Skip to content

Commit

Permalink
Merge branch 'release' into 'master'
Browse files Browse the repository at this point in the history
PB-32899 - As LU, when I change my passphrase when I sign in again I want my...

See merge request passbolt/desktop/passbolt-windows!121
  • Loading branch information
cedricalfonsi committed Apr 15, 2024
2 parents d36ea22 + 3c7b945 commit a1bbbff
Show file tree
Hide file tree
Showing 127 changed files with 227,251 additions and 198,421 deletions.
2 changes: 2 additions & 0 deletions .gitignore
Original file line number Diff line number Diff line change
Expand Up @@ -25,3 +25,5 @@ passbolt/Webviews/Background/coverage/
*.pfx
Package.StoreAssociation.xml

passbolt/Webviews/Background/junit.xml
passbolt/Webviews/Rendered/junit.xml
14 changes: 5 additions & 9 deletions .gitlab-ci/jobs/test.yml
Original file line number Diff line number Diff line change
@@ -1,5 +1,4 @@
rendered-tests:
allow_failure: true
extends: .rules
stage: test
image: node:16
Expand All @@ -11,11 +10,10 @@ rendered-tests:
artifacts:
when: always
reports:
junit:
- junit.xml
junit: passbolt/Webviews/Rendered/junit.xml
coverage_report:
coverage_format: cobertura
path: coverage/cobertura-coverage.xml
path: passbolt/Webviews/Rendered/coverage/cobertura-coverage.xml

rendered-linter:
stage: test
Expand All @@ -36,23 +34,21 @@ rendered-audit:
- npm audit

background-tests:
allow_failure: true
extends: .rules
stage: test
image: node:16
coverage: /Lines\s* [:] ([\d\.]+)%/
script:
- cd passbolt/Webviews/Background
- npm install
- npm i
- npm run test:coverage
artifacts:
when: always
reports:
junit:
- junit.xml
junit: passbolt/Webviews/Background/junit.xml
coverage_report:
coverage_format: cobertura
path: coverage/cobertura-coverage.xml
path: passbolt/Webviews/Background/coverage/cobertura-coverage.xml

background-linter:
stage: test
Expand Down
92 changes: 25 additions & 67 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,77 +2,35 @@
All notable changes to this project will be documented in this file.
This project adheres to [Semantic Versioning](http://semver.org/).

## [0.6.0] - 2024-02-15
## [1.0.0] - 2024-04-10
### Added
- PB-28672 As a user exporting resources I should also export TOTPs
- PB-29626 As a user I should retrieve the csrf token if the instance is running from a sub-folder
- PB-28679 As an administrator I can set advanced password expiry settings
- PB-28681 As a user importing a resources from a file I should also import expiry date from keepass files
- PB-28682 As a user I can quickly mark resources as expired
- PB-28687 As a resource owner, I can change the resource expiration date manually
- PB-28692 As a user I can change the expiry date of a resource automatically based on the password expiry configuration
- PB-28850 As a signed-in user creating a resource from the app I should set the expired date if default expiry period has been defined in the organisation policies
- PB-28851 As a signed-in user creating a resource from the quickaccess I should set the expired date if default expiry period has been defined in the organisation policies
- PB-28852 As a signed-in user creating a resource from the auto-save I should set the expired date if default expiry period has been defined in the organisation policies
- PB-29045 As a user I want to open the quickaccess using a keyboard shortcut
- PB-29125 As an administrator I should not see the control function AllowIfGroupManagerInOneGroup on the UI
- PB-29862 - Desktop app - I should not see the desktop app export
- PB-29110 As a desktop application I should be logout when the session has expired

- PB-29559 - Support v4.6 in desktop app
### Fixed
- PB-25865 As a signed-in user I can autofill credentials using input and change events
- PB-29258 As a signed-in user with a large dataset I can select a resource quickly
- PB-29548 As a signed-in administrator I should refresh password expiry cache when navigating to the password expiry administration page
- PB-29560 As a user importing a resources from a Windows keepass kdbx I should also import TOTPs
- PB-29606 As a user exporting a resources to a Windows keepass kdbx I should also export TOTPs
- PB-22864 As a signed-in user, I should see a relevant error if I use special characters as security token
- PB-24496 As a user I should be able to use a passphrase with emoji
- PB-28283 As a user when I preview a secret I should see the activity sidebar updated
- PB-28540 As a user I should scroll automatically to the resource selected from the route
- PB-28625 As a user I can open resource url from the resource sidebar on Firefox
- PB-28632 As a user Fix design TOTP button disabled on create and edit resource
- PB-28696 As a user I should fill secret for TOTP with spaces
- PB-28721 As a user I can see the beta chip next to the desktop app menu item in the users settings menu
- PB-28753 As a user I should be able to edit a standalone TOTP from contextual menu
- PB-28880 As a user I should not see an error when I update the description of a resource with TOTP from the information panel
- PB-28842 As a user I can reach the Windows store passbolt app from the Desktop app setup screen
- PB-28282 As a user deleting a TOTP I should see the relevant dialog title mentioning Resource and not password
- PB-28873 As a signed-in user when I autofill input fields I should trigger a change event
- PB-29006 As a user I should not have my browser extension crashing when it receives an unsupported RBAC control_function value
- PB-29865 - PB-29103 As a desktop application I should be able to import KDBX files without external library
- PB-27634 - Windows app get started help page
- PB-32394 As a user defining my passphrase while activating my account I want to know if my passphrase is part of a dictionary on form submission
- PB-32396 As a user defining my new passphrase while changing it I want to know if my new passphrase is part of a dictionary on form submission
- PB-32401 As an administrator defining the passphrase of the generated organisation account recovery key I want to know if the passphrase is part of a dictionary on form submission
- PB-32407 As a user editing a password I am invited to confirm its edition when this one very weak in a separate dialog on form submission
- PB-32395 As a user defining my passphrase while requesting an account recovery I want to know if my new passphrase is part of a dictionary on form submission
- PB-32397 As a user verifying my private key passphrase while activation my account I do not want to know if my passphrase is part of a dictionary at this stage
- PB-32399 As a user confirming my passphrase while completing an account recovery (Admin approved) I do not want to know if my passphrase is part of a dictionary on form submission
- PB-32398 As a user confirming my passphrase while importing my private key during an account recover I do not want to know if my passphrase is part of a dictionary on form submission
- PB-32404 As a user creating a password from the quickaccess I am invited to confirm its creation when this one is part of a dictionary in a separate dialog on form submission
- PB-32403 As a user updating a password I am invited to confirm its edition when this one is part of a dictionary in a separate dialog on form submission
- PB-32405 As a user auto-saving a password from the quickaccess I should not be notified if the password is part of an exposed dictionary
- PB-32402 As a user creating a password I am invited to confirm its creation when this one is part of a dictionary in a separate dialog on form submission
- PB-32400 As a user confirming my passphrase while importing an account kit on the desktop app I do not want to know if my passphrase is part of a dictionary on form submission
- PB-32406 As a user creating a password I am invited to confirm its creation when this one very weak in a separate dialog on form submission
- PB-32427 As a user creating a password from the quickaccess I am invited to confirm its creation when this one is VERY WEAK in a separate page on form submission
- PB-32351 As a desktop app user I should be able to change my current locale

### Improved
- PB-15269 As a user I do not want my browser extension to make multiple calls on resources.json in a row
- PB-21484 As an administrator I can use Microsoft 365 or Outlook as SMTP providers
- PB-22071 As an administrator I want the SSO messages to be in correct english
- PB-25503 As an admin I should be able to enable/disable emails that request group managers to add users to groups (LDAP/AD)
- PB-25860 As signed-in user I want to see the full name of the user at the origin of any account recovery action
- PB-27783 As a user opening the quickaccess I should have a clear feedback if the API service is unreachable
- PB-27961 As a signed-in user I cannot skip the administrator request to join the account recovery program
- PB-28507 As signed-in user importing resources I should know what is supported
- PB-28612 As a signed-in user I should see TOTP in uppercase
- PB-28646 As an administrator in the account recovery settings I should see “Prompt” instead of “Mandatory"
- PB-28709 Mark SASL option in Users Directory as Enterprise Edition
- PB-28727 As an administrator in the SSO settings I should see a combobox instead of a text input for the Azure’s URL
- PB-28923 As a user I want to be able to use passbolt in Russian
- PB-29008 As an administrator in RBAC administration page I should not see the role to setup the desktop or mobile app if the plugin is not enabled
- PB-29159 As a signed-in user I want the Mfa screen to be available when using the bext 4.4 and API 4.5
- PB-29263 Replace the mechanism to have CSRF token from the cookie
- PB-29289 Make pipelines fail when test jobs output an error
- PB-29106 Merge desktop bext into develop

### Security
- PB-29194 Upgrade vulnerable library web-ext
- PB-28658 Mitigate browser extension supply chain attack
- PB-28659 Mitigate browser styleguide supply chain attack
- PB-28660 Mitigate browser windows app supply chain attack


### Maintenance
- PB-27972 Refactor code of SSO settings
- PB-28592 Fix minimum gecko version in firefox manifest.json
- PB-29020 Fix detection pagemod duplicate
- PB-29264 - Get the CSRF token from the cookie for the desktop app
- PB-29336 Desktop app - Account kit should be encoded in cleartext format instead of binary
- PB-32286 - PBL-11-001 WP1: Insecure Regex pattern allows canNavigate bypass (Medium)
- PB-32290 - PBL-11-005 WP1: Insecure CSP Configuration in renderers (Low)
- PB-32289 - PBL-11-004 WP1: Arbitrary requestId used as topic in background IPC (Medium)

[Unreleased]: https://github.com/passbolt/passbolt-windows/compare/v0.6.0...HEAD
[0.6.0]: https://github.com/passbolt/passbolt-windows/compare/v0.5.0...v0.6.0
[Unreleased]: https://github.com/passbolt/passbolt-windows/compare/v1.0.0...HEAD
[0.6.0]: https://github.com/passbolt/passbolt-windows/compare/v0.6.0...v1.0.0
Loading

0 comments on commit a1bbbff

Please sign in to comment.