0
Fork 0
mirror of https://github.com/dani-garcia/vaultwarden.git synced 2025-01-21 01:12:28 -05:00
vaultwarden/src
Mathijs van Veluw eccb3ab947
Decrease JWT Refresh/Auth token (#4163)
Large JWT's could cause issue because of header or body sizes of the
HTTP request could get too large when you are a member of a lot of organizations.

This PR removes these specific keys since they are not used either
client side or server side.

Because Bitwarden does add these in there JWT's i would suggest to keep
the code we had but then commented out as a reference.

Removing it and searching for this when needed would be a waist of time.

Fixes #4156
2023-12-13 17:49:35 +01:00
..
api Decrease JWT Refresh/Auth token (#4163) 2023-12-13 17:49:35 +01:00
db Decrease JWT Refresh/Auth token (#4163) 2023-12-13 17:49:35 +01:00
static Add Protected Actions Check (#4067) 2023-11-12 22:15:44 +01:00
auth.rs Decrease JWT Refresh/Auth token (#4163) 2023-12-13 17:49:35 +01:00
config.rs Add Protected Actions Check (#4067) 2023-11-12 22:15:44 +01:00
crypto.rs Remove get_random_64() 2022-11-13 10:03:06 +01:00
error.rs Update crates (#4074) 2023-11-15 10:41:14 +01:00
mail.rs Add Protected Actions Check (#4067) 2023-11-12 22:15:44 +01:00
main.rs tokio::signal::unix::SignalKind::hangup().as_raw_value() insted of 1 2023-10-21 17:14:03 +02:00
ratelimit.rs
util.rs Several small fixes for open issues (#4143) 2023-12-09 01:21:14 +01:00