Age | Commit message (Collapse) | Author | |
---|---|---|---|
2015-09-25 | [refactor] improve readability | Kali Kaneko | |
Improve readability of operations on generic keys, by assigning the class matching the type of key (_wrapper_map[ktype]) at the beginning of each block. in the future, we could pass the type of key (only PGP keys being used at the moment) on initialization of the Keymanager, so we don't have to pass the ktype on each method call. | |||
2015-09-24 | [refactor] refactor key parsing | Kali Kaneko | |
so that it can be tested without needing to instantiate the whole OpenPGPScheme object, that receives a soledad instance. | |||
2015-09-24 | [style] more pep8 fixes | Kali Kaneko | |
2015-09-24 | [style] fix pep8 warnings | Folker Bernitt | |
2015-09-24 | [bug] keep combined file longer in scope | Folker Bernitt | |
In previous commit 9546348c, the combined bundle ca was not long enough in scope and was therefore deleted when it actually was used. Adopted test to check whether file is deleted. | |||
2015-09-24 | [tests] Add regression tests for sign_used | Folker Bernitt | |
Fails if wrong address is passed to the put_key method, or wrong key is marked as sign_used. - Related: #7420 | |||
2015-09-24 | [bug] don't repush a public key with different address | Ruben Pollan | |
During decryption the signing public key was getting repush with a different address as part of the verify usage flagging. - Resolves: https://github.com/pixelated/pixelated-user-agent/issues/466 - Related: #7420 | |||
2015-09-24 | [bug] treat empty string ca_cert_path as None | Folker Bernitt | |
Fixup for 9546348c36. This problem only occurs in test setups where '' is passed to ca_cert_path. | |||
2015-09-22 | [bug] catch request exceptions | Ruben Pollan | |
On fetch_key we were not catching the request exceptions, now they are returned as failure in the deferred as it should. - Related: #7410 | |||
2015-09-21 | [feat] more verbosity in get_key wrong address log | Ruben Pollan | |
2015-09-21 | [style] fix pep8 problems | Ruben Pollan | |
2015-09-18 | [feature] Use ca_bundle when fetching keys by url | Folker Bernitt | |
This is necessary as a fetch by url will talk to remote sites or, for providers with a commercial cert, with a cert that had not been signed with the provider CA. - support lookup of local keys by url for providers with a commercial cert - combine ca_bundle with ca_cert_path if specified - close soledad after each test | |||
2015-09-17 | [feat] add logging to fetch_key | Ruben Pollan | |
In case of failure of fetch_key will be useful to have some logging telling us wich key is fetching. - Related: #7410 | |||
2015-09-16 | [style] pep8 fix | Kali Kaneko | |
2015-09-14 | [feat] use async events api | Kali Kaneko | |
this avoids using a separate thread with tornado ioloop for events client, since we can use twisted reactor. - Resolves: #7274 | |||
2015-08-17 | [style] pep8 fix | Kali Kaneko | |
2015-08-03 | [style] Re-added lambdas to openpgp on keymanager | Bruno Wagner | |
2015-08-03 | [style] Fixed pep8 warnings | Bruno Wagner | |
Fixed pep8 warnings to prepare the keymanager for CI | |||
2015-07-29 | [style] pep8 | Kali Kaneko | |
2015-07-23 | [pkg] avoid choking on latest gnupg version | Kali Kaneko | |
latest gnupg version (from pypi) was '2.0.2-py2.7.egg', which is parsed as a LegacyVersion and therefore breaks the numeric comparison. this is a workaround to allow the sanity check to continue, by comparing just the numeric part of the version string. | |||
2015-06-29 | [style] spelling typo | Kali Kaneko | |
2015-06-27 | [bug] remove the dependency on enum34 | Ruben Pollan | |
* Resolves: #7188 | |||
2015-05-27 | [feat] adapt to new events api on common | Ivan Alejandro | |
- Related: #6359 | |||
2015-04-07 | [doc] added the right link the validation levels documentation | Ruben Pollan | |
The mailing list was linked, but now there is a proper documentation page. - Releases: 0.4.0 | |||
2015-03-30 | [feat] set fetched keys as Weak Chain if they are not from the same domain | Ruben Pollan | |
Nicknym server is authoritative for its own domain, but for others it might retrieve keys from key servers. On keys from the same domain we set the validation level to 'Provider Trust'. For other domains in the email address we set it to 'Weak Chain' as we don't have info about its source. Resolves: #6815 Related: #6718 Releases: 0.4.0 | |||
2015-02-19 | Fetch keys should return KeyNotFound for unknown errors | Ruben Pollan | |
2015-01-15 | Port validation levels to enum34 | Ruben Pollan | |
2015-01-15 | upgrade key when signed by old key | Ruben Pollan | |
2015-01-15 | Upgrade keys if not successfully used and strict high validation level | Ruben Pollan | |
2015-01-15 | On key update merge metadata correctly | Ruben Pollan | |
2015-01-15 | Fix key upgrade on no expiration date and higher validation level | Ruben Pollan | |
2015-01-15 | Return a valid error from gatherResults | Ruben Pollan | |
2014-12-16 | Return the right error on signature verification | Ruben Pollan | |
2014-12-16 | Find the gpg path instead of hard code it | Ruben Pollan | |
2014-12-16 | Fix key generation | Ruben Pollan | |
2014-12-16 | Port to soledad new async API | Ruben Pollan | |
2014-11-25 | Return signing key on signature verification | Ruben Pollan | |
Don't throw an exception if verification fails | |||
2014-11-25 | Use addresses instead of keys on the public API | Ruben Pollan | |
2014-11-25 | Fix test to use correct new signature for openpgp.put_ascii_key(). | drebs | |
2014-11-19 | Fix comments | Ruben Pollan | |
2014-11-19 | Implement multi uid support | Ruben Pollan | |
2014-11-19 | Implement active key document | Ruben Pollan | |
2014-11-10 | Use type instead of tags to get docs in openpgp | Ruben Pollan | |
For that that now the type is the class.__name__ instead of str(class) | |||
2014-11-10 | Implement the new encryption-key soledad document | Ruben Pollan | |
2014-11-06 | Use datetime for key expiration | Ruben Pollan | |
2014-11-04 | Remove outdated comment | Ruben Pollan | |
2014-11-04 | Merge keys when updating an exisiting key | Ruben Pollan | |
This is needed to prevent roll back attacks where the attacker push us to accept a key with an old expiration date that could be use to push an untrusted key when after it's expiration. | |||
2014-10-23 | Update doc string of OpenPGPScheme._temporary_gpgwrapper | Ruben Pollan | |
2014-10-23 | Basic validation levels support | Ruben Pollan | |
2014-10-09 | Implement 'fetch_key' for ascii keys | Ruben Pollan | |
binary keys support is still missing |