vaultwarden/src/api/core
BlackDex e38e1a5d5f
Validate note sizes on key-rotation.
We also need to validate the note sizes on key-rotation.
If we do not validate them before we store them, that could lead to a
partial or total loss of the password vault. Validating these
restrictions before actually processing them to store/replace the
existing ciphers should prevent this.

There was also a small bug when using web-sockets. The client which is
triggering the password/key-rotation change should not be forced to
logout via a web-socket request. That is something the client will
handle it self. Refactored the logout notification to either send the
device uuid or not on specific actions.

Fixes #3152
2023-01-24 20:05:09 +01:00
..
two_factor Resolve uninlined_format_args clippy warnings 2023-01-09 19:17:13 +01:00
accounts.rs Validate note sizes on key-rotation. 2023-01-24 20:05:09 +01:00
ciphers.rs Optimize CipherSyncData for very large vaults 2023-01-11 20:23:53 +01:00
emergency_access.rs include key into user.set_password 2023-01-24 20:04:05 +01:00
events.rs Add Organizational event logging feature 2022-11-27 23:36:34 +01:00
folders.rs Update WebSocket Notifications 2022-12-31 20:39:53 +01:00
mod.rs Resolve uninlined_format_args clippy warnings 2023-01-09 19:17:13 +01:00
organizations.rs Optimize CipherSyncData for very large vaults 2023-01-11 20:23:53 +01:00
sends.rs Resolve uninlined_format_args clippy warnings 2023-01-09 19:17:13 +01:00