summaryrefslogtreecommitdiff
path: root/service/pixelated/config
AgeCommit message (Collapse)Author
2017-02-14Revert "Revert "[#888] Fix soledad class contract to be compatible with new ↵Anike Arni
merge. with @thaissiqueira."" This reverts commit 1e6e165a3fc397e45884eaec1122ba0cc5ff923e.
2017-02-07[#952] Get rid of extra empty line on unhandled errorsTulio Casagrande
2017-02-07[#952] Log events even when formatting errors occurTulio Casagrande
2017-02-07[#952] Access log_format key correctly even if it's NoneTulio Casagrande
This is the case of the infamous 'Unhandled error in Deferred' events that were not logging the traceback.
2017-01-21Remove old UploadKeyError testTulio Casagrande
I was surprised this test was not working correctly.
2017-01-21Re-raise the same exception to keep contextTulio Casagrande
2017-01-21Make registering of events for fresh accounts a bit more robust by replacing ↵Ola Bini
the old events if they were not cleaned up after previous errors
2017-01-20Rebase previous PR on current master - see PR #915 for detailsOla Bini
2017-01-19Add copyright statements to all Python files that doesn't have itOla Bini
2017-01-17[#885]Encodes user_uuid and passphrase to allow utf-8 characteresThais Siqueira
with @tayanefernandes
2017-01-12Re-raise the exception after closing the sessionTayane Fernandes
We were trying to setup services even after closing the session. We fixed it and added unit test. Related with: #815
2017-01-11Close session when UploadKeyError occursTayane Fernandes
When the upload of the user key fails (i.e. Timeout), the session was being held in memory, preventing the user from trying again. Related with: #815, #889
2017-01-05Revert "[#888] Fix soledad class contract to be compatible with new merge. ↵Anike Arni
with @thaissiqueira." This reverts commit ebdeec4ad6d0f91bc60fd34a580fc02787026692.
2017-01-04[#888] Fix soledad class contract to be compatible with new merge. with ↵Anike Arni
@thaissiqueira.
2016-12-06[#862] setting gnupg loglevel to warningsNavaL
2016-11-04[#795] fixed missing yield on authenticate in leap initialize for activist modeNavaL
2016-11-03 [#792] fix pixelated-registerNavaL
2016-10-28removing obsolete Leap_password_checker #795NavaL
2016-10-28Fixing Authentication imports #795NavaL
2016-10-28authentication now returns AuthenticationNavaL
leap session creation is only done post-interstitial and that logic is also extracted into its own class #795
2016-10-26Adds real authenticationDenis Costa
We also did some refactoring in order to have things working. #795
2016-10-26Moving authentication out of login_resourceBruno Wagner
This is ongoing work to be able to accept and validate user domain on login (so the user can use <username> or <username@domain.com>) We are extracting the authentication logic from login_resource to be able to test and cover the cases we need
2016-10-19Adapted logging in the UA to use twisted.loggerBruno Wagner
2016-10-18Adapted imports to reflect new bitmask-dev dependencyBruno Wagner
2016-10-11[#792] Move leap.bonafide to leap.bitmask.bonafideTulio Casagrande
2016-10-10 setting Leapsssion.is_closed only when all services/dependencies are closedNavaL
2016-10-05Setup twisted logger and formatterTulio Casagrande
2016-10-05Changed to new twisted logging systemTulio Casagrande
This was storing loglines and references of the objects until a beginLoginTo was called. We moved to the new logger and added the beginLoginTo line.
2016-09-28remove private key from [gnupg] logs the right wayRoald de Vries
2016-09-26[#668] Moved user folder under pixelated subfolderTulio Casagrande
2016-09-26rearranged leap session creation to not sync nor setup account/fetcher, when ↵NavaL
using the cache Issue #773
2016-09-23[#668] Put search index under pixelated subfolderTulio Casagrande
2016-09-23Replace SRPSession usages with bonafideTulio Casagrande
In order to replace leap_auth with bonafide, we created a class to hold the user credentials
2016-09-21add manhole option to user agentRoald de Vries
2016-09-12Implements bonafide to replace leap.authBruno Wagner
This still uses the SRPSession object to hold the credentials so we don't have to adapt the rest of the user agent code
2016-09-08Logging out a logged out user was breaking the UABruno Wagner
In case a user was being logged out and there's a soledad invalid auth token error, there might be an inconsistent state where the user session doesn't exist when this second logout is tried. This was breaking the login for that user until the next UA restart, I adapted the code to make logging out an user idempotent to prevent this corner case
2016-08-29[#765] Move combined_ca_bundle to UA initializationTulio Casagrande
With this change we don't have to create the combined_ca_bundle for every user at every login. To support this change, we started migrating away from the LeapCertificate class that was making the LeapProvider setup more brittle
2016-08-26[Denis/Tulio][#769] Fix activist mode initializationTulio Casagrande
2016-08-24[#762] Remove smtp-service download from session creationTulio Casagrande
SMTP json is a blocking HTTP request that was taking ~1 sec of the session creation. We moved it to the UA initialization
2016-08-23Fixed leap home default home to use expand_pathBruno Wagner
In some cases, the default home was not expanding the user part of the path and was causing errors, now we make sure the path is expanded when setting the default value
2016-08-23Changes soledad json download orderBruno Wagner
Soledad json must only be downloaded after we fetch the api provider certificate, we can't make the request for it before having this cert
2016-08-19Started deferring leap session creation #759Bruno Wagner
Started adapting get_leap_session to deferreds Soledad and keymanager setup calls will now happen in deferreds and leap session creation itself is a deferred with callbacks This is a start in breaking the big blocking calls we were doing on the main thread, this was done without changing code inside the leap libraries yet so things can be further optimized This breaks the ~4 seconds get_leap_session piece into smaller 1 seconds one, that can be further optimized and deferred to even smaller calls There are requests calls happening on the main thread that should get this number even further down Also moved some pieces from bitmask libraries to our bootstrap, because they are not bitmask libraries anymore and that was causing confusion
2016-08-19Normalizing single and multi user bootstrap #759Bruno Wagner
Consolidated authentication to always be done is a defer to thread and changed the authenticate_user method name to conform with what it actually does
2016-06-24Issue #694 add an admin restricted resource for user statsNavaL
2016-06-23refactoring: renaming services factory methods to relate them to user ↵NavaL
services sessions
2016-06-23refactoring: moved Service factories to the service config fileNavaL
2016-05-12Update ssl arguments descriptionCaio Carrara
The previous description were mentioning dispatcher use, but since we don't use it anymore, they were changed to refer to server-mode.
2016-05-12 we still need the ssl arguments, even in no-dispatcher-modeChristoph Kluenter
2016-05-11Remove dispatcher references from serviceCaio Carrara
Since we're not using dispatcher anymore, it doesn't make sense to keep dispatcher references and program flows that depend on it. For example, it doesn't make sense keep the flag --organization-mode, so it was removed as well.
2016-02-24Recreate session on soledad problemsFolker Bernitt
- Issue #615 - invalid token raised by soledad after timeout, if we see this, recreate the session on next login