aboutsummaryrefslogtreecommitdiffstats
path: root/src/bin/rbw-agent/actions.rs
Commit message (Collapse)AuthorAgeFilesLines
* clippyJesse Luehrs2024-04-201-1/+0
|
* fix: cargo fmtarcstur2023-09-031-21/+10
|
* Fallback to the nop clipboard provider.Benjamin Jacobs2023-07-201-1/+0
|
* reconnect to websockets after every successful syncJesse Luehrs2023-07-181-8/+6
| | | | rather than scattering it around various parts of the code
* stop trying to reconnect to notifications so aggressively1.8.0Jesse Luehrs2023-07-181-8/+10
| | | | it adds a bunch of latency to every command otherwise
* fix websockets for self-hosted bitwardenJesse Luehrs2023-07-181-7/+6
|
* make clipboard manipulation happen from the agentJesse Luehrs2023-07-181-17/+37
| | | | | | | | | on x11 systems, you can't just send data to the os to store on the clipboard, you just register which application currently owns the clipboard and then other applications can use ipc to request the owning application to send them the clipboard data. this requires there to be an application still running in order to respond to those requests. luckily, we have one of those available in the form of the agent.
* clippy and fmtJesse Luehrs2023-07-161-10/+4
|
* Merge pull request #123 from troyready/yubikeyJesse Luehrs2023-07-161-0/+1
|\ | | | | add yubikey support
| * add yubikey supporttroyready2023-06-171-0/+1
| | | | | | | | | | This is all that's needed to support Yubikey hardware tokens in OTP mode (https://developers.yubico.com/OTP/)
* | Cargo format and reconnect websocket on syncBernd Schoolmann2023-04-271-10/+24
| |
* | Improve error logging for websocketsBernd Schoolmann2023-04-271-1/+7
| |
* | Fix panic when websocket endpoint is not availableBernd Schoolmann2023-04-171-2/+2
| |
* | Improve error handlingBernd Schoolmann2023-04-171-8/+17
| |
* | Restructure codeBernd Schoolmann2023-04-161-2/+17
|/
* sync the db every hour, like other bitwarden clientsJesse Luehrs2023-03-251-8/+4
|
* clippy, fmt, etcJesse Luehrs2023-03-251-6/+21
|
* Undo change to iterations error messageBernd Schoolmann2023-03-261-1/+1
|
* Switch kdf type to enumBernd Schoolmann2023-03-261-2/+3
|
* Implement argon2 kdfBernd Schoolmann2023-03-261-3/+41
|
* Add support for 2FA-method 'Email'.René 'Necoro' Neumann2023-03-191-33/+38
| | | | | | | | | Generalize the `two_factor` function to allow for different Providers. The `login` function now holds a list of supported providers that it tests in turn. The list should probably adhere to https://bitwarden.com/help/setup-two-step-login/#using-multiple-methods. Closes #90.
* clippyJesse Luehrs2023-02-181-38/+31
|
* Support multiple profiles with an environment variableSkia2022-11-071-1/+1
| | | | | | | | | | | | This introduces the `RBW_PROFILE` environment variable to be able to run multiple instances in parallel, that will use different configuration paths. To use this feature, simply run `rbw` with the environment variable set to any string that is valid for a path. Setting it to an empty string is like not setting it at all. e.g.: * `RBW_PROFILE=perso rbw list` * `RBW_PROFILE=pro rbw list`
* clippyJesse Luehrs2021-12-151-28/+18
|
* don't grab the keyboard when entering the api keyJesse Luehrs2021-10-271-0/+5
| | | | | unlike the vault password, it's pretty unlikely that someone will be entering the api key by hand, so make copy/paste more reasonable
* fix pinentry displayJesse Luehrs2021-10-271-2/+2
|
* add a separate "register" command to log in with api keysJesse Luehrs2021-10-271-201/+153
|
* start working on apikey authenticationJesse Luehrs2021-10-271-76/+208
| | | | | | | | | | not entirely working yet, because api keys aren't allowed to use the offline_access scope which provides access to the oauth refresh token. we will probably need to move to using stable device identifiers (should be able to generate one when the config is first created) and move this logic to a separate "rbw register" command which just does an apikey login but doesn't try to store any data, and then use the normal login flow after that
* remove unused valueJesse Luehrs2021-10-271-8/+1
|
* clippyJesse Luehrs2021-10-271-10/+5
|
* make the pinentry program configurableJesse Luehrs2021-03-021-0/+8
|
* implement rbw unlockedJesse Luehrs2020-07-251-0/+14
|
* display the server's error message for incorrect passwordJesse Luehrs2020-05-281-15/+42
|
* properly handle empty string from pinentryJesse Luehrs2020-05-281-1/+3
|
* add authenticator 2fa supportJesse Luehrs2020-05-281-49/+173
|
* remove more unnecessary error contextsJesse Luehrs2020-05-251-20/+9
|
* use the crate version for the protocol versionJesse Luehrs2020-05-211-1/+1
|
* fix unlocking org keys on initial loginJesse Luehrs2020-05-031-11/+48
|
* allow storing password databases from different serversJesse Luehrs2020-05-031-25/+31
| | | | | this should allow easy switching of servers by just `rbw config set base_url`
* also make the agent store decrypted org keys in memoryJesse Luehrs2020-05-031-2/+14
|
* also store org keys in the local dbJesse Luehrs2020-05-031-4/+7
|
* refactor encrypt/decrypt methods to indicate symmetric encryptionJesse Luehrs2020-05-031-4/+6
| | | | since we're going to have to also implement asymmetric encryption
* save the private key to the local dbJesse Luehrs2020-05-031-1/+2
|
* expand the protocol to allow decrypting with organization keysJesse Luehrs2020-05-021-2/+4
| | | | not implemented yet, just changing the interface
* check protocol version before agent communicationJesse Luehrs2020-05-021-0/+10
|
* allow multiple attempts for password entryJesse Luehrs2020-04-181-35/+87
|
* refactorJesse Luehrs2020-04-181-1/+1
|
* stop using the api cipher struct publiclyJesse Luehrs2020-04-181-2/+2
|
* refactorJesse Luehrs2020-04-181-20/+10
|
* implement add commandJesse Luehrs2020-04-181-1/+1
|