summaryrefslogtreecommitdiff
path: root/src
AgeCommit message (Collapse)Author
2017-02-23[bug] fix parsing of vpn statusKali Kaneko (leap communications)
2017-02-23[bug] fix bitmask-root pathKali Kaneko (leap communications)
2017-02-23[refactor] sort out some importsKali Kaneko (leap communications)
2017-02-23[feature] new commands: get_certKali Kaneko (leap communications)
2017-02-23[refactor] split vpn control into some modulesKali Kaneko (leap communications)
2017-02-23[refactor] remove unneeded functionKali Kaneko (leap communications)
2017-02-23[refactor] minor renamingKali Kaneko (leap communications)
2017-02-23[feature] enable vpn serviceKali Kaneko (leap communications)
2017-02-23[bug] pass raw arguments to the default commandsKali Kaneko (leap communications)
2017-02-23[feature] initial port of legacy vpn codeKali Kaneko (leap communications)
non functional at the moment, but started doing some cleanup
2017-02-23[feat] add json print to cliRuben Pollan
To improve scriptability we add '--json' param to the cli. - Resolves: #8771
2017-02-23[feat] eliminate the active user from bonafideRuben Pollan
Active user is now only a concept of the cli. For it we add a ~/.config/leap/bitmaskctl.cfg file. - Resolves: #8769
2017-02-13[feat] simplify mail status in the CLIRuben Pollan
- Resolves: #8770
2017-02-09[feat] add account based keymanagement APIRuben Pollan
- Resolves: #8755
2017-02-09disable authentication for APIKali Kaneko (leap communications)
2017-02-09[style] remove unused signaling new mail methodRuben Pollan
2017-02-09[feat] Get more detailed status report for emailRuben Pollan
- Resolves: #8754
2017-01-31Extract re-decrypt with new key methodTulio Casagrande
Signed-off-by: Ruben Pollan <meskio@sindominio.net>
2017-01-31Propagate errors to the calling methodsTulio Casagrande
Signed-off-by: Ruben Pollan <meskio@sindominio.net>
2017-01-31[docs] update parameters and return namesTulio Casagrande
Signed-off-by: Ruben Pollan <meskio@sindominio.net>
2017-01-31Repeat decryption if signed with attached keyTulio Casagrande
Previously, if an email was signed with a new key, that was also sent as an attachment, the verification of the signature could fail if the only available source of this new key is the attachment ifself. I changed to extract the attachment before adding the leap header, which is responsible for the signed/encrypted flags. Also, if the previous verification failed and a new key was successful imported, it's going to decrypt the original email again, just to update the verify status. Signed-off-by: Ruben Pollan <meskio@sindominio.net>
2017-01-31Indicate a successful/failure OpenPGP header importTulio Casagrande
Signed-off-by: Ruben Pollan <meskio@sindominio.net>
2017-01-31Extract method for easy reuseTulio Casagrande
Signed-off-by: Ruben Pollan <meskio@sindominio.net>
2017-01-31Add missing errbackTulio Casagrande
Signed-off-by: Ruben Pollan <meskio@sindominio.net>
2017-01-31Remove unused parameterTulio Casagrande
Signed-off-by: Ruben Pollan <meskio@sindominio.net>
2017-01-26Check validity of key signatureZara Gebru
Check if a new fetched key was signed by a old key with the same address. Please do not merge before: https://github.com/isislovecruft/python-gnupg/pull/150 - Resolves #8112
2017-01-19rename some varsZara Gebru
2016-12-29[docs] fix typo in the header nameKali Kaneko (leap communications)
2016-12-29[bug] avoid unicode conversion bugKali Kaneko (leap communications)
encode to ascii any parameter passed as unicode.
2016-12-29[docs] fix typosKali Kaneko (leap communications)
2016-12-29[bug] fix the logout callKali Kaneko (leap communications)
if user attempts to logout before the incoming multiservice has an entry, there will be a KeyError raised on the MultiService.getServiceNamed() call, which is improperly reported as a confusing error message in the api return call. by catching the KeyError, we make sure that the logout call can terminate properly.
2016-12-29[feature] better param error handling in rest apiKali Kaneko (leap communications)
2016-12-29[feature] pass local auth token after authentication succeedsKali Kaneko (leap communications)
2016-12-29[refactor] reorganize APIKali Kaneko (leap communications)
so that whitelisting doesn't have to peek into the data. added more documentation and some tests stubs too.
2016-12-29[refactor] move web service to its own submoduleKali Kaneko (leap communications)
2016-12-29[feature] local session serviceKali Kaneko (leap communications)
2016-12-29[feature] authentication classes and testsKali Kaneko (leap communications)
2016-12-29[refactor] remove duplication of the bitmask.js libraryKali Kaneko (leap communications)
2016-12-26[bug] do not hang if further config needs authKali Kaneko (leap communications)
2016-12-26[style] remove unneeded importKali Kaneko (leap communications)
2016-12-26[feat] allow --pass on auth too, for testsKali Kaneko (leap communications)
undocumented because we don't want users messing with the option
2016-12-26[feat] allow to use a password for testsKali Kaneko (leap communications)
the password option shouldn't appear in the help message though, to discourage users to use it as if it was a regular cli feature.
2016-12-07[bug] always set verbose flag for bundlesKali Kaneko (leap communications)
2016-12-07[feature] add icon to the windowKali Kaneko (leap communications)
- Resolves: #8676
2016-11-30[bug] make srp token changes propagate to nicknym objectKali Kaneko (leap communications)
the token is set when we get the srp token in the keymanager service, but it wasn't been propagated properly to the internal nicknym object that was refactored recently. here I make the setter write the same token to both keymanager itself and the nicknym. some little additional refactors: - move gpg initialization to a helper method in this way it becomes easier to stub the soledad and keymanager components, for testing. - name nicknym token as publicly visible, since i'm accessing it from the keymanager object. - Resolves: #8651
2016-11-22[bug] use the bundled gpg binaryKali Kaneko (leap communications)
the bundle was trying to get the gpg binary from the config folder instead of the bundled binary.
2016-11-22[tests] fix keymanager tests after refactor and mergeZara Gebru
- some pep8 problems - some confusion with old and new code after merging from old keymanager
2016-11-22[tests] fix some refresher tests after the refactorKali Kaneko (leap communications)
disabled some tests that were failing, for some reason the twisted logger doesn't want to be patched? besides, I don't think it's a good idea to rely on log information for tests. what is it really that we were trying to test there?
2016-11-22[refactor] use qualified exceptionsKali Kaneko (leap communications)
2016-11-22[feature] keymanager: background update keysZara Gebru
Port of the original commit: 8f1fe8dd4a54fd2bdda2fc78c339ce9b3d0fc331 by Zara Gebru that introduced updating keys in the background. This was made in the legacy leapcode/keymanager repo, but was lost in the merge to the unified bitmask-dev. Original commit message follows: -------------------------------- - refresh random key in random time - add get key by fingerprint - refactor nicknym methods to own file - tests - note this do not include a check for revoked key, since that need some changes in gnupg - Related: #6089