[PM-33213] Remove FeatureFlag Around ResetPassword && PolicyRequirements#7188
[PM-33213] Remove FeatureFlag Around ResetPassword && PolicyRequirements#7188sven-bitwarden wants to merge 9 commits intomainfrom
Conversation
|
Claude finished @sven-bitwarden's task in 2m 55s —— View job Code Review: PM-33213 Remove FeatureFlag Around ResetPassword && PolicyRequirements
Reviewed commits: 9 commits on SummaryClean feature flag removal PR. The The FindingsNo new issues found. The previous review's suggestions (unused Overall assessment: Clean PR, no remaining concerns. |
| #nullable disable | ||
|
|
||
| using System.Text.Json; | ||
| using Bit.Core.AdminConsole.Entities; |
There was a problem hiding this comment.
🎨 SUGGESTED: _policyQuery is no longer used anywhere in this file after the UpdateUserResetPasswordEnrollmentAsync refactor. The field (line 50), constructor parameter (line 78), and assignment (line 104) should be removed -- matching the cleanup already done in OrganizationUsersController and OrganizationsController.
The removed import of Bit.Core.AdminConsole.Models.Data.Organizations.Policies (line 8 in old code) was the only ResetPasswordDataModel-related import cleaned up, but the IPolicyQuery references remain.
|
New Issues (2)Checkmarx found the following issues in this Pull Request
|
Codecov Report❌ Patch coverage is
Additional details and impacted files@@ Coverage Diff @@
## main #7188 +/- ##
==========================================
- Coverage 57.62% 57.61% -0.01%
==========================================
Files 2033 2033
Lines 89554 89510 -44
Branches 7976 7969 -7
==========================================
- Hits 51604 51573 -31
+ Misses 36086 36074 -12
+ Partials 1864 1863 -1 ☔ View full report in Codecov by Sentry. 🚀 New features to boost your workflow:
|
|





🎟️ Tracking
PM-33213
PM-24528
📔 Objective
AC is moving on from the PolicyRequirements feature flag, and committing to its removal (and subsequent enablement).
This PR handles the code around the ResetPassword flag, and is now using PolicyRequirements where it can. This resulted in quite a bit of good cleanup.
There was also a bug (PM-24528) that will be fixed along the way.
Note
Due to the way SSO users are JIT-provisioned, we have left the PolicyQuery intact for verifying the automatic enrollment status, and removed the PolicyRequirementQuery around that area.