1
0
mirror of https://github.com/bitwarden/server synced 2025-12-19 17:53:44 +00:00
Commit Graph

52 Commits

Author SHA1 Message Date
SmithThe4th
f11c58e396 [SG-648] BEEEP-Refactor DuoApi class to use Httpclient (#2691)
* Started work on refactoring class

* Added duo api respons model

* Made httpclient version of APICall

* Added more properties to response model

* Refactored duo api class to use httpclient

* Removed unuseful comments

* Fixed lint formatting
2023-02-24 15:29:22 -05:00
Federico Maccaroni
69511160cb [EC-400] Code clean up Device Verification (#2601)
* EC-400 Clean up code regarding Unknown Device Verification

* EC-400 Fix formatting
2023-02-17 10:15:28 -03:00
Gbubemi Smith
f445edb315 updated authrequestId to string to allow null value from client (#2350) 2022-10-19 06:37:18 -06:00
Gbubemi Smith
4a26c55599 [SG-698] Refactored 2fa send email and identity to cater for passwordless (#2346)
* Allow for auth request validation for sending two factor emails

* Refactored 2fa send email and identity to cater for passwordless

* Refactored 2fa send email and identity to cater for passwordless

Signed-off-by: gbubemismith <gsmithwalter@gmail.com>

* Inform that we track issues outside of Github (#2331)

* Inform that we track issues outside of Github

* Use checkboxes for info acknowledgement

Signed-off-by: gbubemismith <gsmithwalter@gmail.com>

* Refactored 2fa send email and identity to cater for passwordless

* ran dotnet format

Signed-off-by: gbubemismith <gsmithwalter@gmail.com>
Co-authored-by: addison <addisonbeck1@gmail.com>
2022-10-18 19:50:48 +01:00
Oscar Hinton
3a8f344202 Fix swagger errors (#2277) 2022-09-15 17:14:35 +02:00
Justin Baur
7f5f010e1e Run formatting (#2230) 2022-08-29 16:06:55 -04:00
Justin Baur
bae03feffe Revert filescoped (#2227)
* Revert "Add git blame entry (#2226)"

This reverts commit 239286737d.

* Revert "Turn on file scoped namespaces (#2225)"

This reverts commit 34fb4cca2a.
2022-08-29 15:53:48 -04:00
Justin Baur
34fb4cca2a Turn on file scoped namespaces (#2225) 2022-08-29 14:53:16 -04:00
Federico Maccaroni
580987f0e5 EC-293 Fix device verification state when getting its settings (#2094) 2022-07-05 18:44:07 -03:00
Justin Baur
231eb84e69 Turn On ImplicitUsings (#2079)
* Turn on ImplicitUsings

* Fix formatting

* Run linter
2022-06-29 19:46:41 -04:00
Federico Maccaroni
b070e9a387 [PS-589] Fix emergency contact takeover device verification and endpoints for its settings (#2016)
* Added UnknownDeviceVerificationEnabled on User that is turned off when emergency contact takes over the account. Also added endpoints to get and update 2fa device verification settings. And Updated migrations & tests

* Applied dotnet format

* Fixed method rename call on TwoFactorController

* PS-589 Format fixes

* PS-589 changed UnknownDeviceVerificationEnabled to be non-nullable
2022-06-06 14:52:50 -03:00
Federico Maccaroni
a7a45893a3 PS-82 check send 2FA email for new devices on TwoFactorController send-email-login (#1977) 2022-04-28 13:14:09 -03:00
Oscar Hinton
e4a10aae27 Split out repositories to Infrastructure.Dapper / EntityFramework (#1759) 2022-01-11 10:40:51 +01:00
Oscar Hinton
23b0a1f9df Run dotnet format (#1764) 2021-12-16 15:35:09 +01:00
Oscar Hinton
63f6dd9a24 Move request/response models (#1754) 2021-12-14 16:05:07 +01:00
Oscar Hinton
fd37cb5a12 Add support for Key Connector OTP and account migration (#1663)
Co-authored-by: Thomas Rittson <trittson@bitwarden.com>
2021-11-09 16:37:32 +01:00
Oscar Hinton
feb3106f37 [Provider] Create and access child organizations (#1427) 2021-07-08 17:05:32 +02:00
Oscar Hinton
a47b86a995 Remove U2F APIs again (#1319)
* Revert "U2F (#1304)"

This reverts commit ce4f025a0c.

* Avoid removing WebAuthn fixes
2021-05-12 19:48:00 +02:00
Oscar Hinton
ce4f025a0c U2F (#1304)
* Delete U2F tokens alongside WebAuthn

* Bring back u2f apis
2021-05-05 16:14:49 +02:00
Oscar Hinton
07f37d1f74 WebAuthn (#903) 2021-03-22 23:21:43 +01:00
Matt Gibson
5537470703 Use sas token for attachment downloads (#1153)
* Get limited life attachment download URL

This change limits url download to a 1min lifetime.
This requires moving to a new container to allow for non-public blob
access.

Clients will have to call GetAttachmentData api function to receive the download
URL. For backwards compatibility, attachment URLs are still present, but will not
work for attachments stored in non-public access blobs.

* Make GlobalSettings interface for testing

* Test LocalAttachmentStorageService equivalence

* Remove comment

* Add missing globalSettings using

* Simplify default attachment container

* Default to attachments containe for existing methods

A new upload method will be made for uploading to attachments-v2.
For compatibility for clients which don't use these new methods, we need
to still use the old container. The new container will be used only for
new uploads

* Remove Default MetaData fixture.

* Keep attachments container blob-level security for all instances

* Close unclosed FileStream

* Favor default value for noop services
2021-02-22 15:35:16 -06:00
Matt Gibson
edd4bc2623 Add disable send policy (#1130)
* Add Disable Send policy

* Test DisableSend policy

* PR Review

* Update tests for using CurrentContext

This required making an interface for CurrentContext and mocking out
the members used. The interface can be expanded as needed for tests.

I moved CurrentContext to a folder, which changes the namespace
and causes a lot of file touches, but most are just adding a reference

* Fix failing test

* Update exemption to include all exempt users

* Move all CurrentContext usages to ICurrentContext

* PR review. Match messaging with Web
2021-02-04 12:54:21 -06:00
Addison Beck
63fcdc1418 Implemented Custom role and permissions (#1057)
* Implemented Custom role and permissions

* Converted permissions columns to a json blob

* Code review fixes for Permissions

* sql build fix

* Update Permissions.cs

* formatting

* Update IOrganizationService.cs

* reworked a conditional

* built out tests for relevant organization service methods

* removed unused usings

* fixed a broken test and a bad empty string init

* removed 'Attribute' from some attribute instances
2021-01-12 11:02:39 -05:00
Chad Scharf
9800b752c0 Changed all C# control flow block statements to include space between keyword and open paren 2020-03-27 14:36:37 -04:00
Kyle Spearrin
71d9ffdd9d CheckPoliciesOnTwoFactorRemoval for 2fa recovery (#659) 2020-02-28 10:23:19 -05:00
Kyle Spearrin
81424a8526 Enforce 2fa policy (#654) 2020-02-19 14:56:16 -05:00
Kyle Spearrin
20e3963847 check duo keys on org config as well 2019-01-03 00:13:46 -05:00
Kyle Spearrin
3588db947a check duo config with duo's api 2018-12-20 15:39:36 -05:00
Kyle Spearrin
951e8f562e email token provider 2018-12-19 22:27:45 -05:00
Kyle Spearrin
b5a4bad637 catch u2f exceptions 2018-10-10 15:21:54 -04:00
Kyle Spearrin
bfc74060b6 add support for multiple u2f keys 2018-10-08 14:38:11 -04:00
Kyle Spearrin
c41a1e0936 CanAccessPremium checks instead of User.Premium 2018-08-28 16:23:58 -04:00
Kyle Spearrin
e350ef650a dont cycle security token on re-hash 2018-04-17 08:10:17 -04:00
Kyle Spearrin
0d4ea5ce5b organization 2fa apis 2018-04-02 23:18:26 -04:00
Kyle Spearrin
a3a03c7974 move private method to bottom 2017-09-11 23:07:27 -04:00
Kyle Spearrin
d3c18381f9 2fa prem fixes 2017-07-07 09:28:50 -04:00
Kyle Spearrin
99c1d68f5a premium checks on two factor 2017-07-06 16:38:28 -04:00
Kyle Spearrin
ae48c8d9b5 null ref fix 2017-07-06 16:31:46 -04:00
Kyle Spearrin
6c16a988c3 appid no longer served from api 2017-06-27 14:05:50 -04:00
Kyle Spearrin
8b40863472 no need for chrome ext to have appid 2017-06-26 23:56:45 -04:00
Kyle Spearrin
12da107c51 web policy for two factor apis 2017-06-26 09:09:30 -04:00
Kyle Spearrin
eea2ae30b4 get recovery code api 2017-06-24 17:16:05 -04:00
Kyle Spearrin
59b8438a0f update u2f lib. send 2fa login email 2017-06-24 09:20:12 -04:00
Kyle Spearrin
c069fad4e7 adjust fido content type with middleware 2017-06-22 23:15:28 -04:00
Kyle Spearrin
f28ae5ccd9 fixes for configuring u2f device 2017-06-22 17:03:35 -04:00
Kyle Spearrin
731a1e31b9 initiating u2f registration 2017-06-21 22:33:45 -04:00
Kyle Spearrin
fd5e2c9466 stubbing out api setup for u2f 2017-06-21 21:46:52 -04:00
Kyle Spearrin
50c0b3e752 configure duo 2fa 2017-06-21 14:19:07 -04:00
Kyle Spearrin
69de88cc32 yubikey setup for 2FA 2017-06-20 14:12:31 -04:00
Kyle Spearrin
612697e815 refactorings around two-factor controller 2017-06-20 10:08:59 -04:00