summaryrefslogtreecommitdiff
path: root/changes
AgeCommit message (Collapse)Author
2016-07-05[feat] make ValidationLevels iterableRuben Pollan
Needed by bytmask cli. - Related: #7965
2016-06-20[feat] check key document versions and fail if it's unknownRuben Pollan
- Closes: #8165
2016-06-17[feat] improve duplicated active documents fixupRuben Pollan
Mostly for private keys we want to keep the latest one in the keyring. It would be desirable to check with one is set in nicknym, but this will need a big refactor that I'm not sure if it's worth it just for that. - Related: #6658, #8059
2016-06-01[feat] make get_all_keys aware of active addressesRuben Pollan
- Resolves: #8068
2016-06-01[feat] remove the keytype supportRuben Pollan
- Resolves: #8031
2016-05-04[pkg] update changelog to 0.5.1 releaseKali Kaneko (leap communications)
I left out the changelog bump on 0.5.1 tag by mistake
2016-04-19[bug] encryption keys can now be serialized to json using key.get_dict()elijah
2016-04-18[pkg] Update changelog0.5.0Kali Kaneko (leap communications)
2016-03-20[bug] Return KeyNotFound Failure if not valid key is given to put_raw_keyRuben Pollan
- Resolves: #7974
2016-02-25[doc] soledad docs fieldsRuben Pollan
- Resolves: #7712
2016-02-25[feat] Make EncryptionKey aware of the active addressRuben Pollan
2016-02-25[feat] Use fingerprints instead of key idsRuben Pollan
- Resolves: #7500
2016-02-25[feat] Migrate soledad documents by adding versioning fieldRuben Pollan
- Resolves: #7713
2016-02-25[feat] move validation, usage and audited date to the active documentRuben Pollan
- Resolves: #7485
2016-02-23[feat] defer decrypt, gen_key and encryptVictor Shyba
This commit put those gnupg operations to be run on external threads limited by the amount of cores present on user machine. Some gnupg calls spawn processes and communicating to them is a synchronous operation, so running outside of a reactor should improve response time by avoiding reactor locking.
2015-10-28[pkg] fold in changes0.4.3Ivan Alejandro
2015-10-01[feat] self-repair the keyring if keys get duplicatedRuben Pollan
In some cases in the past keys got stored twice in different documents. Hopefully this issue is solved now, this tries to self-repair the keyring if encounters that. This is not really solving the problem, if it keeps happening we need to investigate the source. - Resolves: #7498
2015-09-24[bug] don't repush a public key with different addressRuben Pollan
During decryption the signing public key was getting repush with a different address as part of the verify usage flagging. - Resolves: https://github.com/pixelated/pixelated-user-agent/issues/466 - Related: #7420
2015-09-22[bug] catch request exceptionsRuben Pollan
On fetch_key we were not catching the request exceptions, now they are returned as failure in the deferred as it should. - Related: #7410
2015-07-10[pkg] fold in changes0.4.1Ivan Alejandro
2015-06-27[bug] remove the dependency on enum34Ruben Pollan
* Resolves: #7188
2015-06-08[pkg] bump dependencies0.4.0release/0.4.xIvan Alejandro
2015-06-08[pkg] fold in changesIvan Alejandro
2015-05-27[feat] adapt to new events api on commonIvan Alejandro
- Related: #6359
2015-03-30[feat] set fetched keys as Weak Chain if they are not from the same domainRuben Pollan
Nicknym server is authoritative for its own domain, but for others it might retrieve keys from key servers. On keys from the same domain we set the validation level to 'Provider Trust'. For other domains in the email address we set it to 'Weak Chain' as we don't have info about its source. Resolves: #6815 Related: #6718 Releases: 0.4.0
2015-02-19Fetch keys should return KeyNotFound for unknown errorsRuben Pollan
2015-01-15upgrade key when signed by old keyRuben Pollan
2015-01-15Upgrade keys if not successfully used and strict high validation levelRuben Pollan
2014-12-16Port to soledad new async APIRuben Pollan
2014-11-25Return signing key on signature verificationRuben Pollan
Don't throw an exception if verification fails
2014-11-25Use addresses instead of keys on the public APIRuben Pollan
2014-11-19Implement multi uid supportRuben Pollan
2014-11-19Implement active key documentRuben Pollan
2014-10-09Implement 'fetch_key' for ascii keysRuben Pollan
binary keys support is still missing
2014-10-09Merge branch 'drebs/bug/6022_fix-call-to-verify-file' into developRuben Pollan
2014-10-09Accept ascii keys on put_keyRuben Pollan
2014-10-06Add new leap.common version to VERSION_COMPATRuben Pollan
2014-09-16Add changesRuben Pollan
2014-08-27Fix call to python-gnupg verify_file() method (#6022).drebs
2014-04-04Fold in changesTomás Touceda
2014-04-04Update dependenciesTomás Touceda
2014-03-31Properly raise exception when key is not found on server (#5415).drebs
2014-02-17Update auth to interact with webapp v2. Closes #5120.drebs
2014-01-20Merge remote-tracking branch ↵Tomás Touceda
'refs/remotes/ivan/feature/better-version-handling' into develop
2014-01-17Do not decode decrypted data, return as str.Ivan Alejandro
2014-01-09Use a better version handler.Ivan Alejandro
2013-12-17memoize call to get_keyKali Kaneko
2013-12-06Fold in changesTomás Touceda
2013-11-25Improve exceptions names and handling.drebs
2013-11-25Fix error returns on openpgp backend.drebs
Also fix: - some docstrings. - variabled referenced without previous assignement.