-
-
Notifications
You must be signed in to change notification settings - Fork 260
User must be able to configure webAuthn in bit Boilerplate if passkey is no longer valid (#11947) #11948
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
… is no longer valid (bitfoundation#11947)
|
Important Review skippedAuto incremental reviews are disabled on this repository. Please check the settings in the CodeRabbit UI or the You can disable this status message by setting the Note Other AI code review bot(s) detectedCodeRabbit has detected other AI code review bot(s) in this pull request and will avoid duplicating their findings in the review comments. This may lead to a less comprehensive review. WalkthroughTwo files were modified to enhance WebAuthn passwordless credential management. A code comment was added for documentation clarity in the diagnostic modal utilities. The passwordless tab's DisablePasswordless method was restructured to ensure cleanup operations—removing stored WebAuthn user IDs and resetting configuration state—execute regardless of credential verification success or failure, enabling retry scenarios. Changes
Estimated code review effort🎯 2 (Simple) | ⏱️ ~8 minutes Poem
Pre-merge checks and finishing touches❌ Failed checks (1 warning)
✅ Passed checks (4 passed)
Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out. Comment |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Actionable comments posted: 1
📜 Review details
Configuration used: Repository UI
Review profile: CHILL
Plan: Pro
Knowledge base: Disabled due to Reviews -> Disable Knowledge Base setting
📒 Files selected for processing (2)
src/Templates/Boilerplate/Bit.Boilerplate/src/Client/Boilerplate.Client.Core/Components/Layout/Diagnostic/AppDiagnosticModal.razor.Utils.cssrc/Templates/Boilerplate/Bit.Boilerplate/src/Client/Boilerplate.Client.Core/Components/Pages/Settings/Account/PasswordlessTab.razor.cs
⏰ Context from checks skipped due to timeout of 90000ms. You can increase the timeout in your CodeRabbit configuration to a maximum of 15 minutes (900000ms). (2)
- GitHub Check: CodeQL analysis (csharp)
- GitHub Check: build Bit.Templates
🔇 Additional comments (1)
src/Templates/Boilerplate/Bit.Boilerplate/src/Client/Boilerplate.Client.Core/Components/Layout/Diagnostic/AppDiagnosticModal.razor.Utils.cs (1)
129-129: LGTM! Helpful documentation comment.The comment clarifies the relationship between WebAuthn credential deletion and the subsequent storage clear operation, improving code maintainability.
...rc/Client/Boilerplate.Client.Core/Components/Pages/Settings/Account/PasswordlessTab.razor.cs
Show resolved
Hide resolved
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Pull request overview
This PR addresses issue #11947 by allowing users to reconfigure WebAuthn when their passkey is no longer valid. The changes move the cleanup logic for removing stored WebAuthn configuration to handle scenarios where passkey validation fails.
- Moved
RemoveWebAuthnConfiguredUserIdandisConfiguredreset logic to a finally block in the disable passwordless flow - Added explanatory comments about browser behavior when passkeys fail
- Added clarifying comment in diagnostic modal about storage cleanup
Reviewed changes
Copilot reviewed 2 out of 2 changed files in this pull request and generated 3 comments.
| File | Description |
|---|---|
| PasswordlessTab.razor.cs | Relocated WebAuthn cleanup logic to finally block to handle invalid passkey scenarios |
| AppDiagnosticModal.razor.Utils.cs | Added clarifying comment about WebAuthn credential cleanup during diagnostic clear operations |
...rc/Client/Boilerplate.Client.Core/Components/Pages/Settings/Account/PasswordlessTab.razor.cs
Show resolved
Hide resolved
...lient/Boilerplate.Client.Core/Components/Layout/Diagnostic/AppDiagnosticModal.razor.Utils.cs
Outdated
Show resolved
Hide resolved
...rc/Client/Boilerplate.Client.Core/Components/Pages/Settings/Account/PasswordlessTab.razor.cs
Outdated
Show resolved
Hide resolved
…te.Client.Core/Components/Pages/Settings/Account/PasswordlessTab.razor.cs Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com> Signed-off-by: Yas Moradi <yas@bitplatform.dev>
…te.Client.Core/Components/Layout/Diagnostic/AppDiagnosticModal.razor.Utils.cs Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com> Signed-off-by: Yas Moradi <yas@bitplatform.dev>
closes #11947
Summary by CodeRabbit
✏️ Tip: You can customize this high-level summary in your review settings.