| Commit message (Collapse) | Author | Age | Files | Lines |
... | |
|\
| |
| | |
Avoid use after free on default account
|
|/
|
|
| |
Fix 1046
|
|\
| |
| | |
Fix use after free bug
|
|/ |
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
| |
Now, `make dist` can be used for generating tarballs. It simplifies
making proper release tarballs. Also, it includes some files, that
are removed in RELEASE_GUIDE.md:
- apidocs/
- CHANGELOG
- theme_template
It is a good idea to include such a kind of documentation.
Update RELEASE_GUIDE.md.
|
|
|
|
|
| |
Fixes https://github.com/boothj5/profanity/issues/950
Closes https://github.com/boothj5/profanity/pull/992
|
|\
| |
| | |
Fix broken support for case-sensitive account names
|
|/
|
|
|
|
|
|
|
|
|
| |
Don't lower account name before calling accounts_get_account().
Only lower if there is no account with the given name and the name is
interpreted as a jid.
Updated unittests to test this behaviour.
Fixes #725
.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
After specifying the PGP key ID with pgp.keyid within the accounts file on startup profanity asks for the secret key passphrase. It then doesn't redraw the screen, leaving it in an odd looking state.
This probably only happens with pinentry-curses since it draws in
screen.
We need this fix for cli only environments.
Fixes https://github.com/boothj5/profanity/issues/906 reported by Bob
Mottram.
Based on https://github.com/boothj5/profanity/pull/908 by Bob Mottram
Bob removed his GitHub account, so GitHub created a ghost placeholder
user for him, which unfortunately makes it impossible to cherry-pick
this commit. To more or less preserve authorship I added him as
co-author.
Commit picked and message edited by jubalh.
Co-authored-by: Bob Mottram <bob@freedombone.net>
|
|
|
|
|
|
|
|
| |
Fixes https://github.com/boothj5/profanity/issues/997
Proposed as https://github.com/boothj5/profanity/pull/1008
Related to XEP-0027.
Message edited and commit cherry picked by jubalh.
|
|
|
|
| |
With all the different kinds of encryption (OMEMO, OTR3 OTR4, PGP in XEP-0027 and XEP-0373) it might be helpful to know which kind of encryption is used.
|
|\
| |
| | |
Fail plugin unloading if plugin does not exist
|
| | |
|
|\ \
| | |
| | | |
let plugins_unload_all fail if one plugin unload operation fails
|
| |/ |
|
| | |
|
| | |
|
| | |
|
| | |
|
|\ \
| | |
| | | |
Fix optional sessionid in xep 0050
|
|/ / |
|
| | |
|
| | |
|
| | |
|
| | |
|
| | |
|
| | |
|
|\ \
| | |
| | |
| | | |
See https://github.com/boothj5/profanity/pull/1023
|
| | |
| | |
| | |
| | | |
For example "FirstName LastName", need to be quoted.
|
|/ /
| |
| |
| |
| | |
* Splash logo improvements
* Use straight/flat, instead or rounded, outer edges on `o` and `a`
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
With this feature user can configure TLS policy for an account and
override it for a single login with /connect command.
Example:
/account set <jid> tls force
/connect <jid> tls trust
The example shows how to trust server's certificate only once.
Fixes #1021.
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
New tls policy "trust" added to /connect and /account. With the policy
TLS connection is established even with invalid certificate. Note, that
trust policy forces TLS connection and it fails when server doesn't
support TLS.
Examples:
/connect <jid> tls trust
/account <name> set tls trust
|
| | |
|
| |
| |
| |
| | |
Fixes #862
|
|\ \
| | |
| | | |
tests: remove cflag -w and fix warnings
|
|/ /
| |
| |
| |
| |
| |
| |
| |
| | |
The flag hides errors. But we want unit tests to be correct in order
to reveal errors in the main code.
The patch removes tests_unittests_unittests_CFLAGS which makes autotools
use AM_CFLAGS instead. Therefore, unit tests are built with flags
derived from configure.ac.
|
|\ \
| | |
| | | |
Fix style and warnings - found with `mandoc -T lint`
|
|/ / |
|
| |
| |
| |
| | |
To prepare for next release.
|
|\ \
| | |
| | | |
Add support for xep 0050 ad-hoc commands, without multi-step
|
| | |
| | |
| | |
| | | |
In order to avoid duplication with xep 0133 support in command execution
|
| | | |
|
| | |
| | |
| | |
| | | |
Could be missleading for user.
|
| | | |
|
| | | |
|
| | | |
|
| | | |
|
| | | |
|
| | | |
|