In T6832#179438, @ebo wrote:
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
Feed All Stories
All Stories
All Stories
Nov 27 2023
Nov 27 2023
CarlSchwan committed rMTPc0e610d9dc5b: Fix display name regression when using openPGP (authored by CarlSchwan).
Fix display name regression when using openPGP
• werner committed rGa6eefa99963a: gpgsm: Set validity flag in keylisting to n for untrusted root cert. (authored by • werner).
gpgsm: Set validity flag in keylisting to n for untrusted root cert.
• werner committed rG73aa6dc6e41f: gpgsm: Set validity flag in keylisting to n for untrusted root cert. (authored by • werner).
gpgsm: Set validity flag in keylisting to n for untrusted root cert.
• werner moved T6841: GPGSM / GPGME: Untrusted root CA's cause certificates to be invalid instead of Unknown trust from QA to gnupg-2.2.42 on the gnupg22 board.
• werner added a comment to T6841: GPGSM / GPGME: Untrusted root CA's cause certificates to be invalid instead of Unknown trust.
Tested on Windows with Kleopatra and 2.2 and with gpgme and 2.4 on Unix.
• ikloecker added a comment to T6830: Kleopatra: Smart card view does not show any certificates if one certficate could not be listed.
The "Load Certificates" button still remains greyed out if nothing changed, i.e. if no new certificates could be loaded from the card. This could be changed, but pressing "Load Certificates" multiple times won't magically fix loading the broken certificates.
• werner moved T6841: GPGSM / GPGME: Untrusted root CA's cause certificates to be invalid instead of Unknown trust from WiP to QA on the gnupg22 board.
• werner changed the status of T6841: GPGSM / GPGME: Untrusted root CA's cause certificates to be invalid instead of Unknown trust from Open to Testing.
• werner edited projects for T6841: GPGSM / GPGME: Untrusted root CA's cause certificates to be invalid instead of Unknown trust, added: gnupg22; removed gpgme.
• werner added a comment to T6841: GPGSM / GPGME: Untrusted root CA's cause certificates to be invalid instead of Unknown trust.
Okay, I known do the same what we do for a single root certificate, that is mark it as "not trusted" ('n').
• ikloecker changed the status of T6830: Kleopatra: Smart card view does not show any certificates if one certficate could not be listed from Open to Testing.
Should really work now.
• ikloecker committed rKLEOPATRAaada28cae58b: Override comparison operator to consider read/displayed certificates (authored by • ikloecker).
Override comparison operator to consider read/displayed certificates
CarlSchwan committed rMTP219e708fd8b2: Pretty print user name for smime message (authored by CarlSchwan).
Pretty print user name for smime message
CarlSchwan committed rMTPfcd5f5115070: Handle no decryption recipients not available (authored by CarlSchwan).
Handle no decryption recipients not available
Make error message not closable
• ebo changed the status of T6830: Kleopatra: Smart card view does not show any certificates if one certficate could not be listed from Testing to Open.
• ikloecker added a comment to T6830: Kleopatra: Smart card view does not show any certificates if one certficate could not be listed.
Looks like ReaderStatusThread assumes that the data for the card didn't change. Therefore the card view is not updated (as before the changes for this issue).
• ebo added a comment to T6830: Kleopatra: Smart card view does not show any certificates if one certficate could not be listed.
Aha, the certificates are listed in the certificate view, though. And when you remove the smart card and re-insert it the keys are then listed without having to press the "load certificates" button.
• ebo added a comment to T6830: Kleopatra: Smart card view does not show any certificates if one certficate could not be listed.
For the X509 brainpool test cards I used it does not work in VS-Desktop-3.1.90.300-Beta . After clicking "load certificates" the button remains greyed out:
CarlSchwan committed rMTP6bbeba39ba28: Remove code duplication for printing list of recipients (authored by CarlSchwan).
Remove code duplication for printing list of recipients
I create 1000 empty files, and sign then using GNU parallel+gpg and trying various parallelization factors. (CPU used is AMD 3700X with 16 threads.)
Still no response after more than 2 years?
Add Windows to the kf5 CI
CarlSchwan committed rLIBKLEO29a94dd297bb: Fix missing std::string header with MSVC (authored by CarlSchwan).
Fix missing std::string header with MSVC
VS-Desktop-3.1.90.300-Beta: The executable is now found.
Therefore now the details of the signing key are listed when clicking on "keys".
CarlSchwan committed rKLEOPATRA57284ec485f3: Fix build with Qt 6.7 and QT_NO_CONTEXTLESS_CONNECT (authored by CarlSchwan).
Fix build with Qt 6.7 and QT_NO_CONTEXTLESS_CONNECT
• ebo edited projects for T6839: GpgOL: Keyresolver forbids to encrypt to (partially?) untrusted keys, added: Not A Bug; removed vsd32, Restricted Project.
It's true that for KEYTOCARD command, there is optional argument for ECDH.
My point is that for PKDECRYPT command, it will be needed to add mechanism for getting such a parameter (when we use KEM API in gpg-agent).
Nope, The gpgconf --kill keyboxd hangs too, if I see right, while waiting for agent:
$ strace gpgconf --kill keyboxd [...] clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x7f2d74fe2a10) = 3244 wait4(3244, 0x7ffc9836e364, 0, NULL) = ? ERESTARTSYS (To be restarted if SA_RESTART is set)
• ikloecker added a comment to T6839: GpgOL: Keyresolver forbids to encrypt to (partially?) untrusted keys.
In T6839#179343, @aheinecke wrote:Wait,.. I misunderstood this issue B81CE112B26A8EA8BE7B95D2E375339BF4C51840 has no encryption subkey o.O
• ikloecker committed rKLEOPATRAffa04c6859eb: GIT_SILENT Fix file names in copyright headers (authored by • ikloecker).
GIT_SILENT Fix file names in copyright headers
• ikloecker committed rLIBKLEO187030f83aa3: GIT_SILENT Fix file names in copyright headers (authored by • ikloecker).
GIT_SILENT Fix file names in copyright headers
CarlSchwan committed rMTP0e644ce3ad68: Port away from QTextCodec and thus Qt5Compat (authored by Volker Krause <vkrause@kde.org>).
Port away from QTextCodec and thus Qt5Compat
We already have the ECDH parameters for OpenPGP in the gpg-agent API. The question is how large the data for PQC will be - likely we need to use an inquire already for this reason.
• ebo moved T6344: Kleopatra, GPG: AboutData ctor on Windows takes too long from WiP to vsd-3.2.0 on the vsd32 board.
I created T6842 for the "Cleaning Kleopatra directories on startup" so that we can close this task once ebo confirms that all is fine. Usually I would close this task myself since I already tested it. But well we have QA now ;-)
l10n daemon script <scripty@kde.org> committed rMTP80942ba4b562: GIT_SILENT Sync po/docbooks with svn (authored by l10n daemon script <scripty@kde.org>).
GIT_SILENT Sync po/docbooks with svn
l10n daemon script <scripty@kde.org> committed rKLEOPATRA251dfae83504: SVN_SILENT made messages (.desktop file) - always resolve ours (authored by l10n daemon script <scripty@kde.org>).
SVN_SILENT made messages (.desktop file) - always resolve ours
l10n daemon script <scripty@kde.org> committed rKLEOPATRA8d248c2c4345: GIT_SILENT Sync po/docbooks with svn (authored by l10n daemon script <scripty@kde.org>).
GIT_SILENT Sync po/docbooks with svn
Considering the design of gpg-agent which focuses on private key operations and data, it would be better to enhance the gpg-agent protocol to inquire public key data of any format defined by the client (including ECDH KDF parameters of OpenPGP). I mean, instead of storing data in the key file (originally designed for private key + some additional data), we will enhance the protocol.
Nov 26 2023
Nov 26 2023
CarlSchwan committed rKLEOPATRAe981e302613e: Fix build with Qt 6.7 and QT_NO_CONTEXTLESS_CONNECT (authored by CarlSchwan).
Fix build with Qt 6.7 and QT_NO_CONTEXTLESS_CONNECT
• werner edited projects for T6838: keyboxd hangs on stale locks after changing hostname, added: gnupg24; removed gnupg24 (gnupg-2.4.4).
That is a feature. Consider the case that ~/.gnupg is on network file system and thus possible in use on several boxes. Thus before we remove stale lock files we do not only compare the PID but also the hostname. Granted, this is rare but we have had such cases in the past with locks.
Volker Krause <vkrause@kde.org> committed rLIBKLEO756c43fe8d90: Port away from wildcard QRegExp uses (authored by Volker Krause <vkrause@kde.org>).
Port away from wildcard QRegExp uses
l10n daemon script <scripty@kde.org> committed rLIBKLEO4eef9e9b10f1: GIT_SILENT Sync po/docbooks with svn (authored by l10n daemon script <scripty@kde.org>).
GIT_SILENT Sync po/docbooks with svn
l10n daemon script <scripty@kde.org> committed rKLEOPATRAe265817e355f: GIT_SILENT Sync po/docbooks with svn (authored by l10n daemon script <scripty@kde.org>).
GIT_SILENT Sync po/docbooks with svn
l10n daemon script <scripty@kde.org> committed rMTP6edd40b9d429: GIT_SILENT Sync po/docbooks with svn (authored by l10n daemon script <scripty@kde.org>).
GIT_SILENT Sync po/docbooks with svn
l10n daemon script <scripty@kde.org> committed rLIBKLEO5f913d5a45e6: GIT_SILENT Sync po/docbooks with svn (authored by l10n daemon script <scripty@kde.org>).
GIT_SILENT Sync po/docbooks with svn
l10n daemon script <scripty@kde.org> committed rKLEOPATRAc4a9df49bb3e: GIT_SILENT Sync po/docbooks with svn (authored by l10n daemon script <scripty@kde.org>).
GIT_SILENT Sync po/docbooks with svn
l10n daemon script <scripty@kde.org> committed rKLEOPATRAac54640ed237: SVN_SILENT made messages (.desktop file) - always resolve ours (authored by l10n daemon script <scripty@kde.org>).
SVN_SILENT made messages (.desktop file) - always resolve ours
l10n daemon script <scripty@kde.org> committed rMTP7c52dfb5c2e5: GIT_SILENT Sync po/docbooks with svn (authored by l10n daemon script <scripty@kde.org>).
GIT_SILENT Sync po/docbooks with svn
l10n daemon script <scripty@kde.org> committed rKLEOPATRA7d0d4cd175a1: GIT_SILENT Sync po/docbooks with svn (authored by l10n daemon script <scripty@kde.org>).
GIT_SILENT Sync po/docbooks with svn
l10n daemon script <scripty@kde.org> committed rLIBKLEO4a6c726b735d: GIT_SILENT Sync po/docbooks with svn (authored by l10n daemon script <scripty@kde.org>).
GIT_SILENT Sync po/docbooks with svn
Nov 25 2023
Nov 25 2023
Works nicely for me in beta300
• aheinecke moved T6837: GpgOL: Keyresolver size default too small from Backlog to QA on the vsd32 board.
• aheinecke moved T6834: Gpg4win: Update pkg-copyright.txt and install it from WiP to QA on the vsd32 board.
• aheinecke moved T6832: MimeTreeParser can't find Kleopatra executable on Windows from WiP to QA on the vsd32 board.
I'm quite happy with that now. The only thing left to do would be to benchmark this, but to keep this as a an open task for that seems wrong.
• aheinecke moved T6830: Kleopatra: Smart card view does not show any certificates if one certficate could not be listed from WiP to QA on the vsd32 board.
• aheinecke moved T6833: Kleopatra: Multiple dirmngr started when searching for keys from WiP to QA on the vsd32 board.
Fix some links
GIT_SILENT: Use QLatin1StringView
mlaurent committed rKLEOPATRAf0a337ebd420: GIT_SILENT: Use QLatin1StringView (authored by mlaurent).
GIT_SILENT: Use QLatin1StringView
GIT_SILENT: Use QLatin1StringView
Außerdem kann man das ja konfigurieren 😅
• aheinecke triaged T6836: Kleopatra: use monospace font in certificate view (Windows) as Low priority.
Yeah,.. keep the defaults and don't show them? :) With this screenshot you can send even the most friendly user running away. Monospace won't help there. And using different fonts in the same table is also ugly and monospace for the complete table is a no go for me since users should not look at fingerprints or keyids in this table view.
• aheinecke changed the status of T6834: Gpg4win: Update pkg-copyright.txt and install it from Open to Testing.
So this is done now to my liking. I took the pkg-copyright from GNUPG as a baseline at the top and then went through all other packages. It is mostly about licenses though and not about copyright holders, even the license information for some packages was weird to figure out. Let alone the individual copyright holders. So I don't think we can or should say "The list of other copyright holders". I changed that now "For a complete list of licenses see: "
• aheinecke changed the status of T6837: GpgOL: Keyresolver size default too small from Open to Testing.
• aheinecke closed T6344: Kleopatra, GPG: AboutData ctor on Windows takes too long, a subtask of T6259: Kleopatra: Improve startup performance , as Resolved.
This now works to my liking.
• aheinecke changed the status of T6793: Cleanup temporary files / dirs with decrypted content from Open to Testing.
• aheinecke changed the status of T6793: Cleanup temporary files / dirs with decrypted content, a subtask of T6199: Kleopatra: MIME viewer support, from Open to Testing.
I read the documentation (and stackoverflow) as owner we have to close our handle before deleting the file. With FILE_SHARE_DELETE we only ensure that others must live with the fact that we can always delete the file, but since we hold an exclusive READ right (which we gracefully share with others) our handle needs to be closed. So the trick was just to CloseHandle first and then the file could be deleted.
Update frontend packages
MSI: Add GUIDs for new files
• aheinecke committed rWd3b807cf3ee1: Install pkg-copyright.txt as pkg-licenses.txt (authored by • aheinecke).
Install pkg-copyright.txt as pkg-licenses.txt
Update PKG-Copyright
Install kcoreaddons license texts
• aheinecke committed rMTP55bc3d676b82: Fix cleanup of temporary opened files (authored by • aheinecke).
Fix cleanup of temporary opened files
Open attachments on double click
Volker Krause <vkrause@kde.org> committed rLIBKLEO72f68cc2ff4f: Port KeySelectionDialog away from QRegExp (authored by Volker Krause <vkrause@kde.org>).
Port KeySelectionDialog away from QRegExp
• aheinecke committed rLIBKLEO51929a1d1a1b: Use AdjustingScrollArea in key approval dialog (authored by • aheinecke).
Use AdjustingScrollArea in key approval dialog
• aheinecke committed rLIBKLEO47c9800dc02b: Add ScrollArea from Kleopatra (authored by • aheinecke).
Add ScrollArea from Kleopatra
Bump library version
• aheinecke assigned T6841: GPGSM / GPGME: Untrusted root CA's cause certificates to be invalid instead of Unknown trust to • werner.
My very simple patch for this would be:
• aheinecke triaged T6841: GPGSM / GPGME: Untrusted root CA's cause certificates to be invalid instead of Unknown trust as Normal priority.
• aheinecke added a comment to T6839: GpgOL: Keyresolver forbids to encrypt to (partially?) untrusted keys.
Wait,.. I misunderstood this issue B81CE112B26A8EA8BE7B95D2E375339BF4C51840 has no encryption subkey o.O
The Keyresolver did not allow me to encrypt to an S/MIME cert where the root CA was not in my trustlist.txt that was part of this feature to allow users to encrypt "non vs-nfd compliant" to such untrusted keys, like they would be able to also encrypt to untrusted openpgp keys.
• aheinecke triaged T6839: GpgOL: Keyresolver forbids to encrypt to (partially?) untrusted keys as High priority.
• aheinecke committed rLIBKLEO31ee4f9790c1: Use AdjustingScrollArea in key approval dialog (authored by • aheinecke).
Use AdjustingScrollArea in key approval dialog
• aheinecke committed rLIBKLEO336c139e6e11: Add ScrollArea from Kleopatra (authored by • aheinecke).
Add ScrollArea from Kleopatra
l10n daemon script <scripty@kde.org> committed rMTP96802ceec4ce: GIT_SILENT Sync po/docbooks with svn (authored by l10n daemon script <scripty@kde.org>).
GIT_SILENT Sync po/docbooks with svn
l10n daemon script <scripty@kde.org> committed rMTP68b44e157a7f: GIT_SILENT Sync po/docbooks with svn (authored by l10n daemon script <scripty@kde.org>).
GIT_SILENT Sync po/docbooks with svn