1
0
mirror of https://github.com/bitwarden/server.git synced 2025-04-24 06:25:09 -05:00

44 Commits

Author SHA1 Message Date
Federico Maccaroni
580987f0e5
EC-293 Fix device verification state when getting its settings (#2094) 2022-07-05 18:44:07 -03:00
Justin Baur
231eb84e69
Turn On ImplicitUsings (#2079)
* Turn on ImplicitUsings

* Fix formatting

* Run linter
2022-06-29 19:46:41 -04:00
Federico Maccaroni
b070e9a387
[PS-589] Fix emergency contact takeover device verification and endpoints for its settings (#2016)
* Added UnknownDeviceVerificationEnabled on User that is turned off when emergency contact takes over the account. Also added endpoints to get and update 2fa device verification settings. And Updated migrations & tests

* Applied dotnet format

* Fixed method rename call on TwoFactorController

* PS-589 Format fixes

* PS-589 changed UnknownDeviceVerificationEnabled to be non-nullable
2022-06-06 14:52:50 -03:00
Federico Maccaroni
a7a45893a3
PS-82 check send 2FA email for new devices on TwoFactorController send-email-login (#1977) 2022-04-28 13:14:09 -03:00
Oscar Hinton
e4a10aae27
Split out repositories to Infrastructure.Dapper / EntityFramework (#1759) 2022-01-11 10:40:51 +01:00
Oscar Hinton
23b0a1f9df
Run dotnet format (#1764) 2021-12-16 15:35:09 +01:00
Oscar Hinton
63f6dd9a24
Move request/response models (#1754) 2021-12-14 16:05:07 +01:00
Oscar Hinton
fd37cb5a12
Add support for Key Connector OTP and account migration (#1663)
Co-authored-by: Thomas Rittson <trittson@bitwarden.com>
2021-11-09 16:37:32 +01:00
Oscar Hinton
feb3106f37
[Provider] Create and access child organizations (#1427) 2021-07-08 17:05:32 +02:00
Oscar Hinton
a47b86a995
Remove U2F APIs again (#1319)
* Revert "U2F (#1304)"

This reverts commit ce4f025a0c2f24c051d4e3d6baeeaeb69b45b730.

* Avoid removing WebAuthn fixes
2021-05-12 19:48:00 +02:00
Oscar Hinton
ce4f025a0c
U2F (#1304)
* Delete U2F tokens alongside WebAuthn

* Bring back u2f apis
2021-05-05 16:14:49 +02:00
Oscar Hinton
07f37d1f74
WebAuthn (#903) 2021-03-22 23:21:43 +01:00
Matt Gibson
5537470703
Use sas token for attachment downloads (#1153)
* Get limited life attachment download URL

This change limits url download to a 1min lifetime.
This requires moving to a new container to allow for non-public blob
access.

Clients will have to call GetAttachmentData api function to receive the download
URL. For backwards compatibility, attachment URLs are still present, but will not
work for attachments stored in non-public access blobs.

* Make GlobalSettings interface for testing

* Test LocalAttachmentStorageService equivalence

* Remove comment

* Add missing globalSettings using

* Simplify default attachment container

* Default to attachments containe for existing methods

A new upload method will be made for uploading to attachments-v2.
For compatibility for clients which don't use these new methods, we need
to still use the old container. The new container will be used only for
new uploads

* Remove Default MetaData fixture.

* Keep attachments container blob-level security for all instances

* Close unclosed FileStream

* Favor default value for noop services
2021-02-22 15:35:16 -06:00
Matt Gibson
edd4bc2623
Add disable send policy (#1130)
* Add Disable Send policy

* Test DisableSend policy

* PR Review

* Update tests for using CurrentContext

This required making an interface for CurrentContext and mocking out
the members used. The interface can be expanded as needed for tests.

I moved CurrentContext to a folder, which changes the namespace
and causes a lot of file touches, but most are just adding a reference

* Fix failing test

* Update exemption to include all exempt users

* Move all CurrentContext usages to ICurrentContext

* PR review. Match messaging with Web
2021-02-04 12:54:21 -06:00
Addison Beck
63fcdc1418
Implemented Custom role and permissions (#1057)
* Implemented Custom role and permissions

* Converted permissions columns to a json blob

* Code review fixes for Permissions

* sql build fix

* Update Permissions.cs

* formatting

* Update IOrganizationService.cs

* reworked a conditional

* built out tests for relevant organization service methods

* removed unused usings

* fixed a broken test and a bad empty string init

* removed 'Attribute' from some attribute instances
2021-01-12 11:02:39 -05:00
Chad Scharf
9800b752c0 Changed all C# control flow block statements to include space between keyword and open paren 2020-03-27 14:36:37 -04:00
Kyle Spearrin
71d9ffdd9d
CheckPoliciesOnTwoFactorRemoval for 2fa recovery (#659) 2020-02-28 10:23:19 -05:00
Kyle Spearrin
81424a8526
Enforce 2fa policy (#654) 2020-02-19 14:56:16 -05:00
Kyle Spearrin
20e3963847 check duo keys on org config as well 2019-01-03 00:13:46 -05:00
Kyle Spearrin
3588db947a check duo config with duo's api 2018-12-20 15:39:36 -05:00
Kyle Spearrin
951e8f562e email token provider 2018-12-19 22:27:45 -05:00
Kyle Spearrin
b5a4bad637 catch u2f exceptions 2018-10-10 15:21:54 -04:00
Kyle Spearrin
bfc74060b6 add support for multiple u2f keys 2018-10-08 14:38:11 -04:00
Kyle Spearrin
c41a1e0936 CanAccessPremium checks instead of User.Premium 2018-08-28 16:23:58 -04:00
Kyle Spearrin
e350ef650a dont cycle security token on re-hash 2018-04-17 08:10:17 -04:00
Kyle Spearrin
0d4ea5ce5b organization 2fa apis 2018-04-02 23:18:26 -04:00
Kyle Spearrin
a3a03c7974 move private method to bottom 2017-09-11 23:07:27 -04:00
Kyle Spearrin
d3c18381f9 2fa prem fixes 2017-07-07 09:28:50 -04:00
Kyle Spearrin
99c1d68f5a premium checks on two factor 2017-07-06 16:38:28 -04:00
Kyle Spearrin
ae48c8d9b5 null ref fix 2017-07-06 16:31:46 -04:00
Kyle Spearrin
6c16a988c3 appid no longer served from api 2017-06-27 14:05:50 -04:00
Kyle Spearrin
8b40863472 no need for chrome ext to have appid 2017-06-26 23:56:45 -04:00
Kyle Spearrin
12da107c51 web policy for two factor apis 2017-06-26 09:09:30 -04:00
Kyle Spearrin
eea2ae30b4 get recovery code api 2017-06-24 17:16:05 -04:00
Kyle Spearrin
59b8438a0f update u2f lib. send 2fa login email 2017-06-24 09:20:12 -04:00
Kyle Spearrin
c069fad4e7 adjust fido content type with middleware 2017-06-22 23:15:28 -04:00
Kyle Spearrin
f28ae5ccd9 fixes for configuring u2f device 2017-06-22 17:03:35 -04:00
Kyle Spearrin
731a1e31b9 initiating u2f registration 2017-06-21 22:33:45 -04:00
Kyle Spearrin
fd5e2c9466 stubbing out api setup for u2f 2017-06-21 21:46:52 -04:00
Kyle Spearrin
50c0b3e752 configure duo 2fa 2017-06-21 14:19:07 -04:00
Kyle Spearrin
69de88cc32 yubikey setup for 2FA 2017-06-20 14:12:31 -04:00
Kyle Spearrin
612697e815 refactorings around two-factor controller 2017-06-20 10:08:59 -04:00
Kyle Spearrin
475160cfe1 two factor email setup 2017-06-20 09:21:35 -04:00
Kyle Spearrin
3b5b24531b refactor to a new two-factor controller 2017-06-19 22:08:10 -04:00