summaryrefslogtreecommitdiff
path: root/src/leap/eip/checks.py
AgeCommit message (Collapse)Author
2013-01-17(osx) detect which interface is traffic going thrukali
2013-01-17pass cacert bundle only in frozen appskali
2013-01-11fix for missing cacert bundlekali
frozen app cannot find requests cacert bundle. added to Resources to get us going.
2013-01-11all calls except the first one are made to api urikali
we also parse the port number
2013-01-10renamed connection pagekali
2013-01-09fix from_loginkali
2012-12-20fix broken testskali
2012-12-18catch gnutls error while validating pemfilekali
2012-12-18do not pass CA.crt to checks for httpskali
also skip temporary errors when previous openvpn process vanishes.
2012-12-15workaround for not-yet-valid certskali
skipping valid_from ts on cert
2012-12-12changed some values in new style eipconfigkali
2012-12-12tests for openvpn optionskali
and make the rest of tests pass after some changes in this branch (dirtyness in config files)
2012-12-10get cipher config from eip-servicekali
2012-11-13fix missing provider parameter in leapconfig objects chainkali
2012-11-12fix cert fetching over httpskali
2012-11-08more careful error catching during registration.kali
added a twisted server that fakes some of the provider interaction.
2012-10-26user credentials saved on login/signup branches.kali
cert request is using magick decorator that retrieves the certificates using srp.
2012-10-24fix checks that were getting default provider domain var stillkali
2012-10-24sign up branch ends by triggering eip connectionkali
still need to bind signals properly, and block on the validation process until we receive the "connected" signal. but the basic flow is working again, i.e, user should be able to remove the .config/leap folder and get all the needed info from the provider.
2012-10-20add bypass for already trusted fingerprintskali
2012-10-20connecting pagekali
and changes to functions having to do with the default path to certs.
2012-10-19add bug number in log for #638 cases (domain name mismatch)kali
2012-10-19ca cert fingerprint check + api cert verificationkali
2012-10-19download ca cert from providerkali
2012-10-19logic for cert validation widgets in wizardkali
2012-10-18catch cert verification errors and ask user for trustkali
with a little helper function using gnutls
2012-10-08Merge branch 'feature/network_check' into developkali
Conflicts: src/leap/baseapp/mainwindow.py src/leap/eip/tests/test_checks.py
2012-10-08popup dialog error when network error happenskali
we are shutting down for now. we should be acting upon failures in the near future. lowered the recurrent checks interval to 10 seconds.
2012-10-05todo commentskali
2012-10-05fix cert needed evaluationkali
2012-10-02refactored jsonconfig, included jsonschema validationkali
and type casting.
2012-09-25moved LeapNetworkChecker and test in base.antialias
2012-09-24Missed a renaming of test_internet_connection to check_internet_connection.antialias
2012-09-24improved network checks on the way to a network checker.antialias
2012-09-25workaround for #638 and fix for eip config check for gatewayskali
(we were picking gateway in a wrong way) Closes #610.
2012-09-21add property to baseconfigkali
config instead of get_config()
2012-09-21added --no-provider-checks and --no-ca-verify for ease of debuggingkali
Close #604
2012-09-19checks for certificatekali
2012-09-18cert verification and malformed json checkskali
2012-09-18do_branding command added to setupkali
2012-09-12time boundary check of certificate using gnutlskali
2012-09-12close fd. with breaks with StringIO passed in tests.kali
2012-09-12moved network checks to its own classkali
so it can be more easily moved to base.checks and reused when eip is a module.
2012-09-10Implemented basic networks checks: valid interface, default route, and can ↵antialias
ping the listed gateway.
2012-09-05app wide logging handlerkali
2012-09-04fix test_checks: do not mess with real home path!kali
It is really dangerous to mess with expanduser paths in tests without deriving testcases from LeapTestCase. It'd be good to devise a way of checking for that :(
2012-09-04better separate cert validation/download logickali
stubbing out the timestamp validity check (waiting for #507) also some more deep tests are missing, wrote todo in tests.
2012-09-03basic download cert functionalitykali
2012-09-03providercertchecks:check_https_is_workingkali
implementing a https server with its own base testcase for convenience. https is delicate, and I think it's better checking against a real implementation than mocking everything here.
2012-08-30working with options only from clikali