mirror of
https://github.com/bitwarden/browser
synced 2025-12-21 18:53:29 +00:00
* [PM-15506] Wire up vNextOrganizationService for libs/common and libs/angular (#12683) * Wire up vNextOrganizationService in PolicyService * Wire vNextOrganizationService in SyncService * wire vNextOrganizationService for EventCollectionService * wire vNextOrganizationService for KeyConnectorService * wire up vNextOrganizationService for CipherAuthorizationService * Wire up vNextOrganizationService in PolicyService * Wire vNextOrganizationService in SyncService * wire vNextOrganizationService for EventCollectionService * wire vNextOrganizationService for KeyConnectorService * wire up vNextOrganizationService for CipherAuthorizationService * wire vNextOrganizationService for share.component * wire vNextOrganizationService for collections.component * wire vNextOrganizationServcie for add-account-credit-dialog * wire vNextOrganizationService for vault-filter.service * fix browser errors for vNextOrganizationService implementation in libs * fix desktop errors for vNextOrganizationService implementation for libs * fix linter errors * fix CLI errors on vNextOrganizationServcie implementations for libs * [PM-15506] Wire up vNextOrganizationService for web client (#12810) PR to a feature branch, no need to review until this goes to main. * implement vNextOrganization service for browser client (#12844) PR to feature branch, no need for review yet. * wire vNextOrganizationService for licence and some web router guards * wire vNextOrganizationService in tests * remove vNext notation for OrganizationService and related * Merge branch 'main' into ac/pm-15506-vNextOrganizationService * fix tsstrict error * fix test, fix ts strict error
76 lines
2.4 KiB
TypeScript
76 lines
2.4 KiB
TypeScript
import { firstValueFrom, map } from "rxjs";
|
|
|
|
import { OrganizationAuthRequestService } from "@bitwarden/bit-common/admin-console/auth-requests";
|
|
import { Response } from "@bitwarden/cli/models/response";
|
|
import { OrganizationService } from "@bitwarden/common/admin-console/abstractions/organization/organization.service.abstraction";
|
|
import { AccountService } from "@bitwarden/common/auth/abstractions/account.service";
|
|
import { Utils } from "@bitwarden/common/platform/misc/utils";
|
|
|
|
import { ServiceContainer } from "../../service-container";
|
|
|
|
export class DenyCommand {
|
|
constructor(
|
|
private organizationService: OrganizationService,
|
|
private organizationAuthRequestService: OrganizationAuthRequestService,
|
|
private accountServcie: AccountService,
|
|
) {}
|
|
|
|
async run(organizationId: string, id: string): Promise<Response> {
|
|
if (organizationId != null) {
|
|
organizationId = organizationId.toLowerCase();
|
|
}
|
|
|
|
if (!Utils.isGuid(organizationId)) {
|
|
return Response.badRequest("`" + organizationId + "` is not a GUID.");
|
|
}
|
|
|
|
if (id != null) {
|
|
id = id.toLowerCase();
|
|
}
|
|
|
|
if (!Utils.isGuid(id)) {
|
|
return Response.badRequest("`" + id + "` is not a GUID.");
|
|
}
|
|
|
|
const userId = await firstValueFrom(this.accountServcie.activeAccount$.pipe(map((a) => a?.id)));
|
|
|
|
if (!userId) {
|
|
return Response.badRequest("No user found.");
|
|
}
|
|
|
|
const organization = await firstValueFrom(
|
|
this.organizationService
|
|
.organizations$(userId)
|
|
.pipe(map((organizations) => organizations.find((o) => o.id === organizationId))),
|
|
);
|
|
if (!organization?.canManageUsersPassword) {
|
|
return Response.error(
|
|
"You do not have permission to approve pending device authorization requests.",
|
|
);
|
|
}
|
|
|
|
try {
|
|
const pendingRequests =
|
|
await this.organizationAuthRequestService.listPendingRequests(organizationId);
|
|
|
|
const request = pendingRequests.find((r) => r.id == id);
|
|
if (request == null) {
|
|
return Response.error("The request id is invalid.");
|
|
}
|
|
|
|
await this.organizationAuthRequestService.denyPendingRequest(organizationId, id);
|
|
return Response.success();
|
|
} catch (e) {
|
|
return Response.error(e);
|
|
}
|
|
}
|
|
|
|
static create(serviceContainer: ServiceContainer) {
|
|
return new DenyCommand(
|
|
serviceContainer.organizationService,
|
|
serviceContainer.organizationAuthRequestService,
|
|
serviceContainer.accountService,
|
|
);
|
|
}
|
|
}
|