[PM-35393] MasterPasswordService auth integration#7575
[PM-35393] MasterPasswordService auth integration#7575
Conversation
routing. Add structured cryptographic data support to all Auth password endpoints, routing new payloads to MasterPasswordService-backed commands while preserving legacy paths for backward compatibility (PM-33141 removal).
… and model validation returns.
Bitwarden Claude Code ReviewOverall Assessment: APPROVE This PR integrates five Auth-domain master-password mutation flows (self-service change, TDE offboarding, Emergency Access takeover, temporary password replacement, SSO JIT provisioning) with the new Code Review DetailsScope
Verification Notes
No new findings. |
Codecov Report❌ Patch coverage is Additional details and impacted files@@ Coverage Diff @@
## main #7575 +/- ##
========================================
Coverage 59.62% 59.62%
========================================
Files 2097 2101 +4
Lines 92611 92914 +303
Branches 8249 8295 +46
========================================
+ Hits 55215 55397 +182
- Misses 35443 35562 +119
- Partials 1953 1955 +2 ☔ View full report in Codecov by Sentry. 🚀 New features to boost your workflow:
|
Codecov Report❌ Patch coverage is Additional details and impacted files@@ Coverage Diff @@
## main #7575 +/- ##
==========================================
+ Coverage 59.73% 59.76% +0.03%
==========================================
Files 2102 2113 +11
Lines 92691 93060 +369
Branches 8257 8290 +33
==========================================
+ Hits 55371 55621 +250
- Misses 35366 35472 +106
- Partials 1954 1967 +13 ☔ View full report in Codecov by Sentry. 🚀 New features to boost your workflow:
|
ike-kottlowski
left a comment
There was a problem hiding this comment.
Just some concerns around the removal of salt tests.
By removing them I think we are lessening our testing coverage for ensuring the salt remains unchanged. I know there maybe concerns about business logic locations and checking the salt in a JIT User Provision unit test suite may not be the correct palace for it but having it in the wrong place is better than not having it at all.
ike-kottlowski
left a comment
There was a problem hiding this comment.
Good catch on the KDF iterations.
|



🎟️ Tracking
PM-35393
📔 Objective
Integrate Auth-domain callers with
MasterPasswordService.Wires five password-mutation flows to the service added in #7530 :
All relevant request models now accept both payload variants ("new":
AuthenticationData+UnlockData, or "legacy":NewMasterPasswordHash+Key) for backward compatibility.KDF validation is enforced at the request model layer whenever new payloads are present.
Legacy entry points on
IUserServiceare marked[Obsolete]with specific replacement guidance. Legacy fields are tracked for removal in PM-33141.📸 Screenshots
Master Password Self-Service
User enmande updates their Master Password using self-service.
main).pm-35393__mp-self-service.mov
TDE Offboarding
NOTE: This organization retains SSO requirement throughout; zed remains authenticated to SSO for the duration of this test, so SSO challenge is not represented in this video.
pm-35393__tde-offboarding.mov
Emergency Access Takeover
pm-35393__account-recovery.mov