mirror of
https://github.com/bitwarden/server.git
synced 2025-04-05 21:18:13 -05:00

* [PM-1188] add sso project to auth * [PM-1188] move sso api models to auth * [PM-1188] fix sso api model namespace & imports * [PM-1188] move core files to auth * [PM-1188] fix core sso namespace & models * [PM-1188] move sso repository files to auth * [PM-1188] fix sso repo files namespace & imports * [PM-1188] move sso sql files to auth folder * [PM-1188] move sso test files to auth folders * [PM-1188] fix sso tests namespace & imports * [PM-1188] move auth api files to auth folder * [PM-1188] fix auth api files namespace & imports * [PM-1188] move auth core files to auth folder * [PM-1188] fix auth core files namespace & imports * [PM-1188] move auth email templates to auth folder * [PM-1188] move auth email folder back into shared directory * [PM-1188] fix auth email names * [PM-1188] move auth core models to auth folder * [PM-1188] fix auth model namespace & imports * [PM-1188] add entire Identity project to auth codeowners * [PM-1188] fix auth orm files namespace & imports * [PM-1188] move auth orm files to auth folder * [PM-1188] move auth sql files to auth folder * [PM-1188] move auth tests to auth folder * [PM-1188] fix auth test files namespace & imports * [PM-1188] move emergency access api files to auth folder * [PM-1188] fix emergencyaccess api files namespace & imports * [PM-1188] move emergency access core files to auth folder * [PM-1188] fix emergency access core files namespace & imports * [PM-1188] move emergency access orm files to auth folder * [PM-1188] fix emergency access orm files namespace & imports * [PM-1188] move emergency access sql files to auth folder * [PM-1188] move emergencyaccess test files to auth folder * [PM-1188] fix emergency access test files namespace & imports * [PM-1188] move captcha files to auth folder * [PM-1188] fix captcha files namespace & imports * [PM-1188] move auth admin files into auth folder * [PM-1188] fix admin auth files namespace & imports - configure mvc to look in auth folders for views * [PM-1188] remove extra imports and formatting * [PM-1188] fix ef auth model imports * [PM-1188] fix DatabaseContextModelSnapshot paths * [PM-1188] fix grant import in ef * [PM-1188] update sqlproj * [PM-1188] move missed sqlproj files * [PM-1188] move auth ef models out of auth folder * [PM-1188] fix auth ef models namespace * [PM-1188] remove auth ef models unused imports * [PM-1188] fix imports for auth ef models * [PM-1188] fix more ef model imports * [PM-1188] fix file encodings
320 lines
11 KiB
C#
320 lines
11 KiB
C#
using Bit.Core.Auth.Entities;
|
|
using Bit.Core.Auth.Models.Data;
|
|
using Bit.Core.Auth.Repositories;
|
|
using Bit.Core.Auth.Services;
|
|
using Bit.Core.Entities;
|
|
using Bit.Core.Exceptions;
|
|
using Bit.Core.Models.Data.Organizations.OrganizationUsers;
|
|
using Bit.Core.Repositories;
|
|
using Bit.Test.Common.AutoFixture;
|
|
using Bit.Test.Common.AutoFixture.Attributes;
|
|
using NSubstitute;
|
|
using Xunit;
|
|
|
|
namespace Bit.Core.Test.Auth.Services;
|
|
|
|
[SutProviderCustomize]
|
|
public class SsoConfigServiceTests
|
|
{
|
|
[Theory, BitAutoData]
|
|
public async Task SaveAsync_ExistingItem_UpdatesRevisionDateOnly(SutProvider<SsoConfigService> sutProvider,
|
|
Organization organization)
|
|
{
|
|
var utcNow = DateTime.UtcNow;
|
|
|
|
var ssoConfig = new SsoConfig
|
|
{
|
|
Id = 1,
|
|
Data = "{}",
|
|
Enabled = true,
|
|
OrganizationId = organization.Id,
|
|
CreationDate = utcNow.AddDays(-10),
|
|
RevisionDate = utcNow.AddDays(-10),
|
|
};
|
|
|
|
sutProvider.GetDependency<ISsoConfigRepository>()
|
|
.UpsertAsync(ssoConfig).Returns(Task.CompletedTask);
|
|
|
|
await sutProvider.Sut.SaveAsync(ssoConfig, organization);
|
|
|
|
await sutProvider.GetDependency<ISsoConfigRepository>().Received()
|
|
.UpsertAsync(ssoConfig);
|
|
|
|
Assert.Equal(utcNow.AddDays(-10), ssoConfig.CreationDate);
|
|
Assert.True(ssoConfig.RevisionDate - utcNow < TimeSpan.FromSeconds(1));
|
|
}
|
|
|
|
[Theory, BitAutoData]
|
|
public async Task SaveAsync_NewItem_UpdatesCreationAndRevisionDate(SutProvider<SsoConfigService> sutProvider,
|
|
Organization organization)
|
|
{
|
|
var utcNow = DateTime.UtcNow;
|
|
|
|
var ssoConfig = new SsoConfig
|
|
{
|
|
Id = default,
|
|
Data = "{}",
|
|
Enabled = true,
|
|
OrganizationId = organization.Id,
|
|
CreationDate = utcNow.AddDays(-10),
|
|
RevisionDate = utcNow.AddDays(-10),
|
|
};
|
|
|
|
sutProvider.GetDependency<ISsoConfigRepository>()
|
|
.UpsertAsync(ssoConfig).Returns(Task.CompletedTask);
|
|
|
|
await sutProvider.Sut.SaveAsync(ssoConfig, organization);
|
|
|
|
await sutProvider.GetDependency<ISsoConfigRepository>().Received()
|
|
.UpsertAsync(ssoConfig);
|
|
|
|
Assert.True(ssoConfig.CreationDate - utcNow < TimeSpan.FromSeconds(1));
|
|
Assert.True(ssoConfig.RevisionDate - utcNow < TimeSpan.FromSeconds(1));
|
|
}
|
|
|
|
[Theory, BitAutoData]
|
|
public async Task SaveAsync_PreventDisablingKeyConnector(SutProvider<SsoConfigService> sutProvider,
|
|
Organization organization)
|
|
{
|
|
var utcNow = DateTime.UtcNow;
|
|
|
|
var oldSsoConfig = new SsoConfig
|
|
{
|
|
Id = 1,
|
|
Data = new SsoConfigurationData
|
|
{
|
|
KeyConnectorEnabled = true,
|
|
}.Serialize(),
|
|
Enabled = true,
|
|
OrganizationId = organization.Id,
|
|
CreationDate = utcNow.AddDays(-10),
|
|
RevisionDate = utcNow.AddDays(-10),
|
|
};
|
|
|
|
var newSsoConfig = new SsoConfig
|
|
{
|
|
Id = 1,
|
|
Data = "{}",
|
|
Enabled = true,
|
|
OrganizationId = organization.Id,
|
|
CreationDate = utcNow.AddDays(-10),
|
|
RevisionDate = utcNow,
|
|
};
|
|
|
|
var ssoConfigRepository = sutProvider.GetDependency<ISsoConfigRepository>();
|
|
ssoConfigRepository.GetByOrganizationIdAsync(organization.Id).Returns(oldSsoConfig);
|
|
ssoConfigRepository.UpsertAsync(newSsoConfig).Returns(Task.CompletedTask);
|
|
sutProvider.GetDependency<IOrganizationUserRepository>().GetManyDetailsByOrganizationAsync(organization.Id)
|
|
.Returns(new[] { new OrganizationUserUserDetails { UsesKeyConnector = true } });
|
|
|
|
var exception = await Assert.ThrowsAsync<BadRequestException>(
|
|
() => sutProvider.Sut.SaveAsync(newSsoConfig, organization));
|
|
|
|
Assert.Contains("Key Connector cannot be disabled at this moment.", exception.Message);
|
|
|
|
await sutProvider.GetDependency<ISsoConfigRepository>().DidNotReceiveWithAnyArgs()
|
|
.UpsertAsync(default);
|
|
}
|
|
|
|
[Theory, BitAutoData]
|
|
public async Task SaveAsync_AllowDisablingKeyConnectorWhenNoUserIsUsingIt(
|
|
SutProvider<SsoConfigService> sutProvider, Organization organization)
|
|
{
|
|
var utcNow = DateTime.UtcNow;
|
|
|
|
var oldSsoConfig = new SsoConfig
|
|
{
|
|
Id = 1,
|
|
Data = new SsoConfigurationData
|
|
{
|
|
KeyConnectorEnabled = true,
|
|
}.Serialize(),
|
|
Enabled = true,
|
|
OrganizationId = organization.Id,
|
|
CreationDate = utcNow.AddDays(-10),
|
|
RevisionDate = utcNow.AddDays(-10),
|
|
};
|
|
|
|
var newSsoConfig = new SsoConfig
|
|
{
|
|
Id = 1,
|
|
Data = "{}",
|
|
Enabled = true,
|
|
OrganizationId = organization.Id,
|
|
CreationDate = utcNow.AddDays(-10),
|
|
RevisionDate = utcNow,
|
|
};
|
|
|
|
var ssoConfigRepository = sutProvider.GetDependency<ISsoConfigRepository>();
|
|
ssoConfigRepository.GetByOrganizationIdAsync(organization.Id).Returns(oldSsoConfig);
|
|
ssoConfigRepository.UpsertAsync(newSsoConfig).Returns(Task.CompletedTask);
|
|
sutProvider.GetDependency<IOrganizationUserRepository>().GetManyDetailsByOrganizationAsync(organization.Id)
|
|
.Returns(new[] { new OrganizationUserUserDetails { UsesKeyConnector = false } });
|
|
|
|
await sutProvider.Sut.SaveAsync(newSsoConfig, organization);
|
|
}
|
|
|
|
[Theory, BitAutoData]
|
|
public async Task SaveAsync_KeyConnector_SingleOrgNotEnabled_Throws(SutProvider<SsoConfigService> sutProvider,
|
|
Organization organization)
|
|
{
|
|
var utcNow = DateTime.UtcNow;
|
|
|
|
var ssoConfig = new SsoConfig
|
|
{
|
|
Id = default,
|
|
Data = new SsoConfigurationData
|
|
{
|
|
KeyConnectorEnabled = true,
|
|
}.Serialize(),
|
|
Enabled = true,
|
|
OrganizationId = organization.Id,
|
|
CreationDate = utcNow.AddDays(-10),
|
|
RevisionDate = utcNow.AddDays(-10),
|
|
};
|
|
|
|
var exception = await Assert.ThrowsAsync<BadRequestException>(
|
|
() => sutProvider.Sut.SaveAsync(ssoConfig, organization));
|
|
|
|
Assert.Contains("Key Connector requires the Single Organization policy to be enabled.", exception.Message);
|
|
|
|
await sutProvider.GetDependency<ISsoConfigRepository>().DidNotReceiveWithAnyArgs()
|
|
.UpsertAsync(default);
|
|
}
|
|
|
|
[Theory, BitAutoData]
|
|
public async Task SaveAsync_KeyConnector_SsoPolicyNotEnabled_Throws(SutProvider<SsoConfigService> sutProvider,
|
|
Organization organization)
|
|
{
|
|
var utcNow = DateTime.UtcNow;
|
|
|
|
var ssoConfig = new SsoConfig
|
|
{
|
|
Id = default,
|
|
Data = new SsoConfigurationData
|
|
{
|
|
KeyConnectorEnabled = true,
|
|
}.Serialize(),
|
|
Enabled = true,
|
|
OrganizationId = organization.Id,
|
|
CreationDate = utcNow.AddDays(-10),
|
|
RevisionDate = utcNow.AddDays(-10),
|
|
};
|
|
|
|
sutProvider.GetDependency<IPolicyRepository>().GetByOrganizationIdTypeAsync(
|
|
Arg.Any<Guid>(), Enums.PolicyType.SingleOrg).Returns(new Policy
|
|
{
|
|
Enabled = true
|
|
});
|
|
|
|
var exception = await Assert.ThrowsAsync<BadRequestException>(
|
|
() => sutProvider.Sut.SaveAsync(ssoConfig, organization));
|
|
|
|
Assert.Contains("Key Connector requires the Single Sign-On Authentication policy to be enabled.", exception.Message);
|
|
|
|
await sutProvider.GetDependency<ISsoConfigRepository>().DidNotReceiveWithAnyArgs()
|
|
.UpsertAsync(default);
|
|
}
|
|
|
|
[Theory, BitAutoData]
|
|
public async Task SaveAsync_KeyConnector_SsoConfigNotEnabled_Throws(SutProvider<SsoConfigService> sutProvider,
|
|
Organization organization)
|
|
{
|
|
var utcNow = DateTime.UtcNow;
|
|
|
|
var ssoConfig = new SsoConfig
|
|
{
|
|
Id = default,
|
|
Data = new SsoConfigurationData
|
|
{
|
|
KeyConnectorEnabled = true,
|
|
}.Serialize(),
|
|
Enabled = false,
|
|
OrganizationId = organization.Id,
|
|
CreationDate = utcNow.AddDays(-10),
|
|
RevisionDate = utcNow.AddDays(-10),
|
|
};
|
|
|
|
sutProvider.GetDependency<IPolicyRepository>().GetByOrganizationIdTypeAsync(
|
|
Arg.Any<Guid>(), Arg.Any<Enums.PolicyType>()).Returns(new Policy
|
|
{
|
|
Enabled = true
|
|
});
|
|
|
|
var exception = await Assert.ThrowsAsync<BadRequestException>(
|
|
() => sutProvider.Sut.SaveAsync(ssoConfig, organization));
|
|
|
|
Assert.Contains("You must enable SSO to use Key Connector.", exception.Message);
|
|
|
|
await sutProvider.GetDependency<ISsoConfigRepository>().DidNotReceiveWithAnyArgs()
|
|
.UpsertAsync(default);
|
|
}
|
|
|
|
[Theory, BitAutoData]
|
|
public async Task SaveAsync_KeyConnector_KeyConnectorAbilityNotEnabled_Throws(SutProvider<SsoConfigService> sutProvider,
|
|
Organization organization)
|
|
{
|
|
var utcNow = DateTime.UtcNow;
|
|
|
|
organization.UseKeyConnector = false;
|
|
var ssoConfig = new SsoConfig
|
|
{
|
|
Id = default,
|
|
Data = new SsoConfigurationData
|
|
{
|
|
KeyConnectorEnabled = true,
|
|
}.Serialize(),
|
|
Enabled = true,
|
|
OrganizationId = organization.Id,
|
|
CreationDate = utcNow.AddDays(-10),
|
|
RevisionDate = utcNow.AddDays(-10),
|
|
};
|
|
|
|
sutProvider.GetDependency<IPolicyRepository>().GetByOrganizationIdTypeAsync(
|
|
Arg.Any<Guid>(), Arg.Any<Enums.PolicyType>()).Returns(new Policy
|
|
{
|
|
Enabled = true,
|
|
});
|
|
|
|
var exception = await Assert.ThrowsAsync<BadRequestException>(
|
|
() => sutProvider.Sut.SaveAsync(ssoConfig, organization));
|
|
|
|
Assert.Contains("Organization cannot use Key Connector.", exception.Message);
|
|
|
|
await sutProvider.GetDependency<ISsoConfigRepository>().DidNotReceiveWithAnyArgs()
|
|
.UpsertAsync(default);
|
|
}
|
|
|
|
[Theory, BitAutoData]
|
|
public async Task SaveAsync_KeyConnector_Success(SutProvider<SsoConfigService> sutProvider,
|
|
Organization organization)
|
|
{
|
|
var utcNow = DateTime.UtcNow;
|
|
|
|
organization.UseKeyConnector = true;
|
|
var ssoConfig = new SsoConfig
|
|
{
|
|
Id = default,
|
|
Data = new SsoConfigurationData
|
|
{
|
|
KeyConnectorEnabled = true,
|
|
}.Serialize(),
|
|
Enabled = true,
|
|
OrganizationId = organization.Id,
|
|
CreationDate = utcNow.AddDays(-10),
|
|
RevisionDate = utcNow.AddDays(-10),
|
|
};
|
|
|
|
sutProvider.GetDependency<IPolicyRepository>().GetByOrganizationIdTypeAsync(
|
|
Arg.Any<Guid>(), Arg.Any<Enums.PolicyType>()).Returns(new Policy
|
|
{
|
|
Enabled = true,
|
|
});
|
|
|
|
await sutProvider.Sut.SaveAsync(ssoConfig, organization);
|
|
|
|
await sutProvider.GetDependency<ISsoConfigRepository>().ReceivedWithAnyArgs()
|
|
.UpsertAsync(default);
|
|
}
|
|
}
|