aboutsummaryrefslogtreecommitdiffstats
path: root/src/bin
Commit message (Collapse)AuthorAgeFilesLines
...
* clippy, fmt, etcJesse Luehrs2023-03-251-6/+21
|
* Undo change to iterations error messageBernd Schoolmann2023-03-261-1/+1
|
* Switch kdf type to enumBernd Schoolmann2023-03-261-2/+3
|
* Implement argon2 kdfBernd Schoolmann2023-03-261-3/+41
|
* Add support for 2FA-method 'Email'.René 'Necoro' Neumann2023-03-191-33/+38
| | | | | | | | | Generalize the `two_factor` function to allow for different Providers. The `login` function now holds a list of supported providers that it tests in turn. The list should probably adhere to https://bitwarden.com/help/setup-two-step-login/#using-multiple-methods. Closes #90.
* restore the --version optionJesse Luehrs2023-03-171-1/+1
|
* clippy/fmt1.6.0Jesse Luehrs2023-03-091-3/+3
|
* bump depsJesse Luehrs2023-03-092-14/+19
|
* add support for raw json outputclassabbyamp2023-03-082-6/+23
| | | | fixes #36
* more clippy cleanupsJesse Luehrs2023-02-184-5/+2
|
* bump editionsJesse Luehrs2023-02-181-1/+1
|
* refactor client cert handlingJesse Luehrs2023-02-181-1/+2
|
* stop warning on multiple crate versions in clippyJesse Luehrs2023-02-182-0/+2
| | | | | cargo deny already checks this, and clippy is giving warnings about duplicate windows deps that i don't care about
* replace term_size with terminal_sizeJesse Luehrs2023-02-181-2/+4
|
* use clap 4 instead of structoptJesse Luehrs2023-02-181-87/+76
|
* clippyJesse Luehrs2023-02-187-107/+99
|
* Merge pull request #95 from shadowwolf899/masterJesse Luehrs2023-02-182-1/+222
|\ | | | | Added a field flag to the get command
| * Added flag to get a specific field from an itemJericho Keyne2022-07-182-1/+222
| |
* | Merge pull request #93 from Hyask/skia/profileJesse Luehrs2023-02-181-1/+1
|\ \ | | | | | | Support multiple profiles with an environment variable
| * | Support multiple profiles with an environment variableSkia2022-11-071-1/+1
| |/ | | | | | | | | | | | | | | | | | | | | | | This introduces the `RBW_PROFILE` environment variable to be able to run multiple instances in parallel, that will use different configuration paths. To use this feature, simply run `rbw` with the environment variable set to any string that is valid for a path. Setting it to an empty string is like not setting it at all. e.g.: * `RBW_PROFILE=perso rbw list` * `RBW_PROFILE=pro rbw list`
* | Merge pull request #92 from fopina/client_certJesse Luehrs2023-02-181-0/+2
|\ \ | | | | | | support for client certificates
| * | support for client certificatesFilipe Pina2022-05-261-0/+2
| |/
* / fix: don't panic when pipingwitcher2022-02-131-1/+9
|/ | | | | | | | Piping stdout to something like `head`, which closes rbw's stdout before it's done writing everything, causes a panic. The panic is circumvented by using `writeln!` instead of `println!` and ignoring the error when it's of kind `BrokenPipe`. Closes #79
* clippyJesse Luehrs2021-12-157-176/+179
|
* don't grab the keyboard when entering the api keyJesse Luehrs2021-10-271-0/+5
| | | | | unlike the vault password, it's pretty unlikely that someone will be entering the api key by hand, so make copy/paste more reasonable
* fix pinentry displayJesse Luehrs2021-10-271-2/+2
|
* add documentation for rbw registerJesse Luehrs2021-10-271-1/+9
|
* add a separate "register" command to log in with api keysJesse Luehrs2021-10-275-236/+183
|
* start working on apikey authenticationJesse Luehrs2021-10-275-87/+244
| | | | | | | | | | not entirely working yet, because api keys aren't allowed to use the offline_access scope which provides access to the oauth refresh token. we will probably need to move to using stable device identifiers (should be able to generate one when the config is first created) and move this logic to a separate "rbw register" command which just does an apikey login but doesn't try to store any data, and then use the normal login flow after that
* remove unused valueJesse Luehrs2021-10-271-8/+1
|
* clippyJesse Luehrs2021-10-274-42/+37
|
* fix #56 totp with spacearch2021-07-051-1/+1
|
* use totp-lite instead of oathJesse Luehrs2021-07-051-3/+7
| | | | oath appears to be unmaintained
* clippyJesse Luehrs2021-07-051-1/+1
|
* add shell completion supportJesse Luehrs2021-04-181-0/+21
|
* clippyJesse Luehrs2021-04-171-2/+2
|
* Don't generate a password history entry for empty passwordsLionel Flandrin2021-04-011-8/+14
| | | | Fixes #52
* disable PTRACE_ATTACH after daemonizingJesse Luehrs2021-03-061-4/+4
| | | | this should let warnings go to the agent logs instead of the terminal
* only warn if disabling PTRACE_ATTACH failsJesse Luehrs2021-03-052-3/+6
|
* upgrade to tokio 1.2Jesse Luehrs2021-03-021-9/+9
|
* support VISUAL in preference to EDITORJesse Luehrs2021-03-021-4/+4
|
* make the pinentry program configurableJesse Luehrs2021-03-022-0/+10
|
* refactor a bitJesse Luehrs2021-02-272-19/+25
|
* Use prctl on Linux to prevent PTRACE_ATTACHJarkko Oranen2021-02-271-0/+19
| | | | | | This offers some protection against other user processes attempting to read rbw-agent's memory. Unfortunately, I don't have other platforms to test on, so the implementation is only for Linux.
* persist uri match type when editingJesse Luehrs2021-02-212-11/+51
|
* bump depsJesse Luehrs2021-02-192-2/+2
|
* clippyJesse Luehrs2021-02-192-19/+16
|
* parse otpauth urls for totp codesJesse Luehrs2020-10-151-13/+29
|
* Zero-pad auth codeAsger Hautop Drewsen2020-10-151-1/+1
|
* ttyname was merged back into nixJesse Luehrs2020-10-121-25/+5
|