1
0
mirror of https://github.com/bitwarden/browser.git synced 2024-12-02 13:23:29 +01:00
Commit Graph

136 Commits

Author SHA1 Message Date
Robyn MacCallum
47399bb583
Move providers to profile and save to disk (#662)
* Move providers to profile and save to disk

* Move providers back to AccountData
2022-02-10 13:55:36 -05:00
Addison Beck
b7bb16c18a
[bug] Toggle tokens appropriatly based on timeout action (#661) 2022-02-09 23:01:43 +01:00
Addison Beck
c282ef8575
[bug] Fix logout timeout action for inactive accounts (#660)
* [bug] Fix logout timeout action for inactive accounts

* Pass userId in to the logout callback parameter to the vaultTimeoutService. The message handle in desktop already expects this.
* Set lastActive on account login, and null it on account deauthentication. This prevents an issue where newly logged in accounts immediatly time out due to inactivity.

* Add userId to locked callbacks

* Add userId to log out callback
2022-02-09 12:15:20 -05:00
Oscar Hinton
8130fce404
Add headers for client type and client version (#651) 2022-02-08 11:18:10 +01:00
Addison Beck
6c08b40847
[bug] Make activity a top level storage key (#656)
* [bug] Make activity a top level storage key

* [bug] use correct index for migration

* [bug] use correct index for migration part 2
2022-02-07 11:36:53 -05:00
Addison Beck
0760b53296
[bug] Default the state version check function to 1 (#657) 2022-02-07 11:08:07 -05:00
Matt Gibson
7afb748791
Feature/password protected export (#612)
* Add password protected export

* Run prettier

* Test password protected export service

* Create type for known import type strings

* Test import service changes

* Test bitwarden password importer

* Run prettier

* Remove unnecessary class properties

* Run prettier

* Tslint fixes

* Add KdfType to password protected export

* Linter fixes

* run prettier
2022-02-07 09:33:10 -06:00
Thomas Rittson
9caea70ea2
[authService refactor] Fix browser by not using instanceof (#647)
* use authenticationType enum instead of instanceof
2022-02-07 07:33:19 +10:00
Matt Gibson
380a7c7ee5
Use Identity server routes (#649)
* Use Identity server routes

We've moved `prelogin` and `register` endpoints to the Indentity project
Reflecting that change here

* Only update path for dev environment
2022-02-04 08:22:19 -06:00
Thomas Rittson
ec9559520b
Fix bug where no passwords recorded in history (#650) 2022-02-04 07:59:55 +10:00
Daniel James Smith
f6ba252139
Temporarily remove keeper json import for the Feb release (#654) 2022-02-03 22:24:22 +01:00
Addison Beck
067cd1e0e1
[bug] Assign client specific account settings during migration (#653)
* [bug] Assign client specific account settings during migration

* [refactor] Write State type arguements in consistent order

* [style] Ran prettier
2022-02-03 13:32:42 -05:00
Thomas Rittson
aa2bdd00be
[Tech debt] Refactor authService and remove LogInHelper (#588)
* Use different strategy classes for different types of login
* General refactor and cleanup of auth logic
* Create subclasses for different types of login credentials
* Create subclasses for different types of tokenRequests
* Create TwoFactorService, move code out of authService
* refactor base CLI commands to use new interface
2022-02-01 09:51:32 +10:00
Addison Beck
92a65b7b36
[bug] Allow for GlobalState to be extended and modified in clients (#646)
Some clients have unique global setting defaults (and unique global settings)
For example: the web vault defaults to light theme, but most clients with theme support default to system theme.

The current way we handle GlobalState is buried in jslib and not easily extendible in clients.

To fix this, we need to treat GlobalState as a generic in the StateService and StateMigration service and allow for its extension in those methods and anywhere GlobalState is inited.
2022-01-31 14:33:31 -05:00
Addison Beck
e372bf242b
[cleanup] Adjust type to match abstraction (#643) 2022-01-28 08:18:39 -05:00
Addison Beck
6c61f53d8b
[bug] Always save environmentUrls passed to setUrls (#641)
* [bug] Always save environmentUrls passed to setUrls

* [bug] Remove parameter from abstraction as well

* [bug] Correct type in abstraction
2022-01-28 08:15:02 -05:00
Addison Beck
ca5b057b43
[refactor] Use ThemeType enum instead of string (#642) 2022-01-28 11:28:36 +01:00
Addison Beck
83305313f9
[bug] Properly define stored window state (#638) 2022-01-27 10:44:09 -05:00
Daniel James Smith
5353cf03b5
BEEEP: Add importer for Keeper in json format (#608)
* Add testdata, create types for keeperjson import

* Create keeperjson importer and tests

* Register, Create instance of keeperjson importer

* Move keeperCsvImporter to keeperImporters folder

* Fixed import of BaseImporter

* Removed unnecessary check for key

* Move instantiation of importer into beforeEach

* Fixed the second import with a wrong path

* Adjust types based on new test export

* Add test case for empty notes and custom fields

* Implement logic for failed test case

* Removed test expectation
2022-01-26 23:04:55 +01:00
Oscar Hinton
e1d4c4c903
Expose getKeyFromStorage with userId (#633) 2022-01-25 15:45:02 +01:00
Daniel James Smith
af7da0e942
Ensure that initialization and migration only run once (#631) 2022-01-24 20:37:52 +01:00
Addison Beck
e5cc3de46d
[bug] Move enableBrowserIntegration to global state (#630) 2022-01-24 10:47:41 -05:00
Addison Beck
4436e5fb60
[bug] Ensure globals set before migration is run are not lost (#629)
* [bug] Ensure globals set before migration is run are not lost

Some fields, like biometrics, are set before we can run the state migration
For some use cases, like initial install, this can lead to migration clearing those fields when it doesn't find them in storage.
This commit sets up an order of checks for migrating globals that considers fields that may already have been set.

* [style] Ran prettier
2022-01-24 08:22:21 -05:00
Addison Beck
1747f4d9e7
[bug] Set all urls when setting urls from storage (#628) 2022-01-24 07:28:51 -05:00
Addison Beck
074f1ee7b7
[bug] Set envUrls after assigning defaults during scaffolding (#627) 2022-01-21 13:35:14 -05:00
Addison Beck
9b0e5ae456
[bug] Address existing data & defaults when migrating from an unauthenticated state (#626) 2022-01-21 12:41:15 -05:00
Addison Beck
69fe7b8339
[bug] Always set environementUrls from client when scaffolding an account (#624)
There is a use case that overrides locally set environmentUrls: an initial boot of a logged out application.
We override environmentUrls with whatever the tempory settings store has, even if different urls are added before authenticating.
This commit ensures we always use input environmentUrls.
2022-01-21 11:14:34 -05:00
Addison Beck
025a4a5e38
[bug] Index search service when setting decrypted ciphers (#620)
With the move to a central StateService we erroniously cut out search indexing from the process of setting decrypted ciphers to memory.
This commit calls the method responsible for setting decrypted ciphers and indexing when decrypting, instead of setting decrypted ciphers directly.
2022-01-20 16:25:04 -05:00
Addison Beck
cf1e483c7f
[bug] Account for entityId as a userId alternative during state migration (#622)
Some clients, like Directory Connector, use different key for their user identifier: entityId
We currently only check for userId in the migration service, but need to account for both.
2022-01-20 14:00:58 -05:00
Addison Beck
7300db703c
[Bug] Change method scope for internal StateMigrationService methods (#619)
A couple of helper methods were recently added to the StateMigrationService, but they were set to private and can't be used in children.
Some clients, like the Directory Connector, extend the StateMigrationService and need access to these methods.
2022-01-20 10:30:01 -05:00
Addison Beck
54c6a4b3c3
[bug] Correct scope for several data points (#618)
The following data points are currently scoped to an account but are made global with this commit:
* Enable Menu Bar Icon
* Minimize To Menu Bar
* Close To Menu Bar
* Start To Menu Bar

Note: these are all electron specific fields
2022-01-20 09:03:31 -05:00
Addison Beck
57351d29a2
[bug] Migrate state even if there is not a user logged in (#615)
Currently the StateMigrationService depends on a userId key for running migrations, but if there is not an authenticated user saved to storage that userId is not present.
These changes allow for migrating state data even without an active user. For account specific settings like clearClipboard we now temporarily store those values together in disk state until an account is authed that they can be added to. Temp account state is then cleared.

Some notes:
* In order for this to work we need GlobalState.stateVersion to have a default value of StateVersion.One instead of StateVersion.Latest. Defaulting it to latest was causing migrations to not run on some clients (like desktop) that try to access storage before migrations have been run but save a version as if migrations did run.
* I also noticed we aren't clearing old state items from before migrating, and added a case for this to the migrator.
* I extracted a few bits of reused code into private methods in the stateMigration service. Things like get/set from storage, default options, etc.
2022-01-20 08:30:00 -05:00
Thomas Rittson
11e7133aef
Save usesKeyConnector using defaultOnDiskOptions (#617) 2022-01-20 19:32:44 +10:00
Thomas Rittson
9737c829f3
Fix migration to Key Connector in cli commands (#616)
* Move CLI Key Connector check out of base class

* Add missing await

* Move safe operation out of try/catch block

* Move Key Connector migration check to unlock command

* Set convertAccountRequired flag in syncService

* Remove unneeded service
2022-01-20 19:28:48 +10:00
Addison Beck
ccd715d7b8
[Bug] [Account Switching] Improve State Management Performance (#611)
* [bug] Improve state management performance

Large vaults see a clear degrade in performance using the state service, especially when multiple vaults are authed and unlocked at the same time.

Some changes made to address this:
1. Clearing in memory decrypted data for non active accounts. This really should have been something we were doing anyway, but letting go of that memory burden has a noticable performance boost.
2. Not loading a bunch of unecsassary data from disk accounts into memory on application startup. This was being done to initilize in memory accounts, but brought a lot of extra baggage with it like storing encrypted data in memory, even though it is never referenced that way.
3. Breaking the on disk state object up into seperate keys for accounts instead of storing everything together under a "state" key. This ensures there is less information fetched from disk each time we call for an account.

There were some restructuring changes needed to facilitate these items:
1. We need to be able to construct an account in the StateService, but typescript doesn't allow for new() constraints on generics so a factory needs to be created and passed into the StateService for this to work.
2. Since we can't reference an all-knowing "accounts" object for on disk state anymore we have to maintain a list of authenticated accounts, and this has been added.
3. The StateMigration service needed to be updated to break up the accounts object, so current dev and QA state will be broken and need to be reset.

Some other general refactorings that were helpful gettings this working:
1. Added a constant for keys to the StateService and StateMigrationService.
2. Bundling everything needed to deauthenticate a user into a dedicated method.
3. Bundling all the disk storage clear methods (that should be refactored later into client specific state services) into one helper method.
4. Bundling everything needed to dynamically select a new active user into a dedicated method.

* [bug] Set environmentUrls appropriatly on account add

* [bug] Stop tracking activity without an active user

* [bug] Remove lastActive from globalState and globalState migration

* [style] Ran prettier
2022-01-19 10:51:10 -05:00
Thomas Rittson
cc285e5ea7
Always migrate envUrls (#614) 2022-01-18 13:44:39 +10:00
Oscar Hinton
12011bf4da
Add a shared tsconfig file (#609) 2022-01-17 13:21:20 +01:00
Addison Beck
957e010036
[bug] Ensure neverLock vaults can be manually locked (#607)
The client side storage restructuring work incorrectly checks if a vault has ever been unlocked to determine neverLock scenerios, but production does the opposite.
This creates an inability to never manually lock neverLock vaults.
This commit sets that condition back to the way it was.
2022-01-12 11:32:45 -05:00
Robyn MacCallum
172392ff3b
[Account Switching] Fix options dropdowns being empty (#603)
* Fix dropdowns initially being empty

* run prettier

* Remove default nulls for locale and theme
2022-01-12 09:11:25 -05:00
Thomas Rittson
2341b1907a
Fix "no amr found" error in bwdc cli (#589)
* Fix amr error when authing with org api key

* Fix linting

* Return null instead of error if no amr

* Return false instead of null
2022-01-11 13:22:52 +10:00
Addison Beck
4074c2a45f
[Bug] [Account Switching] Ensure EnvironmentUrls Pull From The Correction Location On Account Add (#602)
* [bug] Fully initilize environmentUrls default value

We want the full environmentUrls object to be saved to storage with null values as an indicator of using BW cloud.
Currently the initilization behavior creates an empty object instead. Setting property values returns the correct behavior.

* [bug] Return the correct environmentUrls when scaffloging a new account

To allow for setting environmentUrls before an account is created we save that value as a global setting and then apply it to any newly authed accounts.
There is a bug that will instead save the urls used by the previous logged in account, making account switching with multiple servers cause errors.

This commit resolves this by specifically getting environementUrls from global state when creating a new account
2022-01-10 12:25:38 -05:00
Addison Beck
57d60bdfa6
Misc Account Switching Fixes & Refactors (#600)
* [refactor] Restructure EnvironmentUrls in state

* Patch up (add missing fields) and more extensivly use the EnvironmentUrls class instead of passing around an any
* Add environmentUrls to the AccountSettings model in addition to GlobalState for use in both scopes
* Move EnvironmentUrls initialization to the model level and out of StateSerice
* Adjust the StateMigrationService to account for these changes

* [refactor] Improve order of operations for LockGuardService

We currently jump through a bunch of hoops to verify users can access the Lock page, like checking authentication first.
If a user is not authenticated, they are not locked, so we can improve performance for the happy path of this serivice by checking isLocked first and using isAuthenticated to deviate from the normal flow if needed.

* [bug] Subscribe to State.accounts in EnvironmentService and set urls accordingly

The EnvironmentService has no context for account changes currently and does not update actively used urls based on active account.
This commit addresses this issue by subscribing to State.accounts and resetting the service's urls on account change.

* [bug] Clear AccessToken from State on clean

In order for logout flows to function as expected we need to deauthenticate users when cleaning up state before checking for the next active user
Otherwise the service will continue to think the user being logged out is active

* [refactor] Stop pushing accounts when modifying disk state

There is no reason to push new accounts to subscribers when updating disk state.
Subscribers recieve a copy of in memory state, so changes to disk will not be refelected and have to be fetched seperatly from the service.
Pushing when saving disk state is just creating an unecassary performance burden.

* [refactor] Default to in memory active user if availible, even when accessing disk state

Sometimes we need to pull activeUserId from storage to access a bit of data, like on initial boot, but most of the time this isn't necassary.
Since we pull this userId a lot, checking disk each time is a performance burden. Defaulting to the in memory user ID if avaible helps alleviate this.

* [style] Ran prettier

* [style] Change a let to a const
2022-01-07 09:30:54 -05:00
Robyn MacCallum
c27fc39411
Use correct api Keys (#599) 2022-01-06 11:03:44 -05:00
Addison Beck
e4cd0af2f9
[bug] Add several state value defaults (#593)
* [bug] Add several state value defaults

* [refactor] Implement StateVersion as an enum

* [refactor] Implement StateVersion enum over magic number
2021-12-31 09:14:43 -05:00
Daniel James Smith
d68c1dafaf
Remove usage/detection of NativeScript (#566)
* Remove usage of NativeScript

* npm prettier run

* Removing type from Utils.global
2021-12-22 19:46:25 +01:00
Jake Fink
3d7b427b0e
Use MP policies when registering a new user through SSO (#587)
* use MP policies when registering a new user through SSO

* prettier and linting
2021-12-21 12:02:56 -05:00
Addison Beck
9e26336549
[feat(Account Switching)] Allow for extending application state (#584)
* [feat(Account Switching)] Allow for extending application state

* [bug(Account Switching)] Remove hardcoded dev urls

* [bug(Account Switching)] Init Account when signing in

* [bug(Account Switching)] Check for state migration version in local storage for web

* [bug(Account Switching)] Fix never lock configurations

* [chore] Prettier merge

* [bug] Move environmentUrls to global state

* [chore] Ran prettier

* [bug]change storage location for enityId and type

* [style] Ran prettier

Co-authored-by: Robyn MacCallum <robyntmaccallum@gmail.com>
2021-12-20 08:48:47 -05:00
Jake Fink
59a5300458
move sso properties to globalstate (#583)
* move sso properties to globalstate

* whitespace

* npm prettier changes
2021-12-17 11:24:38 -05:00
Linus Aarnio
a8168d6ee7
Fix for issue #1287 in bitwarden/web (#569)
* Format the fieldvalue as a LocaleDateString instead of epoch when importing a date from 1P

This would be better solved by storing it as a date FieldType instead of Text. But since it is unclear when new field types are added, this solution serves as a fix for now and also guides the solution when new fieldtype exists.

* Remove trailing whitespace

* Add tests for custom fields of 1pif imported identity

* Change representation of 1pif imported dates to UTC string

* Changes after running prettier

Co-authored-by: Daniel James Smith <djsmith@web.de>
2021-12-16 18:46:33 +01:00
Oscar Hinton
193434461d
Apply Prettier (#581) 2021-12-16 13:36:21 +01:00