- Mar 25, 2021
-
-
Miro Prasil authored
-
- Mar 23, 2021
-
-
Jeremy Lin authored
-
Miro Prasil authored
This should help avoid leaking information about (non)existence of Send and be more in line with what official server returns.
-
- Mar 22, 2021
-
-
Daniel García authored
-
Daniel García authored
-
Daniel García authored
-
- Mar 17, 2021
-
-
Daniel García authored
-
- Mar 16, 2021
-
-
Daniel García authored
-
Jeremy Lin authored
Upstream refs: * https://github.com/bitwarden/server/pull/1130 * https://bitwarden.com/help/article/policies/#disable-send
-
- Mar 15, 2021
-
-
Daniel García authored
-
Jeremy Lin authored
Adjust checks for max access count, expiration date, and deletion date. The date checks aren't that important, but the access count check currently allows one more access than it should.
-
- Mar 14, 2021
-
-
Daniel García authored
-
Daniel García authored
-
- Mar 13, 2021
-
-
Daniel García authored
This is only implemented for the database specific structs, which is not what we want
-
- Mar 07, 2021
-
-
Jeremy Lin authored
* The Safari extension apparently now uses the origin `file://` and expects that to be returned (see bitwarden/browser#1311, bitwarden/server#800). * The `Access-Control-Allow-Origin` header was reflecting the value of the `Origin` header without checking whether the origin was actually allowed. This effectively allows any origin to interact with the server, which defeats the purpose of CORS.
-
- Mar 06, 2021
-
-
Daniel García authored
-
- Mar 04, 2021
-
-
Jeremy Lin authored
The org name in the invitation email was made customizable in 8867626d, but the org name is still hardcoded as "bitwarden_rs" in the confirmation email.
-
- Feb 28, 2021
-
-
Jeremy Lin authored
Currently, when starting up for the first time (running standalone, outside of Docker), bitwarden_rs panics when the `openssl` tool isn't able to create `data/rsa_key.pem` due to the `data` dir not existing. Instead, print a more helpful error message telling the user to create the directory.
-
- Feb 27, 2021
-
-
Jeremy Lin authored
Switch to the built-in WebCrypto APIs for computing identicon hashes.
-
- Feb 24, 2021
-
-
Jeremy Lin authored
The `twofactorauth.org` has apparently been sold to some company for marketing purposes.
-
- Feb 19, 2021
-
-
Paolo Barbolini authored
-
- Feb 07, 2021
-
-
Daniel García authored
-
Daniel García authored
-
- Feb 06, 2021
-
-
Daniel García authored
- Feb 03, 2021
-
-
BlackDex authored
-
Jeremy Lin authored
-
BlackDex authored
- Able to modify the user type per organization - Able to remove a whole organization - Added podman detection - Only show web-vault update when not running a containerized bitwarden_rs Solves #936
-
- Jan 31, 2021
-
-
BlackDex authored
Updated several json response models. Also fixed a few small bugs. ciphers.rs: - post_ciphers_create: * Prevent cipher creation to organization without a collection. - update_cipher_from_data: * ~~Fixed removal of user_uuid which prevent user-owned shared-cipher to be not editable anymore when set to read-only.~~ * Cleanup the json_data by removing the `Response` key/values from several objects. - delete_all: * Do not delete all Collections during the Purge of an Organization (same as upstream). cipher.rs: - Cipher::to_json: * Updated json response to match upstream. * Return empty json object if there is no type_data instead of values which should not be set for the type_data. organizations.rs: * Added two new endpoints to prevent Javascript errors regarding tax organization.rs: - Organization::to_json: * Updated response model to match upstream - UserOrganization::to_json: * Updated response model to match upstream collection.rs: - Collection::{to_json, to_json_details}: * Updated the json response model, and added a detailed version used during the sync - hide_passwords_for_user: * Added this function to return if the passwords should be hidden or not for the user at the specific collection (used by `to_json_details`) Update 1: Some small changes after comments from @jjlin. Update 2: Fixed vault purge by user to make sure the cipher is not part of an organization. Resolves #971 Closes #990, Closes #991
-
BlackDex authored
- Updated rust nightly - Updated depenencies - Removed unicode support for regex (less dependencies) - Fixed dependency and nightly changes/deprications - Some mail changes for less spam point triggering
-
- Jan 27, 2021
-
-
Jeremy Lin authored
The implementation of the `Manager` user type (#1242) introduced a regression whereby owner/admin users are incorrectly denied access to certain collection APIs if their access control for collections isn't set to "access all". Owner/admin users should always have full access to collection APIs, per https://bitwarden.com/help/article/user-types-access-control/#access-control: > Assigning Admins and Owners to Collections via Access Control will only > impact which Collections appear readily in the Filters section of their > Vault. Admins and Owners will always be able to access "un-assigned" > Collections via the Organization view.
-
- Jan 25, 2021
-
-
Jeremy Lin authored
This matches changes in the upstream Bitwarden server and clients. Upstream PR: https://github.com/bitwarden/server/pull/1072
-
- Jan 24, 2021
-
-
Jeremy Lin authored
Upstream refs: * https://github.com/bitwarden/server/pull/1013 * https://bitwarden.com/help/article/policies/#personal-ownership
-
- Jan 19, 2021
-
-
BlackDex authored
Mostly updated the admin interface, also some small other items. - Added more diagnostic information to (hopefully) decrease issue reporting, or at least solve them quicker. - Added an option to generate a support string which can be used to copy/paste on the forum or during the creation of an issue. It will try to hide the sensitive information automatically. - Changed the `Created At` and `Last Active` info to be in a column and able to sort them in the users overview. - Some small layout changes. - Updated javascript and css files to the latest versions available. - Decreased the png file sizes using `oxipng` - Updated target='_blank' links to have rel='noreferrer' to prevent javascript window.opener modifications.
-
- Dec 14, 2020
-
-
BlackDex authored
When ticking the 'Also rotate my account's encryption key' box, the key rotated ciphers are posted after the change of password. During the password change the security stamp was reseted which made the posted key's return an invalid auth. This reset is needed to prevent other clients from still being able to read/write. This fixes this by adding a new database column which stores a stamp exception which includes the allowed route and the current security stamp before it gets reseted. When the security stamp check fails it will check if there is a stamp exception and tries to match the route and security stamp. Currently it only allows for one exception. But if needed we could expand it by using a Vec<UserStampException> and change the functions accordingly. fixes #1240
-
Jeremy Lin authored
* For clarity, add `UTC` suffix for datetimes in the `Diagnostics` admin tab. * Format datetimes in the local timezone in the `Users` admin tab. * Refactor some datetime code and add doc comments.
-
- Dec 10, 2020
-
-
BlackDex authored
- Changed the user-agent, which caused at least one site to stall the connection (Same happens on icons.bitwarden.com) - Added default_header creation to the lazy static CLIENT - Added referer passing, which is checked by some sites - Some small other changes
-
Jeremy Lin authored
-
- Dec 08, 2020
-
-
BlackDex authored
- Added more checks to prevent panics (Removed unwrap) - Try do download from base domain or add www when the provided domain fails - Added some more domain validation checks to prevent errors - Added the ICON_BLACKLIST_REGEX to a Lazy Static HashMap which speeds-up the checks! - Validate the Regex before starting/config change. - Some cleanups - Disabled some noisy debugging from 2 crates.
-
Jeremy Lin authored
Prevent clients from updating a cipher if the local copy is stale. Validation is only performed when the client provides its last known revision date; this date isn't provided when using older clients, or when the operation doesn't involve updating an existing cipher. Upstream PR: https://github.com/bitwarden/server/pull/994
-