bitmask-dev issueshttps://0xacab.org/leap/bitmask-dev/-/issues2018-01-23T23:44:50Zhttps://0xacab.org/leap/bitmask-dev/-/issues/9102Ensure that linux bundle does not use user config path.2018-01-23T23:44:50ZKali KanekoEnsure that linux bundle does not use user config path.I think this is simple enough now, since the bitmask-core main object is the one that centralizes that config-data path.
I also have my doubts about we putting data on ``.config/leap``, I think we should use ``.cache/bitmask`` for the da...I think this is simple enough now, since the bitmask-core main object is the one that centralizes that config-data path.
I also have my doubts about we putting data on ``.config/leap``, I think we should use ``.cache/bitmask`` for the data or something like that.
Note also that Pixelated is using its own path.
I think we could use a documentation page for centralizing the several paths we use in diferent platforms.0.19.5https://0xacab.org/leap/bitmask-dev/-/issues/8955Register a bonafide callable with Soledad Incoming Loop2017-07-06T23:06:51ZKali KanekoRegister a bonafide callable with Soledad Incoming Loopafter the IncomingMail refactor is finished to accomodate the new incoming loop in Soledad,
we can finally register a callback with soledad, so that the incoming loop is able to get a new authentication token.
```
2017-06-29T10:02:55+02...after the IncomingMail refactor is finished to accomodate the new incoming loop in Soledad,
we can finally register a callback with soledad, so that the incoming loop is able to get a new authentication token.
```
2017-06-29T10:02:55+0200 [leap.bitmask.mail.incoming.service.IncomingMail#info] Starting sync...
2017-06-29T10:03:05+0200 [twisted.web.client._HTTP11ClientFactory#info] Starting factory <twisted.web.client._HTTP11ClientFactory instance at 0x7f71ed325560>
2017-06-29T10:03:06+0200 [leap.soledad.client.api#error] got exception when syncing!
*--- Failure #910 ---
site-packages/twisted/internet/defer.py:500: errback(...)
site-packages/twisted/internet/defer.py:567: _startRunCallbacks(...)
site-packages/twisted/internet/defer.py:653: _runCallbacks(...)
site-packages/twisted/internet/defer.py:1442: gotResult(...)
[Capture of Locals and Globals disabled (use captureVars=True)]
--- <exception caught here> ---
site-packages/twisted/internet/defer.py:1384: _inlineCallbacks(...)
site-packages/twisted/python/failure.py:393: throwExceptionIntoGenerator(...)
site-packages/leap/soledad/client/_db/sqlcipher.py:471: sync(...)
site-packages/twisted/internet/defer.py:1384: _inlineCallbacks(...)
site-packages/twisted/python/failure.py:393: throwExceptionIntoGenerator(...)
site-packages/leap/soledad/client/sync.py:83: sync(...)
site-packages/twisted/internet/defer.py:1384: _inlineCallbacks(...)
site-packages/twisted/python/failure.py:393: throwExceptionIntoGenerator(...)
site-packages/leap/soledad/client/http_target/api.py:102: get_sync_info(...)
site-packages/twisted/internet/defer.py:653: _runCallbacks(...)
site-packages/leap/soledad/client/http_target/api.py:247: _unauth_to_invalid_token_error(...)
[Capture of Locals and Globals disabled (use captureVars=True)]
leap.soledad.common.errors.InvalidAuthTokenError:
*--- End of Failure #910 ---
2017-06-29T10:03:06+0200 [leap.bitmask.mail.incoming.service.IncomingMail#warn] Sync failed because token is invalid: <twisted.python.failure.Failure leap.soledad.common.errors.InvalidAuthTokenError: >
2017-06-29T10:03:06+0200 [leap.bitmask.mail.incoming.service.IncomingMail#info] Processing incoming mail
2017-06-29T10:03:06+0200 [leap.bitmask.mail.incoming.service.IncomingMail#debug] no incoming messages found
```Nexthttps://0xacab.org/leap/bitmask-dev/-/issues/8915add ability to import/export email2017-06-22T17:45:21ZKali Kanekoadd ability to import/export emailI think bitmaskctl could handle this (it has access already to the session).
I would point to a maildir/imap-folder for importing and exporting.
This is prioritary because it's a blocker for dogfooding.I think bitmaskctl could handle this (it has access already to the session).
I would point to a maildir/imap-folder for importing and exporting.
This is prioritary because it's a blocker for dogfooding.Nexthttps://0xacab.org/leap/bitmask-dev/-/issues/8888Confusing difference between bitmaskctl status and bitmaskctl vpn status2017-06-14T23:56:08ZVaracConfusing difference between bitmaskctl status and bitmaskctl vpn statusMy VPN is turned off, `bitmaskctl vpn status` reports it right:
```
(venv) --- git/bitmask-dev ‹master* ⁇› » bitmaskctl vpn status --json
WARNING:vext:Could not add extra path: /usr/share/sip
status off
firewall off
vpn ...My VPN is turned off, `bitmaskctl vpn status` reports it right:
```
(venv) --- git/bitmask-dev ‹master* ⁇› » bitmaskctl vpn status --json
WARNING:vext:Could not add extra path: /usr/share/sip
status off
firewall off
vpn off
domain demo.bitmask.net
↑↑↑ 5.2 M
↓↓↓ 94.7 M
```
But `bitmaskctl status --json` reports it's running:
```
(venv) --- git/bitmask-dev ‹master* ⁇› » bitmaskctl status --json
WARNING:vext:Could not add extra path: /usr/share/sip
{
"result": "{\"web\": \"running\", \"keymanager\": \"running\", \"soledad\": \"running\", \"mail\": \"running\", \"vpn\": \"running\", \"backend\": \"default\"}",
"error": null
}
```
What is `bitmaskctl status` showing ? What does it mean that "web/keymanager" is "running" ?Nextmeskiomeskiohttps://0xacab.org/leap/bitmask-dev/-/issues/8865Ability to fix/recover old accounts2017-06-15T08:22:49ZVaracAbility to fix/recover old accountsI have old accounts on different providers, and using latest bitmask-dev fails for many of them.
This is an issue to gather all of those issues.
In my opinion we should fix those, because this might affect many possible interested us...I have old accounts on different providers, and using latest bitmask-dev fails for many of them.
This is an issue to gather all of those issues.
In my opinion we should fix those, because this might affect many possible interested users out there on mail.bitmask.net.
With fixing I mean either a documented, manual migration on the server side or a change in bitmask that can recover/repair such an account.
- [ ] mail.bm: [Keyring has wrong number of keys: 0 when logging into mail.bitmask.net](https://0xacab.org/leap/bitmask-dev/issues/8863)
- [ ] unstable.bm: [leap.soledad.common.crypto.WrongMacError: Could not authenticate document's contents](https://0xacab.org/leap/bitmask-dev/issues/8864)Nexthttps://0xacab.org/leap/bitmask-dev/-/issues/8860vpn: api should report rate and location2017-08-25T15:42:56Zelijahvpn: api should report rate and locationthe backend api should report in the status the bandwidth rate (in addition to the current total usage) and the gateway that it connected to.the backend api should report in the status the bandwidth rate (in addition to the current total usage) and the gateway that it connected to.0.19.5Kali KanekoKali Kanekohttps://0xacab.org/leap/bitmask-dev/-/issues/8827filter out webui logs2017-04-12T18:41:57ZKali Kanekofilter out webui logsthey are very noisy in the logs.
I'd like to send them to a separate file.they are very noisy in the logs.
I'd like to send them to a separate file.Nexthttps://0xacab.org/leap/bitmask-dev/-/issues/8825vpn: enable the vpn service if the provider has it already configured2017-06-19T11:31:47ZKali Kanekovpn: enable the vpn service if the provider has it already configuredI think the UI could do this check, and make the call to enable the service.
otherwise, the VPN service remains disabled by defaultI think the UI could do this check, and make the call to enable the service.
otherwise, the VPN service remains disabled by defaultNexthttps://0xacab.org/leap/bitmask-dev/-/issues/8787be able to turn the VPN before updating the provider.json2017-08-21T11:11:44Zmeskiobe able to turn the VPN before updating the provider.jsonSo we can get to the VPN without the need of DNS working and we kind of anonymize the provier.json request.
This might be tricky on how to do it from bonafide. Do we need bonafide to know about the status of the VPN? Should we hook the ...So we can get to the VPN without the need of DNS working and we kind of anonymize the provier.json request.
This might be tricky on how to do it from bonafide. Do we need bonafide to know about the status of the VPN? Should we hook the bonafide service into the VPN service and update the provider.json as soon as VPN is up? What about non-VPN providers? And if the provider.json doesn't work and needs to be updated to turn on the VPN?0.19.5https://0xacab.org/leap/bitmask-dev/-/issues/7726keymanager - keep the history of old active keys2018-06-14T18:23:23Zmeskiokeymanager - keep the history of old active keysMaybe the active document could have a list of old active keys with: start/end dates, validation, used, ...
*(from redmine: created on 2015-12-16, relates #6089, precedes #6371)*Maybe the active document could have a list of old active keys with: start/end dates, validation, used, ...
*(from redmine: created on 2015-12-16, relates #6089, precedes #6371)*https://0xacab.org/leap/bitmask-dev/-/issues/7780keymanager - import keys from ~/.gnupg2018-06-14T18:23:27Zmeskiokeymanager - import keys from ~/.gnupgFor advance users adoption it might be useful to import keys from the existing keyring. elijah was proposing to don't import the keys, but just note the fingerprints, as users keyrings might be big. Not sure if we gain anything in space,...For advance users adoption it might be useful to import keys from the existing keyring. elijah was proposing to don't import the keys, but just note the fingerprints, as users keyrings might be big. Not sure if we gain anything in space, but might be good to don't bloat the keymanager storage with unused or old keys.
*(from redmine: created on 2016-01-07)*https://0xacab.org/leap/bitmask-dev/-/issues/8170key manager should re-use tmp keyring2018-06-14T18:23:37Zelijahkey manager should re-use tmp keyringCurrently, the key manager creates and destroys a temporary keyring every time an operation is requested using an openpgp key. This might be pretty slow, but maybe it is ok for now.
However, I suspect it will get much slower once we st...Currently, the key manager creates and destroys a temporary keyring every time an operation is requested using an openpgp key. This might be pretty slow, but maybe it is ok for now.
However, I suspect it will get much slower once we start to encrypt the private key! (related issue #8169)
So, instead of totally destroying the keyring each time, maybe we can keep the temporary keyring around for a longer period of time, perhaps as long as the user is logged in.
*(from redmine: created on 2016-06-03, relates #8169)*https://0xacab.org/leap/bitmask-dev/-/issues/8778make client able to check blobs capability on a server2017-08-15T21:09:04ZVictormake client able to check blobs capability on a serverNexthttps://0xacab.org/leap/bitmask-dev/-/issues/8758add autocrypt support2018-01-08T18:03:50Zmeskioadd autocrypt supportWe should send autocrypt headers and parse them.We should send autocrypt headers and parse them.Kali KanekoKali Kaneko