Commit graph

5041 commits

Author SHA1 Message Date
Weblate
00cc9a09a5 Translated using Weblate (Indonesian)
Currently translated at 99.8% (854 of 855 strings)

Co-authored-by: Linerly <linerly@protonmail.com>
Translate-URL: https://weblate.nheko.im/projects/nheko/nheko-master/id/
Translation: Nheko/nheko
2022-10-09 09:05:18 -04:00
Nicolas Werner
4002b1ecf1
Properly propagate pack usage to UI
We can't have a pack that is neither sticker nor emoji. Which is why
none defaults to both on. That wasn't propagated to the UI, which made
the interaction very confusing. It also made some states unsettable,
since you can't turn anything off from the none state.

fixes #1152
2022-10-09 02:14:31 +02:00
Nicolas Werner
30fde1f8ac
Don't send avatars over dbus by default
This should reduce payload size a lot
2022-10-09 00:56:02 +02:00
Nicolas Werner
7e0ea12ebb
Update to unicode 15 and make script jinja:3 compatible 2022-10-08 00:27:57 +02:00
Nicolas Werner
a4524cd9af
Fix date separator 2022-10-07 11:11:07 +02:00
Nicolas Werner
f2f9359f7f
Add a shortcut for search 2022-10-07 10:04:08 +02:00
Nicolas Werner
f1c1f18f81
Add a slow way to search a room 2022-10-06 22:02:26 +02:00
Nicolas Werner
857d9cf2b6
Basic thread filtering
The reply pagination logic is a bit weird rn though.
2022-10-06 16:16:24 +02:00
Weblate
a87f1be688 Translated using Weblate (Finnish)
Currently translated at 100.0% (855 of 855 strings)

Co-authored-by: Lurkki14 <jussi.kuokkanen@protonmail.com>
Translate-URL: https://weblate.nheko.im/projects/nheko/nheko-master/fi/
Translation: Nheko/nheko
2022-10-05 13:27:51 -04:00
Nicolas Werner
aed1440d26
Don't let old server lookups overwrite new ones 2022-10-05 19:20:22 +02:00
Nicolas Werner
d70a344a4d
Fix userprofile on roomlist 2022-10-05 17:25:01 +02:00
Nicolas Werner
005a4978bf
Update translations 2022-10-04 01:19:47 +02:00
Nicolas Werner
b205819ba6
Swap thread and edit button 2022-10-04 00:38:59 +02:00
Nicolas Werner
d8993c14e1
Fix raw message dialog 2022-10-04 00:36:57 +02:00
Loren Burkholder
8ecbb39dc6
cppcheck stuff (#1200)
* cppcheck stuff

* Update src/ui/RoomSettings.cpp

Co-authored-by: DeepBlueV7.X <nicolas.werner@hotmail.de>

* Update src/ui/RoomSettings.cpp

Co-authored-by: DeepBlueV7.X <nicolas.werner@hotmail.de>

* Fix linting

Co-authored-by: DeepBlueV7.X <nicolas.werner@hotmail.de>
2022-10-03 21:57:30 +00:00
DeepBlueV7.X
5e9eb845ab
Merge pull request #1202 from Nheko-Reborn/grammar
Grammar
2022-10-03 21:37:01 +00:00
Loren Burkholder
e7d0344997
Fixed a crash in member list loading (#1199) 2022-10-03 21:26:32 +00:00
Nicolas Werner
33403d650a
Don't strip fallbacks on plain text bodies 2022-10-03 21:53:10 +02:00
DeepBlueV7.X
cfcdc23d4a
Merge pull request #1201 from Nheko-Reborn/eoUpdates
Update some Esperanto translations
2022-10-03 11:23:34 +00:00
Nicolas Werner
b3c5f41625
Fix a few more windows warnings 2022-10-02 12:31:03 +02:00
Nicolas Werner
1365e4e266
Try to fix qtjdenticon build in appveyor 2022-10-02 11:40:14 +02:00
Nicolas Werner
a55fc8e43b
Work around MSVC bug with structured bindings in lambdas
Causes error messages like:
error C3493: 'key_id' cannot be implicitly captured because no default capture mode has been specified
2022-10-02 02:06:09 +02:00
Nicolas Werner
b55b5a8321
Fix a few more warnings 2022-10-01 23:57:44 +02:00
Nicolas Werner
09babc91d2
Green is not Svg::green
fixes #1203
2022-10-01 23:57:44 +02:00
Loren Burkholder
2aef39fda8 Update some Esperanto translations 2022-10-01 13:11:05 -04:00
Nicolas Werner
42a23e1859
Reduce windows ci warnings 2022-10-01 19:05:44 +02:00
Nicolas Werner
22a6b8ddb4
Properly qualify fmt function
Otherwise it conflicts with C++20 fmt.
2022-10-01 18:05:49 +02:00
Nicolas Werner
944e369d50
Fix clazy 2022-10-01 16:30:20 +02:00
DeepBlueV7.X
f8724fdea8
Merge pull request #1198 from rnhmjoj/pr-green
Add green theme color, make "error" configurable
2022-10-01 13:45:26 +00:00
Nicolas Werner
b2b2932c98
Fix linting 2022-10-01 15:26:33 +02:00
Nicolas Werner
7ec842ba51
Replace some user visible mentions of spaces 2022-10-01 15:20:38 +02:00
Nicolas Werner
30882d4aa9
Fix wrong file urls 2022-10-01 14:47:42 +02:00
rnhmjoj
f5d5bea840
Add green theme color, make "error" configurable 2022-10-01 10:59:17 +02:00
Nicolas Werner
2a7c6f2d86
Load components on demand 2022-10-01 02:28:02 +02:00
Nicolas Werner
570d7b8b30
Prepare for adding proxy before chat.model 2022-10-01 01:53:12 +02:00
Loren Burkholder
08aa383a62 Remove unnecessary emit 2022-09-30 00:24:43 -04:00
Loren Burkholder
df834ffc48 Various grammar fixes (mostly removing commas) 2022-09-30 00:23:39 -04:00
Loren Burkholder
e78d107558 Add link to repo to show where issues go 2022-09-30 00:04:50 -04:00
Nicolas Werner
78784babd1
Revert accidental animated image change 2022-09-30 04:03:39 +02:00
Nicolas Werner
1ea5449c18
Disable manpage on debian 2022-09-30 03:45:39 +02:00
Nicolas Werner
c34c9f9035
Automatically switch to threading when replying 2022-09-30 03:43:42 +02:00
Nicolas Werner
88cbac1695
Basic threading support 2022-09-30 03:27:05 +02:00
Nicolas Werner
bffa0115d4
Make clazy happy 2022-09-28 17:47:41 +02:00
Nicolas Werner
2fde381a82
Merge branch 'v0.10.2-fixes' 2022-09-28 14:27:54 +02:00
Nicolas Werner
031a129591
Bump version to 0.10.2 2022-09-28 14:11:19 +02:00
Nicolas Werner
67bee15a38
Prevent the homeserver from inserting malicious secrets
Correctly verify that the reply to a secrets request is actually coming
from a verified device. While we did verify that it was us who replied,
we didn't properly cancel storing the secret if the sending device was
one of ours but was maliciously inserted by the homeserver and
unverified. We only send secret requests to verified devices in the
first place, so only the homeserver could abuse this issue.

Additionally we protected against malicious secret poisoning by
verifying that the secret is actually the reply to a request. This means
the server only has 2 places where it can poison the secrets:

- After a verification when we automatically request the secrets
- When the user manually hits the request button

It also needs to prevent other secret answers to reach the client first
since we ignore all replies after that one.

The impact of this might be quite severe. It could allow the server to
replace the cross-signing keys silently and while we might not trust
that key, we possibly could trust it in the future if we rely on the
stored secret. Similarly this could potentially be abused to make the
client trust a malicious online key backup.

If your deployment is not patched yet and you don't control your
homeserver, you can protect against this by simply not doing any
verifications of your own devices and not pressing the request button in
the settings menu.
2022-09-28 13:36:52 +02:00
Joseph Donofry
9010acd909
If and Else blocks were backwards 2022-09-28 12:05:41 +02:00
Joseph Donofry
e6bbe74abf
Make sure there are no spaces in the status string 2022-09-28 12:05:41 +02:00
Joseph Donofry
2a72488a32
Add some additional notarization logging 2022-09-28 12:05:41 +02:00
Joseph Donofry
700978c5ec
Accepted... not Approved 2022-09-28 12:05:41 +02:00