mirror of
https://github.com/bitwarden/web
synced 2025-12-06 00:03:28 +00:00
Updates
This commit is contained in:
@@ -9550,9 +9550,9 @@ app-vault-groupings .card h3, app-org-vault-groupings .card h3 {
|
||||
app-vault-groupings .card ul:last-child, app-org-vault-groupings .card ul:last-child {
|
||||
margin-bottom: 0; }
|
||||
|
||||
app-vault-groupings .card a, app-org-vault-groupings .card a {
|
||||
app-vault-groupings .card .card-body a, app-org-vault-groupings .card .card-body a {
|
||||
color: #333333; }
|
||||
app-vault-groupings .card a:hover.text-muted, app-org-vault-groupings .card a:hover.text-muted {
|
||||
app-vault-groupings .card .card-body a:hover.text-muted, app-org-vault-groupings .card .card-body a:hover.text-muted {
|
||||
color: #333333 !important; }
|
||||
|
||||
app-vault-groupings .card .show-active, app-org-vault-groupings .card .show-active {
|
||||
@@ -9742,4 +9742,4 @@ img.logo {
|
||||
.overflow-hidden {
|
||||
overflow: hidden; }
|
||||
|
||||
/*# sourceMappingURL=main.b5bae6c0819bd6bf6b18.css.map*/
|
||||
/*# sourceMappingURL=main.0c0165861697c9b6f84f.css.map*/
|
||||
@@ -1 +1 @@
|
||||
{"version":3,"sources":[],"names":[],"mappings":"","file":"app/main.b5bae6c0819bd6bf6b18.css","sourceRoot":""}
|
||||
{"version":3,"sources":[],"names":[],"mappings":"","file":"app/main.0c0165861697c9b6f84f.css","sourceRoot":""}
|
||||
2
app/main.0c0165861697c9b6f84f.js
Normal file
2
app/main.0c0165861697c9b6f84f.js
Normal file
File diff suppressed because one or more lines are too long
1
app/main.0c0165861697c9b6f84f.js.map
Normal file
1
app/main.0c0165861697c9b6f84f.js.map
Normal file
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
@@ -13,4 +13,4 @@ iframe {
|
||||
margin: 0;
|
||||
padding: 0; }
|
||||
|
||||
/*# sourceMappingURL=duo.b5bae6c0819bd6bf6b18.css.map*/
|
||||
/*# sourceMappingURL=duo.0c0165861697c9b6f84f.css.map*/
|
||||
@@ -1 +1 @@
|
||||
{"version":3,"sources":[],"names":[],"mappings":"","file":"connectors/duo.b5bae6c0819bd6bf6b18.css","sourceRoot":""}
|
||||
{"version":3,"sources":[],"names":[],"mappings":"","file":"connectors/duo.0c0165861697c9b6f84f.css","sourceRoot":""}
|
||||
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
@@ -1,2 +1,2 @@
|
||||
!function(e){var n={};function r(t){if(n[t])return n[t].exports;var o=n[t]={i:t,l:!1,exports:{}};return e[t].call(o.exports,o,o.exports,r),o.l=!0,o.exports}r.m=e,r.c=n,r.d=function(e,n,t){r.o(e,n)||Object.defineProperty(e,n,{enumerable:!0,get:t})},r.r=function(e){"undefined"!=typeof Symbol&&Symbol.toStringTag&&Object.defineProperty(e,Symbol.toStringTag,{value:"Module"}),Object.defineProperty(e,"__esModule",{value:!0})},r.t=function(e,n){if(1&n&&(e=r(e)),8&n)return e;if(4&n&&"object"==typeof e&&e&&e.__esModule)return e;var t=Object.create(null);if(r.r(t),Object.defineProperty(t,"default",{enumerable:!0,value:e}),2&n&&"string"!=typeof e)for(var o in e)r.d(t,o,function(n){return e[n]}.bind(null,o));return t},r.n=function(e){var n=e&&e.__esModule?function(){return e.default}:function(){return e};return r.d(n,"a",n),n},r.o=function(e,n){return Object.prototype.hasOwnProperty.call(e,n)},r.p="",r(r.s=1013)}({1013:function(e,n,r){"use strict";r.r(n);var t=r(499);document.addEventListener("DOMContentLoaded",function(e){c(),window.addEventListener("message",function(e){e.origin&&""!==e.origin&&e.origin===a&&("stop"===e.data?i=!0:"start"===e.data&&i&&c())},!1),function(e){parent.postMessage("info|"+e,o)}("ready")});var o=null,a=null,i=!1,u=!1;function c(){if(u=!1,t.isSupported){var e=f("data");if(e)if(o=f("parent")){var n=document.createElement("a");n.href=o,a=n.origin;var r=f("v");if(r){try{parseInt(r);var c=function(e){return decodeURIComponent(Array.prototype.map.call(atob(e),function(e){return"%"+("00"+e.charCodeAt(0).toString(16)).slice(-2)}).join(""))}(e),d=JSON.parse(c)}catch(e){return void s("Cannot parse data.")}d.appId&&d.challenge&&d.keys&&d.keys.length?(i=!1,function e(n){if(i)return;t.sign(n.appId,n.challenge,n.keys,function(r){r.errorCode?5!==r.errorCode?(s("U2F Error: "+r.errorCode),setTimeout(function(){e(n)},1e3)):e(n):function(e){if(u)return;var n=JSON.stringify(e);parent.postMessage("success|"+n,o),u=!0}(r)},10)}(d)):s("Invalid data parameters.")}else s("No version.")}else s("No parent.");else s("No data.")}else s("U2F is not supported in this browser.")}function s(e){parent.postMessage("error|"+e,o)}function f(e){var n=window.location.href;e=e.replace(/[\[\]]/g,"\\$&");var r=new RegExp("[?&]"+e+"(=([^&#]*)|&|#|$)").exec(n);return r?r[2]?decodeURIComponent(r[2].replace(/\+/g," ")):"":null}},499:function(e,n){e.exports=u2f}});
|
||||
//# sourceMappingURL=u2f.b5bae6c0819bd6bf6b18.js.map
|
||||
!function(e){var n={};function r(t){if(n[t])return n[t].exports;var o=n[t]={i:t,l:!1,exports:{}};return e[t].call(o.exports,o,o.exports,r),o.l=!0,o.exports}r.m=e,r.c=n,r.d=function(e,n,t){r.o(e,n)||Object.defineProperty(e,n,{enumerable:!0,get:t})},r.r=function(e){"undefined"!=typeof Symbol&&Symbol.toStringTag&&Object.defineProperty(e,Symbol.toStringTag,{value:"Module"}),Object.defineProperty(e,"__esModule",{value:!0})},r.t=function(e,n){if(1&n&&(e=r(e)),8&n)return e;if(4&n&&"object"==typeof e&&e&&e.__esModule)return e;var t=Object.create(null);if(r.r(t),Object.defineProperty(t,"default",{enumerable:!0,value:e}),2&n&&"string"!=typeof e)for(var o in e)r.d(t,o,function(n){return e[n]}.bind(null,o));return t},r.n=function(e){var n=e&&e.__esModule?function(){return e.default}:function(){return e};return r.d(n,"a",n),n},r.o=function(e,n){return Object.prototype.hasOwnProperty.call(e,n)},r.p="",r(r.s=1024)}({1024:function(e,n,r){"use strict";r.r(n);var t=r(506);document.addEventListener("DOMContentLoaded",function(e){c(),window.addEventListener("message",function(e){e.origin&&""!==e.origin&&e.origin===a&&("stop"===e.data?i=!0:"start"===e.data&&i&&c())},!1),function(e){parent.postMessage("info|"+e,o)}("ready")});var o=null,a=null,i=!1,u=!1;function c(){if(u=!1,t.isSupported){var e=f("data");if(e)if(o=f("parent")){var n=document.createElement("a");n.href=o,a=n.origin;var r=f("v");if(r){try{parseInt(r);var c=function(e){return decodeURIComponent(Array.prototype.map.call(atob(e),function(e){return"%"+("00"+e.charCodeAt(0).toString(16)).slice(-2)}).join(""))}(e),d=JSON.parse(c)}catch(e){return void s("Cannot parse data.")}d.appId&&d.challenge&&d.keys&&d.keys.length?(i=!1,function e(n){if(i)return;t.sign(n.appId,n.challenge,n.keys,function(r){r.errorCode?5!==r.errorCode?(s("U2F Error: "+r.errorCode),setTimeout(function(){e(n)},1e3)):e(n):function(e){if(u)return;var n=JSON.stringify(e);parent.postMessage("success|"+n,o),u=!0}(r)},10)}(d)):s("Invalid data parameters.")}else s("No version.")}else s("No parent.");else s("No data.")}else s("U2F is not supported in this browser.")}function s(e){parent.postMessage("error|"+e,o)}function f(e){var n=window.location.href;e=e.replace(/[\[\]]/g,"\\$&");var r=new RegExp("[?&]"+e+"(=([^&#]*)|&|#|$)").exec(n);return r?r[2]?decodeURIComponent(r[2].replace(/\+/g," ")):"":null}},506:function(e,n){e.exports=u2f}});
|
||||
//# sourceMappingURL=u2f.0c0165861697c9b6f84f.js.map
|
||||
File diff suppressed because one or more lines are too long
@@ -5,8 +5,8 @@
|
||||
<meta charset="utf-8">
|
||||
<meta name="viewport" content="initial-scale=1, maximum-scale=1, user-scalable=no, width=device-width">
|
||||
<title>Bitwarden Duo Connector</title>
|
||||
<link href="connectors/duo.b5bae6c0819bd6bf6b18.css" rel="stylesheet"></head>
|
||||
<link href="connectors/duo.0c0165861697c9b6f84f.css" rel="stylesheet"></head>
|
||||
|
||||
<body><script type="text/javascript" src="connectors/duo.b5bae6c0819bd6bf6b18.js"></script></body>
|
||||
<body><script type="text/javascript" src="connectors/duo.0c0165861697c9b6f84f.js"></script></body>
|
||||
|
||||
</html>
|
||||
|
||||
@@ -13,7 +13,7 @@
|
||||
<link rel="icon" type="image/png" sizes="16x16" href="images/icons/favicon-16x16.png">
|
||||
<link rel="mask-icon" href="images/icons/safari-pinned-tab.svg" color="#3c8dbc">
|
||||
<link rel="manifest" href="manifest.json">
|
||||
<link href="app/main.b5bae6c0819bd6bf6b18.css" rel="stylesheet"></head>
|
||||
<link href="app/main.0c0165861697c9b6f84f.css" rel="stylesheet"></head>
|
||||
|
||||
<body class="layout_frontend">
|
||||
<app-root>
|
||||
@@ -26,6 +26,6 @@
|
||||
</div>
|
||||
</div>
|
||||
</app-root>
|
||||
<script type="text/javascript" src="app/polyfills.b5bae6c0819bd6bf6b18.js"></script><script type="text/javascript" src="app/vendor.b5bae6c0819bd6bf6b18.js"></script><script type="text/javascript" src="app/main.b5bae6c0819bd6bf6b18.js"></script></body>
|
||||
<script type="text/javascript" src="app/polyfills.0c0165861697c9b6f84f.js"></script><script type="text/javascript" src="app/vendor.0c0165861697c9b6f84f.js"></script><script type="text/javascript" src="app/main.0c0165861697c9b6f84f.js"></script></body>
|
||||
|
||||
</html>
|
||||
|
||||
@@ -1287,6 +1287,135 @@
|
||||
"reports": {
|
||||
"message": "Reports"
|
||||
},
|
||||
"unsecuredWebsitesReport": {
|
||||
"message": "Unsecured Websites Report"
|
||||
},
|
||||
"unsecuredWebsitesReportDesc": {
|
||||
"message": "Using unsecured websites with the http:// scheme can be dangerous. If the website allows, you should always access it using the https:// scheme so that your connection is encrypted."
|
||||
},
|
||||
"unsecuredWebsitesFound": {
|
||||
"message": "Unsecured Websites Found"
|
||||
},
|
||||
"unsecuredWebsitesFoundDesc": {
|
||||
"message": "We found $COUNT$ items in your vault with unsecured URIs. You should change their URI scheme to https:// if the website allows it.",
|
||||
"placeholders": {
|
||||
"count": {
|
||||
"content": "$1",
|
||||
"example": "8"
|
||||
}
|
||||
}
|
||||
},
|
||||
"noUnsecuredWebsites": {
|
||||
"message": "No items in your vault have unsecured URIs."
|
||||
},
|
||||
"inactive2faReport": {
|
||||
"message": "Inactive 2FA Report"
|
||||
},
|
||||
"inactive2faReportDesc": {
|
||||
"message": "Two-factor authentication (2FA) is an important security setting that helps secure your accounts. If the website offers it, you should always enable two-factor authentication."
|
||||
},
|
||||
"inactive2faFound": {
|
||||
"message": "Logins Without 2FA Found"
|
||||
},
|
||||
"inactive2faFoundDesc": {
|
||||
"message": "We found $COUNT$ website(s) in your vault that may not be configured with two-factor authentication (according to twofactorauth.org). To further protect these accounts, you should enable two-factor authentication.",
|
||||
"placeholders": {
|
||||
"count": {
|
||||
"content": "$1",
|
||||
"example": "8"
|
||||
}
|
||||
}
|
||||
},
|
||||
"noInactive2fa": {
|
||||
"message": "No websites were found in your vault with a missing two-factor authentication configuration."
|
||||
},
|
||||
"instructions": {
|
||||
"message": "Instructions"
|
||||
},
|
||||
"exposedPasswordsReport": {
|
||||
"message": "Exposed Passwords Report"
|
||||
},
|
||||
"exposedPasswordsReportDesc": {
|
||||
"message": "Exposed passwords are passwords have been uncovered in known data breaches that were released publicly or sold on the dark web by hackers."
|
||||
},
|
||||
"exposedPasswordsFound": {
|
||||
"message": "Exposed Passwords Found"
|
||||
},
|
||||
"exposedPasswordsFoundDesc": {
|
||||
"message": "We found $COUNT$ items in your vault that have passwords that were exposed in known data breaches. You should change them to use a new password.",
|
||||
"placeholders": {
|
||||
"count": {
|
||||
"content": "$1",
|
||||
"example": "8"
|
||||
}
|
||||
}
|
||||
},
|
||||
"noExposedPasswords": {
|
||||
"message": "No items in your vault have passwords that have been exposed in known data breaches."
|
||||
},
|
||||
"checkExposedPasswords": {
|
||||
"message": "Check Exposed Passwords"
|
||||
},
|
||||
"exposedXTimes": {
|
||||
"message": "Exposed $COUNT$ time(s)",
|
||||
"placeholders": {
|
||||
"count": {
|
||||
"content": "$1",
|
||||
"example": "52"
|
||||
}
|
||||
}
|
||||
},
|
||||
"weakPasswordsReport": {
|
||||
"message": "Weak Passwords Report"
|
||||
},
|
||||
"weakPasswordsReportDesc": {
|
||||
"message": "Weak passwords can easily be guessed by hackers and automated tools that are used to crack passwords. The Bitwarden password generator can help you create strong passwords."
|
||||
},
|
||||
"weakPasswordsFound": {
|
||||
"message": "Weak Passwords Found"
|
||||
},
|
||||
"weakPasswordsFoundDesc": {
|
||||
"message": "We found $COUNT$ items in your vault with passwords that are not strong. You should update them to use stronger passwords.",
|
||||
"placeholders": {
|
||||
"count": {
|
||||
"content": "$1",
|
||||
"example": "8"
|
||||
}
|
||||
}
|
||||
},
|
||||
"noWeakPasswords": {
|
||||
"message": "No items in your vault have weak passwords."
|
||||
},
|
||||
"reusedPasswordsReport": {
|
||||
"message": "Reused Passwords Report"
|
||||
},
|
||||
"reusedPasswordsReportDesc": {
|
||||
"message": "If a service that you use is compromised, reusing the same password elsewhere can allow hackers to easily gain access to more of your online accounts. You should use a unique password for every account or service."
|
||||
},
|
||||
"reusedPasswordsFound": {
|
||||
"message": "Reused Passwords Found"
|
||||
},
|
||||
"reusedPasswordsFoundDesc": {
|
||||
"message": "We found $COUNT$ passwords that are being reused in your vault. You should change them to a unique value.",
|
||||
"placeholders": {
|
||||
"count": {
|
||||
"content": "$1",
|
||||
"example": "8"
|
||||
}
|
||||
}
|
||||
},
|
||||
"noReusedPasswords": {
|
||||
"message": "No logins in your vault have passwords that are being reused."
|
||||
},
|
||||
"reusedXTimes": {
|
||||
"message": "Reused $COUNT$ times",
|
||||
"placeholders": {
|
||||
"count": {
|
||||
"content": "$1",
|
||||
"example": "8"
|
||||
}
|
||||
}
|
||||
},
|
||||
"dataBreachReport": {
|
||||
"message": "Data Breach Report"
|
||||
},
|
||||
@@ -1360,11 +1489,14 @@
|
||||
"message": "Upgrade your account to a premium membership and unlock some great additional features."
|
||||
},
|
||||
"premiumSignUpStorage": {
|
||||
"message": "1 GB of encrypted file storage."
|
||||
"message": "1 GB encrypted storage for file attachments."
|
||||
},
|
||||
"premiumSignUpTwoStep": {
|
||||
"message": "Additional two-step login options such as YubiKey, FIDO U2F, and Duo."
|
||||
},
|
||||
"premiumSignUpReports": {
|
||||
"message": "Password hygiene, account health, and data breach reports to keep your vault safe."
|
||||
},
|
||||
"premiumSignUpTotp": {
|
||||
"message": "TOTP verification code (2FA) generator for logins in your vault."
|
||||
},
|
||||
@@ -2534,15 +2666,19 @@
|
||||
},
|
||||
"strong": {
|
||||
"message": "Strong",
|
||||
"description": "ex. A strong password. Scale: Weak -> Good -> Strong"
|
||||
"description": "ex. A strong password. Scale: Very Weak -> Weak -> Good -> Strong"
|
||||
},
|
||||
"good": {
|
||||
"message": "Good",
|
||||
"description": "ex. A good password. Scale: Weak -> Good -> Strong"
|
||||
"description": "ex. A good password. Scale: Very Weak -> Weak -> Good -> Strong"
|
||||
},
|
||||
"weak": {
|
||||
"message": "Weak",
|
||||
"description": "ex. A weak password. Scale: Weak -> Good -> Strong"
|
||||
"description": "ex. A weak password. Scale: Very Weak -> Weak -> Good -> Strong"
|
||||
},
|
||||
"veryWeak": {
|
||||
"message": "Very Weak",
|
||||
"description": "ex. A very weak password. Scale: Very Weak -> Weak -> Good -> Strong"
|
||||
},
|
||||
"weakMasterPassword": {
|
||||
"message": "Weak Master Password"
|
||||
@@ -2583,5 +2719,9 @@
|
||||
"dontAskFingerprintAgain": {
|
||||
"message": "Don't ask to verify fingerprint phrase again",
|
||||
"description": "A 'fingerprint phrase' is a unique word phrase (similar to a passphrase) that a user can use to authenticate their public key with another user, for the purposes of sharing."
|
||||
},
|
||||
"free": {
|
||||
"message": "Free",
|
||||
"description": "Free, as in 'Free beer'"
|
||||
}
|
||||
}
|
||||
|
||||
@@ -7,6 +7,6 @@
|
||||
<script src="scripts/u2f.js"></script>
|
||||
</head>
|
||||
|
||||
<body><script type="text/javascript" src="connectors/u2f.b5bae6c0819bd6bf6b18.js"></script></body>
|
||||
<body><script type="text/javascript" src="connectors/u2f.0c0165861697c9b6f84f.js"></script></body>
|
||||
|
||||
</html>
|
||||
|
||||
Reference in New Issue
Block a user