-
Notifications
You must be signed in to change notification settings - Fork 1.5k
[PM-27012] Transfer Archived Cipher to Org #6626
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
|
Claude finished @nick-livefront's task —— View job Code Review CompleteSummaryThis PR removes archived cipher validation checks that previously prevented sharing archived items with organizations. The changes align with a new architecture where archived state is tied to users rather than ciphers. The removals are clean and appropriately covered by corresponding test deletions. FindingsFinding 1: PR title and objective need clarification to accurately reflect the scope of changes 💭 The PR title "PM-27012 Transfer Archived Cipher to Org" and objective focus on "data ownership" but the code changes specifically remove validation checks that prevented sharing archived ciphers. The PR description states "removes checks that originally removed the ability to share a cipher" which is accurate, but the title/objective could be clearer. Suggested improvementsTitle suggestion: Objective clarification: Finding 2: Consider documenting the architectural change that enables this modification 💭 The removed validation checks were protecting against what was previously considered invalid state (archived ciphers in organizations). With the architecture change making archived state user-specific, these checks are no longer necessary. However, there's no inline documentation explaining why these checks were safe to remove. RecommendationConsider adding a comment near the sharing logic (e.g., in
This would help future maintainers understand the context of this change. Finding 3: Verify client-side handling of archived ciphers in organizations 💭 While the server-side validation is removed, it's important to ensure the client applications properly handle the user-level archived state when displaying/managing organization ciphers. The PR description references a client PR (bitwarden/clients#17592), which is good practice. Verification neededConfirm that:
Good Practices Observed
Action Items
|
|
Great job! No new security vulnerabilities introduced in this pull request |
Codecov Report✅ All modified and coverable lines are covered by tests. Additional details and impacted files@@ Coverage Diff @@
## main #6626 +/- ##
==========================================
+ Coverage 52.99% 53.06% +0.07%
==========================================
Files 1909 1899 -10
Lines 84828 84581 -247
Branches 7634 7600 -34
==========================================
- Hits 44951 44885 -66
+ Misses 38125 37951 -174
+ Partials 1752 1745 -7 ☔ View full report in Codecov by Sentry. 🚀 New features to boost your workflow:
|

🎟️ Tracking
PM-27012
Client PR: bitwarden/clients#17592
📔 Objective
With the change in underlying architecture, archived ciphers will be tied to the user rather than to the cipher. This removes checks that originally removed the ability to share a cipher. The bug ticket addressed here is around enforcing data ownership so that is what I captured in the videos.
📸 Screenshots
data-ownership-archived-web.mov
data-ownership-archived-extension.mov
data-ownership-archived-extension.mov
🦮 Reviewer guidelines
:+1:) or similar for great changes:memo:) or ℹ️ (:information_source:) for notes or general info:question:) for questions:thinking:) or 💭 (:thought_balloon:) for more open inquiry that's not quite a confirmed issue and could potentially benefit from discussion:art:) for suggestions / improvements:x:) or:warning:) for more significant problems or concerns needing attention:seedling:) or ♻️ (:recycle:) for future improvements or indications of technical debt:pick:) for minor or nitpick changes