aboutsummaryrefslogtreecommitdiffstats
path: root/lang/python (unfollow)
Commit message (Collapse)AuthorFilesLines
2018-06-28docs: python bindings howtoben/export-keysBen McGinnes1-0/+358
* Updated official doc (the org-mode file) with the instructions on importing and exporting both public and secret keys.
2018-06-28python bindings examplesBen McGinnes1-0/+110
* Added a secret key export variant which saves output as both GPG binary and ASCII armoured, plus saves in $GNUPGHOME and uses multiple methods of determining what that location is.
2018-06-27python bindings examplesBen McGinnes1-0/+73
* Added a key import variant which accesses the SKS keyservers in a RESTful fashion and then imports or attempts to import the response.
2018-06-27python bindings: import exampleBen McGinnes1-0/+91
* Added an example script for importing a key from a file (either ASCII armoured or not).
2018-06-27python bindings: export public keysBen McGinnes1-6/+18
* Updated key_export and key_export_minimal to return None where a pattern matched no keys in a manner simnilar to the possible result of key_export_secret.
2018-06-27python bindings examples: three export scriptsBen McGinnes3-0/+223
* Example of default exporting keys. * Example of exporting minimised keys. * Example of exporting secret keys to a file with correct permissions. Signed-off-by: Ben McGinnes <[email protected]>
2018-06-27python bindings: export secret keysBen McGinnes1-1/+42
* The holy grail: a function to export secret keys. * GPGME will still invoke pinentry and gpg-agent as usual to authorise the export. * Mostly similar to the two previous export functions for public keys except that it will return None if the result had a length of zero bytes. Meaning that the difference between the specified pattern (if any) not matching available keys and an incorrect passphrase is not able to be determined from this function (or the underlying one for that matter). Signed-off-by: Ben McGinnes <[email protected]>
2018-06-27python bindings: export public keysBen McGinnes1-1/+58
* Added functions for exporting public keys to gpg.core in both complete form and in minimised form. * Rather than letting people need to worry about the export modes we are simply separating the functions as people would be more familiar with from the command line usage anyway. * Functions added for Context are: ctx.key_export_minimal and ctx.key_export as the default or full export. Signed-off-by: Ben McGinnes <[email protected]>
2018-06-17python bindings: core import statementsBen McGinnes1-3/+3
* Fixed the bit I broke while fixing the PEP8 compliance issues.
2018-06-17python bindings: core — PEP8 complianceBen McGinnes1-77/+101
* Fixed most of the PEP8 errors in core.py * Those remaining may need more than little edits and are a bit strange (too clearly the result of a programmer who has spent far too much time dealing with Lisp so that for Python it looks ... strange).
2018-06-17python bindings: core - key importgsoc/jacob-key-importBen McGinnes1-9/+37
* Wrapped the key import function in the try/exception statements needed to catch at least the most likely unsuccessful import attempt errors. * Mostly draws on the file error and no data import statuses for errors, with a couple of exceptions. Signed-off-by: Ben McGinnes <[email protected]>
2018-06-16python bindings: core key importBen McGinnes2-5/+28
* The foundation of a pythonic key import function authored by Jacob Adams. * A unit testing script for the same function originally authored by Tobias Mueller * Added DCO reference for Jacob Adams to the GPGME AUTHORS file. * Additional details regarding this patch are available here: https://dev.gnupg.org/T4001 Signed-off-by: Ben McGinnes <[email protected]>
2018-06-10script: groups.pyBen McGinnes1-1/+7
* Added check for if it is run on a Windows system so that the correct binary filename is invoked.
2018-06-07examples: python howtoBen McGinnes3-0/+262
* Uses the groups module to prepare a list of recipients and encrypt to those. * The main version (encrypt-to-group.py) tries to check for invalid recipients, but still falls back to always trust for the second encryption attempt. * The gullible version doesn't try pruning the recipient list at all, it just tries to encrypt and if it fails, switches straight to always trust. * The trustno1 version doesn't use the always trust model at all and only attempts pruning the list of invalid recipients.
2018-06-02docs: python bindings howtoBen McGinnes1-66/+73
* Another attempt at fixing the org-mode version. * A proof reader ascertained there were tabs in it instead of whitespace. * Stripped the lot out and replaced with standard 4 spaces, fixed every incorrect example ... and it still breaks upon save and/or export. * Added the reference to the mutt-groups.py script to demonstrate the groups.py module/code.
2018-05-24examples: mutt crypt-hooks generatorBen McGinnes1-0/+64
* Added a script which demonstrates how the groups module works. * Script generates Mutt/Neomutt crypt-hooks for every group entry in gpg.conf, including those entries for multiple keys (Mutt handles that differently).
2018-05-24docs: python bindings howtoBen McGinnes2-9/+13
* Fixed the groups.py script so it really does what is described (the old code had the same result for groups, group_lines and group_lists). * Updated the corresponding example in the doc to match.
2018-05-24doc: python bindings howtoBen McGinnes1-3/+2
* Fixed org-mode python source indenting. ** Note: nested indented blocks do not indent correctly when exported to [X]HTML.
2018-05-23docs and examples: python howtoBen McGinnes2-8/+22
* Updated the decryption example code in the HOWTO and the corresponding decrypt-file.py script to gracefully handle a decryption failure. This error will always be triggered when GPGME is used to try to decrypt an old, MDC-less encrypted message or file.
2018-05-05python: key expiration datetime stamp testsBen McGinnes1-1/+1
* Changed the expiration date for the generated test key to NYE this century, rather than the NYE this millennium as originally suggested in job #3815. * This covers the lifetimes of current users (except, maybe, some very healthy millennials) as well as the 32-bit clock end date in 2038; without falling foul of OpenPGP's 2106 expiration.
2018-04-18doc: Update copyright years and change two URLs.Werner Koch2-11/+10
-- Signed-off-by: Werner Koch <[email protected]>
2018-04-17python: Fix crash by leaving struct members intactTobias Mueller1-18/+1
* lang/python/setup.py.in: Copy gpgme.h instead of parsing it. -- The python bindings tried to parse deprecated functions out of gpgme.h. This fails for the current gpgme.h in that it removes an entire field in the key sig struct (_obsolete_class). Hence, the fields were off by an int and the bindings accessed struct members via the wrong offset. That caused python program to crash. At least on 32bit platforms, the crash can be easily triggered by accessing key.uids[0].signatures. On 64bit platforms the compiler probably aligns the struct so that the missing 4 bytes are not noticed. With this change, the python bindings will expose all functions that gpgme exposes, including the deprecated ones. Credits go to Justus Winter for debugging and identying the issue. Signed-off-by: Tobias Mueller <[email protected]> GnuPG-bug-id: 3892
2018-03-28example: revoke UIDben/howto-update-02Ben McGinnes1-0/+62
* Script to revoke a UID on an existing key.
2018-03-28docs: python bindings howtoBen McGinnes1-25/+53
* Added section on revoking UIDs.
2018-03-28example: key signingBen McGinnes1-0/+63
* Added script for signing or certifying keys.
2018-03-28doc: python bindings howtoBen McGinnes1-1/+1
* Fixed a typo.
2018-03-28docs python bindings howtoBen McGinnes1-16/+19
* PEP8 compliance: a collection of minor edits across multiple example code snippets.
2018-03-28example: add user IDBen McGinnes1-0/+62
* Added script to add a UID to an existing key.
2018-03-27doc: python bindings howtoBen McGinnes1-6/+6
* Fixed some minor PEP8 compliance issues in the key creation examples.
2018-03-27example: key creationBen McGinnes1-0/+95
* Script to generate a new key with encryption subkey taking input from interactive prompts. * Will also take a passphrase via pinentry and uses passphrase caching of five minutes when used in conjunction with the temp homedir script.
2018-03-27script: temp homedir configBen McGinnes1-2/+9
* added passphrase caching of 5 minutes.
2018-03-25doc: python bindings howtoBen McGinnes1-0/+1
* Testing the addition of a HTML header set in org-mode in order to had RSS update links for files. * This should work with any [X]HTML export from current versions of Org-Mode, but if it also works on website generated pages then it'll tick off one of the wishlist itmes.
2018-03-25script: temp homedirhowto-update-01Ben McGinnes1-1/+1
* Fixed whitespace.
2018-03-25doc: python bindings howtoBen McGinnes1-0/+4
* Added a reference to new script which will setup a temporary homedir for a user.
2018-03-25script: temporary homedir creationBen McGinnes1-0/+119
* Script to create a temporary gnupg homedir in the user's directory for testing or scripting purposes. * Creates a hidden directory on POSIX systems with the correct permissions (700). * Creates a gpg.conf in that directory containing the same configuration options as used in the "Danger Mouse" example in the HOWTO with the correct permissions (600).
2018-03-24doc: python bindings howtoBen McGinnes1-4/+4
* Fixed the plaintext, result and verify_result references in the decryption section.
2018-03-23doc: python bindings howtoBen McGinnes1-1/+1
* Fixed a minor spelling error and a minor grammatical error.
2018-03-21doc: python bindings howtoBen McGinnes1-1/+1
* Fixed table.
2018-03-21doc and examples: python bindings HOWTOBen McGinnes1-1/+1
* Added GPGME Python bindings HOWTO in Australian/British English. ** en-US "translation" still to be done. * Added several example scripts comprised of the "Basic Functions" section of the HOWTO (plus the work-around at the end). ** As these scripts are very basic examples they are released under both the GPLv2+ and the LGPLv2.1+ (just like GPGME itself). Signed-off-by: Ben McGinnes <[email protected]>
2018-03-21examples: multi-key selection operationsben/docs/2018-03Ben McGinnes3-190/+0
* Temporarily removing multi-key selection based examples. * There are a few issues with getting the key selections to play nicely with gpg.Context().keylist object types. * Will troubleshoot them separately and restore them when that's worked out, but I don't want these more complicated examples to delay merging the HOWTO with master.
2018-03-21example: group encryptionBen McGinnes1-1/+1
* Troubleshooting.
2018-03-21examples: encryptionBen McGinnes2-2/+2
* Fixed two incorrect Context() objects.
2018-03-21example: key selectionBen McGinnes1-1/+0
* Removed extraneous blank line.
2018-03-21example: key selectionBen McGinnes1-0/+52
* Similar to group-key-selection.py, but does not use an existing group from gpg.conf; instead takes multiple key IDs, fingerprints or patterns on the command line and adds them to a keylist object.
2018-03-21example: sign and encrypt to groupBen McGinnes1-0/+83
* Begins to string together some of the simpler examples to do more useful things. * Signs and encrypts a file while encrypting to every key in a group specified in the gpg.conf file.
2018-03-21example: group key selectionBen McGinnes1-0/+56
* Example of preparing a keylist object using an existing group line from the gpg.conf file.
2018-03-21example groups work aroundBen McGinnes1-1/+1
* Updated usage so it only references importing the final list of lists produced. Trying to use some of the mid-points can have unpredictable results (this is part of the problem with work arounds).
2018-03-21example: groupsBen McGinnes1-0/+6
* Added a docstring.
2018-03-21example: verify signaturesBen McGinnes1-0/+64
* Added example for verifying detached signatures against the files they're the signatures for.
2018-03-21example: verify signed fileBen McGinnes1-0/+61
* Added example to verify normal and clearsigned files.