Skip to content

Tests for commands and record#12

Merged
saldoukhov merged 2 commits intomasterfrom
serge-pytest
Dec 4, 2015
Merged

Tests for commands and record#12
saldoukhov merged 2 commits intomasterfrom
serge-pytest

Conversation

@saldoukhov
Copy link
Copy Markdown
Contributor

No description provided.

saldoukhov added a commit that referenced this pull request Dec 4, 2015
@saldoukhov saldoukhov merged commit 6943418 into master Dec 4, 2015
@saldoukhov saldoukhov deleted the serge-pytest branch December 4, 2015 04:52
dstromberg pushed a commit that referenced this pull request Oct 4, 2021
# This is the 1st commit message:

New communicate_rest_not_authed function

# This is the commit message #2:

Initial checkin

# This is the commit message #3:

Added BreachWatchCommand, with a .execute from Sergey for getting a token and anonymizing it

# This is the commit message #4:

Improved a docstring. Save breach_watch_records and breach_watch_security_data inu params

# This is the commit message #5:

Deleted

# This is the commit message #6:

Added process_breach_watch_records function

# This is the commit message #7:

Added get_anon_token() and call to same during login

# This is the commit message #8:

Added several BreachWatch-related functions

# This is the commit message #9:

Check if password is breached, in add command

# This is the commit message #10:

edit command checks for a breached password

# This is the commit message #11:

Split extract_password_from_json into dict-capable and json-str-capable functions

# This is the commit message #12:

Fixed breachwatch_pb2 import for new reality

# This is the commit message #13:

v2 add and v2 edit disallow breached passwords

# This is the commit message #14:

Gave are_all_good_passwords a with_count option. Added extract_passwords_from_params function

# This is the commit message #15:

Just eliminated pudb import

# This is the commit message #16:

Changed a variable name. Removed a pprint.

# This is the commit message #17:

Added several functions and a class to upload breachwatch data
sk-keeper pushed a commit that referenced this pull request Oct 7, 2021
* # This is a combination of 17 commits.
# This is the 1st commit message:

New communicate_rest_not_authed function

# This is the commit message #2:

Initial checkin

# This is the commit message #3:

Added BreachWatchCommand, with a .execute from Sergey for getting a token and anonymizing it

# This is the commit message #4:

Improved a docstring. Save breach_watch_records and breach_watch_security_data inu params

# This is the commit message #5:

Deleted

# This is the commit message #6:

Added process_breach_watch_records function

# This is the commit message #7:

Added get_anon_token() and call to same during login

# This is the commit message #8:

Added several BreachWatch-related functions

# This is the commit message #9:

Check if password is breached, in add command

# This is the commit message #10:

edit command checks for a breached password

# This is the commit message #11:

Split extract_password_from_json into dict-capable and json-str-capable functions

# This is the commit message #12:

Fixed breachwatch_pb2 import for new reality

# This is the commit message #13:

v2 add and v2 edit disallow breached passwords

# This is the commit message #14:

Gave are_all_good_passwords a with_count option. Added extract_passwords_from_params function

# This is the commit message #15:

Just eliminated pudb import

# This is the commit message #16:

Changed a variable name. Removed a pprint.

# This is the commit message #17:

Added several functions and a class to upload breachwatch data

* New communicate_rest_not_authed function

Initial checkin

Added BreachWatchCommand, with a .execute from Sergey for getting a token and anonymizing it

Improved a docstring. Save breach_watch_records and breach_watch_security_data inu params

Deleted

Added process_breach_watch_records function

Added get_anon_token() and call to same during login

Added several BreachWatch-related functions

Check if password is breached, in add command

edit command checks for a breached password

Split extract_password_from_json into dict-capable and json-str-capable functions

Fixed breachwatch_pb2 import for new reality

v2 add and v2 edit disallow breached passwords

Gave are_all_good_passwords a with_count option. Added extract_passwords_from_params function

Just eliminated pudb import

Changed a variable name. Removed a pprint.

Added several functions and a class to upload breachwatch data

Added pylint and pylint_protobuf

Added pylint_protobuf to load-plugins

Improved error checking. Ditched an eager evaluation

Docstring+comment improvements. Removed pudb use

Moved record_common.extract_password_from_dict call. Added record_common.upload_breachwatch_records call

Added call of record_common.are_all_good_passwords

Test with a password that passes breachwatch

Added some mock.patch calls to keep are_all_good_passwords from causing unit test failures

Get record_key from record_cache, not meta_data_cache. Moved where we stash away the breachwatch data within sync_down(). Add to breach watch data in params, do not replace

Added lookup_euid_from_password() and code to faciliate same. Use crypto.encrypt_aes_v2() instead of api.encrypt_aes()

Added breachwatch record upload for add and edit commands

Added the ability to upload breachwatch data

Added v2 breachwatch functions. Renamed a couple of v3 function names to include _v3

Skip too-many-function-args - because it is often not a true problem, and because sometimes pylint warns about it incorrectly

Do not try breachwatch if disabled

Added a pprint for debugging. If breachwatch is disabled, do you try breachwatch command

Removed an unused import

Spruced up some FIXMEs for push. Use utils for base64. Improved a __repr__. Added sideload_breachwatch_data()

Added a --verbose option to breachwatch command

Added some new mocks

Invoke a breachwatch on IPL

are_all_good_passwords gets color support

BreachWatchCommand gets color support. Renamed breach-watch to breachwatch

Do not block breached passwords. Log to info instead

Do not block breached passwords. Log to info instead

logging.info() for breachwatch instead of print

Do not say anything if breachwatch command is issued but breachwatch is not licensed

A changed to the error wording when accepting a password from the commandline

A change to the error wording when accepting a password from the commandline through the -p/--pass/--password option

Eliminated pudb breakpoint

* Turned off consider-using-f-string

* Backported some mocks to work on CPython 3.6

* If no breachwatch data in response_json (in sync_down function), set params.breach_watch_records and params.breach_watch_security_data to empty dicts

* Map non-us (constants.KEEPER_PUBLIC_HOSTS['US']) hosts to keepersecurity.com if communicate_rest_not_authed(force_usa=True)

* send_recv_breach_watch_status passes force_usa=True when doing breachwatch

* Fixed a traceback in a non-ascii print
sk-keeper pushed a commit that referenced this pull request Oct 11, 2021
* # This is a combination of 17 commits.
# This is the 1st commit message:

New communicate_rest_not_authed function

# This is the commit message #2:

Initial checkin

# This is the commit message #3:

Added BreachWatchCommand, with a .execute from Sergey for getting a token and anonymizing it

# This is the commit message #4:

Improved a docstring. Save breach_watch_records and breach_watch_security_data inu params

# This is the commit message #5:

Deleted

# This is the commit message #6:

Added process_breach_watch_records function

# This is the commit message #7:

Added get_anon_token() and call to same during login

# This is the commit message #8:

Added several BreachWatch-related functions

# This is the commit message #9:

Check if password is breached, in add command

# This is the commit message #10:

edit command checks for a breached password

# This is the commit message #11:

Split extract_password_from_json into dict-capable and json-str-capable functions

# This is the commit message #12:

Fixed breachwatch_pb2 import for new reality

# This is the commit message #13:

v2 add and v2 edit disallow breached passwords

# This is the commit message #14:

Gave are_all_good_passwords a with_count option. Added extract_passwords_from_params function

# This is the commit message #15:

Just eliminated pudb import

# This is the commit message #16:

Changed a variable name. Removed a pprint.

# This is the commit message #17:

Added several functions and a class to upload breachwatch data

* New communicate_rest_not_authed function

Initial checkin

Added BreachWatchCommand, with a .execute from Sergey for getting a token and anonymizing it

Improved a docstring. Save breach_watch_records and breach_watch_security_data inu params

Deleted

Added process_breach_watch_records function

Added get_anon_token() and call to same during login

Added several BreachWatch-related functions

Check if password is breached, in add command

edit command checks for a breached password

Split extract_password_from_json into dict-capable and json-str-capable functions

Fixed breachwatch_pb2 import for new reality

v2 add and v2 edit disallow breached passwords

Gave are_all_good_passwords a with_count option. Added extract_passwords_from_params function

Just eliminated pudb import

Changed a variable name. Removed a pprint.

Added several functions and a class to upload breachwatch data

Added pylint and pylint_protobuf

Added pylint_protobuf to load-plugins

Improved error checking. Ditched an eager evaluation

Docstring+comment improvements. Removed pudb use

Moved record_common.extract_password_from_dict call. Added record_common.upload_breachwatch_records call

Added call of record_common.are_all_good_passwords

Test with a password that passes breachwatch

Added some mock.patch calls to keep are_all_good_passwords from causing unit test failures

Get record_key from record_cache, not meta_data_cache. Moved where we stash away the breachwatch data within sync_down(). Add to breach watch data in params, do not replace

Added lookup_euid_from_password() and code to faciliate same. Use crypto.encrypt_aes_v2() instead of api.encrypt_aes()

Added breachwatch record upload for add and edit commands

Added the ability to upload breachwatch data

Added v2 breachwatch functions. Renamed a couple of v3 function names to include _v3

Skip too-many-function-args - because it is often not a true problem, and because sometimes pylint warns about it incorrectly

Do not try breachwatch if disabled

Added a pprint for debugging. If breachwatch is disabled, do you try breachwatch command

Removed an unused import

Spruced up some FIXMEs for push. Use utils for base64. Improved a __repr__. Added sideload_breachwatch_data()

Added a --verbose option to breachwatch command

Added some new mocks

Invoke a breachwatch on IPL

are_all_good_passwords gets color support

BreachWatchCommand gets color support. Renamed breach-watch to breachwatch

Do not block breached passwords. Log to info instead

Do not block breached passwords. Log to info instead

logging.info() for breachwatch instead of print

Do not say anything if breachwatch command is issued but breachwatch is not licensed

A changed to the error wording when accepting a password from the commandline

A change to the error wording when accepting a password from the commandline through the -p/--pass/--password option

Eliminated pudb breakpoint

* Turned off consider-using-f-string

* Backported some mocks to work on CPython 3.6

* If no breachwatch data in response_json (in sync_down function), set params.breach_watch_records and params.breach_watch_security_data to empty dicts

* Map non-us (constants.KEEPER_PUBLIC_HOSTS['US']) hosts to keepersecurity.com if communicate_rest_not_authed(force_usa=True)

* send_recv_breach_watch_status passes force_usa=True when doing breachwatch

* Fixed a traceback in a non-ascii print
sk-keeper pushed a commit that referenced this pull request Oct 12, 2021
* # This is a combination of 17 commits.
# This is the 1st commit message:

New communicate_rest_not_authed function

# This is the commit message #2:

Initial checkin

# This is the commit message #3:

Added BreachWatchCommand, with a .execute from Sergey for getting a token and anonymizing it

# This is the commit message #4:

Improved a docstring. Save breach_watch_records and breach_watch_security_data inu params

# This is the commit message #5:

Deleted

# This is the commit message #6:

Added process_breach_watch_records function

# This is the commit message #7:

Added get_anon_token() and call to same during login

# This is the commit message #8:

Added several BreachWatch-related functions

# This is the commit message #9:

Check if password is breached, in add command

# This is the commit message #10:

edit command checks for a breached password

# This is the commit message #11:

Split extract_password_from_json into dict-capable and json-str-capable functions

# This is the commit message #12:

Fixed breachwatch_pb2 import for new reality

# This is the commit message #13:

v2 add and v2 edit disallow breached passwords

# This is the commit message #14:

Gave are_all_good_passwords a with_count option. Added extract_passwords_from_params function

# This is the commit message #15:

Just eliminated pudb import

# This is the commit message #16:

Changed a variable name. Removed a pprint.

# This is the commit message #17:

Added several functions and a class to upload breachwatch data

* New communicate_rest_not_authed function

Initial checkin

Added BreachWatchCommand, with a .execute from Sergey for getting a token and anonymizing it

Improved a docstring. Save breach_watch_records and breach_watch_security_data inu params

Deleted

Added process_breach_watch_records function

Added get_anon_token() and call to same during login

Added several BreachWatch-related functions

Check if password is breached, in add command

edit command checks for a breached password

Split extract_password_from_json into dict-capable and json-str-capable functions

Fixed breachwatch_pb2 import for new reality

v2 add and v2 edit disallow breached passwords

Gave are_all_good_passwords a with_count option. Added extract_passwords_from_params function

Just eliminated pudb import

Changed a variable name. Removed a pprint.

Added several functions and a class to upload breachwatch data

Added pylint and pylint_protobuf

Added pylint_protobuf to load-plugins

Improved error checking. Ditched an eager evaluation

Docstring+comment improvements. Removed pudb use

Moved record_common.extract_password_from_dict call. Added record_common.upload_breachwatch_records call

Added call of record_common.are_all_good_passwords

Test with a password that passes breachwatch

Added some mock.patch calls to keep are_all_good_passwords from causing unit test failures

Get record_key from record_cache, not meta_data_cache. Moved where we stash away the breachwatch data within sync_down(). Add to breach watch data in params, do not replace

Added lookup_euid_from_password() and code to faciliate same. Use crypto.encrypt_aes_v2() instead of api.encrypt_aes()

Added breachwatch record upload for add and edit commands

Added the ability to upload breachwatch data

Added v2 breachwatch functions. Renamed a couple of v3 function names to include _v3

Skip too-many-function-args - because it is often not a true problem, and because sometimes pylint warns about it incorrectly

Do not try breachwatch if disabled

Added a pprint for debugging. If breachwatch is disabled, do you try breachwatch command

Removed an unused import

Spruced up some FIXMEs for push. Use utils for base64. Improved a __repr__. Added sideload_breachwatch_data()

Added a --verbose option to breachwatch command

Added some new mocks

Invoke a breachwatch on IPL

are_all_good_passwords gets color support

BreachWatchCommand gets color support. Renamed breach-watch to breachwatch

Do not block breached passwords. Log to info instead

Do not block breached passwords. Log to info instead

logging.info() for breachwatch instead of print

Do not say anything if breachwatch command is issued but breachwatch is not licensed

A changed to the error wording when accepting a password from the commandline

A change to the error wording when accepting a password from the commandline through the -p/--pass/--password option

Eliminated pudb breakpoint

* Turned off consider-using-f-string

* Backported some mocks to work on CPython 3.6

* If no breachwatch data in response_json (in sync_down function), set params.breach_watch_records and params.breach_watch_security_data to empty dicts

* Map non-us (constants.KEEPER_PUBLIC_HOSTS['US']) hosts to keepersecurity.com if communicate_rest_not_authed(force_usa=True)

* send_recv_breach_watch_status passes force_usa=True when doing breachwatch

* Fixed a traceback in a non-ascii print
sk-keeper pushed a commit that referenced this pull request Oct 13, 2021
* # This is a combination of 17 commits.
# This is the 1st commit message:

New communicate_rest_not_authed function

# This is the commit message #2:

Initial checkin

# This is the commit message #3:

Added BreachWatchCommand, with a .execute from Sergey for getting a token and anonymizing it

# This is the commit message #4:

Improved a docstring. Save breach_watch_records and breach_watch_security_data inu params

# This is the commit message #5:

Deleted

# This is the commit message #6:

Added process_breach_watch_records function

# This is the commit message #7:

Added get_anon_token() and call to same during login

# This is the commit message #8:

Added several BreachWatch-related functions

# This is the commit message #9:

Check if password is breached, in add command

# This is the commit message #10:

edit command checks for a breached password

# This is the commit message #11:

Split extract_password_from_json into dict-capable and json-str-capable functions

# This is the commit message #12:

Fixed breachwatch_pb2 import for new reality

# This is the commit message #13:

v2 add and v2 edit disallow breached passwords

# This is the commit message #14:

Gave are_all_good_passwords a with_count option. Added extract_passwords_from_params function

# This is the commit message #15:

Just eliminated pudb import

# This is the commit message #16:

Changed a variable name. Removed a pprint.

# This is the commit message #17:

Added several functions and a class to upload breachwatch data

* New communicate_rest_not_authed function

Initial checkin

Added BreachWatchCommand, with a .execute from Sergey for getting a token and anonymizing it

Improved a docstring. Save breach_watch_records and breach_watch_security_data inu params

Deleted

Added process_breach_watch_records function

Added get_anon_token() and call to same during login

Added several BreachWatch-related functions

Check if password is breached, in add command

edit command checks for a breached password

Split extract_password_from_json into dict-capable and json-str-capable functions

Fixed breachwatch_pb2 import for new reality

v2 add and v2 edit disallow breached passwords

Gave are_all_good_passwords a with_count option. Added extract_passwords_from_params function

Just eliminated pudb import

Changed a variable name. Removed a pprint.

Added several functions and a class to upload breachwatch data

Added pylint and pylint_protobuf

Added pylint_protobuf to load-plugins

Improved error checking. Ditched an eager evaluation

Docstring+comment improvements. Removed pudb use

Moved record_common.extract_password_from_dict call. Added record_common.upload_breachwatch_records call

Added call of record_common.are_all_good_passwords

Test with a password that passes breachwatch

Added some mock.patch calls to keep are_all_good_passwords from causing unit test failures

Get record_key from record_cache, not meta_data_cache. Moved where we stash away the breachwatch data within sync_down(). Add to breach watch data in params, do not replace

Added lookup_euid_from_password() and code to faciliate same. Use crypto.encrypt_aes_v2() instead of api.encrypt_aes()

Added breachwatch record upload for add and edit commands

Added the ability to upload breachwatch data

Added v2 breachwatch functions. Renamed a couple of v3 function names to include _v3

Skip too-many-function-args - because it is often not a true problem, and because sometimes pylint warns about it incorrectly

Do not try breachwatch if disabled

Added a pprint for debugging. If breachwatch is disabled, do you try breachwatch command

Removed an unused import

Spruced up some FIXMEs for push. Use utils for base64. Improved a __repr__. Added sideload_breachwatch_data()

Added a --verbose option to breachwatch command

Added some new mocks

Invoke a breachwatch on IPL

are_all_good_passwords gets color support

BreachWatchCommand gets color support. Renamed breach-watch to breachwatch

Do not block breached passwords. Log to info instead

Do not block breached passwords. Log to info instead

logging.info() for breachwatch instead of print

Do not say anything if breachwatch command is issued but breachwatch is not licensed

A changed to the error wording when accepting a password from the commandline

A change to the error wording when accepting a password from the commandline through the -p/--pass/--password option

Eliminated pudb breakpoint

* Turned off consider-using-f-string

* Backported some mocks to work on CPython 3.6

* If no breachwatch data in response_json (in sync_down function), set params.breach_watch_records and params.breach_watch_security_data to empty dicts

* Map non-us (constants.KEEPER_PUBLIC_HOSTS['US']) hosts to keepersecurity.com if communicate_rest_not_authed(force_usa=True)

* send_recv_breach_watch_status passes force_usa=True when doing breachwatch

* Fixed a traceback in a non-ascii print
sk-keeper pushed a commit that referenced this pull request Oct 13, 2021
* # This is a combination of 17 commits.
# This is the 1st commit message:

New communicate_rest_not_authed function

# This is the commit message #2:

Initial checkin

# This is the commit message #3:

Added BreachWatchCommand, with a .execute from Sergey for getting a token and anonymizing it

# This is the commit message #4:

Improved a docstring. Save breach_watch_records and breach_watch_security_data inu params

# This is the commit message #5:

Deleted

# This is the commit message #6:

Added process_breach_watch_records function

# This is the commit message #7:

Added get_anon_token() and call to same during login

# This is the commit message #8:

Added several BreachWatch-related functions

# This is the commit message #9:

Check if password is breached, in add command

# This is the commit message #10:

edit command checks for a breached password

# This is the commit message #11:

Split extract_password_from_json into dict-capable and json-str-capable functions

# This is the commit message #12:

Fixed breachwatch_pb2 import for new reality

# This is the commit message #13:

v2 add and v2 edit disallow breached passwords

# This is the commit message #14:

Gave are_all_good_passwords a with_count option. Added extract_passwords_from_params function

# This is the commit message #15:

Just eliminated pudb import

# This is the commit message #16:

Changed a variable name. Removed a pprint.

# This is the commit message #17:

Added several functions and a class to upload breachwatch data

* New communicate_rest_not_authed function

Initial checkin

Added BreachWatchCommand, with a .execute from Sergey for getting a token and anonymizing it

Improved a docstring. Save breach_watch_records and breach_watch_security_data inu params

Deleted

Added process_breach_watch_records function

Added get_anon_token() and call to same during login

Added several BreachWatch-related functions

Check if password is breached, in add command

edit command checks for a breached password

Split extract_password_from_json into dict-capable and json-str-capable functions

Fixed breachwatch_pb2 import for new reality

v2 add and v2 edit disallow breached passwords

Gave are_all_good_passwords a with_count option. Added extract_passwords_from_params function

Just eliminated pudb import

Changed a variable name. Removed a pprint.

Added several functions and a class to upload breachwatch data

Added pylint and pylint_protobuf

Added pylint_protobuf to load-plugins

Improved error checking. Ditched an eager evaluation

Docstring+comment improvements. Removed pudb use

Moved record_common.extract_password_from_dict call. Added record_common.upload_breachwatch_records call

Added call of record_common.are_all_good_passwords

Test with a password that passes breachwatch

Added some mock.patch calls to keep are_all_good_passwords from causing unit test failures

Get record_key from record_cache, not meta_data_cache. Moved where we stash away the breachwatch data within sync_down(). Add to breach watch data in params, do not replace

Added lookup_euid_from_password() and code to faciliate same. Use crypto.encrypt_aes_v2() instead of api.encrypt_aes()

Added breachwatch record upload for add and edit commands

Added the ability to upload breachwatch data

Added v2 breachwatch functions. Renamed a couple of v3 function names to include _v3

Skip too-many-function-args - because it is often not a true problem, and because sometimes pylint warns about it incorrectly

Do not try breachwatch if disabled

Added a pprint for debugging. If breachwatch is disabled, do you try breachwatch command

Removed an unused import

Spruced up some FIXMEs for push. Use utils for base64. Improved a __repr__. Added sideload_breachwatch_data()

Added a --verbose option to breachwatch command

Added some new mocks

Invoke a breachwatch on IPL

are_all_good_passwords gets color support

BreachWatchCommand gets color support. Renamed breach-watch to breachwatch

Do not block breached passwords. Log to info instead

Do not block breached passwords. Log to info instead

logging.info() for breachwatch instead of print

Do not say anything if breachwatch command is issued but breachwatch is not licensed

A changed to the error wording when accepting a password from the commandline

A change to the error wording when accepting a password from the commandline through the -p/--pass/--password option

Eliminated pudb breakpoint

* Turned off consider-using-f-string

* Backported some mocks to work on CPython 3.6

* If no breachwatch data in response_json (in sync_down function), set params.breach_watch_records and params.breach_watch_security_data to empty dicts

* Map non-us (constants.KEEPER_PUBLIC_HOSTS['US']) hosts to keepersecurity.com if communicate_rest_not_authed(force_usa=True)

* send_recv_breach_watch_status passes force_usa=True when doing breachwatch

* Fixed a traceback in a non-ascii print
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant