mirror of
https://github.com/bitwarden/android.git
synced 2026-03-22 20:41:29 -05:00
Vault timeout option not respected on iOS #1729
Closed
opened 2025-11-26 22:56:29 -06:00 by GiteaMirror
·
79 comments
No Branch/Tag Specified
main
crowdin-pull
sdlc/sdk-update
llm/skill-refinements
release/2026.3-rc49
PM-24380/flight-recorder-redact-hostname
sdk-folder-repo-interface
PM-25654-preview-attachment
android-collections
cx/android-architect-agent
PM-30130-remove-archive-feature-flag
llm/add-resolving-sdk-updates-skill
QA-1523/sanity-test-saucelabs
release/2026.3-rc48
PM-26577-app-links-support
PM-26896-autofill-fix
release/2026.2-rc47
PM-32714/fallback-to-web-vault-host
pr-6572
PM-28834/setting-app-layout-horizonos
release/2026.2-rc46
release/2026.1-rc45
PM-30644/added-logs-for-debug
PM-30644/quicktile-nav-not-showing-migration
minor-gradle-updates
release/2026.1-rc42
release/2026.1-rc44
release/2026.1-rc43
PM-28834/set-landscape-on-horizonos-devices
context-rules
devclarity/update-code-review-command
PM-20026/force-ltr-passwords-and-codes
release/2025.12-rc41
cmcg/testCoverage
PM-29014/talkback-support-for-passwords
release/2025.12-rc40
BRE-1305/publish_test
accept-user-certs
autofill-permissions
release/2025.11-rc39
PM-22479/check-all-certificates-validate-asset-links
release/2025.10-rc38
agalles/android-latest
optimize-test-workflows
tier2-test-sharding
retro-agent
PM-27001/skip-account-selection-only-one-exists-cxp
release/2025.10-rc37
agalles/test-1118
release/2025.10-rc36
PM-20593-token-refresh
QA-1126b/adding-native-sanity-test
release/2025.9-rc35
pm-25933/sdk-update-password
release/2025.9-rc34
release/2025.8-rc33
agalles/20250821-release
debug-release-issues
pm-24249-allow-automated-prs-for-sdk-updates
release/2025.8-rc32
release/WORKFLOW-TEST-2025.8-rc28
agalles/20250807release
release/2025.07-rc25
release/hotfix-v2025.7.0-bwa
pm-23311/export-vault-policy-bypass
release/2025.07-rc24
authenticator-pm-sync-flags-issue
ps/implement-sdk-repository-example
release/hotfix-v2025.6.0-bwpm
release/2025.06-rc21
agalles/automate-android-fastlane-patch
release/2025.05-rc20
release/2025.04-rc19
languages/basque
release/2025.03-rc19
update-readme
qrcode/feature
innovation/archive/pm-19153-archive-items
qrcode/2-ui-fields
qrcode/1-page
hold-on-biometric-prompt-alternative
release-notes-process
release/2025.02-rc16
bwa-monorepo
PM-8223/new-device-verification-ux-improvements
pm-18451/exempt-from-policies
test-bwa
cs-workaround-linked-0-copy
release/2025.01-rc15
release/2025.01-rc14
release/2024.12-rc13
pm-16670/sync-leave-notice
821
PM-16695/backport-lean-more-new-device-verification
km/15084-testing
release/hotfix-v2024.11.7
release/2024.11-rc1
pm-11304/collection-add-item-button
PM-14241/disabling-logs-app-crash
poc/offline-editing
new-version-calc
pm-11649/expired-link-services
pm-6702/add-feature-flag
pm-6702/email-verification-feature
pm-9933/marketing-copy-update
pm-6702/registration-flows
update-templates
pm-6701/email-verification-selfhost-registration
v2026.3.0-bwpm
v2026.3.0-bwa
v2026.2.1-bwpm
v2026.2.1-bwa
v2026.2.0-bwpm
v2026.2.0-bwa
v2026.1.1-bwa
v2026.1.1-bwpm
temp-test
v2026.1.0-bwpm
v2026.1.0-bwa
v2025.12.1-bwa
v2025.12.1-bwpm
v2025.12.0-bwa
v2025.12.0-bwpm
v2025.11.1-bwpm
v2025.11.1-bwa
v2025.11.0-bwpm
v2025.11.0-bwa
v2025.10.1-bwa
v2025.10.1-bwpm
v2025.10.0-bwa
v2025.10.0-bwpm
v2025.9.1-bwa
v2025.9.1-bwpm
v2025.9.0-bwa
v2025.9.0-bwpm
v2025.8.1-bwa
v2025.8.1-bwpm
v2025.8.0-bwa
v2025.8.0-bwpm
v2025.7.2-bwa
v2025.7.2-bwpm
v2025.7.1-bwa
v2025.7.1-bwpm
v2025.7.0-bwa
v2025.7.0-bwpm
v2025.6.1-bwpm
v2025.6.0-bwa
v2025.6.0-bwpm
v2025.1.0-bwa
v2025.5.0-bwa
v2025.5.0-bwpm
v2025.5.999
2025.4.0
v2025.4.0
untagged-4731eaadac73f3dfbbb8
v2025.3.0
v2025.2.0
untagged-815a165c5d70ffe75bc7
v2025.1.2
v2025.1.1
v2025.1.0
v2024.12.0
untagged-5a76b6392a4c8998c63a
v2024.11.7
v2024.11.6
v2024.11.5
v2024.11.4
v2024.11.3
v2024.11.2
v2024.11.1
v2024.11.0
v2024.10.2
v2024.10.1
v2024.10.0
v2024.9.0
v2024.8.1
v2024.8.0
v2024.7.3
v2024.7.2
v2024.7.1
v2024.7.0
v2024.6.1
v2024.6.0
v2024.5.1
v2024.4.1
v2024.4.2
v2024.4.0
v2024.3.3
v2024.3.1
v2024.3.0
v2024.2.1
v2024.2.0
v2024.1.1
v2024.1.0
v2023.12.0
v2023.10.0
v2023.9.2
maui-single-project-android
v2023.9.1
v2023.9.0
v2023.8.0
v2023.7.0
v2023.5.0
v2023.4.0
v2023.3.2
v2023.3.1
v2023.3.0
v2023.2.0
v2023.1.0
v2022.11.0
v2022.10.0
v2022.9.1
v2022.9.0
v2022.8.0
v2022.6.2
v2022.6.1
v2022.6.0
v2022.05.0
v2.18.0
v2.17.0
v2.16.4
v2.16.3
v2.16.2
v2.16.1
v2.15.0
v2.14.2
v2.14.1
v2.14.0
v2.13.0
v2.12.0
v2.11.3
v2.11.2
v2.11.1
v2.11.0
v2.10.0
v2.9.1
v2.9.0
v2.8.2
v2.8.1
v2.8.0
v2.7.2
v2.7.0
v2.6.1
v2.6.0
v2.5.6
v.2.5.5
v2.5.5
v2.5.4
v2.5.3
v2.5.2
v2.5.1
v2.5.0
v2.4.3
v2.4.2
v2.4.1
v2.4.0
v2.3.1
v2.3.0
v2.2.8
v2.2.7
v2.2.6
v2.2.2
v2.2.1
v2.2.0
v2.1.2
v2.1.0
v2.0.6
v2.0.5
v2.0.4
v2.0.3
v2.0.2
v2.0.1
v2.0.0
v1.22.1
v1.22.0
v1.21.0
v1.20.0
v1.19.0
v1.18.1
v1.18.0
v1.17.0
v1.16.0
v1.15.2
v1.15.1
v1.15.0
v1.14.4
v1.14.1
v1.14.0
v1.13.0
v1.12.2
v1.12.1
v1.12.0
v1.11.1
v1.11.0
v1.10.0
v1.9.0
v1.8.1
v1.8.0
v1.7.0
v1.6.5
v1.6.1
v1.6.0
v1.5.1
v1.5.0
v1.4.4
v1.4.3
v1.4.0
v1.3.0
v1.2.1
v1.2.0
v1.1.0
v1.0.0
v0.0.6
v0.0.5
v0.0.4
v0.0.3
v0.0.2
v0.0.1
Milestone
No items
No Milestone
Projects
Clear projects
No project
No Assignees
Notifications
Due Date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/android#1729
Reference in New Issue
Block a user
Blocking a user prevents them from interacting with repositories, such as opening or commenting on pull requests or issues. Learn more about blocking a user.
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @ryanpcmcquen on GitHub (Sep 22, 2023).
Originally assigned to: @trmartin4 on GitHub.
Steps To Reproduce
Expected Result
Bitwarden would respect the Vault Timeout setting.
Actual Result
Bitwarden ignores Vault Timeout and prompts for master password for all interactions.
Screenshots or Videos
No response
Additional Context
No response
Operating System
iOS
Operating System Version
16.6.1
Device
iPhone SE 2020
Build Version
2023.9.1
Beta
@Gerardv514 commented on GitHub (Sep 23, 2023):
Have this issue since 2023.9 update was released. Unfortunately I don’t have a way to roll back since their beta testing group is closed
@quagsirus commented on GitHub (Sep 23, 2023):
Having the same issue on iOS 17.0.1 on my iPhone 11 Pro Max
The vault always locks on app restart regardless of vault timeout or faceid settings.
Definitely caused by 2023.9.0, and 2023.9.1 did not fix the issue, nor did a full re-install.
@SergeantConfused commented on GitHub (Sep 23, 2023):
Hello @ryanpcmcquen and everyone else,
Thank you for your report. I am able to reproduce this on iOS 17 with Bitwarden 2023.9.1, and I have flagged it to our engineering team.
If you wish to add any further information/screenshots/recordings etc., please feel free to do so at any time - our engineering team will be happy to review these.
*Edit: This also affects Bitwarden 2023.9.1 on Android 12.
Thank you again,
@Gerardv514 commented on GitHub (Sep 23, 2023):
Thank you for response. Any chance of a way that we can roll back some how? I have a 20 character password which is random generated, this is nearly impossible to deal with on a routine basis.
@SergeantConfused commented on GitHub (Sep 23, 2023):
Hi @Gerardv514,
Thank you for response.
You're most welcome! 😊
Any chance of a way that we can roll back some how? I have a 20 character password which is random generated, this is nearly impossible to deal with on a routine basis.
Rolling back on iOS is not a practical option; I would recommend you set up a PIN (https://bitwarden.com/help/unlock-with-pin/) or Biometrics (https://bitwarden.com/help/biometrics/) for now if possible, as a temporary workaround.
All the best,
@Gerardv514 commented on GitHub (Sep 23, 2023):
Ah Yes I can set biometric Face ID in mean time. I’m also hit with another bug of kdf memory error when not using biometric. I know a new thread should be created, but I’m not well rehearsed in the argon2 stuff hoping to see someone else post about it.
Thank you tho for biometric option
@SergeantConfused commented on GitHub (Sep 23, 2023):
Hi @Gerardv514,
Sure thing. Please check if this (https://github.com/bitwarden/mobile/issues/2389) is what you are encountering; If not, please feel free to create a Support ticket (https://bitwarden.com/help/) with more details, and we'll have a look.
All the best,
@colleenmason commented on GitHub (Sep 26, 2023):
I sent a support request about this issue and was sent to this thread.
FYI Setting up a PIN has not worked for me, I still get asked for master password.
@ryanpcmcquen commented on GitHub (Sep 26, 2023):
I have this issue as well.
@Gerardv514 commented on GitHub (Sep 26, 2023):
Agreed I tried pin too and that doesn’t work. For now I’m utilizing Face ID
@Gerardv514 commented on GitHub (Sep 27, 2023):
@SergeantConfused has someone been able to reproduce this yet? Is there a need for further information?
@thefutureofwhat commented on GitHub (Sep 27, 2023):
I have the same issue with my Android 13 device, it appears to be a clear regression in the 2023.9.1 version of the app, started disregarding my settings (to stay unlocked) and (re)locking the vault/app after some small amount of time, as soon as I upgraded to that app version.
@xavirg commented on GitHub (Sep 27, 2023):
Same here.
Setting the PIN does not solve it, still asking for the master pwd on every login autofill.
@MinghaoUpUpUp commented on GitHub (Sep 27, 2023):
Same here. IOS 17.0.2, 2023.9.1.
@keldey commented on GitHub (Sep 29, 2023):
I followed this guide to downgrade iOS app to
2023.8.0where the issue was not present:https://github.com/qnblackcat/How-to-Downgrade-apps-on-AppStore-with-iTunes-and-Charles-Proxy
Using build ID
859421181.Hope the fix for this issue could be released soon.
@feux-follets commented on GitHub (Sep 30, 2023):
Same issue here
@dickaux commented on GitHub (Sep 30, 2023):
When might I / we expect a fix? This issue has been distressing BW users for way to long. Many weeks.
@muhasturk commented on GitHub (Oct 1, 2023):
I dont want to switch over 1Password however this issue is not acceptable.
@ahsodex commented on GitHub (Oct 1, 2023):
You think a few weeks is bad, try more than a year as in issue https://github.com/bitwarden/clients/issues/2371
I think BW staff largely ignore GitHub. It might be better to open a support issue on their website. I pay for BW so I might try that route myself.
I tried 1Password earlier this year for a few months and it didn’t even offer an option to not lock the vault after a timeout period, and also prompted every time for pin/biometric when doing autofill.
@madmatt347 commented on GitHub (Oct 1, 2023):
Well I put in a ticket a week ago and they just sent me a link to here saying they were already aware of the issue and working on it...
@SergeantConfused commented on GitHub (Oct 1, 2023):
Hello everyone,
Yes, we are able to reproduce this behaviour and are looking into it internally.
As a side note, I've tested using a PIN on iOS 17.0.2 with Bitwarden 2023.9.1, and I am able to unlock my client using that PIN through the Auto-Fill flow. If you are doing this and it's not working, please make sure you tap on (No) when you are asked if you want to require unlocking with your master password when the application is restarted, when you set the PIN up. More about this here (https://bitwarden.com/help/unlock-with-pin/#tab-mobile-DeLAPOlNpLH3MaKazVTfU). If you still are unable to unlock your iOS client using a PIN, please feel free to create a Support ticket (https://bitwarden.com/help/) so we'd have a look because it's probably unrelated to this particular GitHub report.
I thank you in advance for your understanding and patience,
@muhasturk commented on GitHub (Oct 1, 2023):
There are plenty of security options in 1Password you should check it out again
@yoshi-sheep commented on GitHub (Oct 2, 2023):
This also affects Bitwarden 2023.9.1 on Android 11.
I hope the problem will be fixed soon.
@celenityy commented on GitHub (Oct 3, 2023):
Also impacted by the same issue here on Android 13 (GrapheneOS) ever since updating to 2023.9.1. Hopefully there's a fix soon!
@Slash8915 commented on GitHub (Oct 4, 2023):
This issue also persists on Android
@MeteorsLiu commented on GitHub (Oct 5, 2023):
To everyone who has this issue,
downgrade to 2023.8 and don't upgrade.
Downgrade in Android is easy, maybe there's some difficulty for iOS.
@trmartin4 commented on GitHub (Oct 7, 2023):
Hello. Thank you all for your patience with this very inconvenient behavior as we have been working on a fix. The resolution to this issue is in development and is currently scoped to be included in the next major release. We absolutely understand the urgency and sincerely appreciate your patience.
@andreacpowers commented on GitHub (Oct 7, 2023):
When is the next major release?
@trmartin4 commented on GitHub (Oct 8, 2023):
@andreacpowers we plan a release in October, but I don't want to commit to an exact date at this point as there are a lot of factors that go in to the exact timing.
@wnelson03 commented on GitHub (Oct 10, 2023):
@Krychaz what's the status of this? More than a dozen people are having issues https://www.reddit.com/r/Bitwarden/comments/16pic4f/bitwarden_always_login_out_after_ios_17/
I'm on Bitwarden app version 2023.9.1 (4890) on iOS 16.6.1
I made a video to showcase this https://www.youtube.com/watch?v=vfYmLvx-gDM
I've seen some older Reddit posts from years ago saying that the phone battery settings matter and whether the app process gets killed https://www.reddit.com/r/Bitwarden/comments/mwgdps/android_bw_keeps_locking/
Though I think this does not apply, since in the video you can see I never closed Safari, I went to fill my login back-to-back and it still required master password re-prompt.
I have my timeout set to never. I've tried logging out of Bitwarden completely and back in. Not working.
@swderek commented on GitHub (Oct 11, 2023):
@trmartin4, @SergeantConfused, bug is still present on latest release, 2023.9.2 (5102) from 11-Oct. I'm on iOS 17.0.3.
@MinghaoUpUpUp commented on GitHub (Oct 12, 2023):
2023.9.2. Still same problem
@dickaux commented on GitHub (Oct 12, 2023):
2023.9.2 didn’t fix the problem. The problem still exists just as in
3023.9.1
On Thu, Oct 12, 2023 at 12:02 AM Minghao Wang @.***>
wrote:
@Gerardv514 commented on GitHub (Oct 12, 2023):
The bug still exists because the work to fix it hasn’t been started or merged yet.
@dickaux commented on GitHub (Oct 12, 2023):
So What Bugs did 2023.9.2 actually try to fix?
On Thu, Oct 12, 2023 at 8:20 AM Gerardv514 @.***> wrote:
@0xadada commented on GitHub (Oct 12, 2023):
@dickaux
you can review the diff here https://github.com/bitwarden/mobile/compare/v2023.9.1...v2023.9.2
@wnelson03 commented on GitHub (Oct 15, 2023):
@djsmith85 any updates on this?
@trmartin4 commented on GitHub (Oct 16, 2023):
This issue will be included in the next major release (
2023.10.0), which is currently undergoing final development in preparation for release later this month. I apologize for the confusion with the2023.9.2release -2023.9.2was a small, targeted incremental one, and this fix will be included in our planned October release@wnelson03 commented on GitHub (Oct 16, 2023):
@trmartin4 hm, I hope this isn't too much later in the month. Even when setting vault timeout to 30 minutes rather than Never on mobile app version 2023.9.1 (4890) and iOS version 16.6.1, I have to unlock the Bitwarden vault every single time that I click to fill a login into an app. There's absolutely zero persistence and it's been this way for three weeks. Extremely inconvenient.
@escape0707 commented on GitHub (Oct 16, 2023):
I don't know if those who are pushing the development are actually paid customers, but as far as I'm aware, this is already a speedy fix, and open source software users are usually willing to wait more patiently, because pushing here won't speed up bug fixing as long as devs have already confirmed that they are working on it. Plus, there are more people subscribing to multiple GitHub issues and only want email notifications when something actually changes...
@CarlosJoseChaconChavarria commented on GitHub (Oct 18, 2023):
do you have the steps and link for that version for android thanks
@escape0707 commented on GitHub (Oct 18, 2023):
@CarlosJoseChaconChavarria
If you've installed any APK files manually, then you can just go to this repo's release page to grab the history version you need: https://github.com/bitwarden/mobile/releases/tag/v2023.8.0
As for how to enable manual APK installation, there are many guides floating on the internet...
@wnelson03 commented on GitHub (Oct 23, 2023):
@justindbaur Any updates? More than a month and not resolved. We shouldn't need to manually revert our app version, if that's even possible on iOS, just to fix this. That will probably wipe configuration settings and waste a lot of time. A patch for this has been long awaited. Myself and others have sent details above, including a video. Thanks for your time.
@justindbaur commented on GitHub (Oct 23, 2023):
@wnelson03 An update was already provided, the fix for this issue will be a part of the
2023.10release.@breakthestatic commented on GitHub (Oct 23, 2023):
Not 100% sure, but I believe this PR is what fixes the issue - https://github.com/bitwarden/mobile/pull/2802. As noted above, this was already merged. It looks like new builds are normally out towards the end of the month (seems like the last 2-3 days of the month - going by the past several releases).
@vrexx1 commented on GitHub (Oct 24, 2023):
Still an issue (2023.9.2 on Android). Received email from BitWarden 10/24 that asked to close ticket: "It's been a few days since we last assisted you, we hope your request was resolved to your satisfaction. If you still need help, please reply to this email and we will be glad to continue assisting you. If you no longer need anything for now, there is no need to respond to this message."
Mistake to have migrated from LastPass?
@andreacpowers commented on GitHub (Oct 24, 2023):
Yes, Still an issue (2023.9.2 on Android). I cleared cache and still doesn't work. Lastpass was attacked. 1Password was attacked recently and Bitwarden is terrible. I don't know what to do at this point. Please tell them it's not resolved. I wonder if they even tested.
@escape0707 commented on GitHub (Oct 25, 2023):
@vrexx1 @andreacpowers
Please, people, read. And stop spamming my mailbox.
@vrexx1 commented on GitHub (Oct 25, 2023):
@escape0707 Re: "spam" you'll need to take that up with support@bitwarden.com.
@MeteorsLiu commented on GitHub (Oct 25, 2023):
You can click the button "Unsubscribe" below, the GitHub will not notice you again. I think the reason why this issue is hot is that people really need the "never timeout" option. Bitwarden is my password manager, i cannot stand that i have to input my another password again every time i want to fill my password via bitwarden. That's really silly and really a problem.
So why people are pushing the developers, it did really impact us.
@wnelson03 commented on GitHub (Oct 25, 2023):
Yeah @justindbaur why wait all the way to the end of the month for a fix that could be implemented in less than a day? Seems pretty clear this is greatly inconveniencing people. It's not a feature, it's a fix to bug that has been unresolved for a month..
@djsmith85 commented on GitHub (Oct 25, 2023):
Closing this now.
As previously mentioned a fix will be included in the upcoming
2023.10-release, which is currently targeted to be released next week.@jidanni commented on GitHub (Oct 29, 2023):
Just curious as what happens/happened to passwords of new accounts (on websites/apps we browsed, vault locked) created while this bug is/was present? Not remembered and lost forever?
@Voykimmer commented on GitHub (Oct 31, 2023):
Well a fix was supposed to be out the end of October with 2023.10 . Well today is the end of October and still no fix. What gives ? Am I going to have to move to another password manager again ?
@wnelson03 commented on GitHub (Oct 31, 2023):
In my opinion, they're probably working on it and will release within a few days, probably first week of November.
However, I just don't understand why wait & put such a prevalent bug fix in a major release. It's a bug that is clearly impacting several people. Seems like it would make more sense to just release the bug fix ahead of the release.
Love the open source part of Bitwarden, but in terms of improving customer satisfaction there could definitely be more transparency to do with the bug and feature request process. It seems status updates are seldom in bug reports and feature requests, and it can be very frustrating seeing how slow things move.
Just trying to explain what I think could be done better. No disrespect meant towards the Bitwarden team.
@0xadada commented on GitHub (Oct 31, 2023):
@Voykimmer
@wnelson03
The release process is more than just merging a fix PR and running a build. There are multiple engineering teams involved, multiple platforms (Safari/Chrome/Firefox x iOS/Windows x Desktop/Mobile, etc), and multiple AppStores (Google Play, AppStore, etc), marketing, coms, etc that all need to be coordinated.
@wnelson03 commented on GitHub (Oct 31, 2023):
@0xadada I get that, though they're intentionally holding off on the production release of the bug fix until they have finished other features and likely less important bugs. This bug report has been open for 1+ month(s), rolling out solely a bug fix does not take 1 month.
So yes, I understand why a whole release in its entirety would take a while. I wish they spent more time testing their last release so this bug didn't even get introduced. However, once you have a bug that is showing to affect several dozens of people on Reddit & GitHub, it seems to make sense to roll that out on its own rather than waiting until the next big release.
@escape0707 commented on GitHub (Oct 31, 2023):
Because usually when developers fix a bug, they will first implement the fix at the current developing branch. That fix usually can't be simply copy-pasted to older releases because there are code differences between them. Only when an issue is serious enough or the developing force is just too rich will it be back-ported to a previous release, and effectively doubles the time needed for Quality Assessment.
Just for the reference, here is an even more annoying Firefox bug currently in Firefox 119 release, but Mozilla didn't choose to back-port the fix to 119, either.
@wnelson03 commented on GitHub (Oct 31, 2023):
This is an important usability issue that has impacted dozens of people here and on Reddit. Sure, it might be somewhat of an inconvenience to have to separately merge in code to fix a bug, though this bug is entirely dependent on Bitwarden publishing a release without enough testing. Not a user error or something that can really be fixed by a user behavior.
I'm not sure how you could say that Firefox bug is "even more annoying". It looks to me to be a minor appearance flaw. And Mozilla might not even be entirely responsible. That Tesla website in the GitHub issue is probably at fault for setting a custom HTML background rather than letting the browser default take precedence. Not sure though. Regardless, you're comparing an issue with Bitwarden that at best case wastes a lot of time when we're out somewhere needing to login to a website quickly, and at worse case could cause someone to not be able to access their account at all for the moment if they don't remember their entire passphrase if it's very long.
Comparing that to Firefox showing a color you don't particularly like.. Apples to Oranges.
@escape0707 commented on GitHub (Oct 31, 2023):
The annoyance of the white flash even with dark reader and dark theme is described in this thread https://github.com/darkreader/darkreader/issues/11190#issuecomment-1737877948
@wnelson03 commented on GitHub (Oct 31, 2023):
Yeah you're seriously comparing getting logged out after every single unlock to an undesirable color on your screen..
The open-source side of Bitwarden is awesome. But that doesn't mean they're a super small company. In case you aren't aware, Bitwarden is a very large company with supposedly 108 employees. They've also raised $100 million in funding from just one funding round.
So, they certainly have the resources to respond quicker, have people that provide the customers with status updates, and people who get paid to deal with the inconvenience of separately merging code to fix a problem they created themselves.
I just haven't quite been satisfied with:
I understand that the subscription isn't pricey at all and that they probably make most of their money from enterprise business customers and must delegate the majority of their resources to that. But c'mon it has taken notifying 4-5 Bitwarden employees on Pull Requests before there is ever a response from one of them. It's very frustrating and kind of diminishes the point of making pull requests or other contributions knowing that they sit in limbo for months, sometimes years with some of the Pull Requests I've seen before getting merged.
@muhasturk commented on GitHub (Nov 2, 2023):
2023.10.0 release hasn't fixed. this issue when using auto fill feature, it asks to enter master password every time.
iOS 16.7.2
@wnelson03 commented on GitHub (Nov 2, 2023):
So far working well for me. It seems that it reset my vault timeout settings for some reason though. So you should probably go into the Bitwarden app, go to settings tab, and set vault timeout to Never. Then it worked.
@andreacpowers commented on GitHub (Nov 2, 2023):
Not updated for Android yet.
Reminder to check each place you have Bitwarden: extensions on each browser, app on phone.
@sinamics commented on GitHub (Nov 2, 2023):
when will the android version be out?
@wnelson03 commented on GitHub (Nov 2, 2023):
@andreacpowers @sinamics Google may still be reviewing the play store release.
"App review times may fluctuate, and may take 7 days or longer in exceptional cases" https://support.google.com/googleplay/android-developer/thread/207283574/the-app-is-taking-long-time-in-review?hl=en
Strange thing is that the Play store website shows that it was updated yesterday on November 1st but then the version is still outdated. Perhaps that means the release was submitted for review yesterday but it will stay on the old version until the employees at Google approve the release of the new version.
@Voykimmer commented on GitHub (Nov 2, 2023):
my iPad and iPhone still at
Version: 2023.9.2 (5102) and no update available yet and Bitwarden is still broken.
@wnelson03 commented on GitHub (Nov 2, 2023):
Interesting, I'm on iOS 16.6.1 with iPhone 13 and I saw the Update button in the app store and updated. Then I had to change vault timeout to Never again since for some reason that setting was reset. Then it worked.
@Voykimmer commented on GitHub (Nov 2, 2023):
I’m at IOS 16.7.2 on both my iPhone 8 and my
iPad (6th generation) and no update has been pushed to either yet .
@muhasturk commented on GitHub (Nov 2, 2023):
video proof
@Gerardv514 commented on GitHub (Nov 2, 2023):
Can you turn off the option “ unlock with Face ID” and keep vault time out set to never again.
My issue has been resolved.
@madmatt347 commented on GitHub (Nov 3, 2023):
Update to 2023.10.0 fixed the issue for me on Android 5.1
Thanks Devs
@Voykimmer commented on GitHub (Nov 3, 2023):
I deleted the Bitwarden app and downloaded and reinstalled from the App Store and I got 2023-10 and now everything works great. You do have to go in the settings and change timeout to never again tho.
@jidanni commented on GitHub (Nov 6, 2023):
No update if you are an Android beta tester.Beta update arrived 2023/11/09 . Good.
@Swap-File commented on GitHub (Nov 8, 2023):
Fixed as of yesterday on Android.
@LPFchan commented on GitHub (Nov 9, 2023):
This issue has been bugging me for quite a while now, happy to report both opening the app AND autofill behaviour returned to normal. but I had to disable
Unlock with Face IDin order for vault timeout option to be respected. Perhaps the toggle should be disabled when the timeout is set toNever?@cdonovan commented on GitHub (Nov 14, 2023):
This is still occurring for me with 2023.10.0 on Android. I completely uninstalled the app to be sure there were no old configurations messing it up. The frequency of needing to unlock has decreased but I still see it at least once a day. Should I report this as a new bug or continue investigating/providing logs here?
@escape0707 commented on GitHub (Nov 14, 2023):
Turn off biometric unlock and try again.
@cdonovan commented on GitHub (Nov 14, 2023):
Thanks for tip! I guess that follows the same mechanism as the noted Face ID comment above mine. Just disabled the biometric unlock - will see how it goes 🤞.