- Mar 22, 2023
-
-
Daniel García authored
-
- Mar 15, 2023
-
-
Daniel García authored
Merge ClientIp with Headers.
-
Daniel García authored
Update Rust, MSRV and Crates
-
Daniel García authored
Add support for `/api/devices/knowndevice` with HTTP header params
-
BlackDex authored
- Updated all the crates - Updated Rust and MSRV
-
- Mar 11, 2023
-
-
Jeremy Lin authored
Upstream PR: https://github.com/bitwarden/server/pull/2682
-
BlackDex authored
Since we now use the `ClientIp` Guard on a lot more places, it also increases the size of binary, and the macro generated code because of this extra Guard. By merging the `ClientIp` Guard with the several `Header` guards we have it reduces the amount of code generated (including LLVM IR), but also a small speedup in build time. I also spotted some small `json!()` optimizations which also reduced the amount of code generated.
-
- Mar 07, 2023
-
-
Mathijs van Veluw authored
Upd Crates, Rust, MSRV, GHA and remove Backtrace
-
BlackDex authored
- Changed MSRV to v1.65. Discussed this with @dani-garcia, and we will support **N-2**. This is/will be the same as for the `time` crate we use. Also updated the wiki regarding this https://github.com/dani-garcia/vaultwarden/wiki/Building-binary - Removed backtrace crate in favor of `std::backtrace` stable since v1.65 - Updated Rust to v1.67.1 - Updated all the crates - Updated the GHA action versions - Adjusted the GHA MSRV build to extract the MSRV from `Cargo.toml`
-
- Mar 06, 2023
-
-
Daniel García authored
Fix web-vault Member UI show/edit/save
-
Daniel García authored
Add HEAD routes to avoid spurious error messages
-
Daniel García authored
Admin token Argon2 hashing support
-
BlackDex authored
There was a small bug left in regards to the web-vault v2023.2.0 fixes. This PR fixes the left items. I think all should be addressed now. When editing a User, you were not able to see or edit groups, or see wich collections a user bellonged to. Fixes #3311
-
- Mar 05, 2023
-
-
Jeremy Lin authored
Rocket automatically implements a HEAD route when there's a matching GET route, but relying on this behavior also means a spurious error gets logged due to <https://github.com/SergioBenitez/Rocket/issues/1098>. Add explicit HEAD routes for `/` and `/alive` to prevent uptime monitoring services from generating error messages like `No matching routes for HEAD /`. With these new routes, `HEAD /` only checks that the server can respond over the network, while `HEAD /alive` also checks that the database connection is alive, similar to `GET /alive`.
-
- Mar 04, 2023
-
-
BlackDex authored
Added support for Argon2 hashing support for the `ADMIN_TOKEN` instead of only supporting a plain text string. The hash must be a PHC string which can be generated via the `argon2` CLI **or** via the also built-in hash command in Vaultwarden. You can simply run `vaultwarden hash` to generate a hash based upon a password the user provides them self. Added a warning during startup and within the admin settings panel is the `ADMIN_TOKEN` is not an Argon2 hash. Within the admin environment a user can ignore that warning and it will not be shown for at least 30 days. After that the warning will appear again unless the `ADMIN_TOKEN` has be converted to an Argon2 hash. I have also tested this on my RaspberryPi 2b and there the `Bitwarden` preset takes almost 4.5 seconds to generate/verify the Argon2 hash. Using the `OWASP` preset it is below 1 second, which I think should be fine for low-graded hardware. If it is needed people could use lower memory settings, but in those cases I even doubt Vaultwarden it self would run. They can always use the `argon2` CLI and generate a faster hash.
-
- Mar 01, 2023
-
-
Mathijs van Veluw authored
Fix confirmation for removing 2FA and deauthing sessions in admin panel
-
Dylan Pinsonneault authored
-
- Feb 28, 2023
-
-
Daniel García authored
Fix the web-vault v2023.2.0 API calls
-
Daniel García authored
Some Admin Interface updates
-
Daniel García authored
Add confirmation for removing 2FA and deauthing sessions in admin panel
-
BlackDex authored
- Updated datatables - Added NTP Time check - Added Collections, Groups and Events count for orgs - Renamed `Items` to `Ciphers` - Some small style updates
-
- Feb 27, 2023
-
-
BlackDex authored
- Supports the new Collection/Group/User editing UI's - Support `/partial` endpoint for cipher updating to allow folder and favorite update for read-only ciphers. - Prevent `Favorite`, `Folder`, `read-only` and `hide-passwords` from being added to the organizational sync. - Added and corrected some `Object` key's to the output json. Fixes #3279
-
- Feb 24, 2023
-
-
Jonathan Elias Caicedo authored
-
- Feb 23, 2023
-
-
Mathijs van Veluw authored
Fix vault item display in org vault view
-
- Feb 22, 2023
-
-
Jeremy Lin authored
In the org vault view, the Bitwarden web vault currently tries to fetch the groups for an org regardless of whether it claims to have group support. If this errors out, no vault items are displayed.
-
- Feb 21, 2023
-
-
Daniel García authored
-
Daniel García authored
-
Daniel García authored
-
Nils Mittler authored
-
Nils Mittler authored
-
Nils Mittler authored
-
Misterbabou authored
I messed up with identation sorry it's my first PR Fix Collection Read Only access for groups Fix Collection Read Only access for groups With indentation modification
-
BlackDex authored
With existing groups configured within an org, deleting that org would fail because of Foreign Key issues. This PR fixes this by making sure the groups get deleted before the org does. Fixes #3247
-
BlackDex authored
During the client API login we need to have a `device_identifier`, `device_name` and `device_type`. When these were not provided Vaultwarden would panic. This PR add checks for these fields and makes sure it returns a better error message instead of causing a panic.
-
r3drun3 authored
-
Daniel García authored
-
Misterbabou authored
I messed up with identation sorry it's my first PR Fix Collection Read Only access for groups Fix Collection Read Only access for groups With indentation modification
-
BlackDex authored
With existing groups configured within an org, deleting that org would fail because of Foreign Key issues. This PR fixes this by making sure the groups get deleted before the org does. Fixes #3247
-
BlackDex authored
During the client API login we need to have a `device_identifier`, `device_name` and `device_type`. When these were not provided Vaultwarden would panic. This PR add checks for these fields and makes sure it returns a better error message instead of causing a panic.
-
r3drun3 authored
-