-
Notifications
You must be signed in to change notification settings - Fork 81
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Integrate new logins flows happy paths #17137
Conversation
Jenkins BuildsClick to see older builds (47)
|
6b598ce
to
51baa19
Compare
65416c6
to
78e4617
Compare
67a41aa
to
15b8543
Compare
15b8543
to
e4d1a89
Compare
78e4617
to
ed4446e
Compare
e4d1a89
to
e3a548f
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks good in general 💪 Some points for consideration.
if (error != "") { | ||
// We should never be here since everything should be validated already | ||
console.error("!!! ONBOARDING FINISHED WITH ERROR:", error) | ||
// TODO show error | ||
return | ||
} |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yes, we don't need this check because of two resones
- everything should be validated
- even is not, nim side can reject the login as for any other login errors by emitting
accountLoginError
ed4446e
to
0061e2b
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Don't really have anything else than what @micieslak said
Besides the need for a rebase ;)
e3a548f
to
49940d9
Compare
49940d9
to
0bdc533
Compare
4649f49
to
729c711
Compare
@micieslak please review, comments addressed 👌 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM!
What does the PR do
Fixes #17080
Based on top of #17127
Integrates the password and keycard flows
Affected areas
New login when the feature flag is enabled
Architecture compliance
My PR is consistent with this document: Status Desktop Architecture Guide
Screenshot of functionality (including design for comparison)
Password login:
login.webm
Keycard login:
keycardlogin.webm
Impact on end user
Nothing without the feature flag.
With the flag, enables people to login using the new Login flows.
No (super) unhappy paths yet, so just login with password and PIN. Wrong password and login errors are supported.
Generating a password error is hard unless you hardcode one or try to mess up the migration
How to test
export FLAG_ONBOARDING_V2_ENABLED=1 && make run
Risk
Tick one:
Since it's behind the flag, no real risk. Worst case, some of the new flow has a bug or a missing edge case