summaryrefslogtreecommitdiff
AgeCommit message (Collapse)AuthorFilesLines
2017-05-05examples: Check validity of https certificates w/ the proper APIHEADmasterFelipe Borges1-9/+2
Use ovirt_get_option_group/ovirt_set_proxy_options instead as ovirt_proxy_fetch_ca_certificate is not checking properly the validity of https certificates. https://bugzilla.gnome.org/show_bug.cgi?id=775412
2017-05-05cookie_jar_changedChristophe Fergeau1-0/+16
2017-05-05ca file wipChristophe Fergeau3-2/+16
2017-05-05fixup! Add Prefer: csrf-protection headerChristophe Fergeau1-1/+1
2017-05-05Add Prefer: csrf-protection headerChristophe Fergeau1-0/+2
WAIT UNTIL THIS IS PUBLICLY DOCUMENTED
2017-05-05set user agentChristophe Fergeau1-0/+1
2017-05-05build: Allow to disable tests from configureChristophe Fergeau1-2/+5
There was already a --enable-tests/--disable-tests configure switch, but Makefile.am was not making use of the conditional it sets.
2017-04-27Update po/MakevarsPiotr Drąg1-3/+3
This is not a GNU package and the Free Software Foundation has no copyright over it. Also adds MSGID_BUGS_ADDRESS.
2017-04-08Add Friulian translationFabio Tomat2-0/+115
2017-03-01New storage format added in oVirt 4.1Eduardo Lima (Etrunko)1-0/+1
Signed-off-by: Eduardo Lima (Etrunko) <etrunko@redhat.com>
2017-02-06proxy: Check if operation is cancelled before disconnecting signalEduardo Lima (Etrunko)1-1/+9
According to the documentation, g_cancellable_disconnect() waits for the signal handler to finish, and if it is called from the handler itself, it will result in a deadlock. To avoid it, we check if the operation is cancelled and if so, call g_signal_handler_disconnect() instead of g_cancellable_disconnect(). https://developer.gnome.org/gio/stable/GCancellable.html#g-cancellable-disconnect Signed-off-by: Eduardo Lima (Etrunko) <etrunko@redhat.com>
2017-02-06proxy: Hold reference to cancellable objectEduardo Lima (Etrunko)1-1/+2
Being an asynchronous operation, there is no guarantee that the object is valid by the time of the cleanup, so we hold a reference to it to ensure it. Signed-off-by: Eduardo Lima (Etrunko) <etrunko@redhat.com>
2016-09-12Add more options to XGETTEXT_OPTIONS in po/MakevarsPiotr Drąg1-1/+1
2016-08-21Updated Polish translationPiotr Drąg1-21/+17
2016-08-03build-sys: Use upstream gettext instead intltoolJavier Jardón3-14/+80
https://bugzilla.gnome.org/show_bug.cgi?id=769286
2016-06-16build-sys: Remove obsolete PKG_NAME from autogen.shChristophe Fergeau1-1/+0
2016-06-16proxy: Remove use of rest_proxy_call_add_headerChristophe Fergeau1-2/+2
Now that we have ovirt_proxy_add_header, we can use it in OvirtProxy rather than direct modifications of the RestProxyCall object.
2016-06-16Force use of v3 REST APIChristophe Fergeau1-0/+1
oVirt 4.0 introduced a slightly incompatible REST API, see https://github.com/oVirt/ovirt-engine/tree/master/backend/manager/modules/restapi A short term fix is to send a "Version: 3" header with each request, which this commit does. This might stop working with oVirt 4.1 though. Longer term fix is tracked in https://bugzilla.gnome.org/show_bug.cgi?id=767724
2016-06-14proxy: Fix persistent session with oVirt 3.6Christophe Fergeau1-3/+2
commit d3683c2 "proxy: Only set 'Prefer: persistent-auth' with jsession-id" was working as expected when using the OvirtProxy::jsession-id and OvirtProxy::sso-token properties. However, when not using these properties and expecting the jsessionid to be set as a cookie during a regular HTTP session, this was not working properly as oVirt is not sending a jsessionid cookie when Prefer: persistent-auth is not set. Consequently, we need to set it upon OvirtProxy creation in order not to break this usecase. We don't add the header in RestProxyCall as was done before as we want to be able to disable this addition after OvirtProxy::sso-token has been set.
2016-05-10proxy: Move additional header API to private headerChristophe Fergeau2-3/+3
These new entry points are not exported in libgovirt.so, so they should not appear in public (installed) headers.
2016-04-14tests: Add OvirtVmDisplay testChristophe Fergeau1-1/+38
Test the parsing of OvirtVmDisplay is working as expected
2016-04-13tests: Add certificate data to EXTRA_DISTChristophe Fergeau1-0/+8
We need to have it in tarballs as this is used by our mock http server
2016-04-13tests: Start adding test case for oVirt API interactionChristophe Fergeau2-0/+258
Very few tests for now, but can easily be extended.
2016-04-13tests: Add mock httpd server to mock oVirt APIChristophe Fergeau10-2/+506
This is based off libsoup/examples/simple-httpd.c, but provides a simple API that test cases can use to start/stop a mock webserver which will send predefined responses to specific requests.
2016-04-13vm: Be more tolerant with missing nodes during <vm> parsingChristophe Fergeau1-1/+8
It's possible that these nodes are missing in test cases for example. Since we don't control what the other end is going to send us, it's better not to warn too loudly when this happens.
2016-04-13proxy; Don't try to set CA on VMs with no displaysChristophe Fergeau1-4/+11
In some corner cases (unit tests...), we can have VM resources without an associated display. In such cases, do not try to set the display CA on the non-existent display.
2016-04-13collection: Fix leak on duplicate resource namesChristophe Fergeau1-0/+1
When a collection contains 2 resources with the same name, we were correctly releasing the memory associated with the colliding resource, but not its name.
2016-04-13proxy: Fix gtk-doc annotationChristophe Fergeau1-1/+1
A ';' was used instead of ':'
2016-04-08proxy: Only set 'Prefer: persistent-auth' with jsession-idChristophe Fergeau2-2/+3
When using an oauth SSO token, this header should not be set.
2016-04-08proxy: Remove jsessionid cookie when its value is NULLChristophe Fergeau2-0/+7
2016-04-08Update NEWS file for 0.3.4 releaseChristophe Fergeau1-0/+26
2016-04-08proxy: Add OvirtProxy::sso-tokenChristophe Fergeau2-1/+41
This is the new way of automatically authenticating during oVirt REST communication. https://bugzilla.redhat.com/show_bug.cgi?id=1286696
2016-04-08proxy: Readd additional header APIChristophe Fergeau4-0/+104
This API will be needed in order to set a custom Authorization: header for authentication with oVirt. However this API can be internal only for now.
2016-04-08proxy: Document OvirtProxy propertiesChristophe Fergeau1-1/+27
2016-04-08Revert "proxy: Unref OvirtProxy::api when finalizing"Christophe Fergeau1-4/+0
OvirtProxy::api was already unref'ed a few lines before in the same method. This reverts commit dc19dcfbd3c0a45c7538b36b5b4ee5b77eab1623.
2016-04-08doap: Fix download pageChristophe Fergeau1-1/+1
Tarballs are now available from gnome.org.
2016-04-08doap: Remove redundant descriptionChristophe Fergeau1-3/+1
2016-04-08doap: Remove 'category' tagChristophe Fergeau1-1/+0
The current category is invalid and prevents modifications to the DOAP file from being pushed, and I could not find a really appropriate category in the valid categories.
2016-04-08Revert "proxy: Improve NULL CA handling in set_tmp_ca_file"Christophe Fergeau1-8/+10
This reverts commit 5c8f3c33e6ceb46d14a501dae9f03c40eb81ef49. Being able to set a NULL CA certificate after setting a non-NULL one would require some changes in libsoup. Since we are using a deprecated libsoup property (ssl-ca-file), this is unlikely to go upstream at this point, see https://bugzilla.gnome.org/show_bug.cgi?id=754825 As this also causes breakage with upstream libsoup (certificate check failures when trying to connect to an oVirt instance), it's better to revert this patch for now.
2016-03-17storage-domain: Remove debug log on missing nodeChristophe Fergeau1-1/+0
This is redundant with a similar log in ovirt_rest_xml_node_get_content_va
2016-03-16Added Occitan translationCédric Valmary2-0/+132
2015-12-08vm: Don't print ticket value to stdoutChristophe Fergeau1-2/+0
When G_MESSAGES_DEBUG=libgovirt is set, the ticket value would be printed to stdout. Since it's a short-lived password used to access the VM display, it's better not to print it. https://bugzilla.redhat.com/show_bug.cgi?id=1216118
2015-11-10Add zh_CN translationsAron Xu2-0/+131
2015-10-31Updated Portuguese translationPedro Albuquerque1-8/+8
2015-10-22collection: unref the resource instead of the resources tableFabiano Fidêncio1-1/+1
The typo was causing crashes, see the gdb backtrace: #0 g_type_check_instance_is_fundamentally_a ( type_instance=type_instance@entry=0x519b9e0, fundamental_type=fundamental_type@entry=80) at ../../gobject/gtype.c:3981 #1 0x63c4a47b in g_object_unref (_object=0x519b9e0) at ../../gobject/gobject.c:3067 #2 0x64842fb0 in ovirt_collection_refresh_from_xml (collection=0x50d4450, root_node=<optimized out>, error=0x28fb8c) at ../../govirt/ovirt-collection.c:276 #3 0x64843c49 in get_collection_xml_async_cb (proxy=0x3aebfd0, call=0x50d28a0, user_data=0x29c2ce0, error=0x28fb8c) at ../../govirt/ovirt-proxy.c:343 #4 0x64843bb2 in call_async_cb (call=0x50d28a0, error=0x0, weak_object=0x0, user_data=0x50d8680) at ../../govirt/ovirt-proxy.c:248 #5 0x00023fa7 in ?? () from C:\Program Files (x86)\VirtViewer v2.0-80\bin\librest-0.7-0.dll #6 0x051600e0 in ?? () Resolves: rhbz#1273977
2015-10-10Added Lithuanian translationAurimas Černius2-0/+132
2015-09-21Added French translationErwan Georget2-0/+131
2015-08-31Updated Polish translationPiotr Drąg1-31/+31
2015-08-27Added Swedish translationAnders Jonsson2-0/+131
2015-08-06proxy: Don't set RestProxy::ssl-ca-file from ssl_ca_file_changed()Christophe Fergeau1-1/+1
The only purpose of our notify::ssl-ca-file handler is to cleanup the temporary file we created when the ssl-ca-file is set externally. Now that we have a separate ovirt_proxy_free_tmp_ca_file(), we can call that rather than relying on ovirt_proxy_set_tmp_ca_file(proxy, NULL); to achieve that.