Skip to content

[PM-37759] Unable to use passkey that is stored in my vault to log in#20738

Merged
jengstrom-bw merged 2 commits into
mainfrom
vault/PM-37759/unable-to-use-passkey-that-is-stored-in-my-vault-to-log-in
May 21, 2026
Merged

[PM-37759] Unable to use passkey that is stored in my vault to log in#20738
jengstrom-bw merged 2 commits into
mainfrom
vault/PM-37759/unable-to-use-passkey-that-is-stored-in-my-vault-to-log-in

Conversation

@jengstrom-bw
Copy link
Copy Markdown
Contributor

🎟️ Tracking

Jira

📔 Objective

This should fix the ability to see and use passkeys to authenticate using the browser with feature flag pm-27632-cipher-crud-operations-to-sdk turned on.

@jengstrom-bw jengstrom-bw added the ai-review-vnext Request a Claude code review using the vNext workflow label May 19, 2026
@github-actions
Copy link
Copy Markdown
Contributor

github-actions Bot commented May 19, 2026

Bitwarden Claude Code Review

Overall Assessment: APPROVE

This change extends the prior getAllDecrypted fix (commit 2eba6cac69) to thread the SDK CiphersClient through every remaining call site of toSdkCipherView and fromSdkCipherView in DefaultCipherSdkService. Without the client, the FIDO2 branches in cipher.view.ts (lines 355-367 and 582-587) are skipped, silently dropping passkey credentials on returned views and on views serialized for SDK calls. The fix mirrors the existing pattern in createWithServer and updateWithServer and is the right scope to fully resolve PM-37759 under the pm-27632-cipher-crud-operations-to-sdk flag.

Code Review Details

No blocking findings.

  • The prior bot review already noted the absence of a getAllDecrypted FIDO2 regression test. That observation now also applies to shareWithServer, shareManyWithServer, saveCollectionsWithServer, and saveCollectionsWithServerAdmin, which lack the FIDO2 assertions present in the createWithServer / updateWithServer specs (libs/common/src/vault/services/cipher-sdk.service.spec.ts:165, :310). Not flagged inline to avoid duplicating the earlier suggestion.

@jengstrom-bw jengstrom-bw marked this pull request as ready for review May 19, 2026 21:57
@jengstrom-bw jengstrom-bw requested a review from a team as a code owner May 19, 2026 21:57
@codecov
Copy link
Copy Markdown

codecov Bot commented May 19, 2026

Codecov Report

✅ All modified and coverable lines are covered by tests.
✅ Project coverage is 47.46%. Comparing base (7d214cc) to head (3548f61).
⚠️ Report is 4 commits behind head on main.
✅ All tests successful. No failed tests found.

Additional details and impacted files
@@           Coverage Diff           @@
##             main   #20738   +/-   ##
=======================================
  Coverage   47.46%   47.46%           
=======================================
  Files        4002     4003    +1     
  Lines      123125   123150   +25     
  Branches    18940    18945    +5     
=======================================
+ Hits        58437    58457   +20     
- Misses      60266    60268    +2     
- Partials     4422     4425    +3     

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

🚀 New features to boost your workflow:
  • 📦 JS Bundle Analysis: Save yourself from yourself by tracking and limiting bundle sizes in JS merges.

nikwithak
nikwithak previously approved these changes May 19, 2026
Copy link
Copy Markdown
Contributor

@nikwithak nikwithak left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Nice work! Hopefully we don't have any more stragglers that don't pass the sdkClient

@jengstrom-bw jengstrom-bw added the needs-qa Marks a PR as requiring QA approval label May 19, 2026
@sonarqubecloud
Copy link
Copy Markdown

@jengstrom-bw jengstrom-bw removed the needs-qa Marks a PR as requiring QA approval label May 21, 2026
@jengstrom-bw jengstrom-bw merged commit 04b1cc6 into main May 21, 2026
147 of 149 checks passed
@jengstrom-bw jengstrom-bw deleted the vault/PM-37759/unable-to-use-passkey-that-is-stored-in-my-vault-to-log-in branch May 21, 2026 15:14
jengstrom-bw added a commit that referenced this pull request May 21, 2026
…#20738) (#20784)

* fixes getAllDecrypted by passing sdkCiphersclient to CipherView.fromSdkCipherView

* updates cipher-sdk.service to use/pass sdkCiphersClient wherever possible
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

ai-review-vnext Request a Claude code review using the vNext workflow

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants