Age | Commit message (Collapse) | Author | |
---|---|---|---|
2017-12-20 | [refactor] rename API add_msg to msg_add | Ruben Pollan | |
To have consistency with all API calls related to messages and start all of them with msg_* | |||
2017-12-09 | [bug] remove stuck_bootstrap deferred from Provider | Ruben Pollan | |
This deferred was not used anywhere, but it was called twice. Provider is a singleton so multiple logins into the same provider where producing it to be called mor than once. - Resolves: #9171 | |||
2017-12-08 | [style] pep8 | Kali Kaneko | |
2017-12-08 | [docs] add comment about python interpreter | Kali Kaneko | |
2017-12-08 | [pkg] copy provider certificates on bundles | Kali Kaneko | |
2017-12-08 | [bug] remove hardcoded path | Kali Kaneko | |
2017-12-08 | [feat] osx systray with pyqt5 | Kali Kaneko | |
2017-12-07 | [feat] update bitmask-root if needed | Ruben Pollan | |
Chech the hash of the installed bitmask root and sign as not installed if doesn't match the one we have in the bundle. Also for running bitmask-root, if there is more than one (in /usr/local/sbin and /usr/sbin) run the one with higher version number. - Resolves: #9020 | |||
2017-12-07 | [feat] add provider pinning | Ruben Pollan | |
Pin the provider.json and the ca cert for the public providers. - Resolves: #9074 | |||
2017-12-05 | [bug] change bitmask-root to work with dnsmasq | elijah | |
2017-12-03 | [feat] extend the expiration of private keys if needed | Ruben Pollan | |
Check on every fetch of the private key if the expiration is less than two months before it expire. And extend the expiration if needed. - Resolves: #8217 | |||
2017-12-03 | [refactor] remove rengenerate key | Ruben Pollan | |
We are not planning to regenerate keys (for now), only to extend the expiration date. | |||
2017-12-03 | [feat] stop resetting signs used after key regeneration | Tulio Casagrande | |
We were considering to reset the sign_used flag to force the new key to be resend as attachment in forthcoming emails. Although, this is not a good solution, because we'll lose information about which keys the client has signed. | |||
2017-12-03 | [feat] send public key as attachment on every email | Tulio Casagrande | |
Previously, we were sending the key attached as long as the contact hasn't replied back. But with new key replace scenarios, we need to updated the contact keyring with the new key. We can implement autocrypt or similar in the future, but for now, let's send the key attached on every email. | |||
2017-12-03 | [bug] remove change_key_expiration from the API | Tulio Casagrande | |
This was intended to offer the option of only extend the old key and not change it for a new one. However, we don't plan to use this behavior anymore. | |||
2017-12-03 | [bug] specify _get_inactive_private_keys as a private method | Tulio Casagrande | |
2017-12-03 | [refactor] rename key extension to expiration | Tulio Casagrande | |
This changes reflect python-gnupg naming. With @aarni | |||
2017-12-03 | [bug] fix log of the key being fetched | Tulio Casagrande | |
2017-12-03 | [bug] remove key generation event from regenerate_key | Tulio Casagrande | |
The KEYMANAGER_FINISHED_KEY_GENERATION event is used to send a welcome mail to the users, which was causing a new welcome mail when regenerating a key. We removed the event from regenerate_key method. We should implement a KEYMANAGER_FINISHED_KEY_REGENERATION event when it's needed. | |||
2017-12-03 | [bug] change edit-key to use fingerprint as param | Tulio Casagrande | |
python-gnupg doesn't accept address as parameter for --edit-key | |||
2017-12-03 | [feat] expired public key are remotely fetched if expired | NavaL | |
- private key is not allowed to be fetched remotely - fetch_remote needs to be specifically set - if a new key is fetched (ie different KeyID), the validation rule applies | |||
2017-12-03 | [style] refactoring: renaming methods/variables | NavaL | |
2017-12-03 | [bug] sign_used flag is reset for all public keys when the key expiration ↵ | NavaL | |
date is extended - this is required so that the key is re-attached to the first outgoing email to all users who already have the expired key. | |||
2017-12-03 | [feat] expired public key are remotely fetched if expired | NavaL | |
- private key is not allowed to be fetched remotely - fetch_remote needs to be specifically set - if a new key is fetched (ie different KeyID), the validation rule applies | |||
2017-12-03 | [bug] key can tell if it should be renewed | NavaL | |
2017-12-03 | [bug] decryption will be tried for all inactive keys | NavaL | |
2017-12-03 | [feat] decryption interoperability, when the current key pair | NavaL | |
is renewed - there is only one private inactive key that is the key expiring last among all inactive keys - if there is an inactive key, decryption with it, is tried if it fails with the current active key. | |||
2017-12-03 | [feat] supplying gpgbinary when building gpg key from dict | NavaL | |
2017-12-03 | [feat] reset sign_used flag after regenerating key pair | NavaL | |
- this flag is used by leap.mail to attach the new key | |||
2017-12-03 | [feat] first phase of key regeneration | NavaL | |
- if current key pair is expired, it'll be extended for a day first - new key pair will be signed by the old key | |||
2017-12-03 | [feat] add key expiry date extension in keymanager | NavaL | |
- extends key pair (unlocked from soledad) - extension period is counted from key creation date | |||
2017-11-30 | [refactor] use /var/run for osx helper socket | Kali Kaneko | |
2017-11-03 | [feature] set windows title | Kali Kaneko | |
2017-11-02 | [style] fix formatting | Kali Kaneko | |
2017-11-02 | [feature] support deepin polkit agent | Kali Kaneko | |
-Resolves: #9119 | |||
2017-11-02 | [docs] add todo about proper event integration with systray | Kali Kaneko | |
2017-11-02 | [bug] really close if the user pushed the close button | Kali Kaneko | |
2017-11-01 | [feature] restore with double-click | Kali Kaneko | |
2017-11-01 | [feature] minimize to systray | Kali Kaneko | |
2017-11-01 | [docs] document systray in changelog | Kali Kaneko | |
- Resolves: #9094 | |||
2017-11-01 | [refactor] refactor status object | Kali Kaneko | |
2017-11-01 | [feature] add tooltip | Kali Kaneko | |
2017-11-01 | [feature] display vpn status on systray | Kali Kaneko | |
2017-11-01 | [feat] compile icons into app_rc | Kali Kaneko | |
2017-11-01 | [feat] add new assets for icons | Kali Kaneko | |
2017-11-01 | [feature] first stub for the systray | Kali Kaneko | |
2017-10-26 | [bug] strip leap headers before processing the icnomming mails | Ruben Pollan | |
- Resolves: #9030 | |||
2017-10-26 | [feat] add fetch key by fingerprint to keymanager | Ruben Pollan | |
- Resolves: #9023 | |||
2017-10-26 | [bug] make nicknym return key data | Ruben Pollan | |
There was a mismatch on the return values of Nicknym class and the expectations. As most of the code was expecting an OpenPGPKey, but it was returning the json as it came from the nickserver. Now is just returning the key data. | |||
2017-10-25 | [feat] support pantheon polkit agent | Kali Kaneko | |
Apparently, this would allow us to run in Elementary OS. -Resolves: #9076 |