Releases: detunized/password-manager-access
Releases · detunized/password-manager-access
v0.1.2
Changes:
- 68292d4 Version bumped to 0.1.2
- a49c227 CI: include sources and symbols in the NuGet package
- 2ee1572 Examples: fixed namespaces
- f16a1de Keeper: bye-bye, Keeper. Removed in favour of the offical SDK at https://github.com/Keeper-Security/Commander/tree/master/dotnet-keeper-sdk (fixes #12)
This list of changes was auto generated.
v0.1.1
Changes:
- 25fa7d6 CI: don't checkout the code on the release job, use the tag as the release name
- bfca606 Version bumped to 0.1.1
- ceb38b1 Bitwarden: better error handling, report invalid U2F signature properly (fixes #11)
- ef26a15 Bitwarden: Handle U2F cancellation
- 636428d Bitwarden: conditionally reference U2fWin10 and compile on NET Framework only
- e1e199b Bitwarden: removed unused Ui.ProvideU2fPasscode method
- 4843f1a Changed the test lib to be a calss lib to eliminate the warning about missin Main method
- 79789ca Bitwarden: Fixed the unsupported 2FA methods test
- 4e56e6a Bitwarden: Support for FIDO U2F on Windows 10 build 1903+ via U2fWin10 library (https://www.nuget.org/packages/U2fWin10/)
- c2cf20a Normalize whitespace and BOM (don't need one, thank you)
See More
- fc59886 Bitwarden: FIDO U2F support (WIP)
- 9a71e47 Bitwarden: Don't throw when unsupported 2FA method encountered, ignore it
- ca81a20 Bump the client version (67145154c993da489a7a2a44dde55f4d55b9fb8f, 13 Nov 2019 in the original repo)
- 5fbaf23 Support for MS Authenticator (89ea4b790bd8ed6aabc47deb9b6e19fb0b81895b, 13 Nov 2019 in the original repo)
- 803658c Fixed a server imposed 200 item limit per request: issue multiple requests until we're done receiving all the items in the vault (ad9375fa2e4ad0725a68413a56e0240881117e21, 17 Sep 2019 in the original repo)
- 58dea6b Azure Pipelines: release to GH only from refs/tags/ [skip appveyor]
- 6b4c928 Azure Pipelines: enalble windows build [skip appveyor]
- fe19068 Azure Pipelines: tag release [skip appveyor]
- a0bc99e Azure Pipelines: create github release [skip appveyor]
- 86d35f4 Azure Pipelines: ls downloaded files [skip appveyor]
- 8da9509 Azure Pipelines: download all files [skip appveyor]
- 5e9904d Azure Pipelines: download nupkg [skip appveyor]
- eeb55be Azure Pipelines: publish nuget [skip appveyor]
- bf7c3e9 Azure Pipelines: view files [skip appveyor]
- 3c784a8 Azure Pipelines: upload test results
- ea2bf96 Azure Pipelines: simple linux build only
- 282d9b0 Azure Pipelines: make nuget package using dotnet pack and publish locally
- b4e8c7a Azure Pipelines: make nuget package
- 2537672 NuGet package properties
- 816dafb Don't package the examples for NuGet
- f9edcd1 Azure Pipelines: named the stages for Linux build
- 1c95e35 Azure Pipelines: run only netcoreapp3.0 tests on Linux
- be13637 Azure Pipelines: Linux dotnet build
- ba6f570 CircleCI removed after a few attempts to configure a windows and a linux build (ref #2)
- ab0c148 Add tests to CircleCI config
- 69af40a Circle CI config
- 11fc149 Azure Pipelines badge (ref #2)
- b16d0c9 Appveyor config and badge (ref #2)
- 1adcf24 Auzure CI config: only build the main solution
- 981547f Set up CI with Azure Pipelines (Windows)
- ea7ab5d Support for .NET Core
- 4693e4f Make a few attempts with the MFA codes, smarter email triggering, handle incorrect MFA code
- 1edfdef Handle always-OTP device registration properly
- 73fec92 New device registration reworked, better MFA support
- 3b30c12 Test settings in various formats
- 2c460f0 Test various local key formats
- 66d4cbd Dashlane exceptions removed, some TODOs fixed
- 333b32d Use base url
- 1d5c204 TODO
- 096b1e5 Some foreach tests converted to theories
- 31c923b JoinToString tests
- 8cc97a6 Random device ID generation simplified and brought up to date
- 679924e The term UKI is replaced with more generic Device ID, it was confusing
- e3e582a Missing test fixture
- a7ad3e5 Major refactoring: the uki/device-id is removed from the public API and now is done via the Ui interface, many more changes
- fed6a8d Verify UKI before trying to login (WIP)
- 21de924 Converted foreach/fact test to theories
- 4a7be38 FetchException removed
- fe553fe Discard deleted accounts (58676fa70cfa06a2292f715155c49f8dac435c52, 30 Sep 2019 in the original repo)
- ffed2cc Support both OTP on every login and for new devices only
- d84f28e Decrypt the vault protected by the server key (used with MFA)
- b19211a Dashlane basic Google Auth support (WIP)
- 02a34e7 Send OTP with given (MFA, WIP)
- 3a25338 Check the login type before fetching the vault
- 918a102 Request login type (MFA, WIP)
- 2999bbf Dashlane ported to RestClient, IWebClient and WebClient removed
- 18b927d RegisterUki ported to RestClient
- e325acd Porting Dashlane.Remote over to RestClient (WIP)
- 0dbefe1 Allow responses with errors in RestFlow
- 7a209f5 ByteArray.Sub moved to common extensions
- 642657b Removed most of the extensions from Dashlane
- ed0e14a TODOs
- abc9ff4 Import UKI is back. Yay!
- 26390d8 An overload for DecryptBlob with a binary password
- 0c36eb4 Made all internal methods internal
- b4bf5e6 Added Argon2d support thanks to Konscious.Security.Cryptography.Argon2 1.2.1
- a7e5a0f Throw on non ASCII passwords
- 9954f11 Don't like yellow tests: the KWC5 test now simply check for throw
- 0d70abb Blob.Compressed removed as it's no longer needed
- 3f4bdc7 Refactoring: lots of code moved around
- b2f1d92 Removed Parse.Sha1 and the iterations from the IV derivation
- 1ff9464 Added SHA-1 to Crypto
- 6d4e964 Removed Blob.Iterations since it's no longer used
- 96a2df2 Removed UseDerivedKey since it's no longer used
- 77f1857 Parse and decrypt the new flexible config PBKDF2 blob format
- b0a210e SHA-512 and HMAC-SHA-256 added to the crypto lib
- 7a4c908 Assign a cipher config to KWC3 blobs as well
- bfc3089 Remove broken support for KWC5
- bd90cd7 A working version of the local settings import with the new encryption
- d421552 IV generation mode, KWC3/5 configs
- 0590c87 Parse flexible crypto config and the rest of the blob
- 93ef125 1password: Fixed occasional invalid RSA keys that .NET would choke on by restoring the missing leading zeros (ba6f77fc65ee89007ca3da13394dfd6557034411, 29 Aug 2019 in the original repo)
- 82dcd07 Parse new encrypted blob format (WIP)
- 6546597 All Dashlane tests are green
- c5cd06a Tests converted to Xunit
- 3885458 Dashlane tests moved from .orginal
- cf8bd13 Only KWC3/5 modes are supported, any other throws an exception
- 396dc24 Dashlane example converted from .original
- 8cd32ac Updated the copyright and the namepsace
- c659ab4 Dashlane moved from the .original
- 9c09ca7 Force special RSA parsing/decryption when handling organization keys (fixes #1)
- c9ec4b5 Special forced RSA parsing mode for the cipher string
- 258bd0d Parse a cipher string without the encryption mode into AES-128-HMAC-SHA-256 when it has 3 pieces
- d42a9c2 TestRestTransport -> RestFlow
- b100e59...