summaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2015-09-24[style] more pep8 fixesKali Kaneko
2015-09-24[style] fix pep8 warningsFolker Bernitt
2015-09-24[bug] keep combined file longer in scopeFolker Bernitt
In previous commit 9546348c, the combined bundle ca was not long enough in scope and was therefore deleted when it actually was used. Adopted test to check whether file is deleted.
2015-09-24[tests] Add regression tests for sign_usedFolker Bernitt
Fails if wrong address is passed to the put_key method, or wrong key is marked as sign_used. - Related: #7420
2015-09-24[bug] don't repush a public key with different addressRuben Pollan
During decryption the signing public key was getting repush with a different address as part of the verify usage flagging. - Resolves: https://github.com/pixelated/pixelated-user-agent/issues/466 - Related: #7420
2015-09-24Merge branch 'fix_empty_string_ca_certs' into developRuben Pollan
2015-09-24[bug] treat empty string ca_cert_path as NoneFolker Bernitt
Fixup for 9546348c36. This problem only occurs in test setups where '' is passed to ca_cert_path.
2015-09-22[bug] catch request exceptionsRuben Pollan
On fetch_key we were not catching the request exceptions, now they are returned as failure in the deferred as it should. - Related: #7410
2015-09-21[feat] more verbosity in get_key wrong address logRuben Pollan
2015-09-21[style] fix pep8 problemsRuben Pollan
2015-09-18[feature] Use ca_bundle when fetching keys by urlFolker Bernitt
This is necessary as a fetch by url will talk to remote sites or, for providers with a commercial cert, with a cert that had not been signed with the provider CA. - support lookup of local keys by url for providers with a commercial cert - combine ca_bundle with ca_cert_path if specified - close soledad after each test
2015-09-17[feat] add logging to fetch_keyRuben Pollan
In case of failure of fetch_key will be useful to have some logging telling us wich key is fetching. - Related: #7410
2015-09-16[style] pep8 fixKali Kaneko
2015-09-14[feat] use async events apiKali Kaneko
this avoids using a separate thread with tornado ioloop for events client, since we can use twisted reactor. - Resolves: #7274
2015-09-09[docs] beautify links to docsKali Kaneko
2015-09-09[docs] update link to nicknym docsKali Kaneko
2015-09-09[docs] add downloads infoKali Kaneko
2015-09-09[docs] fix broken pypi badgeKali Kaneko
2015-08-26[pkg] update changelog0.4.2Ivan Alejandro
2015-08-17[style] pep8 fixesKali Kaneko
2015-08-17[style] pep8 fixKali Kaneko
2015-08-17[tests] add pep8/flake8 ignoresKali Kaneko
2015-08-06[feat] WHEELHOUSE can be a url + --use-leap-wheelsParménides GV
--use-leap-wheels sets --trusted-host (remove it when we have a proper cert) and WHEELHOUSE to https://ftp.lizard.leap.se Until we get ftp.lizard cname, use lizard as the wheels server. Related: #7339
2015-08-03[style] Re-added lambdas to openpgp on keymanagerBruno Wagner
2015-08-03[tests] Added requirements-latest to help HEAD developmentBruno Wagner
That's an easy way to setup the latest develop without depending on manually downloading the dependencies
2015-08-03[style] Fixed pep8 warningsBruno Wagner
Fixed pep8 warnings to prepare the keymanager for CI
2015-08-03[feat] use wheels to install dependenciesParménides GV
generate_wheels uses $WHEELHOUSE to generate and store the wheels for requirements.pip and requirements-testing.pip (if it exists). pip_install_requirements.sh installs requirements.pip from them if possible (if not, then it fetches them from pypi) or, if passed the --testing flag, it installs requirements-testing.pip. Related: #7327
2015-07-29[style] pep8Kali Kaneko
2015-07-28[tests] add pep8 to requirements-testingKali Kaneko
2015-07-27[pkg] add AUTHORS file + one-liner to generate itKali Kaneko
2015-07-27[pkg] add script to install base requirementsKali Kaneko
- update pip - install base reqs
2015-07-27[pkg] comment the line until the version string is fixedParménides GV
otherwise, the tests will be pulling outdated versions from pypi.
2015-07-23[pkg] avoid choking on latest gnupg versionKali Kaneko
latest gnupg version (from pypi) was '2.0.2-py2.7.egg', which is parsed as a LegacyVersion and therefore breaks the numeric comparison. this is a workaround to allow the sanity check to continue, by comparing just the numeric part of the version string.
2015-07-22[pkg] do not add leap deps in develop modeKali Kaneko
it is the responsibility of the developer to install them now - Related: #7288
2015-07-22[style] add the magnificient leap commit templateKali Kaneko
2015-07-22[pkg] separate leap requirementsKali Kaneko
this is part of a process to make the setup of the development mode less troublesome. from now on, setting up a virtualenv in pure development mode will be as easy as telling pip to just install the external dependencies:: pip install -r pkg/requirements.pip and traversing all the leap repos for the needed leap dependencies doing:: python setup.py develop - Related: #7288
2015-07-10[pkg] fold in changes0.4.1Ivan Alejandro
2015-06-29[style] spelling typoKali Kaneko
2015-06-27[bug] remove the dependency on enum34Ruben Pollan
* Resolves: #7188
2015-06-08[pkg] bump dependencies0.4.0release/0.4.xIvan Alejandro
2015-06-08[pkg] fold in changesIvan Alejandro
2015-05-27[feat] adapt to new events api on commonIvan Alejandro
- Related: #6359
2015-04-07[doc] added the right link the validation levels documentationRuben Pollan
The mailing list was linked, but now there is a proper documentation page. - Releases: 0.4.0
2015-03-30[feat] set fetched keys as Weak Chain if they are not from the same domainRuben Pollan
Nicknym server is authoritative for its own domain, but for others it might retrieve keys from key servers. On keys from the same domain we set the validation level to 'Provider Trust'. For other domains in the email address we set it to 'Weak Chain' as we don't have info about its source. Resolves: #6815 Related: #6718 Releases: 0.4.0
2015-02-19Fetch keys should return KeyNotFound for unknown errorsRuben Pollan
2015-02-11Merge branch 'feature/async-api' into developKali Kaneko
2015-01-15Port validation levels to enum34Ruben Pollan
2015-01-15upgrade key when signed by old keyRuben Pollan
2015-01-15Upgrade keys if not successfully used and strict high validation levelRuben Pollan
2015-01-15On key update merge metadata correctlyRuben Pollan