summaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2015-01-23Bail out ddocs installation if the path doesn't exist. Fix: #66710.6.4Kali Kaneko
Conflicts: common/MANIFEST.in
2014-12-15Merge remote-tracking branch 'drebs-github/bug/6500_fix-deferred-enc-dec' ↵Kali Kaneko
into release/0.6.x
2014-12-15Fix deferred enc/dec params and fallback (#6500).drebs
2014-12-11Merge branch 'release-0.6.2' into release/0.6.x0.6.2drebs
2014-12-11Fix incorrect ssl context setupKali Kaneko
The changes introduced in aafa79c0f5 having to do with the cert verification are incorrect, regarding the use of the newest ssl context api introduced in python 2.7.9. There the use of the server setup was taken, instead of the correct client options. I hereby apologize for the insuficient testing on that fix. It happens that I wrongly tested in an evironment that did the fallback to pre-2.7.9 interpreter.
2014-12-08Merge branch 'release-0.6.1' into release/0.6.x0.6.1drebs
2014-12-08Fold in changes.drebs
2014-12-05fix ssl negotiationKali Kaneko
since ssl.SSLContext does not exist prior to python 2.7.9
2014-12-05Use SSL negotiation.Kali Kaneko
Although the API can be misleading, PROTOCOL_SSLv23 selects the highest protocol version that both the client and server support. Despite the name, this option can select “TLS” protocols as well as “SSL”. In this way, we can use TLSv1.2 (PROTOCOL_TLSv1 will *only* give us TLS v1.0) In the client side, we try to disable SSLv2 and SSLv3 options explicitely. The python version in wheezy does not offer PROTOCOL_TLSv1_2 nor OP_NO_SSLv2 or OP_NO_SSLv3 (It's new in 2.7.9)
2014-12-05Enclose server initscript variables in curly brackets.drebs
2014-12-05Run daemon as user soledad (#6436).drebs
2014-12-05Enforce TLSv1 in soledad server (#6437).drebs
2014-12-05force tls v1 in soledad client. Partially fixes #6437Kali Kaneko
2014-07-18Merge branch 'release-0.6.0'0.6.0Tomás Touceda
2014-07-18Fold in changesTomás Touceda
2014-07-11Merge branch 'feature/encdb_splitted_drebs' into developKali Kaneko
2014-07-10Pin PyOpenSSL dep to avoid uneeded deps (#5368).drebs
2014-07-10Fix recovery from failed sync.drebs
2014-07-09Close all connections after syncing (#5518).drebs
2014-07-08Stop syncers when closing soledad.drebs
2014-07-08Fix common exception handling gotchas.drebs
2014-07-08Add doc for syncers dictionary.drebs
2014-07-08Add spam script for profiling.drebs
2014-07-08Fix tests according to modified sync.drebs
2014-07-08Stop the target when exceptions occur.drebs
2014-07-08Fix sqlcipher db syncing property.drebs
2014-07-08Update target sync with sequential info (#5869).drebs
2014-07-03Properly stop sync and cancel threads on fail.drebs
2014-07-02Add changes files.drebs
2014-07-02Split tests and fix for new sync (#4710).drebs
2014-07-02Split sync_exchange into many requests (#5517).drebs
2014-07-02Decouple sync from actual encryption/decryption (#5326).drebs
2014-06-27Merge branch 'master' into developTomás Touceda
2014-06-18Merge remote-tracking branch 'refs/remotes/kali/bump-requirements' into developTomás Touceda
2014-06-18bump requirements to latest leap.commonKali Kaneko
this is needed due to the introduction of new events.
2014-06-09Merge remote-tracking branch ↵Tomás Touceda
'refs/remotes/drebs/feature/add-profiling-scripts' into develop
2014-06-09Add profiling scripts.drebs
2014-06-06Merge branch 'release-0.5.2'0.5.2Tomás Touceda
2014-06-06Fold in changesTomás Touceda
2014-06-05Merge remote-tracking branch ↵Tomás Touceda
'refs/remotes/drebs/bug/5739_fix-multipart-put-problem-2' into develop
2014-06-05Add missing doc.drebs
2014-06-05Reorganize profiling scripts.drebs
2014-06-05Move the syncing lock to inside SQLCipherDatabase.drebs
2014-06-05Reset synchronizer state in order to reuse the same synchronizer multiple times.drebs
2014-06-05Add changes file.drebs
2014-06-05Make server auth time-insensitive.drebs
2014-06-05Replace client sync state by a sync_id.drebs
2014-06-05Remove close_connections() from tests.drebs
2014-06-03Add password option to client db script.drebs
2014-06-03Fix package build script.drebs