* [PM-18650] Ensure http url is returned if well-known cannot be confirmed
* [PM-18650] Modify getChangePasswordUrl logic to check each cipher URL until a valid well-known url is found
* Remove unneeded margin
* Made send-search.component ts-strict compliant
---------
Co-authored-by: Daniel James Smith <djsmith85@users.noreply.github.com>
* Renamed to JSON5
* Renovate config to group actions by team.
* Corresponding CODEOWNERS changes.
* Updated linting script to use new file name.
* Added note to check CODEOWNERS before changing.
* Added json5 dependency.
* Updated comments for package grouping.
* A few comment adjustments.
* Removed minor-only grouping and Platform cargo prefix.
* Added comments.
* Added back new line to remove extra change in PR.
* Removed package rule for patch to move to base config.
* Create web-specific new-send-dropdown component
* Create web-specifc Send Add/Edit dialog
* Use new-send-dropdown and replace old Send Add/Edit with new Add/Edit dialog
* Delete old Send Add/Edit component
* Remove unused entries from en/messages.json
* Add cancel button to close dialog
* Remove unused RouterLink
* Fix typechecking issue
* Use observable to show/hide premium badge
* Add documentation
* Move assignment of observable into ctor, as it no longer requires a promise for assignment
---------
Co-authored-by: Daniel James Smith <djsmith85@users.noreply.github.com>
* add event handling for username generator
* fix specs. change function name to not be of an event type
* update specs
* rename function
* revert name change
* fix spec
* bubble algorithmSelected up to generator components. add disabled button tests
* add typeSelected event
* revert addition of onType.
* apply same logic in onAlgorithmSelected to web and desktop
* fix: set `needs_unlock` default value to true on unix
closes#13323
* fix: ssh prompt not appearing right after unlocking vault
---------
Co-authored-by: Daniel James Smith <2670567+djsmith85@users.noreply.github.com>
Co-authored-by: Colton Hurst <colton@coltonhurst.com>
* PM-18654 - State Service & Login Strategy Refactor - move env seeding into login strategy so that new accounts always load w/ the correct environment
* PM-18654 - SSO Comp - just use user id from auth result
* PM-18654 - Config Service - (1) don't allow cascading calls to the renewConfig by using a private promise (2) Replace shareReplay with share configured with manual timer
* PM-18654 - LoginComponents - detail issue and possible fix
* PM-18654 - DesktopLoginV1Comp - use correct destroy hook
* PM-18654 - LoginComp - clean up no longer correct comment
* PM-18654 - New Device Verification Component - Remove unused PasswordLoginStrategy dependency
* PM-18654 - Browser Home Component - fix qParam logic
* PM-18654 - DefaultConfigService - revert changes as they aren't necessary to fix the bug.
* PM-18654 - DefaultConfigService - remove commented code
* PM-18654 - LoginStrategy - add comment
* PM-18654 - Fix login strat tests
* [PM-18707] Remove redundant cipherService subscription
* [PM-18707] Add artificial tick delay to cipherService to allow for ElectronStore storage service to fully save before continuing
* PM-18276-wip
* update typing
* dynamically retrieve messages, resolve theme in function
* five second timeout after save or update
* adjust timeout to five seconds
* negligible performance gain-revert
* sacrifice contorl for to remove event listeners-revert
* PM-18493 initial wip commit
* fix types and story
* edit tests to account for sendmessagewithdata
* add tests and return id on new add/save
* function name
This resolves an issue where the WebAuthn setup component's read key button would show a loading spinner indefinitely. The fix addresses problems with Signal handling for the bitButton component's disabled/loading states.
JIRA: PM-18719
* move vault timeout and vault timeout settings to km
* move browser vault timeout service to km
* fix cli import
* fix imports
* fix some relative imports
* use relative imports within common
* fix imports
* fix new imports
* Fix new imports
* fix spec imports
* biometric's no client key half provided for user
Biometric's client key half can be optional (null) when the password is not required on start of the application
* improved unit test coverage
* ipc setClientKeyHalf can be null
Only display the cipher's name if the user running the report does not have permissions to view/edit the cipher
Co-authored-by: Daniel James Smith <djsmith85@users.noreply.github.com>
* Added permission check for organizational inactive 2fa report
Only display the cipher's name if the user running the report does not have permissions to view/edit the cipher
* Add appropiate access modifiers to newly added members/methods
---------
Co-authored-by: Daniel James Smith <djsmith85@users.noreply.github.com>