Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | clippy | Jesse Luehrs | 2024-04-20 | 1 | -1/+0 |
| | |||||
* | fix: cargo fmt | arcstur | 2023-09-03 | 1 | -21/+10 |
| | |||||
* | Fallback to the nop clipboard provider. | Benjamin Jacobs | 2023-07-20 | 1 | -1/+0 |
| | |||||
* | reconnect to websockets after every successful sync | Jesse Luehrs | 2023-07-18 | 1 | -8/+6 |
| | | | | rather than scattering it around various parts of the code | ||||
* | stop trying to reconnect to notifications so aggressively1.8.0 | Jesse Luehrs | 2023-07-18 | 1 | -8/+10 |
| | | | | it adds a bunch of latency to every command otherwise | ||||
* | fix websockets for self-hosted bitwarden | Jesse Luehrs | 2023-07-18 | 1 | -7/+6 |
| | |||||
* | make clipboard manipulation happen from the agent | Jesse Luehrs | 2023-07-18 | 1 | -17/+37 |
| | | | | | | | | | on x11 systems, you can't just send data to the os to store on the clipboard, you just register which application currently owns the clipboard and then other applications can use ipc to request the owning application to send them the clipboard data. this requires there to be an application still running in order to respond to those requests. luckily, we have one of those available in the form of the agent. | ||||
* | clippy and fmt | Jesse Luehrs | 2023-07-16 | 1 | -10/+4 |
| | |||||
* | Merge pull request #123 from troyready/yubikey | Jesse Luehrs | 2023-07-16 | 1 | -0/+1 |
|\ | | | | | add yubikey support | ||||
| * | add yubikey support | troyready | 2023-06-17 | 1 | -0/+1 |
| | | | | | | | | | | This is all that's needed to support Yubikey hardware tokens in OTP mode (https://developers.yubico.com/OTP/) | ||||
* | | Cargo format and reconnect websocket on sync | Bernd Schoolmann | 2023-04-27 | 1 | -10/+24 |
| | | |||||
* | | Improve error logging for websockets | Bernd Schoolmann | 2023-04-27 | 1 | -1/+7 |
| | | |||||
* | | Fix panic when websocket endpoint is not available | Bernd Schoolmann | 2023-04-17 | 1 | -2/+2 |
| | | |||||
* | | Improve error handling | Bernd Schoolmann | 2023-04-17 | 1 | -8/+17 |
| | | |||||
* | | Restructure code | Bernd Schoolmann | 2023-04-16 | 1 | -2/+17 |
|/ | |||||
* | sync the db every hour, like other bitwarden clients | Jesse Luehrs | 2023-03-25 | 1 | -8/+4 |
| | |||||
* | clippy, fmt, etc | Jesse Luehrs | 2023-03-25 | 1 | -6/+21 |
| | |||||
* | Undo change to iterations error message | Bernd Schoolmann | 2023-03-26 | 1 | -1/+1 |
| | |||||
* | Switch kdf type to enum | Bernd Schoolmann | 2023-03-26 | 1 | -2/+3 |
| | |||||
* | Implement argon2 kdf | Bernd Schoolmann | 2023-03-26 | 1 | -3/+41 |
| | |||||
* | Add support for 2FA-method 'Email'. | René 'Necoro' Neumann | 2023-03-19 | 1 | -33/+38 |
| | | | | | | | | | Generalize the `two_factor` function to allow for different Providers. The `login` function now holds a list of supported providers that it tests in turn. The list should probably adhere to https://bitwarden.com/help/setup-two-step-login/#using-multiple-methods. Closes #90. | ||||
* | clippy | Jesse Luehrs | 2023-02-18 | 1 | -38/+31 |
| | |||||
* | Support multiple profiles with an environment variable | Skia | 2022-11-07 | 1 | -1/+1 |
| | | | | | | | | | | | | This introduces the `RBW_PROFILE` environment variable to be able to run multiple instances in parallel, that will use different configuration paths. To use this feature, simply run `rbw` with the environment variable set to any string that is valid for a path. Setting it to an empty string is like not setting it at all. e.g.: * `RBW_PROFILE=perso rbw list` * `RBW_PROFILE=pro rbw list` | ||||
* | clippy | Jesse Luehrs | 2021-12-15 | 1 | -28/+18 |
| | |||||
* | don't grab the keyboard when entering the api key | Jesse Luehrs | 2021-10-27 | 1 | -0/+5 |
| | | | | | unlike the vault password, it's pretty unlikely that someone will be entering the api key by hand, so make copy/paste more reasonable | ||||
* | fix pinentry display | Jesse Luehrs | 2021-10-27 | 1 | -2/+2 |
| | |||||
* | add a separate "register" command to log in with api keys | Jesse Luehrs | 2021-10-27 | 1 | -201/+153 |
| | |||||
* | start working on apikey authentication | Jesse Luehrs | 2021-10-27 | 1 | -76/+208 |
| | | | | | | | | | | not entirely working yet, because api keys aren't allowed to use the offline_access scope which provides access to the oauth refresh token. we will probably need to move to using stable device identifiers (should be able to generate one when the config is first created) and move this logic to a separate "rbw register" command which just does an apikey login but doesn't try to store any data, and then use the normal login flow after that | ||||
* | remove unused value | Jesse Luehrs | 2021-10-27 | 1 | -8/+1 |
| | |||||
* | clippy | Jesse Luehrs | 2021-10-27 | 1 | -10/+5 |
| | |||||
* | make the pinentry program configurable | Jesse Luehrs | 2021-03-02 | 1 | -0/+8 |
| | |||||
* | implement rbw unlocked | Jesse Luehrs | 2020-07-25 | 1 | -0/+14 |
| | |||||
* | display the server's error message for incorrect password | Jesse Luehrs | 2020-05-28 | 1 | -15/+42 |
| | |||||
* | properly handle empty string from pinentry | Jesse Luehrs | 2020-05-28 | 1 | -1/+3 |
| | |||||
* | add authenticator 2fa support | Jesse Luehrs | 2020-05-28 | 1 | -49/+173 |
| | |||||
* | remove more unnecessary error contexts | Jesse Luehrs | 2020-05-25 | 1 | -20/+9 |
| | |||||
* | use the crate version for the protocol version | Jesse Luehrs | 2020-05-21 | 1 | -1/+1 |
| | |||||
* | fix unlocking org keys on initial login | Jesse Luehrs | 2020-05-03 | 1 | -11/+48 |
| | |||||
* | allow storing password databases from different servers | Jesse Luehrs | 2020-05-03 | 1 | -25/+31 |
| | | | | | this should allow easy switching of servers by just `rbw config set base_url` | ||||
* | also make the agent store decrypted org keys in memory | Jesse Luehrs | 2020-05-03 | 1 | -2/+14 |
| | |||||
* | also store org keys in the local db | Jesse Luehrs | 2020-05-03 | 1 | -4/+7 |
| | |||||
* | refactor encrypt/decrypt methods to indicate symmetric encryption | Jesse Luehrs | 2020-05-03 | 1 | -4/+6 |
| | | | | since we're going to have to also implement asymmetric encryption | ||||
* | save the private key to the local db | Jesse Luehrs | 2020-05-03 | 1 | -1/+2 |
| | |||||
* | expand the protocol to allow decrypting with organization keys | Jesse Luehrs | 2020-05-02 | 1 | -2/+4 |
| | | | | not implemented yet, just changing the interface | ||||
* | check protocol version before agent communication | Jesse Luehrs | 2020-05-02 | 1 | -0/+10 |
| | |||||
* | allow multiple attempts for password entry | Jesse Luehrs | 2020-04-18 | 1 | -35/+87 |
| | |||||
* | refactor | Jesse Luehrs | 2020-04-18 | 1 | -1/+1 |
| | |||||
* | stop using the api cipher struct publicly | Jesse Luehrs | 2020-04-18 | 1 | -2/+2 |
| | |||||
* | refactor | Jesse Luehrs | 2020-04-18 | 1 | -20/+10 |
| | |||||
* | implement add command | Jesse Luehrs | 2020-04-18 | 1 | -1/+1 |
| |