2023-11-22 22:07:37 +01:00
|
|
|
|
using Bit.Core.AdminConsole.Entities;
|
|
|
|
|
using Bit.Core.AdminConsole.Enums;
|
|
|
|
|
using Bit.Core.AdminConsole.Models.Data.Organizations.Policies;
|
|
|
|
|
using Bit.Core.AdminConsole.Repositories;
|
|
|
|
|
using Bit.Core.AdminConsole.Services;
|
|
|
|
|
using Bit.Core.Auth.Entities;
|
2023-05-10 21:52:08 +02:00
|
|
|
|
using Bit.Core.Auth.Enums;
|
2023-04-14 19:25:56 +02:00
|
|
|
|
using Bit.Core.Auth.Models.Data;
|
|
|
|
|
using Bit.Core.Auth.Repositories;
|
|
|
|
|
using Bit.Core.Auth.Services;
|
2021-11-09 16:37:32 +01:00
|
|
|
|
using Bit.Core.Exceptions;
|
2022-05-10 23:12:09 +02:00
|
|
|
|
using Bit.Core.Models.Data.Organizations.OrganizationUsers;
|
2021-06-11 17:33:32 +02:00
|
|
|
|
using Bit.Core.Repositories;
|
2023-07-18 17:00:49 +02:00
|
|
|
|
using Bit.Core.Services;
|
Families for Enterprise (#1714)
* Create common test infrastructure project
* Add helpers to further type PlanTypes
* Enable testing of ASP.net MVC controllers
Controller properties have all kinds of validations in the background.
In general, we don't user properties on our Controllers, so the easiest
way to allow for Autofixture-based testing of our Controllers is to just
omit setting all properties on them.
* Workaround for broken MemberAutoDataAttribute
https://github.com/AutoFixture/AutoFixture/pull/1164 shows that only
the first test case is pulled for this attribute.
This is a workaround that populates the provided parameters, left to
right, using AutoFixture to populate any remaining.
* WIP: Organization sponsorship flow
* Add Attribute to use the Bit Autodata dependency chain
BitAutoDataAttribute is used to mark a Theory as autopopulating
parameters.
Extract common attribute methods to to a helper class. Cannot
inherit a common base, since both require inheriting from different
Xunit base classes to work.
* WIP: scaffolding for families for enterprise sponsorship flow
* Fix broken tests
* Create sponsorship offer (#1688)
* Initial db work (#1687)
* Add organization sponsorship databases to all providers
* Generalize create and update for database, specialize in code
* Add PlanSponsorshipType to db model
* Write valid json for test entries
* Initial scaffolding of emails (#1686)
* Initial scaffolding of emails
* Work on adding models for FamilyForEnterprise emails
* Switch verbage
* Put preliminary copy in emails
* Skip test
* Families for enterprise/stripe integrations (#1699)
* Add PlanSponsorshipType to static store
* Add sponsorship type to token and creates sponsorship
* PascalCase properties
* Require sponsorship for remove
* Create subscription sponsorship helper class
* Handle Sponsored subscription changes
* Add sponsorship id to subscription metadata
* Make sponsoring references nullable
This state indicates that a sponsorship has lapsed, but was not able to
be reverted for billing reasons
* WIP: Validate and remove subscriptions
* Update sponsorships on organization and org user delete
* Add friendly name to organization sponsorship
* Add sponsorship available boolean to orgDetails
* Add sponsorship service to DI
* Use userId to find org users
* Send f4e offer email
* Simplify names of f4e mail messages
* Fix Stripe org default tax rates
* Universal sponsorship redeem api
* Populate user in current context
* Add product type to organization details
* Use upgrade path to change sponsorship
Sponsorships need to be annual to match the GB add-on charge rate
* Use organization and auth to find organization sponsorship
* Add resend sponsorship offer api endpoint
* Fix double email send
* Fix sponsorship upgrade options
* Add is sponsored item to subscription response
* Add sponsorship validation to upcoming invoice webhook
* Add sponsorship validation to upcoming invoice webhook
* Fix organization delete sponsorship hooks
* Test org sponsorship service
* Fix sproc
* Create common test infrastructure project
* Add helpers to further type PlanTypes
* Enable testing of ASP.net MVC controllers
Controller properties have all kinds of validations in the background.
In general, we don't user properties on our Controllers, so the easiest
way to allow for Autofixture-based testing of our Controllers is to just
omit setting all properties on them.
* Workaround for broken MemberAutoDataAttribute
https://github.com/AutoFixture/AutoFixture/pull/1164 shows that only
the first test case is pulled for this attribute.
This is a workaround that populates the provided parameters, left to
right, using AutoFixture to populate any remaining.
* WIP: Organization sponsorship flow
* Add Attribute to use the Bit Autodata dependency chain
BitAutoDataAttribute is used to mark a Theory as autopopulating
parameters.
Extract common attribute methods to to a helper class. Cannot
inherit a common base, since both require inheriting from different
Xunit base classes to work.
* WIP: scaffolding for families for enterprise sponsorship flow
* Fix broken tests
* Create sponsorship offer (#1688)
* Initial db work (#1687)
* Add organization sponsorship databases to all providers
* Generalize create and update for database, specialize in code
* Add PlanSponsorshipType to db model
* Write valid json for test entries
* Initial scaffolding of emails (#1686)
* Initial scaffolding of emails
* Work on adding models for FamilyForEnterprise emails
* Switch verbage
* Put preliminary copy in emails
* Skip test
* Families for enterprise/stripe integrations (#1699)
* Add PlanSponsorshipType to static store
* Add sponsorship type to token and creates sponsorship
* PascalCase properties
* Require sponsorship for remove
* Create subscription sponsorship helper class
* Handle Sponsored subscription changes
* Add sponsorship id to subscription metadata
* Make sponsoring references nullable
This state indicates that a sponsorship has lapsed, but was not able to
be reverted for billing reasons
* WIP: Validate and remove subscriptions
* Update sponsorships on organization and org user delete
* Add friendly name to organization sponsorship
* Add sponsorship available boolean to orgDetails
* Add sponsorship service to DI
* Use userId to find org users
* Send f4e offer email
* Simplify names of f4e mail messages
* Fix Stripe org default tax rates
* Universal sponsorship redeem api
* Populate user in current context
* Add product type to organization details
* Use upgrade path to change sponsorship
Sponsorships need to be annual to match the GB add-on charge rate
* Use organization and auth to find organization sponsorship
* Add resend sponsorship offer api endpoint
* Fix double email send
* Fix sponsorship upgrade options
* Add is sponsored item to subscription response
* Add sponsorship validation to upcoming invoice webhook
* Add sponsorship validation to upcoming invoice webhook
* Fix organization delete sponsorship hooks
* Test org sponsorship service
* Fix sproc
* Fix build error
* Update emails
* Fix tests
* Skip local test
* Add newline
* Fix stripe subscription update
* Finish emails
* Skip test
* Fix unit tests
* Remove unused variable
* Fix unit tests
* Switch to handlebars ifs
* Remove ending email
* Remove reconfirmation template
* Switch naming convention
* Switch naming convention
* Fix migration
* Update copy and links
* Switch to using Guid in the method
* Remove unneeded css styles
* Add sql files to Sql.sqlproj
* Removed old comments
* Made name more verbose
* Fix SQL error
* Move unit tests to service
* Fix sp
* Revert "Move unit tests to service"
This reverts commit 1185bf3ec8ca36ccd75717ed2463adf8885159a6.
* Do repository validation in service layer
* Fix tests
* Fix merge conflicts and remove TODO
* Remove unneeded models
* Fix spacing and formatting
* Switch Org -> Organization
* Remove single use variables
* Switch method name
* Fix Controller
* Switch to obfuscating email
* Fix unit tests
Co-authored-by: Justin Baur <admin@justinbaur.com>
2021-11-19 23:25:06 +01:00
|
|
|
|
using Bit.Test.Common.AutoFixture;
|
|
|
|
|
using Bit.Test.Common.AutoFixture.Attributes;
|
2021-06-11 17:33:32 +02:00
|
|
|
|
using NSubstitute;
|
|
|
|
|
using Xunit;
|
|
|
|
|
|
2023-04-14 19:25:56 +02:00
|
|
|
|
namespace Bit.Core.Test.Auth.Services;
|
2022-08-29 22:06:55 +02:00
|
|
|
|
|
2022-08-31 15:38:35 +02:00
|
|
|
|
[SutProviderCustomize]
|
2021-06-11 17:33:32 +02:00
|
|
|
|
public class SsoConfigServiceTests
|
|
|
|
|
{
|
2022-08-31 15:38:35 +02:00
|
|
|
|
[Theory, BitAutoData]
|
2021-06-11 17:33:32 +02:00
|
|
|
|
public async Task SaveAsync_ExistingItem_UpdatesRevisionDateOnly(SutProvider<SsoConfigService> sutProvider,
|
2021-11-17 11:46:35 +01:00
|
|
|
|
Organization organization)
|
2021-06-11 17:33:32 +02:00
|
|
|
|
{
|
2021-11-17 11:46:35 +01:00
|
|
|
|
var utcNow = DateTime.UtcNow;
|
2022-08-29 22:06:55 +02:00
|
|
|
|
|
2021-11-17 11:46:35 +01:00
|
|
|
|
var ssoConfig = new SsoConfig
|
2021-06-11 17:33:32 +02:00
|
|
|
|
{
|
2022-08-29 22:06:55 +02:00
|
|
|
|
Id = 1,
|
2021-06-11 17:33:32 +02:00
|
|
|
|
Data = "{}",
|
|
|
|
|
Enabled = true,
|
|
|
|
|
OrganizationId = organization.Id,
|
|
|
|
|
CreationDate = utcNow.AddDays(-10),
|
|
|
|
|
RevisionDate = utcNow.AddDays(-10),
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
sutProvider.GetDependency<ISsoConfigRepository>()
|
|
|
|
|
.UpsertAsync(ssoConfig).Returns(Task.CompletedTask);
|
|
|
|
|
|
|
|
|
|
await sutProvider.Sut.SaveAsync(ssoConfig, organization);
|
|
|
|
|
|
2021-11-17 11:46:35 +01:00
|
|
|
|
await sutProvider.GetDependency<ISsoConfigRepository>().Received()
|
|
|
|
|
.UpsertAsync(ssoConfig);
|
2021-06-11 17:33:32 +02:00
|
|
|
|
|
|
|
|
|
Assert.Equal(utcNow.AddDays(-10), ssoConfig.CreationDate);
|
|
|
|
|
Assert.True(ssoConfig.RevisionDate - utcNow < TimeSpan.FromSeconds(1));
|
2022-08-29 22:06:55 +02:00
|
|
|
|
}
|
2021-06-11 17:33:32 +02:00
|
|
|
|
|
2022-08-31 15:38:35 +02:00
|
|
|
|
[Theory, BitAutoData]
|
2021-06-11 17:33:32 +02:00
|
|
|
|
public async Task SaveAsync_NewItem_UpdatesCreationAndRevisionDate(SutProvider<SsoConfigService> sutProvider,
|
2021-11-17 11:46:35 +01:00
|
|
|
|
Organization organization)
|
2022-08-29 22:06:55 +02:00
|
|
|
|
{
|
2021-06-11 17:33:32 +02:00
|
|
|
|
var utcNow = DateTime.UtcNow;
|
|
|
|
|
|
2021-11-17 11:46:35 +01:00
|
|
|
|
var ssoConfig = new SsoConfig
|
2021-06-11 17:33:32 +02:00
|
|
|
|
{
|
|
|
|
|
Id = default,
|
2021-11-09 16:37:32 +01:00
|
|
|
|
Data = "{}",
|
2021-06-11 17:33:32 +02:00
|
|
|
|
Enabled = true,
|
|
|
|
|
OrganizationId = organization.Id,
|
|
|
|
|
CreationDate = utcNow.AddDays(-10),
|
|
|
|
|
RevisionDate = utcNow.AddDays(-10),
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
sutProvider.GetDependency<ISsoConfigRepository>()
|
|
|
|
|
.UpsertAsync(ssoConfig).Returns(Task.CompletedTask);
|
|
|
|
|
|
|
|
|
|
await sutProvider.Sut.SaveAsync(ssoConfig, organization);
|
|
|
|
|
|
2021-11-17 11:46:35 +01:00
|
|
|
|
await sutProvider.GetDependency<ISsoConfigRepository>().Received()
|
|
|
|
|
.UpsertAsync(ssoConfig);
|
2021-06-11 17:33:32 +02:00
|
|
|
|
|
|
|
|
|
Assert.True(ssoConfig.CreationDate - utcNow < TimeSpan.FromSeconds(1));
|
|
|
|
|
Assert.True(ssoConfig.RevisionDate - utcNow < TimeSpan.FromSeconds(1));
|
2022-08-29 22:06:55 +02:00
|
|
|
|
}
|
2021-06-11 17:33:32 +02:00
|
|
|
|
|
2022-08-31 15:38:35 +02:00
|
|
|
|
[Theory, BitAutoData]
|
2021-06-11 17:33:32 +02:00
|
|
|
|
public async Task SaveAsync_PreventDisablingKeyConnector(SutProvider<SsoConfigService> sutProvider,
|
|
|
|
|
Organization organization)
|
2022-08-29 22:06:55 +02:00
|
|
|
|
{
|
2021-06-11 17:33:32 +02:00
|
|
|
|
var utcNow = DateTime.UtcNow;
|
2021-11-09 16:37:32 +01:00
|
|
|
|
|
2021-11-17 11:46:35 +01:00
|
|
|
|
var oldSsoConfig = new SsoConfig
|
2022-08-29 22:06:55 +02:00
|
|
|
|
{
|
2021-11-17 11:46:35 +01:00
|
|
|
|
Id = 1,
|
|
|
|
|
Data = new SsoConfigurationData
|
2022-08-29 22:06:55 +02:00
|
|
|
|
{
|
2023-05-10 21:52:08 +02:00
|
|
|
|
MemberDecryptionType = MemberDecryptionType.KeyConnector
|
2021-11-17 11:46:35 +01:00
|
|
|
|
}.Serialize(),
|
|
|
|
|
Enabled = true,
|
|
|
|
|
OrganizationId = organization.Id,
|
2021-11-09 16:37:32 +01:00
|
|
|
|
CreationDate = utcNow.AddDays(-10),
|
|
|
|
|
RevisionDate = utcNow.AddDays(-10),
|
2022-08-29 22:06:55 +02:00
|
|
|
|
};
|
|
|
|
|
|
2021-11-09 16:37:32 +01:00
|
|
|
|
var newSsoConfig = new SsoConfig
|
|
|
|
|
{
|
2022-08-29 22:06:55 +02:00
|
|
|
|
Id = 1,
|
2021-11-09 16:37:32 +01:00
|
|
|
|
Data = "{}",
|
|
|
|
|
Enabled = true,
|
2021-11-17 11:46:35 +01:00
|
|
|
|
OrganizationId = organization.Id,
|
2021-11-09 16:37:32 +01:00
|
|
|
|
CreationDate = utcNow.AddDays(-10),
|
|
|
|
|
RevisionDate = utcNow,
|
2022-08-29 22:06:55 +02:00
|
|
|
|
};
|
|
|
|
|
|
2021-11-09 16:37:32 +01:00
|
|
|
|
var ssoConfigRepository = sutProvider.GetDependency<ISsoConfigRepository>();
|
|
|
|
|
ssoConfigRepository.GetByOrganizationIdAsync(organization.Id).Returns(oldSsoConfig);
|
|
|
|
|
ssoConfigRepository.UpsertAsync(newSsoConfig).Returns(Task.CompletedTask);
|
2021-11-17 11:46:35 +01:00
|
|
|
|
sutProvider.GetDependency<IOrganizationUserRepository>().GetManyDetailsByOrganizationAsync(organization.Id)
|
|
|
|
|
.Returns(new[] { new OrganizationUserUserDetails { UsesKeyConnector = true } });
|
2022-08-29 22:06:55 +02:00
|
|
|
|
|
2021-11-09 16:37:32 +01:00
|
|
|
|
var exception = await Assert.ThrowsAsync<BadRequestException>(
|
|
|
|
|
() => sutProvider.Sut.SaveAsync(newSsoConfig, organization));
|
2022-08-29 22:06:55 +02:00
|
|
|
|
|
2021-11-12 14:38:31 +01:00
|
|
|
|
Assert.Contains("Key Connector cannot be disabled at this moment.", exception.Message);
|
2022-08-29 22:06:55 +02:00
|
|
|
|
|
2021-11-09 16:37:32 +01:00
|
|
|
|
await sutProvider.GetDependency<ISsoConfigRepository>().DidNotReceiveWithAnyArgs()
|
|
|
|
|
.UpsertAsync(default);
|
2022-08-29 22:06:55 +02:00
|
|
|
|
}
|
|
|
|
|
|
2022-08-31 15:38:35 +02:00
|
|
|
|
[Theory, BitAutoData]
|
2021-11-17 11:46:35 +01:00
|
|
|
|
public async Task SaveAsync_AllowDisablingKeyConnectorWhenNoUserIsUsingIt(
|
|
|
|
|
SutProvider<SsoConfigService> sutProvider, Organization organization)
|
2022-08-29 22:06:55 +02:00
|
|
|
|
{
|
2021-11-09 16:37:32 +01:00
|
|
|
|
var utcNow = DateTime.UtcNow;
|
|
|
|
|
|
|
|
|
|
var oldSsoConfig = new SsoConfig
|
2022-08-29 22:06:55 +02:00
|
|
|
|
{
|
|
|
|
|
Id = 1,
|
2021-11-17 11:46:35 +01:00
|
|
|
|
Data = new SsoConfigurationData
|
2021-11-09 16:37:32 +01:00
|
|
|
|
{
|
2023-05-10 21:52:08 +02:00
|
|
|
|
MemberDecryptionType = MemberDecryptionType.KeyConnector,
|
2021-11-12 14:38:31 +01:00
|
|
|
|
}.Serialize(),
|
|
|
|
|
Enabled = true,
|
2021-11-17 11:46:35 +01:00
|
|
|
|
OrganizationId = organization.Id,
|
2021-11-12 14:38:31 +01:00
|
|
|
|
CreationDate = utcNow.AddDays(-10),
|
|
|
|
|
RevisionDate = utcNow.AddDays(-10),
|
2022-08-29 22:06:55 +02:00
|
|
|
|
};
|
|
|
|
|
|
2021-11-12 14:38:31 +01:00
|
|
|
|
var newSsoConfig = new SsoConfig
|
2022-08-29 22:06:55 +02:00
|
|
|
|
{
|
|
|
|
|
Id = 1,
|
2021-11-12 14:38:31 +01:00
|
|
|
|
Data = "{}",
|
2021-11-09 16:37:32 +01:00
|
|
|
|
Enabled = true,
|
2021-11-17 11:46:35 +01:00
|
|
|
|
OrganizationId = organization.Id,
|
2021-11-09 16:37:32 +01:00
|
|
|
|
CreationDate = utcNow.AddDays(-10),
|
|
|
|
|
RevisionDate = utcNow,
|
|
|
|
|
};
|
2022-08-29 22:06:55 +02:00
|
|
|
|
|
2021-11-12 14:38:31 +01:00
|
|
|
|
var ssoConfigRepository = sutProvider.GetDependency<ISsoConfigRepository>();
|
2021-11-17 11:46:35 +01:00
|
|
|
|
ssoConfigRepository.GetByOrganizationIdAsync(organization.Id).Returns(oldSsoConfig);
|
2021-11-12 14:38:31 +01:00
|
|
|
|
ssoConfigRepository.UpsertAsync(newSsoConfig).Returns(Task.CompletedTask);
|
2021-11-17 11:46:35 +01:00
|
|
|
|
sutProvider.GetDependency<IOrganizationUserRepository>().GetManyDetailsByOrganizationAsync(organization.Id)
|
2021-11-12 14:38:31 +01:00
|
|
|
|
.Returns(new[] { new OrganizationUserUserDetails { UsesKeyConnector = false } });
|
2022-08-29 22:06:55 +02:00
|
|
|
|
|
2021-11-17 11:46:35 +01:00
|
|
|
|
await sutProvider.Sut.SaveAsync(newSsoConfig, organization);
|
2022-08-29 22:06:55 +02:00
|
|
|
|
}
|
|
|
|
|
|
2022-08-31 15:38:35 +02:00
|
|
|
|
[Theory, BitAutoData]
|
2021-11-17 11:46:35 +01:00
|
|
|
|
public async Task SaveAsync_KeyConnector_SingleOrgNotEnabled_Throws(SutProvider<SsoConfigService> sutProvider,
|
|
|
|
|
Organization organization)
|
2022-08-29 22:06:55 +02:00
|
|
|
|
{
|
2021-11-09 16:37:32 +01:00
|
|
|
|
var utcNow = DateTime.UtcNow;
|
|
|
|
|
|
|
|
|
|
var ssoConfig = new SsoConfig
|
2022-08-29 22:06:55 +02:00
|
|
|
|
{
|
2021-11-17 11:46:35 +01:00
|
|
|
|
Id = default,
|
2021-11-09 16:37:32 +01:00
|
|
|
|
Data = new SsoConfigurationData
|
|
|
|
|
{
|
2023-05-10 21:52:08 +02:00
|
|
|
|
MemberDecryptionType = MemberDecryptionType.KeyConnector,
|
2021-11-09 16:37:32 +01:00
|
|
|
|
}.Serialize(),
|
|
|
|
|
Enabled = true,
|
2021-11-17 11:46:35 +01:00
|
|
|
|
OrganizationId = organization.Id,
|
2021-11-09 16:37:32 +01:00
|
|
|
|
CreationDate = utcNow.AddDays(-10),
|
|
|
|
|
RevisionDate = utcNow.AddDays(-10),
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
var exception = await Assert.ThrowsAsync<BadRequestException>(
|
2021-11-17 11:46:35 +01:00
|
|
|
|
() => sutProvider.Sut.SaveAsync(ssoConfig, organization));
|
2021-11-09 16:37:32 +01:00
|
|
|
|
|
|
|
|
|
Assert.Contains("Key Connector requires the Single Organization policy to be enabled.", exception.Message);
|
|
|
|
|
|
2021-11-12 14:38:31 +01:00
|
|
|
|
await sutProvider.GetDependency<ISsoConfigRepository>().DidNotReceiveWithAnyArgs()
|
|
|
|
|
.UpsertAsync(default);
|
2022-08-29 22:06:55 +02:00
|
|
|
|
}
|
2021-11-09 16:37:32 +01:00
|
|
|
|
|
2022-08-31 15:38:35 +02:00
|
|
|
|
[Theory, BitAutoData]
|
2021-11-09 16:37:32 +01:00
|
|
|
|
public async Task SaveAsync_KeyConnector_SsoPolicyNotEnabled_Throws(SutProvider<SsoConfigService> sutProvider,
|
|
|
|
|
Organization organization)
|
2022-08-29 22:06:55 +02:00
|
|
|
|
{
|
2021-11-09 16:37:32 +01:00
|
|
|
|
var utcNow = DateTime.UtcNow;
|
|
|
|
|
|
2021-11-17 11:46:35 +01:00
|
|
|
|
var ssoConfig = new SsoConfig
|
2021-11-12 14:38:31 +01:00
|
|
|
|
{
|
|
|
|
|
Id = default,
|
|
|
|
|
Data = new SsoConfigurationData
|
|
|
|
|
{
|
2023-05-10 21:52:08 +02:00
|
|
|
|
MemberDecryptionType = MemberDecryptionType.KeyConnector,
|
2021-11-17 11:46:35 +01:00
|
|
|
|
}.Serialize(),
|
2021-11-12 14:38:31 +01:00
|
|
|
|
Enabled = true,
|
2021-11-17 11:46:35 +01:00
|
|
|
|
OrganizationId = organization.Id,
|
2021-11-12 14:38:31 +01:00
|
|
|
|
CreationDate = utcNow.AddDays(-10),
|
|
|
|
|
RevisionDate = utcNow.AddDays(-10),
|
|
|
|
|
};
|
2022-08-29 22:06:55 +02:00
|
|
|
|
|
2021-11-12 14:38:31 +01:00
|
|
|
|
sutProvider.GetDependency<IPolicyRepository>().GetByOrganizationIdTypeAsync(
|
2023-11-22 22:07:37 +01:00
|
|
|
|
Arg.Any<Guid>(), PolicyType.SingleOrg).Returns(new Policy
|
2021-11-12 14:38:31 +01:00
|
|
|
|
{
|
|
|
|
|
Enabled = true
|
|
|
|
|
});
|
2021-11-09 16:37:32 +01:00
|
|
|
|
|
|
|
|
|
var exception = await Assert.ThrowsAsync<BadRequestException>(
|
2021-11-17 11:46:35 +01:00
|
|
|
|
() => sutProvider.Sut.SaveAsync(ssoConfig, organization));
|
2021-11-09 16:37:32 +01:00
|
|
|
|
|
|
|
|
|
Assert.Contains("Key Connector requires the Single Sign-On Authentication policy to be enabled.", exception.Message);
|
|
|
|
|
|
2021-11-15 10:25:10 +01:00
|
|
|
|
await sutProvider.GetDependency<ISsoConfigRepository>().DidNotReceiveWithAnyArgs()
|
|
|
|
|
.UpsertAsync(default);
|
2022-08-29 22:06:55 +02:00
|
|
|
|
}
|
2021-11-15 10:25:10 +01:00
|
|
|
|
|
2022-08-31 15:38:35 +02:00
|
|
|
|
[Theory, BitAutoData]
|
2021-11-15 10:25:10 +01:00
|
|
|
|
public async Task SaveAsync_KeyConnector_SsoConfigNotEnabled_Throws(SutProvider<SsoConfigService> sutProvider,
|
|
|
|
|
Organization organization)
|
2022-08-29 22:06:55 +02:00
|
|
|
|
{
|
2021-11-15 10:25:10 +01:00
|
|
|
|
var utcNow = DateTime.UtcNow;
|
|
|
|
|
|
2021-11-17 11:46:35 +01:00
|
|
|
|
var ssoConfig = new SsoConfig
|
2021-11-15 10:25:10 +01:00
|
|
|
|
{
|
|
|
|
|
Id = default,
|
|
|
|
|
Data = new SsoConfigurationData
|
2022-08-29 20:53:16 +02:00
|
|
|
|
{
|
2023-05-10 21:52:08 +02:00
|
|
|
|
MemberDecryptionType = MemberDecryptionType.KeyConnector,
|
2021-11-17 11:46:35 +01:00
|
|
|
|
}.Serialize(),
|
2021-11-15 10:25:10 +01:00
|
|
|
|
Enabled = false,
|
2021-11-17 11:46:35 +01:00
|
|
|
|
OrganizationId = organization.Id,
|
2021-11-15 10:25:10 +01:00
|
|
|
|
CreationDate = utcNow.AddDays(-10),
|
|
|
|
|
RevisionDate = utcNow.AddDays(-10),
|
2022-08-29 20:53:16 +02:00
|
|
|
|
};
|
2022-08-29 22:06:55 +02:00
|
|
|
|
|
2021-11-09 16:37:32 +01:00
|
|
|
|
sutProvider.GetDependency<IPolicyRepository>().GetByOrganizationIdTypeAsync(
|
2023-11-22 22:07:37 +01:00
|
|
|
|
Arg.Any<Guid>(), Arg.Any<PolicyType>()).Returns(new Policy
|
2022-08-29 22:06:55 +02:00
|
|
|
|
{
|
2021-11-17 11:46:35 +01:00
|
|
|
|
Enabled = true
|
2022-08-29 22:06:55 +02:00
|
|
|
|
});
|
2021-11-15 10:25:10 +01:00
|
|
|
|
|
|
|
|
|
var exception = await Assert.ThrowsAsync<BadRequestException>(
|
|
|
|
|
() => sutProvider.Sut.SaveAsync(ssoConfig, organization));
|
|
|
|
|
|
|
|
|
|
Assert.Contains("You must enable SSO to use Key Connector.", exception.Message);
|
|
|
|
|
|
|
|
|
|
await sutProvider.GetDependency<ISsoConfigRepository>().DidNotReceiveWithAnyArgs()
|
|
|
|
|
.UpsertAsync(default);
|
2022-08-29 22:06:55 +02:00
|
|
|
|
}
|
2021-11-15 10:25:10 +01:00
|
|
|
|
|
2022-08-31 15:38:35 +02:00
|
|
|
|
[Theory, BitAutoData]
|
2021-11-15 10:25:10 +01:00
|
|
|
|
public async Task SaveAsync_KeyConnector_KeyConnectorAbilityNotEnabled_Throws(SutProvider<SsoConfigService> sutProvider,
|
|
|
|
|
Organization organization)
|
2022-08-29 22:06:55 +02:00
|
|
|
|
{
|
2021-11-15 10:25:10 +01:00
|
|
|
|
var utcNow = DateTime.UtcNow;
|
|
|
|
|
|
2021-11-17 11:46:35 +01:00
|
|
|
|
organization.UseKeyConnector = false;
|
|
|
|
|
var ssoConfig = new SsoConfig
|
2021-11-15 10:25:10 +01:00
|
|
|
|
{
|
|
|
|
|
Id = default,
|
|
|
|
|
Data = new SsoConfigurationData
|
|
|
|
|
{
|
2023-05-10 21:52:08 +02:00
|
|
|
|
MemberDecryptionType = MemberDecryptionType.KeyConnector,
|
2021-11-17 11:46:35 +01:00
|
|
|
|
}.Serialize(),
|
2021-11-15 10:25:10 +01:00
|
|
|
|
Enabled = true,
|
2021-11-17 11:46:35 +01:00
|
|
|
|
OrganizationId = organization.Id,
|
2021-11-15 10:25:10 +01:00
|
|
|
|
CreationDate = utcNow.AddDays(-10),
|
|
|
|
|
RevisionDate = utcNow.AddDays(-10),
|
2022-08-29 21:53:48 +02:00
|
|
|
|
};
|
2022-08-29 22:06:55 +02:00
|
|
|
|
|
2021-11-17 11:46:35 +01:00
|
|
|
|
sutProvider.GetDependency<IPolicyRepository>().GetByOrganizationIdTypeAsync(
|
2023-11-22 22:07:37 +01:00
|
|
|
|
Arg.Any<Guid>(), Arg.Any<PolicyType>()).Returns(new Policy
|
2021-11-17 11:46:35 +01:00
|
|
|
|
{
|
|
|
|
|
Enabled = true,
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
var exception = await Assert.ThrowsAsync<BadRequestException>(
|
|
|
|
|
() => sutProvider.Sut.SaveAsync(ssoConfig, organization));
|
|
|
|
|
|
|
|
|
|
Assert.Contains("Organization cannot use Key Connector.", exception.Message);
|
|
|
|
|
|
|
|
|
|
await sutProvider.GetDependency<ISsoConfigRepository>().DidNotReceiveWithAnyArgs()
|
|
|
|
|
.UpsertAsync(default);
|
2022-08-29 22:06:55 +02:00
|
|
|
|
}
|
2021-11-17 11:46:35 +01:00
|
|
|
|
|
2022-08-31 15:38:35 +02:00
|
|
|
|
[Theory, BitAutoData]
|
2021-11-17 11:46:35 +01:00
|
|
|
|
public async Task SaveAsync_KeyConnector_Success(SutProvider<SsoConfigService> sutProvider,
|
|
|
|
|
Organization organization)
|
2022-08-29 22:06:55 +02:00
|
|
|
|
{
|
2021-11-17 11:46:35 +01:00
|
|
|
|
var utcNow = DateTime.UtcNow;
|
|
|
|
|
|
|
|
|
|
organization.UseKeyConnector = true;
|
|
|
|
|
var ssoConfig = new SsoConfig
|
|
|
|
|
{
|
|
|
|
|
Id = default,
|
|
|
|
|
Data = new SsoConfigurationData
|
2022-08-29 22:06:55 +02:00
|
|
|
|
{
|
2023-05-10 21:52:08 +02:00
|
|
|
|
MemberDecryptionType = MemberDecryptionType.KeyConnector,
|
2021-11-17 11:46:35 +01:00
|
|
|
|
}.Serialize(),
|
|
|
|
|
Enabled = true,
|
|
|
|
|
OrganizationId = organization.Id,
|
|
|
|
|
CreationDate = utcNow.AddDays(-10),
|
|
|
|
|
RevisionDate = utcNow.AddDays(-10),
|
2022-08-29 22:06:55 +02:00
|
|
|
|
};
|
|
|
|
|
|
2021-11-17 11:46:35 +01:00
|
|
|
|
sutProvider.GetDependency<IPolicyRepository>().GetByOrganizationIdTypeAsync(
|
2023-11-22 22:07:37 +01:00
|
|
|
|
Arg.Any<Guid>(), Arg.Any<PolicyType>()).Returns(new Policy
|
2021-11-17 11:46:35 +01:00
|
|
|
|
{
|
|
|
|
|
Enabled = true,
|
|
|
|
|
});
|
2022-08-29 22:06:55 +02:00
|
|
|
|
|
2021-11-17 11:46:35 +01:00
|
|
|
|
await sutProvider.Sut.SaveAsync(ssoConfig, organization);
|
2022-08-29 22:06:55 +02:00
|
|
|
|
|
2021-11-17 11:46:35 +01:00
|
|
|
|
await sutProvider.GetDependency<ISsoConfigRepository>().ReceivedWithAnyArgs()
|
|
|
|
|
.UpsertAsync(default);
|
2021-06-11 17:33:32 +02:00
|
|
|
|
}
|
2023-07-18 17:00:49 +02:00
|
|
|
|
|
|
|
|
|
[Theory, BitAutoData]
|
|
|
|
|
public async Task SaveAsync_Tde_Enable_Required_Policies(SutProvider<SsoConfigService> sutProvider, Organization organization)
|
|
|
|
|
{
|
|
|
|
|
var ssoConfig = new SsoConfig
|
|
|
|
|
{
|
|
|
|
|
Id = default,
|
|
|
|
|
Data = new SsoConfigurationData
|
|
|
|
|
{
|
|
|
|
|
MemberDecryptionType = MemberDecryptionType.TrustedDeviceEncryption,
|
|
|
|
|
}.Serialize(),
|
|
|
|
|
Enabled = true,
|
|
|
|
|
OrganizationId = organization.Id,
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
await sutProvider.Sut.SaveAsync(ssoConfig, organization);
|
|
|
|
|
|
|
|
|
|
await sutProvider.GetDependency<IPolicyService>().Received(1)
|
|
|
|
|
.SaveAsync(
|
2023-11-22 22:07:37 +01:00
|
|
|
|
Arg.Is<Policy>(t => t.Type == PolicyType.SingleOrg),
|
2023-07-18 17:00:49 +02:00
|
|
|
|
Arg.Any<IOrganizationService>(),
|
|
|
|
|
null
|
|
|
|
|
);
|
|
|
|
|
|
|
|
|
|
await sutProvider.GetDependency<IPolicyService>().Received(1)
|
|
|
|
|
.SaveAsync(
|
2023-11-22 22:07:37 +01:00
|
|
|
|
Arg.Is<Policy>(t => t.Type == PolicyType.ResetPassword && t.GetDataModel<ResetPasswordDataModel>().AutoEnrollEnabled),
|
2023-07-18 17:00:49 +02:00
|
|
|
|
Arg.Any<IOrganizationService>(),
|
|
|
|
|
null
|
|
|
|
|
);
|
|
|
|
|
|
|
|
|
|
await sutProvider.GetDependency<ISsoConfigRepository>().ReceivedWithAnyArgs()
|
|
|
|
|
.UpsertAsync(default);
|
|
|
|
|
}
|
2021-06-11 17:33:32 +02:00
|
|
|
|
}
|