mirror of
https://github.com/bitwarden/server.git
synced 2025-04-04 20:50:21 -05:00
Wrong business logic checking for invalid permissions.
This commit is contained in:
parent
f6143b12d6
commit
b24c25ff14
@ -28,10 +28,10 @@ public class CreateAdminInitiatedSponsorshipHandler(
|
||||
OrganizationUserType[] allowedUserTypes =
|
||||
[
|
||||
OrganizationUserType.Admin,
|
||||
OrganizationUserType.Owner,
|
||||
OrganizationUserType.Custom
|
||||
OrganizationUserType.Owner
|
||||
];
|
||||
if (!organization.Permissions.ManageUsers || allowedUserTypes.All(x => x != organization.Type))
|
||||
|
||||
if (!organization.Permissions.ManageUsers && allowedUserTypes.All(x => x != organization.Type))
|
||||
{
|
||||
throw new UnauthorizedAccessException("You do not have permissions to send sponsorships on behalf of the organization.");
|
||||
}
|
||||
|
@ -211,7 +211,7 @@ public class CreateSponsorshipCommandTests : FamiliesForEnterpriseTestsBase
|
||||
{
|
||||
Id = sponsoringOrg.Id,
|
||||
Permissions = new Permissions(),
|
||||
Type = OrganizationUserType.Admin
|
||||
Type = OrganizationUserType.Custom
|
||||
}
|
||||
]);
|
||||
|
||||
@ -225,6 +225,7 @@ public class CreateSponsorshipCommandTests : FamiliesForEnterpriseTestsBase
|
||||
|
||||
[Theory]
|
||||
[BitAutoData(OrganizationUserType.User)]
|
||||
[BitAutoData(OrganizationUserType.Custom)]
|
||||
public async Task CreateSponsorship_InvalidUserType_ThrowsUnauthorizedException(
|
||||
OrganizationUserType organizationUserType,
|
||||
Organization sponsoringOrg, OrganizationUser sponsoringOrgUser, User user, string sponsoredEmail,
|
||||
@ -248,10 +249,6 @@ public class CreateSponsorshipCommandTests : FamiliesForEnterpriseTestsBase
|
||||
new()
|
||||
{
|
||||
Id = sponsoringOrg.Id,
|
||||
Permissions = new Permissions
|
||||
{
|
||||
ManageUsers = true,
|
||||
},
|
||||
Type = organizationUserType
|
||||
}
|
||||
]);
|
||||
@ -266,7 +263,6 @@ public class CreateSponsorshipCommandTests : FamiliesForEnterpriseTestsBase
|
||||
|
||||
[Theory]
|
||||
[BitAutoData(OrganizationUserType.Admin)]
|
||||
[BitAutoData(OrganizationUserType.Custom)]
|
||||
[BitAutoData(OrganizationUserType.Owner)]
|
||||
public async Task CreateSponsorship_CreatesAdminInitiatedSponsorship(
|
||||
OrganizationUserType organizationUserType,
|
||||
@ -291,10 +287,6 @@ public class CreateSponsorshipCommandTests : FamiliesForEnterpriseTestsBase
|
||||
new()
|
||||
{
|
||||
Id = sponsoringOrg.Id,
|
||||
Permissions = new Permissions
|
||||
{
|
||||
ManageUsers = true,
|
||||
},
|
||||
Type = organizationUserType
|
||||
}
|
||||
]);
|
||||
|
@ -19,8 +19,10 @@ namespace Bit.Core.Test.OrganizationFeatures.OrganizationSponsorships.FamiliesFo
|
||||
public class CreateAdminInitiatedSponsorshipHandlerTests : FamiliesForEnterpriseTestsBase
|
||||
{
|
||||
[Theory]
|
||||
[BitAutoData]
|
||||
[BitAutoData(OrganizationUserType.User)]
|
||||
[BitAutoData(OrganizationUserType.Custom)]
|
||||
public async Task HandleAsync_MissingManageUsersPermission_ThrowsUnauthorizedException(
|
||||
OrganizationUserType organizationUserType,
|
||||
Organization sponsoringOrg, OrganizationUser sponsoringOrgUser, string sponsoredEmail, string friendlyName,
|
||||
Guid currentUserId, SutProvider<CreateAdminInitiatedSponsorshipHandler> sutProvider)
|
||||
{
|
||||
@ -37,7 +39,7 @@ public class CreateAdminInitiatedSponsorshipHandlerTests : FamiliesForEnterprise
|
||||
{
|
||||
Id = sponsoringOrg.Id,
|
||||
Permissions = new Permissions(),
|
||||
Type = OrganizationUserType.Admin
|
||||
Type = organizationUserType
|
||||
}
|
||||
]);
|
||||
|
||||
@ -52,6 +54,7 @@ public class CreateAdminInitiatedSponsorshipHandlerTests : FamiliesForEnterprise
|
||||
|
||||
[Theory]
|
||||
[BitAutoData(OrganizationUserType.User)]
|
||||
[BitAutoData(OrganizationUserType.Custom)]
|
||||
public async Task HandleAsync_InvalidUserType_ThrowsUnauthorizedException(
|
||||
OrganizationUserType organizationUserType,
|
||||
Organization sponsoringOrg, OrganizationUser sponsoringOrgUser, string sponsoredEmail,
|
||||
@ -72,7 +75,7 @@ public class CreateAdminInitiatedSponsorshipHandlerTests : FamiliesForEnterprise
|
||||
Id = sponsoringOrg.Id,
|
||||
Permissions = new Permissions
|
||||
{
|
||||
ManageUsers = true,
|
||||
ManageUsers = false,
|
||||
},
|
||||
Type = organizationUserType
|
||||
}
|
||||
@ -89,7 +92,6 @@ public class CreateAdminInitiatedSponsorshipHandlerTests : FamiliesForEnterprise
|
||||
|
||||
[Theory]
|
||||
[BitAutoData(OrganizationUserType.Admin)]
|
||||
[BitAutoData(OrganizationUserType.Custom)]
|
||||
[BitAutoData(OrganizationUserType.Owner)]
|
||||
public async Task HandleAsync_CreatesAdminInitiatedSponsorship(
|
||||
OrganizationUserType organizationUserType, Organization sponsoringOrg, OrganizationUser sponsoringOrgUser,
|
||||
@ -108,10 +110,6 @@ public class CreateAdminInitiatedSponsorshipHandlerTests : FamiliesForEnterprise
|
||||
new()
|
||||
{
|
||||
Id = sponsoringOrg.Id,
|
||||
Permissions = new Permissions
|
||||
{
|
||||
ManageUsers = true,
|
||||
},
|
||||
Type = organizationUserType
|
||||
}
|
||||
]);
|
||||
@ -130,6 +128,48 @@ public class CreateAdminInitiatedSponsorshipHandlerTests : FamiliesForEnterprise
|
||||
AssertHelper.AssertPropertyEqual(expectedSponsorship, actual);
|
||||
}
|
||||
|
||||
[Theory]
|
||||
[BitAutoData(OrganizationUserType.User)]
|
||||
[BitAutoData(OrganizationUserType.Custom)]
|
||||
public async Task HandleAsync_CreatesAdminInitiatedSponsorshipWithValidPermissionsButInvalidOrganizationUserType(
|
||||
OrganizationUserType organizationUserType, Organization sponsoringOrg, OrganizationUser sponsoringOrgUser,
|
||||
string sponsoredEmail, string friendlyName, Guid currentUserId, string notes,
|
||||
SutProvider<CreateAdminInitiatedSponsorshipHandler> sutProvider)
|
||||
{
|
||||
sponsoringOrg.PlanType = PlanType.EnterpriseAnnually;
|
||||
sponsoringOrgUser.Status = OrganizationUserStatusType.Confirmed;
|
||||
|
||||
sutProvider.GetDependency<IFeatureService>()
|
||||
.IsEnabled(Arg.Is<string>(p => p == FeatureFlagKeys.PM17772_AdminInitiatedSponsorships))
|
||||
.Returns(true);
|
||||
|
||||
sutProvider.GetDependency<ICurrentContext>().UserId.Returns(currentUserId);
|
||||
sutProvider.GetDependency<ICurrentContext>().Organizations.Returns([
|
||||
new()
|
||||
{
|
||||
Id = sponsoringOrg.Id,
|
||||
Type = organizationUserType,
|
||||
Permissions =
|
||||
{
|
||||
ManageUsers = true
|
||||
}
|
||||
}
|
||||
]);
|
||||
|
||||
var request = new CreateSponsorshipRequest(sponsoringOrg, sponsoringOrgUser,
|
||||
PlanSponsorshipType.FamiliesForEnterprise, sponsoredEmail, friendlyName, notes);
|
||||
|
||||
var actual = await sutProvider.Sut.HandleAsync(request);
|
||||
|
||||
var expectedSponsorship = new OrganizationSponsorship
|
||||
{
|
||||
IsAdminInitiated = true,
|
||||
Notes = notes
|
||||
};
|
||||
|
||||
AssertHelper.AssertPropertyEqual(expectedSponsorship, actual);
|
||||
}
|
||||
|
||||
[Theory]
|
||||
[BitAutoData]
|
||||
public async Task HandleAsync_ThrowsBadRequestException_WhenFeatureFlagIsDisabled(
|
||||
|
Loading…
x
Reference in New Issue
Block a user