bitwarden-android/src/Core/Models/Response
Shane Melton b108b4e71d
[AC-1070] Enforce master password policy on login/unlock (#2410)
* [AC-1070] Add EnforceOnLogin property to MasterPasswordPolicyOptions

* [AC-1070] Add MasterPasswordPolicy property to Identity responses

* [AC-1070] Add policy service dependency to auth service

* [AC-1070] Introduce logic to evaluate master password after successful login

* [AC-1070] Add optional ForcePasswordResetReason to profile / state service

* [AC-1070] Save ForcePasswordResetReason to state when a weak master password is found during login

- Additionally, save the AdminForcePasswordReset reason if the identity result indicates an admin password reset is in effect.

* [AC-1070] Check for a saved ForcePasswordReset reason on TabsPage load force show the update password page

* [AC-1070] Make InitAsync virtual

Allow the UpdateTempPasswordPage to override the InitAsync method to check for a reset password reason in the state service

* [AC-1070] Modify UpdateTempPassword page appearance

- Load the force password reset reason from the state service
- Make warning text dynamic based on force password reason
- Conditionally show the Current master password field if updating a weak master password

* [AC-1070] Add update password method to Api service

* [AC-1070] Introduce logic to update both temp and regular passwords

- Check the Reason to use the appropriate request/endpoint when submitting.
- Verify the users current password locally using the user verification service.

* [AC-1070] Introduce VerifyMasterPasswordResponse

* [AC-1070] Add logic to evaluate master password on unlock

* [AC-1070] Add support 2FA login flow

Keep track of the reset password reason after a password login requires 2FA. During 2FA submission, check if there is a saved reason, and if so, force the user to update their password.

* [AC-1070] Formatting

* [AC-1070] Remove string key from service resolution

* [AC-1070] Change master password options to method variable to avoid class field

Add null check for password strength result and log an error as this is an unexpected flow

* [AC-1070] Remove usage of i18nService

* [AC-1070] Use AsyncCommand for SubmitCommand

* [AC-1070] Remove type from ShowToast call

* [AC-1070] Simplify UpdatePassword methods to accept string for the new encryption key

* [AC-1070] Use full text for key for the CurrentMasterPassword resource

* [AC-1070] Convert Reason to a private class field

* [AC-1070] Formatting changes

* [AC-1070] Simplify if statements in master password options policy service method

* [AC-1070] Use the saved force password reset reason after 2FA login

* [AC-1070] Use constant for ForceUpdatePassword message command

* [AC-1070] Move shared RequirePasswordChangeOnLogin method into PolicyService

* Revert "[AC-1070] Move shared RequirePasswordChangeOnLogin method into PolicyService"

This reverts commit e4feac130f.

* [AC-1070] Add check for null password strength response

* [AC-1070] Fix broken show password icon

* [AC-1070] Add show password icon for current master password
2023-04-17 07:35:50 -07:00
..
AttachmentResponse.cs more models 2019-04-12 11:42:45 -04:00
AttachmentUploadDataReponse.cs Run dotnet format (#1738) 2022-04-26 17:21:17 +02:00
BreachAccountResponse.cs audit service 2019-04-17 17:10:21 -04:00
CipherResponse.cs Run dotnet format (#1738) 2022-04-26 17:21:17 +02:00
CollectionResponse.cs api models 2019-04-16 11:07:32 -04:00
DomainsResponse.cs api models 2019-04-16 11:07:32 -04:00
ErrorResponse.cs [EC-469] Improve ApiException message (#2288) 2023-01-12 10:31:27 -03:00
FolderResponse.cs more models 2019-04-12 11:42:45 -04:00
GlobalDomainResponse.cs api models 2019-04-16 11:07:32 -04:00
IdentityCaptchaResponse.cs Run dotnet format (#1738) 2022-04-26 17:21:17 +02:00
IdentityResponse.cs Run dotnet format (#1738) 2022-04-26 17:21:17 +02:00
IdentityTokenResponse.cs [AC-1070] Enforce master password policy on login/unlock (#2410) 2023-04-17 07:35:50 -07:00
IdentityTwoFactorResponse.cs [AC-1070] Enforce master password policy on login/unlock (#2410) 2023-04-17 07:35:50 -07:00
KeyConnectorUserKeyResponse.cs [KeyConnector] Add support for key connector OTP (#1633) 2021-11-10 20:46:48 -05:00
NotificationResponse.cs Passwordless feature branch PR (#2100) 2022-09-26 18:27:57 +01:00
OrganizationAutoEnrollStatusResponse.cs Run dotnet format (#1738) 2022-04-26 17:21:17 +02:00
OrganizationDomainSsoDetailsResponse.cs [SG-744] Add claimed domain logic to mobile (#2333) 2023-02-20 14:49:20 +00:00
OrganizationKeysResponse.cs Run dotnet format (#1738) 2022-04-26 17:21:17 +02:00
PasswordHistoryResponse.cs more models 2019-04-12 11:42:45 -04:00
PasswordlessLoginResponse.cs [PM-1078] Login with Device - Change mobile to not get fingerprint from API (#2390) 2023-03-13 15:39:55 +00:00
PolicyResponse.cs Beginning of policy support (#736) 2020-02-21 10:23:38 -05:00
PreloginResponse.cs [PS-2358] Add kdf configuration options (#2328) 2023-01-30 11:34:50 -05:00
ProfileOrganizationResponse.cs [KeyConnector] Add support for key connector OTP (#1633) 2021-11-10 20:46:48 -05:00
ProfileResponse.cs [SG-912] Modify the mobile app to retrieve the user's avatar color (#2284) 2023-01-12 13:27:10 -05:00
SendFileUploadDataResponse.cs Send azure upload (#1334) 2021-03-29 09:45:04 -05:00
SendResponse.cs Run dotnet format (#1738) 2022-04-26 17:21:17 +02:00
SsoPrevalidateResponse.cs Add ssoToken to limit lifetime of SSO redirect (#1965) 2022-06-27 14:53:15 -05:00
SyncResponse.cs Port send jslib to mobile (#1219) 2021-01-25 14:27:38 -06:00
VerifyMasterPasswordResponse.cs [AC-1070] Enforce master password policy on login/unlock (#2410) 2023-04-17 07:35:50 -07:00