summaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2016-03-04add TODO about possible refactorKali Kaneko (leap communications)
2016-03-04fix hardcoded basedir pathKali Kaneko (leap communications)
2016-03-04reorder class for readabilityKali Kaneko (leap communications)
2016-03-04hide srpauth implementation detailsKali Kaneko (leap communications)
2016-03-04add a couple of tbdKali Kaneko (leap communications)
2016-03-04remove unneeded try/exceptKali Kaneko (leap communications)
2016-03-04fix extra debug lineKali Kaneko (leap communications)
2016-03-04fix hardcoded ca pathKali Kaneko (leap communications)
2016-03-04move decorator to sessionKali Kaneko (leap communications)
2016-03-04use leap.common.service_hooksKali Kaneko (leap communications)
2016-03-02allow to notify multiple hooksKali Kaneko (leap communications)
2016-03-01fix provider config checkKali Kaneko (leap communications)
2016-03-01return deferred for userKali Kaneko (leap communications)
2016-02-29[feat] use fingerprint instead of key_id to address keysRuben Pollan
2016-02-28[bug] Use the right succeed function for passthrough encrypted emailRuben Pollan
- Resolves #7861
2016-02-25get active userKali Kaneko (leap communications)
2016-02-25remove ws serviceKali Kaneko (leap communications)
2016-02-25remove zmq tacfile, use coreKali Kaneko (leap communications)
2016-02-25[test] refactor key deletion testsRuben Pollan
2016-02-25[feat] update usage only if neededRuben Pollan
During encryption we where updating 'enc_used' in the key without checking if it was already set.
2016-02-25[doc] soledad docs fieldsRuben Pollan
- Resolves: #7712
2016-02-25[feat] Make EncryptionKey aware of the active addressRuben Pollan
2016-02-25[test] add updater testsRuben Pollan
2016-02-25[feat] Use fingerprints instead of key idsRuben Pollan
- Resolves: #7500
2016-02-25[feat] Migrate soledad documents by adding versioning fieldRuben Pollan
- Resolves: #7713
2016-02-25[feat] move validation, usage and audited date to the active documentRuben Pollan
- Resolves: #7485
2016-02-23Merge branch 'feat/async_gpg' into developRuben Pollan
2016-02-23[feat] defer decrypt, gen_key and encryptVictor Shyba
This commit put those gnupg operations to be run on external threads limited by the amount of cores present on user machine. Some gnupg calls spawn processes and communicating to them is a synchronous operation, so running outside of a reactor should improve response time by avoiding reactor locking.
2016-02-17two-step bootstrap if needs authenticationKali Kaneko (leap communications)
2016-02-15provider service bootstrap and autodiscoveryKali Kaneko (leap communications)
2016-02-11[feat] Use cryptography instead of pycryptopp to reduce dependencies.Ruben Pollan
* Resolves: #7889
2016-02-11[feat] Remove debug from walkRuben Pollan
2016-02-09[style] fix pep8Ruben Pollan
2016-02-09Merge branch 'fix_tests' into developRuben Pollan
2016-02-09[style] fix pep8Ruben Pollan
2016-02-09[tests] fix missing pycryptopp dependency and mock async callsFolker Bernitt
- leap_mail still uses pycryptopp and therefore still needs the dependency - Keymanager calls to async HTTPClient had not been mocked, causing a test to fail - fixed a pep8 warning
2016-02-08Merge branch 'verify_signature' into developRuben Pollan
2016-02-08[feat] Validate signature with attachmentsGiovane
- Create a new Generator that doesn't trim the headers - Extract detached signature from message - Convert message to the body an attachments level - Add coment to the generator workaround and shows which python version has the patch
2016-02-04Merge branch 'feat/defer_requests' into developRuben Pollan
2016-02-04[docs] add docstrings and fixes pep8Victor Shyba
Some methods were missing docstrings and some code was exceeding the 80 column limit. Also some asserts arent needed anymore.
2016-01-29[feat] use HTTPClient instead of requestsVictor Shyba
This commit adapts code to use HTTPClient instead of requests. requests library receives a certificate as parameter during requests while HTTPClient recelives a cert only on constructor. In order to have both types (leap cert and commercial certs) working together we introduced two clients on constructor.
2016-01-27[refactor] isolate requestsVictor Shyba
Isolate requests lib related code and update docstrings.
2016-01-27[feat] defer blocking requests calls to threadVictor Shyba
That's a temporary fix for #6506 This commit adapts code to deal with deferreds coming from calling requests from Twisted. Next step is just to change requests for twisted http client present in leap.common. Unfortunately, this last step will be a bit longer and would be better to have integrations tests to ensure current HTTP behaviour.
2016-01-21[feat] Verify plain text signed emailGiovane
- Extract message serialization to a method - Add new condition to verify signature on plain text mail - Return InvalidSignature if cannot verify
2015-12-21[tests] make tests use dummy authenticationKali Kaneko
2015-12-18[feat] cred authentication for SMTP serviceKali Kaneko
2015-12-16add command to download smtp certificateKali Kaneko (leap communications)
2015-12-15[style] pep8Kali Kaneko
2015-12-15[docs] add entry about cred-based token authentication to next-changelogKali Kaneko
2015-12-15[fix] dummy credentials for testsKali Kaneko
imap tests must be adapted, using a dummy credential checker.