1
0
mirror of https://github.com/bitwarden/browser.git synced 2024-11-27 12:36:14 +01:00
Commit Graph

1140 Commits

Author SHA1 Message Date
Vincent Salucci
dd147ce338
[Enterprise] Updated Environment Settings (#112)
* Initial commit of enterprise environment option

* Reverting API/EnvironmentUrls changes
2020-06-11 15:04:40 -05:00
Chad Scharf
2b6657a293
Merge pull request #104 from Hinton/feature/hide-passwords
Add support for collections with hide passwords
2020-06-11 14:26:57 -04:00
Hinton
0338dfe05a Merge branch 'master' of https://github.com/bitwarden/jslib into feature/hide-passwords
# Conflicts:
#	src/models/response/cipherResponse.ts
2020-06-11 00:24:02 +02:00
Kyle Spearrin
d1e4eebebb check for empty string on malformed URL (#108) 2020-06-11 00:22:46 +02:00
Vincent Salucci
17298cf188 Bug fix: made lock default conditional check (#106) 2020-06-11 00:22:46 +02:00
Kyle Spearrin
6e52c2846d getEnterprisePortalSignInToken api (#105) 2020-06-11 00:22:46 +02:00
Chad Scharf
8e603ff420
Merge pull request #103 from Hinton/patch-1
Resolve edit always being true for ciphers
2020-06-10 14:44:21 -07:00
hinton
4d776ca0ef Fix spelling mistakes 2020-06-04 22:15:45 +02:00
hinton
34402571e7 Add newField property to FieldView, used for allowing edits for new fields 2020-06-03 20:45:53 +02:00
Kyle Spearrin
eef9588646
check for empty string on malformed URL (#108) 2020-06-01 14:31:42 -04:00
Vincent Salucci
212a2e3745
Bug fix: made lock default conditional check (#106) 2020-05-28 14:09:55 -04:00
Kyle Spearrin
1bbd808105
getEnterprisePortalSignInToken api (#105) 2020-05-27 15:21:53 -04:00
hinton
1fa3eb49ad Add support for collections with hide passwords 2020-05-21 15:54:15 +02:00
Oscar Hinton
ab506ffbdb
Resolve edit always being true for ciphers
I noticed that ciphers will always have `edit = True` even if the sync response has `edit = false`.

The root cause seems to be a boolean default to true. And since `false || true => true` it would always be set to true.
2020-05-21 14:31:53 +02:00
Kyle Spearrin
2858724f44
default to text field type (#102) 2020-05-20 15:30:58 -04:00
Pasi Niemi
fb7335b927
Enable alternative ways for settings passwords (#101)
* Enable alternative ways for settings passwords:
* the environment variable BW_PASSWORD
* prefix the command line argument with "file:" and the password will read from the first line of that file
* prefix the command line argument with "env:" and the password will be read from that environment variable

* Appveyor fixes

* Switch to using command options for password file and password env

* Lowercase options
2020-05-08 10:38:28 -04:00
Kyle Spearrin
0092aac275
fixes to url parsing (#99)
* fixes to url parsing

* make it a little more intelligent to pass tests
2020-04-29 11:47:34 -04:00
Kyle Spearrin
5e24e396ab
Add support for enpass sensitive fields (#98) 2020-04-29 11:12:59 -04:00
Elias Papavasileiou
2de8c5ed16
Add minimizeOnCopyToClipboardKey constant (#74)
* Add minimizeOnCopyToClipboardKey constant

* Move minimizeOnCopyToClipboardKey constant to electronConstants.ts

* Add minimizeIfNeeded method to view component

* Revert "Add minimizeIfNeeded method to view component"

This reverts commit 7a5f2a3aa3d418ead5c03ce4c3f0ba00ffd34bb2.

* Make storageService protected in window.main

* Revert "Make storageService protected in window.main"

This reverts commit 0431565c6596f7e4cb8c20b84fcbb56ce5772565.
2020-04-14 16:11:00 -04:00
mtgto
8438cafbd0
Update lunr type (#93) 2020-04-14 15:16:18 -04:00
Chad Scharf
e9db844285
Merge pull request #97 from bitwarden/soft-delete
[Soft Delete] - view component to handle soft delete and restore
2020-04-13 09:57:34 -04:00
Chad Scharf
222792940c [Soft Delete] - tslint err fix 2020-04-10 16:59:39 -04:00
Chad Scharf
112212de1b Merge branch 'soft-delete' of https://github.com/bitwarden/jslib into soft-delete 2020-04-10 16:47:30 -04:00
Chad Scharf
e52df4f743 [Sot Delete] update to view and i18n for delete 2020-04-10 16:46:57 -04:00
Chad Scharf
6ea0ce5287 [Sot Delete] update to view and i18n for delete 2020-04-10 16:42:34 -04:00
Chad Scharf
8d796dc3c2
Merge pull request #96 from bitwarden/soft-delete
Soft delete - update cipher search and added restore functionality
2020-04-10 10:01:17 -04:00
Chad Scharf
3a10c1ff30 [Soft Delete] - cipher search rem deleted flag, filter array conditional 2020-04-08 16:44:13 -04:00
Chad Scharf
549fcc18ff Merge branch 'master' into soft-delete 2020-04-06 19:09:56 -04:00
Chad Scharf
2a3e03c70d [Soft Delete] - Included deleted flag on reload 2020-04-06 18:20:39 -04:00
Vincent Salucci
72e3893f8e
[Auto-Logout] Update Token Service (#94)
* Auto logout on restart

* Updated setTokens function

* Remove async deocrator from setTokens

Co-authored-by: Vincent Salucci <vsalucci@bitwarden.com>
2020-04-06 11:06:32 -05:00
Chad Scharf
19668ab5f2 [Soft Delete] jslib updates for new API updates
New API methods and cipher Deleted Date property, plus search expansion to toggle on deleted flag.
2020-04-03 16:32:15 -04:00
Vincent Salucci
28e3fff739
[Auto-Logout] Implement logout functionality in VaultTimeoutService (#92)
* Initial commit for logic changes in VaultTimeoutService

* Fixed lint error

* Updated logOut spelling - as an action its two words

* Hitting save to make sure all my changes are included

* Made requested changes

Co-authored-by: Vincent Salucci <vsalucci@bitwarden.com>
2020-03-29 10:38:16 -05:00
Vincent Salucci
64c54cfb86
[Auto-Logout] Refactor LockService and Update Dependencies (#91)
* initial commit for lockService name refactor

* Reverted ConstantsService vault timeout key to legacy string value

Co-authored-by: Vincent Salucci <vsalucci@bitwarden.com>
2020-03-27 09:03:27 -05:00
Kyle Spearrin
31a257407b skipNegotiation for websockets 2020-03-21 00:19:40 -04:00
Vincent Salucci
3ad546c39f
Password Generator Sanitize Length (#89)
* Initial commit for length sanitization

* Updated sanitize function

* Updated type instantiation

Co-authored-by: Vincent Salucci <vsalucci@bitwarden.com>
2020-03-18 10:07:57 -05:00
Kyle Spearrin
0a30c7eb1e fix 1password csv importer 2020-03-12 16:59:59 -04:00
Kyle Spearrin
b816ddddff only block interaction if env var set 2020-03-12 15:37:21 -04:00
Kyle Spearrin
13d1067eda null check on policies response prop 2020-03-12 15:16:22 -04:00
mtgto
72b4c4401a
Add the lint to CI script (#87) 2020-03-11 09:06:45 -04:00
mtgto
d6c9acdf6f
Add noImplicitAny to tsc compiler options (#86) 2020-03-11 09:00:14 -04:00
Kyle Spearrin
36241e9eac bump user agent version for desktop 2020-03-10 15:00:29 -04:00
Vincent Salucci
ee8ca0beed
Password Generator Passphrase Policy (#85)
* Initial commit for passphrase enforcement

* Updated type implementation

* Updated default type conditional

* Added helper method to enforced options object

Co-authored-by: Vincent Salucci <vsalucci@bitwarden.com>
2020-03-10 12:50:54 -05:00
Kyle Spearrin
44b86f5dd0
enforce policies when options already known (#83) 2020-03-03 16:03:26 -05:00
Vincent Salucci
da9b9b438c
Fixed lint warnings (#82) 2020-03-02 13:45:06 -06:00
Vincent Salucci
6210396aa9
Enforce master password policy (#79)
* Enforce master password policy

* Updated based on requested changes/discussions
2020-03-02 11:05:05 -06:00
Kyle Spearrin
0f699515a4
fixes to getPoliciesByToken (#81) 2020-03-02 11:37:44 -05:00
Kyle Spearrin
4aecc53dde
API for getting policies by token (#80)
* API for getting policies by token

* not authed when calling this API
2020-03-02 10:15:54 -05:00
Kyle Spearrin
fb48091bb8
Moved callout to jslib, made policyInEffect a prop (#77)
* Moved callout to jslib, made policyInEffect a prop

* remove true condition
2020-02-28 16:57:34 -05:00
Vincent Salucci
6c52942204
Show policy in effect banner for password generator (#76) 2020-02-28 11:09:57 -06:00
Vincent Salucci
862057dca6
Enforce Password Generator Policy (#75)
* Enforce Password Generator Policy

* Move policy enforcement to service layer

* Fixed typo (vscode didn't warn..) and adjust import spacing

* Made requested changes
2020-02-26 16:38:11 -06:00