Commit Graph

45228 Commits

Author SHA1 Message Date
Axel Dörfler
77dfc67033 mountvolume: open mounted images/volumes in Tracker.
* This can be done from the command line using the new "-open" option.
* When the application is invoked via Tracker, ie. by double clicking
  on an image, then it's being used implicitly.
2013-03-10 22:28:23 +01:00
Axel Dörfler
e43a7e3db6 intel_extreme: sanitize BIOS mode.
* For LVDS output, the sync parameters aren't really used which is why the mode
  set from the BIOS might not be valid if the PLL hardware would actually be
  used.
* Therefore, we sanitize this mode to make sure it's within allowed parameters
  so that intel_set_mode() will accept it.
* This should fix at least #8132, and #8796.
* Sorry for looking into this so late! I obviously messed up testing this
  before, as my EeePC 900 was actually affected by this, too.
2013-03-10 17:34:11 +01:00
Axel Dörfler
087341fcfb intel_extreme: reordered functions.
* retrieve_current_mode() was not static, but should have been.
* static functions come now first, as usual.
2013-03-10 17:34:11 +01:00
Rene Gollent
acd512e9c6 Always build the button bar. Fixes #9474. 2013-03-09 19:01:47 -05:00
Niels Sascha Reedijk
2e03f27e26 Update translations from Pootle 2013-03-09 06:26:19 +01:00
Ryan Leavengood
f6afd3e9f7 Improve alignment and layout of the notifications.
Implements diver's mockup from #8566.
2013-03-07 22:04:02 -05:00
Ryan Leavengood
a595db17d6 Further simplify the Time tooltips by using SetToolTip. 2013-03-07 09:30:04 -05:00
Ryan Leavengood
eb594c5cd5 Don't constantly recreate the tool tip, just update the text.
Fixes #9502, more or less.
2013-03-07 09:20:17 -05:00
Ryan Leavengood
57ad874483 Use GetBool and SetBool convenience methods for always on top. 2013-03-07 08:55:39 -05:00
Ryan Leavengood
f4b0041834 Save always on top setting and fix style issues. 2013-03-07 08:39:27 -05:00
Matt Madia
b58ffb0b4a Automatic whitespace cleanup. No functional change. 2013-03-06 17:25:32 -05:00
Dancsó Róbert
6cf270f88e Added "Always on top" menu to the ActivityMonitor.
Signed-off-by: Matt Madia <mattmadia@gmail.com>
2013-03-06 17:24:54 -05:00
Michael Lotz
c5469c3939 Add missing check for unlocked state. 2013-03-05 11:05:02 -05:00
Michael Lotz
d3b8b801a8 Fix missing write of the keystore database on app removal. 2013-03-05 11:05:00 -05:00
Michael Lotz
ae542b141d Add setting/removal of keyring unlock keys to the cli app. 2013-03-05 11:04:59 -05:00
Michael Lotz
4a0460a9bc Add generic unlock key setting and removal.
* Replace {Set|Remove}MasterKey() by generic {Set|Remove}UnlockKey()
  that works on a keyring.
* Implement {Set|Remove}MasterUnlockKey() on top of that.
* Rename the commands and constants accrodingly.
* Implement setting and removing keyring unlock keys.
2013-03-05 11:04:57 -05:00
Michael Lotz
a82011ff96 Introduce keyring unlock key concept.
* Rename fKeyMessage to fUnlockKey and the KeyMessage() getter to
  UnlockKey().
* Keep track of whether the keyring has an unlock key set.
* Store and restore that info separately.
* En- and decryption will depend on unlock key presence later.
* Add functions to set and remove an unlock key and query for it.
2013-03-05 11:04:56 -05:00
Michael Lotz
bec02d0c2f Store each keyring in a message under a common keyrings field.
* Each keyring is now stored in a proper message which allows it to
  contain additional meta data along side the flat data.
* Adding all keyring messages under a common field also allows to add
  meta data to the keystore, as the keyrings don't use up random field
  names anymore.
* Treat the master keyring as any other keyring and just add it to the
  list. This allows to write/read the keystore database without special
  casing the master keyring.
2013-03-05 11:04:54 -05:00
Michael Lotz
d4d6d12393 Don't require a key when creating a new keyring.
There will be key setting/removal functions so the step of adding the
keyring and setting a key on it can be done individually.
2013-03-05 11:04:53 -05:00
Michael Lotz
8775bd129d Remove old TODO as we don't support multiple instances for now.
As there aren't any more generic meta data containers inside BKey,
there's no real way to distinguish different instances with the same
identifiers. This may be added later, for example the same index system
as used in BMessage could apply.
2013-03-05 11:04:51 -05:00
Michael Lotz
112af58652 Focus the password field in the key request dialog. 2013-03-05 11:04:50 -05:00
Michael Lotz
a59169de6f Add the access string to the app access request dialog.
This way the user can see what operation the application tries to do.
2013-03-05 11:04:48 -05:00
Michael Lotz
cbdd5aff17 Restyle the app access request dialog to make it less horrible. 2013-03-05 11:04:47 -05:00
Michael Lotz
ee83472042 Accumulate the app access flags instead of replacing them.
Before, each permanently granted access flag would overwrite the
previously granted flag, causing the dialog to come up whenever the
operation was changed.
2013-03-05 11:04:45 -05:00
Michael Lotz
a2f279870c Add strings that explain an access operation.
May be used in the app access request dialog later on to show what
privilege is actually requested.
2013-03-05 11:04:44 -05:00
Michael Lotz
0e4f2804b5 Remove the leftover checkbox in the key request dialog. 2013-03-05 11:04:42 -05:00
Michael Lotz
7306e9e4d5 Add an explanatory message to the key request dialog. 2013-03-05 11:04:41 -05:00
Michael Lotz
f1f719c433 Make the keyring label and name StringViews. 2013-03-05 11:04:39 -05:00
Michael Lotz
7b437e50eb Reflect "access" -> "unlock" change in key request dialog. 2013-03-05 11:04:38 -05:00
Michael Lotz
82b425a59f Reword the label from "Always Allow" to "Allow Always". 2013-03-05 11:04:36 -05:00
Michael Lotz
03a84249b5 Add app enumeration and removal to the keystore cli tool. 2013-03-05 11:04:35 -05:00
Michael Lotz
f8ccc32326 Remove the API part of the concept of apps per key.
The application access concept is on the keyring level only for now.
Generally it probably would get pretty complicated and therefore harder
to use when application access needs to be granted on a per key basis.
2013-03-05 11:04:33 -05:00
Michael Lotz
a5a5f4ca70 Rename "default" to "master" keyring as that's what it is.
Also add a well defined name ("Master") for the master keyring so it is
easier to understand what this keyring does instead of displaying an
empty string.
2013-03-05 11:04:32 -05:00
Michael Lotz
c8ae843f3d Rename keyring "access/revoke" to "unlock/lock".
The unlock/lock concept just seems easier to grasp and is used in
various similar tools as well.
2013-03-05 11:04:30 -05:00
Michael Lotz
f17ddab827 Initialize the BKey to default values and set fCreationTime.
* Using Unset() initializes the BKey to default values.
* Also set fCreationTime to 0 for now. It is still unused but needs to
  have a stable value for the exact matches when comparing keys.
2013-03-05 11:04:29 -05:00
Michael Lotz
b31a707a95 Implement the application enumeration and removal commands. 2013-03-05 11:04:27 -05:00
Michael Lotz
67a4644454 Allow for all entries of an application to be removed. 2013-03-05 11:04:26 -05:00
Michael Lotz
0778e1477d Add application iteration method. 2013-03-05 11:04:24 -05:00
Michael Lotz
cfa8131526 Resolve/validate the calling application, request if needed.
The application is resolved and then looked up in the keyring. If the
keyring doesn't provide a matching entry, an application access request
is triggered. The mechanism doesn't yet do any actual checksums, but
has provisions for differentiating between new and changed/updated
applications.
2013-03-05 11:04:23 -05:00
Michael Lotz
f32874e611 Add an application access request dialog. 2013-03-05 11:04:21 -05:00
Michael Lotz
76df966ee6 Add a preliminary way to resolve the calling application.
This will have to be reworked though, as by using the roster only
BApplications can be resolved, as plain cli apps aren't registered with
the registrar.
2013-03-05 11:04:20 -05:00
Michael Lotz
aef629f200 Only clear the keystore database when prepartion worked. 2013-03-05 11:04:19 -05:00
Michael Lotz
d389650a7a Add application info handling into the Keyring class. 2013-03-05 11:04:17 -05:00
Michael Lotz
6ef5917d45 Only write and encrypt the flat buffer when modified. 2013-03-05 11:04:16 -05:00
Michael Lotz
1b3bb46aed Restructure how keyrings are stored/restored.
* Pass them through a flat buffer that can later be encrypted and
  decrypted in a central place.
* Remove the data argument from the constructor as keyrings are
  now reading their data on their own.
* Prepare for additional application info storage in the keyring.
2013-03-05 11:04:14 -05:00
Michael Lotz
97b3abf162 Add access flags to fine tune application access.
Not sure if these will actually be used, as they might just be a little
overkill and not easily usable.
2013-03-05 11:04:13 -05:00
Michael Lotz
a5a2a2754e Make the keystore cli app a BApplication.
We need the app to be registered so that the app info can be retrieved.
2013-03-05 11:04:11 -05:00
Michael Lotz
64ca113fe0 Add keyring specific versions of the *Application() methods. 2013-03-05 11:04:10 -05:00
Michael Lotz
51ab46a83c Remove the purpose argument from all GetKey() variants.
The type is relevant and required as it determines the type of the
handed in key. The purpose however isn't actually needed and rather
inconvenient to get by depending on the situation.
2013-03-05 11:04:08 -05:00
Michael Lotz
90013c82e8 Let the KeyRequestWindow return a flattened BPasswordKey.
Also provide the keyring string separately instead of abusing the
output key message.
2013-03-05 11:04:07 -05:00