mirror of
https://github.com/bitwarden/server.git
synced 2025-04-05 13:08:17 -05:00
PM-16261 move ImportCiphersAsync to the tools team (#5245)
* PM-16261 move ImportCiphersAsync to the tools team and create services using CQRS design pattern * PM-16261 fix renaming methods and add unit tests for succes and bad request exception * PM-16261 clean up old code from test
This commit is contained in:
parent
36c8a97d56
commit
99a1dbbe02
@ -29,6 +29,7 @@ using Bit.Core.Vault.Entities;
|
|||||||
using Bit.Api.Auth.Models.Request.WebAuthn;
|
using Bit.Api.Auth.Models.Request.WebAuthn;
|
||||||
using Bit.Core.Auth.Models.Data;
|
using Bit.Core.Auth.Models.Data;
|
||||||
using Bit.Core.Auth.Identity.TokenProviders;
|
using Bit.Core.Auth.Identity.TokenProviders;
|
||||||
|
using Bit.Core.Tools.ImportFeatures;
|
||||||
using Bit.Core.Tools.ReportFeatures;
|
using Bit.Core.Tools.ReportFeatures;
|
||||||
|
|
||||||
|
|
||||||
@ -175,6 +176,7 @@ public class Startup
|
|||||||
services.AddCoreLocalizationServices();
|
services.AddCoreLocalizationServices();
|
||||||
services.AddBillingOperations();
|
services.AddBillingOperations();
|
||||||
services.AddReportingServices();
|
services.AddReportingServices();
|
||||||
|
services.AddImportServices();
|
||||||
|
|
||||||
// Authorization Handlers
|
// Authorization Handlers
|
||||||
services.AddAuthorizationHandlers();
|
services.AddAuthorizationHandlers();
|
||||||
|
@ -7,7 +7,7 @@ using Bit.Core.Exceptions;
|
|||||||
using Bit.Core.Repositories;
|
using Bit.Core.Repositories;
|
||||||
using Bit.Core.Services;
|
using Bit.Core.Services;
|
||||||
using Bit.Core.Settings;
|
using Bit.Core.Settings;
|
||||||
using Bit.Core.Vault.Services;
|
using Bit.Core.Tools.ImportFeatures.Interfaces;
|
||||||
using Microsoft.AspNetCore.Authorization;
|
using Microsoft.AspNetCore.Authorization;
|
||||||
using Microsoft.AspNetCore.Mvc;
|
using Microsoft.AspNetCore.Mvc;
|
||||||
|
|
||||||
@ -17,31 +17,30 @@ namespace Bit.Api.Tools.Controllers;
|
|||||||
[Authorize("Application")]
|
[Authorize("Application")]
|
||||||
public class ImportCiphersController : Controller
|
public class ImportCiphersController : Controller
|
||||||
{
|
{
|
||||||
private readonly ICipherService _cipherService;
|
|
||||||
private readonly IUserService _userService;
|
private readonly IUserService _userService;
|
||||||
private readonly ICurrentContext _currentContext;
|
private readonly ICurrentContext _currentContext;
|
||||||
private readonly ILogger<ImportCiphersController> _logger;
|
private readonly ILogger<ImportCiphersController> _logger;
|
||||||
private readonly GlobalSettings _globalSettings;
|
private readonly GlobalSettings _globalSettings;
|
||||||
private readonly ICollectionRepository _collectionRepository;
|
private readonly ICollectionRepository _collectionRepository;
|
||||||
private readonly IAuthorizationService _authorizationService;
|
private readonly IAuthorizationService _authorizationService;
|
||||||
|
private readonly IImportCiphersCommand _importCiphersCommand;
|
||||||
|
|
||||||
public ImportCiphersController(
|
public ImportCiphersController(
|
||||||
ICipherService cipherService,
|
|
||||||
IUserService userService,
|
IUserService userService,
|
||||||
ICurrentContext currentContext,
|
ICurrentContext currentContext,
|
||||||
ILogger<ImportCiphersController> logger,
|
ILogger<ImportCiphersController> logger,
|
||||||
GlobalSettings globalSettings,
|
GlobalSettings globalSettings,
|
||||||
ICollectionRepository collectionRepository,
|
ICollectionRepository collectionRepository,
|
||||||
IAuthorizationService authorizationService,
|
IAuthorizationService authorizationService,
|
||||||
IOrganizationRepository organizationRepository)
|
IImportCiphersCommand importCiphersCommand)
|
||||||
{
|
{
|
||||||
_cipherService = cipherService;
|
|
||||||
_userService = userService;
|
_userService = userService;
|
||||||
_currentContext = currentContext;
|
_currentContext = currentContext;
|
||||||
_logger = logger;
|
_logger = logger;
|
||||||
_globalSettings = globalSettings;
|
_globalSettings = globalSettings;
|
||||||
_collectionRepository = collectionRepository;
|
_collectionRepository = collectionRepository;
|
||||||
_authorizationService = authorizationService;
|
_authorizationService = authorizationService;
|
||||||
|
_importCiphersCommand = importCiphersCommand;
|
||||||
}
|
}
|
||||||
|
|
||||||
[HttpPost("import")]
|
[HttpPost("import")]
|
||||||
@ -57,7 +56,7 @@ public class ImportCiphersController : Controller
|
|||||||
var userId = _userService.GetProperUserId(User).Value;
|
var userId = _userService.GetProperUserId(User).Value;
|
||||||
var folders = model.Folders.Select(f => f.ToFolder(userId)).ToList();
|
var folders = model.Folders.Select(f => f.ToFolder(userId)).ToList();
|
||||||
var ciphers = model.Ciphers.Select(c => c.ToCipherDetails(userId, false)).ToList();
|
var ciphers = model.Ciphers.Select(c => c.ToCipherDetails(userId, false)).ToList();
|
||||||
await _cipherService.ImportCiphersAsync(folders, ciphers, model.FolderRelationships);
|
await _importCiphersCommand.ImportIntoIndividualVaultAsync(folders, ciphers, model.FolderRelationships);
|
||||||
}
|
}
|
||||||
|
|
||||||
[HttpPost("import-organization")]
|
[HttpPost("import-organization")]
|
||||||
@ -85,7 +84,7 @@ public class ImportCiphersController : Controller
|
|||||||
|
|
||||||
var userId = _userService.GetProperUserId(User).Value;
|
var userId = _userService.GetProperUserId(User).Value;
|
||||||
var ciphers = model.Ciphers.Select(l => l.ToOrganizationCipherDetails(orgId)).ToList();
|
var ciphers = model.Ciphers.Select(l => l.ToOrganizationCipherDetails(orgId)).ToList();
|
||||||
await _cipherService.ImportCiphersAsync(collections, ciphers, model.CollectionRelationships, userId);
|
await _importCiphersCommand.ImportIntoOrganizationalVaultAsync(collections, ciphers, model.CollectionRelationships, userId);
|
||||||
}
|
}
|
||||||
|
|
||||||
private async Task<bool> CheckOrgImportPermission(List<Collection> collections, Guid orgId)
|
private async Task<bool> CheckOrgImportPermission(List<Collection> collections, Guid orgId)
|
||||||
|
199
src/Core/Tools/ImportFeatures/ImportCiphersCommand.cs
Normal file
199
src/Core/Tools/ImportFeatures/ImportCiphersCommand.cs
Normal file
@ -0,0 +1,199 @@
|
|||||||
|
using Bit.Core.AdminConsole.Enums;
|
||||||
|
using Bit.Core.AdminConsole.Services;
|
||||||
|
using Bit.Core.Context;
|
||||||
|
using Bit.Core.Entities;
|
||||||
|
using Bit.Core.Exceptions;
|
||||||
|
using Bit.Core.Platform.Push;
|
||||||
|
using Bit.Core.Repositories;
|
||||||
|
using Bit.Core.Tools.Enums;
|
||||||
|
using Bit.Core.Tools.ImportFeatures.Interfaces;
|
||||||
|
using Bit.Core.Tools.Models.Business;
|
||||||
|
using Bit.Core.Tools.Services;
|
||||||
|
using Bit.Core.Vault.Entities;
|
||||||
|
using Bit.Core.Vault.Models.Data;
|
||||||
|
using Bit.Core.Vault.Repositories;
|
||||||
|
|
||||||
|
namespace Bit.Core.Tools.ImportFeatures;
|
||||||
|
|
||||||
|
public class ImportCiphersCommand : IImportCiphersCommand
|
||||||
|
{
|
||||||
|
private readonly ICipherRepository _cipherRepository;
|
||||||
|
private readonly IFolderRepository _folderRepository;
|
||||||
|
private readonly IPushNotificationService _pushService;
|
||||||
|
private readonly IPolicyService _policyService;
|
||||||
|
private readonly IOrganizationRepository _organizationRepository;
|
||||||
|
private readonly IOrganizationUserRepository _organizationUserRepository;
|
||||||
|
private readonly ICollectionRepository _collectionRepository;
|
||||||
|
private readonly IReferenceEventService _referenceEventService;
|
||||||
|
private readonly ICurrentContext _currentContext;
|
||||||
|
|
||||||
|
|
||||||
|
public ImportCiphersCommand(
|
||||||
|
ICipherRepository cipherRepository,
|
||||||
|
IFolderRepository folderRepository,
|
||||||
|
ICollectionRepository collectionRepository,
|
||||||
|
IOrganizationRepository organizationRepository,
|
||||||
|
IOrganizationUserRepository organizationUserRepository,
|
||||||
|
IPushNotificationService pushService,
|
||||||
|
IPolicyService policyService,
|
||||||
|
IReferenceEventService referenceEventService,
|
||||||
|
ICurrentContext currentContext)
|
||||||
|
{
|
||||||
|
_cipherRepository = cipherRepository;
|
||||||
|
_folderRepository = folderRepository;
|
||||||
|
_organizationRepository = organizationRepository;
|
||||||
|
_organizationUserRepository = organizationUserRepository;
|
||||||
|
_collectionRepository = collectionRepository;
|
||||||
|
_pushService = pushService;
|
||||||
|
_policyService = policyService;
|
||||||
|
_referenceEventService = referenceEventService;
|
||||||
|
_currentContext = currentContext;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
public async Task ImportIntoIndividualVaultAsync(
|
||||||
|
List<Folder> folders,
|
||||||
|
List<CipherDetails> ciphers,
|
||||||
|
IEnumerable<KeyValuePair<int, int>> folderRelationships)
|
||||||
|
{
|
||||||
|
var userId = folders.FirstOrDefault()?.UserId ?? ciphers.FirstOrDefault()?.UserId;
|
||||||
|
|
||||||
|
// Make sure the user can save new ciphers to their personal vault
|
||||||
|
var anyPersonalOwnershipPolicies = await _policyService.AnyPoliciesApplicableToUserAsync(userId.Value, PolicyType.PersonalOwnership);
|
||||||
|
if (anyPersonalOwnershipPolicies)
|
||||||
|
{
|
||||||
|
throw new BadRequestException("You cannot import items into your personal vault because you are " +
|
||||||
|
"a member of an organization which forbids it.");
|
||||||
|
}
|
||||||
|
|
||||||
|
foreach (var cipher in ciphers)
|
||||||
|
{
|
||||||
|
cipher.SetNewId();
|
||||||
|
|
||||||
|
if (cipher.UserId.HasValue && cipher.Favorite)
|
||||||
|
{
|
||||||
|
cipher.Favorites = $"{{\"{cipher.UserId.ToString().ToUpperInvariant()}\":\"true\"}}";
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
var userfoldersIds = (await _folderRepository.GetManyByUserIdAsync(userId ?? Guid.Empty)).Select(f => f.Id).ToList();
|
||||||
|
|
||||||
|
//Assign id to the ones that don't exist in DB
|
||||||
|
//Need to keep the list order to create the relationships
|
||||||
|
List<Folder> newFolders = new List<Folder>();
|
||||||
|
foreach (var folder in folders)
|
||||||
|
{
|
||||||
|
if (!userfoldersIds.Contains(folder.Id))
|
||||||
|
{
|
||||||
|
folder.SetNewId();
|
||||||
|
newFolders.Add(folder);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Create the folder associations based on the newly created folder ids
|
||||||
|
foreach (var relationship in folderRelationships)
|
||||||
|
{
|
||||||
|
var cipher = ciphers.ElementAtOrDefault(relationship.Key);
|
||||||
|
var folder = folders.ElementAtOrDefault(relationship.Value);
|
||||||
|
|
||||||
|
if (cipher == null || folder == null)
|
||||||
|
{
|
||||||
|
continue;
|
||||||
|
}
|
||||||
|
|
||||||
|
cipher.Folders = $"{{\"{cipher.UserId.ToString().ToUpperInvariant()}\":" +
|
||||||
|
$"\"{folder.Id.ToString().ToUpperInvariant()}\"}}";
|
||||||
|
}
|
||||||
|
|
||||||
|
// Create it all
|
||||||
|
await _cipherRepository.CreateAsync(ciphers, newFolders);
|
||||||
|
|
||||||
|
// push
|
||||||
|
if (userId.HasValue)
|
||||||
|
{
|
||||||
|
await _pushService.PushSyncVaultAsync(userId.Value);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
public async Task ImportIntoOrganizationalVaultAsync(
|
||||||
|
List<Collection> collections,
|
||||||
|
List<CipherDetails> ciphers,
|
||||||
|
IEnumerable<KeyValuePair<int, int>> collectionRelationships,
|
||||||
|
Guid importingUserId)
|
||||||
|
{
|
||||||
|
var org = collections.Count > 0 ?
|
||||||
|
await _organizationRepository.GetByIdAsync(collections[0].OrganizationId) :
|
||||||
|
await _organizationRepository.GetByIdAsync(ciphers.FirstOrDefault(c => c.OrganizationId.HasValue).OrganizationId.Value);
|
||||||
|
var importingOrgUser = await _organizationUserRepository.GetByOrganizationAsync(org.Id, importingUserId);
|
||||||
|
|
||||||
|
if (collections.Count > 0 && org != null && org.MaxCollections.HasValue)
|
||||||
|
{
|
||||||
|
var collectionCount = await _collectionRepository.GetCountByOrganizationIdAsync(org.Id);
|
||||||
|
if (org.MaxCollections.Value < (collectionCount + collections.Count))
|
||||||
|
{
|
||||||
|
throw new BadRequestException("This organization can only have a maximum of " +
|
||||||
|
$"{org.MaxCollections.Value} collections.");
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Init. ids for ciphers
|
||||||
|
foreach (var cipher in ciphers)
|
||||||
|
{
|
||||||
|
cipher.SetNewId();
|
||||||
|
}
|
||||||
|
|
||||||
|
var organizationCollectionsIds = (await _collectionRepository.GetManyByOrganizationIdAsync(org.Id)).Select(c => c.Id).ToList();
|
||||||
|
|
||||||
|
//Assign id to the ones that don't exist in DB
|
||||||
|
//Need to keep the list order to create the relationships
|
||||||
|
var newCollections = new List<Collection>();
|
||||||
|
var newCollectionUsers = new List<CollectionUser>();
|
||||||
|
|
||||||
|
foreach (var collection in collections)
|
||||||
|
{
|
||||||
|
if (!organizationCollectionsIds.Contains(collection.Id))
|
||||||
|
{
|
||||||
|
collection.SetNewId();
|
||||||
|
newCollections.Add(collection);
|
||||||
|
newCollectionUsers.Add(new CollectionUser
|
||||||
|
{
|
||||||
|
CollectionId = collection.Id,
|
||||||
|
OrganizationUserId = importingOrgUser.Id,
|
||||||
|
Manage = true
|
||||||
|
});
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Create associations based on the newly assigned ids
|
||||||
|
var collectionCiphers = new List<CollectionCipher>();
|
||||||
|
foreach (var relationship in collectionRelationships)
|
||||||
|
{
|
||||||
|
var cipher = ciphers.ElementAtOrDefault(relationship.Key);
|
||||||
|
var collection = collections.ElementAtOrDefault(relationship.Value);
|
||||||
|
|
||||||
|
if (cipher == null || collection == null)
|
||||||
|
{
|
||||||
|
continue;
|
||||||
|
}
|
||||||
|
|
||||||
|
collectionCiphers.Add(new CollectionCipher
|
||||||
|
{
|
||||||
|
CipherId = cipher.Id,
|
||||||
|
CollectionId = collection.Id
|
||||||
|
});
|
||||||
|
}
|
||||||
|
|
||||||
|
// Create it all
|
||||||
|
await _cipherRepository.CreateAsync(ciphers, newCollections, collectionCiphers, newCollectionUsers);
|
||||||
|
|
||||||
|
// push
|
||||||
|
await _pushService.PushSyncVaultAsync(importingUserId);
|
||||||
|
|
||||||
|
|
||||||
|
if (org != null)
|
||||||
|
{
|
||||||
|
await _referenceEventService.RaiseEventAsync(
|
||||||
|
new ReferenceEvent(ReferenceEventType.VaultImported, org, _currentContext));
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
@ -0,0 +1,12 @@
|
|||||||
|
using Bit.Core.Tools.ImportFeatures.Interfaces;
|
||||||
|
using Microsoft.Extensions.DependencyInjection;
|
||||||
|
|
||||||
|
namespace Bit.Core.Tools.ImportFeatures;
|
||||||
|
|
||||||
|
public static class ImportServiceCollectionExtension
|
||||||
|
{
|
||||||
|
public static void AddImportServices(this IServiceCollection services)
|
||||||
|
{
|
||||||
|
services.AddScoped<IImportCiphersCommand, ImportCiphersCommand>();
|
||||||
|
}
|
||||||
|
}
|
@ -0,0 +1,14 @@
|
|||||||
|
using Bit.Core.Entities;
|
||||||
|
using Bit.Core.Vault.Entities;
|
||||||
|
using Bit.Core.Vault.Models.Data;
|
||||||
|
|
||||||
|
namespace Bit.Core.Tools.ImportFeatures.Interfaces;
|
||||||
|
|
||||||
|
public interface IImportCiphersCommand
|
||||||
|
{
|
||||||
|
Task ImportIntoIndividualVaultAsync(List<Folder> folders, List<CipherDetails> ciphers,
|
||||||
|
IEnumerable<KeyValuePair<int, int>> folderRelationships);
|
||||||
|
|
||||||
|
Task ImportIntoOrganizationalVaultAsync(List<Collection> collections, List<CipherDetails> ciphers,
|
||||||
|
IEnumerable<KeyValuePair<int, int>> collectionRelationships, Guid importingUserId);
|
||||||
|
}
|
@ -28,10 +28,6 @@ public interface ICipherService
|
|||||||
Task ShareManyAsync(IEnumerable<(Cipher cipher, DateTime? lastKnownRevisionDate)> ciphers, Guid organizationId,
|
Task ShareManyAsync(IEnumerable<(Cipher cipher, DateTime? lastKnownRevisionDate)> ciphers, Guid organizationId,
|
||||||
IEnumerable<Guid> collectionIds, Guid sharingUserId);
|
IEnumerable<Guid> collectionIds, Guid sharingUserId);
|
||||||
Task SaveCollectionsAsync(Cipher cipher, IEnumerable<Guid> collectionIds, Guid savingUserId, bool orgAdmin);
|
Task SaveCollectionsAsync(Cipher cipher, IEnumerable<Guid> collectionIds, Guid savingUserId, bool orgAdmin);
|
||||||
Task ImportCiphersAsync(List<Folder> folders, List<CipherDetails> ciphers,
|
|
||||||
IEnumerable<KeyValuePair<int, int>> folderRelationships);
|
|
||||||
Task ImportCiphersAsync(List<Collection> collections, List<CipherDetails> ciphers,
|
|
||||||
IEnumerable<KeyValuePair<int, int>> collectionRelationships, Guid importingUserId);
|
|
||||||
Task SoftDeleteAsync(Cipher cipher, Guid deletingUserId, bool orgAdmin = false);
|
Task SoftDeleteAsync(Cipher cipher, Guid deletingUserId, bool orgAdmin = false);
|
||||||
Task SoftDeleteManyAsync(IEnumerable<Guid> cipherIds, Guid deletingUserId, Guid? organizationId = null, bool orgAdmin = false);
|
Task SoftDeleteManyAsync(IEnumerable<Guid> cipherIds, Guid deletingUserId, Guid? organizationId = null, bool orgAdmin = false);
|
||||||
Task RestoreAsync(Cipher cipher, Guid restoringUserId, bool orgAdmin = false);
|
Task RestoreAsync(Cipher cipher, Guid restoringUserId, bool orgAdmin = false);
|
||||||
|
@ -679,152 +679,6 @@ public class CipherService : ICipherService
|
|||||||
await _pushService.PushSyncCipherUpdateAsync(cipher, collectionIds);
|
await _pushService.PushSyncCipherUpdateAsync(cipher, collectionIds);
|
||||||
}
|
}
|
||||||
|
|
||||||
public async Task ImportCiphersAsync(
|
|
||||||
List<Folder> folders,
|
|
||||||
List<CipherDetails> ciphers,
|
|
||||||
IEnumerable<KeyValuePair<int, int>> folderRelationships)
|
|
||||||
{
|
|
||||||
var userId = folders.FirstOrDefault()?.UserId ?? ciphers.FirstOrDefault()?.UserId;
|
|
||||||
|
|
||||||
// Make sure the user can save new ciphers to their personal vault
|
|
||||||
var anyPersonalOwnershipPolicies = await _policyService.AnyPoliciesApplicableToUserAsync(userId.Value, PolicyType.PersonalOwnership);
|
|
||||||
if (anyPersonalOwnershipPolicies)
|
|
||||||
{
|
|
||||||
throw new BadRequestException("You cannot import items into your personal vault because you are " +
|
|
||||||
"a member of an organization which forbids it.");
|
|
||||||
}
|
|
||||||
|
|
||||||
foreach (var cipher in ciphers)
|
|
||||||
{
|
|
||||||
cipher.SetNewId();
|
|
||||||
|
|
||||||
if (cipher.UserId.HasValue && cipher.Favorite)
|
|
||||||
{
|
|
||||||
cipher.Favorites = $"{{\"{cipher.UserId.ToString().ToUpperInvariant()}\":\"true\"}}";
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
var userfoldersIds = (await _folderRepository.GetManyByUserIdAsync(userId ?? Guid.Empty)).Select(f => f.Id).ToList();
|
|
||||||
|
|
||||||
//Assign id to the ones that don't exist in DB
|
|
||||||
//Need to keep the list order to create the relationships
|
|
||||||
List<Folder> newFolders = new List<Folder>();
|
|
||||||
foreach (var folder in folders)
|
|
||||||
{
|
|
||||||
if (!userfoldersIds.Contains(folder.Id))
|
|
||||||
{
|
|
||||||
folder.SetNewId();
|
|
||||||
newFolders.Add(folder);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// Create the folder associations based on the newly created folder ids
|
|
||||||
foreach (var relationship in folderRelationships)
|
|
||||||
{
|
|
||||||
var cipher = ciphers.ElementAtOrDefault(relationship.Key);
|
|
||||||
var folder = folders.ElementAtOrDefault(relationship.Value);
|
|
||||||
|
|
||||||
if (cipher == null || folder == null)
|
|
||||||
{
|
|
||||||
continue;
|
|
||||||
}
|
|
||||||
|
|
||||||
cipher.Folders = $"{{\"{cipher.UserId.ToString().ToUpperInvariant()}\":" +
|
|
||||||
$"\"{folder.Id.ToString().ToUpperInvariant()}\"}}";
|
|
||||||
}
|
|
||||||
|
|
||||||
// Create it all
|
|
||||||
await _cipherRepository.CreateAsync(ciphers, newFolders);
|
|
||||||
|
|
||||||
// push
|
|
||||||
if (userId.HasValue)
|
|
||||||
{
|
|
||||||
await _pushService.PushSyncVaultAsync(userId.Value);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
public async Task ImportCiphersAsync(
|
|
||||||
List<Collection> collections,
|
|
||||||
List<CipherDetails> ciphers,
|
|
||||||
IEnumerable<KeyValuePair<int, int>> collectionRelationships,
|
|
||||||
Guid importingUserId)
|
|
||||||
{
|
|
||||||
var org = collections.Count > 0 ?
|
|
||||||
await _organizationRepository.GetByIdAsync(collections[0].OrganizationId) :
|
|
||||||
await _organizationRepository.GetByIdAsync(ciphers.FirstOrDefault(c => c.OrganizationId.HasValue).OrganizationId.Value);
|
|
||||||
var importingOrgUser = await _organizationUserRepository.GetByOrganizationAsync(org.Id, importingUserId);
|
|
||||||
|
|
||||||
if (collections.Count > 0 && org != null && org.MaxCollections.HasValue)
|
|
||||||
{
|
|
||||||
var collectionCount = await _collectionRepository.GetCountByOrganizationIdAsync(org.Id);
|
|
||||||
if (org.MaxCollections.Value < (collectionCount + collections.Count))
|
|
||||||
{
|
|
||||||
throw new BadRequestException("This organization can only have a maximum of " +
|
|
||||||
$"{org.MaxCollections.Value} collections.");
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// Init. ids for ciphers
|
|
||||||
foreach (var cipher in ciphers)
|
|
||||||
{
|
|
||||||
cipher.SetNewId();
|
|
||||||
}
|
|
||||||
|
|
||||||
var organizationCollectionsIds = (await _collectionRepository.GetManyByOrganizationIdAsync(org.Id)).Select(c => c.Id).ToList();
|
|
||||||
|
|
||||||
//Assign id to the ones that don't exist in DB
|
|
||||||
//Need to keep the list order to create the relationships
|
|
||||||
var newCollections = new List<Collection>();
|
|
||||||
var newCollectionUsers = new List<CollectionUser>();
|
|
||||||
|
|
||||||
foreach (var collection in collections)
|
|
||||||
{
|
|
||||||
if (!organizationCollectionsIds.Contains(collection.Id))
|
|
||||||
{
|
|
||||||
collection.SetNewId();
|
|
||||||
newCollections.Add(collection);
|
|
||||||
newCollectionUsers.Add(new CollectionUser
|
|
||||||
{
|
|
||||||
CollectionId = collection.Id,
|
|
||||||
OrganizationUserId = importingOrgUser.Id,
|
|
||||||
Manage = true
|
|
||||||
});
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// Create associations based on the newly assigned ids
|
|
||||||
var collectionCiphers = new List<CollectionCipher>();
|
|
||||||
foreach (var relationship in collectionRelationships)
|
|
||||||
{
|
|
||||||
var cipher = ciphers.ElementAtOrDefault(relationship.Key);
|
|
||||||
var collection = collections.ElementAtOrDefault(relationship.Value);
|
|
||||||
|
|
||||||
if (cipher == null || collection == null)
|
|
||||||
{
|
|
||||||
continue;
|
|
||||||
}
|
|
||||||
|
|
||||||
collectionCiphers.Add(new CollectionCipher
|
|
||||||
{
|
|
||||||
CipherId = cipher.Id,
|
|
||||||
CollectionId = collection.Id
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
// Create it all
|
|
||||||
await _cipherRepository.CreateAsync(ciphers, newCollections, collectionCiphers, newCollectionUsers);
|
|
||||||
|
|
||||||
// push
|
|
||||||
await _pushService.PushSyncVaultAsync(importingUserId);
|
|
||||||
|
|
||||||
|
|
||||||
if (org != null)
|
|
||||||
{
|
|
||||||
await _referenceEventService.RaiseEventAsync(
|
|
||||||
new ReferenceEvent(ReferenceEventType.VaultImported, org, _currentContext));
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
public async Task SoftDeleteAsync(Cipher cipher, Guid deletingUserId, bool orgAdmin = false)
|
public async Task SoftDeleteAsync(Cipher cipher, Guid deletingUserId, bool orgAdmin = false)
|
||||||
{
|
{
|
||||||
if (!orgAdmin && !(await UserCanEditAsync(cipher, deletingUserId)))
|
if (!orgAdmin && !(await UserCanEditAsync(cipher, deletingUserId)))
|
||||||
|
@ -40,6 +40,7 @@ using Bit.Core.SecretsManager.Repositories.Noop;
|
|||||||
using Bit.Core.Services;
|
using Bit.Core.Services;
|
||||||
using Bit.Core.Settings;
|
using Bit.Core.Settings;
|
||||||
using Bit.Core.Tokens;
|
using Bit.Core.Tokens;
|
||||||
|
using Bit.Core.Tools.ImportFeatures;
|
||||||
using Bit.Core.Tools.ReportFeatures;
|
using Bit.Core.Tools.ReportFeatures;
|
||||||
using Bit.Core.Tools.Services;
|
using Bit.Core.Tools.Services;
|
||||||
using Bit.Core.Utilities;
|
using Bit.Core.Utilities;
|
||||||
@ -128,6 +129,7 @@ public static class ServiceCollectionExtensions
|
|||||||
services.AddKeyManagementServices();
|
services.AddKeyManagementServices();
|
||||||
services.AddNotificationCenterServices();
|
services.AddNotificationCenterServices();
|
||||||
services.AddPlatformServices();
|
services.AddPlatformServices();
|
||||||
|
services.AddImportServices();
|
||||||
}
|
}
|
||||||
|
|
||||||
public static void AddTokenizers(this IServiceCollection services)
|
public static void AddTokenizers(this IServiceCollection services)
|
||||||
|
@ -0,0 +1,181 @@
|
|||||||
|
using Bit.Core.AdminConsole.Entities;
|
||||||
|
using Bit.Core.AdminConsole.Enums;
|
||||||
|
using Bit.Core.AdminConsole.Services;
|
||||||
|
using Bit.Core.Entities;
|
||||||
|
using Bit.Core.Exceptions;
|
||||||
|
using Bit.Core.Platform.Push;
|
||||||
|
using Bit.Core.Repositories;
|
||||||
|
using Bit.Core.Test.AutoFixture.CipherFixtures;
|
||||||
|
using Bit.Core.Tools.Enums;
|
||||||
|
using Bit.Core.Tools.ImportFeatures;
|
||||||
|
using Bit.Core.Tools.Models.Business;
|
||||||
|
using Bit.Core.Tools.Services;
|
||||||
|
using Bit.Core.Vault.Entities;
|
||||||
|
using Bit.Core.Vault.Models.Data;
|
||||||
|
using Bit.Core.Vault.Repositories;
|
||||||
|
using Bit.Test.Common.AutoFixture;
|
||||||
|
using Bit.Test.Common.AutoFixture.Attributes;
|
||||||
|
using NSubstitute;
|
||||||
|
using Xunit;
|
||||||
|
|
||||||
|
|
||||||
|
namespace Bit.Core.Test.Tools.ImportFeatures;
|
||||||
|
|
||||||
|
[UserCipherCustomize]
|
||||||
|
[SutProviderCustomize]
|
||||||
|
public class ImportCiphersAsyncCommandTests
|
||||||
|
{
|
||||||
|
[Theory, BitAutoData]
|
||||||
|
public async Task ImportIntoIndividualVaultAsync_Success(
|
||||||
|
Guid importingUserId,
|
||||||
|
List<CipherDetails> ciphers,
|
||||||
|
SutProvider<ImportCiphersCommand> sutProvider)
|
||||||
|
{
|
||||||
|
sutProvider.GetDependency<IPolicyService>()
|
||||||
|
.AnyPoliciesApplicableToUserAsync(importingUserId, PolicyType.PersonalOwnership)
|
||||||
|
.Returns(false);
|
||||||
|
|
||||||
|
sutProvider.GetDependency<IFolderRepository>()
|
||||||
|
.GetManyByUserIdAsync(importingUserId)
|
||||||
|
.Returns(new List<Folder>());
|
||||||
|
|
||||||
|
var folders = new List<Folder> { new Folder { UserId = importingUserId } };
|
||||||
|
|
||||||
|
var folderRelationships = new List<KeyValuePair<int, int>>();
|
||||||
|
|
||||||
|
// Act
|
||||||
|
await sutProvider.Sut.ImportIntoIndividualVaultAsync(folders, ciphers, folderRelationships);
|
||||||
|
|
||||||
|
// Assert
|
||||||
|
await sutProvider.GetDependency<ICipherRepository>().Received(1).CreateAsync(ciphers, Arg.Any<List<Folder>>());
|
||||||
|
await sutProvider.GetDependency<IPushNotificationService>().Received(1).PushSyncVaultAsync(importingUserId);
|
||||||
|
}
|
||||||
|
|
||||||
|
[Theory, BitAutoData]
|
||||||
|
public async Task ImportIntoIndividualVaultAsync_ThrowsBadRequestException(
|
||||||
|
List<Folder> folders,
|
||||||
|
List<CipherDetails> ciphers,
|
||||||
|
SutProvider<ImportCiphersCommand> sutProvider)
|
||||||
|
{
|
||||||
|
var userId = Guid.NewGuid();
|
||||||
|
folders.ForEach(f => f.UserId = userId);
|
||||||
|
ciphers.ForEach(c => c.UserId = userId);
|
||||||
|
|
||||||
|
sutProvider.GetDependency<IPolicyService>()
|
||||||
|
.AnyPoliciesApplicableToUserAsync(userId, PolicyType.PersonalOwnership)
|
||||||
|
.Returns(true);
|
||||||
|
|
||||||
|
var folderRelationships = new List<KeyValuePair<int, int>>();
|
||||||
|
|
||||||
|
var exception = await Assert.ThrowsAsync<BadRequestException>(() =>
|
||||||
|
sutProvider.Sut.ImportIntoIndividualVaultAsync(folders, ciphers, folderRelationships));
|
||||||
|
|
||||||
|
Assert.Equal("You cannot import items into your personal vault because you are a member of an organization which forbids it.", exception.Message);
|
||||||
|
}
|
||||||
|
|
||||||
|
[Theory, BitAutoData]
|
||||||
|
public async Task ImportIntoOrganizationalVaultAsync_Success(
|
||||||
|
Organization organization,
|
||||||
|
Guid importingUserId,
|
||||||
|
OrganizationUser importingOrganizationUser,
|
||||||
|
List<Collection> collections,
|
||||||
|
List<CipherDetails> ciphers,
|
||||||
|
SutProvider<ImportCiphersCommand> sutProvider)
|
||||||
|
{
|
||||||
|
organization.MaxCollections = null;
|
||||||
|
importingOrganizationUser.OrganizationId = organization.Id;
|
||||||
|
|
||||||
|
foreach (var collection in collections)
|
||||||
|
{
|
||||||
|
collection.OrganizationId = organization.Id;
|
||||||
|
}
|
||||||
|
|
||||||
|
foreach (var cipher in ciphers)
|
||||||
|
{
|
||||||
|
cipher.OrganizationId = organization.Id;
|
||||||
|
}
|
||||||
|
|
||||||
|
KeyValuePair<int, int>[] collectionRelationships = {
|
||||||
|
new(0, 0),
|
||||||
|
new(1, 1),
|
||||||
|
new(2, 2)
|
||||||
|
};
|
||||||
|
|
||||||
|
sutProvider.GetDependency<IOrganizationRepository>()
|
||||||
|
.GetByIdAsync(organization.Id)
|
||||||
|
.Returns(organization);
|
||||||
|
|
||||||
|
sutProvider.GetDependency<IOrganizationUserRepository>()
|
||||||
|
.GetByOrganizationAsync(organization.Id, importingUserId)
|
||||||
|
.Returns(importingOrganizationUser);
|
||||||
|
|
||||||
|
// Set up a collection that already exists in the organization
|
||||||
|
sutProvider.GetDependency<ICollectionRepository>()
|
||||||
|
.GetManyByOrganizationIdAsync(organization.Id)
|
||||||
|
.Returns(new List<Collection> { collections[0] });
|
||||||
|
|
||||||
|
await sutProvider.Sut.ImportIntoOrganizationalVaultAsync(collections, ciphers, collectionRelationships, importingUserId);
|
||||||
|
|
||||||
|
await sutProvider.GetDependency<ICipherRepository>().Received(1).CreateAsync(
|
||||||
|
ciphers,
|
||||||
|
Arg.Is<IEnumerable<Collection>>(cols => cols.Count() == collections.Count - 1 &&
|
||||||
|
!cols.Any(c => c.Id == collections[0].Id) && // Check that the collection that already existed in the organization was not added
|
||||||
|
cols.All(c => collections.Any(x => c.Name == x.Name))),
|
||||||
|
Arg.Is<IEnumerable<CollectionCipher>>(c => c.Count() == ciphers.Count),
|
||||||
|
Arg.Is<IEnumerable<CollectionUser>>(cus =>
|
||||||
|
cus.Count() == collections.Count - 1 &&
|
||||||
|
!cus.Any(cu => cu.CollectionId == collections[0].Id) && // Check that access was not added for the collection that already existed in the organization
|
||||||
|
cus.All(cu => cu.OrganizationUserId == importingOrganizationUser.Id && cu.Manage == true)));
|
||||||
|
await sutProvider.GetDependency<IPushNotificationService>().Received(1).PushSyncVaultAsync(importingUserId);
|
||||||
|
await sutProvider.GetDependency<IReferenceEventService>().Received(1).RaiseEventAsync(
|
||||||
|
Arg.Is<ReferenceEvent>(e => e.Type == ReferenceEventType.VaultImported));
|
||||||
|
}
|
||||||
|
|
||||||
|
[Theory, BitAutoData]
|
||||||
|
public async Task ImportIntoOrganizationalVaultAsync_ThrowsBadRequestException(
|
||||||
|
Organization organization,
|
||||||
|
Guid importingUserId,
|
||||||
|
OrganizationUser importingOrganizationUser,
|
||||||
|
List<Collection> collections,
|
||||||
|
List<CipherDetails> ciphers,
|
||||||
|
SutProvider<ImportCiphersCommand> sutProvider)
|
||||||
|
{
|
||||||
|
organization.MaxCollections = 1;
|
||||||
|
importingOrganizationUser.OrganizationId = organization.Id;
|
||||||
|
|
||||||
|
foreach (var collection in collections)
|
||||||
|
{
|
||||||
|
collection.OrganizationId = organization.Id;
|
||||||
|
}
|
||||||
|
|
||||||
|
foreach (var cipher in ciphers)
|
||||||
|
{
|
||||||
|
cipher.OrganizationId = organization.Id;
|
||||||
|
}
|
||||||
|
|
||||||
|
KeyValuePair<int, int>[] collectionRelationships = {
|
||||||
|
new(0, 0),
|
||||||
|
new(1, 1),
|
||||||
|
new(2, 2)
|
||||||
|
};
|
||||||
|
|
||||||
|
sutProvider.GetDependency<IOrganizationRepository>()
|
||||||
|
.GetByIdAsync(organization.Id)
|
||||||
|
.Returns(organization);
|
||||||
|
|
||||||
|
sutProvider.GetDependency<IOrganizationUserRepository>()
|
||||||
|
.GetByOrganizationAsync(organization.Id, importingUserId)
|
||||||
|
.Returns(importingOrganizationUser);
|
||||||
|
|
||||||
|
// Set up a collection that already exists in the organization
|
||||||
|
sutProvider.GetDependency<ICollectionRepository>()
|
||||||
|
.GetManyByOrganizationIdAsync(organization.Id)
|
||||||
|
.Returns(new List<Collection> { collections[0] });
|
||||||
|
|
||||||
|
var exception = await Assert.ThrowsAsync<BadRequestException>(() =>
|
||||||
|
sutProvider.Sut.ImportIntoOrganizationalVaultAsync(collections, ciphers, collectionRelationships, importingUserId));
|
||||||
|
|
||||||
|
Assert.Equal("This organization can only have a maximum of " +
|
||||||
|
$"{organization.MaxCollections} collections.", exception.Message);
|
||||||
|
}
|
||||||
|
}
|
@ -7,9 +7,6 @@ using Bit.Core.Platform.Push;
|
|||||||
using Bit.Core.Repositories;
|
using Bit.Core.Repositories;
|
||||||
using Bit.Core.Services;
|
using Bit.Core.Services;
|
||||||
using Bit.Core.Test.AutoFixture.CipherFixtures;
|
using Bit.Core.Test.AutoFixture.CipherFixtures;
|
||||||
using Bit.Core.Tools.Enums;
|
|
||||||
using Bit.Core.Tools.Models.Business;
|
|
||||||
using Bit.Core.Tools.Services;
|
|
||||||
using Bit.Core.Utilities;
|
using Bit.Core.Utilities;
|
||||||
using Bit.Core.Vault.Entities;
|
using Bit.Core.Vault.Entities;
|
||||||
using Bit.Core.Vault.Models.Data;
|
using Bit.Core.Vault.Models.Data;
|
||||||
@ -26,64 +23,6 @@ namespace Bit.Core.Test.Services;
|
|||||||
[SutProviderCustomize]
|
[SutProviderCustomize]
|
||||||
public class CipherServiceTests
|
public class CipherServiceTests
|
||||||
{
|
{
|
||||||
[Theory, BitAutoData]
|
|
||||||
public async Task ImportCiphersAsync_IntoOrganization_Success(
|
|
||||||
Organization organization,
|
|
||||||
Guid importingUserId,
|
|
||||||
OrganizationUser importingOrganizationUser,
|
|
||||||
List<Collection> collections,
|
|
||||||
List<CipherDetails> ciphers,
|
|
||||||
SutProvider<CipherService> sutProvider)
|
|
||||||
{
|
|
||||||
organization.MaxCollections = null;
|
|
||||||
importingOrganizationUser.OrganizationId = organization.Id;
|
|
||||||
|
|
||||||
foreach (var collection in collections)
|
|
||||||
{
|
|
||||||
collection.OrganizationId = organization.Id;
|
|
||||||
}
|
|
||||||
|
|
||||||
foreach (var cipher in ciphers)
|
|
||||||
{
|
|
||||||
cipher.OrganizationId = organization.Id;
|
|
||||||
}
|
|
||||||
|
|
||||||
KeyValuePair<int, int>[] collectionRelationships = {
|
|
||||||
new(0, 0),
|
|
||||||
new(1, 1),
|
|
||||||
new(2, 2)
|
|
||||||
};
|
|
||||||
|
|
||||||
sutProvider.GetDependency<IOrganizationRepository>()
|
|
||||||
.GetByIdAsync(organization.Id)
|
|
||||||
.Returns(organization);
|
|
||||||
|
|
||||||
sutProvider.GetDependency<IOrganizationUserRepository>()
|
|
||||||
.GetByOrganizationAsync(organization.Id, importingUserId)
|
|
||||||
.Returns(importingOrganizationUser);
|
|
||||||
|
|
||||||
// Set up a collection that already exists in the organization
|
|
||||||
sutProvider.GetDependency<ICollectionRepository>()
|
|
||||||
.GetManyByOrganizationIdAsync(organization.Id)
|
|
||||||
.Returns(new List<Collection> { collections[0] });
|
|
||||||
|
|
||||||
await sutProvider.Sut.ImportCiphersAsync(collections, ciphers, collectionRelationships, importingUserId);
|
|
||||||
|
|
||||||
await sutProvider.GetDependency<ICipherRepository>().Received(1).CreateAsync(
|
|
||||||
ciphers,
|
|
||||||
Arg.Is<IEnumerable<Collection>>(cols => cols.Count() == collections.Count - 1 &&
|
|
||||||
!cols.Any(c => c.Id == collections[0].Id) && // Check that the collection that already existed in the organization was not added
|
|
||||||
cols.All(c => collections.Any(x => c.Name == x.Name))),
|
|
||||||
Arg.Is<IEnumerable<CollectionCipher>>(c => c.Count() == ciphers.Count),
|
|
||||||
Arg.Is<IEnumerable<CollectionUser>>(cus =>
|
|
||||||
cus.Count() == collections.Count - 1 &&
|
|
||||||
!cus.Any(cu => cu.CollectionId == collections[0].Id) && // Check that access was not added for the collection that already existed in the organization
|
|
||||||
cus.All(cu => cu.OrganizationUserId == importingOrganizationUser.Id && cu.Manage == true)));
|
|
||||||
await sutProvider.GetDependency<IPushNotificationService>().Received(1).PushSyncVaultAsync(importingUserId);
|
|
||||||
await sutProvider.GetDependency<IReferenceEventService>().Received(1).RaiseEventAsync(
|
|
||||||
Arg.Is<ReferenceEvent>(e => e.Type == ReferenceEventType.VaultImported));
|
|
||||||
}
|
|
||||||
|
|
||||||
[Theory, BitAutoData]
|
[Theory, BitAutoData]
|
||||||
public async Task SaveAsync_WrongRevisionDate_Throws(SutProvider<CipherService> sutProvider, Cipher cipher)
|
public async Task SaveAsync_WrongRevisionDate_Throws(SutProvider<CipherService> sutProvider, Cipher cipher)
|
||||||
{
|
{
|
||||||
|
Loading…
x
Reference in New Issue
Block a user