Age | Commit message (Collapse) | Author | |
---|---|---|---|
2015-08-06 | [feat] WHEELHOUSE can be a url + --use-leap-wheels | Parménides GV | |
--use-leap-wheels sets --trusted-host (remove it when we have a proper cert) and WHEELHOUSE to https://ftp.lizard.leap.se Until we get ftp.lizard cname, use lizard as the wheels server. Related: #7339 | |||
2015-08-03 | [style] Re-added lambdas to openpgp on keymanager | Bruno Wagner | |
2015-08-03 | [tests] Added requirements-latest to help HEAD development | Bruno Wagner | |
That's an easy way to setup the latest develop without depending on manually downloading the dependencies | |||
2015-08-03 | [style] Fixed pep8 warnings | Bruno Wagner | |
Fixed pep8 warnings to prepare the keymanager for CI | |||
2015-08-03 | [feat] use wheels to install dependencies | Parménides GV | |
generate_wheels uses $WHEELHOUSE to generate and store the wheels for requirements.pip and requirements-testing.pip (if it exists). pip_install_requirements.sh installs requirements.pip from them if possible (if not, then it fetches them from pypi) or, if passed the --testing flag, it installs requirements-testing.pip. Related: #7327 | |||
2015-07-29 | [style] pep8 | Kali Kaneko | |
2015-07-28 | [tests] add pep8 to requirements-testing | Kali Kaneko | |
2015-07-27 | [pkg] add AUTHORS file + one-liner to generate it | Kali Kaneko | |
2015-07-27 | [pkg] add script to install base requirements | Kali Kaneko | |
- update pip - install base reqs | |||
2015-07-27 | [pkg] comment the line until the version string is fixed | Parménides GV | |
otherwise, the tests will be pulling outdated versions from pypi. | |||
2015-07-23 | [pkg] avoid choking on latest gnupg version | Kali Kaneko | |
latest gnupg version (from pypi) was '2.0.2-py2.7.egg', which is parsed as a LegacyVersion and therefore breaks the numeric comparison. this is a workaround to allow the sanity check to continue, by comparing just the numeric part of the version string. | |||
2015-07-22 | [pkg] do not add leap deps in develop mode | Kali Kaneko | |
it is the responsibility of the developer to install them now - Related: #7288 | |||
2015-07-22 | [style] add the magnificient leap commit template | Kali Kaneko | |
2015-07-22 | [pkg] separate leap requirements | Kali Kaneko | |
this is part of a process to make the setup of the development mode less troublesome. from now on, setting up a virtualenv in pure development mode will be as easy as telling pip to just install the external dependencies:: pip install -r pkg/requirements.pip and traversing all the leap repos for the needed leap dependencies doing:: python setup.py develop - Related: #7288 | |||
2015-07-10 | [pkg] fold in changes | Ivan Alejandro | |
2015-06-29 | [style] spelling typo | Kali Kaneko | |
2015-06-27 | [bug] remove the dependency on enum34 | Ruben Pollan | |
* Resolves: #7188 | |||
2015-06-08 | [pkg] bump dependencies | Ivan Alejandro | |
2015-06-08 | [pkg] fold in changes | Ivan Alejandro | |
2015-05-27 | [feat] adapt to new events api on common | Ivan Alejandro | |
- Related: #6359 | |||
2015-04-07 | [doc] added the right link the validation levels documentation | Ruben Pollan | |
The mailing list was linked, but now there is a proper documentation page. - Releases: 0.4.0 | |||
2015-03-30 | [feat] set fetched keys as Weak Chain if they are not from the same domain | Ruben Pollan | |
Nicknym server is authoritative for its own domain, but for others it might retrieve keys from key servers. On keys from the same domain we set the validation level to 'Provider Trust'. For other domains in the email address we set it to 'Weak Chain' as we don't have info about its source. Resolves: #6815 Related: #6718 Releases: 0.4.0 | |||
2015-02-19 | Fetch keys should return KeyNotFound for unknown errors | Ruben Pollan | |
2015-01-15 | Port validation levels to enum34 | Ruben Pollan | |
2015-01-15 | upgrade key when signed by old key | Ruben Pollan | |
2015-01-15 | Upgrade keys if not successfully used and strict high validation level | Ruben Pollan | |
2015-01-15 | On key update merge metadata correctly | Ruben Pollan | |
2015-01-15 | Fix key upgrade on no expiration date and higher validation level | Ruben Pollan | |
2015-01-15 | Return a valid error from gatherResults | Ruben Pollan | |
2015-01-07 | Use trial as test runner. | drebs | |
2014-12-16 | Return the right error on signature verification | Ruben Pollan | |
2014-12-16 | Find the gpg path instead of hard code it | Ruben Pollan | |
2014-12-16 | Fix key generation | Ruben Pollan | |
2014-12-16 | Port to soledad new async API | Ruben Pollan | |
2014-11-25 | Return signing key on signature verification | Ruben Pollan | |
Don't throw an exception if verification fails | |||
2014-11-25 | Use addresses instead of keys on the public API | Ruben Pollan | |
2014-11-25 | Fix test to use correct new signature for openpgp.put_ascii_key(). | drebs | |
2014-11-25 | Add enum as a dependency. | drebs | |
2014-11-19 | Fix comments | Ruben Pollan | |
2014-11-19 | Implement multi uid support | Ruben Pollan | |
2014-11-19 | Implement active key document | Ruben Pollan | |
2014-11-10 | Use type instead of tags to get docs in openpgp | Ruben Pollan | |
For that that now the type is the class.__name__ instead of str(class) | |||
2014-11-10 | Implement the new encryption-key soledad document | Ruben Pollan | |
2014-11-06 | Use datetime for key expiration | Ruben Pollan | |
2014-11-04 | Remove outdated comment | Ruben Pollan | |
2014-11-04 | Merge keys when updating an exisiting key | Ruben Pollan | |
This is needed to prevent roll back attacks where the attacker push us to accept a key with an old expiration date that could be use to push an untrusted key when after it's expiration. | |||
2014-10-23 | Update doc string of OpenPGPScheme._temporary_gpgwrapper | Ruben Pollan | |
2014-10-23 | Basic validation levels support | Ruben Pollan | |
2014-10-09 | Implement 'fetch_key' for ascii keys | Ruben Pollan | |
binary keys support is still missing | |||
2014-10-09 | Merge branch 'drebs/bug/6022_fix-call-to-verify-file' into develop | Ruben Pollan | |