* Add direct attachment download and upload API endpoints
* Use direct download method
Enable download of emergency access attachments through EmergencyAccessId
* Match new Server model items
* New Server model for creating attachments.
Provides a url to upload data to, the type of upload, and the Cipher Response expected by the previous call
* Use direct upload url and scheme
* Report Failed single shot azure uploads
* Add cipher attachment upload to file upload service
* Deprecate legacy api methods
* Handle old servers missing new upload api methods
* Improve Send error handling
* Fallback attachment downloads on new endpoint not found
Limit upload size to the new 500MB
* Improve error handling
* lint fixes
* Lock lowdb storage file to avoid dirty data collisions
* Retry lock acquire rather than immediately fail
* Add proper-lockfile types to dev dependencies
* remove proper-lockfile from jslib.
This package is incompatible with Browser implementations.
* await lock on create
* Revert "Add policy property to TakeoverResponse"
This reverts commit 31da5081e6833cf8a9d5bb869c14600f25ca3f39.
* Add getEmergencyGrantorPolicies to api service
* Upgrade commander to 7.0.0
* Add url to Api call
This is needed to allow access to sends that are available from a
different Bitwarden server than configured for the CLI
* Allow upload of send files from CLI
* Allow send search by accessId
* Utils methods used in Send CLI implementation
* Revert adding string type to encrypted file data
* linter fixes
* Add Buffer to ArrayBuffer used in CLI send implementation
* update package http-proxy-agent
* Update syntax appropriately
* Explicitly add utils package to fix broken tests
* Revert "Explicitly add utils package to fix broken tests"
This reverts commit 2cf03fdcbae89e55124c7e36201238520434f8cc.
* Import util in spec to make sure it gets bundled
* Revert "Import util in spec to make sure it gets bundled"
This reverts commit 79264cdab0ef37af855d64a6dc3ef574575309d2.
* Add alias to ensure util module resolves in tests
Co-authored-by: Thomas Rittson <trittson@bitwarden.com>
* Do not export trashed items
* Test Item exporting
Does not test organization export. Export's use of apiService is not
very testable. We will either need a testApiService or to refactor
apiService to make mocking easier.
* Linter fixes
* Use logService for console messages
* Implement a base ConsoleLog service
Use this class as a default for other services that would like to output
to console. This service is overriden in CLI and Desktop to use CLI's
consoleLogService and electronLogService, respectively.
* Use browser-process-hrtime for timing
* test LogService implementations
* Ignore default import of hrtime
* Clean up imports. Require ConsoleLog injection
Co-authored-by: Matt Gibson <mdgibson@Matts-MBP.lan>
* Change cipher type based on csv type header
* Test identity and credit card import
* Do not use node 'fs' module
Karma is being used for automated tests so node modules are not available
* WIP: mac and windows 1password importer split
Need to improve windows field identification to limit secret data
exposure and improve user experience
* Hide fields with likely secret values
Co-authored-by: Matt Gibson <mdgibson@Matts-MBP.lan>
* Use logService for console messages
* linter autofixes
* Use full import path
* Implement a base ConsoleLog service
Use this class as a default for other services that would like to output
to console. This service is overriden in CLI and Desktop to use CLI's
consoleLogService and electronLogService, respectively.
* linter fixes
Co-authored-by: Matt Gibson <mdgibson@Matts-MBP.lan>
* support for encrypted json export
* adjust filename prefix for encrypted formats
* flip if logic
* remove format param from encrypted export
* encryptedFormat getter
The motivation for this is https://github.com/bitwarden/cli/issues/129
where failed sync's are swallowed by try-catch. By moving the try-catch
to the outside it is possible to reuse the already existing
allowThrowOnError argument which callers can use to signal whether
fullSync should throw or ignore errors silently. This patch is
companioned with a patch to the SyncCommand CLI command to pass
allowThrowOnError.
This is in conjunction with API changes that validates the last known
revision date provided here with the actual last revision date on the
server to block potential data loss due to client desyncs.
Co-authored-by: Matt Gibson <mdgibson@Matts-MBP.lan>
* Added support for authenticating with an API key
* added api service methods for user api keys
* fixed a copy/pasted api endpoint url
* Let toIdentityToken() use a a prestored client_id in place of the application client_id if one exists
* Allowed for api key auth in the cli
* Removed some commented out code commited for apiKey auth
* Cleanup for ApiKey auth in the CLI
* Removed cli prefix from client_crendential auth types
* Removed ClientPrefix conditional from decoded token getters
* Update src/services/api.service.ts
Co-authored-by: Kyle Spearrin <kspearrin@users.noreply.github.com>
* formatting
* changed command from login --apiKey to login --apikey
Co-authored-by: Kyle Spearrin <kspearrin@users.noreply.github.com>
* send work
* New method to update the last used index (#184)
Instead of updating it every time you call getNext(), it will be updated in a separate call, to avoid updating the index when the cipher did not auto-fill correctly (e.g wrong frame)
Fixes#1392
* added OnlyOrg to PolicyType enum (#183)
* [Require SSO] Add policy type enumeration (#186)
* Added SsoAuthentication policy type
* Updated policy type name // added comments for clarification of what each type controls
* [SSO] New user provision flow (#173)
* Initial commit of new user sso flow
* Adjusted stateSplit conditional per review
* Add logging to lowdb storage service (#188)
* Fix lint errors/warnings (#187)
* remove password api
* access id
* makeSendKey
Co-authored-by: Josep Marí <xusoo@users.noreply.github.com>
Co-authored-by: Addison Beck <abeck@bitwarden.com>
Co-authored-by: Vincent Salucci <26154748+vincentsalucci@users.noreply.github.com>
Co-authored-by: Chad Scharf <3904944+cscharf@users.noreply.github.com>
Instead of updating it every time you call getNext(), it will be updated in a separate call, to avoid updating the index when the cipher did not auto-fill correctly (e.g wrong frame)
Fixes#1392