Spiegel von
https://github.com/dani-garcia/vaultwarden.git
synchronisiert 2024-11-16 04:12:53 +01:00
rebase and fix rebase issues
Dieser Commit ist enthalten in:
Ursprung
fae770a6a2
Commit
c150818e19
4 geänderte Dateien mit 13 neuen und 17 gelöschten Zeilen
|
@ -98,10 +98,6 @@ const BASE_TEMPLATE: &str = "admin/base";
|
||||||
|
|
||||||
const ACTING_ADMIN_USER: &str = "vaultwarden-admin-00000-000000000000";
|
const ACTING_ADMIN_USER: &str = "vaultwarden-admin-00000-000000000000";
|
||||||
|
|
||||||
fn admin_path() -> String {
|
|
||||||
ADMIN_PATH.to_string()
|
|
||||||
}
|
|
||||||
|
|
||||||
#[derive(Debug)]
|
#[derive(Debug)]
|
||||||
struct IpHeader(Option<String>);
|
struct IpHeader(Option<String>);
|
||||||
|
|
||||||
|
@ -132,7 +128,6 @@ fn admin_url(origin: &str) -> String {
|
||||||
format!("{}{}", origin, admin_path())
|
format!("{}{}", origin, admin_path())
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
#[derive(Responder)]
|
#[derive(Responder)]
|
||||||
enum AdminResponse {
|
enum AdminResponse {
|
||||||
#[response(status = 200)]
|
#[response(status = 200)]
|
||||||
|
|
|
@ -9,9 +9,7 @@ use rocket::serde::json::Json;
|
||||||
use serde_json::Value;
|
use serde_json::Value;
|
||||||
|
|
||||||
use crate::{
|
use crate::{
|
||||||
api::{ApiResult, EmptyResult, JsonResult, JsonUpcase, Notify, NumberOrString, UpdateType},
|
api::{ApiResult, EmptyResult, JsonResult, JsonUpcase, Notify, UpdateType},
|
||||||
auth::{ClientIp, Headers, HostInfo},
|
|
||||||
api::{ApiResult, EmptyResult, JsonResult, JsonUpcase, Notify, NumberOrString, UpdateType},
|
|
||||||
auth::{ClientIp, Headers, HostInfo},
|
auth::{ClientIp, Headers, HostInfo},
|
||||||
db::{models::*, DbConn, DbPool},
|
db::{models::*, DbConn, DbPool},
|
||||||
util::{NumberOrString, SafeString},
|
util::{NumberOrString, SafeString},
|
||||||
|
|
|
@ -141,7 +141,8 @@ async fn generate_webauthn_challenge(
|
||||||
.map(|r| r.credential.cred_id) // We return the credentialIds to the clients to avoid double registering
|
.map(|r| r.credential.cred_id) // We return the credentialIds to the clients to avoid double registering
|
||||||
.collect();
|
.collect();
|
||||||
|
|
||||||
let (challenge, state) = WebauthnConfig::load(&host_info.base_url, &host_info.origin).generate_challenge_register_options(
|
let (challenge, state) = WebauthnConfig::load(&host_info.base_url, &host_info.origin)
|
||||||
|
.generate_challenge_register_options(
|
||||||
user.uuid.as_bytes().to_vec(),
|
user.uuid.as_bytes().to_vec(),
|
||||||
user.email,
|
user.email,
|
||||||
user.name,
|
user.name,
|
||||||
|
|
|
@ -524,7 +524,9 @@ async fn twofactor_auth(
|
||||||
Some(TwoFactorType::Authenticator) => {
|
Some(TwoFactorType::Authenticator) => {
|
||||||
authenticator::validate_totp_code_str(&user.uuid, twofactor_code, &selected_data?, ip, conn).await?
|
authenticator::validate_totp_code_str(&user.uuid, twofactor_code, &selected_data?, ip, conn).await?
|
||||||
}
|
}
|
||||||
Some(TwoFactorType::Webauthn) => webauthn::validate_webauthn_login(&user.uuid, twofactor_code, base_url, origin, conn).await?,
|
Some(TwoFactorType::Webauthn) => {
|
||||||
|
webauthn::validate_webauthn_login(&user.uuid, twofactor_code, base_url, origin, conn).await?
|
||||||
|
}
|
||||||
Some(TwoFactorType::YubiKey) => yubikey::validate_yubikey_login(twofactor_code, &selected_data?).await?,
|
Some(TwoFactorType::YubiKey) => yubikey::validate_yubikey_login(twofactor_code, &selected_data?).await?,
|
||||||
Some(TwoFactorType::Duo) => {
|
Some(TwoFactorType::Duo) => {
|
||||||
duo::validate_duo_login(data.username.as_ref().unwrap().trim(), twofactor_code, conn).await?
|
duo::validate_duo_login(data.username.as_ref().unwrap().trim(), twofactor_code, conn).await?
|
||||||
|
|
Laden …
In neuem Issue referenzieren