Subject: CVS commit: pkgsrc/security/vaultwarden
From: Hauke Fath
Date: 2023-07-20 17:25:38
Message id: 20230720152538.C02D7FBDB@cvs.NetBSD.org

Log Message:
Update security/vaultwarden to v1.28.1

Note the license change from gnu-gpl-v3 to gnu-agpl-v3.

There is at this time no update to the current 1.29.0, because

o upstream is pulling in a non-release crate from github during build, again, and

o pkgsrc has no workable way to create an updated
  "cargo-depends.mk". The make CARGO_ARGS="build --release" build
  described in the pkgsrc guide 21.4.4 does not work, and I ended up
  cribbing the cargo list from the FreeBSD package (thanks, guys!).

Upstream's change list:

1.28.1
What's Changed

    Decode knowndevice X-Request-Email as base64url with no padding by @jjlin in \ 
#3376
    Fix abort on password reset mail error by @BlackDex in #3390
    support /users/<uuid>/invite/resend admin api by @nikolaevn in #3397
    always return KdfMemory and KdfParallelism by @stefan0xC in #3398
    Fix sending out multiple websocket notifications by @BlackDex in #3405
    Revert setcap, update rust and crates by @BlackDex in #3403

1.28.0
Major changes

    The project has changed license to the AGPLv3. If you're hosting a
    Vaultwarden instance, you now have a requirement to distribute the
    Vaultwarden source code to your users if they request it. The
    source code, and any changes you have made, need to be under the
    same AGPLv3 license. If you simply use our code without
    modifications, just pointing them to this repository is enough.

    Added support for Argon2 key derivation on the clients. To enable
    it for your account, make sure all your clients are using version
    v2023.2.0 or greater, then go to account settings > security >
    keys, and change the algorithm from PBKDF2 to Argon2id.

    Added support for Argon2 key derivation for the admin page
    token. To update your admin token to use it, check the wiki
    New alternative registries for the docker images are available (In BETA for now):
        Github Container Registry: https://ghcr.io/dani-garcia/vaultwarden
        Quay: https://quay.io/vaultwarden/server

What's Changed

    Remove patched multer-rs by @manofthepeace in #2968
    Removed unsafe-inline JS from CSP and other fixes by @BlackDex in #3058
    Validate YUBICO_SERVER string (#3003) by @BlackDex in #3059
    Log message to stderr if LOG_FILE is not writable by @pjsier in #3061
    Update WebSocket Notifications by @BlackDex in #3076
    Optimize config loading messages by @BlackDex in #3092
    Percent-encode org_name in links by @am97 in #3093
    Fix failing large note imports by @BlackDex in #3087
    Change text/plain API responses to application/json by @jjlin in #3124
    Remove shrink-to-fit=no from viewport-meta-tag by @redwerkz in #3126
    Update dependencies and MSRV by @BlackDex in #3128
    Resolve uninlined_format_args clippy warnings by @BlackDex in #3065
    Update Rust to v1.66.1 to patch CVE by @BlackDex in #3136
    Fix remaining inline format by @BlackDex in #3130
    Use more modern meta tag for charset encoding by @redwerkz in #3131
    fix (2fa.directory): Allow api.2fa.directory, and remove 2fa.directory by \ 
@GeekCornerGH in #3132
    Optimize CipherSyncData for very large vaults by @BlackDex in #3133
    Add avatar color support by @BlackDex in #3134
    Add MFA icon to org member overview by @BlackDex in #3135
    Minor refactoring concering user.setpassword by @sirux88 in #3139
    Validate note sizes on key-rotation. by @BlackDex in #3157
    Update KDF Configuration and processing by @BlackDex in #3163
    Remove arm32v6-specific tag by @jjlin in #3164
    Re-License Vaultwarden to AGPLv3 by @BlackDex in #2561
    Admin password reset by @sirux88 in #3116
    "Spell-Jacking" mitigation ~ prevent sensitive data leak \u2026 by \ 
@dlehammer in #3145
    Allow listening on privileged ports (below 1024) as non-root by @jjlin in #3170
    don't nullify key when editing emergency access by @stefan0xC in #3215
    Fix trailing slash not getting removed from domain by @BlockListed in #3228
    Generate distinct log messages for regex vs. IP blacklisting. by @kpfleming \ 
in #3231
    allow editing/unhiding by group by @farodin91 in #3108
    Fix Javascript issue on non sqlite databases by @BlackDex in #3167
    add argon2 kdf fields by @tessus in #3210
    add support for system mta though sendmail by @soruh in #3147
    Updated Rust and crates by @BlackDex in #3234
    docs: add build status badge in readme by @R3DRUN3 in #3245
    Validate all needed fields for client API login by @BlackDex in #3251
    Fix Organization delete when groups are configured by @BlackDex in #3252
    Fix Collection Read Only access for groups by @Misterbabou in #3254
    Make the admin session lifetime adjustable by @mittler-works in #3262
    Add function to fetch user by email address by @mittler-works in #3263
    Fix vault item display in org vault view by @jjlin in #3277
    Add confirmation for removing 2FA and deauthing sessions in admin panel by \ 
@JCBird1012 in #3282
    Some Admin Interface updates by @BlackDex in #3288
    Fix the web-vault v2023.2.0 API calls by @BlackDex in #3281
    Fix confirmation for removing 2FA and deauthing sessions in admin panel by \ 
@dpinse in #3290
    Admin token Argon2 hashing support by @BlackDex in #3289
    Add HEAD routes to avoid spurious error messages by @jjlin in #3307
    Fix web-vault Member UI show/edit/save by @BlackDex in #3315
    Upd Crates, Rust, MSRV, GHA and remove Backtrace by @BlackDex in #3310
    Add support for /api/devices/knowndevice with HTTP header params by @jjlin \ 
in #3329
    Update Rust, MSRV and Crates by @BlackDex in #3348
    Merge ClientIp with Headers. by @BlackDex in #3332
    add endpoints to bulk delete collections/groups by @stefan0xC in #3354
    Add support for Quay.io and GHCR.io as registries by @BlackDex in #3363
    Some small fixes and updates by @BlackDex in #3366
    Update web vault to v2023.3.0 by @dani-garcia

1.27.0
New features

    Event logs for organizations

    With this feature enabled, actions occurring inside an organization
    will be recorded in a log, viewable by organization admins and
    owners. Check the official documentation to learn more:
    https://bitwarden.com/help/event-logs/ (Note that the Public API is
    not yet implemented, so the events are only viewable in the Web Vault)

    To enable this feature, set ORG_EVENTS_ENABLED=true. By default all
    events will be stored indefinitely, if you want to limit that, you can
    use the EVENTS_DAYS_RETAIN option. You can also tune the cleanup
    schedule with EVENT_CLEANUP_SCHEDULE.  Group support (beta)

    Enables the creation and use of groups inside an organization. At the
    moment this is in beta because there are some known issues
    (#2989). Still, the more this feature is tested, the faster we will be
    able to stabilize it.

    To enable this feature, set ORG_GROUPS_ENABLED=true, make sure to make
    proper backups of your instance before hand.

What's Changed

    Group support | applied .diff by @MFijak in #2846
    Add Organizational event logging feature by @BlackDex in #2868
    Updated web vault to 2022.12.0 by @dani-garcia
    Update diesel to 2.0.2 by @dani-garcia in #2724
    Limit Cipher Note encrypted string size by @BlackDex in #2945
    fix invitations of new users when mail is disabled by @stefan0xC in #2773
    attach images in email by @stefan0xC in #2784
    allow registration without invite link by @stefan0xC in #2799
    Fix master password hint update not working. by @BlackDex in #2834
    Sync global_domains.json by @jjlin in #2840
    verify email on registration by invite by @stefan0xC in #2804
    Take ROCKET_ADDRESS into account in the Docker healthcheck by @jjlin in #2844
    Update github workflows by @BlackDex in #2852
    feat: Bump web-vault to v2022.10.1 by @GeekCornerGH in #2859
    Update Rust version, deps and workflow by @BlackDex in #2888
    Add /devices/knowndevice endpoint by @BlackDex in #2893
    fix: removed a double space by @GeekCornerGH in #2894
    Support Org Export for v2022.11 clients by @BlackDex in #2899
    Use constant size generic parameter for random bytes generation by \ 
@samueltardieu in #2910
    Update config comment to reflect rfc8314. by @skid9000 in #2911
    Set "Bypass admin page security" as read-only by @BlackDex in #2918
    Fully remove DuckDuckGo email service. by @BlackDex in #2919
    Added missing register endpoint to identity by @BlackDex in #2920
    Prevent DNS leak when icon regex is configured by @BlackDex in #2921
    Update settings description by @karbobc in #2928
    allow managers to set groups of a collection by @stefan0xC in #2933
    Update Vaultwarden Logo's by @BlackDex in #2940
    check if sqlite folder exists by @stefan0xC in #2873
    redirect to admin login page when forward fails by @stefan0xC in #2886
    Cleanups and Fixes for Emergency Access by @BlackDex in #2936
    Update dependencies for Rust and Admin interface. by @BlackDex in #2941
    Fix admin repost warning. by @BlackDex in #2953
    Add dev-only query logging support by @BlackDex in #2954
    Fix managers and groups link by @BlackDex in #2947
    use a custom 404 page by @stefan0xC in #2948
    Increase privacy of masked config by @BlackDex in #2963
    Improve comments by @tessus in #2969
    use black favicon for /admin by @tessus in #2970
    Remove ctrlc crate and some updates by @BlackDex in #2971
    Fix org export (again) by @BlackDex in #2973
    Revert collection queries back to left_join by @BlackDex in #2976
    Fix recover-2fa not working. by @BlackDex in #2994
    Disable groups by default and Some optimizations by @BlackDex in #2995
    Fix a panic during Yubikey register/login by @BlackDex in #3006

Files:
RevisionActionfile
1.3modifypkgsrc/security/vaultwarden/Makefile
1.3modifypkgsrc/security/vaultwarden/cargo-depends.mk
1.3modifypkgsrc/security/vaultwarden/distinfo
1.1removepkgsrc/security/vaultwarden/patches/patch-.._vendor-multer-2.0.4-src_field.rs
1.1removepkgsrc/security/vaultwarden/patches/patch-Cargo.toml