mirror of
https://github.com/bitwarden/mobile
synced 2025-12-15 07:43:37 +00:00
* PM-1575 Added new models for Fido2Key
* PM-1575 Added discoverable passkeys and WIP non-discoverable ones
* PM-1575 Fix format
* PM-1575 Added non-discoverable passkeys to login UI
* PM-1575 Added copy application icon to Fido2Key UI
* PM-1575 Updated bwi font with the updated passkey icon
* PM-1575 For now just display Available for two-step login on non-discoverable passkey inside of a cipher login
* PM-1575 Fix non-discoverable passkey visibility
* PM-1575 remove Passkeys as a filter in the vault list
* PM-1575 Display error toast if there is a duplicate passkey when moving a cipher to an org
* Revert "PM-1575 Display error toast if there is a duplicate passkey when moving a cipher to an org"
This reverts commit 78e6353602.
* [PM-2378] Display error toast on duplicate Passkey when moving cipher to an organization (#2594)
* PM-2378 Display error toast if there is a duplicate passkey when moving a cipher to an org
* PM-3097 Fix issue when moving cipher with passkey to an org where the uniqueness should be taken into consideration on different passkeys types and also the Username (#2632)
* PM-3096 Fix non-discoverable passkey to be taken into account when encrypting a cipher which was causing the passkey to be removed when moving to an org (#2637)
79 lines
2.3 KiB
C#
79 lines
2.3 KiB
C#
using System;
|
|
using System.Collections.Generic;
|
|
using System.Linq;
|
|
using System.Threading.Tasks;
|
|
using Bit.Core.Models.Data;
|
|
using Bit.Core.Models.View;
|
|
|
|
namespace Bit.Core.Models.Domain
|
|
{
|
|
public class Login : Domain
|
|
{
|
|
public Login() { }
|
|
|
|
public Login(LoginData obj, bool alreadyEncrypted = false)
|
|
{
|
|
PasswordRevisionDate = obj.PasswordRevisionDate;
|
|
Uris = obj.Uris?.Select(u => new LoginUri(u, alreadyEncrypted)).ToList();
|
|
Fido2Key = obj.Fido2Key != null ? new Fido2Key(obj.Fido2Key, alreadyEncrypted) : null;
|
|
BuildDomainModel(this, obj, new HashSet<string>
|
|
{
|
|
"Username",
|
|
"Password",
|
|
"Totp"
|
|
}, alreadyEncrypted);
|
|
}
|
|
|
|
public List<LoginUri> Uris { get; set; }
|
|
public EncString Username { get; set; }
|
|
public EncString Password { get; set; }
|
|
public DateTime? PasswordRevisionDate { get; set; }
|
|
public EncString Totp { get; set; }
|
|
public Fido2Key Fido2Key { get; set; }
|
|
|
|
public async Task<LoginView> DecryptAsync(string orgId)
|
|
{
|
|
var view = await DecryptObjAsync(new LoginView(this), this, new HashSet<string>
|
|
{
|
|
"Username",
|
|
"Password",
|
|
"Totp"
|
|
}, orgId);
|
|
if (Uris != null)
|
|
{
|
|
view.Uris = new List<LoginUriView>();
|
|
foreach (var uri in Uris)
|
|
{
|
|
view.Uris.Add(await uri.DecryptAsync(orgId));
|
|
}
|
|
}
|
|
if (Fido2Key != null)
|
|
{
|
|
view.Fido2Key = await Fido2Key.DecryptAsync(orgId);
|
|
}
|
|
return view;
|
|
}
|
|
|
|
public LoginData ToLoginData()
|
|
{
|
|
var l = new LoginData();
|
|
l.PasswordRevisionDate = PasswordRevisionDate;
|
|
BuildDataModel(this, l, new HashSet<string>
|
|
{
|
|
"Username",
|
|
"Password",
|
|
"Totp"
|
|
});
|
|
if (Uris?.Any() ?? false)
|
|
{
|
|
l.Uris = Uris.Select(u => u.ToLoginUriData()).ToList();
|
|
}
|
|
if (Fido2Key != null)
|
|
{
|
|
l.Fido2Key = Fido2Key.ToFido2KeyData();
|
|
}
|
|
return l;
|
|
}
|
|
}
|
|
}
|