mirror of
https://github.com/ViViDboarder/bitwarden_rs.git
synced 2024-11-22 13:16:39 +00:00
Merge pull request #17 from mprasil/share_cipher
Implement cipher sharing
This commit is contained in:
commit
ac4a40be04
@ -121,12 +121,12 @@ fn post_ciphers(data: Json<CipherData>, headers: Headers, conn: DbConn) -> JsonR
|
|||||||
Ok(Json(cipher.to_json(&headers.host, &headers.user.uuid, &conn)))
|
Ok(Json(cipher.to_json(&headers.host, &headers.user.uuid, &conn)))
|
||||||
}
|
}
|
||||||
|
|
||||||
fn update_cipher_from_data(cipher: &mut Cipher, data: CipherData, headers: &Headers, is_new: bool, conn: &DbConn) -> EmptyResult {
|
fn update_cipher_from_data(cipher: &mut Cipher, data: CipherData, headers: &Headers, is_new_or_shared: bool, conn: &DbConn) -> EmptyResult {
|
||||||
if is_new {
|
if is_new_or_shared {
|
||||||
if let Some(org_id) = data.organizationId {
|
if let Some(org_id) = data.organizationId {
|
||||||
match UserOrganization::find_by_user_and_org(&headers.user.uuid, &org_id, &conn) {
|
match UserOrganization::find_by_user_and_org(&headers.user.uuid, &org_id, &conn) {
|
||||||
None => err!("You don't have permission to add item to organization"),
|
None => err!("You don't have permission to add item to organization"),
|
||||||
Some(org_user) => if org_user.access_all || org_user.type_ < UserOrgType::User as i32 {
|
Some(org_user) => if org_user.has_full_access() {
|
||||||
cipher.organization_uuid = Some(org_id);
|
cipher.organization_uuid = Some(org_id);
|
||||||
} else {
|
} else {
|
||||||
err!("You don't have permission to add cipher directly to organization")
|
err!("You don't have permission to add cipher directly to organization")
|
||||||
@ -340,6 +340,50 @@ fn post_collections_admin(uuid: String, data: Json<CollectionsAdminData>, header
|
|||||||
Ok(())
|
Ok(())
|
||||||
}
|
}
|
||||||
|
|
||||||
|
#[derive(Deserialize)]
|
||||||
|
#[allow(non_snake_case)]
|
||||||
|
struct ShareCipherData {
|
||||||
|
cipher: CipherData,
|
||||||
|
collectionIds: Vec<String>,
|
||||||
|
}
|
||||||
|
|
||||||
|
#[post("/ciphers/<uuid>/share", data = "<data>")]
|
||||||
|
fn post_cipher_share(uuid: String, data: Json<ShareCipherData>, headers: Headers, conn: DbConn) -> JsonResult {
|
||||||
|
let data: ShareCipherData = data.into_inner();
|
||||||
|
|
||||||
|
let mut cipher = match Cipher::find_by_uuid(&uuid, &conn) {
|
||||||
|
Some(cipher) => {
|
||||||
|
if cipher.is_write_accessible_to_user(&headers.user.uuid, &conn) {
|
||||||
|
cipher
|
||||||
|
} else {
|
||||||
|
err!("Cipher is not write accessible")
|
||||||
|
}
|
||||||
|
},
|
||||||
|
None => err!("Cipher doesn't exist")
|
||||||
|
};
|
||||||
|
|
||||||
|
match data.cipher.organizationId {
|
||||||
|
None => err!("Organization id not provided"),
|
||||||
|
Some(_) => {
|
||||||
|
update_cipher_from_data(&mut cipher, data.cipher, &headers, true, &conn)?;
|
||||||
|
for collection in data.collectionIds.iter() {
|
||||||
|
match Collection::find_by_uuid(&collection, &conn) {
|
||||||
|
None => err!("Invalid collection ID provided"),
|
||||||
|
Some(collection) => {
|
||||||
|
if collection.is_writable_by_user(&headers.user.uuid, &conn) {
|
||||||
|
CollectionCipher::save(&cipher.uuid.clone(), &collection.uuid, &conn);
|
||||||
|
} else {
|
||||||
|
err!("No rights to modify the collection")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
Ok(Json(cipher.to_json(&headers.host, &headers.user.uuid, &conn)))
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
#[post("/ciphers/<uuid>/attachment", format = "multipart/form-data", data = "<data>")]
|
#[post("/ciphers/<uuid>/attachment", format = "multipart/form-data", data = "<data>")]
|
||||||
fn post_attachment(uuid: String, data: Data, content_type: &ContentType, headers: Headers, conn: DbConn) -> JsonResult {
|
fn post_attachment(uuid: String, data: Data, content_type: &ContentType, headers: Headers, conn: DbConn) -> JsonResult {
|
||||||
let cipher = match Cipher::find_by_uuid(&uuid, &conn) {
|
let cipher = match Cipher::find_by_uuid(&uuid, &conn) {
|
||||||
|
@ -34,6 +34,7 @@ pub fn routes() -> Vec<Route> {
|
|||||||
delete_attachment_post,
|
delete_attachment_post,
|
||||||
delete_attachment,
|
delete_attachment,
|
||||||
post_cipher_admin,
|
post_cipher_admin,
|
||||||
|
post_cipher_share,
|
||||||
post_cipher,
|
post_cipher,
|
||||||
put_cipher,
|
put_cipher,
|
||||||
delete_cipher_post,
|
delete_cipher_post,
|
||||||
|
@ -224,6 +224,10 @@ impl UserOrganization {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
pub fn has_full_access(self) -> bool {
|
||||||
|
self.access_all || self.type_ < UserOrgType::User as i32
|
||||||
|
}
|
||||||
|
|
||||||
pub fn find_by_uuid(uuid: &str, conn: &DbConn) -> Option<Self> {
|
pub fn find_by_uuid(uuid: &str, conn: &DbConn) -> Option<Self> {
|
||||||
users_organizations::table
|
users_organizations::table
|
||||||
.filter(users_organizations::uuid.eq(uuid))
|
.filter(users_organizations::uuid.eq(uuid))
|
||||||
|
Loading…
Reference in New Issue
Block a user