Skip to content

Commit 1e2e4b9

Browse files
authored
[PM-26429] Add validation to policy data and metadata (#6460)
* Enhance PolicyRequestModel and SavePolicyRequest with validation for policy data and metadata. * Add integration tests for policy updates to validate handling of invalid data types in PolicyRequestModel and SavePolicyRequest. * Add missing using * Update PolicyRequestModel for null safety by making Data and ValidateAndSerializePolicyData nullable * Add integration tests for public PoliciesController to validate handling of invalid data types in policy updates. * Add PolicyDataValidator class for validating and serializing policy data and metadata based on policy type. * Refactor PolicyRequestModel, SavePolicyRequest, and PolicyUpdateRequestModel to utilize PolicyDataValidator for data validation and serialization, removing redundant methods and improving code clarity. * Update PolicyRequestModel and SavePolicyRequest to initialize Data and Metadata properties with empty dictionaries. * Refactor PolicyDataValidator to remove null checks for input data in validation methods * Rename test methods in SavePolicyRequestTests to reflect handling of empty data and metadata, and remove null assignments in test cases for improved clarity. * Enhance error handling in PolicyDataValidator to include field-specific details in BadRequestException messages. * Enhance PoliciesControllerTests to verify error messages for BadRequest responses by checking for specific field names in the response content. * refactor: Update PolicyRequestModel and SavePolicyRequest to use nullable dictionaries for Data and Metadata properties; enhance validation methods in PolicyDataValidator to handle null cases. * test: Add integration tests for handling policies with null data in PoliciesController * fix: Catch specific JsonException in PolicyDataValidator to improve error handling * test: Add unit tests for PolicyDataValidator to validate and serialize policy data and metadata * test: Update PolicyDataValidatorTests to validate organization data ownership metadata
1 parent de56b7f commit 1e2e4b9

File tree

8 files changed

+463
-83
lines changed

8 files changed

+463
-83
lines changed
Lines changed: 16 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,8 @@
1-
// FIXME: Update this file to be null safe and then delete the line below
2-
#nullable disable
3-
4-
using System.ComponentModel.DataAnnotations;
5-
using System.Text.Json;
1+
using System.ComponentModel.DataAnnotations;
62
using Bit.Core.AdminConsole.Enums;
73
using Bit.Core.AdminConsole.Models.Data;
84
using Bit.Core.AdminConsole.OrganizationFeatures.Policies.Models;
5+
using Bit.Core.AdminConsole.Utilities;
96
using Bit.Core.Context;
107

118
namespace Bit.Api.AdminConsole.Models.Request;
@@ -16,14 +13,20 @@ public class PolicyRequestModel
1613
public PolicyType? Type { get; set; }
1714
[Required]
1815
public bool? Enabled { get; set; }
19-
public Dictionary<string, object> Data { get; set; }
16+
public Dictionary<string, object>? Data { get; set; }
2017

21-
public async Task<PolicyUpdate> ToPolicyUpdateAsync(Guid organizationId, ICurrentContext currentContext) => new()
18+
public async Task<PolicyUpdate> ToPolicyUpdateAsync(Guid organizationId, ICurrentContext currentContext)
2219
{
23-
Type = Type!.Value,
24-
OrganizationId = organizationId,
25-
Data = Data != null ? JsonSerializer.Serialize(Data) : null,
26-
Enabled = Enabled.GetValueOrDefault(),
27-
PerformedBy = new StandardUser(currentContext.UserId!.Value, await currentContext.OrganizationOwner(organizationId))
28-
};
20+
var serializedData = PolicyDataValidator.ValidateAndSerialize(Data, Type!.Value);
21+
var performedBy = new StandardUser(currentContext.UserId!.Value, await currentContext.OrganizationOwner(organizationId));
22+
23+
return new()
24+
{
25+
Type = Type!.Value,
26+
OrganizationId = organizationId,
27+
Data = serializedData,
28+
Enabled = Enabled.GetValueOrDefault(),
29+
PerformedBy = performedBy
30+
};
31+
}
2932
}
Lines changed: 4 additions & 41 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,8 @@
11
using System.ComponentModel.DataAnnotations;
2-
using System.Text.Json;
3-
using Bit.Core.AdminConsole.Enums;
42
using Bit.Core.AdminConsole.Models.Data;
53
using Bit.Core.AdminConsole.OrganizationFeatures.Policies.Models;
4+
using Bit.Core.AdminConsole.Utilities;
65
using Bit.Core.Context;
7-
using Bit.Core.Utilities;
86

97
namespace Bit.Api.AdminConsole.Models.Request;
108

@@ -17,45 +15,10 @@ public class SavePolicyRequest
1715

1816
public async Task<SavePolicyModel> ToSavePolicyModelAsync(Guid organizationId, ICurrentContext currentContext)
1917
{
18+
var policyUpdate = await Policy.ToPolicyUpdateAsync(organizationId, currentContext);
19+
var metadata = PolicyDataValidator.ValidateAndDeserializeMetadata(Metadata, Policy.Type!.Value);
2020
var performedBy = new StandardUser(currentContext.UserId!.Value, await currentContext.OrganizationOwner(organizationId));
2121

22-
var updatedPolicy = new PolicyUpdate()
23-
{
24-
Type = Policy.Type!.Value,
25-
OrganizationId = organizationId,
26-
Data = Policy.Data != null ? JsonSerializer.Serialize(Policy.Data) : null,
27-
Enabled = Policy.Enabled.GetValueOrDefault(),
28-
};
29-
30-
var metadata = MapToPolicyMetadata();
31-
32-
return new SavePolicyModel(updatedPolicy, performedBy, metadata);
33-
}
34-
35-
private IPolicyMetadataModel MapToPolicyMetadata()
36-
{
37-
if (Metadata == null)
38-
{
39-
return new EmptyMetadataModel();
40-
}
41-
42-
return Policy?.Type switch
43-
{
44-
PolicyType.OrganizationDataOwnership => MapToPolicyMetadata<OrganizationModelOwnershipPolicyModel>(),
45-
_ => new EmptyMetadataModel()
46-
};
47-
}
48-
49-
private IPolicyMetadataModel MapToPolicyMetadata<T>() where T : IPolicyMetadataModel, new()
50-
{
51-
try
52-
{
53-
var json = JsonSerializer.Serialize(Metadata);
54-
return CoreHelpers.LoadClassFromJsonData<T>(json);
55-
}
56-
catch
57-
{
58-
return new EmptyMetadataModel();
59-
}
22+
return new SavePolicyModel(policyUpdate, performedBy, metadata);
6023
}
6124
}
Lines changed: 14 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,24 @@
1-
using System.Text.Json;
2-
using Bit.Core.AdminConsole.Enums;
1+
using Bit.Core.AdminConsole.Enums;
32
using Bit.Core.AdminConsole.Models.Data;
43
using Bit.Core.AdminConsole.OrganizationFeatures.Policies.Models;
4+
using Bit.Core.AdminConsole.Utilities;
55
using Bit.Core.Enums;
66

77
namespace Bit.Api.AdminConsole.Public.Models.Request;
88

99
public class PolicyUpdateRequestModel : PolicyBaseModel
1010
{
11-
public PolicyUpdate ToPolicyUpdate(Guid organizationId, PolicyType type) => new()
11+
public PolicyUpdate ToPolicyUpdate(Guid organizationId, PolicyType type)
1212
{
13-
Type = type,
14-
OrganizationId = organizationId,
15-
Data = Data != null ? JsonSerializer.Serialize(Data) : null,
16-
Enabled = Enabled.GetValueOrDefault(),
17-
PerformedBy = new SystemUser(EventSystemUser.PublicApi)
18-
};
13+
var serializedData = PolicyDataValidator.ValidateAndSerialize(Data, type);
14+
15+
return new()
16+
{
17+
Type = type,
18+
OrganizationId = organizationId,
19+
Data = serializedData,
20+
Enabled = Enabled.GetValueOrDefault(),
21+
PerformedBy = new SystemUser(EventSystemUser.PublicApi)
22+
};
23+
}
1924
}
Lines changed: 81 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,81 @@
1+
using System.Text.Json;
2+
using Bit.Core.AdminConsole.Enums;
3+
using Bit.Core.AdminConsole.Models.Data.Organizations.Policies;
4+
using Bit.Core.AdminConsole.OrganizationFeatures.Policies.Models;
5+
using Bit.Core.Exceptions;
6+
using Bit.Core.Utilities;
7+
8+
namespace Bit.Core.AdminConsole.Utilities;
9+
10+
public static class PolicyDataValidator
11+
{
12+
/// <summary>
13+
/// Validates and serializes policy data based on the policy type.
14+
/// </summary>
15+
/// <param name="data">The policy data to validate</param>
16+
/// <param name="policyType">The type of policy</param>
17+
/// <returns>Serialized JSON string if data is valid, null if data is null or empty</returns>
18+
/// <exception cref="BadRequestException">Thrown when data validation fails</exception>
19+
public static string? ValidateAndSerialize(Dictionary<string, object>? data, PolicyType policyType)
20+
{
21+
if (data == null || data.Count == 0)
22+
{
23+
return null;
24+
}
25+
26+
try
27+
{
28+
var json = JsonSerializer.Serialize(data);
29+
30+
switch (policyType)
31+
{
32+
case PolicyType.MasterPassword:
33+
CoreHelpers.LoadClassFromJsonData<MasterPasswordPolicyData>(json);
34+
break;
35+
case PolicyType.SendOptions:
36+
CoreHelpers.LoadClassFromJsonData<SendOptionsPolicyData>(json);
37+
break;
38+
case PolicyType.ResetPassword:
39+
CoreHelpers.LoadClassFromJsonData<ResetPasswordDataModel>(json);
40+
break;
41+
}
42+
43+
return json;
44+
}
45+
catch (JsonException ex)
46+
{
47+
var fieldInfo = !string.IsNullOrEmpty(ex.Path) ? $": field '{ex.Path}' has invalid type" : "";
48+
throw new BadRequestException($"Invalid data for {policyType} policy{fieldInfo}.");
49+
}
50+
}
51+
52+
/// <summary>
53+
/// Validates and deserializes policy metadata based on the policy type.
54+
/// </summary>
55+
/// <param name="metadata">The policy metadata to validate</param>
56+
/// <param name="policyType">The type of policy</param>
57+
/// <returns>Deserialized metadata model, or EmptyMetadataModel if metadata is null, empty, or validation fails</returns>
58+
public static IPolicyMetadataModel ValidateAndDeserializeMetadata(Dictionary<string, object>? metadata, PolicyType policyType)
59+
{
60+
if (metadata == null || metadata.Count == 0)
61+
{
62+
return new EmptyMetadataModel();
63+
}
64+
65+
try
66+
{
67+
var json = JsonSerializer.Serialize(metadata);
68+
69+
return policyType switch
70+
{
71+
PolicyType.OrganizationDataOwnership =>
72+
CoreHelpers.LoadClassFromJsonData<OrganizationModelOwnershipPolicyModel>(json),
73+
_ => new EmptyMetadataModel()
74+
};
75+
}
76+
catch (JsonException)
77+
{
78+
return new EmptyMetadataModel();
79+
}
80+
}
81+
}

0 commit comments

Comments
 (0)