summaryrefslogtreecommitdiff
path: root/src/leap/bitmask
AgeCommit message (Collapse)Author
2017-03-05[bug] load after exporting the objectKali Kaneko (leap communications)
2017-03-05[feature] add pixelated button to UIKali Kaneko (leap communications)
this button will call the exported qt method to open a new window
2017-03-05[feature] pixelated UA integrationKali Kaneko (leap communications)
a bit hacky and all, but this should launch the service and allow interacting from the default site (localhost:9090). this is the first example of a pyqt-js bridge, it's an interesting mechanism that we can use more in the future. no efforts made so far in authenticating the app.
2017-03-05[bug] revert vpn options from configKali Kaneko (leap communications)
bitmask-root is not able to parse some options, and is aborting the vpn connection in my tests. we need to debug that carefully, hardcoding some options for now and leaving this to be done post-0.9.5
2017-03-03[feat] get VPN params from eip-service.jsonRuben Pollan
Instead of hardcoding them in the code.
2017-03-03[bug] use username instead of provider in the vpn callsRuben Pollan
Without active user we need to use the username instead of the provider in the VPN API. - Resolves: #8783
2017-03-03[feat] mail status will only work for a valid useridRuben Pollan
We used to return the system status if no userid is provided. We don't do it anymore, now is only userid based. - Resolves: #8785
2017-02-27[test] pass a fake shared db to soledad during testsdrebs
2017-02-27[refactor] access soledad client offline state directlydrebs
2017-02-27[refactor] use new soledad client parameterdrebs
- Resolves: #8721
2017-02-24[bug] fix vpn command after cli config refactorKali Kaneko (leap communications)
2017-02-24[feature] require authentication token for apiKali Kaneko (leap communications)
implements a global auth token for the app. this token is written to .config/leap/authtoken, and passed to the anchor part of the landing URI when opening the index resource by the browser. - Resolves: #8765
2017-02-23[bug] fix bad mergeKali Kaneko (leap communications)
2017-02-23[pkg] add osx helpersKali Kaneko (leap communications)
2017-02-23[bug] rename one of the managers to TunnelManagerKali Kaneko (leap communications)
otherwise there's a name collision with the former EIPManager
2017-02-23[refactor] complete eip -> vpn rename in coreKali Kaneko (leap communications)
2017-02-23[refactor] rename eip to vpnKali Kaneko (leap communications)
2017-02-23[style] pep8Kali Kaneko (leap communications)
2017-02-23[docs] document the API/cliKali Kaneko (leap communications)
2017-02-23[feature] hard restarts upon ping-restart receivedKali Kaneko (leap communications)
2017-02-23[feature] add up/down traffic in statusKali Kaneko (leap communications)
2017-02-23[feature] add bytes2human conversionKali Kaneko (leap communications)
2017-02-23[feature] parse statusKali Kaneko (leap communications)
- simple status parsing - add separate firewall status - set status for abnormal termination
2017-02-23[feature] eip start/stop workingKali Kaneko (leap communications)
2017-02-23[feature] add install/uninstall command for helpersKali Kaneko (leap communications)
2017-02-23[bug] fix parsing of vpn statusKali Kaneko (leap communications)
2017-02-23[bug] fix bitmask-root pathKali Kaneko (leap communications)
2017-02-23[refactor] sort out some importsKali Kaneko (leap communications)
2017-02-23[feature] new commands: get_certKali Kaneko (leap communications)
2017-02-23[refactor] split vpn control into some modulesKali Kaneko (leap communications)
2017-02-23[refactor] remove unneeded functionKali Kaneko (leap communications)
2017-02-23[refactor] minor renamingKali Kaneko (leap communications)
2017-02-23[feature] enable vpn serviceKali Kaneko (leap communications)
2017-02-23[bug] pass raw arguments to the default commandsKali Kaneko (leap communications)
2017-02-23[feature] initial port of legacy vpn codeKali Kaneko (leap communications)
non functional at the moment, but started doing some cleanup
2017-02-23[feat] add json print to cliRuben Pollan
To improve scriptability we add '--json' param to the cli. - Resolves: #8771
2017-02-23[feat] eliminate the active user from bonafideRuben Pollan
Active user is now only a concept of the cli. For it we add a ~/.config/leap/bitmaskctl.cfg file. - Resolves: #8769
2017-02-13[feat] simplify mail status in the CLIRuben Pollan
- Resolves: #8770
2017-02-09[feat] add account based keymanagement APIRuben Pollan
- Resolves: #8755
2017-02-09disable authentication for APIKali Kaneko (leap communications)
2017-02-09[style] remove unused signaling new mail methodRuben Pollan
2017-02-09[feat] Get more detailed status report for emailRuben Pollan
- Resolves: #8754
2017-01-31Extract re-decrypt with new key methodTulio Casagrande
Signed-off-by: Ruben Pollan <meskio@sindominio.net>
2017-01-31Propagate errors to the calling methodsTulio Casagrande
Signed-off-by: Ruben Pollan <meskio@sindominio.net>
2017-01-31[docs] update parameters and return namesTulio Casagrande
Signed-off-by: Ruben Pollan <meskio@sindominio.net>
2017-01-31Repeat decryption if signed with attached keyTulio Casagrande
Previously, if an email was signed with a new key, that was also sent as an attachment, the verification of the signature could fail if the only available source of this new key is the attachment ifself. I changed to extract the attachment before adding the leap header, which is responsible for the signed/encrypted flags. Also, if the previous verification failed and a new key was successful imported, it's going to decrypt the original email again, just to update the verify status. Signed-off-by: Ruben Pollan <meskio@sindominio.net>
2017-01-31Indicate a successful/failure OpenPGP header importTulio Casagrande
Signed-off-by: Ruben Pollan <meskio@sindominio.net>
2017-01-31Extract method for easy reuseTulio Casagrande
Signed-off-by: Ruben Pollan <meskio@sindominio.net>
2017-01-31Add missing errbackTulio Casagrande
Signed-off-by: Ruben Pollan <meskio@sindominio.net>
2017-01-31Remove unused parameterTulio Casagrande
Signed-off-by: Ruben Pollan <meskio@sindominio.net>