mirror of
https://github.com/bitwarden/browser
synced 2025-12-22 11:13:46 +00:00
* first pass at adding fingerprint phrase to auth requests * Moved call to getFingerprint into the service layer. Added a new method for getting auth requests. Updated tests. * Fixing the import * Renaming to WithFingerprint
69 lines
2.4 KiB
TypeScript
69 lines
2.4 KiB
TypeScript
import { firstValueFrom, map } from "rxjs";
|
|
|
|
import { OrganizationAuthRequestService } from "@bitwarden/bit-common/admin-console/auth-requests";
|
|
import { Response } from "@bitwarden/cli/models/response";
|
|
import { ListResponse } from "@bitwarden/cli/models/response/list.response";
|
|
import { OrganizationService } from "@bitwarden/common/admin-console/abstractions/organization/organization.service.abstraction";
|
|
import { AccountService } from "@bitwarden/common/auth/abstractions/account.service";
|
|
import { getUserId } from "@bitwarden/common/auth/services/account.service";
|
|
import { Utils } from "@bitwarden/common/platform/misc/utils";
|
|
|
|
import { ServiceContainer } from "../../service-container";
|
|
|
|
import { PendingAuthRequestResponse } from "./pending-auth-request.response";
|
|
|
|
export class ListCommand {
|
|
constructor(
|
|
private organizationAuthRequestService: OrganizationAuthRequestService,
|
|
private organizationService: OrganizationService,
|
|
private accountService: AccountService,
|
|
) {}
|
|
|
|
async run(organizationId: string): Promise<Response> {
|
|
if (organizationId != null) {
|
|
organizationId = organizationId.toLowerCase();
|
|
}
|
|
|
|
if (!Utils.isGuid(organizationId)) {
|
|
return Response.badRequest("`" + organizationId + "` is not a GUID.");
|
|
}
|
|
|
|
const userId = await firstValueFrom(getUserId(this.accountService.activeAccount$));
|
|
|
|
if (!userId) {
|
|
return Response.badRequest("No user found.");
|
|
}
|
|
|
|
const organization = await firstValueFrom(
|
|
this.organizationService
|
|
.organizations$(userId)
|
|
.pipe(map((organizations) => organizations.find((o) => o.id === organizationId))),
|
|
);
|
|
if (!organization?.canManageUsersPassword) {
|
|
return Response.error(
|
|
"You do not have permission to approve pending device authorization requests.",
|
|
);
|
|
}
|
|
|
|
try {
|
|
const requests =
|
|
await this.organizationAuthRequestService.listPendingRequestsWithFingerprint(
|
|
organizationId,
|
|
);
|
|
|
|
const res = new ListResponse(requests.map((r) => new PendingAuthRequestResponse(r)));
|
|
return Response.success(res);
|
|
} catch (e) {
|
|
return Response.error(e);
|
|
}
|
|
}
|
|
|
|
static create(serviceContainer: ServiceContainer) {
|
|
return new ListCommand(
|
|
serviceContainer.organizationAuthRequestService,
|
|
serviceContainer.organizationService,
|
|
serviceContainer.accountService,
|
|
);
|
|
}
|
|
}
|