mirror of
https://github.com/bitwarden/server.git
synced 2025-04-04 20:50:21 -05:00

* Implement userkey rotation v2 * Update request models * Cleanup * Update tests * Improve test * Add tests * Fix formatting * Fix test * Remove whitespace * Fix namespace * Enable nullable on models * Fix build * Add tests and enable nullable on masterpasswordunlockdatamodel * Fix test * Remove rollback * Add tests * Make masterpassword hint optional * Update user query * Add EF test * Improve test * Cleanup * Set masterpassword hint * Remove connection close * Add tests for invalid kdf types * Update test/Core.Test/KeyManagement/UserKey/RotateUserAccountKeysCommandTests.cs Co-authored-by: Thomas Avery <43214426+Thomas-Avery@users.noreply.github.com> * Fix formatting * Update src/Api/KeyManagement/Models/Requests/RotateAccountKeysAndDataRequestModel.cs Co-authored-by: Thomas Avery <43214426+Thomas-Avery@users.noreply.github.com> * Update src/Api/Auth/Models/Request/Accounts/MasterPasswordUnlockDataModel.cs Co-authored-by: Thomas Avery <43214426+Thomas-Avery@users.noreply.github.com> * Update src/Api/Auth/Models/Request/Accounts/MasterPasswordUnlockDataModel.cs Co-authored-by: Thomas Avery <43214426+Thomas-Avery@users.noreply.github.com> * Update src/Api/KeyManagement/Models/Requests/AccountKeysRequestModel.cs Co-authored-by: Thomas Avery <43214426+Thomas-Avery@users.noreply.github.com> * Fix imports * Fix tests * Add poc for tde rotation * Improve rotation transaction safety * Add validator tests * Clean up validator * Add newline * Add devicekey unlock data to integration test * Fix tests * Fix tests * Remove null check * Remove null check * Fix IsTrusted returning wrong result * Add rollback * Cleanup * Address feedback * Further renames --------- Co-authored-by: Thomas Avery <43214426+Thomas-Avery@users.noreply.github.com>
274 lines
8.9 KiB
C#
274 lines
8.9 KiB
C#
using System.ComponentModel.DataAnnotations;
|
|
using Bit.Api.Auth.Models.Request;
|
|
using Bit.Api.Models.Request;
|
|
using Bit.Api.Models.Response;
|
|
using Bit.Core.Auth.Models.Api.Request;
|
|
using Bit.Core.Auth.Models.Api.Response;
|
|
using Bit.Core.Context;
|
|
using Bit.Core.Exceptions;
|
|
using Bit.Core.Repositories;
|
|
using Bit.Core.Services;
|
|
using Bit.Core.Utilities;
|
|
using Microsoft.AspNetCore.Authorization;
|
|
using Microsoft.AspNetCore.Mvc;
|
|
|
|
namespace Bit.Api.Controllers;
|
|
|
|
[Route("devices")]
|
|
[Authorize("Application")]
|
|
public class DevicesController : Controller
|
|
{
|
|
private readonly IDeviceRepository _deviceRepository;
|
|
private readonly IDeviceService _deviceService;
|
|
private readonly IUserService _userService;
|
|
private readonly IUserRepository _userRepository;
|
|
private readonly ICurrentContext _currentContext;
|
|
private readonly ILogger<DevicesController> _logger;
|
|
|
|
public DevicesController(
|
|
IDeviceRepository deviceRepository,
|
|
IDeviceService deviceService,
|
|
IUserService userService,
|
|
IUserRepository userRepository,
|
|
ICurrentContext currentContext,
|
|
ILogger<DevicesController> logger)
|
|
{
|
|
_deviceRepository = deviceRepository;
|
|
_deviceService = deviceService;
|
|
_userService = userService;
|
|
_userRepository = userRepository;
|
|
_currentContext = currentContext;
|
|
_logger = logger;
|
|
}
|
|
|
|
[HttpGet("{id}")]
|
|
public async Task<DeviceResponseModel> Get(string id)
|
|
{
|
|
var device = await _deviceRepository.GetByIdAsync(new Guid(id), _userService.GetProperUserId(User).Value);
|
|
if (device == null)
|
|
{
|
|
throw new NotFoundException();
|
|
}
|
|
|
|
var response = new DeviceResponseModel(device);
|
|
return response;
|
|
}
|
|
|
|
[HttpGet("identifier/{identifier}")]
|
|
public async Task<DeviceResponseModel> GetByIdentifier(string identifier)
|
|
{
|
|
var device = await _deviceRepository.GetByIdentifierAsync(identifier, _userService.GetProperUserId(User).Value);
|
|
if (device == null)
|
|
{
|
|
throw new NotFoundException();
|
|
}
|
|
|
|
var response = new DeviceResponseModel(device);
|
|
return response;
|
|
}
|
|
|
|
[HttpGet("")]
|
|
public async Task<ListResponseModel<DeviceAuthRequestResponseModel>> Get()
|
|
{
|
|
var devicesWithPendingAuthData = await _deviceRepository.GetManyByUserIdWithDeviceAuth(_userService.GetProperUserId(User).Value);
|
|
|
|
// Convert from DeviceAuthDetails to DeviceAuthRequestResponseModel
|
|
var deviceAuthRequestResponseList = devicesWithPendingAuthData
|
|
.Select(DeviceAuthRequestResponseModel.From)
|
|
.ToList();
|
|
|
|
var response = new ListResponseModel<DeviceAuthRequestResponseModel>(deviceAuthRequestResponseList);
|
|
return response;
|
|
}
|
|
|
|
[HttpPost("")]
|
|
public async Task<DeviceResponseModel> Post([FromBody] DeviceRequestModel model)
|
|
{
|
|
var device = model.ToDevice(_userService.GetProperUserId(User));
|
|
await _deviceService.SaveAsync(device);
|
|
|
|
var response = new DeviceResponseModel(device);
|
|
return response;
|
|
}
|
|
|
|
[HttpPut("{id}")]
|
|
[HttpPost("{id}")]
|
|
public async Task<DeviceResponseModel> Put(string id, [FromBody] DeviceRequestModel model)
|
|
{
|
|
var device = await _deviceRepository.GetByIdAsync(new Guid(id), _userService.GetProperUserId(User).Value);
|
|
if (device == null)
|
|
{
|
|
throw new NotFoundException();
|
|
}
|
|
|
|
await _deviceService.SaveAsync(model.ToDevice(device));
|
|
|
|
var response = new DeviceResponseModel(device);
|
|
return response;
|
|
}
|
|
|
|
[HttpPut("{identifier}/keys")]
|
|
[HttpPost("{identifier}/keys")]
|
|
public async Task<DeviceResponseModel> PutKeys(string identifier, [FromBody] DeviceKeysRequestModel model)
|
|
{
|
|
var device = await _deviceRepository.GetByIdentifierAsync(identifier, _userService.GetProperUserId(User).Value);
|
|
if (device == null)
|
|
{
|
|
throw new NotFoundException();
|
|
}
|
|
|
|
await _deviceService.SaveAsync(model.ToDevice(device));
|
|
|
|
var response = new DeviceResponseModel(device);
|
|
return response;
|
|
}
|
|
|
|
[HttpPost("{identifier}/retrieve-keys")]
|
|
public async Task<ProtectedDeviceResponseModel> GetDeviceKeys(string identifier)
|
|
{
|
|
var user = await _userService.GetUserByPrincipalAsync(User);
|
|
|
|
if (user == null)
|
|
{
|
|
throw new UnauthorizedAccessException();
|
|
}
|
|
|
|
var device = await _deviceRepository.GetByIdentifierAsync(identifier, user.Id);
|
|
if (device == null)
|
|
{
|
|
throw new NotFoundException();
|
|
}
|
|
|
|
return new ProtectedDeviceResponseModel(device);
|
|
}
|
|
|
|
[HttpPost("update-trust")]
|
|
public async Task PostUpdateTrust([FromBody] UpdateDevicesTrustRequestModel model)
|
|
{
|
|
var user = await _userService.GetUserByPrincipalAsync(User);
|
|
|
|
if (user == null)
|
|
{
|
|
throw new UnauthorizedAccessException();
|
|
}
|
|
|
|
if (!await _userService.VerifySecretAsync(user, model.Secret))
|
|
{
|
|
await Task.Delay(2000);
|
|
throw new BadRequestException(string.Empty, "User verification failed.");
|
|
}
|
|
|
|
await _deviceService.UpdateDevicesTrustAsync(
|
|
_currentContext.DeviceIdentifier,
|
|
user.Id,
|
|
model.CurrentDevice,
|
|
model.OtherDevices ?? Enumerable.Empty<OtherDeviceKeysUpdateRequestModel>());
|
|
}
|
|
|
|
[HttpPut("identifier/{identifier}/token")]
|
|
[HttpPost("identifier/{identifier}/token")]
|
|
public async Task PutToken(string identifier, [FromBody] DeviceTokenRequestModel model)
|
|
{
|
|
var device = await _deviceRepository.GetByIdentifierAsync(identifier, _userService.GetProperUserId(User).Value);
|
|
if (device == null)
|
|
{
|
|
throw new NotFoundException();
|
|
}
|
|
|
|
await _deviceService.SaveAsync(model.ToDevice(device));
|
|
}
|
|
|
|
[HttpPut("identifier/{identifier}/web-push-auth")]
|
|
[HttpPost("identifier/{identifier}/web-push-auth")]
|
|
public async Task PutWebPushAuth(string identifier, [FromBody] WebPushAuthRequestModel model)
|
|
{
|
|
var device = await _deviceRepository.GetByIdentifierAsync(identifier, _userService.GetProperUserId(User).Value);
|
|
if (device == null)
|
|
{
|
|
throw new NotFoundException();
|
|
}
|
|
|
|
await _deviceService.SaveAsync(model.ToData(), device);
|
|
}
|
|
|
|
[AllowAnonymous]
|
|
[HttpPut("identifier/{identifier}/clear-token")]
|
|
[HttpPost("identifier/{identifier}/clear-token")]
|
|
public async Task PutClearToken(string identifier)
|
|
{
|
|
var device = await _deviceRepository.GetByIdentifierAsync(identifier);
|
|
if (device == null)
|
|
{
|
|
throw new NotFoundException();
|
|
}
|
|
|
|
await _deviceService.ClearTokenAsync(device);
|
|
}
|
|
|
|
[HttpDelete("{id}")]
|
|
[HttpPost("{id}/deactivate")]
|
|
public async Task Deactivate(string id)
|
|
{
|
|
var device = await _deviceRepository.GetByIdAsync(new Guid(id), _userService.GetProperUserId(User).Value);
|
|
if (device == null)
|
|
{
|
|
throw new NotFoundException();
|
|
}
|
|
|
|
await _deviceService.DeactivateAsync(device);
|
|
}
|
|
|
|
[AllowAnonymous]
|
|
[HttpGet("knowndevice")]
|
|
public async Task<bool> GetByIdentifierQuery(
|
|
[Required][FromHeader(Name = "X-Request-Email")] string Email,
|
|
[Required][FromHeader(Name = "X-Device-Identifier")] string DeviceIdentifier)
|
|
=> await GetByIdentifier(CoreHelpers.Base64UrlDecodeString(Email), DeviceIdentifier);
|
|
|
|
[Obsolete("Path is deprecated due to encoding issues, use /knowndevice instead.")]
|
|
[AllowAnonymous]
|
|
[HttpGet("knowndevice/{email}/{identifier}")]
|
|
public async Task<bool> GetByIdentifier(string email, string identifier)
|
|
{
|
|
if (string.IsNullOrWhiteSpace(email) || string.IsNullOrWhiteSpace(identifier))
|
|
{
|
|
throw new BadRequestException("Please provide an email and device identifier");
|
|
}
|
|
|
|
var user = await _userRepository.GetByEmailAsync(email);
|
|
if (user == null)
|
|
{
|
|
return false;
|
|
}
|
|
|
|
var device = await _deviceRepository.GetByIdentifierAsync(identifier, user.Id);
|
|
return device != null;
|
|
}
|
|
|
|
[HttpPost("lost-trust")]
|
|
public void PostLostTrust()
|
|
{
|
|
var userId = _currentContext.UserId.GetValueOrDefault();
|
|
if (userId == default)
|
|
{
|
|
throw new UnauthorizedAccessException();
|
|
}
|
|
|
|
var deviceId = _currentContext.DeviceIdentifier;
|
|
if (deviceId == null)
|
|
{
|
|
throw new BadRequestException("Please provide a device identifier");
|
|
}
|
|
|
|
var deviceType = _currentContext.DeviceType;
|
|
if (deviceType == null)
|
|
{
|
|
throw new BadRequestException("Please provide a device type");
|
|
}
|
|
|
|
_logger.LogError("User {id} has a device key, but didn't receive decryption keys for device {device} of type {deviceType}", userId,
|
|
deviceId, deviceType);
|
|
}
|
|
|
|
}
|