mirror of
https://github.com/bitwarden/server.git
synced 2025-04-05 05:00:19 -05:00

* [AC-1423] Add AddonProduct and BitwardenProduct properties to BillingSubscriptionItem (#3037) * [AC-1423] Add AddonProduct and BitwardenProduct properties to BillingSubscriptionItem * [AC-1423] Add helper to StaticStore.cs to find a Plan by StripePlanId * [AC-1423] Use the helper method to set SubscriptionInfo.BitwardenProduct * Add SecretsManagerBilling feature flag to Constants * [AC 1409] Secrets Manager Subscription Stripe Integration (#3019) * [AC-1418] Add missing SecretsManagerPlan property to OrganizationResponseModel (#3055) * [AC 1460] Update Stripe Configuration (#3070) * [AC 1410] Secrets Manager subscription adjustment back-end changes (#3036) * Create UpgradeSecretsManagerSubscription command * [AC-1495] Extract UpgradePlanAsync into a command (#3081) * This is a pure lift & shift with no refactors * [AC-1503] Fix Stripe integration on organization upgrade (#3084) * Fix SM parameters not being passed to Stripe * [AC-1504] Allow SM max autoscale limits to be disabled (#3085) * [AC-1488] Changed SM Signup and Upgrade paths to set SmServiceAccounts to include the plan BaseServiceAccount (#3086) * [AC-1510] Enable access to Secrets Manager to Organization owner for new Subscription (#3089) * Revert changes to ReferenceEvent code (#3091) This will be done in AC-1481 * Add UsePasswordManager to sync data (#3114) * [AC-1522] Fix service account check on upgrading (#3111) * [AC-1521] Address checkmarx security feedback (#3124) * Reinstate target attribute but add noopener noreferrer * Update date on migration script --------- Co-authored-by: Shane Melton <smelton@bitwarden.com> Co-authored-by: Thomas Rittson <trittson@bitwarden.com> Co-authored-by: cyprain-okeke <108260115+cyprain-okeke@users.noreply.github.com> Co-authored-by: Thomas Rittson <31796059+eliykat@users.noreply.github.com> Co-authored-by: cyprain-okeke <cokeke@bitwarden.com> Co-authored-by: Rui Tomé <108268980+r-tome@users.noreply.github.com> Co-authored-by: Conner Turnbull <cturnbull@bitwarden.com> Co-authored-by: Rui Tome <rtome@bitwarden.com>
338 lines
16 KiB
C#
338 lines
16 KiB
C#
using Bit.Core.AdminConsole.Models.OrganizationConnectionConfigs;
|
|
using Bit.Core.Auth.Enums;
|
|
using Bit.Core.Auth.Repositories;
|
|
using Bit.Core.Context;
|
|
using Bit.Core.Entities;
|
|
using Bit.Core.Enums;
|
|
using Bit.Core.Exceptions;
|
|
using Bit.Core.Models.Business;
|
|
using Bit.Core.OrganizationFeatures.OrganizationSubscriptions.Interface;
|
|
using Bit.Core.Repositories;
|
|
using Bit.Core.SecretsManager.Repositories;
|
|
using Bit.Core.Services;
|
|
using Bit.Core.Tools.Enums;
|
|
using Bit.Core.Tools.Models.Business;
|
|
using Bit.Core.Tools.Services;
|
|
using Bit.Core.Utilities;
|
|
|
|
namespace Bit.Core.OrganizationFeatures.OrganizationSubscriptions;
|
|
|
|
public class UpgradeOrganizationPlanCommand : IUpgradeOrganizationPlanCommand
|
|
{
|
|
private readonly IOrganizationUserRepository _organizationUserRepository;
|
|
private readonly ICollectionRepository _collectionRepository;
|
|
private readonly IGroupRepository _groupRepository;
|
|
private readonly IPaymentService _paymentService;
|
|
private readonly IPolicyRepository _policyRepository;
|
|
private readonly ISsoConfigRepository _ssoConfigRepository;
|
|
private readonly IReferenceEventService _referenceEventService;
|
|
private readonly IOrganizationConnectionRepository _organizationConnectionRepository;
|
|
private readonly ICurrentContext _currentContext;
|
|
private readonly IServiceAccountRepository _serviceAccountRepository;
|
|
private readonly IOrganizationRepository _organizationRepository;
|
|
private readonly IOrganizationService _organizationService;
|
|
|
|
public UpgradeOrganizationPlanCommand(
|
|
IOrganizationUserRepository organizationUserRepository,
|
|
ICollectionRepository collectionRepository,
|
|
IGroupRepository groupRepository,
|
|
IPaymentService paymentService,
|
|
IPolicyRepository policyRepository,
|
|
ISsoConfigRepository ssoConfigRepository,
|
|
IReferenceEventService referenceEventService,
|
|
IOrganizationConnectionRepository organizationConnectionRepository,
|
|
ICurrentContext currentContext,
|
|
IServiceAccountRepository serviceAccountRepository,
|
|
IOrganizationRepository organizationRepository,
|
|
IOrganizationService organizationService)
|
|
{
|
|
_organizationUserRepository = organizationUserRepository;
|
|
_collectionRepository = collectionRepository;
|
|
_groupRepository = groupRepository;
|
|
_paymentService = paymentService;
|
|
_policyRepository = policyRepository;
|
|
_ssoConfigRepository = ssoConfigRepository;
|
|
_referenceEventService = referenceEventService;
|
|
_organizationConnectionRepository = organizationConnectionRepository;
|
|
_currentContext = currentContext;
|
|
_serviceAccountRepository = serviceAccountRepository;
|
|
_organizationRepository = organizationRepository;
|
|
_organizationService = organizationService;
|
|
}
|
|
|
|
public async Task<Tuple<bool, string>> UpgradePlanAsync(Guid organizationId, OrganizationUpgrade upgrade)
|
|
{
|
|
var organization = await GetOrgById(organizationId);
|
|
if (organization == null)
|
|
{
|
|
throw new NotFoundException();
|
|
}
|
|
|
|
if (string.IsNullOrWhiteSpace(organization.GatewayCustomerId))
|
|
{
|
|
throw new BadRequestException("Your account has no payment method available.");
|
|
}
|
|
|
|
var existingPasswordManagerPlan = StaticStore.PasswordManagerPlans.FirstOrDefault(p => p.Type == organization.PlanType);
|
|
if (existingPasswordManagerPlan == null)
|
|
{
|
|
throw new BadRequestException("Existing plan not found.");
|
|
}
|
|
|
|
var newPasswordManagerPlan =
|
|
StaticStore.PasswordManagerPlans.FirstOrDefault(p => p.Type == upgrade.Plan && !p.Disabled);
|
|
if (newPasswordManagerPlan == null)
|
|
{
|
|
throw new BadRequestException("Plan not found.");
|
|
}
|
|
|
|
if (existingPasswordManagerPlan.Type == newPasswordManagerPlan.Type)
|
|
{
|
|
throw new BadRequestException("Organization is already on this plan.");
|
|
}
|
|
|
|
if (existingPasswordManagerPlan.UpgradeSortOrder >= newPasswordManagerPlan.UpgradeSortOrder)
|
|
{
|
|
throw new BadRequestException("You cannot upgrade to this plan.");
|
|
}
|
|
|
|
if (existingPasswordManagerPlan.Type != PlanType.Free)
|
|
{
|
|
throw new BadRequestException("You can only upgrade from the free plan. Contact support.");
|
|
}
|
|
|
|
_organizationService.ValidatePasswordManagerPlan(newPasswordManagerPlan, upgrade);
|
|
var newSecretsManagerPlan =
|
|
StaticStore.SecretManagerPlans.FirstOrDefault(p => p.Type == upgrade.Plan && !p.Disabled);
|
|
if (upgrade.UseSecretsManager)
|
|
{
|
|
_organizationService.ValidateSecretsManagerPlan(newSecretsManagerPlan, upgrade);
|
|
}
|
|
|
|
var newPasswordManagerPlanSeats = (short)(newPasswordManagerPlan.BaseSeats +
|
|
(newPasswordManagerPlan.HasAdditionalSeatsOption ? upgrade.AdditionalSeats : 0));
|
|
if (!organization.Seats.HasValue || organization.Seats.Value > newPasswordManagerPlanSeats)
|
|
{
|
|
var occupiedSeats =
|
|
await _organizationUserRepository.GetOccupiedSeatCountByOrganizationIdAsync(organization.Id);
|
|
if (occupiedSeats > newPasswordManagerPlanSeats)
|
|
{
|
|
throw new BadRequestException($"Your organization currently has {occupiedSeats} seats filled. " +
|
|
$"Your new plan only has ({newPasswordManagerPlanSeats}) seats. Remove some users.");
|
|
}
|
|
}
|
|
|
|
if (newPasswordManagerPlan.MaxCollections.HasValue && (!organization.MaxCollections.HasValue ||
|
|
organization.MaxCollections.Value >
|
|
newPasswordManagerPlan.MaxCollections.Value))
|
|
{
|
|
var collectionCount = await _collectionRepository.GetCountByOrganizationIdAsync(organization.Id);
|
|
if (collectionCount > newPasswordManagerPlan.MaxCollections.Value)
|
|
{
|
|
throw new BadRequestException($"Your organization currently has {collectionCount} collections. " +
|
|
$"Your new plan allows for a maximum of ({newPasswordManagerPlan.MaxCollections.Value}) collections. " +
|
|
"Remove some collections.");
|
|
}
|
|
}
|
|
|
|
if (!newPasswordManagerPlan.HasGroups && organization.UseGroups)
|
|
{
|
|
var groups = await _groupRepository.GetManyByOrganizationIdAsync(organization.Id);
|
|
if (groups.Any())
|
|
{
|
|
throw new BadRequestException($"Your new plan does not allow the groups feature. " +
|
|
$"Remove your groups.");
|
|
}
|
|
}
|
|
|
|
if (!newPasswordManagerPlan.HasPolicies && organization.UsePolicies)
|
|
{
|
|
var policies = await _policyRepository.GetManyByOrganizationIdAsync(organization.Id);
|
|
if (policies.Any(p => p.Enabled))
|
|
{
|
|
throw new BadRequestException($"Your new plan does not allow the policies feature. " +
|
|
$"Disable your policies.");
|
|
}
|
|
}
|
|
|
|
if (!newPasswordManagerPlan.HasSso && organization.UseSso)
|
|
{
|
|
var ssoConfig = await _ssoConfigRepository.GetByOrganizationIdAsync(organization.Id);
|
|
if (ssoConfig != null && ssoConfig.Enabled)
|
|
{
|
|
throw new BadRequestException($"Your new plan does not allow the SSO feature. " +
|
|
$"Disable your SSO configuration.");
|
|
}
|
|
}
|
|
|
|
if (!newPasswordManagerPlan.HasKeyConnector && organization.UseKeyConnector)
|
|
{
|
|
var ssoConfig = await _ssoConfigRepository.GetByOrganizationIdAsync(organization.Id);
|
|
if (ssoConfig != null && ssoConfig.GetData().MemberDecryptionType == MemberDecryptionType.KeyConnector)
|
|
{
|
|
throw new BadRequestException("Your new plan does not allow the Key Connector feature. " +
|
|
"Disable your Key Connector.");
|
|
}
|
|
}
|
|
|
|
if (!newPasswordManagerPlan.HasResetPassword && organization.UseResetPassword)
|
|
{
|
|
var resetPasswordPolicy =
|
|
await _policyRepository.GetByOrganizationIdTypeAsync(organization.Id, PolicyType.ResetPassword);
|
|
if (resetPasswordPolicy != null && resetPasswordPolicy.Enabled)
|
|
{
|
|
throw new BadRequestException("Your new plan does not allow the Password Reset feature. " +
|
|
"Disable your Password Reset policy.");
|
|
}
|
|
}
|
|
|
|
if (!newPasswordManagerPlan.HasScim && organization.UseScim)
|
|
{
|
|
var scimConnections = await _organizationConnectionRepository.GetByOrganizationIdTypeAsync(organization.Id,
|
|
OrganizationConnectionType.Scim);
|
|
if (scimConnections != null && scimConnections.Any(c => c.GetConfig<ScimConfig>()?.Enabled == true))
|
|
{
|
|
throw new BadRequestException("Your new plan does not allow the SCIM feature. " +
|
|
"Disable your SCIM configuration.");
|
|
}
|
|
}
|
|
|
|
if (!newPasswordManagerPlan.HasCustomPermissions && organization.UseCustomPermissions)
|
|
{
|
|
var organizationCustomUsers =
|
|
await _organizationUserRepository.GetManyByOrganizationAsync(organization.Id,
|
|
OrganizationUserType.Custom);
|
|
if (organizationCustomUsers.Any())
|
|
{
|
|
throw new BadRequestException("Your new plan does not allow the Custom Permissions feature. " +
|
|
"Disable your Custom Permissions configuration.");
|
|
}
|
|
}
|
|
|
|
if (upgrade.UseSecretsManager && newSecretsManagerPlan != null)
|
|
{
|
|
await ValidateSecretsManagerSeatsAndServiceAccountAsync(upgrade, organization, newSecretsManagerPlan);
|
|
}
|
|
|
|
// TODO: Check storage?
|
|
string paymentIntentClientSecret = null;
|
|
var success = true;
|
|
|
|
if (string.IsNullOrWhiteSpace(organization.GatewaySubscriptionId))
|
|
{
|
|
var organizationUpgradePlan = upgrade.UseSecretsManager
|
|
? StaticStore.Plans.Where(p => p.Type == upgrade.Plan).ToList()
|
|
: StaticStore.Plans.Where(p => p.Type == upgrade.Plan && p.BitwardenProduct == BitwardenProductType.PasswordManager).ToList();
|
|
|
|
paymentIntentClientSecret = await _paymentService.UpgradeFreeOrganizationAsync(organization,
|
|
organizationUpgradePlan, upgrade);
|
|
success = string.IsNullOrWhiteSpace(paymentIntentClientSecret);
|
|
}
|
|
else
|
|
{
|
|
// TODO: Update existing sub
|
|
throw new BadRequestException("You can only upgrade from the free plan. Contact support.");
|
|
}
|
|
|
|
organization.BusinessName = upgrade.BusinessName;
|
|
organization.PlanType = newPasswordManagerPlan.Type;
|
|
organization.Seats = (short)(newPasswordManagerPlan.BaseSeats + upgrade.AdditionalSeats);
|
|
organization.MaxCollections = newPasswordManagerPlan.MaxCollections;
|
|
organization.UseGroups = newPasswordManagerPlan.HasGroups;
|
|
organization.UseDirectory = newPasswordManagerPlan.HasDirectory;
|
|
organization.UseEvents = newPasswordManagerPlan.HasEvents;
|
|
organization.UseTotp = newPasswordManagerPlan.HasTotp;
|
|
organization.Use2fa = newPasswordManagerPlan.Has2fa;
|
|
organization.UseApi = newPasswordManagerPlan.HasApi;
|
|
organization.SelfHost = newPasswordManagerPlan.HasSelfHost;
|
|
organization.UsePolicies = newPasswordManagerPlan.HasPolicies;
|
|
organization.MaxStorageGb = !newPasswordManagerPlan.BaseStorageGb.HasValue
|
|
? (short?)null
|
|
: (short)(newPasswordManagerPlan.BaseStorageGb.Value + upgrade.AdditionalStorageGb);
|
|
organization.UseGroups = newPasswordManagerPlan.HasGroups;
|
|
organization.UseDirectory = newPasswordManagerPlan.HasDirectory;
|
|
organization.UseEvents = newPasswordManagerPlan.HasEvents;
|
|
organization.UseTotp = newPasswordManagerPlan.HasTotp;
|
|
organization.Use2fa = newPasswordManagerPlan.Has2fa;
|
|
organization.UseApi = newPasswordManagerPlan.HasApi;
|
|
organization.UseSso = newPasswordManagerPlan.HasSso;
|
|
organization.UseKeyConnector = newPasswordManagerPlan.HasKeyConnector;
|
|
organization.UseScim = newPasswordManagerPlan.HasScim;
|
|
organization.UseResetPassword = newPasswordManagerPlan.HasResetPassword;
|
|
organization.SelfHost = newPasswordManagerPlan.HasSelfHost;
|
|
organization.UsersGetPremium = newPasswordManagerPlan.UsersGetPremium || upgrade.PremiumAccessAddon;
|
|
organization.UseCustomPermissions = newPasswordManagerPlan.HasCustomPermissions;
|
|
organization.Plan = newPasswordManagerPlan.Name;
|
|
organization.Enabled = success;
|
|
organization.PublicKey = upgrade.PublicKey;
|
|
organization.PrivateKey = upgrade.PrivateKey;
|
|
organization.UsePasswordManager = true;
|
|
organization.SmSeats = (short)(newSecretsManagerPlan.BaseSeats + upgrade.AdditionalSmSeats.GetValueOrDefault());
|
|
organization.SmServiceAccounts = newSecretsManagerPlan.BaseServiceAccount + upgrade.AdditionalServiceAccounts.GetValueOrDefault();
|
|
organization.UseSecretsManager = upgrade.UseSecretsManager;
|
|
|
|
await _organizationService.ReplaceAndUpdateCacheAsync(organization);
|
|
|
|
if (success)
|
|
{
|
|
await _referenceEventService.RaiseEventAsync(
|
|
new ReferenceEvent(ReferenceEventType.UpgradePlan, organization, _currentContext)
|
|
{
|
|
PlanName = newPasswordManagerPlan.Name,
|
|
PlanType = newPasswordManagerPlan.Type,
|
|
OldPlanName = existingPasswordManagerPlan.Name,
|
|
OldPlanType = existingPasswordManagerPlan.Type,
|
|
Seats = organization.Seats,
|
|
Storage = organization.MaxStorageGb,
|
|
// TODO: add reference events for SmSeats and Service Accounts - see AC-1481
|
|
});
|
|
}
|
|
|
|
return new Tuple<bool, string>(success, paymentIntentClientSecret);
|
|
}
|
|
|
|
private async Task ValidateSecretsManagerSeatsAndServiceAccountAsync(OrganizationUpgrade upgrade, Organization organization,
|
|
Models.StaticStore.Plan newSecretsManagerPlan)
|
|
{
|
|
var newPlanSmSeats = (short)(newSecretsManagerPlan.BaseSeats +
|
|
(newSecretsManagerPlan.HasAdditionalSeatsOption
|
|
? upgrade.AdditionalSmSeats
|
|
: 0));
|
|
var occupiedSmSeats =
|
|
await _organizationUserRepository.GetOccupiedSmSeatCountByOrganizationIdAsync(organization.Id);
|
|
|
|
if (!organization.SmSeats.HasValue || organization.SmSeats.Value > newPlanSmSeats)
|
|
{
|
|
if (occupiedSmSeats > newPlanSmSeats)
|
|
{
|
|
throw new BadRequestException(
|
|
$"Your organization currently has {occupiedSmSeats} Secrets Manager seats filled. " +
|
|
$"Your new plan only has {newPlanSmSeats} seats. Remove some users or increase your subscription.");
|
|
}
|
|
}
|
|
|
|
var additionalServiceAccounts = newSecretsManagerPlan.HasAdditionalServiceAccountOption
|
|
? upgrade.AdditionalServiceAccounts
|
|
: 0;
|
|
var newPlanServiceAccounts = newSecretsManagerPlan.BaseServiceAccount + additionalServiceAccounts;
|
|
|
|
if (!organization.SmServiceAccounts.HasValue || organization.SmServiceAccounts.Value > newPlanServiceAccounts)
|
|
{
|
|
var currentServiceAccounts =
|
|
await _serviceAccountRepository.GetServiceAccountCountByOrganizationIdAsync(organization.Id);
|
|
if (currentServiceAccounts > newPlanServiceAccounts)
|
|
{
|
|
throw new BadRequestException(
|
|
$"Your organization currently has {currentServiceAccounts} service accounts. " +
|
|
$"Your new plan only allows {newSecretsManagerPlan.MaxServiceAccounts} service accounts. " +
|
|
"Remove some service accounts or increase your subscription.");
|
|
}
|
|
}
|
|
}
|
|
|
|
private async Task<Organization> GetOrgById(Guid id)
|
|
{
|
|
return await _organizationRepository.GetByIdAsync(id);
|
|
}
|
|
}
|