* Use logService for console messages
* Implement a base ConsoleLog service
Use this class as a default for other services that would like to output
to console. This service is overriden in CLI and Desktop to use CLI's
consoleLogService and electronLogService, respectively.
* Use browser-process-hrtime for timing
* test LogService implementations
* Ignore default import of hrtime
* Clean up imports. Require ConsoleLog injection
Co-authored-by: Matt Gibson <mdgibson@Matts-MBP.lan>
* Change cipher type based on csv type header
* Test identity and credit card import
* Do not use node 'fs' module
Karma is being used for automated tests so node modules are not available
* WIP: mac and windows 1password importer split
Need to improve windows field identification to limit secret data
exposure and improve user experience
* Hide fields with likely secret values
Co-authored-by: Matt Gibson <mdgibson@Matts-MBP.lan>
* Use logService for console messages
* linter autofixes
* Use full import path
* Implement a base ConsoleLog service
Use this class as a default for other services that would like to output
to console. This service is overriden in CLI and Desktop to use CLI's
consoleLogService and electronLogService, respectively.
* linter fixes
Co-authored-by: Matt Gibson <mdgibson@Matts-MBP.lan>
* support for encrypted json export
* adjust filename prefix for encrypted formats
* flip if logic
* remove format param from encrypted export
* encryptedFormat getter
* Added support for authenticating with an API key
* added api service methods for user api keys
* fixed a copy/pasted api endpoint url
* Let toIdentityToken() use a a prestored client_id in place of the application client_id if one exists
* Allowed for api key auth in the cli
* Removed some commented out code commited for apiKey auth
* Cleanup for ApiKey auth in the CLI
* Removed cli prefix from client_crendential auth types
* Removed ClientPrefix conditional from decoded token getters
* Update src/services/api.service.ts
Co-authored-by: Kyle Spearrin <kspearrin@users.noreply.github.com>
* formatting
* changed command from login --apiKey to login --apikey
Co-authored-by: Kyle Spearrin <kspearrin@users.noreply.github.com>
* send work
* New method to update the last used index (#184)
Instead of updating it every time you call getNext(), it will be updated in a separate call, to avoid updating the index when the cipher did not auto-fill correctly (e.g wrong frame)
Fixes#1392
* added OnlyOrg to PolicyType enum (#183)
* [Require SSO] Add policy type enumeration (#186)
* Added SsoAuthentication policy type
* Updated policy type name // added comments for clarification of what each type controls
* [SSO] New user provision flow (#173)
* Initial commit of new user sso flow
* Adjusted stateSplit conditional per review
* Add logging to lowdb storage service (#188)
* Fix lint errors/warnings (#187)
* remove password api
* access id
* makeSendKey
Co-authored-by: Josep Marí <xusoo@users.noreply.github.com>
Co-authored-by: Addison Beck <abeck@bitwarden.com>
Co-authored-by: Vincent Salucci <26154748+vincentsalucci@users.noreply.github.com>
Co-authored-by: Chad Scharf <3904944+cscharf@users.noreply.github.com>
Instead of updating it every time you call getNext(), it will be updated in a separate call, to avoid updating the index when the cipher did not auto-fill correctly (e.g wrong frame)
Fixes#1392
* facilite linking an existing user to an org sso
* fixed a broken import
* added ssoBound and identifier to an org model
* added user identifier to sso callout url
* changed url for delete sso user api method
* facilite linking an existing user to an org sso
* fixed a broken import
* added ssoBound and identifier to an org model
* added user identifier to sso callout url
* changed url for delete sso user api method
* added a token to the existing user sso link flow
* facilite linking an existing user to an org sso
* fixed a broken import
* facilite linking an existing user to an org sso
* fixed a broken import
* added ssoBound and identifier to an org model
* added user identifier to sso callout url
* changed url for delete sso user api method
* added a token to the existing user sso link flow
* facilite linking an existing user to an org sso
* fixed a broken import
* removed an extra line
* encoded the user identifier on sso link
* code review cleanup for link sso
* removed a blank line
* Add new method for cycling through every login
To be used from browser extension when autofilling.
Related PR: https://github.com/bitwarden/browser/pull/956
* Cache sorted ciphers by URL and invalidate them after a period of 5 seconds
* Move file to models
* Update typescript to 3.6.5 along with tslint to latest.
* Upgrade @types/node to 12.12.54 to get rid of compile errors.
* Update tslint.
* Use @types/node 10.17.28 instead
* Initial work on windows hello support
* Switch to use windows.security.credentials.ui UserConsentVerifier
* Fix linting warnings
* Remove unessesary supportsBiometric from lock screen
* Rename biometric.main to windows.biometric.main. Add abstraction for biometric.
* Add support for dynamic biometric text.
* Add untested darwin implementation
* Rename fingerprintUnlock to biometric
* Add new functions to cliPlatformUtils.service.ts.
* Hide login if biometric is not supported
* Export default for biometric.*.main.ts
* Remove @nodert-win10-rs4/windows.security.credentials
* Add build requirements to readme
* Auto prompt biometric when starting the application.
* Ensure we support biometric before trying to auto prompt.
* Fix review comments and linting errors
* Initial commit for logic changes in VaultTimeoutService
* Fixed lint error
* Updated logOut spelling - as an action its two words
* Hitting save to make sure all my changes are included
* Made requested changes
Co-authored-by: Vincent Salucci <vsalucci@bitwarden.com>
* initial commit for lockService name refactor
* Reverted ConstantsService vault timeout key to legacy string value
Co-authored-by: Vincent Salucci <vsalucci@bitwarden.com>
* Initial commit for length sanitization
* Updated sanitize function
* Updated type instantiation
Co-authored-by: Vincent Salucci <vsalucci@bitwarden.com>