Compare commits

..

13 Commits

Author SHA1 Message Date
Michiel Hazelhof
389be8cea8 Unified work (#269)
* Some work on line endings

* Enable buildkit

* Update documentation

* Settle the newline and tab vs spaces for now

Not perfect, but it's a standard

* Change wording

* Update version memo

* Add correct definition for markdown

* Make things clearer
2025-12-09 21:13:35 +01:00
Jackson K
f6d7470ce8 Update container name/links of Bitwarden Unified to Bitwarden Lite (#265)
* Rename Containers from bitwarden/self-host:beta to bitwarden/lite:beta

* Edit README to reflect rename

* Change build.ps1 and Dockerfile-bitwarden-patched to CRLF

* Remove .DS_Store file, and add to .gitignore

* Actually remove .DS_Store

* Make all ps1 files CRLF in .gitattributes & Make Dockerfiles LF.

* Change from beta tag to latest
2025-12-08 23:08:28 +01:00
Michiel Hazelhof
9bc010cb57 Update and fix unified branch (#257)
* Upstream patches

* Fix license generator according to upstream changes (#245) (#249)

* Test generating user and organization licenses during build check (#252)

* Fix ps1 script and update language

* Update class path

* Cleanup code

* Cleanup code

* Cleanup code

* Refactor and fixes

* Copy all files

* Copy files only when needed

* Make call consistent

* Simplify call

* Clarify language

* Reuse code

* Cleanup

* Cleanup

* Remove NewtonSoft.Json

* Upgrade dnlib

* Cleanup

* Fix path issue

* Fix comparator

* Cleanup circleci

* Fix type

* Fix circleci

* Properly detect previous version

* Add missing parameter

* Better detect running patched containers

* Improve naming

* Fix line endings

* Fix typo

* Add comment

* Fix tabs

* Cleanup org license

* Use proper file extension

* Add missing file

* Migrate cert.cert if exists

* Check for the correct file

* Fix character check

* Add comment

* Add more documentation

* Add proper line endings

* Add potentially correct line

* Add auto restart

* Update comment

* Improve consistency between bash and powerhell

* Update documentation

* Detect buildx

* Fix spelling mistake

* Fix check order and improve verbosity
2025-10-05 19:40:16 +01:00
juliokele
29add24126 licenseGen: fix OrganizationLicense namespace (#253)
Co-authored-by: juliokele <>
2025-08-03 18:11:30 +02:00
Joseph Gigantino
3689cc5ba1 Test generating user and organization licenses during build check (#251)
Add commands to build check to test if the created licensegen image can actually generate user and organization licenses. licenseGen.sh will print the generated license to stdout and return zero if successful. If an error occurs, a non zero error code is returned which should cause a build error.
2025-07-30 19:51:51 +02:00
Joseph Gigantino
34da077778 Update Program.cs (#241)
Remove duplicate instances of:
Set("UseRiskInsights", true);
Set("UseOrganizationDomains", true);     Set("UseAdminSponsoredFamilies", true);

Signed-off-by: Joseph Gigantino <128943406+Jgigantino31@users.noreply.github.com>
Co-authored-by: h44z <christoph.h@sprinternet.at>
2025-07-29 19:54:54 +02:00
juliokele
a3803cb3bc [unified] Fix licenseGen according to upstream changes (#247)
* Dockerfile: remove not existing executable argument

* licenseGen: fix classes according to upstream changes

---------

Co-authored-by: juliokele <>
2025-07-29 19:49:52 +02:00
juliokele
01cdfa2842 [unified] Fix patch according to upstream changes and fix build errors (#243)
* Fix bitbetter patch according to upstream changes

* Fix the builds by removing redundant already removed and stopped old instance

---------

Co-authored-by: juliokele <>
2025-07-29 19:48:55 +02:00
Michiel Hazelhof
076b0a624b Upstream patches (#240) 2025-07-15 10:00:09 +01:00
Joseph Gigantino
3d4c10d6f6 Update Program.cs (#236)
Set three new license options to true: UseRiskInsights, UseOrganizationDomains, and UseAdminSponsoredFamilies.

As mentioned in #229, licenses had to be regenerated starting in 2025.5.0. It looks like new options were added which default to false unless we set them to true here. I am not sure if the version needs to be bumped or not. I tested locally and I can now access the Claimed Domains page in my organization.

Signed-off-by: Joseph Gigantino <128943406+Jgigantino31@users.noreply.github.com>
2025-06-25 12:40:00 +00:00
Joseph Gigantino
1597800b89 Update serverlist.txt so that by default all lines are comments (#228) 2025-06-25 12:34:10 +00:00
juliokele
02740e84b6 build.sh: fix line endings in serverlist.txt before executing commands (#232)
Co-authored-by: Gyula Kelemen <kgydevelopement@gmail.com>
2025-06-10 20:47:53 +02:00
Joseph Gigantino
d71aa84e52 Update Unified branch to account for move from Docker Hub to GHCR (#227)
* Update build.sh to reflect move to GHCR

* Update build.ps1 to reflect move to GHCR

* Update README.md to reflect move to GHCR

* Update Dockerfile-bitwarden-patch to reflect move to GHCR
2025-03-29 17:15:16 +00:00
19 changed files with 910 additions and 749 deletions

View File

@@ -1,15 +1,21 @@
version: 2.1 version: 2.1
jobs: jobs:
build: build:
machine: true machine: true
steps: steps:
- checkout - checkout
- run: - run:
name: Print the Current Time name: Print the Current Time
command: date command: date
- run: - run:
name: Generate Keys name: Generate Keys
command: ./generateKeys.sh command: ./generateKeys.sh
- run: - run:
name: Build script name: Build script
command: ./build.sh y command: ./build.sh update
- run:
name: Test generating user license
command: ./licenseGen.sh user TestName TestEmail@example.com 4a619d4a-522d-4c70-8596-affb5b607c23
- run:
name: Test generating organization license
command: ./licenseGen.sh org TestName TestEmail@example.com 4a619d4a-522d-4c70-8596-affb5b607c23

19
.editorconfig Normal file
View File

@@ -0,0 +1,19 @@
root=true
###############################
# Core EditorConfig Options #
###############################
# All files
[*]
indent_style=tab
indent_size=4
trim_trailing_whitespace=true
end_of_line=lf
charset=utf-8
[*.{cs}]
insert_final_newline=false
[*.{md,mkdn}]
trim_trailing_whitespace = true
indent_style = space

1
.gitattributes vendored Normal file
View File

@@ -0,0 +1 @@
* text eol=lf

3
.gitignore vendored
View File

@@ -7,5 +7,6 @@ src/bitBetter/.vs/*
*.pem *.pem
.vscode/ .vscode/
*.pfx *.pfx
*.cert *.cer
*.vsidx *.vsidx
.DS_Store

View File

@@ -1,3 +1,4 @@
docker run -d --name bitwarden -v <full-local-path>\logs:/var/log/bitwarden -v <full-local-path>\bwdata:/etc/bitwarden -p 80:8080 --env-file <full-local-path>\settings.env bitwarden-patch # Uncomment a line below and fill in the missing values or add your own. Every line in this file will be called by build.[sh|ps1] once the patched image is built.
<OR> # docker run -d --name bitwarden --restart=always -v <full-local-path>\logs:/var/log/bitwarden -v <full-local-path>\bwdata:/etc/bitwarden -p 80:8080 --env-file <full-local-path>\settings.env bitwarden-patched
docker-compose -f <full-local-path>/docker-compose.yml up -d # <OR>
# docker-compose -f <full-local-path>/docker-compose.yml up -d

View File

@@ -1,12 +1,14 @@
# BitBetter # BitBetter lite
BitBetter is is a tool to modify Bitwarden's core dll to allow you to generate your own individual and organisation licenses. BitBetter is is a tool to modify Bitwarden's core dll to allow you to generate your own individual and organisation licenses.
Please see the FAQ below for details on why this software was created. Please see the FAQ below for details on why this software was created.
_Beware! BitBetter does some semi janky stuff to rewrite the bitwarden core dll and allow the installation of a self signed certificate. Use at your own risk!_ Be aware that this branch is **only** for the lite (formerly unified) version of bitwarden. It has been rewritten and works in different ways than the master branch.
Credit to https://github.com/h44z/BitBetter and https://github.com/jakeswenson/BitBetter _Beware! BitBetter is a solution that generates a personal certificate and uses that to generate custom licences. This requires (automated) modifying of libraries. Use at your own risk!_
Credit to https://github.com/h44z/BitBetter and https://github.com/jakeswenson/BitBetter and https://github.com/GieltjE/BitBetter
# Table of Contents # Table of Contents
- [BitBetter](#bitbetter) - [BitBetter](#bitbetter)
@@ -30,7 +32,7 @@ The following instructions are for unix-based systems (Linux, BSD, macOS) and Wi
## Dependencies ## Dependencies
Aside from docker, which you also need for Bitwarden, BitBetter requires the following: Aside from docker, which you also need for Bitwarden, BitBetter requires the following:
* Bitwarden (tested with 1.47.1, might work on lower versions) * Bitwarden (tested with 2025.11.1 might work on lower versions), for safety always stay up to date
* openssl (probably already installed on most Linux or WSL systems, any version should work, on Windows it will be auto installed using winget) * openssl (probably already installed on most Linux or WSL systems, any version should work, on Windows it will be auto installed using winget)
## Setting up BitBetter ## Setting up BitBetter
@@ -46,8 +48,8 @@ If you wish to generate your self-signed cert & key manually, you can run the fo
```bash ```bash
cd .keys cd .keys
openssl req -x509 -newkey rsa:4096 -keyout key.pem -out cert.cert -days 36500 -outform DER -passout pass:test openssl req -x509 -newkey rsa:4096 -keyout key.pem -out cert.cer -days 36500 -outform DER -passout pass:test
openssl x509 -inform DER -in cert.cert -out cert.pem openssl x509 -inform DER -in cert.cer -out cert.pem
openssl pkcs12 -export -out cert.pfx -inkey key.pem -in cert.pem -passin pass:test -passout pass:test openssl pkcs12 -export -out cert.pfx -inkey key.pem -in cert.pem -passin pass:test -passout pass:test
``` ```
@@ -63,14 +65,14 @@ The scripts supports running and patching multi instances.
Edit the .servers/serverlist.txt file and fill in the missing values, they can be replaced with existing installation values. Edit the .servers/serverlist.txt file and fill in the missing values, they can be replaced with existing installation values.
This file may be empty, but there will be no containers will be spun up automatically. This file may be empty, but there will be no containers will be spun up automatically.
Now it is time to **run the main build script** to generate a modified version of the `bitwarden/self-host` docker image and the license generator. Now it is time to **run the main build script** to generate a modified version of the `ghcr.io/bitwarden/lite` docker image and the license generator.
From the BitBetter directory, simply run: From the BitBetter directory, simply run:
``` ```
./build.[sh|ps1] ./build.[sh|ps1]
``` ```
This will create a new self-signed certificate in the `.keys` directory if one does not already exist and then create a modified version of the official `bitwarden/self-host` image called `bitwarden-patch`. This will create a new self-signed certificate in the `.keys` directory if one does not already exist and then create a modified version of the official `ghcr.io/bitwarden/lite` image called `bitwarden-patched`.
Afterwards it will automatically generate the license generator and start all previously specified containers which are **now ready to accept self-issued licenses.** Afterwards it will automatically generate the license generator and start all previously specified containers which are **now ready to accept self-issued licenses.**
@@ -98,6 +100,36 @@ If you ran the build script, you can **simply run the license gen in interactive
**The license generator will spit out a JSON-formatted license which can then be used within the Bitwarden web front-end to license your user or org!** **The license generator will spit out a JSON-formatted license which can then be used within the Bitwarden web front-end to license your user or org!**
## Migrating from mssql to a real database
Prepare a new database and bwdata directory, download and prepare the new settings.env (https://raw.githubusercontent.com/bitwarden/self-host/refs/heads/main/bitwarden-lite/settings.env)
Make sure you can get the data from either the backup file or by connecting directly to the mssql database (navicat has a trial).
If required (e.g. you cannot connect to your docker mssql server directly) download Microsoft SQL Server 2022 and SQL Server Management Studio (the latter can be used to import the .bak file)
After cloning this repo and modifying .servers/serverlist.txt to suit your new environment do the following:
```
docker exec -i bitwarden-mssql /backup-db.sh
./bitwarden.sh stop
```
Run build.sh and ensure your new instance serves a webpage AND has populated the new database with the tables (should be empty now)
Proceed to stop the new container for now.
Copy from the old to the new bwdata directory (do not copy/overwrite identity.pfx!):
- bwdata/core/licenses to bwdata-new/licenses
- bwdata/core/aspnet-dataprotection to bwdata-new/data-protection
- bwdata/core/attachments to bwdata-new/attachments
Export data only from the old sql server database, if needed import the .bak file to a local mssql instance.
Only export tables that have rows, makes it much quicker, .json is the easiest with navicat.
Import the rows to the real database, start the new docker container.
--- ---
# FAQ: Questions you might have. # FAQ: Questions you might have.
@@ -114,6 +146,26 @@ In the past we have done so but they were not focused on the type of customer th
UPDATE: Bitwarden now offers a cheap license called [Families Organization](https://bitwarden.com/pricing/) that provides premium features and the ability to self-host Bitwarden for six persons. UPDATE: Bitwarden now offers a cheap license called [Families Organization](https://bitwarden.com/pricing/) that provides premium features and the ability to self-host Bitwarden for six persons.
## 2fa doesn't work
Unfortunately the new BitWarden container doesn't set the timezone and ignores TZ= from the environment, can be fixed by:
```
docker exec bitwarden ln -s /usr/share/zoneinfo/Europe/Amsterdam /etc/localtime
```
## Changes in settings.env
Require a recreation of the docker container, build.sh will suffice too.
## Migrating from the old unified branch
```
git branch -m unified lite
git fetch origin
git branch -u origin/lite lite
git remote set-head origin -a
```
# Footnotes # Footnotes

236
build.ps1
View File

@@ -1,104 +1,132 @@
# define temporary directory $ErrorActionPreference = 'Stop'
$tempdirectory = "$pwd\temp" $PSNativeCommandUseErrorActionPreference = $true
# define services to patch
$components = "Api","Identity" # detect buildx, ErrorActionPreference will ensure the script stops execution if not found
docker buildx version
# delete old directories / files if applicable
if (Test-Path "$tempdirectory") { # Enable BuildKit for better build experience and to ensure platform args are populated
Remove-Item "$tempdirectory" -Recurse -Force $env:DOCKER_BUILDKIT=1
} $env:COMPOSE_DOCKER_CLI_BUILD=1
if (Test-Path -Path "$pwd\src\licenseGen\Core.dll" -PathType Leaf) { # define temporary directory
Remove-Item "$pwd\src\licenseGen\Core.dll" -Force $tempdirectory = "$pwd\temp"
} # define services to patch
$components = "Api","Identity"
if (Test-Path -Path "$pwd\src\licenseGen\cert.pfx" -PathType Leaf) {
Remove-Item "$pwd\src\licenseGen\cert.pfx" -Force # delete old directories / files if applicable
} if (Test-Path "$tempdirectory" -PathType Container) {
Remove-Item "$tempdirectory" -Recurse -Force
if (Test-Path -Path "$pwd\src\bitBetter\cert.cert" -PathType Leaf) { }
Remove-Item "$pwd\src\bitBetter\cert.cert" -Force
} if (Test-Path -Path "$pwd\src\licenseGen\Core.dll" -PathType Leaf) {
Remove-Item "$pwd\src\licenseGen\Core.dll" -Force
# generate keys if none are available }
if (!(Test-Path "$pwd\.keys")) {
.\generateKeys.ps1 if (Test-Path -Path "$pwd\src\licenseGen\cert.pfx" -PathType Leaf) {
} Remove-Item "$pwd\src\licenseGen\cert.pfx" -Force
}
# copy the key to bitBetter and licenseGen
Copy-Item "$pwd\.keys\cert.cert" -Destination "$pwd\src\bitBetter" if (Test-Path -Path "$pwd\src\bitBetter\cert.cer" -PathType Leaf) {
Copy-Item "$pwd\.keys\cert.pfx" -Destination "$pwd\src\licenseGen" Remove-Item "$pwd\src\bitBetter\cert.cer" -Force
}
# build bitBetter and clean the source directory after
docker build -t bitbetter/bitbetter "$pwd\src\bitBetter" if (Test-Path "$pwd\.keys\cert.cert" -PathType Leaf) {
Remove-Item "$pwd\src\bitBetter\cert.cert" -Force Rename-Item -Path "$pwd\.keys\cert.cert" -NewName "$pwd\.keys\cert.cer"
}
# gather all running instances
$oldinstances = docker container ps --all -f Name=bitwarden --format '{{.ID}}' # generate keys if none are available
if (!(Test-Path "$pwd\.keys" -PathType Container)) {
# stop all running instances .\generateKeys.ps1
foreach ($instance in $oldinstances) { }
docker stop $instance
docker rm $instance # copy the key to bitBetter
} Copy-Item "$pwd\.keys\cert.cer" -Destination "$pwd\src\bitBetter"
# update bitwarden itself # build bitBetter and clean the source directory after
if ($args[0] -eq 'y') docker build --no-cache -t bitbetter/bitbetter "$pwd\src\bitBetter"
{ Remove-Item "$pwd\src\bitBetter\cert.cer" -Force
docker pull bitwarden/self-host:beta
} # gather all running instances, cannot run a wildcard filter on Ancestor= :(, does find all where name = *bitwarden*
else $oldinstances = docker container ps --all -f Name=bitwarden --format '{{.ID}}'
{
$confirmation = Read-Host "Update (or get) bitwarden source container" # stop and remove all running instances
if ($confirmation -eq 'y') { foreach ($instance in $oldinstances) {
docker pull bitwarden/self-host:beta docker stop $instance
} docker rm $instance
} }
# stop and remove previous existing patch(ed) container # update bitwarden itself
docker stop bitwarden-patch if ($args[0] -eq 'update') {
docker rm bitwarden-patch docker pull ghcr.io/bitwarden/lite:latest
docker image rm bitwarden-patch } else {
$confirmation = Read-Host "Update (or get) bitwarden source container (y/n)"
# start a new bitwarden instance so we can patch it if ($confirmation -eq 'y') {
$patchinstance = docker run -d --name bitwarden-patch bitwarden/self-host:beta docker pull ghcr.io/bitwarden/lite:latest
}
# create our temporary directory }
New-item -ItemType Directory -Path $tempdirectory
# stop and remove previous existing patch(ed) container
# extract the files that need to be patched from the services that need to be patched into our temporary directory $oldinstances = docker container ps --all -f Ancestor=bitwarden-patched --format '{{.ID}}'
foreach ($component in $components) { foreach ($instance in $oldinstances) {
New-item -itemtype Directory -path "$tempdirectory\$component" docker stop $instance
docker cp $patchinstance`:/app/$component/Core.dll "$tempdirectory\$component\Core.dll" docker rm $instance
} }
$oldinstances = docker image ls bitwarden-patched --format '{{.ID}}'
# run bitBetter, this applies our patches to the required files foreach ($instance in $oldinstances) {
docker run -v "$tempdirectory`:/app/mount" --rm bitbetter/bitbetter docker image rm $instance
}
# create a new image with the patched files
docker build . --tag bitwarden-patch --file "$pwd\src\bitBetter\Dockerfile-bitwarden-patch" # remove old extract containers
$oldinstances = docker container ps --all -f Name=bitwarden-extract --format '{{.ID}}'
# stop and remove our temporary container foreach ($instance in $oldinstances) {
docker stop bitwarden-patch docker stop $instance
docker rm bitwarden-patch docker rm $instance
}
# copy our patched library to the licenseGen source directory
Copy-Item "$tempdirectory\Identity\Core.dll" -Destination "$pwd\src\licenseGen" # start a new bitwarden instance so we can patch it
$patchinstance = docker run -d --name bitwarden-extract ghcr.io/bitwarden/lite:latest
# remove our temporary directory
Remove-Item "$tempdirectory" -Recurse -Force # create our temporary directory
New-item -ItemType Directory -Path $tempdirectory
# start all user requested instances
foreach($line in Get-Content "$pwd\.servers\serverlist.txt") { # extract the files that need to be patched from the services that need to be patched into our temporary directory
Invoke-Expression "& $line" foreach ($component in $components) {
} New-item -itemtype Directory -path "$tempdirectory\$component"
docker cp $patchinstance`:/app/$component/Core.dll "$tempdirectory\$component\Core.dll"
# remove our bitBetter image }
docker image rm bitbetter/bitbetter
# stop and remove our temporary container
# build the licenseGen docker stop bitwarden-extract
docker build -t bitbetter/licensegen "$pwd\src\licenseGen" docker rm bitwarden-extract
# clean the licenseGen source directory # run bitBetter, this applies our patches to the required files
Remove-Item "$pwd\src\licenseGen\Core.dll" -Force docker run -v "$tempdirectory`:/app/mount" --rm bitbetter/bitbetter
Remove-Item "$pwd\src\licenseGen\cert.pfx" -Force
# create a new image with the patched files
docker build . --tag bitwarden-patched --file "$pwd\src\bitBetter\Dockerfile-bitwarden-patch"
# start all user requested instances
if (Test-Path -Path "$pwd\.servers\serverlist.txt" -PathType Leaf) {
foreach($line in Get-Content "$pwd\.servers\serverlist.txt") {
if (!($line.StartsWith("#"))) {
Invoke-Expression "& $line"
}
}
}
# remove our bitBetter image
docker image rm bitbetter/bitbetter
# copy our patched library to the licenseGen source directory
Copy-Item "$tempdirectory\Identity\Core.dll" -Destination "$pwd\src\licenseGen"
Copy-Item "$pwd\.keys\cert.pfx" -Destination "$pwd\src\licenseGen"
# build the licenseGen
docker build -t bitbetter/licensegen "$pwd\src\licenseGen"
# clean the licenseGen source directory
Remove-Item "$pwd\src\licenseGen\Core.dll" -Force
Remove-Item "$pwd\src\licenseGen\cert.pfx" -Force
# remove our temporary directory
Remove-Item "$tempdirectory" -Recurse -Force

103
build.sh
View File

@@ -1,4 +1,12 @@
#!/bin/bash #!/bin/bash
set -e
# detect buildx, set -e will ensure the script stops execution if not found
docker buildx version
# Enable BuildKit for better build experience and to ensure platform args are populated
export DOCKER_BUILDKIT=1
export COMPOSE_DOCKER_CLI_BUILD=1
# define temporary directory # define temporary directory
TEMPDIRECTORY="$PWD/temp" TEMPDIRECTORY="$PWD/temp"
@@ -12,15 +20,19 @@ if [ -d "$TEMPDIRECTORY" ]; then
fi fi
if [ -f "$PWD/src/licenseGen/Core.dll" ]; then if [ -f "$PWD/src/licenseGen/Core.dll" ]; then
rm -f "$PWD/src/licenseGen/Core.dll" rm -f "$PWD/src/licenseGen/Core.dll"
fi fi
if [ -f "$PWD/src/licenseGen/cert.pfx" ]; then if [ -f "$PWD/src/licenseGen/cert.pfx" ]; then
rm -f "$PWD/src/licenseGen/cert.pfx" rm -f "$PWD/src/licenseGen/cert.pfx"
fi fi
if [ -f "$PWD/src/bitBetter/cert.cert" ]; then if [ -f "$PWD/src/bitBetter/cert.cer" ]; then
rm -f "$PWD/src/bitBetter/cert.cert" rm -f "$PWD/src/bitBetter/cert.cer"
fi
if [ -f "$PWD/.keys/cert.cert" ]; then
mv "$PWD/.keys/cert.cert" "$PWD/.keys/cert.cer"
fi fi
# generate keys if none are available # generate keys if none are available
@@ -28,42 +40,52 @@ if [ ! -d "$PWD/.keys" ]; then
./generateKeys.sh ./generateKeys.sh
fi fi
# copy the key to bitBetter and licenseGen # copy the key to bitBetter
cp -f "$PWD/.keys/cert.cert" "$PWD/src/bitBetter" cp -f "$PWD/.keys/cert.cer" "$PWD/src/bitBetter"
cp -f "$PWD/.keys/cert.pfx" "$PWD/src/licenseGen"
# build bitBetter and clean the source directory after # build bitBetter and clean the source directory after
docker build -t bitbetter/bitbetter "$PWD/src/bitBetter" docker build --no-cache -t bitbetter/bitbetter "$PWD/src/bitBetter"
rm -f "$PWD/src/bitBetter/cert.cert" rm -f "$PWD/src/bitBetter/cert.cer"
# gather all running instances # gather all running instances, cannot run a wildcard filter on Ancestor= :(, does find all where name = *bitwarden*
OLDINSTANCES=$(docker container ps --all -f Name=bitwarden --format '{{.ID}}') OLDINSTANCES=$(docker container ps --all -f Name=bitwarden --format '{{.ID}}')
# stop all running instances # stop and remove all running instances
for INSTANCE in ${OLDINSTANCES[@]}; do for INSTANCE in ${OLDINSTANCES[@]}; do
docker stop $INSTANCE docker stop $INSTANCE
docker rm $INSTANCE docker rm $INSTANCE
done done
# update bitwarden itself # update bitwarden itself
if [ "$1" = "y" ]; then if [ "$1" = "update" ]; then
docker pull bitwarden/self-host:beta docker pull ghcr.io/bitwarden/lite:latest
else else
read -p "Update (or get) bitwarden source container: " -n 1 -r read -p "Update (or get) bitwarden source container (y/n): "
echo if [[ $REPLY =~ ^[Yy]$ ]]; then
if [[ $REPLY =~ ^[Yy]$ ]] docker pull ghcr.io/bitwarden/lite:latest
then
docker pull bitwarden/self-host:beta
fi fi
fi fi
# stop and remove previous existing patch(ed) container # stop and remove previous existing patch(ed) container
docker stop bitwarden-patch OLDINSTANCES=$(docker container ps --all -f Ancestor=bitwarden-patched --format '{{.ID}}')
docker rm bitwarden-patch for INSTANCE in ${OLDINSTANCES[@]}; do
docker image rm bitwarden-patch docker stop $INSTANCE
docker rm $INSTANCE
done
OLDINSTANCES=$(docker image ls bitwarden-patched --format '{{.ID}}')
for INSTANCE in ${OLDINSTANCES[@]}; do
docker image rm $INSTANCE
done
# remove old extract containers
OLDINSTANCES=$(docker container ps --all -f Name=bitwarden-extract --format '{{.ID}}')
for INSTANCE in ${OLDINSTANCES[@]}; do
docker stop $INSTANCE
docker rm $INSTANCE
done
# start a new bitwarden instance so we can patch it # start a new bitwarden instance so we can patch it
PATCHINSTANCE=$(docker run -d --name bitwarden-patch bitwarden/self-host:beta) PATCHINSTANCE=$(docker run -d --name bitwarden-extract ghcr.io/bitwarden/lite:latest)
# create our temporary directory # create our temporary directory
mkdir $TEMPDIRECTORY mkdir $TEMPDIRECTORY
@@ -74,33 +96,40 @@ for COMPONENT in ${COMPONENTS[@]}; do
docker cp $PATCHINSTANCE:/app/$COMPONENT/Core.dll "$TEMPDIRECTORY/$COMPONENT/Core.dll" docker cp $PATCHINSTANCE:/app/$COMPONENT/Core.dll "$TEMPDIRECTORY/$COMPONENT/Core.dll"
done done
# stop and remove our temporary container
docker stop bitwarden-extract
docker rm bitwarden-extract
# run bitBetter, this applies our patches to the required files # run bitBetter, this applies our patches to the required files
docker run -v "$TEMPDIRECTORY:/app/mount" --rm bitbetter/bitbetter docker run -v "$TEMPDIRECTORY:/app/mount" --rm bitbetter/bitbetter
# create a new image with the patched files # create a new image with the patched files
docker build . --tag bitwarden-patch --file "$PWD/src/bitBetter/Dockerfile-bitwarden-patch" docker build . --tag bitwarden-patched --file "$PWD/src/bitBetter/Dockerfile-bitwarden-patch"
# stop and remove our temporary container
docker stop bitwarden-patch
docker rm bitwarden-patch
# copy our patched library to the licenseGen source directory
cp -f "$TEMPDIRECTORY/Identity/Core.dll" "$PWD/src/licenseGen"
# remove our temporary directory
rm -rf "$TEMPDIRECTORY"
# start all user requested instances # start all user requested instances
cat "$PWD/.servers/serverlist.txt" | while read LINE; do if [ -f "$PWD/.servers/serverlist.txt" ]; then
bash -c "$LINE" # convert line endings to unix
done sed -i 's/\r$//' "$PWD/.servers/serverlist.txt"
cat "$PWD/.servers/serverlist.txt" | while read -r LINE; do
if [[ $LINE != "#"* ]]; then
bash -c "$LINE"
fi
done
fi
# remove our bitBetter image # remove our bitBetter image
docker image rm bitbetter/bitbetter docker image rm bitbetter/bitbetter
# copy our patched library to the licenseGen source directory
cp -f "$TEMPDIRECTORY/Identity/Core.dll" "$PWD/src/licenseGen"
cp -f "$PWD/.keys/cert.pfx" "$PWD/src/licenseGen"
# build the licenseGen # build the licenseGen
docker build -t bitbetter/licensegen "$PWD/src/licenseGen" docker build -t bitbetter/licensegen "$PWD/src/licenseGen"
# clean the licenseGen source directory # clean the licenseGen source directory
rm -f "$PWD/src/licenseGen/Core.dll" rm -f "$PWD/src/licenseGen/Core.dll"
rm -f "$PWD/src/licenseGen/cert.pfx" rm -f "$PWD/src/licenseGen/cert.pfx"
# remove our temporary directory
rm -rf "$TEMPDIRECTORY"

View File

@@ -1,22 +1,25 @@
# get the basic openssl binary path $ErrorActionPreference = 'Stop'
$opensslbinary = "$Env:Programfiles\OpenSSL-Win64\bin\openssl.exe" $PSNativeCommandUseErrorActionPreference = $true
# if openssl is not installed attempt to install it # get the basic openssl binary path
if (!(Get-Command $opensslbinary -errorAction SilentlyContinue)) $opensslbinary = "$Env:Programfiles\OpenSSL-Win64\bin\openssl.exe"
{
winget install openssl # if openssl is not installed attempt to install it
} if (!(Get-Command $opensslbinary -errorAction SilentlyContinue))
{
# if previous keys exist, remove them winget install openssl
if (Test-Path "$pwd\.keys") }
{
Remove-Item "$pwd\.keys" -Recurse -Force # if previous keys exist, remove them
} if (Test-Path "$pwd\.keys")
{
# create new directory Remove-Item "$pwd\.keys" -Recurse -Force
New-item -ItemType Directory -Path "$pwd\.keys" }
# generate actual keys # create new directory
Invoke-Expression "& '$opensslbinary' req -x509 -newkey rsa:4096 -keyout `"$pwd\.keys\key.pem`" -out `"$pwd\.keys\cert.cert`" -days 36500 -subj '/CN=www.mydom.com/O=My Company Name LTD./C=US' -outform DER -passout pass:test" New-item -ItemType Directory -Path "$pwd\.keys"
Invoke-Expression "& '$opensslbinary' x509 -inform DER -in `"$pwd\.keys\cert.cert`" -out `"$pwd\.keys\cert.pem`""
# generate actual keys
Invoke-Expression "& '$opensslbinary' req -x509 -newkey rsa:4096 -keyout `"$pwd\.keys\key.pem`" -out `"$pwd\.keys\cert.cer`" -days 36500 -subj '/CN=www.mydom.com/O=My Company Name LTD./C=US' -outform DER -passout pass:test"
Invoke-Expression "& '$opensslbinary' x509 -inform DER -in `"$pwd\.keys\cert.cer`" -out `"$pwd\.keys\cert.pem`""
Invoke-Expression "& '$opensslbinary' pkcs12 -export -out `"$pwd\.keys\cert.pfx`" -inkey `"$pwd\.keys\key.pem`" -in `"$pwd\.keys\cert.pem`" -passin pass:test -passout pass:test" Invoke-Expression "& '$opensslbinary' pkcs12 -export -out `"$pwd\.keys\cert.pfx`" -inkey `"$pwd\.keys\key.pem`" -in `"$pwd\.keys\cert.pem`" -passin pass:test -passout pass:test"

View File

@@ -1,4 +1,5 @@
#!/bin/bash #!/bin/bash
set -e
# Check for openssl # Check for openssl
command -v openssl >/dev/null 2>&1 || { echo >&2 "openssl required but not found. Aborting."; exit 1; } command -v openssl >/dev/null 2>&1 || { echo >&2 "openssl required but not found. Aborting."; exit 1; }
@@ -14,6 +15,6 @@ fi
mkdir "$DIR" mkdir "$DIR"
# Generate new keys # Generate new keys
openssl req -x509 -newkey rsa:4096 -keyout "$DIR/key.pem" -out "$DIR/cert.cert" -days 36500 -subj '/CN=www.mydom.com/O=My Company Name LTD./C=US' -outform DER -passout pass:test openssl req -x509 -newkey rsa:4096 -keyout "$DIR/key.pem" -out "$DIR/cert.cer" -days 36500 -subj '/CN=www.mydom.com/O=My Company Name LTD./C=US' -outform DER -passout pass:test
openssl x509 -inform DER -in "$DIR/cert.cert" -out "$DIR/cert.pem" openssl x509 -inform DER -in "$DIR/cert.cer" -out "$DIR/cert.pem"
openssl pkcs12 -export -out "$DIR/cert.pfx" -inkey "$DIR/key.pem" -in "$DIR/cert.pem" -passin pass:test -passout pass:test openssl pkcs12 -export -out "$DIR/cert.pfx" -inkey "$DIR/key.pem" -in "$DIR/cert.pem" -passin pass:test -passout pass:test

View File

@@ -1,14 +1,17 @@
$ErrorActionPreference = 'Stop'
$PSNativeCommandUseErrorActionPreference = $true
if ($($args.Count) -lt 1) { if ($($args.Count) -lt 1) {
echo "USAGE: <License Gen action> [License Gen args...]" echo "USAGE: <License Gen action> [License Gen args...]"
echo "ACTIONS:" echo "ACTIONS:"
echo " interactive" echo " interactive"
echo " user" echo " user"
echo " org" echo " org"
Exit 1 Exit 1
} }
if ($args[0] = "interactive") { if ($args[0] -eq "interactive") {
docker run -it --rm bitbetter/licensegen interactive docker run -it --rm bitbetter/licensegen interactive
} else { } else {
docker run bitbetter/licensegen $args docker run bitbetter/licensegen $args
} }

View File

@@ -1,12 +1,13 @@
#!/bin/bash #!/bin/bash
set -e
if [ $# -lt 1 ]; then if [ $# -lt 1 ]; then
echo "USAGE: <License Gen action> [License Gen args...]" echo "USAGE: <License Gen action> [License Gen args...]"
echo "ACTIONS:" echo "ACTIONS:"
echo " interactive" echo " interactive"
echo " user" echo " user"
echo " org" echo " org"
exit 1 exit 1
fi fi
if [ "$1" = "interactive" ]; then if [ "$1" = "interactive" ]; then

View File

@@ -2,7 +2,7 @@ FROM mcr.microsoft.com/dotnet/sdk:8.0 AS build
WORKDIR /bitBetter WORKDIR /bitBetter
COPY . /bitBetter COPY . /bitBetter
COPY cert.cert /app/ COPY cert.cer /app/
RUN dotnet restore RUN dotnet restore
RUN dotnet publish -c Release -o /app --no-restore RUN dotnet publish -c Release -o /app --no-restore
@@ -11,4 +11,4 @@ FROM mcr.microsoft.com/dotnet/sdk:8.0
WORKDIR /app WORKDIR /app
COPY --from=build /app . COPY --from=build /app .
ENTRYPOINT [ "/app/bitBetter" ] ENTRYPOINT ["dotnet", "/app/bitBetter.dll"]

View File

@@ -1,4 +1,3 @@
FROM bitwarden/self-host:beta FROM ghcr.io/bitwarden/lite:latest
COPY ./temp/Api/Core.dll /app/Api/Core.dll COPY ./temp/ /app/
COPY ./temp/Identity/Core.dll /app/Identity/Core.dll

View File

@@ -1,75 +1,67 @@
using System; using System;
using System.Collections.Generic; using System.Collections.Generic;
using System.IO; using System.IO;
using System.Linq; using System.Linq;
using System.Security.Cryptography.X509Certificates; using System.Security.Cryptography.X509Certificates;
using dnlib.DotNet; using dnlib.DotNet;
using dnlib.DotNet.Emit; using dnlib.DotNet.Emit;
using dnlib.DotNet.Writer; using dnlib.DotNet.Writer;
using dnlib.IO; using dnlib.IO;
namespace bitBetter; namespace bitBetter;
internal class Program internal class Program
{ {
private static Int32 Main() private static Int32 Main()
{ {
const String certFile = "/app/cert.cert"; const String certFile = "/app/cert.cer";
String[] files = Directory.GetFiles("/app/mount", "Core.dll", SearchOption.AllDirectories); String[] files = Directory.GetFiles("/app/mount", "Core.dll", SearchOption.AllDirectories);
foreach (String file in files) foreach (String file in files)
{ {
Console.WriteLine(file); Console.WriteLine(file);
ModuleDefMD moduleDefMd = ModuleDefMD.Load(file); ModuleDefMD moduleDefMd = ModuleDefMD.Load(file);
Byte[] cert = File.ReadAllBytes(certFile); Byte[] cert = File.ReadAllBytes(certFile);
EmbeddedResource embeddedResourceToRemove = moduleDefMd.Resources EmbeddedResource embeddedResourceToRemove = moduleDefMd.Resources.OfType<EmbeddedResource>().First(r => r.Name.Equals("Bit.Core.licensing.cer"));
.OfType<EmbeddedResource>() EmbeddedResource embeddedResourceToAdd = new("Bit.Core.licensing.cer", cert) { Attributes = embeddedResourceToRemove.Attributes };
.First(r => r.Name.Equals("Bit.Core.licensing.cer")); moduleDefMd.Resources.Add(embeddedResourceToAdd);
moduleDefMd.Resources.Remove(embeddedResourceToRemove);
Console.WriteLine(embeddedResourceToRemove.Name);
DataReader reader = embeddedResourceToRemove.CreateReader();
EmbeddedResource embeddedResourceToAdd = new("Bit.Core.licensing.cer", cert) {Attributes = embeddedResourceToRemove.Attributes }; X509Certificate2 existingCert = new(reader.ReadRemainingBytes());
moduleDefMd.Resources.Add(embeddedResourceToAdd);
moduleDefMd.Resources.Remove(embeddedResourceToRemove); Console.WriteLine($"Existing Cert Thumbprint: {existingCert.Thumbprint}");
X509Certificate2 certificate = new(cert);
DataReader reader = embeddedResourceToRemove.CreateReader();
X509Certificate2 existingCert = new(reader.ReadRemainingBytes()); Console.WriteLine($"New Cert Thumbprint: {certificate.Thumbprint}");
Console.WriteLine($"Existing Cert Thumbprint: {existingCert.Thumbprint}"); IEnumerable<TypeDef> services = moduleDefMd.Types.Where(t => t.Namespace == "Bit.Core.Billing.Services");
X509Certificate2 certificate = new(cert); TypeDef type = services.First(t => t.Name == "LicensingService");
MethodDef constructor = type.FindConstructors().First();
Console.WriteLine($"New Cert Thumbprint: {certificate.Thumbprint}");
Instruction instructionToPatch = constructor.Body.Instructions.FirstOrDefault(i => i.OpCode == OpCodes.Ldstr && String.Equals((String)i.Operand, existingCert.Thumbprint, StringComparison.InvariantCultureIgnoreCase));
IEnumerable<TypeDef> services = moduleDefMd.Types.Where(t => t.Namespace == "Bit.Core.Services");
TypeDef type = services.First(t => t.Name == "LicensingService"); if (instructionToPatch != null)
MethodDef constructor = type.FindConstructors().First(); {
instructionToPatch.Operand = certificate.Thumbprint;
Instruction instructionToPatch = }
constructor.Body.Instructions else
.FirstOrDefault(i => i.OpCode == OpCodes.Ldstr {
&& String.Equals((String)i.Operand, existingCert.Thumbprint, StringComparison.InvariantCultureIgnoreCase)); Console.WriteLine("Can't find constructor to patch");
}
if (instructionToPatch != null)
{ ModuleWriterOptions moduleWriterOptions = new(moduleDefMd);
instructionToPatch.Operand = certificate.Thumbprint; moduleWriterOptions.MetadataOptions.Flags |= MetadataFlags.KeepOldMaxStack;
} moduleWriterOptions.MetadataOptions.Flags |= MetadataFlags.PreserveAll;
else moduleWriterOptions.MetadataOptions.Flags |= MetadataFlags.PreserveRids;
{
Console.WriteLine("Can't find constructor to patch"); moduleDefMd.Write(file + ".new");
} moduleDefMd.Dispose();
File.Delete(file);
ModuleWriterOptions moduleWriterOptions = new(moduleDefMd); File.Move(file + ".new", file);
moduleWriterOptions.MetadataOptions.Flags |= MetadataFlags.KeepOldMaxStack; }
moduleWriterOptions.MetadataOptions.Flags |= MetadataFlags.PreserveAll;
moduleWriterOptions.MetadataOptions.Flags |= MetadataFlags.PreserveRids; return 0;
}
moduleDefMd.Write(file + ".new");
moduleDefMd.Dispose();
File.Delete(file);
File.Move(file + ".new", file);
}
return 0;
}
} }

View File

@@ -1,12 +1,9 @@
<Project Sdk="Microsoft.NET.Sdk"> <Project Sdk="Microsoft.NET.Sdk">
<PropertyGroup> <PropertyGroup>
<OutputType>Exe</OutputType> <OutputType>Exe</OutputType>
<TargetFramework>net8.0</TargetFramework> <TargetFramework>net8.0</TargetFramework>
</PropertyGroup> </PropertyGroup>
<ItemGroup>
<ItemGroup> <PackageReference Include="dnlib" Version="4.5.0" />
<PackageReference Include="dnlib" Version="4.4.0" />
</ItemGroup> </ItemGroup>
</Project>
</Project>

View File

@@ -12,4 +12,4 @@ FROM mcr.microsoft.com/dotnet/sdk:8.0
WORKDIR /app WORKDIR /app
COPY --from=build /app . COPY --from=build /app .
ENTRYPOINT [ "dotnet", "/app/licenseGen.dll", "--core", "/app/Core.dll", "--cert", "/app/cert.pfx" ] ENTRYPOINT ["dotnet", "/app/licenseGen.dll", "--cert=/app/cert.pfx", "--core=/app/Core.dll"]

View File

@@ -1,453 +1,485 @@
using System; using System;
using System.IO; using System.IO;
using System.Reflection; using System.Text.Json;
using System.Runtime.Loader; using System.Reflection;
using System.Security.Cryptography.X509Certificates; using System.Runtime.Loader;
using McMaster.Extensions.CommandLineUtils; using System.Security.Cryptography.X509Certificates;
using Newtonsoft.Json; using McMaster.Extensions.CommandLineUtils;
namespace licenseGen; namespace licenseGen;
internal class Program internal class Program
{ {
private static Int32 Main(String[] args) private static readonly CommandLineApplication App = new();
{ private static readonly CommandOption Cert = App.Option("--cert", "Certificate file", CommandOptionType.SingleValue);
CommandLineApplication app = new(); private static readonly CommandOption CoreDll = App.Option("--core", "Path to Core.dll", CommandOptionType.SingleValue);
CommandOption cert = app.Option("--cert", "cert file", CommandOptionType.SingleValue);
CommandOption coreDll = app.Option("--core", "path to core dll", CommandOptionType.SingleValue); private static Int32 Main(String[] args)
{
Boolean CertExists() App.Command("interactive", config =>
{ {
return File.Exists(cert.Value()); String buff, licenseType = "", name = "", email = "", businessName="";
} Int16 storage = 0;
Boolean validGuid = false, validInstallid = false;
Boolean CoreExists() Guid guid = Guid.Empty, installid = Guid.Empty;
{
return File.Exists(coreDll.Value()); config.OnExecute(() =>
} {
Check();
Boolean VerifyTopOptions() Console.WriteLine("Interactive license mode...");
{
return !String.IsNullOrWhiteSpace(cert.Value()) && while (licenseType == "")
!String.IsNullOrWhiteSpace(coreDll.Value()) && {
CertExists() && CoreExists(); Console.WriteLine("What would you like to generate, a [u]ser license or an [o]rg license: ");
} buff = Console.ReadLine();
app.Command("interactive", config => switch (buff)
{ {
String buff, licenseType = "", name = "", email = "", businessName=""; case "u":
Int16 storage = 0; {
licenseType = "user";
Boolean validGuid = false, validInstallid = false; Console.WriteLine("Okay, we will generate a user license.");
Guid guid = new(), installid = new();
while (!validGuid)
config.OnExecute(() => {
{ Console.WriteLine("Please provide the user's guid — refer to the Readme for details on how to retrieve this. [GUID]: ");
if (!VerifyTopOptions()) buff = Console.ReadLine();
{
if (!CoreExists()) config.Error.WriteLine($"Can't find core dll at: {coreDll.Value()}"); if (Guid.TryParse(buff, out guid))validGuid = true;
if (!CertExists()) config.Error.WriteLine($"Can't find certificate at: {cert.Value()}"); else Console.WriteLine("The user-guid provided does not appear to be valid!");
}
config.ShowHelp(); break;
return 1; }
} case "o":
{
Console.WriteLine("Interactive license mode..."); licenseType = "org";
Console.WriteLine("Okay, we will generate an organization license.");
while (licenseType == "")
{ while (!validInstallid)
Console.WriteLine("What would you like to generate, a [u]ser license or an [o]rg license: "); {
buff = Console.ReadLine(); Console.WriteLine("Please provide your Bitwarden Install-ID — refer to the Readme for details on how to retrieve this. [Install-ID]: ");
buff = Console.ReadLine();
if(buff == "u")
{ if (Guid.TryParse(buff, out installid)) validInstallid = true;
licenseType = "user"; else Console.WriteLine("The install-id provided does not appear to be valid.");
Console.WriteLine("Okay, we will generate a user license."); }
while (validGuid == false) while (businessName == "")
{ {
Console.WriteLine("Please provide the user's guid — refer to the Readme for details on how to retrieve this. [GUID]: "); Console.WriteLine("Please enter a business name, default is BitBetter. [Business Name]: ");
buff = Console.ReadLine(); buff = Console.ReadLine();
if (buff == "")
if (Guid.TryParse(buff, out guid))validGuid = true; {
else Console.WriteLine("The user-guid provided does not appear to be valid!"); businessName = "BitBetter";
} }
} else if (CheckBusinessName(buff))
else if (buff == "o") {
{ businessName = buff;
licenseType = "org"; }
Console.WriteLine("Okay, we will generate an organization license."); }
break;
while (validInstallid == false) }
{ default:
Console.WriteLine("Please provide your Bitwarden Install-ID — refer to the Readme for details on how to retrieve this. [Install-ID]: "); Console.WriteLine("Unrecognized option \'" + buff + "\'.");
buff = Console.ReadLine(); break;
}
if (Guid.TryParse(buff, out installid)) validInstallid = true; }
else Console.WriteLine("The install-id provided does not appear to be valid.");
} while (name == "")
{
while (businessName == "") Console.WriteLine("Please provide the username this license will be registered to. [username]: ");
{ buff = Console.ReadLine();
Console.WriteLine("Please enter a business name, default is BitBetter. [Business Name]: "); if (CheckUsername(buff)) name = buff;
buff = Console.ReadLine(); }
if (buff == "")
{ while (email == "")
businessName = "BitBetter"; {
} Console.WriteLine("Please provide the email address for the user " + name + ". [email]: ");
else if (CheckBusinessName(buff)) buff = Console.ReadLine();
{ if (CheckEmail(buff))
businessName = buff; {
} email = buff;
} }
} }
else
{ while (storage == 0)
Console.WriteLine("Unrecognized option \'" + buff + "\'."); {
} Console.WriteLine("Extra storage space for the user " + name + ". (max.: " + Int16.MaxValue + "). Defaults to maximum value. [storage]");
} buff = Console.ReadLine();
if (String.IsNullOrWhiteSpace(buff))
while (name == "") {
{ storage = Int16.MaxValue;
Console.WriteLine("Please provide the username this license will be registered to. [username]: "); }
buff = Console.ReadLine(); else
if ( CheckUsername(buff) ) name = buff; {
} if (CheckStorage(buff))
{
while (email == "") storage = Int16.Parse(buff);
{ }
Console.WriteLine("Please provide the email address for the user " + name + ". [email]: "); }
buff = Console.ReadLine(); }
if (CheckEmail(buff))
{ switch (licenseType)
email = buff; {
} case "user":
} {
Console.WriteLine("Confirm creation of \"user\" license for username: \"" + name + "\", email: \"" + email + "\", Storage: \"" + storage + " GB\", User-GUID: \"" + guid + "\"? Y/n");
while (storage == 0) buff = Console.ReadLine();
{ if (buff is "" or "y" or "Y")
Console.WriteLine("Extra storage space for the user " + name + ". (max.: " + Int16.MaxValue + "). Defaults to maximum value. [storage]"); {
buff = Console.ReadLine(); GenerateUserLicense(new X509Certificate2(Cert.Value(), "test"), CoreDll.Value(), name, email, storage, guid, null);
if (String.IsNullOrWhiteSpace(buff)) }
{ else
storage = Int16.MaxValue; {
} Console.WriteLine("Exiting...");
else return 0;
{ }
if (CheckStorage(buff))
{ break;
storage = Int16.Parse(buff); }
} case "org":
} {
} Console.WriteLine("Confirm creation of \"organization\" license for business name: \"" + businessName + "\", username: \"" + name + "\", email: \"" + email + "\", Storage: \"" + storage + " GB\", Install-ID: \"" + installid + "\"? Y/n");
buff = Console.ReadLine();
if (licenseType == "user") if (buff is "" or "y" or "Y")
{ {
Console.WriteLine("Confirm creation of \"user\" license for username: \"" + name + "\", email: \"" + email + "\", Storage: \"" + storage + " GB\", User-GUID: \"" + guid + "\"? Y/n"); GenerateOrgLicense(new X509Certificate2(Cert.Value(), "test"), CoreDll.Value(), name, email, storage, installid, businessName, null);
buff = Console.ReadLine(); }
if ( buff is "" or "y" or "Y" ) else
{ {
GenerateUserLicense(new X509Certificate2(cert.Value(), "test"), coreDll.Value(), name, email, storage, guid, null); Console.WriteLine("Exiting...");
} return 0;
else }
{
Console.WriteLine("Exiting..."); break;
return 0; }
} }
}
else if (licenseType == "org") return 0;
{ });
Console.WriteLine("Confirm creation of \"organization\" license for business name: \"" + businessName + "\", username: \"" + name + "\", email: \"" + email + "\", Storage: \"" + storage + " GB\", Install-ID: \"" + installid + "\"? Y/n"); });
buff = Console.ReadLine(); App.Command("user", config =>
if ( buff is "" or "y" or "Y" ) {
{ CommandArgument name = config.Argument("Name", "your name");
GenerateOrgLicense(new X509Certificate2(cert.Value(), "test"), coreDll.Value(), name, email, storage, installid, businessName, null); CommandArgument email = config.Argument("Email", "your email");
} CommandArgument userIdArg = config.Argument("User ID", "your user id");
else CommandArgument storage = config.Argument("Storage", "extra storage space in GB. Maximum is " + Int16.MaxValue + " (optional, default = max)");
{ CommandArgument key = config.Argument("Key", "your key id (optional)");
Console.WriteLine("Exiting...");
return 0; config.OnExecute(() =>
} {
} Check();
return 0; if (String.IsNullOrWhiteSpace(name.Value) || String.IsNullOrWhiteSpace(email.Value))
}); {
}); config.Error.WriteLine($"Some arguments are missing: Name='{name.Value}' Email='{email.Value}'");
app.Command("user", config => config.ShowHelp(true);
{ return 1;
CommandArgument name = config.Argument("Name", "your name"); }
CommandArgument email = config.Argument("Email", "your email");
CommandArgument userIdArg = config.Argument("User ID", "your user id"); if (String.IsNullOrWhiteSpace(userIdArg.Value) || !Guid.TryParse(userIdArg.Value, out Guid userId))
CommandArgument storage = config.Argument("Storage", "extra storage space in GB. Maximum is " + Int16.MaxValue + " (optional, default = max)"); {
CommandArgument key = config.Argument("Key", "your key id (optional)"); config.Error.WriteLine("User ID not provided");
config.ShowHelp(true);
config.OnExecute(() => return 1;
{ }
if (!VerifyTopOptions())
{ Int16 storageShort = 0;
if (!CoreExists()) if (!String.IsNullOrWhiteSpace(storage.Value))
{ {
config.Error.WriteLine($"Can't find core dll at: {coreDll.Value()}"); Double parsedStorage = Double.Parse(storage.Value);
} if (parsedStorage is > Int16.MaxValue or < 0)
if (!CertExists()) {
{ config.Error.WriteLine("The storage value provided is outside the accepted range of [0-" + Int16.MaxValue + "]");
config.Error.WriteLine($"Can't find certificate at: {cert.Value()}"); config.ShowHelp(true);
} return 1;
}
config.ShowHelp(); storageShort = (Int16) parsedStorage;
return 1; }
}
GenerateUserLicense(new X509Certificate2(Cert.Value()!, "test"), CoreDll.Value(), name.Value, email.Value, storageShort, userId, key.Value);
if (String.IsNullOrWhiteSpace(name.Value) || String.IsNullOrWhiteSpace(email.Value))
{ return 0;
config.Error.WriteLine($"Some arguments are missing: Name='{name.Value}' Email='{email.Value}'"); });
config.ShowHelp(true); });
return 1; App.Command("org", config =>
} {
CommandArgument name = config.Argument("Name", "your name");
if (String.IsNullOrWhiteSpace(userIdArg.Value) || !Guid.TryParse(userIdArg.Value, out Guid userId)) CommandArgument email = config.Argument("Email", "your email");
{ CommandArgument installId = config.Argument("InstallId", "your installation id (GUID)");
config.Error.WriteLine("User ID not provided"); CommandArgument storage = config.Argument("Storage", "extra storage space in GB. Maximum is " + Int16.MaxValue + " (optional, default = max)");
config.ShowHelp(true); CommandArgument businessName = config.Argument("BusinessName", "name for the organization (optional)");
return 1; CommandArgument key = config.Argument("Key", "your key id (optional)");
}
config.OnExecute(() =>
Int16 storageShort = 0; {
if (!String.IsNullOrWhiteSpace(storage.Value)) Check();
{
Double parsedStorage = Double.Parse(storage.Value); if (String.IsNullOrWhiteSpace(name.Value) || String.IsNullOrWhiteSpace(email.Value) || String.IsNullOrWhiteSpace(installId.Value))
if (parsedStorage is > Int16.MaxValue or < 0) {
{ config.Error.WriteLine($"Some arguments are missing: Name='{name.Value}' Email='{email.Value}' InstallId='{installId.Value}'");
config.Error.WriteLine("The storage value provided is outside the accepted range of [0-" + Int16.MaxValue + "]"); config.ShowHelp(true);
config.ShowHelp(true); return 1;
return 1; }
}
storageShort = (Int16) parsedStorage; if (!Guid.TryParse(installId.Value, out Guid installationId))
} {
config.Error.WriteLine("Unable to parse your installation id as a GUID");
GenerateUserLicense(new X509Certificate2(cert.Value(), "test"), coreDll.Value(), name.Value, email.Value, storageShort, userId, key.Value); config.Error.WriteLine($"Here's a new guid: {Guid.NewGuid()}");
config.ShowHelp(true);
return 0; return 1;
}); }
});
app.Command("org", config => Int16 storageShort = 0;
{ if (!String.IsNullOrWhiteSpace(storage.Value))
CommandArgument name = config.Argument("Name", "your name"); {
CommandArgument email = config.Argument("Email", "your email"); Double parsedStorage = Double.Parse(storage.Value);
CommandArgument installId = config.Argument("InstallId", "your installation id (GUID)"); if (parsedStorage is > Int16.MaxValue or < 0)
CommandArgument storage = config.Argument("Storage", "extra storage space in GB. Maximum is " + Int16.MaxValue + " (optional, default = max)"); {
CommandArgument businessName = config.Argument("BusinessName", "name for the organization (optional)"); config.Error.WriteLine("The storage value provided is outside the accepted range of [0-" + Int16.MaxValue + "]");
CommandArgument key = config.Argument("Key", "your key id (optional)"); config.ShowHelp(true);
return 1;
config.OnExecute(() => }
{ storageShort = (Int16)parsedStorage;
if (!VerifyTopOptions()) }
{
if (!CoreExists()) GenerateOrgLicense(new X509Certificate2(Cert.Value()!, "test"), CoreDll.Value(), name.Value, email.Value, storageShort, installationId, businessName.Value, key.Value);
{
config.Error.WriteLine($"Can't find core dll at: {coreDll.Value()}"); return 0;
} });
if (!CertExists()) });
{
config.Error.WriteLine($"Can't find certificate at: {cert.Value()}"); App.OnExecute(() =>
} {
App.ShowHelp();
config.ShowHelp(); return 10;
return 1; });
}
try
if (String.IsNullOrWhiteSpace(name.Value) || {
String.IsNullOrWhiteSpace(email.Value) || App.HelpOption("-? | -h | --help");
String.IsNullOrWhiteSpace(installId.Value)) return App.Execute(args);
{ }
config.Error.WriteLine($"Some arguments are missing: Name='{name.Value}' Email='{email.Value}' InstallId='{installId.Value}'"); catch (Exception exception)
config.ShowHelp(true); {
return 1; Console.Error.WriteLine("Oops: {0}", exception);
} return 100;
}
if (!Guid.TryParse(installId.Value, out Guid installationId)) }
{
config.Error.WriteLine("Unable to parse your installation id as a GUID"); private static void Check()
config.Error.WriteLine($"Here's a new guid: {Guid.NewGuid()}"); {
config.ShowHelp(true); if (Cert == null || String.IsNullOrWhiteSpace(Cert.Value()))
return 1; {
} App.Error.WriteLine("No certificate specified");
App.ShowHelp();
Int16 storageShort = 0; Environment.Exit(1);
if (!String.IsNullOrWhiteSpace(storage.Value)) }
{ else if (CoreDll == null || String.IsNullOrWhiteSpace(CoreDll.Value()))
Double parsedStorage = Double.Parse(storage.Value); {
if (parsedStorage is > Int16.MaxValue or < 0) App.Error.WriteLine("No core dll specified");
{ App.ShowHelp();
config.Error.WriteLine("The storage value provided is outside the accepted range of [0-" + Int16.MaxValue + "]"); Environment.Exit(1);
config.ShowHelp(true); }
return 1; else if (!File.Exists(Cert.Value()))
} {
storageShort = (Int16) parsedStorage; App.Error.WriteLine($"Can't find certificate at: {Cert.Value()}");
} App.ShowHelp();
Environment.Exit(1);
GenerateOrgLicense(new X509Certificate2(cert.Value(), "test"), coreDll.Value(), name.Value, email.Value, storageShort, installationId, businessName.Value, key.Value); }
else if (!File.Exists(CoreDll.Value()))
return 0; {
}); App.Error.WriteLine($"Can't find core dll at: {CoreDll.Value()}");
}); App.ShowHelp();
Environment.Exit(1);
app.OnExecute(() => }
{ }
app.ShowHelp();
return 10; // checkUsername Checks that the username is a valid username
}); private static Boolean CheckUsername(String s)
{
app.HelpOption("-? | -h | --help"); // TODO: Actually validate
if (!String.IsNullOrWhiteSpace(s)) return true;
try
{ Console.WriteLine("The username provided doesn't appear to be valid!");
return app.Execute(args); return false;
} }
catch (Exception e)
{ // checkBusinessName Checks that the Business Name is a valid username
Console.Error.WriteLine("Oops: {0}", e); private static Boolean CheckBusinessName(String s)
return 100; {
} // TODO: Actually validate
} if (!String.IsNullOrWhiteSpace(s)) return true;
// checkUsername Checks that the username is a valid username Console.WriteLine("The Business Name provided doesn't appear to be valid!");
private static Boolean CheckUsername(String s) return false;
{ }
// TODO: Actually validate
if (!String.IsNullOrWhiteSpace(s)) return true; // checkEmail Checks that the email address is a valid email address
private static Boolean CheckEmail(String s)
Console.WriteLine("The username provided doesn't appear to be valid!"); {
return false; // TODO: Actually validate
} if (!String.IsNullOrWhiteSpace(s)) return true;
// checkBusinessName Checks that the Business Name is a valid username Console.WriteLine("The email provided doesn't appear to be valid!");
private static Boolean CheckBusinessName(String s) return false;
{ }
// TODO: Actually validate
if (!String.IsNullOrWhiteSpace(s)) return true; // checkStorage Checks that the storage is in a valid range
private static Boolean CheckStorage(String s)
Console.WriteLine("The Business Name provided doesn't appear to be valid!"); {
return false; if (String.IsNullOrWhiteSpace(s))
} {
Console.WriteLine("The storage provided doesn't appear to be valid!");
// checkEmail Checks that the email address is a valid email address return false;
private static Boolean CheckEmail(String s) }
{
// TODO: Actually validate if (!(Double.Parse(s) > Int16.MaxValue) && !(Double.Parse(s) < 0)) return true;
if (!String.IsNullOrWhiteSpace(s)) return true;
Console.WriteLine("The storage value provided is outside the accepted range of [0-" + Int16.MaxValue + "]!");
Console.WriteLine("The email provided doesn't appear to be valid!"); return false;
return false; }
}
private static readonly JsonSerializerOptions JsonOptions = new() { WriteIndented = true };
// checkStorage Checks that the storage is in a valid range private static void GenerateUserLicense(X509Certificate2 cert, String corePath, String userName, String email, Int16 storage, Guid userId, String key)
private static Boolean CheckStorage(String s) {
{ Assembly core = AssemblyLoadContext.Default.LoadFromAssemblyPath(Path.GetFullPath(corePath));
if (String.IsNullOrWhiteSpace(s))
{ Type type = core.GetType("Bit.Core.Billing.Models.Business.UserLicense");
Console.WriteLine("The storage provided doesn't appear to be valid!"); Type licenseTypeEnum = core.GetType("Bit.Core.Enums.LicenseType");
return false;
} if (type == null)
{
if (!(Double.Parse(s) > Int16.MaxValue) && !(Double.Parse(s) < 0)) return true; Console.WriteLine("Could not find type!");
return;
Console.WriteLine("The storage value provided is outside the accepted range of [0-" + Int16.MaxValue + "]!"); }
return false; if (licenseTypeEnum == null)
} {
Console.WriteLine("Could not find license licenseTypeEnum!");
private static void GenerateUserLicense(X509Certificate2 cert, String corePath, String userName, String email, Int16 storage, Guid userId, String key) return;
{ }
Assembly core = AssemblyLoadContext.Default.LoadFromAssemblyPath(corePath);
Object license = Activator.CreateInstance(type);
Type type = core.GetType("Bit.Core.Models.Business.UserLicense");
Type licenseTypeEnum = core.GetType("Bit.Core.Enums.LicenseType"); MethodInfo computeHash = type.GetMethod("ComputeHash");
if (computeHash == null)
Object license = Activator.CreateInstance(type); {
Console.WriteLine("Could not find ComputeHash!");
Set("LicenseKey", String.IsNullOrWhiteSpace(key) ? Guid.NewGuid().ToString("n") : key); return;
Set("Id", userId); }
Set("Name", userName);
Set("Email", email); MethodInfo sign = type.GetMethod("Sign");
Set("Premium", true); if (sign == null)
Set("MaxStorageGb", storage == 0 ? Int16.MaxValue : storage); {
Set("Version", 1); Console.WriteLine("Could not find sign!");
Set("Issued", DateTime.UtcNow); return;
Set("Refresh", DateTime.UtcNow.AddYears(100).AddMonths(-1)); }
Set("Expires", DateTime.UtcNow.AddYears(100));
Set("Trial", false); Set(type, license, "LicenseKey", String.IsNullOrWhiteSpace(key) ? Guid.NewGuid().ToString("n") : key);
Set("LicenseType", Enum.Parse(licenseTypeEnum, "User")); Set(type, license, "Id", userId);
Set(type, license, "Name", userName);
Set("Hash", Convert.ToBase64String((Byte[])type.GetMethod("ComputeHash").Invoke(license, []))); Set(type, license, "Email", email);
Set("Signature", Convert.ToBase64String((Byte[])type.GetMethod("Sign").Invoke(license, [cert]))); Set(type, license, "Premium", true);
Set(type, license, "MaxStorageGb", storage == 0 ? Int16.MaxValue : storage);
Console.WriteLine(JsonConvert.SerializeObject(license, Formatting.Indented)); Set(type, license, "Version", 1);
return; Set(type, license, "Issued", DateTime.UtcNow);
Set(type, license, "Refresh", DateTime.UtcNow.AddYears(100).AddMonths(-1));
void Set(String name, Object value) Set(type, license, "Expires", DateTime.UtcNow.AddYears(100));
{ Set(type, license, "Trial", false);
type.GetProperty(name)?.SetValue(license, value); Set(type, license, "LicenseType", Enum.Parse(licenseTypeEnum, "User"));
} Set(type, license, "Hash", Convert.ToBase64String(((Byte[])computeHash.Invoke(license, []))!));
} Set(type, license, "Signature", Convert.ToBase64String((Byte[])sign.Invoke(license, [cert])!));
private static void GenerateOrgLicense(X509Certificate2 cert, String corePath, String userName, String email, Int16 storage, Guid instalId, String businessName, String key) Console.WriteLine(JsonSerializer.Serialize(license, JsonOptions));
{ }
Assembly core = AssemblyLoadContext.Default.LoadFromAssemblyPath(corePath); private static void GenerateOrgLicense(X509Certificate2 cert, String corePath, String userName, String email, Int16 storage, Guid instalId, String businessName, String key)
{
Type type = core.GetType("Bit.Core.Models.Business.OrganizationLicense"); Assembly core = AssemblyLoadContext.Default.LoadFromAssemblyPath(Path.GetFullPath(corePath));
Type licenseTypeEnum = core.GetType("Bit.Core.Enums.LicenseType"); Type type = core.GetType("Bit.Core.Billing.Organizations.Models.OrganizationLicense");
Type planTypeEnum = core.GetType("Bit.Core.Billing.Enums.PlanType"); Type licenseTypeEnum = core.GetType("Bit.Core.Enums.LicenseType");
Type planTypeEnum = core.GetType("Bit.Core.Billing.Enums.PlanType");
Object license = Activator.CreateInstance(type);
if (type == null)
Set("LicenseKey", String.IsNullOrWhiteSpace(key) ? Guid.NewGuid().ToString("n") : key); {
Set("InstallationId", instalId); Console.WriteLine("Could not find type!");
Set("Id", Guid.NewGuid()); return;
Set("Name", userName); }
Set("BillingEmail", email); if (licenseTypeEnum == null)
Set("BusinessName", String.IsNullOrWhiteSpace(businessName) ? "BitBetter" : businessName); {
Set("Enabled", true); Console.WriteLine("Could not find licenseTypeEnum!");
Set("Plan", "Enterprise (Annually)"); return;
Set("PlanType", Enum.Parse(planTypeEnum, "EnterpriseAnnually")); }
Set("Seats", Int32.MaxValue); if (planTypeEnum == null)
Set("MaxCollections", Int16.MaxValue); {
Set("UsePolicies", true); Console.WriteLine("Could not find planTypeEnum!");
Set("UseSso", true); return;
Set("UseKeyConnector", true); }
Set("UseScim", true);
Set("UseGroups", true); Object license = Activator.CreateInstance(type);
Set("UseEvents", true);
Set("UseDirectory", true); MethodInfo computeHash = type.GetMethod("ComputeHash");
Set("UseTotp", true); if (computeHash == null)
Set("Use2fa", true); {
Set("UseApi", true); Console.WriteLine("Could not find ComputeHash!");
Set("UseResetPassword", true); return;
Set("UseCustomPermissions", true); }
Set("MaxStorageGb", storage == 0 ? Int16.MaxValue : storage);
Set("SelfHost", true); MethodInfo sign = type.GetMethod("Sign");
Set("UsersGetPremium", true); if (sign == null)
Set("UsePasswordManager", true); {
Set("UseSecretsManager", true); Console.WriteLine("Could not find sign!");
Set("SmSeats", Int32.MaxValue); return;
Set("SmServiceAccounts", Int32.MaxValue); }
Set("Version", 15); //This is set to 15 to use AllowAdminAccessToAllCollectionItems can be changed to 13 to just use Secrets Manager
Set("Issued", DateTime.UtcNow); Set(type, license, "LicenseKey", String.IsNullOrWhiteSpace(key) ? Guid.NewGuid().ToString("n") : key);
Set("Refresh", DateTime.UtcNow.AddYears(100).AddMonths(-1)); Set(type, license, "InstallationId", instalId);
Set("Expires", DateTime.UtcNow.AddYears(100)); Set(type, license, "Id", Guid.NewGuid());
Set("Trial", false); Set(type, license, "Name", userName);
Set("LicenseType", Enum.Parse(licenseTypeEnum, "Organization")); Set(type, license, "BillingEmail", email);
Set("LimitCollectionCreationDeletion", true); //This will be used in the new version of BitWarden but can be applied now Set(type, license, "BusinessName", String.IsNullOrWhiteSpace(businessName) ? "BitBetter" : businessName);
Set("AllowAdminAccessToAllCollectionItems", true); Set(type, license, "Enabled", true);
Set(type, license, "Plan", "Enterprise (Annually)");
Set("Hash", Convert.ToBase64String((Byte[])type.GetMethod("ComputeHash").Invoke(license, []))); Set(type, license, "PlanType", Enum.Parse(planTypeEnum, "EnterpriseAnnually"));
Set("Signature", Convert.ToBase64String((Byte[])type.GetMethod("Sign").Invoke(license, [cert]))); Set(type, license, "Seats", Int32.MaxValue);
Set(type, license, "MaxCollections", Int16.MaxValue);
Console.WriteLine(JsonConvert.SerializeObject(license, Formatting.Indented)); Set(type, license, "UsePolicies", true);
return; Set(type, license, "UseSso", true);
Set(type, license, "UseKeyConnector", true);
void Set(String name, Object value) Set(type, license, "UseScim", true);
{ Set(type, license, "UseGroups", true);
type.GetProperty(name)?.SetValue(license, value); Set(type, license, "UseEvents", true);
} Set(type, license, "UseDirectory", true);
} Set(type, license, "UseTotp", true);
Set(type, license, "Use2fa", true);
Set(type, license, "UseApi", true);
Set(type, license, "UseResetPassword", true);
Set(type, license, "MaxStorageGb", storage == 0 ? Int16.MaxValue : storage);
Set(type, license, "SelfHost", true);
Set(type, license, "UsersGetPremium", true);
Set(type, license, "UseCustomPermissions", true);
Set(type, license, "Version", 16);
Set(type, license, "Issued", DateTime.UtcNow);
Set(type, license, "Refresh", DateTime.UtcNow.AddYears(100).AddMonths(-1));
Set(type, license, "Expires", DateTime.UtcNow.AddYears(100));
Set(type, license, "ExpirationWithoutGracePeriod", DateTime.UtcNow.AddYears(100));
Set(type, license, "UsePasswordManager", true);
Set(type, license, "UseSecretsManager", true);
Set(type, license, "SmSeats", Int32.MaxValue);
Set(type, license, "SmServiceAccounts", Int32.MaxValue);
Set(type, license, "UseRiskInsights", true);
Set(type, license, "LimitCollectionCreationDeletion", true);
Set(type, license, "AllowAdminAccessToAllCollectionItems", true);
Set(type, license, "Trial", false);
Set(type, license, "LicenseType", Enum.Parse(licenseTypeEnum, "Organization"));
Set(type, license, "UseOrganizationDomains", true);
Set(type, license, "UseAdminSponsoredFamilies", true);
Set(type, license, "Hash", Convert.ToBase64String((Byte[])computeHash.Invoke(license, [])!));
Set(type, license, "Signature", Convert.ToBase64String((Byte[])sign.Invoke(license, [cert])!));
Console.WriteLine(JsonSerializer.Serialize(license, JsonOptions));
}
private static void Set(Type type, Object license, String name, Object value)
{
type.GetProperty(name)?.SetValue(license, value);
}
} }

View File

@@ -1,14 +1,10 @@
<Project Sdk="Microsoft.NET.Sdk"> <Project Sdk="Microsoft.NET.Sdk">
<PropertyGroup> <PropertyGroup>
<OutputType>Exe</OutputType> <OutputType>Exe</OutputType>
<TargetFramework>net8.0</TargetFramework> <TargetFramework>net8.0</TargetFramework>
</PropertyGroup> </PropertyGroup>
<ItemGroup> <ItemGroup>
<PackageReference Include="McMaster.Extensions.CommandLineUtils" Version="4.1.1" /> <PackageReference Include="McMaster.Extensions.CommandLineUtils" Version="4.1.1" />
<PackageReference Include="Newtonsoft.Json" Version="13.0.3" />
<PackageReference Include="System.Runtime.Loader" Version="4.3.0" /> <PackageReference Include="System.Runtime.Loader" Version="4.3.0" />
</ItemGroup> </ItemGroup>
</Project>
</Project>