mirror of
https://github.com/bitwarden/server.git
synced 2025-04-05 05:00:19 -05:00
Merge branch 'main' into brant/PM-17562-Slack-Event-Posting
This commit is contained in:
commit
890134eaa6
@ -1,5 +1,3 @@
|
|||||||
version: '3'
|
|
||||||
|
|
||||||
services:
|
services:
|
||||||
bitwarden_server:
|
bitwarden_server:
|
||||||
image: mcr.microsoft.com/devcontainers/dotnet:8.0
|
image: mcr.microsoft.com/devcontainers/dotnet:8.0
|
||||||
@ -13,7 +11,8 @@ services:
|
|||||||
platform: linux/amd64
|
platform: linux/amd64
|
||||||
restart: unless-stopped
|
restart: unless-stopped
|
||||||
env_file:
|
env_file:
|
||||||
../../dev/.env
|
- path: ../../dev/.env
|
||||||
|
required: false
|
||||||
environment:
|
environment:
|
||||||
ACCEPT_EULA: "Y"
|
ACCEPT_EULA: "Y"
|
||||||
MSSQL_PID: Developer
|
MSSQL_PID: Developer
|
||||||
|
@ -51,4 +51,10 @@ Proceed? [y/N] " response
|
|||||||
}
|
}
|
||||||
|
|
||||||
# main
|
# main
|
||||||
one_time_setup
|
if [[ -z "${CODESPACES}" ]]; then
|
||||||
|
one_time_setup
|
||||||
|
else
|
||||||
|
# Ignore interactive elements when running in codespaces since they are not supported there
|
||||||
|
# TODO Write codespaces specific instructions and link here
|
||||||
|
echo "Running in codespaces, follow instructions here: https://contributing.bitwarden.com/getting-started/server/guide/ to continue the setup"
|
||||||
|
fi
|
||||||
|
@ -1,5 +1,3 @@
|
|||||||
version: '3'
|
|
||||||
|
|
||||||
services:
|
services:
|
||||||
bitwarden_storage:
|
bitwarden_storage:
|
||||||
image: mcr.microsoft.com/azure-storage/azurite:latest
|
image: mcr.microsoft.com/azure-storage/azurite:latest
|
||||||
|
@ -89,4 +89,10 @@ install_stripe_cli() {
|
|||||||
}
|
}
|
||||||
|
|
||||||
# main
|
# main
|
||||||
one_time_setup
|
if [[ -z "${CODESPACES}" ]]; then
|
||||||
|
one_time_setup
|
||||||
|
else
|
||||||
|
# Ignore interactive elements when running in codespaces since they are not supported there
|
||||||
|
# TODO Write codespaces specific instructions and link here
|
||||||
|
echo "Running in codespaces, follow instructions here: https://contributing.bitwarden.com/getting-started/server/guide/ to continue the setup"
|
||||||
|
fi
|
23
.github/workflows/test-database.yml
vendored
23
.github/workflows/test-database.yml
vendored
@ -32,28 +32,9 @@ on:
|
|||||||
- "src/**/Entities/**/*.cs" # Database entity definitions
|
- "src/**/Entities/**/*.cs" # Database entity definitions
|
||||||
|
|
||||||
jobs:
|
jobs:
|
||||||
check-test-secrets:
|
|
||||||
name: Check for test secrets
|
|
||||||
runs-on: ubuntu-22.04
|
|
||||||
outputs:
|
|
||||||
available: ${{ steps.check-test-secrets.outputs.available }}
|
|
||||||
permissions:
|
|
||||||
contents: read
|
|
||||||
|
|
||||||
steps:
|
|
||||||
- name: Check
|
|
||||||
id: check-test-secrets
|
|
||||||
run: |
|
|
||||||
if [ "${{ secrets.CODECOV_TOKEN }}" != '' ]; then
|
|
||||||
echo "available=true" >> $GITHUB_OUTPUT;
|
|
||||||
else
|
|
||||||
echo "available=false" >> $GITHUB_OUTPUT;
|
|
||||||
fi
|
|
||||||
|
|
||||||
test:
|
test:
|
||||||
name: Run tests
|
name: Run tests
|
||||||
runs-on: ubuntu-22.04
|
runs-on: ubuntu-22.04
|
||||||
needs: check-test-secrets
|
|
||||||
steps:
|
steps:
|
||||||
- name: Check out repo
|
- name: Check out repo
|
||||||
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
|
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
|
||||||
@ -166,8 +147,8 @@ jobs:
|
|||||||
run: 'docker logs $(docker ps --quiet --filter "name=mssql")'
|
run: 'docker logs $(docker ps --quiet --filter "name=mssql")'
|
||||||
|
|
||||||
- name: Report test results
|
- name: Report test results
|
||||||
uses: dorny/test-reporter@31a54ee7ebcacc03a09ea97a7e5465a47b84aea5 # v1.9.1
|
uses: dorny/test-reporter@6e6a65b7a0bd2c9197df7d0ae36ac5cee784230c # v2.0.0
|
||||||
if: ${{ needs.check-test-secrets.outputs.available == 'true' && !cancelled() }}
|
if: ${{ github.event.pull_request.head.repo.full_name == github.repository && !cancelled() }}
|
||||||
with:
|
with:
|
||||||
name: Test Results
|
name: Test Results
|
||||||
path: "**/*-test-results.trx"
|
path: "**/*-test-results.trx"
|
||||||
|
23
.github/workflows/test.yml
vendored
23
.github/workflows/test.yml
vendored
@ -13,29 +13,10 @@ env:
|
|||||||
_AZ_REGISTRY: "bitwardenprod.azurecr.io"
|
_AZ_REGISTRY: "bitwardenprod.azurecr.io"
|
||||||
|
|
||||||
jobs:
|
jobs:
|
||||||
check-test-secrets:
|
|
||||||
name: Check for test secrets
|
|
||||||
runs-on: ubuntu-22.04
|
|
||||||
outputs:
|
|
||||||
available: ${{ steps.check-test-secrets.outputs.available }}
|
|
||||||
permissions:
|
|
||||||
contents: read
|
|
||||||
|
|
||||||
steps:
|
|
||||||
- name: Check
|
|
||||||
id: check-test-secrets
|
|
||||||
run: |
|
|
||||||
if [ "${{ secrets.CODECOV_TOKEN }}" != '' ]; then
|
|
||||||
echo "available=true" >> $GITHUB_OUTPUT;
|
|
||||||
else
|
|
||||||
echo "available=false" >> $GITHUB_OUTPUT;
|
|
||||||
fi
|
|
||||||
|
|
||||||
testing:
|
testing:
|
||||||
name: Run tests
|
name: Run tests
|
||||||
if: ${{ startsWith(github.head_ref, 'version_bump_') == false }}
|
if: ${{ startsWith(github.head_ref, 'version_bump_') == false }}
|
||||||
runs-on: ubuntu-22.04
|
runs-on: ubuntu-22.04
|
||||||
needs: check-test-secrets
|
|
||||||
permissions:
|
permissions:
|
||||||
checks: write
|
checks: write
|
||||||
contents: read
|
contents: read
|
||||||
@ -68,8 +49,8 @@ jobs:
|
|||||||
run: dotnet test ./bitwarden_license/test --configuration Debug --logger "trx;LogFileName=bw-test-results.trx" /p:CoverletOutputFormatter="cobertura" --collect:"XPlat Code Coverage"
|
run: dotnet test ./bitwarden_license/test --configuration Debug --logger "trx;LogFileName=bw-test-results.trx" /p:CoverletOutputFormatter="cobertura" --collect:"XPlat Code Coverage"
|
||||||
|
|
||||||
- name: Report test results
|
- name: Report test results
|
||||||
uses: dorny/test-reporter@31a54ee7ebcacc03a09ea97a7e5465a47b84aea5 # v1.9.1
|
uses: dorny/test-reporter@6e6a65b7a0bd2c9197df7d0ae36ac5cee784230c # v2.0.0
|
||||||
if: ${{ needs.check-test-secrets.outputs.available == 'true' && !cancelled() }}
|
if: ${{ github.event.pull_request.head.repo.full_name == github.repository && !cancelled() }}
|
||||||
with:
|
with:
|
||||||
name: Test Results
|
name: Test Results
|
||||||
path: "**/*-test-results.trx"
|
path: "**/*-test-results.trx"
|
||||||
|
@ -3,7 +3,7 @@
|
|||||||
<PropertyGroup>
|
<PropertyGroup>
|
||||||
<TargetFramework>net8.0</TargetFramework>
|
<TargetFramework>net8.0</TargetFramework>
|
||||||
|
|
||||||
<Version>2025.2.1</Version>
|
<Version>2025.3.0</Version>
|
||||||
|
|
||||||
<RootNamespace>Bit.$(MSBuildProjectName)</RootNamespace>
|
<RootNamespace>Bit.$(MSBuildProjectName)</RootNamespace>
|
||||||
<ImplicitUsings>enable</ImplicitUsings>
|
<ImplicitUsings>enable</ImplicitUsings>
|
||||||
|
@ -475,20 +475,17 @@ public class ProviderBillingService(
|
|||||||
Provider provider,
|
Provider provider,
|
||||||
TaxInfo taxInfo)
|
TaxInfo taxInfo)
|
||||||
{
|
{
|
||||||
ArgumentNullException.ThrowIfNull(provider);
|
if (taxInfo is not
|
||||||
ArgumentNullException.ThrowIfNull(taxInfo);
|
{
|
||||||
|
BillingAddressCountry: not null and not "",
|
||||||
if (string.IsNullOrEmpty(taxInfo.BillingAddressCountry) ||
|
BillingAddressPostalCode: not null and not ""
|
||||||
string.IsNullOrEmpty(taxInfo.BillingAddressPostalCode))
|
})
|
||||||
{
|
{
|
||||||
logger.LogError("Cannot create customer for provider ({ProviderID}) without both a country and postal code", provider.Id);
|
logger.LogError("Cannot create customer for provider ({ProviderID}) without both a country and postal code", provider.Id);
|
||||||
|
|
||||||
throw new BillingException();
|
throw new BillingException();
|
||||||
}
|
}
|
||||||
|
|
||||||
var providerDisplayName = provider.DisplayName();
|
var options = new CustomerCreateOptions
|
||||||
|
|
||||||
var customerCreateOptions = new CustomerCreateOptions
|
|
||||||
{
|
{
|
||||||
Address = new AddressOptions
|
Address = new AddressOptions
|
||||||
{
|
{
|
||||||
@ -508,9 +505,9 @@ public class ProviderBillingService(
|
|||||||
new CustomerInvoiceSettingsCustomFieldOptions
|
new CustomerInvoiceSettingsCustomFieldOptions
|
||||||
{
|
{
|
||||||
Name = provider.SubscriberType(),
|
Name = provider.SubscriberType(),
|
||||||
Value = providerDisplayName?.Length <= 30
|
Value = provider.DisplayName()?.Length <= 30
|
||||||
? providerDisplayName
|
? provider.DisplayName()
|
||||||
: providerDisplayName?[..30]
|
: provider.DisplayName()?[..30]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -522,7 +519,8 @@ public class ProviderBillingService(
|
|||||||
|
|
||||||
if (!string.IsNullOrEmpty(taxInfo.TaxIdNumber))
|
if (!string.IsNullOrEmpty(taxInfo.TaxIdNumber))
|
||||||
{
|
{
|
||||||
var taxIdType = taxService.GetStripeTaxCode(taxInfo.BillingAddressCountry,
|
var taxIdType = taxService.GetStripeTaxCode(
|
||||||
|
taxInfo.BillingAddressCountry,
|
||||||
taxInfo.TaxIdNumber);
|
taxInfo.TaxIdNumber);
|
||||||
|
|
||||||
if (taxIdType == null)
|
if (taxIdType == null)
|
||||||
@ -533,15 +531,20 @@ public class ProviderBillingService(
|
|||||||
throw new BadRequestException("billingTaxIdTypeInferenceError");
|
throw new BadRequestException("billingTaxIdTypeInferenceError");
|
||||||
}
|
}
|
||||||
|
|
||||||
customerCreateOptions.TaxIdData =
|
options.TaxIdData =
|
||||||
[
|
[
|
||||||
new CustomerTaxIdDataOptions { Type = taxIdType, Value = taxInfo.TaxIdNumber }
|
new CustomerTaxIdDataOptions { Type = taxIdType, Value = taxInfo.TaxIdNumber }
|
||||||
];
|
];
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if (!string.IsNullOrEmpty(provider.DiscountId))
|
||||||
|
{
|
||||||
|
options.Coupon = provider.DiscountId;
|
||||||
|
}
|
||||||
|
|
||||||
try
|
try
|
||||||
{
|
{
|
||||||
return await stripeAdapter.CustomerCreateAsync(customerCreateOptions);
|
return await stripeAdapter.CustomerCreateAsync(options);
|
||||||
}
|
}
|
||||||
catch (StripeException stripeException) when (stripeException.StripeError?.Code == StripeConstants.ErrorCodes.TaxIdInvalid)
|
catch (StripeException stripeException) when (stripeException.StripeError?.Code == StripeConstants.ErrorCodes.TaxIdInvalid)
|
||||||
{
|
{
|
||||||
@ -625,6 +628,19 @@ public class ProviderBillingService(
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
public async Task UpdatePaymentMethod(
|
||||||
|
Provider provider,
|
||||||
|
TokenizedPaymentSource tokenizedPaymentSource,
|
||||||
|
TaxInformation taxInformation)
|
||||||
|
{
|
||||||
|
await Task.WhenAll(
|
||||||
|
subscriberService.UpdatePaymentSource(provider, tokenizedPaymentSource),
|
||||||
|
subscriberService.UpdateTaxInformation(provider, taxInformation));
|
||||||
|
|
||||||
|
await stripeAdapter.SubscriptionUpdateAsync(provider.GatewaySubscriptionId,
|
||||||
|
new SubscriptionUpdateOptions { CollectionMethod = StripeConstants.CollectionMethod.ChargeAutomatically });
|
||||||
|
}
|
||||||
|
|
||||||
public async Task UpdateSeatMinimums(UpdateProviderSeatMinimumsCommand command)
|
public async Task UpdateSeatMinimums(UpdateProviderSeatMinimumsCommand command)
|
||||||
{
|
{
|
||||||
if (command.Configuration.Any(x => x.SeatsMinimum < 0))
|
if (command.Configuration.Any(x => x.SeatsMinimum < 0))
|
||||||
|
@ -731,18 +731,6 @@ public class ProviderBillingServiceTests
|
|||||||
|
|
||||||
#region SetupCustomer
|
#region SetupCustomer
|
||||||
|
|
||||||
[Theory, BitAutoData]
|
|
||||||
public async Task SetupCustomer_NullProvider_ThrowsArgumentNullException(
|
|
||||||
SutProvider<ProviderBillingService> sutProvider,
|
|
||||||
TaxInfo taxInfo) =>
|
|
||||||
await Assert.ThrowsAsync<ArgumentNullException>(() => sutProvider.Sut.SetupCustomer(null, taxInfo));
|
|
||||||
|
|
||||||
[Theory, BitAutoData]
|
|
||||||
public async Task SetupCustomer_NullTaxInfo_ThrowsArgumentNullException(
|
|
||||||
SutProvider<ProviderBillingService> sutProvider,
|
|
||||||
Provider provider) =>
|
|
||||||
await Assert.ThrowsAsync<ArgumentNullException>(() => sutProvider.Sut.SetupCustomer(provider, null));
|
|
||||||
|
|
||||||
[Theory, BitAutoData]
|
[Theory, BitAutoData]
|
||||||
public async Task SetupCustomer_MissingCountry_ContactSupport(
|
public async Task SetupCustomer_MissingCountry_ContactSupport(
|
||||||
SutProvider<ProviderBillingService> sutProvider,
|
SutProvider<ProviderBillingService> sutProvider,
|
||||||
|
@ -11,6 +11,7 @@ using Bit.Core.AdminConsole.Services;
|
|||||||
using Bit.Core.Billing.Entities;
|
using Bit.Core.Billing.Entities;
|
||||||
using Bit.Core.Billing.Enums;
|
using Bit.Core.Billing.Enums;
|
||||||
using Bit.Core.Billing.Extensions;
|
using Bit.Core.Billing.Extensions;
|
||||||
|
using Bit.Core.Billing.Pricing;
|
||||||
using Bit.Core.Billing.Repositories;
|
using Bit.Core.Billing.Repositories;
|
||||||
using Bit.Core.Billing.Services;
|
using Bit.Core.Billing.Services;
|
||||||
using Bit.Core.Billing.Services.Contracts;
|
using Bit.Core.Billing.Services.Contracts;
|
||||||
@ -42,6 +43,7 @@ public class ProvidersController : Controller
|
|||||||
private readonly IFeatureService _featureService;
|
private readonly IFeatureService _featureService;
|
||||||
private readonly IProviderPlanRepository _providerPlanRepository;
|
private readonly IProviderPlanRepository _providerPlanRepository;
|
||||||
private readonly IProviderBillingService _providerBillingService;
|
private readonly IProviderBillingService _providerBillingService;
|
||||||
|
private readonly IPricingClient _pricingClient;
|
||||||
private readonly string _stripeUrl;
|
private readonly string _stripeUrl;
|
||||||
private readonly string _braintreeMerchantUrl;
|
private readonly string _braintreeMerchantUrl;
|
||||||
private readonly string _braintreeMerchantId;
|
private readonly string _braintreeMerchantId;
|
||||||
@ -60,7 +62,8 @@ public class ProvidersController : Controller
|
|||||||
IFeatureService featureService,
|
IFeatureService featureService,
|
||||||
IProviderPlanRepository providerPlanRepository,
|
IProviderPlanRepository providerPlanRepository,
|
||||||
IProviderBillingService providerBillingService,
|
IProviderBillingService providerBillingService,
|
||||||
IWebHostEnvironment webHostEnvironment)
|
IWebHostEnvironment webHostEnvironment,
|
||||||
|
IPricingClient pricingClient)
|
||||||
{
|
{
|
||||||
_organizationRepository = organizationRepository;
|
_organizationRepository = organizationRepository;
|
||||||
_organizationService = organizationService;
|
_organizationService = organizationService;
|
||||||
@ -75,6 +78,7 @@ public class ProvidersController : Controller
|
|||||||
_featureService = featureService;
|
_featureService = featureService;
|
||||||
_providerPlanRepository = providerPlanRepository;
|
_providerPlanRepository = providerPlanRepository;
|
||||||
_providerBillingService = providerBillingService;
|
_providerBillingService = providerBillingService;
|
||||||
|
_pricingClient = pricingClient;
|
||||||
_stripeUrl = webHostEnvironment.GetStripeUrl();
|
_stripeUrl = webHostEnvironment.GetStripeUrl();
|
||||||
_braintreeMerchantUrl = webHostEnvironment.GetBraintreeMerchantUrl();
|
_braintreeMerchantUrl = webHostEnvironment.GetBraintreeMerchantUrl();
|
||||||
_braintreeMerchantId = globalSettings.Braintree.MerchantId;
|
_braintreeMerchantId = globalSettings.Braintree.MerchantId;
|
||||||
@ -415,7 +419,9 @@ public class ProvidersController : Controller
|
|||||||
return RedirectToAction("Index");
|
return RedirectToAction("Index");
|
||||||
}
|
}
|
||||||
|
|
||||||
return View(new OrganizationEditModel(provider));
|
var plans = await _pricingClient.ListPlans();
|
||||||
|
|
||||||
|
return View(new OrganizationEditModel(provider, plans));
|
||||||
}
|
}
|
||||||
|
|
||||||
[HttpPost]
|
[HttpPost]
|
||||||
|
@ -10,6 +10,9 @@ public class CreateMspProviderModel : IValidatableObject
|
|||||||
[Display(Name = "Owner Email")]
|
[Display(Name = "Owner Email")]
|
||||||
public string OwnerEmail { get; set; }
|
public string OwnerEmail { get; set; }
|
||||||
|
|
||||||
|
[Display(Name = "Subscription Discount")]
|
||||||
|
public string DiscountId { get; set; }
|
||||||
|
|
||||||
[Display(Name = "Teams (Monthly) Seat Minimum")]
|
[Display(Name = "Teams (Monthly) Seat Minimum")]
|
||||||
public int TeamsMonthlySeatMinimum { get; set; }
|
public int TeamsMonthlySeatMinimum { get; set; }
|
||||||
|
|
||||||
@ -20,7 +23,8 @@ public class CreateMspProviderModel : IValidatableObject
|
|||||||
{
|
{
|
||||||
return new Provider
|
return new Provider
|
||||||
{
|
{
|
||||||
Type = ProviderType.Msp
|
Type = ProviderType.Msp,
|
||||||
|
DiscountId = DiscountId
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -22,13 +22,14 @@ public class OrganizationEditModel : OrganizationViewModel
|
|||||||
|
|
||||||
public OrganizationEditModel() { }
|
public OrganizationEditModel() { }
|
||||||
|
|
||||||
public OrganizationEditModel(Provider provider)
|
public OrganizationEditModel(Provider provider, List<Plan> plans)
|
||||||
{
|
{
|
||||||
Provider = provider;
|
Provider = provider;
|
||||||
BillingEmail = provider.Type == ProviderType.Reseller ? provider.BillingEmail : string.Empty;
|
BillingEmail = provider.Type == ProviderType.Reseller ? provider.BillingEmail : string.Empty;
|
||||||
PlanType = Core.Billing.Enums.PlanType.TeamsMonthly;
|
PlanType = Core.Billing.Enums.PlanType.TeamsMonthly;
|
||||||
Plan = Core.Billing.Enums.PlanType.TeamsMonthly.GetDisplayAttribute()?.GetName();
|
Plan = Core.Billing.Enums.PlanType.TeamsMonthly.GetDisplayAttribute()?.GetName();
|
||||||
LicenseKey = RandomLicenseKey;
|
LicenseKey = RandomLicenseKey;
|
||||||
|
_plans = plans;
|
||||||
}
|
}
|
||||||
|
|
||||||
public OrganizationEditModel(
|
public OrganizationEditModel(
|
||||||
|
@ -1,3 +1,4 @@
|
|||||||
|
@using Bit.Core.Billing.Constants
|
||||||
@model CreateMspProviderModel
|
@model CreateMspProviderModel
|
||||||
|
|
||||||
@{
|
@{
|
||||||
@ -12,6 +13,19 @@
|
|||||||
<label asp-for="OwnerEmail" class="form-label"></label>
|
<label asp-for="OwnerEmail" class="form-label"></label>
|
||||||
<input type="text" class="form-control" asp-for="OwnerEmail">
|
<input type="text" class="form-control" asp-for="OwnerEmail">
|
||||||
</div>
|
</div>
|
||||||
|
<div class="mb-3">
|
||||||
|
@{
|
||||||
|
var selectList = new List<SelectListItem>
|
||||||
|
{
|
||||||
|
new ("No discount", string.Empty, true),
|
||||||
|
new ("20% - Open", StripeConstants.CouponIDs.MSPDiscounts.Open),
|
||||||
|
new ("35% - Silver", StripeConstants.CouponIDs.MSPDiscounts.Silver),
|
||||||
|
new ("50% - Gold", StripeConstants.CouponIDs.MSPDiscounts.Gold)
|
||||||
|
};
|
||||||
|
}
|
||||||
|
<label asp-for="DiscountId" class="form-label"></label>
|
||||||
|
<select class="form-select" asp-for="DiscountId" asp-items="selectList"></select>
|
||||||
|
</div>
|
||||||
<div class="row">
|
<div class="row">
|
||||||
<div class="col-sm">
|
<div class="col-sm">
|
||||||
<div class="mb-3">
|
<div class="mb-3">
|
||||||
|
@ -9,8 +9,7 @@
|
|||||||
|
|
||||||
var canViewUserInformation = AccessControlService.UserHasPermission(Permission.User_UserInformation_View);
|
var canViewUserInformation = AccessControlService.UserHasPermission(Permission.User_UserInformation_View);
|
||||||
var canViewNewDeviceException = AccessControlService.UserHasPermission(Permission.User_NewDeviceException_Edit) &&
|
var canViewNewDeviceException = AccessControlService.UserHasPermission(Permission.User_NewDeviceException_Edit) &&
|
||||||
GlobalSettings.EnableNewDeviceVerification &&
|
GlobalSettings.EnableNewDeviceVerification;
|
||||||
FeatureService.IsEnabled(Bit.Core.FeatureFlagKeys.NewDeviceVerification);
|
|
||||||
var canViewBillingInformation = AccessControlService.UserHasPermission(Permission.User_BillingInformation_View);
|
var canViewBillingInformation = AccessControlService.UserHasPermission(Permission.User_BillingInformation_View);
|
||||||
var canViewGeneral = AccessControlService.UserHasPermission(Permission.User_GeneralDetails_View);
|
var canViewGeneral = AccessControlService.UserHasPermission(Permission.User_GeneralDetails_View);
|
||||||
var canViewPremium = AccessControlService.UserHasPermission(Permission.User_Premium_View);
|
var canViewPremium = AccessControlService.UserHasPermission(Permission.User_Premium_View);
|
||||||
|
@ -23,6 +23,7 @@ public class PendingOrganizationAuthRequestResponseModel : ResponseModel
|
|||||||
RequestDeviceType = authRequest.RequestDeviceType.GetType().GetMember(authRequest.RequestDeviceType.ToString())
|
RequestDeviceType = authRequest.RequestDeviceType.GetType().GetMember(authRequest.RequestDeviceType.ToString())
|
||||||
.FirstOrDefault()?.GetCustomAttribute<DisplayAttribute>()?.GetName();
|
.FirstOrDefault()?.GetCustomAttribute<DisplayAttribute>()?.GetName();
|
||||||
RequestIpAddress = authRequest.RequestIpAddress;
|
RequestIpAddress = authRequest.RequestIpAddress;
|
||||||
|
RequestCountryName = authRequest.RequestCountryName;
|
||||||
CreationDate = authRequest.CreationDate;
|
CreationDate = authRequest.CreationDate;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -34,5 +35,6 @@ public class PendingOrganizationAuthRequestResponseModel : ResponseModel
|
|||||||
public string RequestDeviceIdentifier { get; set; }
|
public string RequestDeviceIdentifier { get; set; }
|
||||||
public string RequestDeviceType { get; set; }
|
public string RequestDeviceType { get; set; }
|
||||||
public string RequestIpAddress { get; set; }
|
public string RequestIpAddress { get; set; }
|
||||||
|
public string RequestCountryName { get; set; }
|
||||||
public DateTime CreationDate { get; set; }
|
public DateTime CreationDate { get; set; }
|
||||||
}
|
}
|
||||||
|
@ -4,11 +4,9 @@ using Bit.Api.Auth.Models.Request;
|
|||||||
using Bit.Api.Auth.Models.Request.Accounts;
|
using Bit.Api.Auth.Models.Request.Accounts;
|
||||||
using Bit.Api.Auth.Models.Request.WebAuthn;
|
using Bit.Api.Auth.Models.Request.WebAuthn;
|
||||||
using Bit.Api.KeyManagement.Validators;
|
using Bit.Api.KeyManagement.Validators;
|
||||||
using Bit.Api.Models.Request;
|
|
||||||
using Bit.Api.Models.Request.Accounts;
|
using Bit.Api.Models.Request.Accounts;
|
||||||
using Bit.Api.Models.Response;
|
using Bit.Api.Models.Response;
|
||||||
using Bit.Api.Tools.Models.Request;
|
using Bit.Api.Tools.Models.Request;
|
||||||
using Bit.Api.Utilities;
|
|
||||||
using Bit.Api.Vault.Models.Request;
|
using Bit.Api.Vault.Models.Request;
|
||||||
using Bit.Core;
|
using Bit.Core;
|
||||||
using Bit.Core.AdminConsole.Enums.Provider;
|
using Bit.Core.AdminConsole.Enums.Provider;
|
||||||
@ -19,23 +17,15 @@ using Bit.Core.Auth.Models.Api.Request.Accounts;
|
|||||||
using Bit.Core.Auth.Models.Data;
|
using Bit.Core.Auth.Models.Data;
|
||||||
using Bit.Core.Auth.UserFeatures.TdeOffboardingPassword.Interfaces;
|
using Bit.Core.Auth.UserFeatures.TdeOffboardingPassword.Interfaces;
|
||||||
using Bit.Core.Auth.UserFeatures.UserMasterPassword.Interfaces;
|
using Bit.Core.Auth.UserFeatures.UserMasterPassword.Interfaces;
|
||||||
using Bit.Core.Billing.Models;
|
|
||||||
using Bit.Core.Billing.Services;
|
|
||||||
using Bit.Core.Context;
|
|
||||||
using Bit.Core.Entities;
|
using Bit.Core.Entities;
|
||||||
using Bit.Core.Enums;
|
using Bit.Core.Enums;
|
||||||
using Bit.Core.Exceptions;
|
using Bit.Core.Exceptions;
|
||||||
using Bit.Core.KeyManagement.Models.Data;
|
using Bit.Core.KeyManagement.Models.Data;
|
||||||
using Bit.Core.KeyManagement.UserKey;
|
using Bit.Core.KeyManagement.UserKey;
|
||||||
using Bit.Core.Models.Api.Response;
|
using Bit.Core.Models.Api.Response;
|
||||||
using Bit.Core.Models.Business;
|
|
||||||
using Bit.Core.Repositories;
|
using Bit.Core.Repositories;
|
||||||
using Bit.Core.Services;
|
using Bit.Core.Services;
|
||||||
using Bit.Core.Settings;
|
|
||||||
using Bit.Core.Tools.Entities;
|
using Bit.Core.Tools.Entities;
|
||||||
using Bit.Core.Tools.Enums;
|
|
||||||
using Bit.Core.Tools.Models.Business;
|
|
||||||
using Bit.Core.Tools.Services;
|
|
||||||
using Bit.Core.Utilities;
|
using Bit.Core.Utilities;
|
||||||
using Bit.Core.Vault.Entities;
|
using Bit.Core.Vault.Entities;
|
||||||
using Microsoft.AspNetCore.Authorization;
|
using Microsoft.AspNetCore.Authorization;
|
||||||
@ -47,20 +37,15 @@ namespace Bit.Api.Auth.Controllers;
|
|||||||
[Authorize("Application")]
|
[Authorize("Application")]
|
||||||
public class AccountsController : Controller
|
public class AccountsController : Controller
|
||||||
{
|
{
|
||||||
private readonly GlobalSettings _globalSettings;
|
|
||||||
private readonly IOrganizationService _organizationService;
|
private readonly IOrganizationService _organizationService;
|
||||||
private readonly IOrganizationUserRepository _organizationUserRepository;
|
private readonly IOrganizationUserRepository _organizationUserRepository;
|
||||||
private readonly IProviderUserRepository _providerUserRepository;
|
private readonly IProviderUserRepository _providerUserRepository;
|
||||||
private readonly IPaymentService _paymentService;
|
|
||||||
private readonly IUserService _userService;
|
private readonly IUserService _userService;
|
||||||
private readonly IPolicyService _policyService;
|
private readonly IPolicyService _policyService;
|
||||||
private readonly ISetInitialMasterPasswordCommand _setInitialMasterPasswordCommand;
|
private readonly ISetInitialMasterPasswordCommand _setInitialMasterPasswordCommand;
|
||||||
private readonly ITdeOffboardingPasswordCommand _tdeOffboardingPasswordCommand;
|
private readonly ITdeOffboardingPasswordCommand _tdeOffboardingPasswordCommand;
|
||||||
private readonly IRotateUserKeyCommand _rotateUserKeyCommand;
|
private readonly IRotateUserKeyCommand _rotateUserKeyCommand;
|
||||||
private readonly IFeatureService _featureService;
|
private readonly IFeatureService _featureService;
|
||||||
private readonly ISubscriberService _subscriberService;
|
|
||||||
private readonly IReferenceEventService _referenceEventService;
|
|
||||||
private readonly ICurrentContext _currentContext;
|
|
||||||
|
|
||||||
private readonly IRotationValidator<IEnumerable<CipherWithIdRequestModel>, IEnumerable<Cipher>> _cipherValidator;
|
private readonly IRotationValidator<IEnumerable<CipherWithIdRequestModel>, IEnumerable<Cipher>> _cipherValidator;
|
||||||
private readonly IRotationValidator<IEnumerable<FolderWithIdRequestModel>, IEnumerable<Folder>> _folderValidator;
|
private readonly IRotationValidator<IEnumerable<FolderWithIdRequestModel>, IEnumerable<Folder>> _folderValidator;
|
||||||
@ -75,20 +60,15 @@ public class AccountsController : Controller
|
|||||||
|
|
||||||
|
|
||||||
public AccountsController(
|
public AccountsController(
|
||||||
GlobalSettings globalSettings,
|
|
||||||
IOrganizationService organizationService,
|
IOrganizationService organizationService,
|
||||||
IOrganizationUserRepository organizationUserRepository,
|
IOrganizationUserRepository organizationUserRepository,
|
||||||
IProviderUserRepository providerUserRepository,
|
IProviderUserRepository providerUserRepository,
|
||||||
IPaymentService paymentService,
|
|
||||||
IUserService userService,
|
IUserService userService,
|
||||||
IPolicyService policyService,
|
IPolicyService policyService,
|
||||||
ISetInitialMasterPasswordCommand setInitialMasterPasswordCommand,
|
ISetInitialMasterPasswordCommand setInitialMasterPasswordCommand,
|
||||||
ITdeOffboardingPasswordCommand tdeOffboardingPasswordCommand,
|
ITdeOffboardingPasswordCommand tdeOffboardingPasswordCommand,
|
||||||
IRotateUserKeyCommand rotateUserKeyCommand,
|
IRotateUserKeyCommand rotateUserKeyCommand,
|
||||||
IFeatureService featureService,
|
IFeatureService featureService,
|
||||||
ISubscriberService subscriberService,
|
|
||||||
IReferenceEventService referenceEventService,
|
|
||||||
ICurrentContext currentContext,
|
|
||||||
IRotationValidator<IEnumerable<CipherWithIdRequestModel>, IEnumerable<Cipher>> cipherValidator,
|
IRotationValidator<IEnumerable<CipherWithIdRequestModel>, IEnumerable<Cipher>> cipherValidator,
|
||||||
IRotationValidator<IEnumerable<FolderWithIdRequestModel>, IEnumerable<Folder>> folderValidator,
|
IRotationValidator<IEnumerable<FolderWithIdRequestModel>, IEnumerable<Folder>> folderValidator,
|
||||||
IRotationValidator<IEnumerable<SendWithIdRequestModel>, IReadOnlyList<Send>> sendValidator,
|
IRotationValidator<IEnumerable<SendWithIdRequestModel>, IReadOnlyList<Send>> sendValidator,
|
||||||
@ -99,20 +79,15 @@ public class AccountsController : Controller
|
|||||||
IRotationValidator<IEnumerable<WebAuthnLoginRotateKeyRequestModel>, IEnumerable<WebAuthnLoginRotateKeyData>> webAuthnKeyValidator
|
IRotationValidator<IEnumerable<WebAuthnLoginRotateKeyRequestModel>, IEnumerable<WebAuthnLoginRotateKeyData>> webAuthnKeyValidator
|
||||||
)
|
)
|
||||||
{
|
{
|
||||||
_globalSettings = globalSettings;
|
|
||||||
_organizationService = organizationService;
|
_organizationService = organizationService;
|
||||||
_organizationUserRepository = organizationUserRepository;
|
_organizationUserRepository = organizationUserRepository;
|
||||||
_providerUserRepository = providerUserRepository;
|
_providerUserRepository = providerUserRepository;
|
||||||
_paymentService = paymentService;
|
|
||||||
_userService = userService;
|
_userService = userService;
|
||||||
_policyService = policyService;
|
_policyService = policyService;
|
||||||
_setInitialMasterPasswordCommand = setInitialMasterPasswordCommand;
|
_setInitialMasterPasswordCommand = setInitialMasterPasswordCommand;
|
||||||
_tdeOffboardingPasswordCommand = tdeOffboardingPasswordCommand;
|
_tdeOffboardingPasswordCommand = tdeOffboardingPasswordCommand;
|
||||||
_rotateUserKeyCommand = rotateUserKeyCommand;
|
_rotateUserKeyCommand = rotateUserKeyCommand;
|
||||||
_featureService = featureService;
|
_featureService = featureService;
|
||||||
_subscriberService = subscriberService;
|
|
||||||
_referenceEventService = referenceEventService;
|
|
||||||
_currentContext = currentContext;
|
|
||||||
_cipherValidator = cipherValidator;
|
_cipherValidator = cipherValidator;
|
||||||
_folderValidator = folderValidator;
|
_folderValidator = folderValidator;
|
||||||
_sendValidator = sendValidator;
|
_sendValidator = sendValidator;
|
||||||
@ -638,212 +613,6 @@ public class AccountsController : Controller
|
|||||||
throw new BadRequestException(ModelState);
|
throw new BadRequestException(ModelState);
|
||||||
}
|
}
|
||||||
|
|
||||||
[HttpPost("premium")]
|
|
||||||
public async Task<PaymentResponseModel> PostPremium(PremiumRequestModel model)
|
|
||||||
{
|
|
||||||
var user = await _userService.GetUserByPrincipalAsync(User);
|
|
||||||
if (user == null)
|
|
||||||
{
|
|
||||||
throw new UnauthorizedAccessException();
|
|
||||||
}
|
|
||||||
|
|
||||||
var valid = model.Validate(_globalSettings);
|
|
||||||
UserLicense license = null;
|
|
||||||
if (valid && _globalSettings.SelfHosted)
|
|
||||||
{
|
|
||||||
license = await ApiHelpers.ReadJsonFileFromBody<UserLicense>(HttpContext, model.License);
|
|
||||||
}
|
|
||||||
|
|
||||||
if (!valid && !_globalSettings.SelfHosted && string.IsNullOrWhiteSpace(model.Country))
|
|
||||||
{
|
|
||||||
throw new BadRequestException("Country is required.");
|
|
||||||
}
|
|
||||||
|
|
||||||
if (!valid || (_globalSettings.SelfHosted && license == null))
|
|
||||||
{
|
|
||||||
throw new BadRequestException("Invalid license.");
|
|
||||||
}
|
|
||||||
|
|
||||||
var result = await _userService.SignUpPremiumAsync(user, model.PaymentToken,
|
|
||||||
model.PaymentMethodType.Value, model.AdditionalStorageGb.GetValueOrDefault(0), license,
|
|
||||||
new TaxInfo
|
|
||||||
{
|
|
||||||
BillingAddressCountry = model.Country,
|
|
||||||
BillingAddressPostalCode = model.PostalCode
|
|
||||||
});
|
|
||||||
|
|
||||||
var userTwoFactorEnabled = await _userService.TwoFactorIsEnabledAsync(user);
|
|
||||||
var userHasPremiumFromOrganization = await _userService.HasPremiumFromOrganization(user);
|
|
||||||
var organizationIdsManagingActiveUser = await GetOrganizationIdsManagingUserAsync(user.Id);
|
|
||||||
|
|
||||||
var profile = new ProfileResponseModel(user, null, null, null, userTwoFactorEnabled, userHasPremiumFromOrganization, organizationIdsManagingActiveUser);
|
|
||||||
return new PaymentResponseModel
|
|
||||||
{
|
|
||||||
UserProfile = profile,
|
|
||||||
PaymentIntentClientSecret = result.Item2,
|
|
||||||
Success = result.Item1
|
|
||||||
};
|
|
||||||
}
|
|
||||||
|
|
||||||
[HttpGet("subscription")]
|
|
||||||
public async Task<SubscriptionResponseModel> GetSubscription()
|
|
||||||
{
|
|
||||||
var user = await _userService.GetUserByPrincipalAsync(User);
|
|
||||||
if (user == null)
|
|
||||||
{
|
|
||||||
throw new UnauthorizedAccessException();
|
|
||||||
}
|
|
||||||
|
|
||||||
if (!_globalSettings.SelfHosted && user.Gateway != null)
|
|
||||||
{
|
|
||||||
var subscriptionInfo = await _paymentService.GetSubscriptionAsync(user);
|
|
||||||
var license = await _userService.GenerateLicenseAsync(user, subscriptionInfo);
|
|
||||||
return new SubscriptionResponseModel(user, subscriptionInfo, license);
|
|
||||||
}
|
|
||||||
else if (!_globalSettings.SelfHosted)
|
|
||||||
{
|
|
||||||
var license = await _userService.GenerateLicenseAsync(user);
|
|
||||||
return new SubscriptionResponseModel(user, license);
|
|
||||||
}
|
|
||||||
else
|
|
||||||
{
|
|
||||||
return new SubscriptionResponseModel(user);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
[HttpPost("payment")]
|
|
||||||
[SelfHosted(NotSelfHostedOnly = true)]
|
|
||||||
public async Task PostPayment([FromBody] PaymentRequestModel model)
|
|
||||||
{
|
|
||||||
var user = await _userService.GetUserByPrincipalAsync(User);
|
|
||||||
if (user == null)
|
|
||||||
{
|
|
||||||
throw new UnauthorizedAccessException();
|
|
||||||
}
|
|
||||||
|
|
||||||
await _userService.ReplacePaymentMethodAsync(user, model.PaymentToken, model.PaymentMethodType.Value,
|
|
||||||
new TaxInfo
|
|
||||||
{
|
|
||||||
BillingAddressLine1 = model.Line1,
|
|
||||||
BillingAddressLine2 = model.Line2,
|
|
||||||
BillingAddressCity = model.City,
|
|
||||||
BillingAddressState = model.State,
|
|
||||||
BillingAddressCountry = model.Country,
|
|
||||||
BillingAddressPostalCode = model.PostalCode,
|
|
||||||
TaxIdNumber = model.TaxId
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
[HttpPost("storage")]
|
|
||||||
[SelfHosted(NotSelfHostedOnly = true)]
|
|
||||||
public async Task<PaymentResponseModel> PostStorage([FromBody] StorageRequestModel model)
|
|
||||||
{
|
|
||||||
var user = await _userService.GetUserByPrincipalAsync(User);
|
|
||||||
if (user == null)
|
|
||||||
{
|
|
||||||
throw new UnauthorizedAccessException();
|
|
||||||
}
|
|
||||||
|
|
||||||
var result = await _userService.AdjustStorageAsync(user, model.StorageGbAdjustment.Value);
|
|
||||||
return new PaymentResponseModel
|
|
||||||
{
|
|
||||||
Success = true,
|
|
||||||
PaymentIntentClientSecret = result
|
|
||||||
};
|
|
||||||
}
|
|
||||||
|
|
||||||
[HttpPost("license")]
|
|
||||||
[SelfHosted(SelfHostedOnly = true)]
|
|
||||||
public async Task PostLicense(LicenseRequestModel model)
|
|
||||||
{
|
|
||||||
var user = await _userService.GetUserByPrincipalAsync(User);
|
|
||||||
if (user == null)
|
|
||||||
{
|
|
||||||
throw new UnauthorizedAccessException();
|
|
||||||
}
|
|
||||||
|
|
||||||
var license = await ApiHelpers.ReadJsonFileFromBody<UserLicense>(HttpContext, model.License);
|
|
||||||
if (license == null)
|
|
||||||
{
|
|
||||||
throw new BadRequestException("Invalid license");
|
|
||||||
}
|
|
||||||
|
|
||||||
await _userService.UpdateLicenseAsync(user, license);
|
|
||||||
}
|
|
||||||
|
|
||||||
[HttpPost("cancel")]
|
|
||||||
public async Task PostCancel([FromBody] SubscriptionCancellationRequestModel request)
|
|
||||||
{
|
|
||||||
var user = await _userService.GetUserByPrincipalAsync(User);
|
|
||||||
|
|
||||||
if (user == null)
|
|
||||||
{
|
|
||||||
throw new UnauthorizedAccessException();
|
|
||||||
}
|
|
||||||
|
|
||||||
await _subscriberService.CancelSubscription(user,
|
|
||||||
new OffboardingSurveyResponse
|
|
||||||
{
|
|
||||||
UserId = user.Id,
|
|
||||||
Reason = request.Reason,
|
|
||||||
Feedback = request.Feedback
|
|
||||||
},
|
|
||||||
user.IsExpired());
|
|
||||||
|
|
||||||
await _referenceEventService.RaiseEventAsync(new ReferenceEvent(
|
|
||||||
ReferenceEventType.CancelSubscription,
|
|
||||||
user,
|
|
||||||
_currentContext)
|
|
||||||
{
|
|
||||||
EndOfPeriod = user.IsExpired()
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
[HttpPost("reinstate-premium")]
|
|
||||||
[SelfHosted(NotSelfHostedOnly = true)]
|
|
||||||
public async Task PostReinstate()
|
|
||||||
{
|
|
||||||
var user = await _userService.GetUserByPrincipalAsync(User);
|
|
||||||
if (user == null)
|
|
||||||
{
|
|
||||||
throw new UnauthorizedAccessException();
|
|
||||||
}
|
|
||||||
|
|
||||||
await _userService.ReinstatePremiumAsync(user);
|
|
||||||
}
|
|
||||||
|
|
||||||
[HttpGet("tax")]
|
|
||||||
[SelfHosted(NotSelfHostedOnly = true)]
|
|
||||||
public async Task<TaxInfoResponseModel> GetTaxInfo()
|
|
||||||
{
|
|
||||||
var user = await _userService.GetUserByPrincipalAsync(User);
|
|
||||||
if (user == null)
|
|
||||||
{
|
|
||||||
throw new UnauthorizedAccessException();
|
|
||||||
}
|
|
||||||
|
|
||||||
var taxInfo = await _paymentService.GetTaxInfoAsync(user);
|
|
||||||
return new TaxInfoResponseModel(taxInfo);
|
|
||||||
}
|
|
||||||
|
|
||||||
[HttpPut("tax")]
|
|
||||||
[SelfHosted(NotSelfHostedOnly = true)]
|
|
||||||
public async Task PutTaxInfo([FromBody] TaxInfoUpdateRequestModel model)
|
|
||||||
{
|
|
||||||
var user = await _userService.GetUserByPrincipalAsync(User);
|
|
||||||
if (user == null)
|
|
||||||
{
|
|
||||||
throw new UnauthorizedAccessException();
|
|
||||||
}
|
|
||||||
|
|
||||||
var taxInfo = new TaxInfo
|
|
||||||
{
|
|
||||||
BillingAddressPostalCode = model.PostalCode,
|
|
||||||
BillingAddressCountry = model.Country,
|
|
||||||
};
|
|
||||||
await _paymentService.SaveTaxInfoAsync(user, taxInfo);
|
|
||||||
}
|
|
||||||
|
|
||||||
[HttpDelete("sso/{organizationId}")]
|
[HttpDelete("sso/{organizationId}")]
|
||||||
public async Task DeleteSsoUser(string organizationId)
|
public async Task DeleteSsoUser(string organizationId)
|
||||||
{
|
{
|
||||||
|
@ -167,7 +167,7 @@ public class EmergencyAccessController : Controller
|
|||||||
{
|
{
|
||||||
var user = await _userService.GetUserByPrincipalAsync(User);
|
var user = await _userService.GetUserByPrincipalAsync(User);
|
||||||
var viewResult = await _emergencyAccessService.ViewAsync(id, user);
|
var viewResult = await _emergencyAccessService.ViewAsync(id, user);
|
||||||
return new EmergencyAccessViewResponseModel(_globalSettings, viewResult.EmergencyAccess, viewResult.Ciphers);
|
return new EmergencyAccessViewResponseModel(_globalSettings, viewResult.EmergencyAccess, viewResult.Ciphers, user);
|
||||||
}
|
}
|
||||||
|
|
||||||
[HttpGet("{id}/{cipherId}/attachment/{attachmentId}")]
|
[HttpGet("{id}/{cipherId}/attachment/{attachmentId}")]
|
||||||
|
@ -23,6 +23,7 @@ public class AuthRequestResponseModel : ResponseModel
|
|||||||
RequestDeviceType = authRequest.RequestDeviceType.GetType().GetMember(authRequest.RequestDeviceType.ToString())
|
RequestDeviceType = authRequest.RequestDeviceType.GetType().GetMember(authRequest.RequestDeviceType.ToString())
|
||||||
.FirstOrDefault()?.GetCustomAttribute<DisplayAttribute>()?.GetName();
|
.FirstOrDefault()?.GetCustomAttribute<DisplayAttribute>()?.GetName();
|
||||||
RequestIpAddress = authRequest.RequestIpAddress;
|
RequestIpAddress = authRequest.RequestIpAddress;
|
||||||
|
RequestCountryName = authRequest.RequestCountryName;
|
||||||
Key = authRequest.Key;
|
Key = authRequest.Key;
|
||||||
MasterPasswordHash = authRequest.MasterPasswordHash;
|
MasterPasswordHash = authRequest.MasterPasswordHash;
|
||||||
CreationDate = authRequest.CreationDate;
|
CreationDate = authRequest.CreationDate;
|
||||||
@ -37,6 +38,7 @@ public class AuthRequestResponseModel : ResponseModel
|
|||||||
public DeviceType RequestDeviceTypeValue { get; set; }
|
public DeviceType RequestDeviceTypeValue { get; set; }
|
||||||
public string RequestDeviceType { get; set; }
|
public string RequestDeviceType { get; set; }
|
||||||
public string RequestIpAddress { get; set; }
|
public string RequestIpAddress { get; set; }
|
||||||
|
public string RequestCountryName { get; set; }
|
||||||
public string Key { get; set; }
|
public string Key { get; set; }
|
||||||
public string MasterPasswordHash { get; set; }
|
public string MasterPasswordHash { get; set; }
|
||||||
public DateTime CreationDate { get; set; }
|
public DateTime CreationDate { get; set; }
|
||||||
|
@ -116,11 +116,17 @@ public class EmergencyAccessViewResponseModel : ResponseModel
|
|||||||
public EmergencyAccessViewResponseModel(
|
public EmergencyAccessViewResponseModel(
|
||||||
IGlobalSettings globalSettings,
|
IGlobalSettings globalSettings,
|
||||||
EmergencyAccess emergencyAccess,
|
EmergencyAccess emergencyAccess,
|
||||||
IEnumerable<CipherDetails> ciphers)
|
IEnumerable<CipherDetails> ciphers,
|
||||||
|
User user)
|
||||||
: base("emergencyAccessView")
|
: base("emergencyAccessView")
|
||||||
{
|
{
|
||||||
KeyEncrypted = emergencyAccess.KeyEncrypted;
|
KeyEncrypted = emergencyAccess.KeyEncrypted;
|
||||||
Ciphers = ciphers.Select(c => new CipherResponseModel(c, globalSettings));
|
Ciphers = ciphers.Select(cipher =>
|
||||||
|
new CipherResponseModel(
|
||||||
|
cipher,
|
||||||
|
user,
|
||||||
|
organizationAbilities: null, // Emergency access only retrieves personal ciphers so organizationAbilities is not needed
|
||||||
|
globalSettings));
|
||||||
}
|
}
|
||||||
|
|
||||||
public string KeyEncrypted { get; set; }
|
public string KeyEncrypted { get; set; }
|
||||||
|
237
src/Api/Billing/Controllers/AccountsController.cs
Normal file
237
src/Api/Billing/Controllers/AccountsController.cs
Normal file
@ -0,0 +1,237 @@
|
|||||||
|
#nullable enable
|
||||||
|
using Bit.Api.Models.Request;
|
||||||
|
using Bit.Api.Models.Request.Accounts;
|
||||||
|
using Bit.Api.Models.Response;
|
||||||
|
using Bit.Api.Utilities;
|
||||||
|
using Bit.Core.Billing.Models;
|
||||||
|
using Bit.Core.Billing.Services;
|
||||||
|
using Bit.Core.Context;
|
||||||
|
using Bit.Core.Exceptions;
|
||||||
|
using Bit.Core.Models.Business;
|
||||||
|
using Bit.Core.Services;
|
||||||
|
using Bit.Core.Settings;
|
||||||
|
using Bit.Core.Tools.Enums;
|
||||||
|
using Bit.Core.Tools.Models.Business;
|
||||||
|
using Bit.Core.Tools.Services;
|
||||||
|
using Bit.Core.Utilities;
|
||||||
|
using Microsoft.AspNetCore.Authorization;
|
||||||
|
using Microsoft.AspNetCore.Mvc;
|
||||||
|
|
||||||
|
namespace Bit.Api.Billing.Controllers;
|
||||||
|
|
||||||
|
[Route("accounts")]
|
||||||
|
[Authorize("Application")]
|
||||||
|
public class AccountsController(
|
||||||
|
IUserService userService) : Controller
|
||||||
|
{
|
||||||
|
[HttpPost("premium")]
|
||||||
|
public async Task<PaymentResponseModel> PostPremiumAsync(
|
||||||
|
PremiumRequestModel model,
|
||||||
|
[FromServices] GlobalSettings globalSettings)
|
||||||
|
{
|
||||||
|
var user = await userService.GetUserByPrincipalAsync(User);
|
||||||
|
if (user == null)
|
||||||
|
{
|
||||||
|
throw new UnauthorizedAccessException();
|
||||||
|
}
|
||||||
|
|
||||||
|
var valid = model.Validate(globalSettings);
|
||||||
|
UserLicense? license = null;
|
||||||
|
if (valid && globalSettings.SelfHosted)
|
||||||
|
{
|
||||||
|
license = await ApiHelpers.ReadJsonFileFromBody<UserLicense>(HttpContext, model.License);
|
||||||
|
}
|
||||||
|
|
||||||
|
if (!valid && !globalSettings.SelfHosted && string.IsNullOrWhiteSpace(model.Country))
|
||||||
|
{
|
||||||
|
throw new BadRequestException("Country is required.");
|
||||||
|
}
|
||||||
|
|
||||||
|
if (!valid || (globalSettings.SelfHosted && license == null))
|
||||||
|
{
|
||||||
|
throw new BadRequestException("Invalid license.");
|
||||||
|
}
|
||||||
|
|
||||||
|
var result = await userService.SignUpPremiumAsync(user, model.PaymentToken,
|
||||||
|
model.PaymentMethodType!.Value, model.AdditionalStorageGb.GetValueOrDefault(0), license,
|
||||||
|
new TaxInfo { BillingAddressCountry = model.Country, BillingAddressPostalCode = model.PostalCode });
|
||||||
|
|
||||||
|
var userTwoFactorEnabled = await userService.TwoFactorIsEnabledAsync(user);
|
||||||
|
var userHasPremiumFromOrganization = await userService.HasPremiumFromOrganization(user);
|
||||||
|
var organizationIdsManagingActiveUser = await GetOrganizationIdsManagingUserAsync(user.Id);
|
||||||
|
|
||||||
|
var profile = new ProfileResponseModel(user, null, null, null, userTwoFactorEnabled,
|
||||||
|
userHasPremiumFromOrganization, organizationIdsManagingActiveUser);
|
||||||
|
return new PaymentResponseModel
|
||||||
|
{
|
||||||
|
UserProfile = profile,
|
||||||
|
PaymentIntentClientSecret = result.Item2,
|
||||||
|
Success = result.Item1
|
||||||
|
};
|
||||||
|
}
|
||||||
|
|
||||||
|
[HttpGet("subscription")]
|
||||||
|
public async Task<SubscriptionResponseModel> GetSubscriptionAsync(
|
||||||
|
[FromServices] GlobalSettings globalSettings,
|
||||||
|
[FromServices] IPaymentService paymentService)
|
||||||
|
{
|
||||||
|
var user = await userService.GetUserByPrincipalAsync(User);
|
||||||
|
if (user == null)
|
||||||
|
{
|
||||||
|
throw new UnauthorizedAccessException();
|
||||||
|
}
|
||||||
|
|
||||||
|
if (!globalSettings.SelfHosted && user.Gateway != null)
|
||||||
|
{
|
||||||
|
var subscriptionInfo = await paymentService.GetSubscriptionAsync(user);
|
||||||
|
var license = await userService.GenerateLicenseAsync(user, subscriptionInfo);
|
||||||
|
return new SubscriptionResponseModel(user, subscriptionInfo, license);
|
||||||
|
}
|
||||||
|
else if (!globalSettings.SelfHosted)
|
||||||
|
{
|
||||||
|
var license = await userService.GenerateLicenseAsync(user);
|
||||||
|
return new SubscriptionResponseModel(user, license);
|
||||||
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
|
return new SubscriptionResponseModel(user);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
[HttpPost("payment")]
|
||||||
|
[SelfHosted(NotSelfHostedOnly = true)]
|
||||||
|
public async Task PostPaymentAsync([FromBody] PaymentRequestModel model)
|
||||||
|
{
|
||||||
|
var user = await userService.GetUserByPrincipalAsync(User);
|
||||||
|
if (user == null)
|
||||||
|
{
|
||||||
|
throw new UnauthorizedAccessException();
|
||||||
|
}
|
||||||
|
|
||||||
|
await userService.ReplacePaymentMethodAsync(user, model.PaymentToken, model.PaymentMethodType!.Value,
|
||||||
|
new TaxInfo
|
||||||
|
{
|
||||||
|
BillingAddressLine1 = model.Line1,
|
||||||
|
BillingAddressLine2 = model.Line2,
|
||||||
|
BillingAddressCity = model.City,
|
||||||
|
BillingAddressState = model.State,
|
||||||
|
BillingAddressCountry = model.Country,
|
||||||
|
BillingAddressPostalCode = model.PostalCode,
|
||||||
|
TaxIdNumber = model.TaxId
|
||||||
|
});
|
||||||
|
}
|
||||||
|
|
||||||
|
[HttpPost("storage")]
|
||||||
|
[SelfHosted(NotSelfHostedOnly = true)]
|
||||||
|
public async Task<PaymentResponseModel> PostStorageAsync([FromBody] StorageRequestModel model)
|
||||||
|
{
|
||||||
|
var user = await userService.GetUserByPrincipalAsync(User);
|
||||||
|
if (user == null)
|
||||||
|
{
|
||||||
|
throw new UnauthorizedAccessException();
|
||||||
|
}
|
||||||
|
|
||||||
|
var result = await userService.AdjustStorageAsync(user, model.StorageGbAdjustment!.Value);
|
||||||
|
return new PaymentResponseModel { Success = true, PaymentIntentClientSecret = result };
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
[HttpPost("license")]
|
||||||
|
[SelfHosted(SelfHostedOnly = true)]
|
||||||
|
public async Task PostLicenseAsync(LicenseRequestModel model)
|
||||||
|
{
|
||||||
|
var user = await userService.GetUserByPrincipalAsync(User);
|
||||||
|
if (user == null)
|
||||||
|
{
|
||||||
|
throw new UnauthorizedAccessException();
|
||||||
|
}
|
||||||
|
|
||||||
|
var license = await ApiHelpers.ReadJsonFileFromBody<UserLicense>(HttpContext, model.License);
|
||||||
|
if (license == null)
|
||||||
|
{
|
||||||
|
throw new BadRequestException("Invalid license");
|
||||||
|
}
|
||||||
|
|
||||||
|
await userService.UpdateLicenseAsync(user, license);
|
||||||
|
}
|
||||||
|
|
||||||
|
[HttpPost("cancel")]
|
||||||
|
public async Task PostCancelAsync(
|
||||||
|
[FromBody] SubscriptionCancellationRequestModel request,
|
||||||
|
[FromServices] ICurrentContext currentContext,
|
||||||
|
[FromServices] IReferenceEventService referenceEventService,
|
||||||
|
[FromServices] ISubscriberService subscriberService)
|
||||||
|
{
|
||||||
|
var user = await userService.GetUserByPrincipalAsync(User);
|
||||||
|
|
||||||
|
if (user == null)
|
||||||
|
{
|
||||||
|
throw new UnauthorizedAccessException();
|
||||||
|
}
|
||||||
|
|
||||||
|
await subscriberService.CancelSubscription(user,
|
||||||
|
new OffboardingSurveyResponse { UserId = user.Id, Reason = request.Reason, Feedback = request.Feedback },
|
||||||
|
user.IsExpired());
|
||||||
|
|
||||||
|
await referenceEventService.RaiseEventAsync(new ReferenceEvent(
|
||||||
|
ReferenceEventType.CancelSubscription,
|
||||||
|
user,
|
||||||
|
currentContext)
|
||||||
|
{ EndOfPeriod = user.IsExpired() });
|
||||||
|
}
|
||||||
|
|
||||||
|
[HttpPost("reinstate-premium")]
|
||||||
|
[SelfHosted(NotSelfHostedOnly = true)]
|
||||||
|
public async Task PostReinstateAsync()
|
||||||
|
{
|
||||||
|
var user = await userService.GetUserByPrincipalAsync(User);
|
||||||
|
if (user == null)
|
||||||
|
{
|
||||||
|
throw new UnauthorizedAccessException();
|
||||||
|
}
|
||||||
|
|
||||||
|
await userService.ReinstatePremiumAsync(user);
|
||||||
|
}
|
||||||
|
|
||||||
|
[HttpGet("tax")]
|
||||||
|
[SelfHosted(NotSelfHostedOnly = true)]
|
||||||
|
public async Task<TaxInfoResponseModel> GetTaxInfoAsync(
|
||||||
|
[FromServices] IPaymentService paymentService)
|
||||||
|
{
|
||||||
|
var user = await userService.GetUserByPrincipalAsync(User);
|
||||||
|
if (user == null)
|
||||||
|
{
|
||||||
|
throw new UnauthorizedAccessException();
|
||||||
|
}
|
||||||
|
|
||||||
|
var taxInfo = await paymentService.GetTaxInfoAsync(user);
|
||||||
|
return new TaxInfoResponseModel(taxInfo);
|
||||||
|
}
|
||||||
|
|
||||||
|
[HttpPut("tax")]
|
||||||
|
[SelfHosted(NotSelfHostedOnly = true)]
|
||||||
|
public async Task PutTaxInfoAsync(
|
||||||
|
[FromBody] TaxInfoUpdateRequestModel model,
|
||||||
|
[FromServices] IPaymentService paymentService)
|
||||||
|
{
|
||||||
|
var user = await userService.GetUserByPrincipalAsync(User);
|
||||||
|
if (user == null)
|
||||||
|
{
|
||||||
|
throw new UnauthorizedAccessException();
|
||||||
|
}
|
||||||
|
|
||||||
|
var taxInfo = new TaxInfo
|
||||||
|
{
|
||||||
|
BillingAddressPostalCode = model.PostalCode,
|
||||||
|
BillingAddressCountry = model.Country,
|
||||||
|
};
|
||||||
|
await paymentService.SaveTaxInfoAsync(user, taxInfo);
|
||||||
|
}
|
||||||
|
|
||||||
|
private async Task<IEnumerable<Guid>> GetOrganizationIdsManagingUserAsync(Guid userId)
|
||||||
|
{
|
||||||
|
var organizationManagingUser = await userService.GetOrganizationsManagingUserAsync(userId);
|
||||||
|
return organizationManagingUser.Select(o => o.Id);
|
||||||
|
}
|
||||||
|
}
|
@ -1,5 +1,6 @@
|
|||||||
using Bit.Api.Billing.Models.Requests;
|
using Bit.Api.Billing.Models.Requests;
|
||||||
using Bit.Api.Billing.Models.Responses;
|
using Bit.Api.Billing.Models.Responses;
|
||||||
|
using Bit.Core;
|
||||||
using Bit.Core.AdminConsole.Repositories;
|
using Bit.Core.AdminConsole.Repositories;
|
||||||
using Bit.Core.Billing.Models;
|
using Bit.Core.Billing.Models;
|
||||||
using Bit.Core.Billing.Pricing;
|
using Bit.Core.Billing.Pricing;
|
||||||
@ -20,6 +21,7 @@ namespace Bit.Api.Billing.Controllers;
|
|||||||
[Authorize("Application")]
|
[Authorize("Application")]
|
||||||
public class ProviderBillingController(
|
public class ProviderBillingController(
|
||||||
ICurrentContext currentContext,
|
ICurrentContext currentContext,
|
||||||
|
IFeatureService featureService,
|
||||||
ILogger<BaseProviderController> logger,
|
ILogger<BaseProviderController> logger,
|
||||||
IPricingClient pricingClient,
|
IPricingClient pricingClient,
|
||||||
IProviderBillingService providerBillingService,
|
IProviderBillingService providerBillingService,
|
||||||
@ -71,6 +73,65 @@ public class ProviderBillingController(
|
|||||||
"text/csv");
|
"text/csv");
|
||||||
}
|
}
|
||||||
|
|
||||||
|
[HttpPut("payment-method")]
|
||||||
|
public async Task<IResult> UpdatePaymentMethodAsync(
|
||||||
|
[FromRoute] Guid providerId,
|
||||||
|
[FromBody] UpdatePaymentMethodRequestBody requestBody)
|
||||||
|
{
|
||||||
|
var allowProviderPaymentMethod = featureService.IsEnabled(FeatureFlagKeys.PM18794_ProviderPaymentMethod);
|
||||||
|
|
||||||
|
if (!allowProviderPaymentMethod)
|
||||||
|
{
|
||||||
|
return TypedResults.NotFound();
|
||||||
|
}
|
||||||
|
|
||||||
|
var (provider, result) = await TryGetBillableProviderForAdminOperation(providerId);
|
||||||
|
|
||||||
|
if (provider == null)
|
||||||
|
{
|
||||||
|
return result;
|
||||||
|
}
|
||||||
|
|
||||||
|
var tokenizedPaymentSource = requestBody.PaymentSource.ToDomain();
|
||||||
|
var taxInformation = requestBody.TaxInformation.ToDomain();
|
||||||
|
|
||||||
|
await providerBillingService.UpdatePaymentMethod(
|
||||||
|
provider,
|
||||||
|
tokenizedPaymentSource,
|
||||||
|
taxInformation);
|
||||||
|
|
||||||
|
return TypedResults.Ok();
|
||||||
|
}
|
||||||
|
|
||||||
|
[HttpPost("payment-method/verify-bank-account")]
|
||||||
|
public async Task<IResult> VerifyBankAccountAsync(
|
||||||
|
[FromRoute] Guid providerId,
|
||||||
|
[FromBody] VerifyBankAccountRequestBody requestBody)
|
||||||
|
{
|
||||||
|
var allowProviderPaymentMethod = featureService.IsEnabled(FeatureFlagKeys.PM18794_ProviderPaymentMethod);
|
||||||
|
|
||||||
|
if (!allowProviderPaymentMethod)
|
||||||
|
{
|
||||||
|
return TypedResults.NotFound();
|
||||||
|
}
|
||||||
|
|
||||||
|
var (provider, result) = await TryGetBillableProviderForAdminOperation(providerId);
|
||||||
|
|
||||||
|
if (provider == null)
|
||||||
|
{
|
||||||
|
return result;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (requestBody.DescriptorCode.Length != 6 || !requestBody.DescriptorCode.StartsWith("SM"))
|
||||||
|
{
|
||||||
|
return Error.BadRequest("Statement descriptor should be a 6-character value that starts with 'SM'");
|
||||||
|
}
|
||||||
|
|
||||||
|
await subscriberService.VerifyBankAccount(provider, requestBody.DescriptorCode);
|
||||||
|
|
||||||
|
return TypedResults.Ok();
|
||||||
|
}
|
||||||
|
|
||||||
[HttpGet("subscription")]
|
[HttpGet("subscription")]
|
||||||
public async Task<IResult> GetSubscriptionAsync([FromRoute] Guid providerId)
|
public async Task<IResult> GetSubscriptionAsync([FromRoute] Guid providerId)
|
||||||
{
|
{
|
||||||
@ -102,12 +163,32 @@ public class ProviderBillingController(
|
|||||||
|
|
||||||
var subscriptionSuspension = await GetSubscriptionSuspensionAsync(stripeAdapter, subscription);
|
var subscriptionSuspension = await GetSubscriptionSuspensionAsync(stripeAdapter, subscription);
|
||||||
|
|
||||||
|
var paymentSource = await subscriberService.GetPaymentSource(provider);
|
||||||
|
|
||||||
var response = ProviderSubscriptionResponse.From(
|
var response = ProviderSubscriptionResponse.From(
|
||||||
subscription,
|
subscription,
|
||||||
configuredProviderPlans,
|
configuredProviderPlans,
|
||||||
taxInformation,
|
taxInformation,
|
||||||
subscriptionSuspension,
|
subscriptionSuspension,
|
||||||
provider);
|
provider,
|
||||||
|
paymentSource);
|
||||||
|
|
||||||
|
return TypedResults.Ok(response);
|
||||||
|
}
|
||||||
|
|
||||||
|
[HttpGet("tax-information")]
|
||||||
|
public async Task<IResult> GetTaxInformationAsync([FromRoute] Guid providerId)
|
||||||
|
{
|
||||||
|
var (provider, result) = await TryGetBillableProviderForAdminOperation(providerId);
|
||||||
|
|
||||||
|
if (provider == null)
|
||||||
|
{
|
||||||
|
return result;
|
||||||
|
}
|
||||||
|
|
||||||
|
var taxInformation = await subscriberService.GetTaxInformation(provider);
|
||||||
|
|
||||||
|
var response = TaxInformationResponse.From(taxInformation);
|
||||||
|
|
||||||
return TypedResults.Ok(response);
|
return TypedResults.Ok(response);
|
||||||
}
|
}
|
||||||
|
@ -16,7 +16,8 @@ public record ProviderSubscriptionResponse(
|
|||||||
TaxInformation TaxInformation,
|
TaxInformation TaxInformation,
|
||||||
DateTime? CancelAt,
|
DateTime? CancelAt,
|
||||||
SubscriptionSuspension Suspension,
|
SubscriptionSuspension Suspension,
|
||||||
ProviderType ProviderType)
|
ProviderType ProviderType,
|
||||||
|
PaymentSource PaymentSource)
|
||||||
{
|
{
|
||||||
private const string _annualCadence = "Annual";
|
private const string _annualCadence = "Annual";
|
||||||
private const string _monthlyCadence = "Monthly";
|
private const string _monthlyCadence = "Monthly";
|
||||||
@ -26,7 +27,8 @@ public record ProviderSubscriptionResponse(
|
|||||||
ICollection<ConfiguredProviderPlan> providerPlans,
|
ICollection<ConfiguredProviderPlan> providerPlans,
|
||||||
TaxInformation taxInformation,
|
TaxInformation taxInformation,
|
||||||
SubscriptionSuspension subscriptionSuspension,
|
SubscriptionSuspension subscriptionSuspension,
|
||||||
Provider provider)
|
Provider provider,
|
||||||
|
PaymentSource paymentSource)
|
||||||
{
|
{
|
||||||
var providerPlanResponses = providerPlans
|
var providerPlanResponses = providerPlans
|
||||||
.Select(providerPlan =>
|
.Select(providerPlan =>
|
||||||
@ -57,7 +59,8 @@ public record ProviderSubscriptionResponse(
|
|||||||
taxInformation,
|
taxInformation,
|
||||||
subscription.CancelAt,
|
subscription.CancelAt,
|
||||||
subscriptionSuspension,
|
subscriptionSuspension,
|
||||||
provider.Type);
|
provider.Type,
|
||||||
|
paymentSource);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -43,8 +43,9 @@ public class PushController : Controller
|
|||||||
public async Task RegisterAsync([FromBody] PushRegistrationRequestModel model)
|
public async Task RegisterAsync([FromBody] PushRegistrationRequestModel model)
|
||||||
{
|
{
|
||||||
CheckUsage();
|
CheckUsage();
|
||||||
await _pushRegistrationService.CreateOrUpdateRegistrationAsync(new PushRegistrationData(model.PushToken), Prefix(model.DeviceId),
|
await _pushRegistrationService.CreateOrUpdateRegistrationAsync(new PushRegistrationData(model.PushToken),
|
||||||
Prefix(model.UserId), Prefix(model.Identifier), model.Type, model.OrganizationIds.Select(Prefix), model.InstallationId);
|
Prefix(model.DeviceId), Prefix(model.UserId), Prefix(model.Identifier), model.Type,
|
||||||
|
model.OrganizationIds?.Select(Prefix) ?? [], model.InstallationId);
|
||||||
}
|
}
|
||||||
|
|
||||||
[HttpPost("delete")]
|
[HttpPost("delete")]
|
||||||
|
@ -56,7 +56,7 @@ public class ImportCiphersController : Controller
|
|||||||
var userId = _userService.GetProperUserId(User).Value;
|
var userId = _userService.GetProperUserId(User).Value;
|
||||||
var folders = model.Folders.Select(f => f.ToFolder(userId)).ToList();
|
var folders = model.Folders.Select(f => f.ToFolder(userId)).ToList();
|
||||||
var ciphers = model.Ciphers.Select(c => c.ToCipherDetails(userId, false)).ToList();
|
var ciphers = model.Ciphers.Select(c => c.ToCipherDetails(userId, false)).ToList();
|
||||||
await _importCiphersCommand.ImportIntoIndividualVaultAsync(folders, ciphers, model.FolderRelationships);
|
await _importCiphersCommand.ImportIntoIndividualVaultAsync(folders, ciphers, model.FolderRelationships, userId);
|
||||||
}
|
}
|
||||||
|
|
||||||
[HttpPost("import-organization")]
|
[HttpPost("import-organization")]
|
||||||
|
31
src/Api/Utilities/CommandResultExtensions.cs
Normal file
31
src/Api/Utilities/CommandResultExtensions.cs
Normal file
@ -0,0 +1,31 @@
|
|||||||
|
using Bit.Core.Models.Commands;
|
||||||
|
using Microsoft.AspNetCore.Mvc;
|
||||||
|
|
||||||
|
namespace Bit.Api.Utilities;
|
||||||
|
|
||||||
|
public static class CommandResultExtensions
|
||||||
|
{
|
||||||
|
public static IActionResult MapToActionResult<T>(this CommandResult<T> commandResult)
|
||||||
|
{
|
||||||
|
return commandResult switch
|
||||||
|
{
|
||||||
|
NoRecordFoundFailure<T> failure => new ObjectResult(failure.ErrorMessages) { StatusCode = StatusCodes.Status404NotFound },
|
||||||
|
BadRequestFailure<T> failure => new ObjectResult(failure.ErrorMessages) { StatusCode = StatusCodes.Status400BadRequest },
|
||||||
|
Failure<T> failure => new ObjectResult(failure.ErrorMessages) { StatusCode = StatusCodes.Status400BadRequest },
|
||||||
|
Success<T> success => new ObjectResult(success.Value) { StatusCode = StatusCodes.Status200OK },
|
||||||
|
_ => throw new InvalidOperationException($"Unhandled commandResult type: {commandResult.GetType().Name}")
|
||||||
|
};
|
||||||
|
}
|
||||||
|
|
||||||
|
public static IActionResult MapToActionResult(this CommandResult commandResult)
|
||||||
|
{
|
||||||
|
return commandResult switch
|
||||||
|
{
|
||||||
|
NoRecordFoundFailure failure => new ObjectResult(failure.ErrorMessages) { StatusCode = StatusCodes.Status404NotFound },
|
||||||
|
BadRequestFailure failure => new ObjectResult(failure.ErrorMessages) { StatusCode = StatusCodes.Status400BadRequest },
|
||||||
|
Failure failure => new ObjectResult(failure.ErrorMessages) { StatusCode = StatusCodes.Status400BadRequest },
|
||||||
|
Success => new ObjectResult(new { }) { StatusCode = StatusCodes.Status200OK },
|
||||||
|
_ => throw new InvalidOperationException($"Unhandled commandResult type: {commandResult.GetType().Name}")
|
||||||
|
};
|
||||||
|
}
|
||||||
|
}
|
@ -79,14 +79,16 @@ public class CiphersController : Controller
|
|||||||
[HttpGet("{id}")]
|
[HttpGet("{id}")]
|
||||||
public async Task<CipherResponseModel> Get(Guid id)
|
public async Task<CipherResponseModel> Get(Guid id)
|
||||||
{
|
{
|
||||||
var userId = _userService.GetProperUserId(User).Value;
|
var user = await _userService.GetUserByPrincipalAsync(User);
|
||||||
var cipher = await GetByIdAsync(id, userId);
|
var cipher = await GetByIdAsync(id, user.Id);
|
||||||
if (cipher == null)
|
if (cipher == null)
|
||||||
{
|
{
|
||||||
throw new NotFoundException();
|
throw new NotFoundException();
|
||||||
}
|
}
|
||||||
|
|
||||||
return new CipherResponseModel(cipher, _globalSettings);
|
var organizationAbilities = await _applicationCacheService.GetOrganizationAbilitiesAsync();
|
||||||
|
|
||||||
|
return new CipherResponseModel(cipher, user, organizationAbilities, _globalSettings);
|
||||||
}
|
}
|
||||||
|
|
||||||
[HttpGet("{id}/admin")]
|
[HttpGet("{id}/admin")]
|
||||||
@ -109,32 +111,37 @@ public class CiphersController : Controller
|
|||||||
[HttpGet("{id}/details")]
|
[HttpGet("{id}/details")]
|
||||||
public async Task<CipherDetailsResponseModel> GetDetails(Guid id)
|
public async Task<CipherDetailsResponseModel> GetDetails(Guid id)
|
||||||
{
|
{
|
||||||
var userId = _userService.GetProperUserId(User).Value;
|
var user = await _userService.GetUserByPrincipalAsync(User);
|
||||||
var cipher = await GetByIdAsync(id, userId);
|
var cipher = await GetByIdAsync(id, user.Id);
|
||||||
if (cipher == null)
|
if (cipher == null)
|
||||||
{
|
{
|
||||||
throw new NotFoundException();
|
throw new NotFoundException();
|
||||||
}
|
}
|
||||||
|
|
||||||
var collectionCiphers = await _collectionCipherRepository.GetManyByUserIdCipherIdAsync(userId, id);
|
var organizationAbilities = await _applicationCacheService.GetOrganizationAbilitiesAsync();
|
||||||
return new CipherDetailsResponseModel(cipher, _globalSettings, collectionCiphers);
|
var collectionCiphers = await _collectionCipherRepository.GetManyByUserIdCipherIdAsync(user.Id, id);
|
||||||
|
return new CipherDetailsResponseModel(cipher, user, organizationAbilities, _globalSettings, collectionCiphers);
|
||||||
}
|
}
|
||||||
|
|
||||||
[HttpGet("")]
|
[HttpGet("")]
|
||||||
public async Task<ListResponseModel<CipherDetailsResponseModel>> Get()
|
public async Task<ListResponseModel<CipherDetailsResponseModel>> Get()
|
||||||
{
|
{
|
||||||
var userId = _userService.GetProperUserId(User).Value;
|
var user = await _userService.GetUserByPrincipalAsync(User);
|
||||||
var hasOrgs = _currentContext.Organizations?.Any() ?? false;
|
var hasOrgs = _currentContext.Organizations?.Any() ?? false;
|
||||||
// TODO: Use hasOrgs proper for cipher listing here?
|
// TODO: Use hasOrgs proper for cipher listing here?
|
||||||
var ciphers = await _cipherRepository.GetManyByUserIdAsync(userId, withOrganizations: true || hasOrgs);
|
var ciphers = await _cipherRepository.GetManyByUserIdAsync(user.Id, withOrganizations: true || hasOrgs);
|
||||||
Dictionary<Guid, IGrouping<Guid, CollectionCipher>> collectionCiphersGroupDict = null;
|
Dictionary<Guid, IGrouping<Guid, CollectionCipher>> collectionCiphersGroupDict = null;
|
||||||
if (hasOrgs)
|
if (hasOrgs)
|
||||||
{
|
{
|
||||||
var collectionCiphers = await _collectionCipherRepository.GetManyByUserIdAsync(userId);
|
var collectionCiphers = await _collectionCipherRepository.GetManyByUserIdAsync(user.Id);
|
||||||
collectionCiphersGroupDict = collectionCiphers.GroupBy(c => c.CipherId).ToDictionary(s => s.Key);
|
collectionCiphersGroupDict = collectionCiphers.GroupBy(c => c.CipherId).ToDictionary(s => s.Key);
|
||||||
}
|
}
|
||||||
|
var organizationAbilities = await _applicationCacheService.GetOrganizationAbilitiesAsync();
|
||||||
var responses = ciphers.Select(c => new CipherDetailsResponseModel(c, _globalSettings,
|
var responses = ciphers.Select(cipher => new CipherDetailsResponseModel(
|
||||||
|
cipher,
|
||||||
|
user,
|
||||||
|
organizationAbilities,
|
||||||
|
_globalSettings,
|
||||||
collectionCiphersGroupDict)).ToList();
|
collectionCiphersGroupDict)).ToList();
|
||||||
return new ListResponseModel<CipherDetailsResponseModel>(responses);
|
return new ListResponseModel<CipherDetailsResponseModel>(responses);
|
||||||
}
|
}
|
||||||
@ -142,30 +149,38 @@ public class CiphersController : Controller
|
|||||||
[HttpPost("")]
|
[HttpPost("")]
|
||||||
public async Task<CipherResponseModel> Post([FromBody] CipherRequestModel model)
|
public async Task<CipherResponseModel> Post([FromBody] CipherRequestModel model)
|
||||||
{
|
{
|
||||||
var userId = _userService.GetProperUserId(User).Value;
|
var user = await _userService.GetUserByPrincipalAsync(User);
|
||||||
var cipher = model.ToCipherDetails(userId);
|
var cipher = model.ToCipherDetails(user.Id);
|
||||||
if (cipher.OrganizationId.HasValue && !await _currentContext.OrganizationUser(cipher.OrganizationId.Value))
|
if (cipher.OrganizationId.HasValue && !await _currentContext.OrganizationUser(cipher.OrganizationId.Value))
|
||||||
{
|
{
|
||||||
throw new NotFoundException();
|
throw new NotFoundException();
|
||||||
}
|
}
|
||||||
|
|
||||||
await _cipherService.SaveDetailsAsync(cipher, userId, model.LastKnownRevisionDate, null, cipher.OrganizationId.HasValue);
|
await _cipherService.SaveDetailsAsync(cipher, user.Id, model.LastKnownRevisionDate, null, cipher.OrganizationId.HasValue);
|
||||||
var response = new CipherResponseModel(cipher, _globalSettings);
|
var response = new CipherResponseModel(
|
||||||
|
cipher,
|
||||||
|
user,
|
||||||
|
await _applicationCacheService.GetOrganizationAbilitiesAsync(),
|
||||||
|
_globalSettings);
|
||||||
return response;
|
return response;
|
||||||
}
|
}
|
||||||
|
|
||||||
[HttpPost("create")]
|
[HttpPost("create")]
|
||||||
public async Task<CipherResponseModel> PostCreate([FromBody] CipherCreateRequestModel model)
|
public async Task<CipherResponseModel> PostCreate([FromBody] CipherCreateRequestModel model)
|
||||||
{
|
{
|
||||||
var userId = _userService.GetProperUserId(User).Value;
|
var user = await _userService.GetUserByPrincipalAsync(User);
|
||||||
var cipher = model.Cipher.ToCipherDetails(userId);
|
var cipher = model.Cipher.ToCipherDetails(user.Id);
|
||||||
if (cipher.OrganizationId.HasValue && !await _currentContext.OrganizationUser(cipher.OrganizationId.Value))
|
if (cipher.OrganizationId.HasValue && !await _currentContext.OrganizationUser(cipher.OrganizationId.Value))
|
||||||
{
|
{
|
||||||
throw new NotFoundException();
|
throw new NotFoundException();
|
||||||
}
|
}
|
||||||
|
|
||||||
await _cipherService.SaveDetailsAsync(cipher, userId, model.Cipher.LastKnownRevisionDate, model.CollectionIds, cipher.OrganizationId.HasValue);
|
await _cipherService.SaveDetailsAsync(cipher, user.Id, model.Cipher.LastKnownRevisionDate, model.CollectionIds, cipher.OrganizationId.HasValue);
|
||||||
var response = new CipherResponseModel(cipher, _globalSettings);
|
var response = new CipherResponseModel(
|
||||||
|
cipher,
|
||||||
|
user,
|
||||||
|
await _applicationCacheService.GetOrganizationAbilitiesAsync(),
|
||||||
|
_globalSettings);
|
||||||
return response;
|
return response;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -191,8 +206,8 @@ public class CiphersController : Controller
|
|||||||
[HttpPost("{id}")]
|
[HttpPost("{id}")]
|
||||||
public async Task<CipherResponseModel> Put(Guid id, [FromBody] CipherRequestModel model)
|
public async Task<CipherResponseModel> Put(Guid id, [FromBody] CipherRequestModel model)
|
||||||
{
|
{
|
||||||
var userId = _userService.GetProperUserId(User).Value;
|
var user = await _userService.GetUserByPrincipalAsync(User);
|
||||||
var cipher = await GetByIdAsync(id, userId);
|
var cipher = await GetByIdAsync(id, user.Id);
|
||||||
if (cipher == null)
|
if (cipher == null)
|
||||||
{
|
{
|
||||||
throw new NotFoundException();
|
throw new NotFoundException();
|
||||||
@ -200,7 +215,7 @@ public class CiphersController : Controller
|
|||||||
|
|
||||||
ValidateClientVersionForFido2CredentialSupport(cipher);
|
ValidateClientVersionForFido2CredentialSupport(cipher);
|
||||||
|
|
||||||
var collectionIds = (await _collectionCipherRepository.GetManyByUserIdCipherIdAsync(userId, id)).Select(c => c.CollectionId).ToList();
|
var collectionIds = (await _collectionCipherRepository.GetManyByUserIdCipherIdAsync(user.Id, id)).Select(c => c.CollectionId).ToList();
|
||||||
var modelOrgId = string.IsNullOrWhiteSpace(model.OrganizationId) ?
|
var modelOrgId = string.IsNullOrWhiteSpace(model.OrganizationId) ?
|
||||||
(Guid?)null : new Guid(model.OrganizationId);
|
(Guid?)null : new Guid(model.OrganizationId);
|
||||||
if (cipher.OrganizationId != modelOrgId)
|
if (cipher.OrganizationId != modelOrgId)
|
||||||
@ -209,9 +224,13 @@ public class CiphersController : Controller
|
|||||||
"then try again.");
|
"then try again.");
|
||||||
}
|
}
|
||||||
|
|
||||||
await _cipherService.SaveDetailsAsync(model.ToCipherDetails(cipher), userId, model.LastKnownRevisionDate, collectionIds);
|
await _cipherService.SaveDetailsAsync(model.ToCipherDetails(cipher), user.Id, model.LastKnownRevisionDate, collectionIds);
|
||||||
|
|
||||||
var response = new CipherResponseModel(cipher, _globalSettings);
|
var response = new CipherResponseModel(
|
||||||
|
cipher,
|
||||||
|
user,
|
||||||
|
await _applicationCacheService.GetOrganizationAbilitiesAsync(),
|
||||||
|
_globalSettings);
|
||||||
return response;
|
return response;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -278,7 +297,14 @@ public class CiphersController : Controller
|
|||||||
}));
|
}));
|
||||||
}
|
}
|
||||||
|
|
||||||
var responses = ciphers.Select(c => new CipherDetailsResponseModel(c, _globalSettings));
|
var user = await _userService.GetUserByPrincipalAsync(User);
|
||||||
|
var organizationAbilities = await _applicationCacheService.GetOrganizationAbilitiesAsync();
|
||||||
|
var responses = ciphers.Select(cipher =>
|
||||||
|
new CipherDetailsResponseModel(
|
||||||
|
cipher,
|
||||||
|
user,
|
||||||
|
organizationAbilities,
|
||||||
|
_globalSettings));
|
||||||
|
|
||||||
return new ListResponseModel<CipherDetailsResponseModel>(responses);
|
return new ListResponseModel<CipherDetailsResponseModel>(responses);
|
||||||
}
|
}
|
||||||
@ -572,12 +598,16 @@ public class CiphersController : Controller
|
|||||||
[HttpPost("{id}/partial")]
|
[HttpPost("{id}/partial")]
|
||||||
public async Task<CipherResponseModel> PutPartial(Guid id, [FromBody] CipherPartialRequestModel model)
|
public async Task<CipherResponseModel> PutPartial(Guid id, [FromBody] CipherPartialRequestModel model)
|
||||||
{
|
{
|
||||||
var userId = _userService.GetProperUserId(User).Value;
|
var user = await _userService.GetUserByPrincipalAsync(User);
|
||||||
var folderId = string.IsNullOrWhiteSpace(model.FolderId) ? null : (Guid?)new Guid(model.FolderId);
|
var folderId = string.IsNullOrWhiteSpace(model.FolderId) ? null : (Guid?)new Guid(model.FolderId);
|
||||||
await _cipherRepository.UpdatePartialAsync(id, userId, folderId, model.Favorite);
|
await _cipherRepository.UpdatePartialAsync(id, user.Id, folderId, model.Favorite);
|
||||||
|
|
||||||
var cipher = await GetByIdAsync(id, userId);
|
var cipher = await GetByIdAsync(id, user.Id);
|
||||||
var response = new CipherResponseModel(cipher, _globalSettings);
|
var response = new CipherResponseModel(
|
||||||
|
cipher,
|
||||||
|
user,
|
||||||
|
await _applicationCacheService.GetOrganizationAbilitiesAsync(),
|
||||||
|
_globalSettings);
|
||||||
return response;
|
return response;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -585,9 +615,9 @@ public class CiphersController : Controller
|
|||||||
[HttpPost("{id}/share")]
|
[HttpPost("{id}/share")]
|
||||||
public async Task<CipherResponseModel> PutShare(Guid id, [FromBody] CipherShareRequestModel model)
|
public async Task<CipherResponseModel> PutShare(Guid id, [FromBody] CipherShareRequestModel model)
|
||||||
{
|
{
|
||||||
var userId = _userService.GetProperUserId(User).Value;
|
var user = await _userService.GetUserByPrincipalAsync(User);
|
||||||
var cipher = await _cipherRepository.GetByIdAsync(id);
|
var cipher = await _cipherRepository.GetByIdAsync(id);
|
||||||
if (cipher == null || cipher.UserId != userId ||
|
if (cipher == null || cipher.UserId != user.Id ||
|
||||||
!await _currentContext.OrganizationUser(new Guid(model.Cipher.OrganizationId)))
|
!await _currentContext.OrganizationUser(new Guid(model.Cipher.OrganizationId)))
|
||||||
{
|
{
|
||||||
throw new NotFoundException();
|
throw new NotFoundException();
|
||||||
@ -597,10 +627,14 @@ public class CiphersController : Controller
|
|||||||
|
|
||||||
var original = cipher.Clone();
|
var original = cipher.Clone();
|
||||||
await _cipherService.ShareAsync(original, model.Cipher.ToCipher(cipher), new Guid(model.Cipher.OrganizationId),
|
await _cipherService.ShareAsync(original, model.Cipher.ToCipher(cipher), new Guid(model.Cipher.OrganizationId),
|
||||||
model.CollectionIds.Select(c => new Guid(c)), userId, model.Cipher.LastKnownRevisionDate);
|
model.CollectionIds.Select(c => new Guid(c)), user.Id, model.Cipher.LastKnownRevisionDate);
|
||||||
|
|
||||||
var sharedCipher = await GetByIdAsync(id, userId);
|
var sharedCipher = await GetByIdAsync(id, user.Id);
|
||||||
var response = new CipherResponseModel(sharedCipher, _globalSettings);
|
var response = new CipherResponseModel(
|
||||||
|
sharedCipher,
|
||||||
|
user,
|
||||||
|
await _applicationCacheService.GetOrganizationAbilitiesAsync(),
|
||||||
|
_globalSettings);
|
||||||
return response;
|
return response;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -608,8 +642,8 @@ public class CiphersController : Controller
|
|||||||
[HttpPost("{id}/collections")]
|
[HttpPost("{id}/collections")]
|
||||||
public async Task<CipherDetailsResponseModel> PutCollections(Guid id, [FromBody] CipherCollectionsRequestModel model)
|
public async Task<CipherDetailsResponseModel> PutCollections(Guid id, [FromBody] CipherCollectionsRequestModel model)
|
||||||
{
|
{
|
||||||
var userId = _userService.GetProperUserId(User).Value;
|
var user = await _userService.GetUserByPrincipalAsync(User);
|
||||||
var cipher = await GetByIdAsync(id, userId);
|
var cipher = await GetByIdAsync(id, user.Id);
|
||||||
if (cipher == null || !cipher.OrganizationId.HasValue ||
|
if (cipher == null || !cipher.OrganizationId.HasValue ||
|
||||||
!await _currentContext.OrganizationUser(cipher.OrganizationId.Value))
|
!await _currentContext.OrganizationUser(cipher.OrganizationId.Value))
|
||||||
{
|
{
|
||||||
@ -617,20 +651,25 @@ public class CiphersController : Controller
|
|||||||
}
|
}
|
||||||
|
|
||||||
await _cipherService.SaveCollectionsAsync(cipher,
|
await _cipherService.SaveCollectionsAsync(cipher,
|
||||||
model.CollectionIds.Select(c => new Guid(c)), userId, false);
|
model.CollectionIds.Select(c => new Guid(c)), user.Id, false);
|
||||||
|
|
||||||
var updatedCipher = await GetByIdAsync(id, userId);
|
var updatedCipher = await GetByIdAsync(id, user.Id);
|
||||||
var collectionCiphers = await _collectionCipherRepository.GetManyByUserIdCipherIdAsync(userId, id);
|
var collectionCiphers = await _collectionCipherRepository.GetManyByUserIdCipherIdAsync(user.Id, id);
|
||||||
|
|
||||||
return new CipherDetailsResponseModel(updatedCipher, _globalSettings, collectionCiphers);
|
return new CipherDetailsResponseModel(
|
||||||
|
updatedCipher,
|
||||||
|
user,
|
||||||
|
await _applicationCacheService.GetOrganizationAbilitiesAsync(),
|
||||||
|
_globalSettings,
|
||||||
|
collectionCiphers);
|
||||||
}
|
}
|
||||||
|
|
||||||
[HttpPut("{id}/collections_v2")]
|
[HttpPut("{id}/collections_v2")]
|
||||||
[HttpPost("{id}/collections_v2")]
|
[HttpPost("{id}/collections_v2")]
|
||||||
public async Task<OptionalCipherDetailsResponseModel> PutCollections_vNext(Guid id, [FromBody] CipherCollectionsRequestModel model)
|
public async Task<OptionalCipherDetailsResponseModel> PutCollections_vNext(Guid id, [FromBody] CipherCollectionsRequestModel model)
|
||||||
{
|
{
|
||||||
var userId = _userService.GetProperUserId(User).Value;
|
var user = await _userService.GetUserByPrincipalAsync(User);
|
||||||
var cipher = await GetByIdAsync(id, userId);
|
var cipher = await GetByIdAsync(id, user.Id);
|
||||||
if (cipher == null || !cipher.OrganizationId.HasValue ||
|
if (cipher == null || !cipher.OrganizationId.HasValue ||
|
||||||
!await _currentContext.OrganizationUser(cipher.OrganizationId.Value) || !cipher.ViewPassword)
|
!await _currentContext.OrganizationUser(cipher.OrganizationId.Value) || !cipher.ViewPassword)
|
||||||
{
|
{
|
||||||
@ -638,10 +677,10 @@ public class CiphersController : Controller
|
|||||||
}
|
}
|
||||||
|
|
||||||
await _cipherService.SaveCollectionsAsync(cipher,
|
await _cipherService.SaveCollectionsAsync(cipher,
|
||||||
model.CollectionIds.Select(c => new Guid(c)), userId, false);
|
model.CollectionIds.Select(c => new Guid(c)), user.Id, false);
|
||||||
|
|
||||||
var updatedCipher = await GetByIdAsync(id, userId);
|
var updatedCipher = await GetByIdAsync(id, user.Id);
|
||||||
var collectionCiphers = await _collectionCipherRepository.GetManyByUserIdCipherIdAsync(userId, id);
|
var collectionCiphers = await _collectionCipherRepository.GetManyByUserIdCipherIdAsync(user.Id, id);
|
||||||
// If a user removes the last Can Manage access of a cipher, the "updatedCipher" will return null
|
// If a user removes the last Can Manage access of a cipher, the "updatedCipher" will return null
|
||||||
// We will be returning an "Unavailable" property so the client knows the user can no longer access this
|
// We will be returning an "Unavailable" property so the client knows the user can no longer access this
|
||||||
var response = new OptionalCipherDetailsResponseModel()
|
var response = new OptionalCipherDetailsResponseModel()
|
||||||
@ -649,7 +688,12 @@ public class CiphersController : Controller
|
|||||||
Unavailable = updatedCipher is null,
|
Unavailable = updatedCipher is null,
|
||||||
Cipher = updatedCipher is null
|
Cipher = updatedCipher is null
|
||||||
? null
|
? null
|
||||||
: new CipherDetailsResponseModel(updatedCipher, _globalSettings, collectionCiphers)
|
: new CipherDetailsResponseModel(
|
||||||
|
updatedCipher,
|
||||||
|
user,
|
||||||
|
await _applicationCacheService.GetOrganizationAbilitiesAsync(),
|
||||||
|
_globalSettings,
|
||||||
|
collectionCiphers)
|
||||||
};
|
};
|
||||||
return response;
|
return response;
|
||||||
}
|
}
|
||||||
@ -839,15 +883,19 @@ public class CiphersController : Controller
|
|||||||
[HttpPut("{id}/restore")]
|
[HttpPut("{id}/restore")]
|
||||||
public async Task<CipherResponseModel> PutRestore(Guid id)
|
public async Task<CipherResponseModel> PutRestore(Guid id)
|
||||||
{
|
{
|
||||||
var userId = _userService.GetProperUserId(User).Value;
|
var user = await _userService.GetUserByPrincipalAsync(User);
|
||||||
var cipher = await GetByIdAsync(id, userId);
|
var cipher = await GetByIdAsync(id, user.Id);
|
||||||
if (cipher == null)
|
if (cipher == null)
|
||||||
{
|
{
|
||||||
throw new NotFoundException();
|
throw new NotFoundException();
|
||||||
}
|
}
|
||||||
|
|
||||||
await _cipherService.RestoreAsync(cipher, userId);
|
await _cipherService.RestoreAsync(cipher, user.Id);
|
||||||
return new CipherResponseModel(cipher, _globalSettings);
|
return new CipherResponseModel(
|
||||||
|
cipher,
|
||||||
|
user,
|
||||||
|
await _applicationCacheService.GetOrganizationAbilitiesAsync(),
|
||||||
|
_globalSettings);
|
||||||
}
|
}
|
||||||
|
|
||||||
[HttpPut("{id}/restore-admin")]
|
[HttpPut("{id}/restore-admin")]
|
||||||
@ -996,10 +1044,10 @@ public class CiphersController : Controller
|
|||||||
[HttpPost("{id}/attachment/v2")]
|
[HttpPost("{id}/attachment/v2")]
|
||||||
public async Task<AttachmentUploadDataResponseModel> PostAttachment(Guid id, [FromBody] AttachmentRequestModel request)
|
public async Task<AttachmentUploadDataResponseModel> PostAttachment(Guid id, [FromBody] AttachmentRequestModel request)
|
||||||
{
|
{
|
||||||
var userId = _userService.GetProperUserId(User).Value;
|
var user = await _userService.GetUserByPrincipalAsync(User);
|
||||||
var cipher = request.AdminRequest ?
|
var cipher = request.AdminRequest ?
|
||||||
await _cipherRepository.GetOrganizationDetailsByIdAsync(id) :
|
await _cipherRepository.GetOrganizationDetailsByIdAsync(id) :
|
||||||
await GetByIdAsync(id, userId);
|
await GetByIdAsync(id, user.Id);
|
||||||
|
|
||||||
if (cipher == null || (request.AdminRequest && (!cipher.OrganizationId.HasValue ||
|
if (cipher == null || (request.AdminRequest && (!cipher.OrganizationId.HasValue ||
|
||||||
!await CanEditCipherAsAdminAsync(cipher.OrganizationId.Value, new[] { cipher.Id }))))
|
!await CanEditCipherAsAdminAsync(cipher.OrganizationId.Value, new[] { cipher.Id }))))
|
||||||
@ -1013,13 +1061,17 @@ public class CiphersController : Controller
|
|||||||
}
|
}
|
||||||
|
|
||||||
var (attachmentId, uploadUrl) = await _cipherService.CreateAttachmentForDelayedUploadAsync(cipher,
|
var (attachmentId, uploadUrl) = await _cipherService.CreateAttachmentForDelayedUploadAsync(cipher,
|
||||||
request.Key, request.FileName, request.FileSize, request.AdminRequest, userId);
|
request.Key, request.FileName, request.FileSize, request.AdminRequest, user.Id);
|
||||||
return new AttachmentUploadDataResponseModel
|
return new AttachmentUploadDataResponseModel
|
||||||
{
|
{
|
||||||
AttachmentId = attachmentId,
|
AttachmentId = attachmentId,
|
||||||
Url = uploadUrl,
|
Url = uploadUrl,
|
||||||
FileUploadType = _attachmentStorageService.FileUploadType,
|
FileUploadType = _attachmentStorageService.FileUploadType,
|
||||||
CipherResponse = request.AdminRequest ? null : new CipherResponseModel((CipherDetails)cipher, _globalSettings),
|
CipherResponse = request.AdminRequest ? null : new CipherResponseModel(
|
||||||
|
(CipherDetails)cipher,
|
||||||
|
user,
|
||||||
|
await _applicationCacheService.GetOrganizationAbilitiesAsync(),
|
||||||
|
_globalSettings),
|
||||||
CipherMiniResponse = request.AdminRequest ? new CipherMiniResponseModel(cipher, _globalSettings, cipher.OrganizationUseTotp) : null,
|
CipherMiniResponse = request.AdminRequest ? new CipherMiniResponseModel(cipher, _globalSettings, cipher.OrganizationUseTotp) : null,
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
@ -1077,8 +1129,8 @@ public class CiphersController : Controller
|
|||||||
{
|
{
|
||||||
ValidateAttachment();
|
ValidateAttachment();
|
||||||
|
|
||||||
var userId = _userService.GetProperUserId(User).Value;
|
var user = await _userService.GetUserByPrincipalAsync(User);
|
||||||
var cipher = await GetByIdAsync(id, userId);
|
var cipher = await GetByIdAsync(id, user.Id);
|
||||||
if (cipher == null)
|
if (cipher == null)
|
||||||
{
|
{
|
||||||
throw new NotFoundException();
|
throw new NotFoundException();
|
||||||
@ -1087,10 +1139,14 @@ public class CiphersController : Controller
|
|||||||
await Request.GetFileAsync(async (stream, fileName, key) =>
|
await Request.GetFileAsync(async (stream, fileName, key) =>
|
||||||
{
|
{
|
||||||
await _cipherService.CreateAttachmentAsync(cipher, stream, fileName, key,
|
await _cipherService.CreateAttachmentAsync(cipher, stream, fileName, key,
|
||||||
Request.ContentLength.GetValueOrDefault(0), userId);
|
Request.ContentLength.GetValueOrDefault(0), user.Id);
|
||||||
});
|
});
|
||||||
|
|
||||||
return new CipherResponseModel(cipher, _globalSettings);
|
return new CipherResponseModel(
|
||||||
|
cipher,
|
||||||
|
user,
|
||||||
|
await _applicationCacheService.GetOrganizationAbilitiesAsync(),
|
||||||
|
_globalSettings);
|
||||||
}
|
}
|
||||||
|
|
||||||
[HttpPost("{id}/attachment-admin")]
|
[HttpPost("{id}/attachment-admin")]
|
||||||
|
@ -36,6 +36,7 @@ public class SyncController : Controller
|
|||||||
private readonly ICurrentContext _currentContext;
|
private readonly ICurrentContext _currentContext;
|
||||||
private readonly Version _sshKeyCipherMinimumVersion = new(Constants.SSHKeyCipherMinimumVersion);
|
private readonly Version _sshKeyCipherMinimumVersion = new(Constants.SSHKeyCipherMinimumVersion);
|
||||||
private readonly IFeatureService _featureService;
|
private readonly IFeatureService _featureService;
|
||||||
|
private readonly IApplicationCacheService _applicationCacheService;
|
||||||
|
|
||||||
public SyncController(
|
public SyncController(
|
||||||
IUserService userService,
|
IUserService userService,
|
||||||
@ -49,7 +50,8 @@ public class SyncController : Controller
|
|||||||
ISendRepository sendRepository,
|
ISendRepository sendRepository,
|
||||||
GlobalSettings globalSettings,
|
GlobalSettings globalSettings,
|
||||||
ICurrentContext currentContext,
|
ICurrentContext currentContext,
|
||||||
IFeatureService featureService)
|
IFeatureService featureService,
|
||||||
|
IApplicationCacheService applicationCacheService)
|
||||||
{
|
{
|
||||||
_userService = userService;
|
_userService = userService;
|
||||||
_folderRepository = folderRepository;
|
_folderRepository = folderRepository;
|
||||||
@ -63,6 +65,7 @@ public class SyncController : Controller
|
|||||||
_globalSettings = globalSettings;
|
_globalSettings = globalSettings;
|
||||||
_currentContext = currentContext;
|
_currentContext = currentContext;
|
||||||
_featureService = featureService;
|
_featureService = featureService;
|
||||||
|
_applicationCacheService = applicationCacheService;
|
||||||
}
|
}
|
||||||
|
|
||||||
[HttpGet("")]
|
[HttpGet("")]
|
||||||
@ -104,7 +107,9 @@ public class SyncController : Controller
|
|||||||
var organizationManagingActiveUser = await _userService.GetOrganizationsManagingUserAsync(user.Id);
|
var organizationManagingActiveUser = await _userService.GetOrganizationsManagingUserAsync(user.Id);
|
||||||
var organizationIdsManagingActiveUser = organizationManagingActiveUser.Select(o => o.Id);
|
var organizationIdsManagingActiveUser = organizationManagingActiveUser.Select(o => o.Id);
|
||||||
|
|
||||||
var response = new SyncResponseModel(_globalSettings, user, userTwoFactorEnabled, userHasPremiumFromOrganization,
|
var organizationAbilities = await _applicationCacheService.GetOrganizationAbilitiesAsync();
|
||||||
|
|
||||||
|
var response = new SyncResponseModel(_globalSettings, user, userTwoFactorEnabled, userHasPremiumFromOrganization, organizationAbilities,
|
||||||
organizationIdsManagingActiveUser, organizationUserDetails, providerUserDetails, providerUserOrganizationDetails,
|
organizationIdsManagingActiveUser, organizationUserDetails, providerUserDetails, providerUserOrganizationDetails,
|
||||||
folders, collections, ciphers, collectionCiphersGroupDict, excludeDomains, policies, sends);
|
folders, collections, ciphers, collectionCiphersGroupDict, excludeDomains, policies, sends);
|
||||||
return response;
|
return response;
|
||||||
|
@ -0,0 +1,27 @@
|
|||||||
|
using Bit.Core.Entities;
|
||||||
|
using Bit.Core.Models.Data.Organizations;
|
||||||
|
using Bit.Core.Vault.Authorization.Permissions;
|
||||||
|
using Bit.Core.Vault.Models.Data;
|
||||||
|
|
||||||
|
namespace Bit.Api.Vault.Models.Response;
|
||||||
|
|
||||||
|
public record CipherPermissionsResponseModel
|
||||||
|
{
|
||||||
|
public bool Delete { get; init; }
|
||||||
|
public bool Restore { get; init; }
|
||||||
|
|
||||||
|
public CipherPermissionsResponseModel(
|
||||||
|
User user,
|
||||||
|
CipherDetails cipherDetails,
|
||||||
|
IDictionary<Guid, OrganizationAbility> organizationAbilities)
|
||||||
|
{
|
||||||
|
OrganizationAbility organizationAbility = null;
|
||||||
|
if (cipherDetails.OrganizationId.HasValue && !organizationAbilities.TryGetValue(cipherDetails.OrganizationId.Value, out organizationAbility))
|
||||||
|
{
|
||||||
|
throw new Exception("OrganizationAbility not found for organization cipher.");
|
||||||
|
}
|
||||||
|
|
||||||
|
Delete = NormalCipherPermissions.CanDelete(user, cipherDetails, organizationAbility);
|
||||||
|
Restore = NormalCipherPermissions.CanRestore(user, cipherDetails, organizationAbility);
|
||||||
|
}
|
||||||
|
}
|
@ -1,6 +1,7 @@
|
|||||||
using System.Text.Json;
|
using System.Text.Json;
|
||||||
using Bit.Core.Entities;
|
using Bit.Core.Entities;
|
||||||
using Bit.Core.Models.Api;
|
using Bit.Core.Models.Api;
|
||||||
|
using Bit.Core.Models.Data.Organizations;
|
||||||
using Bit.Core.Settings;
|
using Bit.Core.Settings;
|
||||||
using Bit.Core.Vault.Entities;
|
using Bit.Core.Vault.Entities;
|
||||||
using Bit.Core.Vault.Enums;
|
using Bit.Core.Vault.Enums;
|
||||||
@ -96,26 +97,37 @@ public class CipherMiniResponseModel : ResponseModel
|
|||||||
|
|
||||||
public class CipherResponseModel : CipherMiniResponseModel
|
public class CipherResponseModel : CipherMiniResponseModel
|
||||||
{
|
{
|
||||||
public CipherResponseModel(CipherDetails cipher, IGlobalSettings globalSettings, string obj = "cipher")
|
public CipherResponseModel(
|
||||||
|
CipherDetails cipher,
|
||||||
|
User user,
|
||||||
|
IDictionary<Guid, OrganizationAbility> organizationAbilities,
|
||||||
|
IGlobalSettings globalSettings,
|
||||||
|
string obj = "cipher")
|
||||||
: base(cipher, globalSettings, cipher.OrganizationUseTotp, obj)
|
: base(cipher, globalSettings, cipher.OrganizationUseTotp, obj)
|
||||||
{
|
{
|
||||||
FolderId = cipher.FolderId;
|
FolderId = cipher.FolderId;
|
||||||
Favorite = cipher.Favorite;
|
Favorite = cipher.Favorite;
|
||||||
Edit = cipher.Edit;
|
Edit = cipher.Edit;
|
||||||
ViewPassword = cipher.ViewPassword;
|
ViewPassword = cipher.ViewPassword;
|
||||||
|
Permissions = new CipherPermissionsResponseModel(user, cipher, organizationAbilities);
|
||||||
}
|
}
|
||||||
|
|
||||||
public Guid? FolderId { get; set; }
|
public Guid? FolderId { get; set; }
|
||||||
public bool Favorite { get; set; }
|
public bool Favorite { get; set; }
|
||||||
public bool Edit { get; set; }
|
public bool Edit { get; set; }
|
||||||
public bool ViewPassword { get; set; }
|
public bool ViewPassword { get; set; }
|
||||||
|
public CipherPermissionsResponseModel Permissions { get; set; }
|
||||||
}
|
}
|
||||||
|
|
||||||
public class CipherDetailsResponseModel : CipherResponseModel
|
public class CipherDetailsResponseModel : CipherResponseModel
|
||||||
{
|
{
|
||||||
public CipherDetailsResponseModel(CipherDetails cipher, GlobalSettings globalSettings,
|
public CipherDetailsResponseModel(
|
||||||
|
CipherDetails cipher,
|
||||||
|
User user,
|
||||||
|
IDictionary<Guid, OrganizationAbility> organizationAbilities,
|
||||||
|
GlobalSettings globalSettings,
|
||||||
IDictionary<Guid, IGrouping<Guid, CollectionCipher>> collectionCiphers, string obj = "cipherDetails")
|
IDictionary<Guid, IGrouping<Guid, CollectionCipher>> collectionCiphers, string obj = "cipherDetails")
|
||||||
: base(cipher, globalSettings, obj)
|
: base(cipher, user, organizationAbilities, globalSettings, obj)
|
||||||
{
|
{
|
||||||
if (collectionCiphers?.ContainsKey(cipher.Id) ?? false)
|
if (collectionCiphers?.ContainsKey(cipher.Id) ?? false)
|
||||||
{
|
{
|
||||||
@ -127,15 +139,24 @@ public class CipherDetailsResponseModel : CipherResponseModel
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
public CipherDetailsResponseModel(CipherDetails cipher, GlobalSettings globalSettings,
|
public CipherDetailsResponseModel(
|
||||||
|
CipherDetails cipher,
|
||||||
|
User user,
|
||||||
|
IDictionary<Guid, OrganizationAbility> organizationAbilities,
|
||||||
|
GlobalSettings globalSettings,
|
||||||
IEnumerable<CollectionCipher> collectionCiphers, string obj = "cipherDetails")
|
IEnumerable<CollectionCipher> collectionCiphers, string obj = "cipherDetails")
|
||||||
: base(cipher, globalSettings, obj)
|
: base(cipher, user, organizationAbilities, globalSettings, obj)
|
||||||
{
|
{
|
||||||
CollectionIds = collectionCiphers?.Select(c => c.CollectionId) ?? new List<Guid>();
|
CollectionIds = collectionCiphers?.Select(c => c.CollectionId) ?? new List<Guid>();
|
||||||
}
|
}
|
||||||
|
|
||||||
public CipherDetailsResponseModel(CipherDetailsWithCollections cipher, GlobalSettings globalSettings, string obj = "cipherDetails")
|
public CipherDetailsResponseModel(
|
||||||
: base(cipher, globalSettings, obj)
|
CipherDetailsWithCollections cipher,
|
||||||
|
User user,
|
||||||
|
IDictionary<Guid, OrganizationAbility> organizationAbilities,
|
||||||
|
GlobalSettings globalSettings,
|
||||||
|
string obj = "cipherDetails")
|
||||||
|
: base(cipher, user, organizationAbilities, globalSettings, obj)
|
||||||
{
|
{
|
||||||
CollectionIds = cipher.CollectionIds ?? new List<Guid>();
|
CollectionIds = cipher.CollectionIds ?? new List<Guid>();
|
||||||
}
|
}
|
||||||
|
@ -6,6 +6,7 @@ using Bit.Core.AdminConsole.Models.Data.Provider;
|
|||||||
using Bit.Core.Entities;
|
using Bit.Core.Entities;
|
||||||
using Bit.Core.Models.Api;
|
using Bit.Core.Models.Api;
|
||||||
using Bit.Core.Models.Data;
|
using Bit.Core.Models.Data;
|
||||||
|
using Bit.Core.Models.Data.Organizations;
|
||||||
using Bit.Core.Models.Data.Organizations.OrganizationUsers;
|
using Bit.Core.Models.Data.Organizations.OrganizationUsers;
|
||||||
using Bit.Core.Settings;
|
using Bit.Core.Settings;
|
||||||
using Bit.Core.Tools.Entities;
|
using Bit.Core.Tools.Entities;
|
||||||
@ -21,6 +22,7 @@ public class SyncResponseModel : ResponseModel
|
|||||||
User user,
|
User user,
|
||||||
bool userTwoFactorEnabled,
|
bool userTwoFactorEnabled,
|
||||||
bool userHasPremiumFromOrganization,
|
bool userHasPremiumFromOrganization,
|
||||||
|
IDictionary<Guid, OrganizationAbility> organizationAbilities,
|
||||||
IEnumerable<Guid> organizationIdsManagingUser,
|
IEnumerable<Guid> organizationIdsManagingUser,
|
||||||
IEnumerable<OrganizationUserOrganizationDetails> organizationUserDetails,
|
IEnumerable<OrganizationUserOrganizationDetails> organizationUserDetails,
|
||||||
IEnumerable<ProviderUserProviderDetails> providerUserDetails,
|
IEnumerable<ProviderUserProviderDetails> providerUserDetails,
|
||||||
@ -37,7 +39,13 @@ public class SyncResponseModel : ResponseModel
|
|||||||
Profile = new ProfileResponseModel(user, organizationUserDetails, providerUserDetails,
|
Profile = new ProfileResponseModel(user, organizationUserDetails, providerUserDetails,
|
||||||
providerUserOrganizationDetails, userTwoFactorEnabled, userHasPremiumFromOrganization, organizationIdsManagingUser);
|
providerUserOrganizationDetails, userTwoFactorEnabled, userHasPremiumFromOrganization, organizationIdsManagingUser);
|
||||||
Folders = folders.Select(f => new FolderResponseModel(f));
|
Folders = folders.Select(f => new FolderResponseModel(f));
|
||||||
Ciphers = ciphers.Select(c => new CipherDetailsResponseModel(c, globalSettings, collectionCiphersDict));
|
Ciphers = ciphers.Select(cipher =>
|
||||||
|
new CipherDetailsResponseModel(
|
||||||
|
cipher,
|
||||||
|
user,
|
||||||
|
organizationAbilities,
|
||||||
|
globalSettings,
|
||||||
|
collectionCiphersDict));
|
||||||
Collections = collections?.Select(
|
Collections = collections?.Select(
|
||||||
c => new CollectionDetailsResponseModel(c)) ?? new List<CollectionDetailsResponseModel>();
|
c => new CollectionDetailsResponseModel(c)) ?? new List<CollectionDetailsResponseModel>();
|
||||||
Domains = excludeDomains ? null : new DomainsResponseModel(user, false);
|
Domains = excludeDomains ? null : new DomainsResponseModel(user, false);
|
||||||
|
7
src/Billing/Constants/BitPayInvoiceStatus.cs
Normal file
7
src/Billing/Constants/BitPayInvoiceStatus.cs
Normal file
@ -0,0 +1,7 @@
|
|||||||
|
namespace Bit.Billing.Constants;
|
||||||
|
|
||||||
|
public static class BitPayInvoiceStatus
|
||||||
|
{
|
||||||
|
public const string Confirmed = "confirmed";
|
||||||
|
public const string Complete = "complete";
|
||||||
|
}
|
6
src/Billing/Constants/BitPayNotificationCode.cs
Normal file
6
src/Billing/Constants/BitPayNotificationCode.cs
Normal file
@ -0,0 +1,6 @@
|
|||||||
|
namespace Bit.Billing.Constants;
|
||||||
|
|
||||||
|
public static class BitPayNotificationCode
|
||||||
|
{
|
||||||
|
public const string InvoiceConfirmed = "invoice_confirmed";
|
||||||
|
}
|
@ -1,4 +1,5 @@
|
|||||||
using System.Globalization;
|
using System.Globalization;
|
||||||
|
using Bit.Billing.Constants;
|
||||||
using Bit.Billing.Models;
|
using Bit.Billing.Models;
|
||||||
using Bit.Core.AdminConsole.Repositories;
|
using Bit.Core.AdminConsole.Repositories;
|
||||||
using Bit.Core.Billing.Services;
|
using Bit.Core.Billing.Services;
|
||||||
@ -65,7 +66,7 @@ public class BitPayController : Controller
|
|||||||
return new BadRequestResult();
|
return new BadRequestResult();
|
||||||
}
|
}
|
||||||
|
|
||||||
if (model.Event.Name != "invoice_confirmed")
|
if (model.Event.Name != BitPayNotificationCode.InvoiceConfirmed)
|
||||||
{
|
{
|
||||||
// Only processing confirmed invoice events for now.
|
// Only processing confirmed invoice events for now.
|
||||||
return new OkResult();
|
return new OkResult();
|
||||||
@ -75,20 +76,20 @@ public class BitPayController : Controller
|
|||||||
if (invoice == null)
|
if (invoice == null)
|
||||||
{
|
{
|
||||||
// Request forged...?
|
// Request forged...?
|
||||||
_logger.LogWarning("Invoice not found. #" + model.Data.Id);
|
_logger.LogWarning("Invoice not found. #{InvoiceId}", model.Data.Id);
|
||||||
return new BadRequestResult();
|
return new BadRequestResult();
|
||||||
}
|
}
|
||||||
|
|
||||||
if (invoice.Status != "confirmed" && invoice.Status != "completed")
|
if (invoice.Status != BitPayInvoiceStatus.Confirmed && invoice.Status != BitPayInvoiceStatus.Complete)
|
||||||
{
|
{
|
||||||
_logger.LogWarning("Invoice status of '" + invoice.Status + "' is not acceptable. #" + invoice.Id);
|
_logger.LogWarning("Invoice status of '{InvoiceStatus}' is not acceptable. #{InvoiceId}", invoice.Status, invoice.Id);
|
||||||
return new BadRequestResult();
|
return new BadRequestResult();
|
||||||
}
|
}
|
||||||
|
|
||||||
if (invoice.Currency != "USD")
|
if (invoice.Currency != "USD")
|
||||||
{
|
{
|
||||||
// Only process USD payments
|
// Only process USD payments
|
||||||
_logger.LogWarning("Non USD payment received. #" + invoice.Id);
|
_logger.LogWarning("Non USD payment received. #{InvoiceId}", invoice.Id);
|
||||||
return new OkResult();
|
return new OkResult();
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -41,10 +41,15 @@ public class SubscriptionDeletedHandler : ISubscriptionDeletedHandler
|
|||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (organizationId.HasValue &&
|
if (organizationId.HasValue)
|
||||||
subscription.CancellationDetails.Comment != providerMigrationCancellationComment &&
|
|
||||||
!subscription.CancellationDetails.Comment.Contains(addedToProviderCancellationComment))
|
|
||||||
{
|
{
|
||||||
|
if (!string.IsNullOrEmpty(subscription.CancellationDetails?.Comment) &&
|
||||||
|
(subscription.CancellationDetails.Comment == providerMigrationCancellationComment ||
|
||||||
|
subscription.CancellationDetails.Comment.Contains(addedToProviderCancellationComment)))
|
||||||
|
{
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
await _organizationDisableCommand.DisableAsync(organizationId.Value, subscription.CurrentPeriodEnd);
|
await _organizationDisableCommand.DisableAsync(organizationId.Value, subscription.CurrentPeriodEnd);
|
||||||
}
|
}
|
||||||
else if (userId.HasValue)
|
else if (userId.HasValue)
|
||||||
|
@ -35,6 +35,7 @@ public class Provider : ITableObject<Guid>, ISubscriber
|
|||||||
public GatewayType? Gateway { get; set; }
|
public GatewayType? Gateway { get; set; }
|
||||||
public string? GatewayCustomerId { get; set; }
|
public string? GatewayCustomerId { get; set; }
|
||||||
public string? GatewaySubscriptionId { get; set; }
|
public string? GatewaySubscriptionId { get; set; }
|
||||||
|
public string? DiscountId { get; set; }
|
||||||
|
|
||||||
public string? BillingEmailAddress() => BillingEmail?.ToLowerInvariant().Trim();
|
public string? BillingEmailAddress() => BillingEmail?.ToLowerInvariant().Trim();
|
||||||
|
|
||||||
|
3
src/Core/AdminConsole/Errors/Error.cs
Normal file
3
src/Core/AdminConsole/Errors/Error.cs
Normal file
@ -0,0 +1,3 @@
|
|||||||
|
namespace Bit.Core.AdminConsole.Errors;
|
||||||
|
|
||||||
|
public record Error<T>(string Message, T ErroredValue);
|
11
src/Core/AdminConsole/Errors/InsufficientPermissionsError.cs
Normal file
11
src/Core/AdminConsole/Errors/InsufficientPermissionsError.cs
Normal file
@ -0,0 +1,11 @@
|
|||||||
|
namespace Bit.Core.AdminConsole.Errors;
|
||||||
|
|
||||||
|
public record InsufficientPermissionsError<T>(string Message, T ErroredValue) : Error<T>(Message, ErroredValue)
|
||||||
|
{
|
||||||
|
public const string Code = "Insufficient Permissions";
|
||||||
|
|
||||||
|
public InsufficientPermissionsError(T ErroredValue) : this(Code, ErroredValue)
|
||||||
|
{
|
||||||
|
|
||||||
|
}
|
||||||
|
}
|
11
src/Core/AdminConsole/Errors/RecordNotFoundError.cs
Normal file
11
src/Core/AdminConsole/Errors/RecordNotFoundError.cs
Normal file
@ -0,0 +1,11 @@
|
|||||||
|
namespace Bit.Core.AdminConsole.Errors;
|
||||||
|
|
||||||
|
public record RecordNotFoundError<T>(string Message, T ErroredValue) : Error<T>(Message, ErroredValue)
|
||||||
|
{
|
||||||
|
public const string Code = "Record Not Found";
|
||||||
|
|
||||||
|
public RecordNotFoundError(T ErroredValue) : this(Code, ErroredValue)
|
||||||
|
{
|
||||||
|
|
||||||
|
}
|
||||||
|
}
|
@ -117,7 +117,7 @@ public class UpdateOrganizationUserCommand : IUpdateOrganizationUserCommand
|
|||||||
throw new BadRequestException("Organization must have at least one confirmed owner.");
|
throw new BadRequestException("Organization must have at least one confirmed owner.");
|
||||||
}
|
}
|
||||||
|
|
||||||
if (collectionAccessList?.Count > 0)
|
if (collectionAccessList.Count > 0)
|
||||||
{
|
{
|
||||||
var invalidAssociations = collectionAccessList.Where(cas => cas.Manage && (cas.ReadOnly || cas.HidePasswords));
|
var invalidAssociations = collectionAccessList.Where(cas => cas.Manage && (cas.ReadOnly || cas.HidePasswords));
|
||||||
if (invalidAssociations.Any())
|
if (invalidAssociations.Any())
|
||||||
|
@ -8,21 +8,25 @@ namespace Bit.Core.AdminConsole.OrganizationFeatures.Policies.Implementations;
|
|||||||
|
|
||||||
public class PolicyRequirementQuery(
|
public class PolicyRequirementQuery(
|
||||||
IPolicyRepository policyRepository,
|
IPolicyRepository policyRepository,
|
||||||
IEnumerable<RequirementFactory<IPolicyRequirement>> factories)
|
IEnumerable<IPolicyRequirementFactory<IPolicyRequirement>> factories)
|
||||||
: IPolicyRequirementQuery
|
: IPolicyRequirementQuery
|
||||||
{
|
{
|
||||||
public async Task<T> GetAsync<T>(Guid userId) where T : IPolicyRequirement
|
public async Task<T> GetAsync<T>(Guid userId) where T : IPolicyRequirement
|
||||||
{
|
{
|
||||||
var factory = factories.OfType<RequirementFactory<T>>().SingleOrDefault();
|
var factory = factories.OfType<IPolicyRequirementFactory<T>>().SingleOrDefault();
|
||||||
if (factory is null)
|
if (factory is null)
|
||||||
{
|
{
|
||||||
throw new NotImplementedException("No Policy Requirement found for " + typeof(T));
|
throw new NotImplementedException("No Requirement Factory found for " + typeof(T));
|
||||||
}
|
}
|
||||||
|
|
||||||
return factory(await GetPolicyDetails(userId));
|
var policyDetails = await GetPolicyDetails(userId);
|
||||||
|
var filteredPolicies = policyDetails
|
||||||
|
.Where(p => p.PolicyType == factory.PolicyType)
|
||||||
|
.Where(factory.Enforce);
|
||||||
|
var requirement = factory.Create(filteredPolicies);
|
||||||
|
return requirement;
|
||||||
}
|
}
|
||||||
|
|
||||||
private Task<IEnumerable<PolicyDetails>> GetPolicyDetails(Guid userId) =>
|
private Task<IEnumerable<PolicyDetails>> GetPolicyDetails(Guid userId)
|
||||||
policyRepository.GetPolicyDetailsByUserId(userId);
|
=> policyRepository.GetPolicyDetailsByUserId(userId);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -0,0 +1,44 @@
|
|||||||
|
using Bit.Core.AdminConsole.Enums;
|
||||||
|
using Bit.Core.AdminConsole.Models.Data.Organizations.Policies;
|
||||||
|
using Bit.Core.Enums;
|
||||||
|
|
||||||
|
namespace Bit.Core.AdminConsole.OrganizationFeatures.Policies.PolicyRequirements;
|
||||||
|
|
||||||
|
/// <summary>
|
||||||
|
/// A simple base implementation of <see cref="IPolicyRequirementFactory{T}"/> which will be suitable for most policies.
|
||||||
|
/// It provides sensible defaults to help teams to implement their own Policy Requirements.
|
||||||
|
/// </summary>
|
||||||
|
/// <typeparam name="T"></typeparam>
|
||||||
|
public abstract class BasePolicyRequirementFactory<T> : IPolicyRequirementFactory<T> where T : IPolicyRequirement
|
||||||
|
{
|
||||||
|
/// <summary>
|
||||||
|
/// User roles that are exempt from policy enforcement.
|
||||||
|
/// Owners and Admins are exempt by default but this may be overridden.
|
||||||
|
/// </summary>
|
||||||
|
protected virtual IEnumerable<OrganizationUserType> ExemptRoles { get; } =
|
||||||
|
[OrganizationUserType.Owner, OrganizationUserType.Admin];
|
||||||
|
|
||||||
|
/// <summary>
|
||||||
|
/// User statuses that are exempt from policy enforcement.
|
||||||
|
/// Invited and Revoked users are exempt by default, which is appropriate in the majority of cases.
|
||||||
|
/// </summary>
|
||||||
|
protected virtual IEnumerable<OrganizationUserStatusType> ExemptStatuses { get; } =
|
||||||
|
[OrganizationUserStatusType.Invited, OrganizationUserStatusType.Revoked];
|
||||||
|
|
||||||
|
/// <summary>
|
||||||
|
/// Whether a Provider User for the organization is exempt from policy enforcement.
|
||||||
|
/// Provider Users are exempt by default, which is appropriate in the majority of cases.
|
||||||
|
/// </summary>
|
||||||
|
protected virtual bool ExemptProviders { get; } = true;
|
||||||
|
|
||||||
|
/// <inheritdoc />
|
||||||
|
public abstract PolicyType PolicyType { get; }
|
||||||
|
|
||||||
|
public bool Enforce(PolicyDetails policyDetails)
|
||||||
|
=> !policyDetails.HasRole(ExemptRoles) &&
|
||||||
|
!policyDetails.HasStatus(ExemptStatuses) &&
|
||||||
|
(!policyDetails.IsProvider || !ExemptProviders);
|
||||||
|
|
||||||
|
/// <inheritdoc />
|
||||||
|
public abstract T Create(IEnumerable<PolicyDetails> policyDetails);
|
||||||
|
}
|
@ -0,0 +1,27 @@
|
|||||||
|
using Bit.Core.AdminConsole.Enums;
|
||||||
|
using Bit.Core.AdminConsole.Models.Data.Organizations.Policies;
|
||||||
|
|
||||||
|
namespace Bit.Core.AdminConsole.OrganizationFeatures.Policies.PolicyRequirements;
|
||||||
|
|
||||||
|
/// <summary>
|
||||||
|
/// Policy requirements for the Disable Send policy.
|
||||||
|
/// </summary>
|
||||||
|
public class DisableSendPolicyRequirement : IPolicyRequirement
|
||||||
|
{
|
||||||
|
/// <summary>
|
||||||
|
/// Indicates whether Send is disabled for the user. If true, the user should not be able to create or edit Sends.
|
||||||
|
/// They may still delete existing Sends.
|
||||||
|
/// </summary>
|
||||||
|
public bool DisableSend { get; init; }
|
||||||
|
}
|
||||||
|
|
||||||
|
public class DisableSendPolicyRequirementFactory : BasePolicyRequirementFactory<DisableSendPolicyRequirement>
|
||||||
|
{
|
||||||
|
public override PolicyType PolicyType => PolicyType.DisableSend;
|
||||||
|
|
||||||
|
public override DisableSendPolicyRequirement Create(IEnumerable<PolicyDetails> policyDetails)
|
||||||
|
{
|
||||||
|
var result = new DisableSendPolicyRequirement { DisableSend = policyDetails.Any() };
|
||||||
|
return result;
|
||||||
|
}
|
||||||
|
}
|
@ -1,24 +1,11 @@
|
|||||||
#nullable enable
|
using Bit.Core.AdminConsole.Entities;
|
||||||
|
using Bit.Core.AdminConsole.Enums;
|
||||||
using Bit.Core.AdminConsole.Models.Data.Organizations.Policies;
|
|
||||||
|
|
||||||
namespace Bit.Core.AdminConsole.OrganizationFeatures.Policies.PolicyRequirements;
|
namespace Bit.Core.AdminConsole.OrganizationFeatures.Policies.PolicyRequirements;
|
||||||
|
|
||||||
/// <summary>
|
/// <summary>
|
||||||
/// Represents the business requirements of how one or more enterprise policies will be enforced against a user.
|
/// An object that represents how a <see cref="PolicyType"/> will be enforced against a user.
|
||||||
/// The implementation of this interface will depend on how the policies are enforced in the relevant domain.
|
/// This acts as a bridge between the <see cref="Policy"/> entity saved to the database and the domain that the policy
|
||||||
|
/// affects. You may represent the impact of the policy in any way that makes sense for the domain.
|
||||||
/// </summary>
|
/// </summary>
|
||||||
public interface IPolicyRequirement;
|
public interface IPolicyRequirement;
|
||||||
|
|
||||||
/// <summary>
|
|
||||||
/// A factory function that takes a sequence of <see cref="PolicyDetails"/> and transforms them into a single
|
|
||||||
/// <see cref="IPolicyRequirement"/> for consumption by the relevant domain. This will receive *all* policy types
|
|
||||||
/// that may be enforced against a user; when implementing this delegate, you must filter out irrelevant policy types
|
|
||||||
/// as well as policies that should not be enforced against a user (e.g. due to the user's role or status).
|
|
||||||
/// </summary>
|
|
||||||
/// <remarks>
|
|
||||||
/// See <see cref="PolicyRequirementHelpers"/> for extension methods to handle common requirements when implementing
|
|
||||||
/// this delegate.
|
|
||||||
/// </remarks>
|
|
||||||
public delegate T RequirementFactory<out T>(IEnumerable<PolicyDetails> policyDetails)
|
|
||||||
where T : IPolicyRequirement;
|
|
||||||
|
@ -0,0 +1,39 @@
|
|||||||
|
#nullable enable
|
||||||
|
|
||||||
|
using Bit.Core.AdminConsole.Enums;
|
||||||
|
using Bit.Core.AdminConsole.Models.Data.Organizations.Policies;
|
||||||
|
|
||||||
|
namespace Bit.Core.AdminConsole.OrganizationFeatures.Policies.PolicyRequirements;
|
||||||
|
|
||||||
|
/// <summary>
|
||||||
|
/// An interface that defines how to create a single <see cref="IPolicyRequirement"/> from a sequence of
|
||||||
|
/// <see cref="PolicyDetails"/>.
|
||||||
|
/// </summary>
|
||||||
|
/// <typeparam name="T">The <see cref="IPolicyRequirement"/> that the factory produces.</typeparam>
|
||||||
|
/// <remarks>
|
||||||
|
/// See <see cref="BasePolicyRequirementFactory{T}"/> for a simple base implementation suitable for most policies.
|
||||||
|
/// </remarks>
|
||||||
|
public interface IPolicyRequirementFactory<out T> where T : IPolicyRequirement
|
||||||
|
{
|
||||||
|
/// <summary>
|
||||||
|
/// The <see cref="PolicyType"/> that the requirement relates to.
|
||||||
|
/// </summary>
|
||||||
|
PolicyType PolicyType { get; }
|
||||||
|
|
||||||
|
/// <summary>
|
||||||
|
/// A predicate that determines whether a policy should be enforced against the user.
|
||||||
|
/// </summary>
|
||||||
|
/// <remarks>Use this to exempt users based on their role, status or other attributes.</remarks>
|
||||||
|
/// <param name="policyDetails">Policy details for the defined PolicyType.</param>
|
||||||
|
/// <returns>True if the policy should be enforced against the user, false otherwise.</returns>
|
||||||
|
bool Enforce(PolicyDetails policyDetails);
|
||||||
|
|
||||||
|
/// <summary>
|
||||||
|
/// A reducer method that creates a single <see cref="IPolicyRequirement"/> from a set of PolicyDetails.
|
||||||
|
/// </summary>
|
||||||
|
/// <param name="policyDetails">
|
||||||
|
/// PolicyDetails for the specified PolicyType, after they have been filtered by the Enforce predicate. That is,
|
||||||
|
/// this is the final interface to be called.
|
||||||
|
/// </param>
|
||||||
|
T Create(IEnumerable<PolicyDetails> policyDetails);
|
||||||
|
}
|
@ -1,5 +1,4 @@
|
|||||||
using Bit.Core.AdminConsole.Enums;
|
using Bit.Core.AdminConsole.Models.Data.Organizations.Policies;
|
||||||
using Bit.Core.AdminConsole.Models.Data.Organizations.Policies;
|
|
||||||
using Bit.Core.Enums;
|
using Bit.Core.Enums;
|
||||||
|
|
||||||
namespace Bit.Core.AdminConsole.OrganizationFeatures.Policies.PolicyRequirements;
|
namespace Bit.Core.AdminConsole.OrganizationFeatures.Policies.PolicyRequirements;
|
||||||
@ -7,35 +6,16 @@ namespace Bit.Core.AdminConsole.OrganizationFeatures.Policies.PolicyRequirements
|
|||||||
public static class PolicyRequirementHelpers
|
public static class PolicyRequirementHelpers
|
||||||
{
|
{
|
||||||
/// <summary>
|
/// <summary>
|
||||||
/// Filters the PolicyDetails by PolicyType. This is generally required to only get the PolicyDetails that your
|
/// Returns true if the <see cref="PolicyDetails"/> is for one of the specified roles, false otherwise.
|
||||||
/// IPolicyRequirement relates to.
|
|
||||||
/// </summary>
|
/// </summary>
|
||||||
public static IEnumerable<PolicyDetails> GetPolicyType(
|
public static bool HasRole(
|
||||||
this IEnumerable<PolicyDetails> policyDetails,
|
this PolicyDetails policyDetails,
|
||||||
PolicyType type)
|
|
||||||
=> policyDetails.Where(x => x.PolicyType == type);
|
|
||||||
|
|
||||||
/// <summary>
|
|
||||||
/// Filters the PolicyDetails to remove the specified user roles. This can be used to exempt
|
|
||||||
/// owners and admins from policy enforcement.
|
|
||||||
/// </summary>
|
|
||||||
public static IEnumerable<PolicyDetails> ExemptRoles(
|
|
||||||
this IEnumerable<PolicyDetails> policyDetails,
|
|
||||||
IEnumerable<OrganizationUserType> roles)
|
IEnumerable<OrganizationUserType> roles)
|
||||||
=> policyDetails.Where(x => !roles.Contains(x.OrganizationUserType));
|
=> roles.Contains(policyDetails.OrganizationUserType);
|
||||||
|
|
||||||
/// <summary>
|
/// <summary>
|
||||||
/// Filters the PolicyDetails to remove organization users who are also provider users for the organization.
|
/// Returns true if the <see cref="PolicyDetails"/> relates to one of the specified statuses, false otherwise.
|
||||||
/// This can be used to exempt provider users from policy enforcement.
|
|
||||||
/// </summary>
|
/// </summary>
|
||||||
public static IEnumerable<PolicyDetails> ExemptProviders(this IEnumerable<PolicyDetails> policyDetails)
|
public static bool HasStatus(this PolicyDetails policyDetails, IEnumerable<OrganizationUserStatusType> status)
|
||||||
=> policyDetails.Where(x => !x.IsProvider);
|
=> status.Contains(policyDetails.OrganizationUserStatus);
|
||||||
|
|
||||||
/// <summary>
|
|
||||||
/// Filters the PolicyDetails to remove the specified organization user statuses. For example, this can be used
|
|
||||||
/// to exempt users in the invited and revoked statuses from policy enforcement.
|
|
||||||
/// </summary>
|
|
||||||
public static IEnumerable<PolicyDetails> ExemptStatus(
|
|
||||||
this IEnumerable<PolicyDetails> policyDetails, IEnumerable<OrganizationUserStatusType> status)
|
|
||||||
=> policyDetails.Where(x => !status.Contains(x.OrganizationUserStatus));
|
|
||||||
}
|
}
|
||||||
|
@ -0,0 +1,34 @@
|
|||||||
|
using Bit.Core.AdminConsole.Enums;
|
||||||
|
using Bit.Core.AdminConsole.Models.Data.Organizations.Policies;
|
||||||
|
|
||||||
|
namespace Bit.Core.AdminConsole.OrganizationFeatures.Policies.PolicyRequirements;
|
||||||
|
|
||||||
|
/// <summary>
|
||||||
|
/// Policy requirements for the Send Options policy.
|
||||||
|
/// </summary>
|
||||||
|
public class SendOptionsPolicyRequirement : IPolicyRequirement
|
||||||
|
{
|
||||||
|
/// <summary>
|
||||||
|
/// Indicates whether the user is prohibited from hiding their email from the recipient of a Send.
|
||||||
|
/// </summary>
|
||||||
|
public bool DisableHideEmail { get; init; }
|
||||||
|
}
|
||||||
|
|
||||||
|
public class SendOptionsPolicyRequirementFactory : BasePolicyRequirementFactory<SendOptionsPolicyRequirement>
|
||||||
|
{
|
||||||
|
public override PolicyType PolicyType => PolicyType.SendOptions;
|
||||||
|
|
||||||
|
public override SendOptionsPolicyRequirement Create(IEnumerable<PolicyDetails> policyDetails)
|
||||||
|
{
|
||||||
|
var result = policyDetails
|
||||||
|
.Select(p => p.GetDataModel<SendOptionsPolicyData>())
|
||||||
|
.Aggregate(
|
||||||
|
new SendOptionsPolicyRequirement(),
|
||||||
|
(result, data) => new SendOptionsPolicyRequirement
|
||||||
|
{
|
||||||
|
DisableHideEmail = result.DisableHideEmail || data.DisableHideEmail
|
||||||
|
});
|
||||||
|
|
||||||
|
return result;
|
||||||
|
}
|
||||||
|
}
|
@ -1,54 +0,0 @@
|
|||||||
using Bit.Core.AdminConsole.Enums;
|
|
||||||
using Bit.Core.AdminConsole.Models.Data.Organizations.Policies;
|
|
||||||
using Bit.Core.Enums;
|
|
||||||
|
|
||||||
namespace Bit.Core.AdminConsole.OrganizationFeatures.Policies.PolicyRequirements;
|
|
||||||
|
|
||||||
/// <summary>
|
|
||||||
/// Policy requirements for the Disable Send and Send Options policies.
|
|
||||||
/// </summary>
|
|
||||||
public class SendPolicyRequirement : IPolicyRequirement
|
|
||||||
{
|
|
||||||
/// <summary>
|
|
||||||
/// Indicates whether Send is disabled for the user. If true, the user should not be able to create or edit Sends.
|
|
||||||
/// They may still delete existing Sends.
|
|
||||||
/// </summary>
|
|
||||||
public bool DisableSend { get; init; }
|
|
||||||
/// <summary>
|
|
||||||
/// Indicates whether the user is prohibited from hiding their email from the recipient of a Send.
|
|
||||||
/// </summary>
|
|
||||||
public bool DisableHideEmail { get; init; }
|
|
||||||
|
|
||||||
/// <summary>
|
|
||||||
/// Create a new SendPolicyRequirement.
|
|
||||||
/// </summary>
|
|
||||||
/// <param name="policyDetails">All PolicyDetails relating to the user.</param>
|
|
||||||
/// <remarks>
|
|
||||||
/// This is a <see cref="RequirementFactory{T}"/> for the SendPolicyRequirement.
|
|
||||||
/// </remarks>
|
|
||||||
public static SendPolicyRequirement Create(IEnumerable<PolicyDetails> policyDetails)
|
|
||||||
{
|
|
||||||
var filteredPolicies = policyDetails
|
|
||||||
.ExemptRoles([OrganizationUserType.Owner, OrganizationUserType.Admin])
|
|
||||||
.ExemptStatus([OrganizationUserStatusType.Invited, OrganizationUserStatusType.Revoked])
|
|
||||||
.ExemptProviders()
|
|
||||||
.ToList();
|
|
||||||
|
|
||||||
var result = filteredPolicies
|
|
||||||
.GetPolicyType(PolicyType.SendOptions)
|
|
||||||
.Select(p => p.GetDataModel<SendOptionsPolicyData>())
|
|
||||||
.Aggregate(
|
|
||||||
new SendPolicyRequirement
|
|
||||||
{
|
|
||||||
// Set Disable Send requirement in the initial seed
|
|
||||||
DisableSend = filteredPolicies.GetPolicyType(PolicyType.DisableSend).Any()
|
|
||||||
},
|
|
||||||
(result, data) => new SendPolicyRequirement
|
|
||||||
{
|
|
||||||
DisableSend = result.DisableSend,
|
|
||||||
DisableHideEmail = result.DisableHideEmail || data.DisableHideEmail
|
|
||||||
});
|
|
||||||
|
|
||||||
return result;
|
|
||||||
}
|
|
||||||
}
|
|
@ -31,32 +31,7 @@ public static class PolicyServiceCollectionExtensions
|
|||||||
|
|
||||||
private static void AddPolicyRequirements(this IServiceCollection services)
|
private static void AddPolicyRequirements(this IServiceCollection services)
|
||||||
{
|
{
|
||||||
// Register policy requirement factories here
|
services.AddScoped<IPolicyRequirementFactory<IPolicyRequirement>, DisableSendPolicyRequirementFactory>();
|
||||||
services.AddPolicyRequirement(SendPolicyRequirement.Create);
|
services.AddScoped<IPolicyRequirementFactory<IPolicyRequirement>, SendOptionsPolicyRequirementFactory>();
|
||||||
}
|
}
|
||||||
|
|
||||||
/// <summary>
|
|
||||||
/// Used to register simple policy requirements where its factory method implements CreateRequirement.
|
|
||||||
/// This MUST be used rather than calling AddScoped directly, because it will ensure the factory method has
|
|
||||||
/// the correct type to be injected and then identified by <see cref="PolicyRequirementQuery"/> at runtime.
|
|
||||||
/// </summary>
|
|
||||||
/// <typeparam name="T">The specific PolicyRequirement being registered.</typeparam>
|
|
||||||
private static void AddPolicyRequirement<T>(this IServiceCollection serviceCollection, RequirementFactory<T> factory)
|
|
||||||
where T : class, IPolicyRequirement
|
|
||||||
=> serviceCollection.AddPolicyRequirement(_ => factory);
|
|
||||||
|
|
||||||
/// <summary>
|
|
||||||
/// Used to register policy requirements where you need to access additional dependencies (usually to return a
|
|
||||||
/// curried factory method).
|
|
||||||
/// This MUST be used rather than calling AddScoped directly, because it will ensure the factory method has
|
|
||||||
/// the correct type to be injected and then identified by <see cref="PolicyRequirementQuery"/> at runtime.
|
|
||||||
/// </summary>
|
|
||||||
/// <typeparam name="T">
|
|
||||||
/// A callback that takes IServiceProvider and returns a RequirementFactory for
|
|
||||||
/// your policy requirement.
|
|
||||||
/// </typeparam>
|
|
||||||
private static void AddPolicyRequirement<T>(this IServiceCollection serviceCollection,
|
|
||||||
Func<IServiceProvider, RequirementFactory<T>> factory)
|
|
||||||
where T : class, IPolicyRequirement
|
|
||||||
=> serviceCollection.AddScoped<RequirementFactory<IPolicyRequirement>>(factory);
|
|
||||||
}
|
}
|
||||||
|
6
src/Core/AdminConsole/Shared/Validation/IValidator.cs
Normal file
6
src/Core/AdminConsole/Shared/Validation/IValidator.cs
Normal file
@ -0,0 +1,6 @@
|
|||||||
|
namespace Bit.Core.AdminConsole.Shared.Validation;
|
||||||
|
|
||||||
|
public interface IValidator<T>
|
||||||
|
{
|
||||||
|
public Task<ValidationResult<T>> ValidateAsync(T value);
|
||||||
|
}
|
15
src/Core/AdminConsole/Shared/Validation/ValidationResult.cs
Normal file
15
src/Core/AdminConsole/Shared/Validation/ValidationResult.cs
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
using Bit.Core.AdminConsole.Errors;
|
||||||
|
|
||||||
|
namespace Bit.Core.AdminConsole.Shared.Validation;
|
||||||
|
|
||||||
|
public abstract record ValidationResult<T>;
|
||||||
|
|
||||||
|
public record Valid<T> : ValidationResult<T>
|
||||||
|
{
|
||||||
|
public T Value { get; init; }
|
||||||
|
}
|
||||||
|
|
||||||
|
public record Invalid<T> : ValidationResult<T>
|
||||||
|
{
|
||||||
|
public IEnumerable<Error<T>> Errors { get; init; }
|
||||||
|
}
|
@ -16,6 +16,12 @@ public class AuthRequest : ITableObject<Guid>
|
|||||||
public DeviceType RequestDeviceType { get; set; }
|
public DeviceType RequestDeviceType { get; set; }
|
||||||
[MaxLength(50)]
|
[MaxLength(50)]
|
||||||
public string RequestIpAddress { get; set; }
|
public string RequestIpAddress { get; set; }
|
||||||
|
/// <summary>
|
||||||
|
/// This country name is populated through a header value fetched from the ISO-3166 country code.
|
||||||
|
/// It will always be the English short form of the country name. The length should never be over 200 characters.
|
||||||
|
/// </summary>
|
||||||
|
[MaxLength(200)]
|
||||||
|
public string RequestCountryName { get; set; }
|
||||||
public Guid? ResponseDeviceId { get; set; }
|
public Guid? ResponseDeviceId { get; set; }
|
||||||
[MaxLength(25)]
|
[MaxLength(25)]
|
||||||
public string AccessCode { get; set; }
|
public string AccessCode { get; set; }
|
||||||
|
@ -164,6 +164,7 @@ public class AuthRequestService : IAuthRequestService
|
|||||||
RequestDeviceIdentifier = model.DeviceIdentifier,
|
RequestDeviceIdentifier = model.DeviceIdentifier,
|
||||||
RequestDeviceType = _currentContext.DeviceType.Value,
|
RequestDeviceType = _currentContext.DeviceType.Value,
|
||||||
RequestIpAddress = _currentContext.IpAddress,
|
RequestIpAddress = _currentContext.IpAddress,
|
||||||
|
RequestCountryName = _currentContext.CountryName,
|
||||||
AccessCode = model.AccessCode,
|
AccessCode = model.AccessCode,
|
||||||
PublicKey = model.PublicKey,
|
PublicKey = model.PublicKey,
|
||||||
UserId = user.Id,
|
UserId = user.Id,
|
||||||
@ -176,12 +177,7 @@ public class AuthRequestService : IAuthRequestService
|
|||||||
|
|
||||||
public async Task<AuthRequest> UpdateAuthRequestAsync(Guid authRequestId, Guid currentUserId, AuthRequestUpdateRequestModel model)
|
public async Task<AuthRequest> UpdateAuthRequestAsync(Guid authRequestId, Guid currentUserId, AuthRequestUpdateRequestModel model)
|
||||||
{
|
{
|
||||||
var authRequest = await _authRequestRepository.GetByIdAsync(authRequestId);
|
var authRequest = await _authRequestRepository.GetByIdAsync(authRequestId) ?? throw new NotFoundException();
|
||||||
|
|
||||||
if (authRequest == null)
|
|
||||||
{
|
|
||||||
throw new NotFoundException();
|
|
||||||
}
|
|
||||||
|
|
||||||
// Once Approval/Disapproval has been set, this AuthRequest should not be updated again.
|
// Once Approval/Disapproval has been set, this AuthRequest should not be updated again.
|
||||||
if (authRequest.Approved is not null)
|
if (authRequest.Approved is not null)
|
||||||
|
@ -18,8 +18,15 @@ public static class StripeConstants
|
|||||||
|
|
||||||
public static class CouponIDs
|
public static class CouponIDs
|
||||||
{
|
{
|
||||||
public const string MSPDiscount35 = "msp-discount-35";
|
public const string LegacyMSPDiscount = "msp-discount-35";
|
||||||
public const string SecretsManagerStandalone = "sm-standalone";
|
public const string SecretsManagerStandalone = "sm-standalone";
|
||||||
|
|
||||||
|
public static class MSPDiscounts
|
||||||
|
{
|
||||||
|
public const string Open = "msp-open-discount";
|
||||||
|
public const string Silver = "msp-silver-discount";
|
||||||
|
public const string Gold = "msp-gold-discount";
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
public static class ErrorCodes
|
public static class ErrorCodes
|
||||||
|
@ -22,4 +22,9 @@ public static class CustomerExtensions
|
|||||||
/// <returns></returns>
|
/// <returns></returns>
|
||||||
public static bool HasTaxLocationVerified(this Customer customer) =>
|
public static bool HasTaxLocationVerified(this Customer customer) =>
|
||||||
customer?.Tax?.AutomaticTax == StripeConstants.AutomaticTaxStatus.Supported;
|
customer?.Tax?.AutomaticTax == StripeConstants.AutomaticTaxStatus.Supported;
|
||||||
|
|
||||||
|
public static decimal GetBillingBalance(this Customer customer)
|
||||||
|
{
|
||||||
|
return customer != null ? customer.Balance / 100M : default;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
26
src/Core/Billing/Extensions/SubscriberExtensions.cs
Normal file
26
src/Core/Billing/Extensions/SubscriberExtensions.cs
Normal file
@ -0,0 +1,26 @@
|
|||||||
|
using Bit.Core.Entities;
|
||||||
|
|
||||||
|
namespace Bit.Core.Billing.Extensions;
|
||||||
|
|
||||||
|
public static class SubscriberExtensions
|
||||||
|
{
|
||||||
|
/// <summary>
|
||||||
|
/// We are taking only first 30 characters of the SubscriberName because stripe provide for 30 characters for
|
||||||
|
/// custom_fields,see the link: https://stripe.com/docs/api/invoices/create
|
||||||
|
/// </summary>
|
||||||
|
/// <param name="subscriber"></param>
|
||||||
|
/// <returns></returns>
|
||||||
|
public static string GetFormattedInvoiceName(this ISubscriber subscriber)
|
||||||
|
{
|
||||||
|
var subscriberName = subscriber.SubscriberName();
|
||||||
|
|
||||||
|
if (string.IsNullOrWhiteSpace(subscriberName))
|
||||||
|
{
|
||||||
|
return string.Empty;
|
||||||
|
}
|
||||||
|
|
||||||
|
return subscriberName.Length <= 30
|
||||||
|
? subscriberName
|
||||||
|
: subscriberName[..30];
|
||||||
|
}
|
||||||
|
}
|
@ -254,7 +254,7 @@ public class ProviderMigrator(
|
|||||||
|
|
||||||
await stripeAdapter.CustomerUpdateAsync(customer.Id, new CustomerUpdateOptions
|
await stripeAdapter.CustomerUpdateAsync(customer.Id, new CustomerUpdateOptions
|
||||||
{
|
{
|
||||||
Coupon = StripeConstants.CouponIDs.MSPDiscount35
|
Coupon = StripeConstants.CouponIDs.LegacyMSPDiscount
|
||||||
});
|
});
|
||||||
|
|
||||||
provider.GatewayCustomerId = customer.Id;
|
provider.GatewayCustomerId = customer.Id;
|
||||||
|
@ -46,7 +46,8 @@ public class OrganizationSale
|
|||||||
var customerSetup = new CustomerSetup
|
var customerSetup = new CustomerSetup
|
||||||
{
|
{
|
||||||
Coupon = signup.IsFromProvider
|
Coupon = signup.IsFromProvider
|
||||||
? StripeConstants.CouponIDs.MSPDiscount35
|
// TODO: Remove when last of the legacy providers has been migrated.
|
||||||
|
? StripeConstants.CouponIDs.LegacyMSPDiscount
|
||||||
: signup.IsFromSecretsManagerTrial
|
: signup.IsFromSecretsManagerTrial
|
||||||
? StripeConstants.CouponIDs.SecretsManagerStandalone
|
? StripeConstants.CouponIDs.SecretsManagerStandalone
|
||||||
: null
|
: null
|
||||||
|
@ -95,5 +95,16 @@ public interface IProviderBillingService
|
|||||||
Task<Subscription> SetupSubscription(
|
Task<Subscription> SetupSubscription(
|
||||||
Provider provider);
|
Provider provider);
|
||||||
|
|
||||||
|
/// <summary>
|
||||||
|
/// Updates the <paramref name="provider"/>'s payment source and tax information and then sets their subscription's collection_method to be "charge_automatically".
|
||||||
|
/// </summary>
|
||||||
|
/// <param name="provider">The <paramref name="provider"/> to update the payment source and tax information for.</param>
|
||||||
|
/// <param name="tokenizedPaymentSource">The tokenized payment source (ex. Credit Card) to attach to the <paramref name="provider"/>.</param>
|
||||||
|
/// <param name="taxInformation">The <paramref name="provider"/>'s updated tax information.</param>
|
||||||
|
Task UpdatePaymentMethod(
|
||||||
|
Provider provider,
|
||||||
|
TokenizedPaymentSource tokenizedPaymentSource,
|
||||||
|
TaxInformation taxInformation);
|
||||||
|
|
||||||
Task UpdateSeatMinimums(UpdateProviderSeatMinimumsCommand command);
|
Task UpdateSeatMinimums(UpdateProviderSeatMinimumsCommand command);
|
||||||
}
|
}
|
||||||
|
@ -102,7 +102,6 @@ public static class AuthenticationSchemes
|
|||||||
public static class FeatureFlagKeys
|
public static class FeatureFlagKeys
|
||||||
{
|
{
|
||||||
/* Admin Console Team */
|
/* Admin Console Team */
|
||||||
public const string ProviderClientVaultPrivacyBanner = "ac-2833-provider-client-vault-privacy-banner";
|
|
||||||
public const string AccountDeprovisioning = "pm-10308-account-deprovisioning";
|
public const string AccountDeprovisioning = "pm-10308-account-deprovisioning";
|
||||||
public const string VerifiedSsoDomainEndpoint = "pm-12337-refactor-sso-details-endpoint";
|
public const string VerifiedSsoDomainEndpoint = "pm-12337-refactor-sso-details-endpoint";
|
||||||
public const string DeviceApprovalRequestAdminNotifications = "pm-15637-device-approval-request-admin-notifications";
|
public const string DeviceApprovalRequestAdminNotifications = "pm-15637-device-approval-request-admin-notifications";
|
||||||
@ -115,18 +114,24 @@ public static class FeatureFlagKeys
|
|||||||
public const string ItemShare = "item-share";
|
public const string ItemShare = "item-share";
|
||||||
public const string RiskInsightsCriticalApplication = "pm-14466-risk-insights-critical-application";
|
public const string RiskInsightsCriticalApplication = "pm-14466-risk-insights-critical-application";
|
||||||
public const string EnableRiskInsightsNotifications = "enable-risk-insights-notifications";
|
public const string EnableRiskInsightsNotifications = "enable-risk-insights-notifications";
|
||||||
|
public const string DesktopSendUIRefresh = "desktop-send-ui-refresh";
|
||||||
|
public const string ExportAttachments = "export-attachments";
|
||||||
|
|
||||||
|
/* Vault Team */
|
||||||
|
public const string PM9111ExtensionPersistAddEditForm = "pm-9111-extension-persist-add-edit-form";
|
||||||
|
public const string NewDeviceVerificationPermanentDismiss = "new-device-permanent-dismiss";
|
||||||
|
public const string NewDeviceVerificationTemporaryDismiss = "new-device-temporary-dismiss";
|
||||||
|
public const string VaultBulkManagementAction = "vault-bulk-management-action";
|
||||||
|
public const string RestrictProviderAccess = "restrict-provider-access";
|
||||||
|
public const string SecurityTasks = "security-tasks";
|
||||||
|
|
||||||
public const string ReturnErrorOnExistingKeypair = "return-error-on-existing-keypair";
|
public const string ReturnErrorOnExistingKeypair = "return-error-on-existing-keypair";
|
||||||
public const string UseTreeWalkerApiForPageDetailsCollection = "use-tree-walker-api-for-page-details-collection";
|
public const string UseTreeWalkerApiForPageDetailsCollection = "use-tree-walker-api-for-page-details-collection";
|
||||||
public const string DuoRedirect = "duo-redirect";
|
public const string DuoRedirect = "duo-redirect";
|
||||||
public const string AC2101UpdateTrialInitiationEmail = "AC-2101-update-trial-initiation-email";
|
public const string AC2101UpdateTrialInitiationEmail = "AC-2101-update-trial-initiation-email";
|
||||||
public const string AC1795_UpdatedSubscriptionStatusSection = "AC-1795_updated-subscription-status-section";
|
|
||||||
public const string EmailVerification = "email-verification";
|
public const string EmailVerification = "email-verification";
|
||||||
public const string EmailVerificationDisableTimingDelays = "email-verification-disable-timing-delays";
|
public const string EmailVerificationDisableTimingDelays = "email-verification-disable-timing-delays";
|
||||||
public const string ExtensionRefresh = "extension-refresh";
|
|
||||||
public const string RestrictProviderAccess = "restrict-provider-access";
|
|
||||||
public const string PM4154BulkEncryptionService = "PM-4154-bulk-encryption-service";
|
public const string PM4154BulkEncryptionService = "PM-4154-bulk-encryption-service";
|
||||||
public const string VaultBulkManagementAction = "vault-bulk-management-action";
|
|
||||||
public const string InlineMenuFieldQualification = "inline-menu-field-qualification";
|
public const string InlineMenuFieldQualification = "inline-menu-field-qualification";
|
||||||
public const string InlineMenuPositioningImprovements = "inline-menu-positioning-improvements";
|
public const string InlineMenuPositioningImprovements = "inline-menu-positioning-improvements";
|
||||||
public const string DeviceTrustLogging = "pm-8285-device-trust-logging";
|
public const string DeviceTrustLogging = "pm-8285-device-trust-logging";
|
||||||
@ -151,13 +156,8 @@ public static class FeatureFlagKeys
|
|||||||
public const string RemoveServerVersionHeader = "remove-server-version-header";
|
public const string RemoveServerVersionHeader = "remove-server-version-header";
|
||||||
public const string GeneratorToolsModernization = "generator-tools-modernization";
|
public const string GeneratorToolsModernization = "generator-tools-modernization";
|
||||||
public const string NewDeviceVerification = "new-device-verification";
|
public const string NewDeviceVerification = "new-device-verification";
|
||||||
public const string NewDeviceVerificationTemporaryDismiss = "new-device-temporary-dismiss";
|
|
||||||
public const string NewDeviceVerificationPermanentDismiss = "new-device-permanent-dismiss";
|
|
||||||
public const string SecurityTasks = "security-tasks";
|
|
||||||
public const string MacOsNativeCredentialSync = "macos-native-credential-sync";
|
public const string MacOsNativeCredentialSync = "macos-native-credential-sync";
|
||||||
public const string PM9111ExtensionPersistAddEditForm = "pm-9111-extension-persist-add-edit-form";
|
|
||||||
public const string InlineMenuTotp = "inline-menu-totp";
|
public const string InlineMenuTotp = "inline-menu-totp";
|
||||||
public const string SelfHostLicenseRefactor = "pm-11516-self-host-license-refactor";
|
|
||||||
public const string PrivateKeyRegeneration = "pm-12241-private-key-regeneration";
|
public const string PrivateKeyRegeneration = "pm-12241-private-key-regeneration";
|
||||||
public const string AppReviewPrompt = "app-review-prompt";
|
public const string AppReviewPrompt = "app-review-prompt";
|
||||||
public const string ResellerManagedOrgAlert = "PM-15814-alert-owners-of-reseller-managed-orgs";
|
public const string ResellerManagedOrgAlert = "PM-15814-alert-owners-of-reseller-managed-orgs";
|
||||||
@ -175,6 +175,8 @@ public static class FeatureFlagKeys
|
|||||||
public const string WebPush = "web-push";
|
public const string WebPush = "web-push";
|
||||||
public const string AndroidImportLoginsFlow = "import-logins-flow";
|
public const string AndroidImportLoginsFlow = "import-logins-flow";
|
||||||
public const string PM12276Breadcrumbing = "pm-12276-breadcrumbing-for-business-features";
|
public const string PM12276Breadcrumbing = "pm-12276-breadcrumbing-for-business-features";
|
||||||
|
public const string PM18794_ProviderPaymentMethod = "pm-18794-provider-payment-method";
|
||||||
|
public const string PM3553_MobileSimpleLoginSelfHostAlias = "simple-login-self-host-alias";
|
||||||
|
|
||||||
public static List<string> GetAllKeys()
|
public static List<string> GetAllKeys()
|
||||||
{
|
{
|
||||||
|
@ -30,6 +30,7 @@ public class CurrentContext : ICurrentContext
|
|||||||
public virtual string DeviceIdentifier { get; set; }
|
public virtual string DeviceIdentifier { get; set; }
|
||||||
public virtual DeviceType? DeviceType { get; set; }
|
public virtual DeviceType? DeviceType { get; set; }
|
||||||
public virtual string IpAddress { get; set; }
|
public virtual string IpAddress { get; set; }
|
||||||
|
public virtual string CountryName { get; set; }
|
||||||
public virtual List<CurrentContextOrganization> Organizations { get; set; }
|
public virtual List<CurrentContextOrganization> Organizations { get; set; }
|
||||||
public virtual List<CurrentContextProvider> Providers { get; set; }
|
public virtual List<CurrentContextProvider> Providers { get; set; }
|
||||||
public virtual Guid? InstallationId { get; set; }
|
public virtual Guid? InstallationId { get; set; }
|
||||||
@ -104,6 +105,12 @@ public class CurrentContext : ICurrentContext
|
|||||||
{
|
{
|
||||||
ClientVersionIsPrerelease = clientVersionIsPrerelease == "1";
|
ClientVersionIsPrerelease = clientVersionIsPrerelease == "1";
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if (httpContext.Request.Headers.TryGetValue("country-name", out var countryName))
|
||||||
|
{
|
||||||
|
CountryName = countryName;
|
||||||
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
public async virtual Task BuildAsync(ClaimsPrincipal user, GlobalSettings globalSettings)
|
public async virtual Task BuildAsync(ClaimsPrincipal user, GlobalSettings globalSettings)
|
||||||
|
@ -20,6 +20,7 @@ public interface ICurrentContext
|
|||||||
string DeviceIdentifier { get; set; }
|
string DeviceIdentifier { get; set; }
|
||||||
DeviceType? DeviceType { get; set; }
|
DeviceType? DeviceType { get; set; }
|
||||||
string IpAddress { get; set; }
|
string IpAddress { get; set; }
|
||||||
|
string CountryName { get; set; }
|
||||||
List<CurrentContextOrganization> Organizations { get; set; }
|
List<CurrentContextOrganization> Organizations { get; set; }
|
||||||
Guid? InstallationId { get; set; }
|
Guid? InstallationId { get; set; }
|
||||||
Guid? OrganizationId { get; set; }
|
Guid? OrganizationId { get; set; }
|
||||||
|
@ -36,7 +36,7 @@
|
|||||||
<PackageReference Include="DnsClient" Version="1.8.0" />
|
<PackageReference Include="DnsClient" Version="1.8.0" />
|
||||||
<PackageReference Include="Fido2.AspNet" Version="3.0.1" />
|
<PackageReference Include="Fido2.AspNet" Version="3.0.1" />
|
||||||
<PackageReference Include="Handlebars.Net" Version="2.1.6" />
|
<PackageReference Include="Handlebars.Net" Version="2.1.6" />
|
||||||
<PackageReference Include="MailKit" Version="4.10.0" />
|
<PackageReference Include="MailKit" Version="4.11.0" />
|
||||||
<PackageReference Include="Microsoft.AspNetCore.Authentication.JwtBearer" Version="8.0.10" />
|
<PackageReference Include="Microsoft.AspNetCore.Authentication.JwtBearer" Version="8.0.10" />
|
||||||
<PackageReference Include="Microsoft.Azure.Cosmos" Version="3.46.1" />
|
<PackageReference Include="Microsoft.Azure.Cosmos" Version="3.46.1" />
|
||||||
<PackageReference Include="Microsoft.Azure.NotificationHubs" Version="4.2.0" />
|
<PackageReference Include="Microsoft.Azure.NotificationHubs" Version="4.2.0" />
|
||||||
|
@ -7,7 +7,7 @@
|
|||||||
</tr>
|
</tr>
|
||||||
<tr style="margin: 0; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; box-sizing: border-box; font-size: 16px; color: #333; line-height: 25px; -webkit-font-smoothing: antialiased; -webkit-text-size-adjust: none;">
|
<tr style="margin: 0; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; box-sizing: border-box; font-size: 16px; color: #333; line-height: 25px; -webkit-font-smoothing: antialiased; -webkit-text-size-adjust: none;">
|
||||||
<td class="content-block" style="font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; box-sizing: border-box; font-size: 16px; color: #333; line-height: 25px; margin: 0; -webkit-font-smoothing: antialiased; padding: 0 0 10px; -webkit-text-size-adjust: none;" valign="top" align="left">
|
<td class="content-block" style="font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; box-sizing: border-box; font-size: 16px; color: #333; line-height: 25px; margin: 0; -webkit-font-smoothing: antialiased; padding: 0 0 10px; -webkit-text-size-adjust: none;" valign="top" align="left">
|
||||||
To leave an organization, first log into the <a href="https://vault.bitwarden.com/#/login">web app</a>, select the three dot menu next to the organization name, and select Leave.
|
To leave an organization, first log into the <a href="{{{WebVaultUrl}}}/login">web app</a>, select the three dot menu next to the organization name, and select Leave.
|
||||||
</td>
|
</td>
|
||||||
</tr>
|
</tr>
|
||||||
</table>
|
</table>
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
{{#>BasicTextLayout}}
|
{{#>BasicTextLayout}}
|
||||||
Your user account has been revoked from the {{OrganizationName}} organization because your account is part of multiple organizations. Before you can rejoin {{OrganizationName}}, you must first leave all other organizations.
|
Your user account has been revoked from the {{OrganizationName}} organization because your account is part of multiple organizations. Before you can rejoin {{OrganizationName}}, you must first leave all other organizations.
|
||||||
|
|
||||||
To leave an organization, first log in the web app (https://vault.bitwarden.com/#/login), select the three dot menu next to the organization name, and select Leave.
|
To leave an organization, first log in the web app ({{{WebVaultUrl}}}/login), select the three dot menu next to the organization name, and select Leave.
|
||||||
{{/BasicTextLayout}}
|
{{/BasicTextLayout}}
|
||||||
|
@ -26,7 +26,7 @@
|
|||||||
</tr>
|
</tr>
|
||||||
<tr style="margin: 0; box-sizing: border-box; color: #333; line-height: 25px; -webkit-font-smoothing: antialiased; -webkit-text-size-adjust: none;">
|
<tr style="margin: 0; box-sizing: border-box; color: #333; line-height: 25px; -webkit-font-smoothing: antialiased; -webkit-text-size-adjust: none;">
|
||||||
<td class="content-block" style="font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; box-sizing: border-box; font-size: 16px; color: #333; line-height: 25px; margin: 0; -webkit-font-smoothing: antialiased; padding: 0 0 10px; -webkit-text-size-adjust: none; text-align: center;" valign="top" align="center">
|
<td class="content-block" style="font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; box-sizing: border-box; font-size: 16px; color: #333; line-height: 25px; margin: 0; -webkit-font-smoothing: antialiased; padding: 0 0 10px; -webkit-text-size-adjust: none; text-align: center;" valign="top" align="center">
|
||||||
<a href="https://vault.bitwarden.com/#/organizations/{{{OrganizationId}}}/billing/subscription" clicktracking=off target="_blank" style="color: #ffffff; text-decoration: none; text-align: center; cursor: pointer; display: inline-block; border-radius: 5px; background-color: #175DDC; border-color: #175DDC; border-style: solid; border-width: 10px 20px; margin: 0; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; box-sizing: border-box; font-size: 16px; line-height: 25px; -webkit-font-smoothing: antialiased; -webkit-text-size-adjust: none;">
|
<a href="{{{VaultSubscriptionUrl}}}" clicktracking=off target="_blank" style="color: #ffffff; text-decoration: none; text-align: center; cursor: pointer; display: inline-block; border-radius: 5px; background-color: #175DDC; border-color: #175DDC; border-style: solid; border-width: 10px 20px; margin: 0; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; box-sizing: border-box; font-size: 16px; line-height: 25px; -webkit-font-smoothing: antialiased; -webkit-text-size-adjust: none;">
|
||||||
Manage subscription
|
Manage subscription
|
||||||
</a>
|
</a>
|
||||||
<br class="line-break" />
|
<br class="line-break" />
|
||||||
|
@ -24,7 +24,7 @@
|
|||||||
</tr>
|
</tr>
|
||||||
<tr style="margin: 0; box-sizing: border-box; color: #333; line-height: 25px; -webkit-font-smoothing: antialiased; -webkit-text-size-adjust: none;">
|
<tr style="margin: 0; box-sizing: border-box; color: #333; line-height: 25px; -webkit-font-smoothing: antialiased; -webkit-text-size-adjust: none;">
|
||||||
<td class="content-block" style="font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; box-sizing: border-box; font-size: 16px; color: #333; line-height: 25px; margin: 0; -webkit-font-smoothing: antialiased; padding: 0 0 10px; -webkit-text-size-adjust: none; text-align: center;" valign="top" align="center">
|
<td class="content-block" style="font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; box-sizing: border-box; font-size: 16px; color: #333; line-height: 25px; margin: 0; -webkit-font-smoothing: antialiased; padding: 0 0 10px; -webkit-text-size-adjust: none; text-align: center;" valign="top" align="center">
|
||||||
<a href="https://vault.bitwarden.com/#/organizations/{{{OrganizationId}}}/billing/subscription" clicktracking=off target="_blank" style="color: #ffffff; text-decoration: none; text-align: center; cursor: pointer; display: inline-block; border-radius: 5px; background-color: #175DDC; border-color: #175DDC; border-style: solid; border-width: 10px 20px; margin: 0; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; box-sizing: border-box; font-size: 16px; line-height: 25px; -webkit-font-smoothing: antialiased; -webkit-text-size-adjust: none;">
|
<a href="{{{VaultSubscriptionUrl}}}" clicktracking=off target="_blank" style="color: #ffffff; text-decoration: none; text-align: center; cursor: pointer; display: inline-block; border-radius: 5px; background-color: #175DDC; border-color: #175DDC; border-style: solid; border-width: 10px 20px; margin: 0; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; box-sizing: border-box; font-size: 16px; line-height: 25px; -webkit-font-smoothing: antialiased; -webkit-text-size-adjust: none;">
|
||||||
Manage subscription
|
Manage subscription
|
||||||
</a>
|
</a>
|
||||||
<br class="line-break" />
|
<br class="line-break" />
|
||||||
|
@ -24,7 +24,7 @@
|
|||||||
</tr>
|
</tr>
|
||||||
<tr style="margin: 0; box-sizing: border-box; color: #333; line-height: 25px; -webkit-font-smoothing: antialiased; -webkit-text-size-adjust: none;">
|
<tr style="margin: 0; box-sizing: border-box; color: #333; line-height: 25px; -webkit-font-smoothing: antialiased; -webkit-text-size-adjust: none;">
|
||||||
<td class="content-block" style="font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; box-sizing: border-box; font-size: 16px; color: #333; line-height: 25px; margin: 0; -webkit-font-smoothing: antialiased; padding: 0 0 10px; -webkit-text-size-adjust: none; text-align: center;" valign="top" align="center">
|
<td class="content-block" style="font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; box-sizing: border-box; font-size: 16px; color: #333; line-height: 25px; margin: 0; -webkit-font-smoothing: antialiased; padding: 0 0 10px; -webkit-text-size-adjust: none; text-align: center;" valign="top" align="center">
|
||||||
<a href="https://vault.bitwarden.com/#/organizations/{{{OrganizationId}}}/billing/subscription" clicktracking=off target="_blank" rel="noopener noreferrer" style="color: #ffffff; text-decoration: none; text-align: center; cursor: pointer; display: inline-block; border-radius: 5px; background-color: #175DDC; border-color: #175DDC; border-style: solid; border-width: 10px 20px; margin: 0; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; box-sizing: border-box; font-size: 16px; line-height: 25px; -webkit-font-smoothing: antialiased; -webkit-text-size-adjust: none;">
|
<a href="{{{VaultSubscriptionUrl}}}" clicktracking=off target="_blank" rel="noopener noreferrer" style="color: #ffffff; text-decoration: none; text-align: center; cursor: pointer; display: inline-block; border-radius: 5px; background-color: #175DDC; border-color: #175DDC; border-style: solid; border-width: 10px 20px; margin: 0; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; box-sizing: border-box; font-size: 16px; line-height: 25px; -webkit-font-smoothing: antialiased; -webkit-text-size-adjust: none;">
|
||||||
Manage subscription
|
Manage subscription
|
||||||
</a>
|
</a>
|
||||||
<br class="line-break" />
|
<br class="line-break" />
|
||||||
|
@ -24,7 +24,7 @@
|
|||||||
</tr>
|
</tr>
|
||||||
<tr style="margin: 0; box-sizing: border-box; color: #333; line-height: 25px; -webkit-font-smoothing: antialiased; -webkit-text-size-adjust: none;">
|
<tr style="margin: 0; box-sizing: border-box; color: #333; line-height: 25px; -webkit-font-smoothing: antialiased; -webkit-text-size-adjust: none;">
|
||||||
<td class="content-block" style="font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; box-sizing: border-box; font-size: 16px; color: #333; line-height: 25px; margin: 0; -webkit-font-smoothing: antialiased; padding: 0 0 10px; -webkit-text-size-adjust: none; text-align: center;" valign="top" align="center">
|
<td class="content-block" style="font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; box-sizing: border-box; font-size: 16px; color: #333; line-height: 25px; margin: 0; -webkit-font-smoothing: antialiased; padding: 0 0 10px; -webkit-text-size-adjust: none; text-align: center;" valign="top" align="center">
|
||||||
<a href="https://vault.bitwarden.com/#/organizations/{{{OrganizationId}}}/billing/subscription" clicktracking=off target="_blank" rel="noopener noreferrer" style="color: #ffffff; text-decoration: none; text-align: center; cursor: pointer; display: inline-block; border-radius: 5px; background-color: #175DDC; border-color: #175DDC; border-style: solid; border-width: 10px 20px; margin: 0; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; box-sizing: border-box; font-size: 16px; line-height: 25px; -webkit-font-smoothing: antialiased; -webkit-text-size-adjust: none;">
|
<a href="{{{VaultSubscriptionUrl}}}" clicktracking=off target="_blank" rel="noopener noreferrer" style="color: #ffffff; text-decoration: none; text-align: center; cursor: pointer; display: inline-block; border-radius: 5px; background-color: #175DDC; border-color: #175DDC; border-style: solid; border-width: 10px 20px; margin: 0; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; box-sizing: border-box; font-size: 16px; line-height: 25px; -webkit-font-smoothing: antialiased; -webkit-text-size-adjust: none;">
|
||||||
Manage subscription
|
Manage subscription
|
||||||
</a>
|
</a>
|
||||||
<br class="line-break" />
|
<br class="line-break" />
|
||||||
|
@ -73,8 +73,11 @@ public class SubscriptionInfo
|
|||||||
Name = item.Plan.Nickname;
|
Name = item.Plan.Nickname;
|
||||||
Amount = item.Plan.Amount.GetValueOrDefault() / 100M;
|
Amount = item.Plan.Amount.GetValueOrDefault() / 100M;
|
||||||
Interval = item.Plan.Interval;
|
Interval = item.Plan.Interval;
|
||||||
AddonSubscriptionItem =
|
|
||||||
Utilities.StaticStore.IsAddonSubscriptionItem(item.Plan.Id);
|
if (item.Metadata != null)
|
||||||
|
{
|
||||||
|
AddonSubscriptionItem = item.Metadata.TryGetValue("isAddOn", out var value) && bool.Parse(value);
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
Quantity = (int)item.Quantity;
|
Quantity = (int)item.Quantity;
|
||||||
|
23
src/Core/Models/Commands/BadRequestFailure.cs
Normal file
23
src/Core/Models/Commands/BadRequestFailure.cs
Normal file
@ -0,0 +1,23 @@
|
|||||||
|
namespace Bit.Core.Models.Commands;
|
||||||
|
|
||||||
|
public class BadRequestFailure<T> : Failure<T>
|
||||||
|
{
|
||||||
|
public BadRequestFailure(IEnumerable<string> errorMessage) : base(errorMessage)
|
||||||
|
{
|
||||||
|
}
|
||||||
|
|
||||||
|
public BadRequestFailure(string errorMessage) : base(errorMessage)
|
||||||
|
{
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
public class BadRequestFailure : Failure
|
||||||
|
{
|
||||||
|
public BadRequestFailure(IEnumerable<string> errorMessage) : base(errorMessage)
|
||||||
|
{
|
||||||
|
}
|
||||||
|
|
||||||
|
public BadRequestFailure(string errorMessage) : base(errorMessage)
|
||||||
|
{
|
||||||
|
}
|
||||||
|
}
|
@ -1,4 +1,8 @@
|
|||||||
namespace Bit.Core.Models.Commands;
|
#nullable enable
|
||||||
|
|
||||||
|
using Bit.Core.AdminConsole.Errors;
|
||||||
|
|
||||||
|
namespace Bit.Core.Models.Commands;
|
||||||
|
|
||||||
public class CommandResult(IEnumerable<string> errors)
|
public class CommandResult(IEnumerable<string> errors)
|
||||||
{
|
{
|
||||||
@ -7,6 +11,49 @@ public class CommandResult(IEnumerable<string> errors)
|
|||||||
public bool Success => ErrorMessages.Count == 0;
|
public bool Success => ErrorMessages.Count == 0;
|
||||||
public bool HasErrors => ErrorMessages.Count > 0;
|
public bool HasErrors => ErrorMessages.Count > 0;
|
||||||
public List<string> ErrorMessages { get; } = errors.ToList();
|
public List<string> ErrorMessages { get; } = errors.ToList();
|
||||||
|
|
||||||
public CommandResult() : this(Array.Empty<string>()) { }
|
public CommandResult() : this(Array.Empty<string>()) { }
|
||||||
}
|
}
|
||||||
|
|
||||||
|
public class Failure : CommandResult
|
||||||
|
{
|
||||||
|
protected Failure(IEnumerable<string> errorMessages) : base(errorMessages)
|
||||||
|
{
|
||||||
|
|
||||||
|
}
|
||||||
|
public Failure(string errorMessage) : base(errorMessage)
|
||||||
|
{
|
||||||
|
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
public class Success : CommandResult
|
||||||
|
{
|
||||||
|
}
|
||||||
|
|
||||||
|
public abstract class CommandResult<T>;
|
||||||
|
|
||||||
|
public class Success<T>(T value) : CommandResult<T>
|
||||||
|
{
|
||||||
|
public T Value { get; } = value;
|
||||||
|
}
|
||||||
|
|
||||||
|
public class Failure<T>(IEnumerable<string> errorMessages) : CommandResult<T>
|
||||||
|
{
|
||||||
|
public List<string> ErrorMessages { get; } = errorMessages.ToList();
|
||||||
|
|
||||||
|
public string ErrorMessage => string.Join(" ", ErrorMessages);
|
||||||
|
|
||||||
|
public Failure(string error) : this([error]) { }
|
||||||
|
}
|
||||||
|
|
||||||
|
public class Partial<T> : CommandResult<T>
|
||||||
|
{
|
||||||
|
public T[] Successes { get; set; } = [];
|
||||||
|
public Error<T>[] Failures { get; set; } = [];
|
||||||
|
|
||||||
|
public Partial(IEnumerable<T> successfulItems, IEnumerable<Error<T>> failedItems)
|
||||||
|
{
|
||||||
|
Successes = successfulItems.ToArray();
|
||||||
|
Failures = failedItems.ToArray();
|
||||||
|
}
|
||||||
|
}
|
||||||
|
24
src/Core/Models/Commands/NoRecordFoundFailure.cs
Normal file
24
src/Core/Models/Commands/NoRecordFoundFailure.cs
Normal file
@ -0,0 +1,24 @@
|
|||||||
|
namespace Bit.Core.Models.Commands;
|
||||||
|
|
||||||
|
public class NoRecordFoundFailure<T> : Failure<T>
|
||||||
|
{
|
||||||
|
public NoRecordFoundFailure(IEnumerable<string> errorMessage) : base(errorMessage)
|
||||||
|
{
|
||||||
|
}
|
||||||
|
|
||||||
|
public NoRecordFoundFailure(string errorMessage) : base(errorMessage)
|
||||||
|
{
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
public class NoRecordFoundFailure : Failure
|
||||||
|
{
|
||||||
|
public NoRecordFoundFailure(IEnumerable<string> errorMessage) : base(errorMessage)
|
||||||
|
{
|
||||||
|
}
|
||||||
|
|
||||||
|
public NoRecordFoundFailure(string errorMessage) : base(errorMessage)
|
||||||
|
{
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
@ -2,7 +2,7 @@
|
|||||||
|
|
||||||
public class OrganizationSeatsAutoscaledViewModel : BaseMailModel
|
public class OrganizationSeatsAutoscaledViewModel : BaseMailModel
|
||||||
{
|
{
|
||||||
public Guid OrganizationId { get; set; }
|
|
||||||
public int InitialSeatCount { get; set; }
|
public int InitialSeatCount { get; set; }
|
||||||
public int CurrentSeatCount { get; set; }
|
public int CurrentSeatCount { get; set; }
|
||||||
|
public string VaultSubscriptionUrl { get; set; }
|
||||||
}
|
}
|
||||||
|
@ -2,6 +2,6 @@
|
|||||||
|
|
||||||
public class OrganizationSeatsMaxReachedViewModel : BaseMailModel
|
public class OrganizationSeatsMaxReachedViewModel : BaseMailModel
|
||||||
{
|
{
|
||||||
public Guid OrganizationId { get; set; }
|
|
||||||
public int MaxSeatCount { get; set; }
|
public int MaxSeatCount { get; set; }
|
||||||
|
public string VaultSubscriptionUrl { get; set; }
|
||||||
}
|
}
|
||||||
|
@ -2,6 +2,6 @@
|
|||||||
|
|
||||||
public class OrganizationServiceAccountsMaxReachedViewModel
|
public class OrganizationServiceAccountsMaxReachedViewModel
|
||||||
{
|
{
|
||||||
public Guid OrganizationId { get; set; }
|
|
||||||
public int MaxServiceAccountsCount { get; set; }
|
public int MaxServiceAccountsCount { get; set; }
|
||||||
|
public string VaultSubscriptionUrl { get; set; }
|
||||||
}
|
}
|
||||||
|
@ -42,10 +42,7 @@ public class CloudGetOrganizationLicenseQuery : ICloudGetOrganizationLicenseQuer
|
|||||||
|
|
||||||
var subscriptionInfo = await GetSubscriptionAsync(organization);
|
var subscriptionInfo = await GetSubscriptionAsync(organization);
|
||||||
var license = new OrganizationLicense(organization, subscriptionInfo, installationId, _licensingService, version);
|
var license = new OrganizationLicense(organization, subscriptionInfo, installationId, _licensingService, version);
|
||||||
if (_featureService.IsEnabled(FeatureFlagKeys.SelfHostLicenseRefactor))
|
license.Token = await _licensingService.CreateOrganizationTokenAsync(organization, installationId, subscriptionInfo);
|
||||||
{
|
|
||||||
license.Token = await _licensingService.CreateOrganizationTokenAsync(organization, installationId, subscriptionInfo);
|
|
||||||
}
|
|
||||||
|
|
||||||
return license;
|
return license;
|
||||||
}
|
}
|
||||||
|
@ -14,18 +14,8 @@ namespace Bit.Core.Services;
|
|||||||
public interface IPaymentService
|
public interface IPaymentService
|
||||||
{
|
{
|
||||||
Task CancelAndRecoverChargesAsync(ISubscriber subscriber);
|
Task CancelAndRecoverChargesAsync(ISubscriber subscriber);
|
||||||
Task<string> PurchaseOrganizationAsync(Organization org, PaymentMethodType paymentMethodType,
|
|
||||||
string paymentToken, Plan plan, short additionalStorageGb, int additionalSeats,
|
|
||||||
bool premiumAccessAddon, TaxInfo taxInfo, bool provider = false, int additionalSmSeats = 0,
|
|
||||||
int additionalServiceAccount = 0, bool signupIsFromSecretsManagerTrial = false);
|
|
||||||
Task<string> PurchaseOrganizationNoPaymentMethod(Organization org, Plan plan, int additionalSeats,
|
|
||||||
bool premiumAccessAddon, int additionalSmSeats = 0, int additionalServiceAccount = 0,
|
|
||||||
bool signupIsFromSecretsManagerTrial = false);
|
|
||||||
Task SponsorOrganizationAsync(Organization org, OrganizationSponsorship sponsorship);
|
Task SponsorOrganizationAsync(Organization org, OrganizationSponsorship sponsorship);
|
||||||
Task RemoveOrganizationSponsorshipAsync(Organization org, OrganizationSponsorship sponsorship);
|
Task RemoveOrganizationSponsorshipAsync(Organization org, OrganizationSponsorship sponsorship);
|
||||||
Task<string> UpgradeFreeOrganizationAsync(Organization org, Plan plan, OrganizationUpgrade upgrade);
|
|
||||||
Task<string> PurchasePremiumAsync(User user, PaymentMethodType paymentMethodType, string paymentToken,
|
|
||||||
short additionalStorageGb, TaxInfo taxInfo);
|
|
||||||
Task<string> AdjustSubscription(
|
Task<string> AdjustSubscription(
|
||||||
Organization organization,
|
Organization organization,
|
||||||
Plan updatedPlan,
|
Plan updatedPlan,
|
||||||
@ -56,9 +46,7 @@ public interface IPaymentService
|
|||||||
Task SaveTaxInfoAsync(ISubscriber subscriber, TaxInfo taxInfo);
|
Task SaveTaxInfoAsync(ISubscriber subscriber, TaxInfo taxInfo);
|
||||||
Task<string> AddSecretsManagerToSubscription(Organization org, Plan plan, int additionalSmSeats,
|
Task<string> AddSecretsManagerToSubscription(Organization org, Plan plan, int additionalSmSeats,
|
||||||
int additionalServiceAccount);
|
int additionalServiceAccount);
|
||||||
Task<bool> RisksSubscriptionFailure(Organization organization);
|
|
||||||
Task<bool> HasSecretsManagerStandalone(Organization organization);
|
Task<bool> HasSecretsManagerStandalone(Organization organization);
|
||||||
Task<(DateTime?, DateTime?)> GetSuspensionDateAsync(Stripe.Subscription subscription);
|
|
||||||
Task<PreviewInvoiceResponseModel> PreviewInvoiceAsync(PreviewIndividualInvoiceRequestBody parameters, string gatewayCustomerId, string gatewaySubscriptionId);
|
Task<PreviewInvoiceResponseModel> PreviewInvoiceAsync(PreviewIndividualInvoiceRequestBody parameters, string gatewayCustomerId, string gatewaySubscriptionId);
|
||||||
Task<PreviewInvoiceResponseModel> PreviewInvoiceAsync(PreviewOrganizationInvoiceRequestBody parameters, string gatewayCustomerId, string gatewaySubscriptionId);
|
Task<PreviewInvoiceResponseModel> PreviewInvoiceAsync(PreviewOrganizationInvoiceRequestBody parameters, string gatewayCustomerId, string gatewaySubscriptionId);
|
||||||
|
|
||||||
|
@ -214,9 +214,9 @@ public class HandlebarsMailService : IMailService
|
|||||||
var message = CreateDefaultMessage($"{organization.DisplayName()} Seat Count Has Increased", ownerEmails);
|
var message = CreateDefaultMessage($"{organization.DisplayName()} Seat Count Has Increased", ownerEmails);
|
||||||
var model = new OrganizationSeatsAutoscaledViewModel
|
var model = new OrganizationSeatsAutoscaledViewModel
|
||||||
{
|
{
|
||||||
OrganizationId = organization.Id,
|
|
||||||
InitialSeatCount = initialSeatCount,
|
InitialSeatCount = initialSeatCount,
|
||||||
CurrentSeatCount = organization.Seats.Value,
|
CurrentSeatCount = organization.Seats.Value,
|
||||||
|
VaultSubscriptionUrl = GetCloudVaultSubscriptionUrl(organization.Id)
|
||||||
};
|
};
|
||||||
|
|
||||||
await AddMessageContentAsync(message, "OrganizationSeatsAutoscaled", model);
|
await AddMessageContentAsync(message, "OrganizationSeatsAutoscaled", model);
|
||||||
@ -229,8 +229,8 @@ public class HandlebarsMailService : IMailService
|
|||||||
var message = CreateDefaultMessage($"{organization.DisplayName()} Seat Limit Reached", ownerEmails);
|
var message = CreateDefaultMessage($"{organization.DisplayName()} Seat Limit Reached", ownerEmails);
|
||||||
var model = new OrganizationSeatsMaxReachedViewModel
|
var model = new OrganizationSeatsMaxReachedViewModel
|
||||||
{
|
{
|
||||||
OrganizationId = organization.Id,
|
|
||||||
MaxSeatCount = maxSeatCount,
|
MaxSeatCount = maxSeatCount,
|
||||||
|
VaultSubscriptionUrl = GetCloudVaultSubscriptionUrl(organization.Id)
|
||||||
};
|
};
|
||||||
|
|
||||||
await AddMessageContentAsync(message, "OrganizationSeatsMaxReached", model);
|
await AddMessageContentAsync(message, "OrganizationSeatsMaxReached", model);
|
||||||
@ -1103,8 +1103,8 @@ public class HandlebarsMailService : IMailService
|
|||||||
var message = CreateDefaultMessage($"{organization.DisplayName()} Secrets Manager Seat Limit Reached", ownerEmails);
|
var message = CreateDefaultMessage($"{organization.DisplayName()} Secrets Manager Seat Limit Reached", ownerEmails);
|
||||||
var model = new OrganizationSeatsMaxReachedViewModel
|
var model = new OrganizationSeatsMaxReachedViewModel
|
||||||
{
|
{
|
||||||
OrganizationId = organization.Id,
|
|
||||||
MaxSeatCount = maxSeatCount,
|
MaxSeatCount = maxSeatCount,
|
||||||
|
VaultSubscriptionUrl = GetCloudVaultSubscriptionUrl(organization.Id)
|
||||||
};
|
};
|
||||||
|
|
||||||
await AddMessageContentAsync(message, "OrganizationSmSeatsMaxReached", model);
|
await AddMessageContentAsync(message, "OrganizationSmSeatsMaxReached", model);
|
||||||
@ -1118,8 +1118,8 @@ public class HandlebarsMailService : IMailService
|
|||||||
var message = CreateDefaultMessage($"{organization.DisplayName()} Secrets Manager Machine Accounts Limit Reached", ownerEmails);
|
var message = CreateDefaultMessage($"{organization.DisplayName()} Secrets Manager Machine Accounts Limit Reached", ownerEmails);
|
||||||
var model = new OrganizationServiceAccountsMaxReachedViewModel
|
var model = new OrganizationServiceAccountsMaxReachedViewModel
|
||||||
{
|
{
|
||||||
OrganizationId = organization.Id,
|
|
||||||
MaxServiceAccountsCount = maxSeatCount,
|
MaxServiceAccountsCount = maxSeatCount,
|
||||||
|
VaultSubscriptionUrl = GetCloudVaultSubscriptionUrl(organization.Id)
|
||||||
};
|
};
|
||||||
|
|
||||||
await AddMessageContentAsync(message, "OrganizationSmServiceAccountsMaxReached", model);
|
await AddMessageContentAsync(message, "OrganizationSmServiceAccountsMaxReached", model);
|
||||||
@ -1223,4 +1223,11 @@ public class HandlebarsMailService : IMailService
|
|||||||
{
|
{
|
||||||
return string.IsNullOrEmpty(userName) ? email : CoreHelpers.SanitizeForEmail(userName, false);
|
return string.IsNullOrEmpty(userName) ? email : CoreHelpers.SanitizeForEmail(userName, false);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
private string GetCloudVaultSubscriptionUrl(Guid organizationId)
|
||||||
|
=> _globalSettings.BaseServiceUri.CloudRegion?.ToLower() switch
|
||||||
|
{
|
||||||
|
"eu" => $"https://vault.bitwarden.eu/#/organizations/{organizationId}/billing/subscription",
|
||||||
|
_ => $"https://vault.bitwarden.com/#/organizations/{organizationId}/billing/subscription"
|
||||||
|
};
|
||||||
}
|
}
|
||||||
|
@ -25,9 +25,6 @@ namespace Bit.Core.Services;
|
|||||||
|
|
||||||
public class StripePaymentService : IPaymentService
|
public class StripePaymentService : IPaymentService
|
||||||
{
|
{
|
||||||
private const string PremiumPlanId = "premium-annually";
|
|
||||||
private const string StoragePlanId = "storage-gb-annually";
|
|
||||||
private const string ProviderDiscountId = "msp-discount-35";
|
|
||||||
private const string SecretsManagerStandaloneDiscountId = "sm-standalone";
|
private const string SecretsManagerStandaloneDiscountId = "sm-standalone";
|
||||||
|
|
||||||
private readonly ITransactionRepository _transactionRepository;
|
private readonly ITransactionRepository _transactionRepository;
|
||||||
@ -62,240 +59,6 @@ public class StripePaymentService : IPaymentService
|
|||||||
_pricingClient = pricingClient;
|
_pricingClient = pricingClient;
|
||||||
}
|
}
|
||||||
|
|
||||||
public async Task<string> PurchaseOrganizationAsync(Organization org, PaymentMethodType paymentMethodType,
|
|
||||||
string paymentToken, StaticStore.Plan plan, short additionalStorageGb,
|
|
||||||
int additionalSeats, bool premiumAccessAddon, TaxInfo taxInfo, bool provider = false,
|
|
||||||
int additionalSmSeats = 0, int additionalServiceAccount = 0, bool signupIsFromSecretsManagerTrial = false)
|
|
||||||
{
|
|
||||||
Braintree.Customer braintreeCustomer = null;
|
|
||||||
string stipeCustomerSourceToken = null;
|
|
||||||
string stipeCustomerPaymentMethodId = null;
|
|
||||||
var stripeCustomerMetadata = new Dictionary<string, string>
|
|
||||||
{
|
|
||||||
{ "region", _globalSettings.BaseServiceUri.CloudRegion }
|
|
||||||
};
|
|
||||||
var stripePaymentMethod = paymentMethodType == PaymentMethodType.Card ||
|
|
||||||
paymentMethodType == PaymentMethodType.BankAccount;
|
|
||||||
|
|
||||||
if (stripePaymentMethod && !string.IsNullOrWhiteSpace(paymentToken))
|
|
||||||
{
|
|
||||||
if (paymentToken.StartsWith("pm_"))
|
|
||||||
{
|
|
||||||
stipeCustomerPaymentMethodId = paymentToken;
|
|
||||||
}
|
|
||||||
else
|
|
||||||
{
|
|
||||||
stipeCustomerSourceToken = paymentToken;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
else if (paymentMethodType == PaymentMethodType.PayPal)
|
|
||||||
{
|
|
||||||
var randomSuffix = Utilities.CoreHelpers.RandomString(3, upper: false, numeric: false);
|
|
||||||
var customerResult = await _btGateway.Customer.CreateAsync(new Braintree.CustomerRequest
|
|
||||||
{
|
|
||||||
PaymentMethodNonce = paymentToken,
|
|
||||||
Email = org.BillingEmail,
|
|
||||||
Id = org.BraintreeCustomerIdPrefix() + org.Id.ToString("N").ToLower() + randomSuffix,
|
|
||||||
CustomFields = new Dictionary<string, string>
|
|
||||||
{
|
|
||||||
[org.BraintreeIdField()] = org.Id.ToString(),
|
|
||||||
[org.BraintreeCloudRegionField()] = _globalSettings.BaseServiceUri.CloudRegion
|
|
||||||
}
|
|
||||||
});
|
|
||||||
|
|
||||||
if (!customerResult.IsSuccess() || customerResult.Target.PaymentMethods.Length == 0)
|
|
||||||
{
|
|
||||||
throw new GatewayException("Failed to create PayPal customer record.");
|
|
||||||
}
|
|
||||||
|
|
||||||
braintreeCustomer = customerResult.Target;
|
|
||||||
stripeCustomerMetadata.Add("btCustomerId", braintreeCustomer.Id);
|
|
||||||
}
|
|
||||||
else
|
|
||||||
{
|
|
||||||
throw new GatewayException("Payment method is not supported at this time.");
|
|
||||||
}
|
|
||||||
|
|
||||||
var subCreateOptions = new OrganizationPurchaseSubscriptionOptions(org, plan, taxInfo, additionalSeats, additionalStorageGb, premiumAccessAddon
|
|
||||||
, additionalSmSeats, additionalServiceAccount);
|
|
||||||
|
|
||||||
Customer customer = null;
|
|
||||||
Subscription subscription;
|
|
||||||
try
|
|
||||||
{
|
|
||||||
if (!string.IsNullOrWhiteSpace(taxInfo.TaxIdNumber))
|
|
||||||
{
|
|
||||||
taxInfo.TaxIdType = _taxService.GetStripeTaxCode(taxInfo.BillingAddressCountry,
|
|
||||||
taxInfo.TaxIdNumber);
|
|
||||||
|
|
||||||
if (taxInfo.TaxIdType == null)
|
|
||||||
{
|
|
||||||
_logger.LogWarning("Could not infer tax ID type in country '{Country}' with tax ID '{TaxID}'.",
|
|
||||||
taxInfo.BillingAddressCountry,
|
|
||||||
taxInfo.TaxIdNumber);
|
|
||||||
throw new BadRequestException("billingTaxIdTypeInferenceError");
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
var customerCreateOptions = new CustomerCreateOptions
|
|
||||||
{
|
|
||||||
Description = org.DisplayBusinessName(),
|
|
||||||
Email = org.BillingEmail,
|
|
||||||
Source = stipeCustomerSourceToken,
|
|
||||||
PaymentMethod = stipeCustomerPaymentMethodId,
|
|
||||||
Metadata = stripeCustomerMetadata,
|
|
||||||
InvoiceSettings = new CustomerInvoiceSettingsOptions
|
|
||||||
{
|
|
||||||
DefaultPaymentMethod = stipeCustomerPaymentMethodId,
|
|
||||||
CustomFields =
|
|
||||||
[
|
|
||||||
new CustomerInvoiceSettingsCustomFieldOptions
|
|
||||||
{
|
|
||||||
Name = org.SubscriberType(),
|
|
||||||
Value = GetFirstThirtyCharacters(org.SubscriberName()),
|
|
||||||
}
|
|
||||||
],
|
|
||||||
},
|
|
||||||
Coupon = signupIsFromSecretsManagerTrial
|
|
||||||
? SecretsManagerStandaloneDiscountId
|
|
||||||
: provider
|
|
||||||
? ProviderDiscountId
|
|
||||||
: null,
|
|
||||||
Address = new AddressOptions
|
|
||||||
{
|
|
||||||
Country = taxInfo?.BillingAddressCountry,
|
|
||||||
PostalCode = taxInfo?.BillingAddressPostalCode,
|
|
||||||
// Line1 is required in Stripe's API, suggestion in Docs is to use Business Name instead.
|
|
||||||
Line1 = taxInfo?.BillingAddressLine1 ?? string.Empty,
|
|
||||||
Line2 = taxInfo?.BillingAddressLine2,
|
|
||||||
City = taxInfo?.BillingAddressCity,
|
|
||||||
State = taxInfo?.BillingAddressState,
|
|
||||||
},
|
|
||||||
TaxIdData = !string.IsNullOrWhiteSpace(taxInfo.TaxIdNumber)
|
|
||||||
? [new CustomerTaxIdDataOptions { Type = taxInfo.TaxIdType, Value = taxInfo.TaxIdNumber }]
|
|
||||||
: null
|
|
||||||
};
|
|
||||||
|
|
||||||
customerCreateOptions.AddExpand("tax");
|
|
||||||
|
|
||||||
customer = await _stripeAdapter.CustomerCreateAsync(customerCreateOptions);
|
|
||||||
subCreateOptions.AddExpand("latest_invoice.payment_intent");
|
|
||||||
subCreateOptions.Customer = customer.Id;
|
|
||||||
subCreateOptions.EnableAutomaticTax(customer);
|
|
||||||
|
|
||||||
subscription = await _stripeAdapter.SubscriptionCreateAsync(subCreateOptions);
|
|
||||||
if (subscription.Status == "incomplete" && subscription.LatestInvoice?.PaymentIntent != null)
|
|
||||||
{
|
|
||||||
if (subscription.LatestInvoice.PaymentIntent.Status == "requires_payment_method")
|
|
||||||
{
|
|
||||||
await _stripeAdapter.SubscriptionCancelAsync(subscription.Id, new SubscriptionCancelOptions());
|
|
||||||
throw new GatewayException("Payment method was declined.");
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
catch (Exception ex)
|
|
||||||
{
|
|
||||||
_logger.LogError(ex, "Error creating customer, walking back operation.");
|
|
||||||
if (customer != null)
|
|
||||||
{
|
|
||||||
await _stripeAdapter.CustomerDeleteAsync(customer.Id);
|
|
||||||
}
|
|
||||||
if (braintreeCustomer != null)
|
|
||||||
{
|
|
||||||
await _btGateway.Customer.DeleteAsync(braintreeCustomer.Id);
|
|
||||||
}
|
|
||||||
throw;
|
|
||||||
}
|
|
||||||
|
|
||||||
org.Gateway = GatewayType.Stripe;
|
|
||||||
org.GatewayCustomerId = customer.Id;
|
|
||||||
org.GatewaySubscriptionId = subscription.Id;
|
|
||||||
|
|
||||||
if (subscription.Status == "incomplete" &&
|
|
||||||
subscription.LatestInvoice?.PaymentIntent?.Status == "requires_action")
|
|
||||||
{
|
|
||||||
org.Enabled = false;
|
|
||||||
return subscription.LatestInvoice.PaymentIntent.ClientSecret;
|
|
||||||
}
|
|
||||||
else
|
|
||||||
{
|
|
||||||
org.Enabled = true;
|
|
||||||
org.ExpirationDate = subscription.CurrentPeriodEnd;
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
public async Task<string> PurchaseOrganizationNoPaymentMethod(Organization org, StaticStore.Plan plan, int additionalSeats, bool premiumAccessAddon,
|
|
||||||
int additionalSmSeats = 0, int additionalServiceAccount = 0, bool signupIsFromSecretsManagerTrial = false)
|
|
||||||
{
|
|
||||||
|
|
||||||
var stripeCustomerMetadata = new Dictionary<string, string>
|
|
||||||
{
|
|
||||||
{ "region", _globalSettings.BaseServiceUri.CloudRegion }
|
|
||||||
};
|
|
||||||
var subCreateOptions = new OrganizationPurchaseSubscriptionOptions(org, plan, new TaxInfo(), additionalSeats, 0, premiumAccessAddon
|
|
||||||
, additionalSmSeats, additionalServiceAccount);
|
|
||||||
|
|
||||||
Customer customer = null;
|
|
||||||
Subscription subscription;
|
|
||||||
try
|
|
||||||
{
|
|
||||||
var customerCreateOptions = new CustomerCreateOptions
|
|
||||||
{
|
|
||||||
Description = org.DisplayBusinessName(),
|
|
||||||
Email = org.BillingEmail,
|
|
||||||
Metadata = stripeCustomerMetadata,
|
|
||||||
InvoiceSettings = new CustomerInvoiceSettingsOptions
|
|
||||||
{
|
|
||||||
CustomFields =
|
|
||||||
[
|
|
||||||
new CustomerInvoiceSettingsCustomFieldOptions
|
|
||||||
{
|
|
||||||
Name = org.SubscriberType(),
|
|
||||||
Value = GetFirstThirtyCharacters(org.SubscriberName()),
|
|
||||||
}
|
|
||||||
],
|
|
||||||
},
|
|
||||||
Coupon = signupIsFromSecretsManagerTrial
|
|
||||||
? SecretsManagerStandaloneDiscountId
|
|
||||||
: null,
|
|
||||||
TaxIdData = null,
|
|
||||||
};
|
|
||||||
|
|
||||||
customer = await _stripeAdapter.CustomerCreateAsync(customerCreateOptions);
|
|
||||||
subCreateOptions.AddExpand("latest_invoice.payment_intent");
|
|
||||||
subCreateOptions.Customer = customer.Id;
|
|
||||||
|
|
||||||
subscription = await _stripeAdapter.SubscriptionCreateAsync(subCreateOptions);
|
|
||||||
}
|
|
||||||
catch (Exception ex)
|
|
||||||
{
|
|
||||||
_logger.LogError(ex, "Error creating customer, walking back operation.");
|
|
||||||
if (customer != null)
|
|
||||||
{
|
|
||||||
await _stripeAdapter.CustomerDeleteAsync(customer.Id);
|
|
||||||
}
|
|
||||||
|
|
||||||
throw;
|
|
||||||
}
|
|
||||||
|
|
||||||
org.Gateway = GatewayType.Stripe;
|
|
||||||
org.GatewayCustomerId = customer.Id;
|
|
||||||
org.GatewaySubscriptionId = subscription.Id;
|
|
||||||
|
|
||||||
if (subscription.Status == "incomplete" &&
|
|
||||||
subscription.LatestInvoice?.PaymentIntent?.Status == "requires_action")
|
|
||||||
{
|
|
||||||
org.Enabled = false;
|
|
||||||
return subscription.LatestInvoice.PaymentIntent.ClientSecret;
|
|
||||||
}
|
|
||||||
|
|
||||||
org.Enabled = true;
|
|
||||||
org.ExpirationDate = subscription.CurrentPeriodEnd;
|
|
||||||
return null;
|
|
||||||
|
|
||||||
}
|
|
||||||
|
|
||||||
private async Task ChangeOrganizationSponsorship(
|
private async Task ChangeOrganizationSponsorship(
|
||||||
Organization org,
|
Organization org,
|
||||||
OrganizationSponsorship sponsorship,
|
OrganizationSponsorship sponsorship,
|
||||||
@ -324,458 +87,6 @@ public class StripePaymentService : IPaymentService
|
|||||||
public Task RemoveOrganizationSponsorshipAsync(Organization org, OrganizationSponsorship sponsorship) =>
|
public Task RemoveOrganizationSponsorshipAsync(Organization org, OrganizationSponsorship sponsorship) =>
|
||||||
ChangeOrganizationSponsorship(org, sponsorship, false);
|
ChangeOrganizationSponsorship(org, sponsorship, false);
|
||||||
|
|
||||||
public async Task<string> UpgradeFreeOrganizationAsync(Organization org, StaticStore.Plan plan,
|
|
||||||
OrganizationUpgrade upgrade)
|
|
||||||
{
|
|
||||||
if (!string.IsNullOrWhiteSpace(org.GatewaySubscriptionId))
|
|
||||||
{
|
|
||||||
throw new BadRequestException("Organization already has a subscription.");
|
|
||||||
}
|
|
||||||
|
|
||||||
var customerOptions = new CustomerGetOptions();
|
|
||||||
customerOptions.AddExpand("default_source");
|
|
||||||
customerOptions.AddExpand("invoice_settings.default_payment_method");
|
|
||||||
customerOptions.AddExpand("tax");
|
|
||||||
var customer = await _stripeAdapter.CustomerGetAsync(org.GatewayCustomerId, customerOptions);
|
|
||||||
if (customer == null)
|
|
||||||
{
|
|
||||||
throw new GatewayException("Could not find customer payment profile.");
|
|
||||||
}
|
|
||||||
|
|
||||||
if (!string.IsNullOrEmpty(upgrade.TaxInfo?.BillingAddressCountry) &&
|
|
||||||
!string.IsNullOrEmpty(upgrade.TaxInfo?.BillingAddressPostalCode))
|
|
||||||
{
|
|
||||||
var addressOptions = new AddressOptions
|
|
||||||
{
|
|
||||||
Country = upgrade.TaxInfo.BillingAddressCountry,
|
|
||||||
PostalCode = upgrade.TaxInfo.BillingAddressPostalCode,
|
|
||||||
// Line1 is required in Stripe's API, suggestion in Docs is to use Business Name instead.
|
|
||||||
Line1 = upgrade.TaxInfo.BillingAddressLine1 ?? string.Empty,
|
|
||||||
Line2 = upgrade.TaxInfo.BillingAddressLine2,
|
|
||||||
City = upgrade.TaxInfo.BillingAddressCity,
|
|
||||||
State = upgrade.TaxInfo.BillingAddressState,
|
|
||||||
};
|
|
||||||
var customerUpdateOptions = new CustomerUpdateOptions { Address = addressOptions };
|
|
||||||
customerUpdateOptions.AddExpand("default_source");
|
|
||||||
customerUpdateOptions.AddExpand("invoice_settings.default_payment_method");
|
|
||||||
customerUpdateOptions.AddExpand("tax");
|
|
||||||
customer = await _stripeAdapter.CustomerUpdateAsync(org.GatewayCustomerId, customerUpdateOptions);
|
|
||||||
}
|
|
||||||
|
|
||||||
var subCreateOptions = new OrganizationUpgradeSubscriptionOptions(customer.Id, org, plan, upgrade);
|
|
||||||
|
|
||||||
subCreateOptions.EnableAutomaticTax(customer);
|
|
||||||
|
|
||||||
var (stripePaymentMethod, paymentMethodType) = IdentifyPaymentMethod(customer, subCreateOptions);
|
|
||||||
|
|
||||||
var subscription = await ChargeForNewSubscriptionAsync(org, customer, false,
|
|
||||||
stripePaymentMethod, paymentMethodType, subCreateOptions, null);
|
|
||||||
org.GatewaySubscriptionId = subscription.Id;
|
|
||||||
|
|
||||||
if (subscription.Status == "incomplete" &&
|
|
||||||
subscription.LatestInvoice?.PaymentIntent?.Status == "requires_action")
|
|
||||||
{
|
|
||||||
org.Enabled = false;
|
|
||||||
return subscription.LatestInvoice.PaymentIntent.ClientSecret;
|
|
||||||
}
|
|
||||||
else
|
|
||||||
{
|
|
||||||
org.Enabled = true;
|
|
||||||
org.ExpirationDate = subscription.CurrentPeriodEnd;
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
private (bool stripePaymentMethod, PaymentMethodType PaymentMethodType) IdentifyPaymentMethod(
|
|
||||||
Customer customer, SubscriptionCreateOptions subCreateOptions)
|
|
||||||
{
|
|
||||||
var stripePaymentMethod = false;
|
|
||||||
var paymentMethodType = PaymentMethodType.Credit;
|
|
||||||
var hasBtCustomerId = customer.Metadata.ContainsKey("btCustomerId");
|
|
||||||
if (hasBtCustomerId)
|
|
||||||
{
|
|
||||||
paymentMethodType = PaymentMethodType.PayPal;
|
|
||||||
}
|
|
||||||
else
|
|
||||||
{
|
|
||||||
if (customer.InvoiceSettings?.DefaultPaymentMethod?.Type == "card")
|
|
||||||
{
|
|
||||||
paymentMethodType = PaymentMethodType.Card;
|
|
||||||
stripePaymentMethod = true;
|
|
||||||
}
|
|
||||||
else if (customer.DefaultSource != null)
|
|
||||||
{
|
|
||||||
if (customer.DefaultSource is Card || customer.DefaultSource is SourceCard)
|
|
||||||
{
|
|
||||||
paymentMethodType = PaymentMethodType.Card;
|
|
||||||
stripePaymentMethod = true;
|
|
||||||
}
|
|
||||||
else if (customer.DefaultSource is BankAccount || customer.DefaultSource is SourceAchDebit)
|
|
||||||
{
|
|
||||||
paymentMethodType = PaymentMethodType.BankAccount;
|
|
||||||
stripePaymentMethod = true;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
else
|
|
||||||
{
|
|
||||||
var paymentMethod = GetLatestCardPaymentMethod(customer.Id);
|
|
||||||
if (paymentMethod != null)
|
|
||||||
{
|
|
||||||
paymentMethodType = PaymentMethodType.Card;
|
|
||||||
stripePaymentMethod = true;
|
|
||||||
subCreateOptions.DefaultPaymentMethod = paymentMethod.Id;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return (stripePaymentMethod, paymentMethodType);
|
|
||||||
}
|
|
||||||
|
|
||||||
public async Task<string> PurchasePremiumAsync(User user, PaymentMethodType paymentMethodType,
|
|
||||||
string paymentToken, short additionalStorageGb, TaxInfo taxInfo)
|
|
||||||
{
|
|
||||||
if (paymentMethodType != PaymentMethodType.Credit && string.IsNullOrWhiteSpace(paymentToken))
|
|
||||||
{
|
|
||||||
throw new BadRequestException("Payment token is required.");
|
|
||||||
}
|
|
||||||
if (paymentMethodType == PaymentMethodType.Credit &&
|
|
||||||
(user.Gateway != GatewayType.Stripe || string.IsNullOrWhiteSpace(user.GatewayCustomerId)))
|
|
||||||
{
|
|
||||||
throw new BadRequestException("Your account does not have any credit available.");
|
|
||||||
}
|
|
||||||
if (paymentMethodType is PaymentMethodType.BankAccount)
|
|
||||||
{
|
|
||||||
throw new GatewayException("Payment method is not supported at this time.");
|
|
||||||
}
|
|
||||||
|
|
||||||
var createdStripeCustomer = false;
|
|
||||||
Customer customer = null;
|
|
||||||
Braintree.Customer braintreeCustomer = null;
|
|
||||||
var stripePaymentMethod = paymentMethodType is PaymentMethodType.Card or PaymentMethodType.BankAccount
|
|
||||||
or PaymentMethodType.Credit;
|
|
||||||
|
|
||||||
string stipeCustomerPaymentMethodId = null;
|
|
||||||
string stipeCustomerSourceToken = null;
|
|
||||||
if (stripePaymentMethod && !string.IsNullOrWhiteSpace(paymentToken))
|
|
||||||
{
|
|
||||||
if (paymentToken.StartsWith("pm_"))
|
|
||||||
{
|
|
||||||
stipeCustomerPaymentMethodId = paymentToken;
|
|
||||||
}
|
|
||||||
else
|
|
||||||
{
|
|
||||||
stipeCustomerSourceToken = paymentToken;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if (user.Gateway == GatewayType.Stripe && !string.IsNullOrWhiteSpace(user.GatewayCustomerId))
|
|
||||||
{
|
|
||||||
if (!string.IsNullOrWhiteSpace(paymentToken))
|
|
||||||
{
|
|
||||||
await UpdatePaymentMethodAsync(user, paymentMethodType, paymentToken, taxInfo);
|
|
||||||
}
|
|
||||||
|
|
||||||
try
|
|
||||||
{
|
|
||||||
var customerGetOptions = new CustomerGetOptions();
|
|
||||||
customerGetOptions.AddExpand("tax");
|
|
||||||
customer = await _stripeAdapter.CustomerGetAsync(user.GatewayCustomerId, customerGetOptions);
|
|
||||||
}
|
|
||||||
catch
|
|
||||||
{
|
|
||||||
_logger.LogWarning(
|
|
||||||
"Attempted to get existing customer from Stripe, but customer ID was not found. Attempting to recreate customer...");
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if (customer == null && !string.IsNullOrWhiteSpace(paymentToken))
|
|
||||||
{
|
|
||||||
var stripeCustomerMetadata = new Dictionary<string, string>
|
|
||||||
{
|
|
||||||
{ "region", _globalSettings.BaseServiceUri.CloudRegion }
|
|
||||||
};
|
|
||||||
if (paymentMethodType == PaymentMethodType.PayPal)
|
|
||||||
{
|
|
||||||
var randomSuffix = Utilities.CoreHelpers.RandomString(3, upper: false, numeric: false);
|
|
||||||
var customerResult = await _btGateway.Customer.CreateAsync(new Braintree.CustomerRequest
|
|
||||||
{
|
|
||||||
PaymentMethodNonce = paymentToken,
|
|
||||||
Email = user.Email,
|
|
||||||
Id = user.BraintreeCustomerIdPrefix() + user.Id.ToString("N").ToLower() + randomSuffix,
|
|
||||||
CustomFields = new Dictionary<string, string>
|
|
||||||
{
|
|
||||||
[user.BraintreeIdField()] = user.Id.ToString(),
|
|
||||||
[user.BraintreeCloudRegionField()] = _globalSettings.BaseServiceUri.CloudRegion
|
|
||||||
}
|
|
||||||
});
|
|
||||||
|
|
||||||
if (!customerResult.IsSuccess() || customerResult.Target.PaymentMethods.Length == 0)
|
|
||||||
{
|
|
||||||
throw new GatewayException("Failed to create PayPal customer record.");
|
|
||||||
}
|
|
||||||
|
|
||||||
braintreeCustomer = customerResult.Target;
|
|
||||||
stripeCustomerMetadata.Add("btCustomerId", braintreeCustomer.Id);
|
|
||||||
}
|
|
||||||
else if (!stripePaymentMethod)
|
|
||||||
{
|
|
||||||
throw new GatewayException("Payment method is not supported at this time.");
|
|
||||||
}
|
|
||||||
|
|
||||||
var customerCreateOptions = new CustomerCreateOptions
|
|
||||||
{
|
|
||||||
Description = user.Name,
|
|
||||||
Email = user.Email,
|
|
||||||
Metadata = stripeCustomerMetadata,
|
|
||||||
PaymentMethod = stipeCustomerPaymentMethodId,
|
|
||||||
Source = stipeCustomerSourceToken,
|
|
||||||
InvoiceSettings = new CustomerInvoiceSettingsOptions
|
|
||||||
{
|
|
||||||
DefaultPaymentMethod = stipeCustomerPaymentMethodId,
|
|
||||||
CustomFields =
|
|
||||||
[
|
|
||||||
new CustomerInvoiceSettingsCustomFieldOptions()
|
|
||||||
{
|
|
||||||
Name = user.SubscriberType(),
|
|
||||||
Value = GetFirstThirtyCharacters(user.SubscriberName()),
|
|
||||||
}
|
|
||||||
|
|
||||||
]
|
|
||||||
},
|
|
||||||
Address = new AddressOptions
|
|
||||||
{
|
|
||||||
Line1 = string.Empty,
|
|
||||||
Country = taxInfo.BillingAddressCountry,
|
|
||||||
PostalCode = taxInfo.BillingAddressPostalCode,
|
|
||||||
},
|
|
||||||
};
|
|
||||||
customerCreateOptions.AddExpand("tax");
|
|
||||||
customer = await _stripeAdapter.CustomerCreateAsync(customerCreateOptions);
|
|
||||||
createdStripeCustomer = true;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (customer == null)
|
|
||||||
{
|
|
||||||
throw new GatewayException("Could not set up customer payment profile.");
|
|
||||||
}
|
|
||||||
|
|
||||||
var subCreateOptions = new SubscriptionCreateOptions
|
|
||||||
{
|
|
||||||
Customer = customer.Id,
|
|
||||||
Items = [],
|
|
||||||
Metadata = new Dictionary<string, string>
|
|
||||||
{
|
|
||||||
[user.GatewayIdField()] = user.Id.ToString()
|
|
||||||
}
|
|
||||||
};
|
|
||||||
|
|
||||||
subCreateOptions.Items.Add(new SubscriptionItemOptions
|
|
||||||
{
|
|
||||||
Plan = PremiumPlanId,
|
|
||||||
Quantity = 1
|
|
||||||
});
|
|
||||||
|
|
||||||
if (additionalStorageGb > 0)
|
|
||||||
{
|
|
||||||
subCreateOptions.Items.Add(new SubscriptionItemOptions
|
|
||||||
{
|
|
||||||
Plan = StoragePlanId,
|
|
||||||
Quantity = additionalStorageGb
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
subCreateOptions.EnableAutomaticTax(customer);
|
|
||||||
|
|
||||||
var subscription = await ChargeForNewSubscriptionAsync(user, customer, createdStripeCustomer,
|
|
||||||
stripePaymentMethod, paymentMethodType, subCreateOptions, braintreeCustomer);
|
|
||||||
|
|
||||||
user.Gateway = GatewayType.Stripe;
|
|
||||||
user.GatewayCustomerId = customer.Id;
|
|
||||||
user.GatewaySubscriptionId = subscription.Id;
|
|
||||||
|
|
||||||
if (subscription.Status == "incomplete" &&
|
|
||||||
subscription.LatestInvoice?.PaymentIntent?.Status == "requires_action")
|
|
||||||
{
|
|
||||||
return subscription.LatestInvoice.PaymentIntent.ClientSecret;
|
|
||||||
}
|
|
||||||
|
|
||||||
user.Premium = true;
|
|
||||||
user.PremiumExpirationDate = subscription.CurrentPeriodEnd;
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
private async Task<Subscription> ChargeForNewSubscriptionAsync(ISubscriber subscriber, Customer customer,
|
|
||||||
bool createdStripeCustomer, bool stripePaymentMethod, PaymentMethodType paymentMethodType,
|
|
||||||
SubscriptionCreateOptions subCreateOptions, Braintree.Customer braintreeCustomer)
|
|
||||||
{
|
|
||||||
var addedCreditToStripeCustomer = false;
|
|
||||||
Braintree.Transaction braintreeTransaction = null;
|
|
||||||
|
|
||||||
var subInvoiceMetadata = new Dictionary<string, string>();
|
|
||||||
Subscription subscription = null;
|
|
||||||
try
|
|
||||||
{
|
|
||||||
if (!stripePaymentMethod)
|
|
||||||
{
|
|
||||||
var previewInvoice = await _stripeAdapter.InvoiceUpcomingAsync(new UpcomingInvoiceOptions
|
|
||||||
{
|
|
||||||
Customer = customer.Id,
|
|
||||||
SubscriptionItems = ToInvoiceSubscriptionItemOptions(subCreateOptions.Items)
|
|
||||||
});
|
|
||||||
|
|
||||||
if (customer.HasTaxLocationVerified())
|
|
||||||
{
|
|
||||||
previewInvoice.AutomaticTax = new InvoiceAutomaticTax { Enabled = true };
|
|
||||||
}
|
|
||||||
|
|
||||||
if (previewInvoice.AmountDue > 0)
|
|
||||||
{
|
|
||||||
var braintreeCustomerId = customer.Metadata != null &&
|
|
||||||
customer.Metadata.ContainsKey("btCustomerId") ? customer.Metadata["btCustomerId"] : null;
|
|
||||||
if (!string.IsNullOrWhiteSpace(braintreeCustomerId))
|
|
||||||
{
|
|
||||||
var btInvoiceAmount = (previewInvoice.AmountDue / 100M);
|
|
||||||
var transactionResult = await _btGateway.Transaction.SaleAsync(
|
|
||||||
new Braintree.TransactionRequest
|
|
||||||
{
|
|
||||||
Amount = btInvoiceAmount,
|
|
||||||
CustomerId = braintreeCustomerId,
|
|
||||||
Options = new Braintree.TransactionOptionsRequest
|
|
||||||
{
|
|
||||||
SubmitForSettlement = true,
|
|
||||||
PayPal = new Braintree.TransactionOptionsPayPalRequest
|
|
||||||
{
|
|
||||||
CustomField = $"{subscriber.BraintreeIdField()}:{subscriber.Id},{subscriber.BraintreeCloudRegionField()}:{_globalSettings.BaseServiceUri.CloudRegion}"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
CustomFields = new Dictionary<string, string>
|
|
||||||
{
|
|
||||||
[subscriber.BraintreeIdField()] = subscriber.Id.ToString(),
|
|
||||||
[subscriber.BraintreeCloudRegionField()] = _globalSettings.BaseServiceUri.CloudRegion
|
|
||||||
}
|
|
||||||
});
|
|
||||||
|
|
||||||
if (!transactionResult.IsSuccess())
|
|
||||||
{
|
|
||||||
throw new GatewayException("Failed to charge PayPal customer.");
|
|
||||||
}
|
|
||||||
|
|
||||||
braintreeTransaction = transactionResult.Target;
|
|
||||||
subInvoiceMetadata.Add("btTransactionId", braintreeTransaction.Id);
|
|
||||||
subInvoiceMetadata.Add("btPayPalTransactionId",
|
|
||||||
braintreeTransaction.PayPalDetails.AuthorizationId);
|
|
||||||
}
|
|
||||||
else
|
|
||||||
{
|
|
||||||
throw new GatewayException("No payment was able to be collected.");
|
|
||||||
}
|
|
||||||
|
|
||||||
await _stripeAdapter.CustomerUpdateAsync(customer.Id, new CustomerUpdateOptions
|
|
||||||
{
|
|
||||||
Balance = customer.Balance - previewInvoice.AmountDue
|
|
||||||
});
|
|
||||||
addedCreditToStripeCustomer = true;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
else if (paymentMethodType == PaymentMethodType.Credit)
|
|
||||||
{
|
|
||||||
var upcomingInvoiceOptions = new UpcomingInvoiceOptions
|
|
||||||
{
|
|
||||||
Customer = customer.Id,
|
|
||||||
SubscriptionItems = ToInvoiceSubscriptionItemOptions(subCreateOptions.Items),
|
|
||||||
SubscriptionDefaultTaxRates = subCreateOptions.DefaultTaxRates,
|
|
||||||
};
|
|
||||||
|
|
||||||
upcomingInvoiceOptions.EnableAutomaticTax(customer, null);
|
|
||||||
|
|
||||||
var previewInvoice = await _stripeAdapter.InvoiceUpcomingAsync(upcomingInvoiceOptions);
|
|
||||||
|
|
||||||
if (previewInvoice.AmountDue > 0)
|
|
||||||
{
|
|
||||||
throw new GatewayException("Your account does not have enough credit available.");
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
subCreateOptions.OffSession = true;
|
|
||||||
subCreateOptions.AddExpand("latest_invoice.payment_intent");
|
|
||||||
|
|
||||||
subscription = await _stripeAdapter.SubscriptionCreateAsync(subCreateOptions);
|
|
||||||
if (subscription.Status == "incomplete" && subscription.LatestInvoice?.PaymentIntent != null)
|
|
||||||
{
|
|
||||||
if (subscription.LatestInvoice.PaymentIntent.Status == "requires_payment_method")
|
|
||||||
{
|
|
||||||
await _stripeAdapter.SubscriptionCancelAsync(subscription.Id, new SubscriptionCancelOptions());
|
|
||||||
throw new GatewayException("Payment method was declined.");
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if (!stripePaymentMethod && subInvoiceMetadata.Any())
|
|
||||||
{
|
|
||||||
var invoices = await _stripeAdapter.InvoiceListAsync(new StripeInvoiceListOptions
|
|
||||||
{
|
|
||||||
Subscription = subscription.Id
|
|
||||||
});
|
|
||||||
|
|
||||||
var invoice = invoices?.FirstOrDefault();
|
|
||||||
if (invoice == null)
|
|
||||||
{
|
|
||||||
throw new GatewayException("Invoice not found.");
|
|
||||||
}
|
|
||||||
|
|
||||||
await _stripeAdapter.InvoiceUpdateAsync(invoice.Id, new InvoiceUpdateOptions
|
|
||||||
{
|
|
||||||
Metadata = subInvoiceMetadata
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
return subscription;
|
|
||||||
}
|
|
||||||
catch (Exception e)
|
|
||||||
{
|
|
||||||
if (customer != null)
|
|
||||||
{
|
|
||||||
if (createdStripeCustomer)
|
|
||||||
{
|
|
||||||
await _stripeAdapter.CustomerDeleteAsync(customer.Id);
|
|
||||||
}
|
|
||||||
else if (addedCreditToStripeCustomer || customer.Balance < 0)
|
|
||||||
{
|
|
||||||
await _stripeAdapter.CustomerUpdateAsync(customer.Id, new CustomerUpdateOptions
|
|
||||||
{
|
|
||||||
Balance = customer.Balance
|
|
||||||
});
|
|
||||||
}
|
|
||||||
}
|
|
||||||
if (braintreeTransaction != null)
|
|
||||||
{
|
|
||||||
await _btGateway.Transaction.RefundAsync(braintreeTransaction.Id);
|
|
||||||
}
|
|
||||||
if (braintreeCustomer != null)
|
|
||||||
{
|
|
||||||
await _btGateway.Customer.DeleteAsync(braintreeCustomer.Id);
|
|
||||||
}
|
|
||||||
|
|
||||||
if (e is StripeException strEx &&
|
|
||||||
(strEx.StripeError?.Message?.Contains("cannot be used because it is not verified") ?? false))
|
|
||||||
{
|
|
||||||
throw new GatewayException("Bank account is not yet verified.");
|
|
||||||
}
|
|
||||||
|
|
||||||
throw;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
private List<InvoiceSubscriptionItemOptions> ToInvoiceSubscriptionItemOptions(
|
|
||||||
List<SubscriptionItemOptions> subItemOptions)
|
|
||||||
{
|
|
||||||
return subItemOptions.Select(si => new InvoiceSubscriptionItemOptions
|
|
||||||
{
|
|
||||||
Plan = si.Plan,
|
|
||||||
Price = si.Price,
|
|
||||||
Quantity = si.Quantity,
|
|
||||||
Id = si.Id
|
|
||||||
}).ToList();
|
|
||||||
}
|
|
||||||
|
|
||||||
private async Task<string> FinalizeSubscriptionChangeAsync(ISubscriber subscriber,
|
private async Task<string> FinalizeSubscriptionChangeAsync(ISubscriber subscriber,
|
||||||
SubscriptionUpdate subscriptionUpdate, bool invoiceNow = false)
|
SubscriptionUpdate subscriptionUpdate, bool invoiceNow = false)
|
||||||
{
|
{
|
||||||
@ -1400,7 +711,7 @@ public class StripePaymentService : IPaymentService
|
|||||||
new CustomerInvoiceSettingsCustomFieldOptions()
|
new CustomerInvoiceSettingsCustomFieldOptions()
|
||||||
{
|
{
|
||||||
Name = subscriber.SubscriberType(),
|
Name = subscriber.SubscriberType(),
|
||||||
Value = GetFirstThirtyCharacters(subscriber.SubscriberName()),
|
Value = subscriber.GetFormattedInvoiceName()
|
||||||
}
|
}
|
||||||
|
|
||||||
]
|
]
|
||||||
@ -1492,7 +803,7 @@ public class StripePaymentService : IPaymentService
|
|||||||
new CustomerInvoiceSettingsCustomFieldOptions()
|
new CustomerInvoiceSettingsCustomFieldOptions()
|
||||||
{
|
{
|
||||||
Name = subscriber.SubscriberType(),
|
Name = subscriber.SubscriberType(),
|
||||||
Value = GetFirstThirtyCharacters(subscriber.SubscriberName())
|
Value = subscriber.GetFormattedInvoiceName()
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -1560,7 +871,7 @@ public class StripePaymentService : IPaymentService
|
|||||||
var customer = await GetCustomerAsync(subscriber.GatewayCustomerId, GetCustomerPaymentOptions());
|
var customer = await GetCustomerAsync(subscriber.GatewayCustomerId, GetCustomerPaymentOptions());
|
||||||
var billingInfo = new BillingInfo
|
var billingInfo = new BillingInfo
|
||||||
{
|
{
|
||||||
Balance = GetBillingBalance(customer),
|
Balance = customer.GetBillingBalance(),
|
||||||
PaymentSource = await GetBillingPaymentSourceAsync(customer)
|
PaymentSource = await GetBillingPaymentSourceAsync(customer)
|
||||||
};
|
};
|
||||||
|
|
||||||
@ -1609,15 +920,12 @@ public class StripePaymentService : IPaymentService
|
|||||||
{
|
{
|
||||||
subscriptionInfo.Subscription = new SubscriptionInfo.BillingSubscription(sub);
|
subscriptionInfo.Subscription = new SubscriptionInfo.BillingSubscription(sub);
|
||||||
|
|
||||||
if (_featureService.IsEnabled(FeatureFlagKeys.AC1795_UpdatedSubscriptionStatusSection))
|
var (suspensionDate, unpaidPeriodEndDate) = await GetSuspensionDateAsync(sub);
|
||||||
{
|
|
||||||
var (suspensionDate, unpaidPeriodEndDate) = await GetSuspensionDateAsync(sub);
|
|
||||||
|
|
||||||
if (suspensionDate.HasValue && unpaidPeriodEndDate.HasValue)
|
if (suspensionDate.HasValue && unpaidPeriodEndDate.HasValue)
|
||||||
{
|
{
|
||||||
subscriptionInfo.Subscription.SuspensionDate = suspensionDate;
|
subscriptionInfo.Subscription.SuspensionDate = suspensionDate;
|
||||||
subscriptionInfo.Subscription.UnpaidPeriodEndDate = unpaidPeriodEndDate;
|
subscriptionInfo.Subscription.UnpaidPeriodEndDate = unpaidPeriodEndDate;
|
||||||
}
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -1771,27 +1079,6 @@ public class StripePaymentService : IPaymentService
|
|||||||
new SecretsManagerSubscribeUpdate(org, plan, additionalSmSeats, additionalServiceAccount),
|
new SecretsManagerSubscribeUpdate(org, plan, additionalSmSeats, additionalServiceAccount),
|
||||||
true);
|
true);
|
||||||
|
|
||||||
public async Task<bool> RisksSubscriptionFailure(Organization organization)
|
|
||||||
{
|
|
||||||
var subscriptionInfo = await GetSubscriptionAsync(organization);
|
|
||||||
|
|
||||||
if (subscriptionInfo.Subscription is not
|
|
||||||
{
|
|
||||||
Status: "active" or "trialing" or "past_due",
|
|
||||||
CollectionMethod: "charge_automatically"
|
|
||||||
}
|
|
||||||
|| subscriptionInfo.UpcomingInvoice == null)
|
|
||||||
{
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
var customer = await GetCustomerAsync(organization.GatewayCustomerId, GetCustomerPaymentOptions());
|
|
||||||
|
|
||||||
var paymentSource = await GetBillingPaymentSourceAsync(customer);
|
|
||||||
|
|
||||||
return paymentSource == null;
|
|
||||||
}
|
|
||||||
|
|
||||||
public async Task<bool> HasSecretsManagerStandalone(Organization organization)
|
public async Task<bool> HasSecretsManagerStandalone(Organization organization)
|
||||||
{
|
{
|
||||||
if (string.IsNullOrEmpty(organization.GatewayCustomerId))
|
if (string.IsNullOrEmpty(organization.GatewayCustomerId))
|
||||||
@ -1804,7 +1091,7 @@ public class StripePaymentService : IPaymentService
|
|||||||
return customer?.Discount?.Coupon?.Id == SecretsManagerStandaloneDiscountId;
|
return customer?.Discount?.Coupon?.Id == SecretsManagerStandaloneDiscountId;
|
||||||
}
|
}
|
||||||
|
|
||||||
public async Task<(DateTime?, DateTime?)> GetSuspensionDateAsync(Subscription subscription)
|
private async Task<(DateTime?, DateTime?)> GetSuspensionDateAsync(Subscription subscription)
|
||||||
{
|
{
|
||||||
if (subscription.Status is not "past_due" && subscription.Status is not "unpaid")
|
if (subscription.Status is not "past_due" && subscription.Status is not "unpaid")
|
||||||
{
|
{
|
||||||
@ -2120,11 +1407,6 @@ public class StripePaymentService : IPaymentService
|
|||||||
return cardPaymentMethods.OrderByDescending(m => m.Created).FirstOrDefault();
|
return cardPaymentMethods.OrderByDescending(m => m.Created).FirstOrDefault();
|
||||||
}
|
}
|
||||||
|
|
||||||
private decimal GetBillingBalance(Customer customer)
|
|
||||||
{
|
|
||||||
return customer != null ? customer.Balance / 100M : default;
|
|
||||||
}
|
|
||||||
|
|
||||||
private async Task<BillingInfo.BillingSource> GetBillingPaymentSourceAsync(Customer customer)
|
private async Task<BillingInfo.BillingSource> GetBillingPaymentSourceAsync(Customer customer)
|
||||||
{
|
{
|
||||||
if (customer == null)
|
if (customer == null)
|
||||||
@ -2255,18 +1537,4 @@ public class StripePaymentService : IPaymentService
|
|||||||
throw new GatewayException("Failed to retrieve current invoices", exception);
|
throw new GatewayException("Failed to retrieve current invoices", exception);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// We are taking only first 30 characters of the SubscriberName because stripe provide
|
|
||||||
// for 30 characters for custom_fields,see the link: https://stripe.com/docs/api/invoices/create
|
|
||||||
private static string GetFirstThirtyCharacters(string subscriberName)
|
|
||||||
{
|
|
||||||
if (string.IsNullOrWhiteSpace(subscriberName))
|
|
||||||
{
|
|
||||||
return string.Empty;
|
|
||||||
}
|
|
||||||
|
|
||||||
return subscriberName.Length <= 30
|
|
||||||
? subscriberName
|
|
||||||
: subscriberName[..30];
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
@ -1218,10 +1218,7 @@ public class UserService : UserManager<User>, IUserService, IDisposable
|
|||||||
? new UserLicense(user, _licenseService)
|
? new UserLicense(user, _licenseService)
|
||||||
: new UserLicense(user, subscriptionInfo, _licenseService);
|
: new UserLicense(user, subscriptionInfo, _licenseService);
|
||||||
|
|
||||||
if (_featureService.IsEnabled(FeatureFlagKeys.SelfHostLicenseRefactor))
|
userLicense.Token = await _licenseService.CreateUserTokenAsync(user, subscriptionInfo);
|
||||||
{
|
|
||||||
userLicense.Token = await _licenseService.CreateUserTokenAsync(user, subscriptionInfo);
|
|
||||||
}
|
|
||||||
|
|
||||||
return userLicense;
|
return userLicense;
|
||||||
}
|
}
|
||||||
|
@ -54,12 +54,11 @@ public class ImportCiphersCommand : IImportCiphersCommand
|
|||||||
public async Task ImportIntoIndividualVaultAsync(
|
public async Task ImportIntoIndividualVaultAsync(
|
||||||
List<Folder> folders,
|
List<Folder> folders,
|
||||||
List<CipherDetails> ciphers,
|
List<CipherDetails> ciphers,
|
||||||
IEnumerable<KeyValuePair<int, int>> folderRelationships)
|
IEnumerable<KeyValuePair<int, int>> folderRelationships,
|
||||||
|
Guid importingUserId)
|
||||||
{
|
{
|
||||||
var userId = folders.FirstOrDefault()?.UserId ?? ciphers.FirstOrDefault()?.UserId;
|
|
||||||
|
|
||||||
// Make sure the user can save new ciphers to their personal vault
|
// Make sure the user can save new ciphers to their personal vault
|
||||||
var anyPersonalOwnershipPolicies = await _policyService.AnyPoliciesApplicableToUserAsync(userId.Value, PolicyType.PersonalOwnership);
|
var anyPersonalOwnershipPolicies = await _policyService.AnyPoliciesApplicableToUserAsync(importingUserId, PolicyType.PersonalOwnership);
|
||||||
if (anyPersonalOwnershipPolicies)
|
if (anyPersonalOwnershipPolicies)
|
||||||
{
|
{
|
||||||
throw new BadRequestException("You cannot import items into your personal vault because you are " +
|
throw new BadRequestException("You cannot import items into your personal vault because you are " +
|
||||||
@ -76,7 +75,7 @@ public class ImportCiphersCommand : IImportCiphersCommand
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
var userfoldersIds = (await _folderRepository.GetManyByUserIdAsync(userId ?? Guid.Empty)).Select(f => f.Id).ToList();
|
var userfoldersIds = (await _folderRepository.GetManyByUserIdAsync(importingUserId)).Select(f => f.Id).ToList();
|
||||||
|
|
||||||
//Assign id to the ones that don't exist in DB
|
//Assign id to the ones that don't exist in DB
|
||||||
//Need to keep the list order to create the relationships
|
//Need to keep the list order to create the relationships
|
||||||
@ -109,10 +108,7 @@ public class ImportCiphersCommand : IImportCiphersCommand
|
|||||||
await _cipherRepository.CreateAsync(ciphers, newFolders);
|
await _cipherRepository.CreateAsync(ciphers, newFolders);
|
||||||
|
|
||||||
// push
|
// push
|
||||||
if (userId.HasValue)
|
await _pushService.PushSyncVaultAsync(importingUserId);
|
||||||
{
|
|
||||||
await _pushService.PushSyncVaultAsync(userId.Value);
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
public async Task ImportIntoOrganizationalVaultAsync(
|
public async Task ImportIntoOrganizationalVaultAsync(
|
||||||
|
@ -7,7 +7,7 @@ namespace Bit.Core.Tools.ImportFeatures.Interfaces;
|
|||||||
public interface IImportCiphersCommand
|
public interface IImportCiphersCommand
|
||||||
{
|
{
|
||||||
Task ImportIntoIndividualVaultAsync(List<Folder> folders, List<CipherDetails> ciphers,
|
Task ImportIntoIndividualVaultAsync(List<Folder> folders, List<CipherDetails> ciphers,
|
||||||
IEnumerable<KeyValuePair<int, int>> folderRelationships);
|
IEnumerable<KeyValuePair<int, int>> folderRelationships, Guid importingUserId);
|
||||||
|
|
||||||
Task ImportIntoOrganizationalVaultAsync(List<Collection> collections, List<CipherDetails> ciphers,
|
Task ImportIntoOrganizationalVaultAsync(List<Collection> collections, List<CipherDetails> ciphers,
|
||||||
IEnumerable<KeyValuePair<int, int>> collectionRelationships, Guid importingUserId);
|
IEnumerable<KeyValuePair<int, int>> collectionRelationships, Guid importingUserId);
|
||||||
|
@ -326,14 +326,14 @@ public class SendService : ISendService
|
|||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
var sendPolicyRequirement = await _policyRequirementQuery.GetAsync<SendPolicyRequirement>(userId.Value);
|
var disableSendRequirement = await _policyRequirementQuery.GetAsync<DisableSendPolicyRequirement>(userId.Value);
|
||||||
|
if (disableSendRequirement.DisableSend)
|
||||||
if (sendPolicyRequirement.DisableSend)
|
|
||||||
{
|
{
|
||||||
throw new BadRequestException("Due to an Enterprise Policy, you are only able to delete an existing Send.");
|
throw new BadRequestException("Due to an Enterprise Policy, you are only able to delete an existing Send.");
|
||||||
}
|
}
|
||||||
|
|
||||||
if (sendPolicyRequirement.DisableHideEmail && send.HideEmail.GetValueOrDefault())
|
var sendOptionsRequirement = await _policyRequirementQuery.GetAsync<SendOptionsPolicyRequirement>(userId.Value);
|
||||||
|
if (sendOptionsRequirement.DisableHideEmail && send.HideEmail.GetValueOrDefault())
|
||||||
{
|
{
|
||||||
throw new BadRequestException("Due to an Enterprise Policy, you are not allowed to hide your email address from recipients when creating or editing a Send.");
|
throw new BadRequestException("Due to an Enterprise Policy, you are not allowed to hide your email address from recipients when creating or editing a Send.");
|
||||||
}
|
}
|
||||||
|
@ -158,21 +158,4 @@ public static class StaticStore
|
|||||||
|
|
||||||
public static SponsoredPlan GetSponsoredPlan(PlanSponsorshipType planSponsorshipType) =>
|
public static SponsoredPlan GetSponsoredPlan(PlanSponsorshipType planSponsorshipType) =>
|
||||||
SponsoredPlans.FirstOrDefault(p => p.PlanSponsorshipType == planSponsorshipType);
|
SponsoredPlans.FirstOrDefault(p => p.PlanSponsorshipType == planSponsorshipType);
|
||||||
|
|
||||||
/// <summary>
|
|
||||||
/// Determines if the stripe plan id is an addon item by checking if the provided stripe plan id
|
|
||||||
/// matches either the <see cref="Plan.PasswordManagerPlanFeatures.StripeStoragePlanId"/> or <see cref="Plan.SecretsManagerPlanFeatures.StripeServiceAccountPlanId"/>
|
|
||||||
/// in any <see cref="Plans"/>.
|
|
||||||
/// </summary>
|
|
||||||
/// <param name="stripePlanId"></param>
|
|
||||||
/// <returns>
|
|
||||||
/// True if the stripePlanId is a addon product, false otherwise
|
|
||||||
/// </returns>
|
|
||||||
public static bool IsAddonSubscriptionItem(string stripePlanId)
|
|
||||||
{
|
|
||||||
// TODO: PRICING -> https://bitwarden.atlassian.net/browse/PM-16844
|
|
||||||
return Plans.Any(p =>
|
|
||||||
p.PasswordManager.StripeStoragePlanId == stripePlanId ||
|
|
||||||
(p.SecretsManager?.StripeServiceAccountPlanId == stripePlanId));
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
@ -7,7 +7,7 @@
|
|||||||
|
|
||||||
<PropertyGroup Condition=" '$(RunConfiguration)' == 'Icons' " />
|
<PropertyGroup Condition=" '$(RunConfiguration)' == 'Icons' " />
|
||||||
<ItemGroup>
|
<ItemGroup>
|
||||||
<PackageReference Include="AngleSharp" Version="1.1.2" />
|
<PackageReference Include="AngleSharp" Version="1.2.0" />
|
||||||
</ItemGroup>
|
</ItemGroup>
|
||||||
|
|
||||||
<ItemGroup>
|
<ItemGroup>
|
||||||
|
@ -250,6 +250,11 @@ public class DeviceValidator(
|
|||||||
var customResponse = new Dictionary<string, object>();
|
var customResponse = new Dictionary<string, object>();
|
||||||
switch (errorType)
|
switch (errorType)
|
||||||
{
|
{
|
||||||
|
/*
|
||||||
|
* The ErrorMessage is brittle and is used to control the flow in the clients. Do not change them without updating the client as well.
|
||||||
|
* There is a backwards compatibility issue as well: if you make a change on the clients then ensure that they are backwards
|
||||||
|
* compatible.
|
||||||
|
*/
|
||||||
case DeviceValidationResultType.InvalidUser:
|
case DeviceValidationResultType.InvalidUser:
|
||||||
result.ErrorDescription = "Invalid user";
|
result.ErrorDescription = "Invalid user";
|
||||||
customResponse.Add("ErrorModel", new ErrorResponseModel("invalid user"));
|
customResponse.Add("ErrorModel", new ErrorResponseModel("invalid user"));
|
||||||
|
@ -1,5 +1,4 @@
|
|||||||
using System.Text.Json;
|
using System.Text.Json;
|
||||||
using Bit.Core;
|
|
||||||
using Bit.Core.AdminConsole.Entities;
|
using Bit.Core.AdminConsole.Entities;
|
||||||
using Bit.Core.Auth.Enums;
|
using Bit.Core.Auth.Enums;
|
||||||
using Bit.Core.Auth.Identity.TokenProviders;
|
using Bit.Core.Auth.Identity.TokenProviders;
|
||||||
@ -155,12 +154,9 @@ public class TwoFactorAuthenticationValidator(
|
|||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (_featureService.IsEnabled(FeatureFlagKeys.RecoveryCodeLogin))
|
if (type is TwoFactorProviderType.RecoveryCode)
|
||||||
{
|
{
|
||||||
if (type is TwoFactorProviderType.RecoveryCode)
|
return await _userService.RecoverTwoFactorAsync(user, token);
|
||||||
{
|
|
||||||
return await _userService.RecoverTwoFactorAsync(user, token);
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// These cases we want to always return false, U2f is deprecated and OrganizationDuo
|
// These cases we want to always return false, U2f is deprecated and OrganizationDuo
|
||||||
|
@ -563,8 +563,8 @@ public class OrganizationUserRepository : Repository<OrganizationUser, Guid>, IO
|
|||||||
await using var connection = new SqlConnection(ConnectionString);
|
await using var connection = new SqlConnection(ConnectionString);
|
||||||
|
|
||||||
await connection.ExecuteAsync(
|
await connection.ExecuteAsync(
|
||||||
"[dbo].[OrganizationUser_SetStatusForUsersById]",
|
"[dbo].[OrganizationUser_SetStatusForUsersByGuidIdArray]",
|
||||||
new { OrganizationUserIds = JsonSerializer.Serialize(organizationUserIds), Status = OrganizationUserStatusType.Revoked },
|
new { OrganizationUserIds = organizationUserIds.ToGuidIdArrayTVP(), Status = OrganizationUserStatusType.Revoked },
|
||||||
commandType: CommandType.StoredProcedure);
|
commandType: CommandType.StoredProcedure);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -290,21 +290,33 @@ public class OrganizationRepository : Repository<Core.AdminConsole.Entities.Orga
|
|||||||
|
|
||||||
public async Task<ICollection<Core.AdminConsole.Entities.Organization>> GetByVerifiedUserEmailDomainAsync(Guid userId)
|
public async Task<ICollection<Core.AdminConsole.Entities.Organization>> GetByVerifiedUserEmailDomainAsync(Guid userId)
|
||||||
{
|
{
|
||||||
using (var scope = ServiceScopeFactory.CreateScope())
|
using var scope = ServiceScopeFactory.CreateScope();
|
||||||
{
|
|
||||||
var dbContext = GetDatabaseContext(scope);
|
|
||||||
|
|
||||||
var query = from u in dbContext.Users
|
var dbContext = GetDatabaseContext(scope);
|
||||||
join ou in dbContext.OrganizationUsers on u.Id equals ou.UserId
|
|
||||||
join o in dbContext.Organizations on ou.OrganizationId equals o.Id
|
var userQuery = from u in dbContext.Users
|
||||||
join od in dbContext.OrganizationDomains on ou.OrganizationId equals od.OrganizationId
|
|
||||||
where u.Id == userId
|
where u.Id == userId
|
||||||
&& od.VerifiedDate != null
|
select u;
|
||||||
&& u.Email.ToLower().EndsWith("@" + od.DomainName.ToLower())
|
|
||||||
select o;
|
|
||||||
|
|
||||||
return await query.ToArrayAsync();
|
var user = await userQuery.FirstOrDefaultAsync();
|
||||||
|
|
||||||
|
if (user is null)
|
||||||
|
{
|
||||||
|
return new List<Core.AdminConsole.Entities.Organization>();
|
||||||
}
|
}
|
||||||
|
|
||||||
|
var userWithDomain = new { UserId = user.Id, EmailDomain = user.Email.Split('@').Last() };
|
||||||
|
|
||||||
|
var query = from o in dbContext.Organizations
|
||||||
|
join ou in dbContext.OrganizationUsers on o.Id equals ou.OrganizationId
|
||||||
|
join od in dbContext.OrganizationDomains on ou.OrganizationId equals od.OrganizationId
|
||||||
|
where ou.UserId == userWithDomain.UserId &&
|
||||||
|
od.DomainName == userWithDomain.EmailDomain &&
|
||||||
|
od.VerifiedDate != null &&
|
||||||
|
o.Enabled == true
|
||||||
|
select o;
|
||||||
|
|
||||||
|
return await query.ToArrayAsync();
|
||||||
}
|
}
|
||||||
|
|
||||||
public async Task<ICollection<Core.AdminConsole.Entities.Organization>> GetAddableToProviderByUserIdAsync(
|
public async Task<ICollection<Core.AdminConsole.Entities.Organization>> GetAddableToProviderByUserIdAsync(
|
||||||
|
@ -6,6 +6,7 @@
|
|||||||
@RequestDeviceIdentifier NVARCHAR(50),
|
@RequestDeviceIdentifier NVARCHAR(50),
|
||||||
@RequestDeviceType TINYINT,
|
@RequestDeviceType TINYINT,
|
||||||
@RequestIpAddress VARCHAR(50),
|
@RequestIpAddress VARCHAR(50),
|
||||||
|
@RequestCountryName NVARCHAR(200),
|
||||||
@ResponseDeviceId UNIQUEIDENTIFIER,
|
@ResponseDeviceId UNIQUEIDENTIFIER,
|
||||||
@AccessCode VARCHAR(25),
|
@AccessCode VARCHAR(25),
|
||||||
@PublicKey VARCHAR(MAX),
|
@PublicKey VARCHAR(MAX),
|
||||||
@ -20,7 +21,7 @@ BEGIN
|
|||||||
SET NOCOUNT ON
|
SET NOCOUNT ON
|
||||||
|
|
||||||
INSERT INTO [dbo].[AuthRequest]
|
INSERT INTO [dbo].[AuthRequest]
|
||||||
(
|
(
|
||||||
[Id],
|
[Id],
|
||||||
[UserId],
|
[UserId],
|
||||||
[OrganizationId],
|
[OrganizationId],
|
||||||
@ -28,6 +29,7 @@ BEGIN
|
|||||||
[RequestDeviceIdentifier],
|
[RequestDeviceIdentifier],
|
||||||
[RequestDeviceType],
|
[RequestDeviceType],
|
||||||
[RequestIpAddress],
|
[RequestIpAddress],
|
||||||
|
[RequestCountryName],
|
||||||
[ResponseDeviceId],
|
[ResponseDeviceId],
|
||||||
[AccessCode],
|
[AccessCode],
|
||||||
[PublicKey],
|
[PublicKey],
|
||||||
@ -37,24 +39,25 @@ BEGIN
|
|||||||
[CreationDate],
|
[CreationDate],
|
||||||
[ResponseDate],
|
[ResponseDate],
|
||||||
[AuthenticationDate]
|
[AuthenticationDate]
|
||||||
)
|
)
|
||||||
VALUES
|
VALUES
|
||||||
(
|
(
|
||||||
@Id,
|
@Id,
|
||||||
@UserId,
|
@UserId,
|
||||||
@OrganizationId,
|
@OrganizationId,
|
||||||
@Type,
|
@Type,
|
||||||
@RequestDeviceIdentifier,
|
@RequestDeviceIdentifier,
|
||||||
@RequestDeviceType,
|
@RequestDeviceType,
|
||||||
@RequestIpAddress,
|
@RequestIpAddress,
|
||||||
@ResponseDeviceId,
|
@RequestCountryName,
|
||||||
@AccessCode,
|
@ResponseDeviceId,
|
||||||
@PublicKey,
|
@AccessCode,
|
||||||
@Key,
|
@PublicKey,
|
||||||
@MasterPasswordHash,
|
@Key,
|
||||||
@Approved,
|
@MasterPasswordHash,
|
||||||
@CreationDate,
|
@Approved,
|
||||||
@ResponseDate,
|
@CreationDate,
|
||||||
@AuthenticationDate
|
@ResponseDate,
|
||||||
|
@AuthenticationDate
|
||||||
)
|
)
|
||||||
END
|
END
|
||||||
|
@ -2,10 +2,11 @@
|
|||||||
@Id UNIQUEIDENTIFIER OUTPUT,
|
@Id UNIQUEIDENTIFIER OUTPUT,
|
||||||
@UserId UNIQUEIDENTIFIER,
|
@UserId UNIQUEIDENTIFIER,
|
||||||
@OrganizationId UNIQUEIDENTIFIER = NULL,
|
@OrganizationId UNIQUEIDENTIFIER = NULL,
|
||||||
@Type SMALLINT,
|
@Type SMALLINT,
|
||||||
@RequestDeviceIdentifier NVARCHAR(50),
|
@RequestDeviceIdentifier NVARCHAR(50),
|
||||||
@RequestDeviceType SMALLINT,
|
@RequestDeviceType SMALLINT,
|
||||||
@RequestIpAddress VARCHAR(50),
|
@RequestIpAddress VARCHAR(50),
|
||||||
|
@RequestCountryName NVARCHAR(200),
|
||||||
@ResponseDeviceId UNIQUEIDENTIFIER,
|
@ResponseDeviceId UNIQUEIDENTIFIER,
|
||||||
@AccessCode VARCHAR(25),
|
@AccessCode VARCHAR(25),
|
||||||
@PublicKey VARCHAR(MAX),
|
@PublicKey VARCHAR(MAX),
|
||||||
@ -14,29 +15,30 @@
|
|||||||
@Approved BIT,
|
@Approved BIT,
|
||||||
@CreationDate DATETIME2 (7),
|
@CreationDate DATETIME2 (7),
|
||||||
@ResponseDate DATETIME2 (7),
|
@ResponseDate DATETIME2 (7),
|
||||||
@AuthenticationDate DATETIME2 (7)
|
@AuthenticationDate DATETIME2 (7)
|
||||||
AS
|
AS
|
||||||
BEGIN
|
BEGIN
|
||||||
SET NOCOUNT ON
|
SET NOCOUNT ON
|
||||||
|
|
||||||
UPDATE
|
UPDATE
|
||||||
[dbo].[AuthRequest]
|
[dbo].[AuthRequest]
|
||||||
SET
|
SET
|
||||||
[UserId] = @UserId,
|
[UserId] = @UserId,
|
||||||
[Type] = @Type,
|
[Type] = @Type,
|
||||||
[OrganizationId] = @OrganizationId,
|
[OrganizationId] = @OrganizationId,
|
||||||
[RequestDeviceIdentifier] = @RequestDeviceIdentifier,
|
[RequestDeviceIdentifier] = @RequestDeviceIdentifier,
|
||||||
[RequestDeviceType] = @RequestDeviceType,
|
[RequestDeviceType] = @RequestDeviceType,
|
||||||
[RequestIpAddress] = @RequestIpAddress,
|
[RequestIpAddress] = @RequestIpAddress,
|
||||||
[ResponseDeviceId] = @ResponseDeviceId,
|
[RequestCountryName] = @RequestCountryName,
|
||||||
[AccessCode] = @AccessCode,
|
[ResponseDeviceId] = @ResponseDeviceId,
|
||||||
[PublicKey] = @PublicKey,
|
[AccessCode] = @AccessCode,
|
||||||
[Key] = @Key,
|
[PublicKey] = @PublicKey,
|
||||||
[MasterPasswordHash] = @MasterPasswordHash,
|
[Key] = @Key,
|
||||||
[Approved] = @Approved,
|
[MasterPasswordHash] = @MasterPasswordHash,
|
||||||
[CreationDate] = @CreationDate,
|
[Approved] = @Approved,
|
||||||
[ResponseDate] = @ResponseDate,
|
[CreationDate] = @CreationDate,
|
||||||
[AuthenticationDate] = @AuthenticationDate
|
[ResponseDate] = @ResponseDate,
|
||||||
WHERE
|
[AuthenticationDate] = @AuthenticationDate
|
||||||
[Id] = @Id
|
WHERE
|
||||||
|
[Id] = @Id
|
||||||
END
|
END
|
||||||
|
@ -10,6 +10,7 @@ BEGIN
|
|||||||
[RequestDeviceIdentifier] = ARI.[RequestDeviceIdentifier],
|
[RequestDeviceIdentifier] = ARI.[RequestDeviceIdentifier],
|
||||||
[RequestDeviceType] = ARI.[RequestDeviceType],
|
[RequestDeviceType] = ARI.[RequestDeviceType],
|
||||||
[RequestIpAddress] = ARI.[RequestIpAddress],
|
[RequestIpAddress] = ARI.[RequestIpAddress],
|
||||||
|
[RequestCountryName] = ARI.[RequestCountryName],
|
||||||
[ResponseDeviceId] = ARI.[ResponseDeviceId],
|
[ResponseDeviceId] = ARI.[ResponseDeviceId],
|
||||||
[AccessCode] = ARI.[AccessCode],
|
[AccessCode] = ARI.[AccessCode],
|
||||||
[PublicKey] = ARI.[PublicKey],
|
[PublicKey] = ARI.[PublicKey],
|
||||||
@ -22,7 +23,7 @@ BEGIN
|
|||||||
[OrganizationId] = ARI.[OrganizationId]
|
[OrganizationId] = ARI.[OrganizationId]
|
||||||
FROM
|
FROM
|
||||||
[dbo].[AuthRequest] AR
|
[dbo].[AuthRequest] AR
|
||||||
INNER JOIN
|
INNER JOIN
|
||||||
OPENJSON(@jsonData)
|
OPENJSON(@jsonData)
|
||||||
WITH (
|
WITH (
|
||||||
Id UNIQUEIDENTIFIER '$.Id',
|
Id UNIQUEIDENTIFIER '$.Id',
|
||||||
@ -31,6 +32,7 @@ BEGIN
|
|||||||
RequestDeviceIdentifier NVARCHAR(50) '$.RequestDeviceIdentifier',
|
RequestDeviceIdentifier NVARCHAR(50) '$.RequestDeviceIdentifier',
|
||||||
RequestDeviceType SMALLINT '$.RequestDeviceType',
|
RequestDeviceType SMALLINT '$.RequestDeviceType',
|
||||||
RequestIpAddress VARCHAR(50) '$.RequestIpAddress',
|
RequestIpAddress VARCHAR(50) '$.RequestIpAddress',
|
||||||
|
RequestCountryName NVARCHAR(200) '$.RequestCountryName',
|
||||||
ResponseDeviceId UNIQUEIDENTIFIER '$.ResponseDeviceId',
|
ResponseDeviceId UNIQUEIDENTIFIER '$.ResponseDeviceId',
|
||||||
AccessCode VARCHAR(25) '$.AccessCode',
|
AccessCode VARCHAR(25) '$.AccessCode',
|
||||||
PublicKey VARCHAR(MAX) '$.PublicKey',
|
PublicKey VARCHAR(MAX) '$.PublicKey',
|
||||||
|
@ -15,11 +15,11 @@
|
|||||||
[ResponseDate] DATETIME2 (7) NULL,
|
[ResponseDate] DATETIME2 (7) NULL,
|
||||||
[AuthenticationDate] DATETIME2 (7) NULL,
|
[AuthenticationDate] DATETIME2 (7) NULL,
|
||||||
[OrganizationId] UNIQUEIDENTIFIER NULL,
|
[OrganizationId] UNIQUEIDENTIFIER NULL,
|
||||||
|
[RequestCountryName] NVARCHAR(200) NULL,
|
||||||
CONSTRAINT [PK_AuthRequest] PRIMARY KEY CLUSTERED ([Id] ASC),
|
CONSTRAINT [PK_AuthRequest] PRIMARY KEY CLUSTERED ([Id] ASC),
|
||||||
CONSTRAINT [FK_AuthRequest_User] FOREIGN KEY ([UserId]) REFERENCES [dbo].[User] ([Id]),
|
CONSTRAINT [FK_AuthRequest_User] FOREIGN KEY ([UserId]) REFERENCES [dbo].[User] ([Id]),
|
||||||
CONSTRAINT [FK_AuthRequest_ResponseDevice] FOREIGN KEY ([ResponseDeviceId]) REFERENCES [dbo].[Device] ([Id]),
|
CONSTRAINT [FK_AuthRequest_ResponseDevice] FOREIGN KEY ([ResponseDeviceId]) REFERENCES [dbo].[Device] ([Id]),
|
||||||
CONSTRAINT [FK_AuthRequest_Organization] FOREIGN KEY ([OrganizationId]) REFERENCES [dbo].[Organization] ([Id])
|
CONSTRAINT [FK_AuthRequest_Organization] FOREIGN KEY ([OrganizationId]) REFERENCES [dbo].[Organization] ([Id])
|
||||||
);
|
);
|
||||||
|
|
||||||
|
|
||||||
GO
|
GO
|
||||||
|
@ -0,0 +1,14 @@
|
|||||||
|
CREATE PROCEDURE [dbo].[OrganizationUser_SetStatusForUsersByGuidIdArray]
|
||||||
|
@OrganizationUserIds AS [dbo].[GuidIdArray] READONLY,
|
||||||
|
@Status SMALLINT
|
||||||
|
AS
|
||||||
|
BEGIN
|
||||||
|
SET NOCOUNT ON
|
||||||
|
|
||||||
|
UPDATE OU
|
||||||
|
SET OU.[Status] = @Status
|
||||||
|
FROM [dbo].[OrganizationUser] OU
|
||||||
|
INNER JOIN @OrganizationUserIds OUI ON OUI.[Id] = OU.[Id]
|
||||||
|
|
||||||
|
EXEC [dbo].[User_BumpAccountRevisionDateByOrganizationUserIds] @OrganizationUserIds
|
||||||
|
END
|
@ -4,12 +4,19 @@ AS
|
|||||||
BEGIN
|
BEGIN
|
||||||
SET NOCOUNT ON;
|
SET NOCOUNT ON;
|
||||||
|
|
||||||
|
WITH CTE_User AS (
|
||||||
|
SELECT
|
||||||
|
U.*,
|
||||||
|
SUBSTRING(U.Email, CHARINDEX('@', U.Email) + 1, LEN(U.Email)) AS EmailDomain
|
||||||
|
FROM dbo.[UserView] U
|
||||||
|
WHERE U.[Id] = @UserId
|
||||||
|
)
|
||||||
SELECT O.*
|
SELECT O.*
|
||||||
FROM [dbo].[UserView] U
|
FROM CTE_User CU
|
||||||
INNER JOIN [dbo].[OrganizationUserView] OU ON U.[Id] = OU.[UserId]
|
INNER JOIN dbo.[OrganizationUserView] OU ON CU.[Id] = OU.[UserId]
|
||||||
INNER JOIN [dbo].[OrganizationView] O ON OU.[OrganizationId] = O.[Id]
|
INNER JOIN dbo.[OrganizationView] O ON OU.[OrganizationId] = O.[Id]
|
||||||
INNER JOIN [dbo].[OrganizationDomainView] OD ON OU.[OrganizationId] = OD.[OrganizationId]
|
INNER JOIN dbo.[OrganizationDomainView] OD ON OU.[OrganizationId] = OD.[OrganizationId]
|
||||||
WHERE U.[Id] = @UserId
|
WHERE OD.[VerifiedDate] IS NOT NULL
|
||||||
AND OD.[VerifiedDate] IS NOT NULL
|
AND CU.EmailDomain = OD.[DomainName]
|
||||||
AND U.[Email] LIKE '%@' + OD.[DomainName];
|
AND O.[Enabled] = 1
|
||||||
END
|
END
|
||||||
|
@ -17,7 +17,8 @@
|
|||||||
@RevisionDate DATETIME2(7),
|
@RevisionDate DATETIME2(7),
|
||||||
@Gateway TINYINT = 0,
|
@Gateway TINYINT = 0,
|
||||||
@GatewayCustomerId VARCHAR(50) = NULL,
|
@GatewayCustomerId VARCHAR(50) = NULL,
|
||||||
@GatewaySubscriptionId VARCHAR(50) = NULL
|
@GatewaySubscriptionId VARCHAR(50) = NULL,
|
||||||
|
@DiscountId VARCHAR(50) = NULL
|
||||||
AS
|
AS
|
||||||
BEGIN
|
BEGIN
|
||||||
SET NOCOUNT ON
|
SET NOCOUNT ON
|
||||||
@ -42,7 +43,8 @@ BEGIN
|
|||||||
[RevisionDate],
|
[RevisionDate],
|
||||||
[Gateway],
|
[Gateway],
|
||||||
[GatewayCustomerId],
|
[GatewayCustomerId],
|
||||||
[GatewaySubscriptionId]
|
[GatewaySubscriptionId],
|
||||||
|
[DiscountId]
|
||||||
)
|
)
|
||||||
VALUES
|
VALUES
|
||||||
(
|
(
|
||||||
@ -64,6 +66,7 @@ BEGIN
|
|||||||
@RevisionDate,
|
@RevisionDate,
|
||||||
@Gateway,
|
@Gateway,
|
||||||
@GatewayCustomerId,
|
@GatewayCustomerId,
|
||||||
@GatewaySubscriptionId
|
@GatewaySubscriptionId,
|
||||||
|
@DiscountId
|
||||||
)
|
)
|
||||||
END
|
END
|
||||||
|
@ -17,7 +17,8 @@
|
|||||||
@RevisionDate DATETIME2(7),
|
@RevisionDate DATETIME2(7),
|
||||||
@Gateway TINYINT = 0,
|
@Gateway TINYINT = 0,
|
||||||
@GatewayCustomerId VARCHAR(50) = NULL,
|
@GatewayCustomerId VARCHAR(50) = NULL,
|
||||||
@GatewaySubscriptionId VARCHAR(50) = NULL
|
@GatewaySubscriptionId VARCHAR(50) = NULL,
|
||||||
|
@DiscountId VARCHAR(50) = NULL
|
||||||
AS
|
AS
|
||||||
BEGIN
|
BEGIN
|
||||||
SET NOCOUNT ON
|
SET NOCOUNT ON
|
||||||
@ -42,7 +43,8 @@ BEGIN
|
|||||||
[RevisionDate] = @RevisionDate,
|
[RevisionDate] = @RevisionDate,
|
||||||
[Gateway] = @Gateway,
|
[Gateway] = @Gateway,
|
||||||
[GatewayCustomerId] = @GatewayCustomerId,
|
[GatewayCustomerId] = @GatewayCustomerId,
|
||||||
[GatewaySubscriptionId] = @GatewaySubscriptionId
|
[GatewaySubscriptionId] = @GatewaySubscriptionId,
|
||||||
|
[DiscountId] = @DiscountId
|
||||||
WHERE
|
WHERE
|
||||||
[Id] = @Id
|
[Id] = @Id
|
||||||
END
|
END
|
||||||
|
@ -22,3 +22,8 @@ CREATE NONCLUSTERED INDEX [IX_OrganizationDomain_VerifiedDate]
|
|||||||
ON [dbo].[OrganizationDomain] ([VerifiedDate])
|
ON [dbo].[OrganizationDomain] ([VerifiedDate])
|
||||||
INCLUDE ([OrganizationId],[DomainName]);
|
INCLUDE ([OrganizationId],[DomainName]);
|
||||||
GO
|
GO
|
||||||
|
|
||||||
|
CREATE NONCLUSTERED INDEX [IX_OrganizationDomain_DomainNameVerifiedDateOrganizationId]
|
||||||
|
ON [dbo].[OrganizationDomain] ([DomainName],[VerifiedDate])
|
||||||
|
INCLUDE ([OrganizationId])
|
||||||
|
GO
|
||||||
|
@ -18,5 +18,6 @@
|
|||||||
[Gateway] TINYINT NULL,
|
[Gateway] TINYINT NULL,
|
||||||
[GatewayCustomerId] VARCHAR (50) NULL,
|
[GatewayCustomerId] VARCHAR (50) NULL,
|
||||||
[GatewaySubscriptionId] VARCHAR (50) NULL,
|
[GatewaySubscriptionId] VARCHAR (50) NULL,
|
||||||
|
[DiscountId] VARCHAR (50) NULL,
|
||||||
CONSTRAINT [PK_Provider] PRIMARY KEY CLUSTERED ([Id] ASC)
|
CONSTRAINT [PK_Provider] PRIMARY KEY CLUSTERED ([Id] ASC)
|
||||||
);
|
);
|
||||||
|
@ -15,16 +15,12 @@ using Bit.Core.Auth.Models.Api.Request.Accounts;
|
|||||||
using Bit.Core.Auth.Models.Data;
|
using Bit.Core.Auth.Models.Data;
|
||||||
using Bit.Core.Auth.UserFeatures.TdeOffboardingPassword.Interfaces;
|
using Bit.Core.Auth.UserFeatures.TdeOffboardingPassword.Interfaces;
|
||||||
using Bit.Core.Auth.UserFeatures.UserMasterPassword.Interfaces;
|
using Bit.Core.Auth.UserFeatures.UserMasterPassword.Interfaces;
|
||||||
using Bit.Core.Billing.Services;
|
|
||||||
using Bit.Core.Context;
|
|
||||||
using Bit.Core.Entities;
|
using Bit.Core.Entities;
|
||||||
using Bit.Core.Exceptions;
|
using Bit.Core.Exceptions;
|
||||||
using Bit.Core.KeyManagement.UserKey;
|
using Bit.Core.KeyManagement.UserKey;
|
||||||
using Bit.Core.Repositories;
|
using Bit.Core.Repositories;
|
||||||
using Bit.Core.Services;
|
using Bit.Core.Services;
|
||||||
using Bit.Core.Settings;
|
|
||||||
using Bit.Core.Tools.Entities;
|
using Bit.Core.Tools.Entities;
|
||||||
using Bit.Core.Tools.Services;
|
|
||||||
using Bit.Core.Vault.Entities;
|
using Bit.Core.Vault.Entities;
|
||||||
using Bit.Test.Common.AutoFixture.Attributes;
|
using Bit.Test.Common.AutoFixture.Attributes;
|
||||||
using Microsoft.AspNetCore.Identity;
|
using Microsoft.AspNetCore.Identity;
|
||||||
@ -37,10 +33,8 @@ public class AccountsControllerTests : IDisposable
|
|||||||
{
|
{
|
||||||
|
|
||||||
private readonly AccountsController _sut;
|
private readonly AccountsController _sut;
|
||||||
private readonly GlobalSettings _globalSettings;
|
|
||||||
private readonly IOrganizationService _organizationService;
|
private readonly IOrganizationService _organizationService;
|
||||||
private readonly IOrganizationUserRepository _organizationUserRepository;
|
private readonly IOrganizationUserRepository _organizationUserRepository;
|
||||||
private readonly IPaymentService _paymentService;
|
|
||||||
private readonly IUserService _userService;
|
private readonly IUserService _userService;
|
||||||
private readonly IProviderUserRepository _providerUserRepository;
|
private readonly IProviderUserRepository _providerUserRepository;
|
||||||
private readonly IPolicyService _policyService;
|
private readonly IPolicyService _policyService;
|
||||||
@ -48,9 +42,6 @@ public class AccountsControllerTests : IDisposable
|
|||||||
private readonly IRotateUserKeyCommand _rotateUserKeyCommand;
|
private readonly IRotateUserKeyCommand _rotateUserKeyCommand;
|
||||||
private readonly ITdeOffboardingPasswordCommand _tdeOffboardingPasswordCommand;
|
private readonly ITdeOffboardingPasswordCommand _tdeOffboardingPasswordCommand;
|
||||||
private readonly IFeatureService _featureService;
|
private readonly IFeatureService _featureService;
|
||||||
private readonly ISubscriberService _subscriberService;
|
|
||||||
private readonly IReferenceEventService _referenceEventService;
|
|
||||||
private readonly ICurrentContext _currentContext;
|
|
||||||
|
|
||||||
private readonly IRotationValidator<IEnumerable<CipherWithIdRequestModel>, IEnumerable<Cipher>> _cipherValidator;
|
private readonly IRotationValidator<IEnumerable<CipherWithIdRequestModel>, IEnumerable<Cipher>> _cipherValidator;
|
||||||
private readonly IRotationValidator<IEnumerable<FolderWithIdRequestModel>, IEnumerable<Folder>> _folderValidator;
|
private readonly IRotationValidator<IEnumerable<FolderWithIdRequestModel>, IEnumerable<Folder>> _folderValidator;
|
||||||
@ -70,16 +61,11 @@ public class AccountsControllerTests : IDisposable
|
|||||||
_organizationService = Substitute.For<IOrganizationService>();
|
_organizationService = Substitute.For<IOrganizationService>();
|
||||||
_organizationUserRepository = Substitute.For<IOrganizationUserRepository>();
|
_organizationUserRepository = Substitute.For<IOrganizationUserRepository>();
|
||||||
_providerUserRepository = Substitute.For<IProviderUserRepository>();
|
_providerUserRepository = Substitute.For<IProviderUserRepository>();
|
||||||
_paymentService = Substitute.For<IPaymentService>();
|
|
||||||
_globalSettings = new GlobalSettings();
|
|
||||||
_policyService = Substitute.For<IPolicyService>();
|
_policyService = Substitute.For<IPolicyService>();
|
||||||
_setInitialMasterPasswordCommand = Substitute.For<ISetInitialMasterPasswordCommand>();
|
_setInitialMasterPasswordCommand = Substitute.For<ISetInitialMasterPasswordCommand>();
|
||||||
_rotateUserKeyCommand = Substitute.For<IRotateUserKeyCommand>();
|
_rotateUserKeyCommand = Substitute.For<IRotateUserKeyCommand>();
|
||||||
_tdeOffboardingPasswordCommand = Substitute.For<ITdeOffboardingPasswordCommand>();
|
_tdeOffboardingPasswordCommand = Substitute.For<ITdeOffboardingPasswordCommand>();
|
||||||
_featureService = Substitute.For<IFeatureService>();
|
_featureService = Substitute.For<IFeatureService>();
|
||||||
_subscriberService = Substitute.For<ISubscriberService>();
|
|
||||||
_referenceEventService = Substitute.For<IReferenceEventService>();
|
|
||||||
_currentContext = Substitute.For<ICurrentContext>();
|
|
||||||
_cipherValidator =
|
_cipherValidator =
|
||||||
Substitute.For<IRotationValidator<IEnumerable<CipherWithIdRequestModel>, IEnumerable<Cipher>>>();
|
Substitute.For<IRotationValidator<IEnumerable<CipherWithIdRequestModel>, IEnumerable<Cipher>>>();
|
||||||
_folderValidator =
|
_folderValidator =
|
||||||
@ -93,20 +79,15 @@ public class AccountsControllerTests : IDisposable
|
|||||||
IReadOnlyList<OrganizationUser>>>();
|
IReadOnlyList<OrganizationUser>>>();
|
||||||
|
|
||||||
_sut = new AccountsController(
|
_sut = new AccountsController(
|
||||||
_globalSettings,
|
|
||||||
_organizationService,
|
_organizationService,
|
||||||
_organizationUserRepository,
|
_organizationUserRepository,
|
||||||
_providerUserRepository,
|
_providerUserRepository,
|
||||||
_paymentService,
|
|
||||||
_userService,
|
_userService,
|
||||||
_policyService,
|
_policyService,
|
||||||
_setInitialMasterPasswordCommand,
|
_setInitialMasterPasswordCommand,
|
||||||
_tdeOffboardingPasswordCommand,
|
_tdeOffboardingPasswordCommand,
|
||||||
_rotateUserKeyCommand,
|
_rotateUserKeyCommand,
|
||||||
_featureService,
|
_featureService,
|
||||||
_subscriberService,
|
|
||||||
_referenceEventService,
|
|
||||||
_currentContext,
|
|
||||||
_cipherValidator,
|
_cipherValidator,
|
||||||
_folderValidator,
|
_folderValidator,
|
||||||
_sendValidator,
|
_sendValidator,
|
||||||
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
x
Reference in New Issue
Block a user