mirror of
https://github.com/bitwarden/server.git
synced 2025-04-05 13:08:17 -05:00
683 lines
29 KiB
C#
683 lines
29 KiB
C#
using Bit.Api.AdminConsole.Models.Request.Organizations;
|
|
using Bit.Api.AdminConsole.Models.Response.Organizations;
|
|
using Bit.Api.Models.Request.Organizations;
|
|
using Bit.Api.Models.Response;
|
|
using Bit.Api.Utilities;
|
|
using Bit.Api.Vault.AuthorizationHandlers.Collections;
|
|
using Bit.Api.Vault.AuthorizationHandlers.OrganizationUsers;
|
|
using Bit.Core;
|
|
using Bit.Core.AdminConsole.Enums;
|
|
using Bit.Core.AdminConsole.Models.Data.Organizations.Policies;
|
|
using Bit.Core.AdminConsole.OrganizationFeatures.OrganizationUsers.Interfaces;
|
|
using Bit.Core.AdminConsole.Repositories;
|
|
using Bit.Core.Context;
|
|
using Bit.Core.Enums;
|
|
using Bit.Core.Exceptions;
|
|
using Bit.Core.Models.Business;
|
|
using Bit.Core.Models.Data;
|
|
using Bit.Core.Models.Data.Organizations.OrganizationUsers;
|
|
using Bit.Core.OrganizationFeatures.OrganizationSubscriptions.Interface;
|
|
using Bit.Core.OrganizationFeatures.OrganizationUsers.Interfaces;
|
|
using Bit.Core.Repositories;
|
|
using Bit.Core.Services;
|
|
using Microsoft.AspNetCore.Authorization;
|
|
using Microsoft.AspNetCore.Mvc;
|
|
|
|
namespace Bit.Api.AdminConsole.Controllers;
|
|
|
|
[Route("organizations/{orgId}/users")]
|
|
[Authorize("Application")]
|
|
public class OrganizationUsersController : Controller
|
|
{
|
|
private readonly IOrganizationRepository _organizationRepository;
|
|
private readonly IOrganizationUserRepository _organizationUserRepository;
|
|
private readonly IOrganizationService _organizationService;
|
|
private readonly ICollectionRepository _collectionRepository;
|
|
private readonly IGroupRepository _groupRepository;
|
|
private readonly IUserService _userService;
|
|
private readonly IPolicyRepository _policyRepository;
|
|
private readonly ICurrentContext _currentContext;
|
|
private readonly ICountNewSmSeatsRequiredQuery _countNewSmSeatsRequiredQuery;
|
|
private readonly IUpdateSecretsManagerSubscriptionCommand _updateSecretsManagerSubscriptionCommand;
|
|
private readonly IUpdateOrganizationUserCommand _updateOrganizationUserCommand;
|
|
private readonly IUpdateOrganizationUserGroupsCommand _updateOrganizationUserGroupsCommand;
|
|
private readonly IAcceptOrgUserCommand _acceptOrgUserCommand;
|
|
private readonly IAuthorizationService _authorizationService;
|
|
private readonly IApplicationCacheService _applicationCacheService;
|
|
private readonly IFeatureService _featureService;
|
|
|
|
public OrganizationUsersController(
|
|
IOrganizationRepository organizationRepository,
|
|
IOrganizationUserRepository organizationUserRepository,
|
|
IOrganizationService organizationService,
|
|
ICollectionRepository collectionRepository,
|
|
IGroupRepository groupRepository,
|
|
IUserService userService,
|
|
IPolicyRepository policyRepository,
|
|
ICurrentContext currentContext,
|
|
ICountNewSmSeatsRequiredQuery countNewSmSeatsRequiredQuery,
|
|
IUpdateSecretsManagerSubscriptionCommand updateSecretsManagerSubscriptionCommand,
|
|
IUpdateOrganizationUserCommand updateOrganizationUserCommand,
|
|
IUpdateOrganizationUserGroupsCommand updateOrganizationUserGroupsCommand,
|
|
IAcceptOrgUserCommand acceptOrgUserCommand,
|
|
IAuthorizationService authorizationService,
|
|
IApplicationCacheService applicationCacheService,
|
|
IFeatureService featureService)
|
|
{
|
|
_organizationRepository = organizationRepository;
|
|
_organizationUserRepository = organizationUserRepository;
|
|
_organizationService = organizationService;
|
|
_collectionRepository = collectionRepository;
|
|
_groupRepository = groupRepository;
|
|
_userService = userService;
|
|
_policyRepository = policyRepository;
|
|
_currentContext = currentContext;
|
|
_countNewSmSeatsRequiredQuery = countNewSmSeatsRequiredQuery;
|
|
_updateSecretsManagerSubscriptionCommand = updateSecretsManagerSubscriptionCommand;
|
|
_updateOrganizationUserCommand = updateOrganizationUserCommand;
|
|
_updateOrganizationUserGroupsCommand = updateOrganizationUserGroupsCommand;
|
|
_acceptOrgUserCommand = acceptOrgUserCommand;
|
|
_authorizationService = authorizationService;
|
|
_applicationCacheService = applicationCacheService;
|
|
_featureService = featureService;
|
|
}
|
|
|
|
[HttpGet("{id}")]
|
|
public async Task<OrganizationUserDetailsResponseModel> Get(string id, bool includeGroups = false)
|
|
{
|
|
var organizationUser = await _organizationUserRepository.GetDetailsByIdWithCollectionsAsync(new Guid(id));
|
|
if (organizationUser == null || !await _currentContext.ManageUsers(organizationUser.Item1.OrganizationId))
|
|
{
|
|
throw new NotFoundException();
|
|
}
|
|
|
|
var response = new OrganizationUserDetailsResponseModel(organizationUser.Item1, organizationUser.Item2);
|
|
if (await FlexibleCollectionsIsEnabledAsync(organizationUser.Item1.OrganizationId))
|
|
{
|
|
// Downgrade Custom users with no other permissions than 'Edit/Delete Assigned Collections' to User
|
|
response.Type = GetFlexibleCollectionsUserType(response.Type, response.Permissions);
|
|
|
|
// Set 'Edit/Delete Assigned Collections' custom permissions to false
|
|
if (response.Permissions is not null)
|
|
{
|
|
response.Permissions.EditAssignedCollections = false;
|
|
response.Permissions.DeleteAssignedCollections = false;
|
|
}
|
|
}
|
|
|
|
if (includeGroups)
|
|
{
|
|
response.Groups = await _groupRepository.GetManyIdsByUserIdAsync(organizationUser.Item1.Id);
|
|
}
|
|
|
|
return response;
|
|
}
|
|
|
|
[HttpGet("")]
|
|
public async Task<ListResponseModel<OrganizationUserUserDetailsResponseModel>> Get(Guid orgId, bool includeGroups = false, bool includeCollections = false)
|
|
{
|
|
if (await FlexibleCollectionsIsEnabledAsync(orgId))
|
|
{
|
|
return await Get_vNext(orgId, includeGroups, includeCollections);
|
|
}
|
|
|
|
var authorized = await _currentContext.ViewAllCollections(orgId) ||
|
|
await _currentContext.ViewAssignedCollections(orgId) ||
|
|
await _currentContext.ManageGroups(orgId) ||
|
|
await _currentContext.ManageUsers(orgId);
|
|
if (!authorized)
|
|
{
|
|
throw new NotFoundException();
|
|
}
|
|
|
|
var organizationUsers = await _organizationUserRepository.GetManyDetailsByOrganizationAsync(orgId, includeGroups, includeCollections);
|
|
var responseTasks = organizationUsers.Select(async o => new OrganizationUserUserDetailsResponseModel(o,
|
|
await _userService.TwoFactorIsEnabledAsync(o)));
|
|
var responses = await Task.WhenAll(responseTasks);
|
|
return new ListResponseModel<OrganizationUserUserDetailsResponseModel>(responses);
|
|
}
|
|
|
|
[HttpGet("{id}/groups")]
|
|
public async Task<IEnumerable<string>> GetGroups(string orgId, string id)
|
|
{
|
|
var organizationUser = await _organizationUserRepository.GetByIdAsync(new Guid(id));
|
|
if (organizationUser == null || (!await _currentContext.ManageGroups(organizationUser.OrganizationId) &&
|
|
!await _currentContext.ManageUsers(organizationUser.OrganizationId)))
|
|
{
|
|
throw new NotFoundException();
|
|
}
|
|
|
|
var groupIds = await _groupRepository.GetManyIdsByUserIdAsync(organizationUser.Id);
|
|
var responses = groupIds.Select(g => g.ToString());
|
|
return responses;
|
|
}
|
|
|
|
[HttpGet("{id}/reset-password-details")]
|
|
public async Task<OrganizationUserResetPasswordDetailsResponseModel> GetResetPasswordDetails(string orgId, string id)
|
|
{
|
|
// Make sure the calling user can reset passwords for this org
|
|
var orgGuidId = new Guid(orgId);
|
|
if (!await _currentContext.ManageResetPassword(orgGuidId))
|
|
{
|
|
throw new NotFoundException();
|
|
}
|
|
|
|
var organizationUser = await _organizationUserRepository.GetByIdAsync(new Guid(id));
|
|
if (organizationUser == null || !organizationUser.UserId.HasValue)
|
|
{
|
|
throw new NotFoundException();
|
|
}
|
|
|
|
// Retrieve data necessary for response (KDF, KDF Iterations, ResetPasswordKey)
|
|
// TODO Reset Password - Revisit this and create SPROC to reduce DB calls
|
|
var user = await _userService.GetUserByIdAsync(organizationUser.UserId.Value);
|
|
if (user == null)
|
|
{
|
|
throw new NotFoundException();
|
|
}
|
|
|
|
// Retrieve Encrypted Private Key from organization
|
|
var org = await _organizationRepository.GetByIdAsync(orgGuidId);
|
|
if (org == null)
|
|
{
|
|
throw new NotFoundException();
|
|
}
|
|
|
|
return new OrganizationUserResetPasswordDetailsResponseModel(new OrganizationUserResetPasswordDetails(organizationUser, user, org));
|
|
}
|
|
|
|
[HttpPost("invite")]
|
|
public async Task Invite(Guid orgId, [FromBody] OrganizationUserInviteRequestModel model)
|
|
{
|
|
if (!await _currentContext.ManageUsers(orgId))
|
|
{
|
|
throw new NotFoundException();
|
|
}
|
|
|
|
// Flexible Collections - check the user has permission to grant access to the collections for the new user
|
|
if (await FlexibleCollectionsIsEnabledAsync(orgId) &&
|
|
_featureService.IsEnabled(FeatureFlagKeys.FlexibleCollectionsV1) &&
|
|
model.Collections?.Any() == true)
|
|
{
|
|
var collections = await _collectionRepository.GetManyByManyIdsAsync(model.Collections.Select(a => a.Id));
|
|
var authorized =
|
|
(await _authorizationService.AuthorizeAsync(User, collections, BulkCollectionOperations.ModifyUserAccess))
|
|
.Succeeded;
|
|
if (!authorized)
|
|
{
|
|
throw new NotFoundException("You are not authorized to grant access to these collections.");
|
|
}
|
|
}
|
|
|
|
var userId = _userService.GetProperUserId(User);
|
|
await _organizationService.InviteUsersAsync(orgId, userId.Value,
|
|
new (OrganizationUserInvite, string)[] { (new OrganizationUserInvite(model.ToData()), null) });
|
|
}
|
|
|
|
[HttpPost("reinvite")]
|
|
public async Task<ListResponseModel<OrganizationUserBulkResponseModel>> BulkReinvite(string orgId, [FromBody] OrganizationUserBulkRequestModel model)
|
|
{
|
|
var orgGuidId = new Guid(orgId);
|
|
if (!await _currentContext.ManageUsers(orgGuidId))
|
|
{
|
|
throw new NotFoundException();
|
|
}
|
|
|
|
var userId = _userService.GetProperUserId(User);
|
|
var result = await _organizationService.ResendInvitesAsync(orgGuidId, userId.Value, model.Ids);
|
|
return new ListResponseModel<OrganizationUserBulkResponseModel>(
|
|
result.Select(t => new OrganizationUserBulkResponseModel(t.Item1.Id, t.Item2)));
|
|
}
|
|
|
|
[HttpPost("{id}/reinvite")]
|
|
public async Task Reinvite(string orgId, string id)
|
|
{
|
|
var orgGuidId = new Guid(orgId);
|
|
if (!await _currentContext.ManageUsers(orgGuidId))
|
|
{
|
|
throw new NotFoundException();
|
|
}
|
|
|
|
var userId = _userService.GetProperUserId(User);
|
|
await _organizationService.ResendInviteAsync(orgGuidId, userId.Value, new Guid(id));
|
|
}
|
|
|
|
[HttpPost("{organizationUserId}/accept-init")]
|
|
public async Task AcceptInit(Guid orgId, Guid organizationUserId, [FromBody] OrganizationUserAcceptInitRequestModel model)
|
|
{
|
|
var user = await _userService.GetUserByPrincipalAsync(User);
|
|
if (user == null)
|
|
{
|
|
throw new UnauthorizedAccessException();
|
|
}
|
|
|
|
await _organizationService.InitPendingOrganization(user.Id, orgId, organizationUserId, model.Keys.PublicKey, model.Keys.EncryptedPrivateKey, model.CollectionName);
|
|
await _acceptOrgUserCommand.AcceptOrgUserByEmailTokenAsync(organizationUserId, user, model.Token, _userService);
|
|
await _organizationService.ConfirmUserAsync(orgId, organizationUserId, model.Key, user.Id, _userService);
|
|
}
|
|
|
|
[HttpPost("{organizationUserId}/accept")]
|
|
public async Task Accept(Guid orgId, Guid organizationUserId, [FromBody] OrganizationUserAcceptRequestModel model)
|
|
{
|
|
var user = await _userService.GetUserByPrincipalAsync(User);
|
|
if (user == null)
|
|
{
|
|
throw new UnauthorizedAccessException();
|
|
}
|
|
|
|
var masterPasswordPolicy = await _policyRepository.GetByOrganizationIdTypeAsync(orgId, PolicyType.ResetPassword);
|
|
var useMasterPasswordPolicy = masterPasswordPolicy != null &&
|
|
masterPasswordPolicy.Enabled &&
|
|
masterPasswordPolicy.GetDataModel<ResetPasswordDataModel>().AutoEnrollEnabled;
|
|
if (useMasterPasswordPolicy && string.IsNullOrWhiteSpace(model.ResetPasswordKey))
|
|
{
|
|
throw new BadRequestException(string.Empty, "Master Password reset is required, but not provided.");
|
|
}
|
|
|
|
await _acceptOrgUserCommand.AcceptOrgUserByEmailTokenAsync(organizationUserId, user, model.Token, _userService);
|
|
|
|
if (useMasterPasswordPolicy)
|
|
{
|
|
await _organizationService.UpdateUserResetPasswordEnrollmentAsync(orgId, user.Id, model.ResetPasswordKey, user.Id);
|
|
}
|
|
}
|
|
|
|
[HttpPost("{id}/confirm")]
|
|
public async Task Confirm(string orgId, string id, [FromBody] OrganizationUserConfirmRequestModel model)
|
|
{
|
|
var orgGuidId = new Guid(orgId);
|
|
if (!await _currentContext.ManageUsers(orgGuidId))
|
|
{
|
|
throw new NotFoundException();
|
|
}
|
|
|
|
var userId = _userService.GetProperUserId(User);
|
|
var result = await _organizationService.ConfirmUserAsync(orgGuidId, new Guid(id), model.Key, userId.Value,
|
|
_userService);
|
|
}
|
|
|
|
[HttpPost("confirm")]
|
|
public async Task<ListResponseModel<OrganizationUserBulkResponseModel>> BulkConfirm(string orgId,
|
|
[FromBody] OrganizationUserBulkConfirmRequestModel model)
|
|
{
|
|
var orgGuidId = new Guid(orgId);
|
|
if (!await _currentContext.ManageUsers(orgGuidId))
|
|
{
|
|
throw new NotFoundException();
|
|
}
|
|
|
|
var userId = _userService.GetProperUserId(User);
|
|
var results = await _organizationService.ConfirmUsersAsync(orgGuidId, model.ToDictionary(), userId.Value,
|
|
_userService);
|
|
|
|
return new ListResponseModel<OrganizationUserBulkResponseModel>(results.Select(r =>
|
|
new OrganizationUserBulkResponseModel(r.Item1.Id, r.Item2)));
|
|
}
|
|
|
|
[HttpPost("public-keys")]
|
|
public async Task<ListResponseModel<OrganizationUserPublicKeyResponseModel>> UserPublicKeys(string orgId, [FromBody] OrganizationUserBulkRequestModel model)
|
|
{
|
|
var orgGuidId = new Guid(orgId);
|
|
if (!await _currentContext.ManageUsers(orgGuidId))
|
|
{
|
|
throw new NotFoundException();
|
|
}
|
|
|
|
var result = await _organizationUserRepository.GetManyPublicKeysByOrganizationUserAsync(orgGuidId, model.Ids);
|
|
var responses = result.Select(r => new OrganizationUserPublicKeyResponseModel(r.Id, r.UserId, r.PublicKey)).ToList();
|
|
return new ListResponseModel<OrganizationUserPublicKeyResponseModel>(responses);
|
|
}
|
|
|
|
[HttpPut("{id}")]
|
|
[HttpPost("{id}")]
|
|
public async Task Put(Guid orgId, Guid id, [FromBody] OrganizationUserUpdateRequestModel model)
|
|
{
|
|
if (await FlexibleCollectionsIsEnabledAsync(orgId) && _featureService.IsEnabled(FeatureFlagKeys.FlexibleCollectionsV1))
|
|
{
|
|
// Use new Flexible Collections v1 logic
|
|
await Put_vNext(orgId, id, model);
|
|
return;
|
|
}
|
|
|
|
// Pre-Flexible Collections v1 code follows
|
|
if (!await _currentContext.ManageUsers(orgId))
|
|
{
|
|
throw new NotFoundException();
|
|
}
|
|
|
|
var organizationUser = await _organizationUserRepository.GetByIdAsync(id);
|
|
if (organizationUser == null || organizationUser.OrganizationId != orgId)
|
|
{
|
|
throw new NotFoundException();
|
|
}
|
|
|
|
var userId = _userService.GetProperUserId(User);
|
|
await _updateOrganizationUserCommand.UpdateUserAsync(model.ToOrganizationUser(organizationUser), userId.Value,
|
|
model.Collections.Select(c => c.ToSelectionReadOnly()).ToList(), model.Groups);
|
|
}
|
|
|
|
/// <summary>
|
|
/// Put logic for Flexible Collections v1
|
|
/// </summary>
|
|
private async Task Put_vNext(Guid orgId, Guid id, [FromBody] OrganizationUserUpdateRequestModel model)
|
|
{
|
|
if (!await _currentContext.ManageUsers(orgId))
|
|
{
|
|
throw new NotFoundException();
|
|
}
|
|
|
|
var (organizationUser, currentAccess) = await _organizationUserRepository.GetByIdWithCollectionsAsync(id);
|
|
if (organizationUser == null || organizationUser.OrganizationId != orgId)
|
|
{
|
|
throw new NotFoundException();
|
|
}
|
|
|
|
var userId = _userService.GetProperUserId(User).Value;
|
|
var editingSelf = userId == organizationUser.UserId;
|
|
|
|
// If admins are not allowed access to all collections, you cannot add yourself to a group.
|
|
// In this case we just don't update groups.
|
|
var organizationAbility = await _applicationCacheService.GetOrganizationAbilityAsync(orgId);
|
|
var groupsToSave = editingSelf && !organizationAbility.AllowAdminAccessToAllCollectionItems
|
|
? null
|
|
: model.Groups;
|
|
|
|
// If admins are not allowed access to all collections, you cannot add yourself to collections.
|
|
// This is not caught by the requirement below that you can ModifyUserAccess and must be checked separately
|
|
var currentAccessIds = currentAccess.Select(c => c.Id).ToHashSet();
|
|
if (editingSelf &&
|
|
!organizationAbility.AllowAdminAccessToAllCollectionItems &&
|
|
model.Collections.Any(c => !currentAccessIds.Contains(c.Id)))
|
|
{
|
|
throw new BadRequestException("You cannot add yourself to a collection.");
|
|
}
|
|
|
|
// The client only sends collections that the saving user has permissions to edit.
|
|
// On the server side, we need to (1) make sure the user has permissions for these collections, and
|
|
// (2) concat these with the collections that the user can't edit before saving to the database.
|
|
var currentCollections = await _collectionRepository
|
|
.GetManyByManyIdsAsync(currentAccess.Select(cas => cas.Id));
|
|
|
|
var readonlyCollectionIds = new HashSet<Guid>();
|
|
foreach (var collection in currentCollections)
|
|
{
|
|
if (!(await _authorizationService.AuthorizeAsync(User, collection, BulkCollectionOperations.ModifyUserAccess))
|
|
.Succeeded)
|
|
{
|
|
readonlyCollectionIds.Add(collection.Id);
|
|
}
|
|
}
|
|
|
|
if (model.Collections.Any(c => readonlyCollectionIds.Contains(c.Id)))
|
|
{
|
|
throw new BadRequestException("You must have Can Manage permissions to edit a collection's membership");
|
|
}
|
|
|
|
var editedCollectionAccess = model.Collections
|
|
.Select(c => c.ToSelectionReadOnly());
|
|
var readonlyCollectionAccess = currentAccess
|
|
.Where(ca => readonlyCollectionIds.Contains(ca.Id));
|
|
var collectionsToSave = editedCollectionAccess
|
|
.Concat(readonlyCollectionAccess)
|
|
.ToList();
|
|
|
|
await _updateOrganizationUserCommand.UpdateUserAsync(model.ToOrganizationUser(organizationUser), userId,
|
|
collectionsToSave, groupsToSave);
|
|
}
|
|
|
|
[HttpPut("{userId}/reset-password-enrollment")]
|
|
public async Task PutResetPasswordEnrollment(Guid orgId, Guid userId, [FromBody] OrganizationUserResetPasswordEnrollmentRequestModel model)
|
|
{
|
|
var user = await _userService.GetUserByPrincipalAsync(User);
|
|
if (user == null)
|
|
{
|
|
throw new UnauthorizedAccessException();
|
|
}
|
|
|
|
var callingUserId = user.Id;
|
|
await _organizationService.UpdateUserResetPasswordEnrollmentAsync(
|
|
orgId, userId, model.ResetPasswordKey, callingUserId);
|
|
|
|
var orgUser = await _organizationUserRepository.GetByOrganizationAsync(orgId, user.Id);
|
|
if (orgUser.Status == OrganizationUserStatusType.Invited)
|
|
{
|
|
await _acceptOrgUserCommand.AcceptOrgUserByOrgIdAsync(orgId, user, _userService);
|
|
}
|
|
}
|
|
|
|
[HttpPut("{id}/reset-password")]
|
|
public async Task PutResetPassword(string orgId, string id, [FromBody] OrganizationUserResetPasswordRequestModel model)
|
|
{
|
|
|
|
var orgGuidId = new Guid(orgId);
|
|
|
|
// Calling user must have Manage Reset Password permission
|
|
if (!await _currentContext.ManageResetPassword(orgGuidId))
|
|
{
|
|
throw new NotFoundException();
|
|
}
|
|
|
|
// Get the users role, since provider users aren't a member of the organization we use the owner check
|
|
var orgUserType = await _currentContext.OrganizationOwner(orgGuidId)
|
|
? OrganizationUserType.Owner
|
|
: _currentContext.Organizations?.FirstOrDefault(o => o.Id == orgGuidId)?.Type;
|
|
if (orgUserType == null)
|
|
{
|
|
throw new NotFoundException();
|
|
}
|
|
|
|
var result = await _userService.AdminResetPasswordAsync(orgUserType.Value, orgGuidId, new Guid(id), model.NewMasterPasswordHash, model.Key);
|
|
if (result.Succeeded)
|
|
{
|
|
return;
|
|
}
|
|
|
|
foreach (var error in result.Errors)
|
|
{
|
|
ModelState.AddModelError(string.Empty, error.Description);
|
|
}
|
|
|
|
await Task.Delay(2000);
|
|
throw new BadRequestException(ModelState);
|
|
}
|
|
|
|
[HttpDelete("{id}")]
|
|
[HttpPost("{id}/delete")]
|
|
public async Task Delete(string orgId, string id)
|
|
{
|
|
var orgGuidId = new Guid(orgId);
|
|
if (!await _currentContext.ManageUsers(orgGuidId))
|
|
{
|
|
throw new NotFoundException();
|
|
}
|
|
|
|
var userId = _userService.GetProperUserId(User);
|
|
await _organizationService.DeleteUserAsync(orgGuidId, new Guid(id), userId.Value);
|
|
}
|
|
|
|
[HttpDelete("")]
|
|
[HttpPost("delete")]
|
|
public async Task<ListResponseModel<OrganizationUserBulkResponseModel>> BulkDelete(string orgId, [FromBody] OrganizationUserBulkRequestModel model)
|
|
{
|
|
var orgGuidId = new Guid(orgId);
|
|
if (!await _currentContext.ManageUsers(orgGuidId))
|
|
{
|
|
throw new NotFoundException();
|
|
}
|
|
|
|
var userId = _userService.GetProperUserId(User);
|
|
var result = await _organizationService.DeleteUsersAsync(orgGuidId, model.Ids, userId.Value);
|
|
return new ListResponseModel<OrganizationUserBulkResponseModel>(result.Select(r =>
|
|
new OrganizationUserBulkResponseModel(r.Item1.Id, r.Item2)));
|
|
}
|
|
|
|
[HttpPatch("{id}/revoke")]
|
|
[HttpPut("{id}/revoke")]
|
|
public async Task RevokeAsync(Guid orgId, Guid id)
|
|
{
|
|
await RestoreOrRevokeUserAsync(orgId, id, _organizationService.RevokeUserAsync);
|
|
}
|
|
|
|
[HttpPatch("revoke")]
|
|
[HttpPut("revoke")]
|
|
public async Task<ListResponseModel<OrganizationUserBulkResponseModel>> BulkRevokeAsync(Guid orgId, [FromBody] OrganizationUserBulkRequestModel model)
|
|
{
|
|
return await RestoreOrRevokeUsersAsync(orgId, model, _organizationService.RevokeUsersAsync);
|
|
}
|
|
|
|
[HttpPatch("{id}/restore")]
|
|
[HttpPut("{id}/restore")]
|
|
public async Task RestoreAsync(Guid orgId, Guid id)
|
|
{
|
|
await RestoreOrRevokeUserAsync(orgId, id, (orgUser, userId) => _organizationService.RestoreUserAsync(orgUser, userId, _userService));
|
|
}
|
|
|
|
[HttpPatch("restore")]
|
|
[HttpPut("restore")]
|
|
public async Task<ListResponseModel<OrganizationUserBulkResponseModel>> BulkRestoreAsync(Guid orgId, [FromBody] OrganizationUserBulkRequestModel model)
|
|
{
|
|
return await RestoreOrRevokeUsersAsync(orgId, model, (orgId, orgUserIds, restoringUserId) => _organizationService.RestoreUsersAsync(orgId, orgUserIds, restoringUserId, _userService));
|
|
}
|
|
|
|
[HttpPatch("enable-secrets-manager")]
|
|
[HttpPut("enable-secrets-manager")]
|
|
public async Task BulkEnableSecretsManagerAsync(Guid orgId,
|
|
[FromBody] OrganizationUserBulkRequestModel model)
|
|
{
|
|
if (!await _currentContext.ManageUsers(orgId))
|
|
{
|
|
throw new NotFoundException();
|
|
}
|
|
|
|
var orgUsers = (await _organizationUserRepository.GetManyAsync(model.Ids))
|
|
.Where(ou => ou.OrganizationId == orgId && !ou.AccessSecretsManager).ToList();
|
|
if (orgUsers.Count == 0)
|
|
{
|
|
throw new BadRequestException("Users invalid.");
|
|
}
|
|
|
|
var additionalSmSeatsRequired = await _countNewSmSeatsRequiredQuery.CountNewSmSeatsRequiredAsync(orgId,
|
|
orgUsers.Count);
|
|
if (additionalSmSeatsRequired > 0)
|
|
{
|
|
var organization = await _organizationRepository.GetByIdAsync(orgId);
|
|
var update = new SecretsManagerSubscriptionUpdate(organization, true)
|
|
.AdjustSeats(additionalSmSeatsRequired);
|
|
await _updateSecretsManagerSubscriptionCommand.UpdateSubscriptionAsync(update);
|
|
}
|
|
|
|
foreach (var orgUser in orgUsers)
|
|
{
|
|
orgUser.AccessSecretsManager = true;
|
|
}
|
|
|
|
await _organizationUserRepository.ReplaceManyAsync(orgUsers);
|
|
}
|
|
|
|
private async Task RestoreOrRevokeUserAsync(
|
|
Guid orgId,
|
|
Guid id,
|
|
Func<Core.Entities.OrganizationUser, Guid?, Task> statusAction)
|
|
{
|
|
if (!await _currentContext.ManageUsers(orgId))
|
|
{
|
|
throw new NotFoundException();
|
|
}
|
|
|
|
var userId = _userService.GetProperUserId(User);
|
|
var orgUser = await _organizationUserRepository.GetByIdAsync(id);
|
|
if (orgUser == null || orgUser.OrganizationId != orgId)
|
|
{
|
|
throw new NotFoundException();
|
|
}
|
|
|
|
await statusAction(orgUser, userId);
|
|
}
|
|
|
|
private async Task<ListResponseModel<OrganizationUserBulkResponseModel>> RestoreOrRevokeUsersAsync(
|
|
Guid orgId,
|
|
OrganizationUserBulkRequestModel model,
|
|
Func<Guid, IEnumerable<Guid>, Guid?, Task<List<Tuple<Core.Entities.OrganizationUser, string>>>> statusAction)
|
|
{
|
|
if (!await _currentContext.ManageUsers(orgId))
|
|
{
|
|
throw new NotFoundException();
|
|
}
|
|
|
|
var userId = _userService.GetProperUserId(User);
|
|
var result = await statusAction(orgId, model.Ids, userId.Value);
|
|
return new ListResponseModel<OrganizationUserBulkResponseModel>(result.Select(r =>
|
|
new OrganizationUserBulkResponseModel(r.Item1.Id, r.Item2)));
|
|
}
|
|
|
|
private async Task<bool> FlexibleCollectionsIsEnabledAsync(Guid organizationId)
|
|
{
|
|
var organizationAbility = await _applicationCacheService.GetOrganizationAbilityAsync(organizationId);
|
|
return organizationAbility?.FlexibleCollections ?? false;
|
|
}
|
|
|
|
private async Task<ListResponseModel<OrganizationUserUserDetailsResponseModel>> Get_vNext(Guid orgId,
|
|
bool includeGroups = false, bool includeCollections = false)
|
|
{
|
|
var authorized = (await _authorizationService.AuthorizeAsync(
|
|
User, OrganizationUserOperations.ReadAll(orgId))).Succeeded;
|
|
if (!authorized)
|
|
{
|
|
throw new NotFoundException();
|
|
}
|
|
|
|
var organizationUsers = await _organizationUserRepository
|
|
.GetManyDetailsByOrganizationAsync(orgId, includeGroups, includeCollections);
|
|
var responseTasks = organizationUsers
|
|
.Select(async o =>
|
|
{
|
|
var orgUser = new OrganizationUserUserDetailsResponseModel(o,
|
|
await _userService.TwoFactorIsEnabledAsync(o));
|
|
|
|
// Downgrade Custom users with no other permissions than 'Edit/Delete Assigned Collections' to User
|
|
orgUser.Type = GetFlexibleCollectionsUserType(orgUser.Type, orgUser.Permissions);
|
|
|
|
// Set 'Edit/Delete Assigned Collections' custom permissions to false
|
|
if (orgUser.Permissions is not null)
|
|
{
|
|
orgUser.Permissions.EditAssignedCollections = false;
|
|
orgUser.Permissions.DeleteAssignedCollections = false;
|
|
}
|
|
|
|
return orgUser;
|
|
});
|
|
var responses = await Task.WhenAll(responseTasks);
|
|
|
|
return new ListResponseModel<OrganizationUserUserDetailsResponseModel>(responses);
|
|
}
|
|
|
|
private OrganizationUserType GetFlexibleCollectionsUserType(OrganizationUserType type, Permissions permissions)
|
|
{
|
|
// Downgrade Custom users with no other permissions than 'Edit/Delete Assigned Collections' to User
|
|
if (type == OrganizationUserType.Custom && permissions is not null)
|
|
{
|
|
if ((permissions.EditAssignedCollections || permissions.DeleteAssignedCollections) &&
|
|
permissions is
|
|
{
|
|
AccessEventLogs: false,
|
|
AccessImportExport: false,
|
|
AccessReports: false,
|
|
CreateNewCollections: false,
|
|
EditAnyCollection: false,
|
|
DeleteAnyCollection: false,
|
|
ManageGroups: false,
|
|
ManagePolicies: false,
|
|
ManageSso: false,
|
|
ManageUsers: false,
|
|
ManageResetPassword: false,
|
|
ManageScim: false
|
|
})
|
|
{
|
|
return OrganizationUserType.User;
|
|
}
|
|
}
|
|
|
|
return type;
|
|
}
|
|
}
|