|
|
@ -344,6 +344,25 @@ impl UserOrganization {
|
|
|
|
pub async fn to_json(&self, conn: &mut DbConn) -> Value {
|
|
|
|
pub async fn to_json(&self, conn: &mut DbConn) -> Value {
|
|
|
|
let org = Organization::find_by_uuid(&self.org_uuid, conn).await.unwrap();
|
|
|
|
let org = Organization::find_by_uuid(&self.org_uuid, conn).await.unwrap();
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
let permissions = json!({
|
|
|
|
|
|
|
|
// TODO: Add support for Custom User Roles
|
|
|
|
|
|
|
|
// See: https://bitwarden.com/help/article/user-types-access-control/#custom-role
|
|
|
|
|
|
|
|
"accessEventLogs": false,
|
|
|
|
|
|
|
|
"accessImportExport": false,
|
|
|
|
|
|
|
|
"accessReports": false,
|
|
|
|
|
|
|
|
"createNewCollections": false,
|
|
|
|
|
|
|
|
"editAnyCollection": false,
|
|
|
|
|
|
|
|
"deleteAnyCollection": false,
|
|
|
|
|
|
|
|
"editAssignedCollections": false,
|
|
|
|
|
|
|
|
"deleteAssignedCollections": false,
|
|
|
|
|
|
|
|
"manageGroups": false,
|
|
|
|
|
|
|
|
"managePolicies": false,
|
|
|
|
|
|
|
|
"manageSso": false, // Not supported
|
|
|
|
|
|
|
|
"manageUsers": false,
|
|
|
|
|
|
|
|
"manageResetPassword": false,
|
|
|
|
|
|
|
|
"manageScim": false // Not supported (Not AGPLv3 Licensed)
|
|
|
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
|
|
// https://github.com/bitwarden/server/blob/13d1e74d6960cf0d042620b72d85bf583a4236f7/src/Api/Models/Response/ProfileOrganizationResponseModel.cs
|
|
|
|
// https://github.com/bitwarden/server/blob/13d1e74d6960cf0d042620b72d85bf583a4236f7/src/Api/Models/Response/ProfileOrganizationResponseModel.cs
|
|
|
|
json!({
|
|
|
|
json!({
|
|
|
|
"Id": self.org_uuid,
|
|
|
|
"Id": self.org_uuid,
|
|
|
@ -371,27 +390,7 @@ impl UserOrganization {
|
|
|
|
// "KeyConnectorEnabled": false,
|
|
|
|
// "KeyConnectorEnabled": false,
|
|
|
|
// "KeyConnectorUrl": null,
|
|
|
|
// "KeyConnectorUrl": null,
|
|
|
|
|
|
|
|
|
|
|
|
// TODO: Add support for Custom User Roles
|
|
|
|
"permissions": permissions,
|
|
|
|
// See: https://bitwarden.com/help/article/user-types-access-control/#custom-role
|
|
|
|
|
|
|
|
// "Permissions": {
|
|
|
|
|
|
|
|
// "AccessEventLogs": false,
|
|
|
|
|
|
|
|
// "AccessImportExport": false,
|
|
|
|
|
|
|
|
// "AccessReports": false,
|
|
|
|
|
|
|
|
// "ManageAllCollections": false,
|
|
|
|
|
|
|
|
// "CreateNewCollections": false,
|
|
|
|
|
|
|
|
// "EditAnyCollection": false,
|
|
|
|
|
|
|
|
// "DeleteAnyCollection": false,
|
|
|
|
|
|
|
|
// "ManageAssignedCollections": false,
|
|
|
|
|
|
|
|
// "editAssignedCollections": false,
|
|
|
|
|
|
|
|
// "deleteAssignedCollections": false,
|
|
|
|
|
|
|
|
// "ManageCiphers": false,
|
|
|
|
|
|
|
|
// "ManageGroups": false,
|
|
|
|
|
|
|
|
// "ManagePolicies": false,
|
|
|
|
|
|
|
|
// "ManageResetPassword": false,
|
|
|
|
|
|
|
|
// "ManageSso": false, // Not supported
|
|
|
|
|
|
|
|
// "ManageUsers": false,
|
|
|
|
|
|
|
|
// "ManageScim": false, // Not supported (Not AGPLv3 Licensed)
|
|
|
|
|
|
|
|
// },
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
"MaxStorageGb": 10, // The value doesn't matter, we don't check server-side
|
|
|
|
"MaxStorageGb": 10, // The value doesn't matter, we don't check server-side
|
|
|
|
|
|
|
|
|
|
|
|