summaryrefslogtreecommitdiff
path: root/src/leap/bitmask
AgeCommit message (Collapse)Author
2017-12-05[bug] change bitmask-root to work with dnsmasqelijah
2017-12-03[feat] extend the expiration of private keys if neededRuben Pollan
Check on every fetch of the private key if the expiration is less than two months before it expire. And extend the expiration if needed. - Resolves: #8217
2017-12-03[refactor] remove rengenerate keyRuben Pollan
We are not planning to regenerate keys (for now), only to extend the expiration date.
2017-12-03[feat] stop resetting signs used after key regenerationTulio Casagrande
We were considering to reset the sign_used flag to force the new key to be resend as attachment in forthcoming emails. Although, this is not a good solution, because we'll lose information about which keys the client has signed.
2017-12-03[feat] send public key as attachment on every emailTulio Casagrande
Previously, we were sending the key attached as long as the contact hasn't replied back. But with new key replace scenarios, we need to updated the contact keyring with the new key. We can implement autocrypt or similar in the future, but for now, let's send the key attached on every email.
2017-12-03[bug] remove change_key_expiration from the APITulio Casagrande
This was intended to offer the option of only extend the old key and not change it for a new one. However, we don't plan to use this behavior anymore.
2017-12-03[bug] specify _get_inactive_private_keys as a private methodTulio Casagrande
2017-12-03[refactor] rename key extension to expirationTulio Casagrande
This changes reflect python-gnupg naming. With @aarni
2017-12-03[bug] fix log of the key being fetchedTulio Casagrande
2017-12-03[bug] remove key generation event from regenerate_keyTulio Casagrande
The KEYMANAGER_FINISHED_KEY_GENERATION event is used to send a welcome mail to the users, which was causing a new welcome mail when regenerating a key. We removed the event from regenerate_key method. We should implement a KEYMANAGER_FINISHED_KEY_REGENERATION event when it's needed.
2017-12-03[bug] change edit-key to use fingerprint as paramTulio Casagrande
python-gnupg doesn't accept address as parameter for --edit-key
2017-12-03[feat] expired public key are remotely fetched if expiredNavaL
- private key is not allowed to be fetched remotely - fetch_remote needs to be specifically set - if a new key is fetched (ie different KeyID), the validation rule applies
2017-12-03[style] refactoring: renaming methods/variablesNavaL
2017-12-03[bug] sign_used flag is reset for all public keys when the key expiration ↵NavaL
date is extended - this is required so that the key is re-attached to the first outgoing email to all users who already have the expired key.
2017-12-03[feat] expired public key are remotely fetched if expiredNavaL
- private key is not allowed to be fetched remotely - fetch_remote needs to be specifically set - if a new key is fetched (ie different KeyID), the validation rule applies
2017-12-03[bug] key can tell if it should be renewedNavaL
2017-12-03[bug] decryption will be tried for all inactive keysNavaL
2017-12-03[feat] decryption interoperability, when the current key pairNavaL
is renewed - there is only one private inactive key that is the key expiring last among all inactive keys - if there is an inactive key, decryption with it, is tried if it fails with the current active key.
2017-12-03[feat] supplying gpgbinary when building gpg key from dictNavaL
2017-12-03[feat] reset sign_used flag after regenerating key pairNavaL
- this flag is used by leap.mail to attach the new key
2017-12-03[feat] first phase of key regenerationNavaL
- if current key pair is expired, it'll be extended for a day first - new key pair will be signed by the old key
2017-12-03[feat] add key expiry date extension in keymanagerNavaL
- extends key pair (unlocked from soledad) - extension period is counted from key creation date
2017-11-30[refactor] use /var/run for osx helper socketKali Kaneko
2017-11-03[feature] set windows titleKali Kaneko
2017-11-02[style] fix formattingKali Kaneko
2017-11-02[feature] support deepin polkit agentKali Kaneko
-Resolves: #9119
2017-11-02[docs] add todo about proper event integration with systrayKali Kaneko
2017-11-02[bug] really close if the user pushed the close buttonKali Kaneko
2017-11-01[feature] restore with double-clickKali Kaneko
2017-11-01[feature] minimize to systrayKali Kaneko
2017-11-01[docs] document systray in changelogKali Kaneko
- Resolves: #9094
2017-11-01[refactor] refactor status objectKali Kaneko
2017-11-01[feature] add tooltipKali Kaneko
2017-11-01[feature] display vpn status on systrayKali Kaneko
2017-11-01[feat] compile icons into app_rcKali Kaneko
2017-11-01[feat] add new assets for iconsKali Kaneko
2017-11-01[feature] first stub for the systrayKali Kaneko
2017-10-26[bug] strip leap headers before processing the icnomming mailsRuben Pollan
- Resolves: #9030
2017-10-26[feat] add fetch key by fingerprint to keymanagerRuben Pollan
- Resolves: #9023
2017-10-26[bug] make nicknym return key dataRuben Pollan
There was a mismatch on the return values of Nicknym class and the expectations. As most of the code was expecting an OpenPGPKey, but it was returning the json as it came from the nickserver. Now is just returning the key data.
2017-10-25[feat] support pantheon polkit agentKali Kaneko
Apparently, this would allow us to run in Elementary OS. -Resolves: #9076
2017-10-11[bug] fix incorrect imap flags for mailboxesKali Kaneko
for some reason the implementation was returning a list of default flags for every mailbox, that's incorrect according to the spec. we have the plan to implement special mailboxes soon, but for now I'm merging this as it's needed to get nylas prototype working. - Resolves: #9031
2017-10-11[bug] Keep content-type when it is set in message headersSimon Fondrie-Teitler
When content-type was set in the message headers instead of the MIMEPart (e.g. when not using MIMEParts in the message) bitmask would ignore it and add the content as text/plain. This caused problems with Nylas. To fix this, if the message is not Multipart I'm keeping the assumption that everything is going to have the maintype of "text" but copying the subtype from the original message. This also decodes the original message's payload before attaching the old content to the new message to make up for the loss of encoding information. -Resolves: #9064
2017-10-11[style] pep8Kali Kaneko
2017-10-11[bug] import linux specific constants inside if blockkali
2017-10-11[feat] add gpg and pemfile in osx buildskali
These two details were blocking mail service from working in osx.
2017-10-09[bug] properly check for local openvpn pathKali Kaneko
- Resolves: #9099
2017-10-06[style] pep80.10.1Kali Kaneko
2017-10-06[feat] use bonafide Provider object as a singletonRuben Pollan
There was common situations where two provider instances where running in parallel. And was creating weird errors (like getting wrong api_uri) because the bootstrap deferreds were global but the Provider objects not. I don't like much singletons, but I think now is simpler than before. - Resolves: #9073
2017-10-06[bug] use sytem-wide bitmask-root, if foundKali Kaneko
we make a distinction between the system-wide bitmask-root, which should be placed there by the maintainers of whatever packages your distribution uses, and the bitmask-root that is placed by the bundles (using polkit). since the bundles copying over the helper from user-writeable folders is a potential attack vector, we prefer to use the package's version if present. also, if we cannot find either, we abort the launching of the VPN. we've discussed that this might move to the service initialization instead, but I think the cases in which this is needed should be rare. I fix also a corner-case in which we were using getcwd() at import time. if you execute code and then remove the installation path, this will raise a traceback in bitmaskctl. I think it's nicer to catch the error properly when starting.