Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

PM-17954 changing import permissions around based on requirements #5385

Open
wants to merge 2 commits into
base: main
Choose a base branch
from

Conversation

prograhamming
Copy link
Contributor

🎟️ Tracking

https://bitwarden.atlassian.net/browse/PM-17954

📔 Objective

Within the ImportCiphersController on an organizational import, we should allow importing into a collection if the user manages the target collection.

This supersedes the check for the custom user permission CanAccessImportExport

If a user does not have the CanCreateCollections permission and the import attempts to create sub-collections of the managed collections, it should throw and return an error to the client.

📸 Screenshots

⏰ Reminders before review

  • Contributor guidelines followed
  • All formatters and local linters executed and passed
  • Written new unit and / or integration tests where applicable
  • Protected functional changes with optionality (feature flags)
  • Used internationalization (i18n) for all UI strings
  • CI builds passed
  • Communicated to DevOps any deployment requirements
  • Updated any necessary documentation (Confluence, contributing docs) or informed the documentation team

🦮 Reviewer guidelines

  • 👍 (:+1:) or similar for great changes
  • 📝 (:memo:) or ℹ️ (:information_source:) for notes or general info
  • ❓ (:question:) for questions
  • 🤔 (:thinking:) or 💭 (:thought_balloon:) for more open inquiry that's not quite a confirmed issue and could potentially benefit from discussion
  • 🎨 (:art:) for suggestions / improvements
  • ❌ (:x:) or ⚠️ (:warning:) for more significant problems or concerns needing attention
  • 🌱 (:seedling:) or ♻️ (:recycle:) for future improvements or indications of technical debt
  • ⛏ (:pick:) for minor or nitpick changes

@prograhamming prograhamming requested a review from a team as a code owner February 10, 2025 14:21
Copy link

codecov bot commented Feb 10, 2025

Codecov Report

Attention: Patch coverage is 0% with 3 lines in your changes missing coverage. Please review.

Project coverage is 44.30%. Comparing base (e4d862f) to head (20a8238).

Files with missing lines Patch % Lines
...c/Api/Tools/Controllers/ImportCiphersController.cs 0.00% 3 Missing ⚠️
Additional details and impacted files
@@           Coverage Diff           @@
##             main    #5385   +/-   ##
=======================================
  Coverage   44.30%   44.30%           
=======================================
  Files        1497     1497           
  Lines       69207    69207           
  Branches     6241     6241           
=======================================
  Hits        30661    30661           
  Misses      37223    37223           
  Partials     1323     1323           

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

Copy link
Contributor

github-actions bot commented Feb 10, 2025

Logo
Checkmarx One – Scan Summary & Details9a804592-a8a1-4c0c-8908-94b89f9b75c9

Great job, no security vulnerabilities found in this Pull Request

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants