Merged
Conversation
saldoukhov
added a commit
that referenced
this pull request
Dec 4, 2015
Tests for commands and record
dstromberg
pushed a commit
that referenced
this pull request
Oct 4, 2021
# This is the 1st commit message: New communicate_rest_not_authed function # This is the commit message #2: Initial checkin # This is the commit message #3: Added BreachWatchCommand, with a .execute from Sergey for getting a token and anonymizing it # This is the commit message #4: Improved a docstring. Save breach_watch_records and breach_watch_security_data inu params # This is the commit message #5: Deleted # This is the commit message #6: Added process_breach_watch_records function # This is the commit message #7: Added get_anon_token() and call to same during login # This is the commit message #8: Added several BreachWatch-related functions # This is the commit message #9: Check if password is breached, in add command # This is the commit message #10: edit command checks for a breached password # This is the commit message #11: Split extract_password_from_json into dict-capable and json-str-capable functions # This is the commit message #12: Fixed breachwatch_pb2 import for new reality # This is the commit message #13: v2 add and v2 edit disallow breached passwords # This is the commit message #14: Gave are_all_good_passwords a with_count option. Added extract_passwords_from_params function # This is the commit message #15: Just eliminated pudb import # This is the commit message #16: Changed a variable name. Removed a pprint. # This is the commit message #17: Added several functions and a class to upload breachwatch data
sk-keeper
pushed a commit
that referenced
this pull request
Oct 7, 2021
* # This is a combination of 17 commits. # This is the 1st commit message: New communicate_rest_not_authed function # This is the commit message #2: Initial checkin # This is the commit message #3: Added BreachWatchCommand, with a .execute from Sergey for getting a token and anonymizing it # This is the commit message #4: Improved a docstring. Save breach_watch_records and breach_watch_security_data inu params # This is the commit message #5: Deleted # This is the commit message #6: Added process_breach_watch_records function # This is the commit message #7: Added get_anon_token() and call to same during login # This is the commit message #8: Added several BreachWatch-related functions # This is the commit message #9: Check if password is breached, in add command # This is the commit message #10: edit command checks for a breached password # This is the commit message #11: Split extract_password_from_json into dict-capable and json-str-capable functions # This is the commit message #12: Fixed breachwatch_pb2 import for new reality # This is the commit message #13: v2 add and v2 edit disallow breached passwords # This is the commit message #14: Gave are_all_good_passwords a with_count option. Added extract_passwords_from_params function # This is the commit message #15: Just eliminated pudb import # This is the commit message #16: Changed a variable name. Removed a pprint. # This is the commit message #17: Added several functions and a class to upload breachwatch data * New communicate_rest_not_authed function Initial checkin Added BreachWatchCommand, with a .execute from Sergey for getting a token and anonymizing it Improved a docstring. Save breach_watch_records and breach_watch_security_data inu params Deleted Added process_breach_watch_records function Added get_anon_token() and call to same during login Added several BreachWatch-related functions Check if password is breached, in add command edit command checks for a breached password Split extract_password_from_json into dict-capable and json-str-capable functions Fixed breachwatch_pb2 import for new reality v2 add and v2 edit disallow breached passwords Gave are_all_good_passwords a with_count option. Added extract_passwords_from_params function Just eliminated pudb import Changed a variable name. Removed a pprint. Added several functions and a class to upload breachwatch data Added pylint and pylint_protobuf Added pylint_protobuf to load-plugins Improved error checking. Ditched an eager evaluation Docstring+comment improvements. Removed pudb use Moved record_common.extract_password_from_dict call. Added record_common.upload_breachwatch_records call Added call of record_common.are_all_good_passwords Test with a password that passes breachwatch Added some mock.patch calls to keep are_all_good_passwords from causing unit test failures Get record_key from record_cache, not meta_data_cache. Moved where we stash away the breachwatch data within sync_down(). Add to breach watch data in params, do not replace Added lookup_euid_from_password() and code to faciliate same. Use crypto.encrypt_aes_v2() instead of api.encrypt_aes() Added breachwatch record upload for add and edit commands Added the ability to upload breachwatch data Added v2 breachwatch functions. Renamed a couple of v3 function names to include _v3 Skip too-many-function-args - because it is often not a true problem, and because sometimes pylint warns about it incorrectly Do not try breachwatch if disabled Added a pprint for debugging. If breachwatch is disabled, do you try breachwatch command Removed an unused import Spruced up some FIXMEs for push. Use utils for base64. Improved a __repr__. Added sideload_breachwatch_data() Added a --verbose option to breachwatch command Added some new mocks Invoke a breachwatch on IPL are_all_good_passwords gets color support BreachWatchCommand gets color support. Renamed breach-watch to breachwatch Do not block breached passwords. Log to info instead Do not block breached passwords. Log to info instead logging.info() for breachwatch instead of print Do not say anything if breachwatch command is issued but breachwatch is not licensed A changed to the error wording when accepting a password from the commandline A change to the error wording when accepting a password from the commandline through the -p/--pass/--password option Eliminated pudb breakpoint * Turned off consider-using-f-string * Backported some mocks to work on CPython 3.6 * If no breachwatch data in response_json (in sync_down function), set params.breach_watch_records and params.breach_watch_security_data to empty dicts * Map non-us (constants.KEEPER_PUBLIC_HOSTS['US']) hosts to keepersecurity.com if communicate_rest_not_authed(force_usa=True) * send_recv_breach_watch_status passes force_usa=True when doing breachwatch * Fixed a traceback in a non-ascii print
sk-keeper
pushed a commit
that referenced
this pull request
Oct 11, 2021
* # This is a combination of 17 commits. # This is the 1st commit message: New communicate_rest_not_authed function # This is the commit message #2: Initial checkin # This is the commit message #3: Added BreachWatchCommand, with a .execute from Sergey for getting a token and anonymizing it # This is the commit message #4: Improved a docstring. Save breach_watch_records and breach_watch_security_data inu params # This is the commit message #5: Deleted # This is the commit message #6: Added process_breach_watch_records function # This is the commit message #7: Added get_anon_token() and call to same during login # This is the commit message #8: Added several BreachWatch-related functions # This is the commit message #9: Check if password is breached, in add command # This is the commit message #10: edit command checks for a breached password # This is the commit message #11: Split extract_password_from_json into dict-capable and json-str-capable functions # This is the commit message #12: Fixed breachwatch_pb2 import for new reality # This is the commit message #13: v2 add and v2 edit disallow breached passwords # This is the commit message #14: Gave are_all_good_passwords a with_count option. Added extract_passwords_from_params function # This is the commit message #15: Just eliminated pudb import # This is the commit message #16: Changed a variable name. Removed a pprint. # This is the commit message #17: Added several functions and a class to upload breachwatch data * New communicate_rest_not_authed function Initial checkin Added BreachWatchCommand, with a .execute from Sergey for getting a token and anonymizing it Improved a docstring. Save breach_watch_records and breach_watch_security_data inu params Deleted Added process_breach_watch_records function Added get_anon_token() and call to same during login Added several BreachWatch-related functions Check if password is breached, in add command edit command checks for a breached password Split extract_password_from_json into dict-capable and json-str-capable functions Fixed breachwatch_pb2 import for new reality v2 add and v2 edit disallow breached passwords Gave are_all_good_passwords a with_count option. Added extract_passwords_from_params function Just eliminated pudb import Changed a variable name. Removed a pprint. Added several functions and a class to upload breachwatch data Added pylint and pylint_protobuf Added pylint_protobuf to load-plugins Improved error checking. Ditched an eager evaluation Docstring+comment improvements. Removed pudb use Moved record_common.extract_password_from_dict call. Added record_common.upload_breachwatch_records call Added call of record_common.are_all_good_passwords Test with a password that passes breachwatch Added some mock.patch calls to keep are_all_good_passwords from causing unit test failures Get record_key from record_cache, not meta_data_cache. Moved where we stash away the breachwatch data within sync_down(). Add to breach watch data in params, do not replace Added lookup_euid_from_password() and code to faciliate same. Use crypto.encrypt_aes_v2() instead of api.encrypt_aes() Added breachwatch record upload for add and edit commands Added the ability to upload breachwatch data Added v2 breachwatch functions. Renamed a couple of v3 function names to include _v3 Skip too-many-function-args - because it is often not a true problem, and because sometimes pylint warns about it incorrectly Do not try breachwatch if disabled Added a pprint for debugging. If breachwatch is disabled, do you try breachwatch command Removed an unused import Spruced up some FIXMEs for push. Use utils for base64. Improved a __repr__. Added sideload_breachwatch_data() Added a --verbose option to breachwatch command Added some new mocks Invoke a breachwatch on IPL are_all_good_passwords gets color support BreachWatchCommand gets color support. Renamed breach-watch to breachwatch Do not block breached passwords. Log to info instead Do not block breached passwords. Log to info instead logging.info() for breachwatch instead of print Do not say anything if breachwatch command is issued but breachwatch is not licensed A changed to the error wording when accepting a password from the commandline A change to the error wording when accepting a password from the commandline through the -p/--pass/--password option Eliminated pudb breakpoint * Turned off consider-using-f-string * Backported some mocks to work on CPython 3.6 * If no breachwatch data in response_json (in sync_down function), set params.breach_watch_records and params.breach_watch_security_data to empty dicts * Map non-us (constants.KEEPER_PUBLIC_HOSTS['US']) hosts to keepersecurity.com if communicate_rest_not_authed(force_usa=True) * send_recv_breach_watch_status passes force_usa=True when doing breachwatch * Fixed a traceback in a non-ascii print
sk-keeper
pushed a commit
that referenced
this pull request
Oct 12, 2021
* # This is a combination of 17 commits. # This is the 1st commit message: New communicate_rest_not_authed function # This is the commit message #2: Initial checkin # This is the commit message #3: Added BreachWatchCommand, with a .execute from Sergey for getting a token and anonymizing it # This is the commit message #4: Improved a docstring. Save breach_watch_records and breach_watch_security_data inu params # This is the commit message #5: Deleted # This is the commit message #6: Added process_breach_watch_records function # This is the commit message #7: Added get_anon_token() and call to same during login # This is the commit message #8: Added several BreachWatch-related functions # This is the commit message #9: Check if password is breached, in add command # This is the commit message #10: edit command checks for a breached password # This is the commit message #11: Split extract_password_from_json into dict-capable and json-str-capable functions # This is the commit message #12: Fixed breachwatch_pb2 import for new reality # This is the commit message #13: v2 add and v2 edit disallow breached passwords # This is the commit message #14: Gave are_all_good_passwords a with_count option. Added extract_passwords_from_params function # This is the commit message #15: Just eliminated pudb import # This is the commit message #16: Changed a variable name. Removed a pprint. # This is the commit message #17: Added several functions and a class to upload breachwatch data * New communicate_rest_not_authed function Initial checkin Added BreachWatchCommand, with a .execute from Sergey for getting a token and anonymizing it Improved a docstring. Save breach_watch_records and breach_watch_security_data inu params Deleted Added process_breach_watch_records function Added get_anon_token() and call to same during login Added several BreachWatch-related functions Check if password is breached, in add command edit command checks for a breached password Split extract_password_from_json into dict-capable and json-str-capable functions Fixed breachwatch_pb2 import for new reality v2 add and v2 edit disallow breached passwords Gave are_all_good_passwords a with_count option. Added extract_passwords_from_params function Just eliminated pudb import Changed a variable name. Removed a pprint. Added several functions and a class to upload breachwatch data Added pylint and pylint_protobuf Added pylint_protobuf to load-plugins Improved error checking. Ditched an eager evaluation Docstring+comment improvements. Removed pudb use Moved record_common.extract_password_from_dict call. Added record_common.upload_breachwatch_records call Added call of record_common.are_all_good_passwords Test with a password that passes breachwatch Added some mock.patch calls to keep are_all_good_passwords from causing unit test failures Get record_key from record_cache, not meta_data_cache. Moved where we stash away the breachwatch data within sync_down(). Add to breach watch data in params, do not replace Added lookup_euid_from_password() and code to faciliate same. Use crypto.encrypt_aes_v2() instead of api.encrypt_aes() Added breachwatch record upload for add and edit commands Added the ability to upload breachwatch data Added v2 breachwatch functions. Renamed a couple of v3 function names to include _v3 Skip too-many-function-args - because it is often not a true problem, and because sometimes pylint warns about it incorrectly Do not try breachwatch if disabled Added a pprint for debugging. If breachwatch is disabled, do you try breachwatch command Removed an unused import Spruced up some FIXMEs for push. Use utils for base64. Improved a __repr__. Added sideload_breachwatch_data() Added a --verbose option to breachwatch command Added some new mocks Invoke a breachwatch on IPL are_all_good_passwords gets color support BreachWatchCommand gets color support. Renamed breach-watch to breachwatch Do not block breached passwords. Log to info instead Do not block breached passwords. Log to info instead logging.info() for breachwatch instead of print Do not say anything if breachwatch command is issued but breachwatch is not licensed A changed to the error wording when accepting a password from the commandline A change to the error wording when accepting a password from the commandline through the -p/--pass/--password option Eliminated pudb breakpoint * Turned off consider-using-f-string * Backported some mocks to work on CPython 3.6 * If no breachwatch data in response_json (in sync_down function), set params.breach_watch_records and params.breach_watch_security_data to empty dicts * Map non-us (constants.KEEPER_PUBLIC_HOSTS['US']) hosts to keepersecurity.com if communicate_rest_not_authed(force_usa=True) * send_recv_breach_watch_status passes force_usa=True when doing breachwatch * Fixed a traceback in a non-ascii print
sk-keeper
pushed a commit
that referenced
this pull request
Oct 13, 2021
* # This is a combination of 17 commits. # This is the 1st commit message: New communicate_rest_not_authed function # This is the commit message #2: Initial checkin # This is the commit message #3: Added BreachWatchCommand, with a .execute from Sergey for getting a token and anonymizing it # This is the commit message #4: Improved a docstring. Save breach_watch_records and breach_watch_security_data inu params # This is the commit message #5: Deleted # This is the commit message #6: Added process_breach_watch_records function # This is the commit message #7: Added get_anon_token() and call to same during login # This is the commit message #8: Added several BreachWatch-related functions # This is the commit message #9: Check if password is breached, in add command # This is the commit message #10: edit command checks for a breached password # This is the commit message #11: Split extract_password_from_json into dict-capable and json-str-capable functions # This is the commit message #12: Fixed breachwatch_pb2 import for new reality # This is the commit message #13: v2 add and v2 edit disallow breached passwords # This is the commit message #14: Gave are_all_good_passwords a with_count option. Added extract_passwords_from_params function # This is the commit message #15: Just eliminated pudb import # This is the commit message #16: Changed a variable name. Removed a pprint. # This is the commit message #17: Added several functions and a class to upload breachwatch data * New communicate_rest_not_authed function Initial checkin Added BreachWatchCommand, with a .execute from Sergey for getting a token and anonymizing it Improved a docstring. Save breach_watch_records and breach_watch_security_data inu params Deleted Added process_breach_watch_records function Added get_anon_token() and call to same during login Added several BreachWatch-related functions Check if password is breached, in add command edit command checks for a breached password Split extract_password_from_json into dict-capable and json-str-capable functions Fixed breachwatch_pb2 import for new reality v2 add and v2 edit disallow breached passwords Gave are_all_good_passwords a with_count option. Added extract_passwords_from_params function Just eliminated pudb import Changed a variable name. Removed a pprint. Added several functions and a class to upload breachwatch data Added pylint and pylint_protobuf Added pylint_protobuf to load-plugins Improved error checking. Ditched an eager evaluation Docstring+comment improvements. Removed pudb use Moved record_common.extract_password_from_dict call. Added record_common.upload_breachwatch_records call Added call of record_common.are_all_good_passwords Test with a password that passes breachwatch Added some mock.patch calls to keep are_all_good_passwords from causing unit test failures Get record_key from record_cache, not meta_data_cache. Moved where we stash away the breachwatch data within sync_down(). Add to breach watch data in params, do not replace Added lookup_euid_from_password() and code to faciliate same. Use crypto.encrypt_aes_v2() instead of api.encrypt_aes() Added breachwatch record upload for add and edit commands Added the ability to upload breachwatch data Added v2 breachwatch functions. Renamed a couple of v3 function names to include _v3 Skip too-many-function-args - because it is often not a true problem, and because sometimes pylint warns about it incorrectly Do not try breachwatch if disabled Added a pprint for debugging. If breachwatch is disabled, do you try breachwatch command Removed an unused import Spruced up some FIXMEs for push. Use utils for base64. Improved a __repr__. Added sideload_breachwatch_data() Added a --verbose option to breachwatch command Added some new mocks Invoke a breachwatch on IPL are_all_good_passwords gets color support BreachWatchCommand gets color support. Renamed breach-watch to breachwatch Do not block breached passwords. Log to info instead Do not block breached passwords. Log to info instead logging.info() for breachwatch instead of print Do not say anything if breachwatch command is issued but breachwatch is not licensed A changed to the error wording when accepting a password from the commandline A change to the error wording when accepting a password from the commandline through the -p/--pass/--password option Eliminated pudb breakpoint * Turned off consider-using-f-string * Backported some mocks to work on CPython 3.6 * If no breachwatch data in response_json (in sync_down function), set params.breach_watch_records and params.breach_watch_security_data to empty dicts * Map non-us (constants.KEEPER_PUBLIC_HOSTS['US']) hosts to keepersecurity.com if communicate_rest_not_authed(force_usa=True) * send_recv_breach_watch_status passes force_usa=True when doing breachwatch * Fixed a traceback in a non-ascii print
sk-keeper
pushed a commit
that referenced
this pull request
Oct 13, 2021
* # This is a combination of 17 commits. # This is the 1st commit message: New communicate_rest_not_authed function # This is the commit message #2: Initial checkin # This is the commit message #3: Added BreachWatchCommand, with a .execute from Sergey for getting a token and anonymizing it # This is the commit message #4: Improved a docstring. Save breach_watch_records and breach_watch_security_data inu params # This is the commit message #5: Deleted # This is the commit message #6: Added process_breach_watch_records function # This is the commit message #7: Added get_anon_token() and call to same during login # This is the commit message #8: Added several BreachWatch-related functions # This is the commit message #9: Check if password is breached, in add command # This is the commit message #10: edit command checks for a breached password # This is the commit message #11: Split extract_password_from_json into dict-capable and json-str-capable functions # This is the commit message #12: Fixed breachwatch_pb2 import for new reality # This is the commit message #13: v2 add and v2 edit disallow breached passwords # This is the commit message #14: Gave are_all_good_passwords a with_count option. Added extract_passwords_from_params function # This is the commit message #15: Just eliminated pudb import # This is the commit message #16: Changed a variable name. Removed a pprint. # This is the commit message #17: Added several functions and a class to upload breachwatch data * New communicate_rest_not_authed function Initial checkin Added BreachWatchCommand, with a .execute from Sergey for getting a token and anonymizing it Improved a docstring. Save breach_watch_records and breach_watch_security_data inu params Deleted Added process_breach_watch_records function Added get_anon_token() and call to same during login Added several BreachWatch-related functions Check if password is breached, in add command edit command checks for a breached password Split extract_password_from_json into dict-capable and json-str-capable functions Fixed breachwatch_pb2 import for new reality v2 add and v2 edit disallow breached passwords Gave are_all_good_passwords a with_count option. Added extract_passwords_from_params function Just eliminated pudb import Changed a variable name. Removed a pprint. Added several functions and a class to upload breachwatch data Added pylint and pylint_protobuf Added pylint_protobuf to load-plugins Improved error checking. Ditched an eager evaluation Docstring+comment improvements. Removed pudb use Moved record_common.extract_password_from_dict call. Added record_common.upload_breachwatch_records call Added call of record_common.are_all_good_passwords Test with a password that passes breachwatch Added some mock.patch calls to keep are_all_good_passwords from causing unit test failures Get record_key from record_cache, not meta_data_cache. Moved where we stash away the breachwatch data within sync_down(). Add to breach watch data in params, do not replace Added lookup_euid_from_password() and code to faciliate same. Use crypto.encrypt_aes_v2() instead of api.encrypt_aes() Added breachwatch record upload for add and edit commands Added the ability to upload breachwatch data Added v2 breachwatch functions. Renamed a couple of v3 function names to include _v3 Skip too-many-function-args - because it is often not a true problem, and because sometimes pylint warns about it incorrectly Do not try breachwatch if disabled Added a pprint for debugging. If breachwatch is disabled, do you try breachwatch command Removed an unused import Spruced up some FIXMEs for push. Use utils for base64. Improved a __repr__. Added sideload_breachwatch_data() Added a --verbose option to breachwatch command Added some new mocks Invoke a breachwatch on IPL are_all_good_passwords gets color support BreachWatchCommand gets color support. Renamed breach-watch to breachwatch Do not block breached passwords. Log to info instead Do not block breached passwords. Log to info instead logging.info() for breachwatch instead of print Do not say anything if breachwatch command is issued but breachwatch is not licensed A changed to the error wording when accepting a password from the commandline A change to the error wording when accepting a password from the commandline through the -p/--pass/--password option Eliminated pudb breakpoint * Turned off consider-using-f-string * Backported some mocks to work on CPython 3.6 * If no breachwatch data in response_json (in sync_down function), set params.breach_watch_records and params.breach_watch_security_data to empty dicts * Map non-us (constants.KEEPER_PUBLIC_HOSTS['US']) hosts to keepersecurity.com if communicate_rest_not_authed(force_usa=True) * send_recv_breach_watch_status passes force_usa=True when doing breachwatch * Fixed a traceback in a non-ascii print
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
No description provided.