summaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2015-09-17Merge remote-tracking branch 'alster/feature/extra-signup-params'Azul
2015-09-17Merge remote-tracking branch 'alster/add-ci' into masterAzul
2015-09-17Allow extra signup params from accountkaeff
For the feature/invite-codes in leap_web, we need to be able to pass an extra parameter (the invite code) from the signup form to the server. This approach allows the consumer of SRP to specify a custom implementation of Account that returns arbitrary `loginParams`, and Session will pass them on so that they become part of the XHR. - Split session.signup into signup and update to restrict extra params to signup only
2015-09-16Bump version to 0.4.0kaeff
2015-09-16Remove jasmine html runner & outdated libskaeff
2015-09-16Run tests via cli using karma & PhantomJS for Traviskaeff
Instead of jasmine's HTML runner, use karma to run specs. karma & all other dependencies are installed via npm and executed via node.js. This allows TravisCI to execute the test, and as a side effect, bumps the versions on the testing toolchain. - Install node.js - Run `npm install` once to download dependencies. - Run `npm test` to run all tests Things to bear in mind: - This commit adds general project information in `package.js` - `karma.conf.js` specifies the order in which src, spec and lib files are loaded - Switch to jasmine spies instead of sinon
2013-10-14Merge pull request #4 from azul/bugfix/utf8-in-shajessib
properly treat utf8 chars in password
2013-10-14properly treat utf8 chars in passwordAzul
utf-8 encoding used to be bundled with the SHA256 library. However we only want to utf8 encode strings that are actual user input. We do not want to encode the bytearrays that are used when hashing the hex values calculated during for SRP. So I separated the utf-8 encoding and the sha256 hashing.
2013-09-26Merge pull request #3 from azul/feature/use-token-authjessib
use token from the form to submit password update
2013-09-24use token from the form to submit password updateAzul
2013-07-12also zeroprefix the salt if neededAzul
Now what else can you possibly zeroprefix? This should be it - shouldn't it?
2013-07-12prefix incoming B tooAzul
2013-07-12also prefix our own toString(16) hex valuesAzul
2013-07-12the 0 prefix in hex is essential for building the M and M2 stringsAzul
2013-07-06Merge pull request #2 from elijh/feature/always-use-v1azul
always use the API-only controller for all requests.
2013-07-04always use the API-only controller for all requests.elijah
2013-06-24Merge pull request #1 from azul/refactor/separate-sessionjessib
Refactor/separate session
2013-06-24refactor: separate account from sessionAzul
2013-06-24refactor: rename constants to calculate and clean up hash usageAzul
2013-06-24refactor: separate calculations from sessionAzul
2013-06-24fix bug wrt zero padding of hashesAzul
2013-03-20Merge branch 'release/0.3.0'Azul
2013-03-20added version fileAzul
2013-03-20use a proper random a for the handshakeAzul
2012-11-26API: update instead of addToFormAzul
addToForm was an attempt to not use ajax but just the normal form submit. Turns out it's easy to add hidden fields to the form but quite cumbersome to remove the password fields from teh form so they are not submitted over the eventually untrusted channel. So we use ajax for updates just like for signup.
2012-11-23addToForm: add the srp signup data to an existing formAzul
2012-11-22don't cache password and loginAzul
2012-11-22catch empty responsesAzul
2012-11-22using done/fail instead of success/error, handing all properties to failAzul
2012-11-20all request should go to absolute pathsAzul
They should be independent of the url we're serving the page from
2012-11-20make sure we get the current password and loginAzul
2012-11-20make sure srp.login also works as a callbackAzul
2012-11-20sending the parsed json object to the error handlerAzul
2012-11-20Merge branch 'feature/clean-srp' into developAzul
2012-11-19further cleanupAzul
2012-11-19removed the SRP class - using just a plain srp object nowAzul
2012-11-19first step at cleaning up the srpAzul
2012-11-19works - but not quite what i want. Exposing jqXHR to error functionAzul
2012-11-14Merge branch 'release/0.2.0'Azul
2012-11-14Merge branch 'feature/cleanup-non-restful' into developAzul
2012-11-14cleaned up unused parser functionsAzul
2012-11-14removed outdated django remote and all related filesAzul
Also cleaned up the specs a bit
2012-11-12Merge branch 'feature-updated_json_api' into developAzul
2012-11-12adopting tests to new .json urlsAzul
2012-11-12specifying charset and fetching jquery remotelyAzul
This way you don't have to add jquery to the lib dir for specs to work
2012-11-09Merge branch 'master' into feature-updated_json_apiAzul
2012-10-30we're expecting json responses - so put .json in the urlAzul
2012-10-19don't expect create to return an okAzul
* it returns the user * it will return errors if sth. goes wrong.
2012-10-19require srp.js first and the remotes afterwardsAzul
2012-10-19added success and error callbacks to registerAzul