summaryrefslogtreecommitdiff
path: root/service/pixelated/bitmask_libraries
AgeCommit message (Collapse)Author
2017-07-25[pkg] packaging and path changesKali Kaneko
- move all the pixelated python package under src/ - move the pixelated_www package under the leap namespace - allow to set globally the static folder - add hours and minutes to the timestamp in package version, to allow for several releases a day.
2017-01-10Change the logger.info to logger.debugTayane Fernandes
Given that we don't need to expose the user fingerprint every time we login, we changed to log it only on debug mode. See #815
2017-01-10Check if key is synchronized with server at every loginTulio Casagrande
This is a temporary solution when uploading a regenerated key fails. It's going to attempt the upload again on the subsequent logins. The drawback with this solution, is that the fetch remote can increase the login time, specially with multiple users. See: #815
2017-01-09Log user's current key for easier debugTulio Casagrande
Related with: #815
2017-01-06Raise exception when sending a renerated key failsTulio Casagrande
We still need to figure out what to do when the upload fails. But we're already raising the exception, so we can track it on the logs See: https://github.com/pixelated/pixelated-user-agent/issues/815
2017-01-02Removes unused methodThais Siqueira
2017-01-02[#851] minor refactoring, and using the right keymanager branchNavaL
2017-01-02[#850] refactoring as a result of moving should_renew to be in keyNavaL
2017-01-02[#850] keys will now be renewed two months before expiry dateNavaL
2017-01-02[#815] regenerating new keys when the current one expiresNavaL
2017-01-02[#815] regenerating new keys when the current one expiresNavaL
2016-12-08Revert "[#801] Merge branch 'signup'"Roald de Vries
This reverts commit d10f607a4d40587510b0dc31b31fe4750bf4a3a3, reversing changes made to c28abba2f5b1186c671ebef508d40ffaae6d5bc5.
2016-11-11readabilityRoald de Vries
2016-10-19Adapted logging in the UA to use twisted.loggerBruno Wagner
2016-10-18Adapted imports to reflect new bitmask-dev dependencyBruno Wagner
2016-09-13[#778] Handling case of failed key uploadTulio Casagrande
If we get any problem with the upload of the user's public key, we are deleting the key pair from the local database and denying login. That way, a new login will have a chance to regenerate the key and upload it properly.
2016-09-13[#778] Renaming get_key to be consistent with keymanagerTulio Casagrande
2016-09-08Only send public key if a new key was generatedBruno Wagner
We were always sending the public key to nicknym, even if it was already there. The send_key method purpose is to update the public key in case a new pair is created and shouldn't be done at every login
2016-08-30[#765] Move combined certificates to the leap folderTulio Casagrande
Since we are creating the combined certificates at the beginning of the UA and using it for multiple users, it makes more sense to create it in the leap folder instead of on a temporary file This bundle will be updated on every UA start
2016-08-29[#765] Move combined_ca_bundle to UA initializationTulio Casagrande
With this change we don't have to create the combined_ca_bundle for every user at every login. To support this change, we started migrating away from the LeapCertificate class that was making the LeapProvider setup more brittle
2016-08-24[#762] Remove smtp-service download from session creationTulio Casagrande
SMTP json is a blocking HTTP request that was taking ~1 sec of the session creation. We moved it to the UA initialization
2016-08-23Changes soledad json download orderBruno Wagner
Soledad json must only be downloaded after we fetch the api provider certificate, we can't make the request for it before having this cert
2016-08-19Started deferring leap session creation #759Bruno Wagner
Started adapting get_leap_session to deferreds Soledad and keymanager setup calls will now happen in deferreds and leap session creation itself is a deferred with callbacks This is a start in breaking the big blocking calls we were doing on the main thread, this was done without changing code inside the leap libraries yet so things can be further optimized This breaks the ~4 seconds get_leap_session piece into smaller 1 seconds one, that can be further optimized and deferred to even smaller calls There are requests calls happening on the main thread that should get this number even further down Also moved some pieces from bitmask libraries to our bootstrap, because they are not bitmask libraries anymore and that was causing confusion
2016-08-19Removed auth from leap session #759Bruno Wagner
Authentication is now consistently done before creating the leap session, so I removed the auth attempt from inside the leap session factory
2016-08-19Removed cert download from session creation #759Bruno Wagner
It is already done earlier in the bootstrap and is not user specific, so shouldn't be done on user bootstrap
2016-06-07Update keymanager calls due api updateCaio Carrara
Some keymanager api was updated, so we needed to update some calls.
2016-05-31Remove unused session_idTulio Casagrande
2016-04-13Issue #674: Update Account usage to pass user_idCaio Carrara
There is an update on leap_mail where an user id became required to create an Account. So, this change update the Account usage on user agent to pass this parameter.
2016-04-04Migrate ImapAccount to AccountTulio Casagrande
Migrate all usage of leap.ImapAccount to leap.Account We had to adapt some calls because of signature changes and, because we need the Account to be initialized before moving on, we are directly using the deferred initialization that the account has See: https://github.com/leapcode/leap_mail/pull/228
2016-02-24Create a new deferred for all IMAPAccount callsFolker Bernitt
- Issue #615 - IMAPAccount ctor reuses same instance for all accounts
2016-02-24Recreate session on soledad problemsFolker Bernitt
- Issue #615 - invalid token raised by soledad after timeout, if we see this, recreate the session on next login
2016-02-23Only do initial sync on session creationFolker Bernitt
- Issue #615 - Fixed some long broken but not failing tests
2016-02-11Redownload SMTP certficates if necessaryFolker Bernitt
- Issue #591 - using leaps should_redownload for check
2016-02-10Download SMTP client certificate, not VPN oneFolker Bernitt
- Issue #591
2016-02-09Close account on session closeFolker Bernitt
- Issue #586
2016-02-09Move sessions into SessionCacheFolker Bernitt
- Issue #586
2016-02-05closing the services closes leap session, which stops background tasks, ↵NavaL
close soldedad and remove it from cache Issue #586
2016-02-01Fix parameters order on _set_fresh_account #587Giovane
2016-01-29Fix: Only act on generated keys for current userFolker Bernitt
- Issue #587
2016-01-28making async setup user services after authNavaL
Issue #583
2016-01-22Fixed bug when tries download certJefferson Stachelski
It was rising an error when UA tried donwload the certificate and the directory that file will be create doesn't exist yet
2016-01-18Move soledad files to user folderFolker Bernitt
- Issue #576
2016-01-13Removed unused logging imports and fixed maintenance logger during testBruno Wagner
2016-01-13Generating keys message now uses logger instead of printBruno Wagner
2015-11-06Refactor - Removed class SoledadSessionJefferson Stachelski
The SoledadSession class was removed and some methods implemented there was moved to LeapSessionFactory and LeapProvider
2015-11-04Issue #499 - removed the local SMTPJefferson Stachelski
2015-11-04Instantiate new MailSender in ServicesFolker Bernitt
- Issue #499 - Some smaller refactorings - Extract smtp cert download to own class
2015-11-03Issue #499 Moved remote smtp configurationBruno Wagner
We removed the common parts from the bitmask libraries smtp and adapted the tests. We also advanced the new mail sender implementation, but it is coupled to the twisted.mail.smtp.User currently and we need to adapt leap mail to remove this dependency
2015-11-03Add new MailSender based on OutgoingMailFolker Bernitt
- Issue #499 - No longer needs local smtp port
2015-10-27Moves welcome mail logic inside LeapSessionGiovane