summaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2017-03-02[test] improve twistd startup and terminationdrebs
- use subprocess.check_call() to ensure any errors during twistd startup will properly show up on test reports. - use SIGTERM instead of SIGKILL to gracefully terminate twistd.
2017-03-02[test] mark benchmark tests using their group namesdrebs
2017-03-02[test] bugfix: actually use an empty local db in download benchmarksdrebs
We were previously not using an empty local db for download benchmark tests, so there was actually nothing to sync. This commit fixes that by adding a way to force an empty local db on soledad client instantiation.
2017-03-02[test] use new way of indicating the tcp port for twisted webdrebs
2017-03-02[test] fix test_sync_target for error handlingVictor Shyba
It needs a defer.Deferred
2017-03-02[bug] handle error onceVictor Shyba
Handle it only if self.deferred wasnt called yet, otherwise that's just an out-of-sync call from a scheduled deferred. Since it was already logged, it's ok to ignore.
2017-03-02[bug] fix shared database initializationdrebs
2017-02-27[style] move path config closer to blobs resource instantiationdrebs
2017-02-27[feat] add configurable blobs path in serverdrebs
- Resolves: #8777
2017-02-25[bug] save client secret downloaded from remote storagedrebs
After refactor, the client secret bootstrap logic was flawed, and remote secret was not being saved properly. This commit fixed that and tries to improve the bootstrap code to make it more clear.
2017-02-25[bug] remove unused named tuple from client secretsdrebs
2017-02-25[refactor] improve secret bootstrap code and docdrebs
2017-02-25[doc] improve doc and rename EmitMixin to UserDataMixindrebs
2017-02-25[refactor] pass soledad object to client secrets apidrebs
In order to be able to change passphrase, token and offline status of soledad from the bitmask client api, the secrets api also has to be able to use up-to-date values when encrypting/decrypting secrets and uploading/downloading them to the server. This commit makes public some soledad attributes that were previously "private" (i.e. used to start with "_" and were not meant to be accessed from outside), and passes the whole soledad object to the client secrets api. This makes the code cleaner and also allows for always getting newest values of soledad attributes.
2017-02-23[refactor] remove syncable property from shared dbdrebs
2017-02-23[feature] add offline status to soledad client apidrebs
2017-02-23[feat] avoid client sync if no token is setdrebs
2017-02-23[refactor] use get_token in client secrets apidrebs
2017-02-23[refactor] add EmitMixin for a cleaner emitting experiencedrebs
2017-02-23[refactor] remove creds from client apidrebs
2017-02-17[bug] reuse wsgi threadpoolKali Kaneko
it seems evident that the functions were thought to pass a threadpool along, but it finally wasn't properly passed and so there was a new threadpool created to handle every resource. I have removed the creation from the factory because I don't think it makes sense to create a threadpool on the fly, it's prone to errors. - Resolves: #8774
2017-02-17[refactor] create resources only onceKali Kaneko
it doesn't make sense to create the resources for every request, we can reuse the same resource and create it in the constructor. - Resolves: #8770
2017-02-16[docs] add crypto preamble to changelogKali Kaneko
2017-02-16[style] add deprecation warning on legacy decoderVictor Shyba
2017-02-16[feature] add doc size to preambleVictor Shyba
That's necessary for blobs-io. Current code includes backwards compatibility branching and tests, which shall be removed on next releases.
2017-02-15[tests] add tests for preamble encodingVictor Shyba
2017-02-15[style] pep8Victor Shyba
2017-02-15[tests] fix testsKali Kaneko
2017-02-15[docs] add a to-do about perfKali Kaneko
2017-02-15[feature] add robots.txtKali Kaneko
-Resolves: #6178
2017-02-15[feature] authenticate as anonymous if no token in headerKali Kaneko
and serve / banner and robots to anon users. instead of returning 401 for all cases, I treat the unauthenticated case as a special case, and switch the service tree apart. this allows to serve a different resource tree to unauthenticated users. the new URLs are registered with the mapper. I don't really like that dependency, could be handled by twisted alone, but meh. - Resolves: #8764
2017-02-15[pkg] restart service instead of starting itKali Kaneko
2017-02-15[feature] add version to the bannerKali Kaneko
2017-02-15[bug] add expected attribute to authentication wrapper in entrypointKali Kaneko
the authentication wrapper is goin to look for the _credentialFactories attribute. it will raise an exception if not found - Resolves: #8766
2017-02-13[pkg] add build-deb.sh scriptdrebs
2017-02-13[pkg] fail on errorsKali Kaneko
2017-02-13[pkg] add script for deploying from gitKali Kaneko
- Resolves: #8765
2017-02-13[bug] fix typo, againKali Kaneko
2017-02-13[bug] fix import typo on create-user-dbKali Kaneko
2017-02-13[tests] conf format changed, no more nestingVictor Shyba
2017-02-13[tests] server parameter is gone, patch the moduleVictor Shyba
2017-02-13[bug] get a new server instance on each request to the tokens dbKali Kaneko
2017-02-12[refactor] update create-user-db script to use config refactorKali Kaneko
2017-02-10[bug] fix config handling after refactorKali Kaneko
2017-02-10[bug] revert loading from the wsgi entrypointKali Kaneko
2017-02-10[pkg] use the entrypoint from the systemd script tooKali Kaneko
2017-02-10[bug] effectively load the configuration for the appKali Kaneko
the code for passing the configuration to the couch initialization was never called. it seems the entrypoint module wasn't finally hooked as expected. I think this fixes the problem, but further review is needed here: either the entrypoint module is to be used, or it better is removed. in the first case, this workaround probably needs to be reverted.
2017-02-10[bug] fix import for the session moduleKali Kaneko
2017-02-10[bug] fix typo in the resource pathKali Kaneko
2017-02-09[docs] add changelog-next fileKali Kaneko