Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | don't delete custom fields when editing passwords | Jesse Luehrs | 2024-04-20 | 1 | -11/+83 |
| | |||||
* | remove previous manual setting of user agent during login | Jesse Luehrs | 2024-04-20 | 1 | -6/+2 |
| | |||||
* | set a user agent in our api client | Jesse Luehrs | 2024-04-20 | 1 | -13/+19 |
| | |||||
* | clippy and fmt | Jesse Luehrs | 2024-01-01 | 1 | -4/+4 |
| | |||||
* | Merge pull request #151 from Ty3uK/bugfix/login-error | Jesse Luehrs | 2024-01-01 | 1 | -0/+4 |
|\ | | | | | Pass `User-Agent` header to prevent login from returning 400 | ||||
| * | Pass `User-Agent` header to prevent login from returning 400 | Maksim Karelov | 2023-12-20 | 1 | -0/+4 |
| | | | | | | | | Fixes #145 | ||||
* | | implements ability to edit notes | Tin Lai | 2023-09-21 | 1 | -1/+6 |
|/ | | | | Signed-off-by: Tin Lai <oscar@tinyiu.com> | ||||
* | improve error reporting when login or register fail | Jesse Luehrs | 2023-07-18 | 1 | -2/+26 |
| | |||||
* | add yubikey support | troyready | 2023-06-17 | 1 | -0/+2 |
| | | | | | This is all that's needed to support Yubikey hardware tokens in OTP mode (https://developers.yubico.com/OTP/) | ||||
* | clippy, fmt, etc | Jesse Luehrs | 2023-03-25 | 1 | -102/+109 |
| | |||||
* | Switch kdf type to enum | Bernd Schoolmann | 2023-03-26 | 1 | -2/+93 |
| | |||||
* | Implement argon2 kdf | Bernd Schoolmann | 2023-03-26 | 1 | -2/+8 |
| | |||||
* | Add support for 2FA-method 'Email'. | René 'Necoro' Neumann | 2023-03-19 | 1 | -0/+25 |
| | | | | | | | | | Generalize the `two_factor` function to allow for different Providers. The `login` function now holds a list of supported providers that it tests in turn. The list should probably adhere to https://bitwarden.com/help/setup-two-step-login/#using-multiple-methods. Closes #90. | ||||
* | more clippy cleanups | Jesse Luehrs | 2023-02-18 | 1 | -3/+0 |
| | |||||
* | refactor client cert handling | Jesse Luehrs | 2023-02-18 | 1 | -23/+38 |
| | |||||
* | bump deps | Jesse Luehrs | 2023-02-18 | 1 | -2/+2 |
| | |||||
* | clippy | Jesse Luehrs | 2023-02-18 | 1 | -22/+31 |
| | |||||
* | support for client certificates | Filipe Pina | 2022-05-26 | 1 | -6/+23 |
| | |||||
* | update to support camel case api names | Jesse Luehrs | 2022-02-10 | 1 | -64/+64 |
| | | | | | official bitwarden server just updated to this, but vaultwarden still uses pascal case | ||||
* | clippy | Jesse Luehrs | 2021-12-15 | 1 | -37/+41 |
| | |||||
* | add a useful error message if registration is required | Jesse Luehrs | 2021-10-27 | 1 | -0/+3 |
| | |||||
* | add a separate "register" command to log in with api keys | Jesse Luehrs | 2021-10-27 | 1 | -42/+49 |
| | |||||
* | use a persistent device id | Jesse Luehrs | 2021-10-27 | 1 | -3/+2 |
| | |||||
* | start working on apikey authentication | Jesse Luehrs | 2021-10-27 | 1 | -15/+54 |
| | | | | | | | | | | not entirely working yet, because api keys aren't allowed to use the offline_access scope which provides access to the oauth refresh token. we will probably need to move to using stable device identifiers (should be able to generate one when the config is first created) and move this logic to a separate "rbw register" command which just does an apikey login but doesn't try to store any data, and then use the normal login flow after that | ||||
* | add the auth-email header when authenticating | Jesse Luehrs | 2021-10-27 | 1 | -0/+4 |
| | | | | | required by new version of the official bitwarden server, see https://github.com/bitwarden/jslib/pull/394 | ||||
* | clippy | Jesse Luehrs | 2021-10-27 | 1 | -1/+1 |
| | |||||
* | clippy | Jesse Luehrs | 2021-07-05 | 1 | -1/+1 |
| | |||||
* | TwoFactorProviderType: Allow WebAuthn | Sarah Brofeldt | 2021-05-31 | 1 | -0/+3 |
| | | | | | Only allows deserialization for the new provider. See https://github.com/bitwarden/server/pull/903 | ||||
* | Don't choke on empty passwords in the history | Lionel Flandrin | 2021-04-01 | 1 | -4/+8 |
| | | | | Fixes #50 | ||||
* | switch to thiserror | Jesse Luehrs | 2021-03-06 | 1 | -10/+10 |
| | |||||
* | persist uri match type when editing | Jesse Luehrs | 2021-02-21 | 1 | -3/+47 |
| | |||||
* | clippy | Jesse Luehrs | 2021-02-19 | 1 | -1/+1 |
| | |||||
* | allow TwoFactorType to be provided as an integer or string | Jesse Luehrs | 2020-12-02 | 1 | -14/+67 |
| | | | | | bitwarden-rs still provides it as an integer, but bitwarden.com now provides it as a string | ||||
* | use a better device name when logging in | Jesse Luehrs | 2020-10-13 | 1 | -1/+1 |
| | |||||
* | clippy | Jesse Luehrs | 2020-10-12 | 1 | -3/+3 |
| | |||||
* | do not display deleted items | Emmanuel Garette | 2020-10-12 | 1 | -0/+5 |
| | |||||
* | add totp, uris, and custom fields to --full output | Jesse Luehrs | 2020-07-25 | 1 | -0/+31 |
| | |||||
* | clippy | Jesse Luehrs | 2020-07-11 | 1 | -1/+1 |
| | |||||
* | display the server's error message for incorrect password | Jesse Luehrs | 2020-05-28 | 1 | -19/+22 |
| | |||||
* | add authenticator 2fa support | Jesse Luehrs | 2020-05-28 | 1 | -4/+56 |
| | |||||
* | parse login error correctly | Jesse Luehrs | 2020-05-27 | 1 | -9/+45 |
| | |||||
* | handle uri entries with no uri set | Jesse Luehrs | 2020-05-24 | 1 | -4/+12 |
| | | | | | | apparently this can happen if you create the uri entry but then delete the contents of the uri afterward? probably also in other edge case scenarios | ||||
* | better error messages when parsing a server message | Jesse Luehrs | 2020-05-23 | 1 | -14/+12 |
| | |||||
* | don't expect the refresh token response to have a key | Jesse Luehrs | 2020-05-17 | 1 | -2/+0 |
| | | | | the official server doesn't do this, and i don't use it anyway | ||||
* | maintain folder and uris when editing an entry | Jesse Luehrs | 2020-05-03 | 1 | -7/+34 |
| | |||||
* | fix editing organization entries | Jesse Luehrs | 2020-05-03 | 1 | -0/+4 |
| | |||||
* | start adding support for different entry types | Jesse Luehrs | 2020-05-03 | 1 | -67/+306 |
| | |||||
* | remove some old debugging | Jesse Luehrs | 2020-05-03 | 1 | -6/+3 |
| | |||||
* | also store org keys in the local db | Jesse Luehrs | 2020-05-03 | 1 | -1/+23 |
| | |||||
* | save the private key to the local db | Jesse Luehrs | 2020-05-03 | 1 | -2/+8 |
| |