summaryrefslogtreecommitdiff
path: root/src
AgeCommit message (Collapse)Author
2017-02-27[test] pass a fake shared db to soledad during testsdrebs
2017-02-27[refactor] access soledad client offline state directlydrebs
2017-02-27[refactor] use new soledad client parameterdrebs
- Resolves: #8721
2017-02-24[bug] fix vpn command after cli config refactorKali Kaneko (leap communications)
2017-02-24[feature] require authentication token for apiKali Kaneko (leap communications)
implements a global auth token for the app. this token is written to .config/leap/authtoken, and passed to the anchor part of the landing URI when opening the index resource by the browser. - Resolves: #8765
2017-02-23[bug] fix bad mergeKali Kaneko (leap communications)
2017-02-23[pkg] add osx helpersKali Kaneko (leap communications)
2017-02-23[bug] rename one of the managers to TunnelManagerKali Kaneko (leap communications)
otherwise there's a name collision with the former EIPManager
2017-02-23[refactor] complete eip -> vpn rename in coreKali Kaneko (leap communications)
2017-02-23[refactor] rename eip to vpnKali Kaneko (leap communications)
2017-02-23[style] pep8Kali Kaneko (leap communications)
2017-02-23[docs] document the API/cliKali Kaneko (leap communications)
2017-02-23[feature] hard restarts upon ping-restart receivedKali Kaneko (leap communications)
2017-02-23[feature] add up/down traffic in statusKali Kaneko (leap communications)
2017-02-23[feature] add bytes2human conversionKali Kaneko (leap communications)
2017-02-23[feature] parse statusKali Kaneko (leap communications)
- simple status parsing - add separate firewall status - set status for abnormal termination
2017-02-23[feature] eip start/stop workingKali Kaneko (leap communications)
2017-02-23[feature] add install/uninstall command for helpersKali Kaneko (leap communications)
2017-02-23[bug] fix parsing of vpn statusKali Kaneko (leap communications)
2017-02-23[bug] fix bitmask-root pathKali Kaneko (leap communications)
2017-02-23[refactor] sort out some importsKali Kaneko (leap communications)
2017-02-23[feature] new commands: get_certKali Kaneko (leap communications)
2017-02-23[refactor] split vpn control into some modulesKali Kaneko (leap communications)
2017-02-23[refactor] remove unneeded functionKali Kaneko (leap communications)
2017-02-23[refactor] minor renamingKali Kaneko (leap communications)
2017-02-23[feature] enable vpn serviceKali Kaneko (leap communications)
2017-02-23[bug] pass raw arguments to the default commandsKali Kaneko (leap communications)
2017-02-23[feature] initial port of legacy vpn codeKali Kaneko (leap communications)
non functional at the moment, but started doing some cleanup
2017-02-23[feat] add json print to cliRuben Pollan
To improve scriptability we add '--json' param to the cli. - Resolves: #8771
2017-02-23[feat] eliminate the active user from bonafideRuben Pollan
Active user is now only a concept of the cli. For it we add a ~/.config/leap/bitmaskctl.cfg file. - Resolves: #8769
2017-02-13[feat] simplify mail status in the CLIRuben Pollan
- Resolves: #8770
2017-02-09[feat] add account based keymanagement APIRuben Pollan
- Resolves: #8755
2017-02-09disable authentication for APIKali Kaneko (leap communications)
2017-02-09[style] remove unused signaling new mail methodRuben Pollan
2017-02-09[feat] Get more detailed status report for emailRuben Pollan
- Resolves: #8754
2017-01-31Extract re-decrypt with new key methodTulio Casagrande
Signed-off-by: Ruben Pollan <meskio@sindominio.net>
2017-01-31Propagate errors to the calling methodsTulio Casagrande
Signed-off-by: Ruben Pollan <meskio@sindominio.net>
2017-01-31[docs] update parameters and return namesTulio Casagrande
Signed-off-by: Ruben Pollan <meskio@sindominio.net>
2017-01-31Repeat decryption if signed with attached keyTulio Casagrande
Previously, if an email was signed with a new key, that was also sent as an attachment, the verification of the signature could fail if the only available source of this new key is the attachment ifself. I changed to extract the attachment before adding the leap header, which is responsible for the signed/encrypted flags. Also, if the previous verification failed and a new key was successful imported, it's going to decrypt the original email again, just to update the verify status. Signed-off-by: Ruben Pollan <meskio@sindominio.net>
2017-01-31Indicate a successful/failure OpenPGP header importTulio Casagrande
Signed-off-by: Ruben Pollan <meskio@sindominio.net>
2017-01-31Extract method for easy reuseTulio Casagrande
Signed-off-by: Ruben Pollan <meskio@sindominio.net>
2017-01-31Add missing errbackTulio Casagrande
Signed-off-by: Ruben Pollan <meskio@sindominio.net>
2017-01-31Remove unused parameterTulio Casagrande
Signed-off-by: Ruben Pollan <meskio@sindominio.net>
2017-01-26Check validity of key signatureZara Gebru
Check if a new fetched key was signed by a old key with the same address. Please do not merge before: https://github.com/isislovecruft/python-gnupg/pull/150 - Resolves #8112
2017-01-19rename some varsZara Gebru
2016-12-29[docs] fix typo in the header nameKali Kaneko (leap communications)
2016-12-29[bug] avoid unicode conversion bugKali Kaneko (leap communications)
encode to ascii any parameter passed as unicode.
2016-12-29[docs] fix typosKali Kaneko (leap communications)
2016-12-29[bug] fix the logout callKali Kaneko (leap communications)
if user attempts to logout before the incoming multiservice has an entry, there will be a KeyError raised on the MultiService.getServiceNamed() call, which is improperly reported as a confusing error message in the api return call. by catching the KeyError, we make sure that the logout call can terminate properly.
2016-12-29[feature] better param error handling in rest apiKali Kaneko (leap communications)