changePassword #414
No reviewers
Labels
No Label
applications
BLOCKED
bug
design
duplicate
enhancement
fixed?
funding-needed
help wanted
infrastructure
invalid
payments
qubes
question
ready-for-implementation
refactor
spam
tapir-server
testing
tor
wontfix
No Milestone
No Assignees
3 Participants
Notifications
Due Date
No due date set.
Dependencies
No dependencies set.
Reference: cwtch.im/cwtch#414
Loading…
Reference in New Issue
No description provided.
Delete Branch "changePassword"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Drone Build Status: failure
https://build.openprivacy.ca/cwtch.im/cwtch/590
@ -83,0 +87,4 @@
defer cp.mutex.Unlock()
db, err := openEncryptedDatabase(cp.storage.ProfileDirectory, password, false)
if db == nil || err != nil {
return errors.New("invalid_password")
const-ify so receiver can check type of error.
@ -83,0 +106,4 @@
log.Infof("rekeying database...")
return cp.storage.Rekey(rekey)
}
return errors.New("passwords_do_not_match")
make const so receiver can check against error types
@ -164,6 +164,17 @@ func TestCwtchPeerIntegration(t *testing.T) {
alice.PeerWithOnion(bob.GetOnion())
alice.PeerWithOnion(carol.GetOnion())
// Test that we can rekey alice without issues...
this could be a unit test no?
the point of this test was to prove that rekeying while everything was active wouldn't break any existing flows.
fadb2bb4b9
to46f32881b9
WIP: changePasswordto changePasswordDrone Build Status: failure
https://build.openprivacy.ca/cwtch.im/cwtch/617
Drone Build Status: success
https://build.openprivacy.ca/cwtch.im/cwtch/619