aboutsummaryrefslogtreecommitdiffstats
path: root/src/actions.rs
Commit message (Collapse)AuthorAgeFilesLines
* don't delete custom fields when editing passwordsJesse Luehrs2024-04-201-0/+4
|
* clippy, fmt, etcJesse Luehrs2023-03-251-9/+38
|
* Switch kdf type to enumBernd Schoolmann2023-03-261-3/+3
|
* Implement argon2 kdfBernd Schoolmann2023-03-261-5/+9
|
* more refactoringJesse Luehrs2023-02-181-13/+24
|
* refactor client cert handlingJesse Luehrs2023-02-181-1/+1
|
* clippyJesse Luehrs2023-02-181-2/+5
|
* support for client certificatesFilipe Pina2022-05-261-31/+17
|
* move device_id to a separate data fileJesse Luehrs2022-02-101-2/+4
|
* clippyJesse Luehrs2021-12-151-3/+3
|
* add a separate "register" command to log in with api keysJesse Luehrs2021-10-271-2/+17
|
* use a persistent device idJesse Luehrs2021-10-271-0/+1
|
* start working on apikey authenticationJesse Luehrs2021-10-271-6/+3
| | | | | | | | | | not entirely working yet, because api keys aren't allowed to use the offline_access scope which provides access to the oauth refresh token. we will probably need to move to using stable device identifiers (should be able to generate one when the config is first created) and move this logic to a separate "rbw register" command which just does an apikey login but doesn't try to store any data, and then use the normal login flow after that
* remove unused valueJesse Luehrs2021-10-271-10/+2
|
* switch to thiserrorJesse Luehrs2021-03-061-2/+2
|
* clippyJesse Luehrs2020-07-111-4/+6
|
* display the server's error message for incorrect passwordJesse Luehrs2020-05-281-1/+5
|
* add authenticator 2fa supportJesse Luehrs2020-05-281-1/+8
|
* maintain folder and uris when editing an entryJesse Luehrs2020-05-031-13/+24
|
* fix editing organization entriesJesse Luehrs2020-05-031-2/+4
|
* start adding support for different entry typesJesse Luehrs2020-05-031-29/+8
|
* also make the agent store decrypted org keys in memoryJesse Luehrs2020-05-031-5/+31
|
* also store org keys in the local dbJesse Luehrs2020-05-031-2/+15
|
* refactor encrypt/decrypt methods to indicate symmetric encryptionJesse Luehrs2020-05-031-2/+2
| | | | since we're going to have to also implement asymmetric encryption
* save the private key to the local dbJesse Luehrs2020-05-031-2/+2
|
* implement adding into a folderJesse Luehrs2020-04-191-2/+53
|
* allow creating entries with associated urisJesse Luehrs2020-04-191-2/+4
|
* track password historyJesse Luehrs2020-04-191-2/+12
|
* better error messages for incorrect passwordsJesse Luehrs2020-04-181-2/+5
|
* refactorJesse Luehrs2020-04-181-42/+65
|
* implement edit commandJesse Luehrs2020-04-181-0/+35
|
* implement removeJesse Luehrs2020-04-181-0/+24
|
* stop using the api cipher struct publiclyJesse Luehrs2020-04-181-7/+16
|
* refactorJesse Luehrs2020-04-181-5/+36
|
* implement add commandJesse Luehrs2020-04-181-2/+19
|
* implement refresh token handlingJesse Luehrs2020-04-121-0/+7
|
* save sync data to local fileJesse Luehrs2020-04-101-11/+8
|
* move some basic stuff into configJesse Luehrs2020-04-101-2/+4
|
* also use cipherstring objectsJesse Luehrs2020-04-081-6/+9
|
* automatically unlock on loginJesse Luehrs2020-04-081-3/+11
|
* mlock sensitive memoryJesse Luehrs2020-04-081-9/+5
|
* clippyJesse Luehrs2020-04-061-3/+3
|
* a bit more cleanupJesse Luehrs2020-04-061-18/+19
|
* factor out into an agentJesse Luehrs2020-04-061-0/+46