Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

Auth & KM/PM-3537 - Remove "KeyConnectorUrl" from root of IdentityTokenResponse#6627

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to ourterms of service andprivacy statement. We’ll occasionally send you account related emails.

Already on GitHub?Sign in to your account

Open
JaredSnider-Bitwarden wants to merge4 commits intomain
base:main
Choose a base branch
Loading
fromauth/pm-3537/remove-key-connector-url-from-id-token-response

Conversation

@JaredSnider-Bitwarden
Copy link
Contributor

@JaredSnider-BitwardenJaredSnider-Bitwarden commentedNov 21, 2025
edited
Loading

🎟️ Tracking

https://bitwarden.atlassian.net/browse/PM-3537

Clients PR:bitwarden/clients#17593

📔 Objective

Over 2 years ago, we deprecated the usage of theIdentityTokenResponse.keyConnectorUrl so we should remove it.

📸 Screenshots

n/a

⏰ Reminders before review

  • Contributor guidelines followed
  • All formatters and local linters executed and passed
  • Written new unit and / or integration tests where applicable
  • Protected functional changes with optionality (feature flags)
  • Used internationalization (i18n) for all UI strings
  • CI builds passed
  • Communicated to DevOps any deployment requirements
  • Updated any necessary documentation (Confluence, contributing docs) or informed the documentation team

🦮 Reviewer guidelines

  • 👍 (:+1:) or similar for great changes
  • 📝 (:memo:) or ℹ️ (:information_source:) for notes or general info
  • ❓ (:question:) for questions
  • 🤔 (:thinking:) or 💭 (:thought_balloon:) for more open inquiry that's not quite a confirmed issue and could potentially benefit from discussion
  • 🎨 (:art:) for suggestions / improvements
  • ❌ (:x:) or⚠️ (:warning:) for more significant problems or concerns needing attention
  • 🌱 (:seedling:) or ♻️ (:recycle:) for future improvements or indications of technical debt
  • ⛏ (:pick:) for minor or nitpick changes

@claude
Copy link
Contributor

claudebot commentedNov 21, 2025
edited
Loading

Claude finished@JaredSnider-Bitwarden's task ——View job


Code Review Complete

Tasks

  • Read existing PR comments and threads
  • Review changed files
  • Analyze PR title and description quality
  • Check for security implications
  • Assess breaking change impact
  • Verify test coverage
  • Post comprehensive review findings

Summary

This PR removes the deprecatedKeyConnectorUrl property from the root of the identity token response. The property was deprecated over 2 years ago and clients should now be reading it fromUserDecryptionOptions.KeyConnectorOption.KeyConnectorUrl instead. The changes are minimal and focused: removing one line of code that set the root-level property and updating tests accordingly.


Findings

Finding 1: PR title and description should clarify client compatibility requirements

💭 The PR description mentions "ensure mobile won't be affected negatively" (author's own comment), but doesn't explicitly state which client versions are compatible with this breaking change. Consider adding:

  • Minimum supported client versions that have migrated away from reading the root-levelKeyConnectorUrl
  • Link or reference to when clients completed the migration (the linked clients PR is helpful but may not tell the full story about all platforms)
Suggested addition to PR description
##🔄 Breaking Change AssessmentThis change removes`KeyConnectorUrl` from the root of the identity token response. Clients must read this value from`UserDecryptionOptions.KeyConnectorOption.KeyConnectorUrl` instead.**Client Compatibility:**- ✅ Web: Migrated in[version/commit]- ✅ Desktop: Migrated in[version/commit]- ✅ Browser: Migrated in[version/commit]- ⚠️ Mobile (iOS/Android):[Status/version info needed]- ✅ CLI: Migrated in[version/commit]All active client versions in production must support reading from the new location before this can be safely deployed.

Finding 2: Consider verifying all clients have migrated before merging

⚠️ Given the author's comment "Pausing b/c we should ensure mobile won't be affected negatively by this", this appears to be awaiting verification. Before merging, confirm:

  1. All client platforms (Web, Desktop, Browser, Mobile iOS, Mobile Android, CLI) have deployed versions that read fromUserDecryptionOptions.KeyConnectorOption.KeyConnectorUrl
  2. Minimum supported client versions are all updated (i.e., any legacy clients still in use that might break)
  3. Rollback strategy is documented if issues arise post-deployment

The linked clients PR (bitwarden/clients#17593) should provide guidance, but mobile platform status needs explicit confirmation.


Code Quality Assessment

Security: ✅ No security concerns. This is a cleanup of deprecated functionality and doesn't change authentication/authorization logic.

Breaking Changes:⚠️ This IS a breaking change for any clients still readingKeyConnectorUrl from the root. Requires careful deployment coordination.

Test Coverage: ✅ Appropriate. The test inIdentityServerSsoTests.cs:524-526 that verified the backward-compatible root-level property was correctly removed, and the primary test for the proper location (KeyConnectorOption.KeyConnectorUrl) remains intact.

Code Maintainability: ✅ Good. The comment update inCustomTokenRequestValidator.cs:162-163 accurately reflects thatResetMasterPassword still needs cleanup, maintaining clear technical debt documentation.

Good Practices Observed:

  • Clean removal of deprecated code path
  • Updated inline comments to reflect current state
  • Test assertions updated to match new behavior

Action Items

  1. [REQUIRED] Confirm all mobile clients (iOS/Android) have migrated to readingKeyConnectorUrl fromUserDecryptionOptions.KeyConnectorOption
  2. [RECOMMENDED] Document minimum client version requirements in the PR description
  3. [RECOMMENDED] Coordinate deployment timing with client releases to ensure smooth rollout

@JaredSnider-BitwardenJaredSnider-Bitwarden marked this pull request as draftNovember 21, 2025 22:36
@JaredSnider-Bitwarden
Copy link
ContributorAuthor

Pausing b/c we should ensure mobile won't be affected negatively by this.

@codecov
Copy link

codecovbot commentedNov 21, 2025
edited
Loading

Codecov Report

✅ All modified and coverable lines are covered by tests.
✅ Project coverage is 53.10%. Comparing base (9573cab) to head (05fef65).
⚠️ Report is 7 commits behind head on main.

Additional details and impacted files
@@             Coverage Diff             @@##             main    #6627       +/-   ##===========================================+ Coverage   13.38%   53.10%   +39.71%===========================================  Files        1125     1903      +778       Lines       49593    84876    +35283       Branches     3914     7633     +3719     ===========================================+ Hits         6640    45070    +38430+ Misses      42831    38055     -4776- Partials      122     1751     +1629

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report?Share it here.

🚀 New features to boost your workflow:
  • ❄️Test Analytics: Detect flaky tests, report on failures, and find test suite problems.
  • 📦JS Bundle Analysis: Save yourself from yourself by tracking and limiting bundle sizes in JS merges.

@github-actions
Copy link
Contributor

github-actionsbot commentedNov 24, 2025
edited
Loading

Logo
Checkmarx One – Scan Summary & Detailsb21f6266-4e80-4755-9336-1ac64169aac1

Great job! No new security vulnerabilities introduced in this pull request

@rr-bwrr-bw requested review fromike-kottlowski and removed request forrr-bwNovember 25, 2025 04:46
Sign up for freeto join this conversation on GitHub. Already have an account?Sign in to comment

Reviewers

@ike-kottlowskiike-kottlowskiike-kottlowski approved these changes

Assignees

No one assigned

Labels

None yet

Projects

None yet

Milestone

No milestone

Development

Successfully merging this pull request may close these issues.

3 participants

@JaredSnider-Bitwarden@ike-kottlowski

[8]ページ先頭

©2009-2025 Movatter.jp