Skip to content

feat(change-password): [PM-18720] (#5319) Change Password Implementation for Non Dialog Cases #15319

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Draft
wants to merge 92 commits into
base: main
Choose a base branch
from

Conversation

Patrick-Pimentel-Bitwarden
Copy link
Contributor

@Patrick-Pimentel-Bitwarden Patrick-Pimentel-Bitwarden commented Jun 24, 2025

🎟️ Tracking

https://bitwarden.atlassian.net/browse/PM-18720

📔 Objective

This work aims to utilize the change password shared component for the following flows:

  • Admin recovery
  • Login weak password
  • Org invite weak password

Tweaks to the order of operations we are doing in the password-login.strategy and the login.component were made as well to try to reduce complexity / duplicate pw checking. There is a separate pr with more changes that we had to step back from because it was growing too great in scope and we want to work with the AC team to assist in some of those changes. The complexity of this task grew because we originally had two separate components that existed specifically in the web component that could be used / routed to independently. Now that we have one shared component, that grew the scope and there were unforeseen changes.

Other work

  • Addressing related tech debt
    • Sorting of params
    • Typos for i18n strings

Here are the reasons for the other group's involvement:

  • team-platform-dev < new default / web components registered in web/browser/extension
  • team-billing-dev < change of service to organization invite service 1 line code change
  • team-admin-console-dev < ability to merge master password policy options and not just policy data [] because at login, prior to sync we want to merge any invite master password policy data with the master password policy data that comes back from our identity response

📸 Screenshots

Org Invite Scenarios (Web only):

Weak password Weak password + 2FA
Weak password Weak password + 2FA

Login with Weak Password

Web Desktop Extension
No 2FA Login–Web Login–Desktop Login–Extension
With 2FA Login+2FA–Web Login+2FA–Desktop Login+2FA–Extension

Admin Account Recovery

Web Desktop Extension
No 2FA Recovery – Web Recovery – Desktop Recovery – Extension
With 2FA Recovery + 2FA – Web Recovery + 2FA – Desktop Recovery + 2FA – Extension

Video Flows FF Off

Org Invite, Admin account recovery, Login with weak password

[STUB]

2FA and New Device Verification Flows

[STUB]

⏰ Reminders before review

  • Contributor guidelines followed
  • All formatters and local linters executed and passed
  • Written new unit and / or integration tests where applicable
  • Protected functional changes with optionality (feature flags)
  • Used internationalization (i18n) for all UI strings
  • CI builds passed
  • Communicated to DevOps any deployment requirements
  • Updated any necessary documentation (Confluence, contributing docs) or informed the documentation team

🦮 Reviewer guidelines

  • 👍 (:+1:) or similar for great changes
  • 📝 (:memo:) or ℹ️ (:information_source:) for notes or general info
  • ❓ (:question:) for questions
  • 🤔 (:thinking:) or 💭 (:thought_balloon:) for more open inquiry that's not quite a confirmed issue and could potentially benefit from discussion
  • 🎨 (:art:) for suggestions / improvements
  • ❌ (:x:) or ⚠️ (:warning:) for more significant problems or concerns needing attention
  • 🌱 (:seedling:) or ♻️ (:recycle:) for future improvements or indications of technical debt
  • ⛏ (:pick:) for minor or nitpick changes

… Removed temp code to force the state I need to verify correctness.
… Recover account working with change password component.
…tes to routing and the extension. Extension is still a wip.
…sing work for now while we wait for product to hear back.
…e comments regarding the change password routing complexities with change-password and auth guard.
…id some changes because they will be conflicts later on.
…ll changes and added some clarification on where I'm blocked
… invite is seemingly working, found one bug to iron out.
… Fixed up policy service to be made more clear.
… Routing changes and policy service changes.
Copy link

sonarqubecloud bot commented Jul 2, 2025

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants