mirror of
https://github.com/bitwarden/server
synced 2025-12-26 13:13:24 +00:00
* Add check for managed user before purging account * Rename IOrganizationRepository.GetByClaimedUserDomainAsync to GetByVerifiedUserEmailDomainAsync and refactor to return a list. Remove ManagedByOrganizationId from ProfileResponseMode. Add ManagesActiveUser to ProfileOrganizationResponseModel * Rename the property ManagesActiveUser to UserIsManagedByOrganization * Remove whole class #nullable enable and add it to specific places * Remove unnecessary .ToList() * Refactor IUserService methods GetOrganizationsManagingUserAsync and IsManagedByAnyOrganizationAsync to not return nullable objects. Update ProfileOrganizationResponseModel.UserIsManagedByOrganization to not be nullable * Update error message when unable to purge vault for managed account
110 lines
6.0 KiB
C#
110 lines
6.0 KiB
C#
using System.Security.Claims;
|
|
using Bit.Core.AdminConsole.Entities;
|
|
using Bit.Core.Auth.Enums;
|
|
using Bit.Core.Auth.Models;
|
|
using Bit.Core.Entities;
|
|
using Bit.Core.Enums;
|
|
using Bit.Core.Models.Business;
|
|
using Fido2NetLib;
|
|
using Microsoft.AspNetCore.Identity;
|
|
|
|
namespace Bit.Core.Services;
|
|
|
|
public interface IUserService
|
|
{
|
|
Guid? GetProperUserId(ClaimsPrincipal principal);
|
|
Task<User> GetUserByIdAsync(string userId);
|
|
Task<User> GetUserByIdAsync(Guid userId);
|
|
Task<User> GetUserByPrincipalAsync(ClaimsPrincipal principal);
|
|
Task<DateTime> GetAccountRevisionDateByIdAsync(Guid userId);
|
|
Task SaveUserAsync(User user, bool push = false);
|
|
Task<IdentityResult> CreateUserAsync(User user);
|
|
Task<IdentityResult> CreateUserAsync(User user, string masterPasswordHash);
|
|
Task SendMasterPasswordHintAsync(string email);
|
|
Task SendTwoFactorEmailAsync(User user);
|
|
Task<bool> VerifyTwoFactorEmailAsync(User user, string token);
|
|
Task<CredentialCreateOptions> StartWebAuthnRegistrationAsync(User user);
|
|
Task<bool> DeleteWebAuthnKeyAsync(User user, int id);
|
|
Task<bool> CompleteWebAuthRegistrationAsync(User user, int value, string name, AuthenticatorAttestationRawResponse attestationResponse);
|
|
Task SendEmailVerificationAsync(User user);
|
|
Task<IdentityResult> ConfirmEmailAsync(User user, string token);
|
|
Task InitiateEmailChangeAsync(User user, string newEmail);
|
|
Task<IdentityResult> ChangeEmailAsync(User user, string masterPassword, string newEmail, string newMasterPassword,
|
|
string token, string key);
|
|
Task<IdentityResult> ChangePasswordAsync(User user, string masterPassword, string newMasterPassword, string passwordHint, string key);
|
|
Task<IdentityResult> SetKeyConnectorKeyAsync(User user, string key, string orgIdentifier);
|
|
Task<IdentityResult> ConvertToKeyConnectorAsync(User user);
|
|
Task<IdentityResult> AdminResetPasswordAsync(OrganizationUserType type, Guid orgId, Guid id, string newMasterPassword, string key);
|
|
Task<IdentityResult> UpdateTempPasswordAsync(User user, string newMasterPassword, string key, string hint);
|
|
Task<IdentityResult> ChangeKdfAsync(User user, string masterPassword, string newMasterPassword, string key,
|
|
KdfType kdf, int kdfIterations, int? kdfMemory, int? kdfParallelism);
|
|
Task<IdentityResult> RefreshSecurityStampAsync(User user, string masterPasswordHash);
|
|
Task UpdateTwoFactorProviderAsync(User user, TwoFactorProviderType type, bool setEnabled = true, bool logEvent = true);
|
|
Task DisableTwoFactorProviderAsync(User user, TwoFactorProviderType type);
|
|
Task<bool> RecoverTwoFactorAsync(string email, string masterPassword, string recoveryCode);
|
|
Task<string> GenerateUserTokenAsync(User user, string tokenProvider, string purpose);
|
|
Task<IdentityResult> DeleteAsync(User user);
|
|
Task<IdentityResult> DeleteAsync(User user, string token);
|
|
Task SendDeleteConfirmationAsync(string email);
|
|
Task<Tuple<bool, string>> SignUpPremiumAsync(User user, string paymentToken,
|
|
PaymentMethodType paymentMethodType, short additionalStorageGb, UserLicense license,
|
|
TaxInfo taxInfo);
|
|
Task UpdateLicenseAsync(User user, UserLicense license);
|
|
Task<string> AdjustStorageAsync(User user, short storageAdjustmentGb);
|
|
Task ReplacePaymentMethodAsync(User user, string paymentToken, PaymentMethodType paymentMethodType, TaxInfo taxInfo);
|
|
Task CancelPremiumAsync(User user, bool? endOfPeriod = null);
|
|
Task ReinstatePremiumAsync(User user);
|
|
Task EnablePremiumAsync(Guid userId, DateTime? expirationDate);
|
|
Task EnablePremiumAsync(User user, DateTime? expirationDate);
|
|
Task DisablePremiumAsync(Guid userId, DateTime? expirationDate);
|
|
Task DisablePremiumAsync(User user, DateTime? expirationDate);
|
|
Task UpdatePremiumExpirationAsync(Guid userId, DateTime? expirationDate);
|
|
Task<UserLicense> GenerateLicenseAsync(User user, SubscriptionInfo subscriptionInfo = null,
|
|
int? version = null);
|
|
Task<bool> CheckPasswordAsync(User user, string password);
|
|
Task<bool> CanAccessPremium(ITwoFactorProvidersUser user);
|
|
Task<bool> HasPremiumFromOrganization(ITwoFactorProvidersUser user);
|
|
[Obsolete("Use ITwoFactorIsEnabledQuery instead.")]
|
|
Task<bool> TwoFactorIsEnabledAsync(ITwoFactorProvidersUser user);
|
|
Task<bool> TwoFactorProviderIsEnabledAsync(TwoFactorProviderType provider, ITwoFactorProvidersUser user);
|
|
Task<string> GenerateSignInTokenAsync(User user, string purpose);
|
|
|
|
Task<IdentityResult> UpdatePasswordHash(User user, string newPassword,
|
|
bool validatePassword = true, bool refreshStamp = true);
|
|
Task RotateApiKeyAsync(User user);
|
|
string GetUserName(ClaimsPrincipal principal);
|
|
Task SendOTPAsync(User user);
|
|
Task<bool> VerifyOTPAsync(User user, string token);
|
|
Task<bool> VerifySecretAsync(User user, string secret, bool isSettingMFA = false);
|
|
|
|
|
|
void SetTwoFactorProvider(User user, TwoFactorProviderType type, bool setEnabled = true);
|
|
|
|
/// <summary>
|
|
/// Returns true if the user is a legacy user. Legacy users use their master key as their encryption key.
|
|
/// We force these users to the web to migrate their encryption scheme.
|
|
/// </summary>
|
|
Task<bool> IsLegacyUser(string userId);
|
|
|
|
/// <summary>
|
|
/// Indicates if the user is managed by any organization.
|
|
/// </summary>
|
|
/// <remarks>
|
|
/// A user is considered managed by an organization if their email domain matches one of the verified domains of that organization, and the user is a member of it.
|
|
/// The organization must be enabled and able to have verified domains.
|
|
/// </remarks>
|
|
/// <returns>
|
|
/// False if the Account Deprovisioning feature flag is disabled.
|
|
/// </returns>
|
|
Task<bool> IsManagedByAnyOrganizationAsync(Guid userId);
|
|
|
|
/// <summary>
|
|
/// Gets the organizations that manage the user.
|
|
/// </summary>
|
|
/// <returns>
|
|
/// An empty collection if the Account Deprovisioning feature flag is disabled.
|
|
/// </returns>
|
|
/// <inheritdoc cref="IsManagedByAnyOrganizationAsync(Guid)"/>
|
|
Task<IEnumerable<Organization>> GetOrganizationsManagingUserAsync(Guid userId);
|
|
}
|