summaryrefslogtreecommitdiff
path: root/src
AgeCommit message (Collapse)Author
2015-09-24[bug] treat empty string ca_cert_path as NoneFolker Bernitt
Fixup for 9546348c36. This problem only occurs in test setups where '' is passed to ca_cert_path.
2015-09-22[bug] catch request exceptionsRuben Pollan
On fetch_key we were not catching the request exceptions, now they are returned as failure in the deferred as it should. - Related: #7410
2015-09-21[feat] more verbosity in get_key wrong address logRuben Pollan
2015-09-21[style] fix pep8 problemsRuben Pollan
2015-09-18[feature] Use ca_bundle when fetching keys by urlFolker Bernitt
This is necessary as a fetch by url will talk to remote sites or, for providers with a commercial cert, with a cert that had not been signed with the provider CA. - support lookup of local keys by url for providers with a commercial cert - combine ca_bundle with ca_cert_path if specified - close soledad after each test
2015-09-17[feat] add logging to fetch_keyRuben Pollan
In case of failure of fetch_key will be useful to have some logging telling us wich key is fetching. - Related: #7410
2015-09-16[style] pep8 fixKali Kaneko
2015-09-14[feat] use async events apiKali Kaneko
this avoids using a separate thread with tornado ioloop for events client, since we can use twisted reactor. - Resolves: #7274
2015-08-17[style] pep8 fixKali Kaneko
2015-08-03[style] Re-added lambdas to openpgp on keymanagerBruno Wagner
2015-08-03[style] Fixed pep8 warningsBruno Wagner
Fixed pep8 warnings to prepare the keymanager for CI
2015-07-29[style] pep8Kali Kaneko
2015-07-23[pkg] avoid choking on latest gnupg versionKali Kaneko
latest gnupg version (from pypi) was '2.0.2-py2.7.egg', which is parsed as a LegacyVersion and therefore breaks the numeric comparison. this is a workaround to allow the sanity check to continue, by comparing just the numeric part of the version string.
2015-06-29[style] spelling typoKali Kaneko
2015-06-27[bug] remove the dependency on enum34Ruben Pollan
* Resolves: #7188
2015-05-27[feat] adapt to new events api on commonIvan Alejandro
- Related: #6359
2015-04-07[doc] added the right link the validation levels documentationRuben Pollan
The mailing list was linked, but now there is a proper documentation page. - Releases: 0.4.0
2015-03-30[feat] set fetched keys as Weak Chain if they are not from the same domainRuben Pollan
Nicknym server is authoritative for its own domain, but for others it might retrieve keys from key servers. On keys from the same domain we set the validation level to 'Provider Trust'. For other domains in the email address we set it to 'Weak Chain' as we don't have info about its source. Resolves: #6815 Related: #6718 Releases: 0.4.0
2015-02-19Fetch keys should return KeyNotFound for unknown errorsRuben Pollan
2015-01-15Port validation levels to enum34Ruben Pollan
2015-01-15upgrade key when signed by old keyRuben Pollan
2015-01-15Upgrade keys if not successfully used and strict high validation levelRuben Pollan
2015-01-15On key update merge metadata correctlyRuben Pollan
2015-01-15Fix key upgrade on no expiration date and higher validation levelRuben Pollan
2015-01-15Return a valid error from gatherResultsRuben Pollan
2014-12-16Return the right error on signature verificationRuben Pollan
2014-12-16Find the gpg path instead of hard code itRuben Pollan
2014-12-16Fix key generationRuben Pollan
2014-12-16Port to soledad new async APIRuben Pollan
2014-11-25Return signing key on signature verificationRuben Pollan
Don't throw an exception if verification fails
2014-11-25Use addresses instead of keys on the public APIRuben Pollan
2014-11-25Fix test to use correct new signature for openpgp.put_ascii_key().drebs
2014-11-19Fix commentsRuben Pollan
2014-11-19Implement multi uid supportRuben Pollan
2014-11-19Implement active key documentRuben Pollan
2014-11-10Use type instead of tags to get docs in openpgpRuben Pollan
For that that now the type is the class.__name__ instead of str(class)
2014-11-10Implement the new encryption-key soledad documentRuben Pollan
2014-11-06Use datetime for key expirationRuben Pollan
2014-11-04Remove outdated commentRuben Pollan
2014-11-04Merge keys when updating an exisiting keyRuben Pollan
This is needed to prevent roll back attacks where the attacker push us to accept a key with an old expiration date that could be use to push an untrusted key when after it's expiration.
2014-10-23Update doc string of OpenPGPScheme._temporary_gpgwrapperRuben Pollan
2014-10-23Basic validation levels supportRuben Pollan
2014-10-09Implement 'fetch_key' for ascii keysRuben Pollan
binary keys support is still missing
2014-10-09Merge branch 'drebs/bug/6022_fix-call-to-verify-file' into developRuben Pollan
2014-10-09Accept ascii keys on put_keyRuben Pollan
2014-09-16Remove parse_openpgp_ascii_keyRuben Pollan
Don't fit with the logic of the keymanager and it's not use except for some commented code in bitmask_client
2014-09-16Rename method get_all_keys_in_local_db -> get_all_keysRuben Pollan
2014-09-16Remove get_key_from_cacheRuben Pollan
We only need to cache the fetch with a sort timeout. The tests that fetches keys now have to use different keys or will be cached.
2014-09-16Pass the cipher_algo to the encrypt wrapperRuben Pollan
2014-09-16Remove refresh_keysRuben Pollan
Never should be done a bulk upload of keys. The updating of the keys should not be a task for the user of the keymanager. Keys will be updated by the keymanager in a background worker one per one.