2017-05-11 17:41:13 +02:00
|
|
|
|
using Bit.Core.Models.Data;
|
2017-07-10 20:30:12 +02:00
|
|
|
|
using Newtonsoft.Json;
|
2017-03-21 05:04:39 +01:00
|
|
|
|
using System;
|
|
|
|
|
using System.Collections.Generic;
|
|
|
|
|
using System.Data;
|
2017-08-11 23:06:31 +02:00
|
|
|
|
using System.IO;
|
2017-07-28 06:17:31 +02:00
|
|
|
|
using System.Linq;
|
2017-08-11 23:06:31 +02:00
|
|
|
|
using System.Reflection;
|
2017-06-29 21:55:39 +02:00
|
|
|
|
using System.Security.Cryptography;
|
2017-01-13 00:35:26 +01:00
|
|
|
|
using System.Security.Cryptography.X509Certificates;
|
2017-06-29 21:55:39 +02:00
|
|
|
|
using System.Text;
|
2017-01-13 00:35:26 +01:00
|
|
|
|
using System.Text.RegularExpressions;
|
2017-08-22 18:38:48 +02:00
|
|
|
|
using Dapper;
|
2017-12-15 21:23:57 +01:00
|
|
|
|
using System.Globalization;
|
2018-03-22 18:18:18 +01:00
|
|
|
|
using System.Web;
|
2018-05-24 22:53:07 +02:00
|
|
|
|
using Microsoft.AspNetCore.DataProtection;
|
2018-12-20 04:27:45 +01:00
|
|
|
|
using Bit.Core.Enums;
|
2021-02-04 19:54:21 +01:00
|
|
|
|
using Bit.Core.Context;
|
2019-07-11 02:05:07 +02:00
|
|
|
|
using System.Threading.Tasks;
|
2020-01-10 14:33:13 +01:00
|
|
|
|
using Microsoft.Azure.Storage;
|
|
|
|
|
using Microsoft.Azure.Storage.Blob;
|
2020-11-10 21:15:29 +01:00
|
|
|
|
using Bit.Core.Models.Table;
|
|
|
|
|
using IdentityModel;
|
2021-01-12 17:02:39 +01:00
|
|
|
|
using System.Text.Json;
|
2016-05-21 23:16:22 +02:00
|
|
|
|
|
|
|
|
|
namespace Bit.Core.Utilities
|
|
|
|
|
{
|
|
|
|
|
public static class CoreHelpers
|
|
|
|
|
{
|
|
|
|
|
private static readonly long _baseDateTicks = new DateTime(1900, 1, 1).Ticks;
|
2017-07-14 15:05:15 +02:00
|
|
|
|
private static readonly DateTime _epoc = new DateTime(1970, 1, 1, 0, 0, 0, DateTimeKind.Utc);
|
2017-12-15 21:23:57 +01:00
|
|
|
|
private static readonly DateTime _max = new DateTime(9999, 1, 1, 0, 0, 0, DateTimeKind.Utc);
|
2017-07-28 06:17:31 +02:00
|
|
|
|
private static readonly Random _random = new Random();
|
2017-08-25 14:57:43 +02:00
|
|
|
|
private static string _version;
|
2017-09-12 05:08:08 +02:00
|
|
|
|
private static readonly string _qwertyDvorakMap = "-=qwertyuiop[]asdfghjkl;'zxcvbnm,./_+QWERTYUIO" +
|
|
|
|
|
"P{}ASDFGHJKL:\"ZXCVBNM<>?";
|
|
|
|
|
private static readonly string _dvorakMap = "[]',.pyfgcrl/=aoeuidhtns-;qjkxbmwvz{}\"<>PYFGC" +
|
|
|
|
|
"RL?+AOEUIDHTNS_:QJKXBMWVZ";
|
2017-09-12 05:25:11 +02:00
|
|
|
|
private static readonly string _qwertyColemakMap = "qwertyuiopasdfghjkl;zxcvbnmQWERTYUIOPASDFGHJKL:ZXCVBNM";
|
|
|
|
|
private static readonly string _colemakMap = "qwfpgjluy;arstdhneiozxcvbkmQWFPGJLUY:ARSTDHNEIOZXCVBKM";
|
2019-09-03 20:08:08 +02:00
|
|
|
|
private static readonly string CloudFlareConnectingIp = "CF-Connecting-IP";
|
|
|
|
|
private static readonly string RealIp = "X-Real-IP";
|
2016-05-21 23:16:22 +02:00
|
|
|
|
|
|
|
|
|
/// <summary>
|
|
|
|
|
/// Generate sequential Guid for Sql Server.
|
|
|
|
|
/// ref: https://github.com/nhibernate/nhibernate-core/blob/master/src/NHibernate/Id/GuidCombGenerator.cs
|
|
|
|
|
/// </summary>
|
|
|
|
|
/// <returns>A comb Guid.</returns>
|
|
|
|
|
public static Guid GenerateComb()
|
|
|
|
|
{
|
|
|
|
|
var guidArray = Guid.NewGuid().ToByteArray();
|
|
|
|
|
|
|
|
|
|
var now = DateTime.UtcNow;
|
|
|
|
|
|
|
|
|
|
// Get the days and milliseconds which will be used to build the byte string
|
|
|
|
|
var days = new TimeSpan(now.Ticks - _baseDateTicks);
|
|
|
|
|
var msecs = now.TimeOfDay;
|
|
|
|
|
|
|
|
|
|
// Convert to a byte array
|
|
|
|
|
// Note that SQL Server is accurate to 1/300th of a millisecond so we divide by 3.333333
|
|
|
|
|
var daysArray = BitConverter.GetBytes(days.Days);
|
|
|
|
|
var msecsArray = BitConverter.GetBytes((long)(msecs.TotalMilliseconds / 3.333333));
|
|
|
|
|
|
|
|
|
|
// Reverse the bytes to match SQL Servers ordering
|
|
|
|
|
Array.Reverse(daysArray);
|
|
|
|
|
Array.Reverse(msecsArray);
|
|
|
|
|
|
|
|
|
|
// Copy the bytes into the guid
|
|
|
|
|
Array.Copy(daysArray, daysArray.Length - 2, guidArray, guidArray.Length - 6, 2);
|
|
|
|
|
Array.Copy(msecsArray, msecsArray.Length - 4, guidArray, guidArray.Length - 4, 4);
|
|
|
|
|
|
|
|
|
|
return new Guid(guidArray);
|
|
|
|
|
}
|
2017-01-13 00:35:26 +01:00
|
|
|
|
|
2019-07-25 21:50:13 +02:00
|
|
|
|
public static IEnumerable<IEnumerable<T>> Batch<T>(this IEnumerable<T> source, int size)
|
|
|
|
|
{
|
|
|
|
|
T[] bucket = null;
|
|
|
|
|
var count = 0;
|
2020-03-27 19:36:37 +01:00
|
|
|
|
foreach (var item in source)
|
2019-07-25 21:50:13 +02:00
|
|
|
|
{
|
2020-03-27 19:36:37 +01:00
|
|
|
|
if (bucket == null)
|
2019-07-25 21:50:13 +02:00
|
|
|
|
{
|
|
|
|
|
bucket = new T[size];
|
|
|
|
|
}
|
|
|
|
|
bucket[count++] = item;
|
2020-03-27 19:36:37 +01:00
|
|
|
|
if (count != size)
|
2019-07-25 21:50:13 +02:00
|
|
|
|
{
|
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
yield return bucket.Select(x => x);
|
|
|
|
|
bucket = null;
|
|
|
|
|
count = 0;
|
|
|
|
|
}
|
|
|
|
|
// Return the last bucket with all remaining elements
|
2020-03-27 19:36:37 +01:00
|
|
|
|
if (bucket != null && count > 0)
|
2019-07-25 21:50:13 +02:00
|
|
|
|
{
|
|
|
|
|
yield return bucket.Take(count);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2017-03-21 05:04:39 +01:00
|
|
|
|
public static DataTable ToGuidIdArrayTVP(this IEnumerable<Guid> ids)
|
|
|
|
|
{
|
|
|
|
|
return ids.ToArrayTVP("GuidId");
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public static DataTable ToArrayTVP<T>(this IEnumerable<T> values, string columnName)
|
|
|
|
|
{
|
2017-08-09 14:14:45 +02:00
|
|
|
|
var table = new DataTable();
|
2017-08-22 18:38:48 +02:00
|
|
|
|
table.SetTypeName($"[dbo].[{columnName}Array]");
|
2017-03-21 05:04:39 +01:00
|
|
|
|
table.Columns.Add(columnName, typeof(T));
|
|
|
|
|
|
2020-03-27 19:36:37 +01:00
|
|
|
|
if (values != null)
|
2017-03-21 05:04:39 +01:00
|
|
|
|
{
|
2020-03-27 19:36:37 +01:00
|
|
|
|
foreach (var value in values)
|
2017-03-21 05:04:39 +01:00
|
|
|
|
{
|
|
|
|
|
table.Rows.Add(value);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return table;
|
|
|
|
|
}
|
|
|
|
|
|
2017-05-11 17:41:13 +02:00
|
|
|
|
public static DataTable ToArrayTVP(this IEnumerable<SelectionReadOnly> values)
|
|
|
|
|
{
|
2017-08-09 14:14:45 +02:00
|
|
|
|
var table = new DataTable();
|
2017-08-22 18:38:48 +02:00
|
|
|
|
table.SetTypeName("[dbo].[SelectionReadOnlyArray]");
|
2017-05-11 17:41:13 +02:00
|
|
|
|
|
|
|
|
|
var idColumn = new DataColumn("Id", typeof(Guid));
|
|
|
|
|
table.Columns.Add(idColumn);
|
|
|
|
|
var readOnlyColumn = new DataColumn("ReadOnly", typeof(bool));
|
|
|
|
|
table.Columns.Add(readOnlyColumn);
|
2020-05-21 15:36:47 +02:00
|
|
|
|
var hidePasswordsColumn = new DataColumn("HidePasswords", typeof(bool));
|
|
|
|
|
table.Columns.Add(hidePasswordsColumn);
|
2017-05-11 17:41:13 +02:00
|
|
|
|
|
2020-03-27 19:36:37 +01:00
|
|
|
|
if (values != null)
|
2017-05-11 17:41:13 +02:00
|
|
|
|
{
|
2020-03-27 19:36:37 +01:00
|
|
|
|
foreach (var value in values)
|
2017-05-11 17:41:13 +02:00
|
|
|
|
{
|
|
|
|
|
var row = table.NewRow();
|
|
|
|
|
row[idColumn] = value.Id;
|
|
|
|
|
row[readOnlyColumn] = value.ReadOnly;
|
2020-05-21 15:36:47 +02:00
|
|
|
|
row[hidePasswordsColumn] = value.HidePasswords;
|
2017-05-11 17:41:13 +02:00
|
|
|
|
table.Rows.Add(row);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return table;
|
|
|
|
|
}
|
|
|
|
|
|
2017-08-11 23:06:31 +02:00
|
|
|
|
public static string CleanCertificateThumbprint(string thumbprint)
|
2017-01-13 00:35:26 +01:00
|
|
|
|
{
|
|
|
|
|
// Clean possible garbage characters from thumbprint copy/paste
|
|
|
|
|
// ref http://stackoverflow.com/questions/8448147/problems-with-x509store-certificates-find-findbythumbprint
|
2017-08-11 23:06:31 +02:00
|
|
|
|
return Regex.Replace(thumbprint, @"[^\da-fA-F]", string.Empty).ToUpper();
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public static X509Certificate2 GetCertificate(string thumbprint)
|
|
|
|
|
{
|
|
|
|
|
thumbprint = CleanCertificateThumbprint(thumbprint);
|
2017-01-13 00:35:26 +01:00
|
|
|
|
|
|
|
|
|
X509Certificate2 cert = null;
|
|
|
|
|
var certStore = new X509Store(StoreName.My, StoreLocation.CurrentUser);
|
|
|
|
|
certStore.Open(OpenFlags.ReadOnly);
|
|
|
|
|
var certCollection = certStore.Certificates.Find(X509FindType.FindByThumbprint, thumbprint, false);
|
2020-03-27 19:36:37 +01:00
|
|
|
|
if (certCollection.Count > 0)
|
2017-01-13 00:35:26 +01:00
|
|
|
|
{
|
|
|
|
|
cert = certCollection[0];
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
certStore.Close();
|
|
|
|
|
return cert;
|
|
|
|
|
}
|
2017-01-14 18:47:44 +01:00
|
|
|
|
|
2017-08-07 17:24:16 +02:00
|
|
|
|
public static X509Certificate2 GetCertificate(string file, string password)
|
|
|
|
|
{
|
|
|
|
|
return new X509Certificate2(file, password);
|
|
|
|
|
}
|
|
|
|
|
|
2020-01-13 21:35:50 +01:00
|
|
|
|
public async static Task<X509Certificate2> GetEmbeddedCertificateAsync(string file, string password)
|
2017-08-11 23:06:31 +02:00
|
|
|
|
{
|
|
|
|
|
var assembly = typeof(CoreHelpers).GetTypeInfo().Assembly;
|
2020-03-27 19:36:37 +01:00
|
|
|
|
using (var s = assembly.GetManifestResourceStream($"Bit.Core.{file}"))
|
|
|
|
|
using (var ms = new MemoryStream())
|
2017-08-11 23:06:31 +02:00
|
|
|
|
{
|
2020-01-13 21:35:50 +01:00
|
|
|
|
await s.CopyToAsync(ms);
|
2017-08-11 23:06:31 +02:00
|
|
|
|
return new X509Certificate2(ms.ToArray(), password);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2019-07-11 02:05:07 +02:00
|
|
|
|
public async static Task<X509Certificate2> GetBlobCertificateAsync(CloudStorageAccount cloudStorageAccount,
|
|
|
|
|
string container, string file, string password)
|
|
|
|
|
{
|
|
|
|
|
var blobClient = cloudStorageAccount.CreateCloudBlobClient();
|
|
|
|
|
var containerRef = blobClient.GetContainerReference(container);
|
2020-08-25 19:15:59 +02:00
|
|
|
|
if (await containerRef.ExistsAsync().ConfigureAwait(false))
|
2019-07-11 02:05:07 +02:00
|
|
|
|
{
|
|
|
|
|
var blobRef = containerRef.GetBlobReference(file);
|
2020-08-25 19:15:59 +02:00
|
|
|
|
if (await blobRef.ExistsAsync().ConfigureAwait(false))
|
2019-07-11 02:05:07 +02:00
|
|
|
|
{
|
|
|
|
|
var blobBytes = new byte[blobRef.Properties.Length];
|
2020-08-25 19:15:59 +02:00
|
|
|
|
await blobRef.DownloadToByteArrayAsync(blobBytes, 0).ConfigureAwait(false);
|
2019-07-11 02:05:07 +02:00
|
|
|
|
return new X509Certificate2(blobBytes, password);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
return null;
|
|
|
|
|
}
|
|
|
|
|
|
2017-03-23 05:17:34 +01:00
|
|
|
|
public static long ToEpocMilliseconds(DateTime date)
|
2017-01-14 18:47:44 +01:00
|
|
|
|
{
|
|
|
|
|
return (long)Math.Round((date - _epoc).TotalMilliseconds, 0);
|
|
|
|
|
}
|
2017-03-23 05:17:34 +01:00
|
|
|
|
|
|
|
|
|
public static DateTime FromEpocMilliseconds(long milliseconds)
|
|
|
|
|
{
|
|
|
|
|
return _epoc.AddMilliseconds(milliseconds);
|
|
|
|
|
}
|
2017-06-22 23:03:35 +02:00
|
|
|
|
|
2017-08-12 04:55:25 +02:00
|
|
|
|
public static long ToEpocSeconds(DateTime date)
|
|
|
|
|
{
|
|
|
|
|
return (long)Math.Round((date - _epoc).TotalSeconds, 0);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public static DateTime FromEpocSeconds(long seconds)
|
|
|
|
|
{
|
|
|
|
|
return _epoc.AddSeconds(seconds);
|
|
|
|
|
}
|
|
|
|
|
|
2017-06-22 23:03:35 +02:00
|
|
|
|
public static string U2fAppIdUrl(GlobalSettings globalSettings)
|
|
|
|
|
{
|
2017-08-04 05:12:05 +02:00
|
|
|
|
return string.Concat(globalSettings.BaseServiceUri.Vault, "/app-id.json");
|
2017-06-22 23:03:35 +02:00
|
|
|
|
}
|
2017-06-29 21:55:39 +02:00
|
|
|
|
|
2017-07-28 06:17:31 +02:00
|
|
|
|
public static string RandomString(int length, bool alpha = true, bool upper = true, bool lower = true,
|
2017-06-29 21:55:39 +02:00
|
|
|
|
bool numeric = true, bool special = false)
|
|
|
|
|
{
|
2017-07-28 06:17:31 +02:00
|
|
|
|
return RandomString(length, RandomStringCharacters(alpha, upper, lower, numeric, special));
|
|
|
|
|
}
|
2017-06-29 21:55:39 +02:00
|
|
|
|
|
2017-07-28 06:17:31 +02:00
|
|
|
|
public static string RandomString(int length, string characters)
|
|
|
|
|
{
|
|
|
|
|
return new string(Enumerable.Repeat(characters, length).Select(s => s[_random.Next(s.Length)]).ToArray());
|
|
|
|
|
}
|
2017-06-29 21:55:39 +02:00
|
|
|
|
|
2017-07-28 06:17:31 +02:00
|
|
|
|
public static string SecureRandomString(int length, bool alpha = true, bool upper = true, bool lower = true,
|
|
|
|
|
bool numeric = true, bool special = false)
|
|
|
|
|
{
|
|
|
|
|
return SecureRandomString(length, RandomStringCharacters(alpha, upper, lower, numeric, special));
|
2017-06-29 21:55:39 +02:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// ref https://stackoverflow.com/a/8996788/1090359 with modifications
|
|
|
|
|
public static string SecureRandomString(int length, string characters)
|
|
|
|
|
{
|
2020-03-27 19:36:37 +01:00
|
|
|
|
if (length < 0)
|
2017-06-29 21:55:39 +02:00
|
|
|
|
{
|
|
|
|
|
throw new ArgumentOutOfRangeException(nameof(length), "length cannot be less than zero.");
|
|
|
|
|
}
|
|
|
|
|
|
2020-03-27 19:36:37 +01:00
|
|
|
|
if ((characters?.Length ?? 0) == 0)
|
2017-06-29 21:55:39 +02:00
|
|
|
|
{
|
|
|
|
|
throw new ArgumentOutOfRangeException(nameof(characters), "characters invalid.");
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
const int byteSize = 0x100;
|
2020-03-27 19:36:37 +01:00
|
|
|
|
if (byteSize < characters.Length)
|
2017-06-29 21:55:39 +02:00
|
|
|
|
{
|
|
|
|
|
throw new ArgumentException(
|
|
|
|
|
string.Format("{0} may contain no more than {1} characters.", nameof(characters), byteSize),
|
|
|
|
|
nameof(characters));
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
var outOfRangeStart = byteSize - (byteSize % characters.Length);
|
2020-03-27 19:36:37 +01:00
|
|
|
|
using (var rng = RandomNumberGenerator.Create())
|
2017-06-29 21:55:39 +02:00
|
|
|
|
{
|
|
|
|
|
var sb = new StringBuilder();
|
|
|
|
|
var buffer = new byte[128];
|
2020-03-27 19:36:37 +01:00
|
|
|
|
while (sb.Length < length)
|
2017-06-29 21:55:39 +02:00
|
|
|
|
{
|
|
|
|
|
rng.GetBytes(buffer);
|
2020-03-27 19:36:37 +01:00
|
|
|
|
for (var i = 0; i < buffer.Length && sb.Length < length; ++i)
|
2017-06-29 21:55:39 +02:00
|
|
|
|
{
|
|
|
|
|
// Divide the byte into charSet-sized groups. If the random value falls into the last group and the
|
|
|
|
|
// last group is too small to choose from the entire allowedCharSet, ignore the value in order to
|
|
|
|
|
// avoid biasing the result.
|
2020-03-27 19:36:37 +01:00
|
|
|
|
if (outOfRangeStart <= buffer[i])
|
2017-06-29 21:55:39 +02:00
|
|
|
|
{
|
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
sb.Append(characters[buffer[i] % characters.Length]);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return sb.ToString();
|
|
|
|
|
}
|
|
|
|
|
}
|
2017-07-01 05:01:41 +02:00
|
|
|
|
|
2017-07-28 06:17:31 +02:00
|
|
|
|
private static string RandomStringCharacters(bool alpha, bool upper, bool lower, bool numeric, bool special)
|
|
|
|
|
{
|
|
|
|
|
var characters = string.Empty;
|
2020-03-27 19:36:37 +01:00
|
|
|
|
if (alpha)
|
2017-07-28 06:17:31 +02:00
|
|
|
|
{
|
2020-03-27 19:36:37 +01:00
|
|
|
|
if (upper)
|
2017-07-28 06:17:31 +02:00
|
|
|
|
{
|
|
|
|
|
characters += "ABCDEFGHIJKLMNOPQRSTUVWXYZ";
|
|
|
|
|
}
|
|
|
|
|
|
2020-03-27 19:36:37 +01:00
|
|
|
|
if (lower)
|
2017-07-28 06:17:31 +02:00
|
|
|
|
{
|
|
|
|
|
characters += "abcdefghijklmnopqrstuvwxyz";
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2020-03-27 19:36:37 +01:00
|
|
|
|
if (numeric)
|
2017-07-28 06:17:31 +02:00
|
|
|
|
{
|
|
|
|
|
characters += "0123456789";
|
|
|
|
|
}
|
|
|
|
|
|
2020-03-27 19:36:37 +01:00
|
|
|
|
if (special)
|
2017-07-28 06:17:31 +02:00
|
|
|
|
{
|
|
|
|
|
characters += "!@#$%^*&";
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return characters;
|
|
|
|
|
}
|
|
|
|
|
|
2017-07-01 05:01:41 +02:00
|
|
|
|
// ref: https://stackoverflow.com/a/11124118/1090359
|
|
|
|
|
// Returns the human-readable file size for an arbitrary 64-bit file size .
|
|
|
|
|
// The format is "0.## XB", ex: "4.2 KB" or "1.43 GB"
|
|
|
|
|
public static string ReadableBytesSize(long size)
|
|
|
|
|
{
|
|
|
|
|
// Get absolute value
|
|
|
|
|
var absoluteSize = (size < 0 ? -size : size);
|
|
|
|
|
|
|
|
|
|
// Determine the suffix and readable value
|
|
|
|
|
string suffix;
|
|
|
|
|
double readable;
|
2020-03-27 19:36:37 +01:00
|
|
|
|
if (absoluteSize >= 0x40000000) // 1 Gigabyte
|
2017-07-01 05:01:41 +02:00
|
|
|
|
{
|
|
|
|
|
suffix = "GB";
|
|
|
|
|
readable = (size >> 20);
|
|
|
|
|
}
|
2020-03-27 19:36:37 +01:00
|
|
|
|
else if (absoluteSize >= 0x100000) // 1 Megabyte
|
2017-07-01 05:01:41 +02:00
|
|
|
|
{
|
|
|
|
|
suffix = "MB";
|
|
|
|
|
readable = (size >> 10);
|
|
|
|
|
}
|
2020-03-27 19:36:37 +01:00
|
|
|
|
else if (absoluteSize >= 0x400) // 1 Kilobyte
|
2017-07-01 05:01:41 +02:00
|
|
|
|
{
|
|
|
|
|
suffix = "KB";
|
|
|
|
|
readable = size;
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
2021-01-06 19:49:28 +01:00
|
|
|
|
return size.ToString("0 Bytes"); // Byte
|
2017-07-01 05:01:41 +02:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// Divide by 1024 to get fractional value
|
|
|
|
|
readable = (readable / 1024);
|
|
|
|
|
|
|
|
|
|
// Return formatted number with suffix
|
|
|
|
|
return readable.ToString("0.## ") + suffix;
|
|
|
|
|
}
|
2017-07-10 20:30:12 +02:00
|
|
|
|
|
2020-12-08 02:35:34 +01:00
|
|
|
|
/// <summary>
|
|
|
|
|
/// Creates a clone of the given object through serializing to json and deserializing.
|
|
|
|
|
/// This method is subject to the limitations of Newstonsoft. For example, properties with
|
|
|
|
|
/// inaccessible setters will not be set.
|
|
|
|
|
/// </summary>
|
2017-07-10 20:30:12 +02:00
|
|
|
|
public static T CloneObject<T>(T obj)
|
|
|
|
|
{
|
|
|
|
|
return JsonConvert.DeserializeObject<T>(JsonConvert.SerializeObject(obj));
|
|
|
|
|
}
|
2017-08-08 23:27:01 +02:00
|
|
|
|
|
|
|
|
|
public static bool SettingHasValue(string setting)
|
|
|
|
|
{
|
2018-08-16 00:43:26 +02:00
|
|
|
|
var normalizedSetting = setting?.ToLowerInvariant();
|
|
|
|
|
return !string.IsNullOrWhiteSpace(normalizedSetting) && !normalizedSetting.Equals("secret") &&
|
|
|
|
|
!normalizedSetting.Equals("replace");
|
2017-08-08 23:27:01 +02:00
|
|
|
|
}
|
2017-08-11 16:04:59 +02:00
|
|
|
|
|
2019-03-12 04:31:45 +01:00
|
|
|
|
public static string Base64EncodeString(string input)
|
|
|
|
|
{
|
|
|
|
|
return Convert.ToBase64String(Encoding.UTF8.GetBytes(input));
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public static string Base64DecodeString(string input)
|
|
|
|
|
{
|
|
|
|
|
return Encoding.UTF8.GetString(Convert.FromBase64String(input));
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public static string Base64UrlEncodeString(string input)
|
|
|
|
|
{
|
|
|
|
|
return Base64UrlEncode(Encoding.UTF8.GetBytes(input));
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public static string Base64UrlDecodeString(string input)
|
|
|
|
|
{
|
|
|
|
|
return Encoding.UTF8.GetString(Base64UrlDecode(input));
|
|
|
|
|
}
|
|
|
|
|
|
2017-08-11 16:04:59 +02:00
|
|
|
|
public static string Base64UrlEncode(byte[] input)
|
|
|
|
|
{
|
|
|
|
|
var output = Convert.ToBase64String(input)
|
|
|
|
|
.Replace('+', '-')
|
|
|
|
|
.Replace('/', '_')
|
|
|
|
|
.Replace("=", string.Empty);
|
|
|
|
|
return output;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public static byte[] Base64UrlDecode(string input)
|
|
|
|
|
{
|
|
|
|
|
var output = input;
|
|
|
|
|
// 62nd char of encoding
|
|
|
|
|
output = output.Replace('-', '+');
|
|
|
|
|
// 63rd char of encoding
|
|
|
|
|
output = output.Replace('_', '/');
|
|
|
|
|
// Pad with trailing '='s
|
2020-03-27 19:36:37 +01:00
|
|
|
|
switch (output.Length % 4)
|
2017-08-11 16:04:59 +02:00
|
|
|
|
{
|
|
|
|
|
case 0:
|
|
|
|
|
// No pad chars in this case
|
|
|
|
|
break;
|
|
|
|
|
case 2:
|
|
|
|
|
// Two pad chars
|
|
|
|
|
output += "=="; break;
|
|
|
|
|
case 3:
|
|
|
|
|
// One pad char
|
|
|
|
|
output += "="; break;
|
|
|
|
|
default:
|
|
|
|
|
throw new InvalidOperationException("Illegal base64url string!");
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// Standard base64 decoder
|
|
|
|
|
return Convert.FromBase64String(output);
|
|
|
|
|
}
|
2017-08-16 19:55:01 +02:00
|
|
|
|
|
|
|
|
|
public static string FormatLicenseSignatureValue(object val)
|
|
|
|
|
{
|
2020-03-27 19:36:37 +01:00
|
|
|
|
if (val == null)
|
2017-08-16 19:55:01 +02:00
|
|
|
|
{
|
|
|
|
|
return string.Empty;
|
|
|
|
|
}
|
|
|
|
|
|
2020-03-27 19:36:37 +01:00
|
|
|
|
if (val.GetType() == typeof(DateTime))
|
2017-08-16 19:55:01 +02:00
|
|
|
|
{
|
|
|
|
|
return ToEpocSeconds((DateTime)val).ToString();
|
|
|
|
|
}
|
|
|
|
|
|
2020-03-27 19:36:37 +01:00
|
|
|
|
if (val.GetType() == typeof(bool))
|
2017-08-16 19:55:01 +02:00
|
|
|
|
{
|
|
|
|
|
return val.ToString().ToLowerInvariant();
|
|
|
|
|
}
|
|
|
|
|
|
2020-08-21 23:44:45 +02:00
|
|
|
|
if (val is PlanType planType)
|
|
|
|
|
{
|
|
|
|
|
return planType switch
|
|
|
|
|
{
|
|
|
|
|
PlanType.Free => "Free",
|
|
|
|
|
PlanType.FamiliesAnnually2019 => "FamiliesAnnually",
|
|
|
|
|
PlanType.TeamsMonthly2019 => "TeamsMonthly",
|
|
|
|
|
PlanType.TeamsAnnually2019 => "TeamsAnnually",
|
|
|
|
|
PlanType.EnterpriseMonthly2019 => "EnterpriseMonthly",
|
|
|
|
|
PlanType.EnterpriseAnnually2019 => "EnterpriseAnnually",
|
|
|
|
|
PlanType.Custom => "Custom",
|
|
|
|
|
_ => ((byte)planType).ToString(),
|
|
|
|
|
};
|
|
|
|
|
}
|
|
|
|
|
|
2017-08-16 19:55:01 +02:00
|
|
|
|
return val.ToString();
|
|
|
|
|
}
|
2017-08-25 14:57:43 +02:00
|
|
|
|
|
2017-09-07 05:57:14 +02:00
|
|
|
|
public static string GetVersion()
|
2017-08-25 14:57:43 +02:00
|
|
|
|
{
|
2020-03-27 19:36:37 +01:00
|
|
|
|
if (string.IsNullOrWhiteSpace(_version))
|
2017-08-25 14:57:43 +02:00
|
|
|
|
{
|
|
|
|
|
_version = Assembly.GetEntryAssembly()
|
|
|
|
|
.GetCustomAttribute<AssemblyInformationalVersionAttribute>()
|
|
|
|
|
.InformationalVersion;
|
|
|
|
|
}
|
|
|
|
|
|
2017-09-07 05:57:14 +02:00
|
|
|
|
return _version;
|
2017-08-25 14:57:43 +02:00
|
|
|
|
}
|
2017-09-12 05:08:08 +02:00
|
|
|
|
|
|
|
|
|
public static string Dvorak2Qwerty(string value)
|
|
|
|
|
{
|
|
|
|
|
return Other2Qwerty(value, _dvorakMap, _qwertyDvorakMap);
|
|
|
|
|
}
|
|
|
|
|
|
2017-09-12 16:11:56 +02:00
|
|
|
|
public static string Colemak2Qwerty(string value)
|
2017-09-12 05:08:08 +02:00
|
|
|
|
{
|
2017-09-12 05:25:11 +02:00
|
|
|
|
return Other2Qwerty(value, _colemakMap, _qwertyColemakMap);
|
2017-09-12 05:08:08 +02:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
private static string Other2Qwerty(string value, string otherMap, string qwertyMap)
|
|
|
|
|
{
|
|
|
|
|
var sb = new StringBuilder();
|
2020-03-27 19:36:37 +01:00
|
|
|
|
foreach (var c in value)
|
2017-09-12 05:08:08 +02:00
|
|
|
|
{
|
|
|
|
|
sb.Append(otherMap.IndexOf(c) > -1 ? qwertyMap[otherMap.IndexOf(c)] : c);
|
|
|
|
|
}
|
|
|
|
|
return sb.ToString();
|
|
|
|
|
}
|
2017-09-27 18:45:57 +02:00
|
|
|
|
|
|
|
|
|
public static string SanitizeForEmail(string value)
|
|
|
|
|
{
|
2021-02-11 20:39:13 +01:00
|
|
|
|
var cleanedValue = value.Replace("@", "[at]")
|
2017-09-27 18:45:57 +02:00
|
|
|
|
.Replace("http://", string.Empty)
|
|
|
|
|
.Replace("https://", string.Empty);
|
2021-02-11 20:39:13 +01:00
|
|
|
|
return HttpUtility.HtmlEncode(cleanedValue);
|
2017-09-27 18:45:57 +02:00
|
|
|
|
}
|
2017-11-29 04:21:47 +01:00
|
|
|
|
|
|
|
|
|
public static string DateTimeToTableStorageKey(DateTime? date = null)
|
|
|
|
|
{
|
2020-03-27 19:36:37 +01:00
|
|
|
|
if (date.HasValue)
|
2017-12-15 21:23:57 +01:00
|
|
|
|
{
|
|
|
|
|
date = date.Value.ToUniversalTime();
|
|
|
|
|
}
|
|
|
|
|
else
|
2017-11-29 04:21:47 +01:00
|
|
|
|
{
|
|
|
|
|
date = DateTime.UtcNow;
|
|
|
|
|
}
|
|
|
|
|
|
2017-12-15 21:23:57 +01:00
|
|
|
|
return _max.Subtract(date.Value).TotalMilliseconds.ToString(CultureInfo.InvariantCulture);
|
2017-11-29 04:21:47 +01:00
|
|
|
|
}
|
2018-03-22 18:18:18 +01:00
|
|
|
|
|
|
|
|
|
// ref: https://stackoverflow.com/a/27545010/1090359
|
|
|
|
|
public static Uri ExtendQuery(Uri uri, IDictionary<string, string> values)
|
|
|
|
|
{
|
|
|
|
|
var baseUri = uri.ToString();
|
|
|
|
|
var queryString = string.Empty;
|
2020-03-27 19:36:37 +01:00
|
|
|
|
if (baseUri.Contains("?"))
|
2018-03-22 18:18:18 +01:00
|
|
|
|
{
|
|
|
|
|
var urlSplit = baseUri.Split('?');
|
|
|
|
|
baseUri = urlSplit[0];
|
|
|
|
|
queryString = urlSplit.Length > 1 ? urlSplit[1] : string.Empty;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
var queryCollection = HttpUtility.ParseQueryString(queryString);
|
2020-03-27 19:36:37 +01:00
|
|
|
|
foreach (var kvp in values ?? new Dictionary<string, string>())
|
2018-03-22 18:18:18 +01:00
|
|
|
|
{
|
|
|
|
|
queryCollection[kvp.Key] = kvp.Value;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
var uriKind = uri.IsAbsoluteUri ? UriKind.Absolute : UriKind.Relative;
|
2020-03-27 19:36:37 +01:00
|
|
|
|
if (queryCollection.Count == 0)
|
2018-03-22 18:18:18 +01:00
|
|
|
|
{
|
|
|
|
|
return new Uri(baseUri, uriKind);
|
|
|
|
|
}
|
|
|
|
|
return new Uri(string.Format("{0}?{1}", baseUri, queryCollection), uriKind);
|
|
|
|
|
}
|
2018-05-24 22:53:07 +02:00
|
|
|
|
|
2018-12-20 04:27:45 +01:00
|
|
|
|
public static string CustomProviderName(TwoFactorProviderType type)
|
|
|
|
|
{
|
|
|
|
|
return string.Concat("Custom_", type.ToString());
|
|
|
|
|
}
|
2019-06-11 23:17:23 +02:00
|
|
|
|
|
2020-02-28 15:15:47 +01:00
|
|
|
|
public static bool UserInviteTokenIsValid(IDataProtector protector, string token, string userEmail,
|
|
|
|
|
Guid orgUserId, GlobalSettings globalSettings)
|
2020-12-16 20:36:47 +01:00
|
|
|
|
{
|
|
|
|
|
return TokenIsValid("OrganizationUserInvite", protector, token, userEmail, orgUserId, globalSettings);
|
|
|
|
|
}
|
2021-02-11 20:39:13 +01:00
|
|
|
|
|
2020-12-16 20:36:47 +01:00
|
|
|
|
public static bool TokenIsValid(string firstTokenPart, IDataProtector protector, string token, string userEmail,
|
|
|
|
|
Guid id, GlobalSettings globalSettings)
|
2019-06-11 23:17:23 +02:00
|
|
|
|
{
|
|
|
|
|
var invalid = true;
|
|
|
|
|
try
|
|
|
|
|
{
|
|
|
|
|
var unprotectedData = protector.Unprotect(token);
|
|
|
|
|
var dataParts = unprotectedData.Split(' ');
|
2020-12-16 20:36:47 +01:00
|
|
|
|
if (dataParts.Length == 4 && dataParts[0] == firstTokenPart &&
|
|
|
|
|
new Guid(dataParts[1]) == id &&
|
2019-06-11 23:17:23 +02:00
|
|
|
|
dataParts[2].Equals(userEmail, StringComparison.InvariantCultureIgnoreCase))
|
|
|
|
|
{
|
|
|
|
|
var creationTime = FromEpocMilliseconds(Convert.ToInt64(dataParts[3]));
|
|
|
|
|
var expTime = creationTime.AddHours(globalSettings.OrganizationInviteExpirationHours);
|
|
|
|
|
invalid = expTime < DateTime.UtcNow;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
catch
|
|
|
|
|
{
|
|
|
|
|
invalid = true;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return !invalid;
|
|
|
|
|
}
|
2019-06-13 06:10:37 +02:00
|
|
|
|
|
|
|
|
|
public static string GetApplicationCacheServiceBusSubcriptionName(GlobalSettings globalSettings)
|
|
|
|
|
{
|
|
|
|
|
var subName = globalSettings.ServiceBus.ApplicationCacheSubscriptionName;
|
2020-03-27 19:36:37 +01:00
|
|
|
|
if (string.IsNullOrWhiteSpace(subName))
|
2019-06-13 06:10:37 +02:00
|
|
|
|
{
|
|
|
|
|
var websiteInstanceId = Environment.GetEnvironmentVariable("WEBSITE_INSTANCE_ID");
|
2020-03-27 19:36:37 +01:00
|
|
|
|
if (string.IsNullOrWhiteSpace(websiteInstanceId))
|
2019-06-13 06:10:37 +02:00
|
|
|
|
{
|
|
|
|
|
throw new Exception("No service bus subscription name available.");
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
subName = $"{globalSettings.ProjectName.ToLower()}_{websiteInstanceId}";
|
2020-03-27 19:36:37 +01:00
|
|
|
|
if (subName.Length > 50)
|
2019-06-13 06:10:37 +02:00
|
|
|
|
{
|
|
|
|
|
subName = subName.Substring(0, 50);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
return subName;
|
|
|
|
|
}
|
2019-09-03 20:08:08 +02:00
|
|
|
|
|
|
|
|
|
public static string GetIpAddress(this Microsoft.AspNetCore.Http.HttpContext httpContext,
|
|
|
|
|
GlobalSettings globalSettings)
|
|
|
|
|
{
|
2020-03-27 19:36:37 +01:00
|
|
|
|
if (httpContext == null)
|
2019-09-03 20:08:08 +02:00
|
|
|
|
{
|
|
|
|
|
return null;
|
|
|
|
|
}
|
|
|
|
|
|
2020-03-27 19:36:37 +01:00
|
|
|
|
if (!globalSettings.SelfHosted && httpContext.Request.Headers.ContainsKey(CloudFlareConnectingIp))
|
2019-09-03 20:08:08 +02:00
|
|
|
|
{
|
|
|
|
|
return httpContext.Request.Headers[CloudFlareConnectingIp].ToString();
|
|
|
|
|
}
|
2020-03-27 19:36:37 +01:00
|
|
|
|
if (globalSettings.SelfHosted && httpContext.Request.Headers.ContainsKey(RealIp))
|
2019-09-03 20:08:08 +02:00
|
|
|
|
{
|
|
|
|
|
return httpContext.Request.Headers[RealIp].ToString();
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return httpContext.Connection?.RemoteIpAddress?.ToString();
|
|
|
|
|
}
|
2020-06-27 21:08:50 +02:00
|
|
|
|
|
|
|
|
|
public static bool IsCorsOriginAllowed(string origin, GlobalSettings globalSettings)
|
|
|
|
|
{
|
|
|
|
|
return
|
|
|
|
|
// Web vault
|
|
|
|
|
origin == globalSettings.BaseServiceUri.Vault ||
|
|
|
|
|
// Safari extension origin
|
|
|
|
|
origin == "file://" ||
|
|
|
|
|
// Product website
|
|
|
|
|
(!globalSettings.SelfHosted && origin == "https://bitwarden.com");
|
|
|
|
|
}
|
2020-08-25 19:15:59 +02:00
|
|
|
|
|
|
|
|
|
public static X509Certificate2 GetIdentityServerCertificate(GlobalSettings globalSettings)
|
|
|
|
|
{
|
|
|
|
|
if (globalSettings.SelfHosted &&
|
|
|
|
|
SettingHasValue(globalSettings.IdentityServer.CertificatePassword)
|
|
|
|
|
&& File.Exists("identity.pfx"))
|
|
|
|
|
{
|
|
|
|
|
return GetCertificate("identity.pfx",
|
|
|
|
|
globalSettings.IdentityServer.CertificatePassword);
|
|
|
|
|
}
|
|
|
|
|
else if (SettingHasValue(globalSettings.IdentityServer.CertificateThumbprint))
|
|
|
|
|
{
|
|
|
|
|
return GetCertificate(
|
|
|
|
|
globalSettings.IdentityServer.CertificateThumbprint);
|
|
|
|
|
}
|
|
|
|
|
else if (!globalSettings.SelfHosted &&
|
|
|
|
|
SettingHasValue(globalSettings.Storage?.ConnectionString) &&
|
|
|
|
|
SettingHasValue(globalSettings.IdentityServer.CertificatePassword))
|
|
|
|
|
{
|
|
|
|
|
var storageAccount = CloudStorageAccount.Parse(globalSettings.Storage.ConnectionString);
|
|
|
|
|
return GetBlobCertificateAsync(storageAccount, "certificates",
|
|
|
|
|
"identity.pfx", globalSettings.IdentityServer.CertificatePassword).GetAwaiter().GetResult();
|
|
|
|
|
}
|
|
|
|
|
return null;
|
|
|
|
|
}
|
2020-09-01 13:38:36 +02:00
|
|
|
|
|
|
|
|
|
public static Dictionary<string, object> AdjustIdentityServerConfig(Dictionary<string, object> configDict,
|
|
|
|
|
string publicServiceUri, string internalServiceUri)
|
|
|
|
|
{
|
|
|
|
|
var dictReplace = new Dictionary<string, object>();
|
|
|
|
|
foreach (var item in configDict)
|
|
|
|
|
{
|
2020-09-01 18:13:08 +02:00
|
|
|
|
if (item.Key == "authorization_endpoint" && item.Value is string val)
|
2020-09-01 13:38:36 +02:00
|
|
|
|
{
|
|
|
|
|
var uri = new Uri(val);
|
|
|
|
|
dictReplace.Add(item.Key, string.Concat(publicServiceUri, uri.LocalPath));
|
|
|
|
|
}
|
2020-09-01 18:28:03 +02:00
|
|
|
|
else if ((item.Key == "jwks_uri" || item.Key.EndsWith("_endpoint")) && item.Value is string val2)
|
2020-09-01 13:38:36 +02:00
|
|
|
|
{
|
2020-09-01 18:28:03 +02:00
|
|
|
|
var uri = new Uri(val2);
|
2020-09-01 13:38:36 +02:00
|
|
|
|
dictReplace.Add(item.Key, string.Concat(internalServiceUri, uri.LocalPath));
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
foreach (var replace in dictReplace)
|
|
|
|
|
{
|
|
|
|
|
configDict[replace.Key] = replace.Value;
|
|
|
|
|
}
|
|
|
|
|
return configDict;
|
|
|
|
|
}
|
2020-11-10 21:15:29 +01:00
|
|
|
|
|
2021-02-04 19:54:21 +01:00
|
|
|
|
public static List<KeyValuePair<string, string>> BuildIdentityClaims(User user, ICollection<CurrentContentOrganization> orgs, bool isPremium)
|
2020-11-10 21:15:29 +01:00
|
|
|
|
{
|
2020-11-11 16:56:22 +01:00
|
|
|
|
var claims = new List<KeyValuePair<string, string>>()
|
2020-11-10 21:15:29 +01:00
|
|
|
|
{
|
2020-11-11 16:56:22 +01:00
|
|
|
|
new KeyValuePair<string, string>("premium", isPremium ? "true" : "false"),
|
|
|
|
|
new KeyValuePair<string, string>(JwtClaimTypes.Email, user.Email),
|
|
|
|
|
new KeyValuePair<string, string>(JwtClaimTypes.EmailVerified, user.EmailVerified ? "true" : "false"),
|
|
|
|
|
new KeyValuePair<string, string>("sstamp", user.SecurityStamp)
|
2020-11-10 21:15:29 +01:00
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
if (!string.IsNullOrWhiteSpace(user.Name))
|
|
|
|
|
{
|
2020-11-11 16:56:22 +01:00
|
|
|
|
claims.Add(new KeyValuePair<string, string>(JwtClaimTypes.Name, user.Name));
|
2020-11-10 21:15:29 +01:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// Orgs that this user belongs to
|
|
|
|
|
if (orgs.Any())
|
|
|
|
|
{
|
|
|
|
|
foreach (var group in orgs.GroupBy(o => o.Type))
|
|
|
|
|
{
|
|
|
|
|
switch (group.Key)
|
|
|
|
|
{
|
|
|
|
|
case Enums.OrganizationUserType.Owner:
|
|
|
|
|
foreach (var org in group)
|
|
|
|
|
{
|
2020-11-11 16:56:22 +01:00
|
|
|
|
claims.Add(new KeyValuePair<string, string>("orgowner", org.Id.ToString()));
|
2020-11-10 21:15:29 +01:00
|
|
|
|
}
|
|
|
|
|
break;
|
|
|
|
|
case Enums.OrganizationUserType.Admin:
|
|
|
|
|
foreach (var org in group)
|
|
|
|
|
{
|
2020-11-11 16:56:22 +01:00
|
|
|
|
claims.Add(new KeyValuePair<string, string>("orgadmin", org.Id.ToString()));
|
2020-11-10 21:15:29 +01:00
|
|
|
|
}
|
|
|
|
|
break;
|
|
|
|
|
case Enums.OrganizationUserType.Manager:
|
|
|
|
|
foreach (var org in group)
|
|
|
|
|
{
|
2020-11-11 16:56:22 +01:00
|
|
|
|
claims.Add(new KeyValuePair<string, string>("orgmanager", org.Id.ToString()));
|
2020-11-10 21:15:29 +01:00
|
|
|
|
}
|
|
|
|
|
break;
|
|
|
|
|
case Enums.OrganizationUserType.User:
|
|
|
|
|
foreach (var org in group)
|
|
|
|
|
{
|
2020-11-11 16:56:22 +01:00
|
|
|
|
claims.Add(new KeyValuePair<string, string>("orguser", org.Id.ToString()));
|
2020-11-10 21:15:29 +01:00
|
|
|
|
}
|
|
|
|
|
break;
|
2021-01-12 17:02:39 +01:00
|
|
|
|
case Enums.OrganizationUserType.Custom:
|
|
|
|
|
foreach (var org in group)
|
|
|
|
|
{
|
|
|
|
|
claims.Add(new KeyValuePair<string, string>("orgcustom", org.Id.ToString()));
|
|
|
|
|
|
|
|
|
|
if (org.Permissions.AccessBusinessPortal)
|
|
|
|
|
{
|
|
|
|
|
claims.Add(new KeyValuePair<string, string>("accessbusinessportal", org.Id.ToString()));
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (org.Permissions.AccessEventLogs)
|
|
|
|
|
{
|
|
|
|
|
claims.Add(new KeyValuePair<string, string>("accesseventlogs", org.Id.ToString()));
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (org.Permissions.AccessImportExport)
|
|
|
|
|
{
|
|
|
|
|
claims.Add(new KeyValuePair<string, string>("accessimportexport", org.Id.ToString()));
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (org.Permissions.AccessReports)
|
|
|
|
|
{
|
|
|
|
|
claims.Add(new KeyValuePair<string, string>("accessreports", org.Id.ToString()));
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (org.Permissions.ManageAllCollections)
|
|
|
|
|
{
|
|
|
|
|
claims.Add(new KeyValuePair<string, string>("manageallcollections", org.Id.ToString()));
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (org.Permissions.ManageAssignedCollections)
|
|
|
|
|
{
|
|
|
|
|
claims.Add(new KeyValuePair<string, string>("manageassignedcollections", org.Id.ToString()));
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (org.Permissions.ManageGroups)
|
|
|
|
|
{
|
|
|
|
|
claims.Add(new KeyValuePair<string, string>("managegroups", org.Id.ToString()));
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (org.Permissions.ManagePolicies)
|
|
|
|
|
{
|
|
|
|
|
claims.Add(new KeyValuePair<string, string>("managepolicies", org.Id.ToString()));
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (org.Permissions.ManageSso)
|
|
|
|
|
{
|
|
|
|
|
claims.Add(new KeyValuePair<string, string>("managesso", org.Id.ToString()));
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (org.Permissions.ManageUsers)
|
|
|
|
|
{
|
|
|
|
|
claims.Add(new KeyValuePair<string, string>("manageusers", org.Id.ToString()));
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
break;
|
2020-11-10 21:15:29 +01:00
|
|
|
|
default:
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
return claims;
|
|
|
|
|
}
|
2021-01-12 17:02:39 +01:00
|
|
|
|
|
|
|
|
|
public static T LoadClassFromJsonData<T>(string jsonData) where T : new()
|
|
|
|
|
{
|
|
|
|
|
if (string.IsNullOrWhiteSpace(jsonData))
|
|
|
|
|
{
|
|
|
|
|
return new T();
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
var options = new JsonSerializerOptions
|
|
|
|
|
{
|
|
|
|
|
PropertyNamingPolicy = JsonNamingPolicy.CamelCase,
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
return System.Text.Json.JsonSerializer.Deserialize<T>(jsonData, options);
|
|
|
|
|
}
|
2021-02-10 18:00:12 +01:00
|
|
|
|
|
|
|
|
|
public static ICollection<T> AddIfNotExists<T>(this ICollection<T> list, T item)
|
|
|
|
|
{
|
|
|
|
|
if (list.Contains(item))
|
|
|
|
|
{
|
|
|
|
|
return list;
|
|
|
|
|
}
|
|
|
|
|
list.Add(item);
|
|
|
|
|
return list;
|
|
|
|
|
}
|
2016-05-21 23:16:22 +02:00
|
|
|
|
}
|
|
|
|
|
}
|