- Dec 21, 2011
-
-
Lloyd Hilaiel authored
SCHEMA CHANGE: password is now nullable in schema. also, add .createUserWithPrimaryEmail and .emailType to db abstractoin
-
Lloyd Hilaiel authored
when running locally, SHIMMED_PRIMARIES set for all daemons (so dbwriter can interact with primaries too)
-
Shane Tomlinson authored
* Adding a window Mock. * Adding a new template for the "you've gotta verify" screen. * Hooking up the logic to redirect - which closes the window.
-
Shane Tomlinson authored
* Add network.authenticateWithAssertion and related tests. * On signup page, start the redirection code to verify with primary in new tab. * in network.js, rename all the onSuccess to onComplete for clarity. * Simplify tests for primary user provisioning while "not authenticated". * Generate fake keys/certs in the provisioning mock. * Save off the keypair/cert given to us by the provisioning frame before getting an assertion. * Generate an assertion and log the user in on primary provisioning success.
-
Lloyd Hilaiel authored
API CHANGES: stub a new auth_with_assertion api for authenticating to browserid with assertions generated from primary issued certs, and implement a failing unit test. now lets make it pass
-
Lloyd Hilaiel authored
-
Lloyd Hilaiel authored
-
Lloyd Hilaiel authored
SCHEMA CHANGE: add a bit to the email table describing whether emails are primary or secondary, update list_emails wsapi to return this, augment unit tests
-
Lloyd Hilaiel authored
use crypto.getRandom instead of urandom closes #735
-
Ben Adida authored
-
Ben Adida authored
changed generate to use nodejs crypto, added weakgenerate, added async support for generate, and added tests
-
- Dec 20, 2011
-
-
Lloyd Hilaiel authored
-
Lloyd Hilaiel authored
attempt #2 at resolving duplicate ids, rename the new one that's used in fewer places. fixes frontend unit tests
-
Lloyd Hilaiel authored
This reverts commit 3e88cc39.
-
Lloyd Hilaiel authored
-
Lloyd Hilaiel authored
-
Lloyd Hilaiel authored
-
Lloyd Hilaiel authored
-
Ben Adida authored
revived the navigator.id.channel, as well as the #NATIVE and #INTERNAL indications that internal APIs are about to be called
-
Lloyd Hilaiel authored
-
Lloyd Hilaiel authored
-
Lloyd Hilaiel authored
-
Lloyd Hilaiel authored
-
Shane Tomlinson authored
-
Lloyd Hilaiel authored
-
Lloyd Hilaiel authored
-
Shane Tomlinson authored
Conflicts: resources/static/pages/signup.js resources/static/shared/network.js
-
Shane Tomlinson authored
* Adding unit tests for network.addressInfo * to the XHR mock, adding info needed to test primary/secondary flow. * Adding a BrowserID.Mock.Provisioning to handle mocking out provisioning capabilities. * Creating a new User.createUser that handles creating users on either primaryies or secondaries. * Adding unit tests for the signup page for primary, updating old tests for secondary. * Starting a shell of error messages and success markup on signup page. * Starting to hook up the dialog, adding loads of tests. Secondary based user creation good again.
-
Lloyd Hilaiel authored
-
Lloyd Hilaiel authored
implement a more generic mechanism to enable local testing and development of primary support - allow SHIMMED_PRIMARIES to be provided which stuffs a auth url, provisioning url, and public key in our cache
-
Lloyd Hilaiel authored
-
Lloyd Hilaiel authored
-
Lloyd Hilaiel authored
implement both sides of the 'provisioning_api' - that which primaries interact with while certifying authenticated users. woo.
-
Lloyd Hilaiel authored
partial implementation of trusted side of provisioning setup, enough to try to load primary's provisioning url
-
Lloyd Hilaiel authored
plumb primary check into signup page on main site, partially implemented, but enough to develop primary provisioning page with
-
Lloyd Hilaiel authored
stub in a new javascript library that will abstract dialog code from the details of embedding and interacting with a primary's provisioning content.
-
Lloyd Hilaiel authored
implement 'address_info' wsapi that returns information about an email's current status. who vouches for it, and if it's a secondary, is the email address known
-
Lloyd Hilaiel authored
-
Shane Tomlinson authored
-
Shane Tomlinson authored
* Add markup/CSS, including tooltips. * Add logic to manage_account.js. * Add changePassword to network/user.js. Add related tests. * Update xhr mock so that session_context always returns "valid" info unless contextAjaxError is specified. * Update the tooltip so that it has a reset function. close #771 close #114
-