aboutsummaryrefslogtreecommitdiffstats
path: root/src/bin/rbw-agent
Commit message (Collapse)AuthorAgeFilesLines
* disable PTRACE_ATTACH after daemonizingJesse Luehrs2021-03-061-4/+4
| | | | this should let warnings go to the agent logs instead of the terminal
* only warn if disabling PTRACE_ATTACH failsJesse Luehrs2021-03-052-3/+6
|
* upgrade to tokio 1.2Jesse Luehrs2021-03-021-9/+9
|
* make the pinentry program configurableJesse Luehrs2021-03-021-0/+8
|
* refactor a bitJesse Luehrs2021-02-272-19/+25
|
* Use prctl on Linux to prevent PTRACE_ATTACHJarkko Oranen2021-02-271-0/+19
| | | | | | This offers some protection against other user processes attempting to read rbw-agent's memory. Unfortunately, I don't have other platforms to test on, so the implementation is only for Linux.
* bump depsJesse Luehrs2021-02-191-1/+1
|
* implement rbw unlockedJesse Luehrs2020-07-252-0/+23
|
* display the server's error message for incorrect passwordJesse Luehrs2020-05-281-15/+42
|
* properly handle empty string from pinentryJesse Luehrs2020-05-281-1/+3
|
* add authenticator 2fa supportJesse Luehrs2020-05-282-49/+175
|
* remove more unnecessary error contextsJesse Luehrs2020-05-253-31/+13
|
* use the crate version for the protocol versionJesse Luehrs2020-05-211-1/+1
|
* fix unlocking org keys on initial loginJesse Luehrs2020-05-032-15/+53
|
* allow storing password databases from different serversJesse Luehrs2020-05-031-25/+31
| | | | | this should allow easy switching of servers by just `rbw config set base_url`
* simplifyJesse Luehrs2020-05-032-16/+5
|
* also make the agent store decrypted org keys in memoryJesse Luehrs2020-05-031-2/+14
|
* also store org keys in the local dbJesse Luehrs2020-05-031-4/+7
|
* refactor encrypt/decrypt methods to indicate symmetric encryptionJesse Luehrs2020-05-031-4/+6
| | | | since we're going to have to also implement asymmetric encryption
* save the private key to the local dbJesse Luehrs2020-05-031-1/+2
|
* expand the protocol to allow decrypting with organization keysJesse Luehrs2020-05-022-7/+33
| | | | not implemented yet, just changing the interface
* check protocol version before agent communicationJesse Luehrs2020-05-022-0/+14
|
* don't kill the agent if it fails to parse a messageJesse Luehrs2020-05-022-2/+16
|
* allow multiple attempts for password entryJesse Luehrs2020-04-181-35/+87
|
* refactorJesse Luehrs2020-04-181-1/+1
|
* stop using the api cipher struct publiclyJesse Luehrs2020-04-181-2/+2
|
* refactorJesse Luehrs2020-04-181-20/+10
|
* implement add commandJesse Luehrs2020-04-181-1/+1
|
* add encryption to the agent protocolJesse Luehrs2020-04-182-0/+37
|
* make daemonizing optionalJesse Luehrs2020-04-181-3/+15
|
* keep daemon log filesJesse Luehrs2020-04-181-0/+14
|
* drop timeout due to tokio limitationsJesse Luehrs2020-04-181-1/+2
|
* fix private key timeout handlingJesse Luehrs2020-04-121-18/+73
|
* avoid holding the state mutex for as longJesse Luehrs2020-04-121-9/+4
| | | | | in particular, don't hold it over pinentry calls, since those can take arbitrarily long
* implement refresh token handlingJesse Luehrs2020-04-121-4/+23
|
* rename some stuff to be less confusingJesse Luehrs2020-04-123-11/+11
|
* improve error handling and reportingJesse Luehrs2020-04-125-86/+243
|
* automatically sync on loginJesse Luehrs2020-04-111-2/+4
|
* better pinentry messagesJesse Luehrs2020-04-111-4/+21
|
* don't block the main loop on timer eventsJesse Luehrs2020-04-111-1/+4
|
* also refactor the agent codeJesse Luehrs2020-04-115-0/+300