mirror of
https://github.com/bitwarden/browser
synced 2025-12-20 02:03:39 +00:00
[PM-15506] Implement vNextOrganizationService (#12839)
* [PM-15506] Wire up vNextOrganizationService for libs/common and libs/angular (#12683) * Wire up vNextOrganizationService in PolicyService * Wire vNextOrganizationService in SyncService * wire vNextOrganizationService for EventCollectionService * wire vNextOrganizationService for KeyConnectorService * wire up vNextOrganizationService for CipherAuthorizationService * Wire up vNextOrganizationService in PolicyService * Wire vNextOrganizationService in SyncService * wire vNextOrganizationService for EventCollectionService * wire vNextOrganizationService for KeyConnectorService * wire up vNextOrganizationService for CipherAuthorizationService * wire vNextOrganizationService for share.component * wire vNextOrganizationService for collections.component * wire vNextOrganizationServcie for add-account-credit-dialog * wire vNextOrganizationService for vault-filter.service * fix browser errors for vNextOrganizationService implementation in libs * fix desktop errors for vNextOrganizationService implementation for libs * fix linter errors * fix CLI errors on vNextOrganizationServcie implementations for libs * [PM-15506] Wire up vNextOrganizationService for web client (#12810) PR to a feature branch, no need to review until this goes to main. * implement vNextOrganization service for browser client (#12844) PR to feature branch, no need for review yet. * wire vNextOrganizationService for licence and some web router guards * wire vNextOrganizationService in tests * remove vNext notation for OrganizationService and related * Merge branch 'main' into ac/pm-15506-vNextOrganizationService * fix tsstrict error * fix test, fix ts strict error
This commit is contained in:
@@ -1,11 +1,13 @@
|
||||
// FIXME: Update this file to be type safe and remove this and next line
|
||||
// @ts-strict-ignore
|
||||
import { firstValueFrom } from "rxjs";
|
||||
import { firstValueFrom, map } from "rxjs";
|
||||
|
||||
import { OrganizationAuthRequestService } from "@bitwarden/bit-common/admin-console/auth-requests";
|
||||
import { Response } from "@bitwarden/cli/models/response";
|
||||
import { MessageResponse } from "@bitwarden/cli/models/response/message.response";
|
||||
import { OrganizationService } from "@bitwarden/common/admin-console/services/organization/organization.service";
|
||||
import { OrganizationService } from "@bitwarden/common/admin-console/abstractions/organization/organization.service.abstraction";
|
||||
import { AccountService } from "@bitwarden/common/auth/abstractions/account.service";
|
||||
import { getUserId } from "@bitwarden/common/auth/services/account.service";
|
||||
import { Utils } from "@bitwarden/common/platform/misc/utils";
|
||||
|
||||
import { ServiceContainer } from "../../service-container";
|
||||
@@ -14,6 +16,7 @@ export class ApproveAllCommand {
|
||||
constructor(
|
||||
private organizationAuthRequestService: OrganizationAuthRequestService,
|
||||
private organizationService: OrganizationService,
|
||||
private accountService: AccountService,
|
||||
) {}
|
||||
|
||||
async run(organizationId: string): Promise<Response> {
|
||||
@@ -25,7 +28,13 @@ export class ApproveAllCommand {
|
||||
return Response.badRequest("`" + organizationId + "` is not a GUID.");
|
||||
}
|
||||
|
||||
const organization = await firstValueFrom(this.organizationService.get$(organizationId));
|
||||
const userId = await firstValueFrom(getUserId(this.accountService.activeAccount$));
|
||||
|
||||
const organization = await firstValueFrom(
|
||||
this.organizationService
|
||||
.organizations$(userId)
|
||||
.pipe(map((organizations) => organizations.find((o) => o.id === organizationId))),
|
||||
);
|
||||
if (!organization?.canManageUsersPassword) {
|
||||
return Response.error(
|
||||
"You do not have permission to approve pending device authorization requests.",
|
||||
@@ -58,6 +67,7 @@ export class ApproveAllCommand {
|
||||
return new ApproveAllCommand(
|
||||
serviceContainer.organizationAuthRequestService,
|
||||
serviceContainer.organizationService,
|
||||
serviceContainer.accountService,
|
||||
);
|
||||
}
|
||||
}
|
||||
|
||||
@@ -1,16 +1,19 @@
|
||||
import { firstValueFrom } from "rxjs";
|
||||
import { firstValueFrom, map } from "rxjs";
|
||||
|
||||
import { OrganizationAuthRequestService } from "@bitwarden/bit-common/admin-console/auth-requests";
|
||||
import { Response } from "@bitwarden/cli/models/response";
|
||||
import { OrganizationService } from "@bitwarden/common/admin-console/abstractions/organization/organization.service.abstraction";
|
||||
import { DefaultOrganizationService } from "@bitwarden/common/admin-console/services/organization/default-organization.service";
|
||||
import { AccountService } from "@bitwarden/common/auth/abstractions/account.service";
|
||||
import { getUserId } from "@bitwarden/common/auth/services/account.service";
|
||||
import { Utils } from "@bitwarden/common/platform/misc/utils";
|
||||
|
||||
import { ServiceContainer } from "../../service-container";
|
||||
|
||||
export class ApproveCommand {
|
||||
constructor(
|
||||
private organizationService: OrganizationService,
|
||||
private organizationService: DefaultOrganizationService,
|
||||
private organizationAuthRequestService: OrganizationAuthRequestService,
|
||||
private accountService: AccountService,
|
||||
) {}
|
||||
|
||||
async run(organizationId: string, id: string): Promise<Response> {
|
||||
@@ -30,7 +33,17 @@ export class ApproveCommand {
|
||||
return Response.badRequest("`" + id + "` is not a GUID.");
|
||||
}
|
||||
|
||||
const organization = await firstValueFrom(this.organizationService.get$(organizationId));
|
||||
const userId = await firstValueFrom(getUserId(this.accountService.activeAccount$));
|
||||
|
||||
if (!userId) {
|
||||
return Response.badRequest("No user found.");
|
||||
}
|
||||
|
||||
const organization = await firstValueFrom(
|
||||
this.organizationService
|
||||
.organizations$(userId)
|
||||
.pipe(map((organizations) => organizations?.find((o) => o.id === organizationId))),
|
||||
);
|
||||
if (!organization?.canManageUsersPassword) {
|
||||
return Response.error(
|
||||
"You do not have permission to approve pending device authorization requests.",
|
||||
@@ -57,6 +70,7 @@ export class ApproveCommand {
|
||||
return new ApproveCommand(
|
||||
serviceContainer.organizationService,
|
||||
serviceContainer.organizationAuthRequestService,
|
||||
serviceContainer.accountService,
|
||||
);
|
||||
}
|
||||
}
|
||||
|
||||
@@ -1,11 +1,13 @@
|
||||
// FIXME: Update this file to be type safe and remove this and next line
|
||||
// @ts-strict-ignore
|
||||
import { firstValueFrom } from "rxjs";
|
||||
import { firstValueFrom, map } from "rxjs";
|
||||
|
||||
import { OrganizationAuthRequestService } from "@bitwarden/bit-common/admin-console/auth-requests";
|
||||
import { Response } from "@bitwarden/cli/models/response";
|
||||
import { MessageResponse } from "@bitwarden/cli/models/response/message.response";
|
||||
import { OrganizationService } from "@bitwarden/common/admin-console/abstractions/organization/organization.service.abstraction";
|
||||
import { AccountService } from "@bitwarden/common/auth/abstractions/account.service";
|
||||
import { getUserId } from "@bitwarden/common/auth/services/account.service";
|
||||
import { Utils } from "@bitwarden/common/platform/misc/utils";
|
||||
|
||||
import { ServiceContainer } from "../../service-container";
|
||||
@@ -14,6 +16,7 @@ export class DenyAllCommand {
|
||||
constructor(
|
||||
private organizationService: OrganizationService,
|
||||
private organizationAuthRequestService: OrganizationAuthRequestService,
|
||||
private accountService: AccountService,
|
||||
) {}
|
||||
|
||||
async run(organizationId: string): Promise<Response> {
|
||||
@@ -25,7 +28,17 @@ export class DenyAllCommand {
|
||||
return Response.badRequest("`" + organizationId + "` is not a GUID.");
|
||||
}
|
||||
|
||||
const organization = await firstValueFrom(this.organizationService.get$(organizationId));
|
||||
const userId = await firstValueFrom(getUserId(this.accountService.activeAccount$));
|
||||
|
||||
if (!userId) {
|
||||
return Response.badRequest("No user found.");
|
||||
}
|
||||
|
||||
const organization = await firstValueFrom(
|
||||
this.organizationService
|
||||
.organizations$(userId)
|
||||
.pipe(map((organizations) => organizations.find((o) => o.id === organizationId))),
|
||||
);
|
||||
if (!organization?.canManageUsersPassword) {
|
||||
return Response.error(
|
||||
"You do not have permission to approve pending device authorization requests.",
|
||||
@@ -54,6 +67,7 @@ export class DenyAllCommand {
|
||||
return new DenyAllCommand(
|
||||
serviceContainer.organizationService,
|
||||
serviceContainer.organizationAuthRequestService,
|
||||
serviceContainer.accountService,
|
||||
);
|
||||
}
|
||||
}
|
||||
|
||||
@@ -1,8 +1,9 @@
|
||||
import { firstValueFrom } from "rxjs";
|
||||
import { firstValueFrom, map } from "rxjs";
|
||||
|
||||
import { OrganizationAuthRequestService } from "@bitwarden/bit-common/admin-console/auth-requests";
|
||||
import { Response } from "@bitwarden/cli/models/response";
|
||||
import { OrganizationService } from "@bitwarden/common/admin-console/abstractions/organization/organization.service.abstraction";
|
||||
import { AccountService } from "@bitwarden/common/auth/abstractions/account.service";
|
||||
import { Utils } from "@bitwarden/common/platform/misc/utils";
|
||||
|
||||
import { ServiceContainer } from "../../service-container";
|
||||
@@ -11,6 +12,7 @@ export class DenyCommand {
|
||||
constructor(
|
||||
private organizationService: OrganizationService,
|
||||
private organizationAuthRequestService: OrganizationAuthRequestService,
|
||||
private accountServcie: AccountService,
|
||||
) {}
|
||||
|
||||
async run(organizationId: string, id: string): Promise<Response> {
|
||||
@@ -30,7 +32,17 @@ export class DenyCommand {
|
||||
return Response.badRequest("`" + id + "` is not a GUID.");
|
||||
}
|
||||
|
||||
const organization = await firstValueFrom(this.organizationService.get$(organizationId));
|
||||
const userId = await firstValueFrom(this.accountServcie.activeAccount$.pipe(map((a) => a?.id)));
|
||||
|
||||
if (!userId) {
|
||||
return Response.badRequest("No user found.");
|
||||
}
|
||||
|
||||
const organization = await firstValueFrom(
|
||||
this.organizationService
|
||||
.organizations$(userId)
|
||||
.pipe(map((organizations) => organizations.find((o) => o.id === organizationId))),
|
||||
);
|
||||
if (!organization?.canManageUsersPassword) {
|
||||
return Response.error(
|
||||
"You do not have permission to approve pending device authorization requests.",
|
||||
@@ -57,6 +69,7 @@ export class DenyCommand {
|
||||
return new DenyCommand(
|
||||
serviceContainer.organizationService,
|
||||
serviceContainer.organizationAuthRequestService,
|
||||
serviceContainer.accountService,
|
||||
);
|
||||
}
|
||||
}
|
||||
|
||||
@@ -1,9 +1,11 @@
|
||||
import { firstValueFrom } from "rxjs";
|
||||
import { firstValueFrom, map } from "rxjs";
|
||||
|
||||
import { OrganizationAuthRequestService } from "@bitwarden/bit-common/admin-console/auth-requests";
|
||||
import { Response } from "@bitwarden/cli/models/response";
|
||||
import { ListResponse } from "@bitwarden/cli/models/response/list.response";
|
||||
import { OrganizationService } from "@bitwarden/common/admin-console/abstractions/organization/organization.service.abstraction";
|
||||
import { AccountService } from "@bitwarden/common/auth/abstractions/account.service";
|
||||
import { getUserId } from "@bitwarden/common/auth/services/account.service";
|
||||
import { Utils } from "@bitwarden/common/platform/misc/utils";
|
||||
|
||||
import { ServiceContainer } from "../../service-container";
|
||||
@@ -14,6 +16,7 @@ export class ListCommand {
|
||||
constructor(
|
||||
private organizationAuthRequestService: OrganizationAuthRequestService,
|
||||
private organizationService: OrganizationService,
|
||||
private accountService: AccountService,
|
||||
) {}
|
||||
|
||||
async run(organizationId: string): Promise<Response> {
|
||||
@@ -25,7 +28,17 @@ export class ListCommand {
|
||||
return Response.badRequest("`" + organizationId + "` is not a GUID.");
|
||||
}
|
||||
|
||||
const organization = await firstValueFrom(this.organizationService.get$(organizationId));
|
||||
const userId = await firstValueFrom(getUserId(this.accountService.activeAccount$));
|
||||
|
||||
if (!userId) {
|
||||
return Response.badRequest("No user found.");
|
||||
}
|
||||
|
||||
const organization = await firstValueFrom(
|
||||
this.organizationService
|
||||
.organizations$(userId)
|
||||
.pipe(map((organizations) => organizations.find((o) => o.id === organizationId))),
|
||||
);
|
||||
if (!organization?.canManageUsersPassword) {
|
||||
return Response.error(
|
||||
"You do not have permission to approve pending device authorization requests.",
|
||||
@@ -46,6 +59,7 @@ export class ListCommand {
|
||||
return new ListCommand(
|
||||
serviceContainer.organizationAuthRequestService,
|
||||
serviceContainer.organizationService,
|
||||
serviceContainer.accountService,
|
||||
);
|
||||
}
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user