1
0
mirror of https://github.com/bitwarden/server.git synced 2025-04-21 04:55:08 -05:00

119 Commits

Author SHA1 Message Date
Matt Gibson
5537470703
Use sas token for attachment downloads (#1153)
* Get limited life attachment download URL

This change limits url download to a 1min lifetime.
This requires moving to a new container to allow for non-public blob
access.

Clients will have to call GetAttachmentData api function to receive the download
URL. For backwards compatibility, attachment URLs are still present, but will not
work for attachments stored in non-public access blobs.

* Make GlobalSettings interface for testing

* Test LocalAttachmentStorageService equivalence

* Remove comment

* Add missing globalSettings using

* Simplify default attachment container

* Default to attachments containe for existing methods

A new upload method will be made for uploading to attachments-v2.
For compatibility for clients which don't use these new methods, we need
to still use the old container. The new container will be used only for
new uploads

* Remove Default MetaData fixture.

* Keep attachments container blob-level security for all instances

* Close unclosed FileStream

* Favor default value for noop services
2021-02-22 15:35:16 -06:00
Matt Gibson
edd4bc2623
Add disable send policy (#1130)
* Add Disable Send policy

* Test DisableSend policy

* PR Review

* Update tests for using CurrentContext

This required making an interface for CurrentContext and mocking out
the members used. The interface can be expanded as needed for tests.

I moved CurrentContext to a folder, which changes the namespace
and causes a lot of file touches, but most are just adding a reference

* Fix failing test

* Update exemption to include all exempt users

* Move all CurrentContext usages to ICurrentContext

* PR review. Match messaging with Web
2021-02-04 12:54:21 -06:00
Addison Beck
25a9991908
Implement User-based API Keys (#981)
* added column ApiKey to dbo.User

* added dbo.User.ApiKey to User_Update

* added dbo.User.ApiKey to User_Create

* wrote migration script for implementing dbo.User.ApiKey

* Added ApiKey prop to the User table model

* Created AccountsController method for getting a user's API Key

* Created AccountsController method for rotating a user API key

* Added support to ApiClient for passed-through ClientSecrets when the request comes from the cli

* Added a new conditional to ClientStore to account for user API keys

* Wrote unit tests for new user API Key methods

* Added a refresh of dbo.UserView to new migration script for ApiKey

* Let client_credentials grants into the custom token logic

* Cleanup for ApiKey auth in the CLI feature

* Created user API key on registration

* Removed uneeded code for user API keys

* Changed a .Contains() to a .StartsWith() in ClientStore

* Changed index that an array is searched on

* Added more claims to the user apikey clients

* Moved some claim finding logic to a helper method
2020-11-10 15:15:29 -05:00
Vincent Salucci
50cf16a3fb
[SSO] New user provision flow (#945)
* Initial commit of accept user during set password flow

* changed new org user from accepted to invited // moved another check to token accept function

* Revised some white space // Moved business logic to UserService

* Fixed UserServiceTest

* Removed some white-space

* Removed more white-space

* Final white-space issues
2020-10-13 15:00:33 -05:00
Vincent Salucci
c0e99d4047
Removed security stamp rotation during set-password SSO flow (#933) 2020-09-14 14:27:30 -05:00
Addison Beck
59f8467f7c
Create sso user api (#886)
* facilitate linking/unlinking existing users from an sso enabled org

* added user_identifier to identity methods for sso

* moved sso user delete method to account controller

* fixed a broken test

* Update AccountsController.cs

* facilitate linking/unlinking existing users from an sso enabled org

* added user_identifier to identity methods for sso

* moved sso user delete method to account controller

* fixed a broken test

* added a token to the existing user sso link flow

* added a token to the existing user sso link flow

* fixed a typo

* added an event log for unlink ssoUser records

* fixed a merge issue

* fixed a busted test

* fixed a busted test

* ran a formatter over everything & changed .vscode settings in .gitignore

* chagned a variable to use string interpolation

* removed a blank line

* Changed TokenPurpose enum to a static class of strings

* code review cleanups

* formatting fix

* Changed parameters & logging for delete sso user

* changed th method used to get organization user for deleting sso user records

Co-authored-by: Kyle Spearrin <kspearrin@users.noreply.github.com>
2020-08-26 14:12:04 -04:00
Kyle Spearrin
2872bda6fe
tool to generate licenses (#874)
* tool to generate licenses

* code review feedback
2020-08-18 17:00:21 -04:00
Kyle Spearrin
d190c4bd0f
Update APIs to collect other set password info (#870) 2020-08-17 10:40:35 -04:00
Kyle Spearrin
cd926ca8f6
allow user registration for sso (#865) 2020-08-13 17:30:10 -04:00
Kyle Spearrin
783b4804ec
SSO support (#862)
* [SSO] Added change password API (#836)

* Created API for updating password with no current comparison

* Changed name of method and request // Added user has password error flow

* Updated user service method name // Updated string null/empty check

* Replaced hardcoded sso domain hints with config loader (#850)

* Replaced hardcoded sso domain hints with config loader

* use async/await for sso config loader

* Update AccountsController.cs

Co-authored-by: Vincent Salucci <26154748+vincentsalucci@users.noreply.github.com>
Co-authored-by: Matt Portune <mportune@bitwarden.com>
Co-authored-by: Matt Portune <59324545+mportune-bw@users.noreply.github.com>
2020-08-12 17:03:09 -04:00
Chad Scharf
2742b414fd
reference event changes and cleanup (#823) 2020-07-15 12:38:45 -04:00
Chad Scharf
7af50172e0
Reference event service implementation (#811)
* Reference event service implementation

* Fix IReferenceable implementation of Id

* add structure to event body
2020-07-07 12:01:34 -04:00
Chad Scharf
0f28ac45f9 Consistency on TaxInfo use in service params 2020-06-18 10:41:55 -04:00
Chad Scharf
b7a500eb63 combined tax updates with other operations 2020-06-17 19:49:27 -04:00
Kyle Spearrin
10a6e12d09
generate signin token for enterprise portal (#728) 2020-05-12 15:36:33 -04:00
Chad Scharf
9800b752c0 Changed all C# control flow block statements to include space between keyword and open paren 2020-03-27 14:36:37 -04:00
Kyle Spearrin
71d9ffdd9d
CheckPoliciesOnTwoFactorRemoval for 2fa recovery (#659) 2020-02-28 10:23:19 -05:00
Kyle Spearrin
621192b701
enable email 2fa if joining an org with policy (#658) 2020-02-28 09:14:33 -05:00
Kyle Spearrin
f54ebfdc75
email user whenever they're removed from org because of 2fa policy (#657) 2020-02-27 09:30:03 -05:00
Kyle Spearrin
81424a8526
Enforce 2fa policy (#654) 2020-02-19 14:56:16 -05:00
Brian Becker
0be86072f7 Add email notification on Two Factor recovery use (#625)
* Add email notification on Two Factor recovery use

* A user who has lost their 2fa device can clear out the
  2fa settings using a recovery code.  When this happens
  it gets logged but no notification to the user occurs.
* Add a notification to be sent when 2fa recovery code is
  used

* Add email message templates
2019-12-23 15:26:39 -05:00
Kyle Spearrin
b72744eafc alloe sub cancellation when deleting account 2019-09-20 13:45:47 -04:00
Kyle Spearrin
e9174ba9f4 iap pre-purchase check 2019-09-19 08:46:26 -04:00
Kyle Spearrin
bed2a0ab7b no additional storage for premium 2019-09-18 10:52:53 -04:00
Kyle Spearrin
62732fa002 gateway check 2019-09-02 08:53:59 -04:00
Kyle Spearrin
74bbeae776 adjust storage with payment intent/method handling 2019-08-10 12:59:32 -04:00
Kyle Spearrin
00e808d731 payment intent/method support for incomplete status 2019-08-09 23:56:26 -04:00
Kyle Spearrin
ad7c4b89c4 back to corehelpers 2019-06-11 17:17:23 -04:00
Kyle Spearrin
0885264800 log error from exceptions on 2fa registration 2019-03-29 08:59:02 -04:00
Kyle Spearrin
506fe28ee7 make payment method type required 2019-02-26 12:45:34 -05:00
Kyle Spearrin
01d324a8b4 support credit purchases and prorated upgrades 2019-02-20 23:54:27 -05:00
Kyle Spearrin
a9336a0e02 add support for passing payment method type 2019-02-19 17:13:21 -05:00
Kyle Spearrin
b036657d78 apis for subscription vs billing 2019-02-18 15:40:47 -05:00
Kyle Spearrin
d568b86e1e inject stripepaymentservice 2019-02-08 23:53:09 -05:00
Kyle Spearrin
9f876d9bff purchase org with paypal support 2019-01-31 14:25:46 -05:00
Kyle Spearrin
952d624d72 change payment methods between stripe and paypal 2019-01-31 12:11:30 -05:00
Kyle Spearrin
e54a381dba setup: process paypal with stripe subscription 2019-01-29 13:12:11 -05:00
Kyle Spearrin
4ad1634d1d cancel on delete 2018-12-31 14:07:19 -05:00
Kyle Spearrin
6d173385b0 cancel sub completely if past exp date 2018-12-31 13:34:02 -05:00
Kyle Spearrin
4a38713c4b return twofactor enabled property on org users api 2018-12-19 11:48:36 -05:00
Kyle Spearrin
ac7c7b5077 move some 2fa logic functions to userService 2018-12-19 10:47:53 -05:00
Kyle Spearrin
b9e7712b34 <= 1 2018-12-03 10:57:34 -05:00
Kyle Spearrin
002b642e50 sometimes delete org on user delete 2018-12-03 10:56:55 -05:00
Kyle Spearrin
73cc221deb Allow UpdateKeyAsync when user already has key 2018-11-13 11:37:09 -05:00
Kyle Spearrin
bd7bc569db revert comments 2018-10-10 22:45:12 -04:00
Kyle Spearrin
7c70aff383 dont catch exception for testing 2018-10-10 16:00:53 -04:00
Kyle Spearrin
b5a4bad637 catch u2f exceptions 2018-10-10 15:21:54 -04:00
Kyle Spearrin
aba009c221 change event name to updated2fa 2018-10-09 15:59:07 -04:00
Kyle Spearrin
bfc74060b6 add support for multiple u2f keys 2018-10-08 14:38:11 -04:00
Kyle Spearrin
fb45f75bc8 catch gateway exception when canceling on delete 2018-09-07 14:00:56 -04:00