Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | Check for sane argument in autoconnect set | Michael Vetter | 2019-06-05 | 1 | -4/+8 |
| | | | | | Check that user doesnt do `/autoconnect set `. Which would result in: `Account '(null)' does not exist`. | ||||
* | Check if valid account before setting autoconnect | Michael Vetter | 2019-06-05 | 1 | -3/+7 |
| | | | | Fixes https://github.com/profanity-im/profanity/issues/1112 | ||||
* | Force UI update before generating OMEMO crypto materials | William Wennerström | 2019-05-21 | 1 | -0/+1 |
| | |||||
* | Add occupants char | Michael Vetter | 2019-05-02 | 1 | -0/+17 |
| | | | | | | | `/occupants char` now sets a character that is displayed before the nick in MUCs. Similar like `/roster char` is displaying a char for the roster. Regards #690 | ||||
* | Add occupants wrap option | Michael Vetter | 2019-04-24 | 1 | -0/+11 |
| | | | | | | | Wrapping for the occupants panel like already exists for the roster panel. See `/occupants wrap on`. Regards https://github.com/boothj5/profanity/issues/690 | ||||
* | Put occupants update into own function | Michael Vetter | 2019-04-23 | 1 | -34/+3 |
| | |||||
* | Add occupants header char | Michael Vetter | 2019-04-23 | 1 | -0/+43 |
| | | | | | | | | `/occupants header char` now sets a character that is displayed before the role (moderator, visitor..) in a room. Similar to `/roster header char` is displaying a char for the roster. Regards https://github.com/boothj5/profanity/issues/690 | ||||
* | Allow setting occupants indent outside of MUC | Michael Vetter | 2019-04-20 | 1 | -32/+31 |
| | | | | And when not connected. | ||||
* | Add /occupants indent command | Michael Vetter | 2019-04-18 | 1 | -0/+32 |
| | | | | | | | | Roster has a `/roster contact indent` option. Now we have the same for occupants. So contacts in roster and in MUC can have configurable indentation. Regards https://github.com/boothj5/profanity/issues/690 | ||||
* | Add OMEMO policy | Paul Fariello | 2019-04-17 | 1 | -3/+36 |
| | | | | | | | | | | | | There is 3 policy: - manual: OMEMO session are only started manually - automatic: OMEMO session are only started if they have been started manually before - always: OMEMO session are always started unless they have been ended manually before Closes #1040 and fixes #1052 | ||||
* | Merge pull request #1066 from ↵ | Michael Vetter | 2019-04-17 | 1 | -6/+6 |
|\ | | | | | | | | | paulfariello/hotfix/OMEMO-ensure-muc-is-nonanonymous Ensure MUC is Non-Anonymous before starting OMEMO | ||||
| * | Ensure MUC is Non-Anonymous before starting OMEMO | Paul Fariello | 2019-04-17 | 1 | -6/+6 |
| | | | | | | | | | | | | Store MUC anonymous type in mucwin for that purpose. Fixes #1065 | ||||
* | | Alert about long OMEMO cryptographic generation | Paul Fariello | 2019-04-17 | 1 | -0/+1 |
|/ | | | | Fixes #1055 | ||||
* | Support contact name in /omemo fingerprint command | Paul Fariello | 2019-04-10 | 1 | -4/+9 |
| | |||||
* | Add /omemo char command | Paul Fariello | 2019-04-10 | 1 | -0/+19 |
| | |||||
* | Automatically starts OMEMO if one identity is trusted | Paul Fariello | 2019-04-10 | 1 | -0/+50 |
| | |||||
* | Add OMEMO in prefs command | Paul Fariello | 2019-04-10 | 1 | -0/+4 |
| | |||||
* | Add clear_device_list command | Paul Fariello | 2019-04-10 | 1 | -0/+19 |
| | |||||
* | Show all device fingerprint for current account | Paul Fariello | 2019-04-10 | 1 | -1/+1 |
| | |||||
* | Print fingerprint after trust and untrust command | Paul Fariello | 2019-04-10 | 1 | -0/+34 |
| | |||||
* | Use /omemo fingerprint to show contact fingerprints | Paul Fariello | 2019-04-10 | 1 | -3/+43 |
| | | | | Don't print fingerprints when they are received | ||||
* | Add OMEMO log command | Paul Fariello | 2019-04-10 | 1 | -0/+30 |
| | |||||
* | Add OMEMO end command | Paul Fariello | 2019-04-10 | 1 | -0/+41 |
| | |||||
* | Revert "Ensure room isn't anonymous" | Paul Fariello | 2019-04-10 | 1 | -4/+0 |
| | | | | This reverts commit 733e1a24c7e08dde6aa2c15ec4528220aa360845. | ||||
* | Ensure room isn't anonymous | Paul Fariello | 2019-04-10 | 1 | -0/+4 |
| | |||||
* | Cosmetics rename variable barejid into roomjid | Paul Fariello | 2019-04-10 | 1 | -1/+1 |
| | |||||
* | Allow to start OMEMO in MUC | Paul Fariello | 2019-04-10 | 1 | -0/+8 |
| | |||||
* | Handle window type MUC in OMEMO start command | Paul Fariello | 2019-04-10 | 1 | -18/+20 |
| | |||||
* | Avoid opening win if crypto materials are missing | Paul Fariello | 2019-04-10 | 1 | -10/+5 |
| | |||||
* | Add UI feedback for OMEMO gen command | Paul Fariello | 2019-04-10 | 1 | -0/+1 |
| | |||||
* | Add OMEMO untrust command | Paul Fariello | 2019-04-10 | 1 | -0/+52 |
| | |||||
* | Allow to trust own device id | Paul Fariello | 2019-04-10 | 1 | -1/+2 |
| | |||||
* | Add trust command | Paul Fariello | 2019-04-10 | 1 | -5/+53 |
| | |||||
* | Add OMEMO fingerprint command | Paul Fariello | 2019-04-10 | 1 | -0/+28 |
| | |||||
* | Enable start of OMEMO in existing chat win | Paul Fariello | 2019-04-10 | 1 | -0/+30 |
| | |||||
* | Get rid of libsodium | Paul Fariello | 2019-04-10 | 1 | -1/+1 |
| | |||||
* | Add OMEMO message encryption and decryption | Paul Fariello | 2019-04-10 | 1 | -0/+1 |
| | |||||
* | Add signal store backend and OMEMO start command | Paul Fariello | 2019-04-10 | 1 | -0/+53 |
| | |||||
* | Ensure not to generate omemo crypto twice | Paul Fariello | 2019-04-10 | 1 | -1/+6 |
| | |||||
* | Ensure OMEMO isn't started before starting OTR | Paul Fariello | 2019-04-10 | 1 | -0/+5 |
| | |||||
* | Move OMEMO initialization to profanity intialization | Paul Fariello | 2019-04-10 | 1 | -7/+6 |
| | | | | Also store identity keys into account | ||||
* | Link against libsignal-protocol-c | Paul Fariello | 2019-04-08 | 1 | -0/+23 |
| | |||||
* | Avoid use after free on default account | Paul Fariello | 2019-04-08 | 1 | -1/+2 |
| | | | | Fix 1046 | ||||
* | Fix broken support for case-sensitive account names | Philip Flohr | 2019-02-22 | 1 | -5/+3 |
| | | | | | | | | | | | Don't lower account name before calling accounts_get_account(). Only lower if there is no account with the given name and the name is interpreted as a jid. Updated unittests to test this behaviour. Fixes #725 . | ||||
* | Update copyright to include 2019 | Michael Vetter | 2019-01-22 | 1 | -1/+1 |
| | |||||
* | Override account options with connect options | Dmitry Podgorny | 2018-11-07 | 1 | -0/+8 |
| | | | | | | | | | | | | With this feature user can configure TLS policy for an account and override it for a single login with /connect command. Example: /account set <jid> tls force /connect <jid> tls trust The example shows how to trust server's certificate only once. Fixes #1021. | ||||
* | Add option to trust server's certificate | Dmitry Podgorny | 2018-11-06 | 1 | -0/+2 |
| | | | | | | | | | | | New tls policy "trust" added to /connect and /account. With the policy TLS connection is established even with invalid certificate. Note, that trust policy forces TLS connection and it fails when server doesn't support TLS. Examples: /connect <jid> tls trust /account <name> set tls trust | ||||
* | Merge pull request #991 from paulfariello/feature/xep-0050 | Michael Vetter | 2018-09-27 | 1 | -45/+158 |
|\ | | | | | Add support for xep 0050 ad-hoc commands, without multi-step | ||||
| * | Add support for ad-hoc response with forms | Paul Fariello | 2018-09-10 | 1 | -2/+2 |
| | | |||||
| * | Add default jid for cmd commands on WIN_CONSOLE | Paul Fariello | 2018-09-05 | 1 | -0/+11 |
| | |