summaryrefslogtreecommitdiff
path: root/src
AgeCommit message (Collapse)Author
2017-02-23[bug] pass raw arguments to the default commandsKali Kaneko (leap communications)
2017-02-23[feature] initial port of legacy vpn codeKali Kaneko (leap communications)
non functional at the moment, but started doing some cleanup
2017-02-23[feat] add json print to cliRuben Pollan
To improve scriptability we add '--json' param to the cli. - Resolves: #8771
2017-02-23[feat] eliminate the active user from bonafideRuben Pollan
Active user is now only a concept of the cli. For it we add a ~/.config/leap/bitmaskctl.cfg file. - Resolves: #8769
2017-02-13[feat] simplify mail status in the CLIRuben Pollan
- Resolves: #8770
2017-02-09[feat] add account based keymanagement APIRuben Pollan
- Resolves: #8755
2017-02-09disable authentication for APIKali Kaneko (leap communications)
2017-02-09[style] remove unused signaling new mail methodRuben Pollan
2017-02-09[feat] Get more detailed status report for emailRuben Pollan
- Resolves: #8754
2017-01-31Extract re-decrypt with new key methodTulio Casagrande
Signed-off-by: Ruben Pollan <meskio@sindominio.net>
2017-01-31Propagate errors to the calling methodsTulio Casagrande
Signed-off-by: Ruben Pollan <meskio@sindominio.net>
2017-01-31[docs] update parameters and return namesTulio Casagrande
Signed-off-by: Ruben Pollan <meskio@sindominio.net>
2017-01-31Repeat decryption if signed with attached keyTulio Casagrande
Previously, if an email was signed with a new key, that was also sent as an attachment, the verification of the signature could fail if the only available source of this new key is the attachment ifself. I changed to extract the attachment before adding the leap header, which is responsible for the signed/encrypted flags. Also, if the previous verification failed and a new key was successful imported, it's going to decrypt the original email again, just to update the verify status. Signed-off-by: Ruben Pollan <meskio@sindominio.net>
2017-01-31Indicate a successful/failure OpenPGP header importTulio Casagrande
Signed-off-by: Ruben Pollan <meskio@sindominio.net>
2017-01-31Extract method for easy reuseTulio Casagrande
Signed-off-by: Ruben Pollan <meskio@sindominio.net>
2017-01-31Add missing errbackTulio Casagrande
Signed-off-by: Ruben Pollan <meskio@sindominio.net>
2017-01-31Remove unused parameterTulio Casagrande
Signed-off-by: Ruben Pollan <meskio@sindominio.net>
2017-01-26Check validity of key signatureZara Gebru
Check if a new fetched key was signed by a old key with the same address. Please do not merge before: https://github.com/isislovecruft/python-gnupg/pull/150 - Resolves #8112
2017-01-19rename some varsZara Gebru
2016-12-29[docs] fix typo in the header nameKali Kaneko (leap communications)
2016-12-29[bug] avoid unicode conversion bugKali Kaneko (leap communications)
encode to ascii any parameter passed as unicode.
2016-12-29[docs] fix typosKali Kaneko (leap communications)
2016-12-29[bug] fix the logout callKali Kaneko (leap communications)
if user attempts to logout before the incoming multiservice has an entry, there will be a KeyError raised on the MultiService.getServiceNamed() call, which is improperly reported as a confusing error message in the api return call. by catching the KeyError, we make sure that the logout call can terminate properly.
2016-12-29[feature] better param error handling in rest apiKali Kaneko (leap communications)
2016-12-29[feature] pass local auth token after authentication succeedsKali Kaneko (leap communications)
2016-12-29[refactor] reorganize APIKali Kaneko (leap communications)
so that whitelisting doesn't have to peek into the data. added more documentation and some tests stubs too.
2016-12-29[refactor] move web service to its own submoduleKali Kaneko (leap communications)
2016-12-29[feature] local session serviceKali Kaneko (leap communications)
2016-12-29[feature] authentication classes and testsKali Kaneko (leap communications)
2016-12-29[refactor] remove duplication of the bitmask.js libraryKali Kaneko (leap communications)
2016-12-26[bug] do not hang if further config needs authKali Kaneko (leap communications)
2016-12-26[style] remove unneeded importKali Kaneko (leap communications)
2016-12-26[feat] allow --pass on auth too, for testsKali Kaneko (leap communications)
undocumented because we don't want users messing with the option
2016-12-26[feat] allow to use a password for testsKali Kaneko (leap communications)
the password option shouldn't appear in the help message though, to discourage users to use it as if it was a regular cli feature.
2016-12-07[bug] always set verbose flag for bundlesKali Kaneko (leap communications)
2016-12-07[feature] add icon to the windowKali Kaneko (leap communications)
- Resolves: #8676
2016-11-30[bug] make srp token changes propagate to nicknym objectKali Kaneko (leap communications)
the token is set when we get the srp token in the keymanager service, but it wasn't been propagated properly to the internal nicknym object that was refactored recently. here I make the setter write the same token to both keymanager itself and the nicknym. some little additional refactors: - move gpg initialization to a helper method in this way it becomes easier to stub the soledad and keymanager components, for testing. - name nicknym token as publicly visible, since i'm accessing it from the keymanager object. - Resolves: #8651
2016-11-22[bug] use the bundled gpg binaryKali Kaneko (leap communications)
the bundle was trying to get the gpg binary from the config folder instead of the bundled binary.
2016-11-22[tests] fix keymanager tests after refactor and mergeZara Gebru
- some pep8 problems - some confusion with old and new code after merging from old keymanager
2016-11-22[tests] fix some refresher tests after the refactorKali Kaneko (leap communications)
disabled some tests that were failing, for some reason the twisted logger doesn't want to be patched? besides, I don't think it's a good idea to rely on log information for tests. what is it really that we were trying to test there?
2016-11-22[refactor] use qualified exceptionsKali Kaneko (leap communications)
2016-11-22[feature] keymanager: background update keysZara Gebru
Port of the original commit: 8f1fe8dd4a54fd2bdda2fc78c339ce9b3d0fc331 by Zara Gebru that introduced updating keys in the background. This was made in the legacy leapcode/keymanager repo, but was lost in the merge to the unified bitmask-dev. Original commit message follows: -------------------------------- - refresh random key in random time - add get key by fingerprint - refactor nicknym methods to own file - tests - note this do not include a check for revoked key, since that need some changes in gnupg - Related: #6089
2016-11-18[refactor] defer_encryption is gone with latest soledadKali Kaneko (leap communications)
2016-11-11[bug] do not always print feedback from start commandKali Kaneko (leap communications)
2016-11-11[bug] return early from bonafide.get_providerKali Kaneko (leap communications)
otherwise, the call from the rest API hangs forever because the authentication has not happened and not all the configs have been downloaded. - Resolves: #8576
2016-11-11[bug] get user parameter in the key commandsKali Kaneko (leap communications)
This has been previously encapsulated in a dict, and the commands were not modified accordingly. I'm adding some very basic test for the KeymanagerService public api contract. - Resolves: #8577
2016-11-11[bug] fix cli autostartKali Kaneko (leap communications)
this reverts the refactoring made at 596f1f8 it seems it is now allowed to call a function that yields from inside as part of an inline deferred.
2016-11-09[feature] serve UI as an hidden serviceKali Kaneko (leap communications)
you need to configure onion = True in the services config. for sure, this is gonna be more interesting when we ship pixelated. but for now I thought it can be handy for testing ui changes: no need to bundle, just use your tor browser :) still need to try to serve imap/smtp over the onion service. kudos to meejah for this super-usable library!
2016-11-09[ci] generate bundle from gitlab runnerKali Kaneko (leap communications)
some hacks needed, it seems pyinstaller is choking again on namespace packages for some reason that is beyond my current comprenhension.
2016-11-06[feat] add '-v' optiondrebs