Compare commits

...

22 Commits

Author SHA1 Message Date
Michiel Hazelhof
389be8cea8 Unified work (#269)
* Some work on line endings

* Enable buildkit

* Update documentation

* Settle the newline and tab vs spaces for now

Not perfect, but it's a standard

* Change wording

* Update version memo

* Add correct definition for markdown

* Make things clearer
2025-12-09 21:13:35 +01:00
Jackson K
f6d7470ce8 Update container name/links of Bitwarden Unified to Bitwarden Lite (#265)
* Rename Containers from bitwarden/self-host:beta to bitwarden/lite:beta

* Edit README to reflect rename

* Change build.ps1 and Dockerfile-bitwarden-patched to CRLF

* Remove .DS_Store file, and add to .gitignore

* Actually remove .DS_Store

* Make all ps1 files CRLF in .gitattributes & Make Dockerfiles LF.

* Change from beta tag to latest
2025-12-08 23:08:28 +01:00
Michiel Hazelhof
9bc010cb57 Update and fix unified branch (#257)
* Upstream patches

* Fix license generator according to upstream changes (#245) (#249)

* Test generating user and organization licenses during build check (#252)

* Fix ps1 script and update language

* Update class path

* Cleanup code

* Cleanup code

* Cleanup code

* Refactor and fixes

* Copy all files

* Copy files only when needed

* Make call consistent

* Simplify call

* Clarify language

* Reuse code

* Cleanup

* Cleanup

* Remove NewtonSoft.Json

* Upgrade dnlib

* Cleanup

* Fix path issue

* Fix comparator

* Cleanup circleci

* Fix type

* Fix circleci

* Properly detect previous version

* Add missing parameter

* Better detect running patched containers

* Improve naming

* Fix line endings

* Fix typo

* Add comment

* Fix tabs

* Cleanup org license

* Use proper file extension

* Add missing file

* Migrate cert.cert if exists

* Check for the correct file

* Fix character check

* Add comment

* Add more documentation

* Add proper line endings

* Add potentially correct line

* Add auto restart

* Update comment

* Improve consistency between bash and powerhell

* Update documentation

* Detect buildx

* Fix spelling mistake

* Fix check order and improve verbosity
2025-10-05 19:40:16 +01:00
juliokele
29add24126 licenseGen: fix OrganizationLicense namespace (#253)
Co-authored-by: juliokele <>
2025-08-03 18:11:30 +02:00
Joseph Gigantino
3689cc5ba1 Test generating user and organization licenses during build check (#251)
Add commands to build check to test if the created licensegen image can actually generate user and organization licenses. licenseGen.sh will print the generated license to stdout and return zero if successful. If an error occurs, a non zero error code is returned which should cause a build error.
2025-07-30 19:51:51 +02:00
Joseph Gigantino
34da077778 Update Program.cs (#241)
Remove duplicate instances of:
Set("UseRiskInsights", true);
Set("UseOrganizationDomains", true);     Set("UseAdminSponsoredFamilies", true);

Signed-off-by: Joseph Gigantino <128943406+Jgigantino31@users.noreply.github.com>
Co-authored-by: h44z <christoph.h@sprinternet.at>
2025-07-29 19:54:54 +02:00
juliokele
a3803cb3bc [unified] Fix licenseGen according to upstream changes (#247)
* Dockerfile: remove not existing executable argument

* licenseGen: fix classes according to upstream changes

---------

Co-authored-by: juliokele <>
2025-07-29 19:49:52 +02:00
juliokele
01cdfa2842 [unified] Fix patch according to upstream changes and fix build errors (#243)
* Fix bitbetter patch according to upstream changes

* Fix the builds by removing redundant already removed and stopped old instance

---------

Co-authored-by: juliokele <>
2025-07-29 19:48:55 +02:00
Michiel Hazelhof
076b0a624b Upstream patches (#240) 2025-07-15 10:00:09 +01:00
Joseph Gigantino
3d4c10d6f6 Update Program.cs (#236)
Set three new license options to true: UseRiskInsights, UseOrganizationDomains, and UseAdminSponsoredFamilies.

As mentioned in #229, licenses had to be regenerated starting in 2025.5.0. It looks like new options were added which default to false unless we set them to true here. I am not sure if the version needs to be bumped or not. I tested locally and I can now access the Claimed Domains page in my organization.

Signed-off-by: Joseph Gigantino <128943406+Jgigantino31@users.noreply.github.com>
2025-06-25 12:40:00 +00:00
Joseph Gigantino
1597800b89 Update serverlist.txt so that by default all lines are comments (#228) 2025-06-25 12:34:10 +00:00
juliokele
02740e84b6 build.sh: fix line endings in serverlist.txt before executing commands (#232)
Co-authored-by: Gyula Kelemen <kgydevelopement@gmail.com>
2025-06-10 20:47:53 +02:00
Joseph Gigantino
d71aa84e52 Update Unified branch to account for move from Docker Hub to GHCR (#227)
* Update build.sh to reflect move to GHCR

* Update build.ps1 to reflect move to GHCR

* Update README.md to reflect move to GHCR

* Update Dockerfile-bitwarden-patch to reflect move to GHCR
2025-03-29 17:15:16 +00:00
Michiel Hazelhof
770dcd33f6 Move Manually generating Certificate & Key section in README.md for unified (#220)
* Update Dockerfile

See #215 and #207

* Move Manually generating Certificate & Key section in README.md

See #216
2025-01-12 12:14:30 +01:00
Michiel Hazelhof
b6d2c9244c Update Dockerfile (#217)
See #215 and #207
2024-11-24 19:05:26 +01:00
Michiel Hazelhof
b47fe37279 Update license to version 15 (#211) (#212)
Co-authored-by: captainhook <16797541+captainhook@users.noreply.github.com>
2024-10-15 11:12:55 +01:00
Michiel Hazelhof
f75731633c Use new location (#201) 2024-06-30 01:30:58 +00:00
Michiel Hazelhof
0a45513872 Follow master updates and general improvements (#194)
* Use correct framework

* Upgrade packages

* Remove unused variable

* Migrate away from deprecated package

* Improve naming

* Fix typo

* Simplify constructors
2024-03-31 11:13:05 +01:00
Michiel Hazelhof
c8192610dc Properly fix Dockerfiles (#189) 2024-03-04 21:16:30 +00:00
Michiel Hazelhof
e4da85d46e Updated the unified branch (#180)
* Updated license version to 12, added SM options, increased max seats (short to int) (#172)

* - Updated license version to 12
- Added new SM license options
* Change seats, smseats, smserviceaccounts from short to int, like they are in the Bitwarden server code, to allow for the accurate maximum amount of seats

* Add extra ignore

* Code cleanup

* Ignore more VS cruft

* Bring up to date with upstream

(Update License to use Secrets Manager fully)

* Update to .NET 8.0
2024-02-23 14:44:27 +00:00
Michiel Hazelhof
38e6ebc5f9 Update licenseGen with latest version and options (#165) (#166)
Co-authored-by: Michiel Hazelhof <m.hazelhof@fyn.nl>
2023-04-23 12:41:27 +00:00
Michiel Hazelhof
d4abc9e5b7 Full Unified support including Linux and Windows (#155 / #154)
* Initial work

* Fix typo

* Fix typo

* Fix stupid issue

* Add comments and fix minor issues

* Add extra information

* Add Linux script for generating keys

* Add circleci

* Add comments

* Add extra option

* Add missing permissions and empty script for now

* Fix line endings

* Add missing mount point

* Simplify patch

* Fix scripts

* Reduce complexity

* Fix circleci

* Remove useless line

* Move to src folder and improve image creation
2023-01-16 21:13:43 +01:00
24 changed files with 1045 additions and 822 deletions

View File

@@ -1,4 +1,4 @@
version: 2 version: 2.1
jobs: jobs:
build: build:
machine: true machine: true
@@ -9,7 +9,13 @@ jobs:
command: date command: date
- run: - run:
name: Generate Keys name: Generate Keys
command: ./.keys/generate-keys.sh command: ./generateKeys.sh
- run: - run:
name: Build script name: Build script
command: ./build.sh command: ./build.sh update
- run:
name: Test generating user license
command: ./licenseGen.sh user TestName TestEmail@example.com 4a619d4a-522d-4c70-8596-affb5b607c23
- run:
name: Test generating organization license
command: ./licenseGen.sh org TestName TestEmail@example.com 4a619d4a-522d-4c70-8596-affb5b607c23

19
.editorconfig Normal file
View File

@@ -0,0 +1,19 @@
root=true
###############################
# Core EditorConfig Options #
###############################
# All files
[*]
indent_style=tab
indent_size=4
trim_trailing_whitespace=true
end_of_line=lf
charset=utf-8
[*.{cs}]
insert_final_newline=false
[*.{md,mkdn}]
trim_trailing_whitespace = true
indent_style = space

1
.gitattributes vendored Normal file
View File

@@ -0,0 +1 @@
* text eol=lf

6
.gitignore vendored
View File

@@ -1,8 +1,12 @@
.idea/ .idea/
bin/ bin/
obj/ obj/
src/licenseGen/.vs/*
src/bitBetter/.vs/*
*.dll *.dll
*.pem *.pem
.vscode/ .vscode/
*.pfx *.pfx
*.cert *.cer
*.vsidx
.DS_Store

View File

@@ -1,20 +0,0 @@
#!/bin/sh
# Check for openssl
command -v openssl >/dev/null 2>&1 || { echo >&2 "openssl required but not found. Aborting."; exit 1; }
DIR=`dirname "$0"`
DIR=`exec 2>/dev/null;(cd -- "$DIR") && cd -- "$DIR"|| cd "$DIR"; unset PWD; /usr/bin/pwd || /bin/pwd || pwd`
# Remove any existing key files
[ ! -e "$DIR/cert.pem" ] || rm "$DIR/cert.pem"
[ ! -e "$DIR/key.pem" ] || rm "$DIR/key.pem"
[ ! -e "$DIR/cert.cert" ] || rm "$DIR/cert.cert"
[ ! -e "$DIR/cert.pfx" ] || rm "$DIR/cert.pfx"
# Generate new keys
openssl req -x509 -newkey rsa:4096 -keyout "$DIR/key.pem" -out "$DIR/cert.cert" -days 36500 -subj '/CN=www.mydom.com/O=My Company Name LTD./C=US' -outform DER -passout pass:test
openssl x509 -inform DER -in "$DIR/cert.cert" -out "$DIR/cert.pem"
openssl pkcs12 -export -out "$DIR/cert.pfx" -inkey "$DIR/key.pem" -in "$DIR/cert.pem" -passin pass:test -passout pass:test
ls

4
.servers/serverlist.txt Normal file
View File

@@ -0,0 +1,4 @@
# Uncomment a line below and fill in the missing values or add your own. Every line in this file will be called by build.[sh|ps1] once the patched image is built.
# docker run -d --name bitwarden --restart=always -v <full-local-path>\logs:/var/log/bitwarden -v <full-local-path>\bwdata:/etc/bitwarden -p 80:8080 --env-file <full-local-path>\settings.env bitwarden-patched
# <OR>
# docker-compose -f <full-local-path>/docker-compose.yml up -d

169
README.md
View File

@@ -1,12 +1,14 @@
# BitBetter # BitBetter lite
BitBetter is is a tool to modify Bitwarden's core dll to allow you to generate your own individual and organisation licenses. **You must have an existing installation of Bitwarden for BitBetter to modify.** BitBetter is is a tool to modify Bitwarden's core dll to allow you to generate your own individual and organisation licenses.
Please see the FAQ below for details on why this software was created. Please see the FAQ below for details on why this software was created.
_Beware! BitBetter does janky stuff to rewrite the bitwarden core dll and allow the installation of a self signed certificate. Use at your own risk!_ Be aware that this branch is **only** for the lite (formerly unified) version of bitwarden. It has been rewritten and works in different ways than the master branch.
Credit to https://github.com/h44z/BitBetter and https://github.com/jakeswenson/BitBetter _Beware! BitBetter is a solution that generates a personal certificate and uses that to generate custom licences. This requires (automated) modifying of libraries. Use at your own risk!_
Credit to https://github.com/h44z/BitBetter and https://github.com/jakeswenson/BitBetter and https://github.com/GieltjE/BitBetter
# Table of Contents # Table of Contents
- [BitBetter](#bitbetter) - [BitBetter](#bitbetter)
@@ -14,8 +16,8 @@ Credit to https://github.com/h44z/BitBetter and https://github.com/jakeswenson/B
- [Getting Started](#getting-started) - [Getting Started](#getting-started)
- [Dependencies](#dependencies) - [Dependencies](#dependencies)
- [Setting up BitBetter](#setting-up-bitbetter) - [Setting up BitBetter](#setting-up-bitbetter)
- [Optional: Manually generating Certificate & Key](#optional-manually-generating-certificate--key)
- [Building BitBetter](#building-bitbetter) - [Building BitBetter](#building-bitbetter)
- [Note: Manually generating Certificate & Key](#note-manually-generating-certificate--key)
- [Updating Bitwarden and BitBetter](#updating-bitwarden-and-bitbetter) - [Updating Bitwarden and BitBetter](#updating-bitwarden-and-bitbetter)
- [Generating Signed Licenses](#generating-signed-licenses) - [Generating Signed Licenses](#generating-signed-licenses)
- [Note: Alternative Ways to Generate License](#note-alternative-ways-to-generate-license) - [Note: Alternative Ways to Generate License](#note-alternative-ways-to-generate-license)
@@ -25,125 +27,111 @@ Credit to https://github.com/h44z/BitBetter and https://github.com/jakeswenson/B
- [Footnotes](#footnotes) - [Footnotes](#footnotes)
# Getting Started # Getting Started
The following instructions are for unix-based systems (Linux, BSD, macOS), it is possible to use a Windows systems assuming you are able to enable and install [WSL](https://docs.microsoft.com/en-us/windows/wsl/install-win10). The following instructions are for unix-based systems (Linux, BSD, macOS) and Windows, just choose the correct script extension (.sh or .ps1 respectively).
## Dependencies ## Dependencies
Aside from docker, which you also need for Bitwarden, BitBetter requires the following: Aside from docker, which you also need for Bitwarden, BitBetter requires the following:
* Bitwarden (tested with 1.47.1, might work on lower versions) * Bitwarden (tested with 2025.11.1 might work on lower versions), for safety always stay up to date
* openssl (probably already installed on most Linux or WSL systems, any version should work) * openssl (probably already installed on most Linux or WSL systems, any version should work, on Windows it will be auto installed using winget)
## Setting up BitBetter ## Setting up BitBetter
With your dependencies installed, begin the installation of BitBetter by downloading it through Github or using the git command: With your dependencies installed, begin the installation of BitBetter by downloading it through Github or using the git command:
```bash ```
git clone https://github.com/jakeswenson/BitBetter.git git clone https://github.com/jakeswenson/BitBetter.git
``` ```
## Building BitBetter ### Optional: Manually generating Certificate & Key
Now that you've set up your build environment, you can **run the main build script** to generate a modified version of the `bitwarden/api` and `bitwarden/identity` docker images.
From the BitBetter directory, simply run:
```bash
./build.sh
```
This will create a new self-signed certificate in the `.keys` directory if one does not already exist and then create a modified version of the official `bitwarden/api` called `bitbetter/api` and a modified version of the `bitwarden/identity` called `bitbetter/identity`.
You may now simply create the file `/path/to/bwdata/docker/docker-compose.override.yml` with the following contents to utilize the modified images.
```yaml
version: '3'
services:
api:
image: bitbetter/api
identity:
image: bitbetter/identity
```
You'll also want to edit the `/path/to/bwdata/scripts/run.sh` file. In the `function restart()` block, comment out the call to `dockerComposePull`.
> Replace `dockerComposePull`<br>with `#dockerComposePull`
You can now start or restart Bitwarden as normal and the modified api will be used. **It is now ready to accept self-issued licenses.**
---
### Note: Manually generating Certificate & Key
If you wish to generate your self-signed cert & key manually, you can run the following commands. If you wish to generate your self-signed cert & key manually, you can run the following commands.
```bash ```bash
openssl req -x509 -newkey rsa:4096 -keyout key.pem -out cert.cert -days 36500 -outform DER -passout pass:test cd .keys
openssl x509 -inform DER -in cert.cert -out cert.pem openssl req -x509 -newkey rsa:4096 -keyout key.pem -out cert.cer -days 36500 -outform DER -passout pass:test
openssl x509 -inform DER -in cert.cer -out cert.pem
openssl pkcs12 -export -out cert.pfx -inkey key.pem -in cert.pem -passin pass:test -passout pass:test openssl pkcs12 -export -out cert.pfx -inkey key.pem -in cert.pem -passin pass:test -passout pass:test
``` ```
> Note that the password here must be `test`.<sup>[1](#f1)</sup> > Note that the password here must be `test`.<sup>[1](#f1)</sup>
---
## Building BitBetter
Now that you've set up your build environment, we need to specify which servers to start after the work is done.
The scripts supports running and patching multi instances.
Edit the .servers/serverlist.txt file and fill in the missing values, they can be replaced with existing installation values.
This file may be empty, but there will be no containers will be spun up automatically.
Now it is time to **run the main build script** to generate a modified version of the `ghcr.io/bitwarden/lite` docker image and the license generator.
From the BitBetter directory, simply run:
```
./build.[sh|ps1]
```
This will create a new self-signed certificate in the `.keys` directory if one does not already exist and then create a modified version of the official `ghcr.io/bitwarden/lite` image called `bitwarden-patched`.
Afterwards it will automatically generate the license generator and start all previously specified containers which are **now ready to accept self-issued licenses.**
--- ---
## Updating Bitwarden and BitBetter ## Updating Bitwarden and BitBetter
To update Bitwarden, the provided `update-bitwarden.sh` script can be used. It will rebuild the BitBetter images and automatically update Bitwarden afterwards. Docker pull errors can be ignored for api and identity images. To update Bitwarden, the same `build.[sh|ps1]` script can be used. It will rebuild the BitBetter image and automatically update Bitwarden before doing so.
You can either run this script without providing any parameters in interactive mode (`./update-bitwarden.sh`) or by setting the parameters as follows, to run the script in non-interactive mode:
```bash
./update-bitwarden.sh param1 param2 param3
```
`param1`: The path to the directory containing your bwdata directory
`param2`: If you want the docker-compose file to be overwritten (either `y` or `n`)
`param3`: If you want the bitbetter images to be rebuild (either `y` or `n`)
If you are updating from versions <= 1.46.2, you may need to run `update-bitwarden.sh` twice to complete the update process.
## Generating Signed Licenses ## Generating Signed Licenses
There is a tool included in the directory `src/licenseGen/` that will generate new individual and organization licenses. These licenses will be accepted by the modified Bitwarden because they will be signed by the certificate you generated in earlier steps. There is a tool included in the directory `licenseGen/` that will generate new individual and organization licenses. These licenses will be accepted by the modified Bitwarden because they will be signed by the certificate you generated in earlier steps.
First, from the `BitBetter/src/licenseGen` directory, **build the license generator**.<sup>[2](#f2)</sup>
```bash
./build.sh
```
In order to run the tool and generate a license you'll need to get a **user's GUID** in order to generate an **invididual license** or the server's **install ID** to generate an **Organization license**. These can be retrieved most easily through the Bitwarden [Admin Portal](https://help.bitwarden.com/article/admin-portal/). In order to run the tool and generate a license you'll need to get a **user's GUID** in order to generate an **invididual license** or the server's **install ID** to generate an **Organization license**. These can be retrieved most easily through the Bitwarden [Admin Portal](https://help.bitwarden.com/article/admin-portal/).
**The user must have a verified email address at the time of license import, otherwise Bitwarden will reject the license key. Nevertheless, the license key can be generated even before the user's email is verified.** **The user must have a verified email address at the time of license import, otherwise Bitwarden will reject the license key. Nevertheless, the license key can be generated even before the user's email is verified.**
If you generated your keys in the default `BitBetter/.keys` directory, you can **simply run the license gen in interactive mode** from the `Bitbetter` directory and **follow the prompts to generate your license**. If you ran the build script, you can **simply run the license gen in interactive mode** from the `Bitbetter` directory and **follow the prompts to generate your license**.
```bash ```
./src/licenseGen/run.sh interactive ./licenseGen.[sh|ps1] interactive
``` ```
**The license generator will spit out a JSON-formatted license which can then be used within the Bitwarden web front-end to license your user or org!** **The license generator will spit out a JSON-formatted license which can then be used within the Bitwarden web front-end to license your user or org!**
---
### Note: Alternative Ways to Generate License ## Migrating from mssql to a real database
If you wish to run the license gen from a directory aside from the root `BitBetter` one, you'll have to provide the absolute path to your cert.pfx. Prepare a new database and bwdata directory, download and prepare the new settings.env (https://raw.githubusercontent.com/bitwarden/self-host/refs/heads/main/bitwarden-lite/settings.env)
```bash Make sure you can get the data from either the backup file or by connecting directly to the mssql database (navicat has a trial).
./src/licenseGen/run.sh /Absolute/Path/To/BitBetter/.keys/cert.pfx interactive
If required (e.g. you cannot connect to your docker mssql server directly) download Microsoft SQL Server 2022 and SQL Server Management Studio (the latter can be used to import the .bak file)
After cloning this repo and modifying .servers/serverlist.txt to suit your new environment do the following:
```
docker exec -i bitwarden-mssql /backup-db.sh
./bitwarden.sh stop
``` ```
Additional, instead of interactive mode, you can also pass the parameters directly to the command as follows. Run build.sh and ensure your new instance serves a webpage AND has populated the new database with the tables (should be empty now)
```bash Proceed to stop the new container for now.
./src/licenseGen/run.sh /Absolute/Path/To/BitBetter/.keys/cert.pfx user "Name" "E-Mail" "User-GUID" ["Storage Space in GB"] ["Custom LicenseKey"]
./src/licenseGen/run.sh /Absolute/Path/To/BitBetter/.keys/cert.pfx org "Name" "E-Mail" "Install-ID used to install the server" ["Storage Space in GB"] ["Custom LicenseKey"] Copy from the old to the new bwdata directory (do not copy/overwrite identity.pfx!):
``` - bwdata/core/licenses to bwdata-new/licenses
- bwdata/core/aspnet-dataprotection to bwdata-new/data-protection
- bwdata/core/attachments to bwdata-new/attachments
Export data only from the old sql server database, if needed import the .bak file to a local mssql instance.
Only export tables that have rows, makes it much quicker, .json is the easiest with navicat.
Import the rows to the real database, start the new docker container.
--- ---
# FAQ: Questions you might have. # FAQ: Questions you might have.
## Why build a license generator for open source software? ## Why build a license generator for open source software?
@@ -158,10 +146,29 @@ In the past we have done so but they were not focused on the type of customer th
UPDATE: Bitwarden now offers a cheap license called [Families Organization](https://bitwarden.com/pricing/) that provides premium features and the ability to self-host Bitwarden for six persons. UPDATE: Bitwarden now offers a cheap license called [Families Organization](https://bitwarden.com/pricing/) that provides premium features and the ability to self-host Bitwarden for six persons.
## 2fa doesn't work
Unfortunately the new BitWarden container doesn't set the timezone and ignores TZ= from the environment, can be fixed by:
```
docker exec bitwarden ln -s /usr/share/zoneinfo/Europe/Amsterdam /etc/localtime
```
## Changes in settings.env
Require a recreation of the docker container, build.sh will suffice too.
## Migrating from the old unified branch
```
git branch -m unified lite
git fetch origin
git branch -u origin/lite lite
git remote set-head origin -a
```
# Footnotes # Footnotes
<a name="#f1"><sup>1</sup></a> If you wish to change this you'll need to change the value that `src/licenseGen/Program.cs` uses for its `GenerateUserLicense` and `GenerateOrgLicense` calls. Remember, this is really unnecessary as this certificate does not represent any type of security-related certificate. <a name="#f1"><sup>1</sup></a>This tool builds on top of the `bitbetter/api` container image so make sure you've built that above using the root `./build.sh` script.
<a name="#f2"><sup>2</sup></a>This tool builds on top of the `bitbetter/api` container image so make sure you've built that above using the root `./build.sh` script.
<a name="#f2"><sup>2</sup></a> If you wish to change this you'll need to change the value that `licenseGen/Program.cs` uses for its `GenerateUserLicense` and `GenerateOrgLicense` calls. Remember, this is really unnecessary as this certificate does not represent any type of security-related certificate.

132
build.ps1 Normal file
View File

@@ -0,0 +1,132 @@
$ErrorActionPreference = 'Stop'
$PSNativeCommandUseErrorActionPreference = $true
# detect buildx, ErrorActionPreference will ensure the script stops execution if not found
docker buildx version
# Enable BuildKit for better build experience and to ensure platform args are populated
$env:DOCKER_BUILDKIT=1
$env:COMPOSE_DOCKER_CLI_BUILD=1
# define temporary directory
$tempdirectory = "$pwd\temp"
# define services to patch
$components = "Api","Identity"
# delete old directories / files if applicable
if (Test-Path "$tempdirectory" -PathType Container) {
Remove-Item "$tempdirectory" -Recurse -Force
}
if (Test-Path -Path "$pwd\src\licenseGen\Core.dll" -PathType Leaf) {
Remove-Item "$pwd\src\licenseGen\Core.dll" -Force
}
if (Test-Path -Path "$pwd\src\licenseGen\cert.pfx" -PathType Leaf) {
Remove-Item "$pwd\src\licenseGen\cert.pfx" -Force
}
if (Test-Path -Path "$pwd\src\bitBetter\cert.cer" -PathType Leaf) {
Remove-Item "$pwd\src\bitBetter\cert.cer" -Force
}
if (Test-Path "$pwd\.keys\cert.cert" -PathType Leaf) {
Rename-Item -Path "$pwd\.keys\cert.cert" -NewName "$pwd\.keys\cert.cer"
}
# generate keys if none are available
if (!(Test-Path "$pwd\.keys" -PathType Container)) {
.\generateKeys.ps1
}
# copy the key to bitBetter
Copy-Item "$pwd\.keys\cert.cer" -Destination "$pwd\src\bitBetter"
# build bitBetter and clean the source directory after
docker build --no-cache -t bitbetter/bitbetter "$pwd\src\bitBetter"
Remove-Item "$pwd\src\bitBetter\cert.cer" -Force
# gather all running instances, cannot run a wildcard filter on Ancestor= :(, does find all where name = *bitwarden*
$oldinstances = docker container ps --all -f Name=bitwarden --format '{{.ID}}'
# stop and remove all running instances
foreach ($instance in $oldinstances) {
docker stop $instance
docker rm $instance
}
# update bitwarden itself
if ($args[0] -eq 'update') {
docker pull ghcr.io/bitwarden/lite:latest
} else {
$confirmation = Read-Host "Update (or get) bitwarden source container (y/n)"
if ($confirmation -eq 'y') {
docker pull ghcr.io/bitwarden/lite:latest
}
}
# stop and remove previous existing patch(ed) container
$oldinstances = docker container ps --all -f Ancestor=bitwarden-patched --format '{{.ID}}'
foreach ($instance in $oldinstances) {
docker stop $instance
docker rm $instance
}
$oldinstances = docker image ls bitwarden-patched --format '{{.ID}}'
foreach ($instance in $oldinstances) {
docker image rm $instance
}
# remove old extract containers
$oldinstances = docker container ps --all -f Name=bitwarden-extract --format '{{.ID}}'
foreach ($instance in $oldinstances) {
docker stop $instance
docker rm $instance
}
# start a new bitwarden instance so we can patch it
$patchinstance = docker run -d --name bitwarden-extract ghcr.io/bitwarden/lite:latest
# create our temporary directory
New-item -ItemType Directory -Path $tempdirectory
# extract the files that need to be patched from the services that need to be patched into our temporary directory
foreach ($component in $components) {
New-item -itemtype Directory -path "$tempdirectory\$component"
docker cp $patchinstance`:/app/$component/Core.dll "$tempdirectory\$component\Core.dll"
}
# stop and remove our temporary container
docker stop bitwarden-extract
docker rm bitwarden-extract
# run bitBetter, this applies our patches to the required files
docker run -v "$tempdirectory`:/app/mount" --rm bitbetter/bitbetter
# create a new image with the patched files
docker build . --tag bitwarden-patched --file "$pwd\src\bitBetter\Dockerfile-bitwarden-patch"
# start all user requested instances
if (Test-Path -Path "$pwd\.servers\serverlist.txt" -PathType Leaf) {
foreach($line in Get-Content "$pwd\.servers\serverlist.txt") {
if (!($line.StartsWith("#"))) {
Invoke-Expression "& $line"
}
}
}
# remove our bitBetter image
docker image rm bitbetter/bitbetter
# copy our patched library to the licenseGen source directory
Copy-Item "$tempdirectory\Identity\Core.dll" -Destination "$pwd\src\licenseGen"
Copy-Item "$pwd\.keys\cert.pfx" -Destination "$pwd\src\licenseGen"
# build the licenseGen
docker build -t bitbetter/licensegen "$pwd\src\licenseGen"
# clean the licenseGen source directory
Remove-Item "$pwd\src\licenseGen\Core.dll" -Force
Remove-Item "$pwd\src\licenseGen\cert.pfx" -Force
# remove our temporary directory
Remove-Item "$tempdirectory" -Recurse -Force

145
build.sh
View File

@@ -1,28 +1,135 @@
#!/bin/sh #!/bin/bash
set -e
DIR=`dirname "$0"` # detect buildx, set -e will ensure the script stops execution if not found
DIR=`exec 2>/dev/null;(cd -- "$DIR") && cd -- "$DIR"|| cd "$DIR"; unset PWD; /usr/bin/pwd || /bin/pwd || pwd` docker buildx version
BW_VERSION=$(curl -sL https://go.btwrdn.co/bw-sh-versions | grep '^ *"'coreVersion'":' | awk -F\: '{ print $2 }' | sed -e 's/,$//' -e 's/^"//' -e 's/"$//')
echo "Building BitBetter for BitWarden version $BW_VERSION" # Enable BuildKit for better build experience and to ensure platform args are populated
export DOCKER_BUILDKIT=1
export COMPOSE_DOCKER_CLI_BUILD=1
# If there aren't any keys, generate them first. # define temporary directory
[ -e "$DIR/.keys/cert.cert" ] || "$DIR/.keys/generate-keys.sh" TEMPDIRECTORY="$PWD/temp"
[ -e "$DIR/src/bitBetter/.keys" ] || mkdir "$DIR/src/bitBetter/.keys" # define services to patch
COMPONENTS=("Api" "Identity")
cp "$DIR/.keys/cert.cert" "$DIR/src/bitBetter/.keys" # delete old directories / files if applicable
if [ -d "$TEMPDIRECTORY" ]; then
rm -rf "$TEMPDIRECTORY"
fi
docker run --rm -v "$DIR/src/bitBetter:/bitBetter" -w=/bitBetter mcr.microsoft.com/dotnet/sdk:6.0 sh build.sh if [ -f "$PWD/src/licenseGen/Core.dll" ]; then
rm -f "$PWD/src/licenseGen/Core.dll"
fi
docker build --no-cache --build-arg BITWARDEN_TAG=bitwarden/api:$BW_VERSION --label com.bitwarden.product="bitbetter" -t bitbetter/api "$DIR/src/bitBetter" # --squash if [ -f "$PWD/src/licenseGen/cert.pfx" ]; then
docker build --no-cache --build-arg BITWARDEN_TAG=bitwarden/identity:$BW_VERSION --label com.bitwarden.product="bitbetter" -t bitbetter/identity "$DIR/src/bitBetter" # --squash rm -f "$PWD/src/licenseGen/cert.pfx"
fi
docker tag bitbetter/api bitbetter/api:latest if [ -f "$PWD/src/bitBetter/cert.cer" ]; then
docker tag bitbetter/identity bitbetter/identity:latest rm -f "$PWD/src/bitBetter/cert.cer"
docker tag bitbetter/api bitbetter/api:$BW_VERSION fi
docker tag bitbetter/identity bitbetter/identity:$BW_VERSION
# Remove old instances of the image after a successful build. if [ -f "$PWD/.keys/cert.cert" ]; then
ids=$( docker images bitbetter/* | grep -E -v -- "CREATED|latest|${BW_VERSION}" | awk '{ print $3 }' ) mv "$PWD/.keys/cert.cert" "$PWD/.keys/cert.cer"
[ -n "$ids" ] && docker rmi $ids || true fi
# generate keys if none are available
if [ ! -d "$PWD/.keys" ]; then
./generateKeys.sh
fi
# copy the key to bitBetter
cp -f "$PWD/.keys/cert.cer" "$PWD/src/bitBetter"
# build bitBetter and clean the source directory after
docker build --no-cache -t bitbetter/bitbetter "$PWD/src/bitBetter"
rm -f "$PWD/src/bitBetter/cert.cer"
# gather all running instances, cannot run a wildcard filter on Ancestor= :(, does find all where name = *bitwarden*
OLDINSTANCES=$(docker container ps --all -f Name=bitwarden --format '{{.ID}}')
# stop and remove all running instances
for INSTANCE in ${OLDINSTANCES[@]}; do
docker stop $INSTANCE
docker rm $INSTANCE
done
# update bitwarden itself
if [ "$1" = "update" ]; then
docker pull ghcr.io/bitwarden/lite:latest
else
read -p "Update (or get) bitwarden source container (y/n): "
if [[ $REPLY =~ ^[Yy]$ ]]; then
docker pull ghcr.io/bitwarden/lite:latest
fi
fi
# stop and remove previous existing patch(ed) container
OLDINSTANCES=$(docker container ps --all -f Ancestor=bitwarden-patched --format '{{.ID}}')
for INSTANCE in ${OLDINSTANCES[@]}; do
docker stop $INSTANCE
docker rm $INSTANCE
done
OLDINSTANCES=$(docker image ls bitwarden-patched --format '{{.ID}}')
for INSTANCE in ${OLDINSTANCES[@]}; do
docker image rm $INSTANCE
done
# remove old extract containers
OLDINSTANCES=$(docker container ps --all -f Name=bitwarden-extract --format '{{.ID}}')
for INSTANCE in ${OLDINSTANCES[@]}; do
docker stop $INSTANCE
docker rm $INSTANCE
done
# start a new bitwarden instance so we can patch it
PATCHINSTANCE=$(docker run -d --name bitwarden-extract ghcr.io/bitwarden/lite:latest)
# create our temporary directory
mkdir $TEMPDIRECTORY
# extract the files that need to be patched from the services that need to be patched into our temporary directory
for COMPONENT in ${COMPONENTS[@]}; do
mkdir "$TEMPDIRECTORY/$COMPONENT"
docker cp $PATCHINSTANCE:/app/$COMPONENT/Core.dll "$TEMPDIRECTORY/$COMPONENT/Core.dll"
done
# stop and remove our temporary container
docker stop bitwarden-extract
docker rm bitwarden-extract
# run bitBetter, this applies our patches to the required files
docker run -v "$TEMPDIRECTORY:/app/mount" --rm bitbetter/bitbetter
# create a new image with the patched files
docker build . --tag bitwarden-patched --file "$PWD/src/bitBetter/Dockerfile-bitwarden-patch"
# start all user requested instances
if [ -f "$PWD/.servers/serverlist.txt" ]; then
# convert line endings to unix
sed -i 's/\r$//' "$PWD/.servers/serverlist.txt"
cat "$PWD/.servers/serverlist.txt" | while read -r LINE; do
if [[ $LINE != "#"* ]]; then
bash -c "$LINE"
fi
done
fi
# remove our bitBetter image
docker image rm bitbetter/bitbetter
# copy our patched library to the licenseGen source directory
cp -f "$TEMPDIRECTORY/Identity/Core.dll" "$PWD/src/licenseGen"
cp -f "$PWD/.keys/cert.pfx" "$PWD/src/licenseGen"
# build the licenseGen
docker build -t bitbetter/licensegen "$PWD/src/licenseGen"
# clean the licenseGen source directory
rm -f "$PWD/src/licenseGen/Core.dll"
rm -f "$PWD/src/licenseGen/cert.pfx"
# remove our temporary directory
rm -rf "$TEMPDIRECTORY"

25
generateKeys.ps1 Normal file
View File

@@ -0,0 +1,25 @@
$ErrorActionPreference = 'Stop'
$PSNativeCommandUseErrorActionPreference = $true
# get the basic openssl binary path
$opensslbinary = "$Env:Programfiles\OpenSSL-Win64\bin\openssl.exe"
# if openssl is not installed attempt to install it
if (!(Get-Command $opensslbinary -errorAction SilentlyContinue))
{
winget install openssl
}
# if previous keys exist, remove them
if (Test-Path "$pwd\.keys")
{
Remove-Item "$pwd\.keys" -Recurse -Force
}
# create new directory
New-item -ItemType Directory -Path "$pwd\.keys"
# generate actual keys
Invoke-Expression "& '$opensslbinary' req -x509 -newkey rsa:4096 -keyout `"$pwd\.keys\key.pem`" -out `"$pwd\.keys\cert.cer`" -days 36500 -subj '/CN=www.mydom.com/O=My Company Name LTD./C=US' -outform DER -passout pass:test"
Invoke-Expression "& '$opensslbinary' x509 -inform DER -in `"$pwd\.keys\cert.cer`" -out `"$pwd\.keys\cert.pem`""
Invoke-Expression "& '$opensslbinary' pkcs12 -export -out `"$pwd\.keys\cert.pfx`" -inkey `"$pwd\.keys\key.pem`" -in `"$pwd\.keys\cert.pem`" -passin pass:test -passout pass:test"

20
generateKeys.sh Executable file
View File

@@ -0,0 +1,20 @@
#!/bin/bash
set -e
# Check for openssl
command -v openssl >/dev/null 2>&1 || { echo >&2 "openssl required but not found. Aborting."; exit 1; }
DIR="$PWD/.keys"
# if previous keys exist, remove them
if [ -d "$DIR" ]; then
rm -rf "$DIR"
fi
# create new directory
mkdir "$DIR"
# Generate new keys
openssl req -x509 -newkey rsa:4096 -keyout "$DIR/key.pem" -out "$DIR/cert.cer" -days 36500 -subj '/CN=www.mydom.com/O=My Company Name LTD./C=US' -outform DER -passout pass:test
openssl x509 -inform DER -in "$DIR/cert.cer" -out "$DIR/cert.pem"
openssl pkcs12 -export -out "$DIR/cert.pfx" -inkey "$DIR/key.pem" -in "$DIR/cert.pem" -passin pass:test -passout pass:test

17
licenseGen.ps1 Normal file
View File

@@ -0,0 +1,17 @@
$ErrorActionPreference = 'Stop'
$PSNativeCommandUseErrorActionPreference = $true
if ($($args.Count) -lt 1) {
echo "USAGE: <License Gen action> [License Gen args...]"
echo "ACTIONS:"
echo " interactive"
echo " user"
echo " org"
Exit 1
}
if ($args[0] -eq "interactive") {
docker run -it --rm bitbetter/licensegen interactive
} else {
docker run bitbetter/licensegen $args
}

17
licenseGen.sh Executable file
View File

@@ -0,0 +1,17 @@
#!/bin/bash
set -e
if [ $# -lt 1 ]; then
echo "USAGE: <License Gen action> [License Gen args...]"
echo "ACTIONS:"
echo " interactive"
echo " user"
echo " org"
exit 1
fi
if [ "$1" = "interactive" ]; then
docker run -it --rm bitbetter/licensegen interactive
else
docker run --rm bitbetter/licensegen "$@"
fi

View File

@@ -1,11 +1,14 @@
ARG BITWARDEN_TAG FROM mcr.microsoft.com/dotnet/sdk:8.0 AS build
FROM ${BITWARDEN_TAG} WORKDIR /bitBetter
COPY bin/Debug/netcoreapp6.0/publish/* /bitBetter/ COPY . /bitBetter
COPY ./.keys/cert.cert /newLicensing.cer COPY cert.cer /app/
RUN set -e; set -x; \ RUN dotnet restore
dotnet /bitBetter/bitBetter.dll && \ RUN dotnet publish -c Release -o /app --no-restore
mv /app/Core.dll /app/Core.orig.dll && \
mv /app/modified.dll /app/Core.dll && \ FROM mcr.microsoft.com/dotnet/sdk:8.0
rm -rf /bitBetter && rm -rf /newLicensing.cer WORKDIR /app
COPY --from=build /app .
ENTRYPOINT ["dotnet", "/app/bitBetter.dll"]

View File

@@ -0,0 +1,3 @@
FROM ghcr.io/bitwarden/lite:latest
COPY ./temp/ /app/

View File

@@ -1,93 +1,67 @@
using System; using System;
using System.IO; using System.Collections.Generic;
using System.Linq; using System.IO;
using System.Security.Cryptography.X509Certificates; using System.Linq;
using Mono.Cecil; using System.Security.Cryptography.X509Certificates;
using Mono.Cecil.Cil; using dnlib.DotNet;
using Mono.Cecil.Rocks; using dnlib.DotNet.Emit;
using dnlib.DotNet.Writer;
namespace bitwardenSelfLicensor using dnlib.IO;
{
class Program namespace bitBetter;
{
static int Main(string[] args) internal class Program
{ {
string cerFile; private static Int32 Main()
string corePath; {
const String certFile = "/app/cert.cer";
if(args.Length >= 2) { String[] files = Directory.GetFiles("/app/mount", "Core.dll", SearchOption.AllDirectories);
cerFile = args[0];
corePath = args[1]; foreach (String file in files)
} else if (args.Length == 1) { {
cerFile = args[0]; Console.WriteLine(file);
corePath = "/app/Core.dll"; ModuleDefMD moduleDefMd = ModuleDefMD.Load(file);
} Byte[] cert = File.ReadAllBytes(certFile);
else {
cerFile = "/newLicensing.cer"; EmbeddedResource embeddedResourceToRemove = moduleDefMd.Resources.OfType<EmbeddedResource>().First(r => r.Name.Equals("Bit.Core.licensing.cer"));
corePath = "/app/Core.dll"; EmbeddedResource embeddedResourceToAdd = new("Bit.Core.licensing.cer", cert) { Attributes = embeddedResourceToRemove.Attributes };
} moduleDefMd.Resources.Add(embeddedResourceToAdd);
moduleDefMd.Resources.Remove(embeddedResourceToRemove);
var module = ModuleDefinition.ReadModule(new MemoryStream(File.ReadAllBytes(corePath))); DataReader reader = embeddedResourceToRemove.CreateReader();
var cert = File.ReadAllBytes(cerFile); X509Certificate2 existingCert = new(reader.ReadRemainingBytes());
var x = module.Resources.OfType<EmbeddedResource>() Console.WriteLine($"Existing Cert Thumbprint: {existingCert.Thumbprint}");
.Where(r => r.Name.Equals("Bit.Core.licensing.cer")) X509Certificate2 certificate = new(cert);
.First();
Console.WriteLine($"New Cert Thumbprint: {certificate.Thumbprint}");
Console.WriteLine(x.Name);
IEnumerable<TypeDef> services = moduleDefMd.Types.Where(t => t.Namespace == "Bit.Core.Billing.Services");
var e = new EmbeddedResource("Bit.Core.licensing.cer", x.Attributes, cert); TypeDef type = services.First(t => t.Name == "LicensingService");
MethodDef constructor = type.FindConstructors().First();
module.Resources.Add(e);
module.Resources.Remove(x); Instruction instructionToPatch = constructor.Body.Instructions.FirstOrDefault(i => i.OpCode == OpCodes.Ldstr && String.Equals((String)i.Operand, existingCert.Thumbprint, StringComparison.InvariantCultureIgnoreCase));
var services = module.Types.Where(t => t.Namespace == "Bit.Core.Services"); if (instructionToPatch != null)
{
instructionToPatch.Operand = certificate.Thumbprint;
var type = services.First(t => t.Name == "LicensingService"); }
else
var licensingType = type.Resolve(); {
Console.WriteLine("Can't find constructor to patch");
var existingCert = new X509Certificate2(x.GetResourceData()); }
Console.WriteLine($"Existing Cert Thumbprint: {existingCert.Thumbprint}"); ModuleWriterOptions moduleWriterOptions = new(moduleDefMd);
X509Certificate2 certificate = new X509Certificate2(cert); moduleWriterOptions.MetadataOptions.Flags |= MetadataFlags.KeepOldMaxStack;
moduleWriterOptions.MetadataOptions.Flags |= MetadataFlags.PreserveAll;
Console.WriteLine($"New Cert Thumbprint: {certificate.Thumbprint}"); moduleWriterOptions.MetadataOptions.Flags |= MetadataFlags.PreserveRids;
var ctor = licensingType.GetConstructors().Single(); moduleDefMd.Write(file + ".new");
moduleDefMd.Dispose();
File.Delete(file);
var rewriter = ctor.Body.GetILProcessor(); File.Move(file + ".new", file);
}
var instToReplace =
ctor.Body.Instructions.Where(i => i.OpCode == OpCodes.Ldstr return 0;
&& string.Equals((string)i.Operand, existingCert.Thumbprint, StringComparison.InvariantCultureIgnoreCase)) }
.FirstOrDefault(); }
if(instToReplace != null) {
rewriter.Replace(instToReplace, Instruction.Create(OpCodes.Ldstr, certificate.Thumbprint));
}
else {
Console.WriteLine("Cant find inst");
}
// foreach (var inst in ctor.Body.Instructions)
// {
// Console.Write(inst.OpCode.Name + " " + inst.Operand?.GetType() + " = ");
// if(inst.OpCode.FlowControl == FlowControl.Call) {
// Console.WriteLine(inst.Operand);
// }
// else if(inst.OpCode == OpCodes.Ldstr) {
// Console.WriteLine(inst.Operand);
// }
// else {Console.WriteLine();}
// }
module.Write("modified.dll");
return 0;
}
}
}

View File

@@ -1,12 +1,9 @@
<Project Sdk="Microsoft.NET.Sdk"> <Project Sdk="Microsoft.NET.Sdk">
<PropertyGroup> <PropertyGroup>
<OutputType>Exe</OutputType> <OutputType>Exe</OutputType>
<TargetFramework>netcoreapp6.0</TargetFramework> <TargetFramework>net8.0</TargetFramework>
</PropertyGroup> </PropertyGroup>
<ItemGroup> <ItemGroup>
<PackageReference Include="Mono.Cecil" Version="0.11.2" /> <PackageReference Include="dnlib" Version="4.5.0" />
</ItemGroup> </ItemGroup>
</Project>
</Project>

View File

@@ -1,7 +0,0 @@
#!/bin/bash
set -e
set -x
dotnet restore
dotnet publish

View File

@@ -1,17 +1,15 @@
FROM mcr.microsoft.com/dotnet/sdk:6.0 as build FROM mcr.microsoft.com/dotnet/sdk:8.0 AS build
WORKDIR /licenseGen WORKDIR /licenseGen
COPY . /licenseGen COPY . /licenseGen
COPY Core.dll /app/
COPY cert.pfx /app/
RUN set -e; set -x; \ RUN dotnet restore
dotnet add package Newtonsoft.Json --version 13.0.1 \ RUN dotnet publish -c Release -o /app --no-restore
&& dotnet restore \
&& dotnet publish
FROM mcr.microsoft.com/dotnet/sdk:8.0
WORKDIR /app
COPY --from=build /app .
FROM bitbetter/api ENTRYPOINT ["dotnet", "/app/licenseGen.dll", "--cert=/app/cert.pfx", "--core=/app/Core.dll"]
COPY --from=build /licenseGen/bin/Debug/netcoreapp6.0/publish/* /app/
ENTRYPOINT [ "dotnet", "/app/licenseGen.dll", "--core", "/app/Core.dll", "--cert", "/cert.pfx" ]

View File

@@ -1,448 +1,485 @@
using System; using System;
using System.IO; using System.IO;
using System.Linq; using System.Text.Json;
using System.Runtime.Loader; using System.Reflection;
using System.Security.Cryptography.X509Certificates; using System.Runtime.Loader;
using Microsoft.Extensions.CommandLineUtils; using System.Security.Cryptography.X509Certificates;
using Newtonsoft.Json; using McMaster.Extensions.CommandLineUtils;
namespace bitwardenSelfLicensor namespace licenseGen;
{
class Program internal class Program
{ {
static int Main(string[] args) private static readonly CommandLineApplication App = new();
{ private static readonly CommandOption Cert = App.Option("--cert", "Certificate file", CommandOptionType.SingleValue);
var app = new Microsoft.Extensions.CommandLineUtils.CommandLineApplication(); private static readonly CommandOption CoreDll = App.Option("--core", "Path to Core.dll", CommandOptionType.SingleValue);
var cert = app.Option("--cert", "cert file", CommandOptionType.SingleValue);
var coreDll = app.Option("--core", "path to core dll", CommandOptionType.SingleValue); private static Int32 Main(String[] args)
{
bool certExists() App.Command("interactive", config =>
{ {
return File.Exists(cert.Value()); String buff, licenseType = "", name = "", email = "", businessName="";
} Int16 storage = 0;
Boolean validGuid = false, validInstallid = false;
bool coreExists() Guid guid = Guid.Empty, installid = Guid.Empty;
{
return File.Exists(coreDll.Value()); config.OnExecute(() =>
} {
Check();
bool verifyTopOptions() Console.WriteLine("Interactive license mode...");
{
return !string.IsNullOrWhiteSpace(cert.Value()) && while (licenseType == "")
!string.IsNullOrWhiteSpace(coreDll.Value()) && {
certExists() && coreExists(); Console.WriteLine("What would you like to generate, a [u]ser license or an [o]rg license: ");
} buff = Console.ReadLine();
app.Command("interactive", config => switch (buff)
{ {
string buff="", licensetype="", name="", email="", businessname=""; case "u":
short storage = 0; {
licenseType = "user";
bool valid_guid = false, valid_installid = false; Console.WriteLine("Okay, we will generate a user license.");
Guid guid = new Guid(), installid = new Guid();
while (!validGuid)
config.OnExecute(() => {
{ Console.WriteLine("Please provide the user's guid — refer to the Readme for details on how to retrieve this. [GUID]: ");
if (!verifyTopOptions()) buff = Console.ReadLine();
{
if (!coreExists()) config.Error.WriteLine($"Cant find core dll at: {coreDll.Value()}"); if (Guid.TryParse(buff, out guid))validGuid = true;
if (!certExists()) config.Error.WriteLine($"Cant find certificate at: {cert.Value()}"); else Console.WriteLine("The user-guid provided does not appear to be valid!");
}
config.ShowHelp(); break;
return 1; }
} case "o":
{
WriteLine("Interactive license mode..."); licenseType = "org";
Console.WriteLine("Okay, we will generate an organization license.");
while (licensetype == "")
{ while (!validInstallid)
WriteLine("What would you like to generate, a [u]ser license or an [o]rg license?"); {
buff = Console.ReadLine(); Console.WriteLine("Please provide your Bitwarden Install-ID — refer to the Readme for details on how to retrieve this. [Install-ID]: ");
buff = Console.ReadLine();
if(buff == "u")
{ if (Guid.TryParse(buff, out installid)) validInstallid = true;
licensetype = "user"; else Console.WriteLine("The install-id provided does not appear to be valid.");
WriteLineOver("Okay, we will generate a user license."); }
while (valid_guid == false) while (businessName == "")
{ {
WriteLine("Please provide the user's guid — refer to the Readme for details on how to retrieve this. [GUID]:"); Console.WriteLine("Please enter a business name, default is BitBetter. [Business Name]: ");
buff = Console.ReadLine(); buff = Console.ReadLine();
if (buff == "")
if (Guid.TryParse(buff, out guid))valid_guid = true; {
else WriteLineOver("The user-guid provided does not appear to be valid."); businessName = "BitBetter";
} }
} else if (CheckBusinessName(buff))
else if (buff == "o") {
{ businessName = buff;
licensetype = "org"; }
WriteLineOver("Okay, we will generate an organization license."); }
break;
while (valid_installid == false) }
{ default:
WriteLine("Please provide your Bitwarden Install-ID — refer to the Readme for details on how to retrieve this. [Install-ID]:"); Console.WriteLine("Unrecognized option \'" + buff + "\'.");
buff = Console.ReadLine(); break;
}
if (Guid.TryParse(buff, out installid)) valid_installid = true; }
else WriteLineOver("The install-id provided does not appear to be valid.");
} while (name == "")
{
while (businessname == "") Console.WriteLine("Please provide the username this license will be registered to. [username]: ");
{ buff = Console.ReadLine();
WriteLineOver("Please enter a business name, default is BitBetter. [Business Name]:"); if (CheckUsername(buff)) name = buff;
buff = Console.ReadLine(); }
if (buff == "") businessname = "BitBetter";
else if (checkBusinessName(buff)) businessname = buff; while (email == "")
} {
} Console.WriteLine("Please provide the email address for the user " + name + ". [email]: ");
else buff = Console.ReadLine();
{ if (CheckEmail(buff))
WriteLineOver("Unrecognized option \'" + buff + "\'. "); {
} email = buff;
} }
}
while (name == "")
{ while (storage == 0)
WriteLineOver("Please provide the username this license will be registered to. [username]:"); {
buff = Console.ReadLine(); Console.WriteLine("Extra storage space for the user " + name + ". (max.: " + Int16.MaxValue + "). Defaults to maximum value. [storage]");
if ( checkUsername(buff) ) name = buff; buff = Console.ReadLine();
} if (String.IsNullOrWhiteSpace(buff))
{
while (email == "") storage = Int16.MaxValue;
{ }
WriteLineOver("Please provide the email address for the user " + name + ". [email]"); else
buff = Console.ReadLine(); {
if ( checkEmail(buff) ) email = buff; if (CheckStorage(buff))
} {
storage = Int16.Parse(buff);
while (storage == 0) }
{ }
WriteLineOver("Extra storage space for the user " + name + ". (max.: " + short.MaxValue + "). Defaults to maximum value. [storage]"); }
buff = Console.ReadLine();
if (string.IsNullOrWhiteSpace(buff)) switch (licenseType)
{ {
storage = short.MaxValue; case "user":
} {
else Console.WriteLine("Confirm creation of \"user\" license for username: \"" + name + "\", email: \"" + email + "\", Storage: \"" + storage + " GB\", User-GUID: \"" + guid + "\"? Y/n");
{ buff = Console.ReadLine();
if (checkStorage(buff)) storage = short.Parse(buff); if (buff is "" or "y" or "Y")
} {
} GenerateUserLicense(new X509Certificate2(Cert.Value(), "test"), CoreDll.Value(), name, email, storage, guid, null);
}
if (licensetype == "user") else
{ {
WriteLineOver("Confirm creation of \"user\" license for username: \"" + name + "\", email: \"" + email + "\", Storage: \"" + storage + " GB\", User-GUID: \"" + guid + "\"? Y/n"); Console.WriteLine("Exiting...");
buff = Console.ReadLine(); return 0;
if ( buff == "" || buff == "y" || buff == "Y" ) }
{
GenerateUserLicense(new X509Certificate2(cert.Value(), "test"), coreDll.Value(), name, email, storage, guid, null); break;
} }
else case "org":
{ {
WriteLineOver("Exiting..."); Console.WriteLine("Confirm creation of \"organization\" license for business name: \"" + businessName + "\", username: \"" + name + "\", email: \"" + email + "\", Storage: \"" + storage + " GB\", Install-ID: \"" + installid + "\"? Y/n");
return 0; buff = Console.ReadLine();
} if (buff is "" or "y" or "Y")
} {
else if (licensetype == "org") GenerateOrgLicense(new X509Certificate2(Cert.Value(), "test"), CoreDll.Value(), name, email, storage, installid, businessName, null);
{ }
WriteLineOver("Confirm creation of \"organization\" license for business name: \"" + businessname + "\", username: \"" + name + "\", email: \"" + email + "\", Storage: \"" + storage + " GB\", Install-ID: \"" + installid + "\"? Y/n"); else
buff = Console.ReadLine(); {
if ( buff == "" || buff == "y" || buff == "Y" ) Console.WriteLine("Exiting...");
{ return 0;
GenerateOrgLicense(new X509Certificate2(cert.Value(), "test"), coreDll.Value(), name, email, storage, installid, businessname, null); }
}
else break;
{ }
WriteLineOver("Exiting..."); }
return 0;
} return 0;
} });
});
return 0; App.Command("user", config =>
}); {
}); CommandArgument name = config.Argument("Name", "your name");
CommandArgument email = config.Argument("Email", "your email");
app.Command("user", config => CommandArgument userIdArg = config.Argument("User ID", "your user id");
{ CommandArgument storage = config.Argument("Storage", "extra storage space in GB. Maximum is " + Int16.MaxValue + " (optional, default = max)");
var name = config.Argument("Name", "your name"); CommandArgument key = config.Argument("Key", "your key id (optional)");
var email = config.Argument("Email", "your email");
var userIdArg = config.Argument("User ID", "your user id"); config.OnExecute(() =>
var storage = config.Argument("Storage", "extra storage space in GB. Maximum is " + short.MaxValue + " (optional, default = max)"); {
var key = config.Argument("Key", "your key id (optional)"); Check();
var help = config.HelpOption("--help | -h | -?");
if (String.IsNullOrWhiteSpace(name.Value) || String.IsNullOrWhiteSpace(email.Value))
config.OnExecute(() => {
{ config.Error.WriteLine($"Some arguments are missing: Name='{name.Value}' Email='{email.Value}'");
if (!verifyTopOptions()) config.ShowHelp(true);
{ return 1;
if (!coreExists()) }
{
config.Error.WriteLine($"Cant find core dll at: {coreDll.Value()}"); if (String.IsNullOrWhiteSpace(userIdArg.Value) || !Guid.TryParse(userIdArg.Value, out Guid userId))
} {
if (!certExists()) config.Error.WriteLine("User ID not provided");
{ config.ShowHelp(true);
config.Error.WriteLine($"Cant find certificate at: {cert.Value()}"); return 1;
} }
config.ShowHelp(); Int16 storageShort = 0;
return 1; if (!String.IsNullOrWhiteSpace(storage.Value))
} {
else if (string.IsNullOrWhiteSpace(name.Value) || string.IsNullOrWhiteSpace(email.Value)) Double parsedStorage = Double.Parse(storage.Value);
{ if (parsedStorage is > Int16.MaxValue or < 0)
config.Error.WriteLine($"Some arguments are missing: Name='{name.Value}' Email='{email.Value}'"); {
config.ShowHelp("user"); config.Error.WriteLine("The storage value provided is outside the accepted range of [0-" + Int16.MaxValue + "]");
return 1; config.ShowHelp(true);
} return 1;
}
if (string.IsNullOrWhiteSpace(userIdArg.Value) || !Guid.TryParse(userIdArg.Value, out Guid userId)) storageShort = (Int16) parsedStorage;
{ }
config.Error.WriteLine($"User ID not provided");
config.ShowHelp("user"); GenerateUserLicense(new X509Certificate2(Cert.Value()!, "test"), CoreDll.Value(), name.Value, email.Value, storageShort, userId, key.Value);
return 1;
} return 0;
});
short storageShort = 0; });
if (!string.IsNullOrWhiteSpace(storage.Value)) App.Command("org", config =>
{ {
var parsedStorage = double.Parse(storage.Value); CommandArgument name = config.Argument("Name", "your name");
if (parsedStorage > short.MaxValue || parsedStorage < 0) CommandArgument email = config.Argument("Email", "your email");
{ CommandArgument installId = config.Argument("InstallId", "your installation id (GUID)");
config.Error.WriteLine("The storage value provided is outside the accepted range of [0-" + short.MaxValue + "]"); CommandArgument storage = config.Argument("Storage", "extra storage space in GB. Maximum is " + Int16.MaxValue + " (optional, default = max)");
config.ShowHelp("org"); CommandArgument businessName = config.Argument("BusinessName", "name for the organization (optional)");
return 1; CommandArgument key = config.Argument("Key", "your key id (optional)");
}
storageShort = (short) parsedStorage; config.OnExecute(() =>
} {
Check();
GenerateUserLicense(new X509Certificate2(cert.Value(), "test"), coreDll.Value(), name.Value, email.Value, storageShort, userId, key.Value);
if (String.IsNullOrWhiteSpace(name.Value) || String.IsNullOrWhiteSpace(email.Value) || String.IsNullOrWhiteSpace(installId.Value))
return 0; {
}); config.Error.WriteLine($"Some arguments are missing: Name='{name.Value}' Email='{email.Value}' InstallId='{installId.Value}'");
}); config.ShowHelp(true);
app.Command("org", config => return 1;
{ }
var name = config.Argument("Name", "your name");
var email = config.Argument("Email", "your email"); if (!Guid.TryParse(installId.Value, out Guid installationId))
var installId = config.Argument("InstallId", "your installation id (GUID)"); {
var storage = config.Argument("Storage", "extra storage space in GB. Maximum is " + short.MaxValue + " (optional, default = max)"); config.Error.WriteLine("Unable to parse your installation id as a GUID");
var businessName = config.Argument("BusinessName", "name for the organization (optional)"); config.Error.WriteLine($"Here's a new guid: {Guid.NewGuid()}");
var key = config.Argument("Key", "your key id (optional)"); config.ShowHelp(true);
var help = config.HelpOption("--help | -h | -?"); return 1;
}
config.OnExecute(() =>
{ Int16 storageShort = 0;
if (!verifyTopOptions()) if (!String.IsNullOrWhiteSpace(storage.Value))
{ {
if (!coreExists()) Double parsedStorage = Double.Parse(storage.Value);
{ if (parsedStorage is > Int16.MaxValue or < 0)
config.Error.WriteLine($"Cant find core dll at: {coreDll.Value()}"); {
} config.Error.WriteLine("The storage value provided is outside the accepted range of [0-" + Int16.MaxValue + "]");
if (!certExists()) config.ShowHelp(true);
{ return 1;
config.Error.WriteLine($"Cant find certificate at: {cert.Value()}"); }
} storageShort = (Int16)parsedStorage;
}
config.ShowHelp();
return 1; GenerateOrgLicense(new X509Certificate2(Cert.Value()!, "test"), CoreDll.Value(), name.Value, email.Value, storageShort, installationId, businessName.Value, key.Value);
}
else if (string.IsNullOrWhiteSpace(name.Value) || return 0;
string.IsNullOrWhiteSpace(email.Value) || });
string.IsNullOrWhiteSpace(installId.Value)) });
{
config.Error.WriteLine($"Some arguments are missing: Name='{name.Value}' Email='{email.Value}' InstallId='{installId.Value}'"); App.OnExecute(() =>
config.ShowHelp("org"); {
return 1; App.ShowHelp();
} return 10;
});
if (!Guid.TryParse(installId.Value, out Guid installationId))
{ try
config.Error.WriteLine("Unable to parse your installation id as a GUID"); {
config.Error.WriteLine($"Here's a new guid: {Guid.NewGuid()}"); App.HelpOption("-? | -h | --help");
config.ShowHelp("org"); return App.Execute(args);
return 1; }
} catch (Exception exception)
{
short storageShort = 0; Console.Error.WriteLine("Oops: {0}", exception);
if (!string.IsNullOrWhiteSpace(storage.Value)) return 100;
{ }
var parsedStorage = double.Parse(storage.Value); }
if (parsedStorage > short.MaxValue || parsedStorage < 0)
{ private static void Check()
config.Error.WriteLine("The storage value provided is outside the accepted range of [0-" + short.MaxValue + "]"); {
config.ShowHelp("org"); if (Cert == null || String.IsNullOrWhiteSpace(Cert.Value()))
return 1; {
} App.Error.WriteLine("No certificate specified");
storageShort = (short) parsedStorage; App.ShowHelp();
} Environment.Exit(1);
}
GenerateOrgLicense(new X509Certificate2(cert.Value(), "test"), coreDll.Value(), name.Value, email.Value, storageShort, installationId, businessName.Value, key.Value); else if (CoreDll == null || String.IsNullOrWhiteSpace(CoreDll.Value()))
{
return 0; App.Error.WriteLine("No core dll specified");
}); App.ShowHelp();
}); Environment.Exit(1);
}
app.OnExecute(() => else if (!File.Exists(Cert.Value()))
{ {
app.ShowHelp(); App.Error.WriteLine($"Can't find certificate at: {Cert.Value()}");
return 10; App.ShowHelp();
}); Environment.Exit(1);
}
app.HelpOption("-? | -h | --help"); else if (!File.Exists(CoreDll.Value()))
{
try App.Error.WriteLine($"Can't find core dll at: {CoreDll.Value()}");
{ App.ShowHelp();
return app.Execute(args); Environment.Exit(1);
} }
catch (Exception e) }
{
Console.Error.WriteLine("Oops: {0}", e); // checkUsername Checks that the username is a valid username
return 100; private static Boolean CheckUsername(String s)
} {
} // TODO: Actually validate
if (!String.IsNullOrWhiteSpace(s)) return true;
// checkUsername Checks that the username is a valid username
static bool checkUsername(string s) Console.WriteLine("The username provided doesn't appear to be valid!");
{ return false;
if ( string.IsNullOrWhiteSpace(s) ) { }
WriteLineOver("The username provided doesn't appear to be valid.\n");
return false; // checkBusinessName Checks that the Business Name is a valid username
} private static Boolean CheckBusinessName(String s)
return true; // TODO: Actually validate {
} // TODO: Actually validate
if (!String.IsNullOrWhiteSpace(s)) return true;
// checkBusinessName Checks that the Business Name is a valid username
static bool checkBusinessName(string s) Console.WriteLine("The Business Name provided doesn't appear to be valid!");
{ return false;
if ( string.IsNullOrWhiteSpace(s) ) { }
WriteLineOver("The Business Name provided doesn't appear to be valid.\n");
return false; // checkEmail Checks that the email address is a valid email address
} private static Boolean CheckEmail(String s)
return true; // TODO: Actually validate {
} // TODO: Actually validate
if (!String.IsNullOrWhiteSpace(s)) return true;
// checkEmail Checks that the email address is a valid email address
static bool checkEmail(string s) Console.WriteLine("The email provided doesn't appear to be valid!");
{ return false;
if ( string.IsNullOrWhiteSpace(s) ) { }
WriteLineOver("The email provided doesn't appear to be valid.\n");
return false; // checkStorage Checks that the storage is in a valid range
} private static Boolean CheckStorage(String s)
return true; // TODO: Actually validate {
} if (String.IsNullOrWhiteSpace(s))
{
// checkStorage Checks that the storage is in a valid range Console.WriteLine("The storage provided doesn't appear to be valid!");
static bool checkStorage(string s) return false;
{ }
if (string.IsNullOrWhiteSpace(s))
{ if (!(Double.Parse(s) > Int16.MaxValue) && !(Double.Parse(s) < 0)) return true;
WriteLineOver("The storage provided doesn't appear to be valid.\n");
return false; Console.WriteLine("The storage value provided is outside the accepted range of [0-" + Int16.MaxValue + "]!");
} return false;
if (double.Parse(s) > short.MaxValue || double.Parse(s) < 0) }
{
WriteLineOver("The storage value provided is outside the accepted range of [0-" + short.MaxValue + "].\n"); private static readonly JsonSerializerOptions JsonOptions = new() { WriteIndented = true };
return false; private static void GenerateUserLicense(X509Certificate2 cert, String corePath, String userName, String email, Int16 storage, Guid userId, String key)
} {
return true; Assembly core = AssemblyLoadContext.Default.LoadFromAssemblyPath(Path.GetFullPath(corePath));
}
Type type = core.GetType("Bit.Core.Billing.Models.Business.UserLicense");
// WriteLineOver Writes a new line to console over last line. Type licenseTypeEnum = core.GetType("Bit.Core.Enums.LicenseType");
static void WriteLineOver(string s)
{ if (type == null)
Console.SetCursorPosition(0, Console.CursorTop -1); {
Console.WriteLine(s); Console.WriteLine("Could not find type!");
} return;
}
// WriteLine This wrapper is just here so that console writes all look similar. if (licenseTypeEnum == null)
static void WriteLine(string s) {
{ Console.WriteLine("Could not find license licenseTypeEnum!");
Console.WriteLine(s); return;
} }
static void GenerateUserLicense(X509Certificate2 cert, string corePath, string userName, string email, short storage, Guid userId, string key) Object license = Activator.CreateInstance(type);
{
var core = AssemblyLoadContext.Default.LoadFromAssemblyPath(corePath); MethodInfo computeHash = type.GetMethod("ComputeHash");
if (computeHash == null)
var type = core.GetType("Bit.Core.Models.Business.UserLicense"); {
var licenseTypeEnum = core.GetType("Bit.Core.Enums.LicenseType"); Console.WriteLine("Could not find ComputeHash!");
return;
var license = Activator.CreateInstance(type); }
void set(string name, object value) MethodInfo sign = type.GetMethod("Sign");
{ if (sign == null)
type.GetProperty(name).SetValue(license, value); {
} Console.WriteLine("Could not find sign!");
return;
set("LicenseKey", string.IsNullOrWhiteSpace(key) ? Guid.NewGuid().ToString("n") : key); }
set("Id", userId);
set("Name", userName); Set(type, license, "LicenseKey", String.IsNullOrWhiteSpace(key) ? Guid.NewGuid().ToString("n") : key);
set("Email", email); Set(type, license, "Id", userId);
set("Premium", true); Set(type, license, "Name", userName);
set("MaxStorageGb", storage == 0 ? short.MaxValue : storage); Set(type, license, "Email", email);
set("Version", 1); Set(type, license, "Premium", true);
set("Issued", DateTime.UtcNow); Set(type, license, "MaxStorageGb", storage == 0 ? Int16.MaxValue : storage);
set("Refresh", DateTime.UtcNow.AddYears(100).AddMonths(-1)); Set(type, license, "Version", 1);
set("Expires", DateTime.UtcNow.AddYears(100)); Set(type, license, "Issued", DateTime.UtcNow);
set("Trial", false); Set(type, license, "Refresh", DateTime.UtcNow.AddYears(100).AddMonths(-1));
set("LicenseType", Enum.Parse(licenseTypeEnum, "User")); Set(type, license, "Expires", DateTime.UtcNow.AddYears(100));
Set(type, license, "Trial", false);
set("Hash", Convert.ToBase64String((byte[])type.GetMethod("ComputeHash").Invoke(license, new object[0]))); Set(type, license, "LicenseType", Enum.Parse(licenseTypeEnum, "User"));
set("Signature", Convert.ToBase64String((byte[])type.GetMethod("Sign").Invoke(license, new object[] { cert }))); Set(type, license, "Hash", Convert.ToBase64String(((Byte[])computeHash.Invoke(license, []))!));
Set(type, license, "Signature", Convert.ToBase64String((Byte[])sign.Invoke(license, [cert])!));
Console.WriteLine(JsonConvert.SerializeObject(license, Formatting.Indented));
} Console.WriteLine(JsonSerializer.Serialize(license, JsonOptions));
}
static void GenerateOrgLicense(X509Certificate2 cert, string corePath, string userName, string email, short storage, Guid instalId, string businessName, string key) private static void GenerateOrgLicense(X509Certificate2 cert, String corePath, String userName, String email, Int16 storage, Guid instalId, String businessName, String key)
{ {
var core = AssemblyLoadContext.Default.LoadFromAssemblyPath(corePath); Assembly core = AssemblyLoadContext.Default.LoadFromAssemblyPath(Path.GetFullPath(corePath));
Type type = core.GetType("Bit.Core.Billing.Organizations.Models.OrganizationLicense");
var type = core.GetType("Bit.Core.Models.Business.OrganizationLicense"); Type licenseTypeEnum = core.GetType("Bit.Core.Enums.LicenseType");
var licenseTypeEnum = core.GetType("Bit.Core.Enums.LicenseType"); Type planTypeEnum = core.GetType("Bit.Core.Billing.Enums.PlanType");
var planTypeEnum = core.GetType("Bit.Core.Enums.PlanType");
if (type == null)
var license = Activator.CreateInstance(type); {
Console.WriteLine("Could not find type!");
void set(string name, object value) return;
{ }
type.GetProperty(name).SetValue(license, value); if (licenseTypeEnum == null)
} {
Console.WriteLine("Could not find licenseTypeEnum!");
set("LicenseKey", string.IsNullOrWhiteSpace(key) ? Guid.NewGuid().ToString("n") : key); return;
set("InstallationId", instalId); }
set("Id", Guid.NewGuid()); if (planTypeEnum == null)
set("Name", userName); {
set("BillingEmail", email); Console.WriteLine("Could not find planTypeEnum!");
set("BusinessName", string.IsNullOrWhiteSpace(businessName) ? "BitBetter" : businessName); return;
set("Enabled", true); }
set("Plan", "Custom");
set("PlanType", Enum.Parse(planTypeEnum, "Custom")); Object license = Activator.CreateInstance(type);
set("Seats", (int)short.MaxValue);
set("MaxCollections", short.MaxValue); MethodInfo computeHash = type.GetMethod("ComputeHash");
set("UsePolicies", true); if (computeHash == null)
set("UseSso", true); {
set("UseKeyConnector", true); Console.WriteLine("Could not find ComputeHash!");
//set("UseScim", true); // available in version 10, which is not released yet return;
set("UseGroups", true); }
set("UseEvents", true);
set("UseDirectory", true); MethodInfo sign = type.GetMethod("Sign");
set("UseTotp", true); if (sign == null)
set("Use2fa", true); {
set("UseApi", true); Console.WriteLine("Could not find sign!");
set("UseResetPassword", true); return;
set("MaxStorageGb", storage == 0 ? short.MaxValue : storage); }
set("SelfHost", true);
set("UsersGetPremium", true); Set(type, license, "LicenseKey", String.IsNullOrWhiteSpace(key) ? Guid.NewGuid().ToString("n") : key);
set("Version", 9); Set(type, license, "InstallationId", instalId);
set("Issued", DateTime.UtcNow); Set(type, license, "Id", Guid.NewGuid());
set("Refresh", DateTime.UtcNow.AddYears(100).AddMonths(-1)); Set(type, license, "Name", userName);
set("Expires", DateTime.UtcNow.AddYears(100)); Set(type, license, "BillingEmail", email);
set("Trial", false); Set(type, license, "BusinessName", String.IsNullOrWhiteSpace(businessName) ? "BitBetter" : businessName);
set("LicenseType", Enum.Parse(licenseTypeEnum, "Organization")); Set(type, license, "Enabled", true);
Set(type, license, "Plan", "Enterprise (Annually)");
set("Hash", Convert.ToBase64String((byte[])type.GetMethod("ComputeHash").Invoke(license, new object[0]))); Set(type, license, "PlanType", Enum.Parse(planTypeEnum, "EnterpriseAnnually"));
set("Signature", Convert.ToBase64String((byte[])type.GetMethod("Sign").Invoke(license, new object[] { cert }))); Set(type, license, "Seats", Int32.MaxValue);
Set(type, license, "MaxCollections", Int16.MaxValue);
Console.WriteLine(JsonConvert.SerializeObject(license, Formatting.Indented)); Set(type, license, "UsePolicies", true);
} Set(type, license, "UseSso", true);
} Set(type, license, "UseKeyConnector", true);
} Set(type, license, "UseScim", true);
Set(type, license, "UseGroups", true);
Set(type, license, "UseEvents", true);
Set(type, license, "UseDirectory", true);
Set(type, license, "UseTotp", true);
Set(type, license, "Use2fa", true);
Set(type, license, "UseApi", true);
Set(type, license, "UseResetPassword", true);
Set(type, license, "MaxStorageGb", storage == 0 ? Int16.MaxValue : storage);
Set(type, license, "SelfHost", true);
Set(type, license, "UsersGetPremium", true);
Set(type, license, "UseCustomPermissions", true);
Set(type, license, "Version", 16);
Set(type, license, "Issued", DateTime.UtcNow);
Set(type, license, "Refresh", DateTime.UtcNow.AddYears(100).AddMonths(-1));
Set(type, license, "Expires", DateTime.UtcNow.AddYears(100));
Set(type, license, "ExpirationWithoutGracePeriod", DateTime.UtcNow.AddYears(100));
Set(type, license, "UsePasswordManager", true);
Set(type, license, "UseSecretsManager", true);
Set(type, license, "SmSeats", Int32.MaxValue);
Set(type, license, "SmServiceAccounts", Int32.MaxValue);
Set(type, license, "UseRiskInsights", true);
Set(type, license, "LimitCollectionCreationDeletion", true);
Set(type, license, "AllowAdminAccessToAllCollectionItems", true);
Set(type, license, "Trial", false);
Set(type, license, "LicenseType", Enum.Parse(licenseTypeEnum, "Organization"));
Set(type, license, "UseOrganizationDomains", true);
Set(type, license, "UseAdminSponsoredFamilies", true);
Set(type, license, "Hash", Convert.ToBase64String((Byte[])computeHash.Invoke(license, [])!));
Set(type, license, "Signature", Convert.ToBase64String((Byte[])sign.Invoke(license, [cert])!));
Console.WriteLine(JsonSerializer.Serialize(license, JsonOptions));
}
private static void Set(Type type, Object license, String name, Object value)
{
type.GetProperty(name)?.SetValue(license, value);
}
}

View File

@@ -1,6 +0,0 @@
#!/bin/sh
DIR=`dirname "$0"`
DIR=`exec 2>/dev/null;(cd -- "$DIR") && cd -- "$DIR"|| cd "$DIR"; unset PWD; /usr/bin/pwd || /bin/pwd || pwd`
docker build -t bitbetter/licensegen "$DIR" # --squash

View File

@@ -1,14 +1,10 @@
<Project Sdk="Microsoft.NET.Sdk"> <Project Sdk="Microsoft.NET.Sdk">
<PropertyGroup> <PropertyGroup>
<OutputType>Exe</OutputType> <OutputType>Exe</OutputType>
<TargetFramework>netcoreapp6.0</TargetFramework> <TargetFramework>net8.0</TargetFramework>
</PropertyGroup> </PropertyGroup>
<ItemGroup> <ItemGroup>
<PackageReference Include="Microsoft.Extensions.CommandLineUtils" Version="1.1.1" /> <PackageReference Include="McMaster.Extensions.CommandLineUtils" Version="4.1.1" />
<PackageReference Include="Newtonsoft.Json" Version="13.0.1" />
<PackageReference Include="System.Runtime.Loader" Version="4.3.0" /> <PackageReference Include="System.Runtime.Loader" Version="4.3.0" />
</ItemGroup> </ItemGroup>
</Project>
</Project>

View File

@@ -1,26 +0,0 @@
#!/bin/sh
DIR=`dirname "$0"`
DIR=`exec 2>/dev/null;(cd -- "$DIR") && cd -- "$DIR"|| cd "$DIR"; unset PWD; /usr/bin/pwd || /bin/pwd || pwd`
# Grab the absolute path to the default pfx location
cert_path="$DIR/../../.keys/cert.pfx"
if [ "$#" -lt "2" ]; then
echo "USAGE: $0 <ABSOLUTE PATH TO CERT.PFX> <License Gen action> [License Gen args...]"
echo "ACTIONS:"
echo " interactive"
echo " user"
echo " org"
exit 1
fi
cert_path="$1"
action="$2"
shift
if [ $action = "interactive" ]; then
docker run -it --rm -v "$cert_path:/cert.pfx" bitbetter/licensegen "$@"
else
docker run --rm -v "$cert_path:/cert.pfx" bitbetter/licensegen "$@"
fi

View File

@@ -1,85 +0,0 @@
#!/bin/bash
ask () {
local __resultVar=$1
local __result="$2"
if [ -z "$2" ]; then
read -p "$3" __result
fi
eval $__resultVar="'$__result'"
}
SCRIPT_BASE="$( cd "$( dirname "${BASH_SOURCE[0]}" )" >/dev/null 2>&1 && pwd )"
BW_VERSION=$(curl -sL https://go.btwrdn.co/bw-sh-versions | grep '^ *"'coreVersion'":' | awk -F\: '{ print $2 }' | sed -e 's/,$//' -e 's/^"//' -e 's/"$//')
echo "Starting Bitwarden update, newest server version: $BW_VERSION"
# Default path is the parent directory of the BitBetter location
BITWARDEN_BASE="$( cd "$( dirname "${BASH_SOURCE[0]}" )/.." >/dev/null 2>&1 && pwd )"
# Get Bitwarden base from user (or keep default value) or use first argument
ask tmpbase "$1" "Enter Bitwarden base directory [$BITWARDEN_BASE]: "
BITWARDEN_BASE=${tmpbase:-$BITWARDEN_BASE}
# Check if directory exists and is valid
[ -d "$BITWARDEN_BASE" ] || { echo "Bitwarden base directory $BITWARDEN_BASE not found!"; exit 1; }
[ -f "$BITWARDEN_BASE/bitwarden.sh" ] || { echo "Bitwarden base directory $BITWARDEN_BASE is not valid!"; exit 1; }
# Check if user wants to recreate the docker-compose override file
RECREATE_OV="y"
ask tmprecreate "$2" "Rebuild docker-compose override? [Y/n]: "
RECREATE_OV=${tmprecreate:-$RECREATE_OV}
if [[ $RECREATE_OV =~ ^[Yy]$ ]]
then
{
echo "version: '3'"
echo ""
echo "services:"
echo " api:"
echo " image: bitbetter/api:$BW_VERSION"
echo ""
echo " identity:"
echo " image: bitbetter/identity:$BW_VERSION"
echo ""
} > $BITWARDEN_BASE/bwdata/docker/docker-compose.override.yml
echo "BitBetter docker-compose override created!"
else
echo "Make sure to check if the docker override contains the correct image version ($BW_VERSION) in $BITWARDEN_BASE/bwdata/docker/docker-compose.override.yml!"
fi
# Check if user wants to rebuild the bitbetter images
docker images bitbetter/api --format="{{ .Tag }}" | grep -F -- "${BW_VERSION}" > /dev/null
retval=$?
REBUILD_BB="n"
REBUILD_BB_DESCR="[y/N]"
if [ $retval -ne 0 ]; then
REBUILD_BB="y"
REBUILD_BB_DESCR="[Y/n]"
fi
ask tmprebuild "$3" "Rebuild BitBetter images? $REBUILD_BB_DESCR: "
REBUILD_BB=${tmprebuild:-$REBUILD_BB}
if [[ $REBUILD_BB =~ ^[Yy]$ ]]
then
$SCRIPT_BASE/build.sh
echo "BitBetter images updated to version: $BW_VERSION"
fi
# Now start the bitwarden update
cd $BITWARDEN_BASE
./bitwarden.sh updateself
# Update the bitwarden.sh: automatically patch run.sh to fix docker-compose pull errors for private images
awk '1;/function downloadRunFile/{c=6}c&&!--c{print "sed -i '\''s/dccmd pull/dccmd pull --ignore-pull-failures || true/g'\'' $SCRIPTS_DIR/run.sh"}' $BITWARDEN_BASE/bitwarden.sh > tmp_bw.sh && mv tmp_bw.sh $BITWARDEN_BASE/bitwarden.sh
chmod +x $BITWARDEN_BASE/bitwarden.sh
echo "Patching bitwarden.sh completed..."
./bitwarden.sh update
# Prune Docker images without at least one container associated to them.
echo "Pruning Docker images without at least one container associated to them..."
docker image prune -a
cd $SCRIPT_BASE
echo "Bitwarden update completed!"