Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[PM-16699] Add decrypt trace for decrypt failures #12749

Merged
merged 10 commits into from
Jan 9, 2025
Merged

Conversation

quexten
Copy link
Contributor

@quexten quexten commented Jan 8, 2025

🎟️ Tracking

#12681

📔 Objective

Same PR as #12681 but with decryption logic changes removed, so that it can be included in rc without overwhelming QA.

The other PR will be merged later, to improve the decrypt logic.

📸 Screenshots

⏰ Reminders before review

  • Contributor guidelines followed
  • All formatters and local linters executed and passed
  • Written new unit and / or integration tests where applicable
  • Protected functional changes with optionality (feature flags)
  • Used internationalization (i18n) for all UI strings
  • CI builds passed
  • Communicated to DevOps any deployment requirements
  • Updated any necessary documentation (Confluence, contributing docs) or informed the documentation team

🦮 Reviewer guidelines

  • 👍 (:+1:) or similar for great changes
  • 📝 (:memo:) or ℹ️ (:information_source:) for notes or general info
  • ❓ (:question:) for questions
  • 🤔 (:thinking:) or 💭 (:thought_balloon:) for more open inquiry that's not quite a confirmed issue and could potentially benefit from discussion
  • 🎨 (:art:) for suggestions / improvements
  • ❌ (:x:) or ⚠️ (:warning:) for more significant problems or concerns needing attention
  • 🌱 (:seedling:) or ♻️ (:recycle:) for future improvements or indications of technical debt
  • ⛏ (:pick:) for minor or nitpick changes

@quexten quexten changed the title Km/improve only logging [PM-16699] Add decrypt trace for logging failures Jan 8, 2025
@quexten quexten changed the title [PM-16699] Add decrypt trace for logging failures [PM-16699] Add decrypt trace for decrypt failures Jan 8, 2025
@quexten quexten marked this pull request as ready for review January 8, 2025 14:53
@quexten quexten requested review from a team as code owners January 8, 2025 14:53
@quexten quexten marked this pull request as draft January 8, 2025 14:54
@audreyality audreyality removed their request for review January 8, 2025 15:08
Copy link

codecov bot commented Jan 8, 2025

Codecov Report

Attention: Patch coverage is 86.84211% with 5 lines in your changes missing coverage. Please review.

Project coverage is 34.15%. Comparing base (4d576f0) to head (2c79a04).
Report is 4 commits behind head on main.

✅ All tests successful. No failed tests found.

Files with missing lines Patch % Lines
...ervices/master-password/master-password.service.ts 0.00% 2 Missing ⚠️
libs/common/src/vault/models/domain/cipher.ts 71.42% 2 Missing ⚠️
...bs/common/src/platform/models/domain/enc-string.ts 90.00% 0 Missing and 1 partial ⚠️
Additional details and impacted files
@@            Coverage Diff             @@
##             main   #12749      +/-   ##
==========================================
+ Coverage   34.13%   34.15%   +0.01%     
==========================================
  Files        2937     2937              
  Lines       90332    90350      +18     
  Branches    16958    16970      +12     
==========================================
+ Hits        30839    30863      +24     
+ Misses      57038    57031       -7     
- Partials     2455     2456       +1     

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

Copy link
Contributor

github-actions bot commented Jan 8, 2025

Logo
Checkmarx One – Scan Summary & Details6d57e448-2b5d-4fbd-bf38-90eed53ceea1

No New Or Fixed Issues Found

dani-garcia
dani-garcia previously approved these changes Jan 8, 2025
@quexten quexten marked this pull request as ready for review January 8, 2025 16:42
@djsmith85 djsmith85 requested a review from audreyality January 8, 2025 16:42
1,
null,
"cryptoKey",
"Property: name; ObjectContext: No Domain Context",
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🤔 Seems like this should identify that it's coming from a send. That way it'd be distinguished from the name on other domain objects.

@quexten quexten requested a review from dani-garcia January 8, 2025 17:36
@rr-bw
Copy link
Contributor

rr-bw commented Jan 8, 2025

Hey @quexten, auth changes look good, but I see two failing tests.

@quexten
Copy link
Contributor Author

quexten commented Jan 8, 2025

@rr-bw seems to just have been intermittent failure from some timeout. Updating the branch fixed it.

Copy link
Contributor

@Thomas-Avery Thomas-Avery left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM. One question I had for my clarity.

@@ -32,6 +32,7 @@ export class Password extends Domain {
},
orgId,
encKey,
"DomainType: PasswordHistory",
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Is there a reason not to have cipher context for the password history?

@quexten quexten merged commit 8cabb36 into main Jan 9, 2025
83 of 84 checks passed
@quexten quexten deleted the km/improve-only-logging branch January 9, 2025 19:23
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

6 participants