- 18 Jun, 2020 17 commits
-
-
segfault authored
We want to be able to persist the password file, so we can't delete it. And since the password is now hashed and salted, we don't have to delete it anymore.
-
segfault authored
-
segfault authored
Now that settings can be loaded from persistence, it's possible that a setting's popover is opened without the add-setting-dialog ever being created.
-
segfault authored
-
segfault authored
Settings are now saved to file immediately when the user changes them, instead of before login. Beside making the code simpler, this makes it easier to handle saving the admin password file (which we want to delete if the user disabled the feature after loading a persistent password file, but want to overwrite or leave untouched in other cases).
-
segfault authored
By calling chpasswd with the -e option, it uses the provided hashed and salted password instead of hashing and salting it via PAM. PAM uses SHA512 to hash the password, as configured in /etc/login.defs, so in the call to mkpasswd we set --method=sha512crypt to also use SHA512.
-
segfault authored
-
segfault authored
We never call unlock() with the callback arguments, so lets remove them.
-
segfault authored
Instead of always calling update_value_label() after apply(), call it inside apply().
-
segfault authored
This is a preparation for loading the settings in the Greeter when persistence is unlocked.
-
segfault authored
We require to unlock the persistence via the "Unlock" button, to ensure that the user gets some UI feedback when the persistent Greeter settings are loaded. The "Start Tails" is now insensitive if a password was entered in the persistence password entry but persistence was not unlocked.
-
segfault authored
-
segfault authored
To make it easier to persist all of these settings.
-
intrigeri authored
Fix importing OpenPGP keys from GNOME Files See merge request tails/tails!15
-
intrigeri authored
-
intrigeri authored
On !15, inadvertently, e6053152 + reverting it somehow made us lose some an important improvement to this documented workaround: namely, recommending users import keys via GNOME Files, rather than on the command line. Given the only benefit of !15 is precisely to make "import OpenPGP keys via GNOME Files" work, let's use this in our doc :) refs: #17183
-
intrigeri authored
-
- 17 Jun, 2020 10 commits
- 16 Jun, 2020 6 commits
-
-
127.0.0.1 authored
No commit message
-
anonym authored
Document why some major Tails features are not packaged for Debian Closes #6944 See merge request tails/tails!35
-
intrigeri authored
-
IkiWiki authored
-
intrigeri authored
Update sysadmins OpenPGP key due to expiry See merge request tails/tails!45
-
intrigeri authored
-
- 15 Jun, 2020 7 commits
-
-
sajolida authored
-
sajolida authored
-
sajolida authored
-
georg authored
-
intrigeri authored
Buster 10.4 + Linux 5.6 See merge request tails/tails!44
-
intrigeri authored
Fix all branches FTBFS by bumping thunderbird apparmor patch See merge request tails/tails!41
-
intrigeri authored
-