Steffen Jaeckel
e8348b8d17
Update preferences.h
...
* fix const correctness of `prefs_load()`
* remove some API's that don't exist anymore
Signed-off-by: Steffen Jaeckel <jaeckel-floss@eyet-services.de>
2023-08-31 23:14:02 +02:00
Steffen Jaeckel
1bb1f57128
No need to double check the window type
...
Signed-off-by: Steffen Jaeckel <jaeckel-floss@eyet-services.de>
2023-08-31 23:14:02 +02:00
Steffen Jaeckel
5657aac33d
Fix some more char*
-> gchar*
.
...
Signed-off-by: Steffen Jaeckel <jaeckel-floss@eyet-services.de>
2023-08-31 23:14:02 +02:00
Michael Vetter
8618203988
Merge pull request #1882 from profanity-im/fix/1880-pluginsinstall
...
Don't crash when using `/plugins install` disconnected
2023-08-28 10:00:54 +02:00
Michael Vetter
b88174709f
Don't crash when using /plugins install
disconnected
...
When we are not connected and run `/plugins install` we crash because we
get the account struct to check for the (xmpp) tls setting.
To apply that to the http (etc) connection to download the plugin from a
server.
This got introduced in 3a86b8c29
to fix #1624 .
There are several ways to handle this (some described in 1880) in this
patch I took the route that it will use secure connection when we are
nto connected and will only check the tls.trust account setting if we
are connected.
Fix https://github.com/profanity-im/profanity/issues/1880
2023-08-28 07:55:29 +02:00
Michael Vetter
65d62dbf49
readme: format btc
2023-08-25 20:11:26 +02:00
Michael Vetter
a6deed2f1e
Merge pull request #1879 from profanity-im/enablemacos
...
ci: reenable macos
2023-08-25 19:52:10 +02:00
Michael Vetter
35c3068a2d
ci: reenable macos
...
This reverts commit a815e251b6
.
2023-08-25 19:36:29 +02:00
Michael Vetter
568266ec6b
Merge pull request #1878 from profanity-im/fix/oxcarbon
...
ox: correctly recognize ox encrypted carbons
2023-08-25 08:36:36 +02:00
Michael Vetter
122434a276
ox: correctly recognize ox encrypted carbons
...
and dont display them as legacy pgp encrypted messages.
This was forgotten in 2c94ee5a8
.
Fix https://github.com/profanity-im/profanity/issues/1875
2023-08-25 08:24:53 +02:00
Michael Vetter
02c33474fa
doap: add xep0373
2023-08-23 10:49:57 +02:00
Michael Vetter
d286e4674c
readme: add btc
2023-08-20 21:03:05 +02:00
Michael Vetter
2916b6e716
Add xep-0049 to doap
...
Found by @H3rnand3zzz.
2023-08-11 16:04:27 +02:00
Michael Vetter
492efc432c
Display headline sender
2023-08-11 15:56:26 +02:00
Michael Vetter
a17544d962
Remove not needed check
2023-08-11 15:34:26 +02:00
Michael Vetter
f56ce07141
Merge pull request #1876 from mdosch/fix-screensaver-spam
...
Don't use xscreensaver on wayland.
2023-08-11 13:25:06 +02:00
Martin Dosch
2ed6211cc3
Don't use xscreensaver on wayland.
...
Fixes #1874 .
2023-08-11 13:12:52 +02:00
Michael Vetter
191f571bcd
Fix spaces in /privacy description
2023-08-04 08:39:20 +02:00
Michael Vetter
fc65607f45
Add 0.14.0 release to doap and fix links
2023-08-04 08:37:54 +02:00
Michael Vetter
fd2b977d6a
Fix my email
2023-08-04 08:35:27 +02:00
Michael Vetter
a815e251b6
ci: disable macos until they have libstrophe 0.12.3 in brew
2023-08-03 08:45:41 +02:00
Michael Vetter
2cf1269b68
Typo fixes
2023-08-03 08:26:23 +02:00
Michael Vetter
b223b7ebac
Start new cycle
2023-08-03 08:06:19 +02:00
Michael Vetter
6b0fddd925
Release 0.14.0
2023-08-03 08:01:43 +02:00
Michael Vetter
e83ed9205d
Update doap file DEV -> 0.14.0
2023-08-03 07:59:10 +02:00
Michael Vetter
acc2ec8fd7
Add 0.14.0 changelog
2023-08-03 07:56:33 +02:00
Michael Vetter
3f034c46cd
Depend on libstrophe 0.12.3
...
Among other things for:
* https://github.com/profanity-im/profanity/issues/915
* https://github.com/profanity-im/profanity/issues/1849
2023-08-02 16:34:34 +02:00
Michael Vetter
e853c121d9
Fix my email address
...
in all files
2023-07-31 16:51:58 +02:00
Michael Vetter
215e35b198
Fix my email address
2023-07-31 16:42:45 +02:00
Michael Vetter
3a9de7d21b
fix: use correct format specifier in /privacy
...
Thanks to @H3rnand3zzz for noticing.
2023-07-27 15:13:44 +02:00
Michael Vetter
fa80562fa8
Merge pull request #1870 from profanity-im/feat/privacy-setting
...
Move related commands as subcommands into /privacy
2023-07-27 10:27:24 +02:00
Michael Vetter
5fb3453808
Print actual client id in /privacy overview
...
Instead of just saying that we sent the "default".
2023-07-26 20:43:50 +02:00
Michael Vetter
22b1d14b67
Add helper function to create version string
...
And remove all the duplicate code.
Depending on the situation prof_get_version() will return:
* 0.13.1
* 0.13.1dev
* 0.13.1dev.master.69d8c1f9
2023-07-25 20:58:15 +02:00
Michael Vetter
13af6c96dc
Link from /privacy to relevant /account settings
...
Related to https://github.com/profanity-im/profanity/issues/1836
2023-07-25 20:14:29 +02:00
Michael Vetter
f7cce4c5c1
Move /os into /privacy os
...
Related to https://github.com/profanity-im/profanity/issues/1836
2023-07-25 16:35:14 +02:00
Michael Vetter
feba4b8263
Add cons_privacy_setting() to print privacy setting infos
2023-07-24 18:25:34 +02:00
Michael Vetter
69d8c1f96e
Merge pull request #1869 from profanity-im/fix/1868-mam
...
Fix crash if we don't get `first` stanza during RSM
2023-07-18 16:45:40 +02:00
Michael Vetter
a963ff4d24
mam: check if we get 'first' stanza before usage
...
Fix https://github.com/profanity-im/profanity/issues/1868
2023-07-18 16:44:44 +02:00
Michael Vetter
c7c041a853
Add xep-0059 to doap
...
Implemented for MAM since
* https://github.com/profanity-im/profanity/pull/1417 (0.11.0)
* https://github.com/profanity-im/profanity/commit/f0202a2fe (DEV)
2023-07-18 16:43:54 +02:00
Michael Vetter
4814887730
Merge pull request #1858 from H3rnand3zzz/cleanup/auto_char
...
Major cleanup
2023-07-14 07:23:40 +02:00
John Hernandez
09f217d667
Improve documentation
2023-07-13 21:22:42 +02:00
John Hernandez
865a056315
Cleanup g_strfreev()
to auto_gcharv
...
Include some additional minor cleanups
2023-07-13 17:05:07 +02:00
John Hernandez
029f1caa52
Cleanup jid_destroy
to auto_jid
...
Remove unused variables
Apply minor cleanups
2023-07-13 17:05:07 +02:00
John Hernandez
8304ac86ff
g_free()
to auto_gfree
, introduce auto_guchar
...
Fix 11 potential mem leaks in theme.c
2023-07-13 17:04:59 +02:00
John Hernandez
3a4cd7da48
Cleanup and mem leak fix
...
Improve usage of `gchar` and `char` by setting them correctly
Increase usage of `auto_gchar` and `auto_char`
Fix 2 mem leaks (rosterwin.c, avatar.c)
2023-07-12 17:43:33 +02:00
Michael Vetter
9451ea7c4c
Mention DEV for doap in release guide
2023-07-12 14:09:55 +02:00
Michael Vetter
62e98dee74
Fix crash when using NetBSD curses implementation
...
Thanks to @alarixnia fot the patch and bugreport.
```
Forwarding a bug reported using the NetBSD bug tracker ("Profanity crashes at login"): http://gnats.netbsd.org/57050
The code in question here handles messages by people not in the user's contact list, and what is probably happening is that the XMPP server is sending such a message before profanity has set up its window layout.
Setting roster.unsubscribed=false indeed makes profanity start without crashing, and the attached patch bails out early in the problematic code path if layout->subwin is NULL (Adrian verified for me that either of the two makes profanity work for him again). But I am not familiar enough with the profanity code to say if this has any issues.
Profanity compiled with ncurses doesn't crash because ncurses's wattron() has a guard against the user passing null pointers, but the X/Open curses library standard doesn't have this guarantee and there's no guard in the NetBSD curses implementation.
```
Fix https://github.com/profanity-im/profanity/issues/1769
2023-07-12 13:58:03 +02:00
Michael Vetter
91c2c5f374
Merge pull request #1863 from H3rnand3zzz/cleanup/auto_char_part1
...
Change `char`->`free` to `auto_char char` for autocleanup
2023-07-12 13:51:43 +02:00
John Hernandez
00bea804e2
Improve documentation two functions
...
Namely `cmd_process_input()` and `files_get_data_path()`.
Edited by @jubalh.
2023-07-11 13:26:37 +02:00
John Hernandez
e1d137f4e6
Change char->free to auto_char char for autocleanup
...
Replace `gchar` and `g_free` to `auto_gchar`
Correct certain `char` functions/variables to `gchar`
Related to #1819 .
Edited by @jubalh.
2023-07-11 13:26:37 +02:00