Vincent Salucci
dd147ce338
[Enterprise] Updated Environment Settings ( #112 )
...
* Initial commit of enterprise environment option
* Reverting API/EnvironmentUrls changes
2020-06-11 15:04:40 -05:00
Chad Scharf
2b6657a293
Merge pull request #104 from Hinton/feature/hide-passwords
...
Add support for collections with hide passwords
2020-06-11 14:26:57 -04:00
Hinton
0338dfe05a
Merge branch 'master' of https://github.com/bitwarden/jslib into feature/hide-passwords
...
# Conflicts:
# src/models/response/cipherResponse.ts
2020-06-11 00:24:02 +02:00
Kyle Spearrin
d1e4eebebb
check for empty string on malformed URL ( #108 )
2020-06-11 00:22:46 +02:00
Vincent Salucci
17298cf188
Bug fix: made lock default conditional check ( #106 )
2020-06-11 00:22:46 +02:00
Kyle Spearrin
6e52c2846d
getEnterprisePortalSignInToken api ( #105 )
2020-06-11 00:22:46 +02:00
Chad Scharf
8e603ff420
Merge pull request #103 from Hinton/patch-1
...
Resolve edit always being true for ciphers
2020-06-10 14:44:21 -07:00
hinton
4d776ca0ef
Fix spelling mistakes
2020-06-04 22:15:45 +02:00
hinton
34402571e7
Add newField property to FieldView, used for allowing edits for new fields
2020-06-03 20:45:53 +02:00
Kyle Spearrin
eef9588646
check for empty string on malformed URL ( #108 )
2020-06-01 14:31:42 -04:00
Vincent Salucci
212a2e3745
Bug fix: made lock default conditional check ( #106 )
2020-05-28 14:09:55 -04:00
Kyle Spearrin
1bbd808105
getEnterprisePortalSignInToken api ( #105 )
2020-05-27 15:21:53 -04:00
hinton
1fa3eb49ad
Add support for collections with hide passwords
2020-05-21 15:54:15 +02:00
Oscar Hinton
ab506ffbdb
Resolve edit always being true for ciphers
...
I noticed that ciphers will always have `edit = True` even if the sync response has `edit = false`.
The root cause seems to be a boolean default to true. And since `false || true => true` it would always be set to true.
2020-05-21 14:31:53 +02:00
Kyle Spearrin
2858724f44
default to text field type ( #102 )
2020-05-20 15:30:58 -04:00
Pasi Niemi
fb7335b927
Enable alternative ways for settings passwords ( #101 )
...
* Enable alternative ways for settings passwords:
* the environment variable BW_PASSWORD
* prefix the command line argument with "file:" and the password will read from the first line of that file
* prefix the command line argument with "env:" and the password will be read from that environment variable
* Appveyor fixes
* Switch to using command options for password file and password env
* Lowercase options
2020-05-08 10:38:28 -04:00
Kyle Spearrin
0092aac275
fixes to url parsing ( #99 )
...
* fixes to url parsing
* make it a little more intelligent to pass tests
2020-04-29 11:47:34 -04:00
Kyle Spearrin
5e24e396ab
Add support for enpass sensitive fields ( #98 )
2020-04-29 11:12:59 -04:00
Elias Papavasileiou
2de8c5ed16
Add minimizeOnCopyToClipboardKey constant ( #74 )
...
* Add minimizeOnCopyToClipboardKey constant
* Move minimizeOnCopyToClipboardKey constant to electronConstants.ts
* Add minimizeIfNeeded method to view component
* Revert "Add minimizeIfNeeded method to view component"
This reverts commit 7a5f2a3aa3d418ead5c03ce4c3f0ba00ffd34bb2.
* Make storageService protected in window.main
* Revert "Make storageService protected in window.main"
This reverts commit 0431565c6596f7e4cb8c20b84fcbb56ce5772565.
2020-04-14 16:11:00 -04:00
mtgto
8438cafbd0
Update lunr type ( #93 )
2020-04-14 15:16:18 -04:00
Chad Scharf
e9db844285
Merge pull request #97 from bitwarden/soft-delete
...
[Soft Delete] - view component to handle soft delete and restore
2020-04-13 09:57:34 -04:00
Chad Scharf
222792940c
[Soft Delete] - tslint err fix
2020-04-10 16:59:39 -04:00
Chad Scharf
112212de1b
Merge branch 'soft-delete' of https://github.com/bitwarden/jslib into soft-delete
2020-04-10 16:47:30 -04:00
Chad Scharf
e52df4f743
[Sot Delete] update to view and i18n for delete
2020-04-10 16:46:57 -04:00
Chad Scharf
6ea0ce5287
[Sot Delete] update to view and i18n for delete
2020-04-10 16:42:34 -04:00
Chad Scharf
8d796dc3c2
Merge pull request #96 from bitwarden/soft-delete
...
Soft delete - update cipher search and added restore functionality
2020-04-10 10:01:17 -04:00
Chad Scharf
3a10c1ff30
[Soft Delete] - cipher search rem deleted flag, filter array conditional
2020-04-08 16:44:13 -04:00
Chad Scharf
549fcc18ff
Merge branch 'master' into soft-delete
2020-04-06 19:09:56 -04:00
Chad Scharf
2a3e03c70d
[Soft Delete] - Included deleted flag on reload
2020-04-06 18:20:39 -04:00
Vincent Salucci
72e3893f8e
[Auto-Logout] Update Token Service ( #94 )
...
* Auto logout on restart
* Updated setTokens function
* Remove async deocrator from setTokens
Co-authored-by: Vincent Salucci <vsalucci@bitwarden.com>
2020-04-06 11:06:32 -05:00
Chad Scharf
19668ab5f2
[Soft Delete] jslib updates for new API updates
...
New API methods and cipher Deleted Date property, plus search expansion to toggle on deleted flag.
2020-04-03 16:32:15 -04:00
Vincent Salucci
28e3fff739
[Auto-Logout] Implement logout functionality in VaultTimeoutService ( #92 )
...
* Initial commit for logic changes in VaultTimeoutService
* Fixed lint error
* Updated logOut spelling - as an action its two words
* Hitting save to make sure all my changes are included
* Made requested changes
Co-authored-by: Vincent Salucci <vsalucci@bitwarden.com>
2020-03-29 10:38:16 -05:00
Vincent Salucci
64c54cfb86
[Auto-Logout] Refactor LockService and Update Dependencies ( #91 )
...
* initial commit for lockService name refactor
* Reverted ConstantsService vault timeout key to legacy string value
Co-authored-by: Vincent Salucci <vsalucci@bitwarden.com>
2020-03-27 09:03:27 -05:00
Kyle Spearrin
31a257407b
skipNegotiation for websockets
2020-03-21 00:19:40 -04:00
Vincent Salucci
3ad546c39f
Password Generator Sanitize Length ( #89 )
...
* Initial commit for length sanitization
* Updated sanitize function
* Updated type instantiation
Co-authored-by: Vincent Salucci <vsalucci@bitwarden.com>
2020-03-18 10:07:57 -05:00
Kyle Spearrin
0a30c7eb1e
fix 1password csv importer
2020-03-12 16:59:59 -04:00
Kyle Spearrin
b816ddddff
only block interaction if env var set
2020-03-12 15:37:21 -04:00
Kyle Spearrin
13d1067eda
null check on policies response prop
2020-03-12 15:16:22 -04:00
mtgto
72b4c4401a
Add the lint to CI script ( #87 )
2020-03-11 09:06:45 -04:00
mtgto
d6c9acdf6f
Add noImplicitAny to tsc compiler options ( #86 )
2020-03-11 09:00:14 -04:00
Kyle Spearrin
36241e9eac
bump user agent version for desktop
2020-03-10 15:00:29 -04:00
Vincent Salucci
ee8ca0beed
Password Generator Passphrase Policy ( #85 )
...
* Initial commit for passphrase enforcement
* Updated type implementation
* Updated default type conditional
* Added helper method to enforced options object
Co-authored-by: Vincent Salucci <vsalucci@bitwarden.com>
2020-03-10 12:50:54 -05:00
Kyle Spearrin
44b86f5dd0
enforce policies when options already known ( #83 )
2020-03-03 16:03:26 -05:00
Vincent Salucci
da9b9b438c
Fixed lint warnings ( #82 )
2020-03-02 13:45:06 -06:00
Vincent Salucci
6210396aa9
Enforce master password policy ( #79 )
...
* Enforce master password policy
* Updated based on requested changes/discussions
2020-03-02 11:05:05 -06:00
Kyle Spearrin
0f699515a4
fixes to getPoliciesByToken ( #81 )
2020-03-02 11:37:44 -05:00
Kyle Spearrin
4aecc53dde
API for getting policies by token ( #80 )
...
* API for getting policies by token
* not authed when calling this API
2020-03-02 10:15:54 -05:00
Kyle Spearrin
fb48091bb8
Moved callout to jslib, made policyInEffect a prop ( #77 )
...
* Moved callout to jslib, made policyInEffect a prop
* remove true condition
2020-02-28 16:57:34 -05:00
Vincent Salucci
6c52942204
Show policy in effect banner for password generator ( #76 )
2020-02-28 11:09:57 -06:00
Vincent Salucci
862057dca6
Enforce Password Generator Policy ( #75 )
...
* Enforce Password Generator Policy
* Move policy enforcement to service layer
* Fixed typo (vscode didn't warn..) and adjust import spacing
* Made requested changes
2020-02-26 16:38:11 -06:00