1
0
mirror of https://github.com/bitwarden/server.git synced 2025-07-06 02:22:49 -05:00
Commit Graph

146 Commits

Author SHA1 Message Date
989d4df599 Direct upload to Azure/Local (#1188)
* Direct upload to azure

To validate file sizes in the event of a rogue client, Azure event webhooks
will be hooked up to AzureValidateFile.
Sends outside of a grace size will be deleted as non-compliant.

TODO: LocalSendFileStorageService direct upload method/endpoint.

* Quick respond to no-body event calls

These shouldn't happen, but might if some errant get requests occur

* Event Grid only POSTS to webhook

* Enable local storage direct file upload

* Increase file size difference leeway

* Upload through service

* Fix LocalFileSendStorage

It turns out that multipartHttpStreams do not have a length
until read. this causes all long files to be "invalid". We need to
write the entire stream, then validate length, just like Azure.

the difference is, We can return an exception to local storage
admonishing the client for lying

* Update src/Api/Utilities/ApiHelpers.cs

Co-authored-by: Chad Scharf <3904944+cscharf@users.noreply.github.com>

* Do not delete directory if it has files

* Allow large uploads for self hosted instances

* Fix formatting

* Re-verfiy access and increment access count on download of Send File

* Update src/Core/Services/Implementations/SendService.cs

Co-authored-by: Chad Scharf <3904944+cscharf@users.noreply.github.com>

* Add back in original Send upload

* Update size and mark as validated upon Send file validation

* Log azure file validation errors

* Lint fix

Co-authored-by: Chad Scharf <3904944+cscharf@users.noreply.github.com>
2021-03-21 23:01:19 -05:00
3850f0e400 Fix empty grantee or grantor names in emergency access emails (#1162)
* Fix empty grantee or grantor names in emails

* Add migrator dbscript for changes to ReadToNotify
2021-02-26 08:11:58 +10:00
5537470703 Use sas token for attachment downloads (#1153)
* Get limited life attachment download URL

This change limits url download to a 1min lifetime.
This requires moving to a new container to allow for non-public blob
access.

Clients will have to call GetAttachmentData api function to receive the download
URL. For backwards compatibility, attachment URLs are still present, but will not
work for attachments stored in non-public access blobs.

* Make GlobalSettings interface for testing

* Test LocalAttachmentStorageService equivalence

* Remove comment

* Add missing globalSettings using

* Simplify default attachment container

* Default to attachments containe for existing methods

A new upload method will be made for uploading to attachments-v2.
For compatibility for clients which don't use these new methods, we need
to still use the old container. The new container will be used only for
new uploads

* Remove Default MetaData fixture.

* Keep attachments container blob-level security for all instances

* Close unclosed FileStream

* Favor default value for noop services
2021-02-22 15:35:16 -06:00
6cc317c4ba SSO - Added custom scopes and claim types for OIDC (#1133)
* SSO - Added custom scopes and claim types for OIDC

* Removed redundant field labels

* Added acr_values to OIDC config + request
2021-02-10 12:00:12 -05:00
edd4bc2623 Add disable send policy (#1130)
* Add Disable Send policy

* Test DisableSend policy

* PR Review

* Update tests for using CurrentContext

This required making an interface for CurrentContext and mocking out
the members used. The interface can be expanded as needed for tests.

I moved CurrentContext to a folder, which changes the namespace
and causes a lot of file touches, but most are just adding a reference

* Fix failing test

* Update exemption to include all exempt users

* Move all CurrentContext usages to ICurrentContext

* PR review. Match messaging with Web
2021-02-04 12:54:21 -06:00
85edc03461 Add SAML 2.0 metadata export for dynamic SPs (#1094) 2021-01-21 15:54:46 -05:00
63fcdc1418 Implemented Custom role and permissions (#1057)
* Implemented Custom role and permissions

* Converted permissions columns to a json blob

* Code review fixes for Permissions

* sql build fix

* Update Permissions.cs

* formatting

* Update IOrganizationService.cs

* reworked a conditional

* built out tests for relevant organization service methods

* removed unused usings

* fixed a broken test and a bad empty string init

* removed 'Attribute' from some attribute instances
2021-01-12 11:02:39 -05:00
246cac1a33 Allow SHA1 inbound sigs from Idp (#1047) 2020-12-18 11:26:52 -05:00
0f1af2333e Add support for Emergency Access (#1000)
* Add support for Emergency Access

* Add migration script

* Review comments

* Ensure grantor has premium when inviting new grantees.

* Resolve review comments

* Remove two factor references
2020-12-16 14:36:47 -05:00
82dd364e65 Send APIs (#979)
* send work

* fix sql proj file

* update

* updates

* access id

* delete job

* fix delete job

* local send storage

* update sprocs for null checks
2020-11-02 15:55:49 -05:00
66e44759f0 [Require SSO] Enterprise policy enforcement (#970)
* Initial commit of require sso authentication policy enforcement

* Updated sproc to send UseSso flag // Updated base validator to send back error message // Added changes to EntityFramework (just so its there for the future

* Update policy name // adjusted conditional to demorgan's

* Updated sproc // Added migrator script

* Added .sql file extension to DeleteOrgUserWithOrg migrator script

* Added policy // edit // strings // validation to business portal

* Change requests from review // Added Owner & Admin exemption

* Updated repository function used to get org user's type

* Updated with requested changes
2020-10-26 11:56:16 -05:00
a74778de3a Update ACS path to embed Organization ID (#955) 2020-10-01 15:05:09 -04:00
3b8cbe631f Implemented new OIDC redirect behavior (#954) 2020-09-29 17:06:17 -04:00
a997440e3d Added SP ACS URL to Config Screen (#920) 2020-09-08 13:04:26 -04:00
ed99b99bc1 Move SSO core to Core lib, new resource strings (#911)
* Move SSO core to Core lib, new resource strings

* Missed resource strings for lookup
2020-09-04 10:42:47 -04:00
00a1e8e833 Add UseBusinessPortal to OrgUserOrgDetails. (#894) 2020-08-27 11:11:59 -05:00
59f8467f7c Create sso user api (#886)
* facilitate linking/unlinking existing users from an sso enabled org

* added user_identifier to identity methods for sso

* moved sso user delete method to account controller

* fixed a broken test

* Update AccountsController.cs

* facilitate linking/unlinking existing users from an sso enabled org

* added user_identifier to identity methods for sso

* moved sso user delete method to account controller

* fixed a broken test

* added a token to the existing user sso link flow

* added a token to the existing user sso link flow

* fixed a typo

* added an event log for unlink ssoUser records

* fixed a merge issue

* fixed a busted test

* fixed a busted test

* ran a formatter over everything & changed .vscode settings in .gitignore

* chagned a variable to use string interpolation

* removed a blank line

* Changed TokenPurpose enum to a static class of strings

* code review cleanups

* formatting fix

* Changed parameters & logging for delete sso user

* changed th method used to get organization user for deleting sso user records

Co-authored-by: Kyle Spearrin <kspearrin@users.noreply.github.com>
2020-08-26 14:12:04 -04:00
c53e8cbf9d return if org user has sso binding (#839) 2020-07-28 21:11:45 -04:00
51fd87df0b Added UseSso bool to Organization (#834)
* Added UseSso bool to org

* Update fields in migration script

* bump version & check enabled flag on ssoConfig
2020-07-22 09:38:39 -04:00
36f15c67d0 Add support for new collection access, hide passwords 2020-05-21 15:38:57 +02:00
9800b752c0 Changed all C# control flow block statements to include space between keyword and open paren 2020-03-27 14:36:37 -04:00
ff8731c82f add usepolicies to org profile object 2020-01-15 15:17:32 -05:00
58faf5266b policy events 2020-01-15 09:43:49 -05:00
29580684a3 upgrade to aspnet core 3.1 2020-01-10 08:33:13 -05:00
3037b95920 metadata repository for table storage 2019-09-13 16:02:01 -04:00
b4148d3532 fix issues on cipher admin endpoints 2019-05-01 09:38:13 -04:00
fd8a8c8b67 make event message processing idempotent 2019-03-19 17:12:55 -04:00
01a293cf76 record installation devices 2019-03-19 00:39:03 -04:00
15cb0ad4c3 implement useapi and apikey 2019-03-02 15:09:33 -05:00
4a38713c4b return twofactor enabled property on org users api 2018-12-19 11:48:36 -05:00
7cda459127 support for attachments keys
load existing items and set attachments on key update
2018-11-14 17:19:04 -05:00
45a77c8903 manager group user apis 2018-10-18 08:38:22 -04:00
33bfd12b7d apis for managing collection users 2018-10-17 22:18:03 -04:00
c41a1e0936 CanAccessPremium checks instead of User.Premium 2018-08-28 16:23:58 -04:00
0932189ccb support for user defined kdf parameters 2018-08-14 15:30:04 -04:00
5c31a35cfe store password history and revision dates 2018-07-27 17:49:27 -04:00
f1b8301428 event page default is 50 2018-07-11 14:24:27 -04:00
74874a1c38 return collection readonly details 2018-06-11 14:25:53 -04:00
389512d51e added org duo to 2fa flow 2018-04-03 14:31:33 -04:00
367d3f65a6 use2fa org response 2018-04-02 17:20:06 -04:00
bcc224c02d stub out use2fa and twofactorproviders on orgs 2018-04-02 14:53:19 -04:00
48722e4b71 match default is null 2018-03-01 09:34:27 -05:00
2b276e9986 backwards compat apis on Uri 2018-03-01 09:29:49 -05:00
c8aabf0b40 MatchType proper => Match 2018-02-28 21:37:06 -05:00
3563a85318 add support for multiple uris on login model.
refactor cipher data models.
2018-02-28 21:23:46 -05:00
e9116f8c44 app cache with org ability checks on events 2017-12-19 16:02:39 -05:00
125eab11dc event paging 2017-12-15 15:23:57 -05:00
a9f232746e store device type and ip address on events 2017-12-15 10:50:06 -05:00
992fac1328 index table entity events 2017-12-14 17:23:46 -05:00
8898c58f3c type row keys should be ints 2017-12-14 16:20:59 -05:00