summaryrefslogtreecommitdiff
path: root/service/test/unit/bitmask_libraries
AgeCommit message (Collapse)Author
2017-01-19Add copyright statements to all Python files that doesn't have itOla Bini
2017-01-10Check if key is synchronized with server at every loginTulio Casagrande
This is a temporary solution when uploading a regenerated key fails. It's going to attempt the upload again on the subsequent logins. The drawback with this solution, is that the fetch remote can increase the login time, specially with multiple users. See: #815
2017-01-10Fix regenerate keys test flowTulio Casagrande
The regenerate key test was not checking if the UploadKeyError exception was raised Related with: #815
2017-01-09Log user's current key for easier debugTulio Casagrande
Related with: #815
2017-01-02[#851] minor refactoring, and using the right keymanager branchNavaL
2017-01-02[#850] refactoring as a result of moving should_renew to be in keyNavaL
2017-01-02[#850] keys will now be renewed two months before expiry dateNavaL
2017-01-02[#815] regenerating new keys when the current one expiresNavaL
2017-01-02[#815] regenerating new keys when the current one expiresNavaL
2016-11-23replace stdlib's unittest with trials's unittest for all unittestRoald de Vries
2016-10-28Fixing Authentication imports #795NavaL
2016-10-26Adds real authenticationDenis Costa
We also did some refactoring in order to have things working. #795
2016-10-26Moving authentication out of login_resourceBruno Wagner
This is ongoing work to be able to accept and validate user domain on login (so the user can use <username> or <username@domain.com>) We are extracting the authentication logic from login_resource to be able to test and cover the cases we need
2016-09-23Replace SRPSession usages with bonafideTulio Casagrande
In order to replace leap_auth with bonafide, we created a class to hold the user credentials
2016-09-13[#778] Handling case of failed key uploadTulio Casagrande
If we get any problem with the upload of the user's public key, we are deleting the key pair from the local database and denying login. That way, a new login will have a chance to regenerate the key and upload it properly.
2016-09-13[#778] Isolated and fixed keymanager testsTulio Casagrande
We covered a lot of missing cases on the keymanager tests. We also isolated these tests, that caused some other tests to break, so we fixed them.
2016-09-08[#778][Test] Don't send an existing public keyTulio Casagrande
I added a new test to check that an existing public key is not being sent to leap on every login
2016-08-30[#765] Move combined certificates to the leap folderTulio Casagrande
Since we are creating the combined certificates at the beginning of the UA and using it for multiple users, it makes more sense to create it in the leap folder instead of on a temporary file This bundle will be updated on every UA start
2016-08-29[#765] Move combined_ca_bundle to UA initializationTulio Casagrande
With this change we don't have to create the combined_ca_bundle for every user at every login. To support this change, we started migrating away from the LeapCertificate class that was making the LeapProvider setup more brittle
2016-08-19Started deferring leap session creation #759Bruno Wagner
Started adapting get_leap_session to deferreds Soledad and keymanager setup calls will now happen in deferreds and leap session creation itself is a deferred with callbacks This is a start in breaking the big blocking calls we were doing on the main thread, this was done without changing code inside the leap libraries yet so things can be further optimized This breaks the ~4 seconds get_leap_session piece into smaller 1 seconds one, that can be further optimized and deferred to even smaller calls There are requests calls happening on the main thread that should get this number even further down Also moved some pieces from bitmask libraries to our bootstrap, because they are not bitmask libraries anymore and that was causing confusion
2016-06-24Issue #694 add an admin restricted resource for user statsNavaL
2016-06-07Update keymanager calls due api updateCaio Carrara
Some keymanager api was updated, so we needed to update some calls.
2016-05-31Remove unused session_idTulio Casagrande
2016-04-04Migrate ImapAccount to AccountTulio Casagrande
Migrate all usage of leap.ImapAccount to leap.Account We had to adapt some calls because of signature changes and, because we need the Account to be initialized before moving on, we are directly using the deferred initialization that the account has See: https://github.com/leapcode/leap_mail/pull/228
2016-02-24Recreate session on soledad problemsFolker Bernitt
- Issue #615 - invalid token raised by soledad after timeout, if we see this, recreate the session on next login
2016-02-23Only do initial sync on session creationFolker Bernitt
- Issue #615 - Fixed some long broken but not failing tests
2016-02-12mocking all paths to existsNavaL
Issue #604
2016-02-11Redownload SMTP certficates if necessaryFolker Bernitt
- Issue #591 - using leaps should_redownload for check
2016-02-10Download SMTP client certificate, not VPN oneFolker Bernitt
- Issue #591
2016-02-09Close account on session closeFolker Bernitt
- Issue #586
2016-02-09Small fix to wrap entire KeyManager in test_nicknym.pyFolker Bernitt
2016-02-08mocking register/unregister key generation event, on closeNavaL
- fixing build Issue #586
2016-02-05closing the services closes leap session, which stops background tasks, ↵NavaL
close soldedad and remove it from cache Issue #586
2016-02-01Fix unit testsGiovane
2016-01-29Fix: Only act on generated keys for current userFolker Bernitt
- Issue #587
2015-11-06Refactor - Removed class SoledadSessionJefferson Stachelski
The SoledadSession class was removed and some methods implemented there was moved to LeapSessionFactory and LeapProvider
2015-11-04Issue #499 - removed the local SMTPJefferson Stachelski
2015-11-04Instantiate new MailSender in ServicesFolker Bernitt
- Issue #499 - Some smaller refactorings - Extract smtp cert download to own class
2015-11-03Issue #499 Moved remote smtp configurationBruno Wagner
We removed the common parts from the bitmask libraries smtp and adapted the tests. We also advanced the new mail sender implementation, but it is coupled to the twisted.mail.smtp.User currently and we need to adapt leap mail to remove this dependency
2015-10-27Moves welcome mail logic inside LeapSessionGiovane
2015-10-12Move SOLEDAD_INVALID_AUTH_TOKEN listner to outermost user agent startFolker Bernitt
- Issue #485 - Problem was that register starts ZMQ without a session every time soledad is used - This reverts commit 36b9261f609901b83da4f8915640eb6043530f01
2015-10-09adds a listener for SOLEDAD_INVALID_AUTH_TOKENVictor Shyba
--Issue #485
2015-10-09fixes test that wasnt runningVictor Shyba
2015-09-21Add more description on fingerprint missmatch errorFolker Bernitt
- See 660e0d9de
2015-09-16Moved account to after sync function #458Bruno Wagner
Imap account creation was firing post sync hooks and that was trying to use the mailboxes that were not synced yet. Just moved that for the after sync together with the incoming mail fetcher
2015-09-16Fixed duplicate document error on reruns #458Bruno Wagner
Setting up the incoming mail fetcher checked for an INBOX before the first sync, that created an INBOX on every new machine and when you removed the leap folder. We moved that right after the initial sync, along the generation of the OpenPGP keys and adapted the tests
2015-09-16Add fingerprints to exception on mismatchFolker Bernitt
2015-08-30[tests] Soledad have no plans of readding thisVictor Shyba
need_sync is not part of api anymore and will not be any time sooner. Removing unnecessary skipped test.
2015-08-11Added mail_store to LeapSession.Folker Bernitt
- Issue #420
2015-08-11Added some calls to super for tests based on test_abstract_leap.py.Folker Bernitt