mirror of
https://github.com/dani-garcia/vaultwarden.git
synced 2026-04-26 01:35:54 +03:00
[PR #3157] [MERGED] Validate note sizes on key-rotation. #3234
Labels
No labels
SSO
Third party
better for forum
bug
bug
documentation
duplicate
enhancement
future Vault
future Vault
future Vault
good first issue
help wanted
low priority
notes
pull-request
question
troubleshooting
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/vaultwarden#3234
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
📋 Pull Request Information
Original PR: https://github.com/dani-garcia/vaultwarden/pull/3157
Author: @BlackDex
Created: 1/20/2023
Status: ✅ Merged
Merged: 1/24/2023
Merged by: @dani-garcia
Base:
main← Head:issue-3152📝 Commits (1)
34ac16eValidate note sizes on key-rotation.📊 Changes
3 files changed (+30 additions, -8 deletions)
View changed files
📝
src/api/admin.rs(+3 -3)📝
src/api/core/accounts.rs(+17 -5)📝
src/api/notifications.rs(+10 -0)📄 Description
We also need to validate the note sizes on key-rotation. If we do not validate them before we store them, that could lead to a partial or total loss of the password vault. Validating these restrictions before actually processing them to store/replace the existing ciphers should prevent this.
There was also a small bug when using web-sockets. The client which is triggering the password/key-rotation change should not be forced to logout via a web-socket request. That is something the client will handle it self. Refactored the logout notification to either send the device uuid or not on specific actions.
Fixes #3152
🔄 This issue represents a GitHub Pull Request. It cannot be merged through Gitea due to API limitations.