission_ZeroCounts()
|
||||
{
|
||||
var (_, org, _) = await SetupProjectsWithAccessAsync(PermissionType.RunAsUserWithPermission, 0);
|
||||
|
||||
var projects = await CreateProjectsAsync(org.Id);
|
||||
await CreateSecretsAsync(org.Id, projects[0]);
|
||||
await CreateServiceAccountsAsync(org.Id);
|
||||
|
||||
var response = await _client.GetAsync($"/organizations/{org.Id}/sm-counts");
|
||||
response.EnsureSuccessStatusCode();
|
||||
|
||||
var result = await response.Content.ReadFromJsonAsync<OrganizationCountsResponseModel>();
|
||||
Assert.NotNull(result);
|
||||
Assert.Equal(0, result.Projects);
|
||||
Assert.Equal(0, result.Secrets);
|
||||
Assert.Equal(0, result.ServiceAccounts);
|
||||
}
|
||||
|
||||
[Theory]
|
||||
[InlineData(PermissionType.RunAsAdmin)]
|
||||
[InlineData(PermissionType.RunAsUserWithPermission)]
|
||||
public async Task GetByOrganizationAsync_Success(PermissionType permissionType)
|
||||
{
|
||||
var (projects, org, user) = await SetupProjectsWithAccessAsync(permissionType);
|
||||
var projectsWithoutAccess = await CreateProjectsAsync(org.Id);
|
||||
|
||||
var secrets = await CreateSecretsAsync(org.Id, projects[0]);
|
||||
var secretsWithoutAccess = await CreateSecretsAsync(org.Id, projectsWithoutAccess[0]);
|
||||
var secretsWithoutProject = await CreateSecretsAsync(org.Id, null);
|
||||
|
||||
var serviceAccounts = await CreateServiceAccountsAsync(org.Id);
|
||||
await CreateUserServiceAccountAccessPolicyAsync(user.Id, serviceAccounts[0].Id);
|
||||
|
||||
var response = await _client.GetAsync($"/organizations/{org.Id}/sm-counts");
|
||||
response.EnsureSuccessStatusCode();
|
||||
|
||||
var result = await response.Content.ReadFromJsonAsync<OrganizationCountsResponseModel>();
|
||||
Assert.NotNull(result);
|
||||
if (permissionType == PermissionType.RunAsAdmin)
|
||||
{
|
||||
Assert.Equal(projects.Count + projectsWithoutAccess.Count, result.Projects);
|
||||
Assert.Equal(secrets.Count + secretsWithoutAccess.Count + secretsWithoutProject.Count,
|
||||
result.Secrets);
|
||||
Assert.Equal(serviceAccounts.Count, result.ServiceAccounts);
|
||||
}
|
||||
else
|
||||
{
|
||||
Assert.Equal(projects.Count, result.Projects);
|
||||
Assert.Equal(secrets.Count, result.Secrets);
|
||||
Assert.Equal(1, result.ServiceAccounts);
|
||||
}
|
||||
}
|
||||
|
||||
[Theory]
|
||||
[InlineData(false, false, false)]
|
||||
[InlineData(false, false, true)]
|
||||
[InlineData(false, true, false)]
|
||||
[InlineData(false, true, true)]
|
||||
[InlineData(true, false, false)]
|
||||
[InlineData(true, false, true)]
|
||||
[InlineData(true, true, false)]
|
||||
public async Task GetByProjectAsync_SmAccessDenied_NotFound(bool useSecrets, bool accessSecrets,
|
||||
bool organizationEnabled)
|
||||
{
|
||||
var (org, _) = await _organizationHelper.Initialize(useSecrets, accessSecrets, organizationEnabled);
|
||||
await _loginHelper.LoginAsync(_email);
|
||||
|
||||
var projects = await CreateProjectsAsync(org.Id);
|
||||
|
||||
var response = await _client.GetAsync($"/projects/{projects[0].Id}/sm-counts");
|
||||
Assert.Equal(HttpStatusCode.NotFound, response.StatusCode);
|
||||
}
|
||||
|
||||
[Fact]
|
||||
public async Task GetByProjectAsync_RunAsServiceAccount_NotFound()
|
||||
{
|
||||
var (projects, _, _) = await SetupProjectsWithAccessAsync(PermissionType.RunAsServiceAccountWithPermission);
|
||||
|
||||
var response = await _client.GetAsync($"/projects/{projects[0].Id}/sm-counts");
|
||||
Assert.Equal(HttpStatusCode.NotFound, response.StatusCode);
|
||||
}
|
||||
|
||||
[Theory]
|
||||
[InlineData(PermissionType.RunAsAdmin)]
|
||||
[InlineData(PermissionType.RunAsUserWithPermission)]
|
||||
public async Task GetByProjectAsync_NonExistingProject_NotFound(PermissionType permissionType)
|
||||
{
|
||||
await SetupProjectsWithAccessAsync(permissionType);
|
||||
|
||||
var response = await _client.GetAsync($"/projects/{Guid.NewGuid().ToString()}/sm-counts");
|
||||
Assert.Equal(HttpStatusCode.NotFound, response.StatusCode);
|
||||
}
|
||||
|
||||
[Fact]
|
||||
public async Task GetByProjectAsync_UserWithoutPermission_ZeroCounts()
|
||||
{
|
||||
var (_, org, user) = await SetupProjectsWithAccessAsync(PermissionType.RunAsUserWithPermission, 0);
|
||||
|
||||
var projects = await CreateProjectsAsync(org.Id);
|
||||
|
||||
await CreateSecretsAsync(org.Id, projects[0]);
|
||||
|
||||
var groups = await CreateGroupsAsync(org.Id, user);
|
||||
await CreateGroupProjectAccessPolicyAsync(groups[0].Id, projects[0].Id);
|
||||
|
||||
var serviceAccounts = await CreateServiceAccountsAsync(org.Id);
|
||||
await CreateServiceAccountProjectAccessPolicyAsync(projects[0].Id, serviceAccounts[0].Id);
|
||||
|
||||
var response = await _client.GetAsync($"/projects/{projects[0].Id}/sm-counts");
|
||||
response.EnsureSuccessStatusCode();
|
||||
|
||||
var result = await response.Content.ReadFromJsonAsync<ProjectCountsResponseModel>();
|
||||
Assert.NotNull(result);
|
||||
Assert.Equal(0, result.Secrets);
|
||||
Assert.Equal(0, result.People);
|
||||
Assert.Equal(0, result.ServiceAccounts);
|
||||
}
|
||||
|
||||
[Theory]
|
||||
[InlineData(PermissionType.RunAsAdmin, true)]
|
||||
[InlineData(PermissionType.RunAsUserWithPermission, false)]
|
||||
[InlineData(PermissionType.RunAsUserWithPermission, true)]
|
||||
public async Task GetByProjectAsync_Success(PermissionType permissionType, bool userProjectWriteAccess)
|
||||
{
|
||||
var (projects, org, user) = await SetupProjectsWithAccessAsync(permissionType, 3, userProjectWriteAccess);
|
||||
|
||||
var secrets = await CreateSecretsAsync(org.Id, projects[0]);
|
||||
await CreateSecretsAsync(org.Id, projects[1]);
|
||||
|
||||
var groups = await CreateGroupsAsync(org.Id, user);
|
||||
await CreateGroupProjectAccessPolicyAsync(groups[0].Id, projects[0].Id);
|
||||
await CreateGroupProjectAccessPolicyAsync(groups[0].Id, projects[1].Id);
|
||||
var (_, user2) = await _organizationHelper.CreateNewUser(OrganizationUserType.User, true);
|
||||
await CreateUserProjectAccessPolicyAsync(user2.Id, projects[0].Id);
|
||||
|
||||
var serviceAccounts = await CreateServiceAccountsAsync(org.Id);
|
||||
await CreateUserServiceAccountAccessPolicyAsync(user.Id, serviceAccounts[0].Id);
|
||||
await CreateServiceAccountProjectAccessPolicyAsync(projects[0].Id, serviceAccounts[0].Id);
|
||||
|
||||
var response = await _client.GetAsync($"/projects/{projects[0].Id}/sm-counts");
|
||||
response.EnsureSuccessStatusCode();
|
||||
|
||||
var result = await response.Content.ReadFromJsonAsync<ProjectCountsResponseModel>();
|
||||
Assert.NotNull(result);
|
||||
Assert.Equal(secrets.Count, result.Secrets);
|
||||
if (userProjectWriteAccess)
|
||||
{
|
||||
Assert.Equal(permissionType == PermissionType.RunAsAdmin ? 2 : 3, result.People);
|
||||
Assert.Equal(1, result.ServiceAccounts);
|
||||
}
|
||||
else
|
||||
{
|
||||
Assert.Equal(0, result.People);
|
||||
Assert.Equal(0, result.ServiceAccounts);
|
||||
}
|
||||
}
|
||||
|
||||
[Theory]
|
||||
[InlineData(false, false, false)]
|
||||
[InlineData(false, false, true)]
|
||||
[InlineData(false, true, false)]
|
||||
[InlineData(false, true, true)]
|
||||
[InlineData(true, false, false)]
|
||||
[InlineData(true, false, true)]
|
||||
[InlineData(true, true, false)]
|
||||
public async Task GetByServiceAccountAsync_SmAccessDenied_NotFound(bool useSecrets, bool accessSecrets,
|
||||
bool organizationEnabled)
|
||||
{
|
||||
var (org, _) = await _organizationHelper.Initialize(useSecrets, accessSecrets, organizationEnabled);
|
||||
await _loginHelper.LoginAsync(_email);
|
||||
|
||||
var serviceAccounts = await CreateServiceAccountsAsync(org.Id);
|
||||
|
||||
var response = await _client.GetAsync($"/service-accounts/{serviceAccounts[0].Id}/sm-counts");
|
||||
Assert.Equal(HttpStatusCode.NotFound, response.StatusCode);
|
||||
}
|
||||
|
||||
[Fact]
|
||||
public async Task GetByServiceAccountAsync_RunAsServiceAccount_NotFound()
|
||||
{
|
||||
var (_, org, _) = await SetupProjectsWithAccessAsync(PermissionType.RunAsServiceAccountWithPermission);
|
||||
|
||||
var serviceAccounts = await CreateServiceAccountsAsync(org.Id);
|
||||
|
||||
var response = await _client.GetAsync($"/service-accounts/{serviceAccounts[0].Id}/sm-counts");
|
||||
Assert.Equal(HttpStatusCode.NotFound, response.StatusCode);
|
||||
}
|
||||
|
||||
[Theory]
|
||||
[InlineData(PermissionType.RunAsAdmin)]
|
||||
[InlineData(PermissionType.RunAsUserWithPermission)]
|
||||
public async Task GetByServiceAccountAsync_NonExistingServiceAccount_NotFound(PermissionType permissionType)
|
||||
{
|
||||
await SetupProjectsWithAccessAsync(permissionType);
|
||||
|
||||
var response = await _client.GetAsync($"/service-accounts/{Guid.NewGuid().ToString()}/sm-counts");
|
||||
Assert.Equal(HttpStatusCode.NotFound, response.StatusCode);
|
||||
}
|
||||
|
||||
[Fact]
|
||||
public async Task GetByServiceAccountAsync_UserWithoutPermission_ZeroCounts()
|
||||
{
|
||||
var (_, org, user) = await SetupProjectsWithAccessAsync(PermissionType.RunAsUserWithPermission, 0);
|
||||
|
||||
var projects = await CreateProjectsAsync(org.Id);
|
||||
|
||||
var serviceAccounts = await CreateServiceAccountsAsync(org.Id);
|
||||
await CreateServiceAccountProjectAccessPolicyAsync(projects[0].Id, serviceAccounts[0].Id);
|
||||
|
||||
var groups = await CreateGroupsAsync(org.Id, user);
|
||||
await CreateGroupServiceAccountAccessPolicyAsync(groups[0].Id, serviceAccounts[0].Id);
|
||||
|
||||
await CreateApiKeysAsync(serviceAccounts[0]);
|
||||
|
||||
var response = await _client.GetAsync($"/service-accounts/{serviceAccounts[0].Id}/sm-counts");
|
||||
response.EnsureSuccessStatusCode();
|
||||
|
||||
var result = await response.Content.ReadFromJsonAsync<ServiceAccountCountsResponseModel>();
|
||||
Assert.NotNull(result);
|
||||
Assert.Equal(0, result.Projects);
|
||||
Assert.Equal(0, result.People);
|
||||
Assert.Equal(0, result.AccessTokens);
|
||||
}
|
||||
|
||||
[Theory]
|
||||
[InlineData(PermissionType.RunAsAdmin)]
|
||||
[InlineData(PermissionType.RunAsUserWithPermission)]
|
||||
public async Task GetByServiceAccountAsync_Success(PermissionType permissionType)
|
||||
{
|
||||
var (projects, org, user) = await SetupProjectsWithAccessAsync(permissionType);
|
||||
|
||||
var serviceAccounts = await CreateServiceAccountsAsync(org.Id);
|
||||
await CreateServiceAccountProjectAccessPolicyAsync(projects[0].Id, serviceAccounts[0].Id);
|
||||
await CreateServiceAccountProjectAccessPolicyAsync(projects[0].Id, serviceAccounts[1].Id);
|
||||
await CreateServiceAccountProjectAccessPolicyAsync(projects[1].Id, serviceAccounts[0].Id);
|
||||
|
||||
await CreateUserServiceAccountAccessPolicyAsync(user.Id, serviceAccounts[0].Id);
|
||||
var groups = await CreateGroupsAsync(org.Id, user);
|
||||
await CreateGroupServiceAccountAccessPolicyAsync(groups[0].Id, serviceAccounts[0].Id);
|
||||
await CreateGroupServiceAccountAccessPolicyAsync(groups[0].Id, serviceAccounts[1].Id);
|
||||
var (_, user2) = await _organizationHelper.CreateNewUser(OrganizationUserType.User, true);
|
||||
await CreateUserServiceAccountAccessPolicyAsync(user2.Id, serviceAccounts[0].Id);
|
||||
|
||||
var apiKeys = await CreateApiKeysAsync(serviceAccounts[0]);
|
||||
await CreateApiKeysAsync(serviceAccounts[1]);
|
||||
|
||||
var response = await _client.GetAsync($"/service-accounts/{serviceAccounts[0].Id}/sm-counts");
|
||||
response.EnsureSuccessStatusCode();
|
||||
|
||||
var result = await response.Content.ReadFromJsonAsync<ServiceAccountCountsResponseModel>();
|
||||
Assert.NotNull(result);
|
||||
Assert.Equal(2, result.Projects);
|
||||
Assert.Equal(3, result.People);
|
||||
Assert.Equal(apiKeys.Count, result.AccessTokens);
|
||||
}
|
||||
|
||||
private async Task<List<Project>> CreateProjectsAsync(Guid orgId, int numberToCreate = 3)
|
||||
{
|
||||
var projects = new List<Project>();
|
||||
for (var i = 0; i < numberToCreate; i++)
|
||||
{
|
||||
var project = await _projectRepository.CreateAsync(new Project
|
||||
{
|
||||
OrganizationId = orgId,
|
||||
Name = _mockEncryptedString,
|
||||
});
|
||||
projects.Add(project);
|
||||
}
|
||||
|
||||
return projects;
|
||||
}
|
||||
|
||||
private async Task<List<Secret>> CreateSecretsAsync(Guid organizationId, Project? project, int numberToCreate = 3)
|
||||
{
|
||||
var secrets = new List<Secret>();
|
||||
for (var i = 0; i < numberToCreate; i++)
|
||||
{
|
||||
var secret = await _secretRepository.CreateAsync(new Secret
|
||||
{
|
||||
OrganizationId = organizationId,
|
||||
Key = _mockEncryptedString,
|
||||
Value = _mockEncryptedString,
|
||||
Note = _mockEncryptedString,
|
||||
Projects = project != null ? new List<Project> { project } : null
|
||||
});
|
||||
secrets.Add(secret);
|
||||
}
|
||||
|
||||
return secrets;
|
||||
}
|
||||
|
||||
private async Task<List<ServiceAccount>> CreateServiceAccountsAsync(Guid organizationId, int numberToCreate = 3)
|
||||
{
|
||||
var serviceAccounts = new List<ServiceAccount>();
|
||||
for (var i = 0; i < numberToCreate; i++)
|
||||
{
|
||||
var serviceAccount = await _serviceAccountRepository.CreateAsync(new ServiceAccount
|
||||
{
|
||||
OrganizationId = organizationId,
|
||||
Name = _mockEncryptedString
|
||||
});
|
||||
serviceAccounts.Add(serviceAccount);
|
||||
}
|
||||
|
||||
return serviceAccounts;
|
||||
}
|
||||
|
||||
private async Task<List<Group>> CreateGroupsAsync(Guid organizationId, OrganizationUser? user,
|
||||
int numberToCreate = 3)
|
||||
{
|
||||
var groups = new List<Group>();
|
||||
|
||||
for (var i = 0; i < numberToCreate; i++)
|
||||
{
|
||||
var group = await _groupRepository.CreateAsync(new Group
|
||||
{
|
||||
OrganizationId = organizationId,
|
||||
Name = _mockEncryptedString,
|
||||
});
|
||||
groups.Add(group);
|
||||
|
||||
if (user != null)
|
||||
{
|
||||
await _organizationUserRepository.UpdateGroupsAsync(user.Id, [group.Id]);
|
||||
}
|
||||
}
|
||||
|
||||
return groups;
|
||||
}
|
||||
|
||||
private async Task<List<ApiKey>> CreateApiKeysAsync(ServiceAccount serviceAccount, int numberToCreate = 3)
|
||||
{
|
||||
var apiKeys = new List<ApiKey>();
|
||||
|
||||
for (var i = 0; i < numberToCreate; i++)
|
||||
{
|
||||
var apiKey = await _apiKeyRepository.CreateAsync(new ApiKey
|
||||
{
|
||||
Name = _mockEncryptedString,
|
||||
ServiceAccountId = serviceAccount.Id,
|
||||
Scope = "api.secrets",
|
||||
Key = serviceAccount.OrganizationId.ToString(),
|
||||
EncryptedPayload = _mockEncryptedString,
|
||||
ClientSecretHash = "807613bbf6692e6809a571bc694a4719a5aa6863f7a62bd714003ab73de588e6"
|
||||
});
|
||||
apiKeys.Add(apiKey);
|
||||
}
|
||||
|
||||
return apiKeys;
|
||||
}
|
||||
|
||||
private async Task<(List<Project>, Organization, OrganizationUser)> SetupProjectsWithAccessAsync(
|
||||
PermissionType permissionType,
|
||||
int projectsToCreate = 3,
|
||||
bool writeAccess = false)
|
||||
{
|
||||
var (org, owner) = await _organizationHelper.Initialize(true, true, true);
|
||||
var projects = await CreateProjectsAsync(org.Id, projectsToCreate);
|
||||
var user = owner;
|
||||
|
||||
switch (permissionType)
|
||||
{
|
||||
case PermissionType.RunAsAdmin:
|
||||
await _loginHelper.LoginAsync(_email);
|
||||
break;
|
||||
case PermissionType.RunAsUserWithPermission:
|
||||
{
|
||||
var (email, orgUser) = await _organizationHelper.CreateNewUser(OrganizationUserType.User, true);
|
||||
user = orgUser;
|
||||
await _loginHelper.LoginAsync(email);
|
||||
|
||||
foreach (var project in projects)
|
||||
{
|
||||
await CreateUserProjectAccessPolicyAsync(user.Id, project.Id, writeAccess);
|
||||
}
|
||||
|
||||
break;
|
||||
}
|
||||
case PermissionType.RunAsServiceAccountWithPermission:
|
||||
{
|
||||
var apiKeyDetails = await _organizationHelper.CreateNewServiceAccountApiKeyAsync();
|
||||
await _loginHelper.LoginWithApiKeyAsync(apiKeyDetails);
|
||||
|
||||
foreach (var project in projects)
|
||||
{
|
||||
await CreateServiceAccountProjectAccessPolicyAsync(project.Id, apiKeyDetails.ApiKey.ServiceAccountId!.Value);
|
||||
}
|
||||
|
||||
break;
|
||||
}
|
||||
default:
|
||||
throw new ArgumentOutOfRangeException(nameof(permissionType), permissionType, null);
|
||||
}
|
||||
|
||||
return (projects, org, user);
|
||||
}
|
||||
|
||||
private async Task CreateUserProjectAccessPolicyAsync(Guid userId, Guid projectId, bool write = false)
|
||||
{
|
||||
var policy = new UserProjectAccessPolicy
|
||||
{
|
||||
OrganizationUserId = userId,
|
||||
GrantedProjectId = projectId,
|
||||
Read = true,
|
||||
Write = write,
|
||||
};
|
||||
await _accessPolicyRepository.CreateManyAsync([policy]);
|
||||
}
|
||||
|
||||
private async Task CreateGroupProjectAccessPolicyAsync(Guid groupId, Guid projectId)
|
||||
{
|
||||
var policy = new GroupProjectAccessPolicy
|
||||
{
|
||||
GroupId = groupId,
|
||||
GrantedProjectId = projectId,
|
||||
Read = true,
|
||||
Write = false,
|
||||
};
|
||||
await _accessPolicyRepository.CreateManyAsync([policy]);
|
||||
}
|
||||
|
||||
|
||||
private async Task CreateUserServiceAccountAccessPolicyAsync(Guid userId, Guid serviceAccountId)
|
||||
{
|
||||
var policy = new UserServiceAccountAccessPolicy
|
||||
{
|
||||
OrganizationUserId = userId,
|
||||
GrantedServiceAccountId = serviceAccountId,
|
||||
Read = true,
|
||||
Write = false,
|
||||
};
|
||||
await _accessPolicyRepository.CreateManyAsync([policy]);
|
||||
}
|
||||
|
||||
private async Task CreateGroupServiceAccountAccessPolicyAsync(Guid groupId, Guid serviceAccountId)
|
||||
{
|
||||
var policy = new GroupServiceAccountAccessPolicy
|
||||
{
|
||||
GroupId = groupId,
|
||||
GrantedServiceAccountId = serviceAccountId,
|
||||
Read = true,
|
||||
Write = false
|
||||
};
|
||||
await _accessPolicyRepository.CreateManyAsync([policy]);
|
||||
}
|
||||
|
||||
private async Task CreateServiceAccountProjectAccessPolicyAsync(Guid projectId, Guid serviceAccountId)
|
||||
{
|
||||
var policy = new ServiceAccountProjectAccessPolicy
|
||||
{
|
||||
ServiceAccountId = serviceAccountId,
|
||||
GrantedProjectId = projectId,
|
||||
Read = true,
|
||||
Write = false,
|
||||
};
|
||||
await _accessPolicyRepository.CreateManyAsync([policy]);
|
||||
}
|
||||
}
|
@ -295,11 +295,7 @@ public class ProjectsControllerTests : IClassFixture<ApiApplicationFactory>, IAs
|
||||
Name = _mockEncryptedString,
|
||||
});
|
||||
|
||||
var mockEncryptedString2 =
|
||||
"2.3Uk+WNBIoU5xzmVFNcoWzz==|1MsPIYuRfdOHfu/0uY6H2Q==|/98xy4wb6pHP1VTZ9JcNCYgQjEUMFPlqJgCwRk1YXKg=";
|
||||
var request = new ProjectCreateRequestModel { Name = mockEncryptedString2 };
|
||||
|
||||
var response = await _client.PutAsJsonAsync($"/projects/{project.Id}", request);
|
||||
var response = await _client.GetAsync($"/projects/{project.Id}");
|
||||
Assert.Equal(HttpStatusCode.NotFound, response.StatusCode);
|
||||
}
|
||||
|
||||
|
@ -0,0 +1,212 @@
|
||||
#nullable enable
|
||||
using System.Security.Claims;
|
||||
using Bit.Api.SecretsManager.Controllers;
|
||||
using Bit.Api.SecretsManager.Models.Response;
|
||||
using Bit.Core.Context;
|
||||
using Bit.Core.Enums;
|
||||
using Bit.Core.Exceptions;
|
||||
using Bit.Core.SecretsManager.Entities;
|
||||
using Bit.Core.SecretsManager.Models.Data;
|
||||
using Bit.Core.SecretsManager.Queries.Interfaces;
|
||||
using Bit.Core.SecretsManager.Repositories;
|
||||
using Bit.Core.Test.SecretsManager.AutoFixture.ProjectsFixture;
|
||||
using Bit.Test.Common.AutoFixture;
|
||||
using Bit.Test.Common.AutoFixture.Attributes;
|
||||
using NSubstitute;
|
||||
using Xunit;
|
||||
|
||||
namespace Bit.Api.Test.SecretsManager.Controllers;
|
||||
|
||||
[ControllerCustomize(typeof(CountsController))]
|
||||
[SutProviderCustomize]
|
||||
[ProjectCustomize]
|
||||
[JsonDocumentCustomize]
|
||||
public class CountsControllerTests
|
||||
{
|
||||
[Theory]
|
||||
[BitAutoData]
|
||||
public async Task GetByOrganizationAsync_NoAccess_Throws(SutProvider<CountsController> sutProvider,
|
||||
Guid organizationId)
|
||||
{
|
||||
sutProvider.GetDependency<ICurrentContext>().AccessSecretsManager(organizationId).Returns(false);
|
||||
|
||||
await Assert.ThrowsAsync<NotFoundException>(() => sutProvider.Sut.GetByOrganizationAsync(organizationId));
|
||||
}
|
||||
|
||||
[Theory]
|
||||
[BitAutoData]
|
||||
public async Task GetByOrganizationAsync_ServiceAccountAccess_Throws(SutProvider<CountsController> sutProvider,
|
||||
Guid organizationId, Guid userId)
|
||||
{
|
||||
sutProvider.GetDependency<ICurrentContext>().AccessSecretsManager(organizationId).Returns(true);
|
||||
|
||||
sutProvider.GetDependency<IAccessClientQuery>()
|
||||
.GetAccessClientAsync(Arg.Any<ClaimsPrincipal>(), organizationId)
|
||||
.Returns((AccessClientType.ServiceAccount, userId));
|
||||
|
||||
await Assert.ThrowsAsync<NotFoundException>(() => sutProvider.Sut.GetByOrganizationAsync(organizationId));
|
||||
}
|
||||
|
||||
[Theory]
|
||||
[BitAutoData(AccessClientType.NoAccessCheck)]
|
||||
[BitAutoData(AccessClientType.User)]
|
||||
public async Task GetByOrganizationAsync_HasAccess_Success(AccessClientType accessClientType,
|
||||
SutProvider<CountsController> sutProvider, Guid organizationId, Guid userId,
|
||||
OrganizationCountsResponseModel expectedCountsResponseModel)
|
||||
{
|
||||
sutProvider.GetDependency<ICurrentContext>().AccessSecretsManager(organizationId).Returns(true);
|
||||
|
||||
sutProvider.GetDependency<IAccessClientQuery>()
|
||||
.GetAccessClientAsync(Arg.Any<ClaimsPrincipal>(), organizationId).Returns((accessClientType, userId));
|
||||
|
||||
sutProvider.GetDependency<IProjectRepository>()
|
||||
.GetProjectCountByOrganizationIdAsync(organizationId, userId, accessClientType)
|
||||
.Returns(expectedCountsResponseModel.Projects);
|
||||
|
||||
sutProvider.GetDependency<ISecretRepository>()
|
||||
.GetSecretsCountByOrganizationIdAsync(organizationId, userId, accessClientType)
|
||||
.Returns(expectedCountsResponseModel.Secrets);
|
||||
|
||||
sutProvider.GetDependency<IServiceAccountRepository>()
|
||||
.GetServiceAccountCountByOrganizationIdAsync(organizationId, userId, accessClientType)
|
||||
.Returns(expectedCountsResponseModel.ServiceAccounts);
|
||||
|
||||
var response = await sutProvider.Sut.GetByOrganizationAsync(organizationId);
|
||||
|
||||
Assert.Equal(expectedCountsResponseModel.Projects, response.Projects);
|
||||
Assert.Equal(expectedCountsResponseModel.Secrets, response.Secrets);
|
||||
Assert.Equal(expectedCountsResponseModel.ServiceAccounts, response.ServiceAccounts);
|
||||
}
|
||||
|
||||
[Theory]
|
||||
[BitAutoData]
|
||||
public async Task GetByProjectAsync_ProjectNotFound_Throws(SutProvider<CountsController> sutProvider,
|
||||
Guid projectId)
|
||||
{
|
||||
sutProvider.GetDependency<IProjectRepository>().GetByIdAsync(projectId).Returns(default(Project));
|
||||
|
||||
await Assert.ThrowsAsync<NotFoundException>(() => sutProvider.Sut.GetByProjectAsync(projectId));
|
||||
}
|
||||
|
||||
[Theory]
|
||||
[BitAutoData]
|
||||
public async Task GetByProjectAsync_NoAccess_Throws(SutProvider<CountsController> sutProvider, Project project)
|
||||
{
|
||||
sutProvider.GetDependency<IProjectRepository>().GetByIdAsync(project.Id).Returns(project);
|
||||
sutProvider.GetDependency<ICurrentContext>().AccessSecretsManager(project.OrganizationId).Returns(false);
|
||||
|
||||
await Assert.ThrowsAsync<NotFoundException>(() => sutProvider.Sut.GetByProjectAsync(project.Id));
|
||||
}
|
||||
|
||||
[Theory]
|
||||
[BitAutoData]
|
||||
public async Task GetByProjectAsync_ServiceAccountAccess_Throws(SutProvider<CountsController> sutProvider,
|
||||
Guid userId, Project project)
|
||||
{
|
||||
sutProvider.GetDependency<IProjectRepository>().GetByIdAsync(project.Id).Returns(project);
|
||||
sutProvider.GetDependency<ICurrentContext>().AccessSecretsManager(project.OrganizationId).Returns(true);
|
||||
|
||||
sutProvider.GetDependency<IAccessClientQuery>()
|
||||
.GetAccessClientAsync(Arg.Any<ClaimsPrincipal>(), project.OrganizationId)
|
||||
.Returns((AccessClientType.ServiceAccount, userId));
|
||||
|
||||
await Assert.ThrowsAsync<NotFoundException>(() => sutProvider.Sut.GetByProjectAsync(project.Id));
|
||||
}
|
||||
|
||||
[Theory]
|
||||
[BitAutoData(AccessClientType.NoAccessCheck)]
|
||||
[BitAutoData(AccessClientType.User)]
|
||||
public async Task GetByProjectAsync_HasAccess_Success(AccessClientType accessClientType,
|
||||
SutProvider<CountsController> sutProvider, Guid userId, Project project,
|
||||
ProjectCountsResponseModel expectedProjectCountsResponseModel)
|
||||
{
|
||||
sutProvider.GetDependency<IProjectRepository>().GetByIdAsync(project.Id).Returns(project);
|
||||
sutProvider.GetDependency<ICurrentContext>().AccessSecretsManager(project.OrganizationId).Returns(true);
|
||||
sutProvider.GetDependency<IAccessClientQuery>()
|
||||
.GetAccessClientAsync(Arg.Any<ClaimsPrincipal>(), project.OrganizationId)
|
||||
.Returns((accessClientType, userId));
|
||||
|
||||
sutProvider.GetDependency<IProjectRepository>()
|
||||
.GetProjectCountsByIdAsync(project.Id, userId, accessClientType)
|
||||
.Returns(new ProjectCounts
|
||||
{
|
||||
Secrets = expectedProjectCountsResponseModel.Secrets,
|
||||
People = expectedProjectCountsResponseModel.People,
|
||||
ServiceAccounts = expectedProjectCountsResponseModel.ServiceAccounts
|
||||
});
|
||||
|
||||
var response = await sutProvider.Sut.GetByProjectAsync(project.Id);
|
||||
|
||||
Assert.Equal(expectedProjectCountsResponseModel.Secrets, response.Secrets);
|
||||
Assert.Equal(expectedProjectCountsResponseModel.People, response.People);
|
||||
Assert.Equal(expectedProjectCountsResponseModel.ServiceAccounts, response.ServiceAccounts);
|
||||
}
|
||||
|
||||
[Theory]
|
||||
[BitAutoData]
|
||||
public async Task GetByServiceAccountAsync_ServiceAccountNotFound_Throws(SutProvider<CountsController> sutProvider,
|
||||
Guid serviceAccountId)
|
||||
{
|
||||
sutProvider.GetDependency<IServiceAccountRepository>().GetByIdAsync(serviceAccountId)
|
||||
.Returns(default(ServiceAccount));
|
||||
|
||||
await Assert.ThrowsAsync<NotFoundException>(() => sutProvider.Sut.GetByServiceAccountAsync(serviceAccountId));
|
||||
}
|
||||
|
||||
[Theory]
|
||||
[BitAutoData]
|
||||
public async Task GetByServiceAccountAsync_NoAccess_Throws(SutProvider<CountsController> sutProvider,
|
||||
ServiceAccount serviceAccount)
|
||||
{
|
||||
sutProvider.GetDependency<IServiceAccountRepository>().GetByIdAsync(serviceAccount.Id)
|
||||
.Returns(serviceAccount);
|
||||
sutProvider.GetDependency<ICurrentContext>().AccessSecretsManager(serviceAccount.OrganizationId).Returns(false);
|
||||
|
||||
await Assert.ThrowsAsync<NotFoundException>(() => sutProvider.Sut.GetByServiceAccountAsync(serviceAccount.Id));
|
||||
}
|
||||
|
||||
[Theory]
|
||||
[BitAutoData]
|
||||
public async Task GetByServiceAccountAsync_ServiceAccountAccess_Throws(SutProvider<CountsController> sutProvider,
|
||||
Guid userId, ServiceAccount serviceAccount)
|
||||
{
|
||||
sutProvider.GetDependency<IServiceAccountRepository>().GetByIdAsync(serviceAccount.Id).Returns(serviceAccount);
|
||||
sutProvider.GetDependency<ICurrentContext>().AccessSecretsManager(serviceAccount.OrganizationId).Returns(true);
|
||||
|
||||
sutProvider.GetDependency<IAccessClientQuery>()
|
||||
.GetAccessClientAsync(Arg.Any<ClaimsPrincipal>(), serviceAccount.OrganizationId)
|
||||
.Returns((AccessClientType.ServiceAccount, userId));
|
||||
|
||||
await Assert.ThrowsAsync<NotFoundException>(() => sutProvider.Sut.GetByServiceAccountAsync(serviceAccount.Id));
|
||||
}
|
||||
|
||||
[Theory]
|
||||
[BitAutoData(AccessClientType.NoAccessCheck)]
|
||||
[BitAutoData(AccessClientType.User)]
|
||||
public async Task GetByServiceAccountAsync_HasAccess_Success(AccessClientType accessClientType,
|
||||
SutProvider<CountsController> sutProvider, Guid userId, ServiceAccount serviceAccount,
|
||||
ServiceAccountCountsResponseModel expectedServiceAccountCountsResponseModel)
|
||||
{
|
||||
sutProvider.GetDependency<IServiceAccountRepository>().GetByIdAsync(serviceAccount.Id)
|
||||
.Returns(serviceAccount);
|
||||
sutProvider.GetDependency<ICurrentContext>().AccessSecretsManager(serviceAccount.OrganizationId).Returns(true);
|
||||
sutProvider.GetDependency<IAccessClientQuery>()
|
||||
.GetAccessClientAsync(Arg.Any<ClaimsPrincipal>(), serviceAccount.OrganizationId)
|
||||
.Returns((accessClientType, userId));
|
||||
|
||||
sutProvider.GetDependency<IServiceAccountRepository>()
|
||||
.GetServiceAccountCountsByIdAsync(serviceAccount.Id, userId, accessClientType)
|
||||
.Returns(new ServiceAccountCounts
|
||||
{
|
||||
Projects = expectedServiceAccountCountsResponseModel.Projects,
|
||||
People = expectedServiceAccountCountsResponseModel.People,
|
||||
AccessTokens = expectedServiceAccountCountsResponseModel.AccessTokens
|
||||
});
|
||||
|
||||
var response = await sutProvider.Sut.GetByServiceAccountAsync(serviceAccount.Id);
|
||||
|
||||
Assert.Equal(expectedServiceAccountCountsResponseModel.Projects, response.Projects);
|
||||
Assert.Equal(expectedServiceAccountCountsResponseModel.People, response.People);
|
||||
Assert.Equal(expectedServiceAccountCountsResponseModel.AccessTokens, response.AccessTokens);
|
||||
}
|
||||
}
|
Loading…
x
Reference in New Issue
Block a user