saveEncryptedDataActions = new();
+ if (model.Ciphers.Any())
+ {
+ saveEncryptedDataActions.Add(_cipherRepository.UpdateForKeyRotation(user.Id, model.Ciphers));
+ }
+
+ if (model.Folders.Any())
+ {
+ saveEncryptedDataActions.Add(_folderRepository.UpdateForKeyRotation(user.Id, model.Folders));
+ }
+
+ if (model.Sends.Any())
+ {
+ saveEncryptedDataActions.Add(_sendRepository.UpdateForKeyRotation(user.Id, model.Sends));
+ }
+
+ if (model.EmergencyAccesses.Any())
+ {
+ saveEncryptedDataActions.Add(
+ _emergencyAccessRepository.UpdateForKeyRotation(user.Id, model.EmergencyAccesses));
+ }
+
+ if (model.OrganizationUsers.Any())
+ {
+ saveEncryptedDataActions.Add(
+ _organizationUserRepository.UpdateForKeyRotation(user.Id, model.OrganizationUsers));
+ }
+
+ if (model.WebAuthnKeys.Any())
+ {
+ saveEncryptedDataActions.Add(_credentialRepository.UpdateKeysForRotationAsync(user.Id, model.WebAuthnKeys));
+ }
+
+ await _userRepository.UpdateUserKeyAndEncryptedDataV2Async(user, saveEncryptedDataActions);
+ await _pushService.PushLogOutAsync(user.Id);
+ return IdentityResult.Success;
+ }
+}
diff --git a/src/Core/MailTemplates/Handlebars/AdminConsole/OrganizationUserRevokedForSingleOrgPolicy.html.hbs b/src/Core/MailTemplates/Handlebars/AdminConsole/OrganizationUserRevokedForSingleOrgPolicy.html.hbs
index d04abe86c9..5b2b1a70c5 100644
--- a/src/Core/MailTemplates/Handlebars/AdminConsole/OrganizationUserRevokedForSingleOrgPolicy.html.hbs
+++ b/src/Core/MailTemplates/Handlebars/AdminConsole/OrganizationUserRevokedForSingleOrgPolicy.html.hbs
@@ -7,7 +7,7 @@
- To leave an organization, first log into the web app, select the three dot menu next to the organization name, and select Leave.
+ To leave an organization, first log into the web app, select the three dot menu next to the organization name, and select Leave.
|
diff --git a/src/Core/MailTemplates/Handlebars/AdminConsole/OrganizationUserRevokedForSingleOrgPolicy.text.hbs b/src/Core/MailTemplates/Handlebars/AdminConsole/OrganizationUserRevokedForSingleOrgPolicy.text.hbs
index f933e8cf62..6a4b48006b 100644
--- a/src/Core/MailTemplates/Handlebars/AdminConsole/OrganizationUserRevokedForSingleOrgPolicy.text.hbs
+++ b/src/Core/MailTemplates/Handlebars/AdminConsole/OrganizationUserRevokedForSingleOrgPolicy.text.hbs
@@ -1,5 +1,5 @@
{{#>BasicTextLayout}}
Your user account has been revoked from the {{OrganizationName}} organization because your account is part of multiple organizations. Before you can rejoin {{OrganizationName}}, you must first leave all other organizations.
-To leave an organization, first log in the web app (https://vault.bitwarden.com/#/login), select the three dot menu next to the organization name, and select Leave.
+To leave an organization, first log in the web app ({{{WebVaultUrl}}}/login), select the three dot menu next to the organization name, and select Leave.
{{/BasicTextLayout}}
diff --git a/src/Core/MailTemplates/Handlebars/OrganizationSeatsAutoscaled.html.hbs b/src/Core/MailTemplates/Handlebars/OrganizationSeatsAutoscaled.html.hbs
index 8277e3894a..6bdb982194 100644
--- a/src/Core/MailTemplates/Handlebars/OrganizationSeatsAutoscaled.html.hbs
+++ b/src/Core/MailTemplates/Handlebars/OrganizationSeatsAutoscaled.html.hbs
@@ -26,7 +26,7 @@
-
+
Manage subscription
diff --git a/src/Core/MailTemplates/Handlebars/OrganizationSeatsMaxReached.html.hbs b/src/Core/MailTemplates/Handlebars/OrganizationSeatsMaxReached.html.hbs
index 6ac2ee74a5..49dbe41c72 100644
--- a/src/Core/MailTemplates/Handlebars/OrganizationSeatsMaxReached.html.hbs
+++ b/src/Core/MailTemplates/Handlebars/OrganizationSeatsMaxReached.html.hbs
@@ -24,7 +24,7 @@
|
-
+
Manage subscription
diff --git a/src/Core/MailTemplates/Handlebars/OrganizationSmSeatsMaxReached.html.hbs b/src/Core/MailTemplates/Handlebars/OrganizationSmSeatsMaxReached.html.hbs
index a6db21effc..2ef6707f1f 100644
--- a/src/Core/MailTemplates/Handlebars/OrganizationSmSeatsMaxReached.html.hbs
+++ b/src/Core/MailTemplates/Handlebars/OrganizationSmSeatsMaxReached.html.hbs
@@ -24,7 +24,7 @@
|
-
+
Manage subscription
diff --git a/src/Core/MailTemplates/Handlebars/OrganizationSmServiceAccountsMaxReached.html.hbs b/src/Core/MailTemplates/Handlebars/OrganizationSmServiceAccountsMaxReached.html.hbs
index 507fdc33a9..1f4300c23e 100644
--- a/src/Core/MailTemplates/Handlebars/OrganizationSmServiceAccountsMaxReached.html.hbs
+++ b/src/Core/MailTemplates/Handlebars/OrganizationSmServiceAccountsMaxReached.html.hbs
@@ -24,7 +24,7 @@
|
-
+
Manage subscription
diff --git a/src/Core/MailTemplates/Handlebars/SecurityTasksNotification.html.hbs b/src/Core/MailTemplates/Handlebars/SecurityTasksNotification.html.hbs
index 039806f44b..ca015e3e83 100644
--- a/src/Core/MailTemplates/Handlebars/SecurityTasksNotification.html.hbs
+++ b/src/Core/MailTemplates/Handlebars/SecurityTasksNotification.html.hbs
@@ -15,14 +15,21 @@
|
+ style="display: table; width:100%; padding-bottom: 24px; text-align: center;" align="center">
+ style="display: inline-block; font-weight: bold; color: #ffffff; text-decoration: none; text-align: center; cursor: pointer; border-radius: 999px; background-color: #175DDC; border-color: #175DDC; border-style: solid; border-width: 10px 20px; margin: 0; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; box-sizing: border-box; font-size: 16px; line-height: 25px; -webkit-font-smoothing: antialiased; -webkit-text-size-adjust: none;">
Review at-risk passwords
|
+
+
+
+ {{formatAdminOwnerEmails AdminOwnerEmails}}
+ |
+
{{/SecurityTasksHtmlLayout}}
diff --git a/src/Core/MailTemplates/Handlebars/SecurityTasksNotification.text.hbs b/src/Core/MailTemplates/Handlebars/SecurityTasksNotification.text.hbs
index ba8650ad10..f6c0921165 100644
--- a/src/Core/MailTemplates/Handlebars/SecurityTasksNotification.text.hbs
+++ b/src/Core/MailTemplates/Handlebars/SecurityTasksNotification.text.hbs
@@ -5,4 +5,15 @@ breach.
Launch the Bitwarden extension to review your at-risk passwords.
Review at-risk passwords ({{{ReviewPasswordsUrl}}})
+
+{{#if AdminOwnerEmails.[0]}}
+ {{#if AdminOwnerEmails.[1]}}
+ This request was initiated by
+ {{#each AdminOwnerEmails}}
+ {{#if @last}}and {{/if}}{{this}}{{#unless @last}}, {{/unless}}
+ {{/each}}.
+ {{else}}
+ This request was initiated by {{AdminOwnerEmails.[0]}}.
+ {{/if}}
+{{/if}}
{{/SecurityTasksHtmlLayout}}
diff --git a/src/Core/Models/Commands/CommandResult.cs b/src/Core/Models/Commands/CommandResult.cs
index ae14b7d2f9..a8ec772fc1 100644
--- a/src/Core/Models/Commands/CommandResult.cs
+++ b/src/Core/Models/Commands/CommandResult.cs
@@ -1,5 +1,7 @@
#nullable enable
+using Bit.Core.AdminConsole.Errors;
+
namespace Bit.Core.Models.Commands;
public class CommandResult(IEnumerable errors)
@@ -9,7 +11,6 @@ public class CommandResult(IEnumerable errors)
public bool Success => ErrorMessages.Count == 0;
public bool HasErrors => ErrorMessages.Count > 0;
public List ErrorMessages { get; } = errors.ToList();
-
public CommandResult() : this(Array.Empty()) { }
}
@@ -29,22 +30,30 @@ public class Success : CommandResult
{
}
-public abstract class CommandResult
-{
+public abstract class CommandResult;
+public class Success(T value) : CommandResult
+{
+ public T Value { get; } = value;
}
-public class Success(T data) : CommandResult
+public class Failure(IEnumerable errorMessages) : CommandResult
{
- public T? Data { get; init; } = data;
+ public List ErrorMessages { get; } = errorMessages.ToList();
+
+ public string ErrorMessage => string.Join(" ", ErrorMessages);
+
+ public Failure(string error) : this([error]) { }
}
-public class Failure(IEnumerable errorMessage) : CommandResult
+public class Partial : CommandResult
{
- public IEnumerable ErrorMessages { get; init; } = errorMessage;
+ public T[] Successes { get; set; } = [];
+ public Error[] Failures { get; set; } = [];
- public Failure(string errorMessage) : this(new[] { errorMessage })
+ public Partial(IEnumerable successfulItems, IEnumerable> failedItems)
{
+ Successes = successfulItems.ToArray();
+ Failures = failedItems.ToArray();
}
}
-
diff --git a/src/Core/Models/Mail/OrganizationSeatsAutoscaledViewModel.cs b/src/Core/Models/Mail/OrganizationSeatsAutoscaledViewModel.cs
index 87f87b1c69..425b853d3e 100644
--- a/src/Core/Models/Mail/OrganizationSeatsAutoscaledViewModel.cs
+++ b/src/Core/Models/Mail/OrganizationSeatsAutoscaledViewModel.cs
@@ -2,7 +2,7 @@
public class OrganizationSeatsAutoscaledViewModel : BaseMailModel
{
- public Guid OrganizationId { get; set; }
public int InitialSeatCount { get; set; }
public int CurrentSeatCount { get; set; }
+ public string VaultSubscriptionUrl { get; set; }
}
diff --git a/src/Core/Models/Mail/OrganizationSeatsMaxReachedViewModel.cs b/src/Core/Models/Mail/OrganizationSeatsMaxReachedViewModel.cs
index cdfb57b2dc..ad9c48ab31 100644
--- a/src/Core/Models/Mail/OrganizationSeatsMaxReachedViewModel.cs
+++ b/src/Core/Models/Mail/OrganizationSeatsMaxReachedViewModel.cs
@@ -2,6 +2,6 @@
public class OrganizationSeatsMaxReachedViewModel : BaseMailModel
{
- public Guid OrganizationId { get; set; }
public int MaxSeatCount { get; set; }
+ public string VaultSubscriptionUrl { get; set; }
}
diff --git a/src/Core/Models/Mail/OrganizationServiceAccountsMaxReachedViewModel.cs b/src/Core/Models/Mail/OrganizationServiceAccountsMaxReachedViewModel.cs
index 1b9c925720..c814a3e564 100644
--- a/src/Core/Models/Mail/OrganizationServiceAccountsMaxReachedViewModel.cs
+++ b/src/Core/Models/Mail/OrganizationServiceAccountsMaxReachedViewModel.cs
@@ -2,6 +2,6 @@
public class OrganizationServiceAccountsMaxReachedViewModel
{
- public Guid OrganizationId { get; set; }
public int MaxServiceAccountsCount { get; set; }
+ public string VaultSubscriptionUrl { get; set; }
}
diff --git a/src/Core/Models/Mail/SecurityTaskNotificationViewModel.cs b/src/Core/Models/Mail/SecurityTaskNotificationViewModel.cs
index 7f93ac2439..8871a53424 100644
--- a/src/Core/Models/Mail/SecurityTaskNotificationViewModel.cs
+++ b/src/Core/Models/Mail/SecurityTaskNotificationViewModel.cs
@@ -8,5 +8,7 @@ public class SecurityTaskNotificationViewModel : BaseMailModel
public bool TaskCountPlural => TaskCount != 1;
+ public IEnumerable AdminOwnerEmails { get; set; }
+
public string ReviewPasswordsUrl => $"{WebVaultUrl}/browser-extension-prompt";
}
diff --git a/src/Core/OrganizationFeatures/OrganizationServiceCollectionExtensions.cs b/src/Core/OrganizationFeatures/OrganizationServiceCollectionExtensions.cs
index 232e04fbd0..e13a06f660 100644
--- a/src/Core/OrganizationFeatures/OrganizationServiceCollectionExtensions.cs
+++ b/src/Core/OrganizationFeatures/OrganizationServiceCollectionExtensions.cs
@@ -116,6 +116,7 @@ public static class OrganizationServiceCollectionExtensions
services.AddScoped();
services.AddScoped();
services.AddScoped();
+ services.AddScoped();
}
private static void AddOrganizationApiKeyCommandsQueries(this IServiceCollection services)
diff --git a/src/Core/Repositories/IUserRepository.cs b/src/Core/Repositories/IUserRepository.cs
index 040e6e1f49..0e59b9998f 100644
--- a/src/Core/Repositories/IUserRepository.cs
+++ b/src/Core/Repositories/IUserRepository.cs
@@ -32,5 +32,7 @@ public interface IUserRepository : IRepository
/// Registered database calls to update re-encrypted data.
Task UpdateUserKeyAndEncryptedDataAsync(User user,
IEnumerable updateDataActions);
+ Task UpdateUserKeyAndEncryptedDataV2Async(User user,
+ IEnumerable updateDataActions);
Task DeleteManyAsync(IEnumerable users);
}
diff --git a/src/Core/Services/IMailService.cs b/src/Core/Services/IMailService.cs
index b0b884eb3e..e61127c57a 100644
--- a/src/Core/Services/IMailService.cs
+++ b/src/Core/Services/IMailService.cs
@@ -99,5 +99,5 @@ public interface IMailService
string organizationName);
Task SendClaimedDomainUserEmailAsync(ManagedUserDomainClaimedEmails emailList);
Task SendDeviceApprovalRequestedNotificationEmailAsync(IEnumerable adminEmails, Guid organizationId, string email, string userName);
- Task SendBulkSecurityTaskNotificationsAsync(string orgName, IEnumerable securityTaskNotificaitons);
+ Task SendBulkSecurityTaskNotificationsAsync(Organization org, IEnumerable securityTaskNotifications, IEnumerable adminOwnerEmails);
}
diff --git a/src/Core/Services/Implementations/HandlebarsMailService.cs b/src/Core/Services/Implementations/HandlebarsMailService.cs
index c598a9d432..edb99809f7 100644
--- a/src/Core/Services/Implementations/HandlebarsMailService.cs
+++ b/src/Core/Services/Implementations/HandlebarsMailService.cs
@@ -214,9 +214,9 @@ public class HandlebarsMailService : IMailService
var message = CreateDefaultMessage($"{organization.DisplayName()} Seat Count Has Increased", ownerEmails);
var model = new OrganizationSeatsAutoscaledViewModel
{
- OrganizationId = organization.Id,
InitialSeatCount = initialSeatCount,
CurrentSeatCount = organization.Seats.Value,
+ VaultSubscriptionUrl = GetCloudVaultSubscriptionUrl(organization.Id)
};
await AddMessageContentAsync(message, "OrganizationSeatsAutoscaled", model);
@@ -229,8 +229,8 @@ public class HandlebarsMailService : IMailService
var message = CreateDefaultMessage($"{organization.DisplayName()} Seat Limit Reached", ownerEmails);
var model = new OrganizationSeatsMaxReachedViewModel
{
- OrganizationId = organization.Id,
MaxSeatCount = maxSeatCount,
+ VaultSubscriptionUrl = GetCloudVaultSubscriptionUrl(organization.Id)
};
await AddMessageContentAsync(message, "OrganizationSeatsMaxReached", model);
@@ -740,6 +740,45 @@ public class HandlebarsMailService : IMailService
var clickTrackingText = (clickTrackingOff ? "clicktracking=off" : string.Empty);
writer.WriteSafeString($"{text}");
});
+
+ // Construct markup for admin and owner email addresses.
+ // Using conditionals within the handlebar syntax was including extra spaces around
+ // concatenated strings, which this helper avoids.
+ Handlebars.RegisterHelper("formatAdminOwnerEmails", (writer, context, parameters) =>
+ {
+ if (parameters.Length == 0)
+ {
+ writer.WriteSafeString(string.Empty);
+ return;
+ }
+
+ var emailList = ((IEnumerable)parameters[0]).ToList();
+ if (emailList.Count == 0)
+ {
+ writer.WriteSafeString(string.Empty);
+ return;
+ }
+
+ string constructAnchorElement(string email)
+ {
+ return $"{email}";
+ }
+
+ var outputMessage = "This request was initiated by ";
+
+ if (emailList.Count == 1)
+ {
+ outputMessage += $"{constructAnchorElement(emailList[0])}.";
+ }
+ else
+ {
+ outputMessage += string.Join(", ", emailList.Take(emailList.Count - 1)
+ .Select(email => constructAnchorElement(email)));
+ outputMessage += $", and {constructAnchorElement(emailList.Last())}.";
+ }
+
+ writer.WriteSafeString($"{outputMessage}");
+ });
}
public async Task SendEmergencyAccessInviteEmailAsync(EmergencyAccess emergencyAccess, string name, string token)
@@ -1103,8 +1142,8 @@ public class HandlebarsMailService : IMailService
var message = CreateDefaultMessage($"{organization.DisplayName()} Secrets Manager Seat Limit Reached", ownerEmails);
var model = new OrganizationSeatsMaxReachedViewModel
{
- OrganizationId = organization.Id,
MaxSeatCount = maxSeatCount,
+ VaultSubscriptionUrl = GetCloudVaultSubscriptionUrl(organization.Id)
};
await AddMessageContentAsync(message, "OrganizationSmSeatsMaxReached", model);
@@ -1118,8 +1157,8 @@ public class HandlebarsMailService : IMailService
var message = CreateDefaultMessage($"{organization.DisplayName()} Secrets Manager Machine Accounts Limit Reached", ownerEmails);
var model = new OrganizationServiceAccountsMaxReachedViewModel
{
- OrganizationId = organization.Id,
MaxServiceAccountsCount = maxSeatCount,
+ VaultSubscriptionUrl = GetCloudVaultSubscriptionUrl(organization.Id)
};
await AddMessageContentAsync(message, "OrganizationSmServiceAccountsMaxReached", model);
@@ -1201,21 +1240,23 @@ public class HandlebarsMailService : IMailService
await _mailDeliveryService.SendEmailAsync(message);
}
- public async Task SendBulkSecurityTaskNotificationsAsync(string orgName, IEnumerable securityTaskNotificaitons)
+ public async Task SendBulkSecurityTaskNotificationsAsync(Organization org, IEnumerable securityTaskNotifications, IEnumerable adminOwnerEmails)
{
MailQueueMessage CreateMessage(UserSecurityTasksCount notification)
{
- var message = CreateDefaultMessage($"{orgName} has identified {notification.TaskCount} at-risk password{(notification.TaskCount.Equals(1) ? "" : "s")}", notification.Email);
+ var sanitizedOrgName = CoreHelpers.SanitizeForEmail(org.DisplayName(), false);
+ var message = CreateDefaultMessage($"{sanitizedOrgName} has identified {notification.TaskCount} at-risk password{(notification.TaskCount.Equals(1) ? "" : "s")}", notification.Email);
var model = new SecurityTaskNotificationViewModel
{
- OrgName = orgName,
+ OrgName = CoreHelpers.SanitizeForEmail(sanitizedOrgName, false),
TaskCount = notification.TaskCount,
+ AdminOwnerEmails = adminOwnerEmails,
WebVaultUrl = _globalSettings.BaseServiceUri.VaultWithHash,
};
message.Category = "SecurityTasksNotification";
return new MailQueueMessage(message, "SecurityTasksNotification", model);
}
- var messageModels = securityTaskNotificaitons.Select(CreateMessage);
+ var messageModels = securityTaskNotifications.Select(CreateMessage);
await EnqueueMailAsync(messageModels.ToList());
}
@@ -1223,4 +1264,11 @@ public class HandlebarsMailService : IMailService
{
return string.IsNullOrEmpty(userName) ? email : CoreHelpers.SanitizeForEmail(userName, false);
}
+
+ private string GetCloudVaultSubscriptionUrl(Guid organizationId)
+ => _globalSettings.BaseServiceUri.CloudRegion?.ToLower() switch
+ {
+ "eu" => $"https://vault.bitwarden.eu/#/organizations/{organizationId}/billing/subscription",
+ _ => $"https://vault.bitwarden.com/#/organizations/{organizationId}/billing/subscription"
+ };
}
diff --git a/src/Core/Services/NoopImplementations/NoopMailService.cs b/src/Core/Services/NoopImplementations/NoopMailService.cs
index 5fba545903..d829fbbacb 100644
--- a/src/Core/Services/NoopImplementations/NoopMailService.cs
+++ b/src/Core/Services/NoopImplementations/NoopMailService.cs
@@ -324,7 +324,7 @@ public class NoopMailService : IMailService
return Task.FromResult(0);
}
- public Task SendBulkSecurityTaskNotificationsAsync(string orgName, IEnumerable securityTaskNotificaitons)
+ public Task SendBulkSecurityTaskNotificationsAsync(Organization org, IEnumerable securityTaskNotifications, IEnumerable adminOwnerEmails)
{
return Task.FromResult(0);
}
diff --git a/src/Core/Tools/ImportFeatures/ImportCiphersCommand.cs b/src/Core/Tools/ImportFeatures/ImportCiphersCommand.cs
index 59d3e5be34..3c58dca183 100644
--- a/src/Core/Tools/ImportFeatures/ImportCiphersCommand.cs
+++ b/src/Core/Tools/ImportFeatures/ImportCiphersCommand.cs
@@ -1,10 +1,13 @@
using Bit.Core.AdminConsole.Enums;
+using Bit.Core.AdminConsole.OrganizationFeatures.Policies;
+using Bit.Core.AdminConsole.OrganizationFeatures.Policies.PolicyRequirements;
using Bit.Core.AdminConsole.Services;
using Bit.Core.Context;
using Bit.Core.Entities;
using Bit.Core.Exceptions;
using Bit.Core.Platform.Push;
using Bit.Core.Repositories;
+using Bit.Core.Services;
using Bit.Core.Tools.Enums;
using Bit.Core.Tools.ImportFeatures.Interfaces;
using Bit.Core.Tools.Models.Business;
@@ -26,7 +29,8 @@ public class ImportCiphersCommand : IImportCiphersCommand
private readonly ICollectionRepository _collectionRepository;
private readonly IReferenceEventService _referenceEventService;
private readonly ICurrentContext _currentContext;
-
+ private readonly IPolicyRequirementQuery _policyRequirementQuery;
+ private readonly IFeatureService _featureService;
public ImportCiphersCommand(
ICipherRepository cipherRepository,
@@ -37,7 +41,9 @@ public class ImportCiphersCommand : IImportCiphersCommand
IPushNotificationService pushService,
IPolicyService policyService,
IReferenceEventService referenceEventService,
- ICurrentContext currentContext)
+ ICurrentContext currentContext,
+ IPolicyRequirementQuery policyRequirementQuery,
+ IFeatureService featureService)
{
_cipherRepository = cipherRepository;
_folderRepository = folderRepository;
@@ -48,9 +54,10 @@ public class ImportCiphersCommand : IImportCiphersCommand
_policyService = policyService;
_referenceEventService = referenceEventService;
_currentContext = currentContext;
+ _policyRequirementQuery = policyRequirementQuery;
+ _featureService = featureService;
}
-
public async Task ImportIntoIndividualVaultAsync(
List folders,
List ciphers,
@@ -58,8 +65,11 @@ public class ImportCiphersCommand : IImportCiphersCommand
Guid importingUserId)
{
// Make sure the user can save new ciphers to their personal vault
- var anyPersonalOwnershipPolicies = await _policyService.AnyPoliciesApplicableToUserAsync(importingUserId, PolicyType.PersonalOwnership);
- if (anyPersonalOwnershipPolicies)
+ var isPersonalVaultRestricted = _featureService.IsEnabled(FeatureFlagKeys.PolicyRequirements)
+ ? (await _policyRequirementQuery.GetAsync(importingUserId)).DisablePersonalOwnership
+ : await _policyService.AnyPoliciesApplicableToUserAsync(importingUserId, PolicyType.PersonalOwnership);
+
+ if (isPersonalVaultRestricted)
{
throw new BadRequestException("You cannot import items into your personal vault because you are " +
"a member of an organization which forbids it.");
diff --git a/src/Core/Vault/Commands/CreateManyTaskNotificationsCommand.cs b/src/Core/Vault/Commands/CreateManyTaskNotificationsCommand.cs
index 58b5f65e0f..a335b059a4 100644
--- a/src/Core/Vault/Commands/CreateManyTaskNotificationsCommand.cs
+++ b/src/Core/Vault/Commands/CreateManyTaskNotificationsCommand.cs
@@ -17,19 +17,22 @@ public class CreateManyTaskNotificationsCommand : ICreateManyTaskNotificationsCo
private readonly IMailService _mailService;
private readonly ICreateNotificationCommand _createNotificationCommand;
private readonly IPushNotificationService _pushNotificationService;
+ private readonly IOrganizationUserRepository _organizationUserRepository;
public CreateManyTaskNotificationsCommand(
IGetSecurityTasksNotificationDetailsQuery getSecurityTasksNotificationDetailsQuery,
IOrganizationRepository organizationRepository,
IMailService mailService,
ICreateNotificationCommand createNotificationCommand,
- IPushNotificationService pushNotificationService)
+ IPushNotificationService pushNotificationService,
+ IOrganizationUserRepository organizationUserRepository)
{
_getSecurityTasksNotificationDetailsQuery = getSecurityTasksNotificationDetailsQuery;
_organizationRepository = organizationRepository;
_mailService = mailService;
_createNotificationCommand = createNotificationCommand;
_pushNotificationService = pushNotificationService;
+ _organizationUserRepository = organizationUserRepository;
}
public async Task CreateAsync(Guid orgId, IEnumerable securityTasks)
@@ -45,8 +48,11 @@ public class CreateManyTaskNotificationsCommand : ICreateManyTaskNotificationsCo
}).ToList();
var organization = await _organizationRepository.GetByIdAsync(orgId);
+ var orgAdminEmails = await _organizationUserRepository.GetManyDetailsByRoleAsync(orgId, OrganizationUserType.Admin);
+ var orgOwnerEmails = await _organizationUserRepository.GetManyDetailsByRoleAsync(orgId, OrganizationUserType.Owner);
+ var orgAdminAndOwnerEmails = orgAdminEmails.Concat(orgOwnerEmails).Select(x => x.Email).Distinct().ToList();
- await _mailService.SendBulkSecurityTaskNotificationsAsync(organization.Name, userTaskCount);
+ await _mailService.SendBulkSecurityTaskNotificationsAsync(organization, userTaskCount, orgAdminAndOwnerEmails);
// Break securityTaskCiphers into separate lists by user Id
var securityTaskCiphersByUser = securityTaskCiphers.GroupBy(x => x.UserId)
diff --git a/src/Core/Vault/Services/Implementations/CipherService.cs b/src/Core/Vault/Services/Implementations/CipherService.cs
index 90c03df90b..b9daafe599 100644
--- a/src/Core/Vault/Services/Implementations/CipherService.cs
+++ b/src/Core/Vault/Services/Implementations/CipherService.cs
@@ -1,5 +1,7 @@
using System.Text.Json;
using Bit.Core.AdminConsole.Enums;
+using Bit.Core.AdminConsole.OrganizationFeatures.Policies;
+using Bit.Core.AdminConsole.OrganizationFeatures.Policies.PolicyRequirements;
using Bit.Core.AdminConsole.Services;
using Bit.Core.Context;
using Bit.Core.Enums;
@@ -13,7 +15,9 @@ using Bit.Core.Tools.Models.Business;
using Bit.Core.Tools.Services;
using Bit.Core.Utilities;
using Bit.Core.Vault.Entities;
+using Bit.Core.Vault.Enums;
using Bit.Core.Vault.Models.Data;
+using Bit.Core.Vault.Queries;
using Bit.Core.Vault.Repositories;
namespace Bit.Core.Vault.Services;
@@ -38,6 +42,9 @@ public class CipherService : ICipherService
private const long _fileSizeLeeway = 1024L * 1024L; // 1MB
private readonly IReferenceEventService _referenceEventService;
private readonly ICurrentContext _currentContext;
+ private readonly IGetCipherPermissionsForUserQuery _getCipherPermissionsForUserQuery;
+ private readonly IPolicyRequirementQuery _policyRequirementQuery;
+ private readonly IFeatureService _featureService;
public CipherService(
ICipherRepository cipherRepository,
@@ -54,7 +61,10 @@ public class CipherService : ICipherService
IPolicyService policyService,
GlobalSettings globalSettings,
IReferenceEventService referenceEventService,
- ICurrentContext currentContext)
+ ICurrentContext currentContext,
+ IGetCipherPermissionsForUserQuery getCipherPermissionsForUserQuery,
+ IPolicyRequirementQuery policyRequirementQuery,
+ IFeatureService featureService)
{
_cipherRepository = cipherRepository;
_folderRepository = folderRepository;
@@ -71,6 +81,9 @@ public class CipherService : ICipherService
_globalSettings = globalSettings;
_referenceEventService = referenceEventService;
_currentContext = currentContext;
+ _getCipherPermissionsForUserQuery = getCipherPermissionsForUserQuery;
+ _policyRequirementQuery = policyRequirementQuery;
+ _featureService = featureService;
}
public async Task SaveAsync(Cipher cipher, Guid savingUserId, DateTime? lastKnownRevisionDate,
@@ -138,9 +151,11 @@ public class CipherService : ICipherService
}
else
{
- // Make sure the user can save new ciphers to their personal vault
- var anyPersonalOwnershipPolicies = await _policyService.AnyPoliciesApplicableToUserAsync(savingUserId, PolicyType.PersonalOwnership);
- if (anyPersonalOwnershipPolicies)
+ var isPersonalVaultRestricted = _featureService.IsEnabled(FeatureFlagKeys.PolicyRequirements)
+ ? (await _policyRequirementQuery.GetAsync(savingUserId)).DisablePersonalOwnership
+ : await _policyService.AnyPoliciesApplicableToUserAsync(savingUserId, PolicyType.PersonalOwnership);
+
+ if (isPersonalVaultRestricted)
{
throw new BadRequestException("Due to an Enterprise Policy, you are restricted from saving items to your personal vault.");
}
@@ -161,6 +176,7 @@ public class CipherService : ICipherService
{
ValidateCipherLastKnownRevisionDateAsync(cipher, lastKnownRevisionDate);
cipher.RevisionDate = DateTime.UtcNow;
+ await ValidateViewPasswordUserAsync(cipher);
await _cipherRepository.ReplaceAsync(cipher);
await _eventService.LogCipherEventAsync(cipher, Bit.Core.Enums.EventType.Cipher_Updated);
@@ -966,4 +982,32 @@ public class CipherService : ICipherService
ValidateCipherLastKnownRevisionDateAsync(cipher, lastKnownRevisionDate);
}
+
+ private async Task ValidateViewPasswordUserAsync(Cipher cipher)
+ {
+ if (cipher.Type != CipherType.Login || cipher.Data == null || !cipher.OrganizationId.HasValue)
+ {
+ return;
+ }
+ var existingCipher = await _cipherRepository.GetByIdAsync(cipher.Id);
+ if (existingCipher == null) return;
+
+ var cipherPermissions = await _getCipherPermissionsForUserQuery.GetByOrganization(cipher.OrganizationId.Value);
+ // Check if user is a "hidden password" user
+ if (!cipherPermissions.TryGetValue(cipher.Id, out var permission) || !(permission.ViewPassword && permission.Edit))
+ {
+ // "hidden password" users may not add cipher key encryption
+ if (existingCipher.Key == null && cipher.Key != null)
+ {
+ throw new BadRequestException("You do not have permission to add cipher key encryption.");
+ }
+ // "hidden password" users may not change passwords, TOTP codes, or passkeys, so we need to set them back to the original values
+ var existingCipherData = JsonSerializer.Deserialize(existingCipher.Data);
+ var newCipherData = JsonSerializer.Deserialize(cipher.Data);
+ newCipherData.Fido2Credentials = existingCipherData.Fido2Credentials;
+ newCipherData.Totp = existingCipherData.Totp;
+ newCipherData.Password = existingCipherData.Password;
+ cipher.Data = JsonSerializer.Serialize(newCipherData);
+ }
+ }
}
diff --git a/src/Icons/Icons.csproj b/src/Icons/Icons.csproj
index 1674e2f877..455c8b3155 100644
--- a/src/Icons/Icons.csproj
+++ b/src/Icons/Icons.csproj
@@ -7,7 +7,7 @@
-
+
diff --git a/src/Identity/IdentityServer/RequestValidators/DeviceValidator.cs b/src/Identity/IdentityServer/RequestValidators/DeviceValidator.cs
index 3ddc28c0e1..36a08326ab 100644
--- a/src/Identity/IdentityServer/RequestValidators/DeviceValidator.cs
+++ b/src/Identity/IdentityServer/RequestValidators/DeviceValidator.cs
@@ -250,6 +250,11 @@ public class DeviceValidator(
var customResponse = new Dictionary();
switch (errorType)
{
+ /*
+ * The ErrorMessage is brittle and is used to control the flow in the clients. Do not change them without updating the client as well.
+ * There is a backwards compatibility issue as well: if you make a change on the clients then ensure that they are backwards
+ * compatible.
+ */
case DeviceValidationResultType.InvalidUser:
result.ErrorDescription = "Invalid user";
customResponse.Add("ErrorModel", new ErrorResponseModel("invalid user"));
diff --git a/src/Identity/IdentityServer/RequestValidators/TwoFactorAuthenticationValidator.cs b/src/Identity/IdentityServer/RequestValidators/TwoFactorAuthenticationValidator.cs
index 856846cdd6..e733d4f410 100644
--- a/src/Identity/IdentityServer/RequestValidators/TwoFactorAuthenticationValidator.cs
+++ b/src/Identity/IdentityServer/RequestValidators/TwoFactorAuthenticationValidator.cs
@@ -1,5 +1,4 @@
using System.Text.Json;
-using Bit.Core;
using Bit.Core.AdminConsole.Entities;
using Bit.Core.Auth.Enums;
using Bit.Core.Auth.Identity.TokenProviders;
@@ -155,12 +154,9 @@ public class TwoFactorAuthenticationValidator(
return false;
}
- if (_featureService.IsEnabled(FeatureFlagKeys.RecoveryCodeLogin))
+ if (type is TwoFactorProviderType.RecoveryCode)
{
- if (type is TwoFactorProviderType.RecoveryCode)
- {
- return await _userService.RecoverTwoFactorAsync(user, token);
- }
+ return await _userService.RecoverTwoFactorAsync(user, token);
}
// These cases we want to always return false, U2f is deprecated and OrganizationDuo
diff --git a/src/Infrastructure.Dapper/AdminConsole/Repositories/OrganizationUserRepository.cs b/src/Infrastructure.Dapper/AdminConsole/Repositories/OrganizationUserRepository.cs
index 9b77fb216e..07b55aa44a 100644
--- a/src/Infrastructure.Dapper/AdminConsole/Repositories/OrganizationUserRepository.cs
+++ b/src/Infrastructure.Dapper/AdminConsole/Repositories/OrganizationUserRepository.cs
@@ -563,8 +563,8 @@ public class OrganizationUserRepository : Repository, IO
await using var connection = new SqlConnection(ConnectionString);
await connection.ExecuteAsync(
- "[dbo].[OrganizationUser_SetStatusForUsersById]",
- new { OrganizationUserIds = JsonSerializer.Serialize(organizationUserIds), Status = OrganizationUserStatusType.Revoked },
+ "[dbo].[OrganizationUser_SetStatusForUsersByGuidIdArray]",
+ new { OrganizationUserIds = organizationUserIds.ToGuidIdArrayTVP(), Status = OrganizationUserStatusType.Revoked },
commandType: CommandType.StoredProcedure);
}
diff --git a/src/Infrastructure.Dapper/Infrastructure.Dapper.csproj b/src/Infrastructure.Dapper/Infrastructure.Dapper.csproj
index 19512670ce..c51af39824 100644
--- a/src/Infrastructure.Dapper/Infrastructure.Dapper.csproj
+++ b/src/Infrastructure.Dapper/Infrastructure.Dapper.csproj
@@ -2,7 +2,7 @@
- $(WarningsNotAsErrors);CS8618;CS4014
+ $(WarningsNotAsErrors);CS8618
diff --git a/src/Infrastructure.Dapper/Repositories/UserRepository.cs b/src/Infrastructure.Dapper/Repositories/UserRepository.cs
index 227a7c03e5..28478a0c41 100644
--- a/src/Infrastructure.Dapper/Repositories/UserRepository.cs
+++ b/src/Infrastructure.Dapper/Repositories/UserRepository.cs
@@ -254,6 +254,42 @@ public class UserRepository : Repository, IUserRepository
}
+ public async Task UpdateUserKeyAndEncryptedDataV2Async(
+ User user,
+ IEnumerable updateDataActions)
+ {
+ await using var connection = new SqlConnection(ConnectionString);
+ connection.Open();
+
+ await using var transaction = connection.BeginTransaction();
+ try
+ {
+ user.AccountRevisionDate = user.RevisionDate;
+
+ ProtectData(user);
+ await connection.ExecuteAsync(
+ $"[{Schema}].[{Table}_Update]",
+ user,
+ transaction: transaction,
+ commandType: CommandType.StoredProcedure);
+
+ // Update re-encrypted data
+ foreach (var action in updateDataActions)
+ {
+ await action(connection, transaction);
+ }
+ transaction.Commit();
+ }
+ catch
+ {
+ transaction.Rollback();
+ UnprotectData(user);
+ throw;
+ }
+ UnprotectData(user);
+ }
+
+
public async Task> GetManyAsync(IEnumerable ids)
{
using (var connection = new SqlConnection(ReadOnlyConnectionString))
@@ -295,6 +331,18 @@ public class UserRepository : Repository, IUserRepository
var originalKey = user.Key;
// Protect values
+ ProtectData(user);
+
+ // Save
+ await saveTask();
+
+ // Restore original values
+ user.MasterPassword = originalMasterPassword;
+ user.Key = originalKey;
+ }
+
+ private void ProtectData(User user)
+ {
if (!user.MasterPassword?.StartsWith(Constants.DatabaseFieldProtectedPrefix) ?? false)
{
user.MasterPassword = string.Concat(Constants.DatabaseFieldProtectedPrefix,
@@ -306,13 +354,6 @@ public class UserRepository : Repository, IUserRepository
user.Key = string.Concat(Constants.DatabaseFieldProtectedPrefix,
_dataProtector.Protect(user.Key!));
}
-
- // Save
- await saveTask();
-
- // Restore original values
- user.MasterPassword = originalMasterPassword;
- user.Key = originalKey;
}
private void UnprotectData(User? user)
diff --git a/src/Infrastructure.EntityFramework/AdminConsole/Configurations/OrganizationIntegrationConfigurationEntityTypeConfiguration.cs b/src/Infrastructure.EntityFramework/AdminConsole/Configurations/OrganizationIntegrationConfigurationEntityTypeConfiguration.cs
new file mode 100644
index 0000000000..29712f5e38
--- /dev/null
+++ b/src/Infrastructure.EntityFramework/AdminConsole/Configurations/OrganizationIntegrationConfigurationEntityTypeConfiguration.cs
@@ -0,0 +1,17 @@
+using Bit.Infrastructure.EntityFramework.AdminConsole.Models;
+using Microsoft.EntityFrameworkCore;
+using Microsoft.EntityFrameworkCore.Metadata.Builders;
+
+namespace Bit.Infrastructure.EntityFramework.AdminConsole.Configurations;
+
+public class OrganizationIntegrationConfigurationEntityTypeConfiguration : IEntityTypeConfiguration
+{
+ public void Configure(EntityTypeBuilder builder)
+ {
+ builder
+ .Property(p => p.Id)
+ .ValueGeneratedNever();
+
+ builder.ToTable(nameof(OrganizationIntegrationConfiguration));
+ }
+}
diff --git a/src/Infrastructure.EntityFramework/AdminConsole/Configurations/OrganizationIntegrationEntityTypeConfiguration.cs b/src/Infrastructure.EntityFramework/AdminConsole/Configurations/OrganizationIntegrationEntityTypeConfiguration.cs
new file mode 100644
index 0000000000..c2134c1b7d
--- /dev/null
+++ b/src/Infrastructure.EntityFramework/AdminConsole/Configurations/OrganizationIntegrationEntityTypeConfiguration.cs
@@ -0,0 +1,26 @@
+using Bit.Infrastructure.EntityFramework.AdminConsole.Models;
+using Microsoft.EntityFrameworkCore;
+using Microsoft.EntityFrameworkCore.Metadata.Builders;
+
+namespace Bit.Infrastructure.EntityFramework.AdminConsole.Configurations;
+
+public class OrganizationIntegrationEntityTypeConfiguration : IEntityTypeConfiguration
+{
+ public void Configure(EntityTypeBuilder builder)
+ {
+ builder
+ .Property(p => p.Id)
+ .ValueGeneratedNever();
+
+ builder
+ .HasIndex(p => p.OrganizationId)
+ .IsClustered(false);
+
+ builder
+ .HasIndex(p => new { p.OrganizationId, p.Type })
+ .IsUnique()
+ .IsClustered(false);
+
+ builder.ToTable(nameof(OrganizationIntegration));
+ }
+}
diff --git a/src/Infrastructure.EntityFramework/AdminConsole/Models/OrganizationIntegration.cs b/src/Infrastructure.EntityFramework/AdminConsole/Models/OrganizationIntegration.cs
new file mode 100644
index 0000000000..db81b81166
--- /dev/null
+++ b/src/Infrastructure.EntityFramework/AdminConsole/Models/OrganizationIntegration.cs
@@ -0,0 +1,16 @@
+using AutoMapper;
+
+namespace Bit.Infrastructure.EntityFramework.AdminConsole.Models;
+
+public class OrganizationIntegration : Core.AdminConsole.Entities.OrganizationIntegration
+{
+ public virtual Organization Organization { get; set; }
+}
+
+public class OrganizationIntegrationMapperProfile : Profile
+{
+ public OrganizationIntegrationMapperProfile()
+ {
+ CreateMap().ReverseMap();
+ }
+}
diff --git a/src/Infrastructure.EntityFramework/AdminConsole/Models/OrganizationIntegrationConfiguration.cs b/src/Infrastructure.EntityFramework/AdminConsole/Models/OrganizationIntegrationConfiguration.cs
new file mode 100644
index 0000000000..465a49dc02
--- /dev/null
+++ b/src/Infrastructure.EntityFramework/AdminConsole/Models/OrganizationIntegrationConfiguration.cs
@@ -0,0 +1,16 @@
+using AutoMapper;
+
+namespace Bit.Infrastructure.EntityFramework.AdminConsole.Models;
+
+public class OrganizationIntegrationConfiguration : Core.AdminConsole.Entities.OrganizationIntegrationConfiguration
+{
+ public virtual OrganizationIntegration OrganizationIntegration { get; set; }
+}
+
+public class OrganizationIntegrationConfigurationMapperProfile : Profile
+{
+ public OrganizationIntegrationConfigurationMapperProfile()
+ {
+ CreateMap().ReverseMap();
+ }
+}
diff --git a/src/Infrastructure.EntityFramework/Repositories/UserRepository.cs b/src/Infrastructure.EntityFramework/Repositories/UserRepository.cs
index cbfefb6483..127646ed59 100644
--- a/src/Infrastructure.EntityFramework/Repositories/UserRepository.cs
+++ b/src/Infrastructure.EntityFramework/Repositories/UserRepository.cs
@@ -170,6 +170,7 @@ public class UserRepository : Repository, IUserR
entity.SecurityStamp = user.SecurityStamp;
entity.Key = user.Key;
+
entity.PrivateKey = user.PrivateKey;
entity.LastKeyRotationDate = user.LastKeyRotationDate;
entity.AccountRevisionDate = user.AccountRevisionDate;
@@ -194,6 +195,52 @@ public class UserRepository : Repository, IUserR
}
+
+ public async Task UpdateUserKeyAndEncryptedDataV2Async(Core.Entities.User user,
+ IEnumerable updateDataActions)
+ {
+ using var scope = ServiceScopeFactory.CreateScope();
+ var dbContext = GetDatabaseContext(scope);
+
+ await using var transaction = await dbContext.Database.BeginTransactionAsync();
+
+ // Update user
+ var userEntity = await dbContext.Users.FindAsync(user.Id);
+ if (userEntity == null)
+ {
+ throw new ArgumentException("User not found", nameof(user));
+ }
+
+ userEntity.SecurityStamp = user.SecurityStamp;
+ userEntity.Key = user.Key;
+ userEntity.PrivateKey = user.PrivateKey;
+
+ userEntity.Kdf = user.Kdf;
+ userEntity.KdfIterations = user.KdfIterations;
+ userEntity.KdfMemory = user.KdfMemory;
+ userEntity.KdfParallelism = user.KdfParallelism;
+
+ userEntity.Email = user.Email;
+
+ userEntity.MasterPassword = user.MasterPassword;
+ userEntity.MasterPasswordHint = user.MasterPasswordHint;
+
+ userEntity.LastKeyRotationDate = user.LastKeyRotationDate;
+ userEntity.AccountRevisionDate = user.AccountRevisionDate;
+ userEntity.RevisionDate = user.RevisionDate;
+
+ await dbContext.SaveChangesAsync();
+
+ // Update re-encrypted data
+ foreach (var action in updateDataActions)
+ {
+ // connection and transaction aren't used in EF
+ await action();
+ }
+
+ await transaction.CommitAsync();
+ }
+
public async Task> GetManyAsync(IEnumerable ids)
{
using (var scope = ServiceScopeFactory.CreateScope())
diff --git a/src/Sql/dbo/Stored Procedures/OrganizationIntegrationConfiguration_ReadManyByEventTypeOrganizationIdIntegrationType.sql b/src/Sql/dbo/Stored Procedures/OrganizationIntegrationConfiguration_ReadManyByEventTypeOrganizationIdIntegrationType.sql
new file mode 100644
index 0000000000..113aa2e529
--- /dev/null
+++ b/src/Sql/dbo/Stored Procedures/OrganizationIntegrationConfiguration_ReadManyByEventTypeOrganizationIdIntegrationType.sql
@@ -0,0 +1,22 @@
+CREATE PROCEDURE [dbo].[OrganizationIntegrationConfiguration_ReadManyByEventTypeOrganizationIdIntegrationType]
+ @EventType SMALLINT,
+ @OrganizationId UNIQUEIDENTIFIER,
+ @IntegrationType SMALLINT
+AS
+BEGIN
+ SET NOCOUNT ON
+
+ SELECT
+ oic.*
+ FROM
+ [dbo].[OrganizationIntegrationConfigurationView] oic
+ INNER JOIN
+ [dbo].[OrganizationIntegration] oi ON oi.[Id] = oic.[OrganizationIntegrationId]
+ WHERE
+ oic.[EventType] = @EventType
+ AND
+ oi.[OrganizationId] = @OrganizationId
+ AND
+ oi.[Type] = @IntegrationType
+END
+GO
diff --git a/src/Sql/dbo/Stored Procedures/OrganizationUser_SetStatusForUsersByGuidIdArray.sql b/src/Sql/dbo/Stored Procedures/OrganizationUser_SetStatusForUsersByGuidIdArray.sql
new file mode 100644
index 0000000000..7843748d72
--- /dev/null
+++ b/src/Sql/dbo/Stored Procedures/OrganizationUser_SetStatusForUsersByGuidIdArray.sql
@@ -0,0 +1,14 @@
+CREATE PROCEDURE [dbo].[OrganizationUser_SetStatusForUsersByGuidIdArray]
+ @OrganizationUserIds AS [dbo].[GuidIdArray] READONLY,
+ @Status SMALLINT
+AS
+BEGIN
+ SET NOCOUNT ON
+
+ UPDATE OU
+ SET OU.[Status] = @Status
+ FROM [dbo].[OrganizationUser] OU
+ INNER JOIN @OrganizationUserIds OUI ON OUI.[Id] = OU.[Id]
+
+ EXEC [dbo].[User_BumpAccountRevisionDateByOrganizationUserIds] @OrganizationUserIds
+END
diff --git a/src/Sql/dbo/Tables/OrganizationIntegration.sql b/src/Sql/dbo/Tables/OrganizationIntegration.sql
new file mode 100644
index 0000000000..8ac289c303
--- /dev/null
+++ b/src/Sql/dbo/Tables/OrganizationIntegration.sql
@@ -0,0 +1,20 @@
+CREATE TABLE [dbo].[OrganizationIntegration]
+(
+ [Id] UNIQUEIDENTIFIER NOT NULL,
+ [OrganizationId] UNIQUEIDENTIFIER NOT NULL,
+ [Type] SMALLINT NOT NULL,
+ [Configuration] VARCHAR (MAX) NULL,
+ [CreationDate] DATETIME2 (7) NOT NULL,
+ [RevisionDate] DATETIME2 (7) NOT NULL,
+ CONSTRAINT [PK_OrganizationIntegration] PRIMARY KEY CLUSTERED ([Id] ASC),
+ CONSTRAINT [FK_OrganizationIntegration_Organization] FOREIGN KEY ([OrganizationId]) REFERENCES [dbo].[Organization] ([Id])
+);
+GO
+
+CREATE NONCLUSTERED INDEX [IX_OrganizationIntegration_OrganizationId]
+ ON [dbo].[OrganizationIntegration]([OrganizationId] ASC);
+GO
+
+CREATE UNIQUE INDEX [IX_OrganizationIntegration_Organization_Type]
+ ON [dbo].[OrganizationIntegration]([OrganizationId], [Type]);
+GO
diff --git a/src/Sql/dbo/Tables/OrganizationIntegrationConfiguration.sql b/src/Sql/dbo/Tables/OrganizationIntegrationConfiguration.sql
new file mode 100644
index 0000000000..9dbb2341a7
--- /dev/null
+++ b/src/Sql/dbo/Tables/OrganizationIntegrationConfiguration.sql
@@ -0,0 +1,13 @@
+CREATE TABLE [dbo].[OrganizationIntegrationConfiguration]
+(
+ [Id] UNIQUEIDENTIFIER NOT NULL,
+ [OrganizationIntegrationId] UNIQUEIDENTIFIER NOT NULL,
+ [EventType] SMALLINT NOT NULL,
+ [Configuration] VARCHAR (MAX) NULL,
+ [Template] VARCHAR (MAX) NULL,
+ [CreationDate] DATETIME2 (7) NOT NULL,
+ [RevisionDate] DATETIME2 (7) NOT NULL,
+ CONSTRAINT [PK_OrganizationIntegrationConfiguration] PRIMARY KEY CLUSTERED ([Id] ASC),
+ CONSTRAINT [FK_OrganizationIntegrationConfiguration_OrganizationIntegration] FOREIGN KEY ([OrganizationIntegrationId]) REFERENCES [dbo].[OrganizationIntegration] ([Id])
+);
+GO
diff --git a/src/Sql/dbo/Views/OrganizationIntegrationConfigurationView.sql b/src/Sql/dbo/Views/OrganizationIntegrationConfigurationView.sql
new file mode 100644
index 0000000000..4f39fbc8f3
--- /dev/null
+++ b/src/Sql/dbo/Views/OrganizationIntegrationConfigurationView.sql
@@ -0,0 +1,6 @@
+CREATE VIEW [dbo].[OrganizationIntegrationConfigurationView]
+AS
+ SELECT
+ *
+ FROM
+ [dbo].[OrganizationIntegrationConfiguration]
diff --git a/src/Sql/dbo/Views/OrganizationIntegrationView.sql b/src/Sql/dbo/Views/OrganizationIntegrationView.sql
new file mode 100644
index 0000000000..31e005d5d2
--- /dev/null
+++ b/src/Sql/dbo/Views/OrganizationIntegrationView.sql
@@ -0,0 +1,6 @@
+CREATE VIEW [dbo].[OrganizationIntegrationView]
+AS
+ SELECT
+ *
+ FROM
+ [dbo].[OrganizationIntegration]
diff --git a/test/Api.IntegrationTest/KeyManagement/Controllers/AccountsKeyManagementControllerTests.cs b/test/Api.IntegrationTest/KeyManagement/Controllers/AccountsKeyManagementControllerTests.cs
index ec7ca37460..7c05e1d680 100644
--- a/test/Api.IntegrationTest/KeyManagement/Controllers/AccountsKeyManagementControllerTests.cs
+++ b/test/Api.IntegrationTest/KeyManagement/Controllers/AccountsKeyManagementControllerTests.cs
@@ -2,12 +2,18 @@
using Bit.Api.IntegrationTest.Factories;
using Bit.Api.IntegrationTest.Helpers;
using Bit.Api.KeyManagement.Models.Requests;
+using Bit.Api.Tools.Models.Request;
+using Bit.Api.Vault.Models;
+using Bit.Api.Vault.Models.Request;
using Bit.Core.Auth.Entities;
using Bit.Core.Auth.Enums;
using Bit.Core.Billing.Enums;
+using Bit.Core.Entities;
using Bit.Core.Enums;
using Bit.Core.Repositories;
+using Bit.Core.Vault.Enums;
using Bit.Test.Common.AutoFixture.Attributes;
+using Microsoft.AspNetCore.Identity;
using Xunit;
namespace Bit.Api.IntegrationTest.KeyManagement.Controllers;
@@ -23,6 +29,7 @@ public class AccountsKeyManagementControllerTests : IClassFixture _passwordHasher;
private string _ownerEmail = null!;
public AccountsKeyManagementControllerTests(ApiApplicationFactory factory)
@@ -35,6 +42,7 @@ public class AccountsKeyManagementControllerTests : IClassFixture();
_emergencyAccessRepository = _factory.GetService();
_organizationUserRepository = _factory.GetService();
+ _passwordHasher = _factory.GetService>();
}
public async Task InitializeAsync()
@@ -161,4 +169,87 @@ public class AccountsKeyManagementControllerTests : IClassFixture(), Arg.Any())
.Returns(organizationUsers);
}
+
+ [Theory]
+ [BitAutoData]
+ public async Task Accept_WhenOrganizationUsePoliciesIsEnabledAndResetPolicyIsEnabled_WithPolicyRequirementsEnabled_ShouldHandleResetPassword(Guid orgId, Guid orgUserId,
+ OrganizationUserAcceptRequestModel model, User user, SutProvider sutProvider)
+ {
+ // Arrange
+ var applicationCacheService = sutProvider.GetDependency();
+ applicationCacheService.GetOrganizationAbilityAsync(orgId).Returns(new OrganizationAbility { UsePolicies = true });
+
+ sutProvider.GetDependency().IsEnabled(FeatureFlagKeys.PolicyRequirements).Returns(true);
+
+ var policy = new Policy
+ {
+ Enabled = true,
+ Data = CoreHelpers.ClassToJsonData(new ResetPasswordDataModel { AutoEnrollEnabled = true, }),
+ };
+ var userService = sutProvider.GetDependency();
+ userService.GetUserByPrincipalAsync(default).ReturnsForAnyArgs(user);
+
+ var policyRequirementQuery = sutProvider.GetDependency();
+
+ var policyRepository = sutProvider.GetDependency();
+
+ var policyRequirement = new ResetPasswordPolicyRequirement { AutoEnrollOrganizations = [orgId] };
+
+ policyRequirementQuery.GetAsync(user.Id).Returns(policyRequirement);
+
+ // Act
+ await sutProvider.Sut.Accept(orgId, orgUserId, model);
+
+ // Assert
+ await sutProvider.GetDependency().Received(1)
+ .AcceptOrgUserByEmailTokenAsync(orgUserId, user, model.Token, userService);
+ await sutProvider.GetDependency().Received(1)
+ .UpdateUserResetPasswordEnrollmentAsync(orgId, user.Id, model.ResetPasswordKey, user.Id);
+
+ await userService.Received(1).GetUserByPrincipalAsync(default);
+ await applicationCacheService.Received(0).GetOrganizationAbilityAsync(orgId);
+ await policyRepository.Received(0).GetByOrganizationIdTypeAsync(orgId, PolicyType.ResetPassword);
+ await policyRequirementQuery.Received(1).GetAsync(user.Id);
+ Assert.True(policyRequirement.AutoEnrollEnabled(orgId));
+ }
+
+ [Theory]
+ [BitAutoData]
+ public async Task Accept_WithInvalidModelResetPasswordKey_WithPolicyRequirementsEnabled_ThrowsBadRequestException(Guid orgId, Guid orgUserId,
+ OrganizationUserAcceptRequestModel model, User user, SutProvider sutProvider)
+ {
+ // Arrange
+ model.ResetPasswordKey = " ";
+ var applicationCacheService = sutProvider.GetDependency();
+ applicationCacheService.GetOrganizationAbilityAsync(orgId).Returns(new OrganizationAbility { UsePolicies = true });
+
+ sutProvider.GetDependency().IsEnabled(FeatureFlagKeys.PolicyRequirements).Returns(true);
+
+ var policy = new Policy
+ {
+ Enabled = true,
+ Data = CoreHelpers.ClassToJsonData(new ResetPasswordDataModel { AutoEnrollEnabled = true, }),
+ };
+ var userService = sutProvider.GetDependency();
+ userService.GetUserByPrincipalAsync(default).ReturnsForAnyArgs(user);
+
+ var policyRepository = sutProvider.GetDependency();
+
+ var policyRequirementQuery = sutProvider.GetDependency();
+
+ var policyRequirement = new ResetPasswordPolicyRequirement { AutoEnrollOrganizations = [orgId] };
+
+ policyRequirementQuery.GetAsync(user.Id).Returns(policyRequirement);
+
+ // Act
+ var exception = await Assert.ThrowsAsync(() =>
+ sutProvider.Sut.Accept(orgId, orgUserId, model));
+
+ // Assert
+ await sutProvider.GetDependency().Received(0)
+ .AcceptOrgUserByEmailTokenAsync(orgUserId, user, model.Token, userService);
+ await sutProvider.GetDependency().Received(0)
+ .UpdateUserResetPasswordEnrollmentAsync(orgId, user.Id, model.ResetPasswordKey, user.Id);
+
+ await userService.Received(1).GetUserByPrincipalAsync(default);
+ await applicationCacheService.Received(0).GetOrganizationAbilityAsync(orgId);
+ await policyRepository.Received(0).GetByOrganizationIdTypeAsync(orgId, PolicyType.ResetPassword);
+ await policyRequirementQuery.Received(1).GetAsync(user.Id);
+
+ Assert.Equal("Master Password reset is required, but not provided.", exception.Message);
+ }
}
diff --git a/test/Api.Test/AdminConsole/Controllers/OrganizationsControllerTests.cs b/test/Api.Test/AdminConsole/Controllers/OrganizationsControllerTests.cs
index b0906ddc43..8e6d2ce27b 100644
--- a/test/Api.Test/AdminConsole/Controllers/OrganizationsControllerTests.cs
+++ b/test/Api.Test/AdminConsole/Controllers/OrganizationsControllerTests.cs
@@ -4,12 +4,15 @@ using Bit.Api.AdminConsole.Controllers;
using Bit.Api.Auth.Models.Request.Accounts;
using Bit.Core;
using Bit.Core.AdminConsole.Entities;
+using Bit.Core.AdminConsole.Enums;
using Bit.Core.AdminConsole.Enums.Provider;
using Bit.Core.AdminConsole.Models.Business.Tokenables;
using Bit.Core.AdminConsole.OrganizationFeatures.OrganizationApiKeys.Interfaces;
using Bit.Core.AdminConsole.OrganizationFeatures.Organizations;
using Bit.Core.AdminConsole.OrganizationFeatures.Organizations.Interfaces;
using Bit.Core.AdminConsole.OrganizationFeatures.OrganizationUsers.Interfaces;
+using Bit.Core.AdminConsole.OrganizationFeatures.Policies;
+using Bit.Core.AdminConsole.OrganizationFeatures.Policies.PolicyRequirements;
using Bit.Core.AdminConsole.Repositories;
using Bit.Core.Auth.Entities;
using Bit.Core.Auth.Enums;
@@ -55,6 +58,7 @@ public class OrganizationsControllerTests : IDisposable
private readonly IRemoveOrganizationUserCommand _removeOrganizationUserCommand;
private readonly ICloudOrganizationSignUpCommand _cloudOrganizationSignUpCommand;
private readonly IOrganizationDeleteCommand _organizationDeleteCommand;
+ private readonly IPolicyRequirementQuery _policyRequirementQuery;
private readonly IPricingClient _pricingClient;
private readonly OrganizationsController _sut;
@@ -80,6 +84,7 @@ public class OrganizationsControllerTests : IDisposable
_removeOrganizationUserCommand = Substitute.For();
_cloudOrganizationSignUpCommand = Substitute.For();
_organizationDeleteCommand = Substitute.For();
+ _policyRequirementQuery = Substitute.For();
_pricingClient = Substitute.For();
_sut = new OrganizationsController(
@@ -103,6 +108,7 @@ public class OrganizationsControllerTests : IDisposable
_removeOrganizationUserCommand,
_cloudOrganizationSignUpCommand,
_organizationDeleteCommand,
+ _policyRequirementQuery,
_pricingClient);
}
@@ -236,4 +242,55 @@ public class OrganizationsControllerTests : IDisposable
await _organizationDeleteCommand.Received(1).DeleteAsync(organization);
}
+
+ [Theory, AutoData]
+ public async Task GetAutoEnrollStatus_WithPolicyRequirementsEnabled_ReturnsOrganizationAutoEnrollStatus_WithResetPasswordEnabledTrue(
+ User user,
+ Organization organization,
+ OrganizationUser organizationUser
+ )
+ {
+ var policyRequirement = new ResetPasswordPolicyRequirement() { AutoEnrollOrganizations = [organization.Id] };
+
+ _userService.GetUserByPrincipalAsync(Arg.Any()).Returns(user);
+ _organizationRepository.GetByIdentifierAsync(organization.Id.ToString()).Returns(organization);
+ _featureService.IsEnabled(FeatureFlagKeys.PolicyRequirements).Returns(true);
+ _organizationUserRepository.GetByOrganizationAsync(organization.Id, user.Id).Returns(organizationUser);
+ _policyRequirementQuery.GetAsync(user.Id).Returns(policyRequirement);
+
+ var result = await _sut.GetAutoEnrollStatus(organization.Id.ToString());
+
+ await _userService.Received(1).GetUserByPrincipalAsync(Arg.Any());
+ await _organizationRepository.Received(1).GetByIdentifierAsync(organization.Id.ToString());
+ await _policyRequirementQuery.Received(1).GetAsync(user.Id);
+
+ Assert.True(result.ResetPasswordEnabled);
+ Assert.Equal(result.Id, organization.Id);
+ }
+
+ [Theory, AutoData]
+ public async Task GetAutoEnrollStatus_WithPolicyRequirementsDisabled_ReturnsOrganizationAutoEnrollStatus_WithResetPasswordEnabledTrue(
+ User user,
+ Organization organization,
+ OrganizationUser organizationUser
+)
+ {
+
+ var policy = new Policy() { Type = PolicyType.ResetPassword, Enabled = true, Data = "{\"AutoEnrollEnabled\": true}", OrganizationId = organization.Id };
+
+ _userService.GetUserByPrincipalAsync(Arg.Any()).Returns(user);
+ _organizationRepository.GetByIdentifierAsync(organization.Id.ToString()).Returns(organization);
+ _featureService.IsEnabled(FeatureFlagKeys.PolicyRequirements).Returns(false);
+ _organizationUserRepository.GetByOrganizationAsync(organization.Id, user.Id).Returns(organizationUser);
+ _policyRepository.GetByOrganizationIdTypeAsync(organization.Id, PolicyType.ResetPassword).Returns(policy);
+
+ var result = await _sut.GetAutoEnrollStatus(organization.Id.ToString());
+
+ await _userService.Received(1).GetUserByPrincipalAsync(Arg.Any());
+ await _organizationRepository.Received(1).GetByIdentifierAsync(organization.Id.ToString());
+ await _policyRequirementQuery.Received(0).GetAsync(user.Id);
+ await _policyRepository.Received(1).GetByOrganizationIdTypeAsync(organization.Id, PolicyType.ResetPassword);
+
+ Assert.True(result.ResetPasswordEnabled);
+ }
}
diff --git a/test/Api.Test/KeyManagement/Controllers/AccountsKeyManagementControllerTests.cs b/test/Api.Test/KeyManagement/Controllers/AccountsKeyManagementControllerTests.cs
index 2615697ad3..49c4f88cb4 100644
--- a/test/Api.Test/KeyManagement/Controllers/AccountsKeyManagementControllerTests.cs
+++ b/test/Api.Test/KeyManagement/Controllers/AccountsKeyManagementControllerTests.cs
@@ -1,17 +1,28 @@
#nullable enable
using System.Security.Claims;
+using Bit.Api.AdminConsole.Models.Request.Organizations;
+using Bit.Api.Auth.Models.Request;
+using Bit.Api.Auth.Models.Request.WebAuthn;
using Bit.Api.KeyManagement.Controllers;
using Bit.Api.KeyManagement.Models.Requests;
+using Bit.Api.KeyManagement.Validators;
+using Bit.Api.Tools.Models.Request;
+using Bit.Api.Vault.Models.Request;
using Bit.Core;
+using Bit.Core.Auth.Entities;
using Bit.Core.Auth.Models.Data;
using Bit.Core.Entities;
using Bit.Core.Exceptions;
using Bit.Core.KeyManagement.Commands.Interfaces;
using Bit.Core.KeyManagement.Models.Data;
+using Bit.Core.KeyManagement.UserKey;
using Bit.Core.Repositories;
using Bit.Core.Services;
+using Bit.Core.Tools.Entities;
+using Bit.Core.Vault.Entities;
using Bit.Test.Common.AutoFixture;
using Bit.Test.Common.AutoFixture.Attributes;
+using Microsoft.AspNetCore.Identity;
using NSubstitute;
using NSubstitute.ReturnsExtensions;
using Xunit;
@@ -93,4 +104,78 @@ public class AccountsKeyManagementControllerTests
Arg.Is(orgUsers),
Arg.Is(accessDetails));
}
+
+ [Theory]
+ [BitAutoData]
+ public async Task RotateUserAccountKeysSuccess(SutProvider sutProvider,
+ RotateUserAccountKeysAndDataRequestModel data, User user)
+ {
+ sutProvider.GetDependency().GetUserByPrincipalAsync(Arg.Any()).Returns(user);
+ sutProvider.GetDependency().RotateUserAccountKeysAsync(Arg.Any(), Arg.Any())
+ .Returns(IdentityResult.Success);
+ await sutProvider.Sut.RotateUserAccountKeysAsync(data);
+
+ await sutProvider.GetDependency, IEnumerable>>().Received(1)
+ .ValidateAsync(Arg.Any(), Arg.Is(data.AccountUnlockData.EmergencyAccessUnlockData));
+ await sutProvider.GetDependency, IReadOnlyList>>().Received(1)
+ .ValidateAsync(Arg.Any(), Arg.Is(data.AccountUnlockData.OrganizationAccountRecoveryUnlockData));
+ await sutProvider.GetDependency, IEnumerable>>().Received(1)
+ .ValidateAsync(Arg.Any(), Arg.Is(data.AccountUnlockData.PasskeyUnlockData));
+
+ await sutProvider.GetDependency, IEnumerable>>().Received(1)
+ .ValidateAsync(Arg.Any(), Arg.Is(data.AccountData.Ciphers));
+ await sutProvider.GetDependency, IEnumerable>>().Received(1)
+ .ValidateAsync(Arg.Any(), Arg.Is(data.AccountData.Folders));
+ await sutProvider.GetDependency, IReadOnlyList>>().Received(1)
+ .ValidateAsync(Arg.Any(), Arg.Is(data.AccountData.Sends));
+
+ await sutProvider.GetDependency().Received(1)
+ .RotateUserAccountKeysAsync(Arg.Is(user), Arg.Is(d =>
+ d.OldMasterKeyAuthenticationHash == data.OldMasterKeyAuthenticationHash
+
+ && d.MasterPasswordUnlockData.KdfType == data.AccountUnlockData.MasterPasswordUnlockData.KdfType
+ && d.MasterPasswordUnlockData.KdfIterations == data.AccountUnlockData.MasterPasswordUnlockData.KdfIterations
+ && d.MasterPasswordUnlockData.KdfMemory == data.AccountUnlockData.MasterPasswordUnlockData.KdfMemory
+ && d.MasterPasswordUnlockData.KdfParallelism == data.AccountUnlockData.MasterPasswordUnlockData.KdfParallelism
+ && d.MasterPasswordUnlockData.Email == data.AccountUnlockData.MasterPasswordUnlockData.Email
+
+ && d.MasterPasswordUnlockData.MasterKeyAuthenticationHash == data.AccountUnlockData.MasterPasswordUnlockData.MasterKeyAuthenticationHash
+ && d.MasterPasswordUnlockData.MasterKeyEncryptedUserKey == data.AccountUnlockData.MasterPasswordUnlockData.MasterKeyEncryptedUserKey
+
+ && d.AccountPublicKey == data.AccountKeys.AccountPublicKey
+ && d.UserKeyEncryptedAccountPrivateKey == data.AccountKeys.UserKeyEncryptedAccountPrivateKey
+ ));
+ }
+
+
+ [Theory]
+ [BitAutoData]
+ public async Task RotateUserKeyNoUser_Throws(SutProvider sutProvider,
+ RotateUserAccountKeysAndDataRequestModel data)
+ {
+ User? user = null;
+ sutProvider.GetDependency().GetUserByPrincipalAsync(Arg.Any()).Returns(user);
+ sutProvider.GetDependency().RotateUserAccountKeysAsync(Arg.Any(), Arg.Any())
+ .Returns(IdentityResult.Success);
+ await Assert.ThrowsAsync(() => sutProvider.Sut.RotateUserAccountKeysAsync(data));
+ }
+
+ [Theory]
+ [BitAutoData]
+ public async Task RotateUserKeyWrongData_Throws(SutProvider sutProvider,
+ RotateUserAccountKeysAndDataRequestModel data, User user, IdentityErrorDescriber _identityErrorDescriber)
+ {
+ sutProvider.GetDependency().GetUserByPrincipalAsync(Arg.Any()).Returns(user);
+ sutProvider.GetDependency().RotateUserAccountKeysAsync(Arg.Any(), Arg.Any())
+ .Returns(IdentityResult.Failed(_identityErrorDescriber.PasswordMismatch()));
+ try
+ {
+ await sutProvider.Sut.RotateUserAccountKeysAsync(data);
+ Assert.Fail("Should have thrown");
+ }
+ catch (BadRequestException ex)
+ {
+ Assert.NotEmpty(ex.ModelState.Values);
+ }
+ }
}
diff --git a/test/Api.Test/KeyManagement/Models/Request/MasterPasswordUnlockDataModel.cs b/test/Api.Test/KeyManagement/Models/Request/MasterPasswordUnlockDataModel.cs
new file mode 100644
index 0000000000..4c78c7015a
--- /dev/null
+++ b/test/Api.Test/KeyManagement/Models/Request/MasterPasswordUnlockDataModel.cs
@@ -0,0 +1,68 @@
+#nullable enable
+using System.ComponentModel.DataAnnotations;
+using Bit.Api.Auth.Models.Request.Accounts;
+using Bit.Core.Enums;
+using Xunit;
+
+namespace Bit.Api.Test.KeyManagement.Models.Request;
+
+public class MasterPasswordUnlockDataModelTests
+{
+
+ readonly string _mockEncryptedString = "2.3Uk+WNBIoU5xzmVFNcoWzz==|1MsPIYuRfdOHfu/0uY6H2Q==|/98sp4wb6pHP1VTZ9JcNCYgQjEUMFPlqJgCwRk1YXKg=";
+
+ [Theory]
+ [InlineData(KdfType.PBKDF2_SHA256, 5000, null, null)]
+ [InlineData(KdfType.PBKDF2_SHA256, 100000, null, null)]
+ [InlineData(KdfType.PBKDF2_SHA256, 600000, null, null)]
+ [InlineData(KdfType.Argon2id, 3, 64, 4)]
+ public void Validate_Success(KdfType kdfType, int kdfIterations, int? kdfMemory, int? kdfParallelism)
+ {
+ var model = new MasterPasswordUnlockDataModel
+ {
+ KdfType = kdfType,
+ KdfIterations = kdfIterations,
+ KdfMemory = kdfMemory,
+ KdfParallelism = kdfParallelism,
+ Email = "example@example.com",
+ MasterKeyAuthenticationHash = "hash",
+ MasterKeyEncryptedUserKey = _mockEncryptedString,
+ MasterPasswordHint = "hint"
+ };
+ var result = Validate(model);
+ Assert.Empty(result);
+ }
+
+ [Theory]
+ [InlineData(KdfType.Argon2id, 1, null, 1)]
+ [InlineData(KdfType.Argon2id, 1, 64, null)]
+ [InlineData(KdfType.PBKDF2_SHA256, 5000, 0, null)]
+ [InlineData(KdfType.PBKDF2_SHA256, 5000, null, 0)]
+ [InlineData(KdfType.PBKDF2_SHA256, 5000, 0, 0)]
+ [InlineData((KdfType)2, 100000, null, null)]
+ [InlineData((KdfType)2, 2, 64, 4)]
+ public void Validate_Failure(KdfType kdfType, int kdfIterations, int? kdfMemory, int? kdfParallelism)
+ {
+ var model = new MasterPasswordUnlockDataModel
+ {
+ KdfType = kdfType,
+ KdfIterations = kdfIterations,
+ KdfMemory = kdfMemory,
+ KdfParallelism = kdfParallelism,
+ Email = "example@example.com",
+ MasterKeyAuthenticationHash = "hash",
+ MasterKeyEncryptedUserKey = _mockEncryptedString,
+ MasterPasswordHint = "hint"
+ };
+ var result = Validate(model);
+ Assert.Single(result);
+ Assert.NotNull(result.First().ErrorMessage);
+ }
+
+ private static List Validate(MasterPasswordUnlockDataModel model)
+ {
+ var results = new List();
+ Validator.TryValidateObject(model, new ValidationContext(model), results, true);
+ return results;
+ }
+}
diff --git a/test/Api.Test/Vault/Controllers/CiphersControllerTests.cs b/test/Api.Test/Vault/Controllers/CiphersControllerTests.cs
index 5c8de51062..14013d9c1c 100644
--- a/test/Api.Test/Vault/Controllers/CiphersControllerTests.cs
+++ b/test/Api.Test/Vault/Controllers/CiphersControllerTests.cs
@@ -1,6 +1,8 @@
using System.Security.Claims;
+using System.Text.Json;
using Bit.Api.Vault.Controllers;
using Bit.Api.Vault.Models.Request;
+using Bit.Api.Vault.Models.Response;
using Bit.Core;
using Bit.Core.Context;
using Bit.Core.Entities;
@@ -232,4 +234,1045 @@ public class CiphersControllerTests
await sutProvider.GetDependency().Received().ProviderUserForOrgAsync(organization.Id);
}
+
+ [Theory]
+ [BitAutoData(OrganizationUserType.Owner)]
+ [BitAutoData(OrganizationUserType.Admin)]
+ public async Task DeleteAdmin_WithOwnerOrAdmin_WithAccessToSpecificCipher_DeletesCipher(
+ OrganizationUserType organizationUserType, Cipher cipher, Guid userId,
+ CurrentContextOrganization organization, SutProvider sutProvider)
+ {
+ cipher.OrganizationId = organization.Id;
+ organization.Type = organizationUserType;
+
+ sutProvider.GetDependency().GetProperUserId(default).ReturnsForAnyArgs(userId);
+ sutProvider.GetDependency().GetOrganization(organization.Id).Returns(organization);
+ sutProvider.GetDependency().GetByIdAsync(cipher.Id).Returns(cipher);
+ sutProvider.GetDependency()
+ .GetManyByUserIdAsync(userId)
+ .Returns(new List
+ {
+ new() { Id = cipher.Id, OrganizationId = cipher.OrganizationId, Edit = true }
+ });
+
+ await sutProvider.Sut.DeleteAdmin(cipher.Id.ToString());
+
+ await sutProvider.GetDependency().Received(1).DeleteAsync(cipher, userId, true);
+ }
+
+ [Theory]
+ [BitAutoData(OrganizationUserType.Owner)]
+ [BitAutoData(OrganizationUserType.Admin)]
+ public async Task DeleteAdmin_WithOwnerOrAdmin_WithAccessToUnassignedCipher_DeletesCipher(
+ OrganizationUserType organizationUserType, Cipher cipher, Guid userId,
+ CurrentContextOrganization organization, SutProvider sutProvider)
+ {
+ cipher.OrganizationId = organization.Id;
+ organization.Type = organizationUserType;
+
+ sutProvider.GetDependency().GetProperUserId(default).ReturnsForAnyArgs(userId);
+ sutProvider.GetDependency().GetOrganization(organization.Id).Returns(organization);
+ sutProvider.GetDependency().GetByIdAsync(cipher.Id).Returns(cipher);
+ sutProvider.GetDependency()
+ .GetManyUnassignedOrganizationDetailsByOrganizationIdAsync(organization.Id)
+ .Returns(new List { new() { Id = cipher.Id } });
+
+ await sutProvider.Sut.DeleteAdmin(cipher.Id.ToString());
+
+ await sutProvider.GetDependency().Received(1).DeleteAsync(cipher, userId, true);
+ }
+
+ [Theory]
+ [BitAutoData(OrganizationUserType.Owner)]
+ [BitAutoData(OrganizationUserType.Admin)]
+ public async Task DeleteAdmin_WithAdminOrOwnerAndAccessToAllCollectionItems_DeletesCipher(
+ OrganizationUserType organizationUserType, Cipher cipher, Guid userId,
+ CurrentContextOrganization organization, SutProvider sutProvider)
+ {
+ cipher.OrganizationId = organization.Id;
+ organization.Type = organizationUserType;
+
+ sutProvider.GetDependency().GetProperUserId(default).ReturnsForAnyArgs(userId);
+ sutProvider.GetDependency().GetOrganization(organization.Id).Returns(organization);
+ sutProvider.GetDependency().GetByIdAsync(cipher.Id).Returns(cipher);
+ sutProvider.GetDependency().GetManyByOrganizationIdAsync(organization.Id).Returns(new List { cipher });
+ sutProvider.GetDependency().GetOrganizationAbilityAsync(organization.Id).Returns(new OrganizationAbility
+ {
+ Id = organization.Id,
+ AllowAdminAccessToAllCollectionItems = true
+ });
+
+ await sutProvider.Sut.DeleteAdmin(cipher.Id.ToString());
+
+ await sutProvider.GetDependency().Received(1).DeleteAsync(cipher, userId, true);
+ }
+
+ [Theory]
+ [BitAutoData]
+ public async Task DeleteAdmin_WithCustomUser_WithEditAnyCollectionTrue_DeletesCipher(
+ Cipher cipher, Guid userId,
+ CurrentContextOrganization organization, SutProvider sutProvider)
+ {
+ cipher.OrganizationId = organization.Id;
+ organization.Type = OrganizationUserType.Custom;
+ organization.Permissions.EditAnyCollection = true;
+
+ sutProvider.GetDependency().GetProperUserId(default).ReturnsForAnyArgs(userId);
+ sutProvider.GetDependency().GetOrganization(organization.Id).Returns(organization);
+ sutProvider.GetDependency().GetByIdAsync(cipher.Id).Returns(cipher);
+ sutProvider.GetDependency().GetManyByOrganizationIdAsync(organization.Id).Returns(new List { cipher });
+
+ await sutProvider.Sut.DeleteAdmin(cipher.Id.ToString());
+
+ await sutProvider.GetDependency().Received(1).DeleteAsync(cipher, userId, true);
+ }
+
+ [Theory]
+ [BitAutoData]
+ public async Task DeleteAdmin_WithCustomUser_WithEditAnyCollectionFalse_ThrowsNotFoundException(
+ Cipher cipher, Guid userId,
+ CurrentContextOrganization organization, SutProvider sutProvider)
+ {
+ cipher.OrganizationId = organization.Id;
+ organization.Type = OrganizationUserType.Custom;
+ organization.Permissions.EditAnyCollection = false;
+
+ sutProvider.GetDependency().GetProperUserId(default).ReturnsForAnyArgs(userId);
+ sutProvider.GetDependency().GetOrganization(organization.Id).Returns(organization);
+ sutProvider.GetDependency().GetByIdAsync(cipher.Id).Returns(cipher);
+
+ await Assert.ThrowsAsync(() => sutProvider.Sut.DeleteAdmin(cipher.Id.ToString()));
+ }
+
+ [Theory]
+ [BitAutoData]
+ public async Task DeleteAdmin_WithProviderUser_DeletesCipher(
+ Cipher cipher, Guid userId, SutProvider sutProvider)
+ {
+ cipher.OrganizationId = Guid.NewGuid();
+
+ sutProvider.GetDependency().GetProperUserId(default).ReturnsForAnyArgs(userId);
+ sutProvider.GetDependency().ProviderUserForOrgAsync(cipher.OrganizationId.Value).Returns(true);
+ sutProvider.GetDependency().GetByIdAsync(cipher.Id).Returns(cipher);
+ sutProvider.GetDependency().GetManyByOrganizationIdAsync(cipher.OrganizationId.Value).Returns(new List { cipher });
+
+ await sutProvider.Sut.DeleteAdmin(cipher.Id.ToString());
+
+ await sutProvider.GetDependency().Received(1).DeleteAsync(cipher, userId, true);
+ }
+
+ [Theory]
+ [BitAutoData]
+ public async Task DeleteAdmin_WithProviderUser_WithRestrictProviderAccessTrue_ThrowsNotFoundException(
+ Cipher cipher, Guid userId, SutProvider sutProvider)
+ {
+ cipher.OrganizationId = Guid.NewGuid();
+
+ sutProvider.GetDependency().GetProperUserId(default).ReturnsForAnyArgs(userId);
+ sutProvider.GetDependency().ProviderUserForOrgAsync(cipher.OrganizationId.Value).Returns(true);
+ sutProvider.GetDependency().GetByIdAsync(cipher.Id).Returns(cipher);
+ sutProvider.GetDependency().IsEnabled(FeatureFlagKeys.RestrictProviderAccess).Returns(true);
+
+ await Assert.ThrowsAsync(() => sutProvider.Sut.DeleteAdmin(cipher.Id.ToString()));
+ }
+
+ [Theory]
+ [BitAutoData(OrganizationUserType.Owner)]
+ [BitAutoData(OrganizationUserType.Admin)]
+ public async Task DeleteManyAdmin_WithOwnerOrAdmin_WithAccessToSpecificCiphers_DeletesCiphers(
+ OrganizationUserType organizationUserType, CipherBulkDeleteRequestModel model, Guid userId, List ciphers,
+ CurrentContextOrganization organization, SutProvider sutProvider)
+ {
+ model.OrganizationId = organization.Id.ToString();
+ model.Ids = ciphers.Select(c => c.Id.ToString()).ToList();
+ organization.Type = organizationUserType;
+
+ sutProvider.GetDependency().GetProperUserId(default).ReturnsForAnyArgs(userId);
+ sutProvider.GetDependency().GetOrganization(organization.Id).Returns(organization);
+ sutProvider.GetDependency()
+ .GetManyByUserIdAsync(userId)
+ .Returns(ciphers.Select(c => new CipherDetails
+ {
+ Id = c.Id,
+ OrganizationId = organization.Id,
+ Edit = true
+ }).ToList());
+
+ await sutProvider.Sut.DeleteManyAdmin(model);
+
+ await sutProvider.GetDependency()
+ .Received(1)
+ .DeleteManyAsync(
+ Arg.Is>(ids =>
+ ids.All(id => model.Ids.Contains(id.ToString())) && ids.Count() == model.Ids.Count()),
+ userId, organization.Id, true);
+ }
+
+ [Theory]
+ [BitAutoData(OrganizationUserType.Owner)]
+ [BitAutoData(OrganizationUserType.Admin)]
+ public async Task DeleteManyAdmin_WithOwnerOrAdmin_WithAccessToUnassignedCiphers_DeletesCiphers(
+ OrganizationUserType organizationUserType, CipherBulkDeleteRequestModel model, Guid userId, List ciphers,
+ CurrentContextOrganization organization, SutProvider sutProvider)
+ {
+ model.OrganizationId = organization.Id.ToString();
+ model.Ids = ciphers.Select(c => c.Id.ToString()).ToList();
+ organization.Type = organizationUserType;
+
+ sutProvider.GetDependency().GetProperUserId(default).ReturnsForAnyArgs(userId);
+ sutProvider.GetDependency().GetOrganization(organization.Id).Returns(organization);
+ sutProvider.GetDependency()
+ .GetManyUnassignedOrganizationDetailsByOrganizationIdAsync(organization.Id)
+ .Returns(ciphers.Select(c => new CipherOrganizationDetails { Id = c.Id }).ToList());
+
+ await sutProvider.Sut.DeleteManyAdmin(model);
+
+ await sutProvider.GetDependency()
+ .Received(1)
+ .DeleteManyAsync(
+ Arg.Is>(ids =>
+ ids.All(id => model.Ids.Contains(id.ToString())) && ids.Count() == model.Ids.Count()),
+ userId, organization.Id, true);
+ }
+
+ [Theory]
+ [BitAutoData(OrganizationUserType.Owner)]
+ [BitAutoData(OrganizationUserType.Admin)]
+ public async Task DeleteManyAdmin_WithOwnerOrAdmin_WithAccessToAllCollectionItems_DeletesCiphers(
+ OrganizationUserType organizationUserType, CipherBulkDeleteRequestModel model, Guid userId, List ciphers,
+ CurrentContextOrganization organization, SutProvider sutProvider)
+ {
+ model.OrganizationId = organization.Id.ToString();
+ model.Ids = ciphers.Select(c => c.Id.ToString()).ToList();
+ organization.Type = organizationUserType;
+
+ sutProvider.GetDependency().GetProperUserId(default).ReturnsForAnyArgs(userId);
+ sutProvider.GetDependency().GetOrganization(organization.Id).Returns(organization);
+ sutProvider.GetDependency().GetManyByOrganizationIdAsync(organization.Id).Returns(ciphers);
+ sutProvider.GetDependency().GetOrganizationAbilityAsync(organization.Id).Returns(new OrganizationAbility
+ {
+ Id = organization.Id,
+ AllowAdminAccessToAllCollectionItems = true
+ });
+
+ await sutProvider.Sut.DeleteManyAdmin(model);
+
+ await sutProvider.GetDependency()
+ .Received(1)
+ .DeleteManyAsync(
+ Arg.Is>(ids =>
+ ids.All(id => model.Ids.Contains(id.ToString())) && ids.Count() == model.Ids.Count()),
+ userId, organization.Id, true);
+ }
+
+ [Theory]
+ [BitAutoData]
+ public async Task DeleteManyAdmin_WithCustomUser_WithEditAnyCollectionTrue_DeletesCiphers(
+ CipherBulkDeleteRequestModel model,
+ Guid userId, List ciphers, CurrentContextOrganization organization,
+ SutProvider sutProvider)
+ {
+ model.OrganizationId = organization.Id.ToString();
+ model.Ids = ciphers.Select(c => c.Id.ToString()).ToList();
+ organization.Type = OrganizationUserType.Custom;
+ organization.Permissions.EditAnyCollection = true;
+
+ sutProvider.GetDependency().GetProperUserId(default).ReturnsForAnyArgs(userId);
+ sutProvider.GetDependency().GetOrganization(organization.Id).Returns(organization);
+ sutProvider.GetDependency().GetManyByOrganizationIdAsync(organization.Id).Returns(ciphers);
+
+ await sutProvider.Sut.DeleteManyAdmin(model);
+
+ await sutProvider.GetDependency()
+ .Received(1)
+ .DeleteManyAsync(
+ Arg.Is>(ids =>
+ ids.All(id => model.Ids.Contains(id.ToString())) && ids.Count() == model.Ids.Count()),
+ userId, organization.Id, true);
+ }
+
+ [Theory]
+ [BitAutoData]
+ public async Task DeleteManyAdmin_WithCustomUser_WithEditAnyCollectionFalse_ThrowsNotFoundException(
+ CipherBulkDeleteRequestModel model,
+ Guid userId, List ciphers, CurrentContextOrganization organization,
+ SutProvider sutProvider)
+ {
+ model.OrganizationId = organization.Id.ToString();
+ model.Ids = ciphers.Select(c => c.Id.ToString()).ToList();
+ organization.Type = OrganizationUserType.Custom;
+ organization.Permissions.EditAnyCollection = false;
+
+ sutProvider.GetDependency().GetProperUserId(default).ReturnsForAnyArgs(userId);
+ sutProvider.GetDependency().GetOrganization(organization.Id).Returns(organization);
+
+ await Assert.ThrowsAsync(() => sutProvider.Sut.DeleteManyAdmin(model));
+ }
+
+ [Theory]
+ [BitAutoData]
+ public async Task DeleteManyAdmin_WithProviderUser_DeletesCiphers(
+ CipherBulkDeleteRequestModel model, Guid userId,
+ List ciphers, SutProvider sutProvider)
+ {
+ var organizationId = Guid.NewGuid();
+ model.OrganizationId = organizationId.ToString();
+ model.Ids = ciphers.Select(c => c.Id.ToString()).ToList();
+
+ foreach (var cipher in ciphers)
+ {
+ cipher.OrganizationId = organizationId;
+ }
+
+ sutProvider.GetDependency().GetProperUserId(default).ReturnsForAnyArgs(userId);
+ sutProvider.GetDependency().ProviderUserForOrgAsync(organizationId).Returns(true);
+ sutProvider.GetDependency().GetManyByOrganizationIdAsync(organizationId).Returns(ciphers);
+
+ await sutProvider.Sut.DeleteManyAdmin(model);
+
+ await sutProvider.GetDependency()
+ .Received(1)
+ .DeleteManyAsync(
+ Arg.Is>(ids =>
+ ids.All(id => model.Ids.Contains(id.ToString())) && ids.Count() == model.Ids.Count()),
+ userId, organizationId, true);
+ }
+
+ [Theory]
+ [BitAutoData]
+ public async Task DeleteManyAdmin_WithProviderUser_WithRestrictProviderAccessTrue_ThrowsNotFoundException(
+ CipherBulkDeleteRequestModel model, SutProvider