Loading
Commits on Source 31
-
A S Alam authored
-
Rachida SACI authored
-
Andy Holmes authored
-
Andy Holmes authored
-
Andy Holmes authored
Update the client ID used for Microsoft accounts, to use the new microsoft@gnome.org account. depends on https://gitlab.gnome.org/Infrastructure/Infrastructure/-/issues/1382
-
Andy Holmes authored
Add a document which lists the various policies, terms of use and rate limits that apply to providers hosted on remote servers.
-
Andy Holmes authored
Backport for GNOME 46 See merge request GNOME/gnome-online-accounts!190
-
Jordi Mas authored
-
Andy Holmes authored
There are couple spots in goasmtpauth.c where a NULL-pointer may be passed to strlen(). These should probably be asserted, but to avoid the unlikely case where this may be possible, just fallback to a 0-length instead.
-
Andy Holmes authored
-
Andy Holmes authored
Backports for GNOME 46 See merge request GNOME/gnome-online-accounts!195
-
Nathan Follens authored
-
Jan-Michael Brummer authored
Add support for Proof Key for Code Exchange (PKCE) as described by RFC 7636. The only supported method is 'S256' as suggested by the RFC. If an OAuth2 provider supports this, it is enough to override get_use_pkce to make it return TRUE to enable PKCE. Based on work done by Andrea Azzarone
-
Jan-Michael Brummer authored
-
Andy Holmes authored
Since Google supports and recommend PKCE/S265 code challenges for OAuth 2.0 Desktop/Mobile clients, enable it for this provider. See: https://developers.google.com/identity/protocols/oauth2/native-app#step1-code-verifier Depends on !188
-
Andy Holmes authored
Finding documentation to confirm Microsoft's policies on the `windows_live` provider is quite difficult, however with some testing it seems to support PKCE/S256, so enable it along with the other OAuth 2.0 providers. See: https://learn.microsoft.com/en-us/azure/active-directory-b2c/authorization-code-flow Depends on !188
-
Andy Holmes authored
The "DAV" header entry is a comma-separated list, and can therefore be repeated several times. The check was failing on some servers, so switch to `soup_message_headers_get_list()` to fix it.
-
Andy Holmes authored
In the case of scoped DAV providers, namely fastmail.com, we run into problems if we try to detect features from the response header when checking a URI that doesn't support file access. Move the header detection after any special-cased providers, to ensure we don't break the short path.
-
Andy Holmes authored
For WebDAV accounts that may specifically not have files access, use the available endpoint for re-authentication while leaving file access disabled.
-
Andy Holmes authored
-
Andy Holmes authored
Support a short-path for mailbox.org WebDAV services. depends on !200 closes #314
-
Andy Holmes authored
Support a short-path for fastmail.com WebDAV services. depends on !200 (merged) closes #315
-
Andy Holmes authored
Fix a NULL-pointer dereference in the Kerberos provider, introduced when the Fedora provider was partially merged in. closes #318
-
Andy Holmes authored
Ensure we are watching the same secret collection that the goa-oauth2-handler writes to, by looking it up by alias rather than relying on the label.
-
Andy Holmes authored
Backports for GNOME 46 See merge request GNOME/gnome-online-accounts!205
-
Juliano de Souza Camargo authored
-
Andy Holmes authored
The provider dialog is part of the client library, rather than any application, and so requires `<glib/gi18n-lib.h>` instead of `<glib/gi18n.h>` to avoid trying to pull in translations from a linked application's gettext domain. closes #320
-
Andy Holmes authored
-
Andy Holmes authored
Backports for GNOME 46 See merge request GNOME/gnome-online-accounts!209
-
Andy Holmes authored
-
Jeremy Bícha authored