1. 30 Sep, 2014 1 commit
    • Debarshi Ray's avatar
      Support locked accounts · 2e6a2c9c
      Debarshi Ray authored
      Locked accounts are those that have been pre-configured by the system
      administrator. Users are discouraged from removing these, which is why
      org.gnome.OnlineAccounts.Account.Remove will refuse to do so. One can
      work around this by manually editing accounts.conf.
      Fixes: https://bugzilla.gnome.org/737656
  2. 05 Jun, 2014 2 commits
  3. 19 May, 2014 1 commit
  4. 25 Mar, 2014 1 commit
    • Debarshi Ray's avatar
      Remove the author field from file headers · 01fddbfb
      Debarshi Ray authored
      The information was often stale and we did not consistently have it in
      all the files. Git is a much more reliable source for this kind of
      information. Unlike the copyright notice, the author field has no legal
      significance, so it was just unnecessary baggage.
  5. 05 Mar, 2014 1 commit
  6. 03 Feb, 2014 3 commits
  7. 29 Jan, 2014 1 commit
  8. 13 Jan, 2014 1 commit
  9. 18 Jun, 2013 1 commit
  10. 12 Jun, 2013 1 commit
  11. 10 Jun, 2013 1 commit
  12. 05 Mar, 2013 1 commit
    • Debarshi Ray's avatar
      daemon: Do not use notifications when an account needs attention · 8750cf18
      Debarshi Ray authored
      We want the applications to handle the notification themselves if the
      credentials for an account do not work (ie., if EnsureCredentials
      fails). Having the daemon throw a notification is bad because:
        * it does not give the user sufficient context to determine what
          actually failed
        * background services might be calling EnsureCredentials, and these
          should never lead to a notification unless it was in response to
          an explicit user action
      This also reverts commit cbcb0da9.
      Fixes: https://bugzilla.gnome.org/660882
  13. 04 Mar, 2013 1 commit
  14. 01 Mar, 2013 1 commit
  15. 14 Feb, 2013 3 commits
  16. 05 Feb, 2013 1 commit
    • Debarshi Ray's avatar
      Guard against invalid SSL certificates · edde7c63
      Debarshi Ray authored
      None of the branded providers (eg., Google, Facebook and Windows Live)
      should ever have an invalid certificate. So set "ssl-strict" on the
      SoupSession object being used by GoaWebView.
      Providers like ownCloud and Exchange might have to deal with
      certificates that are not up to the mark. eg., self-signed
      certificates. For those, show a warning when the account is being
      created, and only proceed if the user decides to ignore it. In any
      case, save the status of the certificate that was used to create the
      account. So an account created with a valid certificate will never
      work with an invalid one, and one created with an invalid certificate
      will not throw any further warnings.
      Fixes: CVE-2013-0240
  17. 29 Jan, 2013 1 commit
  18. 18 Dec, 2012 2 commits
  19. 24 Oct, 2012 1 commit
  20. 21 Oct, 2012 1 commit
  21. 20 Oct, 2012 3 commits
  22. 15 Oct, 2012 1 commit
  23. 28 Sep, 2012 1 commit
  24. 20 Aug, 2012 2 commits
    • Ray Strode's avatar
      Add new "Ticketing" interface · 04b36203
      Ray Strode authored
      Kerberos is somewhat different from other providers in that it
      providers user the ability to gain access to arbitrary resources
      on the local network, not just a finite set of resources (such
      as Documents, Mail, Chat, etc). This ability is one of the main
      reasons Kerberos is used in enterprise deployments (so called
      Single Sign On).
      This commit adds a new Ticketing interface to describe that
    • Debarshi Ray's avatar
      Allow for transient, "non-permanent" accounts · 78ba52ee
      Debarshi Ray authored
      One prerequisite for adding kerberos support to online accounts
      is for it to allow accounts to show up that weren't explicitly
      previously added by the user from control-center. For instance,
      if a user runs "kinit" they should still be able to see their
      kerberos tickets in the dialog, and even destroy the credentials
      and remove the account.
      Of course these accounts have a lifetime limited to the current
      session.  We don't want a user to unintentionally trigger permanent
      behavior by just doing a one off kinit.
      Loosely based on work by Ray Strode
  25. 17 Aug, 2012 3 commits
  26. 19 Jun, 2012 1 commit
    • Debarshi Ray's avatar
      daemon: Store the credentials in the keyring inside AddAccount · f4a70704
      Debarshi Ray authored
      A new argument of type a{sv} was added to the AddAccount method for
      passing the credentials to the daemon. This is an API break, but no
      should be calling it apart from the backend code implementing
      This fixes a race between the "account-added" signal being emitted and
      the credentials being actually stored.
  27. 24 May, 2012 1 commit
  28. 01 May, 2012 1 commit
  29. 27 Apr, 2012 1 commit