1. 22 Jan, 2015 2 commits
  2. 31 Oct, 2014 1 commit
    • Giovanni Mascellani's avatar
      daemon: fix object path derivation for large UIDs · 163f2d14
      Giovanni Mascellani authored
      accountsservice exports an object on the system bus
      for every user it tracks. The path of the object is
      derived from the user's uid.
      
      The format string used for computing the object path
      supposes the UID is signed. UIDs are unsigned quantities,
      though, so very large UIDs get misrepresented as negative
      values in the resulting object path. The negative sign
      "-" is invalid in an object path. Under these circumstances,
      accountsservice will crash.
      
      This commit corrects the problem, by using a format string
      that is appropriate for unsigned values.
      
      https://bugs.freedesktop.org/show_bug.cgi?id=85688
      163f2d14
  3. 17 Oct, 2014 1 commit
    • Stephen Gallagher's avatar
      systemd: ensure that accounts service starts after NSS initializes · 3d6d1259
      Stephen Gallagher authored
      The various NSS calls don't give accurate results in some configurations
      until midway through boot up.  This is because SSSD or winbind (or
      whatever) needs to initialize.
      
      In order to prevent accounts service from using NSS prematurely, we need
      to add an ordering constraint between the nss-user-lookup.target and
      accountsservice.
      
      This commit accomplishes this by adding the appropriate Wants= and
      After= directives to the accountsservice systemd unit file.
      3d6d1259
  4. 16 Oct, 2014 3 commits
  5. 30 Sep, 2014 1 commit
  6. 19 Sep, 2014 1 commit
    • Ray Strode's avatar
      lib: make sure replace key when replacing value in object_path hash · 5c222582
      Ray Strode authored
      If add_user gets called on user object that's already being tracked
      by object path, we can end up replacing and freeing the user object
      but leaving the old object path memory in the hash table.
      
      This commit makes sure we replace the key when replacing the object.
      5c222582
  7. 18 Sep, 2014 3 commits
  8. 17 Sep, 2014 1 commit
  9. 16 Sep, 2014 1 commit
  10. 08 Sep, 2014 3 commits
  11. 21 Jul, 2014 6 commits
  12. 07 May, 2014 1 commit
  13. 20 Mar, 2014 5 commits
  14. 19 Mar, 2014 4 commits
  15. 15 Mar, 2014 1 commit
  16. 29 Jan, 2014 1 commit
  17. 10 Jan, 2014 1 commit
    • Matthias Clasen's avatar
      daemon: call userdel consistently · c501cca9
      Matthias Clasen authored
      commit c5905497 changed one of
      the two calls to userdel in the code to use -f.  This change
      was made to ensure users in the logind "closing" state can be
      deleted (userdel runs pgrep to make sure a user isn't logged in
      unless -f is passed).
      
      Unfortunately, that commit missed the other userdel invocation,
      and so now there is inconsistent behavior.
      
      This commit changes makes sure both invocations pass -f.
      
      https://bugs.freedesktop.org/show_bug.cgi?id=65752
      c501cca9
  18. 19 Nov, 2013 1 commit
  19. 07 Nov, 2013 1 commit
  20. 04 Nov, 2013 1 commit
    • Matthias Clasen's avatar
      Avoid deleting the root user · 980692e6
      Matthias Clasen authored
      The check we have in place against deleting the root user can
      be tricked by exploiting the fact that we are checking a gint64,
      and then later cast it to a uid_t. This can be seen with the
      following test, which will delete your root account:
      
      qdbus --system org.freedesktop.Accounts /org/freedesktop/Accounts \
           org.freedesktop.Accounts.DeleteUser -9223372036854775808 true
      
      Found with the dfuzzer tool,
      https://github.com/matusmarhefka/dfuzzer
      980692e6
  21. 22 Oct, 2013 1 commit