mirror of
https://github.com/bitwarden/server
synced 2026-01-28 15:23:38 +00:00
Merge branch 'main' into ac/pm-23768/server-public-api---add-restore/revoke-for-members
This commit is contained in:
@@ -6,6 +6,7 @@ using Bit.Api.Models.Public.Response;
|
||||
using Bit.Core.AdminConsole.Entities;
|
||||
using Bit.Core.AdminConsole.Repositories;
|
||||
using Bit.Core.Billing.Enums;
|
||||
using Bit.Core.Entities;
|
||||
using Bit.Core.Enums;
|
||||
using Bit.Core.Models.Data;
|
||||
using Bit.Core.Platform.Push;
|
||||
@@ -114,4 +115,64 @@ public class CollectionsControllerTests : IClassFixture<ApiApplicationFactory>,
|
||||
Assert.NotEmpty(result.Item2.Groups);
|
||||
Assert.NotEmpty(result.Item2.Users);
|
||||
}
|
||||
|
||||
[Fact]
|
||||
public async Task List_ExcludesDefaultUserCollections_IncludesGroupsAndUsers()
|
||||
{
|
||||
// Arrange
|
||||
var collectionRepository = _factory.GetService<ICollectionRepository>();
|
||||
var groupRepository = _factory.GetService<IGroupRepository>();
|
||||
|
||||
var defaultCollection = new Collection
|
||||
{
|
||||
OrganizationId = _organization.Id,
|
||||
Name = "My Items",
|
||||
Type = CollectionType.DefaultUserCollection
|
||||
};
|
||||
await collectionRepository.CreateAsync(defaultCollection, null, null);
|
||||
|
||||
var group = await groupRepository.CreateAsync(new Group
|
||||
{
|
||||
OrganizationId = _organization.Id,
|
||||
Name = "Test Group",
|
||||
ExternalId = $"test-group-{Guid.NewGuid()}",
|
||||
});
|
||||
|
||||
var (_, user) = await OrganizationTestHelpers.CreateNewUserWithAccountAsync(
|
||||
_factory,
|
||||
_organization.Id,
|
||||
OrganizationUserType.User);
|
||||
|
||||
var sharedCollection = await OrganizationTestHelpers.CreateCollectionAsync(
|
||||
_factory,
|
||||
_organization.Id,
|
||||
"Shared Collection with Access",
|
||||
externalId: "shared-collection-with-access",
|
||||
groups:
|
||||
[
|
||||
new CollectionAccessSelection { Id = group.Id, ReadOnly = false, HidePasswords = false, Manage = true }
|
||||
],
|
||||
users:
|
||||
[
|
||||
new CollectionAccessSelection { Id = user.Id, ReadOnly = true, HidePasswords = true, Manage = false }
|
||||
]);
|
||||
|
||||
// Act
|
||||
var response = await _client.GetFromJsonAsync<ListResponseModel<CollectionResponseModel>>("public/collections");
|
||||
|
||||
// Assert
|
||||
Assert.NotNull(response);
|
||||
|
||||
Assert.DoesNotContain(response.Data, c => c.Id == defaultCollection.Id);
|
||||
|
||||
var collectionResponse = response.Data.First(c => c.Id == sharedCollection.Id);
|
||||
Assert.NotNull(collectionResponse.Groups);
|
||||
Assert.Single(collectionResponse.Groups);
|
||||
|
||||
var groupResponse = collectionResponse.Groups.First();
|
||||
Assert.Equal(group.Id, groupResponse.Id);
|
||||
Assert.False(groupResponse.ReadOnly);
|
||||
Assert.False(groupResponse.HidePasswords);
|
||||
Assert.True(groupResponse.Manage);
|
||||
}
|
||||
}
|
||||
|
||||
@@ -280,7 +280,7 @@ public class UpcomingInvoiceHandlerTests
|
||||
email.ToEmails.Contains("user@example.com") &&
|
||||
email.Subject == "Your Bitwarden Premium renewal is updating" &&
|
||||
email.View.BaseMonthlyRenewalPrice == (plan.Seat.Price / 12).ToString("C", new CultureInfo("en-US")) &&
|
||||
email.View.DiscountedMonthlyRenewalPrice == (discountedPrice / 12).ToString("C", new CultureInfo("en-US")) &&
|
||||
email.View.DiscountedAnnualRenewalPrice == discountedPrice.ToString("C", new CultureInfo("en-US")) &&
|
||||
email.View.DiscountAmount == $"{coupon.PercentOff}%"
|
||||
));
|
||||
}
|
||||
@@ -2436,7 +2436,7 @@ public class UpcomingInvoiceHandlerTests
|
||||
email.Subject == "Your Bitwarden Premium renewal is updating" &&
|
||||
email.View.BaseMonthlyRenewalPrice == (plan.Seat.Price / 12).ToString("C", new CultureInfo("en-US")) &&
|
||||
email.View.DiscountAmount == "30%" &&
|
||||
email.View.DiscountedMonthlyRenewalPrice == (expectedDiscountedPrice / 12).ToString("C", new CultureInfo("en-US"))
|
||||
email.View.DiscountedAnnualRenewalPrice == expectedDiscountedPrice.ToString("C", new CultureInfo("en-US"))
|
||||
));
|
||||
|
||||
await _mailService.DidNotReceive().SendInvoiceUpcoming(
|
||||
|
||||
@@ -715,6 +715,39 @@ public class RestoreOrganizationUserCommandTests
|
||||
Arg.Is<OrganizationUserStatusType>(x => x != OrganizationUserStatusType.Revoked));
|
||||
}
|
||||
|
||||
[Theory, BitAutoData]
|
||||
public async Task RestoreUser_InvitedUserInFreeOrganization_Success(
|
||||
Organization organization,
|
||||
[OrganizationUser(OrganizationUserStatusType.Confirmed, OrganizationUserType.Owner)] OrganizationUser owner,
|
||||
[OrganizationUser(OrganizationUserStatusType.Revoked)] OrganizationUser organizationUser,
|
||||
SutProvider<RestoreOrganizationUserCommand> sutProvider)
|
||||
{
|
||||
organization.PlanType = PlanType.Free;
|
||||
organizationUser.UserId = null;
|
||||
organizationUser.Key = null;
|
||||
organizationUser.Status = OrganizationUserStatusType.Revoked;
|
||||
|
||||
RestoreUser_Setup(organization, owner, organizationUser, sutProvider);
|
||||
sutProvider.GetDependency<IOrganizationRepository>()
|
||||
.GetOccupiedSeatCountByOrganizationIdAsync(organization.Id).Returns(new OrganizationSeatCounts
|
||||
{
|
||||
Sponsored = 0,
|
||||
Users = 1
|
||||
});
|
||||
|
||||
await sutProvider.Sut.RestoreUserAsync(organizationUser, owner.Id);
|
||||
|
||||
await sutProvider.GetDependency<IOrganizationUserRepository>()
|
||||
.Received(1)
|
||||
.RestoreAsync(organizationUser.Id, OrganizationUserStatusType.Invited);
|
||||
await sutProvider.GetDependency<IEventService>()
|
||||
.Received(1)
|
||||
.LogOrganizationUserEventAsync(organizationUser, EventType.OrganizationUser_Restored);
|
||||
await sutProvider.GetDependency<IPushNotificationService>()
|
||||
.DidNotReceiveWithAnyArgs()
|
||||
.PushSyncOrgKeysAsync(Arg.Any<Guid>());
|
||||
}
|
||||
|
||||
[Theory, BitAutoData]
|
||||
public async Task RestoreUsers_Success(Organization organization,
|
||||
[OrganizationUser(OrganizationUserStatusType.Confirmed, OrganizationUserType.Owner)] OrganizationUser owner,
|
||||
|
||||
@@ -0,0 +1,153 @@
|
||||
using Bit.Core.Auth.UserFeatures.EmergencyAccess.Mail;
|
||||
using Bit.Core.Models.Mail;
|
||||
using Bit.Core.Platform.Mail.Delivery;
|
||||
using Bit.Core.Platform.Mail.Mailer;
|
||||
using Bit.Test.Common.AutoFixture.Attributes;
|
||||
using Microsoft.Extensions.Logging;
|
||||
using NSubstitute;
|
||||
using Xunit;
|
||||
using GlobalSettings = Bit.Core.Settings.GlobalSettings;
|
||||
|
||||
namespace Bit.Core.Test.Auth.UserFeatures.EmergencyAccess;
|
||||
|
||||
[SutProviderCustomize]
|
||||
public class EmergencyAccessMailTests
|
||||
{
|
||||
// Constant values for all Emergency Access emails
|
||||
private const string _emergencyAccessHelpUrl = "https://bitwarden.com/help/emergency-access/";
|
||||
private const string _emergencyAccessMailSubject = "Emergency contacts removed";
|
||||
|
||||
/// <summary>
|
||||
/// Documents how to construct and send the emergency access removal email.
|
||||
/// 1. Inject IMailer into their command/service
|
||||
/// 2. Construct EmergencyAccessRemoveGranteesMail as shown below
|
||||
/// 3. Call mailer.SendEmail(mail)
|
||||
/// </summary>
|
||||
[Theory, BitAutoData]
|
||||
public async Task SendEmergencyAccessRemoveGranteesEmail_SingleGrantee_Success(
|
||||
string grantorEmail,
|
||||
string granteeName)
|
||||
{
|
||||
// Arrange
|
||||
var logger = Substitute.For<ILogger<HandlebarMailRenderer>>();
|
||||
var globalSettings = new GlobalSettings { SelfHosted = false };
|
||||
var deliveryService = Substitute.For<IMailDeliveryService>();
|
||||
var mailer = new Mailer(
|
||||
new HandlebarMailRenderer(logger, globalSettings),
|
||||
deliveryService);
|
||||
|
||||
var mail = new EmergencyAccessRemoveGranteesMail
|
||||
{
|
||||
ToEmails = [grantorEmail],
|
||||
View = new EmergencyAccessRemoveGranteesMailView
|
||||
{
|
||||
RemovedGranteeNames = [granteeName]
|
||||
}
|
||||
};
|
||||
|
||||
MailMessage sentMessage = null;
|
||||
await deliveryService.SendEmailAsync(Arg.Do<MailMessage>(message =>
|
||||
sentMessage = message
|
||||
));
|
||||
|
||||
// Act
|
||||
await mailer.SendEmail(mail);
|
||||
|
||||
// Assert
|
||||
Assert.NotNull(sentMessage);
|
||||
Assert.Contains(grantorEmail, sentMessage.ToEmails);
|
||||
|
||||
// Verify the content contains the grantee name
|
||||
Assert.Contains(granteeName, sentMessage.TextContent);
|
||||
Assert.Contains(granteeName, sentMessage.HtmlContent);
|
||||
}
|
||||
|
||||
/// <summary>
|
||||
/// Documents handling multiple removed grantees in a single email.
|
||||
/// </summary>
|
||||
[Theory, BitAutoData]
|
||||
public async Task SendEmergencyAccessRemoveGranteesEmail_MultipleGrantees_RendersAllNames(
|
||||
string grantorEmail)
|
||||
{
|
||||
// Arrange
|
||||
var logger = Substitute.For<ILogger<HandlebarMailRenderer>>();
|
||||
var globalSettings = new GlobalSettings { SelfHosted = false };
|
||||
var deliveryService = Substitute.For<IMailDeliveryService>();
|
||||
var mailer = new Mailer(
|
||||
new HandlebarMailRenderer(logger, globalSettings),
|
||||
deliveryService);
|
||||
|
||||
var granteeNames = new[] { "Alice", "Bob", "Carol" };
|
||||
|
||||
var mail = new EmergencyAccessRemoveGranteesMail
|
||||
{
|
||||
ToEmails = [grantorEmail],
|
||||
View = new EmergencyAccessRemoveGranteesMailView
|
||||
{
|
||||
RemovedGranteeNames = granteeNames
|
||||
}
|
||||
};
|
||||
|
||||
MailMessage sentMessage = null;
|
||||
await deliveryService.SendEmailAsync(Arg.Do<MailMessage>(message =>
|
||||
sentMessage = message
|
||||
));
|
||||
|
||||
// Act
|
||||
await mailer.SendEmail(mail);
|
||||
|
||||
// Assert - All grantee names should appear in the email
|
||||
Assert.NotNull(sentMessage);
|
||||
foreach (var granteeName in granteeNames)
|
||||
{
|
||||
Assert.Contains(granteeName, sentMessage.TextContent);
|
||||
Assert.Contains(granteeName, sentMessage.HtmlContent);
|
||||
}
|
||||
}
|
||||
|
||||
/// <summary>
|
||||
/// Validates the required GranteeNames for the email view model.
|
||||
/// </summary>
|
||||
[Theory, BitAutoData]
|
||||
public void EmergencyAccessRemoveGranteesMailView_GranteeNames_AreRequired(
|
||||
string grantorEmail)
|
||||
{
|
||||
// Arrange - Shows the minimum required to construct the email
|
||||
var mail = new EmergencyAccessRemoveGranteesMail
|
||||
{
|
||||
ToEmails = [grantorEmail], // Required: who to send to
|
||||
View = new EmergencyAccessRemoveGranteesMailView
|
||||
{
|
||||
// Required: at least one removed grantee name
|
||||
RemovedGranteeNames = ["Example Grantee"]
|
||||
}
|
||||
};
|
||||
|
||||
// Assert
|
||||
Assert.NotNull(mail);
|
||||
Assert.NotNull(mail.View);
|
||||
Assert.NotEmpty(mail.View.RemovedGranteeNames);
|
||||
}
|
||||
|
||||
/// <summary>
|
||||
/// Ensure consistency with help pages link and email subject.
|
||||
/// </summary>
|
||||
/// <param name="grantorEmail"></param>
|
||||
/// <param name="granteeName"></param>
|
||||
[Theory, BitAutoData]
|
||||
public void EmergencyAccessRemoveGranteesMailView_SubjectAndHelpLink_MatchesExpectedValues(string grantorEmail, string granteeName)
|
||||
{
|
||||
// Arrange
|
||||
var mail = new EmergencyAccessRemoveGranteesMail
|
||||
{
|
||||
ToEmails = [grantorEmail],
|
||||
View = new EmergencyAccessRemoveGranteesMailView { RemovedGranteeNames = [granteeName] }
|
||||
};
|
||||
|
||||
// Assert
|
||||
Assert.NotNull(mail);
|
||||
Assert.NotNull(mail.View);
|
||||
Assert.Equal(_emergencyAccessMailSubject, mail.Subject);
|
||||
Assert.Equal(_emergencyAccessHelpUrl, mail.View.EmergencyAccessHelpPageUrl);
|
||||
}
|
||||
}
|
||||
@@ -1,11 +1,10 @@
|
||||
using Bit.Core.AdminConsole.OrganizationFeatures.OrganizationUsers.Interfaces;
|
||||
using Bit.Core.AdminConsole.Repositories;
|
||||
using Bit.Core.Auth.Entities;
|
||||
using Bit.Core.Auth.Enums;
|
||||
using Bit.Core.Auth.Models;
|
||||
using Bit.Core.Auth.Models.Business.Tokenables;
|
||||
using Bit.Core.Auth.Models.Data;
|
||||
using Bit.Core.Auth.Services;
|
||||
using Bit.Core.Auth.UserFeatures.EmergencyAccess;
|
||||
using Bit.Core.Entities;
|
||||
using Bit.Core.Enums;
|
||||
using Bit.Core.Exceptions;
|
||||
@@ -17,7 +16,7 @@ using Bit.Test.Common.AutoFixture.Attributes;
|
||||
using NSubstitute;
|
||||
using Xunit;
|
||||
|
||||
namespace Bit.Core.Test.Auth.Services;
|
||||
namespace Bit.Core.Test.Auth.UserFeatures.EmergencyAccess;
|
||||
|
||||
[SutProviderCustomize]
|
||||
public class EmergencyAccessServiceTests
|
||||
@@ -68,13 +67,13 @@ public class EmergencyAccessServiceTests
|
||||
Assert.Equal(EmergencyAccessStatusType.Invited, result.Status);
|
||||
await sutProvider.GetDependency<IEmergencyAccessRepository>()
|
||||
.Received(1)
|
||||
.CreateAsync(Arg.Any<EmergencyAccess>());
|
||||
.CreateAsync(Arg.Any<Core.Auth.Entities.EmergencyAccess>());
|
||||
sutProvider.GetDependency<IDataProtectorTokenFactory<EmergencyAccessInviteTokenable>>()
|
||||
.Received(1)
|
||||
.Protect(Arg.Any<EmergencyAccessInviteTokenable>());
|
||||
await sutProvider.GetDependency<IMailService>()
|
||||
.Received(1)
|
||||
.SendEmergencyAccessInviteEmailAsync(Arg.Any<EmergencyAccess>(), Arg.Any<string>(), Arg.Any<string>());
|
||||
.SendEmergencyAccessInviteEmailAsync(Arg.Any<Core.Auth.Entities.EmergencyAccess>(), Arg.Any<string>(), Arg.Any<string>());
|
||||
}
|
||||
|
||||
[Theory, BitAutoData]
|
||||
@@ -98,7 +97,7 @@ public class EmergencyAccessServiceTests
|
||||
User invitingUser,
|
||||
Guid emergencyAccessId)
|
||||
{
|
||||
EmergencyAccess emergencyAccess = null;
|
||||
Core.Auth.Entities.EmergencyAccess emergencyAccess = null;
|
||||
|
||||
sutProvider.GetDependency<IEmergencyAccessRepository>()
|
||||
.GetByIdAsync(Arg.Any<Guid>())
|
||||
@@ -119,7 +118,7 @@ public class EmergencyAccessServiceTests
|
||||
User invitingUser,
|
||||
Guid emergencyAccessId)
|
||||
{
|
||||
var emergencyAccess = new EmergencyAccess
|
||||
var emergencyAccess = new Core.Auth.Entities.EmergencyAccess
|
||||
{
|
||||
Status = EmergencyAccessStatusType.Invited,
|
||||
GrantorId = Guid.NewGuid(),
|
||||
@@ -148,7 +147,7 @@ public class EmergencyAccessServiceTests
|
||||
User invitingUser,
|
||||
Guid emergencyAccessId)
|
||||
{
|
||||
var emergencyAccess = new EmergencyAccess
|
||||
var emergencyAccess = new Core.Auth.Entities.EmergencyAccess
|
||||
{
|
||||
Status = statusType,
|
||||
GrantorId = invitingUser.Id,
|
||||
@@ -172,7 +171,7 @@ public class EmergencyAccessServiceTests
|
||||
User invitingUser,
|
||||
Guid emergencyAccessId)
|
||||
{
|
||||
var emergencyAccess = new EmergencyAccess
|
||||
var emergencyAccess = new Core.Auth.Entities.EmergencyAccess
|
||||
{
|
||||
Status = EmergencyAccessStatusType.Invited,
|
||||
GrantorId = invitingUser.Id,
|
||||
@@ -194,7 +193,7 @@ public class EmergencyAccessServiceTests
|
||||
public async Task AcceptUserAsync_EmergencyAccessNull_ThrowsBadRequest(
|
||||
SutProvider<EmergencyAccessService> sutProvider, User acceptingUser, string token)
|
||||
{
|
||||
EmergencyAccess emergencyAccess = null;
|
||||
Core.Auth.Entities.EmergencyAccess emergencyAccess = null;
|
||||
sutProvider.GetDependency<IEmergencyAccessRepository>()
|
||||
.GetByIdAsync(Arg.Any<Guid>())
|
||||
.Returns(emergencyAccess);
|
||||
@@ -209,7 +208,7 @@ public class EmergencyAccessServiceTests
|
||||
public async Task AcceptUserAsync_CannotUnprotectToken_ThrowsBadRequest(
|
||||
SutProvider<EmergencyAccessService> sutProvider,
|
||||
User acceptingUser,
|
||||
EmergencyAccess emergencyAccess,
|
||||
Core.Auth.Entities.EmergencyAccess emergencyAccess,
|
||||
string token)
|
||||
{
|
||||
sutProvider.GetDependency<IEmergencyAccessRepository>()
|
||||
@@ -230,8 +229,8 @@ public class EmergencyAccessServiceTests
|
||||
public async Task AcceptUserAsync_TokenDataInvalid_ThrowsBadRequest(
|
||||
SutProvider<EmergencyAccessService> sutProvider,
|
||||
User acceptingUser,
|
||||
EmergencyAccess emergencyAccess,
|
||||
EmergencyAccess wrongEmergencyAccess,
|
||||
Core.Auth.Entities.EmergencyAccess emergencyAccess,
|
||||
Core.Auth.Entities.EmergencyAccess wrongEmergencyAccess,
|
||||
string token)
|
||||
{
|
||||
sutProvider.GetDependency<IEmergencyAccessRepository>()
|
||||
@@ -257,7 +256,7 @@ public class EmergencyAccessServiceTests
|
||||
public async Task AcceptUserAsync_AcceptedStatus_ThrowsBadRequest(
|
||||
SutProvider<EmergencyAccessService> sutProvider,
|
||||
User acceptingUser,
|
||||
EmergencyAccess emergencyAccess,
|
||||
Core.Auth.Entities.EmergencyAccess emergencyAccess,
|
||||
string token)
|
||||
{
|
||||
emergencyAccess.Status = EmergencyAccessStatusType.Accepted;
|
||||
@@ -284,7 +283,7 @@ public class EmergencyAccessServiceTests
|
||||
public async Task AcceptUserAsync_NotInvitedStatus_ThrowsBadRequest(
|
||||
SutProvider<EmergencyAccessService> sutProvider,
|
||||
User acceptingUser,
|
||||
EmergencyAccess emergencyAccess,
|
||||
Core.Auth.Entities.EmergencyAccess emergencyAccess,
|
||||
string token)
|
||||
{
|
||||
emergencyAccess.Status = EmergencyAccessStatusType.Confirmed;
|
||||
@@ -311,7 +310,7 @@ public class EmergencyAccessServiceTests
|
||||
public async Task AcceptUserAsync_EmergencyAccessEmailDoesNotMatch_ThrowsBadRequest(
|
||||
SutProvider<EmergencyAccessService> sutProvider,
|
||||
User acceptingUser,
|
||||
EmergencyAccess emergencyAccess,
|
||||
Core.Auth.Entities.EmergencyAccess emergencyAccess,
|
||||
string token)
|
||||
{
|
||||
emergencyAccess.Status = EmergencyAccessStatusType.Invited;
|
||||
@@ -339,7 +338,7 @@ public class EmergencyAccessServiceTests
|
||||
SutProvider<EmergencyAccessService> sutProvider,
|
||||
User acceptingUser,
|
||||
User invitingUser,
|
||||
EmergencyAccess emergencyAccess,
|
||||
Core.Auth.Entities.EmergencyAccess emergencyAccess,
|
||||
string token)
|
||||
{
|
||||
emergencyAccess.Status = EmergencyAccessStatusType.Invited;
|
||||
@@ -364,7 +363,7 @@ public class EmergencyAccessServiceTests
|
||||
|
||||
await sutProvider.GetDependency<IEmergencyAccessRepository>()
|
||||
.Received(1)
|
||||
.ReplaceAsync(Arg.Is<EmergencyAccess>(x => x.Status == EmergencyAccessStatusType.Accepted));
|
||||
.ReplaceAsync(Arg.Is<Core.Auth.Entities.EmergencyAccess>(x => x.Status == EmergencyAccessStatusType.Accepted));
|
||||
|
||||
await sutProvider.GetDependency<IMailService>()
|
||||
.Received(1)
|
||||
@@ -375,11 +374,11 @@ public class EmergencyAccessServiceTests
|
||||
public async Task DeleteAsync_EmergencyAccessNull_ThrowsBadRequest(
|
||||
SutProvider<EmergencyAccessService> sutProvider,
|
||||
User invitingUser,
|
||||
EmergencyAccess emergencyAccess)
|
||||
Core.Auth.Entities.EmergencyAccess emergencyAccess)
|
||||
{
|
||||
sutProvider.GetDependency<IEmergencyAccessRepository>()
|
||||
.GetByIdAsync(Arg.Any<Guid>())
|
||||
.Returns((EmergencyAccess)null);
|
||||
.Returns((Core.Auth.Entities.EmergencyAccess)null);
|
||||
|
||||
var exception = await Assert.ThrowsAsync<BadRequestException>(
|
||||
() => sutProvider.Sut.DeleteAsync(emergencyAccess.Id, invitingUser.Id));
|
||||
@@ -391,7 +390,7 @@ public class EmergencyAccessServiceTests
|
||||
public async Task DeleteAsync_EmergencyAccessGrantorIdNotEqual_ThrowsBadRequest(
|
||||
SutProvider<EmergencyAccessService> sutProvider,
|
||||
User invitingUser,
|
||||
EmergencyAccess emergencyAccess)
|
||||
Core.Auth.Entities.EmergencyAccess emergencyAccess)
|
||||
{
|
||||
emergencyAccess.GrantorId = Guid.NewGuid();
|
||||
sutProvider.GetDependency<IEmergencyAccessRepository>()
|
||||
@@ -408,7 +407,7 @@ public class EmergencyAccessServiceTests
|
||||
public async Task DeleteAsync_EmergencyAccessGranteeIdNotEqual_ThrowsBadRequest(
|
||||
SutProvider<EmergencyAccessService> sutProvider,
|
||||
User invitingUser,
|
||||
EmergencyAccess emergencyAccess)
|
||||
Core.Auth.Entities.EmergencyAccess emergencyAccess)
|
||||
{
|
||||
emergencyAccess.GranteeId = Guid.NewGuid();
|
||||
sutProvider.GetDependency<IEmergencyAccessRepository>()
|
||||
@@ -425,7 +424,7 @@ public class EmergencyAccessServiceTests
|
||||
public async Task DeleteAsync_EmergencyAccessIsDeleted_Success(
|
||||
SutProvider<EmergencyAccessService> sutProvider,
|
||||
User user,
|
||||
EmergencyAccess emergencyAccess)
|
||||
Core.Auth.Entities.EmergencyAccess emergencyAccess)
|
||||
{
|
||||
emergencyAccess.GranteeId = user.Id;
|
||||
emergencyAccess.GrantorId = user.Id;
|
||||
@@ -443,7 +442,7 @@ public class EmergencyAccessServiceTests
|
||||
[Theory, BitAutoData]
|
||||
public async Task ConfirmUserAsync_EmergencyAccessNull_ThrowsBadRequest(
|
||||
SutProvider<EmergencyAccessService> sutProvider,
|
||||
EmergencyAccess emergencyAccess,
|
||||
Core.Auth.Entities.EmergencyAccess emergencyAccess,
|
||||
string key,
|
||||
User grantorUser)
|
||||
{
|
||||
@@ -451,7 +450,7 @@ public class EmergencyAccessServiceTests
|
||||
emergencyAccess.Status = EmergencyAccessStatusType.RecoveryInitiated;
|
||||
sutProvider.GetDependency<IEmergencyAccessRepository>()
|
||||
.GetByIdAsync(Arg.Any<Guid>())
|
||||
.Returns((EmergencyAccess)null);
|
||||
.Returns((Core.Auth.Entities.EmergencyAccess)null);
|
||||
|
||||
var exception = await Assert.ThrowsAsync<BadRequestException>(
|
||||
() => sutProvider.Sut.ConfirmUserAsync(emergencyAccess.Id, key, grantorUser.Id));
|
||||
@@ -463,7 +462,7 @@ public class EmergencyAccessServiceTests
|
||||
[Theory, BitAutoData]
|
||||
public async Task ConfirmUserAsync_EmergencyAccessStatusIsNotAccepted_ThrowsBadRequest(
|
||||
SutProvider<EmergencyAccessService> sutProvider,
|
||||
EmergencyAccess emergencyAccess,
|
||||
Core.Auth.Entities.EmergencyAccess emergencyAccess,
|
||||
string key,
|
||||
User grantorUser)
|
||||
{
|
||||
@@ -484,7 +483,7 @@ public class EmergencyAccessServiceTests
|
||||
[Theory, BitAutoData]
|
||||
public async Task ConfirmUserAsync_EmergencyAccessGrantorIdNotEqualToConfirmingUserId_ThrowsBadRequest(
|
||||
SutProvider<EmergencyAccessService> sutProvider,
|
||||
EmergencyAccess emergencyAccess,
|
||||
Core.Auth.Entities.EmergencyAccess emergencyAccess,
|
||||
string key,
|
||||
User grantorUser)
|
||||
{
|
||||
@@ -505,7 +504,7 @@ public class EmergencyAccessServiceTests
|
||||
SutProvider<EmergencyAccessService> sutProvider, User confirmingUser, string key)
|
||||
{
|
||||
confirmingUser.UsesKeyConnector = true;
|
||||
var emergencyAccess = new EmergencyAccess
|
||||
var emergencyAccess = new Core.Auth.Entities.EmergencyAccess
|
||||
{
|
||||
Status = EmergencyAccessStatusType.Accepted,
|
||||
GrantorId = confirmingUser.Id,
|
||||
@@ -530,7 +529,7 @@ public class EmergencyAccessServiceTests
|
||||
[Theory, BitAutoData]
|
||||
public async Task ConfirmUserAsync_ConfirmsAndReplacesEmergencyAccess_Success(
|
||||
SutProvider<EmergencyAccessService> sutProvider,
|
||||
EmergencyAccess emergencyAccess,
|
||||
Core.Auth.Entities.EmergencyAccess emergencyAccess,
|
||||
string key,
|
||||
User grantorUser,
|
||||
User granteeUser)
|
||||
@@ -553,7 +552,7 @@ public class EmergencyAccessServiceTests
|
||||
|
||||
await sutProvider.GetDependency<IEmergencyAccessRepository>()
|
||||
.Received(1)
|
||||
.ReplaceAsync(Arg.Is<EmergencyAccess>(x => x.Status == EmergencyAccessStatusType.Confirmed));
|
||||
.ReplaceAsync(Arg.Is<Core.Auth.Entities.EmergencyAccess>(x => x.Status == EmergencyAccessStatusType.Confirmed));
|
||||
|
||||
await sutProvider.GetDependency<IMailService>()
|
||||
.Received(1)
|
||||
@@ -564,7 +563,7 @@ public class EmergencyAccessServiceTests
|
||||
public async Task SaveAsync_PremiumCannotUpdate_ThrowsBadRequest(
|
||||
SutProvider<EmergencyAccessService> sutProvider, User savingUser)
|
||||
{
|
||||
var emergencyAccess = new EmergencyAccess
|
||||
var emergencyAccess = new Core.Auth.Entities.EmergencyAccess
|
||||
{
|
||||
Type = EmergencyAccessType.Takeover,
|
||||
GrantorId = savingUser.Id,
|
||||
@@ -586,7 +585,7 @@ public class EmergencyAccessServiceTests
|
||||
SutProvider<EmergencyAccessService> sutProvider, User savingUser)
|
||||
{
|
||||
savingUser.Premium = true;
|
||||
var emergencyAccess = new EmergencyAccess
|
||||
var emergencyAccess = new Core.Auth.Entities.EmergencyAccess
|
||||
{
|
||||
Type = EmergencyAccessType.Takeover,
|
||||
GrantorId = new Guid(),
|
||||
@@ -611,7 +610,7 @@ public class EmergencyAccessServiceTests
|
||||
SutProvider<EmergencyAccessService> sutProvider, User grantorUser)
|
||||
{
|
||||
grantorUser.UsesKeyConnector = true;
|
||||
var emergencyAccess = new EmergencyAccess
|
||||
var emergencyAccess = new Core.Auth.Entities.EmergencyAccess
|
||||
{
|
||||
Type = EmergencyAccessType.Takeover,
|
||||
GrantorId = grantorUser.Id,
|
||||
@@ -633,7 +632,7 @@ public class EmergencyAccessServiceTests
|
||||
SutProvider<EmergencyAccessService> sutProvider, User grantorUser)
|
||||
{
|
||||
grantorUser.UsesKeyConnector = true;
|
||||
var emergencyAccess = new EmergencyAccess
|
||||
var emergencyAccess = new Core.Auth.Entities.EmergencyAccess
|
||||
{
|
||||
Type = EmergencyAccessType.View,
|
||||
GrantorId = grantorUser.Id,
|
||||
@@ -655,7 +654,7 @@ public class EmergencyAccessServiceTests
|
||||
SutProvider<EmergencyAccessService> sutProvider, User grantorUser)
|
||||
{
|
||||
grantorUser.UsesKeyConnector = false;
|
||||
var emergencyAccess = new EmergencyAccess
|
||||
var emergencyAccess = new Core.Auth.Entities.EmergencyAccess
|
||||
{
|
||||
Type = EmergencyAccessType.Takeover,
|
||||
GrantorId = grantorUser.Id,
|
||||
@@ -678,7 +677,7 @@ public class EmergencyAccessServiceTests
|
||||
{
|
||||
sutProvider.GetDependency<IEmergencyAccessRepository>()
|
||||
.GetByIdAsync(Arg.Any<Guid>())
|
||||
.Returns((EmergencyAccess)null);
|
||||
.Returns((Core.Auth.Entities.EmergencyAccess)null);
|
||||
|
||||
var exception = await Assert.ThrowsAsync<BadRequestException>(
|
||||
() => sutProvider.Sut.InitiateAsync(new Guid(), initiatingUser));
|
||||
@@ -692,7 +691,7 @@ public class EmergencyAccessServiceTests
|
||||
[Theory, BitAutoData]
|
||||
public async Task InitiateAsync_EmergencyAccessGranteeIdNotEqual_ThrowBadRequest(
|
||||
SutProvider<EmergencyAccessService> sutProvider,
|
||||
EmergencyAccess emergencyAccess,
|
||||
Core.Auth.Entities.EmergencyAccess emergencyAccess,
|
||||
User initiatingUser)
|
||||
{
|
||||
emergencyAccess.GranteeId = new Guid();
|
||||
@@ -712,7 +711,7 @@ public class EmergencyAccessServiceTests
|
||||
[Theory, BitAutoData]
|
||||
public async Task InitiateAsync_EmergencyAccessStatusIsNotConfirmed_ThrowBadRequest(
|
||||
SutProvider<EmergencyAccessService> sutProvider,
|
||||
EmergencyAccess emergencyAccess,
|
||||
Core.Auth.Entities.EmergencyAccess emergencyAccess,
|
||||
User initiatingUser)
|
||||
{
|
||||
emergencyAccess.GranteeId = initiatingUser.Id;
|
||||
@@ -735,7 +734,7 @@ public class EmergencyAccessServiceTests
|
||||
SutProvider<EmergencyAccessService> sutProvider, User initiatingUser, User grantor)
|
||||
{
|
||||
grantor.UsesKeyConnector = true;
|
||||
var emergencyAccess = new EmergencyAccess
|
||||
var emergencyAccess = new Core.Auth.Entities.EmergencyAccess
|
||||
{
|
||||
Status = EmergencyAccessStatusType.Confirmed,
|
||||
GranteeId = initiatingUser.Id,
|
||||
@@ -764,7 +763,7 @@ public class EmergencyAccessServiceTests
|
||||
SutProvider<EmergencyAccessService> sutProvider, User initiatingUser, User grantor)
|
||||
{
|
||||
grantor.UsesKeyConnector = true;
|
||||
var emergencyAccess = new EmergencyAccess
|
||||
var emergencyAccess = new Core.Auth.Entities.EmergencyAccess
|
||||
{
|
||||
Status = EmergencyAccessStatusType.Confirmed,
|
||||
GranteeId = initiatingUser.Id,
|
||||
@@ -783,14 +782,14 @@ public class EmergencyAccessServiceTests
|
||||
|
||||
await sutProvider.GetDependency<IEmergencyAccessRepository>()
|
||||
.Received(1)
|
||||
.ReplaceAsync(Arg.Is<EmergencyAccess>(x => x.Status == EmergencyAccessStatusType.RecoveryInitiated));
|
||||
.ReplaceAsync(Arg.Is<Core.Auth.Entities.EmergencyAccess>(x => x.Status == EmergencyAccessStatusType.RecoveryInitiated));
|
||||
}
|
||||
|
||||
[Theory, BitAutoData]
|
||||
public async Task InitiateAsync_RequestIsCorrect_Success(
|
||||
SutProvider<EmergencyAccessService> sutProvider, User initiatingUser, User grantor)
|
||||
{
|
||||
var emergencyAccess = new EmergencyAccess
|
||||
var emergencyAccess = new Core.Auth.Entities.EmergencyAccess
|
||||
{
|
||||
Status = EmergencyAccessStatusType.Confirmed,
|
||||
GranteeId = initiatingUser.Id,
|
||||
@@ -809,7 +808,7 @@ public class EmergencyAccessServiceTests
|
||||
|
||||
await sutProvider.GetDependency<IEmergencyAccessRepository>()
|
||||
.Received(1)
|
||||
.ReplaceAsync(Arg.Is<EmergencyAccess>(x => x.Status == EmergencyAccessStatusType.RecoveryInitiated));
|
||||
.ReplaceAsync(Arg.Is<Core.Auth.Entities.EmergencyAccess>(x => x.Status == EmergencyAccessStatusType.RecoveryInitiated));
|
||||
}
|
||||
|
||||
[Theory, BitAutoData]
|
||||
@@ -818,7 +817,7 @@ public class EmergencyAccessServiceTests
|
||||
{
|
||||
sutProvider.GetDependency<IEmergencyAccessRepository>()
|
||||
.GetByIdAsync(Arg.Any<Guid>())
|
||||
.Returns((EmergencyAccess)null);
|
||||
.Returns((Core.Auth.Entities.EmergencyAccess)null);
|
||||
|
||||
var exception = await Assert.ThrowsAsync<BadRequestException>(
|
||||
() => sutProvider.Sut.ApproveAsync(new Guid(), null));
|
||||
@@ -829,7 +828,7 @@ public class EmergencyAccessServiceTests
|
||||
[Theory, BitAutoData]
|
||||
public async Task ApproveAsync_EmergencyAccessGrantorIdNotEquatToApproving_ThrowsBadRequest(
|
||||
SutProvider<EmergencyAccessService> sutProvider,
|
||||
EmergencyAccess emergencyAccess,
|
||||
Core.Auth.Entities.EmergencyAccess emergencyAccess,
|
||||
User grantorUser)
|
||||
{
|
||||
emergencyAccess.Status = EmergencyAccessStatusType.RecoveryInitiated;
|
||||
@@ -851,7 +850,7 @@ public class EmergencyAccessServiceTests
|
||||
public async Task ApproveAsync_EmergencyAccessStatusNotRecoveryInitiated_ThrowsBadRequest(
|
||||
EmergencyAccessStatusType statusType,
|
||||
SutProvider<EmergencyAccessService> sutProvider,
|
||||
EmergencyAccess emergencyAccess,
|
||||
Core.Auth.Entities.EmergencyAccess emergencyAccess,
|
||||
User grantorUser)
|
||||
{
|
||||
emergencyAccess.GrantorId = grantorUser.Id;
|
||||
@@ -869,7 +868,7 @@ public class EmergencyAccessServiceTests
|
||||
[Theory, BitAutoData]
|
||||
public async Task ApproveAsync_Success(
|
||||
SutProvider<EmergencyAccessService> sutProvider,
|
||||
EmergencyAccess emergencyAccess,
|
||||
Core.Auth.Entities.EmergencyAccess emergencyAccess,
|
||||
User grantorUser,
|
||||
User granteeUser)
|
||||
{
|
||||
@@ -885,20 +884,20 @@ public class EmergencyAccessServiceTests
|
||||
await sutProvider.Sut.ApproveAsync(emergencyAccess.Id, grantorUser);
|
||||
await sutProvider.GetDependency<IEmergencyAccessRepository>()
|
||||
.Received(1)
|
||||
.ReplaceAsync(Arg.Is<EmergencyAccess>(x => x.Status == EmergencyAccessStatusType.RecoveryApproved));
|
||||
.ReplaceAsync(Arg.Is<Core.Auth.Entities.EmergencyAccess>(x => x.Status == EmergencyAccessStatusType.RecoveryApproved));
|
||||
}
|
||||
|
||||
[Theory, BitAutoData]
|
||||
public async Task RejectAsync_EmergencyAccessIdNull_ThrowsBadRequest(
|
||||
SutProvider<EmergencyAccessService> sutProvider,
|
||||
EmergencyAccess emergencyAccess,
|
||||
Core.Auth.Entities.EmergencyAccess emergencyAccess,
|
||||
User GrantorUser)
|
||||
{
|
||||
emergencyAccess.GrantorId = GrantorUser.Id;
|
||||
emergencyAccess.Status = EmergencyAccessStatusType.Accepted;
|
||||
sutProvider.GetDependency<IEmergencyAccessRepository>()
|
||||
.GetByIdAsync(Arg.Any<Guid>())
|
||||
.Returns((EmergencyAccess)null);
|
||||
.Returns((Core.Auth.Entities.EmergencyAccess)null);
|
||||
|
||||
var exception = await Assert.ThrowsAsync<BadRequestException>(
|
||||
() => sutProvider.Sut.RejectAsync(emergencyAccess.Id, GrantorUser));
|
||||
@@ -909,7 +908,7 @@ public class EmergencyAccessServiceTests
|
||||
[Theory, BitAutoData]
|
||||
public async Task RejectAsync_EmergencyAccessGrantorIdNotEqualToRequestUser_ThrowsBadRequest(
|
||||
SutProvider<EmergencyAccessService> sutProvider,
|
||||
EmergencyAccess emergencyAccess,
|
||||
Core.Auth.Entities.EmergencyAccess emergencyAccess,
|
||||
User GrantorUser)
|
||||
{
|
||||
emergencyAccess.Status = EmergencyAccessStatusType.Accepted;
|
||||
@@ -930,7 +929,7 @@ public class EmergencyAccessServiceTests
|
||||
public async Task RejectAsync_EmergencyAccessStatusNotValid_ThrowsBadRequest(
|
||||
EmergencyAccessStatusType statusType,
|
||||
SutProvider<EmergencyAccessService> sutProvider,
|
||||
EmergencyAccess emergencyAccess,
|
||||
Core.Auth.Entities.EmergencyAccess emergencyAccess,
|
||||
User GrantorUser)
|
||||
{
|
||||
emergencyAccess.GrantorId = GrantorUser.Id;
|
||||
@@ -951,7 +950,7 @@ public class EmergencyAccessServiceTests
|
||||
public async Task RejectAsync_Success(
|
||||
EmergencyAccessStatusType statusType,
|
||||
SutProvider<EmergencyAccessService> sutProvider,
|
||||
EmergencyAccess emergencyAccess,
|
||||
Core.Auth.Entities.EmergencyAccess emergencyAccess,
|
||||
User GrantorUser,
|
||||
User GranteeUser)
|
||||
{
|
||||
@@ -968,7 +967,7 @@ public class EmergencyAccessServiceTests
|
||||
|
||||
await sutProvider.GetDependency<IEmergencyAccessRepository>()
|
||||
.Received(1)
|
||||
.ReplaceAsync(Arg.Is<EmergencyAccess>(x => x.Status == EmergencyAccessStatusType.Confirmed));
|
||||
.ReplaceAsync(Arg.Is<Core.Auth.Entities.EmergencyAccess>(x => x.Status == EmergencyAccessStatusType.Confirmed));
|
||||
}
|
||||
|
||||
[Theory, BitAutoData]
|
||||
@@ -977,7 +976,7 @@ public class EmergencyAccessServiceTests
|
||||
{
|
||||
sutProvider.GetDependency<IEmergencyAccessRepository>()
|
||||
.GetByIdAsync(Arg.Any<Guid>())
|
||||
.Returns((EmergencyAccess)null);
|
||||
.Returns((Core.Auth.Entities.EmergencyAccess)null);
|
||||
|
||||
var exception = await Assert.ThrowsAsync<BadRequestException>(
|
||||
() => sutProvider.Sut.GetPoliciesAsync(default, default));
|
||||
@@ -992,7 +991,7 @@ public class EmergencyAccessServiceTests
|
||||
public async Task GetPoliciesAsync_RequestNotValidStatusType_ThrowsBadRequest(
|
||||
EmergencyAccessStatusType statusType,
|
||||
SutProvider<EmergencyAccessService> sutProvider,
|
||||
EmergencyAccess emergencyAccess,
|
||||
Core.Auth.Entities.EmergencyAccess emergencyAccess,
|
||||
User granteeUser)
|
||||
{
|
||||
emergencyAccess.GranteeId = granteeUser.Id;
|
||||
@@ -1010,7 +1009,7 @@ public class EmergencyAccessServiceTests
|
||||
[Theory, BitAutoData]
|
||||
public async Task GetPoliciesAsync_RequestNotValidType_ThrowsBadRequest(
|
||||
SutProvider<EmergencyAccessService> sutProvider,
|
||||
EmergencyAccess emergencyAccess,
|
||||
Core.Auth.Entities.EmergencyAccess emergencyAccess,
|
||||
User granteeUser)
|
||||
{
|
||||
emergencyAccess.GranteeId = granteeUser.Id;
|
||||
@@ -1032,7 +1031,7 @@ public class EmergencyAccessServiceTests
|
||||
public async Task GetPoliciesAsync_OrganizationUserTypeNotOwner_ReturnsNull(
|
||||
OrganizationUserType userType,
|
||||
SutProvider<EmergencyAccessService> sutProvider,
|
||||
EmergencyAccess emergencyAccess,
|
||||
Core.Auth.Entities.EmergencyAccess emergencyAccess,
|
||||
User granteeUser,
|
||||
User grantorUser,
|
||||
OrganizationUser grantorOrganizationUser)
|
||||
@@ -1062,7 +1061,7 @@ public class EmergencyAccessServiceTests
|
||||
[Theory, BitAutoData]
|
||||
public async Task GetPoliciesAsync_OrganizationUserEmpty_ReturnsNull(
|
||||
SutProvider<EmergencyAccessService> sutProvider,
|
||||
EmergencyAccess emergencyAccess,
|
||||
Core.Auth.Entities.EmergencyAccess emergencyAccess,
|
||||
User granteeUser,
|
||||
User grantorUser)
|
||||
{
|
||||
@@ -1090,7 +1089,7 @@ public class EmergencyAccessServiceTests
|
||||
[Theory, BitAutoData]
|
||||
public async Task GetPoliciesAsync_ReturnsNotNull(
|
||||
SutProvider<EmergencyAccessService> sutProvider,
|
||||
EmergencyAccess emergencyAccess,
|
||||
Core.Auth.Entities.EmergencyAccess emergencyAccess,
|
||||
User granteeUser,
|
||||
User grantorUser,
|
||||
OrganizationUser grantorOrganizationUser)
|
||||
@@ -1127,7 +1126,7 @@ public class EmergencyAccessServiceTests
|
||||
{
|
||||
sutProvider.GetDependency<IEmergencyAccessRepository>()
|
||||
.GetByIdAsync(Arg.Any<Guid>())
|
||||
.Returns((EmergencyAccess)null);
|
||||
.Returns((Core.Auth.Entities.EmergencyAccess)null);
|
||||
|
||||
var exception = await Assert.ThrowsAsync<BadRequestException>(
|
||||
() => sutProvider.Sut.TakeoverAsync(default, default));
|
||||
@@ -1138,7 +1137,7 @@ public class EmergencyAccessServiceTests
|
||||
[Theory, BitAutoData]
|
||||
public async Task TakeoverAsync_RequestNotValid_GranteeNotEqualToRequestingUser_ThrowsBadRequest(
|
||||
SutProvider<EmergencyAccessService> sutProvider,
|
||||
EmergencyAccess emergencyAccess,
|
||||
Core.Auth.Entities.EmergencyAccess emergencyAccess,
|
||||
User granteeUser)
|
||||
{
|
||||
emergencyAccess.Status = EmergencyAccessStatusType.RecoveryApproved;
|
||||
@@ -1161,7 +1160,7 @@ public class EmergencyAccessServiceTests
|
||||
public async Task TakeoverAsync_RequestNotValid_StatusType_ThrowsBadRequest(
|
||||
EmergencyAccessStatusType statusType,
|
||||
SutProvider<EmergencyAccessService> sutProvider,
|
||||
EmergencyAccess emergencyAccess,
|
||||
Core.Auth.Entities.EmergencyAccess emergencyAccess,
|
||||
User granteeUser)
|
||||
{
|
||||
emergencyAccess.GranteeId = granteeUser.Id;
|
||||
@@ -1180,7 +1179,7 @@ public class EmergencyAccessServiceTests
|
||||
[Theory, BitAutoData]
|
||||
public async Task TakeoverAsync_RequestNotValid_TypeIsView_ThrowsBadRequest(
|
||||
SutProvider<EmergencyAccessService> sutProvider,
|
||||
EmergencyAccess emergencyAccess,
|
||||
Core.Auth.Entities.EmergencyAccess emergencyAccess,
|
||||
User granteeUser)
|
||||
{
|
||||
emergencyAccess.GranteeId = granteeUser.Id;
|
||||
@@ -1203,7 +1202,7 @@ public class EmergencyAccessServiceTests
|
||||
User grantor)
|
||||
{
|
||||
grantor.UsesKeyConnector = true;
|
||||
var emergencyAccess = new EmergencyAccess
|
||||
var emergencyAccess = new Core.Auth.Entities.EmergencyAccess
|
||||
{
|
||||
GrantorId = grantor.Id,
|
||||
GranteeId = granteeUser.Id,
|
||||
@@ -1232,7 +1231,7 @@ public class EmergencyAccessServiceTests
|
||||
User grantor)
|
||||
{
|
||||
grantor.UsesKeyConnector = false;
|
||||
var emergencyAccess = new EmergencyAccess
|
||||
var emergencyAccess = new Core.Auth.Entities.EmergencyAccess
|
||||
{
|
||||
GrantorId = grantor.Id,
|
||||
GranteeId = granteeUser.Id,
|
||||
@@ -1260,7 +1259,7 @@ public class EmergencyAccessServiceTests
|
||||
{
|
||||
sutProvider.GetDependency<IEmergencyAccessRepository>()
|
||||
.GetByIdAsync(Arg.Any<Guid>())
|
||||
.Returns((EmergencyAccess)null);
|
||||
.Returns((Core.Auth.Entities.EmergencyAccess)null);
|
||||
|
||||
var exception = await Assert.ThrowsAsync<BadRequestException>(
|
||||
() => sutProvider.Sut.PasswordAsync(default, default, default, default));
|
||||
@@ -1271,7 +1270,7 @@ public class EmergencyAccessServiceTests
|
||||
[Theory, BitAutoData]
|
||||
public async Task PasswordAsync_RequestNotValid_GranteeNotEqualToRequestingUser_ThrowsBadRequest(
|
||||
SutProvider<EmergencyAccessService> sutProvider,
|
||||
EmergencyAccess emergencyAccess,
|
||||
Core.Auth.Entities.EmergencyAccess emergencyAccess,
|
||||
User granteeUser)
|
||||
{
|
||||
emergencyAccess.Status = EmergencyAccessStatusType.RecoveryApproved;
|
||||
@@ -1294,7 +1293,7 @@ public class EmergencyAccessServiceTests
|
||||
public async Task PasswordAsync_RequestNotValid_StatusType_ThrowsBadRequest(
|
||||
EmergencyAccessStatusType statusType,
|
||||
SutProvider<EmergencyAccessService> sutProvider,
|
||||
EmergencyAccess emergencyAccess,
|
||||
Core.Auth.Entities.EmergencyAccess emergencyAccess,
|
||||
User granteeUser)
|
||||
{
|
||||
emergencyAccess.GranteeId = granteeUser.Id;
|
||||
@@ -1313,7 +1312,7 @@ public class EmergencyAccessServiceTests
|
||||
[Theory, BitAutoData]
|
||||
public async Task PasswordAsync_RequestNotValid_TypeIsView_ThrowsBadRequest(
|
||||
SutProvider<EmergencyAccessService> sutProvider,
|
||||
EmergencyAccess emergencyAccess,
|
||||
Core.Auth.Entities.EmergencyAccess emergencyAccess,
|
||||
User granteeUser)
|
||||
{
|
||||
emergencyAccess.GranteeId = granteeUser.Id;
|
||||
@@ -1332,7 +1331,7 @@ public class EmergencyAccessServiceTests
|
||||
[Theory, BitAutoData]
|
||||
public async Task PasswordAsync_NonOrgUser_Success(
|
||||
SutProvider<EmergencyAccessService> sutProvider,
|
||||
EmergencyAccess emergencyAccess,
|
||||
Core.Auth.Entities.EmergencyAccess emergencyAccess,
|
||||
User granteeUser,
|
||||
User grantorUser,
|
||||
string key,
|
||||
@@ -1367,7 +1366,7 @@ public class EmergencyAccessServiceTests
|
||||
public async Task PasswordAsync_OrgUser_NotOrganizationOwner_RemovedFromOrganization_Success(
|
||||
OrganizationUserType userType,
|
||||
SutProvider<EmergencyAccessService> sutProvider,
|
||||
EmergencyAccess emergencyAccess,
|
||||
Core.Auth.Entities.EmergencyAccess emergencyAccess,
|
||||
User granteeUser,
|
||||
User grantorUser,
|
||||
OrganizationUser organizationUser,
|
||||
@@ -1408,7 +1407,7 @@ public class EmergencyAccessServiceTests
|
||||
[Theory, BitAutoData]
|
||||
public async Task PasswordAsync_OrgUser_IsOrganizationOwner_NotRemovedFromOrganization_Success(
|
||||
SutProvider<EmergencyAccessService> sutProvider,
|
||||
EmergencyAccess emergencyAccess,
|
||||
Core.Auth.Entities.EmergencyAccess emergencyAccess,
|
||||
User granteeUser,
|
||||
User grantorUser,
|
||||
OrganizationUser organizationUser,
|
||||
@@ -1459,7 +1458,7 @@ public class EmergencyAccessServiceTests
|
||||
Enabled = true
|
||||
}
|
||||
});
|
||||
var emergencyAccess = new EmergencyAccess
|
||||
var emergencyAccess = new Core.Auth.Entities.EmergencyAccess
|
||||
{
|
||||
GrantorId = grantor.Id,
|
||||
GranteeId = requestingUser.Id,
|
||||
@@ -1484,7 +1483,7 @@ public class EmergencyAccessServiceTests
|
||||
[Theory, BitAutoData]
|
||||
public async Task ViewAsync_EmergencyAccessTypeNotView_ThrowsBadRequest(
|
||||
SutProvider<EmergencyAccessService> sutProvider,
|
||||
EmergencyAccess emergencyAccess,
|
||||
Core.Auth.Entities.EmergencyAccess emergencyAccess,
|
||||
User granteeUser)
|
||||
{
|
||||
emergencyAccess.GranteeId = granteeUser.Id;
|
||||
@@ -1500,7 +1499,7 @@ public class EmergencyAccessServiceTests
|
||||
[Theory, BitAutoData]
|
||||
public async Task GetAttachmentDownloadAsync_EmergencyAccessTypeNotView_ThrowsBadRequest(
|
||||
SutProvider<EmergencyAccessService> sutProvider,
|
||||
EmergencyAccess emergencyAccess,
|
||||
Core.Auth.Entities.EmergencyAccess emergencyAccess,
|
||||
User granteeUser)
|
||||
{
|
||||
emergencyAccess.GranteeId = granteeUser.Id;
|
||||
@@ -2,7 +2,6 @@
|
||||
using Bit.Core.AdminConsole.Entities;
|
||||
using Bit.Core.AdminConsole.Enums;
|
||||
using Bit.Core.AdminConsole.Repositories;
|
||||
using Bit.Core.Auth.Entities;
|
||||
using Bit.Core.Auth.Enums;
|
||||
using Bit.Core.Auth.Models;
|
||||
using Bit.Core.Auth.Models.Business.Tokenables;
|
||||
@@ -23,6 +22,7 @@ using Microsoft.AspNetCore.Identity;
|
||||
using Microsoft.AspNetCore.WebUtilities;
|
||||
using NSubstitute;
|
||||
using Xunit;
|
||||
using EmergencyAccessEntity = Bit.Core.Auth.Entities.EmergencyAccess;
|
||||
|
||||
namespace Bit.Core.Test.Auth.UserFeatures.Registration;
|
||||
|
||||
@@ -726,7 +726,7 @@ public class RegisterUserCommandTests
|
||||
[BitAutoData]
|
||||
public async Task RegisterUserViaAcceptEmergencyAccessInviteToken_Succeeds(
|
||||
SutProvider<RegisterUserCommand> sutProvider, User user, string masterPasswordHash,
|
||||
EmergencyAccess emergencyAccess, string acceptEmergencyAccessInviteToken, Guid acceptEmergencyAccessId)
|
||||
EmergencyAccessEntity emergencyAccess, string acceptEmergencyAccessInviteToken, Guid acceptEmergencyAccessId)
|
||||
{
|
||||
// Arrange
|
||||
user.Email = $"test+{Guid.NewGuid()}@example.com";
|
||||
@@ -767,7 +767,7 @@ public class RegisterUserCommandTests
|
||||
[Theory]
|
||||
[BitAutoData]
|
||||
public async Task RegisterUserViaAcceptEmergencyAccessInviteToken_InvalidToken_ThrowsBadRequestException(SutProvider<RegisterUserCommand> sutProvider, User user,
|
||||
string masterPasswordHash, EmergencyAccess emergencyAccess, string acceptEmergencyAccessInviteToken, Guid acceptEmergencyAccessId)
|
||||
string masterPasswordHash, EmergencyAccessEntity emergencyAccess, string acceptEmergencyAccessInviteToken, Guid acceptEmergencyAccessId)
|
||||
{
|
||||
// Arrange
|
||||
user.Email = $"test+{Guid.NewGuid()}@example.com";
|
||||
@@ -1112,7 +1112,7 @@ public class RegisterUserCommandTests
|
||||
[BitAutoData]
|
||||
public async Task RegisterUserViaAcceptEmergencyAccessInviteToken_BlockedDomain_ThrowsBadRequestException(
|
||||
SutProvider<RegisterUserCommand> sutProvider, User user, string masterPasswordHash,
|
||||
EmergencyAccess emergencyAccess, string acceptEmergencyAccessInviteToken, Guid acceptEmergencyAccessId)
|
||||
EmergencyAccessEntity emergencyAccess, string acceptEmergencyAccessInviteToken, Guid acceptEmergencyAccessId)
|
||||
{
|
||||
// Arrange
|
||||
user.Email = "user@blocked-domain.com";
|
||||
|
||||
@@ -135,6 +135,43 @@ public class ImportCiphersAsyncCommandTests
|
||||
Assert.Equal("You cannot import items into your personal vault because you are a member of an organization which forbids it.", exception.Message);
|
||||
}
|
||||
|
||||
[Theory, BitAutoData]
|
||||
public async Task ImportIntoIndividualVaultAsync_FavoriteCiphers_PersistsFavoriteInfo(
|
||||
Guid importingUserId,
|
||||
List<CipherDetails> ciphers,
|
||||
SutProvider<ImportCiphersCommand> sutProvider
|
||||
)
|
||||
{
|
||||
sutProvider.GetDependency<IFeatureService>()
|
||||
.IsEnabled(FeatureFlagKeys.PolicyRequirements)
|
||||
.Returns(true);
|
||||
|
||||
sutProvider.GetDependency<IPolicyRequirementQuery>()
|
||||
.GetAsync<OrganizationDataOwnershipPolicyRequirement>(importingUserId)
|
||||
.Returns(new OrganizationDataOwnershipPolicyRequirement(
|
||||
OrganizationDataOwnershipState.Disabled,
|
||||
[]));
|
||||
|
||||
sutProvider.GetDependency<IFolderRepository>()
|
||||
.GetManyByUserIdAsync(importingUserId)
|
||||
.Returns(new List<Folder>());
|
||||
|
||||
var folders = new List<Folder>();
|
||||
var folderRelationships = new List<KeyValuePair<int, int>>();
|
||||
|
||||
ciphers.ForEach(c =>
|
||||
{
|
||||
c.UserId = importingUserId;
|
||||
c.Favorite = true;
|
||||
});
|
||||
|
||||
await sutProvider.Sut.ImportIntoIndividualVaultAsync(folders, ciphers, folderRelationships, importingUserId);
|
||||
|
||||
await sutProvider.GetDependency<ICipherRepository>()
|
||||
.Received(1)
|
||||
.CreateAsync(importingUserId, Arg.Is<IEnumerable<Cipher>>(ciphers => ciphers.All(c => c.Favorites == $"{{\"{importingUserId.ToString().ToUpperInvariant()}\":true}}")), Arg.Any<List<Folder>>());
|
||||
}
|
||||
|
||||
[Theory, BitAutoData]
|
||||
public async Task ImportIntoOrganizationalVaultAsync_Success(
|
||||
Organization organization,
|
||||
|
||||
120
test/Core.Test/Tools/Services/SendValidationServiceTests.cs
Normal file
120
test/Core.Test/Tools/Services/SendValidationServiceTests.cs
Normal file
@@ -0,0 +1,120 @@
|
||||
using Bit.Core.AdminConsole.Entities;
|
||||
using Bit.Core.Billing.Pricing;
|
||||
using Bit.Core.Billing.Pricing.Premium;
|
||||
using Bit.Core.Entities;
|
||||
using Bit.Core.Repositories;
|
||||
using Bit.Core.Services;
|
||||
using Bit.Core.Tools.Entities;
|
||||
using Bit.Core.Tools.Enums;
|
||||
using Bit.Core.Tools.Services;
|
||||
using Bit.Test.Common.AutoFixture;
|
||||
using Bit.Test.Common.AutoFixture.Attributes;
|
||||
using NSubstitute;
|
||||
using Xunit;
|
||||
|
||||
namespace Bit.Core.Test.Tools.Services;
|
||||
|
||||
[SutProviderCustomize]
|
||||
public class SendValidationServiceTests
|
||||
{
|
||||
[Theory, BitAutoData]
|
||||
public async Task StorageRemainingForSendAsync_OrgGrantedPremiumUser_UsesPricingService(
|
||||
SutProvider<SendValidationService> sutProvider,
|
||||
Send send,
|
||||
User user)
|
||||
{
|
||||
// Arrange
|
||||
send.UserId = user.Id;
|
||||
send.OrganizationId = null;
|
||||
send.Type = SendType.File;
|
||||
user.Premium = false;
|
||||
user.Storage = 1024L * 1024L * 1024L; // 1 GB used
|
||||
user.EmailVerified = true;
|
||||
|
||||
sutProvider.GetDependency<Bit.Core.Settings.GlobalSettings>().SelfHosted = false;
|
||||
sutProvider.GetDependency<IUserRepository>().GetByIdAsync(user.Id).Returns(user);
|
||||
sutProvider.GetDependency<IUserService>().CanAccessPremium(user).Returns(true);
|
||||
|
||||
var premiumPlan = new Plan
|
||||
{
|
||||
Storage = new Purchasable { Provided = 5 }
|
||||
};
|
||||
sutProvider.GetDependency<IPricingClient>().GetAvailablePremiumPlan().Returns(premiumPlan);
|
||||
|
||||
// Act
|
||||
var result = await sutProvider.Sut.StorageRemainingForSendAsync(send);
|
||||
|
||||
// Assert
|
||||
await sutProvider.GetDependency<IPricingClient>().Received(1).GetAvailablePremiumPlan();
|
||||
Assert.True(result > 0);
|
||||
}
|
||||
|
||||
[Theory, BitAutoData]
|
||||
public async Task StorageRemainingForSendAsync_IndividualPremium_DoesNotCallPricingService(
|
||||
SutProvider<SendValidationService> sutProvider,
|
||||
Send send,
|
||||
User user)
|
||||
{
|
||||
// Arrange
|
||||
send.UserId = user.Id;
|
||||
send.OrganizationId = null;
|
||||
send.Type = SendType.File;
|
||||
user.Premium = true;
|
||||
user.MaxStorageGb = 10;
|
||||
user.EmailVerified = true;
|
||||
|
||||
sutProvider.GetDependency<IUserRepository>().GetByIdAsync(user.Id).Returns(user);
|
||||
sutProvider.GetDependency<IUserService>().CanAccessPremium(user).Returns(true);
|
||||
|
||||
// Act
|
||||
var result = await sutProvider.Sut.StorageRemainingForSendAsync(send);
|
||||
|
||||
// Assert - should NOT call pricing service for individual premium users
|
||||
await sutProvider.GetDependency<IPricingClient>().DidNotReceive().GetAvailablePremiumPlan();
|
||||
}
|
||||
|
||||
[Theory, BitAutoData]
|
||||
public async Task StorageRemainingForSendAsync_SelfHosted_DoesNotCallPricingService(
|
||||
SutProvider<SendValidationService> sutProvider,
|
||||
Send send,
|
||||
User user)
|
||||
{
|
||||
// Arrange
|
||||
send.UserId = user.Id;
|
||||
send.OrganizationId = null;
|
||||
send.Type = SendType.File;
|
||||
user.Premium = false;
|
||||
user.EmailVerified = true;
|
||||
|
||||
sutProvider.GetDependency<Bit.Core.Settings.GlobalSettings>().SelfHosted = true;
|
||||
sutProvider.GetDependency<IUserRepository>().GetByIdAsync(user.Id).Returns(user);
|
||||
sutProvider.GetDependency<IUserService>().CanAccessPremium(user).Returns(true);
|
||||
|
||||
// Act
|
||||
var result = await sutProvider.Sut.StorageRemainingForSendAsync(send);
|
||||
|
||||
// Assert - should NOT call pricing service for self-hosted
|
||||
await sutProvider.GetDependency<IPricingClient>().DidNotReceive().GetAvailablePremiumPlan();
|
||||
}
|
||||
|
||||
[Theory, BitAutoData]
|
||||
public async Task StorageRemainingForSendAsync_OrgSend_DoesNotCallPricingService(
|
||||
SutProvider<SendValidationService> sutProvider,
|
||||
Send send,
|
||||
Organization org)
|
||||
{
|
||||
// Arrange
|
||||
send.UserId = null;
|
||||
send.OrganizationId = org.Id;
|
||||
send.Type = SendType.File;
|
||||
org.MaxStorageGb = 100;
|
||||
|
||||
sutProvider.GetDependency<IOrganizationRepository>().GetByIdAsync(org.Id).Returns(org);
|
||||
|
||||
// Act
|
||||
var result = await sutProvider.Sut.StorageRemainingForSendAsync(send);
|
||||
|
||||
// Assert - should NOT call pricing service for org sends
|
||||
await sutProvider.GetDependency<IPricingClient>().DidNotReceive().GetAvailablePremiumPlan();
|
||||
}
|
||||
}
|
||||
84
test/Core.Test/Utilities/DomainNameAttributeTests.cs
Normal file
84
test/Core.Test/Utilities/DomainNameAttributeTests.cs
Normal file
@@ -0,0 +1,84 @@
|
||||
using Bit.Core.Utilities;
|
||||
using Xunit;
|
||||
|
||||
namespace Bit.Core.Test.Utilities;
|
||||
|
||||
public class DomainNameValidatorAttributeTests
|
||||
{
|
||||
[Theory]
|
||||
[InlineData("example.com")] // basic domain
|
||||
[InlineData("sub.example.com")] // subdomain
|
||||
[InlineData("sub.sub2.example.com")] // multiple subdomains
|
||||
[InlineData("example-dash.com")] // domain with dash
|
||||
[InlineData("123example.com")] // domain starting with number
|
||||
[InlineData("example123.com")] // domain with numbers
|
||||
[InlineData("e.com")] // short domain
|
||||
[InlineData("very-long-subdomain-name.example.com")] // long subdomain
|
||||
[InlineData("wörldé.com")] // unicode domain (IDN)
|
||||
public void IsValid_ReturnsTrueWhenValid(string domainName)
|
||||
{
|
||||
var sut = new DomainNameValidatorAttribute();
|
||||
|
||||
var actual = sut.IsValid(domainName);
|
||||
|
||||
Assert.True(actual);
|
||||
}
|
||||
|
||||
[Theory]
|
||||
[InlineData("<script>alert('xss')</script>")] // XSS attempt
|
||||
[InlineData("example.com<script>")] // XSS suffix
|
||||
[InlineData("<img src=x>")] // HTML tag
|
||||
[InlineData("example.com\t")] // trailing tab
|
||||
[InlineData("\texample.com")] // leading tab
|
||||
[InlineData("exam\tple.com")] // middle tab
|
||||
[InlineData("example.com\n")] // newline
|
||||
[InlineData("example.com\r")] // carriage return
|
||||
[InlineData("example.com\b")] // backspace
|
||||
[InlineData("exam ple.com")] // space in domain
|
||||
[InlineData("example.com ")] // trailing space (after trim, becomes valid, but with space it's invalid)
|
||||
[InlineData(" example.com")] // leading space (after trim, becomes valid, but with space it's invalid)
|
||||
[InlineData("example&.com")] // ampersand
|
||||
[InlineData("example'.com")] // single quote
|
||||
[InlineData("example\".com")] // double quote
|
||||
[InlineData(".example.com")] // starts with dot
|
||||
[InlineData("example.com.")] // ends with dot
|
||||
[InlineData("example..com")] // double dot
|
||||
[InlineData("-example.com")] // starts with dash
|
||||
[InlineData("example-.com")] // label ends with dash
|
||||
[InlineData("")] // empty string
|
||||
[InlineData(" ")] // whitespace only
|
||||
[InlineData("http://example.com")] // URL scheme
|
||||
[InlineData("example.com/path")] // path component
|
||||
[InlineData("user@example.com")] // email format
|
||||
public void IsValid_ReturnsFalseWhenInvalid(string domainName)
|
||||
{
|
||||
var sut = new DomainNameValidatorAttribute();
|
||||
|
||||
var actual = sut.IsValid(domainName);
|
||||
|
||||
Assert.False(actual);
|
||||
}
|
||||
|
||||
[Fact]
|
||||
public void IsValid_ReturnsTrueWhenNull()
|
||||
{
|
||||
var sut = new DomainNameValidatorAttribute();
|
||||
|
||||
var actual = sut.IsValid(null);
|
||||
|
||||
// Null validation should be handled by [Required] attribute
|
||||
Assert.True(actual);
|
||||
}
|
||||
|
||||
[Fact]
|
||||
public void IsValid_ReturnsFalseWhenTooLong()
|
||||
{
|
||||
var sut = new DomainNameValidatorAttribute();
|
||||
// Create a domain name longer than 253 characters
|
||||
var longDomain = new string('a', 250) + ".com";
|
||||
|
||||
var actual = sut.IsValid(longDomain);
|
||||
|
||||
Assert.False(actual);
|
||||
}
|
||||
}
|
||||
@@ -6,6 +6,8 @@ using Bit.Core.AdminConsole.OrganizationFeatures.Policies;
|
||||
using Bit.Core.AdminConsole.OrganizationFeatures.Policies.PolicyRequirements;
|
||||
using Bit.Core.AdminConsole.Services;
|
||||
using Bit.Core.Billing.Enums;
|
||||
using Bit.Core.Billing.Pricing;
|
||||
using Bit.Core.Billing.Pricing.Premium;
|
||||
using Bit.Core.Entities;
|
||||
using Bit.Core.Enums;
|
||||
using Bit.Core.Exceptions;
|
||||
@@ -2228,10 +2230,6 @@ public class CipherServiceTests
|
||||
.PushSyncCiphersAsync(deletingUserId);
|
||||
}
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
[Theory]
|
||||
[OrganizationCipherCustomize]
|
||||
[BitAutoData]
|
||||
@@ -2387,6 +2385,186 @@ public class CipherServiceTests
|
||||
ids.Count() == cipherIds.Length && ids.All(id => cipherIds.Contains(id))));
|
||||
}
|
||||
|
||||
[Theory, BitAutoData]
|
||||
public async Task CreateAttachmentAsync_UserWithOrgGrantedPremium_UsesStorageFromPricingClient(
|
||||
SutProvider<CipherService> sutProvider, CipherDetails cipher, Guid savingUserId)
|
||||
{
|
||||
var stream = new MemoryStream(new byte[100]);
|
||||
var fileName = "test.txt";
|
||||
var key = "test-key";
|
||||
|
||||
// Setup cipher with user ownership
|
||||
cipher.UserId = savingUserId;
|
||||
cipher.OrganizationId = null;
|
||||
|
||||
// Setup user WITHOUT personal premium (Premium = false), but with org-granted premium access
|
||||
var user = new User
|
||||
{
|
||||
Id = savingUserId,
|
||||
Premium = false, // User does not have personal premium
|
||||
MaxStorageGb = null, // No personal storage allocation
|
||||
Storage = 0 // No storage used yet
|
||||
};
|
||||
|
||||
sutProvider.GetDependency<IUserRepository>()
|
||||
.GetByIdAsync(savingUserId)
|
||||
.Returns(user);
|
||||
|
||||
// User has premium access through their organization
|
||||
sutProvider.GetDependency<IUserService>()
|
||||
.CanAccessPremium(user)
|
||||
.Returns(true);
|
||||
|
||||
// Mock GlobalSettings to indicate cloud (not self-hosted)
|
||||
sutProvider.GetDependency<Bit.Core.Settings.GlobalSettings>().SelfHosted = false;
|
||||
|
||||
// Mock the PricingClient to return a premium plan with 1 GB of storage
|
||||
var premiumPlan = new Plan
|
||||
{
|
||||
Name = "Premium",
|
||||
Available = true,
|
||||
Seat = new Purchasable { StripePriceId = "price_123", Price = 10, Provided = 1 },
|
||||
Storage = new Purchasable { StripePriceId = "price_456", Price = 4, Provided = 1 }
|
||||
};
|
||||
sutProvider.GetDependency<IPricingClient>()
|
||||
.GetAvailablePremiumPlan()
|
||||
.Returns(premiumPlan);
|
||||
|
||||
sutProvider.GetDependency<IAttachmentStorageService>()
|
||||
.UploadNewAttachmentAsync(Arg.Any<Stream>(), cipher, Arg.Any<CipherAttachment.MetaData>())
|
||||
.Returns(Task.CompletedTask);
|
||||
|
||||
sutProvider.GetDependency<IAttachmentStorageService>()
|
||||
.ValidateFileAsync(cipher, Arg.Any<CipherAttachment.MetaData>(), Arg.Any<long>())
|
||||
.Returns((true, 100L));
|
||||
|
||||
sutProvider.GetDependency<ICipherRepository>()
|
||||
.UpdateAttachmentAsync(Arg.Any<CipherAttachment>())
|
||||
.Returns(Task.CompletedTask);
|
||||
|
||||
sutProvider.GetDependency<ICipherRepository>()
|
||||
.ReplaceAsync(Arg.Any<CipherDetails>())
|
||||
.Returns(Task.CompletedTask);
|
||||
|
||||
// Act
|
||||
await sutProvider.Sut.CreateAttachmentAsync(cipher, stream, fileName, key, 100, savingUserId, false, cipher.RevisionDate);
|
||||
|
||||
// Assert - PricingClient was called to get the premium plan storage
|
||||
await sutProvider.GetDependency<IPricingClient>().Received(1).GetAvailablePremiumPlan();
|
||||
|
||||
// Assert - Attachment was uploaded successfully
|
||||
await sutProvider.GetDependency<IAttachmentStorageService>().Received(1)
|
||||
.UploadNewAttachmentAsync(Arg.Any<Stream>(), cipher, Arg.Any<CipherAttachment.MetaData>());
|
||||
}
|
||||
|
||||
[Theory, BitAutoData]
|
||||
public async Task CreateAttachmentAsync_UserWithOrgGrantedPremium_ExceedsStorage_ThrowsBadRequest(
|
||||
SutProvider<CipherService> sutProvider, CipherDetails cipher, Guid savingUserId)
|
||||
{
|
||||
var stream = new MemoryStream(new byte[100]);
|
||||
var fileName = "test.txt";
|
||||
var key = "test-key";
|
||||
|
||||
// Setup cipher with user ownership
|
||||
cipher.UserId = savingUserId;
|
||||
cipher.OrganizationId = null;
|
||||
|
||||
// Setup user WITHOUT personal premium, with org-granted access, but storage is full
|
||||
var user = new User
|
||||
{
|
||||
Id = savingUserId,
|
||||
Premium = false,
|
||||
MaxStorageGb = null,
|
||||
Storage = 1073741824 // 1 GB already used (equals the provided storage)
|
||||
};
|
||||
|
||||
sutProvider.GetDependency<IUserRepository>()
|
||||
.GetByIdAsync(savingUserId)
|
||||
.Returns(user);
|
||||
|
||||
sutProvider.GetDependency<IUserService>()
|
||||
.CanAccessPremium(user)
|
||||
.Returns(true);
|
||||
|
||||
sutProvider.GetDependency<Bit.Core.Settings.GlobalSettings>().SelfHosted = false;
|
||||
|
||||
// Premium plan provides 1 GB of storage
|
||||
var premiumPlan = new Plan
|
||||
{
|
||||
Name = "Premium",
|
||||
Available = true,
|
||||
Seat = new Purchasable { StripePriceId = "price_123", Price = 10, Provided = 1 },
|
||||
Storage = new Purchasable { StripePriceId = "price_456", Price = 4, Provided = 1 }
|
||||
};
|
||||
sutProvider.GetDependency<IPricingClient>()
|
||||
.GetAvailablePremiumPlan()
|
||||
.Returns(premiumPlan);
|
||||
|
||||
// Act & Assert - Should throw because storage is full
|
||||
var exception = await Assert.ThrowsAsync<BadRequestException>(
|
||||
() => sutProvider.Sut.CreateAttachmentAsync(cipher, stream, fileName, key, 100, savingUserId, false, cipher.RevisionDate));
|
||||
Assert.Contains("Not enough storage available", exception.Message);
|
||||
}
|
||||
|
||||
[Theory, BitAutoData]
|
||||
public async Task CreateAttachmentAsync_UserWithOrgGrantedPremium_SelfHosted_UsesConstantStorage(
|
||||
SutProvider<CipherService> sutProvider, CipherDetails cipher, Guid savingUserId)
|
||||
{
|
||||
var stream = new MemoryStream(new byte[100]);
|
||||
var fileName = "test.txt";
|
||||
var key = "test-key";
|
||||
|
||||
// Setup cipher with user ownership
|
||||
cipher.UserId = savingUserId;
|
||||
cipher.OrganizationId = null;
|
||||
|
||||
// Setup user WITHOUT personal premium, but with org-granted premium access
|
||||
var user = new User
|
||||
{
|
||||
Id = savingUserId,
|
||||
Premium = false,
|
||||
MaxStorageGb = null,
|
||||
Storage = 0
|
||||
};
|
||||
|
||||
sutProvider.GetDependency<IUserRepository>()
|
||||
.GetByIdAsync(savingUserId)
|
||||
.Returns(user);
|
||||
|
||||
sutProvider.GetDependency<IUserService>()
|
||||
.CanAccessPremium(user)
|
||||
.Returns(true);
|
||||
|
||||
// Mock GlobalSettings to indicate self-hosted
|
||||
sutProvider.GetDependency<Bit.Core.Settings.GlobalSettings>().SelfHosted = true;
|
||||
|
||||
sutProvider.GetDependency<IAttachmentStorageService>()
|
||||
.UploadNewAttachmentAsync(Arg.Any<Stream>(), cipher, Arg.Any<CipherAttachment.MetaData>())
|
||||
.Returns(Task.CompletedTask);
|
||||
|
||||
sutProvider.GetDependency<IAttachmentStorageService>()
|
||||
.ValidateFileAsync(cipher, Arg.Any<CipherAttachment.MetaData>(), Arg.Any<long>())
|
||||
.Returns((true, 100L));
|
||||
|
||||
sutProvider.GetDependency<ICipherRepository>()
|
||||
.UpdateAttachmentAsync(Arg.Any<CipherAttachment>())
|
||||
.Returns(Task.CompletedTask);
|
||||
|
||||
sutProvider.GetDependency<ICipherRepository>()
|
||||
.ReplaceAsync(Arg.Any<CipherDetails>())
|
||||
.Returns(Task.CompletedTask);
|
||||
|
||||
// Act
|
||||
await sutProvider.Sut.CreateAttachmentAsync(cipher, stream, fileName, key, 100, savingUserId, false, cipher.RevisionDate);
|
||||
|
||||
// Assert - PricingClient should NOT be called for self-hosted
|
||||
await sutProvider.GetDependency<IPricingClient>().DidNotReceive().GetAvailablePremiumPlan();
|
||||
|
||||
// Assert - Attachment was uploaded successfully
|
||||
await sutProvider.GetDependency<IAttachmentStorageService>().Received(1)
|
||||
.UploadNewAttachmentAsync(Arg.Any<Stream>(), cipher, Arg.Any<CipherAttachment.MetaData>());
|
||||
}
|
||||
|
||||
private async Task AssertNoActionsAsync(SutProvider<CipherService> sutProvider)
|
||||
{
|
||||
await sutProvider.GetDependency<ICipherRepository>().DidNotReceiveWithAnyArgs().GetManyOrganizationDetailsByOrganizationIdAsync(default);
|
||||
|
||||
Reference in New Issue
Block a user