Commit Graph

359 Commits

Author SHA1 Message Date
vpl
591ae10144 Get token from single u64 2019-08-26 20:26:54 +02:00
026f9da035 Allow removing users two factors 2019-08-21 17:13:06 +02:00
515b87755a Update HIBP to v3, requires paid API key, fixes #583 2019-08-20 20:07:12 +02:00
vpl
ad2225b6e5 Add configuration options for Email 2FA 2019-08-10 22:39:04 +02:00
vpl
5609103a97 Use ring to generate email token 2019-08-06 22:38:08 +02:00
vpl
6d460b44b0 Use saved token for email 2fa codes 2019-08-04 17:21:57 +02:00
vpl
efd8d9f528 Remove some unused imports, unneeded mut variables 2019-08-04 16:56:41 +02:00
vpl
29aedd388e Add email code logic and move two_factor into separate modules 2019-08-04 16:56:41 +02:00
05a1137828 Move backend checks to build.rs to fail fast, and updated dependencies 2019-07-09 17:26:34 +02:00
e22e290f67 Fix key and type variable names for mysql 2019-05-20 21:24:29 +02:00
874f5c34bd Formatting 2019-04-26 22:08:26 +02:00
253faaf023 Use users duo host when required, instead of always using the global one 2019-04-15 13:07:23 +02:00
3d843a6a51 Merge pull request #460 from janost/organization-vault-purge
Fixed purging organization vault
2019-04-14 22:30:51 +02:00
03fdf36bf9 Fixed purging organization vault 2019-04-14 22:12:48 +02:00
fdcc32beda Validate Duo credentials when custom 2019-04-14 22:05:05 +02:00
8d9827c55f Implement selection between global config and user settings for duo keys. 2019-04-11 18:40:03 +02:00
cad63f9761 Auto generate akey 2019-04-11 16:08:26 +02:00
621f607297 Update dependencies and fix some warnings 2019-04-11 15:40:19 +02:00
754087b990 Add global duo config and document options in .env template 2019-04-07 18:58:15 +02:00
cfbeb56371 Implement user duo, initial version
TODO:
- At the moment each user needs to configure a DUO application and input the API keys, we need to check if multiple users can register with the same keys correctly and if so we could implement a global setting.
- Sometimes the Duo frame doesn't load correctly, but canceling, reloading the page and logging in again seems to fix it for me.
2019-04-05 22:09:53 +02:00
61515160a7 Allow changing error codes and create an empty error.
Return 404 instead of 400 when no accounts breached.
2019-03-14 00:17:36 +01:00
04922f6aa0 Some formatting and dependency updates 2019-03-03 16:11:55 +01:00
7d2bc9e162 Added option to force 2fa at logins and made some changes to two factor code.
Added newlines to config options to keep them a reasonable length.
2019-03-03 16:09:15 +01:00
10756b0920 Update dependencies and fix some lints 2019-02-27 17:21:04 +01:00
473f8b8e31 remove some unneeded mutability 2019-02-22 20:25:50 +01:00
5ee04e31e5 Updated dependencies, removed some unnecessary clones and fixed some lints 2019-02-20 17:54:18 +01:00
a744b9437a Implemented multiple U2f keys, key names, and compromised checks 2019-02-16 23:07:48 +01:00
6027b969f5 Delete old devices when deauthorizing user sessions 2019-02-16 23:06:26 +01:00
93805a5d7b Fix Yubikeys deleted on error 2019-02-16 21:30:55 +01:00
820c8b0dce Change use of deserialize_with for Option iterator 2019-02-08 19:12:08 +01:00
8b4a6f2a64 Fixed some clippy lints and changed update_uuid_revision to only use one db query 2019-02-08 18:45:07 +01:00
86ed75bf7c Config can now be serialized / deserialized 2019-02-06 17:34:29 +01:00
20d8d800f3 Updated dependencies 2019-02-06 17:34:29 +01:00
637f655b6f Do not allocate uneccessary Vec 2019-02-05 14:16:07 +00:00
b3f7394c06 Do not update revision at the end, as we already did that 2019-02-05 14:09:59 +00:00
1a5ecd4d4a cipher does not need to be mutable 2019-02-05 13:52:30 +00:00
bd65c4e312 Remove superfluous cipher.save() call 2019-02-05 13:49:30 +00:00
bef1183c49 Only send one notification per vault import and purge, improve move ciphers functions 2019-01-28 00:39:14 +01:00
a1dc47b826 Change config to thread-safe system, needed for a future config panel.
Improved some two factor methods.
2019-01-25 18:24:57 +01:00
86de0ca17b Fix editing users from collections menu 2019-01-25 17:43:51 +01:00
928ad6c1d8 Fix the list of users with access to a collection to display correctly.
https://github.com/dani-garcia/bitwarden_rs/issues/364
2019-01-25 14:18:06 +00:00
a797459560 Implement HIBP check [WIP].
Add extra security attributes to admin cookie.
Error handling.
2019-01-20 15:36:33 +01:00
834c847746 Implement admin JWT cookie, separate JWT issuers for each type of token and migrate admin page to handlebars template 2019-01-19 21:41:49 +01:00
1ce2587330 Correct update cipher order: first save cipher, then cipher-folder, then notify 2019-01-16 19:57:49 +01:00
71a10e0378 Fix sharing the item to organization. 2019-01-16 11:33:43 +00:00
9bf13b7872 Can't return inside multipart closure 2019-01-15 22:00:41 +01:00
d420992f8c Update some function calls to use ? 2019-01-15 21:47:16 +01:00
c259a0e3e2 Save recovery code when using yubikey and stop repeating headers.user everywhere 2019-01-15 21:38:21 +01:00
432be274ba Improve org mismatch check, consider different orgs 2019-01-15 17:31:03 +01:00
484bf5b703 Check that the client is not updating an outdated cipher, that should be part of an org now 2019-01-15 16:35:08 +01:00