Skip to content
Snippets Groups Projects
  1. Sep 23, 2024
  2. Sep 20, 2024
  3. Sep 19, 2024
  4. Sep 18, 2024
  5. Sep 13, 2024
  6. Sep 10, 2024
  7. Sep 09, 2024
  8. Sep 07, 2024
  9. Sep 01, 2024
    • Timshel's avatar
      248e561b
    • Mathijs van Veluw's avatar
      Update web-vault, crates and gha (#4909) · 55623ad9
      Mathijs van Veluw authored
      
      - Updated the web-vault to fix an issue with personal export.
        Thanks to @stefan0xC for patching this.
        Fixes #4875
      - Updated crates to there latest version
      - Updated the GitHub Actions
      - Updated the xx image to the latest version
      
      Signed-off-by: default avatarBlackDex <black.dex@gmail.com>
      55623ad9
    • Mathijs van Veluw's avatar
      Add a CLI feature to backup the SQLite DB (#4906) · e9acd8bd
      Mathijs van Veluw authored
      
      * Add a CLI feature to backup the SQLite DB
      
      Many users request to add the sqlite3 binary to the container image.
      This isn't really ideal as that might bring in other dependencies and will only bloat the image.
      There main reason is to create a backup of the database.
      
      While there already was a feature within the admin interface to do so (or by using the admin API call), this might not be easy.
      
      This PR adds several ways to generate a backup.
      1. By calling the Vaultwarden binary with the `backup` command like:
        - `/vaultwarden backup`
        - `docker exec -it vaultwarden /vaultwarden backup`
      2. By sending the USR1 signal to the running process like:
        - `kill -s USR1 $(pidof vaultwarden)
        - `killall -s USR1 vaultwarden)
      
      This should help users to more easily create backups of there SQLite database.
      
      Also added the Web-Vault version number when using `-v/--version` to the output.
      
      Signed-off-by: default avatarBlackDex <black.dex@gmail.com>
      
      * Spelling and small adjustments
      
      Signed-off-by: default avatarBlackDex <black.dex@gmail.com>
      
      ---------
      
      Signed-off-by: default avatarBlackDex <black.dex@gmail.com>
      e9acd8bd
  10. Aug 30, 2024
    • Mathijs van Veluw's avatar
      Allow enforcing Single Org with pw reset policy (#4903) · 544b7229
      Mathijs van Veluw authored
      
      * Allow enforcing Single Org with pw reset policy
      
      Bitwarden only allows the Reset Password policy to be set when the Single Org policy is enabled already.
      This PR adds a check so that this can be enforced when a config option is enabled.
      
      Since Vaultwarden encouraged to use multiple orgs when groups were not available yet we should not enable this by default now.
      This might be something to do in the future.
      
      When enabled, it will prevent the Reset Password policy to be enabled if the Single Org policy is not enabled.
      It will also prevent the Single Org policy to be disabled if the Reset Password policy is enabled.
      
      Fixes #4855
      
      Signed-off-by: default avatarBlackDex <black.dex@gmail.com>
      
      * Removed some extra if checks
      
      Signed-off-by: default avatarBlackDex <black.dex@gmail.com>
      
      ---------
      
      Signed-off-by: default avatarBlackDex <black.dex@gmail.com>
      544b7229
  11. Aug 27, 2024
    • Mathijs van Veluw's avatar
      Allow Org Master-Pw policy enforcement (#4899) · 978f0092
      Mathijs van Veluw authored
      
      * Allow Org Master-Pw policy enforcement
      
      We didn't returned the master password policy for the user.
      If the `Require existing members to change their passwords` check was enabled this should trigger the login to show a change password dialog.
      
      All the master password policies are merged into one during the login response and it will contain the max values and all `true` values which are set by all the different orgs if a user is an accepted member.
      
      Fixes #4507
      
      Signed-off-by: default avatarBlackDex <black.dex@gmail.com>
      
      * Use .reduce instead of .fold
      
      Signed-off-by: default avatarBlackDex <black.dex@gmail.com>
      
      ---------
      
      Signed-off-by: default avatarBlackDex <black.dex@gmail.com>
      978f0092
    • Mathijs van Veluw's avatar
      Allow custom umask setting (#4896) · 92f1530e
      Mathijs van Veluw authored
      
      To provide a way to add more security regarding file/folder permissions
      this PR adds a way to allow setting a custom `UMASK` variable.
      
      This allows people to set a more secure default like only allowing the
      owner the the process/container to read/write files and folders.
      
      Examples:
       - `UMASK=022` File: 644 | Folder: 755 (Default of the containers)
         This means Owner read/write and group/world read-only
       - `UMASK=027` File: 640 | Folder: 750
         This means Owner read/write, group read-only, world no access
       - `UMASK=077` File: 600 | Folder: 700
         This measn Owner read/write and group/world no access
      
      resolves #4571
      
      Signed-off-by: default avatarBlackDex <black.dex@gmail.com>
      92f1530e
  12. Aug 24, 2024
  13. Aug 23, 2024
  14. Aug 22, 2024
  15. Aug 21, 2024
  16. Aug 20, 2024
  17. Aug 18, 2024
    • Mathijs van Veluw's avatar
      Fix Vaultwarden Admin page error messages (#4869) · 669b9db7
      Mathijs van Veluw authored
      Since the change to camelCase variables the error messages in the
      Vaultwarden Admin were not shown correctly anymore.
      
      This PR fixes this by changing the case of the json key's.
      Also updated the save and delete of the config to provide a more
      descriptive error instead of only `Io` or which ever other error might
      occure.
      
      Fixes #4834
      669b9db7
  18. Aug 17, 2024
  19. Aug 15, 2024
  20. Aug 13, 2024
  21. Aug 11, 2024
  22. Aug 09, 2024
  23. Aug 08, 2024
  24. Aug 07, 2024
  25. Aug 01, 2024
  26. Jul 31, 2024
    • Mathijs van Veluw's avatar
      Secure send file uploads (#4810) · c28246cf
      Mathijs van Veluw authored
      Currently there are no checks done during the actual upload of the file of a send item.
      This PR adds several checks to make sure it only accepts the correct uploads.
      c28246cf
Loading