mirror of
https://github.com/bitwarden/server.git
synced 2025-07-02 16:42:50 -05:00

* [AC-1117] Add manage permission (#3126) * Update sql files to add Manage permission * Add migration script * Rename collection manage migration file to remove duplicate migration date * Migrations * Add manage to models * Add manage to repository * Add constraint to Manage columns * Migration lint fixes * Add manage to OrganizationUserUserDetails_ReadWithCollectionsById * Add missing manage fields * Add 'Manage' to UserCollectionDetails * Use CREATE OR ALTER where possible * [AC-1374] Limit collection creation/deletion to Owner/Admin (#3145) * feat: update org table with new column, write migration, refs AC-1374 * feat: update views with new column, refs AC-1374 * feat: Alter sprocs (org create/update) to include new column, refs AC-1374 * feat: update entity/data/request/response models to handle new column, refs AC-1374 * feat: update necessary Provider related views during migration, refs AC-1374 * fix: update org create to default new column to false, refs AC-1374 * feat: added new API/request model for collection management and removed property from update request model, refs AC-1374 * fix: renamed migration script to be after secrets manage beta column changes, refs AC-1374 * fix: dotnet format, refs AC-1374 * feat: add ef migrations to reflect mssql changes, refs AC-1374 * fix: dotnet format, refs AC-1374 * feat: update API signature to accept Guid and explain Cd verbiage, refs AC-1374 * fix: merge conflict resolution * [AC-1174] CollectionUser and CollectionGroup authorization handlers (#3194) * [AC-1174] Introduce BulkAuthorizationHandler.cs * [AC-1174] Introduce CollectionUserAuthorizationHandler * [AC-1174] Add CreateForNewCollection CollectionUser requirement * [AC-1174] Add some more details to CollectionCustomization * [AC-1174] Formatting * [AC-1174] Add CollectionGroupOperation.cs * [AC-1174] Introduce CollectionGroupAuthorizationHandler.cs * [AC-1174] Cleanup CollectionFixture customization Implement and use re-usable extension method to support seeded Guids * [AC-1174] Introduce WithValueFromList AutoFixtureExtensions Modify CollectionCustomization to use multiple organization Ids for auto generated test data * [AC-1174] Simplify CollectionUserAuthorizationHandler.cs Modify the authorization handler to only perform authorization logic. Validation logic will need to be handled by any calling commands/controllers instead. * [AC-1174] Introduce shared CollectionAccessAuthorizationHandlerBase A shared base authorization handler was created for both CollectionUser and CollectionGroup resources, as they share the same underlying management authorization logic. * [AC-1174] Update CollectionUserAuthorizationHandler and CollectionGroupAuthorizationHandler to use the new CollectionAccessAuthorizationHandlerBase class * [AC-1174] Formatting * [AC-1174] Cleanup typo and redundant ToList() call * [AC-1174] Add check for provider users * [AC-1174] Reduce nested loops * [AC-1174] Introduce ICollectionAccess.cs * [AC-1174] Remove individual CollectionGroup and CollectionUser auth handlers and use base class instead * [AC-1174] Tweak unit test to fail minimally * [AC-1174] Reorganize authorization handlers in Core project * [AC-1174] Introduce new AddCoreAuthorizationHandlers() extension method * [AC-1174] Move CollectionAccessAuthorizationHandler into Api project * [AC-1174] Move CollectionFixture to Vault folder * [AC-1174] Rename operation to CreateUpdateDelete * [AC-1174] Require single organization for collection access authorization handler - Add requirement that all target collections must belong to the same organization - Simplify logic related to multiple organizations - Update tests and helpers - Use ToHashSet to improve lookup time * [AC-1174] Fix null reference exception * [AC-1174] Throw bad request exception when collections belong to different organizations * [AC-1174] Switch to CollectionAuthorizationHandler instead of CollectionAccessAuthorizationHandler to reduce complexity * Fix improper merge conflict resolution * fix: add permission check for collection management api, refs AC-1647 (#3252) * [AC-1125] Enforce org setting for creating/deleting collections (#3241) * [AC-1117] Add manage permission (#3126) * Update sql files to add Manage permission * Add migration script * Rename collection manage migration file to remove duplicate migration date * Migrations * Add manage to models * Add manage to repository * Add constraint to Manage columns * Migration lint fixes * Add manage to OrganizationUserUserDetails_ReadWithCollectionsById * Add missing manage fields * Add 'Manage' to UserCollectionDetails * Use CREATE OR ALTER where possible * [AC-1374] Limit collection creation/deletion to Owner/Admin (#3145) * feat: update org table with new column, write migration, refs AC-1374 * feat: update views with new column, refs AC-1374 * feat: Alter sprocs (org create/update) to include new column, refs AC-1374 * feat: update entity/data/request/response models to handle new column, refs AC-1374 * feat: update necessary Provider related views during migration, refs AC-1374 * fix: update org create to default new column to false, refs AC-1374 * feat: added new API/request model for collection management and removed property from update request model, refs AC-1374 * fix: renamed migration script to be after secrets manage beta column changes, refs AC-1374 * fix: dotnet format, refs AC-1374 * feat: add ef migrations to reflect mssql changes, refs AC-1374 * fix: dotnet format, refs AC-1374 * feat: update API signature to accept Guid and explain Cd verbiage, refs AC-1374 * feat: created collection auth handler/operations, added LimitCollectionCdOwnerAdmin to CurrentContentOrganization, refs AC-1125 * feat: create vault service collection extensions and register with base services, refs AC-1125 * feat: deprecated CurrentContext.CreateNewCollections, refs AC-1125 * feat: deprecate DeleteAnyCollection for single resource usages, refs AC-1125 * feat: move service registration to api, update references, refs AC-1125 * feat: add bulk delete authorization handler, refs AC-1125 * feat: always assign user and give manage access on create, refs AC-1125 * fix: updated CurrentContextOrganization type, refs AC-1125 * feat: combined existing collection authorization handlers/operations, refs AC-1125 * fix: OrganizationServiceTests -> CurrentContentOrganization typo, refs AC-1125 * fix: format, refs AC-1125 * fix: update collection controller tests, refs AC-1125 * fix: dotnet format, refs AC-1125 * feat: removed extra BulkAuthorizationHandler, refs AC-1125 * fix: dotnet format, refs AC-1125 * fix: change string to guid for org id, update bulk delete request model, refs AC-1125 * fix: remove delete many collection check, refs AC-1125 * fix: clean up collection auth handler, refs AC-1125 * fix: format fix for CollectionOperations, refs AC-1125 * fix: removed unnecessary owner check, add org null check to custom permission validation, refs AC-1125 * fix: remove unused methods in CurrentContext, refs AC-1125 * fix: removed obsolete test, fixed failling delete many test, refs AC-1125 * fix: CollectionAuthorizationHandlerTests fixes, refs AC-1125 * fix: OrganizationServiceTests fix broken test by mocking GetOrganization, refs AC-1125 * fix: CollectionAuthorizationHandler - remove unused repository, refs AC-1125 * feat: moved UserId null check to common method, refs AC-1125 * fix: updated auth handler tests to remove dependency on requirement for common code checks, refs AC-1125 * feat: updated conditionals/comments for create/delete methods within colleciton auth handler, refs AC-1125 * feat: added create/delete collection auth handler success methods, refs AC-1125 * fix: new up permissions to prevent excessive null checks, refs AC-1125 * fix: remove old reference to CreateNewCollections, refs AC-1125 * fix: typo within ViewAssignedCollections method, refs AC-1125 --------- Co-authored-by: Robyn MacCallum <robyntmaccallum@gmail.com> * refactor: remove organizationId from CollectionBulkDeleteRequestModel, refs AC-1649 (#3282) * [AC-1174] Bulk Collection Management (#3229) * [AC-1174] Update SelectionReadOnlyRequestModel to use Guid for Id property * [AC-1174] Introduce initial bulk-access collection endpoint * [AC-1174] Introduce BulkAddCollectionAccessCommand and validation logic/tests * [AC-1174] Add CreateOrUpdateAccessMany method to CollectionRepository * [AC-1174] Add event logs for bulk add collection access command * [AC-1174] Add User_BumpAccountRevisionDateByCollectionIds and database migration script * [AC-1174] Implement EF repository method * [AC-1174] Improve null checks * [AC-1174] Remove unnecessary BulkCollectionAccessRequestModel helpers * [AC-1174] Add unit tests for new controller endpoint * [AC-1174] Fix formatting * [AC-1174] Remove comment * [AC-1174] Remove redundant organizationId parameter * [AC-1174] Ensure user and group Ids are distinct * [AC-1174] Cleanup tests based on PR feedback * [AC-1174] Formatting * [AC-1174] Update CollectionGroup alias in the sproc * [AC-1174] Add some additional comments to SQL sproc * [AC-1174] Add comment explaining additional SaveChangesAsync call --------- Co-authored-by: Thomas Rittson <trittson@bitwarden.com> * [AC-1646] Rename LimitCollectionCdOwnerAdmin column (#3300) * Rename LimitCollectionCdOwnerAdmin -> LimitCollectionCreationDeletion * Rename and bump migration script * [AC-1666] Removed EditAnyCollection from Create/Delete permission checks (#3301) * fix: remove EditAnyCollection from Create/Delete permission check, refs AC-1666 * fix: updated comment, refs AC-1666 * Add feature flags constants and flag new route * Update feature flag keys * Create LegacyCollectionsAuthorizationHandler and start to re-implement old logic * [AC-1669] Bug - Remove obsolete assignUserId from CollectionService.SaveAsync(...) (#3312) * fix: remove AssignUserId from CollectionService.SaveAsync, refs AC-1669 * fix: add manage access conditional before creating collection, refs AC-1669 * fix: move access logic for create/update, fix all tests, refs AC-1669 * fix: add CollectionAccessSelection fixture, update tests, update bad reqeuest message, refs AC-1669 * fix: format, refs AC-1669 * fix: update null params with specific arg.is null checks, refs Ac-1669 * fix: update attribute class name, refs AC-1669 * Revert "Create LegacyCollectionsAuthorizationHandler and start to re-implement old logic" This reverts commitfbb19cdadd
. * Restore old logic behind flags * Add missing flags * Fix logic, add comment * Fix tests * Add EnableFeatureFlag extension method for tests * Restore legacy tests * Add FeatureServiceFixtures to set feature flags in test * Remove unused method * Fix formatting * Set feature flag to ON for auth handler tests * Use fixture instead of calling nsubstitute directly * Change FlexibleCollectionsIsEnabled method to property Co-authored-by: Rui Tomé <108268980+r-tome@users.noreply.github.com> * Finish changing to property * [AC-1139] Marked as obsolete the methods EditAssignedCollections, DeleteAssignedCollections and ViewAssignedCollections on ICurrentContext * [AC-1139] Disabled the ability to set the custom permissions 'Delete/Edit Assigned Collections' if flexible collections feature flag is enabled * [AC-1713] [Flexible collections] Add feature flags to server (#3334) * Add feature flags for FlexibleCollections and BulkCollectionAccess * Flag new routes and behaviour --------- Co-authored-by: Rui Tomé <108268980+r-tome@users.noreply.github.com> * [AC-1748] Updated CurrentContext EditAssignedCollections, DeleteAssignedCollections, ViewAssignedCollections to check for flexible collections feature flag * [AC-1748] Created GroupAuthorizationHandler and modified GroupsController.Get to use it if flexible collections feature flag is enabled * [AC-1748] Created OrganizationUserAuthorizationHandler and modified OrganizationUsersController.Get to use that if flexible collections feature flag is enabled * [AC-1748] Reverted changes on OrganizationService * [AC-1748] Removed GroupAuthorizationHandler * [AC-1748] Set resource as null when reading OrganizationUserUserDetailsResponseModel list * [AC-1139] Updated CollectionsController GetManyWithDetails and Get to check for flexible collections flag * [AC-1139] Modified CollectionsController.Get to check access before getting collections * [AC-1139] Updated CollectionsController to use CollectionAuthorizationHandler in all endpoints if flag is enabled * [AC-1139] Lining up collection access data with Manage = true if feature flag is off * Add joint codeownership for auth handlers (#3346) * [AC-1139] Separated flexible collections logic from old logic in CollectionsController; Refactored CollectionAuthorizationHandler * [AC-1139] Fixed formatting on OrganizationUsersController; renamed OrganizationUserOperations.Read to ReadAll * [AC-1748] Fixed logic to set manage = true for collections if user has EditAssignedCollection permission * [AC-1717] Update default values for LimitCollectionCreationDeletion (#3365) * Change default value in organization create sproc to 1 * Drop old column name still present in some QA instances * Set LimitCollectionCreationDeletion value in code based on feature flag * Fix: add missing namespace after merging in master * Fix: add missing namespace after merging in master * [AC-1683] Fix DB migrations for new Manage permission (#3307) * [AC-1683] Update migration script and introduce V2 procedures and types * [AC-1683] Update repository calls to use new V2 procedures / types * [AC-1684] Update bulk add collection migration script to use new V2 type * [AC-1683] Undo Manage changes to more original procedures * [AC-1683] Restore whitespace changes * [AC-1683] Clarify comments regarding explicit column lists * [AC-1683] Update migration script dates * [AC-1683] Split the migration script for readability * [AC-1683] Re-name SelectReadOnlyArray_V2 to CollectionAccessSelectionType * [AC-1139] Added permission checks for GroupsController.Get if FC feature flag is enabled * [AC-1139] Added an AuthorizationHandler for Collections and renamed existing to BulkCollectionAuthorizationHandler * [AC-1648] [Flexible Collections] Bump migration scripts before feature branch merge (#3371) * Bump dates on sql migration scripts * Bump date on ef migrations * [AC-1139] Renamed existing CollectionAuthorizationHandler to BulkCollectionAuthorizationHandler for collections and created CollectionAuthorizationHandler for single item access. Fixed unit tests and created more * [AC-1139] Fixed Provider AuthorizationHandler logic for Groups and OrganizationUsers * [AC-1139] Fixed CollectionAuthorizationHandler unit tests * [AC-1139] Added unit tests for GroupAuthorizationHandler and OrganizationUserAuthorizationHandler * [AC-1139] Added unit test to test setting users with EditAssignedCollections with Manage permission when saving a collection * [AC-1139] Added unit tests for OrganizationService InviteUser and SaveUser with EditAssignedCollections = true * [AC-1139] Reverted changes on OrganizationService * [AC-1139] Marked obsolete Permissions EditAssignedCollections and DeleteAssignedCollections * [AC-1139] Renamed FlexibleCollectionsIsEnabled properties to UseFlexibleCollections * [AC-1139] Renamed new flexible collections controller methods to have 'vNext' in the name to indicate its a new version * [AC-1139] Created AuthorizationServiceExtensions to have an extension method for AuthorizeAsync where the resource is null * [AC-1139] Renamed CollectionsController method to delete collection users from 'Delete' to 'DeleteUser' * [AC-1139] Refactored BulkCollectionAuthorizationHandler.CheckCollectionPermissionsAsync * [AC-1139] Created new CollectionOperation ReadAccess and changed GetUsers_vNext to use it * [AC-1139] Created new CollectionOperationRequirement ReadAllWithAccess * [AC-1139] Addressing PR suggestions * [AC-1139] Unit tests refactors and added tests * [AC-1139] Updated BulkCollectionAuthorizationHandler to not fail if the resource list is null or empty. * [AC-1139] Modified authorization handlers to not fail in case the resource is null * [AC-1139] Reverted changes made to CollectionService and OrganizationService * [AC-1139] Reverted changes to CollectionServiceTests and OrganizationServiceTests * [AC-1126] Deprecated ICurrentContext.OrganizationManager and Reject any attempt to assign the Manager role to an existing user or via invite * [AC-1126] Reverted change on ignoring Manager claims; modified CurrentContext.OrganizationManager to throw exception when feature flag is enabled * [AC-1139] Fixed OrganizationUser.ReadAll permissions * [AC-1139] Fixed Groups ReadAll permissions * [AC-1139] Fixed unit tests * [AC-1139] Removed unnecessary permission from GroupAuthorizationHandler * [AC-1139] Rewrote GroupAuthorizationHandler to be similar to other AuthHandlers; Revisited unit tests * [AC-1139] Rewrote OrganizationUserAuthorizationHandler to be similar to other AuthHandlers; Revisited unit tests * [AC-1139] Changed CollectionsController.Get_vNext method to use CollectionRepository.GetByIdAsync without userId * [AC-1139] Changed GroupAuthorizationHandler and OrganizationUserAuthorizationHandler to fail if no OrganizationId is passed as a parameter * [AC-1139] Rewrote CollectionAuthorizationHandler to be similar to other AuthHandlers; Revisited unit tests * [AC-1139] Resolved conflict when resolving operations between CollectionOperations and BulkCollectionOperations * [AC-1139] Created BulkCollectionOperations.ReadWithAccess * [AC-1139] Removed unnecessary permissions object creation on unit tests * [AC-1139] Refactored unit test * [AC-1139] Renamed UseFlexibleCollections variables to FlexibleCollectionsIsEnabled * [AC-1139] Added missing read permission check * [AC-1139] Added CollectionOperation ReadManyWithDetails * [AC-1139] Removed unnecessary operation * [AC-1139] Throwing NotFoundException on GetManyWithDetails_vNext if user does not have read permissions * Revert "[AC-1139] Removed unnecessary permissions object creation on unit tests" This reverts commitb20d75b232
. * [AC-1139] Refined permissions for BulkCollectionOperations.Read * [AC-1139] Revised BulkCollectionAuthorizationHandler permissions for Read and ReadWithAccess * [AC-1139] Removed duplicate IOrganizationUserRepository * [AC-1139] Added ManageGroups permission access for CollectionOperations.ReadAll * [AC-1139] Added ManageUsers permission access for CollectionOperations.ReadAllWithAccess * [AC-1139] Filter returned collections by manage permission * [AC-1139] Refactor Read authorization checks in BulkCollectionAuthorizationHandler to no longer check for the `LimitCollectionCreationDeletion` property * [AC-1126] Rename property name for better readability * Update src/Core/AdminConsole/Services/Implementations/OrganizationService.cs Co-authored-by: Thomas Rittson <31796059+eliykat@users.noreply.github.com> * [AC-1126] Fixed manager check --------- Co-authored-by: Robyn MacCallum <robyntmaccallum@gmail.com> Co-authored-by: Vincent Salucci <26154748+vincentsalucci@users.noreply.github.com> Co-authored-by: Vincent Salucci <vincesalucci21@gmail.com> Co-authored-by: Shane Melton <smelton@bitwarden.com> Co-authored-by: Thomas Rittson <trittson@bitwarden.com> Co-authored-by: Thomas Rittson <31796059+eliykat@users.noreply.github.com>
605 lines
21 KiB
C#
605 lines
21 KiB
C#
using System.Security.Claims;
|
|
using Bit.Core.AdminConsole.Context;
|
|
using Bit.Core.AdminConsole.Enums.Provider;
|
|
using Bit.Core.AdminConsole.Models.Data.Provider;
|
|
using Bit.Core.AdminConsole.Repositories;
|
|
using Bit.Core.Entities;
|
|
using Bit.Core.Enums;
|
|
using Bit.Core.Exceptions;
|
|
using Bit.Core.Identity;
|
|
using Bit.Core.Models.Data;
|
|
using Bit.Core.Repositories;
|
|
using Bit.Core.Services;
|
|
using Bit.Core.Settings;
|
|
using Bit.Core.Utilities;
|
|
using Microsoft.AspNetCore.Http;
|
|
|
|
namespace Bit.Core.Context;
|
|
|
|
public class CurrentContext : ICurrentContext
|
|
{
|
|
private readonly IProviderOrganizationRepository _providerOrganizationRepository;
|
|
private readonly IProviderUserRepository _providerUserRepository;
|
|
private readonly IFeatureService _featureService;
|
|
private bool _builtHttpContext;
|
|
private bool _builtClaimsPrincipal;
|
|
private IEnumerable<ProviderOrganizationProviderDetails> _providerOrganizationProviderDetails;
|
|
private IEnumerable<ProviderUserOrganizationDetails> _providerUserOrganizations;
|
|
|
|
private bool FlexibleCollectionsIsEnabled => _featureService.IsEnabled(FeatureFlagKeys.FlexibleCollections, this);
|
|
|
|
public virtual HttpContext HttpContext { get; set; }
|
|
public virtual Guid? UserId { get; set; }
|
|
public virtual User User { get; set; }
|
|
public virtual string DeviceIdentifier { get; set; }
|
|
public virtual DeviceType? DeviceType { get; set; }
|
|
public virtual string IpAddress { get; set; }
|
|
public virtual List<CurrentContextOrganization> Organizations { get; set; }
|
|
public virtual List<CurrentContextProvider> Providers { get; set; }
|
|
public virtual Guid? InstallationId { get; set; }
|
|
public virtual Guid? OrganizationId { get; set; }
|
|
public virtual bool CloudflareWorkerProxied { get; set; }
|
|
public virtual bool IsBot { get; set; }
|
|
public virtual bool MaybeBot { get; set; }
|
|
public virtual int? BotScore { get; set; }
|
|
public virtual string ClientId { get; set; }
|
|
public virtual Version ClientVersion { get; set; }
|
|
public virtual ClientType ClientType { get; set; }
|
|
public virtual Guid? ServiceAccountOrganizationId { get; set; }
|
|
|
|
public CurrentContext(
|
|
IProviderOrganizationRepository providerOrganizationRepository,
|
|
IProviderUserRepository providerUserRepository,
|
|
IFeatureService featureService)
|
|
{
|
|
_providerOrganizationRepository = providerOrganizationRepository;
|
|
_providerUserRepository = providerUserRepository;
|
|
_featureService = featureService;
|
|
}
|
|
|
|
public async virtual Task BuildAsync(HttpContext httpContext, GlobalSettings globalSettings)
|
|
{
|
|
if (_builtHttpContext)
|
|
{
|
|
return;
|
|
}
|
|
|
|
_builtHttpContext = true;
|
|
HttpContext = httpContext;
|
|
await BuildAsync(httpContext.User, globalSettings);
|
|
|
|
if (DeviceIdentifier == null && httpContext.Request.Headers.ContainsKey("Device-Identifier"))
|
|
{
|
|
DeviceIdentifier = httpContext.Request.Headers["Device-Identifier"];
|
|
}
|
|
|
|
if (httpContext.Request.Headers.ContainsKey("Device-Type") &&
|
|
Enum.TryParse(httpContext.Request.Headers["Device-Type"].ToString(), out DeviceType dType))
|
|
{
|
|
DeviceType = dType;
|
|
}
|
|
|
|
if (!BotScore.HasValue && httpContext.Request.Headers.ContainsKey("X-Cf-Bot-Score") &&
|
|
int.TryParse(httpContext.Request.Headers["X-Cf-Bot-Score"], out var parsedBotScore))
|
|
{
|
|
BotScore = parsedBotScore;
|
|
}
|
|
|
|
if (httpContext.Request.Headers.ContainsKey("X-Cf-Worked-Proxied"))
|
|
{
|
|
CloudflareWorkerProxied = httpContext.Request.Headers["X-Cf-Worked-Proxied"] == "1";
|
|
}
|
|
|
|
if (httpContext.Request.Headers.ContainsKey("X-Cf-Is-Bot"))
|
|
{
|
|
IsBot = httpContext.Request.Headers["X-Cf-Is-Bot"] == "1";
|
|
}
|
|
|
|
if (httpContext.Request.Headers.ContainsKey("X-Cf-Maybe-Bot"))
|
|
{
|
|
MaybeBot = httpContext.Request.Headers["X-Cf-Maybe-Bot"] == "1";
|
|
}
|
|
|
|
if (httpContext.Request.Headers.ContainsKey("Bitwarden-Client-Version") && Version.TryParse(httpContext.Request.Headers["Bitwarden-Client-Version"], out var cVersion))
|
|
{
|
|
ClientVersion = cVersion;
|
|
}
|
|
}
|
|
|
|
public async virtual Task BuildAsync(ClaimsPrincipal user, GlobalSettings globalSettings)
|
|
{
|
|
if (_builtClaimsPrincipal)
|
|
{
|
|
return;
|
|
}
|
|
|
|
_builtClaimsPrincipal = true;
|
|
IpAddress = HttpContext.GetIpAddress(globalSettings);
|
|
await SetContextAsync(user);
|
|
}
|
|
|
|
public virtual Task SetContextAsync(ClaimsPrincipal user)
|
|
{
|
|
if (user == null || !user.Claims.Any())
|
|
{
|
|
return Task.FromResult(0);
|
|
}
|
|
|
|
var claimsDict = user.Claims.GroupBy(c => c.Type).ToDictionary(c => c.Key, c => c.Select(v => v));
|
|
|
|
var subject = GetClaimValue(claimsDict, "sub");
|
|
if (Guid.TryParse(subject, out var subIdGuid))
|
|
{
|
|
UserId = subIdGuid;
|
|
}
|
|
|
|
ClientId = GetClaimValue(claimsDict, "client_id");
|
|
var clientSubject = GetClaimValue(claimsDict, "client_sub");
|
|
var orgApi = false;
|
|
if (clientSubject != null)
|
|
{
|
|
if (ClientId?.StartsWith("installation.") ?? false)
|
|
{
|
|
if (Guid.TryParse(clientSubject, out var idGuid))
|
|
{
|
|
InstallationId = idGuid;
|
|
}
|
|
}
|
|
else if (ClientId?.StartsWith("organization.") ?? false)
|
|
{
|
|
if (Guid.TryParse(clientSubject, out var idGuid))
|
|
{
|
|
OrganizationId = idGuid;
|
|
orgApi = true;
|
|
}
|
|
}
|
|
}
|
|
|
|
var clientType = GetClaimValue(claimsDict, Claims.Type);
|
|
if (clientType != null)
|
|
{
|
|
Enum.TryParse(clientType, out ClientType c);
|
|
ClientType = c;
|
|
}
|
|
|
|
if (ClientType == ClientType.ServiceAccount)
|
|
{
|
|
ServiceAccountOrganizationId = new Guid(GetClaimValue(claimsDict, Claims.Organization));
|
|
}
|
|
|
|
DeviceIdentifier = GetClaimValue(claimsDict, Claims.Device);
|
|
|
|
Organizations = GetOrganizations(claimsDict, orgApi);
|
|
|
|
Providers = GetProviders(claimsDict);
|
|
|
|
return Task.FromResult(0);
|
|
}
|
|
|
|
private List<CurrentContextOrganization> GetOrganizations(Dictionary<string, IEnumerable<Claim>> claimsDict, bool orgApi)
|
|
{
|
|
var accessSecretsManager = claimsDict.ContainsKey(Claims.SecretsManagerAccess)
|
|
? claimsDict[Claims.SecretsManagerAccess].ToDictionary(s => s.Value, _ => true)
|
|
: new Dictionary<string, bool>();
|
|
|
|
var organizations = new List<CurrentContextOrganization>();
|
|
if (claimsDict.ContainsKey(Claims.OrganizationOwner))
|
|
{
|
|
organizations.AddRange(claimsDict[Claims.OrganizationOwner].Select(c =>
|
|
new CurrentContextOrganization
|
|
{
|
|
Id = new Guid(c.Value),
|
|
Type = OrganizationUserType.Owner,
|
|
AccessSecretsManager = accessSecretsManager.ContainsKey(c.Value),
|
|
}));
|
|
}
|
|
else if (orgApi && OrganizationId.HasValue)
|
|
{
|
|
organizations.Add(new CurrentContextOrganization
|
|
{
|
|
Id = OrganizationId.Value,
|
|
Type = OrganizationUserType.Owner,
|
|
});
|
|
}
|
|
|
|
if (claimsDict.ContainsKey(Claims.OrganizationAdmin))
|
|
{
|
|
organizations.AddRange(claimsDict[Claims.OrganizationAdmin].Select(c =>
|
|
new CurrentContextOrganization
|
|
{
|
|
Id = new Guid(c.Value),
|
|
Type = OrganizationUserType.Admin,
|
|
AccessSecretsManager = accessSecretsManager.ContainsKey(c.Value),
|
|
}));
|
|
}
|
|
|
|
if (claimsDict.ContainsKey(Claims.OrganizationUser))
|
|
{
|
|
organizations.AddRange(claimsDict[Claims.OrganizationUser].Select(c =>
|
|
new CurrentContextOrganization
|
|
{
|
|
Id = new Guid(c.Value),
|
|
Type = OrganizationUserType.User,
|
|
AccessSecretsManager = accessSecretsManager.ContainsKey(c.Value),
|
|
}));
|
|
}
|
|
|
|
if (claimsDict.ContainsKey(Claims.OrganizationManager))
|
|
{
|
|
organizations.AddRange(claimsDict[Claims.OrganizationManager].Select(c =>
|
|
new CurrentContextOrganization
|
|
{
|
|
Id = new Guid(c.Value),
|
|
Type = OrganizationUserType.Manager,
|
|
AccessSecretsManager = accessSecretsManager.ContainsKey(c.Value),
|
|
}));
|
|
}
|
|
|
|
if (claimsDict.ContainsKey(Claims.OrganizationCustom))
|
|
{
|
|
organizations.AddRange(claimsDict[Claims.OrganizationCustom].Select(c =>
|
|
new CurrentContextOrganization
|
|
{
|
|
Id = new Guid(c.Value),
|
|
Type = OrganizationUserType.Custom,
|
|
Permissions = SetOrganizationPermissionsFromClaims(c.Value, claimsDict),
|
|
AccessSecretsManager = accessSecretsManager.ContainsKey(c.Value),
|
|
}));
|
|
}
|
|
|
|
return organizations;
|
|
}
|
|
|
|
private List<CurrentContextProvider> GetProviders(Dictionary<string, IEnumerable<Claim>> claimsDict)
|
|
{
|
|
var providers = new List<CurrentContextProvider>();
|
|
if (claimsDict.ContainsKey(Claims.ProviderAdmin))
|
|
{
|
|
providers.AddRange(claimsDict[Claims.ProviderAdmin].Select(c =>
|
|
new CurrentContextProvider
|
|
{
|
|
Id = new Guid(c.Value),
|
|
Type = ProviderUserType.ProviderAdmin
|
|
}));
|
|
}
|
|
|
|
if (claimsDict.ContainsKey(Claims.ProviderServiceUser))
|
|
{
|
|
providers.AddRange(claimsDict[Claims.ProviderServiceUser].Select(c =>
|
|
new CurrentContextProvider
|
|
{
|
|
Id = new Guid(c.Value),
|
|
Type = ProviderUserType.ServiceUser
|
|
}));
|
|
}
|
|
|
|
return providers;
|
|
}
|
|
|
|
public async Task<bool> OrganizationUser(Guid orgId)
|
|
{
|
|
return (Organizations?.Any(o => o.Id == orgId) ?? false) || await OrganizationOwner(orgId);
|
|
}
|
|
|
|
public async Task<bool> OrganizationManager(Guid orgId)
|
|
{
|
|
if (FlexibleCollectionsIsEnabled)
|
|
{
|
|
throw new FeatureUnavailableException("Flexible Collections is ON when it should be OFF.");
|
|
}
|
|
|
|
return await OrganizationAdmin(orgId) ||
|
|
(Organizations?.Any(o => o.Id == orgId && o.Type == OrganizationUserType.Manager) ?? false);
|
|
}
|
|
|
|
public async Task<bool> OrganizationAdmin(Guid orgId)
|
|
{
|
|
return await OrganizationOwner(orgId) ||
|
|
(Organizations?.Any(o => o.Id == orgId && o.Type == OrganizationUserType.Admin) ?? false);
|
|
}
|
|
|
|
public async Task<bool> OrganizationOwner(Guid orgId)
|
|
{
|
|
if (Organizations?.Any(o => o.Id == orgId && o.Type == OrganizationUserType.Owner) ?? false)
|
|
{
|
|
return true;
|
|
}
|
|
|
|
if (Providers.Any())
|
|
{
|
|
return await ProviderUserForOrgAsync(orgId);
|
|
}
|
|
|
|
return false;
|
|
}
|
|
|
|
public Task<bool> OrganizationCustom(Guid orgId)
|
|
{
|
|
return Task.FromResult(Organizations?.Any(o => o.Id == orgId && o.Type == OrganizationUserType.Custom) ?? false);
|
|
}
|
|
|
|
public async Task<bool> AccessEventLogs(Guid orgId)
|
|
{
|
|
return await OrganizationAdmin(orgId) || (Organizations?.Any(o => o.Id == orgId
|
|
&& (o.Permissions?.AccessEventLogs ?? false)) ?? false);
|
|
}
|
|
|
|
public async Task<bool> AccessImportExport(Guid orgId)
|
|
{
|
|
return await OrganizationAdmin(orgId) || (Organizations?.Any(o => o.Id == orgId
|
|
&& (o.Permissions?.AccessImportExport ?? false)) ?? false);
|
|
}
|
|
|
|
public async Task<bool> AccessReports(Guid orgId)
|
|
{
|
|
return await OrganizationAdmin(orgId) || (Organizations?.Any(o => o.Id == orgId
|
|
&& (o.Permissions?.AccessReports ?? false)) ?? false);
|
|
}
|
|
|
|
public async Task<bool> EditAnyCollection(Guid orgId)
|
|
{
|
|
return await OrganizationAdmin(orgId) || (Organizations?.Any(o => o.Id == orgId
|
|
&& (o.Permissions?.EditAnyCollection ?? false)) ?? false);
|
|
}
|
|
|
|
public async Task<bool> ViewAllCollections(Guid orgId)
|
|
{
|
|
var org = GetOrganization(orgId);
|
|
return await EditAnyCollection(orgId) || (org != null && org.Permissions.DeleteAnyCollection);
|
|
}
|
|
|
|
public async Task<bool> EditAssignedCollections(Guid orgId)
|
|
{
|
|
if (FlexibleCollectionsIsEnabled)
|
|
{
|
|
throw new FeatureUnavailableException("Flexible Collections is ON when it should be OFF.");
|
|
}
|
|
|
|
return await OrganizationManager(orgId) || (Organizations?.Any(o => o.Id == orgId
|
|
&& (o.Permissions?.EditAssignedCollections ?? false)) ?? false);
|
|
}
|
|
|
|
public async Task<bool> DeleteAssignedCollections(Guid orgId)
|
|
{
|
|
if (FlexibleCollectionsIsEnabled)
|
|
{
|
|
throw new FeatureUnavailableException("Flexible Collections is ON when it should be OFF.");
|
|
}
|
|
|
|
return await OrganizationManager(orgId) || (Organizations?.Any(o => o.Id == orgId
|
|
&& (o.Permissions?.DeleteAssignedCollections ?? false)) ?? false);
|
|
}
|
|
|
|
public async Task<bool> ViewAssignedCollections(Guid orgId)
|
|
{
|
|
/*
|
|
* Required to display the existing collections under which the new collection can be nested.
|
|
* Owner, Admin, Manager, and Provider checks are handled via the EditAssigned/DeleteAssigned context calls.
|
|
* This entire method will be moved to the CollectionAuthorizationHandler in the future
|
|
*/
|
|
|
|
if (FlexibleCollectionsIsEnabled)
|
|
{
|
|
throw new FeatureUnavailableException("Flexible Collections is ON when it should be OFF.");
|
|
}
|
|
|
|
var canCreateNewCollections = false;
|
|
var org = GetOrganization(orgId);
|
|
if (org != null)
|
|
{
|
|
canCreateNewCollections = !org.LimitCollectionCreationDeletion || org.Permissions.CreateNewCollections;
|
|
}
|
|
return await EditAssignedCollections(orgId)
|
|
|| await DeleteAssignedCollections(orgId)
|
|
|| canCreateNewCollections;
|
|
}
|
|
|
|
public async Task<bool> ManageGroups(Guid orgId)
|
|
{
|
|
return await OrganizationAdmin(orgId) || (Organizations?.Any(o => o.Id == orgId
|
|
&& (o.Permissions?.ManageGroups ?? false)) ?? false);
|
|
}
|
|
|
|
public async Task<bool> ManagePolicies(Guid orgId)
|
|
{
|
|
return await OrganizationAdmin(orgId) || (Organizations?.Any(o => o.Id == orgId
|
|
&& (o.Permissions?.ManagePolicies ?? false)) ?? false);
|
|
}
|
|
|
|
public async Task<bool> ManageSso(Guid orgId)
|
|
{
|
|
return await OrganizationAdmin(orgId) || (Organizations?.Any(o => o.Id == orgId
|
|
&& (o.Permissions?.ManageSso ?? false)) ?? false);
|
|
}
|
|
|
|
public async Task<bool> ManageScim(Guid orgId)
|
|
{
|
|
return await OrganizationAdmin(orgId) || (Organizations?.Any(o => o.Id == orgId
|
|
&& (o.Permissions?.ManageScim ?? false)) ?? false);
|
|
}
|
|
|
|
public async Task<bool> ManageUsers(Guid orgId)
|
|
{
|
|
return await OrganizationAdmin(orgId) || (Organizations?.Any(o => o.Id == orgId
|
|
&& (o.Permissions?.ManageUsers ?? false)) ?? false);
|
|
}
|
|
|
|
public async Task<bool> ManageResetPassword(Guid orgId)
|
|
{
|
|
return await OrganizationAdmin(orgId) || (Organizations?.Any(o => o.Id == orgId
|
|
&& (o.Permissions?.ManageResetPassword ?? false)) ?? false);
|
|
}
|
|
|
|
public async Task<bool> ViewSubscription(Guid orgId)
|
|
{
|
|
var orgManagedByMspProvider = (await GetOrganizationProviderDetails()).Any(po => po.OrganizationId == orgId && po.ProviderType == ProviderType.Msp);
|
|
|
|
return orgManagedByMspProvider
|
|
? await ProviderUserForOrgAsync(orgId)
|
|
: await OrganizationOwner(orgId);
|
|
}
|
|
|
|
public async Task<bool> EditSubscription(Guid orgId)
|
|
{
|
|
var orgManagedByProvider = (await GetOrganizationProviderDetails()).Any(po => po.OrganizationId == orgId);
|
|
|
|
return orgManagedByProvider
|
|
? await ProviderUserForOrgAsync(orgId)
|
|
: await OrganizationOwner(orgId);
|
|
}
|
|
|
|
public async Task<bool> EditPaymentMethods(Guid orgId)
|
|
{
|
|
return await EditSubscription(orgId);
|
|
}
|
|
|
|
public async Task<bool> ViewBillingHistory(Guid orgId)
|
|
{
|
|
return await EditSubscription(orgId);
|
|
}
|
|
|
|
public bool ProviderProviderAdmin(Guid providerId)
|
|
{
|
|
return Providers?.Any(o => o.Id == providerId && o.Type == ProviderUserType.ProviderAdmin) ?? false;
|
|
}
|
|
|
|
public bool ProviderManageUsers(Guid providerId)
|
|
{
|
|
return ProviderProviderAdmin(providerId);
|
|
}
|
|
|
|
public bool ProviderAccessEventLogs(Guid providerId)
|
|
{
|
|
return ProviderProviderAdmin(providerId);
|
|
}
|
|
|
|
public bool AccessProviderOrganizations(Guid providerId)
|
|
{
|
|
return ProviderUser(providerId);
|
|
}
|
|
|
|
public bool ManageProviderOrganizations(Guid providerId)
|
|
{
|
|
return ProviderProviderAdmin(providerId);
|
|
}
|
|
|
|
public bool ProviderUser(Guid providerId)
|
|
{
|
|
return Providers?.Any(o => o.Id == providerId) ?? false;
|
|
}
|
|
|
|
public async Task<bool> ProviderUserForOrgAsync(Guid orgId)
|
|
{
|
|
return (await GetProviderUserOrganizations()).Any(po => po.OrganizationId == orgId);
|
|
}
|
|
|
|
public async Task<Guid?> ProviderIdForOrg(Guid orgId)
|
|
{
|
|
if (Organizations?.Any(org => org.Id == orgId) ?? false)
|
|
{
|
|
return null;
|
|
}
|
|
|
|
var po = (await GetProviderUserOrganizations())
|
|
?.FirstOrDefault(po => po.OrganizationId == orgId);
|
|
|
|
return po?.ProviderId;
|
|
}
|
|
|
|
public bool AccessSecretsManager(Guid orgId)
|
|
{
|
|
if (ServiceAccountOrganizationId.HasValue && ServiceAccountOrganizationId.Value == orgId)
|
|
{
|
|
return true;
|
|
}
|
|
|
|
return Organizations?.Any(o => o.Id == orgId && o.AccessSecretsManager) ?? false;
|
|
}
|
|
|
|
public async Task<ICollection<CurrentContextOrganization>> OrganizationMembershipAsync(
|
|
IOrganizationUserRepository organizationUserRepository, Guid userId)
|
|
{
|
|
if (Organizations == null)
|
|
{
|
|
var userOrgs = await organizationUserRepository.GetManyDetailsByUserAsync(userId);
|
|
Organizations = userOrgs.Where(ou => ou.Status == OrganizationUserStatusType.Confirmed)
|
|
.Select(ou => new CurrentContextOrganization(ou)).ToList();
|
|
}
|
|
return Organizations;
|
|
}
|
|
|
|
public async Task<ICollection<CurrentContextProvider>> ProviderMembershipAsync(
|
|
IProviderUserRepository providerUserRepository, Guid userId)
|
|
{
|
|
if (Providers == null)
|
|
{
|
|
var userProviders = await providerUserRepository.GetManyByUserAsync(userId);
|
|
Providers = userProviders.Where(ou => ou.Status == ProviderUserStatusType.Confirmed)
|
|
.Select(ou => new CurrentContextProvider(ou)).ToList();
|
|
}
|
|
return Providers;
|
|
}
|
|
|
|
public CurrentContextOrganization GetOrganization(Guid orgId)
|
|
{
|
|
return Organizations?.Find(o => o.Id == orgId);
|
|
}
|
|
|
|
private string GetClaimValue(Dictionary<string, IEnumerable<Claim>> claims, string type)
|
|
{
|
|
if (!claims.ContainsKey(type))
|
|
{
|
|
return null;
|
|
}
|
|
|
|
return claims[type].FirstOrDefault()?.Value;
|
|
}
|
|
|
|
private Permissions SetOrganizationPermissionsFromClaims(string organizationId, Dictionary<string, IEnumerable<Claim>> claimsDict)
|
|
{
|
|
bool hasClaim(string claimKey)
|
|
{
|
|
return claimsDict.ContainsKey(claimKey) ?
|
|
claimsDict[claimKey].Any(x => x.Value == organizationId) : false;
|
|
}
|
|
|
|
return new Permissions
|
|
{
|
|
AccessEventLogs = hasClaim("accesseventlogs"),
|
|
AccessImportExport = hasClaim("accessimportexport"),
|
|
AccessReports = hasClaim("accessreports"),
|
|
CreateNewCollections = hasClaim("createnewcollections"),
|
|
EditAnyCollection = hasClaim("editanycollection"),
|
|
DeleteAnyCollection = hasClaim("deleteanycollection"),
|
|
EditAssignedCollections = hasClaim("editassignedcollections"),
|
|
DeleteAssignedCollections = hasClaim("deleteassignedcollections"),
|
|
ManageGroups = hasClaim("managegroups"),
|
|
ManagePolicies = hasClaim("managepolicies"),
|
|
ManageSso = hasClaim("managesso"),
|
|
ManageUsers = hasClaim("manageusers"),
|
|
ManageResetPassword = hasClaim("manageresetpassword"),
|
|
ManageScim = hasClaim("managescim"),
|
|
};
|
|
}
|
|
|
|
protected async Task<IEnumerable<ProviderUserOrganizationDetails>> GetProviderUserOrganizations()
|
|
{
|
|
if (_providerUserOrganizations == null && UserId.HasValue)
|
|
{
|
|
_providerUserOrganizations = await _providerUserRepository.GetManyOrganizationDetailsByUserAsync(UserId.Value, ProviderUserStatusType.Confirmed);
|
|
}
|
|
|
|
return _providerUserOrganizations;
|
|
}
|
|
|
|
protected async Task<IEnumerable<ProviderOrganizationProviderDetails>> GetOrganizationProviderDetails()
|
|
{
|
|
if (_providerOrganizationProviderDetails == null && UserId.HasValue)
|
|
{
|
|
_providerOrganizationProviderDetails = await _providerOrganizationRepository.GetManyByUserAsync(UserId.Value);
|
|
}
|
|
|
|
return _providerOrganizationProviderDetails;
|
|
}
|
|
}
|