1
0
mirror of https://github.com/bitwarden/web synced 2025-12-06 00:03:28 +00:00
This commit is contained in:
Kyle Spearrin
2018-12-12 10:07:21 -05:00
parent 6b7579522a
commit a2b241f5e1
20 changed files with 187 additions and 47 deletions

View File

@@ -9550,9 +9550,9 @@ app-vault-groupings .card h3, app-org-vault-groupings .card h3 {
app-vault-groupings .card ul:last-child, app-org-vault-groupings .card ul:last-child {
margin-bottom: 0; }
app-vault-groupings .card a, app-org-vault-groupings .card a {
app-vault-groupings .card .card-body a, app-org-vault-groupings .card .card-body a {
color: #333333; }
app-vault-groupings .card a:hover.text-muted, app-org-vault-groupings .card a:hover.text-muted {
app-vault-groupings .card .card-body a:hover.text-muted, app-org-vault-groupings .card .card-body a:hover.text-muted {
color: #333333 !important; }
app-vault-groupings .card .show-active, app-org-vault-groupings .card .show-active {
@@ -9742,4 +9742,4 @@ img.logo {
.overflow-hidden {
overflow: hidden; }
/*# sourceMappingURL=main.b5bae6c0819bd6bf6b18.css.map*/
/*# sourceMappingURL=main.0c0165861697c9b6f84f.css.map*/

View File

@@ -1 +1 @@
{"version":3,"sources":[],"names":[],"mappings":"","file":"app/main.b5bae6c0819bd6bf6b18.css","sourceRoot":""}
{"version":3,"sources":[],"names":[],"mappings":"","file":"app/main.0c0165861697c9b6f84f.css","sourceRoot":""}

File diff suppressed because one or more lines are too long

File diff suppressed because one or more lines are too long

File diff suppressed because one or more lines are too long

File diff suppressed because one or more lines are too long

File diff suppressed because one or more lines are too long

File diff suppressed because one or more lines are too long

File diff suppressed because one or more lines are too long

File diff suppressed because one or more lines are too long

View File

@@ -13,4 +13,4 @@ iframe {
margin: 0;
padding: 0; }
/*# sourceMappingURL=duo.b5bae6c0819bd6bf6b18.css.map*/
/*# sourceMappingURL=duo.0c0165861697c9b6f84f.css.map*/

View File

@@ -1 +1 @@
{"version":3,"sources":[],"names":[],"mappings":"","file":"connectors/duo.b5bae6c0819bd6bf6b18.css","sourceRoot":""}
{"version":3,"sources":[],"names":[],"mappings":"","file":"connectors/duo.0c0165861697c9b6f84f.css","sourceRoot":""}

File diff suppressed because one or more lines are too long

View File

@@ -1,2 +1,2 @@
!function(e){var n={};function r(t){if(n[t])return n[t].exports;var o=n[t]={i:t,l:!1,exports:{}};return e[t].call(o.exports,o,o.exports,r),o.l=!0,o.exports}r.m=e,r.c=n,r.d=function(e,n,t){r.o(e,n)||Object.defineProperty(e,n,{enumerable:!0,get:t})},r.r=function(e){"undefined"!=typeof Symbol&&Symbol.toStringTag&&Object.defineProperty(e,Symbol.toStringTag,{value:"Module"}),Object.defineProperty(e,"__esModule",{value:!0})},r.t=function(e,n){if(1&n&&(e=r(e)),8&n)return e;if(4&n&&"object"==typeof e&&e&&e.__esModule)return e;var t=Object.create(null);if(r.r(t),Object.defineProperty(t,"default",{enumerable:!0,value:e}),2&n&&"string"!=typeof e)for(var o in e)r.d(t,o,function(n){return e[n]}.bind(null,o));return t},r.n=function(e){var n=e&&e.__esModule?function(){return e.default}:function(){return e};return r.d(n,"a",n),n},r.o=function(e,n){return Object.prototype.hasOwnProperty.call(e,n)},r.p="",r(r.s=1013)}({1013:function(e,n,r){"use strict";r.r(n);var t=r(499);document.addEventListener("DOMContentLoaded",function(e){c(),window.addEventListener("message",function(e){e.origin&&""!==e.origin&&e.origin===a&&("stop"===e.data?i=!0:"start"===e.data&&i&&c())},!1),function(e){parent.postMessage("info|"+e,o)}("ready")});var o=null,a=null,i=!1,u=!1;function c(){if(u=!1,t.isSupported){var e=f("data");if(e)if(o=f("parent")){var n=document.createElement("a");n.href=o,a=n.origin;var r=f("v");if(r){try{parseInt(r);var c=function(e){return decodeURIComponent(Array.prototype.map.call(atob(e),function(e){return"%"+("00"+e.charCodeAt(0).toString(16)).slice(-2)}).join(""))}(e),d=JSON.parse(c)}catch(e){return void s("Cannot parse data.")}d.appId&&d.challenge&&d.keys&&d.keys.length?(i=!1,function e(n){if(i)return;t.sign(n.appId,n.challenge,n.keys,function(r){r.errorCode?5!==r.errorCode?(s("U2F Error: "+r.errorCode),setTimeout(function(){e(n)},1e3)):e(n):function(e){if(u)return;var n=JSON.stringify(e);parent.postMessage("success|"+n,o),u=!0}(r)},10)}(d)):s("Invalid data parameters.")}else s("No version.")}else s("No parent.");else s("No data.")}else s("U2F is not supported in this browser.")}function s(e){parent.postMessage("error|"+e,o)}function f(e){var n=window.location.href;e=e.replace(/[\[\]]/g,"\\$&");var r=new RegExp("[?&]"+e+"(=([^&#]*)|&|#|$)").exec(n);return r?r[2]?decodeURIComponent(r[2].replace(/\+/g," ")):"":null}},499:function(e,n){e.exports=u2f}});
//# sourceMappingURL=u2f.b5bae6c0819bd6bf6b18.js.map
!function(e){var n={};function r(t){if(n[t])return n[t].exports;var o=n[t]={i:t,l:!1,exports:{}};return e[t].call(o.exports,o,o.exports,r),o.l=!0,o.exports}r.m=e,r.c=n,r.d=function(e,n,t){r.o(e,n)||Object.defineProperty(e,n,{enumerable:!0,get:t})},r.r=function(e){"undefined"!=typeof Symbol&&Symbol.toStringTag&&Object.defineProperty(e,Symbol.toStringTag,{value:"Module"}),Object.defineProperty(e,"__esModule",{value:!0})},r.t=function(e,n){if(1&n&&(e=r(e)),8&n)return e;if(4&n&&"object"==typeof e&&e&&e.__esModule)return e;var t=Object.create(null);if(r.r(t),Object.defineProperty(t,"default",{enumerable:!0,value:e}),2&n&&"string"!=typeof e)for(var o in e)r.d(t,o,function(n){return e[n]}.bind(null,o));return t},r.n=function(e){var n=e&&e.__esModule?function(){return e.default}:function(){return e};return r.d(n,"a",n),n},r.o=function(e,n){return Object.prototype.hasOwnProperty.call(e,n)},r.p="",r(r.s=1024)}({1024:function(e,n,r){"use strict";r.r(n);var t=r(506);document.addEventListener("DOMContentLoaded",function(e){c(),window.addEventListener("message",function(e){e.origin&&""!==e.origin&&e.origin===a&&("stop"===e.data?i=!0:"start"===e.data&&i&&c())},!1),function(e){parent.postMessage("info|"+e,o)}("ready")});var o=null,a=null,i=!1,u=!1;function c(){if(u=!1,t.isSupported){var e=f("data");if(e)if(o=f("parent")){var n=document.createElement("a");n.href=o,a=n.origin;var r=f("v");if(r){try{parseInt(r);var c=function(e){return decodeURIComponent(Array.prototype.map.call(atob(e),function(e){return"%"+("00"+e.charCodeAt(0).toString(16)).slice(-2)}).join(""))}(e),d=JSON.parse(c)}catch(e){return void s("Cannot parse data.")}d.appId&&d.challenge&&d.keys&&d.keys.length?(i=!1,function e(n){if(i)return;t.sign(n.appId,n.challenge,n.keys,function(r){r.errorCode?5!==r.errorCode?(s("U2F Error: "+r.errorCode),setTimeout(function(){e(n)},1e3)):e(n):function(e){if(u)return;var n=JSON.stringify(e);parent.postMessage("success|"+n,o),u=!0}(r)},10)}(d)):s("Invalid data parameters.")}else s("No version.")}else s("No parent.");else s("No data.")}else s("U2F is not supported in this browser.")}function s(e){parent.postMessage("error|"+e,o)}function f(e){var n=window.location.href;e=e.replace(/[\[\]]/g,"\\$&");var r=new RegExp("[?&]"+e+"(=([^&#]*)|&|#|$)").exec(n);return r?r[2]?decodeURIComponent(r[2].replace(/\+/g," ")):"":null}},506:function(e,n){e.exports=u2f}});
//# sourceMappingURL=u2f.0c0165861697c9b6f84f.js.map

View File

@@ -5,8 +5,8 @@
<meta charset="utf-8">
<meta name="viewport" content="initial-scale=1, maximum-scale=1, user-scalable=no, width=device-width">
<title>Bitwarden Duo Connector</title>
<link href="connectors/duo.b5bae6c0819bd6bf6b18.css" rel="stylesheet"></head>
<link href="connectors/duo.0c0165861697c9b6f84f.css" rel="stylesheet"></head>
<body><script type="text/javascript" src="connectors/duo.b5bae6c0819bd6bf6b18.js"></script></body>
<body><script type="text/javascript" src="connectors/duo.0c0165861697c9b6f84f.js"></script></body>
</html>

View File

@@ -13,7 +13,7 @@
<link rel="icon" type="image/png" sizes="16x16" href="images/icons/favicon-16x16.png">
<link rel="mask-icon" href="images/icons/safari-pinned-tab.svg" color="#3c8dbc">
<link rel="manifest" href="manifest.json">
<link href="app/main.b5bae6c0819bd6bf6b18.css" rel="stylesheet"></head>
<link href="app/main.0c0165861697c9b6f84f.css" rel="stylesheet"></head>
<body class="layout_frontend">
<app-root>
@@ -26,6 +26,6 @@
</div>
</div>
</app-root>
<script type="text/javascript" src="app/polyfills.b5bae6c0819bd6bf6b18.js"></script><script type="text/javascript" src="app/vendor.b5bae6c0819bd6bf6b18.js"></script><script type="text/javascript" src="app/main.b5bae6c0819bd6bf6b18.js"></script></body>
<script type="text/javascript" src="app/polyfills.0c0165861697c9b6f84f.js"></script><script type="text/javascript" src="app/vendor.0c0165861697c9b6f84f.js"></script><script type="text/javascript" src="app/main.0c0165861697c9b6f84f.js"></script></body>
</html>

View File

@@ -1287,6 +1287,135 @@
"reports": {
"message": "Reports"
},
"unsecuredWebsitesReport": {
"message": "Unsecured Websites Report"
},
"unsecuredWebsitesReportDesc": {
"message": "Using unsecured websites with the http:// scheme can be dangerous. If the website allows, you should always access it using the https:// scheme so that your connection is encrypted."
},
"unsecuredWebsitesFound": {
"message": "Unsecured Websites Found"
},
"unsecuredWebsitesFoundDesc": {
"message": "We found $COUNT$ items in your vault with unsecured URIs. You should change their URI scheme to https:// if the website allows it.",
"placeholders": {
"count": {
"content": "$1",
"example": "8"
}
}
},
"noUnsecuredWebsites": {
"message": "No items in your vault have unsecured URIs."
},
"inactive2faReport": {
"message": "Inactive 2FA Report"
},
"inactive2faReportDesc": {
"message": "Two-factor authentication (2FA) is an important security setting that helps secure your accounts. If the website offers it, you should always enable two-factor authentication."
},
"inactive2faFound": {
"message": "Logins Without 2FA Found"
},
"inactive2faFoundDesc": {
"message": "We found $COUNT$ website(s) in your vault that may not be configured with two-factor authentication (according to twofactorauth.org). To further protect these accounts, you should enable two-factor authentication.",
"placeholders": {
"count": {
"content": "$1",
"example": "8"
}
}
},
"noInactive2fa": {
"message": "No websites were found in your vault with a missing two-factor authentication configuration."
},
"instructions": {
"message": "Instructions"
},
"exposedPasswordsReport": {
"message": "Exposed Passwords Report"
},
"exposedPasswordsReportDesc": {
"message": "Exposed passwords are passwords have been uncovered in known data breaches that were released publicly or sold on the dark web by hackers."
},
"exposedPasswordsFound": {
"message": "Exposed Passwords Found"
},
"exposedPasswordsFoundDesc": {
"message": "We found $COUNT$ items in your vault that have passwords that were exposed in known data breaches. You should change them to use a new password.",
"placeholders": {
"count": {
"content": "$1",
"example": "8"
}
}
},
"noExposedPasswords": {
"message": "No items in your vault have passwords that have been exposed in known data breaches."
},
"checkExposedPasswords": {
"message": "Check Exposed Passwords"
},
"exposedXTimes": {
"message": "Exposed $COUNT$ time(s)",
"placeholders": {
"count": {
"content": "$1",
"example": "52"
}
}
},
"weakPasswordsReport": {
"message": "Weak Passwords Report"
},
"weakPasswordsReportDesc": {
"message": "Weak passwords can easily be guessed by hackers and automated tools that are used to crack passwords. The Bitwarden password generator can help you create strong passwords."
},
"weakPasswordsFound": {
"message": "Weak Passwords Found"
},
"weakPasswordsFoundDesc": {
"message": "We found $COUNT$ items in your vault with passwords that are not strong. You should update them to use stronger passwords.",
"placeholders": {
"count": {
"content": "$1",
"example": "8"
}
}
},
"noWeakPasswords": {
"message": "No items in your vault have weak passwords."
},
"reusedPasswordsReport": {
"message": "Reused Passwords Report"
},
"reusedPasswordsReportDesc": {
"message": "If a service that you use is compromised, reusing the same password elsewhere can allow hackers to easily gain access to more of your online accounts. You should use a unique password for every account or service."
},
"reusedPasswordsFound": {
"message": "Reused Passwords Found"
},
"reusedPasswordsFoundDesc": {
"message": "We found $COUNT$ passwords that are being reused in your vault. You should change them to a unique value.",
"placeholders": {
"count": {
"content": "$1",
"example": "8"
}
}
},
"noReusedPasswords": {
"message": "No logins in your vault have passwords that are being reused."
},
"reusedXTimes": {
"message": "Reused $COUNT$ times",
"placeholders": {
"count": {
"content": "$1",
"example": "8"
}
}
},
"dataBreachReport": {
"message": "Data Breach Report"
},
@@ -1360,11 +1489,14 @@
"message": "Upgrade your account to a premium membership and unlock some great additional features."
},
"premiumSignUpStorage": {
"message": "1 GB of encrypted file storage."
"message": "1 GB encrypted storage for file attachments."
},
"premiumSignUpTwoStep": {
"message": "Additional two-step login options such as YubiKey, FIDO U2F, and Duo."
},
"premiumSignUpReports": {
"message": "Password hygiene, account health, and data breach reports to keep your vault safe."
},
"premiumSignUpTotp": {
"message": "TOTP verification code (2FA) generator for logins in your vault."
},
@@ -2534,15 +2666,19 @@
},
"strong": {
"message": "Strong",
"description": "ex. A strong password. Scale: Weak -> Good -> Strong"
"description": "ex. A strong password. Scale: Very Weak -> Weak -> Good -> Strong"
},
"good": {
"message": "Good",
"description": "ex. A good password. Scale: Weak -> Good -> Strong"
"description": "ex. A good password. Scale: Very Weak -> Weak -> Good -> Strong"
},
"weak": {
"message": "Weak",
"description": "ex. A weak password. Scale: Weak -> Good -> Strong"
"description": "ex. A weak password. Scale: Very Weak -> Weak -> Good -> Strong"
},
"veryWeak": {
"message": "Very Weak",
"description": "ex. A very weak password. Scale: Very Weak -> Weak -> Good -> Strong"
},
"weakMasterPassword": {
"message": "Weak Master Password"
@@ -2583,5 +2719,9 @@
"dontAskFingerprintAgain": {
"message": "Don't ask to verify fingerprint phrase again",
"description": "A 'fingerprint phrase' is a unique word phrase (similar to a passphrase) that a user can use to authenticate their public key with another user, for the purposes of sharing."
},
"free": {
"message": "Free",
"description": "Free, as in 'Free beer'"
}
}

View File

@@ -7,6 +7,6 @@
<script src="scripts/u2f.js"></script>
</head>
<body><script type="text/javascript" src="connectors/u2f.b5bae6c0819bd6bf6b18.js"></script></body>
<body><script type="text/javascript" src="connectors/u2f.0c0165861697c9b6f84f.js"></script></body>
</html>