vaultwarden/src
BlackDex e38e1a5d5f
Validate note sizes on key-rotation.
We also need to validate the note sizes on key-rotation.
If we do not validate them before we store them, that could lead to a
partial or total loss of the password vault. Validating these
restrictions before actually processing them to store/replace the
existing ciphers should prevent this.

There was also a small bug when using web-sockets. The client which is
triggering the password/key-rotation change should not be forced to
logout via a web-socket request. That is something the client will
handle it self. Refactored the logout notification to either send the
device uuid or not on specific actions.

Fixes #3152
2023-01-24 20:05:09 +01:00
..
api Validate note sizes on key-rotation. 2023-01-24 20:05:09 +01:00
db include key into user.set_password 2023-01-24 20:04:05 +01:00
static Use more modern meta tag for charset encoding 2023-01-12 19:18:56 +01:00
auth.rs Resolve uninlined_format_args clippy warnings 2023-01-09 19:17:13 +01:00
config.rs Update KDF Configuration and processing 2023-01-24 19:49:12 +01:00
crypto.rs Remove get_random_64() 2022-11-13 10:03:06 +01:00
error.rs Cleanups and Fixes for Emergency Access 2022-12-04 23:17:48 +01:00
mail.rs Resolve uninlined_format_args clippy warnings 2023-01-09 19:17:13 +01:00
main.rs Add avatar color support 2023-01-12 19:18:57 +01:00
ratelimit.rs Basic ratelimit for user login (including 2FA) and admin login 2021-12-22 21:48:49 +01:00
util.rs fix (2fa.directory): Allow api.2fa.directory, and remove 2fa.directory 2023-01-12 19:18:57 +01:00