Commit e8e662ea authored by Corentin Noël's avatar Corentin Noël Committed by Corentin Noël

Do not hard depend on signond

parent c185bd18
......@@ -29,8 +29,7 @@ PKG_CHECK_MODULES(
[gio-2.0 >= 2.36
gio-unix-2.0
glib-2.0 >= 2.32
gobject-2.0 >= 2.35.1
signond >= 8.40])
gobject-2.0 >= 2.35.1])
AC_SUBST(DEPS_CFLAGS)
AC_SUBST(DEPS_LIBS)
......
......@@ -6,6 +6,6 @@ includedir=@includedir@
Name: libsignon-glib
Description: A low-level library for managing account credentials.
Version: @VERSION@
Requires: signond glib-2.0 gobject-2.0 gio-unix-2.0
Requires: glib-2.0 gobject-2.0 gio-unix-2.0
Libs: -L${libdir} -lsignon-glib
Cflags: -I${includedir}
......@@ -78,7 +78,7 @@ libsignon_glib_headers_with_enums = \
signon-auth-session.h \
signon-identity-info.h
DBUS_INTERFACES_DIR = $(datadir)/dbus-1/interfaces
DBUS_INTERFACES_DIR = interfaces
sso-auth-service-gen.h sso-auth-service-gen.c: $(DBUS_INTERFACES_DIR)/com.google.code.AccountsSSO.SingleSignOn.AuthService.xml
$(AM_V_GEN)gdbus-codegen \
......@@ -139,7 +139,7 @@ signon-enum-types.c: Makefile $(libsignon_glib_headers_with_enums)
signon-errors-enum.c: Makefile signon-errors.h
$(AM_V_GEN)( cd $(srcdir) && glib-mkenums \
--fhead "#include \"signon-enum-types.h\"\n#include \"signon-errors.h\"\n#include \"signoncommon.h\"\n#define g_intern_static_string(s) (s)\n" \
--fhead "#include \"signon-enum-types.h\"\n#include \"signon-errors.h\"\n#include \"signon-internals.h\"\n#define g_intern_static_string(s) (s)\n" \
--fprod "\n/* enumerations from \"@filename@\" */" \
--ftail "\n#define __SIGNON_ENUM_TYPES_C__\n" \
--vhead "GType\n@enum_name@_get_type (void)\n{\n static GType etype = 0;\n if (etype == 0) {\n static const G@Type@Value values[] = {" \
......
<!DOCTYPE node PUBLIC "-//freedesktop//DTD D-BUS Object Introspection 1.0//EN" "http://www.freedesktop.org/standards/dbus/1.0/introspect.dtd">
<node name="/" xmlns:doc="http://www.freedesktop.org/dbus/1.0/doc.dtd">
<!--
com.google.code.AccountsSSO.SingleSignOn.AuthService:
@short_description: Manages Signon identities.
The signond D-Bus APIs are unstable, subject to change and should not be
used by client applications, which should use libsignon-glib or
libsignon-qt instead.
Query information on available authentication methods and mechanisms, as
well as create identities and authentication sessions.
-->
<interface name="com.google.code.AccountsSSO.SingleSignOn.AuthService">
<!--
registerNewIdentity:
@short_description: Create a new Identity.
@applicationContext: the application security context
@objectPath: the D-Bus object path of the new Identity
Create a new (empty) Identity in the Signon database.
-->
<method name="registerNewIdentity">
<arg name="applicationContext" type="s" direction="in"/>
<arg name="objectPath" type="o" direction="out"/>
</method>
<!--
getIdentity:
@short_description: Get an Identity from the Signon database.
@id: the ID of the Identity in the Signon database
@applicationContext: the application security context
@objectPath: the D-Bus object path for the Identity
@identityData: the information associated with the Identity
Get an Identity from the Signon database, creating it if it does not
exist.
-->
<method name="getIdentity">
<arg name="id" type="u" direction="in"/>
<arg name="applicationContext" type="s" direction="in"/>
<arg name="objectPath" type="o" direction="out"/>
<arg name="identityData" type="a{sv}" direction="out"/>
</method>
<!--
getAuthSessionObjectPath:
@short_description: Get a D-Bus object path for an AuthSession.
@path: the D-Bus object path
@id: ID to use for the new AuthSession
@type: the authentication method to use for the new AuthSession
Return a D-Bus object path for a newly-created AuthSession.
-->
<method name="getAuthSessionObjectPath">
<!-- FIXME: Should be a 'o' typei for object paths. -->
<arg name="path" type="s" direction="out"/>
<arg name="id" type="u" direction="in"/>
<arg name="type" type="s" direction="in"/>
</method>
<!--
queryMethods:
@short_description: List the available authentication methods.
@methods: an array of the available authentication methods
Query the list of all available authentication methods.
-->
<method name="queryMethods">
<arg name="methods" type="as" direction="out"/>
<!--
queryMechanisms:
@short_description: List the available authentication mechanisms.
@mechanisms: an array of the available authentication mechanisms
@method: the authentication method for which to query the available mechanisms
Query the list of available authentication mechanisms for a given
authentication method.
-->
</method>
<method name="queryMechanisms">
<arg name="mechanisms" type="as" direction="out"/>
<arg name="method" type="s" direction="in"/>
</method>
<!--
queryIdentities:
@short_description: Request an array of stored identities.
@filter: the filter to apply to the returned identities
@applicationContext: the application security context
@identites: the list of stored identities
Request an array of identities which are stored in the Signon database.
-->
<method name="queryIdentities">
<arg name="filter" type="a{sv}" direction="in"/>
<arg name="applicationContext" type="s" direction="in"/>
<arg name="identities" type="aa{sv}" direction="out"/>
<annotation name="com.trolltech.QtDBus.QtTypeName.In0" value="QVariantMap"/>
</method>
<!--
clear:
@short_description: Remove all identities from the Signon database.
@success: whether the clear succeeded
Clear the Signon database by removing all stored identities.
-->
<method name="clear">
<arg name="success" type="b" direction="out"/>
</method>
<!--
backupStarts:
@short_description: TODO
TODO
-->
<method name="backupStarts">
<arg type="y" direction="out"/>
</method>
<!--
backupFinished:
@short_description: TODO
TODO
-->
<method name="backupFinished">
<arg type="y" direction="out"/>
</method>
<!--
restoreStarts:
@short_description: TODO
TODO
-->
<method name="restoreStarts">
<arg type="y" direction="out"/>
</method>
<!--
restoreFinished:
@short_description: TODO
TODO
-->
<method name="restoreFinished">
<arg type="y" direction="out"/>
</method>
</interface>
</node>
<!DOCTYPE node PUBLIC "-//freedesktop//DTD D-BUS Object Introspection 1.0//EN" "http://www.freedesktop.org/standards/dbus/1.0/introspect.dtd">
<node name="/" xmlns:doc="http://www.freedesktop.org/dbus/1.0/doc.dtd">
<!--
com.google.code.AccountsSSO.SingleSignOn.AuthSession:
@short_description: An authentication session for an Identity.
The signond D-Bus APIs are unstable, subject to change and should not be
used by client applications, which should use libsignon-glib or
libsignon-qt instead.
Handle the client authentication process.
-->
<interface name="com.google.code.AccountsSSO.SingleSignOn.AuthSession">
<!--
stateChanged:
@short_description: Emitted when the authentication state changes.
@state: the current state of the AuthSession
@message: a message associated with the state change
Emitted when the current authentication state changed, such as when the
Ideneity was signed out.
-->
<signal name="stateChanged">
<arg name="state" type="i" direction="out"/>
<arg name="message" type="s" direction="out"/>
</signal>
<!--
unregistered:
@short_description: Emitted when the AuthSession is removed.
Emitted when the AuthSession is removed or destroyed, such as when using
objectUnref.
-->
<signal name="unregistered">
</signal>
<!--
queryAvailableMechanisms:
@short_description: List the available authentication mechanisms for this
AuthSession
@mechanisms: the available authentication mechanisms
@wantedMechanisms: the desired authentication mechanisms
Query the available authentication mechanisms for this AuthSession. The
result will be the intersection of the desired authentication mechanisms
and those that are supported by the AuthSession.
-->
<method name="queryAvailableMechanisms">
<arg name="mechanisms" type="as" direction="out"/>
<arg name="wantedMechanisms" type="as" direction="in"/>
</method>
<!--
process:
@short_description: Perform one step of the authentication process.
@sessionDataVa: the returned session data parameters
@sessionDataVa: additional session data parameters
@mechanism: the authentication mechanism to use
Using the available parameters in the Identity or @sessionDataVa, start
the authentication process by passing the parameters to the
authentication plugin.
-->
<method name="process">
<arg name="sessionData" type="a{sv}" direction="out"/>
<annotation name="com.trolltech.QtDBus.QtTypeName.Out0" value="QVariantMap"/>
<arg name="sessionDataVa" type="a{sv}" direction="in"/>
<annotation name="com.trolltech.QtDBus.QtTypeName.In0" value="QVariantMap"/>
<arg name="mechanism" type="s" direction="in"/>
</method>
<!--
cancel:
@short_description: Cancel the authentication session.
Cancel the current authentication session
-->
<method name="cancel">
<annotation name="org.freedesktop.DBus.Method.NoReply" value="true"/>
</method>
<!--
setId:
@short_description: Set the ID of the AuthSession.
@id: the ID to set
Set the ID of the AuthSession.
-->
<method name="setId">
<arg name="id" type="u" direction="in"/>
<annotation name="org.freedesktop.DBus.Method.NoReply" value="true"/>
</method>
<!--
objectUnref:
@short_description: Remove the AuthSession.
Forcibly remove the AuthSession.
-->
<method name="objectUnref">
<annotation name="org.freedesktop.DBus.Method.NoReply" value="true"/>
<annotation name="org.freedesktop.DBus.Deprecated" value="true"/>
</method>
</interface>
</node>
<!DOCTYPE node PUBLIC "-//freedesktop//DTD D-BUS Object Introspection 1.0//EN" "http://www.freedesktop.org/standards/dbus/1.0/introspect.dtd">
<node name="/" xmlns:doc="http://www.freedesktop.org/dbus/1.0/doc.dtd">
<!--
com.google.code.AccountsSSO.SingleSignOn.Identity:
@short_description: Representation of a single identity.
The signond D-Bus APIs are unstable, subject to change and should not be
used by client applications, which should use libsignon-glib or
libsignon-qt instead.
A single credential stored in the Signon database.
-->
<interface name="com.google.code.AccountsSSO.SingleSignOn.Identity">
<!--
unregistered:
@short_description: Emitted when the identity is removed
Emitted when the Identity is removed from the Signon database.
-->
<signal name="unregistered">
</signal>
<!--
infoUpdated:
@short_description: Emitted when the Identity information has been
updated.
@type: the type of update that occurred
Emitted when credentials information has been updated is the Signon
database, such as when the credentials were updated or removed, or when
the identity was signed out.
-->
<signal name="infoUpdated">
<arg name="type" type="i" direction="out"/>
</signal>
<!--
requestCredentialsUpdate:
@short_description: Request that the user enters a new (updated) secret.
@id: the ID of the Identity
@message: message to be shown to the user
Request that the user enters a new secret, which is then stored in the
Signon database.
-->
<method name="requestCredentialsUpdate">
<arg name="id" type="u" direction="out"/>
<arg name="message" type="s" direction="in"/>
</method>
<!--
getInfo:
@short_description: Fetch additional information about the Identity.
@info: a dictionary of additional information
Fetch a large amount of additional information on the Identity, such as
the username, type, method and so on.
-->
<method name="getInfo">
<arg name="info" type="a{sv}" direction="out"/>
</method>
<!--
verifyUser:
@short_description: Verify the secret against a user-supplied secret.
@valid: whether the supplied secret is valid
@params: parameters to pass to the authentication plugin
Request that the user enters a secret, and verify that against the secret
stored in the Signon database.
-->
<method name="verifyUser">
<arg name="valid" type="b" direction="out"/>
<arg name="params" type="a{sv}" direction="in"/>
<annotation name="com.trolltech.QtDBus.QtTypeName.In4" value="QVariantMap"/>
</method>
<!--
verifySecret:
@short_description: Verify that the secret is valid.
@valid: whether the secret is valid
@secret: the secret to verify
Verifies that the supplied secret is valid by comparing it to the secret
stored in the Signon database.
-->
<method name="verifySecret">
<arg name="valid" type="b" direction="out"/>
<arg name="secret" type="s" direction="in"/>
</method>
<!--
remove:
@short_description: Remove the Identity.
Remove the identity from the Signon database.
-->
<method name="remove">
</method>
<!--
signOut:
@short_description: Sign out the identity.
Close all authentication sessions for the identity.
-->
<method name="signOut">
<arg type="b" direction="out"/>
</method>
<!--
store:
@short_description: Store credentials in the identity.
@id: a numeric ID for the identity in the database
@info: information to store in the Identity
Store the given credentials information in the identity, returning a
numeric ID for the identity in the Signon database.
-->
<method name="store">
<arg name="id" type="u" direction="out"/>
<arg name="info" type="a{sv}" direction="in"/>
<annotation name="com.trolltech.QtDBus.QtTypeName.In4" value="QVariantMap"/>
</method>
<!--
addReference:
@short_description: Add a reference to the Identity.
@id: the ID of the reference in the database
@reference: a named reference to add
Add a named reference to the Identity.
-->
<method name="addReference">
<arg name="id" type="i" direction="out"/>
<arg name="reference" type="s" direction="in"/>
</method>
<!--
removeReference:
@short_description: Remove a reference from the Identity.
@id: the ID of the reference in the database
@reference: a named reference to removed
Remove a named reference from the Identity.
-->
<method name="removeReference">
<arg name="id" type="i" direction="out"/>
<arg name="reference" type="s" direction="in"/>
</method>
</interface>
</node>
......@@ -47,9 +47,6 @@
#include "sso-auth-service.h"
#include "sso-auth-session-gen.h"
/* SignonAuthSessionState is defined in signoncommon.h */
#include <signoncommon.h>
static void signon_auth_session_proxy_if_init (SignonProxyInterface *iface);
G_DEFINE_TYPE_WITH_CODE (SignonAuthSession, signon_auth_session, G_TYPE_OBJECT,
......@@ -87,6 +84,31 @@ struct _SignonAuthSessionPrivate
guint signal_unregistered;
};
enum SignonAuthSessionState {
SIGNON_AUTH_SESSION_STATE_NOT_STARTED = 0, /**< No message. */
SIGNON_AUTH_SESSION_STATE_RESOLVING_HOST, /**< Resolving remote server
host name. */
SIGNON_AUTH_SESSION_STATE_CONNECTING, /**< Connecting to remote
server. */
SIGNON_AUTH_SESSION_STATE_SENDING_DATA, /**< Sending data to remote
server. */
SIGNON_AUTH_SESSION_STATE_WAITING_REPLY, /**< Waiting reply from remote
server. */
SIGNON_AUTH_SESSION_STATE_USER_PENDING, /**< Waiting response from
user. */
SIGNON_AUTH_SESSION_STATE_UI_REFRESHING, /**< Refreshing ui request. */
SIGNON_AUTH_SESSION_STATE_PROCESS_PENDING, /**< Waiting another process
to start. */
SIGNON_AUTH_SESSION_STATE_STARTED, /**< Authentication session is
started. */
SIGNON_AUTH_SESSION_STATE_PROCESS_CANCELING, /**< Canceling.current
process. */
SIGNON_AUTH_SESSION_STATE_PROCESS_DONE, /**< Authentication
completed. */
SIGNON_AUTH_SESSION_STATE_CUSTOM, /**< Custom message. */
SIGNON_AUTH_SESSION_STATE_LAST
};
typedef struct _AuthSessionQueryAvailableMechanismsData
{
gchar **wanted_mechanisms;
......
......@@ -26,7 +26,6 @@
#include "signon-errors.h"
#include "signon-enum-types.h"
#include "signon-internals.h"
#include "signoncommon.h"
#include <gio/gio.h>
/**
......@@ -36,7 +35,6 @@
*
* An enumeration of errors that are possible from Signon.
*/
#define SIGNON_DBUS_ERROR_PREFIX SIGNOND_SERVICE_PREFIX ".Error"
#include "signon-errors-map.c"
......
......@@ -99,39 +99,39 @@ signon_identity_info_new_from_variant (GVariant *variant)
DEBUG("%s: ", G_STRFUNC);
g_variant_lookup (variant,
SIGNOND_IDENTITY_INFO_ID,
"Id",
"u",
&info->id);
g_variant_lookup (variant,
SIGNOND_IDENTITY_INFO_USERNAME,
"UserName",
"s",
&info->username);
if (g_variant_lookup (variant,
SIGNOND_IDENTITY_INFO_SECRET,
"Secret",
"s",
&info->secret))
{
g_variant_lookup (variant,
SIGNOND_IDENTITY_INFO_STORESECRET,
"StoreSecret",
"b",
&info->store_secret);
}
g_variant_lookup (variant,
SIGNOND_IDENTITY_INFO_CAPTION,
"Caption",
"s",
&info->caption);
g_variant_lookup (variant,
SIGNOND_IDENTITY_INFO_REALMS,
"Realms",
"^as",
&info->realms);
/* get the methods */
if (g_variant_lookup (variant,
SIGNOND_IDENTITY_INFO_AUTHMETHODS,
"AuthMethods",
"@a{sas}",
&method_map))
{
......@@ -148,12 +148,12 @@ signon_identity_info_new_from_variant (GVariant *variant)
}
g_variant_lookup (variant,
SIGNOND_IDENTITY_INFO_ACL,
"ACL",
"^as",
&info->access_control_list);
g_variant_lookup (variant,
SIGNOND_IDENTITY_INFO_TYPE,
"Type",
"u",
&info->type);
......@@ -173,23 +173,23 @@ signon_identity_info_to_variant (const SignonIdentityInfo *self)
g_variant_builder_init (&builder, G_VARIANT_TYPE_VARDICT);
g_variant_builder_add (&builder, "{sv}",
SIGNOND_IDENTITY_INFO_ID,
"Id",
g_variant_new_uint32 (self->id));
g_variant_builder_add (&builder, "{sv}",
SIGNOND_IDENTITY_INFO_USERNAME,
"UserName",
signon_variant_new_string (self->username));
g_variant_builder_add (&builder, "{sv}",
SIGNOND_IDENTITY_INFO_SECRET,
"Secret",
signon_variant_new_string (self->secret));
g_variant_builder_add (&builder, "{sv}",
SIGNOND_IDENTITY_INFO_CAPTION,
"Caption",
signon_variant_new_string (self->caption));
g_variant_builder_add (&builder, "{sv}",
SIGNOND_IDENTITY_INFO_STORESECRET,
"StoreSecret",
g_variant_new_boolean (self->store_secret));
g_variant_builder_init (&method_builder,
......@@ -206,13 +206,13 @@ signon_identity_info_to_variant (const SignonIdentityInfo *self)
method_map = g_variant_builder_end (&method_builder);
g_variant_builder_add (&builder, "{sv}",
SIGNOND_IDENTITY_INFO_AUTHMETHODS,
"AuthMethods",
method_map);
if (self->realms != NULL)
{
g_variant_builder_add (&builder, "{sv}",
SIGNOND_IDENTITY_INFO_REALMS,
"Realms",
g_variant_new_strv ((const gchar * const *)
self->realms,
-1));
......@@ -221,14 +221,14 @@ signon_identity_info_to_variant (const SignonIdentityInfo *self)
if (self->access_control_list != NULL)
{
g_variant_builder_add (&builder, "{sv}",
SIGNOND_IDENTITY_INFO_ACL,
"ACL",
g_variant_new_strv ((const gchar * const *)
self->access_control_list,
-1));
}
g_variant_builder_add (&builder, "{sv}",
SIGNOND_IDENTITY_INFO_TYPE,
"Type",
g_variant_new_int32 (self->type));
return g_variant_builder_end (&builder);
......
......@@ -36,8 +36,6 @@
#define DEBUG(...) do {} while (0)
#endif
#include <signoncommon.h>
#include "signon-identity.h"
#include "signon-auth-session.h"
......@@ -56,6 +54,62 @@ struct _SignonIdentityInfo
gint type;
};
#define SIGNOND_SERVICE_PREFIX "com.google.code.AccountsSSO.SingleSignOn"
#define SIGNON_DBUS_ERROR_PREFIX SIGNOND_SERVICE_PREFIX ".Error."
#define SIGNOND_DAEMON_OBJECTPATH "/com/google/code/AccountsSSO/SingleSignOn"
/*
* Common server/client sides error names and messages
* */
#define SIGNOND_UNKNOWN_ERR_NAME SIGNON_DBUS_ERROR_PREFIX "Unknown"
#define SIGNOND_INTERNAL_SERVER_ERR_NAME SIGNON_DBUS_ERROR_PREFIX "InternalServer"
#define SIGNOND_INTERNAL_COMMUNICATION_ERR_NAME \
SIGNON_DBUS_ERROR_PREFIX "InternalCommunication"
#define SIGNOND_PERMISSION_DENIED_ERR_NAME \
SIGNON_DBUS_ERROR_PREFIX "PermissionDenied"
#define SIGNOND_METHOD_OR_MECHANISM_NOT_ALLOWED_ERR_NAME \
SIGNON_DBUS_ERROR_PREFIX "MethodOrMechanismNotAllowed"
#define SIGNOND_ENCRYPTION_FAILED_ERR_NAME \
SIGNON_DBUS_ERROR_PREFIX "EncryptionFailed"
#define SIGNOND_METHOD_NOT_KNOWN_ERR_NAME SIGNON_DBUS_ERROR_PREFIX "MethodNotKnown"
#define SIGNOND_SERVICE_NOT_AVAILABLE_ERR_NAME \
SIGNON_DBUS_ERROR_PREFIX "ServiceNotAvailable"
#define SIGNOND_INVALID_QUERY_ERR_NAME SIGNON_DBUS_ERROR_PREFIX "InvalidQuery"
#define SIGNOND_METHOD_NOT_AVAILABLE_ERR_NAME \
SIGNON_DBUS_ERROR_PREFIX "MethodNotAvailable"
#define SIGNOND_IDENTITY_NOT_FOUND_ERR_NAME \
SIGNON_DBUS_ERROR_PREFIX "IdentityNotFound"
#define SIGNOND_STORE_FAILED_ERR_NAME SIGNON_DBUS_ERROR_PREFIX "StoreFailed"
#define SIGNOND_REMOVE_FAILED_ERR_NAME SIGNON_DBUS_ERROR_PREFIX "RemoveFailed"
#define SIGNOND_SIGNOUT_FAILED_ERR_NAME SIGNON_DBUS_ERROR_PREFIX "SignOutFailed"
#define SIGNOND_IDENTITY_OPERATION_CANCELED_ERR_NAME \
SIGNON_DBUS_ERROR_PREFIX "IdentityOperationCanceled"
#define SIGNOND_CREDENTIALS_NOT_AVAILABLE_ERR_NAME \
SIGNON_DBUS_ERROR_PREFIX "CredentialsNotAvailable"
#define SIGNOND_REFERENCE_NOT_FOUND_ERR_NAME \
SIGNON_DBUS_ERROR_PREFIX "ReferenceNotFound"
#define SIGNOND_MECHANISM_NOT_AVAILABLE_ERR_NAME \
SIGNON_DBUS_ERROR_PREFIX "MechanismNotAvailable"
#define SIGNOND_MISSING_DATA_ERR_NAME SIGNON_DBUS_ERROR_PREFIX "MissingData"
#define SIGNOND_INVALID_CREDENTIALS_ERR_NAME \
SIGNON_DBUS_ERROR_PREFIX "InvalidCredentials"
#define SIGNOND_NOT_AUTHORIZED_ERR_NAME SIGNON_DBUS_ERROR_PREFIX "NotAuthorized"
#define SIGNOND_WRONG_STATE_ERR_NAME SIGNON_DBUS_ERROR_PREFIX "WrongState"
#define SIGNOND_OPERATION_NOT_SUPPORTED_ERR_NAME \
SIGNON_DBUS_ERROR_PREFIX "OperationNotSupported"
#define SIGNOND_NO_CONNECTION_ERR_NAME SIGNON_DBUS_ERROR_PREFIX "NoConnection"
#define SIGNOND_NETWORK_ERR_NAME SIGNON_DBUS_ERROR_PREFIX "Network"
#define SIGNOND_SSL_ERR_NAME SIGNON_DBUS_ERROR_PREFIX "Ssl"
#define SIGNOND_RUNTIME_ERR_NAME SIGNON_DBUS_ERROR_PREFIX "Runtime"
#define SIGNOND_SESSION_CANCELED_ERR_NAME SIGNON_DBUS_ERROR_PREFIX "SessionCanceled"
#define SIGNOND_TIMED_OUT_ERR_NAME SIGNON_DBUS_ERROR_PREFIX "TimedOut"
#define SIGNOND_USER_INTERACTION_ERR_NAME SIGNON_DBUS_ERROR_PREFIX "UserInteraction"
#define SIGNOND_OPERATION_FAILED_ERR_NAME SIGNON_DBUS_ERROR_PREFIX "OperationFailed"
#define SIGNOND_TOS_NOT_ACCEPTED_ERR_NAME SIGNON_DBUS_ERROR_PREFIX "TOSNotAccepted"
#define SIGNOND_FORGOT_PASSWORD_ERR_NAME SIGNON_DBUS_ERROR_PREFIX "ForgotPassword"
#define SIGNOND_INCORRECT_DATE_ERR_NAME SIGNON_DBUS_ERROR_PREFIX "IncorrectDate"
#define SIGNOND_USER_ERROR_ERR_NAME SIGNON_DBUS_ERROR_PREFIX "User"
G_GNUC_INTERNAL
SignonIdentityInfo *
signon_identity_info_new_from_variant (GVariant *variant);
......
......@@ -93,7 +93,7 @@ sso_auth_service_get_instance ()
sso_auth_service =
sso_auth_service_proxy_new_for_bus_sync (G_BUS_TYPE_SESSION,
G_DBUS_PROXY_FLAGS_NONE,
SIGNOND_SERVICE,
SIGNOND_SERVICE_PREFIX,
SIGNOND_DAEMON_OBJECTPATH,
NULL,
&error);
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment