about summary refs log tree commit diff stats
path: root/src/command/cmd_funcs.c
Commit message (Collapse)AuthorAgeFilesLines
* Refactor cmd_omemo_startMichael Vetter2019-06-071-38/+23
| | | | | | | | Some code was duplicated/similar. The parts about using a chatwin while being started from another window (recipient provided) and being a chatwin were the same. Like this it should be easier to read and less code.
* Print omemo start related msgs into correct windowMichael Vetter2019-06-071-3/+3
| | | | | Print them in the window of the contact. Not just the current window. Fix https://github.com/profanity-im/profanity/issues/1093
* Merge pull request #1121 from profanity-im/feature/notify-plugin-failMichael Vetter2019-06-071-4/+8
|\ | | | | Improve plugin load/install failure message
| * Improve plugin load/install failure messageMichael Vetter2019-06-071-4/+8
| | | | | | | | | | | | In case Python or C plugins are disabled install/load failed silently. Notify the user that we can't load them because profanity was built without support for plugins.
* | Check for sane argument in autoconnect setMichael Vetter2019-06-051-4/+8
| | | | | | | | | | Check that user doesnt do `/autoconnect set `. Which would result in: `Account '(null)' does not exist`.
* | Check if valid account before setting autoconnectMichael Vetter2019-06-051-3/+7
|/ | | | Fixes https://github.com/profanity-im/profanity/issues/1112
* Force UI update before generating OMEMO crypto materialsWilliam Wennerström2019-05-211-0/+1
|
* Add occupants charMichael Vetter2019-05-021-0/+17
| | | | | | | `/occupants char` now sets a character that is displayed before the nick in MUCs. Similar like `/roster char` is displaying a char for the roster. Regards #690
* Add occupants wrap optionMichael Vetter2019-04-241-0/+11
| | | | | | | Wrapping for the occupants panel like already exists for the roster panel. See `/occupants wrap on`. Regards https://github.com/boothj5/profanity/issues/690
* Put occupants update into own functionMichael Vetter2019-04-231-34/+3
|
* Add occupants header charMichael Vetter2019-04-231-0/+43
| | | | | | | | `/occupants header char` now sets a character that is displayed before the role (moderator, visitor..) in a room. Similar to `/roster header char` is displaying a char for the roster. Regards https://github.com/boothj5/profanity/issues/690
* Allow setting occupants indent outside of MUCMichael Vetter2019-04-201-32/+31
| | | | And when not connected.
* Add /occupants indent commandMichael Vetter2019-04-181-0/+32
| | | | | | | | Roster has a `/roster contact indent` option. Now we have the same for occupants. So contacts in roster and in MUC can have configurable indentation. Regards https://github.com/boothj5/profanity/issues/690
* Add OMEMO policyPaul Fariello2019-04-171-3/+36
| | | | | | | | | | | | There is 3 policy: - manual: OMEMO session are only started manually - automatic: OMEMO session are only started if they have been started manually before - always: OMEMO session are always started unless they have been ended manually before Closes #1040 and fixes #1052
* Merge pull request #1066 from ↵Michael Vetter2019-04-171-6/+6
|\ | | | | | | | | paulfariello/hotfix/OMEMO-ensure-muc-is-nonanonymous Ensure MUC is Non-Anonymous before starting OMEMO
| * Ensure MUC is Non-Anonymous before starting OMEMOPaul Fariello2019-04-171-6/+6
| | | | | | | | | | | | Store MUC anonymous type in mucwin for that purpose. Fixes #1065
* | Alert about long OMEMO cryptographic generationPaul Fariello2019-04-171-0/+1
|/ | | | Fixes #1055
* Support contact name in /omemo fingerprint commandPaul Fariello2019-04-101-4/+9
|
* Add /omemo char commandPaul Fariello2019-04-101-0/+19
|
* Automatically starts OMEMO if one identity is trustedPaul Fariello2019-04-101-0/+50
|
* Add OMEMO in prefs commandPaul Fariello2019-04-101-0/+4
|
* Add clear_device_list commandPaul Fariello2019-04-101-0/+19
|
* Show all device fingerprint for current accountPaul Fariello2019-04-101-1/+1
|
* Print fingerprint after trust and untrust commandPaul Fariello2019-04-101-0/+34
|
* Use /omemo fingerprint to show contact fingerprintsPaul Fariello2019-04-101-3/+43
| | | | Don't print fingerprints when they are received
* Add OMEMO log commandPaul Fariello2019-04-101-0/+30
|
* Add OMEMO end commandPaul Fariello2019-04-101-0/+41
|
* Revert "Ensure room isn't anonymous"Paul Fariello2019-04-101-4/+0
| | | | This reverts commit 733e1a24c7e08dde6aa2c15ec4528220aa360845.
* Ensure room isn't anonymousPaul Fariello2019-04-101-0/+4
|
* Cosmetics rename variable barejid into roomjidPaul Fariello2019-04-101-1/+1
|
* Allow to start OMEMO in MUCPaul Fariello2019-04-101-0/+8
|
* Handle window type MUC in OMEMO start commandPaul Fariello2019-04-101-18/+20
|
* Avoid opening win if crypto materials are missingPaul Fariello2019-04-101-10/+5
|
* Add UI feedback for OMEMO gen commandPaul Fariello2019-04-101-0/+1
|
* Add OMEMO untrust commandPaul Fariello2019-04-101-0/+52
|
* Allow to trust own device idPaul Fariello2019-04-101-1/+2
|
* Add trust commandPaul Fariello2019-04-101-5/+53
|
* Add OMEMO fingerprint commandPaul Fariello2019-04-101-0/+28
|
* Enable start of OMEMO in existing chat winPaul Fariello2019-04-101-0/+30
|
* Get rid of libsodiumPaul Fariello2019-04-101-1/+1
|
* Add OMEMO message encryption and decryptionPaul Fariello2019-04-101-0/+1
|
* Add signal store backend and OMEMO start commandPaul Fariello2019-04-101-0/+53
|
* Ensure not to generate omemo crypto twicePaul Fariello2019-04-101-1/+6
|
* Ensure OMEMO isn't started before starting OTRPaul Fariello2019-04-101-0/+5
|
* Move OMEMO initialization to profanity intializationPaul Fariello2019-04-101-7/+6
| | | | Also store identity keys into account
* Link against libsignal-protocol-cPaul Fariello2019-04-081-0/+23
|
* Avoid use after free on default accountPaul Fariello2019-04-081-1/+2
| | | | Fix 1046
* Fix broken support for case-sensitive account namesPhilip Flohr2019-02-221-5/+3
| | | | | | | | | | | Don't lower account name before calling accounts_get_account(). Only lower if there is no account with the given name and the name is interpreted as a jid. Updated unittests to test this behaviour. Fixes #725 .
* Update copyright to include 2019Michael Vetter2019-01-221-1/+1
|
* Override account options with connect optionsDmitry Podgorny2018-11-071-0/+8
| | | | | | | | | | | | With this feature user can configure TLS policy for an account and override it for a single login with /connect command. Example: /account set <jid> tls force /connect <jid> tls trust The example shows how to trust server's certificate only once. Fixes #1021.