Skip to content

[PM-33232] Update UX implemented in PM-33219 to resolve VULN-458#7204

Open
harr1424 wants to merge 4 commits intomainfrom
PM-33232-Update-UX-implemented-in-PM-33219-to-resolve-VULN-458
Open

[PM-33232] Update UX implemented in PM-33219 to resolve VULN-458#7204
harr1424 wants to merge 4 commits intomainfrom
PM-33232-Update-UX-implemented-in-PM-33219-to-resolve-VULN-458

Conversation

@harr1424
Copy link
Contributor

🎟️ Tracking

https://bitwarden.atlassian.net/browse/PM-33232

📔 Objective

Given a user has an existing 'Who can view' setting configured, when they switch the 'Who can view' option and select Save, then the previous 'Who can view' method is removed and replaced with the newly selected option

Given a user switches the 'Who can view' setting, when they select Save, then the updated setting is reflected immediately in the UI

Given a user switches the 'Who can view' setting, when they select Save, then the updated setting persists after leaving and returning to the screen

Given the above behavior, when tested across web, desktop, and mobile clients, then all clients reflect the same expected behavior

@harr1424 harr1424 requested review from a team as code owners March 12, 2026 02:26
@harr1424 harr1424 requested a review from quexten March 12, 2026 02:26
@github-actions
Copy link
Contributor

github-actions bot commented Mar 12, 2026

Logo
Checkmarx One – Scan Summary & Details865404cf-9f80-41c5-851a-eb08c1066967

Great job! No new security vulnerabilities introduced in this pull request

@codecov
Copy link

codecov bot commented Mar 12, 2026

Codecov Report

❌ Patch coverage is 41.66667% with 21 lines in your changes missing coverage. Please review.
✅ Project coverage is 57.42%. Comparing base (7677107) to head (92d1a41).
⚠️ Report is 3 commits behind head on main.

Files with missing lines Patch % Lines
src/Api/Tools/Models/Request/SendRequestModel.cs 41.66% 18 Missing and 3 partials ⚠️
Additional details and impacted files
@@            Coverage Diff             @@
##             main    #7204      +/-   ##
==========================================
- Coverage   57.43%   57.42%   -0.01%     
==========================================
  Files        2032     2032              
  Lines       89377    89432      +55     
  Branches     7944     7955      +11     
==========================================
+ Hits        51331    51359      +28     
- Misses      36203    36225      +22     
- Partials     1843     1848       +5     

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

🚀 New features to boost your workflow:
  • ❄️ Test Analytics: Detect flaky tests, report on failures, and find test suite problems.
  • 📦 JS Bundle Analysis: Save yourself from yourself by tracking and limiting bundle sizes in JS merges.

quexten
quexten previously approved these changes Mar 12, 2026
}
else if (existingSend.AuthType == Core.Tools.Enums.AuthType.Email)

existingSend.AuthType = AuthType;
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The older code handled the scenario where no auth type was sent by the client. We have to assume some older clients will still be sending send-related requests

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Please see 42d99c9

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I've also updated the exception message to match the behavior change in 3c6e23f

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

What if an older client is setting the password or email verification list (i.e. Emails or Password is set in the model), the auth type would be null and so the emails or password information would be lost

Copy link
Contributor Author

@harr1424 harr1424 Mar 12, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I've made changes to use the presence of AuthType in the request to conditionally execute the new logic. 92d1a41

@sonarqubecloud
Copy link

@harr1424 harr1424 requested a review from quexten March 13, 2026 15:55
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants