Age | Commit message (Collapse) | Author | |
---|---|---|---|
2017-03-03 | [feat] mail status will only work for a valid userid | Ruben Pollan | |
We used to return the system status if no userid is provided. We don't do it anymore, now is only userid based. - Resolves: #8785 | |||
2017-02-27 | [test] pass a fake shared db to soledad during tests | drebs | |
2017-02-27 | [refactor] access soledad client offline state directly | drebs | |
2017-02-27 | [refactor] use new soledad client parameter | drebs | |
- Resolves: #8721 | |||
2017-02-24 | [bug] fix vpn command after cli config refactor | Kali Kaneko (leap communications) | |
2017-02-24 | [feature] require authentication token for api | Kali Kaneko (leap communications) | |
implements a global auth token for the app. this token is written to .config/leap/authtoken, and passed to the anchor part of the landing URI when opening the index resource by the browser. - Resolves: #8765 | |||
2017-02-23 | [bug] fix bad merge | Kali Kaneko (leap communications) | |
2017-02-23 | [pkg] add osx helpers | Kali Kaneko (leap communications) | |
2017-02-23 | [bug] rename one of the managers to TunnelManager | Kali Kaneko (leap communications) | |
otherwise there's a name collision with the former EIPManager | |||
2017-02-23 | [refactor] complete eip -> vpn rename in core | Kali Kaneko (leap communications) | |
2017-02-23 | [refactor] rename eip to vpn | Kali Kaneko (leap communications) | |
2017-02-23 | [style] pep8 | Kali Kaneko (leap communications) | |
2017-02-23 | [docs] document the API/cli | Kali Kaneko (leap communications) | |
2017-02-23 | [feature] hard restarts upon ping-restart received | Kali Kaneko (leap communications) | |
2017-02-23 | [feature] add up/down traffic in status | Kali Kaneko (leap communications) | |
2017-02-23 | [feature] add bytes2human conversion | Kali Kaneko (leap communications) | |
2017-02-23 | [feature] parse status | Kali Kaneko (leap communications) | |
- simple status parsing - add separate firewall status - set status for abnormal termination | |||
2017-02-23 | [feature] eip start/stop working | Kali Kaneko (leap communications) | |
2017-02-23 | [feature] add install/uninstall command for helpers | Kali Kaneko (leap communications) | |
2017-02-23 | [bug] fix parsing of vpn status | Kali Kaneko (leap communications) | |
2017-02-23 | [bug] fix bitmask-root path | Kali Kaneko (leap communications) | |
2017-02-23 | [refactor] sort out some imports | Kali Kaneko (leap communications) | |
2017-02-23 | [feature] new commands: get_cert | Kali Kaneko (leap communications) | |
2017-02-23 | [refactor] split vpn control into some modules | Kali Kaneko (leap communications) | |
2017-02-23 | [refactor] remove unneeded function | Kali Kaneko (leap communications) | |
2017-02-23 | [refactor] minor renaming | Kali Kaneko (leap communications) | |
2017-02-23 | [feature] enable vpn service | Kali Kaneko (leap communications) | |
2017-02-23 | [bug] pass raw arguments to the default commands | Kali Kaneko (leap communications) | |
2017-02-23 | [feature] initial port of legacy vpn code | Kali Kaneko (leap communications) | |
non functional at the moment, but started doing some cleanup | |||
2017-02-23 | [feat] add json print to cli | Ruben Pollan | |
To improve scriptability we add '--json' param to the cli. - Resolves: #8771 | |||
2017-02-23 | [feat] eliminate the active user from bonafide | Ruben Pollan | |
Active user is now only a concept of the cli. For it we add a ~/.config/leap/bitmaskctl.cfg file. - Resolves: #8769 | |||
2017-02-13 | [feat] simplify mail status in the CLI | Ruben Pollan | |
- Resolves: #8770 | |||
2017-02-09 | [feat] add account based keymanagement API | Ruben Pollan | |
- Resolves: #8755 | |||
2017-02-09 | disable authentication for API | Kali Kaneko (leap communications) | |
2017-02-09 | [style] remove unused signaling new mail method | Ruben Pollan | |
2017-02-09 | [feat] Get more detailed status report for email | Ruben Pollan | |
- Resolves: #8754 | |||
2017-01-31 | Extract re-decrypt with new key method | Tulio Casagrande | |
Signed-off-by: Ruben Pollan <meskio@sindominio.net> | |||
2017-01-31 | Propagate errors to the calling methods | Tulio Casagrande | |
Signed-off-by: Ruben Pollan <meskio@sindominio.net> | |||
2017-01-31 | [docs] update parameters and return names | Tulio Casagrande | |
Signed-off-by: Ruben Pollan <meskio@sindominio.net> | |||
2017-01-31 | Repeat decryption if signed with attached key | Tulio Casagrande | |
Previously, if an email was signed with a new key, that was also sent as an attachment, the verification of the signature could fail if the only available source of this new key is the attachment ifself. I changed to extract the attachment before adding the leap header, which is responsible for the signed/encrypted flags. Also, if the previous verification failed and a new key was successful imported, it's going to decrypt the original email again, just to update the verify status. Signed-off-by: Ruben Pollan <meskio@sindominio.net> | |||
2017-01-31 | Indicate a successful/failure OpenPGP header import | Tulio Casagrande | |
Signed-off-by: Ruben Pollan <meskio@sindominio.net> | |||
2017-01-31 | Extract method for easy reuse | Tulio Casagrande | |
Signed-off-by: Ruben Pollan <meskio@sindominio.net> | |||
2017-01-31 | Add missing errback | Tulio Casagrande | |
Signed-off-by: Ruben Pollan <meskio@sindominio.net> | |||
2017-01-31 | Remove unused parameter | Tulio Casagrande | |
Signed-off-by: Ruben Pollan <meskio@sindominio.net> | |||
2017-01-26 | Check validity of key signature | Zara Gebru | |
Check if a new fetched key was signed by a old key with the same address. Please do not merge before: https://github.com/isislovecruft/python-gnupg/pull/150 - Resolves #8112 | |||
2017-01-19 | rename some vars | Zara Gebru | |
2016-12-29 | [docs] fix typo in the header name | Kali Kaneko (leap communications) | |
2016-12-29 | [bug] avoid unicode conversion bug | Kali Kaneko (leap communications) | |
encode to ascii any parameter passed as unicode. | |||
2016-12-29 | [docs] fix typos | Kali Kaneko (leap communications) | |
2016-12-29 | [bug] fix the logout call | Kali Kaneko (leap communications) | |
if user attempts to logout before the incoming multiservice has an entry, there will be a KeyError raised on the MultiService.getServiceNamed() call, which is improperly reported as a confusing error message in the api return call. by catching the KeyError, we make sure that the logout call can terminate properly. |