Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Signing of keys from user management #41

Closed
annejan opened this issue May 4, 2015 · 5 comments
Closed

Signing of keys from user management #41

annejan opened this issue May 4, 2015 · 5 comments

Comments

@annejan
Copy link
Member

annejan commented May 4, 2015

Currently you can select (users) keys that you have not signed, these cannot be used for encryption.
screen shot 2015-05-04 at 09 40 52

We should at-least make it clear in a visual way which keys can be used and preferably have a button / popup combination to sign these keys.

@rdoeffinger
Copy link
Contributor

Is this really a good idea to have in QtPass? People will need to use some program to get/import all those public keys in the first place, so why not just have them use that same program to do the trust management?

@annejan
Copy link
Member Author

annejan commented May 6, 2015

Kind of have to agree.
From a separation of responsibility point of view.

I do want to add some functionality to make it visible, either through colors of disabling checkbooks or something, which id's can be used and which (currently) can't.
Will save on a lot of "weird" support questions I think.

@rdoeffinger
Copy link
Contributor

I like the colours idea, e.g. red for "invalid" ones.
I'd also like to visualize the keys where a secret key is available (blue colour maybe?), and warn if no keys are enabled for which a secret key is available.

@rdoeffinger
Copy link
Contributor

See pull request for a possible implementation.

@annejan
Copy link
Member Author

annejan commented May 9, 2015

This works for me 👍

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants