* Adding more test cases
* Removing unnecessary file
* Test cases update
* Adding the fixme for strict types
* moving the fixme
* add risk insight data service and wire up components to it
* hook up all applications to risk insights report service. add loading state
* link up remaining props to risk insight report
* wire up children to risk insight data service
* add missing copy. remove loading state from risk insights
* fix types
* fix DI issue
* remove @Injectable from RiskInsightsDataService
---------
Co-authored-by: Tom <ttalty@bitwarden.com>
Co-authored-by: Tom <144813356+ttalty@users.noreply.github.com>
* Risk insights aggregation in a new service. Initial PR.
* Wire up results from RiskInsightsReportService
* Ignoring all non-login items and refactoring into a method
* Cleaning up the documentation a little
* logic for generating the report summary
* application summary to list at risk applications not passwords
* Adding more documentation and moving types to it's own file
* Awaiting the raw data report and adding the start of the test file
* Extend access-intelligence.module to provide needed services
* Register access-intelligence.module with bit-web AppModule
* Use provided RiskInsightsService instead of new'ing one in the component
* Removing the injectable attribute from RiskInsightsReportService
* Fix tests
* Adding more test cases
* Removing unnecessary file
* Test cases update
* Fixing memeber details test to have new member
* Fixing password health tests
* Moving to observables
* removing commented code
* commented code
* Switching from ternary to if/else
* nullable types
* one more nullable type
* Adding the fixme for strict types
* moving the fixme
* No need to access the password use map and switching to the observable
* PM-13455 fixes to unit tests
---------
Co-authored-by: Tom <ttalty@bitwarden.com>
Co-authored-by: Daniel James Smith <djsmith85@users.noreply.github.com>
Co-authored-by: Tom <144813356+ttalty@users.noreply.github.com>
Co-authored-by: voommen-livefront <voommen@livefront.com>
This PR adds a logout option to the TDE approval screen. A TDE user on this page cannot use the "Back" button or click the Bitwarden logo to navigate back to `/` because the user is currently authenticated, which means that navigating to the `/` route would activate the `redirectGuard` and simply route the user back to `/login-initiated`. So we must log the user out first before routing.
Feature Flags: `UnauthenticatedExtensionUIRefresh` ON
* Add tests to verify importing German and Dutch headers work
* Add method to translate the headers from (German/Dutch into English) while the CSV data is being parsed
* Report "importFormatError" when header translation did not work, instead of a generic undefined error (startsWith)
* Move passwordxp-csv-importer into a dedicated folder
* Introduce files with the language header translations
---------
Co-authored-by: Daniel James Smith <djsmith85@users.noreply.github.com>
* add user asymmetric key api service
* Add user asymmetric key regen service
* add feature flag
* Add LoginSuccessHandlerService
* add loginSuccessHandlerService to BaseLoginViaWebAuthnComponent
* Only run loginSuccessHandlerService if webAuthn is used for vault decryption.
* Updates for TS strict
* bump SDK version
* swap to combineLatest
* Update abstractions
Intercepts browser back button press on the login screen to properly
transition back to email entry portion instead of unexpected navigation.
Resolves PM-15987
Co-authored-by: bitwarden-devops-bot <106330231+bitwarden-devops-bot@users.noreply.github.com>
Co-authored-by: Daniel James Smith <2670567+djsmith85@users.noreply.github.com>
Co-authored-by: bitwarden-devops-bot <106330231+bitwarden-devops-bot@users.noreply.github.com>
Co-authored-by: Daniel James Smith <2670567+djsmith85@users.noreply.github.com>
Co-authored-by: bitwarden-devops-bot <106330231+bitwarden-devops-bot@users.noreply.github.com>
Co-authored-by: Daniel James Smith <2670567+djsmith85@users.noreply.github.com>
* use organization properties for access permissions
* clean up refactor
* simplify logic
* refactor canAccessIntegrationEditor to have all the permission checks