1. 14 Sep, 2020 5 commits
  2. 13 Sep, 2020 1 commit
  3. 11 Sep, 2020 2 commits
  4. 10 Sep, 2020 7 commits
  5. 09 Sep, 2020 1 commit
  6. 08 Sep, 2020 4 commits
  7. 07 Sep, 2020 4 commits
    • Goran Vidović's avatar
      Update Croatian translation · 2effedd7
      Goran Vidović authored
    • Balázs Meskó's avatar
      Update Hungarian translation · 7fa8d5f7
      Balázs Meskó authored
    • Goran Vidović's avatar
      Update Croatian translation · 6f69a790
      Goran Vidović authored
    • Simon McVittie's avatar
      gdbusauthmechanismsha1: Use the same timeouts as libdbus · 92183fb7
      Simon McVittie authored
      For interoperability with libdbus, we want to use compatible timeouts.
      In particular, this fixes a spurious failure of the `gdbus-server-auth`
      test caused by libdbus and gdbus choosing to expire the key (cookie) at
      different times, as diagnosed by Thiago Macieira. Previously, the libdbus
      client would decline to use keys older than 7 minutes, but the GDBus
      server would not generate a new key until the old key was 10 minutes old.
      For completeness, also adjust the other arbitrary timeouts in the
      DBUS_COOKIE_SHA1 mechanism to be the same as in libdbus. To make it
      easier to align with libdbus, create internal macros with the same names
      and values used in dbus-keyring.c.
      * maximum time a key can be in the future due to clock skew between
        systems sharing a home directory
        - spec says "a reasonable time in the future"
        - was 1 day
        - now 5 minutes
      * time to generate a new key if the newest is older
        - spec says "If no recent keys remain, the server may generate a new
          key", but that isn't practical, because in reality we need a grace
          period during which an old key will not be used for new authentication
          attempts but old authentication attempts can continue (in practice both
          libdbus and GDBus implemented this logic)
        - was 10 minutes
        - now 5 minutes
      * time to discard old keys
        - spec says "the timeout can be fairly short"
        - was 15 minutes
        - now 7 minutes
      * time allowed for a client using an old key to authenticate, before
        that key gets deleted
        - was at least 5 minutes
        - now at least 2 minutes
      Based on a merge request by Philip Withnall.
      Fixes: #2164
      Thanks: Philip Withnall
      Thanks: Thiago Macieira
      Signed-off-by: Simon McVittie's avatarSimon McVittie <smcv@collabora.com>
  8. 06 Sep, 2020 2 commits
  9. 05 Sep, 2020 1 commit
  10. 04 Sep, 2020 1 commit
  11. 03 Sep, 2020 2 commits
  12. 02 Sep, 2020 10 commits