Skip to content

Commit bfe2792

Browse files
committed
Update KeyIds to use OrganizationId
1 parent 6811df2 commit bfe2792

File tree

11 files changed

+22
-20
lines changed

11 files changed

+22
-20
lines changed

bitwarden_license/bitwarden-sm/src/projects/create.rs

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
use bitwarden_api_api::models::ProjectCreateRequestModel;
2-
use bitwarden_core::{key_management::SymmetricKeyId, Client};
2+
use bitwarden_core::{key_management::SymmetricKeyId, Client, OrganizationId};
33
use bitwarden_crypto::Encryptable;
44
use schemars::JsonSchema;
55
use serde::{Deserialize, Serialize};
@@ -27,7 +27,7 @@ pub(crate) async fn create_project(
2727
input.validate()?;
2828

2929
let key_store = client.internal.get_key_store();
30-
let key = SymmetricKeyId::Organization(input.organization_id);
30+
let key = SymmetricKeyId::Organization(OrganizationId::new(input.organization_id));
3131

3232
let project = Some(ProjectCreateRequestModel {
3333
name: input

bitwarden_license/bitwarden-sm/src/projects/project_response.rs

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
use bitwarden_api_api::models::ProjectResponseModel;
22
use bitwarden_core::{
33
key_management::{KeyIds, SymmetricKeyId},
4-
require,
4+
require, OrganizationId,
55
};
66
use bitwarden_crypto::{Decryptable, EncString, KeyStoreContext};
77
use chrono::{DateTime, Utc};
@@ -27,7 +27,7 @@ impl ProjectResponse {
2727
ctx: &mut KeyStoreContext<KeyIds>,
2828
) -> Result<Self, SecretsManagerError> {
2929
let organization_id = require!(response.organization_id);
30-
let key = SymmetricKeyId::Organization(organization_id);
30+
let key = SymmetricKeyId::Organization(OrganizationId::new(organization_id));
3131

3232
let name = require!(response.name)
3333
.parse::<EncString>()?

bitwarden_license/bitwarden-sm/src/projects/update.rs

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
use bitwarden_api_api::models::ProjectUpdateRequestModel;
2-
use bitwarden_core::{key_management::SymmetricKeyId, Client};
2+
use bitwarden_core::{key_management::SymmetricKeyId, Client, OrganizationId};
33
use bitwarden_crypto::Encryptable;
44
use schemars::JsonSchema;
55
use serde::{Deserialize, Serialize};
@@ -29,7 +29,7 @@ pub(crate) async fn update_project(
2929
input.validate()?;
3030

3131
let key_store = client.internal.get_key_store();
32-
let key = SymmetricKeyId::Organization(input.organization_id);
32+
let key = SymmetricKeyId::Organization(OrganizationId::new(input.organization_id));
3333

3434
let project = Some(ProjectUpdateRequestModel {
3535
name: input

bitwarden_license/bitwarden-sm/src/secrets/create.rs

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
use bitwarden_api_api::models::SecretCreateRequestModel;
2-
use bitwarden_core::{key_management::SymmetricKeyId, Client};
2+
use bitwarden_core::{key_management::SymmetricKeyId, Client, OrganizationId};
33
use bitwarden_crypto::Encryptable;
44
use schemars::JsonSchema;
55
use serde::{Deserialize, Serialize};
@@ -35,7 +35,7 @@ pub(crate) async fn create_secret(
3535
input.validate()?;
3636

3737
let key_store = client.internal.get_key_store();
38-
let key = SymmetricKeyId::Organization(input.organization_id);
38+
let key = SymmetricKeyId::Organization(OrganizationId::new(input.organization_id));
3939

4040
let secret = {
4141
let mut ctx = key_store.context();

bitwarden_license/bitwarden-sm/src/secrets/list.rs

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ use bitwarden_api_api::models::{
44
use bitwarden_core::{
55
client::Client,
66
key_management::{KeyIds, SymmetricKeyId},
7-
require,
7+
require, OrganizationId,
88
};
99
use bitwarden_crypto::{Decryptable, EncString, KeyStoreContext};
1010
use schemars::JsonSchema;
@@ -96,7 +96,7 @@ impl SecretIdentifierResponse {
9696
ctx: &mut KeyStoreContext<KeyIds>,
9797
) -> Result<SecretIdentifierResponse, SecretsManagerError> {
9898
let organization_id = require!(response.organization_id);
99-
let enc_key = SymmetricKeyId::Organization(organization_id);
99+
let enc_key = SymmetricKeyId::Organization(OrganizationId::new(organization_id));
100100

101101
let key = require!(response.key)
102102
.parse::<EncString>()?

bitwarden_license/bitwarden-sm/src/secrets/secret_response.rs

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ use bitwarden_api_api::models::{
33
};
44
use bitwarden_core::{
55
key_management::{KeyIds, SymmetricKeyId},
6-
require,
6+
require, OrganizationId,
77
};
88
use bitwarden_crypto::{Decryptable, EncString, KeyStoreContext};
99
use chrono::{DateTime, Utc};
@@ -51,7 +51,7 @@ impl SecretResponse {
5151
ctx: &mut KeyStoreContext<KeyIds>,
5252
) -> Result<SecretResponse, SecretsManagerError> {
5353
let organization_id = require!(response.organization_id);
54-
let enc_key = SymmetricKeyId::Organization(organization_id);
54+
let enc_key = SymmetricKeyId::Organization(OrganizationId::new(organization_id));
5555

5656
let key = require!(response.key)
5757
.parse::<EncString>()?

bitwarden_license/bitwarden-sm/src/secrets/update.rs

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
use bitwarden_api_api::models::SecretUpdateRequestModel;
2-
use bitwarden_core::{key_management::SymmetricKeyId, Client};
2+
use bitwarden_core::{key_management::SymmetricKeyId, Client, OrganizationId};
33
use bitwarden_crypto::Encryptable;
44
use schemars::JsonSchema;
55
use serde::{Deserialize, Serialize};
@@ -34,7 +34,7 @@ pub(crate) async fn update_secret(
3434
input.validate()?;
3535

3636
let key_store = client.internal.get_key_store();
37-
let key = SymmetricKeyId::Organization(input.organization_id);
37+
let key = SymmetricKeyId::Organization(OrganizationId::new(input.organization_id));
3838

3939
let secret = {
4040
let mut ctx = key_store.context();

crates/bitwarden-core/src/client/encryption_settings.rs

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,6 @@ use thiserror::Error;
66

77
#[cfg(any(feature = "secrets", feature = "internal"))]
88
use crate::OrganizationId;
9-
109
use crate::{
1110
error::UserIdAlreadySetError,
1211
key_management::{AsymmetricKeyId, KeyIds, SymmetricKeyId},

crates/bitwarden-core/src/client/login_method.rs

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,11 @@
11
#[cfg(feature = "secrets")]
22
use std::path::PathBuf;
33

4+
use bitwarden_crypto::Kdf;
5+
46
#[cfg(feature = "secrets")]
57
use crate::auth::AccessToken;
68
use crate::OrganizationId;
7-
use bitwarden_crypto::Kdf;
89

910
#[derive(Debug)]
1011
pub(crate) enum LoginMethod {

crates/bitwarden-core/src/key_management/mod.rs

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,12 +9,14 @@
99
//! [Encryptable](bitwarden_crypto::Encryptable) and [Decryptable](bitwarden_crypto::Encryptable).
1010
use bitwarden_crypto::{key_ids, KeyStore, SymmetricCryptoKey};
1111

12+
use crate::OrganizationId;
13+
1214
key_ids! {
1315
#[symmetric]
1416
pub enum SymmetricKeyId {
1517
Master,
1618
User,
17-
Organization(uuid::Uuid),
19+
Organization(OrganizationId),
1820
#[local]
1921
Local(&'static str),
2022
}
@@ -50,7 +52,7 @@ pub fn create_test_crypto_with_user_key(key: SymmetricCryptoKey) -> KeyStore<Key
5052
/// it in their own tests.
5153
pub fn create_test_crypto_with_user_and_org_key(
5254
key: SymmetricCryptoKey,
53-
org_id: uuid::Uuid,
55+
org_id: OrganizationId,
5456
org_key: SymmetricCryptoKey,
5557
) -> KeyStore<KeyIds> {
5658
let store = KeyStore::default();

crates/bitwarden-uuid-macro/src/lib.rs

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -23,8 +23,8 @@ pub fn uuid_newtype(input: TokenStream) -> TokenStream {
2323
#[cfg_attr(feature = "wasm", derive(::tsify_next::Tsify), tsify(into_wasm_abi, from_wasm_abi))]
2424
#[derive(
2525
::serde::Serialize, ::serde::Deserialize,
26-
::std::cmp::PartialEq, ::std::cmp::Eq, ::std::hash::Hash,
27-
::std::clone::Clone, ::std::marker::Copy, ::std::fmt::Debug
26+
::std::cmp::PartialEq, ::std::cmp::Eq, ::std::cmp::PartialOrd, ::std::cmp::Ord,
27+
::std::hash::Hash, ::std::clone::Clone, ::std::marker::Copy, ::std::fmt::Debug
2828
)]
2929
#[repr(transparent)]
3030
#vis struct #ident

0 commit comments

Comments
 (0)