-
Notifications
You must be signed in to change notification settings - Fork 813
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[PM-13360] Respect manage permission to assign collections #4190
base: PM-12922/delete-collection-permission
Are you sure you want to change the base?
[PM-13360] Respect manage permission to assign collections #4190
Conversation
Codecov ReportAttention: Patch coverage is
Additional details and impacted files@@ Coverage Diff @@
## PM-12922/delete-collection-permission #4190 +/- ##
========================================================================
Coverage ? 89.03%
========================================================================
Files ? 445
Lines ? 38714
Branches ? 5442
========================================================================
Hits ? 34468
Misses ? 2344
Partials ? 1902 ☔ View full report in Codecov by Sentry. |
…cResponseJson This commit adds the `canManage` property to the `CollectionEntity` and `SyncResponseJson` classes to support the management of collections. It also includes necessary test updates and updates to the database schema to reflect these changes.
b935392
to
17d36f0
Compare
Disables the delete button for items in collections where the user does not have "manage" permission. This change ensures that users cannot delete items from collections they are not authorized to manage. It updates the UI to reflect the user's permissions and prevents accidental or unauthorized deletions.
17d36f0
to
9850607
Compare
This commit prevents users from assigning items to collections if the item is already in a read-only collection where the user does not have "manage" permission. This change ensures that users with limited permissions cannot modify items in a way that violates the collection's access controls.
9d8e0f0
to
76954d4
Compare
4d2f1c2
to
70a7e99
Compare
.takeUnless { | ||
state.isAddItemMode || | ||
(!state.isCipherInCollection || | ||
!state.canAssociateToCollections) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
You don't need these parenthesis
🎟️ Tracking
https://bitwarden.atlassian.net/browse/PM-13360
📔 Objective
This commit prevents users from assigning items to collections if the item is already in a read-only collection where the user does not have "manage" permission.
This change ensures that users with limited permissions cannot modify items in a way that violates the collection's access controls.
📸 Screenshots
Coming soon!
⏰ Reminders before review
🦮 Reviewer guidelines
:+1:
) or similar for great changes:memo:
) or ℹ️ (:information_source:
) for notes or general info:question:
) for questions:thinking:
) or 💭 (:thought_balloon:
) for more open inquiry that's not quite a confirmedissue and could potentially benefit from discussion
:art:
) for suggestions / improvements:x:
) or:warning:
) for more significant problems or concerns needing attention:seedling:
) or ♻️ (:recycle:
) for future improvements or indications of technical debt:pick:
) for minor or nitpick changes