Just a note to myself:
The action happens in AttachmentDeleter::InternalStartProcessing
which uses the URL parameters &del= and &detachTo= to signal which part is
treated,
and the constructed streamconverter will run through mimemult.cpp,
MimeMultipart_parse_line.
The code for case MimeMultipartH
I deleted comment 55 because it was an incorrect statement.
I confirm the strategy described in comment 53 works.
(edit message, replace content-type, then delete attachment works, message text
still readable.)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which
We could potentially use the the following implementation:
When building the list of right-click-menu actions, we currently check
for the signature content type. If we find it, we disable the
delete/detach attachment actions.
A suggested enhanced implementation, with a minimal UI change, could do
Magnus, besides the delete attachment / detach attachment functionality,
are you aware of any simpler code that we have, which modifies a message
and replaces its storage (either local or on the server)?
That code is rather complicated. I wonder if we have any simpler
implementation (e.g. that doe
deleted
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/303140
Title:
No more "Save all" / "detach all" / "delete all" for attachments
To manage notifications about this bug go to:
https://bugs.launc
Everyone, please use bug 1663169 to track the fix of the remaining bug.
Marking this one fixed again.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1902801
Title:
Encrypted attachments cannot be op
You're right, I'll file a separate bug, and move the patch over there.
Also, I'm working on a test.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1902801
Title:
Encrypted attachments cannot be opene
Sorry for the delays, I was out sick.
I can confirm the bug. When recently re-enabling this feature, I had tested
only using encrypted attachments which decrypt to plain text.
The bug occurs if the attachment decrypts to binary data.
I have a fix that I will send for review.
--
You received th
Created attachment 9196379
Bug 1663169 - Fix decrypting of attachments containing binary data. r=mkmelin
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1902801
Title:
Encrypted attachments cannot be
78.6.0
https://hg.mozilla.org/releases/comm-esr78/rev/9e1c528c3a548d27251664c93c94620940672ed2
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1902801
Title:
Encrypted attachments cannot be opened or
Comment on attachment 9191067
Bug 1663169 - Restore decrypt and save/open right click action for attachments.
r=PatrickBrunschwig
[Approval Request Comment]
Regression caused by (bug #): none
User impact if declined: nonworking decrypt feature that's offered in UI
Testing completed (on c-c, etc.)
(In reply to Magnus Melin [:mkmelin] from comment #15)
> Kai, should we just hide this menu until it's working? Or you you have code
> pointers to how to fix it?
Looks like I restored the functionality with the attached patch.
--
You received this bug notification because you are a member of Ub
Created attachment 9191067
Bug 1663169 - Restore decrypt and save/open right click action for attachments.
r=PatrickBrunschwig
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1902801
Title:
Encrypted
If you're on macOS, our workaround from bug 1610390 is not enabled
because of bug 1612456.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/940631
Title:
Thunderbird asks three times for my master pass
(In reply to Kai Engert (:KaiE:) from comment #59)
> That code would have to prevent the race, by detecting if the first prompt
> has already been opened, and all consecutive requests would have to be put on
> hold, as long as the first prompt is shown or retrying. After the prompt ha
(In reply to Matt from comment #61)
> I was reading in Bug 1361838#c2 that .uiBusy == true might be suitable for
> mitigating the issue
As I understand it, that's simply a flag that can be queried, whether
the MP dialog is currently shown.
Detecting this state is only part of the problem. You s
When starting multiple network actions in parallel, more than one might
require access to the saved logins. And if the secure password store
hasn't yet been unlocked with the master password, then each of those
parallel actions might trigger a request to unlock it.
The only way to fix this reliabl
Testing is tricky.
Do you want to test the blacklist mechanism?
The test cert on kuix.de:9449 will expire soon. I'm not sure what will
happen then. You might get EITHER error expired OR error revoked. Only
if the error REVOKED then you can continue to use this blacklist test.
If EXPIRED has highe
(In reply to comment #89)
>
> those 9 certs are now publicly available, so I see
> no reason to keep that bug private any longer.
No, I think the 9 certs are NOT publicly available.
In fact, the attacker might not have received the certs, according to Comodo's
blog.
So, for the time being, it m
19 matches
Mail list logo