mirror of
https://github.com/bitwarden/server.git
synced 2025-07-02 08:32:50 -05:00
[AC-1283] AC Team code ownership moves: Organization (pt 2) (#3486)
* move remaining Organization domain files * namespaces will be updated in a separate commit
This commit is contained in:
99
test/Core.Test/AdminConsole/Entities/OrganizationTests.cs
Normal file
99
test/Core.Test/AdminConsole/Entities/OrganizationTests.cs
Normal file
@ -0,0 +1,99 @@
|
||||
using System.Text.Json;
|
||||
using Bit.Core.AdminConsole.Entities;
|
||||
using Bit.Core.Auth.Enums;
|
||||
using Bit.Core.Auth.Models;
|
||||
using Bit.Test.Common.Helpers;
|
||||
using Xunit;
|
||||
|
||||
namespace Bit.Core.Test.Entities;
|
||||
|
||||
public class OrganizationTests
|
||||
{
|
||||
private static readonly Dictionary<TwoFactorProviderType, TwoFactorProvider> _testConfig = new Dictionary<TwoFactorProviderType, TwoFactorProvider>()
|
||||
{
|
||||
[TwoFactorProviderType.OrganizationDuo] = new TwoFactorProvider
|
||||
{
|
||||
Enabled = true,
|
||||
MetaData = new Dictionary<string, object>
|
||||
{
|
||||
["IKey"] = "IKey_value",
|
||||
["SKey"] = "SKey_value",
|
||||
["Host"] = "Host_value",
|
||||
},
|
||||
}
|
||||
};
|
||||
|
||||
|
||||
[Fact]
|
||||
public void SetTwoFactorProviders_Success()
|
||||
{
|
||||
var organization = new Organization();
|
||||
organization.SetTwoFactorProviders(_testConfig);
|
||||
|
||||
using var jsonDocument = JsonDocument.Parse(organization.TwoFactorProviders);
|
||||
var root = jsonDocument.RootElement;
|
||||
|
||||
var duo = AssertHelper.AssertJsonProperty(root, "6", JsonValueKind.Object);
|
||||
AssertHelper.AssertJsonProperty(duo, "Enabled", JsonValueKind.True);
|
||||
var duoMetaData = AssertHelper.AssertJsonProperty(duo, "MetaData", JsonValueKind.Object);
|
||||
var iKey = AssertHelper.AssertJsonProperty(duoMetaData, "IKey", JsonValueKind.String).GetString();
|
||||
Assert.Equal("IKey_value", iKey);
|
||||
var sKey = AssertHelper.AssertJsonProperty(duoMetaData, "SKey", JsonValueKind.String).GetString();
|
||||
Assert.Equal("SKey_value", sKey);
|
||||
var host = AssertHelper.AssertJsonProperty(duoMetaData, "Host", JsonValueKind.String).GetString();
|
||||
Assert.Equal("Host_value", host);
|
||||
}
|
||||
|
||||
[Fact]
|
||||
public void GetTwoFactorProviders_Success()
|
||||
{
|
||||
// This is to get rid of the cached dictionary the SetTwoFactorProviders keeps so we can fully test the JSON reading
|
||||
// It intent is to mimic a storing of the entity in the database and it being read later
|
||||
var tempOrganization = new Organization();
|
||||
tempOrganization.SetTwoFactorProviders(_testConfig);
|
||||
var organization = new Organization
|
||||
{
|
||||
TwoFactorProviders = tempOrganization.TwoFactorProviders,
|
||||
};
|
||||
|
||||
var twoFactorProviders = organization.GetTwoFactorProviders();
|
||||
|
||||
var duo = Assert.Contains(TwoFactorProviderType.OrganizationDuo, (IDictionary<TwoFactorProviderType, TwoFactorProvider>)twoFactorProviders);
|
||||
Assert.True(duo.Enabled);
|
||||
Assert.NotNull(duo.MetaData);
|
||||
var iKey = Assert.Contains("IKey", (IDictionary<string, object>)duo.MetaData);
|
||||
Assert.Equal("IKey_value", iKey);
|
||||
var sKey = Assert.Contains("SKey", (IDictionary<string, object>)duo.MetaData);
|
||||
Assert.Equal("SKey_value", sKey);
|
||||
var host = Assert.Contains("Host", (IDictionary<string, object>)duo.MetaData);
|
||||
Assert.Equal("Host_value", host);
|
||||
}
|
||||
|
||||
[Fact]
|
||||
public void GetTwoFactorProviders_SavedWithName_Success()
|
||||
{
|
||||
var organization = new Organization();
|
||||
// This should save items with the string name of the enum and we will validate that we can read
|
||||
// from that just incase some organizations have it saved that way.
|
||||
organization.TwoFactorProviders = JsonSerializer.Serialize(_testConfig);
|
||||
|
||||
// Preliminary Asserts to make sure we are testing what we want to be testing
|
||||
using var jsonDocument = JsonDocument.Parse(organization.TwoFactorProviders);
|
||||
var root = jsonDocument.RootElement;
|
||||
// This means it saved the enum as its string name
|
||||
AssertHelper.AssertJsonProperty(root, "OrganizationDuo", JsonValueKind.Object);
|
||||
|
||||
// Actual checks
|
||||
var twoFactorProviders = organization.GetTwoFactorProviders();
|
||||
|
||||
var duo = Assert.Contains(TwoFactorProviderType.OrganizationDuo, (IDictionary<TwoFactorProviderType, TwoFactorProvider>)twoFactorProviders);
|
||||
Assert.True(duo.Enabled);
|
||||
Assert.NotNull(duo.MetaData);
|
||||
var iKey = Assert.Contains("IKey", (IDictionary<string, object>)duo.MetaData);
|
||||
Assert.Equal("IKey_value", iKey);
|
||||
var sKey = Assert.Contains("SKey", (IDictionary<string, object>)duo.MetaData);
|
||||
Assert.Equal("SKey_value", sKey);
|
||||
var host = Assert.Contains("Host", (IDictionary<string, object>)duo.MetaData);
|
||||
Assert.Equal("Host_value", host);
|
||||
}
|
||||
}
|
@ -0,0 +1,383 @@
|
||||
using Bit.Core.AdminConsole.Entities;
|
||||
using Bit.Core.AdminConsole.Enums;
|
||||
using Bit.Core.AdminConsole.Models.OrganizationConnectionConfigs;
|
||||
using Bit.Core.Auth.Entities;
|
||||
using Bit.Core.Auth.Enums;
|
||||
using Bit.Core.Auth.Models.Data;
|
||||
using Bit.Core.Entities;
|
||||
using Bit.Core.Enums;
|
||||
using Bit.Core.Models.Business;
|
||||
using Bit.Core.Models.Data.Organizations;
|
||||
using Bit.Core.Test.AutoFixture;
|
||||
using Bit.Test.Common.AutoFixture.Attributes;
|
||||
using Xunit;
|
||||
|
||||
namespace Bit.Core.Test.Models.Data;
|
||||
|
||||
public class SelfHostedOrganizationDetailsTests
|
||||
{
|
||||
[Theory]
|
||||
[BitAutoData]
|
||||
[OrganizationLicenseCustomize]
|
||||
public void ValidateForOrganization_Success(List<OrganizationUser> orgUsers,
|
||||
List<Policy> policies, SsoConfig ssoConfig, List<OrganizationConnection<ScimConfig>> scimConnections, OrganizationLicense license)
|
||||
{
|
||||
var (orgDetails, orgLicense) = GetOrganizationAndLicense(orgUsers, policies, ssoConfig, scimConnections, license);
|
||||
|
||||
var result = orgDetails.CanUseLicense(license, out var exception);
|
||||
|
||||
Assert.True(result);
|
||||
Assert.True(string.IsNullOrEmpty(exception));
|
||||
}
|
||||
|
||||
[Theory]
|
||||
[BitAutoData]
|
||||
[OrganizationLicenseCustomize]
|
||||
public void ValidateForOrganization_OccupiedSeatCount_ExceedsLicense_Fail(List<OrganizationUser> orgUsers,
|
||||
List<Policy> policies, SsoConfig ssoConfig, List<OrganizationConnection<ScimConfig>> scimConnections, OrganizationLicense license)
|
||||
{
|
||||
var (orgDetails, orgLicense) = GetOrganizationAndLicense(orgUsers, policies, ssoConfig, scimConnections, license);
|
||||
orgLicense.Seats = 1;
|
||||
|
||||
var result = orgDetails.CanUseLicense(license, out var exception);
|
||||
|
||||
Assert.False(result);
|
||||
Assert.Contains("Remove some users", exception);
|
||||
}
|
||||
|
||||
[Theory]
|
||||
[BitAutoData]
|
||||
[OrganizationLicenseCustomize]
|
||||
public void ValidateForOrganization_MaxCollections_ExceedsLicense_Fail(List<OrganizationUser> orgUsers,
|
||||
List<Policy> policies, SsoConfig ssoConfig, List<OrganizationConnection<ScimConfig>> scimConnections, OrganizationLicense license)
|
||||
{
|
||||
var (orgDetails, orgLicense) = GetOrganizationAndLicense(orgUsers, policies, ssoConfig, scimConnections, license);
|
||||
orgLicense.MaxCollections = 1;
|
||||
|
||||
var result = orgDetails.CanUseLicense(license, out var exception);
|
||||
|
||||
Assert.False(result);
|
||||
Assert.Contains("Remove some collections", exception);
|
||||
}
|
||||
|
||||
[Theory]
|
||||
[BitAutoData]
|
||||
[OrganizationLicenseCustomize]
|
||||
public void ValidateForOrganization_Groups_NotAllowedByLicense_Fail(List<OrganizationUser> orgUsers,
|
||||
List<Policy> policies, SsoConfig ssoConfig, List<OrganizationConnection<ScimConfig>> scimConnections, OrganizationLicense license)
|
||||
{
|
||||
var (orgDetails, orgLicense) = GetOrganizationAndLicense(orgUsers, policies, ssoConfig, scimConnections, license);
|
||||
orgLicense.UseGroups = false;
|
||||
|
||||
var result = orgDetails.CanUseLicense(license, out var exception);
|
||||
|
||||
Assert.False(result);
|
||||
Assert.Contains("Your new license does not allow for the use of groups", exception);
|
||||
}
|
||||
|
||||
[Theory]
|
||||
[BitAutoData]
|
||||
[OrganizationLicenseCustomize]
|
||||
public void ValidateForOrganization_Policies_NotAllowedByLicense_Fail(List<OrganizationUser> orgUsers,
|
||||
List<Policy> policies, SsoConfig ssoConfig, List<OrganizationConnection<ScimConfig>> scimConnections, OrganizationLicense license)
|
||||
{
|
||||
var (orgDetails, orgLicense) = GetOrganizationAndLicense(orgUsers, policies, ssoConfig, scimConnections, license);
|
||||
orgLicense.UsePolicies = false;
|
||||
|
||||
var result = orgDetails.CanUseLicense(license, out var exception);
|
||||
|
||||
Assert.False(result);
|
||||
Assert.Contains("Your new license does not allow for the use of policies", exception);
|
||||
}
|
||||
|
||||
[Theory]
|
||||
[BitAutoData]
|
||||
[OrganizationLicenseCustomize]
|
||||
public void ValidateForOrganization_DisabledPolicies_NotAllowedByLicense_Success(List<OrganizationUser> orgUsers,
|
||||
List<Policy> policies, SsoConfig ssoConfig, List<OrganizationConnection<ScimConfig>> scimConnections, OrganizationLicense license)
|
||||
{
|
||||
var (orgDetails, orgLicense) = GetOrganizationAndLicense(orgUsers, policies, ssoConfig, scimConnections, license);
|
||||
orgLicense.UsePolicies = false;
|
||||
((List<Policy>)orgDetails.Policies).ForEach(p => p.Enabled = false);
|
||||
|
||||
var result = orgDetails.CanUseLicense(license, out var exception);
|
||||
|
||||
Assert.True(result);
|
||||
Assert.True(string.IsNullOrEmpty(exception));
|
||||
}
|
||||
|
||||
[Theory]
|
||||
[BitAutoData]
|
||||
[OrganizationLicenseCustomize]
|
||||
public void ValidateForOrganization_Sso_NotAllowedByLicense_Fail(List<OrganizationUser> orgUsers,
|
||||
List<Policy> policies, SsoConfig ssoConfig, List<OrganizationConnection<ScimConfig>> scimConnections, OrganizationLicense license)
|
||||
{
|
||||
var (orgDetails, orgLicense) = GetOrganizationAndLicense(orgUsers, policies, ssoConfig, scimConnections, license);
|
||||
orgLicense.UseSso = false;
|
||||
|
||||
var result = orgDetails.CanUseLicense(license, out var exception);
|
||||
|
||||
Assert.False(result);
|
||||
Assert.Contains("Your new license does not allow for the use of SSO", exception);
|
||||
}
|
||||
|
||||
[Theory]
|
||||
[BitAutoData]
|
||||
[OrganizationLicenseCustomize]
|
||||
public void ValidateForOrganization_DisabledSso_NotAllowedByLicense_Success(List<OrganizationUser> orgUsers,
|
||||
List<Policy> policies, SsoConfig ssoConfig, List<OrganizationConnection<ScimConfig>> scimConnections, OrganizationLicense license)
|
||||
{
|
||||
var (orgDetails, orgLicense) = GetOrganizationAndLicense(orgUsers, policies, ssoConfig, scimConnections, license);
|
||||
orgLicense.UseSso = false;
|
||||
orgDetails.SsoConfig.Enabled = false;
|
||||
|
||||
var result = orgDetails.CanUseLicense(license, out var exception);
|
||||
|
||||
Assert.True(result);
|
||||
Assert.True(string.IsNullOrEmpty(exception));
|
||||
}
|
||||
|
||||
[Theory]
|
||||
[BitAutoData]
|
||||
[OrganizationLicenseCustomize]
|
||||
public void ValidateForOrganization_NoSso_NotAllowedByLicense_Success(List<OrganizationUser> orgUsers,
|
||||
List<Policy> policies, SsoConfig ssoConfig, List<OrganizationConnection<ScimConfig>> scimConnections, OrganizationLicense license)
|
||||
{
|
||||
var (orgDetails, orgLicense) = GetOrganizationAndLicense(orgUsers, policies, ssoConfig, scimConnections, license);
|
||||
orgLicense.UseSso = false;
|
||||
orgDetails.SsoConfig = null;
|
||||
|
||||
var result = orgDetails.CanUseLicense(license, out var exception);
|
||||
|
||||
Assert.True(result);
|
||||
Assert.True(string.IsNullOrEmpty(exception));
|
||||
}
|
||||
|
||||
[Theory]
|
||||
[BitAutoData]
|
||||
[OrganizationLicenseCustomize]
|
||||
public void ValidateForOrganization_KeyConnector_NotAllowedByLicense_Fail(List<OrganizationUser> orgUsers,
|
||||
List<Policy> policies, SsoConfig ssoConfig, List<OrganizationConnection<ScimConfig>> scimConnections, OrganizationLicense license)
|
||||
{
|
||||
var (orgDetails, orgLicense) = GetOrganizationAndLicense(orgUsers, policies, ssoConfig, scimConnections, license);
|
||||
orgLicense.UseKeyConnector = false;
|
||||
|
||||
var result = orgDetails.CanUseLicense(license, out var exception);
|
||||
|
||||
Assert.False(result);
|
||||
Assert.Contains("Your new license does not allow for the use of Key Connector", exception);
|
||||
}
|
||||
|
||||
[Theory]
|
||||
[BitAutoData]
|
||||
[OrganizationLicenseCustomize]
|
||||
public void ValidateForOrganization_DisabledKeyConnector_NotAllowedByLicense_Success(List<OrganizationUser> orgUsers,
|
||||
List<Policy> policies, SsoConfig ssoConfig, List<OrganizationConnection<ScimConfig>> scimConnections, OrganizationLicense license)
|
||||
{
|
||||
var (orgDetails, orgLicense) = GetOrganizationAndLicense(orgUsers, policies, ssoConfig, scimConnections, license);
|
||||
orgLicense.UseKeyConnector = false;
|
||||
orgDetails.SsoConfig.SetData(new SsoConfigurationData() { MemberDecryptionType = MemberDecryptionType.MasterPassword });
|
||||
|
||||
var result = orgDetails.CanUseLicense(license, out var exception);
|
||||
|
||||
Assert.True(result);
|
||||
Assert.True(string.IsNullOrEmpty(exception));
|
||||
}
|
||||
|
||||
[Theory]
|
||||
[BitAutoData]
|
||||
[OrganizationLicenseCustomize]
|
||||
public void ValidateForOrganization_NoSsoKeyConnector_NotAllowedByLicense_Success(List<OrganizationUser> orgUsers,
|
||||
List<Policy> policies, SsoConfig ssoConfig, List<OrganizationConnection<ScimConfig>> scimConnections, OrganizationLicense license)
|
||||
{
|
||||
var (orgDetails, orgLicense) = GetOrganizationAndLicense(orgUsers, policies, ssoConfig, scimConnections, license);
|
||||
orgLicense.UseKeyConnector = false;
|
||||
orgDetails.SsoConfig = null;
|
||||
|
||||
var result = orgDetails.CanUseLicense(license, out var exception);
|
||||
|
||||
Assert.True(result);
|
||||
Assert.True(string.IsNullOrEmpty(exception));
|
||||
}
|
||||
|
||||
[Theory]
|
||||
[BitAutoData]
|
||||
[OrganizationLicenseCustomize]
|
||||
public void ValidateForOrganization_Scim_NotAllowedByLicense_Fail(List<OrganizationUser> orgUsers,
|
||||
List<Policy> policies, SsoConfig ssoConfig, List<OrganizationConnection<ScimConfig>> scimConnections, OrganizationLicense license)
|
||||
{
|
||||
var (orgDetails, orgLicense) = GetOrganizationAndLicense(orgUsers, policies, ssoConfig, scimConnections, license);
|
||||
orgLicense.UseScim = false;
|
||||
|
||||
var result = orgDetails.CanUseLicense(license, out var exception);
|
||||
|
||||
Assert.False(result);
|
||||
Assert.Contains("Your new plan does not allow the SCIM feature", exception);
|
||||
}
|
||||
|
||||
[Theory]
|
||||
[BitAutoData]
|
||||
[OrganizationLicenseCustomize]
|
||||
public void ValidateForOrganization_DisabledScim_NotAllowedByLicense_Success(List<OrganizationUser> orgUsers,
|
||||
List<Policy> policies, SsoConfig ssoConfig, List<OrganizationConnection<ScimConfig>> scimConnections, OrganizationLicense license)
|
||||
{
|
||||
var (orgDetails, orgLicense) = GetOrganizationAndLicense(orgUsers, policies, ssoConfig, scimConnections, license);
|
||||
orgLicense.UseScim = false;
|
||||
((List<OrganizationConnection<ScimConfig>>)orgDetails.ScimConnections)
|
||||
.ForEach(c => c.SetConfig(new ScimConfig() { Enabled = false }));
|
||||
|
||||
var result = orgDetails.CanUseLicense(license, out var exception);
|
||||
|
||||
Assert.True(result);
|
||||
Assert.True(string.IsNullOrEmpty(exception));
|
||||
}
|
||||
|
||||
[Theory]
|
||||
[BitAutoData]
|
||||
[OrganizationLicenseCustomize]
|
||||
public void ValidateForOrganization_NoScimConfig_NotAllowedByLicense_Success(List<OrganizationUser> orgUsers,
|
||||
List<Policy> policies, SsoConfig ssoConfig, List<OrganizationConnection<ScimConfig>> scimConnections, OrganizationLicense license)
|
||||
{
|
||||
var (orgDetails, orgLicense) = GetOrganizationAndLicense(orgUsers, policies, ssoConfig, scimConnections, license);
|
||||
orgLicense.UseScim = false;
|
||||
orgDetails.ScimConnections = null;
|
||||
|
||||
var result = orgDetails.CanUseLicense(license, out var exception);
|
||||
|
||||
Assert.True(result);
|
||||
Assert.True(string.IsNullOrEmpty(exception));
|
||||
}
|
||||
|
||||
[Theory]
|
||||
[BitAutoData]
|
||||
[OrganizationLicenseCustomize]
|
||||
public void ValidateForOrganization_CustomPermissions_NotAllowedByLicense_Fail(List<OrganizationUser> orgUsers,
|
||||
List<Policy> policies, SsoConfig ssoConfig, List<OrganizationConnection<ScimConfig>> scimConnections, OrganizationLicense license)
|
||||
{
|
||||
var (orgDetails, orgLicense) = GetOrganizationAndLicense(orgUsers, policies, ssoConfig, scimConnections, license);
|
||||
orgLicense.UseCustomPermissions = false;
|
||||
|
||||
var result = orgDetails.CanUseLicense(license, out var exception);
|
||||
|
||||
Assert.False(result);
|
||||
Assert.Contains("Your new plan does not allow the Custom Permissions feature", exception);
|
||||
}
|
||||
|
||||
[Theory]
|
||||
[BitAutoData]
|
||||
[OrganizationLicenseCustomize]
|
||||
public void ValidateForOrganization_NoCustomPermissions_NotAllowedByLicense_Success(List<OrganizationUser> orgUsers,
|
||||
List<Policy> policies, SsoConfig ssoConfig, List<OrganizationConnection<ScimConfig>> scimConnections, OrganizationLicense license)
|
||||
{
|
||||
var (orgDetails, orgLicense) = GetOrganizationAndLicense(orgUsers, policies, ssoConfig, scimConnections, license);
|
||||
orgLicense.UseCustomPermissions = false;
|
||||
((List<OrganizationUser>)orgDetails.OrganizationUsers).ForEach(ou => ou.Type = OrganizationUserType.User);
|
||||
|
||||
var result = orgDetails.CanUseLicense(license, out var exception);
|
||||
|
||||
Assert.True(result);
|
||||
Assert.True(string.IsNullOrEmpty(exception));
|
||||
}
|
||||
|
||||
[Theory]
|
||||
[BitAutoData]
|
||||
[OrganizationLicenseCustomize]
|
||||
public void ValidateForOrganization_ResetPassword_NotAllowedByLicense_Fail(List<OrganizationUser> orgUsers,
|
||||
List<Policy> policies, SsoConfig ssoConfig, List<OrganizationConnection<ScimConfig>> scimConnections, OrganizationLicense license)
|
||||
{
|
||||
var (orgDetails, orgLicense) = GetOrganizationAndLicense(orgUsers, policies, ssoConfig, scimConnections, license);
|
||||
orgLicense.UseResetPassword = false;
|
||||
|
||||
var result = orgDetails.CanUseLicense(license, out var exception);
|
||||
|
||||
Assert.False(result);
|
||||
Assert.Contains("Your new license does not allow the Password Reset feature", exception);
|
||||
}
|
||||
|
||||
[Theory]
|
||||
[BitAutoData]
|
||||
[OrganizationLicenseCustomize]
|
||||
public void ValidateForOrganization_DisabledResetPassword_NotAllowedByLicense_Success(List<OrganizationUser> orgUsers,
|
||||
List<Policy> policies, SsoConfig ssoConfig, List<OrganizationConnection<ScimConfig>> scimConnections, OrganizationLicense license)
|
||||
{
|
||||
var (orgDetails, orgLicense) = GetOrganizationAndLicense(orgUsers, policies, ssoConfig, scimConnections, license);
|
||||
orgLicense.UseResetPassword = false;
|
||||
((List<Policy>)orgDetails.Policies).ForEach(p => p.Enabled = false);
|
||||
|
||||
var result = orgDetails.CanUseLicense(license, out var exception);
|
||||
|
||||
Assert.True(result);
|
||||
Assert.True(string.IsNullOrEmpty(exception));
|
||||
}
|
||||
|
||||
private (SelfHostedOrganizationDetails organization, OrganizationLicense license) GetOrganizationAndLicense(List<OrganizationUser> orgUsers,
|
||||
List<Policy> policies, SsoConfig ssoConfig, List<OrganizationConnection<ScimConfig>> scimConnections, OrganizationLicense license)
|
||||
{
|
||||
// The default state is that all features are used by Org and allowed by License
|
||||
// Each test then toggles on/off as necessary
|
||||
policies.ForEach(p => p.Enabled = true);
|
||||
policies.First().Type = PolicyType.ResetPassword;
|
||||
|
||||
ssoConfig.Enabled = true;
|
||||
ssoConfig.SetData(new SsoConfigurationData()
|
||||
{
|
||||
MemberDecryptionType = MemberDecryptionType.KeyConnector,
|
||||
});
|
||||
|
||||
var enabledScimConfig = new ScimConfig() { Enabled = true };
|
||||
scimConnections.ForEach(c => c.Config = enabledScimConfig);
|
||||
|
||||
orgUsers.First().Type = OrganizationUserType.Custom;
|
||||
|
||||
var organization = new SelfHostedOrganizationDetails()
|
||||
{
|
||||
OccupiedSeatCount = 10,
|
||||
CollectionCount = 5,
|
||||
GroupCount = 5,
|
||||
OrganizationUsers = orgUsers,
|
||||
Policies = policies,
|
||||
SsoConfig = ssoConfig,
|
||||
ScimConnections = scimConnections,
|
||||
|
||||
UsePolicies = true,
|
||||
UseSso = true,
|
||||
UseKeyConnector = true,
|
||||
UseScim = true,
|
||||
UseGroups = true,
|
||||
UseDirectory = true,
|
||||
UseEvents = true,
|
||||
UseTotp = true,
|
||||
Use2fa = true,
|
||||
UseApi = true,
|
||||
UseResetPassword = true,
|
||||
SelfHost = true,
|
||||
UsersGetPremium = true,
|
||||
UseCustomPermissions = true,
|
||||
};
|
||||
|
||||
license.Enabled = true;
|
||||
license.PlanType = PlanType.EnterpriseAnnually;
|
||||
license.Seats = 10;
|
||||
license.MaxCollections = 5;
|
||||
license.UsePolicies = true;
|
||||
license.UseSso = true;
|
||||
license.UseKeyConnector = true;
|
||||
license.UseScim = true;
|
||||
license.UseGroups = true;
|
||||
license.UseEvents = true;
|
||||
license.UseDirectory = true;
|
||||
license.UseTotp = true;
|
||||
license.Use2fa = true;
|
||||
license.UseApi = true;
|
||||
license.UseResetPassword = true;
|
||||
license.MaxStorageGb = 1;
|
||||
license.SelfHost = true;
|
||||
license.UsersGetPremium = true;
|
||||
license.UseCustomPermissions = true;
|
||||
license.Version = 11;
|
||||
license.Issued = DateTime.Now;
|
||||
license.Expires = DateTime.Now.AddYears(1);
|
||||
|
||||
return (organization, license);
|
||||
}
|
||||
}
|
2109
test/Core.Test/AdminConsole/Services/OrganizationServiceTests.cs
Normal file
2109
test/Core.Test/AdminConsole/Services/OrganizationServiceTests.cs
Normal file
File diff suppressed because it is too large
Load Diff
Reference in New Issue
Block a user