Patrick Pimentel
e6913dca03
Merge remote-tracking branch 'origin' into auth/pm-18720/change-password-component-non-dialog-v3
2025-06-23 15:39:09 -04:00
Patrick Pimentel
2d882436e7
fix(change-password-component): Change Password Update [18720] - Small changes.
2025-06-22 22:18:43 -04:00
Patrick Pimentel
735a114baa
fix(change-password-component): Change Password Update [18720] - Took org invite state out of service and made it accessible.
2025-06-22 21:40:21 -04:00
Jared Snider
bfb0b874ed
fix(Multi-Account-Logout: [Auth/PM-19555] Fix multi account logout on lock screens not redirecting properly ( #14630 )
...
* PM-19555 - LogoutService - build abstraction, default, and extension service and register with service modules
* PM-19555 - Lock Comp - use logoutService
* PM-19555 - LoginDecryptionOptions - Use logout service which removed need for extension-login-decryption-options.service
* PM-19555 - AccountSwitcher logic update - (1) Use logout service + redirect guard routing (2) Remove logout method from account switcher service (3) use new NewActiveUser type
* PM-19555 - Extension - Acct Switcher comp - clean up TODOs
* PM-19555 - Add TODOs for remaining tech debt
* PM-19555 - Add tests for new logout services.
* PM-19555 - Extension - LoginInitiated - show acct switcher b/c user is AuthN
* PM-19555 - Add TODO to replace LogoutCallback with LogoutService
* PM-19555 WIP
* PM-19555 - Extension App Comp - account switching to account in TDE locked state works now.
* PM-19555 - Extension App Comp - add docs
* PM-19555 - Extension App Comp - add early return
* PM-19555 - Desktop App Comp - add handling for TDE lock case to switch account logic.
* PM-19555 - Extension - Account Component - if account unlocked go to vault
* PM-19555 - Per PR feedback, clean up unnecessary nullish coalescing operator.
* PM-19555 - Extension - AppComponent - fix everHadUserKey merge issue
* PM-19555 - PR feedback - refactor switchAccount and locked message handling on browser & desktop to require user id. I audited all callsites for both to ensure this *shouldn't* error.
2025-06-13 13:22:04 -04:00
Patrick Pimentel
815f379c24
feat(change-password-component): Change Password Update [18720] - Removed unneeded code.
2025-06-11 21:56:23 -06:00
Patrick Pimentel
ef6dc1b80b
feat(change-password-component): Change Password Update [18720] - Removed comment.
2025-06-11 21:44:03 -06:00
Thomas Avery
c52e6a3f2c
[PM-22408] Remove setMasterKeyEncryptedUserKey from KeyService ( #15087 )
...
* Swap consumers to masterPasswordService.setMasterKeyEncryptedUserKey
* Remove setMasterKeyEncryptedUserKey from keyService
* unit tests
2025-06-11 15:48:18 -05:00
Patrick Pimentel
0e2d6f0a06
Merge remote-tracking branch 'origin' into auth/pm-18720/change-password-component-non-dialog-v3
2025-06-10 16:51:21 -06:00
Patrick Pimentel
28da2c9615
feat(change-password-component): Change Password Update [18720] - Found a bug, working on password policy being present on login.
2025-06-05 15:24:43 -04:00
Bernd Schoolmann
509af7b7bd
[PM-20235] Disable login with device masterpasswordhash flow ( #14236 )
...
* Disable login with device masterpasswordhash flow
* Remove old test
* Fix tests
* Undo changes to cargo lock
2025-06-05 16:52:48 +00:00
Patrick Pimentel
2c7da3bb0f
feat(change-password-component): Change Password Update [18720] - Should be working fully
2025-06-04 14:55:49 -04:00
Patrick Pimentel
29748e152f
fix(change-password-component): Change Password Update [18720] - Wrapping up changes.
2025-06-04 10:28:44 -04:00
Patrick Pimentel
45bc4929a1
Merge remote-tracking branch 'origin' into auth/pm-18720/change-password-component-non-dialog-v3
2025-06-03 09:53:12 -04:00
Patrick Pimentel
db16cf0115
refactor(change-password-component): Change Password Update [18720] - Fixed up policy service to be made more clear.
2025-06-02 21:09:28 -04:00
Bernd Schoolmann
23ec6bacc9
[PM-20225] Prevent legacy users without userkey from logging in ( #14267 )
...
* Prevent legacy users without userkey from logging in
* Remove further web-migration code for legacy users
* Add i18n for legacy user error message
* Update comment
* Remove migrate legacy component
* Remove i18n messages
* Remove migrate legacy encryption reference
2025-06-02 23:56:29 +02:00
Patrick Pimentel
bb11db344f
feat(change-password-component): Change Password Update [18720] - Org invite is seemingly working, found one bug to iron out.
2025-05-30 10:40:27 -04:00
Patrick Pimentel
06039927bb
feat(change-password-component): Change Password Update [18720] - Small changes and added some clarification on where I'm blocked
2025-05-28 22:16:49 -04:00
Patrick Pimentel
fc16411e18
Merge remote-tracking branch 'origin' into auth/pm-18720/change-password-component-non-dialog-v3
2025-05-28 13:00:40 -04:00
rr-bw
98e4551f70
fix(PasswordLoginStrategy): [Auth/PM-21913] Fix Weak MP Login Bug ( #14906 )
...
Adds an early `return` after receiving an `IdentityTwoFactorResponse`.
2025-05-23 12:02:01 -07:00
Patrick Pimentel
913b7ec5d6
feat(change-password-component): Change Password Update [18720] - More extension work
2025-05-22 19:11:09 -04:00
Patrick Pimentel
227df2fc86
fix(change-password-component): Change Password Update [18720] - Updates to routing and the extension. Extension is still a wip.
2025-05-22 15:59:45 -04:00
Justin Baur
07dc8808b2
Use sync option to skip token refresh after login ( #14581 )
2025-05-14 14:34:34 -04:00
Todd Martin
4c68f61d47
feat(CLI-SSO-Login): [Auth/PM-21116] CLI - SSO Login - Add SSO Org Identifier option ( #14605 )
...
* Add --identifier option for SSO on CLI
* Add option for identifier
* Moved auto-submit after the setting of client arguments
* Adjusted comment
* Changed to pass in as SSO option
* Renamed to orgSsoIdentifier for clarity
* Added more changes to orgSsoIdentifier.
2025-05-13 10:58:48 -04:00
Todd Martin
b8074a6f73
chore(feature-flag): Remove pm-9112-device-approval-persistence ( #14718 )
2025-05-12 15:18:02 -04:00
Todd Martin
eed18c9294
chore(view-cache): [PM-21154] Move view-cache its own feature package and adjust imports
...
* Moved view-cache services to directory
* Fixed DI for browser extension.
* Fixed tests.
2025-05-12 14:26:52 -04:00
Todd Martin
4191bb9533
chore(captcha): [PM-15162] Remove handling of captcha enforcement and bypass token
...
* Removed captcha references.
* Removed connectors from webpack
* Fixed extra parameter.
* Resolve merge conflicts.
* Fixed extra argument.
* Fixed failing tests.
* Fixed failing test.
* Accessibility cookie cleanup
* Cleaned up accessibility component.
* Deleted old registration endpoint
* Remove unused register request object.
* Fixed merge error that changed font family.
* Fixed formatting from merge.
* Linting
2025-05-09 10:44:11 -04:00
Alec Rippberger
3030eb7552
[PM-19212] Consolidate password set routing to AuthGuard using ForceSetPasswordReason ( #14356 )
...
* Consolidates component routing, removing routing to update-temp-password from components. All routing to update-temp-password should happen in the AuthGuard now.
---------
Co-authored-by: Jared Snider <jsnider@bitwarden.com >
Co-authored-by: Todd Martin <tmartin@bitwarden.com >
2025-05-08 11:24:52 -05:00
Bernd Schoolmann
af40ff26a2
[PM-21001] Move auth code to new encrypt service interface ( #14542 )
...
* Add new encrypt service functions
* Undo changes
* Cleanup
* Fix build
* Fix comments
* Move auth code to new encrypt service interface
2025-05-05 16:50:06 +02:00
Thomas Avery
d43e4757df
[PM-7604] Require target UserID for KdfConfigService ( #14380 )
...
* Require userId for KdfConfigService
* Update auth team callers
* Update tools team callers
2025-04-29 17:25:27 -05:00
Bernd Schoolmann
fd0db40f79
[PM-20492] Refactor symmetric keys - remove key buffer representation, migrate consumers to .toEncoded() ( #14371 )
...
* Refactor encrypt service to expose key wrapping
* Fix build
* Undo ts strict removal
* Fix wrong method being used to encrypt key material
* Rename parameters and remove todo
* Add summary to encrypt
* Update libs/common/src/key-management/crypto/services/encrypt.service.implementation.ts
Co-authored-by: Thomas Avery <43214426+Thomas-Avery@users.noreply.github.com >
* Update libs/common/src/key-management/crypto/services/encrypt.service.implementation.ts
Co-authored-by: Thomas Avery <43214426+Thomas-Avery@users.noreply.github.com >
* Update libs/common/src/key-management/crypto/services/encrypt.service.implementation.ts
Co-authored-by: Thomas Avery <43214426+Thomas-Avery@users.noreply.github.com >
* Update libs/common/src/key-management/crypto/services/encrypt.service.implementation.ts
Co-authored-by: Thomas Avery <43214426+Thomas-Avery@users.noreply.github.com >
* Update libs/common/src/key-management/crypto/abstractions/encrypt.service.ts
Co-authored-by: Thomas Avery <43214426+Thomas-Avery@users.noreply.github.com >
* Update libs/common/src/key-management/crypto/services/encrypt.service.implementation.ts
Co-authored-by: Thomas Avery <43214426+Thomas-Avery@users.noreply.github.com >
* Add tests for unhappy paths
* Add test coverage
* Add links
* Remove direct buffer access
* Fix build on cli
---------
Co-authored-by: Thomas Avery <43214426+Thomas-Avery@users.noreply.github.com >
2025-04-25 19:26:39 +02:00
Bernd Schoolmann
e231286f37
[PM-19731] Refactor encrypt service to expose key wrapping ( #14080 )
...
* Refactor encrypt service to expose key wrapping
* Fix build
* Undo ts strict removal
* Fix wrong method being used to encrypt key material
* Rename parameters and remove todo
* Add summary to encrypt
* Update libs/common/src/key-management/crypto/services/encrypt.service.implementation.ts
Co-authored-by: Thomas Avery <43214426+Thomas-Avery@users.noreply.github.com >
* Update libs/common/src/key-management/crypto/services/encrypt.service.implementation.ts
Co-authored-by: Thomas Avery <43214426+Thomas-Avery@users.noreply.github.com >
* Update libs/common/src/key-management/crypto/services/encrypt.service.implementation.ts
Co-authored-by: Thomas Avery <43214426+Thomas-Avery@users.noreply.github.com >
* Update libs/common/src/key-management/crypto/services/encrypt.service.implementation.ts
Co-authored-by: Thomas Avery <43214426+Thomas-Avery@users.noreply.github.com >
* Update libs/common/src/key-management/crypto/abstractions/encrypt.service.ts
Co-authored-by: Thomas Avery <43214426+Thomas-Avery@users.noreply.github.com >
* Update libs/common/src/key-management/crypto/services/encrypt.service.implementation.ts
Co-authored-by: Thomas Avery <43214426+Thomas-Avery@users.noreply.github.com >
* Add tests for unhappy paths
* Add test coverage
* Add links
---------
Co-authored-by: Thomas Avery <43214426+Thomas-Avery@users.noreply.github.com >
2025-04-22 13:56:39 +00:00
Bernd Schoolmann
43b1f55360
[PM-18697] Remove old symmetric key representations in symmetriccryptokey ( #13598 )
...
* Remove AES128CBC-HMAC encryption
* Increase test coverage
* Refactor symmetric keys and increase test coverage
* Re-add type 0 encryption
* Fix ts strict warning
* Remove old symmetric key representations in symmetriccryptokey
* Fix desktop build
* Fix test
* Fix build
* Update libs/common/src/key-management/crypto/services/web-crypto-function.service.ts
Co-authored-by: Thomas Avery <43214426+Thomas-Avery@users.noreply.github.com >
* Update libs/node/src/services/node-crypto-function.service.ts
Co-authored-by: Thomas Avery <43214426+Thomas-Avery@users.noreply.github.com >
* Undo changes
* Remove cast
* Undo changes to tests
* Fix linting
* Undo removing new Uint8Array in aesDecryptFastParameters
* Fix merge conflicts
* Fix test
* Fix another test
* Fix test
---------
Co-authored-by: Thomas Avery <43214426+Thomas-Avery@users.noreply.github.com >
2025-04-21 14:57:26 +00:00
Bernd Schoolmann
b09305577f
[PM-19603] Change asymmetric interface to only allow key encapsulation ( #14046 )
...
* Change asymmetric interface to only allow key encapsulation
* Fix naming
* Clean up naming
* Update libs/common/src/key-management/crypto/abstractions/encrypt.service.ts
Co-authored-by: Thomas Avery <43214426+Thomas-Avery@users.noreply.github.com >
* Update libs/common/src/key-management/crypto/services/encrypt.service.implementation.ts
Co-authored-by: Thomas Avery <43214426+Thomas-Avery@users.noreply.github.com >
* Update libs/common/src/key-management/crypto/abstractions/encrypt.service.ts
Co-authored-by: Thomas Avery <43214426+Thomas-Avery@users.noreply.github.com >
* Fix test
---------
Co-authored-by: Thomas Avery <43214426+Thomas-Avery@users.noreply.github.com >
2025-04-15 16:39:02 +02:00
Todd Martin
f7934b98c6
fix(login): [PM-11502] Support Remember Email option consistently
...
* Moved saving of SSO email outside of browser/desktop code
* Clarified comments.
* Tests
* Refactored login component services to manage state
* Fixed input on login component
* Fixed tests
* Linting
* Moved web setting in state into web override
* updated tests
* Fixed typing.
* Fixed type safety issues.
* Added comments and renamed for clarity.
* Removed method parameters that weren't used
* Added clarifying comments
* Added more comments.
* Removed test that is not necessary on base
* Test cleanup
* More comments.
* Linting
* Fixed test.
* Fixed base URL
* Fixed typechecking.
* Type checking
* Moved setting of email state to default service
* Added comments.
* Consolidated SSO URL formatting
* Updated comment
* Fixed reference.
* Fixed missing parameter.
* Initialized service.
* Added comments
* Added initialization of new service
* Made email optional due to CLI.
* Fixed comment on handleSsoClick.
* Added SSO email persistence to v1 component.
* Updated login email service.
* Updated setting of remember me
* Removed unnecessary input checking and rearranged functions
* Fixed name
* Added handling of Remember Email to old component for passkey click
* Updated v1 component to persist the email on Continue click
* Fix merge conflicts.
* Merge conflicts in login component.
* Persisted login email on v1 browser component.
* Merge conflicts
* fix(snap) [PM-17464][PM-17463][PM-15587] Allow Snap to use custom callback protocol
* Removed Snap from custom protocol workaround
* Fixed tests.
* Updated case numbers on test
* Resolved PR feedback.
* PM-11502 - LoginEmailSvcAbstraction - mark methods as abstract to satisfy strict ts.
* Removed test
* Changed to persist on leaving fields instead of button click.
* Fixed type checking.
---------
Co-authored-by: Bernd Schoolmann <mail@quexten.com >
Co-authored-by: Jared Snider <jsnider@bitwarden.com >
Co-authored-by: Jared Snider <116684653+JaredSnider-Bitwarden@users.noreply.github.com >
2025-04-10 18:58:49 -04:00
Bernd Schoolmann
5a1b0744f0
[PM-17665] Move cryptofunction service to km ( #13285 )
...
* Move cryptofunction service to km
* Fix formatting
* Fix import
* Fix build on desktop
* Fix build on browser and tests
2025-04-10 11:09:35 +02:00
Patrick-Pimentel-Bitwarden
1af8fe2012
feat(device-approval-persistence): [PM-19380] Device Approval Persistence ( #13958 )
...
* feat(device-approval-persistence): [PM-19380] Device Approval Persistence - Added lookup on standard auth requests.
* fix(device-approval-persistence): [PM-19380] Device Approval Persistence - Fixed issue with null value trying to be parsed from the fromJSON function.
---------
Co-authored-by: Todd Martin <tmartin@bitwarden.com >
2025-04-04 15:44:48 -04:00
Bernd Schoolmann
1450a033b3
[PM-19469] Add logs for unlock time ( #13972 )
...
* Add logs for unlock time
* Undo local flag override
* Update message
* Update messages
* Fix build on chrome
2025-04-02 23:19:53 +02:00
Bernd Schoolmann
22039d038d
[PM-3475] Remove deprecated keys ( #13266 )
...
* Remove deprecated keys
* Fix cli build
* Fix build
2025-03-31 16:58:02 +02:00
Patrick-Pimentel-Bitwarden
2e0c991f83
fix(device-approval-persistence): [PM-9112] Device Approval Persistence ( #13680 )
...
* feat(device-approval-persistence): [PM-9112] Device Approval Persistence - Added in view cache data needed to persist the approval process. Clears after 2 minutes.
2025-03-19 19:26:10 +00:00
Thomas Avery
a11536a424
[PM-17668] Move DeviceTrustService to KM ownership ( #13194 )
...
* move DeviceTrustService to KM ownership
* update codecov
2025-03-17 12:02:44 -05:00
Thomas Avery
81335978d8
[PM-17669] Move MasterPasswordService to KM ( #13148 )
...
* Move MasterPasswordService to KM
2025-03-13 13:29:27 -05:00
Thomas Avery
7e96b7a9a6
[PM-17670] Move KeyConnectorService to KM ownership ( #13277 )
...
* Move KeyConnectorService to KM ownership
* Add to codecov
* Move key connector request models
2025-03-13 09:46:01 -05:00
Patrick-Pimentel-Bitwarden
3b9be21fd7
fix(auth-routing): [PM-19018] SSO TDE Routing Fix - Fixed routing logic. ( #13778 )
...
* fix(auth-routing): [PM-19018] SSO TDE Routing Fix - Fixed routing logic.
* PM-19018 - TwoFactorAuthTests - remove tests that are no longer applicable as 2FA comp isn't responsible for setting admin account recovery flag into state.
* PM-19018 - LoginStrategyTests - add test for processing forcePasswordReset response
---------
Co-authored-by: Jared Snider <jsnider@bitwarden.com >
2025-03-10 21:20:11 -04:00
rr-bw
0568a09212
refactor(device-trust-toasts): [Auth/PM-11225] Refactor Toasts from Auth Services ( #13665 )
...
Refactor toast calls out of auth services. Toasts are now triggered by an observable emission that gets picked up by an observable pipeline in a new `DeviceTrustToastService` (libs/angular). That observable pipeline is then subscribed by by consuming the `AppComponent` for each client.
2025-03-10 12:17:46 -07:00
Jared Snider
92f027af5e
fix(LoginComp + LoginStrategies): [Auth/PM-18654] Refreshed UI - Desktop TDE JIT provisioned user creation errors with missing org SSO id ( #13619 )
...
* PM-18654 - State Service & Login Strategy Refactor - move env seeding into login strategy so that new accounts always load w/ the correct environment
* PM-18654 - SSO Comp - just use user id from auth result
* PM-18654 - Config Service - (1) don't allow cascading calls to the renewConfig by using a private promise (2) Replace shareReplay with share configured with manual timer
* PM-18654 - LoginComponents - detail issue and possible fix
* PM-18654 - DesktopLoginV1Comp - use correct destroy hook
* PM-18654 - LoginComp - clean up no longer correct comment
* PM-18654 - New Device Verification Component - Remove unused PasswordLoginStrategy dependency
* PM-18654 - Browser Home Component - fix qParam logic
* PM-18654 - DefaultConfigService - revert changes as they aren't necessary to fix the bug.
* PM-18654 - DefaultConfigService - remove commented code
* PM-18654 - LoginStrategy - add comment
* PM-18654 - Fix login strat tests
2025-03-03 12:09:35 -05:00
Jake Fink
43f5423e78
[PM-12606] Move Vault Timeout and Vault Timeout Settings to KM ( #13405 )
...
* move vault timeout and vault timeout settings to km
* move browser vault timeout service to km
* fix cli import
* fix imports
* fix some relative imports
* use relative imports within common
* fix imports
* fix new imports
* Fix new imports
* fix spec imports
2025-02-28 09:55:03 -05:00
Todd Martin
ec488e4f84
[PM-18664] Prevent display of Auth Request notification on triggering device ( #13597 )
...
* Send device identifier in header.
* Added null to apiUrl property for strict typing.
* Added null to apiUrl for strict typing.
2025-02-27 10:00:52 -05:00
rr-bw
359007ab8d
fix(auth): [PM-18639] Resend Admin Auth Request After Previous Denial ( #13574 )
2025-02-26 11:44:41 -08:00
Jared Snider
acbff6953c
feat(2FA-UI-Refresh): [Auth/PM-8113] - 2FA Components Consolidation and UI Refresh ( #12087 )
...
* PM-8113 - Deprecate TwoFactorComponentRefactor feature flag in favor of UnauthenticatedExtensionUIRefresh flag
* PM-8113 - Rename all existing 2FA components as V1.
* PM-8113 - TwoFactorAuthComp - Add comment explaining that tagged unused import is used a dialog.
* PM-8113 - 2FA Auth Comp - deprecate captcha
* PM-8113 - LoginStrategySvc - add todo for deprecation of captcha response
* PM-8113 - TwoFactorAuth tests - remove captcha
* PM-8113 - TwoFactorAuthComp HTML - remove captcha
* PM-8113 - Web Two Factor Auth - update deps
* PM-8113 - Move all new two-factor-auth components into libs/auth instead of libs/angular/src/auth
* PM-8113 - Add new child-components folder to help differentiate between top level page component and child components
* PM-8113 - Add todo for browser TwoFactorAuthEmailComponent
* PM-8113 - TwoFactorAuth - progress on consolidation
* PM-8113 - TwoFactorAuth - add TODO to ensure I don't miss web on success logic
* PM-8113 - TwoFactorAuth - Deprecate browser implementation of two-factor-auth and move all logic into single component - WIP
* PM-8113 - Bring across 2FA session timeout to new 2FA orchestrator comp
* PM-8113 - Export TwoFactorAuth from libs/auth
* PM-8113 - Fix 2FA Auth Comp tests by adding new service deps.
* PM-8113 - Fix TwoFactorAuthExpiredComp imports + TwoFactorAuthComponent imports on other clients.
* PM-8113 - 2FA Auth Comp - Progress on removing onSuccessfulLogin callback
* PM-8113 - 2FA Auth - update deps to private as inheritance will no longer be used.
* PM-8113 - TwoFactorAuthComp - Refactor init a bit.
* PM-8113 - TwoFactorAuthComp - More naming refactors
* PM-8113 - TwoFactorAuth - (1) more refactoring (2) removed onSuccessfulLoginNavigate (3) after successful login we always loginEmailService.clearValues()
* PM-8113 - TwoFactorAuthComp Tests - clean up tests for removed callbacks.
* PM-8113 - TwoFactorAuthComponent - refactor default success route handling
* PM-8113 - TwoFactorAuthComp - More refactoring
* PM-8113 - TwoFactorAuthComp - more refactors
* PM-8113 - TwoFactorAuth - Remove unused service dep
* PM-8113 - TwoFactorAuthComp - Refactor out unused button action text and move checks for continue button visibility into component
* PM-8113 - TwoFactorAuthComponent - Add type for providerData
* PM-8113 - TwoFactorAuthComponent - Add todo
* PM-8113 - TwoFactorAuthComponent - Add client type
* PM-8113 - TwoFactorAuth - implement browser specific SSO + 2FA logic
* PM-8113 - TwoFactorService Abstraction - refactor to use proper functions + mark methods as abstract properly + add null return to getProviders
* PM-8113 - Refactor 2FA Guard logic out of ngOnInit and into own tested guard. Updated all routes.
* PM-8113 - TwoFactorAuthComponent - WIP on webauthn init.
* PM-8113 - TwoFactorAuthComponent - pull webauthn fallback response handling into primary init with checks based on client for if it should be processed.
* PM-8113 - TwoFactorAuthComponent - move linux popup width extension logic into ExtensionTwoFactorAuthComponentService
* PM-8113 - WebTwoFactorAuthComponentService - add explicit override for web's determineLegacyKeyMigrationAction method.
* PM-8113 - Implement new TwoFactorAuthComponentService .openPopoutIfApprovedForEmail2fa to replace extension specific init logic.
* PM-8113 - TwoFactorAuthComponent - misc cleanup
* PM-8113 - TwoFactorAuthComponent - more clean up
* PM-8113 - TwoFactorAuthComponent - WIP on removing TDE callbacks
* PM-8113 - TwoFactorAuthComponent - finish refactoring out all callbacks
* PM-8113 - TwoFactorAuthComponent - remove now unused method
* PM-8113 - TwoFactorAuthComponent - refactor routes.
* PM-8113 - TwoFactorAuthComponent - add TODO
* PM-8113 - TwoFactorAuthComp - isTrustedDeviceEncEnabled - add undefined check for optional window close. + Add todo
* PM-8113 - TwoFactorAuthComponent tests - updated to pass
* PM-8113 - (1) Consolidate TwoFactorAuthEmail component into new service architecture (2) Move openPopoutIfApprovedForEmail2fa to new TwoFactorAuthEmailComponentService
* PM-8113 - Refactor libs/auth/2fa into barrel files.
* PM-8113 - Move TwoFactorAuthEmail content to own folder.
* PM-8113 - Move 2FA Duo to own comp folder.
* PM-8113 - ExtensionTwoFactorAuthEmailComponentService - Add comment
* PM-8113 - TwoFactorAuthEmailComponentService - add docs
* PM-8113 - TwoFactorAuthDuoComponentService - define top level abstraction and each clients implementation of the duo2faResultListener
* PM-8113 - TwoFactorAuthDuoCompService - add client specific handling for launchDuoFrameless
* PM-8113 - Delete no longer used client specific two factor auth duo components.
* PM-8113 - Register TwoFactorAuthDuoComponentService implementation in each client.
* PM-8113 - TwoFactorAuthComp - add destroy ref to fix warnings.
* PM-8113 - Remove accidentally checked in dev change
* PM-8113 - TwoFactorAuthComp - (1) Add loading state (2) Add missing CheckboxModule import
* PM-8113 - TwoFactorAuthDuoComponent - update takeUntilDestroyed to pass in destroy context as you can't use takeUntilDestroyed in ngOnInit without it.
* PM-8113 - TwoFactorAuthWebAuthnComponent - remove no longer necessary webauthn new tab check as webauthn seems to work without it
* PM-8113 - TwoFactorAuthWebAuthnComp - refactor names and add todo
* PM-8113 - (1) Move WebAuthn 2FA comp to own folder (2) build out client service for new tab logic
* PM-8113 - Register TwoFactorAuthWebAuthnComponentServices
* PM-8113 - Tweak TwoFactorAuthWebAuthnComponentService and add to TwoFactorAuthWebAuthnComponent
* PM-8113 - WebTwoFactorAuthDuoComponentService - fix type issue
* PM-8113 - ExtensionTwoFactorAuthDuoComponentService - attempt to fix type issue.
* PM-8113 - Remove ts-strict-ignore
* PM-8113 - TwoFactorAuthWebAuthnComponent - satisfy strict typescript reqs.
* PM-8113 - TwoFactorAuthComponent - some progress on strict TS conversion
* PM-8113 - TwoFactorAuthComp - fixed all strict typescript issues.
* PM-8113 - TwoFactorAuthComp - remove no longer necessary webauthn code
* PM-8113 - ExtensionTwoFactorAuthComponentService - handleSso2faFlowSuccess - add more context
* PM-8113 - TwoFactorAuthComp - TDE should use same success handler method
* PM-8113 - Fix SSO + 2FA result handling by closing proper popout window
* PM-8113 - Add todo
* PM-8113 - Webauthn 2FA - As webauthn popout doesn't persist SSO state, have to genercize success logic (which should be a good thing but requires confirmation testing).
* PM-8113 - Per main changes, remove deprecated I18nPipe from 2fa comps that use it.
* PM-8113 - Remove more incorrect i18nPipes
* PM-8113 - TwoFactorAuth + Webauthn - Refactor logic
* PM-8113 - TwoFactorAuth - build submitting loading logic
* PM-8113 - TwoFactorAuth - remove loading as submitting.
* PM-8113 - TwoFactorAuth - update to latest authN session timeout logic
* PM-8113 - AuthPopoutWindow - Add new single action popout for email 2FA so we can close it programmatically
* PM-8113 - Update ExtensionTwoFactorAuthComponentService to close email 2FA single action popouts.
* PM-8113 - Fix build after merge conflict issue
* PM-8113 - 2FA - Duo & Email comps - strict typescript adherence.
* PM-8113 - TwoFactorAuth - Clean up unused stuff and get tests passing
* PM-8113 - Clean up used service method + TODO as I've confirmed it works for other flows.
* PM-8113 - TODO: test all comp services
* PM-8113 - TwoFactorAuthComponent Tests - fix tests by removing mock of removed method.
* PM-8113 - Revert changes to login strategies to avoid scope creep for the sake of typescript strictness.
* PM-8113 - ExtensionTwoFactorAuthComponentService tests
* PM-8113 - Test ExtensionTwoFactorAuthDuoComponentService
* PM-8113 - ExtensionTwoFactorAuthEmailComponentService - add tests
* PM-8113 - Test ExtensionTwoFactorAuthWebAuthnComponentService
* PM-8113 - Add 2fa icons (icons need tweaking still)
* PM-8113 - TwoFactorAuthComponent - add setAnonLayoutDataByTwoFactorProviderType and handle email case as POC
* PM-8113 - TwoFactorEmailComp - work on converting to new design
* PM-8113 - Update icons with proper svg with scaling via viewbox
* PM-8113 - Update icons to use proper classes
* PM-8113 - 2FA Auth Comp - Progress on implementing design changes
* PM-8113 - TwoFactorOptionsComponent - add todos
* PM-8113 - 2fa Email Comp - add style changes per discussion with design
* PM-8113 - TwoFactorAuthComponent - use2faRecoveryCode - build out method per discussion with design
* PM-8113 - TwoFactorAuthComp - fix comp tests
* PM-8113 - TwoFactorAuthComp - progress on adding 2fa provider page icons and subtitles
* PM-8113 - Browser Translations - update duoTwoFactorRequiredPageSubtitle to match design discussion
* PM-8113 - TwoFactorAuthComp - more work on getting page title / icons working
* PM-8113 - Add todo
* PM-8113 - TwoFactorAuthDuoComponent Html - remove text that was moved to page subtitle.
* PM-8113 - 2FA Auth Comp - Duo icon works
* PM-8113 - (1) Add Yubico logo icon (2) Rename Yubikey icon to security key icon
* PM-8113 - TwoFactorAuthComp - remove icon from launch duo button per figma
* PM-8113 - Mark old two-factor-options component as v1.
* PM-8113 - Web - TwoFactorOptionsComponentV1 - Fix import
* PM-8113 - Fix more imports
* PM-8113 - Adjust translations based on meeting with Design
* PM-8113 - TwoFactorOptionsComponent - deprecate recovery code functionality
* PM-8113 - TwoFactorOptionsComponent - remove icon disable logic and unused imports
* PM-8113 - 2FA Options Comp rewritten to match figma
* PM-8113 - TwoFactorOptions - (1) Sort providers like setup screen (2) Add responsive scaling
* PM-8113 - Webauthn 2FA - WIP on updating connectors to latest style
* PM-8113 - Webauthn connector - clean up commented out code and restore block style
* PM-8113 - TwoFactorAuthWebAuthn - Add loading state for iframe until webauthn ready
* PM-8113 - Webauthn Iframe - update translation per figma
* PM-8113 - TwoFactorAuthComp - per figma, put webauthn after checkbox.
* PM-8113 - WebAuthn Fallback connector - UI refreshed
* PM-8113 - Two Factor Options - Implement wrapping
* PM-8113 - TwoFactorAuthAuthenticator - Remove text per figma
* PM-8113 - TwoFactorAuthYubikey - Clean up design per figma
* PM-8113 - Refactor all 2FA flows to use either reactive forms or programmatic submission so we get the benefit of onSubmit form validation like we have elsewhere.
* PM-8113 - 2FA Auth Comp - for form validated 2FA methods, add enter support.
* PM-8113 - TwoFactorAuthComp - Add loginSuccessHandlerService
* PM-8113 - DesktopTwoFactorAuthDuoComponentService - add tests
* PM-8113 - WebTwoFactorAuthDuoComponentService test file - WIP on tests
* PM-8113 - WebTwoFactorAuthDuoComponentService - test listenForDuo2faResult
* PM-8113 - TwoFactorAuthComp - (1) remove unused deps (2) get tests passing
* PM-8113 - Add required to inputs
* PM-8113 - TwoFactorAuth - Save off 2FA providers map so we can only show the select another 2FA method if the user actually has more than 1 configured 2FA method.
* PM-8113 - Webauthn iframe styling must be adjusted per client so adjust desktop and browser extension
* PM-8113 - TwoFactorAuthComp - Integrate latest ssoLoginService changes
* PM-8113 - Desktop & Browser routing modules - add new page title per figma
* PM-8113 - WebAuthn - added optional awaiting security key interaction button state to improve UX.
* PM-8113 - TwoFactorAuthComp - refactor to avoid reactive race condition with retrieval of active user id.
* PM-8113 - ExtensionTwoFactorAuthEmailComponentService - force close the popup since it has stopped closing when the popup opens.
* PM-8113 - TwoFactorAuth - refactor enter key press to exempt non-applicable flows from enter key handling
* PM-8113 - Refactor ExtensionTwoFactorAuthComponentService methods to solve issues with submission
* PM-8113 - TwoFactorAuth - fix programmatic submit of form
* PM-8113 - Fix ExtensionTwoFactorAuthComponentService tests
* PM-8113 - Extension - Webauthn iframe - remove -10px margin
* PM-8113 - Extension Routing module - 2FA screens need back button
* PM-8113 - Get Duo working in extension
* PM-8113 - TwoFactorOptions - tweak styling of row styling to better work for extension
* PM-8113 - TwoFactorWebauthnComp - new tab button styling per figma
* PM-8113 - 2FA Comp - Update logic for hiding / showing the remember me checkbox
* PM-8113 - TwoFactorAuthWebAuthnComp - new tab flow - fix remember me
* PM-8113 - Per PR feedback, add TODO for better provider and module structure for auth component client logic services.
* PM-8113 - TwoFactorAuth - add missing TDE offboarding logic.
* PM-8113 - TwoFactorAuthComponent tests - fix tests
* PM-8113 - 2FA Auth Comp HTML - per PR feedback, remove unnecessary margin bottom
* PM-8113 - 2FA Comp - per PR feedback, remove inSsoFlow as it isn't used.
* PM-8113 - TwoFactorOptionsComp - Clean up no longer needed emitters.
* PM-8113 - TwoFactorOptions - per PR feedback, clean up any usage
* PM-8113 - TwoFactorAuthComp - per PR feedback, rename method from selectOtherTwofactorMethod to selectOtherTwoFactorMethod
* PM-8113 - Per PR feedback, fix translations misspelling
* PM-8113 - TwoFactorAuthSecurityKeyIcon - fix hardcoded value
* PM-8113 - TwoFactorAuthSecurityKeyIcon - fix extra "
* PM-8113 - TwoFactorAuthDuo - Per PR feedback, remove empty template.
* PM-8113 - LooseComponentsModule - re-add accidentally removed component
* PM-8113 - TwoFactorAuthWebAuthnIcon - per PR feedback, fix hardcoded stroke value.
* PM-8113 - Desktop AppRoutingModule - per PR feedback, remove unnecessary AnonLayoutWrapperComponent component property.
* PM-8113 - Update apps/browser/src/auth/services/extension-two-factor-auth-duo-component.service.spec.ts to fix misspelling
Co-authored-by: rr-bw <102181210+rr-bw@users.noreply.github.com >
* PM-8113 - TwoFactorAuthComp - Per PR feedback, add trim to token value
* PM-8113 - TwoFactorService - add typescript strict
* PM-8113 - TwoFactorService - per PR feedback, add jsdocs
* PM-8113 - Per PR feedback, fix misspelling
* PM-8113 - Webauthn fallback - per PR feedback fix stroke
* PM-8113 - Update apps/web/src/connectors/webauthn-fallback.html
Co-authored-by: rr-bw <102181210+rr-bw@users.noreply.github.com >
* PM-8113 - Update libs/auth/src/angular/icons/two-factor-auth/two-factor-auth-webauthn.icon.ts
Co-authored-by: rr-bw <102181210+rr-bw@users.noreply.github.com >
---------
Co-authored-by: rr-bw <102181210+rr-bw@users.noreply.github.com >
2025-02-24 09:59:14 -05:00
Todd Martin
077e0f89cc
[PM-17751] Store SSO email in state on web client ( #13295 )
...
* Moved saving of SSO email outside of browser/desktop code
* Clarified comments.
* Tests
* Refactored login component services to manage state
* Fixed input on login component
* Fixed tests
* Linting
* Moved web setting in state into web override
* updated tests
* Fixed typing.
* Fixed type safety issues.
* Added comments and renamed for clarity.
* Removed method parameters that weren't used
* Added clarifying comments
* Added more comments.
* Removed test that is not necessary on base
* Test cleanup
* More comments.
* Linting
* Fixed test.
* Fixed base URL
* Fixed typechecking.
* Type checking
* Moved setting of email state to default service
* Added comments.
* Consolidated SSO URL formatting
* Updated comment
* Fixed reference.
* Fixed missing parameter.
* Initialized service.
* Added comments
* Added initialization of new service
* Made email optional due to CLI.
* Fixed comment on handleSsoClick.
* Added SSO email persistence to v1 component.
---------
Co-authored-by: Bernd Schoolmann <mail@quexten.com >
2025-02-21 17:09:50 -05:00