Skip to main content

Autocrypt: E-mail Encryption for Everyone example implementation

Project description

this tool is under heavy development, use at your own risk

muacrypt helps mail user agents to process incoming and outgoing mails and keep Autocrypt state according to the Autocrypt Level 1 specification. muacrypt manages accounts which maintain Autocrypt related state. Each account processes incoming and outgoing mail, parsing and adding Autocrypt headers as appropriate. Functionality is exposed through a command line tool muacrypt and a Python api import muacrypt.

This README is intended to help contributors to get setup with running tests and using the command line. The online docs at https://muacrypt.readthedocs.io contain more documentation about overall goals of the project.

testing

To use the code and run tests you need to have installed:

  • the command line client “gpg”, optionally “gpg2”, available through “gnupg” and “gnugp2” on debian.

  • something to speed up gpg key creation, e.g. by installing “rng-tools” on debian.

  • python2.7 and python3.5 including headers (“python2.7-dev” and “python3.5-dev” on debian).

  • “tox” to run automated tests (“python-tox” on Debian)

In one installation command on Debian:

apt install gnupg2 rng-tools python2.7-dev python3.5-dev python-tox

Afterwards you can run all tests:

$ tox

installation

You’ll need the command line client “gpg”, optionally “gpg2”, available through “gnupg” and “gnugp2” on debian.

To install the muacrypt command line tool you can install the “muacrypt” python package into your virtual environment of choice. If you don’t know about python’s virtual environments you may just install the debian package “python-pip” and then use “pip” to install the muacrypt library and command line too:

$ pip install --user muacrypt

The muacrypt command line tool will be installed into $HOME/.local/bin which needs to be in your PATH.

installation for development

If you plan to work/modify the sources and have a github checkout we strongly recommend to create and activate a python virtualenv and then once use pip without sudo in edit mode:

$ virtualenv venv
$ source venv/bin/activate
$ pip install -e .

Changes you subsequently make to the sources will be available without further installing the muacrypt package again.

running the command line

After installation simply run the main command:

muacrypt

to see available sub commands and options. Start by initializing an Autocrypt account which will maintain its own keyring and not interfere with your possibly existing gpg default keyring:

$ muacrypt init

Afterwards you can create an Autocrypt header for an email address:

$ muacrypt make-header x@example.org

You can process and integrate peer’s Autocrypt keys by piping an email message into the process-incoming subcommand:

$ muacrypt process-incoming <EMAIL_MESSAGE_FILE

At any point you can show the status of your muacrypt account:

$ muacrypt status

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

muacrypt-0.8.0.dev4.tar.gz (44.6 kB view details)

Uploaded Source

Built Distribution

muacrypt-0.8.0.dev4-py2-none-any.whl (28.2 kB view details)

Uploaded Python 2

File details

Details for the file muacrypt-0.8.0.dev4.tar.gz.

File metadata

File hashes

Hashes for muacrypt-0.8.0.dev4.tar.gz
Algorithm Hash digest
SHA256 860ef6943da4552823b9a885984c2224c652f7013bf9187ea1fa8ce4b1da32f8
MD5 7a54d00c99cc75e8a0fa70a67ffd65a3
BLAKE2b-256 9b516546a60e225cc91c9c32328d22a59e934da53c8cb46069d613dd3a38d75e

See more details on using hashes here.

File details

Details for the file muacrypt-0.8.0.dev4-py2-none-any.whl.

File metadata

File hashes

Hashes for muacrypt-0.8.0.dev4-py2-none-any.whl
Algorithm Hash digest
SHA256 5f5cb05e34bbb4a87e148a14d22a4e7bfda9ecf2f6886b2c9dce90b2ac15dbb1
MD5 16480fe7095a8f2baa551bd17f0b39b5
BLAKE2b-256 c0ff427438ca8ef4bff722a2e32f6a71745da93a70d3fad7663ab91b3ce4b8de

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page