summaryrefslogtreecommitdiff
path: root/client/src/leap
AgeCommit message (Collapse)Author
2017-04-04[feature] improve error messages on preamble checkVictor Shyba
2017-04-04[bug] check status code on uploadVictor Shyba
2017-04-04[feat] use pinned token agent in client blobsdrebs
2017-04-04[feature] add a treq-based http client to soledad clientdrebs
2017-04-04[feature] add a tls-pinned, token-authenticated http agentdrebs
2017-04-04[feat] add token auth to blobs clientdrebs
2017-04-04[doc] remove excessive signal doc from client apidrebs
2017-04-04[feat] improve blobs standalone testing optionsdrebs
2017-04-04[test] BlobManager encrypt testVictor Shyba
2017-04-04[feature] unarmored incremental blobs decryptVictor Shyba
2017-04-04[feature] send tag header from serverVictor Shyba
2017-04-04[feature] incremental decrypterVictor Shyba
2017-04-04[feature] ascii armor disable optionVictor Shyba
2017-04-04[bug] fix loose ends on _crypto and testsVictor Shyba
2017-04-04[style] pep8 fixesVictor Shyba
2017-04-04[bug] fix blobs putdrebs
2017-04-04[bug] handle case when blob is not found in serverdrebs
2017-04-04[refactor] improve logging and manual testing of blobsdrebs
2017-04-04[doc] add license header to _blobs.pydrebs
2017-04-04[style] pep8 fixesdrebs
2017-04-04[bug] use rowid to insert blob in sqlcipherdrebs
2017-04-04[feature] close mvp loop with clientKali Kaneko
2017-04-04[feature] enable simple obfuscation of blob size in preambleKali Kaneko
use a powers of two ceiling for the reported size in the preamble. for this to be effective against a passive adversary, cover traffic should be used in the uploads too. This is just a first-stop measure; proper research should be done to determine a good tradeoff between avoiding information leakage and saving some storage and bandwidth.. - Documentation: #8759 - Related: #8759
2017-04-04[feature] save blob to db, incrementallyKali Kaneko
2017-04-04[feature] add attribute to keep blob cryptoKali Kaneko
2017-04-04[refactor] refactor crypto api to better allow streamingKali Kaneko
Motivation is that I need to pass partial data to the decryptor, mainly.
2017-04-04first implementation of client blobsKali Kaneko
2017-03-31[feature] raise earlier when deleting NoneVictor Shyba
If an application tries to delete None, by accident, raising earlier would help to show the caller stack trace instead of inner sqlite backend stack and make the error more friendly. - Resolves: #8791
2017-03-23[feature] generate recovery codeAnike Arni
with @tayane
2017-03-17[refactor] Improve python3 compatibilityefkin
With this commit all tests on py34 tox environment are collected.
2017-03-13[docs] explain sync bypass due lack of tokenVictor Shyba
2017-03-13[feat] make database creation appear in logsdrebs
2017-03-13[bug] remove offline flagdrebs
The offline flag is not needed and rendered the soledad client prone to bugs because it would need to be toggled and that is succeptible to timing problems.
2017-03-13[bug] fix raising of invalid auth token errordrebs
2017-03-09[bug] secrets version defaults to v1Tulio Casagrande
2017-03-09[bug] add default version when decrypting secretsTulio Casagrande
Resolves: https://0xacab.org/leap/soledad/issues/8788
2017-03-02[bug] handle error onceVictor Shyba
Handle it only if self.deferred wasnt called yet, otherwise that's just an out-of-sync call from a scheduled deferred. Since it was already logged, it's ok to ignore.
2017-03-02[bug] fix shared database initializationdrebs
2017-02-25[bug] save client secret downloaded from remote storagedrebs
After refactor, the client secret bootstrap logic was flawed, and remote secret was not being saved properly. This commit fixed that and tries to improve the bootstrap code to make it more clear.
2017-02-25[bug] remove unused named tuple from client secretsdrebs
2017-02-25[refactor] improve secret bootstrap code and docdrebs
2017-02-25[doc] improve doc and rename EmitMixin to UserDataMixindrebs
2017-02-25[refactor] pass soledad object to client secrets apidrebs
In order to be able to change passphrase, token and offline status of soledad from the bitmask client api, the secrets api also has to be able to use up-to-date values when encrypting/decrypting secrets and uploading/downloading them to the server. This commit makes public some soledad attributes that were previously "private" (i.e. used to start with "_" and were not meant to be accessed from outside), and passes the whole soledad object to the client secrets api. This makes the code cleaner and also allows for always getting newest values of soledad attributes.
2017-02-23[refactor] remove syncable property from shared dbdrebs
2017-02-23[feature] add offline status to soledad client apidrebs
2017-02-23[feat] avoid client sync if no token is setdrebs
2017-02-23[refactor] use get_token in client secrets apidrebs
2017-02-23[refactor] add EmitMixin for a cleaner emitting experiencedrebs
2017-02-23[refactor] remove creds from client apidrebs
2017-02-16[style] add deprecation warning on legacy decoderVictor Shyba