- 
                Notifications
    
You must be signed in to change notification settings  - Fork 1.5k
 
[PM-24467] Introduce cipher risk service #17009
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
| 
           Claude finished @shane-melton's task —— View job Code Review Complete ✓Summary of Changes Since Last ReviewThis PR introduces a new  
 9 commits were added since the initial implementation, including improvements based on earlier feedback (using  Critical Issues Found1. 
 | 
    
| 
           
 Great job! No new security vulnerabilities introduced in this pull request | 
    
d8558f0    to
    d1a50bb      
    Compare
  
    There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM - minor naming question.
| ); | ||
| } | ||
| 
               | 
          ||
| async computeCipherRiskForUser( | 
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
suggestion (non-blocking): Is forUser the appropriate qualifier here? This is more about a specific cipher than a specific user.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'm not strongly attached to that qualifier, this is just a convenience method that builds the password use map using the all of the specified user's ciphers/Vault (instead of the caller passing in their own list of ciphers). Perhaps, *ForUserVault be more clear?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I was thinking mo,re along the lines of *ForCipher since it's calculating a specific/single cipher, but I understand now that you intended it to mean "using the User's vault" - I don't have a better suggestion to convey that (naming is hard).
          Codecov Report❌ Patch coverage is  Additional details and impacted files@@            Coverage Diff             @@
##             main   #17009      +/-   ##
==========================================
+ Coverage   40.42%   40.44%   +0.01%     
==========================================
  Files        3503     3505       +2     
  Lines      100080   100118      +38     
  Branches    15011    15018       +7     
==========================================
+ Hits        40458    40493      +35     
- Misses      57904    57905       +1     
- Partials     1718     1720       +2     ☔ View full report in Codecov by Sentry. 🚀 New features to boost your workflow:
  | 
    

🎟️ Tracking
PM-24467
📔 Objective
Introduce the
CipherRiskServiceand have it call the SDK client using theCipherRiskClientintroduced in bitwarden/sdk-internal#499.⏰ Reminders before review
🦮 Reviewer guidelines
:+1:) or similar for great changes:memo:) or ℹ️ (:information_source:) for notes or general info:question:) for questions:thinking:) or 💭 (:thought_balloon:) for more open inquiry that's not quite a confirmed issue and could potentially benefit from discussion:art:) for suggestions / improvements:x:) or:warning:) for more significant problems or concerns needing attention:seedling:) or ♻️ (:recycle:) for future improvements or indications of technical debt:pick:) for minor or nitpick changes