1
0
mirror of https://github.com/bitwarden/browser synced 2026-02-09 21:20:27 +00:00

Removing unnecessary comments

This commit is contained in:
Tom
2025-04-21 14:21:56 -04:00
parent ac325fbfcb
commit 014a4335f7
9 changed files with 125726 additions and 2 deletions

View File

@@ -0,0 +1,12 @@
[NX v20.8.0 Daemon Server] - 2025-04-18T15:07:00.333Z - Started listening on: \\.\pipe\nx\C:\Users\Tom\AppData\Local\Temp\0a7d109ce06d7ee98aa8\d.sock
[NX v20.8.0 Daemon Server] - 2025-04-18T15:07:00.341Z - [WATCHER]: Subscribed to changes within: C:\dev\clients (native)
[NX v20.8.0 Daemon Server] - 2025-04-18T15:07:00.346Z - Established a connection. Number of open connections: 1
[NX v20.8.0 Daemon Server] - 2025-04-18T15:07:00.348Z - Established a connection. Number of open connections: 2
[NX v20.8.0 Daemon Server] - 2025-04-18T15:07:00.350Z - Closed a connection. Number of open connections: 1
[NX v20.8.0 Daemon Server] - 2025-04-18T15:07:00.354Z - [REQUEST]: Responding to the client. Shutdown initiated
[NX v20.8.0 Daemon Server] - 2025-04-18T15:07:00.355Z - Done responding to the client Shutdown initiated
[NX v20.8.0 Daemon Server] - 2025-04-18T15:07:00.356Z - Handled FORCE_SHUTDOWN. Handling time: 1. Response time: 2.
[NX v20.8.0 Daemon Server] - 2025-04-18T15:07:00.356Z - Closed a connection. Number of open connections: 0
[NX v20.8.0 Daemon Server] - 2025-04-18T15:07:00.357Z - [WATCHER]: Stopping the watcher for C:\dev\clients (sources)
[NX v20.8.0 Daemon Server] - 2025-04-18T15:07:00.357Z - [WATCHER]: Stopping the watcher for C:\dev\clients (outputs)
[NX v20.8.0 Daemon Server] - 2025-04-18T15:07:00.358Z - Server stopped because: "Request to shutdown"

File diff suppressed because it is too large Load Diff

View File

@@ -0,0 +1 @@
9982965536842957328

Binary file not shown.

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

View File

@@ -50,7 +50,6 @@ describe("RiskInsightsReportService", () => {
let testCase = testCaseResults[0];
expect(testCase).toBeTruthy();
expect(testCase.cipherMembers).toHaveLength(2);
// When by domain, the result should be 2
expect(testCase.trimmedUris).toHaveLength(2);
expect(testCase.weakPasswordDetail).toBeTruthy();
expect(testCase.exposedPasswordDetail).toBeTruthy();

View File

@@ -428,7 +428,6 @@ export class RiskInsightsReportService {
const cipherUris: string[] = [];
const uris = cipher.login?.uris ?? [];
uris.map((u: { uri: string }) => {
// Aggregating by domain by request.
const uri = Utils.getDomain(u.uri);
if (!cipherUris.includes(uri)) {
cipherUris.push(uri);