mirror of
https://github.com/bitwarden/server.git
synced 2024-11-25 12:45:18 +01:00
f5a8cf5c9c
* [EC-1014] Create Organization Status (Pending/Created) (#2610) * [EC-427] Add columns 'Type' and 'BillingPhone' to Provider table * [EC-427] Provider table Type and BillingPhone MySql migrations * [EC-427] Provider table Type and BillingPhone Postgres migrations * [EC-427] Add mysql migration script * [EC-427] Add mysql migration script * [EC-427] Updated Provider sql script to include default column value * [EC-427] Removed default value from Provider.Type column * [EC-427] Changed migration script to include a default value constraint instead of updating the null type * [EC-427] Updated Sql project Provider table script * [EC-427] Changed migration script to use 'Create OR Alter' for views and sprocs * [EC-427] Added default values for 'BillingPhone' and 'Type' fields on sprocs [dbo].[Provider_Create] and [dbo].[Provider_Update] * [EC-427] Adjusting metadata in migration script * [EC-427] Updated Provider sprocs SQL script files * [EC-427] Fixed migration script * [EC-427] Added sqlite migration * [EC-427] Add missing Provider_Update sproc default value * [EC-427] Added missing GO action to migration script * [EC-428] Redirect to Edit after creating Provider * Revert "[EC-428] Redirect to Edit after creating Provider" This reverts commit6347bca1ed
. * [EC-1014] Create OrganizationStatusType and add Status column to Organizations table * [EC-1014] Added EF migrations * [EC-1014] dotnet format * [EC-1014] Changed Organization.Status from SMALLINT to TINYINT * [EC-1014] Set Organization.Status default value = 1 * [EC-1014] Setting Organization.Status default value as 1 * [EC-459 / EC-428] Admin panel: Add Provider Type to list and creation flow (#2593) * [EC-427] Add columns 'Type' and 'BillingPhone' to Provider table * [EC-427] Provider table Type and BillingPhone MySql migrations * [EC-427] Provider table Type and BillingPhone Postgres migrations * [EC-427] Add mysql migration script * [EC-427] Add mysql migration script * [EC-427] Updated Provider sql script to include default column value * [EC-427] Removed default value from Provider.Type column * [EC-427] Changed migration script to include a default value constraint instead of updating the null type * [EC-427] Updated Sql project Provider table script * [EC-427] Changed migration script to use 'Create OR Alter' for views and sprocs * [EC-427] Added default values for 'BillingPhone' and 'Type' fields on sprocs [dbo].[Provider_Create] and [dbo].[Provider_Update] * [EC-427] Adjusting metadata in migration script * [EC-427] Updated Provider sprocs SQL script files * [EC-427] Fixed migration script * [EC-427] Added sqlite migration * [EC-427] Add missing Provider_Update sproc default value * [EC-427] Added missing GO action to migration script * [EC-459] Added Type column to Providers list * [EC-428] Added Type, BusinessName and BillingEmail to CreateProviderModel * [EC-428] Updated Create Provider view to include new fields * [EC-428] Updated ProviderService to not create a ProviderUser for the type Reseller * [EC-428] Added custom validation for Provider fields depending on selected Type * [EC-428] Redirect to Edit after creating Provider * [EC-428] Setting Provider status as Created for Resellers * [EC-428] Redirect on Provider creation depending if self host server * [EC-428] Split ProviderService.CreateAsync into two methods: CreateMspAsync and CreateResellerAsync * [EC-428] Created ICreateProviderCommand and added service for injection on Admin.Startup * [EC-428] Modified Provider views to use DisplayName attribute values * [EC-428] Moved ICreateProviderCommand to Core project * [EC-428] Adding ICreateProviderCommand injection next to IProviderService * [EC-428] Moved CreateProviderCommand to Commercial.Core project * [EC-459] Added Type column to Providers list * [EC-428] Added Type, BusinessName and BillingEmail to CreateProviderModel * [EC-428] Updated Create Provider view to include new fields * [EC-428] Updated ProviderService to not create a ProviderUser for the type Reseller * [EC-428] Added custom validation for Provider fields depending on selected Type * [EC-428] Redirect to Edit after creating Provider * [EC-428] Setting Provider status as Created for Resellers * [EC-428] Redirect on Provider creation depending if self host server * [EC-428] Split ProviderService.CreateAsync into two methods: CreateMspAsync and CreateResellerAsync * [EC-428] Created ICreateProviderCommand and added service for injection on Admin.Startup * [EC-428] Modified Provider views to use DisplayName attribute values * [EC-428] Moved ICreateProviderCommand to Core project * [EC-428] Adding ICreateProviderCommand injection next to IProviderService * [EC-428] Moved CreateProviderCommand to Commercial.Core project * [EC-428] Moved CreateProviderCommand to namespace Bit.Commercial.Core.Providers * [EC-429] Provider details screen updated with Type, BillingPhone and Organization details (#2666) * [EC-430] Admin portal: Update organization information screen (#2672) * [EC-430] Added ProviderOrganizationProviderDetailsView to get Provider details for an Organization * [EC-430] Added Provider information to Organization Edit/View on Admin panel * [EC-430] Remove "Add to Reseller" button * [EC-430] Removed unused property OrganizationEditModel.ClientOwnerEmail * [EC-430] Replaced IProviderOrganizationRepository.GetProviderDetailsByOrganizationAsync with IProviderRepository.GetByOrganizationIdAsync * [EC-430] Deleted ProviderOrganizationProviderDetails and ProviderOrganizationProviderDetailsReadByOrganizationIdQuery * [EC-429] Only show Create/Add Existing Organization buttons for Reseller providers (#2723) * [EC-432] Add existing Organizations to Provider (#2683) * [EC-432] Added ProviderOrganizationUnassignedOrganizationDetails_Search stored procedure * [EC-432] Added IProviderOrganizationRepository.SearchAsync * [EC-432] Created controller ProviderOrganizationsController to assign Organizations to a Provider * [EC-432] Filter existing organizations by plans Enterprise or Team * [EC-432] Existing Organization name links to edit page * [EC-432] EF filtering out existing organizations by plan type enterprise or teams * [EC-432] Creating multiple ProviderOrganization records * [EC-432] Added ProviderOrganizationUnassignedOrganizationDetails_Search stored procedure * [EC-432] Added IProviderOrganizationRepository.SearchAsync * [EC-432] Created controller ProviderOrganizationsController to assign Organizations to a Provider * [EC-432] Filter existing organizations by plans Enterprise or Team * [EC-432] Existing Organization name links to edit page * [EC-432] EF filtering out existing organizations by plan type enterprise or teams * [EC-432] Creating multiple ProviderOrganization records * [EC-432] Renamed migration script and added missing sproc * [EC-432] Saving multiple events for the created ProviderOrganizations * [EC-432] Included unit testing for ProviderService.AddOrganizations and EventService.LogProviderOrganizationEventsAsync * [EC-432] Removed async from NoopEventService.LogProviderOrganizationEventsAsync * [EC-432] Remove unused dependency setup in ProviderServiceTests.AddOrganizations_Success * [EC-432] Renamed AddOrganizations to AddOrganizationsToReseller and removed addingUserId and key arguments * [EC-432] Added DisplayName attributes to ProviderOrganizationViewModel and used them in the view * [EC-432] Reverted changes to input fields * [EC-432] Moved unassigned organizations search to Organizations repo * [EC-432] Moved AddExistingOrganization action to ProvidersController * [EC-432] dotnet format * [EC-432] Fixed unit test issues * [EC-432] Removed unnecessary Html.DisplayNameFor for labels * [EC-432] Renamed OrganizationSearchViewModel to OrganizationUnassignedToProviderSearchViewModel * [EC-432] Modified IEventService.LogProviderOrganizationEventsAsync to receive an IEnumerable as parameter * [EC-432] Updated IProviderOrganizationRepository and replaced CreateWithManyOrganizations method with CreateManyAsync * [EC-432] Deleted ProviderOrganization_CreateWithManyOrganizations * [AC-432] Simplified Organization_UnassignedToProviderSearch query * [AC-432] Removed unnecessary setup * [EC-432] Checking if stored procedure exists before creating * [EC-432] Renamed migration file to recent date * [EC-435] Admin Portal: Add new Organization creation flow UI (#2707) * [EC-435] Created _OrganizationForm partial view. Added actions for creating an Organization assigned to a provider * [EC-435] Remove logic for creating an organization * [EC-435] Created partial view _OrganizationFormScripts * [EC-435] Remove unused ReferenceEventType * [EC-435] Added TODO comment on Organization Create * [EC-435] Checking if Provider type is Reseller on creating new assigned organization * [EC-435] Setting the Organization plan type as TeamsMonthly by default when adding to a provider * [EC-435] Removing unused buttons * [EC-435] Switched hidden fields to form submit route value * [EC-435] Moved _OrganizationForm and _OrganizationFormScripts to Shared folder * [EC-435] Moved Create organization actions from OrganizationsController to ProvidersController * [EC-435] Fixing bug on saving Organization that would have BillingEmail as null * [EC-435] Added null check to Provider * [EC-435] Moved trial buttons script logic to Edit view * [AC-431] Add new organization invite process (#2737) * [EC-435] Created _OrganizationForm partial view. Added actions for creating an Organization assigned to a provider * [EC-435] Remove logic for creating an organization * [EC-435] Created partial view _OrganizationFormScripts * [EC-435] Remove unused ReferenceEventType * [EC-435] Added TODO comment on Organization Create * [EC-435] Checking if Provider type is Reseller on creating new assigned organization * [EC-435] Setting the Organization plan type as TeamsMonthly by default when adding to a provider * [EC-435] Removing unused buttons * [EC-435] Switched hidden fields to form submit route value * [EC-435] Moved _OrganizationForm and _OrganizationFormScripts to Shared folder * [EC-435] Moved Create organization actions from OrganizationsController to ProvidersController * [AC-431] Added new ReferenceEventType OrganizationCreatedByAdmin * [AC-431] Added method IOrganizationService.CreateOrganization * [AC-431] Creating new Organization with Pending status and assigning to Provider * [AC-431] Added method to IMailService to send invitation to initialize org * [AC-431] Added methods CreatePendingOrganization and InitPendingOrganization to IOrganizationService * [AC-431] Org invite includes initOrganization parameter * [AC-431] Modified existing Accept organization user action to initialize org * [AC-431] Updated ProvidersController method name * [AC-431] Created OrganizationUserInitInvitedViewModel to link to 'accept-init-organization' url * [AC-431] Added action AcceptInit to OrganizationUsersController * [AC-431] Resend owner invite * [AC-431] dotnet format * [AC-431] Removed unused parameter 'addingUserId' from IProviderService.AddOrganization * [AC-431] Removed setting manual values for CreationDate and RevisionDate * [AC-431] Updated OrganizationService.InitPendingOrganization to throw exceptions when the Organization does not meet the required criteria * [AC-431] Modified OrganizationUserInitInvitedViewModel to inherit properties from OrganizationUserInvitedViewModel * [AC-431] Removed unecessary parameter check * [AC-431] Moved method description to IOrganizationService.InitPendingOrganization * [AC-431] Moved ApplicationCacheService.UpsertOrganizationAbilityAsync and ReferenceEventService.RaiseEventAsync to OrganizationService * [AC-431] Creating collection after creating organization * [EC-435] Fixing bug on saving Organization that would have BillingEmail as null * [AC-431] Deleted OrganizationUserInitInvitedViewModel and added parameter InitOrganization to OrganizationUserInvitedViewModel.cs * [AC-431] Checking if the user has any existing SingleOrg policies before initializing an Org * [AC-431] Remove commented code * [EC-435] Added null check to Provider * [EC-435] Moved trial buttons script logic to Edit view * [AC-431] Added EncryptedString attribute to OrganizationUserAcceptInitRequestModel.CollectionName * [AC-431] Refactored plan check condition * [AC-431] Remove duplicate _applicationCacheService.UpsertOrganizationAbilityAsync call * [AC-431] Removed IMailService.SendOrganizationInitInviteEmailAsync * [AC-431] Added parameters ClaimsPrincipal and IUserService to IOrganizationService.CreatePendingOrganization * [AC-434] Hide Billing screen for Reseller clients (#2783) * [AC-434] Added ProviderType to ProfileOrganizationResponseModel * [AC-434] Migration script * [AC-434] Fixed indentation on migration script * [AC-434] Hiding sensitive subscription data if the user does not have permissions * [AC-434] Fixed missing dependency in unit test * [AC-434] Altered BillingSubscription.Amount and BillingSubscriptionUpcomingInvoice.Amount to nullable * [AC-434] Replaced CurrentContext.ManageBilling with ViewBillingHistory, ViewSubscription, EditSubscription and EditPaymentMethods * [AC-434] Reverted change on BillingSubscription.Amount and now setting Subscription.Items = null when User does not have permission * [AC-434] Added ProviderOrganizationProviderDetails_ReadByUserId * [AC-434] Added IProviderOrganizationRepository.GetManyByUserAsync * [AC-434] Added CurrentContext.GetOrganizationProviderDetails * [AC-434] Remove unneeded join Organization table * [AC-1255] Search Existing Organizations by partial Email (#2830) * [AC-1255] Added email search field input validation * [AC-1255] Reverted added email pattern * [AC-1255] Modified Organization search by Email to search using substring * [AC-1276] Displaying an Organizations pending owners if the Organization is in a Pending status (#2834) * [AC-432] Checking that an existing Organization is not assigned to any Provider before being assigned (#2840) * [AC-432] Checking if any of the selected Organizations is already assigned to a Provider * [AC-432] Changed ProviderOrganization_ReadByOrganizationIds to only get count * [AC-432] Replaced IProviderOrganizationRepository.GetCountByOrganizationIdsAsync with call to IProviderOrganizationRepository.GetByOrganizationId * [AC-432] undo new line * [AC-432] Fixed unit test * Revert "[AC-432] Replaced IProviderOrganizationRepository.GetCountByOrganizationIdsAsync with call to IProviderOrganizationRepository.GetByOrganizationId" This reverts commitee6e095e88
. # Conflicts: # util/Migrator/DbScripts/2023-03-22_00_ProviderAddExistingOrganizations.sql * [AC-432] Created new migration script for ProviderOrganization_ReadCountByOrganizationIds
583 lines
29 KiB
C#
583 lines
29 KiB
C#
using Bit.Commercial.Core.Services;
|
|
using Bit.Commercial.Core.Test.AutoFixture;
|
|
using Bit.Core.Context;
|
|
using Bit.Core.Entities;
|
|
using Bit.Core.Entities.Provider;
|
|
using Bit.Core.Enums;
|
|
using Bit.Core.Enums.Provider;
|
|
using Bit.Core.Exceptions;
|
|
using Bit.Core.Models.Business;
|
|
using Bit.Core.Models.Business.Provider;
|
|
using Bit.Core.Repositories;
|
|
using Bit.Core.Services;
|
|
using Bit.Core.Utilities;
|
|
using Bit.Test.Common.AutoFixture;
|
|
using Bit.Test.Common.AutoFixture.Attributes;
|
|
using Microsoft.AspNetCore.DataProtection;
|
|
using NSubstitute;
|
|
using NSubstitute.ReturnsExtensions;
|
|
using Xunit;
|
|
using Provider = Bit.Core.Entities.Provider.Provider;
|
|
using ProviderUser = Bit.Core.Entities.Provider.ProviderUser;
|
|
|
|
namespace Bit.Commercial.Core.Test.Services;
|
|
|
|
[SutProviderCustomize]
|
|
public class ProviderServiceTests
|
|
{
|
|
[Theory, BitAutoData]
|
|
public async Task CompleteSetupAsync_UserIdIsInvalid_Throws(SutProvider<ProviderService> sutProvider)
|
|
{
|
|
var exception = await Assert.ThrowsAsync<BadRequestException>(
|
|
() => sutProvider.Sut.CompleteSetupAsync(default, default, default, default));
|
|
Assert.Contains("Invalid owner.", exception.Message);
|
|
}
|
|
|
|
[Theory, BitAutoData]
|
|
public async Task CompleteSetupAsync_TokenIsInvalid_Throws(User user, Provider provider,
|
|
SutProvider<ProviderService> sutProvider)
|
|
{
|
|
var userService = sutProvider.GetDependency<IUserService>();
|
|
userService.GetUserByIdAsync(user.Id).Returns(user);
|
|
|
|
var exception = await Assert.ThrowsAsync<BadRequestException>(
|
|
() => sutProvider.Sut.CompleteSetupAsync(provider, user.Id, default, default));
|
|
Assert.Contains("Invalid token.", exception.Message);
|
|
}
|
|
|
|
[Theory, BitAutoData]
|
|
public async Task CompleteSetupAsync_Success(User user, Provider provider, string key,
|
|
[ProviderUser(ProviderUserStatusType.Confirmed, ProviderUserType.ProviderAdmin)] ProviderUser providerUser,
|
|
SutProvider<ProviderService> sutProvider)
|
|
{
|
|
providerUser.ProviderId = provider.Id;
|
|
providerUser.UserId = user.Id;
|
|
var userService = sutProvider.GetDependency<IUserService>();
|
|
userService.GetUserByIdAsync(user.Id).Returns(user);
|
|
|
|
var providerUserRepository = sutProvider.GetDependency<IProviderUserRepository>();
|
|
providerUserRepository.GetByProviderUserAsync(provider.Id, user.Id).Returns(providerUser);
|
|
|
|
var dataProtectionProvider = DataProtectionProvider.Create("ApplicationName");
|
|
var protector = dataProtectionProvider.CreateProtector("ProviderServiceDataProtector");
|
|
sutProvider.GetDependency<IDataProtectionProvider>().CreateProtector("ProviderServiceDataProtector")
|
|
.Returns(protector);
|
|
sutProvider.Create();
|
|
|
|
var token = protector.Protect($"ProviderSetupInvite {provider.Id} {user.Email} {CoreHelpers.ToEpocMilliseconds(DateTime.UtcNow)}");
|
|
|
|
await sutProvider.Sut.CompleteSetupAsync(provider, user.Id, token, key);
|
|
|
|
await sutProvider.GetDependency<IProviderRepository>().Received().UpsertAsync(provider);
|
|
await sutProvider.GetDependency<IProviderUserRepository>().Received()
|
|
.ReplaceAsync(Arg.Is<ProviderUser>(pu => pu.UserId == user.Id && pu.ProviderId == provider.Id && pu.Key == key));
|
|
}
|
|
|
|
[Theory, BitAutoData]
|
|
public async Task UpdateAsync_ProviderIdIsInvalid_Throws(Provider provider, SutProvider<ProviderService> sutProvider)
|
|
{
|
|
provider.Id = default;
|
|
|
|
var exception = await Assert.ThrowsAsync<ArgumentException>(
|
|
() => sutProvider.Sut.UpdateAsync(provider));
|
|
Assert.Contains("Cannot create provider this way.", exception.Message);
|
|
}
|
|
|
|
[Theory, BitAutoData]
|
|
public async Task UpdateAsync_Success(Provider provider, SutProvider<ProviderService> sutProvider)
|
|
{
|
|
await sutProvider.Sut.UpdateAsync(provider);
|
|
}
|
|
|
|
[Theory, BitAutoData]
|
|
public async Task InviteUserAsync_ProviderIdIsInvalid_Throws(ProviderUserInvite<string> invite, SutProvider<ProviderService> sutProvider)
|
|
{
|
|
sutProvider.GetDependency<ICurrentContext>().ProviderManageUsers(invite.ProviderId).Returns(true);
|
|
|
|
await Assert.ThrowsAsync<NotFoundException>(() => sutProvider.Sut.InviteUserAsync(invite));
|
|
}
|
|
|
|
[Theory, BitAutoData]
|
|
public async Task InviteUserAsync_InvalidPermissions_Throws(ProviderUserInvite<string> invite, SutProvider<ProviderService> sutProvider)
|
|
{
|
|
sutProvider.GetDependency<ICurrentContext>().ProviderManageUsers(invite.ProviderId).Returns(false);
|
|
await Assert.ThrowsAsync<InvalidOperationException>(() => sutProvider.Sut.InviteUserAsync(invite));
|
|
}
|
|
|
|
[Theory, BitAutoData]
|
|
public async Task InviteUserAsync_EmailsInvalid_Throws(Provider provider, ProviderUserInvite<string> providerUserInvite,
|
|
SutProvider<ProviderService> sutProvider)
|
|
{
|
|
var providerRepository = sutProvider.GetDependency<IProviderRepository>();
|
|
providerRepository.GetByIdAsync(providerUserInvite.ProviderId).Returns(provider);
|
|
sutProvider.GetDependency<ICurrentContext>().ProviderManageUsers(providerUserInvite.ProviderId).Returns(true);
|
|
|
|
providerUserInvite.UserIdentifiers = null;
|
|
|
|
await Assert.ThrowsAsync<NotFoundException>(() => sutProvider.Sut.InviteUserAsync(providerUserInvite));
|
|
}
|
|
|
|
[Theory, BitAutoData]
|
|
public async Task InviteUserAsync_AlreadyInvited(Provider provider, ProviderUserInvite<string> providerUserInvite,
|
|
SutProvider<ProviderService> sutProvider)
|
|
{
|
|
var providerRepository = sutProvider.GetDependency<IProviderRepository>();
|
|
providerRepository.GetByIdAsync(providerUserInvite.ProviderId).Returns(provider);
|
|
var providerUserRepository = sutProvider.GetDependency<IProviderUserRepository>();
|
|
providerUserRepository.GetCountByProviderAsync(default, default, default).ReturnsForAnyArgs(1);
|
|
sutProvider.GetDependency<ICurrentContext>().ProviderManageUsers(providerUserInvite.ProviderId).Returns(true);
|
|
|
|
var result = await sutProvider.Sut.InviteUserAsync(providerUserInvite);
|
|
Assert.Empty(result);
|
|
}
|
|
|
|
[Theory, BitAutoData]
|
|
public async Task InviteUserAsync_Success(Provider provider, ProviderUserInvite<string> providerUserInvite,
|
|
SutProvider<ProviderService> sutProvider)
|
|
{
|
|
var providerRepository = sutProvider.GetDependency<IProviderRepository>();
|
|
providerRepository.GetByIdAsync(providerUserInvite.ProviderId).Returns(provider);
|
|
var providerUserRepository = sutProvider.GetDependency<IProviderUserRepository>();
|
|
providerUserRepository.GetCountByProviderAsync(default, default, default).ReturnsForAnyArgs(0);
|
|
sutProvider.GetDependency<ICurrentContext>().ProviderManageUsers(providerUserInvite.ProviderId).Returns(true);
|
|
|
|
var result = await sutProvider.Sut.InviteUserAsync(providerUserInvite);
|
|
Assert.Equal(providerUserInvite.UserIdentifiers.Count(), result.Count);
|
|
Assert.True(result.TrueForAll(pu => pu.Status == ProviderUserStatusType.Invited), "Status must be invited");
|
|
Assert.True(result.TrueForAll(pu => pu.ProviderId == providerUserInvite.ProviderId), "Provider Id must be correct");
|
|
}
|
|
|
|
[Theory, BitAutoData]
|
|
public async Task ResendInviteUserAsync_InvalidPermissions_Throws(ProviderUserInvite<Guid> invite, SutProvider<ProviderService> sutProvider)
|
|
{
|
|
sutProvider.GetDependency<ICurrentContext>().ProviderManageUsers(invite.ProviderId).Returns(false);
|
|
await Assert.ThrowsAsync<BadRequestException>(() => sutProvider.Sut.ResendInvitesAsync(invite));
|
|
}
|
|
|
|
[Theory, BitAutoData]
|
|
public async Task ResendInvitesAsync_Errors(Provider provider,
|
|
[ProviderUser(ProviderUserStatusType.Invited)] ProviderUser pu1,
|
|
[ProviderUser(ProviderUserStatusType.Accepted)] ProviderUser pu2,
|
|
[ProviderUser(ProviderUserStatusType.Confirmed)] ProviderUser pu3,
|
|
[ProviderUser(ProviderUserStatusType.Invited)] ProviderUser pu4,
|
|
SutProvider<ProviderService> sutProvider)
|
|
{
|
|
var providerUsers = new[] { pu1, pu2, pu3, pu4 };
|
|
pu1.ProviderId = pu2.ProviderId = pu3.ProviderId = provider.Id;
|
|
|
|
var invite = new ProviderUserInvite<Guid>
|
|
{
|
|
UserIdentifiers = providerUsers.Select(pu => pu.Id),
|
|
ProviderId = provider.Id
|
|
};
|
|
|
|
var providerRepository = sutProvider.GetDependency<IProviderRepository>();
|
|
providerRepository.GetByIdAsync(provider.Id).Returns(provider);
|
|
var providerUserRepository = sutProvider.GetDependency<IProviderUserRepository>();
|
|
providerUserRepository.GetManyAsync(default).ReturnsForAnyArgs(providerUsers.ToList());
|
|
sutProvider.GetDependency<ICurrentContext>().ProviderManageUsers(invite.ProviderId).Returns(true);
|
|
|
|
var result = await sutProvider.Sut.ResendInvitesAsync(invite);
|
|
Assert.Equal("", result[0].Item2);
|
|
Assert.Equal("User invalid.", result[1].Item2);
|
|
Assert.Equal("User invalid.", result[2].Item2);
|
|
Assert.Equal("User invalid.", result[3].Item2);
|
|
}
|
|
|
|
[Theory, BitAutoData]
|
|
public async Task ResendInvitesAsync_Success(Provider provider, IEnumerable<ProviderUser> providerUsers,
|
|
SutProvider<ProviderService> sutProvider)
|
|
{
|
|
foreach (var providerUser in providerUsers)
|
|
{
|
|
providerUser.ProviderId = provider.Id;
|
|
providerUser.Status = ProviderUserStatusType.Invited;
|
|
}
|
|
|
|
var invite = new ProviderUserInvite<Guid>
|
|
{
|
|
UserIdentifiers = providerUsers.Select(pu => pu.Id),
|
|
ProviderId = provider.Id
|
|
};
|
|
|
|
var providerRepository = sutProvider.GetDependency<IProviderRepository>();
|
|
providerRepository.GetByIdAsync(provider.Id).Returns(provider);
|
|
var providerUserRepository = sutProvider.GetDependency<IProviderUserRepository>();
|
|
providerUserRepository.GetManyAsync(default).ReturnsForAnyArgs(providerUsers.ToList());
|
|
sutProvider.GetDependency<ICurrentContext>().ProviderManageUsers(invite.ProviderId).Returns(true);
|
|
|
|
var result = await sutProvider.Sut.ResendInvitesAsync(invite);
|
|
Assert.True(result.All(r => r.Item2 == ""));
|
|
}
|
|
|
|
[Theory, BitAutoData]
|
|
public async Task SendProviderSetupInviteEmailAsync_Success(Provider provider, string email, SutProvider<ProviderService> sutProvider)
|
|
{
|
|
await sutProvider.Sut.SendProviderSetupInviteEmailAsync(provider, email);
|
|
|
|
await sutProvider.GetDependency<IMailService>().Received(1).SendProviderSetupInviteEmailAsync(provider, Arg.Any<string>(), email);
|
|
}
|
|
|
|
[Theory, BitAutoData]
|
|
public async Task AcceptUserAsync_UserIsInvalid_Throws(SutProvider<ProviderService> sutProvider)
|
|
{
|
|
var exception = await Assert.ThrowsAsync<BadRequestException>(
|
|
() => sutProvider.Sut.AcceptUserAsync(default, default, default));
|
|
Assert.Equal("User invalid.", exception.Message);
|
|
}
|
|
|
|
[Theory, BitAutoData]
|
|
public async Task AcceptUserAsync_AlreadyAccepted_Throws(
|
|
[ProviderUser(ProviderUserStatusType.Accepted)] ProviderUser providerUser, User user,
|
|
SutProvider<ProviderService> sutProvider)
|
|
{
|
|
var providerUserRepository = sutProvider.GetDependency<IProviderUserRepository>();
|
|
providerUserRepository.GetByIdAsync(providerUser.Id).Returns(providerUser);
|
|
|
|
var exception = await Assert.ThrowsAsync<BadRequestException>(
|
|
() => sutProvider.Sut.AcceptUserAsync(providerUser.Id, user, default));
|
|
Assert.Equal("Already accepted.", exception.Message);
|
|
}
|
|
|
|
[Theory, BitAutoData]
|
|
public async Task AcceptUserAsync_TokenIsInvalid_Throws(
|
|
[ProviderUser(ProviderUserStatusType.Invited)] ProviderUser providerUser, User user,
|
|
SutProvider<ProviderService> sutProvider)
|
|
{
|
|
var providerUserRepository = sutProvider.GetDependency<IProviderUserRepository>();
|
|
providerUserRepository.GetByIdAsync(providerUser.Id).Returns(providerUser);
|
|
|
|
var exception = await Assert.ThrowsAsync<BadRequestException>(
|
|
() => sutProvider.Sut.AcceptUserAsync(providerUser.Id, user, default));
|
|
Assert.Equal("Invalid token.", exception.Message);
|
|
}
|
|
|
|
[Theory, BitAutoData]
|
|
public async Task AcceptUserAsync_WrongEmail_Throws(
|
|
[ProviderUser(ProviderUserStatusType.Invited)] ProviderUser providerUser, User user,
|
|
SutProvider<ProviderService> sutProvider)
|
|
{
|
|
var providerUserRepository = sutProvider.GetDependency<IProviderUserRepository>();
|
|
providerUserRepository.GetByIdAsync(providerUser.Id).Returns(providerUser);
|
|
|
|
var dataProtectionProvider = DataProtectionProvider.Create("ApplicationName");
|
|
var protector = dataProtectionProvider.CreateProtector("ProviderServiceDataProtector");
|
|
sutProvider.GetDependency<IDataProtectionProvider>().CreateProtector("ProviderServiceDataProtector")
|
|
.Returns(protector);
|
|
sutProvider.Create();
|
|
|
|
var token = protector.Protect($"ProviderUserInvite {providerUser.Id} {user.Email} {CoreHelpers.ToEpocMilliseconds(DateTime.UtcNow)}");
|
|
|
|
var exception = await Assert.ThrowsAsync<BadRequestException>(
|
|
() => sutProvider.Sut.AcceptUserAsync(providerUser.Id, user, token));
|
|
Assert.Equal("User email does not match invite.", exception.Message);
|
|
}
|
|
|
|
[Theory, BitAutoData]
|
|
public async Task AcceptUserAsync_Success(
|
|
[ProviderUser(ProviderUserStatusType.Invited)] ProviderUser providerUser, User user,
|
|
SutProvider<ProviderService> sutProvider)
|
|
{
|
|
var providerUserRepository = sutProvider.GetDependency<IProviderUserRepository>();
|
|
providerUserRepository.GetByIdAsync(providerUser.Id).Returns(providerUser);
|
|
|
|
var dataProtectionProvider = DataProtectionProvider.Create("ApplicationName");
|
|
var protector = dataProtectionProvider.CreateProtector("ProviderServiceDataProtector");
|
|
sutProvider.GetDependency<IDataProtectionProvider>().CreateProtector("ProviderServiceDataProtector")
|
|
.Returns(protector);
|
|
sutProvider.Create();
|
|
|
|
providerUser.Email = user.Email;
|
|
var token = protector.Protect($"ProviderUserInvite {providerUser.Id} {user.Email} {CoreHelpers.ToEpocMilliseconds(DateTime.UtcNow)}");
|
|
|
|
var pu = await sutProvider.Sut.AcceptUserAsync(providerUser.Id, user, token);
|
|
Assert.Null(pu.Email);
|
|
Assert.Equal(ProviderUserStatusType.Accepted, pu.Status);
|
|
Assert.Equal(user.Id, pu.UserId);
|
|
}
|
|
|
|
[Theory, BitAutoData]
|
|
public async Task ConfirmUsersAsync_NoValid(
|
|
[ProviderUser(ProviderUserStatusType.Invited)] ProviderUser pu1,
|
|
[ProviderUser(ProviderUserStatusType.Accepted)] ProviderUser pu2,
|
|
[ProviderUser(ProviderUserStatusType.Confirmed)] ProviderUser pu3,
|
|
SutProvider<ProviderService> sutProvider)
|
|
{
|
|
pu1.ProviderId = pu3.ProviderId;
|
|
var providerUsers = new[] { pu1, pu2, pu3 };
|
|
var providerUserRepository = sutProvider.GetDependency<IProviderUserRepository>();
|
|
providerUserRepository.GetManyAsync(default).ReturnsForAnyArgs(providerUsers);
|
|
|
|
var dict = providerUsers.ToDictionary(pu => pu.Id, _ => "key");
|
|
var result = await sutProvider.Sut.ConfirmUsersAsync(pu1.ProviderId, dict, default);
|
|
|
|
Assert.Empty(result);
|
|
}
|
|
|
|
[Theory, BitAutoData]
|
|
public async Task ConfirmUsersAsync_Success(
|
|
[ProviderUser(ProviderUserStatusType.Invited)] ProviderUser pu1, User u1,
|
|
[ProviderUser(ProviderUserStatusType.Accepted)] ProviderUser pu2, User u2,
|
|
[ProviderUser(ProviderUserStatusType.Confirmed)] ProviderUser pu3, User u3,
|
|
Provider provider, User user, SutProvider<ProviderService> sutProvider)
|
|
{
|
|
pu1.ProviderId = pu2.ProviderId = pu3.ProviderId = provider.Id;
|
|
pu1.UserId = u1.Id;
|
|
pu2.UserId = u2.Id;
|
|
pu3.UserId = u3.Id;
|
|
var providerUsers = new[] { pu1, pu2, pu3 };
|
|
|
|
var providerUserRepository = sutProvider.GetDependency<IProviderUserRepository>();
|
|
providerUserRepository.GetManyAsync(default).ReturnsForAnyArgs(providerUsers);
|
|
var providerRepository = sutProvider.GetDependency<IProviderRepository>();
|
|
providerRepository.GetByIdAsync(provider.Id).Returns(provider);
|
|
var userRepository = sutProvider.GetDependency<IUserRepository>();
|
|
userRepository.GetManyAsync(default).ReturnsForAnyArgs(new[] { u1, u2, u3 });
|
|
|
|
var dict = providerUsers.ToDictionary(pu => pu.Id, _ => "key");
|
|
var result = await sutProvider.Sut.ConfirmUsersAsync(pu1.ProviderId, dict, user.Id);
|
|
|
|
Assert.Equal("Invalid user.", result[0].Item2);
|
|
Assert.Equal("", result[1].Item2);
|
|
Assert.Equal("Invalid user.", result[2].Item2);
|
|
}
|
|
|
|
[Theory, BitAutoData]
|
|
public async Task SaveUserAsync_UserIdIsInvalid_Throws(ProviderUser providerUser,
|
|
SutProvider<ProviderService> sutProvider)
|
|
{
|
|
providerUser.Id = default;
|
|
var exception = await Assert.ThrowsAsync<BadRequestException>(
|
|
() => sutProvider.Sut.SaveUserAsync(providerUser, default));
|
|
Assert.Equal("Invite the user first.", exception.Message);
|
|
}
|
|
|
|
[Theory, BitAutoData]
|
|
public async Task SaveUserAsync_Success(
|
|
[ProviderUser(type: ProviderUserType.ProviderAdmin)] ProviderUser providerUser, User savingUser,
|
|
SutProvider<ProviderService> sutProvider)
|
|
{
|
|
var providerUserRepository = sutProvider.GetDependency<IProviderUserRepository>();
|
|
providerUserRepository.GetByIdAsync(providerUser.Id).Returns(providerUser);
|
|
|
|
await sutProvider.Sut.SaveUserAsync(providerUser, savingUser.Id);
|
|
await providerUserRepository.Received().ReplaceAsync(providerUser);
|
|
await sutProvider.GetDependency<IEventService>().Received()
|
|
.LogProviderUserEventAsync(providerUser, EventType.ProviderUser_Updated, null);
|
|
}
|
|
|
|
[Theory, BitAutoData]
|
|
public async Task DeleteUsersAsync_NoRemainingOwner_Throws(Provider provider, User deletingUser,
|
|
ICollection<ProviderUser> providerUsers, SutProvider<ProviderService> sutProvider)
|
|
{
|
|
var userIds = providerUsers.Select(pu => pu.Id);
|
|
|
|
providerUsers.First().UserId = deletingUser.Id;
|
|
foreach (var providerUser in providerUsers)
|
|
{
|
|
providerUser.ProviderId = provider.Id;
|
|
}
|
|
providerUsers.Last().ProviderId = default;
|
|
|
|
sutProvider.GetDependency<IProviderRepository>().GetByIdAsync(provider.Id).Returns(provider);
|
|
var providerUserRepository = sutProvider.GetDependency<IProviderUserRepository>();
|
|
providerUserRepository.GetManyAsync(default).ReturnsForAnyArgs(providerUsers);
|
|
providerUserRepository.GetManyByProviderAsync(default, default).ReturnsForAnyArgs(new ProviderUser[] { });
|
|
|
|
var exception = await Assert.ThrowsAsync<BadRequestException>(
|
|
() => sutProvider.Sut.DeleteUsersAsync(provider.Id, userIds, deletingUser.Id));
|
|
Assert.Equal("Provider must have at least one confirmed ProviderAdmin.", exception.Message);
|
|
}
|
|
|
|
[Theory, BitAutoData]
|
|
public async Task DeleteUsersAsync_Success(Provider provider, User deletingUser, ICollection<ProviderUser> providerUsers,
|
|
[ProviderUser(ProviderUserStatusType.Confirmed, ProviderUserType.ProviderAdmin)] ProviderUser remainingOwner,
|
|
SutProvider<ProviderService> sutProvider)
|
|
{
|
|
var userIds = providerUsers.Select(pu => pu.Id);
|
|
|
|
providerUsers.First().UserId = deletingUser.Id;
|
|
foreach (var providerUser in providerUsers)
|
|
{
|
|
providerUser.ProviderId = provider.Id;
|
|
}
|
|
providerUsers.Last().ProviderId = default;
|
|
|
|
sutProvider.GetDependency<IProviderRepository>().GetByIdAsync(provider.Id).Returns(provider);
|
|
var providerUserRepository = sutProvider.GetDependency<IProviderUserRepository>();
|
|
providerUserRepository.GetManyAsync(default).ReturnsForAnyArgs(providerUsers);
|
|
providerUserRepository.GetManyByProviderAsync(default, default).ReturnsForAnyArgs(new[] { remainingOwner });
|
|
|
|
var result = await sutProvider.Sut.DeleteUsersAsync(provider.Id, userIds, deletingUser.Id);
|
|
|
|
Assert.NotEmpty(result);
|
|
Assert.Equal("You cannot remove yourself.", result[0].Item2);
|
|
Assert.Equal("", result[1].Item2);
|
|
Assert.Equal("Invalid user.", result[2].Item2);
|
|
}
|
|
|
|
[Theory, BitAutoData]
|
|
public async Task AddOrganization_OrganizationAlreadyBelongsToAProvider_Throws(Provider provider,
|
|
Organization organization, ProviderOrganization po, string key,
|
|
SutProvider<ProviderService> sutProvider)
|
|
{
|
|
po.OrganizationId = organization.Id;
|
|
sutProvider.GetDependency<IProviderRepository>().GetByIdAsync(provider.Id).Returns(provider);
|
|
sutProvider.GetDependency<IProviderOrganizationRepository>().GetByOrganizationId(organization.Id)
|
|
.Returns(po);
|
|
|
|
var exception = await Assert.ThrowsAsync<BadRequestException>(
|
|
() => sutProvider.Sut.AddOrganization(provider.Id, organization.Id, key));
|
|
Assert.Equal("Organization already belongs to a provider.", exception.Message);
|
|
}
|
|
|
|
[Theory, BitAutoData]
|
|
public async Task AddOrganization_Success(Provider provider, Organization organization, string key,
|
|
SutProvider<ProviderService> sutProvider)
|
|
{
|
|
organization.PlanType = PlanType.EnterpriseAnnually;
|
|
|
|
sutProvider.GetDependency<IProviderRepository>().GetByIdAsync(provider.Id).Returns(provider);
|
|
var providerOrganizationRepository = sutProvider.GetDependency<IProviderOrganizationRepository>();
|
|
providerOrganizationRepository.GetByOrganizationId(organization.Id).ReturnsNull();
|
|
sutProvider.GetDependency<IOrganizationRepository>().GetByIdAsync(organization.Id).Returns(organization);
|
|
|
|
await sutProvider.Sut.AddOrganization(provider.Id, organization.Id, key);
|
|
|
|
await providerOrganizationRepository.ReceivedWithAnyArgs().CreateAsync(default);
|
|
await sutProvider.GetDependency<IEventService>()
|
|
.Received().LogProviderOrganizationEventAsync(Arg.Any<ProviderOrganization>(),
|
|
EventType.ProviderOrganization_Added);
|
|
}
|
|
|
|
[Theory, BitAutoData]
|
|
public async Task AddOrganizationsToReseller_WithResellerProvider_Success(Provider provider, ICollection<Organization> organizations, SutProvider<ProviderService> sutProvider)
|
|
{
|
|
provider.Type = ProviderType.Reseller;
|
|
sutProvider.GetDependency<IProviderRepository>().GetByIdAsync(provider.Id).Returns(provider);
|
|
|
|
var providerOrganizationRepository = sutProvider.GetDependency<IProviderOrganizationRepository>();
|
|
foreach (var organization in organizations)
|
|
{
|
|
organization.PlanType = PlanType.EnterpriseAnnually;
|
|
}
|
|
|
|
var organizationIds = organizations.Select(o => o.Id).ToArray();
|
|
|
|
await sutProvider.Sut.AddOrganizationsToReseller(provider.Id, organizationIds);
|
|
|
|
await providerOrganizationRepository.Received(1).CreateManyAsync(Arg.Is<IEnumerable<ProviderOrganization>>(i => i.All(po => po.ProviderId == provider.Id && organizations.Any(o => o.Id == po.OrganizationId))));
|
|
await sutProvider.GetDependency<IEventService>().Received(1).LogProviderOrganizationEventsAsync(
|
|
Arg.Is<IEnumerable<(ProviderOrganization, EventType, DateTime?)>>(events => events.All(e =>
|
|
e.Item1.ProviderId == provider.Id && organizationIds.Contains(e.Item1.OrganizationId) && e.Item2 == EventType.ProviderOrganization_Added)));
|
|
}
|
|
|
|
[Theory, BitAutoData]
|
|
public async Task AddOrganizationsToReseller_WithMspProvider_Throws(Provider provider, ICollection<Organization> organizations, SutProvider<ProviderService> sutProvider)
|
|
{
|
|
provider.Type = ProviderType.Msp;
|
|
sutProvider.GetDependency<IProviderRepository>().GetByIdAsync(provider.Id).Returns(provider);
|
|
|
|
var providerOrganizationRepository = sutProvider.GetDependency<IProviderOrganizationRepository>();
|
|
foreach (var organization in organizations)
|
|
{
|
|
organization.PlanType = PlanType.EnterpriseAnnually;
|
|
}
|
|
|
|
var organizationIds = organizations.Select(o => o.Id).ToArray();
|
|
|
|
var exception = await Assert.ThrowsAsync<BadRequestException>(() => sutProvider.Sut.AddOrganizationsToReseller(provider.Id, organizationIds));
|
|
Assert.Contains("Provider must be of type Reseller in order to assign Organizations to it.", exception.Message);
|
|
|
|
await providerOrganizationRepository.DidNotReceiveWithAnyArgs().CreateManyAsync(default);
|
|
await sutProvider.GetDependency<IEventService>().DidNotReceiveWithAnyArgs().LogProviderOrganizationEventsAsync(default);
|
|
}
|
|
|
|
[Theory, BitAutoData]
|
|
public async Task CreateOrganizationAsync_Success(Provider provider, OrganizationSignup organizationSignup,
|
|
Organization organization, string clientOwnerEmail, User user, SutProvider<ProviderService> sutProvider)
|
|
{
|
|
organizationSignup.Plan = PlanType.EnterpriseAnnually;
|
|
|
|
sutProvider.GetDependency<IProviderRepository>().GetByIdAsync(provider.Id).Returns(provider);
|
|
var providerOrganizationRepository = sutProvider.GetDependency<IProviderOrganizationRepository>();
|
|
sutProvider.GetDependency<IOrganizationService>().SignUpAsync(organizationSignup, true)
|
|
.Returns(Tuple.Create(organization, null as OrganizationUser));
|
|
|
|
var providerOrganization =
|
|
await sutProvider.Sut.CreateOrganizationAsync(provider.Id, organizationSignup, clientOwnerEmail, user);
|
|
|
|
await providerOrganizationRepository.ReceivedWithAnyArgs().CreateAsync(default);
|
|
await sutProvider.GetDependency<IEventService>()
|
|
.Received().LogProviderOrganizationEventAsync(providerOrganization,
|
|
EventType.ProviderOrganization_Created);
|
|
await sutProvider.GetDependency<IOrganizationService>()
|
|
.Received().InviteUsersAsync(organization.Id, user.Id, Arg.Is<IEnumerable<(OrganizationUserInvite, string)>>(
|
|
t => t.Count() == 1 &&
|
|
t.First().Item1.Emails.Count() == 1 &&
|
|
t.First().Item1.Emails.First() == clientOwnerEmail &&
|
|
t.First().Item1.Type == OrganizationUserType.Owner &&
|
|
t.First().Item1.AccessAll &&
|
|
t.First().Item2 == null));
|
|
}
|
|
|
|
[Theory, BitAutoData]
|
|
public async Task RemoveOrganization_ProviderOrganizationIsInvalid_Throws(Provider provider,
|
|
ProviderOrganization providerOrganization, User user, SutProvider<ProviderService> sutProvider)
|
|
{
|
|
sutProvider.GetDependency<IProviderRepository>().GetByIdAsync(provider.Id).Returns(provider);
|
|
sutProvider.GetDependency<IProviderOrganizationRepository>().GetByIdAsync(providerOrganization.Id)
|
|
.ReturnsNull();
|
|
|
|
var exception = await Assert.ThrowsAsync<BadRequestException>(
|
|
() => sutProvider.Sut.RemoveOrganizationAsync(provider.Id, providerOrganization.Id, user.Id));
|
|
Assert.Equal("Invalid organization.", exception.Message);
|
|
}
|
|
|
|
[Theory, BitAutoData]
|
|
public async Task RemoveOrganization_ProviderOrganizationBelongsToWrongProvider_Throws(Provider provider,
|
|
ProviderOrganization providerOrganization, User user, SutProvider<ProviderService> sutProvider)
|
|
{
|
|
sutProvider.GetDependency<IProviderRepository>().GetByIdAsync(provider.Id).Returns(provider);
|
|
sutProvider.GetDependency<IProviderOrganizationRepository>().GetByIdAsync(providerOrganization.Id)
|
|
.Returns(providerOrganization);
|
|
|
|
var exception = await Assert.ThrowsAsync<BadRequestException>(
|
|
() => sutProvider.Sut.RemoveOrganizationAsync(provider.Id, providerOrganization.Id, user.Id));
|
|
Assert.Equal("Invalid organization.", exception.Message);
|
|
}
|
|
|
|
[Theory, BitAutoData]
|
|
public async Task RemoveOrganization_HasNoOwners_Throws(Provider provider,
|
|
ProviderOrganization providerOrganization, User user, SutProvider<ProviderService> sutProvider)
|
|
{
|
|
providerOrganization.ProviderId = provider.Id;
|
|
sutProvider.GetDependency<IProviderRepository>().GetByIdAsync(provider.Id).Returns(provider);
|
|
sutProvider.GetDependency<IProviderOrganizationRepository>().GetByIdAsync(providerOrganization.Id)
|
|
.Returns(providerOrganization);
|
|
sutProvider.GetDependency<IOrganizationService>().HasConfirmedOwnersExceptAsync(default, default, default)
|
|
.ReturnsForAnyArgs(false);
|
|
|
|
var exception = await Assert.ThrowsAsync<BadRequestException>(
|
|
() => sutProvider.Sut.RemoveOrganizationAsync(provider.Id, providerOrganization.Id, user.Id));
|
|
Assert.Equal("Organization needs to have at least one confirmed owner.", exception.Message);
|
|
}
|
|
|
|
[Theory, BitAutoData]
|
|
public async Task RemoveOrganization_Success(Provider provider,
|
|
ProviderOrganization providerOrganization, User user, SutProvider<ProviderService> sutProvider)
|
|
{
|
|
providerOrganization.ProviderId = provider.Id;
|
|
sutProvider.GetDependency<IProviderRepository>().GetByIdAsync(provider.Id).Returns(provider);
|
|
var providerOrganizationRepository = sutProvider.GetDependency<IProviderOrganizationRepository>();
|
|
providerOrganizationRepository.GetByIdAsync(providerOrganization.Id).Returns(providerOrganization);
|
|
sutProvider.GetDependency<IOrganizationService>().HasConfirmedOwnersExceptAsync(default, default, default)
|
|
.ReturnsForAnyArgs(true);
|
|
|
|
await sutProvider.Sut.RemoveOrganizationAsync(provider.Id, providerOrganization.Id, user.Id);
|
|
await providerOrganizationRepository.Received().DeleteAsync(providerOrganization);
|
|
await sutProvider.GetDependency<IEventService>().Received()
|
|
.LogProviderOrganizationEventAsync(providerOrganization, EventType.ProviderOrganization_Removed);
|
|
}
|
|
}
|