mirror of
https://github.com/bitwarden/browser.git
synced 2024-11-11 10:10:25 +01:00
Auth/PM-10684 - Fix CLI asking for MP even if session key provided as command option (#10917)
* PM-10684 - ServiceContainer - Add better docs * PM-10684 - UserAutoUnlockKeyService - setUserKeyInMemoryIfAutoUserKeySet - refactor method to return a bool instead of nothing so users can know if a user key was retrieved & set without another call. * PM-10684 - Remove async code ( Program.ts) responsible for setting the auto user key from the session option handler (event emitter which fires when a user passes --session <sessionKey> to a command). Returning this to synchronous execution prevents a race condition between the setting of the user key and the command executing the exitIfLocked logic in the base-program which would check if the user key had been set to determine if the command should be allowed to execute or if the user was locked. When running a loop from a script, the command would often trigger the exitIfLocked before the auto user key could be set in state from the option:session session. * PM-10684 - Clean up missed item per PR feedback
This commit is contained in:
parent
60e9969017
commit
e954621761
@ -3,6 +3,7 @@ import { firstValueFrom, map } from "rxjs";
|
||||
|
||||
import { AuthenticationStatus } from "@bitwarden/common/auth/enums/authentication-status";
|
||||
import { FeatureFlag } from "@bitwarden/common/enums/feature-flag.enum";
|
||||
import { UserId } from "@bitwarden/common/types/guid";
|
||||
|
||||
import { UnlockCommand } from "./auth/commands/unlock.command";
|
||||
import { Response } from "./models/response";
|
||||
@ -135,10 +136,31 @@ export abstract class BaseProgram {
|
||||
|
||||
protected async exitIfLocked() {
|
||||
const userId = await this.exitIfNotAuthed();
|
||||
if (await this.serviceContainer.cryptoService.hasUserKey()) {
|
||||
|
||||
// If the process.env does not have a BW_SESSION key, then we will never be able to retrieve
|
||||
// the auto user key from secure storage. This is because the auto user key is encrypted with
|
||||
// the session key.
|
||||
const hasUserKey =
|
||||
await this.serviceContainer.userAutoUnlockKeyService.setUserKeyInMemoryIfAutoUserKeySet(
|
||||
userId,
|
||||
);
|
||||
|
||||
if (hasUserKey) {
|
||||
// User is unlocked
|
||||
return;
|
||||
} else if (process.env.BW_NOINTERACTION !== "true") {
|
||||
// must unlock
|
||||
}
|
||||
|
||||
// User is locked
|
||||
await this.handleLockedUser(userId);
|
||||
}
|
||||
|
||||
private async handleLockedUser(userId: UserId) {
|
||||
if (process.env.BW_NOINTERACTION === "true") {
|
||||
this.processResponse(Response.error("Vault is locked."), true);
|
||||
return;
|
||||
}
|
||||
|
||||
// must unlock with interaction allowed
|
||||
if (await this.serviceContainer.keyConnectorService.getUsesKeyConnector(userId)) {
|
||||
const response = Response.error(
|
||||
"Your vault is locked. You must unlock your vault using your session key.\n" +
|
||||
@ -164,9 +186,6 @@ export abstract class BaseProgram {
|
||||
this.processResponse(response, true);
|
||||
}
|
||||
}
|
||||
} else {
|
||||
this.processResponse(Response.error("Vault is locked."), true);
|
||||
}
|
||||
}
|
||||
|
||||
protected async exitIfFeatureFlagDisabled(featureFlag: FeatureFlag) {
|
||||
|
@ -1,6 +1,5 @@
|
||||
import * as chalk from "chalk";
|
||||
import { program, Command, OptionValues } from "commander";
|
||||
import { firstValueFrom } from "rxjs";
|
||||
|
||||
import { AuthenticationStatus } from "@bitwarden/common/auth/enums/authentication-status";
|
||||
|
||||
@ -61,18 +60,8 @@ export class Program extends BaseProgram {
|
||||
process.env.BW_NOINTERACTION = "true";
|
||||
});
|
||||
|
||||
program.on("option:session", async (key) => {
|
||||
program.on("option:session", (key) => {
|
||||
process.env.BW_SESSION = key;
|
||||
|
||||
// once we have the session key, we can set the user key in memory
|
||||
const activeAccount = await firstValueFrom(
|
||||
this.serviceContainer.accountService.activeAccount$,
|
||||
);
|
||||
if (activeAccount) {
|
||||
await this.serviceContainer.userAutoUnlockKeyService.setUserKeyInMemoryIfAutoUserKeySet(
|
||||
activeAccount.id,
|
||||
);
|
||||
}
|
||||
});
|
||||
|
||||
program.on("command:*", () => {
|
||||
|
@ -803,6 +803,10 @@ export class ServiceContainer {
|
||||
await this.i18nService.init();
|
||||
this.twoFactorService.init();
|
||||
|
||||
// If a user has a BW_SESSION key stored in their env (not process.env.BW_SESSION),
|
||||
// this should set the user key to unlock the vault on init.
|
||||
// TODO: ideally, we wouldn't want to do this here but instead only for commands that require the vault to be unlocked
|
||||
// as this runs on every command and could be a performance hit
|
||||
const activeAccount = await firstValueFrom(this.accountService.activeAccount$);
|
||||
if (activeAccount?.id) {
|
||||
await this.userAutoUnlockKeyService.setUserKeyInMemoryIfAutoUserKeySet(activeAccount.id);
|
||||
|
@ -16,10 +16,11 @@ export class UserAutoUnlockKeyService {
|
||||
* However, for users that have the auto unlock user key set, we need to set the user key in memory
|
||||
* on application bootstrap and on active account changes so that the user's vault loads unlocked.
|
||||
* @param userId - The user id to check for an auto user key.
|
||||
* @returns True if the auto user key is set successfully, false otherwise.
|
||||
*/
|
||||
async setUserKeyInMemoryIfAutoUserKeySet(userId: UserId): Promise<void> {
|
||||
async setUserKeyInMemoryIfAutoUserKeySet(userId: UserId): Promise<boolean> {
|
||||
if (userId == null) {
|
||||
return;
|
||||
return false;
|
||||
}
|
||||
|
||||
const autoUserKey = await this.cryptoService.getUserKeyFromStorage(
|
||||
@ -28,9 +29,10 @@ export class UserAutoUnlockKeyService {
|
||||
);
|
||||
|
||||
if (autoUserKey == null) {
|
||||
return;
|
||||
return false;
|
||||
}
|
||||
|
||||
await this.cryptoService.setUserKey(autoUserKey, userId);
|
||||
return true;
|
||||
}
|
||||
}
|
||||
|
Loading…
Reference in New Issue
Block a user