8000 BIT-980: Update SDK password generator request to include minimum character set counts by matt-livefront ยท Pull Request #184 ยท bitwarden/ios ยท GitHub
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content

BIT-980: Update SDK password generator request to include minimum character set counts #184

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. Weโ€™ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 3 commits into from
Dec 11, 2023

Conversation

matt-livefront
Copy link
Collaborator

๐ŸŽŸ๏ธ Tracking

BIT-980

๐Ÿšง Type of change

  • ๐Ÿš€ New feature development

๐Ÿ“” Objective

This updates the SDK password generator request to include the minimum counts for the different character sets (lowercase, uppercase, numbers and symbols). If the toggle for the character set is off, nil is passed based on the docs here:

https://github.com/bitwarden/sdk/blob/e6977ae187f0cfe90c5be4cc6a79a2375be2b1bb/crates/bitwarden/src/tool/generators/password.rs#L31-L42

๐Ÿ“‹ Code changes

  • GeneratorState+PasswordState.swift: Updates the password generator request to include minimum counts for each character set.

โฐ Reminders before review

  • Contributor guidelines followed
  • All formatters and local linters executed and passed
  • Written new unit and / or integration tests where applicable
  • Used internationalization (i18n) for all UI strings
  • CI builds passed
  • Communicated to DevOps any deployment requirements
  • Updated any necessary documentation or informed the documentation team

๐Ÿฆฎ Reviewer guidelines

  • ๐Ÿ‘ (:+1:) or similar for great changes
  • ๐Ÿ“ (:memo:) or โ„น๏ธ (:information_source:) for notes or general info
  • โ“ (:question:) for questions
  • ๐Ÿค” (:thinking:) or ๐Ÿ’ญ (:thought_balloon:) for more open inquiry that's not quite a confirmed issue and could potentially benefit from discussion
  • ๐ŸŽจ (:art:) for suggestions / improvements
  • โŒ (:x:) or โš ๏ธ (:warning:) for more significant problems or concerns needing attention
  • ๐ŸŒฑ (:seedling:) or โ™ป๏ธ (:recycle:) for future improvements or indications of technical debt
  • โ› (:pick:) for minor or nitpick changes

Copy link
Contributor
github-actions bot commented Dec 11, 2023
1 Warning
โš ๏ธ Ignoring duplicate libraries: '-lbitwarden_uniffi'

Bitwarden code coverage

Total coverage: 84.05%

File Coverage
BitwardenShared/UI/Tools/Generator/Generator/GeneratorState+PasswordState.swift 100.00%

Powered by Slather

Generated by ๐Ÿšซ Danger

fedemkr
fedemkr previously approved these changes Dec 11, 2023
@bitwarden-bot
Copy link

Logo
Checkmarx One โ€“ Scan Summary & Details โ€“ 211b411b-e02e-491a-8803-4cacdf646470

No New Or Fixed Issues Found

@eliot-livefront eliot-livefront self-assigned this Dec 11, 2023
Copy link
Collaborator
@eliot-livefront eliot-livefront left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks great, just one โ›๏ธ for a warning in the tests.

Co-authored-by: Eliot Williams <148839008+eliot-livefront@users.noreply.github.com>
Copy link
Collaborator
@eliot-livefront eliot-livefront left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

๐Ÿšข ๐Ÿ‡ฎ๐Ÿ‡น

@matt-livefront matt-livefront merged commit f256fb8 into main Dec 11, 2023
@matt-livefront matt-livefront deleted the matt/BIT-980-generator-password-request branch December 11, 2023 21:44
vvolkgang pushed a commit that referenced this pull request Feb 24, 2025
Co-authored-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants
0