Michael Vetter
199162b11a
Add omemo_close function
...
We call omemo_init() when starting profanity and should have an
omemo_close() at exit.
For now we free the fingerprint autocompleter in there.
Fixes valgrind:
```
==13226== 24 bytes in 1 blocks are definitely lost in loss record 2,855
of 6,958
==13226== at 0x483677F: malloc (in
/usr/lib64/valgrind/vgpreload_memcheck-amd64-linux.so)
==13226== by 0x48AD39: autocomplete_new (autocomplete.c:57)
==13226== by 0x4AB89F: omemo_init (omemo.c:127)
==13226== by 0x42C283: _init (profanity.c:206)
==13226== by 0x42BFF3: prof_run (profanity.c:98)
==13226== by 0x4B25E6: main (main.c:172)
```
Regards https://github.com/profanity-im/profanity/issues/1131
2019-07-04 10:30:56 +02:00
Michael Vetter
46ecdc335c
Expand suppressiosn file
...
Using glib and python suppressions to filter out more false positives.
2019-07-04 09:22:29 +02:00
Michael Vetter
4a6b1665f3
Use correct jid variable
2019-07-03 15:28:46 +02:00
Michael Vetter
f504a02167
Define goto out in _private_chat_handler()
2019-07-03 15:27:31 +02:00
Michael Vetter
19902e8e21
Set plain message in _private_chat_handler
...
In case that plain is NULL we need to copy over from body.
Fix https://github.com/profanity-im/profanity/issues/1144
2019-07-03 15:16:19 +02:00
Michael Vetter
ad9263520e
Show MUC history on intentional reconnect
...
Small bug caused by 13675fb
and ce5a4ed
.
Fix https://github.com/profanity-im/profanity/issues/1142
2019-07-03 09:19:24 +02:00
Michael Vetter
9f813445b7
Ask for glib version in issue template
2019-06-26 11:07:34 +02:00
Michael Vetter
a142d3a4f6
Merge pull request #1137 from paulfariello/feature/fix-omemo-trusted-state
...
Mark messages received from a session as trusted
2019-06-25 20:04:32 +02:00
Paul Fariello
f081766913
Mark messages received from a session as trusted
2019-06-25 18:43:15 +02:00
Michael Vetter
684fdf68ac
Add 0.7.0 changelog entry
2019-06-24 07:42:46 +02:00
Michael Vetter
165602e5c7
Merge pull request #1136 from paulfariello/hotfix/segfault_on_empty_carbon
...
Fix a segfault when carbon has no body
2019-06-21 17:03:23 +02:00
Paul Fariello
45e8467231
Fix a segfault when carbon has no body
2019-06-21 16:49:52 +02:00
Michael Vetter
4fa5fbaea4
Merge pull request #1135 from paulfariello/hotfix/Fix_handling_of_encrypted_carbons
...
Fix handling of encrypted carbons
2019-06-21 15:59:53 +02:00
Paul Fariello
db8f32c049
Fix handling of encrypted carbons
2019-06-21 15:52:24 +02:00
Michael Vetter
3bba3d9812
Merge pull request #1134 from paulfariello/hotfix/don_t_highlight_cleartext_message_as_untrusted
...
Don t highlight cleartext message as untrusted
2019-06-21 15:51:40 +02:00
Paul Fariello
498b75afa9
Don't highlight cleartext message as untrusted
2019-06-21 15:50:41 +02:00
Michael Vetter
ff46703073
Merge pull request #1133 from paulfariello/hotfix/missing_message_id_segfault
...
Fix segfault when receiving messages without ID
2019-06-21 15:49:25 +02:00
Paul Fariello
ac96a6951d
Fix segfault when receiving messages without ID
2019-06-21 12:03:08 +02:00
Michael Vetter
4b62f8f2ba
Merge pull request #1132 from paulfariello/hotfix/muc-history-segfault
...
Fix NULL pointer when handling non encrypted message in MUC
2019-06-21 11:47:12 +02:00
Paul Fariello
a444137e66
Fix NULL pointer when handling non encrypted message in MUC
2019-06-21 11:34:36 +02:00
Michael Vetter
db86286ea3
Merge pull request #1126 from paulfariello/feature/decrypt_all_incoming_OMEMO_msg
...
Decrypt all incoming omemo msg
2019-06-21 09:08:58 +02:00
Paul Fariello
f831f65737
Rename prof_message_t into ProfMessage
2019-06-20 14:30:45 +02:00
Paul Fariello
9482ce6168
Set foreground color for untrusted messages
2019-06-20 14:30:45 +02:00
Paul Fariello
44d16e9141
Add prof_message_t to wrap all message attributes
...
Probably missing copy of body to plain in carbon and privmessage.
Only covers the incoming message path because goal is OMEMO decryption
of untrusted message.
Cover some of the log functions but not all.
2019-06-20 14:30:42 +02:00
Paul Fariello
3bb3cc625d
Use flags in xmmp/message.c for encryption and trust
2019-06-20 14:30:37 +02:00
Paul Fariello
a650ecc67d
Add trusted state after OMEMO decryption
...
Use it to print message on red background if not trusted.
2019-06-20 14:29:55 +02:00
Paul Fariello
2604786cb6
Decrypt all incoming OMEMO msg
...
Trust all key as long as it's for reading. This code isn't multithread
safe.
2019-06-20 14:29:55 +02:00
Michael Vetter
7c119aa9bf
Merge pull request #1130 from profanity-im/fix/memleaks
...
Fix memory leaks
2019-06-20 12:46:03 +02:00
Michael Vetter
7ca8ec3e6b
_bookmark_destroy: follow normal logic
2019-06-20 12:37:32 +02:00
Michael Vetter
b8c8059402
Call message_handlers_clear() upon disconnect
...
Free pubsub_event_handlers. Fix memory leaks.
2019-06-20 12:37:32 +02:00
Michael Vetter
11b8204d14
Call iq_handlers_clear() upon disconnect
...
Free id_handlers. Fix memory leaks.
2019-06-20 12:37:32 +02:00
Michael Vetter
29e2d16e14
Free contacts in omemo_start_sessions()
2019-06-19 23:18:45 +02:00
Michael Vetter
0d698d4898
Free OMEMO session store upon disconnect
2019-06-19 23:15:24 +02:00
Michael Vetter
6c9631d7ea
Fix prefs_get_str related leaks in unit tests
...
Related to https://github.com/profanity-im/profanity/issues/1019
2019-06-19 17:15:47 +02:00
Michael Vetter
184f01c4ac
Fix prefs_get_string mem leaks in statusbar
2019-06-19 16:45:18 +02:00
Michael Vetter
20e94beca2
Free last_msg_timestamp
...
Fix memory leak.
2019-06-19 12:30:57 +02:00
Michael Vetter
110a2c7bb8
Merge pull request #1129 from profanity-im/feature/632-set-all-time
...
Add option to set all window related time formats
2019-06-17 14:46:55 +02:00
Michael Vetter
ae1e60a9f9
Add option to set all window related time formats
...
Implements feature requested at: https://github.com/profanity-im/profanity/issues/632
So instead of:
/time console set <format>
/time chat set <format>
/time muc set <format>
/time mucconfig set <format>
/time private set <format>
/time xml set <format>
As a short cut the user can do:
/time all set <format>
Excluding statusbar and lastactivity settings since they are not for main windows, but used slightly differently.
2019-06-17 14:23:33 +02:00
Michael Vetter
de787a8582
Remove cons_mouse_setting() stub
...
Mouse support has been disabled long ago.
2019-06-17 13:30:56 +02:00
Michael Vetter
e4b007c9da
Add copyright to omemo code
2019-06-17 10:47:56 +02:00
Michael Vetter
40b72ffe55
Add myself to copyright
...
Like discussed with James.
2019-06-17 10:44:08 +02:00
Michael Vetter
d66ffde91f
Use profanity channel as example
2019-06-17 10:28:04 +02:00
Michael Vetter
26199f737c
Add ISSUE_TEMPLATE.md
2019-06-14 08:04:50 +02:00
Michael Vetter
8d12e3fdb9
Update release guide with libprofanity info
2019-06-11 07:45:11 +02:00
Michael Vetter
5dd6ba73f4
Merge pull request #1110 from profanity-im/feature/704-ui-behaviour-reconnect
...
Feature/704 ui behaviour reconnect
2019-06-11 07:00:34 +02:00
Michael Vetter
da54eaf42b
Merge pull request #1127 from profanity-im/fix/1120-rejoin-mucs-on-reconnect
...
Rejoin all MUCs on reconnect
2019-06-11 06:39:42 +02:00
Michael Vetter
47e55cc112
Safe last MUC message timestamp per MUC
...
After pasis review of my code he thinks it's better to safe the
timestamp per MUC so we can account for some problems that could occur
with timing.
2019-06-11 06:35:03 +02:00
Michael Vetter
ff6038fe32
Rejoin all MUCs on reconnect
...
Should fix https://github.com/profanity-im/profanity/issues/1120
2019-06-10 23:18:43 +02:00
Michael Vetter
c4fcc0c3cb
Merge pull request #1125 from profanity-im/fix/519-logrotate
...
Iterate logfiles until 100 are reached
2019-06-10 14:20:29 +02:00
Michael Vetter
60d8d7e93a
Merge pull request #1124 from paulfariello/feature/remove_session_when_untrusting_omemo_device
...
Remove OMEMO session when untrusting a fingerprint
2019-06-08 00:25:43 +02:00