1
0
Fork 0
Commit Graph

7285 Commits

Author SHA1 Message Date
Michael Vetter fc65607f45 Add 0.14.0 release to doap and fix links 2023-08-04 08:37:54 +02:00
Michael Vetter fd2b977d6a Fix my email 2023-08-04 08:35:27 +02:00
Michael Vetter a815e251b6 ci: disable macos until they have libstrophe 0.12.3 in brew 2023-08-03 08:45:41 +02:00
Michael Vetter 2cf1269b68 Typo fixes 2023-08-03 08:26:23 +02:00
Michael Vetter b223b7ebac Start new cycle 2023-08-03 08:06:19 +02:00
Michael Vetter 6b0fddd925 Release 0.14.0 2023-08-03 08:01:43 +02:00
Michael Vetter e83ed9205d Update doap file DEV -> 0.14.0 2023-08-03 07:59:10 +02:00
Michael Vetter acc2ec8fd7 Add 0.14.0 changelog 2023-08-03 07:56:33 +02:00
Michael Vetter 3f034c46cd Depend on libstrophe 0.12.3
Among other things for:
* https://github.com/profanity-im/profanity/issues/915
* https://github.com/profanity-im/profanity/issues/1849
2023-08-02 16:34:34 +02:00
Michael Vetter e853c121d9 Fix my email address
in all files
2023-07-31 16:51:58 +02:00
Michael Vetter 215e35b198 Fix my email address 2023-07-31 16:42:45 +02:00
Michael Vetter 3a9de7d21b fix: use correct format specifier in /privacy
Thanks to @H3rnand3zzz for noticing.
2023-07-27 15:13:44 +02:00
Michael Vetter fa80562fa8
Merge pull request #1870 from profanity-im/feat/privacy-setting
Move related commands as subcommands into /privacy
2023-07-27 10:27:24 +02:00
Michael Vetter 5fb3453808 Print actual client id in /privacy overview
Instead of just saying that we sent the "default".
2023-07-26 20:43:50 +02:00
Michael Vetter 22b1d14b67 Add helper function to create version string
And remove all the duplicate code.

Depending on the situation prof_get_version() will return:
* 0.13.1
* 0.13.1dev
* 0.13.1dev.master.69d8c1f9
2023-07-25 20:58:15 +02:00
Michael Vetter 13af6c96dc Link from /privacy to relevant /account settings
Related to https://github.com/profanity-im/profanity/issues/1836
2023-07-25 20:14:29 +02:00
Michael Vetter f7cce4c5c1 Move /os into /privacy os
Related to https://github.com/profanity-im/profanity/issues/1836
2023-07-25 16:35:14 +02:00
Michael Vetter feba4b8263 Add cons_privacy_setting() to print privacy setting infos 2023-07-24 18:25:34 +02:00
Michael Vetter 69d8c1f96e
Merge pull request #1869 from profanity-im/fix/1868-mam
Fix crash if we don't get `first` stanza during RSM
2023-07-18 16:45:40 +02:00
Michael Vetter a963ff4d24 mam: check if we get 'first' stanza before usage
Fix https://github.com/profanity-im/profanity/issues/1868
2023-07-18 16:44:44 +02:00
Michael Vetter c7c041a853 Add xep-0059 to doap
Implemented for MAM since
* https://github.com/profanity-im/profanity/pull/1417 (0.11.0)
* https://github.com/profanity-im/profanity/commit/f0202a2fe (DEV)
2023-07-18 16:43:54 +02:00
Michael Vetter 4814887730
Merge pull request #1858 from H3rnand3zzz/cleanup/auto_char
Major cleanup
2023-07-14 07:23:40 +02:00
John Hernandez 09f217d667 Improve documentation 2023-07-13 21:22:42 +02:00
John Hernandez 865a056315 Cleanup `g_strfreev()` to `auto_gcharv`
Include some additional minor cleanups
2023-07-13 17:05:07 +02:00
John Hernandez 029f1caa52 Cleanup `jid_destroy` to `auto_jid`
Remove unused variables
Apply minor cleanups
2023-07-13 17:05:07 +02:00
John Hernandez 8304ac86ff `g_free()` to `auto_gfree`, introduce `auto_guchar`
Fix 11 potential mem leaks in theme.c
2023-07-13 17:04:59 +02:00
John Hernandez 3a4cd7da48 Cleanup and mem leak fix
Improve usage of `gchar` and `char` by setting them correctly
Increase usage of `auto_gchar` and `auto_char`
Fix 2 mem leaks (rosterwin.c, avatar.c)
2023-07-12 17:43:33 +02:00
Michael Vetter 9451ea7c4c Mention DEV for doap in release guide 2023-07-12 14:09:55 +02:00
Michael Vetter 62e98dee74 Fix crash when using NetBSD curses implementation
Thanks to @alarixnia fot the patch and bugreport.

```
Forwarding a bug reported using the NetBSD bug tracker ("Profanity crashes at login"): http://gnats.netbsd.org/57050

The code in question here handles messages by people not in the user's contact list, and what is probably happening is that the XMPP server is sending such a message before profanity has set up its window layout.

Setting roster.unsubscribed=false indeed makes profanity start without crashing, and the attached patch bails out early in the problematic code path if layout->subwin is NULL (Adrian verified for me that either of the two makes profanity work for him again). But I am not familiar enough with the profanity code to say if this has any issues.

Profanity compiled with ncurses doesn't crash because ncurses's wattron() has a guard against the user passing null pointers, but the X/Open curses library standard doesn't have this guarantee and there's no guard in the NetBSD curses implementation.
```

Fix https://github.com/profanity-im/profanity/issues/1769
2023-07-12 13:58:03 +02:00
Michael Vetter 91c2c5f374
Merge pull request #1863 from H3rnand3zzz/cleanup/auto_char_part1
Change `char`->`free` to `auto_char char` for autocleanup
2023-07-12 13:51:43 +02:00
John Hernandez 00bea804e2 Improve documentation two functions
Namely `cmd_process_input()` and `files_get_data_path()`.

Edited by @jubalh.
2023-07-11 13:26:37 +02:00
John Hernandez e1d137f4e6 Change char->free to auto_char char for autocleanup
Replace `gchar` and `g_free` to `auto_gchar`
Correct certain  `char` functions/variables to `gchar`

Related to #1819.

Edited by @jubalh.
2023-07-11 13:26:37 +02:00
Michael Vetter 245d69deb6
Merge pull request #1865 from profanity-im/autotools-omemo-fix
Fix OMEMO autodetection in autotools
2023-07-11 04:36:08 +02:00
Dmitry Podgorny 4a8d14c5a6 Fix OMEMO autodetection in autotools
This commit fixes few issues related to OMEMO autodetection:

1. Absence of libsignal-protocol-c doesn't turn OMEMO off, just prints a
   notice message. It should (a) set BUILD_OMEMO=false and (b) terminate
   with an error on --enable-omemo=yes.
2. Check for gcrypt continues even if libsignal-protocol-c fails. In this
   case, LIBS variable can be updated with unneeded -lgcrypt.
3. Similarly to item 2., if libsignal-protocol-c is present, but gcrypt
   isn't, variable LIBS is updated with unneeded library.

To resolve the above issues, use intermediate variable OMEMO_LIBS to
accumulate required libraries and set BUILD_OMEMO only when all checks
are passed.
2023-07-11 03:24:23 +03:00
Michael Vetter bbd28ef946
Merge pull request #1857 from H3rnand3zzz/feature/db-history-switcher
DB History Switcher, cleanup, mem leak fix
2023-07-04 14:55:46 +02:00
Michael Vetter d43c3460cb Add xep-0084 info to doap file
Downloading of avatars was added in
https://github.com/profanity-im/profanity/pull/1240
by me for 0.8.0.

Publishing avatars was added in
https://github.com/profanity-im/profanity/pull/1714
by @MarcoPolo-PasTonMolo for 0.13.0.

Disabling to publish avatar was added in
https://github.com/profanity-im/profanity/pull/1843
by ike08 for the next version.

A later improvement was done in
https://github.com/profanity-im/profanity/pull/1845
by me for the next version.
2023-07-03 17:37:18 +02:00
Michael Vetter db40f78254 Add missing releases to doap file 2023-07-03 17:21:08 +02:00
Michael Vetter a8c1a02447 Add xep-0313 info to doap file
Started in https://github.com/profanity-im/profanity/pull/1306
for 0.9.0 by me.
We mentioned that it was experimental.

Later heavily improved in
https://github.com/profanity-im/profanity/pull/1724
for upcoming version by MarcoPolo-PasTonMolo.

MUC MAM is in development at:
https://github.com/profanity-im/profanity/pull/1862

Tracking issue: https://github.com/profanity-im/profanity/issues/660
2023-07-03 17:15:18 +02:00
Michael Vetter 9c7a27abd4 Add xep-0054 info to doap file
Implemented for next release in
https://github.com/profanity-im/profanity/pull/1757
by @techmetx11.
2023-07-03 17:11:43 +02:00
John Hernandez 07fcaa7be3 Fix memory leak and cleanup 2023-07-03 16:06:27 +02:00
John Hernandez 4a70f5f513 Cleanup `char*` to `auto_gchar gchar*` for `prefs_get_string`
Necessity explained in #1819
2023-07-03 16:06:27 +02:00
John Hernandez 1c102fec27 Add `/privacy logging` command
Add ability to completely turn logs off,
Needed since `/logging` and `/history` didn't stop history logging
in the DB, only in files.
Command might break something on usage,
hence it was primarily introduced for privacy geeks.
Privacy command discussion #1836
2023-07-03 16:06:24 +02:00
Michael Vetter f67d548ebf
Merge pull request #1850 from H3rnand3zzz/feature/pgp-improved
Extend `/pgp` command to make key exchange procedure easier
2023-07-03 14:18:35 +02:00
John Hernandez 7d6cbfdcd2 Refactor autocomplete
Use `_cmd_ac_complete_params` when fits, thus reducing plurality
2023-07-02 14:25:55 +02:00
John Hernandez 36784738fc Add optional pgp public key autoimport
Refactor `p_gpg_list_keys`
Add `/pgp autoimport` command,
it's not described in XEP-0027, but used in some clients,
such as PSI, Pidgin. It will autoimport keys received with
`/pgp sendpub`, in plain text as a message, or using features,
provided in other clients. It doesn't autoassign them, but shows
command to assign, letting user to decide.
Improve documentation for some preexisting functions
Add contact argument to `/pgp sendpub`
2023-07-02 14:25:55 +02:00
John Hernandez 349e4cb322 Refactor `_cmd_set_boolean_preference` function
Improve documentation
Update code formatting and indentation for better readability
Show state if no argument provided
Show if argument wasn't changed
Reduce amount of arguments
2023-07-02 14:25:55 +02:00
John Hernandez a59623a007 Add `/pgp sendpub` command
Command allows to share your PGP pub key with ease,
it's not described in XEP-0027, but used in some clients,
such as PSI, Pidgin.
Fix typos
Minor improvements
2023-07-02 14:25:55 +02:00
Michael Vetter 6247c28e31
Merge pull request #1842 from H3rnand3zzz/feature/plugins-download
New Feature: Plugins Download
2023-06-06 18:35:18 +02:00
Michael Vetter d761e88ee6
Merge pull request #1856 from profanity-im/fix-1855
Fix double-free of values.
2023-06-05 08:17:34 +02:00
Steffen Jaeckel 88d383b052 Fix double-free of values.
The strings have to be dup'ed, otherwise we'll free them twice.

Fixes #1855

Introduced by b6bb50ceb2

Signed-off-by: Steffen Jaeckel <jaeckel-floss@eyet-services.de>
2023-06-04 13:39:03 +02:00