summaryrefslogtreecommitdiff
path: root/src/leap/bitmask/core
diff options
context:
space:
mode:
authorKali Kaneko (leap communications) <kali@leap.se>2016-12-15 09:03:39 +0100
committerKali Kaneko (leap communications) <kali@leap.se>2016-12-29 03:10:00 +0100
commit5481d60a470cd70be5a96b4e674987f41b4481b7 (patch)
treee1d58bae5e4c0f74790b2693966670631d248b56 /src/leap/bitmask/core
parente763ad3451eecfb2c6c6724ac31e0a2f93d4b266 (diff)
[docs] fix typos
Diffstat (limited to 'src/leap/bitmask/core')
-rw-r--r--src/leap/bitmask/core/_session.py12
1 files changed, 5 insertions, 7 deletions
diff --git a/src/leap/bitmask/core/_session.py b/src/leap/bitmask/core/_session.py
index 24070a82..9b22f154 100644
--- a/src/leap/bitmask/core/_session.py
+++ b/src/leap/bitmask/core/_session.py
@@ -33,15 +33,15 @@ logger = Logger()
class SessionService(HookableService):
"""
- This service holds random local-session tokens, that will be use to protect
- the access to the API resources.
+ This service holds random local-session tokens, that will be used to
+ protect the access to the API resources.
These tokens are different from the (remote) SRP session tokens: the
- local-session tokens are ephimeral and generated by the local Bitmask
- deamon.
+ local-session tokens are also ephemeral, but generated by the local Bitmask
+ daemon.
Right now, they are generated when a soledad instance is successfully
- created. This might be subject to further discussion, but this is the
+ created. This might be subject to further discussion, but this is the
earliest moment in which we can decide if a user should be authenticated
locally: it means that the entered password is able to decrypt the local
store. In this way, we can protect the API resources even in the case that
@@ -65,6 +65,4 @@ class SessionService(HookableService):
def hook_on_new_soledad_instance(self, **kw):
user = kw['user']
session_token = binascii.hexlify(os.urandom(10))
- print '---------------------------------------------------'
- print "hook on new soledad instance!", user, session_token
self._tokens[user] = session_token