Skip to main content

Autocrypt: E-mail Encryption for Everyone example implementation

Project description

this tool is under heavy development, use at your own risk

muacrypt helps mail user agents to process incoming and outgoing mails and keep Autocrypt state according to the Autocrypt Level 1 specification. muacrypt manages accounts which maintain Autocrypt related state. Each account processes incoming and outgoing mail, parsing and adding Autocrypt headers as appropriate. Functionality is exposed through a command line tool muacrypt and a Python api import muacrypt.

This README is intended to help contributors to get setup with running tests and using the command line. The online docs at https://muacrypt.readthedocs.io contain more documentation about overall goals of the project.

testing

To use the code and run tests you need to have installed:

  • the command line client “gpg”, optionally “gpg2”, available through “gnupg” and “gnugp2” on debian.

  • something to speed up gpg key creation, e.g. by installing “rng-tools” on debian.

  • python2.7 and python3.5 including headers (“python2.7-dev” and “python3.5-dev” on debian).

  • tox either installed via pip install tox or apt install python-tox.

In one command on Debian:

apt install gnupg2 rng-tools python2.7-dev python3.5-dev python-tox

Afterwards you can run all tests:

$ tox

this runs all automated tests.

installation

You’ll need the command line client “gpg”, optionally “gpg2”, available through “gnupg” and “gnugp2” on debian.

To install the muacrypt command line tool you can install the “muacrypt” python package into your virtual environment of choice. If you don’t know about python’s virtual environments you may just install the debian package “python-pip” and then use “pip” to install the muacrypt library and command line too:

$ sudo pip install muacrypt

This will install the required dependency “click”, a python framework for writing command line clients.

installation for development

If you plan to work/modify the sources and have a github checkout we strongly recommend to create and activate a python virtualenv and then once use pip without sudo in edit mode:

$ virtualenv venv
$ source venv/bin/activate
$ pip install -e .

Changes you subsequently make to the sources will be available without further installing the muacrypt package again.

running the command line

After installation simply run the main command:

muacrypt

to see available sub commands and options. Start by initializing an Autocrypt account which will maintain its own keyring and not interfere with your possibly existing gpg default keyring:

$ muacrypt init

Afterwards you can create an Autocrypt header for an email address:

$ muacrypt make-header x@example.org

You can process and integrate peer’s Autocrypt keys by piping an email message into the process-incoming subcommand:

$ muacrypt process-incoming <EMAIL_MESSAGE_FILE

At any point you can show the status of your muacrypt account:

$ muacrypt status

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

muacrypt-0.8.0.dev2.tar.gz (44.7 kB view details)

Uploaded Source

File details

Details for the file muacrypt-0.8.0.dev2.tar.gz.

File metadata

File hashes

Hashes for muacrypt-0.8.0.dev2.tar.gz
Algorithm Hash digest
SHA256 bda66288fdf5da6b89f7c66fc7785cd1c329a892363860b5fcc813542c68ce2c
MD5 29af85f2f90d97d4abe90b7dd8ade20c
BLAKE2b-256 64a7608691564e147e7cc26448d1f221893e7bf44e553f029270717cd55f9615

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page