Age | Commit message (Collapse) | Author | |
---|---|---|---|
2017-04-04 | [refactor] list is remote_list, avoiding confusion | Victor Shyba | |
2017-04-04 | [feature] add listing to local blob db | Victor Shyba | |
2017-04-04 | [feature] add blobs listing | Victor Shyba | |
2017-04-04 | [refactor] adds a PreamblePipe for preamble download | Victor Shyba | |
Downloading until there is a space then splitting the content was a mess. Extracted this behaviour out of DecrypterBuffer into a new component so it eases testing by introducing a single responsibility class. | |||
2017-04-04 | [refactor] extracts tail logic into TruncatedTailPipe | Victor Shyba | |
2017-04-04 | [feature] use 409 status code for existing blob id | Victor Shyba | |
Raising was generating 500, which is a generic status code for server side errors. This commit adds proper status code of 409 while handling the error on client side by translating the code into a proper exception class. | |||
2017-04-04 | [refactor] simplify HTTPClient | Victor Shyba | |
2017-04-04 | [refactor] change size into a required parameter where it is necessary | Victor Shyba | |
2017-04-04 | [bug] copy returns a closed handle | Victor Shyba | |
copy call returns a closed file handler, instead we can query for the blob after insertion and use the returned file handle to be consumed for upload. A better solution would be to "pipe" the writes into the database into the upload, but that involves solving a larger set of issues to be done later. | |||
2017-04-04 | [feature] adds a close method for local blobs store | Victor Shyba | |
2017-04-04 | [feature] improve error messages on preamble check | Victor Shyba | |
2017-04-04 | [bug] check status code on upload | Victor Shyba | |
2017-04-04 | [feat] use pinned token agent in client blobs | drebs | |
2017-04-04 | [feature] add a treq-based http client to soledad client | drebs | |
2017-04-04 | [feature] add a tls-pinned, token-authenticated http agent | drebs | |
2017-04-04 | [feat] add token auth to blobs client | drebs | |
2017-04-04 | [doc] remove excessive signal doc from client api | drebs | |
2017-04-04 | [feat] improve blobs standalone testing options | drebs | |
2017-04-04 | [test] BlobManager encrypt test | Victor Shyba | |
2017-04-04 | [feature] unarmored incremental blobs decrypt | Victor Shyba | |
2017-04-04 | [feature] send tag header from server | Victor Shyba | |
2017-04-04 | [feature] incremental decrypter | Victor Shyba | |
2017-04-04 | [feature] ascii armor disable option | Victor Shyba | |
2017-04-04 | [bug] fix loose ends on _crypto and tests | Victor Shyba | |
2017-04-04 | [style] pep8 fixes | Victor Shyba | |
2017-04-04 | [bug] fix blobs put | drebs | |
2017-04-04 | [bug] handle case when blob is not found in server | drebs | |
2017-04-04 | [refactor] improve logging and manual testing of blobs | drebs | |
2017-04-04 | [doc] add license header to _blobs.py | drebs | |
2017-04-04 | [style] pep8 fixes | drebs | |
2017-04-04 | [bug] use rowid to insert blob in sqlcipher | drebs | |
2017-04-04 | [feature] close mvp loop with client | Kali Kaneko | |
2017-04-04 | [feature] enable simple obfuscation of blob size in preamble | Kali Kaneko | |
use a powers of two ceiling for the reported size in the preamble. for this to be effective against a passive adversary, cover traffic should be used in the uploads too. This is just a first-stop measure; proper research should be done to determine a good tradeoff between avoiding information leakage and saving some storage and bandwidth.. - Documentation: #8759 - Related: #8759 | |||
2017-04-04 | [feature] save blob to db, incrementally | Kali Kaneko | |
2017-04-04 | [feature] add attribute to keep blob crypto | Kali Kaneko | |
2017-04-04 | [refactor] refactor crypto api to better allow streaming | Kali Kaneko | |
Motivation is that I need to pass partial data to the decryptor, mainly. | |||
2017-04-04 | first implementation of client blobs | Kali Kaneko | |
2017-03-31 | [feature] raise earlier when deleting None | Victor Shyba | |
If an application tries to delete None, by accident, raising earlier would help to show the caller stack trace instead of inner sqlite backend stack and make the error more friendly. - Resolves: #8791 | |||
2017-03-23 | [feature] generate recovery code | Anike Arni | |
with @tayane | |||
2017-03-17 | [refactor] Improve python3 compatibility | efkin | |
With this commit all tests on py34 tox environment are collected. | |||
2017-03-13 | [docs] explain sync bypass due lack of token | Victor Shyba | |
2017-03-13 | [feat] make database creation appear in logs | drebs | |
2017-03-13 | [bug] remove offline flag | drebs | |
The offline flag is not needed and rendered the soledad client prone to bugs because it would need to be toggled and that is succeptible to timing problems. | |||
2017-03-13 | [bug] fix raising of invalid auth token error | drebs | |
2017-03-09 | [bug] secrets version defaults to v1 | Tulio Casagrande | |
2017-03-09 | [bug] add default version when decrypting secrets | Tulio Casagrande | |
Resolves: https://0xacab.org/leap/soledad/issues/8788 | |||
2017-03-02 | [bug] handle error once | Victor Shyba | |
Handle it only if self.deferred wasnt called yet, otherwise that's just an out-of-sync call from a scheduled deferred. Since it was already logged, it's ok to ignore. | |||
2017-03-02 | [bug] fix shared database initialization | drebs | |
2017-02-25 | [bug] save client secret downloaded from remote storage | drebs | |
After refactor, the client secret bootstrap logic was flawed, and remote secret was not being saved properly. This commit fixed that and tries to improve the bootstrap code to make it more clear. | |||
2017-02-25 | [bug] remove unused named tuple from client secrets | drebs | |