- Sep 23, 2024
-
-
Mathijs van Veluw authored
* Add extra linting Added extra linting for some code styles. Also added the Rust Edition 2024 lints. Closes #4974 Signed-off-by:
BlackDex <black.dex@gmail.com> * Adjusted according to comments Signed-off-by:
BlackDex <black.dex@gmail.com> --------- Signed-off-by:
BlackDex <black.dex@gmail.com>
-
- Sep 20, 2024
-
-
Daniel García authored
* Avoid keyword collision with gen in Rust 2024 * Include new api/config setting to disable user registration, not yet used by clients * Actually qualify CONFIG
-
Mathijs van Veluw authored
It appears that some password histories have an encrypted value on the `lastUsedDate` Instead of only checking if it is a string, also check if it is a valid RFC Date/Time String. If not, set it also to epoch 0. Signed-off-by:
BlackDex <black.dex@gmail.com>
-
Mathijs van Veluw authored
-
- Sep 19, 2024
-
-
Stefan Melmuk authored
-
- Sep 18, 2024
-
-
Daniel authored
- match Bitwarden behaviour - add a different segment in mails for Device Name
-
Stefan Melmuk authored
-
Mathijs van Veluw authored
It seemed to have been possible to have `null` date values. This PR fixes this by setting the epoch start date if either the date does not exists or is not a string. This should solve sync issues with the new native mobile clients. Fixes https://github.com/dani-garcia/vaultwarden/pull/4932#issuecomment-2357581292 Signed-off-by:
BlackDex <black.dex@gmail.com>
-
- Sep 13, 2024
-
-
Stefan Melmuk authored
-
- Sep 10, 2024
-
-
Mathijs van Veluw authored
-
- Sep 09, 2024
-
-
Mathijs van Veluw authored
-
- Sep 07, 2024
-
-
Daniel authored
-
- Sep 01, 2024
-
-
Timshel authored
-
Mathijs van Veluw authored
- Updated the web-vault to fix an issue with personal export. Thanks to @stefan0xC for patching this. Fixes #4875 - Updated crates to there latest version - Updated the GitHub Actions - Updated the xx image to the latest version Signed-off-by:
BlackDex <black.dex@gmail.com>
-
Mathijs van Veluw authored
* Add a CLI feature to backup the SQLite DB Many users request to add the sqlite3 binary to the container image. This isn't really ideal as that might bring in other dependencies and will only bloat the image. There main reason is to create a backup of the database. While there already was a feature within the admin interface to do so (or by using the admin API call), this might not be easy. This PR adds several ways to generate a backup. 1. By calling the Vaultwarden binary with the `backup` command like: - `/vaultwarden backup` - `docker exec -it vaultwarden /vaultwarden backup` 2. By sending the USR1 signal to the running process like: - `kill -s USR1 $(pidof vaultwarden) - `killall -s USR1 vaultwarden) This should help users to more easily create backups of there SQLite database. Also added the Web-Vault version number when using `-v/--version` to the output. Signed-off-by:
BlackDex <black.dex@gmail.com> * Spelling and small adjustments Signed-off-by:
BlackDex <black.dex@gmail.com> --------- Signed-off-by:
BlackDex <black.dex@gmail.com>
-
- Aug 30, 2024
-
-
Mathijs van Veluw authored
* Allow enforcing Single Org with pw reset policy Bitwarden only allows the Reset Password policy to be set when the Single Org policy is enabled already. This PR adds a check so that this can be enforced when a config option is enabled. Since Vaultwarden encouraged to use multiple orgs when groups were not available yet we should not enable this by default now. This might be something to do in the future. When enabled, it will prevent the Reset Password policy to be enabled if the Single Org policy is not enabled. It will also prevent the Single Org policy to be disabled if the Reset Password policy is enabled. Fixes #4855 Signed-off-by:
BlackDex <black.dex@gmail.com> * Removed some extra if checks Signed-off-by:
BlackDex <black.dex@gmail.com> --------- Signed-off-by:
BlackDex <black.dex@gmail.com>
-
- Aug 27, 2024
-
-
Mathijs van Veluw authored
* Allow Org Master-Pw policy enforcement We didn't returned the master password policy for the user. If the `Require existing members to change their passwords` check was enabled this should trigger the login to show a change password dialog. All the master password policies are merged into one during the login response and it will contain the max values and all `true` values which are set by all the different orgs if a user is an accepted member. Fixes #4507 Signed-off-by:
BlackDex <black.dex@gmail.com> * Use .reduce instead of .fold Signed-off-by:
BlackDex <black.dex@gmail.com> --------- Signed-off-by:
BlackDex <black.dex@gmail.com>
-
Mathijs van Veluw authored
To provide a way to add more security regarding file/folder permissions this PR adds a way to allow setting a custom `UMASK` variable. This allows people to set a more secure default like only allowing the owner the the process/container to read/write files and folders. Examples: - `UMASK=022` File: 644 | Folder: 755 (Default of the containers) This means Owner read/write and group/world read-only - `UMASK=027` File: 640 | Folder: 750 This means Owner read/write, group read-only, world no access - `UMASK=077` File: 600 | Folder: 700 This measn Owner read/write and group/world no access resolves #4571 Signed-off-by:
BlackDex <black.dex@gmail.com>
-
- Aug 24, 2024
-
-
Mathijs van Veluw authored
Update the security readme with a new GPG security key and some small other changes. Signed-off-by:
BlackDex <black.dex@gmail.com>
-
- Aug 23, 2024
-
-
Mathijs van Veluw authored
- Updated crates - Fixed MSRV to actually be N-2 - Changed some features to use the `dep:` prefix. This is needed for edition-2024 anyway although that will be a while before we can use that. Signed-off-by:
BlackDex <black.dex@gmail.com>
-
Mathijs van Veluw authored
Updated the issue template a bit regarding some remarks in the previous pr. Also made it so that collapsing all items will show all the specific item id's instead of there types. Easy for editiing :). Signed-off-by:
BlackDex <black.dex@gmail.com>
-
- Aug 22, 2024
-
-
philomathic_life authored
-
- Aug 21, 2024
-
-
Timshel authored
-
Mathijs van Veluw authored
Fixed an issue with login with device for the new Bitwrden Beta clients. They seem to not support ISO8601 milli date/time, only micro. Also updated the device display names to match Upstream and added the CLI devices which were missing. Signed-off-by:
BlackDex <black.dex@gmail.com>
-
Stefan Melmuk authored
when cloning an item from an organization to the personal vault the client sends the collection id of the cloned item
-
- Aug 20, 2024
-
-
Mathijs van Veluw authored
Updated the issue template to use a form and guide users to provide all information useful to troublshoot issues Als updated links to prefer the usage of GitHub Discussions. Signed-off-by:
BlackDex <black.dex@gmail.com>
-
- Aug 18, 2024
-
-
Mathijs van Veluw authored
Since the change to camelCase variables the error messages in the Vaultwarden Admin were not shown correctly anymore. This PR fixes this by changing the case of the json key's. Also updated the save and delete of the config to provide a more descriptive error instead of only `Io` or which ever other error might occure. Fixes #4834
-
- Aug 17, 2024
- Aug 15, 2024
-
-
Mathijs van Veluw authored
The web-vault v2024.6.2 we use needs some extra information to allow managers to actually be able to manage collections. The v2024.6.2 web-vault has somewhat of a mixture of the newer roles and older manager roles. To at least fix this for the web-vault we bundle these changes will make the manager able to manage. For future web-vaults we would need a lot more changes to be done to fix this in a better way though. Fixes #4844
-
Mathijs van Veluw authored
The URL crate treats `https://domain.tld/path` differently then `https://domain.tld/path/` the latter will make sure a `.join()` will append the given path instead of using the base as a relative path. Fixes #4858
-
- Aug 13, 2024
-
-
Mathijs van Veluw authored
-
- Aug 11, 2024
-
-
Mathijs van Veluw authored
- All users were able to request organizational details from any org, even if they were not a member (anymore). Now it will check if that user is a member of the org or not. - The `/organization/<uuid>/keys` endpoint returned also the private keys. This should not be the case. Also, according to the upstream server code the endpoint changed, but the clients do not seem to use it. I added it anyway just in case they will in the future. - Also require a valid login before being able to retreve those org keys. Upstream does not do this, but i see no reason why not. Fixes: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39925
-
- Aug 09, 2024
-
-
Daniel authored
-
- Aug 08, 2024
-
-
Mathijs van Veluw authored
-
- Aug 07, 2024
-
-
Mathijs van Veluw authored
* Update crates, web-vault and fixes - Updated crates - Updated web-vault to v2024.6.2 This version is currently the latest version compatible with our API implementation. For newer versions we need more code updates to make it compatible. Thanks to @stefan0xC this version fixes #4628 - Added a small fix to prevent errors in the Vaultwarden and Client logs. The v2024.6.2 web-vault calls an endpoint with invalid arguments. If this happens we ignore the call and just return an Ok. - Added the bulk-collection endpoint (Though not yet available in v2024.6.2) Fixes #4628 * Prevent bulk remove collections to work
-
Daniel authored
- fixes https://github.com/dani-garcia/vaultwarden/issues/4528
-
Daniel authored
- needed to match Bitwarden, some of the feature flags might have uppercase characters (for example: ```PM-4154-bulk-encryption-service```)
-
- Aug 01, 2024
-
-
Stefan Melmuk authored
* make access_all optional * use #[serde(default)] instead of unwrapping
-
- Jul 31, 2024
-
-
Mathijs van Veluw authored
Currently there are no checks done during the actual upload of the file of a send item. This PR adds several checks to make sure it only accepts the correct uploads.
-